summary
stringlengths
15
147
text
stringlengths
1
19.3k
answer
stringlengths
32
22.6k
labels
float64
0.33
1
answer_summary
stringlengths
5
164
My thesis advisor is absent in my final stage of completing my Ph.D. programme
I am a mathematics Ph.D. student who are in my final stage of completing my Ph.D. programme. My advisor is visiting an institute for a few months. The institute that he is visiting is in another country; because of the visa requirements and many other practical reasons, I cannot go there with him. Now my progress is, I have all the main results ready (most of them have been written down) and I need to finish writing my thesis in about three weeks. My advisor has guided my through all the mathematical difficulties; now he left me behind to write the thesis all by my own. Furthermore, he has clearly indicated that he will NOT help me with the writing process. Now I need to figure out many things all by myself, from LaTeX to the organization, from the usage of languages to drawing pictures, etc. Also I need to verify the correctness and validity of all the results; he mentioned that he will not carefully read my draft. And I do not have much time to finish everything. I am feeling somewhat stressed and overwhelming. In this situation, should I seek assistance from other professors/lecturers who do research in a similar field, or should I try to figure everything out by myself? Should I hire someone to proofread my thesis when the draft is finished?
Now that you have number of weeks left for the submission deadline; you have two options: Write up and Submit the Thesis: Finish the thesis as soon as possible. At this stage you should be able to write your Ph.D. thesis; without any supervision guidelines. Don't fall into 'what if' scenarios. At the end of the day the thesis and your defense on that day will grant you a Ph.D. Possible Extension: Don't submit a very poor thesis if your thesis lacks the required material. You will put the examiners at the very difficult and unpleasant situation; because if the required material is not there you be more likely failing your defense. I suggest you to print out your latest version of your thesis and discuss the extension issue with an academic. You can send an email to your supervisor and ask for a name of an academic to discuss this issue.
0.777778
Write up and Submit the Thesis: Finish the thesis as soon as possible
How can I cook chicken in a similar way to how it was done in Biblical times?
I want to make a historically accurate biblical meal for a group. I'm using chicken, and serving it with flatbread and an Israeli salad (sans tomatoes and other new world vegetables) Does anyone have a recipe for a historical barbecue chicken or an idea of what sorts of spices were used back then? edit: Just thought I'd let you guys know I marinated the chicken in a mixture of rosemary, thyme, oregano, toasted sesame, garlic, salt and a bit of mint/pepper overnight. Then put them on skewers. Maybe not 100% authentic, but tasty.
McCormick Science Institute: History of Spices: Papyri from Ancient Egypt in 1555 BC classified coriander, fennel, juniper, cumin, garlic and thyme as health promoting spices (3). Records from that time also note that laborers who constructed the Great Pyramid of Cheops consumed onion and garlic as a means to promote health. The Spice Encyclopedia at Spice Advice appears to give history/origing for a large selection of spices.
1
Spice Encyclopedia: History of Spices
Why does resizing PNG with alpha transparency make edges gray?
I'm using PSP 7 (I know it's old, but it serves my purposes). I am resizing a bunch of images. PNG images with alpha transparency load with black backgrounds when I first open them. I have little experience with masks. I learned that I can do Masks > Load From Alpha Channel to see the transparent areas. After loading the alpha channel, I resize the image. Usually, this works fine. However, sometimes the edges look a bit gray - kind of like if I made a transparent GIF on a gray background. For the record, the box for Resize all layers is checked. If I uncheck that, the edges are black after resize. Also, the original images are already PNG-24 (16 million colors). Here is the original viewed at 8x zoom (scaled in the browser to fit): And here it is after reszing viewed at 8x zoom: And here is the resized image viewed at 1x zoom: It's probably not that noticeable to a lot of people, but the top edge does not look smooth to me. Is there an easy way to fix this? Do I need to resize the mask separately? The last one I had like this was a white circle. So I just cropped out the edges and added a white circle behind it. This one is a little harder.
There is a difference between how the transparency of the various PNG versions semi-transparent pixels are handled. If you resize and save the PNG to a different version than the original I guess it is possible that the semi transparent pixels were handled differently (ie matte) resulting in the difference you see. I'm not super conversant in any of this but if you are interested. A Basic Explanation If you want to dive into the geekiness there are a few really great items on SmashingMagazine's site that also touch on transparency. There's a second part to this last one but I lack enough reputation to post additional links.
0.888889
Difference between how the transparency of the various PNG versions is handled
awk match how to pass 3rd argument
Am trying to add a 3rd column/argument to achieve my output. In the below data/string I would like to add the "type" to my existing output Data: <field name="AVERAGE_TIME" type="float" id="0xDZZ" sequence="1"/> Present working script FILE="$1" awk -F[=\ ] 'BEGIN{OFS="|" } /context/{cn=$3} /field/{match($0,"id=[^ ]+"); idstart = RSTART+3; idlen=RLENGTH-3; match($0,"name=[^ ]+"); namestart=RSTART+5; namelen=RLENGTH-5; print substr($0,namestart, namelen), substr($0,idstart, idlen),cn }' "../$FILE" | sed 's/\"//g' Present Output AVERAGE_TIME|0xDZZ|temp What I would like to see (type added) AVERAGE_TIME|0xDZZ|temp|float
$ awk -F'"' -v OFS='|' '{print $2, $6, "temp", $4}' file AVERAGE_TIME|0xDZZ|temp|float If that doesn't do what you want then please edit your question to clarify your requirements and add some more truly representative sample input and expected output.
0.777778
print $2, $6, "temp", $4' file
Eclipse C++ formatter puts new line before method identifiers
I ran into a problem with the Eclipse formatter. It won't format my code correctly when declaring methods within a class declaration. It puts a new line after the method's return type. I already exported the style xml file and examined the settings in it, but none of the settings have any apparent connection to this problem, and the settings editor in Eclipse didn't show the same problem happening in it's sample code for method declarations. Here is an example bit of code for what I want to have happen: class MyClass { public: MyClass(); void myMethod(); }; However, this is what I get: class MyClass { public: MyClass(); void myMethod(); }; Again, in the styles editor, the code doesn't have this problem and looks just how I want it to, but in the actual code, the story is different. I'm using version 3.8.0. Any help is appreciated. Edit: I deleted those source files that were formatted incorrectly (after formatting the code several times to no avail) and replaced them with "identical" files with the same methods, same structure, etc. I formatted the code this time and it worked. This is probably a bug, but I'm leaving it up just in case anyone else encounters a similar problem or has a solution to avoiding this problem in the first place.
If you have a custom formatter config, export it first (settings>C/C++ General>Formatter>Edit>Export). Then change the following line to "do not insert". Save the XML. <setting id="org.eclipse.cdt.core.formatter.insert_new_line_before_identifier_in_function_declaration" value="do not insert"/> Delete the current config and import the one you changed.
0.888889
Export a custom formatter config
Does SQL Server 2008 R2 Express have Intellisense?
I don't have any Intellisense in SQL Server 2008 R2 Express Management Studio - is this supposed to work? I am connecting to a SQL Server 2008 R2 Express database on the same machine (no other databases here at home) and I have no Intellisense. Just wondering if it's supposed to work or is Express crippled?
Intellisense only works if you are connected to a database that is SQL2008 or higher. If you use management studio to connect to a sql2000 or sql2005 server, there will be no intellisense. Also, there is an option to turn it on/off. In SQL Server Management Studio, click Tools -> Options. Expand "Text Editor" and click on "All Languages". Make suer "Auto list members and Parameter information" are both checked.
1
Intellisense only works if you are connected to SQL2008 or higher
Does port forwarding a port on one computer expose other computers in the network as well?
I have read that port forwarding exposes your computer to security breaches. Does port forwarding a port on one computer expose other computers in the network as well?
If we accept the assumption that opening a port to a machine allows that machine to be compromised, then yes. Every port on a machine is open to every other machine on the same network. So if opening port X to machine Y risks a compromise of machine Y, anyone who has compromised machine Y has access to port X on machine Z. So they can compromise machine Z too. But this really just shows that talking in generalities such as "exposes to security breaches" is really just too vague to be useful. Plugging a machine in exposes it to security breaches. Dealing with non-quantified levels of risk leads to silly conclusions.
1
Plugging a machine in exposes it to security breaches
SQL agent job, why is the job history showing that a step is still running even though the job has completed
I have a sql agent job that runs Powershell as its first step (there are 3 steps in total). I have set this step to have 2 retries, with a 3 minute retry interval. When I look into the job history, the step_1 states that it is still running, and also that it has completed. It has done this for every time that it has run (at least the last year). Am I missing something from my powershell? Or is this something to do with sql agent itself? Details of querying the sysjobhistory table (Pipe seperated): Step_name|step_id|run_date|run_time|run_duration|run_status (Job outcome)|0|2014/02/12|01:20:00|5|Succeded Record volume space to file|1|2014/02/12|01:20:00|2|In Progress Record volume space to file|1|2014/02/12|01:20:00|2|Succeded Load Volume Space|2|2014/02/12|01:20:02|1|Succeded Record database data file space|3|2014/02/12|01:20:03|2|Succeded Step 1 runs the following Powershell: gwmi win32_volume | select name, capacity, freespace | Export-Csv c:\temp.tmp
Try simply restarting the SQL Server Agent and testing again. Your results from sysjobhistory lead me to believe that isn't because of a PowerShell error. You have a success record but you also have an in progress record. I've seen the SQL Agent act very odd sometimes and restarting it was the only thing I've figured out to fix it. For example, I've had jobs miss a schedule execution and then never run on a schedule again because of the next run time being in the past. In addition, I've definitely seen completion records not recorded even though I've never seen them doubled up like you have.
0.777778
sysjobhistory
How well does Python's whitespace dependency interact with source control with regards to merging?
I'm wondering if the need to alter the indentation of code to adjust the nesting has any adverse effects on merging changes in a system like SVN. This is a really open ended question. I'm sort of fishing for information/anecdotes here. Edit: Thanks all! I'd accept an answer but which one? I up moded them all.
Generally source control systems merge on a line-by-line basis by default. I have found that merging Python code is no different from merging any other source code that is reasonably indented. If one programmer wraps a block of code in an if statement (indenting the whole block), and another programmer modifies something inside the block, then there will be a merge conflict. Fortunately, the conflict in this case is super easy to resolve. If you use an external merge tool, then your tool may support more detailed textual merging algorithms that take the above scenario into account automatically.
0.888889
merges Python code on a line-by-line basis by default
Exporting (bullet) collision shapes
I'm writing a scene exporter from blender to a format to be used by a game. I need to be able to export physics information the game needs, mainly the collision shape of every object (either the one set in Blender Render or Blender Game but the latter is better). I cannot seem to find anywhere that the collision shape is available to python. I've seen references to PhysicsConstraints.exportBulletFile() but this appears to be under the bge module, which as far as I can tell, is not accessible by exporter scripts. Is there any way to determine the details of a shape (rotation and scale, width, height, depth for box or radius and height for cylinder, vertices for convex hull, etc...)?
Finding the parameters necessary to generate such a shape should be possible with python. From the wiki: The Shape setting determines the collision shape of the object. The following shapes are available: Primitive shapes - these are best in terms of memory/performance but don't necessarily reflect the actual shape of the object. They're calculated based on the object's bounding box. The center of gravity is always in the middle for now. Box: The size per axis is calculated from the bounding box Sphere: The radius is the largest axis of the bounding box Capsule: This points up the Z-Axis. Cylinder: This points up the Z-Axis. The height is taken from the z-axis, while the radius is the larger of the x/y-axes. Cone: This points up the Z-Axis. The height is taken from the z-axis, while the radius is the larger of the x/y-axes. 'Mesh based shapes' - these are calculated based on the geometry of the object so they are a better representation of the object. The center of gravity for these shapes is the object origin. Convex Hull: Convex approximation of the object, has good performance and stability. Mesh: Allows to simulate concave objects, but is rather slow and unstable. To build these shapes using the UI: Box: Select the target object and press CtrlShiftAltC > Origin to goemetry, and then press F6 and select bounds center. With the target object selected, press ShiftS> Cursor to selected to move the cursor to the objects origin. Add a cube to be the bounding box. It will automatically be centered at the 3D cursor, which is snapped to the target object's origin point. Copy the Dimension and Rotation values from the target object to the bounding cube. These values are located on the Properties region (N in the 3D view): You can quickly copy and paste values by hovering over the number field and pressing CtrlC/CtrlV accordingly. Since this process of copying and pasting the values of each channel can be a bit tedious, you can use a quick bit of python to do this for you: import bpy active = bpy.context.active_object selected = bpy.context.selected_objects for obj in selected: obj.dimensions = active.dimensions This copies the dimensions from the active object to the selected objects. Parent the bounding box to the target object so the relative location, rotation, and scale is kept the same. You can also set the bounding cube's Draw type to Wire in Properties > Object > Display > Maximum Draw Type. Sphere Do steps 1 to 3 from the Box instructions, adding a sphere instead of a cube. Copy only the largest dimension value from the target into all three dimensions of the sphere. Do step 3 of the instructions for Box (Parent the bounding mesh and set the draw type to wire) Cylinder Do steps 1 to 3 from the Box instructions, adding a cylinder instead of a cube. Copy the largest dimension value of the target excluding the Z axis, so the value of either X or Y into both the X and Y dimensions of the Cylinder. Copy the Z dimension value of the target to the Cylinder. Do step 3 of the instructions for Box (Parent the bounding mesh and set the draw type to wire). Cone Do the same as for Sphere. Convex Hull This is more complex. you could try to generate your own using python, or you could try one of these existing options: The Convex Hull operator built into blender. Duplicate target object (ShiftD) With the duplicate selected, enter edit mode (Tab) and select all (A) Run the convex hull operator (Space> Search > Convex Hull) This Convex Hull generator written in python. Existing addons I also found a couple existing scripts/addons from a quick google search: One for exporting to YAML Niftools Wiki - Blender 2.49 nif import/export - Collisions Niftools - Blender 2.6x nif export collision code
1
python based shapes based on the object's bounding box
Grenade throw logic
My case is: We are developing a kart racing game, and the players are fighting with each other and trying to reach the finish line. The thing is, I am confused over how to implement following logic: The player has missile and grenade as weapons. I can do missile lock, then the missile follows the enemy and hits the enemy with it. (Vector3.MoveTowards()). But how would I do grenades? Suppose both enemies and players are moving forward on the Z axis: Case 1: Player throws grenade at enemy. It goes and hits enemy. **I can do this the same way as missile logic. Case 2: Player throws grenade at enemy. Enemy changes position on the X axis (right, left). Grenade should not follow player to the next position. **I am confused about this case: how to let grenade not change its position and get the blast on surface??
You could model the grenade as a conventional rigidbody with an initial speed and have it affected by gravity. Add a script with an OnCollision method to trigger when it touches a vehicle or the ground.
1
Model grenade as a conventional rigidbody with an initial speed .
Do real and reactive energy exist?
Are there any such things as real and reactive energies just like real and reactive power? if so, how is reactive energy dissipated?
Energy is just power integrated over time, so real and reactive energy exists or not just like real and reactive power, respectively. As for power, real power exists and reactive power is a mathematical convenience to simplify expressing certain things. By using the mental shortcut of imagining imaginary power, we can simplify calculations and explain real observed parameters more easily than without. Imaginary power doesn't exist, but the effects of it projected back to real power are real. Large scale power grid producers and consumers are often rated in both the instantaneous real and imaginary power they are producing or consuming. However, the same real observable characteristics can be explained other ways. Explaining them in terms of imaginary power is merely a mental and mathematical convenience.
1
Real and reactive energy exists or not just like real and reactive power .
What's the deepest underwater tour available?
Clearly scuba can only get you so far, and while we've discussed submarine tours in the past, they are just jaunts. What's the deepest you can actually go as a tourist, and what about if you were somehow able to charter a vessel (like I gather James Cameron is planning on doing)?
I can't tell you an exact number, but I found a more or less interesting site: http://www.travelscience.com/framed_pages/main_frame/travel_library/Travel_Topics_DeepSea_Travel.htm Especially the deep sea section should be what you're looking for. Especially this operator provides some deep sea tours. I couldn't find anything similar and haven't heard of it too. When you read the description of this tour, it says that you can take some tours with a MIR submarine and it is possible that you can dive up to 6000 meters. There aren't a lot of places in the oceans that are deeper, so I can't imagine that as a tourist you will be able to find a tour that takes you any deeper.
