text
stringlengths
3
1.74M
label
class label
2 classes
source
stringclasses
3 values
Blank Pages (UPDATE). [Here is the first post, in case anyone is interested.](http://www.reddit.com/r/nosleep/comments/zmkyv/blank_pages/) So I spent yesterday rehabilitating myself from the freak-out the night before. I feel slightly childish, even, about it. It could be a coincidence. It could be a method Maria is using to say she found her father. It could be anything, really. But I finally decided that telling Maria’s mother about the phone number would be a good idea. Perhaps she would know better than me. Today at school, I patiently sat behind my teacher’s desk, waiting for Maria’s mother to enter the room and drop her daughter off. I might’ve tried to keep my casual nature, but my nerves were killing me on the inside. I basically felt numb with fear, thinking of the possible outcomes of Maria’s mother finding out about what has happened. Both of their lives could be greatly affected, and all by a string of 10 scribbled digits. Finally, the two arrived. Maria’s mother greeted me with a smile, and I smiled back. I stood up and, maybe a little too hastily, walked over to her. I asked her in a whisper if I could speak to her out in the hallway, and she smoothly agreed. I took a shaky breath and uttered: “Something really strange happened a day ago.” She looked confused and tilted her head to the side, almost sympathetically. “Why, what’s wrong?” I gave her a summary of the story Maria “read” from the blank pages. The whole time my hands couldn’t stop shaking. I half expected her mother to faint from shock, and half expected her to call me out for lying. She did neither. She simply stood there, slightly bowing her head forward, trying to digest what I told her. After she didn’t speak for what seemed an eternity, I said, “Well, there was also this phone number in the book… I. I think it might be Maria’s father’s.” She frowned and stared silently at my trembling, outstretched hand which held a sticky note which I copied the number onto. She didn’t take it. “Are you truly offering me his phone number? Are you truly giving me the number of a man I have not seen for three years?” The calmness in her voice scared me even more. “Is it my fault that he left me, all alone to raise Maria to go off and work on his goddamn freak experiment? I don’t think so. So please don’t make me have to do anything with him.” So she did know where her husband left after all. “Maria is your daughter. And this is her father we’re speaking about here. If you know where he is, why do you choose to say you don’t? And aren’t you at all concerned about what made Maria think like so, let alone where she got the number from?” I could see her tearing up. “Maria’s father is a threat. And it is my decision to keep Maria away from him. So please step out of our lives and don’t meddle.” She then walked away briskly before I could reply. So maybe telling Maria’s mother about this mess made me lose her trust, which is bad. But I had complete responsibility of telling her anything that I, as a teacher, was concerned about. It isn’t my fault that she doesn’t feel the same way. So, the only hopes I have left on finding anything out are on Maria herself. When recess finally came, I told her I needed to talk to her. When we were by the oak tree once more, I grinned and held out the book to her. “Did you miss anything?” She beamed and nodded violently. “So… do you want to read some more stories?” She nodded even harder, clearly excited to be reunited with the book. She grabbed it from my hands and plopped down onto the grass. I felt extremely happy watching her flip the leather cover open with her impatient fingers. She flattened out the blank page and stared at it deeply. I crouched down beside her, equally excited, awaiting another story that might answer my questions or maybe even prove to me that everything is back to normal. “It’s blank.” Maria said, sounding surprised. Blank? Well, clearly it’s blank. What happened to the stories? The fantasies? The imagination? Maria proceeded to flip to the next page. “It’s blank too.” And to the next. And the next. She was flipping pages more frantically, until she finally stopped. I looked over her shoulder and saw that it was the page with the phone number. “This one’s telling me a story.” Strange… “The man walked into the room and closed the door and closed the windows.” Ah, the man! I was making frantic connections but it was better than nothing. “Is it the same man from the other story?” I asked, trying to sound genuinely curious about the actual story, as opposed to its meaning. “I don’t know. Both were wearing blank white masks.” She said, looking up at me. Then she returned to the book. “Then there was a lot of smoke. It filled the room.” She began stroking the blank page with a stubby finger, as if tracing an image of tumbling smoke. “Was there a fire?” Maria shrugged. “Nothing was burning.” I was trying to find some metaphorical connection when Maria began talking freely, without pauses. As if the blank pages revealed the story more clearly. “The girl’s head hurt. She was coughing. She felt woozy. Then, her arm disappeared. It was gone. She didn’t hurt, but she felt scared. She felt the thumping inside of her. *Thump-ah Thump-ah*. And then… her heart fell out of her, right through her arm hole. And it was gone. And there was blood, lots of blood. Blood on her shirt. Blood on her face. Blood on the blank, white floor. Blood on the blank, white walls. It wrote a message on the walls.” My eyes were shut tight, trying to shelter myself from the gruesome story. I felt sorry for Maria, wanting to protect her from whatever shoved this image into her head. All I could do though was pat her on the back and ask her one more question: “What was the message on the walls?” Maria looked into the distance for a moment before taking a pencil out of her pocket and scribbling something on the page she held the notebook open to. And right as the bell rang, she handed me the notebook and ran back in. On the page was scribbled, in the same handwriting as the phone number: Experiment M014 No. This can’t be what this seems to be. If it is, it’s pure cruelty. No, not just cruelty. Sick, twisted, demented cruelty that only a few, unfortunately cursed ones are forced to come across. I refused to believe it. But with every step I took back towards the building, the more it hit me. Maria’s mother didn’t not contact Maria’s father out of inattentiveness, but because he is actually a threat. A threat with a PhD. I plopped into the chair behind my desk, shaken. They taught us how to deal with kids fighting over crayons in teaching school, not about stuff like this. And personally, I am probably not the best person to deal with this. I am easily worried, beaten, and freaked out. But it’s probably too late to fold my arms and ignore the situation. And just when I thought I had enough for the day, my pocket vibrated. I pulled out my phone and saw the glowing screen display a text message from a withheld number. “It’s just an experiment.” Oh god. When will this madness end??
