text
stringlengths
3
1.74M
label
class label
2 classes
source
stringclasses
3 values
Vagrant xenial64 NFS synced dir &#39;preserve permissions&#39; failure on bcrypt build. <p>Looking for help on what extra configuration I can set to allow my ubuntu virtualbox vm to write into the NFS synced project directory on my OSX host. I've set the explicit sudoers for vagrant in macOS so it shouldn't have any issues modifying the host if needed.</p> <p>End goal is to be able to operate the app's build and dev runtime within ubuntu, while editing the files on the macOS host and the ubuntu box will detect changes and rebuild with gulp as appropriate.</p> <p>Currently getting an error on <code>npm install</code> for bcrypt when it tries to preserve permissions, but I'm also not sure if this is the root cuase of the full fail.</p> <p>Cross posted: <a href="https://groups.google.com/forum/#!topic/vagrant-up/LS_eFJhZAwQ" rel="nofollow noreferrer">https://groups.google.com/forum/#!topic/vagrant-up/LS_eFJhZAwQ</a></p> <p>Vagrantfile:</p> <pre><code>Vagrant.configure(2) do |config| config.vm.box = "ubuntu/xenial64" config.vm.provider "virtualbox" do |v| v.memory = "3072" v.customize ["setextradata", :id, "VBoxInternal2/SharedFoldersEnableSymlinksCreate/v-root", "1"] end config.vm.define "dev", primary: true do |dev| dev.vm.hostname = "proteus.dev" dev.vm.network "private_network", ip: "192.168.10.10" dev.vm.synced_folder '.', '/home/ubuntu/src/proteus', nfs: true, mount_options:['nolock,vers=3,udp,noatime,actimeo=1'] # also tried 'rw' and other linux__mount_options end end </code></pre> <p>Error output:</p> <pre><code>$ npm install bcrypt &gt; [email protected] install /home/ubuntu/src/proteus/node_modules/bcrypt &gt; node-pre-gyp install --fallback-to-build node-pre-gyp ERR! Tried to download(404): https://github.com/kelektiv/node.bcrypt.js/releases/download/v1.0.2/bcrypt_lib-v1.0.2-node-v48-linux-x64.tar.gz node-pre-gyp ERR! Pre-built binaries not found for [email protected] and [email protected] (node-v48 ABI) (falling back to source compile with node-gyp) make: Entering directory '/home/ubuntu/src/proteus/node_modules/bcrypt/build' CXX(target) Release/obj.target/bcrypt_lib/src/blowfish.o CXX(target) Release/obj.target/bcrypt_lib/src/bcrypt.o CXX(target) Release/obj.target/bcrypt_lib/src/bcrypt_node.o SOLINK_MODULE(target) Release/obj.target/bcrypt_lib.node COPY Release/bcrypt_lib.node cp: preserving permissions for ‘Release/bcrypt_lib.node’: Operation not permitted bcrypt_lib.target.mk:134: recipe for target 'Release/bcrypt_lib.node' failed make: *** [Release/bcrypt_lib.node] Error 1 make: Leaving directory '/home/ubuntu/src/proteus/node_modules/bcrypt/build' gyp ERR! build error gyp ERR! stack Error: `make` failed with exit code: 2 gyp ERR! stack at ChildProcess.onExit (/usr/lib/node_modules/node-gyp/lib/build.js:258:23) gyp ERR! stack at emitTwo (events.js:106:13) gyp ERR! stack at ChildProcess.emit (events.js:191:7) gyp ERR! stack at Process.ChildProcess._handle.onexit (internal/child_process.js:215:12) gyp ERR! System Linux 4.4.0-83-generic gyp ERR! command "/usr/bin/nodejs" "/usr/lib/node_modules/node-gyp/bin/node-gyp.js" "build" "--fallback-to-build" "--module=/home/ubuntu/src/proteus/node_modules/bcrypt/lib/binding/bcrypt_lib.node" "--module_name=bcrypt_lib" "--module_path=/home/ubuntu/src/proteus/node_modules/bcrypt/lib/binding" gyp ERR! cwd /home/ubuntu/src/proteus/node_modules/bcrypt gyp ERR! node -v v6.11.0 gyp ERR! node-gyp -v v3.6.2 gyp ERR! not ok node-pre-gyp ERR! build error node-pre-gyp ERR! stack Error: Failed to execute '/usr/bin/nodejs /usr/lib/node_modules/node-gyp/bin/node-gyp.js build --fallback-to-build --module=/home/ubuntu/src/proteus/node_modules/bcrypt/lib/binding/bcrypt_lib.node --module_name=bcrypt_lib --module_path=/home/ubuntu/src/proteus/node_modules/bcrypt/lib/binding' (1) node-pre-gyp ERR! stack at ChildProcess.&lt;anonymous&gt; (/home/ubuntu/src/proteus/node_modules/node-pre-gyp/lib/util/compile.js:83:29) node-pre-gyp ERR! stack at emitTwo (events.js:106:13) node-pre-gyp ERR! stack at ChildProcess.emit (events.js:191:7) node-pre-gyp ERR! stack at maybeClose (internal/child_process.js:891:16) node-pre-gyp ERR! stack at Process.ChildProcess._handle.onexit (internal/child_process.js:226:5) node-pre-gyp ERR! System Linux 4.4.0-83-generic node-pre-gyp ERR! command "/usr/bin/nodejs" "/home/ubuntu/src/proteus/node_modules/.bin/node-pre-gyp" "install" "--fallback-to-build" node-pre-gyp ERR! cwd /home/ubuntu/src/proteus/node_modules/bcrypt node-pre-gyp ERR! node -v v6.11.0 node-pre-gyp ERR! node-pre-gyp -v v0.6.32 node-pre-gyp ERR! not ok Failed to execute '/usr/bin/nodejs /usr/lib/node_modules/node-gyp/bin/node-gyp.js build --fallback-to-build --module=/home/ubuntu/src/proteus/node_modules/bcrypt/lib/binding/bcrypt_lib.node --module_name=bcrypt_lib --module_path=/home/ubuntu/src/proteus/node_modules/bcrypt/lib/binding' (1) npm WARN optional SKIPPING OPTIONAL DEPENDENCY: fsevents@^1.0.0 (node_modules/chokidar/node_modules/fsevents): npm WARN notsup SKIPPING OPTIONAL DEPENDENCY: Unsupported platform for [email protected]: wanted {"os":"darwin","arch":"any"} (current: {"os":"linux","arch":"x64"}) npm ERR! Linux 4.4.0-83-generic npm ERR! argv "/usr/bin/nodejs" "/usr/bin/npm" "install" "bcrypt" npm ERR! node v6.11.0 npm ERR! npm v3.10.10 npm ERR! code ELIFECYCLE </code></pre>
0non-cybersec
Stackexchange
Microsoft.ReportViewer.Common Version=12.0.0.0. <p>I'm getting the following exception in my Windows Service Application:</p> <blockquote> <p>System.IO.FileNotFoundException: Could not load file or assembly 'Microsoft.ReportViewer.Common, Version=12.0.0.0, Culture=neutral, PublicKeyToken=89845dcd8080cc91' or one of its dependencies. The system cannot find the file specified.</p> </blockquote> <p>I cannot find a download url for version 12 and setting the files to "Include" and "Prequisite (Auto)" does not solve the problem in this Windows Service Application, although it works fine in my WinForms Application and results in the appropriate files being included and referenced along with all other requisite .DLLs.</p> <p>Can someone either help me get this Windows Service Application to include the files, or lead me to a download link that will install Version 12 in the GAC?</p>
0non-cybersec
Stackexchange
ImportError: No module named &#39;pymongo&#39;. <p>I have a problem running pymongo on Win 7 (64) with Python 3.4, mongodb 4.2.10. The error output is as follows:</p> <pre><code>import pymongo ImportError: No module named 'pymongo' </code></pre> <p>The code is pretty simple:</p> <pre><code>import pymongo from pymongo import MongoClient client=MongoClient() db=client.test_db dict={'A':[1,2,3,4,5,6]} db.test_collection.insert(dict) to_print=db.test_collection.find() print(to_print) </code></pre> <p>I tried already re-installing Python and MongoDB - did not help. It works when I do it manually in cmd, i.e. mongod.exe and mongo.exe work fine. It appears there is problem with pymongo, but I don't know how to fix it.</p>
0non-cybersec
Stackexchange
On time and consistency in multi-level agent-based simulations Gildas MORVAN, Yoann KUBERA http://www.lgi2a.univ-artois.fr/~morvan/ [email protected] Univ. Artois, EA 3926, Laboratoire de Génie Informatique et d’Automatique de l’Artois (LGI2A) Béthune, France Abstract The integration of multiple viewpoints became an increasingly popular ap- proach to deal with agent-based simulations. Despite their disparities, recent ap- proaches successfully manage to run such multi-level simulations. Yet, are they doing it appropriately? This paper tries to answer that question, with an analysis based on a generic model of the temporal dynamics of multi-level simulations. This generic model is then used to build an orthogonal approach to multi-level simulation called SIMI- LAR. In this approach, most time-related issues are explicitly modeled, owing to an implementation-oriented approach based on the influence/reaction principle. Keywords: multi-level agent-based modeling, large-scale simulation Introduction Simulating complex systems often requires the integration of knowledge coming from different viewpoints (e.g. different application fields, different focus points) to obtain relevant results. Yet, the representations of the agents, the environment and the tem- poral dynamics in regular multi-agent based simulation meta-models are designed to support a single viewpoint. Therefore, they lack the structure to manage the integra- tion of such systems, called multi-level simulations. 1 ar X iv :1 70 3. 02 39 9v 1 [ cs .M A ] 7 M ar 2 01 7 http://www.lgi2a.univ-artois.fr/~morvan/ Managing multiple viewpoints on the same phenomenon induces the use of het- erogeneous time models, thus raising issues related to time and consistency. Multi- Level Agent-based Modeling (ML-ABM) is a recent approach that aims at extending the classical single-viewpoint agent-based modeling paradigm to cope with these issues and create multiple-viewpoints based simulations [1, 2, 4, 6, 7, 9, 11, 12]. Considering the disparities between the various ML-ABM approaches, a natural question comes to mind: is there a "right" way to do ML-ABM? In this context, the aim of this paper is double. We first aim at eliciting the is- sues and simulation choices underlying such simulations, with an analysis based on a generic model of the temporal dynamics of a multi-level simulation. Then, we present SIMILAR, a ML-ABM approach using the influence/reaction principle to manage explicitly the issues related to the simultaneous actions of agents in multiple levels [3, 8, 10]. 1 Temporal dynamics in Multi-level simulations In this section some issues related to multi-level simulation are emphasized using a generic model describing the temporal dynamics of a multi-level simulation. 1.1 General case From a coarse grain viewpoint, simulation is a process transforming the data about a phenomenon from initial values into a sequence of intermediate values, until a final state is reached. This evolution is characterized by: 1) A dynamic state δ(t ) ∈∆mod- eling the data of the simulation at time t ; 2) A time modelT representing the moments when each state of the discrete evolution was obtained; 3) A behavior model describ- ing the evolution process of the dynamic state between two consecutive moments of the time model. The exact content of the time model, dynamic state, as well as the behavior model of a simulation depends on the simulation approach being used. Yet, despite their disparities, many common points can be identified among them. First, since real time can be seen as a continuous value, most simulation assume that T ⊂ R. Moreover, we can assume that a simulation eventually ends. Thus, T contains an ordered, finite and discrete set of time values t ∈ T. Then, the dynamic state contains data related to the agents and the environment1. 1.2 Multi-level case In multi-level simulations, each level embodies a specific viewpoint on the studied phenomenon. Since these viewpoints can evolve using very different time scales, each level l ∈L (where L is the set of all levels) has to define its own time model Tl . 1In this paper, we use a simplistic definition of these concepts: an agent is an entity that can perceive data about itself, the environment and the other agents, possibly memorize some of them and decide to perform actions 2 The interaction of the levels is possible only by defining when and under which circumstances interaction is possible. For this purpose, we introduce a multi-level specific terminology to the temporal dynamics. 1.2.1 Local information We consider that agents can lie in more than one level at a time. A (t , l ) ∈ Al de- notes the set of agents of the level l ∈ L at time t ∈ Tl . Since levels can have very different temporal dynamics, this point has various implications on the structure of the simulation: 1) Agents have a local state2 φa(t , l ) ∈ Φa,l in each level l ∈L where they lie; 2) Agents perform decisions differently depending on the level from which the decisions originates; 3) A level l can only trigger the local behavior of the agents lying in l . Similarly, the environment has a local state φω(t , l ) ∈ Φω in each level of the simulation. Yet, contrary to the agents, the environment is present in each level of the simulation. Each local state embodies any agent-independent information like a topology or a state (e.g. an ambient temperature). 1.2.2 Global information The coherence of agent behaviors in each level can require information like cross-level plans or any other level-independent information. Therefore, we consider that agents have a global state3 µa(t ) ∈Ma , which is independent from any level. 1.2.3 Content of a dynamic state Owing to the abovementioned information, the dynamic state δ(t ) ∈ ∆ of a multi- level simulation at time t can be defined as the sum of the local dynamic state δ(t , l ) ∈ ∆l of each level l ∈L and the global dynamic state δG(t ) ∈∆G containing the global state of the agents. ∆=∆G × ∏ l∈L ∆l (1) ∀δ(t ) ∈∆,δ(t ) = � δG(t ), � δ(t , l ) � l∈L � with δG(t ) ∈∆G∧∀l ∈L,δ(t , l ) ∈∆l (2) 1.2.4 Time model of the simulation The interaction between levels is possible only if their time models are somehow cor- related. Since the time model of each level is a discrete ordered set, it is possible to build an order between their elements. The time model of a multi-level simulation is defined as the union of the time models of all the levels: T = ⋃ l∈LTl . For consistency reasons, the time models T and Tl must have the same bounds. Since T and Tl are ordered, we also define s+d t (resp. s + d tl ) as the successor of s ∈T (resp. s ∈Tl ). 