id
stringlengths 50
55
| text
stringlengths 54
694k
|
---|---|
global_01_local_0_shard_00000017_processed.jsonl/46250 | Why Mounting Your TV Above the Fireplace Is Never a Good IdeaS
When setting up your home theater, it's tempting to mount the TV above your fireplace. This arrangement seems like a great use of space, but it's actually one of the worst things you can do for both the TV itself, and for your own viewing experience.
It's Bad for the TV
First and foremost, the heat and soot generated by a fireplace can raise the operating temperature of the set, and reduce its usable life span. If the damage to the internals is noticeable, the manufacturer could even refuse warranty service. This won't really matter if you rarely use the fireplace, but it's a non-starter if you do.
It's a Pain in the Neck
Even if you aren't concerned about damaging the TV, you'll still strain your neck watching it it if it's mounted too high. Geoff Morrison at CNET likens it to sitting in the front row of a movie theater every time you watch TV, and suggests placing the center of the screen at eye level from your standard sitting position, or even slightly below. Apartment Therapy offers similar advice, recommending that the top of the screen should only be about 15 degrees above your horizontal plane of vision. By either measure, hanging your screen above a fireplace isn't remotely close to an optimal position. In fact, you'd be better off mounting it inside the fireplace.
It Hurts Your Image Quality
If this weren't enough, most LCD and LED-backlit sets still suffer from poor viewing angles, so looking at them from below can spoil your experience. An exhaustive 2008 DisplayMate study found that every LCD TV they tested suffered from noticeable color shifts at less than 15 degrees, far less than the angle from your couch to the top of a fireplace-mounted screen. LCD technology has improved somewhat in recent years, but unless you have a plasma screen or an expensive IPS display, you'll never get as vibrant a picture from a mantle-mounted TV as you would from one at eye level.
If you spent good money on a new flat panel, you want to put it in a position to shine. So avoid the fireplace and find another wall to mount it lower, or set it on an entertainment center. Your TV, neck, and eyes will thank you for it.
The Home Theater Mistake We Keep Seeing Over and Over Again | Apartment Therapy
Photo by ewen and donabel |
global_01_local_0_shard_00000017_processed.jsonl/46254 |
Re: Discussing ARIA in HTML5 integration
From: Gregory J. Rosmaita <[email protected]>
Date: Wed, 9 Apr 2008 23:45:17 +0100
To: Al Gilman <[email protected]>, Dan Connolly <[email protected]>
Message-Id: <[email protected]>
aloha! -- apologies for joining this thread late, but at least now my
ears have stopped burning...
IRC is a grand tool, but an imperfect tool, save in one aspect:
it has few equals in enabling the distortion of an out-of-context
comment into an accusation, as well as tinder for spreading heat,
rather than light...
for the record, i never stated as an individual or a member of any
particular working or interest group, that PF is ignoring HTML5;
i don't speak for any working group or behalf of any working group,
nor do i claim to do so; i DID, however, at the meeting from which
henri drew his quote (which was accredited to me, but is a scribe's
encapsulation of what i said), state that since PF has had no success
in getting everyone together in one place (virtual or physical) to
discuss the various suggestions and concerns as to how ARIA can be
integrated into HTML5, PF was redoubling its internal efforts to ensure
that its house was in order as regards ARIA 1.0 so as to ensure that it
is tight enough and clear enough to pass Last Call without any major
hurdles as to the consistency and clearness of the specification and
its use
needed today and yesterday, and that embedding ARIA in HTML5 test
cases is a non sequitur, because:
a) ARIA 1.0 is for today and yesterday's web;
b) that PF asked the HTML WG for native accessibility features to be
incorporated into HTML5 to the fullest extent possible, but in the
interim -- while such mechanisms are being developed in collaboration
between the HTML WG and pertinent WAI working groups -- ARIA will be
needed for today's script-heavy, semantically strapped web, as well
as for the evolving web -- all points made in al's initial formal
comments (as chair of PF) to the HTML WG -- the PF WG's actual request
Support for issues highlighted in Table: 1 of the ARIA Roadmap
[Note: the URI referenced directly above is now:
+ Backward compatability to ARIA, including the role attribute.
+ Allow for full interoperability with assistive technologies
+ A preference for access to accessibility information via the DOM
+ Reduced efforts by authors to support assistive technologies
+ Support for the access element or a version of it.
+ Maintain equivalent or improved accessibility features of HTML 4.01
c) that, given its nature and intent, ARIA 1.0 cannot be held up by an
evolving and unstable technology;
d) that HTML5 support amongst UA implementors varies; amongst assistive
technologies it is nonexistent (and in some cases, perhaps, impossible);
e) that the overwhelming mass of content on the web is HTML 4x and
XHTML 1.0 (roughly speaking) plus scripted slash dynamic content --
this is the content to which ARIA 1.0 needs to be applied, and has needed
to be applied for (at least) the past 6 to 8 years;
f) HTML 4x/XHTML 1.0 contains several mechanisms (such as LONGDESC
and the headers/id association for TABLE) which HTML5 currently does
NOT support, but for which there is extant support in extant assistive
technologies as well as in ARIA, but that the ARIA mechanisms are not
direct corallaries to their HTML5 equivalents -- in some instances,
"describedby" could provide a long descriptor, in others it cannot --
a long descriptor itself may be a tree or accordion widget which allows
an assistive technology user to follow the flow of a diagram, flow
chart, family tree, etc.);
g) that it is necessary to find a way to integrate current and future
ARIA markup into generalized as well as specialized markup languages;
especially HTML5, if the accessibility mechanisms defined in HTML 4x
are not retained or improved, and that PF and other WAI groups have
expressed an active interest in working with the HTML WG on ensuring
that mechanisms retained, changed or adapted from HTML 4x are superior
-- as well as implementable -- solutions which would (if the native
markup is used correctly) obviate the need for several aspects of
ARIA 1.0; however, since such an obsolescence is a panglossian view of
the future of HTML authoring, ARIA must have a means of being included
slash supported (an HTML + ARIA profile) now and in the future, not just
to accommodate improvements in ARIA and the addressing as yet unforseen
problems and obstacles that may arise between the issuance of ARIA 1.0
and the coalescence of HTML5
we spent almost 45 minutes on the HTML WG call on this specific topic,
in an attempt (at least on my part) to clear some basic misconceptions
as to: what PF asked for in its opening comments to the HTML WG; what
ARIA 1.0 is, is designed for, and how it should be used -- with the
understanding that native mechanisms should be developed to make as
much of ARIA 1.0 as redundant as possible in HTML5 -- but that the
development of those mechanisms and features cannot be allowed to delay
the implementation of ARIA 1.0 nor should they be an impediment to the
use of ARIA in HTML5, so that tools such as AccessMonkey can be used to
provide repair for poorly authored/generated document instances...
Men are not against you; they are merely for themselves.
-- Gene Fowler (1890-1960)
Gregory J. Rosmaita: [email protected]
From: Dan Connolly <[email protected]>
To: Al Gilman <[email protected]>
Cc: W3C WAI-XTECH <[email protected]>, HTML WG <[email protected]>, Chris
Sent: Wed, 09 Apr 2008 16:17:46 -0500
Subject: Re: Discussing ARIA in HTML5 integration
> On Wed, 2008-04-09 at 11:30 -0400, Al Gilman wrote:
> > Good points.
> >
> > On 9 Apr 2008, at 4:17 AM, Henri Sivonen wrote:
> > >
> > > I happened to find this curious statement in the IRC logs of a
> > > third WG:
> > > "Gregory: We (WAI) arranged a special meeting with HTML5 people to
> > > discuss Aria, and no one from HTML5 turned up"
> > > "... so we are ignoring them for the moment"
> > > http://krijnhoetmer.nl/irc-logs/xhtml/20080402#l-139
> Gregory said something like that in a recent HTML WG teleconference
> as well; I got the impression that there was some recent attempt
> to set up a teleconference and it didn't work out for various reasons.
> Such is life.
> > This demonstrates the downside potential of too much public
> > Things can get taken out of context, and taken too seriously.
> The cost of a few clarification mail messages is modest...
> > > On a more general note:
> > >
> > > Face-to-face meeting and telecons are problematic for discussing
> > > detailed technical things like language integration, because
> > > don't have the opportunity to re-study drafts, write test cases
> > > do research in order to make informed statements and change their
> > > opinions based on verified information in the middle of the
> > > conversation. Moreover, by charter[1], the HTML WG "primarily
> > > conducts its technical work on a Public mailing list public-html".
> > > After all, face-to-face meetings and telecons would discriminate
> > > against a substantial number of HTML WG participants.
> Meanwhile, email isn't perfect either; the occasional supplementary
> teleconference, IRC chat, etc. can help quite a bit.
> --
> gpg D3C2 887B 0F92 6005 C541 0875 0F91 96DE 6E52 C29E
Received on Wednesday, 9 April 2008 22:46:03 GMT
|
global_01_local_0_shard_00000017_processed.jsonl/46258 | W3C home > Mailing lists > Public > [email protected] > February 2005
Re: ODM document -- n-ary relations
From: Elisa F. Kendall <[email protected]>
Date: Wed, 09 Feb 2005 14:00:08 -0800
Message-ID: <[email protected]>
To: Natasha Noy <[email protected]>
CC: swbp <[email protected]>
Hi Natasha,
I'll check with Bob Colomb, DSTC, on his intent there. What you are
looking at in that particular
diagram is what's called an "association class", which allows you to add
structural information
to an association. The dashed line from the center of the "enrolled"
property to the box below it
is a kind of dependency, that connects the association class to the
association. We didn't use this
later in the specification, and as a few others who reviewed this
section have pointed out, it needs
alignment with the implementation described in the RDFS and OWL
Metamodel sections of the
document. We would really appreciate it if you have time to take a look
at those sections as well,
primarily chapters 11, 12 and 16. If you are not familiar with UML 2,
reviewing the mapping,
which is presented in chapter 18, would be difficult at best.
Natasha Noy wrote:
> Jeremy has asked me to look at the small piece of the ODM document
> that deals with n-ary relations (bottom of page 68-top of page 69).
> It looks fine to me, except for the last property in the OWL fragment:
> why is there a property that goes from enrolled to enrolled? Am I
> missing something?
> Natasha
Received on Wednesday, 9 February 2005 22:39:43 GMT
|
global_01_local_0_shard_00000017_processed.jsonl/46259 |
Re: [hybi] [Uri-review] ws: and wss: schemes
From: Jamie Lokier <[email protected]>
Date: Wed, 19 Aug 2009 17:46:18 +0100
To: [email protected]
Cc: 'David Booth' <[email protected]>, Kristof Zelechovski <[email protected]>, [email protected], 'Ian Hickson' <[email protected]>, [email protected], [email protected], [email protected]
Message-ID: <[email protected]>
[email protected] wrote:
> Jamie Lokier writes:
> > A HTTP URL does not tell you the type of resource, only where to
> > find _a_ resource.
> This misses an important point about http URIs and the HTTP protocol.
> Although the URL itself does not tell you the type of the resource, the
> response to an HTTP GET does indeed tell you the type of the entity body.
> So, you can access any such URI on the Web, and you'll either: (1) know
> how to interpret the response, I.e. because you recognize the Content-type
> and know how to process data of that type, or (2) will reliably discover
> that it's of a type you don't know how to process. These characteristics
> are what make it possible for you to click on any link, and know that your
> browser won't misinterpret the results, even as new Content-types are
> deployed (well, let's not get into the sniffing discussion just now). It's
> also what allows search engine spiders to interpret the results returned
> from GETs on pretty much any http link.
Firstly, I agree with the usefulness of Content-Type, which is why I
think it would be helpful if the WebSockets protocol defined something
equivalent, even just a single string to identify the protocol at the
Secondly, this thread has talked about protocols on top of protocols
(because every WebSockets application will be one). Given a URI, you
cannot tell from Content-Type whether that URI supports WebDAV, and
you cannot tell whether that URI accepts POSTs to submit new blog
entries - just to pick two widely used examples.
That requires another level of descriptive metadata, which
Content-Type does not provide and is not always available in any other
form. But, just like people can enter a "blog posting" URI into their
mobile phone, there will be reasons why people enter WebSockets URIs
into applications, with no way for the application to verify the
protocol except by trying it.
> So, this is a desirable characteristic for Web resources, and it's
> one of the things that HTTP gives you. Indeed, the whole Web is
> designed so that you can start with RFC 3986, the specification for
> URIs, and using the references to which it (recursively) delegates,
> discover how to correctly interact with and interpret responses from
> any resource on the Web. Under the auspices of the W3C TAG, I
> prepared a "finding" [1] that goes into more detail on these issues
> and their implications.
In other words, I disagree with the above. You can't find which
particular protocols are overlaid on top of HTTP at every findable URI
by the existing mechanisms, and it's unlikely that will ever be
> I do
> think it is an interesting question (I think I've raised it before),
> whether we expect search engines to come on ws/wss links,
> and if so,
> whether it's valuable for those search engines to be able to discover
> information about the resources identified by those links.
It's an intersting question, but please don't get too sidetracked from
the (imho) more important question of ensuring that specific web
applications can connect to WebSockets resource whose URI is provided
by a third party, with a reasonable level of safety and security.
-- Jamie
Received on Wednesday, 19 August 2009 16:47:06 GMT
|
global_01_local_0_shard_00000017_processed.jsonl/46261 |
RE: Text email newsletter standard
From: Patrick Lauke <[email protected]>
Date: Wed, 8 Dec 2004 11:17:26 -0000
Message-ID: <3A1D23A330416E4FADC5B6C08CC252B9FD6BDD@misnts16.mis.salford.ac.uk>
> From: Mike Brown
> has anyone come across, or used, the following text email newsletter
> standard:
> http://www.headstar.com/ten/
Yes, stumbled across it a while ago
> If so, or even if you haven't but are able to look through,
> how useful
> do you think it is?
At its essence, it tries to add structural information of sorts to an inherently un-structured medium, plain text. I'll admit that I don't use it and haven't heard any user feedback about it, but I'd say that it's an interesting idea, as long as it's used consistently. However, I'm intrigued as to their decision to call it a "standard".
> Would the points outlined in the standard aid
> accessibility?
Insofar as it adds pseudo-structural information, it's certainly useful to a certain extent. However, to my knowledge there are no tools that would then allow users to extract (or otherwise take advantage of) this structural information, which limits TEN's usefulness.
Oh, I see it's been mentioned on this list before and there are some very good points made in Jon Hanna's reply.
Patrick H. Lauke
Webmaster / University of Salford
Received on Wednesday, 8 December 2004 11:20:21 GMT
|
global_01_local_0_shard_00000017_processed.jsonl/46262 |
Re: Tables and the Summary attribute
From: David Woolley <[email protected]>
Date: Thu, 29 Sep 2005 07:39:10 +0100 (BST)
Message-Id: <[email protected]>
To: [email protected]
> Umm no, I don't think so. The audience is other accountants and economists
> - not web designers.
In that case, you are not in a position to make the page accessible;
a lot of the work needs to be done by the content providers. Actually,
I believe that one of the original aims of HTML was to be simple enough
to eliminate the middle man. You are basically acting as a machine
and it is well known that machine based accessibility checking doesn't
work reliably.
Accessibility is not something that can be added by someone who doesn't
understand the intended meaning of the content.
There is a similar problem in user documentation written by technical
authors. It is often in perfect English, but is wrong or incomplete
because the author didn't understand the subject.
Received on Thursday, 29 September 2005 06:40:57 GMT
|
global_01_local_0_shard_00000017_processed.jsonl/46263 |
Re: Research notebook: On edge-labelled graphs in XML
From: Simon Cox <[email protected]>
Date: Thu, 07 Sep 2000 11:19:15 +0800
Message-ID: <[email protected]>
To: Dan Brickley <[email protected]>
CC: [email protected]
Thanks Dan -
Rather conspicuously absent from the collection is a very significant
form of edge-labelled graph - UML class diagrams.
I guess OMG must be working on this - XMI is a first cut but aimed narrowly
at allowing UML to be archived or transferred between CASE tools.
I just took a quick look at their website but there is little to
help there yet.
There is also considerable interest in developing a standardised way of
generating instances expressed as XML documents according to models
expressed in UML.
Answers I've seen vary depending on whether a XML Schema doc is involved or
not (Schema can work at approximately the same metalevel as the UML).
But most examples that I've seen jumble the metalevels, and use both
class (type) names and attribute- or role-names (accessors or object-names)
as elements, either inconsistently, or in a striped (and thus bulked-up) document.
[email protected] CSIRO Exploration & Mining
T:+61(8) 9284 8443 F:+61(8) 9389 1906 M:0403 302 672
Received on Wednesday, 6 September 2000 23:19:30 GMT
|
global_01_local_0_shard_00000017_processed.jsonl/46266 |
Re: Validator doesn't send HTTP_ACCEPT headers, "Conflict between Mime Type and Document Type" warning is incorrect.
From: Gez Lemon <[email protected]>
Date: Tue, 31 Jul 2007 16:49:46 +0100
Message-ID: <[email protected]>
To: "Sierk Bornemann" <[email protected]>
Cc: "Andries Louw Wolthuizen" <[email protected]>, "www-validator Community" <[email protected]>
On 31/07/07, Sierk Bornemann <[email protected]> wrote:
> Of course, this would be sane. But how to translate into a working
> solution *without* asking the client's (in this case the valdator's)
> accept header?
> Any suggestion? Any algorithm out there (for PHP or JSP or other
> frameworks) does rely on the browser's accept header and asks for the
> *existance* of "application/xhtml+xml" in the accept header of the
> client.
> I, so far, have never seen any working solution, which asks for the
> *non-existance* of "application/xhtml+xml". All implementations of
> the algorithm cited, I have seen so far, do ask for the *existance*
> of "application/xhtml+xml".
> So, how would you implement the *opposite* of that, if you have
> requesting user agents, which provide an empty accept header string
> or provide a meaningful "*" as the Internet Explorer does?
You could first check that there is an HTTP_ACCEPT header. If not,
deliver application/xhtml+xml; otherwise, test if
application/xhtml+xml is in the accept header. That caters for all the
scenarios you mentioned. The following serves text/html to IE,
application/xhtml+xml to Firefox (and other browsers that state they
can handle it), and application/xhtml+xml to the validator (as it
doesn't send the accept header):
header("Vary: Accept");
if (stristr($_SERVER[HTTP_ACCEPT], "application/xhtml+xml") === FALSE) {
else {
header("Content-Type: application/xhtml+xml; charset=utf-8");
else {
Supplement your vitamins
Received on Tuesday, 31 July 2007 15:49:53 GMT
|
global_01_local_0_shard_00000017_processed.jsonl/46274 | [lkml] [2006] [Dec] [8] [last100] RSS Feed
Messages in this thread
SubjectRe: [PATCH] WorkStruct: Implement generic UP cmpxchg() where an arch doesn't support it
On Fri, 8 Dec 2006, Russell King wrote:
> The only instructions which affect the exclusive access state are the
> exclusive access instructions themselves.
Not according to the docs I found.
The ARM1136 manual explicitly states that any attempt to modify that
address clears the tag (for shared memory regions, by _any_ CPU, and for
nonshared regions by _that_ CPU).
And btw, that _has_ to be true, because otherwise the whole ldrex/strex
sequence would be totally unusable as a way to do atomic bit operations on
UP in the presense of interrupts (well, you could have a clrex instruction
in the interrupt handler, but as far as I know you don't, so that seems to
be a moot point - you only seem to do it in __switch_to).
In other words, I _really_ think you're wrong.
So the very code sequence you quote MUST NOT WORK the way you claim it
does. And not only that, since the granularity of the mark is not just for
the bytes in question, but potentially apparently up to 128 bytes, any
store even _close_ to the memory you had xclusive access to will break the
exclusive access.
Really, Russell. Your stance makes no sense. It doesn't make any sense
from a microarchitectural standpoint (it's not how you'd normally
implement these things), but it ALSO makes no sense from the way you
already use those instructions (as a way to protect against other
processors - including your own - touching that word).
the body of a message to
More majordomo info at
Please read the FAQ at
\ /
Last update: 2009-11-18 23:46 [W:0.178 / U:1.756 seconds]
©2003-2011 Jasper Spaans |
global_01_local_0_shard_00000017_processed.jsonl/46297 | Subject: Re: PPP problems with sup as of 2/20/98
To: Jeremy Cooper <>
From: Sean Brandt <>
List: current-users
Date: 02/23/1998 15:45:05
-----Original Message-----
From: Jeremy Cooper <>
To: Bill Studenmund <>
Cc: Sean Brandt <>; [email protected]
Date: Monday, February 23, 1998 3:37 PM
>On Mon, 23 Feb 1998, Bill Studenmund wrote:
>> On Sun, 22 Feb 1998, Sean Brandt wrote:
>> > I recompiled kernel and userland on friday, and since then ppp does not
>> > work, either in demand, or direct dial never fires off chat,
>> > has to be killed with a sigkill. I've tried with both uvm and not, with
>> > serial console and not...Very confused :) Anyone have any ideas to try?
>> Either ktrace it, or put in log statements.
>> If it dies where pppd hangs up the modem (in pppd/main.c), then it's the
>> same problem I ran into just recently. Somehow the TIOCMBIC ioctl is
>> causig pppd to hang.
>There was a bug recently introduced (and fixed I believe) in the i386
>serial port port code which caused certain ioctl() calls to effectively
>loop forever. I'll bet that you (Bill) are certainly hitting it. It may
>be the same case for Sean.
That was what seemed to be the problem, though even after sunday's sup it
didn't fix until I removed my serial console from the config...I'm going to
try to recreate it, and if so I'll send-pr it.
- Sean |
global_01_local_0_shard_00000017_processed.jsonl/46301 | Subject: [ANNOUNCEMENT] The pkgsrc-2007Q1 Branch
To: None <>
From: Alistair Crooks <>
List: netbsd-users
Date: 04/19/2007 11:57:56
The pkgsrc-2007Q1 Branch
The pkgsrc developers are very proud to announce the new pkgsrc-2007Q1
branch, which has support for more packages than previous branches.
As well as updated versions of many packages, the infrastructure of
pkgsrc itself has been improved for better platform and compiler
support, and also for enhanced security.
At the same time, the pkgsrc-2006Q4 branch has been deprecated, and
continuing engineering starts on the pkgsrc-2007Q1 branch.
Some highlights of the new pkgsrc-2007Q1 branch are:
advantage of fixes and improved functionality. This includes
+ apache-2.2.4
+ firefox-
+ gnome-2.16.1
+ kde-3.5.6
+ mysql-5.0.37
+ openoffice-2.2.0
+ opera-9.10
+ postgresql-8.2.3
+ ruby-1.8.6
+ samba-3.0.24
+ seamonkey-1.1.1
+ thunderbird-
+ wireshark-0.99.5
+ zope-3.3.0
+ other changes include
+ more modular X11 packages have been added, including the modular
X server modules, and many X clients. We have started the work
to make the "xorg" X11_TYPE obsolete.
+ a new "filesystems" category, and a lot of FUSE-based file
systems, including fuse-lzofs, fuse-curlftpfs and fuse-ntfs-3g
+ the addition of some pertinent bright, shiny packages such
as ktorrent, gdl, gnome-build, pam-af, emacs-wiki,
jdbc-postgresql82, bsign, qmqtool, serf, mppenc, csup,
librlog, sun-jre6, sun-jdk6, jflex, xmlrpc-c, diffsplit,
wide-dhcpv6, taskjuggler, spamdyke, and compiz
The full list of platforms supported by pkgsrc is: AIX, BSD/OS,
Darwin (Mac OS X), DragonFly BSD, FreeBSD, IRIX, Interix, Linux,
NetBSD, OSF1, OpenBSD, and SunOS (Solaris). We would also like to add
support for more platforms - please get in touch if you, too, are
much improved, and our thanks to the pkgsrc releng team for all the
hard work they do in sanity checking pullup requests, and managing
the stable branches in pkgsrc.
+ constant bulk building on a number of platforms has improved our
ability to identify potential areas of concern, and to correct them
sooner. It has also improved our ability to make binary packages
archives available at
+ the number of packages has been increased to 6588; the number of
supported platforms continues to be 12. NetBSD, on all its supported
architectures, is considered to be one pkgsrc platform.
install and run pkgsrc/security/audit-packages at least every day -
this will provide notification of any packages which are vulnerable to
exploit. The pkgsrc-security team do a marvellous job in tracking
notifications of vulnerabilities in packages, and disseminating this
information, and our sincere thanks go to them for this essential work.
We'd also really appreciate it if people would install the
machine, and the operating system and release level of the operating
help us analyse the packages that are most used.
You can also use the "pkgsrc-2007Q1" tag to check it out yourself from or any of the mirrors.
Alistair Crooks
On behalf of the Packages Team
The NetBSD Foundation |
global_01_local_0_shard_00000017_processed.jsonl/46303 | pkgsrc-Users archive
Re: Call for tests: pkg_install-renovation
On Wed, Jun 11, 2008 at 02:40:40PM +0100, Alistair Crooks wrote:
> > Use of digital signatures in pkg_install
> >
> > (1) pkg_vulnerabilities: list of known vulnerabilities, provided by
> > the pkgsrc security team and updated regulary
> > (2) binary packages: check who provided binary packages
> (3) verify that the package has not been modified in any way
The first two points where meant to be formulated out more. There is one
important related topic here I will bring up separate.
> > For (1) gpg is currently the only choice. After pkgsrcCon (?) a PKCS7
> > signature will be added as well. With the pkg_install-renovation branch,
> > PKCS7 is the only supported verification mechanism for (2) and preferred
> > for (1) once the infrastructure exists.
> This needs to be discussed more fully, timelines (even relatively obscure
> ones like the above) need to be omitted for documents which may live a
> while, etc.
The idea is that once the PKCS7 signature is provided for
pkg-vulnerabilities, GPG is deprecated. We can just provide it for the
sake of the old audit-packages and remove the above paragraph
> Again, we need to expand this:
With the exception of the pkgsrc-security certificate, I would like to
leave the other questions out for now. The possible policies vary a lot
between "I run my own bulk builds for use on other machines" over "I run
bulk builds for $RANDOM_OS" to "I provide the official binary packages
for NetBSD/$ARCH". There should be a sane policy for most or all of this
questions, but we don't have a single answer at the moment, so I would
prefer if we don't give one right now.
> > How to create your own keys:
> > - find the script shipped with OpenSSL
> > (/usr/share/examples/openssl on NetBSD)
> > - run -newca to create the root certificate, the meta data is only
> > for human beings, so feel free to provide sensible input
> > - in demoCA/newcerts/00.pem is the public key, you can use that as trust
> > anchor
> > - create a subkey using -newreq, followed by -sign. This
> > creates newcert.pem (public key) and newkey.pem (private key), those
> > will be given to pkg_admin sign-package as arguments
> The notion of a "sub-key" needs to be explained. Possibly public key as well,
> since up to now, all the talk has been about certificates.
> > The location of demoCA might change depending on your openssl.cnf
> > (typically in /etc/openssl).
> >
> > If not sure about the process, read one of the many, many documents on
> > the internet. The above is the bare essential.
> Well, if we can't document this ourselves, it doesn't deserve to be
> there. We need to document the process that a user needs to go through
> to verify binary packages. References to other documents are good,
> but we need to document the process ourselves fully.
The bare essential is refering to how to setup a basic CA. I don't think
we *should* discuss every impossible implications of this topic, simply
because it doesn't add any value. The target of the description is a
minimal CA for the purpose of providing binary packages for local
consumption or similiar uses. If you want to setup a full scale CA,
other places ar ebetter introductions.
I'm looking for help partially to make clear what this document is
intended to provide and what *not*.
Home | Main Index | Thread Index | Old Index |
global_01_local_0_shard_00000017_processed.jsonl/46305 | Subject: porting to a SA1100/1101 system
To: <>
From: David Laight <>
List: port-arm
Date: 01/28/2002 15:42:40
I've a system here that has a strongam SA1100 and sidekick (SA1101)
which really ought to be running netBSD :-)
However I'm not sure what state the netBSD kernel expects the system to
be in when it is entered, nor where it expects to be loaded. (I realise
there are also a load of device drivers to get sorted as well.)
This system isn't running WinCE (it isn't put together the right way).
However I do have access to all the existing boot code, so could, for
instance, load a file image from the local flash filesystem into DRAM
before the MMU is enabled (it would be a lot faster if the mmu is on
Is there any documenation lurking I should read? Or does anyone have any
useful hints?
Look to me like the existing ports - SHARK is PCI + openboot, hpcarm
boot from wince - aren't quite 'raw' enough for this device. |
global_01_local_0_shard_00000017_processed.jsonl/46311 | Subject: inetd and AF_UNIX services
To: None <>
From: Ian Zagorskih <>
List: tech-net
Date: 02/20/2004 17:06:21
Hey All,
As far as I understand, for now inetd uses only AF_INET and derived stream
sockets for incomming connections. On the other hand, I would like to access
inetd's service with AF_UNIX socket. It it possibly ? Maybe there are some 3d
party implementations of inetd server that support AF_UNIX connections ?
// wbr |
global_01_local_0_shard_00000017_processed.jsonl/46314 | tech-pkg archive
Re: What kind of BSD license is meant?
Jens Rehsack <> writes:
> Hubert Feyrer wrote:
>> On Thu, 21 May 2009, Jens Rehsack wrote:
>>> I'm currently updating devel/p5-DATA-UUID
>>> ( and there is as LICENSE simply
>>> named 'BSD' with the following text:
>> ...
>>> Which license is meant? The original BSD license or the modified one?
>> Why do you think it's a BSD license at all - just by the name of the
>> file?
> No, but by the statement in META.yml:
> 'license: BSD'
there is explicit text. You have to diff the text with existing files
to see if they match. It makes no sense to look at the operative
properties and say it's sort of like a BSD license. In this case, it's
not a BSD license. There's a notion that permission is granted only to
those who acknowledge lack of warranty or something. That's not
intrinsically unreasonable, but it's a huge legal change, from bare
license to an attempt at a contract license (which may or may not make
Just because someone else put "license: BSD" in META.yml (whatever that
is) doesn't make it so. That could well be someone else's attempt to
sort licenses into two bins, or it could be wrong.
Again, I think the benefits from tagging free licenses are minimal, and
cases like this I'd be happy to leave a
# License is more or less BSDish, but not exactly.
in pkgsrc and let it be until later.
It's also reasonable to ask upstream to clarify the license to *exactly*
the text of an OSI/FSF-approved license, but that can only be done with
permission from all copyright holders so may not be all that likely.
I think what this is all pointing out is that there is a lot of pain
From pkgsrc being on the leading edge of licensing purity/clarity.
Attachment: pgplQsHsMnN8v.pgp
Description: PGP signature
Home | Main Index | Thread Index | Old Index |
global_01_local_0_shard_00000017_processed.jsonl/46315 |
To: None <[email protected]>
From: Space Case <>
List: tech-userlevel
Date: 12/11/1997 17:47:37
On Dec 11, 1:13pm, Ty Sarna wrote:
>I vote for section H. Or, if it's deemed appropriate to have two
>sections for user and sysadmin how-tos, which might be a good idea (like
>1 vs 8), I'd vote for section A (administrative procedures) and H (user
I was going to suggest 'h' as well. I've seen a number of packages
off the net use 'n', so it's not like using letters as section ID's
is unheard of.
Steven R. Allen -
without looking to see whether the seeds move.
Contrary to popular belief, Unix is user friendly.
-Kyle Hearn <>
What the large print giveth, the small print taketh away. |
global_01_local_0_shard_00000017_processed.jsonl/46323 | Social Media
The Staggering Size of the Internet [INFOGRAPHIC]
The Internet is a big place. How big? Try gigantic. The infographic above, from the folks at Focus, attempts to visually represent some of the mind-boggling numbers that defined the Internet circa 2010 — the result is certainly pretty, but still not very easy to wrap your head around.
How, for example, does one simply imagine the 2 billion videos being watched on YouTube each and every day? How is it possible that 35 hours of video can be uploaded to the site every minute? What do 36 billion photos look like? Ask Facebook; that's how many photos are uploaded to the site each year. (More than seven times as many have been uploaded to Flickr in that site's entire existence, by the way.)
These numbers aren't necessarily easier to comprehend in infographic form (107 trillion e-mails?!), but they're definitely easier to take in. If you're not a visual learner, however, the graphic seems to be mostly based on a post earlier this month from the Royal Pingdom blog, which lists all those stats in plain text.
Load Comments
The New Stuff
The Next Big Thing
What's Hot |
global_01_local_0_shard_00000017_processed.jsonl/46326 | Silent Circle
The Super-Secure Blackphone Is Here, But It's Not NSA-Proof
Blackphone, a new security and privacy-focused smartphone is finally launching, but if you think it's a shield against the NSA or other powerful intelligence agencies snooping on your private communications, you're probably out of luck. The producers of the new phone, which will be revealed Monday at Mobile World Congress in Barcelona, promise that it's the most secure smartphone on the market. But even they admit there are some enemies you just can't protect from.
RIP Google Reader and Winamp: 10 Tech Products We Lost in 2013
As 2013 comes to a close, it's important not only to look back at what we gained this year, but what we lost as well. From the death of Google Reader to the failure of the HTC First to the discontinuation of the iPhone 5, we saw lots of high profile products disappear. See also: RIP Google Reader The past year also saw the end of many legacy products and services.
Email Providers Build Service to Protect Your Inbox From the NSA
In August, Ladar Levison, the founder of Lavabit -- the email service provider allegedly used by Edward Snowden -- decided to shut down the entire company rather than comply with a broad surveillance request. A few hours later, spooked by Levison's extreme move, private communications startup Silent Circle abruptly and preemptively shut down its own email service, too.
Kim Dotcom's Mega to Launch Encrypted Email Service
Kim Dotcom's Mega is working on a secure, encrypted email service that promises to include all the functionalities of modern cloud-based services while keeping messages safe from snooping. Just several days after encrypted email services Lavabit and Silent Circle shut down, citing concerns related to NSA surveillance and government requests for user data, Mega's CEO Vikram Kumar confirmed rumors that Mega is developing an encrypted email service. |
global_01_local_0_shard_00000017_processed.jsonl/46328 | Take the 2-minute tour ×
I'm not sure how to go about finding the solution to this question.
Let R be a ring with identity such that $x^2 = 1_R$ for all $0_R \neq x\in R$. How many elements are in $R$?
I've just been playing around with squaring elements, like $$(x+1_R)^2 = x^2+2.x+1_R =2.x+2.1_R = 1_R.$$
But I'm not sure where to go with this. Any help?
share|improve this question
Either $1_R+1_R=0$ or $(1_R+1_R)^2=1_R$ so $3\cdot 1_R=0$. – Davide Giraudo Mar 5 '12 at 20:15
add comment
2 Answers
One possibility, of course, is $R=\{0\}$. Assume $1_R\neq 0$.
$R$ has no zero divisors: if $xy=0$ and $x\neq 0$, then $y = 1_Ry = xxy = x(0)=0$.
$R$ is commutative: if $x$ and $y$ are nonzero, then so is $xy$ by the above; hence $(xy)^2 = x^2y^2$; canceling from $xyxy=xxyy$ we get $yx=xy$.
(Of course, the ring satisfies $x^3=x$ for all $x$, so by a famous theorem of Jacobson, the ring is necessarily commutative; but we don't need to call in that heavy cannon to the fray).
Since every nonzero element is invertible, $R$ is a field. Since $x^2-1_R$ has $|R-\{0\}|$ solutions, we have $|R-\{0\}|\leq 2$, so $|R|\leq 3$.
If $1_R+1_R=0$, then $R$ is of characteristic $2$, so $R\cong \mathbb{F}_2$ and $|R|=2$. And, indeed, in this case the hypothesis holds.
If $1_R+1_R\neq 0$, then we get $4\cdot 1_R = 1_R$, hence $3\cdot 1_R=0$, so $R$ is of characteristic $3$, and therefore $R\cong\mathbb{F}_3$ and $|R|=3$. Again, the hypothesis holds for this ring.
In summary, $R$ has either $1$, $2$, or $3$ elements, and is either the trivial ring, $\mathbb{F}_2$, or $\mathbb{F}_3$.
share|improve this answer
Thanks, this is very helpful, but why does $x^3=x$ imply that $R$ is commutative? – 098765 Mar 5 '12 at 20:28
@098765: It is a common exercise in Ring Theory, and also a consequence of a famous Theorem of Jacobson, which states that a ring for which there exists $n\gt 0$ such that $x^n=x$ for all $x$ is always commutative. But I gave a simpler derivation that does not call upon such heavy artillery in an edit. – Arturo Magidin Mar 5 '12 at 20:33
@ArturoMagidin am pleased you revised your answer, because the proof that $x^3 = x$ implies R is commutative isn't trivial, and is probably beyond the stage at which the asker of this question is at. – David Wheeler Mar 5 '12 at 20:53
Does your proof actually depend on commutativity? (mine does not). If not, then you can omit the proof of comutativity, since it's a trivial consequence of the final result. – Bill Dubuque Mar 5 '12 at 22:42
@Bill: I use commutativity only to conclude that I have a field rather than a simply division ring; I believe it is equivalent to your "$x^{-1}=x\Rightarrow R$ field". – Arturo Magidin Mar 6 '12 at 3:54
add comment
$\rm R=0\:$ works. Else $\rm\ x\ne 0$ $\Rightarrow$ $\rm x^2 =1$ $\Rightarrow$ $\rm x^{-1} = x $ $\Rightarrow$ $\rm R$ field, so $\rm\: x\ne 0\!\iff\!\! (x-1)(x+1) = 0$ $\iff$ $\rm x=\pm 1.\:$ But $\rm\: R\backslash0 = \{\pm1\}$ $\!\iff\!$ $\rm R\:\! \cong\:\! \mathbb Z/2\:$ or $\:\mathbb Z/3$.
More generally, the finite fields $\:\rm\mathbb F_p,\: \mathbb F_q,\ p,q\:$ prime, are axiomatized by the ring axioms plus $$\rm x^n =\: x,\quad n\: =\: 1 + lcm(p\!-\!1,q\!-\!1)$$ $$\rm q\:(x^p-x)\: =\: 0\: =\: p\:(x^q-x)$$ $$\rm pq\: =\: 0$$
Thus any identity true in both of these fields has a purely equational proof from the above axioms. This theorem extends similarly to any finite set of finite fields, for example see Stanley Burris and John Lawrence, Term rewrite rules for finite fields (1991). This result is very closely related to Jacobson's model-theoretic proof of commutativity of rings satisfying the identity $\rm\: x^{n_x} =\: x$.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/46329 | Take the 2-minute tour ×
What is the limit as $x\to\infty$ of $\cos x$?
Thanks in advance.
share|improve this question
In the immortal words of Lindsay Lohan... – Qiaochu Yuan Jan 19 '11 at 15:21
@Qiaochu: your joke eludes me. Citation please? – Willie Wong Jan 19 '11 at 19:18
@Willie: youtube.com/watch?v=QIMSC-RWvF8 (skip to 7:40 for the problem and 8:10 or so for its solution). – Qiaochu Yuan Jan 19 '11 at 19:22
thank you Qiaochu! Damn that was worth wasting 9 minutes of my life! – Arjang Jan 21 '11 at 8:50
add comment
4 Answers
The limit does not exist. It oscillates between -1 and 1. Just so that you know, the limit supremum or infimum as $x \to \infty$ is given as
$$\lim \sup_{x\to\infty} \cos(x) = 1$$ $$\lim \inf_{x\to\infty} \cos(x) = -1$$
share|improve this answer
add comment
The limit does not exist because $\cos{(2\pi n)} = 1$ for $n \in \mathbb{Z}$ and $\cos{(\pi + 2 \pi n)} = -1$ for $n \in \mathbb{Z}$.
share|improve this answer
add comment
There is no limit, $\lim_{x \to \infty} \cos x$, since $\cos$ oscillates between -1 and 1.
A bit more detailed: We say that a function $f(x)$ has a limit as $x \to \infty$ if there exists a real number $a$ (called the limit) such that $|f(x)-a|$ can be made arbitrarily small for all $x$ which are "large enough". "Large enough" and arbitrarily small means that for all $\varepsilon > 0$, we should be able to find a number $N$ such that $|f(x)-a| < \varepsilon$ for all $x > N$.
In the case of $f(x) = \cos x$ we can't do this when $\varepsilon$ is small. Independent of which $a$ we are trying out, we can always find a large enough $x$ such that $|\cos x - a| > \frac{1}{2}$ (for example), and infinitely many of them (since $\cos$ is periodic).
As Roupam Ghosh stated in his answer, the $\limsup$ and $\liminf$ for $\cos x$ as $x \to \infty$ are not equal. This gives that the limit does not exist, since then you can always find sufficiently large $x,y$ such that $|f(x)-f(y)|=\left|\limsup_{x \to \infty}\cos x - \liminf_{n \to \infty} \cos x\right|\geq\varepsilon>0$.
share|improve this answer
add comment
I believe that the proofs given are not rigorous enough, and are not necessarily easy to understand to someone who is not familiar with the material, so I'll try a more rigorous approach. I'll assume every variable I'm referring to is a real number in R.
Assume that there is a limit k. In that case it must be that for every d there exist N>0 so that if n>N we have that |cos(n)-k|<d.
Since cos(x+n2pi)=cos(x), it is easy to see that for every N we can find a number n0>N for which cos(n0)=0, and another number n1 for which cos(n0)=1. Try to prove that, it's not so hard.
Let d=1/2, whatever k would be, we'll have that either |cos(n0)-k|=|k|>d=1/2 or |cos(n1)-k|=|1-k|>d=1/2.
Therefor no number is the limit of limn→∞cos(n). Since cos(n) is bounded it cannot be that the limit is or -∞.
share|improve this answer
Your notation is misleading. What are $n$ and $N$? Are they positive integers? – Aryabhata Jan 19 '11 at 13:14
I don't quite see your point. If $a = \lim_{x \to \infty} \cos{(x)}$ existed then by definition it would be the limit of every sequence of real numbers $x_{n} \to \infty$, so it suffices to exhibit two sequences converging to different limits. – t.b. Jan 19 '11 at 14:26
Good point! I think integer or real doesn't really matter. Tried to clarify this issue. – Elazar Leibovich Jan 19 '11 at 14:48
@Theo, my point is, (1) you have to spell out the reason like you did, and I didn't find that in the answers, (2) sometimes the TA wants the answer in an epsilon-delta form. – Elazar Leibovich Jan 19 '11 at 14:50
@Elazar: We are not being graded by a TA on this site. You can supply a lot of detail if you like, but it is not expected that full details are spelled out in each answer, especially if the question is for homework. – Jonas Meyer Jan 21 '11 at 7:29
show 1 more comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/46330 | Take the 2-minute tour ×
Is there any simple formula or algorithm for determining if a point lies above or below the sine curve? For instance, if I have a point $(x, y)$, how can I test whether or not $y > \sin(x)$? Obviously taking the actual $\sin(x)$ (or $\cos(x)$) is not an option otherwise I wouldn't be asking.
All three angles, $A, B$, and $x$ are first-quadrant angles in $[0, 90°]$.
Additionally, I know two reference points, A and B such that A < x < B, and I know both the sine and cosine of A and B. I thought perhaps comparing slopes might be useful, for instance, I know that the slope of the tangent at A is greater than the slope of the secant from A to x, which is greater than the slope of the secant from x to B, which is greater than the slope of the tangest at B. But I haven't been able to come up with a way to actually use any of that.
To clarify what I'm after: I'm working on doing rapid estimations of various useful functions like sines, cosines, exponents, logs, etc., for the many cases that arise in which fast, approximate answers are useful (e.g., assumption checking during debugging or feasibility evaluation).
