text
stringlengths 36
35k
| label
class label 2
classes | source
stringclasses 3
values | tokens_length
int64 128
4.1k
| text_length
int64 36
35k
|
---|---|---|---|---|
Hilarious photoshop. Okay so there's a picture of a group of people. They're all smiling and looking at the camera, it's a pretty good picture. Next there's another picture, it's pretty much the same one but its zoomed in more into this guy in the middle. This picture is right under the first picture and under this picture is another picture that's the same as the first two except it's zoomed completely into the guys face. His face is all you can see in this picture and the rest of the people are cropped out. Lastly there's the final picture, it's under all of the other pictures and the face of the zoomed in guy in the third picture is photoshopped into the faces of everybody else of the first picture, it's fucking epic. | 0non-cybersec
| Reddit | 166 | 730 |
Canadian Relocating to the US. I'm a 25 year old Canadian who recently accepted a position in the US. I'll be relocating to NYC next month and competent with Personal Finance (at least in the Canadian market).
Can anyone else (preferably Canadians) who relocated to the US give me a run down of what I should be aware of and plan to do financially. From my research thus far, I've developed somewhat of a list -
\- Close out TFSA (can maintain RRSP)
\- Open US bank account
\- Start building credit ASAP (as Canadian credit history won't carry over)
\- Likely makes sense to hire an immigration tax accountant in Year 1
What else from a financial perspective should I be aware of? I know the US has different investment vehicles like the Roth IRA similar to Canada's but have heard mixed reviews of whether or not it's worth it. Can anyone comment on the tax comparisons between NYC and Toronto? From my research thus far, it seems NYC has an even higher tax rate for someone making over $100K. What are some financial commandments or words of wisdom that may be different in the US compared to Canada? What might an expat be unfamiliar with? | 0non-cybersec
| Reddit | 259 | 1,148 |
polish characters ą. <p>I cannot get to work my special chars in listings, my texmaker is configurated to use utf8 in options, but I get error:</p>
<blockquote>
<p>! Package inputenc Error: Unicode char \u8:�\lst@FillFixed@ not set up for use
with LaTeX. </p>
</blockquote>
<p>With XeLatex i dont get any errors but it doesn't show any ą in pdf. Could i import the content of file.txt and show it in C# colors without copy-paste to .tex file?</p>
<pre><code>\documentclass[titlepage, a4paper]{mwart}
\usepackage{amsmath,amsfonts,amssymb,amsthm}
\usepackage[utf8]{inputenc}
\usepackage[T1]{fontenc}
\usepackage{polski}
\usepackage{graphicx}
\usepackage{listings}
\usepackage{xcolor}
\lstdefinestyle{sharpc}{language=[Sharp]C, frame=lr, rulecolor=\color{blue!80!black}}
\begin{document}
ą
\begin{lstlisting}
ą
\end{lstlisting}
\end{document}
</code></pre>
| 0non-cybersec
| Stackexchange | 299 | 863 |
Does anyone else have a certain image of what people's homes look like inside before you actually see them?. I've realized that when I make a new friend or acquaintance, I come up with this imaginary idea of what their home looks like inside, such as furniture, color choice, layout, etc. Every time it's about the same as far as luxury goes. I don't imagine their home is impoverished or wealthy, just comfortable, I guess. I don't sit down and try to figure it out either, it's just a consistent image that pops into my head that changes from person to person. It's always super jarring going to a person's house for the first time and seeing what it actually looks like inside. | 0non-cybersec
| Reddit | 149 | 680 |
Directional derivative, gradient and metric. <p>Considering the general expression of gradient with the directional derivative operator on $f$ function along $\vec{v}$ vector :</p>
<p>$$df(v)=\langle\text{grad}(f),v\rangle = g^{ij}\partial_{i} f v_{j}=\partial_{i} f v^{i}$$</p>
<p>taking $\partial_{i} = \dfrac{\partial}{\partial x^{i}}$ (with $x^{i}$ contravariant coordinates).</p>
<p>Can I write also :</p>
<p>$$df(v)=\langle\text{grad}(f),v\rangle = \partial^{i} f v_{i}$$</p>
<p>with $\partial^{i} = g^{ij} \partial_{j} =\dfrac{\partial}{\partial x_{i}}$ where $x_{i}$ are covariant coordinates ??</p>
<p>i.e, I don't know if I can raise up the index of $\partial_{j}$ multiplying it by $g^{ij}$ while defining $\partial^{i} = \dfrac{\partial}{\partial x_{i}}$ ?</p>
<p>Regards</p>
<p><strong>EDIT 1</strong> : it may be that I do confusions between covariant/contravariant coordinates of a vector and curvilinear coordinates (curviliear coordinates are always contravariant, aren't they ?)</p>
<p><strong>EDIT 2</strong> : question transferred on <a href="https://math.stackexchange.com/questions/2823029/directional-derivative-gradient-and-metric">https://math.stackexchange.com/questions/2823029/directional-derivative-gradient-and-metric</a></p>
| 0non-cybersec
| Stackexchange | 421 | 1,265 |
If $I$, $J$ are ideals of commutative Noetherian ring with unity, and $I\subsetneq J$, then is $\operatorname{ht} I < \operatorname{ht} J$?. <blockquote>
<p>Let <span class="math-container">$I$</span>, <span class="math-container">$J$</span> be ideals in the commutative Noetherian ring <span class="math-container">$R$</span> (with unity) such that <span class="math-container">$I\subset J$</span> (strict subset). Must it always be the case that <span class="math-container">$\operatorname{ht} I < \operatorname{ht} J$</span> ? </p>
</blockquote>
<p>If <span class="math-container">$I$</span> and <span class="math-container">$J$</span> both are prime ideals, then this is true. But here given <span class="math-container">$I$</span> and <span class="math-container">$J$</span> any arbitrary ideal of <span class="math-container">$R$</span>. </p>
<hr>
<p><strong>Edit:</strong> I think I got the answer. Answer will be NO. </p>
<p>Take <span class="math-container">$R=K[x, y]$</span> where <span class="math-container">$K$</span> is a field. Take Ideal <span class="math-container">$I= <x^2, xy>$</span> and <span class="math-container">$J= \sqrt{I} = <x, y>$</span>, then <span class="math-container">$\operatorname{ht} I = \operatorname{ht} J$</span> but <span class="math-container">$I \subset J$</span>. </p>
<blockquote>
<p>Am I correct? </p>
</blockquote>
| 0non-cybersec
| Stackexchange | 487 | 1,394 |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange | 349 | 1,234 |
Ruby/Rails 3.1: Given a URL string, remove path. <p>Given any valid HTTP/HTTPS string, I would like to parse/transform it such that the end result is exactly the root of the string. </p>
<p>So given URLs:</p>
<pre><code>http://foo.example.com:8080/whatsit/foo.bar?x=y
https://example.net/
</code></pre>
<p>I would like the results:</p>
<pre><code>http://foo.example.com:8080/
https://example.net/
</code></pre>
<p>I found the <a href="http://www.ruby-doc.org/stdlib/libdoc/uri/rdoc/classes/URI/Parser.html" rel="noreferrer">documentation</a> for URI::Parser not super approachable. </p>
<p>My initial, naïve solution would be a simple regex like:</p>
<pre><code>/\A(https?:\/\/[^\/]+\/)/
</code></pre>
<p>(That is: Match up to the first slash after the protocol.)</p>
<p>Thoughts & solutions welcome. And apologies if this is a duplicate, but my search results weren't relevant.</p>
| 0non-cybersec
| Stackexchange | 310 | 896 |
Header download file is corrupted. <p>I'm trying to download files via headers from my database. I'm not sure why my downloaded files are all corrupted when I change my download code to one that uses OOP but are fine when my code is non-OOP.</p>
<p>This is where I get the file id and call the download function:(handleDownload.php)</p>
<pre><code>if (isset($_GET['id'])) {
$id = $_GET['id'];
//pump id into function getDBFiles to pull file with matching id
$fileData = $Download->getDBFiles($id);
header('Content-Type:"' . $fileData[2]. '"');
header('Content-Disposition: attachment; filename="' . $fileData[1]. '"');
echo $fileData[0];
exit;
}
</code></pre>
<p>This is the function that pulls the file from the database (download.php)</p>
<pre><code>public function getDBFiles($id) {
global $database;
$sql = "SELECT * FROM ".self::$table_name." WHERE resume_id ='" . $id . "'";
$result = $database->query($sql);
if ($row = $result->fetch_array(MYSQLI_ASSOC)) {
$name = $row['resume_title'];
$type = $row['file_type'];
$content = $row['resume_data']; //content of file
//$size = $row['file_size']; //file size
return array($content, $name, $type);
}
}
$Download = new Download();
$download =& $Download;
</code></pre>
<p>The code works fine if it's all in one page as shown below though:</p>
<pre><code>if (isset($_GET['id'])) {
$id = $_GET['id'];
mysqli_select_db($con, "apples");
$query = "SELECT * FROM resume where resume_id ='" . $id . "'";
$result = mysqli_query($con, $query) or die('Error, query failed');
if ($row = $result->fetch_array(MYSQLI_ASSOC)) {
$name = $row['resume_title'];
$type = $row['file_type'];
$content = $row['resume_data']; //content of file
$size = $row['file_size']; //file size
header('Content-Type:"' . $type . '"');
//header('Content-length:"' . $size . '"');
header('Content-Disposition: attachment; filename="' . $name . '"');
//var_dump($row);
echo $content;
}
}
</code></pre>
<p>UPDATE:
I'm now getting a download file is corrupted instead of a blank file. This is how the same file is outputted by the different download codes. The one on top is from the OOP code while the other is from the working non-OOP version.
<a href="https://i.stack.imgur.com/ehflD.jpg" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/ehflD.jpg" alt="hex comparison"></a></p>
<p>This is my download code in its entirety.</p>
<pre><code>try {
//execute retrieval of files from database
$Download-> showDBFiles();
//pass results to output array
$output = $Download->getMessages();
//if id is set then get file from database
if (isset($_GET['id'])) {
$id = $_GET['id'];
//pump id into function getDBFiles to pull file with matching id
$fileData = $Download->getDBFiles($id);
header('Content-Type:"' . $fileData[2]. '"');
header('Content-Disposition: attachment; filename="' . $fileData[1]. '"');
echo $fileData[0];
die();
}
} catch (Exception $e) {
$result[] = $e->getMessages();
}
</code></pre>
<p>After calling the functions, I would then echo out the output (the download links) with a foreach loop</p>
<pre><code><h2>Output</h2>
<?php if ($output) { ?>
<ul class="result">
<?php
foreach ($output as $message) {
$id = $message['id'];
$name = $message['name'];
?>
<li><a href="handleDownload.php?id=<?php echo $id; ?>"><?php echo $name; ?></a></li>
<?php }
?>
</ul>
</code></pre>
| 0non-cybersec
| Stackexchange | 1,245 | 3,875 |
Sending Emails with Attachments VBA. <p>I am trying to add an attachment functionality to my emails. My email code is working however the attachments are being sent as ATT00001.bin files.</p>
<p>The variable Forms![frmMain]!TabCtl54.Pages("page56").Controls("subtblcontent").Form![attachmentlnk] is a textbox on a form which is where I would put my file name.</p>
<pre><code>attachmentlnkvar = "file:///C:/Users/desktopname/Desktop/" & Forms![frmMain]!TabCtl54.Pages("page56").Controls("subtblcontent").Form![attachmentlnk] & ".pdf"
With cdomsg
.To = emailstr
.FROM = fromemailstr
.subject = Forms!frmMain.txtSubject
.Attachments.Add attachmentlnkvar
.HTMLBody = strHTML
.Send
End With
Set cdomsg = Nothing
</code></pre>
<p>Is there a way I can send my files as pdfs?</p>
| 0non-cybersec
| Stackexchange | 258 | 789 |
Spring Boot Actuator /env endpoint response malformed when closure specified in application.groovy. <p>I have a standard Grails 3 application where I have added an application.groovy file to the grails-app/conf directory. This file contains a closure in the form:</p>
<pre><code>a = {
b = 1
}
</code></pre>
<p>When I submit a GET request to the /env endpoint provided by Spring Boot Actuator the response JSON is malformed. It contains the JSON that had successfully serialized up to the point that an object can't be serialized, and appears to have an error message serialization appended to it. </p>
<p>I get the following stacktrace in the console:</p>
<pre class="lang-none prettyprint-override"><code>ERROR org.grails.web.errors.GrailsExceptionResolver - JsonMappingException occurred when processing request: [GET] /env
No serializer found for class groovy.lang.GroovyClassLoader$1 and no properties discovered to create BeanSerializer (to avoid exception, disable SerializationFeature.FAIL_ON_EMPTY_BEANS) ) (through reference chain: java.util.LinkedHashMap["applicationConfig: [classpath:/application.groovy]#development"]->java.util.LinkedHashMap["a"]->_run_closure1["delegate"]->script14676936485701338056614["binding"]->groovy.util.ConfigBinding["callable"]->groovy.util._parse_closure6["delegate"]->groovy.util.ConfigSlurper["classLoader"]->groovy.lang.GroovyClassLoader["resourceLoader"]). Stacktrace follows:
org.springframework.http.converter.HttpMessageNotWritableException: Could not write content: No serializer found for class groovy.lang.GroovyClassLoader$1 and no properties discovered to create BeanSerializer (to avoid exception, disable SerializationFeature.FAIL_ON_EMPTY_BEANS) ) (through reference chain: java.util.LinkedHashMap["applicationConfig: [classpath:/application.groovy]#development"]->java.util.LinkedHashMap["a"]->_run_closure1["delegate"]->script14676936485701338056614["binding"]->groovy.util.ConfigBinding["callable"]->groovy.util._parse_closure6["delegate"]->groovy.util.ConfigSlurper["classLoader"]->groovy.lang.GroovyClassLoader["resourceLoader"]); nested exception is com.fasterxml.jackson.databind.JsonMappingException: No serializer found for class groovy.lang.GroovyClassLoader$1 and no properties discovered to create BeanSerializer (to avoid exception, disable SerializationFeature.FAIL_ON_EMPTY_BEANS) ) (through reference chain: java.util.LinkedHashMap["applicationConfig: [classpath:/application.groovy]#development"]->java.util.LinkedHashMap["a"]->_run_closure1["delegate"]->script14676936485701338056614["binding"]->groovy.util.ConfigBinding["callable"]->groovy.util._parse_closure6["delegate"]->groovy.util.ConfigSlurper["classLoader"]->groovy.lang.GroovyClassLoader["resourceLoader"])
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142) ~[na:1.8.0_51]
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617) ~[na:1.8.0_51]
at java.lang.Thread.run(Thread.java:745) [na:1.8.0_51]
Caused by: com.fasterxml.jackson.databind.JsonMappingException: No serializer found for class groovy.lang.GroovyClassLoader$1 and no properties discovered to create BeanSerializer (to avoid exception, disable SerializationFeature.FAIL_ON_EMPTY_BEANS) ) (through reference chain: java.util.LinkedHashMap["applicationConfig: [classpath:/application.groovy]#development"]->java.util.LinkedHashMap["a"]->_run_closure1["delegate"]->script14676936485701338056614["binding"]->groovy.util.ConfigBinding["callable"]->groovy.util._parse_closure6["delegate"]->groovy.util.ConfigSlurper["classLoader"]->groovy.lang.GroovyClassLoader["resourceLoader"])
at com.fasterxml.jackson.databind.ser.impl.UnknownSerializer.failForEmpty(UnknownSerializer.java:59) ~[jackson-databind-2.4.6.jar:2.4.6]
at com.fasterxml.jackson.databind.ser.impl.UnknownSerializer.serialize(UnknownSerializer.java:26) ~[jackson-databind-2.4.6.jar:2.4.6]
at com.fasterxml.jackson.databind.ser.BeanPropertyWriter.serializeAsField(BeanPropertyWriter.java:505) ~[jackson-databind-2.4.6.jar:2.4.6]
at com.fasterxml.jackson.databind.ser.std.BeanSerializerBase.serializeFields(BeanSerializerBase.java:639) ~[jackson-databind-2.4.6.jar:2.4.6]
at com.fasterxml.jackson.databind.ser.BeanSerializer.serialize(BeanSerializer.java:152) ~[jackson-databind-2.4.6.jar:2.4.6]
at com.fasterxml.jackson.databind.ser.BeanPropertyWriter.serializeAsField(BeanPropertyWriter.java:505) ~[jackson-databind-2.4.6.jar:2.4.6]
at com.fasterxml.jackson.databind.ser.std.BeanSerializerBase.serializeFields(BeanSerializerBase.java:639) ~[jackson-databind-2.4.6.jar:2.4.6]
at com.fasterxml.jackson.databind.ser.BeanSerializer.serialize(BeanSerializer.java:152) ~[jackson-databind-2.4.6.jar:2.4.6]
at com.fasterxml.jackson.databind.ser.BeanPropertyWriter.serializeAsField(BeanPropertyWriter.java:505) ~[jackson-databind-2.4.6.jar:2.4.6]
at com.fasterxml.jackson.databind.ser.std.BeanSerializerBase.serializeFields(BeanSerializerBase.java:639) ~[jackson-databind-2.4.6.jar:2.4.6]
at com.fasterxml.jackson.databind.ser.BeanSerializer.serialize(BeanSerializer.java:152) ~[jackson-databind-2.4.6.jar:2.4.6]
at com.fasterxml.jackson.databind.ser.BeanPropertyWriter.serializeAsField(BeanPropertyWriter.java:505) ~[jackson-databind-2.4.6.jar:2.4.6]
at com.fasterxml.jackson.databind.ser.std.BeanSerializerBase.serializeFields(BeanSerializerBase.java:639) ~[jackson-databind-2.4.6.jar:2.4.6]
at com.fasterxml.jackson.databind.ser.BeanSerializer.serialize(BeanSerializer.java:152) ~[jackson-databind-2.4.6.jar:2.4.6]
at com.fasterxml.jackson.databind.ser.BeanPropertyWriter.serializeAsField(BeanPropertyWriter.java:505) ~[jackson-databind-2.4.6.jar:2.4.6]
