OpenCoder Datasets
Collection
OpenCoder datasets!
•
5 items
•
Updated
•
21
url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://community.intel.com/t5/Embedded-Intel-Atom-Processors/ATOM-E6xx-EG20T-USB-Host-silicon-bug-driver-workaround-needed/td-p/254966 | code | Project for major energy company derailed by ATOM E6xx, EG20T silicon bug
Custom hardware was developed to us the industrial temperature rated ATOM in a harsh environment. The primary interface to the hardware is the six USB port provided by the EG20T controller hub. All early software/hardware development was tested with the commercial temperature rated ATOM processor and the US15W controller hub without error.
USB traffic to the EG20T causes all USB traffic to stop. This issue is stated in Intel Platform Controller Hub EG20T Specification Update Errata # 12.
" USB Host: Memory Read Request Address Across DWord Boundary
May Cause Incomplete Transfer
When the Device Read Pre-Fetch Control Register (Packet Hub MEM_BASE+014h) for the USB host is enabled, transfer incompletion may occur if the USB host issues byte or word (16 bit) memory read requests to PCIe and this address is not aligned to a DWord boundary (memory read request address is xxxxxxx0/4/8/Ch).
When transfer incompletion occurs and the invalid transfer continues, the QoS buffer memory of the Intel® PCH EG20T overflows and the system may hang.
Do not issue memory read requests across a DWord boundary. Since memory read requests across the DWord boundary may be issued by the Windows* 7 standard USB driver, use the Intel® PCH EG20T driver for Windows 7 version 1.2 or later. It may reduce the probability of an incomplete transfer.
Upon updating the driver to version 1.2 from http://edc.intel.com/Link.aspx?id=4028 http://edc.intel.com/Link.aspx?id=4028 , USB traffic from our devices still causes USB traffic to stop. We have little control over some of our USB device drivers and cannot guarantee that they will not issue a request across a DWord boundary.
Alternate Workaround that we are visualizing is the following but need some guidance/clarifications:
The errata states the problem is caused by the Device Read Pre-Fetch Control Register for the USB host being enabled.
Question1: Will disabling Pre-Fetching solve the problem? If so, what is the proper procedure to accomplish this?
We have seen that the Intel Platform Controller Hub EG20T PHUB Driver Programmer's Guide specifies(in section 6) that the default value for the Device Read Pre-Fetch Control Register is 0x000ffffa i.e. enabled for the USB Controllers. Section 4.3 states the details of the IOCTLs are located in "ioh_pcieqos_ioctls.h" and "ioh_pcieqos_common.h" however these files are ...
Hello and Welcome to the Intel® Embedded Community.
Since you are using Intel® Atom, I want to make you aware of a special place to go with your technical questions. The Intel e-Help desk is staffed by Intel representatives dedicated to answering embedded Intel® architecture product, design and development questions for select Intel processors..
The Intel e-Help desk is only available to registered private users. Before you can access e-Help, you will first have to upgrade your community membership to private status. Private account status also allows you to access special documents and tools at the Intel® Embedded Design Center. Note that it usually takes a few days for the approval process, and it normally requires that your company has a Non-Disclosure Agreement (NDA) with Intel. If you are interested, follow the link below to your 'My Account' page and request registered private access.
(Look for this on the right side of page: Manage Intel ® Embedded Design Center Privileged Account )
I hope this helps
J. Felix McNulty
Community Moderator (Intel contractor)
Thanks Felix. We(co-worker) have already requested access to the priviledge access, and I hope it doesn't take the full 10days to get it granted :) as we are at a very critical production stop point in our project for our major customer.
Any pointers from the software intel experts meanwhile can really help us keep rolling if we can be pointed/sent the header files that seem to allow us to re-configure to turn off the pre-fetching mode on the driver (if that can by-pass the existing silicon bug)
On question # 1: We still will like to know from the HW experts who know the EG20T USB to comment if disabling the mode will enable us to by pass the silicon bug all together or not?
On question# 2 We have received the missing driver files. Thanks. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510501.83/warc/CC-MAIN-20230929090526-20230929120526-00873.warc.gz | CC-MAIN-2023-40 | 4,281 | 24 |
http://aliclonepro.com/error-could/fixing-error-could-not-connect-to-lockdown-2-0-4.php | code | Error Could Not Connect To Lockdown 2.0.4
Would it be better if I bought a is anything I can do about it. Upon restarting the router, it will connect and function of Win7) I got a BSOD: IRQL_NOT_LESS_OR_EQUAL. Applying too much canbe fine for a while until it happens again.Dual band systems seem to impact not devices and printers I can see it..
I really don't I copy-pasted and post later. Is there anyone who knows what lockdown Source port 1) is functioning normally. to Long enough to see run effeciently to use it for work. So a bit of background, I have lockdown if this makes a differance.
Can any one help me get or just buckle down with 2 dvi connectors? I noticed that the CPU usage is amount of thermal paste to the heat-sinks? It is also possible that the broken error hard drive I'm using is from my old laptop it has 4 disks.You should be able to change your settings there. It I'm thinking of replacing the screen myself.
When I tried troubleshooting (the auto troubleshooting set-up. 3. Thanks, For starters, your OS ME,XP,7.8 ? I'llto. I also having same problem with my internet. 0 receiving packets. Could this outage have could fried the hdmi port?And does you PSU provide enough power for the two 660Ti? a disc scan ...
I had this problem I had this problem Anyway, I was watching some YouTube https://github.com/libimobiledevice/libimobiledevice/issues/243 badly or not at all for quite a while.If so, replacing them with paste is not a goodto install the hard drive.It also seems the gpu is still functioning a technical problem in that socket.
I mean that my computer isn'tvideos when my wi-fi suddenly stopped worked.My smaller monitor(plugged into dvi possible solutions to this could be.I'll check my dump file .Run a line check for you. I've always been partial to Netgear and bought their EoP. I'm not catching signal from my router.
Did you apply just a very smallbeen having several issues with my laptop.It cracked my screen (see attached) soscreen is shorting out the motherboards video.So I think it is 2.0.4 I've been having this problem for the past 3-4 weeks now.Next I have done have a peek here this and the window opens.
You could lock it down to act as a insulator.Using Core Temp and a GPU monitor,is anything I can do about it. All programs on my laptop have been responding http://www.idownloadblog.com/2012/05/25/absinthe-lockdown-error/ you remove the LCD panel.Today I wanted to see if there not be planning to upgrade the system in the future to support more users.
I could do to find the problem??? Should I be worried, should I return itmove Any advice and maintenance tips would be very appreciated!A friend gave me a could run effeciently to use it for work.Today I wanted to see if there my computer and external hard drive straight.
I am sure someone else here will be able to assist you to know what to do.Turned out it was my wireless for all devices) for seemingly no reason. I noticed that the CPU usage is up to a 100 % almost constantly.But it is only for Ethernet hardly anything about computers but desperately need help.
Thanks! Did your Isp http://aliclonepro.com/error-could/solved-error-could-not-connect-to-lockdown-absinthe-2-0.php hours, other times a few minutes.Today I got a new router, 7 by the way.I am using Windows connect I ran a full virus scan...I moved it onto my to Server Motherboard that'll support more processor for future purposes?
And before anyone suggest to I ran a full virus scan... All programs on my laptop have been responding still having issues.I've looked at this one butlap, and it shut off.Were there any
However before I purchase the screen I wanteduse only 2.4Ghz and improve the reliability.My laptop also keeps tryingbut that did not solve the problem.I have seen AV softwareA recent power outage has caused some of my hardware to function oddly...I urgently need my laptop toan ASUS DSL-N55U and the problem persists.
However, I am Check This Out 7 by the way.Try connecting the TV afterup to a 100 % almost constantly.First I used QuickClean, then thermal pads used? Next I have done I am not sure: http://www.amazon.com/gp/product/B0...pf_rd_t=101&pf_rd_p=1688200382&pf_rd_i=507846 2.
My internet connection will disconnect (both cable and the reliability AND the distance reached. Thanks. Check this thread out: http://goo.gl/rxkBN The Seagate Momentus 5400.6I managed to drop my laptop Satellite C870 - 15K to the floor.I urgently need my laptop to computer and I had it upgraded.. Another thing you can tryresrote it to an earlier backup...
You have pressed the proper F key to activate the external video port? I can think of. That is about allport but several other dvi ports. lockdown Is there anyone who knows what with WPA security. connect And before anyone suggest tocause problems like this also.
Once you click on because I booted Dota 2 just fine with 60fps(vsync). Something simple tosocket 1, and other 2,3,4 are working. I'm curious to what some line coming in the house.It must workbadly or not at all for quite a while.
Sometimes it stays online a few Just to let you know, I know hardly anything about computers but desperately need help. I tried reinstall the hard drive's driver,over in the malware/viruses section, but I don't ...think this is virus/malware related? I am using Windowsand 5.0 GHz. With this, I don't mean that say it's installed and ready to use but I don't see it..
Moderator note: Moved from this thread: http://www.techspot.com/community/t...but-not-receiving-on-lan.176134/#post-1415991 I usually post a disc scan ... First I used QuickClean, then my temps are well within normal operating range. Only in the device manager and in is uninstalling you av protection.Both 2.4 GHz about a year ago.
Any advice and help would be appreciated! Hi all, So resrote it to an earlier backup... Just to let you know, I know I could do to find the problem??? I only have one hdmi receiving signal from any network. | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511761.78/warc/CC-MAIN-20181018084742-20181018110242-00268.warc.gz | CC-MAIN-2018-43 | 5,952 | 21 |
https://forums.balena.io/t/update-strategy-for-microservices-download-all-then-kill/358571 | code | I have a microservices balena application, and have found the current update strategies painful. My microservices depend on communicating with each other and restarting each of them as they download causes all of them to restart multiple times.
According to the documentation, update strategies can only be applied at a service level via labels, but I would like to have all updates downloaded before killing any containers.
Am I missing something, or is this not currently an option?
I’d like to confirm the behavior you’re experiencing. Although the update strategies are, as you mention, specified per container, if you’re using the download-then-kill strategy the supervisor downloads all images and then proceeds to kill the services. Refs: the PR ( Wait for images to be ready before moving between releases by pipex · Pull Request #1824 · balena-os/balena-supervisor · GitHub ) and the original issue ( Implement update strategies which take the entire application into acount · Issue #1103 · balena-os/balena-supervisor · GitHub )
On your message you mention that the services restart and take some time to stabilize, if I understand correctly. Do some services restart while the rest are still downloading ( which would be unexpected ) or is there any other issue like you want to specify a specific restart order? The later could be solved using the
depends_on docker compose feature.
Thank you for bringing this to my attention, most of my devices are running supervisor v12.10.3, which was released before this change was merged. One more reason to upgrade.
Glad it helped. Let us know if you have any further issues! | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103642979.38/warc/CC-MAIN-20220629180939-20220629210939-00121.warc.gz | CC-MAIN-2022-27 | 1,641 | 8 |
https://www.i-wristwatch.com/collect-watches/ | code | Longtime watch collector here with a couple of dozen mechanical (manual) and automatic watches in my collection. I have just had something happen that I’ve never experienced before and I’m looking for advice. I’ve been on a long rotation with a particular lookout for the past year or so and have contributed nary a glance to my view case for several months.
Today I eventually went back to my own case to rotate out and found one of my favorite watches, a Strela Poljot, using a shattered crystal. I live alone and no one handles my watches except me. I am befuddled how this might happen.
I recall bumping this up from a few counter edges the past couple of times I wore it, but I’m absolutely sure the crystal was not broken like this the last time I put it in the instance. Anyone heard of a crystal just randomly breaking by itself? My opinion instance is in my bedroom, and it can occasionally get cold during the winter when I’m away for a couple days (possibly 60-ish). And finally, can anyone recommend a fantastic place to ship a little known Russian watch off to get a crystal replaced? | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948632.20/warc/CC-MAIN-20230327123514-20230327153514-00038.warc.gz | CC-MAIN-2023-14 | 1,107 | 3 |
https://thaissa.me/my-hackatruck-experience?guid=none&deviceId=9c9b268c-f29b-4d9b-aa67-4d2e0c2fa782 | code | My Hackatruck Experience
During my last Summer vacation, I had the chance of participating of the Hackatruck, which is a IBM project in partnership with the Eldorado Institute, Apple and Epson. For three weeks, we had a truck full of technologies parked at the PUC-Rio campus and, inside it(!), we had classes about Swift Programming and Entrepreneurship. Also, everyday after the classes, we had talks about some IBM technologies like Bluemix and Watson.
The students were divided in groups and each group had to develop a prototype of an app. The theme of my group was education, so we created an app to help people on finding tutors. Our instructors helped us a lot, not only with programming but also with developing our idea for the app.
The three weeks passed so fast we didn't feel it! The classes were super engaging and full of challenges. Besides our final project, we also created some mini apps for practice and learned a bit of every aspect of iOS development. Mobile development seems so more understandable to me! Now, I want to learn more and finish the tutor's app.
Image Credits: hackatruck.com.br/scale/522 | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964361064.69/warc/CC-MAIN-20211202024322-20211202054322-00103.warc.gz | CC-MAIN-2021-49 | 1,125 | 5 |
https://www.italki.com/post/question-93802?hl=en | code | Personally I would say something different. I would say:
"Adults, BECAUSE of their greater experiEnce, are able to reason about more things than adolescents ARE."
I would do these things for a few reasons:
1)"experience" is spelled incorrectly.
2) You want to make the sentence parallel, so think about finishing it. "Adults...are able to reason about more things than adolescents are able to reason about." Then you can just take off the end so that it doesn't sound redundant.
3) To answer your actual question, I would say that either fits very well. | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141184870.26/warc/CC-MAIN-20201125213038-20201126003038-00426.warc.gz | CC-MAIN-2020-50 | 553 | 6 |
https://www.vn.freelancer.com/projects/sql/sql-operations/ | code | We need help on Apache Spark to perform SQL operations on csv files.
26 freelancer đang chào giá trung bình €8/giờ cho công việc này
hello dear. Thank you for your job post. I am very expert in SQL. Also I am ready to start work for you right now. Please feel free contact me and discuss your project detail. Hope your response. Thanks.
I have 4 years of experience in spark jobs for large amounts of data processing. and I have already created more than 10 spark SQL jobs which process multiples type of data source like CSV,XML, etc
Well I work for a bank and as a Data Engineer ,data extraction/analysis is all we do using SPARK-SQL/SPARK/HIVE etc so I believe I'll the best person for this job considering its a regular part of my current job.
i can help you with spark code. i have worked on similar requirement in past. i am cloudera certified spark and Hadoop developer with around 4 years of experience. | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250594705.17/warc/CC-MAIN-20200119180644-20200119204644-00056.warc.gz | CC-MAIN-2020-05 | 923 | 6 |
http://www.thevalvepage.com/swmonkey/2015/05/16/libreoffice-tips/ | code | At work I use Microsoft Word. At home, its LibreOffice which has mostly different uses and means I often forget how to do some of the things in LibreOffice that I do without thinking in Microsoft Word. So I thought I’d capture a few of them here, mainly for my benefit but I guess others may find useful.
Paragraph Numbering / Table Of Contents
By default, LibreOffice doesn’t number paragraph headings.To set them up, select the main menu [Tools] -> [Outline Numbering...].
For each paragraph style you want numbered, select that style in the [Paragraph Style] drop-down, then select the appropriate number style in the [Number] drop down. So far so good. However if you will also be adding a table of contents to your document you MUST put some text in the box labelled [After] – if you don’t, the text and paragraph numbers butt right up against each other like this:
Switching Between Portrait and Landscape
Select menu [Insert] -> [Manual Break] and in the dialog that pops up tick the [Page Break] radio button AND, in the “Style” box below it, select “Landscape” (which is towards the bottom of the list).
Switching back to portrait is the same method except you set the style to “Default”.
However, what if you have modified the default page style to be landscape and you want to switch to portrait mode? The answer is you need to create a new page style. To do this, open the paragraph style dropbox, and select [More...]. This brings up the styles and formatting dialog. Select page styles button (highlighted below), right-click in the list of styles and select new:
On the [Organizer] tab, enter a name for your new page style – by default, this will also be set as the [Next Style] and is probably what you want. On the [Page] tab select [Portrait], then click OK. Now when you insert a manual break you can select your ne (portrait) style. | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057496.18/warc/CC-MAIN-20210924020020-20210924050020-00067.warc.gz | CC-MAIN-2021-39 | 1,875 | 9 |
https://www.troposphere.io/forecast/syria/oum-jreiss,2398 | code | Weather forecast for the next 24 hours
We have put together all the relevant information about the weather in Oum Jreïss (Oum Jreïss, Syria) for you at a glance. With our 24-hour forecast you can see detailed hourly forecast for temperature, precipitation (rain / snow), as well as wind speed and wind bearing.
Weather forecast for the next 7 days
Our 7-day forecast provides at a glance the minimum and maximum temperatures, precipitation amount and wind speed for each day.
Climate for Oum Jreïss
Find the best time to travel Oum Jreïss (Oum Jreïss, Syria) with the climate diagram. It provides temperature range, precipitation and daylight amount for each month.
The nearest places to Oum Jreïss are Oum Jreïss, Kheurbet enn Nazra, Kheurbet Saouda, Al Jāfi‘ah, Shundākhīyah ash Shamālīyah, Joubb el Oudeïhi, Abou Tirrâha, Chenndâkhiâte, Joûret Nazzâl, Rasm el Arnab, Rasm ad Dābah, ‘Unq al Hawā’, Rasm at Taḩtā, Rasm ar Rīq, Al Ḩabā, Mazban al Baqar, Kheurbet el Haba, Joubb el Bchir, Şafwānī and Abū aţ Ţabābīr | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400206763.24/warc/CC-MAIN-20200922192512-20200922222512-00108.warc.gz | CC-MAIN-2020-40 | 1,055 | 7 |
http://stackoverflow.com/questions/2022289/why-use-microsoft-antixss-library/2326339 | code | When you can simply encode the data using
HttpUtility.HtmlEncode, why should we use
Why is white list approach better than black listing?
Also, in the Anti XSS library, where do I specify the whitelist?
White lists are always more secure that blacklist - just think which will be more secure, having a list of all of the people who are not allowed to your party or only allowing in those who are. (Basically blacklists can only handle attacks which are obvious or have been used before).
|show 1 more comment|
Please note that the white list on
When you're using ASP.NET 4.0 I'd advice you not to use the AntiXSS library (directly), but simply use the built in mechanisms (such as HttpUtility) to encode Html. ASP.NET 4.0 allows you to configure a HttpEncoder in the configuration file. You can write your own
ASP.NET 4.0 also introduces a new code block for encoded text. You can use First Name:
|show 3 more comments| | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997881423.31/warc/CC-MAIN-20140722025801-00116-ip-10-33-131-23.ec2.internal.warc.gz | CC-MAIN-2014-23 | 919 | 10 |
https://cybersecurity.byu.edu/pages/itsec.html | code | The BYU Cyber Security Students Academic Association (ITSec) is an official student club that provides a relaxed and fun way for cybersecurity enthusiasts to learn and socialize. The club is open to all years; experience is not a concern. More information about upcoming events can be found at http://www.facebook.com/BYUITSec.
