ox.ac.uk: Nick Trefethen

ox.ac.uk: Nick Trefethen
Professor L N Trefethen FRS Professor of Numerical Analysis, Oxford University Global Distinguished Professor, New York University Fellow of Balliol College Head of Oxford’s Numerical Analysis Group Oxford University Mathematical Institute Woodstock Road Oxford OX2 6GG, UK trefethen (at) maths (dot) ox (dot) ac (dot) uk Assistant: +44 1865 615316 (Lotti Ekert) Books Essays Papers Talks Chebfun PhD students Honors Index card blog Other items

office.microsoft.com: Change or delete a defined name – Excel

office.microsoft.com: Change or delete a defined name – Excel
Use defined names to make it easier to refer to a cell, range of cells, formula, or constant value. On the Insert menu, point to Name, and then click Define. In the Names in workbook list, click the name you want to change. Do one of the following: Change the name Type the new name for the reference, and then click Add. Click the original name, and then click Delete. Change the cell, formula, or constant represented by a name Change the name in the Refers to box. Delete the name Click Delete.

msdn.microsoft.com: The Integer, Long, and Byte Data Types

msdn.microsoft.com: The Integer, Long, and Byte Data Types
Three data types in Microsoft© Visual Basic© for Applications (VBA) can represent integers, or whole numbers: the Integer, Long, and Byte data types. Of these, the Integer and Long types are the ones you are most likely to use regularly. The Integer and Long data types can both hold positive or negative values. The difference between them is their size: Integer variables can hold values between -32,768 and 32,767, while Long variables can range from -2,147,483,648 to 2,147,483,647. Traditionally, VBA programmers have used integers to hold small numbers, because they required less memory. In recent versions, however, VBA converts all integer values to type Long, even if they are declared as type Integer. Therefore, there is no longer a performance advantage to using Integer variables; in fact, Long variables might be slightly faster because VBA does not have to convert them. The Byte data type can hold positive values from 0 to 255. A Byte variable requires only a single byte of memory,

NYTimes.com: Into the Bitcoin Mines

NYTimes.com: Into the Bitcoin Mines
Mr. Abiodun’s opinion of Bitcoin changed in January, when he saw the price rising. He installed a free application on his home computer that linked him into the Bitcoin network and set it to mining, harnessing the power of his graphics card, which is the part of a normal computer best suited to doing the code work. Mr. Abiodun’s computer was in the guest room of his house in southeast London. Working at HSBC during the day and tinkering with his Bitcoin system at night, he realized if he wanted to make any money, his computer would have to run around the clock. The constant computing, however, overheated the graphics card and pushed the computer’s exhaust fans into overdrive. When he added another graphics card, then a new computer, the room became too noisy for guests to sleep, and the windows had to be kept open to release the heat. That did not make his wife, Gloria, who was pregnant at the time, very happy.

The Responsinator

The Responsinator

What is Responsinator?

IT’S FOR WEBSITE MAKERS
Responsinator helps website makers quickly get an indication of how their responsive site will look on the most popular devices. It does not precisely replicate how it will look, for accurate testing always test on the real devices.

We recommend using Chrome on OSX 10.7+ with scroll bars set to “when scrolling” (System Preferences › General › Show scroll bars › “when scrolling”). This means the device widths aren’t affected by scroll bars.

Pro tip: append &scroll=ext to move the scroll bars outside of the device frame.

WHAT IS RESPONSIVE DESIGN?
It means designing your website to adapt to the user’s viewing environment (mobile, tablet, laptop etc.). It does this through the use of media queries, and other clever technology. Ethan Marcotte wrote the original article about it, and a pretty handy book.

HANDY BOOKMARKLET
Drag this: Responsinator to your browser’s bookmark bar then click it when you’re on a site you want to test (thanks to @pixelcellar for originally creating this).

Include &scroll=ext in bookmarklet
WHO MADE THE RESPONSINATOR?
Tama Pugsley and Andy Hovey. We both work at Batch. If you found The Responsinator handy and you’re feeling kind you could buy us a beer.

We’re hosted on Linode.com (sign up and we’ll get $20).

perlmeme.org: How do I return multiple variables from a subroutine in Perl?

perlmeme.org: How do I return multiple variables from a subroutine in Perl?
#!/usr/bin/perl use strict; use warnings; # Subroutine prototypes sub get_two_hashes(); # Get two variables back my ($one, $two) = get_two_hashes(); print “One: “; print “$_ ” foreach keys %$one; print “n”; print “Two: “; print “$_ ” foreach keys %$two; print “n”; sub get_two_hashes() { my %hash1 = ( “1a” => “b”, “1b” => “d” ); my %hash2 = ( “2a” => 2, “2b” => 4 ); return (%hash1, %hash2); }

kyp.fr: How to solve Magento message “Your web server is configured incorrectly. As a result, configuration files with sensitive information are accessible from the outside. Please contact your hosting provider.” | KYP Blog

kyp.fr: How to solve Magento message “Your web server is configured incorrectly. As a result, configuration files with sensitive information are accessible from the outside. Please contact your hosting provider.” | KYP Blog
Cannot override the directories acccess control list Apache configuration allows also to define which rules can be overrided in AccessFilename with AllowOverride directive If you are a hosting provider, perhaps you don’t want that your clients can update in their AccessFilename some security directives. It can be done with the AllowOverride directive Have a look at the official documentation to see the possible values for this directive In this case, if AllowOverride directive is not well set, the .htaccess file is read, but the ACL defined is not used, and so, we can have access to your local.xml file.