text
stringlengths 3
1.74M
| label
class label 2
classes | source
stringclasses 3
values |
---|---|---|
Vagrant xenial64 NFS synced dir 'preserve permissions' failure on bcrypt build. <p>Looking for help on what extra configuration I can set to allow my ubuntu virtualbox vm to write into the NFS synced project directory on my OSX host. I've set the explicit sudoers for vagrant in macOS so it shouldn't have any issues modifying the host if needed.</p>
<p>End goal is to be able to operate the app's build and dev runtime within ubuntu, while editing the files on the macOS host and the ubuntu box will detect changes and rebuild with gulp as appropriate.</p>
<p>Currently getting an error on <code>npm install</code> for bcrypt when it tries to preserve permissions, but I'm also not sure if this is the root cuase of the full fail.</p>
<p>Cross posted: <a href="https://groups.google.com/forum/#!topic/vagrant-up/LS_eFJhZAwQ" rel="nofollow noreferrer">https://groups.google.com/forum/#!topic/vagrant-up/LS_eFJhZAwQ</a></p>
<p>Vagrantfile:</p>
<pre><code>Vagrant.configure(2) do |config|
config.vm.box = "ubuntu/xenial64"
config.vm.provider "virtualbox" do |v|
v.memory = "3072"
v.customize ["setextradata", :id, "VBoxInternal2/SharedFoldersEnableSymlinksCreate/v-root", "1"]
end
config.vm.define "dev", primary: true do |dev|
dev.vm.hostname = "proteus.dev"
dev.vm.network "private_network", ip: "192.168.10.10"
dev.vm.synced_folder '.', '/home/ubuntu/src/proteus', nfs: true, mount_options:['nolock,vers=3,udp,noatime,actimeo=1']
# also tried 'rw' and other linux__mount_options
end
end
</code></pre>
<p>Error output:</p>
<pre><code>$ npm install bcrypt
> [email protected] install /home/ubuntu/src/proteus/node_modules/bcrypt
> node-pre-gyp install --fallback-to-build
node-pre-gyp ERR! Tried to download(404): https://github.com/kelektiv/node.bcrypt.js/releases/download/v1.0.2/bcrypt_lib-v1.0.2-node-v48-linux-x64.tar.gz
node-pre-gyp ERR! Pre-built binaries not found for [email protected] and [email protected] (node-v48 ABI) (falling back to source compile with node-gyp)
make: Entering directory '/home/ubuntu/src/proteus/node_modules/bcrypt/build'
CXX(target) Release/obj.target/bcrypt_lib/src/blowfish.o
CXX(target) Release/obj.target/bcrypt_lib/src/bcrypt.o
CXX(target) Release/obj.target/bcrypt_lib/src/bcrypt_node.o
SOLINK_MODULE(target) Release/obj.target/bcrypt_lib.node
COPY Release/bcrypt_lib.node
cp: preserving permissions for ‘Release/bcrypt_lib.node’: Operation not permitted
bcrypt_lib.target.mk:134: recipe for target 'Release/bcrypt_lib.node' failed
make: *** [Release/bcrypt_lib.node] Error 1
make: Leaving directory '/home/ubuntu/src/proteus/node_modules/bcrypt/build'
gyp ERR! build error
gyp ERR! stack Error: `make` failed with exit code: 2
gyp ERR! stack at ChildProcess.onExit (/usr/lib/node_modules/node-gyp/lib/build.js:258:23)
gyp ERR! stack at emitTwo (events.js:106:13)
gyp ERR! stack at ChildProcess.emit (events.js:191:7)
gyp ERR! stack at Process.ChildProcess._handle.onexit (internal/child_process.js:215:12)
gyp ERR! System Linux 4.4.0-83-generic
gyp ERR! command "/usr/bin/nodejs" "/usr/lib/node_modules/node-gyp/bin/node-gyp.js" "build" "--fallback-to-build" "--module=/home/ubuntu/src/proteus/node_modules/bcrypt/lib/binding/bcrypt_lib.node" "--module_name=bcrypt_lib" "--module_path=/home/ubuntu/src/proteus/node_modules/bcrypt/lib/binding"
gyp ERR! cwd /home/ubuntu/src/proteus/node_modules/bcrypt
gyp ERR! node -v v6.11.0
gyp ERR! node-gyp -v v3.6.2
gyp ERR! not ok
node-pre-gyp ERR! build error
node-pre-gyp ERR! stack Error: Failed to execute '/usr/bin/nodejs /usr/lib/node_modules/node-gyp/bin/node-gyp.js build --fallback-to-build --module=/home/ubuntu/src/proteus/node_modules/bcrypt/lib/binding/bcrypt_lib.node --module_name=bcrypt_lib --module_path=/home/ubuntu/src/proteus/node_modules/bcrypt/lib/binding' (1)
node-pre-gyp ERR! stack at ChildProcess.<anonymous> (/home/ubuntu/src/proteus/node_modules/node-pre-gyp/lib/util/compile.js:83:29)
node-pre-gyp ERR! stack at emitTwo (events.js:106:13)
node-pre-gyp ERR! stack at ChildProcess.emit (events.js:191:7)
node-pre-gyp ERR! stack at maybeClose (internal/child_process.js:891:16)
node-pre-gyp ERR! stack at Process.ChildProcess._handle.onexit (internal/child_process.js:226:5)
node-pre-gyp ERR! System Linux 4.4.0-83-generic
node-pre-gyp ERR! command "/usr/bin/nodejs" "/home/ubuntu/src/proteus/node_modules/.bin/node-pre-gyp" "install" "--fallback-to-build"
node-pre-gyp ERR! cwd /home/ubuntu/src/proteus/node_modules/bcrypt
node-pre-gyp ERR! node -v v6.11.0
node-pre-gyp ERR! node-pre-gyp -v v0.6.32
node-pre-gyp ERR! not ok
Failed to execute '/usr/bin/nodejs /usr/lib/node_modules/node-gyp/bin/node-gyp.js build --fallback-to-build --module=/home/ubuntu/src/proteus/node_modules/bcrypt/lib/binding/bcrypt_lib.node --module_name=bcrypt_lib --module_path=/home/ubuntu/src/proteus/node_modules/bcrypt/lib/binding' (1)
npm WARN optional SKIPPING OPTIONAL DEPENDENCY: fsevents@^1.0.0 (node_modules/chokidar/node_modules/fsevents):
npm WARN notsup SKIPPING OPTIONAL DEPENDENCY: Unsupported platform for [email protected]: wanted {"os":"darwin","arch":"any"} (current: {"os":"linux","arch":"x64"})
npm ERR! Linux 4.4.0-83-generic
npm ERR! argv "/usr/bin/nodejs" "/usr/bin/npm" "install" "bcrypt"
npm ERR! node v6.11.0
npm ERR! npm v3.10.10
npm ERR! code ELIFECYCLE
</code></pre>
| 0non-cybersec
| Stackexchange |
Microsoft.ReportViewer.Common Version=12.0.0.0. <p>I'm getting the following exception in my Windows Service Application:</p>
<blockquote>
<p>System.IO.FileNotFoundException: Could not load file or assembly
'Microsoft.ReportViewer.Common, Version=12.0.0.0, Culture=neutral,
PublicKeyToken=89845dcd8080cc91' or one of its dependencies. The
system cannot find the file specified.</p>
</blockquote>
<p>I cannot find a download url for version 12 and setting the files to "Include" and "Prequisite (Auto)" does not solve the problem in this Windows Service Application, although it works fine in my WinForms Application and results in the appropriate files being included and referenced along with all other requisite .DLLs.</p>
<p>Can someone either help me get this Windows Service Application to include the files, or lead me to a download link that will install Version 12 in the GAC?</p>
| 0non-cybersec
| Stackexchange |
ImportError: No module named 'pymongo'. <p>I have a problem running pymongo on Win 7 (64) with Python 3.4, mongodb 4.2.10.
The error output is as follows:</p>
<pre><code>import pymongo
ImportError: No module named 'pymongo'
</code></pre>
<p>The code is pretty simple:</p>
<pre><code>import pymongo
from pymongo import MongoClient
client=MongoClient()
db=client.test_db
dict={'A':[1,2,3,4,5,6]}
db.test_collection.insert(dict)
to_print=db.test_collection.find()
print(to_print)
</code></pre>
<p>I tried already re-installing Python and MongoDB - did not help. It works when I do it manually in cmd, i.e. mongod.exe and mongo.exe work fine. It appears there is problem with pymongo, but I don't know how to fix it.</p>
| 0non-cybersec
| Stackexchange |
On time and consistency in multi-level
agent-based simulations
Gildas MORVAN, Yoann KUBERA
http://www.lgi2a.univ-artois.fr/~morvan/
[email protected]
Univ. Artois, EA 3926,
Laboratoire de Génie Informatique et d’Automatique de l’Artois (LGI2A)
Béthune, France
Abstract
The integration of multiple viewpoints became an increasingly popular ap-
proach to deal with agent-based simulations. Despite their disparities, recent ap-
proaches successfully manage to run such multi-level simulations. Yet, are they
doing it appropriately?
This paper tries to answer that question, with an analysis based on a generic
model of the temporal dynamics of multi-level simulations. This generic model is
then used to build an orthogonal approach to multi-level simulation called SIMI-
LAR. In this approach, most time-related issues are explicitly modeled, owing to
an implementation-oriented approach based on the influence/reaction principle.
Keywords: multi-level agent-based modeling, large-scale simulation
Introduction
Simulating complex systems often requires the integration of knowledge coming from
different viewpoints (e.g. different application fields, different focus points) to obtain
relevant results. Yet, the representations of the agents, the environment and the tem-
poral dynamics in regular multi-agent based simulation meta-models are designed to
support a single viewpoint. Therefore, they lack the structure to manage the integra-
tion of such systems, called multi-level simulations.
1
ar
X
iv
:1
70
3.
02
39
9v
1
[
cs
.M
A
]
7
M
ar
2
01
7
http://www.lgi2a.univ-artois.fr/~morvan/
Managing multiple viewpoints on the same phenomenon induces the use of het-
erogeneous time models, thus raising issues related to time and consistency. Multi-
Level Agent-based Modeling (ML-ABM) is a recent approach that aims at extending
the classical single-viewpoint agent-based modeling paradigm to cope with these issues
and create multiple-viewpoints based simulations [1, 2, 4, 6, 7, 9, 11, 12]. Considering
the disparities between the various ML-ABM approaches, a natural question comes
to mind: is there a "right" way to do ML-ABM?
In this context, the aim of this paper is double. We first aim at eliciting the is-
sues and simulation choices underlying such simulations, with an analysis based on
a generic model of the temporal dynamics of a multi-level simulation. Then, we
present SIMILAR, a ML-ABM approach using the influence/reaction principle to
manage explicitly the issues related to the simultaneous actions of agents in multiple
levels [3, 8, 10].
1 Temporal dynamics in Multi-level simulations
In this section some issues related to multi-level simulation are emphasized using a
generic model describing the temporal dynamics of a multi-level simulation.
1.1 General case
From a coarse grain viewpoint, simulation is a process transforming the data about a
phenomenon from initial values into a sequence of intermediate values, until a final
state is reached. This evolution is characterized by: 1) A dynamic state δ(t ) ∈∆mod-
eling the data of the simulation at time t ; 2) A time modelT representing the moments
when each state of the discrete evolution was obtained; 3) A behavior model describ-
ing the evolution process of the dynamic state between two consecutive moments of
the time model.
The exact content of the time model, dynamic state, as well as the behavior model
of a simulation depends on the simulation approach being used. Yet, despite their
disparities, many common points can be identified among them.
First, since real time can be seen as a continuous value, most simulation assume
that T ⊂ R. Moreover, we can assume that a simulation eventually ends. Thus, T
contains an ordered, finite and discrete set of time values t ∈ T. Then, the dynamic
state contains data related to the agents and the environment1.
1.2 Multi-level case
In multi-level simulations, each level embodies a specific viewpoint on the studied
phenomenon. Since these viewpoints can evolve using very different time scales, each
level l ∈L (where L is the set of all levels) has to define its own time model Tl .
1In this paper, we use a simplistic definition of these concepts: an agent is an entity that can perceive data
about itself, the environment and the other agents, possibly memorize some of them and decide to perform
actions
2
The interaction of the levels is possible only by defining when and under which
circumstances interaction is possible. For this purpose, we introduce a multi-level
specific terminology to the temporal dynamics.
