text
stringlengths 3
1.74M
| label
class label 2
classes | source
stringclasses 3
values |
---|---|---|
XSD to Delphi Classes without XML binding. <p>Perhaps this has been asked before, but I haven't found it with regards to Delphi - I have used a XSD.exe in Visual Studio that does exactly this: converts XSD into <strong><em>'plain vanilla'</em></strong> classes representing the entities specified in the XSD - not bound to XML document - classes for creating the structures in the XSD, not accessing data that conforms to the structure outlined in the XSD. </p>
<p>I am looking for a utility or product that will do this (that doesn't cost big bucks...) : Example, I have a schema like this:</p>
<pre><code><?xml version="1.0" encoding="UTF-8"?>
<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema" elementFormDefault="qualified" attributeFormDefault="unqualified">
<xs:element name="TDelphiClass">
<xs:complexType>
<xs:sequence>
<xs:element ref="ID"/>
<xs:element ref="ConnectionString"/>
<xs:element ref="Group"/>
</xs:sequence>
</xs:complexType>
</xs:element>
<xs:element name="ID" type="xs:integer"/>
<xs:element name="ConnectionString" type="xs:string"/>
<xs:element name="Group"type="xs:double"/>
</xs:schema>
</code></pre>
<p>I want to generate a Delphi unit/class that looks like this:</p>
<pre><code>unit uDelphiClass;
interface
uses
Classes, SysUtils;
type
TDelphiClass = class(TObject)
fID: Integer;
fConnectionString: string;
fGroup: Double;
end;
implementation
end.
</code></pre>
| 0non-cybersec
| Stackexchange |
Edinburgh Christmas Market at Night. | 0non-cybersec
| Reddit |
When you discard the reference to a SoftReference, will it's clearing still be put on the ReferenceQueue?. <p>I want to understand under which conditions the garbage collector notifies you of clearing a soft reference. The documentation makes it clear it happens when an OOM might occur, but what if you discard the reference completely, GC will come around and collect the SoftReference might notice no other strong/softly references exists and clear the internal referred value. </p>
<pre class="lang-java prettyprint-override"><code>ReferenceQueue<Object> cleared = new ReferenceQueue<>();
Object X = new Object();
SoftReference<Object> Xs = new SoftReference<>(X, cleared);
Thread.sleep(10);
X = null;
Xs = null;
System.GC();
Thread.sleep(100);
Reference ref;
while ((ref = cleared.poll()) != null) {
System.err.println(ref);
}
</code></pre>
<p>So where are the rules around this queue documentated? There must be more corner cases than what I'm asking, so maybe the question has to be broadened a bit.</p>
| 0non-cybersec
| Stackexchange |
Alfa Romeo Brings Giulia And Stelvio Nurburgring Editions, Plus 4C Specials To Geneva???. | 0non-cybersec
| Reddit |
4 racing presidents.. | 0non-cybersec
| Reddit |
This year's Nordstrom Holiday Catalogue features a model in a wheelchair. | 0non-cybersec
| Reddit |
iPhone wipe- "Verification Failed. There was a problem connecting to the server.". <p>I wiped my iPhone 5s, but in the process of re-setting it up, it says "verification failed, there was a problem connecting to the server" after I tried submitting the two-factor identification code- even though the wifi is working.
I tried to call apple support, but I have to have some "IBN"(?) number that I can only get to by going to settings, which I can't do because my iPhone isn't functioning yet. This number supposedly also comes with the packaging which I don't have anymore because I got the phone almost a year ago.</p>
<p>So, right now I'm stuck with a phone that won't log in, and I can't reach customer support about it. I've tried doing a hard reset with the lock and home button and retrying, but it won't work. What do I do?</p>
| 0non-cybersec
| Stackexchange |
Should we include Nuget PACKAGE folder in version control?. <p>I would like to know</p>
<p>In C# or VB.NET project should we include the PACKAGE folder (nugget package folder that is created to the root of my project that contain the nupkg files and other content) to our source control repository (Git for instance).</p>
| 0non-cybersec
| Stackexchange |
Order of growth of an entire function defined by an infinite product. <p>Consider the product
$$\displaystyle\prod_{n=1}^{+\infty}(1-e^{-2\pi n}e^{2\pi iz})$$</p>
<p>I know that this product defines an entire function $F$. I must show that the order of growth of $F$ is finite, at most 2.
My definition of order of an entire function is
$$\rho=\inf\{\lambda>0: \displaystyle\sup_{|z|=r} |f(z)|=O(e^{r^{\lambda}}),r\rightarrow\infty\}$$
Can someone give me an help?</p>
| 0non-cybersec
| Stackexchange |
The Dream combo.. | 0non-cybersec
| Reddit |
My dad in the late 80s with the latest technology of the time! Maybe not the coolest, but he's still cool to me.. | 0non-cybersec
| Reddit |
Part of the G in this parking sign broke off and it is still grammatically correct. | 0non-cybersec
| Reddit |
Girlish Number’s Chitose Karasuma as the Modern-day Lina Lamont. | 0non-cybersec
| Reddit |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
Finding two missing card corners under perspective. <p>If I take a photo of a rectangular playing card, I can reconstruct the screen/photo-space position of one missing corner which lies outside the photo (outside the camera frustum): assuming simple perspective projection and no lens distortion, I just intersect the two lines along the adjacent edges, since perspective projection preserves lines.</p>
<p>Is it possible to reconstruct the screen-space position of <em>two</em> missing corners -- an entire missing edge -- that fell outside the camera frustum, given:</p>
<ul>
<li>the screen position of the two known corners, with one full edge between them</li>
<li>the card dimensions (e.g. 3" x 5" -- probably the aspect ratio is more important than the actual dimensions here?),</li>
<li>a guess at whether the full edge is a "long edge" or "short edge", and</li>
<li>the angles observed at the two corners, as well as</li>
<li>a model of the camera frustum (e.g. horizontal and vertical field of view angles, and/or sensor dimensions and focal point distance -- do we need this model at all)?</li>
</ul>
<p>Intuition seems to indicate that the angles formed at the known corners would be a good indicator of the general direction of perspective, as well as the "magnitude of the perspective division" (please excuse any incorrect terminology).</p>
<p>It also seems like I could potentially work to try to find the card face normal vector in camera-relative 3D space given this information, and possibly extrapolate from there, but I'm a little stumped.</p>
<p>OpenCV uses a set of four $x, y$ point pairs to solve a system of linear equations in its <code>getPerspectiveTransform</code> method. I've tried supplementing this with various other "known" information here, while leaving half of two point pairs unknown, but I run into missing information or an inability to get from what I have to what I need.</p>
<p>If there's not a single or few possible solutions (sounds like that's the case, see comments), <strong>what form would the space of possible solutions take</strong>? What additional information could be provided to narrow the solution to a few roots or fewer DOF?</p>
<p>(From the computer vision side of things, this is probably the entirely wrong approach to take to a card recognition problem -- something like a feature extractor+descriptor+matcher is much more likely to be the right decision, based on what I'm reading -- but I'm curious about a possible analytical solution!)</p>
<p>(I've been wandering around searching for writing on rigid bodies and quads under perspective transforms, but have been having a little bit of trouble fitting what I'm reading to this particular problem; any other references/suggestions would be appreciated as well.)</p>
| 0non-cybersec
| Stackexchange |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
How to clear search history in 'Artha'?. <p>Artha is a dictionary application for Ubuntu. I want to know that is there a way to delete the search history from it?</p>
| 0non-cybersec
| Stackexchange |
A nurse fell in love with two abused kids that came to her hospital — so she adopted them and they are thriving. | 0non-cybersec
| Reddit |
recover boot-loader on osx. <p>On a MacBook Pro a tripple-boot (OSX, Windows, Ubuntu) was installed. For that, two partitions have been made, a 149.4 GB and a 100 GB. While not using Windows and Ubuntu, the 100 GB partition was fused with the Recovery HD, resulting in a more than 100 GB Recovery HD partition. To fuse the Recovery HD with the Macintosh HD, the Recovery HD partition was deleted. However the fuse was not successful and errored in "You can't perform this resize unless it has a booter". Now the MacBook Pro boots in Windows showing a blue screen with a message such as: "Recovery Your PC needs to be repaired ...". There is also no OSX to boot into while holding down the alt key. OSX as the operating system is still on the SSD but the boot-loader is missing.</p>
<p>How can booting in OSX be restored?</p>
<p>How can Windows and Linux be completely removed?</p>
<p>How can the Macintosh HD partition be expanded to the max possible volume of the 256 GB SSD?</p>
<p>Below outputs from <code>diskutil list</code> and <code>gpt -r show /dev/disk0</code> which I gathered from a recovery boot with command+R</p>
<blockquote>
