text
stringlengths 3
1.74M
| label
class label 2
classes | source
stringclasses 3
values |
---|---|---|
Twitch.tv live programming instruction?. I'm a software developer with about 18 years experience. I mostly do web development using Ruby on Rails, JavaScript, HTML, CSS. Plus I do quite a lot with data science and analytics, D3, Rlang, etc..
I really like to mentor and teach new developers, but 1 on 1 it doesn't scale very well. Recently I've been thinking of setting up a regularly scheduled Twitch.tv channel to stream and really have it be an open ended instructional format. So working on whatever people are interested in, answering questions, etc...
I thought this might be a good place to gauge interest?
[EDIT]
I've added the following here to make sure it is seen by people visiting this thread.
So I was surprised that so many people commented and upvoted. Glad to see there is definitely some interest.
To get this moving forward I've done a few things.
1) Setup OBS so I can stream to Twitch and then upload to YouTube after the fact. (I have considered multi-streaming to other sources, but I think keeping it all in one place is better due to my upload bandwidth restrictions, as well as just general usability. If Twitch doesn't work out then I can move it later and keep people looped in)
2) I bought the domain https://www.codewithjoe.com which will be a very basic website that I will use to keep schedules posted as well as polls to see what topics/lessons people are most interested in. I don't expect I'll have anything up on that site for 2 to 3 weeks.
3) I've created a Git repo at https://github.com/bigtunacan/codewithjoe In the short run I will just post the schedule there so we can get started with this sooner rather than later.
4) At ptole's suggestion I have also setup a Gitter discussion room. This will be able to act as a live chat when stream, but also people can post and get responses back later when viewing later or when I'm not online. The gitter channel is located at https://gitter.im/bigtunacan/codewithjoe. It is also linked to from the Git repo.
5) To kick things off I will start with a one night a week 1 hour session. It will likely be a little later in the evening, but the exact day and time is still TBD. I will post something here as well as to the Gitter channel and Git repo in the next day or two with when the first session will take place. I will try to schedule it so that it is on the same day and time as much as possible. | 0non-cybersec
| Reddit |
16 April, 2007. A girl becomes embarrassed after giving flowers to a female US soldier on duty in the northern Iraqi city of Mosul.. | 0non-cybersec
| Reddit |
I did my sisters makeup [CC]. | 0non-cybersec
| Reddit |
Convert a public key to GPG readable format. <p>For a backup scenario, I want to peform asymmetric encryption of the data. For this I'm using <a href="http://www.duplicati.com/" rel="nofollow noreferrer">duplicati (2.0)</a> paired with <a href="https://en.wikipedia.org/wiki/GNU_Privacy_Guard" rel="nofollow noreferrer">GPG</a>.</p>
<p>Now I have a smartcard (<a href="https://en.wikipedia.org/wiki/PKCS_11" rel="nofollow noreferrer">PKCS#11</a> / <a href="https://en.wikipedia.org/wiki/Cryptographic_Service_Provider" rel="nofollow noreferrer">CSP</a> interface via <a href="https://en.wikipedia.org/wiki/OpenSC" rel="nofollow noreferrer">OpenSC</a>) on which I have a 2048-bit <a href="https://en.wikipedia.org/wiki/RSA_%28cryptosystem%29" rel="nofollow noreferrer">RSA</a> private key. I have a copy of <a href="https://en.wikipedia.org/wiki/Openssl" rel="nofollow noreferrer">OpenSSL</a> on my machine as well as <a href="http://xca.sourceforge.net/" rel="nofollow noreferrer">XCA</a> (which supports the usual formats <a href="https://en.wikipedia.org/wiki/Secure_Shell#Version_2.x" rel="nofollow noreferrer">SSH2</a> / <a href="https://en.wikipedia.org/wiki/X.509#Certificate_filename_extensions" rel="nofollow noreferrer">PEM</a> / DER) with private-key access.</p>
<p>My aim is to add the public key, corresponding to the private key as an encryption subkey to my existing software-based keyring with an 4096-bit primary software RSA key. It would also be sufficient to add it "normally" as "somebody else's public key".</p>
<p>Now my question is:<br>
<strong>How can I convert a PEM / SSH2 / DER encoded public key so that it will be accepted by GPG as a public RSA key?</strong></p>
<p>Please note: "The key formats serve different purposes" is not a valid answer </p>
<p>If you want to suggest "use gpgsm" as an answer, please document how to do so with duplicati.</p>
| 0non-cybersec
| Stackexchange |
I found another redemption code in the LE.. Forgive me if it has been posted, but I didn't see it in the main code thread.
X4C-FGX-MX3
There is also another which I am trying to figure out, there is 9 digits but I can't correlate the missing ones. | 0non-cybersec
| Reddit |
Metric topology on $\mathbb R^3$ with discs and intervals open. <p>Consider the $\mathbb{R}^3$ space with the standard Euclidean metric $\rho(p, q) = \sqrt{(p_x-q_x)^2 + (p_y - q_y)^2 + (p_z - q_z)^2}$. Consider the topology induced not only by open balls, but also by open discs (where disc with the center $a$ and radius $R$ is the set of points $D = \{x \mid \rho(x, a) < R\}$ such that entire $D$ lies on one plane) and open intervals (where interval with the center $a$ and radius $R$ is the set of points $I = \{x \mid \rho(x, a) < R\}$ such that entire $I$ lies on one line). Is this topology interesting in some way? Are there some funny properties? What reasonings about $R^3$ that are correct in usual metric topology will be broken in such a topology?</p>
| 0non-cybersec
| Stackexchange |
Visit Iceland during winter months and enjoy the abstract beauty of ice caves. JΓΆkulsΓ‘rlΓ³n glacier lagoon.. | 0non-cybersec
| Reddit |
Ladies how did you get rid of your obsessive ex?. | 0non-cybersec
| Reddit |
Ubuntu dead slow after last update. <p>It's been a few days now. Everything is SLOW as hell. Going from a desktop to the next is slow. Unlocking my workstation kind of fades out the lock screen and fades in the desktop. The animation takes about 5 seconds! Any popup or window moving pegs a core for 1-2 seconds and is barely useable. Scrolling in Firefox is almost not working anymore, in Chrome it is a little better. Opening an image from my camera (18Mpix with the default image viewer) freezes my system for seconds... But the worst is videos: I cannot play any video full screen anymore with mplayer - my player of choice. VLC seems to be able to do better but I'm not seeing 30fps, everything stutters. This all worked fine a couple of weeks ago.</p>
<p>My GC is an old ATI (Radeon HD 4350/4550) and from what I've gathered it might be the problem... Is there a solution short of reinstalling my system with 13.10 ? Or switching to Windows because I'm tired of reinstalling my OS all the time...</p>
<p>I've got a Q6600 (quad core) with 8GB of RAM.</p>
| 0non-cybersec
| Stackexchange |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
Are you Really at Risk From Organized Cybercrime and Espionage?. | 1cybersec
| Reddit |
My Ubuntu guest system is no longer picking up the Host-only network in virtualbox. <p>I managed to briefly get this working before, but I was messing around with creating these via the command line and was deleting and creating them and now it's stopped working. This is what I've tried so far:</p>
<ol>
<li><p>Delete the Host-only network and re-add it.</p></li>
<li><p>Delete the Host-only network and re-add it and restart virtual box.</p></li>