1.2.1 Local information
We consider that agents can lie in more than one level at a time. A (t , l ) ∈ Al de-
notes the set of agents of the level l ∈ L at time t ∈ Tl . Since levels can have very
different temporal dynamics, this point has various implications on the structure of
the simulation: 1) Agents have a local state2 φa(t , l ) ∈ Φa,l in each level l ∈L where
they lie; 2) Agents perform decisions differently depending on the level from which
the decisions originates; 3) A level l can only trigger the local behavior of the agents
lying in l .
Similarly, the environment has a local state φω(t , l ) ∈ Φω in each level of the
simulation. Yet, contrary to the agents, the environment is present in each level of
the simulation. Each local state embodies any agent-independent information like a
topology or a state (e.g. an ambient temperature).
1.2.2 Global information
The coherence of agent behaviors in each level can require information like cross-level
plans or any other level-independent information. Therefore, we consider that agents
have a global state3 µa(t ) ∈Ma , which is independent from any level.
1.2.3 Content of a dynamic state
Owing to the abovementioned information, the dynamic state δ(t ) ∈ ∆ of a multi-
level simulation at time t can be defined as the sum of the local dynamic state δ(t , l ) ∈
∆l of each level l ∈L and the global dynamic state δG(t ) ∈∆G containing the global
state of the agents.
∆=∆G ×
∏
l∈L
∆l (1)
∀δ(t ) ∈∆,δ(t ) =
�
δG(t ),
�
δ(t , l )
�
l∈L
�
with δG(t ) ∈∆G∧∀l ∈L,δ(t , l ) ∈∆l (2)
1.2.4 Time model of the simulation
The interaction between levels is possible only if their time models are somehow cor-
related. Since the time model of each level is a discrete ordered set, it is possible to
build an order between their elements.
The time model of a multi-level simulation is defined as the union of the time
models of all the levels: T =
⋃
l∈LTl . For consistency reasons, the time models T
and Tl must have the same bounds. Since T and Tl are ordered, we also define s+d t
(resp. s + d tl ) as the successor of s ∈T (resp. s ∈Tl ).
2Also called "physical state" or "face" in the literature [3, 8, 10, 11]
3Also called "mind", "memory state" or "core" in the literature [3, 8, 10, 11]
3
1.2.5 Consistent and transitory states
In the case where t 6∈ Tl , the level l ∈ L is in a transitory state. No guarantee can
be provided on such a state, since it corresponds to a temporary value used by l to
compute its future consistent dynamic state. On the opposite, the data contained in
the dynamic state of a level l ∈L can be safely read or perceived at times in Tl , where
this state is considered as consistent.
Figure 1: Illustration of a time model, for a simulation using two levels "A" and
"B".The first line represents real time.The second and third line represent the time
model of the levels "A" and "B". The last line represents the time model of the whole
simulation. At t1, the state of the simulation is consistent. At t4, it is half-consistent.
From a global viewpoint, the dynamic state of the simulation is consistent (resp.
transitory) if all of its levels are consistent (resp. transitory). It can also be in an
intermediate situation called half-consistent state, if a level is in a consistent and another
level is in a transitory state. These concepts are illustrated in Figure 1.
To clarify our speech, we writeδ(t ) the consistent (or half-consistent) dynamic state
of the simulation at time t ∈ T and δ(]t , t ′[) the transitory dynamic state of the sim-
ulation between the times t ∈T and t ′ ∈T.
1.3 Multi-level inherent issues
When a simulation is in a transitory phase, each level performs operations in parallel
to determine the next consistent value of their dynamic state. The transitory periods
of the levels are not necessarily in sync. Therefore, each level can be at a different step
of its transitory operations when an interaction occurs. This point raises the follow-
ing time-related issues: 1) Determine on which dynamic states is based the decision
in a level to interact with another level; 2) Determine when to take into considera-
tion the modifications in a level resulting from an action initiated in another level; 3)
Determine how to preserve the consistency of the global state of the agents despite
having its update occurring after the level-dependent perceptions.
4
This section illustrates these issues on an example containing two levels "A" and
"B", presented in Figure 2
Figure 2: Illustration of a subset of a time model containing two levels "A" and "B".
1.3.1 Level interaction through perception
The first issue is related to the perception of the dynamic state of the other levels. It
happens for instance at the time t2 (see fig. 2), when an agent from the level "B" tries
to read information from the level "A". Indeed, since "A" is in a transitory state at
that time, the data being read by the agent might have arbitrary values. Therefore, a
heuristic has to be used to disambiguate that value. For instance using the last consis-
tent dynamic state of the level (in this case the dynamic state of "A" at the time t1),
using the arbitrary values from the transitory state at t2 or anticipating the modifica-
tions that might have occurred in "A" between t1 and t2.
1.3.2 Level interaction through actions
The second issue is related to the side effects of an interaction between two levels. It
happens for instance during the transitory period ]t1, t3[ (see fig. 2) of the level "A",
if an agent from "A" tries to interact with the level "B". Indeed, since both levels have
a different time scale, it is difficult to determine when the actions of "A" have to be
taken for account into the computation of the dynamic state of "B". It can be during
the transitory phases ]t1, t2[, ]t2, t3[ or a later one.
A generic answer to that problem might be "the next time both levels are in sync"
(t3 in this case). Yet, this leads to aberrations like taking into consideration these
actions at the end of the simulation (for instance in fig 1, if an agent from the level
"A" interacts with "B" during the transitory period ]t3, t5[).
1.3.3 Global state update
The third issue is related to the read and write access of the global state of an agent and
the update of that value. Indeed, during the transitory phase of each level, the agent
has to read and possibly update the value of the global states, to take into account the
information that were perceived. Yet, since the perception is relative to each level, the
global state is the subject of the same issues than the interactions between levels.
5
For instance, in figure 2, the period ]t1, t2[ of the simulation is a transitory period
for the level "B" and a subset of the transitory period for the level "A". The latter
raises the question of whether if the global state of the agent at the time t2 has to take
into consideration the data being perceived by the agent from "A" or not. Indeed,
perception might not be complete at that time in "A".
1.4 Differences between multi-level approaches
There is no universal answer to the issues presented in this section, since the coherence
between heterogeneous time scales is itself an ill-defined notion. The main differences
between existing ML-ABM approaches are the way these issues are handled, through
the answer of the following questions about the operations performed during a tran-
sitory phase ]t , t + d t [: 1) Which agents can perform a decision during a transitory
period of a level? 2) How many actions can be performed by the decision process of
an agent? 3) How are committed the results of the action to the future dynamic state
of a level? 4) When are performed these operations during the transitory state? 5)
Which dynamic state of a level k is read by a level l initiating an interaction with k?
A consistent one? A transitory one? Which ones ? 6) When is taken into account the
interaction initiated by a level l with a level k? 7) How is managed the consistency of
the global state of agents?
In the next section, we present an agent-based approach called SIMILAR, that aims
at addressing these issues.
2 SIMILAR
Many meta-models and simulation engines dedicated to ML-ABM have been proposed
in the literature such as IRM4MLS [10], PADAWAN [11], GAMA [5] or NETLOGO
LEVELSPACE [6]. All these approaches provide a different and yet valid answer to the
multi-level simulation issues. In this paper, we do not aim at detailing precisely their
differences: a comprehensive survey of the different approaches can be found in [9].
Existing approaches like GAMA or PADAWAN (Pattern for Accurate Design of
Agent Worlds in Agent Nests) are complete approaches providing various interesting
features respectively including the agentification of emerging structures or the elicita-
tion of interactions between agents. However, these approaches rely on a time model
where the management of the potentially simultaneous actions is strongly constrained
by the sequential execution of agent actions.
In this paper, we investigate another approach where agent actions are separated
from their consequences in the dynamic state of the simulation, using the influence/reaction
principle [3]. The resulting approach, called SIMILAR (SImulations with MultI-Level
Agents and Reactions), is deeply inspired by IRM4MLS [10], a multi-level extension
of IRM4S [8]. The main differences between SIMILAR and IRM4MLS are the more
precise and less misleading terminology and simulation algorithms, as well as a more
precise and implementation-oriented model for the reaction phase (the latter is not
described in this paper due to the lack of space).
6
2.1 Core concepts
SIMILAR revolves around five core concepts: 1) Levels, modeling different view-
points on the simulated phenomenon; 2) Agents lying in one or more levels. From
each level where they lie, they perceive the state of one or more levels to decide how
they wish to influence the evolution of the system; 3) the Environment modeling the
topology, the local information (e.g. temperature) and the natural evolution4 of each
level; 4) Influences modeling actions which effect has yet to be committed to the state
of the simulation; 5) Reactions modeling how the changes depicted by the influences
are committed to the state of the simulation.
We noteL the levels defined for a simulation, I the domain space of all the possible
influences of the simulation and A all possible agents of the simulation.
2.2 Heuristics
SIMILAR relies on the following heuristics and choices to manage the issues raised in
the section 1.4. 1) During the transitory period ]t , t+d tl [ of a level l ∈L, the agents
fromA (t , l ) decide once in parallel; 2) The number of influences produced by each
decision is not constrained; 3) The result of the actions is committed to the future
dynamic state of a level using a reaction mechanism [3] ; 4) During the transitory
period ]t , t+d tl [ of a level l ∈L, the behavior of the agents is triggered slightly after
t and the reaction occurs slightly before t + d tl ; 5) The dynamic state being read by
the behavior of an agent (or of the environment) is always the most recent consistent
state of the level5; 6) The actions emitted by an agent from a level l to a level k during
a transitory period ]t , t+d tl [ are taken into account in the next reaction of k after the
time t (i.e. the reaction occurring during the transitory period containing or starting
with the time t ); 7) The consistency of agent global states is attained by: i) Computing
the revised global state of the agents at the beginning of the transitory period of a level
(i.e. before any reaction); ii) Computing the revised global state of an agent once for
all the levels starting a new transitory period at the same time; iii) Use this revised
global state as the global state of the agent for the next half- consistent state of the
simulation. This approach is summarized in Figure 3
2.3 Dynamic state
In SIMILAR, we consider that each point of view on a phenomenon has to be em-
bodied in a level l ∈ L. As a consequence, the dynamic state δ(t ) of the simulation
is divided in level-specific dynamic states δ(t , l ). Two kind of data can be obtained
from the dynamic state of a level l ∈ L: a state valuation σ(t , l ), defining a valuation
of the level-related properties of the agents (e.g. their location or their temperature) or
the environment (e.g. an ambient temperature) and the state dynamics γ (t , l ), defining
the actions that were still being performed6 in that level during the observation.
4i.e. without the intervention of the behavior of an agent
5Default heuristic of SIMILAR. SIMILAR also allows the definition of user-defined disambiguation
heuristics
6Actions that started before the time t and that will end after the time t
7
Figure 3: Illustration of the operation performed independently in each level (squares)
and joint for all the levels (rectangles) during a simulation. The letters describe the
type of the operation: Perception (P), Global state revision (M), Decision (D) and
Reaction (R). Any arrow starting on a consistent dynamic state at a time t points to
the revised global state used as the new global state of the agents in the half-consistent
dynamic state of the time t . This example focuses on the operations performed in a
simulation containing one agent lying in three levels.
∀l ∈L,∀t ∈Tl ,δ(t , l ) =<σ(t , l ),γ (t , l )> (3)
2.3.1 State valuation
The state valuation σ(t , l ) of a level l ∈ L is the union of the local state of the en-
vironment φω(t , l ) ∈ Φω, containing agent-unrelated information and a local state
7
φa(t , l ) ∈ Φa,l for each agent a ∈A contained in the level.
2.3.2 State dynamics
SIMILAR relies on the influence/reaction principle to model the actions resulting
from the decision of the agents, from the natural evolution of the environment and
the actions still being performed at time t . Therefore, the state dynamics γ (t , l ) of a
level l ∈L contains a set of influences.
∀l ∈L,∀t ∈Tl ,γ (t , l )⊆ I (4)
Since the data contained in an influence are mostly domain-dependent, no specific
model is attached to them. They usually contain the subjects of the action (e.g. the
physical state of one or more agents) as well as parameters (e.g. an amount of money
to exchange).
