id
string
probability
float64
text
string
<urn:uuid:a2be7761-fa06-42f4-8f04-7f7a7e455b20>
0.10653
Baskin, J. Spencer and Rose, Todd S. and Zewail, Ahmed H. (1988) Picosecond IVR dynamics of p-difluorobenzene and p-fluorotoluene in a molecular beam: Comparison with chemical timing data. Journal of Chemical Physics, 88 (2). pp. 1458-1459. ISSN 0021-9606 http://resolver.caltech.edu/CaltechAUTHORS:BASjcp88 - Published Version See Usage Policy. Use this Persistent URL to link to this item: http://resolver.caltech.edu/CaltechAUTHORS:BASjcp88 We present in this Communication preliminary time-resolved fluorescence measurements of supersonaically cooled samples of pDFB and pFT. These measurements indicate that IVR in both cold molecules up to ~1600 cm^-1 of excess vibrational energy is substantially less than that reported for the same vibrational excitations in room temperature chemical timing studies. |Additional Information:||Copyright © 1988 American Institute of Physics. Received 1 October 1987; accepted 3 November 1987. This research was supported by Grant No. CHE-8512887 from the National Science Foundation. [A.H.Z. was a] John Simon Guggenheim Foundation Fellow. Arthur Amos Noyes Laboratory of Chemical Physics, Contribution No. 7660.| |Subject Keywords:||MOLECULAR BEAMS, SUPERSONIC FLOW, FLUORINATED AROMATIC HYDROCARBONS, VIBRATIONAL STATES, RELAXATION, FLUORESCENCE, COOLING, ENERGY TRANSFER| |Other Numbering System:| |Usage Policy:||No commercial reproduction, distribution, display or performance rights in this work are provided.| |Deposited By:||Archive Administrator| |Deposited On:||22 Sep 2008 20:30| |Last Modified:||26 Dec 2012 10:19| Repository Staff Only: item control page
<urn:uuid:41fe1704-85bd-412d-9493-49ddeeb57dd1>
0.442801
[FFmpeg-devel] Behaviour of url_read_complete Sun Jan 24 10:41:14 CET 2010 On Sat, Jan 23, 2010 at 08:52:59PM -0800, Art Clarke wrote: > So your patch is right -- but people shouldn't use url_read_complete(...) if > they want to do non-blocking socket I/O. If you want to do that you would have to have support for resuming a read anyway, so what would be the advantage of using url_read_complete? And please if you have suggestions for improving the documentation say so. > Protocol handler to not use url_read_complete(...) so it works for > non-blocking I/O Making it not use it everywhere I think would make things really ugly. As I understand it, the point of url_read_complete is exactly _not_ having to do that kind of checks all over the place. Though it might be enough to just replace it at some strategic points... More information about the ffmpeg-devel
<urn:uuid:87c1243b-e699-43bb-876f-4b93ba568d30>
0.480133
Re: Su T-50 in Flight - From: Rob Arndt <teuton263@xxxxxxx> - Date: Fri, 20 Aug 2010 22:58:03 -0700 (PDT) On Aug 20, 7:34 pm, Daryl Hunt <dh...@xxxxxxxxxxxxxxxxx> wrote: On Aug 20, 7:43 pm, LIBERATOR <jgcho...@xxxxxxxxx> wrote: On Aug 19, 7:45 pm, Daryl Hunt <dh...@xxxxxxxxxxxxxxxxx> wrote: LIBERATOR wrote:LOL, how dare you pick on VW's. The Sukoi T-50 is a scary mean looking On Aug 19, 9:18 am, Rob Arndt <teuton...@xxxxxxx> wrote:No, you aren't. Well half right, maybe. Guess the Russians the characteristics, all look like Junkers and more superior to ours.. Am I wrong? decided to make the back of the plane look as nice as the front. it's not really necessary to have a nice looking rear unless you are modeling for VW. The rear engines swivel to add to dynamic manuevering? For crying out loud I know this was German designed. It had to be Junkers.... uh right? What is the reason we have no amazing designs like this? The F-35 doesn't meet the greet. It's still a mig29. 5th gen it will never be. It can only be made a decent 4th gen.- Hide quoted text - - Show quoted text - MiG-35 is considered Gen 4++ FYI and the best Sukhois are Gen 4.5. The F-22 is not a true 5th Gen. Please tell me how it could ever cover the breadth of either China or the USSR? Please also tell me what enemy a/ c the F-15 ever faced that was on equal terms? NONE. It has never faced any of the Su-27 flanker family nor the Russian MiG-29 family with upgrades. I can post all the technical data and sensor suite updates for you, but as in your previous posts, you just ignore them. Again, prove that the F-15C or F-22 can tackle any of those a/c. Theoreticals aside, or course. You can't as the USAF is playing with UAVs, UAS', and primitive UCAVs (Predator, Reaper, Avenger) to fight insurgents. Your vaunted F-15C has no role in the ME and flying over Iran will not be easy for the F-15I which is the best F-15 made. They have sat at Tel Nof for years as the EU political games and US foreign policy bumbling continues. During ODS the vaunted invisible F-117 WAS picked up by several Iraqi radars (various bands and millimetric) and fired upon. Matt Byrd's "Habu II" was targeted TWICE and fired upon by SAs. He dodged both. Same for the F-22. As soon as it crosses the cellular radar network it is compromised and when it opens it bay doors it can be painted. It has to fly in daylight vs night for the B-2 and F-117 and the Chinese and Russians in any war will have HUNDREDS of fighters and interceptors in the air supported by various anti-stealth networks, integrated missile batteries, their own BVR weapons, and their EO weapons and sensors which the US cannot detect as they are non- You never answered anything of those questions I put you to test on... only the old victor song of F-15 remains undefeated. Why? Because it never faced an _equal_ opponent in its entire history!!! The F-22 has not either and just 20 of them = no real offensive capability against Russia or China. Finally, if a F-117 could be downed by Serbs and Iraq downed several Predators... what makes you think mighty Russia and China will not do I'd like to see the US fighters actually face the Cobra manoeuver and other manoeuvers that US fighters cannot even duplicate as they would be ripped apart mid-air. TSAGI did a great job developing the wings for those planes and with thrust vectoring and high AoA, IRST and EO sensors and weapons... the Flankers and Fulcrums are deadly. So are the Chinese J-models. And since the US would not sell F-22s to Japan from scratch Mitsubishi has a nice design with the ADT-X RCS model and no doubt could probably rival the F-22 with a dedicated air superority Mitsubishi F-3 if they wanted to and it got funded. The you have the Europeans with BAe, Dassault, EADS, and Saab that all have various stealth designs and some covert a/c flying. At least Germany did not have to copy Ufimtsev's book to design a faceted stealth fighter- they came up with the MBB Lampyridae (Firefly) on their own as armed interceptor by 1981 and pissed the fuck out of the visiting USAF that pressured the W German Govt to drop the project by 1989. But Germany retained the knowledge gained and now we know that DASA and EADS had/have many stealth designs and probably something flying just as the UK and France decided to ignore the US request NOT to build stealth aircraft. Germany and Spain also have the Barrakuda UCAV and EADS is developing a range of stealth missiles and anti-stealth missiles with EO and plume sensors. The F-22 could not hide from either. Daryl, I think you are willfully ignorant of modern tech. - Re: Su T-50 in Flight - From: Daryl Hunt - Re: Su T-50 in Flight - Prev by Date: Friday's letters: B-17 heroes - Next by Date: Re: German Hotties for MSP!!! - Previous by thread: Re: Su T-50 in Flight - Next by thread: Re: Su T-50 in Flight
<urn:uuid:8bd84d2b-cbe8-4c40-b241-bc3613cb91fb>
0.069631
- Marvell: MMP2 (Cortex A8) Board Support Package, Operating Environments and Low-Level SW ARM’s highest performing processor, extending the capabilities of mobile and enterprise computing. Read More... Aomata Consulting is based out of Milpitas, California and our core focus is on providing world-class Windows platform software development services. Our core competencies include working with WinCE, 5.0, 6.0 & 7.0 (aka: Embedded Compact 7), and soon to be released Windows 8, as well as, Windows Phone for intelligent hand-held devices, multimedia products and general embedded applications. We specialize in Security, Video Surveillance, Streaming Audio & Video data acquisition, Medical, Mobile platform and general WinCE embedded platform development. 1525 McCarthy Blvd. Milpitas, California 95035 Phone: 408-805-6739 OR 206-446-8816
<urn:uuid:1ba3f320-0cad-4ad9-a458-5805aeb47e9f>
0.090067
|Name:||Delicious, Del.icio.us (older variant)| |Click here for related articles on Fanlore.| Delicious is a social bookmarking service that allows users to save, tag, manage and share bookmarks from a centralized source. A significant aspect of the site is that, like many Web 2.0 sites, its tags are user-generated, non-hierarchical, and uncontrolled. Users create and apply their own tags in one step, and they can apply as many tags as they like to each bookmark. Fannish Uses of Delicious Fans who use Delicious use it to save fandom-related links or meta (in their own delicious accounts) and locate recommendations for fannish reading material or find fanworks that might interest them (often using others' delicious accounts). Some fans maintain multiple accounts; others might throw fannish and non-fannish bookmarks into one account. The following is a list of major fannish uses of the site: - Bookmarking favorite fanworks on their personal accounts. - Creating and maintaining their own tags (hours of fun!), using either shared fannish vocabulary or their own system. - Maintaining an easy-to-update rec list for self, friends, fandom at large, and/or specific communities and projects. Delicious is well suited for themed rec list. - Sifting through a trusted reccer's delicious tags for fanworks to consume. - Browsing or subscribing to site tags related to certain fandoms, pairings, genres, or other fannish keywords. The number of users who have bookmarked a given webpage displays prominently and can be an indication of its value; using the "popular" function in particular serves as an automatically generated rec list. - Searching for your own name so you can see how many people have bookmarked your posts or stories and what they're saying about you. - Searching for Fanworks on the Internet: Hunting down a particular fanwork you know exists but lost the link to -- because some fans use many descriptive tags and notes in their bookmarks using delicious could be much faster than using a Fic Finding community or google -- or searching for any fanworks that fit a particular theme. - Finding updated URLs for fanworks that have disappeared from one location on the internet. - Other searches? Looking at tag clouds or search results also allows statistics-minded fans to analyse fannish trends, as well as discover new content. Users can see their own bookmarks, their tags, notes and how many other people have bookmarked the same website. Tags can be collected in bundles; this allows a user to organize tags in groups such as "author" or "pairing". The notes field is especially useful for fans using Delicious for rec lists or newsletters. Many fans name their tags to correspond to typical fanwork metadata such as author, fandom, rating, genre, character, pairing, and sometimes even length or status (complete or WIP) will be added to a bookmark. These naming conventions in turn make it easier for other fans to find fanworks by tag on Delicious. For example, a search for "fanfic" will bring up all recently bookmarked pages tagged with that term: http://delicious.com/tag/fanfic Some users add punctuation or other characters, often just to sort their tags alphabetically. Because Delicious tags were until the September 2011 relaunch space-separated, rather than comma-separated, tags composed of phrases are also likely to contain underscores (_) or periods (.). Atypical tags are more difficult to search on, but can be useful if the user is browsing only the reccer's account. The Network is a good way to find new content, but Subscriptions allow a broader scope. A user may subscribe to a certain tag, such as "fanfiction", and will then see all recently bookmarked websites tagged with that term. Examples of Fandom-Related Delicious Accounts - Rec Room (Fanfic Recs) - Fandom Directory (Directory for Livejournal users with fannish Delicious accounts) - List Links (Recs and Thematic Lists) - Metafandom (Metafandom's Links) - SGA_newsletter (SGA Newsletter's links) - Ultimateficarchiver (Massive listing of fanfiction, tagged by fandom, pairing, genre and author) - Why , :, !, and . have no place in your delicious bookmarks by cimorene, October 27, 2009. Post that talks about the social aspects of tagging. - July 2006 poll by Sandy Herrold - Numbers, I love (horribly inexact) numbers! by Sandy Herrold, April 1, 2010. - wistfuljane's 2008 post on RPF classification - finding your flock by catechism, May 19, 2009. Includes discussion of how to make friends on Delicious - Agatha S. Donkar. "I'm In Ur Bookmarks, Stealin' Ur Tags!: Closed Communities and Their Influence On Consistent Vocabularies In User Developed Folksonomies." April 2007. (Master's thesis) Post-relaunch Reactions, September 2011 - Geekery and Randomness, Links, Delicious - discussion and link roundup by somnolentblue on Dreamwidth - Delicious v/s Diigo v/s Pinboard - by bookshop on LiveJournal - AVOS!Delicious: The Good, The Bad & The Future - by kronos999 on LiveJournal - untitled reblog by Minimoonstar on Tumblr - del linkspam on deliciouslymad (LJ community) For many LiveJournal fans, Delicious represented a better solution to some existing link-hoarding practices, such as hand-coding lists of recs in LJ posts or using LJ's cumbersome Memory function. In general, the convenience of Delicious encouraged a shift from posting rec lists on fansites and blogs. However, Delicious may be more popular among journaling fans than other fan communities. (?) Delicious Closure Scare A December 16, 2010, news report stating that Yahoo was going to shut down Delicious was widely linked by journaling fans, and mass fannish outcry occurred within hours. Various existing alternatives were discussed, and there was talk of creating a new fan-friendly version of Delicious, a la Dreamwidth. The possibility of switching to AO3's nascent bookmarking feature was also floated. According to later reports, there was a possibility of Delicious being sold instead of shut down. Delicious Sale and Renewed Opt-In Policy On 27 April 2011, the acquisition of delicious by AVOS (an internet company founded by the founders of YouTube) was announced. At that time, the transfer of content was expected to happen around July 2011, but the new site was not launched until September 27, 2011. Fannish users quickly started discussing the active opt-in policy and ToS, and ideas for archiving old delicious accounts that might become inaccessible once the sale and transfer were completed, as well as continuing to urge making backups of delicious bookmarks elsewhere. AVOS Launches New Delicious When the new Delicious was launched on September 27, it was met with an intensely negative response. Immediately, many fans started accounts on other social bookmarking services (notably Diigo and Pinboard), people started posting and linking meta, and one fan set up a google spreadsheet for people to self-report their user names on alternate services.One Tumblr user addressed TPTB at Delicious: I would like to take this opportunity to thank Delicious. I really appreciate the way that you have taken a user friendly, helpful and extremely useful tool and turned it into a convoluted mess that is nearly incomprehensible. The part where there is no central location for all my tags is great. The fact that they are not listed in order of size, alphabetically or recent is even better. I thought the way that you completely dissolved all the bundles I have made in favor of the much more confusing ‘stacks’ was inspired. I especially enjoy the part where you can’t create stacks using your own tags, but rather have to bring in the links individually. I find the “has:____” tag that you added to be particularly helpful, as we internet users would not have noticed this in our own tags without it. It was very smart of you to get rid of the tagging feature that let us select previous tags after we’d typed the first few letters. It was a silly and gratuitous and it made us lazy. We should have to type out the full tag, it builds character. In short, thank you for turning our archiving resource into a social networking site. There weren’t nearly enough and I was probably reading too much fanfiction anyway. Also, thanks for locking so many people out of their accounts. Those guys were getting pretty annoying.You are an inpiration to websites everywhere. An interview with Delicious' new owner suggested that AVOS' vision of the site does not--and will not--mesh with fandom's needs. As fan runpunkrun said: "Our new digital overlord, Chad Hurley, gave an interview in which he complained about how things just got so hard when people were using Delicious to save links and tags and information. So he put a stop to it." The offending Q&A: How is this different from the original Delicious? It became hard when people were adding all this information, tags and links. We’re applying a new layer of ways for people to explore the information. Relating to YouTube terms, playlists were an underappreciated feature of the site, and we saw an opportunity to introduce that concept in a broader sense against all media. The initial version of AVOS Delicious did not include tag bundles. Many kink meme, comment fic sites and newsletter communities relied on the bundles to organize the tags for creating or organizing their content. Some communities immediately switched to other sites, even though they did not offer the tag bundle feature either, often because other features or functionality was missing. Many newsletters that used Delicious to collate their links were forced to hand-code or partially hand-code their posts, putting pressure on fans who had been relying on automation to make a labour intensive job easy enough to be handled by a few volunteers. The Delicious RSS feeds were non-functional for several days, and even though AVOS announced they were still supporting the old APIs, many scripts did not work after the re-launch. Some newsletter communities switched immediately to Pinboard since its API is very similar to the old Delicious one. Fannish interest in general focused on Diigo and Pinboard as alternatives. The quick and positive interest by the Pinboard owner, Maciej Ceglowski, in fannish users led to the creation of a collaborative GoogleDoc spec request for features he could implement to make Pinboard more attractive to fans. The result was a document he described in a Tweet: "Watching that epic Google doc grow a table of contents. Soon it will acquire robotic exoskeleton and begin roaming the earth." The inevitable result of the Twitter conversations, and some comments in the GoogleDoc itself, was some Anthropomorfic. - The Morning After by ambyr pairs Fandom/Pinboard and leaves Delicious out in the cold with Diigo. - When Bookmarks Were In Mustache Land by Jedusaur paraphrases the fannish reaction to the Delicious relaunch in play form, and discusses Pinboard's reaction to the fannish migration. - Note: This list describes fannish use before the September 2011 relaunch. Changes in interface and functionality following the relaunch may hinder or make impossible some of the items listed. - Ironically, the official Delicious blog celebrated fandom's use of Delicious tag bundles in a 2013 post, two years after fandom had purportedly left Delicious. Bundle functionality had been lost after the relaunch and was recreated some time later. See Community Spotlight: Fandom!, Posted on June 17, 2013 by jessie. - Is Yahoo Shutting Down Del.icio.us? by Alexia Tsotsis. TechCrunch - bluemeridian. Bloody HELL [aka @#%**! Delicious News], Dreamwidth post, 2010-12-16. (Accessed 17 December 2010). - Anatomy of a Crushing Pinboard official blog post which includes site traffic stats for the days after the closure announcement. (Accessed September 30, 2011) - YouTube Founders Acquire Delicious From Yahoo! "Promise Users the Same Great Service And Even Easier & More Fun Ways To Save, Share, and Discover the Web's "Tastiest" Content." -- press release at AVOS.com website, 27 April 2011. (Accessed 17 May 2011) - The answers to frequently asked questions about the AVOS transition help page at delicious.com (Accessed 17 May 2011) - archiving links post by catechism at deliciouslymad LJ community, 28 April 2011. (Accessed 17 May 2011) - More Del.icio.us talk post by anatsuno urging users to log in to delicious and opt in to the new ToS so their bookmarks remain accessible, 1 May 2011. (Accessed 17 May 2011) - oh my god (Accessed Sept. 27, 2011) - thread at Fail-Fandomanon (Accessed Sept. 27, 2011) - special edition of /report by rageprufrock and mklutz. - lian. quick'n'dirty delicious linkspam - the great delicious migration - Personally, I love the new Delicious. Really. (Accessed Sept. 27, 2011) - Batman hates it when Web 2.0 gets in the way of his bookmarking. (Accessed Oct. 11, 2011) - Delicious Relaunches: Exclusive Q&A With CEO Chad Hurley (Accessed Oct. 11, 2011) - Pinboard How To (API) (Accessed September 30, 2011) - Pinboard feature request - wishlist! (Accessed September 30, 2011) - Tweet from Pinboard official twitter on September 29, 2011. (Accessed September 30, 2011)
<urn:uuid:d6437848-b9fc-4987-a08a-31e2a87f5a9c>
0.117146
We have a desktop version of our site at http://www.domain.com, and some weeks ago, we launched a mobile edition at http://m.domain.com, replicating the most important sections of the site, but not yet all of them. Actually, if you access with a mobile device userAgent to any desktop url you are redirected to the home of the mobile web. This is the only redirect implemented about mobile and desktop versions. A) Shall we also redirect "Googlebot-Mobile" to our mobile site, or it could be considered cloaking? B) Its necessary to implement the rel="alternate" media="handheld" tag in all of our Desktop SEO URLs? And in our mobile ones? Can't it be implemented via sitemaps like the rel="alternate" hreflang="x" tag? C) Would the linkbuilding job done on the Desktop version affects the Mobile also, or we would still need to do a separate job?
<urn:uuid:2d2fff19-cd75-4e42-919d-10bc3cc14c84>
0.047733
Lender Exceptions Processing in WorldCat Navigator If you are unable to view the tutorial on this page, click here to view it as an MP4 format. This video shows lending libraries how to take exceptional actions on requests - actions that go beyond the basic Ship or Check-In actions. These exceptions include how to say No to a request (Answer Non-Supply), how to send an overdue notification, etc. How to use this tutorial OCLC's tutorials are a useful tool for understanding the functionality our products. They can help you learn a new service, teach a new staff member how to use a service, and can also prepare you with basic knowledge about a service prior to taking one of our instructor-led courses.
<urn:uuid:8ac546a7-18c6-4438-90d5-73e489722613>
0.044372
Explore the help topics, and if you can't find your answer or just want to say 'hi', please email us -- we'd love to help! Tasks are impossible to postpone (they keep returning to the original due date) or postpone to the wrong day or time. Your timezone setting in Remember The Milk does not match the system timezone on a computer where you use the site. Timezone mismatches may prevent tasks from being postponed correctly. Check to make sure that your timezone on the Settings screen in Remember The Milk matches your system timezone on any computers where you use the site. It's particularly important to check the location of the timezone to make sure that they match as well (to ensure that daylight savings time is observed correctly for your account). Note about timezones: If you're viewing Remember The Milk from a different timezone -- for example, when traveling -- your tasks may appear on the wrong day or postpone incorrectly. Unfortunately Remember The Milk doesn't currently support shifting timezones; when a due date is set in one timezone, the task will be due at the start of that day (that is, midnight) in that timezone. Thus, any timezone offsets can affect the display of your tasks. Aside from correcting any discrepancy between your Remember The Milk and system's timezones, if you encounter this problem you should be able to correct it for a given task by resetting a task's due date (that is, simply editing the due date and pressing Enter should suffice). If you've moved permanently, please contact us so we can correct this for all of your tasks. Still need help? Contact a human
<urn:uuid:cc1dab52-aa79-415d-96f8-00abc87f3636>
0.187167
I have to write a C/C++ program to process a bunch of text files (around 100) and find a pattern (commonly a string). Since the platform I am going to run this will be unix, I thought why wouldn't I make use of the grep system command within my program as it is very fast and effective. But, my friend says using system("grep...") within a program is not advisable. He suggests me to use string pattern matching algorithm which I feel will slow down the program. So, I want some advice over this. Help me out.
