text
stringlengths 36
35k
| label
class label 2
classes | source
stringclasses 3
values | tokens_length
int64 128
4.1k
| text_length
int64 36
35k
|
---|---|---|---|---|
How to access a device by hostname through Jetpack/MiFi?. <p>I have a Verizon Jetpack Mi-Fi device, which behaves as a wireless router. Connected to it are three clients:</p>
<ol>
<li>A Windows laptop whose hostname is <code>windows1</code>. IP address from the Jetpack is <code>192.168.1.2</code>.</li>
<li>A Windows laptop whose hostname is <code>windows2</code>. IP address from the Jetpack is <code>192.168.1.3</code>.</li>
<li>A <strong>non-rooted</strong> Android tablet. IP address from the Jetpack is 192.168.1.4.</li>
</ol>
<p>I have a web server running on <code>windows1</code> and listening on port 80. If I open a web browser on <code>windows2</code> and navigate to <code>http://windows1</code>, the web server home page loads properly. If I open a web browser on the tablet and navigate to <code>http://windows1</code>, the web server home page does not load, and I get the following error:</p>
<blockquote>
<p><strong>This webpage is not available</strong></p>
<p>ERR_NAME_NOT_RESOLVED</p>
</blockquote>
<p>On the tablet, if I navigate instead to <code>http://192.168.1.2</code>, the web server home page loads properly.</p>
<p>I would very much like to access <code>http://windows1</code> from the Android tablet by hostname, not by IP address, just like I can do from <code>windows2</code>. What is a simple way to achieve that, if it is even possible?</p>
<p><strong>UPDATE</strong></p>
<p>I do need to access content on <code>http://windows1</code> from Chrome running on the Android tablet. I also need to access <code>http://windows1</code> from another app that is not a web browser itself but consumes web services that run on <code>windows1</code>. Those web services provide responses that tell the app to get other resources via absolute URLs on <code>windows1</code>. Changing my services to use IP addresses exclusively would be a very undesirable workaround for multiple reasons. Therefore, I'm asking for a solution in which the Android device makes a DNS request for <code>windows1</code> and the correct IP address is returned.</p>
| 0non-cybersec
|
Stackexchange
| 596 | 2,079 |
LPT: When creating or revising your resume, use the "Power Statement" formula for your job descriptions.. After working directly with my supervisor, who's looking for an operations manager, for the last couple of weeks, I've picked up some solid advice when it comes to creating an attractive resume.
Instead of generic bullet points like "Did quality checks for outgoing orders", create a power statement that contains:
- Action verb
- Quantity
- Frequency
- Task/Project
- Result
That generic bullet point can now be made into a power statement:
"Performed quality checks on more than 50 outgoing orders each month which led to a 40% increase in customer satisfaction due to improved order accuracy."
- Action verb - Performed
- Quantity - More than 50
- Frequency - Each month
- Task/Project - Quality checks
- Result - 40% increase in customer satisfaction and improved order accuracy
| 0non-cybersec
|
Reddit
| 197 | 897 |
Javascript: Any workarounds for getting Chrome for Android to fire off touchmove and touchend event listeners other than using event.preventDefault()?. <p>When using event listeners with the touchmove and touchend events, I can't get Chrome for Android to acknowledge those events unless I first use event.preventDefault(); earlier in the code. If I'm not wanting to block the default scroll functionality, is there any other workaround I can use to get Chrome for Android to acknowledge these events?</p>
<p>Sample code:</p>
<pre><code>$(document).ready(function () {
// Bind touch event listeners.
var elem = $('html').get(0);
elem.addEventListener('touchstart', function (e) { console.info('"touchstart" detected. Coordinates - ' + getCoord(e)); });
elem.addEventListener('touchmove', function (e) { console.info('"touchmove" detected. Coordinates - ' + getCoord(e)); });
elem.addEventListener('touchend', function (e) { console.info('"touchend" detected. Coordinates - ' + getCoord(e)); });
function getCoord(e) {
var touch = false;
if (e.touches.length > 0) {
touch = e.touches[0];
} else {
touch = e.changedTouches[0];
}
if (touch) {
return 'x: ' + touch.pageX + ', y: ' + touch.pageY;
}
}
</code></pre>
<p>Example fiddle here: <a href="http://jsfiddle.net/jQ2VS/1/">http://jsfiddle.net/jQ2VS/1/</a></p>
| 0non-cybersec
|
Stackexchange
| 402 | 1,317 |
Simple tikz `\draw` -| fails when the points are exchanged, why is that?. <p>Here is the MWE :</p>
<pre><code> \documentclass[border=2pt]{standalone}
\usepackage[utf8]{inputenc}
\usepackage{pgfplots} %pour Tikz et pgfplot
\usetikzlibrary{positioning} % pour le positionnement relatif
\begin{document}
\begin{tikzpicture}[thick]
\node (start) at (0,0) {} ;
\coordinate (top) at (1,1) ;
\coordinate (bottom) at (1,-1) ;
\coordinate (join) at (3,0) ;
\draw (top -| join) -- (join);
%\draw (join) -- ( top -| join );
\end{tikzpicture}
\end{document}
</code></pre>
<p>You can check that if you uncomment the last <code>\draw</code> compilation fails. You'll get : </p>
<pre><code>Package pgf Error: No shape named join is known.
</code></pre>
<p>And my question is why ? When the line above is the same with the point exchanged</p>
<p>Answer : remove the space <code>join</code> like so :</p>
<pre><code> \draw (join) -- ( top -| join);
</code></pre>
<p>and it works...</p>
| 0non-cybersec
|
Stackexchange
| 370 | 1,062 |
Problems updating Debian 6. <p>Im trying to update a Debian 6 server, but get the following output with some errors after <code>sudo aptitude update</code>:</p>
<pre><code>Ign http://archive.debian.org oldstable Release.gpg
Ign http://archive.debian.org/debian/ oldstable/contrib Translation-en
Ign http://archive.debian.org/debian/ oldstable/main Translation-en
Ign http://archive.debian.org/debian/ oldstable/non-free Translation-en
Ign http://archive.debian.org oldstable Release
Hit http://ftp.debian.org squeeze-updates Release.gpg
Ign http://ftp.debian.org/debian/ squeeze-updates/contrib Translation-en
Ign http://ftp.debian.org/debian/ squeeze-updates/main Translation-en
Ign http://ftp.debian.org/debian/ squeeze-updates/non-free Translation-en
Ign http://archive.debian.org oldstable/main amd64 Packages
Hit http://ftp.debian.org squeeze-updates Release
Ign http://archive.debian.org oldstable/contrib amd64 Packages
Ign http://archive.debian.org oldstable/non-free amd64 Packages
Ign http://archive.debian.org oldstable/main amd64 Packages
Ign http://archive.debian.org oldstable/contrib amd64 Packages
Hit http://ftp.debian.org squeeze-updates/main amd64 Packages/DiffIndex
Hit http://security.debian.org squeeze/updates Release.gpg
Ign http://security.debian.org/ squeeze/updates/contrib Translation-en
Ign http://security.debian.org/ squeeze/updates/main Translation-en
Ign http://security.debian.org/ squeeze/updates/non-free Translation-en
Ign http://archive.debian.org oldstable/non-free amd64 Packages
Hit http://ftp.debian.org squeeze-updates/contrib amd64 Packages
Hit http://ftp.debian.org squeeze-updates/non-free amd64 Packages
Err http://archive.debian.org oldstable/main amd64 Packages
404 Not Found [IP: 206.12.19.126 80]
Err http://archive.debian.org oldstable/contrib amd64 Packages
404 Not Found [IP: 206.12.19.126 80]
Err http://archive.debian.org oldstable/non-free amd64 Packages
404 Not Found [IP: 206.12.19.126 80]
Hit http://security.debian.org squeeze/updates Release
Hit http://security.debian.org squeeze/updates/main amd64 Packages
Hit http://security.debian.org squeeze/updates/contrib amd64 Packages
Hit http://security.debian.org squeeze/updates/non-free amd64 Packages
</code></pre>
<p>This is my sources.list:</p>
<pre><code>deb http://archive.debian.org/debian oldstable main contrib non-free
deb http://ftp.debian.org/debian/ squeeze-updates main contrib non-free
deb http://security.debian.org/ squeeze/updates main contrib non-free
</code></pre>
<p>This sources was generated from <a href="http://debgen.simplylinux.ch/" rel="nofollow noreferrer">http://debgen.simplylinux.ch/</a></p>
<p>What is wrong?</p>
| 0non-cybersec
|
Stackexchange
| 825 | 2,671 |
Background image manual grub.cfg. <p>I'm trying to manually install a background image for grub on a bootable flash drive. Since the drive only boots ISO's and has no installed OS, I can't take advantage of scripts such as <code>update-grub</code> to do this for me and the posts regarding editing /etc/default/grub don't apply to my situation. I've seen <a href="https://unix.stackexchange.com/questions/41514/how-to-put-a-background-image-on-grub">How to put a background image on GRUB?</a> but it doesn't apply for the reasons I've mentioned. I've managed to get all my ISO's to boot properly but I'm stuck on applying the background image. Here's the relevant section of my grub.cfg the rest is all menu entries that work properly (falling back to text mode).</p>
<pre><code>set timeout=10
set default=0
set root=(hd0,msdos1)
### BEGIN background setup ###
function load_video {
if [ x$feature_all_video_module = xy ]; then
insmod all_video
else
insmod efi_gop
insmod efi_uga
insmod ieee1275_fb
insmod vbe
insmod vga
insmod video_bochs
insmod video_cirrus
fi
}
load_video
insmod gfxterm
insmod part_msdos
insmod png
GRUB_TERMINAL=gfxterm
GRUB_GFXMODE=auto
GRUB_BACKGROUND="splash.png"
### END background setup ###
</code></pre>
<p>The background image is a 640x480 PNG file (which I scaled to size with gimp)
Using GRUB 2.02 Beta2</p>
<p>Further research indicates that this part:</p>
<pre><code>GRUB_TERMINAL=gfxterm
GRUB_GFXMODE=auto
GRUB_BACKGROUND="splash.png"
</code></pre>
<p>uses variables that are used by the update scripts and belong in /etc/default/grub and don't appear in this fashion in grub.cfg so I'm certain those lines at least are wrong. </p>
<p>EDIT: I've made some adjustments but still no joy. Here's a <a href="http://pastebin.com/KBPEzrN3" rel="nofollow noreferrer">pastebin</a> of the relevant section (I excluded the irrelevant menu entries as they work fine in text mode and aren't the problem)</p>
| 0non-cybersec
|
Stackexchange
| 624 | 1,975 |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
|
Stackexchange
| 349 | 1,234 |
What's my Synlogy address for webdav?. <p>I am new to Ubuntu and I am trying to connect to my Synology NAS, which is a DS213j, to see shared folders which I can see nicely from my Windows 10 PC. </p>
<p>I followed the <a href="https://www.synology.com/en-uk/knowledgebase/DSM/tutorial/File_Sharing/How_to_access_files_on_Synology_NAS_with_WebDAV#t1_1" rel="nofollow">instructions on the Synology site here</a> but when it comes to "enter the server address" I do not know what to put. Neither <code>http:</code> not <code>dav:</code> are acceptable server types.</p>
<p>What address should I use please?</p>
<p>All I want is a nice, easy-to-use graphical interface!</p>
| 0non-cybersec
|
Stackexchange
| 228 | 680 |
How to obtain the root $2 \alpha_6 + \alpha_1 + 2 \alpha_2 + 3 \alpha_3 + 2 \alpha_4 + \alpha_5$ in type $E_6$ root system by Weyl group action?. <p>The Dynkin diagram for <span class="math-container">$E_6$</span> is
<span class="math-container">\begin{align}
\circ - \circ - & \circ - \circ - \circ \\
& \ | \\
& \ \bullet
\end{align}</span>
where <span class="math-container">$\bullet$</span> corresponds to the simple root <span class="math-container">$\alpha_6$</span> and the other vertices correspond to <span class="math-container">$\alpha_1, \ldots, \alpha_5$</span> (from left to right) respectively.</p>
<p>The element <span class="math-container">$2 \alpha_6 + \alpha_1 + 2 \alpha_2 + 3 \alpha_3 + 2 \alpha_4 + \alpha_5$</span> is a root in type <span class="math-container">$E_6$</span> root system.</p>
<p>Let <span class="math-container">$W$</span> be the Weyl group in type <span class="math-container">$E_6$</span>. I would like to find <span class="math-container">$w \in W$</span> and some simple root <span class="math-container">$\alpha_i$</span> such that <span class="math-container">$w \cdot \alpha_i = 2 \alpha_6 + \alpha_1 + 2 \alpha_2 + 3 \alpha_3 + 2 \alpha_4 + \alpha_5$</span>. Where <span class="math-container">$w \cdot \alpha_i$</span> denotes the Weyl group action. Thank you very much.</p>
| 0non-cybersec
|
Stackexchange
| 469 | 1,340 |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
|
Stackexchange
| 349 | 1,234 |
Lots of warnings with the physics package with the last version of expl3. <p>Everything worked fine till I use Texlive Utility to update some packages. Then I get a lots of warnings. Here is an MWE</p>
<pre><code>\documentclass{amsart}
\usepackage{physics}
\begin{document}
MWE
\end{document}
</code></pre>
<p>and here is the result in the console window</p>
<pre><code>This is pdfTeX, Version 3.14159265-2.6-1.40.20 (TeX Live 2019) (preloaded format=pdflatex)
restricted \write18 enabled.
entering extended mode
(./MWE.tex
LaTeX2e <2020-02-02> patch level 5
L3 programming layer <2020-02-25>
(/usr/local/texlive/2019/texmf-dist/tex/latex/amscls/amsart.cls
Document Class: amsart 2017/10/31 v2.20.4
(/usr/local/texlive/2019/texmf-dist/tex/latex/amsmath/amsmath.sty
For additional information on amsmath, use the `?' option.
(/usr/local/texlive/2019/texmf-dist/tex/latex/amsmath/amstext.sty
(/usr/local/texlive/2019/texmf-dist/tex/latex/amsmath/amsgen.sty))
(/usr/local/texlive/2019/texmf-dist/tex/latex/amsmath/amsbsy.sty)
(/usr/local/texlive/2019/texmf-dist/tex/latex/amsmath/amsopn.sty))
(/usr/local/texlive/2019/texmf-dist/tex/latex/amsfonts/umsa.fd)
(/usr/local/texlive/2019/texmf-dist/tex/latex/amsfonts/amsfonts.sty))
(/usr/local/texlive/2019/texmf-dist/tex/latex/physics/physics.sty
(/usr/local/texlive/2019/texmf-dist/tex/latex/l3packages/xparse/xparse.sty
(/usr/local/texlive/2019/texmf-dist/tex/latex/l3kernel/expl3.sty
(/usr/local/texlive/2019/texmf-dist/tex/latex/l3backend/l3backend-pdfmode.def))
)
LaTeX3 Warning: Argument delimiter '\big ' for the command '\@quantity' should
(LaTeX3) be a single character.
LaTeX3 Warning: Argument delimiter '\Big ' for the command '\@quantity' should
(LaTeX3) be a single character.
LaTeX3 Warning: Argument delimiter '\bigg ' for the command '\@quantity'
(LaTeX3) should be a single character.
LaTeX3 Warning: Argument delimiter '\Bigg ' for the command '\@quantity'
(LaTeX3) should be a single character.
LaTeX3 Warning: Argument delimiter '\big ' for the command '\@braces' should
(LaTeX3) be a single character.
LaTeX3 Warning: Argument delimiter '\Big ' for the command '\@braces' should
(LaTeX3) be a single character.
LaTeX3 Warning: Argument delimiter '\bigg ' for the command '\@braces' should
(LaTeX3) be a single character.
LaTeX3 Warning: Argument delimiter '\Bigg ' for the command '\@braces' should
(LaTeX3) be a single character.
LaTeX3 Warning: Argument delimiter '\big ' for the command '\fbraces' should
(LaTeX3) be a single character.
LaTeX3 Warning: Argument delimiter '\Big ' for the command '\fbraces' should
(LaTeX3) be a single character.
LaTeX3 Warning: Argument delimiter '\bigg ' for the command '\fbraces' should
(LaTeX3) be a single character.
LaTeX3 Warning: Argument delimiter '\Bigg ' for the command '\fbraces' should
(LaTeX3) be a single character.
LaTeX3 Warning: Argument delimiter '\ket ' for the command '\bra' should be a
(LaTeX3) single character.
) (./MWE.aux) (/usr/local/texlive/2019/texmf-dist/tex/latex/amsfonts/umsa.fd)
(/usr/local/texlive/2019/texmf-dist/tex/latex/amsfonts/umsb.fd) [1{/usr/local/t
exlive/2019/texmf-var/fonts/map/pdftex/updmap/pdftex.map}] (./MWE.aux) )</usr/l
ocal/texlive/2019/texmf-dist/fonts/type1/public/amsfonts/cm/cmr10.pfb></usr/loc
al/texlive/2019/texmf-dist/fonts/type1/public/amsfonts/cm/cmr7.pfb>
Output written on MWE.pdf (1 page, 15935 bytes).
SyncTeX written on MWE.synctex.gz.