2.4 General behavior model
The dynamic state of a simulation models a "photograph" of the simulation at time
t . Motion is attained owing to the behavior of the agents, the natural action of the
7This replaces the term "physical state" from IRM4MLS, which was misleading, since that state also
contains mental information like a desired speed.
8
environment and the reaction of each level to influences.
2.4.1 Behavior of the agents
The behavior of an agent in a level l ∈ L has three phases: 1) Perception: extract
information from the dynamic state of the levels that can be perceived from l ; 2)
Global state revision: use the newly perceived data to revise the content of the global
state of the agent; 3) Decision: use the perceived data and the revised global state to
create and send influences to the levels that can be influenced by l . Each influence
models a modification request of the dynamic state of a level.
2.4.2 Natural action of the environment
The natural action of the environment is simpler than the behavior of agents: it only
has one phase, where the dynamic state of the levels that can be perceived from l are
used to create influences sent to one or more levels that can be influenced by l .
2.4.3 Reaction to the influences
As in IRM4MLS, in SIMILAR the reaction of a level l ∈ L is a process computing
the new consistent dynamic state of l . The reaction phase occurs at the end of a
transitory period ]t , t + d tl [ of a level, and is computed using the value of the most
recent consistent dynamic state of l and the influences that were sent to l during the
transitory period ]t , t + d tl [;
Yet, contrary to IRM4MLS, SIMILAR provides an explicit model to the generic
influences that can be found in any simulation, like the addition/removal of an agent
from the simulation/a level. Such influences are called system influences, in opposition
to regular influences, which are user-defined. A model is also provided to their generic
reaction. These points are not detailed in this paper.
2.5 Formal notations and simulation algorithm
Not all levels are able to interact. Therefore, the interactions between levels are con-
strained by two digraphs: A perception relation graph GP (resp. influence relation
graph GI ) defines which levels can be perceived (resp. influenced) during the behav-
ior of the agent/environment in a specific level.
�
l1, l2
�
∈GP (resp. GI ) ⇐⇒ An agent from l1 can perceive (resp.
influence) the dynamic state of l2
(5)
The out neighborhood N +P (l ) (resp. N
+
I (l )) of a level l ∈ L in the perception
(resp. influence) relation graph defines the levels that can be perceived (resp. influ-
enced) by l .
2.5.1 Agent behavior
Since the content of the dynamic state is not trustworthy during transitory periods,
the natural action of the environment and the perception of the agents are based on
9
the last consistent dynamic state of the perceptible levels. This time is identified by
the notation f l oo rl (]t , t
′[), which models the last time when the dynamic state of a
level l was consistent for a perception occurring during a transitory period ]t , t ′[.
∀t , t ′ ∈T2,∀l ∈L, f l oo rl (]t , t
′[) = max
�
{u ≤ t |u ∈Tl }
�
(6)
Based on these information, the perception phase of an agent a ∈A (t , l ) from a level
l ∈L for the transitory period ]t , t+d tl [ is defined as an application pe r c e p t i ona,]t ,t+d tl [,l .
This application reads the last consistent dynamic state of each perceptible level to
produce the perceived data:
∀l ∈L,∀t ∈Tl\{max(Tl )},∀a ∈A (t , l ), pe r c e p t i ona,]t ,t+d tl [,l :
∏
k∈N +P (l )
∆k −→ Pa,l
�
δ
�
f l oo rk (]t , t + d tl [), k
�
�
k∈N +P (l )
7−→ pa,l (]t , t + d tl [) (7)
In this notation, Pa models the domain space of the data that can be perceived by the
agent a, from the perspective of the level l . It can contain raw data from the dynamic
states, or an interpretation of these data. For instance, in a road traffic simulation, the
drivers do not need to put the absolute position of the leading vehicle (i.e. raw data
from the dynamic state) in their perceived data: the distance between the two vehicles
is sufficient.
The revision of the global state of an agent a ∈ A (t , l ) for a transitory period
starting at the time t is defined as an application g l obal Re va,]t ,t+d t [. This applica-
tion reads the most recent consistent global stateµa
�
t ) of the agent a and the perceived
data pa,l (]t , t + d tl [),∀l ∈L|t ∈Tl of all the levels that started a transitory phase at
the time t , in order to determine the value of the revised global state µa(]t , t + d t [)
of the agent during the transitory period.
∀t ∈T\{max(T)},∀a ∈A (t ), g l obal Re va,]t ,t+d t [ :
Ma ×
∏
l∈L|t∈Tl
Pa,l −→ Ma
�
µa(t ),
�
pa,l (]t , t + d tl [)
�
l∈L|t∈Tl
�
7−→ µa(]t , t + d t [) (8)
Finally, the decision of an agent a ∈A (t , l ) from a level l ∈ L for the transitory
period ]t , t + d tl [ is defined as an application d ec i s i ona,]t ,t+d tl [,l . This application
reads the revised global stateµa(]t , t+d t [) of a and the perceived data pa,l (]t , t+d tl [)
computed for the level l to create the influences that will modify levels during their
respective next reaction.
∀l ∈L,∀t ∈Tl\{max(Tl )},∀a ∈A (t , l ), d ec i s i ona,]t ,t+d tl [,l :
Ma ×Pa,l −→ 2
I
�
µa(]t , t + d t [), pa,l (]t , t + d tl [)
�
7−→ Ia,l (]t , t + d tl [) (9)
If we note l e ve l (i) the level at which the influence i ∈ I is aimed, then the influence
relation graph imposes the following constraint to the decision:
∀l ∈L,∀t ∈Tl\{max(Tl )}, i ∈Ia,l (]t , t + d tl [)⇒ l e ve l (i) ∈N
+
I (l ) (10)
10
As a result to this phase, each created influence i ∈ Ia,l (]t , t + d tl [) is added to the
transitory state dynamics of k = l e ve l (i), for the transitory period ] f l oo rk (]t , t +
d tl [), f l oo rk (]t , t + d tl [)+ d tk[.
2.5.2 Natural action of the environment
The natural action of the environment from a level l ∈ L for the transitory period
]t , t + d tl [ is defined as an application nat u ral]t ,t+d tl [,l . This application reads the
last consistent dynamic state of each perceptible level to create the influences that will
modify the dynamic state of the influenceable levels (during their reaction).
∀l ∈L,∀t ∈Tl\{max(Tl )}, nat u ral]t ,t+d tl [,l :
∏
k∈N +P (l )
∆k −→ 2
I
�
δ
�
f l oo rk (]t , t + d tl [), k
�
�
k∈N +P (l )
7−→ Iω,l (]t , t + d tl [) (11)
The resulting influences are managed with the same process than the ones coming
from the decisions of the agents.
2.5.3 Reaction of a level
The reaction of a level l ∈ L is computed at the end of each transitory period ]t , t +
d tl [ where t ∈Tl . It is defined as an application r eac t i onl ,]t ,t+d tl [ reading the tran-
sitory dynamic state δ(]t , t + d tl [, l ) of the level to determine the next consistent
value of the dynamic state δ(t + d tl , l ).
∀l ∈L,∀t ∈Tl\{max(Tl )}, r eac t i on]t ,t+d tl [,l :
∆l −→ ∆l
�
δ
�
]t , t + d tl [, l
�
�
7−→ δ
�
t + d tl , l
�
(12)
The reaction has the following responsibilities: 1) Take into consideration the influ-
ences of γ (]t , t + d tl [, l ) to update the local state of the agents, update the local state
of the environment, create/delete agents from the simulation or add/remove agents
from the level; 2) Determine if the influences of γ (]t , t+d tl [, l ) persist in γ (t+d tl , l )
(if they model something that has not finished at the time t+d tl ); 3) Manage the col-
liding influences of γ (]t , t + d tl [, l ).
2.5.4 Simulation algorithm
The simulation algorithm of SIMILAR is presented in Figure 4. It relies on the pre-
sented concepts and complies with the time constraints defined in [10].
Conclusion and perspectives
In this paper, we elicited several issues about time and consistency raised in multi-level
simulations. There is no clear solution to theme since the notion of time consistency
11
t ←− mi n(T);
D←−Map<level,dynamic state> //Most recent consistent dynamic state
M ←−Map<agent,memory state> //Most recent consistent global state
T ←−Map<level,time interval> //Next transitory state time interval
DT ←−Map<level,dynamic state> //Next transitory state
MT ←−Map<agent,memory state> //Most recent revised global state
for l ∈L do
D[l ]←− δ(t , l );
T [l ]←−]t , t + d tl [;
DT [l ]←− copy of D[l ];
end
while t 6= max(T) do
for l ∈L do
if t = end (T [l ]) then
D[l ]←− r eac t i onT [l ],l (DT [l ]);
DT [l ]←− copy of D[l ];
T [l ] =]t , t + d tl [;
end
for a ∈A (t ) do
M [a] = copy of MT [a];
end
end
Li ←− {l ∈L|s t a r t (T [l ]) = t};
p←−Map<agent,Map< level, perceived data >>;
A←−;;
for l ∈ Li do
for a ∈A (t , l ) do
p[a][l ]←− pe r c e p t i ona,T [l ],l
�
(D[k])
k∈N +P (l )
�
;
A←−A∪{a}
end
end
for a ∈A do
MT [a] = g l obal Re va,]t ,t+d t [(M [a], p[a]);
end
I ←−;;
for l ∈ Li do
I ←− I ∪ nat u ralT [l ],l
�
(D[k])
k∈N +p (l )
�
;
for a ∈A (t , l ) do
I ←− I ∪ d ec i s i ona,T [l ],l (MT [a], p[a]);
end
end
for i ∈ I do
Add i to the state dynamics of DT [l e ve l (i)];
end
t ←− mi n
�
�
r i g h t (T [l ]), l ∈L
�
//t becomes equal to t + d t
end
Figure 4: The simulation algorithm used in SIMILAR
among heterogeneous time models is itself ill-defined. Therefore, rather than distin-
guishing the "right" or "wrong" approaches, we defined a theoretical frame giving a
better understanding of the choices underlying each approach. Then, it is up to mod-
elers and domain specialists to tell if these choices are appropriate or not for the study
of a given phenomenon.
To cope with the multi-level related issues, we introduced a meta-model named
SIMILAR based on the influence/reaction principle. This model is designed to reify as
much as possible the concepts involved in the abovementionned issues, thus providing
a better support to the definition of explicit solutions to them. SIMILAR includes a
generic and modular formal model, a methodology and a simulation API preserving
the structure of the formal model. Thus, the design of simulations is in addition
more robust to model revisions and relies on a structure fit to represent the intrinsic
complexity of the simulated multi-level phenomena.
SIMILAR has been implemented in Java and is available under the CeCILL-B li-
cense.
12
It is available at http://www.lgi2a.univ-artois.fr/~morvan/similar.html.
References
[1] B. Camus, C. Bourjot, and V. Chevrier. Considering a multi-level model as
a society of interacting models: Application to a collective motion example.
Journal of Artificial Societies & Social Simulation, 18(3), 2015.
[2] D. David and R. Courdier. See emergence as a metaknowledge. a way to reify
emergent phenomena in multiagent simulations? In Proceedings of ICAART’09,
pages 564–569, Porto, Portugal, 2009.
[3] J. Ferber and J-P. Müller. Influences and reaction: a model of situated multia-
gent systems. In 2nd International Conference on Multi-agent systems (ICMAS’96),
pages 72–79, 1996.
[4] J. Gil-Quijano, T. Louail, and G. Hutzler. From biological to urban cells:
Lessons from three multilevel agent-based models. In Principles and Practice
of Multi-Agent Systems, volume 7057 of LNCS, pages 620–635. Springer, 2012.
[5] A. Grignard, P. Taillandier, B. Gaudou, D. A. Vo, N. Q. Huynh, and A. Dro-
goul. GAMA 1.6: Advancing the art of complex agent-based modeling and sim-
ulation. In PRIMA 2013: Principles and Practice of Multi-Agent Systems, volume
8291 of LNCS, pages 117–131. Springer, 2013.
[6] A. Hjorth, B. Head, and U. Wilensky. Levelspace netlogo extension. http:
//ccl.northwestern.edu/rp/levelspace/index.shtml, 2015.
[7] T. Huraux, N. Sabouret, and Y. Haradji. A multi-level model for multi-agent
based simulation. In Proc. of 6th Int. Conf. on Agents and Artificial Intelligence
(ICAART), 2014.