0non-cybersec
Reddit
The Vagina Talk show - A new live educational show in the Los Angeles area that seeks to educate on the vulva, women's sexual needs, and questions you've never had the opportunity to ask before.
0non-cybersec
Reddit
A nostalgic look at what a 13 year old can do with a C64.
0non-cybersec
Reddit
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
How could I restrict users to connecting to MySQL using only their unix username?. <p>I'm working in an environment where I need to ensure that developers only connect to our application's MySQL database using the username of their Unix account. The driver behind this is to have traceability via MySQL general logs from queries run, back to the user running them. Thus far I haven't found any ideal solutions for this, I have some imperfect ones, and I'm hoping to get some better ideas.</p> <p>Developers have access to the credentials used by the application (they can access them by logging into the host). I am working on a solution to restrict access to the credentials while still making them available to the application, but there is still desire to ensure that MySQL logs reflect the real users running queries.</p> <p>Does anyone know of a way that I can restrict <code>mysql -u &lt;user&gt;</code> to force <code>&lt;user&gt;</code> to be the logged unix username? The database is hosed on AWS RDS so I don't have a lot of control over it, but I do have full control over the <code>mysql</code> binary on the connecting machine.</p> <p>I'm happy to add more info, I'm just not sure what is relevant. Please ask questions and I'll update my own.</p> <p>Is there any way to do something like wrap the binary to add logic to restrict the <code>-u</code> switch and call the actually <code>mysql</code> binary?</p>
0non-cybersec
Stackexchange
When you walk between two people that are using sign language to communicate, you are technically interrupting their conversation..
0non-cybersec
Reddit
Tesla plans to invest $5 billion building factory in China.
0non-cybersec
Reddit
How to find ppd&#39;s in printer-driver-escpr?. <p>I am installing an Epson XP-830 printer. Openprinting doesn't list it (it's new), but the -820 seems like a close match. (Epson's own website also gives similar if not identical instructions for both.) See below: <a href="http://www.openprinting.org/printer/Epson/Epson-XP-820_Series" rel="nofollow">http://www.openprinting.org/printer/Epson/Epson-XP-820_Series</a></p> <p>Open's instructions are to use the driver epson-escpr. I already have printer-driver-escpr, which is the binary of epson- for my distro.</p> <p>Questions: - Since I have the "approved" binary, I don't see the need to download the source. Is this reasonable here? - The binary says it contains .ppd's in compressed form. How do I find them? I intend to use CUPS, but need to find that ppd.</p>
0non-cybersec
Stackexchange
How to add custom methods to Spring Data Rest JPA implementation and leverage HATEOS support?. <p>I have a Spring Data Rest Repository controller that utilizes JPA for the query implementation, and I need to add some custom query methods that cannot be done using the standard queryByExample method that JPA supports. I have created an Impl class that has the necessary method, but I cannot get it to be recognized. I saw that I can utilize a standard Spring MVC Controller, but I want to have a unified API, and basically all I really want is to implement my own custom /search methods.</p> <p>Even with the custom controller, the problem is then that the HAL links and other related items are no longer provided. </p> <p>Can the Spring folks spend some time having someone document how to do some of this more advanced stuff? I'm guessing that having to implement your own search methods at times are fairly common, and it would be time well spent to make it clear how to do this.</p>
0non-cybersec
Stackexchange
ASP.Net/C# convert NameValueCollection to IDictionary?. <p>I’m trying to help my son upgrade a web site I built for him last year. He wants to implement Amazon Simple Pay. I’m SO close to getting it, but have an error that I don’t know how to address. It’s an ASP.Net site done in C#. I am an untrained (self-taught) developer, so speak in simple terms, please. ;-)</p> <p>In ASP.Net, it is not legal to have a Form within a Form, and I need to do a Form POST. There is a pretty slick tutorial online that shows how to make this happen. The URL is <a href="http://weblogs.asp.net/hajan/archive/2011/04/20/amazon-simple-pay-in-asp-net.aspx" rel="noreferrer">http://weblogs.asp.net/hajan/archive/2011/04/20/amazon-simple-pay-in-asp-net.aspx</a> if you’re interested in seeing it.