text
stringlengths 3
1.74M
| label
class label 2
classes | source
stringclasses 3
values |
---|---|---|
Possible to create reflowable PDF that can by customised by the end user?. <p>I'm looking to see if it's possible to create something a PDF document that can do two things for a client:</p>
<p>a) contain reflowable content, more specifically expanding/collapsing sections. Content starts as a one line heading but might need to expand to flow over multiple pages (I know this is possible on it's own with something like LiveCycle)</p>
<p>b) contain "text fields" (such a customer name and phone number) that can be easily updated by my client who will not have access to Adobe Acrobat Pro or Adobe LiveCycle (something like a PDF template that would generate the final PDF with requirement (a).</p>
<p>To further complicate things the "text fields" probably can't be form fields since is undesirable for the customer to be able to edit and save changes.</p>
<p>I know each of these things can be done individually but I can't think of a way to do them both together.</p>
<p>EDIT: requirement a) needs to be able to flow over multiple pages but still collapse to 1 page.</p>
| 0non-cybersec
| Stackexchange |
80's Girls. | 0non-cybersec
| Reddit |
How to name components of a Pair. <p>Given the <a href="https://kotlinlang.org/api/latest/jvm/stdlib/kotlin/-pair/" rel="noreferrer">Pair</a> <code>val coordinates = Pair(2, 3)</code>, is it possible to name each value so I can do something like <code>coordinates.x</code> to return <code>2</code>? Or is <code>coordinates.first</code> the only way to access that first value?</p>
| 0non-cybersec
| Stackexchange |
Forwarding apache requests (port 80) to Tomcat (port 8080)?. <p>I want to run a Tomcat application through a regular website URL, such as <code>www.xyz.com</code>. I would like the root of this domain to act as the base directory for the web application, so each request to <code>www.xyz.com/a/b/c</code> becomes <code>www.abc.com:8080/myApp/a/b/c</code>. Ideally, I would be able to do this transparently and only for certain webapps.</p>
<p><code>www.abc.com:8080</code> should still respond to requests.</p>
<p>What do I need to do to make this happen?</p>
| 0non-cybersec
| Stackexchange |
Show that $\lim _n (X \setminus E _n ) =(X \setminus \lim _n E _n )$, for $E_n $ an increasing sequence of sets. <p>Let $\{E _n \} $ be a sequence of subsets of $X $ defnined as $E _n=\cap _{m=n } ^{\infty } A _m $, so that $E _n \subset E _{n+1 }\subset ...$ .</p>
<p>Let $E = \lim E _n = \cup _{n=1 } ^{\infty } E _n$</p>
<p>I want to show that $\lim _{n \to \infty } (X \setminus E _n ) =(X \setminus E )$</p>
<p>(Actually I want to show that $\lim _{n \to \infty } \mu (X \setminus E _n )= \mu (X \setminus E) $, but I know that I can take the limit inside the measure since the sequence is monotone)</p>
<hr>
<p>We have that $X \setminus E _n \supset X \setminus E _{n+1 }\supset ...$, so that $\lim _{n \to \infty } (X \setminus E _n ) = \cap _{n=1 } ^{\infty } (X \setminus E ) $</p>
<p>if $x \in \cap _{n=1 } ^{\infty } (X \setminus E _n ) \iff \forall n \ge (x \in X \wedge x \notin E _n)$ is this equivalent to $x \in X \wedge (\forall n \ge 1: x \notin E _n ) $?</p>
<p><em>I think the quantifier makes me unsure of what is correct here...</em> </p>
<p>Thanks in advance!</p>
| 0non-cybersec
| Stackexchange |
Exist closed forms of the distribution of return time in markov chains?. <p>Hi, I am interested in the distribution of return times in simple random walks on finite graphs. </p>
<p>Let $G$ be a connected finite graph with, with two independent random walks. If both random walks start are at time $t_0$ on the same node in the graph, how long does it take until they meet again? I have not found papers on this specific problem, but read that is can be transformed to a single random walk and the question of when the random walk returns to exactly the node where it is at $t_0$.</p>
<p>As such I am interested in the distribution of these return times. Generally I know how to compute the numeric values of the distribution for a given graph. But my question is whether this can be modeled through a given distribution (e.g. exponential).</p>
<p>Besides the PDF I am more interested in the CDF of this return time distribution.</p>
| 0non-cybersec
| Stackexchange |
This Elephant seeing the ocean for the first time gives me life!. | 0non-cybersec
| Reddit |
Any Reddit readers have questions for the Deus Ex: Human Revolution team? (Post them here). Hey Reddit,
Siliconera is meeting with Eidos Montreal to see and interview the Deus Ex: Human Revolution team. We asked our readers to send in questions, but we wanted to open this up to the Reddit community too.
So, anyone have questions for Eidos Montreal about Deus Ex? We're going to bring some questions from the Reddit community for our interviews! | 0non-cybersec
| Reddit |
[RAT] Detailed analysis of first Android Trojan Malware using Baidu Cloud Push service. Still available for download from third party Android markets.. | 1cybersec
| Reddit |
Winner?. | 0non-cybersec
| Reddit |
How to install modules from CPAN without sudo?. <p>Is there a way to install modules from CPAN without resorting to <code>sudo</code>?</p>
<p>(And without <code>perlbrew</code>, please.)</p>
| 0non-cybersec
| Stackexchange |
Downgrading libxml2 on 12.04. <p>For some reason, on one of the servers that we have in our network running Ubuntu Server 12.04, the version of libxml2 is 2.8.0 (which is the one from Ubuntu 12.10).<br>
This creates some issues, especially since I need to install <code>libxml2-dev</code> and I get some unmet dependencies. I get the following error: </p>
<pre><code>libxml2-dev : Depends: libxml2 (= 2.7.8.dfsg-5.1ubuntu4.9) but 2.8.0+dfsg1-5ubuntu2.2 is to be installed
</code></pre>
<p>I do not know why the newer version of libxml2 is present on the system, but is there a way to either use the new version of libxml2-dev (which is not present in the default sources.list) or to <strong>safely</strong> downgrade libxml2 to the correct version for 12.04?</p>
| 0non-cybersec
| Stackexchange |
How do I find the value of this missing variable and the normal to the equation?. <p>How do I find the value of this missing variable and the normal to the equation?</p>
<p>The line $y = 4x + k$ is a tangent to $y = x^2 + 4x + 3$, at point $P$.</p>
<p>1) Find the value of $k$.</p>
<p>2) Find the equation of the normal to the curve $y = x^2 + 4x + 3$, at point $P$.</p>
| 0non-cybersec
| Stackexchange |
Total madlad. | 0non-cybersec
| Reddit |
How to use django-notification to inform a user when somebody comments on their post. <p>I have been developing in django for sometime now, and have developed a neat website having functionality such as writing blogs, posting questions, sharing content etc. However there is still one thing that is missing and i.e. creating notification for users.</p>
<p>What I want to do is to inform users in their profiles, whenever somebody comments on their posts, or if they are following a particular post and there is an update on it, then inform the user of that update. I have looked around many applications but I am still very confused about how to do it.</p>
<p>In case of using <code>django-notification</code> I seem to have an impression(which can be wrong) that I can use this only to inform the user via email, i.e. I cannot show these notifications in the user profile, just like we have on facebook.</p>
<p>Firstly I would like to know if I am wrong, and then I really need some proper tutorial or guidance on how to go about doing it. I know how to register a notification and send it on proper signal but there is no documentation on how to show these notices in a template, if this can be done.</p>
<p>Any guidance/tutorial/getting started doc will be deeply appreciated.</p>
| 0non-cybersec
| Stackexchange |
Has a subfactor with lattice $B_3$, a singly generated identity biprojection?. <p>Let $(N \subset M)$ be an irreducible finite index subfactor. </p>
<p>If its lattice of intermediate subfactors is equivalent to $B_3$ (the lattice of divisors of $n=p_1p_2p_3$ square free): </p>
<p><img src="https://i.stack.imgur.com/UJHxF.png" alt="enter image description here"></p>
<p><strong>Question</strong>: Is there $p \in P_{2,+}(N \subset M)$ minimal central projection, generating the identity biprojection? </p>
<p><em>Notation</em>: The biprojection generated by a projection $p$ is the smallest biprojection $b \ge p$.<br>
The identity biprojection is the Jones projection $e_M$. </p>
<p><em>Remark:</em> $B_3$ is distributive and the answer is yes for all the distributive lattices <strong>if</strong> the biprojection generated by a minimal central projection is always central; so it's true if $P_{2,+}(N \subset M)$ is abelian, for example the group-subgroup subfactors, and also for the depth $2$ case. It's also true if the lattice admits $<8$ vertices. $B_3$ is the smallest distributive lattice for which I don't know how to prove that in general.<br>
In particular I don't know if it's true for the dual-group-subgroup subfactors $(R^G \subset R^H)$, but there is no counter-example for $B_3$ for $\vert G \vert \le 2000$ (except $512$, $768$, $1024$, $1280$).</p>