2Also called "physical state" or "face" in the literature [3, 8, 10, 11] 3Also called "mind", "memory state" or "core" in the literature [3, 8, 10, 11] 3 1.2.5 Consistent and transitory states In the case where t 6∈ Tl , the level l ∈ L is in a transitory state. No guarantee can be provided on such a state, since it corresponds to a temporary value used by l to compute its future consistent dynamic state. On the opposite, the data contained in the dynamic state of a level l ∈L can be safely read or perceived at times in Tl , where this state is considered as consistent. Figure 1: Illustration of a time model, for a simulation using two levels "A" and "B".The first line represents real time.The second and third line represent the time model of the levels "A" and "B". The last line represents the time model of the whole simulation. At t1, the state of the simulation is consistent. At t4, it is half-consistent. From a global viewpoint, the dynamic state of the simulation is consistent (resp. transitory) if all of its levels are consistent (resp. transitory). It can also be in an intermediate situation called half-consistent state, if a level is in a consistent and another level is in a transitory state. These concepts are illustrated in Figure 1. To clarify our speech, we writeδ(t ) the consistent (or half-consistent) dynamic state of the simulation at time t ∈ T and δ(]t , t ′[) the transitory dynamic state of the sim- ulation between the times t ∈T and t ′ ∈T. 1.3 Multi-level inherent issues When a simulation is in a transitory phase, each level performs operations in parallel to determine the next consistent value of their dynamic state. The transitory periods of the levels are not necessarily in sync. Therefore, each level can be at a different step of its transitory operations when an interaction occurs. This point raises the follow- ing time-related issues: 1) Determine on which dynamic states is based the decision in a level to interact with another level; 2) Determine when to take into considera- tion the modifications in a level resulting from an action initiated in another level; 3) Determine how to preserve the consistency of the global state of the agents despite having its update occurring after the level-dependent perceptions. 4 This section illustrates these issues on an example containing two levels "A" and "B", presented in Figure 2 Figure 2: Illustration of a subset of a time model containing two levels "A" and "B". 1.3.1 Level interaction through perception The first issue is related to the perception of the dynamic state of the other levels. It happens for instance at the time t2 (see fig. 2), when an agent from the level "B" tries to read information from the level "A". Indeed, since "A" is in a transitory state at that time, the data being read by the agent might have arbitrary values. Therefore, a heuristic has to be used to disambiguate that value. For instance using the last consis- tent dynamic state of the level (in this case the dynamic state of "A" at the time t1), using the arbitrary values from the transitory state at t2 or anticipating the modifica- tions that might have occurred in "A" between t1 and t2. 1.3.2 Level interaction through actions The second issue is related to the side effects of an interaction between two levels. It happens for instance during the transitory period ]t1, t3[ (see fig. 2) of the level "A", if an agent from "A" tries to interact with the level "B". Indeed, since both levels have a different time scale, it is difficult to determine when the actions of "A" have to be taken for account into the computation of the dynamic state of "B". It can be during the transitory phases ]t1, t2[, ]t2, t3[ or a later one. A generic answer to that problem might be "the next time both levels are in sync" (t3 in this case). Yet, this leads to aberrations like taking into consideration these actions at the end of the simulation (for instance in fig 1, if an agent from the level "A" interacts with "B" during the transitory period ]t3, t5[). 1.3.3 Global state update The third issue is related to the read and write access of the global state of an agent and the update of that value. Indeed, during the transitory phase of each level, the agent has to read and possibly update the value of the global states, to take into account the information that were perceived. Yet, since the perception is relative to each level, the global state is the subject of the same issues than the interactions between levels. 5 For instance, in figure 2, the period ]t1, t2[ of the simulation is a transitory period for the level "B" and a subset of the transitory period for the level "A". The latter raises the question of whether if the global state of the agent at the time t2 has to take into consideration the data being perceived by the agent from "A" or not. Indeed, perception might not be complete at that time in "A". 1.4 Differences between multi-level approaches There is no universal answer to the issues presented in this section, since the coherence between heterogeneous time scales is itself an ill-defined notion. The main differences between existing ML-ABM approaches are the way these issues are handled, through the answer of the following questions about the operations performed during a tran- sitory phase ]t , t + d t [: 1) Which agents can perform a decision during a transitory period of a level? 2) How many actions can be performed by the decision process of an agent? 3) How are committed the results of the action to the future dynamic state of a level? 4) When are performed these operations during the transitory state? 5) Which dynamic state of a level k is read by a level l initiating an interaction with k? A consistent one? A transitory one? Which ones ? 6) When is taken into account the interaction initiated by a level l with a level k? 7) How is managed the consistency of the global state of agents? In the next section, we present an agent-based approach called SIMILAR, that aims at addressing these issues. 2 SIMILAR Many meta-models and simulation engines dedicated to ML-ABM have been proposed in the literature such as IRM4MLS [10], PADAWAN [11], GAMA [5] or NETLOGO LEVELSPACE [6]. All these approaches provide a different and yet valid answer to the multi-level simulation issues. In this paper, we do not aim at detailing precisely their differences: a comprehensive survey of the different approaches can be found in [9]. Existing approaches like GAMA or PADAWAN (Pattern for Accurate Design of Agent Worlds in Agent Nests) are complete approaches providing various interesting features respectively including the agentification of emerging structures or the elicita- tion of interactions between agents. However, these approaches rely on a time model where the management of the potentially simultaneous actions is strongly constrained by the sequential execution of agent actions. In this paper, we investigate another approach where agent actions are separated from their consequences in the dynamic state of the simulation, using the influence/reaction principle [3]. The resulting approach, called SIMILAR (SImulations with MultI-Level Agents and Reactions), is deeply inspired by IRM4MLS [10], a multi-level extension of IRM4S [8]. The main differences between SIMILAR and IRM4MLS are the more precise and less misleading terminology and simulation algorithms, as well as a more precise and implementation-oriented model for the reaction phase (the latter is not described in this paper due to the lack of space). 6 2.1 Core concepts SIMILAR revolves around five core concepts: 1) Levels, modeling different view- points on the simulated phenomenon; 2) Agents lying in one or more levels. From each level where they lie, they perceive the state of one or more levels to decide how they wish to influence the evolution of the system; 3) the Environment modeling the topology, the local information (e.g. temperature) and the natural evolution4 of each level; 4) Influences modeling actions which effect has yet to be committed to the state of the simulation; 5) Reactions modeling how the changes depicted by the influences are committed to the state of the simulation. We noteL the levels defined for a simulation, I the domain space of all the possible influences of the simulation and A all possible agents of the simulation. 2.2 Heuristics SIMILAR relies on the following heuristics and choices to manage the issues raised in the section 1.4. 1) During the transitory period ]t , t+d tl [ of a level l ∈L, the agents fromA (t , l ) decide once in parallel; 2) The number of influences produced by each decision is not constrained; 3) The result of the actions is committed to the future dynamic state of a level using a reaction mechanism [3] ; 4) During the transitory period ]t , t+d tl [ of a level l ∈L, the behavior of the agents is triggered slightly after t and the reaction occurs slightly before t + d tl ; 5) The dynamic state being read by the behavior of an agent (or of the environment) is always the most recent consistent state of the level5; 6) The actions emitted by an agent from a level l to a level k during a transitory period ]t , t+d tl [ are taken into account in the next reaction of k after the time t (i.e. the reaction occurring during the transitory period containing or starting with the time t ); 7) The consistency of agent global states is attained by: i) Computing the revised global state of the agents at the beginning of the transitory period of a level (i.e. before any reaction); ii) Computing the revised global state of an agent once for all the levels starting a new transitory period at the same time; iii) Use this revised global state as the global state of the agent for the next half- consistent state of the simulation. This approach is summarized in Figure 3 2.3 Dynamic state In SIMILAR, we consider that each point of view on a phenomenon has to be em- bodied in a level l ∈ L. As a consequence, the dynamic state δ(t ) of the simulation is divided in level-specific dynamic states δ(t , l ). Two kind of data can be obtained from the dynamic state of a level l ∈ L: a state valuation σ(t , l ), defining a valuation of the level-related properties of the agents (e.g. their location or their temperature) or the environment (e.g. an ambient temperature) and the state dynamics γ (t , l ), defining the actions that were still being performed6 in that level during the observation. 4i.e. without the intervention of the behavior of an agent 5Default heuristic of SIMILAR. SIMILAR also allows the definition of user-defined disambiguation heuristics 6Actions that started before the time t and that will end after the time t 7 Figure 3: Illustration of the operation performed independently in each level (squares) and joint for all the levels (rectangles) during a simulation. The letters describe the type of the operation: Perception (P), Global state revision (M), Decision (D) and Reaction (R). Any arrow starting on a consistent dynamic state at a time t points to the revised global state used as the new global state of the agents in the half-consistent dynamic state of the time t . This example focuses on the operations performed in a simulation containing one agent lying in three levels. ∀l ∈L,∀t ∈Tl ,δ(t , l ) =<σ(t , l ),γ (t , l )> (3) 2.3.1 State valuation The state valuation σ(t , l ) of a level l ∈ L is the union of the local state of the en- vironment φω(t , l ) ∈ Φω, containing agent-unrelated information and a local state 7 φa(t , l ) ∈ Φa,l for each agent a ∈A contained in the level. 2.3.2 State dynamics SIMILAR relies on the influence/reaction principle to model the actions resulting from the decision of the agents, from the natural evolution of the environment and the actions still being performed at time t . Therefore, the state dynamics γ (t , l ) of a level l ∈L contains a set of influences. ∀l ∈L,∀t ∈Tl ,γ (t , l )⊆ I (4) Since the data contained in an influence are mostly domain-dependent, no specific model is attached to them. They usually contain the subjects of the action (e.g. the physical state of one or more agents) as well as parameters (e.g. an amount of money to exchange). 2.4 General behavior model The dynamic state of a simulation models a "photograph" of the simulation at time t . Motion is attained owing to the behavior of the agents, the natural action of the 7This replaces the term "physical state" from IRM4MLS, which was misleading, since that state also contains mental information like a desired speed. 8 environment and the reaction of each level to influences. 2.4.1 Behavior of the agents The behavior of an agent in a level l ∈ L has three phases: 1) Perception: extract information from the dynamic state of the levels that can be perceived from l ; 2) Global state revision: use the newly perceived data to revise the content of the global state of the agent; 3) Decision: use the perceived data and the revised global state to create and send influences to the levels that can be influenced by l . Each influence models a modification request of the dynamic state of a level. 2.4.2 Natural action of the environment The natural action of the environment is simpler than the behavior of agents: it only has one phase, where the dynamic state of the levels that can be perceived from l are used to create influences sent to one or more levels that can be influenced by l . 2.4.3 Reaction to the influences As in IRM4MLS, in SIMILAR the reaction of a level l ∈ L is a process computing the new consistent dynamic state of l . The reaction phase occurs at the end of a transitory period ]t , t + d tl [ of a level, and is computed using the value of the most recent consistent dynamic state of l and the influences that were sent to l during the transitory period ]t , t + d tl [; Yet, contrary to IRM4MLS, SIMILAR provides an explicit model to the generic influences that can be found in any simulation, like the addition/removal of an agent from the simulation/a level. Such influences are called system influences, in opposition to regular influences, which are user-defined. A model is also provided to their generic reaction. These points are not detailed in this paper. 