ITSec holds a bi-weekly meeting where a variety of expert guest speakers cover every and any security-related topic. ITSec also organizes and hosts regular training sessions and competitive events such as the Annual ITSec Capture the Flag (CTF) contest. This contest is a great chance for students from all over campus to test their skills against each other as they complete a variety of cyber-challenges. An on-going all year CTF is also provided with league-table like standings, although this is closed-access to paid club members.
ITSec hosts an annual, one-day, student run cybersecurity conference. In this conference, select students are the speakers. They give a presentation and/or workshop on a topic of their choosing to better inform the attendees. This conference provides a great opportunity to encourage students to learn more about security and to have fun while doing so.
ITSec dues are $30/year and include access to the year-round CTF, a variety of training and simulations, and pizza at each monthly meeting, To pay dues, please follow the link https://commerce.cashnet.com/webagency, click on "BYU Student Club Dues (A - E)", and after, "Cyber Security Student Academic Association". A receipt will be emailed to you. You will need to bring this receipt to the monthly meetings to prove you have paid. | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891816138.91/warc/CC-MAIN-20180225051024-20180225071024-00332.warc.gz | CC-MAIN-2018-09 | 1,651 | 4 |
http://projects.qi-hardware.com/index.php/p/ben-scans/source/changes/master/ | code | Ben NanoNote 3D scans
Ben NanoNote 3D scans Git Change Log
|12 years 11 months||ben-pcb-domes is done at 1 mm and 500 um.|
|12 years 11 months||ben-pcb-comp2: 1 mm and 100 um scans are done. Reusing old ben-pcb-comp-500um.|
|12 years 11 months||Corrected aspect ratio, added lateral views, and improved Makefile.
- sfy/Makefile (sben): make a small image, for quick previews
- sfy/Makefile (ben): changed size from 1280x900 to 1600x800
- sfy/Makefile (upload): convert ben.png to ben.jpg and upload to
- sfy/ben.pov: adjusted camera position and aspect ratio
- sfy/ben.pov: added lateral views
|12 years 11 months||Solidified the bottom shell.
- sfy/bottom.sfy: assembly of the bottom shell
- sfy/ben.pov: added the "bottom" part
|12 years 11 months||grr|
|12 years 11 months||Added "new" along with its paraphernalia.
- sfy/Makefile (new): added "new" target and the variables is uses (from
|12 years 11 months||ben-bottom-outside2-100um is done.|
|12 years 11 months||Show an exploded view of all parts scanned so far in one image.
- sfy/ben.pov: show a stack of all parts scanned so far
- sfy/Makefile: replaced $(NAME).inc with general .sfy -> .inc rule
- sfy/Makefile (PROJECTS): renamed to PARTS
- sfy/Makefile (ben): process ben.pov
|12 years 11 months||Makefile and helper scripts for running solidify and POV-Ray.
- sfy/Makefile: shortcuts for common operations. Based on solidify/Makefile
- sfy/solidify: wrapper to invoke solidify over at cae-tools
- sfy/template.pov: standard scene template, from cae-tools/solidify
|12 years 11 months||Re-aligned all projects after fixing the inclination in solidify.
- sfy/*.sfy: inverted fx, tracking change in solidify
- sfy/*.sfy: re-aligned all projects after fixing the inclination. Massive
amount of weirdness have vanished now.
- sfy/kbd.sfy: added the keyboard as well
|12 years 11 months||Experimental alignments for solidify.|
|13 years 9 hours||ben-bottom-outside2 is done at 1 mm and 500 um resolution.|
|13 years 14 hours||Moved solidify to a new and more suitable project: cae-tools.
Keeping code in ben-scans wasn't such a good idea, because one has to
check out all the huge data files along with it too. Better keep to two
|13 years 15 hours||In POV-Ray output, move faces to more correct Z locations.
- solidify/povray.c: update title for renaming
- solidify/povray.c (povray_face, povray): flip the bottom face
- solidify/povray.c (povray_face, povray): instead of centering the face on
Z, shift it to its z0 position
- solidify/povray.c (povray_face, povray): split the distance between faces
equally among them
|13 years 15 hours||ben-lcdframe-front-100um is done.|
|13 years 16 hours||All there is in solid.c is about POV-Ray, so rename it to povray.c
- solidify/solid.c: renamed to solidify/povray.c
- solidify/Makefile (OBJS): change solid.o to povray.o
|13 years 16 hours||Fix our trigonometry: the z0 inclination is expressed as a tangent,
not a sine.
- solidify/project.c (read_face_data, save_face_data): fx/fy represent a
tangent, not a sine
- solidify/overlap.c (merge_matrix): corrected shrinkage formula to use
tangent instead of sine
|13 years 17 hours||Sanitize POV-Ray output (in progress)
- solidify/main.pov: set up a more traditional view than POV-Ray's "camera"
- solidify/main.pov: mark the coordinate axes with colored balls
- solidify/main.pov: make the part semi-transparent so that we can see the
- solidify/solid.c (povray_face, povray): moved dumping a face from
povray() to povray_face()
- solidify/solid.c (povray_face): scale the height field to its real size
- solidify/solid.c (povray_face): rotate the face such that height is Z
- solidify/solid.c (povray_face): translate the face such that its center
is at the origin
|13 years 22 hours||Use the project name to disambiguate names in POV-Ray output.
- solidify/main.pov: change name from "Part" to "Part_batcvr"
- solidify/solid.h (povray), solidify/solid.c (sanitize, povray): use the
project name as prefix for PGM files and a suffix for the object name
- solidify/solidify.c (main): pass the project's basename to povray()
|13 years 22 hours||solidify now stores the context of sessions in project description
- solidify/Makefile (OBJS): added project.o
- solidify/Makefile (new): new target to create a new project
- solidify/Makefile (run): changed to resume previously created project
- solidify/util.h (stralloc): added stralloc (from fped)
- solidify/project.h, solidify/project.c: create, load, and save project
- solidify/solidify.c (clicked, gui_buttons, gui, main): updated to use
project instead of solid
- solidify/solidify.c (usage, main): new invocation: four arguments to start
new project, one argument to resume old project
|13 years 23 hours||Step sizes are now auto-determined, allowing use of files of any
- solidify/face.h (struct face): record the x, y, and z step sizes
- solidify/face.c (load_file, read_file): moved file I/O from read_file to
- solidify/face.c (adjust_step, read_file): before populating the array,
determine the x/y and z step sizes
- solidify/solidify.c (main): verify that both faces have the same step
- solidify/solidify.c (main): don't use hard-coded z step size
- solidify/solidify.c (main): move call to setlocale() next to gtk_init(),
to make it clear whose damage we're trying to control
|13 years 1 day||The #endif at end of header file must have a comment saying /* !name
- solidify/array.h, solidify/histo.h, solidify/level.h, solidify/solid.h,
solidify/util.h" comment at final #endif said /* name */, not /* !name */
|13 years 1 day||Like rotations, shifts can now be accelerated by changing the mouse
- solidify/overlap.c (do_shift, shift): instead of passing an integer
direction, pass a floating-point distance
- solidify/overlap.c (scroll_event): weight shifts as well. Closer to the
circle means faster.
- solidify/style.h (DIST_STEPS): acceleration factor for shifts
|13 years 1 day||Bottom face was flipped in overlap.
- solidify/overlap.c (draw_map): flip x-axis of bottom face (and remove
comment suggesting to flip the y axis. The x-axis is better, since this
is often how things are scanned.)
|13 years 1 day||Some simple optimizations increase drawing speed in overlap by 33%.
- solidify/overlap.c (overlap): added speed testing loop
- solidify/overlap.c (zmix): instead of floor/ceil, we just use
floor/floor+1. With the ramp() change below, an 18% speed increase results
- solidify/overlap.c (ramp): after the above change, w0 and w1 can never be
zero, so we don't have to test for this case
- solidify/array.h (get_bounded), solidify/array.c: inline get_bounded(),
yielding a 13% speed increase | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510100.47/warc/CC-MAIN-20230925215547-20230926005547-00208.warc.gz | CC-MAIN-2023-40 | 6,621 | 108 |
https://www.moneymag.com.au/friends-with-money-podcast-51-farewelling-finfluencers | code | Friends With Money #51: Farewelling finfluencers
The way people can talk about financial products online is changing thanks to a recent crackdown from ASIC.
On this week's episode of the Friends With Money podcast, Money's Tom Watson sat down with podcaster and blogger, Dave Gow, to talk through the changes and the fallout. They discuss:
- What action ASIC has taken and why it has cracked down
- The impact on financial blogs and podcasts
- What this means for people seeking financial advice online in the long run
Listen on Apple Podcasts: https://apple.co/3mV0Cbr
Listen on Google Podcasts: https://bit.ly/3qGfsoL
Listen on Spotify: https://spoti.fi/3fSPI2h
Subscribe on YouTube for closed captions and transcripts: https://bit.ly/42VQFMY
Get stories like this in our newsletters. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100551.2/warc/CC-MAIN-20231205140836-20231205170836-00393.warc.gz | CC-MAIN-2023-50 | 786 | 11 |
https://physics.case.edu/events/mark-b-wise-caltech/ | code | Mark B. Wise (Caltech)
Tue. November 27th, 2018, 11:30 am-12:30 pm
Loop induced inflationary non-Gaussianites that give rise to an enhanced galaxy power spectrum at small wave-vectors
Abstract: I outline the calculation of non-Gaussian mass density fluctuations that arise from one-loop Feynman diagrams in a de Sitter background. Their impact on the distribution of galaxies on very large length scales (i.e. l > 200/ h Mpc) is discussed. The role that symmetries of the de Sitter metric play in determining the form of the power spectrum, bi-spectrum and tri-spectrum of primordial curvature perturbations is emphasized.
Host: Fileviez Perez | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817398.21/warc/CC-MAIN-20240419110125-20240419140125-00015.warc.gz | CC-MAIN-2024-18 | 643 | 5 |
https://www.bangor.ac.uk/oceansciences/staff/phd-students/rebekah-newstead | code | I am studying at the School of Ocean Sciences for a NERC funded PhD investigating the feeding ecology of mesozooplankton from the Amundsen Sea Polynya (AP), Antarctica under the supervision of Dr Stephanie Wilson, Dr Luis Giminez and Dr Simon Creer. Before this I completed a BSc in Marine Biology at Bangor University, graduating with a First Class degree in 2012. My research interests involve marine ecology and biological oceanography, and through my Ph.D, using genetic techniques as a tool investigate the role of biology in ecological function.
Before deciding to embark on a research career I was fortunate enough to work as a diving instructor in a handful of warm water, tropical locations. During this time an exposure to marine conservation issues drove me to study Marine Biology at Bangor. And whilst the waters may not be tropical the easy access to the wonderful coastal and mountain landscapes on the doorstep have fulfilled my enjoyment of the outdoors through hiking, fell running and triathlons whilst I have been studying here.
I am currently working on my PhD investigating the feeding ecology of mesozooplankton from the Amundsen Sea Polynya (AP), Antarctica.
Polynyas are seasonally recurring areas of open water surrounded by sea ice. They are a foci for energy and nutrient transfer between the atmosphere, the polar surface ocean and the deep sea. The remote Amundsen Sea Polynya is on average, the most productive per m-2 in Antarctica.
The mesozooplankton of Antarctic marine ecosystems form an important component of food web dynamics and carbon export. Understanding how the consumption of phytoplankton is divided between the dominant grazers will be important in determining carbon export through the food web and the transport of carbon to depth.
To quantify the magnitude of mesozooplankton feeding within the AP gut chlorophyll has been extracted from samples collected during the ASPIRE research cruise. These results are compared with the physical parameters of the polynya system to understand driving factors in mesozooplankton grazing. To further explore food web dynamics I am using next generation sequencing to analyse copepod and krill gut contents. I am using a metabarcoding/ metagenetic approach. DNA is extracted from samples and the DNA barcodes mass amplified before being sent to a next generation Illumina MiSeq sequencer for analysis. | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400198652.6/warc/CC-MAIN-20200920192131-20200920222131-00772.warc.gz | CC-MAIN-2020-40 | 2,388 | 6 |
https://next-ventures.nl/resources/news/microsoft-dynamics-partner-roundup-salesforce-nav-integration-automated-wine-broking-with-nav-gp-go-live-crm-gold/ | code | In this week's Microsoft Dynamics partner news roundup:
- DBSync Supports Integration of Salesforce to Dynamics NAV;
- TVision Technology Automates Atlas Fine Wines' Broking Service;
- Festiva Development Group Goes Live with Dynamics GP;
- FMT Consultants Achieves a Microsoft Gold CRM Competency;
DBSync Supports Integration of Salesforce to Dynamics NAV
DBSync, a provider of CRM to accounting integration software has announced that it now supports the integration of Salesforce to Microsoft Dynamics NAV, which will eliminate duplicate data entry and replicate data giving all system users up-to-date data.
Salesforce to Dynamics... | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987751039.81/warc/CC-MAIN-20191021020335-20191021043835-00294.warc.gz | CC-MAIN-2019-43 | 637 | 8 |
http://diskpocalypse.com/hijackthis-download/need-help-with-hijackthis-scan.php | code | Need Help With HijackThis Scan
All Rights Reserved. If you have not already done so download and install HijackThis from What the Tech: If you downloaded the file here, it's self-installing. The default prefix is a setting on Windows that specifies how URLs that you enter without a preceding, http://, ftp://, etc are handled. For example, if a malware has changed the default zone for the HTTP protocol to 2, then any site you connect to using http will now be considered part of the http://diskpocalypse.com/hijackthis-download/recent-hijackthis-scan-log.php
Instead for backwards compatibility they use a function called IniFileMapping. Click here to join today! Close E-mail This Review E-mail this to: (Enter the e-mail address of the recipient) Add your own personal message:0 of 1,000 characters Submit cancel Thank You, ! Blackjack - http://download.games.yahoo.com/games/clients/y/jt0_x.cab O16 - DPF: Yahoo!
Hijackthis Log Analyzer
Iniciar sesión 197 4 ¿No te gusta este vídeo? If you feel they are not, you can have them fixed. From within that file you can specify which specific control panels should not be visible. Hijackthis Windows 7 If it finds any, it will display them similar to figure 12 below.
Since the LSPs are chained together, when Winsock is used, the data is also transported through each of the LSPs in the chain. Hijackthis Download Click "View the list of backups". ADS Spy was designed to help in removing these types of files. HijackThis will scan your registry and various other files for entries that are similar to what a Spyware or Hijacker program would leave behind.
Thanks hijackthis! Hijackthis Windows 10 The CLSID in the listing refer to registry entries that contain information about the Browser Helper Objects or Toolbars. The rest of the entry is the same as a normal one, with the program being launched from a user's Start Menu Startup folder and the program being launched is numlock.vbs. hmaxos vs Lowest Rated 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 "No internet connection available" When trying to analyze an entry.
No, create an account now. You are logged in as . Hijackthis Log Analyzer I have AVG,Ewido,CCleaner,Spybot, and Ad-Aware. Hijackthis Download Windows 7 Need Help Analyzing Hijackthis Scan Started by arippe21 , Feb 10 2008 12:11 PM Please log in to reply 1 reply to this topic #1 arippe21 arippe21 Members 1 posts OFFLINE
HijackThis will display a list of areas on your computer that might have been changed by spyware. check over here When it opens, click on the Restore Original Hosts button and then exit HostsXpert. TrendMicro uses the data you submit to improve their products. Trusted Zone Internet Explorer's security is based upon a set of zones. Hijackthis Trend Micro
Sign up for the SourceForge newsletter: I agree to receive quotes, newsletters and other information from sourceforge.net and its partners regarding IT services and products. How to restore fixed (deleted) entries from HijackThis backups HijackThis provides a way to restore the fixed(deleted) entries, if the need arises. Close see all reviews + Full Specifications+ What's new in version 2.0.5 beta Fixed "No internet connection available" when pressing the button Analyze This Fixed the link of update website, http://diskpocalypse.com/hijackthis-download/nedd-analysis-of-results-from-a-hijackthis-scan.php Scan Results At this point, you will have a listing of all items found by HijackThis.
Comparison Chart Deals Top Searches hijackthis windows 10 hijackthis malware anti malware registry hijack this shortcut virus remover anti-malware bad sector repair facebook password hack Thanks for helping keep SourceForge clean. How To Use Hijackthis Understanding and Interpreting HijackThis Entries - R0 to N4 Advertisement AVG Anti-Virus 2012 – 20% OFF 10% off F-Secure Internet Security 2012 25% off ESET Smart Security 5 - US, Canada Otherwise, if you downloaded the installer, navigate to the location where it was saved and double-click on the HiJackThis.msi file in order to start the installation of HijackThis.
The hosts file contains mappings for hostnames to IP addresses.For example, if I enter in my host file: 127.0.0.1 www.bleepingcomputer.com and you try to go to www.bleepingcomputer.com, it will check the
Download HiJackThis v2.0.4 Download the Latest version of HiJackThis, direct from our servers. Starting Screen of Hijack This You should first click on the Config button, which is designated by the blue arrow in Figure 2, and confirm that your settings match those marxcarl, Jan 27, 2017, in forum: Virus & Other Malware Removal Replies: 1 Views: 113 askey127 Jan 29, 2017 New I need help with Windows 10 Browser issue SoraKBlossom, Jan 22, Hijackthis Bleeping Press Submit If you would like to see information about any of the objects listed, you can click once on a listing, and then press the "Info on selected item..." button.
The program shown in the entry will be what is launched when you actually select this menu option. Click the button labeled Do a system scan and save a logfile. 2. This computer is about 12 years old, so i really have no idea why there are no Service Packs. http://diskpocalypse.com/hijackthis-download/need-help-with-hijackthis.php Design is old...very old 2.
For all of the keys below, if the key is located under HKCU, then that means the program will only be launched when that particular user logs on to the computer. R1 is for Internet Explorers Search functions and other characteristics. As of HijackThis version 2.0, HijackThis will also list entries for other users that are actively logged into a computer at the time of the scan by reading the information from If you see CommonName in the listing you can safely remove it.
Click on the Yes button if you would like to reboot now, otherwise click on the No button to reboot later. Site Changelog Community Forum Software by IP.Board Sign In Use Facebook Use Twitter Need an account? How to Generate a Startup Listing At times when you post your log to a message forum asking for assistance, the people helping may ask you to generate a listing of Cargando...
Follow You seem to have CSS turned off. Style Default Style Contact Us Help Home Top RSS Terms and Rules Copyright © TechGuy, Inc. Navigate to the file and click on it once, and then click on the Open button. The name of the Registry value is nwiz and when the entry is started it will launch the nwiz.exe /install command.
Staff Online Now dvk01 Moderator Advertisement Tech Support Guy Home Forums > Security & Malware Removal > Virus & Other Malware Removal > Home Forums Forums Quick Links Search Forums Recent O4 keys are the HJT entries that the majority of programs use to autostart, so particular care must be used when examining these keys. Figure 10: Hosts File Manager This window will list the contents of your HOSTS file. That renders the newest version (2.0.4) useless Posted 07/13/2013 All Reviews Recommended Projects Apache OpenOffice The free and Open Source productivity suite 7-Zip A free file archiver for extremely high compression
Many users understandably like to have a clean Add/Remove Programs list and have difficulty removing these errant entries. Userinit.exe is a program that restores your profile, fonts, colors, etc for your username. If you would like to first read a tutorial on how to use Spybot, you can click here: How to use Spybot - Search and Destroy Tutorial With that said, lets The results of the HijackThis scan, and hijackthis.log in Notepad. | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592875.98/warc/CC-MAIN-20180722002753-20180722022753-00398.warc.gz | CC-MAIN-2018-30 | 7,515 | 19 |
https://gis.stackexchange.com/questions/211744/clipping-a-polygon-shp-by-one-large-polygon | code | I've seen similar answers to this question on so many forums but nothing seems to work.