| 0non-cybersec
| Stackexchange |
filling segments by intersection method: there is no named path called. <p>I'm just trying to fill each peripheral segment of my drawing. The names of the hexagon and the circle are <code>test</code> and <code>circ</code>. Additionally, the line pieces connecting edges of the hexagon to the outer circle are named in the for loop. However, when I use the names as the intersection segments, a <code>there is no named path called '2 and circ and test'</code> is thrown. </p>
<pre><code>\documentclass[tikz,border=3mm]{standalone}
\usetikzlibrary{arrows.meta,shapes,positioning}
\usepackage{pgfplots}
\pgfplotsset{compat=newest}
\usepgfplotslibrary{fillbetween}
\begin{document}
\begin{tikzpicture}
\node[
fill=red!15,
draw = black,
regular polygon,
regular polygon sides=6,
align=center,
minimum size=5cm](test){};
\node[
fill=none,
draw = black,
circle,
dashed,
minimum size=9.2cm](circ){};
\foreach \n in {1,...,6}
{
\draw[black, name path = \n](test.corner \n) --
({\n*60}:4.6);
}
\node[] (c) at (test.center){$\pi^{0}$};
\foreach \n in {1,...,6}
{
\node[] (\n) at ({\n*60+30}:3.3){$\pi^{\n}$};
}
\fill[
orange!50,
intersection segments={
of=1 and 2 and circ and test
}];
\end{tikzpicture}
\end{document}
</code></pre>
<p>What am I doing wrong?</p>
| 0non-cybersec
| Stackexchange |
Get it together. | 0non-cybersec
| Reddit |
Old Humpty dumpty. | 0non-cybersec
| Reddit |
Blogum never lets me do my homework.. | 0non-cybersec
| Reddit |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
set cover where only certain special subsets are allowed. <p>I am trying to solve a problem which turns out to be a form of the set cover problem. I've implemented the greedy Set cover approximation algorithm for set cover, but it turns out to not be accurate enough for my needs.</p>
<p>Specifically I have a fixed, finite, list of special sets and I am trying to create a function which when given a set returns the smallest list of special sets which cover that given set, and that list should contain no sets which contain elements not in that given set. The fixed list seems like it should make the problem easier to solve than set cover, but I'm not sure how the additional requirement of no extra elements affects the difficulty. My sets also have a known maximum size which should also make this easier to solve. </p>
<p>A toy version of the problem is as follows:</p>
<blockquote>
<p>Let <span class="math-container">$U$</span> be the set <span class="math-container">$\{a,b,c,d,e,f,g,h\}$</span>. All the sets we mention from
here on will be subsets of this set.</p>
<p>Let <span class="math-container">$S$</span> be a list of special sets. For this version of the problem we
can use the following list: </p>
<p><span class="math-container">$$ S = [\{a,b,c,d,e,f,g,h\}, \{a,b,c,d\}, \{e,f,g,h\}, \{a,e\}, \{b,f\}, \{c,g\}, \{d,h\}, \{a,b\}, \{b,c\}, \{c,d\}, \{d,e\}, \{e,f\}, \{f,g\},\{g,h\}, \{a\}, \{b\}, \{c\}, \{d\}, \{e\}, \{f\}, \{g\}, \{h\}]$$</span></p>
<p>For a given set <span class="math-container">$G$</span> what is the smallest list of sets which are part
of <span class="math-container">$S$</span> which cover <span class="math-container">$G$</span>, (that is where the union of the sets in the
list is <span class="math-container">$G$</span>).</p>
</blockquote>
<p>For the above toy problem, the greedy approximation I've implemented, if presented with a set like <span class="math-container">$\{b, c, g, h\}$</span>, produces <span class="math-container">$[\{c, g\}, \{b\}, \{h\}]$</span> instead of the smaller list <span class="math-container">$[\{b, c\}, \{g, h\}]$</span>.</p>
<p>Has this sort of problem been well studied? Is there a known non-approximate algorithm given the additional constraints, that would be better than naive dynamic programming? A well-known name for the version of set cover where extra elements are not allowed would also be useful.</p>
| 0non-cybersec
| Stackexchange |
FLAN do!. | 0non-cybersec
| Reddit |
Are there any men that aren't into the bar/club scene that have had success dating? if so, how?. | 0non-cybersec
| Reddit |
Showing Homology Sequence breaks up into short sequences that split. <p>Let $X$ and $Y$ be polyhedra.</p>
<p>Show that if $p \in Y$, the homology exact sequence of $(X \times Y, X \times p)$ breaks up into short exact sequences that split.</p>
<p>Definitely am a bit lost on this one... what is the homology sequence of this going to look like exactly? Doesn't it depend on what subsets we use? Is their a canonical choice? Once we have this sequence, I might be able to see why it splits myself.</p>
| 0non-cybersec
| Stackexchange |
A Drobo, Time Machine, and lots of missing data. <p>I have <a href="http://www.drobo.com/" rel="nofollow">a Drobo</a> connected to my Mac. It has been used for storing large video files, keepsakes and other miscellaneous data. I also use it as a Time Machine backup drive.</p>
<p>Today, I went to look for some files and everything but my Time Machine backups are gone. I am at a complete loss and don't know what to do. I know I should have backed-up my Drobo to another disk, but didn't have a disk big enough.</p>
<p>Does anyone know what could have caused this and if there is anything I can do to figure out what was deleted or even recover the data?</p>
<p>Thank you.</p>
<p>[EDIT] I have noticed that files added to the Drobo just a day or two ago are also partially missing. I believe I have a corrupt volume. I am running DiskWarrior to verify the disk.</p>
| 0non-cybersec
| Stackexchange |
Query with different value executes differently. <p>Lets create 2 tables with test data:</p>
<p>1) </p>
<pre><code>create table test_users(
id serial primary key
);
insert into test_users
select * from generate_series(1,750000);
</code></pre>
<p>2)</p>
<pre><code>create table test_posts(
id bigserial primary key,
user_id INT
);
CREATE index idx ON test_posts(user_id, id);
INSERT INTO test_posts (user_id) SELECT 2 FROM generate_series (1,30038);
INSERT INTO test_posts (user_id) SELECT 3 FROM generate_series (1,31036);
INSERT INTO test_posts (user_id) SELECT 4 FROM generate_series (1,24032);
INSERT INTO test_posts (user_id) SELECT 5 FROM generate_series (1,93094);
INSERT INTO test_posts (user_id) SELECT 6 FROM generate_series (1,31033);
INSERT INTO test_posts (user_id) SELECT 7 FROM generate_series (1,62063);
INSERT INTO test_posts (user_id) SELECT 724309 FROM generate_series (1,2);
INSERT INTO test_posts (user_id) SELECT 724306 FROM generate_series (1,1);
</code></pre>
<p>Now, lets check count of rows and for example post max <code>id</code> per user, from <code>test_posts</code> table:</p>
<pre><code>SELECT user_id, count(*) , max(id) as maxid
FROM test_posts
GROUP BY user_id
order by count(*)
</code></pre>
<p>so, <code>user_id = 724306</code> have only one post and (in my case) post maxid is: <code>271299</code>.</p>
<p><code>user_id = 5</code> have most posts in table and maxid in my case is: <code>178200</code></p>
<p>Now I run this query:</p>
<pre><code>SELECT test_posts.id
FROM test_posts
JOIN test_users
ON test_posts.user_id = test_users.id
WHERE test_posts.id = 271299
</code></pre>
<p><code>explain analyze</code> shows:</p>
<pre><code>"Merge Join (cost=8.88..9.06 rows=1 width=8) (actual time=146.561..146.563 rows=1 loops=1)"
" Merge Cond: (test_users.id = test_posts.user_id)"
" -> Index Only Scan using test_users_pkey on test_users (cost=0.42..22808.42 rows=750000 width=4) (actual time=0.012..110.091 rows=724307 loops=1)"
" Heap Fetches: 724307"
" -> Sort (cost=8.45..8.46 rows=1 width=12) (actual time=0.012..0.013 rows=1 loops=1)"
" Sort Key: test_posts.user_id"
" Sort Method: quicksort Memory: 25kB"
" -> Index Scan using test_posts_pkey on test_posts (cost=0.42..8.44 rows=1 width=12) (actual time=0.007..0.007 rows=1 loops=1)"
" Index Cond: (id = 271299)"
"Planning time: 0.214 ms"
"Execution time: 146.588 ms"
</code></pre>
<p>Now run same query, just use 178200:</p>
<pre><code>SELECT test_posts.id
FROM test_posts
JOIN test_users
ON test_posts.user_id = test_users.id
WHERE test_posts.id = 178200
</code></pre>
<p><code>explain analyze</code> from this:</p>
<pre><code>"Merge Join (cost=8.88..9.06 rows=1 width=8) (actual time=0.040..0.042 rows=1 loops=1)"
" Merge Cond: (test_users.id = test_posts.user_id)"
" -> Index Only Scan using test_users_pkey on test_users (cost=0.42..22808.42 rows=750000 width=4) (actual time=0.016..0.018 rows=6 loops=1)"
" Heap Fetches: 6"
" -> Sort (cost=8.45..8.46 rows=1 width=12) (actual time=0.017..0.018 rows=1 loops=1)"
" Sort Key: test_posts.user_id"
" Sort Method: quicksort Memory: 25kB"
" -> Index Scan using test_posts_pkey on test_posts (cost=0.42..8.44 rows=1 width=12) (actual time=0.011..0.012 rows=1 loops=1)"
" Index Cond: (id = 178200)"
"Planning time: 0.249 ms"
"Execution time: 0.072 ms"
</code></pre>
<p>What causes that difference in execution time ?</p>
| 0non-cybersec
| Stackexchange |
A can of Coke for Ghostbuster fans. | 0non-cybersec
| Reddit |
Such great bike control. | 0non-cybersec
| Reddit |
How to configure CharacterEncodingFilter in SpringBoot?. <p>I encountered some encoding problems in learning Spring Boot;
I want to add a CharacterEncodingFilter like Spring 3.x.