2.5 Formal notations and simulation algorithm Not all levels are able to interact. Therefore, the interactions between levels are con- strained by two digraphs: A perception relation graph GP (resp. influence relation graph GI ) defines which levels can be perceived (resp. influenced) during the behav- ior of the agent/environment in a specific level. � l1, l2 � ∈GP (resp. GI ) ⇐⇒ An agent from l1 can perceive (resp. influence) the dynamic state of l2 (5) The out neighborhood N +P (l ) (resp. N + I (l )) of a level l ∈ L in the perception (resp. influence) relation graph defines the levels that can be perceived (resp. influ- enced) by l . 2.5.1 Agent behavior Since the content of the dynamic state is not trustworthy during transitory periods, the natural action of the environment and the perception of the agents are based on 9 the last consistent dynamic state of the perceptible levels. This time is identified by the notation f l oo rl (]t , t ′[), which models the last time when the dynamic state of a level l was consistent for a perception occurring during a transitory period ]t , t ′[. ∀t , t ′ ∈T2,∀l ∈L, f l oo rl (]t , t ′[) = max � {u ≤ t |u ∈Tl } � (6) Based on these information, the perception phase of an agent a ∈A (t , l ) from a level l ∈L for the transitory period ]t , t+d tl [ is defined as an application pe r c e p t i ona,]t ,t+d tl [,l . This application reads the last consistent dynamic state of each perceptible level to produce the perceived data: ∀l ∈L,∀t ∈Tl\{max(Tl )},∀a ∈A (t , l ), pe r c e p t i ona,]t ,t+d tl [,l : ∏ k∈N +P (l ) ∆k −→ Pa,l � δ � f l oo rk (]t , t + d tl [), k � � k∈N +P (l ) 7−→ pa,l (]t , t + d tl [) (7) In this notation, Pa models the domain space of the data that can be perceived by the agent a, from the perspective of the level l . It can contain raw data from the dynamic states, or an interpretation of these data. For instance, in a road traffic simulation, the drivers do not need to put the absolute position of the leading vehicle (i.e. raw data from the dynamic state) in their perceived data: the distance between the two vehicles is sufficient. The revision of the global state of an agent a ∈ A (t , l ) for a transitory period starting at the time t is defined as an application g l obal Re va,]t ,t+d t [. This applica- tion reads the most recent consistent global stateµa � t ) of the agent a and the perceived data pa,l (]t , t + d tl [),∀l ∈L|t ∈Tl of all the levels that started a transitory phase at the time t , in order to determine the value of the revised global state µa(]t , t + d t [) of the agent during the transitory period. ∀t ∈T\{max(T)},∀a ∈A (t ), g l obal Re va,]t ,t+d t [ : Ma × ∏ l∈L|t∈Tl Pa,l −→ Ma � µa(t ), � pa,l (]t , t + d tl [) � l∈L|t∈Tl � 7−→ µa(]t , t + d t [) (8) Finally, the decision of an agent a ∈A (t , l ) from a level l ∈ L for the transitory period ]t , t + d tl [ is defined as an application d ec i s i ona,]t ,t+d tl [,l . This application reads the revised global stateµa(]t , t+d t [) of a and the perceived data pa,l (]t , t+d tl [) computed for the level l to create the influences that will modify levels during their respective next reaction. ∀l ∈L,∀t ∈Tl\{max(Tl )},∀a ∈A (t , l ), d ec i s i ona,]t ,t+d tl [,l : Ma ×Pa,l −→ 2 I � µa(]t , t + d t [), pa,l (]t , t + d tl [) � 7−→ Ia,l (]t , t + d tl [) (9) If we note l e ve l (i) the level at which the influence i ∈ I is aimed, then the influence relation graph imposes the following constraint to the decision: ∀l ∈L,∀t ∈Tl\{max(Tl )}, i ∈Ia,l (]t , t + d tl [)⇒ l e ve l (i) ∈N + I (l ) (10) 10 As a result to this phase, each created influence i ∈ Ia,l (]t , t + d tl [) is added to the transitory state dynamics of k = l e ve l (i), for the transitory period ] f l oo rk (]t , t + d tl [), f l oo rk (]t , t + d tl [)+ d tk[. 2.5.2 Natural action of the environment The natural action of the environment from a level l ∈ L for the transitory period ]t , t + d tl [ is defined as an application nat u ral]t ,t+d tl [,l . This application reads the last consistent dynamic state of each perceptible level to create the influences that will modify the dynamic state of the influenceable levels (during their reaction). ∀l ∈L,∀t ∈Tl\{max(Tl )}, nat u ral]t ,t+d tl [,l : ∏ k∈N +P (l ) ∆k −→ 2 I � δ � f l oo rk (]t , t + d tl [), k � � k∈N +P (l ) 7−→ Iω,l (]t , t + d tl [) (11) The resulting influences are managed with the same process than the ones coming from the decisions of the agents. 2.5.3 Reaction of a level The reaction of a level l ∈ L is computed at the end of each transitory period ]t , t + d tl [ where t ∈Tl . It is defined as an application r eac t i onl ,]t ,t+d tl [ reading the tran- sitory dynamic state δ(]t , t + d tl [, l ) of the level to determine the next consistent value of the dynamic state δ(t + d tl , l ). ∀l ∈L,∀t ∈Tl\{max(Tl )}, r eac t i on]t ,t+d tl [,l : ∆l −→ ∆l � δ � ]t , t + d tl [, l � � 7−→ δ � t + d tl , l � (12) The reaction has the following responsibilities: 1) Take into consideration the influ- ences of γ (]t , t + d tl [, l ) to update the local state of the agents, update the local state of the environment, create/delete agents from the simulation or add/remove agents from the level; 2) Determine if the influences of γ (]t , t+d tl [, l ) persist in γ (t+d tl , l ) (if they model something that has not finished at the time t+d tl ); 3) Manage the col- liding influences of γ (]t , t + d tl [, l ). 2.5.4 Simulation algorithm The simulation algorithm of SIMILAR is presented in Figure 4. It relies on the pre- sented concepts and complies with the time constraints defined in [10]. Conclusion and perspectives In this paper, we elicited several issues about time and consistency raised in multi-level simulations. There is no clear solution to theme since the notion of time consistency 11 t ←− mi n(T); D←−Map<level,dynamic state> //Most recent consistent dynamic state M ←−Map<agent,memory state> //Most recent consistent global state T ←−Map<level,time interval> //Next transitory state time interval DT ←−Map<level,dynamic state> //Next transitory state MT ←−Map<agent,memory state> //Most recent revised global state for l ∈L do D[l ]←− δ(t , l ); T [l ]←−]t , t + d tl [; DT [l ]←− copy of D[l ]; end while t 6= max(T) do for l ∈L do if t = end (T [l ]) then D[l ]←− r eac t i onT [l ],l (DT [l ]); DT [l ]←− copy of D[l ]; T [l ] =]t , t + d tl [; end for a ∈A (t ) do M [a] = copy of MT [a]; end end Li ←− {l ∈L|s t a r t (T [l ]) = t}; p←−Map<agent,Map< level, perceived data >>; A←−;; for l ∈ Li do for a ∈A (t , l ) do p[a][l ]←− pe r c e p t i ona,T [l ],l � (D[k]) k∈N +P (l ) � ; A←−A∪{a} end end for a ∈A do MT [a] = g l obal Re va,]t ,t+d t [(M [a], p[a]); end I ←−;; for l ∈ Li do I ←− I ∪ nat u ralT [l ],l � (D[k]) k∈N +p (l ) � ; for a ∈A (t , l ) do I ←− I ∪ d ec i s i ona,T [l ],l (MT [a], p[a]); end end for i ∈ I do Add i to the state dynamics of DT [l e ve l (i)]; end t ←− mi n � � r i g h t (T [l ]), l ∈L � //t becomes equal to t + d t end Figure 4: The simulation algorithm used in SIMILAR among heterogeneous time models is itself ill-defined. Therefore, rather than distin- guishing the "right" or "wrong" approaches, we defined a theoretical frame giving a better understanding of the choices underlying each approach. Then, it is up to mod- elers and domain specialists to tell if these choices are appropriate or not for the study of a given phenomenon. To cope with the multi-level related issues, we introduced a meta-model named SIMILAR based on the influence/reaction principle. This model is designed to reify as much as possible the concepts involved in the abovementionned issues, thus providing a better support to the definition of explicit solutions to them. SIMILAR includes a generic and modular formal model, a methodology and a simulation API preserving the structure of the formal model. Thus, the design of simulations is in addition more robust to model revisions and relies on a structure fit to represent the intrinsic complexity of the simulated multi-level phenomena. SIMILAR has been implemented in Java and is available under the CeCILL-B li- cense. 12 It is available at http://www.lgi2a.univ-artois.fr/~morvan/similar.html. References [1] B. Camus, C. Bourjot, and V. Chevrier. Considering a multi-level model as a society of interacting models: Application to a collective motion example. Journal of Artificial Societies & Social Simulation, 18(3), 2015. [2] D. David and R. Courdier. See emergence as a metaknowledge. a way to reify emergent phenomena in multiagent simulations? In Proceedings of ICAART’09, pages 564–569, Porto, Portugal, 2009. [3] J. Ferber and J-P. Müller. Influences and reaction: a model of situated multia- gent systems. In 2nd International Conference on Multi-agent systems (ICMAS’96), pages 72–79, 1996. [4] J. Gil-Quijano, T. Louail, and G. Hutzler. From biological to urban cells: Lessons from three multilevel agent-based models. In Principles and Practice of Multi-Agent Systems, volume 7057 of LNCS, pages 620–635. Springer, 2012. [5] A. Grignard, P. Taillandier, B. Gaudou, D. A. Vo, N. Q. Huynh, and A. Dro- goul. GAMA 1.6: Advancing the art of complex agent-based modeling and sim- ulation. In PRIMA 2013: Principles and Practice of Multi-Agent Systems, volume 8291 of LNCS, pages 117–131. Springer, 2013. [6] A. Hjorth, B. Head, and U. Wilensky. Levelspace netlogo extension. http: //ccl.northwestern.edu/rp/levelspace/index.shtml, 2015. [7] T. Huraux, N. Sabouret, and Y. Haradji. A multi-level model for multi-agent based simulation. In Proc. of 6th Int. Conf. on Agents and Artificial Intelligence (ICAART), 2014. [8] F. Michel. The IRM4S model: the influence/reaction principle for multiagent based simulation. In Proc. of 6th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS), pages 1–3, 2007. [9] G. Morvan. Multi-level agent-based modeling - a literature survey. CoRR, abs/1205.0561, 2013. [10] G. Morvan, A. Veremme, and D. Dupont. IRM4MLS: the influence reaction model for multi-level simulation. In Multi-Agent-Based Simulation XI, volume 6532 of LNCS, pages 16–27. Springer, 2011. [11] S. Picault and P. Mathieu. An interaction-oriented model for multi-scale simula- tion. In Proc of the 22nd Int. Joint Conf. on Artificial Intelligence, pages 332–337. AAAI Press, 2011. [12] D-A. Vo. An operational architecture to handle multiple levels of representation in agent-based models. PhD thesis, Université Paris VI, 2012. 13 http://www.lgi2a.univ-artois.fr/~morvan/similar.html http://ccl.northwestern.edu/rp/levelspace/index.shtml http://ccl.northwestern.edu/rp/levelspace/index.shtml 1 Temporal dynamics in Multi-level simulations 1.1 General case 1.2 Multi-level case 1.2.1 Local information 1.2.2 Global information 1.2.3 Content of a dynamic state 1.2.4 Time model of the simulation 1.2.5 Consistent and transitory states 1.3 Multi-level inherent issues 1.3.1 Level interaction through perception 1.3.2 Level interaction through actions 1.3.3 Global state update 1.4 Differences between multi-level approaches 2 SIMILAR 2.1 Core concepts 2.2 Heuristics 2.3 Dynamic state 2.3.1 State valuation 2.3.2 State dynamics 2.4 General behavior model 2.4.1 Behavior of the agents 2.4.2 Natural action of the environment 2.4.3 Reaction to the influences 2.5 Formal notations and simulation algorithm 2.5.1 Agent behavior 2.5.2 Natural action of the environment 2.5.3 Reaction of a level 2.5.4 Simulation algorithm
0non-cybersec
arXiv
[Update] My [16/F] English teacher [30?M] said we were lovers in a past life.. Post from last time: http://ud.reddit.com/r/relationships/comments/307vup/my_16f_english_teacher_30m_said_we_were_lovers_in/ So I have an update for everyone, but it's probably going to be disappointing. To start with, I live in a real small ma and pop town, where everyone knows everyone. Heck my graduating class is only going to be 60 students tops. I don't have the best relationship with my dad (moms out of the picture) and it's difficult at times to talk to him. Some people said to go to the Principal but i'm not sure it'll work out. He's barely ever at school and there's rumors that he's a bit of a drunk, so I don't think he'll really care. The councilor is also only ever at school for an hour a day tops, and likes to leave her door open... which coincidentally let's everyone hear what she's talking about with whoever's with her. Nothing stays confidential with her as some of us learned the hard way. So to put it bluntly... all the adults in my life right now kinda suck. I told my teacher that what he said made me feel really uncomfortable and he immediately apologized for it and said he didn't mean to make me feel uncomfortable at all, he even said that he's happily married right now and had only wanted to tell me since I showed such an interest in the discussion over reincarnation and past lives. Afterwards he offered to buy pizza for our group tomorrow (it's about 6 of us all together) as an apology and to help things be less awkward again. He's going to be my teacher prob till I graduate (since he's also a study hall teacher and does work in the library) so I decided to just ignore what he said for now and if he tries anything again i'll just go somewhere else for lunch. I know everyone wants me to report him, but I really don't think it'll do anything, our principal was even arrested once at school and yet he's still here, and I really don't want to be known as the girl that got everyone's favourite teacher fired, I have a hard enough life at school as it is, just the thought of how everyone would react then scares the heck out of me. Sorry everyone, I know this is not what you were expecting... :/ **tl;dr**: I really don't want to become more of a pariah then I already, so i'm just ignoring what he said and will hang out elsewhere if he tries something. Sorry
0non-cybersec
Reddit
Powerful jetski.
