text
stringlengths 3
1.74M
| label
class label 2
classes | source
stringclasses 3
values |
---|---|---|
Why Trundle is 4.8k!. Riot is *troll*ing their fanbase!
| 0non-cybersec
|
Reddit
|
How long did earth have the conditions to support life before it appeared. As I understand it the earth has been around for 4.6 billion years and has hosted life for 3.5 billion. I suspect however that a lot of the previous 1.1 billion years the planet was pretty inhospitable (surface of magma, etc) So what's the best estimate for how long it took life to appear once earth developed the conditions favorable for it. The posts about the new superhospitable planet got me to thinking.
| 0non-cybersec
|
Reddit
|
As talk on this subreddit angles towards the Note 10 launch, missing headphone jacks and saving HTC, LG and Sony...there's one thing that seems to be in phone manufacturers' blindspots.... It seems like many manufacturers are battling to create innovation in the market and ways to differentiate themselves from the pack. They now turn to things like bezelless designs, 3+ cameras on the back etc. but there's one thing which I think could differentiate a phone from the rest of the standard slabs nowadays. That is the physical keyboard. Why the hell have manufactures moved away from that. Just have a look at the Nokia E7 or the HTC Desire Z. Remember these?
https://i.imgur.com/vjGjEfN.jpg
Those were already great devices back then, imagine how good and reliable the mechanisms could be with today's technology as well as the fun little shortcuts and quirks they can implement today.
And also in particular, looking at you HTC, who seems to be dying a slow death. I reckon mating a physical keyboard like in the Desire Z to a great Sense skin, top-of-the-line specs as well as a great price, could pull you out of the depths of hell you are in right now.
https://i.imgur.com/zWaQ1Vk.jpg
| 0non-cybersec
|
Reddit
|
Average integral for continuous functions with compact support. <p>Let $f$ be a continuous function with compact support in $\mathbb{R}^n$. Show that
\begin{equation}
\lim_{r\to 0} \frac{1}{|B_r(x)|} \int_{B_r(x)} f(y)\,dy = f(x),
\end{equation}
where $B_r(x)$ is the ball of radius $r$ centered at $x$.</p>
<p>In 1d, it looks like the Fundamental Theorem of Calculus. However, I'm not sure how to prove it in higher dimensions. How can I use the "compact support"?</p>
<p>Thank you.</p>
| 0non-cybersec
|
Stackexchange
|
antibiotics resistance explained.
| 0non-cybersec
|
Reddit
|
Redneck DUI. A routine police patrol parked outside a bar in Austin , Texas. After last call the officer noticed a man leaving the bar so apparently intoxicated that he could barely walk.
The man stumbled around the parking lot for a few minutes, with the officer quietly observing. After what seemed an eternity in which he tried his keys on five different vehicles, the man managed to find his car and fall into it.
He sat there for a few minutes as a number of other patrons left the bar and drove off.
Finally he started the car, switched the wipers on and off–it was a fine, dry summer night, flicked the blinkers on and off a couple of times, honked the horn and then switched on the lights.
He moved the vehicle forward a few inches, reversed a little and then remained still for a few more minutes as some more of the other patrons’ vehicles left.
At last, when his was the only car left in the parking lot, he pulled out and drove slowly down the road.
The police officer, having waited patiently all this time, now started up his patrol car, put on the flashing lights, promptly pulled the man over and administered a breathalyzer test.
To his amazement, the breathalyzer indicated no evidence that the man had consumed any alcohol at all!
Dumbfounded, the officer said, I’ll have to ask you to accompany me to the police station. This breathalyzer equipment must be broken.’
“I doubt it”, said the truly proud Redneck. ‘Tonight I’m the designated decoy.’
| 0non-cybersec
|
Reddit
|
Man, gaming routers sure are weird....
| 0non-cybersec
|
Reddit
|
Asymptotic distribution of random variables. <p>Let $\left(\varepsilon_{n}\right)_{n \in \mathbb{N}}$ be a sequence of idependent random variables with $0$ mean and finite variance, say $\sigma^{2}$, and let $\alpha$ be a real number such that $0 < \left| \alpha \right| < 1$. Now, for every $n \in \mathbb{N}$, set $$X_{n} = \sum_{j=1}^{n}{ \alpha^{n-j} \varepsilon_{j}}.$$ When the $\varepsilon_{n}$'s are normally distributed, it can be shown that the characteristic function of $X_{n}$ is
$$\varphi_{X_{n}}{\left( t \right) } = \exp{\left(-\frac{1}{2} \frac{\sigma^{2} \left(1-\alpha^{2n} \right) }{1-\alpha^{2} } t^{2} \right)} $$ and, thus, we obtain
$$ \varphi_{X_{n}} \left(t\right) \to \exp {\left(-\frac{1}{2} \frac{\sigma^{2}}{1-\alpha^{2}}t^{2} \right) } \text{ as } n\to+\infty. $$ My question is: Does the limit above still hold if we just merely assume that the $\varepsilon_{n}$'s have $0$ mean and the same variance, say $\sigma^{2}$? So far, I think the answer is negative, but I could not find an example for it. </p>
<p>Any help would be appreciated. Thank you in advance.</p>
| 0non-cybersec
|
Stackexchange
|
Can someone help me identify what model this Macbook is?. [Here's](https://imgur.com/a/DJ6DCBB) some pictures of it
It's a second hand laptop that's going to be given to me to help me with school stuff. The catch is that there's no charger and one key is missing. I'm fine with the missing key since I can't really complain but the charger is obviously essential to using the laptop so I'm hoping to buy a new one as soon as possible. The problem is, the owner doesn't really know what model it is and I don't have any idea either so I don't know what charger cable I should be buying. So I was hoping y'all would be able to identify what it is.
Oh and I can't open the laptop since it's not with me yet. Hoping that the picture would be enough to see what it is.
Edit: thanks to all who replied. I'm going too assume it's Late 2008
| 0non-cybersec
|
Reddit
|
prevent program from influencing terminal?. <p>Some program started in a large script is doing <code>stty -echo</code>. I'm not sure which program it is so I have to try to find it by trial and error. Is <code></dev/null 2>&1 | tee /dev/null</code> sufficient to block programs from accessing the terminal, or is there another way to get access to the terminal?</p>
<p>Actually I was unable to determine which program accesses the terminal (attempts to <code>strace</code> the entire script produced a 17MB file without <code>tcsetattr</code>, so I assume the terminal modifications are just writes of control characters). The problem was also non-deterministic; it was sometimes interfering with the terminal and sometimes not.</p>
<p>Placing the following prelude in the script <del>seemed to stop interference with the terminal</del> doesn't fix the problem. However, it's not clear why it doesn't fix the problem: are processes still accessing the terminal through <code>/dev/tty</code>, or are escape codes written by the programs still being dumped to the terminal by <code>cat</code>.</p>
<pre><code>MKTEMP="$(mktemp)"
mkfifo "$MKTEMP".fifo
(
set +o xtrace
cat "$MKTEMP".fifo
rm -f "$MKTEMP".fifo "$MKTEMP"
) </dev/null 2>&1 &
exec 1>"$MKTEMP".fifo
exec 2>&1
exec 0</dev/null
</code></pre>
| 0non-cybersec
|
Stackexchange
|
Checkoin: physical crypto-cash. Hi all, my name is Camille, I'm a senior software developer, as well as freedom, privacy, and economical independence advocate. As a response to the war on cash I have drafted a protocol allowing to create secure and decentralized cash, physically carrying (or backed by) valuable assets. Basically, it allows to manufacture physical packagings (containing sealed assets), and exchange them safely from hand to hand between untrusted people. The protocol authenticates the packaging integrity as unique, non-duplicated, not counterfeited, not tampered with, not unsealed, etc. thanks to several layers of verifications*. Until someone decides to retrieve the asset by unsealing it, thus tossing/destroying the packaging. It was first designed to exchange crypto-currencies cold wallets like cash, but in practice it can carry any other type of valuable information or transportable assets (gold nugget, medicine, coupon, organic seeds, etc.). It is anonymous (no end-user identification, no transaction, no wallet), network failure/censorship resistant, open source and decentralized. The packagings manufacturing is not part of the protocol, but left to the innovation of whomever aims to run such a business (crypto startups, precious metal minters, etc.). I've looked for people to review it, but hardly could find any with skills and/or time to do so. Yesterday a friend of mine suggested me this subreddit, so I try my luck in the hope of finding help for reviewing, strategy advise and means to implement it.
Here is the website: https://checkoin.org/
Thank you very much,
Freely,
Camille.