<urn:uuid:7a765f67-9f49-419c-8464-abc39f36b460>
0.158678
what cabling is required to connect this hub to an iMac - Asked by Michael J Belkin Ultra-slim 4-PORT USB 2.0 Hub Product No Longer Available 1 Answer from the Community It requires a USB 2.0 cable which is included in the box. If you buy one, don't bother plugging in the power cable as the iMac kicks out more than enough power. Be aware though, you CANNOT charge your iPad through this device. - Answered by Paul D
<urn:uuid:c82de6c0-56b6-4817-8f92-3a5407fb2b9e>
0.476204
[LinuxBIOS] [PATCH] v3: add a check for a termination member stepan at coresystems.de Thu Jan 10 14:36:12 CET 2008 * Carl-Daniel Hailfinger <c-d.hailfinger.devel.2006 at gmx.net> [080107 14:37]: > >> 2. Explicit free space covering lar member is fine, but to add any new > >> file to the archive, you have to erase the part covered by the exlusive > >> space. > > I don't think this is such a bit problem. Lar could remove this entry > > automatically, and recreate it. This is not more special code in lar > > than 1. But I start thinking that those two are pretty much the same in > > the end. > Yes, 1 and 2 are very similar. Your proposal is almost exactly what I > had in mind. This "dummy" member would be removed once a file was added > to the lar and the new entry would "overwrite" the dummy header. If we > have an explicit size in the dummy header, we can point to the next > header easily without having to stop. However, once we use an explicit > size (setting some bits to 0), we have to erase the flash block to add a > new entry in place of the dummy. One plea though: What you describe usually only happens in a (currently) very rare case. That is the case where the "free" entry falls exactly on a flash block border. Sure. We could have gaps to match up flash chip borders again. But this would re-introduce the problem of having to slowly walk a lot of space all Also, a potential update might as well exchange modules instead of just adding modules that were not there before. This will potentially shift all files in the lar, making it necessary to reflash the complete flash > If we don't specify the size and keep > all header entries (except magic) at value 0xff (all bits set), we still > can write the new archive member without erasing because setting bits to > 0 is always possible. I am not convinced that safing flash erase cycles on bios updates is worth any design considerations. With one BIOS update a day, even deleting all flash blocks makes an average SST chip live at least 273 years. Do we need to extend that? > My proposed code change is not very flexible and really only serves as > "end of interesting lar members" marker, but it is flash-friendly. > Besides that, the code can be overridden so if you really want to look > at the boot block, you can do so easily. So that would be another runtime parameter? > > What about a linked list in the header? Each file could explicitly point > > to the next file. If the pointer is 0 or -1, we stop. > Nice idea, but it may not work in all cases. Requirements for this to > work cleanly are: > - The next pointer needs to have all bits set to 1 in the "stop pointer" > case, or it is impossible to add a member after the member with a stop > pointer without erasing the sector containing the header with the stop Oh my idea was to have the bootblock have a "next" member of -1. So there would always be a next member with 0 and 1 bits except for the last one (that will not allow you to put one behind it anyways, due to the reset vector on the x86 architecture) Keep in mind that currently flashrom ALWAYS erases the complete flash chip except for some esoteric uses of the PMC PM49FL004. No, I am not saying that we should keep a good concept out of LinuxBIOS just because one of the tools can not cope with this yet. But I fail to see the whole picture in the solution yet. coresystems GmbH • Brahmsstr. 16 • D-79104 Freiburg i. Br. Tel.: +49 761 7668825 • Fax: +49 761 7664613 Email: info at coresystems.de • http://www.coresystems.de/ Registergericht: Amtsgericht Freiburg • HRB 7656 Geschäftsführer: Stefan Reinauer • Ust-IdNr.: DE245674866 More information about the coreboot
<urn:uuid:4bf1d528-43a5-4e9b-b112-3bcf31d5970a>
0.059255
Label: RANEXA- ranolazine tablet, film coated, extended release - NDC Code(s): 55154-4427-0, 55154-4427-4, 55154-4427-6 - Packager: Cardinal Health - This is a repackaged label. - Source NDC Code(s): 61958-1001 - Category: HUMAN PRESCRIPTION DRUG LABEL - DEA Schedule: None - Marketing Status: New Drug Application If you are a consumer or patient please visit this version. - HIGHLIGHTS OF PRESCRIBING INFORMATION These highlights do not include all the information needed to use Ranexa safely and effectively. See full prescribing information for Ranexa (ranolazine) extended-release tablets Initial U.S. Approval: 2006 INDICATIONS AND USAGE Ranexa is indicated for the treatment of chronic angina. (1) DOSAGE AND ADMINISTRATION 500 mg twice daily and increase to 1000 mg twice daily, based on clinical symptoms (2.1) (2) DOSAGE FORMS AND STRENGTHS Extended-release tablets: 500 mg, 1000 mg (3) WARNINGS AND PRECAUTIONS • QT interval prolongation: Can occur with ranolazine. Little data available on high doses, long exposure, use with QT intervalprolonging drugs, or potassium channel variants causing prolonged QT interval. (5.1) (5) Most common adverse reactions (> 4% and more common than with placebo) are dizziness, headache, constipation, nausea. (6.1) (6) To report SUSPECTED ADVERSE REACTIONS, contact Gilead Sciences, Inc., at 1-800-GILEAD-5 or FDA at 1-800-FDA-1088 or www.fda.gov/medwatch. (6) • CYP3A inhibitors: Do not use Ranexa with strong CYP3A inhibitors. With moderate 3A inhibitors (e.g., diltiazem, verapamil, erythromycin), limit maximum dose of Ranexa to 500 mg twice daily. (7.1) (7) • CYP3A inducers: Do not use Ranexa with CYP3A inducers. (7.1) (7) • P-gp inhibitors (e.g., cyclosporine): May need to lower Ranexa dose based on clinical response. (7.1) (7) • Drugs transported by P-gp or metabolized by CYP2D6 (e.g., digoxin, tricyclic antidepressants): May need reduced doses of these drugs when used with Ranexa. (7.2) (7) See 17 for PATIENT COUNSELING INFORMATION (7) Revised: 09/2009 (7) See 17 for PATIENT COUNSELING INFORMATION. - FULL PRESCRIBING INFORMATION: CONTENTS* - Sections or subsections omitted from the full prescribing information are not listed. - 1 INDICATIONS AND USAGE Ranexa is indicated for the treatment of chronic angina. Ranexa may be used with beta-blockers, nitrates, calcium channel blockers, anti-platelet therapy, lipid-lowering therapy,and angiotensin receptor blockers.Close - 2 DOSAGE AND ADMINISTRATION 2.1 Dosing Information Initiate Ranexa dosing at 500 mg twice daily and increase to 1000 mg twice daily, as needed, based on clinical symptoms. Take Ranexa with or without meals. Swallow Ranexa tablets whole; do not crush, break, or chew. The maximum recommended daily dose of Ranexa is 1000 mg twice daily. If a dose of Ranexa is missed, take the prescribed dose at the next scheduled time; do not double the next dose. 2.2 Dose Modification Dose adjustments may be needed when Ranexa is taken in combination with certain other drugs [see Drug Interactions (7.1)]. Limit the maximum dose of Ranexa to 500 mg twice daily in patients on diltiazem, verapamil, and other moderate CYP3A inhibitors. Down-titrate Ranexa based on clinical response in patients concomitantly treated with P-gp inhibitors, such as cyclosporine. - 3 DOSAGE FORMS AND STRENGTHS Ranexa is supplied as film-coated, oblong-shaped, extended-release tablets in the following strengths: • 500 mg tablets are light orange, with GSI500 on one side • 1000 mg tablets are pale yellow, with GSI1000 on one sideClose - 4 CONTRAINDICATIONS Ranexa is contraindicated in patients: • Taking strong inhibitors of CYP3A [see Drug Interactions (7.1)] • Taking inducers of CYP3A [see Drug Interactions (7.1)] • With clinically significant hepatic impairment [see Use in Specific Populations (8.6)]Close - 5 WARNINGS AND PRECAUTIONS 5.1 QT Interval Prolongation Ranolazine blocks lKr and prolongs the QTc interval in a dose-related manner. Clinical experience in an acute coronary syndrome population did not show an increased risk of proarrhythmia or sudden death [see Clinical Studies (14.2)]. However, there is little experience with high doses (> 1000 mg twice daily) or exposure, other QT-prolonging drugs, or potassium channel variants resulting in a long QT interval. - 6 ADVERSE REACTIONS 6.1 Clinical Trial Experience Because clinical trials are conducted under widely varying conditions, adverse reaction rates observed in the clinical trials of a drug cannot be directly compared to rates in the clinical trials of another drug and may not reflect the rates observed in practice. A total of 2,018 patients with chronic angina were treated with ranolazine in controlled clinical trials. Of the patients treated with Ranexa, 1,026 were enrolled in three double-blind, placebo-controlled, randomized studies (CARISA, ERICA, MARISA) of up to 12 weeks duration. In addition, upon study completion, 1,251 patients received treatment with Ranexa in open-label, long-term studies; 1,227 patients were exposed to Ranexa for more than 1 year, 613 patients for more than 2 years, 531 patients for more than 3 years, and 326 patients for more than 4 years. At recommended doses, about 6% of patients discontinued treatment with Ranexa because of an adverse event in controlled studies in angina patients compared to about 3% on placebo. The most common adverse events that led to discontinuation more frequently on Ranexa than placebo were dizziness (1.3% versus 0.1%), nausea (1% versus 0%), asthenia, constipation, and headache (each about 0.5% versus 0%). Doses above 1000 mg twice daily are poorly tolerated. In controlled clinical trials of angina patients, the most frequently reported treatment-emergent adverse reactions (> 4% and more common on Ranexa than on placebo) were dizziness (6.2%), headache (5.5%), constipation (4.5%), and nausea (4.4%). Dizziness may be dose-related. In open-label, long-term treatment studies, a similar adverse reaction profile was observed. The following additional adverse reactions occurred at an incidence of 0.5 to 2.0% in patients treated with Ranexa and were more frequent than the incidence observed in placebo-treated patients: Cardiac Disorders - bradycardia, palpitations Ear and Labyrinth Disorders - tinnitus, vertigo Gastrointestinal Disorders - abdominal pain, dry mouth, vomiting General Disorders and Administrative Site Adverse Events - peripheral edema Respiratory, Thoracic, and Mediastinal Disorders - dyspnea Vascular Disorders - hypotension, orthostatic hypotension Other (< 0.5%) but potentially medically important adverse reactions observed more frequently with Ranexa than placebo treatment in all controlled studies included: angioedema, renal failure, eosinophilia, blurred vision, confusional state, hematuria, hypoesthesia, paresthesia, tremor, pulmonary fibrosis, thrombocytopenia, leukopenia, and pancytopenia. A large clinical trial in acute coronary syndrome patients was unsuccessful in demonstrating a benefit for Ranexa, but there was no apparent proarrhythmic effect in these high-risk patients [see Clinical Trials (14.2)]. Ranexa produces small reductions in hemoglobin A1c. Ranexa is not a treatment for diabetes. Ranexa produces elevations of serum creatinine by 0.1 mg/dL, regardless of previous renal function. The elevation has a rapid onset, shows no signs of progression during long-term therapy, is reversible after discontinuation of Ranexa, and is not accompanied by changes in BUN. In healthy volunteers, Ranexa 1000 mg twice daily had no effect upon the glomerular filtration rate. The elevated creatinine levels are likely due to a blockage of creatinine's tubular secretion by ranolazine or one of its metabolites. - 7 DRUG INTERACTIONS 7.1 Effects of Other Drugs on Ranolazine Ranolazine is primarily metabolized by CYP3A and is a substrate of P-glycoprotein (P-gp). Do not use Ranexa with strong CYP3A inhibitors, including ketoconazole, itraconazole, clarithromycin, nefazodone, nelfinavir, ritonavir, indinavir, and saquinavir. Ketoconazole (200 mg twice daily) increases average steady-state plasma concentrations of ranolazine 3.2-fold [see Contraindications (4)]. Limit the dose of Ranexa to 500 mg twice daily in patients on moderate CYP3A inhibitors, including diltiazem, verapamil, aprepitant, erythromycin, fluconazole, and grapefruit juice or grapefruit-containing products. Diltiazem (180-360 mg daily) and verapamil (120 mg three times daily) increase ranolazine steady-state plasma concentrations about 2-fold [see Dosage and Administration (2.2)]. Weak CYP3A inhibitors such as simvastatin (20 mg once daily) and cimetidine (400 mg three times daily) do not increase the exposure to ranolazine in healthy volunteers. Down-titrate Ranexa based on clinical response in patients concomitantly treated with P-gp inhibitors, such as cyclosporine [see Dosage and Administration (2.2)]. CYP3A and P-gp Inducers Avoid co-administration of Ranexa and CYP3A inducers such as rifampin, rifabutin, rifapentin, phenobarbital, phenytoin, carbamazepine, and St. John’s wort. Rifampin (600 mg once daily) decreases the plasma concentration of ranolazine (1000 mg twice daily) by approximately 95% by induction of CYP3A and, probably, P-gp. The potent CYP2D6 inhibitor, paroxetine (20 mg once daily), increases ranolazine concentrations 1.2-fold. No dose adjustment of Ranexa is required in patients treated with CYP2D6 inhibitors. 7.2 Effects of Ranolazine on Other Drugs In vitro studies indicate that ranolazine and its O-demethylated metabolite are weak inhibitors of CYP3A, moderate inhibitors of CYP2D6 and moderate P-gp inhibitors. Ranolazine and its most abundant metabolites are not known to inhibit the metabolism of substrates for CYP 1A2, 2C8, 2C9, 2C19, or 2E1 in human liver microsomes, suggesting that ranolazine is unlikely to alter the pharmacokinetics of drugs metabolized by these enzymes. Drugs Metabolized by CYP3A The plasma levels of simvastatin, a CYP3A substrate, and its active metabolite are each increased about 2-fold in healthy subjects receiving simvastatin (80 mg once daily) and Ranexa (1000 mg twice daily). Dose adjustments of simvastatin are not required when Ranexa is co-administered with simvastatin. The pharmacokinetics of diltiazem is not affected by ranolazine in healthy volunteers receiving diltiazem 60 mg three times daily and Ranexa 1000 mg twice daily. Drugs Transported by P-gp Ranexa (1000 mg twice daily) causes a 1.5-fold elevation of digoxin plasma concentrations. The dose of digoxin may have to be adjusted. - 8 USE IN SPECIFIC POPULATIONS Pregnancy Category C In animal studies, ranolazine at exposures 1.5 (rabbit) to 2 (rat) times the usual human exposure caused maternal toxicity and misshapen sternebrae and reduced ossification in offspring. These doses in rats and rabbits were associated with an increased maternal mortality rate [see Reproductive Toxicology Studies (13.3)]. There are no adequate well-controlled studies in pregnant women. Ranexa should be used during pregnancy only when the potential benefit to the patient justifies the potential risk to the fetus. 8.3 Nursing Mothers It is not known whether ranolazine is excreted in human milk. Because many drugs are excreted in human milk and because of the potential for serious adverse reactions from ranolazine in nursing infants, decide whether to discontinue nursing or to discontinue Ranexa, taking into account the importance of the drug to the mother. 8.5 Geriatric Use Of the chronic angina patients treated with Ranexa in controlled studies, 496 (48%) were ≥ 65 years of age, and 114 (11%) were ≥ 75 years of age. No overall differences in efficacy were observed between older and younger patients. There were no differences in safety for patients ≥ 65 years compared to younger patients, but patients ≥ 75 years of age on ranolazine, compared to placebo, had a higher incidence of adverse events, serious adverse events, and drug discontinuations due to adverse events. In general, dose selection for an elderly patient should usually start at the low end of the dosing range, reflecting the greater frequency of decreased hepatic, renal, or cardiac function, and of concomitant disease, or other drug therapy. 8.6 Use in Patients with Hepatic Impairment Ranexa is contraindicated in patients with clinically significant hepatic impairment. Plasma concentrations of ranolazine were increased by 30% in patients with mild (Child-Pugh Class A) and by 60% in patients with moderate (Child-Pugh Class B) hepatic impairment. This was not enough to account for the 3-fold increase in QT prolongation seen in patients with mild to severe hepatic impairment [see Contraindications (4)]. 8.7 Use in Patients with Renal Impairment In patients with varying degrees of renal impairment, ranolazine plasma levels increased up to 50%. The pharmacokinetics of ranolazine has not been assessed in patients on dialysis. 8.8 Use in Patients with Heart Failure Heart failure (NYHA Class I to IV) had no significant effect on ranolazine pharmacokinetics. Ranexa had minimal effects on heart rate and blood pressure in patients with angina and heart failure NYHA Class I to IV. No dose adjustment of Ranexa is required in patients with heart failure. 8.9 Use in Patients with Diabetes Mellitus A population pharmacokinetic evaluation of data from angina patients and healthy subjects showed no effect of diabetes on ranolazine pharmacokinetics. No dose adjustment is required in patients with diabetes. Ranexa produces small reductions in HbA1c in patients with diabetes, the clinical significance of which is unknown. Ranexa should not be considered a treatment for diabetes. - 10 OVERDOSAGE High oral doses of ranolazine produce dose-related increases in dizziness, nausea, and vomiting. High intravenous exposure also produces diplopia, paresthesia, confusion, and syncope. In addition to general supportive measures, continuous ECG monitoring may be warranted in the event of overdose. Since ranolazine is about 62% bound to plasma proteins, hemodialysis is unlikely to be effective in clearing ranolazine.Close - 11 DESCRIPTION Ranexa (ranolazine) is available as a film-coated, non-scored, extended-release tablet for oral administration. Ranolazine is a racemic mixture, chemically described as 1-piperazineacetamide, N-(2,6-dimethylphenyl)-4-[2-hydroxy-3-(2-methoxyphenoxy) propyl]-, (±)-, It has an empirical formula of C24H33N304, a molecular weight of 427.54 g/mole, and the following structural formula: Ranolazine is a white to off-white solid. Ranolazine is soluble in dichloromethane and methanol; sparingly soluble in tetrahydrofuran, ethanol, acetonitrile, and acetone; slightly soluble in ethyl acetate, isopropanol, toluene, and ethyl ether; and very slightly soluble in water. Ranexa tablets contain 500 mg or 1000 mg of ranolazine and the following inactive ingredients: carnauba wax, hypromellose, magnesium stearate, methacrylic acid copolymer (Type C), microcrystalline cellulose, polyethylene glycol, sodium hydroxide, and titanium dioxide. Additional inactive ingredients for the 500 mg tablet include polyvinyl alcohol, talc, Iron Oxide Yellow, and Iron Oxide Red; additional inactive ingredients for the 1000 mg tablet include lactose monohydrate, triacetin, and Iron Oxide Yellow.Close - 12 CLINICAL PHARMACOLOGY 12.1 Mechanism of Action The mechanism of action of ranolazine's antianginal effects has not been determined. Ranolazine has anti-ischemic and antianginal effects that do not depend upon reductions in heart rate or blood pressure. It does not affect the rate-pressure product, a measure of myocardial work, at maximal exercise. Ranolazine at therapeutic levels can inhibit the cardiac late sodium current (lNa). However, the relationship of this inhibition to angina symptoms is uncertain. The QT prolongation effect of ranolazine on the surface electrocardiogram is the result of inhibition of lKr, which prolongs the ventricular action potential. Patients with chronic angina treated with Ranexa in controlled clinical studies had minimal changes in mean heart rate (< 2 bpm) and systolic blood pressure (< 3 mm Hg). Similar results were observed in subgroups of patients with CHF NYHA Class I or II, diabetes, or reactive airway disease, and in elderly patients. Dose and plasma concentration-related increases in the QTc interval [see Warnings and Precautions (5.1)], reductions in T wave amplitude, and, in some cases, notched T waves, have been observed in patients treated with Ranexa. These effects are believed to be caused by ranolazine and not by its metabolites. The relationship between the change in QTc and ranolazine plasma concentrations is linear, with a slope of about 2.6 msec/1000 ng/mL, through exposures corresponding to doses several-fold higher than the maximum recommended dose of 1000 mg twice daily. The variable blood levels attained after a given dose of ranolazine give a wide range of effects on QTc. At Tmax following repeat dosing at 1000 mg twice daily, the mean change in QTc is about 6 msec, but in the 5% of the population with the highest plasma concentrations, the prolongation of QTc is at least 15 msec. In subjects with mild or moderate hepatic impairment, the relationship between plasma level of ranolazine and QTc is much steeper [see Contraindications (4)]. Age, weight, gender, race, heart rate, congestive heart failure, diabetes, and renal impairment did not alter the slope of the QTc-concentration relationship of ranolazine. No proarrhythmic effects were observed on 7-day Holter recordings in 3,162 acute coronary syndrome patients treated with Ranexa. There was a significantly lower incidence of arrhythmias (ventricular tachycardia, bradycardia, supraventricular tachycardia, and new atrial fibrillation) in patients treated with Ranexa (80%) versus placebo (87%), including ventricular tachycardia ≥ 3 beats (52% versus 61%). However, this difference in arrhythmias did not lead to a reduction in mortality, a reduction in arrhythmia hospitalization, or a reduction in arrhythmia symptoms. Ranolazine is extensively metabolized in the gut and liver and its absorption is highly variable. For example, at a dose of 1000 mg twice daily, the mean steady-state Cmax was 2600 ng/mL with 95% confidence limits of 400 and 6100 ng/mL. The pharmacokinetics of the (+) R- and (-) S-enantiomers of ranolazine are similar in healthy volunteers. The apparent terminal half-life of ranolazine is 7 hours. Steady state is generally achieved within 3 days of twice-daily dosing with Ranexa. At steady state over the dose range of 500 to 1000 mg twice daily, Cmax and AUC0-Τ increase slightly more than proportionally to dose, 2.2- and 2.4-fold, respectively. With twicedaily dosing, the trough:peak ratio of the ranolazine plasma concentration is 0.3 to 0.6. The pharmacokinetics of ranolazine is unaffected by age, gender, or food. Absorption and Distribution After oral administration of Ranexa, peak plasma concentrations of ranolazine are reached between 2 and 5 hours. After oral administration of 14C-ranolazine as a solution, 73% of the dose is systemically available as ranolazine or metabolites. The bioavailability of ranolazine from Ranexa tablets relative to that from a solution of ranolazine is 76%. Because ranolazine is a substrate of P-gp, inhibitors of P-gp may increase the absorption of ranolazine. Food (high-fat breakfast) has no important effect on the Cmax and AUC of ranolazine. Therefore, Ranexa may be taken without regard to meals. Over the concentration range of 0.25 to 10 μg/mL, ranolazine is approximately 62% bound to human plasma proteins. Metabolism and Excretion Ranolazine is metabolized mainly by CYP3A and, to a lesser extent, by CYP2D6. Following a single oral dose of ranolazine solution, approximately 75% of the dose is excreted in urine and 25% in feces. Ranolazine is metabolized rapidly and extensively in the liver and intestine; less than 5% is excreted unchanged in urine and feces. The pharmacologic activity of the metabolites has not been well characterized. After dosing to steady state with 500 mg to 1500 mg twice daily, the four most abundant metabolites in plasma have AUC values ranging from about 5 to 33% that of ranolazine, and display apparent half-lives ranging from 6 to 22 hours. - 13 NONCLINICAL TOXICOLOGY 13.1 Carcinogenesis, Mutagenesis, Impairment of Fertility Ranolazine tested negative for genotoxic potential in the following assays: Ames bacterial mutation assay, Saccharomyces assay for mitotic gene conversion, chromosomal aberrations assay in Chinese hamster ovary (CHO) cells, mammalian CHO/HGPRT gene mutation assay, and mouse and rat bone marrow micronucleus assays. There was no evidence of carcinogenic potential in mice or rats. The highest oral doses used in the carcinogenicity studies were 150 mg/kg/day for 21 months in rats (900 mg/m2/day) and 50 mg/kg/day for 24 months in mice (150 mg/m2/day). These maximally tolerated doses are 0.8 and 0.1 times, respectively, the maximum recommended human dose (MRHD) of 2 grams on a surface area basis. A published study reported that ranolazine promoted tumor formation and progression to malignancy when given to transgenic APC (min/+) mice at a dose of 30 mg/kg twice daily [see References (15)]. The clinical significance of this finding is unclear. 13.3 Reproductive Toxicology Studies Animal reproduction studies with ranolazine were conducted in rats and rabbits. There was an increased incidence of misshapen sternebrae and reduced ossification of pelvic and cranial bones in fetuses of pregnant rats dosed at 400 mg/kg/day (2 times the MRHD on a surface area basis). Reduced ossification of sternebrae was observed in fetuses of pregnant rabbits dosed at 150 mg/kg/day (1.5 times the MRHD on a surface area basis). These doses in rats and rabbits were associated with an increased maternal mortality rate. - 14 CLINICAL STUDIES 14.1 Chronic Stable Angina CARISA (Combination Assessment of Ranolazine In Stable Angina) was a study in 823 chronic angina patients randomized to receive 12 weeks of treatment with twice-daily Ranexa 750 mg, 1000 mg, or placebo, who also continued on daily doses of atenolol 50 mg, amlodipine 5 mg, or diltiazem CD 180 mg. Sublingual nitrates were used in this study as needed. In this trial, statistically significant (p < 0.05) increases in modified Bruce treadmill exercise duration and time to angina were observed for each Ranexa dose versus placebo, at both trough (12 hours after dosing) and peak (4 hours after dosing) plasma levels, with minimal effects on blood pressure and heart rate. The changes versus placebo in exercise parameters are presented in Table 1. Exercise treadmill results showed no increase in effect on exercise at the 1000 mg dose compared to the 750 mg dose. Table 1 Exercise Treadmill Results (CARISA) Mean Difference from Placebo (sec) Study CARISA (N = 791) Ranexa Twice-daily Dose 750 mg 1000 mg Exercise Duration Trough 24* 24* Peak 34† 26* Time to Angina Trough 30* 26* Peak 38† 38† Time to 1 mm ST-Segment Depression Trough 20 21 Peak 41† 35† The effects of Ranexa on angina frequency and nitroglycerin use are shown in Table 2. Table 2 Angina Frequency and Nitroglycerin Use (CARISA) Placebo Ranexa - Twice daily N 258 272 261 Mean 3.3 2.5 2.1 p-value vs placebo — 0.006 < 0.001 Nitroglycerin Use N 252 262 244 Mean 3.1 2.1 1.8 p-value vs placebo — 0.016 < 0.001 Tolerance to Ranexa did not develop after 12 weeks of therapy. Rebound increases in angina, as measured by exercise duration, have not been observed following abrupt discontinuation of Ranexa. Ranexa has been evaluated in patients with chronic angina who remained symptomatic despite treatment with the maximum dose of an antianginal agent. In the ERICA (Efficacy of Ranolazine In Chronic Angina) trial, 565 patients were randomized to receive an initial dose of Ranexa 500 mg twice daily or placebo for 1 week, followed by 6 weeks of treatment with Ranexa 1000 mg twice daily or placebo, in addition to concomitant treatment with amlodipine 10 mg once daily. In addition, 45% of the study population also received long-acting nitrates. Sublingual nitrates were used as needed to treat angina episodes. Results are shown in Table 3. Statistically significant decreases in angina attack frequency (p = 0.028) and nitroglycerin use (p = 0.014) were observed with Ranexa compared to placebo. These treatment effects appeared consistent across age and use of long-acting nitrates. Table 3 Angina Frequency and Nitroglycerin Use (ERICA) Placebo Ranexa* - 1000 mg twice daily N 281 277 Mean 4.3 3.3 Median 2.4 2.2 Nitroglycerin Use N 281 277 Mean 3.6 2.7 Median 1.7 1.3 Effects on angina frequency and exercise tolerance were considerably smaller in women than in men. In CARISA, the improvement in Exercise Tolerance Test (ETT) in females was about 33% of that in males at the 1000 mg twice-daily dose level. In ERICA, where the primary endpoint was angina attack frequency, the mean reduction in weekly angina attacks was 0.3 for females and 1.3 for males. 14.2 Lack of Benefit in Acute Coronary Syndrome In a large (n = 6,560) placebo-controlled trial (MERLIN-TIMI 36) in patients with acute coronary syndrome, there was no benefit shown on outcome measures. However, the study is somewhat reassuring regarding proarrhythmic risks, as ventricular arrhythmias were less common on ranolazine [see Clinical Pharmacology (12.2)], and there was no difference between Ranexa and placebo in the risk of all-cause mortality (relative risk ranolazine:placebo 0.99 with an upper 95% confidence limit of 1.22). - 15 REFERENCES M.A. Suckow et al. The anti-ischemia agent ranolazine promotes the development of intestinal tumors in APC (min/+) mice. Cancer Letters 209(2004):165-9.Close - 16 HOW SUPPLIED/STORAGE AND HANDLING Ranexa is supplied as film-coated, oblong-shaped, extended-release tablets in the following strengths: • 500 mg tablets are light orange, with GSI500 on one side • 1000 mg tablets are pale yellow, with GSI1000 on one side Ranexa (ranolazine) extended-release tablets are available in: Strength NDC Unit-of-Use Bottle (60 Tablets) 500 mg 61958-1001-1 Unit-of-Use Bottle (60 Tablets) 1000 mg 61958-1002-1 Ranexa (ranolazine) extended-release tablets, 500 mg are available from Cardinal Health in unit dose packages of 60. 500 mg, unit dose package of 60 tablets, NDC 55154-4427-4. Store Ranexa tablets at 25°C (77°F) with excursions permitted to 15° TO 30°C (59° TO 86°F). - 17 PATIENT COUNSELING INFORMATION To ensure safe and effective use of Ranexa, the following information and instructions should be communicated to the patient when appropriate. Patients should be advised: • that Ranexa will not abate an acute angina episode • to inform their physician of any other medications when taken concurrently with Ranexa, including over-the-counter medications • that Ranexa may produce changes in the electrocardiogram (QTc interval prolongation) • to inform their physician of any personal or family history of QTc prolongation, congenital long QT syndrome, or if they are receiving drugs that prolong the QTc interval such as Class la (e.g., quinidine) or Class III (e.g., dofetilide, sotalol, amiodarone) antiarrhythmic agents, erythromycin, and certain antipsychotics (e.g., thioridazine, ziprasidone) • that Ranexa should not be used in patients who are receiving drugs that are strong CYP3A inhibitors (e.g., ketoconazole, clarithromycin, nefazodone, ritonavir) • that initiation of treatment with Ranexa should be avoided during administration of inducers of CYP3A (e.g., rifampin, rifabutin, rifapentin, barbiturates, carbamazepine, phenytoin, St. John’s wort) • to inform their physician if they are receiving drugs that are moderate CYP3A inhibitors (e.g., diltiazem, verapamil, erythromycin) or P-gp inhibitors (e.g., cyclosporine) • that grapefruit juice or grapefruit products should be limited when taking Ranexa • that Ranexa should generally not be used in patients with clinically significant liver impairment • that doses of Ranexa higher than 1000 mg twice daily should not be used • that if a dose is missed, the usual dose should be taken at the next scheduled time. The next dose should not be doubled • that Ranexa may be taken with or without meals • that Ranexa tablets should be swallowed whole and not crushed, broken, or chewed • to contact their physician if they experience fainting spells while taking Ranexa • that Ranexa may cause dizziness and lightheadedness; therefore, patients should know how they react to this drug before they operate an automobile, or machinery, or engage in activities requiring mental alertness or coordinationClose - SPL UNCLASSIFIED SECTION Gilead Sciences, Inc. Foster City, CA 94404 USA Ranexa is a registered U.S. trademark of Gilead, Palo Alto, Inc. © 2009, Gilead Sciences, Inc. Zanesville, OH 43701 - Principal Display Panel - Pouch (ranolazine extended-release tablet) - Principal Display Panel - Carton (ranolazine extended-release tablets) - PRINCIPAL DISPLAY PANEL RanexaR 500 mg Ranolazine Extended-Release Tablets - INGREDIENTS AND APPEARANCE ranolazine tablet, film coated, extended release Product Information Product Type HUMAN PRESCRIPTION DRUG Item Code (Source) NDC:55154-4427(NDC:61958-1001) Route of Administration ORAL DEA Schedule Active Ingredient/Active Moiety Ingredient Name Basis of Strength Strength ranolazine (UNII: A6IEZ5M406) (ranolazine - UNII:A6IEZ5M406) ranolazine 500 mg Inactive Ingredients Ingredient Name Strength carnauba wax (UNII: R12CBM0EIZ) HYPROMELLOSE 2910 (5 MPA.S) (UNII: R75537T0T4) magnesium stearate (UNII: 70097M6I30) METHACRYLIC ACID - ETHYL ACRYLATE COPOLYMER (1:1) TYPE A (UNII: NX76LV5T8J) CELLULOSE, MICROCRYSTALLINE (UNII: OP1R32D61U) polyethylene glycol 400 (UNII: B697894SGQ) sodium hydroxide (UNII: 55X04QC32I) titanium dioxide (UNII: 15FIX9V2JP) POLYVINYL ALCOHOL (UNII: 532B59J990) TALC (UNII: 7SEV7J4R1U) FERRIC OXIDE YELLOW (UNII: EX438O2MRT) FERRIC OXIDE RED (UNII: 1K09F3G675) Product Characteristics Color ORANGE (light orange) Score no score Shape OVAL (oblong-shaped) Size 17mm Flavor Imprint Code GSI500 Contains Packaging # Item Code Package Description Marketing Start Date Marketing End Date 1 NDC:55154-4427-4 60 in 1 CARTON 1 NDC:55154-4427-6 1 in 1 POUCH 2 NDC:55154-4427-0 10 in 1 BAG 2 NDC:55154-4427-6 1 in 1 POUCH Marketing Information Marketing Category Application Number or Monograph Citation Marketing Start Date Marketing End Date NDA NDA021526 02/12/2007 Labeler - Cardinal Health (188557102) Establishment Name Address ID/FEI Business Operations Cardinal Health 188557102 REPACK(55154-4427)
<urn:uuid:2b77ac19-6e7c-4e63-af8f-291ed0d61c01>
0.578182
[PLUG] Setting up home web server using dataone MT841 modem roy.franc at gmail.com Fri Jan 12 16:46:26 IST 2007 On 1/12/07, K. Shantanu <linux at shantanukulkarni.org> wrote: > * Roy Francis <roy.franc at gmail.com> [070112 07:48]: > > But the trouble is, whenever I try to access my external ip > > (http://59.93.??.??) the modem config web page shows up, which in turn > > not letting port-forwarding work, i guess. > Hmm!!! Your modem is in NAT mode I guess, can't you have it in bridge > mode, i.e. ifconfig of your Linux box should show ppp0 as external IP > 59.93.x.x - that will solve all the issues. I am not sure whether the > modem supports destination Natting. Can you please tell me how to set bridge mode? ( I'm still a beginner when it comes to networking :) ) More information about the Plug-mail
<urn:uuid:7aa218e5-a896-4a44-bca5-d3fa063b54a7>
0.058057
MECC ONLINE (SIS, BLACKBOARD, VCCS/Student E-Mail): You can lookup your VCCS ID/USERNAME and reset your MECC ONLINE password by clicking: Look up your username Reset your password. It is BEST to set your Security Question and Answer to a single word and something you will not forget such as your mother's maiden name. (Example: Smith). You will need to remember that the security answer is NOT a password but is a question and answer you must know before the MECC ONLINE system will allow you to reset your password. Statement of Compliance Concerning Password Resets of the Student Information System (SIS) According to FERPA standards §99.31 Identification and Authentication of Identity, a student requesting their username either by phone, chat, or other remote means must provide the answer to the security question listed under the Directory Information on the Person Info/Lookup page inside MECC ONLINE or MyVCCS. If a student cannot provide the answer to their security question, they must request their username in person, send a signed copy of their driver’s license or photo id by mail or fax, or have their username mailed to their home address that is on file in the SIS system. Please remember your MECC Student E-mail account WILL NOT become active until you ENROLL in classes for the semester. It usually takes 24 – 48 hours for your student e-mail to be made active by the VCCS once you ENROLL. Instructors are responsible for making the BLACKBOARD classes available to students. Blackboard classes should be active by the beginning date of the term. Please contact the instructor for the availability date of your BLACKBOARD class. It usually takes 24 hours for your Blackboard account to be made active by the VCCS once you ENROLL in an online blackboard class.
<urn:uuid:39496f84-6161-431e-9e69-19af5806dc74>
0.164427
Need help in creating a database? I want to create a simple database to work with. That includes initial setup etc... Found an article on web: (that assists me..) Do i need to setup any server thing to hold the database? Like account something like that? I remembered using MySQL database and the setup of it was very complex, requiring server address & host name & related server setup stuff... etc any help & advice would be great thanks. Re: Need help in creating a database? I am not sure you would find anything simple than MySQL |All times are GMT +5.5. The time now is 21:03.|
<urn:uuid:184688d2-1190-4fbe-b854-30c8620ebe5d>
0.05079
BUT what i really need is a great internet browser AND i need to be able to download an MKV (ANY MKV) and not have to use my main PC to re encode the file. Can Tegra2 be powerful enough for me to drag and drop a 720p 3gig MKV file and play 100% fine without ANY slowdown via HDMI on my 40" LCD TV. Anyone have one or has tested this functionality? I have a quad core PC with GTX 460 4GB ram etc. However this is in my bedroom and when im in the lounge i dont want to be reliant upon it. Ive since owned a HP DV2 Netbook and other stuff but got rid. Is this the killer replacement i have been looking for? Touchscreen is not an issue for me.
<urn:uuid:47a59d7d-6212-451d-a724-b3aa5dc2d5ad>
0.64708
Package: libtheora0 (1.1.1+dfsg.1-3) Links for libtheora0 Download Source Package libtheora: - Homepage [www.theora.org] The Theora Video Compression Codec Theora is an open video codec being developed by the Xiph.org Foundation as part of their Ogg project. Theora is originally derived from On2's VP3 codec, and has improved on it significantly with the merging of code from the Thusnelda branch. Other Packages Related to libtheora0
<urn:uuid:fdf0ff91-a18a-4fab-a415-8888115c3666>
0.15646
Keyhole Markup Language (KML), is an Extensible Markup Language (XML) grammar and file format for modeling and storing geographic features such as points, lines, images, and polygons. Using KML, you can also designate text, pictures, movies, or links to other geographic information system (GIS) services that appear when the user clicks the feature. Many KML client applications, including the ArcGIS Runtime SDK for WPF applications, provide a familiar, user-friendly navigation experience. Considerations for using KML in your map KML was originally created to view features in three-dimensional (3D) Earth browsers such as Google Earth. It is now supported in a number of two-dimensional (2D) clients including ArcGIS Runtime SDK for WPF applications. There are some aspects of KML that do not work well on 2D screens and some limitations to what clients can support. For more information, refer to the Supported KML tags section of the KmlLayer class topic. You can add KML in Extensible Application Markup Language (XAML). They should be inserted inside a Map control element below any base layers. If you have not already done so, create a Windows Presentation Foundation (WPF) application with a map (see Creating a map for details). The code in this topic requires a reference to the ESRI.ArcGIS.Client and ESRI.ArcGIS.Client.Toolkit.Datasources assemblies. The XAML of the window (for example, MainWindow.xaml) needs to have the following XML namespace declaration: - In the Map element, add a KmlLayer with an ID of KmlLayer and a uniform resource locator (URL) as the URL for your KML layer. Place this below any data that displays beneath the KML as shown in the following code sample: <esri:Map x:Name="_map" Extent="-122.090, 37.419,-122.079,37.424" > <esri:ArcGISTiledMapServiceLayer ID="StreetMapLayer" Url="http://services.arcgisonline.com/ArcGIS/rest/services/ESRI_StreetMap_World_2D/MapServer" /> <esri:KmlLayer ID="KmlLayer" Url="http://kml-samples.googlecode.com/svn/trunk/KML_Samples.kml" /> </esri:Map> - Run the application.
<urn:uuid:6dce80e6-2714-4eca-ae70-3295bf462ea3>
0.065871
Try and make sure the sites you're visiting are optimized for mobile, open fewer tabs at a time, and other ways of not using Safari as heavily. Not exactly very suitable answers until iOS 4.1 is eventually released for the iPad. Alternative browsers such as iCab have an offline bookmark option that will save the entire page to disk so you can view it without needing to refresh until you want to. Safari on iOS has a very limited size on it's cache and will refresh a page when you come back to it if the cache is full. Part of this is because of the limited RAM available on iOS devices along with the fact that Apple doesn't write any cached items to the flash memory and only keeps it in the memory. (The iPad and iPhone 3G S only have ~256 MB of RAM, earlier devices 128 MB and the iPhone 4 512 MB) Yahoo has run a series of tests to determine just how large the cache is. If the HTML of a page exceeds 25.6KB it will not be cached (and so refreshed every time you visit), external components can be larger (Up to 4MB) but the max size of the HTML page cache is only ~280KB on an iPad (paltry really). iOS 4 is set to increase that page cache size up to as much RAM as is available.
