79379639

Date: 2025-01-23 02:04:03
Score: 3
Natty:
Report link

Disable

Sort-imports: On-save

helped me

Reasons:
  • Low length (2):
  • No code block (0.5):
  • Low reputation (0.5):
Posted by: Sahil Jaidka

79379620

Date: 2025-01-23 01:52:00
Score: 1
Natty:
Report link

class Calculator:

  def __init__(self,num1,num2):
        self.num1 = num1
        self.num2 = num2
  def add(self):
        return num1 + num2
         

num1 = int(input("Enter first digit: "))

num2 = int(input("Enter second digit:"))

calculator = Calculator(num1,num2)

print(calculator.add())

Reasons:
  • Low length (0.5):
  • Has code block (-0.5):
  • Low reputation (1):
Posted by: Arun Baghel

79379607

Date: 2025-01-23 01:40:58
Score: 2.5
Natty:
Report link

I feel lucky that there are so many people ready to help. I did find a method that saved the other partitions and enabled the unallocated for a new D: drive with 930GB. It was so easy I'm feeling rather stupid it wasn't found in my initial search. The tool Disk Management was the key.

Reasons:
  • Low length (0.5):
  • No code block (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: BendBob

79379604

Date: 2025-01-23 01:39:58
Score: 2
Natty:
Report link

To complement the solution by @MadScientist:

Use Substitution References to simplify the code (if you're familiar with this concept).

$(SUBDIRS:%=run-%): run-%:
    $(MAKE) -C $* run
Reasons:
  • Low length (1):
  • Has code block (-0.5):
  • User mentioned (1): @MadScientist
  • Low reputation (0.5):
Posted by: Simon Ioan

79379600

Date: 2025-01-23 01:34:57
Score: 2
Natty:
Report link

Please see the documentation on launch.json.

The attribute console defines what console should be used by the debugger, it could be, in particular, non-default integratedTerminal or externalTerminal. I tried those options — both terminals support terminal input.

However, the documentation says: Many debuggers support some of the following attributes. So, strictly speaking, it depends on a particular C/C++ debugger implementation you use, but I hope they all work with the terminals. Please give it a try and let me know if you have problems.

Reasons:
  • RegEx Blacklisted phrase (2.5): Please give
  • Long answer (-0.5):
  • Has code block (-0.5):
  • Low reputation (0.5):
Posted by: Sergey A Kryukov

79379590

Date: 2025-01-23 01:29:56
Score: 3.5
Natty:
Report link

Maybe you have old .cache file, when you using yolov7, it will load wrong dataset path.

Reasons:
  • Low length (1.5):
  • No code block (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: Mydeimos

79379589

Date: 2025-01-23 01:27:55
Score: 0.5
Natty:
Report link

You need to extend PrimartContactGraphExt, and implement your check there.

using PX.Data;
using PX.Objects.CR;

namespace StackOverFlowDemo
{
    // Acuminator disable once PX1016 ExtensionDoesNotDeclareIsActiveMethod extension should be constantly active
    public class PrimaryContactGraphExtExt : PXGraphExtension<BusinessAccountMaint.PrimaryContactGraphExt, BusinessAccountMaint>
    {
        protected virtual void _(Events.RowPersisting<Contact> e)
        {
            if (e.Row?.IsPrimary != true) return;

            if (e.Row.EMail == null)
            {
                // Acuminator disable once PX1050 HardcodedStringInLocalizationMethod [Justification]
                e.Cache.RaiseExceptionHandling<Contact.eMail>(e.Row, e.Row.EMail,
                    new PXSetPropertyException<Contact.eMail>("Email address must not be empty for primary contacts.", PXErrorLevel.RowError));
            }
        }  
    }
}
Reasons:
  • Blacklisted phrase (1): StackOverFlow
  • Long answer (-0.5):
  • Has code block (-0.5):
  • Low reputation (0.5):
Posted by: Zoltan Febert

79379586

Date: 2025-01-23 01:25:53
Score: 11.5 🚩
Natty: 5.5
Report link

Were you able to solve this problem?

Reasons:
  • Blacklisted phrase (1): you able to solve
  • RegEx Blacklisted phrase (1.5): solve this problem?
  • RegEx Blacklisted phrase (3): Were you able
  • Low length (2):
  • No code block (0.5):
  • Ends in question mark (2):
  • Single line (0.5):
  • Low reputation (1):
Posted by: Макс Попов

79379580

Date: 2025-01-23 01:18:52
Score: 1
Natty:
Report link

The issue is likely from the name attribute being a number (232323) instead of a string, and this can cause problems with how browsers and password managers interpret form inputs. Browsers typically expect name attributes to be strings.

Also, use the appropriate autocomplete attributes such as autocomplete="username" or autocomplete="password", etc. this helps browsers autofill behavior

Reasons:
  • No code block (0.5):
  • Low reputation (0.5):
Posted by: Berkay G.

79379573

Date: 2025-01-23 01:07:50
Score: 1
Natty:
Report link

Short Answer

No. In a standard mobile web app (including one built on Wix), there is no reliable or supported way to link users directly to the “Location” section of their device’s Settings app (whether on iOS or Android). You can detect if location is off and prompt them, but you cannot “deep-link” straight into those system settings from the browser.

I will suggest you display Instructions / Guides instead.

Reasons:
  • No code block (0.5):
  • Low reputation (0.5):
Posted by: Sofiyullahi Olamilekan J.

79379566

Date: 2025-01-23 00:56:48
Score: 2
Natty:
Report link

https://www.youIn just over 2 minutes this is the only video you'll need to watch to fix the error in Android studio. When trying to start the emulator; "The emulator process for AVD Pixel_4_API_30 has terminated. " Ensure you have sufficient hard disk drive space on your PC.

Important Link: https://learn.microsoft.com/en-us/cpp...tube.com/watch?v=cwRNx7vhF2w

Reasons:
  • Low length (0.5):
  • No code block (0.5):
  • Low reputation (1):
Posted by: EL AMRI ZAKARIYA

79379560

Date: 2025-01-23 00:53:47
Score: 0.5
Natty:
Report link

How can i write member controller*

using Microsoft.AspNetCore.Mvc;
using Microsoft.EntityFrameworkCore;
using Woody_Mvc.DAL;
using Woody_Mvc.Models;
using Woody_Mvc.Helpers.Extensions;
using Woody_Mvc.ViewModels.TeamMember;

namespace Woody_Mvc.Areas.Manage.Controllers
{
    [Area("Manage")]
    public class MemberController : Controller
    {
        AppDbContext _context;
        private readonly IWebHostEnvironment _env;

        public MemberController(AppDbContext context, IWebHostEnvironment env)
        {
            _context = context;
            _env = env;
        }

        public async Task<IActionResult> Index()
        {
            List<TeamMember> teamMembers = await _context.TeamMembers.Include(x=>x.Position).ToListAsync();
            return View(teamMembers);
        }

        public IActionResult Create()
        {
          ViewBag.Positions = _context.Positions.ToList();
            return View();
        }

        [HttpPost]
        public async Task<IActionResult> Create(CreateTeamMemberVm createTeamMemberVm)
        {
            ViewBag.Positions =await _context.Positions.ToListAsync();

            if (!ModelState.IsValid)
            return View(createTeamMemberVm);

            if(!createTeamMemberVm.File.ContentType.Contains("image"))
            {
                ModelState.AddModelError("File", "Duzgun sekil formati daxil edin");
                return View(createTeamMemberVm);
            }

            if(createTeamMemberVm.File.Length > 2097152)
            {
                ModelState.AddModelError("File", "Sekil olcusu max 2 mq ola biler!");
                return View(createTeamMemberVm);
            }

            TeamMember team_Member = new TeamMember()
            {
                Name = createTeamMemberVm.Name,
                positionId = createTeamMemberVm.positionId,
                ImgUrl = createTeamMemberVm.File.Upload(_env.WebRootPath, "Upload/TeamMember")

            };
            await _context.TeamMembers.AddAsync(team_Member);
            await _context.SaveChangesAsync();
            return RedirectToAction("Index");

        }

        public async Task<IActionResult> Delete(int? id)
        {
            if (id == null)
                return BadRequest();

            TeamMember? teamMember = _context.TeamMembers.FirstOrDefault(x => x.Id == id);
            if (teamMember == null)
                return NotFound();

             _context.TeamMembers.Remove(teamMember);
            await _context.SaveChangesAsync();
            return RedirectToAction("Index");
        }

        public async Task<IActionResult> Update(int? id)
        {
            ViewBag.Positions =await _context.Positions.ToListAsync();
            if (id == null)
                return BadRequest();
             
            TeamMember? teamMember = await _context.TeamMembers.FirstOrDefaultAsync(x=>x.Id == id);

            if(teamMember == null)
                return NotFound();

            UpdateTeamMemberVm updateTeamMemberVm = new UpdateTeamMemberVm()
            { 
             Id = teamMember.Id,
             Name = teamMember.Name,
             positionId = teamMember.positionId
            };

            return View(updateTeamMemberVm);

        }

        [HttpPost]
        public async Task<IActionResult> Update(UpdateTeamMemberVm updateTeamMemberVm)
        {
            ViewBag.Positions =await _context.Positions.ToListAsync();

            if(!ModelState.IsValid)
                return View(updateTeamMemberVm);

            TeamMember? teamMember = await _context.TeamMembers.FirstOrDefaultAsync(x=>x.Id==updateTeamMemberVm.Id);

            if( teamMember == null)
                return NotFound();


            teamMember.Name = updateTeamMemberVm.Name;
                teamMember.positionId = updateTeamMemberVm.positionId;
              

           
            

            if (updateTeamMemberVm.File != null)
            {
                if (!updateTeamMemberVm.File.ContentType.Contains("image"))
                {
                    ModelState.AddModelError("File", "Duzgun sekil formati daxil edin");
                    return View(updateTeamMemberVm);
                }

                if(updateTeamMemberVm.File.Length > 2097152)
                {
                    ModelState.AddModelError("File", "Sekilin olcusu max 2 mq ola biler");
                    return View(updateTeamMemberVm);
                }

                FileExtension.DeleteFile(_env.WebRootPath, "Upload/TeamMember", teamMember.ImgUrl);
                teamMember.ImgUrl = updateTeamMemberVm.File.Upload(_env.WebRootPath, "Upload/TeamMember");
            }

            await _context.SaveChangesAsync();
            return RedirectToAction("Index");


        }
    }
}
Reasons:
  • Blacklisted phrase (0.5): How can i
  • Long answer (-1):
  • Has code block (-0.5):
  • Starts with a question (0.5): How can i
  • Low reputation (1):
Posted by: blabla

79379558

Date: 2025-01-23 00:46:46
Score: 0.5
Natty:
Report link

You can't assume (as you do seem to be assuming) that the data written by one side using a single send() call will be received by the other side in a single recv() call.