* The technical aspect needs to be understood in details and as a whole. But I know that it is repulsive and tedious, so I try here to synthesize the basics. There are three main layers of verifications, first one is geolocation (non mandatory, anonymous and optionally encrypted) in order to detect duplicate UUID in circulation (distance and time would become inconsistent, so the packaging identified as corrupted), second layer is the display of information about the packaging provided by the manufacturer (e.g. hologram check information, high resolution of the packaging when manufactured with unique details such as random paint splashes, etc.) and third layer is an optional cryptographic check if the package comes with a microchip (recommended for packagings carrying high value assets) which retrieves the public key of the microchip on the blockchain and asks it to sign random data with the private key present in the chip.
| 1cybersec
|
Reddit
|
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
|
Stackexchange
|
A question about Euler's Totient: $\frac1 {\phi(n)} = \frac1 n \sum_{d|n} \frac{\mu(d)^2}{\phi(d)}$. <p><em>Show that $\frac1 {\phi(n)} = \frac1 n \sum_{d|n} \frac{\mu(d)^2}{\phi(d)}$ for all positive integers n</em></p>
<p>In class we solved this question by observing that both sides are multiplicative functions and they should be equal at prime values. There is this another method we have done that I cant understand. I have to express right-hand side(the summation) as a multiplication but I just cant figure out. It would be better if you could give me a hint. Thanks in advance.</p>
| 0non-cybersec
|
Stackexchange
|
ASP.NET CORE Web API - delete action not firing (404 not found). <p>I have a simply controller to CRUD operations. All actions works expect the last action named Delete which is HTTP DELETE action. When I try call delete action with example url: </p>
<blockquote>
<p><a href="http://localhost/api/groups/1/attendances/10" rel="noreferrer">http://localhost/api/groups/1/attendances/10</a></p>
</blockquote>
<p>then application returns 404 Not Found and action is not firing.</p>
<p>In my other controllers delete action works correctly. One difference is that in others controllers I have one route attribute on controller instead of on each action. This is a problem?</p>
<pre><code>public class AttendancesController : Controller
{
public AttendancesController(IGroupService groupService, IAttendanceService attendanceService, IPersonService personService, IPersonAttendanceService personAttendanceService)
{
//
}
[Route("api/groups/{groupId}/[controller]")]
[HttpGet]
public IActionResult GetAttendancesForGroup(int groupId)
{
//
}
[Route("api/groups/{groupId}/[controller]/{date}")]
[HttpGet]
public IActionResult GetAttendanceForGroup(int groupId, DateTime date)
{
//
}
[Route("api/groups/{groupId}/[controller]")]
[HttpPost]
public IActionResult CreateAttendanceForGroup(int groupId, [FromBody] AttendanceCreateDto dto)
{
//
}
[Route("api/people/{personId}/[controller]")]
[HttpGet]
public IActionResult GetAttendancesForPerson(int personId)
{
//
}
[Route("api/groups/{groupId}/[controller]")]
[HttpDelete("{id}")]
public IActionResult Delete(int groupId, int id)
{
var group = _groupService.FindById(groupId);
if (group == null)
return NotFound();
var attendance = _attendanceService.GetAttendanceByIdAndGroupId(id,groupId);
if (attendance == null)
return NotFound();
_attendanceService.Delete(attendance);
return NoContent();
}
}
</code></pre>
| 0non-cybersec
|
Stackexchange
|
Phil Spencer on Twitter: "it will be worth checking the XBOX One store this weekend.".
| 0non-cybersec
|
Reddit
|
Furniture online | Baby Furniture, Room & Outdoor Furniture| Lyallway.
| 0non-cybersec
|
Reddit
|
What are the "Diffie-Hellman parameters" that needs to be generated for SSL?. I was following this tutorial on setting up a VPN on ubuntu (https://www.digitalocean.com/community/tutorials/how-to-set-up-an-openvpn-server-on-ubuntu-14-04)
and I wanted to understand what this line does
openssl dhparam -out /etc/openvpn/dh2048.pem 2048
They said "We need to generate the Diffie-Hellman parameters; this can take several minutes".
I assume it's linked to generating a private and public key, but that's done using the ./build-ca command when they create the server.key and server.crt file.
What is the use of this pem file?
Thank you.
| 1cybersec
|
Reddit
|
"I Don't Want Children -- Ever.".
| 0non-cybersec
|
Reddit
|
Mine Craft with Space Ships.
| 0non-cybersec
|
Reddit
|
A step-by-step violin making website with plans. Here is the link for a step by step guide on violin making. Included are plans for the Messiah violin.
http://www.makingtheviolin.com
| 0non-cybersec
|
Reddit
|
How can I stop the ads appearing on my desktop?. <p>I just bought an HP Windows 7 workstation. Every time I boot up the machine a series of ads appears on my desktop. For example, right now I have "HP Protection Advisory. Never lose an important file again! [bla bla bla...]" Then the only options are "Learn more" "Get Started" and "Remind me later". There is no "stop interrupting me with ads" option that I can find.</p>
<p>Is there some reasonably efficient way to remove this junk and crap from my computer without risking screwing it up and rendering it useless?</p>
| 0non-cybersec
|
Stackexchange
|
A nice expression for $P(X>Y, X>Z)$ where $X$ is standard normal, $Y, Z$ are normal with mean 1 and variance 1?. <p>I accidentally asked my students a question that reduced to the following: find $P(X>Y, X>Z)$ where $X, Y$, and $Z$ are independent, $X$ is standard normal, and $Y$ and $Z$ are both normal with mean $1$ and variance $1$.</p>
<p>Then I sat down to write a solution to the question. Of course this probability can be rewritten as $P(X>\max(Y,Z))$. The CDF of $\max(Y,Z)$ is $\Phi(y-1)^2$ where $\Phi$ is the standard normal cdf. The joint density of $X$ and $\max(Y,Z)$ is therefore $\phi(x) {d \over dx} \Phi(y-1)^2$ or $2 \phi(x) \phi(y-1) \Phi(y-1)$. (Here $\phi$ is the standard normal density.) Integrating this joint density over the half-plane $x > y$ gives the expression
$$ \int_{-\infty}^\infty \phi(x) \Phi(x-1)^2 \: dx $$
which can be evaluated numerically -- it's about $0.113202$ - but I don't recognize this number. </p>
<p>Is there some way to write this number in terms of, say, values of $\phi$ and $\Phi$ (without integrating)?</p>
<p>Also, the context here was as follows: let $X_1, \ldots, X_n$ be standard normal and let $Y_1, \ldots, Y_n$ be normal(1,1). Find the variance of the number of pairs $(i, j)$ such that $X_i > Y_j$. My method is to write that variance as a sum of $n^2$ indicators and find covariances of those indicators, leading to the probability I opened the problem with. Is there a solution to this problem that <em>doesn't</em> go via $P(X>Y, X>Z)$, which seems annoyingly hard to find?</p>
| 0non-cybersec
|
Stackexchange
|
Sand viper blending in.
| 0non-cybersec
|
Reddit
|
My local pizza joint uses drawings kids make as their menu covers. This one was mine tonight..
| 0non-cybersec
|
Reddit
|
Taxes??.
| 0non-cybersec
|
Reddit
|
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
|
Stackexchange
|
How to find the large directory which is reserving the biggest disk space?. <p>How to find (as grouped) the directory who is taking all the disk spaces?</p>
<pre><code># df -h
Filesystem Size Used Avail Use% Mounted on
/dev/vda1 60G 54G 6.4G 90% /
devtmpfs 1.4G 0 1.4G 0% /dev
tmpfs 1.4G 0 1.4G 0% /dev/shm
tmpfs 1.4G 161M 1.3G 12% /run
tmpfs 1.4G 0 1.4G 0% /sys/fs/cgroup
tmpfs 285M 0 285M 0% /run/user/0
</code></pre>
<p>It does not help to see /dev/vda1 is 90%, how to check which directories having the largest disk reserve?</p>
<p>example:</p>
<pre><code>/var/log/httpd 20GB
/var/log/pluto 10GB
/var/log/syslog 5GB
/var/log/tcpdump 1GB
/... restGB
</code></pre>
| 0non-cybersec
|
Stackexchange
|
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
|
Stackexchange
|
Covariance of X^2 Y^2 when Cov(X,Y) = 0?. <p>If you have that X and Y are independent random variables and their covariance is equal to zero, then is the <span class="math-container">$Cov(X^2, Y^2)$</span> zero as well? I feel like this is too good to be true, but I cannot come up with a conclusion.</p>
| 0non-cybersec
|
Stackexchange
|
Managing Security Groups for NTFS Permissions. <p>To start off with, I work for a company that a long time ago when they implemented file shares for each division, they also broke the cardinal rule of NTFS permissions and used explicit permissions for users on certain folders. To give an example of our set up, every user has a W: drive. The W: drive hierarchy is similar to the following:</p>
<p>W:\HR</p>
<p>W:\Legal</p>
<p>W:\Finance</p>
<p>W:\Communications</p>
<p>I'm pretty sure at one point, these folders were fairly organized. But then came the complex situation where someone in Legal needed access to HR documents, someone in Finance needed access to Legal documents, then there's the odd cases where 2 different people from different subdivisions of legal need access to a specific folder in the legal folder, but they don't want anyone else to have access to this folder. To which the IT department at that time felt the best solution would be to just give explicit permissions to those people. </p>
<p>Since I've started at this job 7 years ago, I've been hinting at creating security groups for these instances (even if it's only for one user account) because when users leave, we remove them from all groups, and put them in a Former Employees OU for 5 years, but their explicit permissions remain on the folders in the file share. </p>
<p>When I make hints of creating security groups for these instances, the counter argument is, "How will we manage all the empty groups when people leave? How would we organize and name these groups in AD?"</p>
<p>For the first argument, I propose a simple powershell script to delete empty groups or just to leave them in place for any future employees requesting the same access to specific folders.</p>
<p>The second argument though is where I am having trouble coming up with a good solution. So after that brief novel, I'd simply like to ask for any tips or examples on organizing security groups in AD for NTFS permissions when faced with the situations I listed above.</p>
<p>One thought I had was to create an OU just for special NTFS permissions groups, name the groups after the folders they give access to , and put the full filepath in the description.</p>
<p>If anyone has any better ideas or if anyone does this differently, I'm open to suggestions.</p>
| 0non-cybersec
|
Stackexchange
|
Normal generating set for the intersection of two normal subgroups of a surface group. <p>Let $G = \left< a_1,b_1, ... , a_g, b_g | [a_1,b_1] \cdots [a_g,b_g] \right>$ be the fundamental group of a surface of genus $g$. Let $N_1$ and $N_2$ be two normal subgroups of $G$ that are described explicitly as the normal closures of two finite sets of words say $H_1 = \left< x_1,...,x_n \right> ^N$ and $H_2 = \left< y_1,...,y_m \right>^N$. </p>
<p>Is it always true that $N_1 \cap N_2$ will be finitely normally generated? Is there a procedure for finding a normal generating set for $N_1 \cap N_2$? </p>
| 0non-cybersec
|
Stackexchange
|
Piqué fighting back tears post-match: 'If any directors or if the Spanish FA believe that I could be a problem or annoy the national team then I am willing to step aside'.