0non-cybersec
Reddit
Libreoffice closes multiple windows. <p>I am working with multiple documents in LibreOffice, all are open in separate windows. when I click the exit button, or go to the file menu clicking on "quit", ALL windows close, not just the one I wanted to close.</p> <p>How do I avoid closing ALL windows, and how can I just close one of the windows?</p>
0non-cybersec
Stackexchange
Daily Tech Support Thread - [October 01]. Welcome to the daily Tech Support thread for /r/Apple. Have a question you need answered? Ask away! Please remember to adhere to our rules, which can be found in the sidebar. On mobile? [Here is a screenshot with our rules](https://i.imgur.com/yekEMCO). Join our Discord and IRC chat rooms for support: [Discord](https://discord.gg/apple) [IRC](https://kiwiirc.com/client/irc.snoonet.org/apple?nick=CHANGE_ME) **Note: Comments are sorted by /new for your convenience** Here is an [archive](https://www.reddit.com/r/apple/search?q=title%3A%22Daily+Tech+Support+Thread%22+author%3A%22AutoModerator%22&restrict_sr=on&sort=new&t=all) of all previous "Tech Support" threads. This is best viewed on a browser. If on mobile, type on the searchbar [title:"Daily Tech Support Thread" author:"AutoModerator"] (without the brackets, and including the quotation marks around the title and author.)
0non-cybersec
Reddit
My wife and I normally dont go out to eat because things are tight, but after my grandmother died, my parents invited us out to dinner....
0non-cybersec
Reddit
Questions being posted to /r/Networking. To start I do not mind the questions, I love helping people out. This and /r/sysadmin are my top two threads that I check and read in the morning. I have noticed that there are a lot of home network questions being posted here. I though that this thread was geared toward the enterprise network community? How do you other full time members of this site feel about this shift? Edit/Update: That for all the feedback.
1cybersec
Reddit
Amazon AWS Cognito and Python Boto3 to establish AWS connection and upload file to Bucket. <p>I'm trying to use the AWS cognito service to authenticate and upload a file. I have been provided my regionType, identityPool, AWS account ID, and UnAuthRole. I also know the production and development bucket names.</p> <p>I think I am setting the AWS Access Key and AWS Secret Key... I want to authenticate with cognito and use the results to allow me to do an bucket listing and later a file upload.</p> <p>What am I doing wrong? How can I use the cognito id to establish an S3 connection?</p> <p>Here is my code and the resulting error:</p> <pre><code>#!/usr/bin/python import boto3 import boto #boto.set_stream_logger('foo') import json client = boto3.client('cognito-identity','us-east-1') resp = client.get_id(AccountId='&lt;ACCNTID&gt;',IdentityPoolId='&lt;IDPOOLID&gt;') print "\nIdentity ID: %s"%(resp['IdentityId']) print "\nRequest ID: %s"%(resp['ResponseMetadata']['RequestId']) resp = client.get_open_id_token(IdentityId=resp['IdentityId']) token = resp['Token'] print "\nToken: %s"%(token) print "\nIdentity ID: %s"%(resp['IdentityId']) resp = client.get_credentials_for_identity(IdentityId=resp['IdentityId']) secretKey = resp['Credentials']['SecretKey'] accessKey = resp['Credentials']['AccessKeyId'] print "\nSecretKey: %s"%(secretKey) print "\nAccessKey ID: %s"%(accessKey) print resp conn = boto.connect_s3(aws_access_key_id=accessKey,aws_secret_access_key=secretKey,debug=0) print "\nConnection: %s"%(conn) for bucket in conn.get_all_buckets(): print bucket.name </code></pre> <p>Error:</p> <pre><code> Traceback (most recent call last): File "./test.py", line 32, in &lt;module&gt; for bucket in conn.get_all_buckets(): File "/usr/local/lib/python2.7/dist-packages/boto/s3/connection.py", line 440, in get_all_buckets response.status, response.reason, body) boto.exception.S3ResponseError: S3ResponseError: 403 Forbidden &lt;?xml version="1.0" encoding="UTF-8"?&gt; &lt;Error&gt;&lt;Code&gt;InvalidAccessKeyId&lt;/Code&gt;&lt;Message&gt;The AWS Access Key Id you provided does not exist in our records.&lt;/Message&gt;&lt;AWSAccessKeyId&gt;ASIAILXMPZEMJAVZN7TQ&lt;/AWSAccessKeyId&gt;&lt;RequestId&gt;10631ACFF95610DD&lt;/RequestId&gt;&lt;HostId&gt;PGWDRBmhLjjv8Ast8v6kVHOG3xR8erJRV2ob3/2RmqHXwrg8HCZV578YsNLaoL24Hknr+nh033U=&lt;/HostId&gt;&lt;/Error&gt; </code></pre> <p>This corresponding iOS code works fine:</p> <pre><code>AWSCognitoCredentialsProvider *credentialsProvider = [AWSCognitoCredentialsProvider credentialsWithRegionType:awsCognitoRegionType accountId:awsAccountId identityPoolId:awsCognitoIdentityPool unauthRoleArn:unauthRoleArn authRoleArn:nil]; AWSServiceConfiguration *configuration = [AWSServiceConfiguration configurationWithRegion:awsCognitoRegionType credentialsProvider:credentialsProvider]; .... AWSS3TransferManagerUploadRequest *uploadRequest = [AWSS3TransferManagerUploadRequest new]; uploadRequest.bucket = [ELEEnvironment currentEnvironment].userDataS3Bucket; uploadRequest.key = key; uploadRequest.body = uploadFileURL; [[self uploadTask:uploadRequest] continueWithExecutor:[BFExecutor mainThreadExecutor]... </code></pre> <p>Thanks for any help!</p>
0non-cybersec
Stackexchange
If a private investigator had followed you around today, what's the most suspicious thing he would have seen?.
0non-cybersec
Reddit
What is the difference between nf_conntrack_max and nf_conntrack_expect_max?. <p>I understand what <code>nf_conntrack_max</code> is, but what does <code>nf_conntrack_expect_max</code> actually do? I haven't been able to find an explanation on this anywhere.</p>
0non-cybersec
Stackexchange
Enable hardware virtualization on Dell Studio 1555 laptop. <p>I am trying to enable hardware virtualization on my laptop but I can't find anything in the BIOS. How can I enable hardware virtualization - or does my system not support hardware virtualization?</p>
0non-cybersec
Stackexchange
Danger noodle.
0non-cybersec
Reddit
Video editing software. <p>So I have finally figured out how to record videos without any frame drops and such. Now my problem is the video editing software. <br />So far, every one that I have tried has just not worked. Everyone who has answered questions like mine have said that the best ones to use are openshot and Kdenlive, neither of which are working for me. Openshot crashes frequently and Kdenlive just freezes. <br /></p> <p>What I am looking for is either a way to fix said crashes and freezes, or some other program for editing, that doesn't have to be fancy, as long as it works fine. I don't need any special features, all I need is to be able to cut and merge audio and video.</p>
0non-cybersec
Stackexchange
What is the physical difference between a memory I have from yesterday and the memory of the dream I had last night?. Just a bit of wondering I did while in the shower this morning, basically boiling down to if these two memories are created/stored/processed in similar ways.