I'm currently able to estimate sines and cosines of any angle in degrees to within $10\%$ error, but I'd really like to be able to take those initial estimates and then refine them further with some kind of simple iterative process that can be carried out relatively quickly with pencil and paper. I find this useful in various situations, for instance in the lab or in group brainstorming sessions, in which a calculator is not readily available.
share|improve this question
Why can't you take the actual sin(x) value? – fosho Sep 28 '12 at 17:04
Because I'm doing this by hand, without a calculator or look up table. I know the sines of certain landmark angles (the multiples of 10-degrees) and I'm trying to figure out how to use these to find the sine of other angles by hand. – sh1ftst0rm Sep 28 '12 at 17:10
What is the reason for the downvote? Please explain it for us to improve our questions. – Makoto Kato Sep 28 '12 at 18:36
add comment
3 Answers
up vote 3 down vote accepted
For $0\le x\le\frac\pi2$, you have
• $\sin x\le 1$
• $\sin x \le x$
• $\sin x \le \sin \alpha+(x-\alpha)\cos\alpha$ for suitable $\alpha\in[0,\frac\pi2]$
• $\sin x \ge 1-\frac{(\pi-x)^2}2$
and several other simple approximations that may cover many cases. However, if $y\approx \sin x$, you can hardly avoid calculating $\sin x$.
share|improve this answer
I'm not familiar with that third point: can you describe where this comes from and how I would choose an appropriate alpha? (Or give me the name of a theorem, for instance). Thanks! – sh1ftst0rm Sep 28 '12 at 17:14
add comment
Well, $|\sin x| \le 1$ for all $x \in \mathbb{R}$. It follows that if $y < -1$ then $(x,y)$ is below the sine curve, while if $y > 1$ then $(x,y)$ is above the sine curve. The case where $-1 \le y \le 1$ is more complicated, and may well require direct calculation.
share|improve this answer
add comment
If there was a simple way to do this, that worked reliably on all inputs, then it would have to work even if $y$ was very close to $\sin(x)$. But to do that, it would effectively have to calculate $\sin(x)$.
So no, there is no simple way.
share|improve this answer
Hi, Tony. Is that more than just a gut instinct? I know primality is a lot different than a continuous function, but just as an illustration you can definitively test if a number is prime, but those tests won't actually produce a prime number on their own. And for sine, for instance, it is always the case the $\sin^2x + \cos^2x = 1$, so that is a definitive test for sine which just happens to not be useful because it requires me to know the cosine a priori. – sh1ftst0rm Oct 1 '12 at 12:19
Yes, it's more than just a gut instinct. If $|y-\sin(x)| < \epsilon$, then you have to be able to calculate $\sin(x)$ to an accuracy of $\epsilon$ to decide whether $y<\sin(x)$. Which is really just what I wrote in my answer :-) – TonyK Oct 1 '12 at 22:31
But that's my point, you don't have to: $y < sqrt(1-\cos^2x)$ implies that $y < \sin(x)$. – sh1ftst0rm Oct 2 '12 at 1:24
But then you have to calculate $\cos (x)$ instead. Which is just as hard. – TonyK Oct 2 '12 at 6:26
Agreed, which is why that particular test isn't useful. But it's a counter example to the idea that there's no way to test it without calculating $\sin(x)$. So I guess the question would be, is it provable that there's no way to perform the test I'm looking for which is easier than calculating $\sin(x)$. This particular example is not easier, but that doesn't mean there aren't any. – sh1ftst0rm Oct 2 '12 at 12:02
show 2 more comments
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/46331 | Take the 2-minute tour ×
Looking for help in revising my algorithm. I need to find one that will give me the row and column of a cell on a grid.
The grid is $t \times t$. For example, this is a grid for $t=5$. Now given $n$, find the row and column. $$\begin{array}{|c|c|c|c|c|} 1& 2& 3& 4& 5\\ 6& 7& 8& 9& 10\\ 11& 12& 13& 14& 15\\ 16& 17& 18& 19& 20\\ 21& 22& 23& 24& 25 \end{array}$$
My attempt:
row: $n / t + 1$ column: $n \bmod t$
Second attempt:
$\operatorname{row}(x, t) = ((x-x \bmod t)/t)+1$
$\operatorname{column}(x,t) = (x-1) \bmod t+1$
Doesn't work for $n = t^2$
share|improve this question
add comment
1 Answer
up vote 2 down vote accepted
The row is :$$r = \lfloor \frac{n-1}{t} \rfloor + 1$$
The column is:$$c = n - t(r-1)$$
share|improve this answer
If zero indexing were to be used ($0,1,2,\ldots$ instead of $1,2,\ldots$) then the answer would look cleaner. $c$ could also be (n-1)%t+1. – adam W Feb 26 '13 at 16:23
I understand, thank you! – МикроПингвин Feb 26 '13 at 16:26
Glad to hear it, your welcome! – adam W Feb 26 '13 at 16:35
Hi, I have another question. This was just borne out of curiosity. Is there an equation for reflections over diagonals? My attempt only works for the first column down when reflected over the topleft-bottomright diagonal. n - (row - 1)(t - 1) – МикроПингвин Feb 26 '13 at 23:14
This is a common operation using matrices called the transpose, it is simply the swap of the indices $r\leftrightarrow c$. If by reflection over diagonals you mean other than the main (top left down to the bottom right), then maybe do some sort of shifting... though that sounds inexact, since any sort of "reflecting" would give indices out of bounds... – adam W Feb 26 '13 at 23:36
show 3 more comments
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/46332 | Take the 2-minute tour ×
Let $M$ be a point in the interior of triangle $ABC$ in the plane. Prove $AM+BM+CM<AB+BC+CA$.
The above question was posed to someone I know who is taking high-school Euclidean geometry. I'm not sure what theorems she can rely on in her proof (though they all follow from Euclid's axioms anyway), but I do know that she does not use trigonometry at all. She turned to me (a mathematician by training) for help; and I can't seem to prove it. So I turn to you all for a proof (using facts from high-school geometry only).
One thing I can prove is that $\sup(AM,BM,CM)<\sup(AB,BC,CA)$. Indeed, say the longest of the interior segments is $\overline{AM}$. Drop an altitude (perpendicular) from $A$ to the point $D\in\overline{BC}$, and consider the side — $\overline{AB}$ or $\overline{AC}$ — such that $\overline{AM}$ lies between $\overline{AD}$ and that side. (If $\overline{AM}\subset\overline{AD}$, consider either $\overline{AB}$ or $\overline{AC}$.) Say it's $\overline{AB}$. Then examining right triangle $ADB$ shows easily that $AM<AB$. However, I can't seem to prove that each of the three sides can be used in turn for one of the interior segments in that proof — which would suffice for the problem above.
Another idea I had was to prove that angle $AMB$ is strictly larger than angle $ACB$ (and likewise for the other two angles) and to use that to prove the claim. But I can't seem to do either: neither to prove the inequality of angle measures, nor, assuming that inequality, to prove the claim sought.
Any help would be much appreciated — again, using high-school geometry only. I suspect there's a simple proof I'm not seeing.
share|improve this question
The claim is relatively straightforward to prove for $M$ on the perimeter. Then the fact that the sum is convex as $M$ moves on any line from the perimeter to the opposite vertex shows that the claim also holds in the interior. Thus it would suffice if you could formulate and prove this convexity in geometrical terms. – joriki Jun 7 '13 at 6:38
add comment
1 Answer
up vote 4 down vote accepted
enter image description here
The method is to prove $AC+BC>AM+BM$:
Extend $AM$, let $ME=MB \implies \angle MBE=\angle MEB$, $AM$ cross $BC$ at $F$ (because $M$ is inside of $\triangle ABC$).
If $E$ is on $MF$, then $AF\ge AE=AM+ME$. $BC>CF \implies BC+AC> FC+AC>AF \ge AE=AM+BM$,
If $E$ is on the extension $MF$, $\angle MBE> \angle CBE, \angle BEC>\angle MEB =\angle MBE > \angle CBE$, so in $\triangle CEB$, $BC>CE, \implies BC+AC>AC+CE>AE=AM+BM$.
So we've proven $AC+BC>AM+BM$. For the same reason, $BC+AB>AM+MC$, $AB+AC>BM+MC$.
Finally, we have $AC+BC+AB>AM+BM+CM$.
share|improve this answer
+1; very nice; many thanks. – msh210 Jun 7 '13 at 7:57
my pleasure if it helps! – chenbai Jun 7 '13 at 12:13
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/46334 | Drexel dragonThe Math ForumDonate to the Math Forum
Search All of the Math Forum:
Math Forum » Discussions » Software » comp.soft-sys.math.mathematica
Topic: Using Mathematica to create slides
Replies: 2 Last Post: Jan 13, 2012 4:53 AM
Advanced Search
Posts: 4
Registered: 1/11/12
Using Mathematica to create slides
Posted: Jan 11, 2012 5:21 PM
I'm thinking of using Mathematica to create some slides for a
presentation on 3D graphics algorithms. I've found a lot of neat ways
of creating examples but I'm having a bit of trouble seeing how to lay
out the slides. In particular
- How can I hide the Input cells with the Mathematica source code in
- Can I have a cell that doesn't stretch all the way across the slide
horizontally? So that I can have some text and an example by the side
of it?
- Can I have a cell that doesn't appear when the slide is first shown,
but which appears when the advance button is pressed? Something like
the multistage animations in PowerPoint?
- Can I have any transition between slides other than a jump?
I'd be really grateful for any help with these. Thanks in advance.
[Privacy Policy] [Terms of Use]
© Drexel University 1994-2014. All Rights Reserved. |
global_01_local_0_shard_00000017_processed.jsonl/46335 | Results 1 to 3 of 3
Math Help - Galois fields
1. #1
Junior Member
Feb 2009
Galois fields
Hello everybody,
i just started studying coding theory from the book "error control coding" by lin and costello. In the 2nd chapter he has given a brief overview of the galois fields. No there are a few confusion that i have and i would be thankful to whoever can help me calrify them.
1. While defining a field (or a group) it sometimes seems to me that you can define addition and multiplication whatever way u want it . like sometimes its modulo m where m is the size of the finite field or group sometimes its polynomial addition etc. so please kindly can somebody explain what are the restriction on how we define these binary operators.
2. Now it was mentioned in the book that galois fields (considering modulo addition and modulo multiplication) exist for size p^k where p is a prime and k is a
positive integer. Why?. i tried to construct for a couple of non primes but the table for multiplication doesn't come out right.
3. What is the Significance of the characteristic of a field.
4. I have read two different definitions of irreducible polynomials over GF(q). One says that a polynomial is irreducible over GF(q) if it doesn't have any root in GF(q). Second one which i read in the above mentioned book and which I am not sure if it holds in general of only for GF(2^k) says that a polynomial of degree n over Gf(q) is irreducible if no polynomial over GF(q) of degree less than n and greater than 0 is a factor of it. So are the two equivalent if yes how and if no so whcih one is right or more general.
5.Can somebody explain to me comprehensively the procedure of extending a finite field. I have an idea abt it but there are a lot of confusions so rather than posting all of them may be a brief idea by someone can help me better.
6. if i use different irreducible polynomials of the same degree m to extend a field GF(p) i will get different fields of the same size??
thanks in anticipation
Follow Math Help Forum on Facebook and Google+
2. #2
MHF Contributor
Mar 2011
Re: Galois fields
1. no. the operations of addition and multiplication on a field are quite restrictive:
addition must be associative and commutative. there must be an additive identity (usually called 0), and every element must have an additive inverse (usually written as -a, for a given element a).
multiplication must also be associative and commutative. there must be a multiplicative identity (usually called "1" or "unity"), and every element except 0 must possess a multiplicative inverse (often written 1/a, for a given element a, but also sometimes as a-1).
furthermore, multiplication MUST distribute over addition:
a(b+c) = ab + ac.
this ensures that multiplication and addition are "compatible" (in other words, you can't take just "any two" associative and commutative binary operations, and "put them together" and get a field. they have to interact with each other in a certain way).
the purpose for these rules is so that we can do algebra in fields, and the same rules learned in elementary school (for the most part) still work (but see the discussion on characteristic below).
2. the reason that finite fields, in general, do not exist for numbers that are not powers of a prime has to do with the peculiarities of multiplication in the integers mod n. for example, in Z6, we have (2)(3) = 0, but neither 2 nor 3 is 0. so suppose we were looking for some k (mod 6) with 2k = 1 (that is, a multiplicative inverse).
2(0) = 0 that doesn't work (of course, we wouldn't expect 0 to have an inverse, anyway).
2(1) = 1, nope.
2(2) = 4, try again.
2(3) = 0, can you guess what happens next? we're not going to get any new numbers, we're going to get the cycle (0,1,4) again. why? because of the distributive law:
2(4) = 2(3+1) = 2(3) + 2(1) = 0 + 1 = 1 (told ya)
2(5) = 2(3+2) = 2(3) + 2(2) = 0 + 4 = 4.
a number like 2 or 3 in Z6 is called a "zero-divisor". if we have zero-divisors, they act "bad" (with respect to division) just like 0 does. in a field (or more generally, even in an integral domain like the integers), if:
ab = 0, we know straight-away that one of a or b must be 0.
when we have zero divisors, all bets are off. anything that has zero-divisors cannot be made into a field. it turns out that in Zn, a is a zero divisor if and only if gcd(a,n) ≠ 1. so if we want to make Zn into a field, n can't have any divisors except 1 and itself (different than 1, for slightly technical reasons). we call those kind of numbers prime.
3. in any field, we have 1. so we can form 1+1,1+1+1,1+1+1+1, etc. if all of these are different, we say F has characteristic 0. if some sum of 1's is equal to 0:
1 + 1 +...+ 1 = 0 (where we have n 1's)
we say that F is of characteristic n. but the collection of sums of 1 (and 0, if 0 isn't one of them) is either isomorphic to Zn, or N. if it's N (the natural numbers), we know that (since we have additive inverses) we have a copy of Z in our field. and since we have multiplicative inverses, we have a copy of Q in our field (Q is what you get when you take all the inverses of integers, 1/k, and start adding them together).
but if F is FINITE, we have a copy of Zn in our field. and since we DON'T have zero divisors in a field, n has to be prime:
any finite field is of prime characteristic (since every sum of 1's has to have an inverse, so we can't have any (non-trivial) divisors of n).
so, you might wonder, where do we get fields of prime power order?
well, it runs out that if F is a field, and E is a field that contains F inside it, that we can regard E as an F-vector space. if E is finite, then it must be finite-dimensional over F. but any two vector spaces over a common field F of the same dimension, are isomorphic (as vector spaces). so if dimF(E) = n, then E is isomorphic to Fn =
{(a1,a2,...,an) : ak in F}, consisting of n-tuples of elements of F.
in particular, since E and Fn are isomorphic (as vector spaces), they have the same size!!!!
now the smallest field that contains all the sums of 1, is called the prime field of E. we saw above that the prime field of a finite field has to be Zp, for some prime p. so if E is finite, then E is isomorphic to (Zp)n, for some prime p. but we know the size of (Zp)n, we have p choices for each coordinate, and n coordinates in all, giving us pn elements in all in E.
so the only "possible sizes" are powers of prime numbers. it turns out (and here i am going back to your 2nd question) that every "possible size" does indeed occur, and even better, that for all intents and purposes, there is only "one" finite field of a given size (this is in stark contrast to the situation for infinite fields, where two extensions of Q may be "the same size" (of degree 2 over Q as vector spaces), but be non-isomorphic).
4. the first criterion you give is clearly incorrect. for example: x4 + x2 + 1 has no roots in GF(2) (which has only two elements, 0 and 1, and you can check that neither is a root), but x4 + x2 + 1 = (x2 + x + 1)2 is reducible over GF(2). it is true that for polynomials of degree 3 or less that they are irreducible if and only if they don't have a root, but that is because if they do factor, one of the factors must be linear (of the form x - r, where r is a root). we don't count factors of degree 0 (non-zero constants), because those are invertible (since we're in a field). otherwise, EVERYTHING would factor as:
f(x) = (a)(1/a)f(x), which is just silly.
5. the general idea is this (bear with me, this will take a while): we start with our field F. then we create the RING F[x], of polynomials in x with coefficients in F. now to really understand what we do next, you have to know a little bit about rings.
rings are pretty much like fields, except we might not be able to divide. also, ring multiplication isn't always commutative, and rings don't always have "unity" (something like 1). fortunately for us, the ring F[x] IS commutative: p(x)q(x) = q(x)p(x), which makes our lives a lot easier. also, the polynomial f(x) = 1 (a constant polynomial, whose constant term is 1) is a multiplicative identity, so that helps out, as well. now, we could make F[x] into a field using the same method we used to make fractions from integers, but instead, we're going to do something else (F[x] is infinite, and we want a finite field with F inside it, making "polynomial fractions" would give us something "even bigger" than F[x], and that's not what we're after).
to understand it, you have to know what an ideal of a ring is. basically, an ideal is something (a subset of a ring) that mimics the following properties of 0:
0 + 0 = 0
a0 = 0.
given a ring R, we define an ideal to be:
a subset I, such that I is closed under addition and contains additive inverses and 0, and such that if r is any element of R, and a is any element of I, ra, and ar are both in I.
(since "our ring" F[x] is commutative, we only have to check that ra is in I, since ra = ar).
now given a ring R, and an ideal I, we can create a "smaller ring", called R/I, in the following way:
we define a + I to be the set {a + x: x in I}. this is called the coset of a in R/I. intuitively, we imagine that "all the elements of I are set to 0".
we define addition of cosets as:
(a + I) + (b + I) = (a+b) + I
but there's a slight hitch: a+I is a set (as are b+I and (a+b)+I), whereas a,b and a+b are elements of R. so we want to make sure that the sum doesn't depend on our choice of a and b (as "representatives" of the coset).
that is: if a' is in a+I, and b' is in b+I, we want to be sure that a'+b' is in (a+b)+I. so what does it mean for a' to be in a+I?
well, if a' is in a+I, then a' = a+x, for some x in I. similarly, if b' is in b+I, then b' = b+y, for some (other) element y of I. so:
a'+b' = a+x+b+y = (a+b)+(x+y). but one of our conditions on I was that it be closed under addition, so if x is in I, and y is in I, then x+y is in I. thus a'+b' = a+b+(x+y), for some element x+y in I, so a'+b' is indeed in (a+b)+I.
we define multiplication of cosets like so:
(a+I)(b+I) = ab+I
again, we need to check this doesn't depend on our choice of a or b.
so if a' is in a+I, and b' is in b+I, then a' = a+x, and b' = b+y, for some x,y in I.
a'b' = (a+x)(b+y) = ab + ay + bx + xy. now the other condition on I was that if x is in I, then so is rx, for any element r of R. so ay,bx and xy are all in I. but then, so is their sum, so
a'b' = ab + (ay+bx+xy), for some ay+bx+xy in I, that is, a'b' is in ab+I.
so we get a ring, except 0 is now replaced by the "larger" 0+I = I. it turns out that the mapping R→R/I given by a→(a+I), preserves the addition and multiplication of R (it is a ring-homomorphism). it also turns out that the set {r in R: r+I = I} the KERNEL of this homomorphism, is just I. it also turns out, that if we have ANY ring homomorphism φ:R→S, between a ring R and another ring S, that ker(φ) is an ideal of R, and that R/ker(φ) is "essentially the same" (isomorphic to) φ(R) (the image of R in S).
it also turns out that, given a polynomial p(x) in F[x], that the set {k(x) in F[x]: k(x) = g(x)p(x)} is an ideal of F[x], called the ideal generated by p(x), or <p(x)>. so for any polynomial, we can form the ring F[x]/<p(x)>.
now, we have the following important result:
suppose R is a commutative ring with identity, and M an ideal of R. then R/M is a field if and only if there is no ideal between M and R (such an ideal is called maximal).
suppose R/M is a field. let I be an ideal such that M is a proper subset of I. pick a such that a is in I, but not in M. since 0 is in M, a is not 0. thus there is b+M in R/M such that:
(a+M)(b+M) = 1+M. this means that 1 = ab+m, for some m in M. now ab is in I (since a is in I, and I is an ideal), and m is in I, (since M is a subset of I), thus 1 = ab+m is in I. but this means that every element r = r1 is in I, so I = R: any ideal containing M must be the entire ring R.
on the other hand, suppose M is a maximal ideal. let a+M be a non-zero element of R/M ( that is, a is not in M). we need to show there is some b+M with (a+M)(b+M) = 1+M. to do so, we are going to take what may seem like an odd detour:
let M' = {ra + s : r in R, s in M}. clearly M' contains M as a subset (let r = 0), and it also contains a (since we can take s = 0, since 0 is in M, and r = 1), so it is strictly bigger than M. i claim M' is an ideal of R:
(ra + s) + (r'a + s) = (r+r')a + (s+s'), so M' is closed under addition. -(ra + s) = (-r)a + (-s), which is in M' since -s is in M, and -r is an element of R. thus M' contains additive inverses, and it clearly contains 0 (since 0 is in M, and M' contains M). now suppose t is any element of R. then t(ra + s) = (tr)a + ts, and ts is in M (since M is an ideal), and tr is clearly in R. thus M' is an ideal of R.
but...since M is a maximal ideal, M' must therefore be all of R. in particular, 1 is in M', that is 1 = ba + s, for some b in R, and s in M. since R is commutative, we can write this as:
1 = ab + s (since ab = ba). this means that 1 is in ab+M, that is: 1+M = ab+M. hence (a+M)(b+M) = ab+M = 1+M, so for any non-zero a+M in R/M, we have a multplicative inverse, b+M.
so the natural question is, at this point, for which polynomials p(x) is the ideal <p(x)> maximal? well, if q(x) is a factor of p(x), then <p(x)> is contained in <q(x)>, so if <p(x)> is maximal, p(x) has to be irreducible. on the other hand, suppose that p(x) is irreducible, but <p(x)> is not maximal. so we must have some ideal I (strictly) between <p(x)> and F[x].
now any such ideal will be of the form <f(x)> for some polynomial f(x). why? well, suppose some ideal J of F[x] has a non-zero element in it. let g(x) be an element of minimal degree in J. for any k(x) in J, we can write k(x) = q(x)g(x) + r(x), where deg(r(x)) < deg(g(x)), or r(x) is the 0-polynomial. then r(x) = k(x) - q(x)g(x), which is in J. since g has minimal degree in J, it must be that r(x) = 0, so every k(x) in J is of the form q(x)g(x), that is: J = <g(x)>. note that any non-zero element of F generates all of F[x], since for b ≠ 0 in F, (1/b)b = 1 is in <b>, so that all of F[x] is in <b>.
but if <p(x)> is contained in <f(x)>, then p(x) is in <f(x)>, so that p(x) = h(x)f(x), for some h(x) in F[x]. thus either 0 < deg(f(x)) < deg(p(x)), contradicting the irreducibility of p(x), or h(x) is a constant polynomial, so that h(x) = c, in which case f(x) = (1/c)p(x) is in <p(x)>, contradicting that I (= <f(x)>) is an ideal (strictly) between <p(x)> and R.
so the conclusion is: <p(x)> is maximal if and only if p(x) is irreducible in F[x].
and THAT means, that if p(x) IS irreducible over F, that F[x]/<p(x)> is a field. and this field includes (a copy of) F inside it:
for any a in F, the map a→(a+<p(x)>) embeds F inside F[x]/<p(x)> (it's a ring-isomorphism), we have succeeded in making an "extension" of F.
now, that's a lot to take in...but in point of fact, that's how it's done.
Follow Math Help Forum on Facebook and Google+
3. #3
Junior Member
Feb 2009
Re: Galois fields
thanks ...i haven't read your complete answer yet but hopefully by tomorrow i will have done it...thanks
Follow Math Help Forum on Facebook and Google+
Similar Math Help Forum Discussions
1. Splitting Fields and Galois Groups
Posted in the Advanced Algebra Forum
Replies: 3
Last Post: March 6th 2012, 02:39 PM
2. Galois fields
Posted in the Advanced Algebra Forum
Replies: 1
Last Post: October 24th 2010, 04:03 AM
3. galois group and intermediate fields
Posted in the Advanced Algebra Forum
Replies: 1
Last Post: January 9th 2010, 07:56 PM
4. Extension fields / splitting fields proof...
Posted in the Number Theory Forum
Replies: 1
Last Post: December 19th 2007, 07:29 AM
5. Fixed fields for Galois groups
Posted in the Advanced Algebra Forum
Replies: 3
Last Post: April 8th 2006, 08:44 AM
Search Tags
/mathhelpforum @mathhelpforum |
global_01_local_0_shard_00000017_processed.jsonl/46336 | Take the 2-minute tour ×
What is a good reference for the following fact (the hypotheses may not be quite right):
Let $X$ and $Y$ be projective varieties over a field $k$. Let $\mathcal{F}$ and $\mathcal{G}$ be coherent sheaves on $X$ and $Y$, respectively. Let $\mathcal{F} \boxtimes \mathcal{G}$ denote $p_1^*(\mathcal{F}) \otimes_{\mathcal{O}_{X \times Y}} p_2^* \mathcal{G}$. Then $$H^m(X \times Y, \mathcal{F} \boxtimes \mathcal{G}) \cong \bigoplus_{p+q=m} H^p(X,\mathcal{F}) \otimes_k H^q(Y, \mathcal{G}).$$
Note: Wikipedia leads me to believe that this may be related to Theorem 6.7.3 in EGA III2, but I find this theorem quite intimidating. Although I would be willing to study this if there is no more basic reference, I would at least like some confirmation that I am studying the right thing.
share|improve this question
A couple of pages further on in EGA III.2 is Theorem 6.7.8 which is exactly the kind of thing you are looking for, I imagine. – Tony Scholl Aug 5 '10 at 19:30
Use Cech covering of $X \times Y$ built from finite open affine covers of $X$ and $Y$, together with elementary stuff on homology of tensor product of bnded complexes over a field & that can compute sheaf cohom. cup products using pairings of resolutions (explained in Godemenet's book; EGA says where Godement relates cup product to Cech theory); surely you want isom. to be def'd by cup product! Using a touch of homological alg. with Tor, get same over any ring if assume qcoh sheaves & cohomologies of factors are flat. Better to work it out for yourself than to waste time with that part of EGA. – BCnrd Aug 5 '10 at 20:35
Thanks! The more I looked at that part of EGA, the worse it looked. – Charles Staats Aug 5 '10 at 21:24
Charles, I know this is settled now, but I think Thm. 6.7.8 in EGA III$_2$ would be a better and slightly less intimidating reference for this. – Sándor Kovács Apr 11 '13 at 1:44
add comment
2 Answers
up vote 23 down vote accepted
The treatment in EGA is indeed intimidating, but in fact over a field the formula is not hard to prove. You only need $X$ and $Y$ to be separated schemes over $k$, and $\mathcal{F}$ and $\mathcal{G}$ to be quasi-coherent. Then cover $X$ and $Y$ by affine open subsets $\{U_i\}$, and $\{V_j\}$, and write down the Čech complex for $\mathcal{F}$ and $\mathcal{G}$ with respect to these two coverings, and the Čech complex of $\mathcal{F} \boxtimes \mathcal{G}$ with respect to the covering $U_i \times V_j$. It is not hard to see that the last is the tensor product of the first two; then the thesis follows from Eilenberg-Zilberg (or however you want to call the fact that the cohomology of the tensor product of two complexes over a field is the tensor product of the cohomlogies).
share|improve this answer
"It is not hard to see that the last is the tensor product of the first two". Do you mean homotopy-equivalent? – Martin Brandenburg Aug 27 '13 at 16:44
add comment
One can find this in section 9.2 of Kempf's book "Algebraic Varieties".
The slightly more general case where $X, Y$ are over an affine scheme $\operatorname{Spec} R$ and $\mathcal{F}, \mathcal{G}$ are quasi-coherent sheaves flat over $\operatorname{Spec} R$ can be found in
Kempf: "Some elementary proofs of basic theorems in the cohomology of quasi-coherent sheaves" Rocky Mountain J. Math. Volume 10, Number 3 (1980), 637-646. link
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/46339 | Very Large TelescopeVLTobservatory located on the mountain Cerro Paranal (2,635 metres [8,645 feet]) in Chile and consisting of four telescopes with mirrors of 8.2 metres (27 feet) in diameter and four others with mirrors 1.8 metres (5.9 feet) in diameter. These telescopes can operate individually or together as an interferometer that functions like a telescope with a mirror 200 metres (600 feet) in diameter. The large telescopes are named Antu, Kueyen, Melipal, and Yepun, which are the names for the Sun, the Moon, the Southern Cross, and Venus in the language of the Mapuche people. Construction on of the VLT began in 1991, and the its first observations were made in 1998. Among the VLT’s notable discoveries are the first direct spectrum of an extrasolar planet, HR 8799c, and the determination of the distance (more than 13 billion light-years) to the farthest - known astronomical object, the gamma-ray burst GRB 090423. The VLT also made the first direct measurement of the mass of an extrasolar planet, HD 209458b, and discovered the most massive star known, R136a1, which has a mass 265 times that of the Sun. The VLT is operated by the European Southern Observatory, an astrophysical research organization supported by 14 European countries. |
global_01_local_0_shard_00000017_processed.jsonl/46343 | cruiserlarge surface warship built for high speed and great cruising radius, smaller than a battleship but larger than a destroyercapable of not only defending its own fleet and coastlines but also threatening those of the enemy.
The word cruiser was applied originally to frigates of the sailing era, which, being smaller and faster than ships of the line, scouted cruised the seas scouting for enemy fleets and cruised the seas hunting enemy convoys. As the designation for a specific type of warship, cruiser did not become current until about 1880, when navies had settled on iron-hulled ships powered either by a combination of sail and steam or solely by steam. Cruisers became the frigates of the steam era. By about 1900, cruisers were of two principal kinds; : protected cruisers had steel armour plating only on their decks, while armoured cruisers also had armour extending down the sides of the hull. Though smaller than battleships, cruisers were powerful warships because of their great speed and relatively big guns.
In the decades before World War I, armoured cruisers were eclipsed by cruisers as large as battleships (displacing up to 20,000 tons or more) and carrying dreadnought-style armament of big guns of uniform calibre. These so-called battle cruisers achieved greater speed—about 25 25–30 knots—by limiting the thickness of their armour. At the Battle of the Falkland Islands in December 1914, the advantages of speed and big guns were demonstrated when two British battle cruisers destroyed two German armoured cruisers. But the weakness of light armour became apparent at the Battle of Jutland in 1916, when Britain lost three battle cruisers to heavy German battleships.
The Washington Treaty of 1922 limited cruisers to 10,000 tons, but many nations states violated the treaty even before , and it was abandoned shortly before World War II. By then , cruisers had been deprived of their scouting functions by naval aircraft, and submarines had largely usurped their role as convoy raiders. During the war they served mostly as floating batteries for amphibious assaults and as part of air-defense screens protecting aircraft-carrier task forces. For this latter role, special antiaircraft cruisers were built, carrying as main armament about a dozen rapid-fire guns of only four to five inches.
After the war the high cost of building and maintaining large battle fleets led to the abandonment of cruisers by all navies except those of the United States and Soviet Union. In both U.S. and Soviet cruisers, big-gun armament was replaced by guided missiles. U.S. cruisers , which carried carrying surface-to-air missiles , and sophisticated radar systems became the first line in a fleet’s air-defense screen. Meanwhile, while some Soviet cruisers carried were armed with long-range antiship missiles and retained , thus retaining some of the ship-killing functions of earlier cruisers. The introduction of cruise missiles restored some of the offensive firepower of cruisers over coastlines and extended it into areas far inland.
Another important postwar development in U.S. and Soviet cruisers was nuclear propulsion. In the 1960s and ’70s the United States commissioned a small number of nuclear-powered cruisers to accompany its aircraft carriers, but the last of these expensive ships was decommissioned by the end of the century. Russia carried on into the 21st century with a few large nuclear-powered cruisers.
A modern guided-missile cruiser typically is powered by gas turbines. It has a length of about 180 metres (about 600 feet (about 180 m), a displacement of 7,000 to 10,000 tons, a top speed of over 30 knots, and a crew of about 500. The introduction of cruise missiles has restored some of the offensive power of U.S. cruisers.
Another important postwar development has been nuclear propulsion, which has given some cruisers virtually unlimited range. |
global_01_local_0_shard_00000017_processed.jsonl/46347 | Currently, 282 questions are tagged , which should be marked a synonym of .
The synonym is obviously correct. However, due the low volume of questions, the synonym voting is stuck at +1. Could anyone mark as a synonym of ?
share|improve this question
+1 I've also upvoted the synonym request... – lonesomeday Nov 17 '11 at 23:44
add comment
1 Answer
up vote 3 down vote accepted
share|improve this answer
Thanks, the shortcut is really useful :) – Rob W Nov 18 '11 at 16:23
add comment
You must log in to answer this question.
Not the answer you're looking for? Browse other questions tagged . |
global_01_local_0_shard_00000017_processed.jsonl/46348 | Would it be nice I believe that embedding a Tweet in a question/answer with Embedded Tweets feature would be a good way to make it clear you're quoting a tweet.
As I saw some posts today that used block quote to do it and thought it would be better if those quotes used Embedded Tweets format style.
The embedding could be achieve with the following code:
[tweet https://twitter.com/twitterapi/status/133640144317198338]
share|improve this question
why would this be a good idea exactly? – Lix Aug 2 '12 at 13:43
So let me understand - you want to place a link, to a tweet, that will get deleted in about 90 days because twitter doesn't maintain history forever? You can guarantee link-rot manually if you want, but I don't support adding a button to make it even easier. – Aaron Bertrand Aug 2 '12 at 13:44
If you are going to propose something that "would be nice", please also explain why this would be so. What would the benefit be? What kind of positive effect will this have on the (quality of this) Q&A? – Bart Aug 2 '12 at 13:45
FYI: Voting is different on Meta. – Dennis Aug 2 '12 at 13:48
@AaronBertrand the tweet is not linked, it's hardcopied. Also, the Tweet from the page I sent is still online if you access this URL twitter.com/twitterapi/statuses/… – CaioToOn Aug 2 '12 at 21:16
@AaronBertrand maybe the tweet could be created the same way it sugests in the article for plataform that support the tweet embeding: [tweet https://twitter.com/twitterapi/status/133640144317198338]. It doen't necessarily need a button. – CaioToOn Aug 2 '12 at 21:30
Even if that tweet is still alive, how do you know it will ever be? And my objection isn't about a button, it's about making this process easier in general. How many times are you referencing a tweet in a question or answer? Really? – Aaron Bertrand Aug 2 '12 at 21:31
@Lix and Bart, thanks for the tip. Edited the answer to try explaining my point. – CaioToOn Aug 2 '12 at 21:32
add comment
1 Answer
I think this would be bad for two reasons:
1. Some companies block Twitter, so any information embedded in a Tweet would be inaccessible to many users for a significant portion of the time.
2. Any information in a Tweet can be easily copied into a question or answer with a link for reference.
share|improve this answer
Copy and paste 140 CHARACTERS! What do you people have, supercomputers????!!!? – Ernest Friedman-Hill Aug 2 '12 at 13:47
@ErnestFriedman-Hill Up to 140 characters. Many tweets are shorter, and can be copy/pasted on even common desktop hardware. – Bill the Lizard Aug 2 '12 at 13:52
What is this "Copy and paste" you're speaking of? – Bart Aug 2 '12 at 13:52
@BilltheLizard you have a good point on companies policy there. It indeed need to load a script from Twitter plataform. – CaioToOn Aug 2 '12 at 21:11
@ErnestFriedman-Hill it's naive to think the point is about saving a copy and paste operation. It's for the sake of formatting only. Just like <kbd>ctrl</kbd>+<kbd>c</kbd> can be easily written as ctrl+c. – CaioToOn Aug 2 '12 at 21:12
I believe the limitation on policies @BilltheLizard pointed out is really complicated. – CaioToOn Aug 2 '12 at 21:14
add comment
You must log in to answer this question.
Not the answer you're looking for? Browse other questions tagged . |
global_01_local_0_shard_00000017_processed.jsonl/46349 | This awesome question with 114 upvotes and interesting answers was closed as a duplicate of an old dead question with 16 upvotes and no interesting answers.
But the questions are not the same: the old question says (bold face added):
This is not intended to be a wishlist of features, only items that have been discussed as possibly being implemented in the next version.
The new question says:
What features do you want to see in .NET 5?
The first is asking for rumours out of Redmond, the second is a wishlist.
share|improve this question
Both of those questions are better suited for a site/medium dedicated to discussion; closing as a duplicate was probably partially done both as a sop and alternate outlet to those reopening whose only programming resource is SO. – Gnome May 30 '10 at 10:02
Hmm, is there some new link mangling in place for comments? I thought I linked directly to my answer on the second link, which has the relevant "only resource" bit. (I'm probably just going senile...) – Gnome May 30 '10 at 10:36
@The Cat: I agree that "closing as a duplicate" is hardly ever used to close duplicates. The site is literally flooded with duplicates. But most duplicate closings go to highly active questions with more than 4 distractors – Andomar May 30 '10 at 10:57
That's not what I said (or not what I meant, at least), and I see many more low-volume questions closed as duplicates than high-volume ones. (But it's not something I try to watch or anything like that.) @and – Gnome May 30 '10 at 11:40
I'd vote to close it as subjective, argumentative, or peanut butter fluff. – Rosinante May 30 '10 at 22:52
There are 11 answers and over 1K views on that older question! For a normal SO question, that's pretty damn good... Of course, these are discussion questions, so lumping them in with boring crap like "What C++ 0x features are in VS2010?" or "How can I declare a function that accepts a lambda?" is pointless - the former are PHPBB-fodder that someone felt it necessary to inflict on SO, while the latter are actual, answerable, questions. The fact that you felt it necessary to disparage the older question in addition to noting the differences between them says a lot about why they should be killed – Shog9 May 31 '10 at 0:46
Both closed now. SO is not a gossip site. Read the blogs from the C# team if you want to know what they're doing. – devinb May 31 '10 at 8:27
add comment
5 Answers
up vote 0 down vote accepted
I was asking myself the same question... it's definitely not a duplicate. And it also happens to be the most interesting discussion I've seen on SO in weeks ! Why close that kind of question ? Sure, some might say it's subjective, and it probably is... but how does it do any harm to the site or its users ? It's interesting, people have fun reading the answers, and it gives an idea of what developers are looking for in a language today. If you're not interested, just don't read it...
share|improve this answer
The critical word here is discussion. – Rosinante May 30 '10 at 22:55
Stack Overflow is not a discussion forum. It's a Q & A site. Subtle difference, but necessary. – George Stocker May 31 '10 at 1:52
OK, assuming you're right... where can I find an interesting discussion about future C# features ? I couldn't find anything interesting on Google. – Thomas Levesque May 31 '10 at 16:32
Great question. You may want to build a site geared towards that. Unfortunately by trying to use Stack Overflow for cross-purposes, we dilute what it's really supposed to be. – George Stocker Jun 1 '10 at 14:02
SO is the best place I can think of to discuss this kind of things, because it has a huge audience, and a great deal of excellent developers visit it daily. If I built my own site, it would probably never get the same level of attention as SO... Well, anyway, I thought my opinion was shared by a majority of members (given the popularity of the offending question), but I was obviously wrong, so I admit my defeat ;) – Thomas Levesque Jun 2 '10 at 22:39
add comment
Basically, ...
would the average programmer agree that s/he learned something from this?
... is the acid test we use in grey area situations like this.
I'm inclined to say in this specific example, it does teach, so it should be allowed.
share|improve this answer
Really? It invites unsupported opinion, as likely to be from idiots as from anyone else, as to what Microsoft should do. It's instant flame-bait in this regard. What does an average programmer learn from someone else's opinion about what or what should not be added to C# two years from now? – Rosinante May 30 '10 at 22:54
What does the average programmer learn from a wish list of features that most likely won't be implemented? I'm really curious as to what the educational value of this fluff is. The almost-identical C# 4 version certainly didn't teach me anything useful. – Aarobot May 31 '10 at 0:40
@Rosinthe, @Aarobot: Have you actually read the answers? I learned a lot of how people handle current rough edges of C# – Andomar May 31 '10 at 5:33
@Andomar: The fact that you can learn (even specifically about programming) doesn't give license to post anything. Spam teaches you about a tool which might be exactly what you're looking for: not valid. Duplicates teach you about something discussed before: not valid. Subjective teaches you about a hell of a lot of different viewpoints: not valid. Very localized questions may teach you something interesting that you'll never use: not valid. Basically there is a distinction between useful and interesting. SO is for things that are useful. – devinb May 31 '10 at 8:31
@Andomar: If the question title was "How do you handle the current rough edges of C#?", then that might be important. The fact that a question with little usefulness happened to unintentionally produce some information in a different area does not make it a useful question - especially when the same information could be found in numerous other questions. And since there are no "epiphany" answers like Eric Lippert's answer to the FP question, there's little to justify keeping it alive. – Aarobot May 31 '10 at 13:49
add comment
Sometimes I wonder if people ask the discussion questions on Stack Overflow that they would otherwise ask on Slashdot, Reddit, or Hacker News just because Stack Overflow has a better user interface and badge/reputation mechanism.
These types of questions do not belong on Stack Overflow. Maybe if they didn't detract from the useful questions, but if you're spending votes on these questions, you're not spending them on the tough questions that deserve them.
Splitting hairs about the duplicate part is the wrong question; the right question is, do discussion questions belong on Stack Overflow?
The answer is a resounding No.
share|improve this answer
add comment
It is a duplicate, but of an even earlier question: Most wanted feature for C# 4.0?
Why? Because:
• Aside from the version, the question is literally identical to the previous one;
• The old one might as well be closed/locked as "Too Localized", since C# 4 is already out. But it could easily be edited to be for C# 5 without loss of context. In fact, it could be edited to be for any arbitrary future version of C# and the question would still make sense, as long as people edit their answers accordingly if/when a feature is actually implemented.
• Most of the answers to the new question are identical to answers in the old question!
Regardless, if you disagree on that point, the new question is still hardly an awesome question. It's barely a question at all - to me it's just noise.
The speculation (rumours) question can actually be answered with facts, scarce as they are right now. The new question is soliciting opinions, and to no particular end. It's just another discussion question with zero educational value and everybody throwing in their two cents (and upvoting/voting to reopen in order to keep the question alive so that they can keep the badges they earn).
If this question were an isolated incident I would probably have just let it slide. But there have been so many of these kinds of questions coming up lately, we're already seeing and will continue to see a cascade effect where eventually every question that's even remotely related to software is fair game.
Choose your close reason; almost all of them apply. It's NARQ because it's really a poll, not an answerable question. It's S&A because there are no facts in support of (or against) any answer. It's an exact duplicate of a much older question with the version number changed, and very nearly a duplicate of a newer one that was worded better. In a way, it's even off-topic, because none of the features exist (and most probably never will, or won't for some time), and therefore aren't really relevant to programming in C#.
So, maybe as a dupe it references the wrong original question. Or maybe it was even inappropriately closed as a duplicate. The fact of the matter is, it needs to stay closed, otherwise it's going to become another poster-child for bikeshed questions (the same question can be recycled for all versions of all products).
Let's just leave it alone. Please.
share|improve this answer
"zero educational value"? If you learned nothing from the answers, I guess you're more of a C# guru than I am – Andomar May 31 '10 at 5:39
@Andomar: Nothing in that question actually has anything to do with C#. It's a list of nonexistent features, most of which will never exist. If by "guru" you mean "don't care about what a bunch of people on the internet think is important for the new version of a product that's barely even started development yet", then I guess I am a "guru." – Aarobot May 31 '10 at 13:41
add comment
No. They aren't duplicates.
Neither are they good questions.
At least three people didn't have the guts to select "Not a real question" when voting to close...
share|improve this answer
add comment
You must log in to answer this question.