<urn:uuid:e0c6582d-5a0c-48c4-bc63-ae8199cc3b3e>
0.077297
Knex in the making... Take a look at these Knex models! Each toy model has multiple views, knex parts lists, and a modification section to help you change these models how you want. To view larger images of a particular model, click on the image. Check back soon to see new updates with new Knex models! © Copyright Knex Toy Zone, 2016 "K'NEX®" and "KID K'NEX®" are trademarks of K'NEX Brands, L.P., which does not endorse, sponsor, or authorize this site. Visit the official K’NEX website at
<urn:uuid:80408e3f-dd50-4897-ac58-3732733b9e27>
0.236679
[portland] Generating .tex From Python Code hallettj at gmail.com Fri Apr 4 00:30:50 CEST 2008 I forgot to include this relevant bit of information in my last message: Rich Shepard wrote: > On Thu, 3 Apr 2008, Rich Shepard wrote: >> I made python mistakes in the code? For example, why is the last line of the >> preamb comment truncated by two letters? Why are other letters missing, > OK. I suspect that \t it taken as a tab rather than a literal, and that \b > is seen as bold rather than as a literal. > Clues welcome! More information about the Portland
<urn:uuid:d5bd7087-697d-4d81-a7b9-242b63ebbd50>
0.158493
[amsat-dc] W4PUJ ... SK Kilroy, Patrick L. (GSFC-5680) patrick.l.kilroy at nasa.gov Thu Feb 16 08:21:13 PST 2012 This is very sad news. Dick's impact to AMSAT and amateur radio in space was enormous. He will be sadly missed. ----- Original Message ----- From: "Martha" <martha at amsat.org> To: "Board of Directors" <bod at amsat.org>; "AMSAT Officers" <officers at amsat.org>; "AMSAT BB" <amsat-bb at amsat.org> Sent: Wednesday, February 15, 2012 11:02 AM Subject: [amsat-bb] W4PUJ > It is with great sadness that I inform you of the death of Dick Daniels, > W4PUJ at 8:00 PM last night. More information to follow. > 73- Martha > Sent via AMSAT-BB at amsat.org. Opinions expressed are those of the author. > Not an AMSAT-NA member? Join now to support the amateur satellite program! > Subscription settings: http://amsat.org/mailman/listinfo/amsat-bb More information about the AMSAT-DC
<urn:uuid:5a55ea1d-8d5b-4564-92fd-695d506a8498>
0.108733
EC: XV Series HMI-PLC Hardware - Integrated HMI controllers: XV Series HMI-PLCs combines control, visualization and data management tasks in one device, while the SmartWire-DT system replaces traditional control wiring to components with one cable enabling simplified and less error-prone connectivity. This is a Control Engineering 2013 Engineers' Choice finalist. The XV Series HMI-PLC with SmartWire-DT connectivity enables remote intelligence, eliminates an entire device level and makes complex wiring unnecessary for smaller and smarter machines. Further, it enables an unprecedented level of diagnostics at virtually no additional cost, compared to conventionally wired components. Designed to handle demanding PLC applications, the XV Series HMI-PLC removes the physical PLC, incorporates logic into the operator interface, and provides one software package for control and visualization. With a 400 MHz reduced instruction set computer (RISC) processor and custom-developed software drivers, the XV Series HMI-PLC handles demanding control requirements for machine applications. The XV Series HMI-PLC supports the trend toward interoperability that allows machine and system builders to leverage programming environments across a range of systems. By using the open Controller Development System software (CoDeSys) standard, OEMs can develop and program the control and visualization of machine applications using one programming package that enables faster and simpler integration.
<urn:uuid:9220391a-0207-4c73-b0e3-77bd95930250>
0.08667
First time accepted submitter manu0601 writes "Since the NSA snoops, intercepts and store our e-mails forever, why not use it as a backup service? It just lacks the API to restore files, therefore this guy [YouTube video] called the NSA to ask for a backup restoration. Guess what? It did not work." After all, why should we have to pay twice for services already performed with tax dollars?
<urn:uuid:49777df3-1e42-4de0-bd70-7a787e394ea7>
0.502828
[mythtv-users] 0.19 live-tv problems: how can we help ? stef.coene at docum.org Thu Feb 16 22:41:52 UTC 2006 On Thursday 16 February 2006 23:23, Jason Mollman wrote: > I'd say, to start, you'll need the "mythfrontend -v playback", and > "mythbackend -v all,noaudio,nodatabase" output for when the problem LOT's of output ;) One thing I noticed that there are a few hundred lines: "2006-02-16 23:34:01.581 Ignoring livetv eof in decoder loop" when I change a channel and I have to wait untill the new channel is displayed on the frontend. And every hundred message there is a 'countdown' message: 2006-02-16 23:35:40.902 NVP: Waiting for prebuffer.. 5 2006-02-16 23:35:41.065 NVP: Waiting for prebuffer.. 6 I will try to collect some logfiles and put them online. More information about the mythtv-users
<urn:uuid:d1b85a0a-a9df-437b-bac7-e25da31a7547>
0.061847
50 years of wearing the same Sox... Sat Apr 21 11:30:27 EDT 2007 Speaking of WTIC, I noticed WBZ has picked up the "tradititonal" WTIC Morse code "V" (dit dit dit dah) in recent news promotions. WTIC has used it ----- Original Message ----- From: "Bob Nelson" <[email protected]> To: "BostonRadio Mailing List" Sent: Saturday, April 21, 2007 4:13 AM Subject: WTIC: 50 years of wearing the same Sox... > Tonight on Red Sox radio they saluted the fact that WTIC's first game as a > Red Sox affiliate was 50 years ago exactly (a loss to the Yanks in > extras). Arthur Dean, hope I got the name right, was in the booth with > Castiglione and O'Brien. They did acknowledge that the Yankees were hoping > to switch WTIC over to their network but they decided to re-up with the > Sox, "hey it's a tradition". > And it was said "before, Hartford was the dividing line between Red Sox > and Yankee fans. now it's maybe New Haven..." > thanks to a station like WTIC I can hear the Sox while traveling in Ohio, > western Penn., etc.! More information about the Boston-Radio-Interest
<urn:uuid:5f7be791-f407-4bac-8ca0-cd0221bc2cdd>
0.198865
[Wine] Re: Quicken2011 won't work under wine 1.3.30 Why??? wineforum-user at winehq.org Sat Oct 22 12:14:00 CDT 2011 While waiting for a reply I thought I would restore my original system from my Acronis Backup. To make a long story short I had to reinstall all of Ubuntu to be able to get to a point where I could reformat the disk and install by backups. SO I think my best bet is stay with the 1.3.25 version until someone else corrects the problem................. Al More information about the wine-users
<urn:uuid:5aa43c68-7dfc-4c10-950a-121e94633bac>
0.157098
|Publication number||US5629764 A| |Application number||US 08/499,673| |Publication date||13 May 1997| |Filing date||7 Jul 1995| |Priority date||7 Jul 1995| |Also published as||US5892599, US6038043, WO1997003412A1| |Publication number||08499673, 499673, US 5629764 A, US 5629764A, US-A-5629764, US5629764 A, US5629764A| |Inventors||Ramendra D. Bahuguna, Thomas M. Corboline| |Original Assignee||Advanced Precision Technology, Inc.| |Export Citation||BiBTeX, EndNote, RefMan| |Patent Citations (1), Non-Patent Citations (2), Referenced by (86), Classifications (5), Legal Events (8)| |External Links: USPTO, USPTO Assignment, Espacenet| 1. Field of the Invention The invention relates to generation and capture of high contrast, detailed optical fingerprint images, and in particular, to an optical sensor combining a right angle prism with a holographic phase grating to produce a fingerprint image without dimensional spatial distortion and astigmatism. The invention further relates to a method of constructing the holographic phase gratings for the invented fingerprint sensor. 2. Description of the Prior Art Total internal reflection has been used for a long time to optically sense ridges and valleys of a finger surface, i.e., to optically capture a fingerprint. H. J. Caulfield and D. R. Perkins, (Caulfield et al) in U.S. Pat. No. 3,716,301 teaches the use of a prism sensor based on total internal reflection, in their holographic finger print recognition system. S. Igaki, S Eguchi, F. Yamagishi, H. Ikeda and T. Inagaki (Igaki et. al.) in a paper published in Applied Optics, Vol. 31, pp.1794-1802 (1992), disclose a parallel plate sensor using total internal reflection in a fiat glass plate to transport a captured fingerprint image in combination with a holographic grating both which retrieve the image reflecting within the plate and which corrects to a degree for dimensional aberration in that image. The device described by Igaki et. al. works in a scattering mode rather than absorption. Accordingly, image contrast is reversed with respect to that obtained by Caulfield et al., and a pair of cylindrical lenses are required for correcting astigmatism in the captured image. More recently, M. Metz, C. Flatow, Z. Coleman and N. J. Phillips (M. Metz et. al.) have developed an edge lit hologram for capturing a fingerprint images not based on total internal reflection.[See Laser Focus World, May,1994, pp. 159-163 and a paper entitled "The Use Of Edge-lit Holograms For Compact Fingerprint Capture" published in the Conference Proceedings of"Card-Tech Secure-Tech 1995" held April 10-13, 1995,in Washington D.C., pp. 221-228.] The primary disadvantage of existing prism fingerprint sensors is that the fingerprint is compressed in one orthogonal dimension with respect to the other by a factor equal to the cosine of the angle at which the image plane is inclined relative to the normal. To explain, any image in a plane viewed at an angle 45° to the normal is compressed in one dimension by cos. (45°), i.e. by 1/√2.[Right angle isosceles (45°) prisms are typically described for obtaining fingerprint images.] Another serious drawback of existing prism fingerprint sensors is that the image plane of the fingerprint emerges from the various sensors inclined with respect to the optical axis. Accordingly, it usually necessary to optically and/or computationally reorient the image to a plane normal (⊥) to the optical axis for optimal resolution. The glass plate sensor of S. Igaki et al utilizes a holographic grating to diffract internally reflected light propagating within a glass plate at an angle greater than the critical angle so that the wave can emerge from the plate into the air. S. Igaki et al specifically point out that to create such a grating, one of the two interferinglight waves for constructing the hologram must meet the conditions of total internal reflection, that is light cannot enter the holographic recording plate from the air. S. Igaki et al then describe a complicated procedure for creating a suitable holographic grating involving a different wavelength of light. Finally, the glass plate holographic grating sensor described by S. Igaki et al has astigmatism because the spherically divergent waveforms scattered from a fingerprint ridges are diffracted by fringe planes of a holographic grating creating by planar waveforms. The invented fingerprint sensor includes a holographic phase grating optically coupled with and forming a right angle surface of a prism which diffracts light totally internally reflecting from its external surface to propagate normally (⊥) back into the prism. In areas where the ridges of the finger surface are in contact with the grating surface the illuminating light is refracted and absorbed. In areas corresponding to valleys and pores of the finger surface not in contact with the grating surface, the illuminating light is totally internally reflected. The reflected light is diffracted by the holographic phase grating and emerges from the transmission surface of the prism producing a high contrast, detailed image of the ridges, pores and valleys of the finger surface sensor surface of the sensor oriented in a plane normal to the optical axis. In particular, the holographic phase grating eliminates image distortion due to dimensional compression. And, because the waveform of the image within and emerging from the invented sensor is planar, there is no necessity for optically correcting for astigmatism before recording the image electronically or in film. Nor is there any necessity for optically or computationally correcting or enhancing the recorded images thereafter. A novel method for recording a holographic phase grating for the invented sensor includes the steps of: (a) Sandwiching an unexposed holographic plate optically between a fight angle (transmission) surface of a right angled prism and a blackened glass plate using a suitable liquid such as isopropyl alcohol; (b) Exposing the holographic plate using a collimated laser beam split by amplitude division where a first beam is directed normally into a hypotenuse surface of the particular right angle prism, and a second beam is directed normally into the other right angle (transmission) surface of the prism, the second beam being totally internal reflected from the internal hypotenuse prism surface to propalgate normally (⊥) toward the holographic plate; and (c) Removing, developing and bleaching the exposed holographic plate to provide a phase grating. The incident beams within the holographic plate create fringe planes bisecting the angle between the respective incident beams. The blackened glass plate optically coupled to the exterior surface of the holographic plate precludes total internal reflection of the first beam directed normally through the hypotenuse surface of the prism at that exterior surface of the hologaphic plate and absorbs/attenuates the constructing/interfering incident light beams transmitted by the holographic plate. The created holographic phase grating is then rotated 180° in its plane and recouped (glued) to the same (sensor) fight angle surface of the particular or an identical prism to insure that light totally internally reflected from the exterior surface of the holographic phase grating is diffractied and directed perpendicularly back into the body of the prism. The primary advantages of the invented sensor derive from the fact that: (a) the emerging fingerprint images are free of dimensional distortion, i.e., are not elongated or compressed in one orthogonal dimension with respect to the other in the plane of the image; and (b) the waveforms of the fingerprint image are planar. Accordingly, fingerprint images generated from the invented fingerprint sensor require neither optical nor computational correction of dimensional aberration or astigmatism before capture or recording in film or electronically. An important aspect of the invented sensor is that both white light and laser light, collimated or diffuse, (preferably filtered) can be used to illuminate the sensor face-finger surface interface through a prism. With diffuse laser-illumination, the diffuser should be rotated at a rate sufficient to average speckling out. A feature of the invented fingerprint sensor is that latent fingerprints left on the sensing surface of the prism from previous use of the sensor are hardly noticeable with a diffuse illumination light source. Most importantly, the high contrast, detailed output images provided by the invented fingerprint sensor are ideally suited for systems recording, recognizing and verifying fingerprints. In fact, fingerprint images obtainable with the invented sensor are of such quality to allow true resolution and actual measurement of pore distributions on finger surface ridges. The quality of the images produced are also ideally suited for video and other electron scanning cameras both for real time display and digitization. Still other features, aspects, advantages and objects of and provided by the invented combination of a holographic phase grating optically coupled to one surface of a right angle prism for providing high contrast, detailed fingerprint images oriented normally (⊥) to an optical axis utilizing total internal reflection phenomenon will become apparent and/or be more fully understood with reference to the following detailed explanation in context of drawings showing schematic embodiments of components of the respective optical elements thought necessary for simply and reliably producing such images. FIG. 1 is a schematic illustration of typical prior art fingerprint sensor using a prism. FIG. 2. is a schematic illustration showing the basic optical configuration of the preferred version of the invented fingerprint sensor where the exterior surface of the holographic phase grating functions as the sensor surface. FIG. 3. schematically illustrates a preferred method for recording of the holographic phase grating. FIG. 4. depicts the orientation of the diffracting fringe planes within the emulsion of the holographic phase grating after the grating has been rotated 180° in its plane. FIG. 5. illustrates factors affecting imaging of the ridges and valleys of a finger-surface interface. FIG. 5A. illustrates details of the finger surface interface image produced by reflected and refracted light in the plane A--A. FIG. 6. schematically illustrates an embodiment of the invented sensor using diffuse light. FIG. 7a. is a photograph showing a fingerprint image using collimated illumination. FIG. 7b. is a photograph showing the same fingerprint as in FIG. 7a. using diffuse illumination. FIG. 7c. is a photograph showing a latent image of a fingerprint after the finger is removed from the sensor surface of the holographic phase grating of the invented sensor using collimated illumination. FIG. 7d. is a photograph showing a hardly noticeable latent image of a fingerprint after the finger is removed from sensor surface of the holographic phase grating of the invented sensor using diffuse illumination. FIG. 8. illustrates the components of a typical fingerprint capture and recording system utilizing the invented fingerprint sensor. Looking at FIGS. 1 and 8, the elements of a typical prior art fingerprint prism sensor 11 include a right angle (45°) prism 12 with a hypotenuse face A, a right angle light input surface B, and a right angle output surface C. As shown a finger is placed in contact with the exterior surface of the hypotenuse face A of the prism. The interface 13 between the finger surface and the exterior hypotenuse surface A of the prism 12 is illuminated by light from an exterior source (not shown), preferably collimated. The light rays propagate normally into the right angle light input surface B of the prism 12 as indicated by the arrows 15. The illuminating light is absorbed in areas where ridges on the finger surface contact the hypotenuse face A and is totally internally reflected in areas of the finger surface ridges not in contact with the surface A, i.e. the valleys and pores of the finger surface. The reflected light 16 propagates out the right angle output surface C of the prism, is imaged by the imaging lens and captured by an image recording mechanism CCD, (in this case a CCD photo sensor array or video camera). As shown in FIG. 8, the captured image is processed (digitized) using a computer then compared using a corrolator with data available from a reference bank to provide an indication of a match or mismatch. Because the illuminated interface of the finger surface and hypotenuse face is inclined relative: to the optical axis of the system, and the recording plane, the image captured from the right angle output surface C of the prism 12 is compressed in the (vertical) dimension of the right angle prism surface C by a factor equal to the Cosine of the angle of inclination of the image relative to the recording plane, or normal, i.e., in the example given by a factor ƒ=cos. (45°)=1/√2or 0.7071. To optimize resolution, the captured image can thereafter be computationally corrected to eliminate the dimensional distortion. However, because such computational correction is typically performed after the image is recorded, detail compressed into, for example, 0.707 pixel, is effectively uniformly expanded into 1 pixel, when, in actual fact, such detail is not so uniformly distributed. This means that some detail will be lost. Accordingly, while computational correction of dimensional distortion of an image inclined relative to the recording plane post recordation may improve resolution, it also introduces error. It is also possible to optically reorient inclined light images before recording. However, such optical systems are elaborate, typically requiring precision optical components and precise alignment. In the hurly burly world of capturing fingerprint images for recording, recognition and verification, the task of and the prospects for maintaining such precision alignment of multiple optical elements over time are both daunting and unrealizable. Looking at FIG. 2, the invented fingerprint sensor 17 also includes a right angle 45° degree prism 12 with a hypotenuse surface A, a right angle sensor surface B and a right angle transmission surface C. A holographic phase grating 14 is optically coupled to the right angle sensor surface B of the prism 12. The holographic phase grating 14 is oriented such that its diffracting fringe planes diffract planar waveform light totally internally reflecting from the interior surface 18 of the grating 14 to propagate normally (⊥) back through the right angle transmission surface B of the prism 12. A suitable holographic phase grating for the invented fingerprint sensor can be recorded in several ways. A effective, yet very simple method is illustrated in FIG. 3. A collimated laser beam (not shown) is split into two constructing laser light beams 31 and 32 by amplitude division. One beam 31 is directed to normally (⊥) illuminate the hypotenuse surface A of the right angled prism 12 while the other beam 32 is directed to normally (⊥) illuminate the right angle (transmission) surface C. A holographic plate 34, e.g. an Agfa 8E75 plate for a He-Ne laser, is placed and maintained in optical contact with right angle (sensor) surface B of the prism 12 A blackened bottom glass plate 37 is placed in optical contact with the exterior surface 38 of the holographic plate 34. Layers of isopropyl alcohol 36 or other suitable liquids may be used an optically coupling medium between the respective surfaces. The blackened bottom glass plate 37 eliminates total internal reflection of constructing beam 31 off the exterior surface 38 of the holographic plate 34. The holographic plate 34 is exposed to the two constructing laser beams 31 and 32 for an amount of time to required produce an optical density of 2. The plate 34 is then developed and bleached to provide a holographic phase grating 14. Care must be taken to ensure that the emulsion thickness of the plate 34 does not change in the chemical processing. As shown in FIG. 3, the interference fringe planes 39 created in the developed holographic phase grating 14 incline to the left at an angle which bisects the angle between the respective incident constructing beams 31 and 32. However, as shown in FIG. 5., to diffract light totally internally reflecting off the interior surface of exterior face 38 of the developed holographic phase grating 34 in the preferred version of the invented fingerprint sensor, [FIG. 2] directing it to propagate normally (⊥) back into the right angle (transmission) surface B of the prism 12, the fringe planes 39 of the grating must be inclined to the right at an angle of 22.5° with respect to the normal. In particular, the developed holographic phase grating 14 must be rotated 180° (in its own plane) because light reflecting from the interior face of exterior surface 18 is rotated 180° with respect to incident light beams 31 and 32 that creating the phase grating 14. Upon rotation, the developed holographic phase grating 14 is glued to the right angle sensor surface B of that or an identical prism for the sensor shown in FIG. 2. When constructing holographic phase gratings 14 for white light, a slight adjustment in the incident beam angle of the two constructing laser beams 31 and 32 may be necessary in order to assure that, after the grating is rotated and glued to the right angle sensor surface B of the prism, a selected or desired range of light wavelengths are diffracted perpendicularly back into the body of the prisim. With the invented fingerprint sensor illustrated in FIG. 2 because the holographic grating 14 is physically secured (glued) to a right angle (transmission) surface B of the prism 12, mechanical shocks vibration and the like do not affect the optical orientation of the planar waveform image emerging from the transmission surface C of the prism 12. Also, in order to assure optimal optical performance of the prism 12, holographic phase grating 14 combination, it is suggested that the particular sensor prism 12 be used in creation of its particular holographic phase grating 14. Turning now to FIGS. 5 and 5A to generate a finger print image with the invented fingerprint sensor a finger surface 61 is pressed against the holographic phase grating 14 as shown. Illuminating light rays 62 from a collimated white light source, or a laser (not shown) are directed in normal incidence to the hypotenuse surface A of the prism 12. If a laser is used, the illuminating light should be the same wavelength as used in constructing the holographic phase grating 14. The rays 62 hit the prism surface B at an angle of 45° and with minimal refraction propagate into the holographic grating 14, ideally at the same angle (45°). In particular, for optimal results, the emulsion chosen to contain the constructed holographic phase grating 14 should have a refractive index the same as or approximately the same as the refractive index of the material composing the prism 12. Accordingly, the rays 62 will totally internally reflected at the bottom surface of the holographic phase grating 14 where the valleys 67 between and pores 68 [See FIGS. 7a and 7b] in the fingerprint ridges are located. However, light rays 62 incident on the finger-surface interface 63 in areas where fingerprint ridges 69 are in contact with the exterior surface 38 of the holographic phase grating 14, refract through the finger-surface interface; 63 and are in essence absorbed. The reflected rays 64 thus carry information from the finger-surface interface 63 in as a high contrast planar waveform pattern, the valleys 67 and pores 68 appearing bright and the ridges 69 dark.[See FIGS. 7a and 7b ] The totally internally reflected rays 63 containing the image are diffracted by the fringe planes 39 of the holographic grating 14 (see FIG. 3) and are directed to a normal (⊥) orientation with respect to prism surface B rotating the plane of the contained image to an orientation parallel to that of the prism surface B. The reflected rays 64 after total internal reflection off the internal surface A of the prism 12 and emerge out through its fight angle transmission surface C. The rays 64 containing the fingerprint image are then collected by a video camera system 70 and projected via a TV monitor or input into a fingerprint recognition system for recording and/or verification.[See FIG. 8.] Alternatively, the fingerprint image can be captured in film and thereafter reproduced photographically. [See FIGS.7a-d.] Turning to FIG. 6, for diffuse illumination, the invented fingerprint sensor includes a fine ground glass diffuser plate 71 placed in very close proximity (within a few millimeters or so) to the hypotenuse surface A of the prism 12. The ground glass diffuser plate 71 diffuses the light from an incoherent white light source 72. The diffused light rays 73 illuminates the interface 74 of the finger surface 76 and the exterior surface 38 of the holographic phase grating 14. As before, the diffused rays incident on the interface at angles greater than the critical angle for total internal reflection are reflected except where the fingerprint ridges contact the surface 38. All other rays of the diffused light simply partially reflect from and refracts through the exterior surface 38. The refracted light exiting through the holographic phase grating 14 is lost. And, again the fringe planes 39 of the holographic phase grating 14 diffract the totally internally reflected light rays 64 rotating or redirecting them into normal (⊥) incidence relative to the right angle (sensor) surface B of the prism 12. The balance of the reflected rays also diffracted by the holographic phase grating 14 will be directed at angles other than normal incidence relative to right angle sensor surface B of the prism 12. The redirected totally reflected rays 64 are again totally internally reflected from the internal hypotenuse surface A of the prim 12 and are directed normally (⊥) out the right angle (transmission) surface C of the prism. The balance of the light rays internally reflecting from the exterior surface 38 of the holographic phase grating 14 (unwanted light) will strike the internal hypotenuse surface A and either refract out or internally reflect and attenuate within the prism 12. In either case, such unwanted light rays are not aligned with the optical axis of the optical system capturing the orthogonal rays 64 containing the fingerprint image exiting the invented sensor. If laser light is used as the illuminating light source with a ground glass diffuser plate 71, the plate 71 must be rotated or oscillated at a speed high enough to average speckling out. In particular, looking at FIG. 5, a motor or oscillator 77 is mechanically coupled to the diffuser plate 71, schematically represented by a dashed line, for rotating or oscillating the diffuser plate 71. The quality of the fingerprint images captured by the invented fingerprint sensor as evidenced by FIGS. 7a and 7b are extremely good; even the pores 68 on the fingerprint ridges 69 are quite distinct. The image quality seems to be best when the prism is illuminated with collimated light. However, it should be noted that with collimated illumination, the right angle grating surface 38 or the hypotenuse sensor surface A of the prism 12 has to be thoroughly cleaned after each use to prevent latent fingerprints of previous users from obscuring later images. (see FIG. 7c.) With a clean prism the resolution and quality of fingerprint images generated is excellent. With diffuse light illumination the pores 68 on the fingerprint ridge 69 are not quite as distinct being slightly smeared along the direction of the finger 83. To explain, looking again at FIG. 5, the image of the fingerprint ridge 69 is shifted by a distance x. Because the image-shift x is different for the different angles of light incident on the finger, a point on a ridge 69 will imaged as a small line parallel to the finger. Such linear smearing is directly proportional to the thickness of the holographic phase grating, and therefore, can be reduced by using a thin hologram phase grating plates, preferably less than 0.3 mm thick. With a thin hologram phase grating 14, diffuse illumination can produce fingerprint image quality approaching that obtained with collimated illumination. Diffuse illumination has an added advantage in that the latent prints of previous users are hardly noticeable (See FIG. 7d). Also, with diffuse illumination, the fingerprint can be viewed with the naked eye without danger of eye damage over a large field of view. [The images presented in FIG.7a-7d are reproduced from actual photographs developed from film capturing images produced by the invented fingerprint sensor. These images demonstrate better than words can describe high quality of fingerprint images that are obtainable using the invented fingerprint sensor.] A ground glass diffuser plate 71 producing a diffuse light source for illuminating the finger surface-sensor surface interface also presents substantial advantages in fingerprint verification systems diagrammed in FIG. 8. In particular such systems typically utilize a converging wavefront carrying information from the actual fingersurface which is operated on by a holographic filter to reproduce an output beam similar to a reference beam used in creating the filter. The output beam is focused by a lens and sensed a photo detectors. The magitude of the signal produced by the dectector indicates a match or mismatch. (See Caulfield et al, and U.S. Pat. Nos. 5,138,468 and 095,194 J. Barbarnell) An observed Achilles heel of such verification systems is that cleaning the input or sensing interface surface of the fingerprint sensor with a liquid, such as isopropyl alcohol, often leaves a distribution of streaks on the input sensing interface. The streaks diffract the illuminating collimated light flux into diffraction patterns which are collected and directed along the verification optical path of the system. Because both the flux and incidence of such diffraction patterns are distributed across the entire field of view operated on by the holographic Fourier-transform filter elements, there is a relatively high probability, that output reference beams of the filter element may be reproduced triggering a false verification. In contrast, when the light illuminating such liquid-air interface at a sensor surface is diffused, the streaks are smoothed out reducing angles of diffraction to very low values. In other words, the diffuse light rays diffracted by streaks are concentrated along the optical axis of the system which typically is blocked at the hologram plane, Accordingly, the chance of a false verification is essentially eliminated. To a degree, the above described phenomenon is also illustrated by the photographs presented as FIGS. 7c and 7d which depict latent fingerprint images picked up from the sensor surface of the preferred version of the invented sensor after the finger has been removed. In particular, the latent fingerprint image of FIG. 7c produced with collimated illuminating light source has greater contrast than that of FIG. 7d produced with diffuse light. The invented fingerprint sensor and method for constructing the associated holographic phase grating has been described in context of both representative and preferred embodiments. There are many modifications and variations can be made to the invented stop which, while not exactly described herein, fall within the spirit and the scope of invention as described and set forth in the appended claims. |Cited Patent||Filing date||Publication date||Applicant||Title| |US3716301 *||17 Mar 1971||13 Feb 1973||Sperry Rand Corp||Fingerprint identification apparatus| |1||Igaki et al., "Holographic Fingerprint Sensor", Fujitsu Scientific and Technical Journal vol. 25, No. 4, 1989, pp. 287-296.| |2||*||Igaki et al., Holographic Fingerprint Sensor , Fujitsu Scientific and Technical Journal vol. 25, No. 4, 1989, pp. 287 296.| |Citing Patent||Filing date||Publication date||Applicant||Title| |US5774278 *||30 Nov 1995||30 Jun 1998||Eastman Kodak Company||Spectral filter| |US5892599 *||9 Aug 1996||6 Apr 1999||Advanced Precision Technology, Inc.||Miniature fingerprint sensor using a trapezoidal prism and a holographic optical element| |US6091838 *||8 Jun 1998||18 Jul 2000||E.L. Specialists, Inc.||Irradiated images described by electrical contact| |US6098330 *||16 May 1997||8 Aug 2000||Authentec, Inc.||Machine including vibration and shock resistant fingerprint sensor and related methods| |US6175641 *||4 Oct 1996||16 Jan 2001||Dermo Corporation, Ltd.||Detector for recognizing the living character of a finger in a fingerprint recognizing apparatus| |US6182892 *||25 Mar 1998||6 Feb 2001||Compaq Computer Corporation||Smart card with fingerprint image pass-through| |US6408087 *||13 Jan 1998||18 Jun 2002||Stmicroelectronics, Inc.||Capacitive semiconductor user input device| |US6426837 *||21 Mar 2000||30 Jul 2002||Mems Optical, Inc.||Diffractive selectively polarizing beam splitter and beam routing prisms produced thereby| |US6606399||8 Aug 2001||12 Aug 2003||Mrm Acquisitions, Llc||PTF touch-enabled image generator| |US6658140 *||2 Feb 1999||2 Dec 2003||Heimann Biometric Systems Gmbh||Method and arrangement for obtaining image information relating to surface structures| |US6826000||17 May 2002||30 Nov 2004||Secugen Corporation||Optical fingerprint acquisition apparatus| |US6853444 *||30 Aug 2002||8 Feb 2005||Waleed S. Haddad||Non-contact optical imaging system for biometric identification| |US6856383||5 Sep 1997||15 Feb 2005||Security First Corp.||Relief object image generator| |US6912300 *||21 Jul 2000||28 Jun 2005||Mitsubishi Denki Kabushiki Kaisha||Irregular pattern reader| |US6927914 *||10 Jun 2003||9 Aug 2005||Riken||Grism| |US6980286||25 Oct 2001||27 Dec 2005||Ic Media Corporation||Ultra-thin optical fingerprint sensor with anamorphic optics| |US6989547 *||28 Feb 2005||24 Jan 2006||Nitgen Co., Ltd||Method and apparatus for discriminating latent fingerprint in optical fingerprint input apparatus| |US6995384 *||28 Feb 2005||7 Feb 2006||Nitgen Co., Ltd||Method and apparatus for discriminating latent fingerprint in optical fingerprint input apparatus| |US7081951 *||8 Oct 2004||25 Jul 2006||Cross Match Technologies, Inc.||Palm print scanner and methods| |US7180643||23 Aug 2005||20 Feb 2007||Cross Match Technologies, Inc.||Live print scanner with holographic imaging a different magnifications| |US7190535||20 Mar 2006||13 Mar 2007||Cross Match Technologies, Inc.||Non-planar prism| |US7218761||3 Dec 2003||15 May 2007||Cross Match Technologies, Inc.