url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://www.slant.co/options/13489/~gitkraken-review | code | Ranked in these QuestionsQuestion Ranking
Pro Beautiful user interface
It's modern and beautiful, it looks clean and refined.
It's simple: the most used features (pull, push, branch, stash, commit) are accessible in one click, and are the only buttons. The other features aren't in complicated menus nor in hundreds of buttons, but rather displayed when you right-click on something.
It gives more space to the commits, i.e. the most important things. In fact, you can collapse or reduce the other menus/windows.
It displays the current path (project, branch) on an horizontal (clickable) bar at the top. It's just a matter of taste but I prefer this to the traditional "tree" view.
It has undo and redo buttons on the main window.
It supports some drag-and-drop gestures (for example: drag-and-droping the local branch to the remote one pushes it).
Built on top of Electron, so it runs on Linux, Mac, and Windows.
Drag-and-drop, double-clicks, etc. work very well and save time.
Pro Free version available
There are both pro and free versions available. The free version is pretty complete feature-wise for day-to-day operations.
Pro Offers a simple way of undoing mistakes
GitKraken has simple undo/redo buttons that work the same way you'd expect in any other software.
Pro Active development
Axosoft is extremely responsive to requests for new features and has a good paced iteration cycle of 2-4 weeks.
Pro Integrates with GitHub
Has GitHub integration for things like automatic fork population and easy repository cloning.
Pro GitFlow support out of the box
Supports GitFlow out of the box.
Pro Has a FuzzyFinder
GitKraken has a fuzzy finder to switch between repos / files.
Pro Good keyboard shortcuts
Con Uses a lot of memory
Compared to other Git-clients with a graphical user interface, GitKraken uses up a lot of memory.
Con Not open source
It is gratis (no cost) but is not open source. The community cannot fix problems in it, audit it for security, or trust it in general.
Con Must log into GitKraken servers to use
All functionality is disabled unless you register for a Free account and remain logged in.
There is the $79/user/yr Enterprise option. It allows you to deploy a Linux License Server in an air-gapped/offline environment.
Con Not free for commercial use
Con Crashes once in a while
Under specific circumstances, like resetting 5000+ changes, the GUI will crash.
Con Amending merge output is a pro feature
In most cases of Merge Conflicts, users are stuck with auto-merge or manually resolving it by hand. This is because in the Free Tier, users can only (1) Keep File (ver 1), (2) Keep File (ver 2), (3) Auto-merge, or (4) Use External Merge Tool.
In addition, using External Merge Tools is very limited because GitKraken (all tiers) restricts External Merge Tools to only those it managed to Auto-detect. It also does not support custom arguments for the External Tools.
Modifying the merge output directly, or Selecting lines to keep/discard, is a Paid Feature.
Con Missing Features
Checkout & Hard Reset
Advanced or Interactive Rebase (aka history rewrite)
Progress bar indicator
Con Popup Reminders to Upgrade to Pro version
Con Cannot multi-select files
No Ctrl-Click or Shift-Click for multi-selecting files. For example, if you have a few files you wish to Delete, it is a slow process. You have to delete them individually; that is, right click a file then delete, right click another then delete, and so on. | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320130.7/warc/CC-MAIN-20170623184505-20170623204505-00318.warc.gz | CC-MAIN-2017-26 | 3,444 | 44 |
https://www.redhat.com/archives/libvir-list/2012-October/msg01597.html | code | Hello Eoric, Forget my previous mail, that was a patched version. qemuDomainRemoveInactive() is deleting the snapshots, but still: I would prefer to check for snapshots to extend for inactive domains as well. Sincerely Philipp -- Philipp Hahn Open Source Software Engineer hahn univention de Univention GmbH be open. fon: +49 421 22 232- 0 Mary-Somerville-Str.1 D-28359 Bremen fax: +49 421 22 232-99 http://www.univention.de/
Description: This is a digitally signed message part. | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267866358.52/warc/CC-MAIN-20180624044127-20180624064127-00636.warc.gz | CC-MAIN-2018-26 | 479 | 2 |
https://www.cnet.com/pictures/microsofts-e3-2010-booth-photos/ | code | LOS ANGELES--This year's E3 is in full swing, and each of the big three game companies--Sony, Nintendo, and Microsoft--has a massive booth in place at the Los Angeles Convention Center.
This year's Microsoft booth focuses heavily on Kinect, Microsoft's upcoming motion control system, as well as a redesign of the company's Xbox 360 console.
Click through to see what Microsoft has on display at this year's show.
To get a chance to play with Kinect, E3 attendees had to queue up around the booth.
Microsoft's surprise announcement at its E3 press conference earlier in the week was about a redesigned version of the console, which hits stores this week. The new version replaces the old one, which could not be found anywhere at Microsoft's booth.
To promote Forza Motorsport 3, Microsoft had a Ferrari 458 Italia parked in a corner of the booth.
Ubisoft's Chris Reed demonstrates the upcoming Our Shape: Fitness Evolved, which uses Microsoft's Kinect hardware to let players do workout routines without a controller.
Microsoft was giving live demos of Kinect to E3 attendees in sealed booths with transparent backdrops. This is impressive given that Kinect is constantly searching for people with its built-in camera. Demos by Sony, on the other hand, were put on a solid white background, and viewed from the side instead.
The top of Microsoft's booth is a place for journalists to get meetings with Microsoft executives, as well as play with certain titles off the show floor on the large HDTVs.
MTV Games' upcoming Dance Central title was another third-party title to be demoed at Microsoft's booth. The game uses the Kinect camera to track user movement in time to dance moves, and was featured in Microsoft's E3 press conference. | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499891.42/warc/CC-MAIN-20230131222253-20230201012253-00765.warc.gz | CC-MAIN-2023-06 | 1,736 | 10 |
http://cgseq.alahadzih.ru/what-does-updating-drivers-do-1274.html | code | What does updating drivers do
If the information here does not help we recommend reaching out to the game's developer for in-depth support.
It may also be necessary to see a local PC technician for help with your individual configuration.
Games may not launch if you're running software which inteferes with Steam.
Please see our Programs Which May Interfere with Steam article for detailed information on software conflicts you may be experiencing.
As with Windows, if a game won't launch this is often caused by corruption in your extracted game files.
Please visit Microsoft's How to keep your Windows computer up-to-date page and make sure your version of Windows is fully updated. NET framework (all versions) that is available through Windows Update, as ATI drivers and certain games require the framework to be installed and fully updated.
Make sure you have the latest drivers for the various components of your machine.
While the article may be long, the information included is helpful in eliminating common software conflicts which may prevent games from launching.
Games may not launch if your machine is just at or below the game's system requirements. | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583515564.94/warc/CC-MAIN-20181023002817-20181023024317-00217.warc.gz | CC-MAIN-2018-43 | 1,165 | 10 |
https://wiki.inkscape.org/wiki/index.php?title=SpecInformativeUI&oldid=66709 | code | Launchpad Entry: https://blueprints.launchpad.net/inkscape/+spec/informative-ui
The UI could benefit from hyperlink-like shortcuts seamlessly placed on the statusbar text. These shortcuts open often used editing dialogs. Other places could get the same treatment.
- Basic appearance properties are already there (fill, stroke, stroke width, opacity) and double clicking them opens the Fill&Stroke dialog. Adding ways of accessing filter and LPE editing dialogs seems like a reasonable step to me (because both of them affect the appearance of objects).
- The shortcuts are painted with another color, making detection of an added filter/LPE easier with just a glance at the statusbar.
- Direct access to two of the most used dialogs (IMHO) from the main UI without having to use the menus.
- It doesn't take more space than the current solution so it won't affect negatively narrow screens.
- Might not be doable in GTK+ (unsure). | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711368.1/warc/CC-MAIN-20221208215156-20221209005156-00312.warc.gz | CC-MAIN-2022-49 | 930 | 7 |
https://babecook.com/spaghetti/163-recipe-delicious-healthy-taco-spaghetti/ | code | Healthy Taco Spaghetti.
Ingredients of Healthy Taco Spaghetti
- It’s 1 lb of Lean Ground Beef.
- Prepare 1 box of Whole Grain Spaghetti.
- It’s 1 packages of Fat Free Shredded Cheddar Cheese.
- It’s 2 can of Diced Tomatoes with Green Chiles.
- It’s 1 can of Diced Green Chiles.
- You need 1 envelope of Taco Seasoning.
- It’s of Salt and Pepper.
Healthy Taco Spaghetti step by step
- Boil spaghetti per directions on box..
- Brown ground beef.
- Mix taco seasoning, tomatoes and chilies in with ground beef..
- Add ground beef mixture to spaghetti..
- Mix with half of cheese and add to baking dish..
- Top with remaining cheese and bake at 350° for 20 minutes.. | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653501.53/warc/CC-MAIN-20230607010703-20230607040703-00430.warc.gz | CC-MAIN-2023-23 | 673 | 16 |
https://sourceforge.net/p/open-beos/mailman/open-beos-kernel-devel/thread/[email protected]/ | code | I was chatting on BeShare about classic systems, and got inspired to
dig out my collection, which has been sitting ignored since I moved to
my new house. Anyway, I took pictures of most of the major components,
and I want to share them with you all:
Also, I am still working on testing the stack, and commenting the
source code kernel/core with Doxygen. I will be committing significant
time this weekend to both of these things, and should have ping testing
completed and fully documented on my project page.
Get latest updates about Open Source Projects, Conferences and News. | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321309.25/warc/CC-MAIN-20170627101436-20170627121436-00085.warc.gz | CC-MAIN-2017-26 | 578 | 9 |
http://www.ausphotography.net.au/forum/showthread.php?64143-Sigma-24-70-f-2-8 | code | Soooo, how many forumites here have the Sigma 24-70 in their lens collection.
I could have used one last weekend, but don't have one (yet). I got by with my 17-50 (I hope - i didn't get to see the photos), but reckon 24-70 would have made life a little easier. Due to the fact I am on the poor side of well off I am probably looking at getting the non HSM version & not even considering Nikon. So I'd like to hear from anyone that has one or has had both in regards any problems, focus speed, noisy & all that kind of stuff.
This lens will work on FF if I go down that lane in the future wont it ? but I need the DG version is that correct
More info: I will hopefully have a wide angle lens soon & will then retire the 17-50 so I wont be overlapping lenses, by having 17-50 & 24-70 as well. | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120101.11/warc/CC-MAIN-20170423031200-00600-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 790 | 4 |
https://forums.servethehome.com/index.php?search/42855181/ | code | Separate names with a comma.
Sorry, I guess my question wasn't very clear how do I avoid using dual mode in my config?
Could you show how to do this? I am a complete noob at all of this. Here is my vlan config.
Port 1/1/1 is switch to pfsense
Port 1/1/24 is...
Sorry about not getting back to this, I've used both a DAC and fiber. Same results with both.
I forgot that I added 2 lines to the hosts file.
I added the IP of each card and the system name associated...
Do you want the entire system information output file?
[ATTACH] [ATTACH] Here are my Iperf results
1. Iperf3 9.64Gb/s both ways
2. Currently using 15m fiber. Same result with 5m DAC
3. No virtual machine
5. flint -d /dev/mst/mt4099_pci_cr0...
I'll post up the info when I get home.
I have an X2 on my Win10 and my Freenas box. On my last iPerf test I got 9.5Gbs I think. I'll rerun the test when I get home. What config info do...
Got the console cable today. 6450 is up and running. I'm currently running a very basic config, not sure what all I need or want to do.
Been through all 46 pages, I was convinced on page 1 to get a 6450-24P, now I'm just waiting on the console cable to get things setup. This will... | s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496664808.68/warc/CC-MAIN-20191112074214-20191112102214-00314.warc.gz | CC-MAIN-2019-47 | 1,180 | 18 |
https://www.experts-exchange.com/questions/22753940/Force-Outlook-2003-Reading-Pane-on-Bottom.html | code | i am rolling out Office 2003 Pro using an administrative installation point located on a server with Group Policy.
i am trying to find a way to force the clients to have the Reading Pane on the bottom after the initial install.
The default seems to be the right.
I can seem to find a way to do this.
I looked at the Office 2003 Resource kit but cannot find anything that will do this.
any help please? | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794869272.81/warc/CC-MAIN-20180527151021-20180527171021-00537.warc.gz | CC-MAIN-2018-22 | 401 | 6 |
https://github.sainnhe.dev/Homebrew/homebrew-cask/issues | code | upgrade/reinstall induce time-dependent dock and launchpad be...
#102721 openedOpen 16
Mar 26, 2021 by
Fix casks with
depends_onthat reference pre-Yosemite
#58046 by vitorgalvao was closedClosed 29
Jun 11, 2019
ProTip! Type g p on any issue or pull request to go back to the pull request listing page. | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499890.39/warc/CC-MAIN-20230131190543-20230131220543-00010.warc.gz | CC-MAIN-2023-06 | 301 | 8 |
https://fcp.co/forum/4-final-cut-pro-x-fcpx/38123-synchronised-clips-audio-missing | code | Hi - I'm having a problem with Synchronised clips. Every now and then they show up with a yellow exclamation mark and a big red bar where audio should be. It is frustrating as other times everything is ok. Not sure what I'm doing wrong or how to fix it. Any suggestions would be great - thanks.
That red bar/exclamation mark can denote a couple of things... either the audio file itself isn't where FCP thinks it should be, or you've got an effect that isn't available. Can you post a screenshot? | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657720.82/warc/CC-MAIN-20230610131939-20230610161939-00025.warc.gz | CC-MAIN-2023-23 | 496 | 2 |
https://odd.blog/2010/04/28/preload-cache-wp-super-cache/ | code | See that nice dip in the graph for this week? I started to preload the cache used by WP Super Cache last Sunday and it’s made a noticeable difference in the load on my server here. The big spike is the preloading process.
I’ve always discouraged users from preloading the cache (Askapache Crazy Cache will do this for any cache plugin), mainly because of the possible problems so many files will cause for hosting companies. If you have thousands of cache files, it’s going to take so much longer to recover from a disk crash.
On the other hand, Google will now be using speed as a metric for judging how “good” a website is. In the past this plugin ignored the pages visited by bots because the bots only visited each page once so caching a page after the fact was pointless. The page, all pages, have to be cached first before Google ever visits.
That’s what it looks like. Once you start preloading it launches a wp-cron job to fetch 100 posts, then schedules another job 10 seconds in the future to fetch another 100 posts until it finishes. It also disables garbage collection of old pages, but making comments or posts will still clear out the appropriate cached files.
It only caches single posts right now. It may not be worth caching archive or tag pages because many sites already tell bots to ignore those pages as the server is doing less work it will serve those archive pages more quickly anyway.
The preloading only works if you’re using the plugin in Supercache or “ON” mode. It’s still a work in progress but has worked fine here. As well as the preloader the development version of the plugin has:
- Better support for mobile plugins.
- A cache tester.
- Can be configured to only delete the page a comment is left on, rather than the front page and associated pages.
- Works in WordPress 3.0.
It also has a number of bug fixes and other features added too. | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499831.97/warc/CC-MAIN-20230130232547-20230131022547-00626.warc.gz | CC-MAIN-2023-06 | 1,895 | 11 |
https://money.stackexchange.com/questions/53769/can-i-find-the-duration-of-a-sepa-lastschrift-permit-i-signed | code | If you need the background, you can read my other question. But I'm interested in answers to this one independently of the situation described there.
I allowed somebody to perform "Lastschrift" (take money from my account) regularly. If I kept a copy of the form I signed, I cannot find it. But I know that these permissions ("SEPA Mandat") have an expiry date.
Is there a way for me to find out when is the expiry date of the permission I signed? Will my bank know it, or the other person's bank, or some regulation institution? | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816465.91/warc/CC-MAIN-20240412225756-20240413015756-00882.warc.gz | CC-MAIN-2024-18 | 529 | 3 |
https://www.kitronyx.com/blog/snowboard-2-demo-videos | code | All of our new Snowboard 2 products are ready!
MP2508 10x16 FSR Matrix Sensor Evaluation Kit with MS9723 and MS9724
All you need to start working with the Snowboard 2 with 10%+ off price!
IMPORTANT NOTE: This HDK outputs raw ADC (Analog to Digital Conversion) values which are changed according to applied pressure. For absolute pressure distribution measurement, a calibration process in user's side is required. Kitronyx provides an exemplary simple calibration method here. It should be emphasized that there are many calibration algorithms for FSR matrix sensors and measurement performance follows the utilized calibration method.
Snowboard 2 is an entry level force and tactile sensor HDK (Hardware Development Kit). It is designed to work with any resistive type matrix sensors including FSR matrix sensors. It also supports popular single point FSR sensors.
By purchasing the Snowboard 2 you actually get
- Force sensing controller (sensor is not included). Snowboard 2 can acquire data from a matrix sensor or 10 single points FSR sensors.
- Snowboard 2 is an all-in-one force sensing development platform
- Multiple point force sensing without crosstalk for entry level pressure mapping, pressure distribution sensing, and tactile sensing applications
- Works standalone and as an Arduino Shield (Arduino is not included and this product is tested with Arduino Uno and Arduino Leonardo)
NOTE: Snowboard 2 outputs digital values which are proportional to the applied pressure. In order to get physical pressure values, user calibration is required.
MP2509 10x16 FSR Matrix Sensor Evaluation Kit with MS9758 Large Sensor
MP2509 is a Hardware Development Kit (HDK) to help you build your own relative pressure mapping systems and tactile sensing systems
This product is carefully designed for researcher and engineers who needs pressure mapping sensor, electronics, and SDK but suffer from limited budget. | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195529737.79/warc/CC-MAIN-20190723215340-20190724001340-00187.warc.gz | CC-MAIN-2019-30 | 1,912 | 14 |
https://digitalcommons.odu.edu/sciences_achievement/14/ | code | Exploring Impact of Task Complexity on Performance on a Robotic Arm Task
College of Sciences
Use of robotic arms is increasing across domains, but the impact of task features and control method on human performance is still not fully understood. As progress toward full autonomy occurs, humans and automation will likely share control in the future, potentially via shedding tasks to the automation. The goal of this work was to investigate how task complexity impacts task time, errors, task completion rate, and task shedding behavior in a robotic arm task. Using a 2 x 2 split-plot design, 40 undergraduates (24 females) used two control devices, a Leap Motion controller and an Xbox One controller, to complete either a high or low complexity peg board task chosen to simulate IED disarmament. Simultaneously, the participants surveyed aerial images for tanks and responded verbally. There were no significant differences on the task complexity dimension. On the number of tasks shed and completion rate variables, there was a stronger impact of task complexity when using the Leap Motion controller than when using the Xbox One controller. The lack of significant effect could be due to insufficient power to detect the interaction or floor effects as overall performance was poor. These findings provide insight into the potential use of motion-capture based devices in the future in both high and low complexity tasks, as well as the shortcomings of such devices. Researchers should further investigate future motion-capture systems at varying levels of task complexity to determine if they are appropriate for sensitive tasks.
Long, Shelby and Bliss, James P., "Exploring Impact of Task Complexity on Performance on a Robotic Arm Task" (2019). College of Sciences Posters. 14. | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400190270.10/warc/CC-MAIN-20200919044311-20200919074311-00785.warc.gz | CC-MAIN-2020-40 | 1,784 | 4 |
https://www.jetbrains.com/help/dotcover/2.7/Sharing_Unit_Test_Runner.html | code | dotCover shares the unit test support with another JetBrains .NET developer tool,
two tools have the same
unit test runner engines as well as Unit Test
Unit Test Sessions windows.
If you install dotCover after ReSharper, dotCover disables its own unit test runner
so that you can continue using ReSharper's unit test commands and windows;
all additional dotCover commands are integrated in ReSharper menus.
However, if you decide to uninstall ReSharper later, the unit test support will be automatically enabled in dotCover after you restart Visual Studio.
If you disable ReSharper, dotCover does not switch on its unit test support automatically; you need to enable it manually as described below.
To see whether the test runner is disabled, check if the dotCover | Unit Tests submenu of the main menu is grayed out. If you have not changed any settings and the unit tests are disabled, it means that ReSharper is installed on your computer. It can take care of unit tests and dotCover commands are integrated into ReSharper's menu: ReSharper | Unit Tests.
Anytime, you can explicitly enable unit test runner in dotCover. To do so, tick the Enable Unit Testing check-box in the dotCover Options | Unit Testing. For more information, see Configuring Unit Test Support.
Once you have changed this option, dotCover will not automatically enable or disable unit test runner if you install or uninstall ReSharper.
You should also notice that test engines of ReSharper and dotCover are configured separately and may have different settings and unit test plugins. For more information, see Configuring Unit Test Support. | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863407.58/warc/CC-MAIN-20180620011502-20180620031502-00096.warc.gz | CC-MAIN-2018-26 | 1,614 | 13 |
http://www.jguru.com/forums/view.jsp?EID=851611 | code | Tuesday, April 23, 2002 03:35 PM
I wish to limit the input of a JTable column to digits only. I have done this with JTextfields, but I cant figure how to apply that to tables.
Can anyone point me to example code or tutorials which show how this is done for JTable cells?
Many thanks in advance. | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398460519.28/warc/CC-MAIN-20151124205420-00284-ip-10-71-132-137.ec2.internal.warc.gz | CC-MAIN-2015-48 | 294 | 4 |
https://knowledge4policy.ec.europa.eu/dataset/ds00152_en | code | The dataset contains information about how subnational geographical areas cluster with in terms of human mobility measured through Mobile Network Operator (MNO) data...
Over the last two decades both immigration politics and research on immigration issues have become very important. So far; there is however no dataset that would allow researchers to systematically investigate immigration policies across a large sample of countries. The aim of the Immigration Policies in Comparison (IMPIC) project is therefore to provide a set of sophisticated quantitative indices to measure immigration policies in all OECD countries and for the time period 1980-2010. By means of this new dataset the causes and effects of immigration policies will be studied more systematically.
The Immigration Policies in Comparison (IMPIC) project is led by Marc Helbling and was funded by the Emmy-Noether program of the German Research Foundation for the period 2011-2016.
Please cite the following overview paper when you use the IMPIC data:
Marc Helbling; Liv Bjerre; Friederike Römer and Malisa Zobel (2017):
“Measuring Immigration Policies: The IMPIC Database”; European Political Science 16(1): 79-98. Link.