0non-cybersec
Reddit
Python str view. <p>I have a huge <code>str</code> of ~1GB in length:</p> <pre><code>&gt;&gt;&gt; len(L) 1073741824 </code></pre> <p>I need to take many pieces of the string from specific indexes until the end of the string. In C I'd do:</p> <pre><code>char* L = ...; char* p1 = L + start1; char* p2 = L + start2; ... </code></pre> <p>But in Python, slicing a string creates a new <code>str</code> instance using more memory:</p> <pre><code>&gt;&gt;&gt; id(L) 140613333131280 &gt;&gt;&gt; p1 = L[10:] &gt;&gt;&gt; id(p1) 140612259385360 </code></pre> <p>To save memory, how do I create an str-like object that is in fact a pointer to the original L? </p> <p><strong>Edit</strong>: we have <code>buffer</code> and <code>memoryview</code> in Python 2 and Python 3, but <code>memoryview</code> does not exhibit the same interface as an <code>str</code> or <code>bytes</code>:</p> <pre><code>&gt;&gt;&gt; L = b"0" * 1000 &gt;&gt;&gt; a = memoryview(L) &gt;&gt;&gt; b = memoryview(L) &gt;&gt;&gt; a &lt; b Traceback (most recent call last): File "&lt;stdin&gt;", line 1, in &lt;module&gt; TypeError: unorderable types: memoryview() &lt; memoryview() &gt;&gt;&gt; type(b'') &lt;class 'bytes'&gt; &gt;&gt;&gt; b'' &lt; b'' False &gt;&gt;&gt; b'0' &lt; b'1' True </code></pre>
0non-cybersec
Stackexchange
Mongoose / MongoDB User notifications scheme suggestions. <p>I was wondering what is the best scheme for user/notifications kind of scenario like the following :</p> <ul> <li>You have multiple users. </li> <li>You have multiple notifications that might be for a single user, for some users or for all users. </li> <li>You need a notification "read" entry in the storage, to know if the user has read the notification or not.</li> </ul> <h3>Option One</h3> <p>Embedded notifications scheme</p> <pre><code>Notifications = new Schema ( { message : String, date : { type : Date, default: Date.now() } read : { type: Boolean, default : false } }); User = new Schema( { username : String, name : String, notifications : [Notifications] }); </code></pre> <p>Pros :</p> <ul> <li>It is very easy to display the data, since calling User.find() will display notifications as array object.</li> </ul> <p>Cons :</p> <ul> <li>When you create a notification for every user, you need to do .push to every embedded Notifications</li> <li>Multiple notifications entries for every user ( multiple data in the database )</li> <li>Giant embedded document ( I read something about &lt;4MB limit of those )</li> <li>Since it is a Embedded Document - ( mongoose DocumentArray ) you can't search or skip. You load every notifications everytime you access user.</li> </ul> <h3>Option Two</h3> <p>Populate (DBRef like) objects</p> <pre><code>Notification = new Schema ({ message : String, date : { type : Date, default : Date.now() } }); UserNotification = new Schema ({ user : { type : Schema.ObjectId, ref : 'User' }, notification : { type : Schema.ObjectId, ref : 'Notification' }, read : { type : Boolean, default : false } }); User = new Schema( { username : String, name : String, notifications : [ { type : Schema.ObjectID, ref : 'UserNotification' } ] }); </code></pre> <p>Pros :</p> <ul> <li>Optimal for queries</li> <li>No duplicate data</li> <li>Supporting large amount of notifications</li> </ul> <p>Cons :</p> <ul> <li>You have 3 collections, instead of one in ( <strong>Option One</strong> has only one collection )</li> <li>You have 3 queries every time you access the collection.</li> </ul> <h3>Questions</h3> <ol> <li>What do you think is the best scheme from those two?</li> <li>Am I missing something or some kind of basic NoSQL knowledge?</li> <li>Can someone propose better scheme?</li> </ol> <p>Thank you, in advance and I'm sorry for the long post, but I think I can't explain it simpler.</p>
0non-cybersec
Stackexchange
Iranian Human Rights Activist Ali Ajami Mysteriously Drowned In Houston Park Lake — Mr. Ajami was an editor of the Iranian Human Rights News Agency (HRANA) which monitors human rights in Iran..
0non-cybersec
Reddit
Trebuchet.
0non-cybersec
Reddit
Why is this a thing?.
0non-cybersec
Reddit
New BROCKHAMPTON video tonight - Kevin Abstract on Twitter.
0non-cybersec
Reddit
Sleeping bag liners, do they really keep you warm?. Hey r/backpacking I am about to purchase a Big Agnes mountain sl sleeping bag. It is rated at 17 degrees, but the bag claims 15. I was also considering buying a sleeping liner, one of the liners at REI weighed about 14 ounces and claimed to add 25 degrees to my bag warmth bringing my total warmth level to -10 degrees (-8 more specifically). I tried the sleeping bag out at Rei and it was pretty warm but I have a really hard time believing that a fairly normal downtek sleeping bag with a polyester lining could keep me comfy in temperatures that would otherwise kill me in less than an hour. Does anyone have any expierence with this? Am I being naive here?
0non-cybersec
Reddit
History had lessons for humanity - the writings were on the wall. Covid 19 compared with past pandemics.
0non-cybersec
Reddit
Why do people tell me not to use VLANs for security?. <p>As per title, why do people tell me not to use VLANs for security purposes?</p> <p>I have a network, where a have a couple of VLANS. There is a firewall between the 2 VLANs. I am using HP Procurve switches and have made sure that switch-to-switch links accept tagged frames only and that host ports don't accept tagged frames (They are not "VLAN Aware"). I've also made sure that the native VLAN (PVID) of the trunk links are not the same as either of the 2 host VLANs. I've also enabled "Ingress Filtering". Furthermore, I've made sure that host ports are only members of a single VLAN, which is the same as the PVID of the respective port. The only ports which are members of multiple VLANs are the trunk ports.</p> <p>Can someone please explain to me why the above isn't secure? I believe I've addressed the double tagging issue..</p> <p>Thanks</p> <p>Update: Both switches are Hp Procurve 1800-24G</p>
0non-cybersec
Stackexchange
Fitting a model in R, Least squares estimates. <p>$ \Bbb E$(grades) = $\bigg(\alpha$, teacher='Female',</p> <p>and,</p> <p>$\bigg( \alpha+\beta $, teacher='Male'</p> <p>given that I have loaded up the required data, how should I go about fitting this model in R? Then I need to find the least squared estimates of both $\alpha$ and $\beta$ which I think I will be able to do once I can fit the model. Thanks!</p>
0non-cybersec
Stackexchange
[DISCUSSION] Travis Scott - Birds in the Trap Sing McKnight (one year later). - Where do you guys rank this album? - What are your hopes for the next album(s) this year?
0non-cybersec
Reddit
I'd like some input on my current investments. I feel like I could/should be doing better!. So currently here's what I've got: * [FID FREEDOM K 2045](https://www.google.com/finance?q=MUTF:FFKGX&ei=DrXbU4PZDM69rAGI2YGwDg) (Prior employer 401k): **$78,582** * [FA FREEDOM 2045 T](https://www.google.com/finance?q=MUTF:FFFTX&ei=DrXbU4PZDM69rAGI2YGwDg) (Prior employer 401k, T Class): **$723** * [Vanguard Target Retirement 2045 Fund VTIVX](https://www.google.com/finance?q=MUTF:VTIVX&ei=DrXbU4PZDM69rAGI2YGwDg) (Self-done): **$4,886** 1. Should I roll over my prior 401k (the large one) to the Vanguard fund? 2. Is the Freedom '45 fund a good pick for me? (I'm 32, so I figured that was my target date for retirement) 3. What's the difference between my two Freedom funds, the "T" class etc? I feel like that fund is under performing consistently. I also would love some input about savings/investing ratios...specific to my situation. I'm just recently employed again after a 2 month unemployment stint. Plan on monthly contributing to the Vanguard again. * I pull in $6800 after tax per month. $1700 weekly, $3400 biweekly. * Only real expenses are gas, (usually $50 a week), cellphone ($80 a month), and entertainment which is usually $3-400 a month. * I'm currently wanting/trying to save for a wedding and also a down payment on a place etc. Maybe 1-2k a month split between. I doubt I'll buy to own for a few years yet. * I want to put $500-750 in the Vanguard monthly. * I'm not eligible for company 401k yet, beginning of October I will be and will contribute to match.
0non-cybersec
Reddit
Lived here for 2 years - no friends. New roomate been here 2 days -he got invited and out partying right now. Fml. Every friday/Saturday night on the bus I always see fellow college students laughing with their group of friends and dressed in their party clothes heading out to a good time while I'm sitting there alone after spending all day alone after spending all year alone, like I've done for over 2 years. Over summer most college students went home so I didnt see the crowd of party goers but now that schools about to start up again I'm starting to see them return and it's just straight up depressing. My roomate was a stranger I got off craigslist who lived in a different city but he is having no problems whatsoever making friends. Depressing af
0non-cybersec
Reddit
Passing along wisdom.
0non-cybersec
Reddit
Dani Alves: "I am very happy to join Juventus. I want to win in Europe and in Italy. I have won a lot of trophies with Barcelona, but the time has come to enjoy Italy and to try to bring Juventus back to the European top.".
0non-cybersec
Reddit
IT: Scenes from the book that weren't in the 90's miniseries you hope are in the new movie. No, not THAT scene! Now that that's cleared up: One scene I love most in the book is when Bill and Richie go to check out Eddie's story about the leper. In the coal cellar they encounter the teenage werewolf which Richie is able to subdue with sneezing powder. They then are both able to escape on Silver. When clear of the home and the werewolf, both Bill and Richie begin crying and hug each other for comfort. Specifically mentioned is that even Richie, who has something wise to say about any situation, is simply left in tears. Two friends holding each other in an empty street - one of the best scenes in the book that really shows the friendship of the losers.
0non-cybersec
Reddit
I was only defrosting it sir...
0non-cybersec
Reddit
Can I take a double exposure with an automatic film SLR?. I have an SLR camera that is probably from the 90's. That means it automatically loads film and automatically brings the next blank negative after a picture has been taken. That being said, I was wondering if there is any way to take a double exposure with this type of SLR? *Edit: It is a Pantex zx-50
0non-cybersec
Reddit
Stop re-iterating over duplicates in nested for loop. <p>I'm working with a JavaScript canvas, and I'd like to recreate quite a common effect I've seen where moving particles create lines between them when then get close to each other.</p> <p>My issue is that I'm essentially performing two loops inside each other. Please see pseudo code:</p> <pre><code>var particles = [ /* array of particles with x and y values */ ] for(var i = 0; i &lt; particles.length; i ++){ for(var j = 0; j &lt; particles.length; j ++){ // check if j is close to i // if so, draw a line between them } } </code></pre> <p>First of all I found that this would double check one particle against itself. So I can add:</p> <pre><code> if(i == j) continue </code></pre> <p>But then actually, I need a further case. For instance, if I have already checked when <code>i = 1</code> and <code>j = 8</code>, I don't need to check when <code>j = 1</code> and <code>i = 8</code></p> <p>Is there a common method of simplifying this checking procedure? I'm losing a fair bit of performance with the multiple checks.</p>
0non-cybersec
Stackexchange
A minimalist alternative to the Timex weekender.. The Timex weekender is nice and minimalist, I was almost going to buy it but my mum wanted to get me a late birthday present since I wasn't around at the time, so instead I now have a [Mondaine](http://www.mondaine.com/mondaine/), based heavily on Swiss railway clocks. Not too expensive either! and fits with the clean look that some call "the MFA uniform" so I thought I'd bring it to everyone's attention just in case they hadn't seen it before. http://i.imgur.com/J6gDZ.jpg
0non-cybersec
Reddit
Star Wars Episode 7 Stormtrooper Helmet Designs.
0non-cybersec
Reddit
The same anonymous Redditor who donated $3700 to the American Cancer Society just donated $5000 to r/atheism's Doctor's Without Borders fund!. This guy's two posts make me proud to be a part of Reddit :) We have [RandomKindness](http://www.reddit.com/user/RandomKindness) to thank! This was the [original donation to the American Cancer Society.](http://www.reddit.com/r/reddit.com/comments/enffi/redeeming_myself_i_am_a_kidney_donor_i_always/c19hg8v?context=3) This is the post where he [helped r/atheism hit their $42,000 christmas goal.](http://www.reddit.com/r/atheism/comments/eojq6/a_big_thanks_to_whoever_gave_a_1500_donation_to/c19pj5l?context=3) And this is the [First Giving donation page](http://www.firstgiving.com/rAtheism) to prove it!