<p>-bash-3.2# diskutil list</p>
<p>/dev/disk0</p>
<p>#: TYPE NAME SIZE IDENTIFIER</p>
<p>0: GUID_partition_scheme *251.0 GB disk0</p>
<p>1: EFI EFI 209.7 MB disk0s1</p>
<p>2:Apple_CoreStorage 149.4 GB disk0s2</p>
<p>/dev/disk1#: TYPE NAME SIZE IDENTIFIER</p>
<p>0: Apple_partition_scheme *1.3 GB disk1</p>
<p>1: Apple_partition_map 30.7 KB disk1s1</p>
<p>2: Apple_HFS OS X Base System 1.3 GB disk1s2</p>
<p>/dev/disk2</p>
<p>...</p>
<p>/dev/disk12</p>
</blockquote>
<p>And of the gpt</p>
<blockquote>
<p>gpt -r show /dev/disk0</p>
<p>start size index contents</p>
<p>0 1 PMBR</p>
<p>1 1 Pri GPT header</p>
<p>2 32 Pri GPT table</p>
<p>34 6 </p>
<p>40 409600 1 GPT part - C12A7328-F81F-...</p>
<p>409640 291740880 2 GPT part - 53746F72-6167-...</p>
<p>292150520 198084199 </p>
<p>490234719 32 Sec GPT table</p>
<p>490234751 1 Sec GPT header</p>
</blockquote>
| 0non-cybersec
| Stackexchange |
This one came from my dad after some busybody at church asked him if my brother was "really gay".. | 0non-cybersec
| Reddit |
Finite-dimensional representations of DAHA. <p>It is shown by <a href="http://arxiv.org/abs/math/0208138" rel="nofollow">Berest-Etingof-Ginzburg</a> that there exist finite-dimensional irreducible representations of rational Cherednik algebra $H_c(S_n)$ of $A_{n-1}$ type if and only if the deformation parameter $c$ takes the rational numbers of the form $c=m/n$.</p>
<p>Since the rational Cherednik algebra is the rational degeneration of double affine Hecke algebra (DAHA), the question is as follows:</p>
<blockquote>
<p><strong>Question:</strong> Are there the corresponding finite-dimensional representations of DAHA? Or is any finite-dimensional representation of DAHA known?</p>
</blockquote>
| 0non-cybersec
| Stackexchange |
Why doesn't "0xe+1" compile?. <p>Look at this code snippet:</p>
<pre><code>int a = 0xe+1;
</code></pre>
<p>Clang, gcc, icc don't compile this:</p>
<pre><code>t.cpp:1:12: error: invalid suffix '+' on integer constant
</code></pre>
<p>MSVC successfully compiles.</p>
<p>Which compiler is correct? If clang and gcc are correct, why is this happening?</p>
<p>Note: if I add a space before <code>+</code>, the code compiles. If I change <code>0xe</code> to <code>0xf</code>, it compiles too. Maybe this has to do something with exponential notation (like <code>1.2e+3</code>)?</p>
| 0non-cybersec
| Stackexchange |
How to run Tor on Raspbian on the Raspberry Pi?. <p>The Debian/Ubuntu packages from <a href="http://deb.torproject.org">deb.torproject.org</a>[<a href="https://www.torproject.org/docs/debian">docs</a>] do not work on the <a href="http://www.raspberrypi.org/">Raspberry Pi</a> when running <a href="http://www.raspbian.org/">Raspbian</a>:</p>
<pre><code> $ tor --version
Illegal instruction
</code></pre>
<p>Why, and how can I still run Tor versions newer than <a href="http://archive.raspbian.org/raspbian/pool/main/t/tor/">what ships with Raspbian</a>?</p>
| 0non-cybersec
| Stackexchange |
Victorian Jokes. | 0non-cybersec
| Reddit |
An increase to 3 Gig of RAM slows down Ubuntu 10.04 LTS. <p>I have Ubuntu 10.04 running from an external hard drive (installed on an enclosure) connected via USB port. Like a month or so ago, I increased RAM on my pc from 2 Gigs to 3 Gigs. This resulted on extremely long boot times and slow application loads. While I was understanding the nature of my problem, I posted various threads on this forum ( Questions # 188417, 188801), where I was advised to gather speed tests, and other info on my machine. I was also suggested that I might have problems with the RAM installed. Initially, I did not consider that possibility because:</p>
<p>1) I did a memory test with a diagnostic program from DELL (My pc is from Dell)
2) My pc works fine with Windows XP (the default OS), no problems with memory
3) My pc works fine when booting with Ubuntu 10.10 memory stick, no speed problems
4) My pc works fine when booting with Ubuntu 11.10 memory stick, no speed problems</p>
<p>Anyway, I performed the memory tests suggested. But before doing it, and to check out any possibility of hardware issues on the hard drive, I did the following: (1) purchased a new hard drive enclosure and moved my hard drive to it, (2) purchased a new USB cable and used it to connect my hard drive/enclosure setup to a different USB port on my pc.</p>
<p>Then, I performed speed tests with 1 Gig, 2 Gigs and 3 Gigs of RAM with my Ubuntu 10.04 OS. Ubuntu 10.04 worked well when booted with 1 Gig or 2 Gigs of RAM. When I increased to 3 Gigs, it slowed down to a crawl. I can't understand the relationship between an increase of 1 Gig and the effect it has in Ubuntu 10.04. This doesn't happen with Ubuntu 10.10 and 11.10. Unfortunately for me, Ubuntu 10.04 is my principal work operating system. So, I need a solution for this.</p>
<p>Hardware and system information:</p>
<ul>
<li>DELL Precision 670</li>
<li>2 internal SATA Hard drives</li>
<li>Audigy 2 ZS audio system</li>
<li>Factory OS: Windows XP Professional SP3</li>
<li>NVidia 8400 GTS video card</li>
</ul>
<p>More info:</p>
<pre><code>williepabon@WP-WrkStation:~$ uname -a
Linux WP-WrkStation 2.6.32-38-generic #83-Ubuntu SMP Wed Jan 4 11:13:04 UTC 2012 i686 GNU/Linux
williepabon@WP-WrkStation:~$ lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu 10.04.4 LTS
Release: 10.04
Codename: lucid
</code></pre>
<p>Speed test with the 3 Gigs of RAM installed:</p>
<pre><code>williepabon@WP-WrkStation:~$ sudo hdparm -tT /dev/sdc
[sudo] password for williepabon:
/dev/sdc:
Timing cached reads: 84 MB in 2.00 seconds = 41.96 MB/sec
Timing buffered disk reads: 4 MB in 3.81 seconds = 1.05 MB/sec
</code></pre>
<p>This is a very slow transfer rate from a hard drive.</p>
<p>I will really appreciate a solution or a work around for this problem. I know that that there are users that have Ubuntu 10.04 with 3 Gigs or more of RAM and they don't have this problem.</p>
<ul>
<li>Same <a href="https://answers.launchpad.net/ubuntu/+source/linux/+question/190306" rel="nofollow">question asked</a> on Launchpad for reference.</li>
</ul>
| 0non-cybersec
| Stackexchange |
Emacs: How to insert 'λ' instead of 'lambda' in Scheme mode?. <p>Long ago, I came across a text editor function that replaced the word 'lambda' with the character 'λ'. I would like to do this in emacs. My preferences:</p>
<ul>
<li><p>I would like to activate this function in certain modes only (activate it for Scheme-mode but turn it off for C-mode for example).</p></li>
<li><p>At work I still use an older version of emacs, so the solution should work for emacs22 and emacs23.</p></li>
</ul>
<p>How should I proceed?</p>
| 0non-cybersec
| Stackexchange |
Phoenix woman accused of harassing man with 159K texts, threatening to turn his kidneys into sushi, says its ‘ridiculous’ she’s in jail. | 0non-cybersec
| Reddit |
How to create TagHelper who's value is a Model Property (without using @Model)?. <p>Tag Helper's are one of the sweet features of Asp.Net Core. I have created several tag helpers and they can be super helpful.</p>
<p>Now I would like to try something a bit more advanced. Tag helper attributes have the ability to be created in such as way that the attribute value is a model property. </p>
<p>And example of this is the following:</p>
<pre><code> //model
public class MyModel{
public int MyField {get;set;} = 10;
}
//in the view
@model MyModel
...
<input asp-for="MyField" />
</code></pre>
<p>In the above example the <code>asp-for</code> tag helper for the <code>input</code> tag directed references a property from the model. The <a href="https://docs.microsoft.com/en-us/aspnet/core/mvc/views/working-with-forms" rel="noreferrer">documentation</a> says that </p>
<blockquote>
<p>The asp-for attribute value is a ModelExpression and the right hand side of a lambda expression. Therefore, asp-for="Property1" becomes m => m.Property1 in the generated code which is why you don't need to prefix with Model. </p>
</blockquote>
<p>So this is pretty cool, and that same documentation appears to call this an "Expression name". </p>
<p>How do I create such a property in my own custom tag helper?</p>
| 0non-cybersec
| Stackexchange |
Hover board?. | 0non-cybersec
| Reddit |
Extending key sizes in Salsa20 and ChaCha?. <p>I've written implementations of Salsa20 and ChaCha that accept 384 and 448 bit keys. It was fairly trivial to implement, the 'sigma' constant is replaced with key material, and the counter, (which was initialized at 0), rotates and can be initialized at any value. So along with the 64 bit vector, the entire 512 bit state can now be initialized via a key/vector.</p>
<p>This does not affect the performance in any way, and if a key is constructed using key + sigma + 0, the output aligns with an implementation that uses a 256 bit key. Provided that the key used is created using a strong PRNG, and the values that replace the constant are sufficiently asymmetric, this should not present a problem, as the constants function seems to be purely to reduce symmetry.</p>
<p>Is there anything incorrect in the description given above?</p>
<p>One other question: I am considering extending max rounds to 24, I have looked at the mathematical model and it seems that this should not do anything other than further diffuse the input. Is that correct?</p>
| 0non-cybersec
| Stackexchange |
Composition of onto and one-to-one functions. <p>Question : Let f: X → Y and g: Y → Z be two functions.