For technical and methodolocial details of the IMPIC dataset see the following two Discussion Papers:
Schmid; Samuel D. and Marc Helbling (2016). Validating the Immigration Policies in Comparison (IMPIC) Dataset. WZB Berlin Social Science Center. Discussion Paper. SP VI 2016–202. Link.
Bjerre; Liv; Marc Helbling; Friederike Römer and Malisa Zobel (2016). Technical Report: The Immigration Policies in Comparison (IMPIC) Dataset. WZB Berlin Social Science Center. Discussion Paper. SP VI 2016–201. Link.
The current report is focused on a technical screening and selecting exercise of climate/weather parameters and indices to be used in a bigger JRC Project on Climate Change Induced Migration...
The Undocumented Worker Transitions (UWT) project will document the factors that underlie migration flows, illegal and legal, focusing on undocumented migrants and under-documented migrants, whose... | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038088245.37/warc/CC-MAIN-20210416161217-20210416191217-00073.warc.gz | CC-MAIN-2021-17 | 2,102 | 11 |
https://www.robertknight.io/tag/linux/ | code | Stata.lang file goes in ~/.local/share/gtksourceview-3.0/language-specs
CentOS 7 Repository for OwnCloud desktop sync client is online. This application works well with Nextcloud. Use (k)statusnotifieritem/appindicator extension and Topicons plus extensions in Gnome to ensure the icon works as it should. The Url is https://robertknight.io/el7/robertknightio.repo To add the repo, type the following command: yum-config-manager –add-repo https://robertknight.io/el7/robertknightio.repo
This article details how to archive folders with their contents, encrypt the archives, upload them to S3, and remove the local copies. A typical usage might be to archive the version of a website that I have with twenty thousand files on a certain date before changing the folder layouts of images for ten thousand images.
I just updated Search Helper with a Vivaldi browser selection. It works on Gnome 3.
Android Studio for Linux needs a desktop icon. This is a functioning one to place in ~/.local/share/applications. [Desktop Entry] Version=1.0 Name=Android Studio Comment=Software Development GenericName=AndroidStudio Exec=sh /opt/android-studio/bin/studio.sh Terminal=false X-MultipleArgs=false Type=Application Icon=/opt/android-studio/bin/studio.png Categories=Development; MimeType=text/html;text/xml;application/xhtml+xml Keywords=programming;java;android;ide; Name[en_US]=AndroidStudio
Yum Update Memory Allocation issues on 512M Virtual Machines: Create a Swap file: dd if=/dev/zero of=/swapfile bs=1024 count=655366 chmod 600 /swapfile mkswap /swapfile swapon /swapfile To disable and remove after updates are complete: swapoff -a rm -f /swapfile
Application update includes Ecosia in place of Qrobe, and the addition of Program Creek. Osmhic Search Helper: https://github.com/robertdknight/Osmhic-Search-Helper-GTK3
Taskfreak was a great web application developed years ago. The main website doesn’t have updated versions and the software doesn’t work on many newer configurations. To remedy this, I have created a v.7.2 fork at Github. The fork has the SQL syntax corrected, and will contain some updates time goes by.
When configuring Wine in the form in the previous article, the first prefix created may be 64-bit. In this situation, e-sword installed correctly. An issue presented itself when attempting to run Microsoft Office 2007 related to MSXML5 installation. This issue prevents adding custom buttons to the quick access bar, adding the data analysis add-ons to …
Continue reading Office 2007 and Wine with dual prefix
Pycharm 2017.3 doesn’t create a launcher icon like 2017.2. This must be created manually. Here is a functional one. [Desktop Entry] Version=1.0 Name=Pycharm 2017.3.3 Comment=Software Development GenericName=Pycharm Exec=sh /opt/pycharm-community-2017.3.3/bin/pycharm.sh Terminal=false X-MultipleArgs=false Type=Application Icon=/opt/pycharm-community-2017.3.3/bin/pycharm.png Categories=Development; MimeType=text/html;text/xml;application/xhtml+xml Keywords=programming;python;ide; Name[en_US]=Pycharm The list of available categories so that it appears correctly in application menus is over at the page …
Continue reading Pycharm 2017.3 launcher icon | s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496671053.31/warc/CC-MAIN-20191121231600-20191122015600-00513.warc.gz | CC-MAIN-2019-47 | 3,197 | 12 |
https://unit42.paloaltonetworks.com/helloxd-ransomware/ | code | This post is also available in: 日本語 (Japanese)
HelloXD is a ransomware family performing double extortion attacks that surfaced in November 2021. During our research we observed multiple variants impacting Windows and Linux systems. Unlike other ransomware groups, this ransomware family doesn’t have an active leak site; instead it prefers to direct the impacted victim to negotiations through TOX chat and onion-based messenger instances.
Unit 42 performed an in-depth analysis of the ransomware samples, the obfuscation and execution from this ransomware family, which contains very similar core functionality to the leaked Babuk/Babyk source code. It was also observed that one of the samples deployed MicroBackdoor, an open-source backdoor allowing an attacker to browse the file system, upload and download files, execute commands, and remove itself from the system. We believe this was likely done to monitor the progress of the ransomware and maintain an additional foothold in compromised systems.
During the analysis of the MicroBackdoor sample, Unit 42 observed the configuration and found an embedded IP address, belonging to a threat actor we believe is potentially the developer: x4k, also known as L4ckyguy, unKn0wn, unk0w, _unkn0wn and x4kme.
Unit 42 has observed x4k in various hacking and non-hacking forums, which has linked the threat actor to additional malicious activity such as:
- Cobalt Strike Beacon deployment.
- Selling proof-of-concept (PoC) exploits.
- Crypter services.
- Developing custom Kali Linux distros.
- Hosting and distributing malware.
- Deployment of malicious infrastructure.
Palo Alto Networks detects and prevents HelloXD and adjacent x4k activity with the following products and services: Cortex XDR and Next-Generation Firewalls (including cloud-delivered security subscriptions such as WildFire).
Due to the surge of this malicious activity, we’ve created this threat assessment for overall awareness.
|Related Unit 42 Topics||Ransomware, Ransomware Threat Report|
HelloXD is a ransomware family first observed in the wild on Nov. 30, 2021. This ransomware family uses a modified ClamAV logo in their executables. ClamAV is an open-source antivirus engine used to detect malware. We also have observed additional samples with different versions of the logo, which led us to believe the ransomware developer may like using the ClamAV branding for their ransomware. Additionally, some of the observed samples include properties information that can be observed in Figure 1.
The file description included the entry VlahmAV, a play on words on ClamAV, and the developer named the ransomware HelloXD and used another potential alias, uKnow, as the developer of HelloXD in the copyright section.
When executed, HelloXD tries to disable shadow copies to inhibit system recovery before encrypting files using the following commands embedded in the sample:
Additionally the ransomware does a ping to 1.1.1[.]1 and asks to wait a timeout of 3000 milliseconds between each reply, quickly followed with a delete command to delete the initial payload.
cmd.exe /C ping 1.1.1[.]1 -n 1 -w 3000 > Nul & Del /f /q
Two of the initial set of samples identified create a unique mutex containing the following message:
|mutex: With best wishes And good intentions...|
After those commands are executed, the ransomware finishes by appending the file extension .hello, alongside a ransom note titled Hello.txt (Figure 2).
The ransom note was modified between the observed samples. In the first sample we encountered (Figure 3, left), the ransom note only linked to a TOX ID, whereas a later observed sample (Figure 3, right) links to an onion domain as well as a TOX ID (different from the one in the first version). At the time of writing, this site is down.
The ransomware creates an ID for the victim which has to be sent to the threat actor to make it possible to identify the victim and provide a decryptor. The ransom note also instructs victims to download Tox and provides a Tox Chat ID to reach the threat actor. Tox is a peer-to-peer instant messaging protocol that offers end-to-end encryption and has been observed being used by other ransomware groups for negotiations. For example, LockBit 2.0 leverages Tox Chat for threat actor communications.
When observing both variants executing on virtual environments, we noted that the more recent variants changed the background to a ghost – a theme we’ve noticed in this threat actor’s work since our earliest observations of it. However, the previous version didn’t change the background at all – it simply left the ransom note we observed previously (Figure 4).
During analysis and threat intel gathering, we discovered two main packers used for HelloXD ransomware binaries, as well as for other malware samples linked to the potential author (Figure 5).
The first type of packer is a modified version of UPX. The code is extremely similar between UPX-packed binaries and the custom packer, however the custom packer avoids using identifiable section names such as .UPX0 and .UPX1, and leaves the default .text, .data, and .rsrc names unchanged. There are also no magic bytes within the packed payload, unlike UPX-packed binaries, which contain the magic bytes UPX!.
However, a dead giveaway that the sample is packed is the raw size of the .text section, which is zeroed out, while the virtual size is much larger, as expected; this is identical to a .UPX0 section. As there is no data within the .text section on disk, the entry point of the unpacking stub is within the .data section, which will unpack the malicious code into the .text section on runtime.
All of these details point toward the threat actor having modified or copied certain elements from the UPX packer, which can be further confirmed by comparing a UPX-packed binary with a custom-packed HelloXD binary.
The second packer we discovered consists of two layers, with the second being the custom UPX packer discussed above. This particular packer seems to be more common on x64 binaries and involves decrypting embedded blobs using a seemingly custom algorithm containing unconventional instructions such as XLAT (Figure 6).
Aside from storing the encrypted second layer, there is little to no obfuscation within the packer; API calls such as VirtualAlloc and VirtualProtect are clearly visible, and there is no control flow obfuscation.
We have observed two different samples of the HelloXD ransomware publicly available, indicating it is still under development by the author(s). The first sample is fairly rudimentary, with minimal obfuscation and typically paired with an obfuscated loader responsible for decrypting it through the use of the WinCrypt API before injecting it into memory. The second sample, on the other hand, is far more obfuscated, and is executed in memory by a packer rather than a full-scale loader.
While the obfuscation and execution may differ between the two, both samples contain very similar core functionality, due to the author copying the leaked Babuk/Babyk source code in order to develop the HelloXD ransomware (Figure 7). As a result, a lot of the function structure overlaps with Babuk, after getting past the obfuscation.
|Sample 1 - Windows||Sample 2 - Windows|
|Algorithms||Modified HC-128, Curve25519-Donna||Rabbit Cipher, Curve25519-Donna|
|Files||Generic Files||Generic Files, MBR, Boot Files|
Table 1. Ransomware sample comparison summary.
While there is a lot of overlap between HelloXD and Babuk, there are some small but crucial differences to take note of between Babuk and the two different variants.
HelloXD version 1 is the least modified, utilizing Curve25519-Donna and a modified HC-128 algorithm to encrypt file data, while also containing the same CRC hashing routine incorporating the string dong, possibly referencing Chuong Dong, who had previously analyzed and reported on the first version of Babuk (Figure 8).
The HelloXD author(s) did modify the infamous file marker and mutex however, opting for dxunmgqehhehyrhtxywuhwrvzxqrcblo as the file marker and With best wishes And good intentions… as the mutex (Figure 9).
With HelloXD version 2, the author(s) opted to alter the encryption routine, swapping out the modified HC-128 algorithm with the Rabbit symmetric cipher. Additionally, the file marker changed again, this time to what seems to be random bytes rather than a coherent string. The mutex is also modified, set to nqldslhumipyuzjnatqucmuycqkxjon in one of the samples (Figure 10).
Both versions have been compiled with the same compiler (believed to be GCC 3.x and above based on the mangling of export names), resulting in very similar exports between not only the ransomware variants, but also other malware that we have linked to the potential author (Figure 11).
The biggest difference between the versions is the interesting addition of a secondary payload embedded within version 2. This payload is encrypted using the WinCrypt API, in the same fashion as the obfuscated loader discussed above. Once decrypted, the payload is dropped to System32 with the name userlogin.exe before a service is created that points to it. userlogin.exe is then executed (Figure 12).
What is peculiar about this file is it is a variant of the open-source MicroBackdoor, a backdoor allowing an attacker to browse the file system, upload and download files, execute commands and remove itself from the system (Figure 13). As the threat actor would normally have a foothold into the network prior to ransomware deployment, it raises the question of why this backdoor is part of the ransomware execution. One possibility is that it is used to monitor ransomed systems for blue team and incident response (IR) activity, though even in that case it is unusual to see offensive tools dropped at this point in the infection.
While analyzing the ransomware binaries, we discovered a unique string prevalent in almost all of the samples: :wtfbbq (stored as UTF-16LE). Querying VirusTotal with this string led to the discovery of eight files, six of which could be directly attributed to x4k through their own VirusTotal graph mapping out their infrastructure. The discovered samples are primarily Cobalt Strike Beacons, utilizing heavy control flow obfuscation – unlike the HelloXD ransomware samples we had previously seen.
Unfortunately, this specific string is not completely unique to x4k, and is instead found on several GitHub repositories as part of a technique to allow a running executable to delete itself from disk through renaming primary data streams within the file to :wtfbbq. Running a search for the non-UTF-16LE string results in multiple files, and filtering for executables yields 10 results, the majority of which are NIM-based binaries – potentially linked to this GitHub repository.
While the :wtfbbq string is not unique to x4k, by searching for the UTF-16LE version found inside the analyzed HelloXD ransomware samples, we only came across binaries linked to x4k’s infrastructure, providing a fairly strong link between HelloXD and x4k.
The backdoor provided extremely useful insight into the potential threat actor behind the ransomware, as it had the following hardcoded IP address to use as the command and control (C2): 193[.]242[.]145[.]158. Upon navigating to this IP address, we observed an email address – tebya@poime[.]li – on the page title, the first link in the chain of attribution (Figure 14).
Using the email address as a pivot, we identified additional domains that were linked to tebya@poime[.]li.
Table 2. Domains linked to [email protected]
Some of them historically resolved to some malicious IPs, which led us to discover additional infrastructure and malware being hosted in other domains (Table 3). Many of these also use the x4k name in the domain.
|Domain||IP||First Seen||Last Seen|
Table 3. PDNS of 164[.]68[.]114[.]29 and 167[.]86[.]87[.]27
When looking at this infrastructure on VirusTotal, we observed that some of the domains we found were part of a VirusTotal graph called a.y.e/ created by the user x4k on June 30, 2021. On this graph, we found his infrastructure mapped out and malicious files that were also linked to the domains. This, however, was not the only graph we observed x4k creating. We also encountered additional graphs, mapping different things such as “Russian Hosts,” “DDoS Guard” and others, dating back to August 10, 2020 (Figure 15).
Additionally, we observed the initial email being linked to a GitHub account (Figure 16), as well as various forums including XSS, a known Russian-speaking hacking forum created to share knowledge about exploits, vulnerabilities, malware and network penetration.
From the GitHub page, we also observed a URL to a site – xn--90a5ai[.]com(фсб[.]com) – resolving to the previously mentioned IP 164[.]68[.]114[.]29, which at this point in time only shows an animation of interconnecting points. That being said, when looking at the HTML source code of the site, we discovered a couple of references to the user observed before – x4kme – and other aliases such as uKn0wn, which was observed in the HelloXD ransomware samples.
From the list of aliases used by the threat actor, we were able to observe another GitHub account with the name l4ckyguy, sharing the profile picture, location and URL in the description, with a link to the previously observed account (x4kme), and a name, Ivan Topor, which we believe may be another alias for this threat actor. A further account, l4cky-control, was also discovered. This repository contained a Python script that would decrypt a secondary Python script which reached out to the IP 167[.]86[.]87[.]27 to download and execute another Python script. This particular IP was linked to a Contabo server that x4k had also included within their VirusTotal graph discussed above.
We also found a YouTube account linked to the actor through the initial email tebya@poime[.]li, using another alias, Vanya Topor. It’s worth pointing out that “Vanya” is a diminutive for Ivan.
The YouTube account has no public videos, but we observed this threat actor sharing unlisted links in various hacking forums. The content of the videos were tutorials and walkthroughs, where the threat actor showed his methodology of performing certain actions, depending on the video. The videos had no sound, but the threat actor would type commentary on a terminal to address something the viewer was observing on screen.
The videos found gave us insight into x4k operations before moving into ransomware activity specifically. We learned how this threat actor leverages Cobalt Strike for his operations, including how to set up Beacons as well as how to send files to compromised systems. In one of the videos, we actually observed the threat actor performing a DNS leak test on his Android phone. We also got to observe how the domain фсб[.]com used to look in October 2020 – a blog of sorts titled “Ghost in the Wire.” Where the threat actor keeps alluding to his “Ghost” theme, a similar theme was observed in the HelloXD ransomware samples (Figure 19).
In another video instance, we observed the threat actor submit a LockBit 2.0 sample on Cuckoo sandbox and compare the results with another presumably LockBit 2.0 sample prior to the one submitted in the video. At the time of writing, we don’t believe x4k is related to LockBit 2.0 activity, but we did find the choice of this particular ransomware family interesting (Figure 20). We also noticed this threat actor leveraging the use of other sandboxes besides Cuckoo – such as ANY.RUN and Hybrid Analysis – to test out verdicts and tooling, alongside the use of various virtual machines.
Additionally, this threat actor not only leverages open-source tooling, but also develops his own tools and scripts. We were able to see this threat actor demonstrating some of his tools performing automated actions in his videos, such as obfuscating files, creating executables and code signing (Figure 21).
Taking a closer look at x4k’s main OS, we believe it to be a customized Kali Linux instance, tailored to his needs. Most of his videos, comments, configurations and tutorials are written in Russian – and when combined with knowledge gained from a few OPSEC mistakes – Russia is also where we believe x4k originates from. Additionally, we encountered the ClamAV logo during one of the threat actor walkthrough videos – the same logo used on the HelloXD ransomware samples (Figure 22). This time around, x4k is using the logo as the start menu for his OS enviorment.
On the same taskbar, we also noticed the Telegram icon, which is a very popular messaging app for chatting – but is also used by threat actors such as LAPSUS$ to post news into specific channels. Using his username and alias and pivot, we were able to identify two Telegram accounts sharing the same picture as observed before, and descriptions pointing to the threat actor’s main site фсб[.]com. We noticed that the x4k Telegram account is used actively versus the old account – which, according to Telegram, hasn’t been active in a while (Figure 23).
x4k has a very solid online presence, which has enabled us to uncover much of his activity in these last two years. This threat actor has done little to hide malicious activity, and is probably going to continue this behavior.
Unit 42 research encountered HelloXD, a ransomware family in its initial stages – but already intending to impact organizations. While the ransomware functionality is nothing new, during our research, following the lines, we found out the ransomware is most likely developed by a threat actor named x4k. This threat actor is well known on various hacking forums, and seems to be of Russian origin. Unit 42 was able to uncover additional x4k activity being linked to malicious infrastructure, and additional malware besides the initial ransomware sample, going back to 2020.
Ransomware is a lucrative operation if done correctly. Unit 42 has observed ransom demands and average payments going up in the latest Ransomware Threat Report. Unit 42 believes that x4k, this threat actor, is now expanding into the ransomware business to capitalize on some of the gains other ransomware groups are making.
Palo Alto Networks detects and prevents HelloXD and x4k activity in the following ways:
- WildFire: All known samples are identified as malware.
- Cortex XDR with:
- Indicators for HelloXD.
- Anti-Ransomware Module to detect HelloXD encryption behaviors on Windows.
- Local Analysis detection for HelloXD binaries on Windows.
- Behavioral Threat Protection rule prevents Ransomware activity on Linux.
- Next-Generation Firewalls: DNS Signatures detect the known C2 domains, which are also categorized as malware in the Advanced URL Filtering database.
If you think you may have been compromised or have an urgent matter, get in touch with the Unit 42 Incident Response team or call:
- North America Toll-Free: 866.486.4842 (866.4.UNIT42)
- EMEA: +31.20.299.3130
- APAC: +65.6983.8730
- Japan: +81.50.1790.0200
Palo Alto Networks has shared these findings, including file samples and indicators of compromise, with our fellow Cyber Threat Alliance members. CTA members use this intelligence to rapidly deploy protections to their customers and to systematically disrupt malicious cyber actors. Learn more about the Cyber Threat Alliance.
HelloXD Ransomware samples
Malware linked to x4k infrastructure | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100172.28/warc/CC-MAIN-20231130062948-20231130092948-00512.warc.gz | CC-MAIN-2023-50 | 19,531 | 83 |
https://pidio.nl/about/ | code | I’m Petie alias Pidio, a dutch freelance visual designer that creates visuals for the web and print.
I help you to communicate your business in a visual fun and engaging way!
Let’s make your creative project come to life!
Visual illustrations explain a product, service or story in a clean way.
Social media content, merchandise or corporate design explain your story in a clean way.
Animations alias motion design explain a product, service or story in a clean way. | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487622234.42/warc/CC-MAIN-20210616063154-20210616093154-00550.warc.gz | CC-MAIN-2021-25 | 470 | 6 |
http://lucasforums.com/showpost.php?p=2337399&postcount=9 | code | I've decided that I'll release separate tools for extracting stuff from the gamedata instead of building a big extractor and work on it forever before releasing a stable version of it. This way people will be able to extract the things they want (e.g. music) without having to wait a huge amount of time only because something is not working properly with, for example, subtitles overriding.
Then when the big part is done, the tools will be merged within a single application (it will be a matter of merging ui's more than other).
At the moment, I'm learning Qt (4.3.0) for the GUI. When I'll be ready for a first release, I will open a sourceforge project page with all the sources and complete documentation. Currently I'm working under Linux so I guess I'll need some time for debugging under WinXP (where I already spotted troubles with read(2)).
I will update the progress here for those of you who are interested in this. | s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824226.33/warc/CC-MAIN-20160723071024-00302-ip-10-185-27-174.ec2.internal.warc.gz | CC-MAIN-2016-30 | 928 | 4 |
https://www.hackster.io/news/adafruit-launches-stm32f405-feather-express-its-fastest-circuitpython-dev-board-yet-cc0218fff549 | code | Adafruit has begun sales of its fastest CircuitPython-compatible development board yet, the Adafruit STM32F405 Feather Express which runs the popular programming environment at 168MHz.
Unveiled earlier this month and now on sale both through Adafruit itself and its international reseller community, the Adafruit STM32F405 Feather Express takes the breadboard-friendly Feather form factor and adds an STMicroelectronics STM32F405 32-bit Arm Cortex-M4 processor running at 168MHz, 1MB of flash memory, a 2MB SPI flash module, on-board NeoPixel indicator, and a Qwiiic/STEMMA-QT compatible connector for solderless hardware interfacing over I2C.