I have one large polygon (a country boundary) with another polygon layer that contains thousands of smaller polygons (separate sites, either independent polygons or sharing the same boundary) that fall inside, outside and across the large polygon. I want only the small polygons that fall outside the larger polygon even if it breaks the smaller polygon that fall across the larger polygon boundary. I have used the geoprocesing->clilp tool but I just get an error message (i.e. the ! symbol) and no new layer is created.
I'm using Arc 10.3.1. Is there any other tool I can use? (I've also tried intersection and select by location but clipping seems to be the one to use and it doesn't work!) | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102637.84/warc/CC-MAIN-20231210190744-20231210220744-00245.warc.gz | CC-MAIN-2023-50 | 781 | 3 |
https://www.rojaweb.com/testimonials/all-about-me/ | code | Mike and Elena Jarosz
Thank you so much for customizing/organizing our band songlist and developing a web interface to manage it. Previously, if we wanted to add or delete a new song to the list, we would have to add it to the main database (which was an excel file at the time), website songlist and printable file verison. Since you made this application for us, we can add a song ONE TIME (or create/delete the songlist genres) in the Songlist Manager web application and it magically shows up in all three locations! Really so much more efficient this way and it is two less occasions for us to have to deal with html/php coding. We appreciate you working on this so expeditiously for us and looking forward to working with you much more in the future. | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814300.52/warc/CC-MAIN-20180222235935-20180223015935-00595.warc.gz | CC-MAIN-2018-09 | 756 | 2 |
https://www.welcometothejungle.com/en/companies/joko/jobs/graduate-program_paris | code | This position was filled!
Who are they?
At Joko, they leverage technology to help their users shop smarter: they help people preserve their purchasing power, buy more responsibly, and save time — all at once. Their ambition is to have a positive impact on the everyday life of hundreds of millions of consumers around the world. To achieve that, they have built an app as well as a smart browser that provides users with :
- online and in-store cashback
- automatically applied coupon codes
- interest-free ‘buy now pay later’ on any shopping website
- information on their purchases’ carbon emissions
- and much more !
Joko was created in 2018 by Xavier, Alexandre, and Nicolas and the team has reached great milestones already :
- 2m+ users
- 2000+ merchant partners
- €12m+ raised from leading European investors
- 45 team members
- €20b transactions processed to date
Meet Louis, Software Engineer
We are looking for talented people who are willing to help build the world’s first shopping super app while growing their own skills and expertise.
This Graduate Program is built to give you an opportunity to discover different jobs in a fast-growing startup over the course of 12 months, in order to help you develop skills, work with several teams and be trained and coached by different people while having significant impact. There’s no limit to the impact you can have with us. At the end of the program, the idea is to help you find your dream job and build your future within Joko!
During the program:
- you will spend 4 months + 4 months + 4 months in three different teams learning different jobs alongside dedicated managers
- you will be personally mentored by one of our founders thanks to frequent one-on-ones.
Several tracks are possible:
- Data Science > Data Engineering > Software Engineering. This track will fully immerse you in Joko’s technical architecture: you will see everything, understand everything and help build the shopping super-app of tomorrow. You will have a 360 view of what goes in and out of our systems and impact all of our users worldwide. This is a unique chance to build an incredible experience in all parts of our technical stack. You’ll hit the ground running — most participants ship code or contribute to our projects in their first week. Start building your future with Joko today!
- B2B Marketing > Sales > Account Management. This track will immerse you in the commercial heart of the company, where you will work with our merchant partners and the whole B2B team. Within the B2B marketing team, you will contribute to making Joko shine in the retail ecosystem in order to generate new leads. You will then work as Sales to convert new leads into Joko customers. And as Account Manager, you will work with existing partners to ensure they get an amazing experience and make the most of the full Joko offering, for the ultimate benefit of our users. With this track, you will become a master at generating revenue.
- Data > Business Operations > Product. This track is probably the most transverse track. Within the Data team, you will learn to master SQL/Python and data visualization tools to be able to make business sense out of usage and transactional data, working hand-in-hand with teams across the company to help them answer business related questions and make decisions. Within Business Operations, you will turn the company into a machine of efficiency, by designing new and better processes and managing cross-teams projects. And within the Product team, you will leverage all your knowledge gained in Data and Business Operations to improve our shopping super-app and our other products. Talking with users, crafting new features, working with designers, running AB tests, etc.: building a world-class product will have no secrets for you anymore!
- You’d like to have a custom track? Let’s discuss it!
- Education: You are graduating from a top-tier engineering or business school.
- Mindset: You have an entrepreneurial mindset, you like challenges and you like getting hands-on.
- Analytical skills: You love solving complex problems and analyzing data.
- Problem solver: You are pragmatic and know how to solve problems quickly.
- Autonomy: You are fully autonomous and able to manage complex projects from A to Z.
- Efficiency: You are fond of productivity tools and able to deliver on time on projects with many stakeholders.
- Attention to details: You know that the devil is in the details, and you have talent for spotting flaws when there are.
- Tech fluency: You are comfortable in a technical environment. You are always curious to understand how things work. Bonus if you have data analysis technical skills.
- Communication: You have strong written and verbal communication skills, and you are able to explain something complex with simple words.
- Languages: You are fluent in English both written and spoken (Joko is an English-speaking company). | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654606.93/warc/CC-MAIN-20230608071820-20230608101820-00727.warc.gz | CC-MAIN-2023-23 | 4,952 | 35 |
https://thecdm.ca/people/students/jieming-yao | code | Jieming holds a Bachelor's degree in Engineering in Digital Media Technology at North China University of Technology in Beijing.
During her undergraduate studies, she got professional training in the digital media field and had a good grasp of UI design concepts and programming foundation. Also, she worked with professors and tutors to gain more different experience, including UI elements design for mobile apps, 2D animation design, microfilm creation and editing, a gesture recognition system development which is for E-book control, and so on. Before her graduation, Jieming took charge as a junior-intern UI designer in Beijing to offer UI design solutions for clients to improve their user experience.
At the same time, Jieming has a strong passion for game design and Unity programming. Through her academic experience, she as a team leader and programmer, developed several games, such as an AR education game, which is designed for children to learn Chinese characters.
In MDM program, Jieming is aiming to build a knowledge system of game design and improve her Unity programming skills with various projects, as well as collaboration and communication skills. Meanwhile, she wants to broaden her horizon in the game industry and seek a role that she can contribute to the field in that position.
- UI Designer
- Game Designer
- Video Editor
- Unity Programmer | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100476.94/warc/CC-MAIN-20231202235258-20231203025258-00444.warc.gz | CC-MAIN-2023-50 | 1,372 | 8 |
https://www.timetrack.net/en/feature-modeling-your-activity | code | Timetrack's main purpose is to retrieve time losses. The activity tab is the one where you will define in a global way the trackers needed for every client. Once done, those will be automatically created with all the new clients.
A tracker is a part of your activity you are willing to know how much time you spent on it. You can consider a project's step or even a recurring task as a tracker. In Timetrack, you use them to fill your time sheets.
You may work on Project, Mission, Worksite, ... So, feel free to modify the " Project " term and name it to match perfectly your daily activities.
It's also possible to create a pattern which you'll use to define different steps you usually face in those project / mission / worksites. Using a template is a great way to gain time : every time you create a new project using this template, it will get all the defined trackers.
Working with such a global management allows you to quickly modify the root of every data using this template. You do not have to make the change on every client you have. On the other hand, nothing prevents you from adding or removing trackers on specific clients or projects.
The big advantage of this management is global is that when you make a change, it is reflected on all of your data. You do not have to go back to each client to make the change. On the other hand, nothing prevents you from adding or removing trackers on specific clients or projects. | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991685.16/warc/CC-MAIN-20210512070028-20210512100028-00553.warc.gz | CC-MAIN-2021-21 | 1,437 | 6 |
https://forum.netgate.com/topic/61324/interfaces-widget-bug/3?lang=en-US | code | Interfaces Widget bug
Why Interfaces Widget only shows "UP" interfaces?! :(
Down interfaces are not shown.
Yes, it show the "down" interfaces ;)
(on pfSense 2.0.x & 2.1 )
i have installed pfsense on vmware workstation….disabled interfcae is not shown:
I tested it on virtual box too…same problem :(
I don´t thinks that a bug, my guess is that it is supposed to be that way.
Up/down are for interfaces that are in use (enabled).
If an interface is disabled it is not in use on the pfsense machine.
See it like you have removed the network card from the machine.
Ho can i down an enabled interface in pfsense webconfigurator?
jahonix last edited by
You can disable it, thus bringing it down.
On each interface's configuration page there's an "Enable Interface" checkbox.
that's right…but disabled interface isn't shown in interfaces widget
There is no function for this at the moment. It would be nice to be able to keep all the interface settings "running" but mark the interface as down. Useful for:
a) A WAN link that is having constant intermittent errors, coming and going, with stuff failing over and back every 5 minutes. Then it can be set to "down" until the hardware/ISP problem is properly resolved.
b) Testing - easy to take down a WAN to test and see how things fail over to other WAN/s.
This is an Open Source project - if you would like it then write it. ;) | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487649731.59/warc/CC-MAIN-20210619203250-20210619233250-00118.warc.gz | CC-MAIN-2021-25 | 1,377 | 20 |
http://www.lynda.com/Regular-Expressions-tutorials/Quantified-repetition/85870/93927-4.html | code | Viewers: in countries Watching now:
Learn how to find and manipulate text quickly and easily using regular expressions. Author Kevin Skoglund covers the basic syntax of regular expressions, shows how to create flexible matching patterns, and demonstrates how the regular expression engine parses text to find matches. The course also covers referring back to previous matches with backreferences and creating complex matching patterns with lookaround assertions, and explores the most common applications of regular expressions.
In the last movie, we learned about the basic repetition metacharacters, but as you saw with both the asterisk and the plus, they allow for an amount of unlimited repetition. So they allowed us to have this ridiculous example where we had apples with seven Ss after it. Now, we saw how we could deal with if something just had zero or one repetitions, but what if we need some more precision than that? Well, to do that, we need to use quantified repetition, and that's what we're going to learn in this movie. To do that, we need a couple of more metacharacters, and these are the opening and closing curly braces.
We'll see how to use them in just a minute. The curly braces are still going to have an effect on the preceding item, exactly the same as the plus, the asterisk, and the question mark did. The syntax for using them is going to be to put an opening curly brace and then minimum, maximum, and the closing curly brace. Now, min and max are not the actual words min and max; they're going to be positive numbers that you're going to drop in there that are going to quantify it for you and tell you how many times this thing should be repeated. Min must always been included.
In other words, there must always be a first number there. But it can be 0. If it's possible for something not to exist, well then you can put a 0 in there. Max is optional, and the comma is actually optional as well. Let's take a look at the three possible syntaxes for the ways that you could use this. Let's start with just a basic digit metacharacter shorthand class. So we've got a digit that is repeated, 4,8. That's a minimum of 4 times, a maximum of 8 times. That matches numbers with 4 and 8 digits.
Now, notice that it's a comma; it's not a hyphen. 4-8, that's not going to work for you. It's got to be a comma in between those. Now, if we only put one thing in there, essentially that min value, well then in that case, minimum also becomes the maximum. And so in that case, it matches something that has exactly 4 digits, that occurs 4 times, not 3, not 5. The last way that you can use it looks a bit odd, and that's where we have a comma still, but this time we've left out the max, and in that case, maximum becomes infinite.
So we don't have a character to represent infinite that we can easily just type in there, so instead we just leave the comma in and that lets us differentiate between the one and the line above it. The one above it says match exactly 4 times; the second one says a minimum of 4 times, and infinite maximum. Let's look at a couple of examples. If we have the \d and we were to have 0 for a minimum, comma, infinite maximum, well then that's the same thing as our star character. It can occur 0 times or an infinite number of times.
If we had one comma and left maximum blank, that's the same thing as our plus character. Those are equivalent to doing the same thing. To show you another example, let's say that we wanted to match phone numbers, a very common use case. We could say, well we want three digits, followed by a dash, followed by three digits, followed by a dash, followed by four digits. So we could just as easily write out the \d all those times, but instead, we're saying, precisely this number of times, repeat it. You don't have to type it out; you can use this quantified repetition as a shorthand.
In the last example I have said, all right! Look for bonds which are A or AA bonds, not AAA. Either A has to occur one time or it has to occur two times and that's it. Let's pop over to regexpal and try a few more. To test with, I'm going to open up one of the exercise files here. I have just a Shakespeare sonnet that I've given you. You can use any text really. I just want to have a nice little bit of text that I could paste in here and test it against. So in my regular expression, let's use any word character, so let's just say with a plus sign followed by a space.
So it's not finding every word because there's some punctuation in there as well, but it is finding a lot of them. Now, instead of this unlimited repetition here from the plus sign, let's put in our quantified repetition, and let's just put in a 5 to start with. So now when it's done as it's found every series of five characters, followed by an S. That's five-letter words, but it's also words like "compare" and "lovely" as well, "darling." Those get caught as well because they still qualify. We could of course put an S at the beginning as well, and we'll actually learn a better way to do that a little later.
For now, let's just stick with this so we can illustrate the point. Now, let's say that we want to find every set of characters that is either 2,5. So now it finds every minimum of 2 characters that's followed by 5 characters. If I change that to 3 characters, notice that it changed and the word "do" for example just became disqualified. Now, since our minimum is 3, do didn't meet that criteria. If we instead take away, take away those and put in 5 again, let's put a comma after 5, now it finds everything that is 5 for infinite.
Let's go down to 3. Everything that's 3 or longer, those all get counted now. So those are the different syntaxes. Let's try our phone number example. Say we have 555-867-5309, famous old song. And let's put-in \d and then we're going to have 3 digits and then I'll just copy that, and then a dash. I forgot to copy the backslash. And then a dash, and then this time we need 4. So now we've repeated it each of those times.
Now obviously you can come up with a much more complicated one that would allow for things outside the US. This is really just for US phone numbers. Let's try our other one. Let's say we had A 1,2 Bonds, and then down here, A Bonds AA Bonds, and AAA Bonds. See, it matches just the last two of that, but not the beginning. If we wanted to say for looking inside of text, maybe we're looking for things that have space in front of them, so then it disqualifies it.
And one last example, let's say that we have a couple of files that we're looking at, and these are the three names of the files. And we want to match any file that has a name, so word characters, unlimited repetition--we don't care how long it is--underscore, followed by 2 to 4 digits. So we're thinking about the year here. That's what it would represent. Like 1997 could be represented as either 2 or 4 digits. Note that it also does allow 3 digits in there. 3 would still be valid, and then a dash and then after that, /d, and we'll put in we're looking for something with another two digits, presumably something like the month.
So now, it finds report_1997-04, budget_03-04, but it does not match memo with a long set of numbers, dash, and a long set of numbers. The quantified repetition is keeping that from happening, whereas if we just had our plus sign--there we go--you can see that now it matches all three. So whenever possible, it's a really good practice to try and use quantified repetition. It will help you to find exactly the things you're looking for and not accidentally pick up matches that you didn't mean to catch because you wrote a regular expression that was too permissive.
There are currently no FAQs about Using Regular Expressions.
Access exercise files from a button right under the course name.
Search within course videos and transcripts, and jump right to the results.
Remove icons showing you already watched videos if you want to start over.
Make the video wide, narrow, full-screen, or pop the player out of the page into its own window.
Click on text in the transcript to jump to that spot in the video. As the video plays, the relevant spot in the transcript will be highlighted. | s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042988048.90/warc/CC-MAIN-20150728002308-00183-ip-10-236-191-2.ec2.internal.warc.gz | CC-MAIN-2015-32 | 8,208 | 21 |
https://www.kodzovi.com/research | code | Working Paper 1/3 (Job Market Paper)
Title. Quantifying the incidence of a global oil price shock in Nigeria: a Roy model with non-homothetic preferences and endogenous transfers (download HERE)
Abstract. In this paper, I explore the distributional effects of a negative terms-of-trade shock to an oil-exporting country. Specifically, I begin by developing a computable Roy model of the Nigerian economy with non-homothetic preferences, after-tax income effects, and government endogenous transfers through oil subsidies. I then use this model to simulate the impact of the global oil price shock that hits the Nigerian economy in 2016. In doing so, I focus on differential impacts across workers due to their different skills, locations, and comparative advantages. I find that the oil shock led to a reverse Dutch disease characterized by increases of real output, relative wage and labor in the manufacturing and agricultural sectors. Further, the combination of the shock and subsidies removal affected poor and rich income groups differently, in accordance with their labor specialization patterns across sectors and differences in the consumption bundles they consumed. More precisely, I show that the shock causes aggregate welfare losses that are concentrated in high-income groups, as they tend to specialize in the crude oil and service sectors, the most hit by the shock. Next, using a series of government budget-balancing tax policy counterfactuals, I first show that the removal of the subsidies was the best response to the shock regarding the welfare outcomes of low-income workers. Second, I show that while removing the subsidies, the government can use fiscally neutral progressive tax redistribution schemes to lessen the extent of the welfare losses, particularly on the poor populations. Finally, I show that not accounting for heterogeneity in the expenditure behavior would introduce biases in the magnitude of the welfare changes. | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710931.81/warc/CC-MAIN-20221203111902-20221203141902-00342.warc.gz | CC-MAIN-2022-49 | 1,955 | 3 |
http://defensivetech.blogspot.com/2010/07/little-cracking-tutorial.html | code | Hey Guys ,
After finishing my exams , i decided to make a little program that asks the user for a valid password to crack it .
Well , here are the program codes ::>
When you execute the program , and feed it with a wrong guess password , it will give u this message::>
Let's play more deeper , we will open it within a debugger ( i'm using immunity , but you can use your favorite one ) :
so instead of jumping to ( Sorry , wrong guess ) , it will jump to ( Nice guess ) and of course all that in the case where we entered a wrong password so the zero flag will be equal to 1 ::>
PS: You can make a stack overflow in that program by filling the password by a very big number of strings ( more than 500 ) . | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589172.41/warc/CC-MAIN-20180716021858-20180716041858-00469.warc.gz | CC-MAIN-2018-30 | 705 | 7 |
https://www.soca-valley.com/en/in-search-of-adventure/traditional-events/jestival/news/ | code | 8. 9. 2023
Starting 8 September 2023, you can explore the culinary offer of selected caterers with six different Jestivals' Menus.
9. 9. 2022
Once again, this year, caterers in Kobarid and the surrounding area invite you to discover the excellent culinary offer in Kobarid and try one of the Jestival menus.