| 0non-cybersec
|
Reddit
|
Showing $f(a,a)\ne f(b,b) \forall a,b \in S, a\ne b$. <p>Question:</p>
<blockquote>
<p>Let $S=\{1,2,3,...,n\}$ where n is an odd integer. Let $f$ be a function defined on $\{(i,j):i,j\in S\}$ with properties such that:<br>
a) $f(s,r)=f(r,s)$<br>
b) $\{f(r,s):s\in S\}=S \space\forall\space r\in S$<br>
Prove $\{f(r,r):r\in S\}=S$</p>
</blockquote>
<p>I have concluded that we can make a table just like a Sudoku that is symmetric across the diagonal. Each row and column would hold each element in S exactly once. I feel like the fact that n is odd is important but I'm not able to bring it in play. Basically we need to show the diagonal has no repetition of elements</p>
<p>Any help will be appreciated</p>
| 0non-cybersec
|
Stackexchange
|
As realistically as possible, how do you think society, media and the victims would react if 100 MALE celebrities had nude photos hacked?. Do you think the victims (for example, Robert Pattinson, David Beckham etc etc - 100 fairly desirable male celebrities of various ages) would deny the photos are of them? How would they act differently?
How about the media, how would it be reported differently as today's leaks?
And how would society and the Internet act? Would there be less 'shouldn't have posed naked, dumb men!' or maybe more?
I'm interested in how this would play out if it was naked male celebrities photos leaked online.
| 0non-cybersec
|
Reddit
|
Do native screensavers have a hidden configuration to show image file name/path?. <p>I have an archive of images. When they're displayed as a screensaver rotation, I'd like their names (and maybe the paths they're organized under) to show as an overlay to the image. </p>
<p>I don't really want to run a script that 'watermarks' the name or path permanently on the image.</p>
<p>I'd also think it's worthwhile to hear about 3rd-party screensavers that do this — though I think in that case it should be limited to one answer that gets edited by everyone (and eventually becomes a community-answer). It'll change over time and need constant revision.</p>
<p>I'm on Mojave, but anything available for an in-support OS is fine.</p>
| 0non-cybersec
|
Stackexchange
|
404 error with nginx and wordpress. <p>My wordpress site has been working fine for sometime with nginx and wordpress. But for some reason it is now giving me a 404 error. I think this may be related to the quick-cache plugin which I recently updated. Although I'm not 100% sure about this. </p>
<p>To setup wp-nginx I following <a href="https://www.digitalocean.com/community/tutorials/how-to-install-wordpress-with-nginx-on-ubuntu-12-04" rel="nofollow noreferrer">these</a> instructions. So far I've done the following</p>
<ul>
<li>deleted my plugin directory </li>
<li>removed reference to quick-cache from wp-config.php /wp-content folder </li>
<li>checked my nginx config which is below</li>
</ul>
<p>However after restarting I still get the same 404 error. Would anyone know what could be wrong..?</p>
<pre><code>server {
listen 80;
root /var/www;
index index.php index.html index.htm;
server_name mysite.com;
location / {
try_files $uri $uri/ /index.php?q=$uri&$args;
}
error_page 404 /404.html;
error_page 500 502 503 504 /50x.html;
location = /50x.html {
root /var/www;
}
# pass the PHP scripts to FastCGI server listening on the php-fpm socket
location ~ \.php$ {
try_files $uri =404;
fastcgi_pass unix:/var/run/php5-fpm.sock;
fastcgi_index index.php;
include fastcgi_params;
}
</code></pre>
<p>}</p>
| 0non-cybersec
|
Stackexchange
|
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
|
Stackexchange
|
Is it possible to reconstruct graph if we have given matrix of shortest pairs. <p>I'm trying to reconstruct graph if we have given the result of floyd-warshall algorithm, more formally:</p>
<p>Let's say we have given undirected weighted tree (graph without cycles) with $N$ nodes, such that from this graph we only have given matrix $g$ of size $N \cdot N$ elements, such that $g(i, j)$ gives the shortest path between nodes $i$ and $j$, note that it doesn't mean that nodes $i$ and $j$ are directly connected with edge.</p>
<p><strong>What I think</strong></p>
<p>We can say that node $x$ belongs on the path from node $a$ to node $b$ if and only if: $g(a,b) = g(a, x) + g(x, b)$.</p>
<p>If we fix nodes $a$ and $b$ in $O(N \cdot N)$ and we iterate over all other nodes, we will get total complexity of $O(N^3)$.</p>
<p>Is it possible to reduce this complexity to $O(N^2)$.</p>
<p>Thanks in advance.</p>
| 0non-cybersec
|
Stackexchange
|
TIL The TSA Spent $900 Million on Behavior Detection Officers Who Detected 0 Terrorists.
| 0non-cybersec
|
Reddit
|
Using a canonical link with non-duplicate pages. <p>I want to use canonical tag for <code>index.php</code> and all versions of <code>index.php</code> below:</p>
<pre><code> index.php
index.php?something
index.php?somethingsomething
</code></pre>
<p>I also have URLs like:</p>
<p><code>someproduct.html</code> </p>
<p>However, I am using packaged software and cannot add a canonical link to just <code>index.php</code> and its variations, the software will also add it to <code>someproduct.html</code>. </p>
<p>Do you know how Google will respond to <code>someproduct.html</code> page if I do this?</p>
| 0non-cybersec
|
Stackexchange
|
Prove an inequality. <p>for $x > -1$, Prove the following inequality: </p>
<p>$$\left( {\ln (1 + x) + \sum\limits_{k = 1}^n {\frac{{{{( - 1)}^k}{x^k}}}{k}} } \right){( - x)^{n + 1}} \le 0$$</p>
<p>Following the advice to use Lagrange's reminder: </p>
<p>$${R_n} = \frac{{\ln {{(1 + c)}^{(n)}}}}{{(n + 1)!}}{x^{n + 1}}$$. </p>
<p>So, the all expression now looks like this: </p>
<p>$$\frac{{\ln {{(1 + c)}^{(n+1)}}}}{{(n + 1)!}}{x^{n + 1}}{( - x)^{n + 1}}$$</p>
<p>Taking into account that:</p>
<p>$$\ln {(1 + c)^{(n+1)}} = - \frac{1}{{{{(c + 1)}^{n + 1}}}}$$</p>
<p>We get: </p>
<p>$$- \frac{1}{{(n + 1)!{{(c + 1)}^{n + 1}}}}{x^{n + 1}}{( - x)^{n + 1}}$$</p>
<p>So, when $n \in \mathbb{N}_{odd}$, it's true that the expression is negative.<br>
What about the case where $n \in \mathbb{N}_{even}$</p>
| 0non-cybersec
|
Stackexchange
|
jQuery throttling and queuing of AJAX requests. <p>I'm interacting with an API that allows one action per 5 seconds. However, I want to ensure all requests end up with the host. How can I queue and throttle the requests that are made against an API by using .ajax()?</p>
<p>Much obliged!</p>
| 0non-cybersec
|
Stackexchange
|
List of IP Space used by Facebook. <p>I am looking for an authoritative list of IP space Facebook uses. I need this to support a locked down developer environment that has very tight restrictions on outbound connectivity.</p>
<p>Today I found api and graph.facebook.com started resolving to 69.171.224.0/19 which was not previously in my filters. I've updated it but I'd like to know what other IP space I'm missing allow rules for.</p>
<p>Here's what I have currently. Any additional IP blocks you can list out would be great. Thanks everyone.</p>
<pre><code>69.63.176.0/20
69.171.224.0/19
66.220.144.0/20
204.15.20.0/22
</code></pre>
| 0non-cybersec
|
Stackexchange
|
I know that I want to travel, but the whole idea bewilders and overwhelms me.. Disclaimer: sorry if this falls into the mediocre and vague category of questions, but I don't know how else to put it.
I'm a recent graduate, came out of uni in the UK last year. Haven't found anything I really want to do with my life yet in terms of a career, so have been muddling along in a call centre for the time being. With respect to this question, it probably doesn't help that my university (Oxford) is really the kind of place that holds your hand - at least in terms of providing accommodation, food etc.
I'm sure that I want to travel and see the world, especially now that I'm in a time of transition, but I cannot even begin to imagine where to start. Every time my mind returns to the subject, and starts to think about the impossible complexity of the world outside my small country, I am hit with almost a sense of dread. Part of that dread is, I suspect, the worry that I will never pluck up the courage/resolve/whatever to actually do it.
Don't misunderstand me, I have been abroad - many times. However, it has been exclusively in Europe, and only on what would be called holidays rather than 'travel'.
When I hear or read about people going away for long periods of time, like a year or more, I wonder how can they do it? Does it cost enormous sums of money (which I lack)? Do they work while away? If so how on Earth does one organise such a thing? Down to even the basics, how do they choose where to go, how to move between places, everything.
Part of this post is really just me tossing my frustrations out into the void. However, if anyone has any words of encouragement for a young man huddled in the corner of a room made of windows but no doors, they would be appreciated.