Not the answer you're looking for? Browse other questions tagged . |
global_01_local_0_shard_00000017_processed.jsonl/46350 | I do not know if many comments are actually flagged and deleted. But if many are deleted due to flagging, then what about showing those using some strikethrough and an explanatory tooltip for (say) one more hour? That way, everyone can learn from it:
Mockup of deleted comment
Some thoughts on that:
For example "+1" and "belongs on" comments may be flagged for automatic removal without the commenter being notified, nor punished. For the "+1" comments Jeff wrote in August 2009:
I'm actually ok with flagging meaningless comments like this, since
• there's no actual penalty to the user when a flagged comment is removed
• the flagging comment process is basically 100% automated and doesn't require any mod intervention
[..] added "noise" as reason for comment flagging. Please use it on egregious non-value add comments that are noise and not signal.
I assume this works fine, but neither the original commenter nor the rest of the audience might notice that things have been deleted. Also, temporarily showing the deleted comments might make some more people start flagging noise, in due time resulting in less new noise being posted by oblivious users who think they're doing great by copying behavior?
I think that even showing plain offensive comments for some longer time won't hurt, would it? And do we expect that showing strikethrough comments makes people post new comments about the deletion?
It's not a big issue at all, but currently deleted comments are not deleted from the database, hence showing them for some more time might not be too difficult?
share|improve this question
Note: I removed your comments from the question I migrated back to SO, since they have no need for our 'internal' discussions. – Ivo Flipse Jun 27 '10 at 20:01
I changed my mind after what you said, so I moved it back :-P – Ivo Flipse Jun 28 '10 at 5:56
add comment
3 Answers
up vote 3 down vote accepted
Is 1 hour sufficient, though? Is it perhaps too long, in fact? You can't really predict how many people will run across a particular post for a period of time. Moreover, how many of those people will already know of this fact. Often enough, "belongs on" comments are probably seen more often by the people who already plan to flag them. It's likely they're also seen just as often, if not more, by the people who could learn from their deletion, but there's no real method of knowing when those people will hit the right posts.
If "some time" is too short, then no one gets the message and it's meaningless (mostly derived from how SO has visitors every hour of the day). Likewise, the original author of those comments (whom you state may learn from seeing their comment visibly deleted) isn't necessarily going to be around on the period of time a comment is flagged.
And if "some time" is too long, then it undermines the entire purpose of flag-based deletions (which is to get the 'offending' material off the site as soon as understood, offending being used loosely here). One hour, I can't even tell whether that's too short or too long, myself. If it's truly offensive material then it's too long, and if it's potentially useful to know about it not being allowed, then it can be too short.
I think that while the goal of this proposal is good in intention, I don't think it particularly yields well in practice. It is a good idea to know what should not belong on the site, but I don't particularly find it a good idea to keep undesired things on the site in order to instruct that message.
share|improve this answer
Agreed. Even more: the timer would probably not start until the final (I think I read 6th somewhere?) flag for deletion is submitted. On the other hand: off-topic questions are not deleted for at least 48 hours either. Is that just to avoid confusion for the question asker? Or maybe there's something educational in there as well? (Just being curious; not saying some statement is true while another is not.) – Arjan Jun 27 '10 at 19:29
@Arjan The 48 hour delay on closed questions being deleted, as I've understood it, is to allow appealing the close. It's that 2 day period for people to keep the question alive. Comparatively, a question flagged for offensive content gets deleted and locked immediately. I guess comments are treated like that, because the flagging is for offensive and spam just the same as posts. Noise comments really are also useless for the most part, so I can't see any such being appealed. Not to say that people haven't appealed comments on Meta before. – Grace Note Jun 27 '10 at 20:22
add comment
How about adding a message to the thing that has been commented on, and provide a mechanism for displaying the deleted comments, for example:
"This question / answer has had some of its comments deleted. Show them."
share|improve this answer
This function exists for moderators. – Tim N Aug 18 '11 at 11:46
@Tim, Is there any reason to not allow it for all users? (or users with a certain amount of Awesome Points?). – Spycho Aug 18 '11 at 12:19
I'd like that, but only if it would not include comments that the author deleted themselves. – Arjan Aug 18 '11 at 16:20
add comment
I'd rather that these comments were permanently visible (with a strikethrough, and perhaps a darker background colour) to 10k+ users and the comment author, just as deleted questions and answers are visible now. It would provide for a more clear indication of what happened to the conversation.
share|improve this answer
I'd get on board with the modified background colour; strikethrough is tough to read. I think there would need to be additional control over this, though, as some people may not want to see deleted comments, particularly in very active questions. – Jon Seigel Jun 27 '10 at 20:35
If (optionally) seeing deleted comments wouldn't bother you, or would even help you, then maybe that's a different feature request? – Arjan Jun 27 '10 at 20:56
I don't see much utility being present in giving this ability to 10k users. 10k users can see deleted posts in order to moderate them, that's the primary purpose. But 10k users can't vote to delete or undelete comments like they can posts, so there is little benefit from the viewpoint of policing. Likewise, you don't get community-deleted comments the way you get community-deleted posts. There are just flagged comments and self-deleted comments, neither of which I really think serves the 10k officers any useful purpose by being visible. – Grace Note Jun 27 '10 at 21:49
add comment
You must log in to answer this question.
Not the answer you're looking for? Browse other questions tagged . |
global_01_local_0_shard_00000017_processed.jsonl/46351 | Questions tagged [superuser] or [serverfault] on meta.stackoverflow were recently migrated to their respective metas. Will moderators have the ability to migrate future questions tagged [superuser] or [serverfault] on meta.stackoverflow over to those meta sites?
share|improve this question
I asked on the blog announcement but got no reponse yet. – mmyers Jul 23 '10 at 16:06
add comment
1 Answer
Any confusion over "oops I asked on about su/sf" should be temporary and hardly worthy of a permanent close reason.
share|improve this answer
Yes, because people got used about the fact that computer questions shouldn't be asked on SO, and same for sysadmin questions ad SF, after a year :-] – Gnoupi Jul 23 '10 at 17:31
makes sense, thanks. – Andrew Jul 23 '10 at 18:42
add comment
You must log in to answer this question.
Not the answer you're looking for? Browse other questions tagged . |
global_01_local_0_shard_00000017_processed.jsonl/46352 | The Recent Occurrences:Recently Deleted list in the 10k tools won't show all the posts in the chosen date range. It appears to limit out at 45 posts (with no pagination).
share|improve this question
10K tools is woefully inadequate. – GI Joe Sep 22 '11 at 14:26
add comment
You must log in to answer this question.
Browse other questions tagged . |
global_01_local_0_shard_00000017_processed.jsonl/46378 | Syrup From Wikipedia, the free encyclopedia Jump to: navigation, search For other uses, see Syrup (disambiguation). A pot of syrup used to make stroopwafels

In cooking, a syrup (from Arabic شراب sharab, beverage, via Latin siropus) is a thick, viscous liquid, containing a large amount of dissolved sugars, but showing little tendency to deposit crystals. The viscosity arises from the multiple hydrogen bonds between the dissolved sugar, which has many hydroxyl (OH) groups, and the water. Technically and scientifically, the term syrup is also employed to denote viscous, generally residual, liquids, containing substances other than sugars in solution. Artificial maple syrup is made with water and an extremely large amount of dissolved sugar. The solution is heated so more sugar can be put in than normally possible. The solution becomes super-saturated. Contents
* 1 Pharmaceutical syrup
* 2 Culinary syrup
* 3 Syrups for beverages
o 3.1 Simple syrup
o 3.2 Gomme syrup
* 4 See also
* 5 References
* 6 External links
[edit] Pharmaceutical syrup
The syrup employed as a base for medicinal purposes consists of a concentrated or saturated solution of refined sugar in distilled water. The "simple syrup" of the British Pharmacopoeia is prepared by adding 1 kg of refined sugar to 500 mL of boiling distilled water, heating until it is dissolved and subsequently adding boiling distilled water until the weight of the whole is 1.5 kg. The specific gravity of the syrup should be 1.33. This is a 66° Brix solution.
Flavoured syrups are made by adding flavouring matter to a simple syrup. For instance, syrupus aromaticus is prepared by adding certain quantities of orange flavouring and cinnamon water to simple syrup. Similarly, medicated syrups are prepared by adding medicaments to, or dissolving them in, the simple syrup.
[edit] Culinary syrup
Golden syrup is a by-product of the process of obtaining refined crystallized sugar. Molasses is a syrup obtained at a different stage of refining.
[edit] Syrups for beverages
A variety of beverages call for sweetening to offset the tartness of some juices used in the drink recipes. Granulated sugar does not dissolve easily in cold drinks or ethyl alcohol. Since the following syrups are liquids, they are easily mixed with other liquids in mixed drinks, making them superior alternatives to granulated sugar. Bottles of syrup used for flavoring drinks in a coffee shop.
[edit] Simple syrup
A basic sugar-and-water syrup used to make drinks at bars is referred to by several names, including simple syrup, sugar syrup, simple sugar syrup, and bar syrup.
Simple syrup is made by stirring granulated sugar into hot water in a sauce pan until the sugar is dissolved and then cooling the solution. Generally, the ratio of sugar to water can range anywhere from 1:1 to 2:1.
This type of syrup is also commonly used at coffee shops, especially in the United States, to make flavoured drinks.
[edit] Gomme syrup
Gomme syrup is an ingredient commonly used in mixed drinks. It is also commonly used as a sweetener for iced coffee in Japan. Like bar syrups, it is a sugar and water mixture, but has an added ingredient of gum arabic which acts as an emulsifier. Gomme syrup is made with the highest percentage of sugar to water possible, while the gum arabic prevents the sugar from crystallizing and adds a smooth texture. |
global_01_local_0_shard_00000017_processed.jsonl/46381 | Pssst! Whisper Numbers Are Back A company beats its earnings forecast--and its stock falls. The culprit: an unspoken target
By Michael Sivy
(MONEY Magazine) – The whisper number, a sinister phenomenon that disappeared during the bear market, now seems to be back when companies issue their quarterly earnings reports. For investors, that can create excellent opportunities to buy solid growth stocks on weakness.
Whisper numbers, you'll recall, are the real expectations for earnings and other financial targets (like sales growth and profit margins) that analysts watch for and relay to favored clients sotto voce--and that often differ from the predictions they make for the general public. As unrealistic hopes and free-floating anxiety combine to create expectations that few stocks can fulfill, the impact of these unofficial targets may end up whipsawing the stocks of some very solid companies.
HERE'S HOW IT WORKS: In many cases, for a stock to rally on an earnings report, it has to beat not only the public consensus but also the secret targets. When results fall short of the unofficial numbers, share prices sag.
The reactions to recent earnings reports from 3M and IBM suggest that whisper numbers may be back. Both are attractive long-term holdings that are languishing because their latest reports didn't meet Wall Street's unacknowledged targets.
An uncelebrated success story of the bear market, 3M has seen its share price more than double since 2000. One reason: Its earnings have beat expectations for six quarters in a row. Its recent report continued that trend with a 25% gain in profits, topping consensus estimates by 1¢ a share. Yet the stock sold off, closing down $4.79 to $ 83.05.
The whisperers may have been disappointed that sales didn't top the forecasts and strength in some divisions, such as flat-panel screens, wasn't matched in others. But 3M's biggest problem also might be that its price has run ahead of earnings growth. At $82.30, 3M trades at nearly 20 times next year's estimated results. That's not an unreasonable valuation, but any further sell-off would make the shares more compelling.
And Big Blue? Despite three straight quarters of higher earnings, its stock is down 15% from it's February high. Yet second-quarter earnings rose 17% and came in above consensus estimates. Granted, its report had weak spots, and analysts are worried about the year's second half. IBM executives sound upbeat, but many investors question the health of the semiconductor and personal-computer fields.
Long-term investors should recognize that IBM is the best-diversified tech giant. And at $84.86 a share. it trades at less than 16 times next year's projected earnings. That's something to shout about. --MICHAEL SIVY |
global_01_local_0_shard_00000017_processed.jsonl/46390 | Export (0) Print
Expand All
Expand Minimize
This topic has not yet been rated - Rate this topic
sp_publication_validation (Transact-SQL)
Initiates an article validation request for each article in the specified publication. This stored procedure is executed at the Publisher on the publication database.
Topic link icon Transact-SQL Syntax Conventions
sp_publication_validation [ @publication = ] 'publication'
[ , [ @rowcount_only = ] type_of_check_requested ]
[ , [ @full_or_fast = ] full_or_fast ]
[ , [ @shutdown_agent = ] shutdown_agent ]
[ , [ @publisher = ] 'publisher' ]
[@publication =] 'publication'
[@rowcount_only =] rowcount_only
Is whether to return only the rowcount for the table. rowcount_only is smallint and can be one of the following values.
Value Description
Perform a SQL Server 7.0 compatible checksum.
When an article is horizontally filtered, a rowcount operation is performed instead of a checksum operation.
1 (default)
Perform a rowcount check only.
Perform a rowcount and binary checksum.
For SQL Server version 7.0 Subscribers, only a rowcount validation is performed.
[@full_or_fast =] full_or_fast
Is the method used to calculate the rowcount. full_or_fast is tinyint and can be one of the following values.
Value Description
Does full count using COUNT(*).
Does fast count from sysindexes.rows. Counting rows in sys.sysindexes is much faster than counting rows in the actual table. However, because sys.sysindexes is lazily updated, the rowcount may not be accurate.
2 (default)
[ @shutdown_agent=] shutdown_agent
Is whether the Distribution Agent should shut down immediately upon completion of the validation. shutdown_agent is bit, with a default of 0. If 0, the replication agent does not shut down. If 1, the replication agent shuts down after the last article is validated.
[ @publisher = ] 'publisher'
Specifies a non-SQL Server Publisher. publisher is sysname, with a default of NULL.
0 (success) or 1 (failure)
sp_publication_validation is used in transactional replication.
sp_publication_validation can be called at any time after the articles associated with the publication have been activated. The procedure can be run manually (one time) or as part of a regularly scheduled job that validates the data.
If your application has immediate-updating Subscribers, sp_publication_validation may detect spurious errors. sp_publication_validation first calculates the rowcount or checksum at the Publisher and then at the Subscriber. Because the immediate-updating trigger could propagate an update from the Subscriber to the Publisher after the rowcount or checksum is completed at the Publisher, but before the rowcount or checksum is completed at the Subscriber, the values could change. To ensure that the values at the Subscriber and Publisher do not change while validating a publication, stop the Microsoft Distributed Transaction Coordinator (MS DTC) service at the Publisher during validation.
Only members of the sysadmin fixed server role or the db_owner fixed database role can execute sp_publication_validation.
Did you find this helpful?
(1500 characters remaining)
Thank you for your feedback
Community Additions
© 2014 Microsoft. All rights reserved. |
global_01_local_0_shard_00000017_processed.jsonl/46405 | Clone Techniques
5,375pages on
this wiki
Revision as of 22:25, January 18, 2013 by Morgoth's Ring (Talk | contribs)
File:Naruto shadow clones.jpg
Naruto Uzumaki using a Clone Technique: the Shadow Clone Technique.
Clone Techniques (分身術, Bunshinjutsu) are techniques that create a copy of the user or objects used by them. The standard Clone Technique is considered the most basic of basic ninjutsu. Despite this, clone techniques are very versatile and useful, and are often used to distract or fool enemies into thinking that they have delivered a critical or fatal hit to the user, leaving the enemy vulnerable. The various villages have created their own characteristic forms of clone techniques. Besides these, there are a dozens of other clone techniques in existence, some of which are extraordinarily difficult to use.
There are various methods of creating clones. The most commonly used clone techniques use only chakra to create the clone. After these, clone techniques that use a medium seem to be most common. These clone techniques use various elements to give the clone form and substance. There are also clone techniques that transform another person or animal into a clone of the user. Finally, there are clone techniques that make use of genjutsu to create illusionary clones.
• Despite there being basic nature transformation clones, and even advanced nature ones, there has yet to have been a clone technique using basic Fire Release or Wind Release.
See Also
Start a Discussion Discussions about Clone Techniques
Advertisement | Your ad here
Around Wikia's network
Random Wiki |
global_01_local_0_shard_00000017_processed.jsonl/46414 | [an error occurred while processing this directive]
BBC News
watch One-Minute World News
Last Updated: Saturday, 29 October 2005, 22:57 GMT 23:57 UK
Electrodes lower blood pressure
Image of the brain
The electrodes stimulate very specific brain regions
Stimulating parts of the brain with electrodes can change a patient's blood pressure, researchers have found.
Although this may seem a drastic way to treat hypertension, the authors say it could help in most extreme cases where conventional therapy has failed.
It also sheds light on where in the brain blood pressure is controlled which could lead to new treatments.
The findings from Imperial College London and Oxford University are published in Neuroreport.
It would initially only be warranted in those patients for whom drug treatments just aren't working
Lead researcher Alexander Green
The team of neurosurgeons and physiologists discovered the blood pressure effects while fitting brain electrodes to 15 patients for pain control.
Deep brain stimulation involves placing very thin electrodes on very exact locations in the brain and is already used to relieve pain and to help Parkinson's disease patients with their movement.
The researchers found that they could make patients' blood pressure increase or decrease by stimulating very specific regions of the brain with the electrodes - the dorsal or ventral periventricular and periaqueductal grey matter, respectively.
Lead author of the paper Alexander Green said: "Obviously, as this is brain surgery, we have to proceed with great caution.
"It would initially only be warranted in those patients for whom drug treatments just aren't working.
New therapies
"However, other research groups are working on less invasive methods of stimulating exact locations in the brain, for example using nanotechnology, and if this becomes available then the treatment would be attractive to a much larger number of people."
In the UK, about one in five people, at least 10 million, have high blood pressure or hypertension.
Professor Peter Weissberg, medical director at the British Heart Foundation, said: "It has been known for some time that the brain can affect blood pressure.
"Although this research will help us understand better which parts of the brain are involved in blood pressure control, it is unlikely that this approach would be used to control high blood pressure in most heart patients because we already have other effective and well tolerated medicines are available to us.
"However, a very small number of patients have postural hypotension - a fall in blood pressure upon standing up - which can be debilitating and difficult to treat with existing medicines. This research may open up new avenues to treat these heart patients."
The BBC is not responsible for the content of external internet sites
Americas Africa Europe Middle East South Asia Asia Pacific |
global_01_local_0_shard_00000017_processed.jsonl/46424 | Dropbox to kill off public folders?
The popular storage service is reportedly ditching its public folders after July 31, telling developers that they should make a change to their application functionality.
The new link feature on Dropbox.
The new link feature on Dropbox.
(Credit: Ed Rhee/CNET)
Dropbox's public folders might soon be a thing of the past.
According to German site Mobiflip (Translate), Dropbox has e-mailed developers, informing them that as of August 1, public folders will no longer be supported by the service. Public folders will be officially replaced by a new Link feature the company announced in April, according to the e-mail.
"After July 31, we will no longer create Public folders in any new Dropbox accounts," the e-mail reportedly reads. "If your app depends on Public folders, we recommend switching to the /shares API call. Public folders in existing accounts, however, will continue to function as before."
Dropbox's public folders have become one of the easiest ways for users to share files over the Web. Users need only to drop the file into their public folder and direct folks to it, who can then download it. With the new links function, however, Dropbox users need to choose the "get link" option to share a file or folder with others.
Forum posters on Dropbox's site don't appear to be too pleased with the reported change. One user, Grant H., asked Dropbox to "reconsider."
"No way! Public folders gone?" the forum poster said. "I see they're trying to make this change very quietly, but this is going to bring some HUGE limitations to the way new Dropboxers can use their accounts."
CNET has contacted Dropbox for comment on the report. We will update this story when we have more information.
(Via The Verge)
Ways to view March Madness
It's a fact: Productivity drops in March as millions of people put down their work and pick up their remotes to tune into the annual NCAA basketball tournament. If you'd like in on the action, CNET's Kara Tsuboi tells us how to view the games on your TV, computer, or mobile device so you never miss a minute.
Play Video
Member Comments |
global_01_local_0_shard_00000017_processed.jsonl/46437 | Copyright © University of Cambridge. All rights reserved.
'Cola Can' printed from
Show menu
Once the lower level thinking covered in the Hint has been assimilated students might be guided if necessary to see the value of a spreadsheet when solving a problem of this sort.
Additionally the use of a graph representing the spreadsheet values is particularly helpful for 'picturing' the behaviour of the surface area function as either base radius or can height varies.
There is a valuable opportunity to work with each of the two obvious independent variables : base radius and height. Starting with either of these the other is calculable from the specified volume of 330 ml, and once both r and h are known the surface area is calculable. |
global_01_local_0_shard_00000017_processed.jsonl/46458 | The Future of Coal: Union Boss Keeps Up the Fight
As Industry Shifts West, Less Labor Is Needed
Jan. 8, 2014 3:47 p.m. ET
A shrinking coal industry is threatening the future of the United Mine Workers of America, a storied labor union that has represented coal miners since 1890.
In the 1930s, when vast numbers of miners were needed to load coal by hand, the Mine Workers was the nation's biggest and most powerful union, with about 800,000 members. Today, the union has about 35,000 active members, 20,000 of whom are coal miners.
But it also...
Available to Subscribers |
global_01_local_0_shard_00000017_processed.jsonl/46498 | OpenWetWare:Software/Projects/Lab Notebooks/Activity
From OpenWetWare
Jump to: navigation, search
Activity overview
Legend: image:tick.png = Contacted
• User:Michael_Schneider image:tick.png
• User:Katherine_K._Jacobs image:tick.png
• User:Federico_Castro_M image:tick.png
• User:Dileep_D._Monie image:tick.png
• Feedback
"I like it. Now I can easily manage multiple projects. The dynamic calendar is nice. I haven't tried the search function but I'm sure it'll come in handy.
The only bug I've notice so far is on the entry pages. Some entries show "< Previous entry" and "Next entry >" links, while others just show a "< Previous entry" link (even though there are entries for future dates). I would also like to see the "my lab notebook" link added to the upper right and have it link to the new notebook. I'm sure I'll think of other things as I use it more."
IGEM 2008
Personal tools |
global_01_local_0_shard_00000017_processed.jsonl/46499 | From OpenWetWare
< Protocols
Revision as of 17:58, 15 October 2009 by Kehinde Kassim (Talk | contribs)
Jump to: navigation, search
This page is a template and should not be edited.
Click here, copy the source, and paste it into your page.
Interested in posting a protocol on OpenWetWare? Here is a template to help you do so.
Click the view source tab and copy everything below this line. Paste it into your new protocol page. Then replace the text in this page with your own protocol. Feel free to add or delete sections as appropriate.
This is a protocol designed for T-regulatory assay for Mouse allergen (Mus m1) study.
• reagent 1
• X μL reagent 2
• component B
• equipment 1
• equipment 2
Isolation of Mononuclear Cells
• This is a sterile procedure and all steps should be performed in a hood.
1. Turn on the hood. Bring Ficoll and PBS to room temperature in the hood.
2. Obtain whole blood specimens collected in sodium heparin (green top) collection tubes and record subjects information, i.e. ID#, date collected, date received.
3. If performing Basophil Activation Assay on this sample, set aside 3mL of whole blood before the next step.
4. Dilute the remaining blood at 1:1 with PBS in a 50mL conical tube.
5. Place 15mL of Ficoll in a 50mL conical tube. Overlay with up to 30mL of diluted blood, gently add the blood on the ficoll solution to avoid of blood with ficoll solution.
6. Centrifuge @ 500g for 30minutes @ room temperature (slow acceleration, deceleration off to ensure no disruption of the density gradient).
7. Using a sterile transfer pipette, aspirate the buffy coat (peripheral blood mononuclear cells [PBMCs]) into a new 50mL conical tube (avoid aspirating the ficoll). Add PBS into the 50mL tube to bring the sample to a minimum of 2X the initial volume. Invert up and down gently to mix.
8. Centrifuge @ 500g for 20minutes @ room temperature (maximum acceleration and deceleration).
9. Aspirate and discard the supernatant. Resuspend the cell pellet first by tapping the tube until no clumps are visible, then adding 1mL of PBS. Set aside a 10μl aliquot of cells for counting as follows: Add 90μl of PBS into the 10μl of cells.
10. Add PBS to the cells in the 50mL tube for a total volume of 20mL, and centrifuge @ 300g for 15 minutes @ room temperature(maximum acceleration and deceleration).
11. In order to determine the volume to use for resuspending the PBMCs after the wash, the total number of cells in the sample must be determined. Combine the 100μL aliquot of cells in PBS set aside above with 100μL of 0.2% Trypan solution (if using the automated counter) or 0.4% Trypan solution (if manual counting). Mix well with pipette.
12. Carefully, introduce 10μL of the stained cells into the notch of a hemocytometer and record cell counts using a hand-held counter. Count the number of cells under a microscope or place 20μL of the stained cells onto a disposable slide and count using the automated counter.
13. After centrifugation is completed, aspirate and discard the supernatant. Resuspend the cell pellet by tapping the tube until no clumps are visible. Suspend PBMCs with PBS @ 10 million cells/mL in a 15mL conical tube.
PBMC Antigen Stimulation Assay
*This is a sterile procedure and all steps should be performed in a hood.
1. Remove stimulants from the freezer and thaw.
2. Label 24 well plate with specimen ID and date (this is for the 7 days cell culture). Label each well with the appropriate stimulant condition, ordered by priority (for cases where there are insufficient cells to test all stimulants).
1. Musm1 (allergen): @ 200μg/mL purified Musm1 protein in Aim-V.
2. AIM-V + IL-2 (negative control): AIM-V + IL-2 medium alone.
3. Beads (positive control): 1μg/mL anti-Cd3/Cd28 beads.
4. Tetanus: 200μg/mL tetanus in AIM-V.
3. Add an equal volume (1:1 dilution) of freshly prepared 10μM CFSE (in PBS) to the tube of cells. To make 1.5mL of PBS + CFSE (2x solutin): add 3μL of stock CFSE (5mM) into 1.5mL of PBS.
4. Incubate in 37deg;C water bath for 10 minutes.
5. After incubation, wash the CFSE stained cells in 10mL of AIM-V @ 300g for 10 minutes. Aspirate supernatant after centrifugation.
6. Resuspend CFSE stained cells in AIM-V medium @ 4 million cells/mL. For plating, each well should contain 2 milliion cells/mL.
• Begin the stimulation process by preparing AIM-V medium + a 2X solution of IL-2 by adding 2μL of IL-2 per mL of medium in a 15mL conical tube. For 5 stimulant conditions, you will need atleast 2.5mL of AIM-V + IL-2. Vortex gently.
1. List troubleshooting tips here.
Relevant papers and books
All Medline abstracts: PubMed HubMed
• Who has experience with this protocol?
or instead, discuss this protocol.
Personal tools |
global_01_local_0_shard_00000017_processed.jsonl/46500 | From OrthodoxWiki
Revision as of 17:16, June 23, 2007 by Wsk (Talk | contribs)
Jump to: navigation, search
This article is about Monk’s cells (living quarters).
A Cell in the Christian context is the living quarters for monastics, both male and female. Usually, a monk’s cell is small and contains a minimum of furnishings.
The term cell applies to living space in a building, usually within a cenobitic monastery, that consists of rooms for each monk or nun as well as to primitive solitary living spaces that may be a cave or hut in the desert or deep forests isolated from monasteries. In a cenobitic setting the building of "cells” also contains communal rooms for eating.
In 2005, the oldest physical example of living quarters for Christian monks was found by renovators who were repairing paintings in a fifteenth century church at the site of the ancient Monastery of St. Anthony in Egypt, near the Red Sea. The monastery was founded in mid-fourth century and is located about 100 miles south west of Cairo, Egypt. These cells date from the fourth and fifth centuries. This archeological find is the first physical evidence that monks lived on the monastery site before the sixth century.
External links
Personal tools
Please consider supporting OrthodoxWiki. FAQs |
global_01_local_0_shard_00000017_processed.jsonl/46513 | Frozen Pinewood River
Frozen Pinewood River
by Jakub
submit your photo
Hall of Fame
View past winners from this year
Please participate in Meta
and help us grow.
Take the 2-minute tour ×
Can anyone offer any tips on achieving long exposures (with the intention of blurring water, clouds etc)?
share|improve this question
See also What filter should be used to lengthen exposure? – mattdm Jun 10 '11 at 15:37
See also How do I meter for long exposures (10+ minutes)? – Imre Aug 24 '11 at 7:34
add comment
6 Answers
up vote 43 down vote accepted
The Technique
Stable Tripod is a must if you want to be able to compose.
If you want exposures over 30 seconds, use Bulb mode, as most of the cameras only meter up to 30 seconds.
Use small apertures, low ISO and add ND filters if there is too much light. You probably want your sensor to be clean also as small apertures will render the dust relatively sharply.
Use remote trigger or self-timer so you don't touch the camera during exposure.
It's better to use mirror-lockup to avoid camera shake caused by mirror movement.
Disable all automatic features, like auto-ISO, auto-flash, probably also autofocus (just focus once from a contrasty point and then switch to manual).
Most of the cameras have something called "long exposure noise reduction" which will double your exposure time, expose a dark frame and subtract it from the main frame to lessen noise. If you're OK with the exposure time doubling, use it, otherwise disable.
When the exposures get really long (up to and over 30 min) you might want to do it with fresh battery. Around these times amplifier noise will probably be problem with digital cameras - it will result purple glow in some parts of the frame.
Should you be doing it with film, keep the reciprocity failure in mind. You can check the needed exposure correction amounts from the film manufacturer's website.
Artistic side
The "long exposures" starting from anything that is not hand holdable any more are usually used to add dynamics to the picture. Motion blur can sometimes result very nice photos, it just needs a lot of experimentation to get right.
The long exposures ranging around 1-30 seconds can be used to play with the balancing lights concept. The prime examples of balancing light work are the photos taken at after dusk or pre-dawn, when there is some natural ambient light available, but it balances well with the artificial light sources.
You can also balance ambient light with flash or other kinds of controlled artificial lightning. Experiment with different directions and vary the intensity.
Here is an example of balancing light concept: photo with natural light only and the same shot with additional artificial lightning (this is the winner of "Astronomy Photographer of the Year 2010").
In contrast the very long exposures are usually used smooth out any movement and create a static and mysterious mood instead. Good examples this approach can be found among Michael Levin's works.
share|improve this answer
W.r.t. the long exposure noise reduction, you can do this manually - take an image with the same ISO and shutter speed as your real shot, with the lens cap and viewfinder covers on, and then you can manually subtract that from the images. That's all the camera is doing anyway. – Reid Jul 25 '10 at 23:27
Reid's suggestion would work as long as you make right after the shot you want to subtract from. Otherwise thermal conditions will vary and therefore the thermal noise will change. – André Carregal Jul 26 '10 at 10:09
Reid's comment is great! Since I'm using CHDK for long exposure, I don't have the noise reduction option. Now I know how to remove it! – tomm89 Oct 16 '10 at 20:17
@Reid The purpose of dark frame subtraction is to correct repeatable pixel-to-pixel variations in dark current. Demosaicing mixes data from multiple pixels (and with modern algorithms, this happens in complex ways and involves more than just neighbors). Unless you have a way to do the subtraction on raw data before demosaicing, which is not a common feature that I've seen in photographers' software, you won't be able to do as well as the camera can. (Likewise, the subtraction should be done on linear pixel values, without gamma correction etc.) – coneslayer Apr 13 '11 at 15:25
I should add that subtraction of a single dark frame (whether in-camera or post-processing) helps correct the repeatable variations, e.g. hot pixels and other "structure," but actually increases the true noise component by sqrt(2), so it's not all good. This is why astronomers average multiple dark frames to produce a high-quality "super dark" for subtraction. – coneslayer Apr 13 '11 at 15:35
add comment
In general, use a smaller aperture. If that will not give you slow enough shutter speeds, neutral density filters (ND-filters) will give you slower shutter speeds without altering colors and such in the scene. They come in different strengths and can be combined. If you go shopping for an ND filter, make sure not to mix up graduated ND-filters with regular ones. The graduated filters have another purpose.
Another option is to use a polarizer (which will typically steal 2 stops worth of light).
share|improve this answer
add comment
The other two answers cover most of it, but don't forget to set the ISO to as low a value as possible - 100 at most. This will allow you to have a longer exposure.
share|improve this answer
add comment
A couple of people have already mentioned ND filters. An alternative is to stack two polarizers and "cross" them (make sure the front one is not a circular polarizer though) to reduce light transmission. This can be particularly effective when you need a really long exposure (e.g., to get a 10 minute exposure in broad daylight to make tourists "disappear").
share|improve this answer
add comment
You could use a Tripod and also a remote trigger (self-timer is also ok). But in day light I think 2 major components
1. Lowest ISO
2. Smallest Aperture
Also the use of ND filters considerably help the process. Incase of emergency you could even use your sunglasses. But be careful that it cover the whole lens.
Also if the scene allows it use the extended zoom. You get couple of extra f-stops with that.
share|improve this answer
add comment
In addition to the in-camera methods (small apertures, low ISO, ND filters...) you could take several exposures, and average them digitally in post-processing. That should work well for things like waterfalls and streams, but could introduce gaps in star trails, automobile traffic, etc.
share|improve this answer
Pentax dSLRs actually have a feature to do this in-camera, adjusting exposure automatically and everything. Pretty cool. – mattdm Apr 19 '11 at 12:53
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/46515 | 191 reputation
bio website visualsort.appspot.com
location Brooklyn, NY
age 23
visits member for 2 years, 7 months
seen Oct 8 '13 at 19:46
I'm a software developer in NYC working at Fog Creek Software. I have interned (Software Engineering) for a total of about 13 months spread among Gridpoint, Skyline Innovations, and Fog Creek Software. I graduated from the College of William and Mary in 2012 with a double major in Computer Science and Physics and a minor in Math. |
global_01_local_0_shard_00000017_processed.jsonl/46527 | 101 reputation
bio website plus.google.com/…
location Anacortes, WA
age 37
visits member for 2 years, 1 month
seen Mar 15 '13 at 4:28
Real Name: Chris Francy
I work as a Senior Network Analyst at Northwest Educational Service District #189 in the Technology Services department.
The Technology Service department, in addition to supporting the staff at NWESD, provides network support services to 35 K-12 school districts in Northwest Washington region.
In my free time, when I am not at work or answering questions, I play a lot of video games on the PC (Steam Profile).
You can find more links to various websites and social networks on my Google profile.
profile for Zoredache on Stack Exchange, a network of free, community-driven Q&A sites
0 Offered bounties
This user has not participated in any bounties |
global_01_local_0_shard_00000017_processed.jsonl/46528 | 196 reputation
bio website jefflunt.com
location Evanston, IL
age 34
visits member for 1 year, 3 months
seen Nov 29 '12 at 22:07
I code because it is the single, greatest expression of creativity that I have ever found. Coding isn't just the ability to translate an idea into working software, it's the ability to focus creativity into reality. |
global_01_local_0_shard_00000017_processed.jsonl/46538 | Take the 2-minute tour ×
I am looking for a software platform/programming framework which can do the following:
• INPUT: a user inputs some text
• PROCESS/REFERENCE DATA: the user is then asked to answer a list some questions regarding the INPUT and attribute the answers either to the whole INPUT or to some parts of the INPUT
• OUTPUT: the list of answers attributed to the original INPUT
Some clarifications:
• re: REFERENCE DATA: the list of questions should allow for a sub/follow-up question
• re: PROCESS: the answering process should be as flexible as possible (user should be able to skip questions, provide his or her own answers, etc)
• this is NOT meant to be an automatic/machine learning tool - the user (the human) will be classifying the INPUT himself/herself based on the REFERENCE DATA
share|improve this question
Hm.... where did the bounty go? – DaveFar Oct 7 '11 at 9:11
@DaveBall - I accepted your answer, so it should have gone to you. How can I check it? – user18404 Oct 7 '11 at 23:07
There's a bounty tab on your personal page - I wonder what it says. Since your bounty was suddenly gone on this page long before the grace period was over, I guess something went wrong :( – DaveFar Oct 8 '11 at 11:32
@DaveBall, a bounty page in my profile has 3 subtabs: active, offered and earned. I can still see this question on the offered tab, but not on the active nor on the earned. – user18404 Oct 8 '11 at 23:53
@DaveBall, I think I know what happened, here's the exert from "There are a few other rules around bounties": "If you do not award your bounty within 7 days (plus the grace period), the highest voted answer created after the bounty started with at least 2 upvotes will be awarded half the bounty amount. If there's no answer meeting that criteria, the bounty is not awarded to anyone.". Because your original answer has been created before I offered the bounty, the bounty didn't automatically was awarded you you. To avoid such situations in a future, I am going to make some suggestions on meta.se – user18404 Oct 9 '11 at 5:12
show 2 more comments
closed as off-topic by gnat, GlenH7, Kilian Foth, Glenn Nelson, Dan Pichelman Dec 19 '13 at 17:35
2 Answers
up vote 2 down vote accepted
This is a huge field, with a lot of methodologies involved:
• taxonomy
• guided search
• faceted search
• ontology
• semantic web.
Three exemplary platforms, each quite different, are http://www.endeca.com/en/products/Endeca-InFront/Faceted-Search-Navigation.html, http://www.ontotext.com/kim and http://www.thinkmap.com/thinkmapsdk.jsp;jsessionid=E9F7B78CABB9190A900E687793874823.
So I think you should refine what kind of platform you are looking for. For Java, maybe you'll find something useful from the list http://www.searchtools.com/tools/tools-java.html.
Reading your comment, I think some text tagging and afterwards guided search should do the job.
This paper about Generic Text Processing is quite old, but might lead you in a helpful direction.
share|improve this answer
Thanks for the answer Dave. However I would like to emphasize - that I am not after something automatic or even semi-automatic, the text classification job will be performed 100% by a human. After some though I come to realise that I am really looking for is a simple program/framework which will allow me to make a links between a chunks of texts to some classification values (answers to the questions or even to a simple text comments) – user18404 Sep 28 '11 at 6:25
add comment
It sounds like you want something like an expert system. Expert systems are typically used as classification tools, and are programmed (or trained) to do exactly what you describe: take a fact, then gather additional information in a systematic way to (hopefully) identify or classify the fact. You could probably code up a simple one in a couple of days, the real challenge is encoding and navigating your knowledge base. There are lots of "rules engines" that are made for this, but they tend to be fairly complex, I'd recommend trying to write your own first.
share|improve this answer
add comment |
global_01_local_0_shard_00000017_processed.jsonl/46539 | Take the 2-minute tour ×
Although, my question may be entirely irrelevant, but I have sensed a pattern between most programming languages and their official implementations.
Interpreted (byte-interpreted?) languages like Python , Lua etc. usually have an extremely lenient and easy syntax and are generally type-less or do not require the developer to explicitly write variable types in source code;
Compiled languages like C , C++ , Pascal etc. usually have a strict syntax, generally have types and mostly require more code / development time
Languages whose official implementations are JIT-Compiled like Java / C# usually are a unique compromise between the above two with some of the best features of both.
Some of the more modern compiled programming languages like D and Vala (and the GNU GJC implementation of Java) are perhaps an exception to this rule and resemble the Syntax and features of JIT-Compiled languages like Java and C#.
My first question is, is this really relevant? Or is this just a coincidence that most interpreted languages have easy syntax , JIT-Compiled ones have a moderate syntax and features etc.
Secondly, if this is not a coincidence, then why is it so? Like, for example, can some features only be implemented in a programming language if you are, say, JIT-Compiling it?
share|improve this question
@YannisRizos sorry, It's not a quote. I just wanted to highlight it. I'll edit it. – ApprenticeHacker Dec 21 '11 at 6:28
Cool, I though it wasn't a quote but it could lead to answerers thinking it was one and not try to refute it (or blindly agree with it)... I've noticed similar patterns but unfortunately don't have a good answer. – Yannis Rizos Dec 21 '11 at 6:33
@R.MartinhoFernandes sorry, I wasn't aware of that. I'll edit it (again). – ApprenticeHacker Dec 21 '11 at 7:25
Perl is dynamically typed for user defined types, statically typed with respect to distinguishing arrays, hashes, scalars, and subroutines, and strongly typed via use strict, interpreted and JIT compiled (not at the same time of course)... Whenever someone tries to make sense of language design, throwing in some Perl is always fun... – Yannis Rizos Dec 21 '11 at 8:03
What do you mean by "lenient syntax" vs. "strict syntax"? They're all formal languages and none will run source code with syntax errors. – nikie Dec 21 '11 at 9:08
show 2 more comments
5 Answers
up vote 14 down vote accepted
There is no connection whatsoever between semantics and syntax. Homoiconic compiled languages like Scheme comes with a pretty minimalistic syntax. Low level compiled meta-languages like Forth are even simpler than that. Some very strictly typed compiled languages are built upon a trivial syntax (think ML, Haskell). OTOH, Python syntax is very heavyweight, in terms of a number of syntax rules.
And yes, typing has nothing to do with syntax, it's on the semantics side of a language, unless it's something as perverted as C++, where you cannot even parse without having all the typing information available.
A general trend is that languages that evolved for too long and did not contain any design safeguards against syntax deviations would sooner or later evolve into syntactic abominations.
share|improve this answer
+1 for making me look up "homoiconic"... And for the subtle nod to PHP... – Yannis Rizos Dec 21 '11 at 8:54
+1, languages that evolved for too long and did not contain any design safeguards , does this also refer to Delphi/Object-Pascal? – ApprenticeHacker Dec 21 '11 at 8:57
@IntermediateHacker, Pascal is a strange story. It kept relatively static by its clean design and by the sheer respect to Wirth. OTOH, Wirth himself initiated several rounds of cleansing, abandoning original Pascal design and distilling the ideas into Oberon and Modula. Probably this is the right way - building new languages rather than allowing an old one to evolve freely. – SK-logic Dec 21 '11 at 9:31
Oh I don't know... Fortran has had much evolution since 1966 and is still going. You should be able to take a Fortran 66 program and compile it on a modern compiler too. COBOL (shock horror) is still going strong too, with umpteen evolutions. If the evolution serves a useful purpose then all we are doing by commenting is making a subjective value judgement. – quickly_now Dec 21 '11 at 11:00
@quickly_now, evolution would not be possible without the old species dying. When several languages combined give birth to a new one and then all descend into shadows - it is ok. When a language keep spawning out its own slightly mutated clones and then stay watching them brawling instead of dying gracefully (standards competing with their own previous versions - awful!) - it is not very healthy for the eco-system. – SK-logic Dec 21 '11 at 11:06
show 4 more comments
Mostly this is a coincidence.
Programming languages have evolved over time, and the technology of compilers and interpreters has improved. The efficiency of the underlying processing (ie the compilation time, the interpreting overhead, the execution time etc) is also less important as mainstream computing platforms have grown in power.
The language syntax does have an impact - for example, Pascal was very carefully designed so it could use a single pass compiler - ie one pass over the source and you have excutable machine code. Ada on the other hand paid no attention to this, and Ada compilers are notoriously difficult to write - most require more than one pass. (One very good Ada compiler I used many years ago was an 8 pass compiler. As you might imagine, it was very slow.)
If you look at old languages like Fortran (compiled) and BASIC (interpreted or compiled) they have / had very strict syntax and semantic rules. [In the case of BASIC, thats not Bills old BASIC, you need to go back before that to the original.]
On the other hand, looking at other older things like APL (a bunch of fun) this had dynamic typing, of sorts. It was also generally interpreted but could be compiled too.
Lenient syntax is a difficult one - if that means you have things that are optional or can be inferred then it means the language has sufficient richness that it could be culled. Then again, BASIC had that many years ago when the "LET" statement became optional!
Many of the ideas you now see (for example, typeless or dynamic typing) are actually very old - first appearing in the 1970's or early 1980's. The way they are used, and the languages these ideas are used in has changed and grown. But fundamentally, much of whats new is actually old stuff dressed up in new clothes.
Here are some examples off the top of my head:
• APL: dynamic typing. Generally interpreted. Came from the 1960's / 1970's.
• BASIC: strong or dynamic typing. Interpreted or compiled. 1970's and many beyond.