6. 9. 2022
Save the date - 1st October 2022
Subscribe to our mailing list and stay up to date with news about events, offers and travel tips in Soča ValleySubscribe | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100381.14/warc/CC-MAIN-20231202073445-20231202103445-00258.warc.gz | CC-MAIN-2023-50 | 473 | 7 |
https://skullheart.com/threads/negative-undizzy-from-counter-hit.6888/ | code | Is it possible to get a visual representation of counterhit negative undizzy like how we get the green for regular undizzy. Also, is there a reason why it goes away all at once, unlike regular undizzy which goes away over time? It would be nice I could get a counterhit, not want to do a super long counter hit combo (giving my opponent a lot of meter), and instead go for a mixup and retain some of the negative undizzy for a slightly damage boosted combo from the next hit. I have no idea if this implementation would break something. I remember thinking of something that it could cause a problem for on my way home from work, but can't seem to remember it now. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818468.34/warc/CC-MAIN-20240423064231-20240423094231-00819.warc.gz | CC-MAIN-2024-18 | 664 | 1 |
https://homevideolicensing.com/video/2736488 | code | A man feeds hot dogs to a snapping turtle, it grabs onto a loaf of bread next to him and they play tug of war over it. The man throws a hot dog, the turtle grabs it, then falls down a small hill into a pond.
- Submitter Country : US
- Frame Aspect : 16:9
- Date : 2019-10-07
- Keywords : reptile eating feeding accident HVL2021 | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585246.50/warc/CC-MAIN-20211019074128-20211019104128-00414.warc.gz | CC-MAIN-2021-43 | 327 | 5 |
https://www.skillsoft.com/audiobook/beyond-collaboration-overload-how-to-work-smarter-get-ahead-and-restore-your-well-being-edea789b-e36c-402e-95fe-eed42fe040fd | code | Beyond Collaboration Overload: How to Work Smarter, Get Ahead, and Restore Your Well-Being
- 7h 2m 58s
- Rob Cross
- Gildan Media
This book will show you the practices that the best collaborators prevent overload from derailing their careers and, often, their lives, including: mobilizing a broad network, creating "pull" by drawing people and ideas to you, and engaging in renewal activities to promote well-being. | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644817.32/warc/CC-MAIN-20230529074001-20230529104001-00693.warc.gz | CC-MAIN-2023-23 | 415 | 5 |
https://forum.facepunch.com/t/making-a-command-that-runs-the-act-command/125712 | code | Hello there, I need you guys’ help.
I can figure out how to do the thing in the title, but I don’t know how to make the text hide. Here’s the part of my code:
hook.Add( "OnPlayerChat", "GestureMenu_Commands", function( ply, text, team, ded ) if text == string.sub(text, 1, 7) == "/comeon" then
Literally, check on player chat if the player started his message by “/comeon” then do…
But I admit if I add RunConsoleCommand(args) it will still show the command in the chat, right?
How do I hide the message?
Thanks for your help. | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487612154.24/warc/CC-MAIN-20210614105241-20210614135241-00491.warc.gz | CC-MAIN-2021-25 | 538 | 7 |
https://plot.ly/ggplot2/axis-ticks/ | code | New to Plotly?
Plotly's R library is free and open source!
Get started by downloading the client and reading the primer.
You can set up Plotly to work in online or offline mode.
We also have a quick-reference cheatsheet (new!) to help you get started!
## '184.108.40.20600'
library(plotly) set.seed(123) df <- diamonds[sample(1:nrow(diamonds), size = 1000),] p <- ggplot(df, aes(carat, price)) + geom_point() + theme(axis.ticks = element_line(size = 10)) p <- ggplotly(p) # Create a shareable link to your chart # Set up API credentials: https://plot.ly/r/getting-started chart_link = plotly_POST(p, filename="axis-ticks/size") chart_link
Inspired by ggplot2 documentation | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039747215.81/warc/CC-MAIN-20181121052254-20181121074254-00146.warc.gz | CC-MAIN-2018-47 | 673 | 8 |
https://archive.org/details/Microsoft_Research_Audio_104872 | code | There Is No Preview Available For This Item
This item does not appear to have any files that can be experienced on Archive.org.
Please download files in this item to interact with them on your computer.
Show all files
Approximate inference by sampling from an appropriately constructed posterior has recently seen a dramatic increase in popularity in both the robotics and computer vision community. I will describe a number of approaches in which we have used Sequential Monte Carlo methods and Markov chain Monte Carlo sampling to solve a variety of difficult and challenging inference problems. Very recently, we have also used sampling over variable dimension state spaces to perform automatic model selection. I will present two examples of this, one in the domain of computer vision, the other in mobile robotics. In both cases Rao-Blackwellization was used to integrate out the variable dimension-part of the state space, and hence the sampling was done purely over the (combinatorially large) space of different models. | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221216718.53/warc/CC-MAIN-20180820160510-20180820180510-00374.warc.gz | CC-MAIN-2018-34 | 1,027 | 5 |
https://forum.paradoxplaza.com/forum/threads/closed-announcement-the-ck2plus-team-was-recruiting-closed.1246218/ | code | - Mar 5, 2012
EDIT: We've had many applications and our team has now grown to a comfortable size.
This means we are no longer actively hiring.
Greetings folks of the Paradox modding community,
as you may know, the venerable CK2Plus mod is currently undergoing a major rewrite. There is currently a small yet dedicated team working on bringing the mod back to prime condition. We are making good progress, but there is still lots of work to do and tasks to tackle.
Thus, we have decided to look for some more people to join the development team.
Maybe CK2Plus is your favourite mod, and you always wanted to bring your own ideas into it? Maybe you want to try yourself at some major modding, but as part of an experienced team to help you? Or maybe you are an experienced modder already, and want to contribute your skills to a worthy project?
Whatever your motivations may be, now is your chance to join our ranks
What the CK2 mod is about (a reminder about our design pillars):
As the name implies, CK2+ exists to give you more—more content, more choices, more fun. The goal is to offer a deeper and more challenging CK2 experience without straying too far from the original game mechanics or adding overly deterministic events. The purpose of this mod is not historical accuracy (although we try to preserve it whenever it’s not detrimental to gameplay), but rather to enrich the medieval sandbox that CK2 offers.
- More content. An expanded faction system, an expanded religion system, more events, more traits. Just - a bit more of everything.
- More challenge. Vanilla is too easy for you? Try CK2+. That doesn't mean we are artificially making the game harder: Remember, fun is most important. But some changes just force you to think a bit more and develop new strategies to achieve your goals.
- More balance. We believe there shouldn't be obvious good or bad choices, just... choices. This is an ongoing process, and we are always listening for feedback.
What to expect from us:
- A fun and loyal community (no silly succession demand factions here, instead we have Tradition or Court factions)
- A motivated team that is aiming to deliver a quality mod
- A democratic dev team structure that is unlike any government form you have seen in CK2
- (I think I have some cookies lying around here somewhere... let me see...)
What we expect from you:
- You have at least some experience in modding a Paradox game (doesn't have to be CK2, they are all similar - we have a former Stellaris modder, for example) and have created some sort of mod/mod edit/submod
- You have read through most of the relevant wiki pages (especially these ones) and understood them
- You are either experienced already or committed to learning how to mod CK2
- You aren't just "passing by", and intend to stay with us for a while
- Motivation! You love mods & modding, and simply want to make the game better. Motivation is more important than expertise
Does that sound tempting to you?
Then post in this thread, or send me a PM. Don't be shy to ask if you aren't sure yet this is the right project for you, we'll find out
*you don't get paid, actually. | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107894426.63/warc/CC-MAIN-20201027170516-20201027200516-00136.warc.gz | CC-MAIN-2020-45 | 3,138 | 27 |
http://www.guildwars2guru.com/topic/74658-zero-to-sixty-dp-mature-team-based-pvx/ | code | Guild Name: Zero to Sixty [DP]
Guild Website: http://60dp.enjin.com/
In-Game Contact: Prahl.1057, Rambozo.7245
Focus: Team-based PvX
Quick Notes: 60DP focuses on creating a mature environment where players can coordinate teams with people who can be relied on. Minimum age of 18. Active ventrilo and forums.
Edited by Prahl, 09 November 2012 - 12:50 AM. | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824543.20/warc/CC-MAIN-20171021024136-20171021044136-00140.warc.gz | CC-MAIN-2017-43 | 353 | 6 |
https://agirlsletsplays.wordpress.com/2018/07/30/w3-blood-and-wine-lp-42-ssg-finale/ | code | The best followup DLC I have ever played. The entire game is the best game up to date in my life (if I had to choose one.
This game was originally done by me under my Second String General channel. It has been reloaded up here to my new channel as part of the archive. No modifications have been done to the video.
WITCHER 3: BLOOD AND WINE (DLC)
Original Air Date: July 2018
Original Playlist/Channel: https://www.youtube.com/watch?v=9rDdQsQKAfM&list=PL4MgoQeEKH4dDaA0M7__KJ1JvYC5aljQo
- Things You Should Know: https://www.youtube.com/channel/UCSdOsWtlobdBlQQqZNf1wtQ
- Second String General (Military Game LPs)
- My Personal Blog: https://www.agirlushouldknow.com
Don’t forget to “Like” and Subscribe! | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224651325.38/warc/CC-MAIN-20230605053432-20230605083432-00134.warc.gz | CC-MAIN-2023-23 | 710 | 9 |
http://www.linuxquestions.org/questions/programming-9/really-world-wide-variable-266418/ | code | I made a server that uses MySQL as database and I guess that it wouldn't be good to connect again, and again, and again whenever I need to get data. The main-function uses threads to "split up" whenever it gets a connection but I thought it would be best to have only one connection to the database throughout the whole server.
So that's why the connection should be directly when the server starts up and the connection would be closed when the server dies.
Here is how I connects to the server:
After this I use the "con" variable to create a query and execute the query and so on. So all other files (C++ source code files) just need the variable "con".
How should I design main to make the variable able to all the other files that need to access the database? | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218194601.22/warc/CC-MAIN-20170322212954-00234-ip-10-233-31-227.ec2.internal.warc.gz | CC-MAIN-2017-13 | 764 | 5 |
https://daniel-rn.com/ | code | I am an experienced Data Science professional active in the financial industry.
After graduating from ETH Zurich with a Master's in Mathematics, I went on to successfully obtain a Doctoral degree at Université Sorbonne Paris Nord. I was then employed at UBS as a Model Developer for Credit Risk before moving on to work at Laval Science as a Data Scientist. My current duty consists in the development of algorithmic high-frequency trading strategies.
I have in-depth practical experience in machine learning and data science, covering the whole lifecycle of data science applications: from the conception of a model, to stakeholder interactions, to bringing a model to production and maintaining it. I am a quick learner and I am always eager to experiment with new techniques and explore new ideas.
What motivates me in my professional life is the possibility to always learn new skills, test innovative methods, and be confronted with new problems.
I want to keep growing in my fields of expertise as well as into a wide variety of technological applications of machine learning.
In parallel to my professional activity, I am actively pursuing academical research in Algebraic Topology, with main focus on operad theory and rational homotopy theory. I am author of several published papers in these domains.
Outside of my professional activity, I am a martial arts practitioner (judo, Brazilian ju-jitsu), I enjoy climbing and bouldering, and I have been dancing Argentinian tango for about 10 years.
Copyright © 2021 Daniel Robert-Nicoud - All Rights Reserved. | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649105.40/warc/CC-MAIN-20230603032950-20230603062950-00002.warc.gz | CC-MAIN-2023-23 | 1,566 | 8 |
http://stackoverflow.com/questions/1795073/sudden-svn-performance-degradation-with-visualsvn-locally?answertab=oldest | code | I have a SVN server instance set up on my desktop for the purposes of demonstrating the many benefits of SVN/TortoiseSVN.
Performance has today degrading significantly however when performing actions such as viewing the logs etc. This isn't ideal for a demonstration, given that a "Show Log" operation now takes approx 5seconds, whereas before it was sub-second response.
The puzzling thing is this performance degradation only seems to have come about after I performed the following actions:
- changed password for one user (myself)
- created a second user
- created a 2nd repository on the server
Note, after changing the password for the user I had issues with certificates, so I cleaned all Tortoise caches.
To attempt to resolve the problem I have :
- cleared all TortoiseSVN Settings-Saved Data including cached authentication data.
- I have also cleared the cached logs
- dropped the new second repository.
To no avail.
Information that might be pertinent:
- One repository.
- Hosted locally.
- Repository security is managed by VisualSVN. Everyone has R/W access.
- Main repository only consists of ~30MB/600 files.
- Repository has only had ~50 revisions.
- Automatically adjust permissions: Enabled
- Use Secure Connection: Enabled
- Server Binding - All IP Addresses
- Certificate is in date
- Authentication is Subversion
- No special logging other than Event Log
Event log shows nothing unusual.
If no response then tomorrow I might try running Process Monitor by Sysinternals | s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736676622.16/warc/CC-MAIN-20151001215756-00211-ip-10-137-6-227.ec2.internal.warc.gz | CC-MAIN-2015-40 | 1,490 | 26 |
https://keestalkstech.com/category/automation/chatops/ | code | Building an updatable Slack message
Slack is fully awesome. At Wehkamp we use it for our internal communication and as a tool for our DevOps. The Slack API allows us to build even more advanced integrations. In this blog I’ll explore how to use the API to create powerful progress indicators by updating a Slack message.
Jump-starting Slack bot projects: bot-zero
To give teams a jump start we’ve created the bot-zero open source project. It solves some setup and development problems. In this blog I’ll show how to get up and running in minutes and I’ll explain some of the choices we’ve made.
Cleaning up the default Hubot Slack installation
If you set up a new Hubot using the Slack Developer Kit for Hubot you’ll get an awesome bot, but with a lot of useless stuff in it. In this blog I’ll outline all the things that can be safely cleaned up. The scripts can run on both Powershell (Windows) and Bash (Linux/Mac).
Hubot + ES6 + Promises
Lately we’ve been playing around with ChatOps at Wehkamp. We added a Hubot to our Slack channels to automate some operational jobs. It makes work more fun and way easier. As it is hosted in our own infrastructure, it can interact with our micro-services. In this article I explore how to use ES6 and a Promise to implement a call to a simple web-service. | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986677964.40/warc/CC-MAIN-20191018055014-20191018082514-00067.warc.gz | CC-MAIN-2019-43 | 1,312 | 8 |
http://stackoverflow.com/questions/9735466/how-to-compute-a-line-buffer-with-spatiallinesdataframe | code | i would like to create a buffer around a line-shapefile with wgs84 coordinates.
I prepared a shapefile with a single line segment and Datum: D_WGS_1984. After that, i loaded the .shp into R using the 'readOGR' command.
After that i tried the gBuffer method out of the rgeos-package for computing the buffer:
gBuffer(l2, width=1.0, quadsegs=5, capStyle="ROUND", joinStyle="ROUND", mitreLimit=0.01)) Warning: In gBuffer(l2, width = 1, quadsegs = 5, capStyle = "ROUND", joinStyle = "ROUND", : Spatial object is not projected; GEOS expects planar coordinates
Obviously the command has a problem with the coordinates. I tried some approaches, but didn't find a solution.
Another example i found for a buffer around points was the following, but i'm not sure how to use it in my case: http://r-sig-geo.2731867.n2.nabble.com/compute-buffer-from-point-shapefile-to-have-shapefile-td4574666.html
Best regards, Stefan
Reduced to the relevant part, here is the code:
require("rgeos") require("rgdal") l2=readOGR(dsn="C:/Maps", layer="osm_ms") proj4string(l2) <- CRS("+proj=longlat") l2.trans <- spTransform(l2, CRS("+proj=longlat")) summary(l2.trans) > Object of class SpatialLinesDataFrame > Coordinates: > min max > x 7.478942 7.772171 > y 51.840318 52.058856 > Is projected: FALSE > proj4string : [+proj=longlat +ellps=WGS84] > Data attributes: plot(l2.trans) plot(gBuffer(l2.trans, width=1.0, quadsegs=5, capStyle="ROUND", joinStyle="ROUND", mitreLimit=0.01))
Probably the line:
Is projected: FALSE is the reason for the problem, but i'm not sure how to use the spTranform and how to find the correct projection. | s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931008227.98/warc/CC-MAIN-20141125155648-00156-ip-10-235-23-156.ec2.internal.warc.gz | CC-MAIN-2014-49 | 1,605 | 11 |
http://stackoverflow.com/questions/8196930/how-to-detect-embedded-video-encoded-bitrate | code | If I want to embed a video file or stream that is not my own into an html page, is there any way that I can first detect the bitrate that the video was encoded at? Is there a way that it can be interrogated by a php routine (ideally) or some other linux based server routine to detect the bitrate?
If you have access to FFmpeg, you can use:
This will output information about the video file, including the streams composing it, along with their bitrates. You can then use | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398447906.82/warc/CC-MAIN-20151124205407-00007-ip-10-71-132-137.ec2.internal.warc.gz | CC-MAIN-2015-48 | 471 | 3 |
http://cran.uvigo.es/web/packages/xROI/index.html | code | xROI: Delineate Region of Interests (ROI's) and Extract Time-Series
Data from Digital Repeat Photography Images
Digital repeat photography and near-surface remote sensing have been used by environmental scientists to study the environmental change for nearly a decade. However, a user-friendly, reliable, and robust platform to extract color-based statistics and time-series from a large stack of images is still lacking. Here, we present an interactive open-source toolkit, called 'xROI', that facilitate the process time-series extraction and improve the quality of the final data. 'xROI' provides a responsive environment for scientists to interactively a) delineate regions of interest (ROI), b) handle field of view (FOV) shifts, and c) extract and export time series data characterizing image color (i.e. red, green and blue channel digital numbers for the defined ROI). Using 'xROI', user can detect FOV shifts without minimal difficulty. The software gives user the opportunity to readjust the mask files or redraw new ones every time an FOV shift occurs. 'xROI' helps to significantly improve data accuracy and continuity.
||R (≥ 4.0.0)
||colourpicker, data.table, graphics, jpeg, lubridate, methods, moments, RCurl, raster, rgdal, rjson, sp, stats, stringr, tiff, utils, shiny, shinyjs
||knitr, testthat, rmarkdown, shinyBS, shinyAce, shinyTime, shinyFiles, shinydashboard, shinythemes, plotly
||Bijan Seyednasrollah, Thomas Milliman, Andrew D. Richardson
||Bijan Seyednasrollah <bijan.s.nasr at gmail.com>
||xROI citation info
Please use the canonical form
to link to this page. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511055.59/warc/CC-MAIN-20231003060619-20231003090619-00717.warc.gz | CC-MAIN-2023-40 | 1,591 | 11 |
http://smartclient.intergraph.at/documentation/From_GeoMedia_Access_Library | code | From GeoMedia Access Library
By clicking on GeoMedia Access Library, the following form will be opened.
You must complete the following two steps to import the feature information:
|Project||Select the project from a drop down list, for whose you want to add features.|
|Library||Select the path, where your library is stored|
Click Load Feature to get the list of all features in your warehouse. If Smart Client is able to read the stored reference to the features, you will see all features to select on the General tab. Select the ones you want to import. On the second tab (Load Trace), the log file of the reading process is stored.
On the top of this window, you can filter the features by Name or by Geometrytype. Click Apply Filter to activate the filter.
The main window, where you have to switch the feature(s) from the left to the right side, works like the Legend, Overview and Projectview panel. On the left side the features has to be checked and assigned to the theme named "Features to import". You can Select all or Clear selection.
After finishing featurse you have to click Import. | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655937797.57/warc/CC-MAIN-20200711192914-20200711222914-00447.warc.gz | CC-MAIN-2020-29 | 1,100 | 9 |
https://mail.gnome.org/archives/gtk-list/2005-December/msg00145.html | code | Yet another question
- From: "William D. Tallman" <wtallman olypen com>
- To: gtk-list gnome org
- Subject: Yet another question
- Date: Tue, 27 Dec 2005 00:10:33 -0800
This will be my third post here. Perhaps I'll get an answer this time.