</p> <p>The transaction has to be “signed” and Amazon provides a SignatureUtils class to accomplish this. In that class, I’m calling this:</p> <pre><code>public static string signParameters(IDictionary&lt;String, String&gt; parameters, String key, String HttpMethod, String Host, String RequestURI, String algorithm) </code></pre> <p>What’s killing me is the IDictionary parameter. What I have to pass it is this ListParams NameValueCollection that I built with:</p> <pre><code>public System.Collections.Specialized.NameValueCollection ListParams = new System.Collections.Specialized.NameValueCollection(); </code></pre> <p>It’s giving me the error below, because it can’t convert the NameValueCollection to an IDictionary. I tried explicitly converting it, but no joy. How can I solve this?</p> <pre><code>Error: Argument 1: cannot convert from 'System.Collections.Specialized.NameValueCollection' to 'System.Collections.Generic.IDictionary&lt;string,string&gt;' </code></pre>
0non-cybersec
Stackexchange
Today is my 268th day on MFP. 63.6 lbs lost and I can't thank you all enough for being so kind and inspiring me.. Pictures: http://imgur.com/a/bOwbl I've posted progress pics here one other time (I'm way to chicken to actually post in progress pics because I've heard the horror stories). I am not quite to my goal weight yet, but I still wanted to share because yes, I did the work, but this place is a constant inspiration and rock for me. I am amazed constantly at how predominantly positive everyone is when the internet is full of trolly assholes. So thank you everyone. I could have probably done it alone, but I'm glad I didn't have too. Now on to the details about how I have done it and my plans for the future. I won't totally rehash my story, but basically I, like everyone else, started and failed multiple time. My husband and I decided to try and have a baby and I was sitting at 195 at the time. I was running 3-5 miles a day and so confused on why I wasn't losing weight. I am the perfect example of not being able to outrun your diet because I estimate now that I was eating about 3000 calories a day. I kept running until I had some bleeding issues into my pregnancy (sorry TMI) and then I stopped because I was scared to death and also puking 7-10 times a day. I did not gain much throughout my pregnancy due to this and lost what I did gain almost immediately. Blah blah blah, fast forward to 8 months PP and I weigh 193 lbs. I have used MFP on and off since 2013, but I saw that maternal obesity on my chart from my pregnancy and I was appalled and depressed. It wasn't like I didn't know, but seeing it really hit me hard. I have been on Reddit for a while but had never ventured here. I was really impressed when I did at the positivity, support, and resources I found. I got cracking and 9 months later here we are. My plans for the future are to get to my goal weight of 120 and reevaluate from there. I have an M5 on it's way to my house so that I can get cardio in after my kid goes to bed. I have tried repeatedly to do at home workouts and I just never do them. I love cardio though. I have not been able to run since October though because I work until dark and it's too cold to take the wee one outside in the stroller. Maybe once my kid gets older and I can take him with me to the gym I will look into weight lifting because I like the idea of being strong. Thank you again for being an amazing community! Let's all crush our goals for 2017!
0non-cybersec
Reddit
tom Dieck&#39;s universal definition of a tangent space. <p>In page 362 of tom Dieck's <em>Algebraic Topology</em>, the author gives a definition for the tangent space of a premanifold (locally ringed space locally isomorphic to open subset of Euclidean space) which I understand as follows:</p> <p>Let $(X,\mathcal O _X)$ be a premanifold. A <em>tangent space at $p$</em> consists of a pair $(\mathrm T_pX,\jmath)$ satisfying the following data.</p> <ul> <li>$\mathrm T_pX$ is a vector space.</li> <li>For each chart $\bf x$ of $X$ about $p$, $\jmath_\mathbf{x}:\mathrm T_pX\to \mathbb R ^n$ is a linear isomorphism.</li> <li>$\jmath_\mathbf{y}\circ \jmath_{\mathbf{x}}^{-1}=\mathrm d_{\mathbf x p}(\mathbf y\circ \mathbf x^{-1}):\mathbb R ^n \cong \mathbb R^n$.</li> </ul> <p>These properties imply that if $(\mathrm T_pX,\jmath)$ and $(\mathrm T_p^\prime X,\jmath ^\prime)$ are two tangent spaces of $X$ at $p$ then the composite $\jmath_\mathbf{x}^{-1}\circ \jmath_\mathbf{x}^\prime:\mathrm T^\prime_pX\cong \mathrm T_pX$ does not depend on the chart $\mathbf x$. From this the author concludes the tangent space is unique up to unique isomorphism "by the universal property".</p> <p>What are the categories involved and in what precise sense is the tangent space an initial/terminal object?</p>
0non-cybersec
Stackexchange