• Fortran: strong typing. Compiled. 1960's or earlier.
• Algol68: strong typing. Compiled. 1960's.
• PL/1: strong typing. Compiled. 1960's.
• Pascal: strong typing. Compiled. 1970's. (But in the 1980s there were P-System compilers very similar to JIT compilers!)
• Some implementations of Fortran and others by DEC in the early days were partially compiled and partially interpreted.
• Smalltalk: dynamic typing. Compiled to bytecode which is interpreted. 1980's.
• Prolog: more strangeness. Functional. Compiled (Turbo Prolog, anybody?). 1980's.
• C: strong (ha ha) typing. Compiled. 1960's..today.
• Ada: uber-strong typing. Compiled. 1980's.
• Perl: dynamic typing. (Strong syntax). Interpreted. 1990's (?).
I could go on.
• Nitpickers corner: Many interpreted languages are tokenised or "byte compiled" at the time they the source is loaded / read-in. This makes the subsequent operation of the interpreter a lot simpler. Sometimes you can save the byte-compiled version of the code. Sometimes you can't. Its still interpreted.
Update: Because I was not clear enough.
Typing can vary widely.
Compile-time fixed static typing is common (eg, C, Ada, C++, Fortan, etc etc). This is where you declare a THING of a TYPE and it is that way forever.
It is also possible to have dynamic typing, where the thing picks up the type that is assigned to it. For example, PHP and some early BASIC, and APL, where you would assign an integer to a variable and from then on it was an integer type. If you later assigned a string to it, then it was a string type. And so on.
And then there is loose typing, for example PHP where you can do truly bizarre things like assign a numeric integer (quoted, so its a string) to a variable and then add a number to it. (eg '5' + 5 would result in 10). This is the land of the bizarre, but also at times the very very useful.
HOWEVER these are features designed into a language. The implementation just makes that happen.
share|improve this answer
Strong typing is not the counterpart of dynamic typing. It's the counterpart of weak typing. The counterpart of dynamic typing is static typing: in one, the types of expressions in a program can be known statically (i.e. without running the program); in another the types can only be know dynamically (i.e. the program must be run). – R. Martinho Fernandes Dec 21 '11 at 7:20
Yes and both some variants of BASIC and APL were doing this back in the late 1970's. APL types are not quite as we understand them today (being things like universally typed integer/float but could also be vectors, strings, and multi-dimensional matrices). – quickly_now Dec 21 '11 at 8:08
A Fortran interpreter is still widely used (see Cernlib and PAW). And its descendant, ROOT, is built upon a C++ interpreter. – SK-logic Dec 21 '11 at 8:27
I'm not entirely clear how strong/weak and static/dynamic typing relates to syntax, to be honest. But the answer-quality was pretty good, so I am just avoiding upvoting. I'd class C typing as "static/weak" (it's trivial to look at a stored value as if it was another type, possibly getting the value wrong). – Vatine Dec 21 '11 at 13:18
@Vatine - I'd actually say strong at compile time, non-existant at run time - if you want it that way. You can do that using pointers and their equivalent in many languages. It is even possible in classical pascal using variant records, and in Ada using UNCHECKED_CONVERSION (though difficult, its possible). – quickly_now Dec 21 '11 at 22:35
show 1 more comment
I generally agree with quickly_now in that your observation is mainly a result of history. That said, the underlying reasoning boils down to something like this:
The more modern a language is, the more comfortable it should be to use.
(Not a quote really, just my own formulation.) When I write comfortable here, I refer to what you called best features of both. More precisely, I do not want to speak for or against static/dynamic typing or strict/lenient syntax. Instead, it is important to see the focus being placed on developers and increasing their comfort-level when working with the language.
Here are some reasons, that have not been mentioned in previous answers, which may provide you with some ideas for why you observe these things (and are all sort of based on the history of programming lanugage development) :
• We have hundreds of programming lanugages these days. When a new one comes up, how can it find a broad audience? This is the main reason, why new languages always try to increase the developers' comfort-level. If the language can do the same as an older one, but can do it much easier/simpler/more elegant/etc. you may want to consider actually switching.
• Learning curve goes hand in hand with that. In the past, we had few languages and investing time to learn one was worth it. Even if that meant investing a lot of time. Comfort is again increased, if you come up with a language that developers can learn very quickly. Complexity of any kind (f.ex., complicated involved syntax) are detrimental to this, and hence, are reduced more and more in newer languages.
• Technological advances (a direct historical reason here) are responsible that compiler builders can now place more focus on developer comfort. In the early days, we were happy to be able to build a compiler at all. However, that often implied heavy restrictions being made. As the technological know-how increased, we were able to lift these restrictions again.
So in general, programming languages and compilers have seen a development similar to that of typical end-user applications:
1. Initial stage: It's a cool thing to have, but the bleeding edge technology barely makes it work at the cost of comfort/useability/what-not.
2. Technological improvement: We can build these things more robustly, faster, and easier.
3. Focus turns to the user: Similarly to the Web2.0 movement focusing on user experience, new programming languages focus on the developer perspective.
share|improve this answer
(Not a quote really, just my own formulation.) Well, you formatted it as code, not as a blockquote, so I don't think anyone thought it was a quote :) – Yannis Rizos Dec 21 '11 at 9:21
Comfort clearly depends on a taste (which is always entirely subjective). The language I'm most comfortable with was designed in 1959, and I can't stand dealing with some of the languages that appeared in this century. – SK-logic Dec 21 '11 at 9:35
Comfort also depends on purpose. Running PHP or Prolog on an 8k embedded micro for a washing machine controller might be "comfortable" to program, but also damn hard to actually make it fit and run with acceptable performance. – quickly_now Dec 21 '11 at 22:37
add comment
I think it's the other way around: implementation depends on syntax. For example, if your syntax allows for reflection, then the implementation must provide a runtime that supports that.
share|improve this answer
+1, for being sarcastic... my drawing is awesome. – ApprenticeHacker Dec 21 '11 at 8:58
@IntermediateHacker: but it's in java, so I should be awesome – sehe Dec 21 '11 at 9:22
add comment
A given programming language may or may not expose or constrain enough semantic information for a compiler to deduce how to reduce it to executable code without added runtime decisions ("what type is this variable?", etc.) Some languages are explicitly designed to make this constraint mandatory, or easy to determine.
As compilers get smarter, they might be able to guess or profile enough information to generate executable code for the most likely path(s) even for languages which were not explicitly designed to so expose or constrain those decisions.
However, languages where code (evalString()) can be created or entered at runtime (and other stuff that the compiler can't deduce or guess) may require an interpreter or JIT compiler to be available at runtime, even with attempts to pre-compile them.
In the past, a programming language and its implementation might have evolved so as to fit some hardware constraint, such as whether the interpreter might fit in 4k or 16k, or whether the compiler might finish in less than a minute of CPU time. As machines get faster, it has become possible to (re)compile some formerly interpreted programs as fast as the programmer can hit the return key, or interpret formerly compiled program source code faster than slightly older hardware could run optimized compiled executables.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/46540 | Take the 2-minute tour ×
I would like to know if it is possible to use DBUS on Android using Java. From what I have been searching till now it appears like there is no DBUS programming support on Android. But then bluetooth on Android uses DBUS. I would like to confirm if it is actually the case. If so, is there a possibility that DBUS would be supported in the future.
share|improve this question
Have a look at stackoverflow.com/questions/1591164/… - short answer: you shouldn't do that. – Ulrich Dangel May 16 '12 at 2:18
@mru I did not get the reason. Could you explain it? If necessary we can change the Android OS before using. – salsabear May 16 '12 at 3:00
The problem is it isn't guaranteed that dbus is available. If you control the platform you can ensure dbus is present. This will allow you to use the normal java dbus library – Ulrich Dangel May 16 '12 at 3:11
@vski We have decided to use dbus anyway. But not by using java but using JNI to call dbus from native code. A new problem is, why are dbus headers not available in android-ndk? but dbus headers are in android source code. – salsabear Jun 7 '12 at 8:31
show 2 more comments
Your Answer
Browse other questions tagged or ask your own question. |
global_01_local_0_shard_00000017_processed.jsonl/46541 | Take the 2-minute tour ×
I currently code with C, C++, and Python. I'm wanting to pick up a functional programming language, and right now I'm leaning toward Haskell. I do NOT want to start a "Haskell vs Lisp" war here; what I want to know is this: if I learn Haskell primarily for exposure to functional programming, what benefits, if any, will I gain from later learning Lisp?
Update: Thanks everyone for your answers. Now all I need to do is pick a dialect of Lisp, but that's a question for another time.
share|improve this question
And F# and Clojure. – Heather Feb 13 '12 at 11:45
add comment
6 Answers
up vote 42 down vote accepted
I suggest learning both, Haskell first, then Common Lisp. My experience with Haskell was that the static typing seemed to be a restricting annoyance at first, but once I got used to it, I noticed that most of my type errors had logic errors hiding behind them. When you get to this point, and the next milestone, which is learning to think in types and define your own types as a means of expressing your solution, you'll be ready for Common Lisp.
With Common Lisp, you can add monads, currying, and everything you liked from Haskell, but you also get multiple inheritance like Frank Shearar mentioned, and generic functions with multiple dispatch, and an advanced exception handling system.
So why not just learn Common Lisp first? Coming from a procedural and OOP background, my experience has been that I didn't really understand functional programming until I had to use it exclusively. Once functional programming is comfortable, you can add the rest of the tools that Common Lisp makes available, and use whatever tool is best at the task at hand.
share|improve this answer
I think you nailed it - what makes Haskell and Smalltalk so useful for learning is their purity. – Frank Shearar Nov 14 '10 at 11:44
I agree with the purity makes learning a language a lot easier. I couldn't understand functional language itself with LISP because everything are possible in the language and I have too much imperative, OO background. But in Haskell, there is no such concepts which disrupt learning. – Eonil Feb 16 '11 at 2:09
It's funny, I've had the opposite experience. I picked up the main points of functional programming through Scheme, my first language. I occasionally hack in Haskell and I inevitably find that I have to relearn 90%+ of the stuff that I knew whenever I leave Haskell for a while. That being said, Haskell is an incredibly rich language, with a huge amount to teach you (very forcibly.) Types Types Types Types! Follow the types! – Josh Infiesto Apr 1 '12 at 4:59
add comment
AND please.
Haskell teaches you the purest of FP, as far as I'm aware at least, just like Smalltalk teaches the purest of OO. (I mention this not to suggest that OO and FP can't marry, but because both these languages are "gem" languages - a core idea taken to extremes.)
Lisp is really a family of languages, so I'll talk about Common Lisp because that's the particular member of the family I use.
Lisp will still have lots to teach you:
• It's multiparadigm, so as dsimcha points out it'll show you how to integrate FP with other paradigms.
• Lisp will teach you that "code-is-data, data-is-code", for example through its macros.
• CLOS is a very interesting brand of OO, with multiple inheritance that works, and generic functions.
share|improve this answer
add comment
Learning Lisp later will allow you to customize Emacs which arguably is the most advanced text editor available. You can't do that in Haskell.
share|improve this answer
[Sharpens his parentheses] – Inaimathi Nov 13 '10 at 20:35
Maybe someone can write a text editor for it. I hear the Emacs operating system doesn't come with one. (I kid. I know you can get Viper mode. :) – greyfade Nov 13 '10 at 23:04
Actually, there is an Emacs-clone called Yi, which uses Haskell in exactly the same way as Emacs uses Lisp. In fact, compared to (GNU) Emacs, Yi is even purer, because its kernel is also written in Haskell, whereas Emacs kernels generally tend not to be written in Lisp. GNU Emacs' kernel is written in C, JEmacs' is written in Java, for example. – Jörg W Mittag Nov 13 '10 at 23:09
@Jörg, if it is a partial reimplementation instead of a full clone of GNU Emacs or XEmacs, it is not the same thing. Similar to comparing Word to Wordpad or Notepad. – user1249 Nov 13 '10 at 23:26
@Thorbjørn Ravn Andersen: Yes, but not quite that bad. :) – greyfade Nov 14 '10 at 4:27
show 3 more comments
The main benefit I see from learning Lisp is learning how to integrate FP into a real-world oriented multiparadigm language, rather than only learning it in the context of an academic language that emphasizes purity.
share|improve this answer
I guess you do want a "Haskell vs Lisp" war! – Don Roby Nov 13 '10 at 17:59
Haskell is an academic language that emphasises purity... and lots of people use it in the real world. Smalltalk's in that camp too. – Frank Shearar Nov 13 '10 at 18:06
Lots of people use Haskell in the real world? – Jon Harrop Dec 27 '10 at 19:28
@Jon Harrop: Well, I do use Haskell in the real world (and it works really fine for certain applications), maybe I am one of the few (?) – Giorgio Aug 2 '12 at 8:38
add comment
Haskell and Lisp are two totally different beasts.
Haskell is kindof "pure functional programming in an ivory tower"
Lisp is kindof "code-is-data / data-is-code / make your own language constructs". You can manipulate your code in whatever way you can imagine.
They are very different. Both share the "functional programming" aspect, but that's really a tiny little common point compared to their differences. Just try them out and you will see how different they are!
share|improve this answer
+1: Good point. I know some Haskell and some Lisp. Even though I am not an expert in either of them, I think you are right that they are very different. In Haskell you do not have the idea of using data as code. In Lisp you do not have (AFAIK) pattern matching. Probably the list (!) of differences is longer. – Giorgio Jul 3 '12 at 5:35
add comment
I also come from a C/C++/Python background and have tried out FP a couple of times in the last few years. Initially I looked at Haskell and couldn't make head or tail of it, then tried Ocaml but didn't get much further with that. Finally I started hearing good things about Scala, tried it, and found it suited me very well (I had also done a bit of Java in the past), to the point that after a year of so of dabbling in Scala (and dispatching 161 Project Euler problems with it), Haskell seems to make much more sense. In fact I just ordered a couple of books on Haskell and want to give it another go, although this is largely motivated by the existence of Scalaz.
So I found using a multi-paradigm language (ie Scala, but Lisp would probably fit the bill too) a good way into FP. But if you're happy diving into Haskell (I wasn't), go for it.
share|improve this answer
Interesting that you got further with Scala than OCaml. How come? – Jon Harrop Dec 27 '10 at 19:32
@Jon: Good question; hard to say. Maybe I just wasn't ready to "get into" functional at the time. Maybe I just happened to find a Scala tutorial pitched at the right level. Maybe Scala's C/C++/Java lineage just made it a bit less alien. Given any rational bet these days would be on F# rather than Scala, I'll probably revisit the OCaml domain at some point, although since I dabble in this stuff just for the sheer joy of getting into a different "programming mindset" to my C++ dayjob, I have a perverse inclination to retry Haskell again next. – timday Dec 27 '10 at 20:37
Smooth moving approach :) – Eonil Feb 16 '11 at 2:41
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/46542 | Take the 2-minute tour ×
When programming, what naming conventions do you use for your variables? I don't mean when the name of the variable should be obvious; ie. sum, total, first, last. But when you name variables that don't really fit into a category/obvious structure, what sort of names do you use? Is it, myVar1 or test1 or variable1, etc...?
share|improve this question
add comment
closed as not constructive by Walter, gnat, ChrisF Aug 2 '12 at 17:03
6 Answers
up vote 20 down vote accepted
There always must be a purpose for a variable, otherwise you can leave it out and you don't need a name. So use it's name to identify the purpose for a variable.
e.g. I sometimes introduce variables for the sole purpose of keeping a value that needs to be returned. I might call that variable returnValue e.g. sometimes it is a temporary for a different variable, I might use tempUserName
hope this helps.
share|improve this answer
+1: The only variables that don't need a name are i for tight loops, and even then I read that as shorthand for iteration (its successors j and k just play off the letter but if I'm going that deep they might deserve names). – Jonathan Hobbs Jan 4 '11 at 10:34
Sometimes you syntactically need a name because the variable cannot be left out (even though it isn't later used). Sometimes that name is spelled '_'. – Fred Nurk Jan 4 '11 at 11:49
@Axidos: I might be wrong, but IIRC, the i is a carry-over from series/sigma notation, where the i stands for index. – Steve Evers Jan 4 '11 at 15:55
@Axidos, Fred Nurk: Good points. Point-free style + _ can really eliminate most useless variables, and it won't be difficult finding expressive names for the rest. – Dario Jan 4 '11 at 18:19
What would you name, for example, the argument to ceil? – dan04 Jan 7 '11 at 9:14
show 1 more comment
For me, these are the basic rules any convention should be based on:
1. Any convention chosen should make it easier to read the code.
Each line of code is written once, but read dozens, hundreds, or thousands of times. So the time it takes to write a line of code is irrelevant, important is only how long it takes to read and understand a line of code. Any convention should have this in mind.
2. Be consistent.
The only thing worse than a mix of convention is no conventions at all, and the more conventions are mixed, the more the former approaches to the latter.
3. Don't invent your own convention.
Usually, you are programming as a part of a team, adding code to some project which has been around for a while. Stick to the team's or project's conventions.
If you're doing a project alone, use a convention that's popular with your coworkers or common in your company's projects. Usually others will be joining in later or take over maintenance after you've left. Make them feel at home.
If you are alone and don't have a team or projects to consider (how likely is that, unless you're doing stuff alone and for fun?), pick an existing convention. Prefer those which are common in whichever field you work.
The following are some specific conventions that I consider important. If I had to join a team or project where the conventions already settled upon explicitly violate any of these, I'd started to rebel and make a fuzz about it.
1. Variables represent objects in the real world, so they should be named with a noun.
2. Types represent categories of objects in the real world, so they, too, should be named with a noun.
3. Functions and methods represent actions in the real world, so they should be named with a verb.
4. Booleans should have an "is", "has", "must be" or something alike in their names. This is true for both boolean variables and functions/methods returning booleans.
5. Don't encode types in names. Over the course of a decade of adding features and fixing bugs, types often change. It's clumsy, error-prone, and often quite impossible to change variable names accordingly.
6. Avoid abbreviations except where they are really obvious and very common. (Yes, I know this one's quite fuzzy. Still, it had to be said.)
Whether you use PascalCase, camelCase, or the fake_space_style, whether identifiers should start with a capital letter or not, where to put braces etc., I have my own preferences about. But these I consider just that: personal preferences, easily overruled by team- or project-specific agreements.
share|improve this answer
+1 for personal prefs comment. – Michael K Jan 4 '11 at 13:41
Caveat to #3: Don't stick with existing conventions if they're downright wrong (e.g. something ridiculous like "all variables have to be no more than 8-characters, in uppercase, with the first three being a Hungarian prefix"). – Wayne M Nov 11 '11 at 19:13
@Wayne: If the rules are wrong, change them. You will gain nothing by inserting a few lines with a different (albeit sane) naming convention into a file, no matter how wrong the existing ones are. – sbi Nov 12 '11 at 13:20
add comment
Every variable name should be "obvious" in the sense that it should convey the purpose of the variable in a way that's readable and understandable. Ask yourself "what does this variable represent in terms of the larger problem I'm trying to solve?" The answer to that question is the name of the variable.
Don't use names like "myVar" or "variable1"; those names tell you nothing about what the variable represents. And for the love of God, do not perpetuate the abuse of Hungarian notation that encodes primitive type information into the variable name (iCounter, szName, fRoot, etc.) if you can help it. That's not what it's meant for, and it just clutters up code and makes names hard to read.
share|improve this answer
add comment
If i really have to create variable which i do not need (because of language semantics), I use _or $_ (depends of language). AFAIR it is proposed somewhere in python's PEPs.
Otherwise, as KeesDijk stated, every other variable has a purpose and should be named adequatly.
If you have a convention to follow (one very common is to use i, j, k for loops, others can include names such as tmp, swap etc) stick to it.
Personally I prefer not to use names like tmp - they are not to descriptive. Use something more clear, like 'rest_to_send', 'last_data_pointer' or 'current_vertice' instead ;)
share|improve this answer
what do you call your temporary variable when you implement a swap? ;) – João Portela Jan 5 '11 at 12:15
well, there are swaps and swaps ;) And I didn't say that I use 'tmp' for swapping. Rather swap as name of variable like tmp or current – ts01 Jan 5 '11 at 18:14
add comment
I use snake_case for all my variables.
I try to make them nice and specific and without unnecessary abbreviation. e.g. file_id rather than fid.
If I am just testing something, I usually use the first letter of the type. e.g. If I'm in the Python interpreter, I'll use l for a list, s for string, etc.
Otherwise I give it a descriptive name.
I'm going to steal jensgram's answer for avoiding conflicts though, good idea.
share|improve this answer
add comment
Two scenarios I can think of:
• When adding (hacking) functionality in already messy code (for some reason this happens a lot in TYPO3 extensions) I tend to prefix my variables with my initials ($jgXxx). That makes me pretty confident that I'm not introducing conflicts in PHP code that I don't even want to understand.
• When I just need a placeholder I usually use the prefix $tmpXxx.
share|improve this answer
Hm.. adding initials? and what if you will work after John Goe? ;) IMHO it is only little bit better than adding timestamp to variable name. – ts01 Jan 4 '11 at 10:09
@ts01 Definitely not the best way, no. But it works whenever John Goe has not touched the code before me :) – jensgram Jan 4 '11 at 11:22
add comment
|
global_01_local_0_shard_00000017_processed.jsonl/46543 | Take the 2-minute tour ×
I'm looking at licensing some open source software and am looking at the GPL. What are the pros and cons of using this license?
share|improve this question
possible duplicate of Why is free software good for programmers? – user8 Sep 28 '10 at 16:02
not a duplicate. This question is focused narrowly on the GPL and not taking a "high view" perspective. – makerofthings7 Sep 29 '10 at 15:45
I'd tend to go for one extreme or the other: AGPL or WTFPL. – TRiG Dec 7 '10 at 13:10
Let's put this into perspective. If Microsoft would of come up with this license first and kept all the provisions exactly the same, the license would not have the same following. The FOSS and GLP are not what they appear to be. Read their Manifesto. They are not about Anarchy, they are about control. – Andrew Finnell Jun 15 '12 at 14:42
add comment
closed as primarily opinion-based by MichaelT, gnat, Bart van Ingen Schenau, GlenH7, Dynamic Dec 8 '13 at 23:35
6 Answers
up vote 39 down vote accepted
Ok, my list of pros and cons of GPL:
• It makes people think hard about whether they really buy into Open Source; are you prepared to live by it, and let other people use what you've written, rather than just liking it because of what you can get out of it?
• It makes sure that when something has been developed by the Open Source community, it stays Open Source; no chance of someone taking all the work that others have been doing, repackaging it and selling it on.
• It's a complete no-no for most corporate organisations; they can't afford the risk of GPL-licenced code getting into their products, so virtually all medium-large companies have clauses explicitly banning GPL-licenced code.
• It puts people off Open Source.
• Is it really fair, that because I use your Open-Source image picker control in my app, my whole app must now be Open Source too? Even if I improved the image picker and contributed that code back to the community? The terms are too onerous for many developers.
• Lots of people aren't aware of the stringent terms of GPL, so use it as it's the licence they've heard of without realising what restrictions they're placing on anyone else that wants to use it.
• Its extremely viral. If your project contains a component that contains a component that contains a component that is under the GPL (phew!), your whole project is subject to the GPL too.
Ultimately for me the cons outweigh the pros. To me it smacks of Open Source Evangelists trying to trick the world into going Open Source instead of persuading the world of its benefits.
share|improve this answer
+1 for some of the cons, for which yes, I agree, are too "strict". MIT licence is a nice alternative. – Rook Sep 28 '10 at 0:22
This is such transparent FUD: "It's a complete no-no for most corporate organisations; they can't afford the risk of GPL-licenced code getting into their products, so virtually all medium-large companies have clauses explicitly banning GPL-licenced code." GPL-licensed code and projects have been non-controversial at Fortune 500s since at least 2004, and indeed many large companies (Google, IBM, Oracle to name a few) have based much of their business off of it. – user8 Sep 28 '10 at 16:01
There's a difference here between software product companies, who often can't touch GPLed code, and companies that use software for internal use, where the GPL has essentially no effect. There are a lot more of the latter than the former. – David Thornley Oct 8 '10 at 14:56
BTW, the GPL was designed as a driver of a social movement, but the intention was to create a repository of Free Software that would always remain Free, and which would become increasingly tempting to use. It was not, as far as I can tell, an attempt to trick developers into anything. Further, the person behind the GPL, Richard Stallman, disavows all connection with Open Source as opposed to Free Software. – David Thornley Oct 8 '10 at 15:58
David Thornley's experience basically matches mine. I've never heard of a company that wouldn't use GPL'd code for internal use. Heck, everyone's got Linux in dozens of places. However, many companies that develop software for distribution will not allow GPL code anywhere near their development code base. LGPL is typically okay, but not always. – David Schwartz Aug 23 '11 at 13:35
show 14 more comments
Although h4xxr definitely gave an answer FTW, here are a few more links which could prove useful, if you're unsure of what different types of licences represent.
Comparison of free software licenses (table comparison)
Open Source Initiative - Licenses by Name (what it says - commonly used licences in today's software world) List of software licences, including those compatible with GPL
F--- GPL <-- intelligent criticism (gotta love these "pearls of wisdom" :-)
share|improve this answer
add comment
FWIW I personally have a big open source project which I am lead developer on and I've adopted a multiple license model precisely because the GPL was holding some people back from using my code. My code is licensed under a choose your own license model and allows any of the following licenses - GPL, LGPL, MIT
The LGPL allows people to incorporate your code/library/executable as-is in their product providing it is not modified. This is most useful for companies building commercial/closed source products that might need your product to function but don't need to change how your product functions.
The MIT License is essentially a permissive license that lets people modify your work however they wish and repurpose it for their own work. Use this if you've suspect users may want to do this and you don't mind not having access to the source of any modifications people might make.
share|improve this answer
add comment
When it comes to liberally-licensed open source projects (e.g. X11, PostgreSQL, Haskell), the GPL and LGPL backfire. GPLed code cannot be used in such projects, not because the GPL forbids it or the X11 license forbids it, but because such projects do not want to "upgrade" their entire product's effective license to the GPL.
share|improve this answer
add comment
Choosing GPL is the ideological step:
You are giving the advantage to free software developers, because they can use your library, and the commercial players can't (at least as long they don't want to release their product as GPL). Corporations must pay their workers to write the library that has the same functionality. You're promoting free software in that way.
Choosing less restricted licence, such as MIT is more practical:
You can use your library yourself, when coding for money (as freelancer, as employee). However, everyone can, so you're helping in that way the corporations to save money, although they are already rich without it.
share|improve this answer
+1 The GPL is an ideological/philosophical decision, not technical. Whether this is a good or a bad thing depends on philosophical matters, and is up to each project or team to decide. – Andres F. Jun 15 '12 at 14:52
add comment
• Benefit: you are legally guaranteed that people make their changes/contributions available to you.
• Cost: many commerical users can not use your code. They will not use your code and thus will never contribute. See this thread explaining why the libcinder people can not use (L)GPL code. Even the LGPL can be problematic when they need to statically link the library.
share|improve this answer
I think that's only true if in non SaaS scenarios... and also I may need to find my forks and ask them to share a copy with me. – makerofthings7 Sep 30 '10 at 1:42
That's true, for SaaS there is the AGPL. Identifying breaches is non-trivial but when found, there are people to help you: gpl-violations.org – LennyProgrammers Sep 30 '10 at 8:16
Your benefit is wrong: if I edit the software and use it myself, you have no right to see my edits. Same goes if I distribute it to a group with no interest of sharing it. The user has the right to see the source, not everyone. – K.Steff Jun 15 '12 at 14:19
add comment
|
global_01_local_0_shard_00000017_processed.jsonl/46544 | 101 reputation
bio website ageektrapped.com
location Ottawa, Canada
age 35
visits member for 3 years, 1 month
seen Oct 25 '13 at 14:54
Software developer specializing in user interaction and interface design in mobile and web. Excels at the deadlift and barbecue. Makes tasty beverages.
This user has not participated in any bounties |
global_01_local_0_shard_00000017_processed.jsonl/46545 | 468 reputation
bio website cointossstatistics.com
location Philadelphia, PA
age 31
visits member for 2 years, 3 months
seen 3 hours ago
I have started to use git on projects (Never had to because nobody told me to and I work as the only developer most of the time)
I am starting to use Trello for bug tracking and scoping out projects. Very happy with price and flexibility.
This user has not participated in any bounties |
global_01_local_0_shard_00000017_processed.jsonl/46547 | Toxic Masculinity
AP Photo/Herald Star, Mark Law
Judge Thomas Lipps listens to arguments in Jefferson County Juvenile Court in a case involving two Ohio high school football players charged with raping a 16-year-old girl.
But rape prosecutions are argued on behalf of the state, not just the victim, and there’s a good reason: Rape doesn’t just harm one person. It tears at the fabric of our communities. And if we treat this trial as simply the story of what a couple of kids did to another, we’re missing the point. This isn’t an isolated incident, and the incident itself didn’t happen in isolation.
This rape is like most in that it was enabled by a deeply entrenched, toxic masculinity. It’s a masculinity that defines itself not only in opposition to female-ness, but as inherently superior, drawing its strength from dominance over women’s “weakness,” and creating men who are happy to deliberately undermine women’s power; it is only in opposition to female vulnerability that it can be strong. Or, as former NFL quarterback and newly-minted feminist Don McPherson recently put it, "We don't raise boys to be men. We raise them not to be women, or gay men." This starts in childhood for many boys, who are taught young that they’ll be punished for doing anything “girly,” from playing with dolls to crying, or even preferring to read over “rough housing” outside.
Toxic masculinity has its fingerprints all over the Steubenville case. The violence done to the victim was born out of the boys’ belief that a) sexually dominating a helpless girl’s body made them powerful and cool, and b) there would be no consequences for them because of their status as star athletes (If you want to see stomach-churning first-hand evidence of this, check out this video of one of their friends gleefully talking about how “raped” and “dead” the victim was). The defense is basing their entire case on it, arguing that this near- (and sometimes totally) unconscious girl’s body was the boys’ to use because “she didn't affirmatively say no." The football community’s response—by which I mean not just the coaches, school, and players, but the entire community of fans—is steeped in the assumptions of toxic masculinity, treating the athletes and the game as more important than some silly girl’s right to both bodily autonomy and justice. Steubenville residents have been quick to rally around the team, suggesting that the victim “put herself in a position to be violated” and refusing to talk to police investigating the assault. The two players who cooperated with police were suspended from the football team, while the players accused of the rape have been allowed to play. The coach even went so far as to threaten a New York Times reporter asking questions about the case. (No surprise there: When it comes to male-dominated sports, toxic masculinity is the rule, not the exception.)
But sports is hardly the only breeding ground for toxic masculinity. Witness the recent, vicious bullying of Zerlina Maxwell by fans of Fox News. Last week, Maxwell was on Hannity and dared to opine that the best rape prevention isn’t about what women can do to protect themselves, but instead focuses on raising men who don’t rape. She also personally identified herself as a survivor of rape. What followed was a nearly inconceivable onslaught of misogynist and racist attacks, including repeated threats of rape and death. All because a black woman insisted that the work of stopping rape—“women’s work” if there ever was such a thing—requires men’s labor. Under the influence of toxic masculinity, the logical response to a man being forced or even encouraged to do something coded “female” is always violence.
The U.N. is in the midst of its 57th Commission on the Status of Women, this year focusing on gendered violence, a global pandemic made all the more urgent by growing evidence that social change leads to increased violence against women. Why? Because destabilizing established social order—even in the interest of what we might agree is progress—can leave people feeling vulnerable. And when men feel vulnerable, toxic masculinity teaches them the way to reassert their power is by dominating women. There’s a pall hanging over the proceedings, a real risk that this year’s commission may wind up like last year’s, failing to come to any policy agreements thanks to the obstructionism of a handful of patriarchal countries who claim that their traditional and religious customs would be infringed upon if they had to take action to end gendered violence in their countries. You can bet that any customs that require impunity for violence against women are built on toxic masculinity.
It’s time for a serious intervention in masculinity. It’s not enough to not be a rapist. You don’t get a cookie or a Nobel Peace Prize for that. If we want to end the pandemic of rape, it’s going to require an entire global movement of men who are willing to do the hard work required to unpack and interrogate the ideas of masculinity they were raised with, and to create and model new masculinities that don’t enable misogyny. Masculinities built not on power over women, but on power with women.
This is going to take real work, which is why so many men resist it. It requires destabilizing your own identity, and giving up attitudes and behaviors from which you’re used to deriving power, likely before you learn how to derive power from other, more just and productive places. There are real risks for men who challenge toxic masculinity, from social shaming to actual “don’t be a fag” violence—punishments that won’t ease until many, many men take the plunge. But there are great rewards to be had, too, beyond stopping rape. Toxic masculinity is damaging to men, too, positing them as stoic sex-and-violence machines with allergies to tenderness, playfulness, and vulnerability. A reinvented masculinity will surely give men more room to express and explore themselves without shame or fear. (It will also, not incidentally, reduce rape against men as well, because many rapes of men are committed by other men with the intention of “feminizing”—that is, humiliating through dominance—their victim.)
These interventions start with a “feminine” activity: introspection. What did you learn about “being a man,” from whom? How are those lessons working out for you, and for the people you love and your communities? Taking action can be as simple as men publicly owning their preference for “female” coded things, whether that’s child-rearing, nonviolence, feminism, or anything else—and being willing to suffer the social consequences. It can be more formal, working with established organizations like Men Stopping Violence. As more men take responsibility for the work, it will surely also take on forms no one has yet envisioned.
Obviously, the mouth-breathing troglodytes who hailed hate down on Maxwell aren’t going to be interested in this project. And there’s strong evidence that most rapes are committed by repeat offenders who may not call what they’re doing by the r-word, but know full-well they don’t have their partner’s consent. Remaking masculinity isn’t about sweetly beseeching those guys until they don “This is What a Feminist Looks Like” t-shirts. It’s about two much more practical things: 1) raising new generations of boys much less likely to grow into rapists and/or Fox trolls, and, meanwhile, 2) undermining the social license to operate which allows the current generation of assholes to keep trolling and raping with impunity.
In other words: What if misogynist trolling got you shunned by their friends and family? What if raping someone was actually likely to result in your expulsion from your team, and your conviction in court? If the rest of us shift our relationship to masculinity, ideas like “she was asking for it” or “don’t be a pussy” won’t make sense anymore, and the guys who try to cling to them will find themselves isolated, facing serious social and legal consequences.
There’s already some sign that this can work, and that the work is underway. Vancouver’s new initiative placing the focus on preventing offenders, not victims, is showing early promise. The Feminist Wire just launched a “Masculinities Forum” to create a more explicit dialogue on just these issues. And the organization Breakthrough has launched a global "Ring The Bell" campaign that is poised to take the lead on this very issue, calling for one million men to take concrete action to end violence against women.
It’s not a moment too soon. Just as putting the onus on women to prevent their own rapes on an individual basis is both wrong and ineffective, so to is putting the onus on women to stop rape as a social phenomenon. It’s time to “sack up” and step up, men. I promise it will hurt you a lot less than it’s hurting me.
Editor's Note: On May 17, the two young football players were adjudicated delinquent of rape, comparable to a guilty verdict in adult criminal court.
Yes, THANK YOU. For years I've been calling attention to the problem with how males are raised. Rape is among the worst of many symptoms of this problem, but the prison system shows how bad things are: nine out of ten people in prison are male. Unlike the problem of minority over-representation in the prison industry this isn't due to prejudice or unaddressed poverty or the so-called war on drugs - men and women exist in each of those demographics in similar proportions. It's because they're men, raised as men, trained and expected to be aggressive and violent as if that's okay.
If a manufacturer built two kinds of cars, and one car was ten times more likely to go out of control and crash than the other, everybody would want the manufacturing process of that car improved. But we see men behave badly at ten times the rate of women and we seem to shrug and accept that "boys will be boys"?
It is urgently important that our cultural assumptions about the ways in which men are raised are challenged.
You're so right. Thanks for a great article!
As the mother of a 7 year old son, I find myself wondering how to counteract all of these "toxic masculinity" messages. Suggestions? Resources?
I would just steer clear of articles employing this kind of inflammatory language.
the pita pit lobor is part of life because without labor you can not do any thing and lobor must for life american people loborious male a awosome thing.
As a 27 year old feminist-self-identifying straight male, I feel like my upbringing was not so unusual, but I still largely dodged the toxic masculinity bullet. I think my parents just did little things: comforting me instead of telling me not to cry, treating my mom being a lawyer (and my dad being an artist) like they were just completely normal roles for both of them to play, encouraging and supporting me when I wanted to do theatre just as much as when I wanted to do sports. When misogynistic crap did occasionally filter into my head from the outside, they calmly discussed why it was wrong. And they always encouraged me to think for myself -- think about what others were doing and saying and whether those things felt right or wrong to me. Small things like that can add up dramatically, both for better and for worse.
While reading this, I forced myself to ignore the topic of rape. The article is intrinsically about changing the perceptions of what masculinity is. So to best agree the approach, I needed to understand what my self-actualization as a man meant, and the consequences of being who I am. The proposal was to consider why and who.
My father was a great man, a provider, supportive, stoic, & of course hairy. But I've noticed in my adult life, it isn't him who's had the greatest effect on desired & acquired appearance. It was sex. My partners, from my early youth to this very day, obsess endlessly about the appearance of physical masculinity: power, and wealth. Being left heartbroken by dozens of partners who felt I was capable of contributing to the adult components of a relationship (of course, they meant "earning enough money") in my youth, I began my studies, graduting with honours and two majors. What I believe was a beautiful mind, was now trapped in a weak body. My devotion to academic success grew into a need for proponents of age. Genetics had let me down, I was scrawny, and the partners I loved agreed.
Now having earned all that society tells me I need, having fought tooth and nail with my will power for a decade, I'm left to look over society and see how much self-loathing there is. How we're bullied out of our wants until we're certain the destiny we've found was what we wanted in the first place. It makes life easier to cope with.
TLDR, men aren't slaves to an inherent aggression, but nor is it as simple as parents and teachers fostering their boys to find sensitivity and tenderness. It's an incredible web of influence, one that relies on every thread. The success of multi-billion dollar sport empires truthfully relies on the blind aggressive dedication the athletes train into, oil would not shoot from the ground without the muscle to maintain the machines that drill, our aspirations of beauty would be lost if it didn't take incredible work and luck to become the next Adonis.
I agree with you Jaclyn, perceptions of manhood have to change, but it isn't masculinity that's to blame--it's the association that rapists aren't sick, they're victims of masculinity. Rapists are just mentally ill.
Some of what you say is valuable, but blowing off the topic by saying that all rapists are mentally ill is counter-productive. "Oh, they're mentally ill" is a very convenient statement to dismiss complicated issues -- people don't catch mental illness like the cold or spring from the womb mentally ill. Some people are genetically predisposed to mental illness, but the environment in which they're raised has a massive impact. And defining mental illness is very complex as well: some mental illnesses, such as schizophrenia, can largely be treated by altering brain chemistry, but others can not. And what one society defines as mental illness another sees as normal, or even beneficial (what we would call schizophrenia has in some places and times been seen more as religious inspiration).
Saying that all rapists are mentally ill is letting society off the hook far too easily. Certainly, some are, but many are sexually frustrated, angry and/or misogynistic "normal" people. The teenagers in Steubenville show no signs of having been mentally ill -- in their case, they wanted sex, thought they could get it for free, and took it. And even if we could lump all rapists together as "mentally ill," that still loops around to society and how it deals with masculinity. How, if all rapists are mentally ill, has our society produced so many broken men that a quarter of women are sexually assaulted at some point in their life? What have we been telling our boys that has twisted them so badly? Could it be, as the author suggests, "you must be tough, violent and better than women if you are to succeed"?
in the stuebenville case there are plenty of people - onlookers and after the fact who truly had no idea that was rape. and when you get right down to it - that IS the result of a negative opinion/aspect of masculinity. the idea that - men can't help themselves; women are supposed to police their actions because after all they are unthinking brutes that would rutt a hole in a tree in the absence of other options. when a boy is raped by his teacher we congratulate him.
and yes, women carry these views of men and masculinity too and therefore often look at men for their physical prowess and/or earning potential. it only makes sense - in a world based on dominance which is held by men and won in those two arenas .. .
and that's why dropping the toxic masculinity - note, not all the expressions of masculinity are toxic - is a benefit to men and women.
You probably don't want to even respond to this after the angry backlash about your last comment, but I am curious what it is you mean when you say that rapists are mentally ill. Are you saying that because men are constantly bracing themselves against the crushing expectations and stereotypes of society, that it doesn't take much to cause a mental break? I wasn't sure if you were defining your own experience as part of the spectrum of mental illness. (I mean no insult by that, I'm asking an honest question.)
I also ask because, as an example outside of the US, in a recent study in India 1 in 4 men admitted to having raped a woman. 1 in 25 admitted to having participated in gang rape. ( That seems like an awfully high percentage to be explained by mental illness, but not too high to be explained by cultural mores and conditioning. I think it would be naive of us to think that our statistics in the west would be so much better than these that we can completely discount them. It seems that, in most cases, rape is far more about power than it is about a lack of self control, desire, or mental instability. It's about reasserting that male=strong and female=weak, and it depends on the deeply entrenched belief that male strength and male entitlement are one in the same.
Your point about the female influence in this, though, is really important. We like to talk about masculinity being defined solely in childhood or in the family, but a person's ideas about sex and relationships are clearly molded in large part by their personal experiences. While I think it's fair to say that men must bear responsibility for stopping rape, it is equally important to remind ourselves that women must do their part to change the culture. It's ludicrous to assert that women in general are looking for sensitive, vulnerable men. We females can't expect radical social change if our choices in partners continue to reflect the societal standards of yesterday. And a quick glance at the most popular books and movies will reveal that we are doing that.
How we think of manhood and masculinity and a man's role in society/relationships/housework/whatever obviously needs to change, and I am sorry to hear that you have experienced first-hand the weight of societal pressures to fit the imaginary "ideal man" mold. As a woman I have experienced pressures, myself, but they are obviously different than yours. When you say "we are all bullied out of our wants," I think that applies to men AND women. Our fates in this are inextricably linked. We seem to have our whole understanding of people completely backwards. Until we all realize (and act on) the fact that human beings are all basically the same in essence, but wildly different in personality, preferences and abilities, we're just going to be spinning our wheels. Whenever we talk about men and women (or blacks and whites, or any other stereotypical opposition) being fundamentally different, we are necessarily talking about the aggregate, and not actual people. We have to stop thinking of each other, and ourselves, in terms of demographics.
Ugh, it's just a euphemism. 'Mentally-ill' was not meant to inspire droves of advocates to discard my poetic license. It was quite clear that I was implying that the decision making abilities of rapists are clearly not healthy. Rapists aren't biologically tuned to rape. I get it. I'm not going to apologize that "mentally-ill" infers something different to everyone. An illness is just something unhealthy that can be cured.
I avoided the topic of rape. I made it clear I wasn't interested in speaking about something I knew nothing about.
I am a hypocrite to tell others their is vision of beauty, power, or wealth is unhealthy, when I too, choose to abide those same delusions.
"Eek! A Male"
by Lenore Skenazy
'Nuff said.
having worked in the daycare field i can tell you that most centers hire any male applying and kiss his butt.
but to your overarching point - did you read this article or do you just assume that she said "be afraid of all men"?
There are plenty of female athletes who work just as hard, as agressively, and push themselves to their limits just like you describe. The sports empire relies on that kind of dedication, but why is that dedication "male?" Why is it tied up with all kinds of other dominating and domineering behavior?
That's kind of the point.
@ actnb2
6% of men will admit in an anonymous survey to having raped someone. People who are actually mentally ill are far more likely to be victims than victimizers. Several American judges have let rapists off because they felt that women who were unconscious could still give consent. One major political party doesn't think that domestic violence protections should apply to non-heterosexual, non-gender-normative, non-white women.