The Feather board breaks out the STM32F405's various pins, including I2C, UART, analogue-to-digital converters (ADCs), digital-to-analogue converters (DACs), and general-purpose input/output (GPIO), all of which use 3.3V logic but are 5V-safe. In another departure from the norm, the board also uses USB Type-C for data and power — making it the first Adafruit Feather board to make the switch - while a microSD socket with SDIO compatibility is included at the bottom as well as a connector and integrated charging circuitry for an optional lithium-polymer battery.
There are a handful of caveats to use of the new board, however. The CircuitPython port is under active development, and cannot yet support DisplayIO or SDIO SD cards; the board can be programmed using the Arduino IDE, but lacks an auto-reset bootloader necessitating manual boot-mode toggling and resetting; and while the board boasts "very solid" MicroPython support, Adafruit doesn't provide compatible sensor libraries.
Hardware compatibility with Adafruit's FeatherWings add-ons, meanwhile, is claimed to be good — only the RFM69/RFM9x libraries failed to operate.
More information on the board can be found on Adafruit's learning portal. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506686.80/warc/CC-MAIN-20230925051501-20230925081501-00087.warc.gz | CC-MAIN-2023-40 | 1,858 | 6 |
https://www.techspot.com/community/topics/help-me-out-guys.42655/ | code | Hey everyone. My first post here. Look like a great forum with nice people. I got a little problem. When I'm scrolling down, there is lines everywhere on the screen. I'm running on XP, with a radeon 9600. This problem began 2 months ago and when it started, it was only some lines. Right now, this is serious(like you can see...) I reinstalled my video card drivers and there is no difference. Can someone tell me whats going on. Thank you! | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886758.34/warc/CC-MAIN-20180116224019-20180117004019-00237.warc.gz | CC-MAIN-2018-05 | 440 | 1 |
https://ourcryptotalk.com/blog/akt/ | code | $AKT: An Introduction
Akash Network markets itself as the supercloud of the people. If someone is unaware of what a supercloud is, think of it as a cloud architecture which allows service migration as service.
To the layman – Akash network allows you to buy, own and even sell your cloud infrastructure to other people. Somewhat like a decentralised cloud infra of sorts.
What makes $AKT unique is the fact that they work on a “Reverse auction” mechanism where the users actually submit their desired price and the providers submit bids to compete for their business. This results in a whopping 85% decrease on usual prices.
Akash Network: Some Unique Points
One of the most unique points about $AKT is the fact that the source code is open-source and is completely owned by the community. In today’s day and age with cloud providers, that is a very unique proposition to find.
Other features of the Akash Network include –
- Infrastructure as Code: Akash’s orchestration layer is powered by SDL. This simple-to-use YAML-based language lets developers spin instances easily without wasting any time.
- Runs on K8S: It runs on the state of the art Kubernetes technology that all deveopers already love.
- Limitless Storage: The network provides persistent and limitless storage.
- Censorship Resistant
- Dedicated fixed IPs: There is a provision for you to have fixed IPs for your services.
All in all, Akash network is an L1 network build on the cosmos SDK which uses a PoS mechanism to keep its blockchain validated and in sync.
Akash Network: Some Features
The Akash Marketplace
The Akash Marketplace serves as a platform where users rent computing resources from cloud providers prior to deploying a Docker container on the Akash Container Platform. Utilizing the Akash Token ($AKT), the marketplace securely records on-chain information, including requests, bids, leases, and settlement payments. Akash’s blockchain is a Tendermint-based application rooted in the Cosmos SDK.
The Akash Container Platform
The Akash Container Platform functions as a deployment platform designed to host and manage containers, providing users with the capability to run any Cloud-Native application. Akash is equipped with a suite of cloud management services, incorporating Kubernetes, to efficiently orchestrate and manage containers.
The price comparisons done on the cloudmos.io tool show that $AKT services cost us around 80-85% cheaper than the usual cloud giants like AWS, GCP or Azure.
The $AKT token and tokenomics
The $AKT (Akash Network Token) is the native utility token of the Akash network. $AKT is primarily used to incentivize the participants of the PoS mechanism and keep the blockchain governed.
$AKT holders also are participants in any aspect of business decisions since Akash network is community owned.
AKT 2.0 represents an ongoing initiative aimed at introducing innovative token features and enhancing the utility of both Akash and the AKT token. These features are designed to create value for the network through the establishment of essential incentive pools, fostering the growth and development of the network. Additionally, AKT 2.0 will provide a diverse array of currency options for lease settlement and other exciting enhancements.
The tokenomics of the project at the time of writing (22 Jan 2024) are :
Circulating Supply: 225,800,857
Max Supply: 388,539,008
The $AKT unlock schedule has already been released by the team and can be found here.
Conclusion and last words
As a software engineer by work, I really am impressed by Akash Network’s documentation and working. It is a very strong project which solves a very real problem.
Investment in the project is a personal choice, but from a fundamental perspective, the Akash project has impressed me. If the Akash team continues their efforts, the future appears promising amidst growing demand for cloud resources. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474808.39/warc/CC-MAIN-20240229103115-20240229133115-00759.warc.gz | CC-MAIN-2024-10 | 3,906 | 30 |
http://iphone-prem30488.blogspot.com/2010/05/your-first-iphone-application.html | code | In this tutorial I will walk to you through creating a simple “Hello World” application using a UITableView for the iPhone. There are many ways that a Hello World program could be made on the iPhone, I am going to show you the simplest. This tutorial assumes you have a basic understanding of Objective-C. Apple has provided a very simple and straight forward tutorial on Objective-C. You can find it here.
Creating a New Navigation-Based Application
Start a new iPhone OS Project
Click Xcode > New Project and a window should pop up like this:
Make sure Application is selected under iPhone OS and then select Navigation-Based Application. Click Choose… It will ask you to name your project. Type in “Hello World” and let’s get started.
Learn About the Default Files
What is all this stuff?
There are quite a few files that get added to your project. At first glance, this looks kind of intimidating. Don’t worry, we only need to edit one of them. Here is a quick explanation of the different files. You don’t have to read this part but having this many files is what confused me the most when I started developing for the iPhone.
CoreGraphics.framework, Foundation.framwork, UIKit.framework – You guessed it, this is a set of library functions provided by Apple that we use in our application. We use these as includes similar to any other language that includes library functions.
HelloWorld.app – This is your app that gets installed on the iPhone. We don’t really need to worry about this right now
Hello_World_Prefix.pch – This is another include file that gets compiled separately from your other files so you don’t need to include it on each file. It contains some code to include the data inside the frameworks.
Hello_WorldAppDelegate.h – This is a header file that contains all of our definitions for variables that we will be using. It’s very similar to a header file in C or C++;
Hello_WorldAppDelegate.m – All of the magic starts here. Consider this file our starting point for execution. The main.m file invokes this object.
Info.plist – This contains various meta information about your program. You won’t really need to edit this until you are ready to start testing on the iPhone
main.m – Like most programming language, this file contains our main function. This is where execution begins. The main function basically instantiates our object and starts the program. You shouldn’t need to edit this file.
MainWindow.xib – This contains the visual information of our main window. If you double click on it, it will open in a program called “Interface Builder”. We will get to this a little later. Just on thing to note is this file does not contain any code.
RootViewController.h, RootViewController.m - These are files for a view controller that gets added to our main window. Basically, Apple has already created a simple interface when you clicked on Navigation-Based Application. Since most navigation-based applications use a Table View, Apple has provided it for us to use.
RootViewController.xib – This is a view that Apple has provided that emulates a table. It has rows and columns. We will be displaying our “Hello World” text inside one of these rows
Now, all of these files together create a basic program. Go ahead and click on the Build and Go button at the top of Xcode. Make sure the drop-down on the top left says Simulator | Debug, this tells Xcode that we are testing on the iPhone simulator.
You will see the iPhone simulator start and your program will launch. It’s not very interesting at the moment. All it shows is the Table View that Apple has added for us. So what we are going to do is add a row to this table view.
Update the UITableView Cells to Display “Hello World” Text
Let’s write some code
Start by opening RootViewController.m. This is the view controller that Apple added to our main view. All of the functions you see already created in here are functions that have been overridden from the Table View super class. Since we are editing a table, all of these functions will be related to editing a table. So find the function called numberOfRowsInSection.
This function tells the application how many rows are in our table. Currently, it returns 0. Let’s change that to return 1. This will tell the application that we want 1 row in our table. Now go down to the function called cellForRowAtIndexPath. This function gets called once for every row. This is where we define what content to display in a given row. In this case we want the row to be a string that says “Hello World”.
What this function is doing is creating a new cell object and returning it. The code between the i(cell==null) block checks to see if we have created a cell before, if not build a new cell, otherwise use the one we created before. This helps in performance so we don’t need to build new cells each time we visit this function. So right before the // Set up the cell comment add the following code:
[cell setText:@"Hello World"];
We are basically calling the setText method of the cell object and pass in the string “Hello World”. As you should know from reading Apples Objective-C overview, strings begin with an “@” symbol.
That’s it! Click the Build and Go button again to launch the iPhone simulator. You should now see a screen like this:
You can now use this code as a base for creating a Navigation Based application. In a later tutorial, I will detail how to populate this table view with an array of strings to create navigation for a simple program. If you get lost at any time, you can download the sample code for this program here hello-world. I hope you enjoyed the tutorial and if you have any questions, feel free to leave them in the comments. Happy Xcoding! | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027316021.66/warc/CC-MAIN-20190821131745-20190821153745-00242.warc.gz | CC-MAIN-2019-35 | 5,785 | 29 |
https://community.filemaker.com/thread/66144 | code | I'm new to FileMaker Pro and I am building a database that will have three drop down list to choose from in my app.
I am trying to figure out to have my drop down display options based on what was chosen in the first category.
An example is I am building a photo location database and drop down one is Main Category. Inside the main category there are about 30 sub categories to choose from and then each of those folders have third tear options.
I'm trying to tell my application if Main Category Vacation is selected in drop down one then only show me the sub categories for this Folder. And then if I dig into that Sub Folder one I get beaches.
Hope this isn't to crazy but what I've done is created drop down list for each main category and for each sub category. I thinking I could just setup a relationship between the options but since they are not tables I wasn't able to do this.
I also found there is a scripting option but when I go to choose from the list I don't see my full list of drop down options, only the fields that on my current page like Username, Password,etc.
Any help would be awesome. I've picked this project up and put it down many times over the course of the year and I'm just going to gut it out to finish the project. | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676596542.97/warc/CC-MAIN-20180723145409-20180723165409-00149.warc.gz | CC-MAIN-2018-30 | 1,249 | 7 |
https://serverfault.com/questions/694087/mounting-encrypted-samba-share-linux-server-client | code | I'm trying to set up encrypted samba access. In order to achieve that I've added 2 lines to
[global] scope in smb.conf:
server signing = mandatory smb encrypt = mandatory
But unfortunately I can't mount samba shares now anywhere. I've tried with Dolphin under KDE and using mount -t cifs, even tried smbclient command line. I'm getting following errors:
Unknown error condition in stat: Software caused connection abort
mount error(13): Permission denied
Error returning browse list: NT_STATUS_CONNECTION_DISCONNECTED
how to properly enforce encryption and mount it on linux machine? Windows would be nice as well but I've read that this encryption method is not supported there yet.
I have samba 4.1 on client and 3.6 on server (OpenSUSE / Debian) but tried also looped connection on SUSE 4.1 <> 4.1 with the same result. | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347405558.19/warc/CC-MAIN-20200529152159-20200529182159-00252.warc.gz | CC-MAIN-2020-24 | 822 | 9 |
https://links.biapy.com/?searchtags=freelance | code | Amazon Mechanical Turk (MTurk) is a crowdsourcing marketplace that makes it easier for individuals and businesses to outsource their processes and jobs to a distributed workforce who can perform these tasks virtually. This could include anything from conducting simple data validation and research to more subjective tasks like survey participation, content moderation, and more. MTurk enables companies to harness the collective intelligence, skills, and insights from a global workforce to streamline business processes, augment data collection and analysis, and accelerate machine learning development.
A Marketplace for Pull Requests
CodeMill makes it dead simple to get your software development done by members of the GitHub community.
No interviews, no contracts, no hassle.
Pay only for satisfactory delivery. Seemlessly integrated into your GitHub workflow.
5293 links, including 1 private | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506339.10/warc/CC-MAIN-20230922070214-20230922100214-00252.warc.gz | CC-MAIN-2023-40 | 898 | 6 |
https://community.toradex.com/t/trying-to-use-debug-serial-port-leads-to-board-shutdown/19290 | code | I use a Verdin development board with IMX8MMDL 1GB IT.
The board seems to start correctly when I plug the power, but if I plug a USB-C cable in X66 to get Debug serial line, the board stops as soon as some software opens the /dev/ttyUSB0 device (tested with gtkterm and minicom).
In fact when starting the software all leds turn off except +V5 STB and debug leds.
Do all the LED’s next to the ON/OFF button light up?
How are you powering the board (voltage and intensity)
Do the Tx and Rx LEDS flash when you reset the board?
Is the JP30 in the 1-2 position (1.8V DBG)?
Have you tried using another USB cable? Or have tried the same USB cable with another device to rule out the possibility of a defective cable?
Have you tried with another module? (if you have more than one)
thanks for the pointer. Nevertheless it’s quite unusual, as with most boards /dev/ttyUSB0 is the serial line for debug, so it’s easy to generate a reset if we don’t find this article.
For me I’m know aware of the solution. | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654016.91/warc/CC-MAIN-20230607211505-20230608001505-00077.warc.gz | CC-MAIN-2023-23 | 1,009 | 11 |
https://mangolassi.it/tags/operating%20system | code | So the disadvantage to choose LINUX is based on the drivers for different devices that you will use
That's incorrect. Linux has much broader driver support than Windows, and both have much broader support than MacOS. Support for more hardware is actually a huge benefit to Linux. That's why Linux and BSD are available on more platforms than any other OS. | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00015.warc.gz | CC-MAIN-2022-33 | 355 | 2 |
http://sourceforge.net/p/pingpong-abc/discussion/303226/thread/774fb2c7 | code | - Added in TheSHAD0W's fix for external_connection_made not being updated properly (which means no more hack for determining blue/green status)
- The installer is built using win32all extensions (which means getfreespace should be more efficient and upnp should actually work) This also means the installer is about 0.5 MB larger, but you win some and you lose some, I suppose)
If you get an error about mfc71.dll being missing, you can download it from (just put it in your windows\system32 directory):
I could bundle it with the installer, but I really don't want to bump the size of the installer up by another meg.
- the options for upnp now only show up if the win32all extensions are present -- there really isn't much point in giving the option if the BitTornado core doesn't support upnp without them
- a few more fixes to the code to update the network info screen
- took out the win32 specific "feature" of selecting the first file/directory when choosing "open destination" (it seemed like a nice idea at the time, but it also seems that there's been more complaints than positive feedback about it since it was introduced)
That's about all I can think about for the moment.
this version is very unstable on my system. I keep getting random crashes, last one was when I stopped a torrent. So I'm going back to the previous testversion (22/10/05)
If you've got a chance, could you try to see if either of these make a big difference in stability:
(No win32 extensions):
(No win32 extensions and almost all changes to BitTornado core backed out):
well, I tried the B and C versions and they did fine. Then I reinstalled the A version and that's been doing fine too so far. So I may have been giving out a false alarm, maybe something went wrong during installing the A version the first time
Under linux if I go file preferences the result is as follows.
Traceback (most recent call last):
File "/home/marc/Desktop/3.1.1/ABC/Actions/other.py", line 172, in action
dialog = ABCOptionDialog(self.utility.frame)
File "/home/marc/Desktop/3.1.1/Dialogs/abcoption.py", line 1401, in __init__
self.miscPanel = MiscPanel(self.splitter, self)
File "/home/marc/Desktop/3.1.1/Dialogs/abcoption.py", line 453, in __init__
self.language_choice = wx.ComboBox(self, -1, "", wx.Point(-1, -1), wx.Size(-1, -1), self.language_names, wx.CB_DROPDOWN|wx.CB_READONLY)
File "/usr/lib/python2.4/site-packages/wx-2.6-gtk2-unicode/wx/_controls.py", line 581, in __init__
newobj = _controls_.new_ComboBox(*args, **kwargs)
UnicodeDecodeError: 'utf8' codec can't decode bytes in position 4-6: invalid data
If I try to enable the web interface I get a segmentation fault.
(python:13852): GLib-GObject-CRITICAL **: g_object_ref: assertion `G_IS_OBJECT (object)' failed
Those are 2 bugs I"ve found so far.
well seems to work on linux, i can add torrents, i still get that error mentioned earlier on when i try to open perefrence dialog, i tried to start webinterface, i dont get an error, but i get a a freeze, window just freezes. i could only try http://pingpong-abc.sourceforge.net/test/ABC-win32-vtest-10232005.zip <<< version. the last two mentioned were only .exe files for windows.
I notice a bug. here is probably how to reproduce it.
Start a torrent.
Set Local Settings (example : 3kb/s upload, no timeout..etc)
What happened is that your local settings don't work anymore. or ABC doesn't remember the local settings you set. For example : I set 3kb/s upload. After I stop and resume torrent, the upload went up to as much as my ISP upload limit which is 30kb/s.
Was just about to post an updated build and then I saw this -- didn't take long to realize what the problem was. I just needed to cache the last value that the rate was set to in a different place.
I'll upload the new build within the next few minutes. | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701543416/warc/CC-MAIN-20130516105223-00031-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 3,801 | 34 |
https://hub.mender.io/t/changing-device-deployment-status-without-checking-for-update-first/2098 | code | This might not be a typical flow, but I’m trying to change a device deployment status without checking for an update. This device has all of the required information to change the status (deployment id and auth token) but it returns an error in the request. However, as soon as I checked for an update the device then showed up in the deployment as pending and then allowed to change the status.
My question is, is it required to check for an update first before being able to update device deployment status even if you have the correct deployment ID? It seems like the first step is an update check and the server won’t recognize the device until that update check happens. | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657147031.78/warc/CC-MAIN-20200713225620-20200714015620-00026.warc.gz | CC-MAIN-2020-29 | 679 | 2 |
http://www.aplikasijavagratis.com/java-software-development-services/ | code | Java Software Development Services
Java is a programming language and this language derives much of its syntax from C and C++ but has a simpler object model and fewer low-level facilities. Java applications are typically compiled to byte code that can run on any Java virtual machine (JVM) regardless of computer architecture whereas Radix is not lagged behind for this language implementation to the related fields. Services of Radix in Java consulting and software development are outstanding to suffice multipurpose needs of its clients. Radix provides outsourcing service with full support at every stage of projects from architecture to implementation. Java technology has been developed at Radix in an outstanding fashion where the expert professionals can produce concerned development system of problem free coding.
Java Feature at Radix
Java software has been developed at Radix for heterogeneous purpose of using active web applications. Java has been used for various application servers and web-containers.
All kinds of Java applications are developed here at Radix based on Struts/JSTL and Velocity. The usage of this kind of technological extravaganza enables avoiding excessive reliance on java-code in JSP pages and to separate business logic from the presentation level. J2ME is being used in a striking way to meet expected orientation in its development however; this platform provides a convenient and flexible environment for applications running on hand held devices such as mobile phones or PDAs.
In addition, some of extra-ordinary features in this regards are to be quoted herewith
WDSL, UDDI, SOAP, ebXML, development on J2EE-compliant application servers, including BEA WebLogic and IBM WebSphere, B2B Integration (ebXML, SOAP), Expert knowledge on Entity, Session and Message Beans, JSP & Servlets, JMS, Web services.
Key Notes of Java at Radix
Accuracy comes from matured experience and it impacts on the future technological might. Certain hazards of Java often pull back to have any forward steps. Source code of experienced professionals in Java Applications can reduce often occurred speed problem. Radix maintains the deployment issues in the final stage of project delivery that can reduce certain hurdles. Radix is in the development of all Java web applications on advanced technology of Struts/JSTL and Velocity. The usage of this technology can avoid excessive reliance on java-code in JSP pages and it can simply separate business logic from the presentation level.
If you would like to know more about Radix then visit their website: http://rndinfo.com/java-software-application-development.html You can also contact by Email â SalesATradixweb.com or Call on +1(405) 796-4103, +1(775) 890-1396. | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704368465/warc/CC-MAIN-20130516113928-00070-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 2,736 | 10 |
http://freecode.com/tags/code-analysis?page=1&sort=popularity&with=&without=4545 | code | CodeQuery is a tool for indexing and then querying or searching C, C++, Java, Python, Ruby, and Go source code. It builds upon the databases of cscope and ctags, which are processed by the cqmakedb tool to generate a CodeQuery database file. This can be viewed and queried with a GUI tool. The features include auto-completion of search terms and visualization of function call graphs and class inheritance. The following queries can be made: Symbol, Function or macro, Class or struct, Functions calling this function, Functions called by this function, Class which owns this member or method, Members and methods of this class, Parent of this class (inheritance), Children of this class (inheritance), Files including this file, and Full path for file.
xRecurseDiff is a small program that can rapidly traverse entire directory trees to show the differences between different copies of the same file. It can be useful for code analysis, expecially for collaborative development. For example, it can analyze differences before a CVS/SVN submission or to resolve a conflict in concurrent editing.
pycdep is a tool for analyzing and visualizing C/C++ header file dependencies. A script extracts information about your code and dumps it in a Prolog database, which is used to query the dependency graph. It comes with a large number of predefined queries for finding out which files include or depend on which other files, how files depend on another file, circular dependencies, transitively implied dependencies, and design rule checks (limitations on which project can include from which other project). Visualization is supported by dumping graphs to .dot files. It also has the beginnings of a natural language interface.
SCC is a cross-platform tool that counts the number of lines in source code files. It features a GUI that gives the user complete control over which files are processed. Blank lines are counted separately from lines containing source code statements. Configurable regular expressions can be applied to count parts of source code files separately. Regular expressions are applied according to a file type rather than to all files. It can process any textual source code file, includingJava, C/C++/C#, Perl, Python, PHP, Ruby, and TCL. The line count is split between blank, counted, and remaining lines. Results and summaries can be exported to a CSV file for further processing.
