Registered since September 28th, 2017
Has a total of 3360 bookmarks.
Showing top Tags within 71 bookmarks
Tag selected: question.
Saved by uncleflo on January 4th, 2019.
Report a crime, incident or non-injury RTC in minutes and receive a confirmation email and reference number immediately. Not sure who to contact? Find answers to more than 900 of our most popular policing questions in our easy-to-use A-Z guide.
Saved by uncleflo on December 23rd, 2018.
When setting up the NAS, you need to enter in a server name. This becomes the hostname. How can I set a FQDN (i.e. NAS-Store.example.com) without it being wiped out all the time? You can just setup a ddns name and use it to get access (I'm guessing you wanna use that name to gain outside access to your NAS). There is a DDNS tab in Control Panel > External Access. Register your name there. I don't need to worry about DDNS. That is not an issue. As I run an internal DNS on my network, I can type in the FQDN of the NAS and get to it OK. That's all fine. I would just like to be able to give the NAS an FQDN and an SSL certificate to match it, so I do not get any warnings that the cert is incorrect for the NAS when I have external clients use the Cloud Station. I don´t you buy a domain name, setup it up by using DynDns client and give the domain name to your clients to connect to, and then set your internal DNS with that same domain name to point to the internal IP, and also set the name of the NAS with that domain name.
Saved by uncleflo on December 23rd, 2018.
I am working on text classification using SVM. In a paper (Fuzzy Support vector machine for multi-class text categorization) the author has reduced the features(words) by applying the following criteria: "Eliminate the words that are ICF>log2, Uni<0.2 and TF_IDF<26". My question is how can we find TF_IDF value of a word. TF is a local measure and IDF is a global measure. TF_IDF gives different value for a word in each document. TF-IDF is the acronym for Term Frequency–Inverse Document Frequency. This metric aims at estimating how important is a keyword not only in a particular document, but rather in a whole collection of documents (corpus). Actually, a lot of common words like articles or conjunctions may appear several times in a document but they are not relevant as key-concepts to be indexed or searched. TF (Term Frequency) provides a measure about how frequently a term occurs in a document.
Saved by uncleflo on December 23rd, 2018.
Mailchimp have suggested adding a CNAME record as following to the DNS records. I am not without experience in these matters and have replaced the 'yoursite.com' with the domain name and as far as I can tell have done everything ok .... but it replies with this. An unexpected error occurred. If this issue continues, contact support. Chat is currently offline so I thought I would ask the question here and see if anyone has had similar problems. Sorry to hear about the error when adding the cname record. I have a suggestion that may help resolve the issue when adding you cname record to your dns zone file. When adding the record you may need to remove the "yoursite.com" section from the record as the cname will already be created as a subdomain of your primary domain. This means when adding the record in the host section it should be added as k1._domainkey only and not k1._domainkey.yourdomainname.com. I also tried this on a test domain to ensure the record would save properly. Below I have also pasted a screenshot of how to properly submit the cname record. If for any reason you continue to recieve and error after adding the record please contact our 24/7 customer support line so that our representatives may further research the error.
Saved by uncleflo on October 26th, 2018.
Charter Communications ("Charter") has been notified by a copyright owner, or its authorized agent, that your Internet account may have been involved in the exchange of unauthorized copies of copyrighted material (e.g., music, movies, or software). We are attaching a copy of the Digital Millennium Copyright Act (DMCA) notice that Charter received from the copyright holder which includes the specific allegation. Under the DMCA, copyright owners have the right to notify Charter’s register agent if they believe that a Charter customer has infringed on their work(s). When Charter receives a complaint notice from a copyright owner, Charter will notify the identifiable customer of the alleged infringement by providing them a copy of the submitted DMCA notice. As required by law, Charter may determine that the customer is a repeat copyright infringer and reserves the right to suspend or terminate the accounts of repeat copyright infringers.
Saved by uncleflo on October 23rd, 2018.
I read that there is a 25 minute limit on live streaming with the theta v? Why is this? Do you know if it can be changed? I was doing test with both 4K live streaming 2 and spatial audio 3. I don’t know the technical reason for this or if it can be fixed with software in the future. I’ll ask around. Update: I am closing this topic to help other people find the info they are looking for. The answer is that there is no time limit on live streaming. I’ve tested it for more than 2 hours. My test was in an air-conditioned room. We do not know if there will be overheating problems in the future, but we know that there is no technical limit on live-streaming.
limit streaming test live technical video 360 surround stream software future topic answer question howto room problem theta ricoh administration capture description step by step guide community solution
Saved by uncleflo on October 23rd, 2018.