just like this:</p>
<pre><code><filter>
<filter-name>encodingFilter</filter-name>
<filter-class>org.springframework.web.filter.CharacterEncodingFilter</filter-class>
<init-param>
<param-name>encoding</param-name>
<param-value>UTF-8</param-value>
</init-param>
<init-param>
<param-name>forceEncoding</param-name>
<param-value>true</param-value>
</init-param>
</filter>
<filter-mapping>
<filter-name>encodingFilter</filter-name>
<url-pattern>/*</url-pattern>
</filter-mapping>
</code></pre>
| 0non-cybersec
| Stackexchange |
Linear time algorithm for slicing stacked boxes. <p>I have a problem which has a rather limited time constraint, and would like to see if I could get a nudge in the right direction.</p>
<p>Here is the problem:</p>
<blockquote>
<p>You are presented with a wall with columns of different heights. Each column heights is represented as a non-zero integers.</p>
<p>Input state is defined using an array <strong><code>H</code></strong> of length <strong><code>N</code></strong>, containing heights of each
of the <strong><code>N</code></strong> columns on the screen, for example:</p>
<p><img src="https://i.stack.imgur.com/CeAHL.png" alt="Tetris snapshot defined using the <code>H</code> array"></p>
<p>Slicing the snapshot at a given height leaves a number of solid pieces
above that height. E.g. slicing at level 2 would cut 3 solid pieces:</p>
<p><img src="https://i.stack.imgur.com/HTZI7.png" alt="Slicing at level 2"></p>
<p>Slicing at level 1 would also cut 3 solid pieces:</p>
<p><img src="https://i.stack.imgur.com/bqMlH.png" alt="Slicing at level 1"></p>
<p>Similarly, slicing at level 0 would return a single (one) solid piece, while slicing at level 3 wouldn't cut any pieces.</p>
<p><strong>Requirement:</strong> Given an array of slice heights <strong><code>S</code></strong> of length <strong><code>M</code></strong>, containing all
levels at which a "slice" should be performed, return an array of length <strong><code>M</code></strong> containing numbers of cut pieces for each respective cut.</p>
<p>For example, given the input <code>H = {2, 1, 3, 2, 3, 1, 1, 2}</code> and <code>S = { 0, 1, 2, 3 }</code>, the program should return quantities <code>{1, 3, 3, 0}</code>, according to the examples above.</p>
<p>Both <strong><code>N</code></strong> and <strong><code>M</code></strong> are in the range of around <code>20,000</code>, but heights in each array can reach up to <code>1,000,000</code>.</p>
<p><strong>Both time and space worst-case complexity for the solution cannot exceed
<code>O(N + M + max(M) + max(N))</code>.</strong></p>
</blockquote>
<p>The last constraint is what puzzles me: it basically means that I cannot have any nested <code>for</code>-loops, and I cannot seem to escape this.</p>
<p>Obviously, there is some clever preprocessing which needs to be done to yield final results in <code>O(1)</code> per slice, but I haven't been able to come up with it.</p>
<p>I went on to create an array of cut numbers for each slice level, and then update all of them as I iterate through <code>H</code>, but this turns out to be <code>O(N*M)</code>, since I need to update all lower height levels. </p>
<p>Is there a data structure which would be appropriate for this task?</p>
| 0non-cybersec
| Stackexchange |
APT repository for old debian squeeze ARM. <p>I have ARM based board with debian squeeze with kernel 3.3.3. I have been using it with </p>
<pre><code>deb http://www.emdebian.org/grip squeeze main dev
</code></pre>
<p>It stopped working couple months ago, so I switched to </p>
<pre><code>deb http://ftp.debian.org/debian squeeze main
</code></pre>
<p>Today I noticed it's not working anymore. Where can I find repository for squeeze armel? For example I need <code>perl-base_5.10.1-17squeeze6_armel.deb</code> and many many others. </p>
| 0non-cybersec
| Stackexchange |
ITAP of my friend with a book on fire. | 0non-cybersec
| Reddit |
The Cloud Security Guide to RSA 2017. | 1cybersec
| Reddit |
Hyperledger fabric gossip authenticate RemotePeer's cert hash. <p>I am new to hyperledger fabric, I have one problem about gossip's remote peer authentication.
Because our server is in internal network(can't access internet), we need to setup a nginx before our peer node, assume that one orderer, 2 org, every org just has one peer, peer0.org1(peer01), peer0.org2(peer02), peer0.org1 is our internal peer node, and it needs to route by nginx include gossip and enable mtls. if we have peer0.org2's private key and cert, it should works, the config like below.</p>
<pre><code>peer01 nginx{
ssl_certificate peer02 server crt;
ssl_certificate_key peer02 server key;
ssl_client_certificate peer01 client ca crt;
location / {
grpc_pass to peer02
grpc_ssl_certificate peer01 client crt;
grpc_ssl_certificate_key peer01 client key;
grpc_ssl_trusted_certificate peer02 server ca.crt;
}
</code></pre>
<p>But actually we can't have peer0.org2's private key, so we try to use peer01's ca cert assign peer0.org2'cert and key which belong to peer01, peer01-peer02.crt, peer01-peer02.key.</p>
<pre><code>peer01 nginx{
ssl_certificate peer01-peer02 server crt;
ssl_certificate_key peer01-peer02 server key;
ssl_client_certificate peer01 client ca crt;
location / {
grpc_pass to peer02
grpc_ssl_certificate peer01 client crt;
grpc_ssl_certificate_key peer01 client key;
grpc_ssl_trusted_certificate peer02 server ca.crt;
}
</code></pre>
<p>But in fabric gossip source code, we found that we can't do this
<a href="https://i.stack.imgur.com/IlKUz.png" rel="nofollow noreferrer">enter image description here</a></p>
<p>it will verify the hash between remote cert(I think it get from the channel) and reveive msg'cert, so finally occur error and won't work.</p>
<p>my solution is that delete these verify codes and rebuild the docker, but I don't know rebuild which docker images can work, is that fabric-peer, can some guys tell me that each docker in fabric will use
what package in source code?
or can tell me the more better solution than modify the source code? I must say that we need to use tls.
many thx.</p>
| 0non-cybersec
| Stackexchange |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
Sequence converging to definite integral. <p>Let's define</p>
<p>\begin{equation*}
I_0 := \log\frac{6}{5}
\end{equation*}
and for $k = 1, 2, \ldots, n$
\begin{equation*}
I_k := \frac{1}{k} - 5 I_{k-1}.
\end{equation*}</p>
<p>How the value $I_n$ is linked with the value of $$\int_0^1\frac{x^n}{x+5} \mathrm{d}x \ ?$$</p>
| 0non-cybersec
| Stackexchange |
The Four Horsemen of The Apocalypse. | 0non-cybersec
| Reddit |
The Doll Lady. For the next update, you can find it [here](https://www.reddit.com/r/nosleep/comments/510jcg/the_doll_lady_dolores/)
---------------------------------------------
Okay, guys, so something really, really weird has been happening with my cousin in the last few months. I'd like to stress that a lot of the circumstances, though a little strange, could still be explained, I'm sure. My cousin, her family, and I have been under a lot of stress.
We both live in an exceedingly rural area of northern New York State. She lives a little north of me in a village called Talbot Falls. Talbot Falls isn't really a place you go to on purpose- just kind of one of those groups of houses that may or may not have a fire hall, or a community center, or a library. It's a place you pass through unknowingly, little split level houses and teetering, renovated farm buildings cluttering the side of the road, and you get annoyed at the seemingly purposeless 45 mile per hour speed zones. If you pay attention, you might even catch the road sign (rusty and riddled with bullet holes from bored teenagers with a .22 rifle) that reads the name.
In short, while it's not a place you go to intentionally, it's also really not a place where you expect to meet your worst nightmare, which is kind of what is happening there. This all started, like I said, a few months ago, and so far hasn't made it out to being public knowledge, which I consider a good thing. In any case, I would really like some help. Because there is just something not right here.
The cousin of mine who lives out in Talbot Falls, probably a twenty minute drive from where I live, has been a close friend of mine since childhood, and we basically treat each other as sisters. I call her kids my niece and nephew, and visit them probably every day. At the time the incidents started happening (probably early May) my cousin had just given birth to her newborn daughter. While most of her time was occupied with keeping her rather fragile infant healthy, she would often call on me to babysit her older child, Camren. Camren was a serious minded little boy- not very talkative unless you got him started on a subject he was interested in. That summer, Camren was really into dinosaurs, and loved spending his time in the backyard, usually digging holes (much to his mother's displeasure) and excavating treasures their dog, Moxy, liked to bury. Usually these would be tattered squeak toys, half-gnawed bones and the like, but every so often, he'd come up with things I couldn't explain. Once he came back to me with what appeared to be a rib bone from some creature, and a handful of buttons. I told him it was probably where someone had buried a horse a long time ago, and took him back out to rebury it and teach him proper grave respect.
One rather hot afternoon, however, he came back to me carrying the most adorable plush rabbit I had ever seen. It was dressed in a little pinafore over a dress patterned with strawberries and hat of the same material. And, shockingly enough, it was immaculately clean, Though he'd never really been out of my sight, the backyard borders on some woods that abut other people's yards, and I was immediately worried he'd somehow managed to escape my watch and take something from another kid. It definitely wasn't something that his parent's would have gotten him, since he was strictly interested in dinosaurs at the moment.
Honestly, I feel so guilty admitting that. Camren, even today, has never been a little boy who would steal or lie, and he never liked to take toys from other children, even as a loan. So, I was a little more puzzled than alarmed when I saw him trotting up to me, carrying the rabbit, which was nearly the size of himself. I think I said something to the effect of "uh, hey buddy, that's a real pretty doll, where'd you get it."