1
Especially the deep sea section should be what you're looking for
Adding parent_id attribute value in model
I have created a module and EAV tables for that. Module's tables are very similar to customer_Address entity and i have defined Attribute AttrA, AttrB and AttrC for this table. So table structure is very similar to as follows: +------------------+----------------------+------+-----+---------------------+----------------+ | Field | Type | Null | Key | Default | Extra | +------------------+----------------------+------+-----+---------------------+----------------+ | entity_id | int(10) unsigned | NO | PRI | NULL | auto_increment | | entity_type_id | smallint(5) unsigned | NO | | 0 | | | attribute_set_id | smallint(5) unsigned | NO | | 0 | | | increment_id | varchar(50) | YES | | NULL | | | parent_id | int(10) unsigned | YES | MUL | NULL | | | created_at | timestamp | NO | | 0000-00-00 00:00:00 | | | updated_at | timestamp | NO | | 0000-00-00 00:00:00 | | | is_active | smallint(5) unsigned | NO | | 1 | | +------------------+----------------------+------+-----+---------------------+----------------+ and AttrA, AttrB and AttrC values are stored in tables with respective data type. Now using the basic syntax, I am able to add value of attributes AttrA, AttrB and AttrC. Which is: $model = Mage::getModel('customer/address'); $model->setAttrA('ValA')->setAttrB('ValB')->setAttrC('ValC'); doing this correctly sets the values of AttrA, AttrB and AttrC but value of parent_id in customer_entity sets to NULL by default. Here I want to be able to set the parent_id to some other value. For this i tried suggestion given in different post using setParentId(<parent-id-value>). Which is not working in my case. Any idea how i can do this?
You might also want to try $model->setData('parent_id', $value); and as a personal opinion i would double/triple check you are saving the object correctly.
0.888889
$model->setData (parent_id, $value)
Passing data from Controller, to View, and back to Controller
Currently I have a method that is loading a PDF into an HTML page. The PDF is dynamically created after retrieving data from the database. Now, what I would like to do, is before the view of the PDF is loaded, I'd like to show a page that lets the user know that the information is being loaded. ActionParams: @using (Html.BeginForm("PreLoaderView", "Report", FormMethod.Post, new { @target = "_blank" })) Controller: public ActionResult PreLoaderView(TestViewModel viewModel) { return View(viewModel); } public ActionResult SolicitorActionReport_Load(TestViewModel viewModel) { var cultivationModel = new CultivationModel(viewModel, ConstituentRepository, CampaignRepository); var cultivationData = cultivationModel.GetCultivationActivityData(); var reportParamModel = new List<ReportParamModel> { new ReportParamModel() {AgencyName = SelectedUserAgency.AgencyName, StartDate = viewModel.StartDate, EndDate = viewModel.EndDate} }; return FileContentPdf("Constituent", "CultivationActivityManagement", cultivationData, reportParamModel, new List<FundraisingAppealMassSummary>(), new List<FundraisingAppealPortfolioSummary>()); return Content(viewModel.SolicitorType); } PreLoaderView: @model Report.SolicitorActionParamsViewModel @{ ViewBag.Title = "Cultivation Activity"; } <script type="text/javascript"> $(function () { $.ajax({ url: '@Url.Action("SolicitorActionReport_Load", "Report", @Model)', complete: function() { $('#progress').hide(); }, error: function() { alert('oops'); } }); }); </script> <div align="center"> <img id="progress" src="~/Content/images/loading.GIF"> <div id="result"> <embed width="100%" height="800px" src="http://localhost/YP/Report/SolicitorActionReport_Load"type="application/pdf"> </div> </div> So, from the PreLoaderView, I'd like to pass the @Model back to the controller for use with the SolicitorActionReport_Load(). Is this possible to do?
You are not supposed to do that in a classical MVC app. You are supposed to create and fill out the model once in the controller then feed it to the view in a single pass and after that forget about it till the next round trip to the server. You should not toss it back and forth to the controller. What you are trying to do is supposed to be done by either an iframe or a subsequent ajax call from the client.
0.888889
How to create a model in a classical MVC app
Remove hostednetwork password
I've set up my own Nintendo HomePass relay to get StreetPass from home, but recently something has changed and it doesn't work anymore. I've read I have to change some settings to make it work again, and I need to remove the password of my hosted network. I know how to change hosted network settings: netsh wlan set hostednetwork mode=allow ssid=<mySSID> key=<password> But I don't know the command to remove the current key, or how to set the network as free. Or the command to delete the previous saved network, in order to set up a new one without the key attribute. Any hint?
There are several methods to delete a hosted network. Method 1 : Network and Sharing Center Right click on the Network icon in the notification area () and choose "Network and Sharing Center". In the Network and Sharing Center windows, click on "Change Adapter settings", to see all of your network connections. This will look like: Select the Hosted Network and press the Delete button, then restart your PC. Method 2 : Command-line to delete the virtual adapter Open the Command Prompt with Administrator rights and enter the following command: netsh wlan stop hostednetwork You will receive a message confirming that the wireless hosted network stopped. However it is not yet disabled. In order to disable it, enter this command: netsh wlan set hostednetwork mode=disallow The result is the message "The hosted network mode has been set to disallow". You'll also notice that the virtual adapter is no longer listed in the Network and Sharing Center. Furthermore, if you want to double-check the status of the hosted network, you can run the following command: netsh wlan show settings It should say : "Hosted network mode allowed in WLAN service: No". Method 3 : Command-line to delete/forget one network Start the Command Prompt as administrator and type the following command : netsh wlan show profiles It will display all the wireless network profiles stored by Windows 8.1. The list can be long if you used your laptop or tablet for more than a couple of weeks : Identify the name of the wireless network profile you want removed, then type the following command to remove it: netsh wlan delete profile name="swisscom" Method 4 : Command-line to delete/forget all networks In some scenarios you may need to remove all the wireless network profiles stored in Windows 8.1. This is done using this command: netsh wlan delete profile name=* i=*
0.888889
How to delete a hosted network from Windows 8.1?
Proper place to put shell prompt(PS1) when use sh/bash/zsh together
I'm using dash(sh) or bash or zsh. If possible, I would prefer to put in common place. I want to put proper PS1 settings when I interactive with shell, so these situation should be considered login (show PS1) su sudo script (Don't show PS1) I was put PS1 on .bashrc, but it seems not always workable.
One thing you could do is use commonly named vars to define the terminal escapes specific to each shell's interpretation in their own sourced script, then bring it all together at the end in a single prompt: ~/.zshrc esc1='SPECIFIC TO ZSH' esc2='SPECIFIC TO ZSH' . ~/.common_prompt ~/.bashrc esc1='SPECIFIC TO BASH' esc2='SPECIFIC TO BASH' . ~/.common_prompt ~/.dashrc esc1='SPECIFIC TO DASH' esc2='SPECIFIC TO DASH' . ~/.common_prompt ~/.common_prompt esc3='COMMONLY INTERPRETED ESCAPE SEQUENCE' PROMPT_COMMAND='eval PS1=\"printf %b "$esc1" "$esc2" "$esc3"\"' And if one shell is likely to do more with the prompt than another, just .dot sourcing .common_prompt file doesn't have to be the end. So if zsh is going to do more processing than dash, for instance - because it will - you just take it from there: ~/.zshrc esc1='SPECIFIC TO ZSH' esc2='SPECIFIC TO ZSH' . ~/.common_prompt _more_processing "${PROMPT_COMMAND}"
0.333333
.dot sourcing .common_prompt file doesn't have to be the end
Internal URL or menu callback to use node/entity content without html/page wrapping
Does anyone know, if there is any work-around or regular setup for panels or custom code known, to be able to use a url/node/%id or node menu-callback to render node/entity content delivered without the rendered page wrapping (<html> <header>,etc)? I am not asking for Panels_everywhere behavior nor for Drupal modules like Colorbox, Lightbox, and all the others, nor Colorbox_node popup and such. I only try to have the node/entity callback url at hand to render entity or node content without any page.tpl.php or html.tpl.php involved, to use it somewhere else like for bootstrap modal, node_panels rendered into modals, or for custom scenarios to get most flexibility. I took a look into Ctools module suite's modal callback and Entity_popup but the lack of documentation (no offense) and the confusion in my mind lead me to here asking for some breadcrumbs and ideas. Thanks for any help on this.
You can definitely do this with the hook_menu() function. It'd look almost exactly like the tutorials you'll see out there for an AJAX request using hook_menu() hook_menu() lets you create your own URL that can access any Drupal or custom function, including making something that just spits out the info you want.
0.777778
hook_menu() lets you create your own URL that can access any Drupal or custom function
Citation to well-known results and reference to user manuals
There are some very well-known results and equations, e.g., Shanon Capacity formula, Erlang Distribution and Poisson Distribution, etc. Do we have to provide a reference for these results as well? Also at times we seek help from a user manual while writing a simulation program or conducting a practical experiment. Do we have to provide reference for user manuals as well?
My first comment will be that it is better to add one reference too many than one too few. Reviewers or editors might suggest to remove references during the review process if they seem superfluous. In some cases, it might be more useful to add references to quite basic concepts. One such instance is when papers are directed at least partially to people outside the field. In such cases it may be sufficient to point at a basic book in the field, as an example to point to a good book on statistics regarding the Poisson distribution (the book has to provide some good information on the topic of course). This can help people who may have a different background to get deeper into the topic. In general there is of course a fine line where references are or are not needed and with time one learns to identify this line better. What you can do is to simply look at other papers that you have read and see where they place the line and try to follow their example. That will likely form a very good basis for finding the right level of referencing. But, be aware that the line is different depending on the audience of the publication where the paper is published and you should briefly check to see what is applicable in each journal where you publish.
1
How to add references to basic concepts?
How do I counter support Zyra?
I main support, usually opting for poke supports such as Lulu and Sona or aggressive supports such as Blitzcrank and Leona. Since the various Regional Finals, however, I've begun to encounter support Zyras in my bot lane. This is a very difficult lane for me. I can't establish lane dominance, since Zyra just sits in her bush and puts seeds in mine. I've tried a rune page with flat MR for when I play against Zyra to counter some of her harass, but it doesn't help against her cc. How can I effectively counter a support Zyra?
Alistar with Varus as partner. Varus has a long range harass with his Q, what is a nightmare to no-healers supports. As Varus takes care of this part, you'll be Alistar and be a bodyguard to him. Play safe, always near the carry and try to fall back a little to coordinate ganks with your jungler. Alistar's CC will leave them helpless against a high-speed gank like Xin Zhao's or Jax's. Janna is also vary strong when facing offensive champions. Her CC and shield can frustrate the enemies if well played. Let's just think: Zyra has no abilities for direct support and being a mage, she depends on her mana. Poking and harassing is the best way to push this kind of support back, and picking a champion with direct support will leave your carry with an advantage against Zyra's carry.
1
Alistar with Varus as a bodyguard
Java regex to validate a name
To validate names that can be John, John Paul, etc. I use this regex: String regex = "[A-Z]([a-z]+|\\s[a-z]+)"; but when I do: boolean ok = Pattern.matches(regex, "John Paul"); the matches fail? Why? I want to use matches to validate the string as whole... Is that regex wrong?
Paul has a capital P and your regex doesn't allow for capitalization at the start of the second word.
0.333333
Paul has a capital P and your regex doesn't allow for capitalization
Oracle: function only returning null
The following function is supposed to return information relating to a particular meeting, stored in a meeting table: CREATE TABLE "MEETING" ( "MEETING_ID" NUMBER(10,0) NOT NULL ENABLE, "TIME" TIMESTAMP (4) NOT NULL ENABLE, "LOCATION" VARCHAR2(40), "MAP_HREF" VARCHAR2(140), "FK_INTEREST_ID" CHAR(4) NOT NULL ENABLE, "ADDITIONAL_INFO" CLOB, "PASSED" NUMBER(1,0), "TITLE" VARCHAR2(20), CONSTRAINT "MEETING_PK" PRIMARY KEY ("MEETING_ID") ENABLE ) ; The code compiles just fine, and runs fine as well. However, if the meeting exists, only null is returned. If the meeting doesn't exist the exception prints 'UNKNOWN APPOINTMENT' correctly. CREATE OR REPLACE FUNCTION GetMeeting (meetingnumber MEETING.MEETING_ID%TYPE) RETURN VARCHAR IS CURSOR current_meeting(meetingnumber MEETING.MEETING_ID%TYPE) IS SELECT TITLE FROM MEETING WHERE MEETING_ID = meetingnumber; r_meeting current_meeting%ROWTYPE; BEGIN OPEN current_meeting(meetingnumber); FETCH current_meeting INTO r_meeting; IF current_meeting%NOTFOUND THEN r_meeting.TITLE := 'UNKNOWN APPOINTMENT'; END IF; CLOSE current_meeting; RETURN r_meeting.TITLE; END; SELECT GetMeeting (27) appointment FROM MEETING;
check below statement: IF r_meeting%NOTFOUND THEN r_meeting.TITLE := 'UNKNOWN APPOINTMENT'; END IF; CLOSE current_meeting; RETURN r_meeting.TITLE; END;
1
IF r_meeting%NOTFOUND THEN r_______meet.TITLE
How much of the universe is observable at visible wavelengths?
Knowing that: The Zone of Avoidance (Looking towards the center of the Milky Way) blocks roughly 20% Each Milky Way star has an angular size, depending on proximity, that obscures a certain percentage of our optical view. Each Galaxy has an angular size, depending on proximity, that obscures a certain percentage of our optical view. And so on through Galaxy Clusters, Superstructures, etc... What percentage of our universe can we not see at visible wavelengths?
Have a look at the Hubble Deep Field image. I downloaded the 1024x1024 version of this and the Photoshop histogram reports that about 95% of the image is dark. From this (somewhat cavalier) measurement I deduce that about 5% of the sky is blocked out by galaxies up to 13 billion years old. I'm not sure what difference going back even further in time would make, though presumably if you go back far enough the surface of last scattering would block out 100% of the field. Note that the deep field deliberately chose a direction in which there were few stars, however only the bigger closer stars show a visible disk through Hubble, so I'd guess that the stars make little difference. Dust clouds will make far more of a difference, but you've already accounted for that by taking the Milky Way into account. Response to comment: How about the picture in http://www.eso.org/public/images/eso1243c/ (there's nothing special about this - I just Googled for "wide field view of sky")? The Adobe histogram trick reports around 95% of the image is dark, though the cutoff isn't that sharp so it could be as little as 90%. This image won't show faint galaxies, but on the other hand the limited resolution makes the stars look bigger than they should be (i.e. they cover more pixels). I'm not sure how you'd come up with a definitive answer since it depends on the resolution and sensitivity of your telescope. Still, I'd guess somewhere around 5% is not a bad estimate. Later still: Actually this is quite interesting in a Friday afternoon sort of way. Consider this: The Milky way contains 100 billion stars and is about 100,000 light years across. The Sun is about 8.3 light minutes away. Suppose the average star is the same size as the Sun (probably an overestimate), and the average distance from the Sun to other stars is 25,000 light years (the distance to the centre of the galaxy), then the average star appears about 1.5 billion times smaller then the Sun. So altogether the 100 billion stars cover about 65 times as much sky as the Sun covers. The Sun subtends about half a degree, which is about 0.0005% of the sky, so all the stars in the Milky way cover about 0.03% of the sky. That backs up my claim that the area covered by the stars can be ignored.
1
How about the Hubble Deep Field image?
Why upvotes and downvotes are not visible in sites other than stackoverflow.com
Possible Duplicate: Why is it a privilege to view vote counts? I can see upvotes/downvotes total in Stackoverflow.com. But the same information seems unavailable in other sites (meta.stackoverflow.com, programmers.stackexchange.com, other stackexchange sites). What is the reason this feature is not enabled of other sites?
You can always use this Stack APP. It allows you to “View Vote totals” without 1000 rep. I use it on quite a few sites :-) It is very useful.
1
Stack APP allows you to view totals without 1000 rep
Importing models from another maya project
I created a scene in Maya in which I created my enviroment (flour, walls etc). In another scene I designed my character and I hooked up it's rig. Now I am looking for a way to export my character from one scene and import him in to another one. I did a google search and all I could find was exporting for blender, exporting for unity and such. Is there an easy way to do this without losing any information?
File → Import will load other scenes into current scene. File → Export allows you to conditionally export things from scenes. PS: Yes its as obvious as that. But depends on your rig whether it will work (it usually does that's what the namespace is for). Maya does not enforce sanity.
0.888889
Import allows you to conditionally export things from scenes
Using a Wiener Filter to Estimate a Transfer Function
As a follow-on to this question about estimating a transfer function of an unknown system using a Wiener filter, How would you put a minimum MSE criteria on how well the estimated filter weights matched the actual transfer function of the system? [Suppose you needed the MSE to be no more than -50dB]? How would you change his formulation if you wanted poles as well as zeroes (an IIR rather than an FIR filter)?