Nandini Jammi - October 10, 2014 Seth Godin issued a challenge in his blog recently as he questioned how businesses are still collecting user feedback. “If you live in the US, you might try calling 800-398-0242. That’s the number Fedex Print lists on all their receipts, hoping for customer feedback. It’s hard to imagine a happy customer working her way through all of these menus and buttons and clicks, and harder still to imagine an annoyed customer being happy to do all of this data processing for them. The alternative is pretty simple: if you’re about to lose a $10,000 customer, put the cell phone number of the regional manager on the receipt. That’s what you and I would do if we owned the place, wouldn’t we?”
Saved by uncleflo on June 22nd, 2018.
How do I resolve a git merge conflict in favor of pulled changes? Basically I need to remove all conflicting changes from a working tree without having to go through all of the conflicts with a git mergetool while keeping all conflict-free changes. Preferably doing this while pulling, not afterwards. You can use the recursive "theirs" strategy option.
Saved by uncleflo on May 9th, 2018.
I'm setting up a new server, and want to support UTF-8 fully in my web application. I have tried in the past on existing servers and always seem to end up having to fall back to ISO-8859-1. Where exactly do I need to set the encoding/charsets? I'm aware that I need to configure Apache, MySQL and PHP to do this - is there some standard checklist I can follow, or perhaps troubleshoot where the mismatches occur? This is for a new Linux server, running MySQL 5, PHP 5 and Apache 2.
server utf8 web application encoding charset lookup reference apache mysql php iso troubleshoot linux lamp new howto details list problem description question solution development properly support website text content answer
Saved by uncleflo on May 5th, 2018.
Stackoverflow Question: I have a case where I must write inline CSS code, and I want to apply a hover style on an anchor. How can I use a:hover in inline CSS inside the HTML style attribute? E.g. you can't reliably use CSS classes in HTML emails. The answer has lots and lots of varying solutions.
Saved by uncleflo on April 20th, 2018.
Right now, there’s a mathematical symphony happening on your website. Every single one of your readers is subconsciously aware of this symphony, and more important, they are all pre-programmed to respond to it in a particular way. The question is this: Is your site’s symphony pleasing and inviting to your readers, or does it turn them off and make it harder to communicate with them?
Saved by uncleflo on April 18th, 2018.
Most app performance issues originate in the database, but engineering teams lack visibility into the data tier. VividCortex provides unique insights into database workload and query performance, enabling faster issue resolution. The result is better application performance, reliability, and uptime. This ebook will help you understand key questions that you should pose about your database—and it will show you exactly how you can answer them, quickly and safely, with VividCortex.
Saved by uncleflo on April 6th, 2018.
I want to make a little painting app using canvas. So I need to find the mouse's position on the canvas. The solution is For people using JQuery.
Saved by uncleflo on February 15th, 2018.
I have two *.sql files that I use when creating a new web site database. The first file creates all the tables. The second file populates some default records. I would like to execute these files from PHP. I also use the Zend_Framework, if that will help accomplish this? Answer: This question comes up from time to time. There's no good solution for running a .sql script directly from PHP. There are edge cases where statements common in a .sql script can't be executed as SQL statements. For example, the mysql tool has builtin commands that are not recognized by the MySQL Server, e.g. CONNECT, USE, and DELIMITER.
Saved by uncleflo on February 7th, 2018.
Is there any comprehensive list of characters that need to be escaped in Bash? Can it be checked just with sed? In particular, I was checking whether % needs to be escaped or not. I tried this and worked fine, without escaping %. Does it mean % does not need to be escaped? Was this a good way to check the necessity? And more general: are they the same characters to escape in shell and bash?
Saved by uncleflo on December 27th, 2017.
Quote from Percent-encoding. When a character from the reserved set (a "reserved character") has special meaning (a "reserved purpose") in a certain context, and a URI scheme says that it is necessary to use that character for some other purpose, then the character must be percent-encoded. Percent-encoding a reserved character involves converting the character to its corresponding byte value in ASCII and then representing that value as a pair of hexadecimal digits: What does each of this characters mean in context of an URI? with a search engine I didn't find a list and their meanings/use case.
url http url parameters parameters url-encoding digit value context reserved purpose scheme character ascii convert identifier development web uri standard lookup reference syntax question answer stackoverflow
Saved by uncleflo on June 27th, 2017.