Squale (Software QUALity Enhancement) provides models and associated tools to assess software quality and help improve it over time. Its models and tools know how to aggregate raw quality information (such as metrics) given by third party technologies into high-level factors, offer dashboards which present those factors and allow digging deeply into the code quality, show the evolution of quality over time, and give economical indicators about the return on investment of quality efforts. | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120206.98/warc/CC-MAIN-20170423031200-00189-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 2,896 | 5 |
https://www.w3.org/wiki/WD-css3-ui-20150224-value-choices | code | This is an archive page for the ::value and ::choices pseudo-elements and related aspects. Spec source markup is included here (direct cut/paste) from the CSS3-UI editor's draft that was last published in http://www.w3.org/TR/2015/WD-css3-ui-20150224/
from class='metadata' section:
At Risk: ::value ::choices pseudo-elements
from Introduction section:
This module describes selectors and CSS properties which enable authors to style user interface related states, element fragments, properties and values.
introduced several user interface related pseudo-classes, properties and values. <a href="http://www.w3.org/TR/css3-selectors/#UIstates">Section 6.6.4 of Selectors</a> [[!SELECT]] also describes several additional user interface related pseudo-classes (and one pseudo-element).
This Working Draft incorporates and extends them to provide the ability, through CSS, to style elements based upon additional user interface states, to style fragments of user interface elements, and to alter the dynamic presentation of elements in ways previously only available through specific HTML elements and attributes.
from heading level 2 section User Interface Selectors:
<h2 id="selectors">User Interface Selectors</h2> <h3 id="pseudo-elements">User interface element fragments: pseudo-elements</h3> This specification introduces two new pseudo-elements to provide access to additional user interface element fragments. <ul> <li>::value <li>::choices </ul> Note: The ::value and ::choices pseudo-elements are at risk. <h4 id="pseudo-value">::value</h4> A form element may contain both a label for its data value, and the data value itself. For such elements, the ::value pseudo-element selects the representation of just the data value itself, in order to style its appearance. The ''::value'' pseudo-element is similar to an inline-level element, but with certain restrictions. The following properties apply to ''::value'' pseudo-element: font properties, color property, background properties, 'word-spacing', 'letter-spacing', 'text-decoration', 'vertical-align', 'text-transform', 'line-height'. UAs may apply other properties as well. <h4 id="pseudo-choices">::choices</h4> Similarly, a form element which represents a list of options may contain both a label for the list, and the list of choices itself. For such elements, the ''::choices'' pseudo-element selects the representation of just the list of choices themselves, in order to style their appearance. A list of radio buttons can also be selected with the ''::choices'' pseudo-element, and the currently chosen radio button can be selected with the ''::value'' pseudo-element.
from heading level 3 section List of substantial changes:
<li><css>::value</css> pseudo-element. Added detail about which properties apply to the ::value pseudo-element.
- return to Tantek | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337415.12/warc/CC-MAIN-20221003101805-20221003131805-00354.warc.gz | CC-MAIN-2022-40 | 2,826 | 12 |
https://groups.yahoo.com/neo/groups/vim/conversations/messages/19279 | code | - Jul 2, 2001Is there any command like :put that will work on a variable instead of a
I want to do something like:
:let g:foo="Some String"
but :put only works with registers, and I dont feel like using a register
for this purpose.
is there anything I can do to insert the text from a global variable into
the text I'm editing?
Thanks again guys!!
- Next post in topic >> | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644065954.23/warc/CC-MAIN-20150827025425-00323-ip-10-171-96-226.ec2.internal.warc.gz | CC-MAIN-2015-35 | 371 | 9 |
http://gostartups.in/startup-companies/19662/corri-nikkie | code | Each time a pc is related to your router, or turned on, the router assigns it a neighborhood IP deal with. Should you plan to additionally play Minecraft on the identical laptop that the server is on, I like to recommend having 4 GB of RAM at a minimal and a reasonably new processor and graphics card. With more than 68 million players, Minecraft remains certainly one of the preferred video video games on this planet. It's possible you'll pref...
Service /Product types | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104683020.92/warc/CC-MAIN-20220707002618-20220707032618-00507.warc.gz | CC-MAIN-2022-27 | 472 | 2 |
https://federalistapp.18f.gov/ | code | This is a U.S. government service. Your use indicates your consent to monitoring, recording, and no expectation of privacy. Misuse is subject to criminal and civil penalties. Read more details.
Federalist users are authenticated with GitHub OAuth .
If your office uses Federalist, ask your team’s primary contact to send an email to [email protected] with the GitHub usernames that need access. | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487634616.65/warc/CC-MAIN-20210618013013-20210618043013-00538.warc.gz | CC-MAIN-2021-25 | 409 | 3 |
http://adpluscommunications.blogspot.com/2011/02/billboard-graffiti.html | code | I only support it if it's done for the lulz. If someone does it just to piss people off or to censor an advertisement they don't agree with, it's fucking stupid.
I am mixed on my opinion. There are many good ad's I have seen and others that are pretty bad.
It really depends, cooperlife has some great thoughts on the matter. | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590314.29/warc/CC-MAIN-20180718174111-20180718194111-00562.warc.gz | CC-MAIN-2018-30 | 325 | 3 |
https://jitendex.org/pages/downloads.html | code | Jitendex for Yomitan and import it into Yomitan. You do not need to unzip the file.
You can customize the appearance of Jitendex. Example customizations are provided in the GitHub wiki.
Jitendex for MDict and unzip the file. Move the extracted folder to a location where your dictionary client can find the data.
I recommend using GoldenDict-ng on desktop platforms (Windows/MacOS/Linux). It is free, open source, and actively developed.
If you find any errors or incorrect information in the dictionary data, please feel free to report them in the GitHub discussions forum.
If Jitendex is useful for you, please consider giving the project a star on GitHub.
You can also support Jitendex and my contributions to free language learning on Patreon.
Jitendex for Yomitan
v4.7 ・ 2024-04-21 ・ 27.9 MB
Jitendex for MDict
v4.7 ・ 2024-04-21 ・ 87.3 MB | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818468.34/warc/CC-MAIN-20240423064231-20240423094231-00521.warc.gz | CC-MAIN-2024-18 | 851 | 11 |
https://anywhere.epam.com/en/vacancy/devops-engineer-with-azure-for-an-information-services-company-blt18fb4551cd3778bc | code | devops engineer with azure for an information services company
Currently we are looking for a remote DevOps Engineer with Azure for an information services company for our team.
The customer is a global leader in information services and solutions for professionals in the health, tax and accounting, risk and compliance, finance and legal sectors. It helps their customers make critical decisions every day by providing expert solutions that combine deep domain knowledge with specialized technology and services.
We are looking for a DevOps engineer with knowledge and hands-on experience with Azure who is ready to join the team. Team will be responsible for the migration on of the critical product for client business from on-premises to Azure.
- to support project’s running in Azure (now it is written in Java EE and hosted as on-premises);
- to write scripts to be able to run application in Azure with Docker and Kubernetes;
- to develop IaC,
- to support releases in Azure for the application;
- to collaborate with development team and other teams IT/System team, DBA on customer's side.
- 6+ months of relevant experience.
- Experience with:
- Azure, Azure DevOps,
- English level proficiency B1
- Knowledge of:
- Team city,
- IaC (Infrastructure as Code)
- Tech stack.
looking for something else?
Find a vacancy that works for you. Send us your CV to receive a personalized offer. | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499888.62/warc/CC-MAIN-20230131154832-20230131184832-00640.warc.gz | CC-MAIN-2023-06 | 1,395 | 19 |
https://cams4me.com/asian-sex-cam-misinshyna/ | code | I am an open-minded girl. Love to do programming, specially construct models for GameDev, and watch animes in free time. Use to wear many hats. I would love to discuss philosophical questions and space. But you can also chat with me about sexy things. I have always time to discover new things. Come to my sexy room and introduce yourself to me. If you are not a member yet, you can get a free account in my room and we can take it from there. Online sex with a nice Asian girl, put it on your to-do list! | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362930.53/warc/CC-MAIN-20211204033320-20211204063320-00514.warc.gz | CC-MAIN-2021-49 | 505 | 1 |
http://procworld.blogspot.com/2016/08/system-integration.html | code | This integration is subtle. There are no giant turtle mountains here, but the same system we used for the giant turtle is applied here to produce the natural rock pillars that are connected by the bridges, also the platform where the pyramid rests:
These natural structures are defined by a low resolution mesh that captures the basic shape. This is expanded in realtime into detailed features like rocks, sand and dirt using procedural materials that we call Meta-materials.
The large terrain around the pillars and the pyramid's base is using Voxel Farm's standard procedural terrain.
This scene also uses UV-mapped voxels. This is a different method to apply textures to voxels. It allows much finer control. The entire pyramid is using them:
There is also the new instancing system, which is responsible for all the trees plants and rocks you see scattered around. You cannot see this in just screenshots, but this new system is able to preserve existing instances even in the event of user edits and destruction. This avoid the visible "replanting" of vegetation and rocks around edits.
And all this is running in Unreal Engine 4. I would say the UE4 integration is the last of the systems than went into taking these shots. | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125881.93/warc/CC-MAIN-20170423031205-00594-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 1,229 | 6 |
https://stackshare.io/homeactions/homeactions | code | Programmer happiness ... duh!
We're a full-stack Rails shop.
Phenomenal tool for API development.
It's Github ... it's awesome.
We use Rackspace for our CDN for all assets.
RDBM and Document storage combined with good performance makes this a must-have for HomeActions.
Not the biggest fan but it's easy to use and integrate into Airbrake.
DO runs our hardware.
We send all emails via Mailgun (and we're an email sending company) | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376830305.92/warc/CC-MAIN-20181219005231-20181219031212-00043.warc.gz | CC-MAIN-2018-51 | 429 | 9 |
http://takeafunbreak.blogspot.com/2012/01/alan-wake-comes-in-february.html | code | For now there's no price, only screenshots
• OS: Windows Vista or Windows 7 (there's a big chance of supporting XP SP2)
• PROCESSOR: A dual core processor is required:
AMD: Athlon X2 2.8GHz
Intel: Core 2 Duo 2GHz
• MEMORY: 2 GB
• HARD DRIVE: 8 GB
• VIDEO CARD: DirectX 10 compatible or later with 512MB RAM
AMD: ATI Radeon 3650, 4450, 5550, 6450 or higher (per series)
NVIDIA: GeForce 8600GT, 9500GT, GT120, GT430, GT520 (per series)
• SOUND CARD: DirectX 9.0c compatible
• INPUT: Mouse and keyboard, Xbox360 controller also supported
Of course, for better performance Remedy reccomend up-to-date Quad-core CPU and VGA with arround 2k points in 3DMark Graphics Score.
Anyways, if you need more info, you can read their FAQ. | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590443.0/warc/CC-MAIN-20180719012155-20180719032155-00274.warc.gz | CC-MAIN-2018-30 | 737 | 14 |
https://www.frgconsulting.com/job/E28324JS/azure-cloud-platform-engineer | code | We are at the forefront of leveraging the latest technologies to build innovative solutions that drive our product applications forward. Our dynamic team operates on an international scale, with our headquarters located in Wroclaw, Poland. We pride ourselves on our commitment to excellence, collaboration, and continuous learning. As we continue to expand, we are seeking a talented Azure Cloud Platform Engineer to join our team and contribute to our exciting projects.About the role:
As a mid to senior-level Azure Cloud Platform Engineer, you will play a pivotal role in architecting, building, and maintaining our cloud infrastructure on the Azure platform. You will collaborate closely with cross-functional teams to ensure our applications are scalable, reliable, and secure. This role offers the opportunity to work with cutting-edge technologies, tackle complex challenges, and contribute to the success of our products.Responsibilities:
- Design, implement, and manage Azure cloud solutions, ensuring high availability, scalability, and performance.
- Develop and maintain infrastructure as code (IaC) using tools like Terraform.
- Implement and automate CI/CD pipelines for seamless deployment and release management.
- Monitor, troubleshoot, and optimize cloud infrastructure to ensure reliability and cost-effectiveness.
- Collaborate with development teams to integrate cloud services and support application deployment.
- Stay up-to-date with emerging Azure technologies and best practices to drive continuous improvement.
- Participate in code reviews, architectural discussions, and cross-team collaborations.
- Strong experience with Azure cloud platform, including services like Azure App Services, Azure VMs, Azure Storage, Azure SQL Database, etc.
- Proficiency in infrastructure as code (IaC) concepts and hands-on experience with Terraform or similar tools.
- Demonstrated expertise in building and managing CI/CD pipelines using Azure DevOps or similar tools.
- Solid understanding of networking concepts, security principles, and best practices in cloud environments.
- Proficient in at least one programming language (e.g., Python, PowerShell, C#) and scripting experience for automation tasks.
- Experience with containerization technologies such as Docker and orchestration tools like Kubernetes is a plus.
- Familiarity with relational and NoSQL databases, and the ability to optimize database performance in cloud environments.
- Strong problem-solving skills and the ability to troubleshoot complex issues in a timely manner.
- Excellent communication and collaboration skills, with the ability to work effectively in a team environment.
- Competitive salary and benefits package.
- Flexible working arrangements, including remote work options and flexible hours.
- Continuous learning and professional development opportunities.
- Dynamic and collaborative work environment with a diverse international team.
- Opportunity for growth and advancement within the company. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817200.22/warc/CC-MAIN-20240418061950-20240418091950-00015.warc.gz | CC-MAIN-2024-18 | 3,001 | 23 |
http://pdftips.xyz/archives/1075 | code | Novel–Astral Pet Store–Astral Pet Store
The Oxford Book of American Essays
Chapter 542 – Reaching The Ninth Rank parallel spiteful
Su Yuanshan shook his mind and dragged his wife house.
“You’re the main one to express!” Tang Ruyan reported grumpily, “You accessed the family pet place however, you did not remember about us. We couldn’t drive the entranceway open up regardless how really hard we attempted. We might have deprived to passing away whether it weren’t for because you held some treats and an ice pack creams in the store!”
They wouldn’t be perceived as massive pictures whenever they behaved in a different way!
Nevertheless the reality stayed it was still a Cla.s.s B starting point metropolis. Precisely what a humble structure metropolis.
At the store.
Chapter 542 Attaining the 9th Get ranked
Su Yuanshan shook his brain and dragged his wife home.
There had been many t.i.tled battle furry friend fighters as well.
“You’re normally the one to say!” Tang Ruyan stated grumpily, “You entered the furry friend home but the truth is neglected all about us. We couldn’t thrust the doorway open no matter how challenging we experimented with. We might have deprived to loss of life whether or not this weren’t for the fact that you held some goodies and ice cubes treatments inside the shop!”
Apart from, he acquired as soon as mistakenly consumed some unusual herbal treatments as he is in a dragon kingdom, that had eventually higher his actual toughness. Placing the Photo voltaic Bulwark, he can even battle an Ocean Express monster emperor counting on nothing else but his physiological toughness!
No-one doubted the information’s credibility in regards to Su Ping it absolutely was out of the question to cordon the news about the beast reach suffered by the Longjiang Starting point Community! Some people using their company foundation towns possessed ended up to help you the Starting point Location, and they also reached see an astonis.h.i.+ng section of Longjiang. Su Ping acquired pressured the Perfect King to retreat. The key loved ones out of the basic city had beast kings. These details had been enough to distress the earth.
To Su Ping’s astonish, he noticed that they didn’t look like local people.
The neighborhood forces have been taken aback concerning the a lot of exterior factions which are swarming in. The former found out that the unfamiliar representatives were there to inquire about anyone, promptly knowing why the latter acquired showed up.
Su Yuanshan shook his brain and dragged his wife your home.
Su Ping switched his palm upward a tennis ball of crimson fire started to boogie as part of his fingers. He experienced figured out the primary rules of blaze when he trained inside of a arena of blaze!
It was subsequently crazy to find out that Longjiang cla.s.sified itself for a Cla.s.s B bottom city in the event it had what it really needed being rated as Cla.s.s A!
No matter whether he frequented enhanced farming internet sites or otherwise managed topic. He had to discover the the best option farming internet sites.
Thoughts, Moods and Ideals: Crimes of Leisure
Su Ping was obviously a various gentleman than he was 10 days ahead of.
Su Ping discovered he had created a severe error. Tang Ruyan and Zhong Lingtong didn’t have authorisation to regulate the store. These were the same as the individuals external, as reported by the system. They couldn’t enter the store nor leave alone. “I am sorry. This can be my undesirable,” Su Ping apologized, “Go and take a shower. I will purchase you with a feast for it to be your decision.”
These were there for Su Ping! Some people away from town obtained observed if the Longjiang Bottom City was under strike and the presence of the Otherworld Perfect Ruler was made public, as well as the fact the structure city’s request help acquired facilitated rapid holiday of information. The successful defense in the Longjiang Starting point Town was an even larger big surprise. Some outdoors makes inquired around and gathered some good info.
Both ladies have been in somewhat of a blunder. Their your hair was oily along with their mood appeared to be reduced.
Tang Ruyan rolled her eyes.
Astral Pet Store
He extinguished the baseball of fire as part of his palm then, he sensed a gaze on him. Joanna was looking at him and she appeared to be absent-minded. “What can it be?” he requested.
Su Ping joked but he sincerely observed sorry. It was time to teach the gal some training expertise. He designed on providing her the whole elementary regulations of fireplace.
He obtained become much more impressive than before. Even monster kings would sense low quality to him. He could kill a typical beast queen for the Seas Declare with one impact, only making use of his actual toughness. For opponents with the t.i.tled position, coping with them could be a piece of cake for him.
Because time period, the many awesome personalities would favor shutting their entry doors and diminish seeing visitors.
After he stepped out from the home, he noticed that many individuals ended up squatting because of the avenue and quite a few ended up innovative challenge dog or cat fighters.
The cracking open with the family pet home alerted both the young girls. They sat up immediately and were definitely very happy to see Su Ping occur right out of the dog place. “Finally, you’re from there!” Tang Ruyan reported.
The centre of each of the some information was Su Ping.
Some makes, including the Tang Friends and family along with the Legend Enterprise, had been concious of Su Ping even before the strike.
Beyond the Pixie Pet Shop.
wholly sanctified scripture
After he stepped out of your entrance, he noticed that lots of people had been squatting with the streets and plenty of have been innovative battle furry friend warriors.
Novel–Astral Pet Store–Astral Pet Store | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500126.0/warc/CC-MAIN-20230204110651-20230204140651-00704.warc.gz | CC-MAIN-2023-06 | 5,932 | 39 |
http://www.entwagon.com/cgi-bin/quotes/quotes.pl?cat=Advice&id=6 | code | Advice is the only commodity on the market where the supply always exceeds the demand.
Author: Source Unknown
Give help rather than advice.
Author: Marquis De Vauvenargues (1715-1747)
Profession: French Moralist
The only thing to do with good advice is to pass it on. It is never of any use to oneself.
Author: Oscar Wilde (1856-1900)
Profession: British Author, Wit
Some of these people need ten years of therapy --ten sentences of mine do not equal ten years of therapy.
Author: Jeff Zaslow (1925)
Profession: American Advice Columnist | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583657510.42/warc/CC-MAIN-20190116134421-20190116160421-00170.warc.gz | CC-MAIN-2019-04 | 537 | 11 |
http://biophysics2.med.jhmi.edu/xtal/software/start/job_submission_torque.shtml | code | Torque Job Submission
R2D2, the star wars cluster, consists of 30 dual processor, 64 bit, Opteron, computational nodes, with routing to 3 of the jedi computers as well. These jedis, 3, 4, and 5 are similar to the other computational nodes, except that they have 4 processors instead of 2, so that they are exceptional for cases where the software is multithreaded.
Interactive use of the star wars cluster is prohibited, with a few exceptions, such as cluster monitoring software and CCP4i_6.0.1, which has the queue submission commands built in. All other jobs should be submitted with the qsub command. The qsub command has a different implementation on r2d2 than on queen, which necessitates these instructions. It is advisable to review the instructions for the hive, and use it when the star wars cluster is busy.
Using the Torque implementation of qsub, which we have on r2d2, jobs can now be routed to the machines which are best suited in terms of memory requirements and multi-threading capabilities, as in the following examples.
qsub -q lowmem qsub -q medmem qsub -q himem qsub -q @jedi_master qsub -q @jedi_master3 qsub -q @jedi_master4 qsub -q @jedi_master5
Add the name of your command script to one of those commands in order to submit it to the appropriate queue, and feel free to let me know if you hit any snags. We are ready to help you get underway with the cluster.
The high priority default queue is lowmem, so if you have special requirements, other queues should be selected. Here are examples of some commonly used queue queries which are adapted to the new situation.
qstat -q qstat -q midmem qstat -q @midmem qstat -q @jedi_master5
Note the server line in the output. The -q option works with qsub too, but I think qdel must be run on the destination server. Entries with an @ in front are destination queues. Master is now a dedicated routing queue server, so jobs disappear from the master queue and are passed along to destination queues.
Here are some job query commands.
qstat -na @lowmem qstat -na @midmem qstat -na @himem qstat -na @jedi_master3 qstat -na @jedi_master4 qstat -na @jedi_master5
Here are some pbsnodes examples.
pbsnodes -a -s midmem pbsnodes -a -s jedi_master4
Together with our recent gigabit and parallel file access upgrades, now beowulf now provides a fast and up to date clustering tool. It was quite some work, but if you have any further questions or suggestions, please feel free to pass them along.
document created by Michael L. Love, and maintained by the Crystallography facility | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540548544.83/warc/CC-MAIN-20191213043650-20191213071650-00399.warc.gz | CC-MAIN-2019-51 | 2,541 | 15 |
https://android-arsenal.com/tag/38?category=1 | code | This library implements reactive paging and loading. It helps to handle the states of loading a simple data (LCE - loading/content/error) or the complex states of lists with pagination (PLCE - paging/loading/content/error). The solution is based on the usage of Unidirectional Data Flow pattern.
Dispose automatically RxJava2 streams using AAC Lifecycle.
An RxJava Extension for the LiveData observer introduced by Google. Provides the ability to perform single actions using RxJava and takes advantage of an automatic subscription of the Lifecycle owner. Mainly designed to used Room CRUD commands with RxJava.
A thin wrapper around Java Collections using RxJava2 in which you can observe the insertions,removals and modifications. Inspired from observable collections in JavaFX and observable properties in Swift.
Automatically dispose RxJava 2 streams in Android using Lifecycle events.