<li><p>Delete the Adapter from the VM and re-add it.</p></li>
<li><p>Restore the VM to a point before this adapter and add it.</p></li>
<li><p>Restart OSX.</p></li>
<li><p>Create a Host-only network that has not existed before <code>vboxnet3</code> and try to use that.</p></li>
</ol>
<p>My host system is <a href="/questions/tagged/osx" class="post-tag" title="show questions tagged 'osx'" rel="tag">osx</a> and my guest system is <a href="/questions/tagged/ubuntu" class="post-tag" title="show questions tagged 'ubuntu'" rel="tag">ubuntu</a>. When I go into Ubuntu it tries to connect for a while but then just says wired network is disconnected.</p>
<p><img src="https://i.stack.imgur.com/EHe6N.png" alt="enter image description here"></p>
<p>Host system <code>ifconfig</code>:</p>
<pre><code>vboxnet0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500
ether 0a:00:27:00:00:00
inet 192.168.56.1 netmask 0xffffff00 broadcast 192.168.56.255
</code></pre>
<p>Guest system <code>ifconfig</code>:</p>
<pre><code>eth1 Link encap:Ethernet HWaddr 08:00:27:82:38:af
inet6 addr: fe80::a00:27ff:fe82:38af/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:24 errors:0 dropped:0 overruns:0 frame:0
TX packets:188 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:6901 (6.9 KB) TX bytes:42262 (42.2 KB)
</code></pre>
<p>What have I done wrong?</p>
| 0non-cybersec
| Stackexchange |
EFF releases Privacy Badger 1.0 -- a browser addon that algorithmically detects and blocks online trackers. | 0non-cybersec
| Reddit |
Extracting glyph-path information from ttf files. <p>I'm trying to figure out a way to extract the information encoded in ttf files. namely: The char-to-glyph table and the individual glyph path data.</p>
<p>Does anyone have a good reference explaining the ttf file structure, or some other solution?</p>
<p>Keep in mind that I'm not interested in any libraries that can do it for me either (unless they are open source and I can see how they are doing it). The "master" goal is to implement it in Javascript.</p>
<p>Thanks!</p>
| 0non-cybersec
| Stackexchange |
Python Count Elements in a List of Objects with Matching Attributes. <p>I am trying to find a simple and fast way of counting the number of Objects in a list that match a criteria.
e.g.</p>
<pre><code>class Person:
def __init__(self, Name, Age, Gender):
self.Name = Name
self.Age = Age
self.Gender = Gender
# List of People
PeopleList = [Person("Joan", 15, "F"),
Person("Henry", 18, "M"),
Person("Marg", 21, "F")]
</code></pre>
<p>Now what's the simplest function for counting the number of objects in this list that match an argument based on their attributes?
E.g., returning 2 for Person.Gender == "F" or Person.Age < 20.</p>
| 0non-cybersec
| Stackexchange |
16, captain of cheerleading team. Go nuts!. | 0non-cybersec
| Reddit |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
YSK about 'dot tally' notation. A way to tally the count of something in much less space than a normal tally count.. By regular tally I mean the four straight lines with a diagonal, you know what, here is a picture
http://i.imgur.com/qb7YC.jpg
It's more fun and space saving | 0non-cybersec
| Reddit |
Connecting to Youtube Analytics API using R. <p>I am trying to pull data from Youtube Analytics API using R and have hit a wall. I'm getting a Status 403 error. I can confirm that:</p>
<ul>
<li>I have tried logging out of all accounts, rebooting, re-authenticating and then logging into 1 account and it didn't work</li>
<li>I have tried using just the <a href="https://www.googleapis.com/auth/youtube.readonly" rel="nofollow noreferrer">https://www.googleapis.com/auth/youtube.readonly</a> scope (which is supposed to be correct) and all youtube analytics scopes are authorized within the app (each with their own credential key), it didn't work.</li>
<li>I have tried authenticating from different browsers, it didn't work</li>
<li>I can confirm that the call worked from <a href="https://developers.google.com/apis-explorer/#p/youtubeAnalytics/v2/youtubeAnalytics.reports.query" rel="nofollow noreferrer">https://developers.google.com/apis-explorer/#p/youtubeAnalytics/v2/youtubeAnalytics.reports.query</a>.</li>
</ul>
<p><strong>UPDATE</strong>
I have found the solution and updated the code to what is now working</p>
<pre><code>scopes<- c('https://www.googleapis.com/auth/youtube.readonly')
endpoint<- oauth_endpoints('google')
youtubeapp<- oauth_app(appname='Youtube Analytics API',
key=client_id,
secret=client_secret)
youtube_token<- oauth2.0_token(
endpoint= oauth_endpoints('google'),
app = youtubeapp,
scope = scopes)
raw_data<- GET(paste("https://youtubeanalytics.googleapis.com/v2/reports?dimensions=",dimensions,"&endDate=",enddate,"&ids=",ids,"&metrics=",metrics,"&startDate=",startdate,sep=""),
config=youtube_token,content_type('application/json'))
content(raw_data, as= 'text')
</code></pre>
| 0non-cybersec
| Stackexchange |
TIL about the Argentavis magnificens, the most gigantic bird that ever lived.. | 0non-cybersec
| Reddit |
Let's clear up the whole Bob Dylan - Nobel Prize controversy. So after finishing reading some of the most infuriatingly shallow and poorly researched comments in the history of r/books in [this thread](https://www.reddit.com/r/books/comments/62626e/bob_dylan_finally_agrees_to_accept_nobel_prize/) I feel like we need to make this whole mess clear.
**Bob Dylan never turned down the Nobel prize for literature.**
He took two weeks to make a statement and informed the academy he would not be able to make it to the acceptance ceremony in december due to existing commitments (ie concert dates).β [The Swedish academies response is here](http://www.svenskaakademien.se/en/press/bob-dylan-has-decided-not-to-come-to-stockholm) and reads as follows:
**Note the complete absence of anger, frustration, or any kind of animosity in their response.**
>Yesterday evening the Swedish Academy received a personal letter from Bob Dylan, in which he explained that due to pre-existing commitments, he is unable to travel to Stockholm in December and therefore will not attend the Nobel Prize Ceremony. He underscored, once again, that he feels very honored indeed, wishing that he could receive the prize in person.
>That laureates decide not to come is unusual, to be sure, but not exceptional. In the recent past, several laureates have, for various reasons, been unable to come to Stockholm to receive the prize, among them Doris Lessing, Harold Pinter, and Elfriede Jelinek. The prize still belongs to them, just as it belongs to Bob Dylan.
>We look forward to Bob Dylanβs Nobel Lecture, which he must give β it is the only requirement β within six months counting from December 10, 2016.
There was one member of the prize committee interviewed not even a week after the prize was announced that spouted some crap off. For completeness you can read [his comments here](https://www.google.ca/amp/www.cnbc.com/amp/2016/10/24/arrogant-bob-dylan-angers-nobel-authorities-as-he-goes-to-ground-over-literature-prize.html)
Then **Bob Dylan wrote an acceptance speech for the award which was read at the December ceremony for him as he could not attend**
[The full speech can be found here](https://www.nobelprize.org/nobel_prizes/literature/laureates/2016/dylan-speech.html) but I will quote a portion to drive home my point:
>I'm sorry I can't be with you in person, but please know that I am most definitely with you in spirit and honored to be receiving such a prestigious prize. Being awarded the Nobel Prize for Literature is something I never could have imagined or seen coming.