Is it possible that f is not onto and g ο f is onto? Justify your answer. If the answer is "yes", give a specific example for f and g.</p>
<p>Not possible because in that case, for g ο f, at least one element il the domain won't be mapped. Is that right?</p>
| 0non-cybersec
| Stackexchange |
Straddling development and security, considering moving onto a big 4 or just generally better company. I graduated with an MSCS a year and a half ago from a relatively big name school and took a position with a fortune 500 company as a Security Engineer upon graduation.
I am at the same company and things are not terrible, but I could be doing a lot better. I am severely underpaid, most of my team has been there for 20 years and while we all get along great, they don't have any interest in new things or going to security meet ups. The work is mundane, I primarily develop scripts and tools for them to script/automate reports for them along with some sysadmin-y things like deploying servers/firewalls.
So I'm looking to apply to new jobs in the new year. The thing is I've been straddling security and development. I'm the only person who can program on my team so while I have a CS degree and do my best to follow best practices (version control, testing, etc), I am probably lacking some developer skills for someone who has been working for 1.5 years. I do practice algorithm/interview questions on Leetcode and Cracking the Coding interview and while I'm can probably get to the on-site at an Amazon, I don't think I'd be able to get one at Google (as a dev). I know Python very well and have worked with Java/C++/mobile/web/databases but I haven't been using one stack regularly.
On the other hand, I really do like security but most security people I've worked with are more like sysadmins or SOC analysts and I have little interest in doing that. I took a bunch of security classes and attend/attended CTF clubs and meet ups and actually won our company's CTF but do not have an area of expertise. I've done a bit of everything from web to malware to crypto to network, etc.
I've sent out my resume a few times to companies I was semi-interested in to practice for companies I really want. The problem is that I am not an expert so while I can talk about malware analysis a bit, once the interviewer starts drilling in hard on very specific things I can't think of it off the top of my head but know what they're talking about and know exactly where to look in documentation for that specific thing. I'm definitely better with web stuff but still not great.
I have mostly been studying algorithms/Linux/web security because I figure it's never bad to be fresh on those topics. I have contacts at companies that seem great like Google/Facebook/MS/Tumblr and can get an interview whenever but don't want to blow it. They seem more open to jack of all trades security people who can code.
tl;dr
Current job is not great, looking for a new one in new year
Currently jack of all trades, straddling dev and a mix of security stuff
Not sure if I have to start specializing or can I go in with a jack of all trades at a large company
What should I be studying in order to get in at a large company? | 1cybersec
| Reddit |
A stunning timelapse over the Salar de Uyuni salt flats in Bolivia. | 0non-cybersec
| Reddit |
Framed manifolds question. <p>Let a $\pi$-manifold be a manifold with the property that its normal bundle is trivial if it is embedded into $\mathbb R^n$ for large enough $n$.</p>
<p>Homotopy spheres are $\pi$-manifolds. </p>
<p><a href="http://ncatlab.org/nlab/show/framed+manifold" rel="nofollow">Here</a> it is stated that the only spheres that admit a framing are $S^1, S^3, S^7$. <a href="http://en.wikipedia.org/wiki/Parallelizable_manifold#Remarks" rel="nofollow">Here</a> it is stated that a framed manifold is a manifold with trivial normal bundle (therefore the same as a $\pi$-manifold). </p>
<p>These statements contradict each other. Which of the statements is wrong?</p>
| 0non-cybersec
| Stackexchange |
Please, please, stop with the cat posts.. We all know cats are cute, but they have nothing to do with D&D and upvoting them causes quality content to be pushed down the page. If you're looking for karma for cute cats why not try /r/aww and not /r/DnD. | 0non-cybersec
| Reddit |
Can I compile a cuda program without having a cuda device. <p>Is it possible to compile a CUDA program without having a CUDA capable device on the same node, using only NVIDIA CUDA Toolkit...?</p>
| 0non-cybersec
| Stackexchange |
why do some job posts say "high pressure environment"?. <p>Why would there be any pressure if everyone knows what they are doing and the projects are accurately estimated? If there's pressure, or even high pressure, then it implies what they are currently doing is not working, why would any good programmer want to join a team like that? Are these kind of job posting failed at trying to show off or are they really just being honest? Or is there really some good reasons for having pressure?</p>
| 0non-cybersec
| Stackexchange |
How to identify dac_override cause on Android?. <p>I am working on some Android customizations and an app I am writing causes a <code>dac_override</code> which looks like so in dmesg:</p>
<pre><code>type=1400 audit(499405.329:16): avc: denied { dac_override } for
pid=1103 comm="my_tool" capability=1 scontext=u:r:my_tool:s0
tcontext=u:r:my_tool:s0 tclass=capability permissive=1
</code></pre>
<p>I know the executable that is causing the problem (it's <code>my_tool</code>) and I know that <code>dac_override</code> means that the executable doesn't have traditional linux permissions to perform some operation, but I don't know which operation was attempted and which file it was attempted on. How can I find out?</p>
<p>Also as a side question I assume by the name and the behavior that <code>dac_override</code> means that SELinux has the capability to override traditional linux permission violations?</p>
| 0non-cybersec
| Stackexchange |
Descent Second Edition on Roll20.net. So, the game is amazing, but it's fiddly, takes long to setup, and it's hard to find people to play. I'm changing that. I'm making it on Roll20.net and it's really cool. I might be doing more if this turns out! | 0non-cybersec
| Reddit |
A pic of a friend eating his own hand.. | 0non-cybersec
| Reddit |
I interviewed Mat Zo a while back when he was in NYC to play his 5 hour set at Output and we talked about his label, new artists, and possibility of Virtual Self collab.. | 0non-cybersec
| Reddit |
Expression for the sum of submodules of a free $\Bbb{Z}$-module. <p>Let <span class="math-container">$[u_1,u_2]$</span> denote the free <span class="math-container">$\Bbb{Z}$</span>-module of rank <span class="math-container">$2$</span> with generators <span class="math-container">$u_1$</span> and <span class="math-container">$u_2$</span>, i.e., <span class="math-container">$$[u_1,u_2]:=u_1\Bbb{Z}\oplus u_2\Bbb{Z}.$$</span> Let <span class="math-container">$M=[1,\theta]$</span>. Except for <span class="math-container">$\theta$</span>, which is irrational, every variable in sight here is an integer.</p>
<p>It is clear that any rank-<span class="math-container">$2$</span> submodule of <span class="math-container">$M$</span> can be written in the form <span class="math-container">$[a,b+c\theta]$</span>, where we can assume w.l.o.g. that <span class="math-container">$a$</span> and <span class="math-container">$c$</span> are positive and that <span class="math-container">$0\le b\le a-1$</span>. Subject to these restrictions, the representation is unique, and can be taken as a canonical representation.</p>
<p>For submodules with canonical representations:</p>
<p><span class="math-container">$M_1=[a,b+c\theta]\subseteq M \\ M_2=[d,e+f\theta]\subseteq M,$</span></p>
<p>I want to write down the canonical representation of the submodule <span class="math-container">$$M_1+M_2=\{m_1+m_2\mid m_1\in M_1, m_2\in M_2\},$$</span> but I'm stuck on a detail. I have this:</p>
<p><span class="math-container">$M_1+M_2=[g_1,h+g_2\theta]$</span></p>
<p>where <span class="math-container">$g_1=\gcd(a,d,bf-ce)$</span> and <span class="math-container">$g_2=\gcd(c,f)$</span>. For <span class="math-container">$h$</span>, I have the system of linear congruences:</p>
<p><span class="math-container">$\begin{cases}\dfrac{c}{g_2}h\equiv b\pmod{g_1} \\ \dfrac{f}{g_2}h\equiv e\pmod{g_1}\end{cases}$</span>.</p>
<p>I need to know that such an <span class="math-container">$h$</span> exists, and that we can determine it uniquely up to congruence modulo <span class="math-container">$g_1$</span>, and that's where I'm stuck. For example, the first congruence has a solution iff <span class="math-container">$\gcd\left(\frac{c}{g_2}, g_1\right)| b$</span>. It's clear to me that, if <span class="math-container">$t|\frac{c}{g_2}$</span> and <span class="math-container">$t|g_1$</span>, then we have <span class="math-container">$t|bf$</span>, but we need <span class="math-container">$t|b$</span>. From looking at examples, the system always seems to have a unique solution, even though both congruences might individually have multiple ones.</p>
<p>I don't know whether I'm missing something obvious, or whether my approach is all wrong, or what. Any help, hints or insight anyone can offer would be very much appreciated.</p>
| 0non-cybersec
| Stackexchange |
What is the remainder when 4 to the power 1000 is divided by 7. <p>What is the remainder when $4^{1000}$ is divided by 7?