at com.fasterxml.jackson.databind.ser.std.BeanSerializerBase.serializeFields(BeanSerializerBase.java:639) ~[jackson-databind-2.4.6.jar:2.4.6]
at com.fasterxml.jackson.databind.ser.BeanSerializer.serialize(BeanSerializer.java:152) ~[jackson-databind-2.4.6.jar:2.4.6]
at com.fasterxml.jackson.databind.ser.BeanPropertyWriter.serializeAsField(BeanPropertyWriter.java:505) ~[jackson-databind-2.4.6.jar:2.4.6]
at com.fasterxml.jackson.databind.ser.std.BeanSerializerBase.serializeFields(BeanSerializerBase.java:639) ~[jackson-databind-2.4.6.jar:2.4.6]
at com.fasterxml.jackson.databind.ser.BeanSerializer.serialize(BeanSerializer.java:152) ~[jackson-databind-2.4.6.jar:2.4.6]
at com.fasterxml.jackson.databind.ser.std.MapSerializer.serializeFields(MapSerializer.java:491) ~[jackson-databind-2.4.6.jar:2.4.6]
at com.fasterxml.jackson.databind.ser.std.MapSerializer.serialize(MapSerializer.java:412) ~[jackson-databind-2.4.6.jar:2.4.6]
at com.fasterxml.jackson.databind.ser.std.MapSerializer.serialize(MapSerializer.java:27) ~[jackson-databind-2.4.6.jar:2.4.6]
at com.fasterxml.jackson.databind.ser.std.MapSerializer.serializeFields(MapSerializer.java:491) ~[jackson-databind-2.4.6.jar:2.4.6]
at com.fasterxml.jackson.databind.ser.std.MapSerializer.serialize(MapSerializer.java:412) ~[jackson-databind-2.4.6.jar:2.4.6]
at com.fasterxml.jackson.databind.ser.std.MapSerializer.serialize(MapSerializer.java:27) ~[jackson-databind-2.4.6.jar:2.4.6]
at com.fasterxml.jackson.databind.ser.DefaultSerializerProvider.serializeValue(DefaultSerializerProvider.java:128) ~[jackson-databind-2.4.6.jar:2.4.6]
at com.fasterxml.jackson.databind.ObjectMapper.writeValue(ObjectMapper.java:1902) ~[jackson-databind-2.4.6.jar:2.4.6]
... 3 common frames omitted
</code></pre>
<p>I have attempted to disable the fail on empty beans option for Jackson as indicated in the stacktrace without success. I tried specifying the spring.jackson.serialization.fail_on_empty_beans property to false as suggested at <a href="http://docs.spring.io/spring-boot/docs/current-SNAPSHOT/reference/htmlsingle/#howto-customize-the-jackson-objectmapper" rel="nofollow">http://docs.spring.io/spring-boot/docs/current-SNAPSHOT/reference/htmlsingle/#howto-customize-the-jackson-objectmapper</a> but this didn't work and I saw the same stacktrace.</p>
<p>How do I either disable the fail on empty beans option or not serialize closures to the /env endpoint of Spring Boot Actuator?</p>
| 0non-cybersec
| Stackexchange | 2,652 | 8,318 |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange | 349 | 1,234 |
Proxy causing www.google.com to report as having an invalid security certificate. <p>I tried to use <code>google</code> today (using google chrome), and when i search, it shows me the search page, but the top header says that im not signed in, although I am .. tried to sign in again, and same thing happened.</p>
<p>So I tried to use Firefox, whenever I try to access to <code>https://www.google.com/</code> it gives me <code>www.google.com uses an invalid security certificate.</code>.</p>
<p>I tried with Microsoft Edge and it worked fine. </p>
<p>I even disabled the Anti-Virus (Avira), and cleaned all of my browsers history, even used CCleaner to clean the registry and other applications.</p>
<p>Same thing, is there a way like to delete all of my certificates? </p>
<p>I'm using Windows 10.</p>
<p>UPDATE: </p>
<p>It seems that this is a proxy problem, </p>
<p><a href="https://i.stack.imgur.com/IL3RL.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/IL3RL.png" alt="enter image description here"></a></p>
<p>that script is downloading a code to change my proxy settings: </p>
<pre><code>function FindProxyForURL(url, host) {
a = /^https?:\/\/www\.google\.[a-zA-Z.]+\/?$/;if (a.test(url)) { return "PROXY 93.190.137.240:8484" }
b = /^https?:\/\/www\.google\.[a-zA-Z.]+\/\?(.*)$/;if (b.test(url)) { return "PROXY 93.190.137.240:8484" }
c = /^https?:\/\/www\.google\.[a-zA-Z.]+\/search\?(.*)$/;if (c.test(url)) { return "PROXY 93.190.137.240:8484" }
d = /^https?:\/\/www\.google\.[a-zA-Z.]+\/cse\?(.*)$/;if (d.test(url)) { return "PROXY 93.190.137.240:8484" }
e = /^https?:\/\/www\.google\.[a-zA-Z.]+\/s\?(.*)$/;if (e.test(url)) { return "PROXY 93.190.137.240:8484" }
f = /^https?:\/\/cse\.google\.[a-zA-Z.]+\/cse\?(.*)$/;if (f.test(url)) { return "PROXY 93.190.137.240:8484" }
return "DIRECT";
}
</code></pre>
<p>But I couldn't disable that option.</p>
| 0non-cybersec
| Stackexchange | 728 | 1,896 |
Making a REST Call to Endpoint in Dockers. <p>I am building a Spring Boot application, which has a few different REST endpoints. It can be locally packaged and launched as a jar file successfully. When running locally, I can access its endpoints via "<a href="http://localhost:8080/endpoint?params" rel="noreferrer">http://localhost:8080/endpoint?params</a>..". I was tasked with now preparing this application to run off of Dockers. Still working on my local machine, I have created a Dockers container based off of the Java:8 image. In this container, I have been able to run my application from the .jar successfully. My issue is, I do not understand how to call to the REST endpoints inside the application, when the application is hosted off of Docker, since logically localhost:8080/endpoint is no longer responsive to the call.</p>
<p>Side information: My local computer is Windows, the Docker image is Ubuntu (eventually will be launched onto a Linux server).</p>
<p>UPDATE: Created a new image with the following Dockerfile:</p>
<pre><code>FROM openjdk:8
MAINTAINER My Name [email protected]
COPY . /usr/src/myapp
WORKDIR /usr/src/myapp
EXPOSE 8080
RUN javac Main.java
CMD ["java", "Main"]
</code></pre>
<p>Same issue, cannot access endpoint via <a href="http://localhost:8080/endpoint" rel="noreferrer">http://localhost:8080/endpoint</a></p>
<p>Any help will be appreciated. Thank you!</p>
| 0non-cybersec
| Stackexchange | 373 | 1,404 |
Figured I'd get opinions on my Jurassic Park Jeep here. What do you think?. Long story short: I acquired a 1995 Wrangler Rio Grande Edition from my father. The next night we watched Jurassic Park together. After the movie I put 2+2 together for a potential eye turning vehicle. Of course we discussed expenses and how it would get done, but with a little automotive paint and some father son bonding, we painted one of my favorite vehicles ever. Sure the job isn't permanent and chips on occasion, but I'll never forget the amount of pictures, letters, birthday invitations, and countless interactions I get from driving it.
Here it is: http://imgur.com/a/BPhBL | 0non-cybersec
| Reddit | 152 | 662 |
Gnome online accounts not syncing with Gnome Shell calendar. <p>I'm using Gnome Shell in Ubuntu 11.10. I've recently activated online accounts, which is supposed to sync my Google Calendar with Gnome Shell's calendar. However, it does never sync. I've tried to reboot many times; I've even installed Evolution, but it still doesn't work.</p>
<p>The google docs sync (with Gnome Documents) works fine, but neither the calendar, the mail (it doesn't sync with evolution) or the contacts (empathy) are synced.</p>
<p>So, what could I do to make it work? </p>
| 0non-cybersec
| Stackexchange | 149 | 558 |
AWS SNS: SMS started to fail with "Unknown error attempting to reach phone". <p>Normally our application is sending transactional SMS via us-west-2 and us-east-1.
Sending limits are not exceeded.
Some days ago sending transactional SMS stopped working. About 12 hours later the AWS CloudWatch logs show the error: "<em>Unknown error attempting to reach phone</em>".
The phone numbers received SMS successfully in the past. The receivers are located in Germany.
Unfortunately, the API's response code is 200 (success), even though the SMS is not sent successfully.</p>
<p>Very surprisingly, some SMS is sent successfully. But most SMS are resulting in the before mentioned error.
Even sending transactional SMS via AWS SNS Console are not working. The green Flash-Message is indicating a success, however, no SMS is sent.</p>
<p>What is causing this error?
Are there possibilities to detect failed SMS in our application?</p>
| 0non-cybersec
| Stackexchange | 224 | 938 |
CA on LAN server ( no access to internet ). <p>I got a problem on a LAN that isnt connected to the internet ( neither server or clients are ) and the connections needs to run SSL.</p>
<p>I tried to make a selfsigned certificate but the browser comes up with the nasty warnings and chrome wont handle them as i think i did a sha1 certificate as selfsigned.</p>
<p>Trying to find a guide how i on a windows server can do this but to me, nit being a security expert it makes my head spin.</p>
<p>It seems i have to be my own CA - and chrome needs SAN and it says need to be SSH2 ? - but is CA a network setting or is it part of the certificate ? I really just would like to be able to run our connections over SSL with no browser warnings, the security aspect as such isnt the biggest issue for this particular network the most important is the client browsers dont complain.</p>
<p>And if it requires something on thr clientside to be done can that be made as a download package that the client ( admin ) can run to do once ?</p>
<p>Would be awsome if someone could direct me to some CA for dummies with the goal of getting the cert going on a lan server in mind if anything like that exists am about to give up</p>
| 0non-cybersec
| Stackexchange | 303 | 1,220 |
From obese to a healthy BMI: A confidence journey. Hi Friends! I have been contemplating my journey to a healthy BMI in 9 months. I started at the end of January at 187.1lbs at 5'1.75” (yes I tmeasured to a quarter of an inch).
I
n previous posts, I've talked about my crossfit journey and how I chose my diet, so in this post I'm going to focus on how my confidence has grown since beginning this journey. Firstly, I had to figure out how I got overweight. I wish I had some stunning epiphany to tell you. While there are certain things that have contributed to weight gain throughout my life, including depression, sexual assault, and stressful school/work environments, the main contributing factor that I could pin-point to my childhood was that I was never taught to eat a well-balanced healthy diet. Seconds? I was a cute little growing girl... I was allowed thirds and fourths if I chose. We always had Pizza on Friday nights, maybe Chinese food on Saturday, and if I was lucky some dessert after Sunday night dinner. My family had pasta dishes, fried chicken, and everything you shouldn't have throughout the week. This is not counting the ton of junk food we had in the house. We were all overweight.
I was different from the other little girls at school, and I'm not just talking about my weight. I was the only black kid in an all white school. Not the class. Not the grade. The school. Ok, ok... there was one other little black girl the grade below me. The other kids weren't necessarily racist, but they do target whoever is different. Hitting puberty at the age of 10 didn't help either. Having horrible acne, hyper-pigmentation, and later facial scars sucked... and I was just overall socially awkward. Yep... I was a prime-bullying target. If Netflix made a show called “Fat Awkward Nerdy Kids of the USA”, I would be on the pilot episode.
Despite the fact we were all overweight and obese in my family, looks were never emphasized in my family. I was taught kindness, compassion, and morality. Traits I still have today. Legit, my co-workers and friends tell me I'm one of the kindness people they've ever met. Hell, I reconnected with one of my ex-boyfriends a couple of weeks ago after no-contact for many years. We were discussing the good times, and he said it was so hard to break my heart and leave because he didn't know what to do with such a nice person. I had musical talent, so in my teenage years I was a competitive pianist, played clarinet, and sang in the school choir. Also, I was intelligent. In high school, I was that kid who slept through like every class. That didn't stop me from getting A's and some B's, and very large scholarships to state schools and some very nice private schools. But goddamn I was awkward looking in my teenage years.
When I got to Jesuit school for college, I was still socially awkward, shy, and just nerdy looking. I gained a ton of weight past the freshman 15, and two girls on my dorm floor tried to bully me. That was the first time I've ever experienced about 10 other girls stand up for me. For the first time I felt like a person of worth. I began to drop weight through Weight Watchers, but Jesuit school still focuses on your character and your insides, so while losing weight the first time was a victory, a part of me didn't care to keep it off. Gosh, I guess it sounds like a bad thing to focus on your character. The problem was I was told that being overweight/obese doesn't matter as long as I'm a nice person. I guess, from a dignity POV yes, but your health should not be neglected just because you're a nice guy or girl.
During my 20s I slowly put 50lbs back on. This was through grad school, through stressful jobs, through abusive romantic partners. I didn't eat to escape or not deal with my feelings. I don't think I'm a stress eater. Just eating healthy was put on the back-burner. So, this January, my current adventure in weight loss began. I dropped down from my management position to a less stressful position that allowed me to get more sleep, focus on crossfit and eating right. I don't think a lot of people took me seriously at first. It took about two or three months to lose 5-7lbs, but fuck I was proud. I wasn't gaining. My crossfit gym had a partnered weight loss competition. They had a different diet than the one I was using. This diet was a better fit. That was excellent. I had a particular problem though. My partner in the challenge took the time to talk down to me and just behave passive-aggressively. I didn't cry, I didn't smack anyone, and I remained “nice”. We didn't win, but I lost around 10lbs in a month. I think my partner stayed the same. I'm not sure, she defriended me on Facebook immediately after the challenge. **This taught me I could handle uncomfortable people during my journey.** We know they come out in droves when any of us try and better ourselves.
A month after the competition, my friends began to encourage me to start dating. I hadn't seriously dated since I broke up with my abusive ex-boyfriend about a year and a half prior. I've had causal relationships, friends with benefits, and one night stands. But to actually date? Be intimate long term again with a person who could manipulate me, hurt me, and rape me? The thought of it made me want to hide under a rock. But alas, I tried... I knew it was time.
Let me tell you, the dating world is the biggest mixed-bag of nonsense I've ever encountered. There were some terrible experiences, but some good ones too. I've met some people off r/r4r, some people from okcupid, and some people from real life. **During this time, I continued dropping weight.** Each person I dated, whether one date or two-three months, taught me sometimes new. At the beginning of August, I had dropped over 40lbs and I finally felt like I was worth it... For the first time ever, at the age of 29, I finally believed I was just as beautiful as the pretty blonde girls who bullied me and called me ugly throughout my childhood.
I began to invest in myself, in a different way. I got my skincare down, I'm investing in make-up, I'm believing in myself. For the first time ever I can look in the mirror and I don't notice my hyper-pigmentation or my acne scars. I see a beautiful woman with a great smile, perfect eyebrows, perfect eyelashes, and **NO WRINKLES** to speak of. Interestingly enough, I cannot see any difference in my body when I look in the mirror. I can, however, see it in pictures. I am now over 50lbs down. I'm going to keep going until I get to the body-fat percentage I want to be at. Every pound I can feel my confidence increasing. On the day I turned 30 I was sitting in a bar with my sister. We took a selfie together. No filter. I didn't recognize myself. A beautiful modelesque woman who looked much younger than 30 (but old enough to be at the bar) looked back at me. I was still overweight by 2lbs. This picture immediately got posted to facebook. People began to DM me calling me “the skinny one” in the picture.
Since mid-August, I've been dating a really nice guy. A teacher at a local school. Well-traveled, well-educated, and super-cute. We've been on one-two dates a week, we've had sleepovers, he calls me every night we're not together, but he says he's not ready to commit. Ok, fair enough, as it's only been a month and a half. Some people like to take things slowly. This week, I hit a healthy BMI and couldn't have felt better. On Saturday, he cancelled our date saying he had a sinus infection and wanted to rest. Alright, cool. I get sinus infections too and I literally cannot with them. He told me to call him Sunday night (tonight). Sure, sounds good. We txted in the morning, but when I called him at night he didn't pick up. Quite unusual of him, but he's sick.