Depending on the amount of data and timing of network packet transmission, it's possible that send() will split your buffer into multiple packets, each of which will get received by a separate recv() call on the other side.

In other words, you need to implement some kind of command/response protocol, incorporating some kind of framing, on top of the byte streams that TCP is giving you.

You could alternatively switch from TCP to UDP, and use UDP packet boundaries for framing.

IMO the most natural algorithm would be to keep TCP, and use newline-terminated commands and responses. Ie, the command ends when you see a newline, not necessarily whenever recv() returns.

Reasons:
  • Long answer (-0.5):
  • No code block (0.5):
  • Low reputation (0.5):
Posted by: AnotherSmellyGeek

79379549

Date: 2025-01-23 00:42:45
Score: 1.5
Natty:
Report link

I was getting this error with Angular 14 on node v18.17.1. I added this to my package.json and it solved the issue "@types/node": "^16.18.50"

Reasons:
  • Low length (1):
  • Has code block (-0.5):
  • Single line (0.5):
  • Low reputation (0.5):
Posted by: gamelover42

79379539

Date: 2025-01-23 00:29:42
Score: 2.5
Natty:
Report link

Elimina cache,

npm cache clean --force

luego

npm install

y ya luego levanta el servidor.

Reasons:
  • Low length (1):
  • No code block (0.5):
  • Low reputation (1):
Posted by: Nestor Yara Gonzalez

79379528

Date: 2025-01-23 00:23:41
Score: 3.5
Natty:
Report link

This was an error on my part. PhotosKit fetched the correct amount of photos, my code just didn't run through it all.

Thanks to those who attempted to help!

Reasons:
  • Blacklisted phrase (0.5): Thanks
  • Low length (1):
  • No code block (0.5):
  • Self-answer (0.5):
  • Low reputation (1):
Posted by: SKI79

79379526

Date: 2025-01-23 00:21:40
Score: 3.5
Natty:
Report link

I experience same error, but figureout my email password contains a # wich is a comment simbol in .env file, so the password cuts. Verify if is the same case.

Reasons:
  • Low length (1):
  • No code block (0.5):
  • Unregistered user (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: Jose Luis Gonzalez

79379516

Date: 2025-01-23 00:12:38
Score: 3.5
Natty:
Report link

For those who prefer VSC, Visual Studio Code, and other IDE's with select your entire line, the best I have managed on this program is settings:

  LINE START      = "  ctrl + ;  "
  SELECT LINE END = "  ctrl + L  "

This creates something as close to VSC as I could manage with the two keys to create the action next to each other near ' ctrl + L ' which is the vsc command. Very surprised Eclipse does not have this feature.

Also tried setting SELECT LINE END and SELECT LINE HOME to the same key hoping it would execute both commands at once and select the whole line. No luck! Was looking forward to using eclipse but just have spent couple thousand hours in vsc which i love. If anyone finds a workaround, please let us know.

Reasons:
  • Blacklisted phrase (1): No luck
  • RegEx Blacklisted phrase (2.5): please let us know
  • Long answer (-0.5):
  • Has code block (-0.5):
  • Low reputation (1):
Posted by: ColoredRunes

79379512

Date: 2025-01-23 00:09:37
Score: 11.5
Natty: 9.5
Report link

i have a similar problem, may i ask u hpw u solved it?

Reasons:
  • Blacklisted phrase (1): i have a similar problem
  • Blacklisted phrase (1): may i ask
  • RegEx Blacklisted phrase (1.5): solved it?
  • Low length (1.5):
  • No code block (0.5):
  • Me too answer (2.5): i have a similar problem
  • Ends in question mark (2):
  • Single line (0.5):
  • Low reputation (1):
Posted by: Alessandro Ercini

79379510

Date: 2025-01-23 00:07:36
Score: 2
Natty:
Report link

This is most likely because there's no such symbols in glibc.

You're correct. To use this on a Raspberry Pi, you could always run Android.

Reasons:
  • Low length (1):
  • No code block (0.5):
  • Low reputation (0.5):
Posted by: John Dallman

79379509

Date: 2025-01-23 00:07:36
Score: 3
Natty:
Report link

@Hardy what if the number sent stop after joining. Both messages will be available. You will end up with those who joined even if they left already.

We need to know the active recipients of the current sandbox.

Reasons:
  • Low length (0.5):
  • No code block (0.5):
  • User mentioned (1): @Hardy
  • Low reputation (1):
Posted by: Shangab

79379507

Date: 2025-01-23 00:07:36
Score: 1.5
Natty:
Report link

In my mac, I use brew to install my python, so I can invoke python with the exactly version and create the venv with like:

python3.8 -m venv venv
Reasons:
  • Low length (1):
  • Has code block (-0.5):
  • Low reputation (1):
Posted by: Cesar Bouli

79379503

Date: 2025-01-23 00:05:36
Score: 3
Natty:
Report link

My banned account has been recovered massively on tiktok by a specialist ethical recovery assistance called Xiaospy1.

Reasons:
  • Low length (1):
  • No code block (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: Ouellette Jones

79379498

Date: 2025-01-23 00:02:35
Score: 12
Natty: 7.5
Report link

I have the same problem. Did you find the answer? What was wrong?

Reasons:
  • Blacklisted phrase (1): I have the same problem
  • RegEx Blacklisted phrase (3): Did you find the answer
  • Low length (1.5):
  • No code block (0.5):
  • Me too answer (2.5): I have the same problem
  • Ends in question mark (2):
  • Single line (0.5):
  • Low reputation (1):
Posted by: Tomas

79379490

Date: 2025-01-22 23:57:34
Score: 0.5
Natty:
Report link

You need to both install dotnet-tool and set up path so that it is found:

RUN dotnet tool install --global dotnet-ef
ENV PATH="$PATH:/root/.dotnet/tools"
RUN dotnet ef database update
Reasons:
  • Low length (0.5):
  • Has code block (-0.5):
  • Low reputation (0.5):
Posted by: wikwoj

79379477

Date: 2025-01-22 23:48:32
Score: 3
Natty:
Report link

Verify that GCC compiler debugging is enabled:

Properties > C/C++ Build > Settings MCU GCC Compiler > Debugging Debug Level - Default

Reasons:
  • Low length (1):
  • No code block (0.5):
  • Unregistered user (0.5):
  • Low reputation (1):
Posted by: W Tipton

79379462

Date: 2025-01-22 23:39:29
Score: 0.5
Natty:
Report link

Adding this to your android/app/build.gradle fixed the issue:

kotlinOptions {
    jvmTarget = JavaVersion.VERSION_1_8
}

enter image description here

Reasons:
  • Probably link only (1):
  • Low length (1):
  • Has code block (-0.5):
  • High reputation (-1):
Posted by: ahmnouira

79379454

Date: 2025-01-22 23:30:27
Score: 1.5
Natty:
Report link

Use https://developers.cloudflare.com/pages/how-to/www-redirect/.

Reasons:
  • Probably link only (1):
  • Low length (1.5):
  • Has code block (-0.5):
  • Self-answer (0.5):
  • High reputation (-1):
Posted by: Foobar

79379433

Date: 2025-01-22 23:14:24
Score: 0.5
Natty:
Report link

enter image description here

I faced the same error, when I tried to run a maven project in the Eclipse IDE, what I solved was to delete the .metadata folder from eclipse-workspace, I hope I helped!