The desired MSE is application dependent, so there can be no general rule. If the approximation doesn't satisfy your needs you can increase the filter length to obtain a better match. There is no straightforward way to change the FIR Wiener filter solution to an IIR solution because the IIR formulation results in a set of nonlinear equations which have no closed-form solution. The IIR solution might also be unstable, so FIR filters are a much more practical choice when computing a Wiener filter.
1
FIR Wiener filter solution to an IIR solution
How do native speakers 'guess' the pronunciation of the letters in a word they see for the first time?
I confess! Being a non-native speaker, I struggle a lot especially when I come across a new word. And I wonder how do native speakers pronounce perfectly even though they read the word for the very first time. There should be some rule/technique? I'm not sure. Let's take a case. If I see a word having 'ch' for the very first time, how do I guess it? Remember, I don't have dictionary. Nor do I have access to this great site when I encounter that word. For example, Take the word 'chariot'. Being a non-native with quite limited knowledge of orthography, I know that 'ch' is pronounced as in 'Charles' But then, imagine, I came across the word 'charade'. Undoubtedly, for me, it is 'ch (as in Charles)-re-d-s'. But then, actually, 'ch' there is 'sh' (as in Shane). It's not just 'ch' but it goes for 'g' as well. 'G' as in 'goat' or 'g' as in 'gymnastic'. Is there any source that teaches how to pronounce a letter if it is placed after/before certain letter? Is there any such rule? The one I remember is when a word ends with 'mb', you don't pronounce 'b'. 'Bomb', 'Comb', 'Tomb' and many other words ending with 'b'. There are a few more words that add another nail in the coffin of my pronunciation complexity! penis (pee, and not as in 'pen') asthma (no 'th' pronounced) Dengue (dengeee) and many more...
Since pronunciation changes over time, any system of spelling that was mapped to pronunciation at a point-in-time would eventually get out-of-sync with the way people are speaking. The system of spelling also has to make a choice (explicitly or implicitly): a) nominate a "standard" pronunciation, so that from the get-go the system would not map to regional variations in pronunciation; or b) reflect regional pronunciation, so there would be many ways to spell the same word. The latter was the case before English spelling was standardized. There are dozens of ways to spell the word for 'sister' in Old English, for example. The Googles of the world would have a difficult time searching if a word might be spelled in a given text in any number of ways. All searches would have to be phonetic, and the search engine would have to understand the rules of regional pronunciation, and to the degree it did not, there would be misses and false positives galore. It's possible to "get close" when guessing a pronunciation, but that's about it. If you don't recognize the word as a loan-word from another language, say, and so may be following some special rule, you won't stand much chance of guessing right. For example: depot. But for the most part, spelling of English words does follow some basic phonetic rules that can be learned.
1
How to spell a word for "sister" in Old English
System for Setting: Misfits
On the recommendation of one of my players, I'm watching Misfits, a British TV show about kids (Their ages aren't so far specifically stated; they're old enough to drink and young enough to live at home, so late-teens to early 20s, I guess) serving community-service sentences who get super powers. The recommendation included an explicit desire for me to run a game like this. I'm watching it and thinking about what system to run it in. I want to ask this question more clearly than my last system-for-setting question, so here are some specific points to consider when answering: WARNING! Spoilers Below! If you haven't watched the series but plan to, you might not want to read what follows. I tried to separate setting spoilers from the system requirements, but it just didn't work. The world is gritty and the power level is relatively low. It reminded me of Wild Cards, with "the storm" as the catalyzing event. Therefore, the system must support fine gradations in power - the scale is pretty low, so a small advantage needs to be representable. Powers are uncontrollable - at least at first. Alisha's lust-inspiring power is uncontrolled as far as I have watched, and the immortality power (obviously) works without conscious effort. Curtis' time rewind is a power of huge significance, but it's not controlled by the beginning of the second season either. Therefore the system must support uncontrolled and unreliable powers. The system you recommend must support regular humans as significant combat threats - Sally gave Simon a real fight. Player character death must be a real possibility. This is also an ensemble drama, like Buffy, and much of the story is about the changing relationships between the characters. When answering, please include only one system per answer to facilitate voting. In your answer please address the following: How that system fits the given criteria What special or unique features of the system are particularly suited to driving this style of play I will not accept answers along the lines of, "You can do this (or anything) in any system". They will be downvoted and / or flagged for deletion. This question presupposes that System Does Matter.
GURPS Supers would be absolutely perfect for this. Give characters a normal human point level, with one (usually, so far) power built separately. I'll even write them up if you like, I love Misfits. GURPS PCs are easy to kill if you're using things like hit location and the bleeding rules -- I haven't seen anything in the show that wouldn't be straightforward just using the rules as written. (GURPS did Wild Cards and the two are quite similar in terms of mechanics -- normal people who also have powers. Unless one of your powers is "being bulletproof", you're going to have to worry in a fight with normals.) Unfortunately with regular GURPS, it is not possible for players to die. But their characters can.
1
GURPS PCs are easy to kill if you're using things like hit location and bleeding rules
How to delete application data on install and reinstall
How to delete application data on install/reinstall application, so I can have a clean working environment on every reinstall ? I mean how to detect that this application has been reinstalled so I can clean the whole persistent store. Thanks.
Maybe I'm misunderstanding, but shouldn't your uninstaller just delete the persistent store? Some uninstallers have a checkbox option that lets the user control whether or not their data is uninstalled as well, but it's definitely the uninstaller's job to get rid of it if necessary
1
Uninstaller deletes persistent store?
High ping on games while streaming
I'm streaming with Elgato Capture Card to Twitch. I get high pings on games while streaming (1700kbps). How can I decrease pings while streaming? Here is my bandwidth:
The problem is you upload speed =(. When you are streaming, you are sending a lot of data, so your ping will get highter. You may call to your internet service provider (ISP) to ask if they can raise your upload speed. Also try to decrease the quality of your stream. By quality I mean, for example, from 720p to 480p.
1
How to increase upload speed?
Get raw output from web server
For research I am looking to get the actual raw output that apache sends when responding to a request, including all get data, headers, and the html. How would I go about this? I have tried: wget --output-document=response.txt -S "http://thewebsiteinquestion.com" This shows me the response headers all layered out nicely and sends the HTML to the response.txt, but I really want to see raw text and how this is formatted.
I imagine it could be done with wget but I know how to do this with curl. yum install curl or whatever for your OS if you don't already have it installed: curl -vv http://thewebsiteinquestion.com The output will show you the raw response from the server, including the headers and body, like you wanted. This is purely a preference thing but I've generally found curl easier and more intuitive to use for testing and development than wget. Sometimes it's also helpful to use telnet and speak raw HTTP. As a sysadm/dev I find this invaluable. For example: $ telnet google.com 80 Trying 74.125.239.0... Connected to google.com. Escape character is '^]'. GET / HTTP/1.0 Host: google.com HTTP/1.0 301 Moved Permanently Location: http://www.google.com/ Content-Type: text/html; charset=UTF-8 Date: Thu, 20 Sep 2012 22:31:32 ... the rest ommitted All you need to type by hand is the GET / HTTP/1.0 and Host: google.com lines. Then hit enter twice. This way you really see the full response from the remote HTTP server, with nothing getting in the way. As you play around with it you learn better how HTTP works, and will never get confused when redirects are happening (as you can see is happening above, via the 301 HTTP status and Location header), and your tool (browser, wget, curl) is handling them automatically for you. Edit: how to pass GET parameters using telnet. Just add them to the path you're GETting when you speak HTTP: $ telnet thewebsite.co.uk 80 Trying 95.131.67.221... Connected to thewebsite.co.uk. Escape character is '^]'. GET /?foo=bar HTTP/1.0 Host: thewebsite.co.uk HTTP/1.1 200 OK Date: Fri, 21 Sep 2012 17:43:27 GMT Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 Last-Modified: Mon, 01 Jun 2009 20:10 ... To do a POST query, you have to calculate the length of the submitted data and put it in Content-Length, and that looks like: $ telnet www.yahoo.com 80 Trying 72.30.38.140... Connected to ds-any-fp3-real.wa1.b.yahoo.com. Escape character is '^]'. POST / HTTP/1.0 User-Agent: telnet Host: www.yahoo.com Accept: */* Content-Length: 8 Content-Type: application/x-www-form-urlencoded p=foobar HTTP/1.0 200 OK Date: Fri, 21 Sep 2012 17:57:35 GMT P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV" Cache-Control: private X-Frame-Options: SAMEORIGIN ...
1
GET / HTTP/1.0 Host
Can I extend my monitors, mouse, keyboard accross a room?
I am considering building my next PC into a server rack case, the reason is I am getting a server cabinet and will be putting in a few servers in it. It will be in my room where I use my main PC as well and in my case it just makes sense to build my next PC into this cabinet/rack. So my main concern, will I be able to extend my mouse, keyboard, and 2-3 monitors 10-15 feet across a room from my server rack to my desk?
You could, in the case of the peripherals, go wireless, [s]but 15 feet is longer than most cable specs allow for (USB, for example, is 5m)[/s], however a DVI cable must reach 16 feet, so you'll just need a long cable. I fear it may be more trouble than it's worth, though.
0.888889
DVI cable must reach 16 feet, so you'll need a long cable
Why Have The System Builder Market Not Migrated to the BTX Form Factor from ATX yet?
I'm starting to build my first computer from the parts that I have purchased and a question that had been nagging me for the past few weeks was why the ATX form factor is still currently used when there is the newer BTX formfactor.
There seems to be insufficient drive to make the change. There was some noise that BTX offered better component layouts (speed) and airflow for hotter components, but when you look at the requirements for case manufacturers to change their case designs (or as some manufacturers attempted - offer convertible designs), motherboard manufacturers to change their layouts, etc... it's not enough benefit to drive the costs and make the change.
1
Insufficient drive to make the change
How to display a calendar on click of a textbox with jQuery?
I have a text box and a submit button. On clicking on text box,calender is showing. my problem is that the following code has css or js file which has url of Http etc.I want css or js file on my system from following link because i am working on IBM RAD and can't use external files. So,please help me. <!doctype html> <html lang="en"> <head> <meta charset="utf-8" /> <title>jQuery UI Datepicker - Restrict date range</title> <link rel="stylesheet" href="http://code.jquery.com/ui/1.10.3/themes/smoothness/jquery-ui.css" /> <script src="http://code.jquery.com/jquery-1.9.1.js"></script> <script src="http://code.jquery.com/ui/1.10.3/jquery-ui.js"></script> <link rel="stylesheet" href="/resources/demos/style.css" /> <script> $(function() { $("#datepicker").datepicker({ minDate: "-6M ", maxDate: -60 }); }); </script> </head> <body> <p>Date: <input type="text" id="datepicker" /></p> </body> </html>
Just go to the links, 1.open the link in the crome browser, 2.just say CTRL+S, (save as) then click on save button to your working directory, 3.Change your links accordingly.
1
Go to the links, 1.open the link in the crome browser, 2.just say CTRL+S, (save as
Versioning with folders and document sets?
According to this question SharePoint doesn't version folders. Is the same true of Document Sets? I know there is a ribbon command to manually capture a version of a document set, but does nothing happen automatically when the document set item is changed? I have custom document set content types and custom folder content types in my library which have various metadata fields. Versions are not being created when these fields are edited. Is this working as intended?
If you use document sets and versioning you should be aware of this: If the version of a document inside a document set changes, the version of the document set remains unchanged. Versioning of a document set can be done manually (by using the document set's ribbon) Versioning of a document set is like creating a snapshot http://www.sharepointeurope.com/blog/2013/5/2/sharepoint-2013-versioning-and-document-sets
1
Versioning of document set can be done manually
Express.js public folder content only available when logged in
I am trying to access my static image file inside public directory via http://<IP Address>:3000/image.jpg and it available only when I am logged in to my server. As soon as I log out I get GET 404 Not found in Network Tab and instead of page: Error: Not Found at module.exports (<path>/app.js:48:15) at Layer.handle [as handle_request] (<path>/node_modules/express/lib/router/layer.js:82:5) at trim_prefix (<path>/node_modules/express/lib/router/index.js:271:13) at <path>/node_modules/express/lib/router/index.js:238:9 at Function.proto.process_params (<path>/node_modules/express/lib/router/index.js:313:12) at <path>/node_modules/express/lib/router/index.js:229:12 at Function.match_layer (<path>/node_modules/express/lib/router/index.js:296:3) at next (<path>/node_modules/express/lib/router/index.js:190:10) at <path>/node_modules/express/lib/router/index.js:192:16 at Function.match_layer (<path>/node_modules/express/lib/router/index.js:296:3) I have app.use(express.static(__dirname + '/public')); in my app.js file. All my routes are working fine and I am getting JSON response when requesting any route when I am logged out and I only get problem with files inside public directory. I am running my script on server with forever start -c nodemon bin/www I tried moving app.use(express.static(__dirname + '/public')); to the top but same problem. Does anyone have an idea why public folder is only accessible when I'm logged in to my server?
It was a problem with owner and group of my project folder. I have followed steps as in this article (First Express App part) and everything works fine now.
0.888889
Problem with project folder owner
Why Ionic compounds dissolve into water
First, I would like to say that I understand the basic idea of disassociation and solubility. However, as I study intermolecular forces I feel like this basic Idea is being challenged. My understanding from basic chemistry is that ionic bonds are much stronger than covalent bonds, due to the actual exchange of electrons and the formation of cations and anions, causing an attractive force between the opposite charges to "hold" the compound together. When explaining solubility with IMF theory, however, I fail to understand how the IM forces present in water--dipole-dipole, H-bonds, and dispersion--are able to overcome that attraction between the cation and anion present in the ionic bond; because, I was under the impression that actual bonds are always stronger than IMF bonds. So, for instance, does it not infer that if, say, Sodium Chloride is placed into water, and the attraction of the h-bonds in water cause the NaCl to essentially break apart into ions, that the inherent attractions between cations and anions in an ionic compound are weaker than the attraction force of the h-bond water molecule?
An individual IMF bond is weaker than an ionic bond. But when a salt dissolves, at least 4 IMF bonds are formed for each ionic bond. This is why some salts (e.g. CaCl2) release heat when they dissolve.
0.888889
When a salt dissolves, at least 4 IMF bonds are formed for each Ionic bond
Increasing number of decimal places with FixedPoint
I've tried: In[169]:= newton3[x_] := N[1/2 (x + 3/x)]; FixedPointList[newton3, 1.0] Out[170]= {1., 2., 1.75, 1.73214, 1.73205, 1.73205, 1.73205} Of course: In[164]:= N[Sqrt[3], 20] Out[164]= 1.7320508075688772935 How do you use the FixedPointList to increase the number of decimal places?
The problem is not FixedPointList - the problem is that Mathematica by default doesn't display that many digits. Consider for example FixedPoint[newton3, 1.0] // InputForm which displays several more decimals. Another option is to increase PrintPrecision: SetOptions[InputNotebook[], PrintPrecision -> 10] This increases the number of decimals shown for all values in the current notebook. Style[FixedPoint[newton3, 1.0], PrintPrecision -> 10] does the same for the particular expression. Finally we may do the following to make sure the problem isn't with FixedPoint: FixedPoint[newton3, 1.0] == Sqrt[3] (* True *)
1
FixedPointList - the problem is that Mathematica doesn't display that many digits
How can I redirect what is shown on Terminal to a file, when using the 'less' command?
How do I redirect the Terminal content (the content that currently I'm looking not the entire file, when using the less command) into a outfile until I press the Q to exit from less?
To save just the section that is currently displayed in your terminal you can use the | command. From man less: | <m> shell-command <m> represents any mark letter. Pipes a section of the input file to the given shell command. The section of the file to be piped is between the first line on the current screen and the position marked by the letter. <m> may also be '^' or '$' to indicate beginning or end of file respectively. If <m> is '.' or newline, the current screen is piped. So first type | (the pipe symbol) Then choose the . mark to select only what's visible on your terminal (or just hit Enter) Use tee to save to a file e.g. tee /tmp/section_of_big_file.txt Press Enter then q The sequence with screenshots:
0.888889
Pipes a section of the input file to the given shell command
How can you (anybody) find out the IP address of a single computer inside college
How can you find out the IP address of a single computer inside a college network. Every computer has the same public IP address on the network. How is it possible, after discovering that the IP is from that college, to find the computer from which the attack/request/etc originated?