0non-cybersec
Reddit
How to use async_work_group_copy in OpenCL?. <p>I would like to understand how to correctly use the async_work_group_copy() call in OpenCL. Let's have a look on a simplified example:</p> <pre><code>__kernel void test(__global float *x) { __local xcopy[GROUP_SIZE]; int globalid = get_global_id(0); int localid = get_local_id(0); event_t e = async_work_group_copy(xcopy, x+globalid-localid, GROUP_SIZE, 0); wait_group_events(1, &amp;e); } </code></pre> <p>The reference <a href="http://www.khronos.org/registry/cl/sdk/1.0/docs/man/xhtml/async_work_group_copy.html">http://www.khronos.org/registry/cl/sdk/1.0/docs/man/xhtml/async_work_group_copy.html</a> says "Perform an async copy of num_elements gentype elements from src to dst. The async copy is performed by all work-items in a work-group and this built-in function must therefore be encountered by all work-items in a workgroup executing the kernel with the same argument values; otherwise the results are undefined."</p> <p>But that doesn't clarify my questions...</p> <p>I would like to know, if the following assumptions are correct:</p> <ol> <li>The call to async_work_group_copy() must be executed by all work-items in the group.</li> <li>The call should be in a way, that the source address is identical for all work-items and points to the first element of the memory area to be copied.</li> <li>As my source address is relative based on the global work-item id of the first work-item in the work-group. So I have to subtract the local id to have the address identical for all work-items...</li> <li>Is the third parameter really the number of elements (not the size in bytes)?</li> </ol> <p>Bonus questions:</p> <p>a. Can I just use barrier(CLK_LOCAL_MEM_FENCE) instead of wait_group_events() and ignore the return value? If so, would that be probably faster?</p> <p>b. Does a local copy also make sense for processing on CPUs or is that overhead as they share a cache anyway?</p> <p>Regards, Stefan</p>
0non-cybersec
Stackexchange
Remove bibliography entry from ToC or change the way it is displayed. <p>I'm using the <code>memoir</code> class and have my document structured by parts which means that the "Bibliography" entry in the Table of Contents are not showing correctly (I guess that it is shown as a chapter instead of as a part). </p> <p>I see two solutions:</p> <ol> <li><p>Remove the entry from the ToC and add a custom entry like</p> <p><code>\addcontentsline{toc}{part}{Bibliography}</code></p></li> <li>Change the way the entry is shown by default</li> </ol> <p>Does anyone know about a solution to this?</p>
0non-cybersec
Stackexchange
Programmers of Reddit, is it better to create a website by learning how HTML and CSS or using something like Adobe Dreamweaver?. I want to make a fairly complex website, so is something like Dreamweaver enough to make a complex design or would it be a better investment to learn HTML or whatever other programming languages are necessary? (If you think the latter, what are some good resources to teach me?)
0non-cybersec
Reddit
Kitty Forman best laugh ever.
0non-cybersec
Reddit
La Música Es Vida, Watercolor and Ink, 9 x 12in.
0non-cybersec
Reddit
Extending a home wireless network using two routers running tomato. <p>I have two <strong>Asus RT-N16</strong> routers each flashed with <strong>Tomato</strong> (actually Tomato USB).</p> <p>UPSTAIRS: <strong>Router 'A'</strong> (located upstairs) is connected to the internet via the WAN port and connected via a LAN port to a 10/100/1000 switch (Switch A). Several desktops are also attached to Switch A. Router A uses IP 192.168.1.<strong>1</strong>. </p> <p>DOWNSTAIRS: I've just acquired <strong>Router 'B'</strong> and set it to IP 192.168.1.<strong>2</strong>. I have a cable running from Switch A downstairs to another switch (Switch B). Tivo, a blu-ray player and a Mac are connected to Switch B. My plan was to connect Router B to Switch B so that I have improved wireless access downstairs. (The wireless signal from Router A gets weak downstairs in a number of locations.)</p> <p>How should I configure Router B so that all devices in the house can see and talk to one another? I know that I need to change DHCP on Router B so that it doesn't cover the same range as DHCP on Router A. Should I be using WDS on the two routers, or is that unnecessary since I already have a wired connection between the two routers? Any other thoughts or suggestions?</p> <p>Thanks! --Jeff</p>
0non-cybersec
Stackexchange
Is Trader Joe's worth the drive with Aldi, Publix, and Target nearby?. My town just got a Trader Joe's within the last year and I've been eyeballing it for awhile, but can never get myself to go, considering it is all the way out towards the beach. (About thirty minutes away.) Is Magic Joe just hype? Or is he worth it?
0non-cybersec
Reddit
Legality of reverse engineering firmware. <p>Not sure if this is the correct place to post this, but I am having some questions regarding the legality of reverse engineering firmware.</p> <p>Specifically, I was looking into the Nintendo 3DS firmware. The EULA clearly states:</p> <blockquote> <p>You may not publish, copy, modify, <strong>reverse engineer</strong>, lease, rent, decompile, or disassemble any portion of the Software, or bypass, modify, defeat, tamper with, or circumvent any of the functions or protections of your Nintendo 3DS, unless otherwise permitted by law.</p> <p>Code of Conduct:</p> <p>To help keep the Network Services friendly and safe for all users, you will not engage in any harmful, illegal, or otherwise offensive conduct, such as:</p> <p>Trying to modify or gain unauthorized access to another person’s Nintendo Device or Network Account or trying to modify, <strong>reverse</strong> <strong>engineer</strong>, or gain unauthorized or automated access to any of Nintendo’s computers, hardware, software, or networks used to provide the Network Services or any feature of a Nintendo Device; </p> <p>Hosting, intercepting, emulating, <strong>reverse engineering</strong>, or redirecting the communication protocols used by Nintendo as part of a Nintendo Device or the Network Services, regardless of the method used to do so; or do anything that might bypass or circumvent measures employed to prevent or limit access to any area, content or code of any Nintendo Device or Network Services (except as otherwise expressly permitted by law);</p> </blockquote> <p>And yet you see blog posts like these: <a href="http://gaasedelen.blogspot.ca/2014/03/depackaging-nintendo-3ds-cpu.html">http://gaasedelen.blogspot.ca/2014/03/depackaging-nintendo-3ds-cpu.html</a></p> <p>My question is, what are the legal implications of reverse engineering the 3DS firmware and posting your finding in a blog post?</p>
1cybersec
Stackexchange
South Carolina Dept of Revenue incident response report: Spear phishing of state employees through email was likely the initial attack vector.
1cybersec
Reddit
Cisco AnyConnect with certificates on Linux. <p>I have a work environment where I am allowed to use my workstation as I want, but I don't have any support for Linux. If anything doesn't work or is broken I have to fix it myself.</p> <p>On Windows we use Cisco AnyConnect as a VPN with <strong>certificates</strong> so we can work from home. Is there a way to copy that certificate on Linux and use it with OpenConnect?</p>
0non-cybersec
Stackexchange
What is one thing you do that you thought everyone else did? I'll start.. This isn't something I did, but my sister. For some reason our friends and us got on the subject of bathroom stories. My sister then admitted that she wipes her ass back to front. She thought that was normal. Everyone told her that it was nasty with comments like "Damn your vagina must smell like shit". What are things you do that you found out no one else does?
0non-cybersec
Reddit
Cursed_november.
0non-cybersec
Reddit
Open maps with specific address iOS 7. <p>I am trying to make my application open the apple maps application and have the address be pulled up. I tried this : </p> <pre><code>- (IBAction)openInMaps:(id)sender { NSString *addressString = @"http://maps.apple.com/?q=1 Infinite Loop, Cupertino, CA"; NSURL *url = [NSURL URLWithString:addressString]; [[UIApplication sharedApplication] openURL:url]; } </code></pre> <p>and this : </p> <pre><code>- (IBAction)openInMaps:(id)sender { NSString *addressString = @"http://maps.apple.com/?q=1_Infinite_Loop,_Cupertino,_CA"; NSURL *url = [NSURL URLWithString:addressString]; [[UIApplication sharedApplication] openURL:url]; } </code></pre> <p>But the button just acts like its hooked to nothing. But this does work : </p> <pre><code>- (IBAction)openInMaps:(id)sender { NSString *addressString = @"http://maps.apple.com/?q=Cupertino,CA"; NSURL *url = [NSURL URLWithString:addressString]; [[UIApplication sharedApplication] openURL:url]; } </code></pre> <p>So, whenever their is a space it doesn't work. How can I open this address?</p>
0non-cybersec
Stackexchange
[Remorse] I love my wife dearly and deeply but am strongly attracted to other younger women, and less to my wife. I wish I could change this. I really wish, I could. But when I make love to my wife I sometimes even have to think about younger women I know to keep hard and get me there. I hate myself for it, because emotionally I am so in love with my wife. But physically, it's hard. What do I do?
0non-cybersec
Reddit
My first hand cut dovetails....
0non-cybersec
Reddit
What should I include in a recipe book for my boyfriend who has never cooked before?. My wonderful boyfriend's cooking experience is limited to using the microwave and the stove top for hard boiled eggs, ramen, and pasta with sauce. He and I agreed he'd learn to cook with me, if I played Smash with him and not criticize the game. For Christmas I'm making him a recipe book with simple things he can cook, ratios for grains and such, cooking temperatures for meat, and small descriptions of certain actions. What does EatCheapAndHealthy think I should include? I'm trying to find healthy recipes that'd he would like, because for the most part he likes comfort food.
0non-cybersec
Reddit
How To Play Rick and Morty Opening!.
0non-cybersec
Reddit
How do you view people who are child free by choice? [Sorry, lots of text!]. I'm nearly 27 and, while I've played with the idea of having kids while in past relationships, I've never felt any real urge to bring a child into my life. In fact, it terrifies me. Especially because I'm a woman, I feel like the majority of the responsibility of raising children would fail mainly on my shoulders and that, if it came down to one of us having to forgo a career or aspects of a current/past lifestyle, it would be me that would have to give up things I enjoy about myself and my life. I don't feel I'd make a good parent as I have very limited patience and don't particularly enjoy the company of kids (save for a select few that I think are pretty rad). Something about the noise, and dirt, and the energy level immediately give me a way shorter fuse and I know that this comes with the territory of being a parent; I don't want to be that mom that's constantly yelling and being mean but I have a feeling that's the mom I'd end up becoming. I'm also terrified by the thought of pregnancy and birth and have been since I was old enough to even have memories - I used to have nightmares about it for years, starting when I was as young as 4 or 5. For these reasons and others, I've decided that the best choice for me in life is to remain childfree and leave parenting to those that both want and enjoy it. I couldn't think of a worse fate for a child than being parented by someone who never really wanted to be a parent in the first place. I think this is a very rational and reasonable choice for me, given these reasons, however, I'm more often than not met with confusion and anger from people who ask if I want kids, when I'll have them, etc. I'm really not sure why I, and every other CF person I've met, get this response from others. I never say anything negative about their kids or their choice to have them (it's their life after all), but people feel the need to belittle my choices when I tell them I don't ever want kids, as if I don't actually have a say in the matter or I'm an evil person for not following a deeply ingrained social norm. I always get "it's a phase" (I don't think a 27 y/o viewpoint is a phase), "you'll change your mind when you have your own/you'll feel different about your own", "who will take care of you when you're old?", "you'll regret it later", or even "you're such a selfish person!". I really don't get this and would really like the opinions of parents on why others feel the need to say this to CF people. I don't think many of us would say "oh you want a baby? you'll regret it later". Because, you know, it's invasive and rude. I'd really like to hear what parents on here think about us CFers and why so many people take such offence to simply wanting to live a full, happy life minus children. I really don't find it all that strange or shocking so I'm confused at all the dislike. This is especially true of r/childfree. I get that some of the people on there can make some pretty ignorant comments but the vast majority of us are on there for intelligent discussion and, more importantly, support (actually a lot of the people making rude comments often get chewed out by other CF users!). I was becoming very depressed about my life and my dating potential because of this choice, considering every man I've ever dated or even met either has or wants kids and I would love a bf to share my time with, but discovering r/childfree changed my life. Just knowing there were others out there that share my choices and support me made a world of difference and helped me feel like less of a social pariah. I'd encourage all reading this to go check out a few of the threads on there and decide for themselves what they think of the sub; as I said there are some jerks and not everyone shares every opinion but I think you'll find that it isn't so bad and that a lot of people on there actually love kids. =) There's even some parents that follow it! Note: Please keep in mind that I haven't called parents 'breeders' or kids 'spawn' or any other derogatory terms, so please don't make comments full of fire and brimstone about how you hate how 'we' call parents and kids that kind of stuff. This is meant to be a serious and thoughtful discussion, not a name calling game. If you disagree with my choices or have an insight to why others do, by all means feel free to share but please let's have a mature atmosphere. =) EDIT: Thanks so much for all the replies, everyone! I was expecting this post to receive a lot of negativity but the response has been overwhelmingly positive and I appreciate the support and understanding very much! Thanks again for participating, have a Happy New Year, r/parenting!
