id
stringlengths 50
55
| text
stringlengths 54
694k
|
---|---|
global_01_local_0_shard_00000017_processed.jsonl/18943 | Geons have gravity, but no mass. Could they really exist?S
John Archibald Wheeler is a physicist who coined a lot of terms. You may have heard of a few of them. Wormhole. Black hole. Quantum foam. And geon. Wait, geon?
J A Wheeler was one of those people who seemed to be in exactly the right place, in exactly the right time, with exactly the right brain. After studying physics he collaborated with Albert Einstein, in Einstein's later years. This was not an uncontroversial thing. Einstein spent much of his later life working on unified field theory - a "theory of everything" that many now dismiss. (Even those who don't dismiss it don't believe Einstein should have worked on it, given the data he had at the time.) Wheeler continued Einstein's work, and seems to have made good use of it. He came up with a ton of ideas, some of which populate the physical universe and some of which populate science fiction stories. He coined the terms for black hole and wormhole.
He also came up with the term "geon." A geon is tough to find in reality, and won't help a star ship crew flip themselves across the universe, so it hasn't gotten the same amount of press as Wheeler's other ideas. Basically, it's an electromagnetic wave, and a very energetic one. As Einstein showed, mass and energy are equivalent, which means that energy should have its own gravity, the same way mass does. In Wheeler's mind, a certain amount of energy, all in one place, might generate enough gravity to keep itself together. So a geon is a wave of energy, kept in one "ball" and in one section space.
One of the big debates about geons is whether or not they are "stable." Gravity, Einstein showed, radiates outward at no faster than the speed of light. If a geon is radiating gravitational waves, it should be losing energy. Once it loses enough energy, it should lose the gravity needed to keep it together and dissolve. So a geon could be a very ephemeral thing.
Top Image: Tony Hisgett
Via Harvard. |
global_01_local_0_shard_00000017_processed.jsonl/18945 | i am a mother of 2 i was previously married and have 2 beautiful kids Alhamdulillah i am now divorced and have been divorced for 2 years i am now in a relationship with a guy who is not close to deen as i am seeking to try to get close to my deen even though i am commiting a major sin by being in a haram relationship and also comitted zina and now i am preganant with my third child i want to have an abortion because i dont want to be with this guy anymore we have lots of arguments and i am not happy anymore i dont want to make Allah upset more than i already have pleaseeee helppp meee!!
asked 10 romana's gravatar image
Asalaam o alaikum, sister, please firstly do not abort the child, this i feel is haram and Allah will provide for you. There are Quranic ayats pertaining to this question of abortion, Ask Allah to forgive you and provide for you and your next child. You made a mistake, or bad choices, but Allah is most merciful. Just do not kill your child!! This is an unacceptable decision, even if you now dislike the father of this child. Turn to Allah in true sincerity and improve your imam, and keep away from Zina in the future, try to follow the sunnah in finding your next partner/ husband.
(Nov 12 '13 at 16:41) abyadgirl abyadgirl's gravatar image
May Allah's Peace and Mercy Be Upon You.
First of all, forget about the abortion! On the other hand, you shall not marry the guy you've committed zina too. What you can do is to give birth to the child, repent to Allah and grow the child like he's/she's been your real child. Do not commit the same mistake again, for it is a punishable action.
answered 546 Anakata's gravatar image
thank you soo much sisters I would definetily keep the baby and would not want to commit another sin in having an abortion I was just confused in what to do but the guy wants to marry me so I don't know shall I take this step because I am carrying his baby or what shall I do?
answered 10 romana's gravatar image
Your answer
toggle preview
Markdown Basics
• *italic* or __italic__
• **bold** or __bold__
• numbered list: 1. Foo 2. Bar
• basic HTML tags are also supported
Asked: Nov 12 '13 at 13:48
Seen: 624 times
Last updated: Nov 14 '13 at 15:49
|
global_01_local_0_shard_00000017_processed.jsonl/18957 | Recently, a Japanese Vogue spread for which Crystal Renn had taped her temples garnered a lot of controversy when a behind-the-scenes video showed the tape (which didn't appear in the final spread thanks to the magic of Photoshop). Given fashion spreads that glorify or reference blackface have become common in recent years, you could forgive fashion writers for concluding that Vogue had employed eye tape to make Renn look "more Asian." Indeed, that was my initial assumption. I brought the shoot up on the phone with Crystal yesterday,* and she surprised me with her explanation of the eye tape, and why she — not the makeup artist or the fashion editor — had requested it that day. Renn had a lot to say about race, transformation, the many editorial choices that go into the production of the imagery fashion trades in.
A warning: what follows is perhaps the world's longest published conversation about eye tape.
Jenna Sauers: So explain why your eyes were taped. And, uh, explain how, for one thing. Explain how they taped your eyes, because I'm still like, 'How does that not hurt?'
Crystal Renn: Oh no it doesn't at all. It's great. You just feel the character, because it's so not you — and in a way you become something else. It's kind of just the extra key of the transformation. And transformation is why I did it. Anna Dello Russo did not tell me to tape. No-one told me at the shoot to tape. It is something that I often do to add to the look of the character if I feel that the look makes sense, and often I suggest it. I have very heavy brows, and they're more curved than straight, and sometimes when you're doing a character it might require more of a straight brow. Which sounds like such a small detail, but it can completely transform the face. Lots of actresses do this, models do this — I don't know how willing models usually are to do it, or if other people suggest it, but I am willing, and I even bring [tape] it in my own kit.
It made sense for the makeup. When you're at a shoot, you sit down, and you hope — at least, in my career, I've made it a point to be part of the team, and that's what I like so much about modeling, because I really enjoy about the job — so I really try to be as involved as I can be with makeup, with hair, with the creative direction. I wanna know what's going on at all times and offer my own suggestions. You know, everyone comes in with kind of their expertise. Makeup knows what they're doing, but they have to know your face. Creative direction, they know what they want for the shoot. The photographer has to highlight who you are with the light. And I, the model, know my face in different lights. I know my face in different makeups. I know my body in clothes. I know what works. Because I've been doing this so long, and I take it very, very seriously. So something such as tape — yeah, that's not surprising on an everyday basis. Every day, that could happen. And just because we were shooting Japanese Vogue, that is not why we did the tape.
Crystal Renn Wasn't Trying To 'Look Asian' In That Eye Tape ShootS
Crystal Renn, wearing eye tape, on the April, 2011 cover of Vogue Mexico. Photo by David Roemer.
Jenna: So it's not about race — it's about your brow shape. Can you give some examples of other jobs that you've done with tape — are there famous pictures of you out there where you're wearing eye tape and I've just never noticed?
Crystal: Oh yeah! Yeah — tons. A perfect example, and an extreme case where I taped even more than usual was the French Vogue plastic surgery shoot. Where we were kind of even making fun of the whole fact that the entire face was completely done in a different way. That was a complete transformation, more than any shoot I've ever done.
Jenna: Yeah, you were using latex, and facial prosthetics, and all kinds of crazy stuff.
Crystal: Yeah. That was absolutely a job where I suggested tape, I thought it was fantastic — um, it just added to the character. And sure, that's an extreme case—
Renn in the December/January, 2010/11, issue of Vogue Paris. Photo by Tom Ford.
Jenna: What about more normal stuff? Are there other editorials that you've done that you can think of?
Crystal: Oh, yeah. I kind of feel bad naming them now that this kind of whole thing came out.
Jenna: But it's not a racial thing, you're saying. I mean, giving more examples — it just shows that apparently this is a totally common thing that I never knew about the industry.
Crystal: Well, there's quite a few. I'm trying to think, let's see. Okay: Vogue cover. I did the Mexican Vogue cover, right? That was taped.
Jenna: That was taped.
Crystal: Totally taped. Love that eye.
Jenna: I'm learning all your secrets!
Crystal: That eyeliner was so good, I had to tape. It just made it better. Anything like beauty [stories], eyeliner — it just accentuates the makeup.
Crystal Renn wearing eye tape in a 2010 editorial for the German magazine Sleek. Photo by Cameron Krone.
Jenna: Did you tape for any of your shoots with, like, Glamour? I'm Googling your pictures now and staring at your eyebrows really intensely, you should maybe know.
Crystal: Glamour, no. Glamour loves a curved eyebrow. No, we didn't tape for Glamour. And they kind of like a more natural look anyway, so it's not kind of suitable for that. No, it tends to be when there's more makeup and drama. And the point is transformation. As a model — I mean, I can't speak for all models, I can go on assumptions based on what I've seen — my assumption is that most girls enjoy the job, but they do the job and they go home. For me, this is my job, this is my art, this is my life, this is my message. To transform is the greatest part of my work. It's the thing that makes me the happiest. And to be able to try to do as many looks as I can and to show as many faces as I can, it's exciting to me and I hope to excite people when I do it.
I've had moles painted on my face. I've had freckles painted on. I've been made lighter, I've been made tanner with makeup. It's exciting to me...It's not who I am, standing in front of the camera — something happens. I become something else. That's part of why this is a job, it's a performance. There's a whole team and tons of work that goes into 8-10 images that you see in an editorial...As a model, I have made it a big point to learn fashion references, which include different types of brows. And because I don't want to shave my brows off and have the makeup artist, or whoever, draw 'em on, we use things such as tape and makeup to fake it, basically. And to bring the look. Which might be a '20s brow. Or to take 'em away. I did a shoot with Tush magazine and we bleached my brows away. I didn't go home like that, we dyed them back. But tape is very much the same thing.
Jenna: But just to be clear: when you say it's about "transformation," you're not talking about specific racial transformation. This wasn't about making you look Asian?
Crystal: Oh, absolutely not. We didn't even think about that on the shoot. I'm the one who suggested it, and it didn't even cross my mind. It's something that I regularly ask makeup artists, you know, if it will bring something more to the character. Offer a different face.
Jenna: But not an Asian face.
Crystal: No.
Jenna: I think part of this is attributable to the difference between the images that fashion produces, and the reality behind them [that] is often very different.
Crystal: Even when I walk down the street, and the makeup's on, and everyone's done their work, I still don't look like that. Because there's incredible light, and things that you wouldn't even think of that go into it. I think that's hard for the public, sometimes they think that what they see is exactly what that girl is. And it's just not.
Jenna: In a way, fashion is too successful. It's too good at convincing people that what they see is, is real.
Crystal: Exactly. And I think part of the reason this controversy happened was because it was for Japanese Vogue. And people saw the taping of the eyes as resembling Japanese women.
Jenna: What do you think about other fashion shoots that have changed girls' races? You have to admit, I think, that people had that impression because blackface shoots have been happening for the past few years, where a magazine will take a white girl, paint her skin brown, and stick an afro wig on her. Karl Lagerfeld shot a video with a bunch of European models, including Freja [Beha Erichsen], and he taped their eyes — but with an express intention of making them appear to be Chinese, because the video was set in Shanghai in the 1920s. Fashion does sort of do this thing fairly frequently where it takes a white girl and tries to make it appear as though she is of a different race.
Crystal: Somebody who does this — picks the white girl, instead of picking the black girl, and then paints the white girl a darker color to make her look black. That person may be a racist. Or they may not.
Jenna: It certainly sends a pretty racist message.
Crystal: Yeah. Do I think we need to use more black girls within the industry? Absolutely, one hundred percent, yes. As the model, as somebody who thrives on the transformation, I am beyond thrilled to do stories where they change my gender, where they take me and make me something completely different....But the reason I am not 100% morally okay with [blackface shoots] — I would feel that I'm taking a job from one of them. I would feel that I'm taking a job from a black girl who deserved it. And who could do it more authentically than I could. I wouldn't want to send the message that I don't think black models should be absolutely everywhere in fashion. I think we should all be included within fashion. Whether it's size, whether it's race; I think that all different types of beauty should be in fashion.
I've gotten to a point where weight doesn't dictate what I'm doing, I just am, and I go with what happens. And that has made me appreciate different kinds of beauty much more than I used to.
Jenna: So, um, what kind of tape do you use? Can you buy it? Do you recommend this as an at-home kind of beauty trick?
Crystal: You know what, the at-home beauty trick I would say would be to braid right above your ears, one on each side, and then tie them back as tight as you can when you can see that your eyes have lifted. That's when you tie the braids together in like a little ponytail. And then you brush the hair over it. Is tape appropriate for walking around the street? Eh! [Laughs] It's gonna show. You don't have a retoucher there who's being thousands of dollars to deal with it. You know what, probably not. The braid is amazing. And it has the same effect. Might cause a headache, take a Tylenol.
Jenna: The braid's gotta hurt.
Crystal: Yeah, the braid hurts. That's why I choose tape. It's easier, less pain, less focus on the pain, and you get the job done.
Jenna: And you don't have to worry about what your eyes and eyebrows are doing.
Crystal: It controls an area that I can't do. I can still lift my brow, I can cause a curve. I can do certain things with my face, to lift certain areas such as under the chin, or knowing which direction for my face with the light. And knowing exactly how I look at every angle. Just like with any job, you have to be professional. When I go on a set, I can glance the light, I can see one shot, and know exactly how things are going to look. And through much effort and practice, I've gotten there. It really is just practice. It's not something that you just do on your first job.
Jenna: And it's just regular office tape?
Crystal: Oh, no, it's not that — they actually call them face tapes. You get it at a beauty supply store, they have them at Ricky's in New York City and that's often where the makeup artists go. I don't know how many models request it on their jobs, but I think makeup artists love that I'm willing.
Jenna: Well. This was fascinating. My eyes were never taped when I, um [modeled].
Crystal: Not ever?
Jenna: I didn't even know that this was a thing.
Crystal: I don't know, though. You kind of have taped eyes without having to tape. You kind of have the eyes that I tape for.
Jenna: That's very sweet of you to say! [Laughs] Well, this was actually really interesting. I would even say...eye-opening.
Crystal: [Laughs] It's funny, because each time I bring out the tape, I say, 'Well who else does it?' And they say so-and-so, and so-and-so. And I'll keep them nameless. But yeah, it's more common than you think.
Disclaimer: I met Crystal a couple years ago, when her book came out. We met when I interviewed her for this site. Since that time, we've become friends; for that reason, I generally do not to write about her, except occasionally when she makes the news and I make mention of it in the daily link roundup I am responsible for. It presents a conflict of interest, and it's not really seemly, or appropriate to our relationship, to write about her — and especially to blog about her, when so much of blogging is opinion. But yesterday, she was adamant that she wanted to talk about it for the record, I think because she felt like she had nothing to lose by explaining herself in this situation. I edited the interview for length, but I don't believe I made any editorial decisions to flatter her. Nonetheless, this disclosure is offered for your consideration. And now I will return to my usual Crystal Renn news-participation blackout. |
global_01_local_0_shard_00000017_processed.jsonl/18958 | In Defense of JessaS
Jessa Johansson could be described as the resident bohemian on Girls—that is, if she stayed in one place long enough to actually reside there. Beautiful, enigmatic, and "unsmotable," she radiates the kind of confidence that—especially when paired with a giant Louis Vuitton duffle bag—could easily be read as the grating sense of entitlement of a rich girl. But overall, the quality that attracts people to Jessa is the same that repels them: she just doesn't give a fuck. As Bret Michaels would say, this is the thorn to her rose.
Introduced to us in the first episode as the polar opposite to Hannah's other best friend, the type A Marnie, Jessa dropped in on their lives after traveling the world on what would appear a to be a glamorous itinerary of whimsy (she maybe went to Amsterdam, definitely shucked pearls in Bali where she met a surfer before winding up in France). But now that we're a little more familiar with how she operates, we know that she probably wasn't going where life took her, but instead running from it entirely. Living with no regard for conventions and rules is great until you're forced to deal with the inevitable consequences of your choices.
But Jessa, as a character, is like a Rorschach test. What you think about her says more about you than it does her. She can pull off hats and she doesn't have a Facebook account. Does it annoy you that she's trying too hard to be "different"? Or do you find it refreshing that she marches to the beat of her own drum? Does that piss you off? Or do you think that's cool? She thinks it's "vile" when people are early for things. Do you think that's immature? Or can you relate? She doesn't check her voicemail. Is that infuriating or a relief? She doesn't go on dates "because they're for lesbians." Did that make you groan or laugh? When she said, "You know what the weirdest part about having a job is? You have to be there every day even on the days you don't feel like it," did you recoil at her privilege or rejoice in her truth? Whatever your answer, she wouldn't care.
"I don't like women telling other women what to do, or how to do it, or when to do it," she once said. This ethos is probably what's most admirable about her, because it's not just something she says, but what she lives. She's authentic. At 24, she has the courage to be herself, even if she doesn't know exactly who that is yet.
Honesty, of course, can be brutal, and Jessa has unleashed that brutality on those she loves most, whether with a biting remark or an uppercut. But hurt people hurt people. Even though she said she can be "smoted," the revelation about her stint in rehab belied that. (People don't tend to develop heroin addictions because their lives are hunky dory.) As did the glimpse at her relationship with her father, when she cried about how he wasn't there for her. And that just seems like the tip of the iceberg—the bits of information that she's dropped about her mother suggest that there's much more pain and damage lurking beneath the surface. She had a troubled home life in that it doesn't seem like she had much of a home at all. Maybe it doesn't excuse some of her behavior, but it explains it.
Just when you're sick of Jessa, she leaves. But then you get the chance to miss her. Ultimately,she's a yo-yo friend, getting really close and then pulling away. It can be confusing and infuriating, but the thing about a yo-yo is that it always comes back. |
global_01_local_0_shard_00000017_processed.jsonl/18984 | Fixing the Broken: an Interview with Taxidermy Artist Lisa Black
Lisa Black with her Fixed Fawn and her new studio.
Some have labelled New Zealand's Lisa Black "The Steampunk Taxidermist". And in fairness, her biography does describes her as preoccupied with "an imminent future where technology and biology are intimately combined". She refers to herself only as a sculptor, jeweler and artist, and would ask others to do so, as well.
Her work will be on exhibit at Silver Lake's La Luz De Jesus Gallery in Los Angeles, as part of the biennial Rogue Taxidermy show beginning May 4. That, along with earlier shows in Milan and Berlin and another in Aalborg, Denmark scheduled for November, makes 2012 a very busy year for Lisa. Despite all that, she somehow managed to find the time to move to a new studio in Auckland and grant Joe Hubris this interview.
Q: What motivated you to incorporate taxidermy in your art?
I was motivated to begin working on taxidermy when I saw (the then) broken Fawn in an online auction. It was obvious that the Fawn wasn't getting much interest because of its condition, so I purchased the animal with the intention of "Fixing" it. That is where my series of modified animals began. Since I use mostly recycled taxidermy in my work, I've never had a need for formal training. I would like to learn the art some day, it always seems such a shame to me when I see roadkill or dead animals going to "waste". It might take many years, but I think it would be worth the dedication to see an animal perfectly preserved.
Q: What do you think about being referred to as "Steampunk"?
When I started my series of animals I didn't know what Steampunk was. I prefer not to pigeon-hole my art in that way. I use mixed metal media which is often not era-specific. I do use use a lot of vintage metal parts but I don't limit myself to them. I use modern mechanical parts as well. I don't consider "clock parts" the medium which defines Steampunk. Unfortunately, their use is often all it takes to find yourself lumped in with actual members of the movement. Nothing against Steampunk though--I have seen some amazing designs and it can be truly inspiring when it's executed well!
Q: I detect an optimism in your work, especially in the face of The Fixed Fawn.
I was very excited to be working on the Fawn. It was my first piece. I was highly motivated as I have always loved animals and as I've grown older, I've gained an appreciation for both the "natural world" and the world we have made for ourselves. There seems be movement toward their convergence. The combination of metal and animals was not intended to express optimism, but simply to express that which is.
Q: How do you acquire the materials for your creations, in particular, how do you obtain the "non-mechanical" elements?
I source the (mostly antique) taxidermy and metal components from online auctions, garage sales and estate sales. The majority of the animals I find have existing damage in some way (hence the series name 'Fixed'). I have come across perfectly intact animals before and, although potentially they might make incredible pieces, I would find it difficult to modify them if they weren't already broken.
Q: Have you ever encountered any opposition to your work, from animal rights activists, for example?
Yes. Several individuals have conveyed their negative opinions over the years, although they did so more often when I was first starting out. People have made more of an effort to consider the underlying concepts of my work as my career has progressed.
Q: What other artists inspire you?
I've always liked the work of HR Giger and taxidermy artists like Ron Pippin.
Q: What are you currently working on and what are your future plans?
I'm currently working on more pieces in my Departed series, which are the skulls. Departed Ram will be exhibited for the first time at the Rogue Taxidermy show in Hollywood, and I'm participating in a show at Galerie Wolfsen in Denmark called 'High on Lowbrow". I'm also working on a soon-to-be-released series of hourglasses.
Q: What can you tell us about your new digs?
My new studio is the penthouse of one of Auckland's oldest buildings: Canterbury Arcade. The space is used as my workshop and showroom. What attracted me to the space (apart from the obvious character) was the workshop room which looks into the attic. It certainly sets the mood for my work day.
See Lisa Black's work as part of the Rogue Taxidermy Show at the La Luz De Jesus Gallery (4633 Hollywood Blvd., Los Angeles) opening May 4th.
Comments to Joe Hubris. |
global_01_local_0_shard_00000017_processed.jsonl/19001 | It's a Clock! A Radio! An Alarm! The New Xbox Is All in One.SKotaku reader erocker414 writes, "I took a couple liberties to make it look more like my beloved radio/alarm clock. Now I don't dislike it as much."
Wood panelling isn't new to clock radios—or video game consoles, for that matter. And it does make everything better. Everything.
More on erocker414's Kinja site. |
global_01_local_0_shard_00000017_processed.jsonl/19003 | Adapted from
Christian Phallism The Cross
Symbols and Meanings
Cross Symbolism
shepardIn pagan times, crosses were associated with sun gods and the heavens. As such, they have been used for many centuries predating Christianity as powerful wards against evil spirits. There are a number of different types of crosses.
The cross was not considered a typically Christian symbol until the seventh century. (Early images of Jesus depicted him either as a lamb or carrying one - an echo of views of Hermes and Osiris as a "Good Shepherd".) To Christians, the cross has become a symbol of the redemption of the world's sins through the death of Jesus.
Where energy, in the form of contemplation, prayers and meditation, has been consistently focused on a particular symbol, it is thought that the symbol itself develops a powerful energy field. Many believe that nothing evil can withstand the power of the Christian cross. Victims of demonic possession and vampires were supposed to be repelled by its image and the Inquisitors wore crosses when interrogating alleged witches during the Burning Times.
Ankh The ankh was the Egyptian cross of life, representing the union of male and female sexual symbols: a female oval surmounting a male cross. Its other name was Key Of The Nile, because the sacred marriage between God and Goddess was supposed to take place at the source of the Nile each year before the flood. Egyptians regarded the ankh as a universal life-charm. In hieroglyphics, the ankh stood simply for the word "life".
This extraordinary golden Phallic Cross depicts four phalli with a circle of female pudenda around the four testicles in the centre. It was designed to be suspended from the neck and is thought to have been intended for someone of high rank. Found at San Agata di Goti, Naples, Italy, during the early 19th century.
latin cross
The Latin, or Passion Cross was originally rejected by Christians because it was a pagan symbol. Some earlier uses of this symbol was as a scepter of Apollo; with the phrase "Ptolemy the Savior"; and a sign of life to come in the Egyptian religon of Sarapis.
The cross was not adopted until long after the departure of Jesus, because he who dies on the cross is considered cursed by God. [Deut. 21:23, Galatians 3:13]
The New Testament sometimes refers to Jesus as being hanged on a tree, not a cross (Acts 5:30; 1 Peter 2:24), linking this imagery to tree-slain savior figures of Krishna, Marsyas, Odin, and Dodonian Zeus.
This version of the cross is not an inappropriate symbol for a church with a male-oriented structure, for in early societies it was a phallic symbol.
cross fourchee
A similar symbol in appearance is the Cross Fourchee. This design reflects Christian piety and was popular as a decorative cross in medieval heraldry. The design ties to the age-old trust in the pagan magic of the forked stick.
celtic cross
The Celtic Cross was originally a Hindu symbol of sexual union, kiakra. The cross as a phallic symbol within the circle as yoni. This cross was adopted by the Gypsies. This cross, as used by Christians, is often used as a grave marker.
Other symbolism of this cross relates to the four directions. East is rebirth, youth, Spring, and growth. West is knowledge, experience, Autumn, and guidance. South is vitality, vigor, Summer, and strength. North is wisdom, silence, winter, and death. The circle connects them in the cycle of life.
wotan cross
Wotan's Cross reflects similar symbolism, with the cross and circle as a symbol of cosmic union. The circle also stood for the earth horizon, with the four directions meeting at the center. It was also called the Sun Cross for the sun (cross) embraced by heaven (circle). The often repeated symbolism is that of a diety in the middle of a four-way heaven.
coptic cross
Another cross with sun imagery is the Coptic Cross. This was originally a sun symbol, with the heaven in the center supported by four pillars in each direction to uphold the sky. Coptic Christians later added the four nails to identify Christ with the heavenly diety, and to suggest the blood on the nails had spread to the four corners of the world.
cross potent
Crosses are often associated with sky or sun gods. The Cross Potent was a symbol of this in ancient Mesapotamia. The cross potent with a circle (similar to the Coptic Cross, below) was the sign of the Assyrian heaven-god Anu. This cross is also called the Windlass, a term linked with it in the Middle Ages.
cross pommee
Similar in appearance is the Cross Pommee. This cross represented the Assyrian god Asshur, who ruled time/seasons. He was pictured with the faces of a man, lion, eagle, and bull, his four totems. The cross with circles was later used on Jewish amulets.
greek cross
The Greek Cross was one of the original forms used by Christians. (The Latin cross was not in popular usage until the eighth and ninth centuries.) Before Christianity, the Greek cross was an emblem of Hecate as the Goddess of Crossroads. The vertical was male, the horizontal was female - making it a plus sign of one-plus-the-other.
cross patee
Cross Patee was popular in medieval heraldry. It was a combination of the Christian (Greek) cross and Wotan's. This cross, also known as Cross Formee, was often shown as the insignia of the god Frey.
maltese cross
A similar appearing cross is the Maltese Cross, originallly from the island of Malta, home of one of the world's oldest Goddess temples. This design directs attention to the center, possibly to indicate earth's geographical center, omphalos, and site of the Goddess's chief temple. |
global_01_local_0_shard_00000017_processed.jsonl/19015 |
Re: MediaStream Constructor
From: Adam Bergkvist <[email protected]>
Date: Thu, 10 May 2012 15:57:31 +0200
Message-ID: <[email protected]>
To: Rich Tibbett <[email protected]>
CC: Anant Narayanan <[email protected]>, "[email protected]" <[email protected]>
On 2012-05-10 13:32, Rich Tibbett wrote:
> Anant Narayanan wrote:
>> Hi all,
>> We discussed earlier today about the possibility of combining multiple
>> MediaStreams into a single stream via it's constructor; in the context
>> of allowing multiple calls to getUserMedia to obtain a stream for each
>> other contexts.
> I agree. One other context could be for the mixing of e.g. pre-recorded
> audio/video content with live camera data in to a single MediaStream object.
>> Robert O'Callahan has suggested that we extend the MediaStream
>> constructor to take a list of Objects, which can be a combination of
>> MediaStreams or MediaStreamTracks.
> It would probably be better to allow MediaStream and
> MediaStreamTrackList objects, where a MediaStreamTrackList object can
> contain one or more MediaStreamTrack objects. I've given some
> explanation on why I think we should keep MediaStreamTrackList below.
> This does limit the potential to extend the MediaStream constructor with
> additional arguments later on (e.g. options). We should probably keep
> that possibility open and instead specify the MediaStream constructor as
> follows (which is also in line with the new Blob object constructor
> proposal [1]):
> [Constructor, Constructor((MediaStream or MediaStreamTrackList)?[] streams)]
> As a developer you could then do any of the following:
> var stream = new MediaStream();
> var stream = new MediaStream([mediaStram1, mediaTrackList1, ..., objN]);
> This also means that at some later point in time we could adopt an
> options argument if or when we might need that:
> streams, optional MediaStreamProperties options)]
I like this idea in general. The current approach with separate lists
for audio and video doesn't really make sense since it's easy to put a
track in the correct list (i.e. audio or video). Perhaps we could even
support all three objects as arguments "MediaStream or
MediaStreamTrackList or MediaStreamTrack".
>> This behavior is much in line with functions like Array.concat [1], and
>> highlights the flexibility JS programmers are accustomed to, since we
>> are not restricted with type safety as much as other languages.
>> I haven't mentioned MediaStreamTrackLists though, because I think they
>> are a redundant type that may simply be represented as an array of
>> MediaStreamTracks. If there are good reasons to keep the
>> MediaStreamTrackList around, please do let me know.
> IIUC, firing onaddtrack and onremovetrack when objects are added
> directly to an array object means we'll have to add special behavior to
> standard Array handling. We would need to intercept any method calls to
> e.g. splice, slice, push, etc on Arrays objects...but only when they are
> called on an Array living in a MediaStream object.
> With MediaStreamTrackList as a live collection object we know to fire
> events when user's call an explicit method (i.e. 'add'/'remove'
> methods). Other parts of the web platform also use Collection objects
> rather than Array objects if any non-standard behavior is to be attached
> to an attribute.
For example, the local operation add() doesn't trigger the addtrack
event on MediaStreamTrackList according to the spec. That given, local
operations such as splice and push wouldn't trigger events either. The
events are meant for external changes to the lists.
I agree with the second point you make about non-standard behaving
lists. We might need to have such behavior since it's been suggested
that adding a track to a list will increase the length by one, but
removing a track will not affect the list length. The removed track will
simply leave a "whole" in the list to not affect the indexes of the
other tracks. I think we should keep MediaStreamTrackList, but it needs
some more work. For example, apart from the special remove behavior, it
would be convenient to know both how long the list is as well as how
many tracks it contains (since those numbers may not be equal).
> We could certainly tighten up the definition of the MediaStreamTrackList
> collection interface and I would be happy to take an action to propose
> some text here.
>> I support these two changes proposed above. Feedback appreciated!
>> Regards,
>> -Anant
Received on Thursday, 10 May 2012 13:58:04 GMT
|
global_01_local_0_shard_00000017_processed.jsonl/19016 |
Re: ACTION-87: Selectors API
From: liorean <[email protected]>
Date: Wed, 17 May 2006 06:29:54 +0200
Message-ID: <[email protected]>
Some comments on the outstanding issues:
> 1.3 Outstanding Issues
>This section is non-normative.
>The draft has several outstanding issues that either need to be
addressed in one
>way or another at some point:
> * Several people have raised issues with naming the methods match and
>matchAll as those might suggest a boolean return value. Alternate suggestions
>have been select and selectAll.
For ECMAScript, I think "match" is a fine choice of verb and is
consistent. For the closest comparison, regex 'match' isn't boolean.
Regex 'match' returns an array of the matched data - data which may
be either detail about a single match OR a list of all full matches
depending on whether the regex has a global flag.
Regex uses the verb 'test' for the boolean matching.
> * There was at least one request for scoped selectors. For example, being able
>to do event.target.match() or in other words allowing the methods on Element
>nodes. Given that Selectors itself has no notion of scoped selectors
this might be
>difficult to define and is perhaps better delayed until the CSS WG has defined
>scoped selectors.
I think there's some confusion here about what is requested and what
you think is requested. What I personally mean when I want to have a
way to ask for all nodes in a NodeList that matches a selector or all
nodes in an element's subtree that matches a selector doesn't effect
the scope of the selectors. For example:
<elm2 xml:id="bleh">
This selectorMatches variable would be StaticNodeList of both nodes in
the subtree below #bleh that match the selector. It would not at all
affect the scoping of the selector (':root' still matches the 'doc'
element, for example). It would only affect a single thing: it would
ask for matches in a subtree of the document instead of all matches in
the entire document tree.
> * It would be nice if extensibility was addressed by DOM Level 3 Core or a
>separate specification that all DOM specifications could reuse.
> * Need to look into XPathNSResolver and the default namespace.