||System for obtaining print and other hand characteristic information using a non-planar prism| |US7221489||23 Aug 2005||22 May 2007||Cross Match Technologies, Inc||Live print scanner with holographic platen| |US7271881 *||7 Oct 2005||18 Sep 2007||Cross Match Technologies, Inc.||Systems and methods for illuminating a platen in a print scanner| |US7321671||3 Dec 2003||22 Jan 2008||Cross Match Technologies, Inc.||System and method for generating a preview display in a print capturing system using a non-planar prism| |US7426020||1 Aug 2005||16 Sep 2008||Cross Match Technologies, Inc.||System for print imaging with prism illumination optics| |US7586591||27 Oct 2004||8 Sep 2009||Cross Match Technologies, Inc.||Light wedge for illuminating a platen in a print scanner| |US7660447 *||23 Jan 2006||9 Feb 2010||Fujitsu Limited||Detection of fingerprint distortion by deformation of elastic film or displacement of transparent board| |US7728959 *||21 Jun 2004||1 Jun 2010||Aprilis, Inc.||Acquisition of high resolution biometric images| |US7812936||9 Apr 2007||12 Oct 2010||Identification International, Inc.||Fingerprint imaging system| |US7834988 *||16 Nov 2010||Ramendra Deo Bahuguna||Fingerprint sensor using a spectral filter and a holographic optical element| |US7903242||8 Mar 2011||Identification International, Inc.||Fingerprint imaging system| |US7986400||26 Jul 2011||Identification International, Inc.||Fingerprint imaging system| |US8077929 *||21 Feb 2007||13 Dec 2011||Wasatch Photonics, Inc.||Ambient light rejection filter| |US8077934||13 Dec 2011||Identification International, Inc.||Low power fingerprint capture system, apparatus, and method| |US8405757 *||27 Oct 2011||26 Mar 2013||Optical Logic Inc.||Imaging device| |US8462322||8 Oct 2008||11 Jun 2013||International Business Machines Corporation||Prismatic lock and key security| |US8520911||18 May 2010||27 Aug 2013||Identification International, Inc.||Low power fingerprint capture system, apparatus, and method| |US8538095||21 Jun 2004||17 Sep 2013||Aprilis, Inc.||Method and apparatus for processing biometric images| |US8542890||8 Dec 2011||24 Sep 2013||Identification International, Inc.||Low power fingerprint capture system, apparatus, and method| |US9064139||9 Aug 2013||23 Jun 2015||Identification International, Inc.||Low power fingerprint capture system, apparatus, and method| |US9274508||18 Mar 2013||1 Mar 2016||Lenovo Enterprise Solutions (Singapore) Pte. Ltd.||Prismatic lock and key security| |US9390309||17 Jul 2014||12 Jul 2016||Lockheed Martin Corporation||Latent fingerprint detectors and fingerprint scanners therefrom| |US20020110266 *||27 Mar 2002||15 Aug 2002||Teng Harry H.||High contrast, low distortion optical acquisition system for image capturing| |US20020163601 *||10 Dec 2001||7 Nov 2002||Min Kyoung Il||Liquid crystal display and fingerprint capture panel| |US20030053228 *||17 May 2002||20 Mar 2003||Lee Jong Ik||Optical fingerprint acquisition apparatus| |US20030076765 *||25 Mar 2002||24 Apr 2003||Ayres Mark R.||Holographic recording using contact prisms| |US20040041998 *||30 Aug 2002||4 Mar 2004||Haddad Waleed S.||Non-contact optical imaging system for biometric identification| |US20040070853 *||10 Jun 2003||15 Apr 2004||Noboru Ebizuka||Grism| |US20040109589 *||3 Dec 2003||10 Jun 2004||Cross Match Technologies, Inc.||System and method for generating a preview display in a print capturing system using a non-planar prism| |US20040109591 *||3 Dec 2003||10 Jun 2004||Cross Match Technologies, Inc.||System for obtaining print and other hand characteristic information using a non-planar prism| |US20040114785 *||3 Dec 2003||17 Jun 2004||Cross Match Technologies, Inc.||Methods for obtaining print and other hand characteristic information using a non-planar prism| |US20040114786 *||3 Dec 2003||17 Jun 2004||Cross Match Technologies, Inc.||System and method for capturing print information using a coordinate conversion method| |US20050057742 *||27 Oct 2004||17 Mar 2005||Cross Match Technologies, Inc.||Light wedge for illuminating a platen in a print scanner| |US20050105078 *||8 Oct 2004||19 May 2005||Carver John F.||Palm print scanner and methods| |US20050141755 *||28 Feb 2005||30 Jun 2005||Nitgen Co., Ltd.||Method and apparatus for discriminating latent fingerprint in optical fingerprint input apparatus| |US20050141756 *||28 Feb 2005||30 Jun 2005||Nitgen Co., Ltd.||Method and apparatus for discriminating latent fingerprint in optical fingerprint input apparatus| |US20050264878 *||1 Aug 2005||1 Dec 2005||Cross Match Technologies, Inc.||System for print imaging with prism illumination optics| |US20060039048 *||23 Aug 2005||23 Feb 2006||Carver John F||Systems and methods of capturing prints with a holographic optical element| |US20060039049 *||23 Aug 2005||23 Feb 2006||Cross Match Technologies||Live print scanner with holographic imaging at different magnifications| |US20060039050 *||23 Aug 2005||23 Feb 2006||Carver John F||Live print scanner with active holographic platen| |US20060039588 *||23 Aug 2005||23 Feb 2006||Cross Match Technologies, Inc.||Live print scanner with holographic platen| |US20060158751 *||20 Mar 2006||20 Jul 2006||Cross Match Technologies, Inc.||Non-planar prism| |US20060170906 *||7 Oct 2005||3 Aug 2006||Cross Match Technologies, Inc.||Systems and methods for illuminating a platen in a print scanner| |US20070035718 *||3 Feb 2005||15 Feb 2007||Haddad Waleed S||Non-contact optical imaging system for biometric identification| |US20070076924 *||23 Jan 2006||5 Apr 2007||Fujitsu Limited||Fingerprint matching apparatus and fingerprint sensor| |US20070196003 *||14 Sep 2004||23 Aug 2007||Hyun Kim||Optical finger print input device| |US20070280514 *||21 Feb 2007||6 Dec 2007||Wasatch Photonics, Inc.||Ambient light rejection filter| |US20080123908 *||21 Jun 2004||29 May 2008||Waldman David A||Acquisition of High Resolution Biometric Images| |US20080246952 *||9 Apr 2007||9 Oct 2008||Richard Karl Fenrich||Fingerprint Imaging System| |US20080317301 *||19 Aug 2008||25 Dec 2008||Richard Fenrich||Low power fingerprint capture system, apparatus, and method| |US20090116030 *||2 Jun 2008||7 May 2009||Ramendra Deo Bahuguna||Fingerprint sensor using a spectral filter and a holographic optical element| |US20090226052 *||21 Jun 2004||10 Sep 2009||Vincent Fedele||Method and apparatus for processing biometric images| |US20100085562 *||8 Apr 2010||International Business Machines Corporation||Prismatic Lock And Key Security| |US20100289886 *||18 Nov 2010||Identification International, Inc.||Low power fingerprint capture system, apparatus, and method| |US20110013174 *||20 Jan 2011||Identification International, Inc.||Fingerprint imaging system| |US20110141456 *||16 Jun 2011||Identification International, Inc.||Fingerprint imaging system| |US20120105705 *||27 Oct 2011||3 May 2012||Yoji Kubota||Imaging device| |US20140125788 *||6 Sep 2013||8 May 2014||Gingy Technology Inc.||Fingerprint image capturing system| |US20150227773 *||6 May 2013||13 Aug 2015||Lockheed Martin Corporation||Latent fingerprint detectors and fingerprint scanners therefrom| |WO1999009514A1 *||19 Aug 1997||25 Feb 1999||Advanced Precision Technology, Inc.||A miniature fingerprint sensor using a trapezoidal prism and a holographic optical element| |WO2004021254A2 *||25 Aug 2003||11 Mar 2004||Haddad Waleed S||Non-contact optical imaging system for biometric identification| |WO2004021254A3 *||25 Aug 2003||8 Jul 2004||Waleed S Haddad||Non-contact optical imaging system for biometric identification| |WO2006049394A1 *||19 Oct 2005||11 May 2006||Nitgen Co., Ltd.||Method and apparatus for distinguishing forged fingerprint for optical fingerprint acquisition apparatus| |WO2006049395A1 *||19 Oct 2005||11 May 2006||Nitgen Co., Ltd.||Method and apparatus for distinguishing forged fingerprint using laser beam| |WO2006049396A1 *||19 Oct 2005||11 May 2006||Nitgen Co., Ltd.||Method and apparatus for distinguishing forged fingerprint using laser beam| |U.S. Classification||356/71, 382/127| |27 Dec 1996||AS||Assignment| Owner name: ADVANCED PRECISION TECHNOLOGY, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BAHUGUNA, RAMENDRA D.;CORBOLINE, THOMAS M.;REEL/FRAME:008286/0280 Effective date: 19950707 |27 Jan 1997||AS||Assignment| Owner name: HI KEY TECHNOLOGIES, INC., CALIFORNIA Free format text: LICENSE;ASSIGNOR:ADVANCED PRECISION TECHNOLOGY;REEL/FRAME:008326/0904 Effective date: 19970125 |5 Dec 2000||REMI||Maintenance fee reminder mailed| |25 Jan 2001||FPAY||Fee payment| Year of fee payment: 4 |25 Jan 2001||SULP||Surcharge for late payment| |1 Dec 2004||REMI||Maintenance fee reminder mailed| |13 May 2005||LAPS||Lapse for failure to pay maintenance fees| |12 Jul 2005||FP||Expired due to failure to pay maintenance fee| Effective date: 20050513
<urn:uuid:d2a1e2e6-1868-45cc-971f-af8533a7c7bb>
0.210199
XForms/Read and write with get and put Sometimes all you need to do is to put a nice user friendly form that edits a single static XML file. In this case a static file is any file where you know the exact pathname to the file when the form is created and you know that the file name will never change. This is the case when an application has a configuration file in a known location (either absolute or fixed relative to the XForm). If this is a local file on your hard drive this is very easy to do just by using get and put operations and either absolute path names to the file or relative path names to the directory that the form is located. XForms also allows a user to read data into a form using a HTTP get and to write data from a file using HTTP put operations using a remote web server. Just make sure you enable put operations on your web server and that the file you are putting is writeable This means you will need to do a chmod +w if it is a UNIX file. <html xmlns="http://www.w3.org/1999/xhtml" xmlns:xf="http://www.w3.org/2002/xforms" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"> <head> <title>Submission with get and put</title> <xf:model> <xf:instance id="data-instance" src="data.xml" xmlns="" /> <xf:submission id="read-from-file" method="get" action="data.xml" replace="instance" instance="data-instance" /> <xf:submission id="save-to-file" method="put" action="data.xml" replace="instance" instance="data-instance" /> </xf:model> </head> <body> <p>Demonstration of using XForms to get and put data to local file using the submission element.</p> <xf:input ref="Element1"> <xf:label>Elementu 1:</xf:label> </xf:input> <br /> <xf:input ref="Element2"> <xf:label>Elementul 2:</xf:label> </xf:input> <br /> <xf:input ref="Element3"> <xf:label>Elementuul 3:</xf:label> <br /> </xf:input> <xf:submit submission="read-from-file"> <xf:label>Reload</xf:label> </xf:submit> <xf:submit submission="save-to-file"> <xf:label>Save</xf:label> </xf:submit> </body> </html> data.xml Instance File The following file is read into memory (from the same folder that the form was executed in) when the form is loaded into the browser. This file is written to the disk when the save button is pressed. The reload button will reload the file into the browser. <?xml version="1.0" encoding="UTF-8"?> <Data> <Element1>One</Element1> <Element2>Two</Element2> <Element3>Three</Element3> </Data> Note that this form is not applicable when the form data is in a file name that is selected at run time. This is because the src attribute in instance is not dynamic. You can not use an XPath expression in the Here is an example of how files could be dynamically loaded in XForms 1.1: <!-- sample code that could be used in XForms 1.1 --> <xf:submission id="read-from-file" method="get" replace="instance" instance="data-instance"> <xf:resource value="instance('my-instance')/FileNameSetByUpload"/> </xf:submission> Note that if this was the case, any form from a nefarious web site might be able to look for a known files or suspicious such as my-passwords.doc and upload them without your consent. This restriction may be eased if the "resource" attribute (part of the XForms 1.1 draft) gets implemented. XForms 1.1 standard on submit resource - This allows the resource path to be dynamically created based on instance data.
<urn:uuid:4c7d4216-a626-46f8-82b8-ced164d255a8>
0.197097
[mythtv-users] MPEG2 Editing Gregory J. McGee gjmcgee at cableone.net Sat Apr 10 18:25:12 EDT 2004 > Basically.....I have to render the MPG twice...which takes a good > chunk of > time, but I'd rather not archive commercials since DVD-R's aren't > cheap at the moment... Avidemux can hack out your commercials, save MPEG2PS, and essentially do a fast copy of the streams if you aren't changing scale/format. Trimming commercials out should not require reencoding at ALL if you want an MPEG2 out, and have a MPEG2 nuv from a 250/350/m179. I don't know if encoding is involved to generate MPEG2PS from normal, same size MPEG2, or if it is sort of a "recompile". I suspect the Avidemux2 will also directly load mythtvs flavor of nuv file , rtjpeg, mpeg2, or mpeg4 based, and allow you to trim out the commercials and Mythtranscode or old unsupported versions of mplayer are not required. Gregory J. McGee <gjmcgee at cableone.net> More information about the mythtv-users
<urn:uuid:33a83aef-9c4f-48f0-bdf0-35104e946c89>
0.066074
4 Nov 2009 9:18 AM #21 5 Nov 2009 2:43 AM #22 5 Nov 2009 9:45 AM #23 5 Nov 2009 12:06 PM #24 If you really want to have it fixed then the fastest way is to prepare an independent showcase. I may happen very easily that such errors can be caused by "hugeness" of the application because some applied css classes, config options, etc. are easily overlooked in a big application. Starting from minimum is the very fast way to find the root of the problem. 5 Nov 2009 3:04 PM #25 From the other side, how could it be possible that the same complex code works well when I just change "autoScroll" from "true" to "false" in one place in the specific panel? For me, it looks like the problem is somewhere inside extjs classes, and I just was too unlucky to find the weak point PS. looked into your examples, most of things are familiar for me, but several ones are really good, thanks, expect to use them in close future 7 Nov 2009 8:36 AM #26it looks like the problem is somewhere inside extjs classes 23 Nov 2009 4:37 AM #27 I found the duplicated IDs in the code, and after I changed them to be unique throughout the code, the jumping disappeared. The funny point is that the code with duplicated IDs was not related to the jumping tree. But on some reason it affected it in this strange way. I'm still trying to extract the part of code to make it as an example, but not sure how long it may take
<urn:uuid:d5b0493b-723e-4cae-bf14-8e8719ff38d7>
0.065536
Personalise your TomTom device There is a wealth of free and premium content to download in TomTom HOME to give a personality touch to your TomTom device. Free content is added everyday by the TomTom Community, check out TomTom HOME often to see what’s new! Click on a service below to start downloading. Please note that, if you don't have HOME installed yet, the download of the software will be started.
<urn:uuid:8850f1e4-b039-4839-b626-9bf7e2ea2c77>
0.05276
I wonder if you could run the game in super wide screen on 1 screen. If you had huge monitor/tv running in high resolution then have the game try to emulate running 3 screens together with no separations in one very wide screen. 3 monitors seems a bit too much for an rpg though great for racing games. I also cant stand the 2 separations it has which makes it look like 2 black lines in between a wide screen view. This would be better to use: http://www.youtube.com/watch?v=ZWivZEtH6-c
<urn:uuid:4e255fa3-bfec-4bca-b0f2-94df69645e92>
0.043225
The most exciting thing was the emergence of what I think might be the first killer applications written in Erlang. I might be wrong, but my gut feeling is that what Alexander Reinefeld showed us will be the first killer application in Erlang. Only a few language nerds are interested in programming languages in their own right. Most people are more interested in what you can do with a programming language than with the underlying language. Thus is was with Ruby. Ruby on rails was the application that drew developers into Ruby. It made them want to learn Ruby so that they could easily build web applications. Alexander Reinefeld told us about an Erlang implementation of the Wikipedia that not only has a stunningly beautiful architecture, but which outperforms the existing Wikipedia. I'll talk about the Wikipedia implementation later in this posting, but it was not the only notable talk there were many other great talks. Claes Vikström (Klacke) gave a great lecture which was a mixture of battle stories, history and what he was doing today. Klacke is the master of the one-line throw-away remark - "and then I implemented a DBMS ... and a web server" this was the technical stuff, and on the business side ...then we started a company and made a whole lot of money...At the end of his lecture Klacke said something like: ... so how come we have this great technology and people are just doing boring things and not writing stock exchanges ... there aren't any killer applications ...Just as an aside Joel Reymont did stir up the Erlang mailing list with his announcement that he wanted to write an open source stock exchange as a publicity stunt, but this ran out in the sand. Perhaps later we can resurrect this idea, it would be a bit of fun. Now for the fun stuff. Alexander Reinefeld video answered Klackes call for action and for a non-boring application as he described how he had implemented the Wikipedia on a new p2p system now called Scalaris. Here's my version of his story: - They make a peer to peer system based on the chord algorithm - They added a replication later using the paxos algorithm - They added a transaction layer - The injected the wikipedia - It went faster that the existing wikipedia Applied to Wikipedia, Scalaris serves 2,500 transactions per second with just 16 CPUs, which is better than the public Wikipedia.Alexander is a tall bespectacled academic who usually only turns up at academic conferences. He was very worried at the start of the talk when he was introduced as "Professor Reinefeld" I think he thought it would frighten people. The system they described won an IEEE prize for scalable systems and was also presented at the Google conference on scalability. I asked Alexander why publicity about what they had done was so hard to find. "I'm academic, we usually publish papers," he said.He'd also said he'd started a company that "wasn't doing very well" (tip to VCs - check this one out and give the guy some help). So my take on this is that this is one of the sexiest applications I've seen in many a year. I've been waiting for this to happen for a long while. The work is backed by quadzillion Ph.D's and is really good believe me. On second thoughts don't believe me but check out the video lecture. You can also download the code. When Alexander had blown my mind Jan Lehnardt popped up for the next section and blew it even further by presenting CouchDB - am I going mad are we seeing the emergence of two killer applications? This cannot be. Jan Lehnardt has a presentation technique that is a joy to watch - it reminded me of why I love programming. Jan communicates on two level simultaneously. His body language oozes enthusiasm - he waves his arms so fast and hops up and down so we think that he was either a helicopter in a previous life or that he wants to get a job as a windmill. Words tumble out of his mouth so fast that his tongue often trips over the end of his sentences and falls flat into the middle of his next sentence conveniently missing out the middle of the last sentence. Check out the video and you'll see that I mean - You'll see Jan almost taking off as he impersonates a helicopter. For more information see the slides of the talk. You can download CouchDb from the Apache incubator site. This style of lecturing is amazing. Jan communicates simultaneously on two entirely different level. His enthusiasm is received by the amygdala in the limbic system and his slides go via your eyes to the pre-frontal cortex for analytic processing. So what was this great stuff the Jan was so enthusiastic about? CouchDb - is an Erlang application that turns a Key-Value JSON store into a system with a RESTFUL interface that stores arbitrary data structures data in a way that fits nicely in with the Erlang system. When I got home I downloaded CouchDb and took a look, and there is was, nicely packaged with a Mochiweb server, the same server which is used by facebook for their comet web chat system. Like most good ideas the CouchDB is deceptively simple. Once you've seen it you think - yes that's how it should be, how simple, how beautiful. But designing simple things is not easy it requires many false starts and takes a long time to get right. Hats off to Damien Katz for the initial design and to his collaborators, and thanks Jan for telling us about it. Now it just so happens that both Jan Lehnardt and Alexander Reinefeld both live in Berlin, both are working with key-value stores (the details, vary) which are programmed in Erlang, both of them are working on what might be the next killer Erlang application and ... they have never met. I introduced them and then stood back. Wow. After a moment of shyness they changed to speaking German and Jan started bouncing up and down and speaking even faster than in English - this was getting dangerous - this time Jan did turn into a helicopter and narrowly missed causing an accident as he flew out of the room. Klacke and I took the same flight back to Sweden the next day. "That itched my programming nerve," said Klacke
<urn:uuid:6792df1d-a610-4d1a-92be-571eca5753c5>
0.641203
@skydesigner OK, than you may try to use the ionice command. Unfortunately, ionice doesn’t work in GUI. There’s no way to improve file operations with it in GUI. It works for CLI file commands only. And may be used with any of them. The syntax is very simple. Just preceed any file command with ionice. If a command must be preceeded by sudo, then put ionice after sudo and immediately before the command. ionice [command] [command-parameters] ionice cp [source] [destination] -- try to use this one sudo ionice dd if=[input] of=[output] bs=4M && sync sudo ionice fsarchiver savefs ... ionice does for I/O operations what nice does for CPU. Try it. If it works, I may explain what ionice does more in details.
<urn:uuid:3b32b40b-7f2f-46cf-9bda-607dfc8d6507>
0.073942
Can Joomla CMS succeed in an enterprise environment? That was easy enough, but I suspect most of you want to know why I think Joomla might be appropriate for enterprise use. What are some basic needs? - Centralized user authentication - Granular access control - Logging and Auditing - Advanced Content taxonomy and versioning - Pleasing & mobile-friendly front-end design - Easy administration, maintenance and updates - The list goes on... How can Joomla meet these requirements? First, let us keep in mind that Joomla is built on a highly-extensible platform. Out-of-the box, the basic components of a CMS are there, but with a few well-chosen extensions, Joomla can challenge any commercial CMS. The core Joomla CMS includes a easily configurable LDAP login authentication plugin. When enabled, it allows Joomla to query and LDAP source (even Active Directory) to create local accounts and dole out permissions. While this basic functionality solves the problem of centralizing logins, it does not extend LDAP security groups into the CMS. For that we have to turn to 3rd party exentions. Granular Access Control The best LDAP extension I have found for Joomla is JMapMyLDAP by Shaun Maunder. Included features (from his website): - LDAP Group Mapping to Joomla Groups - LDAP profile plugin to sync extra fields to and from LDAP - Password plug-in to save passwords to LDAP - User creation and deletion to and from LDAP - Administration component for debugging and setting up plugins - Logging for debugging and audit tracking through SHLog - Single Sign On (SSO) with HTTP - Tested with Active Directory, eDirectory and OpenLDAP - Free, non-commercial, open source and licensed under the GNU GPL - Current requirement is Joomla! 2.5+ or Platform 12.1+ Admittedly, anyone configuring this collection of plugins should be well versed in LDAP and Active Directory security groups (along with scoped service accounts). Once configured, the functionality one can get out of this combination is fantastic! Imagine being able to map any Active Directory security group to locally defined permissions groups, thereby doling out granular access control to any content, module display, site admin or any other type of 3rd party extension permissions (so long as the follow the standard Joomla 3.x+ ACL). You could, for example, install Kunena forum, lock down access to categories by Joomla groups and map those groups to Active Direct security groups through JMapMyLDAP. You now have an "enterprise ready" forum, ready to securely service all your employee or clients needs! Logging and Auditing This tool provides advanced user access analytics & auditing of management tasks. While this is not a replacement for server-level access & error log monitoring, it does provide an easily accessible interface for admins to check on who logged in when and what system-level changes were made to the website. Content taxonomy and versioning Joomla provides advanced categorization and tagging capabilities for content creation. Tags are managed by a dedicated component, allowing you to create and edit them, separate from content, without breaking tagged relationships. Joomla 3.x introduced us to built-in content versioning. Joomlart has great tutorial on this subject which you can checkout here: Beyond the core Joomla Content component, uses can also take advantage of excellent 3rd party components, like: Over the years, Joomla has benefited from an immense 3rd party marketplace of excellent templates sporting the latest advanced in modular, responsive and multi-device-compatible design. Trusted template providers include: Administration and Maintenance Joomla provides and excellent administrative interface suitable for both site admins and basic content managers. With Joomla 3.x, the admin interface becomes responsive, able to accommodate allow browser dimensions and use cases, from desktop to tablet to mobile. From an enterprise perspective, it is the granular ACL which really shines here. With proper tuning, an admin can selectively restrict access to a various components and capabilities, matching-up permissions with local user groups. Combined with tools like JMapMyLDAP, the Joomla administrative backend can inherit permissions via Active Directory security groups, allowing the developer to offload access requests to other support teams. Due to Joomla's built-in updater and modular architecture (breaking out extensions into components, modules & plugins), maintenance tasks are usually only a few clicks away. Beyond the CMS itself, there are also inherrant advantages with the LAMP (Linux, Apache, MySQL, PHP) infrastructure upon which Joomla sites are built. A CentOS web server deployed in vSphere is easy to manage, clone*, backup and restore. With some skill, a systems engineer might create a MySQL cluster or a collection of load-balanced front-end servers attached to a single database server (more to come in an upcoming article!). *Quick note on copying Joomla sites and changing domains: Those of you who manage Wordpress sites know that the domain is configured within the wp_options table (in a couple different rows) in the option_value field. Copying a Wordpress site and changing the domain usually requires manual intervention by embedding a code snippet in wp-config.php and also searching/replacing instances of the old domain in other tables. Joomla is immune to domain name changes since it does not store a hard-coded domain and local URLs are stored with relative paths. Joomla as an API Service With the release of cAPI Core v1.1, any Joomla website can be converted into a JSON REST API service backend! How is this different? We built a pluggable API architecture for Slim and wired it into Joomla so you don't have to! Want token authentication AND native login? Granular access control? Dynamic API rate throttling? Easy extensibility? Done, done and done!. Extend functionality with plugins Take advantage of our growing library of API service routes plugins. Monthly release expand functionality interfacing with and servicing external resources, securely. Save your application servers Built-in API rate throttling can be configured globally or an a per-token basis. Provides intelligent feedback which API consumers can use to proactively throttle requests *before* hitting hard limits. Control access without the hassle Leverage Joomla's robust ACL to control access to any add-ons, routes or request-types. Expert users can leverage Joomla's pluggable authentication architecture to open up corporate middleware and SSO capabilities. (purchase here to download) Based on my experience, I can safely say that Joomla is exceptionally well poised to meet most businesses CMS needs. While there are many potential, specific use cases, the Joomla CMS can work as an excellent company intranet or customer-facing portal. It can also work well as an adjunct to Sharepoint, providing an attractive, easily-updatable corporate facade with login-access to low-stakes content. Due to the highly portable nature of the LAMP hosting environment, Joomla can be easily deployed locally, replicated to the cloud (Amazon, Rackspace, a co-lo, etc.) and supported by a CDN as well as DDoS & BotNet protection.
<urn:uuid:047152ec-a22e-4a21-a914-c77cbf2499dc>
0.561069
- Article Type: General - Product: Aleph - Product Version: 18.01 Our librarians maintain and update the Aleph configuration files, and restart the pc/www_server via the Aleph GUI -> Services -> General -> Restart Server (sys-01) Would it be possible to add z39_gate and z39_server to this list? This would allow the library staff to test changes without requiring a unix login. Please see attached a powerpoint presentation which shows how to create a custom service. There is an example regarding the z39 gate/server. - Article last edited: 10/8/2013
<urn:uuid:c9fa996d-93a7-434f-b291-d469bd98d5b6>
0.332368
New: enable viewer-created translations and captions on your YouTube channel! Use the following code to embed this video. See our usage guide for more details on embedding. Paste this in your document somewhere (closest to the closing body tag is preferable): Paste this inside your HTML body, where you want to include the widget, with the width and height of your choosing: <div class="amara-embed" data-height="370px" data-width="620px" data-url="https://s3.amazonaws.com/ted.conferences/talk/transcript/2007G/None/SpencerWells_2007G-transcript.mp4"> </div> If you would like the widget to be responsive, you can add All humans share some common bits of DNA, passed down to us from our African ancestors. Geneticist Spencer Wells talks about how his Genographic Project will use this shared DNA to figure out how we are -- in all our diversity -- truly connected.
<urn:uuid:5a65d0a1-982f-417f-b18b-9947dda0d545>
0.731561
Live reloading and Sass CSS compilation¶ If you’d like to take advantage of live reloading and Sass / Compass CSS compilation you can do so with a little bit of prep work. Make sure that nodejs is installed. Then in the project root run: $ npm install If you don’t already have it, install compass (doesn’t hurt if you run this command twice): gem install compass Now you just need: $ grunt serve The base app will now run as it would with the usual manage.py runserver but with live reloading and Sass compilation enabled. To get live reloading to work you’ll probably need to install an appropriate browser extension
<urn:uuid:b7ce63dd-5914-4015-96cc-e30591d8944d>
0.041158
|The copyright of this image belongs to CBS Corporation and/or Paramount Pictures. Its use is contended to be consistent with "fair use" rules under United States copyright law. See Copyrights.| Appears on these pages The Battle of Wolf 359 was the first major engagement between the Federation and the Borg and...
<urn:uuid:ed5ff8d4-ce97-4f89-abf1-e1c0a196567c>
0.043957
EXCITING EMPLOYMENT OPPORTUNITY QUALITY CONTROL LAB TECHNICIAN Employer: Universal Packaging Systems, Inc. (dba PakLab) Job Title: Quality Control Lab Technician Reports To: Quality Manager Job Site: 5055 State Route 276, Batavia OH 45103 Hours: Full-time/1st and 2nd shift positions available Responsible for R&D lab support including but not limited to R&D stability program, incoming raw material handling, sample submission handling and tracking, submission approval tracking, ordering lab supplies, making lab batches. - Responsible for organization within the lab - Performs testing of incoming raw materials and finished products according to required specifications and methods - Maintain relationship with external departments such as pre-weigh and QA and ensure requests are being completed in a timely manner. - Responsible for maintenance and calibration of laboratory equipment - Responsible for maintaining a laboratory notebook - Become proficient at making lab batches - Assist team members(including training) as needed - Track submission approvals - Track weekly submissions - Other duties as assigned - Knowledgeable of PakLab product and process capabilities. - Performs assigned duties with minimal supervision. - Other duties as assigned - Excellent English written and verbal communication skills - Advanced statistical and mathematical skills - Proficiency with computer systems and applications such as Windows XP, Microsoft Office, and Adobe Illustrator. - Two or more years experience as a lab technician or related experience - High School Diploma or GED - Superior problem solving, decision making and organizational skills SPECIAL EQUIPMENT/WORKING CONDITIONS - Ability to lift and pull a minimum of 25 lbs - Requires walking, standing or sitting for lengthy periods of time - Requires bending, pulling, pushing, reaching above shoulder/below waist levels and climbing of stairs - All employees of PakLab must use positive behaviors and practice the following six actions to promote an environment conducive to a Total Quality Organization: - Use positive reinforcement. - Ask what questions, problems and concerns people have and how you can help. - Ask for input prior to decision making. - Provide information and timely feedback. - Manage position as an entrepreneur. - Treat all people with respect. - Conduct all business in a planned, professional and ethical manner. - Treat people respectfully as individuals in a manner that is fair to both the individual and the Company. - Demonstrate personal commitment to continuous improvement. - Enhance interpersonal relations as part of the team concept. Please send resume to Batavia HR Department: Attn: STORMI STEVENS Universal Packaging Systems, Inc. (dba: PakLab) 5055 State Route 276 Batavia, OH 45103 Or, submit it online now...
<urn:uuid:31a6e1c1-c781-4847-8a4d-78475bcb7aae>
0.092714
Traditional Functional Test Automation only addresses regression of existing functionality, during release, far down, or to the right of the Software Development Life Cycle (SDLC). Shift-Left Testing/Automation, involves testing “New” functionality, as it is being created, to the extreme left of the SDLC. Testing “New” functionality, as it is created, and automating that testing? Yes, not a trivial task for those who have not done it before. However, our experts are well versed in this area, including approaches such as Behavior Driven Development (BDD), and technologies like Selenium, Cucumber, SpecFlow, and many others that make this possible. GQP stands ready to help when it comes to meeting your Shift-Left Automation goals. Shift-Left Automation Provides Early Feedback - Find defects before they are even introduced into a Release - Anticipate Product Quality right out of the gate - Validate the success of New Feature implementation (feature/story) by the end of each iterative development cycle (i.e. – Sprint, Cycle, etc.). BDD Fosters Collaboration Across All Disciplines (BA/Owners/Dev/QA, etc.) - Break up Silos, get all team members collaborating; bringing effectiveness and efficiency to the process. - Stop miscommunication and misinterpretation in its place, and reduce the ambiguity to be delivered each iteration via Features/Stories, etc. - Have the team agree on the “Definition of Success” before the completion of each development iteration. Continuous Testing Throughout The SDLC - Shit-Left Automation allows you to introduce “Continuous Testing” to your development cycles, setting you up true Continuous Integration and Continuous Delivery. - Continuous Testing is the first step in DevOps, setting the ground-work to create reusable tests for smoke and regression, in different environments, as your release moves through the software delivery pipeline. - Enter the 21st Century and make your SDLC Word Class, by testing both “New” and “Old” functionality throughout the SDLC. Need help successfully implementing Shift-Left Automation? Give us a call at 888-477-5580, or 888-GQP-5580. Alternatively, complete our Contact Us form here. What’s in Your Stack? from method, class, component, assembly, jvm, clr, app, container, service, pod, node, cluster, cloud, vm, phyisical system, mini, to mainframe… Do You Know Where The Problem Is? …Be In The Know…Here’s Your Free Trial!