**Bob Dylan did not turn down the Nobel prize** because he though he was too good for it.
**Bob Dylan did not turn down the Nobel prize** because he thought it was too good for him.
**Bob Dylan did not at any point turn down the Nobel prize.**
**Edit** β u/PotentNerdRage has pointed out that he had no public concert dates during December. He may have had private functions or some such planned but it's hard to say.
**Edit 2** Deleted an h which had no home
**Edit 3** Nterviewed isn't right | 0non-cybersec
| Reddit |
My friend is cycling through the Scottish Highlands. I just had to share.. | 0non-cybersec
| Reddit |
Today is the 56th Anniversary of the tragic Dyatlov Pass Incident. | 0non-cybersec
| Reddit |
ITAP of a monkey breastfeeding her baby on the roof of a temple β India. | 0non-cybersec
| Reddit |
MANTRA (OM AIM HREEM KLEEM CHAMUNDAYE VICCHE NAMAH) CHANTED 108 TIMES. | 0non-cybersec
| Reddit |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
Markov Chains with multiple invariant distributions. <p>Is it possible for a Markov chain to have 2 or more invariant distributions? I'm trying to understand the Perron-Frobenius Theorem, and it seems like it's saying that an eigenvector of P is unique as long as its components are positive? Of course, there can be infinitely many of these distributions too, but I am concerned with the finite case. I would love some insight on why it is not possible to have multiple invariant distributions for Markov chains!</p>
| 0non-cybersec
| Stackexchange |
The simply-connectedness of quotient space. <p>If $U$ is a Lie group with a closed subgroup $K$ such that both $U$ and $U/K$ are simply-connected, then can we conclude that $K$ is connected?</p>
| 0non-cybersec
| Stackexchange |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
How can I show $\mathbb Z[\sqrt{-3}]$ is one dimensional?. <p>I have to show that the ring $A=\mathbb Z[\sqrt{-3}]$ is one dimensional. I know this means that it contains no chains $P\subset P'\subset P''$ of prime ideals, but I really don't see where to begin. The only thing I can think of is Krull's height theorem, but applying it here would mean showing $A$ is principal, and I don't think it is. Or is it?</p>
| 0non-cybersec
| Stackexchange |
Proof that $\tan(\sin x) > \sin(\tan x), x \in (0, \pi/2)$. <p>Assuming <span class="math-container">$x \in (0, \frac{\pi}{4})$</span> Write down a proof that <span class="math-container">$F(x) > 0 $</span> for all <span class="math-container">$x$</span>'s where <span class="math-container">$F(x) = \tan(\sin x)-\sin(\tan x)$</span>.</p>
<p>All I came up with was using Jensen inequity for 1st derivative using <span class="math-container">$F(x) = \log(\cos x)$</span> and <span class="math-container">$\alpha_1 =\alpha_2 = \alpha_3 = \frac{1}{3}$</span> and gaining <span class="math-container">$3\log(\cos(2\sin x\cdot \tan x)) \geq 2\log(\cos(\sin x)) + \log(\cos(\tan x))$</span> but what I need to gain is this inequality:
<span class="math-container">$3\log(\cos x) \geq \leq 2\log(\cos(\sin x)) + \log(\cos(\tan x))$</span>
Any hint would be helpful:p</p>
| 0non-cybersec
| Stackexchange |
Nginx deny access to all PHP files but one from certain IPs. <p>I am trying to deny access to all of our PHP scripts except one for all outside world except one IP.</p>
<pre><code> location / {
deny all;
allow <one-ip-address>;
error_page 403 goodpage.php;
try_files $uri $uri/ =404;
}
location ~ \.php$ {
deny all;
allow <one-ip-address>;
include snippets/fastcgi-php.conf;
fastcgi_pass unix:/run/php/php7.0-fpm.sock;
}
location /goodpage.php {
allow all;
include snippets/fastcgi-php.conf;
fastcgi_pass unix:/run/php/php7.0-fpm.sock;
}
</code></pre>
<p>However, whatever I do, I always end up restricting all *.php or none.
Setup is Ubuntu 16.04, Nginx 1.10.0,
Thanks in advance.</p>
| 0non-cybersec
| Stackexchange |
Male elks lock antlers, sometimes the antlers don't come off resulting in starvation. So this metal-ass elk just tore the other head off.. | 0non-cybersec
| Reddit |
Screenshot and repost. | 0non-cybersec
| Reddit |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
Poll Worker Injured By Trump Sign Booby-Trapped With Razor Blades. | 0non-cybersec
| Reddit |
What's a quick and dirty way to get a user list with login time from active directory?. <p>Im trying to obtain a list of users with their login time (n times if they have logged in more than once) in a particular timespan, for example between 2pm and 3pm on 10/10/2012.</p>
<p>I've been fiddling around with powershell, but couldn't get much out of it, downloaded the PowerShell extensions from Quest, tried out some snippets, but I couldn't find something that fits my needs.</p>
<p>My guess is to query the events on the Active Directory server but haven't been able to get a snippet that works so far.</p>
| 0non-cybersec
| Stackexchange |
Thereβs pain behind those emojis. | 0non-cybersec
| Reddit |
Laughs in with lord. | 0non-cybersec
| Reddit |
Update: Me [18m], I found out one of my friends [18M] had been cheating on his girlfriend, now no-one believes me and I've been cut out from things till I apologise.. Update to this: https://www.reddit.com/r/relationships/comments/4ooxzu/me_18m_i_found_out_one_of_my_friends_18m_had_been/
Thanks to the few who helped me in the first post and made me see things clearer. I would like to point out that I don't see the majority of my friends who didn't believe my story as "bad people" as Gavin is a very good liar and the only evidence I had was a drunk conversation, also I'm not a big fan of Gavin in the first place so most of them were thinking I was getting revenge.
So back to Sixth Form yesterday this story got a whole lot more interesting. It was awkward between me and my friends as Gavin and me weren't speaking (he's a bit of a keyboard warrior so he didn't say anything to my face), till someone brought it up and said I should apologise. I refused too, and told them I was telling the truth, I'm not apologising etc. This is when it developed into a full on argument with a few people siding with me (more so than when it was first revealed) as they said I seemed legit, a few people trying to calm down the situation and a few people siding with Gavin. When our lessons started we just went separate ways and except the people I'm in classes with, I never saw any of them till later in the day.
Well it all blew up as I see Hannah shouting at Gavin saying he's dumped, me and my friends who are there rush over whilst he's still trying to say it was Liam not him. Liam, being the little stooge he is tried to convince Hannah of the story again, but apparently she had proof this time it was Gavin. She saw me and sincerely apologised to me as I was telling the truth.
The story spread around fast as you can imagine. I got a few texts off my friends/some in person to say how sorry they were for not believing me and they didn't think Gavin was like that. So the people who have made the effort with me, I'll accept their apologies. However the people that haven't reached out, can go fuck themselves along with Gavin and Liam.