Reasons:
  • Blacklisted phrase (1): enter image description here
  • Whitelisted phrase (-2): I solved
  • Low length (1):
  • Has code block (-0.5):
  • Low reputation (1):
Posted by: Lima Ismael

79379431

Date: 2025-01-22 23:13:24
Score: 2.5
Natty:
Report link

As of 1/2025 just adding the below to the devcontainer.json fixed the issue for me:

"forwardPorts": [5173]"

Reasons:
  • Low length (1):
  • No code block (0.5):
  • Low reputation (1):
Posted by: SoonersBaby

79379430

Date: 2025-01-22 23:13:24
Score: 1
Natty:
Report link

Here is a hacky solution that does the job for now.

if (knitr::is_html_output()) {
  knitreg. = texreg::htmlreg
} else {
  knitreg. = texreg::knitreg
}
Reasons:
  • Low length (1):
  • Has code block (-0.5):
  • Self-answer (0.5):
Posted by: John-Henry

79379412

Date: 2025-01-22 23:02:22
Score: 2
Natty:
Report link

0stone0 is absolutely right. But if you want to use constants instead of typing strings you can do it this way:

from telegram import ReactionTypeEmoji, constants

bot.set_message_reaction(message.chat.id, message.id, [ReactionTypeEmoji(constants.ReactionEmoji.ALIEN_MONSTER)], is_big=False)

Reasons:
  • Low length (0.5):
  • No code block (0.5):
  • Low reputation (1):
Posted by: David Pereda

79379393

Date: 2025-01-22 22:48:20
Score: 1
Natty:
Report link

Using the cryptography library (the linked ed25519 library looks abandoned at this point):

from cryptography.hazmat.primitives import serialization

with open('private_key.pem', 'rb') as f:
    # returns Ed25519PrivateKey
    ed_priv = serialization.load_pem_private_key(f.read(), password=None)
    
signature = ed_priv.sign(b"my authenticated message") 

For other methods see https://cryptography.io/en/latest/hazmat/primitives/asymmetric/ed25519/

Reasons:
  • Probably link only (1):
  • Has code block (-0.5):
  • Low reputation (0.5):
Posted by: AFOC

79379386

Date: 2025-01-22 22:44:19
Score: 3.5
Natty:
Report link

How to fix image loading error in Flutter web project when running on Chrome?

I encountered an issue while loading images in my Flutter web project. I was getting an error and the images weren't displaying as expected. After searching and trying a few things, I found a solution that worked for me.

Solution:

You can run your Flutter web project on Chrome with the following command:

**

**

flutter run -d chrome --web-renderer html

This command resolved the issue of loading images in my project. If you're facing a similar problem, try using this command to see if it helps!

Here is the link i have checked to fix the error : https://www.youtube.com/watch?v=NljAhIQXcjw

Reasons:
  • Blacklisted phrase (1): youtube.com
  • Blacklisted phrase (1): Here is the link
  • Whitelisted phrase (-1): worked for me
  • Whitelisted phrase (-2): Solution:
  • Long answer (-0.5):
  • No code block (0.5):
  • Me too answer (2.5): facing a similar problem
  • Contains question mark (0.5):
  • Starts with a question (0.5): How to fix
  • Low reputation (1):
Posted by: rita magdy

79379374

Date: 2025-01-22 22:35:18
Score: 2
Natty:
Report link

In my case the issue was with the sheet names. I was using different sheet name with no spaces in in it when they had spaces. Please keep in mind that the message "The requested resource doesn't exist" doesn't always mean the id of the file is incorrect buy if the sheet name is incorrect it might also happen.

Reasons:
  • No code block (0.5):
  • Self-answer (0.5):
  • Single line (0.5):
  • Low reputation (0.5):
Posted by: Rui Sousa

79379371

Date: 2025-01-22 22:33:18
Score: 0.5
Natty:
Report link

How I should be able to use Microsoft Power BI API for delete workspaces? When I created a workspaces linked to service entity profile I did so:

public function createWorkspace($accessToken, $profileId, $workspaceName)
{
    $response = Http::withHeaders([
        'Authorization' => 'Bearer ' . $accessToken,
        'X-PowerBI-Profile-Id' => $profileId,
        'Content-Type' => 'application/json',
    ])->post($this->baseUrl . 'groups', [
        'name' => $workspaceName,
    ]);

    if ($response->successful()) {
        return $response->json();
    }

    throw new \Exception('Error creating workspace: ' . $response->body());
}     

Then I grant access permissions like this:

public function grantAccessPermissions($accessToken, $workspaceId, $profileId)
{
    $response = Http::withHeaders([
        'Authorization' => 'Bearer ' . $accessToken,
        'Content-Type' => 'application/json',
        'X-PowerBI-Profile-Id' => $profileId,
    ])->post($this->baseUrl . 'groups/' . $workspaceId . '/users', [
        'groupUserAccessRight' => 'Admin',
        'identifier' => '487eabe2-22ea-4419-b8f9-e7f09fa0b875',
        'principalType' => 'User',
        'emailAddress' => '###@####.onmicrosoft.com'
    ]);

    if ($response->successful()) {
        Log::info('Respuesta de grantAccessPermissions: ' . json_encode($response->json()));
        return $response->json();
    }

    throw new \Exception('Error granting access permissions: ' . $response->body());
}  

Right here I send the 'emailAddress' parameter in request body which is 'Admin' of premium capacity assigned to service principal. And the workspace is showing in Power BI Service correctly.

But I can't delete the workspace created.

public function deleteWorkspace($accessToken, $workspaceId)
{
    if (empty($workspaceId)) {
        throw new \Exception('El Workspace ID no puede estar vacío.');
    }
    Log::info('Workspace ID que llega a deleteWorkspace: ' . $workspaceId);
    $response = Http::withHeaders([
        'Authorization' => 'Bearer ' . $accessToken,
        'Content-Type' => 'application/json',
    ])->delete($this->baseUrl . 'groups/' . $workspaceId);

    if ($response->successful()) {
        return $response->json();
    }

    throw new \Exception('Error deleting workspace: ' . $response->body());
}

I receive this response: PowerBINotAuthorizedException

Reasons:
  • Long answer (-1):
  • Has code block (-0.5):
  • Contains question mark (0.5):
  • Starts with a question (0.5): How I
  • Low reputation (1):
Posted by: David Monreal

79379369

Date: 2025-01-22 22:32:15
Score: 15.5 🚩
Natty: 5
Report link

Did you solve the problem? I have the same issue I cant find the solution. Would be great if you can give an advice.

Reasons:
  • Blacklisted phrase (1): I have the same issue
  • RegEx Blacklisted phrase (3): Did you solve the problem
  • RegEx Blacklisted phrase (1.5): solve the problem?
  • RegEx Blacklisted phrase (1.5): cant find the solution
  • RegEx Blacklisted phrase (2): cant find the solution
  • Low length (1):
  • No code block (0.5):
  • Me too answer (2.5): I have the same issue
  • Contains question mark (0.5):
  • Single line (0.5):
  • Starts with a question (0.5): Did you solve the
  • Low reputation (1):
Posted by: Pavel Konoshchenko

79379358

Date: 2025-01-22 22:26:13
Score: 4
Natty:
Report link

You did not show the error logs. If you can show the error logs I think it can help us know how to help you.

Reasons:
  • RegEx Blacklisted phrase (1): help us
  • Low length (1):
  • No code block (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: Igwe Ugochukwu

79379357

Date: 2025-01-22 22:26:13
Score: 1
Natty:
Report link

If the container is already created.

  1. Stop the container
docker stop <container_name>
  1. Commit the container
docker commit keycloak keycloak2
  1. Rerun with new port
docker run -p 28080:28080 -td keycloak2 start-dev --http-port=28080
Reasons:
  • Low length (0.5):
  • Has code block (-0.5):
  • Low reputation (1):
Posted by: cnichols

79379354

Date: 2025-01-22 22:25:12
Score: 5
Natty: 5.5
Report link

Amazon has released a new feature that can convert windows 11 iso to ami https://aws.amazon.com/about-aws/whats-new/2025/01/ec2-image-builder-converting-windows-iso-files-amis/

Reasons:
  • Probably link only (1):
  • Low length (1.5):
  • No code block (0.5):
  • Unregistered user (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: bigbuckle

79379351

Date: 2025-01-22 22:23:12
Score: 0.5
Natty:
Report link

Yes, this can happen. Just like how prefetching (where email servers/providers pre-load email content before the user has opened the email) can inflate your open rates, links can also be "clicked" by email servers before actually clicked by a user. This is usually a security measure, where the system is checking the link for safety. But these types of clicks can usually be identified by the system, and thus excluded from the open rates they show you.

I have 9 years experience working at companies that allow people to send marketing emails, in roles ranging from tech support to product management, and I have seen instances where the filtering didn't happen as it's supposed to. These have been low-impact bugs, not very common and pretty quickly fixed. Within email campaigns where this happened, I don't recall specific numbers that were seen in terms of normal vs. abnormal click rates.

If you're sending emails and seeing way more clicks than usual, happening almost immediately, this might be the case for you. I'd suggest comparing like-to-like when looking into this, though - a "reset password" email campaign is going to have way more fast clicks than your standard marketing promo campaign, for example, and audience engagement varies. So look at the history for your particular emails and audience to get an idea of what's likely happening for you.

Reasons:
  • Long answer (-1):
  • No code block (0.5):
  • Low reputation (1):
Posted by: SV23

79379348

Date: 2025-01-22 22:21:11
Score: 2.5
Natty:
Report link

// Create requirements file for all installed pakages

pip freeze > requirements.txt

// Create requirements file for only imported pakages

pip install pipreqs

pipreqs . --force

Reasons:
  • Low length (1):
  • No code block (0.5):
  • Low reputation (1):
Posted by: Nader Naderi

79379344

Date: 2025-01-22 22:18:10
Score: 4.5
Natty: 5.5
Report link

Do you maybe have code for this photo? (smiley). I need this for my maths project.

Reasons:
  • Blacklisted phrase (0.5): I need
  • Low length (1.5):
  • No code block (0.5):
  • Contains question mark (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: Grupa Crteži

79379338

Date: 2025-01-22 22:13:09
Score: 2
Natty:
Report link

The issue might be a merge conflict caused by working on the project simultaneously on different machines. This happened to me by having the project open on laptop and desktop at the same time. Digging around, I found this reddit post, with instructions on how to change the .tscn-file with a text editor. The trick is correcting duplicate id's of loading resources caused by the merge conflict.

https://www.reddit.com/r/godot/comments/6ntejk/tips_how_to_fix_merge_conflict_with_tscn_files/

Reasons:
  • No code block (0.5):
  • Unregistered user (0.5):
  • Low reputation (1):
Posted by: sdconnected

79379337

Date: 2025-01-22 22:13:09
Score: 0.5
Natty:
Report link

Old question, but still hard to find an answer to it.