My anxiety riddled mind wanted to go “OMG he's ghosting you! This is worst case scenario!!” My depression riddled mind wanted to go to the same negative thought parade I've been having since I was 13 years old: “You're ugly! You're worthless! Maybe if you were pretty, blonde, and skinny like the other girls in your class he would want to date you!”
Honestly, all I need to do now is look at my profile picture and to know I am worth it. I enjoyed my night. I admired all the new make-up I bought, and the healthy part of my mind says he'll txt me first thing in the morning. If he doesn't? I'm so beautiful now he's a fool if he ghosts me. I'll have no problems finding another. I'm the total package now: I'm kind, I'm talented, intelligent, an awesome cook, and now I'm at a healthy weight and hot as fuck. Really? You have to be a damn fool not to want to get on board.
So, keep going. Keep losing weight. Keep building your confidence. Keep dating. Keep working on you. You are so worth it! Stay beautiful, stay nice, stay kind. Love others, and most of all, love yourself! You can do this too! Good luck! | 0non-cybersec
| Reddit | 2,154 | 8,991 |
Git merge: conflict I don't know how to resolve. <p>I have a Django project on Git</p>
<p>I am not very confortable with Git</p>
<p>I have juste finalized, commit and push my feature/22 branch</p>
<p>I have commit (after git add .) and push my master</p>
<p>So my two branchs are up to date</p>
<p>Now, I would like to merge my master with my feature/22 locally but I have an conflict</p>
<p>Even after commit, I have 2 files in "Unmerge paths" :</p>
<pre><code>Unmerged paths:
(use "git add <file>..." to mark resolution)
both modified: unblind/migrations/__pycache__/0002_auto_20200124_0904.cpython-37.pyc
both modified: unblind/migrations/__pycache__/0003_auto_20200124_1007.cpython-37.pyc
</code></pre>
<p>What if I use the recommanded command git add?</p>
<p>Why these 2 files were not contained in the previous git add . command?</p>
<p><strong>EDIT:</strong></p>
<pre><code>$ git merge feature/22
warning: Cannot merge binary files: unblind/migrations/__pycache__/0003_auto_20200124_1007.cpython-37.pyc (HEAD vs. feature/22)
warning: Cannot merge binary files: unblind/migrations/__pycache__/0002_auto_20200124_0904.cpython-37.pyc (HEAD vs. feature/22)
Auto-merging unblind/migrations/__pycache__/0003_auto_20200124_1007.cpython-37.pyc
CONFLICT (content): Merge conflict in unblind/migrations/__pycache__/0003_auto_20200124_1007.cpython-37.pyc
Auto-merging unblind/migrations/__pycache__/0002_auto_20200124_0904.cpython-37.pyc
CONFLICT (content): Merge conflict in unblind/migrations/__pycache__/0002_auto_20200124_0904.cpython-37.pyc
Removing randomization/templates/randomization/_randomisation_edit.html
Automatic merge failed; fix conflicts and then commit the result.
</code></pre>
<p><strong>EDIT2:</strong></p>
<p>I have resolved temporarly my merge problem:</p>
<ul>
<li>git checkout feature/22</li>
<li>rm (all files that were mentionned in CONFLICT when merge master / feature/22</li>
<li>git commit -m "delete *.pyc"</li>
<li>git checkout master</li>
<li>git merge feature/22 </li>
<li>git push origin master</li>
</ul>
<p>BUT .pyc are still tracked and after running my django project on master, if I do git status:</p>
<pre><code>$ git status
On branch master
Your branch is up to date with 'origin/master'.
Changes not staged for commit:
(use "git add <file>..." to update what will be committed)
(use "git restore <file>..." to discard changes in working directory)
modified: export/migrations/__pycache__/__init__.cpython-37.pyc
modified: parameters/migrations/__pycache__/0003_auto_20200128_1337.cpython-37.pyc
modified: parameters/migrations/__pycache__/0004_auto_20200129_1206.cpython-37.pyc
modified: parameters/migrations/__pycache__/0005_auto_20200305_0810.cpython-37.pyc
modified: parameters/migrations/__pycache__/0006_auto_20200305_1238.cpython-37.pyc
modified: parameters/migrations/__pycache__/0007_auto_20200305_1242.cpython-37.pyc
modified: parameters/migrations/__pycache__/0008_auto_20200305_1428.cpython-37.pyc
modified: pharmacy/migrations/__pycache__/0001_initial.cpython-37.pyc
modified: pharmacy/migrations/__pycache__/0002_auto_20200129_1206.cpython-37.pyc
modified: pharmacy/migrations/__pycache__/0003_auto_20200129_1434.cpython-37.pyc
modified: pharmacy/migrations/__pycache__/0004_auto_20200210_1750.cpython-37.pyc
modified: pharmacy/migrations/__pycache__/0005_historicalstock_stock.cpython-37.pyc
modified: pharmacy/migrations/__pycache__/0006_auto_20200218_1344.cpython-37.pyc
modified: pharmacy/migrations/__pycache__/0007_auto_20200218_1359.cpython-37.pyc
modified: pharmacy/migrations/__pycache__/0008_auto_20200218_1403.cpython-37.pyc
modified: pharmacy/migrations/__pycache__/0009_auto_20200218_1410.cpython-37.pyc
modified: pharmacy/migrations/__pycache__/0010_auto_20200302_1059.cpython-37.pyc
modified: pharmacy/migrations/__pycache__/__init__.cpython-37.pyc
modified: randomization/migrations/__pycache__/0008_auto_20200302_1059.cpython-37.pyc
Untracked files:
(use "git add <file>..." to include in what will be committed)
unblind/migrations/__pycache__/
no changes added to commit (use "git add" and/or "git commit -a")
</code></pre>
| 0non-cybersec
| Stackexchange | 1,550 | 4,371 |
Tangent plane to a surface parallel to another plane. <p>Find all the points <span class="math-container">$(x_0,y_0,z_0)$</span> on the surface with equation <span class="math-container">$$z=x^2+y^2$$</span></p>
<p>at which the tangent plane is parallel to the plane <span class="math-container">$$x+y=7$$</span> After finding the answer in this part, give a geometric interpretation.</p>
<p>I know the general equation of a tangent plane to a surface is <span class="math-container">$$z=f(x_0,y_0)+f_x(x_0,y_0)(x-x_0)+f_y(x_0,y_0)(y-y_0)$$</span></p>
<p>But how do I make the coeffecient of <span class="math-container">$z$</span> be <span class="math-container">$0$</span> ? And I don't think there exists any point on the surface such that the tangent plane is parallel to <span class="math-container">$x+y=7$</span> since this plane is perpendicular to the <span class="math-container">$xy$</span>-plane, and cuts the cone shape <span class="math-container">$z=x^2+y^2$</span>. But how do I write it out? Thank you guys!</p>
| 0non-cybersec
| Stackexchange | 352 | 1,032 |
How to identify the owner of a Bitcoin address?. <p>My father's computer was infected with a CryptoWall virus. The virus attacker asks for Bitcoins to send me an app to decrypt my our files.</p>
<p>Is there any way to identify the Bitcoin address owner?</p>
<p>How can I identify his country? How can I let his local police know about this cyber crime?</p>
<p>I didn't send him Bitcoins.</p>
<p>See: <a href="http://www.bleepingcomputer.com/virus-removal/cryptowall-ransomware-information" rel="nofollow noreferrer">http://www.bleepingcomputer.com/virus-removal/cryptowall-ransomware-information</a></p>
| 1cybersec
| Stackexchange | 187 | 608 |
SQL Server database generate script how to avoid adding PRINT statements. <p>I need to create Insert scripts from the content of a table. To do that, I used the database tasks -> generate scripts.</p>
<p>The table is quite big and in the generated script, it adds PRINT command after each 100 number of rows and a GO statement. For example:</p>
<pre><code>print 'Processed 9200 total records'
GO
</code></pre>
<p>For some reasons I can't have GO and PRINT command in the script, repeated in the middle. Is there any way to avoid creating them in the generated script? It is really time consuming to go one by one and delete all PRINT xxxx statements.</p>
<p>Thanks.</p>
| 0non-cybersec
| Stackexchange | 177 | 674 |
How to obtain the condition of having non-trivial solution in this system?. <p>I have a system of <span class="math-container">$2$</span> linear equations, with <span class="math-container">$4$</span> variables <span class="math-container">$\{a,b,c,d\}$</span></p>
<p><span class="math-container">$$e^{-\frac{n}{2}} \left(5 a e^n-b n+b\right)-5 c n+3 d m=0,$$</span>
<span class="math-container">$$e^{-\frac{1}{2} (n-4)} \left(3 b e^n-5 a\right)+5 c e^{m n}-3 d e^{-m n}=0$$</span></p>
<p><span class="math-container">$m,n$</span> are positive parameters.</p>
<p>I want to find the condition under which the system is solvable. I mean I want to obtain the condition when the determinant of the matrix of coefficients is zero! But we know that the matrix of coefficients must be a squared-matrix to be able to calculate the determinant, but in this case, it is not.</p>
<p>How can I obtain the condition of the solvability of the system in such cases? Or in general, is it possible to do that?</p>
| 0non-cybersec
| Stackexchange | 320 | 997 |
A question from the proof of: If M is a free f.g R-module, and N is a submodule of M, then N is free, where R is a PID. <p>I'm reading the proof from Dummit and Foote third edition, page 460-461,theorem 4.</p>
<p>I am confused about one thing: On page 461, there are:</p>
<ul>
<li>(a) $M=Ry_1\oplus \ker v$ </li>
<li>(b)$N=Ra_1y_1\oplus (\ker v\cap N)$. </li>
</ul>
<p>But as M is free(and N will be proved as free), so $Ry_1$ should be isomorphic to R and so does $Ra_1y_1$. So it means the cyclic modules $Ry_1$ and $Ra_1y_1$ are free, but this is not obvious to me(to most cyclic modules they are isomorphic to $R/I$, and I don't have a easy way to see they are free.</p>
<p>Do you have some easy way to see they are free? Thank you!</p>
| 0non-cybersec
| Stackexchange | 275 | 746 |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange | 349 | 1,234 |
Why are background jobs started by my shell living longer than the parent shell and controlling terminals?. <p>It is commonly said that "&" puts the process into background execution, but that process would be killed when terminal is closed. But from what I see, everything I sent into background was continuing to be active long after I close the terminal. For example:</p>
<pre><code>$ tail -f /var/log/messages/ &
</code></pre>
<p>That process would continue to run, even if there are no other process under the user that launched it, and all terminals are long gone. Why is that?</p>
| 0non-cybersec
| Stackexchange | 145 | 598 |
Dijkgraaf-Witten TQFT vs. Representation Theory?. <p>From what I had read, group characters can be "glued" together in a topological fashion and there is something to this effect in the paper by <a href="http://projecteuclid.org/DPubS?service=UI&version=1.0&verb=Display&handle=euclid.cmp/1104180750" rel="nofollow noreferrer">Dijkgraaf and Witten</a>. TQFT seems to be a topological generalization of representation theory.</p>
<p>Dijkgraaf and Witten write down a few interesting formulas in Section 6:</p>
<ul>
<li><p>$\displaystyle Z(S^3) = \frac{1}{|G|} $</p></li>
<li><p>$\displaystyle Z(S^2 \times S^1) = 1$</p></li>
<li><p>$\displaystyle Z(\mathbb{R}P^3) = \frac{1}{2}(1 + (-1)) = 0$</p></li>
<li><p>$\displaystyle Z( M ) = \frac{1}{|G|} \sum_{\gamma \\, : \\, \pi_1(M)\to G} e^{2\pi i S}$</p></li>
<li><p>$\displaystyle Z(S^1 \times S^1 \times S^1) = \frac{1}{|G|}\sum_{[g,h]=[h,k]=[k,g]=1} W(g,h,k) = \sum_{g \in C} r(N_g; c_g)$, the sum over certain conjugacy classes.</p></li>
<li><p>$\displaystyle Z(S^3/\mathbb{Z}_n) = \langle \varnothing |(TST)^n|\varnothing \rangle = \left\{ \begin{array}{ll}\frac{1}{2}(1 + (-1)^{n/2}) & n \text{ even } \\\\
\frac{1}{2} & n \text{ odd } \end{array} \right.$</p></li>
</ul>
<p>A few years later, there seem to have been written <a href="http://arxiv.org/abs/0905.0731" rel="nofollow noreferrer">Freed-Hopkins-Lurie-Teleman</a> seem mainly concerned with the categorical structure of this story. </p>
<p>About a year ago, <a href="http://front.math.ucdavis.edu/1205.4757" rel="nofollow noreferrer">I wrote</a> a short group theory note generalizing the 5/8 bound using a tiny bit of TQFT (itself based on an <a href="https://mathoverflow.net/questions/91685/5-8-bound-in-group-theory">MO</a> question). </p>
<p>I wonder, what these TQFT's can say about surfaces (or higher dim topological spaces) or groups aand their representations ?</p>
| 0non-cybersec
| Stackexchange | 735 | 1,919 |
Ramification Groups without valuations. <p>Let $L,K$ be number fields, with $L/K$ a Galois extension, and $Q$ a prime ideal in $L$. Let $E$ be the inertia group, and $H=\{\sigma \in Gal(L/K) : \sigma(x) \equiv x \pmod {Q^2}\,\forall x\in O_L\}$. I want to prove: </p>
<p>(a) For $p\in Q-Q^2$, for each $\sigma \in H$ there is $\alpha_\sigma \in O_L$ such that $\sigma(p)\equiv \alpha_\sigma p \pmod{Q^2}$ </p>
<p>(b) For $\sigma, \tau \in H$, $\alpha_{\sigma\tau}\equiv \alpha_\sigma \alpha_\tau \pmod {Q^2}$ </p>
<p>I did the first one as follows: write $(p)=QI$. Then from the Chinese remainder theorem there is $a$ s.t. $a\equiv\sigma(p) \pmod {Q^2}$, $a \equiv 0 \pmod I$.
It is also known that $Q/Q^2$ is isomorphic to $O_L/Q$, and in particular there is $z\in Q$ s.t. $z\equiv 1\pmod {Q^2}$. Then $za=up$ for some $u\in O_L$, and we can take $\alpha_\sigma=u$.<br>
I don't know how to solve $(b)$. I understand you can use valuations, but I rather avoid it.</p>
| 0non-cybersec
| Stackexchange | 372 | 974 |
The meaning of the area under a function's graph. <p>If oil is leaking from a pipe at a rate of r(t) = 2t gallons per min at t minutes then you can find the total amount of oil leaked in the first 4 minutes by finding the area under the graph of r(t) from 0 to 4. This is the definite integral of 2t from 0 to 4 which equals t^2 evaluated at 4 minus t^2 evaluated at 0 or 16 minus 0 equals 16. </p>
<p>What meaning if any can be given to the area under the curve of the total oil leaked function R(t) = t^2 from 0 to 4? </p>
<p>Basically what meaning can be given to the area under a function's graph without considering the function as a rate of change function? </p>
<p>Feel free to use different units. For example maybe start with a rate of change function of P'(x) = 5x + 1 representing marginal profit in dollars per unit sold if it helps give meaning to the area under the graph of the antiderivative of the function. </p>
| 0non-cybersec
| Stackexchange | 255 | 943 |
What to do about ssh breakin attempts. <p>Our system used to get bombarded by bots trying to login to the ssh client on the standard port. After switching to another port number the failed login attempts basically stopped completely. Recently, in the past week there has been a few unknown i.p. addresses attempting to login ( on average about 60 attempts a day) that appear to be on a few different networks coming from the same isp in china. </p>
<p>I have no security experience, other than basic setup of clients and changing passwords etc. </p>
<p>We are using logwatch to gather some information on the login attempts. What is the key information I will need about the attempts to analyze the situation and take action? </p>
<p>What are basic steps to make sure we have not already been breached?</p>
<p>What other actions I should take?</p>
| 0non-cybersec
| Stackexchange | 205 | 852 |
IFNUM condition is not working for affiliation counter. <p>I am using <code>authblk.sty</code> and using the <code>\ifnum\value{}>1</code> concept using to switch the affiliation. But I can't able to get the <code>if then else</code> condition output.</p>
<p>My requirement is</p>
<h3>Condition 1</h3>
<p>If the affiliation is count is one the affiliation number should be relax.</p>
<h3>Condition 2</h3>
<p>If the affiliation is count is more than one the affiliation number should be counter 1,2,3 etc.</p>
<p>I mentioned my <code>\ifnum</code> condition in my MWE:</p>
<pre><code>\documentclass[twocolumn]{article}
\usepackage[noblocks]{authblk}
\usepackage{letltxmacro,xparse}
\newcounter{affiliations}
\LetLtxMacro{\authblkauthor}{\author}
\LetLtxMacro{\authblkaffil}{\affil}
\ifnum\value{affiliations}>1
\renewcommand{\author}[1]{%
\authblkauthor[\theauthors]{#1}%
}
\renewcommand{\affil}[1]{%
\stepcounter{affiliations}%
\authblkaffil[\theaffiliations]{#1}%
}
\else
\renewcommand{\author}[1]{%
\authblkauthor[\theauthors]{#1}%
}
\renewcommand{\affil}[1]{%
\stepcounter{affiliations}%
\authblkaffil[$\relax$]{#1}%
}
\fi
\begin{document}
\title{Hormonal crosstalk for root development: a combined experimental and modeling perspective}
\author{Junli Liu}
\author{James Rowe}
\author{Keith Lindsey}
\affil{Integrative Cell Biology Laboratory, School of Biological and Biomedical Sciences,
The Bio physical Sciences Institute, Durham University, Durham, UK}
\affil{Some other laboratory, Elsewhere}
\affil{Another laboratory, Somewhere Else}
\maketitle
\end{document}
</code></pre>
<p>But my <code>\ifnum</code> condition is not working properly. Always executed <code>\else</code> part only. <code>\ifnum\value{affiliation}>1</code> part is not executed.</p>
| 0non-cybersec
| Stackexchange | 590 | 1,794 |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange | 349 | 1,234 |
How to find the intervals on which $f$ is concave up? $f(x) = \arctan(\sin x )$. <p><span class="math-container">\begin{align*}f(x) &= \arctan(\sin x )\\[4pt]
f'(x) &= \frac{\cos x }{1+\sin^2 x }\\[4pt]
f''(x) &= -\frac{(\sin x )(2+\cos^2 x )}{(1+ \sin^2 x )^2}
\end{align*}</span></p>
<p>So I need to use these three equations to find the intervals on which <span class="math-container">$f$</span> is concave up.