Transcript written on MWE.log
</code></pre>
<p>Does anybody have a solution to make these warnings disappear?</p>
| 0non-cybersec
|
Stackexchange
| 1,274 | 3,671 |
Which HDDs/SSDs will be compatible with my Lenovo X201?. <p>I'm thinking of replacing the HDD on my Lenovo X201. I'm willing to consider either new or used HDDs or SSDs, but I don't know what my constraints are. That is, what are the physical and software-based compatibility limits for HDDs/SSDs with my laptop model?</p>
<p>My current disk is a <a href="https://www.newegg.com/Product/Product.aspx?Item=N82E16822148489" rel="nofollow noreferrer">ST9250315AS</a>: Seagate Momentus, 2.5", 5400 RM, SATA 3GB/sec.</p>
<p>Can there be a mounting issue with SSDs which are shorter in height than my HDD?</p>
| 0non-cybersec
|
Stackexchange
| 198 | 607 |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
|
Stackexchange
| 349 | 1,234 |
Internet entirely unable to work. <p>Lately, my computer has had trouble connecting to the internet. I'm completely unable to do any work I need to do, etc. This has gone on for 2 weeks. Occasionally, it will work for about 3 minutes but then stops working again. My computer is a desktop PC and not a laptop.</p>
<p>Here's what I've gathered from tampering with it:</p>
<ul>
<li><p>My computer cannot connect to a wired or unwired connection (I think)</p></li>
<li><p>My computer does not display a yellow warning sign when it's unable to connect.</p></li>
<li><p>The main error I am receiving is 'server DNS address cannot be found'.</p></li>
<li><p>It says I am connected without any problems when I get the above error. When it says I am connected my browser <em>and</em> internet are not working.</p></li>
</ul>
<p>So, I don't really know what to do because it says I'm connected. Though, I suppose this final point might help answers: <strong>other devices are able to connect completely fine.</strong></p>
<p>Is there any way to fix my problem? Thanks.</p>
<pre><code>C:\WINDOWS\system32>ipconfig /all
Windows IP Configuration
Host Name . . . . . . . . . . . . : DanielCann-PC
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
DNS Suffix Search List. . . . . . : home
Wireless LAN adapter Local Area Connection* 3:
Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter
Physical Address. . . . . . . . . : 38-2C-4A-46-A3-26
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Ethernet adapter Local Area Connection:
Connection-specific DNS Suffix . : home
Description . . . . . . . . . . . : Realtek PCIe GBE Family Controller
Physical Address. . . . . . . . . : 38-2C-4A-E8-24-D4
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::5ded:730f:8516:c5b5%4(Preferred)
IPv4 Address. . . . . . . . . . . : 192.168.1.94(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Lease Obtained. . . . . . . . . . : Saturday, October 1, 2016 7:58:43 AM
Lease Expires . . . . . . . . . . : Sunday, October 2, 2016 7:58:43 AM
Default Gateway . . . . . . . . . :
DHCP Server . . . . . . . . . . . : 192.168.1.254
DHCPv6 IAID . . . . . . . . . . . : 238562378
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-1C-62-3C-20-38-2C-4A-E8-24-D4
DNS Servers . . . . . . . . . . . : 8.8.8.8
8.8.4.4
NetBIOS over Tcpip. . . . . . . . : Enabled
Wireless LAN adapter Wireless Network Connection 3:
Connection-specific DNS Suffix . : home
Description . . . . . . . . . . . : ASUS PCE-N15 11n Wireless LAN PCI-E Card
Physical Address. . . . . . . . . : 38-2C-4A-46-A3-26
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::a13f:deef:5f08:2cdd%8(Preferred)
IPv4 Address. . . . . . . . . . . : 192.168.1.77(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Lease Obtained. . . . . . . . . . : Saturday, October 1, 2016 8:55:21 AM
Lease Expires . . . . . . . . . . : Sunday, October 2, 2016 9:09:05 AM
Default Gateway . . . . . . . . . :
DHCP Server . . . . . . . . . . . : 192.168.1.254
DHCPv6 IAID . . . . . . . . . . . : 272116810
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-1C-62-3C-20-38-2C-4A-E8-24-D4
DNS Servers . . . . . . . . . . . : 8.8.8.8
8.8.4.4
NetBIOS over Tcpip. . . . . . . . : Enabled
Tunnel adapter Teredo Tunneling Pseudo-Interface:
Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
Tunnel adapter isatap.home:
Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . : home
Description . . . . . . . . . . . : Microsoft ISATAP Adapter #2
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
</code></pre>
<p>Update:</p>
<p>My internet is now functional for about 5 minutes after I restart my computer. It then goes strange, and gives me a 'Server DNS Adress could not be found' error. The troubleshooter is not able to fix it. Does anyone have any ideas?</p>
| 0non-cybersec
|
Stackexchange
| 1,742 | 4,802 |
I want the Westworld tech staff phone. If you've seen the show, you know what I'm talking about: a phone that opens up with three side-by-side touch screens, that connects instantly to any desktop for exchange of information, commands and control, and works even way out in the isolated parts of the WW park/desert area. I'm not sure they type on them, but the voice commands are so sophisticated maybe they don't need to. In one show one of the techs uses it to connect to some ancient (20+ year old device) that has been under the debris in an abandoned theater in an unused part of the park.
| 0non-cybersec
|
Reddit
| 138 | 595 |
Java: plugin install for freemind, get : NoClassDefFoundError org/objectweb/asm/Opcodes. <p>I am using freemind 0.9 on Ubuntu 12.04, and trying to install a plugin written with "groovy", from
<a href="http://blog.icare3d.org/2011/02/writing-phd-thesis-using-freemind-and.html" rel="nofollow">http://blog.icare3d.org/2011/02/writing-phd-thesis-using-freemind-and.html</a></p>
<p>I installed freemind, freemind-plugins-script, put manually (and edited) the grrovy srcipt, edited plugins/ScriptingEngine.xml as described in the link. The plugin is recognised as I can access through the menu, but clicking on it has no effect.</p>
<p>I realise in the terminal there is an error:</p>
<pre><code>STDERR: Exception in thread "AWT-EventQueue-1"
STDERR: java.lang.NoClassDefFoundError: org/objectweb/asm/Opcodes
STDERR: at java.lang.ClassLoader.defineClass1(Native Method)
STDERR: at java.lang.ClassLoader.defineClass(ClassLoader.java:643)
STDERR: at java.security.SecureClassLoader.defineClass(SecureClassLoader.java:142)
STDERR: at java.net.URLClassLoader.defineClass(URLClassLoader.java:277)
STDERR: at java.net.URLClassLoader.access$000(URLClassLoader.java:73)
</code></pre>
<p>My understanding is that I am missing a java component? Is this correct? Or is it that that component is not updated (I note I have grrovy 1.9 while 2.3 seems there)? </p>
<p>If so, how can I locate it? I saw some libasm-java libraries, installed a bunch of them (libasm-dev, libasm-java, libasm1, libasm2-java, libasm2-java, libasm3-java) but still the same error. Interestingly, I note that objectweb/asm/Opcode is mentioned in <a href="http://packages.ubuntu.com/pt/lucid/all/libasm2-java-doc/filelist" rel="nofollow">libasm2-java-doc</a> but not in libasm2-java</p>
<p>Or maybe the library is correctly installed, but it is the plugin/freemind that does not locate it correctly? </p>
<p>As I don't know anything about Java, any hint would be most appreciated! Thanks!!</p>
| 0non-cybersec
|
Stackexchange
| 651 | 1,989 |
Replace non-numeric characters in string. <p>I would like to know how to replace non-numeric characters in a single string with different random integers.</p>
<p>I have tried the following:</p>
<pre><code>text = '1$1#387'
rec_1 = re.sub("\D+",str(random.randint(0,9)),text)
</code></pre>
<p>It then produced:</p>
<pre><code>output: 1717387
</code></pre>
<p>As you can see, the non-numeric characters have been replaced by the same integer. I would like each non-numeric character to be replaced by a different integer. For example:</p>
<pre><code>desired output: 1714387
</code></pre>
<p>Please assist.</p>
| 0non-cybersec
|
Stackexchange
| 201 | 615 |
How to derive the density of Gaussian Copula?. <p>I have a question regarding Gaussian copulas: </p>
<p>The multivariate Gaussian copula is defined as,
<span class="math-container">$$
C(u_1,\dots,u_n;\Sigma) = \Phi_{\Sigma}(\Phi^{-1}(u_1),\dots,\Phi^{-1}(u_n)),
$$</span>
where <span class="math-container">$\Phi_{\Sigma}$</span> is a multivariate <span class="math-container">$n$</span>-dimensional normal distribution with correlation matrix <span class="math-container">$\Sigma$</span> and <span class="math-container">$\Phi$</span> is the standard univariate cumulative distribution function. How can we show that the corresponding density
is:
<span class="math-container">\begin{align}
c(u_1,\dots,u_n;\Sigma) &= \frac{1}{\sqrt{\mbox{det} \Sigma}}\exp
\begin{pmatrix} - \displaystyle{\frac{1}{2}}
\begin{bmatrix}
\Phi^{-1}(u_1) \\
\vdots \\
\Phi^{-1}(u_n)
\end{bmatrix}^{T} [\Sigma^{-1} - I ]
\begin{bmatrix}
\Phi^{-1}(u_1) \\
\vdots \\
\Phi^{-1}(u_n)
\end{bmatrix}
\end{pmatrix},
\end{align}</span>
where <span class="math-container">$I$</span> is the identity matrix? </p>
| 0non-cybersec
|
Stackexchange
| 386 | 1,216 |
Prove the following for an addition binary operation. <p>I'm struggling to understand if my attempted proof is correct for the following question:</p>
<blockquote>
<p>Prove the following formula when the binary operation is the addition of real numbers:</p>
<p><span class="math-container">\begin{equation}
\exists_{x}\forall_{y}[[x=1]\implies[x + y = y]]
\end{equation}</span></p>
</blockquote>
<p>My attempt follows:
<span class="math-container">\begin{align}
1&. \quad \exists_{x}\forall_{y}[[x=1]\implies[x + y = y]] &(prove) \\
2&. \quad x = 0 &(choose) \\
3&. \quad y &(initialise) \\
4&. \quad x = 1 &(given) \\
5&. \quad 0 + y = y & \\
6&. \quad x + y = y &(2,5) \\
7&. \quad [x=1] \implies [x+y=y] &(5,6) \\
8&. \quad \forall_{y} [[x=1] \implies [x+y=y]] &(3 \to 7) \\
9&. \quad \exists_{x} \forall_{y} [[x=1] \implies [x+y=y]] &(2 \to 8)
\end{align}</span></p>
<p>I always struggle to prove things that "don't make sense". By that, I mean that we expect to find that <span class="math-container">$x = 0$</span> because then <span class="math-container">$x+y=y$</span> would work for all <span class="math-container">$y$</span>. The problem is that the question states that if <span class="math-container">$x=1$</span> then <span class="math-container">$x+y=y$</span> can be concluded.
In my attempted proof, in line two, I chose <span class="math-container">$x$</span> to be equal to <span class="math-container">$0$</span> and then in line four I use the assumption that if <span class="math-container">$x=1$</span> the conclusion would hold.</p>
<p>Maybe if I wrote my logic out in English it would help to understand what I'm struggling with. According to me, the question reads as:<br />
There exists an <span class="math-container">$x$</span> such that for all <span class="math-container">$y$</span>, if <span class="math-container">$x=1$</span>, then <span class="math-container">$x+y=y$</span>.</p>
<p>Thus, as I understand it, my proof's explanation would be described by:</p>
<ol>
<li>The <span class="math-container">$\exists$</span> and <span class="math-container">$\forall$</span> symbols exist outside of the implication's brackets, so we can use them as an assumption in our proof.</li>
<li>The first symbol is <span class="math-container">$\exists_{x}$</span>. Therefore, we have to choose an <span class="math-container">$x$</span> in the proof such that the question can be proved. (line 2)</li>
<li>The <span class="math-container">$\forall_{y}$</span> follows, so we should initialise <span class="math-container">$y$</span> to be able to use it as a variable in the proof. (line 3)</li>
<li>Now we are "stuck" (can't make any more conclusions) and should move on to the next part, the implication contained in the brackets.</li>
<li>The implication reads as "if <span class="math-container">$x=1$</span> then <span class="math-container">$x+y=y$</span>". Thus, we assume <span class="math-container">$x=1$</span> to be true so that we can use it in the rest of our proof. (??)</li>
<li>We know <span class="math-container">$0+y=y$</span> and it would satisfy the conclusion part of our implication, so we state it. (line 5)</li>
<li>Since <span class="math-container">$0+y=y$</span> and <span class="math-container">$x=0$</span> (line 2) we can conclude that <span class="math-container">$x+y=y$</span>. (line 6)</li>
<li>From lines 5 and 6 we can conclude that if <span class="math-container">$x=1$</span> then <span class="math-container">$x+y=y$</span>. (line 7)</li>
<li>We can conclude from initialising <span class="math-container">$y$</span> and the lines <span class="math-container">$3\to 7$</span> that the implication holds for all <span class="math-container">$y$</span>. (line 8)</li>
<li>Because we chose an appropriate <span class="math-container">$x$</span> value where the content contained in lines <span class="math-container">$2\to 8$</span> holds, we can conclude there exists such an <span class="math-container">$x$</span>. (line 9)</li>
</ol>
<p>Any help would be appreciated!<br />
Thanks in advance.</p>
| 0non-cybersec
|
Stackexchange
| 1,406 | 4,205 |
Show that there is a continuous function such that $f(x) = \frac{1}{3}\int_{0}^x t^2\sin(f(t))dt$ for every $x \in [0,1]$.. <p>Notation: $C([0,1],\mathbb{R})$ is the normed vector space of the continuous functions from $[0,1]$ to the real line, with norm $|f| = \sup \{|f(x)|, x \in [0,1]\}$</p>
<p>Show that there is a continuous funtcion $f:[0,1]\longrightarrow \mathbb{R}$ such that $\forall x \in [0,1]$ it satisfies:</p>
<p>$$f(x) = \frac{1}{3}\int_{0}^{x}t^2\sin(f(t))\,dt$$</p>
<p>Well, I am trying to solve this exercise. My idea is to show that the functional $J:C([0,1],\mathbb{R}) \rightarrow C([0,1],\mathbb{R})$ given by $J(f(x)) = \dfrac{1}{3}\int_{0}^{x}t^2\sin(f(t))\,dt$ has a fixed point. I am trying to show that this functional is a contraction and then conclude that there is a function $f$ such that $J(f) = f$, but I am struggling to find upper bounds for |J(f) - J(g)|. Any hints to find upper bounds for this functional?</p>
| 0non-cybersec
|
Stackexchange
| 357 | 953 |
My engagement ring was not acceptable apparently. How can I mitigate my financial loss? Details in post.. /It's a 2.10 i excellent cut VS2I oval diamond set in 14k yellow gold band. She doesn't like it, and I don't have the option if returning it or exchanging it (the place I bought it is now defunct). What are my best options to either exchange it or sell it without losing too much of the 18k I've put out? (Starting to reconsider my proposal... =/).
Thank you all! I hope this us the right sub.
EDIT: It's not because she wants a cheaper ring, just a different one.
EDIT2: EDIT: She doesn't like the stone or the band. I'm honestly thinking something else is going on. I hope I can find someone to pay me a decent price for it. The money is no object; it's the pain.
EDIT3: thank you all for the comments and advice! Based on everything I've read/beeen feeling, I'm going to sell the ring/diamond to a private buyer (the single stone is 2.10ct.). I had the ring appraised, and the jeweler offered to buy it out right for what I expected: ~$5000. Anyone looking to propose? I can help you I suppose! :) ): I'm not sure I'll be buying another one. I know it's out of the price range for many, so I'd be willing to entertain trades too! With all of the advice great advice here, I'll start another listing specifically for the sale of the diamond/ring.
EDIT4: Listed on /r/jewelry and /r/bigticket
| 0non-cybersec
|
Reddit
| 363 | 1,405 |
Login loop after upgrading to 19.04. <p>I used the built-in upgrader to upgrade to 19.04 today, and I'm now stuck in a login loop. I have tried many solutions from forums, but nothing has worked. Is there something I'm missing or anything else I should try? </p>
<p>From what I've seen, I don't think that there is an Xauthority file on my computer. I'm on a Dell XPS 15 with a GTX 1050Ti Max-Q GPU, and a Core i7 processor. I also have a Windows dual boot, and while Ubuntu's my main OS, luckily almost everything is on GitHub, Google Drive or my Windows partition. </p>
<p>Results of <code>ubuntu-drivers devices</code> : </p>
<pre class="lang-none prettyprint-override"><code>emil@emil-XPS-15-9570:~$ ubuntu-drivers devices
== /sys/devices/pci0000:00/0000:00:01.0/0000:01:00.0 ==
modalias : pci:v000010DEd00001C8Csv00001028sd0000087Cbc03sc02i00
vendor : NVIDIA Corporation
model : GP107M [GeForce GTX 1050 Ti Mobile]
driver : nvidia-driver-418 - distro non-free recommended
driver : nvidia-driver-415 - third-party free
driver : nvidia-driver-396 - third-party free
driver : nvidia-driver-390 - distro non-free
driver : xserver-xorg-video-nouveau - distro free builtin
</code></pre>
<p>Results of <code>sudo systemctl start graphical.target</code> :</p>
<pre class="lang-none prettyprint-override"><code>Failed to start graphical-target.service: Unit graphical-target.service not found.