The only way I could find to prevent AcceptJSUI from scrolling was to remove the window.scrollTo() function before the AcceptJS.UI script was loaded.

window.scrollTo = function(y, x) {
  console.log("prevented scroll to " + x + ", " + y);
};
Reasons:
  • Low length (0.5):
  • Has code block (-0.5):
  • Low reputation (0.5):
Posted by: daggerhart

79379334

Date: 2025-01-22 22:11:09
Score: 3.5
Natty:
Report link

Google definitely messed up this email

Reasons:
  • Low length (2):
  • No code block (0.5):
  • Single line (0.5):
  • Low reputation (0.5):
Posted by: Jdban101

79379313

Date: 2025-01-22 22:00:06
Score: 1.5
Natty:
Report link

Just found solution accidentally, have no idea why it is working like below:

LOWER(e.description) LIKE LOWER(CONCAT('%',:text,'%')) OR :text IS NULL)

Reasons:
  • Low length (1):
  • Has code block (-0.5):
  • Low reputation (1):
Posted by: hardequation

79379312

Date: 2025-01-22 22:00:06
Score: 2.5
Natty:
Report link

THIS IS A LIFESAVER! I've been using java1.8(INTEL VERSION) for like a year. 110% CPU usage.

I updated to java17-coretto(APPLE VERSION) and now it is lightning fast (7% CPU)

Reasons:
  • Low length (1):
  • No code block (0.5):
  • Low reputation (1):
Posted by: JFergusooon

79379311

Date: 2025-01-22 21:59:06
Score: 1.5
Natty:
Report link

As I typed this out and looked at the documentation the answer is actually very stupid.

 {
  "ContainerOverrides": {
    "Environment": [
      {
        "Name": "FILE_NAME",
        "Value": "<object_key>"
      }
    ]
  }
}

It simply just required Capitalisation of each word

Reasons:
  • Low length (0.5):
  • Has code block (-0.5):
  • Self-answer (0.5):
  • Low reputation (1):
Posted by: IdentityTheft42069

79379310

Date: 2025-01-22 21:57:05
Score: 1.5
Natty:
Report link

Don't really get what you mean exactly by check for H6 <> what is <> in your description? The exact values, a hint to a possible string interpolation?

If understood your question correctly, you can basically:

=IF(F6="YES", EDATE(B6,3), 
   IF(F6="NO", EDATE(H6,3), 
     IF(F6="MAYBE", EDATE(B6,6), 
       IF(F6="UNKNOWN", EDATE(H6,6),
       "[Error]: Invalid Condition")
     )
   )
)

enter image description here

Reasons:
  • Probably link only (1):
  • Has code block (-0.5):
  • Contains question mark (0.5):
  • Low reputation (0.5):
Posted by: Reanimated Man X

79379308

Date: 2025-01-22 21:57:05
Score: 1.5
Natty:
Report link

If anyone else is still dealing with legacy software and encountering this, go to Credential Manager under the Control Panel and see if you have credentials for the web server under your "Windows Credentials". If you are, you can remove the credential and it should no longer log in with your admin account.

Reasons:
  • Low length (0.5):
  • No code block (0.5):
  • Single line (0.5):
Posted by: Taraz

79379301

Date: 2025-01-22 21:55:05
Score: 2.5
Natty:
Report link

pythonanywhere does not support MSSQL ODBC driver installation due to its licencing issues & user consent - link here to forum

Reasons:
  • Low length (1):
  • No code block (0.5):
  • Single line (0.5):
  • Low reputation (0.5):
Posted by: Ananda Prasad Bandaru

79379300

Date: 2025-01-22 21:54:04
Score: 2
Natty:
Report link

We have also experienced this issue and have implemented a workaround. I have documented the solution in this repository: https://github.com/Matdata-eu/jena-riot-literal-as-subject-issue-workaround

In summary: use a python script with rdflib to filter the triples that have a literal as subject.

Reasons:
  • Low length (0.5):
  • No code block (0.5):
  • Low reputation (1):
Posted by: Mathias Vanden Auweele

79379276

Date: 2025-01-22 21:43:02
Score: 0.5
Natty:
Report link

The problem was in the property I used to declare the response URI :

Calendar.Events.Watch watched = calendar.events().watch(
                "primary",
                new Channel()
                        .setId(uuid)
                        .setType("web_hook")
                        .setAddress(uri.toURL().toString())
        );

Notice the change : setAddress(uri) instead of setResourceUri(uri)

Reasons:
  • Has code block (-0.5):
  • Self-answer (0.5):
  • Low reputation (0.5):
Posted by: Lovegiver

79379272

Date: 2025-01-22 21:41:02
Score: 1
Natty:
Report link

In dbt 1.4 the flags warn_error and warn_error_options are defined in profiles.yml:

config:
  warn_error: true
  warn_error_options: 
    include: all
    exclude:
      - NoNodesForSelectionCriteria

Reference: https://github.com/dbt-labs/docs.getdbt.com/blob/1a9ca4d4594fbcf683d260afc83927262b5582a1/website/docs/reference/global-configs.md#warnings-as-errors

Note that the version 1.4 is no longer supported. See https://docs.getdbt.com/docs/dbt-versions/core

Reasons:
  • Probably link only (1):
  • Low length (0.5):
  • Has code block (-0.5):
Posted by: Damião Martins

79379264

Date: 2025-01-22 21:36:00
Score: 8.5 🚩
Natty: 5.5
Report link

Have you managed to find a solutions for this?

Reasons:
  • Blacklisted phrase (3): Have you managed
  • Low length (1.5):
  • No code block (0.5):
  • Ends in question mark (2):
  • Single line (0.5):
  • Low reputation (1):
Posted by: Battousai

79379260

Date: 2025-01-22 21:34:59
Score: 1.5
Natty:
Report link

The problem was the identifier in tauri.conf.json.

It was com.myproject.app which Mac was treating as an executable. I changed it:

"identifier": "com.myproject",

Reasons:
  • Low length (1):
  • Has code block (-0.5):
  • Self-answer (0.5):
  • Low reputation (0.5):
Posted by: tfantina

79379254

Date: 2025-01-22 21:29:58
Score: 2
Natty:
Report link

There are few steps to build geometrical objects:

  1. To add points
  2. To add curves (lines) through the points
  3. To define cycles for surfaces through the
  4. To add surfaces (faces) through cycles
  5. To define surface cycles through the surfaces
  6. To add volumes through surface cycles.

All is well written in Gmsh's docs.

Reasons:
  • Low length (0.5):
  • No code block (0.5):
  • Low reputation (1):
Posted by: Michael Ermakov

79379245

Date: 2025-01-22 21:26:57
Score: 0.5
Natty:
Report link

Issue is most likely related to how ARIA attributes interact with focus managment in nested accordions. when expanding accordion or collapsing focus can inadvertenly move to a descendant and cause parent to interpret this as a collapse.


there are few ways of handling this, not sure what is your use case but you can try at least to use any of these methods to suit your needs


Control Focus Managment Explicitly


    import { Component, ElementRef, ViewChild } from '@angular/core';
    
    @Component({
      selector: 'app-accordion',
      template: `
        <button #accordionHeader (click)="toggleAccordion()">Accordion Header</button>
        @if (isExpanded) {
          <div role="region">
            <p>Content here...</p>
          </div>
        }
      `,
    })
    export class AccordionComponent {
      @ViewChild('accordionHeader') accordionHeader!: ElementRef<HTMLButtonElement>;
      isExpanded = false;
    
      toggleAccordion() {
        this.isExpanded = !this.isExpanded;
        this.accordionHeader.nativeElement.focus();
      }
    }

Update ARIA attributes Dynamically

<button
  (click)="toggleAccordion()"
  [attr.aria-expanded]="isExpanded"
  aria-controls="panel"
>
  Accordion Header
</button>
<div id="panel" [attr.aria-hidden]="!isExpanded" *ngIf="isExpanded">
  <p>Content...</p>
</div>

these two solutions won't be accurate as you did not provide any code what so ever so either you could provide us some code to look at or try these two and leave a comment which of them helped you out.

Reasons:
  • Blacklisted phrase (1): what is your
  • Long answer (-1):
  • Has code block (-0.5):
  • Low reputation (1):
Posted by: David Khvedelidze

79379242

Date: 2025-01-22 21:24:57
Score: 1
Natty:
Report link

CQS: It is a programming principle that says you should separate operations that change data (commands) from those that read data (queries). If you have a method, for instance, it should either return something or update something, but not both.

CQRS: By dividing the design of the entire system into two sections, one for managing commands (writing or modifying data) and another for managing queries (reading data), CQRS expands on this idea. Each side can have its own database or model to optimize how they work.

So, CQS is the basic rule, and CQRS is like an advanced version of it used for bigger systems where you want to handle reading and writing differently.

Reasons:
  • Long answer (-0.5):
  • No code block (0.5):
  • Low reputation (1):
Posted by: Hassan Vaezzadeh

79379237

Date: 2025-01-22 21:21:56
Score: 0.5
Natty:
Report link

My name is Michel, and I am a Full Stack Developer & DevOps. I know the question was posted some time ago, but it remains relevant. Based on my experience with WordPress, AWS, and large-scale, high-performance projects, as well as frequent contact with smaller projects and questions from other professionals in the field, I can confidently say that the issue is still valid.