Someone has found a potential security issue with your technology. What happens next? Making certain this discovery leads to a positive outcome for everyone involved is crucial. Replacing an antiquated security@ mailbox with the HackerOne platform brings order and control to an otherwise chaotic process. Do you have a vulnerability disclosure policy? How is it implemented? Leverage our platform to ensure that your team has control over the entire process, from initial validation, internal escalation, communication with the hacker, and the timing and messaging surrounding any coordinated disclosure. A consistent coordination process eliminates the opportunity for miscommunication and ensures positive outcomes. Gain unparalleled insight into your security posture with metrics gleaned from around-the-clock security assessments. Monitor your program's stats in real time to effortlessly stay on top of response time, stale issues, pending disclosures, and more. Your Security Development Lifecycle (SDL) will thank you.
security hacking hacker discover replace process income vulnerability crucial discovery issue potential bounty reward finance money platform hire coordination find code site leverage assessment lifecycle disclosure question technical administration
Saved by uncleflo on June 27th, 2017.
Q&A for information security professionals. Ask questions and get answers on any and all information security related topics.
information security information security question answer stackexchange problem incident reference lookup technical business hacker hack community solve solution topic professional relate computer server linux windows os operating system site database advice
Saved by uncleflo on June 23rd, 2017.
share transform group operation transformation operational-transformation development collaboration website web howto references list developer lookup information read discussion question synchronize realtime text article write writer js library
Saved by uncleflo on June 7th, 2017.
The goal of this page — which is a work in progress — is to gather information relevant for people who are porting SQL from one product to another and/or are interested in possibilities and limits of 'cross-product' SQL. The following tables compare how different DBMS products handle various SQL (and related) features. If possible, the tables also state how the implementations should do things, according to the SQL standard. I will only write about subjects that I've worked with personally, or subjects which I anticipate to find use for in the near future. Subjects on which there are no significant implementation variances are not covered. Beta-versions of software are not examined. I'm sorry about the colors. They are a result of wanting to mark each DBMS differently and at the same time wanting to be relatively nice to printers.
Saved by uncleflo on May 15th, 2017.
Most users at one time or another have dealt with hierarchical data in a SQL database and no doubt learned that the management of hierarchical data is not what a relational database is intended for. The tables of a relational database are not hierarchical (like XML), but are simply a flat list. Hierarchical data has a parent-child relationship that is not naturally represented in a relational database table. For our purposes, hierarchical data is a collection of data where each item has a single parent and zero or more children (with the exception of the root item, which has no parent). Hierarchical data can be found in a variety of database applications, including forum and mailing list threads, business organization charts, content management categories, and product categories.
Saved by uncleflo on April 12th, 2017.
I'm not sure if bitmask is the correct term. In php, the error_reporting function can be called multiple ways.It's quite simple actually. First a bit of code to demonstrate how it can be implemented. If you don't understand anything about what this code is doing or how it works, feel free to ask additional questions in the comments.
Saved by uncleflo on February 14th, 2017.
I asked a similar question before, but it was answered inadequately so I thought I would ask again here but providing more information. I need to get different and older versions of a git repository and I'm having trouble with that.
Saved by uncleflo on December 12th, 2016.
I want to automate a fairly simple task. For this I have written a small PHP script which I run from the command line using PHP-CLI. Now I want to hand over this script to someone but I do not want to: - give away the source code; - ask him to install PHP on the system. Is there a way to create a .exe version of the PHP script. I am really not much worried about de-compilation; I am more worried about asking people to install and configure PHP.
Saved by uncleflo on December 2nd, 2016.
I have Server A and Server B which exchanges some data. Server A on user request pull data from Server B using simple file_get_content with some params, so server B can do all task(database etc) and return results to A which formats and show to user. Everything is in PHP. Now I am interested what is fastest way to to this? I made some test and average transfer time for average response from server B at (~0.2 sec). In that 0.2 sec, 0.1 sec. aprox. is Server B operational time (pulling data calling few databases etc) what mean that average transfer time for 50kb with is 0.1 sec. (servers are NOT in same network) Should I try with: 1.cURL insted of file_get_content ? 2.Or to try to make whole thing with sockets( I never work work with sockets in PHP but I supose that easily can be done, on that way to skip web server )? 3.or something third?