</code></pre>
| 0non-cybersec
|
Stackexchange
| 450 | 1,424 |
Brief Affair With a Bluish Light. It's hard to try and think about a cute girl you just met and won't ever see again and try to get her out of your head at the same time. "Drive home safe!" her annoying, kinda controlling friend said to me after the cute girl left. Well, I don't have a car, so I'm walking the ten blocks home from the bar and it's raining, but it's not in my heart to kill the after-party's good mood, so I just politely said goodbye.
Here's a good idea: walking home wearimg all black in the rain for ten blocks on Halloween night in Hayward. Sketch as fuck, but I kept my head down and walked down the street to my apartment pretending I'm a ghost to any homeless creepers and not hearing anything but The Copyrights playing "This Ain't Broadway" over and over in my ears. Actually, I hadn't seen anybody sketchy and I was almost home. Way better than the last time I walked this route at night, when the bum across the street from me was playing light sabers with a tree branch as big as himself. Good thing he didn't notice me. I just kept walking then and I just kept walking now. I was almost forgetting that cute girl, the one with dark circles under her eyes who said "it was nice to meet you" and who I'd only managed to say "hey, if you ever..." to. That's when I saw the light.
You know how at night when it rains the glare of a car's headlights look like two columns of light? Well, there was only one column coming towards me. And no engine noise. I had paused the track on my mp3 player a minute ago. Not a sound except the light rain. And this...unchanging column of bluish light was speeding past me down the road.
For some reason I didn't want to turn my head and look at it, but I didn't feel overly frightened. It was like the hobo with the big stick pretending to be Luke Skywalker. I just kept moving and didn't look. Then I saw my shadow suddenly lit up in front of me in a bluish light. Keep moving. I studied my shadow, which was taller and a bit more flattering than the body making it. I thought about that cute girl flirting with the dull, tall handsome guys and not me for a second. Keep moving. I felt a warm hand on my shoulder and saw what looked like a pretty good-looking female figure's shadow next to mine, hand on my shadow's shoulder. I stopped. Put my hand on hers. She disappeared, quickly, but not abruptly. I guess we weren't going back to my place. I said softly, "It was nice to meet you."
If some poor girl got hit by a car around there, I don't want to know about it. I don't think she would want me to know either. Whatever happened, the why of it isn't what we shared.
| 0non-cybersec
|
Reddit
| 638 | 2,637 |
[SPOILERS] Interesting thing I noticed in the after credits cutscene. As the traveler releases the large pulse of energy, it is shown emanating across the galaxy. The first two things that are shown being touched by the energy are Mercury, and then Mars. While we are fairly certain that DLC 2 will take place there, I feel like this is a good indicator that it will as well. I remember that during one of the CoO streams they mentioned that the energy wave from the traveler is what caused the Vex on Mercury do start doing whatever it is they’re doing. I can only guess that this will have the same effect on the Warmind on Mars as well.
This is just a random thing I noticed, as I didn’t pay too much attention to detail the first few times I watched that cutscene
| 0non-cybersec
|
Reddit
| 178 | 770 |
Add a button in a new column to all rows in a DataGrid. <p>I have a <code>DataGridView</code> object:</p>
<pre><code>dataGridView1.DataSource = an.peaks;
</code></pre>
<p>(an.peaks is a <code>List<Point></code> object. <code>Point</code> type has 3 properties: x,y,z)</p>
<p>witch generates the next table on run-time: (Apparently I cant upload an <code>Image</code> yet because I'm a new user so I'll try to draw it :)</p>
<pre><code>____|_x__|_y__|_z__|[new column ]
____|_11_|_12_|_13_|[text/button] <==\
____|_20_|_30_|_40_|[text/button] <== } Add text if something or button if something else.
____|_50_|_60_|_70_|[text/button] <==/
</code></pre>
<p>I would like to add buttons (as shown in the image/drawing) in a new column to each row that satisfying some condition. If the condition is not satisfied add some text instead.</p>
<p>Example: If the point already exist in the database show it's substance name (each point represent a substance). If not add a button "ADD" to the corresponding row that will add the new point to the database.</p>
<p>The conditions are not the problems - they are only for examples. The problem is adding the buttons/text to each row and the clicking event for the new button/s.</p>
| 0non-cybersec
|
Stackexchange
| 396 | 1,243 |
Configuring SMTP for Sharelatex and sending emails from inside a docker container. <p><strong>My aim:</strong> I want to have a <a href="https://github.com/overleaf/overleaf" rel="nofollow noreferrer">sharedlatex</a> instance on my VM with Ubuntu 18 and sharedlatex should be able to send mails.</p>
<p><strong>Status:</strong> Sharedlatex is already running in a docker container but I have to configure the mail thing.</p>
<p>I am an absolute beginner into email and docker.</p>
<p>I could install and configure postfix on my Ubuntu so I can send mails via:</p>
<pre><code>echo "body" | mail -s "subject" -aFrom:[email protected] [email protected]
</code></pre>
<p>Then I tried setting </p>
<p><code>root@fame-overleaf:~# SHARELATEX_EMAIL_FROM_ADDRESS="[email protected]</code></p>
<p>according to <a href="https://github.com/overleaf/overleaf/wiki/Configuring-SMTP-Email" rel="nofollow noreferrer">sharelatex SMTP-Configuration</a> but it didn't work. </p>
<p>So I tried to send a mail from the commandline of the docker container but it seemed not to be able in the container. </p>
<pre><code>root@fame-overleaf:~# docker exec sharelatex /bin/bash -c 'echo "body" | mail -s "subject" -aFrom:[email protected] [email protected]'
/bin/bash: mail: command not found
root@fame-overleaf:~# docker exec sharelatex /bin/bash -c 'postfix status'
/bin/bash: postfix: command not found
root@fame-overleaf:~# docker exec sharelatex /bin/bash -c "man postfix"
/bin/bash: man: command not found
</code></pre>
<p>I guess I am doing it way too complicated then it is. Should I install and configure Postfix from inside the docker container?</p>
| 0non-cybersec
|
Stackexchange
| 554 | 1,687 |
No php-fpm error logs from docker container. <p>Using apache + php-fpm containers in docker-compose, I can't get the php-fpm container to display any errors.</p>
<p><strong>docker-compose.yml</strong></p>
<pre><code>version: '3'
services:
php:
build:
context: ./php
ports:
- 9000:9000
volumes:
- ./code:/code
- ./php/www.conf:/usr/local/etc/php-fpm.d/www.conf
environment:
ENVIRONMENT: local
web:
image: httpd:2.4
depends_on:
- php
ports:
- 80:80
volumes:
- ./code:/usr/local/apache2/htdocs
- ./web/httpd.conf:/usr/local/apache2/conf/httpd.conf
depends_on:
- php
</code></pre>
<p><strong>php-fpm Dockerfile:</strong></p>
<pre><code>FROM php:5.6-fpm
</code></pre>
<p><strong>php-fpm www.conf:</strong></p>
<pre><code>[global]
error_log = /proc/self/fd/2
[www]
user = www-data
group = www-data
listen = nginx:9000
pm = dynamic
pm.max_children = 5
pm.start_servers = 2
pm.min_spare_servers = 1
pm.max_spare_servers = 3
; Logging
; if we send this to /proc/self/fd/1, it never appears
access.log = /proc/self/fd/2
clear_env = no
; Ensure worker stdout and stderr are sent to the main error log.
catch_workers_output = yes
php_flag[display_errors] = on
php_admin_flag[log_errors] = on
;php_admin_value[error_log] = /var/log/fpm-php.www.log
php_admin_value[error_reporting] = E_ALL & ~E_NOTICE & ~E_WARNING & ~E_STRICT & ~E_DEPRECATED
php_admin_value[display_startup_errors] = on
</code></pre>
<p><em>docker-compose logs</em> only shows php-fpm access logs, no error logs.</p>
<p>Tried all solutions proposed in post proposed as possible duplicate: <a href="https://stackoverflow.com/questions/8677493/php-fpm-doesnt-write-to-error-log">PHP-FPM doesn't write to error log</a>
None of them worked for me, check my comments down below.</p>
| 0non-cybersec
|
Stackexchange
| 714 | 1,871 |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
|
Stackexchange
| 349 | 1,234 |
Black screen after logged in. Xubuntu 12.10. <p>I had Xubuntu 12.10 running for a month or so without major problems. A few days ago after downgrad firefox from 29 to 28 by removing and reinstalling and upgrading system , the system blacked out and can't get into GUI ever again. The symptoms are:</p>
<p>log in screen fine, after logged in, a black screen with a white cursor stopped in the middle the screen, unmovable, everything stucked here.</p>
<p>I had tried to log in to tty1, and here I tried a few things:</p>
<ol>
<li><p>run <code>startx</code>, a small error window pops out saying "failed to load session "gnome"", and an button "log out", I clicked it and was brought back to tty1 seeing a lot of messages(*1)</p></li>
<li><p>run <code>lspci | -i VGA</code>, it gives "00.02 0 VGA compatible ....Intel..integrated....." which is my integraded intel graphic card.</p></li>
<li><p>run <code>sudo apt-get --purge remove nivdia*</code>, it gives 0 installed package to remove. so nothing to remove here.</p></li>
<li><p>try to check file /etc/X11/xorg.conf, but no such file, instead there are several named a little bit different like xorg.conf.d*....</p></li>
<li><p>I send a copy of /var/log/Xorg.0.log to my email and it is attached here <a href="http://paste.ubuntu.com/7403846/" rel="nofollow noreferrer">http://paste.ubuntu.com/7403846/</a></p></li>
</ol>
| 0non-cybersec
|
Stackexchange
| 430 | 1,377 |
User can not access network printers with Windows 7 connected to Windows 2008 R2. <p>A single user on Windows 7 on a Windows Domain can not access/use/manipulate network printers shared from a server running Windows 2008 R2. The error that occurs is "0x00000005 Access is denied". Any other user I create in the system can access and print to said printers, even with identical group memberships. I expect that if I wipe out the user's local profile (it's not a roaming profile), it will remove the problem.</p>
<p><strong>Is there anything specific that can be checked in the user's profile or Registry HKCU to discover the cause of the "access is denied" error?</strong></p>
<p>Details:</p>
<ul>
<li>All printers shared from the Windows Server are failing with "0x00000005 Access is denied" when the user attempts to view the printer properties, view the print queue, or print to the printer.</li>
<li>The problem <em>is</em> specific to the local user profile. This user on other computers does not fail and other users on this computer also do not fail.</li>
<li>Killing the local user profile and starting it from scratch is completely off the table.</li>
<li>Testing the Effective Permissions for this user shows that the user does have the "Print" and "Read Permissions" privileges on the affected printers.</li>
</ul>
<p>Edit: This user's computer ended up with a virus afterward and so we wiped and reinstalled the system. The problem didn't occur after the wipe.</p>
| 0non-cybersec
|
Stackexchange
| 368 | 1,486 |
Regex Find Spaces between single qoutes and replace with underscore. <p>I have a database table that I have exported. I need to replace the image file name with a space and would like to use notepad++ and regex to do so. I have:</p>
<pre><code>'data/green tea powder.jpg'
'data/prod_img/lumina herbal shampoo.JPG'
'data/ALL GREEN HERBS.jpeg'
'data/prod_img/PSORIASIS KIT (640x530) (2).jpg'
</code></pre>
<p>and need to make them look like this:</p>
<pre><code>'data/green_tea_powder.jpg'
'data/prod_img/lumina_herbal_shampoo.JPG'
'data/ALL_GREEN_HERBS.jpeg'
'data/prod_img/PSORIASIS_KIT_(640x530)_(2).jpg'
</code></pre>
<p>I just want to change the spaces between the quotes (I don't want to change the capitalization). To be more specific I would like to replace any and all spaces between 'data/ and ' because there are other spaces between quotes in the DB, for example:</p>
<pre><code>'data/ REPLACE ANY SPACE HERE '
</code></pre>
<p>I found this: </p>
<pre><code>\s(?!(?:[^']*'[^']*')*[^']*$)
</code></pre>
<p>but there are other places where there are spaces between quotes so I'd like to search for <code>data/</code> in the beging and not just a single quote but I can't figure out how. I tried <code>\s(?!(?:[^'data\/]*'[^']*')*[^']*$)</code> but it didn't work and I am not familiar enough with regex to make it do so.</p>
<p>An example of a full line from the database is:</p>
<pre><code>(712, 'GRTE-P', '', 'data/green tea powder.jpg', '2014-03-12 22:52:03'),
</code></pre>
<p>I don't want to replace the spaces in the time and data stamp at the end of the line, just the image file names.</p>
<p>Thanks in advance for your help!</p>
| 0non-cybersec
|
Stackexchange
| 574 | 1,658 |
Hardness of Subgraph isomorphism problem for sparse pattern graph. <p>Subgraph isomorphism problem is a well studied problem: given graphs $G$ and $H$, one needs to answer if $H$ contains $G$ as a subgraph. It was proven that this problem requires $|H|^{\theta(|G|)}$ time assuming <strong>ETH</strong>. The easiest way to see this is to consider $G$ to be a clique and recall that $k$-clique problem requires $n^{\theta(k)}$ under <strong>ETH</strong> [1].</p>
<p>On the positive side, if $G$ is a path, a tree or a collection of small identical graphs we know how to solve Subgraph isomorphism in $f(|G|) |H|^{O(1)}$ time [2,3]. All these graphs are sparse, however I'm unaware of a general algorithm that runs in time $f(|G|) |H|^{O(1)}$, for all sparse graphs $G$. </p>
<p>My question is: do we know any conditional lower bounds for Subgraph isomorphism for sparse pattern graphs?</p>
<p>[1]<em>Chen, Jianer, et al. "Tight lower bounds for certain parameterized NP-hard problems." Information and Computation 201.2 (2005): 216-231.</em></p>
<p>[2]<em>Koutis, Ioannis, and Ryan Williams. "Limits and applications of group algebras for parameterized problems." International Colloquium on Automata, Languages, and Programming. Springer Berlin Heidelberg, 2009.</em></p>
<p>[3]<em>Fellows, Mike, et al. "Finding k disjoint triangles in an arbitrary graph." International Workshop on Graph-Theoretic Concepts in Computer Science. Springer Berlin Heidelberg, 2004.</em></p>
| 0non-cybersec
|
Stackexchange
| 413 | 1,478 |
Proper use of artifacts.require?. <p>I am trying to understand how <code>artifacts.require</code> should be used. I've seen the standard paragraph describing it as being for migrations and testing. From this I infer that the globally scoped <code>artifacts</code> with its method <code>require</code> are automatically defined by the truffle executable tool when doing migrations or running tests. However, I am working with some code that uses <code>artifacts.require</code> outside the context of any migrations or tests, rather, this code just needs to do the usual <code>at</code> and <code>new</code>. However, in this context, the object <code>artifacts</code> is not defined.</p>
<p>Do I have the right picture here? Is this an appropriate use of <code>artifacts.require</code>? If so, what must be done to make it be defined outside of migrations and testing?</p>
<p>Thanks for any suggestions!</p>
| 0non-cybersec
|
Stackexchange
| 243 | 916 |
What is the difference between scipy.optimize's 'root' and 'fixed_point' methods. <p>There are two methods in scipy.optimize which are <code>root</code> and <code>fixed_point</code>.</p>
<p>I am very surprised to find that <code>root</code> offers many methods, whereas <code>fixed_point</code> has just one. Mathematically the two are identical. They relate the following fixed points of <code>g(x)</code> with the roots of <code>f(x)</code>:</p>
<p>[ g(x) = f(x) - x ]</p>
<p>How do I determine which function to use?</p>
<p>Also, none of the two methods allow me to specify the regions where the functions are defined. Is there a way to limit the range of <code>x</code>?</p>
| 0non-cybersec
|
Stackexchange
| 230 | 703 |
How to clear all CUPS queues on startup of server?. <p>In our specific application, we need to clear all CUPS print queues of all jobs upon startup of the CUPS server. </p>
<p>How can I achieve this? </p>
<p>Raspbian 10, CUPS version 2.2.10</p>
<p>What I already tried:
1. Add new startup script: /etc/init.d/clear-print-queue containing the following:</p>
<pre><code>#!/bin/sh
/usr/bin/cancel -a
</code></pre>
<p>Then chmod +x on this script, then update-rc.d clear-print-queue defaults</p>
<p>On reboot the queues are not cleared.
I assumed that maybe the script didn't work because CUPS wasn't yet started upon execution of this script, so I did the following instead:</p>
<ol start="2">
<li><p>Modify the existing /etc/init.d/cups script and add the following line in the 'start' section, directly before the ;; line:</p>
<p>/usr/bin/cancel -a</p></li>
</ol>
<p>Neither of these works: jobs that were in the queue before reboot are still there after.</p>
<p>Any ideas how I can solve this?</p>
| 0non-cybersec
|
Stackexchange
| 333 | 1,010 |
Different partition after upgrade of OPENWRT. <p>I have just updated the firmware of my olinuxino rt5350f to the last release of chaos calmer 15.05.1 (<a href="https://openwrt.org/" rel="nofollow">website</a>, <a href="https://downloads.openwrt.org/chaos_calmer/15.05.1/ramips/rt305x/openwrt-15.05.1-ramips-rt305x-olinuxino-rt5350f-squashfs-sysupgrade.bin" rel="nofollow">image</a>).</p>
<p>After having finished the installation via tftp I noticed that the free space is now just 232 KB, while it was 2 MB with the previous version. Is there any module or packet that has been added and that I can remove. Do you think I did something wrong? Is it possible to change the size of any partition?