The problem is not a few mentally ill people. The problem is a society that is doesn't see a problem with the fact that 1 in 20 men are rapists.
As a man who has always been outright disgusted at overt displays of masculinity, I've always chalked it off as overcompensation for one's insecurities. It's always struck me as primitive impulse, chest beating, that we should be able to rise above. We can do better than to let our instincts rule us. The chest beating is so pervasive in society I have sometimes wondered if "I" am the odd one. But I never really let being "odd" bother me, I study bugs for a living after all!
Everyone feels insecure at some point in their lives, but you have to let go of it eventually or it eats you up inside. Unfortunately some men just can't let go of the insecurity over their own manhood, and I believe much of that stems from something in their upbringing. How do you undo that or keep that from being perpetuated to their children? Because it does get passed down through generations, not genetically but behaviorally.
As a father of 2 boys I go to great lengths to keep their lives drama free since even the most minor blowup in an adult's life can have major impact on a child's outlook. I remember a conversation I had with my parents where I thought we were pretty well off when I was a kid and my parents both looked at me like I was crazy and told me we were dirt broke most of the time and it if wasn't for the grandparents sending money from time to time we might have been on the street. They must have kept the stress under control pretty well...
Generation after generation this goes on with parents struggling day to day with little thought to how their children view and react to their coping with life. From this we have many of the ills of society. It's not just rape, but also substance abuse, lack of education, crime. Rape might be just the place to begin with the litany of troubles.
This articles contention that it is the patriarchy and the anxiety over its collapse being responsible for rape is just fundamentally wrong.
Increasing penalties for rapists is a good idea (both criminal and social) but there is little statistical evidence for the contention that it is the patarchy that bares responsibility for rape is weak but strong for biology, poverty and impulse control.
I'm confused -- where is the evidence that rape is about biology and impulse control? That doesn't explain prison rape *at all,* which is an important part of the discussion.
Rape is about power and entitlement, almost always. As an example: .
Character and Rape in Ohio
As far as I know the two football players from Steubenville haven't been convicted of anything. Feminists seem oblivious to the presumption of innocence when a woman accuses a man of a crime. Women studies majors should be required to take a course in constitutional rights as a core requirement.
By the way, a legitimate example of a pandemic is the Black Death that killed 60% of the European population during the 14th century. Rape is a horrible crime but the prevalence in this country is not at pandemic levels. Blatantly misusing such a word is nothing more than an attempt to demonize men.
while it is misuse of the word pandemic - it is hardly a misuse that by just those discussing rape. there is a pandemic of addiction, a pandemic of crime etc.
as to the presumption of innocence - usually i'd be with you on that but, really? did you watch the videos? the boy says he raped her; he says those words.
The definition of pandemic does not include a percentage requirement. It just means something is widespread (for example, across many continents) and affects an exceptionally high proportion of the population, which is relative to what you are talking about. The proportion of a population that are murdered, for example, wouldn't have to be over 50% for it to be considered exceptionally high.
However, on the subject of posting a person accused of rape all over the internet and turning them into household names, I certainly agree with you. It should be completely illegal for the media to broadcast the faces and names of people accused of ANY crime until they are found guilty...or even, IMHO, until they begin their sentence and have gone through any appeals. Turning the entire nation into a grand jury through the selective evidence provided by the media is completely absurd. That decision belongs to the judge, not to us.
(So please don't lump all of us feminists into the same bucket.)
@KMFDM72 The two football players have been found guilty. And as Jacyln said in this article, she felt no need to use the term "alleged" because there's video of the night in question.
At any rate, a dictionary will tell you that pandemic simply means "occurring over a wide geographic area and affecting an exceptionally high proportion of the population." I personally believe the statistic (1 in 5 women in the US will be raped in her lifetime) is "exceptionally high." Maybe you need 60% of women to be raped before you believe this is an issue worth addressing.
The article says that, "We don't raise boys to be men. We raise them not to be women, or gay men." This is because masculinity is unlocateable--it doesn't exist, we only have markers--masculinity can never actually be bestowed--it can only ever be taken away--this is why men are always in a constant state of what I refer to as male hysteria--check out this article I wrote that deals with Matthew Barney and markers of an uncertain Masculinity here-
This is the most important conversation we can be having today. Young men have no role models for healthy masculinity and are celebrated for acts of violence, aggression and sexual misconduct (Chris Brown). When men can tune into their more introspective, intimate, vulnerable places without fear of retribution from their peers, they will emerge more whole and in a place to give and receive healthy love. As we evolve, these acts of barbarianism will have to evolve with it.
fb. manontopbook
tw manontopbook
Excellent article that addresses important issues for society. Toxic is an accurate description of the environment in the school, community and larger society that condones the violent power play, even rewards it. Historically, when change occurs, there is often reactionary backlash, in attempt to keep conditions in the comfort zone of those who have not evolved. Let's hope the judge in this case is honorable and strong enough to see that appropriate consequences for this destructive behaviour are carried out.
It seems like the author is saying any man who doesn't adhere to feminism is contributing to a culture of 'toxic masculinity'. Apparently its not enough to be a good and law abiding man. This reeks of communal blame.
Aside from the faulty causative attribution, there are some good observations, assuming you can put aside the problems in it. For example, men and boys still get pressured to conform to limiting stereotypes that when mixed with other factors can cause some to behave sociopathologically. For example, raise a boy to conform to a rigid stereotypically masculine image and then supplement it with violent sports (e.g.: football) training and in essence teach him to ignore his own pain/boundaries and those of others. Now add the high hormone level that comes of adolescence, immaturity, and alcohol, and you get: a far-greater chance he'll do something he shouldn't do, like start fights, commit rape, damage property, carry on in other disruptive ways, etc. But no guarantee. For every such boy that gets created under those conditions, those same ones produce a whole lot more who don't behave that way. (But in any case, nothing can excuse criminal behavior such as rape, robbery, etc. Some factors can help explain why certain ppl become criminals or behave criminally at some point in their lives, but these don't *excuse* the behavior.) But nonetheless should not this pattern be questioned for everyone's benefit?
The problem isn't so much "toxic masculinity" as it is "toxic child-rearing", particularly as it pertains to boys. Boys are people, too. Raise them a certain way, you get certain results. For example, in "less modern" place or venues, crimes of person or property tend to be a lot less frequent than in modern ones. This is moreso where use of inhibition-reducing substances (alcohol, for example) is either prohibited or restricted to more controlled venues. Parents in "less-modern" societies tend to pay a lot more attention to what their kids are taught and to their emotional needs. Consequently, they produce much-less criminally-inclined children. Now really, how much time are we devoting to raising the next generation? Very little. They 're practically being left to raise themselves, and given things like social media and video games (desensitizing violent ones, too) to take the place of actual attention and affection from their parents.
All the on-line discussions abt "toxic masculinity" or anything else will have zero effect until or unless the fundamentals of child-rearing are restored. Bets on just when that'll happen?
Finally, I want to remind/inform the author and readers that forcible sexual assault is in no way limited to male-on-female and male-on-male crimes. And contrary to claims by feminists, women assaulting others sexually are not minimal or exceptional cases. Google "She Stole My Voice" and watch the documentary on-line. Also see the CDC's report on sexual assault at:
If there needs to be a discussion abt "toxic masculinities", maybe we also need a discussion abt other toxic things, too.
Couldn't you pick someone better suited to discuss this topic? Friedman is the author of "My Sluthood, Myself" (
A quote, "I’m telling you this because sluthood requires support….A slut needs a posse who finds her exploits almost as delicious as she finds them herself, who cares about her safety and her stories and her happiness but not one whit about her virtue…even if you don’t ever want sluthood for yourself, you’re going to be called upon to support a slut. I’m telling you this because when that happens, I want you to say yes."
Journalism is dead in America, and the American Prospect is proof of that.
You need to be logged in to comment. |
global_01_local_0_shard_00000017_processed.jsonl/46548 | Psychology Wiki
Diagnosis codes
34,114pages on
this wiki
Redirected from Diagnosis classification
In healthcare, diagnostic codes are used to group and identify diseases, disorders, symptoms, human response patterns, and medical signs, and are used to measure morbidity and mortality. As the plural with the name of this lemma indicates, there will be never one code for all purposes, but many codes for some distinct purposes each.
The codes may be quite frequently revised as new knowledge is attained. DSM (see below) changes some of its coding to correspond to the codes in ICD. In 2005, for example, DSM changed the diagnostic codes for circadian rhythm sleep disorders from the 307-group to the 327-group; the new codes reflect the moving of these disorders from the Mental Disorders section to the Neurological section in the ICD.[1]
Commonly used diagnosis coding systems Edit
Systematized Nomenclature of Medicine
Weaknesses Edit
Generally coding is a concept of modeling reality with reduced effort but with physical copying.
• Hence the result of coding is a reduction to the scope of representation as far as possible to be depicted with the chosen modeling technology. There will be never an escape, but choosing more than one model to serve more than one purpose. That led to various code derivatives, all of them using one basic reference code for ordering as e.g. with ICD-10 coding. However, concurrent depiction of several models in one image remains principally impossible.
• Focusing a code on one purpose lets other purposes unsatisfied. This has to be taken into account when advertising for any coding concept. The operability of coding is generally bound to purpose. Inter-referring must be subject of evolutionary development, as code structures are subject of frequent change.[2]
• Unambiguous coding requires strict restriction to hierarchical tree structures possibly enhanced with multiple links, but no parallel branching for contemporary coding whilst maintaining bijectivity.
• Spatial depictions of n-dimensional code spaces as coding scheme trees on flat screens may enhance imagination, but still leave the dimensionality of image limited to intelligibility of sketching, mostly as a 3D object on a 2D screen. Pivoting such image does not solve the intelligibility problem.
• Projections of code spaces as flattened graphs may ease the depiction of a code, but generally reduce the contained information with the flattening. There is no explanation given with many of the codes for transforming from one code system to another. That leads to specialized usage and to limitations in communication between codes. The escape is with code reference structures (as e.g. not existing with SNOMED3).
• Hierarchical ordering of more than one code system may be seen as appropriate, as the human body is principally invariant to coding. But the dependency implied with such hierarchies decrease the cross referencing between the code levels down to unintelligibility. The escape is with hyper maps that exceed planar views (as e.g. with SNOMED3) and their referring to other codes (as e.g. yet not existing with SNOMED3).
• Purpose of documenting will be seen as essential just for the validation of a code system in aspects of correctness. However this purpose is timely subordinate to the generating of the respective information. Hence some code system shall support the process of medical diagnosis and of medical treatment of any kind. Escape is with a specialised coding for the processes of working on diagnosis as on working with treatment (as e.g. not intended with SNOMED3).
• Intelligibility of results of coding is achieved by semantic design principles and with ontologies to support navigating in the codes. One major aspect despite the fuzziness of language is the bijectivity of coding. Escape is with explaining the code structure to avoid misinterpreting and various codes for the very same condition (as e.g. yet not served at all with SNOMED3).
1. First, Michael B. (2005). New Diagnostic Codes for Sleep Disorders. American Psychiatric Association. URL accessed on 2008-08-08.
2. Towards Semantic Interoperability in Healthcare
See alsoEdit
Advertisement | Your ad here
Around Wikia's network
Random Wiki |
global_01_local_0_shard_00000017_processed.jsonl/46579 | where the writers are
Socio-Political Themes in the Smurfs
1.) Introduction:
This is a discursive analysis of the television programme The Smurfs, created by Peyo, and first aired during the greater part of the eighties. In other words, it is an analysis of some of the socio-political themes I have noticed in the show.
The Smurfs is a unique programme. It is, first and foremost, a cartoon, and as such it is aimed at children. The discussion could end there, however, unlike many other cartoons, or indeed other television programmes, The Smurfs is about an entire society and its interactions with itself and with outsiders, rather than the adventures of just a few characters. Hence I believe it is, in short, a political fable, in much the same way that The Lion, the Witch and the Wardrobe was a fable about Christianity. Rather than Christianity, however, The Smurfs is about Marxism.
I am not accusing The Smurfs of being some kind of subversive kiddie propaganda - although if it was, would it really be that much worse than the spate of 'toyetic' cartoons of the same decade that only existed to sell plastic toys? In any case, this essay should be seen as the highest kind of praise. What other children's shows would address the issue of Marxism in such a way, and at such a pivotal point in the history of the Cold War? The Smurfs should be praised for using metaphor and the device of the fairy tale to introduce children to political themes. If Peyo was a socialist, however, he was obviously not the sort who had much time for the version of it practised by the Soviet Union and other Eastern bloc police states. He was a utopian. There is a distinct lack of any kind of army or police in the Smurf Village. On rare occasions when it is necessary, they form their own civilian militia to fight off threats. Otherwise, it is the absolute opposite of the police state.
After my brief analysis of Marxism in The Smurfs, I will also be addressing the issues of feminism and homosexuality in the show. But the main concern of this essay is to argue that The Smurfs was a Marxist fable.
2.) The Smurf Village as a Marxist Utopia:
The Smurf Village itself is a perfect model of a socialist commune or collective. It is self-reliant, and the land is not owned by individuals, but by the entire collective of all the Smurfs, if the word 'owned' is even appropriate.
Papa Smurf represents Karl Marx. He is not so much the leader of the Smurfs as an equal revered by the others for his age and wisdom. He has a beard, as did Marx, and thus could conceivably be a caricature as well. And lastly, he wears red, which is the traditional colour of socialism. Brainy Smurf could represent Trotsky. He is the only one in the village who comes close to matching Papa's intellect - he is a thinker. With his round spectacles, he could also be a caricature of Trotsky. He is often isolated, ridiculed or even ejected from the commune of the village for his ideas. And of course, Trotsky was banished from the USSR.
Despite their different professions/distinctions, the Smurfs are all completely equal. Thus, while the occupations of certain Smurfs, such as Farmer, Handy and Greedy, are more important than others, such as Clumsy, Grouchy, or Lazy, there is no feeling that certain Smurfs are superior or inferior to others because of their work, or level of skill, because ultimately, everyone is a Smurf first.
Economically, the Smurf Village is closed-market. There is no money, and all possessions are communal - property of the collective. Everyone is equally a worker and an owner. The Smurfs reject the idea of a free-market economy, with its greed and inequities, and the collective is more important and valuable than the individual. The whole is greater than the sum of its parts. John Lennon asked us to 'imagine no possessions'. The Smurf Village achieves that goal. In fact, many of the ideas expressed in that song are reality in the Village. There is one large piece of capital, or produced means of production, in the Smurf Village: the dam. It is owned, operated and repaired by the entire collective.
The Smurfs all refer to one another by the same title; 'Smurf'. Eg, Brainy Smurf, Handy Smurf, Jokey Smurf, Lazy Smurf, Papa Smurf. This is highly reminiscent of socialist states' use of the word 'comrade' when referring to others, instead of more elitist titles.
Adding to the idea of complete equality in the Village, most of the Smurfs wear the same kind and colour of clothes. It is a general work uniform, and with the distinctive caps and blue skin, is highly reminiscent of the so-called Mao Suit, common in Maoist China.
In the tradition of pure Marxism, the Smurf Village is atheist. There is no god, and there is no Priest Smurf. There are only the 'real' forces of nature and physics, and these are represented metaphorically by the characters of Mother Nature and Father Time. Of course, there is also magic, as practised by Papa, Gargomel, Balthazar and others, but it is simply another tool, something that occurs in nature, that has physical properties and can be tapped into, with the right know-how. It is not, as many religions are, a way of understanding the universe in a supernatural context.
The episode The King Smurf was the ultimate illustration of the Marxian conflict between the bad, oppressive kind of government, where greedy kings (and capitalists) exploited the population for their own ends; and the good, egalitarian political model Marx had formulated. In the episode, a militia is formed to overthrow Brainy, who has become King in Papa Smurf's absence, and utopian order is restored when Papa Smurf returns. In this instance, Papa Smurf, as Marx himself, represents the ideal form of Marxism.
The evil wizard Gargomel represents capitalism.?He embodies everything bad about capitalism. He is greedy, ruthless, and his only concern is with his own personal gratification. He is what happens when the individual makes himself more important than the society he lives in. Not coincidentally, he is also a crazy old hermit with no real friends.
What does Gargomel want to do with the Smurfs? He has two ideas. The first is to eat them. This is unusual, because the Smurfs are small and rare, and would not make as good eating as, say, a deer. It is similar to Sylvester's obsession with eating the golf ball sized meal that is Tweety Bird. There are two explanations. The first is that metaphorically, he wants to devour socialism, as the West wanted to do to the USSR and its satellites during the Cold War through its tactic of encirclement. The second is that as a pure capitalist, he wishes to turn everything into a commodity - including people. The second thing Gargomel plans to do to the Smurfs once he catches them is to turn them into gold. As the ultimate supercapitalist, he is more concerned with his own wealth than with equality and fairness. Like any Adam Smith style capitalist, it is his 'natural' state to want as much money as he can get.
Gargomel is a cold, bitter and ultimately empty man. This is because he has nothing else in his life but a soulless quest for wealth and possessions. A definite statement about the anti-social effects of economic rationalism.
Gargomel's ginger cat, Azrael, represents the worker in the ruthless, free-market state that is Gargomel's house. He is uncomplaining, or, since he has no voice (i.e. Trade Unions), is metaphorically unable to complain. He cannot negotiate his wage - he eats whatever he is given by his master. He is smaller and less well-off than Gargomel, and metaphorically, he represents the proletariat, while Gargomel represents the bourgeoise. Azrael is exploited and oppressed. He risks his life fighting and hunting for his master, and does not have the intellectual capacity to question this state of affairs, just as the worker suffered his fate for centuries because education was off limits to him, and he had no other option but to work for his bosses.
Gargomel owns his house and everything in it, including the capital of his alchemical equipment, in nothing like the way that the Smurfs own their village. If the same political structure existed at Gargomel's house, both he and Azrael would be equal owners, regardless of Gargomel's superior size, knowledge and skill. But Azrael owns nothing.
The incursion of the new characters later in the series/eighties, such as the Smurflings, with their colours and different clothes and looks, can be viewed in the real world as an incursion by commercial interests to increase the popularity and sellability old the show. In the show, metaphorically, they represent Western intrusion to the utopian harmony of the Smurf Village, just as Gorbachev's glasnost and perestroika reforms in the mid to late eighties heralded the ultimate demise of the Soviet Union.
3.) Feminism and The Smurfs:
Monique Wittig wrote that women are defined as women, while men are defined by their occupation, the idea being that men have occupatons but women do not. For example, if an accident was being reported, the victims might be described as 'a teacher, a plumber and a woman'. Smurfette is unique in the village in that she is not defined by an occupation or a personality trait like the male, or real Smurfs, but by her sex. She is not a real member of society because of her sex, and this is represented metaphorically in the show by the fact that she was created by Gargomel.
The diminutive suffix of 'ette', common in our society, also identifies Smurfette as being not the equal of the males. She is the second sex.
Above I asserted that eveyone in the Village was equal. In a sense, this is still true. In the beginning, it was all male, and Smurfette's introduction did not disrupt the patriarchal order. Thus, Smurfette is equal to the others politically, but not socially.
In an ideal, sexist, patriarchal state, women are not a part of the community. They do not occupy the 'public sphere' of work and the outside world, and they certainly do not work. Smurfette's main occupation seems to be standing around looking pretty, ie 'being the woman', although when it comes to problem solving, the producers have not, thankfully, made her a brainless bimbo. She is quite a bit sharper than the rest of the Smurfs, except of course, for Papa.
Smurfette is definitely the 'object' of the male gaze. Since she is the object, the males are the subjects. They are active, she is passive.
Smurfette has no breasts. I believe this is significant when we consider how Smurfette was created. She began life as the almost Frankensteinian creation of Gargomel. As a capitalist, he naturally is treating her as a commodity, something which can be made, used and disposed of, all ultimately to make him money. The idea that a woman can be made by a man denies women's key role in procreation. The fact that she does not posess breasts goes further to this denial of nature, an attempt to control women, to make them conform to the societal norm imposed by the patriachal order.
Smurfette is a secondary creation, in that she was made after the males. She has a heart of stone, and technically, she is unnatural. Physically and metaphorically, she is not a 'real' smurf. She is, in short, bad and wrong, as patriarchal cultures have viewed women for centuries.
How do you make a better woman? In other words how do you make a woman who is acceptable by society (ie. the Village or our own society)? One, you take all the fight out of her. Make her compliant, make her toe the line created and maintained by the male-dominated social structure. One visual example of this is her transformation from a brunette to a blonde. Western society traditionally stereotypes dark-haired women as brainy, but blondes as dumber, but more beautiful and desirable. And that is another way to make a better woman. You make her beautiful. Essentially, when Papa Smurf casts his spell to make Smurfette a 'real' Smurf, the visible difference ws that she was more 'beautiful' as well. Thus it follows that before, she was ugly. So when it comes to women, ugly equals wrong, and beautiful equals right, and in a sense, real. But why is one thing beautiful and another thing not? Who says??Ultimately, the patriachal order. And the Smurf Village, with its 99:1 ratio of males to females, is definitely a patriarchy. This adds to he idea of woman as commodity - she is changed and made by men, and is beautiful by their standards. And at the end of it she is thankful.
Gloria Steinem once wrote that 'women were history's first drag queens', meaning that ideals of beauty are all imposed by the patriachal order, and there is no reason for women to look 'like women' other than a need for distinction between the sexes, and to reinforce the idea of women as mere objects, as the focus of male gaze. Smurfette is no exception.
In an ideal patriarchal society, there are no women. Can you imagine what the Smurf village would be like if the ratio of males to females was 50:50? One thing is certain, it would not be the same utopia it is presented as in the show. Perhaps this means that the ideal Marxist state can only truly operate when everyone is equal, including sexually, although it is almost impossible to imagine an all-female Smurf Village. This is probably more due to deep, intrinsic sexism in our own society than any other reason. If female was the 'natural' sex for Smurfs, I cannot see why they would all look like Smurfette. The concept of beauty, if it existed at all, would have no basis, no frame of reference in which to be equated with 'blonde and cute'.
4.) The Smurf Village as Homotopia:
The Smurf Village was always all-male, until Smurfette came along, when it was still overwhemingly male. This means that they did not procreate by traditional means, and thus, 'heterosexuality' would not be the norm.
Much like ancient Greek city-states such as Athens, which many believe is the closest to a pure democracy the world will ever come, government was by all the people, and by 'all the people' they meant males only. Women are not invited to particpate in public affairs. In Athens, homosexuality was not uncommon, nor was it particularly frowned upon.
No Smurf ever forms a relationship with Smurfette. Although she is the focus of some childish heterosexual rivalries, especially between Hefty and Handy, there is never any real heterosexual tension in the Village. The tension is more between Hefty and Handy themselves, who seem to be more interested in impressing each other than Smurfette.
If the Smurf Village existed for ages without any females, how would the Smurfs have been able to understand what the Smurfette was? Certainly, nature would provide examples of male-female bondings that the Smurfs would have been able to observe, but in their own sphere, there were never any women, and never any heterosexuality. Thus, how could Smurfette have been able to seduce anyone? Are the creators trying to say that heterosexuality is the natural state, even if it never existed in society and there was never any frame of reference for understanding what heterosexual attraction was? On this point, I'm prepared to let the creators off. They probably weren't even thinking about it, because in our society, heterosexuality is very much seen as the norm.
Lastly, I believe the characters of Hefty, Handy and Vanity are gay archetypes. Vanity is the kind of gay archetype commonly presented by the straight entertainment industry, for example in the UK sitcom Are You Being Served? while Hefty and Handy are gay archetypes in the same vein as the Village People, with their extremely iconic masculinity, exaggerated to the point of camp. Meanwhile, I believe Clumsy and Brainy represent an stereotypical gay couple.
5.) Conclusion:
I believe that at the very least, Peyo was attempting to present certain Marxist theories in the form of an allegorical fairy tale. The Smurfs, then, succeeds in the way the best kind of fantasy literature does - by shining a light on the real world we all live in. There is much evidence to suggest that The Smurfs, as a narrative, is a utopian socialist fable. And ultimately, I think a large part of the appeal of the show comes from this utopian ideal, because even if it is unlikely to ever occur in the real world, with all its complexities, we can still imagine. |
global_01_local_0_shard_00000017_processed.jsonl/46596 | The Legend of Zelda: Spirit Tracks review (DS)
CNET Editors' Rating
4.0 stars Excellent
Review Date:
Average User Rating
3.5 stars 1 user review
Spirit Tracks' exciting new mechanics and classic gameplay make it one Zelda adventure that has got a full head of steam.
There is something immensely appealing about the simple act of blowing your train's horn in The Legend of Zelda: Spirit Tracks. You'll find yourself making the classic "toot-toot" sound often as you travel around the world of Hyrule, reveling in the way it makes your inner 10-year-old kid giggle with glee. Playing Spirit Tracks brings up similar feelings; it's fun and familiar, basking you in the nostalgia of the Zelda series' well-trodden gameplay formulas while adding enough changes to make it feel exciting again. And while its look will undoubtedly bring up comparisons with 2007's superb Phantom Hourglass, Link's new adventure does away with its predecessor's repetitiveness and pacing issues, making Spirit Tracks the superior of the two Zelda games available on Nintendo's handheld console.
6241980NoneYou'll find plenty of new yet familiar scenarios in Spirit Tracks.
It not just an art style that Spirit Tracks shares with Phantom Hourglass. This new game is a sequel, and while, you'll play as a new Link, several familiar faces from the 2007 game make an appearance in Spirit Tracks (some as direct descendants of old characters and some as older versions of their Phantom Hourglass selves). Spirit Tracks takes place 100 years after the events of Phantom Hourglass, and the land of Hyrule is in peril. The demon king Malladus is stirring, threatening to break free from the Tower of Spirits (his prison for the last century) and throw off the chains that have kept him suppressed. These chains are actually the game's Spirit Tracks, a series of lines crisscrossing the world that the inhabitants of Hyrule have been using to drive their trains on. Young Link starts the game as a newly graduated engineer, off to see Princess Zelda and gain his official train driver's qualification. Once there, Zelda confides to Link her fear that Malladus may be on the rise and urges him to take her to the Tower of Spirits so they can both investigate. But before they reach the tower, they are attacked. The tower then breaks into several pieces, and the evil Chancellor Cole and his sidekick Byrne steal Zelda's body for use as the resurrected Malladus' new body. Zelda's spirit remains, however, becoming Link's guide as he strives to prevent the demon king's rise and to reunite his beloved princess back with her physical form.
It's certainly a first for the series for Zelda to die (for all intents and purposes) right at the start of the game and for her spirit to join you for the rest of the adventure, but it's not the only new addition. As well as being a Na'vi-like fairy companion for Link, Zelda can take control of phantoms, which are heavily armed guardians of the Tower of Spirits (and who players of Phantom Hourglass will remember as the near-invincible soldiers guarding the Ocean Temple). You can control both Link and the Zelda-possessed phantoms, and it's this new play mechanic that invigorates the tried-and-true Zelda formula. Similar in concept to the domination rod in Twilight Princess, Zelda-phantoms will dutifully accompany Link as he explores the tower, but you can also assign them specific paths by tracing a line on the DS's touchpad, or even get them to activate switches, carry items, or attack enemies. The cooperative puzzles you'll need Zelda-phantoms for start off quite simply--getting their invincible frames to block a column of fire so you can move Link past, for example, or hitching a ride on their shields to traverse lava pits--but by the end of the game they'll get increasingly complex and will require you to use different types of phantoms (each with its own special abilities, such as being able to roll through obstacles, carry fiery swords, or warp around levels) to solve problems. Even more tricky are several boss battles that require you to control a Zelda-phantom and Link. These fights are tense and exciting, requiring fast reflexes as you're forced to quickly switch between the two characters to find an opponent's weak points.
The Legend of Zelda: Spirit Tracksscreenshot
The princess becomes your constant companion..
You can control only Link and Zelda in the Tower of Spirits, an area you'll have to visit several times to gain new maps that open up spirit tracks to different parts of the gameworld. Phantom Hourglass veterans who are worried that the Tower of Spirits is simply another name for the annoying Ocean Temple in that earlier game needn't fear; while you'll make multiple trips to the Tower of Spirits, the repetition and the time limits of the Ocean Temple have been done away with. You won't ever need to repeat the same levels. Outside of the Tower of Spirits and its dual Link-Zelda mechanic, Spirit Tracks plays similarly to most other adventures in the series. You'll venture into a multilevel dungeon, obtain a new weapon, and then use that new weapon to defeat a powerful boss creature at the end of that dungeon. Many of Link's weapons will be familiar to series veterans, including favorites such as the boomerang, the bow, and bombs. There are new weapons, too, including a hookshot-like whip, which Link can use to latch onto beams to swing across chasms Indiana Jones-style, and a special wand that can erect walls of sand.
Such adherence to formula may be the undoing of lesser games, but consistently clever level design and the tricky-but-never-cheap puzzles in Spirit Tracks mean the game is a winning experience at all times. Though the game doesn't stray far from what made the Zelda series great, you'll still feel a palpable thrill when you figure out the way to get that final dungeon key or use your newly found weapon to take down an initially intimidating boss. The game itself is not too difficult--there are only a few puzzles in the final two dungeons that may get you stuck--but the problems you'll have to solve are almost all uniformly engaging and make creative use of Link's abilities and weapons.
What's also surprisingly engaging is riding your train around on the spirit tracks covering Hyrule. You would think that having fixed railway lines to travel on would make moving from location to location boring, but the game throws enough variety at you to make most trips interesting. As well as using your train's horn to scare away livestock clogging up the tracks or using your cannon to blast away roving enemies, you'll have to contend with demon trains cruising the tracks. You'll need to plan ahead to avoid these enemies, keeping a close eye on your map and switching lines when necessary to make sure you don't end up on a collision course. Crashing into one of these enemies is the biggest negative of riding a train in Hyrule. You'll become familiar with the crushing feeling of inevitability that comes when you've made a mistake switching lines and are forced to simply wait until the collision. And every hit sends you right back to where you started your trip, resulting in a fair bit of repetition.
Member Comments
Add Your Comment
Conversation powered by Livefyre
Quick Specifications
• Release date12/7/09
• ESRB Everyone 10 and older
• Developer Nintendo
• Genre Action
• Elements Action - adventure |
global_01_local_0_shard_00000017_processed.jsonl/46604 | Take the 2-minute tour ×
I have been the worst dice-roller in my party as far as I can remember. Be it D&D 3.5, 4th Edition, or any other dice based system, the goddess of luck has always been mean to me.
To give you an example, I currently play a fighter in D&D 3.5, and as we are low level, when I do hit something, I dominate it. The problem is, that I rarely hit. Anything.
This, apart from being frustrating big time, renders me useless in a fight, and thus useless in general (lets face it, fighters in 3.5 just fight) to the point that a Dread Necromancer with a bastard sword who always, always, has good rolls, actually makes a better fighter than I do... when he is not summoning undead that always hit with their three attacks per round.
So, my question: are there any ways of balancing rolls between a player that always sucks and a player that always passes the roll (attack rolls, skill rolls, everything).
Note: I am not overreacting, and it is not a phenomenon that happened once. I seriously noted this difference in 5-6 sessions straight, with my average rolls being six to seven and the necromancer's rolls easily reaching sixteen to seventeen.
share|improve this question
Have you tried replacing the d20 with a 3d6? – Pureferret Jan 31 '12 at 21:55
5-6 sessions rolling without success? Wow, your next rolls will be really lucky! – Wilerson Feb 1 '12 at 22:19
Sorry to put this so bluntly but, is it possible that you do not understand statistics and suffer from information bias (en.wikipedia.org/wiki/Information_bias_(psychology))? Have you ever written down all(!) your rolls for a period of time and checked if they are really (significantly) below average? Or have you just skilled your character in a way that trades of DMG for chance-to-hit? – fgysin Mar 7 '13 at 10:26
You need a new d20... – Jonn_Underwood Apr 25 '13 at 13:13
@fgysin is most likely correct. There is a player in my group who purports to have the exact same problem, but as a relatively impartial observer, I can say that it's simply not true. This particular friend has the same problem in many aspects of his life: winning in non-dice based games (eg, Magic: the Gathering), computer troubles, monetary issues, etc. He always remembers the bad things that happen, and believes that those events are the only ones happening to him. – Brian S Feb 26 at 14:45
show 1 more comment
11 Answers
up vote 16 down vote accepted
My personal recommendation is to use a dice roller. If you have an iPhone, I recommend Dicenomicon ($5), dynamicDICE ($1) or Dice Bag (free). I have heard that Pip ($1) is also pretty good. I have found that the luck associated with physically rolling dice is dissociated from digitally rolling them.
If you find that you still think that a dice roller is giving you below average rolls, try one of these solutions:
Pre-Generated Dice Roll List
This is very similar to using the dice card decks suggested in another answer, but relies on a computer rather than a deck of cards.
1. Generate a list of 1,000 random integers between 1 and 20. Do not look at the individual numbers.
2. Average the numbers.
3. If the average is between 10.0 and 11.0, your set is not necessarily smooth, but is going to have a fairly even distribution.
4. Whenever you need to roll a die, instead use the next number on the list.
5. Continue to use this list until you have used all 1,000 numbers before generating a new list.
Point Buy System
1. Choose an average dice roll - 9, for example. This is the roll that you get if you do not apply any points to the roll. Important rolls are not every roll - instead, they are rolls that your DM feels are important enough for it to matter if you subtracted points from them. For everything else, you roll manually.
2. Whenever you need to make an important roll, you instead get to use the "average dice roll." You can accept a lower dice roll. Based off of how low you reduce your roll, you get that many points to add to future rolls. For example, 8=>1, 7=>2, 6=>3, 5=>5, 4=>7, 3=>9, 2=>12, 1=>16
3. You could instead choose to use points you have accumulated to increase your roll. For example, 10=>1, 11=>2, 12=>3, 13=>5, 14=>7, 15=>9, 16=>11, 17=>14, 18=>17, 19=>20, 20=>24
Alternatively, have this system apply to every roll, but let the DM rate the importance of given rolls, with a multiplier of anywhere from 0.5 to 3. Adding or subtracting points to such rolls costs or rewards the multiplier times the cost/reward.
Point Buy Modifier System
This system is identical to the one above, but you instead modify your actual roll. This modification may be required to be before your roll or may be after it. Alternatively: It costs half as much and rewards twice as much if the change is determined before the roll rather than after.
Narration System
You are encouraged to narrate your actions in exquisite detail. Doing so (before rolling) in a way appreciated by the DM and other players grants the acting player either a +4 bonus to his/her roll (if the roll is between 8 and 13) or the ability to re-roll if the roll is below 8. Alternatively, base the bonus off of how effective your narration was.
Pure Narration System
As above, but the DM determines your success based on the quality of your narration.
share|improve this answer
add comment
If you forgive me, the odds are that this is a perception thing, not a reality thing - unless you own biased dice.
The sane way to determine which is true is test, test, test: take a dice, and roll it a thousand times. Keep a tally of how many times you roll each number.
That will do one of two things:
Most likely, it shows that there is no substantial bias in your rolling, in which case you know that the problem is one of perception.
The other possibility is that it shows a bias - at the end of the thousand rolls, not after the first twenty - in which case you have two scenarios:
Scenario one, you have some metaphysical curse that results in predictable, non-random rolls. In this scenario you then go to Vegas and make millions from your ability to play the odds, knowing that your rolls are not actually random.
Scenario two, you know that your dice are biased. You borrow dice from the Dread Necromancer, then repeat the test. Then you buy yourself some dice from the same manufacturer or something.
share|improve this answer
I'm personally hoping for "metaphysical curse" answer. – Pyrodante Jan 31 '12 at 19:30
+1. Be happy if you roll a 10. If you hope for a 16 or 17 every time, you're going to feel unlucky when you almost never get one. If you can't hit the monster with a 10, use enchantment bonuses, flanking, etc to improve the odds. Don't rely on the dice to get it done. – RMorrisey Feb 1 '12 at 2:32
@Khaal - if you can prove it, other than getting rich in Vegas, you can probably talk your DM into letting you swap the numbers - roll a 2, count it as 18 - at least to find out if you suddenly start rolling only 20 ;) – Daniel Pittman Feb 1 '12 at 22:34
Really, a 40-roll sample and a good statistical analysis should be plenty fine for a given die. We did that for a friend's dice, and found that, in fact, they were biased. (Ran a chi-squared test, and showed his dice were significantly biased towards 5's...) – aramis Feb 2 '12 at 1:10
@Khaal - It doesn't have to be time consuming to record all dice rolls in a session. Write 1 to 20 on a pad of paper and then make a single tally mark for each roll. The 5 bar gate neatly groups them in blocks of 5. I bet it won't take many sessions to get a statistically significant number of samples. – Mark Booth Feb 26 '12 at 1:53
show 5 more comments
Clearly you need new dice! And dont let the old ones sit in the same dice bag as the new ones, or the bad luck will rub off on them. Thats a mistake a lot of gamers make. I recommend a complete, fresh change of dice.
But dont throw the old ones out. Make them watch as you game with the new dice. After a while you'll break their spirit, and you'll be able to re-integrate them with the othes. When I GM, after a couple bad d20 rolls, I set that one aside and move on to the next one.
Shrug... always works for me.
What I'm really saying is... You dont have bad luck with dice. What you are seeing is your perception of your luck given a small sample size, limited to the relatively low number of dice rolls. By changing dice, you are 'resetting' the sample of rolls you are basing your perception of your 'luck' on. If you suddenly roll a couple of good rolls, it will appear your luck has changed and you wont be so convinced you have bad luck.
share|improve this answer
The thing is that i am talking about gaming through years, with several dice sets, that is why i do not feel perception is my problem. There are many variables as to what you roll, but clearly luck is one of them. Assuming that the dice sets are not "bad" (they may have been), it is either luck or bad rolling conditions, but on the conditions pretty much all players have the same. That is why i rule them out and think luck as the basic factor of bad rolls. – Khaal Jan 31 '12 at 21:39
Perception can be tainted, especially if its across the years and you are working from the pre-conceived notion that you have bad luck. Keep a tally of the next 500 d20's you roll like Daniel Pittman suggests. See what the average roll result is after that. It will be darn close to 10.5. – GrandmasterB Jan 31 '12 at 21:46
add comment
There are alternative methods to generating random numbers that have the same distribution over time, but remove any perceived clumping, such as yours.
The Dice Deck: Randomness Smoothed
Consider a Dice-deck approach: Each result is on a single small card, and instead of rolling you draw from the deck. For a d20 deck, there will be only one 20 and one 1 to draw. Most folks add a 21st card, which is blank. Drawing this card causes the deck to be reshuffled (re-introducing some non-predictability to the process.) Positioning of the blank card varies: sometimes folks position it 1/4 up from the bottom of the deck while others just shuffle it in.
If your DM allows it, this is trivial to implement on smartphones (It's probably out there already.) That way you don't even have to deal with 21 little cards.
share|improve this answer
I found a related product online (discontinued, apparently?) that could be used for this purpose. dicecards.com/bits Playing cards where each of the cards has a d4 - d20 on it, as well as other random elements. Only 40 of the cards have a d20: you could keep any number of those (3 perhaps) and use those to trigger the reshuffle. – corvec Jan 31 '12 at 21:18
add comment
I have had players that claim to have problems such as this. What I recommend is if you have a higher percentage of lower rolls (which is kind of hard to believe) make fast strike characters instead of hard hitting ones. If your character attacks 3 times a turn you have an increased chance of SOMETHING making it through. The problem with hard hitting characters is often one miss costs you the entire turn.
Balancing that, say bah to lady luck and look at spell casters that have powers that are not as random in their functionality.
share|improve this answer
I have thought about both of these, but my prefered character is a katana weilding death machine, so it's dicerolling failure VS what i want to play. – Khaal Jan 31 '12 at 19:35
Alliteratively you could ask your GM to roll for you... Or device some solution where you hit a percent of the time, but that's up to you and your GM. – Pyrodante Jan 31 '12 at 19:36
I suspect that this might be why you're noticing the misses more. If nothing else, you'll be rolling far less dice than the GM. – deworde Mar 5 '13 at 9:58
add comment
Here's an online Chi-square calculator for dice: http://bit.ly/chi-sq-dice
Go forth and roll. You don't have to do it "a thousand times," but you do have to do it enough to get a good sample, 30, 50, or 100.
I think you'll find, as many have said: it is dice bias found in poor balance or bad center of gravity in the polishing process.
I know many players that do chi-square tests in store with dice before purchase... 10 or 20 rolls is enough to convince them to purchase or pass.
share|improve this answer
add comment
When the dice seem to have it in for me, I try to make as many rolls as possible. Don't just roll the dice in combat. Have your character do a few tasks that require skill rolls. Seek to find ways to make more rolls, especially in situations where the outcome isn't critical. Have your PC play a dice game against one of the other PCs. Roll to jump over the fence between two farmer's fields. As Daniel suggests, the more rolls you make, the more the odds will even out.
share|improve this answer
I once got 3 nat 20s in a row out of game, then when it was my turn to swing... 2. That's more insulting then just missing! – Pyrodante Jan 31 '12 at 19:35
@Pyrodante Yep, been there, done that. – Khaal Jan 31 '12 at 19:38
add comment
I have always seamed unlucky too, and I don't think it was just my perception, it was notice by everyone I played with (*). What I did was buy a new GameScience Precision dice set. Weirdly the problem as gone away. What I think is that I had a bunch of dice that may be where basically flawed, not all dice are well made, whatever they say.
I have considered several luck balancing game designs over time. The Mid 3d20 is probably the best but it is biased to the players, which is not a bad thing IMO. The d20 card idea should on paper be a good idea but in practice what happens is players will card count and try to do actions that it does not matter if they fail, if the deck is against them to use up the bad cards and get a reshuffle. I like the idea of the some how balancing your rolls (ie you get a 1 so your next is a 19) but I don't see how you can make it work with out the same problem of the d20 Deck.
(*) strangely as a referee I always seamed lucky ;)
share|improve this answer
add comment
If you can manage it, maybe switch to a more forgiving rule set, like GURPS (strong bell curve) or Savage Worlds (with plot points / bennies you can throw in to add dice or bonuses)?
Otherwise, focus on leader characters that help others do well.
share|improve this answer
add comment
In addition to various suggestions about stats and dice, you can try to make a character that's less dependent on dice rolls. Think attack-granting warlord in 4e, or buffing cleric in 3.5. This type of character is not for everyone, but can be very efficient.
As an entirely different type of solution, when a player in my game has suffered from consistent bad luck throughout the first 10 levels of the campaign, I've had him discover he was cursed at birth by a witch whom his parents offended. Sadly, the player went overseas before having a chance to confront the witch, but it would have been fascinating to see if his luck would have improved.
share|improve this answer
In my current 4e game, one player got frustrated with his ability to hit on his Runepriest, so he rerolled Cleric/Warlord hybrid, trying to build in as few actual attack rolls as possible. To be fair, the Runepriest would have been more playable had he picked up more to-hit boosting feats/equipment. – Brian S Feb 26 at 14:47
add comment
To borrow from a different system (Edgewalkers - UK indie game), one possibility is to roll 3 dice instead of 1. Discard the highest, discard the lowest and use the remaining die to work out your success/failure. It means you get less Critical Hits, but also less Critical Failures. It also means that when you do get a Critical, it's even more dramatic because it's not a 1 in 20 chance, it's a 1 in 400 chance (I think).
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/46625 | Take the 2-minute tour ×
I have a Rails 2.3.2 app running on Apache with Passenger, and recently, the strangest thing has started happening.
Every so often, the app will just stop processing requests entirely and they'll all back up until they time out. Restarting Apache seems to be the only way out. The system is under relatively light load until this happens, at which point it's under no load at all.
