This is a basic implementation of a PID controller on an Arduino.
To replicate this, wire up the system as shown below:
{ | |
"background" : "#282828", | |
"black" : "#282828", | |
"blue" : "#458588", | |
"brightBlack" : "#928374", | |
"brightBlue" : "#83A598", | |
"brightCyan" : "#8EC07C", | |
"brightGreen" : "#B8BB26", | |
"brightPurple" : "#D3869B", | |
"brightRed" : "#FB4934", |
Your scrobbler might have decided to scrobble every song hundreds of times, and you can't really remove those scrobbles efficiently. Or you might have accidentally installed multiple scrobbler extensions at the same time - wondering why multiple scrobbles appear for every song played at a time - and you want to clear them after finding the issue.
Using this script still doesn't necessarily make the process quick since Last.fm only displays a limited number of scrobbles that can be removed on each page of your library. However unlike the implementation of @sk22 and its forks, this UserScript, which is derived from those scripts, is run once. The rest of the process is automated and the script will stop at the page you have set using the prompt.
Install Docker CE and nftables:
{-# language ApplicativeDo #-} | |
{-# language LambdaCase #-} | |
{-# LANGUAGE TypeOperators #-} | |
{-# LANGUAGE TypeInType #-} | |
{-# LANGUAGE AllowAmbiguousTypes #-} | |
{-# LANGUAGE FlexibleContexts #-} | |
{-# LANGUAGE InstanceSigs #-} | |
-- not sure if this is all extensions or all these extensions are needed, just pasting from the file | |
module VerifySchema where |
#!/bin/bash | |
sudo -s <<EOF | |
zypper dup -l -y --no-recommends --allow-downgrade --allow-arch-change --force-resolution | |
flatpak update -y --noninteractive --force-remove | |
flatpak remove --unused --delete-data -y | |
#flatpak repair | |
journalctl --rotate | |
journalctl --vacuum-time=2d | |
zypper clean | |
rm -rfv /var/tmp/flatpak-cache-* |
Note: This gist may be outdated, thanks to all contributors in comments.
adb
is the Android CLI tool with which you can interact with your android device, from your PC
You must enable developer mode (tap 7 times on the build version in parameters) and install adb on your PC.
Don't hesitate to read comments, there is useful tips, thanks guys for this !
# Adapted from https://gist.github.com/batzner/7c24802dd9c5e15870b4b56e22135c96 | |
import getopt | |
import sys | |
import tensorflow as tf | |
usage_str = ('python tensorflow_rename_variables.py ' | |
'--checkpoint_dir=path/to/dir/ --replace_from=substr ' | |
'--replace_to=substr --add_prefix=abc --dry_run') | |
find_usage_str = ('python tensorflow_rename_variables.py ' |
This goal of this setup is to put the Sonos speakers on an untrusted network to keep all but the required traffic away from the trusted network where devices like personal computers, phones, etc. live. This write-up assumes you already have two networks setup and working.
UI broke cross-VLAN multicast DNS in this version. See below for steps to install the multicast-relay script to re-enable this. Without it, your Sonos controller app will not be able to discover your speakers on the other VLAN.
I have a Sonos Playbar, Sub, and 2 Play:3's as rear surrounds as one home theater setup connected to a UDM (non-Pro, but this should work on Pro too). Some of this setup may be easier for people with non-paired speakers, as Sonos does some shenanigans with which speaker is actively sending traffic to your wifi.