On the current version of chaos calmer 15.05.1 when I type <code>df -h</code> I obtain:</p>
<pre><code>root@OpenWrt:~# df -h
Filesystem Size Used Available Use% Mounted on
rootfs 448.0K 216.0K 232.0K 48% /
/dev/root 2.3M 2.3M 0 100% /rom
tmpfs 14.2M 624.0K 13.6M 4% /tmp
tmpfs 14.2M 48.0K 14.2M 0% /tmp/root
tmpfs 512.0K 0 512.0K 0% /dev
/dev/mtdblock6 448.0K 216.0K 232.0K 48% /overlay
overlayfs:/overlay 448.0K 216.0K 232.0K 48% /
</code></pre>
<p>On the previous version instead:</p>
<pre><code>root@OpenWrt:/# df -h
Filesystem Size Used Available Use% Mounted on
rootfs 4.2M 2.1M 2.1M 50% /
/dev/root 2.5M 2.5M 0 100% /rom
tmpfs 14.3M 432.0K 13.8M 3% /tmp
/dev/mtdblock6 4.2M 2.1M 2.1M 50% /overlay
overlayfs:/overlay 4.2M 2.1M 2.1M 50% /
tmpfs 512.0K 0 512.0K 0% /dev
</code></pre>
| 0non-cybersec
|
Stackexchange
| 581 | 1,486 |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
|
Stackexchange
| 349 | 1,234 |
Is there a design pattern for this?. <p>I have a component that needs to call a specific service depending on the input it receives. So my component has to look at the input and based on a configuration that says "for this input call this service with this data" needs to call the proper service. The services have a common signature method and a specific one (each).</p>
<p>I thought about an abstract class that includes the signatures for all three methods. The implementation for the two services will override all three methods (throwing <code>NotImplementedException</code> for the methods that are not supported by current service). A component that could be initialized with a map (that for each input type will have the type of the service to be called) will also be defined.</p>
<p>Do you have a better approach to cope this scenario ?</p>
| 0non-cybersec
|
Stackexchange
| 190 | 852 |
Azure VM DDOS attack via RDP. <p>Yesterday my VM on Azure was under a DOS attack.
Symptom was I wasn't able to connect via RDP, unless the server was freshly rebooted, and only for a small fraction of time after the reboot.
Once I successfully connected, with netstat I noticed that there were like 50 RDP connection trials from an IP address from Taiwan (people using the server are from Italy).
Thus, I blocked that specific IP address in the Azure portal (incoming security rules) and my server was back on track.</p>
<p>Question is: is Azure including a DDOS attack prevention system by default, isn't it?
Are there any extra element I can configure in Azure to prevent those problems? Because at the moment, I only forbid one IP address (the one of yesterday's attacker).</p>
<p>Thank you very much,
Fabio</p>
| 1cybersec
|
Stackexchange
| 204 | 818 |
Emulating "while IFS= read -r line" in bash's C-style for loop. <p>A little context for the question first. The <code>while IFS= read -r line; do ... done < input.txt</code> is a well-known structure for <a href="http://mywiki.wooledge.org/BashFAQ/001" rel="noreferrer">reading a file line-by-line</a> in shell scripting. But having been using c-style for loop ( in case some of the users here don't know, it is the <code>for((i=0;i<=$val;i++))do;...done</code> type used in <code>bash</code> and <code>ksh</code>), I recalled that while and for loops in C-like languages are interchangeable, and can emulate one another. So I came up with c-style loop that emulates the <code>while IFS= read -r line</code> structure mentioned above.</p>
<pre><code>for((i=1;;i++))
do
IFS= read -r line || break
# do something with line here
done < input.txt
</code></pre>
<p>I've tested it with multiple types of input - normal lines, lines with leading tabs/spaces, lines that don't end in <code>\n</code> (which is the case where <code>read</code> can't catch the last line) - and in all cases this works exactly the same as the <code>while</code> loop approach. This also technically has a "built-in" line counter with <code>i</code> variable.</p>
<p>So, the question is this: is there any reason (besides non-portability to other shells aside from <code>ksh</code> and <code>bash</code> ) to avoid using this approach ? Are there cases where this might fail ? While this works well, I want to know if there's any issues I've overlooked before starting to use this approach actively in my own scripts. </p>
| 0non-cybersec
|
Stackexchange
| 490 | 1,630 |
3 balls are distributed to 3 boxes at random. Number of way in which we set at most 1 box empty is:. <p>3 balls are distributed to 3 boxes at random. Number of way in which we set at most 1
box empty is:</p>
<p><strong>My approach:-</strong>
let no of box = <span class="math-container">$n$</span> & no of balls = <span class="math-container">$k$</span></p>
<p>and both are distinct.</p>
<p>Now required way ,</p>
<p>zero box empty + 1 box empty</p>
<p><span class="math-container">$\implies n_{\mathrm{P }_{k}} + S(k,n) * n!$</span></p>
<p><span class="math-container">$\implies 3_{\mathrm{P }_{3}} + S(3,2)*2$</span></p>
<p><span class="math-container">$\implies 3! + 6 = 12$</span></p>
<p>where,
<span class="math-container">$\mathbf{S}(\mathbf{k},
\mathbf{n}):-$</span> Stirling number of the second kind can be defined as <span class="math-container">$\mathrm{S}(\mathrm{k}, \mathrm{n})=\frac{1}{n !} \sum_{i=0}^{n-1}(-1)^{i} n_{C_{i}}(n-i)^{k}$</span></p>
<p><span class="math-container">$=\frac{1}{n !}\left[n_{C_{0}}(n-0)^{k}-n_{C_{1}}(n-1)^{k}+n_{C_{2}}(n-2)^{k}+\cdots+(-1)^{n-1} n_{C_{n-1}}(1)^{k}\right]$</span></p>
<p><strong>Edit <span class="math-container">$1$</span></strong>
I think first I have to choose the empty box doing <span class="math-container">$\binom{3}{1}$</span>,then it becomes 3 balls into 2 boxes. So accordingly I can use the above mentioned process.(i.e <span class="math-container">$S(2,3)*3*2!$</span>. that will lead me to <span class="math-container">$24$</span> .)But here one doubt arises in my mind! I am considering the case one box may contain atleast 1 ball it can go max to 3 balls also.But If I take 3 balls in a box another box will also remain empty ,so it becomes two boxes empty which is invalid.</p>
<p>But answer given is <span class="math-container">$24$</span>.
<strong>In which step AM I wrong?</strong></p>
| 0non-cybersec
|
Stackexchange
| 657 | 1,871 |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
|
Stackexchange
| 349 | 1,234 |
Infinitisemal generator of a semigroup with parameter. <p>When we talk about evolution equation the first idea who comes to the mind is the semigroups theory, this theory deals with the Cuachy problems of the form $$\frac{{\partial u}}{{\partial t}} = Au$$
where $A$ is an operator acts ob Banach spaces to another.
My question is : is there any theory which deals with the evolution problems of the form $$\frac{{\partial u}}{{\partial t}} = A(t)u$$
this time $A$ depends on $t$ ? thank you.</p>
| 0non-cybersec
|
Stackexchange
| 130 | 499 |
How can I solve Exception in thread "main" java.lang.NullPointerException error. <p>I am having a problem at a Java program. Exception in thread "main"</p>
<pre><code>java.lang.NullPointerException
at twoten.TwoTenB.<init>(TwoTenB.java:29)
at javapractice.JavaPractice.main(JavaPractice.java:32)
Java Result: 1
</code></pre>
<p>is the error that I'm getting. I could really use some help, since i am stuck hours on this spot...</p>
<pre><code>package twoten;
import java.util.Scanner;
public class TwoTenB {
public TwoTenB() {
double percentage;
double a[] = null;
double total = 0;
double var;
System.out.print("\tRESULT\n\n");
Scanner scan = new Scanner(System.in);
//double[] mark = new double[7];
for (int i = 0; i < 7; i++) {
System.out.print("\nMarks in subject " + (i + 1) + "\t:\t");
var = scan.nextDouble();
a[i] = var;
total = total + a[i];
//percentage = first * second * third * fourth * fifth * sixth * seventh * 100 / 700;
}
percentage = total * 100 / 700;
if (a[0] > 35 && a[1] > 35 && a[2] > 35 && a[3] > 35 && a[4] > 35 && a[5] > 35 && a[6] > 35 && percentage > 35) {
if (percentage >= 60) {
System.out.print("\nCongratulation!!! you've got FIRST dividion\n");
} else if (percentage >= 45 && percentage < 60) {
System.out.print("\nCongratulation!!! you've got SECOND dividion\n");
} else if (percentage >= 35 && percentage < 45) {
System.out.print("\nCongratulation!!! you've got THIRD dividion\n");
}
} else {
System.out.print("\nSORRY!!! you've FAILED\n");
}
}
}
</code></pre>
| 0non-cybersec
|
Stackexchange
| 638 | 1,809 |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
|
Stackexchange
| 349 | 1,234 |
How to allow a Windows Client to follow a Remote Symbolic Link Transparently. <p>Here's the scenario.</p>
<ul>
<li>Client - Windows 7 workstation </li>
<li>ServerA - Windows 2008 file server</li>
<li>ServerB - Windows 2008 file server</li>
</ul>
<p>On ServerA:</p>
<pre><code>mklink /D c:\Share\Link \\ServerB\Share\Dest
</code></pre>
<p>That works great. It's what happens on the client that's of interest.</p>
<p><strong>What I want to happen on the client</strong> as you drill down into the folders:</p>
<pre><code>\\ServerA\Share
\\ServerA\Share\Link
\\ServerA\Share\Link\Folder1... etc
</code></pre>
<p>I.e. seamless access across the link, and the user doesn't even have to know we've linked to somewhere else.</p>
<p><strong>What actually happens</strong> is:</p>
<pre><code>\\ServerA\Share
\\ServerA\Share\Link
</code></pre>
<p>When you drill into Link, the path switches! The link is literally followed to ServerB.</p>
<pre><code>\\ServerB\Share\Dest
\\ServerB\Share\Dest\Folder1... etc.
</code></pre>
<p>Is there anything that can be done to allow the client to follow the link seamlessly / transparently?</p>
<p>Note: even though drilling down causes the path to switch to ServerB, typing in a full path using ServerA works perfectly across the link.</p>
<pre><code>\\ServerA\Share\Link\Folder1
</code></pre>
<p>Note: this does not happen with links made using /J, but since I need to link to another server (Remote to Remote), I don't have the luxury of using /J</p>
| 0non-cybersec
|
Stackexchange
| 482 | 1,497 |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
|
Stackexchange
| 349 | 1,234 |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
|
Stackexchange
| 349 | 1,234 |
What is the difference '<Toolbar />' and '{ Toolbar() }' in react render?. <p>I found useContext(ThemeContext)'s value is not update when use '{ Toolbar() }' in render.</p>
<p>What is the difference '' and '{ Toolbar() }' in react render or diff?</p>
<pre><code>import React, { useContext, useState } from "react";
import "./styles.css";
const themes = {
light: {
name: "light",
foreground: "black",
background: "white"
},
dark: {
name: "dark",
foreground: "white",
background: "black"
}
};
const ThemeContext = React.createContext(null);
const Toolbar = props => {
const theme = useContext(ThemeContext) || {};
console.log(`Toolbar theme`, theme);
return (
<div
style={{
height: 60,
backgroundColor: theme.background,
color: theme.foreground
}}
>
<div>{theme.name}</div>
</div>
);
};
export default function App() {
const [currentTheme, setCurrentTheme] = useState(themes.light);
const toggleTheme = theme => {
setCurrentTheme(theme);
};
console.log(`currentTheme`, currentTheme);
return (
<div className="App">
<ThemeContext.Provider value={currentTheme}>
<div>
<button onClick={() => toggleTheme(themes.light)}>light</button>
<button onClick={() => toggleTheme(themes.dark)}>dark</button>
</div>
{/* Toolbar() */}
{/* {Toolbar()} */}
<Toolbar />
</ThemeContext.Provider>
</div>
);
}
</code></pre>
| 0non-cybersec
|
Stackexchange
| 552 | 1,624 |
Need help identifying a -possibly- encrypted string. <p>I'm having some trouble building an app that gets data from a database to keep a log of files added to a website.</p>
<p>Most URLs are generated from a file ID and a time stamp, some of those URLs are missing in the database but they're quite easy to regenerate. There's another type of generated URL that includes a string that I can't figure out. I'd like to know if it is possible to generate them too.</p>
<p>These URLs look quite like this:</p>
<pre><code>http://www.mysite.com/files/a9780ed25285890789147440840/file.ext
http://www.mysite.com/files/a9789f9b5285890789147441956/file.ext
http://www.mysite.com/files/8b9b5d1f5285890789167885136/file.ext
http://www.mysite.com/files/a97906135285890789147442083/file.ext
http://www.mysite.com/files/a9790e735285890789147442272/file.ext
http://www.mysite.com/files/a9791a905285890789147442521/file.ext
http://www.mysite.com/files/8b9bedfd5285890789167886250/file.ext
http://www.mysite.com/files/a97aaf595285890789147445176/file.ext
http://www.mysite.com/files/a97ab7fc5285890789147445386/file.ext
http://www.mysite.com/files/8b9d17895285890789167888638/file.ext
http://www.mysite.com/files/a97ac03a5285890789147445564/file.ext
http://www.mysite.com/files/a97acd635285890789147445897/file.ext
</code></pre>
<p>As you can see, it looks like hexadecimal for the first 8 characters, the middle section looks very similar, but I can't recognize a pattern here. I would like to point out that the dates are stored as epoch numerals, though the easy links have readable dates. </p>
<p>I'd appreciate any kind of information that could help me start figuring out this pattern.</p>
<p>Thanks!</p>
| 1cybersec
|
Stackexchange
| 589 | 1,699 |
Outlook 2010 compatibility with Exchange Online. <p>Exchange 2019 on premise requires Outlook 2013 and newer:
<a href="https://docs.microsoft.com/en-us/exchange/plan-and-deploy/supportability-matrix?view=exchserver-2019" rel="nofollow noreferrer">https://docs.microsoft.com/en-us/exchange/plan-and-deploy/supportability-matrix?view=exchserver-2019</a></p>
<p>Will Office365 Exchange Online work with Outlook 2010 SP2 until end of extended support end date of Oct 13, 2020?</p>
| 0non-cybersec
|
Stackexchange
| 141 | 478 |
How to install MSYS so that it recognizes non-MSYS binaries?. <p>I have noticed that my MSYS bash doesn't "know" about the environment variables defined on my system. This means that if the folder <code>C:\MyStuff\bin\</code> is in my path, and that folder contains <code>mycommand.exe</code>, then running <code>mycommand</code> in the MSYS terminal will return an error indicating that it could not be found.</p>
<p>How do I cleanly "integrate" MSYS with the rest of my system? Is that something to be avoided?</p>
| 0non-cybersec
|
Stackexchange
| 151 | 537 |
An Ideal Related to a Polynomial Ring: Theorem 3.4 of Chapter XXI of Lang's "Algebra" (Revised Third Edition). <p>Let <span class="math-container">$n\in\mathbb N$</span>. Let <span class="math-container">$x$</span> and <span class="math-container">$y$</span> be distinct indeterminates. Let <span class="math-container">$R$</span> be an integral domain. Let <span class="math-container">$\big(f_1(x),\dots,f_n(x)\big)\in R[x]^n$</span> be such that the ideal in <span class="math-container">$R[x]$</span> generated by <span class="math-container">$f_1(x),\dots,f_n(x)$</span> is <span class="math-container">$R[x]$</span>. Also assume that <span class="math-container">$f_i(x)$</span> is monic for some <span class="math-container">$i\in\{1,\dots,n\}$</span>.</p>
<p>If <span class="math-container">$g_1(x,y),\dots,g_n(x,y),h_1(x,y),\dots,h_n(x,y)\in R[x,y]$</span> and there exists an invertible <span class="math-container">$n\times n$</span> matrix <span class="math-container">$M$</span> with entries in <span class="math-container">$R[x,y]$</span> such that</p>
<p><span class="math-container">$\begin{gather}
\begin{bmatrix} g_1\\ \dots \\ g_n \end{bmatrix}
=
M
\begin{bmatrix} h_1\\ \dots \\ h_n \end{bmatrix}
\end{gather}$</span></p>
<p>then we write <span class="math-container">$(g_1,\dots,g_n)\sim(h_1,\dots,h_n)$</span>.</p>
<p>Let <span class="math-container">$J$</span> be the set <span class="math-container">$\{c\in R\mid \big(f_1(x+cy),\dots,f_n(x+cy)\big)\sim \big(f_1(x),\dots,f_n(x)\big)\}$</span>. Prove that if <span class="math-container">$c,d\in J$</span>, then <span class="math-container">$c+d\in J$</span>. Lang says this can be proven "easily."</p>
| 0non-cybersec
|
Stackexchange
| 667 | 1,710 |
GCC 4.7.2 requires ppl?. <p>I'm trying to configure GCC 4.7.2, but it's failing with <code>configure: error: Unable to find a usable PPL</code></p>
<p>I've looked in <a href="http://gcc.gnu.org/install/prerequisites.html">GCC prerequisites page</a> and PPL isn't mentioned anywhere.</p>
<p>I'm using <a href="http://www.cloog.org/">CLooG 0.17.0</a>, which uses <a href="http://freecode.com/projects/isl">ISL</a>, and as such no longer requires PPL (as far as I can tell)</p>
<p>Is there some other requirement on PPL in GCC which means I still need PPL, or am I missing some flag from my <code>configure</code> line?</p>
<p>I am passing the following options to <code>configure</code>:</p>
<ul>
<li><code>--enable-cloog-backend=isl</code></li>
<li><code>--with-cloog=$PREFIX</code></li>
<li><code>--with-isl=$PREFIX</code></li>
<li><code>--with-gmp=$PREFIX</code></li>
<li><code>--with-mpfr=$PREFIX</code></li>
<li><code>--with-mpc=$PREFIX</code></li>
</ul>
<p>For completeness, my full configure line is as follows:</p>
<pre><code>./configure --prefix=/hostname/tmp/syddev/sdk/gcc472/suse11/x86_64 \
--disable-multilib --enable-cloog-backend=isl \
--with-mpc=/hostname/tmp/syddev/sdk/gcc472/suse11/x86_64 \
--with-mpfr=/hostname/tmp/syddev/sdk/gcc472/suse11/x86_64 \
--with-gmp=/hostname/tmp/syddev/sdk/gcc472/suse11/x86_64 \
--with-isl=/hostname/tmp/syddev/sdk/gcc472/suse11/x86_64 \
--with-cloog=/hostname/tmp/syddev/sdk/gcc472/suse11/x86_64 \
--build=x86_64-suse-linux --with-pkgversion='SIG build 11/27/2012' \
--with-gxx-include-dir=/hostname/tmp/syddev/sdk/gcc472/suse11/x86_64/include/c++/4.7.2 \
--enable-version-specific-runtime-libs
</code></pre>
<p><strong>Update:</strong></p>
<p>In order to try make forward progress I decided to add <a href="http://bugseng.com/products/ppl">PPL</a> to my installation list, and add <code>--with-ppl=$PREFIX</code> to my configure line.</p>
<p>Configure still fails with <code>configure: error: Unable to find a usable PPL</code></p>
<p>It seems this is a bug in the <code>configure</code> script: Configure fails if <code>PPL_MINOR_VERSION < 11</code></p>
<p>With the latest version <code>PPL_MINOR_VERSION=0</code> (and <code>PPL_MAJOR_VERSION=1</code>)</p>
| 0non-cybersec
|
Stackexchange
| 866 | 2,250 |
VLC: Unattended video playback of sporadic UDP video source?. <p>I want to make a kiosk-type setup that simply plays back video from a remote UDP source. The command line below does the trick and shows the video OK when there's an incoming signal to begin with. I set it up to execute as a startup app of a desktop user with auto-login:</p>
<pre><code>vlc -f udp://@:PortNumber
</code></pre>
<p>But if there's no video when the machine starts, it shows the VLC screen with its window decorations and dashboard. Worse, it shows the Unity taskbar. I would like it to always show a black screen (or as close to featureless as possible), and I need the black screen to remain when there's no signal coming, and the video to come up when the signal comes back.</p>
<p>I'm kind of lost in VLC's infinitely many command-line options. Any help would be highly appreciated. I'm open to using a different video player if it will do the job better.</p>
| 0non-cybersec
|
Stackexchange
| 244 | 945 |
What is the minimum required background to understand articles in the nLab?. <p>I am interested in learning more about the nLab categorical perspective on several mathematical subjects such as topology and logic, but found that my understanding of category theory was not sufficient to understand most of the more general articles (not even getting into the hardcore, more advanced topics). Obviously, category theory is an essential requirement. However, exactly what background in category theory do you think is needed to understand the average nLab article?</p>
<p>I understand that my question is only meaningful if you know the primary mathematical subject of a specific article. Of course, if you try to read the article on synthetic differential geometry but do not know what differential geometry is, you should first study the subject from a more traditional perspective. My question should read, "Assuming that you know the main subject of the article beforehand what is the minimum required background ...". </p>
| 0non-cybersec
|
Stackexchange
| 194 | 1,026 |
How does Docker keep the image immutable. <p>From the Docker documentation : </p>
<blockquote>
<p>The Docker image is read-only. When Docker runs a container from an image, it adds a read-write layer on top of the image (using a UnionFS) in which your application runs.</p>
</blockquote>
<p>How are changes reconciled across layers? If I change the content of a file, would Docker only keep track of delta or will it store the altered file in the new layer?</p>
<p>I looked at this discussion <a href="https://superuser.com/questions/326190/how-does-unionfs-work">at superuser</a>, but still not certain about the final image structure.</p>
| 0non-cybersec
|
Stackexchange
| 179 | 646 |
Invalid rule result: Function(). <p>I am updating angular 6 to angular 7, following the instructions as per the <a href="https://update.angular.io/#6.0:7.0" rel="noreferrer">angular official site</a>.</p>
<p>During the update session:<br>
I entered the command to update the angular/cli and core for the v7<br>
<code>$ ng update @angular/cli@v7 @angular/core@v7</code>.</p>
<p>After updating I got the <code>Invalid rule result: Function()</code>.</p>
<p>Here is the command-prompt output:</p>
<pre><code>added 106 packages from 85 contributors, removed 5 packages, updated 5 packages, moved 1 package and audited 36489 packages in 39.604s
found 18 vulnerabilities (12 low, 1 moderate, 5 high)
run `npm audit fix` to fix them, or `npm audit` for details
Invalid rule result: Function().