My recommendation for hosting a WordPress application on AWS, based on various tests and projects I manage, is to use AWS Elastic Beanstalk to orchestrate EC2 instances, even if it is a project with just one instance. Elastic Beanstalk significantly simplifies infrastructure management, the deployment process, and maintenance, while also offering advanced scalability control. In some projects, I use auto-scaling, which adds or removes EC2 instances as needed, ensuring scalability and cost optimization.

Regarding architecture, it is entirely possible to run WordPress on multiple load-balanced instances. The key lies in implementing a distributed architecture. While EC2 instances process PHP with NGINX, WordPress media files can be stored in EFS (Elastic File System), allowing sharing and synchronization across all instances. For the database, the best approach is to use Amazon RDS with MySQL or Aurora.

Additionally, to improve performance, I recommend using ElastiCache to optimize database queries and AWS CloudFront to efficiently serve static content. By applying appropriate caching rules for different types of files, it is possible to achieve high performance and significantly reduce the page processing load on each request.

This is an overview of the architecture I have been using and refining over the years, with excellent results in content portals, e-commerce sites, and SaaS platforms based on WordPress on AWS.

If you would like to discuss this topic further, I am available. I hope I have helped clarify your question!

Reasons:
  • Long answer (-1):
  • No code block (0.5):
  • Low reputation (1):
Posted by: Michel Salvado

79379234

Date: 2025-01-22 21:20:55
Score: 3
Natty:
Report link

If by project you mean an opened folder or repository, then just put different .vscode/settings.json inside of each project and that should be it

Reasons:
  • Low length (1):
  • No code block (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: malyshchyk

79379227

Date: 2025-01-22 21:17:53
Score: 6.5 🚩
Natty: 5.5
Report link

Where did you put empty_values=()?

Reasons:
  • Low length (2):
  • No code block (0.5):
  • Ends in question mark (2):
  • Single line (0.5):
  • Starts with a question (0.5): Where did you
  • Low reputation (1):
Posted by: RAFAEL NASCIMENTO

79379226

Date: 2025-01-22 21:17:53
Score: 1.5
Natty:
Report link

on MYSQL workbench the solution is SELECT idcategoriaespecifica, nombre FROM table ce WHERE MATCH (ce.column1) AGAINST ('VALUE1 VALUES2')

In the against just put the values you want to search but with a space between them

Reasons:
  • Whitelisted phrase (-1): solution is
  • Low length (0.5):
  • No code block (0.5):
  • Unregistered user (0.5):
  • Low reputation (1):
Posted by: Deix

79379212

Date: 2025-01-22 21:09:51
Score: 0.5
Natty:
Report link

You can use

summary::marker {
  content: none;
}
Reasons:
  • Whitelisted phrase (-1.5): You can use
  • Low length (1.5):
  • Has code block (-0.5):
  • Low reputation (1):
Posted by: Shashwat Tiwari

79379201

Date: 2025-01-22 21:03:49
Score: 2.5
Natty:
Report link

From my testing, it seems that Railway doesn't support hosting WebSocket connections. If you're looking for an alternative, I recommend using Render: https://render.com/

Reasons:
  • Low length (1):
  • No code block (0.5):
  • Low reputation (1):
Posted by: Alex Harlan

79379182

Date: 2025-01-22 20:53:46
Score: 4
Natty:
Report link

use this IP - http://10.0.2.2/,

instead of http://localhost/ and http://127.0.0.1/

Reasons:
  • Probably link only (1):
  • Low length (1.5):
  • No code block (0.5):
  • Low reputation (1):
Posted by: jsxtech

79379176

Date: 2025-01-22 20:49:45
Score: 1
Natty:
Report link

The stage you mentioned, sfc-eu-ds1-9-customer-stage, is an internal Snowflake stage assigned to your account. This endpoint is used in the backend to connect to the cloud storage service Snowflake uses for your account. Clients use it for PUT/GET operations and to fetch persisted or large query results.

Please note that these S3 buckets are not directly accessible, so Snowflake cannot share the credentials for them.

However, you upload and download files from a Snowflake internal/external stage, you must use the following minimum versions of the NodeJS driver:

Version 1.6.2 to upload files (using the PUT command) Version 1.6.6 to download files (using the GET command)

References:

https://docs.snowflake.com/developer-guide/node-js/nodejs-driver#uploading-a-file-to-a-snowflake-stage https://docs.snowflake.com/en/sql-reference/sql/create-stage

Reasons:
  • Long answer (-0.5):
  • No code block (0.5):
  • Low reputation (1):
Posted by: Harshad Gore

79379172

Date: 2025-01-22 20:47:45
Score: 1
Natty:
Report link

Portable Nucleotide String Compression: Part I, Endian Enigmas

The following is a discussion of some issues that arise when writing portable code in the context of compressing nucleotide text strings and producing the reverse complement of such strings, i.e. the reverse DNA strand.

Portability across both big- and little-endian architectures is required, so before we discuss compression schemes, let's first look at a little code that exposes the issue of "which"-endian:


main()
{
    char c[]="acgta";
    unsigned int a[2], i;

    for(i=0; i<5; i++) printf("address of c[%d] = %X\n", i, &c[i]);
    for(i=0; i<2; i++) printf("%X\n",((int *) c)[i]);

    a[0] = ((unsigned int *) c)[0] >> 8;

    printf("%X\n",a[0]);
    printf("%s\n",(char *) a);
}

The code says to print the address of each byte (%X = hex) of the text string acgta. Then cast the address of the c array to an unsigned int and display how the string is stored in two 4-byte words. Then we take the first 4-byte word, shift it to the right by 8 bits, store it in a[0], and look at it again. Finally we cast the address of the unsigned int a array containing that shifted word to be a character pointer, and see what string we get. On a big-endian machine we get

address of c[0] = 7FFF2F00
address of c[1] = 7FFF2F01
address of c[2] = 7FFF2F02
address of c[3] = 7FFF2F03
address of c[4] = 7FFF2F04
61636774
61002F4C
616367

As one might expect, each successive letter of the string occupies the next higher byte of memory. When we examine the string as a word of memory, we see 61636774 as the first word, e.g. acgt where a=0x61, c=0x63, g=0x67, and t=0x74. The second word is 61002F4C, which is an a, the last letter of the string, followed by the string null terminator (0x00) and whatever junk happened to be in the rest of the word (0x2F4C). The last entry, 0x00616367, is the shifted word with 0s filling in from the left. The 0s look like a null terminator so that when we ask to print out the string that (char *) a points to, we get only a newline from the printf statement.

Now let's look at output from the same code on a little-endian machine:

address of c[0] = BFFFFAD0
address of c[1] = BFFFFAD1
address of c[2] = BFFFFAD2
address of c[3] = BFFFFAD3
address of c[4] = BFFFFAD4
74676361
40000061
746763
cgt

Again, each successive letter of the string occupies the next higher byte of memory. When we examine the string as a word of memory, however, we see the letters reversed. This is sometimes explained by saying that the little endian scheme stores the least significant byte of an integer in the lowest address of a word, and the most significant byte of an integer in the highest address of a word. Big endian schemes do just the opposite. Since my computer prints the contents of a memory word (a number) on the screen in English (from left to right), the most significant byte will always on the left, followed by the lesser significant bytes to the right. For the programmer, it is conceptually easier to think of big endian machines as starting their first word of memory on the left and continuing to the right (like English), while little endian machines start their first word of memory on the right and continue to the left (like Hebrew). On a 32-bit machine this looks like:

Big-endian:

|<--------word0-------->|<--------word1-------->|<--etc-->|  
 byte0 byte1 byte2 byte3 byte4 byte5 byte6 byte7
   a     c     g     t     a    null

Little-endian:


|<--etc-->|<--------word1-------->|<--------word0-------->|  
           byte7 byte6 byte5 byte4 byte3 byte2 byte1 byte0
                        null   a     t     g     c     a

With this scheme in mind, we can now see why word0 prints out the way it does, and we can interpret the rest of the code output on a little-endian machine. Shifting the first word to the right results in byte0 falling off the word, instead of byte3 falling off as in a big-endian machine. The result is what we see, 0x00746763. Now when we ask for the string pointed to by (char *) a, we get cgt because the byte0 a fell off the word, and the 0s that filled in from the left became the null terminator.

The above example looked at something that was already in memory, placed there byte-by-byte from a text string. What happens when we want to put some value into a word ourselves? Look at the next code:

main()
{
    unsigned int i = 0x00006100;
    printf("%X\n", i);
    i = i >> 8;
    printf("%X\n", i);
    printf("%c\n", *((char *)&i));
}

The output on a big endian machine is:

6100
61

The output on a little endian machine is:

6100
61
a

What happened? Lets look at our mental picture when i is declared and assigned:

Big-endian:

|<--etc-->|<--------word0-------->|  
           byte3 byte2 byte1 byte0
            00    00    61    00

Little-endian:


|<--etc-->|<--------word0-------->|  
           byte3 byte2 byte1 byte0
            00    00    61    00

Both architectures print out the same thing for the integer as initially stored, and when the integer is shifted to the right. The difference happens when the address of i is cast to a (char *), dereferenced, and printed as a character. The big-endian machine prints out its byte0, which is null (we get a newline from the printf statement), while the little-endian machine prints out its byte0, which is the letter a. Code similar to this can be used in portability scenarios if it is important to determine which type endian-ness some application is running on.

Note that I've used unsigned int in these examples. If an int is signed, then 1s will be shifted in from the left if the leftmost bit is a 1, and we want 0s shifted in no matter what bit pattern is in the word. 0s fill in from the right during a left shift no matter if the variable is signed or unsigned.