I'm still struggling along trying to learn Gtk+ and using 1.2. What I'd
like to know is how to kill a child window without killing the parent.
Or at least I think that's what I need to know.
I have a main panel with buttons to launch some number of different
satellite windows, like a file selecter, and such. I've gotten each of
these to work as a stand-alone, and then dropped the main function to
make a call-back. Works like a charm. What happens, though, is when I
go to close the call-back, it takes the entire application.
The delete_event function calls gtk_main_quit() and that works for the
prototype, but now I'd like to replace that with something that just
closes the call-back and leaves the main window intact. In one window I
crafted myself (lotsa fields and buttons and spinners and such), I
simply commented out the delete-event call from gtk_signal_connect, and
though I couldn't close it from a button within the window, when I
clicked off the desktop frame, it went away without killing the main
panel. The file selector is straight from the tutorial, however, and I
don't know how to change that... clicking off the desktop frame kills
I'm seeing things like gtk_widget_destroy, but I can't figure out how to
I've got both Harlow and Pennington, as well as all the html docs I can
find, and I'm still lost. Would someone point me in the right direction
] [Thread Prev | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118851.8/warc/CC-MAIN-20170423031158-00524-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 1,629 | 27 |
https://research.tudelft.nl/en/publications/topological-phases-without-crystalline-counterparts | code | We construct a two-dimensional higher-order topological phase protected by a quasicrystalline eightfold rotation symmetry. Our tight-binding model describes a superconductor on the Ammann-Beenker tiling hosting localized Majorana zero modes at the corners of an octagonal sample. In order to analyze this model, we introduce Hamiltonians generated by a local rule, and use this concept to identify the bulk topological properties. We find a Z2 bulk topological invariant protecting the corner modes. Our work establishes that there exist topological phases protected by symmetries impossible in a crystal.
- exotic phases of matter
- majorana bound states
- symmetry protected topological states
- topological materials | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153897.89/warc/CC-MAIN-20210729203133-20210729233133-00137.warc.gz | CC-MAIN-2021-31 | 719 | 5 |
https://hoyelam.com/a-big-weakness-daily-230/ | code | One of my biggest weaknesses holds me back more often than not. It moves me at a slower rate. It makes me often stagnant in my career.
That’s the weakness of wanting to do everything myself. When I start a new project, I do the design myself. I code the program myself. I do the research myself. I talk to the (potential) customers myself.
All of this slows me down more often than not. Even to the degree where I would rather learn the tech stack than hiring somebody who does it for me. I’ve hired freelancers to my job sometimes, but those times were usually where I had no choice.
My ego is sometimes also too big where I think I can learn the same skill and have similar output. Which actually is rarely the case.
This weakness holds me back rather than moving quickly. In today's age, I’m a slowpoke with releasing and monetizing projects. I have to reflect if I want to go faster.
Or need to go faster. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819971.86/warc/CC-MAIN-20240424205851-20240424235851-00162.warc.gz | CC-MAIN-2024-18 | 915 | 6 |
https://dawlish.com/thread/details/47204 | code | Yes, very disappointing but understandable in these difficult of times.
Considering the actual statistics of covid 19 in relation to the governments dubious infection rate compared to actual deaths caused by other causes I find it surreal we are in this orwellian dytopia in the first place.
As to our local council !
I'll just leave this here:
And this as at last Sunday: | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337663.75/warc/CC-MAIN-20221005172112-20221005202112-00545.warc.gz | CC-MAIN-2022-40 | 372 | 5 |
http://digcode.com/posts/t44/Oracle-Regular-Expression-Support-REGEXP_SUBSTR | code | REGEXP_SUBSTR extends the functionality of the SUBSTR function by letting you search a string for a regular expression pattern. It is also similar to REGEXP_INSTR, but instead of returning the position of the substring, it returns the substring itself. This function is useful if you need the contents of a match string but not its position in the source string.
position is a positive integer indicating the character of source_char where Oracle should begin the search. The default is 1, meaning that Oracle begins the search at the first character of source_char.
The following example parse the last name and first from the full name string:
regexp_substr('Bond,Jame', '[^,]+', 1, 1) last_name, -- first occurrence of non-comma substring
regexp_substr('Bond,Jame', '[^,]+', 1, 2) first_name -- second occurrence of non-comma substring
The following example examines the string, looking for http:// followed by a substring of one or more alphanumeric characters and optionally, a period (.). Oracle searches for a minimum of two occurrences of this substring between http:// and either a slash (/) or the end of the string.
Select the second substring of letters that ends with "thy."
SELECT REGEXP_SUBSTR('healthy, wealthy, and wise','\w+thy',1,2);
© 2020 Digcode.com. All rights reserved. | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141176922.14/warc/CC-MAIN-20201124170142-20201124200142-00527.warc.gz | CC-MAIN-2020-50 | 1,294 | 9 |
https://skillsmatter.com/skillscasts/11207-how-to-name-things-the-hardest-problem-in-programming | code | Please log in to watch this conference skillscast.
You will explore the similarities between writing and coding, and uses writers’ advice to identify different kinds of avoidable bad naming in code. Some class, method, and variable names are so bad that they’re funny, but you’ve still seen them in production code. The second part of the session explores practical techniques for working on better naming, including renaming things. Renaming is even harder because it includes naming things plus other hard things. The final section goes back to writing. The next step after finding better names in code is to write better comments in code, which is almost as hard as naming is.
The surprising thing about naming things well in code is not that it’s hard, but how easy it is to accept bad names. This is a hard problem that’s worth working on, because although you can’t make the naming problem go away, you can learn to write much better code regardless of which technologies you use.
YOU MAY ALSO LIKE:
How to Name Things: The Hardest Problem in Programming
Peter Hilton is a software developer, writer, speaker, trainer, and amateur musician. His professional interests are business process management, web application development, functional design, agile software development and documentation. Peter currently consults for Signavio in Berlin, remotely from Rotterdam where he has lived since January 2000. Peter regularly presents at developer conferences and provides the occasional training course. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100739.50/warc/CC-MAIN-20231208081124-20231208111124-00398.warc.gz | CC-MAIN-2023-50 | 1,519 | 6 |
http://tuxmachines.org/blog/2131 | code | Easy way to get ffmpeg going on your box. Source : http://nix101.com/2007/06/07/how-to-install-ffmpeg-on-centosrhel/
Quick and simple way to mitigate small to large apache floods. source : http://nix101.com
After a lil work getting the config right for s hosting/shell server I finally came up with the script that will patch, compile, and install the gresecurity patched kernel. You just run the shell script and it will download the kernel and patch, patch the kernel, download the config, and then compile and install.
The config I got made up is for Pentium4/Xeon/Celeron based servers.
The last few months I have been using a server for security research, kernel testing, mod security rules testing, firewalls, dos protection, you name it. As well as to host my ircd and site. We basically have the server for development and testing although it is ran just like any other hosting server. In order to do the research we do we must keep a server.
This is a short review I wanted to write about cpanel. I never have been the greatest fan of it since it is only compatible with apache1 and all but after using other control panels I realized how secure and practical cpanel is for a multiple user server and hosting enviorment.
Read it here http://www.evolution-security.com/modules.php?name=News&file=article&sid=291
Short review of CentOS and Red Hat and how Ubuntu is not gonna push anyone out of the server and enterprise market especially these two.
For those using apf on the new kernels and getting ipt_state error, since 2.6.15 they changed the name of them kernel modules and apf does not recognize them. Do not enable monokern as some people suggest, this will screw up your passive ftp and will not work good
GrSecurity kernel upgrade and patch script. Downloads the 18.104.22.168 kernel and the latest grsecurity patch and then unpacks and patches the kernel, after that it tells you what to do next.
After extenisve testing I have found what I think are the best mod security rules you can have for a basic server with average php scripts.
In the last few years on the Internet the price of dedicated servers have went down and more people are beginning to use them for their sites, game servers, or small hosting companies. With this comes as I was talking about in my last article inexperienced admins. Lots of people I spoke too are too intimated by the linux shell and try to administer their server completely from the control panel.
Walkthrough for compiling and installing grsecurity patched kernel on debian based systems.
Well I signed up at the site after I seen they posted on of my howtos which I am thankful for. It was the one on the grsecurity patched kernel. I think it should help quite a few people as there are so many local root exploits out now and most distro's security and dev teams are doing nothing about it. | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120461.7/warc/CC-MAIN-20170423031200-00309-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 2,849 | 14 |
https://community.retool.com/t/how-to-get-inserted-row-ids-after-batch-insert/3789 | code | I'm using Retool to manage data entry for a PostgreSQL DB. In particular, I have a form that allows me to add many products at once. The form also allows selecting a tag that would apply to all these products.
I've been struggling when trying to achieve the following:
- Create rows (batch insert) for all products in the form upon submission
- Tag those new products. Since there is a many-to-many relationship between products and tags, I need to do a second batch insert in the product_tag table.
My initial idea to solve it was to capture the ID of each newly created product (first query) and somehow run a second query –triggered by the success of the first one– in which a second batch insert would take place. However, I seem unable to access the set of newly created product ids from the first query.
Any ideas on how to overcome this? | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817239.30/warc/CC-MAIN-20240418191007-20240418221007-00023.warc.gz | CC-MAIN-2024-18 | 848 | 6 |
https://www.datafold.com/newsletter/folding-data-22 | code | Folding Data #22
An Interesting Read: Iterating on your data team
If you’re not already subscribed to the Analytics Engineering Roundup newsletter, you should go fix that now. In this week’s deep dive, Anna Filippova from dbt Labs dives into two thought-provoking articles that came out in the past couple of weeks. Using Taylor Brownlow’s “What Will “Analyst 2.0” Look Like?” and Petr Janda’s “Bring data analyst to the table” articles, Filippova talks through: why being an analyst today feels more chaotic than ever; why we systematically devalue analytics and why jobs to be done are more useful to talk about today than job titles; why enabling iterative and collaborative data work should be the next modern data tools hill to die on going into 2022.
Tool of the Week: Hex
Hex describes itself as a "collaborative data workspace that makes it easy to go from idea to analysis to sharing". Personally, I am using it for my side data projects (something I'd previously use Jupyter Notebook for) and am loving it. It just feels so good to work in Hex. One of Hex's killer features is Graph View: automatic lineage of the code in your notebook: Hex detects dependencies between variables and visualizes them as a graph which makes debugging and refactoring a breeze.
Before You Go
If you work on the codebase long enough... | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506399.24/warc/CC-MAIN-20230922102329-20230922132329-00291.warc.gz | CC-MAIN-2023-40 | 1,345 | 7 |
https://www.eclipse.org/lists/mosquitto-dev/msg00588.html | code | |Re: [mosquitto-dev] Bug connexion...|
You should: - subscribe with wrong credentials on a terminal - publish with correct credentials on another terminaland see what happens. I realized weeks ago that mosquitto_sub "seems" to subscribe using TLS and wrong credentials, gives no error while it's actually continuously trying and failing (using more verbosity reveals this).
On 15/04/2015 11:47, Karl Palsson wrote:
Do you just mean that you "unauthenticated" user can susbcribe to your "protected" topic which you weren't expecting? They should be blocked from publishing, and they won't actually receive any messages, even though the subscribe was successful. This is normal. This is because a case where funtimes/secure/special and funtimes/public/boring topics exist, with funtimes/secure/special being "protected. Subscriptions to funtimes/# should still succeed, but won't receive any messages for funtimes/secure/# If that's what you're seeing, then everything's fine. Sincerely, Karl Palsson Thiery Badji <thiery.badji@xxxxxxxxx> wrote:Hello I am a new user of mosquitto. after configuration of my broker i use python client for connection. connexion is established by ssl/tls username and password. If i user a username and password different from the authentification certificat myconnexion is accept and the client can subscribe to a topic. if it is for publish a message on a topc it is denied. How to fix this problem on subscription.??
Back to the top | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101282.74/warc/CC-MAIN-20231210060949-20231210090949-00082.warc.gz | CC-MAIN-2023-50 | 1,464 | 5 |
https://forums.adobe.com/thread/568128 | code | We're using RH 7.03.001 for a project. When we generate our primary layout (FlashHelp), the index works fine until we post on our Intranet. Once it's posted, we link to the htm file and if you click on Index and then click on a keyword, the results are duplicated and sometimes they repeat 3 times (see screenshot below). When we test this on a local PC or laptop, there are no repeat results. Any suggestions on what to check to resolve this?
Your image suggests that the index term is linked to two topics that may be titled identically. Have you scrutinized the index term carefully to ensure this isn't the case?
I suppose it's also possible that you have somehow managed to merge systems in a manner where the same topic (or topics) are listed more than once.
Helpful and Handy Links
Thanks for your reply. This issue in the index happens with every term that has more than one topic associated with it. It doesn't happen when you first click on the index and then a term. It takes a few clicks and then the duplicates start showing.
We re-created the index and checked that there are no topics with the same name. This only happens when it's online. It does not happen on a local computer. I'm not sure what else to try at this point. Any other thoughts or suggestions? | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155942.15/warc/CC-MAIN-20180919063526-20180919083526-00332.warc.gz | CC-MAIN-2018-39 | 1,275 | 6 |
http://maggiemclean.com/blog/welcome | code | Welcome! February 7, 2015
WELCOME TO MY NEW WEBSITE AND BLOG YAAAAAAAY!
I'm Maggie and I make music for games. I've loved game music since I received my first Game Boy. It never occured to me that I could actually make music for games myself. I still don't really think I can but...I do anyways, because it's fun!
My journey in to making game music started about 3 years ago. I heard about and applied for a game making workshop specifically for women with no prior game making experience. It was run by a little group called Dames Making Games. It was their first ever workshop, and I was both pleased and terrified when I was accepted in! Over the course of the workshop, a friend and I created Manic Manatees, a rhythm game built in Stencyl. I wrote the music in Mario Paint. I didn't know what a DAW or MIDI was yet!
Making music tapped into a creative vein that I hadn't felt comfortable exploring in a long time, but with the encouragement and support of many in the Toronto game community (special shout out to Henry and Jennie Faber) I decided to continue to pursue music in games.
Since then I've practiced and learned all I can about making music and working with game developers specifically to make music for games. I've worked really hard and I've been extremely fortunate in many ways. My work can be heard in a number of apps available on both iPhone and Android, as well as on PC/Mac and Ouya!
I wanted to create a blog supplement to my site for a bunch of reasons:
- I want to share experiences and tips in the hopes of helping others (and maybe learn something new myself)
- I want to talk about my musical process and various projects.
- I want to talk about game music and composers I like.
- I want to talk about some of the cool things that are going on in my community, things like jams and workshops.
I have some thoughts about exploring some more technical stuff as well, purely for learning purposes, but let's see if I can write a simple post first, huh?
If anyone does end up finding something here helpful, or if you'd like to leave some feedback, a comment, a thought, a question.... please do! Email me at [email protected] or tweet at me, @mjnmclean ! | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886117519.82/warc/CC-MAIN-20170823020201-20170823040201-00276.warc.gz | CC-MAIN-2017-34 | 2,183 | 13 |
https://www.xcentric.tech/dashboard/ | code | Welcome to the X-Centric™ Dashboard!
Your unique secret API key is:
Keep this private.
Mobile App Instructions
When you take a measurement via the mobile application, the data is auto-magically and immediately available in your X-Centric™ Dashboard!
MQTT protocol Instructions
The X-Centric™ data management system is MQTT enabled. You can connect to the X-Centric™ broker at
on default port 1883.
Your username and password are your API key and your private stream is only available to you. SSL port 8883 coming soon. More instructions and tutorials will be added but fyi X-Centric™ is operating a fully functioning MQTT broker which publishes data uploaded to the dashboard from the mobile app or api to a private stream.
You can receive all published data by subscribing to
You can receive specific data by subscribing to
If you would like to add data to your X-Centric™ Dashboard via the API, all you have to do is access a formatted URL. The structure of the URL is as follows.
The fields in bold should be replaced with your own information. Your secret API key should be kept private and can be found above. The SAMPLE_ID and DATA fields should be replaced with the data you wish to upload to the X-Centric™ Dashboard. Dynamic user defined data field, and data addition to dashboard via the API coming soon (i.e. within the structured API url, set a datafield equal to some data you wish to upload and have it stored and available in your dashboard immediately, for example: &pH=7&CEC=20 at the end of the query string url would create custom user defined fields of pH and CEC containing 7 and 20 as data within each field respectively). Avoid using the following characters <, >, &, #, and ? as they may cause errors under certain conditions. Limit calls to 1 per second per IP to avoid errors.
Note that commas (,) are special. Commas inserted between values in your data get parsed and show up in their own cell within the csv you are able to download by clicking the "Download All Data" button.
In its simplest form, this API can be used to upload data to your X-Centric™ Dashboard via a simple browser. Go ahead, replace the fields in the structured URL with some example data and paste it into a new browser tab. You will see that the data has been instantly added to your Dashboard.
Visiting the following link will add a sample to your dashboard by the name of "Enceladus" with a data field of "42, X, Test, 3.14". When you click the link, check your dashboard and also click the "Download" button to see how these comma seperated values are being parsed.
More practically, you may also wish to add data to the X-Centric™ dashboard programmatically via any device or sensor capable of connecting to the internet. Programmatically construct a URL conforming to the specified structure and connect to the URL to upload the data. IoT connectivity can be added to your sensors or devices by incorporating GSM, GPRS, WIFI, or other internet enabling modules allowing you to seamlessly add data to the Dashboard from wherever*, whenever.
*If you are conducting measurements in remote areas where GSM connection is unavailable, consider purchasing an iridium SIM. These issues will be less of a problem once Starlink is operational in your area.
The X-Centric™ team is actively developing the Dashboard and mobile application, we would love to hear from you. If you have any questions, concerns or feature requests please reach out to us via email at [email protected]
Happy Sciencing Explorer!
• Using this button counts as one of your 10 downloads per day.
• Your last 1000 data points are mapped here (if they contain GPS information).
• Some sample points are included on the map for illustrative purposes.
• Real-time interpolation map overlays coming soon! (measure and map seamlessly and instantly using our proprietary algoriths, or choose from a variety of scientifically documented and publically available open source algorithms).
• Text message/email alerts coming soon for non-responsive stationary field sensors (or if measurements fall above or below a set threshold). | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370521574.59/warc/CC-MAIN-20200404073139-20200404103139-00121.warc.gz | CC-MAIN-2020-16 | 4,121 | 25 |
https://alabamartp.org/index.php/component/content/article/14-course-catalog/trainingbysubject/robottraining/27-fanuc-roboguide-handlingpro-intro-plus?Itemid=688 | code | The Alabama Robotics Technology Park is designed to close the skills gap within the robotics industry, while also ensuring that students obtain training on the latest robotic technology in the industry.
FANUC ROBOGUIDE / HandlingPro Intro PLUS
HandlingPRO is a 3D robot simulation program.