Port Forwarding Stopped working after I moved. <p>I'm making a node js game and used my router to port forward my IP, ex. <code>192.168.0.10:1000</code>. Recently I moved apartments and my game stopped working on other computers that are on different Wi-Fi connections.</p> <p>I logged into my router today and deleted and remade the virtual ports but nothing changed. </p> <p>The only way I am testing my game is by making a hot spot from my phone and connecting a separate laptop to that internet; when the laptop connected to the hot spot the link I just get "this site can't be reached" and once I disconnect from the hot spot and it joins the house wifi the game works, as it should with localhost.</p> <p>How I set it up:</p> <p>I went to <code>192.168.0.1</code> - logged into with the default admin and password, went under "Firewall" and then under "Virtual Servers / Port Forwarding" and then clicked "add". Entered this info</p> <ul> <li>Description: "Teams"</li> <li>Inbound Port: "1000" to "1000"</li> <li>Format: "Both"</li> <li>Private IP Address: "192.168.0.10"</li> <li>Local Port: "1000" to "1000"</li> </ul> <p>and then finally clicked "Add Virtual Server"</p> <p>How do I fix this?</p>
0non-cybersec
Stackexchange
Finding marginal distribution under change of variable of pdf. <p>Question:</p> <p>Let $X$ and $Y$ be independent random variables, each with probability density function $$f(x) = \lambda e^{−\lambda x} $$for $x &gt; 0$. Let $U = X − Y$ and $V = X + Y$ . Find the joint probability density function $$ f_{U,V} (u, v) $$ of $(U,V)$, describing carefully the region of the $(u, v)$-plane in which $$f_{U,V} (u, v)$$ is non-zero.</p> <p>Find also the marginal probability density functions $$f_U(u)$$ and $$ f_V(v)$$ of U and V , and the conditional probability density function $$f_{U|V} (u|v)$$.</p> <p>I am having trouble finding the marginal distribution.</p> <p>My work so far: Jacobian = 1/2 $$f_{U,V}(u,v) =\frac{\lambda^2}2 exp(-\lambda v)$$ Now I thought then $U$ would go from $-\infty$ to $\infty$ since it can take any of these values? Then $$f_U(u) =\int_{0}^{\infty} \frac{\lambda^2}2 exp( {-\lambda v}) \, dv$$ $$f_U(u) =\int_{-\infty}^{\infty} \frac{\lambda^2}2 exp( {-\lambda v}) \, du$$</p> <p>This is clearly wrong since the second integral doesn't make sense. I think it's to do with my limits and when $f(u,v)$ satisfies the expression I gave it and is zero otherwise?</p> <p>Thanks in advance.</p> <p>Edited typo.</p>
0non-cybersec
Stackexchange
One year ago Riot teased an esports HUD update. A new spectator HUD for LCS and stuff.. [this is what i'm talking about.](http://www.lolesports.com/en_US/articles/previewing-our-new-esports-hud) I wonder if they are still working on it. Reddit gave a huge load of feedback, there were a lot of people who tried to make improvements, several threads with pictures of how it could be even better but we haven't heard anything since the initial teaser. The first iteration they showed had some flaws so i'd love to see an updated version. It's been almost exactly one year since then. The spectator HUD definitely needs improvements so i'm looking forward to a new design up to todays standards.
0non-cybersec
Reddit
Why does Haskell lack a literal Data.Map constructor syntax?. <p>I'm still new to Haskell (learning it on and off). I'm wondering why Haskell doesn't have a literal <code>Data.Map</code> constructor syntax, like the Map/Hash constructor syntax in Clojure or Ruby. Is there a reason? I thought that since Haskell does have a literal constructor syntax for <code>Data.List</code>, there should be one for <code>Data.Map</code>.</p> <p>This question is not meant to be critical at all. I would just like to learn more about Haskell through the answers.</p>
0non-cybersec
Stackexchange
I'm still a bit shaken up. I was involved in a violent mugging this morning.. On the plus side I did make $43 and I think the watch looks really good on me.
0non-cybersec
Reddit
Prevent iPhone from dialing 911. <p>I have a family member who has dementia. Their iPhone was taken away because they kept dialing 911. I gave the family member an iPod Touch, but they really want an iPhone. I took the SIM card out of the iPhone, but discovered that it is still possible to call 911. </p> <p>Is there a way to disable the 911 dialing functionality of the iPhone in the United States?</p>
0non-cybersec
Stackexchange
knock knock ...
0non-cybersec
Reddit
[Advice] How do you make out?. So this post is gonna be kinda dumb/weird but I am completely unaware on how you make out. My girlfriend and I have both never made out before just kissed and I was wondering if someone could write it out and not some vague WikiHow shit like how long do you go for, what do you do with your tongue, all that kinda shit. Sorry if this post is really dumb but we were both kinda wondering what you do lmao
0non-cybersec
Reddit
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
ELI5: Why, when you drink a beer, does the smell of it stay in your lungs, in your breath, in a belch, for so long afterwards compared to other liquids, such as soda or juice.