In my book the problem is solved, but I am unable to understand the approach. Please help me understand - </p>
<blockquote>
<p>Solution - </p>
<p>To find the Cyclicity, we keep finding the remainders until any
remainder repeats itself. It can be understood with the following
example:</p>
<p>No./7 -> $4^1$ $4^2$ $4^3$ $4^4$ $4^5$ $4^6$ $4^7$ $4^8$ </p>
<p>Remainder -> 4 2 1 4 2 1 4 2 </p>
<p>Now $4^4$ gives us the same remainder as $4^1$, so the Cyclicity is of
3 (Because remainders start repeating themselves after $4^3$ </p>
<p>So any power of 3 or multiple of 3 will give the remainder of 1. So,
$4^{999}$ will give remainder 1. </p>
<p>Final remainder is 4.</p>
</blockquote>
<p><strong>Now I don't understand the last line. Please explain, how the remainder comes down to 4?</strong></p>
| 0non-cybersec
| Stackexchange |
Perl too slow concurrent download with both HTTP::Async & Net::Async::HTTP. <p>I'm trying to GET about 7 dozens of urls in parallel with scripts: the first is below, with HTTP::Async, and the second one is <a href="http://pastebin.com/ZegvN4vH" rel="noreferrer">on pastebin</a>, with Net::Async::HTTP.
The problem is that I'm getting pretty same timing results - about 8..14 seconds for all urls list. It's inacceptable slow compared to curl+xargs started from shell, which gets all in less than 3 seconds with 10-20 "threads".
For example, Devel::Timer in first script shows that max queue length is even less than 6 (<code>$queue->in_progress_count</code><=5, <code>$queue->to_send_count</code>=0 allways). So, it's looks like foreach with $queue->add is executing too slow, and I don't know why.
Pretty same situation I got with Net::Async::HTTP (second script on pastebin), which is even slower than the first.</p>
<p>So, please, does anybody know, what I'm doing wrong? How can I get concurrent download speed at least compared to curl+xargs started from shell?</p>
<pre><code>#!/usr/bin/perl -w
use utf8;
use strict;
use POSIX qw(ceil);
use XML::Simple;
use Data::Dumper;
use HTTP::Request;
use HTTP::Async;
use Time::HiRes qw(usleep time);
use Devel::Timer;
#settings
use constant passwd => 'ultramegahypapassword';
use constant agent => 'supa agent dev.alpha';
use constant timeout => 10;
use constant slots => 10;
use constant debug => 1;
my @qids;
my @xmlz;
my $queue = HTTP::Async->new(slots => slots,max_request_time => 10, timeout => timeout, poll_interval => 0.0001);
my %responses;
my @urlz = (
'http://testpodarki.afghanet/api/products/4577',
'http://testpodarki.afghanet/api/products/4653',
'http://testpodarki.afghanet/api/products/4652',
'http://testpodarki.afghanet/api/products/4571',
'http://testpodarki.afghanet/api/products/4572',
'http://testpodarki.afghanet/api/products/4666',
'http://testpodarki.afghanet/api/products/4576',
'http://testpodarki.afghanet/api/products/4574',
'http://testpodarki.afghanet/api/products/4651',
'http://testpodarki.afghanet/api/stock_availables/?display=full&filter[id_product]=[3294]',
'http://testpodarki.afghanet/api/specific_prices/?display=full&filter[id_product]=[3294]',
'http://testpodarki.afghanet/api/combinations/?display=full&filter[id_product]=[4577]',
'http://testpodarki.afghanet/api/stock_availables/?display=full&filter[id_product]=[4577]',
'http://testpodarki.afghanet/api/specific_prices/?display=full&filter[id_product]=[4577]',
'http://testpodarki.afghanet/api/product_option_values/188',
'http://testpodarki.afghanet/api/product_option_values/191',
'http://testpodarki.afghanet/api/product_option_values/187',
'http://testpodarki.afghanet/api/product_option_values/190',
'http://testpodarki.afghanet/api/product_option_values/189',
'http://testpodarki.afghanet/api/stock_availables/?display=full&filter[id_product]=[4653]',
'http://testpodarki.afghanet/api/specific_prices/?display=full&filter[id_product]=[4653]',
'http://testpodarki.afghanet/api/images/products/4577/12176',
'http://testpodarki.afghanet/api/stock_availables/?display=full&filter[id_product]=[4652]',
'http://testpodarki.afghanet/api/specific_prices/?display=full&filter[id_product]=[4652]',
'http://testpodarki.afghanet/api/images/products/4653/12390',
'http://testpodarki.afghanet/api/combinations/?display=full&filter[id_product]=[4571]',
'http://testpodarki.afghanet/api/stock_availables/?display=full&filter[id_product]=[4571]',
'http://testpodarki.afghanet/api/specific_prices/?display=full&filter[id_product]=[4571]',
'http://testpodarki.afghanet/api/images/products/4652/12388',
'http://testpodarki.afghanet/api/product_option_values/175',
'http://testpodarki.afghanet/api/product_option_values/178',
'http://testpodarki.afghanet/api/product_option_values/179',
'http://testpodarki.afghanet/api/product_option_values/180',
'http://testpodarki.afghanet/api/product_option_values/181',
'http://testpodarki.afghanet/api/images/products/3294/8965',
'http://testpodarki.afghanet/api/product_option_values/176',
'http://testpodarki.afghanet/api/product_option_values/177',
'http://testpodarki.afghanet/api/combinations/?display=full&filter[id_product]=[4572]',
'http://testpodarki.afghanet/api/stock_availables/?display=full&filter[id_product]=[4572]',
'http://testpodarki.afghanet/api/specific_prices/?display=full&filter[id_product]=[4572]',
'http://testpodarki.afghanet/api/product_option_values/176',
'http://testpodarki.afghanet/api/product_option_values/181',
'http://testpodarki.afghanet/api/product_option_values/180',
'http://testpodarki.afghanet/api/images/products/4571/12159',
'http://testpodarki.afghanet/api/product_option_values/177',
'http://testpodarki.afghanet/api/product_option_values/179',
'http://testpodarki.afghanet/api/product_option_values/175',
'http://testpodarki.afghanet/api/product_option_values/178',
'http://testpodarki.afghanet/api/stock_availables/?display=full&filter[id_product]=[4666]',
'http://testpodarki.afghanet/api/combinations/?display=full&filter[id_product]=[4576]',
'http://testpodarki.afghanet/api/specific_prices/?display=full&filter[id_product]=[4666]',
'http://testpodarki.afghanet/api/stock_availables/?display=full&filter[id_product]=[4576]',
'http://testpodarki.afghanet/api/specific_prices/?display=full&filter[id_product]=[4576]',
'http://testpodarki.afghanet/api/images/products/4572/12168',
'http://testpodarki.afghanet/api/product_option_values/185',
'http://testpodarki.afghanet/api/product_option_values/182',
'http://testpodarki.afghanet/api/product_option_values/184',
'http://testpodarki.afghanet/api/product_option_values/183',
'http://testpodarki.afghanet/api/product_option_values/186',
'http://testpodarki.afghanet/api/images/products/4666/12413',
'http://testpodarki.afghanet/api/combinations/?display=full&filter[id_product]=[4574]',
'http://testpodarki.afghanet/api/stock_availables/?display=full&filter[id_product]=[4574]',
'http://testpodarki.afghanet/api/specific_prices/?display=full&filter[id_product]=[4574]',
'http://testpodarki.afghanet/api/product_option_values/177',
'http://testpodarki.afghanet/api/product_option_values/181',
'http://testpodarki.afghanet/api/images/products/4576/12174',
'http://testpodarki.afghanet/api/product_option_values/176',
'http://testpodarki.afghanet/api/product_option_values/180',
'http://testpodarki.afghanet/api/product_option_values/179',
'http://testpodarki.afghanet/api/product_option_values/175',
'http://testpodarki.afghanet/api/product_option_values/178',
'http://testpodarki.afghanet/api/specific_prices/?display=full&filter[id_product]=[4651]',
'http://testpodarki.afghanet/api/images/products/4574/12171',
'http://testpodarki.afghanet/api/stock_availables/?display=full&filter[id_product]=[4651]',
'http://testpodarki.afghanet/api/images/products/4651/12387'
);
my $timer = Devel::Timer->new();
foreach my $el (@urlz) {
my $request = HTTP::Request->new(GET => $el);
$request->header(User_Agent => agent);
$request->authorization_basic(passwd,'');
push @qids,$queue->add($request);
$timer->mark("pushed [$el], to_send=".$queue->to_send_count().", to_return=".$queue->to_return_count().", in_progress=".$queue->in_progress_count());
}
$timer->mark('requestz pushed');
while ($queue->in_progress_count) {
usleep(2000);
$queue->poke();
}
$timer->mark('requestz complited');
process_responses();
$timer->mark('responzez processed');
foreach my $q (@xmlz) {
# print ">>>>>>".Dumper($q)."<<<<<<<<\n";
}
$timer->report();
print "\n\n";
</code></pre>
| 0non-cybersec
| Stackexchange |
The Ultimate Facebook Stalking App (filters your mutual friends' photos to find pics of people you're not friends with). | 0non-cybersec
| Reddit |
Can't upgrade to 14.04 due to update-manager-kde being in the removal blacklist. <p>Trying to upgrade to new LTS</p>
<p>Get error <code>... cannot calculate upgrade...</code> and the upgrade stops.</p>
<p>In <code>/var/log/dist-upgrade/main.log</code> :</p>
<pre><code> 2014-08-22 03:42:25,357 ERROR Dist-upgrade failed: 'The package 'update-manager-kde' is marked for removal but it is in the removal blacklist.'