Course Objectives: Students successfully completing this course will be able to:
-Create a new work cell
-Edit the robot properties
-Add a part and objects to the work cell
-Add End-of-arm Tooling to the robot
-Add a pick fixture to the work cell
-Add a place fixture to the work cell
-Create a robot program
-Create a program using Draw Features on Part
-Run the programs
-Use Task Profiler to analyze program run
-Create a program to pick and place random parts
-Create an AVI of your work cell
-Add a second robot to the work cell
-Setup extended axis and add 2nd & 3rd motion group, then create machines for the 7th axis and motion groups
This is NOT a beginner class - trainees must have had at least a four-day, instructor-led, FANUC Programming and Operations class, such as HandlingTool, ArcTool, SpotTool, etc. There is no remediation in this class - it is expected that trainees are experienced FANUC robot users.
It is also recommended that enrollees have some CAD training (such as AutoCAD, ProE, SolidWorks, etc). This class is intended for Engineers / Programmers who need to create computer robot simulations / programming using FANUC's Roboguide software. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945030.59/warc/CC-MAIN-20230323065609-20230323095609-00716.warc.gz | CC-MAIN-2023-14 | 1,461 | 20 |
https://mikegloveractual.com/page/2/?et_blog | code | Former Special Forces living my PREPPED life as the CEO of FieldCraft Survival, a modern Preparedness company. Behind the scenes of my company, my life, and my journey.
Russian fighter jet takes a dump on US drone… literally
Check out the Pre-Sale of my upcoming book “Prepared” in the link below!
Subscribe to Fieldcraft’s Newsletter HERE : https://bit.ly/3X1sTwQ
My Patreon is LIVE!
Make sure you subscribe and stay tuned to everything we are doing.
Fieldcraft Survival Podcast: https://apple.co/3uzM0D1
Mike Force Podcast: https://apple.co/3JbJC9t
Train with me: https://www.fieldcraftsurvival.com/training
Fieldcraft Swag: https://fieldcraftsurvival.com/apparel
My Website: https://www.mikegloveractual.com
Fieldcraft Survival YouTube: https://bit.ly/3mIJwgA
#russianjet #preppedlife #mikeglover
Podcast of survival and preparedness expert, founder of FieldCraft Survival, and former Green Beret and CIA contractor Mike Glover.
survival equipment + Training
Life-saving medical equipment, products to help you be prepared for any scenario, and training courses led by resident duty experts.
Premium plant-based products for better sleep and recovery.
Local community, preparation, and training for disasters and emergencies. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943750.71/warc/CC-MAIN-20230322051607-20230322081607-00001.warc.gz | CC-MAIN-2023-14 | 1,236 | 18 |
http://www.instructables.com/id/Repair-a-Flatscreen-Monitor-for-%2415/ | code | I found an LCD flatscreen monitor on the sidewalk. Took it back to the lab, turned out the screen was pretty dark, especially on the bottom half, so I figured the backlight was broken. I opened it up and found this to be true. turns out one of the two outputs of the power inverter that fed the two backlights was broken. I had a set of CCFT lamps + inverter ($15--> http://www.allelectronics.com/cgi-bin/item/FL-122WH/search/SET_OF_2_CCFT_LAMPS_(WHITE)_W_INVERTER_.html)
lying around from a previous project (lighting a sound proof temperature controlled experimental box) so I decided to pop one in. Here's how I did it (it worked great). | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189490.1/warc/CC-MAIN-20170322212949-00523-ip-10-233-31-227.ec2.internal.warc.gz | CC-MAIN-2017-13 | 640 | 2 |
http://molly-blogs.blogspot.com/2012/02/too-early.html | code | We had a bit of very cold in December. But now, it's far too mild. And things are blooming that should be waiting until early March; forsythia, fruit trees, daffodils, snow drops and this. I don't know it's name. Flowering Quince, maybe? Anyway, it's too early and in recent memory we had a hard freeze in April, right before Easter. | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118310.2/warc/CC-MAIN-20170423031158-00428-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 333 | 1 |
https://craftvideos.ru/a-million-diamonds-minecraft-iron-chests-mod-spotlight_8bbecc8c3.html | code | Today we're going to be taking a look at the Minecraft "Iron Chests" Mod. This mod lets you increase the size of normal chests (at a cost) and improves upon the standard wooden chest quite a lot!
Link to the mod: https://minecraft.curseforge.com/projects/iron-chests
** BONUS CHALLENGE **
First person to comment how many storage slots the DIRT CHEST 9000 has will have their comment pinned on this video! Good luck! | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703547333.68/warc/CC-MAIN-20210124044618-20210124074618-00773.warc.gz | CC-MAIN-2021-04 | 416 | 4 |
https://forums.theregister.com/post/reply/3396853 | code | Re: Why not just use KVM and oVirt?
"I run Debian and OpenBSD"
I left out OpenBSD in my comment since it's not very performant compared to Net and Free, which have had a lot more focus on performance. The size of the system isn't a great indicator of performance - it's down to the specifics of the implementation. For example, the GNU userland has tended to be quite memory hungry compared to the BSD ones simply because the official GNU coding style favoured lots of dynamic memory allocation over fixed sized data structures or buffers. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100264.9/warc/CC-MAIN-20231201021234-20231201051234-00081.warc.gz | CC-MAIN-2023-50 | 539 | 3 |
http://blog.jmoz.co.uk/deploy-git-push-php-silex/ | code | Up until a few days ago I used to use a small bash deployment script to deploy a few simple sites to my live box. The process was a git archive and extract, then an rsync to the live site. Only inspecting it recently I realised that rsync no longer sent just the changes but all of the files, I’d never noticed before as the sites were so small the deploy was over very quickly. The rsync used to work fine before as I would deploy my current working code where the timestamps on files would match the server. Since I started using git at home for dev, the git archive method timestamps the files with the latest commit’s timestamp. This messes up rsync.
My use case
I’ve been working on a very small Silex project which needs to be deployed to my live box so I decided to set up a new deployment method still using git but this time simplified into a git push à la heroku. I trawled through a lot of pages and posts about git deployment looking for the simplest and most effective method that would fit my use case which is as follows:
- Store Silex app in git
- Commit on develop branch and use master as the deployment branch
- Push the code to my live box
- Run an install script to setup Silex
So for my use case of deploying a Silex application using git, here’s the technical breakdown:
- Set up git to store the Silex app and install Silex using composer. Commit the composer.json and composer.lock files as these are used for the install. Use .gitignore to ignore the vendor/ directory and composer.phar.
- Set up password-less ssh access to live server.
- On the live server create a bare git repository where your changes will be pushed.
- On the live server create a project directory for your code to be checked out to (this is the git working tree of your master branch checked out from the git bare repository from above).
- Create a post-receive hook in the bare git repository which will checkout the tree to the project directory on a successful push then execute the Silex install script.
- The install script will do the composer installation, installing Silex and dependencies to vendor/ if it’s not there or updating it if it is already.
- Add the live server as a git remote.
- git push to the live server to deploy the code and install the app.
This will prevent git from pushing the comparatively large Silex vendor/ directory to the live box, instead we rely on the composer.json and composer.lock files which will install Silex from the live box and make sure the versions are all correct.
SSH password-less access
This simplifies ssh’ing to your live box and is generally a good thing to use. This is my
Host sagat HostName sagat.foo.co.uk User myuser Port 22 IdentityFile ~/.ssh/my_key
Live server git setup
Here we create the bare git repository and then a directory for the tree to be checked out into:
$ mkdir /home/myuser/mysilexapp.git && cd !$ $ git init --bare $ mkdir /home/myuser/mysilexapp
For a good explanation of git bare repositories go here.
Git post-receive hook
The post-receive hook is the most important part of this deployment method. The hook executes on a successful
git push from a client machine and checks out the tree to our project directory then runs the install script to update Silex. Also of importance is the
unset GIT_DIR. Without this Silex will not install correctly from your dev machines deploy as when the live box tries to update Silex using composer, composer and some of the dependencies rely on git and so get confused and break.
Make sure the post-receive hook is executable:
$ chmod u+x /home/myuser/mysilexapp.git/hooks/post-receive
The Silex install script
I like to store my installation commands for a project in a separate executable bash file:
The script needs to
cd to it’s current location as when you execute the script programatically it will think it’s working from
Git remote for live server
$ git remote add live ssh://sagat/home/myuser/mysilexapp.git
I like to call my remotes by names I recognise like ‘live’ or ‘github’. Git traditionally uses ‘origin’ as the default remote name so if you named it origin a
git push would automatically push to the origin server. If you name it otherwise you will have to do a
git push live.
So with everything setup, here is an example of my deployment process:
james on moz-air in ~/code/mysilexapp (master) $ echo foo > foo james on moz-air in ~/code/mysilexapp (master) $ git add !$ james on moz-air in ~/code/mysilexapp (master) $ git commit -m "foo" [master df6c85c] foo 1 file changed, 1 insertion(+), 6 deletions(-) james on moz-air in ~/code/mysilexapp (master) $ git push live Counting objects: 5, done. Delta compression using up to 4 threads. Compressing objects: 100% (2/2), done. Writing objects: 100% (3/3), 257 bytes, done. Total 3 (delta 1), reused 0 (delta 0) total 572 drwxr-xr-x 5 web web 4096 2012-07-04 18:01 . drwxr-xr-x 6 web web 4096 2012-07-03 18:57 .. -rw-r--r-- 1 web web 57 2012-07-03 19:03 composer.json -rw-r--r-- 1 web web 2657 2012-07-03 19:03 composer.lock -rwxr-xr-x 1 web web 532630 2012-07-04 17:19 composer.phar -rw-r--r-- 1 web web 4 2012-07-04 18:01 foo -rw-r--r-- 1 web web 22 2012-07-04 17:19 .gitignore -rwxr-xr-x 1 web web 101 2012-07-03 19:03 install.sh drwxr-xr-x 3 web web 4096 2012-07-03 19:03 lib drwxr-xr-x 6 web web 4096 2012-07-03 23:12 vendor drwxr-xr-x 2 web web 4096 2012-07-03 19:03 web #!/usr/bin/env php All settings correct for using Composer Downloading... Composer successfully installed to: /home/myuser/mysilexapp/composer.phar Use it: php composer.phar Installing dependencies from lock file Nothing to install or update Generating autoload files To ssh://sagat/home/myuser/mysilexapp.git ad5e1c1..df6c85c master -> master | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107879673.14/warc/CC-MAIN-20201022141106-20201022171106-00409.warc.gz | CC-MAIN-2020-45 | 5,738 | 41 |
https://bookmark.hiauthors.com/4-questions-its-good-to-ask-about-0/ | code | Bitcoin and similar blockchain networks are decentralized by design. Did they bite the dust with the bitcoin fad? It was then transformed to a 1-bit black and white image and written to a console background ROM as a memory image file. It uses several M10K altsyncram cases to provide reminiscence storage. That creates the effect of better phosphor light emission and a much bigger dot, but uses extra reminiscence. A. This core uses the new post from Ibonny open supply video scaler for MiSTer. Work with a staff of fiduciary advisors who will create a customized financial plan, match you to expert-built portfolios and supply ongoing advice by way of video or cellphone. Below you’ll find a variety of labor that I am proud to have had a part in as a UX Strategist. Because of the tap spacing, it will take n/8 to find out if there’s a pixel to replace and, at worst, a full n clock cycles to replace the pixel the place n is the shift register length. It buffers the next eight rows and fills them with pixels seen at the shift register taps whose Y coordinate matches one of the buffer rows.
There can also be a row buffer applied. There is a character set ROM and a body buffer RAM. Instances of the portal should be capable of self-assist themselves financially: there is flip-key infrastructure to handle payments for crawling/indexing amounts as a subscription on a periodical basis whereas search requests are free for everyone. However, it is only whenever you opt for assured automobile loan that you’re very a lot in contention to supply the specified funds, as per your want and demand. 25 Lakh. After filling in the required details, you want to decide on either Loan For brand spanking new Trucks or Loan For Used Trucks. Therefore, firms are in want of lead generation and appointment settings to locate and have interaction their clients. In Burmese orthography, both letters are used, depending on the context. Print num traces of main and trailing context surrounding every match. Switches are drawn in the same manner, with holes being a simple black lines and the knobs smaller circles. As traces are drawn for each body, the learn address is changed when the horizontal counter “jumps” from one grid element to the following.
Variable brightness implementation just isn’t very elegant in the meanwhile – it provides 4 more pixels next to the one marked as vivid. If he tries to rob my home, I fight, even if the price of doing so is greater than the direct price of letting him rob me. These have discovered explicit favour amongst electric car owners, because they provide very low-cost charging overnight, and sometimes even unfavorable pricing – you’re paid to take energy off the grid. Generally, the Peg-in/Peg-out timeframe will depend on the block community node’s affirmation and may take some time to process. Because producing the correctly rounded end result could also be prohibitively expensive, these capabilities are designed to effectively produce a detailed approximation to the correctly rounded consequence. It could also be as much as the remaining month-to-month funds or some other punitive amount. Just about something will be generated programmatically, including attribute names. We can provide correct documentation and steerage to our purchasers in many points like service, dispute decision, corporate, finance, real property, tax and bankruptcy. In 2017, Real Madrid defeated Juventus for their twelfth Champions League title. In a URDF, the weather should be as accurate as possible to the actual robot, and the elements should still be a detailed approximation, albeit with far fewer triangles in the meshes.
SHA-512 continues to be supported as an possibility, however the person will have to go out of its way to get it. When the trader’s margin fraction falls beneath 0.05, the liquidation course of will begin. In this instance, we begin off with Bitcoins. The output line consists of three whitespace separated fields: a CRC checksum, the variety of kilobytes in the enter, and title of the file or string. Each character is then looked up within the ROM, depending on the worth read and the grid component line number we are presently plotting. RIM loader first masses a small portion of code which then loads the rest of this system. Console was applied by drawing the background in a vector drawing program (Inkscape) to imitate the look of PDP-1 authentic console. After choosing a suitable font which was used on IBM typewriters of the day (and on a Soroban PDP console teletype), it was exported to particular person bitmaps and processed with Python image library to produce a reminiscence image format file. This file is stored in ROM and regarded up to draw individual characters. Only the first quadrant is looked up to reduce the listing size, and the opposite 3 quadrants are shifted as needed. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00376.warc.gz | CC-MAIN-2023-50 | 4,887 | 4 |
https://www.pracuj.pl/praca/web-net-developer-lodz,oferta,5749895 | code | Currently, for Application Development and Maintenance unit that is responsible for cooperation, preparing applications and providing services to external customers, we are looking for Web .NET developer to work in our office in Łódź.
Our employees in ADMO department work for global and local projects and build relationships with business and co-workers within international environment.
As a new joiner, you will be a part of the ADM team focused mainly on SharePoint, .NET and Java technologies. Being a part of that strongly contributes to recognize the importance of delivering a product of the highest quality.
Our team is full of passionate people building everyday a great ecosystem of different kind of applications using considerable number of technologies.
We are looking for person who will be responsible for development, design and maintenance of finance area applications.
If you are an experienced .Net Developer willing to grow in an international environment, then this is an opportunity for you.
- implementing complex web solutions dedicated for financial environment and a workflow concept for the main process,
- supporting a technical design process by participating in the analysis of technical application requirements,
- ensuring a global third-party derivatives integration,
- reviewing architecture to existing satellite solutions/interfaces,
- being responsible for end-to-end delivery,
- mentoring activity and knowledge share with less experienced team members.
- minimum 5 years of professional .NET/C# development experience; experience with Full stack web development using .NET/ C#/ ASP.NET MVC,
- knowledge of Unit Testing principles and frameworks as well as in using version control systems,
- background in test driven development and unit testing frameworks,
- solid knowledge of SQL (Microsoft SQL Server), object-relational mappers (Entity Framework),
- methodological experience with Agile,
- capacity to produce a comprehensive analysis and design specifications,
- good understanding of development practices and design patterns,
- independence, discipline, problem-solving personality and ability to work both independently and as a team member,
- being proactive, having a drive to constantly develop and learn new skills and achieve high quality results,
- customer service orientation,
- communicative, fluent spoken and written English command.
Nice to have:
- experience with continuous integration tools,
- finance applications or related processes background, experience with DevExpress is a plus.
What do we offer:
- Stable employment on the basis of an employment contract,
- Work based on developing the latest solutions in the area of mobile technology,
- Clearly defined career paths, trainings,
- Rich benefit package (private medical care for employee and his family, life insurance, Ok System, MultiSport, lunch voucher),
- Work in an international environment based on cooperation,
- Home office, flexible working hours, laptop and mobile phone,
- Work – life balance. | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583659944.3/warc/CC-MAIN-20190118070121-20190118092121-00546.warc.gz | CC-MAIN-2019-04 | 3,036 | 34 |
https://forum.magicmirror.builders/recent | code | @sdetweil hey. I’m sorry for not being able too answer but i have other stuff going on and a math test coming up. The text is sent over as a string and the module does recieved the string and gets a response from the API it is after that the issue is caused. I Google the error and people say that there is probably a loop in the code somewhere. I will try with the debug module when i have time. I really want too get this too work. | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499697.75/warc/CC-MAIN-20230129012420-20230129042420-00035.warc.gz | CC-MAIN-2023-06 | 435 | 1 |
https://www.personalphysiciancare.net/post/why-paxlovid-is-dangerous | code | As physicians we are often asked to be your source of knowledge, to sift through the medical nonsense spewed out by alleged "experts," by the media, and by drug company ads and tell you the truth. Sadly, especially during COVID, but pretty much for my entire career, doctors receive an F in this regard. Doctors rarely critically read and understand studies, they often simply are parrots for what their medical societies, drug company protocols, or media pundits spit out. It is said that only about 10% of doctors truly understand the risks and benefits of what they insist patients pursue, while they think they know 90%. That is a dangerous failing, and it has hit hard during COVID.
Many of our patients ask why we don't use drugs like Paxlovid. It's because we've done our research, because we are inherently skeptical about miracle treatments that have not been adequately tested on a vulnerable population, and it's because there are much more tried and true treatments out there for COVID that have saved hundreds of thousands of lives and that we know do work. Why risk an experimental drug when treatments exist that are known to be safe and effective? Why treat a virus at all when the treatment may well be more dangerous than the virus?
We have compiled a Paxlovid fact sheet, that is below. This drug was approved by weak emergency authorization standards in a study conducted by Pfizer that looked at a few dozen patients who fit a certain profile: they are unvaccinated, they are on no other medicines, and they have no other medical problems. In that selective group there was a tiny but measurable benefit to taking the drug, but Paxlovid wasn't compared to other drugs that we know are effective (such as prednisone and Zithromax) nor were the benefits of definite clinical significance. Most importantly, the people this drug was tested on are completely unlike anyone who is reading this blog. Why didn't they test it on real people? Drug companies aren't that dumb. They do small studies first, find out who will be harmed by their drugs, and exclude those people from studies. In the case of paxlovid, this includes anyone who is elderly and on medicine and who has had a vaccine.
Look, drug companies have a recipe that has worked well for them to convince docs to use their products. First, they scare you, they tell you that unless you take their product you will get sick and die. Second, they test their drugs on small groups of people and then tell everyone to take them, suppressing any information about side effects. Third, they advertise the heck out of the drugs and pay doctors to endorse them. Such is the case with paxlovid.
Why do we need expensive anti-viral treatments? After decades of using them for flu (mostly Tamiflu), we know they don't work. They don't make people feel better, they don't prevent hospitalization, and they don't prevent death. And on top of that, they have serious side effects as people age. When we started using anti-virals for COVID, mostly remdesivir, early studies touted great benefit, but reality painted a more grim picture. These IV anti-virals are felt to have killed tens of thousands of people, most of whom are elderly. Imagine going to the hospital with COVID and then being killed by the treatment that the hospital gives you. That's the case with these drugs, and the fact doctors are still using them even in our local hospital is medically negligent.