**tl;dr**: IT caused tension at Sixth Form, until Hannah found proof that Gavin was in fact cheating and that I was telling the truth. Most of my friends apologised, a few of them haven't so they as well as Gavin and Liam can fuck off. | 0non-cybersec
| Reddit |
is it possible to read metadata using HTTP live streaming in the iPhone SDK. <p>When playing a live stream using the HTTP Live Streaming method, is it possible read the current metadata (eg. Title and Artist)? This is for an iPhone radio app.</p>
| 0non-cybersec
| Stackexchange |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
What's wrong with my usb/gpsmon?. <p>I got a mini usb GPS receiver to work... apparently... but the lat/lon is not even a possible value and I am not sure if this is a calculation issue or a hardware issue. This is the first I have tried one of these usb receivers. Is this one a dud or do I just need to install a gps almanac or something, where I missed a step?</p>
<pre><code>tcp://localhost:2947 NMEA0183>
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
βTime: n/a Lat: n/a Lon: n/a β
ββββββββββββββββββββββββββββββββββ Cooked TPV ββββββββββββββββββββββββββββββββββ
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β GPGSA GPGSV GPRMC GPGGA β
ββββββββββββββββββββββββββββββββββ Sentences βββββββββββββββββββββββββββββββββββ
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
βCh PRN Az El S/N ββTime: 065526.00 ββTime: 065526.00 β
β 0 2 58 59 0 ββLatitude: 2328.2329 N ββLatitude: 2328.2329 β
β 1 4 1 58 0 ββLongitude: 12056.9328 E ββLongitude: 12056.9328 β
β 2 10 299 44 0 ββSpeed: ββAltitude: β
β 3 24 89 41 0 ββCourse: ββQuality: 0 Sats: 00 β
β 4 29 56 26 35 ββStatus: V FAA: N ββHDOP: 0.0 β
β 5 18 269 25 0 ββMagVar: ββGeoid: β
β 6 27 112 25 0 βββββββββββββ RMC βββββββββββββββββββββββββ GGA βββββββββββββ
β 7 31 160 15 0 βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β 8 30 237 7 0 ββMode: A1 Sats: ββUTC: RMS: β
β 9 25 43 3 33 ββDOP: H= V= P= ββMAJ: MIN: β
β10 29 219 26 36 ββTOFF: ββORI: LAT: β
β11 ββPPS: ββLON: ALT: β
βββββββ GSV βββββββββββββββββ GSA + PPS ββββββββββββββββββββββ GST βββββββββββββ
</code></pre>
| 0non-cybersec
| Stackexchange |
Olympic National Park, eastern boundary. [2918x3648] [OC]. | 0non-cybersec
| Reddit |
Which one of the following logical propositions is to be preferred?. <p>I'm trying to update the symbolism of <a href="http://en.wikipedia.org/wiki/Giuseppe_Peano" rel="nofollow">Giuseppe Peano</a>'s "Arithmetices Principia", to make the translation freely available. Might I ask you, which of the following might be a correct mathematical reasoning? Since the original symbolism has bi-fold meanings. I suppose the symbolism should be updated as either one of the following:</p>
<ul>
<li><p>$(\alpha \xrightarrow[\forall x]{} \beta) = [(\overline{x} \in \alpha) \rightarrow (\overline{x} \in \beta)]$</p></li>
<li><p>$(\alpha \underset{\forall \text{x}}\subset \beta) = [(\overline{x} \in \alpha) \rightarrow (\overline{x} \in \beta)]$</p></li>
</ul>
<p>Is any of them non-sense, or could any of them be preferred?</p>
<p>If you are interested, the line I am trying to translate can be found as the line numbered with "<strong>63.</strong>", in <a href="https://archive.org/details/arithmeticespri00peangoog" rel="nofollow">the original manuscript</a> on page "<strong>XII</strong>".</p>
<h1><em>P.S. | Notation:</em></h1>
<ul>
<li><p>$\overline{x} \in a$ means ... <em>those $x$ such that $a$, or solutions, or roots of the condition $a$, indicates the class consisting of individuals which satisfy the condition $a$.</em></p></li>
<li><p>The sign $\subset$ means ... <em>is contained. Thus $a \subset b$ means the class $a$ is contained in the class $b$.</em></p></li>
</ul>
<p>If the propositions $a,b$ contain the indeterminate quantity $x$, that is, express conditions on these objects, then:</p>
<ul>
<li>$a \xrightarrow[\forall x]{} b$ means ... <em>whatever the $x$ from propositions $a$ one deduces $b$.</em></li>
</ul>
<p>Many thanks for any advice.</p>
| 0non-cybersec
| Stackexchange |
Frank, I've been thinking.... | 0non-cybersec
| Reddit |
[NO SPOILERS] And now my watch begins again.....in 4K!. | 0non-cybersec
| Reddit |
How to document requirements for an API systematically?. <p>I am currently working on a project, where I have to analyze the requirements of two given IT systems, that use cloud computing, for a Cloud API. In other words, I have to analyze what requirements these systems have for a Cloud API, such that they would be able to switch it, while being able to accomplish their current goals.</p>
<p>Let me give you an example for some informal requirements of Project A:</p>
<ol>
<li>When starting virtual machines in the cloud through the API, it must be possible to specify the memory size, CPU type, operating system and a SSH key for the root user.</li>
<li>It must be possible to monitor the inbound and outbound network traffic per hour per virtual machine.</li>
<li>The API must support the assignment of public IPs to a virtual machine and the retrieval of the public IPs.</li>
<li>...</li>
</ol>
<p>In a later stage of the project I will analyze some Cloud Computing standards that standardize cloud APIs to find out where possible shortcomings in the current standards are. A finding could and will probably be, that a certain standard does not support monitoring resource usage and thus is not currently usable.</p>
<p>I am currently trying to find a way to systematically write down and classify my requirements. I feel that the way I currently have them written down (like the three points above) is too informal. </p>
<p>I have read in a couple of requirements enineering and software architecture books, but they all focus too much on details and implementation. I do really only care about the functionalities provided through the API/interface and I don't think UML diagrams etc. are the right choice for me. I think currently the requirements that I collected can be described as user stories, but is that already enough for a sophisticated requirements analysis? Probably I should go "one level deeper" ...</p>
| 0non-cybersec
| Stackexchange |
What is the difference between square bracket arrays and pointer arrays?. <p>As a non-C/C++ expert I always considered square brackets and pointers arrays as equal.</p>
<p>ie :</p>
<pre><code>char *my_array_star;
char my_array_square[];
</code></pre>
<p>But I noticed that when use in a structure/class they don't behave the same :</p>
<pre><code>typedef struct {
char whatever;
char *my_array_star;
} my_struct_star;
typedef struct {
char whatever;
char my_array_square[];
} my_struct_square;
</code></pre>
<p>The line below displays 16, <code>whatever</code> takes 1 byte, <code>my_array_pointer</code> takes 8 bytes.