I suppose that our situation is the following: you have detected some undesirable network traffic and you are looking for the perpetrator, so as to, more or less metaphorically, convey to him the inherent unwisdom of his villainous behaviour. The source address of the offending IP packets points to a college; the college uses Network Address Translation so that outgoing traffic from all their students is seen, from the outside, as coming from a single IP address. (Or, possibly, you are the wannabe evildoer and you want to know what the Long Arm of the Law could do to trace you back. It does not change the technical situation.) Strictly speaking, the college acts as a kind of anonymizer, since it blocks the actual (internal) IP information. So you should ask the college. They may have detailed logs on network activity, which may help pinpoint the uncivilized individual; for instance, the DHCP logs within the college network could give some information on who had their computer up and running at the time of the indelicacy. There are various sources of such information, which depend a lot on the structure of the internal college network. Be sure to bring all the information you have on your side; network traces obtained with a network monitor application (like Wireshark or the aptly named Network Monitor) are a must. Also, bring all logs, especially Web server logs, because Web browsers tend to produce a lot of information which can be quite specific to the specific computer which sends the requests (see this page for details).
1
Network Address Translation for offending IP packets points to college
Several attempts at cranking required to start car
Every time I get in and turn the key nothing happens. After turning the key a number of times, it will start up as normal. I have had a new battery, and new wiring to the starter motor installed, and also gotten a new key. Still the same thing is happening. My car is a 2006 Kia Sedona diesel.
If the engine does not turn over on the first few times of turning the key, then in the light of what you have already had done, the switch on the bottom of your ignition key barrel may be at fault, or you starter motor solonoid sticking. If the engine turns over but does not start, and you have let the glow plug warning light go out, then an ECU relay defect may be your answer.
0.777778
If the engine does not turn over on the first few times of turning the key, then the switch on the bottom of your ignition key barrel may
how do i get rust stains off driveway
I used fertilizer with iron and, unfortunately, didn't sweep adequately afterwards. Afterwards I ran my sprinklers and now my driveway and sidewalk are peppered with unsightly rust stains. What are the best ways to get it off? (By "best" I mean easiest and most efficient, while still being safe, inexpensive, and not too harmful to the nearby lawn.) Any suggestions?
Use a cleaning product called CLR also known as calcium,lime and rust remover. It is available at hardware stores and home centers.
1
CLR cleaning product also known as calcium,lime and rust removal
Hydrophobia Outside of Rabies?
RELATED: Why does rabies cause hydrophobia? Agony, Hydrophobia and viruses in the light of evolutionary principles Has hydrophobia been found outside of rabies? I have only seen it being mentioned as a symptom of rabies.
Hydrophobia is mostly attributed to rabies, most of the sources refer rabies as hydrophobia. Technically Hydrophobia is the intense fear of water. Hydrophobia is an intense, irrational fear of water that can be commonly diagnosed at childhood and should be treated as soon as possible. Certain types of hydrophobia may also appear in later stages of contracting rabies, which would require treatment on an immediate basis. Also the Wikipedia link for Rabies states that Signs and symptoms may soon expand to slight or partial paralysis, anxiety, insomnia, confusion, agitation, abnormal behavior, paranoia, terror, and hallucinations, progressing to delirium. The person may have hydrophobia. So rabies and hydrophobia are distinct and hydrophobia is a symptom of rabies. Hydrophobia may, however, more readly be confronted with hysteria, acute mania and tetanus. Hydrophobia is incidental to other diseases, it can be observed, occassionally, in tetanus,hysteria,cynanche,tonsillaris,tracheitis and certain inflammations in stomach. Tetanus is strongly believed to cause intense hydrophobia conditions.How ever, there is always a belief of hydrophobia linked with rabies. The pathology of Hydrophobia and Tetanus is found to have great similarities and there is a great similarity in the distribution of lesion in the central nervous system as well as a certain analogy in the kind of lesion. The special localization of symptoms of both disease, in the tongue,throat and neck was associated with the special prevalence of the lesions in the medulla oblongata and especially in the neighborhood of the nuclei in the fourth ventricle etc. Reference :THE Medical Times and Gazette - J & A Churchill So it is possible to cause hydrophobic conditions when Tetanus is affected and also hydrophobia can occur from mental disorders.
0.777778
Hydrophobia is an intense, irrational fear of water that can be commonly diagnosed at childhood .
hide javascript/jquery scripts from html page?
How do I hide my javascript/jquery scripts from html page (from view source on right click)? please give suggestion to achive this . Thanks.
Your best bet is to either immediately delete the script tags after the dom tree is loaded, or dynamically create the script tag in your javascript. Either way, if someone wants to use the Web developer tool or Firebug they will still see the javascript. If it is in the browser it will be seen. One advantage of dynamically creating the script tag you will not load the javascript if javascript is turned off. If I turned off the javascript I could still see all in the html, as you won't have been able to delete the script tags. Update: If you put in <script src='...' /> then you won't see the javascript but you do see the javascript file url, so it is just a matter of pasting that into the address bar and you d/l the javascript. If you dynamically delete the script tags it will still be in the View Source source, but not in firebug's html source, and if you dynamically create the tag then firebug can see it but not in View Source. Unfortunately, as I mentioned Firebug can always see the javascript, so it isn't hidden from there. The only one I haven't tried, so I don't know what would happen is if you d/l the javascript as an ajax call and then 'exec' is used on that, to run it. I don't know if that would show up anywhere.
1
Dynamically create the script tag in your javascript
"How big of a problem" vs. "how big a problem"
Quite a few phrases in English are constructed like so: How [adjective] a [noun]...? This is the question form of the construction, which is often answered with the negative: Not that [adjective] a [noun]. or the positive: Quite [adjective] a [noun]. However, from time to time I'll hear the word 'of' inserted before the 'a', e.g.: Not that [adjective] of a [noun]. This usually sounds wrong to me, with the exception of the case where the adjective 'much' is used. So, this sounds fine to my ear: Not that much of a problem. whereas this doesn't: Not that loud of a noise. Why is it that 'much' should be used with 'of', and other adjectives not? Is it because 'much' is seen as measuring a quantity (of something), whereas other adjectives that may be used in this construction are seen as measuring the quality of a whole thing?
What about "not that high (of) a fence"? "not that red (of) a heart" "not that smart (of) a person? not that big (of) a problem? I would argue that if you use the word that to qualify the adjective, the of is in fact necessary to convey the meaning of comparison of a specific entity to the class of general entities to which it belongs. I'm sure the usage can be regional, as well. There is no hard and fast rule. EDIT Hey, I did some more research. Dictionary.com has the following usage note for "of" : Of is sometimes added to phrases beginning with the adverb how or too followed by a descriptive adjective: How long of a drive will it be? It's too hot of a day for tennis. This construction is probably modeled on that in which how or too is followed by much, an unquestionably standard use in all varieties of speech and writing: How much of a problem will that cause the government? There was too much of an uproar for the speaker to be heard. The use of of with descriptive adjectives after how or too is largely restricted to informal speech. It occurs occasionally in informal writing and written representations of speech. So, I suppose that's the reason why adjectives other than "much" combined with "of" sound odd to your ear. I believe "that" can be included with "how" or "too" in this synopsis. Replacing "much" with another adjective occurs occasionally in informal writing and in speech, but isn't unquestionably standard. When I say these constructions out loud, to me, I often want to insert the of but perhaps that has something more to say about the informality of my speech rather than the correctness of the construction. :)
1
What about "not that high (of) a fence"
Coolant still in expansion tank after draining from engine and radiator -- BMW E46 (2003 330i)
I attempted to do a cooling system flush today (along with replacement of radiator hoses, water pump and thermostat). After removing the blue drain plug (my car only had one, apparently some cars have two) on the bottom of the radiator and another drain plug on the side of the engine under the exhaust manifold, my expansion tank still has a bunch of coolant left in it. Does any one know if that's normal? Is there another special way I should get it out?
That is normal. I wouldn't worry about trying to get the rest of it out.
0.833333
I wouldn't worry about trying to get the rest of it out
Autogeneration column in list
I want to create a field in list whose value should be autogenerated. Like 'Ticket ID' , which get autogenerated or populated when item get created with 'INC0001' , 'INC0002' so on. (INC000 need to be added as prefix) Can i acheive it by SPD 2010 workflow or javascript?
There are many approaches (workflow, calculated column, event handler, custom feature etc) but you may try with wrokflow or calculated column. Just check below article for workflow: http://dlairman.wordpress.com/2011/01/10/add-a-unique-auto-incrementing-column-to-a-sharepoint-list/ http://social.technet.microsoft.com/Forums/sharepoint/en-US/9ff1dc1b-140f-4199-a843-3b7b7388b6da/how-to-generate-auto-increment-id-for-sharepoint-list-item-using-calculated-column?forum=sharepointgeneralprevious Check this for calculated column: https://www.nothingbutsharepoint.com/sites/eusp/Pages/sharepoint-how-to-create-an-auto-incrementing-number-field-for-use-in-a-custom-id-part-1.aspx Let us know if you face any problem in above approach.
0.888889
Calculated column or wrokflow
How can I use an SVG image as a map marker in OpenLayers-3?
I am trying to create map "pin-drops" (ie. map markers) in OpenLayers-3 (OL3) using SVG images. Currently, I am using PNG images as the pindrops that reference the ol.style.Icon source (“src”) property attribute just fine. However, this fails using an SVG image. Is there some other way to use an SVG in the same manner? Maybe by using a reference besides ol.style.Icon even? There is already a lot of built-in SVG in Open Layers so this should be possible, but I haven't found a way to get this working in OL3. Is there some other way to do this in OL3 that I should consider? Please note: we already tried using an ol.Vector layer, however when the user zooms in/out, the size of the SVG image grows/shrinks which is an inadequate workaround. OL3 (fails): var createMapMarkerImage = function() { return function(feature, resolution) { var iconStyle = new ol.style.Style({ image: new ol.style.Icon( ({ src: 'img/map_pindrop.svg' // OL3 doesn’t like this, but accepts a .PNG just fine })) }); return [iconStyle]; }; }; Very similar functionality, is the below example I found online, is almost perfect if it weren’t for the fact that the example uses OpenLayers-2 (OL2) functionality which calls openlayers.js library (instead of OL3’s ol.js library). Sadly, swapping these javascript files out fails. OL2 (works -but is the old OL library): http://dev.openlayers.org/sandbox/camptocamp/tipi/examples/vector-symbols.html Searching online for a solution to this seems to produce only other confused people searching for a solution. Please help, FreeBeer
I also had issues to show the icon image, ahocevar answer helped me to solve my problem but I had also to search for the php header, for SVG In case you are or others who see this answer are using php to generate the SVG you have to use header function to identify the content-type header('Content-type: image/svg+xml'); /* this line will do the magic */ echo '<?xml version="1.0" encoding="UTF-8" standalone="no"?> <svg width="100%" height="100%" version="1.1" xmlns="http://www.w3.org/2000/svg"> <circle cx="100" cy="50" r="40" stroke="black" stroke-width="2" fill="red"/> </svg>';
1
php header to generate SVG
How to know BMW e46 AC type
Apparently there are two types of air conditioning units - IHKR and IHKA - in BMW e39's. I'm curious whether there are different types in e46's and, if so, how do I find out?
From this PDF, it shows the difference and it's pretty easy to see. This is the IHKA control in the e46. It is an automatic control. This is the IHKR control in the e46 (with the radio above it). It is a manual control.
0.888889
IHKA control in the e46
Understanding the definition of the order of an entire function
Let $f: \mathbb C \to \mathbb C$ be an entire function. The order of $f$ is defined by $$\lambda=\limsup_{r \to \infty} \frac{\log \log M(r)}{\log r}, $$ where $$M(r)=\max_{|z|=r} |f(z)| .$$ The author claims that "According to this definition $\lambda$ is the smallest number such that $$M(r)\leq e^{r^{\lambda+\varepsilon}} $$ for any given $\varepsilon > 0$ as soon as $r$ is sufficiently large." Why is this true? My attempt: We know that $$\lambda=\lim_{\rho \to \infty} \sup_{r \geq \rho} \frac{\log \log M(r)}{\log r}. $$ From the definition of the limit we have that for any $\varepsilon>0$, there exists some $\rho_0>0$, such that $$\left\lvert \sup_{r \geq \rho} \frac{\log \log M(r)}{\log r}-\lambda \right\rvert \leq \varepsilon ,$$ for every $\rho \geq \rho_0$. In other words $$\frac{\log \log M(r)}{\log r} \leq \lambda+\varepsilon $$ for every $r \geq \rho_0$. From here it is easy to see that $$M(r)\leq e^{r^{\lambda+\varepsilon}}, $$ for all $r \geq \rho_0$. I cannot see why $\lambda$ is the smallest number with this property. Thanks in advance.
Note that $$F(\rho) = \sup_{r \geqslant \rho} \frac{\log\log M(r)}{\log r}$$ is a non-increasing function of $\rho$, hence $\lim\limits_{\rho\to\infty} F(\rho) = \inf\limits_{\rho > R} F(\rho).$ By the definition of the limes superior, for every $\mu < \lambda$, with $\varepsilon = \frac{\lambda-\mu}{3}$ there are arbitrarily large radii $r$ with $$\frac{\log \log M(r)}{\log r} > \lambda - \varepsilon = \mu + 2\varepsilon,$$ and that inequality is equivalent to $$M(r) > e^{r^{\mu+2\varepsilon}},$$ so for every $\mu < \lambda$, there is an $\varepsilon > 0$, such that there is no $\rho_0$ with $$M(r) \leqslant e^{r^{\mu+\varepsilon}}$$ for all $r \geqslant \rho_0$, indeed $$M(r)e^{-r^{\mu+\varepsilon}}$$ is unbounded for all small enough $\varepsilon > 0$ then.
0.777778
Unbounded for all small enough $varepsilon >
COP8 MCU information needed
I have a problem with a sbc that I am repairing, the sbc is controlled by an 8-bit OTP microcontroller which I think is broken. I only get 200 ohms between pin Vcc and Vss, specifically the chip is COP87L84BC and is out of production. What I try is to read the registers of the microcontroller with a cable ISP and any similar software WinPic800 but for this chip. I never used the COP8 OPT from National Semiconductor so I wanted information about this MCU or web sites where I can find information.
200 ohms between Vcc and Vss: are you sure the MCU is to blame? You would have to remove it completely from the circuit just in case there is something else connected to the Vcc rail that is actually faulty. If you apply power, do you see any of the I/O lines changing state?
0.777778
Vcc and Vss are connected to the MCU?
put an html (scripted) menu in a separate file
I have a menu that I've created using jquery that "pops-up" on certain button mouse-overs. it has a LOT of options and sub-menu options and I'd like to put it into a separate file so that it only needs to be downloaded once and all of the html markup and text doesn't need to be re-downloaded every time a user hits a sub page on my site. I was toying with the idea of using the jquery template engine but couldn't quite wrap my head around the best way to work that. This isn't a template after all, but a static menu. I'm pretty sure I can't put it in a JS file because it's not script per se, it's actual html markup (mostly tables). Any ideas?
not really sure what you mean but what I tend to do is include the html for all "pop-ups" in the original page markup and simply toggle display to none or block with whatever JQuery event you want, such as $("button#popupbtn").click(function(){$("#hiddencontent").css("display", "block")}); This way you dont have to download the markup every time as you would if you were using Ajax and you get the SEO benefits of whatever is in the extra markup too. If you did choose to use Ajax you could also prevent repeated downloading by caching the results (basically saving a local copy to reuse) after they have been downloaded, but this wouldn't really be necessary because the 1st method is easier and better for SEO
0.5
html for all "pop-ups" in original page markup
What is kvm reboot?
Some web hosting providers offer "kvm reboot" for their dedicated servers? What does that mean? Does it mean the server reboots automatically after a crash or freeze?
Both bdonlan and Tom may be right - KVM stands both for Keyboard Video Mouse, which will give you remote access even to the BIOS pre boot stage of your server, or for Kernel Virtual Machine, which your server might be virtualized on. You should contact the host you are considering to use and ask which of these they mean - know what you pay for.
1
KVM stands both for Keyboard Video Mouse and Kernel Virtual Machine .
Killed Enzymes in Yogurt
We are big dairy eaters in our home, so I successfully make about a gallon of Greek yogurt every few weeks. Today I started my process as usual, but with so many things happening at once (just had my 2nd baby, so things are hectic), I failed to remember to let the milk cool before adding in my enzymes: I stirred them in right at 180 degrees. So having killed my enzymes (sigh), what can I do with all of this milk/yogurt mix aside from throwing it down the sink? Pardon my stupidity and lack of knowledge on the subject, but would the heating process alter at all the calories/nutrients in the milk/yogurt in any way (aside from the obvious death of the innocent enzymes)? Will my milk curdle or something? Thank you!