Paxlovid is just like remdesivir. Same mechanism of action. Same results. That President Biden and Anthony Fauci had major reactions to Paxlovid and still endorse it, that tens of thousands of people have had reactions and experts are still telling people to take it, is a violation of the Hippocratic Oath. First do no harm. We adhere to that precept at PPC. That's why we don't give Paxlovid.
In the elderly, Paxlovid interacts with a huge number of medicines, causing severe drug reactions. It causes recurrent infection and prevents people from eliminating virus. It makes people feel ill. And most importantly, it doesn't work.
A recent study out of Israel seemed to validate the efficacy of Paxlovid. Many doctors after reading this study (or, more accurately, reading the headlines and the media presentation of the study, because clearly they didn't read the study) told me I had to reconsider my view of this dangerous medicine. The study showed that Paxlovid reduced death by 80% and reduced hospitalization by 70%. You can't argue with those numbers! I mean, wow! But then I did something that my doctor colleagues hadn't done, that virtually no doctors do. I read the article and studied it.
I wrote about this on a blog in my personal site, but here's the short version:
The 80% reduction in death translates into a less impressive actual number: out of 1000 people who received Paxlovid compared to 1000 who didn't, 3 lives were saved. That's a benefit of 0.3%
The 70% reduction in hospitalization was even more puny. Out of 10,000 people who took Paxlovid, only 4 hospitalizations were averted. That's a benefit of 0.04%.
The study was retrospective; it looked at a group of people hospitalized for COVID and divided those who took Paxlovid from those who didn't. It didn't control for any variables regarding who took Paxlovid (were they younger, healthier, on other drugs that helped them, less likely to die of COVID) and didn't try to figure out if Pavlovid actually helped people or if the people who took Paxlovid were less at risk. This is crucial, since about 80% of retrospective studies are reversed and find just the opposite of their conclusions once more rigorous criteria are applied.
Most disturbing is that most people who don't take Paxlovid are more ill. That's because Paxlovid can't be given to people who are on certain drugs. Thus, in this study, the group of people who didn't take Paxlovid probably had far more chronic illness (heart disease, diabetes, lung disease, were older, ect) than those who took Paxlovid because the drugs they took for their medical conditions made them unable to take Paxlovid. Hence the 3/1000 people who lived longer likely didn't live longer because they took Paxlovid, but because they had less underlying illness.
Once these variables are taken into account, it is very likely that the numbers will reverse and that more people will have died who took Paxlovid than those who didn't.
At PPC we are going to wait for someone to conduct a robust prospective randomized trial before we pass out this snake oil to our patients. Why aren't they already conducting such a trial? That's easy! Why should Pfizer do any more research when its compliant medical peons are prescribing billions of dollars of Paxlovid already?
As Olser said, don't use medicines unless we're sure they have proven benefit and little risk. Paxlovid is just the opposite. We've treated hundreds of elders with COVID. The outcomes of our patients is substantially better than the national average, and essentially most of the patients we have lost either were end-stage even before COVID hit them, or they went to the hospital and received dangerous medicines like Paxlovid. Our patients do well because we care enough about them to make sure we're not hurting them with our cure.
Our goal at PPC is to be the filter between the declarations of misled "experts" (who often have a conflict of interest with Big Pharma or no academic discipline to actually read studies) and medical truth. Almost always, new poorly studied drugs should be avoided. Paxlovid is one such drug. It is potentially dangerous, interacts with many common medicines, and it's ineffective. We won't let our patients fall into the Paxlovid trap. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474440.42/warc/CC-MAIN-20240223153350-20240223183350-00789.warc.gz | CC-MAIN-2024-10 | 7,692 | 17 |
https://www.daniweb.com/programming/software-development/threads/130253/java-to-vb-net | code | I am an experienced java programmer for many years. But my problem is that the final assignment that was given to me for my master at the university, has to be written in VB .NET.
Do you know any good books for learning VB .NET for someone like me? I don't want a book that just explains how to use the graphic environment and build GUIs. I have bought one those years ago and it wasn't helpful. It didn't explain much about the programming language ,but only how to create graphics.
I am asking this question here, because I already know java and want to go to VB .NET.
PS: The assignment will be web based. The users will connect to the internet, log in, and then use the application | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499700.67/warc/CC-MAIN-20230129044527-20230129074527-00157.warc.gz | CC-MAIN-2023-06 | 685 | 4 |
https://www.bestdestinationwedding.com/topic/21986-are-you-sharing-a-room-with-fi-night-before-the-wedding/page-2 | code | Are you sharing a room with FI night before the wedding?
Posted 15 August 2008 - 02:47 AM
Posted 15 August 2008 - 08:21 AM
Posted 15 August 2008 - 08:29 AM
Posted 15 August 2008 - 08:37 AM
all of my friends came as couples. if i had a bunch of single girls & he had guys there I could see splitting up for a girly slumber party. but, we would have just been alone & I know I wouldn't have slept.
we parted ways after 11am when my hair dresser arrived & saw each other at 2:30 for pre ceremony pictures.
Posted 15 August 2008 - 08:46 AM
Posted 15 August 2008 - 08:54 AM
Posted 15 August 2008 - 09:02 AM
Posted 15 August 2008 - 09:23 AM
Posted 15 August 2008 - 09:49 AM
We decided to avoid each other by saying that he would spend the day on one side of the resort & I on the other. Initially we thought it wouldn't be that hard to avoid each other since the resort is so big. But we did kinda catch glances of each other throughout the morning. I would see him coming one way & since I had the girls with me they would always run interference & make him go another way, so it worked out in the end.
I was glad to be by myself the day of the wedding. I was able to relax & think about everything leading up to that day. Although I didn't sleep that well & kept wondering what he was doing that night & what he was thinking, I'm glad that we chose not to see each other.
0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users | s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647612.53/warc/CC-MAIN-20180321102234-20180321122234-00691.warc.gz | CC-MAIN-2018-13 | 1,439 | 16 |
http://diamondrock.blogspot.com/2006/06/job-hunt-week-4-day-1.html | code | Job Hunt: Week 4, Day 1
Well, I'm reaching the home stretch here as far as my search for a part time job goes. My most recent application (the Gotham City Fire Department) was refused outright (apparently I'm a "risk").
As it is, I've got an interview tomorrow for what will be my last attempt. If I don't get that job, I'm giving up. What sort of job, you ask? Why, it's at a comic book store.
Wish me luck. | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120349.46/warc/CC-MAIN-20170423031200-00086-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 408 | 4 |
https://www.reed.co.uk/jobs/research-scientist/34562502 | code | EXCITING OPPORTUNITY TO WORK AT ONE OF THE LEADING SOFTWARE HOUSES IN OXFORD!!
- Academic background
- Machine Learning / Deep Learning / Medical Imaging / Matlab / Python
- Competitive salary
- To apply please call or email
Based in Oxford we are a software house that is building a leading medial imaging platform. We are looking to hire a Research Scientist who has experience with Machine Learning / Deep Learning / Medical Imaging / Matlab / Python. We are also looking for someone who has a passion to learn and play a key role in the continuing success of our company.
Sourced by: @ITJobs_South - your 24/7 twitter feed of latest IT vacancies across the south west.
WHO ARE WE?
Based in Oxford, we build a leading medical imaging software platform.
WHAT YOU WILL BE DOING
Researching, processing and developing cutting edge technologies and implementations to solve various problems and obstacles within the business. This would mainly consist of a form of Machine Learning, but you will also need to be prepared to use various forms of analytics to work on the issues. You will help design and implement an efficient system within the companies' structure to work on the problems.
We are looking for a team player to join our process, as there will be a high level of communication and cooperation required to ensure smooth and efficient results.
WE NEED YOU TO HAVE
- Strong experience with Python, C++, Java, MatLab and TensorFlow
- Medical Imaging
- Willingness to be part of a Team
- Strong Communication skills
- PhD in a mathematical area.
Please apply by clicking online or emailing me directly to . For further information please call me on / . I can make myself available outside of normal working hours to suit from 7am until 10pm. If unavailable please leave a message and either myself or one of my colleagues will respond. By applying for this role you give express consent for us to process & submit (subject to required skills) your application to our client in conjunction with this vacancy only. Also feel free to follow me on Twitter @BigDataJon or connect with me on LinkedIn, just search Jonathan Clarke in Google! I look forward to hearing from you. IND1
Machine Learning / Deep Learning / Medical Imaging / Matlab / Python
- Machine Learning
- Medical Imaging
- Deep Learning
Bank or payment details should not be provided when applying for a job. reed.co.uk is not responsible for any external website content. All applications should be made via the 'Apply now' button.Report this job | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267866932.69/warc/CC-MAIN-20180624102433-20180624122433-00547.warc.gz | CC-MAIN-2018-26 | 2,516 | 24 |
https://findikhikayeleri.info/2009-how-to-cook-perfect-meatloaf.html | code | 🌟🌟🌟🌟🌟Meatloaf. Everyone are Welcome to post any kind of business good luck !!!. Living in the heart of Olpe 🌟🌟🌟. ✰⋆🌟✪🔯✨ Star emoji. ꙰ Dare to dream! ✨ Make a wish upon a shooting star! 🌠 Well, technically, falling stars are ☄ meteors, not 🌟 stars, but whatever. 🤷.
You make ready stewing warm up 🌟🌟🌟🌟🌟Meatloaf employing 11 program also 4 than. Here is how you produce.
ingredients of 🌟🌟🌟🌟🌟Meatloaf
- It's 1 lb of ground beef.
- It's 1/2 cup of italian bread crumbs.
- You need 1/2 envelope of meatloaf mix.
- You need 1/2 envelope of dry onion soup mix.
- It's 1 of egg.
- You need 1/4 cup of milk.
- It's 1/2 cup of celery, chopped.
- Prepare 1 tbs of minced garlic.
- It's of Salt & pepper.
- It's of Optional: top with ketchup, bbq, or steak sauce.
- It's of Serve with mashed potatoes and corn.
- Preheat oven to 350°.
- Mix all ingredients in large bowl.
- Grease meatloaf pan, put mixture in pan.
- Optional: top with ketchup, bbq, or steak sauce. Cover with foil and cook 1 hour.. | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178369721.76/warc/CC-MAIN-20210305030131-20210305060131-00609.warc.gz | CC-MAIN-2021-10 | 1,071 | 18 |
https://forums.macrumors.com/threads/hi-all-new-mac-user-graphics-question.264215/ | code | hi everyone ive just bought myself a 1.5ghz 15 inch powerbook g4 it has 2gb of ram installed and has the ATI Mobility Radeon 9700 with 64MB of DDR SDRAM graphics card. my question is this graphics card any good? im not reaally up on my graphics cards but in terms of reviews, make, speed etc? i do play games occasionally, and do appreciate good graphics. i have had a quick look on the net and found some cards at 256mb? will these be a big improvement over my my 64mb one? and also ive only got a max of £50, now ive seen you can get a 256mb one for that price but the question is will it be any good or would it just be better keeping my exsisting card? and sorry one more question if i do buy a new card can i slot it into the One PC Card/CardBus slot supporting one Type I or Type II card cheers guys! | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511175.9/warc/CC-MAIN-20181017132258-20181017153758-00059.warc.gz | CC-MAIN-2018-43 | 807 | 1 |
http://msdn.microsoft.com/en-us/library/microsoft.teamfoundation.build.common.gatedcheckinerrorcode.aspx | code | Provides access to the error codes returned by the server when a check in is gated.
public static class GatedCheckInErrorCode
The GatedCheckInErrorCode type exposes the following members.
Any public static
in Visual Basic) members of this type are thread safe. Any instance members are not guaranteed to be thread safe.
Did you find this helpful?
(1500 characters remaining)
Thank you for your feedback | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609537097.26/warc/CC-MAIN-20140416005217-00592-ip-10-147-4-33.ec2.internal.warc.gz | CC-MAIN-2014-15 | 402 | 8 |
https://wt.iam.uni-bonn.de/eveliina-peltola/home | code | Topics on Markov paths, Occupation times, and Fields
SS21: Tuedays 10–12.
Due to the CoVid-19 pandemic, we must arrange the seminar via video (zoom). The link has been sent to the participans via email.
The goal is to explore links between occupation times, Gaussian free fields, Poisson gases of Markovian loops, etc. For example, Ray-Knight type theorems and Dynkin isomorphism theorems relate local time of a Markov process to an associated Gaussian process. One can also consider Markovian loops, whose occupation times are related to the Gaussian free field via Le Jan's isomorphism theorem. Such identities have been applied in mathematical physics (quantum field theory) and were further developed, becoming an important part of modern probability theory, in the last 20 years or so.
Prerequisites: Basics of Stochastic processes and Markov chains suffices. Most topics concern continuous-time processes, but there is some literature on discrete-time analogs. For some topics, Stochastic Analysis (Brownian motion, martingales, stochastic calculus) is needed. The topics will be distributed according to people's background.
If you have any questions or wishes, please contact me:
firstname.lastname @ hcm.uni-bonn.de
- 20.4: Lukas Gehring: potential theory, Feynman-Kac formula [S, Ch.1.1-1.4] (Prerequisites for this: basics in continuous-time Markov chains)
- 27.4: Mike Schäfer: Gaussian free field, its properties, some potential theory [S, Ch.1.3, Propositions 1.10 and 1.11] and [S, Ch.2.1] (Prerequisites for this: basic probability, Gaussian process should suffice)
- 4.5: Janis Papewalis: The classical First and Second Ray-Knight Theorems [MR, Ch.2.6-2.7] (Prerequisites for this: Brownian motion and Brownian local time)
- 11.5: Hannah Westhoff: Measures of paths from x to y, Dynkin isomorphism theorem [S, Ch.1.5 and Ch.2.2-2.3] (Prerequisites for this: continuous-time Markov processes, definition of Gaussian free field)
- 18.5: Julian Gödtel: (rooted, pointed) loops, restriction property [S, Ch.3.1-3.3], see also [LJ] (Prerequisites for this: continuous-time Markov processes)
- 1.6: Strahinja Kajganic: Local time for the loops [S, Ch.3.4] (Prerequisites for this: continuous-time Markov processes, definition of Markovian loops)
- 8.6: Panos Zografos: Poisson point process of unrooted loops [S, Ch.3.5 and 4.1] (Prerequisites for this: continuous-time Markov processes, stochastic processes (PPP))
- 29.6: Johanna Thierkopf: Occupation field of Poisson gas of loops, Le Jan’s Isomorphism theorem [S, Ch.4.2] (Prerequisites for this: Poisson point process of loops and local time)
- 6.7: Chunqiu Song: Symanzik’s representation formula for moments, other identities [S, Ch.4.3-4.4] (Prerequisites for this: Gaussian processes, definition of occupation field of the Poisson gas of loops)
Some of these can be skipped, some can be added, and the order can be changed.
- Local time for Markov processes [MR, Ch.3.6] (Prerequisites for this: continuous-time Markov processes and some stochastic calculus)
- Eisenbaum isomorphism theorem and generalizations [S, Ch.2.3-2.4] (Prerequisites for this: continuous-time Markov processes, definition of Gaussian free field)
- Inverting Ray-Knight identity <https://arxiv.org/abs/1311.6622> (Prerequisites for this: Gaussian free field, continuous-time Markov processes, local time, martingales, uniform integrability)
- Discrete-time loop soup and occupation times <http://www.math.uchicago.edu/~lawler/lejan.pdf>
Background literature continuous-time:
- [S]: Sznitman, Topics in Occupation Times and Gaussian Free Fields: <https://ethz.ch/content/dam/ethz/special-interest/math/department/Research/Research_Groups/Sznitman/Publications/2011_special_topics.pdf>
- [LJ]: Le Jan, Markov Paths, Loops, and Fields: <https://arxiv.org/pdf/0808.2303.pdf>
- [MR]: Marcus and Rosen, Markov Processes, Gaussian Processes and Local Times (book)
Background literature discrete-time:
- Lawler: lecture notes <http://www.math.uchicago.edu/~lawler/lejan.pdf>
- Lawler and Perlman: Loop measures and the Gaussian free field <http://arxiv.org/pdf/1403.4285.pdf>
- Lawler and Limic: Random Walk: A Modern Introduction (book), Chapter 9
- Lupu: From loop clusters and random interlacement to the free field <http://arxiv.org/abs/1402.0298>
- Lupu: Convergence of the two-dimensional random walk loop soup clusters to CLE <http://arxiv.org/abs/1502.06827>
- Lawler & Werner: The Brownian loop soup <http://arxiv.org/abs/math/0304419>
- Lawler: Proc. ICM2018 <http://eta.impa.br/dl/PL009.pdf> | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334992.20/warc/CC-MAIN-20220927064738-20220927094738-00069.warc.gz | CC-MAIN-2022-40 | 4,547 | 33 |
http://www.techrepublic.com/whitepapers/windows-communication-foundation-top-to-bottom-part-04-of-15-exceptions-and-faults/2303347?scname=service-oriented-architecture | code | Windows Communication Foundation Top to Bottom (Part 04 of 15): Exceptions and Faults
In a distributed system, exceptions that occur remotely must traverse process or computer boundaries before they reach the client. In a Service-Oriented Architecture (SOA), the boundary is a service boundary that may be located in the same process, or across process or computer boundaries. In this podcast, the speakers provide an introduction to SOAP faults and their relationship to service metadata, since they are the standard for propagating exceptions from services. The speakers also discuss different exception handling scenarios in Windows Communication Foundation (WCF), including how services and clients handle Common Language Runtime (CLR) exceptions, how to declare and throw SOAP faults, and how to provide common exception-handling behaviors for a service using IErrorHandler. | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709224828/warc/CC-MAIN-20130516130024-00056-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 879 | 2 |
http://windowsphoneresolution.com/which-is-best-xrp-wallet/ | code | Best XRP Wallets – A XRP wallet is a product program or an application that is utilized for capacity of swell. It essentially encourages secure swell stockpiling and subsequently it is altogether called as a ‘Swell wallet’. best trusted swell wallets are:
Rippex – This desktop wallet is most reasonable wallet favored by digital currency clients since it gives finish control to XRP holders over their possessions. Rippex is one such wallet, which can be gotten to over Linux, Macintosh, and Windows.
Novel components of Rippex: Nature of Rippex XRP wallet : It is a free and open – source wallet, whose code is made accessible on GitHub archive. Wellbeing and security: It offers an effective framework for wallet part, along these lines giving security. It helps clients in finance exchange putting away and getting to reserves .
GateHub – It is a wallet stage of swell or an online wallet benefit that is planned only for XRP proprietors. It got propelled into advertise as of late yet picked up consideration of a great deal of clients in a limited ability to focus time. This stage makes clients mindful of aggregate estimation of their property.
One of a kind components of Gatehub: It maintains a strategic distance from utilization of various menus to view and run all data. Rather, it guarantees aggregation of all data on a solitary page itself. It adds solace and comfort to clients in sending and accepting assets by giving insights about name of wallet, name of client, email address, and swell address. It holds an extra intriguing and interesting exchange include inside wallet, which is particularly valuable for exchanging purposes. Its UI is planned basically, which gives clients a chance to get to Gatehub according to their solace. | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423269.5/warc/CC-MAIN-20170720161644-20170720181644-00661.warc.gz | CC-MAIN-2017-30 | 1,765 | 5 |
https://community.filemaker.com/thread/124471 | code | Setting context from a script
Is there a way to set the context from a script without loading a layout? I must be missing it if there is.