<urn:uuid:e94782a2-afe2-4da3-9ca2-d139d434b7e3>
0.972553
I want to replace the following: access-list 101 permit tcp host 192.168.50.100 eq www any access-list 101 permit tcp host 192.168.50.100 eq 443 any I figured I could just create a service group and create the ACL. object-group service WebServices ip access-list extended 188 permit tcp host 192.168.50.100 eq WebServices ( <--problem here) 'permit tcp host 192.168.50.100 eq ?' doesn't give me the option of adding a service object group. 'permit tcp host 192.168.50.100 ?' only allows network object groups. And applying the service object group at 'permit ?' doesn't make sense (don't know if it's source or destination ports). When I look here: http://www.cisco.com/en/US/docs/ios/sec_data_plane/configuration/guide/sec_object_group_acl_ps6441_TSD_Products_Configuration_Guide_Chapter.html#wp1113487 It says I should be able to put a service object group directly behind the network object group. But this isn't the case for me. 'permit tcp object-group WebServers ?' only allows network object groups. I'm running Version 12.4(24)T1 on a 7206. Anyone know how to use this properly? TIA.
<urn:uuid:9a6dd456-987a-4ab6-b732-c2cd65107b34>
0.096266
Sourcetool Global Business to Business Directory SourceTool Profile Matches for the product or service: relay boards Controls Incorporated designs and manufactures microprocessor based and digital control products. Controls Incorporated specializes in designing and manufacturing microprocessor based and digital control products. The company products include industrial engine controls, power generators, industrial products, and private label design and products
<urn:uuid:b8035fdb-c3d0-4e53-83cf-6d715f0cbc0f>
0.064863
Main / Sports Games / Puffin browser for java Puffin browser for java Name: Puffin browser for java File size: 601mb Puffin speeds up browsing by shifting the workload from the resource-limited devices to the cloud servers, and resource-demanding webpages can run. New And Free All Java Mobile Browsers. Free Download All Java Mobile Browsers Just Click On Your Favorite Browser Tested Click here to download. Puffin does NOT support Java applets. Actually, none of the AppStore browsers run (stream) Java. Your only choice is going for remote desktop. Puffin Web Browser is a wicked fast mobile browser. Once users experience the thrilling speed. 17 Dec As far as why there isn't any support for Java on iOS seems to be more Puffin Browser offers a free ad-supported version for download which. programs for "puffin web browser" . Lobo Evolution - Java Web Browser Icon Lobo Evolution is an extensible all-Java web browser and RIA platform. Puffin Web Browser is a wicked fast mobile browser. Once users experience the thrilling speed of Puffin, regular Mobile Internet feels like torture. Puffin Web. 29 Aug Puffin Web Browser is fast web browser supporting flash player on iPad From app description, it describes that it supports Flash and Java. 30 Apr Puffin Web Browser includes Adobe-Flash-Over-Cloud 24/7 now without additional . Free Windows Mobile Android iPhone Java Mobile S Why can I not log into Pogo through Puffin browser on my Ipad. I was able to a week ago, but now it says that Java script must be enabled. Has Pogo. 31 Oct iPhone and iPad come with the Safari web browser, but you're not stuck only using To get around the problem of the iOS not supporting Flash or Java, Puffin (Free) is another app that touts its ability to be "wicked fast. Download Browsers - Apps for Java. Download Opera Mini, Facebook for Every Phone, QQ Browser and more. Download Fast Browser for Android - Best Software & Apps. Filter by: Fast and lightweight web browser for Android. 6 Puffin Web Browser Free Free download puffin web browser for java. Click here to get file. Puffin web browser for android free download and software reviews cnet download. H nh nh . Puffin browser download for java. Click here to get file. Puffin browser for java download. How to download puffin browser pro for free. Androidpit puffin browser . download puffin web browser free android, puffin web browser free android, puffin web browser free android download free. Download the latest version of Puffin Web Browser Android App APK: WATCH FLASH VIDEO WITH PUFFIN INBUILT FLASH SUPPORT. 16 Feb New Apps Browsers for Java. biNu Facebook Messenger. Get Facebook Chat on your mobile. Puffin Web Browser Free. A fast browser for. 21 Nov fastest net browser for java-ipekaxem's blog. Puffin Web Browser is fast web browser supporting flash player on iPad and iPhone.. From app.
<urn:uuid:0a2cdacc-99d2-4bde-a8d3-d5e8ce154acc>
0.411588
|Genre Categories||; ; ;; ; ;| |Work Title||Piano Concerto No.1| |Opus/Catalogue NumberOp./Cat. No.||Op.9| |I-Catalogue NumberI-Cat. No.||ITY 3| |Year/Date of CompositionY/D of Comp.||1904?| |First Publication.||1907 ?| |Dedication||Arthur de Greef| |Composer Time PeriodComp. Period||Romantic| |Instrumentation||Piano and Orchestra| A second piano concerto apparently dates from 1909 but was not published. Was performed at one of Busoni's concerts (ca.1905?). There is a broadcast recording of this concerto.
<urn:uuid:fa5ca6e2-4bf5-40cf-9d4c-bb27b92e9bcb>
0.058544
Cloud infrastructures that have promised to be highly secure assets within a company’s IT arsenal are still vulnerable to sophisticated cyber-attacks. Media exposure to several breaches in formidable cloud solutions enable a high degree of skepticism in overall data security. As cloud solutions mature, new roles and policies have been initiated, including the role of hypervisor administrator: a privileged super-user with access to shared cloud resources. Some concern exists that access to shared resources means potential access to data on those resources. As more people become familiar with the deeper operations of cloud computing, serious questions are raised regarding the handling of duplicate or backup data in virtualized environments. The proliferation of data is extensive and administrators may not be clear about where copies of the data resides within the infrastructure at any given time. These concerns raise questions about data privacy and security, access control, compliance and data tracking. Protecting Your Cloud Data Who is ultimately responsible for data security? The data owner or the cloud provider? Cloud vendors can provide a relatively secure environment for information, with appropriate controls, policies and regular maintenance checks, but primary responsibility falls on the data owner. The best analogy is a community parking garage. The owner of the facility may maintain cameras and security personnel, but that doesn’t relieve the car owner from locking the vehicle. In the same vein, businesses should do whatever possible to ensure their data is secured, protected even from the personnel within the cloud provider. Granular Access Controls The first step is to define exactly who can access the data stored in the cloud and eliminate all unnecessary data access privileges. Granular access controls can be configured to consider who accesses data when and how. For instance, John may have access to personnel records in the ERP solution residing on the cloud, but he is restricted to current skills and training for persons in his department. Though he uses a desktop, laptop and tablet to perform his job function, access to this personal information is only available through his desktop and only during normal business hours. Such extensive controls will prevent any unnamed persons from accessing the data unless they somehow impersonate the identity of an authorized user; even then, such granular controls will prevent access to more sensitive data. Data Encryption and Key Management Data residing on the cloud, particularly a public cloud, should always be encrypted with the encryption keys controlled by the business. Encrypted data is unreadable to any person without the key. That key can be made available to users within the business; enabling the information to be readable only to authorized personnel. In conjunction with granular access controls, data encryption provides this additional layer of defense against unauthorized access. The current trend in cloud computing is establishing multiple environments for data to reside in. These environments can include traditional IT infrastructures and multiple cloud solutions, such as private and public solutions. The management of multiple environments can easily result in different security requirements, inconsistent security policies and controls. This lack of standardization is likely the greatest risk in security for a business as it results in managing multiple security profiles concurrently. The best approach is a unified central approach to security across all environments, where security policies and controls are the same for all personnel and all data regardless of where the data resides. The approach is essential for businesses seeking compliance in industry and governmental regulations and is the most cohesive and efficient approach to managing security. Visibility and Auditability Compliance regulations require businesses to demonstrate data access activity accurately. This requires security teams to monitor, log and report on activities from users and applications. While this information simply needs to be available as evidence, businesses should take advantage of its existence by analyzing the reports and determining any access anomalies and identifying any potential data breaches. Electronic Data Shredding When confidential information needs to be destroyed in a paper world, all evidence of the information is gathered and shredded. The same process is possible digitally by removing all known data sets from the cloud and destroying associated cryptographic keys. Even though the cloud is a dynamic virtual environment where data sets may reside in multiple areas, this process in persistent control will ensure the data is no longer readable or usable. Implementation of data encryption and access control policies are necessary but cannot minimally impact existing processes, workflows, and infrastructures. The administrators for the cloud service provider must be able to perform their work to maintain and deliver the service they are committing to provide; though they do not require access to the data to deliver that service. At the same time, these policies should be transparent to users and not impact their ability to perform their responsibilities. When these requirements are addressed, security teams will be able to support their business effectively and efficiently in moving their data into cloud environments. For more insights, download the HOSTING white paper: Protecting Your Data in the Cloud.
<urn:uuid:5cd560d0-6980-4681-840d-1fced7642b51>
0.129057
easy rendering for Rhino in Windows This tutorial shows how to render a Rhino model using nXt. The model includes some images that will be used as decals and a material library. Support files for this tutorial can be downloaded here... |This opens the location of the Material Libraries for NXT. Each material is a separate file in a series of standard directories on your hard-drive. Navigate to the folder called Stereo Materials that you downloaded with the Rhino model.| While this is a good start, the face of the rack unit would benefit from decal graphics that mark the controls. A decal is a way to apply a single bitmap to an object. It can be used to apply labels and images to objects in the scene. Next step in the tutorial is to add a ground plane for the unit to sit on. A next step might be to add a spotlight on the rack system to vary the lighting a little. The lighting in studio mode is controlled by an HDRI file, but we can also add another spotlight to the rendering. For small studio objects it is sometimes nice to add depth of field to accentuate the depth of the object.
<urn:uuid:cd8eccd9-1117-4a8b-943c-10f6bbe94695>
0.056057
iOS 10 is here, and with it comes a brand new lock screen, a completely different way to unlock your phone and a fancy new messages app. Let's take a quick look at all the new stuff. Music by Visager. Note: Apple has acknowledged that the iOS 10 update has locked up some iPhones and iPads. Click here to find out more and to learn how to fix the issue. The Lock Screen Is Completely Redesigned With New Notifications And Raise to Wake The first thing you'll likely notice after installing iOS 10 is the new "Raise to Wake" feature. When you pick up your phone, the screen automatically lights up. This works on iPhone 6s phones and newer. The lock screen is a bit different now. You can swipe in three directions to pull up different screens. Swipe to the left to pull up the camera, swipe up from the bottom for the Control Center, and if you swipe left on Control Center, you'll get to your audio controls. When you swipe to the right, you'll see the new widget area. This is basically the same as the widgets in the Notification Center in iOS 9, but a lot cleaner. Notifications are also a bit different now. When a new notification pops up, you can hard-press it to reply, view attachments, or watch any videos right from the lock screen. When you're done looking around, you'll notice a feature that's been in iOS since the first iPhone is gone. That's right, "Slide to Unlock" is no more. Now, press the Home button to unlock your device using Touch ID. Messages Now Has Animations, Rich Links And Giant Emoji Messages is... a lot sillier. You can handwrite messages on the screen, add animation effects to message bubbles, add animations to the entire screen, send goofy "hidden" messages, respond with simple animated quick responses, add sketches over images and use stickers. In fact, there's a whole new App Store built into the Messages app where you can search for and add apps. You can also now scan a message before you send it to see if any emoji can replace words. Oh, and emoji are now giant when they're sent without any other text. Photos Automatically Organises Images, Creates Its Own Groups Photos will now tag and organise photos automatically, which will hopefully improve its organisation. Photos will continue doing this by date and location as always, but can now also automatically build albums with the new Memories tab. Here, you'll find albums that Photos creates all by itself, usually based around things like holidays. The app can also now search for people's faces in the app and can recognise objects that it will automatically tag so you can find them later by searching. This works for all kinds of things, like mountains, cars, bikes, cats and sunsets. Siri Can Now Control Some Non-Apple Apps Apple has finally given Siri control of third-party apps, though before you get too excited, it's a little limited. Siri can access six different types of apps: Ride booking, messaging, photo search, payments, VoIP calling and workouts. That means you can potentially ask Siri to do stuff like send a message over Facebook Messenger, book a ride with Uber or pay someone with Paypal. You cannot and will not be able to control a third-party music app or maps app though. Apple Maps Can Work With Third-Party Apps and Calendars, Can Also Now Search Along Your Route Apple Maps gets some minor tweaks to its basic design alongside a handful of new features. It will now scan your calendar to see if you have any events coming up and should show that even on the map. You can also tap the navigation bar on the bottom once you start driving to pull up some new options, including an overview mode, details mode and audio options. Here, you can now search for petrol, food and coffee along your route. Third-party apps will also get integrated into Apple Maps. For example, you'll be able to request an Uber from Apple Maps itself, or directly book reservations using OpenTable when you're in the Apple Maps app. These features will come from the third-party apps themselves, so we'll have to wait and see how it gets used. Apple Music Gets a Tweak to Make Finding Music Easier If you're an Apple Music subscriber, you'll be happy to see that the main Music screen gets some minor tweaks that make it easier to find and play music. The connect tab — the one that lead to the generally unused Apple Music social network — is also gone. The New Home App Wants to Control All Your Connected Devices If you have a lot of connected devices in your home, like smart light bulbs, thermostats or whatever else, you know that managing them all is a pain. Home is a new app that's meant to improve that by giving you a single place to manage all those devices. Home is only compatible with devices that support HomeKit, but that's a pretty massive collection.
<urn:uuid:796a5a30-e58f-46ae-89ac-20d9fe1e3ee4>
0.050047
He didn't, he used the ignition signal from the coil to create a "tach" event, so you'd be very unlucky then.Wenderby wrote: did you use the original crank pos. sensor ? However, I am using the original crank trigger on my Thunderace engine with a cased MicroSquirt running MSExtra 3.0.3, and the good news is the crank trigger and sensor position is identical, so you are a very lucky chap. There is a guy in Holland trying to get the EXUP to work too, and he's using the same crank code. Unfortunately, I am working away at the moment, and the dyno roller had to be repaired otherwise I would be further along. Either way, the Thunderace engine starts well, revs cleanly using the original GTS1000 fuel injection in wasted spark mode or semi sequential using the original coils. I will have to instigate a cam sensor mod to get full sequential, and I have done an R1/R6 coil on plug conversion too. Later I will fit new throttle bodies, fuel system etc.
<urn:uuid:c948dbe9-218c-4524-9bf5-7823056c64db>
0.154564
Портал Vveb.ws / Бесплатная CMS PHP-Fusion 7 Bogatyr / What you need to know for site administration What is site administration? Site administration is a set of measures for launching and maintaining the site's full functionality. In general, the site requires information support, and includes the addition of creative articles, fresh news, relevant announcements, new products, etc. What you need to know for site administration: + CMS site (content content, user administration, forum and comments moderating) + simple HTML tags <b> <i> <p> <table> <tr> <td> <ul> <ol> <li> <img> <a> + admin panel hosting - usually DirectAdmin or CPanel + program for uploading files via FTP - Total Commander, Windows Commander, FileZilla or any other + Regular site backup, with the ability to restore files and database. Creation of DB backups by the script (Sypex Dumper Lite) and * .zip archives of the whole site in the admin panel of the hosting. + simple actions with photos (crop, rotate, increase sharpness or brightness, save in the desired size). It is necessary to study regularly: + the interests of the users of the site in order to offer them relevant material + new SEO and principles of site ranking. + keywords and phrases for wordstat.yandex.ru for the successful filling of the site You should regularly monitor: + site visit by the counters of statistics, first of all Liveinternet.ru. On what pages are visitors and where. + possible problems with the site in Yandex-Webmaster and Google-Webmaster (when and why pages of the site are not indexed) + the behavior of the users of the site on the Webvisor in Yandex-metrics and Google Analytics (what is read and where they click) + daily monitoring of server health What you need to know in order to administer the site correctly? in the administration of the site, first of all, it is necessary to ensure its uninterrupted operation. Watch this every day and several times a day. The second is to ensure that the content of the site is not spoiled by spammers or other services if it is somehow connected with them. It is not necessary to spend a lot of time on this, but constantly. The main (on time) efforts to direct on site optimization, its filling, promotion and development. For forums, it is still possible to moderate incoming messages, if so far there are no moderators. Another important function is the regular creation of backup copies of the project. Forums are updated more often than regular sites. In this forum, database backups are created daily, and all other files every 3 days. When using CMS, the Admin should monitor the regular updating of the version of the used product. Track all released add-ons to the CMS in use and try to provide maximum protection and optimal project functionality. Those. strive to ensure that users are safe and convenient to work with the resource.
<urn:uuid:7ff5f943-f840-4d52-8d33-64b306b71e03>
0.046775
Thank you for signing up for the Young Adult Horoscope Membership with janspiller.com. It will be a moment while your membership activates. Be sure to let us know if you have trouble finding anything. We welcome your feedback. You can always write to [email protected]. We’re here to assist you. Congratulations– you’ve taken a major step in putting the power of astrology to work in your life!
<urn:uuid:833ec278-29de-4f2f-a7c1-4ee7a44ee455>
0.04919
Want to show off your Cloud knowledge? The (un)official ACG Awesome-meter Our reputation system allows Cloud Gurus the ability to earn points by participating in the ACG discussion forums. If your posts are helpful, relevant and awesome then the community will respond by upvoting your post and you will earn reputation points. Watch out though, if your post is unhelpful, irrelevant to the discussion or all around not awesome then you can lose reputation as the community downvotes your post. These are not just fake points for bragging rights - sort of. The reputation system helps you assess the knowledge and merit of any given user. The more points a user has, the likelier they are a trustworthy voice in the community. Plus, wouldn’t you want to earn all these great color icons? We haven’t made a level beyond Unobtanium...yet. This is your profile without any posts: This is your profile when you've become Level 6: Ruby Quartz is cool and all, but wouldn’t you want to be a Ruby? How can I do my part for the ACG community? Great question! For the reputation system to work, we need your help with the following: 1. You can help by asking questions, posting helpful tips and continuing to be awesome in the discussion forums. A great guide to writing good questions can be found here. 2. You can respond to posts by other Gurus. 3. You can upvote posts that are relevant or helpful. 4. You can downvote posts that are not relevant and not helpful. You’re now equipped with the knowledge and skills to earn that Ruby icon. Get out there and keep being awesome!
<urn:uuid:3d7ed105-9ee4-4277-8197-0947c30fd93b>
0.077946
न मां कर्माणि लिम्पन्ति न मे कर्मफले स्पृहा। इति मां योऽभिजानाति कर्मभिर्न स बध्यते।।4.14।। ।।4.14।। कर्म मुझे लिप्त नहीं करते न मुझे कर्मफल में स्पृहा है। इस प्रकार मुझे जो जानता है वह भी कर्मों से नहीं बन्धता है।। Whosoever understands Lord Krishna as being the origin of all as well as being transcendental to all will cease to entangle themselves with desires and attachments to rewards which results in acquiring karma or reactions to actions which binds one to samsara or the cycle of birth and death. It is from past karmas that one is existing in their present lifetime position. Such a person possessing such knowledge and acting upon it appropriately as described in these verses will no longer be bound by karma.
<urn:uuid:cac1ea11-4740-4daf-9821-3954550661e5>
0.091474
Q: How are you using the color feature? We currently employ a very simple tag system, but interested how you use the color feature. Answers from several users: A: The A/B/C/D is another way to group contacts in a broad/general context. We have found many agents/brokers/coaches use this method (and all have subtle differences in how they define these groups). The tagging system allows for a more robust, granular, self-defined categorization (and the tagging system can be used to trigger items in workflows). A: A= Top 100 contacts who would most easily/have before recommended agent B= Anyone who has purchased or sold a property with the agent C= A lead D= A Business contact/Administrative contact A: A = Customers that I have done multiple (more than 3) transactions with and people who refer me the most business B = Anyone that I have done at least 1 transaction with C = General Contacts & Leads D = Anyone that I do not want to do business with again A: It can be used how ever you want. Most users subscribe to a trainers definitions: A=Clients that you have had Multiple Deals/Multiple Referrals B=Clients that you've done at least one deal or referral C=Clients you want to do a deal with but not yet D=Those Clients you did a deal with and don't want to go through that type of Hell again... A: A = Would recommend the agent to others B = Have been a buyer or seller of the agent C = Leads/potential clients D = Business directory contacts, other realtors, lawyers A: D = Never do business with; or doesnt get our Love Notes or Christmas Invite. You really dont want to be "D". C = Most people come in on C. B = People who know us, love us, and we know who would refer us. Past Clients. A = Past Clients with multiple transactions, people that refer us multiple times. We have a "A+".... People whom we would bend over backwards for; and people whom would do the same for us.
<urn:uuid:1e9628a9-f660-44b3-885e-a1bc24374791>
0.672052
ATA_ID_STRING(9) libata Library ATA_ID_STRING(9)NAMEata_id_string - Convert IDENTIFY DEVICE page into string void ata_id_string(const u16 * id, unsigned char * s, unsigned int ofs, unsigned int len); IDENTIFY DEVICE results we will examine string into which data is output offset into identify device page length of string to return. must be an even number. The strings in the IDENTIFY DEVICE page are broken up into 16-bit chunks. Run through the string, and output each 8-bit chunk linearly, regardless of platform. COPYRIGHTKernel Hackers Manual 2.6. November 2013 ATA_ID_STRING(9)
<urn:uuid:28b2b03d-d0e3-45bc-ba3e-af99d63badf2>
0.397037
دسته بندی ها e-mail servers, postfix, qmail, zimbra, exim Network Related Issues & Tips This is kind of a common problem and may have several reasons. Sometimes when we simply want to...Install JSON Support to PHP on CentOS Here’s a way to add JSON support for PHP on your CentOS server. yum install php-pear...Change Outgoing IP of Postfix Mail Server This can get quite important when your mail server is blacklisted, or if you somehow want to...Building PHP 5.4.3 on CentOS Even though it’s easier to use yum, sometimes we need to compile PHP from source code....Installing MS SQL Module to PHP on DirectAdmin [cite] If you need to connect to an MS Sql Server remotely from your DirectAdmin server via php, you...
<urn:uuid:27260549-cbad-4dbd-8a8f-26a2b270fcea>
0.080769
A researcher has uncovered several one-click client-side vulnerabilities in the popular Bluehost web hosting platform. These would allow cybercriminals to easily carry out complete account takeover, according to the analysis. Bluehost has acknowledged the issue, and told Threatpost, “We are aware of Paulos’ research and we’ve taken steps to address the potential vulnerabilities in question.” Independent researcher and bug-hunter Paulos Yibelo, working with Website Planet, set up a testing site with Bluehost, which powers more than 2 million sites around the world according to its “About Us” page. He found multiple account takeover and information leak vulnerabilities in the platform, as well as a lack of password verification when changing account credentials. The highest-severity problem that Yibelo uncovered was a misconfiguration of cross-origin-resource-sharing (CORS), which allows websites to share resources across their domains. However, there are legitimate use cases for sending requests to other domains, such as the use of public APIs that allow anyone to query them – this is the purpose of CORS. Unfortunately, misconfigurations can allow a domain controlled by a malicious party to send requests to a legitimate domain – and the legitimate domain will answer, opening the door to data harvesting. In Bluehost, Yibelo said that the CORS function doesn’t have appropriate filters in place for governing which websites should be allowed to access what data on the Bluehost hosted website, according to the researcher. Essentially, any website with a Bluehost domain name (https://my.bluehost.com/) will allow another website with a Bluehost domain name to read its contents. “For instance, if the browser that sends the request is coming from https://my.bluehost.com.EVIL.com, Bluehost would allow it,” according to the research, posted Monday. “Bluehost only checked the first strings and didn’t consider what came after Bluehost.com. This means malicious attackers could host a subdomain called my.bluehost.com.EVILWEBSITE.com and [a legitimate Bluehost website] would allow EVILWEBSITE.com to read its contents.” In testing, Yibelo was able to access various personally identifiable information (PII), such as name, location (city, street, state, country), phone number and ZIP code; partial payment details including expiration month and year, the last four digits of a card, the name on a card, card type and payment method; and tokens that that can give access to a user’s hosted WordPress, Mojo, SiteLock and various OAuth-supported endpoints. A second, moderately-high flaw would allow account takeover because of improper JSON request validation, opening the door to cross-site request forgery (CSRF). The vulnerability allows attackers to change the email address of any Bluehost user to the address of their choice, and then reset the password using their new email to gain complete access to the victim’s account. The attack is executed when a victim clicks a single malicious link or visits a single malicious website, according to Yibelo. “This vulnerability can be exploited because of certain misconfigurations in Bluehost’s handling of requests and validating them,” according to the analysis. “When users try to change their personal details, such as name, phone number, address or email, Bluehost sends [a request to the platform to do so]. If you look carefully, you will notice there is no unique token sent with that request. This means any website can actually send the request to that specific endpoint cross-origin, and change your details.” Normally this attack would be thwarted because it uses the Adobe Flash Player-dependent JSON; but Yibelo found that “special tricks and server misconfigurations” allow it to work in any browser, without using Flash: Since browsers normally add = (equal sign) at the end of the input name, we can manipulate the JSON to include the equal sign in FirstName, and add the remaining values in the “value” attribute: organization”:null}. The request will be sent with Content-Type: text/plain and not application/json – but Bluehost doesn’t mind that, which makes our exploit work cross-origin. Normally, Bluehost checks if the referrer domain is bluehost.com – if the request is sent from any other website, Bluehost will reject the request with a 500 response. This can easily be bypassed by using Content=”no-referrer” in the meta tag, because if no-referrer is sent, Bluehost will allow the request. “This vulnerability allows an attacker to execute commands as the client on bluehost.com – this means the ability to change, modify and add content, including the email address,” the report explained. “The attacker can read content about the victim, or change the content on their website when the victim clicks on a malicious link or visits a website.” A video of the attack can be seen, here. And finally, a medium-severity issue arises because of improper CORS validation, which allows a man-In-the-middle attack. Here, instead of not verifying the domain, Bluehost doesn’t verify the scheme/protocol when allowing CORS to read its contents, meaning that it will allow access by an HTTP domain request (i.e., the traffic is unencrypted). “This downgrade attack makes the use of SSL certificate by Bluehost completely useless and defeats the whole purpose of using an HTTPS request in the first place,” the report noted. It’s worth noting the Bluehost isn’t alone here – Yibelo said that similar flaws were also found in the Dreamhost, HostGator, OVH and iPage web hosting platforms. “By paying scant attention to security and privacy, web-hosting platform providers unknowingly enable bad actors to steal consumer information and commit fraud,” said Mike Bittner, digital security and operations manager for The Media Trust, via email. “This lax approach puts platform providers, their customers, and consumers at grave risk as consumer data privacy regulations around the world tighten on the one hand and attacks by malicious actors intensify on the other. Such providers should build security tests and enhancements into the product lifecycle, as every user of each site they host could be victimized by cyber thieves and fraudsters. If a provider hosting a million sites around the world takes a slapdash approach to privacy and security, imagine how many site visitors could be affected and, as a result, how many site owners would find themselves in violation of new privacy laws.” This post was updated at 11:55 a.m. EST to reflect a response from Bluehost, and a comment from The Media Trust.
<urn:uuid:2dbe8b69-e10f-4892-ba4c-c0fb4b874cfb>
0.211913
SWMF is used to study the segmentation of SED plume into polar cap patches during the geomagnetic storm on Sep 7, 2017. The database includes the 3D output in the upper atmosphere from GITM, the 2D output from Ionospheric Electrodynamics (IE) and 3D output from BATSRUS. The output from GITM can be read with thermo_batch_new.pro. The output from IE can be opened with Spacepy at https://pythonhosted.org/SpacePy/. The output from BATSRUS can be opened with tecplot. More details can be found in Readme.txt. There is a directory tree inside this zipped file. The main directory has the Adobe Illustrator plots of the figures in the paper, Space Weather journal manuscript # 2018SW002067, "Model evaluation guidelines for geomagnetic index predictions" by M. W. Liemohn and coauthors. The three subdirectories have the files for the individual models, the data to which they are compared, and the IDL code used to create the figure plots and metrics calculations. and Date coverage is specific to each model. The RAMSCB model covers January 2005, the WINDMI model all of 2014, and the UPOS model 1.5 solar cycles, from 1 October 2001 through 29 July 2013.
<urn:uuid:c0d481ed-5c0f-448f-9d87-643dbfc58e73>
0.044481
Sony has announced the Dualshock 4 Back Button Attachment is coming early next year, featuring two customizable buttons. It will be possible to attach them to the back of the wireless controller and program whatever you’d like. It still has headset integration for a regular 3.5mm audio input. According to Sony, “This new attachment elevates your gameplay by delivering more versatility and performance, while maintaining the comfort and feel of the DualShock 4 wireless controller you’ve come to love.” There are three key points to know about the attachment: - You can assign 16 different functions to three different accounts, for example, if your child or girlfriend prefers different control settings. - It’s easy to set controls by simply scrolling. Plus, they are really well-positioned for your fingers. Maybe it will make Souls-like games more passable for beginners. - It releases on January 23, 2020 and costs $29.99 USD. It’s a very competitive price for those who doesn’t want to spend $200 for a custom SCUF controller. Despite the fact that Sony should have made it a long time ago and the screen is on the back of the controller (where no one ever looks), this might be a good feature test for DualShock 5. What do you think about the Back Button Attachment? Let us know in the comments below!