</code></pre>
<p>Does anyone know why I am getting the message?</p>
<p>This is the dependencies in the <code>package.json</code> file.</p>
<pre><code>"dependencies": {
"@angular/animations": "^8.0.0",
"@angular/cdk": "^7.3.7",
"@angular/common": "^8.0.0",
"@angular/compiler": "^8.0.0",
"@angular/core": "^8.0.0",
"@angular/forms": "^8.0.0",
"@angular/http": "^6.0.3",
"@angular/material": "^7.3.7",
"@angular/platform-browser": "^8.0.0",
"@angular/platform-browser-dynamic": "^8.0.0",
"@angular/router": "^8.0.0",
"core-js": "^2.5.4",
"hammerjs": "^2.0.8",
"ngx-loading": "^3.0.1",
"rxjs": "6.5.2",
"underscore": "^1.9.1",
"zone.js": "^0.9.1"
},
"devDependencies": {
"@angular-devkit/build-angular": "~0.6.8",
"@angular/cli": "~7.3.9",
"@angular/compiler-cli": "^8.0.0",
"@angular/language-service": "^8.0.0",
"@types/jasmine": "~2.8.6",
"@types/jasminewd2": "~2.0.3",
"@types/node": "~8.9.4",
"bootstrap-sass": "^3.3.7",
"codelyzer": "~4.2.1",
"jasmine-core": "~2.99.1",
"jasmine-spec-reporter": "~4.2.1",
"karma": "~1.7.1",
"karma-chrome-launcher": "~2.2.0",
"karma-coverage-istanbul-reporter": "~2.0.0",
"karma-jasmine": "~1.1.1",
"karma-jasmine-html-reporter": "^0.2.2",
"karma-scss-preprocessor": "^3.0.0",
"protractor": "~5.3.0",
"ts-node": "~5.0.1",
"tslint": "~5.9.1",
"typescript": "~3.4.5"
}
</code></pre>
| 0non-cybersec
|
Stackexchange
| 908 | 2,266 |
Why can't I include the standard algorithm library after defining 'epsilon' in C++?. <p>When I include the algorithm library before defining epsilon, the following code compiles:</p>
<pre><code>#include <iostream>
#include <algorithm>
#define epsilon 0.00001
int main() {
std::cout << epsilon;
return 0;
}
</code></pre>
<p>When I switch them around, it doesn't:</p>
<pre><code>#include <iostream>
#define epsilon 0.00001
#include <algorithm>
int main() {
std::cout << epsilon;
return 0;
}
</code></pre>
<p>It gives the following error 19 times:</p>
<pre><code>epsilon_algorithm.cpp:3:17: error: expected unqualified-id before numeric constant
3 | #define epsilon 0.00001
|
</code></pre>
<p>On <a href="http://www.cplusplus.com/reference/algorithm/" rel="noreferrer">http://www.cplusplus.com/reference/algorithm/</a> and <a href="https://en.cppreference.com/w/cpp/algorithm" rel="noreferrer">https://en.cppreference.com/w/cpp/algorithm</a> there is no mention of anything named 'epsilon'. I know I can avoid the issue by simply always including <algorithm> before I define epsilon, I want to know what causes this error to broaden my understanding of C++ and prevent these types of errors in the future.</p>
<p>I compile with MinGW (32 bit, installed a few weeks ago) in an updated Windows 10 (64 bit) environment.</p>
| 0non-cybersec
|
Stackexchange
| 444 | 1,405 |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
|
Stackexchange
| 349 | 1,234 |
Npm module "grunt-sass" not found. Is it installed?. <p>I am using windows 10. Have installed npm version 5.6.0,node v8.10.0 and Python 2.7.</p>
<p>Getting <strong>grunt-sass is not installed</strong> even after installing npm using the command "npm install".
After that I installed grunt using command: </p>
<pre><code>npm install -g grunt-cli
</code></pre>
<p>Also, sometimes get an error like </p>
<blockquote>
<p>"<strong>Node Sass does not yet support your current environment</strong>: Windows 64-bit with Unsupported runtime"</p>
</blockquote>
<p>Any help will be really appriciated.</p>
| 0non-cybersec
|
Stackexchange
| 197 | 612 |
Show that $E(T_u\mid X_o=w)$ it is not equal to $E(T_w\mid X_o=u)$. <p>Can anyone help me with this?</p>
<p>Consider the random walk on a finite simple graph <span class="math-container">$G$</span> satisfying the following properties: </p>
<ul>
<li><p><span class="math-container">$G$</span> has at least <span class="math-container">$3$</span> vertices</p></li>
<li><p>Any two vertices of <span class="math-container">$G$</span> are connected by a path</p></li>
<li><p><span class="math-container">$G$</span> contains a vertex <span class="math-container">$u$</span> having exactly one neighbour <span class="math-container">$w$</span></p></li>
</ul>
<p>Show that <span class="math-container">$E(T_u|X_0=w)$</span> it is not equal to <span class="math-container">$E(T_w|X_0=u)$</span>.</p>
<p>What i think is that <span class="math-container">$p(u,w)=1$</span> because the only path for <span class="math-container">$u$</span> is the one that is connected with <span class="math-container">$w$</span>. And <span class="math-container">$p(w,u)\leq1/2$</span> because we have at least <span class="math-container">$3$</span> vertices so <span class="math-container">$w$</span> is connected with at least two vertices. So, since <span class="math-container">$E(N(y)|X_0=y)=\sum p^n(y,y)$</span> , <span class="math-container">$E(T_u|X_0=w)$</span> it is not equal to <span class="math-container">$E(T_w|X_0=u)$</span>. </p>
| 0non-cybersec
|
Stackexchange
| 525 | 1,428 |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
|
Stackexchange
| 349 | 1,234 |
Create a M3U Playlist With MP3 Music Files. <p>I would like to create an m3u playlist for my website which will be at domain/music/Playlist.m3u (example). I need to put the mp3 files in the directory domain/music/ in the playlist so that it will play them. I can't figure out what to put in the playlist file. I tried</p>
<pre><code>http://domain/music/1.mp3
http://domain/music/2.mp3
</code></pre>
<p>but it won't play. Can someone please help me get this working? Thanks!</p>
| 0non-cybersec
|
Stackexchange
| 154 | 480 |
Tikz - Coordinates error when using draw with axis. <p>I am using the following code, which is supposed to cut a function in N parts :</p>
<pre><code>\documentclass[11pt]{article}
\usepackage{tikz}
\usepackage{pgfplots}
\pgfplotsset{compat=newest}
\begin{document}
\resizebox{\columnwidth}{!}{%
\begin{tikzpicture}
\begin{axis}
[
grid,
anchor=origin,
%axis equal=false,
xmin=0, xmax=1,
ymin=0, ymax=10,
minor tick num=1,
axis lines = middle,
tick label style={inner sep=2pt, font=\footnotesize},
%
every axis plot post/.append style={thick},
samples=500
]
\addplot [domain=0:1, color=blue] {-2*ln(x)};
\end{axis}
% Add lines
\pgfmathsetmacro{\N}{4};
\foreach \x in {\N,...,0} {
\draw [line width=0.15mm, red] (\x/\N, 0) -- (\x/\N, 10);
}
\end{tikzpicture}
}
\end{document}
</code></pre>
<p>But, instead of having 5 lines cutting my function from 0 to 1, this is what I have :</p>
<p><a href="https://i.stack.imgur.com/M16cP.png" rel="noreferrer"><img src="https://i.stack.imgur.com/M16cP.png" alt="enter image description here"></a></p>
<p>Do you have any idea of why this issue appears ?</p>
<p>P.S : Do you have a better way to declare variables than \pgfmathsetmacro ?</p>
| 0non-cybersec
|
Stackexchange
| 474 | 1,571 |
PKCS#11. Possibility of performing Ecryption/Decryption in hardware. <p>Cheers. This is a copy of my <a href="https://crypto.stackexchange.com/q/63988/63459">question</a> on crypto stack exchange.</p>
<p>I'm dealing with <strong>HSM</strong> via <strong>PKCS#11</strong> C/Python interface. I'm wondering is it possible to do some <code>C_Encrypt</code>/<code>C_Decrypt</code> in hardware. By saying <em>"in hardware"</em> I mean encryption/decryption without exposing the result to the caller space. This is mostly aboud decryption as I want to call <code>C_Decrypt</code> and leave the result inside the HSM as arbitrary data to do some other transformations on that data later, saying re-encrypting it on some other key. Thank you in advance.</p>
| 0non-cybersec
|
Stackexchange
| 219 | 751 |
Why does a radio stream not appear on a packet monitoring tool?. <p>I am currently trying to find the URL to the audio stream for a webradio that only provides a flash player, that I would like to use with MusicBee's radio player.</p>
<p>After using Wireshark to monitor my wifi network while streaming music through their website and mobile app and filtering the packet list, I can't manage to find any stream related to the website. That let me wondering: How is it possible for an applet to hide itself from the activity on a packet monitoring program?</p>
<p>Just in case someone is interested, here's the url to the radio: <a href="http://player.quebec.rougefm.ca/" rel="nofollow noreferrer">Rouge FM</a></p>
<p>Am I just doing something wrong or is there some mechanism that I am not aware of?</p>
| 0non-cybersec
|
Stackexchange
| 214 | 807 |
Show that $Var(X)=Var(\Bbb{E}(X|Y))+\Bbb{E}(Var(X|Y))$. <p>Let $X\in L^2(\Omega,\mathcal{F},\Bbb{P})$. Let $Y$ be a random variable, we define </p>
<p>$$Var(X|Y)=\Bbb{E}((X-\Bbb{E}(X|Y))^2|Y))$$</p>
<p>Show that $Var(X)=Var(\Bbb{E}(X|Y))+\Bbb{E}(Var(X|Y))$</p>
<p>Ok, so</p>
<p>$\Bbb{E}(Var(X|Y))=\Bbb{E}((X-\Bbb{E}(X|Y))^2)=\Bbb{E}(X^2)-2\Bbb{E}(X\Bbb{E}(X|Y))+\Bbb{E}(\Bbb{E}(X|Y)^2)$</p>
<p>While </p>
<p>$Var(\Bbb{E}(X|Y))=\Bbb{E}((\Bbb{E}(X|Y))^2)-[\Bbb{E}(\Bbb{E}(X|Y))]^2=\Bbb{E}((\Bbb{E}(X|Y))^2)-[\Bbb{E}(X)]^2$</p>
<p>Adding both, I obtain</p>
<p>$Var(\Bbb{E}(X|Y))+\Bbb{E}(Var(X|Y))=Var(X) + 2(\Bbb{E}(\Bbb{E}(X|Y)^2)-\Bbb{E}(X\Bbb{E}(X|Y)))$</p>
<p>But I don't know how to deal with $\Bbb{E}(X\Bbb{E}(X|Y))$ nor with $\Bbb{E}(\Bbb{E}(X|Y)^2)$. What can I do with those terms?</p>
| 0non-cybersec
|
Stackexchange
| 444 | 801 |
Derivation of equation for wave source distance. <p>In <a href="https://link.springer.com/article/10.1007/BF01945553" rel="nofollow noreferrer">this paper</a> Käse and Bleckmann describe how to determine the distance from the wave source by the wave frequency.
I'm trying to understand how they developed their final equation.</p>
<p>They give (eq. 5):
<span class="math-container">$$D = \frac{t_2 - t_1}{\frac{1}{c_{g2}}-\frac{1}{c_{g1}}}$$</span>
and end up with (eq. 7):
<span class="math-container">$$D = - \frac{9}{2} c_{ph} \frac{\omega}{d \omega/d t}.$$</span></p>
<p>I can follow their first step which is a first order Taylor-Series expansion (<span class="math-container">$c_{g2}(\omega) = c_{g1}(\omega + \Delta \omega)$</span> and <span class="math-container">$c_{g1}(\omega + \Delta \omega) \approx c_{g1}(\omega) +(d c_{g1}/d \omega)\Delta \omega$</span>) and gives (eq. 6):
<span class="math-container">$$D = c_{g1} \frac{\frac{-(t_2 - t_1)}{\Delta \omega}}{\frac{1}{c_{g1}} \frac{d c_{g1}}{d \omega}}.$$</span></p>
<p>They further say</p>
<ul>
<li><span class="math-container">$t_2 - t_2 = \Delta t \rightarrow 0$</span> (I assume this is the reason why this term is neglected in the Taylor-Series expansion)</li>
<li><span class="math-container">$\Delta t /\Delta \omega \rightarrow \frac{1}{d \omega/d t}$</span></li>
</ul>
<p>and that they used
<span class="math-container">$$c_g = \frac{d \omega}{d K} = c_{ph} - \lambda \frac{d c_{ph}}{d \lambda}.$$</span></p>
<p>But I did not find a way to get from there to the final equation.