0non-cybersec
Reddit
How can I use my SanDisk Connect Wireless Flash Drive with my 12&quot; MacBook. <p>I can access the drive on my iPhone, iPad and Android.</p> <p>I am having trouble figuring out how to get it to work with my Mac</p> <p>I am using Yosemite and I've done the latest firmware update on the drive</p>
0non-cybersec
Stackexchange
Compound interest with varying rates : does this have a solution?. <p>From a ninth standard Indian Mathematics textbook (Concise Mathematics ICSE , Selina Publishers)</p> <blockquote> <p>For a certain sum of money , the compound interest for the first, second and third year are <span class="math-container">$1500$</span>, <span class="math-container">$1725$</span> and <span class="math-container">$2070$</span> respectively. Find the rate of interest for the second and third year.</p> </blockquote> <p>The way I would think of this problem : it is clear that the rates of compounding for different years are different. Let us call <span class="math-container">$P$</span> as the initial "principal" and <span class="math-container">$r_1,r_2,r_3$</span> to be the rates of interest for the <span class="math-container">$1^{st},2^{nd}$</span> and <span class="math-container">$3^{rd}$</span> years respectively. We must solve then for <span class="math-container">$r_2$</span> and <span class="math-container">$r_3$</span>.</p> <p>The interest for a certain year, is the amount at the end of that year, minus the amount at the start of that year (therefore, at the end of the previous year).</p> <p>With this in mind , and using the standard formulas , we get : <span class="math-container">\begin{align} P\left(1+\frac{r_1}{100}\right) - P = 1500 \tag{1} \\ P\left(1 + \frac{r_1}{100}\right)\left(1 +\frac{r_2}{100}\right) - P\left(1 + \frac{r_1}{100}\right) = 1725 \tag{2}\\ P\left(1+\frac{r_1}{100}\right)\left(1 + \frac{r_2}{100}\right)\left(1 +\frac{r_3}{100}\right) - P\left (1 + \frac{r_1}{100}\right)\left(1+\frac{r_2}{100} \right) = 2070 \tag{3} \end{align}</span></p> <p>Few simplifications occur : <span class="math-container">\begin{align} Pr_1 = 150000 \\ (1500+P)(r_2) = 172500 \\ (3225 + P)(r_3) = 207000 \end{align}</span></p> <p>(I will expand this to anyone who is unsure how I got these, but essentially it is simplifying <span class="math-container">$(1)$</span>, setting <span class="math-container">$(1)$</span> in <span class="math-container">$(2)$</span>, then <span class="math-container">$(2)$</span> in <span class="math-container">$(3)$</span>).</p> <p>It is now apparent that the answers will not have a unique solution! E.g. if <span class="math-container">$P = 15000$</span>, then <span class="math-container">$r_1 = 10$</span>, <span class="math-container">$r_2 = 115/11$</span> and <span class="math-container">$r_3 = 920/81$</span>. (If I change <span class="math-container">$P$</span>, I change <span class="math-container">$r_2,r_3$</span>).</p> <hr> <p>The book, however, claims that <span class="math-container">$r_2 = 15$</span> and <span class="math-container">$r_3 = 20$</span>. However, I get where these values come from : <span class="math-container">$1725$</span> is <span class="math-container">$15$</span>% of <span class="math-container">$1,500$</span> plus <span class="math-container">$1,500$</span>. On the other hand, <span class="math-container">$2070$</span> is <span class="math-container">$20$</span>% of <span class="math-container">$1725$</span> plus <span class="math-container">$1725$</span>.</p> <p>However, how do they come up with these values ? It seems to do with "having the same rate for consecutive years" (mentioned in the textbook, but NOT EXPLAINED) which I have not been able to get to grips with completely.</p> <blockquote> <p>Precise question : I need an explanation behind how these values of the rates were derived , and whether or not my analysis is correct, and the values of the textbook are wrong.</p> </blockquote>
0non-cybersec
Stackexchange
Simple example of using Fedora alternatives to install old version of make. <p>Can anyone help me using the Fedora alternatives system in order to install an old version of make? I know the actual program is irrelevant, but I need it so I'll use it as my example.</p> <p>I currently have <code>make-3.82</code> installed on my Fedora 14 box, but I need to have 3.81 installed to build the android kernel. I already downloaded the 3.81 source and built it, but now I want to install it alongside 3.82 and be able to switch between them using Fedora alternatives.</p> <p>Now I installed <code>make-3.81</code> from source into <code>/usr/local</code>, how would I use alternatives to achieve my goal? I know I must use the alternatives command, but so far my attempts have failed and I would like a concrete example.</p>
0non-cybersec
Stackexchange
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
Do I still have a chance? Completely overthinking this, not even sure if it's worth jt. Delete
0non-cybersec
Reddit
Is Adobe Flash Player installer redirect due to a malware?. <p>When I go to <a href="http://get.adobe.com/flashplayer/" rel="nofollow">http://get.adobe.com/flashplayer/</a> 'Install Now' will redirect me to their homepage without downloading the update or any explanation. </p> <p>What could be going on? Is some malware redirecting me?</p> <p>(Running Mac 10.8.4 tried both Safari and FF)</p> <p><strong>Note</strong>: I have Ghostery and Adblock installed, tried disabling them. I do not think it's malware as no one seems to have the same symptoms after googling, and I would suspect a malicious redirect among other oddities.</p>
1cybersec
Stackexchange
what is the probability that exactly the same # of tosses will be required for each of the 3 performances?. <p>Consider an experiment in which a fair coin is tossed until a H is obtained for the first time. If this experiment is performed 3x, what is the probability that exactly the same # of tosses will be required for each of the 3 performances?</p> <p>Ok so I can see that the probability of having: 3 H's on the first toss = (1/2)^3 3 H's on the second toss = T H 3 times in a row = (1/2*1/2)^3=(1/4)^3 3 H's on the third toss = (1/8)^3</p> <p>but am unsure on how to continue..</p>
0non-cybersec
Stackexchange
A sex dream is basically your brain creating porn on autopilot..