Why not just add more enzymes after the stuff cooled sufficiently? Enzymes you add to food are generally not toxic. If you denature them by getting them too hot, they don't usually renature spontaneously when the food cools down. They'll just act like a gram, or whatever amount, of protein added to your yogurt mix. Adding fresh enzymes once the milk is cool enough won't hurt anything. Those new, happy enzymes will just do their enzymatic thing, and give you the yogurt you want.
1
Enzymes you add to food are generally not toxic
How to speed up publishing papers?
In my field, good journals often seem to take around 12-20 weeks to review papers. As was suggested in a previous post, "How is it in my best interest not to submit a paper to two journals simultaneously?," one should not submit same paper to two journals. But none is omniscient to do multiple papers on various topics. Can any one kindly suggest how to speed up the publication process? Can journals reduce time? Or is this suggestion acceptable only after acceptance?
If I'm understanding correctly, the problem you're concerned about is what to do when you've just submitted a paper, and now you have a long wait before you can submit the follow-up paper. Your question then presumes that a good solution to this problem is to try to accelerate the publication process. I think that is a bad assumption. There is no reason that you need to be stalled on your forward progress just because a paper is under review. Here are two good alternatives that work within the system. You can continue directly building on the same direction. If you get to a major milestone and are ready to submit a new paper before the previous one is finished reviewing, you can submit a paper citing the one under review as "submitted," and include the draft paper as supplementary review-only information. Research typically has a lot of "branching path" options getting catalogued in your "future work" sections. Why not take a secondary path that you've wanted to investigate but isn't in the same exactly line of progression as the paper currently under review? That will likely lead to its own interesting results that can be published without dependency on the paper currently under review. It also seems possible to me that this concern may have arisen due to trying to publish too incrementally. If you cluster your work into larger "publication units" the time lag will likely be less problematic and a smaller number of significant papers is generally better for your career than a bunch of little incremental papers that nobody cares about.
0.666667
What to do when you've submitted a paper?
What bulbs do I need for a Micra K11 dashboard?
In my Nissan Micra K11 dashboard, the backlights for the clock and left-hand side of the speedo have stopped working. The dashboard is similar to the one pictured below, with the central clock and fuel/speedo/engine temperature gauges, no rev counter. What bulb(s) do I need to repair them, and do they need to be all replaced at the same time?
'K11' covers a lot of Micra's. The bulbs come in a couple of varieties: Held captive in a plastic holder which comes with the bulb or the usual capless bulb. It is not necessary to change all of the bulbs at the same time, although prudence might say... "while one or two have failed so others may fail soon"...
1
'K11' covers a lot of Micra's
What brass band instruments can a cornet player feasibly cover on short notice?
Is it reasonable to expect that an experienced cornet player should be able to pick up a "middle of the band" instrument, like a baritone, or an Eb horn and become reasonably proficient in a few hours across a day or two? How large is the shock to the embouchure and how costly is it to then move back?
If the player has a good ear (and you're not asking them to do really virtuosic playing), then the "embouchure shock" should be fairly minimal. As long as they're still reading transposed treble clef music, the fingerings will be exactly the same, with the notable exception of french horn (or is that a brass band instrument to start with?). Tuba doesn't read treble clef traditionally, but a treble clef, transposed part could be easily created that would work just fine for the player. If the player is brand new at brass instrument doubling, then yes, they may need a few days to get used to it, just for the fact that it's different from a cornet. A more experienced doubler can usually switch around at will with no "adjustment period".
1
a treble clef, transposed part could be easily created .
What is the keyboard shortcut for 'Mark as read' in GMail?
In the new Yahoo! mail I can select multiple checkboxes against my email subjects and press k to perform the action Mark as read. Is there a similar alternative in GMail?
Gmail "Mark as Read": Shift + I Other useful keyboard shortcuts: Display a list of Gmail keyboard shortcuts: Shift + / or (?) Select all unread conversations: *, then u Also, you could map K to "Mark as read," just like in Yahoo mail. The "Custom keyboard shortcuts" Gmail labs feature lets you customize your keyboard shortcut mappings. It adds a new Settings tab from which you can remap keys to various actions. ...or you can add a "Mark as Read" button via another Gmail labs feature.
1
Gmail "Mark as Read"
Selecting multiple icons in Finder using the keyboard?
Is there a way to select icons (using the keyboard) that aren't directly touching? In Windows, I'd press Ctrl+Down, but it doesn't work in the Finder view. I've tried all the usual keyboard shortcuts, but it doesn't seem to work. I can multi-select other icons just fine, but I can't multi-select these two. The picture explains it better than I could. The icons in this folder are aligned to the grid.
The answer, it turns out, is fairly unintuitive. Select the last item (the PSD). Press Shift + Up. Hold Shift and press Right repeatedly until you get the selection you want.
0.666667
Select the last item (the PSD)
Can grep return true/false or are there alternative methods
I'm trying to write this script for an assignment - it's only the second one I've written so bear with me. As a part of this script, I need to be able to check if the first argument given matches the first word of file. If it does, exit with an error message, if it doesn't, append the arguments to the file. I understand how to write the if statement, but not how to use grep within a script. I understand that grep will look something like this grep ^$1 schemas.txt I feel like this should be much easier than I am making it. Any help appreciated. Update: I'm getting an error too many arguments on the if statement. I got rid of the space between grep-q and then got an error binary operator expected. I've been poking around at it, but I don't see what it sees. if [ grep -q ^$1 schemas.txt ] then echo "Schema already exists. Please try again" exit 1 else echo "$@" >> schemas.txt fi
Another simple way is to use grep -c. That outputs (not return as exit code), the number of lines that match the pattern, so 0 if there's no match or 1 or more if there's a match. So, if you wanted to check that the pattern is matched 3 or more times, you would do: if [ "$(grep -c "^$1" schemas.txt)" -ge 3 ]; then ...
1
grep -c outputs (not return as exit code), number of lines that match the pattern
Can I replace an old closet light with multiple electrical outlets?
I have asked a family member to replace an old light fixture in a large walk in closet with an actual electrical strip. The house is an 101 year old craftsman. There aren't any electrical outlets in that corner of the small house. The closet(has windows so it will be my office) I will need electricity for desktop pc, printer, at least one light, and just outside the closet I need to run at least two more lamps. Is that safe? Is it too much? We won't be doing iside wiring. Again only an old light fixture that has electrity running though an old fashion "flex tube" for lack of a better word.It is on the outside of the wall. ANY precautions or ideas?
The best answer to this is to leave the light as a light and have a qualified electrician run a three wire circuit (hot, neutral, ground) direct to your soon-to-be office. Your modern equipment needs it and disturbing any old turn of the century wiring is asking for disaster. Having lived in an old house with Range, Pump and four circuits, adding any extra load to an ancient system without upgrading the wiring is a good indicator for having several fire detectors located in strategic places and keeping their batteries up to date.
1
The best answer is to leave the light as a light and have a qualified electrician run a three wire circuit direct to your soon-
Hyperlink + Javascript = One click?
Is it possible to integrate a javascript into a hyperlink? Or make it into some sort of batch script or whatnot, so when the page has loaded it calls the javascript which is a button on the page? To explain it further: We have this page: http://work.acceptance.XXXX.com/XXXX_Raffle/Lists/Raffle/overview.aspx The sharepoint page has a survey on it. To get the "popup" window to show, so you can answer a question in the survey, you need to press a button which calls this script: javascript:__doPostBack('ctl00$m$g_e999ab40_719f_42fb_bd61_d986f232bdd5$ctl01$ctl00$toolBarTbl$RptControls$ctl00$diidIONewItem',''); So, is it possible to somehow combine the page + the javascript, so all they have to do is press one link or alternatively, a hyperlink which goes to a file on a server which triggers all this, so they instantly get to the page + the javascript automatically pops so they dont have to press the button? Keep in mind, when I say "hyperlink" I mean the kind of hyperlink you would see in an email. A simple link to a website or a server location. I'm not very good at everything that has to do with programming and webdesign, but I do have access to the sharepoint, though I'd need serious guiding in how to add anything there other than simple webparts. It's SharePoint Server 2010. Here is a picture of the button and what happens when you press it. http://i.stack.imgur.com/gKCG5.jpg
No. You cannot construct a URL that will load a document and then call some JavaScript. You would have to modify the page you are linking to so it runs the JS automatically. It could look at the URL and run that function conditionally though (e.g. if (location.hash === '#foo') { ... }.)
0.888889
How to construct a URL that will load a document
Was the Second Doctor's "regeneration" actually a regeneration?
I recently saw a mix up of all of the Doctors regeneration scenes. When the second Doctor changes to the third (from Patrick Troughton to Jon Pertwee in "The War Games, Part Ten" (1969)), it is forced on him as punishment before being exiled to earth. The Doctor was not critically injured or dying. The transformation was the Time Lords doing. Does this really count as one of the 12 regenerations?
Yes, that was regeneration. There is no indication in Old Who or the New Series that regeneration is exclusively limited to being uncontrollably triggered by fatal events. Although regeneration is usually seen in the show as an "emergency fail-safe" feature, we're also shown very explicitly that most Time Lords choose to regenerate for reasons other than imminent death. Romana is the most prominent example, although Borusa also comes to mind (the man seems to have gone through bodies like some people go through ties). The Doctor just leads such a hard life that his regenerations come more violently than most Time Lords'. The fact that it was forced on him by the Time Lords doesn't change anything either; the High Council has repeatedly been shown to have control over the regeneration technology (for example, offering the Master a new set of regenerations if he helped them in The Five Doctors). There's no reason to assume that the process they used to change the Second Doctor into the Third was not regeneration; in fact, their dialogue in that scene makes it clear that the process is identical to that which turned the First into the Second (though "regeneration" wasn't yet really a term being used by the show).
1
Regeneration is only limited to being uncontrollably triggered by fatal events .
What is the best introductory Bayesian statistics textbook?
Which is the best introductory textbook for Bayesian statistics? One book per answer, please.
I read: Gelman et al (2013). Bayesian Data Analysis. CRC Press LLC. 3rd ed. Hoff, Peter D (2009). A First Course in Bayesian Statistical Methods. Springer Texts in Statistics. Kruschke, Doing Bayesian Data Analysis: A Tutorial with R and Bugs, 2011. Academic Press / Elsevier. and I think that the better one to start with is Kruschke's book. It's perfect for a first approach to Bayesian thinking: concepts are explained very clearly, there is not too much mathematics, and there are lots of nice examples! Gelman et al. is a great book, but it is more advanced and I suggest to read it after the Kruschke's one. Conversely, I did not like Hoff's book because it is an introductory book, but concepts (and Bayesian thinking) are not explained in a clear way. I suggest to pass over.
1
Gelman et al. is a great book, but it is more advanced and I suggest to read it after the Kruschke
Is there any granular way to change decisions made in ME1/ME2 to see different outcomes in ME3?
In ME1 and ME2, I had to make decisions not really understanding their impact on the series as a whole. Now that I'm partway through ME3, I find myself curious as to what would have happened had I made a different choice previously. What if I'd done X? What if I'd let Y live/die? I can't just replay ME3, import my ME2 save, and make different choices to see these outcomes - I'd have to make changes to the way I played ME/ME2. Likewise, importing no save would make wholesale changes to my experience that I'm not sure I'd appreciate. Besides starting the entire series over again, and running through each game dozens of times to explore the various permutations, what can I do to change the way things play out in ME3? Do I get the option to edit the imported starting state on New Game+? I'm on the Xbox, so save file editing or importing from the internet is likely to be at least challenging, if not impossible.
I would use gibbed's mass effect save editor. http://www.masseffectsaves.com/tools.php That one is for Mass Effect 2, and it lets you alter a lot (but not everything) of stuff from your mass effect 1 import data, like who died on virmire, how you resolved most of the side missions, whether or not you push Garrus towards Paragon or Renegade, etc. I hear he is also working on a mass effect 3 save editor which will hopefully streamline things even more!
1
mass effect save editor for Mass Effect 2
How to find element count from child to parent with jquery?
I have a slight issue where i need to count nest level of elements. Problem is that parent element can hold multiple child elements and child elements can have their own child elements. Please see from where i want to start count (marked with text "I start here"). HTML: <div class="main_set"> <div class="child_set"> <div class="child_set"> <div class="child_set">I start here!</div> </div> <div class="child_set"></div> </div> <div class="child_set"> <div class="child_set"></div> </div> </div> I have tried couple things to get count 3. For example my last attempt: $(this).closest('.main_set').find('.child_set'); This one obviously returns 6 tho counting all child_sets. How to count child_set elements from start place to main_set taking into account only nesting. So basically in my example how to get count 3?
You can use parents() from this to find all parents (with a special selector); for the length you have to add one for the current. alert($(this).parents('.child_set').length + 1); Also see this example.
1
Parents() from this can be used to find all parents
Can I call an extension method from inside a generic class?
Is there a way to call an extension from within a generic class, where the variable class is also the extended class? Here is a sample piece of code. It does not compile. public class GenericFoo<TFrom,TTo> { public TTo GenericFoo(TFrom A) { return A.Bar(); } } public static class Extensions { public static MyType Bar(this MyExtendedType source) { return new MyType(); } } This produces the following error: 'TFrom' does not contain a definition for 'Bar' and the best extension method overload 'MyNamespace.Extensions.Bar(MyNamespace.MyExtendedType)' has some invalid arguments
You can if you add a generic type constraint: public class GenericFoo<TFrom, TTo> where TFrom : MyExtendedType where TTo : MyType { public TTo SomeMethod(TFrom A) { return (TTo)A.Bar(); } } This will be enough to get it to compile, though you will still get a run-time error if no cast exists from MyType to TTo. Further Reading where (generic type constraint) (C# Reference)
0.777778
How to add generic type constraint?
What to do when you are suspicious about numerical results in a submitted manuscript that you are reviewing?
I am currently reviewing a paper and feel suspicious about their numerical results. I feel their results have been slightly modified to exhibit their superiority compare to other comparative methods. I cannot give an exact mathematical reason why I think their numerical results have been manipulated, but it is so odd that in all 15 scenarios they have been better. Actually, I am pretty sure that their method is better than his benchmarks but not always. Maybe they modified some scenarios. As I don't have a mathematical reason why I think some of their numbers are altered, should I ask for their computer code and run them myself?
Complementing the other answers, either in addition to, or apart from, asking for the codes and running them yourself, I don't think it is a bad idea to explicitly ask the authors, something like this: The standard algorithms for executing (bla bla bla), e.g. as followed in the works of Refs. [1-3] (feed these in), are suggestive of a standard accuracy in typical algorithms. The current work appears to have bettered the same, which is a strong point in favor of publication. However, the authors should include a comment in the manuscript, mentioning what changes have they implemented to the typical algorithms so highly prevalent, which leads to this enhanced accuracy. My jargon may have to be twisted a bit here, but I think I convey the point. This being a query in the referee report, the authors shall be obligated to feed in the details, and if there is some manipulation involved, it may end up being exposed. Hope that helps :)
1
The standard algorithms for executing (bla bla) are suggested of a standard accuracy in typical algorithms
Is it appropriate to email an eminent researcher in your field?
Sometimes, I feel to contact some of the eminent researchers in my field for any of the following reasons: Appreciating their research publication (recent times). They publish in top conferences, which are usually not hosted in my country or nearby. Requesting comments on some of my research hypothesis Sometimes just because I am a die hard fan of them. For example, probably the only reason I continued with research in Computer Science was due to Don Knuth. Sometimes, to know what they think on some specific research area that has propagated due to there work. (Probably looks like some journalistic work) For knowing how did they tackle the pressures or certain situation during their PhD or research. (Yes, it's vague but these questions come to mind and probably should be answered by oneself or personal interaction, but adding it for the sake of completion) Since, most of them are located outside my country, I can't visit or phone them. So, how are such emails perceived. Is it appropriate to send such emails, given that they are expected to have very busy schedule and it would probably waste their time? Though I have mentioned my field as Computer Science, the question should be applicable to all the fields.