Does anybody have an idea?</p>
<hr>
<p>Other (possibly) necessary equations:</p>
<ul>
<li><span class="math-container">$c_{ph}^2 = \frac{\omega^2}{K^2} = \left(g + \frac{T K^2}{\rho} \right) K^{-1}$</span></li>
<li><span class="math-container">$K = \frac{2 \pi}{\lambda}$</span></li>
</ul>
<p>quantitities:</p>
<ul>
<li><span class="math-container">$c_{ph}$</span> - phase velocity</li>
<li><span class="math-container">$c_g$</span> - wave number</li>
<li><span class="math-container">$\omega$</span> - angular frequency</li>
<li><span class="math-container">$\lambda$</span> - wave length</li>
<li><span class="math-container">$K$</span> - wavenumber</li>
<li><span class="math-container">$\rho$</span> - density</li>
<li><span class="math-container">$g$</span> - gravity</li>
<li><span class="math-container">$T$</span> - surface tension</li>
</ul>
| 0non-cybersec
|
Stackexchange
| 889 | 2,414 |
External 4.3" screen for Raspberry Pi. I have a [4.3 inch LCD display](http://i.imgur.com/DAFcL.jpg) that I'm hoping to get working with the raspberry pi
I have the specification for the display [here[(http://dl.openhandhelds.org/pandora//uploads/Home/Pandora%20-%20Development/Documentation/pandora_screenTD043MTEA2.pdf)
My question is this: How possible is this to get working as a display, however ugly a solution?
| 0non-cybersec
|
Reddit
| 131 | 423 |
Maybe not THE scariest story ever but here goes... . Hey Reddit,
Okay so I have one brief story and two that are connected - will try my best not to ramble on too much.I'll just note, I'm female - that might put everything in context a little better.
Firstly - you'll have trouble sleeping for weeks on end, possible forever if you ever have the misfortune of waking up to a stranger watching you sleep. I was 17 and my parents were renovating and landscaping our property, so we had no fence when this happened. I woke up at about 3am one night, and couldn't work out what had woken me up but I didn't feel right - basically I felt kind of threatened. I looked up and there's this huge motherfucking dude watching me sleep through my door (i had a room with a door to the backyard, which was all little window panes). Freaked me the fuck out - totally went into fight or flight mode but I couldn't scream or anything, I was kind of frozen and felt like my heart was beating in my throat. All I could think to do was hit the 'sleep' button on my clock radio and turn the sound up as loud as it went so that my dad would come down to investigate (my parent's were always complaining about my loud music after 11pm). Thankfully he came running down to see why the fuck I had the music up so loud and by then this dude outside the window had fucked off.
Okay so these two kind of go together.
I moved into a sharehouse with a bunch of friends and we decided it was a good idea to let this dude we barely knew move in and sleep/live behind the couch so that we could all pay a bit less rent. Seemed all cool until he slept in my bed one weekend when I was away and wanked in it. Fine, I washed the sheets - we kicked him out. Found out that he wanted to do more than wank in my bed and started getting calls from someone he knew telling me to go elsewhere possibly even leave the town (we were in the country at the time) as this dude was very likely to try and break in and rape or attack me in some way. So my best friend and I pack up our shit and go to stay at her bf's house for the night. He ended up having to leave us pretty late for some kind of work emergency and we're stuck in this huge fucking house literally next to nothing but a goddammed paddock full of cows in the middle of nowhere.
So initially we're like "we cool" and we figure that this dude isn't going to be able to get to where we are (he had no car) and we're gonna be fine. Gets to around 1am and we start hearing some pretty weird noises from outside. Like I said - we're in the middle of nowhere all we should be able to hear is any cars going by on the highway or cows. So we go check all the doors are locked and I start to get a bit freaked out when I hear someone walking around the side. At this point I'm looking for some kind of weapon just in case and notice that the door leading outside near where I can hear footsteps has a dog door big enough for a freaking St Bernard or a person to get through.
My friend was calling the police - I completely broke down - the noises outside (random scuffling and a few things being knocked around) are still going and I'm sitting with my back to a wall holding a cricket bat watching this dog door waiting for the police to get there - I was absolutely shitscared.
The noises all stopped not long before the police arrived but there was evidence that someone had definitely been there - some fresh mud tracked onto the concrete out the back and some stuff in the garage had been moved around.
So skip forward a night or two and my best friend and I decide it's time we go home since we're living with a few people in our own house and they've all agreed to stay home and have a bit of a gathering so that we're not alone - we ended up with about 14 people including those of us that lived there for the whole night - no-one left until the next day. I'd barely slept the nights before and was pretty happy to get back to my bed (with clean sheets) and decided to go to bed early.
Now my... bed (it was really just a mattress on the floor) was directly under the window, the blinds were closed, but didn't actually close flush with the windowsill so there was a gap there where I guess someone would be able to see in to my bed.
So I'm lying there - pretty relaxed for the first time since the other night, I even remember having candles going and a can of jack and coke there. Suddenly I get this feeling, like I'm being watched. I totally froze and didn't even know what to do this time. I knew even if my friends heard loud music coming from my room they wouldn't bother coming to investigate and again I couldn't scream. I basically just closed my eyes and tried to pretend this was not happening - I knew it was couch dude though. I don't know how long I was there for, but after a few songs on the radio the feeling was gone - I knew there was no-one there, that 'watched' feeling just kind of went away. At this point I bolted out of my room and out where all of my housemates and friends were and explained it to them. They were all pretty drunk and stoned at this point and once I was back in the company of others in the brightly lit loungeroom it all kind of seemed like nothing was wrong. I had a drink and we all stayed up - I figured it was probably just me being overly sensitive since I didn't actually hear or see anyone. Just had that awful being watched kinda feeling.
Fast forward to the morning - I decide to take a look around the outside of the house, specifically outside my window to check and see if there was any evidence of anyone being there the night before. My flyscreen was missing from my window - someone had taken it off during the night, I thought it was strange and kept walking around the house. When I got to the garage I noticed glass all over the ground. We'd never used the garage for anything because we had no key and the real estate agents never gave us one (despite us asking for one). Someone had broken the garage window, but not from the outside - from the goddammed INSIDE. Not only is it extremely fucking weird that someone broke a window right near the room that we were all in without anyone hearing it, but they smashed it from INSIDE THE FUCKING GARAGE.
Major wtf - we knew none of us had done it purely because none of us had bothered to find any way into the garage and also none of the people that lived in the house wanted to lost their deposit to get a window fixed.
We never worked out how the window got broken or where couch dude was that night - I heard a bit later after moving away that couch dude had been using someone we know to drive him around after he moved out and that he was definitely the one creeping around the house the first time. The second time remains a mystery.
Sorry this turned out heaps longer than I meant it to, and might not be as scary as the paranormal or anything like that, but it was real, happened to me and still stops me from sleeping sometimes now.
| 0non-cybersec
|
Reddit
| 1,583 | 6,997 |
Active Directory Certificate Services won't start - error 100. <p>I've migrated my Active Directory Certificate services Enterprise CA to a new server (and from Windows 2003 R2 x86 to Windows 2008 R2 x64).
I have been having problems with checking the Certificate Revocation Lists, but I've republished the revocation lists from the Root CA and when I run certutil -urlfetch -verify I don't get any errors any more:</p>
<pre><code>Verified Issuance Policies: None
Verified Application Policies: All
Cert is a CA certificate
Leaf certificate revocation check passed
CertUtil: -verify command completed successfully.
</code></pre>
<p>But I still get the same errors when I try to start the CA. I get the following pop-up:</p>
<pre><code>Microsoft Active Directory Certificate Services
---------------------------
The system cannot find the file specified. 0x2 (WIN32: 2)
The policy module for a CA is missing or incorrectly registered. To view or change
policy module settings, right-click on the CA, click Properties, and then click the
Policy Module tab.
---------------------------
OK
</code></pre>
<p>and I get the following error in the log:</p>
<pre><code>Log Name: Application
Source: Microsoft-Windows-CertificationAuthority
Date: 26/06/2012 15:59:45
Event ID: 100
Task Category: None
Level: Error
Keywords: Classic
User: SYSTEM
Computer: SRV112.cobbsch.cobbetts.co.uk
Description:
Active Directory Certificate Services did not start: Could not load or verify the current CA certificate. Cobbetts LLP Enterprise CA The system cannot find the file specified. 0x80070002 (WIN32: 2).
Event Xml:
<Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
<System>
<Provider Name="Microsoft-Windows-CertificationAuthority" Guid="{6A71D062-9AFE-4F35-AD08-52134F85DFB9}" EventSourceName="CertSvc" />
<EventID Qualifiers="49754">100</EventID>
<Version>0</Version>
<Level>2</Level>
<Task>0</Task>
<Opcode>0</Opcode>
<Keywords>0x80000000000000</Keywords>
<TimeCreated SystemTime="2012-06-26T14:59:45.000000000Z" />
<EventRecordID>852</EventRecordID>
<Correlation />
<Execution ProcessID="0" ThreadID="0" />
<Channel>Application</Channel>
<Computer>SRV112.cobbsch.cobbetts.co.uk</Computer>
<Security UserID="S-1-5-18" />
</System>
<EventData Name="MSG_E_CA_CERT_INVALID">
<Data Name="CACommonName">Cobbetts LLP Enterprise CA</Data>
<Data Name="ErrorCode">The system cannot find the file specified. 0x80070002 (WIN32: 2)</Data>
</EventData>
</Event>
</code></pre>
<p>Microsoft have documentation for this error: <a href="http://technet.microsoft.com/en-us/library/cc774550(v=ws.10).aspx" rel="nofollow noreferrer">http://technet.microsoft.com/en-us/library/cc774550(v=ws.10).aspx</a></p>
<p>But the documentation just talks about the CA chain not verifying, which it now is.</p>
<p>I was wondering if it was some sort of a cached failure, or a cached copy of an incorrect CRL (I migrated the root CA earlier on and had to republish the CRL before certutil would verify properly), so I tried a reboot to flush out the caches.</p>
<p>That didn't change anything.</p>
<p>I've also tried running Certutil as SYSTEM to see if there was a permissions issue and that didn't solve the problem either.</p>
<p>[To run as system: run psexec -i -s cmd.exe from an elevated command prompt and it will launch a command prompt as system. You can run whoami to check.]</p>
| 0non-cybersec
|
Stackexchange
| 1,183 | 3,707 |
Insomnia (2002) Review. Insomnia (2002)
Review 8/10
First thought- Al Pacino being the lead detective was really well cast. I've always thought that there is something in his facial appearance that made him look constantly exhausted. I like that they snuck in that Pacino's insomniac characters last name is Dormer.... the French verb "Dormir" means to sleep! I enjoyed Hilary Swank's performance as small town officer and Robin Williams' departure from comedy in playing a serious role. I previously watched this film (likely on DVD rental from Blockbuster- RIP) and was surprised by the details I forgot over the years.
| 0non-cybersec
|
Reddit
| 147 | 629 |
Should the pins on both sides of an RJ11 cable be in the same order?. <p>Is RJ11 pin order like RJ45 where the order is always the same (e.g. Brown is always on the left, when looking from the bottom), or should they be mirrored - one side with red on the green's right, and the other with the green on the red's right?</p>
<p>According to the layouts I saw on the internet it seems that they should be like RJ45 - the same. But when checking an RJ11 cable that I have, it's mirrored - one's left-to-right is the other's right-to-left.</p>
<p>So which one is it?</p>
| 0non-cybersec
|
Stackexchange
| 169 | 569 |
YSK about curated multireddits, a better way to browse similarly themed subreddits.. [/m/retrogamingnetwork](http://www.reddit.com/user/ZadocPaet/m/retrogamingnetwork) for example is a multireddit combining 49 lesserknown subreddits into a relevant multireddit.
/r/multihub is place to find all sorts of interesting multireddits.
Perhaps the best way to demonstrate the convenience of multireddits is to share /r/Lapper's [/m/depthhub](http://www.reddit.com/user/Lapper/m/depthhub), a multireddit consisting of 26 cerebral subreddits.
EDIT: [/m/kindlenetwork](http://www.reddit.com/user/wanderjahr/m/kindlenetwork) is my current favorite multireddit. It combines Kindle subreddits with Kindle Unlimited subreddits.
| 0non-cybersec
|
Reddit
| 223 | 718 |
How does this answer work?. <p><a href="https://tex.stackexchange.com/users/1424/harald-hanche-olsen">Harald Hanche-Olsen</a> posted some interesting code in answer to <a href="https://tex.stackexchange.com/questions/6171/wrapping-long-lines-that-contain-no-spaces">this question</a>.</p>
<p>Could someone explain how it works?</p>
<p>I understand (I think) the futurelet and the expansions. I don't understand:</p>
<ol>
<li>Where does the <code><null></code> character come from in <code>\ifcat\next9</code>?</li>
<li>How does the expanded text actually get broken into the <code>\hbox</code>'s? (Pages 98-99 of the TeXbook didn't really help me understand the trace output in this case, so I'm hoping someone can clarify.)</li>
</ol>
<p>Thanks!</p>
<p>Here is the code reproduced from the referenced answer:</p>
<pre><code>\def\breaknumberanywhere{\hskip0pt\futurelet\next\breaknumberi}
\def\breaknumberi{\ifcat\next9\expandafter\breaknumberii\fi}
\def\breaknumberii#1{#1\breaknumberanywhere}
\def\foo#1#2{\vtop{\hsize=#1\rightskip=0pt plus 1fil \leftskip=0pt\noindent\breaknumberanywhere#2}}
Here is a long number:
\foo{2in}
{17823941237490812347123904712389407123408917234890123748912034712985712389012351}
\bye
</code></pre>
| 0non-cybersec
|
Stackexchange
| 445 | 1,245 |
How can I mimic the given proof?. <p>The lemma and a part of its proof are given below:</p>
<blockquote>
<p><a href="https://i.stack.imgur.com/vDEv5.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/vDEv5.png" alt="enter image description here"></a></p>
</blockquote>
<p>Now, I was trying to prove the other part <span class="math-container">$ g \circ f \simeq g \circ h$</span>.</p>
<p><strong>My trial:</strong></p>
<p>Suppose <span class="math-container">$f,h : X \rightarrow Y$</span> are homotopic, and <span class="math-container">$g: Y \rightarrow Z.$</span></p>
<p>Let <span class="math-container">$H: X \times I \rightarrow Y$</span>be the homotopy from <span class="math-container">$f$</span> to <span class="math-container">$h$</span>.</p>
<p>Define <span class="math-container">$F: Y \times I \rightarrow Z$</span> by:</p>
<p><span class="math-container">$$F(y, t) = G(H(x,t),t)$$</span></p>
<p>Then <span class="math-container">$F(y,0) = G(H(x,0),0) = G(h_{0}(x),0) = G (f(x),0) = g_{0}(f(x)) = g \circ f$</span></p>
<p>I am not sure if my last equality correct as I replaced <span class="math-container">$g_{0}$</span> by <span class="math-container">$g$</span> without having any clue about this, is this step true?</p>
<p>Also, should the function <span class="math-container">$G$</span> be known, as I do not know anything other than that <span class="math-container">$G(x,t) = g_{t}(x)$</span>?</p>
<p>Any help with the proof will be appreciated. Also, any correction for my trial steps is so much welcomed. </p>
<p>Thanks! </p>
| 0non-cybersec
|
Stackexchange
| 584 | 1,578 |
With the new PajaMei skin, we need a new game mode...SleepOverWatch!. I think PajaMei is perfect for a new game mode.
one team is all Mei, the other is an Ana or two or three.
Ana can only sleep dart, but it has a reduced cool down and doesn't wear off.
Mei's can't attack, but can build walls and wake up other Mei's.
Ana's have to put all the children to bed before time runs out, or maybe Mei's have to get to a goal (That late night snack food, maybe).