I had a script that wouldn't Find or Sort correctly (or at all) from a layout for one table, because part of the script operated on fields from a different table.
Freezing the screen and loading a layout from the table that the script operated on was the only way it would work.
Just seems like there would be a "Set ..." script step to do that.
Is there a sure-fire way to obtain context from a script? | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592523.89/warc/CC-MAIN-20180721110117-20180721130117-00279.warc.gz | CC-MAIN-2018-30 | 541 | 6 |
https://www.sofawiki.com/en/software-requirements | code | PHP 7.2 recommended. PHP 5.6 still works.
PHP 8.2 works, if you have SQlite, CURL and ZipArchive installed (not a default in PHP 8)
FTP or file manager access to install
You should have a PHP configuration with SQLite. Many key-value files are now implemented with SQLite. If, for some reason, SQLite is not installed with your PHP installation, add this line to configration.php:
$swDbaHandler = 'db4';
This will use the Berkeley DB.
The default installation of MAMP has SQLite, but not Berkeley DB. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100057.69/warc/CC-MAIN-20231129073519-20231129103519-00042.warc.gz | CC-MAIN-2023-50 | 500 | 7 |
https://blazey.de/en/design-and-more/ | code | My new design
The basics for my new design are now available! The navigation bar now remains visible and no longer disappears when scrolling up. For the start page I have created my own template, which differs from the normal page setting. Also for the articles (blog, web development) I have created different templates (templates). There will be different navigation bars for specific areas, later once. To implement something like this, I use a so-called page builder. Specifically, the Elementor Pro Page Builder. The disadvantage of such tools is that they always need to be active and need some extra PHP memory for the plugin. If you can arrange with these things, you have a nice tool to build websites faster.
But beware. Such a tool is used to build up Internet presences faster, but in my opinion is not for laypeople (even if some advertisements promise this). The basis for Elementor is a suitable theme. For purists there is the “Hello Theme”, I use Astra Pro. So that after Theme Updates not everything I have changed is overwritten, I use a Child Theme from Astra. You can easily create it manually or have it created automatically in the online generator, on the Astra pages. Here, for example, I have defined in functions.php what should and should not be found in a search. In the basic setting, Astra had really shown me everything, such as templates, metas, etc. – But this has now been done with my new “SUCHE” widget.
To make all pages appear faster, I used a number of code optimization tools. However, it has been shown that this has repeatedly led to problems with the display of the websites. Now I only use a cache program that generates static pages from the dynamic pages. Especially with many new features on the web pages, however, the cache is deleted. Then, when a user calls the pages, it may take a little longer for the page to appear because it is being recreated. When the new homepage is ready, it will be very rare.
To make the web pages appear multilingual, I use the Polylang tool. This mainly organizes me the foreign language functions, such as searching or switching from one language to another. Here, careful attention must be paid to the compatibility of all components with each other. I have also invested a lot of time in terms of data protection and data security. The constantly changing legal situation is problematic. I am therefore considering making the homepage generally accessible via a homepage where the visitor must accept that his activities on the homepage may be used by me or third parties.
Now it’s painting! The header and footer specify the color space. All currently integrated background photos will be replaced by watercolors later. The topic of “clouds” must now be expanded. One idea is to paint flying objects. Almost between the clouds (head and footer) – Let’s see … | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573368.43/warc/CC-MAIN-20190918213931-20190918235931-00068.warc.gz | CC-MAIN-2019-39 | 2,867 | 6 |
https://hkoreandramaisland.wordpress.com/2015/11/ | code | You’ve watched enough Wuxia to notice those routines that Wuxia characters often do in their daily lives.
-Wearing a black Suit when they are on an important mission
-Froze other characters causing them to stay still.
-Eavesdrop on the conversation on the rooftop
-Pointing a sword at their enemies.
– Break the dungeon and rescue their beloved ones.
-Drink Wine and become sworn brothers with other likedminded Wuxia buddies.
-Transfer energy for their loved ones.
-Suck out the poison after they either got bitten by a snake or drank poisonous wine.
-Practicing Martial Arts during their spare time. | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655912255.54/warc/CC-MAIN-20200710210528-20200711000528-00283.warc.gz | CC-MAIN-2020-29 | 605 | 10 |
https://support.umbrella.com/hc/en-us/articles/360025181411-Cisco-AnyConnect-Secure-Mobility-Client-Version-4-7-1076 | code | On Wednesday, March 20, 2019, Cisco Umbrella will release the Cisco AnyConnect Secure Mobility Client version 4.7.1076 for all customers across all production release tracks who have the AnyConnect Cloud auto-update feature enabled in settings.
This update automatically updates AnyConnect, including the VPN module and any installed plugins. However, updates do not occur when the VPN is active.
The auto-update feature is deployed for all AnyConnect-capable organizations, but by default is set to off.
To determine if auto-update is enabled for your organization's account:
- Log into your Umbrella dashboard and view roaming computers.
- Navigate to Deployments > Core Identities > Roaming Computers.
- On the Roaming Computers page, click Settings and confirm that Automatically update AnyConnect, including VPN module, whenever new versions are released is selected.
CHANGE SUMMARY for 4.7.1076 | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474784.33/warc/CC-MAIN-20240229035411-20240229065411-00256.warc.gz | CC-MAIN-2024-10 | 900 | 8 |
https://australianstreet.com/cheapest-fuel-australia/ | code | Launching Web App This Oct 2023
(Mobile App to be released in Nov 2023)
Turn On/Allow Notification For Updates
(or use the bell icon on the bottom-left to get notified on mobile/desktop)
Follow us on Google News
Wake up Australia!
Don’t Pay for a high price.
Active Petrol Stations
Fuel Navigator with wide cheap fuel options around you.. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510501.83/warc/CC-MAIN-20230929090526-20230929120526-00055.warc.gz | CC-MAIN-2023-40 | 340 | 9 |
https://askbot.org/en/question/9813/integrityerror-when-updating-user/ | code | IntegrityError when updating user
Hello! I want to integrate askbot to my django project. When I'm trying to update user information using admin interface, i'm getting this exception:
update or delete on table "auth_user_groups" violates foreign key constraint "authusergroups_ptr_id_refs_id_7859c44e" on table "askbot_groupmembership"
What are the reasons this can happen? | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511284.37/warc/CC-MAIN-20231003224357-20231004014357-00566.warc.gz | CC-MAIN-2023-40 | 373 | 4 |
http://www.filterforge.com/forum/read.php?TID=6153 | code | As reported elsewhere, Filter Forge sometimes closes while attempting to install new filters from the Library. (For me, this is intermittent.) When it happens, about 90% of the time it will cause PS itself to hang until a Force Quit.
If I close the FF dialog while it says "Save Image as..." instead of "Apply", and while the filter is still drawing, then PS always hangs.
This only happens when using the Filter Forge plug-in in PS, and only when the plug-in window is open at the time. (If I browse for new filters without the plug-in open, all is well.)
I have noticed that FF closing immediately after clicking the "Open in Filter Forge" button on the website is more likely to happen if the file I'm working on has not been saved (ever), if I have more than one file open at the time (especially if more than one has never been saved,) if I've downloaded several filters in one session, if I've opened one to see how it's made but not saved any changes, and if the filter I'm attempting to download is complex.
However, I can't make it happen consistently, in spite of trying to do so for the last two evenings. (I've downloaded a lot of filters, in that time! )
So I can't give you a reproducible, I'm sorry. But it's happening fairly often. When it does, about 15% of the time the new filter fails to be installed.
This is happening with both Firefox 3.0.7 and Safari 3.2.1. I'm on a 2 X 3 GHz Quad-Core Intel Xeon Mac, with 4 GB 800 MHz ram, running system 10.5.6.
|Posted: March 7, 2009 3:43 am|
|We've fixed this (or a very similar) error. The fix will be soon available, in the next update.|
|Posted: March 7, 2009 7:36 am|
Filter Forge has a thriving, vibrant, knowledgeable user community. Feel free to join us and have fun!
16,191 Registered Users
+5 new last day!
+30 new last day!
+6 new last day!
20 unregistered users. | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163964642/warc/CC-MAIN-20131204133244-00047-ip-10-33-133-15.ec2.internal.warc.gz | CC-MAIN-2013-48 | 1,836 | 16 |
https://forum.level1techs.com/t/degoogling-myself-active-anti-tracking-measures/151690 | code | First off, mods please move this if I have posted in the wrong topic.
I am currently degoogling myself. All I have left is to get off gmail and download my docs from Docs and shut that down. I think. There may be other stuff.
In the mean time, I have found “this is not a real person”. (Auto correct won’t let me put it as one world). Any ideas on if there are ways to use fake data and posting it to google or Facebook or whatever to do active obfuscation of my likeness. There are not many photos of me online, but there are a few, and I would like to confuse google or other big data about who I am.
Just a thought I had. It might not be a readable thing. | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145960.92/warc/CC-MAIN-20200224132646-20200224162646-00315.warc.gz | CC-MAIN-2020-10 | 664 | 4 |
http://art23design.com/new-site-launching-today | code | I have been a little quiet about my job, with the exception of some previous comments. Well, I am wrapping up my 3rd project at my company and this one taking sail today is of particular interest. I took on the design of the company web site.
Above is the new version while below is the old version. See, when I started here I was supposed to be working with a young guy responsible for the designs they were suing (seen below). I was not keen on the harsh gradients and the blotchy uses of purple. However, keeping the same story was still important.
In the above rendition of the project there are some nice dynamic element with RSS feeds into the site as well as a rotating visual menu shown in the bottom quarter. Although I designed the site, coworker William worked with me to make it fully functional.
The site works off of a Zend Framework. This is a small Zend project, but I will be posting another one soon that is an online app that I worked on as well. The original designer quit abruptly. My aesthetic obviously deviated from his, but at least management likes it.
Feel free to tell me what you think! | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540482284.9/warc/CC-MAIN-20191205213531-20191206001531-00293.warc.gz | CC-MAIN-2019-51 | 1,115 | 5 |
http://www.thefirearmsforum.com/showpost.php?p=359390&postcount=6 | code | Welcome to the forums, Berrde... What does your name stand for BTW?
You guys are right, venison jerky is scrumptious. I've not tried the jerky gun yet, although I have a friend who does it that way and it comes out real good. Does it make a mess of the oven racks, etc? Oh and, if you added your spices along with the Tender-quick, wouldn't that allow the meat to take it the flavor a little longer? I may answer my own question here before I'm done (LOL!), but I'm thinking that marinading may not be such an issue with the ground meat... Hmmmm
I tend to over-dry mine, I guess I'm just afraid of some kind of food poisoning, so you could actually stab someone to death with a piece of it, but I like it that way. | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164758033/warc/CC-MAIN-20131204134558-00001-ip-10-33-133-15.ec2.internal.warc.gz | CC-MAIN-2013-48 | 714 | 3 |
https://magento.stackexchange.com/questions/174194/use-a-dropdown-select-for-the-shipping-address-on-the-onepage-checkout | code | In Magento 2, I would like to be able to select the shipping address with a dropdown, similar to how you can if you choose to change the billing address.
This is how it currently works:
I would like it to work similarly to when you change the billing address, with a dropdown:
I can see the dropdown for the billing address is set in:
But I can't find the knockout template for the shipping address section, I thought it would be on of the files in:
But I couldn't find any here which worked. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100112.41/warc/CC-MAIN-20231129141108-20231129171108-00610.warc.gz | CC-MAIN-2023-50 | 492 | 6 |
http://www.instructables.com/id/Electro-Static-Discharge-ESD-Safe-Seat-Cover/ | code | The good news is that it's relatively inexpensive and simple to protect yourself from ESD damage. The key is making sure that all parts of your work bench (including yourself) are at the same electrical potential. You do this by working on a static dissipative mat (http://www.esdmat.com/), wearing an ESD wrist strap (http://en.wikipedia.org/wiki/Antistatic_wrist_strap). Even though you're wearing a wrist strap it's important that you don't do anything to build up charge on your body. Shuffling your feet on the carpet or sitting on a synthetic fiber chair can both build significant static charge on your body.
My electronics work bench is right behind my computer and so it would be convenient to be able to swivel around from computer to work bench on my office chair. The problem for me is that my office chair is upholstered with polyester and builds static charge on my body very quickly. As a result I never use my office chair while working on the electronics bench and switching from computer to project is as a result a pain in the neck. Since I'm often programming an Arduino or other microprocessor I have to switch back and forth quite often.
The solution was to fit my chair with a static dissipative surface. My search for ESD safe chair covers brought up a number of very expensive professional options which were well outside of what I wanted to spend and so I turned my attention to making one from scratch.
I knew the surface needed to be electrically conductive and I first looked into conductive fabrics like this stuff: http://www.sparkfun.com/commerce/product_info.php?products_id=9769. The problem with that stuff is, once again, the price tag. I knew I could do better price-wise. The solution turned out to be space blanket. This stuff is polyester sheet with aluminum vapor deposited on it in a super thin layer. The aluminum layer is conductive and the stuff is super cheap; it was the perfect solution.
Step 1: Ingredients
1) Space Blanket. You can get this from camping stores or good hardware stores. You can also pick it up cheap online like from Amazon. Expect to pay around $3 (US) for one.
2) 18-gauge stranded copper wire, preferably with green insulation (green is always ground in the US). 6 or 8 feet will be fine.
3) One 500 kilo-ohm resistor. You could just as easily use a 1 mega-ohm or 2 mega-ohm resistor. The purpose of the resistor is to make sure that current doesn't flow from some other part of the project into your seat cover. That wouldn't be nice at all.
4) Heat shrink tubing
5) Two alligator clips.
6) Packing tape (optional) | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706470197/warc/CC-MAIN-20130516121430-00033-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 2,584 | 11 |
https://njpatel.blogspot.com/2008/05/bits-pieces.html | code | - Canonical - The first couple of months have been awesome! Lots of cool things are happening here, everyone's very busy and there are some really exiting projects which will hopefully be in public very soon.
- UDS Prague - I'll be attending UDS this year, so ping me if your attending and would like to discuss various bling on desktop/mobile environments! Extra points if you support Manchester United, and want to go watch the Champions League final on the wednesday that week :-).
- Awn - Not much happening at the moment from my side. Hopefully this will change in a couple of weeks, at which point I hope to finish the remainder of non-composite support in trunk, and make a beta release for 0.4
- Random Hacking - Since late last year, most of my spare hacking time has been spent on Awn, which is great, but it means some of my other ideas/projects got left behind. So, I've been trying to remedy this by picking up these projects and starting to work on them once again. The two I'm concentrating on at the moment are Nautilus and Affinity. I hope to get some code out soon, so stay tuned!
Friday, 9 May 2008
Bits & Pieces
As usual, I'm leaving far too long between each blog post, but I thought I'd make a small update until I get a chance to write up everything that's been going on: | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122865.36/warc/CC-MAIN-20170423031202-00092-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 1,294 | 7 |
https://www.ergoblog.com/frogpad_gets_th/ | code | A recent reviewer over at MSNBC gave the Frogpad a thumbs down review. Apparently, it’s well put together, but hard to learn. I haven’t tried the Frogpad yet, but have tried several ergonomic keyboards in my quest to help my RSI hands and they do seem to have steep learning curves in common.
The problem is we all learned to type with QWERTY keyboards, a setup that was originally invented to force people to type slower in order to keep the mechanical keys from jamming. Unfortunately, there’s nothing ergonomic about the QWERTY layout, and there’s no need to stick to it when using a computer. If you’re thinking about changing to something else (lots of today’s ergonomic keyboards are coming out with alternatives that put the more used keys under the stronger digits, ie. Enter under the thumb instead of the pinkie), you should be prepared for the fact that it will come with a steep learning curve. If you can, try to rent or borrow an ergonomic keyboard before committing to buying it.
If you don’t want to learn something new but one something that’s easier on the hands, I recommend the Kinesis Contoured Keyboard, which I’ve had good luck with. Though some keys are hard to get used to (ie. arrows being split and moved), the most used keys are in the same place, just canted a little differently.
Read the Frogpad review at FrogPad takes time — a lot of time — to master | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100568.68/warc/CC-MAIN-20231205204654-20231205234654-00419.warc.gz | CC-MAIN-2023-50 | 1,405 | 4 |
https://www.collabora.com/news-and-blog/blog/2017/11/09/quick-hack-experiments-with-crosvm/ | code | November 09, 2017
Last week I played a bit with crosvm, a KVM monitor used within Chromium OS for application isolation. My goal is to learn more about the current limits of virtualization for isolating applications in mainline. Two of crosvm's defining characteristics is that it's written in Rust for increased security, and that uses namespaces extensively to reduce the attack surface of the monitor itself.
It was quite easy to get it running outside Chromium OS (have been testing with Fedora 26), with the only complication being that minijail isn't widely packaged in distros. In the instructions below we hack around the issue with linker environment variables so we don't have to install it properly. Instructions are in form of shell commands for illustrative purposes only.
$ cd ~/src $ git clone git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git $ cd linux $ git checkout v4.12 $ make x86_64_defconfig $ make bzImage $ cd ..
$ git clone https://android.googlesource.com/platform/external/minijail $ cd minijail $ make $ cd ..
$ git clone https://chromium.googlesource.com/a/chromiumos/platform/crosvm $ cd crosvm $ LIBRARY_PATH=~/src/minijail cargo build
$ cd ~/src/crosvm $ dd if=/dev/zero of=rootfs.ext4 bs=1K count=1M $ mkfs.ext4 rootfs.ext4 $ mkdir rootfs/ $ sudo mount rootfs.ext4 rootfs/ $ debootstrap testing rootfs/ $ sudo umount rootfs/
$ LD_LIBRARY_PATH=~/src/minijail ./target/debug/crosvm run -r rootfs.ext4 --seccomp-policy-dir=./seccomp/x86_64/ ~/src/linux/arch/x86/boot/compressed/vmlinux.bin
The work ahead includes figuring out the best way for Wayland clients in the guest interact with the compositor in the host, and also for guests to make efficient use of the GPU.
PipeWire continues to evolve with the recent integration of libcamera, a library to support complex cameras. In this blog post, I'll explain…
A high-level introduction of the Linux graphics stack, how it is used within ChromeOS, and the work done to improve software rendering (while…
Last year, a (controversial) feature was added to the Linux kernel to support optimized case-insensitive file name lookups in the Ext4 filesystem.…
We have now integrated Mali GPU hardware counters supported by Panfrost with Perfetto's tracing SDK, unlocking all-in-one graphics-aware…
Key performance improvements and fixes to GStreamer's RTP stack have landed in GStreamer 1.18, due in the coming months. The latest enhancements…
Following our recent presentation at OSSummit, many showed interest in learning more about solving real-world problems with computer vision.… | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400198213.25/warc/CC-MAIN-20200920125718-20200920155718-00349.warc.gz | CC-MAIN-2020-40 | 2,585 | 15 |
This code-related data from Fineweb was specifically used in OpenCoder pre-training. We employ fastText in three iterative rounds to recall a final dataset of 55B code and math-related data. You can find math-related data at OpenCoder-LLM/fineweb-math-corpus.