Due to the padding the total structure size is 16.</p>
<pre><code>printf("my_struct_star: %li\n",sizeof(my_struct_star));
</code></pre>
<p>The line below displays 1, <code>whatever</code> takes 1 byte, <code>my_array_pointer</code> isn't taken in account.</p>
<pre><code>printf("my_struct_square: %li\n",sizeof(my_struct_square));
</code></pre>
<p>By playing around I noticed that square brackets are used as extra space in the structure</p>
<pre><code>my_struct_square *i=malloc(2);
i->whatever='A';
i->my_array_square[0]='B';
</code></pre>
<p>the line blow displays A:</p>
<pre><code>printf("i[0]=%c\n",((char*)i)[0]);
</code></pre>
<p>the line blow displays B:</p>
<pre><code>printf("i[1]=%c\n",((char*)i)[1]);
</code></pre>
<p>So I cannot say anymore that square brackets are equals to pointers. But I'd like to understand the reason of that behavior. I'm afraid of missing a key concept of that languages.</p>
| 0non-cybersec
| Stackexchange |
Yumeiro Patissiere Professional Episode 13. | 0non-cybersec
| Reddit |
Not sure what I made but it was tasty, so I thought I would share it.. | 0non-cybersec
| Reddit |
Combinations and Statistics Question. <p>A bin with 100 parts contains 8 that are defective. A sample of 10 parts are obtained. How many samples contain exactly 1 defective part?</p>
<p>My answer was 10 as each defective part is mathematically indistinguishable from each other and the same for the non defective parts. Therefor, the defective part can occur in 10 different places in the sample leading to 10 different possible samples. I feel like the information before that was misleading. </p>
<p>Edit: I want to clarify that I think the question was poorly worded and ambiguous which is why I am looking for clarification and maybe my interpretation was flawed.</p>
| 0non-cybersec
| Stackexchange |
Devoted mum to donate two organs to save her little boy's life: 'This is going to be your year'. | 0non-cybersec
| Reddit |
What is this symbol? (used in a French 80s-90s animated spot). | 0non-cybersec
| Reddit |
My RAM was bad ("three beeps" bad) until shuffled. <p>I've got an early 2011 13" i7 MBP, OS X 10.10.3 (the public beta version before the one released last night) with 10 GB of RAM β one of the original 2 GB modules in the bottom slot and an 8 GB module that's now a few months old in the top slot. Yesterday morning, I opened my computer to reveal a black screen after it had just been working a few minutes ago. I tried to turn it off and back on, and ended up getting the three-beep pattern that indicates bad RAM. I opened up my computer's back, and here's what I tried (and what happened when I attempted to power on after trying it):</p>
<ol>
<li><p>Pulling out and reinserting the RAM - no change.</p></li>
<li><p>Pulling out the 8 GB and trying to boot with just the 2 GB - no change</p></li>
<li><p>Pulling out the 2 GB and using just the 8 GB in the top RAM slot - no change</p></li>
<li><p>Putting the 8 GB in the bottom slot - it booted fine!</p></li>
<li><p>Adding in the 2 GB in the top slot -
no problem!</p></li>
</ol>
<p>"No trouble found." -Apple Hardware Test (both basic and extended) last night</p>
<p>So, here's my question: How'd my RAM spontaneously go bad enough to cause the beeps of death, and how'd the solution end up lying in switching which module goes in which slot?</p>
| 0non-cybersec
| Stackexchange |
Is "divisible by 15" the same as "divisible by 5 and divisible by 3"?. <p>Is stating that a number $x$ is divisible by 15 the same as stating that $x$ is divisible by 5 <strong>and</strong> $x$ is divisible by 3?</p>
| 0non-cybersec
| Stackexchange |
How to UNDO in Bash?. <p>I accidentially copied my whole home directory into one of my subdirectories, causing me to exceed my disk quota on a server.</p>
<p>Or does anyone know how to undo a command in general?</p>
| 0non-cybersec
| Stackexchange |
How many ways can the letters of the word TOMORROW be arranged if the Os can't be together?. <p>How many ways can the letters of the word TOMORROW be arranged if the Os cant be together?</p>
<p>I know TOMORROW can be arranged in $\frac{8!}{3!2!} = 3360$ ways. But how many ways can it be arranged if the Os can't be together? And what is the intuition behind this process?</p>
| 0non-cybersec
| Stackexchange |
Man smoking pipe with butterflies blowing out instead of smoke, so much going on.. | 0non-cybersec
| Reddit |
One eskimO ~ Amazing. | 0non-cybersec
| Reddit |
Data Bowie: A Look at Sentiment x Decade for the Music Legend [OC]. | 0non-cybersec
| Reddit |
ModuleNotFoundError: No module named 'pandas.rpy'. <p>I'm trying to <code>import pandas as pd</code>. I get <code>ModuleNotFoundError: No module named 'pandas.rpy'</code>. Why? I use pandas 0.20.1 + python 3.6 x64 + Windows 7 .</p>
<p>Example:</p>
<pre><code>import os
os.environ['R_HOME'] = 'C:\Program Files\R\R-3.4.0'
os.environ['R_USER'] = 'bob'
import rpy2.robjects as robjects
import pandas.rpy.common as com
import pandas as pd
</code></pre>
<p>Returns:</p>
<pre><code>Traceback (most recent call last):
File "C:\doc\GitHub\proj\src\open_rdata.py", line 19, in <module>
import pandas.rpy.common as com
ModuleNotFoundError: No module named 'pandas.rpy'
</code></pre>
| 0non-cybersec
| Stackexchange |
Star Wars Leg Sleeve by Boris from Hungary. | 0non-cybersec
| Reddit |
Solving $n$th order determinant. <p>I have a determinant of nth order that I am not able to convert into a triangular shape. I believe that this determinant is quite easy, but I can't find a way to fully convert one of the corners into zeros. My other idea was to use the Laplace principle, but that didn't work as well.
$$
\begin{vmatrix}
4 & 4 & 0 & 0 & \cdots & 0 & 0 \\
1 & 4 & 4 & 0 & \cdots & 0 & 0 \\
0 & 1 & 4 & 4 & \cdots & 0 & 0 \\
\vdots & \vdots & \vdots & \vdots & \ddots & \vdots & \vdots \\
0 & 0 & 0 & 0 & \cdots & 4 & 4 \\
0 & 0 & 0 & 0 & \cdots & 1 & 4 \\
\end{vmatrix}
$$</p>
<p>If someone could present a detailed way of converting this determinant into a triangular shape, it would be much appreciated.