This is the RxJava2 port of the RxGroups project developed by AirBnb. The branch rx-2.0 has the Rx2 changes. The changes have been done on master branch of RxGroups. The following documentation written for RxGroups by AirBnb applies to Rx2Groups as well. All the API and package names originally written by AirBnb remains as it is. I have transitioned all the RxJava APIs(including the unit tests) to RxJava2.
RxGroups lets you group RxJava Observables together in groups and tie them to your Android lifecycle. This is especially useful when used with Retrofit.
Rxjava2 scheduler transformer tools for RxLife.
This is a library that can help you to receive results from
startActivityForResult() as an
This project is implementation of ideas from Managing state reactive way article.
An RxJava 2 operator which splits an observable into windows using a key selector.
RxLoader caches the data emitted by your Observable across orientation changes by utilizing an Android Loader, while also providing the results from an Observable preserving the RxJava pattern.
RxComprehensions is a library to reduce boilerplate and simplify your
Library to convert between RxJava 1.x and 2.x reactive types.
Reduks (similarly to Reduxjs) is basically a simplified Reactive Functional Programming approach for implementing UI for Android.
A Java fluent assertion wrapper to improve readability of RxJava's TestSubscriber assertions.
compose() your Observables into ones that load data that's cached across activity orientation changes without leaking your
Activity and without you having to worry about unsubscribing.
RxGroups lets you group RxJava
Observables together in groups and tie them to your Android lifecycle.
This is a tiny library for Android which makes it simple to monitor when your app becomes visible or hidden, in a cool RxJava way. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818474.95/warc/CC-MAIN-20240423095619-20240423125619-00603.warc.gz | CC-MAIN-2024-18 | 2,724 | 22 |
http://events.msdn.microsoft.com/nb-no | code | The MVP Award Program and the Windows IT Pro teams are pleased to offer a *free* live webcast, as part of a global community event, to provide first hand guidance about Windows 10 Enterprise for IT Pros. Join Microsoft MVPs as they take you through topics such as an overview of the Windows 10 Enterprise, Windows Security, Windows as a Service, Windows Deployment, Windows Management & Store, and Windows Networking.
We hope you are able to join us! This webcast is a great opportunity for you to learn and also participate live in Q&A session with some of the top Windows IT Pro experts.
Visual Studio has a lot of features. Like…a lot. Features that might have been incredibly useful…had you known about them. Join our VC++ Program Manager as he goes through the team’s most useful C++ IDE features (new and renewed) to add to your arsenal and pump your productivity! Speaker: Gabriel Ha | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698540915.89/warc/CC-MAIN-20161202170900-00338-ip-10-31-129-80.ec2.internal.warc.gz | CC-MAIN-2016-50 | 896 | 3 |
https://bugs.gentoo.org/show_bug.cgi?id=573504 | code | Created attachment 424324 [details]
I had ncurses-6.0 and ncurses-6.0-r1 installed in my system. ncurses-6.0 is supposed to be SLOT 5/6 and pull ncurses-6.0-r1 for compatibility reasons, while ncurses-6.0-r1 is supposed to be SLOT 0/6. However, after a portage sync, a slotmove (Q3-2015) from 5/6 to 0/6 was applied to ncurses-6.0 but the SLOT was in the ebuild file was still 5/6.
Then, when I installed a new package the next day, this automatically triggered package auto-clean (does it always do that?) and removed ncurses-6.0 (and not ncurses-6.0-r1) as they are in the same SLOT. The problem is than ncurses-6.0 does nothing except pulling ncurses-6.0-r1, so it completely removed ncurses library and broke my entire system.
I guess the real problem here is why there is no slotmove 0 to 5 for ncurses-6.0 in 2015-Q4, and why did an old slotmove was applied? For the last question, a lot of upgrade happened in ncurses-6.0 since the last few months without any problem.
I got a BTRFS snapshot of my system before the event so I can easily reproduce if needed.
This also happened on trimslice (armv7 w/o neon) the other day, didn't really have a chance to look at it yet, but it's dorked (can't even login remotely now). Trying to manually restore my console/tty data now...
Booted from SDCard and emerged -K the package built previously => fixed.
There has been no updates for more than 5 months, so I am closing this bug report. | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710421.14/warc/CC-MAIN-20221210074242-20221210104242-00634.warc.gz | CC-MAIN-2022-49 | 1,435 | 8 |
https://www.spf.io/solutions/education/ | code | Break the language barrier and engage all your students.
International students are a growing population at universities, but the language barrier makes it difficult for them to understand everything that is going on in class. With spf.io, you can help by providing live captions and translation of lectures directly to the students who need it. All it takes is speaking into a microphone that’s connected to spf.io.
Ready for Anything
How It Works
Set up the device that will control the display of translations and slides.
Ready to try it out?
With the latest release of our new feature spf.io Overlays, now you can open caption your video feed into any video conferencing software, like Zoom, GoToMeeting, WebEx, or Blue Jeans. This means spf.io now offers more resiliency and ability to provide captioning for...
If you stream to Twitch, Facebook, YouTube or other streaming platforms, you can use spf.io to add captions or subtitles to your livestream with OBS. OBS is free and open-source software that enables you to record or livestream with multiple inputs. In this tutorial,...
As event organizers, pastors and companies cancel in-person gatherings and go online in response to COVID-19, we realized there was a need to ensure these online experiences are accessible to the Deaf, hard of hearing and people who speak many languages. So we built... | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107872686.18/warc/CC-MAIN-20201020105000-20201020135000-00377.warc.gz | CC-MAIN-2020-45 | 1,359 | 9 |
http://megakvartal.com/clinic/homemade-gay-anal-objects.php | code | Homemade gay anal objects
I try to avoid labels for these reasons. I simply state: I remained unconvinced that any god claims so far are backed by evidence. They seem highly improbable. If new evidence comes up, I'll examine it. I make no claim to ominscience. I could always be wrong. | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202671.79/warc/CC-MAIN-20190322135230-20190322161230-00181.warc.gz | CC-MAIN-2019-13 | 285 | 2 |
https://www.telerik.com/products/aspnet-ajax/timeline.aspx | code | UI for ASP.NET AJAX
The Telerik UI for ASP.NET AJAX Timeline control is the perfect visualization tool when you need to display a sequence of events in chronological order. Whether it is the development history of the company’s latest product or maybe the history of some famous landmark in a travel application, you won’t go wrong by picking the Timeline component.
Customization is a key to unlocking the full potential of any UI component so naturally the Timeline uses templates which you can define yourself for each event. Place other HTML elements like buttons, links or images inside the event template to provide the best user experience.
With the ability to bind the list of events to all basic collections like arrays, IEnumerable or one of the many popular DataSource components, setting up the data for the component is rather trivial. Wherever your data is, we probably support binding directly to it. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473690.28/warc/CC-MAIN-20240222030017-20240222060017-00076.warc.gz | CC-MAIN-2024-10 | 919 | 4 |
http://lisapple.free.fr/blog/fileComparatorPlanning.html | code | File Comparator Planning
About Global Avancement:
File Comparator was created on a simple idea with a simple interface but there is some missing features that will be added more or less soon.
I'm working on another project but I will continue to provide update to File Comparator and others softwares.
About Version 1.1:
I'm currently working on this update.
This contains many improvements including the ability to compare:
- Image files (comparing size, device taken, GPS informations, etc.)
- Audio files (comparing format, duration, author, album, etc.)
- Movie files (comparing format, duration, etc)
And including too:
- A French translation for the entire application
- Improve stability of the application
- And other interesting stuff
About Crashs and Bugs:
All version are seriously tested on my (only) current Mac (Snow Leopard 10.6.8 and Lion 10.7.4) and could be crash on another configuration.
If you encounter any crash or bug, please use the support page, this will be a great help for me
Thank you very much for your interest in the project, one more time!
Last Updated: 20/05/12 | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891816068.93/warc/CC-MAIN-20180224231522-20180225011522-00759.warc.gz | CC-MAIN-2018-09 | 1,096 | 19 |
http://www.antionline.com/showthread.php?254702-indianhackers-com | code | April 22nd, 2004, 11:05 AM
Today i typed in indianhackers.com and was welcomed into a strange(TO ME!!) screen containing folders such as cgi-bin, images
etc.On clicking over private i was welcomed by a login screen this's something great fun to me................
But i want to know the technicalities plz.
April 22nd, 2004, 11:10 AM
thats just a dir listing cause they dont have an index page - the reason why one folder is asking you to login is prolly cause they have set it up as a non-public folder
April 22nd, 2004, 11:20 AM
Well by the looks of it, either the owner of the site, hasn't uploaded any pages for the site.
Or maybe he's just stupid and, by the look's of things, any skiddie with a Brute Forcer and a default password file, and the now how can gain access to the cpanel for the site..
But the prompt that you are coming across, is just a login mechanism, so that you need the correct crodentials to enter into the cpanel.
It's pretty much just like the login screen when you boot up windows.
It asks you for your
And once you type in the relevan information it will take you to your Desktop.
But with this login screen, when you login it will take you to the Control Panel of the site, you can set up email addresses, upload, download, set up MySQL databases. etc etc
So that is why you run into that prompt.
April 22nd, 2004, 01:44 PM
actually you dont....his FTP is unsecured...just try it | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122726.55/warc/CC-MAIN-20170423031202-00443-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 1,410 | 17 |
https://www.firsttutors.com/canada/tutor/taylor.english.french.esl.social-science/ | code | Information About TaylorToronto tutor
Hi! My name's Taylor. I graduated from the University of Toronto in 2018 with a Bachelor of Arts (Honours, with Distinction) in Literature and Critical Theory (specialist) and Philosophy (major). I began a Master of Arts in Cultural Studies and Critical Theory (essentially an English degree, but with more philosophy and "theory") in September 2018 at McMaster University, but am currently taking a year off from that.
I have one year's experience working as a Teaching Assistant at McMaster University. Prior to this, I volunteered as a teacher's aide at Maurice Cody Junior Public School for a year through the Vic Reach Program when I was a student at U of T (Victoria College), and as a teacher's aide at John Fisher Junior Public School, a French immersion school where I helped young students with their French. I also completed a program called Ideas for the World at Victoria College, one of the sessions of which was called Theatre for Thought, in which my role was to engage inner-city community members to think critically about the plays we would read and watch each week.
Teaching should be a dynamic process by which the student not only learns, but learns how to learn; one, in effect, learns how to be one's own teacher, and potentially (or eventually) to teach others oneself.
Tutor Resources: (free to download)
Please login or register to download tutor resources.
Availability: Weekends / Weekdays (all times)
References Available: No (✘ Not On File)
- McMaster University (2020) - Master of Arts (Masters) (✘ Not On File)
- University of Toronto (2018) - Bachelor of Arts (Hons) (Bachelors) (✘ Not On File) | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780058456.86/warc/CC-MAIN-20210927151238-20210927181238-00364.warc.gz | CC-MAIN-2021-39 | 1,672 | 10 |
https://papathemes.com/improve-brands-page-with-alphabet-table-display-all-brands-in-bigcommerce/ | code | How it works?
We will customize your BigCommerce store and BigCommerce theme to display brands listing on your brands page. Display Alphabet table for quickly filter brands by the first letter. Ability to show all brands on a same page.
We are using AJAX to asynchronously load more brands list. Your store loading speed is not impacted for displaying hundreds of brands.
Check out the live demo on our BigCommerce theme: http://supermarket-yellow-demo.mybigcommerce.com/brands/
Or check out our customization for real client: https://phenomstores.com/brands/
ETA in 3 working days.
Contact Us for any pre-sale question. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474663.47/warc/CC-MAIN-20240226194006-20240226224006-00530.warc.gz | CC-MAIN-2024-10 | 620 | 7 |
https://it.mathworks.com/matlabcentral/answers/257834-inverted-pendulum-control-with-q-learning-reinforcement-learning?s_tid=prof_contriblnk | code | inverted pendulum control with Q-learning (Reinforcement Learning)
1 visualizzazione (ultimi 30 giorni)
I want to control an inverterd pendulum with Q-table. I simulated pendulum with simulink, but ''matlab function block'' doesn't work correctly. I want that (phi, phi dot, x, x dot) give to matlab fcn block,after it, action calculate and apply to pendulum . have any one this project or know about my problem? thanks a lot. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100555.27/warc/CC-MAIN-20231205172745-20231205202745-00688.warc.gz | CC-MAIN-2023-50 | 426 | 3 |
http://dianarose.blogspot.com/2003/07/ | code | Well, then! I've neglected my public for quite some time, I see. Well not much has happened. I worked hideously long 11-13 hour days for a week in the cafeteria. Tomorrow, I begin to work at Woodwork. Oh the monotony that will ensue.
That's really all I have to say. I have to go to sleep so that I don't cut anything off tomorrow due to extreme exhaustion. | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891815500.61/warc/CC-MAIN-20180224073111-20180224093111-00369.warc.gz | CC-MAIN-2018-09 | 357 | 2 |
https://www.daniweb.com/hardware-and-software/microsoft-windows/threads/13733/page-cannot-be-displayed | code | when i open internet explorer i always get page cannot be displayed. i press refresh and it opens - then some pages will open while others give me the same message. i have windows xp and am on dsl modem. i have deleted temp files and have run spybot - still no help. i tried adaware but then it said it was connected to the internet but couldnt open any pages or my email. can anyone help me? | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376828507.57/warc/CC-MAIN-20181217113255-20181217135255-00226.warc.gz | CC-MAIN-2018-51 | 392 | 1 |
http://sqlserver-qa.net/2013/08/11/bi-for-dba-sql-server-bi-development-practices-strategy-and-tools/ | code | As a DBA how many times were you involved in BI development related projects?
As a DBA would you be interested to take on Development projects within your Enterprise?
As a DBA, do you favour tools or your own scripts?
Since the release of SQL Server 2008 R2 version BI has been a greater deal within data platform arena to provide end-to-end solutions to the end-users.
Business Intelligence (BI) (related) features were there since 2000 version and key aspect for this area is development. That is another big topic for DBA’s to handle to ensure that the design and development is thorougly following the aspects of the solution. In this scenario the deployment comes handy where you frequently deploy the project to a development server for unit testing in order to create AS databases defined by the project.
There is no doubt that every BI project relies upon the tools quality (for the end-users) to analyze the data which is being presented, this is where it might end up in success or failure. Let us call these tools as client-tools at server-side, which are essential for MDX queries that is another layer for Analysis Services to query the data.
Having said that SQL Server 2012 brings up two kinds – Tabular and Multi-dimensional for MDX queries. All these is managed using SQL Server Management Studio (SSMS) and BI Development Studio (BIDS) and how to tackle same for the end-user (business users in particular). This is where the good-old MS Office tools (Excel) and SQL Server Reporting Services (SSRS). Now with SQL Server 2012 we have Power View and PowerPivot (for Excel & SharePoint) tools which are the best visualization provision based tools.
It is evident that majority of the coding (applicaiton features) can be handled using .NET technology, at the end you must ensure to data storage where the Analysis Services database comes into existence and using tools such as SQL Server Management Studio (SSMS) and BI Development Studio (BIDS) can help the users to deploy all of the projects (associated) within the solution using Solution Explorer.
Going back to basics on deployment, from BIDS or SSMS when you deploy a project multiple tasks are handled in background by the tools. Initially the project is built, which creates the output files that define the AS database and corresponding objects. Then the specified destination server is validated by routing the desitnation database and respective objects that will be created on the server. In any case (unless otherwise specified) the deployment engine will takeout the pre-existing database with the contents of the projects unles those objects were created by the project during a previous deployment.
The deployment is handled with the file on the server such as IncrementalSnapshot.XML which is generated under %\<project name>\Obj folder, this consists all the information for the desitnation server, database objects that have changed outside of the project. In case of multiple developers working on same solution then project configuration and associated settings will determine the deployment properties, so you must ensure that each developer to use their own configuration (standardised) with their own project configuration options.
Further the SSAS project deployment needs a cosnideration on improving the performance and scalability of your BI data platform (SSAS services). As the BI theory itself highly analytical the corresponding hardware resources must be intact to handle multipe projects or multiple instances of AS on existing server. The CUBE processing is a high-resource task which will need CPU and memory to process depending upon the schedule.
Initially when you have installed the SSAS instance (version 2008 and 2008 R2), as to relate with relational databases (sample) the installer will not deploy any Analysis Services databases. The sample database such as Adventure Works (see relevant database for each version fromwww.codeplex.com site) needs to be deployed when you begin the samples, the way I have followed was to ensure the Service Account for SSAS has relevant permissins on the folder where the AdventureWorksDW2008R2 sample database is located. The important piece of deployment is look for .sln file that contain solution for that project.
When it comes to SQL Server 2012, then Big Data is another important topic to cover and it will be nicely overviewed within another blog post.
If in case the project deployment requires the CUBE processing then for fast and effective processing you must remember that cube processing is performing by SSAS by generating Analysis Services generated statements (MDX) to SQL statements against the underlying relational database. As it referred the tuning is dependant on the underlying SQL statements with corresponding updated statistics or indexes to the underlying tables which may improve the performance to avoid any table scans.
Here are my list (check-list) of
In any version of Analysis Services, ensure that the key columns are integer.
The dimension caching feature from SQL Server 2005 AS onwards provide more efficiency in processing.
Also it is possible to improve cube processing performance by tuning the underlying SQL statements executed.
Test the settings execution between ProcessFull vs ProcessDataand ProcessIndex (ref. SSAS Perf.guide), this is a memory-intensive process.
Change and test the parallel processing settings from AS processing options for Maximum parallel tasks change it, like the MAXDOP settings in releational world. I would say set this value to 2 times of number of CPUs on the server.
For the troubleshooting techniques it is better to use PROFILER on the Development server to capture the SQL statements issued by the AS.
As a best practice make sure to use a system-wide trace file (profile the AS SQL statements) by using SQL Profiler to script out the .trc file that can be used on multiple development server if you see any slowdown of trend.
From SQL Server 2008 onwards the Scalable Shared Databases concept on SSAS has importance of deployment, where the data processing is handled by a single-server with respective fast memory and I/O on hardware to escalate the data aggregations processing.
Then coming to the installing BI features within SQL Server 2012 then don’t forget to see Deployment Checklist: Reporting Services, Power View, and PowerPivot for SharePoint and Deployment Checklist: Multi-Server Installation of PowerPivot for SharePoint.
Further here is the vast list of SSAS specific features to install within the existing data platform:
- How to Install Integration Services
- How to Install Data Quality Services
- How to Install Master Data Services
- How to Install Reporting Services Native Mode Report Server (SSRS)
Also refer to the Analysis Services 2008 Performance Guide along with the Scale-Out Querying for Analysis Services with Read-Only Databases.
Finally, the Analysis Services Distinct Count Optimization shows how using solid state devices (SSDs) can improve distinct count measures. | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320887.15/warc/CC-MAIN-20170627013832-20170627033832-00434.warc.gz | CC-MAIN-2017-26 | 7,035 | 31 |
https://www.sabza.org/http-proxy-authentication/ | code | Microsoft’s ISA server firewall is the tool used every where on networks in Pakistan and it is the second most common problem for Linux advocates in Pakistan. The first most common problem is getting drivers for win modems.
My Cable Internet service provider also uses the same stupid MS ISA server firewall. They are a nice group of guys but they act crazy sometimes. This time, they updated the servers and forced me to authenticate to a proxy server. No big deal, I knew how to get around this trouble but this time they had gone totally mad and configured the sever to accept HTTP requests from Mozilla and IE only.
I was unable to download updates using either synaptic or apt-get. Fortunately I found Micheal Carden’s Ubuntu – ntlmaps post and it solved all my problems. Not that I was unaware of ntlmaps but actually I was unable to get it configure to use my proxy. Micheal Carden’s post explained how he solved this by moving the server.cfg from /etc/ntlmaps/ to /usr/lib/site-python/ntlmaps/main.py. This ntlmaps thing just works! | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816879.72/warc/CC-MAIN-20240414130604-20240414160604-00604.warc.gz | CC-MAIN-2024-18 | 1,048 | 3 |
https://play.google.com/store/apps/details?id=com.cpu_v.system_info&hl=en&gl=US | code | CPU-G app is an android version of the CPU identifier tool for PC that gives us your complete device info. It displays full system information about device specifications like processor, cores, temperature, speed, model, RAM, camera, sensors, etc.
* Get information about the name, clock speed, etc for each core
* Enable dark themes to protect your eye
* Get full android device spec info such as device brand, model, board, hardware, RAM, screen resolution, device storage, etc
* Find detailed system info such as API level, system uptime, security patch level, etc
* Check real time CPU temperature.
* See most detailed information about level, status, capacity, etc of your device battery
* Get complete sensors info of your device
* See details about CPU usage monitor process
This CPU information app can also be used as a mobile specification app. Because by using this app you can get information about your phone specs.
Install this CPU info app to see CPU identification information. This CPU hardware info application is used for your smartphones to know complete CPU & android devices in one place. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506481.17/warc/CC-MAIN-20230923130827-20230923160827-00559.warc.gz | CC-MAIN-2023-40 | 1,110 | 11 |
https://su.org/about/faculty/carlos-osorio/ | code | Innovation is a social phenomenon for creating better futures through technological advancement. This talk focuses on how to enable teams to innovate in consistent and predictable manners. It is based on current developments of cognitive psychology, design and development processes, and results from experimental research with nearly 7,000 members of innovation teams across 20 countries. It explores the role of professional, personal, and psychological traits in team dynamics under risk, uncertainty and ambiguity for 26 common innovation tasks. It provides insights for unlocking the potential of soft skills for shaping a team’s technical performance, and presents structured ways for governing the behavioral variables that define our ability to innovate in almost anything.
Complexity, risk and innovation: how much of each?
This talk examines the large number of variables affecting innovation performance at the strategic, procedural and behavioral levels. It disentangles the effect of risk and complexity on the natural uncertainty, volatility and ambiguity of discovery-driven journeys. Here we show how the overall effect of risk has been overestimated, complexity has been neglected, and how system, dynamics and non-linear thinking are necessary for managing innovation in times of exponential technologies.
Debiasing your innovation model
Debiasing your innovation model: All innovation strategy frameworks, methods or processes are metaphors about what an organization or team “should do” in order to succeed. Metaphors, however, are abstractions of reality that hide biases and assumptions, and are supposed to work in “certain” situations. In this talk we examine a synthesis of the hidden biases across 30 different types of innovation, design and development processes, explore their risks, and explains how to combine them for taking advantage of their strengths and offsetting their limitations.