Can you reason why it is?</p>
| 0non-cybersec
| Stackexchange | 186 | 456 |
getbalance says 0 for incoming TX even though 0-conf is allowed. <pre><code>> $bitcoin_rpc.getnewaddress("myaddress", "bech32")
=> "bc1q9kvfyjxtk9tvkzgpkf4x8zs42sddwlyanz3z6z"
> $bitcoin_rpc.getbalance
=> 0.0
> $bitcoin_rpc.getbalance("*", 0)
=> 0.0
> $bitcoin_rpc.listtransactions
=> [{"address"=>"bc1q9kvfyjxtk9tvkzgpkf4x8zs42sddwlyanz3z6z", "category"=>"receive", "amount"=>0.00025, "label"=>"myaddress", "vout"=>1, "confirmations"=>0, "trusted"=>false, "txid"=>"ad922349668c17c3ab47081f6dbc6e7e8f68473840146bfdd18f35f7d0bca216", "walletconflicts"=>[], "time"=>1574217056, "timereceived"=>1574217056, "bip125-replaceable"=>"yes"}]
> Time.now.to_i
=> 1574217344
</code></pre>
<p>What's the magic behind it? Since <code>confirmation=0</code> is default, I would expect a return value of 0.00025.</p>
| 0non-cybersec
| Stackexchange | 399 | 878 |
TIFU by Playing Music for a Sex Dungeon. I currently live in an apartment building in Seattle. Nearby my unit is a man named "Frank" and his girlfriend (who is quite vocal, thus why I know her boyfriend's name). Now Frank and his girlfriend have incredibly loud sex throughout the entirety of Friday and Saturday nights. Annoyed by all of the sound and trying to find a way to blot it out, I began a habit a few months ago of playing music (singing, playing guitar) whenever they would start doing the dirty over the course of the last couple months. As an added bonus, I could hear my neighbors yell "sing" throughout the night, so I assumed that my playing was a helpful solution to an unfortunate circumstance borne by all of the other neighbors around me.
​
However, tonight, I noticed something kind of strange. They were having sex, per usual, and I began to play music to cover up the sound. I stopped to drink some water between songs, when some of my neighbors started yelling "play." For some reason, though, I didn't do anything for a few seconds, and I heard the guy, Frank's, voice call out "keep playing or I'm not going to cum" through the walls. I listened a while longer to see if I'd heard correctly, and they both kept moaning the same thing. It was at this point that I came to a terrible conclusion. In my attempts to cover up the sound of them having sex, I managed to pull some weird Pavlovian trick where whenever they had sex, I played guitar and sang. Thus, whenever I started to play guitar to cover up an original sound, it just added to their voyeuristic thrill and they started to depend upon it to finish. When I'd heard my presumed neighbors yell sing, it was actually Frank and his girlfriend. Unsure if I was right, I started playing another song and when I finished, they were going as hard as possible and moaning heavily so I figured that I'd assumed correctly.
​
My neighbors them get understandably angry that my music playing has made this neighbor couple have sex, so then ***they*** begin to have really rough revenge sex against my wall because they think that I've caused this problem (which I have). At this point, I'm listening to Frank and his girlfriend and the couple next to my wall, one couple horny and one full of revenge, and all of this was because I tried to save myself from listening to sex in the first place.
​
Edit: here's a video I uploaded as proof that I'm actually playing music. They weren't having sex this morning, so everyone will have to leave that part to their imagination. [https://www.youtube.com/watch?v=PYOP3n2pxac&feature=youtu.be](https://www.youtube.com/watch?v=PYOP3n2pxac&feature=youtu.be)
2nd Edit: Wow, this really blew up. Hopefully everyone enjoyed the story! Regarding proof of their sex, I’m not going to record the sound of my neighbors screwing and upload it to the internet, so my apologies there. To answer everyone’s questions, the song is an original, but I’ve never recorded anything professionally and I play as a hobby.
3rd Edit: This a few months later, but some people said that we should try to record the song, so we did! Hope those few that see this enjoy it! [https://open.spotify.com/track/3XFE8bZTZmaXt9uwWcPBol?si=McCbAVFsQ0C8ih6qmaRNDw](https://open.spotify.com/track/3XFE8bZTZmaXt9uwWcPBol?si=McCbAVFsQ0C8ih6qmaRNDw)
TL;DR: Thought I was covering up sex sounds with music, turns out I was serenading a couple while they fucked and keeping them horny all night. Neighbors had angry sex against my bedroom wall as revenge for disturbing their sleep because I acted as a musical facilitator. | 0non-cybersec
| Reddit | 910 | 3,628 |
Talked to someone who claimed Raspberry Pis are illegal in Canada. I stopped in at a computer retail store that I walk past on my way to the bus stop after work. Sales guy asked if he could help me so I said I was thinking of getting a Raspberry Pi and he said they are illegal in Canada and so they don't carry them.
I was confused as I had never heard of that before so I said, "No they fucking aren't". And he insisted that they are and told me to look it up. He said it had to do with how easy it is to turn them into illegal streaming boxes.
My BS meter was pinging pretty loudly seeing as the Android TV boxes in the case behind him are just as easily turned into streaming systems and every single computer in the shop can do the same thing. He kept saying that it was something about the instruction set that made RPis better at it than any other platform.
So I spent the bus ride home trying to google legal issues around raspberry pis but I came up blank.
So was he just misinformed, was he intentionally bullshitting me in hopes that I would buy a more expensive Android Box, or is there anything to what he was saying? | 0non-cybersec
| Reddit | 260 | 1,135 |
How do I restore the display state in FreeCommander?. <p>How can the display state in FreeCommander for files/folders be restored to the initial state (as after installation)?</p>
<p>I have inadvertently changed the display state, see below, in <a href="http://en.wikipedia.org/wiki/FreeCommander" rel="nofollow noreferrer">FreeCommander</a> and I can't figure out how to get back to the previous state. I don't want both the folder hierarchy and the one folder view in each panel. I only want the one folder view in each panel, corresponding to the scratched out parts not being there in this illustration:</p>
<p><img src="https://i.stack.imgur.com/G2BhV.png" alt="alt text"></p>
| 0non-cybersec
| Stackexchange | 188 | 684 |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange | 349 | 1,234 |
So a guy spends 20 years trying to find his dream girl.... They finally meet and have been dating for quite awhile now. The one thing he has always wanted to try is anal.
He has a master plan....He buys her a fancy dress...hires a limo to take her to an amazing dinner......off to an amazing hotel overlooking the beach.....
he works his magic in the bedroom.......the excitement builds......and he decides this is the moment.
He bends her over and slips it right into her ass...
WOAH!!! she says.... THAT'S MIGHTY PRESUMPTUOUS.
WOAH!!!! he says..... THAT'S A MIGHTY BIG WORD FOR A 12 YR OLD. | 0non-cybersec
| Reddit | 159 | 598 |
License Compatibility: CC-BY-NC 3.0 with GPL2 (for Wordpress)?. <p>I'm trying to figure out if I can use code licensed under Creative Commons Attribution-NonCommercial 3.0 (CC-BY-NC 3.0) in a Wordpress plugin (which must be released under GPL). I <em>think</em> the answer is "no," based on here (<a href="https://www.gnu.org/licenses/license-list.en.html#CC-BY-NC" rel="nofollow">https://www.gnu.org/licenses/license-list.en.html#CC-BY-NC</a>), but I find the whole licensing mess to be just incomprehensible.</p>
<p>Basically, I already have a plugin that uses Fancybox (<a href="http://fancybox.net/" rel="nofollow">http://fancybox.net/</a>). Prior to v2.0 this was licensed under GPL; unfortunately, the author decided to release v2.0+ under CC-BY-NC (<a href="http://fancyapps.com/fancybox/#license" rel="nofollow">http://fancyapps.com/fancybox/#license</a>). 1.x is now extremely outdated and is having some problems with newer releases of WP.</p>
<p>So what I'm trying to figure out is, can I update the copy of Fancybox that I'm bundling with my plugin to 2.0? I think the answer is "no," because the author changed its license to CC-BY-NC. But I just want to make sure, before I start spinning my wheels and looking for a totally new solution...</p>
| 0non-cybersec
| Stackexchange | 392 | 1,265 |
Can the following Domain Entity contain logic for creating/deleting other entities?. <p>a) As far as I understand it, in most cases <em>Domain Model</em> <strong>DM</strong> doesn't contain code for creating/deleting <em>domain entities</em>, but instead it is the job of layers ( ie <em>service layer</em> or <em>UI layer</em> ) on top of <strong>DM</strong> to create/delete <em>domain entities</em>? </p>
<p>b) <em>Domain entities</em> are modelled after <em>real world entities</em>. Assuming particular <em>real world entity</em> being abstracted does have the functionality of creating/deleting other <em>real world entities</em>, then I assume the <em>domain entity</em> abstracting this <em>real world entity</em> could also contain logic for creating/deleting other entities? </p>
<pre><code>class RobotDestroyerCreator
{
...
void heavyThinking()
{
...
if(...)
unitOfWork.registerDelete(robot);
...
if(...)
{
var robotNew = new Robot(...);
unitOfWork.registerNew(robotNew);
{
...
}
}
</code></pre>
<p>Thank you</p>
| 0non-cybersec
| Stackexchange | 335 | 1,269 |
Disabling the prompt to "Click Continue to permanently get access to this folder" (e.g. via GPO). <p><a href="http://support.microsoft.com/en-us/kb/950934" rel="nofollow noreferrer">http://support.microsoft.com/en-us/kb/950934</a> describes the manner in which, when a member of the Administrators group uses Explorer to navigate to a folder to which the Administrators group has permission, the user will be prompted to "Click Continue to permanently get access to this folder".</p>
<p>When they do this, Explorer alters the ACL of the folder to grant that specific user Full Control to the folder. The MS link describes exactly the design constraint that requires it to be this way.</p>
<p>However, it ruins the permission set for that folder and makes central management of permissions effectively impossible. For example, if the named user is later removed from the Administrators group, that ACL entry still exists to permit them access to that folder.</p>
<p>I'm not looking to disable UAC (I actually <em>like</em> the distinction between elevated and non-elevated), and I am happy to use alternative tools to navigate and view files in an elevated fashion. </p>
<p>The eventual intent is to run one of the workarounds described in the MS link (either using a separate file navigator that <em>can</em> run elevated, or defining a separate group to control access to the whitelisted folders) but, all the time Explorer continues to clobber the ACLs of the folder, at will, it makes it impossible to identify where these workarounds need to be applied (short of regularly auditing every folder for ACL changes).</p>
<p>I would simply prefer to have the standard "access denied" message, if I attempt to access a restricted folder when running non-elevated in Explorer.</p>
<p><strong>Is there a setting (either one-time on each box, or via GPO) that removes this "permanently get access" prompt, <em>while retaining the other facilities of UAC</em>?</strong></p>
<p><em>NB: I fully understand why this prompt exists, what it means and why the behaviour is as it is (although I don't necessarily agree with the design decision). However, I should point out that I am not looking to discuss workarounds relating to the working practice of my users, nor the merits/pitfalls of UAC or Administrators group membership.</em></p>
| 0non-cybersec
| Stackexchange | 583 | 2,349 |
Spring HATEOAS ControllerLinkBuilder with methodOn. <p>One thing I do not understand when using <strong>ControllerLinkBuilder</strong> with <strong>methodOn</strong> feature is what are you suppose to do when your Controller has method signature like so:</p>
<pre><code>public HttpEntity<ResourceSupport> update(@PathVariable(USER_ID) Long userId, @Valid @RequestBody UserUpdateRequest userUpdateRequest, BindingResult bindingResult)
</code></pre>
<p>So whenever I wish to use <strong>methodOn</strong>, how am I to fill the blanks like <strong>UserUpdateRequest</strong> argument and <strong>BindingResult</strong> (I use binding result to handle bad request exceptions with @ControllerAdvice and JSR 303 to make output messages human readable).</p>
<p>When I wish use out of the box spring HATEOAS <strong>ControllerLinkBuilder</strong> for more ease with <strong>methodOn</strong> I end up writing something like this (mind me I do not know if this will not backfire but the code does not look comforting): </p>
<pre><code>resource.add(linkTo(methodOn(UserController.class).update(userId, null, null)).withSelfRel());
</code></pre>
<p>Ofcourse I can omit the <strong>methodOn</strong> part and just use <strong>linkTo</strong> which would then require me to play around building the path.</p>
<p>Is it appropriate to just pass on <strong>null</strong> refs ? Plus how is it convenient using <strong>methodOn</strong> as if you decide to remove say: <strong>BindingResult</strong> or add something like <strong>HttpServletRequest</strong> to the controller method signature so that spring could pass me more info about request if I wanted to log an IP address for some security reason. This would require me to go and change the link construction part using <strong>methodOn</strong>.</p>
<p>Another question that is bit boggling me is say I pass a legitimate ref to <strong>methodOn</strong> like <strong>userUpdateRequest</strong> filled with data - does that data suppose to go anywhere with the generated link ? I've seen some Hypermedia that include along with rel and href a body of what you pass - is that possible with Spring HATEOAS and is it a good practice to create links with ready to post/put payloads in them ?</p>
<p>But getting back to <strong>ControllerLinkBuilder</strong> using only <strong>linkTo</strong> method building links with <strong>.slash("...")</strong> - is it potentially less maintenance costly ?</p>
<p>In day to day practice what would you recommend and what do you think about link construction ? Maybe someone could provide professional tips/advices.</p>
<p>Thank You,</p>
| 0non-cybersec
| Stackexchange | 672 | 2,629 |
Which header defines the macro that specifies the machine architecture?. <p><em>Shorter version of question:</em></p>
<p>Which C header contains the macro that corresponds to the machine architecture of the system (e.g., <code>__x86_64__</code>, <code>__ia64__</code>, <code>__mips__</code>?)</p>
<p><em>Longer version of question:</em></p>
<p>I'd like to run the <a href="http://ganglia.info/" rel="noreferrer">ganglia</a> monitoring tools on a <a href="http://tilera.com/" rel="noreferrer">Tilera</a>-based system that runs Linux. </p>
<p>Ganglia doesn't currently have support for Tilera. To get this to work, I ned to modify a C function called <a href="http://sourceforge.net/apps/trac/ganglia/browser/trunk/monitor-core/libmetrics/linux/metrics.c#L523" rel="noreferrer">machine_type_func</a> that returns the machine architecture. The body of this function is determined at compile-time, it looks like this:</p>
<pre><code>g_val_t
machine_type_func ( void )
{
g_val_t val;
#ifdef __i386__
snprintf(val.str, MAX_G_STRING_SIZE, "x86");
#endif
#ifdef __x86_64__
snprintf(val.str, MAX_G_STRING_SIZE, "x86_64");
#endif
...
return val;
}
</code></pre>
<p>I need to add the appropriate line for Tilera, but I don't know the name of the macro that specifies a Tilera-based system. I'm guessing this macro is defined in one of the standard Linux headers, but I don't know which one to look in. </p>
| 0non-cybersec
| Stackexchange | 468 | 1,415 |
What is a mapping class group, and how can we use it to understand fibrations of 3-manifolds when the fiber is a surface?. <p>So I'm reading this book, kind of committed to reading the entire thing, and in the section I'm up to the author starts using some language regarding monodromies and mapping class groups. Having never studied that particular topic, I find myself getting stuck on some really basic stuff.</p>
<p>I looked up monodromies in Ratcliff's Foundations of Hyperbolic Manifolds, and found a nice discussion of moduli spaces, including the definition of a mapping class group. I also found some info about monodromies in Bredon's Topology and Geometry and that part I understood, just don't know how it ties in. Ratcliff defines the mapping class group like so:</p>
<p>Let $M$ be a closed surface of non-positive Euler characteristic.