In addition to that, maybe someone could give some tips for solving nth order determinant by converting it into a triangular shape, using the Laplace principle or any other more or less basic methods.</p>
| 0non-cybersec
| Stackexchange |
How to disable tabs on windows 10 login. <p>I have a magswipe card I want to use to log in to my computer (school ID). I want to use this as a password, with the card reader plugged in as a keyboard. The only problem is that this particular ID contains a tab, which removes the cursor from the login box. I thought I could run a program before login and use that to trigger the application "Simple Disable Key," but I discovered things like that only run once you've logged in successfully and the desktop loads. Is there any way to work around the tab, or should I just give up on using this card? </p>
| 0non-cybersec
| Stackexchange |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
What's the hardest part when your ex tells you she is HIV positive. Trying to act surprised. | 0non-cybersec
| Reddit |
T-SQL Column alias on computed column - Invalid column name. <p>I'm using an alias to refer to a computed column. Here is a snippet from the actual code I'm trying to make work, to compute similarity and return matches where the similarity score is 3 or higher.</p>
<pre><code>select [FirstName], difference([FirstName], 'mitch') as similarity
from [Dev].[dbo].[Name]
where similarity > 2
order by similarity desc
</code></pre>
<p>Exception Message:</p>
<blockquote>
<p>Invalid column name 'similarity'.</p>
</blockquote>
<p>As similarity is not a real column, how would I make this work?</p>
| 0non-cybersec
| Stackexchange |
Samsung's rise and fall - How Samsung won and then lost the smartphone war - Business Insider article. | 0non-cybersec
| Reddit |
Shoenfield's Mathematical logic book Proof of Herbrand's Theorem. <p>I have trouble understanding the first lemma proof of the Herbrand's theorem section of the book. The proof of the lemma starts with a closed existential formula <strong>A</strong> and proves that <strong>A</strong> is a theorem iff <strong>T</strong>[<span class="math-container">$\neg$</span> <strong>B</strong>] is inconsistent, where <strong>B</strong> is the matrix of <strong>A</strong>. Then it invokes the consistency theorem (which states that an open Theory <strong>T</strong> is inconsistent iff there is a quasi-tautology which is a disjunction of negations of instances of nonlogical axioms of <strong>T</strong> ) as a chain to prove the lemma. But to use that, shouldn't <span class="math-container">$\neg$</span> <strong>B</strong> be a non-logical axiom of <strong>T</strong> ? and this can't even be a case, since the lemma states that <strong>T</strong> is a theory with no nonlogical axioms.</p>
<p>Edit : <a href="http://www.cs.ru.nl/bachelorscripties/2015/Emma_Gerritse___4248120___Herbrands_theorem.pdf" rel="nofollow noreferrer">http://www.cs.ru.nl/bachelorscripties/2015/Emma_Gerritse___4248120___Herbrands_theorem.pdf</a> here's where i take a look at to help me understand the argument. In this proof the same technique is adopted.</p>
| 0non-cybersec
| Stackexchange |
What is a Teen Entrepreneur? And How Parents Can Be Supportive | Radical Parenting. | 0non-cybersec
| Reddit |
Show that the points in $\mathbb{R}^3$ which lie on a line through ${\bf p}+t {\bf v}$ and ${\bf q}$ (some $t\in\mathbb{R}$) make up a plane. <p>Show that the points in $\mathbb{R}^3$ which lie on a line through ${\bf p}+t {\bf v}$ and ${\bf q}$ (some $t\in\mathbb{R}$) make up a plane.</p>
<p>That's kind of confusing, so hopefully this helps:
<a href="https://i.stack.imgur.com/nwmID.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/nwmID.png" alt="enter image description here"></a></p>
<hr>
<p>Equation of plane is $d=a(x-x_0)+b(y-y_0)+c(z-z_0)$, where $[a,b,c]$ is the <strong>normal vector</strong>, and $[x_0,y_0,z_0]$ is a <strong>point on the plane</strong>.</p>
<p>Everyting in $\mathbb{R}^3$</p>
<hr>
<p>A point <strong>on the plane</strong> is any point on the line $l$.</p>
<p>The line $l=[l_1,l_2,l_3]$ can be written as $[p_1+tv_1,p_2+tv_2,p_3+tv_3]$</p>
<p>That is a point on the line.</p>
<p><strong>A normal vector</strong> to the plane is the vector from any point on $l$ to the point $q$.</p>
<p>Normal = $[q_1-(p_1+tv_1),q_2-(p_2+tv_2),q_3-(p_3+tv_3)]$</p>
<hr>
<p>Then I can plug into the equation and solve. Is this correct? It's hard for me to visualize this but I think it is okay.</p>
| 0non-cybersec
| Stackexchange |
ITAP of the glowing grass of the carnival.. | 0non-cybersec
| Reddit |
How to show different platforms on a user story map?. <p>I'm now a huge fan/believer of Jeff Patton's <a href="http://jpattonassociates.com/the-new-backlog/" rel="nofollow noreferrer">user story map</a>. I'm currently reading <a href="http://rads.stackoverflow.com/amzn/click/1491904909" rel="nofollow noreferrer">his book</a>.. </p>
<p>Jeff talks a lot about depicting different roles on a user story. However, I'm not sure how to do this when there are different platforms per role? i.e. say I'm developing a software for buyers and sellers.. we are only developing and android app for the buyer but both iOS and android for the seller. How do I depict this on a user story map?</p>
| 0non-cybersec
| Stackexchange |
Longest telemarketer call ever = Greatest telemarketer call ever. Respect his troll.. | 0non-cybersec
| Reddit |
Intersection of spherical caps. <p><strong>Short version:</strong> if two spherical caps of the same sphere intersect, how can I determined the coordinates of the two "singular points" of this intersection</p>
<p><strong>Long version:</strong> On a unit sphere, centered at the original, we consider two spherical cap. Each cap is defined by:</p>
<ul>
<li>the (unit) vector indicating the top of the spherical cap, $\mathbf{n}$
</li>
<li>the angle $\theta$, defined as is <a href="http://wapedia.mobi/en/File%3aSteradian_cone_and_cap.svg" rel="nofollow">done there</a>; any point $\mathbf{r}$ on the sphere belongs to the cap iff $\mathrm{angle}(\mathbf{n},\mathbf{r}) \le \theta$
</li>
</ul>
<p>The question is: given two spherical caps $(\mathbf{n}_1,\theta_1)$ and $(\mathbf{n}_2,\theta_2)$, their intersection can be:</p>
<ol>
<li>empty</li>
<li>a single point</li>
<li>a surface delimited by two circular arcs, intersecting in two points</li>
</ol>
<p>The question is: in the third case, how can I determine the coordinates of the two points of interest? I'm sure it's not so hard if you find the right way to go at it.</p>
| 0non-cybersec
| Stackexchange |
Elementary number theory, 'concert-ticket-arithmetic'. <p>Four friends, call them A,B,C and D are planning to go to a concert, but they realize that they
are a few dollars short to buy tickets.(50 $ per ticket). </p>
<pre><code> We know that each of them has an integer amount of dollars.
If B borrowed 1$ from A,then B would have 2/3 of Aβs balance
If C borrowed 2$ from B,then C would have 3/5 of Bβs balance
If D borrowed 3$ from C, then D would have 5/7 of Cβs balance
</code></pre>
<p>At least how much more money do they need(in $) in order to afford 4 tickets?</p>
| 0non-cybersec
| Stackexchange |
Could Lightroom be adding noise to my photos?. I recently upgraded from the Canon 7D to the 5D MKiii. The main reason I upgraded is because of the noise levels in my unedrexposed areas. I don't mind a bit of grain, but the noise I am refering to is patterned and unacceptable, even at low ISO. I've seen images made with lower model cameras that do not exibit the the amount of noise some of my photos have. Could Lightroom (4) or my Computer be causing this? Could I be doing something wrong?
[Example](http://i.imgur.com/QUbrTfe.jpg).
This is cropped in pretty tight on an underexposed area, shot at 320 ISO. | 0non-cybersec
| Reddit |
The perfect memorial for a purrrrfect friend. (Warning - Beautiful, but a little sad)
. | 0non-cybersec
| Reddit |
Can I buy my own debt?. After watching John Oliver buying a lot of peoples medical debt, could I buy my own debt if I had the money to do so? | 0non-cybersec
| Reddit |
π¨RED ALERTπ¨ π¨RED ALERTπ¨. SUBGAP HAS DROPPED BELOW 10K again! ACT NOW! π¨RED ALERTπ¨ π¨RED ALERTπ¨ get #subscribetopewdiepie trending!. **Pewdiepie subscribers:** 95,029,383
**T-series subscribers:** 96,248,408
#SUB GAP = -1,219,025 | 0non-cybersec
| Reddit |
Who do you think you were in your past life? -- URGENT UPDATE. Link to the first post: http://www.reddit.com/r/nosleep/comments/382ais/who_do_you_think_you_were_in_your_past_life/
****
Hello, /r/NoSleep. My name is Natasha Paulson, or βTashaβ for short. This is not my Reddit account β rather, it belongs to a young woman named Amelia Stanton, whom we are desperately trying to find. If anyone has any information, please PM this account immediately.