Camren, who was now examining the plushie with the same intense care he paid to his little sister, answered nonchalantly. "The doll lady." He said, while righting an ear dangling into the bunny's button eyes. "She's a friend of my mommy's, and she gave this to me to take care of for her." Immediately, this sent of warning alarms in my head, but I forced myself not to panic right away, since small children have a vague way of explaining things, anyway. So, I put on a smile and asked him where he met her, since I hadn't seen her.
"Oh." Camren left off tending the doll and pointed to the playset that had been erected beside the woods. "She was waiting for me in the tower-castle. She always waits there for me." The tower-castle was a wooden rectangular structure about five feet high, a little ladder leading to the top to the steel slide, and a small area in which one could hide at the top. Looking at it, it was very easy to imagine Camren, who had been there most of the morning, playing with another person, hidden, out of sight.
Nope. Nope, nope nope nope nope. Not letting Camren know I was freaking out to my very core, I ushered him inside, telling him it was snack time (it was a little early, but he didn't seem to mind). I called his dad (Corey), not wanting to tell my cousin Katie just yet. As his phone rang, I quickly went through the rest of the rooms- since it was a single-story ranch style house, there weren't too many places a person could hide. It seemed undisturbed and unoccupied, though I had spent most of the morning outdoors with Camren.
As I peeked back into the living room to check on Camren (still happily nomming on banana bread and watching cartoons), Corey picked up. Trying not to let my voice shake, or god forbid start crying, I gave him the run down of the situation, and asked him if there was anyone Katie knew by Camren's description. The fact I hadn't seen anyone with Camren, or anyone at all besides the two of us, inexplicably frightened me even more. The thought that someone might still be there was even worse.
Apparently, however, Katie knows next to no-one in the area. Corey, who is a state trooper, was worried enough that he said he'd come home to check on us, that we were to stay inside, and I should lock the windows and doors. I shakily went around to close everything up, and Camren left off watching TV to examine my actions closely- he seemed to know something was up, either from my falsely cheerful demeanor or my unusual behavior.
"If you're worried about the doll lady, you don't have to be." He said, reassuringly. "She already lives here- she's downstairs." Fuck. I had not even *thought* about checking the basement. And at this new, horrific statement that had my heart pumping audibly in my chest and making my vision grey with fear, I asked him if she was there now.
"Probably." He said, matter of factly, acting as if I were the one behaving strangely. "She likes to take a rest during the day. She only comes out to play if I'm playing." I smile and nod at this, the whole time watching the door to the basement.
"Okay bud." I said, in a forced casualness. "Well, I'm just going to check up on her, then. See if she's doing alright." I had expected him to fess up at this point, admit that he'd found the rabbit somehow else, and he'd just been making up the whole thing. However, his little brow furrowed in consternation.
"Maybe... you shouldn't." He said hesitantly. "She doesn't like it if you bother her while she's resting. She gets angry." I was less and less certain of anything at this point. So I just kind of jokingly sing, "Okaayy, Cam, I'm just going to go noooow." But Cam didn't say anything in response, just kept silently watching me.
Even though I was 80 percent certain she was an imaginary friend at this point or something, my heart was still beating out of control. I grabbed the handle to basement door, and threw it open. The windows to the basement are pretty spacious, and even without turning on the light, it's pretty easy to see what's down there. And so far, all I saw was the washing and drying machines, humming and whirring away, an empty laundry basket sitting atop the folding table nearby. But as I went down the wooden steps, I became aware of another sound which had my chest tightening in fear, making me scramble down the rest of the way. It had been the sound of something dragging a plastic bag, then falling heavily. Just beneath the stairs. I couldn't turn around soon enough- each extra move I had to make before I could face the imminent danger seemed to take eons.
And when I did, a long, loud stream of terrified explicatives (which I'm not proud of) exited my mouth as I set eyes on what had made the sound. A small woman was slumped on the ground against a set of metal shelves, head averted, legs out at awkward angles as though her legs had given way from fear. A plastic bag, half full of mangled baby toys, which had been on the shelf presumably before she had fallen, rested partially on her head and partially on her shoulder.
I'm not exactly sure what I said, probably something stupid and along the lines of "who the hell are you, bitch, and what did you do to my nephew". The shouting didn't seem to rouse her, which only served to heighten my terror- it did, however, attract the attention of Corey, who had just arrived home, and thundered down the stairs, toward the sound of my voice. Just to illustrate how genuine my fear was, and how real Corey's response to me was, he had even carried his service piece in with him, hand on the butt, before he circled around in front of me and saw what I was looking at.
For probably a few minutes, Corey did nothing but stand there- I could see his pulse jumping in his neck, and I could hear him trying to control his breathing. And then, his posture relaxed, his hand came away from his belt, and he turned to regard me. "Jesus fucking Christ, I hate that fucking thing." He muttered. It took a long time for him to explain to me that the woman I was looking at wasn't a woman at all. She was a doll. A lifesized, incredibly lifelike doll. Yep, folks, that's right. A doll.
Apparently, Katie's grandfather, who was a dollmaker of some renown quite some time ago, had devoted the last few years of his life creating her. She had been delivered to Katie after his passing, with a letter asking Katie to take care of "Dolores". "Dolores" was still sitting, slumped against the shelves- as we watched, the momentum which must have carried her to the floor caused her to fall the rest of the way down, so she was resting placidly on her side. Let me reiterate- there was nothing about her which was "doll-like", except perhaps her stillness. The fluidity of her body, the natural motion of her arms and legs all bespoke bones, joints, muscle, and flesh. Looking at her sent my skin into goosebumps with the sense of "wrongness". Seeing how terrified I was of her, Corey laughed, reached down, and hauled the thing up by her armpits, setting her heavily back onto the shelf.
"She's heavier than a dead preacher, but you can tell she's not real." He reassured me, and insited that I touch her to show myself that she wasn't. He explained her hair was, indeed, real hair, but her skin was simply silicone, and once you put your hands on her, it was very clear she wasn't a person. Every muscle, every nerve of my body resisted me from reaching out my arm, so it almost physically hurt to do so. So I closed my eyes, turned my head, and exhaled as I did. My hand connected with a cold, smooth, soft shoulder, and I instantly jumped away.
When I looked back, Corey was smiling, watching me encouragingly, holding the doll up by her shoulders as she slumped against him. The illusion that she was actually a woman, pretending to be a doll, grew to be so real I could almost see the butterscotch colored hair that hung in her face flutter with her breath. But I knew it must have just been a draft from the dryer vent, or even Corey's own breath. So I reached out, starting to feel a little foolish, and grabbed her hand. As I did, I felt a thrill run up me, as if I'd unknowingly grabbed onto a live rat. Because as I did do, I could feel bones grinding in the soft, cool flesh of her hand from the pressure of the grip I exerted on her. I palpated gently, and looked into Corey's eyes, horrified.
He calmly explained that Katie's grandfather had made her "from the bones out", anad had did his very best to make her as lifelike as possible. It was, he went on a little sadly, because of the stillborn Katie's mother had suffered at her birth. Katie was supposed to have a twin sister, and this was what she would have looked like. The thing grew more sad than creepy the longer we were down there. I didn't let go of Dolores' hand, as his explanation went on, but I loosened my grip, absurdly afraid I was hurting her.
I was a little surprised they had kept her hidden so successfully for so long, but understood why. It had struck me as more than a little terrible that such a thing as Dolores should exist at all. But that a friend and relative should have her seemed impossible bordering on the insane.
Apparently, Katie didn't care much for her- Dolores creeped her out to no end, and so she kept her doll-twin in the crate she'd arrived in. Camren, however, having found her in the last few months, felt sad for "the doll lady" (which I had not called her in my phone call) and was sure she felt lonely in the basement. The rabbit doll, which Camren now had, had been hers. And why he said she'd given it to him, and had been in the playset no less, was a mystery to both of us.
Camren calling down from the top of the stairs was enough to let us know we'd been down there quite a long time. "Daddy, will you bring Dolly up to play? She's lonely." Corey assured him she was still getting her beauty sleep, and maybe he could come down and play some other time.