TL;DR How do you brave and wonderful people look at the world in all it's magisterial complexity and get out of bed and explore it?
| 0non-cybersec
|
Reddit
|
Nurse working at the medical tent, treating people injured by security forces. : Regime military police opened fire on the medical tents, nurses, and beat/ arrested patients. Please share this, This NEEDS to be seen..
| 0non-cybersec
|
Reddit
|
Looking For a DnD oriented Discord Group. Looking for a DnD group on discord. preferably 30-50 members or so who are ready to invite a new player and perhaps play a bit of play by post with. A bit of a cancerous player here but meh pretty sure you can decide that yourself.
| 0non-cybersec
|
Reddit
|
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
|
Stackexchange
|
1/19/07
Boundary Layer Turbulence Index: Progress and Recent Developments
Kenneth L. Pryor
Center for Satellite Applications and Research (NOAA/NESDIS)
Camp Springs, MD
1. Introduction
Turbulence is a frequently occurring phenomenon in the boundary layer and may
pose a threat to low-flying aircraft and aircraft during the take-off and landing phases of
flight. In addition, gusty surface winds, the manifestation of turbulence in the boundary
layer, may also be a hazard to ground transportation and enhance fire danger. Therefore,
a numerical model-derived boundary layer turbulence product has been developed and
implemented (Pryor 2007). The boundary layer turbulence index (TIBL) product is
designed to assess the potential for turbulence in the lower troposphere, generated using
National Center for Environmental Prediction (NCEP) Rapid Update Cycle (RUC)-2
model data. Derivation of the index algorithm was based on the following assumptions
and approximations as inferred from Stull (1988) and Garratt (1992):
1. Horizontal homogeneity
2. Subsidence is negligible
3. The coordinate system is aligned with the mean wind U
4. The boundary layer is sufficiently dry such that Tv ≈ T and θv ≈ θ
5. ∂θ/∂z ~ ∂T/∂z
6. w'θ' ~ ∂θ/∂z, w'T' ~ ∂T/∂z, w'u' ~ ∂U/∂z, based on local closure where θ is potential
temperature, θv is virtual potential temperature and Tv is virtual temperature.
As outlined in Pryor (2007), the index algorithm approximates boundary layer
turbulent kinetic energy (TKE) by parameterizing the two most important production
terms of the TKE budget equation as outlined in Stull (1988) and Garratt (1992): vertical
wind shear, responsible for mechanical production, and kinematic heat flux, responsible
for buoyant production. Accordingly, the TIBL product parameterizes convective sources
of turbulence as well as wind shear in the lower boundary layer and near the top of the
boundary layer that may also contribute to turbulence generation. Therefore, assuming
horizontal homogeneity and substituting absolute temperature T for potential temperature
θ, boundary layer TKE can be approximated by equation 1, based on simplification of the
TKE budget equations as given in Stull (1988) and Sorbjan (1989):
∂e/∂t ~ ∂V/∂z + ∂T/∂z (1)
The terms on the r.h.s. of equation 1 are considered to be the most important contributors
to boundary layer turbulence. The second term on the r.h.s. represents the temperature
lapse rate between the 700 and 850-mb levels.
In addition to the forecasting of boundary layer turbulence potential, the TKE
product may also have implications for assessing fire danger. The Haines Index (or
Lower Atmosphere Stability Index) (Haines 1988) indicates the potential for wildfire
growth by measuring stability and dryness in the boundary layer. Similar to the TKE
index, the Haines Index calculation of stability incorporates the temperature difference
between the 700 and 850-mb levels. In addition, surface wind speed has a direct
influence on the spread and intensity of wildfires. Surface wind speed is a criterion by
which the National Weather Service determines the necessity of a Red Flag Warning that
indicates the presence of weather conditions of particular importance that may result in
extreme burning conditions.
As noted in Pryor (2007), validation for the TKE index product was conducted for
selected significant wind events. Two cases of significant wind events during November
2006 and February 2007 over the Oklahoma Panhandle region were presented. The
February 2007 high wind event demonstrated the effectiveness of the TIBL product in
quantifying the evolution of turbulence in an evolving morning mixed layer. Apparent in
this study was a strong correlation between a TKE maximum and the magnitude of peak
surface wind gusts observed by Oklahoma Mesonet stations. Based on the favorable
results highlighted in the case studies in Pryor (2007), the RUC TKE product should have
operational utility in assessing hazards to low-flying aircraft. This paper will outline
recent developments and progress with the RUC-model TKE index product. Validation
effort and recent case studies of significant wind events over southeastern Idaho using
observations from the Idaho National Laboratory (INL) mesonet will be presented to
demonstrate the effectiveness of the turbulence product in the short-term forecasting of
gusty surface winds.
2. Methodology
The objective of this validation effort was to qualitatively and quantitatively
assess the performance of the RUC TKE product by employing classical statistical
analysis of real-time data. Accordingly, this effort entailed a study of significant wind
events over the Eastern Snake River Plain (ESRP) of southeastern Idaho during the
winter of 2008. Significant wind events constitute wind gusts of at least 18 m/s (35
knots) and present a hazard to low-flying aircraft, ground transportation, and enhance the
threat of wildfires. TKE product image data was collected for thermodynamic
environments associated with 12 significant wind events that occurred within the Idaho
National Laboratory (INL) mesonet domain between December 2007 and February 2008.
Clawson et al. (1989) provides a detailed climatology and physiographic description of
the INL as well as a description of the associated meteorological observation network.
Product images were generated in Man computer Interactive Data Access System
(McIDAS) by a program that reads and processes numerical weather prediction model
data, performs mathematical operations to calculate turbulence risk, and overlays risk
value contours on product imagery. In addition, RUC model-derived sounding data,
available via website http://rucsoundings.noaa.gov/gifs/ was collected to compare
product images to coincident vertical temperature and wind profiles. It was found that a
three-hour forecast product image provided an optimal characterization of the
thermodynamic environment over the INL prior to and during significant wind events.
Wind gusts, as recorded by National Oceanic and Atmospheric Administration
(NOAA) mesonet observation stations, were measured at a height of 15 meters (50 feet)
above ground level. For each significant wind event, product images were compared to
RUC sounding profiles and radar profiles of wind and temperature as observed by NOAA
GRID3 mesonet station. Archived NOAA mesonet observations are available via the
NOAA INL Weather Center website (http://niwc.noaa.inel.gov).
http://rucsoundings.noaa.gov/gifs/
http://niwc.noaa.inel.gov/
At this early stage in the algorithm assessment process, it is important to consider
covariance between the variables of interest: turbulence risk (expressed as a TKE index
value) and surface wind gust speed. A very effective means to assess the quantitative
functional relationship between the TKE index algorithm output and wind gust strength
at the surface is to calculate correlation between these variables. Thus, correlation
between TKE index values and observed surface wind gust velocities for the selected
events were computed to assess the significance of these functional relationships.
Statistical significance testing was conducted, in the manner described in Pryor and
Ellrod (2004), to determine the confidence level of correlations between observed wind
gust magnitude and turbulence risk values. Hence, the confidence level is intended to
quantify the robustness of the correlation between turbulence risk values and wind gust
magnitude.
3. Case Studies
3.1 Case 1: 19 December 2007
During the afternoon of 19 December 2007, high winds were observed by
mesonet stations in the INL complex, resulting from a large pressure gradient between a
strong anticyclone over the central Rocky Mountains and a strong cyclone over
southwestern Canada. The afternoon (2200 UTC) RUC three-hour forecast boundary
layer turbulence product indicated a maximum or “ridge” in index values over INL as
well as a general increase in TKE between 2100 and 2200 UTC. Strong vertical wind
shear in the cloud layer above the boundary layer resulted in the generation of turbulent
eddy circulations, reflected as elevated RUC TKE index values. Strong wind gusts in
excess of 40 knots were observed by INL mesonet stations near 2200 UTC. Elevated
TKE values, emulated in radar sounding and RUC model profiles over the INL, indicated
favorability for strong surface wind gusts due to large eddy circulation and resulting
downward horizontal momentum transport.
Figure 1. Turbulent Kinetic Energy (TKE) Index product image (top) and corresponding
sounding profile over INL (bottom) based on the Rapid Update Cycle (RUC) model valid
at 2200 UTC 19 December 2007.
The TKE image in Figure 1 displays a maximum in index values (yellow “zigzag” line)
over INL. Surface observations at Critical Infrastructure Complex mesonet station (near
location marked “I” in TKE image) indicated an increase in wind gust magnitude
between 2140 and 2210 UTC (not shown), with a peak wind gust of 42 knots recorded at
2210 UTC. The sounding displays in Figure 1 strong vertical wind shear (“VWS”) in the
cloud layer above a shallow boundary layer. The resulting turbulent eddy circulation,
reflected as elevated RUC TKE index values, corresponded to the strong wind gusts that
were observed by several INL mesonet stations during the afternoon of 19 December.
3.2 Case 2: 9 January 2008
During the afternoon of 9 January 2008, high winds were observed at several INL
mesonet stations. The highest wind gust of 36 knots was recorded by Aberdeen and
Minidoka mesonet stations between 1900 and 2015 UTC (1200 and 1315 MST), and was
significantly higher than winds observed over the INL during the same time period. The
midday (1900 UTC) RUC three-hour forecast boundary layer turbulence product
indicated a maximum or “ridge” in index values over extreme southern Idaho, south of
the INL. The combination of strong vertical wind shear across the top of the boundary
layer and moderate solar heating of the surface resulted in the generation of turbulent
eddy circulations and the high wind gusts observed at Aberdeen and Minidoka.