[8] F. Michel. The IRM4S model: the influence/reaction principle for multiagent
based simulation. In Proc. of 6th Int. Conf. on Autonomous Agents and Multiagent
Systems (AAMAS), pages 1–3, 2007.
[9] G. Morvan. Multi-level agent-based modeling - a literature survey. CoRR,
abs/1205.0561, 2013.
[10] G. Morvan, A. Veremme, and D. Dupont. IRM4MLS: the influence reaction
model for multi-level simulation. In Multi-Agent-Based Simulation XI, volume
6532 of LNCS, pages 16–27. Springer, 2011.
[11] S. Picault and P. Mathieu. An interaction-oriented model for multi-scale simula-
tion. In Proc of the 22nd Int. Joint Conf. on Artificial Intelligence, pages 332–337.
AAAI Press, 2011.
[12] D-A. Vo. An operational architecture to handle multiple levels of representation in
agent-based models. PhD thesis, Université Paris VI, 2012.
13
http://www.lgi2a.univ-artois.fr/~morvan/similar.html
http://ccl.northwestern.edu/rp/levelspace/index.shtml
http://ccl.northwestern.edu/rp/levelspace/index.shtml
1 Temporal dynamics in Multi-level simulations
1.1 General case
1.2 Multi-level case
1.2.1 Local information
1.2.2 Global information
1.2.3 Content of a dynamic state
1.2.4 Time model of the simulation
1.2.5 Consistent and transitory states
1.3 Multi-level inherent issues
1.3.1 Level interaction through perception
1.3.2 Level interaction through actions
1.3.3 Global state update
1.4 Differences between multi-level approaches
2 SIMILAR
2.1 Core concepts
2.2 Heuristics
2.3 Dynamic state
2.3.1 State valuation
2.3.2 State dynamics
2.4 General behavior model
2.4.1 Behavior of the agents
2.4.2 Natural action of the environment
2.4.3 Reaction to the influences
2.5 Formal notations and simulation algorithm
2.5.1 Agent behavior
2.5.2 Natural action of the environment
2.5.3 Reaction of a level
2.5.4 Simulation algorithm
| 0non-cybersec
| arXiv |
[Update] My [16/F] English teacher [30?M] said we were lovers in a past life..
Post from last time: http://ud.reddit.com/r/relationships/comments/307vup/my_16f_english_teacher_30m_said_we_were_lovers_in/
So I have an update for everyone, but it's probably going to be disappointing.
To start with, I live in a real small ma and pop town, where everyone knows everyone. Heck my graduating class is only going to be 60 students tops.
I don't have the best relationship with my dad (moms out of the picture) and it's difficult at times to talk to him. Some people said to go to the Principal but i'm not sure it'll work out. He's barely ever at school and there's rumors that he's a bit of a drunk, so I don't think he'll really care.
The councilor is also only ever at school for an hour a day tops, and likes to leave her door open... which coincidentally let's everyone hear what she's talking about with whoever's with her. Nothing stays confidential with her as some of us learned the hard way.
So to put it bluntly... all the adults in my life right now kinda suck.
I told my teacher that what he said made me feel really uncomfortable and he immediately apologized for it and said he didn't mean to make me feel uncomfortable at all, he even said that he's happily married right now and had only wanted to tell me since I showed such an interest in the discussion over reincarnation and past lives. Afterwards he offered to buy pizza for our group tomorrow (it's about 6 of us all together) as an apology and to help things be less awkward again.
He's going to be my teacher prob till I graduate (since he's also a study hall teacher and does work in the library) so I decided to just ignore what he said for now and if he tries anything again i'll just go somewhere else for lunch.
I know everyone wants me to report him, but I really don't think it'll do anything, our principal was even arrested once at school and yet he's still here, and I really don't want to be known as the girl that got everyone's favourite teacher fired, I have a hard enough life at school as it is, just the thought of how everyone would react then scares the heck out of me.
Sorry everyone, I know this is not what you were expecting... :/
**tl;dr**: I really don't want to become more of a pariah then I already, so i'm just ignoring what he said and will hang out elsewhere if he tries something. Sorry | 0non-cybersec
| Reddit |
Powerful jetski. | 0non-cybersec
| Reddit |
Libreoffice closes multiple windows. <p>I am working with multiple documents in LibreOffice, all are open in separate windows.
when I click the exit button, or go to the file menu clicking on "quit", ALL windows close, not just the one I wanted to close.</p>
<p>How do I avoid closing ALL windows, and how can I just close one of the windows?</p>
| 0non-cybersec
| Stackexchange |
Daily Tech Support Thread - [October 01].
Welcome to the daily Tech Support thread for /r/Apple.
Have a question you need answered? Ask away! Please remember to adhere to our rules, which can be found in the sidebar. On mobile? [Here is a screenshot with our rules](https://i.imgur.com/yekEMCO).
Join our Discord and IRC chat rooms for support:
[Discord](https://discord.gg/apple)
[IRC](https://kiwiirc.com/client/irc.snoonet.org/apple?nick=CHANGE_ME)
**Note: Comments are sorted by /new for your convenience**
Here is an [archive](https://www.reddit.com/r/apple/search?q=title%3A%22Daily+Tech+Support+Thread%22+author%3A%22AutoModerator%22&restrict_sr=on&sort=new&t=all) of all previous "Tech Support" threads. This is best viewed on a browser. If on mobile, type on the searchbar [title:"Daily Tech Support Thread" author:"AutoModerator"] (without the brackets, and including the quotation marks around the title and author.) | 0non-cybersec
| Reddit |
My wife and I normally dont go out to eat because things are tight, but after my grandmother died, my parents invited us out to dinner.... | 0non-cybersec
| Reddit |
Questions being posted to /r/Networking. To start I do not mind the questions, I love helping people out. This and /r/sysadmin are my top two threads that I check and read in the morning. I have noticed that there are a lot of home network questions being posted here. I though that this thread was geared toward the enterprise network community? How do you other full time members of this site feel about this shift?
Edit/Update: That for all the feedback. | 1cybersec
| Reddit |
Amazon AWS Cognito and Python Boto3 to establish AWS connection and upload file to Bucket. <p>I'm trying to use the AWS cognito service to authenticate and upload a file. I have been provided my regionType, identityPool, AWS account ID, and UnAuthRole. I also know the production and development bucket names.</p>
<p>I think I am setting the AWS Access Key and AWS Secret Key... I want to authenticate with cognito and use the results to allow me to do an bucket listing and later a file upload.</p>
<p>What am I doing wrong? How can I use the cognito id to establish an S3 connection?</p>
<p>Here is my code and the resulting error:</p>
<pre><code>#!/usr/bin/python
import boto3
import boto
#boto.set_stream_logger('foo')
import json
client = boto3.client('cognito-identity','us-east-1')
resp = client.get_id(AccountId='<ACCNTID>',IdentityPoolId='<IDPOOLID>')
print "\nIdentity ID: %s"%(resp['IdentityId'])
print "\nRequest ID: %s"%(resp['ResponseMetadata']['RequestId'])
resp = client.get_open_id_token(IdentityId=resp['IdentityId'])
token = resp['Token']
print "\nToken: %s"%(token)
print "\nIdentity ID: %s"%(resp['IdentityId'])
resp = client.get_credentials_for_identity(IdentityId=resp['IdentityId'])
secretKey = resp['Credentials']['SecretKey']
accessKey = resp['Credentials']['AccessKeyId']
print "\nSecretKey: %s"%(secretKey)
print "\nAccessKey ID: %s"%(accessKey)
print resp
conn = boto.connect_s3(aws_access_key_id=accessKey,aws_secret_access_key=secretKey,debug=0)
print "\nConnection: %s"%(conn)
for bucket in conn.get_all_buckets():
print bucket.name
</code></pre>
<p>Error:</p>
<pre><code> Traceback (most recent call last):
File "./test.py", line 32, in <module>
for bucket in conn.get_all_buckets():
File "/usr/local/lib/python2.7/dist-packages/boto/s3/connection.py", line 440, in get_all_buckets
response.status, response.reason, body)
boto.exception.S3ResponseError: S3ResponseError: 403 Forbidden
<?xml version="1.0" encoding="UTF-8"?>
<Error><Code>InvalidAccessKeyId</Code><Message>The AWS Access Key Id you provided does not exist in our records.</Message><AWSAccessKeyId>ASIAILXMPZEMJAVZN7TQ</AWSAccessKeyId><RequestId>10631ACFF95610DD</RequestId><HostId>PGWDRBmhLjjv8Ast8v6kVHOG3xR8erJRV2ob3/2RmqHXwrg8HCZV578YsNLaoL24Hknr+nh033U=</HostId></Error>
</code></pre>
<p>This corresponding iOS code works fine:</p>
<pre><code>AWSCognitoCredentialsProvider *credentialsProvider =
[AWSCognitoCredentialsProvider credentialsWithRegionType:awsCognitoRegionType
accountId:awsAccountId
identityPoolId:awsCognitoIdentityPool
unauthRoleArn:unauthRoleArn
authRoleArn:nil];
AWSServiceConfiguration *configuration = [AWSServiceConfiguration configurationWithRegion:awsCognitoRegionType
credentialsProvider:credentialsProvider];
....
AWSS3TransferManagerUploadRequest *uploadRequest = [AWSS3TransferManagerUploadRequest new];
uploadRequest.bucket = [ELEEnvironment currentEnvironment].userDataS3Bucket;
uploadRequest.key = key;
uploadRequest.body = uploadFileURL;
[[self uploadTask:uploadRequest] continueWithExecutor:[BFExecutor mainThreadExecutor]...
</code></pre>
<p>Thanks for any help!</p>
| 0non-cybersec
| Stackexchange |
If a private investigator had followed you around today, what's the most suspicious thing he would have seen?. | 0non-cybersec
| Reddit |
What is the difference between nf_conntrack_max and nf_conntrack_expect_max?. <p>I understand what <code>nf_conntrack_max</code> is, but what does <code>nf_conntrack_expect_max</code> actually do? I haven't been able to find an explanation on this anywhere.</p>
| 0non-cybersec
| Stackexchange |
Enable hardware virtualization on Dell Studio 1555 laptop. <p>I am trying to enable hardware virtualization on my laptop but I can't find anything in the BIOS. How can I enable hardware virtualization - or does my system not support hardware virtualization?</p>
| 0non-cybersec
| Stackexchange |
Danger noodle. | 0non-cybersec
| Reddit |
Video editing software. <p>So I have finally figured out how to record videos without any frame drops and such. Now my problem is the video editing software.
<br />So far, every one that I have tried has just not worked. Everyone who has answered questions like mine have said that the best ones to use are openshot and Kdenlive, neither of which are working for me. Openshot crashes frequently and Kdenlive just freezes.
<br /></p>
<p>What I am looking for is either a way to fix said crashes and freezes, or some other program for editing, that doesn't have to be fancy, as long as it works fine. I don't need any special features, all I need is to be able to cut and merge audio and video.</p>
| 0non-cybersec
| Stackexchange |
What is the physical difference between a memory I have from yesterday and the memory of the dream I had last night?. Just a bit of wondering I did while in the shower this morning, basically boiling down to if these two memories are created/stored/processed in similar ways. | 0non-cybersec
| Reddit |
Python str view. <p>I have a huge <code>str</code> of ~1GB in length:</p>
<pre><code>>>> len(L)
1073741824
</code></pre>
<p>I need to take many pieces of the string from specific indexes until the end of the string. In C I'd do:</p>
<pre><code>char* L = ...;
char* p1 = L + start1;
char* p2 = L + start2;
...