Let $\text{Hom}(M)$ be the set of homeomorphisms from $M$ to itself, given a group structure via composition.
Let $\text{Hom}_1(M)$ be the subgroup of $\text{Hom}(M)$ consisting of homeomorphisms homotopic to the identity.
The mapping class group is then Map$(M):=\text{Hom}(M)/\text{Hom}_1(M)$.</p>
<p>Okay, first embarrassing question: how can a homeomorphism not be homotopic to the identity map? As far as I know, you can deform an object much more drastically using a homotopy than you can using a homeomorphism. The only example I can think of where a homeomorphism of a surface is not homotopic to the identity is when the surface has more than one connected component and the homeomorphism interchanges some of them. I'm sure there must be less trivial examples or this thing would be kind of useless.</p>
<p>Once I understand the mapping class group, I'm interested in how one would use it to get information about a 3-manifold, knowing that it has a particular fibration with a known surface as the fiber. I expect it should give some information about how the surface had to be deformed to get embedded in the manifold, but right now I can't see how it does.</p>
<p>Thanks in advance for any help!</p>
| 0non-cybersec
| Stackexchange | 511 | 2,076 |
Update an existing array element with jsonnet. <p>I am using jsonnet to read in a value which consists of an array. I want to modify the first element in that array to add a value. The data structure looks like this:</p>
<pre><code>{
"my_value": [
{
"env": "something"
},
{
"var": "bar"
}
]
}
</code></pre>
<p>I want to add a value to <code>my_value[0]</code>. How can I reference that in jsonnet?</p>
| 0non-cybersec
| Stackexchange | 145 | 452 |
Webtrends tracking parameters on our site URLs are causing duplicate content and SEO problems. <p>We have some issue with duplicate content on Google SERP. The problem is that we are using Click Tracking on Webtrends that adds a parameter after the URL. This is what a URL can look like when Webtrends loads on the webpage: <code>https://www.example.com/private/loan.html?WT.ac=xxxxx-xxxx_xxx_animate_loan_button-v1&WT.svl=Menu</code></p>
<p>As I am aware Google Crawl the links and adds also the parameters so this content is duplicated because if you remove everything after <code>?WT.ac</code> the same content is shown.</p>
<p>How can I prevent either Webtrends to stoop adding this or make Google not crawl these parameters? I have seen some ideas but not found a real answer I can use:</p>
<ol>
<li>Add self-referral</li>
<li>noindex on parameter "WT.xx=.*"</li>
<li>Add the parameters after crawl with JavaScript</li>
<li>Add the parameter to a meta-tag</li>
</ol>
<p>I am not so familiar with which method I can use and is the best? </p>
| 0non-cybersec
| Stackexchange | 306 | 1,054 |
What cases exist for the new iPad (3rd generation) most similar to Apple's 1st generation case?. <p>I am looking for cases that fit the full size iPad with retina displays (3rd and 4th generation) and function similarly to the original black case from Apple for the first generation iPad.</p>
<p>The aspects most appealing from that original design were:</p>
<ul>
<li>slim - visually and form fitting without adding the bulk of an Otterbox product.</li>
<li>wedge for two angles (yes the vertical placement wasn't the most stable)</li>
<li>no covers on the screen or the ports letting all charging cables and controls work well</li>
<li>light drop, scratch and bump protection</li>
<li>durable (having seen over 25 case designs wear over 6+ months - the Apple one is surprisingly durable)</li>
<li>reputable warranty service (you can call for an exchange without hassle if it starts tearing 6 months into use)</li>
</ul>
<p>The closest case (that isn't shipping yet) I have seen is the <a href="http://goincase.com/products/detail/magazine-jacket-cl60129/3" rel="nofollow">incase Magazine Jacket</a>. What cases meet any (or many) of the criteria listed above?</p>
| 0non-cybersec
| Stackexchange | 315 | 1,172 |
how to convert .dae to .scn files in SceneKit. <p>This is a screenshot from Apple's Fox sample code. As you can see, they use .scn file format for graphics object. They explicitly state in the wwdc2015 video that this was done by an artist. So far I only worked with .dae and was until recently convinced that this is the only supported format. My question is, how do I export objects stored in .dae file to .scn file?</p>
<p><a href="https://i.stack.imgur.com/3PhCC.png" rel="noreferrer"><img src="https://i.stack.imgur.com/3PhCC.png" alt="enter image description here"></a></p>
<p>EDIT: this is what I get if go to Editor-> Convert to SceneKit scene file format (.scn)</p>
<p><a href="https://i.stack.imgur.com/5VoEU.png" rel="noreferrer"><img src="https://i.stack.imgur.com/5VoEU.png" alt="enter image description here"></a></p>
| 0non-cybersec
| Stackexchange | 263 | 836 |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange | 349 | 1,234 |
Encounter Order wrong when sorting a parallel stream. <p>I have a <code>Record</code> class:</p>
<pre><code>public class Record implements Comparable<Record>
{
private String myCategory1;
private int myCategory2;
private String myCategory3;
private String myCategory4;
private int myValue1;
private double myValue2;
public Record(String category1, int category2, String category3, String category4,
int value1, double value2)
{
myCategory1 = category1;
myCategory2 = category2;
myCategory3 = category3;
myCategory4 = category4;
myValue1 = value1;
myValue2 = value2;
}
// Getters here
}
</code></pre>
<p>I create a big list of a lot of records. Only the second and fifth values, <code>i / 10000</code> and <code>i</code>, are used later, by the getters <code>getCategory2()</code> and <code>getValue1()</code> respectively.</p>
<pre><code>List<Record> list = new ArrayList<>();
for (int i = 0; i < 115000; i++)
{
list.add(new Record("A", i / 10000, "B", "C", i, (double) i / 100 + 1));
}
</code></pre>
<p>Note that first 10,000 records have a <code>category2</code> of <code>0</code>, then next 10,000 have <code>1</code>, etc., while the <code>value1</code> values are 0-114999 sequentially.</p>
<p>I create a <code>Stream</code> that is both <code>parallel</code> and <code>sorted</code>.</p>
<pre><code>Stream<Record> stream = list.stream()
.parallel()
.sorted(
//(r1, r2) -> Integer.compare(r1.getCategory2(), r2.getCategory2())
)
//.parallel()
;
</code></pre>
<p>I have a <code>ForkJoinPool</code> that maintains <code>8</code> threads, which is the number of cores I have on my PC.</p>
<pre><code>ForkJoinPool pool = new ForkJoinPool(8);
</code></pre>
<p>I use the trick <a href="https://stackoverflow.com/questions/21163108/custom-thread-pool-in-java-8-parallel-stream">described here to submit a stream processing task to my own <code>ForkJoinPool</code> instead of the common <code>ForkJoinPool</code></a>.</p>
<pre><code>List<Record> output = pool.submit(() ->
stream.collect(Collectors.toList()
)).get();
</code></pre>
<p>I expected that the parallel <code>sorted</code> operation would respect the encounter order of the stream, and that it would be a <em>stable</em> sort, because the <code>Spliterator</code> returned by <code>ArrayList</code> is <code>ORDERED</code>.</p>
<p>However, simple code that prints out the elements of the resultant <code>List</code> <code>output</code> in order shows that it's not quite the case.</p>
<pre><code>for (Record record : output)
{
System.out.println(record.getValue1());
}
</code></pre>
<p>Output, condensed:</p>
<pre><code>0
1
2
3
...
69996
69997
69998
69999
71875 // discontinuity!
71876
71877
71878
...
79058
79059
79060
79061
70000 // discontinuity!
70001
70002
70003
...
71871
71872
71873
71874
79062 // discontinuity!
79063
79064
79065
79066
...
114996
114997
114998
114999
</code></pre>
<p>The <code>size()</code> of <code>output</code> is <code>115000</code>, and all elements appear to be there, just in a slightly different order.</p>
<p>So I wrote some checking code to see if the <code>sort</code> was stable. If it's stable, then all of the <code>value1</code> values should remain in order. This code verifies the order, printing any discrepancies.</p>
<pre><code>int prev = -1;
boolean verified = true;
for (Record record : output)
{
int curr = record.getValue1();
if (prev != -1)
{
if (prev + 1 != curr)
{
System.out.println("Warning: " + prev + " followed by " + curr + "!");
verified = false;
}
}
prev = curr;
}
System.out.println("Verified: " + verified);
</code></pre>
<p>Output:</p>
<pre><code>Warning: 69999 followed by 71875!
Warning: 79061 followed by 70000!
Warning: 71874 followed by 79062!
Warning: 99999 followed by 100625!
Warning: 107811 followed by 100000!
Warning: 100624 followed by 107812!
Verified: false
</code></pre>
<p>This condition persists if I do any of the following:</p>
<ul>
<li><p>Replace the <code>ForkJoinPool</code> with a <code>ThreadPoolExecutor</code>.</p>
<pre><code>ThreadPoolExecutor pool = new ThreadPoolExecutor(8, 8, 0, TimeUnit.SECONDS, new ArrayBlockingQueue<>(10));
</code></pre></li>
<li><p>Use the common <code>ForkJoinPool</code> by processing the <code>Stream</code> directly.</p>
<pre><code>List<Record> output = stream.collect(Collectors.toList());
</code></pre></li>
<li><p>Call <code>parallel()</code> <em>after</em> I call <code>sorted</code>.</p>
<pre><code>Stream<Record> stream = list.stream().sorted().parallel();
</code></pre></li>
<li><p>Call <code>parallelStream()</code> instead of <code>stream().parallel()</code>.</p>
<pre><code>Stream<Record> stream = list.parallelStream().sorted();
</code></pre></li>
<li><p>Sort using a <code>Comparator</code>. Note that this sort criterion is different that the "natural" order I defined for the <code>Comparable</code> interface, although starting with the results already in order from the beginning, the result should still be the same.</p>
<pre><code>Stream<Record> stream = list.stream().parallel().sorted(
(r1, r2) -> Integer.compare(r1.getCategory2(), r2.getCategory2())
);
</code></pre></li>
</ul>
<p>I can only get this to preserve the encounter order if I don't do one of the following on the <code>Stream</code>:</p>
<ul>
<li>Don't call <code>parallel()</code>.</li>
<li>Don't call any overload of <code>sorted</code>.</li>
</ul>
<p>Interestingly, the <code>parallel()</code> without a sort preserved the order.</p>
<p>In both of the above cases, the output is:</p>
<pre><code>Verified: true
</code></pre>
<p>My Java version is 1.8.0_05. This anomaly also <a href="http://ideone.com/vli0tC" rel="nofollow noreferrer">occurs on Ideone</a>, which appears to be running Java 8u25.</p>
<p><strong>Update</strong></p>
<p>I've upgraded my JDK to the latest version as of this writing, 1.8.0_45, and the problem is unchanged.</p>
<p><strong>Question</strong></p>
<p>Is the record order in the resultant <code>List</code> (<code>output</code>) out of order because the sort is somehow not stable, because the encounter order is not preserved, or some other reason?</p>
<p>How can I ensure that the encounter order is preserved when I create a parallel stream and sort it?</p>
| 0non-cybersec
| Stackexchange | 2,168 | 6,454 |
Writing an Infinite Union as the Union of Disjoint Sets. <p>According to my lecture notes, with the help of a little "trick" it is possible to write an infinte union of sets as the infinite union of disjoint sets as follows:</p>
<p>$$A = \bigcup \limits_{k=1}^{\infty} A_k = \bigcup \limits_{k=1}^{\infty} \tilde{A_k}$$</p>
<p>with the disjoint sets $\tilde{A_k}$ whereas $\tilde{A_1} := A_1$ and $\tilde{A_k} := A_k \setminus A_{k-1}$ for $k \geq 2$.</p>
<p>My question: Given we have three sets $A_1,A_2$ and $A_3$ and none of them is disjoint. When I define $\tilde{A_3}$ as $A_3 \setminus A_2$ I don't see how $A_1$ and $A_3$ are supposed to be disjoint..so on what am I missing out?</p>
| 0non-cybersec
| Stackexchange | 250 | 695 |
Ref request: modelling regular theories as an injectivity condition. <p>The background to the following observation is standard material in categorical logic, and I thought this was was too — I don’t remember learning it, but I don’t think it is original — but I can’t now find it anywhere in the literature. Does it ring a bell to anyone? Even if it is not in print, I would be interested to know if people have heard this discussed informally, to get an idea of which communities this is folklore in.</p>
<p>Recall: a <em>regular</em> formula (over a signature $\Sigma$) is a formula constructed just from atomic formulas, finite conjunction, and existential quantification. $\newcommand{\x}{{\vec x}}\newcommand{\y}{{\vec y}}$Any regular sequent $\varphi(\x) \vdash_\x \psi(\x)$ is derivably equivalent to one in <em>regular normal</em> form, i.e. $\varphi'(\x) \vdash_{\vec x} \exists \y.\ \psi'(\x,\y)$, where $\varphi'$, $\psi'$ are conjunctions of atomics and $\psi'(\x,\y) \vdash_{\x,\y} \varphi'(\x)$ is derivable (this is D1.3.10 in the Elephant).</p>
<p>If $\varphi(\x)$ is any conjunction of atomic formulas, then there is a $\Sigma$-structure $\newcommand{\str}[2]{\langle\!\langle\, #1 \ |\ #2 \,\rangle\!\rangle } \str{\x}{\varphi}$, generated by elements for each variable in $\x$, and with the interpretation just enough to make $\varphi$ hold. This <em>represents</em> the interpretation of $\varphi$: for any other structure $A$, $\newcommand{\Str}{\Sigma\text{-}\mathbf{Str}}\newcommand{\interp}[2]{[\![\, #1 \ |\ #2 \,]\!] } \interp{\x}{\varphi}^A \cong \Str(\str{\x}{\varphi}, A)$.</p>
<p>Then (this is the fact I’m after) a structure validates a regular normal sequent $\varphi(\x) \vdash_{\vec x} \exists \y.\ \psi(\x,\y)$ just if it is <em>injective</em> w.r.t. the obvious map $\str{\x}{\varphi} \to \str{\x,\y}{\psi}$. Correspondingly, being a model of a regular theory $\mathbf{T}$ is a small-injectivity condition.</p>
| 0non-cybersec
| Stackexchange | 569 | 1,956 |
Scaling AngularJS + NodeJS app on Linode. <p>I have developed an application using AngularJS + NodeJS (together with MariaDB, Redis and Socket.io for realtime notifications) and I have deployed it on a single Linode node. Now I would like to organize the architecture in a way I can easily scale the application in case of traffic increases in the future.</p>
<p>So my idea is to prepare everything as follow:</p>
<ul>
<li>1 Linode LoadBalancer server that will be the main point and will redirect the requestes coming from the users</li>
<li>1 Linode node server where I will install Nginx that, acting as a reverse proxy, redirects to the NodeJS server in the same node</li>
<li>1 Linode node server for MariaDB and Redis server</li>
</ul>
<p>so when I need to scale I add a new node with Nginx + NodeJS. For MariaDB + Redis I would set the clustering for both (I use Redis for the session and MariaDB for the data).</p>
<p>Now my doubts are the following:</p>
<ul>
<li><p>what would be the proper architecture for the application?</p></li>
<li><p>where should I put the AngularJS app, on the LoadBalancer or on each node?</p></li>
<li><p>do I need nginx acting as reverse proxy on each node?</p></li>
</ul>
<p>Thank you!</p>
| 0non-cybersec
| Stackexchange | 362 | 1,234 |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange | 349 | 1,234 |
After name server change, DNS queries on and off. <p>I migrated the domain www.pantego.com to a different name server. We were using the Enom registrar and their default name servers, but I migrated them to AWS Route 53. I know all records were copied over, but the domain seems to go up and down at random. Sometimes the website works, and sometimes it doesn't. This corresponds to when nslookup works and doesn't work. The previous TTL was two days and it has not been that long yet, however, why does DNS go up and down for my site? Other users report this too. Any help is appreciated.</p>
<p>Edit:</p>
<p>Dig always works - nslookup (and therefore ping and http requests) don't always work. I did notice that pinging ns1.pantego.com and ns2.pantego.com return the old IPs, but nothing should be using those addresses anyways? Both the old name server and the new name server have the same settings. I will remove the old one when the TTL expires.</p>
| 0non-cybersec
| Stackexchange | 247 | 958 |
How to use parameters within the filter in AngularJS?. <p>I want to use parameter in filter, when I iterate some arrays with ng-repeat</p>
<p>Example:</p>
<p>HTML-Part:</p>
<pre><code><tr ng-repeat="user in users | filter:isActive">
</code></pre>
<p>JavaScript-part:</p>
<pre><code>$scope.isActive = function(user) {
return user.active === "1";
};
</code></pre>
<p>But I want to be able to use filter like</p>
<pre><code><tr ng-repeat="user in users | filter:isStatus('4')">
</code></pre>
<p>But its not working. How can I do something like that?</p>
| 0non-cybersec
| Stackexchange | 209 | 575 |
Unique decomposition of $c$ sums of products of $k$ numbers greater than 1, allowing duplicates?. <p>This question differs from <a href="https://math.stackexchange.com/questions/387441/unique-decomposition-of-c-sums-of-products-of-k-prime-numbers-allowing-dupl">Unique decomposition of $c$ sums of products of $k$ prime numbers, allowing duplicates?</a> in that prime number restriction is changed to any number greater than 1.</p>
<p>Suppose that there are $n$ different numbers greater than 1. Define procedure a) as following ($k \leq n$ and $k$ fixed): procedure a) for each time, we select one number out of $n$ possible cases and multiply it to the product (number may be repeated). For the first time, we choose a number and that is the product. We do this $k$ times.</p>
<p>Then, we do the following for $c$ times where $c$ is fixed: procedure b) we define variable $z$. For the first time procedure b) is started, $z = 0$. Now call procedure a) and get a result into variable $y$. Then we add $y$ to $z$ - and the sum replaces the original value of $z$ into $z$. We repeat this $c$ times.</p>
<p>So, step is: we call procedure b) (which then recursively calls procedure a) ) and see the result $z$.</p>
<p>Now the question is, is this $z$ unique in its decomposition, given $k$ and $c$? (So, there would be $c$ sums of product of $k$ numbers greater than 1, allowing duplicates.)</p>
<p>Or if not, what would be the general rule when this holds?</p>
<p>For every step, the set of $n$ numbers greater than 1 remains the same - that is, it does not change.</p>
| 0non-cybersec
| Stackexchange | 454 | 1,574 |
Injecting external dependencies in Microsoft Bot Framework Dialog using Autofac. <p>I've been trying to pass a service to a LuisDialog from the MessagesController like so:</p>
<pre><code>public async Task<HttpResponseMessage> Post([FromBody]Activity activity)
...