Here are some of my strayed thoughts. Think from return of investments, of yours and your idol's If you ever perceived that your e-mail would be a "waste of their time," then why send it? I feel that most eminent researchers have a trait of "ignore everyone and head for their goal;" getting acknowledgement and acceptance is probably not their primary concern. A specific e-mail describing how their work has inspired your study/project is probably fine, but I wouldn't go so far to expect they would reply and give specific comments on your hypotheses. From your point of view, instead of using the energy and bandwidth to send the e-mails, there are a lot more you can do: There are many ways to show your appreciation First, they would probably like to see their work being formally cited and, more importantly, applied to the field or crossed into other fields. Each idea geminated from their work is an appreciation by itself, and in the mean time you can also enhance your publication and research paradigm. The plus is: if you have done enough of it, the big shot may actually contact you and give comments. Second, you can help preaching the researcher's ideas and agenda. You can write blogs, answer other people questions, use their works in your journal clubs or lectures, etc. to subtly introduce the researcher's teaching to the public. Better yet, refine the researcher's ideas, and incorporate into yours. Become a spiritual successor with your own unique approach. And let your career be inspired by the researcher. You can learn from someone without establishing communication For some more senior researchers, look for their auto-biography, biography, interviews, and documentaries that feature them. I will probably never be able to talk to Itzhak Perlman, but I learned a lot about him through books, websites, documentaries, and musics that he plays. (And actually, he has a Youtube channel as well, but I am suffering from too much fanboy shyness to write any comment.) For younger researchers, try look for their blogs, Youtube channels, open courses, or even biographies of their mentors. All these may help you become more familiar with them. Another way is to indirectly know them. Most of these researchers would have a lot of students or proteges, who may be closer to your rank and more likely to communicate with you. You may build a relationship with them, and learn a thing or two about their interaction with their mentor. Try technology For their new publications... nowadays most online journals allow leaving comments online. You may try to say a nice thing or two there. If they write a blog, that's even easier. Some researchers maintain a LinkedIn page or a Twitter account, try connect with them and follow them. Hope for the best. Use other famous people as leverage If you really want to communicate with them, also try using other organizations. For instance, you can write to some online radio station and suggest an interview topic and some guests, which of course will include your idolized researcher. You can also write to some prominent podcast hosts and give them a couple reason to invite so and so for an interview. Make good use of crowdsourcing, invite your peers and friends to support your petition. Some heroes/heroines are better left a bit mysterious This is sad but occasionally painfully true. Some famous people are better left not known at personal level. They could be immensely arrogant, they may not have a nanogram of social skill, they may be a jerk... Unless I have reconstructed a pretty concrete and reliable image about the researcher from different sources, I would probably want to keep them as what they are in my mind, and as an inspiration for my work.
0.666667
Why send a e-mail to a researcher?
How do I change the GitHub URL in Visual Studio?
I know this is probably a really dumb question, but I can't figure it out. When you go to your branches, right click on one, and click publish, the first time it asks you for a URL and I put in the wrong one (one that doesn't even exist haha). So now whenever I try to publish a branch, it says it can't find it and I don't know how to change the URL because the option doesn't come up anymore.
If you cannot change it through Visual Studio, you can at list look for it in the local config of your repo through the command line: cd /path/to/your/repo git config --edit And you would change it there.
1
How to change it through Visual Studio?
What is the difference between a telephoto lens and a zoom lens?
Looking at the product page for Nikon lenses, I notice a distinction between telephoto lens and zoom lens. What is the difference between the two? Why would I want one over the other? I wiki'd telephoto lens but remain confused about this distinction. Please talk to me like I'm stupid. :) I am hoping for a completely lay explanation. In particular, I'd like to understand in what situations I'd use a telephoto lens, and in what (other) situations I'd use a zoom lens.
Telephoto and zoom are two completely different things. Zoom simply means that the focal length (apparent magnification) of the lens can be changed, ie, it looks like it can look at things either closer up or further away by adjusting it. Telephoto, roughly, means that the lens has a relatively narrow field of view, thus it can be used to look at things further away. Telephoto lenses can be either zoom or prime. Zoom means that they can change how far they are looking at or prime means they have a fixed amount of magnification and can't be altered. (Like an old instant camera with no zoom, but with much better picture quality.) The reason for using a prime is that they are a) cheaper and b) produce much, much higher quality images for the price. Similarly, a zoom lens can be in any part of the focal length spectrum. You can have a 17-40mm zoom, which is basically wide angle (and not at all telephoto) or you can have a 100-400 zoom, which is entirely telephoto. You can also have any variety of different combinations including things like 24-250mm lenses that span from wide angle all the way to telephoto in one lens.
1
Telephoto and zoom are two completely different things
Highlight Search (hls) matches of multiple search terms with different colors
Many times when working on code, I search for the occurrences of variables with similar names. For examples, find all matches of var1 and var2 as: /\<var1\>\|\<var2\> Now I really like the Highlight Search feature of Vim, b/c once I do the search, all the matching instances pop out in yellow color. Is there a way to assign different colors to different terms in the search string? That is, all matches of var1 be yellow and of var2 be green?
The built-in search cannot do that, but there are plugins that let you use different colors, for example my own Mark plugin. (The plugin page has links to alternative plugins.) Most of these use the matchadd() functionality, ensure that this is globally applied to all windows, and provide a search-like interface through mappings and commands.
0.888889
plugins that let you use different colors, for example my Mark plugin
Does the <h1> tag get more SEO value if there is no usable keyword in the URL?
I'm looking at a site for which the domain name and URL do not impart any meaningful data to a search engine. It does have: &lt;h1&gt; (eBook name) &lt;h2&gt; (author - cannot be changed) &lt;p&gt; (description) Do the &lt;h1&gt; and &lt;p&gt; elements provide SEO value? Those are the only elements in that page that really provide any relevant information to search engines. I see other sites that use keywords in their URL. In theory, can the &lt;h1&gt; element be compared to a domain name in terms of SEO value?
If I understand your question right, no. It is a numbers game. Simple math really. Keyword in link + keyword in URL + keyword in path + keyword in resource name + keyword in &lt;h1&gt; + keyword in content = ?? There is no adjusting the weight of a keyword in &lt;h1&gt; because keywords are not found in the URL or path. However, having said that, search engines will use the keywords they find. If there are no keywords in some elements, then the keywords found become more important for search matches. Not more weight. Just what is available. I hope I got your question right.
1
Keyword in link + keyword in URL and keyword in resource name
How do I fill a textbox with text if it is empty?
I use a TextChanged-EventHandler I wrote a program in c# that creates a new TextBox on every button1_Click event Now,I want each new TextBox (which was created) to show typed text. How can I do this with EventHandler(TextChanged)? namespace WindowsFormsApplication5 { public partial class Form1 : Form { Int32 i = 1; public Form1() { InitializeComponent(); } private void button1_Click(object sender, EventArgs e) { TextBox c = new TextBox(); this.Controls.Add(c); c.Name = "x" + i.ToString(); c.Left = 3; c.Top = 30 * i; i++; c.TextChanged += new EventHandler(c_TextChanged); } void c_TextChanged(object sender, EventArgs e) { textBox1.Text = } } }
void c_TextChanged(object sender, EventArgs e) { textBox1.Text = ((TextBox)sender).Text; }
0.888889
TextBox1.Text
Question about trace route
I live in a small town in rural Nebraska. When I do a tracert from my home to the small college where I work it hops to Dallas, then Denver, and then Chicago before coming back here. That seems very odd to me, not to mention inefficient. But then, I have a completely different ISP at home, so I'm not even sure if it's all that unusual. So, my questions are, is this even really a problem, as long as the packets do get where they're supposed to go? And since this is all upstream of anything I control, can I even do anything about it (aside from complaining to the ISPs involved) if it is? The tracert looks like this: 1 1 ms 1 ms 1 ms 10.1.1.2 2 2 ms 1 ms 1 ms 192.168.254.254 3 9 ms 9 ms 9 ms h1.80.29.71.dynamic.ip.windstream.net [71.29.80.1] 4 21 ms 9 ms 10 ms h222.28.213.151.static.ip.windstream.net [151.213.28.222] 5 29 ms 30 ms 29 ms h140.254.213.151.static.ip.windstream.net [151.213.254.140] 6 34 ms 30 ms 30 ms h130.254.213.151.static.ip.windstream.net [151.213.254.130] 7 30 ms 30 ms 29 ms xe-8-3-0.edge3.Dallas1.Level3.net [4.71.198.25] 8 42 ms 34 ms 34 ms ae-72-70.ebr2.Dallas1.Level3.net [4.69.145.115] 9 52 ms 52 ms 52 ms ae-2.ebr1.Denver1.Level3.net [4.69.132.105] 10 52 ms 53 ms 53 ms ae-1-100.ebr2.Denver1.Level3.net [4.69.132.38] 11 69 ms 68 ms 68 ms ae-3-3.ebr1.Chicago2.Level3.net [4.69.132.62] 12 74 ms 69 ms 69 ms ae-1-51.edge2.Chicago2.Level3.net [4.69.138.131] 13 69 ms 68 ms 68 ms ROADRUNNER.edge2.Chicago2.Level3.net [4.59.28.110] 14 69 ms 68 ms 71 ms ae-1-0.cr0.chi10.tbone.rr.com [66.109.6.152] 15 69 ms 69 ms 69 ms ae-15.chcgileq-rtr1.kc.rr.com [66.109.6.101] 16 87 ms 86 ms 86 ms xe-1-2-0.lnclne00-mx42.neb.rr.com [76.85.220.134] 17 87 ms 85 ms 86 ms xe-0-0-0.lnclne00-mx41.neb.rr.com [76.85.220.145] 18 86 ms 85 ms 85 ms gig2-1.lnclne00-dar1.neb.rr.com [76.85.220.110] 19 87 ms 86 ms 87 ms rrcs-76-79-19-35.west.biz.rr.com [76.79.19.35] It's just weird, because I'll give good odds that the link between Denver and Chicago follows I-80, which means we're up to three passes right by the campus before it finally arrives (one on the way out of town, one going from denver to chicago, and the one back in from chicago).
It all depends on how your local ISP is peered (i.e. who they have direct links to). It would appear that windstream do not have any peering with any other networks until you get to Dallas (Level 3), and for whatever reason Level 3 need to go to Denver, then Chicago before they were able to find a free route back to RoadRunner for your college. This isn't really that unusual, and the main issue you need to look at is your latency. And seeing as all your latencies in the traceroute are &lt; 100ms, compared to where I live (Sydney, Australia), this is exceptional. Here I would expect to see latencies of > 300ms in a rural area. Hell I get latency of > 100ms when contacting our datacentre only 2km away!
1
Latencies in the traceroute are &lt; 100ms compared to where I live in Australia .
How do you output the filename in find command while using -exec?
I use the following line to find all sub-directories of the PWD and run svnadmin verify on each directory (I already know that they're Subversion repositories) find ./* -maxdepth 0 -exec svnadmin verify {} \; This works well, other than the fact that the output looks like this: * Verifying repository metadata ... * Verifying metadata at revision 1 ... * Verifying metadata at revision 2 ... * Verifying metadata at revision 4 ... * Verifying metadata at revision 5 ... * Verifying metadata at revision 6 ... * Verifying metadata at revision 9 ... * Verifying metadata at revision 10 ... * Verifying metadata at revision 12 ... * Verifying metadata at revision 14 ... * Verifying metadata at revision 15 ... * Verifying metadata at revision 18 ... * Verifying metadata at revision 20 ... * Verifying metadata at revision 22 ... * Verified revision 0. * Verified revision 1. * Verified revision 2. * Verified revision 3. * Verified revision 4. * Verified revision 5. * Verified revision 6. * Verified revision 7. * Verified revision 8. * Verified revision 9. * Verified revision 10. * Verified revision 11. * Verified revision 12. * Verified revision 13. * Verified revision 14. * Verified revision 15. * Verified revision 16. * Verified revision 17. * Verified revision 18. * Verified revision 19. * Verified revision 20. * Verified revision 21. * Verified revision 22. * Verified revision 23. * Verified revision 0. * Verifying repository metadata ... * Verifying metadata at revision 4 ... * Verifying metadata at revision 5 ... * Verifying metadata at revision 6 ... * Verifying metadata at revision 7 ... * Verifying metadata at revision 9 ... * Verified revision 0. * Verified revision 1. * Verified revision 2. * Verified revision 3. * Verified revision 4. * Verified revision 5. * Verified revision 6. * Verified revision 7. * Verified revision 8. * Verified revision 9. I'd really like find to print the filename before executing the svnadmin verify command, to make logging easier. I've tried to squeeze a little ls in there but bodged it up, how should I do this (preferably simply)?
Try this: for f in * ; do echo -n "${f}:"; svnadmin verify "${f}"; done If you just want directories(Thanks to @kos note): for f in */ ; do echo -n "${f}:"; svnadmin verify "${f}"; done
1
Do echo -n "$f:"; svnadmin verify "$"
Unusual Differential Equation
I have the differential equation $$y''y+n(y')^2=0\tag 1$$ I haven't found any references to equations of this type by searching. Does anyone have a suggestion as to how to proceed? It comes about from the following progression: $$y=(y')^n-\frac 1n\tag 2\\ y'=ny''(y')^{n-1}\implies1=ny''(y')^{n-2}\\ 0=n(n-2)(y'')^2(y')^{n-3}+ny'''(y')^{n-2}\\ 0=(n-2)(y'')^2+y'''y'$$ Taking $y$ in place of $y'$ and $n$ in place of $n-2$ I get the form shown in $(1)$. Are there any good ways to solve any of the other intermediate forms, or even the initial form shown in $(2)$? Further constraints: $y(0)\approx 1.27$ is an otherwise-unknown constant that I am attempting to build an expression for. The initial problem is the recurrence relation with $a_1\approx 1.27$ the unknown constant and $$a_{n+1}=(a_n)^{n+1}-\frac 1{n+1}$$ with the additional constraint $\lim_{n\to\infty}a_n=1$.
Have you thought about doing these: $$y'=u\to y''=u\frac{du}{dy}$$ and so $$y''y+n(y')^2=0\to u(u'(y)y+nu)=0$$
0.777778
$$y'= uto y''=ufracdudy$$$
what is exactly the difference between the Selberg class and the set of Artin L-functions?
The question is in the title: from what I read in the answer to another question, Artin L-functions are conjecturally cuspidal automorphic L-functions for some algebraic group that can be transfered to $GL_{n}$. On the other hand, elements of the Selberg class are widely believed to be (cuspidal?) automorphic L-functions for $GL_{n}$. So where exactly lies the difference between those two sets of L-functions? Thanks in advance.
We talk about three rather different but not unrelated conjectures here: (1) Artin $L$-functions are automorphic $L$-functions; (2) automorphic $L$-functions belong to the Selberg class; (3) the Selberg class consists of automorphic $L$-functions. The three families of $L$-functions occurring here are defined very differently. Artin $L$-functions are defined in terms of Galois representations, automorphic $L$-functions are defined in terms of automorphic representations, while the Selberg class is defined via natural axioms of an analytic nature. Conjectures (1) and (2) are instances of the Langlands conjectures, while (3) strengthens the idea that sufficiently nice analytic properties of a Dirichlet series are always "caused by" an automorphic form (or automorphic representation) behind the Dirichlet series.
1
Artin $L$-functions belong to the Selberg class; Selberg classes consists of automorphic
Long rest regains half hit dice - round up or down?
When having a long rest, you regain all your hit points and half your spent Hit Dice (for use in future short rests). I know that normally when faced with fractions you round down. But then, I see no way to regain your 1 Hit Die at 1st level. So basic question: if you are at first level, and you take a long rest, do you regain your Hit Die, or do you not because you had to halve 1 and round down?
Fortunately the answer is quite simple. From the Basic Rules (still applies in PHB): Round Down There's one more general rule you need to know at the outset. Whenever you divide a number in the game, round down if you end up with a fraction, even if the fraction is one-half or greater. ~ Basic Rules, p. 4 This should apply in all cases, except where it logically should not. The case you mention here would be a good example. Remember that it is very hard to make RAW consistent and synchronized at all times when it spans hundreds of pages. A bit of interpretation is often necessary.
1
Basic Rules: Round Down
Advice on an inexpensive but very hardy/tough point-and-shoot camera
I'm looking for a reasonably cheap point-and-shoot camera that can take a lot of abuse. Think rain, mud, occasional falls from head height, etc. To make it easier, I really don't care too much about special features, zoom, or the quality of the photo. As long as it's reasonably viewable at the end, that's good enough for me. I'm aware of the Olympus µ cameras, but they still try to pack in the features and that drives up the price. Any suggestions?
I got my young daughter a cheap Olympus Stylus Tough 6000. It wins on cheapness (I paid $115, I believe) and on ruggedness, but the optics and sensor leave a lot to be desired. I'd rate the photo quality somewhere around "camera phone". I don't know about recent Pentax models, but (although I love my Pentax DSLR!) Pentax's record with P&amp;S cameras has been lackluster. The one I used a few years ago was shockingly slow, and none to impressive with the results. Maybe newer models are better. If I cared about image quality, I think I'd spend a little more and get a Panasonic DMC-TS2.