As mentioned at the start of this article, these issues are being discussed in the context of encoding nucleotide text strings on different architectures. The nucleotide alphabet consists of only 4 characters, A, C, G, & T. When manipulating strings of these letters, it is desirable to compress the text strings such that each letter occupies only 2 bits in a word instead of 8. Let's look at some compression code for 2-bit encoding of nucleotide text strings on each architecture, and how to produce the reverse complement of a nucleotide string, i.e. the reverse DNA strand.

Portable Nucleotide String Compression: Part II, Shifty Characters

In Part I, we looked at Endian "Enigmas" in the context of bit shifting on different architectures. We did this because we want to be able to compress nucleotide text strings, made up entirely of just the four letters A, C, G, & T, into words containing 2-bit representations of each nucleotide. Thus a 32-bit word will contain 16 nucleotides, and a 64-bit word will contain 32, in both cases a compression factor approaching 4.

The compression is done simply by taking the 2-bit representation for each 8-bit ascii character and shifting it into its proper position within a word. If the bit patterns are A=00, C=01, G=11, & T=10, then on a big-endian machine the string acgta looks like:

uncompressed representation

  |<--------------word0-------------->|<--------------word1-------------->|
  |byte0---|byte1---|byte2---|byte3---|byte4---|byte5---|byte6---|byte7---|
   01100001 01100011 01100111 01110100 01100001 00000000 <------8-bit ascii
   a        c        g        t        a        null

compressed representation, 4 letters/byte


|<--------------word0-------------->|<--------------word1-------------->|
|byte0---|byte1---|byte2---|byte3---|byte4---|byte5---|byte6---|byte7---|
 00011110 00000000 00000000 00000000  <------ compressed 2-bit string
 a c g t  a null     padded zeros

Each 2-bit representation was shifted to the left on a big-endian machine. On a little-endian machine, we have to shift the other way:

uncompressed representation

  |<--------------word1-------------->|<--------------word0-------------->|
  |byte7---|byte6---|byte5---|byte4---|byte3---|byte2---|byte1---|byte0---|
  8-bit ascii -----> 00000000 01100001 01110100 01100111 01100011 01100001
                     null     a        t        g        c        a

compressed representation, 4 letters/byte

|<--------------word1-------------->|<--------------word0-------------->|
|byte7---|byte6---|byte5---|byte4---|byte3---|byte2---|byte1---|byte0---|
compressed 2-bit string ---------->  00000000 00000000 00000000 10110100
                                       padded zeros    null  a  t g c a

Note that in both cases, an a is 00, composed of the same zero bits used to pad the word. Thus when decompressing, one must know the number of letters that were compressed.

The 2-bit representations could have been found with a lookup table that translates each ascii character into its equivalent 2-bit representation, something like:

array[256];

array['A'] = array['a'] = 0x0;  <i>/* bit pattern 00 */</i>
array['C'] = array['c'] = 0x1;  <i>/* bit pattern 01 */</i>
array['G'] = array['g'] = 0x3;  <i>/* bit pattern 11 */</i>
array['T'] = array['t'] = 0x2;  <i>/* bit pattern 10 */</i>

Doing it this way is slow, however, having to do a lookup for each 8-bit character. An examination of the 8-bit ascii representations for the characters reveals that the desired 2-bit patterns for each letter are already unique within each ascii representation, and are case insensitive:

A 0100 0001
a 0110 0001
C 0100 0011
c 0110 0011
G 0100 0111
g 0110 0111
T 0101 0100
t 0111 0100
        ^^
        ||
        these two columns contain the desired 2-bit code

It is much faster to simply mask out the undesired bits and shift the desired bits to their proper location. If unc is an array of nucleotides in 8-bit ascii, then the following code fragment shows how to create one word of compressed data from 4 words of uncompressed on a big-endian machine, doing everything in the registers without additional load/stores:

                                    mask              shift  logical "or"
                                 ==========           =====  ============
compressed[0] = (               (0x06000000 & unc[0]) <<  5)   |
                (               (0x00060000 & unc[0]) << 11)   |
                (               (0x00000600 & unc[0]) << 17)   |
                (               (0x00000006 & unc[0]) << 23)   |
                ((unsigned long)(0x06000000 & unc[1]) >>  3)   |
                (               (0x00060000 & unc[1]) <<  3)   |
                (               (0x00000600 & unc[1]) <<  9)   |
                (               (0x00000006 & unc[1]) << 15)   |
                ((unsigned long)(0x06000000 & unc[2]) >> 11)   |
                ((unsigned long)(0x00060000 & unc[2]) >>  5)   |
                (               (0x00000600 & unc[2]) <<  1)   |
                (               (0x00000006 & unc[2]) <<  7)   |
                ((unsigned long)(0x06000000 & unc[3]) >> 19)   |
                ((unsigned long)(0x00060000 & unc[3]) >> 13)   |
                ((unsigned long)(0x00000600 & unc[3]) >>  7)   |
                ((unsigned long)(0x00000006 & unc[3]) >>  1);

masking turns bits off, while a logical "or" turns bits on.

The equivalent code on a little-endian machine looks like:

                                    mask              shift  logical "or"
                                 ==========           =====  ============
compressed[0] = ((unsigned long)(0x00000006 & unc[0]) >>  1)   |
                ((unsigned long)(0x00000600 & unc[0]) >>  7)   |
                ((unsigned long)(0x00060000 & unc[0]) >> 13)   |
                ((unsigned long)(0x06000000 & unc[0]) >> 19)   |
                (               (0x00000006 & unc[1]) <<  7)   |
                (               (0x00000600 & unc[1]) <<  1)   |
                ((unsigned long)(0x00060000 & unc[1]) >>  5)   |
                ((unsigned long)(0x06000000 & unc[1]) >> 11)   |
                (               (0x00000006 & unc[2]) << 15)   |
                (               (0x00000600 & unc[2]) <<  9)   |
                (               (0x00060000 & unc[2]) <<  3)   |
                ((unsigned long)(0x06000000 & unc[2]) >>  3)   |
                (               (0x00000006 & unc[3]) << 23)   |
                (               (0x00000600 & unc[3]) << 17)   |
                (               (0x00060000 & unc[3]) << 11)   |
                (               (0x06000000 & unc[3]) <<  5);

Note the mirror symmetry between the two code fragments.

Decompression is a little trickier because the prefix for a T (0101) is different than for the other letters (0100). We can determine T-ness in a register by doing an xor (^: exclusive or) of the 2-bit extraction with the 2-bit representation for T:

A^T = 00^10 = 10 
C^T = 01^10 = 11 
G^T = 11^10 = 01 
T^T = 10^10 = 00

Only T xor T yields a false bool value. Using this fact, the code on a big-endian machine to decode the first 1/4 of a compressed string could look like:

unc[0] = (((0xC0000000 & compressed[0]) ^ 0x80000000)?      /* is it a T? */
         (((unsigned long)(0xC0000000 & compressed[0]) >>  5) | 0x41000000):
           (0x54000000))  /* the letter T */
          |
         (((0x30000000 & compressed[0]) ^ 0x20000000)?      /* is it a T? */
         (((unsigned long)(0x30000000 & compressed[0]) >> 11) | 0x00410000):
           (0x00540000))  /* the letter T */
          |
         (((0x0C000000 & compressed[0]) ^ 0x08000000)?      /* is it a T? */
         (((unsigned long)(0x0C000000 & compressed[0]) >> 17) | 0x00004100):
           (0x00005400))  /* the letter T */
          |
         (((0x03000000 & compressed[0]) ^ 0x02000000)?      /* is it a T? */
         (((<unsigned long)(0x03000000 & compressed[0]) >> 23) | 0x00000041):
           (0x00000054)); /* the letter T */

Each successive 2-bit pair is masked out of the compressed input and xor-ed with 10. If that boolean is true, it is not a T, and we just shift the 2-bits into their proper place and add the remaining common bits. If it is a T, then we just return a T in the proper location. unc[1], unc[2], and unc[3] are similarly computed with the other 3/4 of the compressed word. For a little-endian machine, the same idea prevails with only different masking and shifting.

The same ideas presented above can also be used to do 4-bit and 5-bit compression, where 5-bit covers the entire alphabet.

Finally, note that it is easy to produce the reverse complement of a compressed nucleotide string. Along a double helix of dna, each nucleotide is paired with its complement, A with T, and C with G. A reverse complement string is the original string read backwards, replacing each letter with its complement. Reading backwards is accomplished by reversing the ordering of the 2-bit units within a word, and reversing the ordering of the words. Producing the complement is accomplished by xor-ing each 2-bit pattern with 10, incidentally the same thing we did above to determine T-ness:

A^10 = 00^10 = 10 = T
C^10 = 01^10 = 11 = G
G^10 = 11^10 = 01 = C
T^10 = 10^10 = 00 = A

Code to produce the reverse complement for a string that exactly fills its final word looks like:

for(i=0; i&lt;length; i++)
{
  /* reverse and complement */
  rc[i] = (((unsigned long)(0xCCCCCCCC & compressed[length-1-i])) >> 2) |
          (                (0x33333333 & compressed[length-1-i])  << 2);
  rc[i] = ( (unsigned long)(0xF0F0F0F0 & rc[i])>>4) | ((0x0F0F0F0F & rc[i])<<4);
  rc[i] = ( (unsigned long)(0xFF00FF00 & rc[i])>>8) | ((0x00FF00FF & rc[i])<<8); 
  rc[i] = (((unsigned long)(dbrc[i]) >> 16) | (rc[i] << 16)) ^ 0xAAAAAAAA;
}

^ 0xAAAAAAAA complements the entire word at once after it has been reversed. Note that this code works for both big- and little-endian machines. Additional architecture dependent shifting must be done for strings that do not exactly fill their final word, see https://github.com/jlong777/cbl and associated links for more "coding to the metal".