await Conversation.SendAsync(activity, () => new ActionDialog(botService));
</code></pre>
<p>The botService is injected into the MessageController using dependency injection.</p>
<p>When I start a bot conversation I get an error:</p>
<p>Type 'ThetaBot.Services.BotService' in Assembly 'ThetaBot.Services, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null' is not marked as serializable.</p>
<p>Looking around for a solution I can find:
<a href="https://github.com/Microsoft/BotBuilder/issues/106" rel="noreferrer">https://github.com/Microsoft/BotBuilder/issues/106</a></p>
<blockquote>
<p>I understand your question better now. We have a similar issue with service objects that we want to instantiate from the container rather than from the serialized blob. Here is how we register those objects in the container - we apply special handling during deserialiation for all objects with the key Key_DoNotSerialize:</p>
</blockquote>
<pre><code>builder
.RegisterType<BotToUserQueue>()
.Keyed<IBotToUser>(FiberModule.Key_DoNotSerialize)
.AsSelf()
.As<IBotToUser>()
.SingleInstance();
</code></pre>
<p>However I cannot find an example or documentation that details how to register your own dependencies into the existing Bot Framework modules.</p>
<p>I also found <a href="https://github.com/Microsoft/BotBuilder/issues/252" rel="noreferrer">https://github.com/Microsoft/BotBuilder/issues/252</a> which indicates that it should be possible to instantiate the dialogs from the container. </p>
<p>I have tried this suggestion:</p>
<pre><code>Func<IDialog<object>> makeRoot = () => actionDialog;
await Conversation.SendAsync(activity, makeRoot);
</code></pre>
<p>Together with:</p>
<pre><code>builder
.RegisterType<ActionDialog>()
.Keyed<ActionDialog>(FiberModule.Key_DoNotSerialize)
.AsSelf()
.As<ActionDialog>()
.SingleInstance();
</code></pre>
<p>This does not work.</p>
<p>I have also tried:</p>
<pre><code>var builder = new ContainerBuilder();
builder.RegisterModule(new DialogModule_MakeRoot());
// My application module
builder.RegisterModule(new ApplicationModule());
using (var container = builder.Build())
using (var scope = DialogModule.BeginLifetimeScope(container, activity))
{
await Conversation.SendAsync(activity, () => scope.Resolve<ActionDialog>());
}
</code></pre>
<p>Together with the following in the ApplicationModule:</p>
<pre><code> builder
.RegisterType<ActionDialog>()
.Keyed<ActionDialog>(FiberModule.Key_DoNotSerialize)
.AsSelf()
.As<ActionDialog>()
.SingleInstance();
</code></pre>
<p>This does not work and I encounter the same issue.</p>
<p>If I simply mark all the services and their dependencies as serializable I can get this to work without the need to use FiberModule.Key_DoNotSerialize.</p>
<p>The question is - what is the correct / preferred / recommended way to register and inject dependencies into Bot Framework Dialogs?</p>
| 0non-cybersec
| Stackexchange | 990 | 3,413 |
Peer review of C# cryptography for Azure Table security. <p>Edit: Update - I am researching how to implement AES with authentication in an efficient way for this project. If you have the time I'd appreciate your skill in finding the best implementation for this FOSS project.</p>
<hr>
<p>Could you folks review and comment on the <a href="http://azuretableencrypt.codeplex.com/SourceControl/list/changesets" rel="nofollow noreferrer">encryption code I just posted</a> on Codeplex? The intent is to use this as a foundation for encrypting Azure Table properties and prevent any unauthorized MSFT employee from casually browsing or editing my data. It's a working sample that should use any public private key pair on your local system. Just make sure you set permissions on your private key correctly.</p>
<p>For Azure Table, I want to encrypt each and every property below (including rowkey and partitionkey) using a symmetric key. </p>
<pre><code>public class ContactDataModel :TableServiceEntity
{
public ContactDataModel(string partitionKey, string rowKey)
: base(partitionKey, rowKey)
{
}
public ContactDataModel(): this(Guid.NewGuid().ToString(), String.Empty)
{
}
public string Name { get; set; }
public string Address { get; set; }
// Used to rotate keys, while allowing old data to still be read
public int EncryptionVersion {get;set;}
}
</code></pre>
<p>I intend to store the encrypted version of the symmetric key, and the nonencrypted IV on Azure Table storage. The overall design assumes that an encrypted symmetric key renders all other encrypted table data useless, even if the IV is available.</p>
<p>The symmetric key is encrypted with a RSA key that is <a href="https://security.stackexchange.com/questions/2514/key-management-in-cloud-datacenters/3731#3731">securely delivered to my Azure Role instance</a>.</p>
<p><strong>Known issues:</strong></p>
<p>I do know that I'm missing a seed in my symmetric encryption. How would I implement this from a Crypto perspective?</p>
| 0non-cybersec
| Stackexchange | 535 | 2,056 |
Working moms- How do you do it?. Hi, r/parenting. I do not have children, but I will be trying sometime in the near future, and my spouse and I have recently gone over finances and realized that I will have to return to work after having a baby. This has always been a fear of mine, and I'm wondering how working moms do it. What tips do you have? Do you feel guilty? What happens if your kid gets sick, does your job understand? How do you not die of exhaustion? I'm very interested in any information and all different experiences, thank you! | 0non-cybersec
| Reddit | 129 | 545 |
Webcam not working nor detected. <p>I recently bought Acer Aspire E3-111-C10N (8GB version), and to my surprise webcam is not working.</p>
<p>lspci:</p>
<pre><code>00:00.0 Host bridge: Intel Corporation Atom Processor Z36xxx/Z37xxx Series SoC Transaction Register (rev 0e)
00:02.0 VGA compatible controller: Intel Corporation Atom Processor Z36xxx/Z37xxx Series Graphics & Display (rev 0e)
00:13.0 SATA controller: Intel Corporation Device 0f23 (rev 0e)
00:14.0 USB controller: Intel Corporation Atom Processor Z36xxx/Z37xxx Series USB xHCI (rev 0e)
00:1a.0 Encryption controller: Intel Corporation Atom Processor Z36xxx/Z37xxx Series Trusted Execution Engine (rev 0e)
00:1b.0 Audio device: Intel Corporation Atom Processor Z36xxx/Z37xxx Series High Definition Audio Controller (rev 0e)
00:1c.0 PCI bridge: Intel Corporation Device 0f48 (rev 0e)
00:1c.1 PCI bridge: Intel Corporation Device 0f4a (rev 0e)
00:1c.2 PCI bridge: Intel Corporation Device 0f4c (rev 0e)
00:1f.0 ISA bridge: Intel Corporation Atom Processor Z36xxx/Z37xxx Series Power Control Unit (rev 0e)
00:1f.3 SMBus: Intel Corporation Device 0f12 (rev 0e)
02:00.0 Network controller: Qualcomm Atheros QCA9565 / AR9565 Wireless Network Adapter (rev 01)
03:00.0 Ethernet controller: Realtek Semiconductor Co., Ltd. RTL8111/8168/8411 PCI Express Gigabit Ethernet Controller (rev 0c)
</code></pre>
<p>lsusb:</p>
<pre><code>Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
Bus 001 Device 007: ID 0489:e078 Foxconn / Hon Hai
Bus 001 Device 002: ID 05e3:0608 Genesys Logic, Inc. USB-2.0 4-Port HUB
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
</code></pre>
<p>How you see, linux is not detecting my webcam, so do you have any ideas?
And yes, Cheese, GTK UVC and Skype also cold not reach my webcam.</p>
| 0non-cybersec
| Stackexchange | 607 | 1,802 |
Control shooting frequency when the button to shoot is pressed?. <p>The bullets shoot all at once when the button is pressed but I only want them to shoot once every 0.5 seconds if the button to shoot is pressed.</p>
<p>I have tried to import time and delay the bullets but it just delayed pygame itself.</p>
<p>Is there any way that I can regulate how frequent the character can shoot?</p>
<pre><code>import pygame
pygame.init()
win = pygame.display.set_mode((700, 480))
pygame.display.set_caption("First project")
run = True
red = (255, 0, 0)
green = (0, 255, 0)
def drawbg():
pygame.display.update()
win.fill((255, 255, 255))
for bullet in bullets:
bullet.draw(win)
class person(object):
def __init__(self, x, y, width, height):
self.x = x
self.y = y
self.width = width
self.height = height
self.vel = 5
self.IsJump = False
self.jumpCount = 10
self.left = False
self.right = False
class projectile(object):
def __init__(self, x, y, radius, colour, facing):
self.x = x
self.y = y
self.radius = radius
self.colour = colour
self.facing = facing
self.vel = 7 * facing
def draw(self, win):
pygame.draw.circle(win, self.colour, (self.x, self.y), self.radius)
man = person(100, 400, 50, 60)
man2 = person(500, 400, 50, 60)
bullets = []
while run:
pygame.time.delay(25)
for bullet in bullets:
if bullet.x < 700 and bullet.x > 0:
bullet.x += bullet.vel
else:
bullets.pop(bullets.index(bullet))
for event in pygame.event.get():
if event.type == pygame.QUIT:
run = False
keys = pygame.key.get_pressed()
if keys[pygame.K_g]:
if man.left:
facing = -1
else:
facing = 1
if len(bullets) < 5:
bullets.append(projectile(man.x + man.width//2, round(man.y + man.height/2), 6, (100, 100, 100), facing))
if keys[pygame.K_p]:
if man2.left:
facing = -1
else:
facing = 1
if len(bullets) < 50:
bullets.append(projectile(man2.x + man2.width//2, round(man2.y + man2.height/2), 6, (0, 0, 0), facing))
if keys[pygame.K_LEFT] and man2.x > man2.vel:
man2.x -= man2.vel
man2.left = True
man2.right = False
if keys[pygame.K_RIGHT] and man2.x < 700 - man2.width - man2.vel:
man2.x += man2.vel
man2.right = True
man2.left = False
if keys[pygame.K_a] and man.x > man.vel:
man.x -= man.vel
man.left = True
man.right = False
if keys[pygame.K_d] and man.x < 700 - man.width - man.vel:
man.x += man.vel
man.right = True
man.left = False
if not man.IsJump and keys[pygame.K_w]:
man.IsJump = True
man.JumpCount = 10
if man.IsJump:
if man.JumpCount >= -10:
neg = 1
if man.JumpCount < 0:
neg = -1
man.y -= (man.JumpCount ** 2) / 2 * neg
man.JumpCount -= 1
else:
man.IsJump = False
man.JumpCount = 10
if not man2.IsJump and keys[pygame.K_UP]:
man2.IsJump = True
man2.JumpCount = 10
if man2.IsJump:
if man2.JumpCount >= -10:
neg = 1
if man2.JumpCount < 0:
neg = -1
man2.y -= (man2.JumpCount ** 2) / 2 * neg
man2.JumpCount -= 1
else:
man2.IsJump = False
man2.JumpCount = 10
pygame.draw.rect(win, red, (man.x, man.y, man.width, man.height))
pygame.draw.rect(win, green, (man2.x, man2.y, man2.width, man2.height))
drawbg()
pygame.quit()
</code></pre>
| 0non-cybersec
| Stackexchange | 1,310 | 3,815 |
New location of docker actions. <p>I was using this for docker:</p>
<pre><code>- name: Build container image
uses: actions/docker/cli@master
with:
///// removed
- name: Docker Login
uses: actions/docker/login@master
env:
///// removed
</code></pre>
<p>However github.com/actions/docker do not seem to exist anymore.</p>
<p>My builds are giving 404:</p>
<blockquote>
<p>Failed to download action '<a href="https://api.github.com/repos/actions/docker/tarball/master" rel="nofollow noreferrer">https://api.github.com/repos/actions/docker/tarball/master</a>'. Error Response status code does not indicate success: 404 (Not Found).</p>
</blockquote>
<p>Does anyone know the new location?</p>
| 0non-cybersec
| Stackexchange | 228 | 711 |
How to customize colors in Material UI Stepper Step?. <p>I am trying to customize the disabled Step color on <a href="https://material-ui.com/demos/steppers/" rel="nofollow noreferrer">Material UI Steppers</a></p>
<p>The default color is Blue (Enabled) + Grey (Disabled). But I am looking to change this to something like so:</p>
<p><a href="https://i.stack.imgur.com/HGGxp.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/HGGxp.png" alt="enter image description here" /></a></p>
<p>But I don't seem to able to find any hook into the <code>Icon</code> section of the <code>StepLabel</code>. I already tried applying the CSS to the <code>IconContainer</code>, but the specificity is not sufficient.</p>
<p>My code is available here: <a href="https://codesandbox.io/s/0102v4z1op" rel="nofollow noreferrer">https://codesandbox.io/s/0102v4z1op</a></p>
<p>TIA!</p>
| 0non-cybersec
| Stackexchange | 293 | 878 |
Self numbers in c++. <p>Hey, my friends and I are trying to beat each other's runtimes for generating "<a href="http://en.wikipedia.org/wiki/Self_number" rel="noreferrer">Self Numbers</a>" between 1 and a million. I've written mine in c++ and I'm still trying to shave off precious time.</p>
<p>Here's what I have so far,</p>
<pre><code>#include <iostream>
using namespace std;
bool v[1000000];
int main(void) {
long non_self = 0;
for(long i = 1; i < 1000000; ++i) {
if(!(v[i])) std::cout << i << '\n';
non_self = i + (i%10) + (i/10)%10 + (i/100)%10 + (i/1000)%10 + (i/10000)%10 +(i/100000)%10;
v[non_self] = 1;
}
std::cout << "1000000" << '\n';
return 0;
}
</code></pre>
<p>The code works fine now, I just want to optimize it.
Any tips? Thanks.</p>
| 0non-cybersec
| Stackexchange | 323 | 811 |
Custom Collection using IEnumerable vs ICollection vs IList. <p>I need to design my own custom <code>GenericCollection</code> class. Now i have plenty of options to derive it using <code>IEnumerable</code>, <code>ICollection</code>, and <code>IList</code>, where later offers some added functionalities.</p>
<p>I am little confused that if i go with <code>IEnumerable<T></code> i might require declaring the object to actually hold the collection like in this case <code>_list</code>.</p>
<pre><code>public class GenericCollection<T> : IEnumerable<T>
{
private List<T> _list;
//...
}
</code></pre>
<p>But if i go with <code>ICollection<T></code> or <code>IList<T></code>, i do not require to declare the <code>List</code> object as it is implicitly available.</p>
<pre><code>public class GenericCollection<T> : IList<T>
{
// no need for List object
//private List<T> _list;
//...