I realize this isn't a lot to go on, but how can I even figure out what's causing this? Of note, global queuing is turned on; Ruby is ruby-enterprise-1.8.6-20080610; and Passenger is the version that came with the aforementioned Ruby Enterprise Edition.
share|improve this question
add comment
5 Answers
up vote 4 down vote accepted
One resource that I found useful was the section of the Passenger users guide where they talk about this:
If one of your application instances is frozen (stopped responding), then you can figure out where it is frozen by killing it with SIGABRT. This will cause the application to raise an exception, with a backtrace.
share|improve this answer
Does this mean that we'll still need some external monitoring app like Monit to make sure passenger behaves properly? – Ramon Tayag May 20 '11 at 8:07
add comment
Could it be something in the code? Something waiting on input blocking the thread and causing multiple processes to just wait?
share|improve this answer
add comment
Since you don't know what's causing the problem, I suppose you should make sure you're logging everything at least. The last few log entries before a crash could reveal your culprit.
The issue could possibly be something in the code. Well, to find out, you could deploy a very simple rails app, so code wouldn't be an issue, but with the exact same setup (apache + passenger + REE), and send it requests with a little ruby script overnight. Run it on your personal computer and see if it crashes. Of course you have to be sure you've set up your environment the exact same way.
It's also possible that you're running out of memory, though that depends on the specifics of your app and system. This post comes to mind. You may want to try modifying REE's memory management settings as described in the post to see if it solves the issue (won't hurt to try in any case).
I would suggest posting this question on stackoverflo as well if you haven't already.
share|improve this answer
add comment
I've had the same thing, I was hosting several rails 1.2.3 apps using apache + fastcgi for a year without a single crash, then I switched to a new server with apache + passenger and they crash randomly. Apache just stops responding.
I've been using monit to save it until now, and my answer so far has been to migrate to a fresh server (virtual) with nginx instead of apache, and with the latest passenger and rubyee. So far so good!
The apache server is still crashing and its only serving a mongrel site now, so I would assume its some issue with apache or my specific config. Give nginx a go if you can :)
share|improve this answer
add comment
Another potential answer: RMagick has been known to cause problems with Passenger and smart spawning.
This thread from the Passenger mailing list has more information:
It looked like the issue may have been fixed in REE 20090113, but I think it is just happening more infrequently. I found a frozen process this morning running passenger 2.0.6 and REE 20090113 on Centos 4 64- bit.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/46626 | Take the 2-minute tour ×
One of our dedicated machines we use for hosting in London has exceeded the CPU usage, so I contacted the datacenter last week for a quote on an upgrade. We are hosting game servers, and most of these are single core applications.
Our current processor is the Q9550. They are offering us the Q9650 for 230$/mo or the i7-870 for 250$/mo. Since our customers are pushing the machine to nearly 100% CPU usage at peak times, which machine would we be better off going with? The Q9650 is a 3GHZ and the i7-870 is 2.93ghz. The Q9650 has a nice fat 12MB L2 Cache, and the i7 has a smaller 8MB L3 Cache.
I doubt either one is going to be much of a difference at all from the other, but would the i7-870 be worth it for hosting game servers?
share|improve this question
The Q9650 should be better all around. It might depend on the utilization profile, but I doubt it. – Chris S Jul 10 '11 at 18:00
add comment
1 Answer
up vote 3 down vote accepted
On cpu benchmarks the overal performance of the i7 870 is 6073 points, the q 9650 has 4620 : http://www.cpubenchmark.net/high_end_cpus.html the memory bandwith is also larger on the i7 than on the Q. I think you are a lot more future proof with the i7, also when it comes to future games that might utilise more threading.
The difference isn't huge, but you might squeeze in 1 or 2 extra gameservers. So you should profit from using an i7 I think.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/46627 | Take the 2-minute tour ×
• What comes in deployment scripts. Or what are things to keep in mind while writing one.
• Is bash powerful enough or you would recommend perl/python?
• Keeping Network Monitoring in mind, if you have to recruit someone, what skills would you look for in the candidate.
share|improve this question
add comment
2 Answers
up vote 2 down vote accepted
deployment scripts -
• dont presume the customer wants to install your stuff where your standard is. They may not have the diskspace in /opt or even /usr/local/
• your product may require root access merely to run on a sub 1024 port and they may require your product to run as a user (security reasons).
• your product may require user accounts that are application accounts, but they may require the password be changed regularly.
• remember there are firewalls in many companies... poking holes thru their site is not always an option... what proxies can be used to deploy the product?
• customer platforms (os libraries) may have a wide variety of versions that dont meet your compability requirements... how are you going to safely work out those issues.
powerful scripts -
• you generally can do most stuff with bash, but dont shy away from perl or python... but be careful if you require these tools to be pre-installed. Installing perl and a pile of CPAN modules just to run a third party product makes the deployment much harder (and creates a versioning nightmare for compatibilty).
recruiting candidate skills -
• they need to know network topologies, firewalls, load balancers, routers and switches of course
• they should know scripting (more than just 50-line bash scripts)
• they should be able to figure something out on the fly, not just say 'I dont know'
share|improve this answer
add comment
Are you developing a new product or are you simply looking to monitor your existing network?
If you're looking to monitor your existing network, look to the open source community. There are many packages that provide some or all functionality you may want in monitoring.
nagios: great at reporting faults in the network
cacti: great for graphing utilization information.
zabbix: great for reporting faults and collecting utilization information.
These tools typically use snmp and other agents to collect the information, a database of some sort to store the historical info, and a web interface for management and displaying the information.
There are likely other monitoring apps out there, especially in the commercial space.
If you're more interested in tools for managing the network device configs themselves, a popular opensource app is rancid.
Lastly, if I were looking for someone who portrays themselves as someone who understands network monitoring, I would ask about these tools, as well as SNMP and snmp tools such as snmpwalk, and I would also expect them to know or at least know of tcl/tk or at least expect.
If, after reading this, you decide you want someone who can just integrate all these tools into a self-contained product, instead you'll need a platform engineer who understands all of the above as well as how to make a management/presentation layer for managing all of the above...
share|improve this answer
oh my god, it is not so straight as i thought. thanks – Vivek Sharma Jul 14 '09 at 11:33
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/46628 | Take the 2-minute tour ×
$foo = 'bar'
$content = template('mymodule/maintemplate.erb')
<% bar = foo + "extra" %>
foobar = scope_function_template(['mymodule/subtemplate.erb'])
<%# here i want to access the variable bar %>
<%= bar %>
there is the function
<%= scope.lookupvar('::bar') %>
is there a kind of parent::bar in erb templateing, or can i pass some variables to the subtemplate, or can i only access the outer variable (of the .pp file) with ::foo
share|improve this question
check projects.puppetlabs.com/issues/6492 – rbtux Nov 20 '12 at 22:21
@rbtux thank you very much. can you add it as answer so that i can accept it? – c33s Nov 21 '12 at 10:59
add comment
2 Answers
up vote 0 down vote accepted
As stated in this bugreport/feature request: http://projects.puppetlabs.com/issues/6492 there is a workaround using scope.setvar
<% bar = foo + "extra" %>
This is ugly but seems to work...
share|improve this answer
scope.unsetvar() was removed in github.com/puppetlabs/puppet/commit/… and is not available in puppet 3.x – jonhattan Apr 3 '13 at 12:45
add comment
So I read at http://projects.puppetlabs.com/issues/6592#note-6 that a TemplateWrapper could be used and I end up with this snippet:
newscope = scope.compiler.newscope(scope)
newscope.setvar(k, v)
wrapper = Puppet::Parser::TemplateWrapper.new(newscope)
wrapper.file = 'templatefile.erb'
<%= wrapper.result %>
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/46629 | Take the 2-minute tour ×
Let's say I have a number of existing workers running in supervisord. I want to add a new worker to the group as well as start the new worker. I perform the following steps:
1. I modify the file /etc/supervisor/supervisord.conf and add the new worker config
2. Back on the command line, I enter sudo supervisorctl
3. I run reread to read the new configuration file settings.
4. Attempting to run start workers:exampleWorkerName gives the error workers:"exampleWorkerName": ERROR (no such process)
So, my question is, how can I start this new worker process without affecting my other existing workers? I'd rather not perform a supervisorctl reload or /etc/init.d/supervisord restart command.
share|improve this question
add comment
2 Answers
up vote 1 down vote accepted
You also need to run supervisorctl update.
share|improve this answer
Running supervisorctl update will unfortunately restart all workers. Here's a sample of the output: workers: stopped followed by workers: updated process group. The worker status shows they were all restarted. – cballou Aug 2 '13 at 14:58
I should probably also say that I am using groups allowing me to restart all workers at once, so this might be the cause. – cballou Aug 2 '13 at 15:22
add comment
If you are still interested, after running
supervisorctl reread
you can try running
supervisorctl add <newWorker>
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/46630 | Take the 2-minute tour ×
We need to send out regular emails to people, and we're thinking about using a mailman list. However one requirement is that we want each user to get the email at a different time. We want them to get it at the same time, local time. So if we have 2 users, one in London and the other in Paris, and we want them both to get an email at 9:30am, we could send the email at 9:30am UTC and we want the Londoner and Parisian to get the email at 9:30am local time, (which could be at 9:30am UTC, 10:30am UTC or 11:30am UTC depending on the time of the year). The email body would be the same for all users. Also assume we have a database of all the timezones for each email address on our list.
Is there some way in mailman to do this, or do we have to roll our own?
share|improve this question
add comment
2 Answers
up vote 1 down vote accepted
I assume you know that there is no guarantee with e-mail that it arrives at a certain time, that people could access the mail from different locations at varying time zones etc.. However, I understand the requirements (I had a client who was just asking for this, too:)
Default Mailman does not have any such feature built in. Nor are there filter criteria for e.g. selectively dealing with parts of subscribers. I also do not know about any add-ons that could do this.
Of course, you could set up lists for each time zone. But this means quite some administrative overhead, people will get messages with different list-ids, you'd have to think about dealing with different bounce addresses and such.
Since you probably want to do announcements only (versus discussion lists what Mailman is designed for) I recommend you write some simple scripts to send the messages. If you have a list of addresses and time zones this should be no problem. HTH.
share|improve this answer
yes that's pretty much the conclusion I've come to. – Rory Oct 26 '09 at 17:27
add comment
Is the email content all the same? How do you plan on getting their local time? As far as I know, Mailman doesn't have any facility to capture that information. This sounds like something you will have to write
share|improve this answer
yeah the email body is the same. Let's assume I already have a list of email addresses to timezones. – Rory Oct 9 '09 at 16:02
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/46635 | Take the 2-minute tour ×
I tried installed Aug cu 2012 in my SP2010 sp1 farm but i cannot install. It prompts as "expected version of the product, when the system was not found". And i have checked the Turkish language pack SP1 is not installed (Note: Turkish language pack installed properly).I cannot install Turkish language pack sp1. Since the sp1 exe itself issue.
We found one command to resolve this issue==> Package.Bypass.Detection.Check=1. If i use this command. Is there get chance to farm will affect ?
Please, can you tell me any alternate solution to proceed further?
share|improve this question
add comment
1 Answer
There is a regression in the August 2012 CU its one to avoid - June 2012 is probably you're best bet. http://www.toddklindt.com/blog/Regressions/August2012CU.aspx
But guessing you're alread committed to this install and its a production environment perhaps? If so you're probably desperate enough to try that flag and throw caution to the wind.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/46659 | Forgot your password?
Mars Rover Upgraded 132
Posted by CmdrTaco
from the everyone-likes-upgrades dept.
MrShaggy writes "According to a BBC article, NASA is upgrading their MARS rovers. The upgrade will allow the rovers to sift through the pictures of dust-devils, decide which is the most appropriate, send it back. 'Clouds typically occur in 8-20% of the data collected right now,' Castano said. 'If we could look for a much more extended time and select only those images with clouds then we could increase our understanding of how and when these phenomena form. Similarly with the dust devils.' The article also discusses upgrades to the Mars Odyssey. They plan to make it self-reacting to events on the planet as they are happening."
Mars Rover Upgraded
Comments Filter:
• Old News (Score:3, Informative)
by maytagman (971263) on Sunday May 28, 2006 @11:22AM (#15420510)
I heard this reported on CBC radio SEVERAL months ago. I'm thinking it was febuary... The scientist they were interviewing was saying how hard it is to trust a robot to make the right decision even though they knew the algorithm they were using was pretty fool proof. Lets hear it for CBC radio!!!
• by Anonymous Coward on Sunday May 28, 2006 @11:25AM (#15420525)
Yes, they'd have to write their own JVM. They aren't the only ones who do this, www.pilz.com do the same for industrial software.
• by Avionics Guy (635626) on Sunday May 28, 2006 @12:02PM (#15420650) Homepage
The large majority of the MER software was written in C. The exception is a small module in the navigation code that used C++ with a custom memory manager. BTW, JPL doesn't "do" ADA and it isn't likely that Java will be used on the MSL, the 2009 rover.
• by MWales (686969) on Sunday May 28, 2006 @12:15PM (#15420707)
I believe the current ones would probably use C/C++ since they are using VxWorks according to Windriver [windriver.com]. If they are using a RTOS now, I think moving to something like Java would be a huge jump. I could see them moving to embedded Linux though, it's becoming alot more popular in the embedded world
• by kilodelta (843627) on Sunday May 28, 2006 @12:20PM (#15420730) Homepage
If you want, read Steve Squyers book "Rovign Mars". It'll give you a better understanding of why the rovers lasted as long as they did. They're built like tanks with proven technology. There was nothing flashy about what went into those robots, it was all tried and true.
They were originally supposed to last for 90 sols, or Martian days. They've now gone far past the origianl design goals and the benefit has been lots more data about Mars. Spirit is currently on it's 853rd sol. http://marsrovers.nasa.gov/home/ [nasa.gov]
• Re:What Upgrade? (Score:5, Informative)
by the_brobdingnagian (917699) on Sunday May 28, 2006 @01:41PM (#15420988) Homepage
The upgrade is a software upgrade. But it's not an easy task to do this at such a distance. Two way communication is a painbecause of the lag time. I can't remember the exact time, bu I believe the lag is about 20 minutes. They use a specialised protocal that was designed to handle such extreme lag. The protocol is PROXIMITY-1 SPACE LINK PROTOCOL (specs [nasa.gov]). They are verry carefull to make sure they dont have to reset the rover the hard way (A.K.A. reset-button) after updates and even during normal operation. I believe they build in all kinds of auto-reset features so the rover could reset itself.
• Not a PR conspiracy (Score:4, Informative)
by Tablizer (95088) on Sunday May 28, 2006 @01:48PM (#15421014) Homepage Journal
They were built with the idea that they could conceivably last this long but the mission profile (and all the press releases) were put together with the expectation that they'd last a couple months. It was the closest thing to a gaurenteed win NASA could do. Think of it this way, if GM marketed...
Hogwash. It is a combination of factors:
1. Nasa increased quality control effort and spending in response to the Polar Lander failure and two orbiter failures.
2. Wind has blown dust off of the solar panels. Many expected the dust to be probe-sticky and accumulate based on the Viking lander data.
3. Constructor contract payments were actually stipulated based on a 3-month survivle. It is not an arbitrary deadline.
• by glwtta (532858) on Sunday May 28, 2006 @11:33PM (#15422991) Homepage
Even considering the Arianne-5 failure, it's still more reassuring to know that a software system is developed in Ada than Java.
Arianne 5 was the result of pure, old-fashioned incompetence. An obsolete component - left on when even its original function would not have been needed - dumps debug info on the bus, that's then interpreted as trajectory data. And the backup system runs identical hardware and identical software to the primary (I believe the backup actually failed a fraction of a second before the primary).
The rover software on the other hand - written in C, btw - is a gold standard of excellent engineering and testing practices. Most of the time it's not the platform that counts, it's the development team.
Real Users hate Real Programmers. |
global_01_local_0_shard_00000017_processed.jsonl/46660 | Forgot your password?
Creationism Museum To Open Next Summer 1570
Posted by kdawson
from the example-of-intelligent-design dept.
Aloriel writes to point out a story in the Guardian (UK) about the opening next year of the first Creationism museum in Kentucky, just over the Ohio border. From the article: "The Creation Museum — motto: 'Prepare to Believe!' — will be the first institution in the world whose contents, with the exception of a few turtles swimming in an artificial pond, are entirely fake. It is dedicated to the proposition that the account of the creation of the world in the Book of Genesis is completely correct... The museum is costing $25 million and all but $3 million has already been raised from private donations." A lot of that money is going into the animatronic dinosaurs, which are pictured as coexisting with modern humans before the Fall. According to the article, up to 50 million Americans believe this. The museum has a Web presence in the Answersingenesis.org site.
Creationism Museum To Open Next Summer
Comments Filter:
• by BadAnalogyGuy (945258) <[email protected]> on Wednesday November 22, 2006 @06:35AM (#16947058)
The book of Job describes a creature called a 'behemoth' whose description can be interpreted as that of a dinosaur.
• by Kris_J (10111) * on Wednesday November 22, 2006 @06:36AM (#16947068) Journal
How any public money can go into something so farcical is beyond me. Well, not quite beyond me, but seriously depressing -- even though it isn't actually my public money.
I'm just glad I live in Australia, where education is valued [news.com.au].
• by Anonymous Coward on Wednesday November 22, 2006 @06:49AM (#16947156)
Some people understand religion in one way and some people in another, but most of the religious beliefs are in contradiction with science.
Can you justify this? No anecdotes please.
It might help if you clearly define a scientific observation and a scientific theory before you proceed. Anything that is not observable has nothing to do with science and therefore cannot be contradicted by science. Statements like God created the world in 6 days are obviously contradictory. But statements about having a soul are not. Nor is the existence of a God contradictory. Imagine a computer simulation of a world. You don't have to implement the same physical laws as exist in your (in fact you can simplify things if you wish and place maximum limits--i.e. quantum theory and relativity). If intelligent life (effectively AI) formed in your world, they would think the computer programmer was a God--and they would be right.
• Re:NO! Don't link. (Score:5, Interesting)
by drgonzo59 (747139) on Wednesday November 22, 2006 @07:14AM (#16947358)
Most Christians would also regard these people as crazy. The Bible was not meant to be a science textbook, and it was never meant to be read literally. A simple reading of the early church fathers (2nd century or perhaps a little later) would reveal this fact. In other words the Fundamentalists claim that they know better what the Bible means than the people who wrote and selected the books to include in it. Even side-stepping the whole "God exists -- God doesn't exist" issue, and just re-framing this in terms of a Christian perspective, they will still be wrong.
• by AceJohnny (253840) <[email protected] minus painter> on Wednesday November 22, 2006 @07:30AM (#16947456) Journal
While I agree on the negative impact of such an endeavor, I don't think religion as it is used in the USA corresponds to Marx's definition.
Marx meant it as a means to tame an oppressed class "Suffering in this life guarantees you Paradise in the afterlife!".
We can hardly call the american middle-class "oppressed" in any way.
Actually, come to think of it, I have no idea how come religion (specifically, christianism) is so powerful in such a developped country as the USA...
I wonder if it has anything to do with protestant evangelists taking up the methods of capitalism. Hmm...
• by MosesJones (55544) on Wednesday November 22, 2006 @07:33AM (#16947488) Homepage
Hell if we are going there then there are lots of things that could be interpreted in the bible to be dinosaurs, after all it doesn't say the scale of any elements, so take genesis itself.
The snake (a reptile) has legs at the start of genesis, we know this as the punishment from god is to have no legs and slither on its belly, a snake with legs is a lizard and the bit with the apple and the tree was pretty terrible, so the snake was in fact a terrible lizard. A quick translation of that is "terrible lizard" so in fact the dinosaurs didn't become extinct it was just that god turned them into snakes.
See its easy if you are trying to prove something.
The biggest problem with all of this is the damn Egyptians, they've got around 6,000 years of continuous history and at no time have we found any hieroglyphics that say
"Damn it was wet this year, I don't mean a little bit it absolutely pissed down and everybody died"
• by BadAnalogyGuy (945258) <[email protected]> on Wednesday November 22, 2006 @07:34AM (#16947492)
Nonsensical as it may be, it is what you're up against. The more you whine about how theists dodge the issue, the more pathetic you look.
As for your discounting of historical beliefs through science, please notice that science disproved those beliefs. The earth is not flat and we know because we proved it to be round. The sun does not circle the earth (or does, depending on your perspective) because we developed a better model to more accurately describe the movement of celestial bodies.
Now you get to use science to disprove God. That, as difficult as it is for you to understand, is how it works. Established beliefs get to stick around until disproved. Theism has been around a long time, so it's up to you to dethrone it. (Well, I wouldn't leave the fate of atheism to *you* specifically. Atheism has more to fear from its proponents than it does from its opponents.)
• May I point out.... (Score:5, Interesting)
by codeButcher (223668) on Wednesday November 22, 2006 @07:53AM (#16947628)
The problem is not with the account, the problem is with some people's interpretation of the account. When I read the first 2 chapters of Genesis, it does not preclude evolution (yeah, go read it). It also does not demand a 7x24 hour creation period (since the Hebrew word for "day" has many meanings).
In fact, Genesis is NOT a scientific treatise on the origin of the world. The book is clearly about the origin and early history of Israel. The first 2 chapters only provide some context for Adam.
• by HansF (700676) on Wednesday November 22, 2006 @07:54AM (#16947638) Journal
Except they didn't kill out of atheïsm, but they found communist reasons to kill and oppress those of different persuasions. There actions found it's base in the communist ideology which has no respect for the life/rights of the individual.
Don't blame the atheïsts for the horrible communist regime.
• by Lisandro (799651) on Wednesday November 22, 2006 @07:55AM (#16947644)
Some of my favorite comedic quotes about religion were from the great late Bill Hicks. This one is priceless too:
"A lot of Christians wear crosses around their necks. Do you think when Jesus comes back, he's really going to want to see a fucking cross? Ow! Maybe that's why he hasn't shown up yet...it's like going up to Jackie Onassis wearing a sniper rifle pendant... Just thinking of John, Jackie. We love him. Trying to keep that memory alive, baby.
[mimes shooting a rifle]
I did that routine in Fyffe, Alabama, and after the show these three rednecks came up to me. 'Hey, buddy! C'mere! Hey Mr. Comedian! C'mere! Hey buddy, we're Christians and we don't like what you said!'
I said 'Well, then forgive me.'
Later, as I was hanging from the tree..."
• by RoundSparrow (341175) on Wednesday November 22, 2006 @07:56AM (#16947648)
Next time in vegas [pinballmuseum.org]
• by MosesJones (55544) on Wednesday November 22, 2006 @08:09AM (#16947744) Homepage
So what you are saying is that 6,000 years ago the Egyptians had a legend that before their recorded history there was a legendary flood. Still doesn't mean they recorded one happening, which for new earth creationists is a problem as the Egyptians pre-date their creation date.
The difference is between legend (Bible and the enscription you quote) and recorded history. There are no elements in recorded history of a world wide flood, and we have recorded history dating back over 6,000 years.
• by SamSim (630795) on Wednesday November 22, 2006 @08:13AM (#16947772) Homepage Journal
Well, there's the videogaming exhibit [sciencemuseum.org.uk] at the Science Museum, if you happen to be in London sometime.
• by drgonzo59 (747139) on Wednesday November 22, 2006 @08:17AM (#16947790)
People will take long ways to create illusion around them that something they believe in actually exists or have existed. Poor people, still linger to last leftovers of "belief".
I assume that was directed towards the people who believe in a traditional religion. But doesn't that apply to anything that people do?
Look at the String Theorists, they have spent the most productive part of their lives claiming that their results represent reality (if they didn't believe that, they would probably be doing something else). Yet for all these years, there was no experimental evidence that any such strings exist. But there is a whole cult formed around it, there are a countless number of PhD's given in that area. Are they weak and very selective to reality? Some other physicists would claim so...
Or how about the illusion that democracy is the ultimate utopia. I presume you are an American , doesn't it sound like heresy to "knock" democracy? It does to me, because it is so ingrained into my brain that our way of life is the best, and we are prepared to go and spread our utopia to other countries whether they want it or not... Are we being selective to our reality? Probably so -- we see what we want to see.
I believe in God, however, I don't think it has anything to do with Bible or this physical world.
But if you believe in God, why wouldn't God want to have anything to do with the physical world?
Why do you think the Bible is out of the equation as far as God is concerned? Have you read it, have you talked to a priest or are you discounting it because it is the "popular" thing to do?.
It is known from historical accounts that many Christians were killed for their beliefs during the early centuries of Christianity (even before the Bible was completed). That was done in public view, in an arena for example. Quite often, all that a Christian would have to do is deny their belief, pay tribute to the Roman gods and their life would be spared, but many didn't do that, and chose to die a horrible death instead. What's your take on it? (I am not being sarcastic, it is just that I am a Christian and I believe, that is why I can see why they did what they did, but I would want to know what someone who is not a Christian would think of it). If the Christians knew that Jesus didn't die/rise from the dead/perform miracles and that everything was made up, why didn't they just admit that if it could save their lives? Granted the terrorists are also willing to blow themselves up for their beliefs, but here I am talking about the so called Apostles, the ones who would have had a first-hand experience of the story of Jesus. If it was bogus, why die for it?
• by LarsWestergren (9033) on Wednesday November 22, 2006 @08:38AM (#16947968) Homepage Journal
You failed to answer the grandparents question, how the hell is he going to come up with proof for the nonexistance of a being?
Believer: Worship the invisible pink unicorn.
Atheist: Sorry, I don't believe he exists.
Believer: Prove it.
Atheist: Huh?? Why should *I* come up with proof? Ok, I can try: I don't see him.
Believer: That is because he is invisible. Also he is pink. That is one of his divine properties.
Atheist: I don't hear him.
Believer: He only speak to believers. I hear him answer when I pray to him, I'm convinced of that.
Atheist: Ok, here I have an infrared camera. I don't see anything.
Believer: He doesn't emit heat.
Atheist: Ok, I throw around flour and see if anything stick to him, or if we see any footprints appearing.
Believer: Sorry, he is immaterial.
Atheist: Ok, what is the difference between a totally undetectable creature and one that doesn't exist?
Believer: When rain falls, the invisible pink unicorn caused it, whenever a child laughs, the IPU caused it. Also 6000 years of belief shows I am right.
Atheist: ...whatever.
What could possibly be enough "evidence of nonexistance" for you - do you want a signed death certificate from his doctor? Face it, if you want us to believe something, it is up to YOU to give us some evidence.
• by Anonymous Coward on Wednesday November 22, 2006 @09:09AM (#16948210)
In the same way murderous actions by those who claim a religion are usually found in some other base, for example, political, financial, geographical, racial or otherwise. It gets old to keep repeating it, but blaming an entire religion for a murderous action is silly unless you can point to justification for the action in the foundational religious text/s.
• Who cares? (Score:3, Interesting)
by Ingolfke (515826) on Wednesday November 22, 2006 @09:12AM (#16948254) Journal
Seriously... who cares? So some people built a museum... why is this news? If you got a distinct sense of pleasure in ridiculing these people and their museum maybe you should evaluate yourself and question why your world is so small.
• by CrazyBrett (233858) on Wednesday November 22, 2006 @09:28AM (#16948428)
Don't forget that atheism is a religion too. "Militant atheists", as described above, believe that God does not exist, despite having no direct evidence to support that belief. No one gave them an exclusive peek outside the universe to see that nothing is out there. Holding an unsubstantiated belief is the definition of religion, and like any other religion, it can be used to justify extremism.
• by kfg (145172) on Wednesday November 22, 2006 @09:42AM (#16948598)
Now really, would you even trust someone who goes around cuckolding someone else, never mind worshiping them and their bastard kid?
Worked for Zeus and Herakles. Of course they were Gods of cuckolds and bastard kids. When asked about adultery in Sparta the reply was "There isn't any," because Sparta had a culture of wife "sharing" and children as the property of the city.
Think about that the next time someone says, "It takes a village to raise a child." Read a history of Sparta - and ants.
• Re:wtf (Score:2, Interesting)
by chikanamakalaka (218733) on Wednesday November 22, 2006 @09:48AM (#16948652)
Job 40:15-24 NIV 15 "Look at the behemoth, which I made along with you and which feeds on grass like an ox. 16 What strength he has in his loins, what power in the muscles of his belly! 17 His tail sways like a cedar; the sinews of his thighs are close-knit. 18 His bones are tubes of bronze, his limbs like rods of iron. 19 He ranks first among the works of God, yet his Maker can approach him with his sword. 20 The hills bring him their produce, and all the wild animals play nearby. 21 Under the lotus plants he lies, hidden among the reeds in the marsh. 22 The lotuses conceal him in their shadow; the poplars by the stream surround him. 23 When the river rages, he is not alarmed; he is secure, though the Jordan should surge against his mouth. 24 Can anyone capture him by the eyes, or trap him and pierce his nose?
• Aaargghh (Score:3, Interesting)
by FuzzyDaddy (584528) on Wednesday November 22, 2006 @09:55AM (#16948738) Journal
I have a MA in physics from Berkeley, and I understand only very little of what we currently understand about the creation of the universe. I certainly couldn't explain what parts of it I know it to my wife, a smart, well educated but not technically inclined woman. So how would a guy with an ancient egyptian education be able to understand the creation of the world? What value would there be in trying to tell it to him literally?
• by MECC (8478) * on Wednesday November 22, 2006 @10:09AM (#16948966)
Actually, as a friend of mine once said, "you can't argue people into believing what you believe." It might be more useful to point out that they themselves change the modes with which they interpret the bible. In some places, they claim not to be 'interpreting' it - they say they're just 'reading it' when they quote passages which say the only way to heaven or to be 'saved' is to believe in jesus. Yet in other places they don't take scriptures so literally. Good examples are Deut 23:1 that says you can't go to church with damaged testicles or if your penis has been cut off and Deut 23:2 that says if you're a bastard (even ten generations out) you can't go to church. Also, god is powerless against automobiles (iron chariots) - Judges 1:19. fundamentalists will claim that you can violate Old Testament laws all you want, and Christ's sacrifice will deliver you from judgment if you believe in him. Yet, Christ said that not one bit of OT law will be given exception to - Matt 5:17-19. In other places, christ's sacrifice does supersede OT laws - Luke 16:16/ Eph 2:15/ Rom 7:6. Do OT laws still hold? Or not? If I hit god with my subaru, will he be able to get back up?
Those are just theological contradictions. Then there are places where a story is told one way and accounted for differently in another. In Matthew, christ was taken into egypt (Matt 2:14,15,19,21,23) but in Luke he wasen't (Luke 2:22, 39). In Matthew, jesus gave the beatitudes on a mountainside (Matt 5:1,2) and in Luke he gave the beatitudes on a plain (Luke 6:17,20). The list of course goes on and on. The point is that fundamentalists and evangelicals take the bible as a unified authority and believe its contents have been carefully arranged by god to tell us how to live and what to believe. And just by reading it, this isn't the case which pokes holes in their claims to the be the only true religion, and in most of the founding theology they live by. You can't let them get away with "we're not interpreting the bible - we're just reading it factually." (which they'll fall back on to avoid complex theological discussions) Point out they do in fact interpret the bible, and their is just one on many interpretations. You might even need to point out that the bible wasn't even written in english or even one language, so by definition they are reading an interpretation. There are lots of good examples of contradictions at evilbible.com.
• The why questions (Score:3, Interesting)
by Colin Smith (2679) on Wednesday November 22, 2006 @10:19AM (#16949170)
Um... I don't know if you'd noticed, but the question "why does blah blah" has an implicit assumption. It assumes that there is intent. It assumes that there was a reason for "blah blah blah". It assumes that god exists.
By asking "why" you are already assuming that god exists. There's no other alternative.
What I'm saying is that "why" questions are circular.
• by jjn1056 (85209) <jjn1056@[ ]oo.com ['yah' in gap]> on Wednesday November 22, 2006 @11:29AM (#16950512) Homepage Journal
There are also quite a few post Marx theories that suggested the Revolution would be permanently postponed since the industrialized west coul shift the oppression to undeveloped nations. As long as the West could carefully balance developing the third world enough to produce useful labor but at the same time keep them undeveloped enough to prevent the critical mass for Revolution. So that's what gave the justification to many of the communist leaders of the 20th century to act in such fascist ways, they felt unless they could break the cycle by any means necessary they would never be free.
I do think we see aspects of this playing out in the world. For example in India, during the last election cycle, the poorer people in the country expressed their unhappiness with the fact that properity from outsourcing and other things seemed unequally distributed. And as India develops more, you see Western nations turning to other countries for outsourcing. The issue is will we ever get to the point were the whole world is developed enough that local labor has no disadvantage?
Complicating this is the degree to which some countries will embrace aspects of socialism. For example, in the USA most automobile companies are in big trouble because they can no longer afford retirement and health care benefits for their already retired workers. This is a HUGE expense for them. Many of their overseas competition doesn't have to worry about this, because the gov't provides healthcare and retirement benefits. In this case a gov'ts degree of socialism can provide an advantage to a particular industry by removing a large category of expense.
The question of which direction competition between countries will drive work rights is still undecided. The India example is heartening, but most other developing countries don't have such a democratic institutions. Will workers in China start to demand more involvement in gov't? After living there for 3 years I am not sure anymore.
• Re:NO! Don't link. (Score:0, Interesting)
by Anonymous Coward on Wednesday November 22, 2006 @11:39AM (#16950706)
> People never co-existed with dinosaurs.
Well, there is evidence of fossilizes footprints of dinosaurs next to fossilized footprints of a human-like creature with toes. That evidence of course is hardly mentioned in textbooks, but highly fought about among scholars - unfortunatly only a few books actually discuss those findings which CONTRADICT majority of findings or particular darwinistic approach to evolution. The point is, the scientist slowly become believers in their own domain, and whoever challenges them with evidence, they act like Christians, they say this is the way. Science is about developing theories, and those are subject of change, adjustments or even exposed as non-sense.
That "Creationism" museum is non-sense is a gross simplification - it really depends if they want to show 6000 years took it to create the world (universe + earth), or that there was a creator with intent and a goal, then it crosses over to cosmology and theology (not particular solely Christian theology) - and here comes another criticism of mine, due to expertism, and narrow thinking, issues are not longer discussed or even looked at in a broader perspective, interdisciplinary - but then again I see this kindergarden discussion about ridiculing the Creationism with "science" facts, which only are a set of facts denying counterprooving facts as mentioned. The point is, the Bible is a far more interesting book that what the Christian fundamentalists make one (with common sense and spiritual interest) may make believe: it is a summary of vast knowledge, and the multiple translation made it worse, yet coherent for the reader. To study the originals, the sumerian, the egyptian prayers which were all adapted in the old-testament, you realize there are three genesis embedded, and those come from three different sources. When you would take the time to study them individually and with an open mind, they might reveal a vast depth of cosmological understanding than you might think reading 2nd or 3rd re-translated and changed versions of Genesis stories. And when looking beyond the Judaic border of religious spiritual teaching, e.g. to Vedic/Hindu cosmology there things are even more complex and describe meta-universes with deities and large cosmic cycles, where creation and destruction is discussed in an epic manner. Of course, as long you approach such scriptures with the narrowness of science alone, you won't get far indeed.
Life can't be explained with Science, only a very small portion can be. If you think Science is the way to tell about Life is all facets, then you are really dumb or believe we are all biological machines and life has no purpose and all is an accident some sort - anything else, purpose, meaning or other consideration are not backed up by science (not even modern psychology). And so on...
Anyway, to keep myself short, be careful to replicate what you were told in school by darwinists, saying there were no human among dinosaurs, there is evidence.
• by ceoyoyo (59147) on Wednesday November 22, 2006 @12:37PM (#16951828)
There was a serious proposal to add it to the federal constitution too. Constitutions are normally used to keep governments in check and to GIVE rights to the people, not take them away.
• by StoatBringer (552938) on Wednesday November 22, 2006 @12:48PM (#16952058)
Do you believe that there are mile-high monsters made of orange marmalade living on the moons of Jupiter?
Unless you do, by your own reasoning you are a member of the religion which denies the existence of the Great Jovian Marmalade Monsters.
Or do you have direct evidence to support your otherwise unsubstantiated belief that such beings do not exist?
Do you see the problem here?
• by Anonymous Coward on Wednesday November 22, 2006 @03:06PM (#16955108)
located in the heart of gods country, Santee California. you might recognize the from the high school shootings a few years back, or perhaps the town having an unusually high concentration of white supremacists. I'm sure those little details are just a coincidence and have nothing to do with this fine learning institution.
http://www.icr.org/discover/index/discover_museum/ [icr.org]
oh, and Pen & Teller featured this "museum" on an episode of bullshit, which I'd highly recommend.
• by jafac (1449) on Wednesday November 22, 2006 @03:32PM (#16955568) Homepage
For some, yes - it's boredom, and the "meaning of life thing" - (packaged up in a neat little book that just about anyone can understand, for the same reason that a McDonald's Cheeseburger is packaged into a neat little box that just about anyone can enjoy).
At least in America, anyway, I think that over the past 40-50 years or so, there's been a growing sense of loss of control of our country, our laws, and our governments. The Evangelical movement has arisen primarily as a tool, a corporate tool, to make money, and keep people distracted from the real problems that affect their lives and make them angsty. Don't worry about Sony installing rootkits on your computer, Jesus is Coming! Don't worry about Wal Mart tracking you with RFID tags, Jesus is coming! Don't worry about nightclubs scanning your driver's license, Jesus is Coming! Don't worry about the bank giving your purchasing information to the FBI, Jesus is coming!
(then there's - Worry about the evil terrorists, Mohammad is coming!)
The nature of this movement is evident when you look at the sheer ruthless industrial efficiency of the new suburban "mega church". A tax-free enterprise, with relatively low operating costs; all they need to do is tell sweet stories a couple hours, one day a week, 2000 or so believers at a time, and sit back and rake in the tithing. Occasionally sponsor a mission or a soup line. And all those angsty people learn is; don't associate with those heathen hippies and their commie ideas.
This is coming from someone who DOES believe in a God, and Jesus.
I used to go to my local suburban megachurch, after I relocated to a different part of the country. What they're teaching, is not the Christianity I was raised with. A whole new set of memes has taken hold. A set of memes that used to be relegated to lunatic fringe wingnuttery. For example: The official stance of the Catholic church, as long as I've been aware, was that Evolution was God's way of making Mankind on Earth - and if it took hundreds of millions of years - well, that's how long it took, and don't hold the scripture to perfect inerrancy, because some parts are allegorical. That shit's just out of style now.
I don't really know what, if anything, can be done to stop this trend. Maybe after a few more scandals, people will stop realizing that their leaders are not God's Messengers. If nothing else, this has brought their leaders great power, and power always always corrupts. (and stealing God's power is "absolute power"). And from that corruption comes arrogance. The bigger they are, the harder they fall.
• I know of two fans (Score:2, Interesting)
by Brad Eleven (165911) <[email protected]> on Wednesday November 22, 2006 @05:22PM (#16957338) Homepage Journal
My father-in-law and his wife. In every other aspect of life, I admire the man, but his stubborn adherence to anything that comes out of Pat Robertson's mouth is very troubling. I don't care what he believes, as long as he doesn't waste our time trying to convince me of it--and stays away from my children with that nonsense.
He's been talking about this "museum" for at least five years. He gets way too excited about it, like an Amway distributor inviting you to something that features his personal Amway hero.
This weekend should be interesting; first time we'll have spoken at length since the mid-term elections.
PS: Did y'all know that The Rapture Is Not In The Bible? I think I'll research this factoid thoroughly before we drive to Northeast Texas to celebrate Thanksgiving in an RV park.
• by sasami (158671) on Wednesday November 22, 2006 @09:04PM (#16960024)
This is a fact that seems to escape most Americans, when it should be scaring them shitless! Why is there not much being made of the fact that 7 (or 8?) states amended their state constitutions to make same-sex marriage illegal? [snip] This legislation based on religion needs to be stopped! We are headed for a theocracy, and it frightens me.
I think you need to clarify some definitions.
During the last election, I read a bunch of comments on some CNN blog about "moral issues." Perhaps one out of three was a shocked or indignant complaint about "separation of church and state," typically along the lines of "get your morals/religion out of politics." Let's clarify these muddy notions, shall we?
Every issue is a moral issue.
If you think that it is unfair to deny marriage to same-sex couples, you have made a moral judgment of exactly the same category as those who oppose same-sex marriage. More generally: if you believe (as most of us do) that all people deserve equal treatment, regardless of race, gender, religion, etc., then you have taken a moral position. Further: if you believe that the US should intervene in other countries and cultures to defend these and other universal human rights, then you have taken a moral position.
In fact, any time you use the word "should" or any of its synonyms -- such as, "the government should permit abortions" -- then you have taken a moral position.
If you are offended that someone would guide their vote based on a moral position... then you have taken a moral position! Moral neutrality is a fashionable myth.
Now we can properly define the "separation of church and state," which is that the state does not have legal authority over the church. And the church has no legal authority over the state -- that is the definition of theocracy. The establishment clause [humanismbyjoe.com], in its original meaning, prohibits government dealings with religious organizations.
It does not mean that the government is supposed to make perfectly objective, neutral decisions that are completely severed from any religious viewpoint. This is impossible, because moral neutrality doesn't exist, remember? This was also the understanding of the founders; even Jefferson writes of "the moral principles on which the government is to be administered."
In other words, the government carries out the moral position of the voters, within the limits of the constitution -- which, among other things, partly guards against the tyranny of the majority.
By the way, this understanding is completely consistent with the Treaty of Tripoli, cited earlier. Remember that the other party in that treaty was a theocracy; the language should be interpreted in the context of assuring them that we are not a theocracy. This does not, in any way, diminish the role of the government as a moral agent. Jefferson, again, says: "Moral duties [are] as obligatory on nations as on individuals."
Dum de dum.
• by Anonymous Coward on Thursday November 23, 2006 @02:39AM (#16962088)
Wrong. When people bring up the subject of God, they don't mean merely that there is a god. Instead, they mean that there is their God, who expects certain things from us. (Otherwise, why would they even bother explaining their belief to others?) At the point that they bring up any specific god (Christian, Muslim, Hindu, Norse, whatever), there are thousands of ways to prove that that specific belief is a contradictory and stupid fairy tale.
• by Kadin2048 (468275) <[email protected]@net> on Thursday November 23, 2006 @02:53AM (#16962144) Homepage Journal
>> in the case of atheism, there is no religious incentive, these are humanitarian acts.
>It's called serving your own pride.
Welcome to the "Lincoln's Pigs" paradox. I'll give you the short version (the story is apocryphal, but the lesson is not). One day, future-President Lincoln was walking down the street around a small town. He walked past a farm, with a pig sty, and in the sty he spotted a small piglet that appeared to be drowning in the mud. Without heed to his expensive clothing, he climbed into the sty and pulled the piglet from the mud, saving it. On exiting the pen, someone exclaimed what a truly kind and generous person he was, to do such a selfless act. Quickly, he replied that his act was not selfless, but exactly the opposite: merely selfish. "Had I simply walked past and let the piglet drown, I wouldn't have gotten any sleep tonight, thinking about it. In order to make sure that I would, I had to save the pig. I did it purely for my own benefit."
The onlookers thought about this for a few moments, until someone said "But, Mr. Lincoln, that doesn't make sense. If you were as selfish a person as you say you are, then why would you care about the piglet at all, enough to have lost sleep over it, if you had just kept on walking?"
My point here, is that it doesn't really matter if the immediate motivation for a virtuous act is 'selfish,' such as alleviating one's own conscience, or stroking one's pride or ego. A truly selfish person wouldn't need to help others in order to have pride in themselves, or to sleep better at night -- they wouldn't care.
Real Users hate Real Programmers. |
global_01_local_0_shard_00000017_processed.jsonl/46661 | Forgot your password?
Comment: Re:Can I be on Slashdot... (Score 1) 109
by 2.7182 (#43178783) Attached to: Take Hands-Free 360 Degree Panoramic Photos With an iPhone (Video)
Why Hasn't 3D Taken Off For the Web? 320
Posted by samzenpus
from the adding-some-depth dept.