<urn:uuid:79342060-99a0-4398-8a61-7851f04a72f9>
0.12225
make me finger my pussy at goal!! 219 for goal || #ebony #naughty #teen #young #fetish #feet #latina Just got a new lush !!! FUCK FUCK FUCK !!! Let s have fun together! #roleplay #dildoplay #new #bigass Anal Show- Pussy Show #squirt #Ass #15Tits #DildoShow190 Loli-Pop ! U wana help me? tips and go prvt EPIC Teen Cam (18+) - Girl on Girl - [Anal @ Goal] hello my love hello guys!squirt for 2000 tks #new #daddy #tiny #lovense #boobs #squirt Do you think you can give me an orgasm? ♥ Fuck my pussy + cum 58 tk/Pvt on ♥ Hottie Bunny I wants a big Cock in my tight pussy! ♥♥ Are you ready to fuck with me?♥ Follow me @GOAL Fuck Pussy &CumS ☆So long time without savour a good cum, give it in my mouth☆ ❤Lick Dildo 50 tk ❤ Blowjob 125 tk ▶ ❤Deepthroat goal 199 Your cock wet with my spit can easy get into my pussy ♥ Deepthroat 99 tks ♥ Today I want to play with you, to start the weekend ♥ Cream on my tits 222 tkns ♥ Toy in my clit @499 165 Cum on her face Hot as always, I want to start the weekend having fun ♦ Squirt at goal 888 tks ♦Lush ON ♦ alisonquinter: ♥ Welcome to my room today I invite you to play with my dildo and hot oil for my pussy♥I hope to find my I'm alone all weekend, you want to spend it with me?☆Fingerin 1at goal ☆PVT ON This bunny needs pink stimulation!⭐FINGERING at goal 50⭐Blowjob 99⭐ My ideal body weight is yours on mine, you are my dream. I wanna feel you on top of me non-stop ♥ Lush ON ♥ Fingering at fuck me hard and watch how cream comes out of my pussy 45 # LUSH ON #latina #bigass #lovense #analsex Today I am a very very , naughty girl help me put my anal plug? Touch this ass and I'll get so wet!♥SQUIRT + PLUg anal at goal 132♥Flash Pussy 40♥Flash ass 35 Control my lush sex toy with Your tips! Private on 900 pre tip | Surprise at GOAL ♥ Snapchat 3333 ♥ I love you 1111 ♥ Co spin the wheel of fortune for 44 tokens Grab my ass and eat me whole, spit me out! Cum show @ 999 @lovense@naughty@czech@make me squirt@1000tk 400 hot strip 1-18t.-1sec,19-40t.-5sec,42-66t.-15sec, 68-132t.-25sec,134-222.-60sec, 224-444t.-2min, 666 ток-5min. Your good girl) Looking for footfetish AT GOAL NAKED! #oilshow/ #oilass/ #oilboobs/ #anal #buttplug #toys #lovense #latex #heels #stockings #pantyhose #sucktoy Hello,Guys)Send love❤) For smile-30) Legs-45) Boobs-50) Ass-55) Cam-70) Change clother-80) Slap ass-100) Oil,spit,ice,ni hello ! let`s have some fun ! I get excited when I feel your arousal Have a pleasant time and good mood !!! I have Lovens! You can make me happy, give me an orgasm!!! Love you! Your student Welcome to my room/ LOVENSE ON. Make my pussy WET you make me moan with my lush #big nipples #weet pussy #anal #ride u cock #squirt come play me lovense remote app Lovens works from 2 tokens *** put your music through the autodj, I will listen to it with pleasure)))543 left until the if you like me- 1 token |ass spanks- 2 tokens | feet- 3 tokens | tits- 5 tokens | pussy- 7 tokens | ass - 8 tokens | mas 1917 SQUIRT Hello! 17 tk - the strongest 10 s! 44 tk. - random - (2-7ur.), 556 tk – the strongest 250c! Put love! Lovens in me :* Favorite vibration 111 tk (30 sec)
<urn:uuid:27d45300-a3d1-4a54-854c-a3a6eb196219>
0.045375
It looks like you're new here. If you want to get involved, click one of these buttons! |Discussion||Starter||Forum||R / V||Latest| |80k to investneed some players to invest in||russocd||Market & Trading||1 / 242||sduetsch on March 2019| |80k to investWhat is the best way to invest and how do you use the market section on futbin to help?||Gillee99||Market & Trading||3 / 489||Nigesufc1234 on March 2019| |Anyone planning to continue to play FIFA 19 or are you planning to get or ditch FIFA altogether?As the title says||cakedinmud||General FIFA Discussion||3 / 100||cakedinmud on July 2019| |How to get more coins and who to invest inHey! Im looking for help for how to get more coins and who to invest in! Thank you in advance||Liiker||Market & Trading||1 / 733||Agonyzzz on October 2019|
<urn:uuid:ed65938c-9aeb-4a34-bda2-ac4f1b890314>
0.317863
[amazon_link asins=’B01M1CO34T,B01CNGXQYU,B01C8BR84O,B01M2A8XP3,B00854L57U,B016CCG256,B01MQK1XSX,B004RR1FF6,B000HCMK90′ template=’ProductCarousel’ store=’finmeacur-20′ marketplace=’US’ link_id=’89932f47-2c8b-11e7-848e-f7afe2b071e6′] Pain while passing urine, a desire to urinate every few minutes, an inability to pass urine despite the urge, high-coloured, cloudy urine, abdominal pain, high fever, shivering and vomiting — a few or all of these are symptoms of an infection somewhere along the urinary tract. In the elderly, the only symptom may be a change in mental status. In men, the pain may be felt in the rectal area. In children, after a period of dryness, bedwetting may recur. In babies, the temperature can fall instead of rise, and there may be jaundice. Almost 25 per cent of visits to a physician is due to this very common infection. CLICK & SEE Urinary tract infection (UTI) affects all age groups and both sexes. It is much more common in women, because of the shorter urethra, its proximity to the anus, pregnancy (when the uterus obstructs the free flow of urine) and minor trauma during sexual intercourse. Thirty five per cent of women have one episode of UTI before the age of 30. Men tend to develop UTI if their prostrate gland is enlarged as this obstructs the flow of urine. In both sexes kidney stones, structural abnormalities of the urinary tract, diabetes or lack of immunity (HIV, cancer medication) can increase susceptibility to infection. Pregnant women can develop asymptomatic UTI with bacteria detected in their urine on routine examination. This condition, called “asymptomatic bactinuria” of pregnancy, needs to be treated. ...CLICK & SEE Physicians suspect that UTI exists based on the symptoms. A routine urine examination shows abnormalities like pus cells or blood in the urine. A culture can be done to determine the organism responsible so that the appropriate antibiotic can be administered. Untreated patients of UTI can sometimes recover spontaneously without treatment in a few months. But the infection can also enter the blood stream, causing potentially fatal septicaemia. The kidneys may become scarred, too. This leads to high blood pressure and kidney failure. During pregnancy, recurrent or chronic UTI or asymptomatic UTI compromises the placental blood supply. This affects the baby’s nutrition, leading to low birth weight and sometimes causing the mother to go into premature labour. There are several regimens for treating UTI. Depending on the organism and antibiotic, in adult women a three-day course is usually sufficient for mild infection. In most cases and in the case of men, however, a 7-10 or 14-day course is required. Oral medication is usually sufficient. If the infection has affected the kidney, hospitalisation and intravenous medication may be required. It is important to follow the doctor’s instructions and complete the course of antibiotics even if you are symptomatically better. In women, if the symptoms do not respond and there is also white discharge, there may be an underlying pelvic infection. In men, non-responsiveness to treatment may be due to unrecognised prostatitis. One of the ways to prevent UTI is to drink plenty of water. The urine becomes dilute and the bladder gets flushed regularly. An adult needs around 2.5 litres of water a day. In hot, humid climates and in people who exercise vigorously the requirement may go up to 4-6 litres a day. Also, drink a glass of water before going to bed. Empty the bladder before and after intercourse. Drink a glass of water after intercourse. A few studies have shown that cranberry juice (available in India, Hindi name karaunda) and blueberry juice (not available) helps reduce the frequency and duration of UTI. This is because the juice contains vitamin C which acidifies the urine. It also contains natural chemicals that make the bladder wall slippery and prevent bacteria from sticking to it and initiating an infection. Other citrus juices and tablets of vitamin C are effective but not as efficient. A tablespoon of home-made curd taken on an empty stomach first thing in the morning naturally repopulates the intestines with “good lactobacillus”. This decreases the likelihood of the growth of disease-causing bacteria in the rectum, from where they can enter the urethra. The pelvic muscles become lax after childbirth. This increases the possibility of the bladder and uterus descending downwards while straining. “Accidents” with leakage of urine and urgency can also occur. All these increase the chances of infection. Keegles exercises should be done regularly soon after childbirth. Also while passing urine, consciously stop and start. This tones the pelvic muscles. Women tend to lean forward while urinating. This position is inefficient as it increases the angle between the bladder and the urethra, creating an obstruction to the flow of urine. Women should consciously lean backwards. Also, when the area is being washed after urination or passing motion, wash from front to back. This decreases the likelihood of contamination of the urethra with rectal bacteria Source: The Telegraph ( Kolkata, India) - Do I have a UTI? (zocdoc.com) - Can cystitis result from an abortion? (zocdoc.com) - What are the symptoms of a UTI? (zocdoc.com) - What causes bladder infections? (zocdoc.com) - Why does my urine hurt when I have a cold (wiki.answers.com) - Women and Urinary Tract Infections (medtopicwriter.com) - Probiotics Could Help Prevent Urinary Tract Infections (livescience.com)
<urn:uuid:e56ebe6c-7017-4122-96aa-c6b0c3f095f1>
0.056405
Car ID:9469 VIN/Serial No: HNT32-7004 2015 Nissan X-TRAIL - Current FOB Price US$0 Registration is required in order to ask a question. Please perform login or a member's registration from the following. AUCTION GRADE: 4 PS, PW, AB, ABS, AW, TV NAVI, BACK CAMERA, SEAT HEATER |Anti-Lock Brakes/Driver Airbag/Passenger Airbag/Navigation System/Power Steering/Power Windows/Alloy Wheels/Power Door Locks/Power Mirrors| |Grade||X EMERGENCY BRAKE| Japanese Used Cars Exporter "the Japan Car" - At "the Japan Car" we have a large number of quality used cars, trucks and vans with more arriving everyday. Below average prices, to suit your budget.
<urn:uuid:45619020-abdf-48d3-bcf0-36b774244c8d>
0.08157
Constructing Load-Balanced Virtual Backbones in Probabilistic Wireless Sensor Networks Via Multi-Objective Genetic Algorithm A connected dominating set (CDS) is used as a virtual backbone (VB) for efficient routing and broadcasting in wireless sensor networks (WSNs). Currently, almost all existing works focus on constructing minimum-sized CDS under the deterministic network model. However, because of the existence of many probabilistic lossy links in WSNs, it is more practical to obtain a VB under the realistic probabilistic network model (PNM). Moreover, load-balance factor cannot be neglected when constructing a VB to prolong network lifetime. Hence, in this paper, we propose a multi-objective genetic algorithm to construct a load-balanced VB under PNM. Through simulations, we demonstrate that our proposed methods extend network lifetime by 69% on average compared with the existing state-of-the-art approaches. Transactions on Emerging Telecomunications Technologies Digital Object Identifier (DOI) He, Jing (Selena); Ji, Shouling; Beyah, Raheem; and Xie, Ying, "Constructing Load-Balanced Virtual Backbones in Probabilistic Wireless Sensor Networks Via Multi-Objective Genetic Algorithm" (2015). Faculty Publications. 3814.
<urn:uuid:444f111d-4ae6-4f55-b82a-c820a245718c>
0.464011
Automatically test your dirty Grails classes When refactoring code in bulk, I occasionally run into a scenario where it’s simpler to make the change all at once and run the tests afterwards than it is to test after every iteration of the change. Some examples include renaming method or variable names (or anything with an IDE’s find-and-replace feature), changing internationalized text, or adding/removing a method call. However, the full test suite for a project can take a very long time to run, so I initially test only the modified (and related) classes. I figured it would be nice to have a script automatically test the modified files for me, so I tried my hand at writing one. Granted, this is my first bash script so I may have missed some standards/conventions, but I did my best to keep up with best practices. The script will grab the list of modified files from git, parse their “base” file names, and then pass those names appended with the wildcard character (*) to grails test-app. It’s pretty simple, and I wasn’t able to find any scripts that already did this, so I figured it would be a good chance to brush up on my bash scripting skills. Without further ado, here is the script itself: Simply copy that into a .sh file, chmod +x permissions to it, and (optionally) add an alias (e.g. alias gitTestModified=’~/scripts/gitTestModified.sh’) in your .bashrc to easily invoke it. So with our example, we could call it with: By default the script takes no arguments and simply checks the following directories for modified .groovy files (as according to git diff HEAD): This list can be appended simply by passing some bulk arguments to the script. For example, to check for tests that were modified as well, we can do: gitTestModified test # Add 'test' to the directories to search for git changes If there are modified files, the tests will be invoked. If not, then a simple message will pop up saying so. -r Remove default directories gitTestModified also allows a -r flag to exclusively check the directories passed in, overriding the defaults in the script. So the following call would look ONLY in the ‘test’ directory: gitTestModified -r test # Only check the 'test' directory for git changes Once changed files are found and parsed, the filenames are appended with the wildcard (*) and passed to grails test-app. Since the typical Grails test naming convention is <filename>Spec.groovy or <filename>Tests.groovy, the wildcard will capture these test cases and automatically run them. Obviously if your project does not follow this convention, this script will not work. -t Test options If we want to pass additional arguments to grails test-app, so we can for example, run only tests that failed last time, we can do so using the -t option and then providing the arguments: gitTestModified -t "-rerun" # Only run tests that failed last time we called test-app Since these arguments are passed directly to grails test-app, it’s best to wrap them in quotes due to the dashes and potential spaces. This also means we can append additional tests to run: gitTestModified -t "-unit MyExtraTests.groovy" Finally, the script has a -h flag to display its usage information: gitTestModified also outputs each call to grails test-app both for easier debugging and for easy copying/pasting in case you want to run the tests independently. The script currently only checks for .groovy files, and relies on git diff HEAD to get its list of changed files, so committed changes may not show up in that list. It only checks .groovy files (not .java), but you can change the regex variable in the script if you need Java files too. It’s also my first major bash script, so it may be a little rough around the edges. If you’d like to fork it and/or improve on it, I’ve uploaded the code on GitHub.
<urn:uuid:a77b75b4-b07e-4cd6-aa1b-55cd93144729>
0.079835
Kevin Hawkins writes > Digital humanities centers have been dealing with these questions as > they've accumulated projects, and sometimes they have dumped them on > libraries to try to preserve. "dumped" maybe but I would still try to see this as an opportunity for libraries to move into a growing activity. Thomas Krichel http://openlib.org/home/krichel
<urn:uuid:7e85270a-afd0-4698-b232-3bbcb40cea59>
0.04507
Websites can range from the very simple to the very complex. They can contain content which rarely changes, or content which requires constant updates, additions or deletions. It may be an e-commerce website that requires shopping cart technology, or a website capable of processing complex line of business functionality. All websites have a number of things in common. They require the following in order to be accessible by the public: - Domain Name Registration - This is what your website is called (eg. www.yourwebsite.com.au) - Domain hosting - this is where your website lives - DNS hosting - this is how the web knows where to look for your website when someone types your web address into their browser. It marries the domain name with the web host. WIZBANG IT has selected the best providers to partner with in order to be able to provide all of these making it a one-stop shop for your business.
<urn:uuid:405b0ff0-c622-46b7-bc29-c4b97facdc65>
0.114277
|Home | Download | Support | Products | SiteMap| How can I make the slideshow play in a loop? Photostage creates a video output from the selected images and audio but the playback depends on the video player so there is no option to create a loop project. Try PhotoStage Slideshow ProducerDownload PhotoStage Slideshow Producer free. Seeing and using the software first hand can answer most questions |Top Product Categories||Most Popular Programs||Top | Back to PhotoStage Slideshow Producer | Privacy | Legal | Home| © NCH Software
<urn:uuid:575bb202-b0b9-4294-a6ed-d3c6ecead36a>
0.065361
The production of positronium in a low-temperature (cryogenic) environment is in general only possible using materials that operate via non-thermal processes. In previous experiments we showed that porous silica films can be used in this way at temperatures as low as 10 K, but that Ps formation at these temperatures can be inhibited by condensation of residual gas, or by laser irradiation. It has been known for several years now that some semiconductors can produce Ps via an exciton-like surface state [1, 2]. Si and Ge are the only semiconductors that have been studied so far, but it is likely that others will work in a similar way. The electronic surface state(s) underlying the Ps production can be populated thermally, resulting in temperature dependent Ps formation that is very similar to what is observed in metals (for which the Ps is actually generated via thermal desorption of positrons in surface states). Since laser irradiation can also populate electronic surface states, and is known to result in Ps emission from Si at room temperature, the possibility exists that this process can be used at cryogenic temperatures. We have studied this possibility using p-type Ge(100) crystals. Initial sample preparation involves immersion in acid (HCl) and this process leaves the sample with Chlorine-terminated dangling bonds which can be thermally desorbed. We attached the samples to a cold head with a high temperature interface that can be heated to 700 K and cooled to 12 K. The heating is necessary to remove Cl from the crystal surface, which otherwise inhibits Ps formation. Fig 1 shows the initial heating cycle that prepares the sample for use. The figure shows the delayed annihilation fraction (which is proportional to the amount of positronium) as a function of temperature. FIG. 1: Delayed fraction as a function of sample temperature after initial installation into the vacuum system. After the surface Cl has been thermally desorbed the amount of Ps emitted at room temperature is substantially increased. As has been previously observed using visible laser light at 532 nm can increase the Ps yield. This occurs because the electrons necessary for Ps formation can be excited to surface states by the laser. However, these states have a finite lifetime, and as both the laser and positron pulses are typically around 5 ns wide these have to be synchronized in order to optimise the photoemission effect. This is shown in FIG 2. These data indicate that the electronic surface states are fairly short lived, with lifetimes of less than 10 ns or so. Longer surface states were observed in similar measurements using Si. FIG 2: Delayed fraction as a function of the arrival time of the laser relative to the incident positron pulse. These data are recorded at room temperature. The laser fluence was ~ 15 mJ/cm When Ge is cooled the Ps fraction drops significantly. This is not related to surface contamination, but is due to the lack of thermally generated surface electrons. However, surface contamination does further reduce the Ps fraction (much more quickly than is the case for silica. This effect is shown in FIG 3. If a photoemission laser is applied to a cold contaminated Ge sample two things happen (1) the laser desorbs some of the surface material and (2) photoemission occurs .This means that Ge can be used to produce Ps with a high efficiency at any temperature, and we don’t even have to worry about the vacuum conditions (within some limits). FIG 3: Delayed fraction as a function of time that the target was exposed to showing the effect that different laser fluences has on the photoemission process. During irradiation, the positronium fraction is noticeably increased. There are many possible applications for cryogenic Ps production within the field of antimatter physics, including the formation of antihydrogen formation via Ps collision with antiprotons , Ps laser cooling and Bose Einstein Condensation , as well as precision spectroscopy. Positronium formation via excitonlike states on Si and Ge surfaces. D. B. Cassidy, T. H. Hisakado, H. W. K. Tom, and A. P. Mills, Jr. Phys. Rev. B, 84, 195312 (2011). DOI:10.1103/PhysRevB.84.195312. Antihydrogen Formation via Antiproton Scattering with Excited Positronium. A. S. Kadyrov, C. M. Rawlins, A. T. Stelbovics, I. Bray, and M. Charlton. Phys. Rev. Lett. 114, 183201 (2015). DOI:10.1103/PhysRevLett.114.183201.
<urn:uuid:fefb0002-1413-491b-bab3-b6c4f81eb408>
0.060668
Nick Sullivan1 writes: You can compute how much energy is needed to break a cryptographic algorithm and compare that with how much water that energy could boil. This is a kind of a cryptographic carbon footprint. By this measure, breaking a 228-bit RSA key requires less energy than it takes to boil a teaspoon of water. Comparatively, breaking a 228-bit elliptic curve key requires enough energy to boil all the water on earth. For this level of security with RSA, you’d need a key with 2,380 bits. ED25519 uses a 256-bit elliptic curve key. Release notes for OpenSSH 8.3 announce that ssh-rsa is disabled by default in future releases. It is a good time to adopt ed25519 for public key authentication.
<urn:uuid:417c63b3-d26b-43ed-b296-cc6743dadbd0>
0.051867
Search campaigns made simple. Creating a search advertising campaign is time consuming. Each hour spent adding keywords, testing ad copy and combing millions of search queries, takes away from planning and strategy — which is where your insights and experience are most useful. Advanced campaign management tools take many of these tasks off your plate by automatically creating campaigns, building new campaign structures and dynamically selecting and adjusting ad copy. You can quickly change and add products, as well as make price changes to the existing structure. Simplified supply management — updating stock status, deleting missing items, pausing ads for out-of-stock products and reactivating ads when products are restocked — keeps your ads up to date.
<urn:uuid:d051798b-0180-46f4-9bda-b4ca6bc7edb3>
0.176874
Then, I pulled down the database tab, and miraculously – the databases in my mac server appeared! You can also re-run the query by right-clicking on your results and selecting Refresh Data: There are two ways to install an extension: If there is no error in our query, we should see the records that will be imported into the spreadsheet:. My problem was I couldn’t connect my PC to my new online server using ODBC server was a mac mini running mavericks, trying to connect from a windows machine in my office via mysql odic connector. We’ll assume you’re ok with this, but you can opt-out if you wish. After we have drawn the links between the tables, the next step is to specify the fields from each table that we want to appear in our results. |Date Added:||1 August 2016| |File Size:||62.51 Mb| |Operating Systems:||Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X| |Price:||Free* [*Free Regsitration Required]| Now go to Terminal and use the following command to navigate ovbc the folder we copied. For our report, we will select the following tables one at a time and press the “Add Table” for each one: This kind of is just a tremendously nicely structured post, just the tips I was hunting to find. Open up the script you downloaded and enter each line individually into Terminal rather than running the script. Mark the entry and configure it. There are two ways to install an extension: We add a field to our results by odb the field name within the table:. After you enter your database’s user ID and password if neededyou will see the main window for Microsoft Query. Anyone able to get odbc working with mamp on mavericks? : PHP Download the script from GitHubthen unzip it and move it into your home folder. the bind address was just commented out. 9-5-14 Restart the MAMP servers and away you go! And now we tell pear and pecl where our php. Connecting to your sales database Let’s suppose you want to see how many products you orbc selling, according to category and country. Sign up using Facebook. Also just download and click through the installer. I kept scrolling through the file. Copy the folder we unzipped into here and rename it php. Connecting to MySQL for MAMP Installations I took that and turned it into a shell script that you can run with terminal. Just commented out the next line. I also made the next change, and then saved the. Open it in Finder and then create a new folder inside called include. I love to travel around the world, good food and building fancy stuff with web- technologies. I had to do this on one of my machines to get things working. Then, I pulled down the database tab, and miraculously – the databases in my mac osbc appeared! Sign up using Email and Password. My name is Sebastian. We need to link the tables together by drawing a line between the related tables this is known as a “join”. Please contact us if you have any problems using the tables in your database.
<urn:uuid:c25ef3e7-12b5-457b-8e95-8f8dde061be4>
0.051537
More and more people are using search engines that provide the maximum amount of privacy. Two of those search engines are StartPage and DuckDuckGo. Their popularity has shot up exponentially in the last couple of years. Although it is true that search engines for privacy regularly leverage other “normal” search engines for the purposes of returning search results. So does proxy search work? Proxy search requests prevent the likes of Microsoft, Yahoo and/or Google from knowing who actually requested the search. To put it in another way, the mainstream search engines can only see the search query. They can’t see who sent the search query using the search engines for privacy. Search engines for privacy promise their users lots of things. Most of them boil down to a single promise. That promise is that they won’t log the user’s IP address. Search engines for privacy also give their word that they won’t log the user’s searches at any given point. Some may find that a bit too good to sound true. So is it? Let’s take a look at some of the other questions that one needs to answer in order to truly understand how search engines for privacy really work. After that, we will list the best search engines for privacy that you can use right now. Why Would Anyone Want To Use Privacy Search Engines? There are so many reasons for doing so that listing them here will take an hour for readers to go through. So let’s just state the biggest problem that most mainstream search engines have: They spy on their users. They don’t spy because they are evil though. All major search engines have to spy because that is the business model that they work with. If they can’t learn the maximum amount of what is to learn about any given user, they can’t sustain their business. Major search engines survive by delivering highly personalized and targeted advertisements to the users directly via the user’s web browser window. The reason why we say that search engines aren’t evil though is that some of them have realized that they can’t just go around playing with their user’s private data without any restrictions. Take, for example, Google. Google gives users plenty of options via the Dashboard menu to tweak their privacy settings. That’s their “good” side. But Google has to survive as well and that’s why it can’t stop tracking users. It is either “tracking user” or death as far as Google is concerned. Back in 2016, the company finally managed to drop its self-imposed moratorium on tracking users no only via their search queries but also their email messages. In other words, now Google not only tracks what you search on the internet but it also scans your email messages in order to deliver to you even more targeted advertisements. Some would say this is too much spying. Google would say that they are just “improving” their services. Now, Google collects and stores a lot of information every single time a user goes to its search engine services and searches for something. Some of the information that Google stores include, - The user’s IP address - The search terms in the query - Time and date of the search query - Cookie ID. What is that? This is just a cookie that Google deposited directly into the user’s web browser cookie folder. It helps the company to uniquely identify the user’s computer machine. Google, and all other search engines, takes the help of the Cookie ID in order to trace any given search query back right to the source. That is, the computer of the user who made the query. After collecting such information, Google allows the transmission of all that information to the web page that the user has requested. It also delivers that information to other owners. Specifically, the ones who own third-party advertising companies who display banners on the web page that the user visits. As the user gets busy while surfing the world of the internet, advertising companies collect as much information as they can in order to build up a very detailed profile of the user. And since they have so much information on any given user, sometimes the profile as enough details to embarrass someone to a great extent. Consider another possibility. Yahoo! along with Microsoft and Google do know a ton of things on any given user. So what is stopping them from sharing that information with the likes of the NSA and the police department? No one can guarantee if Google doesn’t do that already and that too on a regular basis. Google also releases these Transparency Reports from time to time detailing the number of various user data requests that it has received. A couple of years ago, many media outlets reported that they had found evidence which showed Yahoo working hand in glove with organizations such as the NSA in order to betray the company’s users data to the top US intelligence service. That’s isn’t very nice or is it? However, that’s only one of the problems with mainstream search engines. Let’s take a look at another one. The Infamous Filter Bubble Search engines that don’t track users are a blessing. The greatest benefit that these no-tracking search engines offer to users is that it prevents the user from having to experience the filter bubble effect. Mainstream search engines profile users by studying the user’s past search terms. They also keep a track of the things that the user has LIKED on various social media platforms. Why do they do this? Again, in order to return search results which are more likely to peak the user’s interest. The problem with such an arrangement is that these search results tend to always agree with the user’s specific point of view. In other words, such techniques lock the user into, what most call, a filter bubble. When under the influence of a filter bubble the user doesn’t get to come across alternative and/or different point of views. The user, for the most part, only sees opinions that tend to agree with him/her. Search engines like Google downgrade results which they think would not match the user’s worldview. The other downside of filter bubble is that it denies the user of any kind of access to much richer content and multiplicity of natural human input. Filter bubble can also present other dangerous problems. Problems such as its inclination to confirm prejudices. Some have also blamed filter bubbles for keeping users away from thinking about the “bigger picture”. With that said, let’s take a look at the top search engines for privacy at the moment. - Looks stunning - Does not track - Does not log user information - Contextual filters - Non-targeted and discrete advertisements - A lot of times it uses Yahoo results - Operates on Amazon servers - Is registered as a US company DuckDuckGo is a search engine that sounds just about interesting enough to stick in your head. According to the company, this is the only search engine that vows to not track the user. The founder and the CEO of DuckDuckGo, Gabriel Weinberg, stated about two years ago that even if law enforcement agencies such as the FBI came to DuckDuckGo to ask for data, they would have nothing in their storage facilities which would allow their agents to tie something back to the user. As mentioned at the top as well, the one apparent problem with DuckDuckGo is that it is a company that is based in the United States of America. Among the search engines for privacy, DuckDuckGo is miles ahead in terms of its popularity. There isn’t another search engine for privacy out there with as high a profile as DuckDuckGo. DuckDuckGo, for the most part, sources its searches through Yahoo. Perhaps this is also a good time to mention that DuckDuckGo had had a really strong relationship with the likes of Yahoo in the past as well. Why would this cause worry to anyone? For one reason, various media reports have revealed Yahoo’s ties with the likes of the NSA. Of course, DuckDuckGo has always maintained that the company promises to not share or collect any type of personal information. If we’re talking about clean user interfaces then DuckDuckGo is it. The overall theme is white, grey and red. DuckDuckGo has a cute looking logo which is attractive and kind of fun to just look at. With that said, aesthetics of any given website is more or less a subjective matter and hence no one opinion can rule over all others. But generally speaking, DuckDuckGo’s styling is good. As the user types in any query, DuckDuckGo, just like Google, starts to offer the user search suggestions. This is great as it usually leads the user to the term the user wanted to search much more quickly. DuckDuckGo is very fast when it comes to search returns. And this holds true for video as well as image search results. As far as the presentation of the whole service is concerned, it is top notch and more importantly, clear. DuckDuckGo offers the following content filter categories, Almost all the filters that DuckDuckGo displays are adaptive. Most of the time DuckDuckGo will take the pain of showing the user his/her results under a specific filter category that DuckDuckGo feels appropriately covers the user’s search terms. Users have the choice of selecting different filters. DuckDuckGo will have a look at the selected filter and will then continue to display Wikipedia, video and/or image previews in a small box that is located right next to the search results or at the top of the webpage. DuckDuckGo isn’t without ads though. It sometimes does show ads. But they appear, mostly, to the right of the user’s search results. Moreover, DuckDuckGo differentiates itself from the likes of Google by clearly marking advertisement as discreetly as possible. DuckDuckGo also makes sure to never mix the ad search results with organic or pure search results. This search engine for privacy can also filter image results. But those filters are fairly limited in nature. For example, the only filters available for the image search are, For a general search term, there are many more filters. DuckDuckGo displays video search results with the help of video thumbnail preview. Users have the option of playing YouTube videos directly from the DuckDuckGo search engine website. When users do try to play the video, DuckDuckGo does give them a warning. The warning alerts the user to a simple fact that if they view the video, Google along with YouTube will track them. Users also have the option of filtering results by country as well as date. The date filter comes with further options such as, - Past Month - Past Week - Past Day Our experience tells us that while DuckDuckGo can’t match the accuracy of the search results that Google shows the user, but it does return good quality results. In fact, in many cases, we have found that DuckDuckGo results are much more natural because SEO experts don’t put much work into optimizing their content for DuckDuckGo. As mentioned just now, there are many people who think that Google returns better results than DuckDuckGo. This is where we would like to mention another DuckDuckGo feature which is “bangs”. We’ll talk more about that later. For now, we would like to reiterate that DuckDuckGo can sometimes show both discrete ads as well as contextual filter suggestions where the search engine provides links to different products on Amazon that the user might have an interest in. How Does DuckDuckGo Make Money? Very important question. As we have alluded to previously, DuckDuckGo does show some ads. These usually take up a bit of space on the right-hand side of the pure search results. DuckDuckGo sources its ads from Yahoo. Yahoo itself has formed a search alliance with Microsoft. Whenever an advertising company signs up for an account with Bing Ads, the default settings ensure that the company’s ads enter the rotation schedule of all of Microsoft Bing’s distribution channels automatically. One of those distribution channels is DuckDuckGo. That’s not the important part though. The important part here is that DuckDuckGo shows users untargeted ads. In other words, DuckDuckGo bases these advertisements on the user’s search terms. We have already noted the fact that DuckDuckGo clearly marks these results as ads. Moreover, it displays them in a separate space, away from the natural search results. DuckDuckGo also happens to be a part of eBay and Amazon affiliate programs. In simpler terms, if the user visits eBay and/or Amazon via DuckDuckGo and then subsequently purchases a product, then DuckDuckGo would receive a commission, albeit a small one. DuckDuckGo makes sure that it does not give out information that is personally identifiable. Does this affiliate program affect search rankings? DuckDuckGo says it does not influence them at all. DuckDuckGo has stated many times that it does not share or collect any personal information. It does add an affiliate code to various eCommerce sites such as eBay and Amazon. But this affiliate code doesn’t really include any information that can personally identify an individual. We have already mentioned the fact that DuckDuckGo is based in the United States of America. And hence it does come under US law. The government can pressurize DuckDuckGo to do things it may not want to do otherwise. What do these laws mean for DuckDuckGo operations? These laws mean that the United States government has the legal authority to mandate that search engines such as DuckDuckGo must start to log their users’ online activities. Moreover, the US government can also prevent search engines for privacy such as DuckDuckGo from even alerting their users about such an arrangement via various Gag orders. The other thing users need to know about DuckDuckGo is that it makes use of Amazon servers to do its business. Amazon, as we all know, is also a United States company and comes under the authority of the US government. As far as the security report from Qualys SSL labs is concerned, DuckDuckGo manages to score an A+. We’ll talk more about recent updates to DuckDuckGo as a search engine service at the end of this guide. We have already mentioned a couple of features. But DuckDuckGo is more than just smart contextual filters and discrete non-targeted ads. Perhaps the best feature that DuckDuckGo offers to its users is Bangs. Bangs are just “!” characters which users may put at the end of their search query followed by a website address in order to search the other website easily and quickly. Let’s take a look at an example. If the user types a search string and then after that types !guk then DuckDuckgo will return search results from Google UK. In another instance, if the user types !a after one of his/her search terms then DuckDuckGo will search the entire Amazon store for the user. Readers need to note here that bangs only take the user to the website that the bang in question is related to. What about the search terms themselves? Well, they are proxied. However, if the user has already signed into Amazon or Google, to take an example, then it is safe to assume that Google/Amazon would know who the user is. After knowing that, they would continue to do what they do best. Track and record. Final Thoughts On DuckDuckGo As A Search Engine For Privacy Our number one recommendation is DuckDuckGo as far as search engines for privacy go. It has the best looks. And is the most user-friendly of all search engines for privacy. Both these qualities make sure that users have a good time using DuckDuckGo for all their online needs. There will always be people who will continue to prefer Google over a Yahoo-DuckDuckGo partnership. And that’s okay. Readers need to remember that DuckDuckGo still uses Yahoo’s search results, so