Figure 2. A Turbulent Kinetic Energy (TKE) Index product image (top) based on the
Rapid Update Cycle (RUC) model valid at 1900 UTC 9 January 2008 and INL mesonet
metograms displaying wind gust (15G, bottom right) and solar radiation (SRad, bottom
left) observations between 1800 and 2100 UTC (1100 and 1400 MST).
The TKE image in Figure 2 displays a maximum in index values over extreme
southern Idaho, south of the INL. Peak wind gusts of 18 m/s (36 knots), observed at
Aberdeen (ABE) and Minidoka (MIN) mesonet stations and plotted in the TKE image,
were significantly higher than wind gusts observed over the INL (GRI) at during the
same time period. The solar radiation meteogram displayed much higher values over
Aberdeen and Minidoka. Thus, the combination of more intense solar heating and
stronger vertical wind shear in the boundary layer resulted in turbulent eddy circulations
and the strong wind gusts observed over southern Idaho.
3.3 Case 3: 15 January 2008
During the morning of 15 January 2008, high winds were observed at several INL
mesonet stations in association with a cold front passage. The highest wind gust of 58
knots was recorded by Fort Hall mesonet station at 1120 UTC (0420 MST), and was
significantly higher than winds observed over the INL during the same time period. High
wind gusts of 40 to 46 knots were then observed over the INL between 1220 and 1250
UTC (0520 and 0550 MST). Morning (1100 to 1200 UTC) RUC three-hour forecast
boundary layer turbulence products indicated that a maximum or “ridge” in index values
tracked over INL during the time of peak winds. Strong vertical wind shear resulted in
the generation of turbulent eddy circulations and high surface wind gusts due to
downward momentum transport.
Figure 3. Turbulent Kinetic Energy (TKE) Index product image (top) and vertical wind
profile (bottom left) based on the Rapid Update Cycle (RUC) model valid at 1100 UTC
15 January 2008 and an INL mesonet meteogram displaying wind gust (15G, bottom
right) observations between 1200 and 1400 UTC (0500 and 0700 MST).
The TKE image in Figure 3 displays a maximum in index values over and west of
the INL. The corresponding wind profile over INL in Figure 3 indicated strong vertical
wind shear up to 10000 feet above mean sea level (MSL). Winds at 7000 feet above
MSL (2000 feet above ground level) were near 50 knots. Peak wind gusts of 20 to 23
m/s (40 to 46 knots) were recorded by INL mesonet stations 690, GRI, and PBF between
1220 and 1250 UTC. A peak wind gust of 58 knots was recorded about one hour earlier
at Fort Hall mesonet station (plotted in image). Thus, strong vertical wind shear in the
boundary layer resulted in turbulent eddy circulations and the strong wind gusts observed
over southeastern Idaho.
3.4 Case 4: 13 February 2008
During the evening of 13 February 2008, high winds were observed at several
INL mesonet stations in association with a cold front passage. The highest wind gust of
58 knots was recorded by Dubois mesonet station at 0605 UTC 14 February 2008 (2305
MST 13 February). 0500 to 0600 UTC Rapid Update Cycle (RUC) three-hour forecast
boundary layer turbulence products indicated the presence of a maximum or “ridge” in
index values over the northern INL mesonet domain near the Montana border. Strong
wind shear in an elevated mixed layer resulted in the generation of turbulent eddy
circulations and high surface wind gusts due to downward momentum transport.
Figure 4. Turbulent Kinetic Energy (TKE) Index product image (top) based on the Rapid
Update Cycle (RUC) model valid at 0500 UTC February 14, 2008, a corresponding RUC
sounding at Dubois mesonet station (bottom).
The TKE image in Figure 4 displayed a maximum in index values northeast of the
INL near the Montana border. The RUC profile in Figure 4 indicated strong vertical
wind shear up to 3000 feet above ground level (AGL). Winds at 3000 feet AGL were
near 50 knots. A peak wind gust of 58 knots (plotted in image) was recorded at Dubois
station at 0605 UTC. Thus, strong vertical wind shear in the boundary layer resulted in
turbulent eddy circulations and the strong wind gusts observed over southeastern Idaho.
4. Discussion
Analysis of covariance has indicated a strong positive functional relationship
between TKE index values and wind gust magnitude over the INL. Correlation (r) was
determined to be near 0.79 with a near 100 percent confidence level that this correlation
represents a physical relationship between TKE and wind gust magnitude. A t test was
conducted to determine statistical significance in which a significance level of .01 and a
critical value of 2.718 were selected. Comparing the calculated t value of 12.64 to the
selected critical value confirmed the high statistical significance and confidence level of
the correlation between TKE values and observed wind gusts. Thus, comparison of
observations of high wind gusts to proximity TKE values has proven to be an effective
means to assess the performance of the boundary layer turbulence product. Comparing
TKE product images to proximity RUC soundings and radar wind profiles over the INL
verified the physical mechanisms (i.e. convection, vertical wind shear) associated with
boundary layer turbulence in each case. This validation effort is based on the premise
that wind gusts observed at the surface are a manifestation of turbulence generated in the
boundary layer.
The case studies also demonstrate the effectiveness of the TKE product in the
short-term prediction of boundary layer turbulence and gusty surface winds for various
synoptic situations. In two of the four cases, a cold front passage was associated with
strong and gusty surface winds. Three-hour turbulence forecasts derived from RUC
model data effectively indicated conditions favorable for non-convective, high surface
wind gusts. Other cases were associated with intense vertical mixing resulting from a
combination of surface heating and strong vertical wind shear. Table 1 lists 12
significant wind events included in the computation of correlation statistics.
5. Summary and Conclusions
A boundary layer turbulence index (TIBL) product has been developed to assess
the potential for turbulence in the lower troposphere, generated using RUC-2 numerical
model data. The index algorithm approximates boundary layer turbulent kinetic energy
by parameterizing vertical wind shear, responsible for mechanical production of TKE,
and kinematic heat flux, parameterized by the vertical temperature lapse rate ∂T/∂z and
responsible for buoyant production of TKE. Validation for the TIBL product has been
conducted for selected nonconvective wind events during the 2008 winter season over the
INL mesonet domain. This paper presented studies of four significant wind events
between December 2007 and February 2008 over southeastern Idaho. Based on the
favorable results highlighted from validation statistics and in the case studies, the RUC
TIBL product should have operational utility in assessing turbulence hazards to low-
flying aircraft and ground transportation, and in the assessment of wildfire threat.
RUC TKE 2007-2008
INL Mesonet
Correlation (r):
TKE to measured wind: 0.7849
No. of events: 12. Mean Wind Speed: 45.33
Mean
TKE: 23.75
Measured Wind RUC
Date Time Speed Location TKE
(UTC) kt
19-Dec-07 2200 36 EBR 21
2200 40 LOS 22
2210 41 PBF 22
9-Jan-08 1900 36 MIN 15
2010 36 ABE 15.5
15-Jan-08 1220 45 690 28.5
1230 39 GRI 25.5
1250 46 PBF 26
2150 55 DUB 26.5
7-Feb-08 2300 60 FOR 29
2330 52 MIN 26
14-Feb-08 600 58 DUB 28
Table 1. Non-convective high wind events as recorded by INL mesonet stations
December 2007 and February 2008.
6. References
Clawson, K.L., N.R. Ricks, and G.E. Start, 1989: Climatography of the Idaho National
Engineering Laboratory. Department of Energy, 169 pp.
Garratt, J.R., 1992: The atmospheric boundary layer. Cambridge University Press. New
York, 316 pp.
Haines, D.A., 1988: A lower atmospheric severity index for wildland fires. National
Weather Digest, 13, 23-27.
Pryor, K.L., 2007: A Numerical Model-derived Boundary Layer Turbulence
Product. arXiv:physics/0612189v3 [physics.ao-ph]
Pryor, K.L., and G.P. Ellrod, 2004: WMSI - A new index for forecasting wet microburst
severity. National Weather Association Electronic Journal of Operational Meteorology,
2004-EJ3.
Sorbjan, Z., 1989: Structure of the Atmospheric Boundary Layer. Prentice Hall, 317pp.
Stull, R.B., 1988: An introduction to boundary layer meteorology. Kluwer Academic
Publishers, Boston, 649 pp.
http://arxiv.org/abs/physics/0612189
http://arxiv.org/abs/physics/0612189
http://arxiv.org/abs/physics/0612189v3
| 0non-cybersec
|
arXiv
|
Cuban-inspired pork stew (recipe in comments).
| 0non-cybersec
|
Reddit
|
Arch ISO build error. <p>I was making a custom Arch buid. While building the live DE an error came up. I used the command:</p>
<pre><code>sudo ./build.sh -v
</code></pre>
<p>At first it downloaded some packages and then gave me an error. I cannot read the error completely because it is so long. Here is one part:</p>
<p><a href="https://i.stack.imgur.com/Yj8VR.jpg" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/Yj8VR.jpg" alt="enter image description here"></a></p>
<p>How can I resolve this?</p>
| 0non-cybersec
|
Stackexchange
|
So I'm having a little trouble with my girls, any tips?. My 8 month old cries all night and wants to be held constantly and my 3 year old is becoming super picky about food. She also seems to be jealous of the baby. I'm worried they won't get along later. Any tips?