0non-cybersec
Reddit
$\mathbb{Z}_2$-cohomology of oriented infinite Grassmannian. <p>I know $H^*(G_n(\mathbb{R}^{\infty});\mathbb{Z}_2)=\mathbb{Z}_2[w_1,...,w_n]$ where $G_n(\mathbb{R}^{\infty})$ is the Grassmannian manifold of all $n$-planes in $\mathbb{R}^{\infty}$, $w_i$ is the i-th Stiefel-Whitney class for the universal bundle $\gamma^n$. </p> <p>I would appreciate it if anyone can tell me what is $H^*(\tilde{G_n}(\mathbb{R}^{\infty});\mathbb{Z}_2)$, where $\tilde{G_n}(\mathbb{R}^{\infty})$ is the oriented Grassmannian, and most preferably provide me a reference or a way to infer this from the knowledge of $H^*(G_n(\mathbb{R}^{\infty});\mathbb{Z}_2)$.</p>
0non-cybersec
Stackexchange
Roast me, i think i am pretty hot. Kill My Ego.
0non-cybersec
Reddit
Upgrade Mysql 5.0.26 to the latest version?. <p>Ok, I have tried to browse the web but I am not sure how to do this. My server is a production server and I want a smooth upgrade, is this possible? Could I just download the latest version of mysql and install it or how should I do?</p> <p>One thing for sure, I know that I need to backup all databases and users...what then?</p>
0non-cybersec
Stackexchange
Is there any way to avoid re-buffering on seeking backwards on YouTube?. <p>When I seek back, say, a minute in a YouTube video, the player begins to buffer the video again. Is there any way to avoid this, by means of addons or userscripts and make it just keep the buffered content like it earlier used to?</p>
0non-cybersec
Stackexchange
Fastest leveling class Legion (completely new account). Which class is set to level up the fastest till level 110 with a brand new account? Now fancy items no nothing. Just a new level 1 toon. With regard to killspeed and survivability (maybe also how in-demand the class ist, with regard to dungeon queues).
0non-cybersec
Reddit
Why doesn&#39;t my process terminate when Task has unhandled exception?. <p>I am building a Windows Service with .NET 4.0.</p> <p>I have various unhandled exceptions thrown in Tasks, but they do not terminate my process as the MSDN documentation states (<a href="http://msdn.microsoft.com/en-us/library/ff963549.aspx" rel="noreferrer">Parallel Tasks</a> - see Unobserved Task Exceptions).</p> <blockquote> <p>"If you don't give a faulted task the opportunity to propagate its exceptions (for example, by calling the Wait method), the runtime will escalate the task's unobserved exceptions according to the current .NET exception policy when the task is garbage-collected."</p> </blockquote> <p>It behaves like this even when I use the most simple invokation of a task:</p> <pre><code>Task.Factory.StartNew(() =&gt; { throw new Exception(); } </code></pre> <p>The service keeps on running fine when that is called.</p> <p>According to the docs, the finalizer of the Task will rethrow the exception once the Task is GC'd but this does not appear to happen. MSDN states repeatedly that normal ".NET exception policy" results in process termination.</p> <p>Why doesn't this terminate my app? The only thing I can think is there is somehow a reference to the task held somewhere (is it the lambda??)</p>
0non-cybersec
Stackexchange
Cutest pitbull pup ever!.
0non-cybersec
Reddit
Question about credit card interest - "Balance subject to Interest Rate". I was under the impression that "Balance subject to Interest Rate" is basically any previous balance + any cash advances; purchases made within that billing cycle shouldn't count, right? My bank statement claims a previous balance of $8, and I made about $150 of purchases in that month - but the "Balance subject to Interest Rate" shows about $100 - so it sounds like those purchases contributed to that balance. Does that mean any purchases I make, while running a balance immediately begin accruing interest? Thanks for any light you can shed on the situation. Edit: Actually, sounds like I figured it out while writing this post - but am I right? You only get the "end of billing cycle" grace period if you have no balance?