But that was not the end of Dolores' strangeness. Oh no. She was just getting started. | 0non-cybersec
| Reddit |
Function documentation lacking information about returned pointers being NULL or non-NULL. What to assume?. <p>I'm trying to figure out which OpenSSL functions might return NULL pointers and which cannot. Sometimes the documentation clearly states that the function might return NULL, e.g.</p>
<p><strong><a href="https://www.openssl.org/docs/man1.1.1/man3/X509_NAME_get_entry.html" rel="nofollow noreferrer">X509_NAME_get_entry</a></strong></p>
<blockquote>
<p>X509_NAME_get_entry() returns an X509_NAME pointer to the requested
entry or NULL if the index is invalid.</p>
</blockquote>
<p>Sometimes they it does not, e.g.</p>
<p><strong><a href="https://www.openssl.org/docs/man1.1.1/man3/X509_get_subject_name.html" rel="nofollow noreferrer">X509_get_subject_name</a></strong></p>
<p>It only states</p>
<blockquote>
<p>X509_get_subject_name() returns the subject name of certificate x. The returned value is an internal pointer that MUST NOT be freed.</p>
</blockquote>
<p>It's unclear (to me) if that means that the pointer is always valid or if it can be NULL, too.</p>
<p>Another example:</p>
<p><strong>x509_name_entry_get_data</strong></p>
<p>explains it for version <a href="https://www.openssl.org/docs/man1.1.1/man3/X509_NAME_ENTRY_get_data.html" rel="nofollow noreferrer">1.1.1</a></p>
<blockquote>
<p>X509_NAME_ENTRY_get_object() returns a valid ASN1_OBJECT structure if
it is set or NULL if an error occurred.</p>
</blockquote>
<p>but not for <a href="https://www.openssl.org/docs/man1.1.0/man3/X509_NAME_ENTRY_get_data.html" rel="nofollow noreferrer">1.1.0</a></p>
<p>A glance at the source code does not help much either as e.g. X509_get_subject_name just returns a member:</p>
<pre><code>X509_NAME *X509_get_subject_name(const X509 *a)
{
return a->cert_info.subject;
}
</code></pre>
<p>If this member is ever assigned a NULL pointer or not...</p>
<p>The last example makes it seem necessary to add checks to all pointers coming from functions where there is no explicit documentation that the pointer cannot be NULL. I don't want to add pointless pointer checks in the code, but I do not want to use a security related library in a way where missing pointer checks might somehow be exploited.</p>
<p>Does anybody know how to interpret the OpenSSL documentation correctly in this regard? Or is it just horribly inconsistent and one cannot really tell?</p>
| 0non-cybersec
| Stackexchange |
Stop MacBook Pro from disconnecting network while downloading larger files. <p>I am using a Gigabit Ethernet adapter (Apple) to connect to my network. While downloading larger files the MacBook Pro blanks the screen and disconnects the network even though it is active doing the download.</p>
<p>Being new to Mac, I don't know where to look other than in the System Preferences under Energy Saver and Network. Is there any other place to check in order to stop this behavior?</p>
| 0non-cybersec
| Stackexchange |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
Sound card with Multiple Jacks. <p>If a laptop has multiple output sound jacks, like in the HP DV6 series, I am able to get output from the all the jacks (i.e the same output is received). </p>
<p>I would like to ask if I can get different sound outputs from applications on the sound jack of the sound card on a laptop (e.g If I can listen music on, while the movie is being played, the other sound jack output).</p>
| 0non-cybersec
| Stackexchange |
Looking for a closed form solution to an infinite sum. <p>I have a model with a likelihood function which approximates the following sum:</p>
<p><span class="math-container">$
T(n,\mu,\lambda) = \sum\limits_{p=0}^{\infty}\frac{\lambda^{n+p}\mu^p}{(n+p)!}
$</span></p>
<p>Where <span class="math-container">$\lambda>0$</span>, <span class="math-container">$n$</span> is a positive integer and <span class="math-container">$0<\mu<1$</span>.</p>
<p>Within my model, I'm currently truncating <span class="math-container">$p$</span> based on some simple rules. I'd obviously prefer a nice analytical solution for <span class="math-container">$T$</span> to speed things up, but am not particularly sure at how to proceed in finding a solution (non-mathematician). </p>
<p>1) Is there a simple solution to this infinite sum?</p>
<p>2) Does anyone have any recommendations on what to do/think about when faced with these kinds of sums? Is there a set of paths that are sensible to try?</p>
<p>3) Or, if there are no solution, how would you choose the point at which to truncate <span class="math-container">$p$</span>?</p>
<p>Thanks</p>
| 0non-cybersec
| Stackexchange |
3 Weeks Roadtrip USA (West) - Los Angeles -> Denver. I am planning to go to the USA (West) in June this year for 3 Weeks. I thought about the following route:
* Los Angeles
* Ventura
* Death Valley
* Las Vegas
* Kingman
* Grand Canyon NP
* Page
* Zion NP
* Bryce Canyon NP
* Salt Lake City
* Yellowstone NP
* Rock Springs
* Rocky Mountain NP
* Denver
Any thoughts/suggestions on this? Any recommendations?
I already been in the area last year and made a roundtrip: Los Angeles - Las Vegas - San Francisco - Los Angeles. I have already seen some of the places like Bryce or Zion or Grand Canyon, but only for just one day each. My goal is to have more time to see some of the places and also to go to Yellowstone / Rocky Mountains.
Do you think Yellowstone / Rocky Mountains are a highlight on this trip? How much time should I plan there?
Budget will be about 3000+ EUR for 2 persons (flight and car not included). | 0non-cybersec
| Reddit |
What am I doing wrong ? Google adsense application got rejected 3 times, reason "Page type". <p>What am I doing wrong ? Google adsense application got rejected 3 times, reason "Page type".</p>
<p>I am running blog <a href="http://photoforu.blogspot.com/" rel="nofollow">http://photoforu.blogspot.com/</a> from sometime, but able to approve the adsense account for it, the issue they say is</p>
<p>Issues:<br>
- Page type</p>
<hr>
<p>Further detail:</p>
<p>Page type: Your website is a type of website that we do not currently
accept into our program. Such websites include, but are not limited to,
chat sites, sites that drive traffic through cybersquatting, and sites
that use excessive keywords in the content or code of their pages.</p>
<hr>
<p>I don't understand whats wrong with the content,
Google webmaster tools don't show any error.. and there are only 82 keywords yet.</p>
<p>What am I doing wrong ?</p>
<p>List of keywords: (for reference only)</p>
<ol>
<li>image (3 variants)</li>
<li>love (4 variants)</li>
<li>post (2 variants)</li>
<li>blog (3 variants)</li>
<li>baby (2 variants)</li>
<li>photoforu </li>
<li>girls </li>
<li>new (2 variants)</li>
<li>blogspot </li>
<li>fashion </li>
<li>car (2 variants)</li>
<li>cute </li>
<li>photo (2 variants)</li>
<li>funny </li>
<li>google </li>
<li>share </li>
<li>india (2 variants)</li>
<li>beauty </li>
<li>photograph (2 variants)</li>
<li>beautiful </li>
</ol>
<p>...loads more</p>
| 0non-cybersec
| Stackexchange |
Is 40 degrees Celsius a bad temperature for a router?. <p>I turned my old gaming pc into a pfsense machine. I never had cpu problems when I used that pc but now when I check the diagnostics on the pfsense gui, the cpu is running at 40 degrees. That's troubling to me because my new gaming pc runs at 30 degrees when I'm playing games and ~25 degrees when it's idle. My new gaming pc has the graphics card in it and the pfsense box doesn't. Just 16gb of ram and a cpu(i3 2100) and a 500gb hdd. Since its only 20 dollars on amazon I'm tempted to buy a cpu cooler but I don't know if that will solve the problem. </p>
<p>I don't know if it's normal for a router cpu to be running at 40 degrees, especially when my active pc doesn't go higher than 30 degrees when I'm using it for games. </p>
<p>It's a home network so it's not like I'm supplying 5000 connections on a campus. It's just my desktop and 7 WiFi devices.</p>
<p>When I check the CPU usage, half of the time it says 0% and the highest I've seen it go is 7%</p>
| 0non-cybersec
| Stackexchange |
Huskie realllly wants to play with bunny. | 0non-cybersec
| Reddit |
how to apply style to complete row or table in tabulars. <p>How can I define a style (font, size, color etc) for a whole row, without repiting the command before each cell?</p>
<p>Note that I do not want to use tabu package. I want to know to what extent this can be done without tabu. (nothing against tabu, I want to demonstrate the usage of standard tabular env. and in contrast tabu).</p>
<p>Also I do not want to add new columntypes. The principle shall be applicable to any table in a complex document, without inventing columntypes for each column in each table.</p>
<p>This example shows that only the first cell after the setting of styles is changed.</p>
<pre><code>\documentclass[]{scrbook}
\usepackage[
dvipsnames, % Load a set of predefined colors
table, % Load the colortbl package
]{xcolor}
\usepackage{float}
\begin{document}
\begin{table}[H]
% --- table -->
\renewcommand{\arraystretch}{1.4}
\centering
\sffamily
\rowcolors{1}{gray!15}{white!100}%
% <------------
\begin{tabular}{lll}
\hline
% --- thead -->
\rowcolor{gray!25}
\small
\rmfamily
% <------------
header &
header &
header \tabularnewline
\hline
% --- tbody -->
\tiny\slshape
% <------------
content & content & content \tabularnewline
content & content & content \tabularnewline
content & content & content \tabularnewline
\hline
\end{tabular}
\end{table}
\end{document}
</code></pre>
| 0non-cybersec
| Stackexchange |
This is my tattoo. The chemical build of estradiol. I am trans and approaching my one year anniversary on hormones! (Done by Victoria Bacon at Northwest Tattoo in Eugene, Oregon). | 0non-cybersec
| Reddit |
These Smooth Video Edits. | 0non-cybersec
| Reddit |
Unable to query remote schema object using partial database link name. <p>I came across a very interesting situation today and I'm putting this question to the community in hopes that someone can explain why this happened. I haven't been able to find an explanation in Oracle's documentation.</p>
<p>We have a database link configured in our 12c instance, and assume the link is named <code>database.domain.subdomain.com</code>. This link connects to a 10g instance.</p>
<p>In queries that leverage this link, we use the partial link name: <code>select * from table1@database</code> (omitting .domain.*). This works fine.</p>