</code></pre>
<p>Too scared to manually remove a package that is named <strong>update-manager-kde</strong>!</p>
| 0non-cybersec
| Stackexchange |
How to subscript a single quotation mark?. <p>I can do:</p>
<pre><code>\emph{f$_i$$_j$}
</code></pre>
<p>to get <em>f<sub>ij</sub></em></p>
<p>But how do I get <em>f<sub>ij'</sub></em>?</p>
<p>I've tried:</p>
<pre><code>\emph{f$_i$$_j$$_'$}
</code></pre>
<p>But it didn't work.</p>
| 0non-cybersec
| Stackexchange |
Does current follow the path(s) of least (total) resistance?. <p>Consider Poisson equation <span class="math-container">$\nabla \cdot (\sigma(x)\nabla u)=0$</span> in a domain <span class="math-container">$D$</span>, where <span class="math-container">$\sigma(x)$</span> is the spatially dependent conductivity. On the boundary we have <span class="math-container">$2$</span> electrodes <span class="math-container">$E_1$</span> and <span class="math-container">$E_2$</span> (Dirichlet BC <span class="math-container">$u=0$</span> on <span class="math-container">$E_1$</span> and <span class="math-container">$u=1$</span> on <span class="math-container">$E_2$</span>). And the rest of the boundary is insulating material <span class="math-container">$du/d\vec n=0$</span> (Neumann BC). The electrodes do not have any contact impedance. This would be an ordinary Ohmic resistor with resistance R.</p>
<p>To each divergence-free vector field <span class="math-container">$J(x)$</span> on <span class="math-container">$D$</span> which flow strictly from <span class="math-container">$E_1$</span> to <span class="math-container">$E_2$</span> we can assign a "resistance" <span class="math-container">$R_J$</span> as follows, because we can insert non-conducting walls along the streamlines, we can consider the streamlines from <span class="math-container">$E_1$</span> to <span class="math-container">$E_2$</span> as resistors of thickness dt, then <span class="math-container">$R_J$</span> is defined as the resistance of them all in parallel (so that would be <span class="math-container">$1/(1/R_1+1/R_2....))$</span>, in the limit as dt goes to 0. Each of the streamline resistors is defined as a series connection of resistors (So thats <span class="math-container">$R_a+R_b...$</span>) with length dt2, and we take the limit as dt2 goes to zero aswell. The resistance of each resistor of thickness <span class="math-container">$dt*dt2$</span> is computed from <span class="math-container">$\sigma(x)$</span></p>
<p>I am looking for proof or disproof to the conjecture that <span class="math-container">$R_J$</span> is minimized when <span class="math-container">$J$</span> is obtained by solving the Poisson equation. I am also looking for some references on this idea or concept.</p>
| 0non-cybersec
| Stackexchange |
Matrix arrangement issues in php. <p>I would like to know some solutions to such a problem.</p>
<p>It is given a number lets say 16 and you have to arrange a matrix this way </p>
<pre><code>1 2 3 4
12 13 14 5
11 16 15 6
10 9 8 7
</code></pre>
<p>the language doesn't matter, (preferably PHP);</p>
| 0non-cybersec
| Stackexchange |
Change observable but don't notify subscribers in knockout.js. <p>Is there a way to ignore subscribers on a value change of the observable. Id like to change a value of an observable, but not execute it for the subscribers with knockout.js</p>
| 0non-cybersec
| Stackexchange |
Modulo question about equality. <p>True or false?</p>
<p>$$24 \equiv 77 \mod 16 $$</p>
<p>$1.$ $77/16 = 4.8125 $</p>
<p>$2.$ $4.8125 - 4 = .8125$</p>
<p>$3.$ $0.8125 \times 16 = 13$</p>
<p>$4.$ $24 != 13$</p>
<p>So the answer is false? Am I right?</p>
| 0non-cybersec
| Stackexchange |
Projection Matrix and its property as identity element. <p>I just ran over this result: I have a projection (given by the matrix $P = X(X'X)^{-1}X'$ where $X$ is some matrix with full rank) and certain matrix multiplication (with an arbitrary $X$ matrix) yielded $Pw = w$ for $w = $ vector of ones, $w = $ vector with numbers from 1 to matchingdimension, and some other $w$ I tried in Matlab. I doubt that these observations are due to numerical issues. Sadly, I lack knowledge in linear algebra to explain these results.</p>
<p>So my question is: what is the explanation to this result?</p>
<p>Best regards</p>
| 0non-cybersec
| Stackexchange |
win7 PC can't read CD-Rs?. <p>I have a win7 64-bit system that cannot read burnt CD-R's (even ones it burnt itself!). How can I troubleshoot and correct this?</p>
| 0non-cybersec
| Stackexchange |
Difference between ADO NET source and OLE DB Source in SSIS 2008?. <p>Can anyone say the Difference between ADO NET source and OLE DB Source in SSIS 2008 ?are they both same in any context ?</p>
| 0non-cybersec
| Stackexchange |
Have you ever stopped a girl during a blow job just to kiss her?. And why?
This happened to me:
I (22 F) gave my first blowjob to my bf a night ago. We've liked each other for years but we only started dating a few months ago. He doesn't know he's my first yet (first kiss, first love) because we just haven't come around to having that conversation (we have had our fair share of problems and miscommunications which is why it took so long to be a couple). I've dated before but it's not the same. He is the guy.
We make out and fondle a lot, but yesterday I went for it and started giving him a blow job.
It's my first time, but I know I wasn't doing a bad job from what I hear from friends and what I've watched. I was licking his shaft and balls, sucking his tip, and deep-throating (i'm missing that reflex) and he held my head at one point and thrust it up and down. I could taste pre-cum and thought things were going okay.
But then he pulled me up and started kissing me and told me not to worry and that he would "take care of it". I was confused to say the least, because you hear about how much guys love getting head, and he stopped me. I asked if something was wrong and he said something like "I want us to both enjoy this" but I feel like that was an excuse, because I was enjoying it.
We made out and cuddled and he masturbated slowly but stopped to focus on me and didn't make himself cum. Then told me that he waited a long time to be this close to me, and that I was so 'hot', among many other things, that just confused me more.
I don't get what happened here so I'd like to know if this is something you have ever done and why. Is this a thing? Maybe I was bad and I just don't know it? I consider myself to have decent judgement and I seemed to be doing okay. | 0non-cybersec
| Reddit |
A rough outline of my webstore for Features. Opinion?. | 0non-cybersec
| Reddit |
UPDATE on the $5 battery bank. I posted up this a few days ago : https://www.reddit.com/r/raspberry_pi/comments/8i61lb/battery_power_for_5/
Thought I'd follow up with some data on how long this "5,000 mAh" is lasting me at 100% CPU usage (running BOINC).
https://i.imgur.com/0e2UzWT.png
The first run got me 20hrs of battery life...I wanted to monitor things more closely so I installed RPi-Monitor and since then I can see I'm getting more like 16-18hrs runtime on average.
Here's a link to the battery : https://www.amazon.com/Simpiz-5000mAh-portable-charger-external/dp/B015HQNTD6/ref=sr_1_3?s=electronics&ie=UTF8&qid=1525872966&sr=1-3&keywords=Simpiz+5000mAh+portable+charger+power+bank | 0non-cybersec
| Reddit |
Al Franken Says FCC Proposed Rules Are “The Opposite of Net Neutrality” -- “The idea of net neutrality is not to have the government ‘regulate the internet,’” Franken said. “It’s to keep the internet open, so that we still have the innovation and investment we’ve had in the past.”. | 0non-cybersec
| Reddit |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
ssh configuration without being asked for password. <p>The goal, here, is to be able to only write <code>ssh 10.0.200.9.switch -l customer</code> from my laptop and be logged in without being asked for password.</p>
<ul>
<li>Switch is located inside local LAN meaning <code>Laptop --> bastion.example.com --> 10.0.200.9</code>.</li>
<li>The switch does not support ssh keys, only password.</li>
<li>Both my laptop and bastion server is running OpenSSH 7.2p2.</li>
<li>Am using sshpass 1.05 when trying to skip password prompt. Am open for other solutions if it exist any.</li>
</ul>
<p>This is semi working:</p>
<pre><code>/home/user/.ssh/config configuration 1
Host bastion
hostname bastion.example.com
port 2222
user root
identityfile /home/user/.ssh/id_rsa
Match host *.switch user customer
ProxyCommand ssh bastion -W $(echo %h | grep -Po '^[0-9.]+[0-9]+' ):%p
</code></pre>
<p>Working but asks for password</p>
<pre><code>user@laptop:~/.ssh$ ssh 10.0.200.9.switch -l customer
[email protected]'s password:
Type 'help' or '?' to get help.