Reasons:
  • Blacklisted phrase (1): this article
  • Long answer (-1):
  • Has code block (-0.5):
  • Contains question mark (0.5):
  • Low reputation (1):
Posted by: James Long

79379171

Date: 2025-01-22 20:46:44
Score: 0.5
Natty:
Report link

When trying to create a minimal reproducible example as suggested by trincot and ggorlen, I took another look at my original code and realized that the cause of the issue was having a helper function invoke the Puppeteer instance methods without binding this when calling them. Whether or not I was using Puppeteer within a module turned out to be irrelevant.

E.g.,

// I was doing this
function callMethod (func, ...args) {
   func(...args);
}
callMethod(browser.newPage);

// And what I really needed to do was something like this
function callMethod (obj, method, ...args) {
   obj[method].call(obj, ...args);
}
callMethod(browser, 'newPage');

During my original troubleshooting, I replaced the first couple calls to callMethod() with a direct call to the respective Puppeteer instance method but left all of the other calls to callMethod() intact, obscuring the fact that callMethod() was the true culprit all along.

Lesson learned: Always make a minimum reproducible example, no matter how "simple" you believe your existing code is.

Reasons:
  • Long answer (-1):
  • Has code block (-0.5):
  • Self-answer (0.5):
  • Starts with a question (0.5): When
  • Low reputation (1):
Posted by: FusedKush

79379159

Date: 2025-01-22 20:43:43
Score: 4
Natty: 5
Report link

I would like to know if you managed to find a solution for this problem. We are experiencing the same challenge of having over 1000 client's ecommerce sites hosted in our single domain and most are asking for Meta's Pixel integration

Reasons:
  • Blacklisted phrase (1.5): I would like to know
  • Low length (0.5):
  • No code block (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: Andres Diaz

79379154

Date: 2025-01-22 20:40:41
Score: 4.5
Natty:
Report link

👀 enter image description here

(to be fair, I just read it now in your screenshot, I come here finding for the same 😂)

Reasons:
  • Blacklisted phrase (1): 😂
  • Probably link only (1):
  • Low length (1.5):
  • No code block (0.5):
  • Low reputation (0.5):
Posted by: Eliseo

79379149

Date: 2025-01-22 20:39:40
Score: 4
Natty: 4
Report link

@Mahdi Ahmadifard suggestion worked for me. Make sure you are using your broker terminal.

Reasons:
  • Whitelisted phrase (-1): worked for me
  • Low length (1.5):
  • No code block (0.5):
  • User mentioned (1): @Mahdi
  • Single line (0.5):
  • Looks like a comment (1):
  • Low reputation (0.5):
Posted by: Talley Ouro

79379137

Date: 2025-01-22 20:34:38
Score: 1.5
Natty:
Report link

Thank you Santiago. Here is the exact syntax I used: Note: I'm only posting for clarity for Powershell rookies like me. I have no idea if this exact syntax changes from what Santiago gave me. I wager they both work.

Import-Module Activedirectory

$Attribcsv=Import-csv "C:\Temp\ADUsers_BulkEdit.csv"

ForEach ($User in $Attribcsv)

{

Get-ADUser -Identity $User.samAccountName | set-ADUser -replace @{costCenter=$($User.costCenter)}

}

Reasons:
  • Blacklisted phrase (0.5): Thank you
  • Has code block (-0.5):
  • Self-answer (0.5):
  • Low reputation (1):
Posted by: Travis

79379133

Date: 2025-01-22 20:34:38
Score: 4.5
Natty:
Report link

Ich bin mit dich, Mark Longmire. I am with you. Six years later and still no solution found. Here is the lay of the land...

Someone else's binary: a .dll provided by a 3RD party who intentionally did not want it debugged.

Our own code: C# running in VS in Debug mode so we can step through our own work.

What we do NOT want: to debug the .dll (that is absolutely NOT our need or care).

What we DO want: to leave the .dll as an UNdecompiled UNexamined UNdebugged black box, exactly as its original creator intended.

What we DO want: to debug our OWN C# code withOUT Captain Obvious (Microsoft Visual Studio Debug mode IDE) halting execution by declaring "Symbol file not loaded" or "No symbol file loaded for .dll" or "Binary was not built with debug information"

We will gladly shower praise on anyone who knows of a way to make VS IDE "Shut Up And Proceed Anyway" withOUT attempting to debug the black box .dll which does not want to be debugged.

Our forever admiration and thanks in advance, Johann

Reasons:
  • Blacklisted phrase (0.5): thanks
  • RegEx Blacklisted phrase (3): thanks in advance
  • Long answer (-1):
  • No code block (0.5):
  • Unregistered user (0.5):
  • Low reputation (1):
Posted by: Johann Klein

79379132

Date: 2025-01-22 20:33:36
Score: 14.5
Natty: 7.5
Report link

Ive been having the same problem! did you find any solutions to this?

Reasons:
  • Blacklisted phrase (1.5): any solution
  • RegEx Blacklisted phrase (3): did you find any solution
  • RegEx Blacklisted phrase (2): any solutions to this?
  • Low length (1.5):
  • No code block (0.5):
  • Me too answer (2.5): having the same problem
  • Ends in question mark (2):
  • Single line (0.5):
  • Low reputation (1):
Posted by: Rujuta

79379126

Date: 2025-01-22 20:31:35
Score: 2
Natty:
Report link

How about this? https://github.com/dany74q/ctap-keyring-device

This library provides an implementation of a virtual CTAP2 (client-to-authenticator-protocol) device, which uses the keyring library as its backend.

One may use this implementation as a reference for CTAP2-compatible devices, or to use ones host machine as an authenticator, rather than using an external one.

A common use-case would be to use this library as an authenticator for a webauthn flow, storing keys and retrieving assertions on a machine's configured keyring.

Reasons:
  • No code block (0.5):
  • Contains question mark (0.5):
  • Starts with a question (0.5): How
  • Low reputation (0.5):
Posted by: Daniel777

79379124

Date: 2025-01-22 20:31:35
Score: 0.5
Natty:
Report link

Notepad++ has a plugin named "JSON Tools" that will generate a random json document for the schema file in the active document tab. There are not a lot of options, but it does work well in a pinch. enter image description here

Reasons:
  • Probably link only (1):
  • Low length (0.5):
  • No code block (0.5):
  • Single line (0.5):
  • High reputation (-2):
Posted by: StingyJack

79379123

Date: 2025-01-22 20:31:35
Score: 1.5
Natty:
Report link
public class Example {
public static void main(String[] args) {
int i = Integer. parseInt(args[0]);
double d = Double. parseDouble(args[1]);
String msg = args[2];
System. out. println(''i='' + i + '' d='' + d + '' msg='' + msg);
}
}
Reasons:
  • Low length (0.5):
  • Has code block (-0.5):
  • Unregistered user (0.5):
  • Low reputation (1):
Posted by: NANA

79379122

Date: 2025-01-22 20:30:35
Score: 0.5
Natty:
Report link

I ended up getting a solution through aynber's suggestion here.

In createApplicationRequest, I added

    protected function failedValidation(Validator $validator)
    {
        throw new HttpResponseException(response($validator->errors(), Response::HTTP_UNPROCESSABLE_ENTITY));
    }

This returned a response with the error and worked perfectly.

Reasons:
  • Has code block (-0.5):
  • Self-answer (0.5):
  • Low reputation (0.5):
Posted by: Ryan M

79379119

Date: 2025-01-22 20:29:35
Score: 1.5
Natty:
Report link

Just as an addendum for gui preferring users, I developed a stream multiplexing capability for ffmpeg that makes it easy to add audio streams to a given video. The free opensource application is FFmpeg Batch Converter.

Reasons:
  • Low length (0.5):
  • No code block (0.5):
  • Low reputation (0.5):
Posted by: Eibel

79379108

Date: 2025-01-22 20:24:34
Score: 1
Natty:
Report link

Assuming fruit has an id column, you need:

select sum(p.numberPurchased * f.price)
from fruit f
join purchase p on f.id = p.fruitId;

You can omit prefixes (p., f.) if the field names do not repeat.

Reasons:
  • Low length (0.5):
  • Has code block (-0.5):
  • Low reputation (1):
Posted by: user20488960

79379107

Date: 2025-01-22 20:24:34
Score: 2.5
Natty:
Report link

Just an update, which I feel is worth mentioning, SQS FIFO increased their inflight limits from 20K to 120K last year.

Blog Post

Reasons:
  • Low length (1):
  • No code block (0.5):
  • Low reputation (1):
Posted by: user1656623

79379106

Date: 2025-01-22 20:24:34
Score: 3.5
Natty:
Report link

Using the v lookup function with IG column name like JB999 answered also worked on my APEX page. Thanks!

Reasons:
  • Blacklisted phrase (0.5): Thanks
  • Low length (1):
  • No code block (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: user29321055

79379105

Date: 2025-01-22 20:23:33
Score: 5
Natty:
Report link

I am experiencing the same error as you are with my Golang code. I would appreciate your assistance in resolving this issue.

The code executes successfully and returns a response. However, I am encountering an error at the end of the process. Please provide your insights and guidance in resolving this matter.