<p>A complete rebuild of the remote server and instance was necessary due to a hardware failure. When it was brought back up, we encountered a problem querying the table with the same query <code>select * from table1@database</code> however using the full name instead of partial worked fine: <code>select * from [email protected]</code></p>
<p>Querying other tables using the partial name was fine as well <code>select * from table2@database</code></p>
<p>I discovered that there was a session open from before the rebuild. After I terminated this session, <code>select * from table1@database</code> resumed working as expected.</p>
<p>My question is, why did was I unable to query <em>that specific object using the partial dblink name</em>?</p>
| 0non-cybersec
| Stackexchange |
Michigan forced to recognize right to literacy after students take legal action. | 0non-cybersec
| Reddit |
[Build Help] Can the GTX 970 handle triple 1080p monitors?. Title ^ | 0non-cybersec
| Reddit |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
Millions of Facebook Records Found on Amazon S3 Buckets. | 0non-cybersec
| Reddit |
The first and last shot of the Toy Story Saga go from day to night. Mirroring each other (Toy Story 1996 - Toy Story 4 2019). | 0non-cybersec
| Reddit |
Please Help! the woman I am seeing has terrible breath :( what shall I do? [me m36 she 29]. Just started seeing her and she is wonderful, but when it comes to kissing I only want to deflect. How can I bring this up with her tactfully or deal with it in some other way? | 0non-cybersec
| Reddit |
Technology Updates. | 0non-cybersec
| Reddit |
Continuous Connection?. <p>Consider two compact convex sets $C_1, C_2 \subset \mathbb{R}^n$ such that $C_2 \subset C_1$. Let us denote by $\partial C_1$ and $\partial C_2$ their boundaries, that satisfy and $\partial C_1 \cap \partial C_2 = \varnothing$.</p>
<p>Consider two continuous, bounded, functions $f_1: C_1 \rightarrow \mathbb{R}^n$ and $f_2: C_1 \rightarrow \mathbb{R}^n$.</p>
<p>Consider a continuous, bounded, function $f: C_1 \rightarrow \mathbb{R}^n$ such that:
$$f(y) = f_1(y) \ \ \forall y \in \partial C_1$$</p>
<p>$$f(y) = f_2(y) \ \ \forall y \in \partial C_2$$</p>
<p>1) Prove that there exists a continuous function $g: C_1 \rightarrow \mathbb{R}_{\geq 0}$ such that:</p>
<p>$$ g(y) = 0 \ \ \forall y \in \partial C_1 $$</p>
<p>$$ g(y) = 1 \ \ \forall y \in \partial C_2 $$</p>
<p>$$ f(x) = ( 1-g(x) ) f_1(x) + g(x) f_2(x) \ \ \forall x \in \text{closure}(C_1 \setminus C_2) $$</p>
| 0non-cybersec
| Stackexchange |
A little inspo album I put together. | 0non-cybersec
| Reddit |
I think IGN is finally in on the joke. | 0non-cybersec
| Reddit |
Richard Pryor: Icon (2014) Full Episode | PBS Video. | 0non-cybersec
| Reddit |
Dumb proof Wifi deauth script (comments welcome !). | 1cybersec
| Reddit |
Resize a picture to fit a JLabel. <p>I'm trying to make a picture fit a JLabel. I wish to reduce the picture dimensions to something more appropriate for my Swing JPanel. </p>
<p>I tried with setPreferredSize but it doesn't work.</p>
<p>I'm wondering if there is a simple way to do it? Should I scale the image for this purpose?</p>
| 0non-cybersec
| Stackexchange |
This is what I think every time someone says atheists should stop complaining about theists.. | 0non-cybersec
| Reddit |
Why would anyone do this?!!!!. | 0non-cybersec
| Reddit |
A prime’s square dividing a sum of a geometric sequence. <p>For what $p$ primes does there exist two positive integers $(a,b)$, such that
$$\dfrac{1-a^p}{1-a}=bp^2?$$</p>
<p>This is from a junior olympiad from Britian but I can’t solve it. Please help!</p>
| 0non-cybersec
| Stackexchange |
unauthorized remote access. <p>I continue to be harassed by unauthorized remote access of my computers, even though I have done everything NOT to be on the internet. I just located sone files indicating that I have the following hardware I did not know I had: "PCI\VEN_8086&DEV_3B20 and others. Can these devices be used to for remote access? I found this on a new computer I had built with express instructions that it was not to have any wireless capabilities. My limited research suggests I my have been duped. Is this actual hardware that can be seen? Please help. </p>
| 0non-cybersec
| Stackexchange |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
Which Champion rework would cause the most whining?. I was thinking today how I find it quite crazy that some people are truly OTPs and without their main champion they would drop in divisions quite fast for some time without their main champion.
A big rework on such champion could also cause this (if fundamentals change). On which champion you think it would cause the most tears and angry reddit posts from OTPs?
Riven? Yasuo? Frogg...sry Anivia?
| 0non-cybersec
| Reddit |
Woodworking is like having kids - don't do something once that you're not willing to have requested 1000 times. | 0non-cybersec
| Reddit |
Josh McDaniels has been fired by Pat Bowler per the team's official facebook page.. | 0non-cybersec
| Reddit |
Group by and aggregation on JSON array using Underscore JS. <p>I have a json array object . I want to group by data based on column "FlexCategoryName" and perform aggregation on matrix columns such as avg of "cost" ,sum of "clicks" etc . Below are JSON array Object </p>
<pre><code>Array[100]
0: Object
1: Object
2: Object
3: Object
</code></pre>
<p>0: Object</p>
<pre><code>Clicks: 1067
Cost: 4094.2
Date: "2/8/2014"
FlexCategoryName: "Cat1"
Impressions: 65943
Leads: 20
</code></pre>
<p>VENUE_ID:1</p>
<p>1: Object</p>
<pre><code>Clicks: 106
Cost: 409
Date: "2/8/2014"
FlexCategoryName: "Cat2"
Impressions: 65941
Leads: 21
VENUE_ID:1
</code></pre>
<p>2: Object</p>
<pre><code>Clicks: 106
Cost: 409
Date: "2/8/2014"
FlexCategoryName: "Cat2"
Impressions: 10
Leads: 21
VENUE_ID:2
</code></pre>
<p>3: Object</p>
<pre><code>Clicks: 106
Cost: 409
Date: "2/8/2014"
FlexCategoryName: "Cat3"
Impressions: 10
Leads: 21
VENUE_ID:2
</code></pre>
<p>4: Object</p>
<pre><code>Clicks: 20
Cost: 10
Date: "2/8/2014"
FlexCategoryName: "Cat5"
Impressions: 10
Leads: 21
VENUE_ID:3
</code></pre>
<p>How to use Underscore JS to perform group by and aggregation on matrix columns .</p>
<p>Expected Output</p>
<pre><code>0: Object
Cost: sum of all cost based on FlexCategoryName Cat1
FlexCategoryName: "Cat1"
Impressions: sum of all Impressions based on FlexCategoryName Cat1
1: Object
Cost: sum of all cost based on FlexCategoryName Cat2
FlexCategoryName: "Cat2"
Impressions: sum of all Impressions based on FlexCategoryName Cat2
</code></pre>
| 0non-cybersec
| Stackexchange |
Cannot compile a signed APK in Android Studio 3.3. <p>After updating to AS 3.3, there seems to be a bug in the "Generate Signed Bundle/APK" dialog.
After choosing Bundle or APK format, moving to the next page and setting the module/keystore pass, I can't move by pressing next because I get this popup:</p>
<pre><code>Please specify a destination folder for the signed apk
</code></pre>
<p>There is no editbox to specify a destination folder.
Anyone else experienced this? I want to know if it's because of the material theme plugin hiding an extra editbox. Otherwise I'll file a bug.</p>
| 0non-cybersec
| Stackexchange |
Panda bears in Singapore smiling. | 0non-cybersec
| Reddit |
Using nginx and Drupal, how do I serve a 404 error for static files and directories that exist?. <p>I deploy a Drupal web site using git (well, OK, the developers deploy it; I try to keep them out of trouble), and for that reason the site has a directory <code>.git</code> and a file <code>.gitignore</code> in the document root.</p>
<p>Currently the permissions on the files are sufficient to cause nginx to return a 403 Forbidden error if these files are accessed in the web browser.</p>
<p>However, I would like nginx to completely deny the existence of this file and directory, and return 404 if someone tries to access them in the browser.</p>
<p>But wait, there's more!</p>
<p>What I <em>really</em> want to happen is for the browser to receive the 404 error page generated by Drupal. In Drupal's <code>admin/settings/error-reporting</code> page, I see that 404 errors are being sent to <a href="http://www.example.com/" rel="nofollow noreferrer">http://www.example.com/</a><code>404error</code>, a Drupal node with one of the Internet's more interesting 404 pages.</p>
<p>My nginx configuration already contains a <code>@drupal</code> block which passes a request to Drupal. So I want to pass the request to Drupal, but I don't want Drupal to try to serve the existing static file either, but to simply serve the 404 page.</p>
<pre><code>location @drupal {
rewrite ^/(.+)$ /index.php?q=$1 last;
}
</code></pre>
<p>Unfortunately, Google hasn't been too helpful here; most people seem to have the opposite problem. How do I cause requests for anything in the <code>.git</code> directory or the <code>.gitignore</code> file to be sent to Drupal's 404 page?</p>
| 0non-cybersec
| Stackexchange |
DAE think the world is actually a more wondrous and mysterious place because they don't believe god created everything instantaneously, but that our existence is due to a 14 billion year long process?. Blows my mind everyday. | 0non-cybersec
| Reddit |
How do you call C functions from Assembly and how do you link it Statically?. <p>I am playing around and trying to understand the low-level operation of computers and programs. To that end, I am experimenting with linking Assembly and C.</p>
<p>I have 2 program files:</p>
<p>Some C code here in "callee.c":</p>
<pre><code>#include <unistd.h>
void my_c_func() {
write(1, "Hello, World!\n", 14);
return;
}
</code></pre>
<p>I also have some GAS x86_64 Assembly here in "caller.asm":</p>
<pre><code>.text
.globl my_entry_pt
my_entry_pt:
# call my c function
call my_c_func # this function has no parameters and no return data
# make the 'exit' system call
mov $60, %rax # set the syscall to the index of 'exit' (60)
mov $0, %rdi # set the single parameter, the exit code to 0 for normal exit
syscall
</code></pre>
<p>I can build and execute the program like this:</p>
<pre><code>$ as ./caller.asm -o ./caller.obj
$ gcc -c ./callee.c -o ./callee.obj
$ ld -e my_entry_pt -lc ./callee.obj ./caller.obj -o ./prog.out -dynamic-linker /lib64/ld-linux-x86-64.so.2
$ ldd ./prog.out
linux-vdso.so.1 (0x00007fffdb8fe000)
libc.so.6 => /lib64/libc.so.6 (0x00007f46c7756000)
/lib64/ld-linux-x86-64.so.2 (0x00007f46c7942000)
$ ./prog.out
Hello, World!