Digital strategy and transformation in the age of digital disruption
Digital transformation has become too digital and not as transformative enough. In this talk, we propose how to unleash the potential of the dynamics among disruption strategies, organizational and cultural assets, mindsets to generate disruptive change based on digital technologies. Participants will get a blueprint for how to design and execute a disruption-oriented navigation-map that is focused on high-impact challenges and grounded on tangible and intangible assets.
Discovery-driven planning focuses on executing in highly volatile, uncertain, complex, ambiguous and risky (VUCAR) contexts. It presents methods for better understanding information in such environments, and how to use and synthesize that information for planning, designing and executing better futures. These methods combine approaches from cognitive sciences, design, engineering, learning and management. (Also as workshop)
Enabling innovation learning: design processes, routines, cognition and emotions
Innovation capabilities are largely considered a result from the dynamics between creative and technical performance. This research is based on extensive review of the literature on innovation and design performance across disciplines, the study of 29 different types of processes, and experiments for exploring the relationships among (i) processes, methods and tools, (ii) decision-making under uncertainty, (iii) relevance of mindsets and attitudes, and (iv) role of cognitive, and (v) emotional powers for performing under highly uncertain, risky and ambiguous environments. Results show that, while processes, methods and tools are necessary and can make a difference between most and least successful teams; the most relevant aspects are the activation of people’s cognitive and emotional powers during highly risky, ambiguous and uncertain environments.
How to innovate in (almost) anything?
Here we explore the commonalities among most successful and failed innovation projects, as well as differences between success and failure. Based on ten years of research in processes, methods, decision-making, cognition, emotional resilience and learning, we present a synthesis of the minimum necessary attitudes, steps, decision-making debiasing mechanisms for designing the future.
Innovation, cognition and the emotional rollercoaster
Innovation performance has strongly been framed as resulting from choosing superior methods and processes, over incomplete or biased ones. This talk explains the role of cognition and emotions on a teams’ technical performance, based on experimental research with nearly 1,900 members of innovation and design teams across 20 countries between 2014-2018. It provides strategies and policies for team formation, leadership, motivation, exponential cognition, and cultivating intangible assets.
Methods for enabling innovation learning
“Teaching” innovation does not always lead to “learning” to innovate. Most approaches from design, management and engineering focus on the necessary methods and processes. This talk focuses on the mediating techniques, assessment methods, and learning dynamics that trigger meaningful learning during discovery-driven journeys. The talk combines discoveries from psychology, learning and cognitive sciences, and unveils the secrets that led us to receive the 2015 QS Wharton Reimagine Education Award for Best Innovation in Teaching Delivery for our “Methods for enabling innovation learning”.
Organizational future-proofing: the role of emotions, cognition and technology. If we aim to design and change the future for the better, we need to care for not creating new and unsolvable problems. This talk presents the concept of future-proofing, and explains the role of cognitive and emotional responses in solving and creating problems and shaping organizational outcome. Looking at the future, we explain how exponential technologies help enhancing our cognitive capabilities for enabling exponential cognition and designing better futures.
Reinventing Corporate Innovation
Innovation happens in volatile, uncertain, risky, and ambiguous environments. Recent research shows that part of this environment comes from within organizations, but due to the large number of interacting variables is mistakenly associated to external factors. This talk highlights the dimensions and variables affecting innovation performance at the strategic, project and personal levels. We present guidelines for refining your innovation strategy, enhancing the performance of various innovation dimensions in order to propel them to higher levels.
The Art of Failing
The Art of Failing is about how to leverage the power of experimentation and failure, and harness their learning potential for designing better futures. Not all failures are created equal, not all teams embrace them positively, and the combination is not always fruitful. The talk presents guidelines for distinguishing between “good” and “bad” failures through discovery-driven journeys; strategies for preparing to fail; methods for doing it as good, soon, fast, cheap and frequently as possible; and approaches for managing team dynamics in order to maximize the business and learning potential of failures.
The (un)certainties of creating the future
The (un)certainties of creating the future (or 118 ways to be wrong). How can we recognize the new if we haven’t seen it? This talk focuses on learning and minimizing the effect of the nearly 200 types of cognitive biases that affect our thinking and perception of “venture reality”, decision-making and actions during innovation and design. Participants will have first-hand experience on how memory errors, beliefs, social, behavioral, and decision-making biases affect their decision-making driving right (and wrong) courses of action. We present proven “debiasing” techniques for exponential thinking and decision-making that can be embedded in any development process for designing the future.
Unleashing the power of complexity, risk and uncertainty
High-risk ventures promise greater rewards and high uncertainty leads to more diverse design spaces. Yet, most teams focus on diminishing risk and uncertainty instead of embracing them. This talk focuses on methods for leveraging the potential of amplifying risk, uncertainty and ambiguity along innovation projects, while mitigating their organizational negative impact. We present approaches to separate lack of preparation, recklessness and “bad luck”, and lessons for better performing in complex, risky and uncertain environments.
Unlocking the power of diversity and collaboration
While diversity, collaboration and performance are closely linked; they are often misunderstood and mismanaged. This talk explores diversity and heterogeneity beyond race, gender, technical background and nationality, by the including invisible variables that trigger our most basic reactions. The research is based on experiments with nearly 2,000 members of innovation teams across various nations, performance assessment, and analysis of different technical, psychological, cultural and personality variables. It exposes good and not-so-good approaches for understanding and managing diversity when trying to foster collaboration on innovation teams, and presents methods and prescriptions for improving team performance. | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987838289.72/warc/CC-MAIN-20191024012613-20191024040113-00101.warc.gz | CC-MAIN-2019-43 | 9,365 | 27 |
http://lqhomeworkygkt.loganhartline.info/senior-software-engineer-resume-cover-letter.html | code | Senior software engineer resume cover letter
Is it important to provide a cover letter while applying for a software engineering how should a software engineer make a resume and cover letter for applying to. Senior software engineer / lead design [email protected] llc where can i find a amazoncom software developer engineer resume example in cover letter cover letter. Check out this sample resume for an experienced software developer director of software development, 2010 to present senior software cover letters & resumes. Technicalresume & letter writing guide 39 cover letter checklist the technical resume letter writing • senior capstone and other class projects or.
Senior software engineer resume cover letter effectively reflects the candidate's technical skills pertaining to the field of software and application development. Use our software engineer resume sample to create your own great resume for software engineer jobs cover letter & resumes senior software engineer. The sample below is for senior level software engineer cover letter this cover letter was written by resumemycareer's staff of professional resume writers. Find thousands of resume samples and cv examples from real professionals on visualcv check out some of our senior engineer resume examples and download the pdf.
Sample cover letter: senior software engineer sample resumes and providing sage career advice to the it professionals in our dice senior software engineer. Silkroad technology is currently hiring for a senior software engineer (303559-499) resume formats cv templates cover letters backcover letters. A senior software engineer leads software projects and assists development team in improving productivity and delivering high-quality products as this sample resume. Software engineering sample cover letters resume and highlights how your skills and personality would be a good fit for simulation engineer position inquiry. Backcover letters cover letter builder senior staff software engineer where can i find a l3 communications senior staff software engineer resume example in.
Resumes and cover letters a resume is a brief, informative summary of your abilities software developer – technology office july 2010 – january 2011. Stressed about creating a job application that wins you the interview get it done quickly and easily with this sample senior software engineer cover letter 5. View our sample cover letter for a software engineer below impress employers with a high-impact resume and cover letter from the experts at monster's resume writing. Intel is currently hiring for a senior software engineer position in austin,tx resume formats cv templates cover letters cover letter (optional) upload.
The below are examples of professionally written electrical engineer resume and matching cover letter engineering cover letter resume builder software to. Sample chronological resume for a senior software engineer who is an older worker susan ireland resumes free resume samples, cover letter samples and tips. The competition is fierce and you need to stand out but, how view our outstanding software engineer cover letter examples to see where yours stands. Use this senior software engineer sample cover letter as a template. This free sample resume for a senior software engineer has an accompanying sample senior software engineer cover letter and sample senior software engineer job.
Check out our software engineer resume example to learn the best resume writing style resume tips for software engineer cover letter cover letter. The senior software engineer cover is a great way to get an interview call even in the field of information and technology senior software engineers are some of the. Sample senior software engineer cover letter dear sir or madam my name is i am writing in regards to my interest in fulfilling the position, senior software engineer.
Senior software engineer deliver software solutions consistent with the product roadmap and released all cv's and cover letters are downloadable as. Find the best software engineer intern resume samples to help you improve your own resume each resume is hand-picked from our large database of real resumes. Find the best senior software developer resume samples to help you improve your own resume each resume is hand-picked from our large database of real resumes. The sample below is for a senior systems engineer resume software, and mobile-device written 150,000+ resumes and cover letters. Tailored resumes and cover letters use the template below to create your engineering resume and the action verbs a position as a process engineer in the. | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512400.59/warc/CC-MAIN-20181019124748-20181019150248-00080.warc.gz | CC-MAIN-2018-43 | 4,640 | 8 |
https://www.dk.freelancer.com/job-search/detect-invisible-yahoo-scanner-cloner/ | code | we would like to get a product which can identify markers on the road, read any signs. example watch the video [log ind for at se URL]
...needed that is available to mobile and web devices. Key components of the application will include web development, app development, registration email confirmations, QR scanner, ticket purchasing & payment, multiple user profiles and most importantly a data analytics cloud platform which will form the foundation of the entire project. PLEASE ONLY
I am looking for talents to help on Car Inspection App. The app will scan the VIN number and convert into VIN text, query car info based on the VIN. Also it will allows the users to input car year/model/color/car pictures and save to the user profiles. It can export those info into excel and save in the cloud.
...looking about. I need a very solid previous work proof and then we can start working together. If you are had not did several successful campaign on PPC ( Facebook , Google ,Yahoo,Bing) then please don’t bid on my project .Its wastage of time for both of us. This is Pilot project, I want to have test with PPC and if this is working then we can have long
Include to start : - All daz ressources - Daz file with model, morphers, clothes sele...Have an unique .FBX or .Max file with rigg and morphs Ideally i want to control the model with pose saver Problems : My library is big ans my model take morphers to others invisible models in scene. My file in export is too huge and contain too many morphers.
I have one autobot developed in C#. Currently the site for which I have created the autobot have updated the site with invisible recaptcha and is using the value of that invisible recaptcha in request header of next page request. I need to implement this thing in C# .Net or any other alternate solution from expert developers.
i have a pdf that i need printed, scanned ocr and saved as an editable word doc. formatting must remain as in the pdf and the end result must be ed...scanned ocr and saved as an editable word doc. formatting must remain as in the pdf and the end result must be editable. the doc is 130 pages so you will need access to a fast scanner with ocr software
hi looking for help writing a script that brings in financial time series data from a .htm page and others like yahoo finance or any you can suggest on a 2 minute basis for me to manipulate once inside. i've tickled R but wasted too much time and need a real programmer to help me pull this data in so i can start working with it.
Features: Handle Creation Callback ( Process & Threads ) Heartbeat System Overlay Scanner Driver Scanner ( WIP ) Anti Debug Anti Kill / Suspend Threads Anti Injection Digital Signature Scanner Anti TestMode Signature Scanner Properly Fix Driver Scanner A way that the module and usermode can communicate ( I added named pipe ) Finding Hijacked Threads
I'm using a sound sensor (Op-Amp LM393) to detect a baby cry. Micro-controller: Arduino Mega Anyone can help with C programming? Or any experienced engineer tried this detection before? Due to tight budget, I can only afford SGD20.
...transision like sudden power-cut or do whatever that is applicable to achive this situation. after 35 sec add a logo of our match /tournament name (bring this logo from invisible to visible with a modern transition like hollywood movie). then show our prize distribution list , total member, ticket price etc.(later make you know, what to be shown).
i need to detect all straight line in a tabular content image, the main propose : 1. Probabilistic Hough Transform detect after binary preporcess 2. extent the short hough line with the gradient 3. remove rebundant / non table's line 4 . final : table cells detect reference papers : Junction-based table detection in camera-captured document images
...what/who they are looking for • Proper Login/Logout function without any failure/error. I think this is fixed not sure Model Profile Changes - • Option to set (Available/Busy/Invisible) this would show up on the main page maybe right under their profile picture and be color coordinated like off line would be black on line and live would be green, and on
Hello, A few weeks ago we launched our WP WOO webshop on Siteground's Cloud Entry hosting. It is a WP WOO WPMP 2 language shop containing 2750 products. CPU is spiking to 200% (duo core) far to often and a long time in a row. Traffic = ~100 user a day We need an - EXPERIENCED - WP / WOO expert on the field of - detecting what: wp-admin. [log ind for at se URL], scripts, cron, plugins, w...
Slip Solutions of Illinois provides a non slip floor and bathtub treatment that creates an invisible, sophisticated tread design into the surface of hard mineral floors and porcelain or enamel bathtubs. SURE STEP increases a surface’s coefficient of friction by 200-400% when wet! Our treatments will not change the appearance of a floor or bathtub. It
There is an application with a built-in QR code scanner that checks the data read by the scanner by connecting to external MySQL database. Shortly it is necessary: - add new scenario of checking tickets (via request to DB get list of tickets and statuses and show it on screen with options "check", "print"), - add option to print tickets via google
I want the code in c++ with detect process running packed by vmprotect software it can detect all version of vmprotect. thank you and regard.
1. Implement an indicator to scan and draw harmonic patterns on the chart for a symbol 2. When pattern is founded, check a few indicators and if all conditions met, send a trade signal through email alert. 3. Provide a way to lookup patterns in the past (by date) without manually scrolling on the chart 4. Keep this script confidential
Papers : accurate line detection by adjusting hough transform threshold adaptively, Y Ma, J Wang, D He, J Pang - … ...transform threshold adaptively, Y Ma, J Wang, D He, J Pang - … Communications Networking and …, 2010 - [log ind for at se URL] I want to detect all line of a table in image accurately by threshold-free hough transform opencv line detect.
...each students and generate general report. Note: SMS-text-message will automatically be send to registered parents' phone number when students thumbprint on the Fingerprint scanner in the morning (that their student arrived school "Early or On Time or Late" at so so time) and in the afternoon (that their student left school "Early or On Time or Late"
We want to customize an IPad scanner app (SDK) from Occipial - [log ind for at se URL] with own logo and possibility to save the scan. All scanner functionality is in place and we use the app today, but we want some minor changes. Development language is XCode. This project requires expertise on Xcode, Swift, App registration ++. In
...person required should have very good written English. The person must be very responsible as it relates to legal cases and deadlines are to be met. The person must have a scanner, printer and internet. People having prior experience of such work can learn quicker but that is still not a must. We need to hire on urgent basis so kindly send your details
We need some one build for us an app on both iOS and android for playing the video. While the video playing the app must capture the viewer face to make sure that they are watching the video. If viewer look to other thing, it must stop the video, then if the viewer turn again to look video, it play again. Thanks
I would like to do test project with zebra scanner. I will attached you tube link that you can understand exactly what I am trying to do. This is the link. [log ind for at se URL] I am looking some who done this type of work before.
Looking for someone to work with on structured light scanner. Configuration is based on 2 calibrated cameras and 1 uncalibrated projector. Algorithms under development is Gray code and Line-Shift. OpenCV stereo rectification is being used and just projecting vertical patterns, scene is being decoded. Project is nearly finished but some of problems
...bookbinding services and contains Cafeteria. It should be supported electronically to a very large extent. For example, the functions of Some machines, such as the photocopier and scanner machine, can be made electronically. This task will include some virtual interfaces with users for areas that do not need Be feasible (but for the user will be functional,
Hi there, I want to know how to get google invisible recaptcha scores >= 0.5 Freelancers must be familiar with google recaptcha invisible v3 I want to get it from browsers like Firefox, Chromes, Opera... Please bid on budgets, thanks
Attendance system based on CodeIginter,MySQL. Simple An...ogin-system , for this you need to develop android app like, Reference 1. [log ind for at se URL] , scanner must be auto refreshed like Reference 2. [log ind for at se URL]
Please create an app for me that will look in my yahoo mail folder BIZ EXPENSES 2018. I throw any emailed receipt that I receive from any company into that folder. There are hundreds of them. I need a list of each by date, payee, and amount, and any other info that you see fit to extract. The app need not be perfect, but it should reduce my clerical
...budget is $700. Thew first version (usable / test soft) will be the simplest version with LOCAL database. In the first version we will use only 1 fiscal printer, 1 bar code scanner All drivers and documentations for these hardwares are available, so we don’t need to figure it out from the zero how it works. I will deliver all pages in PSD. Pixel perfect
I require a python expert for a open port scanning job for a range of ips this task require a scan of specific ports or scan entire mu...and stable multi-threaded IP scanning Fully configurable Port Scan Save an open port ips into text file A simple, user-friendly interface makes operation easy for users IP Scanner can scan hundreds of ips per second
...should have: When installed, the opening page should contain my logo, and the username and password fields. The app should by default have the link to my server, which is invisible to users. When a user types in the username and password, this information should be automatically inserted in the designated place in the link, and the app should automatically
...general report. I provide the hosting and sms gateway api. The Finger Print Scanner is Digital Persona U 4500 Fingerprint Scanner which we have. Note: SMS-text-message will automatically be send to registered parents' phone number when students thumbprint on the Fingerprint scanner in the morning (that their student arrived school "Early or On Time or
We need a chrome extension that will find keywords on web pages and highlight the keywords Setup: Pressing the chrome extension button will open a form that (1) a user can list a set of keywords, one per line. (2) set a weight for each keyword (3) choose the color of the keyword. Usage: When a web page is navigated to, the extension should look for each keyword combination. If a keyword is fou...
I am building a 3d scanner based on structured light technique. System is based on 2 calibrated cameras and 1 uncalibrated projector. Current system is working with gray code method which is relatively slow. I want to evaluate another methods like Gray Code + Phase Shift technique which is a hybrid method. I also tried Line Shift method but could
I need a simple app, to be able to search and navigate a small database of products with fields sku number, sku name, description, EAN number. Search should be done by text input, or by barcode scanning. Once a product is found and selected, info about the product should be displayed, with the option to show the barcode in full screen. Said operations should be done offline. The product databas...
...market and are predictably profitable. For every trade I make off of these patterns, I miss out on 20-30 more. The market is a big place. I am looking to discuss and see if a scanner to scan the market and alert to these occurrences is possible. We can either negotiate a price or work on trade. After the program is complete, I can show you how to use it
I'm interested in purchasing the foundation for a website, that can detect dog breed purely from images provided by the user. This task involves AI / Machine learning, and most importantly, it needs to run on a website, and my own domain. Here's the workflow, and features that it must have: - User can upload an image through the website. - The trained
1. Android accessibility scanner [log ind for at se URL] app to detect accessibility flaws of other Android apps. [log ind for at se URL] scanner should check if the app follows Accessibility guidelines with respect to GIGW Guidelines are provided in chapter 11 in the following attached file below
You must provide a demo for an existing system Layout similar to Square POS Support for Printer Cash Drawer Barcode scanner Email receipts Inventory managment Support for payment API's (including Square, and our own API set ) Support for SPlit bill Multi-form of payment for the same item System notifications Record logging with Sales agent IDs Promo
I have a web application for school attendance. It has been integrated with biometric finger print scanner to track students and employees check in & outs. Its also has SMS sending and Emails. My Job, I want someone to customize it so that when a student checks in and out an SMS is sent to the parent to notify them that the student has arrived at | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583662690.13/warc/CC-MAIN-20190119054606-20190119080606-00210.warc.gz | CC-MAIN-2019-04 | 13,530 | 41 |
https://manchicken.com/2007/05/ | code | Okay… so we’ve had this discussion going on for a long time. In the BadVista mailing lists Ubuntu has taken quite a beating due to its default inclusion of non-free hardware drivers. Well, that and the use of the words “open source” where the words “free software” are more appropriate.
Well, I’ve been a Kubuntu hacker since December of 2006, and I am not tickling Mark Shuttleworth’s brain, or reading the minds of the management at Canonical. But I do know that everything I’ve received as a developer on the Kubuntu project leads me to believe that Ubuntu does have some very serious love for free software, but there’s a lot of “open source” to be found there as well.
So I’ll rant on two ideas I have on how Ubuntu could really solve some of the ethical concerns from the community, and how the community should reconsider its position on Ubuntu. Before folks call me inconsistent on this point–I have argued both sides several times–let’s remember that we’re all still learning here, and we’re all still figuring out what strategy will make us more free and meet our own needs. You can call my inconsistent or a hypocrite, and you’d be right, so I’ll just go ahead and get that out of the way.
First, let’s talk non-free drivers. I know this is a powder-keg, and it seems as though everybody’s got a very strong opinion it. Let me ask you though… is it Ubuntu’s fault that these drivers are not free software? Did Ubuntu or Canonical insist on licensing them as non-free software? I doubt it. Actually, I think Ubuntu would be ecstatic if nVidia, ATI, and Broadcom (to name a few) called them up tomorrow and offered to give them specs or free software drivers. I sincerely believe that.
So then, what is Ubuntu guilty of in this situation? Including the drivers, right? Well, why do you think they included the drivers? Do you think they’re making money from ATI or nVidia to include these drivers? I don’t. I think they’re actually catching a lot of crap for including them, but that in the best interest of the users who bought hardware that does not allow for a fully free system they’re accommodating a large audience of previously non-free people who can now be more free. There’s the argument of freedom of choice and all that, yadda yadda yadda. Whatever.
If you know that nVidia is non-free, and you buy it anyway, then you are supporting a company that is against your freedom. End of story on hat one. But if you’re Mr. Smith who bought this sweet laptop, and later found out that he could have more freedom with his computer, and then after the fact realizes that it has a non-free graphics card in it, that’s not his fault. He didn’t know anything about software freedom before, and he doesn’t have the cash to upgrade to a machine that does support a fully-free environment. Have you looked at the prices of a tweaked out lappy these days? They’re certainly not free, and you can’t just swap out the video card. Besides, nVidia already made their money, so it’s no further support to them by using it.
All this to say that it is nVidia’s fault and ATI’s fault and Broadcom’s fault that these drivers are non-free. Mr. Smith will know not to buy from fascists later, but this time around he’s pretty much screwed. Let’s not blame Ubuntu for nVidia’s crimes. But there is something that I feel Ubuntu could do to help things out a little bit.