Edit: Wow, didn't think this would be my first front page post for this subreddit
| 0non-cybersec
|
Reddit
| 158 | 543 |
Using AJAX on homepage to handle feeds, bad for SEO?. <p>I'm running multiple feeds of loops on my homepage much like youtube.com and I want to use AJAX to load them instead of tabbed content with jQuery. Since most of my traffic comes from posts I'd like to know how it impacts my site with Google with less crawlable links and excerpts.</p>
<p>My question is this: How bad is it for my SEO to use AJAX to load the feeds on my homepage? Each feed contains links to new posts in different categories and I have 10 of them so loading them with jQuery Tabs adds load time but makes it all crawlable.</p>
| 0non-cybersec
|
Stackexchange
| 147 | 603 |
Access values from LINQ GroupBy. <p>I have a linq query looking like this: </p>
<pre><code> var myGrouping = (
from p in context.Products
join pt in context.ProductTypes on p.productId equals pt.productId
select new
{
ProductName = p.productName,
Type = pt.productType
}).GroupBy(x => x.ProductName ).ToList();
</code></pre>
<p>This gives me what I'm looking for, a group for each ProductName with the Types displayed with them. Now, what I'm looking to do is check each group and see if the ProductType ever differs INSIDE these groupings, which is an error I sometimes get in the database.</p>
<p>I've tried a few things to access this data, and it seems like I can use <code>item.Distinct().Skip(1).Any()</code> to check through these groupings and see if they differ. Problem is only that I don't know how to access the ProductName and Type, to loop over it. I've tried things like</p>
<p><code>foreach (IGrouping<string, string?> ProductGroup in myGrouping)</code> </p>
<p>and things along those lines but it never seems accessable. My question is, how do I access elements in IGroupings like this?</p>
| 0non-cybersec
|
Stackexchange
| 334 | 1,253 |
Spring Ehcache MBean Monitoring. <p>I am using Spring 4.0.3.RELEASE and EHcache 2.8.1. on JBoss 7.1.1</p>
<p>With the following configuration in <code>applicationContext.xml</code> my caching is working good.</p>
<pre><code><cache:annotation-driven/>
<bean id="cacheManager" class="org.springframework.cache.ehcache.EhCacheCacheManager">
<property name="cacheManager" ref="ehcache"/>
</bean>
<bean id="ehcache" class="org.springframework.cache.ehcache.EhCacheManagerFactoryBean">
<property name="configLocation" value="/WEB-INF/ehcache.xml"/>
</bean>
</code></pre>
<p>Now I want to add the monitoring capabilities with MBean. I changed the configuration in <code>applicationContext.xml</code> as follows – added 2 new beans “managementService” and “mbeanServer”, no other change.
This is the current configuration.</p>
<pre><code><cache:annotation-driven/>
<bean id="managementService"
class="net.sf.ehcache.management.ManagementService"
init-method="init"
destroy-method="dispose">
<constructor-arg ref="cacheManager"/>
<constructor-arg ref="mbeanServer"/>
<constructor-arg index="2" value="true"/>
<constructor-arg index="3" value="true"/>
<constructor-arg index="4" value="true"/>
<constructor-arg index="5" value="true"/>
</bean>
<bean id="cacheManager" class="org.springframework.cache.ehcache.EhCacheCacheManager">
<property name="cacheManager" ref="ehcache"/>
</bean>
<bean id="ehcache" class="org.springframework.cache.ehcache.EhCacheManagerFactoryBean">
<property name="configLocation" value="/WEB-INF/ehcache.xml"/>
</bean>
<bean id="mbeanServer" class="org.springframework.jmx.support.MBeanServerFactoryBean">
<property name="locateExistingServerIfPossible" value="true"/>
</bean>
</code></pre>
<p>With this configuration I get the following error on application server start up.</p>
<pre><code>14:05:32,208 ERROR [org.springframework.web.context.ContextLoader] (MSC service thread 1-1) Context initialization failed: org.springframework.beans.factory.UnsatisfiedDependencyException: **Error creating bean with name 'managementService'** defined in ServletContext resource [/WEB-INF/applicationContext.xml]: Unsatisfied dependency expressed through constructor argument with index 0 of type [net.sf.ehcache.CacheManager]: Could not convert constructor argument value of type [org.springframework.cache.ehcache.EhCacheCacheManager] to required type [net.sf.ehcache.CacheManager]: Failed to convert value of type 'org.springframework.cache.ehcache.EhCacheCacheManager' to required type 'net.sf.ehcache.CacheManager'; nested exception is java.lang.IllegalStateException: **Cannot convert value of type [org.springframework.cache.ehcache.EhCacheCacheManager] to required type [net.sf.ehcache.CacheManager]**: no matching editors or conversion strategy found
Related cause: org.springframework.beans.factory.UnsatisfiedDependencyException: Error creating bean with name 'managementService' defined in ServletContext resource [/WEB-INF/applicationContext.xml]: Unsatisfied dependency expressed through constructor argument with index 0 of type [net.sf.ehcache.CacheManager]: Could not convert constructor argument value of type [org.springframework.cache.ehcache.EhCacheCacheManager] to required type [net.sf.ehcache.CacheManager]: Failed to convert value of type 'org.springframework.cache.ehcache.EhCacheCacheManager' to required type 'net.sf.ehcache.CacheManager'; nested exception is java.lang.IllegalStateException: Cannot convert value of type [org.springframework.cache.ehcache.EhCacheCacheManager] to required type [net.sf.ehcache.CacheManager]: no matching editors or conversion strategy found
</code></pre>
| 0non-cybersec
|
Stackexchange
| 1,110 | 3,879 |
Ideal Chunk Size for python requests. <p>Is there any guideline on selecting chunk size?</p>
<p>I tried different chunk size but none of them give download speed comparable to browser or wget download speed</p>
<p>here is snapshot of my code</p>
<pre><code> r = requests.get(url, headers = headers,stream=True)
total_length = int(r.headers.get('content-length'))
if not total_length is None: # no content length header
for chunk in r.iter_content(1024):
f.write(chunk)
</code></pre>
<p>Any help would be appreciated.?</p>
<p>Edit: I tried network with different speed.. And I am able to achieve higher speed than my home network.. But when I tested wget and browser.. Speed is still not comparable</p>
<p>Thanks</p>
| 0non-cybersec
|
Stackexchange
| 216 | 730 |
Doubly infinite matrices $A=(a_{i,j})_{i,j=\infty}^{\infty}$. <p>Let $A=(a_{i,j})_{i,j=\infty}^{\infty}$, where
$$
\|A\|:=\sum_{r=-\infty}^{\infty}\sup_{j}|a_{j,j+r}|<\infty.
$$</p>
<p>I want to show that for all matrices $\|AB\|\leq\|A\|\|B\|$. I obverse that
$$
(AB)_{i,j}=\sum_{k=-\infty}^{\infty}a_{i,k}b_{k,j}=c_{i,j}
$$</p>
<p>Hence,
\begin{align}
\|AB\|&=\sum_{r=-\infty}^{\infty}\sup_{j}|c_{j,j+r}|\\
&=\sum_{r=-\infty}^{\infty}\sup_{j}|\sum_{k=-\infty}^{\infty}a_{j,k}b_{k,j+r}|\\
&\leq \sum_{r=-\infty}^{\infty}\sum_{k=-\infty}^{\infty}\sup_{j}|a_{j,k}b_{k,j+r}|\\
&\leq \sum_{r=-\infty}^{\infty}\sum_{k=-\infty}^{\infty}\sup_{j}|a_{j,k}|\cdot|b_{k,j+r}|\\
&\leq ?
\end{align}</p>
<p>How can I finish this proof? Any hints?</p>
| 0non-cybersec
|
Stackexchange
| 352 | 765 |
How many numbers below N have equal digit sum?. <p>I'm trying to index $M$ squares that can each have $N$ colours. The order the colours appear in does not matter, it just matters how many of each colour there are. </p>
<p>So say $N=2$ and $M=2$ and the colours are red(R) and blue(B). This results in the following possible states for our squares: $RR, RB, BR, BB$. If we want to map those to how much of each colour there are this results in $02, 11, 11, 20$, so the first digit represents the amount of blue's and the second the reds. </p>
<p>It's easy to see that the digit sum of this representation is always equal to $M$. Now say $N$ and $M$ are very large. We can represent each colour state as an $N$ length number of base $M$. However, I want to store some information about each possible colour state. Therefore we should introduce an ordering in the colour states so a mapping is possible. We can simply order by size: $[02,11,20]$.</p>
<p>Now the actual question is as follows: given the number $20$, how many numbers below $20$ are there that have the same digit sum? Because that equals $2$, which is the exact position I need to look in my information array. A possible strategy is building a lookup table by just enumeration all possibilities, but I want to know if there is a "smarter" way. How many numbers with equal digit sum are there below N? Of course, if someone knows a smarter way to label my colour states, that would also be accepted, but the other question remains interesting as well.</p>
| 0non-cybersec
|
Stackexchange
| 385 | 1,523 |
Combining multiple queries. <p>I have 2 queries given below. Now I want to have one quey by combining the two queries so as to get the table with columns (<code>Tag Number</code>, <code>Primary Name</code> and <code>Discoverd Name</code>)</p>
<p>Query 1:</p>
<pre><code>select RT.[TagName] as 'Tag Number',
RA.SourceName as 'Primary Document',
RA.SourceRevision
from dbo.REP_TTA as RT
join dbo.REP_ASS as RA on RA.TargetName=RT.TagName
where RA.[AssocName]='is a document for'
</code></pre>
<p>Query 2:</p>
<pre><code>select RT.[TagName] as 'Tag Number',
RA.SourceName as 'Discoverd Document',
RA.SourceRevision
from dbo.REP_TransposedTagAttributes as RT
join dbo.REP_ASS as RA on RA.TargetName=RT.TagName
where RA.[AssociationName]='refers to'
</code></pre>
| 0non-cybersec
|
Stackexchange
| 272 | 797 |
Inclement Weather, Large Animals, and Other Strange Happenings Outside a Costco in New Jersey. Part V.. [Part I](https://www.reddit.com/r/nosleep/comments/aio8f0/inclement_weather_large_animals_and_other_strange/), [Part II](https://www.reddit.com/r/nosleep/comments/ajc6rp/inclement_weather_large_animals_and_other_strange/), [Part III](https://www.reddit.com/r/nosleep/comments/akcnn9/inclement_weather_large_animals_and_other_strange/) and [Part IV.](https://www.reddit.com/r/nosleep/comments/alp8vw/inclement_weather_large_animals_and_other_strange/)
'
>"*All you need to do is walk into the light.*"
>-*Pontius*.
Picture yourself in a room no larger than the average kitchen.
There are some lockers to the left. Plain white cabinets are catty cornered to the right. A shelf holds a container of coffee K-Cups, a black board lists a vacation schedule, and employee street clothes decorate the wet floor like some lost remnants of high school. The ceiling is a drop. It's the type that hides all kinds of secrets just a few inches above the plaster. It's leaking, now. Water covers the floor at about four inches deep, and that number is climbing fast.
A bulb flickers over your head.
It's the only remaining source of light in the night.
Now, jam that room with more than a dozen sweating strangers, and pump them full of the anxiety of an impending unnatural disaster.
'
Nine o'clock.
I had to say something to them.
The remaining survivors in the room stared at me like bloodthirsty hyenas. The questions they shouted sounded a lot like that too. I had been here before, only hours before, it was so easy to forget. It felt like a millennia.
"*What happened to Marcus?*" a familiar voice shouted from by the lockers.
"*What happened to Mitchell?*" someone else called back.
I couldn't move my mouth to make the words his poor widow needed to hear. Instead, I just shook my head.
Marcus' wife screamed so loud that I thought the glass might break.
It was enough to make the other people in the cramped room shudder and shift uncomfortably. Some actually tried to move away from her, like me with the mad cow, but there was just nowhere to go. That horrible, heart shattering, gob-smacking scream reached down into my insides. I quickly tried to explain myself in a heap of word vomit and broken sentences as water pounded the quickly growing puddles around us.
"**Mitchell, he... he locked the door. He locked us out.**" I sputtered as fast as possible. "**Marcus, he... fell over the edge.**"
The room fell silent save for the poor woman's tears.
I tried to make her pain swift. Like taking off a band-aid, I told myself. Right?
"**He’s dead. I’m sorry.**"
A second chilling scream filled the room. Marcus’ children wrapped their arms around their sobbing mother’s legs and buried their heads in the folds of her dress. Thirteen disappointed faces stared back at me. I stared back, defiant, trying to defend myself against any further inquiries. Then I started to break down.
Tiffany appeared at my side again. She was drenched from head to toe, with a tie somehow managing to hold her long hair out of her eyes.
She looked beautiful, then.
"*Where do we go?*" she asked.
I shook my head again.
“**Don’t know.**”
'
Nine forty-five.
The children managed to fall asleep.
A few of us propped up an old table and laid them on it side by side. We wrapped our remaining dry jackets around them. The kids took to snoring soon after. They looked like five little pigs in a blanket by the end. I made the joke aloud… but nobody laughed.
There was more than a foot of water in the room, now. It wasn’t be safe for anybody to lie down on the floor. But Kevin did it anyway, and we didn't stop him.
The rest of the adults also tried to close their eyes, in whatever way they could. A majority of them huddled in the corner together for warmth and leverage. Tiffany and I agreed to take the first watch. With the way the water was rising... none of us expected that to last long. We would need to have a plan. But everyone had been running around a fucking Costco for hours, fighting for their lives. They needed some rest.
When it seemed quiet enough that most folks were not listening, Tiffany sidled up beside me.
“*What did you see?*” she whispered.
I hesitated.
“**You tell me, and I’ll tell you.**”
Jake, Ellen and Liz soon soon caught wind of our conversation and quietly shuffled over. The rest of the group stayed quiet. Nobody wanted to wake up the widow.
“*The snow turned to rain a couple hours ago,*” Tiffany murmured. “*Kevin suggested we get to higher ground anyway. Plus, we wanted to find you guys. Two minutes later, the store got hit by a fuckin tsunami. It’s got to be a few feet deep down there now. I had to swim out. We got to the stairs just in time... all thirteen of us survived, thanks to Kevin.*”
Liz and Ellen nodded enthusiastically while eyeing the exhausted middle-aged man lying just above the water.
“*We think he’s okay,*” Jake offered. “*Just needs some sleep. We started on the morning shift together.*”
I nodded. But something about the story didn’t fit.
“**You said… thirteen?**”
Jake hesitated this time.
“*Yeah… we counted once we got in here, just to be sure. Why?*”
Shit. Shit, shit, shit, shit.
“**We had sixteen before Marian went outside, including me. Then you lost her, me, Mitchell, and Marcus. Twelve. You should have had twelve.**”
They all stared ahead stupidly.
“**Do you see what I’m saying?**” I whispered in a panic. “**Where the fuck did you get another person?**”
We all turned our attention to the pile of human bodies huddled together in the corner.
A few of them breathed steadily under the cover of garbage bags, spare clothes, and paper bags. Somebody snored by the lockers. The children stirred on the table beside them. But, underneath it all, a small sound stuck out.
Chewing.
The next few things happened quite suddenly.
Kevin slipped under the water. Jeff rushed over to help him. Marcus’ widow was the first one sleeping to open her eyes. She looked shocked at first. Like a proper lady who just sat on a piece of gum. When she screamed, again, I think most people just thought she was still upset about her husband. Nobody reacted in time.
Nobody noticed the red tint to the river forming around Kevin.
Nobody noticed the slight disturbances in the water.
Nobody noticed one of the children missing from the table.
But I did.
Just before it happened, the pieces of our situation started to slide into formation. I could feel a presence in the room with us. I could smell its rot. I could hear the horrible gnashing and biting growing louder. I could almost hear the tearing of flesh.
And when an avalanche of fresh water poured in through the air vents, I could see the creatures coming inside.
I wanted to save Kevin. I wanted to save everyone. I wanted to save myself, too. But I didn’t have time.
[Nine fifty-five.](http://www.reddit.com/r/MattRichardsen)
'
[Part VI.](https://old.reddit.com/r/nosleep/comments/anjlq4/inclement_weather_large_animals_and_other_strange/?)
| 0non-cybersec
|
Reddit
| 1,874 | 7,112 |
How to set hardware clock to correct time?. <p>How can I set the hardware clock to my correct local time?</p>
<p>hwclock shows:</p>
<p><a href="https://i.stack.imgur.com/sZmsF.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/sZmsF.png" alt="enter image description here"></a></p>
<p>instead of 06:42 it should be 18:42</p>
<p>My timezone is Europe/Berlin</p>
<p>How can I fix this?</p>
| 0non-cybersec
|
Stackexchange
| 157 | 409 |
React scroll animation with setState is choppy. <p>It's seems use <code>setState</code> to animate elements by listening to <code>window.scrollY</code> would make very choppy effect. </p>
<pre><code>const scrollY = window.scrollY;
animation01: {
transformY: (scrollY > breakPoint01) ? `translateY(200px)` : `translateY(0px)`,
},
</code></pre>
<p>I ended up with the solution of <code>ref</code> to manipulate DOM directly to avoid the choppy effect...</p>
<pre><code>const breakPoint00 = 1250
const breakPoint01 = breakPoint00 + 230
const animation01 = ReactDOM.findDOMNode(this.animation01)
if (scrollY > breakPoint00) {
animation01.style.transform = `translateY(0px)`
} else (scrollY > breakPoint01) {
animation01.style.transform = `translateY(200px)`
}
</code></pre>
<p>Why is it so choppy when using the first solution? Is this a right way to do scrolling animation in React? </p>
| 0non-cybersec
|
Stackexchange
| 296 | 907 |
Integral equation: existence. <p>Let $H$ and $h$ be smooth functions of one and two variables respectively. Consider equation
$$
H(x) = \int_\Bbb Rh(x,y)f(y)\mathrm dy \qquad \forall x\in \Bbb R.