[Here is a picture of my girls](http://i.imgur.com/rumTm.jpg)
| 0non-cybersec
|
Reddit
|
How to take a screenshot with JNA in Windows?. <p>I found a few code examples, but I don't know with which JNA versions I can use which methods. I did only find snippets, where classes were missing and I wasn't able to import them.</p>
<p>I would like to know which JNA version I should use and how to get a screenshot as <code>BufferedImage</code>.</p>
<p>A list of required imports would also be great.</p>
| 0non-cybersec
|
Stackexchange
|
Ordered sushi from a new delivery place for my university and this was in the bag...this is how you get repeating customers.
| 0non-cybersec
|
Reddit
|
How many different sets of 6 and 7 different numbers can we list out from 11,13,18,19,19,20,23,25?. <blockquote>
<p>How many different sets of 6 and 7 different numbers can we list out from 11,13,18,19,19,20,23,25? </p>
</blockquote>
<p>Please no repeating in any case, if the numbers appeared in a set are exactly the same as another but different order is not counted. For example, 11,13,18,19,20 is the same as 13,18,11,20,19. I had hard time listing them all out cause everytime when I look back there were always some sets repeat. Both 6 and 7 number of sets please.</p>
| 0non-cybersec
|
Stackexchange
|
Unable to create .zip files or modify .xpi with file roller in Oneiric. <p>I'm trying to modify a Firefox plugin in .xpi format using file roller. When I try to resave the file after making modifications, I get an error:</p>
<pre><code>7-Zip [64] 9.20 Copyright (c) 1999-2010 Igor Pavlov 2010-11-18
p7zip Version 9.20 (locale=en_US.UTF-8,Utf16=on,HugeFiles=on,4 CPUs)
Scanning
Updating archive /home/user/Desktop/myplugin.xpi
System error:
E_INVALIDARG
</code></pre>
<p>If I try to just save it as a .zip instead, I get this error:</p>
<pre><code>An error occurred while adding files to the archive.
</code></pre>
<p>It works fine in maverick and precise, only my oneiric machine is unable to properly save the file. What steps can I take to find the cause of this problem? </p>
| 0non-cybersec
|
Stackexchange
|
CAN WE BE REAL A SECOND. Why can we have a Fireteam load 6 into orbit but then can't take them to The Farm? They expect me to play soccer with just two friends?
The fuck they expect for hide and seek? Please tell me I'm not the only one thinking this is a major flaw in the game....
EDIT: Fireteam has to be at the same point in the story due to different instances including The Farm. After that you can have more than three.
If you mad at me, then come get me...I'll be at The Farm in my hiding spot.
| 0non-cybersec
|
Reddit
|
How can I get only 1 result to be printed to the console and not both of them?. <p>
My code here has a problem but I know what the problem is. There are 2 characters in grade, so 2 results are shown, each result is added by 0.3. That is a problem because only one result is supposed to be printed to the console.</p>
<pre><code>keydict = {'A': 4.0,'B': 3.0,'C': 2.0,'D': 1.0,'F': 0, '+': 0.3, '-': -0.3}
grade = input('Grade:')
def letter2number(letter):
if len(grade) > 2:
print('Too many characters')
letter2number(grade)
for char in grade:
if char in keydict:
if '+' in grade:
print(keydict[char] + keydict['+'])
elif '-' in grade:
print(keydict[char] + keydict['-'])
else:
print(keydict[char])
else:
print(grade,'is an invalid input')
return
letter2number(grade)
</code></pre>
<p>This is what gets printed to the screen after the user inputs "A+"(or any grade with a '+' or '-') I realize the for loop is causing this problem because there are 2 characters in the input. But I don't think there is another way to do it without using a for loop. The 4.3 is expected, the 0.6 is not what I want.</p>
<pre><code>Grade: A+ # <<< Thats a user input
4.3 # <<< YES
0.6 # <<< How can I get this to NOT print
</code></pre>
<p>Other than the 0.6 being printed, I have no other issue with the code. In other words, I don't want the 0.6 there, but the 4.3 should stay.
</p>
| 0non-cybersec
|
Stackexchange
|
Reebok or Nike? (x-post from /r/PlayItAgainSam).
| 0non-cybersec
|
Reddit
|
How far should I go with the subtop?. I'm about to undertake a dining table build for my friends. They've selected some heavy duty hairpin legs and are not wanting an apron. The top is going to be walnut; I've got some 5/4 boards, so I'm hoping I'll be able to get 1+" thick for the top. I'm thinking that a subtop of some fashion is needed for additional strength (kids are likely to climb up on the table over the years). Do you all think that something pretty simple, like some 1/2-3/4" cross pieces would be sufficient? Or should I go a little more overboard and build a sort of open torsion box for the subtop (no more than 2" thick)? I'm leaning toward the latter unless it'd create more problems than it'd solve...
| 0non-cybersec
|
Reddit
|
How can I receive an email when an upstart monitored script respawns?. <p>My upstart config looks something like this</p>
<pre><code>start on filesystem
stop on runlevel S
respawn
exec /path/to/my/script
</code></pre>
<p>When this script dies and is respawned I would like to receive an email. Is this possible, or am I using the wrong tool for the job?</p>
<p>Thanks!</p>
| 0non-cybersec
|
Stackexchange
|
Almond crepes with cherries, white chocolate sauce and caramelized almonds [OC] (640x640).
| 0non-cybersec
|
Reddit
|
Use custom View with multiple Controllers in Phoenix. <p>In <code>Phoenix</code>, is there some way that I can specify which <code>View</code> to use instead of letting the <code>Controller</code> inflect from the namespace?</p>
<p>I have multiple controllers and for each controller's view the methods are same. I would like to create a single view and use it with (almost) all of my controllers.</p>
<p><strong>Is this possible?</strong> And more importantly, <strong>is this a bad practice or justified in my situation?</strong> </p>
| 0non-cybersec
|
Stackexchange
|
mysql: insert record if not exists else return the id of record. <p>i need to insert unique values in a table, and need the ids of records, need to insert those id's in relationship table,
need the query to insert the record if not exists return the inset id, if exists return the record primary key(id). </p>
<p>and i want to do this for multiple values, like orange, mango, banana, like batch insert.</p>
<p>schema:</p>
<pre><code>------------
id | tag |
------------
1 | orange|
------------
</code></pre>
<p>i have trid this for a single record</p>
<pre><code>INSERT INTO `tags` (`tag`)
SELECT 'myvalue1'
FROM tags
WHERE NOT EXISTS (SELECT 1 FROM `tags` WHERE `tag`='myvalue1')
LIMIT 1
</code></pre>
<p>posted the question to figure out some optimized solution, i don't want to use extra loops in the code to match the values from db.</p>
| 0non-cybersec
|
Stackexchange
|
Did you hear the one about the crossbow made out of rabbit bones?. They say it had a hare trigger!
| 0non-cybersec
|
Reddit
|
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
|
Stackexchange
|
(Melbourne United) "Soooo, who's coming to Oklahoma in October?" #WeAreMelbourne.
| 0non-cybersec
|
Reddit
|
Programmatically Connect and Disconnect Android Device. <p>I need to find a way to (using an Android application) programmatically connect and disconnect an Android device from a host.</p>
<p>I am using a Galaxy Nexus. My goal is to keep everything as close to stock as possible, though I have already enabled verbose debug messages in the kernel and in order to view them have enabled root access on the phone to access <code>/proc/kmsg</code> (and the shell command <code>dmesg</code>).</p>
<p>I am certain that there is a way to leverage root access to do what I need to do, but all of my attempts have lead to nix.</p>
<ul>
<li>Mess with <code>/proc/bus/usb</code></li>
<li>Mess with <code>/dev/bus/usb</code></li>
<li>Change between MTP/PTP (unable to do programatically)</li>
<li>Making the Android USB gadget driver into a module <- ???</li>
</ul>
<p>I am going to try to figure out how to do the last object on the list, as then I would be able to <code>rmmod</code> and <code>insmod</code> the resulting <code>*.ko</code> in my application and that would connect and disconnect the phone. I am unsure of the feasibility of this option though.</p>
| 0non-cybersec
|
Stackexchange
|
Multiple copies of the same file as a result of make / make install. <p>In a development project I'm involved in, we have some files in our src folder that don't need to be compiled (such as python files, a custom .bashrc script, etc...). Running <code>make</code> copies these to our build folder, and running <code>make install</code> then (obviously!) copies them to the installation directory. That means we have three copies of the plain text files floating around on the system.</p>
<p>This doesn't really matter to us, the files are small, and the point of the custom .bashrc script is to make sure a users' system uses the installation directory to source everything (including custom python modules).</p>
<p>However, does this matter? Should we tidy up everything so that there aren't multiple copies of the same files? Or am I just being a bit OCD...?</p>
| 0non-cybersec
|
Stackexchange
|
onSaveInstanceState is not saving my values ( onCreate input Bundle is always null ). <p>Saving bundle (activity A):</p>
<pre><code>@Override
protected void onSaveInstanceState(Bundle outState) {
outState.putString("test", "value");
super.onSaveInstanceState(outState);
}
</code></pre>
<p>Navigating to activity B;</p>
<pre><code>startActivity(new Intent(getBaseContext(), B.class));
</code></pre>
<p>Going back to activity A:</p>
<pre><code>startActivity(new Intent(getBaseContext(), A.class));
</code></pre>
<p>Trying to load the value I wrote to bundle in activity A:</p>
<pre><code>@Override
public void onCreate(Bundle savedInstanceState) {
super.onCreate(savedInstanceState);
setContentView(R.layout.main);
Log.d("MY", "saved instance is null"+ Boolean.toString(savedInstanceState == null));
}
</code></pre>
<p>Returns always savedInstanceState = null. What I'm missing here?</p>
<p><strong>onRestoreInstanceState is never triggered when I return to main activity</strong></p>
| 0non-cybersec
|
Stackexchange
|
Is it bad practice to have functions whose sole purpose is to throw errors?. <p>I have the following situation.</p>
<p>I'm writing a c++ program where I have a function that checks a custom equivalence of two json objects. If the check fails, I don't want the entire program to stop (its a QT gui program), and I have a branch that executes upon receiving an exception. This exception is then passed up to QT where a the qt gui displays an error message from <code>e.what()</code>. </p>
<p>In order to do this I made a function that took care of my exception throwing for the equivalence comparisons. it looks something like this:</p>
<pre><code>void makeComparison(const json& a, const json& b){
if(condition fails)
throw (error)
if(other condition fails)
throw (error)
...