0non-cybersec
Reddit
A Wild Encounter.
0non-cybersec
Reddit
Simple selector and nested selector in JSS. <p>I'm currently training on ReactJS. I'm using material-ui and JSS (totally new for me).</p> <p>I don't understand how can I simply select my H6 element or my H6 children elements (dangerStyle).</p> <p>Any idea ? </p> <p>Thanks !</p> <p>myJss.js</p> <pre><code>const myJss = theme =&gt; ({ textCenter : { textAlign:'center' }, dangerStyle: { fontWeight:'normal', color:"#FF0000" }, h6: { color:"#00FF00", "&amp;.dangerStyle" : { fontWeight:'bold', } } }); export default myJss; </code></pre> <p>app.js</p> <pre><code>import React, { Component } from 'react' import { withStyles } from "@material-ui/core/styles"; import Danger from 'components/danger' import myJss from 'assets/jss/myJss.js'; class App extends Component { constructor (props) { super(props) } render () { const { classes } = this.props; return ( &lt;div&gt; APP &lt;h6&gt; &lt;Danger&gt;Error occured&lt;/Danger&gt; &lt;/h6&gt; &lt;/div&gt; ) } } export default withStyles(myJss)(App) </code></pre> <p>danger.js</p> <pre><code>import React from "react"; import { makeStyles } from "@material-ui/core/styles"; import myJss from 'assets/jss/myJss.js'; const useStyles = makeStyles(myJss); export default function Danger(props) { const { children } = props; const classes = useStyles(); return ( &lt;div className={classes.dangerStyle}&gt; {children} &lt;/div&gt; ); } </code></pre>
0non-cybersec
Stackexchange
I feel oddly satisfied when I kill a bat in Minecraft..
0non-cybersec
Reddit
What is the best, compact camera to take with you while documenting your travels?. Hello fellow filmmakers and travelers of reddit. This summer I will be traveling through central America. I was wondering, what would be the best kind of camera to document my travels/interview the locals? Preferably something on the smaller side, with a large zoom range, that you could plug a mic into if needed. New to the filming world, so any advice is appreciated!
0non-cybersec
Reddit
Equivalent definitions of Gaussian curvature. <p>I'm trying to find out more about geometry of surfaces and, in particular, Gaussian curvature. I understand that it can be defined in terms of the principal curvatures (extrinsically) and also intrinsically, and that the result that it can be equivalently defined in these two ways was a significant result. Does anyone know where I can find a nice, clear proof of the equivalence of these definitions and perhaps some historical/background information on their importance? Thanks in advance.</p>
0non-cybersec
Stackexchange
People go from smoking to vaping in hopes to stop their addiction but in reality they are just replacing one bad habit with another bad habit..
0non-cybersec
Reddit
Is there a way to have four possible outcomes without repeating the two conditions?. <p>In a generic sense, my question goes something like this:</p> <pre class="lang-cs prettyprint-override"><code>if (p) { if (q) { a(); } else { b(); } } else { if (q) { c(); } else { d(); } } </code></pre> <p>There are four outcomes <code>a()</code>, <code>b()</code>, <code>c()</code>, and <code>d()</code> depending on the conditions <code>p</code> and <code>q</code>. Even though <code>p</code> and <code>q</code> will only be evaluated once in any case, <code>q</code> is still repeated in the code. I'm wondering if there's a way to avoid this redundancy.</p> <p>In my specific case, I'm in a situation where one outcome is actually nothing happening, and another outcome is an additional thing happening. So it looks like this:</p> <pre class="lang-cs prettyprint-override"><code>if (p) { a(); if (q) { b(); } } else { if (q) { c(); } } </code></pre> <p>Is there any way to write this out so that <code>p</code> and <code>q</code> each only show up once? I'm usually good at rearranging things to avoid redundancy but I don't know if it's possible in this case. If it's not possible then is there some recommended way to phrase logical structure like this?</p> <p>Here I'm using C# but I'll accept answers in any language.</p> <p>EDIT: My question is certainly similar to <a href="https://softwareengineering.stackexchange.com/questions/102757/how-to-turn-truth-table-into-smallest-possible-if-else-block">How to turn truth table into smallest possible if / else block</a> and I find its answers helpful, but my question looks to me to differ in the sense that I'm specifically asking how to avoid the redundant condition.</p>
0non-cybersec
Stackexchange
Segmentation fault problem (C). <p>I have a struct named Game with an array of levels, defined like this:</p> <pre><code>typedef struct { Level levels[x]; } Game; </code></pre> <p>When I compile the code, if x is 1, 2 or 3, the program runs normally. If it's any other value (4, for instance), I get a segmentation fault. I'm not accessing the array anywhere. Main is something like this at the moment (commented everything except the initialization):</p> <pre><code>int main (...) { Game g; return 0; } </code></pre> <p>Any clue of what this might be?</p> <p>Thanks in advance.</p>