0non-cybersec
Reddit
Days Gone Passes Lifetime Sales of God of War, The Last Guardian in Japan.
0non-cybersec
Reddit
My financial outlook, a few questions, insight is appreciated. . Turning 19 in 3 weeks. I read thru the personalfinance faq, have a few questions on what I should do next. I have a 6 months emergency savings fund. I have no debt whatsoever. I am contributing to my employer's matching 401k, to the max amount they will match me. Should I start up an IRA next? Roth or Traditional? I'm only putting $1000 in my 401k each year, and my employer matches .50c for every dollar I contribute to a max of $1000. So, I've got about $1500 a year going to the 401k. Is that not enough? Should I be throwing more to my 401k, and worry about an IRA when I start making more money? Separate question about saving for short-term goals. I plan on moving out in just under 2 years from now. So, I'd like to be saving for a down payment on a house or money to buy a used car cash. Where's the best place to shelter this money for 2-3 years from now. I'm talking $10,000 to $15,000 in savings over the next few years. edit: I have hardly any expenses besides gas, and insurance, so I have a lot of money to be saving. Thanks
0non-cybersec
Reddit
ACLU releases police monitoring video app. Someone posted on r/protectandserve, which is by the way, an easy site to have comments deleted by mods.
0non-cybersec
Reddit
Since it's Halloween, here's a traditional Irish Jack O'Lantern carved from a turnip..
0non-cybersec
Reddit
John McDowell interview: Avoiding the Myth of the Given and other philosophical thoughts.
0non-cybersec
Reddit
Load UITableView from the bottom. <p>I'm trying to mimic the iMessage bubble text behaviour with an <code>UITableView</code>. In order to always scroll to the bottom I'm using <code>scrollToRowAtIndexPath</code> when <code>viewDidLoad</code> and <code>viewDidAppear</code>. This is because when the <code>viewDidLoad</code> method is called, the table has not been completely loaded, so I need that extra scroll in <code>viewDidAppear</code>. This code makes the trick. However, what I want is not an animated scroll (setting <code>animated</code> to <code>NO</code> does not solve this), I want the table to be displayed always from the bottom, not load the table and then go to the last row. </p> <p>Is this possible? I can't find any solution that fits completely with the desired behaviour.</p>
0non-cybersec
Stackexchange
Is POF (plenty of fish) pretty much a dead app?. I send messages often cause I like to talk to people. Maybe 1% of people respond. Is this just an app where people make a profile and leave? Or am I just not nearly as funny as I think I am?
0non-cybersec
Reddit
Fernando Torres out for rest of the season due to knee injury..
0non-cybersec
Reddit
Reference needed for Hilbert-Schmidt result regarding basis of $V \subset H$. <p>I am seeking a reference that says:</p> <blockquote> <p>If $V \subset H \subset V^*$ is a Gelfand triple with all spaces Hilbert spaces and if $V \subset H$ is a compact embedding, then there is a basis of $V$ which is orthogonal wrt. $V$ and orthonormal wrt. $H$.</p> </blockquote> <p>I know how to prove but I just want something to cite. Anyone have any ideas? I tried the usual sources but had no luck.</p>
0non-cybersec
Stackexchange
Convergence in a Hilbert Space. <p>I have a homework question I am attempting to no avail.</p> <p>Let <span class="math-container">$\mathcal{H}$</span> be a Hilbert space. Let <span class="math-container">$X\subseteq\mathcal{H}$</span> be a convex set. Suppose that <span class="math-container">$(x_{n})_{n\geq 1}$</span> is a sequence in <span class="math-container">$X$</span> such that, <span class="math-container">\begin{align} \lim_{n\rightarrow\infty}\|x_{n}\|=\inf_{x\in X}\|x\|. \end{align}</span> Show that <span class="math-container">$x_{n}$</span> converges in <span class="math-container">$\mathcal{H}$</span>. Is the limit of <span class="math-container">$x_{n}$</span> necessarily in <span class="math-container">$X$</span>?</p> <p>I have tried to show that <span class="math-container">\begin{align} (x_{n}-x|x_{n}-x)\rightarrow 0, \end{align}</span> however I run into issues due to the limit of <span class="math-container">$\|x_{n}\|$</span> being defined as an infimum. In every case when the problem is reduced to <span class="math-container">$\|x_{n}-x\|$</span> I cannot make this go to zero because of the infimum. Also I have not identified the importance of <span class="math-container">$X$</span> being convex, this could also be the point I am missing. If this is the case could you please leave a small hint and allow me to return with more work.</p> <p>EDIT: Is it true that <span class="math-container">$\inf_{x\in X}\|x\|\implies P_{X}(0)$</span>?</p>
0non-cybersec
Stackexchange
Python pairwise comparison of elements in a array or list. <p>Let me elaborate my question using a simple example.I have a=[a1,a2,a3,a4], with all ai being a numerical value. </p> <p>What I want to get is pairwise comparisons within 'a', such as I(a1>=a2), I(a1>=a3), I(a1>=a4), ,,,,I(a4>=a1), I(a4>=a2), I(a4>=a3), where I is a indicator function. So I used the following code.</p> <pre><code>res=[x&gt;=y for x in a for y in a] </code></pre> <p>But it also gives the comparison results like I(a1>=a1),..,I(a4>=a4), which is always one. To get rid of these nuisance, I convert res into a numpy array and find the off diagonal elements.</p> <pre><code>res1=numpy.array(res) </code></pre> <p>This gives the result what I want, but I think there should be more efficient or simpler way to do pairwise comparison and extract the off diagonal element. Do you have any idea about this? Thanks in advance.</p>
0non-cybersec
Stackexchange
Are there any action filters in your project you feel are a must-have?. <p>I'm still not totally clear on why I would need to build custom action filters. Maybe a couple examples would help.</p> <p>Are there any action filters in your project that you feel are a must-have? Maybe even so important that you re-use them across all your MVC projects?</p>
0non-cybersec
Stackexchange
Kit Harington Is Totally Unrecognizable Without His Beard.
0non-cybersec
Reddit
$L^2(\Omega)/\Bbb{R}$ in cited reference?. <p>The following is a theorem in the preliminary material section of Constantin and Foias's "Navier-Stokes Equations": </p> <blockquote> <p>Let $\Omega\subset\Bbb{R}^n$ be an open bounded set with locally Lipschitz boundary. </p> <ul> <li><p>If a distribution $p\in D'(\Omega)$ has all its first derivatives $D_ip$ in $L^2(\Omega)$ then $p\in L^2(\Omega)$ and $$ \|p\|_{L^2(\Omega)/\Bbb{R}}\leq C(\Omega)\|\nabla p\|_{L^2(\Omega)^n} $$</p></li> <li><p>If a distribution $p$ has all its first derivatives in $H^{-1}(\Omega)$ then $p\in L^2(\Omega)$ and $$ \|p\|_{L^2(\Omega)/\Bbb{R}}\leq C(\Omega)\|\nabla p\|_{H^{-1}(\Omega)^n} $$</p></li> </ul> <p>In both cases, if no restriction is imposed on $\partial\Omega$ it follows that $p\in L_{\hbox{loc}}^2(\Omega)$. By $\|p\|_{L^2(\Omega)/\Bbb{R}}$ we mean $$ \inf_{c\in\Bbb{R}}\|p-c\|_{L^2(\Omega)}= \|p-\frac{\int_\Omega p \ dx}{|\Omega|}\cdot 1\|_{L^2(\Omega)}. $$</p> </blockquote> <p>The space $L^2(\Omega)/\Bbb{R}$ defined in the theorem looks quite strange to me (since the notation usually suggests a quotient space). Could anyone come up with a cited reference about this space?</p>
0non-cybersec
Stackexchange
Appending an std::list into an vector of std::list. <p>I have a vector which is a collection of the list and that list is collection of ints. Like:</p> <pre><code>std::vector&lt;std::list&lt;int&gt; &gt; vec; </code></pre> <p>I am trying to append an std::list at an index of std::vector.</p> <p>Please consider this code:</p> <pre><code>#include&lt;iostream&gt; #include&lt;list&gt; #include&lt;vector&gt; namespace NM { std::vector&lt;std::list&lt;int&gt; &gt; vec; class CC { public: static void func(); }; } void NM::CC::func() { std::list&lt;int&gt; l1; l1.push_back(1); l1.push_back(2); l1.push_back(3); l1.push_back(4); std::copy(l1.begin(), l1.end(), NM::vec.at(0).end()); // NM::ccInfo[0] = l1; } int main() { NM::vec.resize(2); NM::CC::func(); int index = 0; for (; index != 1; index++) { std::list&lt;int&gt; l2 = NM::vec.at(index); std::list&lt;int&gt;::iterator it = l2.begin(); for (; it != l2.end(); ++it) { std::cout &lt;&lt; "Int = " &lt;&lt; *it &lt;&lt; std::endl; } } } </code></pre> <p>I am expecting that it should append the list(l1) to NM::vec.at(0) inside func function, if anything already exists at MM::vec.at(0) exists. Another expection is that I should be able to get this information it inside main function. I do not see any output in main function.</p> <p>Where did my expectation go wrong?</p>
0non-cybersec
Stackexchange
ICC Images from an iPSC Derived Neural Progenitor Cell Culture.
0non-cybersec
Reddit
Is it okay to just secure (using SSL) the login page, but not the rest of the site?. <blockquote> <p><strong>Possible Duplicate:</strong><br> <a href="https://security.stackexchange.com/questions/258/what-are-the-pros-and-cons-of-site-wide-ssl-https">What are the pros and cons of site wide SSL (https)?</a> </p> </blockquote> <p>I'm creating a custom PHP/MySQL CMS for a client (because Wordpress is overkill for this client's particular needs). Now, I know this client uses a public wi-fi location quite a bit, so here's the question.</p> <p>Say the CMS is located at <a href="http://customcms123.com" rel="nofollow noreferrer">http://customcms123.com</a> and the login page is located at <a href="http://customcms123.com/admin" rel="nofollow noreferrer">http://customcms123.com/admin</a></p> <p>Does it make sense to encrypt just the login page, i.e. ? So once the user authenticates and goes to another page, say contact, it would look like <a href="http://customcms123.com/admin/contact.php" rel="nofollow noreferrer">http://customcms123.com/admin/contact.php</a> (not httpS in this case).</p> <p>Is it possible for a packet sniffer (or any other tool) to detect the login credentials once the user has logged in? To rephrase the question, is it sufficient to secure just the login page?</p> <p>I'm not a network guy, so I'm not sure what data gets transmitted over a public wi-fi as seen from a sniffing tool and what not.</p>
0non-cybersec
Stackexchange
This needs to stop.
0non-cybersec
Reddit
What does this symbol mean in the following equation?. <p><a href="https://i.stack.imgur.com/btC6j.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/btC6j.png" alt="enter image description here"></a></p> <p>$\Psi = \Psi(\mathbf{F})$ is a function of <strong>F</strong>, and $\mathbf{F}$ is a matrix.</p> <p>$\mathbf{R}$ is matrix; $\lambda, \mu$ is scalar; $J = \mathrm{det}(\mathbf{F})$ </p>
0non-cybersec
Stackexchange
Reducing work in progress - should anyone really pick up any task?. <p>I'm in a Scrum environment, and we get feedback from the PO that all stories should be closed that are currently in progress before bringing in more stories. The goal is reducing WIP and getting stories accepted, which is a good goal. But would it really be wise to have, for instance, a DBA run a manual test script in order to close a particular story, when the part timer who does various "grunt" tasks will be available tomorrow? It seems this is the direction our PO wants to head in, but seems inefficient to me. What happens is that tomorrow the part timer is available, but there are no tasks for them, the only outstanding ones being "above their pay grade". </p> <p>So it seems like a tension between reducing WIP and yet having people work on things that "make sense". Do you find its better for the team to have anyone work on any task? Or do you keep work open longer in order to have certain people do what they do best?</p>
0non-cybersec
Stackexchange
Can I update Ubuntu with active users logged in?. <p>I would like to run apt-get dist-upgrade, but I don't know how this will affect the currently logged in users. How can I find out:<br> 1. will a restart be required<br> 2. will the system be stable/functional until the restart if required (<a href="https://wiki.ubuntu.com/SoftwareUpdates#After_installing" rel="nofollow noreferrer">this page</a> implies that there are times when the server will become non-functional until the restart)<br> 3. will users have to log out before I run apt for updates to succeed </p>
0non-cybersec
Stackexchange
Lincolnshire Council forced to use pen and paper after ransomware attack.