</code></pre>
<p>But in Python, slicing a string creates a new <code>str</code> instance using more memory:</p>
<pre><code>>>> id(L)
140613333131280
>>> p1 = L[10:]
>>> id(p1)
140612259385360
</code></pre>
<p>To save memory, how do I create an str-like object that is in fact a pointer to the original L? </p>
<p><strong>Edit</strong>: we have <code>buffer</code> and <code>memoryview</code> in Python 2 and Python 3, but <code>memoryview</code> does not exhibit the same interface as an <code>str</code> or <code>bytes</code>:</p>
<pre><code>>>> L = b"0" * 1000
>>> a = memoryview(L)
>>> b = memoryview(L)
>>> a < b
Traceback (most recent call last):
File "<stdin>", line 1, in <module>
TypeError: unorderable types: memoryview() < memoryview()
>>> type(b'')
<class 'bytes'>
>>> b'' < b''
False
>>> b'0' < b'1'
True
</code></pre>
| 0non-cybersec
| Stackexchange |
Mongoose / MongoDB User notifications scheme suggestions. <p>I was wondering what is the best scheme for user/notifications kind of scenario like the following :</p>
<ul>
<li>You have multiple users. </li>
<li>You have multiple notifications that might be for a single user, for some users or for all users. </li>
<li>You need a notification "read" entry in the storage, to know if the user has read the notification or not.</li>
</ul>
<h3>Option One</h3>
<p>Embedded notifications scheme</p>
<pre><code>Notifications = new Schema ( {
message : String,
date : { type : Date, default: Date.now() }
read : { type: Boolean, default : false }
});
User = new Schema( {
username : String,
name : String,
notifications : [Notifications]
});
</code></pre>
<p>Pros :</p>
<ul>
<li>It is very easy to display the data, since calling User.find() will display notifications as array object.</li>
</ul>
<p>Cons :</p>
<ul>
<li>When you create a notification for every user, you need to do .push to every embedded Notifications</li>
<li>Multiple notifications entries for every user ( multiple data in the database )</li>
<li>Giant embedded document ( I read something about <4MB limit of those )</li>
<li>Since it is a Embedded Document - ( mongoose DocumentArray ) you can't search or skip. You load every notifications everytime you access user.</li>
</ul>
<h3>Option Two</h3>
<p>Populate (DBRef like) objects</p>
<pre><code>Notification = new Schema ({
message : String,
date : { type : Date, default : Date.now() }
});
UserNotification = new Schema ({
user : { type : Schema.ObjectId, ref : 'User' },
notification : { type : Schema.ObjectId, ref : 'Notification' },
read : { type : Boolean, default : false }
});
User = new Schema( {
username : String,
name : String,
notifications : [ { type : Schema.ObjectID, ref : 'UserNotification' } ]
});
</code></pre>
<p>Pros :</p>
<ul>
<li>Optimal for queries</li>
<li>No duplicate data</li>
<li>Supporting large amount of notifications</li>
</ul>
<p>Cons :</p>
<ul>
<li>You have 3 collections, instead of one in ( <strong>Option One</strong> has only one collection )</li>
<li>You have 3 queries every time you access the collection.</li>
</ul>
<h3>Questions</h3>
<ol>
<li>What do you think is the best scheme from those two?</li>
<li>Am I missing something or some kind of basic NoSQL knowledge?</li>
<li>Can someone propose better scheme?</li>
</ol>
<p>Thank you, in advance and I'm sorry for the long post, but I think I can't explain it simpler.</p>
| 0non-cybersec
| Stackexchange |
Iranian Human Rights Activist Ali Ajami Mysteriously Drowned In Houston Park Lake — Mr. Ajami was an editor of the Iranian Human Rights News Agency (HRANA) which monitors human rights in Iran.. | 0non-cybersec
| Reddit |
Trebuchet. | 0non-cybersec
| Reddit |
Why is this a thing?. | 0non-cybersec
| Reddit |
New BROCKHAMPTON video tonight - Kevin Abstract on Twitter. | 0non-cybersec
| Reddit |
Sleeping bag liners, do they really keep you warm?. Hey r/backpacking
I am about to purchase a Big Agnes mountain sl sleeping bag.
It is rated at 17 degrees, but the bag claims 15.
I was also considering buying a sleeping liner, one of the liners at REI weighed about 14 ounces and claimed to add 25 degrees to my bag warmth bringing my total warmth level to -10 degrees (-8 more specifically).
I tried the sleeping bag out at Rei and it was pretty warm but I have a really hard time believing that a fairly normal downtek sleeping bag with a polyester lining could keep me comfy in temperatures that would otherwise kill me in less than an hour.
Does anyone have any expierence with this? Am I being naive here? | 0non-cybersec
| Reddit |
History had lessons for humanity - the writings were on the wall. Covid 19 compared with past pandemics. | 0non-cybersec
| Reddit |
Why do people tell me not to use VLANs for security?. <p>As per title, why do people tell me not to use VLANs for security purposes?</p>
<p>I have a network, where a have a couple of VLANS. There is a firewall between the 2 VLANs. I am using HP Procurve switches and have made sure that switch-to-switch links accept tagged frames only and that host ports don't accept tagged frames (They are not "VLAN Aware"). I've also made sure that the native VLAN (PVID) of the trunk links are not the same as either of the 2 host VLANs. I've also enabled "Ingress Filtering". Furthermore, I've made sure that host ports are only members of a single VLAN, which is the same as the PVID of the respective port. The only ports which are members of multiple VLANs are the trunk ports.</p>
<p>Can someone please explain to me why the above isn't secure? I believe I've addressed the double tagging issue..</p>
<p>Thanks</p>
<p>Update: Both switches are Hp Procurve 1800-24G</p>
| 0non-cybersec
| Stackexchange |
Fitting a model in R, Least squares estimates. <p>$ \Bbb E$(grades) =
$\bigg(\alpha$, teacher='Female',</p>
<p>and,</p>
<p>$\bigg( \alpha+\beta $, teacher='Male'</p>
<p>given that I have loaded up the required data, how should I go about fitting this model in R? Then I need to find the least squared estimates of both $\alpha$ and $\beta$ which I think I will be able to do once I can fit the model.
Thanks!</p>
| 0non-cybersec
| Stackexchange |
[DISCUSSION] Travis Scott - Birds in the Trap Sing McKnight (one year later). - Where do you guys rank this album?
- What are your hopes for the next album(s) this year?
| 0non-cybersec
| Reddit |
I'd like some input on my current investments. I feel like I could/should be doing better!. So currently here's what I've got:
* [FID FREEDOM K 2045](https://www.google.com/finance?q=MUTF:FFKGX&ei=DrXbU4PZDM69rAGI2YGwDg) (Prior employer 401k): **$78,582**
* [FA FREEDOM 2045 T](https://www.google.com/finance?q=MUTF:FFFTX&ei=DrXbU4PZDM69rAGI2YGwDg) (Prior employer 401k, T Class): **$723**
* [Vanguard Target Retirement 2045 Fund VTIVX](https://www.google.com/finance?q=MUTF:VTIVX&ei=DrXbU4PZDM69rAGI2YGwDg) (Self-done): **$4,886**
1. Should I roll over my prior 401k (the large one) to the Vanguard fund?
2. Is the Freedom '45 fund a good pick for me? (I'm 32, so I figured that was my target date for retirement)
3. What's the difference between my two Freedom funds, the "T" class etc? I feel like that fund is under performing consistently.
I also would love some input about savings/investing ratios...specific to my situation. I'm just recently employed again after a 2 month unemployment stint. Plan on monthly contributing to the Vanguard again.
* I pull in $6800 after tax per month. $1700 weekly, $3400 biweekly.
* Only real expenses are gas, (usually $50 a week), cellphone ($80 a month), and entertainment which is usually $3-400 a month.
* I'm currently wanting/trying to save for a wedding and also a down payment on a place etc. Maybe 1-2k a month split between. I doubt I'll buy to own for a few years yet.
* I want to put $500-750 in the Vanguard monthly.
* I'm not eligible for company 401k yet, beginning of October I will be and will contribute to match. | 0non-cybersec
| Reddit |
Lived here for 2 years - no friends. New roomate been here 2 days -he got invited and out partying right now. Fml. Every friday/Saturday night on the bus I always see fellow college students laughing with their group of friends and dressed in their party clothes heading out to a good time while I'm sitting there alone after spending all day alone after spending all year alone, like I've done for over 2 years.
Over summer most college students went home so I didnt see the crowd of party goers but now that schools about to start up again I'm starting to see them return and it's just straight up depressing.
My roomate was a stranger I got off craigslist who lived in a different city but he is having no problems whatsoever making friends. Depressing af | 0non-cybersec
| Reddit |
Passing along wisdom. | 0non-cybersec
| Reddit |
Dani Alves: "I am very happy to join Juventus. I want to win in Europe and in Italy. I have won a lot of trophies with Barcelona, but the time has come to enjoy Italy and to try to bring Juventus back to the European top.". | 0non-cybersec
| Reddit |
IT: Scenes from the book that weren't in the 90's miniseries you hope are in the new movie. No, not THAT scene! Now that that's cleared up:
One scene I love most in the book is when Bill and Richie go to check out Eddie's story about the leper. In the coal cellar they encounter the teenage werewolf which Richie is able to subdue with sneezing powder. They then are both able to escape on Silver. When clear of the home and the werewolf, both Bill and Richie begin crying and hug each other for comfort. Specifically mentioned is that even Richie, who has something wise to say about any situation, is simply left in tears. Two friends holding each other in an empty street - one of the best scenes in the book that really shows the friendship of the losers. | 0non-cybersec
| Reddit |
I was only defrosting it sir... | 0non-cybersec
| Reddit |
Can I take a double exposure with an automatic film
SLR?. I have an SLR camera that is probably from the 90's. That means it automatically loads film and automatically brings the next blank negative after a picture has been taken. That being said, I was wondering if there is any way to take a double exposure with this type of SLR?
*Edit: It is a Pantex zx-50 | 0non-cybersec
| Reddit |
Stop re-iterating over duplicates in nested for loop. <p>I'm working with a JavaScript canvas, and I'd like to recreate quite a common effect I've seen where moving particles create lines between them when then get close to each other.</p>
<p>My issue is that I'm essentially performing two loops inside each other. Please see pseudo code:</p>
<pre><code>var particles = [ /* array of particles with x and y values */ ]
for(var i = 0; i < particles.length; i ++){
for(var j = 0; j < particles.length; j ++){
// check if j is close to i
// if so, draw a line between them
}
}
</code></pre>
<p>First of all I found that this would double check one particle against itself. So I can add:</p>
<pre><code> if(i == j) continue
</code></pre>
<p>But then actually, I need a further case. For instance, if I have already checked when <code>i = 1</code> and <code>j = 8</code>, I don't need to check when <code>j = 1</code> and <code>i = 8</code></p>
<p>Is there a common method of simplifying this checking procedure? I'm losing a fair bit of performance with the multiple checks.</p>
| 0non-cybersec
| Stackexchange |
A minimalist alternative to the Timex weekender.. The Timex weekender is nice and minimalist, I was almost going to buy it but my mum wanted to get me a late birthday present since I wasn't around at the time, so instead I now have a [Mondaine](http://www.mondaine.com/mondaine/), based heavily on Swiss railway clocks. Not too expensive either! and fits with the clean look that some call "the MFA uniform" so I thought I'd bring it to everyone's attention just in case they hadn't seen it before.
http://i.imgur.com/J6gDZ.jpg | 0non-cybersec
| Reddit |
Star Wars Episode 7 Stormtrooper Helmet Designs. | 0non-cybersec
| Reddit |
The same anonymous Redditor who donated $3700 to the American Cancer Society just donated $5000 to r/atheism's Doctor's Without Borders fund!. This guy's two posts make me proud to be a part of Reddit :)
We have [RandomKindness](http://www.reddit.com/user/RandomKindness) to thank!