> * If DOM Level 3 Core gets errata we might be able to get away with not having
>a new interface at all for NodeList (StaticNodeList), but just say
that the object
>implementing the NodeList interface is not live.
At least one issue more that I think should be added:
Currently you can ask "gimme all matches in the document against this
selector" but you can't ask "I've got this element handle (from
event.target or whereever). Does this very element match this
selector?". Even if you did add 'match' and 'matchAll' on the Element
interface, those don't make it any easier to get an answer to that
question. So, some type of equivalent to regex.test(string) would be
immensely useful.
(It can also be noted that this is the only functionality really
needed. Traversal is already in the DOM1, so that is not the problem.
What is missing is the functionality of asking for if an element
matches a selector.)
David "liorean" Andersson
Received on Wednesday, 17 May 2006 04:30:04 GMT
|
global_01_local_0_shard_00000017_processed.jsonl/19017 |
w3c mail test:
From: David Poehlman <[email protected]>
Date: Mon, 30 Oct 2006 11:43:32 -0500
Message-Id: <[email protected]>
Hi All,
Sorry for annoying you but I'm having issues with my w3c email and
needed to send a test message. It seems mail is being distribbuted
but I'm not receiving it and my mail does not bounce.
Al has put in a help request.
Received on Monday, 30 October 2006 16:44:28 GMT
|
global_01_local_0_shard_00000017_processed.jsonl/19018 |
HTML 4.01 specification error?
From: Gabor Szabo <[email protected]>
Date: Wed, 2 Feb 2000 01:05:50 -0600 (CST)
To: [email protected]
Message-ID: <[email protected]>
I found the following inconsistency in the Tables section of the
latest HTML 4.01 Specification (W3C Recommendation 24 December 1999,
According to Subsection 11.3.2 (Inheritance of alignment specifications,
" The order of precedence (from highest to lowest) for
the attribute valign (as well as the other inherited attributes lang,
dir, and style) is the following:
>>>>> 5. An attribute set on the table (TABLE). <<<<< "
On the other hand the valign attribute is not defined for the
table element neither in Subsection 11.2.1. (The TABLE element,
nor in the DTD.
I guess that the incriminated sentence has been inadvertedly carried over
from the pre-HTML-4.xx times when the valign used to be a legal
attribute of the table element.
If I were wrong, then the above sentence in the specification
needs further clarification, anyway.
PS. I would like to express my satisfaction on the fact that the W3C
decided to implement the ISO 8601 date and time representation.
I hope this move will help to guide the progarmming community towards
the general acceptance and use of this format in computer applications.
* Gabor Szabo *
* Department of Mathematics Phone: (785)864-4055 *
* University of Kansas Fax: (785)864-5255 *
* 405 Snow Hall E-mail: [email protected] *
* Lawrence, KS 66045-2142 URL: http://www.math.ukans.edu/~szabog/ *
Received on Wednesday, 2 February 2000 02:05:52 GMT
|
global_01_local_0_shard_00000017_processed.jsonl/19019 |
From: Gavin Nicol <[email protected]>
Date: Tue, 16 Jan 1996 09:57:15 -0500
Message-Id: <[email protected]>
To: [email protected]
Cc: [email protected], [email protected]
>First, the life of the information in someone's HTML documents will
>usually be much longer than the life of the style chosen for those
>documents (what happens in five years when marquees and gradients in
>the background are considered tacky, or in fifteen years, when they
>become part of retro-90's chique?).
I very much think that most people who are actually quite serious
about data longevity would never choose HTML as the canonical form in
the first place.
Received on Tuesday, 16 January 1996 09:58:55 GMT
|
global_01_local_0_shard_00000017_processed.jsonl/19020 |
Re: visibility of elements
From: Douglas Rand <[email protected]>
Date: Mon, 24 Feb 1997 15:27:28 -0500
Message-ID: <[email protected]>
To: Patrick Telegone <[email protected]>
CC: [email protected]
Patrick Telegone wrote:
> Wouldn't it be good if we had in the style-sheet specification a way to
> specify the visibility of an element.
> I think that we could have a new property named "visibility" that could
> have 3 values: "invisible", "folded", "normal".
See,s to me that there are really two different things here. One
is whether the element is rendered, that's adequately covered by
display. display: none should tell the UA not to display the specified
selector. (I confess that I haven't implemented it yet, but it is in
the spec)
.nodisplay { display: none }
<P CLASS=nodisplay>This paragraph won't be shown by the user agent </P>
> with a CSS. With this feature, one could also tell that the lists of his
> document are folded, when the document is loaded, so that the reader have
> a more general view of the document when it first appears.
I think this would be an interesting feature. I'd add a new property
which applied to block level elements. Something like display-style:
outline or display-style: normal. You could also extend display by
adding outline as a new type to block and list-item.
Something like:
OL, UL { display: outline }
and now all OL or UL elements rendered with some sort of expand/contract
Doug Rand [email protected]
Silicon Graphics/Silicon Desktop http://reality.sgi.com/drand
Disclaimer: These are my views, SGI's views are in 3D
Received on Monday, 24 February 1997 15:27:36 GMT
|
global_01_local_0_shard_00000017_processed.jsonl/19021 |
RE: 'initial' | 'inherit' inconsistency
From: Eric A. Meyer <[email protected]>
Date: Fri, 29 Oct 2010 14:41:22 -0400
Message-Id: <a06230909c8f0c44bce84@[]>
To: [email protected]
At 5:54 PM +0000 10/29/10, Sylvain Galineau wrote:
>While 'inherit' is fairly well-known and understood for people familiar
Indeed. I don't even know if I'd claim to be familiar with it. I
mean, http://www.w3.org/TR/css3-values/#keywords says they apply
everywhere but doesn't bother to define what they mean (and then
there's the red note about "maybe there should just be 'default'").
The more recent Editor's Draft of that module does reference
http://www.w3.org/TR/css3-cascade/, which defines them, and then when
I read http://www.w3.org/TR/css3-cascade/#initial0 I'm not convinced
that I've been told what it actually means. I can make a reasonable
assumption, but I might be wrong. (An example or two would help a
Received on Friday, 29 October 2010 18:41:57 GMT
|
global_01_local_0_shard_00000017_processed.jsonl/19025 | [lkml] [2000] [Mar] [25] [last100] RSS Feed
Messages in this thread
SubjectRe: Endless overcommit memory thread.
On Sat, 25 Mar 2000, Linda Walsh wrote:
>"Richard B. Johnson" wrote:
>> Even if the perfect operating system kept some virtual RAM for
>> 'root' to log-in. It has no idea of what programs root would
>> want to execute. Eventually, it will fail with an out-of memory
>> condition.
> Having no idea of what programs root would execute doesn't mean
>you can't reserve sufficient memory for a shell, a ps and a kill.
>But if my machine runs out of processes and I can't log in -- I have
>little choice but to hit the RESET button.
You could use alt-sysrq to kill some tasks from the console, if you have
one. :-)
> By allowing 'overcommit', you end up in a situation where now your
>90M process touches the last of its memory -- and it isn't there, so....
>it SEGFAULT's because the memory mapper can't the address to a physical \
It gets killed because the sysadmin didn't put enough memory in the
machine. Which has nothing to do with overcommit...
> If you allow overcommit, you can have *either* the SEGFAULT behavior
>*or* the no-mem/locked out (process touches everything up front).
>If you disallow overcommit, you reduce the possible behaviors to 1.
You're confusing OOM situations with overcommit. OOM can happen without
>The problem is that suppose the process allocates it's memory -- with
>the 'overcommit' you have a system where it is hard to predict *what*
>will fail. Will it be a system process? A deamon? It's a
>low-integrity system because you can't figure out the behavior of
>failure in advance.
Predicting what will fail has nothing to do with overcommit. It depends on
the kernels OOM behavior.
> David's killing demon is fine for a user-space/level solution,
>but the kernel should default to the high-integrity option.
Which is Rik van Riel's patch, or something very much like it.
David Whysong
Astrophysics graduate student University of California, Santa Barbara
My public PGP keys are on my web page -
the body of a message to
Please read the FAQ at
\ /
©2003-2011 Jasper Spaans |
global_01_local_0_shard_00000017_processed.jsonl/19032 | Switch to Desktop Site
Casinos in New York?
(Read article summary)
Jessica Hill/AP/File
(Read caption) This file photo shows the Casino of the Wind at Mohegan Sun in Uncasville, Conn. New Yorkers are in favor of introducing casinos like this one in the hopes of boosting the state's economy.
About these ads
There's a new poll of New Yorkers out from Quinnipiac University that indicates New Yorkers overwhelmingly support the introduction of Vegas-style casinos to the state. The same poll also found a willingness to consider nat gas drilling (via the controversial fracking technique) in NY's section of the Marcellus shale.
Here's the New York Post:
Poll respondents supported the creation of Las Vegas-style casinos by nearly 20 percentage points, 56-37 percent, but only narrowly favored upstate natural gas drilling known as hydrofracking, 45-41.
Support for casinos was virtually identical in all regions of the state, though union households were nearly 2-1 in favor, 61-32 percent. By a slightly wider 64-31 percent margin, respondents said casinos would be good for the economy.
Respondents narrowly favored drilling for natural gas in the Marcellus Shale because they think economic benefits outweigh environmental concerns. But upstate, where the drilling would occur, voters oppose injecting a high-pressure mix of water, sand and chemicals to fracture the shale and release vast stores of natural gas by 47-43 percent.
New York City voters were evenly split on drilling, 41-41 percent, with the strongest support coming from suburban voters, 56-31 percent.
By the way, if they get the casino thing done you can basically say "good night" to AC and Foxwoods...
For the record, I'm for both. As long as I don't live in the part of New York where the gas deposits are (I don't) and so long as the dreck that tends to set up shop in the surrounding area of a casino strip is nowhere near me (it won't be).
The reason I'm not a passionate advocate for these two items that could boost the state's economy is that there's no trade-off or sacrifice for me; in fairness it simply isn't my battle as I live a the disconnected enclave of Long island that would be environmentally unaffected by both initiatives.
But my fellow New Yorkers are speaking loudly. |
global_01_local_0_shard_00000017_processed.jsonl/19043 | Subject: Re: make problem - march 27 sources
To: None <>
From: Kim Andersen <>
List: current-users
Date: 04/05/1994 22:58:42
> >From the keyboard of
> >
> > Oops. Yeah, I guess you have to swap 2 and 3. But DEFINITELY build
> > the compiler tools and config before installing the includes.
> >
> > > >> 1. Build/install compiler tools and config
> > > >> 2. Build/install/boot kernel
> > > >> 3. Install share/mk and includes
> > > >> 4. Build/install libraries
> > > >> 5. Build/install everything else
> Sorry bothering you all, but:
> Could someone who really did it mail me the REAL LIST (tm) ?
> Also what belongs into the list of compiler tools ? (gcc, as, ld, ranlib, ? )
I'm dont have The REAL LIST, but here's my story anyway:
Mar27: make new config/kernel, runs fine etc. Make local snapshot, with shared
libs. Everything works fine, no major breakdowns, no crashes.
Mar28-Apr4: make build. Major disaster :-(
struggle with the ar/ranlib/ld things.
Finally on Apr04, carefully did this: (everything made -static)
cd /usr/src/lib;make
cd /usr/src/gnu/usr.bin/gcc2/libgcc;make
cd /usr/src/usr.bin/ar;make
Trick ld into using crt0.o, libc.a, libgcc from the obj directories.
cd /usr/src/usr.bin/ranlib;make
Trick again
Trick again.
Then make install in ar/ld/ranlib.
Back to src/lib. Remove archives, make and make install.
Mar29/Mar30/Mar31/Apr01/Apr04/Apr05: make kernel, compiles/runs ok.
My system now runs a freshly made static world. The few things I have tried
until now works. I'm using a previusly built XFree-2.1.
The dates mentioned is sup-dates and not (allways) calendar days.
Updateing my tree using the sup-lists and ftp sometimes has it problems
because of the load/limit on sun-lamp.
Philosophical note: How do you get a large uptime, when using the
latest/greatest ?
I't seems to be THE measurement of a quality for some people. |
global_01_local_0_shard_00000017_processed.jsonl/19045 | Subject: Re: diskpart
To: Patrick Welche <>
From: Andrew Brown <>
List: current-users
Date: 05/30/1997 15:06:57
>I am having a problem with writing a disktab entry. Among other
>things, I don't know what to do about
>Sectors per Track: 108 to 180.
>Indeed, it is a Quantum Atlas II, 4.5Gb SCSI drive, and from the data
>sheet, I can't get the exact number of bytes on the thing, just
>formatted capacity = 4550 Mb where 1Mb = 1e6 bytes. Any help on what I
>should do about that would be appreciated, but now on to a subsidiary
call seagate (that is a seagate isn't it? wow, my mind is broken
today :) and ask them. then call and ask again. then call and ask
again. their tech support sucks, but they can usually get someone who
actually knows by three tries or find an agreement between two of
|
global_01_local_0_shard_00000017_processed.jsonl/19053 | Subject: Re: ARGSUSED and friends
To: None <>
From: der Mouse <[email protected]>
List: tech-kern
Date: 01/16/2000 23:32:57
>> I don't consider this "cluttering up" at all. I consider it being correct.
> I have found some rather nasty bugs lurking in code by going through
> and making lint happy with the code.
As have I, going through and making gcc -Wthis -Wthat happy...what's
your point here? It sounds as though you're trying to say "yes, it's
good to make code pass lint", though what you're really saying is that
lint has helped you, which is not the same at all. On a few occasions
lint has helped me too, but I've never gone to the trouble to eliminate
cast pointers without upsetting lint, it's hard to write anything
useful. That's why I use gcc with various warning options instead; I
find that with a suitable set of options, it's (a) strong enough
checking to be worthwhile and (b) weak enough that useful programs can
be made completely warning-free. (Though I do wish there were a way to
say "yes dammit I know I have -Wcast-qual on, I really do mean to cast
away this qualifier"; there are two cases where I commonly want that.)
> The only ones that have me stumped is when lint throws up a "empty
> translation unit" - no idea what that is.
It's generally a file which ends up containing no code at all, probably
because of preprocessor conditionals that dike it all out.
I'm not sure whether data declarations and/or externs count towards
enough to figure it out.
der Mouse
|
global_01_local_0_shard_00000017_processed.jsonl/19059 | LeChuck Hat
LeChuck Hat Monkey Island 2: SE Costume Party
The hat of an evil ZOMBIE pirate out for revenge. It's hats like this that make you glad to be alive again, even it's in zombie form. You are glad to be alive again as a zombie pirate, RIGHT? There are no refunds for this item. For more information, see www.xbox.com/live/accounts.
Click to create and send a link using your email application
$1.00 Purchase
to see this on your avatar. |
global_01_local_0_shard_00000017_processed.jsonl/19060 | Social Media
The History of America, As Told by Facebook [PIC]
In honor of Independence Day, The New York Times visualized America's would-be Facebook profile in its Op-Art section, translating the history of the U.S. into Facebook's iconic narrative structure.
The piece (below), "Like It or Unfriend It?" was created by novelist Teddy Wayne, Vanity Fair staffer Mike Sacks and designer Thomas Ng.
The graphic recalls a similar piece published by Slate's Christopher Beam and Chris Wilson in May, which chronicles recent U.S. events in an imaginary Barack Obama Facebook feed.
Last year the Washington Post published pieces of a real Facebook feed in "A Facebook Story: A mother's joy and a family's sorrow" to tell the tragic story of a young mother's illness and subsequent death.
SEE ALSO: We Hold These Tweets to Be Self-Evident [COMIC]
Image courtesy of Flickr, ladybugbkt
Load Comments
The New Stuff
The Next Big Thing
What's Hot |
global_01_local_0_shard_00000017_processed.jsonl/19062 | Take the 2-minute tour ×
How can I figure out the classical construction (direct sum, product, pullbacks, and in general direct and inverse limits) in the category made by chain complexes and chain maps (of abelian groups or any abelian stuff)? Because of this category is abelian it must have (co)limits, isn't it?
In particular take $$ \begin{gather*} \dots\to A_n\to A_{n-1}\to\dots\\ \dots\to B_n\to B_{n-1}\to\dots \end{gather*} $$ I would like to say that $\mathcal A\oplus\mathcal B$ is "what I want it to be", $A_n\oplus B_n$ with obvious maps. But a standard argument doesn't allow me to conclude it: maybe it is false? A single word with the right reference will be enough to close the topic; I am now reading Hilton & Stammbach.
Edit: I would like to add what I've tried to do, but seems difficult not to invoke some diagrams, which I'm not able to draw without a suitable package here. However, first of all both complexes inject in the sum by maps which are part of a chian complex, $\iota_n^A,\iota_n^B$. Then, consider another complex $\{C_n,\partial_n^C\}$ and a couple of chain maps $\{a_n\colon A_n\to C_n\}$, $\{b_n\colon B_n\to C_n\}$. For each $n$ there exists a map $\alpha_n\colon A_n\oplus B_n\to C_n$ factoring the $a_n$ and the $b_n$s. Then I would like to show that the maps $\alpha_n$ are part of a chain map between the sum and the complex $\mathcal C$, but trying to prove it I can only conclude that in the diagram (vertical rows are the $\alpha_n$s) $$ \begin{array}{ccc} A_n\oplus B_n &\xrightarrow{\partial_n^\oplus}& A_{n-1}\oplus B_{n-1} \\ \downarrow && \downarrow\\ C_n &\xrightarrow[\partial_n^C]{}& C_{n-1} \end{array} $$ which I want to be commutative, aka $\alpha_{n-1}\partial_n^\oplus=\partial_n^C\alpha_n$, I have $\alpha_{n-1}\partial_n^\oplus\iota_n^A=\partial_n^C\alpha_n\iota_n^A$. How can I remove the iotas?
share|improve this question
I hate to just blindly throw out a reference without checking whether it has it or not, but my guess is that Weibel talks about this. – Matt Dec 12 '10 at 17:37
I'm sorry, i was intended to write "I don't see it there, in Hilton Stammbach", in the chapter about these topics. – tetrapharmakon Dec 12 '10 at 17:40
The direct sum is $A_n\oplus B_n$ with the 'obvious' maps; could you tell us what you've tried and why it fails so we could help you identify your error? For the record, showing $\mathbf{Ch}$ is abelian is exercise IV.1.3 in H&S and the discussion on p.5-7. If I were you, I'd start reading Weibel at this point since the latter chapters of H&S are pretty terse, imo. – Vladimir Sotirov Dec 12 '10 at 19:00
What do you mean by terse? I added some more. – tetrapharmakon Dec 12 '10 at 19:17
add comment
2 Answers
The category of complexes in an abelian category $\mathcal{A}$ is a full subcategory of $\text{Fun}({\mathbb{Z}},\mathcal{A})$, where $\mathbb{Z}$ is partially ordered under reverse inequality. So if we know how these constructions are performed in the category of functors from $\mathbb{Z}$ to $\mathcal{A}$, we'll have the natural candidates to the category of complexes. The standard result is that (co)limits in $\text{Fun}({\mathcal{D}},\mathcal{C})$, where $\mathcal{D}$ is a small category and $\mathcal{C}$ is a category, are computed pointwise. Take a look at Borceux's 'Handbook of Categorical Algebra, Vol.$1$' section $2.15$. There he explains the precise meaning of being computed pointwise.
Since any abelian category is finitely (co)complete, we can compute any finite (co)limit in $\text{Fun}({\mathbb{Z}},\mathcal{A})$ pointwise. If we consider a (co)complete category, e.g., the category of modules over a ring, we can compute any (co)limit pointwise.
If you think Borceux's book is too terse, there is a similar discussion in Rotman's 'An Introduction to Homological Algebra' on page $317$.
Added: In order to remove the iotas you will need to prove that $\alpha_{n-1}\partial_n^\oplus\iota_n^B=\partial_n^C\alpha_n\iota_n^B$. Now use the fact that there is only one morphism $\varphi: A_n \oplus B_n \rightarrow C_{n-1}$ such that $\varphi \iota_n^A = \alpha_{n-1}\partial_n^\oplus\iota_n^A$ and $\varphi \iota_n^B = \alpha_{n-1}\partial_n^\oplus\iota_n^B $.
share|improve this answer
I will check in Borceux tomorrow, thanks. I thought the same thing, but if it is true, then why it doesn't work with limits ( math.stackexchange.com/questions/7949/… )? Maybe the question is stupid, but I thought also that if it doesn't work with limits, I must be careful with products and coproducts too. – tetrapharmakon Dec 13 '10 at 19:05
@tetrapharmakon: Well Borceux only proves that the category $\text{Fun}({\mathcal{D}},\mathcal{C})$ is (co)complete if $\mathcal{C}$ is and that (co)limits are computed pointwise. You are interested in the category of chain complexes which is a full subcategory of $\text{Fun}({\mathbb{Z}},\mathcal{A})$. So the (co)limits in $\text{Fun}({\mathbb{Z}},\mathcal{A})$ only are candidates for limits in the category of chain complexes (or in any full subcategory). But, if I'm not misremembering, direct limits and inverse limits are computed pointwise in the category of chain complexes... – Nuno Dec 14 '10 at 15:33
... Also, remember that being exact is a much stronger condition, e.g., exact sequences are not preserved by additive functors. – Nuno Dec 14 '10 at 15:34
I'm sorry but I don't see the difference between the exactness of $\bigoplus_{i\in I} A_i\hookrightarrow \bigoplus_{i\in I} B_i\twoheadrightarrow \bigoplus_{i\in I} C_i$ and the non-exactness of $\varinjlim_{i\in I} A_i\hookrightarrow \varinjlim_{i\in I} B_i\twoheadrightarrow \varinjlim_{i\in I} C_i$... I mean, I know the two are true, but I can't explain why, if I see the first as a paticular case of the second: what is missing in passing to the general concept of (co)limit? Cardinality of $I$? The structure in $I$ regarded as a category? Other? ... – tetrapharmakon Dec 15 '10 at 17:23
add comment
In a preadditive category (it's clear that chain complexes are preadditive), the idea of a direct sum can be described directly. Given two objects $A, B$, a direct sum $C$ has morphisms $i_1: A \to C, i_2: B \to C$ and projections $p_1: C \to A, p_2: C \to B$ that satisfy $i_1 p_1 + i_2 p_2 = 1_C$ and $p_1 i_1 = 1_A, p_2 i_2 = 1_B$. Indeed, it is easy to get such maps in a direct sum (inclusion and projection); conversely if we get such maps one can check that $C$ is a coproduct and a direct product by explicitly using these maps. Namely, one checks that such maps guarantee a direct sum in the case of abelian groups, and then applies hom-sets and Yoneda nonsense (if we have $\hom(X, C) = \hom(X, A) \oplus \hom(X, B)$ for all $X$ naturally, then we're done). I'm being a little vague here and only sketching it; if it's not clear, I can clarify.
This is clearly the case for the construction of chain complexes that you described above. The maps $p_1, p_2, i_1, i_2$ are the natural projections and inclusions piecewise. They are maps of complexes, as one can check, and they satisfy the required identities because they do for abelian groups.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/19063 | Take the 2-minute tour ×
Let $A=\{1,2,3,4,5,6\}$ and let's consider the usual order relation given by $\leq$. My textbook includes an image representing this structure:
enter image description here
Given the definition of lattice, I don't understand how this isn't it. When I am looking for the supremum and the infimum for every pair it is obvious that $\forall (a,b)\in A$
$$\begin{aligned} \;a\leq6 \text{ and } b\leq6, 1\leq a \text{ and } 1\leq b\end{aligned}$$
so what is that I don't take into account?
share|improve this question
I think 2,3 don't have a join, and 4,5 don't have a meet? – sperners lemma Nov 13 '12 at 18:13
@spernerslemma I'm trying to figure out this thing myself... and it's kind of confusing. I don't know why they aren't joined! – haunted85 Nov 13 '12 at 18:15
Sperners observation is correct. Both $4$ and $5$ are upper bounds for $2$ and $3$. There is no least upper bound. Similarly there is no greatest lower bound for $4$ and $5$. – Jay Nov 13 '12 at 18:23
add comment
2 Answers
up vote 3 down vote accepted
The problem is that $2$ and $3$ have $2$ "smallest possible upperbounds" but they are not comparable so they don't have a join. Similarly, $4$ and $5$ don't have a meet.
Hope that helps,
share|improve this answer
add comment
Remember for example that $4\wedge 5$ will be the unique greatest lower bound for 4 and 5. Now 2 and 3 are both lower bounds, so $4\wedge 5 $ above those.. but how could that be possible? There isn't such a node...
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/19064 | Take the 2-minute tour ×
Has anyone used Mind Maps to teach advanced mathematical topics?
If so, how did it work, was it useful or a waste of time?
Thanks for any insights.
Regards -A
share|improve this question
mind maps are a waste of time in general. – akkkk Dec 11 '12 at 17:03
Nice question! I don't think they're necessarily a waste of time...I'll look into it... ;-) +1 – amWhy May 21 '13 at 0:11
@amWhy: Thanks. I am actually very interesting if anyone is doing this. We have successfully used them in other areas and I think it may be possible for organizing math too, including for taxonomies of entire subjects or classifications. Regards – Amzoti May 21 '13 at 14:19
add comment
Your Answer
Browse other questions tagged or ask your own question. |
global_01_local_0_shard_00000017_processed.jsonl/19065 | Take the 2-minute tour ×
My general premise is that I want to investigate the transformations between two distinct sets of vertices on n-dimensional manifolds by:
• Minimalizing the change in the fundamental shape of the vertices (I want a convex polytope to stay a convex polytope).
• Describing the dynamics of the transformation. (Possible applications to theoretical physics)
• Finding constraint conditions on what can and cannot occur when the space in which the transformation is occurring is not "regular". This includes not-everywhere-differentiable manifolds, singularities, and other pathological cases.
Well, what an ambitious project. But in any case I have made some progress for the n-dimensional case with n-vertices where the space is "regular" and I haven't introduced advanced mathematics yet. I'm mostly playing around in configuration space for vertices in euclidean space or something similar.
I have defined a functional in configuration space that gives the length of all possible paths in configuration space between two distinct sets of vertices in $\mathbb{R^n}$ as follows:
$$T = \int\limits_{\lambda_{1}}^{\lambda_{2}} \sqrt{\sum_{I=1}^{n} \sum_{i=1}^{d} \left(\frac{d}{d\lambda}\left(\sum_{j=1}^{d} s(\lambda)R_{j}^{i}(\lambda)(q_{I}^{j}(\lambda) + a^{j}(\lambda))\right)\right)^2} d\lambda$$
Where $\lambda_{1}$ and $\lambda_{2}$ correspond to the start-point and end-point of the transformation. The members of the gauge group are $s$ (dilatation), $R$ (rotation), and $a$ (translation). $q_{I}^{j}$ corresponds to a point in configuration space representing $I$ vertices and it lives in $j$ dimensions. ($i$ is also a dimension index)
You can think of the equation as finding the straight line between two points (in configuration space) given all of the varied paths when you solve for constraint conditions in the Euler-Lagrange equation (recall): $$\frac{\partial{f}}{\partial{x}} - \frac{d}{d \lambda} \left(\frac{\partial{f}}{\partial{\dot{x}}}\right) = 0$$ This is represented in the figure below when the space has no curvature.
Transformative Norm Equation
Hopefully, you have a general idea about what I'm talking about, this is at about page 5 in the paper where this is introduced, there is a lot of background that I'm not going to discuss. I've constructed an explicit example with tetrahedra where a tetrahedron is approximated to another tetrahedron in a minimalized manner. Here's a figure I made: Tetrahedral Approximation that may help you understand what I'm trying to work with... in any case I'll ask my questions now.
[Optional for the intrigued reader]:
How can I begin to generalize this geodesic equation so that it can comment on spaces with different metrics, or irregular behaviour? As an example of what I am trying to reach for, I would be interested in seeing how a set of vertices could geodesically traverse a singularity in a smooth 2-manifold, and if I could define a general functional for any behaviour on any manifold (I would attempt to restrict it to 2-dimensions to start) eventually. There are two main types of singularities I would be interested in investigating, the first would be the "black hole type" in which a diffeomorphism in the manifold causes "a hole at the bottom". This means that there would be an exponential increase in curvature around the vicinity of the singularity, and I want to find out how a set of vertices deals with those imposed conditions. The other would be for a 2-manifold with no curvature and I know that for a particular configuration of vertices, with the geodesic (based on the equation above) lying along a certain line. If I create a hole (simply remove a point in the same way you can create a hole in a single-variable piecewise defined real function), what happens to the geodesic? How can I encode this information, so it either pushes right through the hole somehow, or defines a new path around it?
Main Question: For a functional (assuming I could derive one) that gives the path from a distinct set of vertices to another in an n-dimensional smooth manifold with shape preserving characteristics. When a singularity is introduced into the manifold, will the geodesic equation:
• Somehow push through the singularity/ignore it is present.
• Define an alternate path around the singularity (this is what I hope, so I can investigate further with applications to black hole dynamics)
• Become undefined and nothing useful results
share|improve this question
It has to depend on whether the functional you're minimizing diverges in a good way (gets arbitrarily large) or a bad way (gets arbitrarily small) as a path taken by a configuration point approaches the singularity, and (in the latter case) on whether the divergence is tame enough to be integrated over. – mjqxxxx Dec 16 '11 at 22:10
Have you worked explicitly with an example where this happens? I simply need to figure out a way to define that functional and then see how it behaves? There are no general theorems or results in Singularity Theory or maybe Catastrophe Theory that comment on this sort of thing? – Samuel Reid Dec 19 '11 at 3:07
You make reference to a paper where this is defined more clearly, but I can't find a link to it. In your discussion of deleting point in your Riemannian manifold and then looking for geodesics, what mjqxxxx says is correct: the behaviour is very sensitive to the way your metric degenerates near the singularity. For instance, if you take $\mathbb{R}^2$ and delete a point, but keep the flat metric, geodesics are still straight lines, and you will have a family of geodesics that run in to the singularity in finite time. If you take instead a metric that looks like a [...] – Sam Lisi Dec 22 '11 at 12:45
[...] hyperbolic cusp near the singular point, and then the flat metric outside of a compact region, you will have a complete manifold and the geodesic between any two points will avoid your singularity. – Sam Lisi Dec 22 '11 at 12:45
add comment
Your Answer
Browse other questions tagged or ask your own question. |
global_01_local_0_shard_00000017_processed.jsonl/19066 | Take the 2-minute tour ×
For a triangle $ABC$ in 3D (each point has x, y, z coordinates) is it possible to generate uniform random points on the triangle from only the following data:
Normal of the triangle plane $N = \vec{\text{AB}}\times \vec{\text{AC}}$
Normal of the $AC$ edge plane $U = \cfrac{\vec{AC} \times N}{| \text{N} |^2} $ and $d_u = -U.A$
Normal of the $AB$ edge plane $V = \cfrac{ N \times \vec{AB} }{| \text{N} |^2} $ and $d_v = -V.A$
The two edge normals U and V are calculated such that $\vec{U}.B + d_u = 1$ and $\vec{V}.C + d_v = 1$ (As of yet I don't have the reputation to post an image so of the arrangement but will as soon as I can).
If this cannot be done with the available data what is the minimum amount of extra data required to generate the uniform random points (e.g. A, B, C)?