</code></pre>
<p>Along the way, I had some problems. If I don't set the -dynamic-linker option, it defaults to this:</p>
<pre><code>$ ld -e my_entry_pt -lc ./callee.obj ./caller.obj -o ./prog.out
$ ldd ./prog.out
linux-vdso.so.1 (0x00007ffc771c5000)
libc.so.6 => /lib64/libc.so.6 (0x00007f8f2abe2000)
/lib/ld64.so.1 => /lib64/ld-linux-x86-64.so.2 (0x00007f8f2adce000)
$ ./prog.out
bash: ./prog.out: No such file or directory
</code></pre>
<p>Why is this? Is there a problem with the linker defaults on my system? How can/should I fix it?</p>
<p>Also, static linking doesn't work.</p>
<pre><code>$ ld -static -e my_entry_pt -lc ./callee.obj ./caller.obj -o ./prog.out
ld: ./callee.obj: in function `my_c_func':
callee.c:(.text+0x16): undefined reference to `write'
</code></pre>
<p>Why is this? Shouldn't write() just be a c library wrapper for the syscall 'write'? How can I fix it?</p>
<p>Where can I find the documentation on the C function calling convention so I can read up on how parameters are passed back and forth, etc...?</p>
<p>Lastly, while this seems to work for this simple example, am I doing something wrong in my initialization of the C stack? I mean, right now, I'm doing nothing. Should I be allocing memory from the kernel for the stack, setting bounds, and setting %rsp and %rbp before I start trying to call functions. Or is the kernel loader taking care of all this for me? If so, will all architectures under a Linux kernel take care of it for me?</p>
| 0non-cybersec
| Stackexchange |
Any incidents where a government 'backdoor' was exploited by non-government entities?. With all the uninformed politicians taking positions on 'encryption' and endorsing 'backdoors' for the use of government law enforcement agencies, I was wondering if there has been a case where a government/law enforcement established backdoor had been exploited maliciously? By nature of the topic, I'm sure many companies will not admit complying with government requests for unfettered access to their systems, software, etc. - but creating a security weakness by design leaves itself open to discovery by those persons who weren't meant to use it - I'm interested to know if any incidents have ever come to light.
Thanks for indulging my curiousity - | 1cybersec
| Reddit |
problem with Greek after an update. <p>I 'm writing a book in Greek. The code is this:</p>
<pre><code>\documentclass[a4paper,11pt,twoside]{book}
\usepackage[english,greek]{babel}
\usepackage[utf8]{inputenc}
\usepackage{kerkis}
\begin{document}
Ελληνικό βιβλίο με ελληνικά γράμματα. Ελληνικό βιβλίο με ελληνικά γράμματα. Ελληνικό βιβλίο με ελληνικά γράμματα.
\end{document}
</code></pre>
<p>Everything was fine until yesterday. </p>
<ul>
<li><p>Yesterday I couldn't update MiKTeX or use new packages (e.g. <code>soul</code>), but I could compile and build my document.</p></li>
<li><p>Before a few minutes I could update MiKTeX, but I couldn't compile or build my document.</p></li>
</ul>
<p><a href="https://pastebin.com/ymwWRtrm" rel="nofollow noreferrer">This</a> is the <code>log</code>-file. How can I fix it?</p>
| 0non-cybersec
| Stackexchange |
Why do some USB readers have issues to read large capacity SD cards?. <p>I have noticed that with some USB readers (not to mention other media devices, such as digital cameras) there seems to be an upper limit to the amount of internal storage they can support. When I insert low capacity micro sd cards (16GB or less) they work fine, however when I try 32GB or 64GB and the device cannot read the SD card. They are from different manufacturers, so I assume that this is the result of a more generic issue.</p>
<p><strong>Question:</strong> Why aren’t some USB readers capable of supporting large capacity SD cards? Does it have to do with the computer architecture? It would be nice to know if there was a rhyme or reason to it all. Currently, it’s a bit of trial by fire; I'm never quite sure how to scale my memory due to the fact that I remain unsure whether it will be supported or not.</p>
| 0non-cybersec
| Stackexchange |
Redirecting URLs with mod_rewrite. <p>I am trying to setup a website where we would like to redirect the URL for a couple of different cases. The cases are below:</p>
<ul>
<li>If port 80 then force port 443</li>
<li>If URL = <code>support.example.com</code> then force URL = <code>support.example-1.com</code></li>
</ul>
<p>We would like to first require all traffic to be on HTTPS and then require that one of our domains (since it resolves to the same box and due to our SSL certificate) is redirected to another one of our domains. We are able to get the force SSL to work, but we cannot seem to find a mod_rewrite rule that will work when <code>https://support.example.com</code> is requested to force it to <code>https://support.example-1.com</code>.</p>
<p>Any help that you can provide would be greatly appreciated.</p>
| 0non-cybersec
| Stackexchange |
How many finite subsets in $\mathbb{Z}^d$ have a given sum of squares?. <p>Let $|\cdot|$ denote the usual norm in $\mathbb{Z}^d$. Given a finite subset $S \subset \mathbb{Z}^d$, let $\varphi(S) = \sum_{z \in S}|z|^2$. Given $m \in \mathbb{N}$, what is the size of $\varphi^{-1}(m)$? In particular, a rough upper bound would suffice.</p>
| 0non-cybersec
| Stackexchange |
Differences between hdparm --read-sector and dd with "Current Pending Sectors". <p><em>This was originally an "answer" to <a href="https://serverfault.com/questions/461203">How to use hdparm to fix a pending sector?</a></em></p>
<p>I'd been getting SMART notifications for the same "Current Pending Sector" for days.
The <code>dd</code> solutions around weren't resolving anything (they'd appear to zero data and re-write it but didn't effect the smart status). <em>Be warned, I am no guru</em> on this,
just cargo-culting commands from forums.</p>
<p>The <code>dd</code> commands I used without changing the situation:</p>
<pre><code># read to file (all cmds ran w/o errors)
dd if=/dev/sdb of=bl.$BLOCK bs=1024 count=1 iflag=direct skip=$BLOCK
# zero out
dd if=/dev/zero of=/dev/sdb bs=1024 count=1 conv=noerror,sync seek=$BLOCK
# read the zeroes back
dd if=/dev/sdb of=/dev/stdout bs=1024 count=1 iflag=direct skip=$BLOCK | xxd
# write real data back out
dd if=bl.$BLOCK of=/dev/sdb bs=1024 count=1 iflag=direct seek=$BLOCK
# verify they match
dd if=/dev/sdb of=/dev/stdout bs=1024 count=1 iflag=direct skip=$BLOCK | xxd \
| diff - <(xxd bl.$BLOCK)
# still have the Current_Pending_Sector error
smartctl -A /dev/sdb | grep Pend
197 Current_Pending_Sector 0x0032 200 200 000 .. 1
</code></pre>
<p>The hdparm commands that cleared the Current_Pending_Sector count:</p>
<pre><code>hdparm --read-sector $BLOCK /dev/sdb # data (didn't seem to match dd out)
# this was very slow on the first block
hdparm --write-sector $BLOCK /dev/sdb
hdparm --read-sector $BLOCK /dev/sdb # zeros
smartctl -A /dev/sdb | grep Pend
197 Current_Pending_Sector 0x0032 200 200 000 .. 0
</code></pre>
<p>I didn't get any read/write errors with any these command, so the absence of errors
may just be the drive is able to effectively cover them up somehow.</p>
<p>Also, running the <code>dd</code> ones again would appear to restore the data,
but even then the <code>hdparm --read-sector</code> would show zeros.