This was the [original donation to the American Cancer Society.](http://www.reddit.com/r/reddit.com/comments/enffi/redeeming_myself_i_am_a_kidney_donor_i_always/c19hg8v?context=3)
This is the post where he [helped r/atheism hit their $42,000 christmas goal.](http://www.reddit.com/r/atheism/comments/eojq6/a_big_thanks_to_whoever_gave_a_1500_donation_to/c19pj5l?context=3)
And this is the [First Giving donation page](http://www.firstgiving.com/rAtheism) to prove it! | 0non-cybersec
| Reddit |
How to use async_work_group_copy in OpenCL?. <p>I would like to understand how to correctly use the async_work_group_copy() call in OpenCL. Let's have a look on a simplified example:</p>
<pre><code>__kernel void test(__global float *x) {
__local xcopy[GROUP_SIZE];
int globalid = get_global_id(0);
int localid = get_local_id(0);
event_t e = async_work_group_copy(xcopy, x+globalid-localid, GROUP_SIZE, 0);
wait_group_events(1, &e);
}
</code></pre>
<p>The reference <a href="http://www.khronos.org/registry/cl/sdk/1.0/docs/man/xhtml/async_work_group_copy.html">http://www.khronos.org/registry/cl/sdk/1.0/docs/man/xhtml/async_work_group_copy.html</a> says "Perform an async copy of num_elements gentype elements from src to dst. The async copy is performed by all work-items in a work-group and this built-in function must therefore be encountered by all work-items in a workgroup executing the kernel with the same argument values; otherwise the results are undefined."</p>
<p>But that doesn't clarify my questions...</p>
<p>I would like to know, if the following assumptions are correct:</p>
<ol>
<li>The call to async_work_group_copy() must be executed by all work-items in the group.</li>
<li>The call should be in a way, that the source address is identical for all work-items and points to the first element of the memory area to be copied.</li>
<li>As my source address is relative based on the global work-item id of the first work-item in the work-group. So I have to subtract the local id to have the address identical for all work-items...</li>
<li>Is the third parameter really the number of elements (not the size in bytes)?</li>
</ol>
<p>Bonus questions:</p>
<p>a. Can I just use barrier(CLK_LOCAL_MEM_FENCE) instead of wait_group_events() and ignore the return value? If so, would that be probably faster?</p>
<p>b. Does a local copy also make sense for processing on CPUs or is that overhead as they share a cache anyway?</p>
<p>Regards,
Stefan</p>
| 0non-cybersec
| Stackexchange |
Remove bibliography entry from ToC or change the way it is displayed. <p>I'm using the <code>memoir</code> class and have my document structured by parts which means that the "Bibliography" entry in the Table of Contents are not showing correctly (I guess that it is shown as a chapter instead of as a part). </p>
<p>I see two solutions:</p>
<ol>
<li><p>Remove the entry from the ToC and add a custom entry like</p>
<p><code>\addcontentsline{toc}{part}{Bibliography}</code></p></li>
<li>Change the way the entry is shown by default</li>
</ol>
<p>Does anyone know about a solution to this?</p>
| 0non-cybersec
| Stackexchange |
Programmers of Reddit, is it better to create a website by learning how HTML and CSS or using something like Adobe Dreamweaver?. I want to make a fairly complex website, so is something like Dreamweaver enough to make a complex design or would it be a better investment to learn HTML or whatever other programming languages are necessary? (If you think the latter, what are some good resources to teach me?) | 0non-cybersec
| Reddit |
Kitty Forman best laugh ever. | 0non-cybersec
| Reddit |
La Música Es Vida, Watercolor and Ink, 9 x 12in. | 0non-cybersec
| Reddit |
Extending a home wireless network using two routers running tomato. <p>I have two <strong>Asus RT-N16</strong> routers each flashed with <strong>Tomato</strong> (actually Tomato USB).</p>
<p>UPSTAIRS: <strong>Router 'A'</strong> (located upstairs) is connected to the internet via the WAN port and connected via a LAN port to a 10/100/1000 switch (Switch A). Several desktops are also attached to Switch A. Router A uses IP 192.168.1.<strong>1</strong>. </p>
<p>DOWNSTAIRS: I've just acquired <strong>Router 'B'</strong> and set it to IP 192.168.1.<strong>2</strong>. I have a cable running from Switch A downstairs to another switch (Switch B). Tivo, a blu-ray player and a Mac are connected to Switch B. My plan was to connect Router B to Switch B so that I have improved wireless access downstairs. (The wireless signal from Router A gets weak downstairs in a number of locations.)</p>
<p>How should I configure Router B so that all devices in the house can see and talk to one another? I know that I need to change DHCP on Router B so that it doesn't cover the same range as DHCP on Router A. Should I be using WDS on the two routers, or is that unnecessary since I already have a wired connection between the two routers? Any other thoughts or suggestions?</p>
<p>Thanks! --Jeff</p>
| 0non-cybersec
| Stackexchange |
Is Trader Joe's worth the drive with Aldi, Publix, and Target nearby?. My town just got a Trader Joe's within the last year and I've been eyeballing it for awhile, but can never get myself to go, considering it is all the way out towards the beach. (About thirty minutes away.)
Is Magic Joe just hype? Or is he worth it?
| 0non-cybersec
| Reddit |
Legality of reverse engineering firmware. <p>Not sure if this is the correct place to post this, but I am having some questions regarding the legality of reverse engineering firmware.</p>
<p>Specifically, I was looking into the Nintendo 3DS firmware. The EULA clearly states:</p>
<blockquote>
<p>You may not publish, copy, modify, <strong>reverse engineer</strong>, lease, rent,
decompile, or disassemble any portion of the Software, or bypass,
modify, defeat, tamper with, or circumvent any of the functions or
protections of your Nintendo 3DS, unless otherwise permitted by law.</p>
<p>Code of Conduct:</p>
<p>To help keep the Network Services friendly and safe for all users, you
will not engage in any harmful, illegal, or otherwise offensive
conduct, such as:</p>
<p>Trying to modify or gain unauthorized access to another person’s
Nintendo Device or Network Account or trying to modify, <strong>reverse</strong>
<strong>engineer</strong>, or gain unauthorized or automated access to any of
Nintendo’s computers, hardware, software, or networks used to provide
the Network Services or any feature of a Nintendo Device; </p>
<p>Hosting, intercepting, emulating, <strong>reverse engineering</strong>, or redirecting
the communication protocols used by Nintendo as part of a Nintendo
Device or the Network Services, regardless of the method used to do
so; or do anything that might bypass or circumvent measures employed
to prevent or limit access to any area, content or code of any
Nintendo Device or Network Services (except as otherwise expressly
permitted by law);</p>
</blockquote>
<p>And yet you see blog posts like these: <a href="http://gaasedelen.blogspot.ca/2014/03/depackaging-nintendo-3ds-cpu.html">http://gaasedelen.blogspot.ca/2014/03/depackaging-nintendo-3ds-cpu.html</a></p>
<p>My question is, what are the legal implications of reverse engineering the 3DS firmware and posting your finding in a blog post?</p>
| 1cybersec
| Stackexchange |
South Carolina Dept of Revenue incident response report: Spear phishing of state employees through email was likely the initial attack vector. | 1cybersec
| Reddit |
Cisco AnyConnect with certificates on Linux. <p>I have a work environment where I am allowed to use my workstation as I want, but I don't have any support for Linux. If anything doesn't work or is broken I have to fix it myself.</p>
<p>On Windows we use Cisco AnyConnect as a VPN with <strong>certificates</strong> so we can work from home. Is there a way to copy that certificate on Linux and use it with OpenConnect?</p>
| 0non-cybersec
| Stackexchange |
What is one thing you do that you thought everyone else did? I'll start.. This isn't something I did, but my sister. For some reason our friends and us got on the subject of bathroom stories. My sister then admitted that she wipes her ass back to front. She thought that was normal. Everyone told her that it was nasty with comments like "Damn your vagina must smell like shit". What are things you do that you found out no one else does?
| 0non-cybersec
| Reddit |
Cursed_november. | 0non-cybersec
| Reddit |
Open maps with specific address iOS 7. <p>I am trying to make my application open the apple maps application and have the address be pulled up. I tried this : </p>
<pre><code>- (IBAction)openInMaps:(id)sender {
NSString *addressString = @"http://maps.apple.com/?q=1 Infinite Loop, Cupertino, CA";
NSURL *url = [NSURL URLWithString:addressString];
[[UIApplication sharedApplication] openURL:url];
}
</code></pre>
<p>and this : </p>
<pre><code>- (IBAction)openInMaps:(id)sender {
NSString *addressString = @"http://maps.apple.com/?q=1_Infinite_Loop,_Cupertino,_CA";
NSURL *url = [NSURL URLWithString:addressString];
[[UIApplication sharedApplication] openURL:url];
}
</code></pre>
<p>But the button just acts like its hooked to nothing. But this does work : </p>
<pre><code>- (IBAction)openInMaps:(id)sender {
NSString *addressString = @"http://maps.apple.com/?q=Cupertino,CA";
NSURL *url = [NSURL URLWithString:addressString];
[[UIApplication sharedApplication] openURL:url];
}
</code></pre>
<p>So, whenever their is a space it doesn't work. How can I open this address?</p>
| 0non-cybersec
| Stackexchange |
[Remorse] I love my wife dearly and deeply but am strongly attracted to other younger women, and less to my wife. I wish I could change this. I really wish, I could. But when I make love to my wife I sometimes even have to think about younger women I know to keep hard and get me there. I hate myself for it, because emotionally I am so in love with my wife. But physically, it's hard.
What do I do? | 0non-cybersec
| Reddit |
My first hand cut dovetails.... | 0non-cybersec
| Reddit |
What should I include in a recipe book for my boyfriend who has never cooked before?. My wonderful boyfriend's cooking experience is limited to using the microwave and the stove top for hard boiled eggs, ramen, and pasta with sauce.
He and I agreed he'd learn to cook with me, if I played Smash with him and not criticize the game. For Christmas I'm making him a recipe book with simple things he can cook, ratios for grains and such, cooking temperatures for meat, and small descriptions of certain actions.
What does EatCheapAndHealthy think I should include? I'm trying to find healthy recipes that'd he would like, because for the most part he likes comfort food. | 0non-cybersec
| Reddit |
How To Play Rick and Morty Opening!. | 0non-cybersec
| Reddit |
How do you view people who are child free by choice? [Sorry, lots of text!]. I'm nearly 27 and, while I've played with the idea of having kids while in past relationships, I've never felt any real urge to bring a child into my life. In fact, it terrifies me. Especially because I'm a woman, I feel like the majority of the responsibility of raising children would fail mainly on my shoulders and that, if it came down to one of us having to forgo a career or aspects of a current/past lifestyle, it would be me that would have to give up things I enjoy about myself and my life. I don't feel I'd make a good parent as I have very limited patience and don't particularly enjoy the company of kids (save for a select few that I think are pretty rad). Something about the noise, and dirt, and the energy level immediately give me a way shorter fuse and I know that this comes with the territory of being a parent; I don't want to be that mom that's constantly yelling and being mean but I have a feeling that's the mom I'd end up becoming. I'm also terrified by the thought of pregnancy and birth and have been since I was old enough to even have memories - I used to have nightmares about it for years, starting when I was as young as 4 or 5. For these reasons and others, I've decided that the best choice for me in life is to remain childfree and leave parenting to those that both want and enjoy it. I couldn't think of a worse fate for a child than being parented by someone who never really wanted to be a parent in the first place.
I think this is a very rational and reasonable choice for me, given these reasons, however, I'm more often than not met with confusion and anger from people who ask if I want kids, when I'll have them, etc. I'm really not sure why I, and every other CF person I've met, get this response from others. I never say anything negative about their kids or their choice to have them (it's their life after all), but people feel the need to belittle my choices when I tell them I don't ever want kids, as if I don't actually have a say in the matter or I'm an evil person for not following a deeply ingrained social norm. I always get "it's a phase" (I don't think a 27 y/o viewpoint is a phase), "you'll change your mind when you have your own/you'll feel different about your own", "who will take care of you when you're old?", "you'll regret it later", or even "you're such a selfish person!". I really don't get this and would really like the opinions of parents on why others feel the need to say this to CF people. I don't think many of us would say "oh you want a baby? you'll regret it later". Because, you know, it's invasive and rude.
I'd really like to hear what parents on here think about us CFers and why so many people take such offence to simply wanting to live a full, happy life minus children. I really don't find it all that strange or shocking so I'm confused at all the dislike. This is especially true of r/childfree. I get that some of the people on there can make some pretty ignorant comments but the vast majority of us are on there for intelligent discussion and, more importantly, support (actually a lot of the people making rude comments often get chewed out by other CF users!). I was becoming very depressed about my life and my dating potential because of this choice, considering every man I've ever dated or even met either has or wants kids and I would love a bf to share my time with, but discovering r/childfree changed my life. Just knowing there were others out there that share my choices and support me made a world of difference and helped me feel like less of a social pariah. I'd encourage all reading this to go check out a few of the threads on there and decide for themselves what they think of the sub; as I said there are some jerks and not everyone shares every opinion but I think you'll find that it isn't so bad and that a lot of people on there actually love kids. =) There's even some parents that follow it!