I am aware that the you can generate uniform random points on a triangle using the vertex $A$ and edges $\vec{AB} = B - A$ and $\vec{BC} = C-B$ as follows:
$S = A +\sqrt{R_1}\vec{AB} + \sqrt{R_1}R_2\vec{BC}$
Where $R_1 \text{and} R_2$ are random numbers between 0 and 1.
share|improve this question
There is no such thing as an "$AC$ edge plane". – Christian Blatter Jan 8 '12 at 12:09
It may have some other name however the peer review journal I am reading refers to it as such. It is the plane which the edge AC lies in which is perpendicular to the triangle plane – cubiclewar Jan 8 '12 at 20:42
add comment
Your Answer
Browse other questions tagged or ask your own question. |
global_01_local_0_shard_00000017_processed.jsonl/19067 | From Math Images
Revision as of 14:52, 24 July 2009 by Kblaha1 (Talk | contribs)
Jump to: navigation, search
Wiki Help
Math Help
Writing Help
Computer Science Help
General Questions
Personal tools |
global_01_local_0_shard_00000017_processed.jsonl/19071 | The Library of Congress
[American Memory]
Senate Joint Resolutions, 22nd Congress
Mr. Smith, from the Committee on Finance, reported the following resolution; which was read, and passed to a second reading: Joint Resolution To authorize the Secretary of the Navy to allow interest in certain cases. (S. 1) |
global_01_local_0_shard_00000017_processed.jsonl/19072 | I saw that in the calculation of the yearling badge ( Do offered bounties affect the reputation gain needed for the Yearling badge?) the bounties offered are subtracted and the net reputation is taken into account. Now you can be more than earning at least 200 reputation and put it in bounties. And if earning is to be encouraged, spending should not be punished.
Now it can be argued that bounties improve or don't improve the overall SO experience ( Do bounties improve overall quality of the posts?), at least to the point that they already allow you to deserve 4 bronze badges.
So is it reasonable for bounties to be deducted from the yearling badge calculation? Or to be an alternative bountiful yearling for say, spending at least 500 or more reputation on bounties?
share|improve this question
Isn't the usual advice "Don't spend it all in one place"? If you care about the yearling badge, you have to save 4 points a week for yourself. Can't be that hard! – Bo Persson Sep 11 '12 at 16:11
add comment
You must log in to answer this question.
Browse other questions tagged . |
global_01_local_0_shard_00000017_processed.jsonl/19073 | What should I do with questions that were refused by the community, if I have found solutions for them? If the question was closed as not constructive, does it mean, that the community thinks that this question should not be answered, because the answer is not interesting or should be not published?
My question is inspired by single case: I have asked how to deal with big dialogs in PrimeFaces: PrimeFaces with big dialogs - how to do this correct?. I've suggested that the actual behaviour is the bug because the application would be unusable for people with small screens, and I refuse the idea that dialogs should be used for yes/no questions only. The question have been ignored (almost no views), so I've started to develop the solution myself. When I've finished it, I've thought that it's a good idea to share with it with community. But the question was next day closed!
So, now I don't know, should I remove my answer and move it to my blog? If the question is unwelcomed, than the answers are unwelcomed too? Should I share with something no one wants here?
share|improve this question
As I said, read my answer here and figure it out why that happened meta.stackoverflow.com/questions/159711/… you should take a look to FAQ also... – Mr. Alien Dec 20 '12 at 18:24
add comment
1 Answer
up vote 4 down vote accepted
When a question is closed as "Not Constructive" it means there is no one right answer. Any answer will just be someone person's opinion.
It means that having answers to this question will cause more problems than it will solve because people will end up in endless debates over what answer is better when there is no objective metric for determining if an answer is correct, or which answer is "more" correct. Such discussions do not fit well in the Q/A format of the site and end up obscuring the potentially useful information in noise.
As for other reasons:
"Too Localized" means it wouldn't help anyone to have the answer, so there's no need to post it
"Not A Real Question" means that the question can't be answered as it states. It doesn't provide enough information to answer it, it's asking for too broad of an answer, it doesn't actually ask a question at all, etc. In such cases you should focus on fixing the question (these questions, more than any other type, can be improved to the point where they become good answerable questions). Until the question is improved there's little use in providing an answer.
"Off Topic" means that the answers wouldn't be relevant to the target audience, so you shouldn't be posting them here, consider finding a more appropriate site to post it on.
For "exact duplicate" just go to the question that your's was closed as a duplicate of and post your answer there, if you feel it has something to add to the existing answers.
share|improve this answer
What are you saying "No" to? Should I remove my answer and move it to my blog? If the question is unwelcomed, than the answers are unwelcomed too? or something else? – LBT Dec 20 '12 at 18:33
@LittleBobbyTables I'm saying no to the question in the title. – Servy Dec 20 '12 at 18:36
If you think it's useful, post the question again with any changes suggested by any commenters and with the answer you found. – Chris Gerken Dec 20 '12 at 20:26
@ChrisGerken The whole point of the question being closed is for the community to say that such answers aren't welcome, so that's exactly what he shouldn't do, and exactly what this answer is telling him not to do (and why). – Servy Dec 20 '12 at 20:33
@Servy, but if a specific answer becomes available and can focus/change the question then that's OK. The whole point is to understand why the question was closed, fix it and then answer it. – Chris Gerken Dec 20 '12 at 20:57
@ChrisGerken for a "Not a real question" that can be the case, as I explained in my answer. For that case you should figure out why the question couldn't be answered, fix the question so that it's appropriate, get the post re-opened, and then post your answer. Posting an exact duplicate of your previous question just to answer it before it gets closed again would be abusing the site. In this case though, the question was "not constructive". Such questions can very rarely be edited into appropriate shape; they are inherently asking for something that can be answered, but shouldn't be. – Servy Dec 20 '12 at 21:02
add comment
You must log in to answer this question.
Not the answer you're looking for? Browse other questions tagged . |
global_01_local_0_shard_00000017_processed.jsonl/19074 | Which site deals with theoretical/conceptual database questions?
Also, which deals with conceptual and practical questions about database management systems such as about structure and working?
share|improve this question
add comment
1 Answer
up vote 3 down vote accepted
Database Administrators would probably be the best place to get answers about theoretical/conceptual database questions.
I've also seen some good conceptual database questions on Programmers, providing the question falls within the scope of conceptual software development.
share|improve this answer
+1 10k+ now :-) – AsheeshR May 20 '13 at 15:40
@AshRj Haha thanks, this will have been the 3rd time I've gotten 10k rep. I keep giving it away on bounties :) – Rachel May 20 '13 at 16:14
add comment
You must log in to answer this question.
Not the answer you're looking for? Browse other questions tagged . |
global_01_local_0_shard_00000017_processed.jsonl/19075 | For some reason I can't seem to post comments right now, and code styling isn't working. is giving a 206 partial content, and trying to open it directly in FF is giving me the following error message:
Content Encoding Error
share|improve this question
add comment
2 Answers
Can't reproduce this.
share|improve this answer
add comment
I haven't found a way to reproduce it again either, but I'm pretty sure it had something to do with cache corruption in firefox and nothing to do with your site. It was bugging me and I eventually cleared the cache, the problem went away.
Sorry for forgetting to update the post on meta, or the absolute failure of me to post the headers of my request to help you try and find the problem. I would be a horrible bug-tester ;)
share|improve this answer
add comment
You must log in to answer this question.
Not the answer you're looking for? Browse other questions tagged . |
global_01_local_0_shard_00000017_processed.jsonl/19076 | It often occurs to me to add an edit summary to a question-edit immediately after submitting the edit, especially if the changes aren't obvious (formatting etc.). So I:
1. Click "edit" again.
2. Fill in the summary
3. Click on "Save Edits".
The 'edit' (no actual change has been made to the title/body/tags) is accepted, but the summary doesn't show up, i.e. it is silently rejected.
I don't think it should work this way because the summary has been added by the original editor within the original edit's edit-window. In fact if I remember correctly, it to used to work as expected earlier; so perhaps this is a recent change.
share|improve this question
This is annoying - the only way around it that I know of is by changing something in the body along with the edit summary, then edit it immediately again to undo that particular change. – BoltClock's a Unicorn Apr 13 '12 at 20:18
add comment
You must log in to answer this question.
Browse other questions tagged . |
global_01_local_0_shard_00000017_processed.jsonl/19077 | If you make a suggested edit to a question or an answer, and then you decide that it needs further editing, the edit box saves what you had already suggested, even if it hasn't been approved yet. That really helps.
However, after fat-fingering and having to submit a few replacement edits on English.SE, I realized that this doesn't happen for tag wikis. In other words, the edit box fails to retain your suggested edit and instead displays the pre-approval status of the change. Could we get the tag wiki editor to also retain suggested edits?
This, of course, doesn't affect other editors, since only the original editor is allowed to make a change while the suggested edit is sitting in the queue.
share|improve this question
add comment
1 Answer
up vote 2 down vote accepted
Great find - this will be pushed either tonight or tomorrow.
share|improve this answer
add comment
You must log in to answer this question.
Not the answer you're looking for? Browse other questions tagged . |
global_01_local_0_shard_00000017_processed.jsonl/19096 |
Media Applaud Teen Abortion on 'Friday Night Lights'
High school football drama ventures into taboo, media celebrate 'apolitical' portrayal.
Newsweek Promotes Over-the-Counter Birth Control Pill
Washington Post Says Abstinence Programs 'Might Work' Just Days after Attacking Them
'Landmark study' finds lower sexual activity among teens in abstinence-only vs. other programs.
U.S. News' Erbe Equates Conservative Christians with Radical Terrorists
MTV Acts Responsibly?
The MTV summer series "16 and Pregnant" explored the very real-world consequences of the hook-up culture that MTV usually promotes.
ABC: Abstinence Still Not an Effective Means of Birth Control
The Toxic Tube Made Them Do It
SVU Sends Pro-Life Message, but Swipes at Bristol Palin
Syndicate content |
global_01_local_0_shard_00000017_processed.jsonl/19097 | detailed en George Soros: Media Mogul <div class="field field-type-nodereference field-field-source"> <div class="field-items"> <div class="field-item odd"> <div class="field-label-inline-first"> By</div> <a href="/author/dan-gainor">Dan Gainor</a> </div> <div class="field-item even"> <div class="field-label-inline"> By</div> <a href="/author/iris-somberg">Iris Somberg</a> </div> </div> </div> <p><a title="George Soros and the Media: Executive Summary" href="">Read the Executive Summary</a></p> <p><a title="Top Journalists that Serve on Soros-Funded Boards" href="">Read Top Journalists that Serve on Soros-Funded Boards</a></p><p><a href="" target="_blank">read more</a></p> Special Reports Business and Media Institute 2009 2010 abc agenda alternet amanpour american anti attacking attacks author back beck big billion billionaire blog board boards book brave called center chamber charity claim CNN columbia community connections conservative Conservatives consortium david Democracy detailed directors downie echo editor Editorial empire find forms foundation foundations Fox free fund funded funding funds gave george global government greenwald group huffington impact included includes including independent industry influence institute integrity interest interests investigations investigative journalism Journalists leading left liberal list made mainstream major makes member members million millions money month murdoch nation national network news newspapers NPR numerous open operation operations organization organizations outlets page people political politics post president Press prize professional program progress progressive project prominent propublica public radio reach readers received report Reporters reporting rupert school service show site society soros sources start states stations stories story study support syndicate tax ties top united university washington web work world wrote year york Mon, 15 Aug 2011 20:59:00 +0000 admin 2081 at |
global_01_local_0_shard_00000017_processed.jsonl/19099 | 4 out of 9 rated this helpful - Rate this topic
How to: Convert a String to a DateTime (C# Programming Guide)
It is common for programs to enable users to enter dates as string values. To convert a string-based date to a System.DateTime object, you can use the Convert.ToDateTime(String) method or the DateTime.Parse(String) static method, as shown in the following example.
For more examples of date strings, see Convert.ToDateTime(String).
// Date strings are interpreted according to the current culture.
// If the culture is en-US, this is interpreted as "January 8, 2008",
// but if the user's computer is fr-FR, this is interpreted as "August 1, 2008"
string date = "01/08/2008";
DateTime dt = Convert.ToDateTime(date);
Console.WriteLine("Year: {0}, Month: {1}, Day: {2}", dt.Year, dt.Month, dt.Day);
// Specify exactly how to interpret the string.
IFormatProvider culture = new System.Globalization.CultureInfo("fr-FR", true);
// Alternate choice: If the string has been input by an end user, you might
// want to format it according to the current culture:
// IFormatProvider culture = System.Threading.Thread.CurrentThread.CurrentCulture;
DateTime dt2 = DateTime.Parse(date, culture, System.Globalization.DateTimeStyles.AssumeLocal);
Console.WriteLine("Year: {0}, Month: {1}, Day {2}", dt2.Year, dt2.Month, dt2.Day);
/* Output (assuming first culture is en-US and second is fr-FR):
Year: 2008, Month: 1, Day: 8
Year: 2008, Month: 8, Day 1
Did you find this helpful?
(1500 characters remaining)
Thank you for your feedback
© 2014 Microsoft. All rights reserved. |
global_01_local_0_shard_00000017_processed.jsonl/19101 | Export (0) Print
Expand All
This topic has not yet been rated - Rate this topic
DiagnosticMonitorConfiguration.ConfigurationChangePollInterval Property
Gets or sets the interval at which the diagnostic monitor polls for diagnostic configuration changes.
Namespace: Microsoft.WindowsAzure.Diagnostics
Assembly: Microsoft.WindowsAzure.Diagnostics (in Microsoft.WindowsAzure.Diagnostics.dll)
<EditorBrowsableAttribute(EditorBrowsableState.Advanced)> _
Public Property ConfigurationChangePollInterval As TimeSpan
Property Value
Type: System.TimeSpan
Returns TimeSpan.
The diagnostics.wadcfg file is used to configure diagnostics in your application. For more information on how to configure your diagnostics.wadcfg file, see Enabling Diagnostics in Windows Azure. Once your application is running in Windows Azure, you can use the DiagnosticMonitorConfiguration class along with the RoleInstanceDiagnosticManager class to remotely change your application’s diagnostics configuration.
The ConfigurationChangePollInterval specifies how often the diagnostic monitor will check for configuration changes in the diagnostics.wadcfg file in wad-control-container. By default, this value is 1 minute.
The following code snippet remotely gets the configuration for each instance in a specific role and changes the poll interval to 2 minutes:
string connectionString = System.Configuration.ConfigurationManager.ConnectionStrings["StorageConnectionString"].ConnectionString;
// application dashboard under Cloud Services.
string deploymentID = "e2ab8b6667644666ba627bdf6f5e4daa";
string roleName = "WebRole1";
// Get the DeploymentDiagnosticManager object for your deployment.
DeploymentDiagnosticManager diagManager = new DeploymentDiagnosticManager(connectionString, deploymentID);
IEnumerable<RoleInstanceDiagnosticManager> instanceManagers = diagManager.GetRoleInstanceDiagnosticManagersForRole(roleName);
// Iterate through the role instances and update the configuration.
foreach (RoleInstanceDiagnosticManager roleInstance in instanceManagers)
DiagnosticMonitorConfiguration diagnosticConfiguration = roleInstance.GetCurrentConfiguration();
// Set the poll interval to 2 minutes.
diagnosticConfiguration.ConfigurationChangePollInterval = TimeSpan.FromMinutes(2.0);
Development Platforms
Windows Vista, Windows 7 and Windows Server 2008
Target Platforms
Did you find this helpful?
(1500 characters remaining)
Thank you for your feedback
Community Additions
© 2014 Microsoft. All rights reserved. |
global_01_local_0_shard_00000017_processed.jsonl/19102 | Export (0) Print
Expand All
This topic has not yet been rated - Rate this topic
UmAlQuraCalendar.ToFourDigitYear Method
Converts the specified year to a four-digit year by using the TwoDigitYearMax property to determine the appropriate century.
Namespace: System.Globalization
Assembly: mscorlib (in mscorlib.dll)
public override int ToFourDigitYear(
int year
Type: System.Int32
A 2-digit year from 0 through 99, or a 4-digit Um Al Qura calendar year from 1318 through 1450.
Return Value
Type: System.Int32
If the year parameter is a 2-digit year, the return value is the corresponding 4-digit year. If the year parameter is a 4-digit year, the return value is the unchanged year parameter.
year is outside the range supported by this calendar.
The ToFourDigitYear method uses the year parameter, the TwoDigitYearMax property, and a year to calculate a 4-digit year. The century is determined by finding the sole occurrence of the 2-digit year parameter within that 100-year range. For example, if TwoDigitYearMax is set to 1429, the 100-year range is from 1330 through 1429. Therefore, a 2-digit value of 30 is interpreted as 1330, while a 2-digit value of 29 is interpreted as 1429.
If the TwoDigitYearMax property is the special value 99, the ToFourDigitYear method ignores the settings in the regional and language options in Control Panel and returns the year parameter unchanged.
The year parameter can be either a two-digit year or a four-digit year. If year is a two-digit year value (less than 100), the method converts year to a four-digit value according to the TwoDigitYearMax value representing the appropriate century. If year is a four-digit year value that is within the supported calendar range, the method returns year unchanged. If year is a four-digit value that is outside the supported calendar range, or if it is a negative value, the method throws an exception.
Supported in: 5, 4, 3
Silverlight for Windows Phone
Supported in: Windows Phone OS 7.1, Windows Phone OS 7.0
XNA Framework
Supported in: Xbox 360, Windows Phone OS 7.0
Did you find this helpful?
(1500 characters remaining)
Thank you for your feedback
Community Additions
© 2014 Microsoft. All rights reserved. |
global_01_local_0_shard_00000017_processed.jsonl/19104 | Export (0) Print
Expand All
7 out of 14 rated this helpful - Rate this topic
How to: Check Out a File or Project
Visual Studio 2005
When you want to modify a Visual SourceSafe file or project, you can check it out of the database using the Check Out command, which makes the file or files editable in your working folder. To use this command, you must have the Add/Rename/Delete project right.
Security noteSecurity Note
Some types of files, for example, executable files, Web page files, and script files, might contain viruses or scripts that can be harmful to your computer. If you need to open these kinds of files using any program except the default Visual SourceSafe editor, you must be certain that the file is from a trustworthy source.
When you check out an item Visual SourceSafe usually copies the item from the database to your working folder, unless you have specified to check out the local version. Using the Lock-Modify-Unlock work style, if anyone else attempts to check out the same item when you have it checked out, Visual SourceSafe generates a message stating that the item is already checked out. If your team is using the Copy-Modify-Merge work style, multiple checkouts of the same item are allowed. For more information, see Work Styles.
After you are finished modifying a file that you have checked out, you will want to save your changes to the database. The Check In command copies the modified document from your working folder into the database, making your changes accessible to other users in a new version of the file.
If you are ready to return a file to the database but have made no file changes, you can use the Undo Check Out command. This command returns the file to the way it was before you checked it out.
To check out a file or project
1. In Visual SourceSafe Explorer, select the project or file(s) that you want to modify. You can select multiple files using standard Windows methods.
2. On the Versions menu, click Check Out.
3. In the Check Out dialog box, make your settings for the Check Out operation.
4. Click OK when finished. Visual SourceSafe places the checked-out item(s) in your working folder, where you can modify them using the default editor program. If you want to change the editor, see How to: Change the Default Editor.
See Also
Did you find this helpful?
(1500 characters remaining)
Thank you for your feedback
Community Additions
© 2014 Microsoft. All rights reserved. |
global_01_local_0_shard_00000017_processed.jsonl/19114 | Thursday, January 17, 2013
New Avengers #2
Writer: Jonathan Hickman
Artist: Steve Epting
The Illuminaughty comes together once again, and what's on everyone's mind is whether the real threat is the chain reaction destroying the multiverse, or the fact that the gathering of heroes has decided to do something about it. Namor's arrogance in admitting his part in Wakanda's fall, and Black Panther's refusal to understand he was under the influence of the Phoenix, make of the private meeting between these two the highlight of this issue. Of the seven main characters, the one who seems most unlike himself is Reed Richards; he tends to be more like Cap, less willing to cross the line or justify the means to an end; however, he is suddenly ready to pull the stops knowing what's at stake. Steve Epting's artwork is usually more detailed than shown in this book; it's hard to tell whether the inks or the digital manipulation robbed it of its charm.
The Illuminati by Steve Epting and Frank D'Armata
No comments:
Post a Comment |
global_01_local_0_shard_00000017_processed.jsonl/19173 | Model Simulations of a Field Experiment on Cation Exchange-affected Multicomponent Solute Transport in a Sandy Aquifer
Publication: Research - peer-reviewJournal article – Annual report year: 1993
View graph of relations
A large-scale and long-term field experiment on cation exchange in a sandy aquifer has been modelled by a three-dimensional geochemical transport model. The geochemical model includes cation-exchange processes using a Gaines-Thomas expression, the closed carbonate system and the effects of ionic strength. Information on geology, hydrogeology and the transient conservative solute transport behaviour was obtained from a dispersion study in the same aquifer. The geochemical input parameters were carefully examined. CEC and selectivity coefficients were determined on the actual aquifer material by batch experiments and by the composition of the cations on the exchange complex. Potassium showed a non-ideal exchange behaviour with K&z.sbnd;Ca selectivity coefficients indicating dependency on equivalent fraction and K+ concentration in the aqueous phase. The model simulations over a distance of 35 m and a period of 250 days described accurately the observed attenuation of Na and the expelled amounts of Ca and Mg. Also, model predictions of plateau zones, formed by interaction with the background groundwater, in general agreed satisfactorily with the observations. Transport of K was simulated over a period of 800 days due to a substantially attenuation in the aquifer. The observed and the predicted breakthrough curves showed a reasonable accordance taking the duration of the experiment into account. However, some discrepancies were observed probably caused by the revealed non-ideal exchange behaviour of K+.
Original languageEnglish
JournalJournal of Contaminant Hydrology
Publication date1993
Journal number4
Download as:
Download as PDF
Select render style:
Download as HTML
Select render style:
Download as Word
Select render style:
ID: 6307682 |
global_01_local_0_shard_00000017_processed.jsonl/19183 | Take the 2-minute tour ×
If we assume space is flat the volume of Earth is:
$$ V = \frac{4 \pi R^3}{3} = \frac{4 \pi (6378.1 km)^3}{3} = 1.086 \times 10^{21} m^3 $$
The Einstein field equations, however, predict that the presence of matter warps space-time. As I understand it, the hyperbolic geometry means that the actual volume will be smaller than that predicted by the radius with the above equation, because the space in the center of the Earth (and around the Earth) is "dimpled". How much will these two volumes differ by?
There would be different ways to answer this question, depending on how you define "radius". There is one sense, where you could drop a measuring tape from the surface to the center of the Earth, and I think this would be the "proper" length. This is my preferred definition, but I think it would be the most complicated to answer. Otherwise, you could use the universal coordinates from someone far from Earth, which would give a smaller measure of radius. Another, more meaningful, way might be to take radius from the circumference as measured by us on Earth $R=C/(2 \pi)$, in which case the real volume would be greater than the naive $4 \pi R^3/3$ number. I welcome correction on any of these predictions.
I thought it could be done easily after discovering Flamm's paraboloid, but my attempts have so far failed. For reference, this shape describes the shape of space if the "extra" space were extended out into another dimension, $w$.
the space curvature
$$ w = 2 \sqrt{r_{s} \left( r - r_{s} \right)}. $$
Specific to Earth:
$$ r_s = \frac{2 GM}{c^2} = 8.868 \text{mm} $$
This shape, however, is only valid past $R$, and some kind of clever corrections would be needed to get around this fact. I originally wanted to ask what the added volume would be over the entire Schwarzschild metric compared to flat space (meaning from $r=R$ to $r=\infty$). It looks like that would be infinity, so I didn't ask that question.
So in short, how much does general relativity math change the volume by Earth by? Is it really tiny? Is it huge? This is exciting to know!
share|improve this question
Love the question! My first thought is that an accurate answer to this would require a determination of the metric inside the Earth, which is not Schwarzschild; it would have to be a non-vacuum solution to the Einstein equation. I'm not sure how much is known about such solutions. But since the curvature is so low it might (should?) be possible to make a perturbative estimate of the factor you're asking for without knowing the exact metric. – David Z Sep 13 '12 at 17:25
@DavidZaslavsky I don't know if you can easily turn this into the field equations, but the obvious Newtonian form for gravity in Earth is $\propto r$. Funny enough, due to the crazy distribution of Earth's matter, gravity actually increases as you go down into the crust. Obviously, I think we should seek the homogenous sphere answer. IMO, first thing I think someone should do is trash $w(r)$ and only use $dw/dr$, which I hope would be unaffected by the symmetrically distributed matter everywhere $>r$. But that's part of my problem, I don't know what rules still apply. – AlanSE Sep 13 '12 at 18:33
add comment
1 Answer
To start out, we can quickly simplify the equation for the surface. The $r_s$ metric is laughably small compared to Earth-scale dimension, so when we add those two it can be simply ignored.
$$ w(r) = 2\sqrt{ r_s (r+r_s) } \approx 2\sqrt{ r_s r}$$
We would like to apply this to the interior of the Earth but obviously we can't. GR only gives the curvature of space, the equation above is a constructed form of the surface that satisfies that curvature. So I'll work backwards here to get an equation for the curvature. That's not all though. If we're looking at some point in the interior of the Earth, only the matter below that point contributes to the gravitational field, and thus the curvature.
$$ \frac{dw}{dr} = \frac{\sqrt{r_s}}{2 \sqrt{r}} $$
$$ r_s = \frac{ 2 G M(r) }{ c^2 } $$
$$ M(r) = \rho \frac{4}{3} \pi r^3 $$
$$\frac{dw}{dr} = \sqrt{\frac{2G \pi \rho}{3 c^2} } r = \alpha r = (2.9 \times 10^{-12} 1/m ) r $$
Here, $\alpha$ comes out to a physical constant that is easy to calculate. This metric is for curvature. It is the rise to run for the surface in the extra dimension.
$$ ds = \sqrt{1+\left( \frac{dw}{dr} \right)^2 } dr \approx \left( 1 + \frac{1}{2} \left( \frac{dw}{dr} \right)^2 \right) dr = \left( 1 + \frac{\alpha^2}{2}r^2 \right) dr$$
The Volume of a normal sphere is:
$$ V = \int_0^R 4 \pi r^2 dr = \frac{4 \pi R^3 }{3}$$
In doing the correct integral with GR we integrate about $ds$. I should note, the radius is a difficult value to pin down, as I discussed in the question. I'll use $R'$ notation, but I'm really going to continue from this point with $R'=R$. If you disagree with this, this would be the point you'd want to pick the calcs up. My position for making these radii the same is to get the circumference the same. Keep in mind, the w-axis offset of $w(r)$ is arbitrary, so I can claim it intersects the r-axis at the surface of Earth. In this way, $R$ is a straight line in 4-dimension space (3 space plus the fictitious buckling dimension) from the surface to "under" the center of the Earth. The thing that is preserved with this method is the circumference and the surface area of Earth, which are the only values Earthlings have direct measurement of. I also made an illustration to convince you of this (I needed it myself).
The Earth is a bowl
$$ V' = \int_0^{R'} 4 \pi r^2 ds = \int_0^{R} 4 \pi r^2 \left( 1 + \frac{\alpha^2}{2}r^2 \right) dr $$
Subtract the normal volume to find the difference.
$$ \Delta V = V' -V = \int_0^R 4 \pi r^2 \frac{\alpha^2}{2}r^2 dr =\frac{4 \pi \alpha^2}{2} \int_0^R r^4 dr $$
$$ \Delta V = \frac{4 \pi \alpha^2 R^5}{10} = \frac{4 G \pi^2 \rho R^5}{15 c^2} = \frac{ G M \pi R^2}{5 c^2} = 113 km^3 $$
This comes out to 113.33 km^3, or 1000 Strategic Petroleum Reserves (I stand corrected on this point). This is a common size for lakes around the world.
Coincidentally, the same calculation for the sun yields about half the volume of the Earth.
share|improve this answer
The SPR contains 110,640,000 m^3 ~= 0.11 km^3. But there are lots of things that must remain hidden... :P – mmc Sep 14 '12 at 15:46
Your comment 'laughably small' made me look up the Schwarzschild Radius of the Earth. Turns out $r_s = 8.87*10^{-3} = 9mm$ – Ehryk Sep 14 '12 at 15:52
The formula for the integral should be $\int \epsilon_{abcd}\sqrt{|det(g)|}t^{a}dr^{a}d\theta^{b}d\phi^{c}$, where $t^{a}$ is the unit timelike normal. For most of the Schwarzschild-y coordinate systems, det(g) = -1, so this will come out to $\int \frac{4\pi r^{2}}{\sqrt{|g_{tt}|}}dr$ after you use the spherical symmetry to your advantage, which differs from the expression you use. – Jerry Schirmer Dec 13 '12 at 21:48
@JerrySchirmer I was returning to the basics of Einstein notation to get what that means in terms of $r$, but it's still beyond me. What is $g_{t,t}$ in that expression? – AlanSE Feb 3 at 2:27
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/19192 | Take the 2-minute tour ×
I've read a few comments on how unfinished tasks influences your performance because it makes you feel frustrated. I personally cancel a task/goal/project if I notice it can be done a better way or if it's not as important as I thought. However, I'm still concerned at which level these unfinished activities may compromise my performance in the near future.
Are there any scientific backup to support this theory?
share|improve this question
Possible question for skeptics.SE? – Brian Carlton Sep 6 '11 at 22:55
Feel free to join the discussion on Skeptics questions on Productivity: Keep or migrate? – Tom Wijsman Sep 8 '11 at 21:03
add comment
1 Answer
GTD's approach to the issue goes more or less like this: David Allen, putting the issue the other way round, stresses that any finished task liberates an amount of energy and grants a new perspective. GTD speaks of the things one has committed to do something about as 'open loops' that we are constantly closing.
Now, this important, closing any of those 'open loops' by canceling or renegotiating them is a perfectly valid option always at hand, and very often even necessary, due to changes in our priorities, situation, etc. Until I became a GTDer, I never realized that I felt compelled to finish everything that I started, as if not doing so would be a 'failure'... but circumstances change so fast that in fact it is a good ability to acquire. Like DA puts it, "Relax - refocus".
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/19193 | Take the 2-minute tour ×
I have been using focus booster app for pomodoro method. But I think i should invest in a physical timer, that I can set next to me while I work. I do have an IPod touch (with pomodoro apps) and could just get a kitchen egg timer, but I thought something dedicated and digital would be worth the investment.
• Set 2 countdown times ( 25 minutes & 5 )
• Alarm sound
Ideal Requirements:
• Ticking sound
• Big digital display
share|improve this question
I suspect the "ticking sound" would make this more stressful. – Paul Beckingham Aug 1 '11 at 15:42
The "ticking sound" is part of the by-the-book Pomodoro method, although I too find it too stressful to use. – J.T. Hurley Aug 1 '11 at 19:28
From personal experience, ticking can be helpful to focus, to help realize how the time is passing, and how much work is still to be done. But it really dependes on mood, a type of task, ... – Skarab Aug 2 '11 at 1:41
I've no philosophical quarrel with a ticking timer, but please do make sure to consider anyone else who has to work within earshot of it. – Belisama May 31 '12 at 19:27
add comment
3 Answers
up vote 4 down vote accepted
I purchased a timer at Bed Bath & Beyond that has three separate timers and an overall timer/clock. It's cheap ($15) and does the job. Each timer has a large digital display where I use the top with 4 Hours, the middle with 25 minutes and the bottom with 5 minutes.
Here's the link:
share|improve this answer
Nice, is it easy to use? – Adam Aug 2 '11 at 18:30
Quick and easy. It sits in front of my keyboard and below my two monitors. – Guy S Aug 2 '11 at 18:48
I bought one, it works well. Three timers is great, and they remember what they are counting down from. Takes a while to get used to the buttons, but once you do it works quite well. Also, good or Bad, it is surprisingly loud. – Adam Oct 11 '11 at 16:18
If it's too loud you can tape over the 'speaker hole'. – blizpasta May 1 '12 at 14:00
add comment
I think just the typical kitchen timer is the best investment you can get (for a physical device). Anything "fancier" would be too distracting.
share|improve this answer
add comment
This retro style kitchen timer looks nice and it's only 10$.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/19199 | Take the 2-minute tour ×
For websites that need to be highly scalable, such as social networks like facebook, what's the best way to design the website?
1. Should I have a web service which the site queries to get data that it needs?
2. Should the site query databases directly? (can be done using built in language constructs to fill tables automatically etc).