1
Pentax's record with P&amp;S cameras has been lackluster .
Can I set the Brick Texture Node horizontal mortar size to be equivalent to the vertical mortar size?
I'm using Blender 2.73 and I'm trying to create tiles using the brick texture node. The problem I'm having is that the horizontal mortar size is smaller than the vertical. Is it possible to have them be equivalent sizes?
the mortar size is a percentage of the width or height so they won't be equal unless width = height or you can try this : tweak the scale on the Y axis till you get the effect
1
the mortar size is a percentage of the width or height unless width = height
Should I leave the fan switch on my thermostat set to fan rather than auto?
I purchased a new Amanda Furnace in Oct'2013. I am told in order to maximize a warm, consistent room temperature I should set the thermostat to the Fan position rather than the Auto position. Does this make a difference in maintaining room temperature and is it more costly?
Running the air handler all the time is generally going to cost you some significant electricity. Since either is fine, try it both ways and see what you think, in your house; houses do vary.
0.888889
Running the air handler all the time is generally going to cost you some significant electricity
Unrecognized element 'authentication'.
I am trying to write a simple authentication. I'm also trying to make this quick and learn about the forms authentication via web.config. So i have my authentication working if I hard code my 'user name' and 'password' into C# code and do a simple conditional. However, I get en error message 'Unrecognized element 'authentication'. Line 2: &lt;system.web&gt; Line 3: &lt;customErrors mode="off"&gt; Line 4: &lt;authentication mode="Forms"&gt; Line 5: &lt;forms name=".C#FEWD" Line 6: loginUrl="/schools/admin/login/index.aspx" My web.config file looks like this: &lt;configuration&gt; &lt;system.web&gt; &lt;customErrors mode="off"&gt; &lt;authentication mode="Forms"&gt; &lt;forms name=".C#FEWD" loginUrl="/schools/admin/login/index.aspx" protection="All" timeout="60"&gt; &lt;credentials passwordFormat="Clear"&gt; &lt;user name="schools" password="magic" /&gt; &lt;/credentials&gt; &lt;/forms&gt; &lt;/authentication&gt; &lt;authorization&gt; &lt;deny users="?" /&gt; &lt;/authorization&gt; &lt;/customErrors&gt; &lt;/system.web&gt; &lt;/configuration&gt;
As Jon said, the &lt;authorization&gt; node should not be a child of the &lt;customErrors&gt; node.
0.888889
&lt;authorization&gt; node should not be a child of the 'customErrors&
Tuples in LaTeX
I am learning to use TikZ to draw things in LaTeX. One of the things that TikZ seems to use everywhere for specifying coordinates is a tuple. For example, \begin{tikzpicture} \node[isosceles triangle, isosceles triangle apex angle=70, draw=black,fill=white, inner sep=0pt,anchor=lower side,rotate=90,draw=black, fill=white, minimum height=2 cm] (a) at (0,0) {}; \end{tikzpicture} Creates a small isosceles triangle. Note the use of (0,0). Let's encapsulate making a triangle as above with the following macro. \newcommand\Tri[3]{ \node[isosceles triangle, isosceles triangle apex angle=70, draw=black,fill=white, inner sep=0pt,anchor=lower side,rotate=90,draw=black, fill=white, minimum height={#2} cm] (#1) at #3 {};} Suppose I wanted to define a function that takes in a size and starting coordinate, and draws a "triangle" of triangles such as \begin{tikzpicture} \Tri{a}{1}{(-1,0)} \Tri{b}{1}{(1,0)} \Tri{c}{1}{(0,1.41)} \end{tikzpicture} The simple way to do this is to make a macro \TriTri, such that \TriTri{a}{n}{x}{y} creates a triangle of triangles, with bottom triangle anchored at (x,y). \newcommand\TriTri[4]{ \Tri{#1}{#2}{(#3,#4)} \Tri{#1}{#2}{(#3+2*#2,#4)} \Tri{#1}{#2}{(#3+#2,{sqrt(2*#2*#2)})}} %% note #3+#2 = (x1 + x2)/2 %% the sqrt bit is sqrt(size^2 + size^2) } I have gotten this to work! But what I would like to do is instead of having x and y input separately, I would like to have them input as a coordinate pair. I would like to reference the coordinates as \first,\second. So that \first(x,y) = x. The desired effect is that $$\first(1,2)$$ would be the same as $$1$$
You can use the xparse package: \documentclass{article} \usepackage{tikz,xparse} \usetikzlibrary{shapes.geometric} \NewDocumentCommand{\Tri}{m m r()} {% \node[isosceles triangle, isosceles triangle apex angle=70, draw=black,fill=white, inner sep=0pt,anchor=lower side,rotate=90,draw=black, fill=white, minimum height=#2cm] (#1) at (#3) {}; } \NewDocumentCommand\TriTri{mmr(,u)} {% \Tri{#1}{#2}(#3,#4) \Tri{#1}{#2}(#3+2*#2,#4) \Tri{#1}{#2}(#3+#2,{sqrt(2*#2*#2)}) %% note #3+#2 = (x1 + x2)/2 %% the sqrt bit is sqrt(size^2 + size^2) } \begin{document} \begin{tikzpicture} \TriTri{a}{3}(2,2) \end{tikzpicture} \end{document} The \Tri command accepts three arguments; the first and the second ones are enclosed in braces, while the third is between parentheses, so \Tri{a}{3}(0,0) In the body of the definition you'll use (#3) instead of #3, because the parentheses are stripped off. In the case of \TriTri we have to split off the two coordinates, so we define four arguments; the first and the second ones are enclosed in braces; the third is what goes from ( to a comma, the final one is everything up to ). Thus I have modified accordingly your code for \TriTri based on the requirements for \Tri.
0.333333
xparse package for TriTri
Is it code-legal to have a circuit breaker box within a storage room?
I am currently in the process of planning a room remodel to convert an existing bedroom into a home office and storage room. One thing that makes this conversion a little bit tricky, is the existence of a breaker box at the rear corner of the room. As you can see in the image below, we plan to have the back 5' of the room become a storage area (there would be 2' deep shelving units along the back wall, stopping short of the breaker box, we would use this area to store Christmas decorations, misc. stuff, etc..). I know it is illegal to place a breaker box in a closet that will store clothes or other combustibles. So my questions would be: 1) how would one define a storage room vs. a closet (i.e.- could this be classified as a walk in closet somehow?) and 2) with > 36" clearance in front, and 30" around, would this be legal?
National Electrical Code (NEC) typically defines rooms and areas based on the "intended" use of the area. They do not provide a definition for a "storage room", but they do provide a definition for a "clothes closet". Clothes Closet. A non-habitable room or space intended primarily for storage of garments and apparel. To answer the rest of your question, we'll have to take a look at Article 110. Since section 110.26 of the NEC is a bit long, quoting the entire text here may not be considered "fair use" so instead I'll summarize it for you. National Electrical Code 2008 ARTICLE 110 Requirements for Electrical Installations II. 600 Volts, Nominal, or Less 110.26 Spaces About Electrical Equipment. Sufficient access and working space shall be provided and maintained about all electrical equipment to permit ready and safe operation and maintenance of such equipment. 110.26(A)(1) Depth of Working Space. This section says the depth of Working Space must be between 3 and 4 feet, "measured from the exposed live parts or from the enclosure or opening if the live parts are enclosed". In a typical residential situation, the depth of Working Space will be 3'. 110.26(A)(2) Width of Working Space. This section says the width of Working Space must be the width of the equipment or 30", whichever is greater. And that there should be enough Working Space to allow the equipment door to open 90 degrees. 110.26(A)(3) Height of Working Space. The Working Space must be clear from "the grade, floor, or platform" to the height of 6 1/2', or the height of the equipment whichever is greater. There is an exception to this which says: In existing dwelling units, service equipment or panelboards that do not exceed 200 amperes shall be permitted in spaces where the headroom is less than 2.0 m (61⁄2 ft). This section also says that any other equipment associated with the electrical installation"located above or below the equipment, cannot extend more than 6" beyond the front of the equipment. 110.26(B) Clear Spaces. Working space required by this section shall not be used for storage. When normally enclosed live parts are exposed for inspection or servicing, the working space, if in a passageway or general open space, shall be suitably guarded. Which means the equipment can be in an area used for storage, but the Working Space cannot be used for storage. The basic idea is if you draw a box on the floor in front of the equipment 30" wide and 36" deep, and then extend that box up 6 1/2', you'll have your "Working Space". As long as you keep this Working Space clear, you should have no problems. However, there are a few more things to consider. 110.26(C) Entrance to and Egress from Working Space. 110.26(C)(1) Minimum Required. At least one entrance of sufficient area shall be provided to give access to and egress from working space about electrical equipment. You'll have to check local building codes to determine what the "sufficient area" is, and then make sure you keep this area clear too. Another important consideration is lighting. 110.26(D) Illumination. This is a section that is often overlooked in residential situations, and is often satisfied simply by having lights in the room where the service panel is installed. Personally, I take this section seriously. I recommend installing a dedicated circuit, consisting of a single switch and a single luminaire. Then installing it just above the equipment, as to provide adequate light for anybody working on the equipment. Putting the luminaire on a dedicated circuit allows you to deenergize other circuits, while maintaining good lighting while servicing the equipment. It's a good idea (though a bit overkill), to also provide emergency lighting near the equipment. Installing a simple fixture like this near the equipment, ensures that you won't have to fumble in the dark to flip breakers if the power ever goes out. This unit can be installed on the same dedicated equipment luminaire circuit. That way even if you have to switch off the whole panel to do work, you'll still have light. tl;dr Keep an area 30" wide, 36" deep, and 6 1/2' high in front of the equipment clear (Working Space). Provide "sufficient area" for entrance to and egress from the equipment (see local building codes to determine "sufficient area"). Make sure the area has enough lighting. Rooms are defined by intended use.
1
Non-habitable room or space intended for storage of garments and apparel
Timing inside a shift register
How I imagine synchronous digital networks work: data lines are sampled at rising clock edge, a set of transients occur, system settles, and data lines are sampled again on next rising edge. I would place transients at falling clock edges, that way both Tsu and Th time for sampling are clear. (Somewhat similar to SPI bus behavior.) What see in a datasheet of a real world device (74595): D flipflops connected in series having a common clock. At the output of the first flipflop, transient on the data line follows rising clock edge with Tpd. The next flipflop needs Th time stable data line after rising edge to operate correctly. Of course it works because Tpd>Th, but it's only a matter of nanoseconds. My problem with all this is that it's not robust (maybe not the best word). Visualizing stuff on a logic analyzer will be less useful because data lines practically change in sync with clock rising edge. Random errors caused by Th>Tpd are not really visible and go undetected. If I connect another shift register in series from a different technology, which requires longer hold times, the circuit won't work, no matter how slow clock I chose. Is this the way most commonly synchronous digital circuits are constructed? Only the propagation delay of components make it work? Am I being to idealistic? :)
My problem with all this is that it's not robust (maybe not the best word). Visualizing stuff on a logic analyzer will be less useful because data lines practically change in sync with clock rising edge. Random errors caused by Th>Tpd are not really visible and go undetected. If I connect another shift register in series from a different technology, which requires longer hold times, the circuit won't work, no matter how slow clock I chose. You bring up two issues. Let's call the two synchronous circuits A and B, where A feeds into B, and both share the same clock Circuit won't work if total Tpd(A) &lt; Th(B) where Tpd is the combinational delay of the clock. Is this true? Absolutely! You're the circuit designer and it's your final responsibility to make sure the circuit works. In reality, it's not usually a source of worry; even if you feed one register output right into another's input, the design margin of the chip's specs is high. For a NXP 74HC595, for example, typical propagation delay at 4.5V supply is 19ns, required hold time is 3nsec, and typical hold time is -2nsec -- no problem there. For a TI SN74LV595A at 5V, typical propagation delay is 4.5nsec, minimum propagation delay is 1nsec, required hold time is 2nsec. Could this be a problem if the propagation delay and hold times are at their worst case? Absolutely. Could it be a problem if you cascade a SN74LV595A into an NXP74HC595? Absolutely. In those cases you may need to add combinational elements (buffers) with enough delay to make sure the hold time is met. "Visualizing stuff on a logic analyzer will be less useful because data lines practically change in sync with clock rising edge." True. Take a tip from SPI buses, and set the logic analyzer so that it samples the data on the clock falling edge. SPI's rules are simple: you update outputs on one edge, and you sample inputs on the other.
0.666667
Visualizing stuff on a logic analyzer will be less useful
Can only access one of the router's web portal and the Internet
On both wired and wireless connections, I can only access one of 192.168.1.1 (the router web portal) and the general Internet. Which "mode" my devices are in is seemingly random. This has persisted so far for 5 days (since I began using this network). When connected to the Internet, I can go to 192.168.102.1 and I see a landing page for "mikrotik routeros", but I cannot go to 192.168.1.1. When connected to the router but not the Internet, 192.168.1.1 yields the router web portal, and 192.168.102.1 is inaccessible. Attempted solutions Upgrading router firmware Resetting router to factory settings Rebooting devices Fiddling with router settings (changing wireless security modes, removing wireless security, etc) Upgrading wireless drivers on computers Some data Affects BlackBerry, Windows, Android and Ubuntu devices All devices work properly on other networks Devices may switch modes if they have been offline for a long time (eg: overnight), but restarting a device has no effect Router is TP-Link TL-WR740N v4 Router firmware DD-WRT v24-sp2 (04/18/14) std - build 23919 Both wired and wireless connections are affected, but not necessarily simultaneously I don't know anything about networking, but here's some info that seems helpful taken from my Ubuntu laptop. With internet access (wired in this case, but it varies): ~ $ route -n Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 0.0.0.0 192.168.102.1 0.0.0.0 UG 0 0 0 eth0 192.168.102.0 0.0.0.0 255.255.254.0 U 1 0 0 eth0 ~ $ ifconfig eth0 Link encap:Ethernet HWaddr 54:ee:75:0c:02:80 inet addr:192.168.103.232 Bcast:192.168.103.255 Mask:255.255.254.0 inet6 addr: fe80::56ee:75ff:fe0c:280/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:3273 errors:0 dropped:0 overruns:0 frame:0 TX packets:3035 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:2276482 (2.2 MB) TX bytes:517732 (517.7 KB) Interrupt:20 Memory:f0500000-f0520000 lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK RUNNING MTU:65536 Metric:1 RX packets:4315 errors:0 dropped:0 overruns:0 frame:0 TX packets:4315 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:342880 (342.8 KB) TX bytes:342880 (342.8 KB) With "router access" (wireless in this case, but it varies): ~ $ route -n Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 0.0.0.0 192.168.1.1 0.0.0.0 UG 0 0 0 wlan0 192.168.1.0 0.0.0.0 255.255.255.0 U 9 0 0 wlan0 ~ $ ifconfig eth0 Link encap:Ethernet HWaddr 54:ee:75:0c:02:80 UP BROADCAST MULTICAST MTU:1500 Metric:1 RX packets:9422 errors:0 dropped:0 overruns:0 frame:0 TX packets:7545 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:6216683 (6.2 MB) TX bytes:1399280 (1.3 MB) Interrupt:20 Memory:f0500000-f0520000 lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK RUNNING MTU:65536 Metric:1 RX packets:4446 errors:0 dropped:0 overruns:0 frame:0 TX packets:4446 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:353415 (353.4 KB) TX bytes:353415 (353.4 KB) wlan0 Link encap:Ethernet HWaddr e8:2a:ea:60:31:4b inet addr:192.168.1.105 Bcast:192.168.1.255 Mask:255.255.255.0 inet6 addr: fe80::ea2a:eaff:fe60:314b/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:77013 errors:0 dropped:0 overruns:0 frame:0 TX packets:49506 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:25275438 (25.2 MB) TX bytes:30355132 (30.3 MB) With both (wired with wireless turned on): ~ $ route -n Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 0.0.0.0 192.168.102.1 0.0.0.0 UG 0 0 0 eth0 192.168.1.0 0.0.0.0 255.255.255.0 U 9 0 0 wlan0 192.168.102.0 0.0.0.0 255.255.254.0 U 1 0 0 eth0
Router needs to have WAN Connection Type as DHCP and also needed static DNS set up (I used 8.8.8.8 and 8.8.4.4). Router should have its own DHCP server turned on. Network is apparently connected like this: There is a central router, with a cable to my unit's local router.
0.777778
Router should have WAN Connection Type as DHCP
How can fiber optic image conduits consist of only fiber core, no cladding?