Note: Please keep in mind that I haven't called parents 'breeders' or kids 'spawn' or any other derogatory terms, so please don't make comments full of fire and brimstone about how you hate how 'we' call parents and kids that kind of stuff. This is meant to be a serious and thoughtful discussion, not a name calling game. If you disagree with my choices or have an insight to why others do, by all means feel free to share but please let's have a mature atmosphere. =)
EDIT: Thanks so much for all the replies, everyone! I was expecting this post to receive a lot of negativity but the response has been overwhelmingly positive and I appreciate the support and understanding very much! Thanks again for participating, have a Happy New Year, r/parenting!
| 0non-cybersec
| Reddit |
Days Gone Passes Lifetime Sales of God of War, The Last Guardian in Japan. | 0non-cybersec
| Reddit |
My financial outlook, a few questions, insight is appreciated. . Turning 19 in 3 weeks. I read thru the personalfinance faq, have a few questions on what I should do next. I have a 6 months emergency savings fund. I have no debt whatsoever. I am contributing to my employer's matching 401k, to the max amount they will match me.
Should I start up an IRA next? Roth or Traditional? I'm only putting $1000 in my 401k each year, and my employer matches .50c for every dollar I contribute to a max of $1000. So, I've got about $1500 a year going to the 401k.
Is that not enough? Should I be throwing more to my 401k, and worry about an IRA when I start making more money?
Separate question about saving for short-term goals. I plan on moving out in just under 2 years from now. So, I'd like to be saving for a down payment on a house or money to buy a used car cash. Where's the best place to shelter this money for 2-3 years from now. I'm talking $10,000 to $15,000 in savings over the next few years.
edit: I have hardly any expenses besides gas, and insurance, so I have a lot of money to be saving.
Thanks | 0non-cybersec
| Reddit |
ACLU releases police monitoring video app. Someone posted on r/protectandserve, which is by the way, an easy site to have comments deleted by mods. | 0non-cybersec
| Reddit |
Since it's Halloween, here's a traditional Irish Jack O'Lantern carved from a turnip.. | 0non-cybersec
| Reddit |
John McDowell interview: Avoiding the Myth of the Given and other philosophical thoughts. | 0non-cybersec
| Reddit |
Load UITableView from the bottom. <p>I'm trying to mimic the iMessage bubble text behaviour with an <code>UITableView</code>. In order to always scroll to the bottom I'm using <code>scrollToRowAtIndexPath</code> when <code>viewDidLoad</code> and <code>viewDidAppear</code>. This is because when the <code>viewDidLoad</code> method is called, the table has not been completely loaded, so I need that extra scroll in <code>viewDidAppear</code>. This code makes the trick. However, what I want is not an animated scroll (setting <code>animated</code> to <code>NO</code> does not solve this), I want the table to be displayed always from the bottom, not load the table and then go to the last row. </p>
<p>Is this possible? I can't find any solution that fits completely with the desired behaviour.</p>
| 0non-cybersec
| Stackexchange |
Is POF (plenty of fish) pretty much a dead app?. I send messages often cause I like to talk to people. Maybe 1% of people respond. Is this just an app where people make a profile and leave? Or am I just not nearly as funny as I think I am? | 0non-cybersec
| Reddit |
Fernando Torres out for rest of the season due to knee injury.. | 0non-cybersec
| Reddit |
Reference needed for Hilbert-Schmidt result regarding basis of $V \subset H$. <p>I am seeking a reference that says:</p>
<blockquote>
<p>If $V \subset H \subset V^*$ is a Gelfand triple with all spaces Hilbert spaces and if $V \subset H$ is a compact embedding, then there is a basis of $V$ which is orthogonal wrt. $V$ and orthonormal wrt. $H$.</p>
</blockquote>
<p>I know how to prove but I just want something to cite. Anyone have any ideas? I tried the usual sources but had no luck.</p>
| 0non-cybersec
| Stackexchange |
Convergence in a Hilbert Space. <p>I have a homework question I am attempting to no avail.</p>
<p>Let <span class="math-container">$\mathcal{H}$</span> be a Hilbert space. Let <span class="math-container">$X\subseteq\mathcal{H}$</span> be a convex set. Suppose that <span class="math-container">$(x_{n})_{n\geq 1}$</span> is a sequence in <span class="math-container">$X$</span> such that,
<span class="math-container">\begin{align}
\lim_{n\rightarrow\infty}\|x_{n}\|=\inf_{x\in X}\|x\|.
\end{align}</span>
Show that <span class="math-container">$x_{n}$</span> converges in <span class="math-container">$\mathcal{H}$</span>. Is the limit of <span class="math-container">$x_{n}$</span> necessarily in <span class="math-container">$X$</span>?</p>
<p>I have tried to show that
<span class="math-container">\begin{align}
(x_{n}-x|x_{n}-x)\rightarrow 0,
\end{align}</span>
however I run into issues due to the limit of <span class="math-container">$\|x_{n}\|$</span> being defined as an infimum. In every case when the problem is reduced to <span class="math-container">$\|x_{n}-x\|$</span> I cannot make this go to zero because of the infimum. Also I have not identified the importance of <span class="math-container">$X$</span> being convex, this could also be the point I am missing. If this is the case could you please leave a small hint and allow me to return with more work.</p>
<p>EDIT: Is it true that <span class="math-container">$\inf_{x\in X}\|x\|\implies P_{X}(0)$</span>?</p>
| 0non-cybersec
| Stackexchange |
Python pairwise comparison of elements in a array or list. <p>Let me elaborate my question using a simple example.I have a=[a1,a2,a3,a4], with all ai being a numerical value. </p>
<p>What I want to get is pairwise comparisons within 'a', such as
I(a1>=a2), I(a1>=a3), I(a1>=a4), ,,,,I(a4>=a1), I(a4>=a2), I(a4>=a3), where I is a indicator function. So I used the following code.</p>
<pre><code>res=[x>=y for x in a for y in a]
</code></pre>
<p>But it also gives the comparison results like I(a1>=a1),..,I(a4>=a4), which is always one. To get rid of these nuisance, I convert res into a numpy array and find the off diagonal elements.</p>
<pre><code>res1=numpy.array(res)
</code></pre>
<p>This gives the result what I want, but I think there should be more efficient or simpler way to do pairwise comparison and extract the off diagonal element. Do you have any idea about this? Thanks in advance.</p>
| 0non-cybersec
| Stackexchange |
Are there any action filters in your project you feel are a must-have?. <p>I'm still not totally clear on why I would need to build custom action filters. Maybe a couple examples would help.</p>
<p>Are there any action filters in your project that you feel are a must-have? Maybe even so important that you re-use them across all your MVC projects?</p>
| 0non-cybersec
| Stackexchange |
Kit Harington Is Totally Unrecognizable Without His Beard. | 0non-cybersec
| Reddit |
$L^2(\Omega)/\Bbb{R}$ in cited reference?. <p>The following is a theorem in the preliminary material section of Constantin and Foias's "Navier-Stokes Equations": </p>
<blockquote>
<p>Let $\Omega\subset\Bbb{R}^n$ be an open bounded set with locally
Lipschitz boundary. </p>
<ul>
<li><p>If a distribution $p\in D'(\Omega)$ has all its first derivatives $D_ip$ in $L^2(\Omega)$ then $p\in L^2(\Omega)$ and
$$
\|p\|_{L^2(\Omega)/\Bbb{R}}\leq C(\Omega)\|\nabla p\|_{L^2(\Omega)^n}
$$</p></li>
<li><p>If a distribution $p$ has all its first derivatives in $H^{-1}(\Omega)$ then $p\in L^2(\Omega)$ and
$$
\|p\|_{L^2(\Omega)/\Bbb{R}}\leq C(\Omega)\|\nabla
p\|_{H^{-1}(\Omega)^n} $$</p></li>
</ul>
<p>In both cases, if no restriction is imposed on $\partial\Omega$ it
follows that $p\in L_{\hbox{loc}}^2(\Omega)$. By
$\|p\|_{L^2(\Omega)/\Bbb{R}}$ we mean $$
\inf_{c\in\Bbb{R}}\|p-c\|_{L^2(\Omega)}= \|p-\frac{\int_\Omega p \
dx}{|\Omega|}\cdot 1\|_{L^2(\Omega)}. $$</p>
</blockquote>
<p>The space $L^2(\Omega)/\Bbb{R}$ defined in the theorem looks quite strange to me (since the notation usually suggests a quotient space).
Could anyone come up with a cited reference about this space?</p>
| 0non-cybersec
| Stackexchange |
Appending an std::list into an vector of std::list. <p>I have a vector which is a collection of the list and that list is collection of ints. Like:</p>
<pre><code>std::vector<std::list<int> > vec;
</code></pre>
<p>I am trying to append an std::list at an index of std::vector.</p>
<p>Please consider this code:</p>
<pre><code>#include<iostream>
#include<list>
#include<vector>
namespace NM {
std::vector<std::list<int> > vec;
class CC {
public:
static void func();
};
}
void NM::CC::func() {
std::list<int> l1;
l1.push_back(1);
l1.push_back(2);
l1.push_back(3);
l1.push_back(4);
std::copy(l1.begin(), l1.end(), NM::vec.at(0).end());
// NM::ccInfo[0] = l1;
}
int main() {
NM::vec.resize(2);
NM::CC::func();
int index = 0;
for (; index != 1; index++) {
std::list<int> l2 = NM::vec.at(index);
std::list<int>::iterator it = l2.begin();
for (; it != l2.end(); ++it) {
std::cout << "Int = " << *it << std::endl;
}
}
}
</code></pre>
<p>I am expecting that it should append the list(l1) to NM::vec.at(0) inside func function, if anything already exists at MM::vec.at(0) exists. Another expection is that I should be able to get this information it inside main function. I do not see any output in main function.</p>
<p>Where did my expectation go wrong?</p>
| 0non-cybersec
| Stackexchange |
ICC Images from an iPSC Derived Neural Progenitor Cell Culture. | 0non-cybersec
| Reddit |
Is it okay to just secure (using SSL) the login page, but not the rest of the site?. <blockquote>
<p><strong>Possible Duplicate:</strong><br>
<a href="https://security.stackexchange.com/questions/258/what-are-the-pros-and-cons-of-site-wide-ssl-https">What are the pros and cons of site wide SSL (https)?</a> </p>
</blockquote>
<p>I'm creating a custom PHP/MySQL CMS for a client (because Wordpress is overkill for this client's particular needs). Now, I know this client uses a public wi-fi location quite a bit, so here's the question.</p>
<p>Say the CMS is located at <a href="http://customcms123.com" rel="nofollow noreferrer">http://customcms123.com</a> and the login page is located at <a href="http://customcms123.com/admin" rel="nofollow noreferrer">http://customcms123.com/admin</a></p>
<p>Does it make sense to encrypt just the login page, i.e. ? So once the user authenticates and goes to another page, say contact, it would look like <a href="http://customcms123.com/admin/contact.php" rel="nofollow noreferrer">http://customcms123.com/admin/contact.php</a> (not httpS in this case).</p>
<p>Is it possible for a packet sniffer (or any other tool) to detect the login credentials once the user has logged in? To rephrase the question, is it sufficient to secure just the login page?</p>
<p>I'm not a network guy, so I'm not sure what data gets transmitted over a public wi-fi as seen from a sniffing tool and what not.</p>
| 0non-cybersec
| Stackexchange |
This needs to stop. | 0non-cybersec
| Reddit |
What does this symbol mean in the following equation?. <p><a href="https://i.stack.imgur.com/btC6j.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/btC6j.png" alt="enter image description here"></a></p>
<p>$\Psi = \Psi(\mathbf{F})$ is a function of <strong>F</strong>, and $\mathbf{F}$ is a matrix.</p>
<p>$\mathbf{R}$ is matrix; $\lambda, \mu$ is scalar; $J = \mathrm{det}(\mathbf{F})$ </p>
| 0non-cybersec
| Stackexchange |
Reducing work in progress - should anyone really pick up any task?. <p>I'm in a Scrum environment, and we get feedback from the PO that all stories should be closed that are currently in progress before bringing in more stories. The goal is reducing WIP and getting stories accepted, which is a good goal. But would it really be wise to have, for instance, a DBA run a manual test script in order to close a particular story, when the part timer who does various "grunt" tasks will be available tomorrow? It seems this is the direction our PO wants to head in, but seems inefficient to me. What happens is that tomorrow the part timer is available, but there are no tasks for them, the only outstanding ones being "above their pay grade". </p>