I would think the web service is the better design since it gives centralized data access and things like caching and the like become much easier to control, but what do others think?
share|improve this question
There also the question of what architecture to use (like MVC or the like). – Ivan Sep 15 '11 at 23:38
Without knowing more about what exactly you are going to launch, it is very difficulty to give the answer, but keep in mind "Cloud services", probably your application fits in a kind of SaaS app. (It is centralized). – B4NZ41 Sep 16 '11 at 0:04
generally speaking i would say, nothing particular in mind.. – Daniel Sep 16 '11 at 17:19
Build it in 'the cloud' and spend a lot of time reading HighScalability.com. – Evan Plaice Jun 5 '12 at 0:39
add comment
8 Answers
up vote 21 down vote accepted
Wow, this is a simple question, which a huge array of possible answers. The more explicit part of your question asks whether it is more scalable to interface with your database directly or through a web service. That answer is simple: query the database directly. Going through the web service adds a whole bunch of latency that is completely unnecessary for code operating behind a firewall (by and large). A web service for example requires some component to receive a request, deserialize it, query the DB, serialize a response and return it. So if your code is all operating behind a firewall, save yourself the trouble and just query the DB directly.
Making a web site scalable however goes way beyond the question you initially posed. So forgive me if I go off on a tangent here, but I thought it might be useful considering that you mentioned Facebook in particular.
I would recommend you read up on the work and tools built by Brad Fitzpatrick (founder of LiveJournal and now at Google). When I worked with him at Six Apart, here are some of the things I learned from him, and about LiveJournal's architecture that made it so scalable.
1. Use narrow database tables as opposed to wide ones. What was fascinating about this was learning what motivated this architecture, which was creating a system that was easily and quickly upgraded. If you use wide tables, or tables for which each field or property is a column in the table, when it comes time to upgrade the database schema, for example adding a new column, then the system will need to lock the table while the schema change is implemented. When operating at scale this would mean a simple change to the database schema could result in a large database outage. Which sucks obviously. A narrow table on the other hand simply stores each individual property associated with an object as a single row in the database. Therefore when you want to add a new column to the database all you need to do is INSERT records into a table, which is a non-locking operation. Ok, that is a little background, let's see how this model actually translates in working system like LiveJournal.
Let's say you want to load the last 10 journal entries on a person's blog, and let's say each journal entry has ten properties. In a classic wide table layout, each property would correlate to a column on a table. A user would then query the table once to fetch all of the data they need. The query would return 10 rows and each row would have all the data they need (e.g. SELECT * FROM entries ORDER BY date LIMIT 10). In a narrow table layout however things are bit different. In this example there are actually two tables: the first table (table A) stores simple criteria one would want to search by, e.g. the id of the entry, the id of the author, the date of the entry, etc. A second table (table B) then stores all of the properties associated with an entry. This second table has three columns: entry_id, key and value. For every row in table A, there would be 10 rows in table B (one row for each property). Therefore in order to fetch and display the last ten entries, you would need 11 queries. The first query gives you the list of entry IDs, and then the next ten queries would fetch the properties associated with each of the entries returned in the first query.
"Holy moly!" you say, "how on Earth can that be more scalable?!" Its totally counter-intuitive right? In the first scenario we just had one database query, but in the second "more scalable" solution we have 11 database queries. That makes no sense. The answer to that question relies entirely upon the next bullet.
2. Use memcache liberally. In case you were not aware, memcache is a distributed, stateless, low latency, network based caching system. It is used by Facebook, Google, Yahoo, and just about every popular and scalable web site on the planet. It was invented by Brad Fitzpatrick partially to help offset the database overhead inherent in a narrow table database design. Let's take a look at the same example as discussed in #1 above, but this time, let's introduce memcache.
Let's begin when a user first visits a page and nothing is in the cache. You begin by querying table A which returns the IDs of the 10 entries you want to display on the page. For each of those entries you then query the database to retrieve the properties associated with that entry, and then using those properties constitute an object that your code can interface with (e.g. an object). You then stash that object (or a serialized form of that object) in memcache.
The second time someone loads the same page, you begin the same way: by querying table A for the list of entry IDs you will display. For each entry you first go to memcache and say, "do you have entry #X in the cache?" If yes, then memcache returns the entry object to you. If not, then you need to query the database again to fetch its properties, constitute the object and stash it in memcache. Most of the time, the second time someone visits the same page there is only one database query, all other data is then pulled straight from memcache.
In practice, what ended up happening for most of LiveJournal is that most of the system's data, especially the less volatile data, was cached in memcache and the extra queries to the database needed to support the narrow table schema were all but completely offset.
This design made solving the problem associated with assembling a list of posts associated with all of your friends into a stream, or "wall" much, much easier.
3. Next, consider partitioning your database. The model discussed above surfaces yet another problem, and that is your narrow tables will tend to be very large/long. And the more rows those tables have the harder other administrative tasks become. To offset this, it might make sense to manage the size of your tables by partitioning the tables in someway, so that clusters of users are served by one database, and another cluster of users are served by a separate database. This distributes load on the database and keeps queries efficient.
4. Finally, you need awesome indexes. The speed of your queries will depend largely upon how well indexed your database's tables are. I won't spend too much time discussing what an index is, except to say that it is a lot like a giant card catalog system to make finding needles in a haystack more efficient. If you use mysql then I recommend turning on the slow query log to monitor for queries that take a long time to fulfill. When a query pops up on your radar (e.g. because it is slow), then figure out what index you need to add to the table to speed it up.
"Thank you for all of this great background, but holy crud, that is a lot of code I will have to write."
Not necessarily. Many libraries have been written that make interfacing with memcache really easy. Still other libraries have codified the entire process described above; Data::ObjectDriver in Perl is just such a library. As for other languages, you will need to do your own research.
I hope you found this answer helpful. What I have found more often than not is that the scalability of a system often comes down less and less to code, and more and more to a sound data storage and management strategy/technical design.
share|improve this answer
+1 I really love this Wow, this is a simple question, which a huge array of possible answers. – Pankaj Upadhyay Sep 16 '11 at 6:12
"The more explicit part of your question asks whether it is more scalable to interface with your database directly or through a web service. That answer is simple: query the database directly." Actually, not simple -- keep in mind that this strategy trades other qualities such as maintainability and modifiablity, and may make other design decisions more difficult (or easier). These things may not be important in this case, but in my experience answers are rarely this cut and dry. – Michael Sep 16 '11 at 14:07
Michael - very excellent point. I considered re-writing my answer at some point to mention that Twitter is a good example of a service that publishes and API that used by both external AND internal development teams. They live by the mantra "eat your own dog food." I admire them for that. It took them years however before they solved the scalability problem. Once they did though, they had a system that was both scalable, well documented, and had all of the positive qualities inherent in a web service oriented platform. – Byrne Reese Sep 16 '11 at 15:51
I completely disagree with 'query the database directly'. You mention partitioning the database for performance when it would be easier to implement a single-master multiple-slave architecture with an API interface. The benefit of decoupling the DB from the application is, the API layer can distribute requests however you want. The API is an abstraction that allows you to change the underlying implementation and/or reuse the data without breaking the application. – Evan Plaice Jun 4 '12 at 23:35
(cont) Serialization will always add overhead but only in the API layer which will most likely consist of multiple instances running simultaneously. If you're worried about transfer speeds across the wire, convert to JSON and it will most likely be compressed with gzip anyway. The easiest performance gains can be found when work is pushed from the server to the client. The important question to ask is, would you rather distribute requests within the application or at the server level? Which is easier to duplicate? – Evan Plaice Jun 4 '12 at 23:48
add comment
For websites that need to be highly scalable such as social networks like facebook, whats the best way to design the website?
I would think the...
Bad policy.
Actual measurement is required.
share|improve this answer
Quantitative Metrics FTW. – bhagyas Sep 16 '11 at 6:33
add comment
Scalablility is not a function of specific implementation strategies but rather of designing your application architecture so that the data access layer can evolve without massive refactoring and rewriting.
An important technique in building a system that scales is to understand your high-level data access requirements and build an interface contract around them. For example, you might have the requirement to get one user or to list the 50 photos posted most recently by any user.
You don't necessarily need a network channel between your application business logic and the data access logic; a method call indirection with one method per logical operation would do just fine to start.
Make these data access methods as simple as possible to start with. It's very hard to predict where the performance problems will lie until your application is serving real usage patterns and you are collecting data about where you have bottlenecks.
By having a well defined data access interface you can evolve your data access implementation without making broad changes to your entire application. You can also decide to switch to a web service architecture transparently to your business logic.
Many of the answers above give some great advice on how to proceed once you've discovered your performance bottlenecks, but if you apply these too early you can become hamstrung by the complexity of your code before you know if that complexity is even required.
share|improve this answer
add comment
Any additional step in connecting to the database, is just an overhead. For example, between UI -> Business Facade -> Business -> Data Access -> Database and UI -> Database, the second approach is faster. However, the more steps you remove, the less maintainable your system becomes and the more duplication appears. Imagine writing the necessary code to retrieve the list of friends in profile, home page, fiends management page, etc.
So, you should make a balance here between higher performance (which of course directly affects higher scalability) and better maintainability.
But, don't get limited to database connection topic when you think about creating highly-scalable web sites. Consider these items too:
1. Choosing the right platform (PHP is faster because of its scripting nature, but ASP.NET needs to compile the requested file on the fly to process it and serve something. Also node.js is claimed to be more scalable, because of its callback-based architecture)
2. Using RESTful architecture instead of web service model (SOA)
3. Using JSON for data transfer instead of XML (which results in less bytes to be transfered)
4. Following Yahoo's performance guidelines
5. Network and hardware topics like load balancing, or tier architecture
share|improve this answer
You cannot say that PHP is faster. Properly written ASP.NET applications can outperform PHP in many cases. naspinski.net/post/AspNet-vs-php--speed-comparison.aspx – Andrew Lewis Sep 16 '11 at 15:37
+1 Actually, your 'simple' solution woule be, UI -> Data Access -> Database. 2 REST is 'easy' because it's already built into most browsers. No need to recreate the command-response API wheel. 3 Not only is JSON smaller but it requires fewer steps to serialize-deserialize because you don't need to check for HTML entities. Good stuff. – Evan Plaice Jun 5 '12 at 0:29
add comment
It's accepted wisdom that web applications should be designed with three tiers by default - web (presentation), application and database layers. This division is due to different requirements at each of the layers - typically quality disk access/storage for the database, high CPU/Memory at the app layer, and high external bandwidth/memory/geographic dispersion at the web layer. The application/database layer are often merged into one until much later in the lifecycle of the application, as database machines often tend to be massive servers which can be built to handle the early application load, too.
The specific number of layers and appropriate architecture for your application, though, doesn't have to match this or any other model.
Plan to need to measure and monitor all of the activity in your system. Start from a two or three tier design, and focus on the portions of it which, as you're building it, look like will require the most amount of resources. Let the running application guide your design, at this level. The more information you gather, and the more accurate and detailed it is, the better decisions you can make about designing the application as it grows.
Choose a framework and architecture which will, later on, allow you to pivot/make required changes as quickly and painlessly as possible. Even if your data-access/storage/processing and application processing are being performed in the same executable, if they're properly factored, it won't be as difficult to split them out into two layers later on, for example.
share|improve this answer
add comment
There are two primary ways to scale, up and out.
Scaling up is replacing a machine with a more powerful one. Scaling out means adding another machine to do the work that existing machines are doing.
Any high traffic web site needs the ability to scale out. The software architecture needs to be done is such as way so that more machines can be added easily the busier the site gets.
Usually this means splitting the application into tiers so that one can plug and play more servers at each tier.
I would do option 1, have a service instead of doing it directly. You can only scale a monolithic application so far.
share|improve this answer
add comment
Develop a simple website and let it reach some traffic level. Along the lines you will learn how to make scalable websites.
Until you face the problem, you can't think of solution.
Trust me once you have the site rolling and facing requirement of scaling, you will definitely know how to do that. :-)
share|improve this answer
add comment
Develop your site using a technology platform which has completely integrated support for the cloud.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/19200 | Take the 2-minute tour ×
Like I plan to build up my portfolio with games. If I don't get a job in gaming or if frankly I don't want to, how would an employer who wants nothing to do with games see me as a potential future employee?
Would he see it as impressive and consider me? Or would he think it's nice but irrelevant and thus be somewhat detrimental?
share|improve this question
Very good question! To me personally it would say that you can code, but you like games so much that you put them in your portfolio, and therefore might not be reliable, and you the employee would rather make games but are settling for me, the non-gaming employer, and you the person have interests that are very different from me the person, and I would rather work together on a project or even have a lunch conversation with someone else. This is my straight answer and I am probably a minority. Most people would not care what your hobby is as long as you can code. Some could be your soul-mates. – Job Oct 3 '11 at 2:37
Its actually a poor question. The answer will depend on the individual employer in question - some will be impressed, some wont take him seriously. We here can give our personal thoughts on how we'd react, but we cant tell him how someone else will react. – GrandmasterB Oct 3 '11 at 3:20
Hi Russ, as GrandmasterB pointed out, we really can't predict what any individual employer would think is impressive: this is unfortunately just polling the audience. – user8 Oct 3 '11 at 9:20
add comment
closed as not constructive by Walter, Mark Trapp Oct 3 '11 at 9:18
4 Answers
The crucial thing you show is that you can ship a product.
• Implement what is needed.
• Get finished!
• Make it available to others.
• Being easy to use (which games need to be) is an extra plus.
This is something you need to be able to regardless what the software produced actually do.
share|improve this answer
add comment
Learn a bit about their business domain / tech domain, such as "consumer facing web apps", spend some time going over your skill-set and experience and determine how you can map your current experience to the skill-set they would be looking for. Already being a programmer, you are bound to be more adaptable than someone who is just starting out, its just a matter of having the right perspective to adapt your skills and selling your prospective employer on the fact that you area able to do this.
Somewhat related, at my current job, they hire senior dev's to work on an existing web application that uses JSP's, AJAX, JavaScript, etc who have little to know experience with web development (but know the server-side language well) because they are confident in their overall dev skills and adaptability, I think the same logic would apply to your situation.
share|improve this answer
add comment
I'd see it as valuable - admittedly I'm rather at the technical end of the "non game-related employer spectrum" but games are a great way of showing that you can create working products that utilise a wide variety of programming techniques. Big bonus points if the game was either 3D or networked / multiplayer.
Be careful that you balance the game experience with other things however - if I'm hiring someone to write business applications, I probably don't want someone who is only interested in writing games, so it would look suspicious if your CV made you out as a frustrated game developer.
Suggestions for some balance in your CV: Write or contribute to an open source tool/librray, create and run a non-trivial website, or get at least one completed "enterprise" style application in your portfolio to balance your game development interests.
share|improve this answer
add comment
When a company needs to recruit a new developer, it's often technical people that are going to do the technical interviews. And you can bet that having a good game portfolio will impress them: a lot of developer respect game creator.
Maybe don't put your game creation at the heart of your CV (except if you are targeting some high tech startup companies). The idea is to keep the video game 'show' to impress the tech people and to only mention this activity in the CV. So the business guys won't reject you and you will thrill the tech.
I have been part of a recruiting team and I have often given a very good feedback on game dev, because they looked very strong in computer skills.
share|improve this answer
add comment
|
global_01_local_0_shard_00000017_processed.jsonl/19201 | Take the 2-minute tour ×
Our interview process currently consists of several coding questions, technical questions and experiences at their current and previous jobs. Coding questions are typically a single method that does something (Think of it as fizzbuzz or reverse a string kind of question)
We are planning on introducing an additional step where we give them a business problem and ask them to draw a flowchart, activity, class or a sequence diagram.
We feel that our current interview process does not let us evaluate the candidate's thinking at a higher level (which is relevant for architect/senior level positions).
To give you some context, we are a mid size software company with around 30 developers in the team.
If you have this step in your interview process, how has it improved your interviewing veracity? If not, what else has helped you evaluate the candidates better from a technical perspective.
share|improve this question
I've edited your question to make it a bit less poll-ish. We'll see how it flies. – Robert Harvey Dec 14 '12 at 20:08
Are we talking like... UML Class Diagrams... to spec? Or boxes and lines? – Steve Evers Dec 14 '12 at 20:21
It's totally reasonable to ask a developer to model a problem. However unless your job req specifically requires UML, you should not expect every candidate to know that specific modeling technique. – Ed Hastings Dec 14 '12 at 20:59
At least you'll screen out the ones who have never heard of UML. – user16764 Dec 14 '12 at 21:45
Be careful - just because someone can/cannot draw a pretty picture in UML does not mean he can/cannot design. But if you find Fizz Buzz is a good enough test, I suppose it might work for you – mattnz Dec 15 '12 at 9:29
show 3 more comments
5 Answers
There's nothing wrong with testing for object-oriented design skills in general, but you need to realize that for a lot of companies, perhaps even most, UML was something they either rejected out of hand as not being a good fit for their company, or something they decided to do "from now on" then quietly abandoned after a few months.
If you honestly care about UML and the candidate doesn't know it, spend five minutes explaining it. It's not that hard to learn, and presumably learning new things is in the job description anyway.
share|improve this answer
We really don't care if they know UML or not. All we care about is evaluating their design skills and UML was one way we thought we could do, during an interview. Is there any other technique we could use? Thanks – DotnetDude Dec 15 '12 at 15:30
Just ask them to draw the inheritance and composition relationships on a diagram. If they happen to use UML, great. If not, you can evaluate their communication skills. – Karl Bielefeldt Dec 15 '12 at 16:22
add comment
We only include this step in the interview if the position we are interviewing is of a senior developer or one expected to perform this level of modeling. It sounds like you might be pre-optimizing your candidates for roles they may not be required to do.
Consider doing that evaluation for architect/senior as the current developers grow into that position over time or when the time comes that you need the architect role then consider testing for those skills during the interview.
All that being said, there is nothing wrong in seeing the level of skill in various data modeling techniques or in the developers ability to abstract solutions in an easy to understand manner on a white board. That is a good skill and normally during my coding interview step that comes out in the developer when they are solving the problem on the whiteboard. It just isn't a particular item we test specifically for.
share|improve this answer
I think even junior-level developers should be able to draw a simple class or sequence diagram. If they can't draw one, chances are they can't read one either, so how are you going to explain the architecture to them? And it isn't like basic UML is that difficult to learn, hopefully they're using it (if not teaching it) in schools these days. – TMN Dec 14 '12 at 20:23
I don't disagree @TMN I just don't specifically interview for it unless called for by position. Normally when doing the coding test at various points I encourage explaining the algorithm or design and it just naturally comes out. It hasn't been something that I added in specifically. – Akira71 Dec 14 '12 at 20:27
@Akira71 Can you give me an example of what the business problem is for which they draw the UML? Also, has this helped you screen for better senior level candidates? – DotnetDude Dec 15 '12 at 15:36
@DotnetDude Really it would require more space than here, but I often ask a design question like "Using any software methodology and modeling too you are comfortable with please design me a house." Normally the first thing I would expect here are what are the requirements and have them ask me questions back. A house for a giraffe that needs a birthing room is different than a house for a family of 3. After that I add interactions that they will have to model. It has helped. Note I don't ask them to use UML specifically. – Akira71 Dec 15 '12 at 15:46
add comment
One thing that I've found about UML: with the advent of agile and other development methodologies, not every developer will have been exposed to class modeling, sequence diagramming, etc.
One thing that everyone does understand at some level, however, is a flowchart (or "activity diagram") to some aspect. I've done this in a few interviews - asked someone to sketch out a solution by drawing a flowchart on the board given a certain use case - with some questions about approaches, etc. It can get to the level of 'higher thinking' relatively quickly without getting caught up in syntactical issues, etc.
share|improve this answer
I really think this sort of question also lends itself to finding out if they can communicate effectively or not. Forcing them to use a diagram helps you figure out their communication style as well. – CokoBWare Jan 7 '13 at 19:23
add comment
I have no issue with using any metric within the hiring process. What I have an issue with is companies not following up and grading their metrics. Do they work? Are the candidates with higher ratings proving to be better employees? If you do not measure, you might as well just paper a wall with resumes and toss a dart.
share|improve this answer
add comment
I would put less emphasis on a particular style of diagramming, and more on just making sure they could illustrate some type of logical organization and/or flow on a white board. So long as your developers can look at whatever's up there and it make sense to them and they find it informative, the specifics of "how" it's drawn up are largely irrelevant.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/19202 | Take the 2-minute tour ×
Recently I found a function to generate a random string of numbers and letters, and It was really compact and concise and I liked it alot. The problem Is I have no idea what it is doing, or how to modify it.
Please can someone just explain to me step by step what is going on here. I have tried looking up the functions alone but they don't seem to explain the things like 0x19A100 etc.
I would like to modify it to produce the same random string but only around 4 or 5 lettes long. I don't just want to take the first few letters though, I wan't the function to properly produce. I am trying to learn!
Here is the code:
function genRndStr()
{ return strtoupper(base_convert(mt_rand(0x19A100, 0x39AA3FF), 35, 36)); }
Any help greatly appreciated! Thank you.
share|improve this question
add comment
2 Answers
mt_rand generates random numbers between (min, max). The numbers 0x19A100, 0x39AA3FF are simply the min and max values in hexadecimal format:
0x19A100 = 1 679 616
0x39AA3FF = 60 466 175
share|improve this answer
so why not just write the numbers as they are? – Chud37 Jan 30 '13 at 11:24
And why use such large numbers? – Chud37 Jan 30 '13 at 11:25
@Chud37 Both your questions can only be answered by whoever wrote that piece of code, we can only speculate. – Yannis Rizos Jan 30 '13 at 11:27
I think is because base_convert take hexadecimal number as first attribute and large number is there to make generated string longer. ASCII characters are encoded in 3 digits decimal number, so every 3 numbers make one character in string. Bigger number == longer string. – tikend Jan 30 '13 at 11:28
@tikend base_convert can take any number in any base system as its first argument not just hexadecimals. That's kind the point of the function, converting numbers from one base (any base) to another. – Yannis Rizos Jan 30 '13 at 11:33
show 4 more comments
As tikend mentioned
mt_rand takes min and max values and generates a random value from that range.
Then that output from mt_rand is given to base_convert where the random value is assumed to be BASE 35 and it is converted to BASE 36 system.
The output of base_convert is then converted to uppercase.
share|improve this answer
Where can I learn about these base systems? I have never heard of base 36 before but it looks to be quite useful – Chud37 Jan 30 '13 at 11:28
I still don't see the need for such ridiculously large numbers though? – Chud37 Jan 30 '13 at 11:30
en.wikipedia.org/wiki/Base_36 – Vivekanand S V Jan 30 '13 at 11:31
@Chud37 It will be useful when u are calculating something like largest prime number, etc., where base 36 system will simplify the number which takes lot of space to show in BASE 10 system, etc – Vivekanand S V Jan 30 '13 at 11:33
@VivekanandSV - I would say that technically it would take up the same amount of memory, the reason for using say Base 16/36 is for the human element, instead of having to write 1,679,616 in binary which would be a 64-bit binary value it can be displayed in a much more compact way. Unless of course space means something other then memory in the context your using it in? – Ramhound Jan 30 '13 at 14:02
show 1 more comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/19203 | Take the 2-minute tour ×
I was recently talking with a recruiter who wants to put me at a company for a position of Developer in Test. He essentially made it sound like a position where you get to fiddle with new programming techniques and test bugs and improvements in software but where you don't need to worry about standard deadlines. You get to be very creative in your work.
But that description was still kinda vague to me. I have been a Web Developer for a number of years now, mostly working in PHP. So I wanted to know if others in the community know more about what these positions typically entail.
I know that this might not be a subject appropriate for this forum, but it was the best fit I could find among Stack Exchange and I would really appreciate it if this wasn't closed since there is really no where else here to ask about it.
I have tried Googling it, but there isn't a lot of information out there. So what exactly is a Developer in Test?
share|improve this question
I usually hear this called "skunkworks", if that helps. – Adrian Mar 25 '13 at 19:59
Are you sure he didnt mean 'Testing'? Never heard the term 'developer in test'. Could it be the recruiter just has his terminology wrong? Wouldnt be the first time. – GrandmasterB Mar 25 '13 at 20:04
I have never heard of it before either so I asked him several times to be sure. I will be speaking with the company about what it means to them soon. I just wanted a heads up as to what this even is. It sounded like it could be a lot of things that I have heard of combined. – pthurmond Mar 25 '13 at 20:13
I'm sure thats the title the recruiter has for the opening.. my suspicion is he just doesnt know enough to know that it might not be the correct job title. Or it could just be how the particular company refers to a particular title, because they're too lazy to add the ending -ing. – GrandmasterB Mar 25 '13 at 20:16
The three answers below pretty much summarize it. A developer in test is a QA engineer with development skills so he'll be expected to write automated tests more than doing manual testing. – Mike Brown Mar 25 '13 at 20:37
show 2 more comments
2 Answers
up vote 7 down vote accepted
I am a Software Development Engineer in Test, and have been at 2 separate companies. Currently I work for Microsoft.
Broadly speaking, Bryan Oakley is correct: you write software that tests software.
Beyond that, it depends on your level of experience, the scope of your responsibilities, and the type of software that the employer would be producing. An SDET position can include writing anything from the basics of feature level verification tests, to writing and maintaining test infrastructure to run those tests. It's also not uncommon to have SDETS that specialize in focused testing for certain types of requirements (testing security, performance/scale, usability, etc. are examples that immediately spring to mind).
The description that you received from the recruiter sounds like a poor selling technique.
• You're not fiddling; you have n days to get automated test coverage over x features deployed in y different supported environments in z languages.
• Oh, btw: those tests have to run fast enough for the devs to have a quick dev/test cycle because...
• No standard deadlines? You're in charge of the quality of the product and the release date was set by marketing 6 months ago. The dev team is 6 weeks late delivering a stable build to your test team, and the company isn't pushing that release date (again). Is the product or service stable enough to release to a couple million (billion?) people, on the same day?
• ...and if (when ) customers call in with problems... "Why (the hell) didn't you catch it first?"
I hope that gives you a bit of an example of what being an SDET is like.
share|improve this answer
Sounds like the kind of flak the developers AND QA people get at the same time where I am at now. But I really appreciate the much more clear description. – pthurmond Mar 25 '13 at 21:31
@pthurmond: It is often a really rewarding experience, especially if the company is serious about quality. It's not uncommon for an SDET to write more code than a dev, though that can depend on the phase of the project. Manual testing is never 100% gone from the process. – Steve Evers Mar 26 '13 at 14:43
Ok, so I spoke with the company and they described it as a brand new position that isn't fully defined. But essentially it is a QA person that writes code and automated tests designed to break the code of other developers. Sounds interesting. – pthurmond Mar 27 '13 at 4:23
add comment
"Developer in test" usually means that you are in the QA department or in a QA role, but the focus is on writing automated tests rather than on creating and running manual test cases. Thing of it as writing software to test software. It can be a particularly challenging career choice because it takes both programming skill and a good understanding of software testing.
However, different titles mean different things to different companies, so the definitive answer must come from the recruiter.
share|improve this answer
Hmm, most of the QA people that I know don't do a lick of development. So maybe that is where the distinction comes from. – pthurmond Mar 25 '13 at 20:19
@pthurmond: you are correct: a large number of people in QA do not do any software development. The role of developer in test, also referred to as software engineer in test, is a relatively new field. – Bryan Oakley Mar 25 '13 at 23:12
The people in QA where I work do develop. Mostly scripting that can run regression on releases. – Rig Mar 28 '13 at 3:49
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/19204 | Take the 2-minute tour ×
Always when the term RAII is used, people are actually talking about deconstruction instead of initialisation ... I think I have a basic understanding what it might mean but I'm not quite sure. Also: is C++ the only RAII language? What about Java or C#/.NET? or is C++/CLI not RAII anymore?
share|improve this question
add comment
2 Answers
up vote 19 down vote accepted
Resource Acquisition Is Initialization means that objects should look after themselves as a complete package and not expect other code to tell an instance "hey by the way, you're going to be cleaned up soon - please tidy up now." It does usually mean there is something meaningful in the destructor. It also means you write a class specifically to manage resources, knowing that under certain hard-to-predict circumstances, like exceptions being thrown, you can count on destructors executing.
Say you want to write some code where you're going to change the windows cursor to a wait (hourglass, donut-of-not-working, etc) cursor, do your stuff, and then change it back. And say also that "do your stuff" might throw an exception. The RAII way of doing that would be to make a class whose ctor set the cursor to wait, whose one "real" method did whatever it was you wanted done, and whose dtor set the cursor back. Resources (in this case the cursor state) are tied to the scope of an object. When you acquire the resource you initialize an object. You can count on the object getting destructed if exceptions are thrown, and that means you can count on getting to clean up the resource.
Using RAII well means you don't need finally. Of course, it relies on deterministic destruction, which you can't have in Java. You can get a sort of deterministic destruction in C# and VB.NET with using.
share|improve this answer
I think this is what you're getting at, but you might want to add that the reason why Java and C# don't support RAII is because of the garbage collector. In C++, a local object will be destroyed as soon as it goes out of scope. In Java/C# this isn't true. – Jason Baker Dec 24 '10 at 1:19
Expanding on Jasons point, the reason why Java and C# cannot guarantee timely destruction is because of the possibility of reference cycles, which means it is impossible to determine a safe order to run the destructors. Reference cycles can also happen in C++, but the implications are different - the programmer becomes responsible for determining the destruction order and doing explicit deletes. That responsibility is very often packaged up in some higher-level classes destructor - e.g. a container class is responsible for ensuring all contained items are destructed. "Ownership" is key. – Steve314 Dec 24 '10 at 5:51
@Jason that's what I meant by "deterministic destruction" - a C++ programmer knows when the destructor will run. – Kate Gregory Dec 24 '10 at 15:40
I know this is an old answer, but I'm still somewhat confused. I just learned of the term and some info says that acquisition should happen in the constructor. That doesn't really make sense to me and this answer seems to contradict it, but could you clarify? – Per Johansson Feb 4 '12 at 20:47
@PerJohansson Yes, you acquire in the ctor. And you release in the dtor. I was focusing on the second point, but they go together. Once the ctor is done you know you have a valid object. And you know that no matter what happens, the resource will be released at the right time. – Kate Gregory Feb 5 '12 at 16:16
add comment
RAII is partly about deciding when an object becomes responsible for its own cleanup - the rule being that the object becomes responsible if and when its constructor initialisation completes. The symmetry of initialisation and cleanup, constructor and destructor, means the two have close ties to each other.
One point of RAII is to ensure exception safety - that the application remains self-consistent when exceptions are thrown. At first sight this is trivial - when an exception causes a scope to exit, the local variables in that scope need to be destructed.
But what happens if the exception throw occurs within a constructor?
Well, the object hasn't been fully constructed, so cannot be safely destructed. The constructor should have try blocks as needed to ensure that any necessary cleanups are done before the exception is propogated. Once the exception propogates outside the scope where the object was constructed, there will be no destructor call, because the object wasn't constructed in the first place.
Consider in particular the constructors for member data inside the object being destructed. If one of those throws an exception, your main constructor code won't run at all - but some code that forms an implicit part of that constructor will have. Any members that have been successfully constructed will be automatically destructed. Any members that were not constructed (including the one that threw the exception) aren't.
So basically, RAII is a policy that ensures that anything that gets fully constructed will get destructed in a timely way, particularly in the presence of exception throws, and that any object either gets fully constructed or it isn't (there are no half-constructed objects that you can't know how to safely clean up). Resources that are allocated are also freed. And a lot of the work is automated, so the programmer doesn't have to worry too much about it.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/19205 | Take the 2-minute tour ×
Can I develop a BSD-licensed software that extends an Apache-licensed software (and vice-versa)?
share|improve this question
add comment
3 Answers
up vote 6 down vote accepted
The short answer is that if you use open source software in your project, you must satisfy all the requirements laid out in that license.
Neither BSD nor Apache 2.0 is a "viral" license, meaning AFAIK it makes no demands on the other source code you include it with. That also means that unlike GPL, you aren't releasing a "product" under a BSD or Apache license, but each file or section of code is licensed under the license that the author released it under.
So you could have a project where one module was BSD and one module was Apache, and I see no reason why you couldn't distribute that, as long as you were explicit about it. Note that IANAL.