Switch#
</code></pre>
<p>Working and does not asks for password but is longer to write in console</p>
<pre><code>user@laptop:~/.ssh$ export SSHPASS=secretPassWord
user@laptop:~/.ssh$ sshpass -e ssh 10.0.200.9.switch -l customer
Type 'help' or '?' to get help.
Switch
</code></pre>
<p>This is not working:</p>
<pre><code>/home/user/.ssh/config configuration 2
Host bastion
hostname bastion.example.com
port 2222
user root
identityfile /home/user/.ssh/id_rsa
Match host *.switch user customer
ProxyCommand sshpass -e ssh bastion -W $(echo %h | grep -Po '^[0-9.]+[0-9]+' ):%p
</code></pre>
<p>Changes in <code>.ssh/config file</code> does not have any effect</p>
<pre><code>user@laptop:~/.ssh$ export SSHPASS=secretPassWord
user@laptop:~/.ssh$ ssh 10.0.200.9.switch -l customer
[email protected]'s password:
</code></pre>
| 0non-cybersec
| Stackexchange |
Ice-golf. | 0non-cybersec
| Reddit |
Why do so many people dislike mecha?. I've noticed that in quite a few /r/Animesuggest posts, people specify that they dislike mecha anime. Why do so many people dislike mecha, to the point where they feel like it's necessary to specify their dislike when asking for recommendations?
I find it quite hard to think of many mecha anime that aren't Gundam and Macross, to be honest. Code Geass, TTGL, and Evangelion are no doubt the biggest three. Other shows that come to mind would be... Eureka Seven, Escaflowne, Rinne no Lagrange, MuvLuv...? At this point I'm tempted to mention Infinite Stratos to pad out my list because it's so damn short.
Good mecha anime are popular. Bad mecha anime are obscure, more so than bad shows of other genres. So what gives?
* Mecha isn't even that popular of a genre; how and why do people decide they don't like it?
* If a person has seen mecha anime and decided they don't like it, where are they finding these bad mecha shows? The most popular mecha anime are popular enough that I don't think they'd cause many people to develop a distaste of the genre.
* If a person hasn't seen any mecha anime, what leads them to be wary of the genre despite that? I suppose it does have a bit of a stigma, possibly stemming from some of the Gundam series, but shouldn't the popularity of Evangelion et al overwrite this? | 0non-cybersec
| Reddit |
You need seex? I am Jada I need seex! Help me!. | 0non-cybersec
| Reddit |
How do I allow for anonymous encryption?. <p>I have a protocol I am designing that requires anonymity and privacy. My idea is to have a minimum number of hops in the network before the message can be sent to its intended destination. The response can then somehow be encrypted such that only the original asker can understand. To maintain privacy, each hop only knows its last hop in the route and the minimum hops is random allowing for nodes to maintain anonymity even from the closest hop.</p>
<p>For instance I have a protocol I already know won't work and is why I am here asking for suggestions:</p>
<p>Bob sends a message with a set number of hops before it can go to its intended target, it has the targets name/id, and it has a public key specifically created for talking to the target (these keys can also be thrown away). Bob sends this message through several hops until the minimum hop count is decremented to one. Each hop remembers only the last hop that the request came from and decrements the hop count. Once the last hop sees a count of 0 it forwards the request to the intended target. The target now encrypts the data with the associated key on the message and responds back through all of the hops until bob gets it. Only bob can read the message and only bob knows he is the last hop.</p>
<p>I am aware that any point in the chain can replace the key with their own so that when the data comes back it gets to peek at it before encrypting it with the original key and then forwarding back towards bob. What can fix this flaw/how can I allow encryption and anonymity?</p>
| 0non-cybersec
| Stackexchange |
By inserting individual arbitration clauses into a soaring number of consumer and employment contracts, companies like American Express devised a way to circumvent the courts and bar people from joining together in class-action lawsuits, realistically the only tool citizens have to fight. | 0non-cybersec
| Reddit |
Is anyone else's letters falling off the back of their Nexus 5?. | 0non-cybersec
| Reddit |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
invalid or unknown key object_lock_configuration. <p>Trying to set Object Locking on an AWS bucket module (which is working fine without object locking configuration) I get the error : </p>
<blockquote>
<p>invalid or unknown key: object_lock_configuration</p>
</blockquote>
<p>The error message makes me think about a syntax error but can't see it, so here is the bucket definition:</p>
<pre><code>resource "aws_s3_bucket" "new_b" {
bucket = "${lower(var.sia)}-${var.bucket_name}-${lower(var.env)}"
acl = "${var.bucket_acl}"
object_lock_configuration {
object_lock_enabled = "${var.locking}"
}
lifecycle_rule {
id = "default"
prefix = ""
enabled = "${var.default_lifecycle}"
expiration {
days = "${var.default_expiry_days}"
}
}
tags {
Name = "${lower(var.sia)}-${var.bucket_name}-${lower(var.env)}"
Sia = "${upper(var.sia)}"
Env = "${upper(var.env)}"
Author = "${var.author}"
}
}
</code></pre>
<p>I am running it with :
Terraform v0.11.13
+ provider.aws v1.52.0
+ provider.template v1.0.0</p>
| 0non-cybersec
| Stackexchange |
Here's a strange loop: The word "indescribable"! If it's indescribable, then how are you using the word indescribable to describe it?. Have any other strange loops that most people may have not noticed? | 0non-cybersec
| Reddit |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
How to upload data to a website on 000webhost?. <p>I had designed my own autoliker script and everything is ready but I am unable to upload Zip file.</p>
<p>I had chosen Free web hosting service "000webhost.com", as my moto is make everything without investment.</p>
<p>I am unable to upload zip file on File Manager and SQL.</p>
<p>Can anybody tell me, How to upload my prepared zip file on database?</p>
| 0non-cybersec
| Stackexchange |
Help me identify this sci-fi series?. Hi! I watched the pilot of a sci-fi show in 2010 or so and never got the name of it!
Here's what I remember:
It took place on a ship and everything was gray and white. I missed the first 10 mins or so but I remember a scne that had some of the new crew getting to know each other in the mess hall. There was a black woman, and long haired woman with a Russian name (not Susana Ivanova) an Indian guy, and an Asian guy. They had a conversation about where they were from, this is paraphrased what they said:
Black Woman: I'm from Kenya.
Indian guy: Oh yeah, the space port.
BW: There's more to Kenya than the space port, you know!
IG: I sure, of course, there's lots of nature preserves and industry, blah blah blah... So what did you do in Kenya?
BW: ... I worked at the space port.
IG and Asian Guy: Aaaah ha ha!
IG to Russian Woman: How about you?
RW: Oh, I am from (russian name) Colony. I ran agricultural systems with my father. (To AG) How about you?
AG: I grew up in New York Plex.
IG: I lived in the Software Belt. Oh my gosh, we are a bunch of walking cliche's!
Later their ship rescues some people from a Planet and some of the refugee people are not what they seem, and that was episode 1. Ring any bells?? | 0non-cybersec
| Reddit |
Create React App 2 - remove html attribute for testing. <p>Is it possible to connect Create React App 2 with this plugin: <a href="https://www.npmjs.com/package/babel-plugin-jsx-remove-data-test-id" rel="nofollow noreferrer">https://www.npmjs.com/package/babel-plugin-jsx-remove-data-test-id</a> without ejecting?
I've created <code>.bablerc</code> file, but it doesn't work.
I want to use custom attribute for bdd testing and remove this attribute on production.</p>
<p>Also, I don't want to create HOC to apply attribute - I have many components and wrap every component is very very difficult.</p>
| 0non-cybersec
| Stackexchange |
Given $\phi:R\to R/N$, why is the image of a proper ideal containing $N$ proper in $R/N$?. <p>Under the map</p>
<p><span class="math-container">$$\phi:R\rightarrow R/N$$</span>
<span class="math-container">$$r\rightarrow r+N$$</span>
where <span class="math-container">$R$</span> is a field and <span class="math-container">$N$</span> is an ideal of <span class="math-container">$R$</span>.
it is a well known facts that the image of an ideal is again an ideal and the inverse image of an ideal is again an ideal(under a homomorphism).</p>
<p>now why would the image under <span class="math-container">$\phi$</span> of a proper non trivial ideal that properly contains <span class="math-container">$N$</span> is again a proper non trivial ideal.</p>
| 0non-cybersec
| Stackexchange |
Keep getting error while trying to mount external HDD with LVM2 format, using Knoppix from live USB, please help. <p>I am computer savvy, but fairly new to Linux, so forgive me if not technical enough.</p>
<p>I have a 3TB external HDD, a Seagate, and it used to be a NAS, but the Ethernet portion failed, so I have plugged it directly into my desktop computer via SATA interface. The desktop is maybe 5 years old, Athlon dual core 4 GB RAM, etc. I set it up to dual boot Windows 7 and a yet to be decided Linux distro.</p>
<p>So I am trying Knoppix, the most current version, and I am running it from a live USB stick:</p>
<ul>
<li>I can see the HDD,</li>
<li>it has several partitions on it,</li>
<li>the main one is LVM2,</li>
<li>but I can't mount it.</li>
</ul>
<p>The drive has data on it that I am trying to access.</p>
<p>I have searched around the internet, including this forum, and found some helpful suggestions regarding LVM, but nothing seems to work. I still can't mount it or access the data on it, as everything I try results in an error. How can I access this HDD?</p>
<p>I can provide any additional info, as required.</p>
<p><strong>update</strong></p>
<pre><code>root@Microknoppix:/home/knoppix# vgchange -ay vg1
/run/lvm/lvmetad.socket: connect failed: No such file or directory
WARNING: Failed to connect to lvmetad. Falling back to internal scanning.