Response: { "errorType": "Runtime.ExitError", "errorMessage": "RequestId: a3042e1e-2b0c-4c9f-b2fd-e69bdda70eb0 Error: Runtime exited without providing a reason" }

Reasons:
  • Blacklisted phrase (1.5): would appreciate
  • RegEx Blacklisted phrase (2.5): Please provide your
  • No code block (0.5):
  • Low reputation (0.5):
Posted by: Sheik Sena Reddy

79379097

Date: 2025-01-22 20:21:32
Score: 0.5
Natty:
Report link

I encountered the same problem under Windows 10/11. After a thorough study of the application stack and its interactions, I was able to assume that this is not a JavaFX problem. The path led to the operating system itself - the driver is waiting for a reaction to a long press interaction(?), which is not present on the program side... or it is not present from the Java machine. A quick solution is to disable touch visualization in the touch driver settings. This is on setting the Pen and Touch settings, disable the Show visual feedback option, hit Apply.

Reasons:
  • Whitelisted phrase (-1): solution is
  • Long answer (-0.5):
  • No code block (0.5):
  • Contains question mark (0.5):
  • Low reputation (1):
Posted by: Alexandr Karachevtsev

79379096

Date: 2025-01-22 20:21:31
Score: 10.5 🚩
Natty: 6
Report link

I have a spark version 3.2.1 with scala 2.12.15 and I have downloaded "azure-eventhubs-spark_2.12-2.3.22.jar" from maven repos. I still get the same error even after following all the answers mentioned above. Any help will be highly appreciated.

Reasons:
  • Blacklisted phrase (1): appreciated
  • Blacklisted phrase (1): Any help
  • RegEx Blacklisted phrase (3): Any help will be highly appreciated
  • RegEx Blacklisted phrase (1): I still get the same error
  • Low length (0.5):
  • No code block (0.5):
  • Me too answer (2.5): get the same error
  • Low reputation (1):
Posted by: M_rais

79379093

Date: 2025-01-22 20:20:31
Score: 1
Natty:
Report link

import React from 'react'

const Blog = () => {
  return (
    <div>Blog</div>
  )
}

export default Blog
<script src="https://cdnjs.cloudflare.com/ajax/libs/react/18.3.0/umd/react.production.min.js"></script>
<script src="https://cdnjs.cloudflare.com/ajax/libs/react-dom/18.3.0/umd/react-dom.production.min.js"></script>

Reasons:
  • Has code block (-0.5):
  • Self-answer (0.5):
  • Low reputation (1):
Posted by: Makeshi cakarti

79379089

Date: 2025-01-22 20:19:30
Score: 0.5
Natty:
Report link

There is no deduplication ID in the SQL transport.

Reasons:
  • Low length (1.5):
  • No code block (0.5):
  • Single line (0.5):
  • High reputation (-2):
Posted by: Chris Patterson

79379081

Date: 2025-01-22 20:12:29
Score: 2.5
Natty:
Report link

This is what I came up with using generics. Not sure if this is what the commenter had in mind. I can pass in different types of Tables and I get the correct output.

How do I resolve MyKeyType to float ?

import std/strformat
import std/tables

type 
  Rect = ref object
    x: int
    y: int
  RectTableStringKey = Table[string, Rect]
  RefRectTableStringKey = ref Table[string, Rect]

  MyKeyType = float
  MyValueType = string

  XTableYKey = Table[MyKeyType, MyValueType]
  RefXTableYKey = ref Table[MyKeyType, MyValueType]

proc `$`[K,V](table: Table[K,V]): string = 
  result = fmt"hello from $Table[{$K}, {$V}]"

proc `$`[K,V](table: ref Table[K,V]): string = 
  result = fmt"hello from $refTable[{$K}, {$V}]"

var myTable1: RectTableStringKey
myTable1["one"] = Rect(x:10, y:20)
myTable1["two"] = Rect(x:15, y:25)

var myTable2: RefRectTableStringKey
new myTable2
myTable2["three"] = Rect(x:99, y:100)
myTable2["four"]  = Rect(x:909, y:109)

var myTable3: XTableYKey
myTable3[3.14159] = "hello"
myTable3[2.78183] = "bye"

var myTable4: RefXTableYKey
new myTable4
myTable4[1.2345] = "dog"
myTable4[9.9998] = "horse"


echo myTable1
echo myTable2[]
echo myTable3
echo myTable4[]

Output:

hello from $Table[string, Rect]
hello from $Table[string, Rect]
hello from $Table[MyKeyType, MyValueType]
hello from $Table[MyKeyType, MyValueType]
Reasons:
  • Blacklisted phrase (1): How do I
  • RegEx Blacklisted phrase (1.5): resolve MyKeyType to float ?
  • Long answer (-1):
  • Has code block (-0.5):
  • Ends in question mark (2):
  • Self-answer (0.5):
  • High reputation (-1):
Posted by: Sonicsmooth

79379076

Date: 2025-01-22 20:10:28
Score: 1.5
Natty:
Report link

I found a solution:

using ctypes it allows to control the mouse once on the phone

Reasons:
  • Whitelisted phrase (-2): solution:
  • Low length (1.5):
  • No code block (0.5):
  • Self-answer (0.5):
  • Low reputation (1):
Posted by: penguinpowerss

79379064

Date: 2025-01-22 20:04:27
Score: 1
Natty:
Report link

Turns out I was not doing anything wrong (for this specific problem). This was a new bug in BCP, for which there is now a pull request. Applying this patch to my 1.87.0 checkout makes Boost build now after running BCP against it.

Reasons:
  • Low length (0.5):
  • No code block (0.5):
  • Self-answer (0.5):
  • Single line (0.5):
  • High reputation (-1):
Posted by: Nick Williams

79379061

Date: 2025-01-22 20:03:26
Score: 1
Natty:
Report link

Redshift now has VARBYTE type and functions. So you can now convert base64 string to VARBYTE with TO_VARBYTE(str, 'base64'). Then you can do stuff with this VARBYTE, like in my case I needed to see bit 3 of the first byte

SELECT GETBIT(SUBSTRING(TO_VARBYTE(str, 'base64'), 1, 1), 3) FROM ...
Reasons:
  • Blacklisted phrase (0.5): I need
  • Low length (0.5):
  • Has code block (-0.5):
  • Low reputation (0.5):
Posted by: Dmytro Bogatov

79379057

Date: 2025-01-22 20:01:25
Score: 4
Natty:
Report link

finally found it - the field firsstname was defined twice in the form ressource

Reasons:
  • Low length (1.5):
  • No code block (0.5):
  • Self-answer (0.5):
  • Single line (0.5):
  • Low reputation (1):
Posted by: cerien

79379033

Date: 2025-01-22 19:49:22
Score: 0.5
Natty:
Report link

the problem was me creating my own sockaddr_un I though I can create my own structure and I was wrong I though that since in the man page there was

The actual structure passed for the addr argument will depend on the address family. The sockaddr structure is defined as something like:

    struct sockaddr {
        sa_family_t sa_family;
        char        sa_data[14];
    }

The only purpose of this structure is to cast the structure pointer passed in addr in order to avoid compiler warnings. See EXAMPLE below.

(IDK how to accept the comments as awnswers I will if I could)

Reasons:
  • Long answer (-0.5):
  • Has code block (-0.5):
  • Self-answer (0.5):
  • Low reputation (1):
Posted by: Beh_12517843

79379028

Date: 2025-01-22 19:47:22
Score: 1.5
Natty:
Report link

Yes, Snowflake has introduced a connector for SharePoint, available through the Snowflake Marketplace.

This connector allows you to link a Microsoft 365 SharePoint site with Snowflake to ingest files and manage user permissions while keeping them up to date. It also supports the Cortex Search service, enabling ingested files to be prepared for conversational analysis, making them accessible for use in AI assistants through SQL, Python, or REST APIs.

Refer: https://docs.snowflake.com/en/connectors/unstructured-data-connectors/sharepoint/about

Reasons:
  • No code block (0.5):
  • Low reputation (1):
Posted by: Harshad Gore

79379018

Date: 2025-01-22 19:42:21
Score: 1.5
Natty:
Report link

Previous to restore default settings.

Sign out of Postman: When Sign out of Postman it removes your synced history, collections and environments from local storage.

Otherwise when you re-install it, it is likely that it'll use the old data from the previous installation.

Reasons:
  • Low length (0.5):
  • No code block (0.5):
  • Low reputation (0.5):
Posted by: Raul

79379013

Date: 2025-01-22 19:40:20
Score: 2
Natty:
Report link

There is no VBA Key under HKEY_CURRENTUSER\Software\Microsoft\

Also regardless of whether I have docked checked or not on options, I can drag a window over the edge of the editor and onto another monitor. Nothing docks.

Reasons:
  • Low length (0.5):
  • No code block (0.5):
  • Low reputation (1):
Posted by: Dan Flak

79379009

Date: 2025-01-22 19:39:20
Score: 2.5
Natty:
Report link

just install the package "tidyverse" and type library(tidyverse) this will work 100 percent very soon this answer will be on the most voted answer

Reasons:
  • Low length (1):
  • No code block (0.5):
  • Low reputation (1):
Posted by: Atreya Sinha

79379003

Date: 2025-01-22 19:37:19
Score: 0.5
Natty:
Report link

This appears to be a navigation menu. In that case, you do not want to use ARIA menu roles. Get rid of all the role="menu" and role="menuitems". ARIA menu roles are only intended to be used in very specific circumstances, primarily when you are trying to recreate a native operating system menu, which a navigation menu is not. Reference: Don't Use ARIA Menu Roles for Site Nav

Implementing a navigation menu is actually much simpler than people make it out to be. But rather than trying to re-explain the wheel, I'll just give you a link to the master: Link + Disclosure Widget Navigation. Seriously, this guy is one of the foremost experts in web accessibility and his website is consider the Accessibility Bible by many. I would follow his example very closely.

Reasons:
  • Long answer (-0.5):
  • No code block (0.5):
  • Low reputation (0.5):
Posted by: Roland McLeod