Do you have the right to take Apache licensed code and re-license it as BSD? I highly doubt it. I believe Apache has a couple more restrictions on it than BSD. You'd have to keep the original copyright notice, of course, but I also believe you have to do a bit extra when releasing changes to it, and you couldn't (or at least shouldn't) remove those conditions by changing the license.
share|improve this answer
can I take Apache licensed code and release it under Apache (original) and BSD (dual licensed)? – NARKOZ Aug 20 '11 at 0:31
add comment
Short answer: Yes. The Apache Software License was based in large part on BSD and MIT style licenses. The common understanding while I was working on Apache code a while back was that you could incorporate BSD, MIT, and similar licensed libraries but you could not do the same for GPL based licenses.
If you have further questions, I highly recommend going directly to Apache:
They are a group of really nice guys, and they are pretty reasonable.
share|improve this answer
add comment
The best answer for this can be found in the apache third party license policy. This is the policy that all apache projects have to follow when using libs with other licenses. As you can see BSD is listed in Category A - Authorized licenses. So it should be no problem using this license. You can also find policies for other licenses here which is quite helpful. In fact I think the Apache policy may also be a good starting point for you own licensing policy if you work for a company.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/19206 | Take the 2-minute tour ×
I have very severe Dyslexia along with Dysnomia and Dysgraphia. I have known about it since I was a child. My reading and writing skills are pretty crippled, but I have learned to deal with it.
However, with today's IDEs, I find it very easy to stay focused and in the zone when I code. But when I write text (like this post) I find it much harder to stay focused.
In general, do dyslexics find it easier to read and write code compared to general reading and writing? What types of tricks and tools do dyslexics use to help them master programming better than normal reading and writing?
share|improve this question
I've tutored a number of dyslexic programmers and it has always surprised me that they find it easier to write/type when using an IDE as opposed to say a text doc. Naturally they found refactoring support really handy and maybe the IDE structure helps? I'm no expert in this field at all, but maybe it's also got to do with the fact that it's more or less short sharp discrete entities as opposed to full sentences and paragraphs? How do you find reading/writing code comments? – Martijn Verburg Oct 5 '10 at 15:43
I wrote up a short post on what my life has been like growing up Dyslexic. It sort of fits with this post. geekwithopinions.com/2013/05/15/… – Tony Jan 28 at 16:26
add comment
6 Answers
I have a severely dyslexic friend who reads quite well when she's reading through a sheet of yellow plastic. Or when she highlights the hell out of each page. For some reason, coloring the text somehow helps her brain grok the glyphs it's seeing.
So maybe syntax-highlighting and code coloring helps?
share|improve this answer
add comment
I've recently discovered that I'm dyslexic (at age 26) and am starting out in programming, studying a software engineering degree at university (after previously dropping out of a civil engineering degree at the same university in the final year when the course became assignment/report heavy - I now understand why).
I've been reading a lot (at my slow pace) as to what dyslexia is and why/how/where it affects us and I believe I can explain why we can still program well, despite how text heavy it is.
Dyslexic process their thoughts in pictures (well not pictures like on the wall, more like 3d video where you can move the camera and thus it's point of view around, I think of it as an internal world where I have the powers of 'god' (geez that sounds egotistical but I don't mean it that way) ie; I can instantly change everything about it with my thoughts.
Anyway, we can process words just fine, so long as we can firmly anchor/tether those words to an 'image', words like cat, hat, hit, run, jump, vertical, fluffy, hard etc are no problem at all, we can easily 'picture' what that is, the words we trip over are things like 'are' 'to' 'the' 'a' things where if someone asked you to draw that word (not write the word, actually draw a picture of it) you wouldn't know where to start.
In programming there are no such words, they all refer to either a process or an object, once we've learnt what the object or process is and our minds have formed a visualisation of it we're away. This site does a good job of explaining what I'm on about:
BTW if trying to read the bold text in the middle of the page BEFORE running the mouse over it makes you dizzy or feel weird and you have trouble getting threw it, you might well be dyslexic. I've gotta push forwards threw the sentences to their end before i can make any sense of what's being described, i feel dizzy when reading it too.
One thing I'm struggling with is explaining to my math lecturer that I need real examples and not general solutions to learn, when he talks about a n by n matrix I can't picture a thing, I need to work with a 3x3 or 4x4 and then I can transfer the learnings/processes to all sizes of matrices. He remains adamant that general solutions are the only way for what he calls 'true' learning sigh.
share|improve this answer
Would it be considered rude to someone with dyslexia if I edited your post to add paragraphs, capital letters, proper punctuation etc? – Ozz Mar 20 '13 at 11:35
Irrelevant side-note: the key feature of an nxn matrix isn't the value of n, but the fact the matrix is square. Does that help? – Useless Jan 30 at 13:59
add comment
I'm dyslexic and have been programming since 1972: I was surprised that it was impossible for me to learn python without an IDE. I didn't have difficulty using Visual Studio for .Net etc.
The problems with all print:
dyslexics find it extremely difficult to follow a long line of text all the way to the end and to easily follow the next line in sequence. Their eye movements while reading make it harder to scan the text smoothly (saccade) http://www.optomotorik.de/dyslex/index-e.htm
The errors that result from not being able to scan a page as accurately as most others do have to be noticed, understood, thought about in the context used, and finally corrected. Dyslexics are not aware of mis reading. Programming languages require syntax that is correct.
IDE's provide a visual structure that assists the dyslexic to read and code with fewer errors. A single window with sub windows for different tasks prevents the dyslexic coder from becoming lost on the page. It reduces visual stress, like having rails on a bridge does for drivers.
Similar symbols that appear to be the same to a dyslexic are difficult to find and fix. Automatic syntax highlighting saves a ton of time looking over the error codes.
Code completion is a workaround for typing in the wrong character, looking up functions is a great help.
I don't know how people can code in an environment that allows the eye to wander and does not mark wrong syntax. Having the right IDE allows a dyslexic to program without losing time. A familiar IDE is comfortable to work in, similar to using a tool that feels right in your hand.
Dyslexic programmers tend to think visually in design blocks of code function rather than in lines of characters. Each functional block has to be translated into code. The benefit of thinking in functional blocks rather than code is that one does not become confused by large systems because a visual of the system can be used to map the code.
share|improve this answer
Great response. Just out of curiousity, how did you find this post? I ask because I have got like 50-60 rep out of the blue for it in the past week. – Tony Jan 30 at 16:28
I came across this while searching for advice that would help me learn open source mapping. Everyone else seemed fine with large blocks of text in code and data that make me want to run away.After a couple of years learning about what normal people find easy to do when coding and why I find it hard, I was happy to find a place to share what I've learned. – user87105 Feb 5 at 6:16
add comment
I feel that coding provides a wider context than general reading/writing so it doesn't rely so heavily on text parsing alone. [Speaking mainly mechanics here, not the intellectual merits.] Another point is that it's possible to be dyslexic in one language and not in another. Significantly different languages are processed in different areas of the brain and dyslexia in Chinese is quite different physiologically. May sound silly but maybe some other people are "dyslexic" in programming.
My own dyslexia is rather mild but I still avoid variable names like "bdp". I also prefer fairly short chunks of code, even if the constructs are more complex or less "readable". Of course, I try to keep the code maintainable but I lean towards terse end of the spectrum.
Having an IDE for color-coding, auto-indent and other visual cues is of course wonderful (I use emacs). Best I having for writing normal text is spell-checking and the occasional use of outline mode.
share|improve this answer
I am under the same assumption that it has something to do with how/where the brain processes code vs normal text. – Tony Oct 5 '10 at 17:49
I'm glad to hear you avoid variable names like "bdp" :) – Frank Shearar Oct 5 '10 at 18:22
@Frank: I used to favor very short names for faster reading/typing but have thankfully learned to use more descriptive names ... except for maybe an "i" or "n" here or there. – igelkott Oct 5 '10 at 18:49
Oddly, I'm happier with single-character names - S for String, N for an Integer, I for a counter, L for a list - than with cryptic three-letter names. (But I say that without knowing the context of 'bdp' - maybe that's a well-understood acronym, for instance.) – Frank Shearar Oct 6 '10 at 7:10
@Frank "bdp" is my abbreviation for "benzodiazapine" (though "bzd" is more common). So, nothing special, just the target of the medicinal chemistry project I was working on. – igelkott Oct 6 '10 at 18:52
add comment
When I was younger I had dyslexia (or at least that is what they said - I essentially couldn't spell worth anything and typically wrote letters or words backwards, although I was able to read and everything else just fine - or so I thought). I have always enjoyed working with computers. We had a Commodore Vic20 when I was in grade school and I programmed on it all the time. My mom once commented that she would have thought that my dyslexia would make it more difficult for me to work on the computer, but the opposite seemed to be the case. I could spell and read much pretty much without incident when working with the computer.
I don't recall it being a matter of interest (i.e. that I was able to work with the computer because it was interesting.) I worked really hard to be able to do well with spelling and writing at other times too, but I just never really had any trouble working with the computer.
Of course at the time I did not work with an IDE or anything on the Commodore
share|improve this answer
add comment
I can see many benefits to programming for dyslexia over other careers.
The rules of programming have fewer exceptions than spelling. You can rely on repeated patterns; prose is just all over the place.
Intellisense has to be a huge benefit. Nice to know a variable you just declared has not been used when you 'think' you just did. Other than spell & some grammar check, writing applications can provide the checks a compiler will.
Short-term memory is an issuer for me. Doing almost everything on a computer comes pretty frickin' handy.
Motivation is a factor as well. It's easier for me to read about subjects I enjoy; that doesn't make me lazy which many students get labeled as if a learning problem has not been identified.
share|improve this answer
add comment
protected by maple_shaft Mar 20 '13 at 12:41
|
global_01_local_0_shard_00000017_processed.jsonl/19207 | 108 reputation
bio website http:www.digitalinfamy.com
location United Kingdom
age 33
visits member for 2 years, 7 months
seen Jan 31 at 13:29
Web Developer of web thingys based in the North East of the UK. Interesting areas are asp.net mvc c#, TDD, DDD,BDD, STD, UPVC and the likes.. Love development but little nieve and under-experienced so please be nice
This user has not answered any questions
9 Votes Cast
all time by type
9 up 2 question
0 down 7 answer |
global_01_local_0_shard_00000017_processed.jsonl/19208 | 101 reputation
bio website
location Boston, MA
visits member for 2 years, 4 months
seen May 30 '13 at 12:45
30yo professional software developer, experienced with many things. Seeking passionate individuals for 1-on-1 peer programming, stimulating group discussion and long walks on the beach.
This user has not answered any questions
This user has not asked any questions
This user has not participated in any tags
Stack Overflow 1,505 rep 713
Meta Stack Overflow 101 rep 1
Bicycles 101 rep 3
Programmers 101 rep 1
1 Vote Cast
all time by type
1 up 1 question
0 down 0 answer |
global_01_local_0_shard_00000017_processed.jsonl/19209 | 1 reputation
bio website decisionmakingwheel.com
visits member for 1 year, 10 months
seen Jul 15 '13 at 14:48
With over 6 years of commercial Java software development experience I worked in several projects creating rich client and desktop applications, their GUIs and business logic using Java Swing and Core. Also I designed several websites; performed usability, functional and automated testing of websites and desktop apps.
I like writing effective Java code; have comprehension in OO patterns and software best practices including information hiding, separation of concerns, reuse, and etc. Own quality oriented mindset and good taste. I have experience in launching 2 software products, including my own micro ISV, a Java desktop shareware application, that you may download at cnet.com.
Please see my profile at http://javaswingdeveloper.com/ http://javaswingdeveloper.elance.com http://www.odesk.com/users/~~4760e9fbcbf0812e
My new app, the Decision Making Wheel is the best universal decision maker app to make decisions when you don’t want to, or when it is hard to choose from similar options. Get this nice and free decision maker app for your daily decisions, random decision making or just for fun. Don't let your head spin - leave the spinning to the decision wheel app!
Install now for free at http://decisionmakingwheel.com
This user has not answered any questions
This user has no recent positive reputation changes
This user has not asked any questions
This user has not participated in any tags
0 Votes Cast
This user has not cast any votes |
global_01_local_0_shard_00000017_processed.jsonl/19210 | 99 reputation
bio website akintu.net
location Utah
age 27
visits member for 1 year, 8 months
seen Feb 26 at 21:52
I am a Computer Scientist studying at the University of Utah. I am experienced with (but am by no means a master of): Python, Java, C#, Assembly, Racket, Javascript and SQL. However, I am familiar with many more languages and technologies than those.
Interests within CS include Functional Programming, Machine Learning, and Cryptography.
Contact: [email protected]
Stack Exchange Career Page: http://careers.stackoverflow.com/devinjekins |
global_01_local_0_shard_00000017_processed.jsonl/19211 | Meet Mr. Credibility
The Democrats, as we know, have many political problems: their uncertainty, their inability to trade jabs with the Republicans, their likely minority status in Congress for some time to come. Checked out a map yet of which senators are up in 2004? Let's just say that if you're not sure you can take much more depressing news, don't. But oddly enough, they don't have that many policy problems. Majorities in polls repeatedly are closer to the Democrats on abortion rights, environmental protection and a tendency toward deficit hawkishness rather than tax cuts.
But there is one issue, or set of issues, where polls show Democrats having all the credibility of Cardinal Law on sex: On national security and defense, the Republican advantage is enormous. This perception goes back 30 years or so. In many ways, it's no longer as true now as it was then. Bill Clinton helped liberate Kosovo and, however belatedly, Bosnia. The candidate who received the most votes in the 2000 presidential election was the one who enlisted in the Army and insisted on being sent to Vietnam (Al Gore), not the one who ducked and covered with a reportedly incomplete term of service in the Air National Guard (George W. Bush).
But the hardwired image of Republicans being stronger on national security persists in the public mind. Bush's midterm election rhetoric about Democrats being soft on homeland security may not have enjoyed the benefit of actually being true, but it sounded all too believable to a country where fear is still driving the body politic. In a post-September 11 world, where the threats to America are real and serious, it's of critical importance that Democrats establish some credibility in this realm.
The rumored presidential bid of retired Gen. Wesley Clark, bandied about mostly in inside-dope items in the press over the last three months, may or may not materialize. The considered judgments of rumor-mill initiates run the gamut from "slim chance" to "almost certainly." For his own part, Clark keeps it vague. "A lot of people have come to me and talked about the need for leadership," he said in an interview, "but I haven't made any plans. I haven't raised money or formed any committees." Whether Clark runs or not -- and if he doesn't, he seems like a vice-presidential candidate sent from God, which may be the real angle he's playing -- his mere presence on the national stage, his coming out of the closet, as it were, as a functional Democrat who opposes the administration's war aims and who just happens to have been a NATO commander, could instantly make the Democratic Party more plausible on foreign affairs than it's been at any time since a general named George Catlett Marshall was containing communism and rebuilding Europe with a president named Harry Truman. "I think it's safe to say," says former Clinton Chief of Staff John Podesta, "that the supreme allied commander of NATO has a certain credibility on military affairs that is not usually associated with members of the Democratic Party."
But still none of these facts, salient as they may be to Democrats, gets to the heart of Clarkism, which is this: As viewers of his regular appearances on CNN know, Clark has emerged as a ferocious critic of the Bush administration's national-security policy. To Clark, the administration has not made even a version of a case against Iraq. Iran and North Korea are obviously bigger and more immediate threats. And the administration's cowboy unilateralism, he says, goes against everything the United States is supposed to represent to the world. "After 9-11, who are we?" he asked me. "Are we going to be an angry, beleaguered giant swatting out at selected nations with our sword of vengeance? Are we going to be Daddy Warbucks handing out money? What are we?"
He has a rhetorical answer, if not quite a fully fleshed-out policy, which we'll get to. But even at this early, uncertain juncture, it can safely be said that the prospect of a Wesley Clark presidential candidacy is tantalizing. There isn't much doubt that he's giving it some serious thought. Just before Thanksgiving, he had a lunch meeting with a group of New York Democrats led by investment adviser Alan J. Patricof, who headed Hillary Clinton's financial campaign in 2000. (Time magazine got wind of this, and its item started the Clark boomlet.) The group included prominent New York Democrats who customarily receive Democratic presidential candidates who hit town; this same klatch, or a near version of it, auditioned Bill Clinton in 1991. "Oh, my impression was that he's very seriously considering it," one member told me. "He said he's not ready to announce yet because he doesn't want to leave CNN" where his criticisms of Bush receive their maximum exposure. "But he sure seemed serious to me."
Other Democratic insiders, several in the Clinton circle, agreed. I spoke with one about Clark's mid-January lunch with Democratic National Committee Chairman Terry McAuliffe, which happened at Clark's behest. This insider spoke with McAuliffe about the Clark lunch and said, "Terry's view is that he's very seriously considering it. Now there's serious, and there's serious, so who knows, but Terry thought it was pretty real."
Of course, a few conversations may be only that, and it's obviously true that rumors can get converted into fact or elevated beyond their reality in no time. There were reports that Clark had met with the Democratic Leadership Council's (DLC) Al From; the DLC's Karin Kullman says that Clark has spoken at council forums on military policy, not talked political turkey with From. Also, according to press reports, he had talks with former Gore campaign aide Donna Brazile, but Clark says the conversation was the result of an accidental meeting in a green room at CNN. ("But I've known Donna for many years," he says, "and she's always been one who has told me, 'You should run for something one day.'")
So it's far from clear that there's a there there. And Clark's not saying -- yet. But another source indicates that Clark may be planning an announcement around April. When a noncandidate says something like, "I've always hoped I would someday be able to go into elective office," which he said to me, it's probably a signal of something.
Clark had several chats last year with Arkansas Democratic Party Chairman Ron Oliver about the possibility of taking on Huckabee for the governorship. "It was 2001 when his name started popping up," says Michael Cook, the party's executive director in Arkansas. "He and Ron had a series of discussions." Clark took a pass, obviously; but equally obviously, he had caught the bug.
If Clark runs, his clear raison d'être would be to articulate a more tenable opposition to Cheneyism than the other Democrats can. "The issue to me has been that we have known for a long time that Osama bin Laden is a problem," he says. "The difficulty was always to mobilize the American people and bring enough comprehensive pressure to bear to do something against terrorism. Well, 9-11 did that. But the administration has squandered a lot of the international goodwill that came our way after the attacks and is now squandering our domestic energy by forcing us into Iraq."
For which, he argues, there is no honest military or diplomatic rationale. "The Iranians are further along with regard to nuclear weapons," he says. "The North Koreans are much further along. Iraq is third. We went after this in a reverse order. ... They chose Iraq as a problem before they explained what the problem was."
The substance of Clark's critique of the Bush foreign policy hinges chiefly on two assertions. First, that the administration has offered competing -- sometimes, in Clark's view, dodgy -- rationales for an invasion of Iraq and therefore has not adequately or properly unified the American public behind the idea. He gives the administration points for having done this well with regard to al-Qaeda, which he regards as the more important war to be waging right now. But on Iraq, he says, a rationale for attacking now has "never been clearly and decisively articulated."
Second, Clark feels that if the administration's efforts with regard to U.S. public opinion have been wanting, its attempts to change world opinion have ranged from halfhearted to downright hostile. He disdains the administration's unilateralist bent both as a moral matter -- preemptive war, he says, is something the United States could always do if it needed to, "but we never made it a principle" -- and on the strategic grounds that antagonizing old allies will come back to bite us one day.
"Terrorism is a multilateral problem," Clark says. "You cannot defeat it in one nation. You need international police work, teamwork, international harmonization of laws against terror, a whole series of things. You act unilaterally, you lose the commitment of your allies to make it work. That's the one thing that will kill you in the war on terrorism."
That should ring true to voters coming from a four-star general whose experience has taken him as high up the military and diplomatic chains of command as a person can go. But he will also need to put more meat on the bones of a real alternative vision. If Clark were president, how would he handle Saddam Hussein? He would do what exactly in North Korea? How would he bring about that harmonization of laws? He speaks beautifully of basing the United States' role in the world on an articulation of the nation's better principles: "The United States is a 225-year rolling revolution. ... We are the embodiment of the Enlightenment. If we're true to those principles, then it's a foreign policy of generosity, humility, engagement and of course force where it is needed. But as a last resort." As a candidate, though, he will be asked to cast himself into specific situations, involving not a few nasty fellows whose use for our principles is scant indeed.
Two more things. First, Clark would have to be a pol. Can he connect with people? The man I spoke with was intelligent, direct and forceful. But qualities such as neighborly, empathetic and humble tend to work better in presidential campaigns. And does he have any idea what campaigns do? "I'm sure he knows that Iowa is a caucus state," says a Democratic operative. "But does he know what that means in terms of the organization required, which is immense? He's been a commander, so he's used to giving orders and having people follow them. It's not quite that way in political campaigns."
Clark may benefit, interestingly, from some of the political infrastructure and know-how left behind in his home state by a certain other famous Arkansan. "Bill Clinton taught Arkansas how to win," says Skip Rutherford, who heads the William J. Clinton Presidential Foundation. "We weren't exactly a presidential hotbed. Clinton changed that. Now a lot of Arkansans know what a presidential campaign is like. They've seen the demands and the requirements. There are a whole lot of people here who, if he ran, would immediately hop on board."
The second thing Clark would have to do if he runs: get votes. Let's assume that there are no sex or tax scandals, or what have you. Even if he vets clean, will Democratic primary voters give him backing? Surely many will agree with his foreign-policy views, but Democratic primary voters are used to voting on domestic issues, and they aren't used to voting for generals, even Dylan-quoting ones. And if Clark runs and fares poorly, if Democratic voters repudiate Mr. Cred., if, for example, they actually cast more votes for the Rev. Al Sharpton ... well, you can just imagine how much fun FOX News will have with that.
A party operative avers that Clark will need to declare himself by April or so (and there's the little business of his needing to raise about $10 million this year). So we'll see what we see. But whether as candidate, big-name veepstakes contender or even just prime-time convention speaker without portfolio, Wesley Clark can represent positive change for the Democratic Party. Are a general and the Democratic Party machinery, as currently constituted, a good match? That's the question. The answer, you might say, is blowin' in the wind.
You need to be logged in to comment. |
global_01_local_0_shard_00000017_processed.jsonl/19216 | Using your phone's internet browser
go to:
Click and drag this link to
the Home icon in your browser.
Maine Browser ka Cache Clear kiya , usme aapki photo kaha se aayi
Tags: browser, se aayi, photo kaha
Asked by Gernal Singh, 12 Dec '12 04:00 pm
Invite a friend |
Save |
Earn 10 points for answering
Answer this question Earn 10 points for answering
4000 characters remaining
Keep me signed inNew User? Sign up
Answers (1)
Is Virus Ko Remove Nahi kar paaoge aap ji.
Answered by Dhuni, 12 Dec '12 04:03 pm
Report abuse
Not Useful
Your vote on this answer has already been received
Ask a Question
Get answers from the community
600 characters remaining |
global_01_local_0_shard_00000017_processed.jsonl/19217 | Using your phone's internet browser
go to:
Click and drag this link to
the Home icon in your browser.
Should the task of inventing a time machine,be given to lallu yadav ?
Tags: careers, science, entertainment
Asked by samiran panda, 01 Oct '12 01:32 pm
Invite a friend |
Save |
Earn 10 points for answering
Answer this question Earn 10 points for answering
4000 characters remaining
Keep me signed inNew User? Sign up
Answers (1)
Yes and he can refer notes prepared by Raj narain ex minister
Answered by sigma, 01 Oct '12 01:34 pm
Report abuse
Not Useful
Your vote on this answer has already been received
Ask a Question
Get answers from the community
600 characters remaining |
global_01_local_0_shard_00000017_processed.jsonl/19221 | Murs – The Lick Lyrics
Produced By: 9th Wonder
You pyonged “Murs – The Lick”
Save Note No Thanks
Caution: You are now annotating this song as
[Verse One] [MURS]
I got my house shoes on and my white t-shirt
My basketball shorts, I'm about to get some Squirt
I brought my own cup with a little ice in it
Cause I might mix it up and get nice in a minute
They call me ghetto but I don't give a damn
Cause I'm standin' on the corner with my cup in my hand
Other hand down the front of my pants, scratchin' my balls
They sag a little bit so you might see my drawers
I'm on pause
Man, I'm in my chill mode
Just got paid and I got a little bill fold
I'm feelin' good man, you can't tell me nothin'
Then the homie Verbs roll up, yo what's up man?
Nothin' homie with the spokes I'm on move
Tryin' to get some jerky and some coconut juice
I just cranked a couple miles and the sweat is droppin' down
I was set around your town
To Supowida and Pico made a right by some hills
And now I'm at the store with MURS, we fienda chill
But now a nigga awfully thirsty, that's for reals
So Verbs spins till your thirst quencher on the grill
But I ain't got no skrill
But homie can you spot like we workin' on the bitches
Make sure you get some Optimos and Swishers
I'm about to go the distance with this eye
And by the way my nigga can you get a can of Sprite?
[Hook] [MURS & Verbs]
[M] What you want from the store man?
Let a nigga know
But hurry up fool cause I'm ready to go
[V] I want a Snicker bar and a Dentyne Ice
[M] Well if you kick your boy down with some ends that'd be nice
[V] What you want from the store man?
Let a nigga know
But you need to hurry up cause I'm ready to go
[M]I want some chips I want some drink
[V]What you think this is?
You better your ass up and come and roll with the kid
[Verse Two] [Verbs]
Let me tell you how this ish went down
Eatin' bags of chips and I'm in Mid-town
Meetin' pretty ass broads that I met in Santa Mon-
Ica, oh yeah and MURS
And we ran out of the car
I have solutions
Let's walk to the store
She said it would be faster if we up and use my car
Aye aye aye aye, that would be a waste of gas and
These siddity girls actin' like they got classes
Two little group-ies
Actin' hella boushe
All they do is listen to Kid Cudi and Lupe
Hold up
I ain't even tryin' to clown but
What I'm tryin' to say is they from the other side of town
What's up man?
These chicks ain't never been to the hood?
They look a little shook like they think they too good
Like my neighborhood store ain't up to they standards
You can get a white tee or a new bandanna
A bag of Gummy Bears and some new tube socks
A pack of Trojan large and a fruit juice box
Some new 2Pac and some bootleg DVDs
Dominos, Doritos and some dirty magazines
What more do you need?
A nickel bag of weed?
My boy got them sacks but they got a couple seeds
And if that ain't good enough, you just ain't hood enough
Get your ass on before my home girls fuck you up
[Hook] [MURS & Verbs]
[V] What you want from the store man?
Let a nigga know
But you need to hurry up cause I'm ready to go
[M] I want some cupcakes
[V] Bring me up somethin' fool
You still owe me from the last time that shit ain't cool
[M] What you want from the store man?
Let a nigga know
But you need to hurry up cause I'm ready to go
[V] I want an Arizona (What?!)
Homie, the mango kind
[M] That's cool but I'm gonna have to keep the change this time
Edit song description to add:
|
global_01_local_0_shard_00000017_processed.jsonl/19239 | Smart Hub search
Smart Hub search
Smart Hub search bills itself as a cross-platform search engine for content, which is a great idea since it can be a pain trying to remember which content is available where. Unfortunately, we found that search only worked with Vudu, YouTube, and Facebook, leaving out major services like Netflix, Hulu Plus, and CinemaNow. We doubt we'd use the feature at all if we owned a Samsung Blu-ray player.
April 12, 2011 1:56 PM PDT
Photo by: Matthew Moskovciak/CNET
| Caption by: Matthew Moskovciak
Member Comments
Add Your Comment
Conversation powered by Livefyre |
global_01_local_0_shard_00000017_processed.jsonl/19242 | How to enable tethering on the LG Optimus V
Virgin Mobile's no-contract phone runs Android 2.2, but tethering isn't enabled. Here's a quick and easy way to remedy that.
Use the free Quick Settings app to enable the mobile-hot-spot feature on your LG Optimus V.
Use the free Quick Settings app to enable the mobile-hotspot feature on your LG Optimus V.
(Credit: Screenshot by Rick Broida)
Virgin Mobile's LG Optimus V is selling like hotcakes right now (it's out of stock just about everywhere), and with good reason: It runs Android 2.2, requires no contract, and costs as little as $25 per month--a price that includes anytime voice minutes and unlimited data.
The only drawback? Despite the presence of Android 2.2, which offers native support for tethering (i.e., using the phone as a mobile Wi-Fi hot spot), the Optimus V comes with the feature disabled.
Thankfully, there's a very easy workaround, one that requires no rooting and no expense. All you need is a free app called Quick Settings, which is available from Android Market.
When you run the app, you'll see a list of settings: brightness, Ringer, Volume control, Wi-Fi, and so on. Here's how to add Wi-Fi hot spot to that list:
1. Press your phone's Menu button, then tap Customize.
2. Scroll down under Hidden Settings until you see Wi-Fi hot spot, then tap and drag it up to the Visible Settings section.
3. Tap the Back button to return to the main screen.
4. Now you'll see the Wi-Fi hot spot option. Tap the Off button to turn it on.
That's all there is to it! Now your Optimus V is a mobile hot spot. When you're done, just tap On to toggle the feature off again. (You'll need to manually turn on Wi-Fi again as well.) I've tested this several times, and it works beautifully.
The caveat, of course, is that because Virgin Mobile doesn't support tethering, there's the potential for blowback (though I think it's very unlikely). Thus, use this tip at your own risk.
Now if we could just do something about the Optimus V's lack of Flash support...
Ways to view March Madness
Play Video
Member Comments |
global_01_local_0_shard_00000017_processed.jsonl/19248 | It's about fucking time. It won't be without flaw, but it's a lot better than the joke they have had for years and years and years. Eventually I think it should (and hopefully will) expand to 6 or 8 teams, but let's be honest, the top 4 teams in the old BCS rankings were usually the best four teams in the country. Giving those 4 teams a shot at winning a playoff is a great thing, IMO. |
global_01_local_0_shard_00000017_processed.jsonl/19250 | Saint John Grande
[Saint John Grande]
Also known as
• John the Great Sinner
• Juan Grande Pecador
• Juan Grande Román
• Juan Grande
• Juan Pecador
Raised in a solidly Christian family, John was a choir boy from age 7 to 12. He was apprenticed in the linen business in Seville, Spain from age 15, and then returned to Carmona, Spain to start his own shop. At age 19 he left business behind, gave away his possessions, and became a hermit at Marcena. Referred to himself not just as Juan Grande, his given name, but Juan Grande Pecador (John the Great Sinner).
Worked in prisons and hospitals in Jerez de la Frontera, Spain. With the aid of a wealthy couple in the area, he founded and managed the Hospital de Nuestra Señora de la Candelaria (Our Lady of Candlemas) at Jerez. He affiliated the place with the Order of Hospitallers, handing it over to Saint John of God, and joining the Order himself at Granada, Spain in 1574. During an outbreak of the plague in 1574, he organized a group to help tend to victims; they were very successful. At the request of the Archbishop of Seville, Spain he completely reformed the Church‘s health care system in the diocese, improving efficiency and services.
John was blessed with mystical gifts, and predicted the fall of the Spanish Armada. He ran afoul of many in authority, chastising officials and those who ran charities when they lived well, and those they were supposed to serve continued to suffer. Arranged anonymous dowries for poor girls so they could marry and avoid lives on the street. He fed and clothed prisoners and refugees, and died tending to plague victims.
Additional Information |
global_01_local_0_shard_00000017_processed.jsonl/19256 | Gisle Aas > Font-AFM > Font::AFM
Annotate this POD
Related Modules
Open 1
View/Report Bugs
Module Version: 1.20 Source
Font::AFM - Interface to Adobe Font Metrics files
use Font::AFM;
$h = new Font::AFM "Helvetica";
$copyright = $h->Notice;
$w = $h->Wx->{"aring"};
$w = $h->stringwidth("Gisle", 10);
$h->dump; # for debugging
This module implements the Font::AFM class. Objects of this class are initialised from an AFM (Adobe Font Metrics) file and allow you to obtain information about the font and the metrics of the various glyphs in the font.