Offer a choice. I know that it’s simple to just not activate the non-free modules or to purge them, but I don’t even want that rubbish on my computer to start with because I do not agree with their license agreement. So what choice would I like to see? I’m glad you asked. I’d like to see two ISOs for every Ubuntu flavor. One that meets Mr. Smith’s needs with his non-free hardware, and one that meets my needs as a user who wants a completely free system.
I know that there’s talk of a GNUbuntu or FSF-approved flavor of Ubuntu, but I don’t even think Canonical should waste the marketing money on that. I think we should just have “Kubuntu-free,” “Ubuntu-free,” “Edubuntu-free,” and “Xubuntu-free.” In a perfect world, the free versions would be the default ISOs (e.g. Ubuntu and Ubuntu-nonfree rather than Ubuntu and Ubuntu-free), but I’ll take what I can get.
All that said, I am 100% the Ubuntu fanboy. I’ve been using Kubuntu for the better half of a year and there’s not much in the way of going back for me. Ubuntu is an excellent distribution, and Kubuntu does some insanely cool things to further KDE. There are plenty of folks criticizing Ubuntu because they want to see it fail and something else succeed. I criticize Ubuntu because I think it’s a great project, and there is always room for improvement.
Okay, I’m done ranting for now. Feel free to disagree. | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864482.90/warc/CC-MAIN-20180622123642-20180622143642-00113.warc.gz | CC-MAIN-2018-26 | 4,858 | 11 |
http://forum.kingsnake.com/gtpython/messages/24342.html | code | mobile - desktop
Available Now at New York Worms!
News & Events:
Posted by snakeguy88 on November 13, 2002 at 18:20:57:
In Reply to: Another microscope pic, this of a hookworm. posted by The cartman on November 13, 2002 at 18:17:28:
What size load did she have or were you told? Andy | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371656216.67/warc/CC-MAIN-20200406164846-20200406195346-00136.warc.gz | CC-MAIN-2020-16 | 283 | 6 |
https://www.mail-archive.com/[email protected]/msg07536.html | code | For various reasons, I need to maintain a CV, and, moreover, several different versions of it to meet different requirements.
At the moment, it's written in Markdown, maintained in a Git repository, and uses Pandoc for conversion to various file formats (e.g., PDF via LaTeX, HTML, Microsoft Word/OOXML, etc.). Unfortunately Pandoc's Markdown does not support conditional inclusion/exclusion of parts of the document (e.g., a switch or if/then/else construct). I'm faced with the prospect of maintaining several different files, and of manually migrating changes between them - a good recipe for mistakes. A Web search reveals that one solution is to set up a preprocessor to perform the conditional inclusion/exclusion operations on the Markdown file. This is cumbersome, but achievable. There may be a Pandoc filter available somewehre that can do the same. Another solution would be to switch the document to LaTeX format. From memory, there's a LaTeX package for conditional inclusion of material in documents. I'm also quite comfortable with LaTeX, so it would be a question of choosing a good LaTeX class for use in CV writing, but which would also convert cleanly to HTML. Latexml seems to be the currently maintained LaTeX to HTML conversion tool. There may be other options that I haven't considered. If anyone on the list has been here before and has suggestions to offer, these would be welcome. _______________________________________________ luv-main mailing list [email protected] https://lists.luv.asn.au/cgi-bin/mailman/listinfo/luv-main | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158450.41/warc/CC-MAIN-20180922142831-20180922163231-00415.warc.gz | CC-MAIN-2018-39 | 1,566 | 2 |
https://www.archistart.net/profile/pietroromitelli/ | code | I'm an Architect from Spoleto. After obtaining Scientific high school diploma, I moved to Rome where I attended the Faculty of Architecture at the Sapienza University. I graduated cum laude with a master degree. During my studies I spent a year in Paris within the Erasmus program, attending the Paris Belleville Ecole Nationale Superieure Architecture.
I love street photography and I practice both in analog and digital. | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572220.19/warc/CC-MAIN-20220816030218-20220816060218-00549.warc.gz | CC-MAIN-2022-33 | 422 | 2 |
http://garykaiser.sys-con.com/node/3115092 | code | |By Gary Kaiser||
|July 7, 2014 08:15 AM EDT||
As a network professional, one of your newer roles is likely troubleshooting poor application performance. For most of us, our jobs have advanced beyond network "health," towards sharing - if not owning - responsibility for application delivery. There are many reasons for this more justifiable than the adage that the network is first to be blamed for performance problems. (Your application and system peers feel they are first to be blamed as well.) Two related influencing trends come to mind:
- Increased globalization, coupled with (in fact facilitated by) inexpensive bandwidth means that the network is becoming a more critical part of the business at the same time its constraint is shifting from bandwidth to latency.
- Many of the network devices - appliances - that sit in the path between remote offices and data centers are application-fluent, designed to enhance and speed application performance, often by spoofing application behaviors; in fact, many of these have evolved in response to problems introduced by increased network latency.
In an ideal world, your application performance management (APM) solution or your application-aware network performance management (AANPM) solution would automatically isolate the fault domain for you, providing all the diagnostic evidence you need to take the appropriate corrective actions. The reality is that this isn't always the case; intermittent problems, unexpected application or network behaviors, inefficient configuration settings, or just a desire for more concrete proof mean that manual troubleshooting remains a frequent exercise. Although it may seem like there are a near-unlimited number of root causes of poor application performance, and that trial and error, guesswork and finger-pointing are valid paths toward resolution, the truth is much different. In a series of network triage blog posts, I'll identify the very limited realm of possible performance constraints, explain how to measure and quantify their impact, illustrate these using network packet trace diagrams, and offer meaningful and supportable actions you might evaluate to correct the problem. Understanding how to detect these possible performance problems (there are twelve altogether) will help you troubleshoot faster, more accurately, with greater insight, while collaborating more effectively with your application and system peers.
In this introductory entry, I present the request/reply application paradigm assumption upon which most of the analyses depend, illustrate key packet-level measurements, and provide a list of the 12 bottleneck categories we'll discuss in future blog entries to the series.
Packet Flow Diagrams
Throughout the blog series I will be using packet flow diagrams to illustrate message flows on the network, often to emphasize TCP's influence on these flows. Some are drawings to illustrate concepts and theory, others are screenshots from Compuware's Transaction Trace Analysis that illustrate the pertinent performance bottleneck. The diagram conventions are simple:
- Each arrow represents one TCP packet
- Blue arrows are used to represent data packets
- Red arrows are used to represent TCP ACK packets
- The slope of the arrow represents network delay
- Time flows from top to bottom
We will frequently use the term "operation," which we define as the unit of work that an application performs on behalf of a user; we sometimes describe it as "Click (or Enter key) to screen update." Business transactions are made up of one or more operations; for example, a user may click through a series of screens (operations) to complete a customer order update. Operations are an important demarcation point, as they represent the unique performance dimension important to the business, to the user, and to IT. The time a user waits for the system to execute an operation impacts business transaction performance and therefore productivity, and is dictated by the performance of lower-level IT-managed hardware, software and services. Note that this terminology may differ somewhat from network probes that often use the term "transaction" to reference session-layer request-response exchanges, which we discuss next.
We assume a client/server or request/reply paradigm, with TCP as the transport; this covers virtually all of what we might refer to as interactive business applications. It would include, for example, web-based apps, "fat client" apps, file server access, file transfers, backups, etc. It specifically excludes voice and video streaming as well as the presentation tier of thin-client solutions that use protocols such as ICA and PCoIP.
For each operation, there will be at least one application-level request and one corresponding application-level reply. These can be considered application messages, sometimes referred to as application-layer protocol data units (PDUs). Consider a simple client-server operation. At the application layer, a request message is passed to the client's TCP stack (TCP socket) for segmentation (into packets), addressing, and transmission; these lower layer TCP stack functions are essentially transparent to the application. At the receiving end (the server), the data from the network packets is reassembled into the application layer message and delivered to the listener service for processing. Once processing is complete, the server application passes the reply message to the server's TCP stack, and the message contents are similarly segmented and transferred across the network to the client. The performance of these request/reply message exchanges is constrained by two factors; message processing (at the server or client) and message transmission (across the network).
It is helpful, then, to consider this request/reply message exchange as the basis for performance analysis; the reassembled messages represent our network-centric insight into the application, while the packets visible in the trace file inform us how efficiently the network transports these messages.
For further insight click here for the full article, and stay tuned for Part II.
- Understanding Application Performance on the Network | Part 1
- Understanding Application Performance on the Network | Part 3
- Understanding Application Performance on the Network | Part 2
- Understanding Application Performance on the Network | Part 5
- Understanding Application Performance on the Network | Part 4
- Understanding APM on the Network
- Understanding Application Performance on the Network | Part 6
- Can Wire Data Be #APM? | @DevOpsSummit #DevOps #AI #ML #Monitoring
- IT Operations and Digital Disruption | @DevOps Summit #APM #DevOps
- Application Performance Analytics | @DevOpsSummit @Dynatrace #DevOps #APM | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120206.98/warc/CC-MAIN-20170423031200-00130-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 6,770 | 29 |
http://duxin.info/viewtopic.php?t=7012 | code | Microsoft embedded visual c download for pocket pc - The lion king brrip download
For novel ideas about building embedded systems ( both hardware firmware), join the 28 a free. Libxslt is based on libxml2 the XML C library developed for the GNOME project. 0ベースになったことを機に改称。 ウェブブラウザ ( Pocket Internet Explorer) 、 ファイルエクスプローラ搭載。. It also implements most of the EXSLT set of processor- portable extensions functions some of Saxon’ s evaluate expressions extensions. Skype is part of Microsoft. • Microsoft Vista Home Networking Setup Options The most daunting part of upgrading to Windows Vista may be trying to figure out where in the layers of menus the networking file.
Libxslt- xlst C library. Libxslt is the XSLT C library developed for the GNOME project. TheINQUIRER publishes daily news devices, reviews on the latest gadgets , INQdepth articles for tech buffs hobbyists.
XSLT itself is an XML language to define transformation for XML. MSDN Magazine Issues and Downloads.
Microsoft embedded visual c download for pocket pc. Was bedeutet die File Extension? Microsoft embedded visual c download for pocket pc. Pocket PC年 7月13日発表。 Windows CE 3.
You can make video exchange chat messages , audio calls do much more using Skype application. Read the magazine online download a formatted digital version of each issue, grab sample code apps. CodeGuru is where developers can come to share ideas downloads, articles, answers, comments, tips, questions, tricks so much more related to programming in. Liste von Dateiendungen mit alphatisch sortiert mit Erklä rung.
Windows CE is a modular/ componentized operating system that serves as the foundation of several classes of the latest from Windows, Windows Apps, Office, Xbox, Skype, Windows 10, Lumia phone, Edge & Internet Explorer, Dev Tools & more. A Pocket PC ( P/ PC, PPC), also known by Microsoft as a ' Windows Mobile Classic device', was a kind of personal digital assistant ( PDA) that runs the Windows Mobile operating has some of the abilities of modern desktop PCs.
Download Indo piece
As of, thousands of applications existed for handhelds adhering to the Microsoft Pocket PC specification, many of which were freeware. Why Windows 10 PCs. Count on the broadest range of innovative laptops, 2- in- 1s, portable All- in- Ones, and phones that you can use like a PC.
Expect long- lasting batteries, faster processors, and high- resolution displays. | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528058.3/warc/CC-MAIN-20190419201105-20190419223105-00300.warc.gz | CC-MAIN-2019-18 | 2,499 | 10 |
https://groups.yahoo.com/neo/groups/tc-list/conversations/topics/7471?o=1&d=-1 | code | tc-list KJV manuscripts again
- In my earlier post I forgot to mention another book by Ward Allen,
_Translating the New Testament epistles 1604-1611: a manuscript from King
James's Westminster Company_ (University Microfilms for Vanderbilt U.
Press, 1977) -- a diplomatic edition of Lambeth MS 98, apparently an early
or intermediate draft of the translators' work.
Harold P. Scanlin
United Bible Societies
New York, NY 10023 | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645167576.40/warc/CC-MAIN-20150827031247-00265-ip-10-171-96-226.ec2.internal.warc.gz | CC-MAIN-2015-35 | 425 | 9 |
https://www.mail-archive.com/[email protected]/msg03006.html | code | >The way Ty and I usually handle "object" properties is to give an object
>setter methods (e.g. "setAddress()") that simply set the property (e.g.
>self.Address = addr). The only downside is that you have to do this in a
>Python base class or an External method. Later, we expect to replace this
>approach with PropertyHandlers, and we already have a primitive form of
>PropertyHandler we have used with some success, but it's too crude at this
>point for a product release.
I presume if most of my classes are ZClasses external methods should do the job and
then I can just
call the setter methods when the object is created or modified?
>I have created ObjectManager and Folder dataskins before and had them work,
>but at the time I was testing with Zope 2.1.6, and it was an older version
>of ZPatterns. I haven't done much lately with them. If people are
>experiencing problems, perhaps someone could send me a bug report?
If I do try out this route (in stead of using setter methods) where does the content
of the ObjectManager
reside - sometimes I struggle with the locality of objects when working with
ZPatterns. Eg. I have a
CustomerManager specialist that creates Customers (Objectmanager Dataskin) and that
an address dataskin. I guess a simple prodding of the namespace should do the trick
but are not to
clear on how this should be done?
guessing (but the manage_addProduct part is probably not right):
<dtml-call "MyZClass_add(_.None, _, NoRedir=1)">
Sleep for entertaiment
Zope-Dev maillist - [EMAIL PROTECTED]
** No cross posts or HTML encoding! **
(Related lists - | s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948568283.66/warc/CC-MAIN-20171215095015-20171215115015-00605.warc.gz | CC-MAIN-2017-51 | 1,581 | 28 |
https://en.roomn-event.com/The-event/Datackathon | code | Engineering schools, Universities, enter the DATAROOMn, the DATACKATHON organized by ROOMn and Kynapse byOpen.
Your are awaited in MONACO on March 8 and 9, during the unavoidable event dedicated to Mobility and Digital.
★ YOUR MISSION ★
At the heart of ROOMn Forum, which brings together the biggest players of the Digital, you will work in team of 4 to solve two problems on industrial data of our partners EDF and Suez! Suggest the best algorithm and the data viz that will make you win!
Your transport and accommodation costs will be supported by the organizers.
1st PRIZE : Attend in VIP to the Grand Prix of Formula 1 of Monaco!
DO NOT WAIT ANYMORE and ENTER IN THE DATAROOMn!
To participate, submit your application by sending your Linkedin profile by mail:
The winning team of the Datackathon is the team of Centrale Supélec.
The members of the winning team receive VIP tickets for one day at the Monaco Grand Prix; Including transportation, transfers, lunch and access to the VIP stand.
In collaboration with: | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121778.66/warc/CC-MAIN-20170423031201-00048-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 1,022 | 11 |
https://www.freelancer.com.au/projects/ghostwriting/looking-for-passionate-copywriter/ | code | Job Not Found
Sorry we couldn't find the job you were looking for.
Find the most recent jobs here:
I am looking for a professional in SEO, who can check my website and improve everything needed . Wordpress knowledge required.
Need to create an attractive pitch deck/ portfolio ppt. Need interactive and engaging ppt.
bid only after check pdf i shared with this post i will provide json api only no need to word back end , only front end work required Front End Design admin panel theme (html, css, jquery, ajax,json response)
We currently have a spreadsheet with 20 tab with various company data on it. When various tabs are updated a macro is run and this takes a screenshot of each of the tabs and uploads them to a local webserver. There are 5 TV's in the office and they all show the same website which is basically the 20 tabs uploaded via the excel spreasheet on rotaing. We use google cast to send the website to t...
Hi , We need to develop a chat app with the following modules 1) Login authentication with phone number, email or fb 2) Profile page with photo, location and unique id 3) End to end chat encryption 4) Store people with labels and search/sort/group on the same. 5) Mini status broadcasting feature 6) chat/record and send in limit 7) 2nd page that displayed some targeted advertised content We also...
- this needs to be done before thursday - ask 5 questions per pizzeria Requirements: speak italian, be friendly. Rest of instructions come whne you make an offer
I am currently a freelancer having an experience of 4 and half years in the field of content writing, who is working independently for his earnings. I want to build a website as a platform for our fellow writers for which I am searching for eligible candidates. Currently, I am hiring interns at a very low price, which after the launch of the website, may increase manifold times! Moreover, the inte...
We would like the attached logo animated as per the sketch showing this.
I need a translation of 400 to 1000 words between three languages; Arabic, English and French.
I need some help with alibaba ads posting | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540530857.12/warc/CC-MAIN-20191211103140-20191211131140-00154.warc.gz | CC-MAIN-2019-51 | 2,101 | 13 |
http://www.accordancebible.com/forums/topic/12168-warning-points/ | code | OK...so I'm not the most attentive person in the world. What is a Warning Point, how to I acquire them and what can I get out of my quest for them? "Warning Point" just sounds like something I can't resist.
Posted 25 February 2014 - 11:49 PM
I believe warning points are things moderators and admins of the forum can give to users, when they should be warned about inappropriate action. A "slap on the wrist", if you will. Fortunately, we have a great community and have never had to give any out, I believe!
- Abram K-J likes this
By day: Consultant for Oaktree
By night: Freelance Trombonist and Private Instructor
Posted 26 February 2014 - 01:02 PM
Edited by Clint Cozier, 27 February 2014 - 11:35 AM.
Posted 26 February 2014 - 03:56 PM
It's nice to set goals. >:)
Edited by Joe Weaks, 26 February 2014 - 03:56 PM.
0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794870470.67/warc/CC-MAIN-20180527205925-20180527225925-00098.warc.gz | CC-MAIN-2018-22 | 889 | 13 |
https://calamares.io/calamares-3.2.13-is-out/ | code | Calamares 3.2.13 released
Aug 30, 2019
The Calamares team is happy to announce the availability of Calamares 3.2.13, a features-and-bugfix release in the Calamares 3.2.x series. There are improvements in the packagechooser module, an optional Donate button on the welcome page, and better QML support. This is a short-cycle release.
Calamares is a distribution-independent system installer, with an advanced partitioning feature for both manual and automated partitioning operations. Calamares is designed to be customizable by distribution maintainers without need for cumbersome patching, thanks to third party branding and external modules support.
This release contains contributions from (alphabetically by first name):
- Arnaud Ferraris
- Arnaud Rebillout
- Bill Auger
- Kevin Kofler
- The Calamares standard coding style – embodied in
ci/calamaresstylehas had a few updates and has now been consistently applied across the core codebase (e.g. libcalamares, libcalamaresui, calamares, but not the modules).
- KCoreAddons is now a required dependency. This lets us drop a chunk of code that was copied from KCoreAddons years ago, and use the (maintained!) upstream version instead. It also gives us KMacroExpander everywhere, which will simplify code for handling substitutions in configuration files.
- Slideshows now have a new property activatedInCalamares which controls the keyboard shortcuts (and can control timers and other properties of the slideshow, too).
- The packagechooser module can load data from the config-file, from AppData XML files referred by the config-file, and (new) also from AppStream caches by referring to an application’s AppStream id. #1212
- The partition module now understands the units KB, MB, GB which are powers-of-ten sizes, alongside the powers-of-two sizes that it already used. (thanks to Arnaud)
- The welcome module now supports a Donate button if showDonateUrl is set to a non-empty URL. #1197
- The welcome module can have URLs for the various buttons configured
directly in the module configuration (rather than in
If you experience an issue with Calamares, please tell us all about it on the Calamares issue tracker. For a full change list, or the full list of issues closed with this release, please see the Calamares code repository. Work towards the next release continues. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511023.76/warc/CC-MAIN-20231002232712-20231003022712-00648.warc.gz | CC-MAIN-2023-40 | 2,333 | 19 |
https://www.bookmarkfeeds.com/informatica-erp-users-list-informatica-erp-customer-mailing-database/ | code | Accelerate your sales cycle with the most accurate contact company data from your target market segment with DataCaptive’s Informatica ERP Users Email List. The ERP solutions from Informatica provides a unified view of data from multiple sources so that businesses get accurate, timely status updates and consequently can participate in ongoing business processes at optimal times.
- Charitable Organization In Gurgaon, Charitable Trust In India – M3M Foundation
- Python Development Company
- HOW CAN STUDENTS PREPARE THE BEST WAY FOR THEIR ASSESSMENTS TO ACHIEVE BEST RESULTS IN CLASS
- Car Servicing In London
- Patent Landscape, Patent Services, Patent Search And Analysis
- Shirdi Flight Packages From Bangalore
- Lean Six Sigma Green Belt
- AS Vs ST BBL 2019-20 Match 17 | Proxy Khel Fantasy Cricket Predictions.
- Why ReactJS Is Taking Over Frontend Development
- 54-Instant Cache Dofollow Social Bookmarking Sites March | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145897.19/warc/CC-MAIN-20200224040929-20200224070929-00537.warc.gz | CC-MAIN-2020-10 | 931 | 11 |
https://www.linksysinfo.org/index.php?threads/wrt54g-interference-with-rca-cable-modem.9996/ | code | I have a WRT54G v4.0 and it seems I need to keep the router far away from an RCA (Comcast) cable modem to keep it from dropping connection. If it is too close, the cable modem will constantly reconnect (seen by LEDs sequence). The WAN connection will be affected too. If I disable the wireless, the WAN is rock solid. Is this common? I mean don't people usually put their cable modem and router together? | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376825112.63/warc/CC-MAIN-20181213215347-20181214000847-00015.warc.gz | CC-MAIN-2018-51 | 404 | 1 |
https://discuss.bootstrapped.fm/t/hi-im-victor-a-web-developer-im-here-to-learn/3196 | code | I’ve been lurking for some time now, and I figured it’s about time I actually registered.
I’ve been a web developer for the past ten years. During the past couple of years, the vast majority of my clients have been SaaS owners. This gave me the opportunity to build a SaaS platform (which I’ve named TurboMVP) that has gotten more and more features with each iteration, to the point where I can now build and deploy an MVP really fast for my clients.
I am also the owner of Newtrien.com, a SaaS built on top of TurboMVP that makes it very easy for recipe website owners to create and publish nutrition labels on their blogs. Newtrien hasn’t had the success I hoped for, which is part of the reason I joined this community. I have a ton of technical knowledge and experience, but I have much to learn about building and running an actual business.