}
</code></pre>
<p>I debated just making this a boolean function instead, however I wanted verbose error messages to tell exactly what went wrong in the program to the user. It seems odd to have a function that doesn't do anything but throw errors on comparison failures, and then having to catch those and keep throwing them upward. I feel like there's got to be a better way to handle this. Here is ME of what the rest of the program looks like. </p>
<pre><code>// some member function
try{
makeComparison(a, m_b);
// do something
}catch (exception e){
// do soemthing else
throw(e);
}
</code></pre>
<pre><code>// in gui
try{
object.exceptionThrowingCode(a);
}catch (exception e){
QMessageBox::critical(this, tr("Error"), tr(e.what());
}
</code></pre>
| 0non-cybersec
|
Stackexchange
|
Good Compression for Copied Drive Structures?. So I'm just dumping HDDs that're offline to back-up the physical drives i'm removing from desktops for personal storage. We normally let them sit for 6 months and they'll go back into new builds after then. Right now I'm waiting a month and then compressing them into .7z because it was better than .zip. Is there something that'll get me better compression in this situation? Images take up a large portion of file-size and are only tiff or jpeg, otherwise music in mp3/mp4 formats.
| 0non-cybersec
|
Reddit
|
Travelling by train? Put your bag on THE OPPOSITE overhead rack so you can keep an eye on it..
| 0non-cybersec
|
Reddit
|
Randomized algorithms and the one time pad. <p>The way I understand it, an algorithm is said to be randomized if it uses randomness as part of its logic (quoting <a href="https://en.wikipedia.org/wiki/Randomized_algorithm" rel="nofollow">Wikipedia</a>). Now, in the case of encryption algorithms, I assume this means that for the same input, different outputs (i.e. ciphertexts) will be produced. The question is, what does "input" mean in this context? </p>
<p>In particular, does it include only the plain text to be encrypted, or does it also include the key? To give a concrete example, is the one time pad a randomized algorithm? If it is so, then "input" must mean plain text only. </p>
<p>To make matters more confusing (to me at least), again quoting <a href="https://en.wikipedia.org/wiki/Probabilistic_encryption" rel="nofollow">Wikipedia</a>: "To be semantically secure, that is, to hide even partial information about the plaintext, an encryption algorithm must be probabilistic.", where the last word is linked to the "Randomized Algorithm" page I link to in the first paragraph. So, given that the one time pad is semantically secure, is must be a randomized algorithm... right?</p>
<p>To add the cherry at the top of the confusion cake, there are still algorithms like, for instance, AES in CBC mode with a random IV, which will produce different outputs, when run multiple time with the same plain text, and the <em>same key</em>. Of course, this means that when you consider the input to one such algorithm as being the plain text only, you get the same result: different ciphertexts for the same plain text. So it would seem that the only "coherent" (lacking a better word) definition would require that input == plain text. Am I surmising correctly?</p>
| 0non-cybersec
|
Stackexchange
|
What if the Move Deleter actually wants a payment for his services but he always forgets to ask?. Especially since he's known as the "Forgetting Man" in Japanese.
| 0non-cybersec
|
Reddit
|
This zoom is useless.
| 0non-cybersec
|
Reddit
|
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
|
Stackexchange
|
Best possible metric vs imperial conversion table?. <p>Is there a better, smarter way of structuring a metric vs imperial conversion table than the one below?</p>
<p>I.e. for a spreadsheet for calculating storage / shipping costs for products whose suppliers use different unit systems.</p>
<p>Thanks in advance!</p>
<p><strong>Length</strong></p>
<pre><code>Metric Imperial
1 mm 0.03937 in
1 cm 10 mm 0.3937 in
1 m 100 cm 1.0936 yd
Imperial Metric
1 in 2.54 cm
1 ft 12 in 0.3048 m
1 yd 3 ft 0.9144 m
</code></pre>
<p><strong>Volume</strong></p>
<pre><code>Metric Imperial
1 cm3 0.0610 in3
1 dm3 1,000 cm3 0.0353 ft3
1 m3 1,000 dm3 1.3080 yd3
1 l 1 dm3 1.76 pt
Imperial Metric
1 in3 16.387 cm3
1 ft3 1,728 in3 0.0283 m3
1 fl oz 28.413 ml
1 pt 20 fl oz 0.5683 l
USA measure Metric
1 fl oz 1.0408 uk fl oz 29.574 ml
1 pint (16 fl oz) 0.8327 uk pt 0.4731 l
1 gallon 0.8327 uk gal 3.7854 l
</code></pre>
<p><strong>Mass</strong></p>
<pre><code>Metric Imperial
1 mg 0.0154 grain
1 g 1,000 mg 0.0353 oz
1 kg 1,000 g 2.2046 lb
Imperial Metric
1 oz 437.5 grain 28.35 g
1 lb 16 oz 0.4536 kg
1 stone 14 lb 6.3503 kg
1 cwt 112 lb 50.802 kg
</code></pre>
<p><strong>Edit</strong></p>
<pre><code>Length: 1 m = N in / N ft / N yd
Volume: 1 m3 = N in3 / N ft3 / N yd3
Weight: 1 kg = N oz / N lb
</code></pre>
| 0non-cybersec
|
Stackexchange
|
Loss function for class imbalanced binary classifier in Tensor flow. <p>I am trying to apply deep learning for a binary classification problem with high class imbalance between target classes (500k, 31K). I want to write a custom loss function which should be like:
minimize(100-((predicted_smallerclass)/(total_smallerclass))*100)</p>
<p>Appreciate any pointers on how I can build this logic. </p>
| 0non-cybersec
|
Stackexchange
|
Acer Aspire V3-572G laptop freezes in the first screen after routine Ubuntu update. <p>I have an Acer Aspire V3-572G. I run Ubuntu 15.10. Yesterday I installed some updates. As requested, I rebooted the computer and it froze at the very first screen with the Acer logo. I switched it off and on again and everything went fine. I got home later and i switched it again and the same story, computer freezes on the Acer splash screen. I found out that if I tried several times switching off and on more or less 1 out of 20 times it worked fine and the OS booted properly.</p>
<p>What is happening? It is very strange to me that an OS update could be responsible for a problem like this, pretty much because the OS is not even booted when the computer freezes, but on the other hand the problems did start right after that update so I cannot help but wonder if they are related. </p>
<p>So, what could it be and what can I do to fix it?</p>
| 0non-cybersec
|
Stackexchange
|
Open Source Cloud Computing. <p>Recently I realized that the most popular social platforms on the net are in the hand of just a few companies, Google, Twitter, Facebook, to name just a few. Taking into account the world changing power of these frameworks I am looking for a non-profit, democratic alternatives to these sites. (Mozilla is a non-profit project, however it could not thrive without the backing of Google.)</p>
<p>In my imagination, the ideal approach (see explanation below) would be a distributed approach as used in file sharing programs or tools like seti@home. Every user willing to take part in the project would have to install software on his or her computer to act as a node in the network that would make up a social space similar to Google+, Facebook or Twitter but with a non-commercial approach. This approach could also be used for a "democratic" cloud to store data. </p>
<p>Is anyone aware of projects that go in this direction? </p>
<hr>
<p><sub>I call it "ideal approach" for a couple of reasons. No need for big server farms or hardware maintaining costs. Invulnerability against most hack attack because it's distributed and there is no central node. Just some I could think of right now.</sub></p>
| 0non-cybersec
|
Stackexchange
|
Ubuntu on Lenovo Yoga 2 Pro. <p>Is it possible to install Ubuntu on the new Lenovo Yoga 2 Pro? I have checked the <a href="http://www.ubuntu.com/certification/desktop/make/Lenovo/">Lenovo compatibility lists</a> on the Ubuntu site, but no new entries have been created yet for this model (released mid-October).</p>
| 0non-cybersec
|
Stackexchange
|
Logan Paul laughing and making jokes at a corpse in Japan’s suicide forest and uploading it to Youtube..
| 0non-cybersec
|
Reddit
|
Curiosity that killed every physics major.
| 0non-cybersec
|
Reddit
|
Stacked chips and attacked sauce holder @chip’ed on chester.
| 0non-cybersec
|
Reddit
|
What to do when your work is 'dissed'. <p>I'm posting this anonymously, for obvious reasons (if you guess who I am please keep it under your hat).</p>
<p>I recently finished my PhD and am about to publish the first paper from my thesis. No sooner than I start to make noises about it and publicizing the results than a senior person in my field starts ragging on the work, and claiming that it was all contained in work they did decades ago. Most of this work is in the form of seminar notes, and precious little is published. Promised books on the topic never appeared. When trying to discuss with the person in question where I think my work extends theirs, they come back and say 'I invented such and such to cope with that case' 30 years ago. On searching for the 'such and such', I find two old Comptes Rendus notes from the time which it turns out are not available from the BnF. Again they promise work that has since not appeared. Requests for relevant documents met with abrupt refusal.</p>
<p>I am not so much afraid for my career, such as it is, and I am keen to give due reference. Indeed, I don't care if all of my work was subsumed by this person's unpublished work - but it relies on more recent developments than the time periods generally referred to so I genuinely believe it is new work. The other person doesn't seem to agree.</p>
<p>How far should I bend in order to show I am not interested in 'covering up' or 'plagarizing' this person's work?</p>
<p>Also I would like to make this CW, but anonymously I don't have the power to do so.</p>
| 0non-cybersec
|
Stackexchange
|
His partner thought the ground was too hot for his pads so he tried out the boots.