All measurements in AFM files are given in terms of units equal to 1/1000 of the scale factor of the font being used. To compute actual sizes in a document, these amounts should be multiplied by (scale factor of font)/1000.
The following methods are available:
$afm = Font::AFM->new($fontname)
Object constructor. Takes the name of the font as argument. Croaks if the font can not be found.
Returns a 256-element array, where each element contains the width of the corresponding character in the iso-8859-1 character set.
$afm->stringwidth($string, [$fontsize])
Returns the width of the argument string. The string is assumed to be encoded in the iso-8859-1 character set. A second argument can be used to scale the width according to the font size.
The name of the font as presented to the PostScript language findfont operator, for instance "Times-Roman".
Unique, human-readable name for an individual font, for instance "Times Roman".
Human-readable name for a group of fonts that are stylistic variants of a single design. All fonts that are members of such a group should have exactly the same FamilyName. Example of a family name is "Times".
Human-readable name for the weight, or "boldness", attribute of a font. Examples are Roman, Bold, Light.
Angle in degrees counterclockwise from the vertical of the dominant vertical strokes of the font.
If true, the font is a fixed-pitch (monospaced) font.
A string of four numbers giving the lower-left x, lower-left y, upper-right x, and upper-right y of the font bounding box. The font bounding box is the smallest rectangle enclosing the shape that would result if all the characters of the font were placed with their origins coincident, and then painted.
Recommended distance from the baseline for positioning underline strokes. This number is the y coordinate of the center of the stroke.
Recommended stroke width for underlining.
Version number of the font.
Trademark or copyright notice, if applicable.
Comments found in the AFM file.
The name of the standard encoding scheme for the font. Most Adobe fonts use the AdobeStandardEncoding. Special fonts might state FontSpecific.
Usually the y-value of the top of the capital H.
Typically the y-value of the top of the lowercase x.
Typically the y-value of the top of the lowercase d.
Typically the y-value of the bottom of the lowercase p.
Returns a hash table that maps from glyph names to the width of that glyph.
Returns a hash table that maps from glyph names to bounding box information. The bounding box consist of four numbers: llx, lly, urx, ury.
Dumps the content of the Font::AFM object to STDOUT. Might sometimes be useful for debugging.
The AFM specification can be found at:
Contains the path to search for AFM-files. Format is as for the PATH environment variable. The default path built into this library is:
Kerning data and composite character data are not yet parsed. Ligature data is not parsed.
Copyright 1995-1998 Gisle Aas. All rights reserved.
syntax highlighting: |
global_01_local_0_shard_00000017_processed.jsonl/19257 | Tom Wyant > Astro-App-Satpass2-0.012_01 > Astro::App::Satpass2::Format::Template::Provider
Annotate this POD
View/Report Bugs
Module Version: 0.012_01 Source Latest Release: Astro-App-Satpass2-0.017
Astro::App::Satpass2::Format::Template::Provider - Template provider.
No user serviceable parts inside.
This class is private to the Astro::App::Satpass2 package. The interface may change, or the whole package be revoked, without notice. The following documentation is for the benefit of the author.
This class is a subclass of Template::Provider, designed to provide template storage for Astro::App::Satpass2::Format::Template and double as a template source for Template-Toolkit.
Caveat: The Template::Provider documentation says that subclasses should provide a modification time of the template, to drive the cache mechanism. This subclass does not actually provide a time, but instead provides a positive integer that is incremented each time the template is changed. This prevents problems if a template is changed twice in the same second, but may have other consequences.
This class supports no public methods. It does support the following methods which are private to Astro::App::Satpass2:
my ( $data, $status ) = $obj->load( $name );
This is really an override of the Template::Provider method of the same name. But though it is named like a public method, this method is not documented there, so it is documented here to keep Test::Pod::Coverage from complaining.
According to the in-code comments, it loads a template but does not compile it, and returns (if successful) the template source.
foreach ( sort $obj->__satpass2_defined_templates() ) {
This method returns an unordered list of the names of all defined templates.
$obj->__satpass2_template( foo => 'bar' );
my ( $tplt, $mtime ) = $obj->__stapass2_template( 'foo' );
print "Template foo: $tplt, modified ", scalar localtime $mtime;
If called with a single argument, this method returns the named template. In list context it returns not only the template but its modification time. If the template does not exist, it simply returns, yielding undef in scalar context, and an empty list in list context.
If called with two arguments, this method sets the named template to the given text, recording its modification time as the current time.
There is no mechanism to delete a template once defined, because I know of no mechanism to delete it from the Template-Toolkit cache.
Thomas R. Wyant, III wyant at cpan dot org
Copyright (C) 2011-2013 by Thomas R. Wyant, III
syntax highlighting: |
global_01_local_0_shard_00000017_processed.jsonl/19258 | Take the 2-minute tour ×
I have a set of geared-to-enterprise SaaS services I will be trying to sell soon to a number of large companies. In IT and Security reviews for critical software in the past, as a vendor you were dinged if you were running on someone else's virtual environments. It was expected you'd be running on your own, or at least bare hardware for which you've contracted.
Despite it being 2012 and not 1997, I know first-hand there are those who will poo-poo the idea of buying a service hosted on something like AWS or in a multi-tenant hosting situation that was not solely dedicated to the service at hand.
Are there still security concerns in the enterprise about this overall, especially in the ERP integration arena? There is a lot more cost involved at a DC with servers and Oracle licenses, etc, etc and thus the pricing model changes significantly.
Would you consider services sold on someone else's cloud too risky? This would be in a general IT systems perspective in various industries. (e.g. Likely not for Banking, but most banking are on-premise anyway)
share|improve this question
What kind of services and to what kind of business? The security requirements vary widely. – Karlson Mar 2 '12 at 20:12
@Karlson - web services with core company data, businesses large enough to implement ERPs (usually 1500 persons+) – Xepoch Mar 2 '12 at 20:16
What line of business? – Karlson Mar 2 '12 at 20:23
@Karlson - LOB independent, it is data management support for IT departments. – Xepoch Mar 2 '12 at 20:24
Bank with 1500+ people have different regulatory requirements then a mine then a garment producer then a retailer, etc. – Karlson Mar 2 '12 at 20:28
show 2 more comments
migrated from answers.onstartups.com Mar 3 '12 at 1:30
This question came from our site for entrepreneurs looking to start or run a new business.
2 Answers
up vote 1 down vote accepted
In general, there are only a few key areas of added risk, for a cloud-hosted system as opposed to a self-managed system. Some of these may apply to some industries, others less so.
• Compliance - some regulations / laws make it difficult (if at all possible) to be compliant when hosted in the cloud. Lately most cloud providers are making efforts to meet this challenge.
• Data migration - generally you won't know where your data is located, e.g. it may be moved out of the country. This may be relevant again to compliance, e.g. Data Protection Act in the EU. Again, many providers are now allowing you to enforce a specific region for your instances.
In my opinion, as long as the provider meets your core requirements, the above issues are not so important.
However, these next two will always remain as risks, that should be managed appropriately by each business according to their own tradeoffs:
• Insider access - while you (hopefully) have some control over your own employees, even the administrators - via employee vetting, and other non-technical / personal controls, you have no such control over the cloud provider's employees.
While these can be partially mitigated, either by technical controls (such as encryption, which will only make it harder to do you damage, not impossible), or legal controls (e.g. non-indemnification, etc though highly unlikely), this will remain a valid business risk, that some business would not want to accept.
• Availability - obviously, you have slightly higher probabilities of high levels of access, when your machines are on site. Remotely, you're dependant on too many levels - besides the cloud providers, there is the ISP, and etc.
Again, there is some mitigation, both technical and contractual (e.g. SLA with penalty clause), however as above this can still be a valid business risk.
So, to sum up the answer to your final question:
Would you consider services sold on someone else's cloud too risky?
A simpler question is: Is it more vulnerable? That has an easy answer: Not really. As @Rook said, there are too many factors equally out of your control, even when you own the physical boxes. So you dont lose much that way.
However, "too risky" is dependant on each business' risk tolerance, and various other trade-offs.
Aside from compliance issues, the last too points I mentioned would be the stickiest issues to manage.
share|improve this answer
add comment
So just because its on a machine in your building makes it yours? Do you know everything running on this machine? The answer is always No. A piece of hardware providing a service is a black box to the end user. If anything having a vendor send you a dedicated piece of hardware is a massive security threat. Firewall settings should always be very constrictive when it comes to remote connections. For the vast majority of enterprise networks I have encountered the idea of an attacker with a black box inside your local network is a nightmare.
An important defense in depth security principle is isolation. When a system is compromised it becomes a beach head for a full scale invasion of the rest of your infrastructure. An ideal security design would have every system isolated and only exposing the minim necessary functionality to the other components of your infrastructure. SaaS and cloud computing can conform to this design, but so can traditional computing platforms.
share|improve this answer
Not disagreeing with anything you say, but I think you're last sentence is critical: cloud computing CAN conform, yes? – Xepoch Mar 3 '12 at 16:38
@Xepoch Well yeah I mean, on AWS you can have any arbitrary firewall ruleset, including a very insecure one. Just because its on the cloud doesn't necessarily mean its more or less secure, but if it was designed properly i think it can be more secure than the traditional approach. – Rook Mar 3 '12 at 18:13
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/19261 | Take the 2-minute tour ×
Currently, I have two load balancers running HAProxy, which forward requests to backends, each of which run Varnish cache in front of nginx. I thought this would distribute most the bandwidth across the backend servers, but my load balancers appear to be using hundreds of gigs of bandwidth a month, which is close to what the backends use. I suppose that makes sense because the traffic is all routed through the load balancers?
My load balancers and backends are located in different parts of the US. Would it be more efficient if I just ran HAProxy and Varnish on frontends, and only nginx on backends? Thanks!
share|improve this question
add comment
2 Answers
up vote 8 down vote accepted
To your first question: Yes, in the normal HAProxy configuration all traffic flows through the load balancer both when it comes in to your servers, and when it goes out again from the servers to the clients. This is more or less always so with all load balancers, as they're generally implemented as HTTP proxies or IP level NAT / routing boxes. The exeption is when "direct server return" (DSR) is used, see this inlab.com explanation of what DSR is.
Ehh, why? If you're using geo-loadbalancing or multicast routing then I would not expect you to be asking these questions. In the normal use case you really should have your servers in the same rack, and on a fast collision-free, low-latency LAN. That would make life easier for your server software, and give you more performance from your servers, as well as more consistent / dependable performance characteristics...
The canonical setup for the software you're using would be something like this:
nginx (for HTTP compression) --> Varnish cache (for caching) --> HTTP level load balancer (HAProxy, or nginx, or the Varnish built-in) --> webservers.
Optionally, if your load is high, you could have multiple nginx or varnish servers at the very front; but that's for sites with thousands of request per second.
To your second question When you ask "more efficient", I'm in doubt about what you mean. More efficient as in lower traffic between the servers? Marginally, as the Varnish cache stops some traffic from going further back. More efficient with regards to CPU use -- you can just shuffle the services around to less loaded physical servers, as long as you keep the logical struucture the same.
share|improve this answer
This was extremely helpful for me. Thanks! – Lin Aug 22 '09 at 7:54
add comment
You've got it backwards... put Varnish in front of the load balancers, so that they can answer as many requests as possible early on (if you've got too much traffic for one Varnish to handle, then load balance those with a low-overhead TCP load balancer like ldirectord) then have Varnish pass back to the HAProxy instances and go from there. Having Varnish behind the HAProxies just seems totally backwards to me -- you want to shed as much traffic as early as you can.
share|improve this answer
Yeah, should have been obvious to me. Thanks. – Lin Aug 22 '09 at 7:53
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/19262 | Take the 2-minute tour ×
At my work, backups have a surprisingly low priority. The backup strategy was implemented a while ago, and since then it's just assumed the backups are fine. If you ask the sysadmins, they'll say everything is backed up.
But then, when you ask for a SPECIFIC backup, half the time they are not there:
• The disk got full
• The tape failed
• Looks like someone disabled the backup job
• The network connection had downtime
• We ordered that disk years ago, but finance hasn't approved the purchase order
• The files are corrupt
• File contains wrong database
• Only transaction log backups (useless without a full one)
A few weeks ago, disaster came real close as one of the servers lost one too many raid disks. Luckily one disk was still kind enough to copy the data, if you tried a lot of times.
But even after that near-disaster, I can't seem to convince the sysadmins to improve the situation. So I'm wondering, any tips for opening people's eyes? It seems to me we're walking along the edge of a cliff.
share|improve this question
So you are saying that not only are your sysadmins incompetent enough to lose a RAID set, they are also useless enough to not have a backup for that system? Sounds like a good case for getting some new admins. – Martin Rennix May 16 '09 at 14:26
add comment
7 Answers
up vote 23 down vote accepted
You always have to get these things fixed from the top.
Is the current backup strategy backed by and understood by management? If not, it's useless.
The executive management needs to know about the problems and what risks are involved (losing financial data that you need to bring out legally to survive, or customer data that has taken years to collect?) and weigh that in deciding on actions, or deciding on letting someone (like you) take action.
If you can't get to management, try business controllers or other financial positions where data retrieval and its integrity is of high importance to the company's reports. They in turn can "start the storm" if needed...
share|improve this answer
I totally hate work politics, and people "starting storms", but if you're telling the honest truth about the situation "going to the top" and other "storm" starters is probably the best/only way. – anonymous coward Jun 3 '09 at 20:05
Agreed, it blows (no pun intended). It's just one of those things that sometimes has to be done, even though it's both annoying and risky being a storm starter. But when it comes to critical problems like this there are like three options at most: ignore, leave or attack. And ignoring this kind of flaw doesn't sound like a good one. – Oskar Duveborn Jun 4 '09 at 8:28
add comment
Where to begin? This is a disaster waiting to happen. A Sysadmins primary job function is to ensure data is backed up and recoverable. Everything else is secondary. No if's no but's.
Here are a few things you can do:
1. Track KPIs for restores. It should be possible to produce a report showing how many requests for restores have been successful. Anything less than 100% should be investigated thoroughly. Management love reports and this is hard evidence.
2. There should be documented procedures for all backup and restore operations, including all systems and their backup strategy, tape rotations, schedules, escalation paths, test restores etc. Ask to see them.
3. Speak to the manager of the sys admins and voice your concerns. Go armed with proof that restores aren't working. If no joy go higher.
Seriously - kick up a fuss. Stuff like this can destroy a company.
share|improve this answer
Just don't forget to use a beta distribution on your "statistics" of three attempts :-P stats.stackexchange.com/q/47771/9487 – Tobias Kienzler Jan 17 '13 at 16:40
add comment
Propose (at minimum) yearly disaster recovery tests. The work required to successfully execute the test should reveal shortcomings.
share|improve this answer
add comment
Where I work we have a seriously good IT department, every year they get together from every office around Europe and have a 'restore fest' onto rented servers in a datacentre, effectively simulating what would happen if staff came to work one day and found the office had burnt down during the night.
Get the big boss involved, remind him that if disaster struck, he'd be out of a bonus that year (or worse!) and so maybe it would be prudent to organise a similar disaster recovery exercise. It shouldn't take long or cost much - admins get sent away with their offsite backup tapes and told to bring up an identical office environment from them.
Then sit back and watch IT get better - once management realise that the company data is dangerously close to being permanently lost, sparks will fly (from the rockets that will be strategically placed in said admins)
share|improve this answer
That is so awesome! – Oskar Duveborn Jul 8 '10 at 8:32
add comment
It is easy to blame the admins -- however Oskar has it right: these things are driven from the top. If management won't spend the bucks to make backups a priority, then the sysadmins are usually out of luck and do the best they can with the resources they have.
The key, if you are one of those unlucky admins -- and I have been in this boat for some customer engagements -- is that you ensure that managment is briefed, repeatedly, and in a paper-trail-confirmable way, that this is a risk to the business.
My strategy is to constantly hammer at the problems. If you do that, sometimes the problems will get fixed, but it's mostly so that whomever I report to can't hide behind the "I was never briefed" excuse. As a consultant, I can usually go one better. I can get my bosses to brief more senior management than I can that there is a vulnerability. This spreads the blame around, or at least focuses it at a level higher than I am.
At the same time you have to be inventive and work hard to minimize the risks with whatever resources the customer can provide.
While in some cases the admins may be culpable, management is always responsible: either for knowing the risk and not doing enough to mitigate it, or hiring people who don't alert them to these risks.
share|improve this answer
add comment
I am responsible for about 200 servers spread across the North West of the UK, and this is obviously far too many to check manually.
I configure the backup so that on completion it runs a (VBScript) script that looks through the backup log, works out whether the backup worked or not and writes a record into a central database with the backup result. Then at head office I run a script that queries this database and presents me with a list of sites where either the backup reported an error or there was no report from the site.
The end result is that when I sit down at my desk I have a list of all the sites where I need to check the backup.
The point of all this is that the default assumption is that the backup failed, and the backup is considered to have worked only if my VBScript detected no errors and wrote this conclusion I to my database. This makes sure backup failures don't go unnoticed.
Some of the servers use Backup Exec, some NTBackup and some just copy their files to another server across the network. It doesn't matter what type of backup the servers do as it's easy to tweak my VBScript to check for errors. My script is actually pretty basic, it just opens the backup report as a text file and greps for phrases like "failed to mount", "tape full", "CRC error" etc, etc. I'm sure a professional programmer would do a slicker job. However the whole thing is simple and robust, and it's proactive in the sense that I see the backup failure report whether I want to or not and I'd only fail to notice an error if I consciously decided to ignore the report.
PS 99% of the backup failures are because the users forgot to change the backup tape. Don't you just love lusers :-)
share|improve this answer
Or the robot dropped the tape (damn robot) ^^ (happens more often than one'd think) – Oskar Duveborn May 18 '09 at 21:57
add comment
A backup that isn't tested is no backup whatsoever.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/19269 | 5 Tips to Help You Worry Less About Your Kids
Are You a Worrier?As a parent, you want what is best for your children. You want them to be smarter, better looking and more well-rounded than you are. You want them to be liked by their peers and to succeed in school. As such, you worry. And, with worrying comes anxiety which can turn into depression. Here are five ways to help you stop worrying so much:
1. Trust the facts. When you look at the facts and evidence of what has actually been occurring, you will find that the worried feeling you have is irrational. Examine what's actually occurring in your life and consider how you feel after that.
More From YourTango: Why Persistent Parenting Pays Off
2. Stop over-identifying with your kids. If your child gets into an argument with another child, do you think, 'I must be a bad mother?' If so, you are personalizing events that aren't your fault. Tell yourself 'the only person's behavior that I can control is my own.' It's important to remember that you are not your child and your child isn't you.
3. Think positively. Just because something negative happened once before doesn't mean it will happen again. Negative events allow people to learn from their mistakes, which allows us to grow intellectually. When you think more positive about how the day will turn out, it usually will.
4. Stop blowing things out of proportion. This commonly occurs when you look at your errors or your child's errors and exaggerate their importance. Try to focus more on your child's strengths. This will allow you to feel better about your parenting and allow your child's self esteem to grow.
5. Keep an open mind. Seeing things in black and white is totally unrealistic because life is rarely completely one way or the other. Look at the room your sitting in now, is it perfectly clean? Is every space piled high with dust or dirt? Or is it partially clean? Absolutes do not exist in this universe.
Written By Shelley Skas for YourTango.com
More From |
global_01_local_0_shard_00000017_processed.jsonl/19280 | Forgot your password?
+ - Moving a Data Center Without the Heart Attack->
Submitted by
snydeq writes "Deep End's Paul Venezia offers hands-on advice to IT admins heading up a physical data center migration. 'As the dust settles in the aftermath of a successful physical data center move, I'm nursing my bruised and cut hands, kicking back with a Scotch, and reflecting on what went right. I said "successful," but actually there's no such thing as a failed data center move: If something's going wrong, there's nothing you can do except keep working until everything's up and running,' Venezia writes. 'But a successful data center move is no accident. Whether it's a data center relocation or new data center build-outs, detailed plans must be made months or even years in advance.'"
Link to Original Source
Moving a Data Center Without the Heart Attack
Comments Filter:
|
global_01_local_0_shard_00000017_processed.jsonl/19282 | Forgot your password?
Comment: Re:I think I have my next project, then? (Score 1) 146
Actually, that would be really cool. Run Android under a hypervisor (Hyper-V maybe? It's a Type 1 so runs on the bare metal) and allow it to just open up in a window and communicate over the VMbus with the management OS (under Hyper-V, there is no host OS - the OS you see is actually just another VM but with access to more information about the metal it's running on). Possibly even snap it to the side somewhat like the Xbox One (actually, why can't Hyper-V be snapped?). Be awesome for devs.
Comment: Re:Forget the customer (Score 1) 146
Of course it overwrites the boot sector - how else would it enable the boot loader to run? Complaining that it installs the boot loader is just stupid. And expecting them to add Windows to grub's conf file is a bit rich, considering I don't believe I've ever seen a Linux install suggest "Do you want to install the boot loader, or add Linux to the Windows BCD?"
Comment: Re:Apps (Score 1) 170
by Kalriath (#46479095) Attached to: VLC Finally Launches App For Windows 8
Google Sued Over Children's In-App Android Purchases 320
Posted by samzenpus
Comment: Re:International Charter on Space and Major Disast (Score 1) 142
Except that the comment I replied to was specifically in the context of "Why hasn't the Disasters Charter been activated to find this plane?" and the answer is, "because this isn't a disaster of great enough magnitude".
Though we're now learning that more than a couple of spy agencies are turning their surveillance resources onto the task (finally! The NSA might be good for something!)
Comment: Re:Not Necessarily True (Score 1) 417
by Kalriath (#46442679) Attached to: School Tricks Pupils Into Installing a Root CA
However, I think the fact that the school initially denied what they had done and then reconfigured the network is quite telling.
No, it really isn't. Take off the tinfoil hat, the most likely scenario goes thus:
"No, we don't intercept SSL communications, student."
Student leaves.
"Hey Bob, looks like we left that setting enabled that installs the CCA certificate on client devices."
"Ah shit. Can we disable that?"
"Yeah, but it's gonna mean restarting the ASA."
(Restarts ASA. 5 minute IOS boot time ensues)
Comment: Re:Probably not Illegal. (Score 1) 417
by Kalriath (#46442661) Attached to: School Tricks Pupils Into Installing a Root CA
The big difference is between this and the OP, though, is that my company owns these laptops.
Yeah... and you and YOUR COMPANY (rather) potentially get to share liability with your service provider, in the event that your CA's private key facilitates the commission of fraud or some other crime against the user, for example, if the zScaler CA or zScaler's infrastructure is used to steal banking information or PII from someone using one of these laptops; the person can sue your company and/or Information Technology professionals responsible for the intercept or misappropriation of information.
For what it's worth though.... the user could also sue if there was a keylogger installed on it by your company that lead to to damages against them, or possibly if there was malware -- that the owner of a laptop had a duty to prevent or detect.
It doesn't matter that your company owns the laptop. Legally you can surveil the activity of the laptop, BUT there is a duty of care that comes with you and your company's choice to do so and legal owernship of the laptop.
So your company best be darned 100% certain that zScaler passes all due dilligence for protection of crypto secured information.
Well, actually, no, since the devices are provisioned for work use. If your bank or passport details are stolen because you used your WORK laptop on the WORK network to access those PERSONAL sites, that's on you. The company only has a duty of care to protect information they know thy have.
Comment: Re:Probably not Illegal. (Score 1) 417
by Kalriath (#46442653) Attached to: School Tricks Pupils Into Installing a Root CA
I'm guessing the software they get students to install is Cisco Clean Access, and the CA is most likely only available by logging onto the Cisco device doing traffic management and network protection. "Protection" of the CA would be unnecessary, because it's entirely probable that it's not even possible to get the CA private key.
Most likely the IT staff didn't even realise that they had root CA provisioning enabled - Cisco configurations are usually mazes of poorly documented switches, commands and screens.
Comment: Re:Shouldn't it be understood... (Score 0) 191
by Kalriath (#46442609) Attached to: The Tangled Tale of Mt. Gox's Missing Millions
I would indeed contest that they are in part indirect methods of paying. Because they are not in part indirect methods of paying, they are in whole indirect methods of paying. And considering you said "Fuel, cars, land, and other big ticket items are now sold directly with Bitcoin" - you are wrong.
And no, a credit card is not "indirectly paying" either. It's directly paying as it is a direct transfer of funds from one party to another. Indirect is something like Paypal with an intermediary collecting the funds. And all those other options you mentioned are also indirect.
|
global_01_local_0_shard_00000017_processed.jsonl/19283 | Forgot your password?
Comment: Re:And... (Score 1) 669
by rjstanford (#46477277) Attached to: 70% of U.S. Government Spending Is Writing Checks To Individuals
Not quite true, since you're paying payroll taxes regardless and just not anything for "federal income tax withholding". However, since payroll taxes are a 16% proportional tax on your income, its a little unfair to characterize them as escaping all income taxes, especially in the context of social security and medical benefits, which are taxed regardless even in the "0%" bracket.
Comment: Re:Bit coin is highly misunderstood by many (Score 1) 191
by rjstanford (#46436061) Attached to: The Tangled Tale of Mt. Gox's Missing Millions
Doesn't this story of MtGox completely invalidate the idea of Bitcoin? It was made to appear safe due to an algorithm, but obviously it can disappear without a trace and then what? There was never any sovereign authority behind that currency. Thus no international muscle to go track down the bad guys or figure out what happened. If anything, the international banking community will simply say "told you so..."
Exactly the opposite. Mtgox's failure stresses the need for the original purpose of Bitcoin; removing the need for counter-party trust. Storing your assets in any third party or hot wallet goes against the intention of the Bitcoin protocol and is foolhardy. Bitcoin is just as susceptible to being stolen by con artists, governments, and corporations as greenbacks are. Some users learned the hard way that Bitcoin is as safe or dangerous as you choose to make it.
Worse. Let's say that you accept Bitcoin payment years from now and it turns out that that money was part of the MtGox heist. Congratulations, you've now received stolen property, which in many jurisdictions means that it may be taken away from you at any moment, all quite legally.
Comment: Re:Get your popcorn ready! (Score 1) 191
by rjstanford (#46436049) Attached to: The Tangled Tale of Mt. Gox's Missing Millions
The value of a currency is often predicated on having enough of a market in which to spend it.
The US government backs the USD in two important ways; the first, though FDIC et al, by ensuring that there are safe places to store your USD while you're not using them. As we can see, that's not an insignificant benefit.
The second is by guaranteeing that you'll be able to use those USD to pay all of your public debts - taxes, fees, permits, &c. That automatically grants a critical mass as far as having places to spend USD, which means that other people will accept the currency, which then snowballs until you have an effectively universal acceptance rate.
Currently, no Bitcoin backers offer anything close to either of those two benefits.
Comment: FOSS? Who cares? (Score 2) 205
by rjstanford (#46431095) Attached to: Firefox OS Will Become the Mobile OS To Beat
If this really can work for ~3.5 billion people who currently don't have a decent mobile OS (a claim about which I remain skeptical), I guarantee you that at least 3.49 billion of them won't give a damn whether its FOSS or not. Of the remainder, most surely won't care whether its GPL, BSD, or PirateBay licensed.
Comment: Re:Why not badging of the doors ? (Score 1) 130
Comment: Re:One thing that gets overlooked (Score 1) 318
by rjstanford (#46345315) Attached to: Consumer Reports Says Tesla Model S Is Best Overall Vehicle
Unfortunately, it is already wired for 200 amp service for a reason. Many American homes with dryer, range, electric AC/heat, and electric hot water cannot take another 50 amp load without the real possibility of exceeding 200 amps. Having a 200 amp service is no guarantee your ready to add Tesla charging.
So set your charger to run between midnight and 6am - easy. Or some other time when you're unlikely to be running the dryer, cooking, cooling your house, and heating lots of water all at the same time.
Comment: Re:Stock Bump too (Score 1) 318
by rjstanford (#46345301) Attached to: Consumer Reports Says Tesla Model S Is Best Overall Vehicle
The stock was up as high as 17%, and closed up just under 14% (+$30 on the day to $248). With Morgan Stanley estimating a $320 price there is probably significant growth left, It seems they will have no problem funding that 5 to 7 Billion dollar battery plant.
You realize that unless they do another offering, are are buying another company with stock, the rise of fall of the price in the secondary market has absolutely no affect whatsoever on Tesla's ability to build a plant?
Comment: Re:Another Tesla story? (Score 1) 318
by rjstanford (#46345143) Attached to: Consumer Reports Says Tesla Model S Is Best Overall Vehicle
Still only barely competitive with a carpool, which is a shame - though again, to be fair roads are also subsidized somewhat.
Urban roads cost somewhere in the neighborhood of $15 million per lane mile (and up from there). Also remember that most roads have at least two lanes. Even adding a lane to an existing road can cost ~$5 million per mile. Commuter rail is usually dirt cheap in comparison to road expansion, but since maintenance and construction costs are so much less they have far fewer voices during bond elections than the concrete guys do.
|
global_01_local_0_shard_00000017_processed.jsonl/19285 | Forgot your password?
Comment: Re:Hello from Meatspace! (Score 2, Insightful) 352
by buffer-overflowed (#26752445) Attached to: Massive <em>EVE Online</em> Alliance Disbanded
This is going to be meta as fuck -- but the only preconcieved notions I brought to that post were; that the gist of his complaint(and thus post) applies to just about everything(which a later reply addressed) both on this site and within western cultur, that Iraq is a contentious topic(confirmed by some of the replies), that bringing up your own US military service invariably will send any conversation down certain lines(also confirmed by the replies - thank you for your service, what were you expecting, yada yada), and that as a poster with an ID that low, he knew all of these things and thus knew what he was doing. And of course what is implied by the fact that both darfur, and Rwanda 2, child of rwanda, aka the congo were brought into it as well.
It was utterly irrelevant to the article(or rather only as relevant to this topic as to any other topic), only sort of relevant to the person he was replying to, and not productive except to create a derail, which it did. That's a troll -- oh, and the purpose of a troll is to generate conversation, not necessarily in a bad way. I know that definition has gone out of vogue, but sorry it's the one drilled into my brain.
Comment: Re:So really... (Score 1) 54
by buffer-overflowed (#26752181) Attached to: EA Unveils Two New <em>Battlefield</em> Games
"Play with 24 players online in three beautiful and destructible locations...Whether you choose Guadalcanal, Iwo Jima or the classic Wake Island, you'll experience the best balance of infantry combat complemented by land, sea and air vehicles."
So really, they've taken the original BF1942, spruced up the graphics, made trees that fall over, reduced the player numbers and removed all but three of the levels. And they want people to pay more money for this and endure more or EA's dicking about with bugs, poor updates and maybe DRM?
Heh. No thanks.
Yea, it's pretty audacious.
Comment: Re:Hello from Meatspace! (Score 1) 352
by buffer-overflowed (#26751285) Attached to: Massive <em>EVE Online</em> Alliance Disbanded
I've come to realize that not being able to easily take on the suffering of other "third hand" like that is actually a human survival trait. People can only barely handle the tragedies in their own lives, much less bear the burden of every tragedy the damned news media pushes in their face. I say let them have their lives of quiet desperation if they choose.
There's an old(well, relatively) article that was published in the Chicago Reader and excerpted on "This American Life" a long time ago sort of about this as it relates to war called "Losing the War". Lee Sandlin tried to figure out what his father's actual war experience was like(in of course World War 2) and that chronicles it. It's not one of those "you had to be there" type things and it's pretty long, and touches on some other stuff(like propoganda usage, yada yada), but in short, you're right.
Comment: Re:Actually, it seems tamer on WoW (Score 1) 352
by buffer-overflowed (#26750673) Attached to: Massive <em>EVE Online</em> Alliance Disbanded
First off it's still a game, meaning entertainment, meaning it's supposed to be fun - and anyone who takes it that seriously is an incredibly sad individual.