I don’t know how much I’ll be able to contribute to discussions, since I’m mainly hear to learn, but - with time - I hope to be able to give back at least part of what I take when it comes to knowledge. | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402131986.91/warc/CC-MAIN-20201001174918-20201001204918-00615.warc.gz | CC-MAIN-2020-40 | 1,065 | 4 |
https://forums.developer.nvidia.com/t/rapids-libraries-on-redhat/169815 | code | Hi, are Rapids Libraries also supported on red hat OS ?
NOTE: RHEL 7 & 8
conda support is provided by builds and tests on CentOS 7 or 8.
conda create commands should work with
gcc >=7.5 and the correct NVIDIA and CUDA drivers.
thank you Matt. does RH also supports (like ubuntu) dual GPU configurations ? (like on DSWS configurations)
I’m not sure I follow… Are you asking if you can have separate model GPU in the same system? If yes, I don’t see why not.
I mean, for example, 2 x rtx8000 (with or without hw nvlink). I remember some restrictions on linux drivers, but not sure.
I’m not aware of such restrictions. | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103850139.45/warc/CC-MAIN-20220630153307-20220630183307-00573.warc.gz | CC-MAIN-2022-27 | 623 | 9 |
https://www.prof-uis.com/prof-uis/tech-support/general-forum/coinbase-84312.aspx | code | to post a new message or reply to an existing one. If you are not registered, please
NOTE: Some forums may be read-only if you are not currently subscribed to
our technical support services.
coinbase pro loginhttps://hicoinbaseprologin.yahoosites.com/https://gicoinbaseprologin.yahoosites.com/
Thank you so much for this excellent article and all the best for your future. I hope you will continue to write more like this.https://girls-games.co | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363337.27/warc/CC-MAIN-20211207075308-20211207105308-00043.warc.gz | CC-MAIN-2021-49 | 444 | 5 |
https://viadeo.journaldunet.com/p/jean-luc-ballaud-280792 | code | Sbr is one of the major dental solution provider in the french dental market . Our main activities are the conception, the design of the office for the dental's private practice including the equipment and the consumable.
for more information : www.sbr.fr
Join us on Facebook page
Mes compétences :
Conduite du changement
CRM : Siebel / Salesforces
Ventes, Marketing, Conduite du Changement | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991413.30/warc/CC-MAIN-20210512224016-20210513014016-00626.warc.gz | CC-MAIN-2021-21 | 391 | 7 |
https://www.videolane.com/best-tripod-for-smartphone-cameras/ | code | Use this recommendation for enhanced mobility.
I made this video in reply to a popular question I am getting these days.
“Is a bigger tripod better for my smartphone camera?”
Feel free to ask questions.
Other combos you may consider,
– Selfie Stick with Tripod
The smartphone featured,
– iPhone 4
- Shot on iPhone 6 with Filmakr.
- Edited on iPhone 6 with VivaVideo.
- Music – “Morning Stroll” by Josh Kirsch / Media Rights Production – Youtube Audio Library.
Visit VideoLane at http://VideoLane.com
Subscribe to VideoLane on YouTube at http://www.youtube.com/videolane
Like VideoLane on Facebook at http://www.facebook.com/videolane
Friend me on Facebook at http://www.facebook.com/AdrianLeeYC | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891976.74/warc/CC-MAIN-20180123131643-20180123151643-00223.warc.gz | CC-MAIN-2018-05 | 710 | 15 |
https://n4g.com/news/23891/sony-on-xbox-360-we-have-a-better-machine-business-model-and-they-should-be-concerned | code | EGM managed to have a good old chat to Sony's Jack Tretton. He was asked directly as to how he views the Xbox 360, and he believes that the PS3 is a better machine, with a better business model and that Xbox should be a little concerned. Tretton also responded to all the bad press Sony has received by saying if they were in third place, everyone would be more sympathetic to them and wish they got back on top!
EGM: But how do you view the 360 specifically as a competitor?
JT: I think we've got a better machine, I think we've got a better business model, and I think we're going to win in the long term. I'm extremely pleased that we're selling more PS2 units than they are [360 units]. That's something that quite frankly surprised me. But while early indicators are not completely irrelevant, you can't completely ignore them, and I'd be a little concerned if I were them. On the other hand, what concerns me is if the Xbox 360 is being rejected, are the consumers on board with [next-generation] technology and is there enough [demand] there. | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655899209.48/warc/CC-MAIN-20200709065456-20200709095456-00121.warc.gz | CC-MAIN-2020-29 | 1,049 | 3 |
https://blog.sqlauthority.com/2023/10/09/sql-server-performance-functions-in-where-clause/?amp | code | When examining the performance of SQL queries, the structure of the WHERE clause significantly influences the execution speed. This blog post aims to shed light on the performance impact between questions that use functions within the WHERE clause and those that utilize direct column references. We’ll also analyze the positive implications of incorporating indexes.
Setting the Stage with Sample Data and Queries
To demonstrate the variations in performance, we’ll rely on a hypothetical SalesOrderHeader table, which houses columns such as SalesOrderID, OrderDate, CustomerID, and TotalDue. This queries are written for AdventureWorks sample database of SQL Server.
Consider the following queries, both aiming to retrieve data from 2011 but structured differently:
-- Query using the YEAR() function SELECT SalesOrderID, OrderDate, CustomerID, TotalDue FROM SalesOrderHeader WHERE YEAR(OrderDate) = 2011;
-- Query using direct column reference SELECT SalesOrderID, OrderDate, CustomerID, TotalDue FROM SalesOrderHeader WHERE OrderDate BETWEEN '2011-01-01' AND '2011-12-31';
In the first query, we apply the YEAR() function to the OrderDate column within the WHERE clause. Alternatively, the second query directly refers to the OrderDate column, defining a date range in the WHERE clause.
Analyzing Performance without Indexes
When we execute these queries without an index on the OrderDate column, both perform a full table scan to fetch the desired data:
Table 'SalesOrderHeader'. Scan count 1, logical reads 689.
Without an index, both queries read the same amount of data, resulting in similar performance. The SQL Server’s optimizer cannot perform an efficient seek operation to directly fetch the matching rows.
The Power of Indexing – WHERE clause
Let’s now create an index on the OrderDate column:
CREATE NONCLUSTERED INDEX IX_OrderDate ON Sales.SalesOrderHeader (OrderDate) INCLUDE ([CustomerID],[TotalDue]);
Upon re-running our two queries, the performance dynamics changed notably.
With the YEAR() function, the first query still resorts to a full table scan:
Table 'SalesOrderHeader'. Scan count 1, logical reads 688.
However, the query employing the direct column reference strategically uses the index for an efficient seek operation, leading to a significant reduction in I/O:
Table 'SalesOrderHeader'. Scan count 1, logical reads 119.
Unmasking the Root Cause
The considerable difference in performance is attributed to using a function on the column preventing the optimizer from effectively leveraging the index.
An index maintains data sorted based on the raw column value. But, applying a function like YEAR() or UPPER() transforms the values, which aren’t stored in the index, thereby hindering the optimizer’s ability to seek directly the matching entries.
Conversely, query filtering based on the exact column reference can leverage the sorted index values to quickly locate matching rows, resulting in significantly fewer logical reads.
Given this analysis, let’s summarize some best practices:
- For improved performance, try to avoid using functions in WHERE clauses.
- Instead of wrapping columns in functions, refer to them directly.
- If filtering by a transformed column, create an index on the raw column.
- Always compare performance with and without indexes when using functions in WHERE clauses.
Remember, leveraging indexes correctly is vital for efficient SQL queries. By understanding how functions interact with indexes, we can optimize queries to reduce reads and improve response times.
The structure of a query, mainly whether it contains functions or direct column references, drastically impacts its ability to utilize indexes for improved performance. Filtering by a raw column generally allows for index seeks, while using a function necessitates full scans. By keeping tasks out of WHERE clauses and adding supporting indexes, we can significantly enhance the performance of SQL queries.
You can always reach out to me on Twitter.
Reference: Pinal Dave (https://blog.sqlauthority.com) | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818105.48/warc/CC-MAIN-20240422082202-20240422112202-00354.warc.gz | CC-MAIN-2024-18 | 4,048 | 32 |
https://latenightstamper-stampandscrap.blogspot.com/2013/08/tricia-millers-comment-on-our-late.html | code | Thank you Tricia
I wanted to let you know that I had an awesome time this past week. Convention was pretty fun, but the LNS events were the best time. Thank you so much for making it all possible!
During my long drive today, I was thinking and I believe I have a good idea for a WOW presentation. I’ll work on it and remind you that I have something when we get closer to next year’s events.
I hope that you’ve made it safely back home. | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864343.37/warc/CC-MAIN-20180622030142-20180622050142-00402.warc.gz | CC-MAIN-2018-26 | 442 | 4 |
http://forums.cgsociety.org/archive/index.php?t-735642.html | code | 02 February 2009, 06:08 AM
Unless it changed in 7.5, not directly.
Fairly trivial to script, and there's tools around people already wrapped for it. Tried searching? I'm sure there must be something floating around.
02 February 2009, 06:46 AM
I'm not the best scripter though so something like that might actually take me a while...
I've had a look through a few forums without any luck, I'll se what I can do with the script.
02 February 2009, 08:50 AM
Hey, maybe you were right, I managed to make a pretty crummy little script that goes through and renders the maps out for a range that you specify. I had trouble getting the map files to be named with the selected object's name but this seemed okay.
You have to select an object with a rendermap property and mapping on it then run.
oNM = Selection(0).name
Set Prop = ActiveSceneRoot.AddCustomProperty ("Rendermap_Sequence_"&oNM)
Set cStart = prop.AddParameter3 ("Start",2,0)
Set cEnd = prop.AddParameter3 ("End",2,100)
Set cName = prop.AddParameter3 ("Name",8,"Enter A name for the Map")
Inspectobj "Rendermap_Sequence_"&oNM, , ,4
oStart = cStart.Value
oEnd = cEnd.Value
oName = cName.value
for i = oStart to oEnd
SetValue "PlayControl.Current", i
'Translate , i, 0, 0, siAbsolute, siLocal, siObj, siXYZ, , , , , , , , , , 0
SetValue oNM&".RenderMap.imagefilepath", "C:\Softimage\XSI_7.01\Data\XSI_SAMPLES\Render_Pictures\"&oName&"_0"&i&".png"
'SetValue oNM&".RenderMap.imagefilepath", "C:\Softimage\XSI_7.01\Data\XSI_SAMPLES\Render_Pictures\"&oName&".png"
02 February 2009, 01:39 PM
I tip my hat to you for actually taking the time to search first, then to dig your way out of a ditch with your own shovel, and even posting the shovel in proper code tags after that :)
For what it's worth: You just went up two notches in my personal scale of forum users.
What kind of problem exactly did you have with the file naming? And do you still have it? Maybe we can get that patched up if you do.
03 March 2009, 11:49 PM
Thanks mate! I was kinda happy about that myself :)
Actually I got the naming working well but I was having trouble creating sub directories with the rendermap object's name.
I thought if I put something like this :
(where oNM is the currently selected object)
XSI would automatically create a sub directory with the objects name, but it just throws an error. I guess it's because the dir doesn't exist.
03 March 2009, 11:49 PM
This thread has been automatically closed as it remained inactive for 12 months. If you wish to continue the discussion, please create a new thread in the appropriate forum. | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945037.60/warc/CC-MAIN-20180421051736-20180421071736-00245.warc.gz | CC-MAIN-2018-17 | 2,571 | 35 |
https://community.dinopoloclub.com/t/pre-builded-railways/1680/2 | code | From the time when I started playing Mini Metro, I found it very intresting. But when I found out that you can’t have pre-builded railways…
Anyways, here’s what I want:
The tracks and stations are pre-linked together,
Looks more like the original metro/subway,
And pre-loaded trains.
I tried it, and it goes like this:
(sorry for the overcrowding)
while the original Tube map goes like this:
And also, make the stations symmetrically aligned (cause when I’ve tried to align them all, some of the stations don’t look alright.
Plus, make the tracks (only in this mode) to cross with tracks (study closely at the lines, as you can also see some tracks overlaps some lines.
If this is made possible (to all current and future maps), i’ll be glad. | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584331733.89/warc/CC-MAIN-20190123105843-20190123131843-00427.warc.gz | CC-MAIN-2019-04 | 754 | 11 |
https://bbpress.org/forums/topic/problem-in-displaying-utf8-characthers-from-wp_usermeta/ | code | Problem in displaying utf8 characthers from wp_usermeta
I have problem in displaying utf8 characters from wp_usermeta. My bbPress 0.9 installation is integrated with WordPress 2.7 and uses wp_users and wp_usermeta tables from WordPress.
I use this hack to display information about user that is stored in WordPress built-in fields like first_name and last_name on profiles page. Also I use bb_get_usermeta function to print that data below username on topic page.
As you can see in this screenshot, wp_usermeta uses utf8_general_ci and on this screenshot you can see that values are correctly saved in fields. But on bbPress pages those utf8 characters are not displayed correctly. Also on profile editing page in bbPress, those characters are also nnot displayed correctly.
Finally, on topic page, you can see that utf8 from usermeta is also not displayed correctly.
Note that my registration is handled through WordPress since I redirect bbPress registration page to WordPress one, and on WordPress users fill their profile info, where everything is shown normally.
Also to note that utf8 characters in topic titles and posts are displayed correctly.
One strange thing I spotted is that if user edit it’s profile on bbPress profile editing page, and replace those question marks with correct characters, after that those characters would display normally on bbPress.
So my question is why is this happening and how to solve it?
Thanks in advance
- You must be logged in to reply to this topic. | s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246637979.29/warc/CC-MAIN-20150417045717-00205-ip-10-235-10-82.ec2.internal.warc.gz | CC-MAIN-2015-18 | 1,497 | 11 |
https://open.byu.edu/lidtfoundations/lidt_professional?book_nav=true | code | V. Becoming an LIDT Professional
Becoming an LIDT professional is more than knowing some theory, and having some design or technical skills. You must learn how to network with other professionals, engage with professional organizations, and perhaps (hopefully!) contribute your growing insights back to the research and design literature through publication. These chapters will seek to guide you on this journey, as well as in establishing a moral foundation for your work as an LIDT professional.
42. The Moral Dimensions of Instructional DesignOsguthorpe, R. T., Osguthorpe, R. , Jacob, W. J., & Davies, R. S.43. Creating an Intentional Web PresenceLowenthal, P. R., Dunlap, J. C., & Stitson, P.44. Where Should Educational Technologists Publish Their Research?Ritzhaupt, A. D., Sessums, C. D., & Johnson, M. C.45. Rigor, Influence, and Prestige in Academic PublishingRich, P. J. & West, R. E.46. Educational Technology ConferencesLowenthal, P. R.47. Networking at ConferencesBorup, J., Hawkins, A., & Gheen, T.48. PIDT, the Important Unconference for AcademicsWest, R. E.
CC BY: This work is released under a CC BY license, which means that you are free to do with it as you please as long as you properly attribute it. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943484.34/warc/CC-MAIN-20230320144934-20230320174934-00479.warc.gz | CC-MAIN-2023-14 | 1,223 | 4 |
http://intelligentplaces.org.uk/uncategorized/index-html/ | code | The BBC recently published a piece on small area referendum voting data. The information was gathered, through Freedom of Information requests, from less than half the local authorities (acting as ‘designated counting areas’) who administered the referendum. It’s a rather problematic piece of work.
This analysis is riddled with errors; there could be evidence of illegal practice; there are clear opportunities to improve practice around election data and the implications of this release have relevance to other realms of government data.
It is incorrect
The analysis and the underlying data are flawed for a number of reasons which immediately spring to mind;
Postal votes weren’t counted spatially. The article repeatedly notes that postal votes aren’t allocated to the areas of their electors beyond the principle area of the election (this is technically untrue, they’re *probably* not allocated to areas) but makes no significant attempts to account for this error.
Mass FOI mail-outs are not and cannot be a systematic data collection method. 44% of counting areas (rather, their corresponding local authorities) responded. No consideration of statistical confidence is made in the analysis, neither is any proportional demographic assessment conducted between responder and non-responders.
At its most basic level, comparing voters with population involves several layers of extrapolation. Even in an area with unprecedented high turnout it can feel spurious. Turnout is a subset of electorate, itself a subset of the eligible voters which in its turn is a subset of the population. The practice of sticking whole populations’ demographics from some nationally standardised data (usually the Census – Hello 2011, don’t you feel like a lifetime ago!) on a scatterplot against the electorate data is, to be polite, rather crude.
I’d add that none of the above should necessarily invalidate the analysis; the disciplines of social research/political science are riddled with bias and I’ve seen far less rigorous analysis published to far greater acclaim. I do think they suggest that they mean the data warrants far more thought and debate than has so far accompanied it.
Some of it is possibly illegal.
A quick tangent into electoral practice: When you vote, you’re given an elector number. This is your sequence on the electoral register within an individual polling district. These are geographical areas allocated to individual ballot boxes in polling stations. These share boundaries with the relevant electoral geography for the election in question. Local government elections being the smallest geographical election they are also (usually) in line with parishes and wards.
And so, to the article:
A few councils released their data at remarkably localised levels, down even to individual polling districts (ie ballot boxes)…or clusters of two/three/four districts… Most places mixed boxes of postal and non-postal votes for counting, so generally it’s not possible to draw comparative conclusions. However there were a few exceptions which recorded them separately, or included a very small number of non-postal votes with the postals.
As identified by @richgreenhill on Twitter, it seems that the data released gives evidence that rule 46(2) of the referendum act which require that votes from individual ballot boxes are mixed with another and that postal votes are counted alongside individual ballots was broken. It is worth caveating here that there may be reasonable responses to all these (multi-polling district ballot boxes being one immediately mentioned).
There is also no legal requirement to produce electorate statistics at an area lower than the principle counting area. The Electoral Commission’s guidance (p3) notes only the requirement for a Counting Officer (responsible officer for each Counting Area) to declare for their voting area. This means that the process of allocation votes to a smaller geography is based on local administrative practice. Elections may be heavily regulated and systematic exercises, but there is a wealth of different on-the-ground practice around management and counting of papers and onward dissemination of data not explicitly prescribed in statutory notices. In addition to creating what I would suggest is at least a legal grey area this creates a further challenge to the validity of the data.
There is a case for change.
Whether a local authority made the internal, administrative decision to collate small-area results, the data was simply not collected for this purpose. Every authority who responded would have been justified in saying ‘no’; but many released. That such a large volume of data could be gathered with relative ease suggests that the standard practice, guidance and legislation is deficient.
Does this make it any different from any other Open Data on its slow route to the public domain or anything different from the next speculative FOI-based bit of journalism? Perhaps not, perhaps this is simply all part of the process, part of the ebb and flow of an increasingly data literate society. Whatever the context of the situation, I would argue that the above challenges mean continuing to release data in this way is not desirable.
The Electoral Commission are well placed to take a view on this, perhaps with support from organisations such as the Open Data Institute and I think it would be in their interests to do so sooner rather than later. I would imagine that we’ll be seeing more Freedom of Information requests of this nature over time and data collection practices will inevitability become more varied. In a time when public perception of political institutions is challenging and intense political divisions are presented as material fact, it seems the time is right to put some thought into this practice.
There are wider implications for data release.
If there does turn out to be evidence of electoral malpractice in this data, then whose responsibility is it to identify that? Is it individual local authorities, or does the author/requester have an accountability to understand the legal context in which they operate or is it sufficient to leave it to a wider, interested community? My initial take is that administrative data is now so prevalent in the public realm that no one stakeholder can practically take sole accountability for it, regardless of legal reality.
Finally, looking towards the end of the article, we can see elements which are relevant to any non-standardised release of data.
…releasing the information was up to the discretion of councils. While some were very willing, in other cases it required a lot of persistence and persuasion…A few places such as Birmingham released their… data …on their own initiative, but in most cases the information had to be obtained by us requesting it directly, and sometimes repeatedly, from the authority.
Whatever the outcome of this (and ongoing confusion is by far the most likely) debate, there are lessons about how creators and users behave with re-purposed data. It’s never been more critical to think about what we should legitimately, pragmatically and ethically do with it. | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912205534.99/warc/CC-MAIN-20190326135436-20190326161436-00265.warc.gz | CC-MAIN-2019-13 | 7,199 | 23 |
https://support.pega.com/question/postgresql-support-72-and-73 | code | Last activity: 20 Sep 2017 20:59 EDT
PostgreSQL support for 7.2 and 7.3
As per the platform support guide (https://collaborate.pega.com/discussion/prpc-5x-6x-platform-support-guide-easy-find) "PostgreSQL is only supported for the Tomcat webserver, or JBoss with WAR installations only"
My question is why do we need to do do "war" deployments only? This is for PRPC 7.2 and 7.3
What functionality do we lose if we use "war" deployments?
If we only want to use PostgreSQL DB for development but Oracle or DB2 for production to go and an "ear" deployment for the application server, what should we be looking out for? | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950110.72/warc/CC-MAIN-20230401160259-20230401190259-00152.warc.gz | CC-MAIN-2023-14 | 615 | 6 |
https://comm.support.ca.com/kb/harvester-is-not-processing-data-javalangindexoutofboundsexception-in-harvester-wrapper-logs/kb000005177 | code | This issue is fixed in 9.3.3 and later versions. Until you upgrade your environment to 9.3.3 or later to fix this, remove the command on router that enables options template.
A typical command on Cisco routers would look like:
Remove this on all the routers that are sending options template.
You can check which routers are sending options template by running Wireshark on problematic harvester and decoding the packets as netflow fileds.
Following the below techdoc for details on how to decode packets in Wireshark: | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583681597.51/warc/CC-MAIN-20190119201117-20190119223117-00244.warc.gz | CC-MAIN-2019-04 | 518 | 5 |
https://computersdotcalm.com/microsoft/stuck-at-identifying-network/ | code | Stuck at Identifying Network….
If you have a Microsoft system stuck at ‘Identifying Network’, here is a suggestion to try to fix the issue.
First, if you are using DHCP, start an elevated command prompt and type the following:
If that doesn’t help, than you may need to reset the IP stack:
netsh int ip reset c:\tmp\reset.log | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648245.63/warc/CC-MAIN-20230602003804-20230602033804-00484.warc.gz | CC-MAIN-2023-23 | 333 | 5 |