$$
When does it have a solution, and when this solution is unique? This is a Fredholm integral operator of the first kind, but I was not able to find a lot of literature on the existence and uniqueness. Also, what if we put an additional condition that $f$ is a probability density function, that is $f \geq 0$ and $\int_\Bbb Rf(y)\mathrm dy = 0$?</p>
| 0non-cybersec
|
Stackexchange
| 160 | 550 |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
|
Stackexchange
| 349 | 1,234 |
Overset placement is uneven. <p>I'm using this code to show that one element of the equation is greater than zero and the second element is less than zero.</p>
<pre><code>\begin{align}
\overset{+}{\pi_{i}} + \overset{-}{w_{g}(S)} > 0
\end{align}
</code></pre>
<p>But the alignment of the plus and minus signs are uneven. The minus sign is quite a bit higher than the plus sign. I appreciate help getting the two at the same vertical placement.</p>
| 0non-cybersec
|
Stackexchange
| 133 | 453 |
Injectivity of Homomorphism between homology of boundary and interior.. <p>Let <span class="math-container">$M^{n\geq 4}$</span> be a compact connected manifold with connected boundary <span class="math-container">$\partial M$</span>. Suppose
<span class="math-container">$$i_*: \pi_1(\partial M)\rightarrow \pi_1(M)$$</span>is not injective, it means that there is non-contractible loop in <span class="math-container">$\partial M$</span> which is contractible in <span class="math-container">$M$</span>. And also we can assume this loop spans a disc <span class="math-container">$D$</span> in <span class="math-container">$M$</span>, denote the small neighbourhood of <span class="math-container">$D$</span> in <span class="math-container">$M$</span> by <span class="math-container">$U(D)$</span>. I am wondering if
<span class="math-container">$$i_*:\pi_1(\partial (M\setminus U(D)))\rightarrow \pi_1(M\setminus U(D))$$</span>
is injective now. I am just trying to make the non-jectivity disappear by deleting it. It looks right to me but I don't know how to rigorously explain it. Or maybe I am wrong and there is counterexample. Thanks for your help.</p>
<p>This is edited version by suggestions from comments.</p>
| 0non-cybersec
|
Stackexchange
| 358 | 1,223 |
Compact Operators: Weak Convergence. <p><strong>Problem</strong></p>
<p>Given Banach spaces $X$ and $Y$.</p>
<p>Consider a compact operator $C\in\mathcal{C}(X,Y)$.</p>
<p>Then weak convergence is turned into strong convergence:
$$x_n\rightharpoonup x\implies Cx_n\to Cx$$
I'd like to try proving it but would need some hints.</p>
<p><strong>Attempt</strong></p>
<p>Denote the sup-norm by:
$$F:\Omega\to E:\quad\|F\|_\Omega:=\sup_{\omega\in\Omega}\|F(\omega)\|_E$$</p>
<p>Weak convergence is preserved under continuous operators:
$$\|l(Cx_n-Cx)\|=\|(C'l)(x_n-x)\|\to0$$
By uniform boundedness principle weak convergence implies boundedness:
$$x_n\rightharpoonup x:\quad\|l(x)\|_\mathbb{N}<\infty\implies\|x\|_\mathbb{N}<\infty$$
Hence one can exploit compactness of the operator:
$$(x_n)_{n\in\mathbb{N}}\text{ bounded}\implies C(x_n)_{n\in\mathbb{N}}\text{ precompact}$$
And one obtains strongly convergent subsequences.</p>
<p>Should I combine these now and how?</p>
| 0non-cybersec
|
Stackexchange
| 353 | 981 |
مرحبا بكم في قناة **سبايدر مان اطفال ** نحن نهتم في متعة الاطفال ونقدم حلقات سبايدر مان وافلام الكرتون ومقالب الجوكر ونسعى داما ان تقدم لكم الافضل ...!! UCM8np9tL6l1vdojY1ziHEhA/videos.
| 0non-cybersec
|
Reddit
| 131 | 186 |
Outlook 2007 - Switching Stationery Themes easily. <p>Hi I've created a Email Template for Outlook. And have set it up so now when I open a new email my template is display nicely.</p>
<p>But I may not always want to use this template and might have 2 or 3 templates that I need to change between on a regular basis. Is it possible to change to another "Theme" when composing a new email. </p>
<p>There is under the "Options" section of the ribbon a option called "Themes" but this seems more to do with fonts and colours not replacing a proper "Theme" which contains background colours and Image banners in it.</p>
<p>Any ideas?</p>
| 0non-cybersec
|
Stackexchange
| 165 | 637 |
Formal proof for an easy calculus result. <p>I have the following situation: Suppose $x,y$ are real numbers with $y > 0$. Then, I would like to show that for small values of $t$, we have </p>
<p>$$ (tx)^2 + (ty - 1)^2 \leq 1 $$</p>
<p>How can I show this in a formal manner?? For instance, I find myself struggling because I don't know that is the definition of small values of $t$. </p>
<p>Can someone help me? thanks</p>
| 0non-cybersec
|
Stackexchange
| 137 | 429 |
How to use TightVNC Java Viewer with built-in SSH to connect to an Ubuntu Google Compute Engine instance?. <p>I am using the TightVNC Java Viewer downloaded from here: <a href="https://www.tightvnc.com/release-jviewer-2.6.php" rel="nofollow noreferrer">https://www.tightvnc.com/release-jviewer-2.6.php</a> which has built-in SSH support. Using this, I would like to connect to my Google Compute Engine instance which runs Ubuntu 16.04.</p>
<p>I have performed the following steps so far by referring to various online documentation:</p>
<ol>
<li><p>Installed TightVNC Server on the Ubuntu instance.</p></li>
<li><p>Started the VNC Server using <code>vncserver -localhost :1</code></p></li>
<li><p>OpenSSH server is already installed on the instance.</p></li>
<li><p>Assigned a static External IP address to the instance</p></li>
<li><p>Tried to access the VNC Server using the TightVNC Java Viewer by specifying the SSH Host as the External IP address of the instance, SSH Port as the default <code>22</code>, SSH User as the instance owner, Remote Host as localhost and the Port as the VNC port <code>5901</code>.</p></li>
</ol>
<p>But the connection failed with the error: <em>Cannot establish SSH connection: No supported authentication methods available.</em></p>
<p>Note: I have tested that the VNC connection works without using SSH when I directly open the port <code>5901</code> in the Compute Engine firewall settings and run <code>vncserver :1</code>. This way, using the TightVNC Java Viewer itself, I can access the Mate desktop that I have installed on Ubuntu. But I would like to use a secure connection through SSH instead. So what else do I need to do to enable this?</p>
| 0non-cybersec
|
Stackexchange
| 481 | 1,692 |
How do I copy files off an Iphone using a commandline. <p>I want to use the command line to access the files on the IPhone instead of using the windows Ctrl+C Ctrl+V to copy all the files to my PC. </p>
<p>I've had a look to see if I could map "This PC" or any or the other lines as a network drive but I could not find how.</p>
<p>As per below O intent do copy the lot using the command line, most likely dos</p>
<p><a href="https://i.stack.imgur.com/b6C6q.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/b6C6q.png" alt="This PC on the I phone"></a></p>
| 0non-cybersec
|
Stackexchange
| 193 | 578 |
Understanding why a finite dimensional vector space is a topological manifold. <p>I wish to understand the details of why a finite dimensional vector space is a topological manifold, particularly following Jonh Lee's Introduction to smooth manifolds. I know that this questions has been asked at least <a href="https://math.stackexchange.com/questions/160298/manifold-structure-on-on-a-finite-dimensional-real-vector-space">Here</a> and <a href="https://math.stackexchange.com/questions/2723332/proof-that-finite-dimensional-vector-spaces-are-manifold">here</a>, and while I convinced myself that it is the case, I would not be able to fill in the details if challenged, hence I decided to open a new post with the relevant questions and approach.</p>
<blockquote>
<p><strong>Example 1.24 (Finite-Dimensional Vector Spaces).</strong> Let <span class="math-container">$V$</span> be a finite-dimensional real vector space. Any norm on <span class="math-container">$V$</span> determines a topology, which is independent of the choice of norm (Exercise B.49). With this topology, <span class="math-container">$V$</span> is a topological <span class="math-container">$n$</span>-manifold, and has a natural smooth structure defined as follows. Each (ordered) basis <span class="math-container">$(E_1,...,E_n)$</span> for <span class="math-container">$V$</span> defines a basis isomorphism <span class="math-container">$E:R^n \to V$</span> by
<span class="math-container">$$
E(x) = \sum_{i=1}^nx^iE_i.
$$</span>
This map is a homeomorphism [...]. </p>
</blockquote>
<p>I was filling the details and wanted to discuss my proofwriting when I was told that it was obvious because any real finite dimensional vector space is isomorphic to <span class="math-container">$\mathbb{R}^n$</span>. However at my stage I don't understand how that translates into showing each of the technical details in the definition of a topological manifold. Here are my questions:</p>
<p><strong>How do I precisely show that <span class="math-container">$V$</span> is a topological manifold?</strong> </p>
<p>My reasoning is this: As stated, all norms are equivalent in a finite-dimensional vector space and generate the same topology, but which one is it? well, since a norm induces a metric, I thought it will be the metric topology (denote it by <span class="math-container">$\tau_{||\cdot||}$</span>), i.e., the one generated by the basis <span class="math-container">$\mathcal{B} = \lbrace B_r(v) : u\in V \; \text{and}\; r>0 \rbrace$</span> where <span class="math-container">$B_r(u) = \lbrace v\in V : d_{||\cdot||}(u,v) = ||u-v|| <r\rbrace$</span>, which would then be unique. Then <span class="math-container">$(V,\tau_{||\cdot||})$</span> would be my topological space. I can show that it is Hausdorff but I am not sure how to show it is second countable. any suggestion?</p>
<p>Then I need to show it is locally Eucliean of dimension <span class="math-container">$n$</span>. For this, I need to show that for every point in <span class="math-container">$V$</span> there is a neighborood which is mapped to an open subset of <span class="math-container">$\mathbb{R}^n$</span> (or <span class="math-container">$\mathbb{R^n}$</span> itself). The given suggestion is the isomorphism <span class="math-container">$E$</span> (in linear algebra, a linear transformation which is also a bijection) which the author claims is a homeomorphism. I am guessing it means precisely a homeomorphism from <span class="math-container">$E: (V,\tau_{||\cdot||}) \to (\mathbb{R}^n,\tau_U)$</span> where <span class="math-container">$\tau_U$</span> is the usual topology. So we would be showing that <span class="math-container">$V$</span> is homeomorphic to <span class="math-container">$R^n$</span>, which implies <span class="math-container">$V$</span> is locally Euclidean, is this correct? Now I already now that <span class="math-container">$E$</span> is a biyection and since <span class="math-container">$\mathcal{B}$</span> is a basis for <span class="math-container">$\tau_{||\cdot||}$</span>, I could show that <span class="math-container">$E(\mathcal{B})$</span> is a basis for <span class="math-container">$\tau_U$</span>, which should be duable since <span class="math-container">$n$</span>-balls form a basis for <span class="math-container">$\tau_U$</span> as well, and I think I would be done. Is that right? Is this a good way of proceeding? I will probably also have questions regarding on how to write these ideas, but one step at the time. Unfortuately I am learning all of this at the same time as opposed to a typical math degree curriculum, so I appretiate your patience.</p>
| 0non-cybersec
|
Stackexchange
| 1,322 | 4,676 |
Double Walker, Part 1. Have you ever had a strange feeling about someone close to you? Like they've somehow changed? They look the same, they sound the same - by all rights they're the same person. Only they're not. They're doing weird things. They're treating you differently. It feels like someone you've known for a long time has suddenly become a stranger.
When I was seventeen I started to feel that way about my mother.
Up until she changed, she had been an amazing Mum. Supportive, caring, funny; we were good friends and we got along great. Her and my Dad split up when I was eight, but it wasn't that awful of a divorce and I got to see both of them an equal amount. Half the week I'd spend with Mum, the other half I'd spend with Dad, and as I got older I'd just alternate between the two homes as I saw fit. My little sister (we'll call her Denise) was born right before the divorce, and she spent most of the time at my Mum's place, though she still saw plenty of our Dad. I think they decided early on that it was better for her to have a consistent home because she was so young, whereas I was old enough (and mature enough) to be able to alternate and be with both parents an equal amount. (all relevant information)
ANYWAY.
It was February 2006, and me and my Mum went to the movies one Saturday afternoon. After the movie she went to the bathroom and I waited for her to come out. I was waiting for a good ten minutes or so, which was a little odd, but I guess I was used to having to wait extended periods of time for girls to do whatever it is they do in bathrooms. God knows I'd waited longer than that for my little sister. The thing is, I was standing directly outside the entrance of that female bathroom and I was taking note of every woman who came out and went into it. I would have seen my Mum if she'd come out, especially after ten minutes of waiting and wanting her to hurry up.
So to have her walk up behind me and say: "Come on, let's go", well, let's just say it gave me a bit of a jump. I turned to her and there she was. Somehow she'd made it out of the bathroom without me noticing, and had then managed to sneak up behind me; despite the fact I had been staring at the bathroom entrance the entire time.
Of course I questioned her about it. "What the hell? How did you...?"
She just shrugged it off and said she came out, didn't see me, went walking for a bit to try and find me, then saw me standing back outside the bathrooms. It was one of those weird moments where I wasn't sure if she was lying or if I had been an idiot. But I guess I put it out of my mind and we went home.
I look back on the car ride home, and the rest of that day, and I try to remember signs. I try to think about things she did, things she said - if any of it was out of the ordinary. But the truth is, she was being herself. Maybe a bit quieter than usual, but nothing really strange. That changed the next day when I got up and walked into the kitchen. Usually at that time my Mum would be up and she'd be making Denise her breakfast and helping her get ready for school. But the kitchen was empty and it didn't look like anyone had used it since the night before.
I walked past my sister's room and she was still asleep. I went in and woke her up, told her she should be getting ready for school, etc. She was just like "Mum didn't wake me...". So I went to my Mum's room only to find her sitting on the side of her bed in her nightgown, with a totally blank expression on her face, staring at the wall.
"Mum...." I said, but there was no response. I slowly walked over and put my hand on her shoulder. I shook her gently - she blinked a few times, and snapped out of it.
"What's wrong?" she asked me, as if she was kind of dazed, just coming out of a dream. I told her it was eight o'clock and Denise wasn't even up for school yet. She shook her head slowly, then got up, and walked into the bathroom. She was in the bathroom for about forty five minutes. I managed to get Denise ready in time for school and as we were leaving the house, Mum finally got out of the bathroom fully dressed in her work clothes. She was acting totally normal, like nothing had happened. She just smiled, wished us a good day at school, and that was that.
Every morning for the next few weeks it was the same routine. I'd wake up, shake her out of her daze as she sat on the side of the bed; she'd go and have a shower/get ready for a good forty minutes to an hour, then come out like nothing had happened. After a few days of this I started getting up an hour early just so Mum would be ready and back to normal in time to make Denise her breakfast.
She claimed it was just sleepwalking. That she used to do the same thing when she was a teenager, and it was just an old habit that had somehow managed to creep back into her life. But the way she said this, it didn't really convince me. It didn't seem like it was her explanation - it seemed more like it was her excuse. I told her to go and see a doctor about it, but she assured me it was nothing and that I was blowing it all out of proportion. So, stupid me, I said 'okay' and just went along with the new routine.
It lasted for about two months. The longer it went on, the more convinced I was that it was more than just 'sleepwalking'. I told my Dad about it, and I asked if he ever remembered her doing anything like that. The response was always no. He'd known her since she was 19, and never once during their entire relationship did he experience or even hear her mention the fact that she would sleepwalk. But he, just like Mum, assured me that it was probably nothing. That I was making too much of it.
One night after I got up to pee I walked past my Mum's bedroom, and I decided to have a look inside. Out of curiousity. Of course, there she was, at 3am, sitting on the side of the bed with her eyes wide open staring at the wall. Only this time the expression on her face wasn't blank. It was a smile. Not really a pleasant smile, but not a sinister smile either. It was more like the subtle beginnings of a smile. Like she found something amusing but didn't want to make it too obvious.
This was the first time that I actually felt afraid of the situation. I became filled with dread, from the pit of my stomach, as I stood there and watched her. Eventually I snapped out of it and woke her up. Told her she'd been sleepwalking again. Without a word she stood, went into the bathroom, turned on the light, and the shower started running. I waited for her for a full hour and when she came out, she thought it was morning. I tried to stop her, tried to convince her, but she wouldn't listen to me. Barely even acknowledged my presence. She went into Denise's room (at 4am) and woke her up telling her it was time for school. She started cooking breakfast. All the while I'm just following her, calmly explaining to her what time it is - that she needs to go back to bed, that school doesn't start for another five hours, that she's scaring Denise, etc. I didn't want to try and forcefully wake her up, but I didn't want to go along with the fantasy, either.
Eventually (after cooking breakfast) she started to snap out of it. She was at the sink washing up and she dropped the plate she was holding and stood completely still for about three minutes. She stared out the window, out into the darkness, and finally realised what time it was. She turned to me with a confused expression, and I just led her back to bed and she fell asleep almost instantly. Needless to say, I didn't sleep the rest of that night.
Later on that morning when it was actually time for us to start getting ready, I went into her room. There she sat, in the same position, staring at the wall. It was at this point I knew, for absolute sure, that there was something seriously wrong with my Mother. A brain tumour? Had she had a stroke? Early on-set dementia? All of this was going through my head. Nothing could have prepared me for the truth.
**END OF PART ONE**
[Part Two](http://www.reddit.com/r/nosleep/comments/103yqb/double_walker_part_2/)
[Part Three](http://www.reddit.com/r/nosleep/comments/104l4i/double_walker_part_3/)
Sorry, my hands are getting sore and I'm not sure if I'm ready yet to get into the truly horrifying parts. Writing most of this already has affected me pretty deeply. But I'll try to have it down within the next few hours, or by tomorrow at the latest.
| 0non-cybersec
|
Reddit
| 2,033 | 8,478 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.