1 logical volume(s) in volume group "vg1" now active
mkdir /mnt/tmp
mount /dev/vg1/lv1 /mnt/tmp
mount: wrong fs type, bad option, bad superblock on /dev/mapper/vg1-lv1, missing codepage or helper program, or other error
In Some cases useful info is found in syslog - try dmesg | tail or so
</code></pre>
<p><em>Update</em>
Ok, thank you @Hauke, i tried using your command and got the same error:</p>
<pre><code>mount: wrong fs type, bad option, bad superblock on /dev/mapper/vg1-lv1,
missing codepage or helper program, or other error
in some cases info is found in syslog - try dmesg | tail or so
</code></pre>
<p>Any ideas?</p>
| 0non-cybersec
| Stackexchange |
The best way to create a scrollable tab in the middle of the screen?. <p><a href="https://i.stack.imgur.com/tPZ7l.jpg" rel="noreferrer"><img src="https://i.stack.imgur.com/tPZ7l.jpg" alt="enter image description here"></a></p>
<p>The mobile app of Twitter has a scrollable tab in the middle of the screen when you are on your profile. The top half of the screen displaying your profile info etc doesn't change when you click on the scrollable tabs mid screen : "Tweets & replies", "Media" etc. I am wondering how one would create this? Having half the screen stay the same and then having tabs which change mid screen... At the moment I have react navigation tabs as my main navigation - so on one of these tabs (the profile tab) I want to create the same concept as the picture..</p>
| 0non-cybersec
| Stackexchange |
Fitting. | 0non-cybersec
| Reddit |
Native Resolution Unavailable for Second Monitor. <p>I am using this belkin switch: <a href="http://www.belkin.com/uk/switch2/" rel="nofollow noreferrer">http://www.belkin.com/uk/switch2/</a></p>
<p>The switch basically connects 1 monitor to 2 different computers so you can easily switch output display between the computers. Right now, I am using it for my laptop (HP DV6500T) which uses 1280x800 resolution. My monitor (Viewsonic VA1912wb) is using the same resolution as my laptop, and I want to switch it to its native resolution (1440x900), but when I try to select it, its not available to pick. How can I use my monitors native resolution?</p>
| 0non-cybersec
| Stackexchange |
Absolute sum of coefficient of (1-x)^b (1+x)^{(n-b)} . <p>Let $f(x)=(1-x)^b (1+x)^{(n-b)}= \sum_{i=0}^n a_ix^i$, where $n$ is a positive
integer and $b$ is a non-negative integer less than $n$. I want to find an
upper bound on $\sum_{i=0}^n |a_i|$ other than the trivial upper bound $2^n$.
Also for $b=0,1,\frac{n}{2}$, it is easy. Is there any integration type of approach
for this problem? </p>
| 0non-cybersec
| Stackexchange |
Sorting range values. <p>I want to sort an array of strings representing numerical ranges like the following:</p>
<pre><code>b = ["0-5", "100-250", "5-25", "50-100", "250-500", "25-50"]
</code></pre>
<p>Using the <code>sort</code> method I get:</p>
<pre><code>b.sort
# => ["0-5", "100-250", "25-50", "250-500", "5-25", "50-100"]
</code></pre>
<p>I want it like this instead:</p>
<pre><code>["0-5, "5-25", "25-50", "50-100", "100-250", "250-500"]
</code></pre>
| 0non-cybersec
| Stackexchange |
Ubuntu And PyCharm. <p>My Pycharm and my Command prompt both won't install apps, such as Pyaudio and other various items, Because I cant sign in. So I downloaded Ubuntu through the Microsoft Store, and got it all set up, and the sudo commands work in it, but i have no idea of how to connect the ubuntu and pycharm together, because the password and username I think I set up in ubuntu are different or not set up at all in Pycharm.</p>
| 0non-cybersec
| Stackexchange |
To the women who scammed me.. I had just finished my exam, and was in deep thought about how it went as I commuted home. While I was waiting for my bus, feeling a bit discouraged and unsure, a old looking women approached me, and asked me for money, because she didn't have enough for her bus fair. Being gullible, and out of my normal state, without much thought, I took out my wallet to give her some money. There were a few red flags, but I went ahead due to my emotional state. After a few minutes, I saw her back, asking others for more money , for the same reason. She scammed me. I am not wealthy, and I am a student. This hurt. My kindness had been taken advantage o | 0non-cybersec
| Reddit |
Is there anything else floating around related to this picture?. | 0non-cybersec
| Reddit |
Best apple pie wanted. Would you share with me your best recipe for an American apple pie?
My flatmate just came back from the States and she is feeling pie-sick... I wanted to make her apple pie but she said "not to bother as it would never be as good as the one they make in the USA". Which equals a challenge on my book.
Would you help me to win? :)
(Please include the crust recipe as well!) | 0non-cybersec
| Reddit |
EXCEPTION: This browser is not supported or 3rd party cookies and data may be disabled. <p>This error occurs when our users "Block third-party cookies and site data". </p>
<p>To replicate the error, go to:</p>
<ol>
<li>Check your Chrome browser "Block third-party cookies and site data" <a href="https://medium.com/@jek.bao.choo/deeptent-troubleshoot-faq-9dbfa468ad88#.7k6hib9lm" rel="noreferrer">reference in this guide</a></li>
<li>Go to <a href="http://www.deeptent.com" rel="noreferrer">https://www.deeptent.com</a></li>
<li>Click SIGN IN</li>
<li>Next you will see a blank screen. And if you open up the browser developer console you will see this error:</li>
</ol>
<blockquote>
<p>We always advise our users to Uncheck the blocking of third-party cookies and site data; however, some users still prefer to block it. </p>
</blockquote>
<ol>
<li><p>One can still sign in to their Gmail with this blocked. Interestingly, why can't our users sign in using the Firebase-Google OAuth provided with their third party cookies & site data blocked?</p></li>
<li><p>We are built with Angular2 and Firebase. Is there no way that the users can still authenticate with third-party cookies and site data blocked?</p></li>
</ol>
| 0non-cybersec
| Stackexchange |
Extract a vector that is in the middle of a matrix equation. <p>So I have the following problem that is giving me a hard time for some reason:</p>
<p>I have a matrix equation of the form $RA(I-\alpha e')$ where </p>
<ul>
<li>$R$ is an $n \times n$ matrix</li>
<li>$A$ is a triangular $n \times n$ matrix</li>
<li>$I$ is the $n \times n$ identity matrix</li>
<li>$\alpha$ is a $n \times 1$ vector and</li>
<li>$e'$ is a $1 \times n$ vector of ones.</li>
</ul>
<p>Clearly this equation is some linear mapping $f(\alpha)$. I am now wondering if (and if yes how) it is possible to rewrite this equation into the form.</p>
<p>$f(\alpha) = X\alpha$?</p>
<p>I have been thinking and trying and researching but I wasn't able to come up with a good answer. </p>
<p>Thank you!
Rob</p>
| 0non-cybersec
| Stackexchange |
How do I change the color scheme in microsoft office 2010. <p>I have a friend that changed the color scheme of his office installation on his laptop and I want to change mine so its black like his also, how do I do this?</p>
<p>If I have to change the Microsoft Office files, I won't be able to do that as this is on my school laptop and I can't access anything on the hdd.</p>
| 0non-cybersec
| Stackexchange |
I've learned from the best.. Scene: Mum, Dad, and I, at party/bonfire thing, sitting outside in a gazebo, attempting to enjoy the relaxing night. Wind is making things rather chilly.
Mum (wrapped in blanket): "It would be rather nice if it wasn't so cold." *sighs* "This wind sucks."
Dad and I, simultaneously: "No, it blows." *high-five* | 0non-cybersec
| Reddit |
Current Date in Silverlight XAML TextBlock. <p>I am coming from Flex where you can do just about anything inside of curly braces. I am trying to get a <code>TextBlock</code> to display today's Date and Time without just coding it in C#. I have tried many different variations of the following with no luck. </p>
<pre><code>TextBlock Text="{Source=Date, Path=Now, StringFormat='dd/MM/yyyy'}"
</code></pre>
<p>I know I could probably just set a property <code>MyDate</code> and bind to that but why can't I bind directly to the <code>DateTime.Now</code> property?</p>
| 0non-cybersec
| Stackexchange |
Me [25M] wants to spend my birthday on my own, wife [25F] says I'm selfish and don't love her, brings it up at every opportunity.. I have a birthday coming up in May and when my wife asked what I would like to do, I can do anything I want she said, I told her all I want is free time that night to play some Xbox and have some Dr. Pepper and pizza. After I told her this she immediately got pissed and started saying stuff like I don't love her, I always want to get away from her, I never want to do anything together, ect. For the last few days she brings it up and belittles me about it at least once a day.