Looking at fiber optic image conduits, I found that they have a packing fraction (the ratio of the fiber core's area to the total area) of 100% (source here). In other words, they consist only of fiber core, no cladding. But without cladding, wouldn't the light travel between the individual fibers, messing up the output image? Or is the cladding so extremely thin that this is simply a result of rounding up to 100%?
There is still a small layer of air between them. Moreover, they are probably single-mode fibers, so, even if they touch each other, it is very hard to provide energy transfer from one fiber to another.
0.666667
Energy transfer from one fiber to another
RenderTarget2D behavior in XNA
I've been dabbling with XNA for a couple of days now. This chunk of code doesn't work as I expect. The goal is to render sprites individually and composite them on another rendertarget. P = RenderTarget2D(with RenderTargetUsage.PreserveContents) D = RenderTarget2D(with RenderTargetUsage.DiscardContents) for all sprites: { graphicsDevice.SetRenderTarget(D); &lt;draw sprite i&gt; graphicsDevice.SetRenderTarget(P); &lt;Draw D&gt; } graphicsDevice.SetRenderTarget(null); &lt;Draw P&gt; The result I get is - only the last sprite is visible. I'm sure I'm missing some piece of information about RenderTarget2D. Any hints on what that might be?
Well I think what's happening is that the render target is clearing the draw buffer and therefore any spritebatch calls are going to be unset. Basically, render all the render targets at once, then draw their content all at once.
0.888889
spritebatch calls will be unset
Using pstool with beamer
I would like to use pstool with beamer to create a presentation in pdflatex with figures processed by psfrag. However, as the simple example below shows, the figures are processed using the beamer documentclass, so that they each have a full beamer "frame" around them. Is there a way around this? \documentclass{beamer} \usepackage{lmodern} \usepackage{graphicx} \usepackage[process=all,crop=pdfcrop]{pstool} \begin{document} \begin{frame} \frametitle{Circle} \begin{figure} \psfragfig[width=0.3\textwidth]{figures/circle} { \psfrag{1}{\(s\)} } \end{figure} \end{frame} \end{document} I suspect that if it's possible to override the documentclass used by pstool to process the figures, that would be a solution, but I haven't found how to do this. Thanks.
pstool package uses the preamble of main document class(in your Q it is beamer) to build the pdf figures during the underhood auxiliary processing (latex-dvips-ps2pdf) of .eps figure and psfrag commands. So to get a circle.pdf figure without navigation bar add \setbeamertemplate{navigation symbols}{} in the preamble after \documentclass{beamer}as shown in How to get rid of navigation symbols in beamer? and compile with pdflatex -shell-escape gives Once you have all pdf figures are generated via auxiliary processing. Set the option process=none instead of process=all and comment out the only line like this %\setbeamertemplate{navigation symbols}{} to process beamer slides with figures (navigation bar less) and finally you will get navigation bar on main beamer slides. Note: \EndPreamble can be used to limit the preamble used for auxiliary processing and thereby speed it up. More details refer pstool documentation
1
How to get rid of navigation symbols in pstool package
Any disadvantages to single-supply mode?
I am using the ATMEL ARM SAM4S MCU for a project. It supports a single-supply mode where an internal voltage regulator provides the 1.08-1.32V necessary for VDDCORE and we need only provide 1.62-3.6V to VDDIO. I'm just interested to know if there is any situation where one might NOT take advantage of this feature and supply the core externally as well?
The main reason would be for power efficiency. The voltage regulator inside the chip is a linear one, which means that its efficiency is: (VDDCORE/VDDIO). So if your VDDIO is 3.6v, then your efficiency might be only 33%! This is a terrible waste of energy, especially in a battery powered portable device where a long battery life is an important selling point for the device. Poor power efficiency not only leads to a shorter battery life, it also generates heat. In this case it doesn't seem like much, but it can make all the difference. In a hot environment, that extra heat might push the chip over its specified operating conditions, leading to failure. In some applications, you might have lots of chips, which could create quite a lot of heat. In one application, we had 20 ET1200 chips, all using their internal regulators. Each chip's core uses just 75mA. But 20 chips means 1.5A on the cores, and a total of 1.2W of power dissipated just as wasted heat. The inside of the enclosure got pretty hot.
1
Power efficiency is a terrible waste of energy .
Alternatives of 'a snowball's chance in hell'
I am looking for a different, common English idiom that expresses the same thing as a snowball's chance in hell. My teacher says I use this expression too much, and that it is not appropriate for every essay. I need a same meaning like something very cold in a hot place to have a little chance.
Here are some alternatives you may consider: chance in a million next to impossible poor prospect ghost of a chance Although I do agree these may not come across as colorful enough.
1
Chance in a million next to impossible poor prospect
PCB design cost for 0.4mm pitch bga, 0.1mm drill hole, 4-layer routing using via-in-pad
I am doing a development board for a IC with 36 WLCSP package. My PCB layout has 16 via over pads, minimum 0.1mm drill holes, 4-layers. I need to fabricate my PCB. And I could not find a exact pricing for PCBs in the required design quality. I sent sample Gerber file for some PCB manufacturers. And they replied with extreme high prices and I can't afford their pricing (eg: 200$ for 10 boards with 2.5cm * 2.5cm). And most of manufactures are not willing to share their pricing strategy to optimize my design. My target is to deliver my demo board for the lowest price (to make it lower than 10$, while component cost around 6.5$) . So I need to keep the PCB cost lower than 2$ with the minimum area of 2cm * 2cm. Could I achieve that much lower PCB cost? what are the possible PCB fabricators with lower cost with required technology? What would be the unit PCB cost if fabricate at least 500 boards? Feasibility of my project to make it under 10$? Thank you
As others have said, the drill size is what is killing you, but also the via-in-pad. Remove those two things, the price will plummet; your design probably doesn't need them at all.
1
The drill size is what is killing you, but also the via-in-pad
Embed .Net C# In Web Page?
I would like to embed some C# .Net code that does some simple Encryption/Decryption functions into a web page. This will be an internal web page so users will be implicitly trusted. Is there any way to do this? I will need to hit user's Windows-MY key store (via CAPI) to pull out the keys for decryption and hit an LDAP server to grab public keys for encryption.
You could use AJAX and call the encryption function you've used over the network.
0.777778
AJAX and call the encryption function you've used over the network
Weird crash using Restkit MainQueueManagedObjectContext - EXC_BAD_ACCESS
Sometimes when I call saveToPersistent on the RestKit MainQueueManagedObjectContext I get the following error and the app crashes. CoreData: error: Serious application error. Exception was caught during Core Data change processing. This is usually a bug within an observer of NSManagedObjectContextObjectsDidChangeNotification. -[UIBarButtonItem controllerWillChangeContent:]: unrecognized selector sent to instance 0x21e70300 with userInfo (null) [UIBarButtonItem controllerWillChangeContent:]: unrecognized selector sent to instance 0x21e70300 with userInfo (null) It seems that there are some kind of threading problem. I save the context via a method like so: - (BOOL)saveMainContext { __block BOOL contextSaved = NO; [[[[CoreDataManager sharedInstance] objectStore] mainQueueManagedObjectContext] performBlockAndWait:^{ NSError *error = nil; if ([[[[CoreDataManager sharedInstance] objectStore] mainQueueManagedObjectContext] saveToPersistentStore:&amp;error]) { contextSaved = YES; } }]; return contextSaved; } It crashes on the saveToPersistent method with EXC_BAD_ACCESS. How can I fix this and what could be the reason for my NSFetchresultscontroller calling a method on a UIBarButtonItem?
Your saveMainContext method should only be called from the main thread and should simply be implemented as: - (BOOL)saveMainContext { NSError *error = nil; if ([[[[CoreDataManager sharedInstance] objectStore] mainQueueManagedObjectContext] saveToPersistentStore:&amp;error]) { contextSaved = YES; } else { NSLog(@"Save error: %@", error); } return contextSaved; } Calling an instance of UIBarButtonItem suggests that you have a memory management issue in that something which is observing the context save is not removing itself before it is deallocated. Check all of your observers.
0.888889
SaveMainContext is not removing itself before it is deallocated
What is the keyboard shortcut for 'Mark as read' in GMail?
In the new Yahoo! mail I can select multiple checkboxes against my email subjects and press k to perform the action Mark as read. Is there a similar alternative in GMail?
&lt;Shift&gt; + i Mark as read -Marks your message as 'read' and skip to the next message. &lt;Shift&gt; + u Mark as unread -Marks your message as 'unread' so you can go back to it later. Full list of Keyboard shortcuts
1
Keyboard shortcuts in Keyboard
Word for the opposite of "hypochondriasis"
Is there a word for the opposite condition of hypochondriasis? For example, someone who denies being sick when they clearly are? I would just say that they are "in denial". Is there any other adequate word? I thought about the obvious 'hyperchondria' but it doesn't seem to be used anywhere and doesn't look suitable as—from checking the origin of the word—just replacing 'hypo' by 'hyper' wouldn't fit well: 1555–65; &lt; Late Latin &lt; Greek, neuter plural of hypochóndrios pertaining to the upper abdomen (supposed seat of melancholy), equivalent to hypo- hypo- + chóndr ( os ) ensiform cartilage + -ios adj. suffix
A widely used antonym for hypochondriac is "stoic." Spelt without a leading capital, it doesn't refer to the Stoic school of philosophy but to the general idea of ignoring or minimizing setbacks and unfavorable information.
0.666667
"stoic" antonym for hypochondriac
How detect which OpenGL texture formats are natively supported?
For example, how detect if my videocard doesn’t support "bgr8" and convert it to another format, such as "rgba8" in software mode. UPDATE: Sorry for the confusion. This question more about situation when I set internalFormat in glTexImage2D to something like "bgra8" but videodriver internally convert data to another format, like "rgba8".
Generally most hardware doesn't suport 3-component texture formats so in this specific example you can make a reasonably safe assumption that it's converted. A 3-component OpenGL texture is actually 4-component in hardware but with the alpha component ignored/set to 255/whatever. http://www.opengl.org/wiki/Common_Mistakes#Texture_upload_and_pixel_reads (That "common mistakes" page is a goldmine - bookmark it now!) For a more general case, glTexSubImage2D performance can give you a good indication of whether or not the upload must go through a software conversion path. You'd go about this during program startup - just create an empty texture (via glTexImage2D with NULL data), then issue a bunch of glTexSubImage2D calls, each followed by a glFinish to ensure it completes. Ignore the first one because caches/states/etc are being setup for it, and time the rest of them. Repeat this for a few different formats and pick the fastest. Another alternative - seeing as you've tagged this question "Windows" - is to create a D3D device at startup (just after you've created your window but before you init OpenGL) then use D3D to check for format support. While OpenGL allows for software conversion to a valid internal format, D3D doesn't - if it's not supported by the hardware you can't do it. Then destroy D3D and bring up OpenGL. (This technique can also be used for querying other stuff that OpenGL doesn't let you query directly). It's actually a useful rule of thumb to cross-check what you're doing in OpenGL with the D3D documentation. If D3D can't do something then it can be a good indication that the something in question is not supported in hardware. Not always true, but a useful starting place.
0.777778
A 3-component OpenGL texture is actually 4-component in hardware
What are the advantages/disadvantages of the Rock Band 3 Keyboard?
Vs. a normal midi keyboard and the Midi Pro adapter? In particular, The RB3 Keyboard is not a full-sized keyboard. If we do use a full-sized midi keyboard in Pro mode, can we/do we have to use the entire keyboard, as it's played in the actual song, or can we/do we have to stick to two octaves (like the RB3 Keyboard)? The RB3 Keyboard can also function as a five-button peripheral in non-Pro mode. Can we do the same with a normal midi keyboard? I've read that the RB3 keyboard has velocity-sensitive keys. Does RB3 take this into effect? Will I lose some functionality if my midi keyboard isn't velocity-sensitive? Does the expressions bar also add functionality?
My qualifications: I've used both the RB3 keyboard and a Roland D-50 MIDI Synth with a MIDI adapter. If you use a full-sized midi keyboard in Pro mode, you do NOT use the entire keyboard. RB3 ignores notes played outside the two octave range of the RB3 keyboard. The pro keys chart displayed is the same no matter what kind of keyboard you are using (unlike the pro guitar charts which I understand are different depending on whether you use a 17-fret Mustang or a 22-fret Squier). A normal midi keyboard can also function as a five-button peripheral in non-Pro mode. The only thing missing are the color-coded tags over the C-D-E-F-G keys that the RB3 keyboard has, but since you shouldn't be looking at your hands anyway, that shouldn't matter ;) I don't think RB3 does anything with the velocity-sensitive keys, so you should not lose any functionality if your midi keyboard isn't velocity-sensitive. This is the only answer I'm not 100% positive on (my D-50 has velocity-sensitive keys), but I'm pretty sure. The expression bar on the RB3 keyboard is like the whammy bar on the 5-button guitar controllers - it alters the sound of the notes and when used on a held note with overdrive, it will add to your overdrive bar. My D-50 has a pitch bend joystick that the MIDI adapter converts to the same function.
1
RB3 keyboard and Roland D-50 MIDI Synth in Pro mode
Harvesting parts from slain creatures
In general: if you kill a monster with a body part that has some known (or suspected) property, is there any mechanic around harvesting the body part and using it as-is (or with minimal processing required)? Specifically: We're fairly low level and just found ourselves fighting a Dretch. While none of us did very well on our knowledge checks, it became apparent during the fight that it had a fair number of buffs, including DR and elemental resistances. Which of these are properties of the skin, and which are properties of the creature itself? Would such properties persist in the skin after removal (and tanning, I assume)? Would tanning/crafting produce armor, a wondrous item, a trophy, or what? I read some comments about how his is sort of frowned upon since it disrupts the economics of the game... and, ultimately, I understand this is totally subject to DM's approval, but... just thought knowing how this is handled generally is appreciated. (I asked another question about repurposing magic items which is somewhat similar to this, but I don't think this is a duplicate, since this is specifically about harvesting nearly-ready-to-use parts of creatures, whereas the other one dealt mainly with using magic items to create new items).
Pathfinder, like its predecessor D&amp;D 3.5, follows careful guidelines regarding the amount of treasure awarded and the value of items with magical properties. That means while it's up to you as DM to decide what monster body parts are worth and what items can be crafted from them, be aware that you're effectively giving out treasure. While there are no official rules, it stands to reason that the corpse has the creature's physical properties. A red dragon's hide is still tough and fire resistant even after separated from the dragon. However, magical properties (like a displacer beast's displacement) might degrade over time unless fixed in place with enchantment. A house rule in our 3.5 games is that the item itself may have some properties of the creature, but the item does not confer these abilities to its wielder. For example, a red dragonhide shield won't protect you from a fireball, but the next adventurer to stumble upon your charred remains will find the shield undamaged. In fact, this rule made its way into Pathfinder's rules on dragonhide armour. While the armour doesn't confer energy resistance, the price to add the energy resistance enchantment is reduced by 25%. You can craft weapons, armour, trophies and other items from slain creatures. Here's what I suggest: Weapons/armour: You're essentially just crafting a normal item using the creature's corpse as special materials. Make craft checks as normal, but you don't pay the raw material cost. The GM decides what special properties the material has, if any, what items can be made, and what those items cost (for the purpose of craft duration and sale price). Properties shouldn't normally be as powerful as a permanent magic enhancement (but if they are, the GM should be aware of the treasure value he's awarding every time he uses that creature). Wondrous items: Mundane crafting isn't enough to create a permanent magic item. You need rituals to fix the magic property in place. At best, a creature's body provides a discount of up to 25% on crafting an item: e.g. a displacer beast hide to make a cloak of displacement. Spell components: 250gp for powdered horn sounds like a great way to get rich. However, that's the buy price, so you'd sell it at 125gp, and that's after processing: as per the craft skill, raw materials are only worth 1/3 of the finished item. So at best, body parts harvested for spell components are worth a fraction of the part's price. Trinkets: Preserved monster hearts, heads on plaques and so forth should only be worth a few gp at most. Use the craft skill as a guideline. You can normally make half your craft check per week in gold as a profession anyway, so this isn't out of bounds. If your players try to carry back every animal part for gold, this will lead to a lot of boring bean-counting and extra gold. Remind players that their carrying capacity is limited and body parts weigh a lot. Have the market saturate and suddenly nobody wants to buy all these grell beaks. Or abstract it away: say "you sell all the collected monster parts for 50gp", or you can craft as a profession for double value for two weeks after you have been on an adventure where you collected parts.
0.888889
Magical properties of a creature can degrade over time unless fixed in place .