First time accepted submitter clockwise_music writes "With HTML5 we're closer to the point where a browser can do almost everything that a native app can do. The final frontier is 3D, but WebGL isn't even part of the HTML5 standard, Microsoft refuses to support it, Apple wants to push their native apps and it's not supported in the Android mobile browser. Flash used to be an option but Adobe have dropped mobile support. To reach most people you'd have to learn Javascript, WebGL and Three.js/Scene.js for Chrome/Firefox, then you'd have to learn Actionscript + Flash for the Microsofties, then learn Objective-C for the apple fanboys, then learn Java to write a native app for Android. When will 3D finally become available for all? Do you think it's inevitable or will it never see the light of day?"
Comment: Re:Curiosity cost $2B USD (Score 1) 71
by 2.7182 (#42471435) Attached to: Rare Water-Rich Mars Meteorite Discovered
But we could have given it to condensed matter physics research, which gets way less than NASA, or other branches of physics, such as particle physics, yet has numerous applications, while still contributing to our fundamental understanding of the world, through applications of quantum field theory and statistical mechanics.
"What I've done, of course, is total garbage." -- R. Willard, Pure Math 430a |
global_01_local_0_shard_00000017_processed.jsonl/46662 | Forgot your password?
+ - LHC, CERN has found the hugs boson-> 2
Submitted by Anonymous Coward
An anonymous reader writes "In a ground-breaking announcement issued today, CERN, the European Organization of Nuclear Research (which hosts the enormous and magnificent Large Hardon Collider) has announced the discovery of the hugs boson, an unexpected gauge boson, which was not predicted by the Standard Model. Noteworthy, the discovery was made by a high-school student during his scolarship. Due to his age, it is not clear whether he can be awarded the Nobel Prize. However, his teacher has generously agreed to be awarded in his name, in case of any problems."
Link to Original Source
+ - New Google Gmail Motion Interpretation->
Submitted by
PB8 writes "You were wondering what teh Google would offer for a suitable First of April technological innovation? Gmail Motion will utilize your webcam, read your body language and gestures interpreting them as Gmail commands through Google's spatial software. American Sign Language (ASL) is but one dialect Motion will understand. Apparently even sports referee gestures will be handled. Be sure to check out the product manager's video introducing it. This innovation will also available for Google Docs. Microsoft's Bing and MSN are again caught flatfooted against the jaugernaut of Google."
Link to Original Source
+ - iPad-Wielding Watson Outsmarts Fry On Qi-> 1
Submitted by Anonymous Coward
An anonymous reader writes "Geek god Stephen Fry beaten in a Turing-esque iPad-fuelled face-off with IBM’s new super-duper computer
Following its appeareance on US quiz show Jeopardy, IBM’s Watson computer has reportedly achieved the far harder task of being “quite interesting” in a forthcoming episode of Stephen Fry’s Qi series on BBC 2, according to rumours.
The IBM showpiece was an obvious contender for the “I” series of the cult show, due to shoot in May, and filming of its episode was brought forward to fit Watson’s schedule. During the show, the machine passed a version of the famous Turing test that measures not just artificial intelligence but also interestingness."
Link to Original Source
Comment: the real reason... platform holders. (Score 1) 389
by AndyboyH (#29228191) Attached to: Why Is It So Difficult To Allow Cross-Platform Play?
The implementation of cross platform wouldn't be out of the realms of possibility.
However, cross platform integration would definitely be a TRC/TCR/lotcheck breaker. Failing them means no platform holder approval, which means your game isn't coming out until you fix the non-compliance, and your development budget is pissed down the drain if you don't fix it.
Rare even managed it with a DS 360 implementation for Viva Pinata - however I think despite their 'late in the day' talk, that the real reason is it was shot down fairly quickly (I'd guess probably by Nintendo rather than MSFT...)
Comment: Re:What's up with England? (Score 4, Insightful) 287
by AndyboyH (#27132029) Attached to: UK Government Wants To Kill Net Neutrality In EU
We can't vote for the other team when the government won't call an election or referendum.
The opinion polls indicated (at least, last time I heard the stats) that the ruling party, Labour would be out in the next election, after some disastrous local elections (alas these local elections don't really have a great deal of influence on national politics) so they have nothing to win by calling for an election now - they'll just keep holding off as long as they can get away with it.
Promised referendums for EU membership and adoption of EU treaties regularly don't happen, simply because the government has it's own agenda, as you can see by the original topic.
Grassroots politics and small parties have no power in government to control, and even the typical sanity check of any new legislation having to go through the House of Lords has been neutered now that any law can be passed by the house of commons using the Parliament Act.
Another problem is that a lot of the UK populace really have no interest in politics - voter apathy is high, and polling booth turnout is low compared to a lot of places (iirc). This is pathetically the opposite of any major TV 'create a star/pop band/etc' phone vote, which receive millions of votes each week. They have no real understanding of the modern issues that are being raised in Parliament, and tend to vote based on how they were brought up (as far as I've witnessed) - so a person from working class background will vote Labour, and a middle-class background will vote Tory.
The general populace also doesn't understand the insidious nature of half the laws the government is passing, and whenever they're questioned by the vocal minority, the government uses the old 'think of the children' or 'be afraid of the terrorists' line and the law is passed anyway.
It really is making me totally sick of living in this country. The last time I posted my opinion on /. an ex-armed forces guy even agreed with me about leaving the country - and this was a person in the service of the UK who would have been expected to risk their life for their country!
Comment: Re:CCTV in schools (Score 1) 214
by AndyboyH (#27089875) Attached to: UK School Introduces Facial Recognition
At one of the schools my fiancee did supply work at, they had CCTV in the staff room. Not because they were worried about the staff's behavior - but because in the past few years several students had went into the staff room to assault the teachers.
The students didn't want to be there, and had very little intention of doing anything after leaving school except working the dole system for their own gain.
Comment: Re:unbelievable. uk is practically a rascist count (Score 1) 262
by AndyboyH (#27052153) Attached to: UK Government Wants To Bypass Data Protection Act
Does that reflect a diverse and meritocratic society?
No. In the day and age that the Magna Carta was created, did they have a diverse and Meritocratic society? No.
In modern day America, they still teach the constitution, despite the fact when it was freshly penned, black people were seen as nothing more than slaves. Does that make it any less relevant to teach? No.
Children should be educated about their freedoms. If that means teaching them modern law rather than the Magna Carta, so be it. Either way, they should be able to know enough to see what the rest of us do: the government is taking away their rights, slowly, steadily, and via the back door.
Comment: Re:unbelievable. uk is practically a fascist count (Score 1) 262
by AndyboyH (#27052027) Attached to: UK Government Wants To Bypass Data Protection Act
As I recall, the final vestiges of the original Magna Carta was also formally repealed in the 19th Century, as laws had obviously, evolved in time, to keep up with the evolution of the populace and the country's standing.
The original creators probably never envisaged that that document would last to such an extent and be enshrined in so many government's law, and judging the contents of a document that is (iirc) over 500 years old against the present day situation is bound to present such quandries.
My point remains though: regardless of the initial intent of the Magna Carta - the general populace of the UK is more interested in what's going on on TV than learning and understanding about their rights and freedoms.
by AndyboyH (#27048933) Attached to: UK Government Wants To Bypass Data Protection Act
I think this may come as a shock to US /. readers.
Unlike your schooling system, which (as I understand it) teaches the constitution, the amendments and so on - and engrains the whole spirit of 'the government should fear their people', the UK has none of this.
The Magna Carta is not taught as part of UK National Curriculum. (It may be taught in private schools, but as another poster observed - the upper class that can afford private schools are the ones enlightened enough to fight this... The ignorant masses can't afford those schools and so aren't.)
The youth of the UK have no education about the document that arguably started the concept of human rights and personal freedoms, the same document the government is wiping it's feet on on a practically daily basis.
I'm trying not to sound like some old bastard (I'm only 25) but their only interest is celebrity scandal and gossip. Their parents are much the same.
It's why I keep getting the feeling that I should leave the country and move elsewhere. What I want for me and my family (i.e. freedom, interest in the country and the community) is not what the general populace of the UK consider important (i.e. the next big brother/pop idol/dancing on ice winner).
Comment: Re:Ubuntu (Score 1) 466
by AndyboyH (#26979919) Attached to: Which Distro For an Eee PC?
I like the netbook remix, but I'm on a 701, so I guess it's better for those with smaller screen sizes?
Either way, I'd also recommend easy peasy - it's really an excellent distro, and far better than the default install.
I just hope they start rolling in some of the changes from intel's moblin work so the eee can boot quicker. That's my only annoyance with ubuntu so far...
Comment: Re:Early? (Score 4, Informative) 140
by AndyboyH (#26900293) Attached to: Early <em>Killzone 2</em> Reviews Looking Good
EDGE (a magazine which has been going rapidly downhill for the past few years)
Personally, I wouldn't agree with that. Edge provides solid reviews, and they actually use the full review spectrum (i.e. if a game's crap, it gets a 1 or 2, not a negative write up and a 6)
While Edge is sorely missing someone of the calibre of Mr Biffo in their columns section, and their gaming comic, Crashlander is trash, they're the only review that I (as a dev in the industry) actually want to read (although Eurogamer's reviews are starting to become equally as credible, although sometimes they're still a little too easily distracted)
Having read the review in question, I can also understand exactly why it is lower than the average. The game seems to be competant and pretty, but not anything 'great' in terms of gameplay or pushing the FPS genre forward. Which sounds like 7/10 to me.
Comment: Re:The Plan (Score 1) 317
by AndyboyH (#26872955) Attached to: Drug Giant Pledges Cheap Medicine For World's Poor
How about:
Step 1. Go to so-called "poor country."
Step 2. Buy 10,000 units of drug X at 25% of its cost in the US/Canada/Europe.
Step 3. Give away 5,000 units of drug X to the people that need them, for free.
Step 4. Sell 5,000 units of drug X in US/Canada/Europe at 50% of its normal Drug X cost (i.e. at twice the price you paid)
Step 5. ???
Step 6. No profit, just karma!
Comment: Re:They're already out in some places. (Score 1) 151
by AndyboyH (#26825385) Attached to: UK Cinemas Get 3D Projection Rollout
I suspect like most attendees, I was watching more for novelty than for content. A film about a gas mask wearing murderous miner doesn't exactly scream quality and production values.
But when the initial 'early adopter' phase passes - the falling attendances (and reduction on RoI) should mean that they'll need to either up the quality and produce movies that are both as sound in writing and acting as they are in visual trickery, or adopt a new trick.
|
global_01_local_0_shard_00000017_processed.jsonl/46663 | Forgot your password?
+ - Raytheon under cyber attack after missile sales to->
Submitted by Fippy Darkpaw
Fippy Darkpaw writes ""After Raytheon began selling missiles to Taiwan in 2006, the defense company's computer network came under a torrent of cyberattacks."
"We truly had the 'come to Jesus moment' five years ago because we decided ... to sell missiles to Taiwan," said Vincent Blake, head of cyber security at Raytheon U.K., during a panel session at the RSA security conference in London on Wednesday."
"For some reason, a country next door to Taiwan didn't really like that so they got very interested in our IPR [intellectual property rights]," he said. "We've had to very, very rapidly catch up with our own internal networks.""
Link to Original Source
The Military
+ - Virus infects U.S. military drones-> 1
Submitted by Fippy Darkpaw
Fippy Darkpaw writes ""A computer virus has reportedly infected Predator and Reaper drones deployed in Afghanistan and other war zones. According to Danger Room's Noah Shachtman, the virus — which was first detected two weeks ago — logs every keystroke as U.S.-based pilots remotely fly combat and surveillance missions overseas."
"Unsurprisingly, military sources claim the virus hasn't managed to compromise classified information. As such, the drones have yet to be grounded.""
Link to Original Source
Real Users hate Real Programmers. |
global_01_local_0_shard_00000017_processed.jsonl/46664 | Forgot your password?
User Journal
Journal: News for Nerds my ass
Journal by Fujisawa Sensei
Sorry fuckers, it doesn't get any nerdier that following up on a 1974 vintage space opera, that is still producing stuff. Why they fuck did these alleged nerds never mention Dai Yamato, Yamato Resurrection, or the live action schitt?
Real Users hate Real Programmers. |
global_01_local_0_shard_00000017_processed.jsonl/46665 | Forgot your password?
Comment: I'm not surprised, actually. (Score 1) 280
by Lord Crowface (#39806723) Attached to: Sci-Fi Publisher Tor Ditches DRM For E-Books
The success of companies like Baen in selling DRM-free e-books to the SF-reading public has shown that, at least for SF and Fantasy readers, not having DRM tends to drive sales rather than piracy. The fact that when the Harry Potter books were released as e-books it was in a DRM-free form probably didn't hurt either. The interesting thing to see will be whether the current DRM-free trend spreads to works outside the SF and Fantasy genres.
Comment: Re:Meanwhile... (Score 1) 628
by Lord Crowface (#39769541) Attached to: University of Florida Eliminates Computer Science Department
Seriously? While some of those degrees look more like they belong at a technical school or a community college, some look legit to me. Also, academic Religious Studies (as I assume the Religion department is) tend to look at religion in a more anthropological and sociological perspective than a "belief and preaching" perspective. Thus, the typical Religious Studies department would be a very bad fit for a seminary.
Comment: Doesn't UW have an early college program? (Score 1) 659
by Lord Crowface (#37670744) Attached to: How Do You Educate a Prodigy?
IIRC, UW Seattle actually has one of the best "early college" programs around. In essence they take something like twenty or so 12 and 13 year olds, put them through a year long academic "boot camp" and then allow those who get through (usually 18 or 19 out of the 20) to enroll as freshmen. Unlike places like MIT, which enroll the occasional prodigy but have no real special services for them, the UW program provides services and specialized advising to the kids throughout their entire time in school, while also encouraging them to take part in extracurricular activities and maintain a social life both with their age-peers and academic peers. The program seems to work, so could that be an option for a kid like that?
Comment: Re:Link to previous story (Score 3, Insightful) 37
by Lord Crowface (#37364402) Attached to: Security Researchers Crack APCO P25 Encryption
P25 wasn't originally designed with security in mind. It was designed as a standardized digital replacement for the mess of incompatible digital and analog trunking systems that had grown up in the 80s and 90s. In its basic, as-designed, unencrypted mode, it works well. It's only when local PDs and FDs decide to try and lock out scanner users (nominally to keep criminals from listening, but more often to keep away TV news crews) by means of ill-conceived encryption addons that things fall apart.
Comment: Re:Amazing technology for its time (Score 1) 106
by Lord Crowface (#37341410) Attached to: 1970s Polaroid SX-70 Cameras Make a Comeback
The SX-70 may have been easier to use than the older stuff, but the older stuff actually had a much better image quality. The black and white Polaroid peel-apart materials were really good stuff, for example: Ansel Adams swore by the stuff (it could give him an instant preview of the shot AND with a little bit of care, a good negative to bring back to the darkroom, fix and make traditional prints from) Their color materials were less "high end" than the black and white materials but they still did a much better job at accurate color reproduction than could ever be hoped for from the SX-70.
+ - SPAM: Crohn's Disease - Viagra May be Helpful
Submitted by caseykoch717juh7
caseykoch717juh7 writes "Ulcerative Colitis impacts just the significant intestine ( colon ). Crohn's disease is a bit far more typical in females versus males. It's typically a persistent disorder, typically named -inflammatory bowel illness. The problem will cause ulcers within the intestinal location and may be anywhere among the mouth area and rectum.
A group of researchers within the University College London, UK discovered out a brand new cause behind the inflammation in Crohn's. They tested inflammatory response to bacteria by injecting harmless Escherichia Coli beneath the skin to measure neighborhood inflammatory and blood flow alterations. Their investigation showed that the Crohn's individuals had very reduced blood flow generating lower quantities of neutrophils and inflammatory mediators. The problem with reduced blood flow, they suggest, may be treated with Sildenafil Citrate. As outlined by Anthony Segal, the key researcher, in Crohn's condition, a constitutionally weak immune response predisposes to accumulation of intestinal contents that breach the mucosal barrier of the bowel wall, causing granuloma formation and chronic inflammation.
The aspects that trigger Crohn's disease aren't totally understood. Nonetheless, the top functions of the illness would recommend an autoimmune dysfunction. Though further research are required, the leading present-day way of thinking is the fact that the microorganisms inside of the intestinal tract get inadequate access into the intestinal wall, which activates an immune response against bordering tissue. What may possibly lead to Crohn's condition is usually a fiercely argued and controversial topic. Several notions are plentiful about the sources of Crohn's illness. Some say it's a condition brought on by the body's quite very own defense mechanisms, even though some really feel it is a genetic matter. Others nonetheless, think that dietary practices and inadequate nourishment, actually, bring concerning the disease. Although, numerous far more point to bacteria and fungi as the trigger.
Crohn's condition brings about inflammation deep inside the lining from the intestinal tract. Some research have shown that present and past tobacco users have increased threat of building Crohn's condition than non-smokers do. Amongst the people with the disease, tobacco is linked to a increased rate of relapse, repeat surgical procedures, and immuno-suppressive therapy. Why cigarette smoking raises the possible threat of Crohn's condition is not recognized. Nevertheless, a lot of theorists are convinced that cigarettes may possibly decrease the intestine's defenses, decrease the circulation of blood to the intestines, or bring about the body's defense mechanism alterations that bring about inflammation.
You would like to know precisely what this crohn's disease organic remedy is appropriate? Well my buddy, should you do not know by now, it is the food that you just consume. Yes, that is appropriate! The food that you consume will probably be the variation in between going to the bathroom numerous occasions each day and being typical. The food that you eat will be the difference amongst that discomfort in your stomach and no pain in any way! In the event you are amongst this group it really is essential that you simply follow your doctor's guidance and stay away from those foods that could lead to those dreaded "flares".bowel cancer symptoms
bowel cancer symptoms"
Link to Original Source
+ - Pathscale Goes Open Source->
Submitted by Lord Crowface
Lord Crowface writes "Performance-hungry computer users have a new choice when compiling their weather simulations and raytracers at home: PathScale has just announced the open source release of their flagship Pathscale EKOPath 4 compiler suite. Any bets on how long it takes before some Gentoo fan tries to compile a kernel with this?"
Link to Original Source
+ - Chinese Spying Devices Installed on Hong Kong Cars-> 2
Submitted by
jjp9999 writes "Spying devices disguised as electronic border cards have been secretly installed on thousands of Hong Kong vehicles by Chinese authorities, according to a Hong Kong newspaper. A translation of the story states Chinese authorities have been installing spying devices on all dual-plate Chinese-Hong Kong vehicles for years, enabling a vast network of eavesdropping across the archipelago."
Link to Original Source
United States
+ - Hi-Tech Petition Drive Angers ACLU->
Submitted by PeeAitchPee
PeeAitchPee writes "Here in Maryland, we currently have a petition drive underway to force a referendum on a new law granting in-state college tuition rates to illegal immigrants. In a few short months, the use of automated, web-based signature form preparation has helped to obtain almost 80% of the required signatures. The ACLU last month sent a letter to the State Board of Elections warning that the petition drive's website, which links to official state voter records and allows petitions to be pre-populated with exact names and addresses, could open the door to fraud. Does this technology indeed encourage fraudulent signatures, or does it merely enable more people to directly participate in their government's processes?"
Link to Original Source
Comment: Low to None (Score 1) 674
by Lord Crowface (#28013279) Attached to: MS Word 2010 Takes On TeX
Even with better typography support, Word is still unsuitable for anything more complex than a letter to Grandma. That's because it still makes it harder to create structured documents than LaTeX does. If I'm writing a novel or a paper or something, the ability to simply say "\chapter{In Which I Make A Fool of Myself on Slashdot}" is MUCH easier than mucking with the mess that is Word's half-baked paragraph styles. The only thing Word does better than LaTeX is pictures.
Comment: Actually, I can see why they're doing this (Score 5, Informative) 226
by Lord Crowface (#26172983) Attached to: Toshiba To OEM Laptops With OpenSolaris
I'm typing this from OpenSolaris 2008.11 and I'm actually surprised how "desktop-friendly" Solaris has actually become. The default GNOME-based desktop is gorgeous and works well. Hardware support may not be all that broad, but when hardware is supported it's REALLY supported: even booting off the live CD, my Atheros wireless card, NVidia 3D card and crappy on-mobo sound were "auto-magically" detected and set up. Performance is also quite snappy, even on my aging Athlon XP 3000+ with a measly 1 GB of RAM. In short, OpenSolaris is more than up to the task of working on Toshiba's new laptops.
|
global_01_local_0_shard_00000017_processed.jsonl/46666 | Forgot your password?
Comment: Reason not to use mobiles for authentication. (Score 1) 97
by Mattpw (#37586308) Attached to: Security Vulnerabilities On HTC Android Devices
The security community needs to stop pushing mobile based token authentication. There is no reason why mobile OS's should get some kind of protected status vs their notebook counterparts. In my neck of the woods bad guys just forward all a victims calls for a few hrs anyway regardless of OS but clearly the trojan writers can make the usb jump to the users phone (EU charging mandate now) and carry on the same old tricks.
Comment: Re:No information about cracking the encryption (Score 1) 83
by Mattpw (#37581028) Attached to: The Inside Story of the Kelihos Takedown
Thanks so much for the reply, I am relatively clueless abou the nuts and bolts. So from what you are saying they are using a sync crypto scheme where the password can be intercepted? I read in a bot master Q&A they use AES however why couldnt they just switch to async RSA or some kind of PKI based system?
Comment: No information about cracking the encryption (Score 1) 83
by Mattpw (#37563856) Attached to: The Inside Story of the Kelihos Takedown
I see they made some tools to analyze the traffic but no information about actually cracking any encryption. Seems to me this was mostly about hijacking and sinkholing contact peer domain lists. Perhaps they left out pertinant bits for their own safety but from reading this the controllers could bypass the sinkhole if their backup list was implemented correctly.
Comment: Marketing departments with too much money (Score 1) 131
by Mattpw (#37437658) Attached to: The Saga of the Virtual Wallet
Ive been to several conferences where companies are rolling out this phone as a payment platforms.. Its a scam designed to get gulible journalists interested and either boost company exposure, dupe investors into buying shares or prove that X manager is being "innovative". Some are literally RFID credit card sim cards sticky taped onto the back of a mobile I kid you not. The reality is that everyone has a physical wallet/purse and that isnt going away any time soon. Also there are many things in that wallet which cannot be replaced by a mobile phone. Also are these the same journalists who write the "New Android Malware" articles which come out every week?
Comment: Flee to Singapore (Score 1) 235
by Mattpw (#37427464) Attached to: Startup Flees To Seattle Amid Amazon's Tax Fight
If they were really serious they would have fled to Singapore http://en.wikipedia.org/wiki/Income_tax_in_Singapore 0%-max 20% GST 7% corp taxes almost non existent. I laugh when I see the online "raise US taxes" brigade. And a commited well educated workforce. Whats more Singapore is booming like most of East Asia so the real market is just next door. The only thing is they dont have an open immigration door policy like America so getting in the front door could be hard but life is good and if you are in there is zero chance you will become a victim of crime.
Comment: Re:Time for 2FA authentication to be rolled out ov (Score 1) 642
by Mattpw (#36494344) Attached to: Bitcoin Price Crashes
Im not sure you have looked into https://www.shieldpass.com/ which is using the passwindow mutual authentication method not just OTP's used by the SecureID, I agree the RSA one time passwords are "over" being completely vulnerable to various MITM attacks including phishing etc as the codes contain no information to the user about what exactly it is being authenticated. This is the same problem with many tokens etc where a attacker can inject themselves at various point on the network, mobile or terminal itself with a trojan. *It should be noted however in RSA's defense that in this particular case you refer to it wasnt any of these usual methods they used to defeat the tokens but the fact they didnt airgap the machine holding the secret keys.
If you watch the demo video you can see that the transaction specific information ie could be something bitcoin specific is encoded into the challenge alongside the OTP so the user is informed as to what they are authenticating and the MITM fails. They cant switch challenges and they cant remove the transaction information from the challenge. Being a non humanly communicable key (the visual segmented pattern) they cant easily interrogate the user for key information either.
Its not perfect, for that we would need the server to be able to scan your soul however its cheap, convenient and more secure than the alternatives unless you have a better suggestion.
Comment: Time for 2FA authentication to be rolled out over (Score 1) 642
by Mattpw (#36493796) Attached to: Bitcoin Price Crashes
Time for 2FA authentication to be rolled out over bitcoin operators. The anonymity element makes it a huge juicy target for hackers, they need to start connecting it to something physically offline. I am working on a bitcoin wallet for shieldpass.com access tokens and then mutually authenticating each transaction.
Comment: Re:One-time pads bypassed by Zeus and Spyeye (Score 1) 284
by Mattpw (#36384616) Attached to: Court Rules Passwords+Secret Questions=Secure eBanking
The topic is online banking authentication so your points are mostly off topic. -It could easily be configured for use with email, ssh, imap, ldap, radius, etc -The amount of digits required from the user is configurable to any amount, it is a rolling password so while the demo requires 4 it could be 20 same goes for the amount of transaction information encoded into challenges. Even though its off topic il bite -I dont buy the argument that your phone screen is more personal than any other screen. If ninjas are in your house / office taking secret snapshots then the same kind of photographic attack or other cloning / switching of devices etc could be done against almost any device / terminal display / set of keys and you have bigger problems, that proximity attack argument could go on forever ending in a rubber hose. For what its worth the visual key patterns can be obfuscated with transflective laminates etc very cheaply or for a few bucks extra could be electrochromatic like any device but the cost justification just isnt there when a piece of plastic only costs a few cents and it is designed for online authentication. Personal attacks are beyond the scope and frankly with the developments in remote electronic scanning I feel more secure about these non electronic cards than my RFID cards. For online authentication it solves the MITM attack problem and does it extremely cheaply.
Comment: One-time pads bypassed by Zeus and Spyeye (Score 2) 284
by Mattpw (#36384106) Attached to: Court Rules Passwords+Secret Questions=Secure eBanking
Banks resist the idea because all the major trojans wreaking havoc have MITM /MITB capabilities to bypass the tokens and mobile sms in one way or another as well as cost issues. The 2 European banks in the following article were using transaction signing tokens http://slashdot.org/story/10/07/25/1954216/Online-Banking-Trojan-Stole-Money-From-Belgians and mobile sms trojans have been around for awhile now http://securityblog.s21sec.com/2010/09/zeus-mitmo-man-in-mobile-i.html You might want to investigate https://www.shieldpass.com/ online authentication cards which are cheap and can do mutual authentication passively. For example specific transaction information can be included in the challenges to stop MITM and the process is passive or visual so the trojans or phishers cant walk a target through a transaction as they did with the first link.
Comment: Many of the 2FA ideas proposed on here are broken (Score 1) 284
by Mattpw (#36384038) Attached to: Court Rules Passwords+Secret Questions=Secure eBanking
Many of the 2FA ideas put forward on here are broken Most major trojans have MITM or MITB capabilities to bypass many of the pure OTP type methods put forward here, including the manual transaction signing tokens. http://slashdot.org/story/10/07/25/1954216/Online-Banking-Trojan-Stole-Money-From-Belgians Mobile authentication should be considered broken since there are many more ways past it and many newer trojans come with mobile plugins now too. http://securityblog.s21sec.com/2010/09/zeus-mitmo-man-in-mobile-i.html I use https://www.shieldpass.com/ authentication cards which have the ability to do mutual authentication passively and not be vulnerable to MITM. The plastic cards themselves cost less than a few cents to make so theres no argument why America shouldnt be using them.
Comment: Re:Here we go (Score 1) 223
by Mattpw (#36346540) Attached to: Ask Slashdot: Is SHA-512 the Way To Go?
While I agree two factor is the way to go especially for the poster whos primary goal which seems to have been missed is securing a website I couldnt see anything great/innovative on the Arcot website. Primarily everything they have put forward seems to be vulnerable to localized infection (ie a trojan on the local device performing MITM) and I am particularly concerned with their pushing mobile based authentication which I can tell you most Asian countries are bailing out of there are so many different attack methods. The key to the authentication problem is mutual authentication otherwise you are only protecting against keylogging which is a very 80's attack unfortunately there are very few 2FAs which can do it securely.
Comment: Worry more about user authentication (Score 1) 223
by Mattpw (#36345904) Attached to: Ask Slashdot: Is SHA-512 the Way To Go?
I realise people like to talk about crypto but user authentication is much more pressing security problem and the weak link in all the recent attacks. Im not reading about X breaking X crypto instead I hear static passwords being gotten one way or another and all the crypto being bypassed. A friendly suggestion for your secure site would be to use 2FA dynamic passwords in as many places as you can preferably with mutual authentication capabilities to prevent MITM, further suggestions would be using Yubikeys or ShieldPass cards and I believe Verisign has a service but the former are much easier to implement and relatively cheap.
Comment: Re:Passwords (Score 1) 409
by Mattpw (#35154926) Attached to: Are You Sure SHA-1+Salt Is Enough For Passwords?
You are correct about the security uselessness of the OTP devices however I would suggest you checkout my passwindow 2FA method which isnt vulnerable to phishing / MITM / MITB etc because it can do passive mutual authentication and include transaction information in the window. There are details on the security page. Its also just a cheap piece of plastic which fits in your wallet and is easy to distribute by letter.
Real Users hate Real Programmers. |
global_01_local_0_shard_00000017_processed.jsonl/46668 | Forgot your password?
Sleep Mailing 195
Posted by samzenpus
from the better-than-drunk-dialing dept.
Doctors have reported the first case of someone using the internet while asleep, when a sleeping woman sent emails to people asking them over for drinks and caviar. The 44-year-old woman found out what she had done after a would be guest phoned her about it the next day. While asleep the woman turned on her computer, logged on by typing her username and password then composed and sent three emails. Each mail was in a random mix of upper and lower cases, unformatted and written in strange language. One read: "Come tomorrow and sort this hell hole out. Dinner and drinks, 4.pm,. Bring wine and caviar only." Another said simply, "What the......." If I had known that researchers were interested in unformatted, rambling email I would have let them read my inbox. They could start a whole new school of medicine.
Microsoft Exploit Predictions Right 40% of Time 182
Posted by timothy
from the statistics-94pct-nonsense dept.
CWmike writes "Microsoft today called its first month of predicting whether hackers will create exploit code for its bugs a success — even though the company got its forecast right just 40% of the time for October. 'I think we did really well,' said Mike Reavey, group manager at the Microsoft Security Research Center (MSRC), when asked for a postmortem evaluation of the first cycle of the team's Exploitability Index. 'Four of the [nine] issues that we said where consistent exploit code was likely did have exploit code appear over the first two weeks. And another key was that in no case did we rate something too low.' Microsoft's Exploitability Index was introduced last month."
+ - Free IMAP on GMAIL?->
Submitted by
Demaratus writes "It looks like Google is rolling out free IMAP service on select GMAIL accounts. One one of my gmail accounts, IMAP is now available in addition to POP in the settings for the account. I checked several of my other accounts, but it appears that only one of them has this new feature available. I can't find any information on this anywhere else after a few brief search engine queries, so I figured I'd share this great news with other \.ers. How long until Google rolls out free IMAP to all Gmail accounts?"
Link to Original Source
+ - Would you fight your own software patent?
Submitted by ingo23
ingo23 writes "Everybody knows that the Slashdot crowd just loves the software patents. If not the patents, what would you rant about? Now imagine this — at work you are developing a piece of some cool software. And one day your employer decides to file a patent for it naming you as an inventor. Would you gladly accept the honor or would you get on a soap box and stir up a little revolt against software patents?"
+ - Thumbprint required to buy a car in Southern CA
Submitted by
saccade.com writes "Here's an insidious use of biometrics: A southern California car dealership actually refuses to sell you a car unless you submit your thumbprint. From the posting:
The dealership claimed that the fingerprinting was for my protection. To make sure I'm really who I say I am, and haven't just stolen someone's social security number.
But I don't get it. How does that work? No one's checking to make sure the fingerprint I leave matches the one on file with the DMV. There's no forensics expert on staff. And I don't have data on this but I feel pretty certain that any car thief worth his salt probably already has more than one set of prints on file.
Dollar Rent-A-Car tried fingerprinting their customers for a while. They gave up after realizing that it had no effect on fraud or theft. Simply, treating your customers like felons is bad for business.
Real Users hate Real Programmers. |
global_01_local_0_shard_00000017_processed.jsonl/46671 | Forgot your password?
Comment: Re:Try this instead. (Score 1) 366
by kklein (#33821724) Attached to: Simple Virus For Teaching?
I haven't seen mod points in a very long time (part of why I stopped reading Slashdot almost entirely, if anyone cares), but as a teacher (linguistics, actually), this is how you handle something. It is cute, it is instructive, and it is likely to stay in their memories for a long time.
If you're not teaching, you should be (although it's hard to find well-paying work--but if you do, you hang on like grim death).
Comment: Re:Yes. (Score 1) 319
by kklein (#33107058) Attached to: Should Professors Be Required To Teach With Tech?
I teach foreign language at a decent university. My need for Powerpoint is minimal, for the same reason. Math and language are things that people need to grapple with slowly and kind of figure out on their own. They are basically new ways of thinking about the world, not lists to be memorized. As such, it's much more important that the teaching be interactive and collaborative.
With a traditional board, if a new word comes up that people don't know, I can put it up on the board, break it into its morphemes, elicit derivations/word family members... All that cannot be done with PPT. Also, teaching 4 sections of the same course (I don't--the most I've ever gotten was 2, and those were halcyon days of minimal prep...) means 4 very different boards, based on what the class needs or is interested in. They already have textbooks and dictionaries. Class time is there to add interactivity and the human component that helps us monkeys learn.
So to address the actual question posed in the title: "Hell no teachers shouldn't be required to use technology in the classroom. It's not necessary or even helpful in many cases."
I use a lot of the modules of Moodle, which I run on my own server. If I didn't have that, class business would be more of a hassle. But in class, I see very little use for most technology invented in the last 100 years.
I like, but kinda suck at, math. I can't imagine learning anything in a math class based on PPT. I want to do things step-by-step with the teacher, by hand, on paper. I also benefit from explaining/having things explained in student groups. It sounds like I'd like your math courses.
Comment: Re:Asimov's Profession (Score 4, Insightful) 133
by kklein (#32999618) Attached to: Brain Scans May Help Guide Career Choice
I'm a prof who has worked in both the US and Japanese education systems (Japan longer). As such, I've thought a lot about this.
The problem with your idea is right there in your last line, even though you didn't mean it to be:
Not everyone will become or even wants to be an astronaut and are perfectly happy as a mechanic or something.
The implication is that the former is a "higher" profession than the latter. Now, it is much harder to be qualified for, and therefore worth more money, but there's nothing low about being "a mechanic or something." In fact, if you find a good mechanic--someone who is good at understanding highly complex systems and who has the experience necessary to quickly diagnose problems in those dizzyingly complex systems--you pay through the nose for him, and are happy to do it. He probably still doesn't make that much, though.
This is because we have something wrong with our (US) culture. We don't seem to understand the concept of middle class. We don't seem to understand that the vast majority of people are basically as smart as everyone else, regardless of education level. We also don't want to pay for basic services, so those people have to compete for cheaper and cheaper prices. It also means that we get what we pay for.
I had a German hair stylist in the US for awhile. I loved her to death. She wasn't much for "chairside manners" (she was curt and pushy, without meaning to offend), but she was unbelievable. She could make anyone's hair do anything, and got most of her clientele through her ability to look at totally perm-or-color-ravaged hair, and fix it. I started asking how she did it. She said, "American stylists are terrible. They study for 6 months and wonder why they can't do anything right. I have a four-year degree." "A four-year degree to cut hair?" "Yes, but also coloring. We have to study organic chemistry for that and pass tests on diagnosing problems and coming up with solutions on different kinds of hair. The races have different hair, you see. What I'd use on an Asian wouldn't be what I used on you, for example."
Germany made a choice that vocations were still really important. And they are. But we don't see that in the US.
Japan is not as hardcore about this as Germany, but it still trains people much longer for vocations than we do in the US. Prices are higher, but so is quality, and so is the mode standard of living. I don't mind paying more to have my car fixed if I know that that guy's kids can go to college if they want, because he's very comfortably in middle class.
Our over-emphasis on the individual in the US hurts us in many, many ways. We idolize the rich and blame poor individuals for not working hard enough or something. We impose a moral hierarchy on the socioeconomic structure, and it is killing us. A large middle class means political and economic stability, lower crime, higher standard of living, longer lifespan... Everything great about Japan, I think, is due to their commitment to taking care of and respecting everyone (of course there are exceptions--nowhere is perfect). In a very real sense, the US's obsession with superstars, captains of industry, and themselves as individuals, I think, is the reason that We Can't Have Nice Things.
Comment: Re:It's for 'Statistical' computing (Score 1) 91
by kklein (#32961454) Attached to: R In a Nutshell
R is growing faster and is used much more by serious statisticians to implement new ideas.
I definitely agree with you there. It's easy for them to get their ideas into motion with R, since it's open.
That doesn't necessarily make it better for most people, though. That makes it better for statisticians. Most users of statistics don't need to be on the cutting-edge. In fact, they might need to lag a bit, because peer-reviewers may not accept your paper if they don't actually understand it. I work a lot with IRT, and when I write a paper, I basically have a big chunk of boilerplate I paste in to explain what it is and how the various models work. My research is only as good as my ability to explain it, and if it swerves off-course and becomes a statistics lesson, that just isn't good.
I use SPSS because that's what most people in my field use.
by kklein (#32961426) Attached to: R In a Nutshell
I use R from time to time. It's great for banging out a quick-and-dirty graph or something. It's so straightforward that if you really know exactly what it is you want to do, it's really fast to do it in R.
I don't think I'll be using it that much now that I was able to get SPSS with the Advanced Stats pack onto my research budget. I'd been using a cracked copy of 11.5 for years, and that's why I had migrated to R. Now that I have SPSS, and didn't have to pay for it... I guess I don't really see the point.
Don't get me wrong. R is unbelievably awesome for free, and isn't even that hard to get the hang of. But when someone else is picking up the tab, SPSS is also free, is easy to use, has very nice documentation, and is supported by all sorts of other software tools I use. Out of all the stuff I use, only LimeSurvey (also FOSS) explicitly supports kicking out files formatted nicely for R, whereas everything else (a bunch of IRT software--I'm a tester--people not programs) just supports .xls and .sav for SPSS...
R is great. Great. But SPSS (I just realized that it's been called PASW for a couple years, but no one uses that name--it's unpronounceable) is the whole package. Overpriced, definitely, but most of its users don't actually pay for it.
Comment: Re:Fix the camera and the targeting system !!!! (Score 1) 100
by kklein (#32884740) Attached to: Big Changes Planned For <em>The Force Unleashed 2</em>
I quit playing it about an hour in because of that and the quicktime events. Oh, and how duels or whatever would suddenly change your perspective to 100 feet away.
Blech. That was a terrible game. Terrible. I was so excited about it, but it was just awful.
Comment: Re:Wrong way to go about it (Score 1) 162
by kklein (#32807926) Attached to: Finding a Research Mentor?
I haven't seen mod points in over a year, otherwise you'd have some right now.
WTF? Is he applying to PhD programs just out of undergrad? I kinda just picked a place for my master's, but I wish I'd known more about who was doing what; I would have gone somewhere else.
Picking PhD programs to apply to (coming up) isn't hard. It's more a case of narrowing them down, since they're a lot of work. By the time you're looking at PhDs, you should probably know some of the people you're trying to study under. At the very least, you should already know their work, and for that reason want to study under them.
Also... Who the hell says "study mentor?" Your advisor/supervisor isn't really your mentor. He's not there to lead you to secret knowledge. He's there to put hoops in front of you to jump and to tell you when your work isn't up to snuff. A PhD is almost entirely done on your own!
Comment: Re:And mass unjustified mass hysteria spreads... (Score 4, Insightful) 446
by kklein (#32806592) Attached to: Proximity Sensor Presents Latest iPhone 4 Issue
Its only Apple who thinks that one product can be perfect for everyone, from the serious developer and power user to Joe Six-Pack.
See, I always read this on Slashdot, and then I read "I love my iPhone" everywhere else. I don't think Apple ever said they were to be all things to all people. They try to be the important things to most people. And that's how they succeed. They find out what people want to do, focus on those features and make them basically perfect and intuitive, and then disable anything that doesn't work right enough of the time or which gets in the way of the important things. I was sick of buying phones with feature lists the length of my arm--none of which worked reliably enough for me to ever really mess with them. With the iPhone, I actually use those things. I use them because they work. Every time.
Finally, just to put this out there again: I live in Japan; I have had none of the signal/net-speed issues I hear about all over the internet. None. None. Never once a dropped call. It's not the phone; it's the network.
Comment: Re:Formula change (Score 1) 534
by kklein (#32780880) Attached to: Apple To Issue a 'Fix' For iPhone 4 Reception Perception
Dear Apple, please note that shifting the blame to your crappy, and exclusive, network partner won't work.
I don't have an iPhone4 yet, but when I get it, I don't anticipate any signal problems whatsoever. In fact, I've never had signal problems as long as I've had my iPhone. I've never had a dropped call. Never. None of these problems I read about all the time on the intarblogs.
I think it's because I live in Japan and have a network that was set up with the intention of people actually using it.
I just realized that I lied in the second paragraph. I have had major reception issues--when visiting my parents in the US.
So sorry to pee on the anti-Apple parade, but it seems totally clear to me that AT&T is to blame.
Comment: Just to be clear... (Score 1) 279
by kklein (#32688376) Attached to: Best Way To Publish an "Indie" Research Paper?
Call me a nerd if you like, but I need to ask this:
Do you know how to write? Writing a journal article isn't just "Check out this cool thing I worked on." You need to do a review of lit., provide a rationale for your work (i.e. show the gap in the research or failings of other algorithms which make your work necessary/useful), explain your work, show your results, and conclude with some manner of discussion of further work to be completed, holes in your design, implications, etc. Like 40 pages, double-spaced.
It's not something you just whip out when you're done. It sounds to me like you've looked at some other people's work and jumped straight to fiddling. This is fine, and honestly, most research at least starts that way. The paper is where you are going to legitimatize it by showing that you did your homework and you're not just some guy who did some fiddling--even if that's what you are!
So, on the one hand, there's absolutely nothing stopping you from getting into Science, except for maybe a lack of understanding of the genre and the expectations of the reviewers. All peer-reviewed journals do blind reviews, so the fact that you're just some dude will just knock their socks on their asses if they accept your paper.
In short, if you've never done this kind of writing before, you'll need someone to help you get the hang of it and proof it for you.
Just a word of warning, though: Since you didn't already start with a review of lit, and went straight for the fun stuff, you might end up finding that your idea isn't good or necessary when you're doing the research you were supposed to do at the beginning (probably before the project got so big and complex that you thought, "I wonder if there's a paper in this?"). That's a bummer. It's happened to me. Just don't be too crestfallen if you find something like that.
Good luck and I hope you pull it off!
Comment: Re:Internet hypochondria is already a phenomenon (Score 1) 245
by kklein (#32598156) Attached to: X Prize Foundation Wants AI Physician On Every Smartphone
That might be the difference between nerds and normals. When I do medical research, mostly I figure out what it's not. If it's still bugging me, I go in and say, "Here are the symptoms, but I read that it could be something or could be nothing, so I decided to get it checked out." When he says "it's nothing," I say, "Thanks! I feel better now."
I think part of the problem is that people often have a hard time fathoming how much more someone can know about something than they. I'm a college prof, so I think I've gotten used to feeling stupid--I know a lot more about my field than Joe Sixpack, but I can give you a 2-page list of people I know or know of who know more than me. And then there are the profs in other departments. Even the least-experienced ones know more about their fields than I ever, ever will.