I'm interpreting this as the hdparm talking to the drive at a lower level
and forcing the Pending writes, but dd just sees the drives remapped results...
is that what could be going on?</p>
<p><strong>Update</strong> <a href="http://sourceforge.net/p/hdparm/discussion/461704/thread/ce9e2318/" rel="nofollow noreferrer">A random post noting the difference between hdparm and dd output</a>.
hdparm-9.42 has a change to "force sector dumps (read-sector, identify, ..) to use le16 output format".</p>
| 0non-cybersec
| Stackexchange |
is it possible to share applications installed on a windows or linux server with the client machine in the same LAN. <p>is it possible to share applications installed on a windows or linux server with the client machine in the same LAN? for example, the ms word application installed on windows server and i want to use this application on the other computer which is connected with the server in the same LAN.</p>
| 0non-cybersec
| Stackexchange |
Basic $L_1$ convergence question. <p>I think this is quite a simple question, but for some reason am finding it difficult to answer. The question is:</p>
<p>If $(f_n:n\in\mathbb{N})$ is a sequence of integrable functions, with $f_n \to f$ a.e. for some integrable $f$, then is it true that if $\|f_n\|_1 \to \|f\|_1 $, then $\|f_n-f\|_1\to 0$.</p>
<p>Any help is very good!</p>
| 0non-cybersec
| Stackexchange |
Just incase someone hasn't tried it, I highly recommend Dead Cells. | 0non-cybersec
| Reddit |
Ubuntu MATE 14.04: Skype font, mouse and look bug. <p>i recently installed Ubuntu MATE 14.04 on my computer, I want have skype but this happend:</p>
<p><img src="https://i.stack.imgur.com/7ZmYC.png" alt="Mouse also changed (old ugly black kde mouse)"></p>
<p>(Mouse also changed (old ugly black kde mouse)).</p>
<p>Any solution to fix this bug?</p>
| 0non-cybersec
| Stackexchange |
Boundary value problem $\frac{d^2 y}{dx^2}+\pi ^2 y=f(x)$. <p>Solve the boundary value problem
$$\frac{d^2y}{dx^2}+\pi^2y=f(x),\ \ \ y(0)=y \left( \frac{1}{2}\right)=0 $$
How can I solve this if I have the unknown function $f(x)$ in the differential equation? And what happens if I leave out the $\pi^2y$ term?</p>
| 0non-cybersec
| Stackexchange |
What is the correct way to compare to algebraic quantities?. <p>If I have two algebraic quantities, what is the correct way to determine if they are equal, or if not which is greater than the other?
For example, if I have $\frac{2d}{\sqrt{s^2-c^2}}$ and $\frac{2ds}{s^2-c^2}$, and I want to prove $\frac{2d}{\sqrt{s^2-c^2}} < \frac{2ds}{s^2-c^2}$ for all positive $d$, $s$, and $c$ I know that I can set them "equal" and treat them as an equation like so:
$$\frac{2d}{\sqrt{s^2-c^2}}=\frac{2ds}{s^2-c^2}$$
$$\frac{2d}{\sqrt{s^2-c^2}}\cdot\left(s^2-c^2\right) = \frac{2ds}{s^2-c^2}\cdot\left(s^2-c^2\right)$$
$$2d\sqrt{s^2-c^2}=2ds$$
$$\sqrt{s^2-c^2}=s$$
$$s^2-c^2=s^2$$
$$0<c^2$$ because we are given $c>0$.
Then you can replace all the equals signs all the way up with less thans since I didn't multiply by $-1$. This doesn't strike me as particularly formal, so what is the formal way to accomplish this, and in addition, is this even a valid line of reasoning?</p>
| 0non-cybersec
| Stackexchange |
One-to-one mapping data structure (A,B) with getKey(B) in O(1)?. <p>This question was initially misphrased, see the EDIT below. I'll leave it up for context.</p>
<p>I've been thinking about smart ways to build a bijective (i.e. one-to-one) mapping. Mapping a function A->B (many-to-one) is basically what HashMap(A,B) does. If I now wanted to have a data structure that implements something one-to-one with contains() in O(1), would there be something in the java standard libraries that I could use? Mind you, I don't need this for anything right now, this was just something I thought about recently and couldn't come up with a data structure for, so answers aren't a rush. Is there a class like that? If not, what do you think why that is?</p>
<p>All I could find on SO are things about hibernate, that was of no help to me.</p>
<p>EDIT:
My question was ill phrased, so some explanation is due.</p>
<p>What I meant was is the "backward" mapping B->A. HashMap(A,B) has contains(A) and contains(B) both in O(1), so that's not even what I meant, sorry for the confusion. What I meant was, is there a datastructure mapping A<->B that has getValue(A) and getKey(B) in O(1)?</p>
<p>I realize this could be done with two HashMaps (A,B) and (B,A) that are maintained to contain the same relation, but I feel there should be one data structure that handles that without having to do it "manually".</p>
| 0non-cybersec
| Stackexchange |
Mastodon combines metal with Minaj-istic amounts of butt in their new video for "The Motherload". | 0non-cybersec
| Reddit |
Blinking cursor after new partition and install (ubuntu-mate). <p>Following these instructions exactly:</p>
<ol>
<li><a href="https://ubuntu-mate.community/t/gpar...dows-users/797" rel="nofollow noreferrer">https://ubuntu-mate.community/t/gpar...dows-users/797</a></li>
<li><a href="https://ubuntu-mate.community/t/inst...lse-method/651" rel="nofollow noreferrer">https://ubuntu-mate.community/t/inst...lse-method/651</a>
to partition a 1TB SSD and install Ubuntu-Mate off a live USB.</li>
</ol>
<p>My partitioning is different than the instructions as follows(also
see attached image)</p>
<pre><code>1 esp 550MiB
2 root 40 GB
3 home 640 GB
4 swap 128GB
</code></pre>
<p>At the blinking cursor, I can either <kbd>ALT</kbd>-<kbd>F4</kbd> to boot to UEFI or <kbd>ESC</kbd> and <kbd>I</kbd> (capital <code>i</code>) or continue to boot to my 2nd SSD with a Windows 10 install.</p>
<p>If I try holding the <kbd>SHIFT</kbd> key on reboot I instead see capital GRUB with a blinking cursor on a black screen.</p>
<p>Hitting <kbd>RETURN</kbd> takes me to my 2nd SSD with a Win 10 install.</p>
<p>The only change I have made to my UEFI is to disable FastBoot.</p>
<p>Next I tried Boot Repair from a live USB, and attempted to reinstall my grub, but for some reason it did not 'see' my ESP at <code>sda1</code>, only <code>sda</code> and <code>sda2</code> which is my root partition.</p>
<p>So, probably a mistake, I let it go ahead and install grub in <code>sda2</code>.</p>
<p>After rebooting, same result, blinking cursor.</p>
<p>Next I relaunched <code>gparted</code> from a live USB and reexamined my partitions.</p>
<p>Now I was seeing an error icon on my ESP at <code>sda1</code>, saying it wasn't recognized because I was missing certain files (see attached esp_warning).</p>
<p>I am also getting a warning whenever launching <code>gparted</code> about a discrepancy between Linux and the driver descriptor in regards to physical block size. (attached LibParted_warning)</p>
<p>Question> For my GPT partitioned drive, does it matter what partition
flag I have set for my ESP?
It was set to 'boot', then I tried 'bios-grub' but neither worked.
Results of boot-repair here
<a href="http://paste.ubuntu.com/23750353/" rel="nofollow noreferrer">http://paste.ubuntu.com/23750353/</a></p>
<p>The Boot Repair results DO seem to indicate a few things wrong.
I assume that reinstalling grub with Boot repair AFTER setting my ESP flag to bios-grub may be part of the reason?</p>
<p>And before anyone comments on my swap size<br>
1- storage is relatively cheap.<br>
2- I use my Linux PC primarily for particle simulations in Houdini and got some feedback from Linux-Houdini experts a lot more knowledgeable than I<br>
3- If after several months of use I discover I rarely use that amount, I assume I can easily increase my home partition and reduce swap.</p>
<p>I realize this is a long post but trying to include as much information as possible.</p>
<p><a href="https://i.stack.imgur.com/Z0Siw.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/Z0Siw.png" alt="partition"></a>
<a href="https://i.stack.imgur.com/C4Rak.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/C4Rak.png" alt="libParted warning"></a>
<a href="https://i.stack.imgur.com/X7PZE.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/X7PZE.png" alt="esp warning"></a></p>
| 0non-cybersec
| Stackexchange |
How can I add a source control folder to an existing team project in TFS 2010?. <p>I have a team project named "ABC web" without a corresponding source control folder. If I double-click on the source control element in Team Explorer it says:</p>
<blockquote>
<p>No Source Control Folder </p>
<p>Cannot open $/ABC web. Source control has not been configured for this team project, you do not have permission to access it, or the team project has been moved or deleted.</p>
</blockquote>
<p>If i try to add a file to "$/ABC web/test.txt" using tf.exe it says:</p>
<blockquote>
<p>TF10175: The team project folder $/ABC web does not exist. Contact your Team Foundation Server administrator and ask that it be created.</p>
</blockquote>
<p>How can I create the team project folder?</p>
| 0non-cybersec
| Stackexchange |
#GOCC Presents... Judah, A Lion {whelp} Forgotten (+playlist) 2014. | 0non-cybersec
| Reddit |
Need help on installing an app that is no longer available in app store. By mistake I deleted the app called cpro craigslit. I have been looking everywhere but then after reaearch it has been tsken down by apple for no reason.
Anyhow, I got a hold of v4.36 ipa file, I got it in itunes library under apps, I dragged and dropped to install. Synched but app just do not get on my phone.
Its the besr craigslist app and I need it.
Can anyone help?
PS I have the latest version of itunes and iOS. | 0non-cybersec
| Reddit |
I want to get into information/cyber security is this course any good?. | 1cybersec
| Reddit |
[Image] This comment from an AskReddit. | 0non-cybersec
| Reddit |
Angular-UI: Force Typeahead results. <p>I have a text field that uses <a href="http://angular-ui.github.io/bootstrap/">AngularUI's typeahead feature</a>. It looks like this:</p>
<pre><code><input typeahead="eye for eye in autocomplete[column] | filter:$viewValue">
</code></pre>
<p>I'd like to force the user to select an option from the list that is generated. If they type something that is not on the list exactly as it appears, on blur (clicking outside of the text field), i'd like the value of the text field to reset to it's original value.</p>
<p>Is this functionality part of the typeahead directive, or will I need to extend it? I searched for about 10 minutes on google and stackoverflow, but couldn't find any relevant documentation. </p>
<p>Can anyone please point me in the right direction to accomplish this?</p>
| 0non-cybersec
| Stackexchange |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.