Secondly, really, WoW isn't comparable. It's cute that you think WoW anecdotes are relevant, but they really aren't. The mechanics do not allow stuff on this scale(or even anything really directly comparable) because it is a player versus shell script game, not a sandbox game like EVE/old UO/etc.. The closest thing to an appropriate analogue I can think of is that this is like someone not only stealing everything from the guild bank, but also causing a situation that engenders a huge likelihood of all the people in the guild losing all of their personal epics and gold, setting them back to stock level 60s(70s/80s, whatever the cap is) with absolutely NO recourse available.
First Person Shooters (Games)
+ - Direct2Drive suing Bioshock Downloaders->
Submitted by Anonymous Coward
An anonymous reader writes "In a PR manouver best described as "different", digital distributor Direct2Drive is attempting to threaten its users into deleting preloaded content (in this case, Bioshock from Irrational Games) with the legal cudgel linked above. Their argument appears to be that users who accessed content early were not supposed to access the encrypted copy of the game until release and that it could not "be located by searching" (which is news to Google's cache from yesterday (http://tinyurl.com/2uc4eo), which shows the offending page quite clearly)."
Link to Original Source
PC Games (Games)
+ - IGN Leaks Bioshock, Sends threatening letters->
Submitted by
An anonymous reader writes "IGN Entertainment(a subsidiary of News Corp) accidentally allowed pre-order customers of their service direct2drive preload, activate and thus play copies of the hotly anticipate PC-game Bioshock(due out today) this past Sunday. Because D2D isn't encrypted, anyone who had preloaded it basically had the game sitting on their harddrive, waiting for their activation keys and for the activation servers to go live. When they did, word spread, and people started buying D2D copies of bioshock to get activation keys(viewable from your purchase window or sent to you via e-mail).
Upon realizing their mistake, they cut off the preload downloads. The file was set to restrict to their download client only and could not be downloaded because it reported itself as 15EB. Anyone who went to this site(google cache, 2nd result on google for "direct2drive bioshock preload") Sunday evening and began downloading the preload, was awoken this morning by a rather pleasant e-mail. Searching for that download was disabled around the same time(you can no longer find that particular one via fileplanet search).
That letter was sent to people who *paid* for their copy of the game, mind you, and whose only crime was attempting to preload it. I can personally assure you that an activation attempt was not required to recieve one, as I recieved one, and all I did was attempt to preload the thing.
Some kotaku users paint this as a bit of an exploit in "l33t" hackerdom, in one case characterizing it as breaking into a store to grab your preordered and already paid-for copy. In actuality all you had to do was go to fileplanet, click search, and type in bioshock(or go to google and type bioshock direct2drive preload). The "security" was not linking to it off your order page, and the "exploit" was using their own site's search or google. The result was the preload(which had been reported on, to keep D2D even with steam). Alternatively you could get there by someone sending you a fileplanet link.
Is my understanding of this flawed, or is IGN asserting copyrights they don't possess, and attempting to enforce a TOS/contract that would be violated by using their service via a rather unpleasant e-mail?"
Link to Original Source
User Journal
Journal: Really low blow / bad jokes 11
Journal by buffer-overflowed
Re: Foley, other possible members, the alleged coverup, and the current page scandal.
So, I guess we know the *real* reason they're pro-life, eh? Am I right? *rimshot*
Why are republicans anti-abortion? More sweet young congressional pages and orphans to molest! *rimshot*
Thank ya, I'll be here all week.
User Journal
Journal: Fun things 11
Journal by buffer-overflowed
Republicans decide to cut IRS auditing staff after a hearing showing that the super-rich are so adept at tax evasion that it simply can't be dealt with with current resources. IRS continues to go after the little guy, 'cause being wealthy means you're more important to society for all values of wealthy not including Paris Hilton or the Church of Scientology. Never mind that the law is the law and that it should be enforced, regardless of how fucked up the tax code may be or what your belief
Other Game Bundles For the Cost of the PS3 149
Posted by Zonk
from the lots-of-options dept.
ImaNumber writes "When Sony announced the price of the PS3 many people were left dumbfounded at how expensive it was going to be. Microsoft joked that people would get the Xbox360 and the Wii instead. Brittlefish has taken this a step further and put together a list of some other gaming 'bundles' that you could buy instead of just getting one PS3. You might be surprised at what you can get for that kind of money."
User Journal
Journal: Politics, Protests, Bellpeppers and Beef 17
Journal by buffer-overflowed
When did we become a nation of cowards?
Oh, please protect me Big Brother, I'm a suburban housewife! I am weak and proof that suffrage was a bad idea. I drive an SUV and kill the planet because I am ruled by fear!
Die in a fire. You will anyway, all the electronic surveilance in the world didn't stop 9/11. The only difference is whether or not your neighborhood gossip was listened to by some incompetant government-employed voyeur.
How the PS3 Hit $600 535
Posted by Zonk
from the i-blame-mudflation dept.
Joystiq has up an interesting article today, gathering together information from a couple of places to discuss why the PlayStation 3 is so expensive. From the article: "Kutaragi was demoted after being passed over for the role of CEO and, when former Sony Pictures head Howard Stringer assumed the position, the relationship between the content and technology divisions of Sony became even more intimate. Stringer "quickly dubbed the PlayStation 3 as one of the company's 'champion' products." Kutaragi's desire to stratify the console market with Cell technology in effect wed Sony to the unpalatable prospect of charging an unprecedented price. Coupled with Sony's desire to not only push their own content on HD discs, but to control that medium with their proprietary Blu-ray format, the final price was escalated by two very advanced (and very expensive) pieces of Sony technology."
Nintendo's Iwata on the Wii Price Point 141
Posted by Zonk
from the wiiiiiiiiiiiiiii dept.
kukyfrope writes "Satoru Iwata, Nintendo President, recently talked with GameDaily about the rumors surrounding the $249 Wii price point, his take of the PS3 price point and controller, and to reassure us that the GameBoy is far from dead! 'You may want to check our past records of price points when launching past hardware... I think you'll agree that we always come up with an affordable price point.'"
|
global_01_local_0_shard_00000017_processed.jsonl/19286 | Forgot your password?
+ - Microsoft pays companies to use LiveSearch
Submitted by
tsa writes "On John Battelle's Searchblog there is a piece about how Microsoft pays companies to not only have them use MS's Live Search engine, but also get information about the amount of users and PC's in the company. Companies get paid a fee per PC. The height of the fee depends on the usage of the MS LiveSearch engine. The use of IE7 is mandatory for this, because MS wants the companies to use a plugin for this browser to be able to keep track of the user's searching habits. If you ask me, this is bribery."
+ - High School Student Builds Fusion Reactor
Submitted by
deblau writes "In 2006 Thiago Olson joined the extremely sparse ranks of amateurs worldwide who have achieved nuclear fusion with a home apparatus. In other words, he built the business end of a hydrogen bomb in his basement. A bright plasma "star in a jar" demonstrated his success. "The temperature of the plasma is around 200 million degrees," Olson says modestly, "several times hotter than the core of the sun.""
|
global_01_local_0_shard_00000017_processed.jsonl/19289 | Forgot your password?
User Journal
Journal: God, I'm old and cranky today 4
Journal by rk
So, there's this article here, and some of the comments by, shall we say, users of higher than normal userid value are really grating today. Between the one dipshit who won't use Google to figure out what a CRT is and has to ask (I know they're quickly headed towards obsolescence, and good riddance, but you've got no excuse for not knowing the term if you're 15 or older) and the other dipshit who is ignorant of historical truth and assumes Google's dictionary is the all-knowing, all-seeing Oracle I just kind of lost it and went on a mod-bombing campaign with them. I'm not proud of it, but it sure felt good.
There's a new breed of "techie" who comes here now, and they've got their profiles linked up with their Facebook, G+, and Twitter. I'm not anti these services, I have accounts with all three, but they ain't linked here because my "online presence" isn't about "marketing my unified digital voice" or whatever sewage the tech-hipsters are shoveling out today. They slam together two websites with a javascript library and confer themselves the titles of "wizard", "savant", or "genius". Maybe I come from a different time, but calling yourself that was the mark of a complete prat where I come from. Even self-referring as a "hacker" was a mark of hubris. These titles could only be conferred by others, and when they were, they were terms of respect and perhaps some awe, heartfelt and honest when given and touching and glorious when received.
Rant off, now get off my lawn you damn know-nothing kids, or hang out and have a picnic... say something. It's all good. :-)
User Journal
Journal: Annual check in 15
Journal by Some Woman
User Journal
Journal: When Did 'Beta' Become A Dirty Word On /. ? 5
Journal by MonTemplar
Just spotted that people are stuffing comments into various stories here for the sole purpose of complaining about the /. Beta.
Maybe it's because I only occasionally visit here, but are people really that hung up on the current design?
Hell, I can remember when /. didn't even bother with any testing, period, just shoved changes straight onto the production servers. Fun times. (Not)
Having looked at the Beta, it seems to me a damn sight cleaner that some news sites I can think of*. Ok, the comment view controls could use some refining, but that's the whole point of beta-testing, right?
(*I still have nightmares about pre-2000s ZDNet. Makes the current design look almost pleasant by comparison.)
User Journal
Journal: From the archives: or, LOL John Dvorak 3
Journal by rk
This article made me laugh 6 years ago, and just shows why nobody who knows anything takes John Dvorak seriously, with the possible exception of sticking an inverter gate in front of his output first. Granted, I'm keeping him in business by linking to him because he makes his living as a professional troll: say outrageously stupid things and get the money from ad impressions.
The Gphone is DOOMED!
User Journal
Journal: I am a masochist 5
Journal by gmhowell
And yet I come back.
User Journal
Journal: Does anything work anymore? 3
Journal by gmhowell
Apache/2.2.3 (CentOS) Server at slashdot.org Port 80
User Journal
Journal: Saturday Night is for Fighting 1
Journal by DaytonCIM
New job.
User Journal
Journal: Get off my Lawn! 6
Journal by KshGoddess
Lord of the Rings
Journal: [Beloved] A Pretty Song (redux) 2
Journal by johndiii
From the complications of loving you
I think there is no end or return.
No answer, no coming out of it.
Which is the only way to love, isn't it?
This isn't a playground, this is
earth, our heaven, for a while.
Therefore I have given precedence
to all my sudden, sullen, dark moods
that hold you in the center of my world.
And I say to my body: grow thinner still.
And I say to my heart: rave on.
-- Mary Oliver
|
global_01_local_0_shard_00000017_processed.jsonl/19290 | Forgot your password?
GNU is Not Unix
Why Linux Is Not Yet Ready For the Desktop 1365
Posted by timothy
from the choose-your-own-misadventure dept.
ECMAScript 4.0 Is Dead 168
Posted by Soulskill
from the long-live-ecmascript dept.
TopSpin writes "Brendan Eich, creator of the JavaScript programming language, has announced that ECMA Technical Committee 39 has abandoned the proposed ECMAScript 4.0 language specification in favor of a more limited specification dubbed 'Harmony,' or ECMAScript 3.1. A split has existed among the members of this committee, including Adobe and Microsoft, regarding the future of what most of us know as JavaScript. Adobe had been promulgating their ActionScript 3 language as the next ECMAScript 4.0 proposal. As some point out, the split that has prevented this may be the result of Microsoft's interests. What does the future hold for Mozilla's Tamarin Project, based on Adobe's open source ActionScript virtual machine?"
Comment: Re:Obama (Score 1) 368
by mobydobius (#23938165) Attached to: Dodd, Feingold To Try and Filibuster Immunity Bill
Actually, it's the Bill of Rights and not the Constitution, and it doesn't grant the right to bear arms. The Constitution and Bill of Rights don't grant rights to the people, they provide a list of rights that the government should be unable to take away from the people.
the bill of rights is just a traditional name given to the first set of amendments to the original draft of the constitution. he is not wrong in saying "your constitution protected...." any amendment to the constitution is a part of the constitution. its legally treated no differently than the original draft, except where it modifies the original draft, in which case it preempts that portion of the original draft.
if you are going to be pedantic, be correct.
Hydrogen-Powered cars with Zero-Carbon-Emission? 203
Posted by Zonk
from the look-up-in-the-sky-it's-some-sort-of-pastry dept.
Operating Systems
The Great Microkernel Debate Continues 405
Posted by Zonk
from the tiny-issues dept.
PC Games (Games)
+ - Blizzard makes WoW wish virtual reality
Submitted by mobydobius
mobydobius writes "Blizzard makes young cancer patient's wish come true: He becomes a small part of the WoW storyline.
Okay so this is a little more sentimental than your typical slashdot fare, but the father in this article is my best friend and I just love his kid so much that I want everyone to know his story. And hey, it's WoW; it's Blizzard; so it's tangentially relevant."
Student Arrested for Writing Essay 890
Posted by Zonk
from the thinkofthechildren-tag-is-appropriate-here dept.
mcgrew writes "The Chicago Tribune reports that an eighteen year old straight-A High School student was arrested for writing an essay that 'disturbed' his teacher. Even though no threats were made to a specific person, 18 year-old Allen Lee's English teacher convened a panel to discuss the work. As a result of that discussion, the police were called in. 'The youth's father said his son was not suspended or expelled but was forced to attend classes elsewhere for now. Today, Cary-Grove students rallied behind the arrested teen by organizing a petition drive to let him back in their school. They posted on walls quotes from the English teacher in which she had encouraged students to express their emotions through writing.'"
|
global_01_local_0_shard_00000017_processed.jsonl/19291 | Forgot your password?
Comment: Tangled Web (Score 1) 93
by ohb1knewbie (#39777333) Attached to: Facebook Purchases 650 AOL Patents From Microsoft
Oh, the tangled web They weave. When Patent Guilds Conspire as thieves. Patents today have become like some magic amulet from D&D. You only have to possess it for a short time to impart its magical protection to you forever. After that, you're free to pass (sell) it on to the next troll who needs to up his powers. Does anyone really believe that MS will not, as a term of the sell, keep an eternal license to the patents just as AOL likely did in its sell to MS? Patents must DIE.
+ - Bill's Borg Sized Greed->
Submitted by
ohb1knewbie writes "Mark Lucovsky recalls the expansive scope of Bill Gates greed in an article by Cade Metz at Wired Enterprise. In an otherwise interesting and informative article on Vmware's decision to open source the Cloud Foundry, former Microsoft NT head programmer reveals “Bill the Borg's” hopes and dreams for Windows NT. “Bill said his goal with NT was to charge $1,000 a copy instead of $15,” Lucovsky remembers."
Link to Original Source
|
global_01_local_0_shard_00000017_processed.jsonl/19300 |
Release Liners
Search Products
Narrow by:
No selections available
Release Liners
3M™ Release Liners are available in a wide range of paper, poly-coated paper, polyester film and HDPE film substrates. These high quality release liners are offered with silicone release coatings on either one side or both sides of the substrate. Polyester film release liners are also available with proprietary non-silicone release coatings.
2 Results (Displaying results 1-2)
Switch to list view
Sort by:
Results per page:
2 Results (Displaying results 1-2)
Let's Work Together
Email Us
Click to Chat
Call 800-362-3550
(7AM - 5PM Central Time) |
global_01_local_0_shard_00000017_processed.jsonl/19320 | Take the 2-minute tour ×
Is there any way to run Ninject + NLog under an Azure Website without using the less performant Reflection based Injection?
var options = new NinjectSettings() { UseReflectionBasedInjection = true };
Is the problem stemming from a partial trust issue?
share|improve this question
add comment
1 Answer
up vote 1 down vote accepted
If Partial Trust is all you've got, Dynamic compilation is not possible so there simply is no other way. (Obviously if you were using Azure PaaS mode, you could switch to Full Trust but I guess that's not where you are)
Remember the overhead of DI is something that you should measure in the context of your whole solution - e.g. if you're doing 2 database roundtrips per request, that'll dwarf any impact of the reflection.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/19321 | Take the 2-minute tour ×
Possible Duplicates:
Do you recommend using semicolons after every statement in JavaScript?
Why use semicolon?
What are the ups and downs of using semicolons to end commands in JavaSript? What are the arguments for and against doing so?
share|improve this question
add comment
marked as duplicate by YOU, Dean Harding, Sarfraz, Andy E, Greg Hewgill Jun 6 '10 at 9:51
1 Answer
up vote 1 down vote accepted
You definitely need use semicolons to end commands in js. It is considered as a good programming habit. Statements without semicolons would be difficult to read and sometimes behavior wired.
share|improve this answer
add comment
|
global_01_local_0_shard_00000017_processed.jsonl/19322 | Take the 2-minute tour ×
Imagine the following interface in C#:
interface IFoo {
void Bar();
How can I implement this in F#? All the examples I've found during 30 minutes of searching online show only examples that have return types which I suppose is more common in a functional style, but something I can't avoid in this instance.
Here's what I have so far:
type Bar() =
interface IFoo with
member this.Bar() =
Fails with _FS0010:
Unexpected keyword 'void' in expression_.
share|improve this question
add comment
3 Answers
up vote 14 down vote accepted
The equivalent is unit which is syntactically defined as ().
type Bar() =
interface IFoo with
member this.Bar () = ()
share|improve this answer
Thanks. I'm enjoying learning F#! – Drew Noakes Jun 18 '10 at 7:12
@Drew - It is an awesome language. – ChaosPandion Jun 18 '10 at 13:30
The C# code was a method, not a property. To reproduce this in F#, I believe you need a member with signature unit -> unit. This would be written "member this.Bar () = ()". Without the unit parameter, the F# could would be a property with a getter. – Jason Jun 18 '10 at 17:18
@Jason - Thanks, it is safe to assume that @Drew implicitly corrected my mistake. – ChaosPandion Jun 18 '10 at 17:30
@Jason, you're right. Actually my method took arguments (and surprisingly wasn't called Bar!) so I'd messed up transcribing it in the original question. Thanks for pointing this out. I'll edit the question. – Drew Noakes Jun 18 '10 at 18:19
show 1 more comment
For general info on F# types, see
The basic syntax of F# - types
From that page:
The unit type has only one value, written "()". It is a little bit like "void", in the sense that if you have a function that you only call for side-effects (e.g. printf), such a function will have a return type of "unit". Every function takes an argument and returns a result, so you use "unit" to signify that the argument/result is uninteresting/meaningless.
share|improve this answer
Thanks for the link. I included a quote from the page in your answer. – Drew Noakes Jun 18 '10 at 10:05
add comment
The return type needs to be (), so something like member this.Bar = () should do the trick
share|improve this answer
To be pedantic, the return type is unit, the only value of that type is spelled (). – Brian Jun 18 '10 at 8:58
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/19323 | Take the 2-minute tour ×
Just curious to hear people's take on it.
share|improve this question
I think it's possible to give objective answers to this question naming actual(objective) or perceived(subjective) benefits, but you should rephrase your question to get these. In it's current form it's too subjective and argumentative. – dtb Aug 6 '10 at 12:33
I updated the question slightly. But I have to say, I'm looking for pro's and con's, and I'll take whatever response I'll get, as I'm looking at an overall level but would like to hear about technical details too, so I don't see a problem with the way I stated it... – Brian Mains Aug 6 '10 at 15:48
add comment
closed as not constructive by casperOne May 2 '13 at 3:40
4 Answers
up vote 36 down vote accepted
share|improve this answer
example? or link? – rball Aug 6 '10 at 15:54
Added a link for supporting evidence :) I haven't used Razor myself yet, so I don't have code to share right now. Give it a few months and maybe I'll have time to play with the beta! – Simon Steele Aug 6 '10 at 16:46
We haven't put out any guidance on testing Razor views but I blogged about hosting the Razor engine outside of ASP.Net: blog.andrewnurse.net/2010/07/22/… – Andrew Nurse Aug 14 '10 at 15:43
You should definitely have a look at the great Razor Templating Engine hosted on CodePlex: razorengine.codeplex.com – Marius Schulz Nov 16 '10 at 9:32
Wow, i never new razor view's were testable. I figured testing the output of the controllers (e.g passing correct/valid model) was enough. Anything outside of that is testing HTML output - which seems a bit silly. – RPM1984 Dec 19 '10 at 23:55
show 1 more comment
To give background of opinion: I'm an ex Microsoft developer that worked on a core team for the MSDN website. Now, I use c# razor for ecommerce sites with my programming team and we focus heavy on jQuery front end with back end c# razor pages and LINQ-Entity memory database so the pages are 1-2 millisecond response times even on nested for loops with queries and no page caching. We don't use MVC, just plain ASP.NET with razor pages being mapped with URL Rewrite module for IIS 7, no ASPX pages or ViewState or server-side event programming at all. It doesn't have the extra (unnecessary) layers MVC puts in code constructs for the regex challenged. Less is more for us. Its all lean and mean but I give props to MVC for its testability but that's all.
Razor pages have no event life cycle like ASPX pages. Its just rendering as one requested page. C# is such a great language and Razor gets out of its way nicely to let it do its job. The anonymous typing with generics and linq make life so easy with c# and razor pages. Using Razor pages will help you think and code lighter.
One of the drawback of Razor and MVC is there is no ViewState-like persistence. I needed to implement a solution for that so I ended up writing a jQuery plugin for that here -> http://www.jasonsebring.com/dumbFormState which is an HTML 5 offline storage supported plugin for form state that is working in all major browsers now. It is just for form state currently but you can use window.sessionStorage or window.localStorage very simply to store any kind of state across postbacks or even page requests, I just bothered to make it autosave and namespace it based on URL and form index so you don't have to think about it.
** EDIT **
I actually am moving away from Microsoft tech altogether now and moved into Linux and node.js. I know I could have tried to continue Windows + node.js but there were too many gotchas. I still have many clients on .NET but am focusing on node.js heavily for all new endeavors. The performance, ease of code and cost is really the driving factor. Basically, its just better.
share|improve this answer
Most impressive performance numbers - I dislike ASP.NET for its valiant attempt to make Web programming like VB6. Make testability a bitch. For that reason I also like MVC. Do you have an example you may share of the architecture you are using. – mozillanerd Aug 16 '11 at 17:21
To "mozillanerd", in terms of architecture, if you want to test out what I described, literally do a anonymous c# object with new such as var myobj = new { /* place data structure like similar to json */ } and have that cached in memory and see how fast LINQ is against it. Imagine this is a catalog of products and try LINQ against it. Its super fast but has its place in terms of right fit of scale as its best on one box unless you have azure caching going on and you are running it on windows azure. – Jason Sebring Dec 4 '11 at 4:32
add comment
1. Everything is encoded by default!!! This is pretty huge.
2. Declarative helpers can be compiled so you don't need to do anything special to share them. I think they will replace .ascx controls to some extent. You have to jump through some hoops to use an .ascx control in another project.
3. You can make a section required which is nice.
share|improve this answer
add comment
The biggest benefit is that the code is more succinct. The VS editor will also have the itellesense support that some of the other view engines don't have.
Declarative HTML Helpers also look pretty cool as doing HTML helpers within C# code reminds me of custom controls in ASP.NET. I think they took a page from partials but with the inline code.
So some definite benefits over the asp.net view engine.
With contrast to a view engine like spark though:
Spark is still more succinct, you can keep the if's and loops within a html tag itself. The markup still just feels more natural to me.
You can code partials exactly how you would do a declarative helper, you'd just pass along the variables to the partial and you have the same thing. This has been around with spark for quite awhile.
share|improve this answer
add comment
|
global_01_local_0_shard_00000017_processed.jsonl/19324 | Take the 2-minute tour ×
I wrote a code:
let rec compareVs v1 v2 =
if List.length v1 == 0 then
((match v1 with [] -> 0. | h::l -> h) == (match v2 with [] -> 0. | h::l -> h)) &&
(compareVs(match v1 with [] -> [] | h::l -> l) (match v2 with [] -> [] | h::l -> l))
And ran it:
# compareVs [0.1;0.1] [0.1;0.1];;
- : bool = false
Can't seem to find the problem. Please help.
The problem seams to be with float comparisons:
# 0.1 == 0.1;;
- : bool = false
# 1.0 == 1.0;;
- : bool = false
How else can we compare floats in ocaml?
share|improve this question
add comment
2 Answers
up vote 8 down vote accepted
Use =, not ==.
Floats are reference types in ocaml and == checks reference equality. So 0.1 == 0.1 is false.
Generally, you almost always want to use =, not == to compare two values.
Note that aside from that, your function will return true for two lists of different size. Assuming that's not intended you should only return true when both lists are empty and false when one of them is empty and the other is not.
As a style note, using List.length to check whether a list is empty is usually a bad idea (for one thing it's O(n) even though it can be done in O(1) with pattern matching). Using pattern matching right at the beginning will also clean your code up a bit.
Like this:
let rec compareVs v1 v2 = match v1, v2 with
| [], [] -> true
| [], _
| _, [] -> false
| x::xs, y::ys -> x = y && compareVs xs ys
Oh and if this isn't just an exercise, note that you can just do v1 = v2 and don't actually need to write a function for this.
share|improve this answer
I didn't know we could use , with match. Could you suggest any site where I can find all kinds of usages or examples of match or pattern-matching in general with OCAML? – lalli Oct 22 '10 at 15:32
@lalli: v1, v2 is a tuple and you can pattern match on tuples like on any other object. Also see this page for information about pattern matching. – sepp2k Oct 22 '10 at 15:36
add comment
Sepp2k is correct, but as an additional discussion about comparing floats (which is often dangerous), the following functions have helped me:
This compares two floats with tolerance of epsilon and the syntax would be similar to other float functions. clearly extending >. and others is obvious.
let epsilon = 1.0e-10
let (=.) a b = (abs_float (a-.b)) < epsilon
If you are dealing with many extreme values of floats, you should look at the classify_float function in the pervasives module. I don't recall off the top of my head how NAN values are compared in the = function. You can independently experiment with this if you need to.
I had used this for awhile, but its tolerance was actually way to low for my usage (as in, a very small value for epsilon as above). This does not take into account what, NAN - NAN does. So, this might not be useful.
let (=.) a b = match classify_float ( a -. b ) with
| FP_infinite | FP_nan | FP_normal -> false
| FP_subnormal | FP_zero -> true
share|improve this answer
good point, I forgot how I ran into trouble in c++ and java when comparing floats. – lalli Oct 22 '10 at 15:34
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/19325 | Take the 2-minute tour ×
The following example is giving me this error:
[DCC Error] Unit2.pas(54): E2010 Incompatible types: 'IBar' and 'Unit2.TFoo<Unit2.IBar>'
I think the problem is somewhere around the Self.Create Because after many tries to get it compiled I accidentally entered FFoo := TBar(Self).Create; and it compiled and worked.
I'm using Delphi XE
IFoo = interface
TFoo<T: IInterface> = class(TInterfacedObject, IFoo)
private class var
FFoo: T;
public class
function Instance: T;
IBar = interface(IFoo)
TBar = class(TFoo<IBar>, IBar)
class function TFoo<T>.Instance: T;
if not Assigned(FFoo) then
FFoo := Self.Create;
Result := FFoo;
share|improve this question
The error tells you a line number. Perhaps you could point out exactly what line that is instead of guessing where the problem might be? – Anon. Jan 23 '11 at 22:15
The error is on the line after "end." – RjK Jan 23 '11 at 22:59
The cast TBar(Self).Create is unwanted as you are not sure that Self is a TBar and it will break the concept of generics (not usable for another class)! – TridenT Jan 24 '11 at 8:53
It is really a shame what line numbering is not supported here. – Free Consulting Jan 24 '11 at 10:06
add comment
2 Answers
The problem is in this line with the TBar declaration:
FFoo := Self.Create;
To understand, let's explain the types behind the code [noted like this]:
FFoo:[IBar] := Self:[TFoo(IBar)].Create():[TFoo<IBar>]
So, tu summarize, we have : [IBar] := [TFoo<IBar>]
Are these types compatible ?
A [TFoo] only implements IFoo interface, no IBar as it is stated in your code
This is the compilation error !
UPDATE : Solution 1
To fix the issue : change the TBar declaration
TBar = class(TFoo<IFoo>, IBar)
UPDATE : Solution 2
Replace the FFoo := Self.Create by
FFoo := Self.Create.Instance;
and so it works !
share|improve this answer
That's not the solution because the result type of the function Instance will be IFoo and not IBar. – RjK Jan 24 '11 at 16:01
@RjK: I've updated my post with Solution 2. I think this is what were searching ! – TridenT Jan 24 '11 at 19:35
UPDATE : Solution 2 -> This will cause a stack overflow. – RjK Jan 24 '11 at 20:59
add comment
Your TFoo does not implement T as interface. That's why FFoo and an instance of TFoo is not compatible. If you want to assign an instance of TFoo to FFoo you need to hardcast it.
share|improve this answer
Do you mean this in the function Instance : Result := T(FFoo); It compiles but when I run it I get an AV on the last end of the function. (Access violation at address 00000001. Read of address 00000001.) – RjK Jan 24 '11 at 17:55
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/19326 | Take the 2-minute tour ×
I want to pass in an array of parameters to SQLBindParameters, and have this array held in a char array(since I don't know the type beforehand) (I want all the elements in the 'array' to be the same).
I'll have a pointer to a sample parameter type, and the size of the parameter.
void *buffer = getBuffer();
int bufferLength = getBufferLength();
const int numElements = 200; //for example
char *array = new char[bufferLength * numElements];
memcpy(array + (i * bufferLength), buffer, bufferLength)
// now use array in SQLBindParameter call
will this work as expected, without any alignment issues? (i.e., the same as if I had just declared an array of the right type to start with)
share|improve this question
Are you asking the same thing as Are std::vector elements guaranteed to be contiguous?? – Troubadour Jun 17 '11 at 17:38
actually, I shouldn't even have mentioned the vector, my question is more if it would work, even if vectorBuffer was declared as char *VectorBuffer = new char[] – Bwmat Jun 17 '11 at 17:42
@Troubadour: No, he isn't. He is asking whether the memory used by a std::vector is suitably aligned for any data to put into. – sbi Jun 17 '11 at 17:47
add comment
3 Answers
up vote 1 down vote accepted
Assuming that you're using vector with an allocator that uses operator new under the hood, then the C++ standard guarantees that an array of char allocated with new will be aligned suitably for use with any data type.
EDIT: Yes, new char[] is guaranteed to be aligned for use with any type.
EDIT2: Do note that a local (stack) array char foo[] has no such alignment guarantees.
share|improve this answer
You mean, an array with automatic storage duration. (And/or static storage duration?) It may not be on the actual stack, and it may not be "local" (for some value of "local"). Be precise, please! – Lightness Races in Orbit Jun 17 '11 at 17:55
Not that it matters now the question has changed, but does the standard guarantee that vector locates the elements of the vector starting from the beginning of the array that it allocates? You'd hope so, since by design a vector is supposed to replace a dynamically-allocated array, so it would be a shame if it was missing a useful property of those. But I don't recall seeing such a guarantee. For other containers it doesn't necessarily locate the element at the start of an allocated block, due to the whole rebind thing going on. – Steve Jessop Jun 17 '11 at 18:33
add comment
A vector is just a wrapper around a contiguous block of dynamically allocated memory, in other words, an array. So, if this program would work with an array allocated with malloc or new, it should continue to work with a vector.
(Unless it only worked "accidentally" with an array, of course, but the vector is unlikely to introduce extra problems.)
share|improve this answer
add comment
The C++ standard in 23.2.4 guarantees that each element of a vector<> is stored contiguously:
The elements of a vector are stored contiguously, meaning that if v is a vector where T is some type other than bool, then it obeys the identity &v[n] == &v[0] + n for all 0 <= n < v.size().
It's important to notice what it says about vector < bool > , vector < bool > is a specialized vector<> that happens to try to "optimize space allocation", in some implementations it does so by storing each boolean value in a bit which pretty much renders pointer arithmetic useless.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/19327 | Take the 2-minute tour ×
I am using the visualization library the charts works fine in Firefox/Chrome, however when I test in IE7 I am getting a different font showing up on the chart. Different computers yield different results.
So it is known, I am running IE9 but using the IE7 "browser mode" to test.
Also, I am using the new "corepackage" in Google Charts, so it utilizes both VML and SVG when needed so it does render in IE. But for whatever reason I get weird fonts in IE7.
Can anyone explain what might be happening?