I respect experts. I understand that mistakes happen, but they have a much better chance of knowing that I do.
I once had an anxiety attack, but I didn't know why. I was worried that there was something wrong with my heart, since there are heart problems in my family. After being checked out, my doctor very carefully and with a clear sense of dread, said, "I think the problem might have been... Mental." He watched my face for my reaction. I said, "So it's all in my head?" "I think so." "Thank god. I can control that."
We both felt relieved. Me, because my heart was fine. Him, because I didn't take offense at being told that I had just freaked out.
Comment: Readability (Score 1) 210
by kklein (#32574852) Attached to: The Safari Reader Arms Race
I've been using Readability for over a year in Firefox to do the same thing. Any long reading that I have to do online gets the Readability treatment. This project has been around for a long time, and no one complained about it "trying to force an e-book style interface on the web." They just said it made things easier to read.
I don't see how this is an "arms race." Most web pages are unreadable. That is the fault of the designers. The text is too small for a high-resolution display, and it is too cluttered. There are sites out there that have ads and remain readable, but they are a tiny minority.
Bravo to Apple for making the web something you can read!
Real Users hate Real Programmers. |
global_01_local_0_shard_00000017_processed.jsonl/46677 | A picture’s worth a 1,000 words. Okemo sent us two pictures, so they must be worth 2,000 words.
One picture is of its superpipe being built on December 29, and the other of it done. With the opening, Okemo is one of the first resorts on the East Coast to open a superpipe. Way to go. |
global_01_local_0_shard_00000017_processed.jsonl/46705 | Take the 2-minute tour ×
Stackusers.com has been down for a few days. Is it down for good?
(Hope this is an appropriate question... seems OK per FAQ).
share|improve this question
I don't know whether it is really gone or just down, but I can say it's also down for me. – PeeHaa Apr 5 '12 at 17:31
Still down as of Nov 5th... – James Fleming Nov 6 '12 at 2:58
~bump~ still down 21 April 2013.... guess its gone for good. – Richard Le Mesurier Apr 21 '13 at 11:25
add comment
You must log in to answer this question.
Browse other questions tagged . |
global_01_local_0_shard_00000017_processed.jsonl/46706 | Take the 2-minute tour ×
I have a shell script, which I launch several times during work everyday. I do this by launching terminal, and launching the script from within. However, I would like to be able to launch it (from within a terminal) with a global OSX keyboard shortcut (Cmd+Shift+R say).
There are quite a few applications which work in this manner already (for eg. EverNote, RemindMeLater, even the default Cmd-Space which brings up the search utility) and hence, I am guessing this should be at least theoretically possible.
Could someone please tell me if and how this can be done?
share|improve this question
add comment
1 Answer
up vote 1 down vote accepted
Instead of using a global shortcut key, maybe try creating an applescript that runs the shell script? So just open at AppleScript Editor, and enter something like this.
do shell script "//Your script";
Then save it as an application in the format drop down.
After that, you can run the script just by opening up the application with something like spotlight.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/46707 | Take the 2-minute tour ×
I am building a WCF service that will expose several operations, it will run in IIS because it needs HTTPS endpoints. Most of the operations will perform within seconds or less; however, one or two of these operations will take between 5-90 minutes.
The primary consumer of this service will be an ASP.NET MVC application; what is the correct way to do handle this?
Should I jackup the timeout and do some ajax calls? Should I add a table to my database, and have the long running operations update this database, and have the web interface poll this table every minute? I'm not sure what (if there is) the generally accepted best practice for this.
share|improve this question
If the long running operations aren't transferring data, then maybe you should break this up into an async processor. So the client would request that the job be started, then check back at regular intervals to get either the response or a message saying check back later. – Noah Jun 18 '12 at 17:25
@Noah, the long running operations are not returning much data, until they are complete, where they return about a 50kb message. – Nate Jun 18 '12 at 18:20
You definitely shouldn't keep an http connection open for that long if your not transferring data, so it's probably best to break it up. @Jim provides a decent example. – Noah Jun 18 '12 at 18:24
add comment
2 Answers
up vote 1 down vote accepted
I wrote something similar for my senior project, basically a job scheduling framework.
1. I chose to go down the path of storing the "status" of the "job" in the database.
2. I wrote a manager windows service that implemented a WCF client (proxy)
3. I wrote a WCF Service that implemented my "worker host".
The manager service would read the queue from the database, and hand out work to all of my "worker hosts". The reason I had windows service perform this task as opposed to just having the UI talk directly to the worker host, was because it gave an extra level of control over the whole process.
I didn't like the idea of having "the network cable unplugged" from my worker host, and never getting a status update again from this specific job. So, the windows service gives me the ability to constantly monitor the progress of the WCF worker host, and if a connection error ever occurs (or something else unexpected), I can update the status to failed. Thus, no orphaned jobs.
share|improve this answer
Is there a reason you rolled your own manager instead of using MSMQ? – Nate Jun 18 '12 at 18:32
Not particularly. I've never used MSMQ, and as I said this was just a project for school/COOP. I'm sure there are plenty of ways of improving upon the design, but it was simple enough for what I needed. The main purpose of the application was to get a handle on WCF, and although MSMQ would have been useful it wasn't the focus. – Jim Jun 18 '12 at 18:44
In your design, do each of your "worker hosts" query the manager looking for work? Or does the manager call each work when it needs to? – Nate Jun 18 '12 at 18:49
The "worker hosts" are just dumb workers. They have a set of implementations that get called depending on what service call they receive. They do not initiate any communication with anything else. They only respond with status updates when the manager polls for an update, etc... – Jim Jun 18 '12 at 20:14
add comment
Take a look at this
WCF Long Running Operations There could be other options but they are nearly the same. You can also come up with some push notifications (I assume no data is returned) as one int the following link
WCF Push
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/46708 | Take the 2-minute tour ×
I am using express. I knew there were res.send res.render res.redirect methods.
but is there a way to open a new window?
thanks all.
share|improve this question
I don't understand question exactly? quackit.com/html/codes/html_open_link_in_new_window.cfm? – Alfred Jun 26 '12 at 8:50
add comment
1 Answer
This would need to happen on the client side via
window.open("link", "_blank")
share|improve this answer
it will show can not get 'link' – Job Smith Jun 25 '12 at 3:29
you need to write an actual link there like http://google.com – matt3141 Jun 25 '12 at 3:32
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/46709 | Take the 2-minute tour ×
In R, is it possible to assign names to components of a vector without first assigning that vector to a variable name? The normal way is obviously:
z <- 1:3
names(z) <- c("a", "b", "c") #normal way
names(1:3) <- c("a", "b", "c") #throws an error
The second way throws "Error in names(1:3) <- c("a", "b", "c") : target of assignment expands to non-language object"
According to the doc, the expression is evaluated as
z <- "names<-"(z,
"[<-"(names(z), 3, "c2"))’.
So no shock it doesn't work, I'm just wondering if there's a work around.
Ideally, it'd be nice to have something like:
names(z <- 1:3) <- c("a", "b", "c")
> z
a b c
1 2 3
Just seems like a waste of space to put that on two different lines.
share|improve this question
add comment
1 Answer
up vote 8 down vote accepted
How about using setNames(), which seems even cleaner/clearer than your suggested ideal?
z <- setNames(1:3, c("a", "b", "c"))
# z
# a b c
# 1 2 3
share|improve this answer
+1 Love setNames – Joshua Ulrich Aug 2 '12 at 19:53
exactly what I was looking for, thanks! – zzk Aug 2 '12 at 20:08
just checked, apparently set names is just a function wrapper for the 'normal way'. Still a space saver, but its not doing anything fancy. – zzk Aug 2 '12 at 20:10
@zzk -- Yeah, I saw that too (and also noticed that it's in the stats package, oddly enough). Clearly someone else tired of not having it available in base R, and wrote it up as a little convenience function. – Josh O'Brien Aug 2 '12 at 20:18
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/46710 | Take the 2-minute tour ×
here is mobile.js
//= require jquery
//= require iui
//= require faye-updater
//= require anonymous-chat
//= require anonymous-vote
//= require_self
here is how i include scripts
<%= content_for :head do %>
<%= javascript_include_tag "#{Settings.faye.address}/client.js" %>
<%= javascript_include_tag "mobile" %>
<% end %>
and what i get after recompiling assets: mobile....js starts from
function launch_faye_updater....
this is function from the faye-updater.js and it must be included after jquery and iui. And it does not work because of wrong inclusion order. How to make Rails include assets in right order ?
UPD: This is in production mode Rails 3.2.8
share|improve this question
What version of Rails are you using? It looks like you're doing the right thing to compile the assets in the right order. Have you added mobile.js to be compiled in the environments configuration? Set the config value config.assets.precompile += %w( mobile.js ) – joonty Nov 22 '12 at 9:29
yes, i have added just this config.assets.precompile << /(^[^_\/]|\/[^_])[^\/]*$/ to precompile everything i can, and rails would throw an error if i would not precompile mobile.js. Rails version is 3.2.8 – s9gf4ult Nov 22 '12 at 9:38
That doesn't seem right - you only need to precompile the top level assets, ones that aren't included by other master assets. Try just adding mobile.js. – joonty Nov 22 '12 at 10:19
I know this is not right, but what the difference if mobile.js precompiles too ? And how can it affect to inclusion order ? – s9gf4ult Nov 22 '12 at 10:30
Since mobile.js includes other js files, precompiling that will (or should) combine jquery, iui, faye-updater, anonymous-chat, anonymous-vote, then itself. Adding that regex to the precompile list would compile every file, meaning that some of those javascripts are compiled twice. That could be causing the effect that you're seeing with the assets. – joonty Nov 22 '12 at 10:35
add comment
2 Answers
Where is launch_faye_updater being called from?
I'm guessing you can fix this problem by moving this line:
Down below the other include, like so:
<%= javascript_include_tag "mobile" %>
(You may also want to consider creating a new compiled JS file with these two files in it.)
share|improve this answer
launch_faye_updater is from faye-updater and #{Settings.faye.address}/client.js must be included before faye-updater – s9gf4ult Nov 22 '12 at 9:36
What makes you say it doesn't work? Are you getting a JavaScript error when you try to load the page? Could you post that error? (@s9gf4ult) – drewinglis Nov 22 '12 at 9:45
Erros is: "Uncaught ReferenceError: $ is not defined" as expected, because of jquery is not included when launch_faye_updater is called first. – s9gf4ult Nov 22 '12 at 9:50
Is that error coming from the client.js file, or the mobile.js file? – drewinglis Nov 22 '12 at 9:53
it comes from mobile.js – s9gf4ult Nov 22 '12 at 10:05
add comment
I had the same problem with my jquery, bootstrap and application dependencies. You can deliver all your JS modules in preferred order in Rails 3.1+. In your example you want to have jquery.js included before mobile.js.
First, remove jquery from your mobile.js file.
Then you need to add following line of code to your application.rb:
config.assets.precompile += ['mobile.js', 'jquery.js', 'jquery_ujs.js']
At this moment you have everything precompiled and ready to use. Your mobile.js doesn't include jquery, so you can include it in your preferred order:
<%= javascript_include_tag "jquery" %>
<%= javascript_include_tag "mobile" %>
And that's it!
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/46711 | Take the 2-minute tour ×
enter image description here
When I start my application, my computer loads it 15 seconds. It loads a whole bunch of grids and things that I want to load dynamically.
What do I have to do if I want for those grids to be loaded "on demand"? Do I have to load controllers dynamically or just the grids? And how?
Thank you. :)
share|improve this question
add comment
2 Answers
up vote 1 down vote accepted
That depends on your application structure and the configuration of the stores. Following are some tweaks that you may apply:
• remove autoLoad from the stores and keep in mind that you now need to care about loading if you don't apply paging or filtering. Why? Any store that you place in your controller store array will be instantiated as soon as the controller get instantiated, which is great but cause the load of the store if autoLoad is true. Based on the implementation the store will get loaded again for example a pagingToolbar will defiantly again fire a load so the first could be spared.
• apply a sort of lazy controller loading. Meaning; only apply that controllers into the application controller array that you need right at the start. Load any other controller only when you need it by calling this.application.getController('ControllerName') within a controller or directly on the application controller. This will give you the conrtoller instance and init the controller (this is quite new, so I dunno since when this happens automatically. I check 4.1.3). Anyway, the lazy controller initialization will defer all Ext.Loader request for each of these controllers till the controller get initialized, so this will help you most I guess.
share|improve this answer
I'll try it. Thank you. – user1509885 Dec 3 '12 at 6:58
add comment
It looks to me as if those scripts are being loaded by the ExtJS loader itself, I'd imagine it's loading what it thinks it needs due to the structure of the page based on the settings provided.
Have a read over the loader docs to get a feel for what it's doing and why:
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/46712 | Take the 2-minute tour ×
Is there a more succinct/correct/pythonic way to do the following:
url = ""
re_token = re.compile("<[^>]*authenticity_token[^>]*value=\"([^\"]*)")
for line in urllib2.urlopen(url):
if re_token.match(line):
token = re_token.findall(line)[0]
I want to get the value of the input tag named "authenticity_token" from an HTML page:
<input name="authenticity_token" type="hidden" value="WTumSWohmrxcoiDtgpPRcxUMh/D9m7O7T6HOhWH+Yw4=" />
share|improve this question
The proper way to do this is to use an HTML parser like BeautifulSoup: crummy.com/software/BeautifulSoup. See here for the reason: stackoverflow.com/questions/701166/… – Ayman Hourieh Nov 8 '09 at 23:10
regexes shouldn't be used with html/XML -- too many ways for things to break. Look at the BeautiflSoup or one of the html parser modules. – Brian C. Lane Nov 8 '09 at 23:11
You need to use a parser like BeautifulSoup. What if you use a regex and a malicious user works out a way to put some text that matches the regex somewhere on the page eg. in a comment or something? You end up thinking that that is the authenticity_token, which is asking for trouble. – gnibbler Nov 9 '09 at 0:31
add comment
4 Answers
up vote 6 down vote accepted
Could you use Beautiful Soup for this? The code would essentially look something like so:
from BeautifulSoup import BeautifulSoup
url = "hhttp://"
page = urlli2b.urlopen(page)
soup = BeautifulSoup(page)
token = soup.find("input", { 'name': 'authenticity_token'})
Something like that should work. I didn't test this but you can read the documentation to get it exact.
share|improve this answer
add comment
You don't need the findall call. Instead use:
m = re_token.match(line)
if m:
token = m.group(1)
I second the recommendation of BeautifulSoup over regular expressions though.
share|improve this answer
add comment
there's nothing "pythonic" with using regex. If you don't want to use BeautifulSoup(which you should ideally), just use Python's excellent string manipulation capabilities
for line in open("file"):
if "<input name" in line and "value=" in line:
for i in item:
if "value" in i:
print i
$ more file
$ python script.py
share|improve this answer
This code is terrible... worse than the original IMHO (though of course an actual parser like BS is the way to go). You should almost never have quad nested statements like this. The original had two, and you doubled it. – Andrew Johnson Nov 9 '09 at 1:56
Andyou introduced a bunch of random string literals. – Andrew Johnson Nov 9 '09 at 1:57
you should take a look at my output before you comment. I am doing it on a file with only that sample line OP posted, just to show you can just use Python's internal string capabilities without too much regex. What quad nested statements and random string literals are you talking about? If you have a better solution, then please post it out. – ghostdog74 Nov 9 '09 at 2:37
You code nests for->if->for->if, and is indented four times. The string literals are "<input name", "value=", and "value"... I read this whole thread, and the accepted answer is a good solution. No reason to be mucking around with string manipulation on this. The code in your answer is both hard to interpret and fragile.... I learned this myself the hard way. – Andrew Johnson Nov 9 '09 at 3:30
So what if its indented for times ?? the first if test for the "almost" exact line to get. then once the line is grabbed, split into items, iterate over them to get "value" (because we don't know where value might be). There's no use of regex in this case. What's wrong with that? Like i already said, OP should use BS if possible, but my solution also applies when doesn't want to use BS. – ghostdog74 Nov 9 '09 at 4:21
add comment
As to why you shouldn't use regular expressions to search HTML, there are two main reasons.
The first is that HTML is defined recursively, and regular expressions, which compile into stackless state machines, don't do recursion. You can't write a regular expression that can tell, when it encounters an end tag, what start tag it encountered on its way to that tag it belongs to; there's nowhere to save that information.
The second is that parsing HTML (which BeautifulSoup does) normalizes all kinds of things that are allowable in HTML and that you're probably not going to ever consider in your regular expressions. To pick a trivial example, what you're trying to parse:
<input name="authenticity_token" type="hidden" value="xxx"/>
could just as easily be:
<input name='authenticity_token' type="hidden" value="xxx"/>
<input type = "hidden" value = "xxx" name = 'authenticity_token' />
or any one of a hundred other permutations that I'm not thinking about right now.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/46713 | Take the 2-minute tour ×
We have an issue were the server session associated with a Flex client times out when the browse file dialog is open for a time longer then the configured session timeout. It seems that on some players, the playback is stopped when browse or download on a FileReference is executing. This also causes remote calls to be blocked and hence our manual keep-alive messages are not sent to the server, resulting in a session timeout.
I searched for some info on this in the docs and found a notice of it, but it does not explicitly list the players it does (not) work. Would anyone know were I could find a complete list?
PS: here are the links that mention this behavior:
While calls to the FileReference.browse(), FileReferenceList.browse(), or FileReference.download() method are executing, most players will continue SWF file playback.
While calls to the FileReference.browse(), FileReferenceList.browse(), or FileReference.download() methods are executing, SWF file playback pauses in stand-alone and external versions of Flash Player and in AIR for Linux and Mac OS X 10.1 and earlier
Anyone knows what is meant with an "external Flash Player"?
PPS: we tested this on Linux (10.0.x and 10.1.x) in Firefox where it seems to stop playback and on Windows (10.0.x) in IE where playback seems to continue.
share|improve this question
add comment
1 Answer
Nothing you can do unfortunately, it's a blocking call, and Player shares resources (incl threads) across multiple instances of the AVM when it can, to use less memory. Chrome, Webkit 2, and FF4 (3.7?) should be OK because they isolate the plugins in separate process spaces, and Player doesn't get a chance to do that. Unfortunately because it's blocking, Chrome will popup a dialog complaining that "a script is taking too long to execute" if you take your sweet time selecting the file :(
github.com/Adobe/FlashPlayer sure would be nice, innit? :-)
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/46714 | Take the 2-minute tour ×
I have a strange problem with updating Mercurial. Everytime when I add a file to my repository and then update another location of the repository (for example with in CI process), the error "no match found" occures. Then when I remove to whole folder and clone it again there are no problems and the new added file(s) are there. Updating and removing doesnt give problems
When I do "a" Verify the following is shown:
data/test.txt.i@54: missing revlog! 54: empty or missing test.txt test.txt@54: b80de5d13875 in manifests not found 3 integrity errors encountered! (first damaged changeset appears to be 54)
Any idea what could be causing this?
The complete trace:
ThoughtWorks.CruiseControl.Core.CruiseControlException: Source control operation failed: abort: data/test.txt.i@b80de5d13875: no match found! . Process command: hg update --noninteractive at ThoughtWorks.CruiseControl.Core.Sourcecontrol.ProcessSourceControl.Execute(ProcessInfo processInfo) at ThoughtWorks.CruiseControl.Core.Sourcecontrol.Mercurial.Mercurial.GetSource(IIntegrationResult result) at ThoughtWorks.CruiseControl.Core.IntegrationRunner.Build(IIntegrationResult result) at ThoughtWorks.CruiseControl.Core.IntegrationRunner.Integrate(IntegrationRequest request)
share|improve this question
Can you post a trace showing the exact commands you're running and the output they give? – crazyscot Jun 9 '10 at 12:54
It sounds like you somehow managed to get a corrupt repository. This more properly belongs on the mercurial mailing list or the freenode IRC channel because it looks like a bug. – Omnifarious Jun 9 '10 at 13:00
How can I run a trace? – Ivo Jun 9 '10 at 13:02
It's not running a trace, it's giving a list of the exact commands you run and what their output is. Basically cut & paste the terminal window in which your having the problem showing the relevant stuff. – Omnifarious Jun 9 '10 at 13:05
I added the full error message – Ivo Jun 9 '10 at 13:13
add comment
1 Answer
up vote 2 down vote accepted
The "repository corruption" is not patent here, since you can clone again, and retrieve the all content (old and newly added).
So the different points to check are:
1/ process conflict of some kind (something preventing data/test.txt.i@b80de5d13875 to be written, even so the file content is recorded)
2/ hg revlog and hg debugindex, to check out the versions actually recorded in your repo.
3/ hg verify to rule out any repo corruption.
4/ check the integrity of your repo
share|improve this answer
Thanks I am going to try this, will let you know the result – Ivo Jun 10 '10 at 7:49
The issue is solved, I changed the Commit user on the repository and the project folder and now its solved – Ivo Jun 15 '10 at 8:06
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/46715 | Take the 2-minute tour ×
I am writing a app, which has to create multiple Resources. The input is a XML. I need to parse the XML, create the Resources in parallel and update the responses in the Ouputs.
<CreateResourceARequest> ...</CreateResourceARequest>
Each of the ResourceRequests are handled by a specific Classes.
What is the best way to create Resources in parallel, aggregate the results and update the xml ?
share|improve this question
I'm sorry, but what do you mean by "in parallel" here? – Hovercraft Full Of Eels Jul 4 '11 at 16:13
add comment
1 Answer
up vote 1 down vote accepted
you will parse xml file in single thread anyway because the file is linear. but you can collect you parsers for each CreateResourceCRequest in a set and start them all in parallel threads after parsing file
share|improve this answer
sometimes I need to ensure that a resource needs to be created before other resources are created. How do I ensure that ? – Santhosh S Jul 6 '11 at 11:30
exec = Executors.newCachedThreadPool(); exec.execute(new CreateResourceA(input)); exec.execute(new CreateResourceB(input)); exec.execute(new CreateResourceB(input)); exec.shutdown(); while (!exec.isTerminated()){ logger.debug("some tasks are still running"); } ----- currently I am doing it this way, but this does not ensure ResourceA to be created before ResourceB. – Santhosh S Jul 6 '11 at 14:27
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/46716 | Take the 2-minute tour ×
When searching for items in complex JSON arrays and hashes, like:
{ "id": 1, "name": "One", "objects": [
{ "id": 1, "name": "Response 1", "objects": [
// etc.
Is there some kind of query language I can used to find an item in [0].objects where id = 3?
share|improve this question
not unless you make one. Leave the querying to the server, and use REST to get only the data you need. – zzzzBov Dec 12 '11 at 21:52
+1 good idea. Gonna write this tomorrow… – user142019 Dec 12 '11 at 21:53
Not XPath, but I've found JLinq pretty good (which makes code to read like in(...).where(...).select(...)): hugoware.net/Projects/jLinq. – pimvdb Dec 12 '11 at 22:00
This is frustrating because there's lots of libraries out there, but nothing approaching a commonly accepted standard. We have a library used by 3rd parties so we need to provide a query language that is widely known and used. – David Thielen Jun 12 '12 at 18:06
Some other options are suggested here: stackoverflow.com/questions/777455/… – Simon Jun 14 '13 at 3:09
show 1 more comment
10 Answers
up vote 32 down vote accepted
Yup, it's called JSONPath:
It's also integrated into DOJO.
share|improve this answer
Also used by Kynetx docs.kynetx.com/docs/KRL_and_JSONPath – Eric Bloch Dec 13 '11 at 0:27
Brian's answer suggests that the jsonQuery module should be used instead of the jsonPath module in dojo. – missingno Dec 15 '11 at 16:51
How solid is this? And I can't find a Java or C# version which is a deal killer for us. – David Thielen Jun 12 '12 at 18:08
The site linked here provides for Javascript and PHP. If you need a Java implementation, there’s one here: code.google.com/p/json-path – Paramaeleon Nov 16 '12 at 7:20
I should mention that JSONPath is not based on the XPath formal semantic. JSONiq might be a better option. – wcandillon Jun 8 '13 at 10:45
show 1 more comment
I think JSONQuery replaced JSONPath in dojo.
From Dojo documentation:
JSONQuery is an extended version of JSONPath with additional features for security, ease of use, and a comprehensive set of data querying tools including filtering, recursive search, sorting, mapping, range selection, and flexible expressions with wildcard string comparisons and various operators.
JSONselect has another point of view on the question (CSS selector-like, rather than XPath) and has a JavaScript implementation.
share|improve this answer
The github JSONQuery link seems to be dead. JSONSelect also has a JavaScript version now. – Henrik Dec 20 '12 at 15:06
add comment
Try to using JSPath
JSPath is a domain-specific language (DSL) that enables you to navigate and find data within your JSON documents. Using JSPath, you can select items of JSON in order to retrieve the data they contain.
JSPath for JSON like an XPath for XML.
It is heavily optimized both for Node.js and modern browsers.
share|improve this answer
add comment
Three other alternatives I am aware of are
1. JSONiq specification, which specifies two subtypes of languages: one that hides XML details and provides JS-like syntax, and one that enriches XQuery syntax with JSON constructors and such. Zorba implements JSONiq.
2. Corona, which builds on top of MarkLogic provides a REST interface for storing, managing, and searching XML, JSON, Text and Binary content.
3. MarkLogic 6 and later provide a similar REST interface as Corona out of the box.
share|improve this answer
There is now a JSONiq implementation: Zorba 2.6 officially supports it. – xqib-team Aug 29 '12 at 9:40
add comment
XQuery can be used to query JSON, provided that the processor offers JSON support. This is a straightforward example how BaseX can be used to find objects with "id" = 1:
{ "id": 1, "name": "Response 1", "objects": [ "etc." ] }
]')//value[.//id = 1]
share|improve this answer
add comment
To summarise some of the current options for traversing/filtering JSON data, and provide some syntax examples...
• JSPath
.automobiles{.maker === "Honda" && .year > 2009}.model
• json:select() (inspired more by CSS selectors)
.automobiles .maker:val("Honda") .model
• JSONPath (inspired more by XPath)
I think JSPath looks the nicest, so I'm going to try and integrate it with my AngularJS + CakePHP app.
(I originally posted this answer in another thread but thought it would be useful here, also.)
share|improve this answer
add comment
ObjectPath is a query language similar to XPath or JSONPath, but much more powerful thanks to embedded arithmetic calculations, comparison mechanisms and built-in functions. See the syntax:
Find in the shop all shoes of red color and price less than 50
$..shoes.*[color is "red" and price < 50]
share|improve this answer
add comment
Json Pointer seem's to be getting growing support too.
share|improve this answer
add comment
Jsel is awesome and is based on a real XPath engine. It allows you to create XPath expressions to find any type of JavaScript data, not just objects (strings too).
You can create custom schemas and mappings to give you complete control over how your data is walkable by the XPath engine. A schema is a way of defining how elements, children, attributes, and node values are defined in your data. Then you can create your own expressions to suit.
Given you had a variable called data which contained the JSON from the question, you could use jsel to write:
This will return any node with an id attribute of 3. An attribute is any primitive (string, number, date, regex) value within an object.
share|improve this answer
add comment
@Naftule - with "defiant.js", it is possible to query a JSON structure with XPath expressions. Check out this evaluator to get an idea of how it works:
Unlike JSONPath, "defiant.js" delivers the full-scale support of the query syntax - of XPath on JSON structures.
The source code of defiant.js can be found here:
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/46717 | Take the 2-minute tour ×
Let's say I have "settings" classes in my controllers and models, in my Java/Spring/MVC webapp. Now, in both /controllers/ and /models/, should I...
1) ...name them both Settings.java?
2) ...name them SettingsController.java and SettingsModel.java or something similar?
I'm curious about typical naming conventions as well as naming conventions used in your personal experience that worked well. Feel free to reference your own webapp project in place of my, perhaps poor, example.
This is my first MVC webapp, and I'm trying to get a feel for it.
share|improve this question
add comment
6 Answers
up vote 5 down vote accepted
I'd suggest you to call your controller SettingsController and model just Settings. It is because model actually contains you data. What kind of data does your model contain? The answer is: settings. So, call it settings.
Controller is different story. It is a class that deals with you data. There are probably many classes that deal with settings: SettingsBuilder, SettingsFactory, SettingsUtil, SettingsService etc. This one is controller, so call it SettingsController.
share|improve this answer
Overwhelmingly this appears the be the correct answer, and it makes complete sense. Thank you. You've just expanded my understanding of MVC. – Matthew Doucette Jan 27 '12 at 19:37
You are welcome – AlexR Jan 27 '12 at 20:12
add comment
Since model classses describe 'real-life' entities it's better to call them by name, so in your case it would be Settings.java.
Controller, on the other hand, is just a byproduct of using specific architecture (MVC) so it gets the Controller suffix, and in your case becomes SettingsController.java.
If you did your application using jsf, for example, you could still have Settings.java as model, but SettingsBean.java as a controller (obviously that's just another convention and you could call it however you like).
share|improve this answer
add comment
Name them SettingsController.java and Settings.java
share|improve this answer
add comment
I'd opt for Settings.java and SettingsController.java.
*Controller follows Spring's convention of controller naming. Furthermore it lets the programmer understand immediately what the class does.
Generally I always plump for simple names for POJO's, Settings.java seems to fit the bill here.
share|improve this answer
add comment
I think the following style is most coherent
+- SettingsController.java
+- Settings.java
The reason is that Settings is a name describing exactly what it is, while SettingsController describes that it's a controller working on Settings objects.
share|improve this answer
I agree with your naming, but disagree with the package structure - I'd have them both in the same package, or at least under the same package tree. But that may be a matter of preference as well. – Rob Hruska Jan 27 '12 at 19:17
@RobHruska we have it set the same way, with com.subdomainname.controllers and com.subdomainname.models, and this is the structure the company I work for uses, so I have to follow along. – Matthew Doucette Jan 30 '12 at 18:03
add comment
I have to agree with the previous posters, Model should just be the name of the entity, and then anything that adjective should be a suffix of the entity, so Settings and SettingsController This is the tact I take quite often. I also use settings as the name of the webpage as well.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/46718 | Take the 2-minute tour ×
I don't know why this seems to be so unclear to me.
I have 2 repos, repo1 and repo2. In each repo are the branches: staging master and live
I think part of my problem is that I'm trying to get .gitignore working after already starting to use git (e.g. the repos were init'd before gitignore was populated correctly).
I've tried all the wonderful git-update-index --assume-unchanged file's and the neat git rm -r --cached .'s I could find, but I'm still not understanding because it still doesn't work.
I'd like a couple of specific config files and cache folders to be ignored on pull's and push's.
If I'm on repo1>staging and I push to repo2>staging, which .gitignore takes precedence? Or do they both get applied?
On a couple of attempts, I seemed to have gotten the config files to be ignored on push, but instead of just not sending over the changes to those files, it deleted them entirely out of the branch. Confusing.
If it would be smarter to start over (it's an option) in order to get .gitignore working, what would be a smart way to do so so as to not lose all the commits (they don't need to be accessible to the new repos, just accessible for FUBAR sake).
I have existing repos with a few files in them that I no longer want to be transferred on push's or pull's.
.gitignore is either not ignoring, or it is ignoring by way of deletion--which doesn't work because when I push, I need those config files to be there on the other end, and not deleted by the push.
I thought I'd be smart and start using git. It's excellently verbose, thusly confusing for newp.
I thought:
I could have a master and staging on production(prod), and a master and staging on dev(dev);
• I would dev on the dev>staging branch, approve the gradients and other changes, then push to prod>staging;
• On prod, git checkout staging and view to make sure it works;
• All being OK, merge prod>staging prod>master, and checkout prod>master for the live site.
• I'd then pull prod>master into dev>master, merge dev>master with dev>staging (or not, if they're the same), and start the cycle over again on dev>staging.
They are using different db's so as not to pollute prod while developing, and it's important to keep them separate.
share|improve this question
I'm not sure I understand what you're asking. Are you trying to add files to a git repository, but ignore them only on push and pull? Also, .gitignore files are committed to the repository after it is already initialized and as far as I know they are not populated automatically. Any files or directories specified in .gitignore will never be added to a commit and will therefore never be saved to the repository on commit. – Mike Mar 8 '12 at 21:25
Additional note, you might find stackoverflow.com/questions/6147827/… helpful in setting up your repository to work as you desire. – Mike Mar 8 '12 at 21:32
No, the files are already in there. I want to stop sending them on push's and pull's. In repo1 staging I have 1.cfg, I don't want it transferring; in repo1 staging: git rm --cached 1.cfg | .gitignore > 1.cfg | cp /tmp/1.cfg . | git commit | git push repo2 staging | cd repo2 | git checkout staging | cat 1.cfg > not found – stormdrain Mar 8 '12 at 21:35
My understanding is .gitignore only ignores untracked files... once your files exist in the repository and are being tracked it doesn't work. You could do a pre-commit hook that reverts your config files before doing a commit. – Mike Mar 8 '12 at 21:46
add comment
1 Answer
up vote 2 down vote accepted
.git/info/exclude If you wish the exclude patterns based on repositories , you may instead put them in a file in that specific repository named .git/info/exclude or core.excludesfile
.gitignore is used to add files which you don't want to be tracked. If the file is already being tracked and you want to add to .gitignore. run git rm --cached filename
share|improve this answer
If I had only scrolled to the bottom of help.github.com/ignore-files on any of the 8 visits I made there... Thanks! – stormdrain Mar 9 '12 at 13:06
yaa..lot of docs out thr :) – GhostRider Mar 9 '12 at 13:10
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/46741 | Christine and Gordon Schei talk about learning that their son, Army Sergeant Erik Schei, had... more.
Frank Barela and Frank Maestas talk to their grandson C.J. Maestas about his gymnastics career.
Linda Hernandez remembers growing up as one of the few Latinos in Lincoln, Nebraska.
Dawn Maestas, who removes tattoos for survivors of domestic violence, talks to a client about... more.
Tim Harris, who has Down Syndrome, and his father, Keith, talk about starting their restaurant,... more. |
global_01_local_0_shard_00000017_processed.jsonl/46742 | Interesting Stuff I've Learned From Being an STR Guest Editor
Exclusive to STR
December 26, 2006
Highly technical articles and treatises on economics, natural rights, and the nature of liberty are mind-expanding, raise your consciousness, and are often just plain interesting. They are 'brain food' for many of us who stagger, mentally and spiritually starving, through this twilight world of unabated tyranny that modern America is becoming. Like the mythical Diogenes wandering the world with his lamp searching for an honest man, we crave these nuggets of wisdom and truth where they can be found.
But they can often be stupifyingly boring, too. Many are so jargon-filled and replete with obscure references and obtuse verbosity that it makes for a hard slog through the pages searching, always searching, for that one tiny little insight that will make the concept or point that the author(s) are trying to make clear. Sometimes they make me wonder if the problem is that they don't really know what it is they are trying to say, or that I'm just too stupid to understand them. And sometimes I just give up, too, and put the book back on the shelf, and feel sad and a little guilty that I don't have the education or intellectual wherewithal to comprehend them. Such was the case when I tried to read Robert Nozick's 1975 National Book Award-winning tome, Anarchy, State, and Utopia, just to cite one instance.
What I like to do nowadays is peruse the mainstream news media that's meant for the average mug and try to repost items with an ironic spin put on them that makes my point. Irony, humor, sarcasm and moral outrage seem to work the best for getting the point across. What has been occurring to me recently, though, is that more and more news stories from such staid outlets as the New York Times, Wall Street Journal, Washington Post, the BBC and other mainstream establishment publications and websites can, with just a small twist, tweak, or turn of phrase, just as well have been published by such overtly satirical and intentionally humorous sites such as Fark or The Onion just as easily. I wonder if the Ivy League-educated, big-time elite reporters and columnists who write this stuff realize it too? I mean, how can these sophisticated and well-informed brainiacs write such stuff with a straight face? I know I couldn't. And the irony here is that they aren't even trying to be ironic, hypocritical, sarcastic or satirical, let alone anti-state or anti-authority, like I am. Which is itself ironic, no? But I digress.
I was chided once, (many times actually), by people in web forums, blogs, private emails and personal conversations about opinions and articles I've written or posted. 'What was your source for that, Ali/Mr. Massoud/You asshole?' they ask of me. When I tell them it was the NYT , WSJ or The Economist, they snort in disbelief until I reply with the URL. And often as not, they don't believe me and vow to look it up for themselves, assuming, I suppose, that I misread it, got it wrong somehow, made it up, or just plain lied and hoped no one would check into it further. Upon receipt of my sources, though, they usually fall silent or reply with invective. My opinion pieces are the rare and only exception to this phenomenon. With them, critics usually accuse me of fabrication or being a bald-faced liar. Go figure?
When the New York Times, that exemplar and advocate for any and all forms of statism and bureaucratic meddlesomeness, ran an article recently about 'non-operating [school] districts' [sic] in New Jersey (i.e. they all had elected school boards, collected school taxes, and employed administrative staff, but had no or very few actual students), I received not less than five emails to the effect that this story had to be a hoax from The Onion, and I was just too dense to realize that it wasn't and it couldn't possibly be true. I say 'not less' than five here because my email client has a rule to automatically delete, unread, any mail with an extensive and uncommonly long list of profanity, epithets, racial slurs, and such like in the header or text of the message. And my junk mail box was much fuller the day I posted that little tidbit on the STR front page. Again, go figure?
Funny, ironic and ridiculous though it was, it was also absolutely true. At least as true as any other news you'll read in America 's 'newspaper of record,' anyhow. Other such examples of my reader responses are numerous, too numerous for this short article. Some remarks and comments were quite funny, some were sad, and a few were kind of scary. I guess this sort of thing goes with the territory though; if you shake a tree (or strike its root!) hard enough, a few nuts and rotten apples are bound to come down on you. Like I said though, it goes with the territory.
Anyhow, I hope you Root Strikers enjoy reading these news snippets I dig through the Internet for as much as I enjoy finding them for you.
Your rating: None
Ali Hassan Massoud's picture
Columns on STR: 43
|
global_01_local_0_shard_00000017_processed.jsonl/46745 | FIX: IntelliSense does not work when you use the MMC Snap-In for ASP.NET or the Web Site Administration Tool to add an existing Web.config file to a .NET Framework 2.0 ASP.NET Web site
Article translations Article translations
Article ID: 917238 - View products that this article applies to.
Expand all | Collapse all
Consider the following scenario. You add an existing Web.config file to a Microsoft .NET Framework 2.0 ASP.NET Web site. You use the Microsoft Management Console (MMC) Snap-In for ASP.NET or the Web Site Administration Tool to add the file. You open the Web.config file in Microsoft Visual Studio 2005. In this scenario, Microsoft IntelliSense does not work.
This problem occurs because MMC snap-In for ASP.NET and the Web Site Administration Tool add a schema reference to the Web.config file when you add an existing Web.config file to an ASP.NET project.
You must have Microsoft Visual Studio 2005 and the Microsoft .NET Framework 2.0 intalled before you apply this hotfix.
Restart requirement
Hotfix replacement information
This hotfix does not replace any other hotfixes.
File information
Collapse this tableExpand this table
File nameFile versionFile sizeDateTime
To work around this problem, follow these steps:
1. Open the Web.config file.
2. Locate the following line of code:
<configuration xmlns="">
3. Replace the code in step 2 with the following line of code:
For more information, visit the following Microsoft Developer Network (MSDN) Web sites:
Web Site Administration Tool Overview
MMC snap-in for ASP.NET
Article ID: 917238 - Last Review: October 9, 2011 - Revision: 2.0
• Microsoft .NET Framework 2.0
kbfix kbbug kbqfe KB917238
Give Feedback
Contact us for more help
Contact us for more help
Connect with Answer Desk for expert help.
Get more support from |
global_01_local_0_shard_00000017_processed.jsonl/46746 | Photo Gallery: South Swell In Santa Cruz
(image 8 of 10)
Beachbreaks, points, reef, big waves, small waves... don't tell anyone but Santa Cruz has it all! Photo: Nelly/SPL
When most people think of Santa Cruz visions of big and cold Steamer Lane pop into their heads, but the reality of the NorCal surf town is that it’s pretty damn good on a summertime south swell. You won’t see dudes in trunks but there are ramps galore and plenty of talented local surfers to take advantage of them.
Santa Cruz's Nic Lamb reaping the rewards of a south swell in Santa Cruz. Photo: Nelly/SPL |
global_01_local_0_shard_00000017_processed.jsonl/46747 | Export (0) Print
Expand All
This topic has not yet been rated - Rate this topic
Rename a site
Updated: May 1, 2010
To rename a site
1. Open Active Directory Sites and Services.
2. In the console tree, right-click the site that you want to rename, and then click Rename.
• Active Directory Sites and Services/Sites/site that you want to rename
3. Type the new site name.
• To open Active Directory Sites and Services, click Start, click Control Panel, double-click Administrative Tools, and then double-click Active Directory Sites and Services.
• It is recommended that you use legal Domain Name System (DNS) names when you create new site names; otherwise, your site will only be accessible where a Microsoft DNS server is used. For more information about DNS names, see Related Topics.
Information about functional differences
See Also
Did you find this helpful?
(1500 characters remaining)
Thank you for your feedback
Community Additions
© 2014 Microsoft. All rights reserved. |
global_01_local_0_shard_00000017_processed.jsonl/46749 | Take the 2-minute tour ×
minimum working code:
% \usepackage[T1]{fontenc}
Preview Acrobat
It opens as pdf in Mac's preview and Acrobat X respectively.
The left is original, the right uses T1.
Should I assume the T1 encoding or CMsuper is not anti aliased or so?
share|improve this question
I have seem similar issues, but I think it is best to see how it looks in Acrobat. – Peter Grill May 19 '11 at 0:05
They are using different fonts, one is cmr10(CM), the other is sfrm1000(CM-super). – Ma Ming May 19 '11 at 0:18
Are the images visible to others? At the moment I just have the imgur.com error message. http://meta.tex.stackexchange.com/questions/1409/the-image-you-are-requesting-does-not-exist-or-is-no-longer-available – mas Aug 7 '11 at 14:35
add comment
2 Answers
up vote 12 down vote accepted
This is a bit tricky to explain.
There are two possible issues here.
The more obvious one is if you are not using an outline version (type 1) of the T1 fonts (eg, CM-Super), and are instead getting the bitmap (type 3) "EC" version. You can tell if this is the case because after zooming in very far you will see that the glyphs are "jagged". Alternatively, you can check the name of the embedded font (eg, sfrm1000 for CM-Super). Since the full set of type 1 CM-Super fonts is many megabytes, many tex distributions do not install it by default. See this FAQ answer and this one. You may have to install CM-super (or alternatively use lmodern).
The second possible issue is that the CM-Super fonts are indeed not as well constructed as the bluesky computer modern. This is a more subtle effect, and may not show up depending on your OS and your PDF viewer. It almost certainly is invisible when you print the PDF. Lmodern is a little better in this regard, but still not as good as computer modern.
share|improve this answer
Yes, I saw many type 3 fonts used in my pdf. Now I am installing the CM-Super fonts. Should work this time. – colinfang May 19 '11 at 4:28
Done. Now all my type 3 fonts turned to type 1 and the words in pdf looks crisp. – colinfang May 19 '11 at 4:32
bluesky cm was once a commercial product: since it was a selling point of the commercial distributions that came with it, a lot of work was put into optimising its performance. by contrast, cm-super is a much larger set of fonts, done by a single person using standard tools: when it was released, the announcement disclaimed issues of quality. as it happens, i think cm-super is very good (it covers lots of encodings, too, not just t1), but for t1-only requirements, the latin modern fonts are better still. – wasteofspace May 19 '11 at 10:52
add comment
I've found that the Computer Modern fonts look blurry when using T1 encoding. Using the Latin Modern fonts instead solves the problem:
share|improve this answer
Yes, indeed. :) – colinfang May 19 '11 at 0:27
add comment
Your Answer
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.