| 0non-cybersec
|
Reddit
|
How to migrate a MySQL 5.7 database to MySQL 8.0?. <p>Currently I have a Drupal 8 site in production with a database on MySQL 5.7</p>
<p>How to migrate a MySQL 5.7 database to MySQL 8.0?</p>
<p>Do I just need to export my Drupal 8 database from MySQL 5.7 and import it into a MySQL 8.0 database?</p>
<p>Is there any manipulation to do on the tables ?</p>
| 0non-cybersec
|
Stackexchange
|
How do I click trust on my computer after accidentally click do not?. <p>I accidentally clicked 'do not trust' on my computer when I plugged in my iPhone and I want to know to to get the option to click trust again?</p>
| 0non-cybersec
|
Stackexchange
|
Preventing double-click bug with checkbox + label combination. <p><b>Note this issue may not apply to the general public, as it does not occur unless you're a fast clicker. (150-200ms/click)</b> The reason I'm posting this issue is because my application has a form with 20+ checkboxes next to each other, and after extensive research I've found no related questions on this matter.</p>
<p>Here's a simplified scenario - 4 checkboxes and 4 labels, one for each checkbox id:</p>
<pre><code>[CB1] Label 1
[CB2] Label 2
[CB3] Label 3
[CB4] Label 4
</code></pre>
<p>Assume in each case all CBs are unchecked.</p>
<p><b>Expected Behavior:</b></p>
<ol>
<li>I click on the 4 CBs in rapid succession, they will all become checked. (true)</li>
<li>I click on the 4 Labels in rapid succession, and the corresponding CBs become checked. (only true for Chrome, but still not optimal)</li>
</ol>
<p><b>Actual Behavior for case 2 on Win 7</b> (clicking on labels, because as you know, labels are big and style-able, and the checkboxes are tiny and OS-dependent):</p>
<ol>
<li>(In Firefox 19) CB2 and CB4 are left unchecked, and while going down the list the word "Label" gets highlighted for Label 2 and Label 4, as if I double-clicked on them.</li>
<li>(In Chrome 26) All CBs get correctly checked, but while going down the list the word "Label" gets highlighted for Label 2 and Label 4, as if I double-clicked on them.</li>
<li>(In IE 10) CB2 and CB4 are left unchecked, but no false highlighting.</li>
</ol>
<p>The erroneous behavior could be justified if the clicks are on the same element. In our case those are clearly unique checkboxes with different IDs and Names. So the results are wildly unexpected.</p>
<p><b>So my question is:</b></p>
<p>Is there a way to <b>disable firing the double click event when I rapidly click on the different checkboxes</b>, but yet still check them with fast single clicks?</p>
<p>The closest I've come to is the following script, which interestingly made Firefox behave like Chrome, and Chrome behave like Firefox:</p>
<pre><code>jQuery(document).on('dblclick', 'input:checkbox+label', function(event){
console.log('ugly hack fired');
$(this).click();
event.preventDefault();
})
</code></pre>
| 0non-cybersec
|
Stackexchange
|
Is it possible to change text color for all headings?. <p>I want to change only the color (not font size, etc.) of all headings in my documents (<code>\section</code>, <code>\subsection</code>, <code>\subsubsection</code>, ...). I want to keep all other settings fixed. </p>
<p>Is there a way to do this?</p>
| 0non-cybersec
|
Stackexchange
|
Trump's unutterably stupid trade war.
| 0non-cybersec
|
Reddit
|
Worked my arse off for 3 years to get him. Any love for a Honda?.
| 0non-cybersec
|
Reddit
|
Type "char" in C++. <p>Is there an easy way to convert between <code>char</code> and <code>unsigned char</code> if you don't know the default setting of the machine your code is running on?
(On most architectures, <code>char</code> is signed by default and thus has a range from <code>-128</code> to <code>+127</code>. On some other architectures, such as ARM, <code>char</code> is unsigned by default and has a range from 0 to 255)
I am looking for a method to select the correct signedness or to convert between the two transparently, preferably one that doesn't involve too many steps since I would need to do this for all elements in an array.</p>
<p>Using a pre-processor definition would allow the setting of this at the start of my code.<br>
As would specifying an explicit form of <code>char</code> such as <code>signed char</code> or <code>unsigned char</code> as only <code>char</code> is variable between platforms.</p>
<p>The reason is, there are library functions I would like to use (such as <code>strtol</code>) that take in <code>char as an argument</code> but not <code>unsigned char</code>.</p>
<p>I am looking for some advice or perhaps some pointers in the right direction as to what would be a practical efficient way to do this to make the code portable, as I intend to run the code on a few machines with different default settings for <code>char</code>.</p>
| 0non-cybersec
|
Stackexchange
|
connecting to local mongodb from docker container. <p>I have a local mongoDB server running on mongodb://127.0.0.1:27017. My DB name is <em>localv2</em>. I have a node/express app with the Dockerfile as follows:</p>
<pre><code>FROM node:7.5
RUN npm install -g pm2
RUN mkdir -p /usr/src/app
WORKDIR /usr/src/app
COPY package.json /usr/src/app
RUN npm install
COPY . /usr/src/app
EXPOSE 3002
ENV NODE_ENV local
CMD pm2 start --no-daemon server.js
</code></pre>
<p>The server.js file has a connection to local mongodb with the following code:</p>
<pre><code>app.db = mongoose.connect("mongodb://127.0.0.1:27017/localv2", options);
</code></pre>
<p>This doesn't work when I spin up a container from the image created using the Dockerfile above. I read somewhere that Docker creates a VLAN with a gatway IP address of its own. When I <code>docker inspect</code> my container, my gateway IP address: 172.17.0.1.</p>
<p>Even on changing the mongodb connection to </p>
<pre><code>app.db = mongoose.connect("mongodb://172.17.0.1:27017/localv2", options)
</code></pre>
<p>and re-building the image and starting a new container, I still get the error:</p>
<pre><code>MongoError: failed to connect to server [172.17.0.1:27017] on first connect [MongoError: connect ECONNREFUSED 172.17.0.1:27017]
</code></pre>
<p>Command to run the container: <code>docker run -p 3002:3002 image-name</code></p>
<p>Please help.</p>
| 0non-cybersec
|
Stackexchange
|
I just ate a bacon and ham wrap.... And it was everything I hoped it would be.
| 0non-cybersec
|
Reddit
|
Specify custom index name when using add_reference. <p>I have the following migration</p>
<pre><code>class LinkDoctorsAndSpecializations < ActiveRecord::Migration
def up
add_reference :doctors, :doctor_specialization, polymorphic: true, index: true
end
def down
remove_reference :doctors, :doctor_specialization, polymorphic: true
end
end
</code></pre>
<p>when i run <code>rake db:migrate</code> i am getting the error</p>
<p><code>Index name 'index_doctors_on_doctor_specialization_type_and_doctor_specialization_id' on table 'doctors' is too long; the limit is 63 characters</code> </p>
<p>so how can i specify the index name when using add_reference like the way we specify in <code>add_index :table, :column, :name => 'index name'</code></p>
| 0non-cybersec
|
Stackexchange
|
Swap cell contents in Excel?. <p>Is there an easy way to swap the contents of two cells in Microsoft Excel?</p>
<p>By easy, I mean either a keyboard shortcut or menu item, without involving copying to temporary cells or writing VBA scripts or anything like that. In other words, I'm looking for a way to just select two cells and click some menu item or press some key combination that will swap their contents. Surely, there has got to be a way to do this?</p>
| 0non-cybersec
|
Stackexchange
|
Decrease default sizes on external monitor. <p>I have a system 76 Galago Ultra Pro, and 90% of the time it lives on my desk connected to an external monitor. My problem is that the system thinks that my external monitor is much smaller than it is, so it makes everything (fonts, icons, etc) on that screen too big.</p>
<p>Here's a screen shot of what the system thinks my monitors look like:</p>
<p><img src="https://i.stack.imgur.com/1bsbY.jpg" alt="Screenshot"></p>
<p>And here's a photo of the actual set up:</p>
<p><img src="https://i.stack.imgur.com/pgz5D.jpg" alt="Photo"></p>
<p>Look at the size of that terminal window on the external! It's unpleasant to use. It looks to me like the system recognises the correct resolution of the external, and can tell that it's significantly smaller than that of the laptop (the external is a few years old), but I'd really like to tell it that the actual size of the monitor is larger. Is there a way to do that?</p>
| 0non-cybersec
|
Stackexchange
|
The Anthem of the Heart Anime Film Tops 1 Billion Yen.
| 0non-cybersec
|
Reddit
|
ImportError on scandir. <p>I am trying to use the <a href="https://pypi.python.org/pypi/scandir/1.3" rel="nofollow">scandir package</a> as an alternative to <code>os.walk</code> in python 2.7. However, during import an <code>ImportError</code> is raised as follows.</p>
<pre><code>Python 2.7.12 (default, Jul 1 2016, 15:12:24)
[GCC 5.4.0 20160609] on linux2
Type "help", "copyright", "credits" or "license" for more information.
>>> from scandir import scandir, walk
Traceback (most recent call last):
File "<stdin>", line 1, in <module>
File "scandir.py", line 2, in <module>
from scandir import walk
ImportError: cannot import name walk
</code></pre>
<p>I haven't been able to find any references to this error (apart from circular imports) after searching extensively and quite stumped at this point. Any help is much appreciated ! </p>
| 0non-cybersec
|
Stackexchange
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.