A little background to my current predicament; my wife and I have been married 5 five years and we have a 6 month old daughter.I'm also a stay at home dad currently since I just left the military and she is still active duty army. On the food side she doesn't allow soda in the house and we don't keep stuff like pizza around since we both try to eat pretty healthy.
I asked for alone time on my bday because on the last 6 months I rarely have alone time. If I'm lucky I can get maybe two hours of gaming in a week. I'm also feeling pretty lonely since we live at an overseas duty station so all our friends and family are back home and I have no opportunity to make friends here since I spend all day at home with the baby. All I want is a quiet night away from the responsibility of a baby to play a few hours of games with some friends and eat my favorite food.
My wife says I'm selfish for not choosing to do something with her and my daughter. The thing is I'm with my daughter all day, everyday, and my wife and I spend every weekend together going out doing different things. We travel a lot, always trying new restaurants and activities. After work were always binge watching her favorite shows and movies.
**EDIT 1**: Thank you everyone so much for all the responses on both sides of the issue. I would like to clarify my position on spending time with her on my birthday a bit more. I have absolutely no problem spending the day doing a family activity. All I was asking for was to be able to stay up that night and play games with my friends back home as well.
**EDIT 2**: Well she came home unexpectedly and saw this thread open on my computer. She than chose to cherry pick comments where people disagreed with her and thinks I'm an asshole who made her look bad. She plainly stated she doesn't agree with anyone here and I'm a POS for wanting to have time for myself instead of with her and my daughter. Had a big argument than she stormed out. Her birthday is coming up as well and we had plans to go out but now she says she is cancelling the babysitter and I can go fuck myself( in so many words).
**EDIT 3**: Thanks again everyone for all the comments and advice. We definitely do have our own marital issues, although I never thought of myself as a door mat. A bit of a push over but not a door mat. I know she loves me and wants whats best but I also know she can be super stubborn when it comes to trying to understand things from my point of view. I just wanted her to realize I NEED time for myself for my own sanity. She somehow makes a connection between wanting me time and not loving her. She is an all around good person and provider but that shouldn't mean that how I feel doesn't matter since I'm not working, fat, ugly, whatever reason she throws at me. She has a temper on her that is so quick on the draw its scary sometimes. I put on like it doesn't effect me but it honestly does. We have had our ups and downs and lately I thought we were on an up since we have been working together on some of our marital issues but it sucks when something like this birthday thing can derail it all.
**EDIT 4**: Just woke up to so many great comments. Thank you all again so much for just taking the time to answer. There is definitely a lot more going on on my end than just a simple request for a day off it seems. Like I first said I'm all about working things out so hopefully once she calms down over this whole fiasco, (this is literally her first time using Reddit), we can work out our issues. I'm definitely happy see all the differing opinions on a problem like this though, I feel like this is something a lot of couples go through on some level.
**tl;dr**: Is it a selfish, out of the ordinary request to spend your birthday alone instead of having a party, going out or doing something with your significant other? Has anyone else s spouse reacted like this? | 0non-cybersec
| Reddit |
Lottery Expected Value Question. <p>Background: The Daily 3 game is a daily game, drawn every day except
for Saturday and Sunday. It consists of three sets of balls, each numbered
from $0$ through $8$ ($9$ is omitted due to its visual similarity to
$6$). One ball is drawn from each set giving a $3$-digit winning number.
All numbers must be in the correct order to win. A ticket costs $\$1$. The prize for getting all three numbers correct is $\$500$. </p>
<p>Question: Assuming each possible outcome is equally likely to appear, how
much money, on average, will the Agency receive from each Daily
3 ticket, after paying winners?</p>
<p>I think this is an expected value question. Here is my work so far:
$X$ = Agency's profit. Then
$$E(X)= P(\text{Grand Prize})\cdot(-500 + 1) + P(\text{Losing Ticket})\cdot(1).$$</p>
<p>$P(\text{Grand Prize}) = 1/729.\;$
$P(\text{Losing Ticket}) = 728/729.\;$ So $$E(X) = 1/729 \cdot (-500 + 1) + 728/729 \cdot 1 = .314. $$</p>
<p>Answer: Agency's Profit is $.31$ cents per ticket (this seems too low, I think I did something wrong)</p>
| 0non-cybersec
| Stackexchange |
Efficient solution for grouping same values in a large dataset. <p>At my job I was to develop and implement a solution for the following problem:</p>
<p>Given a dataset of 30M records extract (key, value) tuples from the particular dataset field, group them by key and value storing the number of same values for each key. Write top 5000 most frequent values for each key to a database. Each dataset row contains up to 100 (key, value) tuples in a form of serialized XML.</p>
<p>I came up with the solution like this (using <a href="http://static.springsource.org/spring-batch/" rel="nofollow noreferrer">Spring-Batch</a>):</p>
<p>Batch job steps:</p>
<p><strong>Step 1.</strong> Iterate over the dataset rows and extract (key, value) tuples. Upon getting some fixed number of tuples dump them on disk. Each tuple goes to a file with the name pattern '/chunk-', thus all values for a specified key are stored in one directory. Within one file values are stored sorted.</p>
<p><strong>Step 2.</strong> Iterate over all '' directories and merge their chunk files into one grouping same values. Since the values are stored sorted, it is trivial to merge them for O(n * log k) complexity, where 'n' is the number of values in a chunk file and 'k' is the initial number of chunks.</p>
<p><strong>Step 3.</strong> For each merged file (in other words for each key) sequentially read its values using <a href="http://docs.oracle.com/javase/7/docs/api/java/util/PriorityQueue.html" rel="nofollow noreferrer">PriorityQueue</a> to maintain top 5000 values without loading all the values into memory. Write queue content to the database.</p>
<p>I spent about a week on this task, mainly because I have not worked with Spring-Batch previously and because I tried to make emphasis on scalability that requires accurate implementation of the multi-threading part.</p>
<p><strong>The problem is that my manager consider this task way too easy to spend that much time on it.</strong></p>
<p>And the question is - <em>do you know more efficient solution or may be less efficient that would be easier to implement? And how much time would you need to implement my solution?</em></p>
<p>I am aware about MapReduce-like frameworks, but I can't use them because the application is supposed to be run on a simple PC with 3 cores and 1GB for Java heap.</p>
<p>Thank you in advance!</p>
<p>UPD: I think I did not stated my question clearly. Let me ask in other way:</p>
<p><strong>Given the problem and being the project manager or at least the task reviewer would you accept my solution? And how much time would you dedicate to this task?</strong></p>
| 0non-cybersec
| Stackexchange |
Blake Griffin has his 3rd triple-double of the playoffs and a back to back triple-double. | 0non-cybersec
| Reddit |
Human by Design: "Is Augmentation a Human Right?" (Presented by Deus Ex: Mankind Divided). | 0non-cybersec
| Reddit |
TIL Rio's $12 billion 2016 olympic park is mostly abandoned and off limits to tourism.. | 0non-cybersec
| Reddit |
I've officially ran this pen dry. Ending its run on an Akira sketch.. | 0non-cybersec
| Reddit |
A brief history of SSH and remote access. | 0non-cybersec
| Reddit |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
use hg to synchronize my project between my two computer. <p>I have two computer : the desktop in my company and the portable computer in my home.</p>
<p>Now I want to use the hg to synchronize the project between them using a "USB removable disk".</p>
<p>So I wonder how to implement it?</p>
<p>THe pro in my desktop is : D:\work\mypro.</p>
<p>I use the following command to init it:</p>
<pre><code>hg init
</code></pre>
<p>Then I connect to the USB disk whose volume label is "H",and get a clone using:</p>
<pre><code>cd H:
hg init
hg clone D:\work\mypro mypro-usb
</code></pre>
<p>ANd in my portable computer I use:</p>
<pre><code>cd D:
hg clone H:\mypro-usb mypro-home
</code></pre>
<p>However I do not know how to do if I modify some files(remove or add and modify) in the mypro-home,how to make the mypro-usb changed synchronizely,also I want the mypro in my desktop synchronizely.</p>
<p>How to do it?</p>
<p>---------------The following is added after I get an answer from richj----------------</p>
<p>to richj:</p>
<p>Thanks for your reply.</p>
<p>The following is my practice: Pro-Com is the project(initialized as a repository) in my desktop, Pro-USB is the repository in my USB, the Pro-Home is the repository in my home computer.</p>
<p>When I make some change in the Pro-Com, I use the following command:</p>
<pre><code>hg add
hg push Pro-USB
</code></pre>
<p>Then I change the directory to Pro-USB,using:</p>
<pre><code>hg update
hg push Pro-Home
</code></pre>
<p>In my home computer I run:</p>
<pre><code>hg update
(make some edition)
hg commit
hg push Pro-USB
</code></pre>
<p>Then the repository in the USB is the same as that of my home computer,I can push it to my desktop.</p>
<p>In my opinion,operation between repository can be done just by "hg push" and "hg pull",the other commands like "hg update" "hg import" just work between a working-copy and its repository.</p>
<p>Is my understanding right?</p>
| 0non-cybersec
| Stackexchange |
Reflections in Dubai Miracle Garden. | 0non-cybersec
| Reddit |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.