I read Ameliaβs last post on this website, making our search all the more urgent. It is very dangerous for a girl like Amelia to be out on her own.
Please allow me to explain.
Iβm forty-two years old, an Indiana native (Gary, Indiana, for those who are wondering). I became interested in Psychology as a child. My younger brother, being considered mentally ill for the time, was institutionalized when I was fourteen. I never saw him again. Later, I would recognize that his symptoms match those of Autism. I wanted to help people like Andrew, thatβs why I chose this path.
I started working at a very special hospital for mentally ill patients. For safetyβs sake, I wonβt disclose the name of our hospital. For the remainder of this post, it will be referred to as Saint Anthonyβs Home.
Saint Anthonyβs is somewhat experimental. I have to admit, I was very intrigued and excited when I was introduced to the hospital. The particular ward to which I was originally assigned was the childrenβs non-violent ward. Itβs exactly what it sounds like: minor patients who arenβt considered a danger to themselves or others are housed in this ward.
I had been working at Saint Anthonyβs for four years when Ameliaβs parents first brought her in. She was only nine at the time. As a child sheβd claimed to have had strange visions of past lives, which wasnβt initially alarming, as all children are imaginative (albeit some moreso than others). However, Amelia clung to these delusions as she grew older. She became increasingly paranoid and withdrew into herself. By the time she was brought to us, she had been completely non-responsive for an entire month.
I have to admit, I didnβt care for Ameliaβs parents very much. They acted disgusted with their own child, and Amelia had several strange bruises and cuts that they declined to explain. I have my own suspicions as to why Ameliaβs delusions and paranoia grew worse over time, but I couldnβt get Amelia herself to confirm or disprove them.
The fact is, Amelia took to me right away. She opened up as soon as we were alone together. She told me all about her βvisions.β For the most part, they concerned a fantasy life based on Victorian-era society. There were minor errors and inconsistencies in terms of dress and mannerisms, but she was convinced that her visions depicted absolute truths. She occasionally mentioned other past lives, with one particularly intriguing vision seemingly based on Cleopatraβs Egypt. For the most part, however, she was obsessed with this Victorian fantasy world.
I tried everything to understand what might be causing the delusions, but all I arrived at were dead ends. Her family history had no other recurrences of such phenomena, and her parents were wholly unhelpful with my inquiries. In fact, they stopped visiting Amelia after only two years. Theyβve never been back since.
Various medications have also failed to treat Amelia. Her symptoms donβt appear to coincide with more major conditions such as Schizophrenia, Antisocial Personality Disorder, or Dissociative Identity Disorder. Although her delusions could be due to some trauma, I myself do not believe so, in part because they started so early on. Even if there was a trauma in her past, Amelia herself has never told me.
All Amelia tells me about is her visions, as well as the fantasy world she has constructed for her present reality.
For example, in Ameliaβs last post, she said we used to walk to school together. What she is in fact remembering are the times I walked her to group therapy during her first few years here.
The move to college is, I believe, a reference to her move from the childrenβs ward to the adultβs ward. Although my specialty and focus is childrenβs psychology, I have worked with Amelia so long that she will no longer interact with any other therapist. We tried setting her up with a new doctor, but she simply shut down and withdrew into herself. It seems as though I will be working with Amelia for the rest of my professional career.
Things were going well until a few days ago. As I mentioned earlier, Saint Anthonyβs Home is an experimental treatment center. Amelia, as a part of the non-violent ward, has very few restrictions in her daily life. Although she canβt leave the ward itself, her room is not locked and she is free to roam the ward as she pleases. The patients are also able to watch TV and use computers, with some restricted Internet access. The Internet is actually mostly unblocked β we keep close tabs on what our patients do online, but we like to give them the chance to interact in a fairly normalized community to help us effectively direct their treatments.
Normally, all of these options are open to Amelia. But a few nights ago she had another night terror, this one much worse than the others.
Amelia mentioned the night terrors in her previous post. She has always described the same scene to me, where she has been stabbed somewhere in a forest and left for dead. She has been prone to these night terrors since she was about fourteen. The nightshift nurses have become accustomed to dealing with them, and she is usually able to calm herself down after being woken up.
This time, however, she was inconsolable. She fought hard against the nurses and eventually I was called in, as I am the person she feels most comfortable with. I noticed something was off immediately when I walked into the room and she went silent. She stopped fighting but she also didnβt interact with me in a typical manner. Instead of explaining what was wrong, she stared at her feet and wouldnβt meet my eyes.
βAmelia, the nurses told me you were having a nightmare. Is everything ok?β
She took in a deep breath and said, βYeah, Iβm fine, just the usual vision. Iβm fine. You can go back to sleep, Tasha.β
I believe this is the first time in our relationship that Amelia has lied to me. I could tell that something was off, but I wasnβt sure what. I made a careful note in her case file and instructed the nurses to watch her carefully. We made the decision not to restrict her privileges or move her to a new ward yet, as I was fairly certain this was a one-time issue.
That was a very grave mistake.
Amelia went back to normal for the next few days. Well, she was mostly normal. In reality, she continued to behave in a very guarded manner during our sessions. I thought I would give her some time to open up again. There is nothing worse that forcing a mentally-ill person into a situation where they feel unprotected and attacked.
Unfortunately, two nights ago one of our night guards made a poor decision.
The nurses were busy dealing with a patient on the opposite end of the ward β another patient prone to night terrors. During the commotion, the guard who was supposed to be on duty had fallen asleep, leaving his keys and post unattended.
Amelia must have been planning this. She was already gone by the time the nurses returned to their stations.
Since then, weβve notified the police and weβve all been searching frantically for her. My first plan, of course, was to check this Reddit account. Because we so closely monitor Internet usage, I knew she kept this account. She saved the password and username on the lounge computer so I was able to log in. Thatβs when I saw the post. Now that I know what kind of night terror she had, things are making more sense.
Iβve changed her Reddit password. I considered leaving it open, but I donβt want her to be able to access the private messaging function. I saw that she tried to contact a few redditors who commented on her last post. Please, if any of you know where she is, for the love of God, let me know. Iβve worked with Amelia for ten years now, but the human mind is a strange thing and I donβt know what sheβs planned. She could be a danger to herself or others.