}
</code></pre>
<p>What is the difference between these two approaches with respect to <em>performance</em>?</p>
<p>In which scenario each one is preferred especially when it comes to designing your own collection. I am interested in the light weight collection with good performance. I think this can be achieved using <code>IEnumerable<T></code> but how exactly along with some strong reasons to go with it?</p>
<p>I have reviewed some existing posts but none is giving required information.</p>
<p><a href="https://stackoverflow.com/questions/9855693/ilist-vs-icollection-vs-collection">Returning 'IList' vs 'ICollection' vs 'Collection'</a></p>
| 0non-cybersec
| Stackexchange | 502 | 1,642 |
Quartz scheduler in cluster environment. <p>I am using </p>
<pre><code>SchedulerFactory schedulerFactory = new StdSchedulerFactory();
scheduler = schedulerFactory.getScheduler();
scheduler.start();
Trigger asapTrigger = getAsapTrigger();
JobDetail asapJob = getAsapJobDetails();
scheduler.scheduleJob(asapJob, asapTrigger);
</code></pre>
<p>This is working but when I go for cluster environment, 2 threads are running for the same job.</p>
<p>I am using annotations not properties file. I want to run only one thread. Can someone help on this. How to configure?</p>
<p>my code almost look like : <a href="http://k2java.blogspot.com/2011/04/quartz.html">http://k2java.blogspot.com/2011/04/quartz.html</a></p>
| 0non-cybersec
| Stackexchange | 223 | 712 |
How can I send an HTML email with Perl?. <p>I am trying to send an HTML email using Perl.</p>
<pre><code> open(MAIL,"|/usr/sbin/sendmail -t");
## Mail Header
print MAIL "To: $to\n";
print MAIL "From: $from\n";
print MAIL "Subject: $subject\n\n";
## Mail Body
print MAIL "Content-Type: text/html; charset=ISO-8859-1\n\n"
. "<html><head></head><body>@emailBody";
close(MAIL)
</code></pre>
<p>Is that the correct way of doing it? It is not working for some reason. Thanks for your help.</p>
| 0non-cybersec
| Stackexchange | 204 | 548 |
Decided to end a shroom trip with a bowl and its the most intense high I have ever had. [10]. So yesterday, I did shrooms with a buddy and it was fun. Came back home at night and decided to smoke a bowl thinking it would ease the comedown. Boy was I wrong. It got really intense.
I played [Dark side of the moon] (https://www.youtube.com/watch?v=DLOth-BuCNY) and it felt like the video and music are made specifically for this experience. I just kept staring at the screen and couldn't move. Shutting my eyes felt like I was stuck inside a kaleidoscope. I could feel that my brain was on hyperdrive throughout the experience. Not sure if I would do this again but that was one hell of a trip.
| 0non-cybersec
| Reddit | 178 | 696 |
Seeking Healthy Recipes for Someone with Acid Reflux, Few Teeth & High Blood Pressure. I just bought my dad a crockpot and would like some suggestions on what would be good to help him cook in it. He is not particularly picky, but has some health issues that restrict what he can eat. Ideas that fit with those limits would be much appreciated.
High blood pressure-have to do low sodium recipes or recipes that can be made low sodium. Reducing saturated fat and focusing on unsaturated fats would also be good.
Acid-Reflux-spicy food is a no-go for him. Most other foods seem to be ok, but stomach friendly stuff is preferable.
Few teeth-while he should get dentures he keeps trying to hold out for free ones from the VA so for now has just a few teeth and can't chew well. I was able to macerate turkey breast enough for him to eat it and thawed frozen veggies seem to be soft enough for him to manage, but fresh veggies and solid chunks of meat are a little too difficult for him.
I look forward to hearing your suggestions. Thanks | 0non-cybersec
| Reddit | 243 | 1,038 |
How to make a formula to calculate how many of each unique item are in a column in the last 365 days. <p>I have <a href="https://docs.google.com/spreadsheets/d/1udhBB1ojZTKWPJHFrDKFxsCV4nEVTewFf4TmXMdh2ZI/edit#gid=0" rel="nofollow noreferrer">two columns A:A (dates) and B:B (items)</a></p>
<p>.....
I need to find a formula to calculate how many of each unique item are in column B : B in the last 365 days.
In the example the right value in the formula is 2</p>
| 0non-cybersec
| Stackexchange | 164 | 465 |
How to use a column header to reference a cell in Google Apps Script Spreadsheet. <p>I have several Google Sheets that I connect and update cells between them. Right now I have to use R1C1 or A1 type references to define getting or setting cells based on specific columns.</p>
<p>If a new column is added, all those references are now off.</p>
<p>Row one of each sheet has column headers as values in those cells.</p>
<p>Can I reference a cell in a format such as [columnHeader]5 for the cell in that column, fifth row?</p>
<p>I thought of setting each individual column heading as a 'named range', but I am stuck at being able to reference a cell using [named range]5.</p>
<p>I suppose I could use some method of dynamically defining 100 variables to the then current column numbers (R1C1) format (in all the sheets) and then try to use those pseudo-header variables in my cell references. But I will probably run the scripts 100's of times a day and that horrible inefficiency hurts the engineer in me.</p>
<p>Thanks in advance.</p>
<p>chuck</p>
| 0non-cybersec
| Stackexchange | 278 | 1,056 |
will it be dense in $M_n(\mathbb{C})\times M_n(\mathbb{C})$. <p>Set of all pair $(A,E)$ for which $\det(A-\lambda E)\ne 0$ as a polynomial, forms a dense open set in $M_n(\mathbb{C})\times M_n(\mathbb{C})$?</p>
<p>I proved $GL_n(\mathbb{C})$ is dense and open set in $M_n(\mathbb{C})$
like this:
$A$ be any complex matrix, found its eigenvalues $\lambda_1,\dots,\lambda_n$ and choose $\lambda<\min\{|\lambda_1|,\dots,|\lambda_n|\}$
Then the sequence $A_n=A-\frac{\lambda}{n}I\to A$ and since $\frac{\lambda}{n}\ne\lambda_i$, each entries of the sequence $\{A_n\}$ is an invertible matrix, converging to an arbitrary matrix $A$ in the set. I was trying to mimic this proof in my currently needed problem but did not succed. Thanks for helping.</p>
| 0non-cybersec
| Stackexchange | 253 | 751 |
Problem with math formula contains alpha subscript. <p>I am newbie to latex. I would like to write a long math formula but I can't figure out why alpha subscript is missed out after compiling (Please find the attached picture). Here is how I write the formula in overleaf.</p>
<pre><code>\begin{equation}
u = \sum_{I=1}^{N} N_I{(x)} \left[U_I + H(x)a_I + \sum_{\alpha{=1}}^{4}F_{\alpha}(x)b_I^{\alpha}\right]
\end{equation}
</code></pre>
<p>For further clarification, I can see that the following packages and fonts are used for writing the math in class file.</p>
<pre><code>\RequirePackage{amsmath}
\RequirePackage{mathspec}
\setmathsfont(Digits,Latin,Greek)[Numbers={Proportional},SizeFeatures={{Size=-8, OpticalSize=8},{Size= 8-, OpticalSize=12}},]{EB Garamond}
\setmathrm{EB Garamond}
</code></pre>
<p>Please could someone point out what is wrong here? Many thanks for your help in advance!</p>
<p><a href="https://i.stack.imgur.com/no5GL.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/no5GL.png" alt="enter image description here"></a></p>
| 0non-cybersec
| Stackexchange | 350 | 1,075 |
Subdomain SSL and redirecting. <p>So, I have a portal type of website that I'm considering selling.</p>
<p>Let's for the sake of convenience, call my website www.portal.com. If I sell one of these portals, I would like them to be under the portal umbrella, and therefor have them as: client1.portal.com or if their company name is Microsoft, have it be microsoft.portal.com.</p>
<p>To add complexity, I would like there to be SSL on the website(s).</p>
<p>I'm assuming I need a wildcard SSL to facilitate all my clients as I don't want to change my certificate every time a client is added or removed.</p>
<p><strong>The main question:</strong></p>
<p>Is there a way that, for my client to keep their own website: www.client1.com, instead, redirect to client1.portal.com without them seeing this in their URL bar?</p>
<p>What do I need (incase I need to buy anything) and what is the technical term of achieving this?</p>
| 0non-cybersec
| Stackexchange | 268 | 928 |
uint64 is not exact for vectors in Matlab. <p>I have discovered an inconsistency for <code>uint64</code> when using vectors in Matlab. It seems as an array of uint64 is not exact for all 64 bits. This did not give the output I expected,</p>
<pre><code>p=uint64([0;0]);
p(1)=13286492335502040542
p =
13286492335502041088
0
</code></pre>
<p>However</p>
<pre><code>q = uint64(13286492335502040542)
q =
13286492335502040542
</code></pre>
<p>does. It is also working with</p>
<pre><code>p(1)=uint64(13286492335502040542)
p =
13286492335502040542
0
</code></pre>
<p>Working with unsigned integers one expect a special behaviour and usually also perfect precision. This seems weird and even a bit uncanny. I do not see this problem with smaller numbers. Maybe anyone knows more? I do not expect this to be an unknown problem, so I guess there must be some explanation to it. I would be good to know why this happen and when, to be able to avoid it. As usual this kind of issues is mentioned nowhere in the documentation.</p>
<p>Matlab 2014a, windows 7.</p>
<p><strong>EDIT</strong></p>
<p>It is worth mentioning that I can see the same behaviour when defining arrays directly.</p>
<pre><code>p=uint64([13286492335502040542;13286492335502040543])
p =
13286492335502041088
13286492335502041088
</code></pre>
<p>This is the root to why I ask this question. I have hard to see workaround for this case.</p>
| 0non-cybersec
| Stackexchange | 470 | 1,452 |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange | 349 | 1,234 |
Where do I get the latest boost/libboost for 10.04?. <p>i'm unable to install libboost-all-dev package versions 1.42 or latest in ubuntu 10.04. only boost1.40 is installing. but i need 1.42. what should i do?
when i tried to install 1.48 boost i got the following error:</p>
<pre><code>robotics@robotics-desktop:~$ sudo dpkg -i libboost-all-dev_1.48.0.2_i386.deb
Selecting previously deselected package libboost-all-dev.
(Reading database ... 224047 files and directories currently installed.)
Unpacking libboost-all-dev (from libboost-all-dev_1.48.0.2_i386.deb) ...
dpkg: dependency problems prevent configuration of libboost-all-dev:
dpkg: error processing libboost-all-dev (--install):
dependency problems - leaving unconfigured
Errors were encountered while processing:
libboost-all-dev
</code></pre>
<p>what should i do? should upgrade to 11.10?</p>
| 0non-cybersec
| Stackexchange | 266 | 857 |
$\operatorname{lcm}(a^2, ab, b^2) =\operatorname{lcm}(a^2, b^2)$. <blockquote>
<p>Let <span class="math-container">$a$</span> and <span class="math-container">$b$</span> be two integers. Is it true that <span class="math-container">$\operatorname{lcm}(a^2, ab, b^2) = \operatorname{lcm}(a^2, b^2)$</span> ?</p>
</blockquote>
<p><span class="math-container">$a, b$</span> are integers and the result that i tried to use, in this case,is <span class="math-container">$ \operatorname{lcm}(a^2,b^2)\gcd(a^2,b^2)=a^2 b^2$</span> but i don't know if it's true <span class="math-container">$\operatorname{lcm}(a^2,ab,b^2)\gcd(a^2,ab,b^2)=a^3 b^3$</span></p>
<p>I did some examples apparently it's true but I can't prove it. So could give me a hint?</p>
| 0non-cybersec
| Stackexchange | 299 | 750 |
Diagonalizing a $2\times 2$ matrix. <p>I am told that $A\in M_{2}(\mathbb{R})$ s.t $1-i$ is an eigenvalue
of $A$ with corresponding eigenvector $\begin{pmatrix}3+2i\\ 1+3i \end{pmatrix}$.</p>
<p>I wish to find a matrix $P$ s.t $P^{-1}AP=\begin{pmatrix}1-i & 0\\
0 & 1+i
\end{pmatrix}$. From what I understand since $\lambda_{1}=1-i$ is an eigenvalue
then also $\lambda_{2}=\bar{\lambda}_{2}=1+i$ is an eigenvalue and
since $\lambda_{1}\neq\lambda_{2}$ and $A$ is a $2\times2$ matrix
I conclude that such $P$ does exist.</p>
<p>My efforts for finding $P$ are: I said that if $v_{1}=\begin{pmatrix}3+2i\\
1+3i
\end{pmatrix}$ is an eigenvector corresponding to $\lambda_{1}$ then $v_{2}=\overline{v_{1}}$
is eigenvector corresponding to $\lambda_{2}$ hence $B=\{v_{1,}v_{2}\}$
is a basis of eigenvectors.</p>
<p>From what I remember $P$ is the matrix that transfers from the standard
base to $B$ (or the other way around ?), so I tried writing $\begin{pmatrix}1\\
0
\end{pmatrix}=\alpha v_{1}+\beta v_{2}$ and failed (I got that such $\alpha,\beta$ does not exist).</p>
<p>Can somene please help me understand what is my mistake and how to
find the matrix $P$ ?</p>
| 0non-cybersec
| Stackexchange | 414 | 1,175 |
No CD/DVD/BD writer found on k3b. <p>Even if it is seen into drives my system won't recognize the writer... since 15.04 update...</p>
<p>With k3b started as root the problem stays the same</p>
<p><img src="https://i.stack.imgur.com/cepP6.jpg" alt="system configuration problem">
<img src="https://i.stack.imgur.com/ClL8L.jpg" alt="even if seeing into drives"></p>
<p>Dont understand why I cannot write, is there a driver change on last kernel?</p>
<pre><code>sudo cat /proc/sys/dev/cdrom/info
CD-ROM information, Id: cdrom.c 3.20 2003/12/17
drive name: sr0
drive speed: 24
drive # of slots: 1
Can close tray: 1
Can open tray: 1
Can lock tray: 1
Can change speed: 1
Can select disk: 0
Can read multisession: 1
Can read MCN: 1
Reports media changed: 1
Can play audio: 1
Can write CD-R: 0
Can write CD-RW: 0
Can read DVD: 1
Can write DVD-R: 0
Can write DVD-RAM: 0
Can read MRW: 1
Can write MRW: 1
Can write RAM: 1
</code></pre>
| 0non-cybersec
| Stackexchange | 353 | 1,084 |
Ruby on Rails - Import Data from a CSV file. <p>I would like to import data from a CSV file into an existing database table. I do not want to save the CSV file, just take the data from it and put it into the existing table. I am using Ruby 1.9.2 and Rails 3.</p>
<p>This is my table:</p>
<pre><code>create_table "mouldings", :force => true do |t|
t.string "suppliers_code"
t.datetime "created_at"
t.datetime "updated_at"
t.string "name"
t.integer "supplier_id"
t.decimal "length", :precision => 3, :scale => 2
t.decimal "cost", :precision => 4, :scale => 2
t.integer "width"
t.integer "depth"
end
</code></pre>
<p>Can you give me some code to show me the best way to do this, thanks.</p>
| 0non-cybersec
| Stackexchange | 263 | 753 |
Ubuntu 16.04 bootload grub2 problem?. <p>Ok, I have an internal SSD installed with Ubuntu 16.04 on it. Upon installation I deleted both partitions on both disks and installed Ubuntu on the SSD. I have a Lenovo V570 with the CD Drive replaced with a HDD 2.5 adapter holding a 1TB Hitachi. SSD installed in original HDD factory slot. I keep getting the issue of black screen and high fan usage when booting with the HDD connected. Even after Deleting and recreating both partitions on both disks, I still get this issue. The HDD did previously have Windows 7 installed on it. It has since had a new partition made on the device. I have looked everywhere for a solution. I have been unable to find out why this is happening. Can you give me some diagnostic commands to be able to find out what is happening?</p>
<p>P.S. Windows is not installed anymore. I have the most updated bios for that model: V43</p>
| 0non-cybersec
| Stackexchange | 220 | 905 |
Google Drive Api in Angular. <p>I am facing some difficulties in apply the google drive api to my angular web app. I tried copying the code from <a href="https://developers.google.com/drive/api/v3/quickstart/js" rel="nofollow noreferrer">https://developers.google.com/drive/api/v3/quickstart/js</a> to my components html but I keep getting an error that says</p>
<p><code>zone-evergreen.js:171 Uncaught {error: "idpiframe_initialization_failed", details: "Not a valid origin for the client: http://localhos…itelist this origin for your project's client ID."}</code></p>
<p>However, when I put it as a normal index.html without it being in an angular app, the client id is valid. Is it possible that it is because of how angular renders the components, resulting in 'async defer' to be not working? If so, how do I resolve this.</p>
<p>I tried using @types/gapi and gapi-auth2 but I also encounter errors that the module cannot be found. I did many fixes like adding the compilerType but it still does not work so I am trying to use the default html. Thank you.</p>
| 0non-cybersec
| Stackexchange | 305 | 1,085 |
Logs from the Lincoln Interment Facility. ADMISSION REPORT:: Patient #00749
Patient was inducted after found with multiple self-inflicted lacerations to the neck, wrist, and chest. Patient has made repeated complaints of feelings of dread, hopelessness, and general melancholy. Also reporting insomnia and headaches.
Administered Triazolam 0.25mg for insomnia.
ADMISSION EVALUATION:: Patient #00749
Self harm has been confirmed. Definite somniphobia. Patient claims his self harm is meant to induce long periods of stimulation, refers to sleep with severe anxiety, possible agoraphobia. Issue of insomnia requires immediate attention.
Largely refused questioning except pertaining to his mental state. He claims to have a relationship with something he refers to as “other”.
I recommend we cancel Triazolam and instead supplant the patient with 5mg Diazepam.