Google indeed has the lead over DuckDuckGo when it comes to the depth of its search engine and search engine results. DuckDuckGo really kills the competition with its Bangs feature. We know of some users who only use DuckDuckGo because of its Bangs feature even if they primarily use Google as their preferred search engine. Just keep in mind that while you are using the Bangs feature, always sign out from your official Google account. Only after that should you go ahead and use the Bangs feature to search via Google. By now, no one should find it shocking why DuckDuckGo is the number one search engine for privacy. Its popularity alone shows that this is a serious search engine with a serious focus on user privacy. The fact that DuckDuckGo is based in the United States of America is the only negative of using DuckDuckGo as of now. So readers should exercise some caution when searching for sensitive topics via DuckDuckGo. - Uses Google results - Is a Netherlands based company - No targeted advertisements - Has features such as proxy web pages - No tracking - No logging - Has some servers that it operates from the United States. Users have the choice of making use of non-US servers. Lxquick and Startpage both belong to the same company in the sense that a single company runs both of these services. A while back, lxquick used to return search results from multiple other search engines apart from Google. On the other hand, Startpage only returned Google search results. Two years ago that changed. The company behind lxquick and StartPage combined the two services to form a single search engine. Now, both services return search results identical to Google. There was a time when the company behind lxquick continued to offer the lxquick service even though it did not actively support it. But after a while, it suspended its lxquick metasearch engine in its entirety In other words, the company behind Startpage no longer supports the older version of the online search service. About two years ago, StartPage also removed all Yahoo results from its older (or legacy) online search engine. This also happened about two years ago when news broke that Yahoo had actually assisted NSA to spy on all its users. Fast forward to 2018 and now we have Startpage.com and lxquick.eu pointing towards the same page. This search engine for privacy sports a cloudy blue sky. That is the default theme. And we are aware of the fact that many users may not like this theme. Luckily, Startpage.com offers users the ability to change the theme colors from the settings menu. From an overall perspective, there isn’t a whole lot wrong with the homepage of Startpage. But for some reason, there are users who prefer the red-themed DuckDuckGo rather than the blue-themed StartPage. What About Search Results? StartPage offers much simpler search results than DuckDuckGo. It doesn’t offer any suggestions as the user is typing. On the flip side, this allows StartPage to return research results much faster than some of the other search engines around. Of course, DuckDuckGo is still faster than StartPage in terms of page load speed. Users have to remember that sometimes the answer to the question “which is the fastest” is very much a subjective debate. Startpage.com does a good job of presenting its results in a clear manner. Users have the facility of filtering their search results via categories such as, The only downside here is that these are the only three categories available. There is also an advanced online search option for users. This option enables users to specify multiple search parameters. The advanced search option also enables users to filter search results by time. StartPage.com displays advertisements right above its search results. Unlike Google, StartPage.com does mark its advertisements as advertisements pretty clearly. And just like DuckDuckGo, it doesn’t just mix its advertisements search results with the natural search results. As far as the Images category goes, StartPage.com doesn’t offer any additional filters. Its video results page only shows the preview of the video in the form of an image. StartPage allows users to play content from streaming sites such as YouTube. However, users should remain vigilant about the fact that once they connect to YouTube to watch a video their connection is no longer private. StartPage.com is a bit different from DuckDuckGo as it pulls its search results directly from the world’s most popular search engine Google. Hence, its search results are almost as good as Google’s. However, this also means another thing. Any information which Google has decided to censor also gets censored in StartPage.com’s search results. The other thing we would like to mention about StartPage.com is that its advertisement space is much more prominent than DuckDuckGo’s advertising space. Just like DuckDuckGo, StartPage.com also has the capability to proxy web pages. And that is great. How Does StartPage.com Make Its Money? Just like DuckDuckGo and probably every other search engine on the planet including Google.com, StartPage.com generates the majority of its revenue from affiliate links and advertisements. But unlike Google, it doesn’t deliver targeted advertisements. It marks them clearly. And does not mix advertisement results with the organic search results. As mentioned at the top as well, StartPage.com marks its advertisements results much more prominently than DuckDuckGo. - StartPage is a company that is based in the Netherlands. And the Netherlands, when compared to the United States of America, has stronger privacy laws. - Startpage.com has servers which are collocated in the United States of America. StartPage.com owns them. And hence it is responsible for controlling them as well. StartPage.com representatives will tell you that the company’s servers are very much secured against US government’s snooping attempts. - However, for some, that may not be enough. For such users, StartPage.com provides users with the option of using exclusively non-US servers. There is also an option of using only non-EU servers. - Users search queries can proxy returned web pages. We’ll talk more about this feature a bit later in this guide. - Of all the other search engines for privacy, StartPage is perhaps the only one that independent researchers have audited. - As far as the security report from Qualys SSL labs is concerned, StartPage.com has a rating of A+. DuckDuckGo had its BANGS. What does StartPage.com offer? Well, its best feature is the ability to proxy any given connection. Users don’t have to visit any site directly. For those who enable this option, Startpage.com would run one of its proxy servers and that proxy server would sit nicely between the website that the user wants to access and the user’s computer machine. What does this do? It blocks the accessed website from having any knowledge about the user’s real IP address. This pretty much works like a VPN service. But of course, a VPN service is the complete privacy solution, unlike a search engine that offers just a proxy feature. With that said, it is true that once a user has managed to block a website from knowing his/her IP address, then the website can’t do anything to track the user across the web or use other kinds of fingerprinting technology for the purposes of tracking the user after identifying him/her. There is a big downside as well. Since the user is connected to the website via a proxy service, the connection is fairly slow. By that we mean, that pages connected to via the proxy feature would take significantly more time to load. Why is that? Well, because the user has enabled the proxy feature, StartPage first has to retrieve the webpage’s content and then redisplay the webpage’s content for the user. Even with that fault, we are inclined to think that this is a fantastic feature. Because it helps the user to improve his/her online privacy. The downside is something that most users would be willing to put up with if they know it is enhancing their privacy. Moreover, users can just switch off the feature when they aren’t doing something sensitive or personal in nature. Final Thoughts On StartPage.com DuckDuckGo is more user-friendly and pretty than StartPage. But StartPage is based in the Netherlands. That gives it a huge advantage over DuckDuckGo which is based in the US. Moreover, StartPage doesn’t have any partnership with Yahoo. And since it is free from Yahoo and the US, it would have more resilience against NSA spying. Of course, users will have to make sure that they specify that in the settings menu by only connecting to non-US servers. DuckDuckGo, Startpage.com’s US rival, doesn’t offer that option. Moreover, StartPage.com’s feature of connecting to web pages behind a proxy also gives it the leverage over other search engines for privacy. - No advertisements - Self-hosting feature is available - Has the ability to access web pages through a proxy - Users can select which search engines they want SearX to leverage - It could log public instances SearX has managed to gain a lot of traction within the online security community. It is still less well-known than DuckDuckGo and StartPage.com. But it is a legitimate option for people looking for more online privacy while searching. SearX is completely open source. Not only that, it is also pretty easy to set up. Users willing to input a bit of time and effort can run their own instance of SearX for more privacy. Along with that, there is also an official instance of SearX. But that isn’t great for privacy. Users also have the option of using one of the multiple public SearX instances that volunteers run all over the world. However, SearX is not about that. SearX is about the user running his/her own search engine instance. This feature actually makes SearX the only known online metasearch engine that offers 100 percent zero-logs. No one is keeping logs on the user if the user knows how to run an instance of SearX. Again, it can’t compete with DuckDuckGo as far as aesthetics are concerned. But SearX doesn’t have to. Because it is not aiming to look beautiful. SearX has one purpose. And that is to provide maximum functionality. So it isn’t pretty. But it is very useful. With that said, SearX sports a clean layout. Which is good because users can see the content displayed clearly. As mentioned above as well, users have the option of hosting custom SearX instances. But don’t expect them to look very different. Most of them feel and look pretty much similar to the SearX official template. What About Search Results? The default SearX settings ensure that it leverages search results from a multiple number of online search engines. If users click on the preferences button then can actually tweak the settings to adjust the search engines that SearX utilizes to display search results. SearX does not show any suggestions as the user is typing up his/her search query. However, it does display suggestions once the search returns are displayed. They are located on the right-hand side of the screen. Users can filter searches with the help of several categories. - Social Media - Map. SearX makes use of OpenStreetMap for this filter option. Users can also filter results by time. Unlike Google, DuckDuckGo and Startpage.com, SearX does not show users any kind of ads. It tries to populate the search results page by showing Wikipedia entries in the right-hand corner of the search results page. As far as the Images category goes, SearX doesn’t have a sub-filter for this category. It does show a preview of the image when the user clicks on it. SearX displays the Video search results in the form of thumbnail previews. If the user clicks on a given video, SearX takes the user to the website that is hosting the video. In other words, if it is a YouTube video that the user wants to watch then SearX would take the user to YouTube in order to start playing the video. A similar thing would happen if the user tried to view a Vimeo video. Users also get the option of downloading their search results in the form of an RSS file, .json, and .csv. SearX has a similar feature to Startpage where it allows users to view web pages with the help of a proxy service. Users have to keep in mind that such a feature would likely break several websites. But viewing a website while proxied can provide an extremely high level of online privacy. But what about the actual quality of the search engine results? Well, that would depend on the search engine options that the user would select from the Preferences menu. The official and default settings make use of Wikipedia, Bing, and Google in addition to a host of lesser-known online but first-rate search engines. Hence, the default settings provide users with an excellent quality of search results. How Does SearX Generate Revenue? Again, SearX is completely open source. A decent number of volunteers run the project. If we’re talking about the official SearX instance then there are no advertisements. And there are no affiliate marketing links either. Moreover, since SearX is one hundred percent open source, individual volunteers or operators have the freedom to bring in their own proprietary revenue generation models to public SearX instances. With that said, our research shows that there are not many SearX instances which are complete affiliate free or ad-free. What About Privacy? As mentioned before, a user could come across any number of public SearX instances. Hence, there is no sure fire way to know if any of those are involved in logging user information and search queries. We would also like to tell our readers that the official instance of SearX may also log user information. What we mean to say is that, there is no way to ensure that your privacy in 100 percent guaranteed. However, readers should also know that there is no method of ensuring that the likes of StartPage, DuckDuckGo or any other online search engine for privacy isn’t logging the user’s search queries either. Users who are really serious about their privacy should set aside a bit of time and then set up their own version of a SearX instance. As a matter of fact, it is far better for the user to run SearX instance on one of his/her own servers. Because that is the only way to ensure privacy and the fact that no one is logging the user’s searches and other information. A SearX instance on a server that the user directly controls provides perfect privacy and anonymity. The fact that users can set up their own instances of SearX makes SearX (a self-hosted one that is) the most private and secure online search engine in the world by a country mile. Users who want to view documentation related to installing one’s own instance of SearX should click here. Now we’ll come to the part that is more related to the casual online user. If the user is not interested in learning all the things that are required to set up a SearX instance, then public SearX instances aren’t exactly bad options either. They are not likely to log user searches. Moreover, these public instances of SearX are likely to stay under the radar of intelligence agencies such as the NSA and the rest. No one would be monitoring these public SearX instances. Other services that we have mentioned so far cannot say the same about their offerings. Again, we would like the reader to remember that there is no guarantee if someone or some organization is behind a given public SearX instance, although the chances of that are minimal. The security report from Qualys SSL labs gives searx.me (which is the official SearX instance) an A. Users should know that each given instance of SearX, either private or public, would have a different rating in this regard. As mentioned before, there are zero ads on the official SearX instance and users can see possible search suggestions on the right-hand side of the listings. Just like with StartPage.com, users can proxy various web pages as well. As mentioned just now, StartPage.com and SearX have one killer feature and that is: However, users who want to take advantage of this feature will have to live with the fact that it might break some websites that they visit on a regular basis. Final Thoughts On SearX A self-hosted open source instance of SearX is the absolute best method to ensure privacy. And this holds true even for the most tech-savvy and privacy-conscious of people on the internet. To put it in another way, nothing beats having certain knowledge that no one is logging the user’s searches. This also puts SearX in a league of its own. Casual internet consumers may find it surprising the ease with which they can use this software even on public instances. Our research suggests that public instances are less likely to log the user’s searches. They are also likely to become targets of US government spying, especially when compared to services such as Disconnect, StartPage, and DuckDuckGo. Of course, we have no way to prove that assertion. - Great selection of online search engines - No advertisements - No tracking - And no logging - It is based in the US so users have to think about organizations such as the NSA. - Makes use of Amazon servers, so users (again) have to think about the NSA and the CIA among other organizations. Disconnect is a very hard service to review and recommend. Not because it is worthless. But because it is based in the US. Even with that, Disconnect has managed to make quite a name for its services. By offering excellent privacy-first and open source web browser extensions. The most famous of these extensions is Disconnect Search. It is an open source add-on for Chrome and Firefox. There is also an Android application available for users to use on their smartphone devices but the app itself is not open source. Most of the users who have installed Disconnect have done so with the help of the company’s web browser add-on. As mentioned just now, the name of the browser is Disconnect Search. It enables users to use the Disconnect Search webpage in order to search the web. Disconnect is much more than a privacy add-on. It also markets several other products. Products such as a premium VPN product and a decent online security application. All of these applications come built-in with Disconnect Search’s functionality. What About Search Results? For the majority of the cases, users have to use the browser extension and/or addon in order to do actual searching. Users also have the option of selecting from three search engines. The three search engines that Disconnect offers are, DuckDuckGo is the default search engine though. We have discussed multiple metasearch engines which are focused on privacy in this guide. But Disconnect is unlike any of them. How is it different? It is different because it doesn’t really display any search returns using its official website. What it does is that it routes the results of the search via its own servers. This enables Disconnect to hide the origin of those results and the queries related to them. Then, Disconnect opens these search results in the given search engine’s own webpage. Disconnect also has a feature which allows it to display results in Incognito mode. How Does Disconnect Generate Revenue? While the Disconnect Search web browser extension is free for use, the company also has some Premium products. As mentioned above, Disconnect does a decent job of hiding the user’s IP address when the user is making all the searches. After that, it sends the user directly to the user’s pre-selected default search engine. What does that mean for the end user? It means that Disconnect doesn’t have to rely on any affiliate marketing links no advertising to do its work and provide a search service to users. What About Privacy? Some users a more NSA-phobic than others. Disconnect isn’t a good choice for them. Because Disconnect, as a company, operates out of the US. Of course, Disconnect add-on and/or browser extension is completely open source. But there is no way to know if Disconnect logs user’s search requests. It certainly can. Especially since all of the search queries have to pass through the company’s own servers. Moreover, Disconnect uses Amazon servers to host its online services. The security report from Qualys SSL Labs gives Disconnect an A. Remember that this rating is for Disconnect.me. Final Thoughts On Disconnect If the user wants to have an easy and quick way of hiding his/her true identity then Disconnect Search add-on and/or browser extension provides that. All the while, users can search via their favorite online search engine without having to worry about privacy. The only major issue with Disconnect is that it is based in the US. Peekier is probably an option you have never heard of. Why is that? Because it is new. Probably the newest in the field of no-log search engines. That is also the reason why the internet doesn’t have much information about Peekier as a service. As time passes, more and more people will give their reviews on how good or bad Peekier really is. Then it would become much easier for us to give a general assessment of this search engine. However, we would like to mention here that because of the innovative and attractive way it shows all the search results to users, it had to have a place on our list of best search engines for privacy. If users utilize this service to search then it will display the results in the form of large thumbnails that preview the web pages that search query returned. The search engine field is pretty bland in the sense that almost all online search engines have a similar feel and look. Peekier takes a different approach. And that makes it worthwhile to try out at least. But before we can give a well-researched ruling on Peekier, perhaps it is best for users to keep an eye on Peekier but not use the service for sensitive tasks. After this service develops more, we’ll have a clearer idea of whether it can match the quality of services that, for example, DuckDuckGo offers. We have mentioned four top class privacy-focused search engines. The fifth one may not be the best but it is there because at least it has made the effort of offering a search engine for privacy. Regardless of that fact, all options will enhance the user’s online search privacy. The more crucial point is that these search engines for privacy will likely never record the user’s search queries. They don’t involve themselves in building a profile on the user. And they don’t try to sell people stuff too much of the time. All of the options that we have listed here in this list of best search engines for privacy are pretty easy to use. They also happen to return decent results. The most user-friendly of all the options that we have listed here is without a doubt DuckDuckGo. DuckDuckGo is the perfect search engine for people who want to transition away from mainstream search engines such as Google but want to do so slowly. But what about the likes of the NSA and other forms of government surveillance? More specifically, will these services protect their users from spying activities? Well, the answer isn’t a simple one. The search engines which are run by companies that are based in the United States may have a hard time providing such services. So it is safe to assume that they would not do anything against surveillance programs. Of course, users who only want to protect their privacy and don’t want to engage in something that is illegal, don’t have to worry about such issues. Our second recommendation was StartPage.com. This is a search engine that isn’t based in the US. Moreover, independent researchers have audited this search engine. It enables users to have access to websites without compromising privacy. And all of that is because of its official proxy feature. Privacy heads will have better peace of mind with Startpage.com than DuckDuckGo. Then there is SearX. Or to be more precise SearX public instances. No one is going to bother monitoring them because they are not as high profile as some of the other options that we have mentioned in our list of best search engines for privacy. But of course, no one can guarantee that the user’s data won’t get logged while using SearX instances. The only problem is that users will not get to know the operators of any given public SearX instance. For such users, perhaps running a self-hosted SearX instance may present the best option. Under such an arrangement, the user himself/herself is directly controlling the hardware. And that allows the user to have a setup that is extremely private and secure. For maximum privacy, the only recommendation that we would like to put forward is a self-hosted SearX instance. But remember, this is only for the privacy fanatics. Then there is the fact that SearX is able to return those on-the-button results coming from all the good mainstream search engines. It also has a great interface. Both these features put the icing on the cake as far as SearX is concerned. Recently the CEO of DuckDuckGo, Gabriel Weinberg came out and said that he believed that DuckDuckGo represented the most private and secure search engine after a search engine that the user self-hosts. Weinberg also mentioned that users who have concerns about DuckDuckGo being a company based in the United States and having strong relations with the likes of Yahoo were, for the most part, exaggerating things. According to the CEO, DuckDuckGo did not keep any logs. And that meant no one could use a subpoena to force DuckDuckGo to release user information. Because DuckDuckGo doesn’t have any. Hence, it makes no difference with which companies DuckDuckGo strikes a partnership. There is no information about any DuckDuckGo user or his/her search queries. The CEO also mentioned that US citizens now enjoyed many legal protections against all types of government spying activities. And some of these were not available to companies based in other countries. Moreover, he also mentioned that DuckDuckGo operated via servers that were located outside the US. So users who reside outside the US and use DuckDuckGo will never have to worry about being connected to a server that is based in the US. Do we believe the CEO? Well, we would say that any company that is based in the United States is a company that one has to keep an eye on as far as privacy is concerned. We won’t discuss much about this issue in his guide but in the future, we will definitely discuss how a company that operates out of the United States affects user privacy. So stay tuned.
<urn:uuid:fe34c09d-ce3b-4177-87e3-c2f084e7f3f1>
0.541104
|Monday||M||23 May||7:00am - 9:30pm| |Tuesday||T||24 May||7:00am - 9:30pm| |Wednesday||W||25 May||7:00am - 9:30pm| |Thursday||T||26 May||7:00am - 9:30pm| |Friday||F||27 May||7:00am - 9:30pm| |Today||S||28 May||8:00am - 9:30pm| |Tomorrow||S||29 May||11:00am - 5:00pm| Today, the Subway brand is the world's largest submarine sandwich chain with more than 44,000 locations around the world. They've become the leading choice for people seeking quick, nutritious meals that the whole family can enjoy. As they continue to grow Subway are guided by co-founder Fred DeLuca's passion for delighting customers by serving delicious, made-to-order sandwiches.
<urn:uuid:0ba18661-0905-421a-a606-19ae5ceea8c8>
0.044872
After several years on Megadrive side, I recently get hooked by the lil' Wonderswan. I was looking for a way to homebrew develop on it and unfortunalty, no dedicated emulator include debug feature. So I moved to MAME, since it include a full debugger and GFX Viewer. Unfortunately, the GFX Viewer part isn't present, like most of the CONS system it seems. And so began my journey on MAME driver update. I must say, sorry, that it was VERY difficult to start and while I was about to stop, I finally was able to add GFX Viewer support. and so I'm currently improve it step by step....What is done GFX Viewer for WS Classic use of LOGMasked (available on my MAME fork, wswan branch at https://github.com/KanedaFr/mame/tree/wswan )What is in progress Serial link support My main reason to post of this forum is to be sure I do it the right way and, if interested, understand how to post my update to main branch, to allow any other people to use it. I hope it's alright with the guidelines and that I will be able to at last give somethink back to MAME, after so many years using it for playing, hacking, etc....
<urn:uuid:91459207-aa17-43ee-b094-f2d4aed0714c>
0.110562
It’s no small thing to say that the reaction to Windows Live Messenger 2009 and related clients that use the older Messenger protocol has been pretty intense. Regardless if you’re using Windows XP, you have a favourite feature that’s missing in the 2012 version, or you simply do not want to use Skype, it seems everyone is looking for another option to choose from. Butterfly Messenger is an improved working version of the client used to demonstrate MSNPSharp. It supports the same protocol version as Windows Live Messenger 2012 (MSNP21), and has the a basic Messenger feature set. The current release is an alpha version of Butterfly Messenger intended to be used to collect feedback on bugs, features and other changes. However, it is relatively stable and usable. Butterfly Messenger currently requires Windows XP or above with at least the .NET Framework 2.0 or above installed. Although MSNPSharp was deliberately written to support Mono (on other platforms), the client presently does not run on Mono (but probably works on WINE), hopefully this will be addressed later for Linux and/or OS X compatibility. Download and installation You can now download the third alpha release of Butterfly Messenger. Due to the early nature of the project, it does not presently have an installer and you will need to extract the files to a folder of your choice and run it from there. Butterfly Messenger makes use of the Segoe UI font (like Messenger). If you do not have the Segoe UI font installed right now, you can install it from the Messenger 2009 files. Feedback and bugs Please feel free to leave quick comments here on this post, but if you wish to go in depth, you can make use of the Butterfly Messenger category on the forum. - Depending on the situation, brand new conversation windows may blink even if they’re in focus. If you start typing a reply, they should stop blinking. - Flickering in the contact list. - Custom emoticons will appear, but the current conversation window does not support animated GIFs. Animated GIF display pictures work though. - You cannot rename contacts. Butterfly Messenger is open source software and based on the MSNPSharp project code. A repository will be set up shortly once more details about the project have been finalized. |Oct 10 2015||0.1.2.0|| |Sep 23 2015||0.1.1.0|| |Mar 25 2015||0.1.0.0||
<urn:uuid:3ad3637f-0c14-4885-a6f9-fceed0e38f0e>
0.150659
Last Updated on September 13, 2017 by Dishan M. Francis In AD environment, we can use password policy to define passwords security requirements. These settings are located under Computer Configuration | Policies | Windows Settings | Security Settings | Account Policies Before Windows server 2008, only one password policy can apply to the users. But in an environment, based on user roles it may require additional protection. As an example, for sales users 8-character complex password can be too much but it is not too much for domain admin account. With windows server 2008 Microsoft introduced Fine-Grained Password Policies. This allow to apply different password policies users and groups. In order to use this feature, 1) Your domain functional level should be windows server 2008 at least. 2) Need Domain/Enterprise Admin account to create policies. Similar to group policies, sometime objects may end up with multiple password policies applied to it. but in any given time, an object can only have one password policy. Each Fine-Grained Password Policy have a precedence value. This integer value can define during the policy setup. Lower precedence value means the higher priority. If multiple policies been applied to an object, the policy with lower precedence value wins. Also, policy linked to user object directly, always wins. We can create the policies using Active Directory Administrative Centre or PowerShell. In this demo, I am going to use PowerShell method. New-ADFineGrainedPasswordPolicy -Name "Tech Admin Password Policy" -Precedence 1 ` -MinPasswordLength 12 -MaxPasswordAge "30" -MinPasswordAge "7" ` -PasswordHistoryCount 50 -ComplexityEnabled:$true ` -LockoutDuration "8:00" ` -LockoutObservationWindow "8:00" -LockoutThreshold 3 ` In above sample I am creating a new fine-grained password policy called “Tech Admin Password Policy”. New-ADFineGrainedPasswordPolicy is the cmdlet to create new policy. Precedence to define precedence. LockoutDuration and LockoutObservationWindow values are define in hours. LockoutThreshold value defines the number of login attempts allowed. More info about the syntax can find using, Also, can view examples using Get-Help New-ADFineGrainedPasswordPolicy -Examples Once policy is setup we can verify its settings using, Get-ADFineGrainedPasswordPolicy –Identity “Tech Admin Password Policy” Now we have policy in place. Next step is to attach it to groups or users. In my demo, I am going to apply this to a group called “IT Admins” Add-ADFineGrainedPasswordPolicySubject -Identity "Tech Admin Password Policy" -Subjects "IT Admins" I also going to attach it to s user account R143869 Add-ADFineGrainedPasswordPolicySubject -Identity "Tech Admin Password Policy" -Subjects "R143869" We can verify the policy using following, Get-ADFineGrainedPasswordPolicy -Identity "Tech Admin Password Policy" | Format-Table AppliesTo –AutoSize This confirms the configuration. Hope this was useful and if you have any questions feel free to contact me on [email protected] also follow me on twitter @rebeladm to get updates about new blog posts.
<urn:uuid:72ac77b8-4932-48ab-a8f3-31421856fe20>
0.057177
The appearance of bad clusters generally means the drive is about to fail. When a bad cluster appears, you need to immediately back up the data, then run scandisk...I like to back up the drive before running scandisk because there is a chance that the entire drive will fail during scandisk. Imagine for a moment there was a speck of dust of the drive. A disk intensive action like a scandisk could expand the problem or cause a catastrophic failure. These bad clusters appeared in an area on the disk that had never been used. It is possible that what I am seeing is a software error and not a eminent hardware failure. It is also possible that there was a virus in the email that I was deleting when the bad cluster first showed its ugly head. Since my budget is tight, I am willing to live on the edge for a bit...I will run scandisk once a day for the next several weeks. If another bad cluster appears, then I know the drive will die shortly. However, I have had drives in the past that had bad clusters that went several years without problems. I will never be able to trust the computer with data, but it will work as a web browser. After all...the incredibly important info in my blog is stored at blogger...not at home. Back to the WarI saw a report on the war about the Fedayeen Saddam. This is a paramilitary group that is really designed to dig in during the war, and to terrorize the Iraq people. They will fight by hiding in civilian clothes. The Fedayeen pulls off stunts like fake surrenders (killing a few Americans and making it harder for Iraqis to surrender) or they might simply shoot Iraqi troops that surrender. News reports suggest that there are about 20,000 members of the Fedayeen Saddam. As a paramilitary group, the problems of the Fedayeen goes way beyond the logistics of the war, and haunts the logistics of the peace. A paramilitary groups of 20,000 thugs is likely to simply sink into the populace and become an insideous organized crime. My first reaction to reports on the Fedayeen Saddam is that the only way to win long term peace for Iraq would be to kill as many members of the Fedayeen as possible. The US would have to become like Saddam to win against Saddam. But can the US really win freedom for the Iraqis by killing a large number of Iraqis? Of course, the existence of the Fedayeen is new to me. The US would have had this information prior to engaging in war. Which means that they knew in advance that they would need to take an extremely heavy handed approach to this group before the war began. I will stick with my clusters, and hope that living peacefully might someday help peace prevail.
<urn:uuid:c8a38c85-b3ef-4577-a514-026c3fbf214e>
0.071293
Archive for old orders – Option to archive old orders Customer ID on CSV – The CSV file on download will contain “Customer ID” column Amazon “customize the item” – The new amazon feature can be printed on the Invoice Despatching logo – while the despatching of an item it is in progress, an orange logo will appear. This will be on till we receive confirmation of despatched item from the platform. “Printed” , “Not printed” filter – Under “Awaiting postage” dropdown now you can filter printed orders from not printed and the other way around New columns – “Tracking”, “Weight” Courier integration – we have just finished integration with APC and Yodel. Builder Improvement – now the text in the builder can be edited in size, font, and style (bold, italic and underline). Mostly bugs fixes related to Net despatch and the invoice template builder Template builder – in order for the customer to able to manage his invoice templates, we are introducing the brand new Template builder. It is simple and very effective. Delete confirmation for printing templates, now you have the option to change your mind if you pressed to delete an existing template. Emailing customers feature. A great feature that will help you increase your sales is our new option where you can send a personalized email to your customer. Here you can add future sale projects, advertise your website or any other subjects. The emails can be sent automatically or manually. If you need more information please have a look at the Support Page Multiple Ecommerce platforms order download. As from today we can download orders from multiple ecommerce platforms. Among this platforms will find Magento, Opencart, Os commerce, Woocommerce, 3dcart, Big commerce, Prestashop, Shopify, Ubercart, Virtuemart, Xcart and Zencart. In order to be able to add your website to Just Ship IT you will need to have a license for up to 1000 ord/month and if you desire more that one website then you will need to have a license up to 3000 ord/month. Edit invoice address. As sometimes the buyer can change the shipping address after he made a purchase so we have added the option to be able to change the shipping address on the individual orders page. Platform Name to the Amazon. As some of our customers have multiple amazon account we have decided to add the option to be able to name the Amazon platforms so that the customer can differentiate the platforms. Amazons one day premium shipping. Amazon introduced the one day premium shipping which is an extra option that the buyer can choose and we have added to our application in the delivery option setings so that our client can have full access to all the features of the Amazon platform. As the eBay and Amazon platforms are not the only selling platforms through our customers, we have decided adding few of the biggest and most important eCommerce platforms. Label to go landscape or portrait. As we can print labels on A4 sheet and on Zebra printer we needed an option to rotate the label on the page so it will not be required changes in the printer settings. Weights on the orders for Hermes. We have added an extra download that will pull the weights of the products from the orders so when this orders are exported as a CSV file for Hermes will contain all the values for the weights. Airmail for PPI stamp. We have added a Air mail stamp to Royal Mail PPI option so all the labels can be printed for international orders. This option will allow the user to group orders and manage them as one. Beside this option the user will be able assign group of orders to other user with a little message. This option is goo for companies who have warehouses where separate orders are assigned to different packers. Fix the logo uploading control in the company settings. There was some issues where the logo of the company needed to be deleted and changed and this fix have solved that issues. Royal Mail CSV export Mapping updates. This is just an update to the “export to Royal Mail” option as some columns and headers have been change by Royal MAIL. This addon will download daily currency details from a third party national currency application and accordingly to this details Just Ship IT will label all your orders which have different currency than UK pound and will do the exchange rate so when you will download your orders to a CSV file for accounting purposes you will have all the payment in UK pounds. Orders Grid – Sales Per Country. A new option has been added to the application which will allow you download orders to a CSV file containing a summary of sales details by platforms and countries. Please enter the email address associated with your account. Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
<urn:uuid:6fae260f-84fe-4400-af02-778f7de8f72d>
0.508766
1.Tried installing a new OS on my Laptop. 2.Got an error that the CD was corrupted. 3.Tried reinstalling it. 4.Laptop stuck on start up screen. 5.Tried clicking "F2" and it doesn't work "tried "F1" "ESC" "F12". 6.Removed my HDD . 7.Laptop can now click "F2 and others". Those Function keys would only be likely to work if that Start up screen was the BIOS menus. It seems all you need to do is to make another download bootable for a DVD or a USB stick. Rufus is a good utility for that job and, of course, get the download for the operating system from the right source..