Please contact me if you have had dealings with her. | 0non-cybersec
| Reddit |
[Spoilers] The work bathroom needed some character.. | 0non-cybersec
| Reddit |
What do men do after orgasm?. 1% Do it again
1% Go Smoking
1% Fall Asleep
97% Clear History
EDIT: Punctuation | 0non-cybersec
| Reddit |
What to teach in a lecture about diagonalization of matrices in 50 minutes?. <p>I have to give a lecture of 50 minutes with the theme "diagonalization of matrices" (basic undergrad level) for a public contest. I would like suggestions about the contents of this class. I've been thinking to give the pages 181-187 from <a href="http://www.math.pku.edu.cn/teachers/anjp/textbook.pdf" rel="noreferrer">Hoffman and Kunze's linear</a> algebra book (maybe I will not have time to do all these pages).</p>
<p>What do you think is the best approach? I don't know if I start this class with eigenvalues as Hoffman and Kunze do and goes through very basic theorems about eigenvalues and diagonalizable matrices or begin with the definition of diagonalizable matrices and prove deeper theorems.</p>
| 0non-cybersec
| Stackexchange |
Amazon ads on Facebook trying to sell me Windows NT Workstation 4.0 (and Win 98). | 0non-cybersec
| Reddit |
How to get all product id from Shopify Python API. <p>I have created one private shopify app. Which can get almost all the information with product id. But I need one option to get product id of all products in a shop with API. I have tried the option below</p>
<pre><code>shopify.Product.find()
</code></pre>
<p>but it shows only first 50 products. But my shop has more than 2.4k products. </p>
| 0non-cybersec
| Stackexchange |
Not only my job is tough.. | 0non-cybersec
| Reddit |
Overtaking in the snow. | 0non-cybersec
| Reddit |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
How do I disable Facebook Messenger's "ping this friend" suggestion?. <p>I'm in a group chat with a friend whose last name begins with "Ok". Unfortunately enough, this means that every time I type "Ok" + enter, Facebook autocorrects to @[friend], and I end up pinging this friend.</p>
<p>How can I disable this feature? I'm using a desktop, not the app.</p>
| 0non-cybersec
| Stackexchange |
What's a simple, commonly known fact that totally blew your mind when you learned it?. | 0non-cybersec
| Reddit |
Wifi range Cisco AE3000. <p>Can a cisco wifi adapter AE3000 extend my wireless range? I want to connect to some hotspots about 1/2 mile away from me</p>
| 0non-cybersec
| Stackexchange |
Installing litecoin-qt in Ubuntu. <p>Why can't I run the litecoin-qt file in the bin directory of the archive downloaded from litecoin.org? I copied it into the home directory and double-clicked, and also tried to to run it from terminal. I'm using Ubuntu 16.04 LTS and the downloaded archive is Litecoin Core 0.15.1. The error message I get is "There is no application installed for 'shared library' files. Do you want to search for an application to open this file?" Clicking Yes produces nothing.</p>
| 0non-cybersec
| Stackexchange |
Java Http Client to upload file over POST. <p>I'm developing a J2ME client that must upload a file to a Servlet using HTTP.</p>
<p>The servlet part is covered using Apache Commons FileUpload</p>
<pre><code>protected void doPost(HttpServletRequest request, HttpServletResponse response)
{
ServletFileUpload upload = new ServletFileUpload();
upload.setSizeMax(1000000);
File fileItems = upload.parseRequest(request);
// Process the uploaded items
Iterator iter = fileItems.iterator();
while (iter.hasNext()) {
FileItem item = (FileItem) iter.next();
File file = new File("\files\\"+item.getName());
item.write(file);
}
}
</code></pre>
<p>Commons Upload seems to be able to upload only multipart file, but no application/octect-stream.</p>
<p>But for the client side there are no Multipart classes, neither, in this case, is possible to use any HttpClient library.</p>
<p>Other option could be to use HTTP Chunk upload, but I haven't found a clear example of how this could be implemented, specially on the servlet side.</p>
<p>My choices are:
- Implement a servlet for http chunk upload
- Implement a raw client for http multipart creation</p>
<p>I don't know how to implement none of the above options.
Any suggestion?</p>
| 0non-cybersec
| Stackexchange |
Ubuntu 18.04 from VirtualBox sometimes has small window. <p>I'm using VirtualBox 6.1.8 on Windows 10. I've installed an Ubuntu 18.04 image provided by my company. This installation includes the Guest Additions package. Most of the time, the VM starts up perfectly fine, showing a fullscreen window, allowing cut/paste between the VM and host, and shared folders are mounted.</p>
<p>However, quite often when I start up the VM, I get a small window that looks like before I installed Guest Additions. However, cut/paste between host/VM still works, and I still have shared folders. When this happens, I restart the VM, and it almost always starts up fine on the second try.</p>
<p>I had a feeling that this is some sort of race condition, so I thought perhaps not logging in as quickly as I usually do might help. I used to have it set to auto-login, and it seemed like this happened more often with that. I now wait until the login page appears, and I don't immediately sign in. It's possible this helps, but this morning it didn't. I still got the small window, then I restarted, and after logging in again, I got a large window again.</p>
| 0non-cybersec
| Stackexchange |
Tips with New Lover and unlocking my Primitive Rougher side. I[M/22]have a new SO[F/20] and we are still breaking the ice sexually.
She has only had sex with one other guy and he was extremely selfish and didn't focus on her at all.
She was very afraid of my size
And was not ready to have sex yet but we had really awkward sex on my couch anyway and I have been frazzled since then.
I have always closeted myself sexually but I want to unlock that primitive side for the first time this weekend with the new lady. We have sexted and really worked up each other and I have desires to pound against a wall and really get messy and she wants to see that. My problem is that I have NEVER shown anyone that side of me and I am not sure how to get there. I haven't been into someone this much in years and I see a future with this girl. Also I have gone down and fingered women before but I honestly do not know what I am doing. From a females standpoint, what is something that drives you wild in the bedroom? I want to take this woman to another planet sexually and seperate myself from any of her other lovers.
And men how do you guys get in that true primitive mode?
She doesn't want me to hold back and I actually want to go 100% for the first time.
Thank you for your time, friendly Redditors. | 0non-cybersec
| Reddit |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
SQL Query is sometimes slow, sometimes fast. <p>I have two hosts, one with my rails app, one with my MySQL database. Going through my rails Logfile I can see that sometimes queries take much more time than the same query at other times. Think 200ms vs 2ms. The query itself is a select, explain tells me that it uses my index.</p>
<p>The engine is innodb, I already increased the innodb_buffer_pool_size, max_connections and the thread_cache_size. vmstat tells me that there is no paging.</p>
<p>What could be the reason for sometimes slow and sometimes fast queries?</p>
| 0non-cybersec
| Stackexchange |
Integral Inequality for Bound on Gradient of Solution to Heat Equation. <p>My overall aim is to show that, for a bounded solution $u(x,t)$ to the heat equation in $\mathbb{R}^n \times [0,T]$ with boundary condition $u(x,0) = f(x)$, $$\max |\nabla u(x,T) | \leq \frac C{\sqrt{T}} \max \left|f\right|.$$</p>
<p>I've been able to bound the term on the left by $$\left(\frac 1{(4 \pi t)^n 4t^2} \int_{\mathbb{R}^n} f(y)^2 e^{-\frac{|x-y|^2}{2t}} |x-y| dy\right)^{\frac12}.$$ How can I show that this term is less than or equal to the right side of my original inequality?</p>
<p>EDIT: I can actually get a slightly stronger bound on the left by using Cauchy-Schwarz in earlier calculations: $$\left(\frac 1{(4 \pi t)^n 4t^2} \int_{\mathbb{R}^n} f(y)^2 dy \int_{\mathbb{R}^n} e^{-\frac{|x-y|^2}{2t}} |x-y| dy.\right)^{\frac12}$$ If $y \in \mathbb{R}^1$ then the second integral becomes simply $2t$, though I'm not sure how the evaluation changes in higher dimensions. But the first integral is, of course, the $L^2$-norm for the function f (once you take into account the power of $1/2$ around the whole expression) so that's something at least.</p>
| 0non-cybersec
| Stackexchange |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.