ADMITTANCE REPORT:: Patient #00749
Patient remanded to Room 401. Occupants: Patient #00182 and Patient #00372
INCIDENT REPORT:: Patient #00749
During ward check, Patient #00182 requested immediate transfer from Room 401, reasoning that Patient #00749 is greatly disturbing her. Patient #00372 likewise requests to be moved into an isolated bed.
Requests denied.
INCIDENT REPORT (2):: Patient #00749
During ward check, Patient #00182 claims she has been ordered to be moved to isolation by observation staff. Patient #00372 corroborates her claims. There is no record of such a request, she is denied. Both patients become severely agitated. Require sedation.
Recommending more frequent follow-up checks to circumvent future conflict.
INCIDENT REPORT (3):: Patient #00372
Staff on Hall 1, Floor 4 report loud sounds from room 410 after facility lights out, disturbing other rooms and patients. Patient #00372 is found dead in northeast corner of the cell, both Patient #00182 and Patient #00749 are found struggling against their restraints, demanding the lights be turned back on before “she comes back”. Sedation approved and administered.
Recommending the use of antipsychotics in event of future incident.
INCIDENT REPORT(4):: Patient #00749
Staff on Hall 1, Floor 4 report loud sounds from room 410. Patient #00182 found dead from multiple lacerations to the upper body. Patient #00749 transferred to Isolation, room 626, given injected dose of 100mg Zuclopenthixol on attending physician’s orders to control acute psychosis.
Recommend video observation.
STAFF MEMO:
Something is very wrong here. Personnel observing Patient #00749’s cell have stated that they feel a heavy sense of dread, fear, anger, and general depression. Moral has dropped dramatically, and many observers have requested for immediate transfer.
This has officially gone far enough. I was confident that the men and women employed in this facility contained an iota of professionalism. Patient 749 is nothing new. He’s not the first patient with explosive episodes, or delusions, hell he isn’t even the first detainee to kill a cellmate! I do not understand why this man in particular has disturbed this staff so greatly.
It also pains me to report that it seems we’ve had multiple personnel attempt to breach 749’s isolation. The culprit has not come forward, rest assured whoever you are will be punished swiftly and severely.
Until otherwise noted I will not approve of any shift changes from scheduled Isolation hours. This matter is closed, and I want to hear no further mention of it.
~Administrator
INCIDENT REPORT (5):: Patient #00749
Patient #00749 requests that lights be left on after designated lights-out time. After consultation with attending physician and therapist, request granted. Patient then requests sleep lights be dimmed. Patient understands that low-level light is necessary for room observation – as quoted, “that’s why I want them off.” Patient then warned camera operator against ‘her’. Request denied.
Patient becomes increasingly agitated. Sedation has no effect, dosage doubled. Following sedation, it is noted that several bolts from the patient’s restrains were dislocated.
STAFF MEMO (2)::
I have been hearing talk around the halls that some of you are AFRAID of this man. He is bound to a bed, under the highest sedation we can medically provide. This is getting ridiculous.
Regardless of the reason, I will NOT permit untrained orderlies to begin interfering in the care provided to our patients.
~Administrator
INCIDENT REPORT (6)::
half the damn staff is gone and i dont know what to do. thomas left, said he couldn’t do this to his kids. are we watching this crazy fuck or is he
patient #00749 just stopped screaming. i don’t know why. i think he’s gone.
i pray she’s gone too
i only need a needle to stop the pain
STAFF MEMO (3)::
NO ONE IS TO ENTER ISOLATION 626 WITHOUT EXPRESS PERMISSION
INCIDENT REPORT (7)::
we.all.fall.down.
STAFF MEMO (4)::
To: [email protected]
From: [email protected]
Okay Robert, I think I have the situation under control. The staff is in the nurse’s station, I took some freedom with gathering them, but I don’t I’m going to get a reprimanding for it.
Ever since Patient #00372 was killed, something odd has been happening. I’ve noticed a large quantity of dextroamphetamine has gone missing from the medical bay. A greater amount of needles have also gone missing. You want to know what the side effects of overdose are? Paranoia, compulsiveness, confusion, and severe agitation. Sound familiar?
I started looking over the video feed for 00749, and I found something interesting. Each night in Isolation, the camera feed cut out for approximately 5 minutes between shifts. Every night. As if someone had made it so that the cameras wouldn’t record a specific incident.
The thought occurs to me that 00372 and 00182 both were killed the same way, lacerations. But did you notice in each report, 00749 was restrained when the bodies were discovered? Surely he could not have released himself and re-restrained himself!
The worst part is, the past few days, I’ve been circling the grounds and checking our records, counting staffers. As far as I can tell, there are more staff on the grounds than we have on payroll.
Security says it doesn't make sense, but I think we have one extra.
COMPANY MEMO:
Seal 749’s body in Isolation. Make him look alive. Wait her out. Security and I will be in there with 16g of pentobarbital. When all's said and done, cremate both bodies.
The administration is taking this opportunity to apologize for its conduct in light of the situation. Indeed, there are risks inherent in this profession, risks we all knew about upon assuming it, but that is the burden we bear to render aid to those who find themselves under our care.
We’re taking this opportunity to also remind our staff that counselors are always available during standard hours for those who need to consult with someone in light of the recent event and associated workplace anxiety.
Let’s just hope the rest of us don’t wind up needing time in these beds as well.
| 0non-cybersec
| Reddit | 1,674 | 7,052 |
iBook G4 hard disk issue - how to repair broken HFS filesystem?. <p>The OS does not boot, it stays in blue blank screen with scrolling bar.</p>
<p>I restarted to single user mode and tried fsck - it said it cannot repair fs.</p>
<p>Restarting with OSX install diskette: it did not show the hard disk in the list of target drives.</p>
<p>Any ideas, how to check if the HD is physically broken?</p>
<p>By pressing D during boot (with install disk inserted) did not seem to do anything (according to Google, shouldn't it open hardware test?)</p>
| 0non-cybersec
| Stackexchange | 156 | 548 |
Is there something similar to pseudorandom generators but in the opposite direction?. <p>Pseudorandom generators (<a href="http://en.wikipedia.org/wiki/Pseudorandom_generator" rel="nofollow">PRG</a>) are functions that takes a random small input (called the Seed) and maps it into much larger output .</p>
<p>However, the mapping process must be unpredictable in order for the PRG to be used securely in cryptography.</p>
<p>My question is: Are there any tool the does the opposite? i.e. takes a long random string and maps it to a smaller random unpredictable output? </p>
<p>And if not, can we use <a href="http://en.wikipedia.org/wiki/S-box" rel="nofollow">s-box</a> for this purpose? </p>
| 0non-cybersec
| Stackexchange | 200 | 699 |
Proving properties of Random Graphs. <p>I am asking the question on a slightly abstract level and it may depend on the specifics but it would be great to have related references or ideas.</p>
<p>Consider the random graph model $G_{n,p}$ where its a random graph on n vertices and each edge is selected with probability $p$. I want to prove that a certain property $P$ is satisfied by graphs in this model with high probability ($\rightarrow 1$ as $n \rightarrow \infty$). I know/can prove the following two facts</p>
<ol>
<li>Conditioned on the event that the graph obtained from the sample is regular, the probability of the property being satisfied is very high (something like $1 - 1/n^c$)</li>
<li>Given any graph G and any other graph G' that can be obtained by removing edges from G. If G satisfies the property then so does G'. </li>
</ol>
<p>Can the above two statements be enough to make a general statement about the probability of the satisfaction of the property in $G_{n,p}$</p>
<p>Any references would be very helpful? </p>
| 0non-cybersec
| Stackexchange | 267 | 1,042 |
derive formula for height of tower on a hill. <p>I'm working through a book to learn trig on my own and I got stuck with the following. This is the image given and the text in the book reads:</p>
<blockquote>
<p>Suppose you are standing an unknown distance away from a cliff of height <span class="math-container">$h$</span>. You need to know the height <span class="math-container">$t$</span> of a tower located on top of the cliff. You know that the angle of elevation of the bottom of the tower is <span class="math-container">$B$</span> and the angle of elevation of the top of the tower is <span class="math-container">$A$</span>. Derive a formula for the height of the tower.</p>
</blockquote>
<p><img src="https://i.stack.imgur.com/rLVuI.png" alt=""></p>
<p>The solution they gave is <span class="math-container">$t = h\left({{tan A}\over{tan B}}-1\right)$</span>. I don't quite understand how to derive that answer. I think that the height is going to be <span class="math-container">$d(tanA - tanB)$</span> where <span class="math-container">$d$</span> is the unknown adjacent side. I get stuck after that. The more verbose the answer the better. Thanks!</p>
| 0non-cybersec
| Stackexchange | 350 | 1,181 |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange | 349 | 1,234 |
How to prevent chapter titles from appearing in the header on the first page of each chapter in ConTeXt?. <p>To place the chapter title in the header of my document, I used:</p>
<pre><code> \setupheadertexts[{\getmarking[chapter]}][][][{\getmarking[chapter]}]
</code></pre>
<p>My document is not double-sided. Whenever the chapter title appears on the first page of the chapter, it produces the odd result of seeing the chapter title in the header directly above the actual chapter title, e.g.:</p>
<pre><code> _______________
| Chapter 1 |
| |
| CHAPTER 1 |
| Once upon |
| a time, ... |
|_______________|
</code></pre>
<p>How can I place a chapter title in the header, but prevent it from appearing on the first page of each chapter?</p>
| 0non-cybersec
| Stackexchange | 218 | 772 |
Restricting access to Share using both an AD user using a specific Computer. <p>The Environment:
One AD domain that is not managed by local admins (can’t edit, can’t add GPO, etc.) Users have accounts here. Call this AD alpha
This AD Alpha has a trust to a local AD domain (Call this one Zeta) that local admins administer. Contains computer accounts. Has accessible network shares</p>
<p>Goal:
Set permissions on AD Zeta’s network shared folders using AD Alpha’s user accounts and AD Zeta computer accounts for folder access.</p>
<p>Reason:
To make sure that when a users using credentials from Alpha accesses a share on Zeta, they can only do so if they are also accessing that share from a machine they would normally use during working hours.</p>
<p>Example:
User A logged in with computer A = grant access
User A logged in with computer B= no access</p>
<p>User B logged in with computer B = grant access
User B logged in with computer A= no access</p>
| 0non-cybersec
| Stackexchange | 250 | 963 |
Why don't CPUs have dedicated instruction sets for compression?. Computers built in the last decade generally take advantage of the [x86 AES instruction set](https://en.wikipedia.org/wiki/AES_instruction_set), which is hardware acceleration in the CPU that speeds up the task of encryption or decryption using the standard AES algorithm. Even obsolete processors like mine can encrypt multiple gigabytes per second (!). This vastly exceeds the speed of hard drives, so the result is that there's negligible performance loss for encrypting your data and you might as well encrypt everything all the time.
However, another common task, possibly even more common with even more standardized algorithms, is data compression. As far as I can tell there's no hardware acceleration for this. Is there a technical reason why that's not feasible? Something to do with a larger or much more active buffer? What might be the advantages of different compression algorithms for dedicated hardware acceleration? | 0non-cybersec
| Reddit | 195 | 998 |
In $\mathbb{Z}/(n)$, does $(a) = (b)$ imply that $a$ and $b$ are associates?. <p>[<strong>Update</strong>: Based on the hints provided by @zcn and @whacka, I believe I have found a solution. See my answer below.]</p>
<p>Below, $R$ is a commutative ring with $1$.</p>
<p>In John J. Watkins' <em>Topics in Commutative Ring Theory</em>, the author observes that if $a$ and $b$ are associates in $R$, then they generate the same ideal: $(a) = (b)$. This is clearly true, because $a = ub$ and $b = va$ for some units $u$ and $v$, and so $a \in (b)$ and $b \in (a)$, whence $(a) \subset (b)$ and $(b) \subset (a)$. Indeed, we didn't even require $u$ and $v$ to be units to reach this conclusion.</p>
<p>The author then claims that if $R$ is not a domain, then the converse may not be true: we may have $(a) = (b)$ even if $a$ and $b$ are not associates. As a "counterexample" he gives $R = \mathbb{Z}/(6)$, with $a = 2 + (6)$ and $b = 4 + (6)$. Clearly these elements generate the same ideal: $(a) = (b) = \{0, 2 + (6), 4 + (6)\}$. The author asserts that $a$ and $b$ are not associates, but this is false: $5 + (6)$ is a unit, and $(2 + (6))(5 + (6)) = 4 + (6)$, so $a$ and $b$ actually are associates.</p>
<p>I figured that the author botched the example but that surely the basic fact must be true: if $R = \mathbb{Z}/(n)$ then there may be nonassociates $a,b \in R$ with $(a) = (b)$. However, I was not able to find a counterexample and eventually resorted to writing a computer program and found that there are no counterexamples in $\mathbb{Z}/(n)$ for $n \leq 100$.</p>
<p>So now I'm starting to think that there is no counterexample in $\mathbb{Z}/(n)$ at all, but I have not yet been able to prove this.</p>
<p>My questions:</p>
<ol>
<li><p>If I am correct that $(a) = (b)$ in $\mathbb{Z}/(n)$ implies that $a$ and $b$ are associates, I would appreciate a nudge in the right direction toward a proof. (But if the proof is elementary, please give only a hint, not a solution :-) I'll post my solution once I have one.</p></li>
<li><p>In either case, could you please point me to a genuine counterexample? If there is one in $\mathbb{Z}/(n)$ for some $n$, that would be ideal (no pun intended), otherwise a counterexample in any commutative ring with $1$ would be great.</p></li>
</ol>
| 0non-cybersec
| Stackexchange | 750 | 2,294 |
xargs - place the argument in a different location in the command. <p>Let's say I want to write a script that does <code>ls</code> with a prefix for each filename. I tried this</p>
<pre><code>ls | xargs -n 1 echo prefix_
</code></pre>
<p>But the result was</p>
<pre><code>prefix_ first_file
prefix_ second_file
...
</code></pre>
<p>How can I remove the space between the prefix and the filename? I.e. how to I make xargs put the variable after the command, without space? (Or in any other place for that matter)</p>
| 0non-cybersec
| Stackexchange | 162 | 520 |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange | 349 | 1,234 |
Unique unordered combinations of varying length. <p>Given random set of integers. I.e. </p>
<p>$\{1,2,2,3,3,3,5\}$</p>
<p>Find the number of <strong>unique, unordered</strong> <em>of varying length</em> sets that can be created.</p>
<hr>
<h2>My Workings</h2>
<hr>
<p>This is <em>not</em> a homework problem, but rather, I'm trying to develop an algorithm to calculate the number of divisors a number has after knowing all of its factors. For example, 36 has</p>
<p>$$1*36$$
$$2*18$$
$$3*12$$
$$4*9$$
$$6*6$$
A total of <strong>9</strong> <em>unique</em> divisors.</p>
<p>I have broken this problem down in the the above description, but I haven't been able to consolidate everything.</p>
<p>My approach is to consider every unordered combination, and then remove the duplicates.</p>
<p>I begin by not considering the 1 since it will not give additional divisors (I just add 2 in the end).</p>
<p>$\{2, 2, 3, 3, 3, 5\}$</p>
<p>Let $L$ be length $= 6$</p>
<h3>Consolidating Varying Length</h3>
<p>I approach this by considering each length from $n$ to $L$ separately.</p>
<p>Groups of $n$ Where $ 1<= n <=L$</p>
<p>$L\choose{n}$ $=\frac{L!}{n!(L-n)!}$</p>
<p>This would give the number of unordered combinations for a given length $n$. </p>
<h3>Consolidating Repeated Factors</h3>
<p>Now I consider each subset of repeated integers $\{2,2\}$ $\{3,3,3\}$</p>
<p>For the set of length 3 the duplicates will be found as follows:</p>
<ol>
<li><p>$\underline{R}\space \underline{U} \space \underline{U}$ </p></li>
<li><p>$\underline{R}\space \underline{R} \space \underline{U}$ </p></li>
<li><p>$\underline{R}\space \underline{R} \space \underline{R}$ </p></li>
</ol>
<p>Where $R$ is an unordered subset of a duplicate set $\{3, 3\} \{2\}$ and $U$ is an unordered subset of the unique set $\{2, 3, 5\}$</p>
<p>So, for 1. if I'm considering the duplicate set $\{3,3\}$ I would remove the amount equal to: $2\choose{1}$ $*$$3\choose{2}$ </p>
<p>For 2. It would be $2\choose{2}$ $*$$3\choose{1}$ </p>
<p>Then for 3. I wouldn't subtract anything for the subset of $\{3,3\}$ since it's not long enough.</p>
<hr>
<h2>Roadblock</h2>
<hr>
<p>Using this method, I've been able to predict the divisor count of <em>some</em> numbers, though my brain is mushy right now and I could have mistakes I don't realize. </p>
<ol>
<li>Is there any easier way to do this?</li>
<li>Why doesn't my method work for all cases? Like if the factors were: $\{1, 2, 2, 2, 2\}$</li>
</ol>
| 0non-cybersec
| Stackexchange | 918 | 2,490 |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange | 349 | 1,234 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.