1cybersec
Reddit
[Fluff] How has your dog positively changed your life?. Before getting a dog I always felt weird about going on walks and hikes by myself. I love nature and being outside, and now I always have a hiking and walking buddy. As a result of walking with my dog every day I've seen plenty of people who walk by themselves, and on a recent vacation without my dog I didn't feel weird at all going for a solo walk. How has your dog changed your life for the better?
0non-cybersec
Reddit
Setting up JUnit with IntelliJ IDEA. <p>Familiar with Java but unfamiliar with IntelliJ, how does one "get started" with JUnit integration?</p> <p>Inspired by <a href="https://stackoverflow.com/questions/4183021/looking-for-a-tutorial-on-using-junit-with-intellij-idea-9-x">Looking for a tutorial on using JUnit with Intellij IDEA 9.x</a> which didn't answer my questions and was for an older version of IntelliJ.</p>
0non-cybersec
Stackexchange
Hey Reddit! I've just finished cloning the first of many copies of myself. Check him out!.
0non-cybersec
Reddit
Why is Cholesky factorization numerically stable. <p>It's often stated (eg: in Numerical Recipes in C) that Cholesky factorization is numerically stable even without column pivoting, unlike LU decomposition, which usually need pivoting schemes.</p> <p>But I've never seen a proof or argument for why that's true. Does it have to do with the matrix class it works on being Positive Definite? If you LU decompose Positive Definite matrices without pivoting is it still numerically unstable?</p>
0non-cybersec
Stackexchange
‫ عاصفة العصافير‬.
0non-cybersec
Reddit
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
What is the difference between PXE and Wake-on-LAN (WoL)?. <p>They seem to serve the same purpose which is the ability to boot a client/machine as long as it's connected to a network and thus has a <a href="http://en.wikipedia.org/wiki/Network_interface_controller" rel="nofollow noreferrer">NIC</a>.</p> <p>What is the difference between the two with respect to how they work?</p> <p>Is there a clear advantage of using WoL (Wake-on-LAN) over PXE (Preboot eXecution Environment) or vice versa?</p> <p>Also, both WoL and PXE are OS-agnostic, right?</p>
0non-cybersec
Stackexchange
Texan schoolgirl expelled for refusing to wear RFID tag.
0non-cybersec
Reddit
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
Using secure proxies with Google Chrome. <p>Whenever I use a secure proxy with Google Chrome I get <code>ERR_PROXY_CERTIFICATE_INVALID</code>, I tried a lot of different scenarios and versions.</p> <h1>The certificate</h1> <p>I'm using a self-signed certificate:</p> <pre><code>openssl genrsa -out key.pem 1024 openssl req -new -key key.pem -out request.pem openssl x509 -req -days 30 -in request.pem -signkey key.pem -out certificate.pem </code></pre> <p><strong>Note:</strong> this certificate works (with a warning since it's self-signed) when I try to setup a simple HTTPS server.</p> <h1>The proxy</h1> <p>Then I start a secure proxy on <code>localhost:8080</code>. There are a several ways to accomplish this, I tried:</p> <ul> <li>a custom <a href="http://nodejs.org/" rel="nofollow noreferrer">Node.js</a> script;</li> <li><a href="https://www.stunnel.org" rel="nofollow noreferrer">stunnel</a>;</li> <li><a href="https://github.com/igrigorik/node-spdyproxy" rel="nofollow noreferrer">node-spdyproxy</a> (OK, this involves SPDY too, but later... the problem is the same);</li> <li>[...]</li> </ul> <h1>The browser</h1> <p>Then I run Google Chrome with:</p> <pre><code>google-chrome --proxy-server=https://localhost:8080 http://superuser.com </code></pre> <p>to load, say, <code>http://superuser.com</code>.</p> <h1>The issue</h1> <p>All I get is:</p> <pre><code>Error 136 (net::ERR_PROXY_CERTIFICATE_INVALID): Unknown error. </code></pre> <p>in the window, and something like:</p> <pre><code>[13633:13639:1017/182333:ERROR:cert_verify_proc_nss.cc(790)] CERT_PKIXVerifyCert for localhost failed err=-8179 </code></pre> <p>in the console.</p> <p><strong>Note:</strong> this is not the big red warning that complains about insecure certificates.</p> <hr> <p>Now, I have to admit that I'm quite <em>n00b</em> for what concerns certificates and such, if I'm missing some fundamental points, please let me know.</p>
0non-cybersec
Stackexchange
Representations as a sum of cubes following Jacobi. <p>Jacobi connected the generating function counting the number of representations as a square with elliptic trigonometry and use Fourier series to find the exact congruence condition and formula for counting representations as a sum of three squares <a href="http://www.math.osu.edu/~econrad/Jacobi/sumofsq/sumofsq.html" rel="nofollow">[1]</a>.</p> <p>To be precise it was the theta function $$1 + \sum_{n=1}^\infty 2 q^{n^2}$$ </p> <p>I was wondering if it was possible to use this approach on positive cubes $$\sum_{n=1}^\infty q^{n^3}$$ and integer cubes $$\sum_{n=-\infty \ldots \infty} q^{n^3}$$ since there is no useful algebraic object (like the Gaussian integers, quaternions and such) for cubes.</p>
0non-cybersec
Stackexchange
To the person who invented blister packaging: FUCK YOU!. May you fall into a vat of half opened blister packs.
0non-cybersec
Reddit
I need compute a rational limit that involves roots. <p>I need compute the result of this limit without l'hopital's rule, I tried different techniques but I did not get the limit, which is 1/32, I would appreciate if somebody help me. Thanks.</p> <p>$$\lim_{y\to32}\frac{\sqrt[5]{y^2} - 3\sqrt[5]{y} + 2}{y - 4\sqrt[5]{y^3}}$$</p>
0non-cybersec
Stackexchange
Google "GO" Programming Language used by Malware Coders.
1cybersec
Reddit
Dynamic fields in Django Admin. <p>I want to have additional fields regarding value of one field. Therefor I build a custom admin form to add some new fields.</p> <p>Related to the blogpost of jacobian <a href="http://jacobian.org/writing/dynamic-form-generation/" rel="noreferrer" title="blogpost">1</a> this is what I came up with:</p> <pre><code>class ProductAdminForm(forms.ModelForm): class Meta: model = Product def __init__(self, *args, **kwargs): super(ProductAdminForm, self).__init__(*args, **kwargs) self.fields['foo'] = forms.IntegerField(label="foo") class ProductAdmin(admin.ModelAdmin): form = ProductAdminForm admin.site.register(Product, ProductAdmin) </code></pre> <p>But the additional field 'foo' does not show up in the admin. If I add the field like this, all works fine but is not as dynamic as required, to add the fields regarding the value of another field of the model</p> <pre><code>class ProductAdminForm(forms.ModelForm): foo = forms.IntegerField(label="foo") class Meta: model = Product class ProductAdmin(admin.ModelAdmin): form = ProductAdminForm admin.site.register(Product, ProductAdmin) </code></pre> <p>So is there any initialize method that i have to trigger again to make the new field working? Or is there any other attempt?</p>
0non-cybersec
Stackexchange
We’re recognising, rewarding and inspiring journalists all over the globe.
1cybersec
Reddit
MRW when my friend tells an offensive joke.
0non-cybersec
Reddit
Trying to connect Microsoft QnA maker service with Bot Framework but not getting any reply from my bot. <pre><code>Bot Framework Emulator [18:48:31] -&gt; POST 202 [conversationUpdate] [18:48:31] -&gt; POST 202 [conversationUpdate] [18:48:36] -&gt; POST 202 [message] hello [18:48:37] Warning: The Bot Framework State API is not recommended for production environments, and may be deprecated in a future release. Learn how to implement your own storage adapter. [18:48:37] &lt;- GET 200 getPrivateConversationData [18:48:37] &lt;- GET 200 getUserData [18:48:37] &lt;- GET 200 getConversationData [18:48:37] &lt;- POST 200 setPrivateConversationData [18:48:37] &lt;- POST 200 Reply[event] Debug Event </code></pre> <p>I'm new to Microsoft bot framework, trying to build basic bot using QnA maker</p> <p>But I got stuck in connecting QnA maker service with <code>app.js</code>.</p> <p>Not getting the response from QnA maker.</p> <pre><code>$ nodemon app.js [nodemon] 1.17.5 [nodemon] to restart at any time, enter `rs` [nodemon] watching: *.* [nodemon] starting `node app.js` restify listening to http://[::]:3978 WARN: ChatConnector: receive - emulator running without security enabled. ChatConnector: message received. WARN: ChatConnector: receive - emulator running without security enabled. ChatConnector: message received. WARN: ChatConnector: receive - emulator running without security enabled. ChatConnector: message received. The Bot State API is deprecated. Please refer to https://aka.ms/I6swrh for details on how to replace with your own storage. UniversalBot("*") routing "hello" from "emulator" Session.beginDialog(/) / - Session.sendBatch() sending 0 message(s) The Bot State API is deprecated. Please refer to https://aka.ms/I6swrh for details on how to replace with your own storage. </code></pre> <p><strong>app.js</strong></p> <pre><code>const restify = require('restify'); const builder = require('botbuilder'); const cognitiveServices = require('botbuilder-cognitiveservices'); //connecting to server const server = restify.createServer(); server.listen(process.env.port || process.env.PORT || 3978, function () { console.log('%s listening to %s',server.name,server.url); } ); const connector = new builder.ChatConnector({ appId: process.env.MicrosoftAppId, appPassword: process.env.MicrosoftAppPassword }); //listening post from server server.post('/api/messages', connector.listen()); var bot = new builder.UniversalBot(connector); const recognizer = new cognitiveServices.QnAMakerRecognizer({ knowledgeBaseId: "ffek8d39-dldc-48df-a9db-d902efc18cda", subscriptionKey: "881jc9eb-1a5b-4a10-bi89-233afh83ce98", }); const qnaMakerDialog = new cognitiveServices.QnAMakerDialog({ recognizers: [recognizer], defaultMessage: "Sorry I don't understand the question", qnaThreshold: 0.4, }); bot.dialog('/', qnaMakerDialog); </code></pre>
0non-cybersec
Stackexchange
I'm a queer atheist and my homophobic conservative Christian father has no idea. Whenever I go to my father for advice all he does is tell me to read the Bible. He would probably disown me if he knew I wasn't straight since he has already disowned my sister. I have no idea how he would react to me being an atheist. Part of me thinks finding out everything might actually affect his health. So, I decided several years ago to never tell him anything.
0non-cybersec
Reddit
LensRentals autofocus articles series continues: Age matters..
0non-cybersec
Reddit
XFCE hangs with hand cursor. <p>I am using Xubuntu 12.04 in a remote environment. Of late, I am observing that sometimes the cursor turns into a hand and stops responding. I cannot do anything to fix it.</p> <p>The only solution seems to be to terminate the XFCE session and re-login.</p> <p>I am observing this when using a remote connection. Anyone seen this or know a solution or workaround? I am just frustrated with this problem coming up every so often.</p> <p>The LD_PRELOAD method doesn't seem to work for me. Is there a command line way to generate <code>AllowDeactivateHold</code>?</p> <p>Can we use <code>xinput</code> to create the effect of <code>AllowDeactivateHold</code>?</p>
0non-cybersec
Stackexchange