<urn:uuid:4439c7a5-131b-49f1-8607-dbc143c46257>
0.041397
Customer Story: Patient Insight Network improves data quality with Salesforce Customer Story: Patient Network improves data quality with Salesforce Industry: Healthcare / Life Sciences Location: California, USA Products Purchased: Salesforce Sales Cloud, Salesforce Marketing Cloud, FormTitan - Support growth efforts - Automate redundant and eliminate manual tasks - Improve the quality of its patient data - Streamline deliverables to its clients Patient Network uses its network to survey individuals about specific medical diagnoses, symptoms, medications, or their generic medical history. The survey questions are often provided by Patient Network’s clients, which sponsor the questionnaires. In turn, Patient Network shares those anonymous responses and research findings with the client sponsoring the survey. Patient Network’s clients use this information to better understand a patient’s experience, speed up research efforts, and improve treatments. Before the team implemented Salesforce, Patient Network relied on Google sheets to collect survey responses. This meant that responders had to answer the same generic questions for each survey they submit, including demographic and contact details, medical history, medications, etc. It also meant the Patient Network team had no way to segment and run analysis across its contact list or survey responses. This prevented them from sharing targeted, personalized communications. Now, Patient Network uses Salesforce as a robust patient database. They generate surveys using FormTitan, and responses are automatically pushed back into Salesforce standard and custom objects. They even enabled a feature to pre-populate answers to questions that the patient already completed, making the survey response process easier for Patient Network’s patient contacts. Once the patient data is populated inside Salesforce, Patient Network takes advantage of Salesforce’s robust reporting functionality. The team builds custom reports to share with clients, sets filters that meet client criteria, and hides columns or field values to keep the survey responses anonymous. Patient Network also uses Marketing Cloud to share personalized, relevant communications to that individual. Some examples include next steps for a specific survey that the patient completed, requests for referrals, and information that the patient expressed interest in learning more. The Salesforce platform with Marketing Cloud and FormTitan gives Patient Network a single source of truth for patient data.
<urn:uuid:4364172f-7d64-4d3d-9db8-ec2a8ff70d56>
0.098954
I just published a new version of my website 🥳 I wrote it last year but didn't have energy to fix a few things... but it's done! And I added some new images :D You can take a look here: https://abramek.art/ @AnnaHow is it done? Which software? I am looking for something for gallery update. @madargon It's all hand-written by me 😅 It's pretty simple code in HTML and CCS only though, so if you want to look into it I used this website for tutorials on responsive grid etc. https://www.w3schools.com/ A newer server operated by the Mastodon gGmbH non-profit
<urn:uuid:6afd10db-0e25-44d2-91ca-f9c0beee19b9>
0.064016
Data migration is a complex process. It involves making a copy of an organization’s current data from one device to another device without disrupting the business operations, and finally redirecting all activity to the new device. Why do organization migrate data? What are the business drivers? If your organization is planning on migrating, you are not alone. I am regularly asked, “Why do organizations migrate data?” Some of the reasons organizations tend to migrate from legacy solutions are: - When they procure a new hardware or software - When they want to optimize the storage - When they want to relocate their data centers - When merger and acquisition occur - When it is part of the DR strategy Have you ever wondered why many data migration projects fail? Most IT managers consider data migration a routine exercise and pay little attention to it. Data migration failures also happen due to the absence of effective data quality management across the project and lack of planning and prioritization. Given the value of your data, data migration requires specific skills, tools, and plans. Best practices to minimize or avoid data migrations PLM project failures To minimize the business impacts of data migration failure, organizations need to deploy a consistent, and repeatable methodology that incorporates planning, technology implementation and validation. - Planning a migration strategy Planning is critical to the migration process and depends on its size and scope. You need to identify the requirements, both hardware and software, outlining the stakeholders and their roles and ensure they work together to align objectives and timelines. Moreover, the current and future development plan need to be built in and documented. - Technology – Identify and implement a simple migration technology that is easy to use and can easily be adopted by analysts and users. ETL technology is preferred by users for its unique ability to handle the extreme requirements of data migration. However, the ETL tools license cost is high. - Data validation – Poor data quality can create problems. You need to extract, clean and transform data before setting it up for migration. The quality of data is improved as you can identify omissions, errors, or issues. Moreover, it is important to determine what data to pull forward, what to do with rest of the data, and how to map and enhance data for the target application needs. - Legacy data – Source applications, servers, or databases that are not required at present, need to be archived and be a part of the migration process. Archive it in a way that it can be accessed fast. - Data Movement – Segment the migration process to run it more efficiently. You can audit, map, test and transfer data in staggered phases. You can stick to budgets, timelines, and deliver better results without disrupting other processes. - Testing – Testing and validating the migrated data, ensures its integrity, accuracy, and the formatting. The ultimate test is the user acceptance testing. Unlike those required for other IT projects, data migration approach has to be systematic and holistic. We at PROLIM understand the challenges in making a data migration project successful. With our data migration platform Diaspora and proven data migration best practices, we make the overall process consistent, faster migration and cost effective. Need assistance with planning and suggesting right PLM Data Migration approach, PROLIM is your go to partner.
<urn:uuid:ac0d7994-0994-47a8-bb65-f2522c95ad35>
0.051146
Fine-tuning of the fluorescence microscope excitation spectrum for imaging dual or multiply labeled specimens can be readily accomplished with a split-filter excitation balancer, which contains tandem shortpass and longpass interference filters that are translated across the illumination aperture to adjust the light source wavelength distribution profile. This interactive tutorial explores how the Nikon Eclipse i-Series excitation balancer system affects the fluorescence emission intensity of multiply labeled specimens when employed in conjunction with dual and triple excitation band filter combinations. The tutorial initializes with the image of a randomly selected dual or triple fluorescent labeled specimen appearing in the Specimen Image window. Adjacent to this window is a spectral plot entitled Excitation Passband Spectral Profiles, which displays the absorption spectra for the fluorophores utilized to stain the specimen along with the approximate transmission percentage (white line) of the excitation balancer filter combination at the illumination aperture (see the excitation balancer drawing) in the visible spectral region. The fluorescent probes and their targets are identified for each specimen in the lower left-hand portion of the tutorial window next to a colored bar that coincides with the color of the excitation spectral profile in the excitation passband graph. Individual spectral profiles on the graph can be toggled on or off using the appropriate fluorophore checkbox. New specimens can be loaded into the tutorial using the Choose A Specimen pull-down menu. In order to operate the tutorial, use the Aperture Position slider to shift the microscope aperture between the longpass and shortpass regions of the excitation balancer (illustrated in the Excitation Balancer drawing in the lower right-hand portion of the tutorial). As the slider is translated to the far left, the aperture moves into the shortpass region of the balancer and the excitation passband changes to resemble the profile of a shortpass filter. The specimen image also changes to reflect the loss of fluorescence intensity from probes having emission spectra in the longer wavelength region. Shifting the slider to the far right moves the aperture into the longpass region and produces a corresponding change in the excitation passband graph and specimen image. In between these extremes is a Mixed Region where the excitation passband resembles a hybrid of the two cutoff filters (as does the specimen image). The Nikon Eclipse i-Series fluorescence illuminator excitation balancer system enables the microscopist to fine-tune the excitation wavelength passband at the illumination aperture for maximum efficiency when using optical blocks with dual and triple excitation filter combinations. This feature is useful to adjust individual fluorophore intensities in specimens containing several probes to, for example, reduce the fluorescence emission from one probe while simultaneously increasing the intensity of another in order to optimize observation and the recording of digital images. Specimens stained with two or more fluorophores often exhibit unequal fluorescence emission intensity levels due to a variety of factors, including unequal quantum yields, overstaining or understaining, inadequate membrane permeability, poor blocking, fixer-masked antibody binding sites, low inherent antigen concentrations, and simple fluorophore and secondary antibody mixing errors. Excitation balancers can help alleviate fluorescence signal imbalance in these specimens. The Nikon excitation balancer consists of a rectangular optical glass window containing two thin-film interference coatings that act as either a longpass or shortpass filter (or a mixture of both), depending upon the position of the window in the optical train, as illustrated in the tutorial and in Figure 1. The rectangular filter is mounted in a slider that is positioned adjacent to the microscope illumination aperture diaphragm, which is contained in a removable housing that inserts into the microscope epi-fluorescence illuminator (termed the Digital Imaging Head in Nikon Eclipse i-Series microscopes) preceding the field diaphragm in the optical pathway. The amount of light passing through the excitation balancer and the numerical aperture of the excitation illumination can be controlled by adjusting the size of the aperture diaphragm. When observing overstained specimens, excessive fluorophore emission can often be reduced using the excitation balancer in combination with neutral density filters and by constricting the aperture diaphragm size. Illustrated in Figure 1 are the spectral profiles of the longpass (yellow curve) and shortpass (purple curve) excitation balancer filters, along with the normalized absorption spectra of three fluorophores (DAPI, FITC, and Texas Red) matched to the characteristics of the filter combination. In practice, the Nikon excitation balancer filter combination slider is translated across the illumination aperture by pulling or pushing the frame handle, thus exposing the excitation light to varying mixtures of the wedge-shaped cutoff filters. When the slider is positioned so that the illumination aperture coincides with the shortpass portion of the excitation balancer (area under the purple curve), only fluorophores with absorption spectral profiles in the region below 520 nanometers will be excited to a significant degree by illumination from the arc-discharge lamp. As the slider is moved to the opposite end of the excitation balancer window, the longpass thin-film filter portion (area under the yellow curve) is illuminated by the aperture to excite fluorescent probes having wavelengths greater than 430 nanometers. Note that fluorophores, such as FITC and Alexa Fluor 488, having excitation bands in the blue spectral region (450-500 nanometers) are excited with a high degree of efficiency regardless of the excitation balancer position. When the microscope illumination aperture is positioned in "mixed" regions that contain portions of both the longpass and shortpass filters, the excitation efficiency varies for fluorophores having absorption bands in the ultraviolet and yellow-green regions of the visible light spectrum. As the portion of the slider in front of the illumination aperture is translated from the region containing exclusively the shortpass interference filter into the region containing equal proportions of both filters, the absorption efficiency of ultraviolet-absorbing fluorophores drops continuously from approximately 100 percent to 50 percent. Simultaneously, the absorption efficiency of green-absorbing fluorophores increases steadily from zero to 50 percent, while that of blue-absorbing fluorophores remains constant. The opposite effect occurs when the slider is motion is continued into the regions containing larger proportions of the longpass filter. In this case, the absorption efficiency of ultraviolet-absorbing fluorophores drops from 50 percent to zero as the efficiency of green-absorbing fluorophores increases from 50 percent to 100 percent. Again, the absorption efficiency of fluorophores excited in the blue region remains constant. A variety of common fluorophores, including the Alexa Fluors, cyanine dyes (the CyX series), BODIPYs, fluorescent proteins, MitoTrackers, SYTOX nucleic acid stains and many traditional synthetic and natural probes can be readily resolved using the excitation balancer in combination with either dual or triple excitation filter sets. For example, the series of images presented in Figure 2 illustrate a monolayer culture of albino Swiss mouse embryo cells stained with Alexa Fluor 405 (tubulin), SYTOX Green (nuclei), and Texas Red (the filamentous actin network) and imaged with a DAPI-FITC-Texas Red triple filter combination using the excitation balancer. In Figure 2(a), the excitation balancer slider is positioned with the shortpass thin-film filter region in front of the illumination aperture to preferentially excite the violet and blue fluorophores (Alexa Fluor 405 and SYTOX Green). Translating the slider into the central region of the excitation balancer (containing equal proportions of both filters) produces an image containing contributions from all three fluorophores (Figure 2(b)). Finally, moving the slider into the region containing the longpass filter (Figure 2(c)) eliminates the violet fluorophore to yield an image produced by the fluorophores (SYTOX Green and Texas Red) excited in the blue and yellow-green regions of the visible light spectrum. Replacing the DAPI-FITC-Texas Red triple excitation band filter combination with one designed for DAPI, FITC, and TRITC will produce similar results, but optimized for fluorophores having absorption profiles shifted from yellow-green to green (TRITC versus Texas Red) wavelengths. The excitation balancer is also ideal for separating fluorescence emission in specimens containing two fluorescent probes using the popular dual bandpass excitation filter combinations, such as DAPI-FITC, FITC-TRITC, and FITC-Texas Red. Illustrated in Figure 3 are several examples. Figure 3(a) presents a thin tissue section of mouse small intestine stained with the nuclear probe Hoechst 33258 (blue fluorescence) and Alexa Fluor 488 conjugated to phalloidin (green fluorescence) imaged through a dual filter DAPI-FITC combination with the shortpass portion of the excitation balancer in front of the illumination aperture to excite both fluorophores. Translating the excitation balancer into the longpass region (Figure 3(b)) eliminates the ultraviolet-absorbing nuclear dye (Hoechst 33258). Employed in this manner, the excitation balancer is very useful for controlling fluorescence emission in specimens that have overstained nuclei. Coupled to blue and green dual excitation filter combinations (FITC-TRITC and FITC-Texas Red), the excitation balancer can be used to control emission intensity levels from specimens labeled with fluorophores absorbing in the green through orange wavelength region. Illustrated in Figure 3(c) is the image of an adherent monolayer culture of Indian Muntjac deer skin fibroblast cells stained with Alexa Fluor 555 (orange fluorescence) conjugated to phalloidin, and Alexa Fluor 488 conjugated to goat anti-mouse antibodies targeting anti-peroxisomal membrane protein (PMP-70) primary antibodies. The image was captured using a FITC-TRITC dual band excitation filter set in combination with the excitation balancer positioned so that the longpass thin-film filter region coincides with the illumination aperture. Translating the excitation balancer to the shortpass region (Figure 3(d)) reduces (or eliminates) the fluorescence emission from the green-absorbing fluorophore (Alexa Fluor 555). Similarly, the FITC-Texas Red filter produces comparable effects (Figures 3(e) and 3(f)). The specimen in the latter two frames was a rat thoracic aorta cell culture labeled with Alexa Fluor 594 conjugated to phalloidin (actin) and Cy2 conjugated to secondary antibodies targeting mouse anti-alpha-tubulin primary antibodies. Matthew J. Parry-Hill, John D. Griffin, and Michael W. Davidson - National High Magnetic Field Laboratory, 1800 East Paul Dirac Dr., The Florida State University, Tallahassee, Florida, 32310.
<urn:uuid:7d6e504c-2848-4bee-80eb-25e228ce6653>
0.050067
Trend Micro Antivirus Technical Support Get the all-in-one protection for your computer by Trend Micro and get a protection from all online threats. To get started with Trend Micro Antivirus, all you need to do is call on the Trend Micro support – and leave the rest to us. Our PC Support Experts Online Microsoft Certified Technicians will help you every step of the way. They will help pick the right software and keep it running smoothly. Just call on our Trend Micro – and leave the rest to us. Trend Micro Technical Support Services With new threats and ransomware threatening to invade into our lives, it is important to have a strong antivirus enabled on your system. To keep yourself protected at all times, go for Trend Micro Antivirus. It will silently run in the background and give the much needed protection for your PC. Just call on the Trend Micro support – and get the best antivirus solution for your computer. Our Trend Micro support includes: ☑ Unlimited Trend Micro tech support at one flat rate ☑ Diagnose and do a compatibility test of Trend Micro antivirus with your PC ☑ Prevent viruses, spyware, adware, Trojans, rootkits and other online threats without an impact on PC performance ☑ 24/7 access to expert technicians ☑ Especially skilled and Microsoft Certified Technicians for Trend Micro security software Why you should go for Trend Micro Antivirus If you are one of those who does most of his work online, then you definitely need Trend Micro installed on your computer. Trend Micro protects you from viruses, keep ransomware at bay, guards your privacy on social media sites and lot more. To get complete security to your computer, just call us on the Trend Micro contact number – and let us manage the Trend Micro Antivirus Protection for you. Why Call Trend Micro Support One of the most important things to get the maximum out of any software is to run it smoothly. Right from downloading to regular scans and updates, Trend Micro support takes care of it all. You just need to call us on the Trend Micro support – and we will take care of the rest. You get the highest level of protection without any stress of decoding technical stuff. Our Trend Micro support is available round the clock and you can call us as many times as you want. There are no additional charges for it. Here’s what our Trend Micro support provides: ⛔ Free Diagnose of any malicious programs on the PC ⛔ Troubleshoot and fix all software errors ⛔ Update Trend Micro Antivirus drivers and security patches to protect against online threats ⛔ Identity protection by Trend Micro ⛔ Advanced firewall protection by Trend Micro ⛔ Ransomware security ⛔ Scan and connect with devices and peripherals ⛔ Optimize PC performance and schedule scans ⛔ Safeguard identity and online transactions ⛔ Installation or Uninstallation of Trend Micro products ⛔ Trend Micro Software Maintenance support ⛔ Trend Micro Antivirus Subscription & Renewal ⛔ Removing third party antivirus products ⛔ Support for Operating Systems for Trend Micro Antivirus ⛔ Solving software complexities and compatibility issues ⛔ General Troubleshooting ⛔ Unlimited Trend Micro tech support for 24/7, all through the year Our skilled technicians can provide you instant support for all kind of Trend Micro Antivirus software. Connect with us on Trend Micro contact number for support anytime and anywhere
<urn:uuid:cb236ae9-24fa-4c31-aa58-929b7bcf1472>
0.06742
Exercise Excel 3-1: Theater Tickets - AutoFormat; Insert; Totals |What you will do: Create totals and subtotals The worksheet you created in Exercise 2-1 at the end of Excel Project 2 was quite bare. Should we say boring? Some formatting would add interest and would make the chart easier to read. - From your Class disk, open the file theater tickets.xls from the excel project2 folder. - Save to your Class disk in the excel project3 folder with the name theater tickets3.xls When you plan to save with a different name, use Save As right away so you won't overwrite the original file - AutoFormat all: Select all the data, A1:F36. AutoFormat the selection with Classic 3 table format, applying all the characteristics. - Edit: In cell B5, edit the text to read Number. In cell C5 type Price. Below C5 enter the prices of the ticket types: $20, $16, $8. - AutoFormat small table: AutoFormat the Seating Capacity table, A4:C8, with Classic 3 also. - Format small table: Center Seating Capacity across the 3 columns of the small table. Center contents in each cell of the rest of this small table. Select the cells surrounding the small table and clear all formatting in them. - Format large table: Wrap text in cells containing West Side Story and Ticket Type. Widen the columns as needed and resize rows to be just tall enough to show the text. Center the Ticket Type column. - Insert rows & format: You need some space for subtotals. Insert blank rows above the rows containing Dolly, Evita, Totals. Border the new cells in the large table with , one line top, double line bottom. - AutoSum subtotals: Use AutoSum to create subtotals for each play of the tickets sold and the total money for those tickets. [Look at the range Excel suggests carefully and change it if necessary.] Make these 3 new rows Bold. In column A of these rows type in the name of the play followed by Total =. Make the new labels in column A Bold Italics. - Rewrite Formulas: Inserting the subtotals made the Total row values wrong. The formulas changed to include the new cells. Rewrite the Totals on the last row so the formulas will add only the subtotal cells in that column. - Prepare to print: Change the header to show Exercise Excel Spell Check. Check the Print Preview - portrait orientation, centered horizontally on page. Compare carefully to the illustration below. Make any corrections needed in alignment, formatting, spacing, etc. - Print the sheet.
<urn:uuid:b5e1dd37-a3c8-4c99-8173-0066c6e54fc8>
0.070608
Coin Stomper News - We know Crypto. Username or Email Address * Lost Your Password? Email Address * Confirm Password * I agree to terms & conditions. Lost your password? Please enter your username or email address. You will receive a link to create a new password via email. Username or Email Address | Sign Up The Sandbox (SAND) Origin Protocol (OGN) Do you know of a coin/token that you think CoinStomper.Com should review? Send us a request for your favorite coin and we would love to take a look! CoinStomper.Com does not do paid reviews/promotions, we give our honest opinion so send us your top coins to review! Additional Information (optional) What's the reason you want us to review this coin/token? (optional) Our guides to the crypto-verse. More will be added as we grow 🙂
<urn:uuid:6fe527cd-a633-486e-84cd-0f27146854bb>
0.130092
Read your email with ease from within your web browser. SSH to BigW.org Connect encrypted to BigW.org from anywhere in the world with web access. Requires a Java-compatible browser. You will note that this is buggy, fairly slow, and the screen may not update correctly. Big W Help File Covers basic Unix commands, how to use e-mail, set up a Web page, and more. Web Log Statistics You can now monitor the traffic of your web sites online. The History of BigW
<urn:uuid:c62a5ef4-9a1b-4331-b862-1bb70f998841>
0.339962
I have document library named Pages where all my pages are there. Every page of this library has rating control. The rating Column of the library shows stars for pages which confirms that the ratings ... (I'm using SharePoint 2010) I have a Pages library on which I attached a custom "AnEvent" content type who inherits from the Article Page content type. The "AnEvent" content type contains a start ... publishingWeb.PagesList.EnableModeration = false; publishingWeb.PagesList.EnableVersioning = true; publishingWeb.PagesList.MajorVersionLimit = 10; publishingWeb.PagesList.EnableMinorVersions = false; ... I'm currently working on moving our current website from Dreamweaver to SharePoint, and I have a requirement to have an .htm file at the root of my SP2010 site. The reason is that we have software ...
<urn:uuid:8731205c-d2c8-450e-9456-a7ae6887cce2>
0.189946
brickmar at EARTHCOM.NET Fri Aug 15 11:27:05 CDT 1997 > Basically, the self is without activity and is the substratum. The > desires etc which seem to occur is not of the self and so on. This > should be kept in mind while doing the japa. I have seen two versions of > the mantra, namely kAmokAR^ishhIt.h manyurakar^ishhIn.h and also > kAmokAR^ishhIt.h manyurakAR^ishhIn namonamaH. > Also note that this does not mean that we can do whatever we please and > attribute it to kAma :-). The aham is the Atman and not the ego. Note, too, that if you do whatever you please the Atman is doing that as well, and that effort is a distraction from what is. In other words, the atman resisting the atman can be a whirlpool on the stream leading to More information about the Advaita-l mailing list
<urn:uuid:2197eb0c-95b7-452b-929b-4decf8cf0f88>
0.060695
0verkill is a client-server 2D deathmatch-like game in ASCII art. It supports free connecting/disconnecting during the game, and runs well on modem lines. Graphics are in 16-color ASCII art with elaborate hero animations. 0verkill features 4 different weapons, grenades, invisibility, and armor. The package also contains reaperbot clients, a simple graphics editor, and a level editor. AIME is a C++ MUD engine with an OO design, designed to provide utmost flexibility for the designer to create complex worlds. It has a fully-functional builder port, online interpreted specials code, and a flexible levels/quest/profession track system to allow the game owners to set up any world they can imagine. The Alamin GSM SMS Gateway is a group of daemons that allows you to send/receive SMS messages from any GSM device that supports AT+ commands (GSM modems or GSM mobile phones) or supported by Gnokii. A client program allows you to send messages from any IP client. An SMTP interface is provided to allow MTAs to send SMS directly to the GSM network. IMP (Incoming Message Processor) modules allows you to extend functionality to implement banking, network administration, bd querys, etc. from a GSM mobile phone. 'App' is a preprocessor for C++ that accepts as input arbitrary C++ code that may contain embedded constructs for specifying algebraic data types and associated pattern matching operations, and produces as output the same code with all such constructs translated to normal C++. What app essentially does is provide for C++ pretty much the same capabilities that functional languages have regarding algebraic types. 'Applib' is the associated runtime library that supports the core run time requirements of the translated code, and which provides additional utilities (applib is covered by the LGPL).
<urn:uuid:a41da5ff-1dff-4fa1-b07d-3ca97e0a4563>
0.343835
[riched32/tests] Correct a test to better show the behavior paul.vriens.wine at gmail.com Wed Jun 10 06:24:56 CDT 2009 These tests didn't prove much as the initial window was big enough for the text not to wrap anyway. There was also a duplicate test. Maybe what I've added is too much but it shows that the W2K+ behavior is - adding text to the window still wraps regardless of the windows being - resizing the window doesn't change the wrapping. The Win9x/NT4 behavior (and Wine currently) is to change the wrapping regardless of the windows being visible or not (when setting the text and when resizing). Correct a test to better show the behavior -------------- next part -------------- An embedded and charset-unspecified text was scrubbed... More information about the wine-patches
<urn:uuid:765f04c4-4e4a-4139-8de7-75e3772616ad>
0.060266
Probabilistic Choice in Optimal Product Design Coauthor(s): Ricardo Montoya. Methods for identifying optimal product concepts using conjoint analysis typ- ically assume a deterministic, first-choice rule. As a consequence, these methods: (i) ignore uncertainty in preference estimates when evaluating new product concepts; (ii) force the assignment of a single "status-quo" item to each consumer; and (iii) allow an estimate of the expected market share, but not the associated variability in choice probabilities across consumers. We describe the mathematical representation of a problem concerning optimal product design that allows consumers to make probabilistic choices. We then describe a solution procedure that generalizes a previously-known dynamic-programming algorithm to accommodate probabilistic choice rules. We examine the performance of the proposed algorithm in both a simulation and an application. We assess in the simulation how well the proposed heuristic performs in identifying an optimal or near-optimal product concept using a probabilistic choice rule. We compare these market share predictions with those obtained using a deterministic choice rule, and find that the difference in the two predictions (i) increases with the number of attributes and attribute levels, and the number of alternatives in consideration sets; and (ii) decreases with the heterogeneity in consumer preferences. We describe an application of the proposed method for designing television sets. As in the simulation, we find that ignoring preference uncertainty changes market share predictions. We find near-optimal product concepts that have similar expected market shares but different distributions of choice probabilities across consumers. Among these, product concepts with a higher variance in the choice probabilities are better from the standpoint of defending market share against new products that might be subsequently introduced in the market. Source: Working Paper Kohli, Rajeev, and Ricardo Montoya. "Probabilistic Choice in Optimal Product Design." Working Paper, Columbia Business School, 2007.
<urn:uuid:466b1130-a8b4-45c9-8492-277f9027aa26>
0.131115
5 months ago , it costed in Holland €269,- . It plays also vids and pics of my 2 computers . Then I use a cable to a router , nothing else !! |Network support||LAN / WLAN| |Supported DVDR formats for playback||DVD-R / DVD-R DL / DVD+R / DVD+R DL / DVD-RW / DVD+RW / DVD-RAM?| Review this product Did you notice incorrect or missing information? Submit us corrections for these details Do you have questions or comments regarding this product? Use our discussion forums to find out more about this and thousands of other products.
<urn:uuid:002fd15c-06b6-4e34-ac0e-223ea2c69e50>
0.106998
If I copy some text from another source like a word doc or email, and try and paste into this message field, the system will not allow me to do this. The only options that present themselves are "Insert link, Image, Alignment, insert table". And if I write something within this message field and then select and copy and then try and paste this section somewhere else within this message, the system will not allow it. This is EXTREMELY annoying. Why Why why ??! Opine your favorite editor. Type you text. Use the <Ctrl>+A key combination to copy your text. Use the <Ctrl>+C key combination to copy your text. Go to reply box. Sent cursor in the reply box. Make sure the cursor is in the box. Use the <Ctrl>+V key combination to paste. Y9u have to use the key combinations for pasting as the web browser's menu options are not available within the reply box. And how do you cut and paste? First of all what do you mean by 'favourite editor' ? And why on earth would i need to do all this? It should be simply right click and the option to cut , copy or paste should be available to you without having to do all that <ctrl> +A key rubbish. And if these options arent available within the reply box, then Adobe should fix this blindingly obvious shortcoming. And as for cut and paste, I just highlight what I want to copy or cut and the paste it . I belong to many forums and this is the first forum that does not allow you to paste text from another source. > First of all what do you mean by 'favorite editor' ? How many editing programs programs d you have on your computer? Windows come with edline,Notepad, and WinWord. Then you can add MS Office. OpenOfficeorg, NotePad++, TextPad and others. Not to include the the editors in all of the possible email programs you could be using. > And why on earth would i need to do all this? It should be simply right click and the option to cut , copy or paste should be available to you without having to do all that <ctrl> +A key rubbish. Since this reply box does not support a menu item with a cut and paste menu or tool option, it is the only method available. If you do not like it, maybe you should run this site for Adobe. I am aware of many forums that do also do not have menu items or tools for cutting to and pasting from the OS clipboard. Your problem should be directed to the administrator of this forum and not the other users. >Your problem should be directed to the administrator of this forum and not the other users.< You should have explained the fact that the right click on mouse for 'copy, cut and paste' functions were not available in this forum right at the begining rather than trying to be smart with your initial comments i.e "It works for me! Maybe you need some patience! For what you are paying for this service, and what I am bing paid, I would rather not have to explain every possible way to perform a very common task. I copy several hundred lines of data on a regular basis and the key board shortcuts are just easier. Also many times user systems need some time to fully download a web page and set up the display on a client system before one can even start to type. You clearly did not communicate your issue clearly enough. However with reference to my previous messages, I dont understand why the right click mouse options of 'copy, cut and paste' have been disabled. I feel that using shortcut keys or the browser edit functions is a bit of a retrograde step. In fact, the options in the menus bar within the message window already have insert link, insert image and so i dont understand why these are duplicated why I right click my mouse within the message field. Also I have to be specific where I right clickmy mouse othwerise I get a much bigger drop down menu list. looks like admin understood my query immediatley and without the confusion that you apparently had. Their response was "This turns out to be a 'known issue" with Jive. They don't have a date set for a possible fix, but suggest using CTL-V to paste. They also said it might be possible to hit the enter key a couple of times and then the Right-Click paste function should come back." I also dont think that the shortcut key method is always the most efficient. Europe, Middle East and Africa
<urn:uuid:289bba4e-adbb-4c68-8055-cf24e60d7c5e>
0.105323
OpenSUSE 11.2 Released Although OpenSUSE is not one of my primary distros I’m still excited for today’s OpenSUSE 11.2 release. This is because many new features and improvements have been implemented into the OpenSUSE 11.2 release which is available as KDE or GNOME live CD versions. A few specific improvements that I am looking forward to include KDE 4.3 which is suppose to feature closer integration with Firefox and OpenOffice.org applications. I’m not the biggest KDE fan but some distros definitely do it better than others and KDE is starting to grow on me. GNOME, which I am a fan of, version 2.28 is included with this OpenSUSE 11.2 release which has a new theme, software update improvements, and other features. Here’s some useful OpenSUSE 11.2 Links:
<urn:uuid:fa15186b-1ddf-4f8d-ae24-6c9ab1ee6adf>
0.152948
Online Thumbnail Generator Quickly generate an instant web screenshot of any site! Have thumboo.com host your image, free! Just copy and paste the code below and put it on your site where you want the thumbnail to appear. To save your thumbnail, simply right-click (or control-click on Mac) and 'save as...'
<urn:uuid:8caeb3a0-9e0f-4f23-ba3a-137021765b57>
0.044358
|VoIP Reseller and Partner Program from VCCS Telecom. Resell Business VoIP Services.| Become a strategic partner and resell professional VoIP services. We are dedicated to the Business market and have the best quality VoIP with direct routes to Tier 1 carriers. Please contact us to speak about this opportunity. Our online VoIP affiliate program allows you to earn 15% on our Hosted Phone systems and VoIP Lines. Affiliates use a unique link in order to track sales and keep track of account statistics through your online affiliate portal. Wholesale VoIP Resellers Our White Label VoIP reseller program allows partners to start a VoIP company without startup and infrastructure costs. For complete details, visit our VoIP Reseller page. 24/7/365 Dedicated support 4Hour Hardware replacement SIP Trunks start at $15/mo Phone #s in 60 Countries
<urn:uuid:46c73aee-e270-4c82-b02a-eb7d4b29dca9>
0.865949
Work good for me //A string of commands to run at the beginning and end of a map respectively. //Eg set cl_endmapcmd "screenshot" will take a screenshot at the end of a map. //set cl_beginmapcmd "cmd say Hello" set cl_endmapcmd "screenshot jpg"