<p>So it seems like a tension between reducing WIP and yet having people work on things that "make sense". Do you find its better for the team to have anyone work on any task? Or do you keep work open longer in order to have certain people do what they do best?</p>
| 0non-cybersec
| Stackexchange |
Can I update Ubuntu with active users logged in?. <p>I would like to run apt-get dist-upgrade, but I don't know how this will affect the currently logged in users. How can I find out:<br>
1. will a restart be required<br>
2. will the system be stable/functional until the restart if required (<a href="https://wiki.ubuntu.com/SoftwareUpdates#After_installing" rel="nofollow noreferrer">this page</a> implies that there are times when the server will become non-functional until the restart)<br>
3. will users have to log out before I run apt for updates to succeed </p>
| 0non-cybersec
| Stackexchange |
Lincolnshire Council forced to use pen and paper after ransomware attack. | 1cybersec
| Reddit |
[Fluff] How has your dog positively changed your life?. Before getting a dog I always felt weird about going on walks and hikes by myself. I love nature and being outside, and now I always have a hiking and walking buddy. As a result of walking with my dog every day I've seen plenty of people who walk by themselves, and on a recent vacation without my dog I didn't feel weird at all going for a solo walk. How has your dog changed your life for the better? | 0non-cybersec
| Reddit |
Setting up JUnit with IntelliJ IDEA. <p>Familiar with Java but unfamiliar with IntelliJ, how does one "get started" with JUnit integration?</p>
<p>Inspired by <a href="https://stackoverflow.com/questions/4183021/looking-for-a-tutorial-on-using-junit-with-intellij-idea-9-x">Looking for a tutorial on using JUnit with Intellij IDEA 9.x</a> which didn't answer my questions and was for an older version of IntelliJ.</p>
| 0non-cybersec
| Stackexchange |
Hey Reddit! I've just finished cloning the first of many copies of myself. Check him out!. | 0non-cybersec
| Reddit |
Why is Cholesky factorization numerically stable. <p>It's often stated (eg: in Numerical Recipes in C) that Cholesky factorization is numerically stable even without column pivoting, unlike LU decomposition, which usually need pivoting schemes.</p>
<p>But I've never seen a proof or argument for why that's true. Does it have to do with the matrix class it works on being Positive Definite? If you LU decompose Positive Definite matrices without pivoting is it still numerically unstable?</p>
| 0non-cybersec
| Stackexchange |
عاصفة العصافير. | 0non-cybersec
| Reddit |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
What is the difference between PXE and Wake-on-LAN (WoL)?. <p>They seem to serve the same purpose which is the ability to boot a client/machine as long as it's connected to a network and thus has a <a href="http://en.wikipedia.org/wiki/Network_interface_controller" rel="nofollow noreferrer">NIC</a>.</p>
<p>What is the difference between the two with respect to how they work?</p>
<p>Is there a clear advantage of using WoL (Wake-on-LAN) over PXE (Preboot eXecution Environment) or vice versa?</p>
<p>Also, both WoL and PXE are OS-agnostic, right?</p>
| 0non-cybersec
| Stackexchange |
Texan schoolgirl expelled for refusing to wear RFID tag. | 0non-cybersec
| Reddit |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
Using secure proxies with Google Chrome. <p>Whenever I use a secure proxy with Google Chrome I get <code>ERR_PROXY_CERTIFICATE_INVALID</code>, I tried a lot of different scenarios and versions.</p>
<h1>The certificate</h1>
<p>I'm using a self-signed certificate:</p>
<pre><code>openssl genrsa -out key.pem 1024
openssl req -new -key key.pem -out request.pem
openssl x509 -req -days 30 -in request.pem -signkey key.pem -out certificate.pem
</code></pre>
<p><strong>Note:</strong> this certificate works (with a warning since it's self-signed) when I try to setup a simple HTTPS server.</p>
<h1>The proxy</h1>
<p>Then I start a secure proxy on <code>localhost:8080</code>. There are a several ways to accomplish this, I tried:</p>
<ul>
<li>a custom <a href="http://nodejs.org/" rel="nofollow noreferrer">Node.js</a> script;</li>
<li><a href="https://www.stunnel.org" rel="nofollow noreferrer">stunnel</a>;</li>
<li><a href="https://github.com/igrigorik/node-spdyproxy" rel="nofollow noreferrer">node-spdyproxy</a> (OK, this involves SPDY too, but later... the problem is the same);</li>
<li>[...]</li>
</ul>
<h1>The browser</h1>
<p>Then I run Google Chrome with:</p>
<pre><code>google-chrome --proxy-server=https://localhost:8080 http://superuser.com
</code></pre>
<p>to load, say, <code>http://superuser.com</code>.</p>
<h1>The issue</h1>
<p>All I get is:</p>
<pre><code>Error 136 (net::ERR_PROXY_CERTIFICATE_INVALID): Unknown error.
</code></pre>
<p>in the window, and something like:</p>
<pre><code>[13633:13639:1017/182333:ERROR:cert_verify_proc_nss.cc(790)] CERT_PKIXVerifyCert for localhost failed err=-8179
</code></pre>
<p>in the console.</p>
<p><strong>Note:</strong> this is not the big red warning that complains about insecure certificates.</p>
<hr>
<p>Now, I have to admit that I'm quite <em>n00b</em> for what concerns certificates and such, if I'm missing some fundamental points, please let me know.</p>
| 0non-cybersec
| Stackexchange |
Representations as a sum of cubes following Jacobi. <p>Jacobi connected the generating function counting the number of representations as a square with elliptic trigonometry and use Fourier series to find the exact congruence condition and formula for counting representations as a sum of three squares <a href="http://www.math.osu.edu/~econrad/Jacobi/sumofsq/sumofsq.html" rel="nofollow">[1]</a>.</p>
<p>To be precise it was the theta function $$1 + \sum_{n=1}^\infty 2 q^{n^2}$$ </p>
<p>I was wondering if it was possible to use this approach on positive cubes $$\sum_{n=1}^\infty q^{n^3}$$ and integer cubes $$\sum_{n=-\infty \ldots \infty} q^{n^3}$$ since there is no useful algebraic object (like the Gaussian integers, quaternions and such) for cubes.</p>
| 0non-cybersec
| Stackexchange |
To the person who invented blister packaging: FUCK YOU!. May you fall into a vat of half opened blister packs. | 0non-cybersec
| Reddit |
I need compute a rational limit that involves roots. <p>I need compute the result of this limit without l'hopital's rule, I tried different techniques but I did not get the limit, which is 1/32, I would appreciate if somebody help me. Thanks.</p>
<p>$$\lim_{y\to32}\frac{\sqrt[5]{y^2} - 3\sqrt[5]{y} + 2}{y - 4\sqrt[5]{y^3}}$$</p>
| 0non-cybersec
| Stackexchange |
Google "GO" Programming Language used by Malware Coders. | 1cybersec
| Reddit |
Dynamic fields in Django Admin. <p>I want to have additional fields regarding value of one field. Therefor I build a custom admin form to add some new fields.</p>
<p>Related to the blogpost of jacobian <a href="http://jacobian.org/writing/dynamic-form-generation/" rel="noreferrer" title="blogpost">1</a> this is what I came up with:</p>
<pre><code>class ProductAdminForm(forms.ModelForm):
class Meta:
model = Product
def __init__(self, *args, **kwargs):
super(ProductAdminForm, self).__init__(*args, **kwargs)
self.fields['foo'] = forms.IntegerField(label="foo")
class ProductAdmin(admin.ModelAdmin):
form = ProductAdminForm
admin.site.register(Product, ProductAdmin)
</code></pre>
<p>But the additional field 'foo' does not show up in the admin. If I add the field like this, all works fine but is not as dynamic as required, to add the fields regarding the value of another field of the model</p>
<pre><code>class ProductAdminForm(forms.ModelForm):
foo = forms.IntegerField(label="foo")
class Meta:
model = Product
class ProductAdmin(admin.ModelAdmin):
form = ProductAdminForm
admin.site.register(Product, ProductAdmin)
</code></pre>
<p>So is there any initialize method that i have to trigger again to make the new field working? Or is there any other attempt?</p>
| 0non-cybersec
| Stackexchange |
We’re recognising, rewarding and inspiring journalists all over the globe. | 1cybersec
| Reddit |
MRW when my friend tells an offensive joke. | 0non-cybersec
| Reddit |
Trying to connect Microsoft QnA maker service with Bot Framework but not getting any reply from my bot. <pre><code>Bot Framework Emulator
[18:48:31] -> POST 202 [conversationUpdate]
[18:48:31] -> POST 202 [conversationUpdate]
[18:48:36] -> POST 202 [message] hello
[18:48:37] Warning: The Bot Framework State API is not recommended for production environments, and may be deprecated in a
future release. Learn how to implement your own storage adapter.
[18:48:37] <- GET 200 getPrivateConversationData
[18:48:37] <- GET 200 getUserData
[18:48:37] <- GET 200 getConversationData
[18:48:37] <- POST 200 setPrivateConversationData
[18:48:37] <- POST 200 Reply[event] Debug Event
</code></pre>
<p>I'm new to Microsoft bot framework, trying to build basic bot using QnA maker</p>
<p>But I got stuck in connecting QnA maker service with <code>app.js</code>.</p>
<p>Not getting the response from QnA maker.</p>
<pre><code>$ nodemon app.js
[nodemon] 1.17.5
[nodemon] to restart at any time, enter `rs`
[nodemon] watching: *.*
[nodemon] starting `node app.js`
restify listening to http://[::]:3978
WARN: ChatConnector: receive - emulator running without security enabled.
ChatConnector: message received.
WARN: ChatConnector: receive - emulator running without security enabled.
ChatConnector: message received.
WARN: ChatConnector: receive - emulator running without security enabled.
ChatConnector: message received.
The Bot State API is deprecated. Please refer to https://aka.ms/I6swrh for details on how to replace with your own storage.
UniversalBot("*") routing "hello" from "emulator"
Session.beginDialog(/)
/ - Session.sendBatch() sending 0 message(s)
The Bot State API is deprecated. Please refer to https://aka.ms/I6swrh for details on how to replace with your own storage.
</code></pre>
<p><strong>app.js</strong></p>
<pre><code>const restify = require('restify');
const builder = require('botbuilder');
const cognitiveServices = require('botbuilder-cognitiveservices');
//connecting to server
const server = restify.createServer();
server.listen(process.env.port || process.env.PORT || 3978,
function () {
console.log('%s listening to %s',server.name,server.url);
}
);
const connector = new builder.ChatConnector({
appId: process.env.MicrosoftAppId,
appPassword: process.env.MicrosoftAppPassword
});
//listening post from server
server.post('/api/messages', connector.listen());
var bot = new builder.UniversalBot(connector);
const recognizer = new cognitiveServices.QnAMakerRecognizer({
knowledgeBaseId: "ffek8d39-dldc-48df-a9db-d902efc18cda",
subscriptionKey: "881jc9eb-1a5b-4a10-bi89-233afh83ce98",
});
const qnaMakerDialog = new cognitiveServices.QnAMakerDialog({
recognizers: [recognizer],
defaultMessage: "Sorry I don't understand the question",
qnaThreshold: 0.4,
});
bot.dialog('/', qnaMakerDialog);
</code></pre>
| 0non-cybersec
| Stackexchange |
I'm a queer atheist and my homophobic conservative Christian father has no idea. Whenever I go to my father for advice all he does is tell me to read the Bible. He would probably disown me if he knew I wasn't straight since he has already disowned my sister. I have no idea how he would react to me being an atheist. Part of me thinks finding out everything might actually affect his health. So, I decided several years ago to never tell him anything. | 0non-cybersec
| Reddit |
LensRentals autofocus articles series continues: Age matters.. | 0non-cybersec
| Reddit |
XFCE hangs with hand cursor. <p>I am using Xubuntu 12.04 in a remote environment. Of late, I am observing that sometimes the cursor turns into a hand and stops responding. I cannot do anything to fix it.</p>
<p>The only solution seems to be to terminate the XFCE session and re-login.</p>
<p>I am observing this when using a remote connection. Anyone seen this or know a solution or workaround? I am just frustrated with this problem coming up every so often.</p>
<p>The LD_PRELOAD method doesn't seem to work for me. Is there a command line way to generate <code>AllowDeactivateHold</code>?</p>
<p>Can we use <code>xinput</code> to create the effect of <code>AllowDeactivateHold</code>?</p>
| 0non-cybersec
| Stackexchange |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.