Screenshot From Google: Full Image Graph
EDIT: Here is the script for the chart:
<script type="text/javascript">
function drawChart() {
var data = new google.visualization.DataTable();
data.addColumn('string', 'Column1');
data.addColumn('number', 'Column2');
// Removed data for NDA puroses
var chart = new google.visualization.ColumnChart(document.getElementById('Project'));
var formatter = new google.visualization.NumberFormat(
{prefix: '£',
negativeParens: true,
decimalSymbol: '.',
groupingSymbol: ','
chart.draw(data, {colors: ['#FFC6A5','#FFFF42','#DEF3BD','#00A5C6','#DEBDDE'], width: 600, height: 300, min: 0, max:0, is3D: false, legend: 'bottom', title: 'Project Variance', isVertical:true, isStacked:true});}google.setOnLoadCallback(drawChartProjectVariance);</script>
share|improve this question
add comment
2 Answers
Wrapping the font name in single, and then double quotes seems to fix the font issue (though it still displays in bold and italic, which there doesn't seem to be a way to fix).
e.g. -
var options = {'fontName' : '"Arial"'}
share|improve this answer
This worked for me as well. – Nick May 8 '12 at 19:40
Awesome answer. I can only guess how many hours it took you to figure this out. Worked for me, tx. – Fox Jul 31 '12 at 12:46
add comment
IE7 doesn't support SVG. You can see some alternatives in this thread:
What is a good alternative to SVG in IE7?
share|improve this answer
Then why does it show my graphs, just with odd fonts? – Chris Aug 3 '11 at 18:13
@Chris Why don't you check the file extension in your address bar to see if Google is serving you PNGs? .. – Brian Gordon Aug 3 '11 at 18:27
They still contain the hover/click effects and the SVG source is still preserved. – Chris Aug 3 '11 at 18:45
@Chris Then that's IE9 doing it for you. Does IE9 without the IE7 compatibility mode on work for you? – Brian Gordon Aug 3 '11 at 18:47
It does not. It shows the graphs in IE7 and IE8 compatibility mode, but not in native IE9. I planned on using SVGWeb anyways, but I'm more or less just looking for an explanation why it would "work" but have a random font in the element. If you want I can post a screenshot. – Chris Aug 3 '11 at 18:51
show 2 more comments
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/19328 | Take the 2-minute tour ×
I am now looking for a piece of source code which treats about kernel preemption in FreeBSD.
In Linux kernel, there is a c-source file called "sched.c" in which set_current_state() macro is used to set the state of process (TASK_RUNNING, TASK_INTERRUPTIBLE or whatever). Those macros are defined in "sched.h". Could you tell me the corresponding source file(s) (which has the definition of those macros if they exist in FreeBSD) in FreeBSD kernel source tree?
share|improve this question
add comment
1 Answer
Relevant files are src/sys/kern/sched_4bsd.c (4BSD scheduler) and src/sys/kern/sched_ule.c (ULE scheduler). But there are no TASK_* defines or set_current_state() macro, since FreeBSD and Linux use different schedulers.
You may need to read one of them (i recommend 4bsd, since it's simpler) to find what you are interested in.
BTW, there was a project to port Linux' BFS scheduler, the code is there http://rudot.blog.com/. You might find it useful.
share|improve this answer
Hi, thank you for your info and sorry for late reply. BFS project is also very interesting to me. – akry Jan 23 '12 at 9:49
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/19329 | Take the 2-minute tour ×
I'm using Isotope (JQuery) in my WordPress template and i would like to use the adding item option (prepend). You can see it here: http://isotope.metafizzy.co/demos/adding-items.html
The script that I use works:
$('#prepend a').click(function(){
var $newItems = $(<div>Hello World</div>);
$('#container').prepend( $newItems)
.isotope( 'reloadItems' ).isotope({ sortBy: 'original-order' });
When I click on this link:
<li id="prepend"><a href="#">More</a></li>
The script adds a Hello on my page.
The problem is that i don't want to add a div but i would like to add a Post.
Here is the Post code that i would like to use:
<?php query_posts('category_name=offers'); while (have_posts()) : the_post(); ?>
<a href="<?php echo get_permalink(); ?>" class="element <?php $posttags = get_the_tags();
if ($posttags) { foreach($posttags as $tag) { echo $tag->slug . " "; } } ?>">
<?php the_title("<h3>", "</h3>"); ?>
<?php endwhile;?>
Do you know a way to make it works?
(Excuse my terrible english…)
share|improve this question
add comment
2 Answers
You need Ajax. The way this works is, you fetch what you want from the server, then prepend that.
var postsData = { param1: "value", param2: "value" };
$.get('www.example.com/get_posts.php', postsData,
function(content) {
var $newItems = $('<div/>').html(content);
and make a get_posts.php which prints a HTML fragment. You can get things from the postsData structure from $_GET[], or you can leave the postsData parameter altogether if you don't need any.
share|improve this answer
You have to made or use an url of your wordpress blog to get the render of your post. Try to find and read some documentation about ajax on wordpress posts. – Sebastien Feb 17 '12 at 14:57
(i don't know how but i deleted my comment…). I'm gonna look around Ajax and WordPress. Thank you both for your help! – Hugo Favre Feb 19 '12 at 21:08
add comment
If you want to make a php rendering, you have to use an Ajax request. Are you used to this terrible name 'AJAX'?
With an ajax call using jquery : http://api.jquery.com/jQuery.get/ you can get the html if the post rendering and write it on your page.
Are you understanding?
share|improve this answer
I heard a lot about Ajax but i really need do digg deeper… i'm gonna have a look at your link. Merci Seb – Hugo Favre Feb 17 '12 at 14:54
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/19330 | Take the 2-minute tour ×
I am writing an application that uses Jfreechart to plot a simple bar chart, this chart needs to respond to mouse clicks from the user. I would like to change the color of the bar that is clicked on by the user. I know that the event will be a ChartMouseEvent that will be handled by the ChartMouseListener but I am a little confused about how to change the color of the ChartEntity once I have received it from the event.
Any help would be much appreciated.
share|improve this question
add comment
1 Answer
up vote 3 down vote accepted
You can change the color of an individual bar by overriding the renderer's getItemPaint(), as shown here and here for other renderer's. Once you receive a ChartEntity of type CategoryItemEntity, you can determine which dataset, series, and bar was clicked. Then you can condition your custom renderer's to apply the desired color with the next repaint().
Alternatively, display each series and color in a JTable and use JColorChooser to select colors, as shown in How to Use Tables.
share|improve this answer
Thanks for the help trashgod – Sudipto Shome Mar 16 '12 at 19:34
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/19353 | Take the 2-minute tour ×
In my case, I have an executable in a different folder to the data, and am linking them using shortcuts with the Start In dir modified, for example:
C:/Test - Data dir
C:/Test/3 - Exe dir
Shortcut: C:/Test/3/test3.exe :: Start In C:/Test
However I require an automated method of generating shortcuts, so I have a batch file which creates a shortcut of the current dir exe on the desktop, but because I don't know how to change the start in dir, they don't work.
share|improve this question
StackOverflow is for programming problems. If you are looking for an existing tool, then you want SuperUser. – Raymond Chen Oct 30 '12 at 4:06
I also vote for moving to Superuser, provided OP does not changes it into a programming question: "How to programmatically create a shortcut?". For a solution in Delphi see How to Create a Windows Shortcut (.LNK) File by Zarko Gajic , About.com Guide. delphi.about.com/od/windowsshellapi/a/create_lnk.htm – PA. Oct 30 '12 at 8:32
Does writing a batch file not count? Alright, guess I'll take a look at Delphi then. Though even that link doesn't include setting a shortcut's 'Start In' path. – user1784489 Oct 30 '12 at 15:55
add comment
migrated from stackoverflow.com Oct 30 '12 at 19:48
This question came from our site for professional and enthusiast programmers.
1 Answer
I use this batch file. As you can see, I'm not the original author (someone clever called Walter Zackery), I've just tweaked it in a couple of places (where it says changed by gw)
It doesn't answer your title question since it doesn't set the Start In directory. It should do what you describe in the question details though.
Example call:
link c:\Test\3\test3.exe "my shortcut" c:\test\x.txt some_other_parameter another_parameter
This would use test3.exe to open x.txt in the test directory, with some other parameters (the other parameters cannot be quoted ones.)
::Subject: Re: Shortcut in start menu
::Date: Mon, 27 Dec 1999 06:34:17 -0500
::From: "Walter Zackery" <[email protected]>
::Organization: Prodigy Internet http://www.prodigy.com
::Newsgroups: alt.msdos.batch
::References: 1 , 2 , 3
::I posted this in an NT group 2 weeks ago, but here it is again.
::Parameter number one must be the complete path of the file or folder
::that you're trying to create a shortcut to.
::Parameter number two must be the complete path of the folder that you
::wish to locate the shortcut in.
::Parameter number three is the trickiest. It must be the complete path
::to the Programs folder. The Programs folder is the folder that
::contains your Start Menu shortcuts. It's normal location is
::c:\windows\start menu\programs, or possibly
::c:\windows\profiles\xxx\start menu\programs, where xxx is your user
::name if you're using profiles. It's possible to obtain the location of
::the Programs folder using a batch file, but doing so would more than
::double the size of the batch file, so I refrained.
::Parameter number four must be the name that you wish to give to the
::shortcut. Don't attach the LNK extension to this name, because Windows
::will do it for you when it creates the shortcut.
::Here's an example command line for the batch file.
::link.bat c:\windows\notepad.exe c:\windows\desktop "A Notepad Shortcut" fred.txt
:: gw 22/5/9 made certain changes:
:: uses reg not regedit, since regedit export format changed
:: can pass parameter 3 for shortcut name
:: can pass parameter 4 ,5, .. 9 for command line parameters after name, these
:: will NEVER be quoted in the shortcut so make sure to use short paths
::@echo off
::For Windows NT 4.0 users only!!!
::Creates LNK and PIF files from the command line.
::Author: Walter Zackery
if not %1[==[ if exist %1 goto start
@echo You must pass the path of a file or folder to the
@echo batch file as a shortcut target.
@if not %1[==[ echo %1 is not an existing file or folder
(pause & endlocal & goto:eof)
:: gw changed so can pass name as parameter 2
if %3_==_ for /f "tokens=*" %%? in (
'dir/b/a %1? 2^>nul') do (set name=%%~nx?)
if %name%_==_ set name=%3
(set hkey=HKEY_CURRENT_USER\Software\Microsoft\Windows)
(set hkey=%hkey%\CurrentVersion\Explorer\Shell Folders)
(set inf=rundll32 setupapi,InstallHinfSection DefaultInstall)
:: gw - replaced with reg call to get inot NT4 format which findstr understands
::start/w regedit /e %temp%\#57#.tmp "%hkey%"
reg export "%hkey%" %temp%\#57#.tmp /nt4
for /f "tokens=2* delims==" %%? in (
'findstr/b /i """desktop"""= %temp%\#57#.tmp') do (set d=%%?)
'findstr/b /i """programs"""= %temp%\#57#.tmp') do (set p=%%?)
(set d=%d:\\=\%) & (set p=%p:\\=\%)
if not %2[==[ if exist %~fs2\nul (set d=%~fs2)
if not %2[==[ if exist %~fs2nul (set d=%~fs2)
set x=if exist %2\nul
if not %2[==[ if not %d%==%2 %x% if "%~p2"=="\" set d=%2
echo %d%|find ":\" >nul||(set d=%d%\)
(set file=""""""%1"""""")
if %4_==_ goto create_file
:: can't even get quotes in with this indirect method
:: if %4==/q (
:: set params=%params% "
:: set first_in_quotes=true
:: ) else if %4==\q (
:: set params=%params%"
:: ) else if first_in_quotes==true (
:: set params=%params%%4
:: set first_in_quotes=
:: ) else set params=%params% %4
set params=%params% %4
goto set_params
for /f "tokens=1 delims=:" %%? in ("%file:"=%") do set drive=%%?
(set progman=setup.ini, progman.groups,,)
echo > %temp%\#k#.inf [version]
echo >>%temp%\#k#.inf signature=$chicago$
echo >>%temp%\#k#.inf [DefaultInstall]
echo >>%temp%\#k#.inf UpdateInis=Addlink
echo >>%temp%\#k#.inf [Addlink]
echo >>%temp%\#k#.inf %progman% ""group200="}new{"""
echo >>%temp%\#k#.inf setup.ini, group200,, """%name%"",%file% %params%
start/w %inf% 132 %temp%\#k#.inf
del %temp%\#k#.inf %temp%\#57#.tmp
move %p%\"}new{\*.*" %d% >nul 2>&1
rd %p%\}new{ 2>nul
move %p%\}new{.lnk %d%\"drive %drive%.lnk" >nul 2>&1
share|improve this answer
I think I understand it a little bit. Many thanks, I'll give it a shot! – user1784489 Oct 30 '12 at 19:36
EDIT For those interested, I am trying to make a game mod launcher with the same name and used files as the original game, but located in an external folder. The idea is that users can drop this bat file into their game directory and have it set up a working shortcut. In other words: check for existence of exe file, create shortcut on desktop with start in path = base game and target path = mod exe – user1784489 Oct 30 '12 at 19:54
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/19357 | FIX: Stored Procedure Used with SQLEXEC Embeds NULL as Last Character
Article translations Article translations
Article ID: 279135 - View products that this article applies to.
This article was previously published under Q279135
Expand all | Collapse all
On This Page
When you use the SQLEXEC command to call a stored procedure from Visual FoxPro, a NULL (CHR(0)) may be added to the end of the fields in the resulting cursor.
Microsoft has confirmed that this is a bug in the Microsoft products that are listed at the beginning of this article. This bug was corrected in the next service pack for Visual Studio 6.0.
194295 HOWTO: Tell That a Visual Studio Service Pack Is Installed
To download the latest Visual Studio service pack, visit the following Microsoft Web site:
Steps to Reproduce Problem
1. In Visual FoxPro, run the following code from the Command window.NOTE: You need to provide the actual servername, user ID, and password for your installation of Microsoft SQL Server and ensure that the user has the appropriate permissions.
?SQLSTRINGCONNECT("Driver=SQL Server; Server=servername;uid=UserName;pwd=StrongPassword;")
?SQLEXEC(1, "sp_who")
In the Browse window, you may see a box or other ASCII character at the end of the status field, depending on the font that is used by the window.
2. Close the Browse window.
3. In the Command window, type the following:
? ASC(SUBSTR(status,LEN(status),1))
The Visual FoxPro command has embedded a NULL (CHR(0)) as the last character in the status field.
Article ID: 279135 - Last Review: October 21, 2013 - Revision: 2.2
• Microsoft Visual FoxPro 6.0 Professional Edition
kbnosurvey kbarchive kbbug kbcodesnippet kbdatabase kbfix kbvfp600fix kbvs600sp5fix KB279135
Give Feedback
Contact us for more help
Contact us for more help
Connect with Answer Desk for expert help.
Get more support from |
global_01_local_0_shard_00000017_processed.jsonl/19360 | Export (0) Print
Expand All
0 out of 1 rated this helpful - Rate this topic
HKCU\Control Panel\International
Data type
Default value
Language abbreviation
Specifies the primary spoken language that Windows 2000 displays. The value of this entry consists of a three-letter code representing the language. The first two letters are based on the ISO two-letter language codes for the primary language. The third letter indicates the sub-language for the locale .
Change method
To change the primary spoken language that Windows 2000 displays, double-click Regional Options in Control Panel. Click the General tab, and then select a location from the Your locale (location): list.
This entry is used only by programs that are configured to read Win.ini files. Programs that use the standard Win32 APIs do not use this entry.
Do not change the value of this entry. This value must comply with ISO standards and correspond to ISO values for functionality and language selection.
Did you find this helpful?
(1500 characters remaining)
Thank you for your feedback
© 2014 Microsoft. All rights reserved. |
global_01_local_0_shard_00000017_processed.jsonl/19363 | Take the 2-minute tour ×
I am currently writing a document with a lot of plots. I draw them with pgfplots. which uses a lot of ressources. To manage that, I use the externalization feature of TikZ.
In the file myarticle.tex, there is:
\addplot[mark=*,color=blue, solid] plot coordinates {
}; \label{myplotOne}
\caption{A beautiful line: \ref{myplotOne}.}
I then compile it with:
pdflatex --jobname myplot myarticle
pdflatex myarticle
pdflatex myarticle
Problem is it forbids me to use the label/ref mechanism of pgfplots. I know there is a remark about this on the pgfplots manual (section 4.4.2, page 30): "note that you can’t use the label/ref mechanism in conjunction with image externalization as this will (naturally) lead to undefined references."
Is there a way to trick LaTeX/TikZ in order to use them in conjunction? Maybe by storing the displayed reference in a pdf file?
share|improve this question
Which such example files it is best (actually mandatory) to also mention how it must be compiled, i.e.: is -shell-escape required? Must this file be named myarticle.tex? This way also people which do not know pgfplots much but know a lot about references are able to help you. – Martin Scharrer Mar 1 '11 at 16:49
@Martin: I add the compilation information, thanks for the advice. – Drude Mar 1 '11 at 20:51
add comment
2 Answers
up vote 4 down vote accepted
In general you should be able to do this using the xr package which allows to reference labels in other LaTeX documents.
But the pgfplot package seem to be able to do this now out-of-the-box (manual v1.4.1, section p. 241):
Support for Labels and References In External Files The external library comes with extra support for \label and \ref (and other commands which usually store information in the .aux file) inside of external files.
You seem to use an outdated version. At least the mentioned text in section 4.4.2, page 30 isn't there in my (freshly updated) version. There 4.4.2 is on page 42 and is about "Smooth plots".
share|improve this answer
It seems you are right: I was working with version 4.2. I'll study the new version, and edit my question accordingly. – Drude Mar 1 '11 at 20:56
add comment
as Martin said, the restriction has been lifted in more recent versions of pgfplots: it offers the
which can be activated by means of
When you type pdflatex -shell-escape <maindocument>, all images in the (complete) document will be externalized automatically; including any references.
You can find details about the procedure in http://pgfplots.sourceforge.net/pgfplots.pdf in section "Import/Export from other Formats".
The sourceforge page also contains links to the most recent pgfplots stable (which is 1.4.1 at the time of this writing).
Best regards
share|improve this answer
@Feuersaenger: You need to indent code blocks with four spaces (or use the '101010' button) and mark inline code using back-ticks `. Also normally we don't put greetings and signatures into the posts. Your name is anyway displayed on the lower right. Really nice package BTW! – Martin Scharrer Mar 1 '11 at 21:24
@Feuersaenger: The \tikzexternalize/shell-escape method works great with label/references, thanks! However, is it possible to do the same with the \beginpgfgraphicnamed/jobname method? Or is this obsolete and should be used? – Drude Mar 1 '11 at 21:45
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/19364 | Take the 2-minute tour ×
I have created several large tables in Excel and MATLAB. Since it is very time-consuming to manually copy and paste these tables in LaTeX, I would like to include them as figures in LaTeX. I would really appreciate it if someone could help me with the following questions:
1. Is it possible to include tables from MATLAB or Excel without having to manually copy and paste the cells in LaTeX?
2. If I import a table as a figure into LaTeX, how can I change the caption from "Figure" to "Table" and have it listed in the "List of Tables" instead of "List of Figures"?
Thank you very much in advance for your time and help.
share|improve this question
add comment
migrated from stackoverflow.com Feb 26 '12 at 23:59
This question came from our site for professional and enthusiast programmers.
2 Answers
Part 2 is easier. If you include your table inside a table environment (\begin{table}\end{table}), it will appear in the \listoftables. Nothing will stop you from inserting a figure with \includegraphics inside the environment.
For Part 1, I usually print foreign information to PostScript and use \includegraphics from the graphicsx package. You may need to process the file in a drawing application to crop the boundaries.
share|improve this answer
Thank you so much for your response. I really appreciate your help. Shabnam – SHA Mar 1 '12 at 19:17
add comment
To answer question 1: There is a Matlab function that exports the data from a Matlab matrix to LaTeX tabular format, check it out here: http://www.mathworks.de/matlabcentral/fileexchange/4894-matrix2latex
Simple example: In Matlab, type:
matrix2latex(mymatrix,'myfilename.tex') % Creates a file named myfilename.tex
% with a tabular environment containing
% the data from mymatrix
In you LaTeX document use:
To include the table in your document as a table.
There is also a similar thing for Excel, a macro if I remember correctly: http://ctan.org/tex-archive/support/excel2latex/
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/19365 | Take the 2-minute tour ×
I am a beginner in LaTeX, tentatively using it for industrial documents. I am working on a laboratory report containing little text and a large number of pictures. I prefer to leave the pictures at their native quality level for archival purposes and because a number of them get magnified by the elegant routines found at this link: How to create magnified subfigures and corresponding boxes for portions of a large image
I typically get a PDF file directly using pdflatex. The .pdf file I am working on contains 9 pages and has a size of 9000 KiB.
Post-processing the .pdf file with the routine below (launched from the same directory), and using the "prepress" option, I get a file size of about 6500 KiB, and 3500 KiB with the setting "printer".
I could not find any drop of quality with each of these two settings (there are two lower quality options available, "ebook", and "screen"), when printed on A3 paper with a 600 dpi laser printer, and I would like to get the "printer" quality natively (directly at the creation of the PDF files), in order to eliminate the post-processing operation. Is there a way to do this?
/usr/local/bin/gs -q -dSAFER -dNOPAUSE -dBATCH -sDEVICE=pdfwrite
-PDFSETTINGS=/printer -sOUTPUTFILE=NameOfOutputFile.pdf
-f NameOfTargetFileToOptimize.pdf
share|improve this question
What file size unit is Ko? – Werner Jul 3 '12 at 18:15
In theory, you could change the compression level of pdflatex with \pdfminorversion=5 \pdfcompresslevel=9 \pdfobjcompresslevel=3 (i.e. maximum compression with PDF v1.5). However, I had tried that with my answer to How to make the PDFs produced by pdflatex smaller?, see the comments: The result basically was that this does by far not reach the compression one can achieve via the gs route. – Daniel Jul 3 '12 at 18:29
@Werner Ko is for Kilo Octet, French for kB (kiloByte). – ArTourter Jul 3 '12 at 18:33
add comment
1 Answer
up vote 2 down vote accepted
I would go for a dedicated image manipulation program and create a temporary low quality version of the images. Compressing and resizing a lot of images can be lengthy.
For instance, if you are under Linux, the following command will create for each foo.jpg file a new file foo_small.jpg, with jpeg quality set to 60 and at most 1M pixels.
for f in *.jpg; do echo $f; convert $f -quality 60 -resize @1000000 `basename $f .jpg`_small.jpg; done
This could be expanded to a real script handling also .JPG or .jpeg files, maybe using a fixed resize ratio (e.g. halving), storing the low quality version in a new subfolder, etc.
There are other programs that can batch process a number of images.
Just to make the link from the comment below clickable:
How to make the PDFs produced by pdflatex smaller
share|improve this answer
The idea of compressing the picture before the compilation is not extremely attractive. I have found a lot of useful information here, (and also in the white paper referenced at the bottom of the thread) paperhttp://tex.stackexchange.com/questions/18987/how-to-make-the-pdfs-produced-by-pdflatex-smaller/19047#19047 – Yves Jul 3 '12 at 19:41
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/19366 | Take the 2-minute tour ×
I need to use some system fonts in my document, and I use fontspec and XeLaTeX to do so. I find the font name from fc-list, but when I compile it with XeLaTeX, there's a fontspec error:
! fontspec error: "font-not-found"
! The font "Luxi Serif" cannot be found.
! See the fontspec documentation for further information.
! For immediate help type H <return>.
l.21 \setmainfont{Luxi Serif}
I just migrated from Linux to Mac OS X. Back when I was using Linux machine XeLaTeX works with system fonts. It seems on Mac fontspec can't find fonts from system directory.
fc-list|grep "Luxi Serif"
I checked the permissions of directories and font files, nothing wrong.
There are many font directories on Mac, is it possible to allow the use of fonts in all the directories?
share|improve this question
The location for system fonts in Mac OS X is /Library/Fonts. Put them there, or add a symbolic link there to other directories. – Alan Munn Sep 27 '12 at 15:47
XeTeX does not use FontConfig on Mac, so whether the fonts are seen by fc-list or not does not matter, they need to seen by Mac font services. – Khaled Hosny Sep 27 '12 at 16:56
add comment
2 Answers
up vote 2 down vote accepted
If you use the \setmainfont directive rather than a \fontspec directive, I believe it's necessary to specify the font by its system name rather than by the file name. E.g., Luxi Serif.
Assuming you've downloaded and activated all four fonts of the Luxi Serif font family, the following MWE shows how to load and make use of them.
% !TEX TS-program = xelatex
\setmainfont{Luxi Serif}
\newcommand\qbf{The quick brown fox jumps over the lazy dog.}
enter image description here
Incidentally, Luxi Serif is not a system font -- at least not for MacOSX 10.7.x "Lion". If XeTeX (and LuaTeX) can't find this font, it's almost certainly the case that it wasn't activated in a way MacOS expects it to be activated. How did you obtain the fonts, and in which directory are they located right now?
One way to activate fonts correctly after you've downloaded them is to open a Finder window with the directory to which the fonts were downloaded, double-click on each of the font files in turn, and then to click on the "Install Font" button located in the lower right corner of the window that opens. The fonts you download and activate in this fashion will likely be stored in a folder called /Users/<username>/Library/Fonts, where <username> will be your login name on your system.
share|improve this answer
I did not download or manually install the Luxi series. I'm on Mountain Lion, if Luxi series are not preinstalled in Mountain Lion, then they must have come from MacTex 2012. – Ivy Lee Sep 30 '12 at 14:33
@IvyLee - thanks for providing this follow-up information. If the Luxi fonts are indeed a part of MacTeX2012 (which, by the way, wasn't the case for my installation of MacTeX2012...), it would appear that you still need to activate them before XeLaTeX and LuaLaTeX can use them. Locate the font files (likely called luxirr.ttf, luxirri.ttf, etc.), and then activate them using, e.g., the method I describe in my answer. – Mico Sep 30 '12 at 15:25
thanks! turns out luxi fonts are not installed but they appear on fc-list! – Ivy Lee Oct 25 '12 at 13:31
add comment
Select the same spelling case as you will find in your word processor, not your font file. I just had the same problem.
\setromanfont{Script MT Bold}
Lorem ipsum... Jacolyn
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/19378 | The Twilight Saga
I woke up the next morning with a mission: stay away from anyone I didn't know at school. Just family or wolf pack. That's it. I changed into black skinny jeans and a white T-shirt (which was off the shoulder, of course) and my Converse. I had to be on the DL for now. I jumped off the rail of the stairs and landed on my feet. I ran a hand through my hair and looked in the mirror. My eyes were their rich chocolate-y brown, as usual. The color made my eyes look bigger, which my long lashes contributed to just as much. I turned and Rose was behind me, in a flowery dress that made her look like an angel in the spring. I smiled and she returned mine with an uneven smile. "What's wrong?" I asked her. She shook her head and said, "The last member of the Brexters' clan is going to Forks High now." I asked nervously, "Then can't you just get rid of him today?" She shook her head and said, "Way too many wittnesses. Carslisle is completely against it, anyway. And you know Esme is, too." I nodded and shuddered, thinking of Chase's sharp teeth, aimed for my neck...he was inches away from killing me. But... it didn't make any sense... "Wait, I'm supposed to smell like a vampire, so why do I smell good to him?" She grimaced and Carslisle appeared with Edward. Carslisle said, "Your, er, choice of friends gave off a scent of their own. And vampire and werewolf scent combined creates a human scent." Edward said, "I don't enjoy the thought of you going to school with him so near, Renesmee. Do you think-" I cut him off by saying more to myself, "So that's why Jake said that we should only be friends...." I looked up at Edward and said, hurt, "You didn't!" It made perfect sense. Of course Edward would tell Jake to break up with me. So I wouldn't have such a strong human scent. And Noel gave me that crystal heart so Chase would find me. Even with the wolf pack around. Alice danced down the stairs and grinned at me. "Good morning, Renesmee." I waved, and felt like I would crumble. I said, "We should get to school soon. I'll go get the others." ********************** It was in fifth period that I felt a stare creeping its way up my back. I gasped and turned. A guy with a white shirt and black jeans on was staring at the board ahead of us. He had dark brown hair and deep blue eyes I felt I could fall into. My brain was telling my body to turn back around so he wouldn't see me staring. But my body didn't listen. I looked deeper at his perfect face. Creepy how right he looked. I rested my head on my arms and kept staring at him like a child would a toy they had to have. After a few minutes, he slowly turned to meet my gaze, a smile neatly in place on his beautiful face. My jaw must have hit the floor when he looked into my eyes. They were so stunning, I couldn't look away. I saw a waterfall scene jumping from his eyes into my mind. Then a few flames of rage at something he couldn't control. Woah! How did he do that? It was like my power reflecting off of me onto him, like a projector. My mind screamed Jake's name, but I couldn't turn to even glance at Jake. This creature was so interesting. I could hear my name being repeated over and over. Who was calling my name? "Miss Cullen? Would you mind turning back around?" He leaned forward in his chair so that my face was inches from his. Like the way a kissing scene looks in the movies. He whispered, "Um, I think Mr. Bates is calling you." His breath was intoxicating. I closed my eyes and enjoyed the air he pushed toward me with his voice. Then I blinked and gasped. I was in a classroom? I realized I had turned completely around in my chair to face him. I bit a nail and wondered who that was. ***** I walked out of the classroom and toward my locker. A cool hand touched my bare shoulder. I turned and looked up into gorgeous blue eyes. The guy! He said, "Um, it's Renesmee Cullen, right?" I said, "Call me Nessie." I only said this because I wanted to hear him call me what I only let the wolves and my family call me- everyone at Forks High called me by my full name. He chuckled and said, "I won't keep you, but I just wanted to introduce myself. I'm Jesse Darell." I said, "Nice to meet you, Jesse." He nodded and was about to say something, but Jake interrupted with a, "Hey, Ness." I didn't look at him, though. It was like I didn't know how to control my actions. I coudn't turn from his eyes. Until he gave me a last smile and said so low I almost didn't hear him, "I'll see you, Nessie Carlie Cullen." My eyes had to adjust to the darkness without his bright eyes in my vision. I gasped as if ice had been shot through my veins. Jake's warm grip sent fire to make the ice melt in its tracks. Edward and Bella were suddenly beside me. I realized Jake had dragged me to the hallway. Edward shook me and I shivered. When I looked at him, a tortured look crossed his face. He and Bella asked at the same time, "What happened?" I put a palm on each of their cheeks and showed them what Jesse's eyes had, and how it made me feel. Bella giggled and said, "Looks like you've got a little competition, Jacob." He grunted and said, "I hate competiton. You remember who won last time." Edward laughed and looked into space. I wrapped my arms around Jake's hot neck, finally in control of my actions, and whispered, "There's no competition, trust me." Then I kissed him and caught his hand so we could go to our next class. ********************************When I was trying to sleep that night, I rememberd I'd never told Jesse my middle name. I fell asleep to the color of his eyes and the smell of his breath still fresh in my mind.
Views: 5
Tags: Forks, High, WA, alice, bella, black, blacks, blacks', carslisle, cullen, More…cullens, cullens', edward, emmett, esme, isabella, jacob, jake, jasper, ness, nessie, renesmee, rosalie, rose, vampires, wolves
Join The Twilight Saga
Comment by Kristen on September 11, 2009 at 8:12pm
I loved this. I can't wait to read more.
Comment by MrS. JaKeWaRd_LaUtNeR on September 1, 2009 at 12:20am
omg u have to make more!!!!!!
Comment by Mims on August 30, 2009 at 6:58pm
omg! i love this there has to be more
© 2014 Created by Hachette Book Group.
|
global_01_local_0_shard_00000017_processed.jsonl/19383 | Tolkien Gateway
Revision as of 16:34, 18 February 2011 by KingAragorn (Talk | contribs)
Template:Category top This category and its subcategories lists all the Locations within Arda.
Pages in category "Locations"
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.