0non-cybersec
Stackexchange
Get error &quot;ksh.exe has crashed&quot; when run the command in msys open with admin. <p>When I open msys without admin option on windows server 2008/2012 and run "jbossctl status" command it gives me correct output. But, when I run the same command in msys opened with admin option it gives me error "ksh.exe has crashed" Can anyone suggest why it is causing and what should I do to prevent this?</p> <p>Thanks</p>
0non-cybersec
Stackexchange
If $f$ is analytic, prove that $\overline{f(\overline{z})}$ is also analytic. <p>Let $f$ be an analytic function in an open set $U \subseteq \mathbb{C}$. Let $V=\{z\in\mathbb C:\overline z\in U\}$. Define $g$ on $V$ by $g(z)=\overline{f(\overline{z})}$. Show that $g$ is analytic on $V$. Note: It is not sufficient to show that $g$ is holomorphic because we haven't yet proved that holomorphic implies analytic.</p> <hr> <p>Here is my attempted proof:</p> <p>First, we will simply state what it means that $f$ is analytic on $U$. Applying the definition, we know that since $f$ is analytic on $U$, we know that for every $z_0 \in U$, there exists $r&gt;0$ and a sequence of complex numbers $\left(a_n\right)_{n=0}^\infty$ such that $f(z)=\sum_{n=0}^\infty a_n\left(z-z_0\right)^n$ on the disc $D(z_0,r)$.</p> <p>Next, note by definition of $V$ that for all $v \in V$, we have $\overline{v} \in U$. Therefore since $f$ is analytic on $U$, then for all $v \in V$ there exists $r&gt;0$ and a sequence of complex numbers $\left(a_n\right)_{n=0}^\infty$ such that $f(u)=\sum_{n=0}^\infty a_n\left(u-\overline{v}\right)^n$ for all $u \in D(\overline{v},r)$.</p> <p><strong>Edit</strong> (Following Daniel Fischer's suggestion) Now if we realize that if $u \in D(\overline{v},r)$, then we see $u=\overline{w}$ for some $w \in D(v,r) \subseteq V$.</p> <p>Therefore, putting everything together, we have that for all $v \in V$, there exists $r&gt;0$ and a sequence of complex numbers $\left(a_n\right)_{n=0}^\infty$ such that $f(w)=\sum_{n=0}^\infty \overline{a_n}\left(w-v\right)^n$ for all $w \in D(v,r)\subseteq V$ (is this last part correct?).</p> <p>I feel like I am getting close; I just need to obtain $g$ from this somehow. But I am losing direction here... Am I on the right track? Thanks!</p>
0non-cybersec
Stackexchange
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
'Hipster Angel', 8 x 10, mixed media.
0non-cybersec
Reddit
Three persons entering a railway carriage where there are 5 vacant seats. In how many ways can they seat themselves?. <p>In the question, three persons entering a railway carriage where there are <span class="math-container">$5$</span> vacant<br> seats. In how many ways can they seat themselves? </p> <p>Why are we multiplying <span class="math-container">$5\times 4\times 3$</span>? Ive read the fundamental principle of counting but still I cant apply much of it in this question.</p>
0non-cybersec
Stackexchange
How to fix error &quot;SQL Server Agent stopped automatically&quot;?. <p>I'm using SQL Server 2014 and having a problem.</p> <p>In <strong>Task Manager</strong>, on <strong>Services</strong> tab, I found <strong>SQLAgent$VILLBE_SQLSERVER</strong> (VILLBE is my computer name), right click and Start.</p> <p>It started and... stopped after 1 second.</p> <p>Then, I open <strong>services.msc</strong>, and <strong>Start</strong> the <strong>SQL Server Agent (VILLBE_SQLSERVER)</strong>. It's working.</p> <p>After 30 seconds, it stopped automatically. When I click <strong>Start</strong> again, it said that:</p> <pre><code>The SQL Server Agent (VILLBE_SQLSERVER) service on Local Computer started and then stopped. Some services stop automatically if they are not in use by other services or programs. </code></pre> <p>Last, I right click <strong>SQL Server Agent</strong>, choose <strong>Properties</strong>, set <strong>Start up type</strong> is <strong>Automatic</strong> and reboot my PC.</p> <p>When reboot is done, <strong>SQL Server Agent</strong> still is <strong>stopped</strong></p> <p>Some other services: </p> <pre><code>SQL Server Browser - Running - Automatic (start up) SQL Server (SQLEXPRESS) - Cannot start within warning: **Windows could not start the SQL Server (SQLEXPRESS) on Local Computer....error code 17058.** </code></pre> <p>Can you give me anyway to fix the problem?</p> <p>Thank you! </p>
0non-cybersec
Stackexchange
Simple Handshake with Monocypher (review before release). _Edit: The latest version of the protocol can be found on [GitHub](https://github.com/LoupVaillant/Monocypher-Handshake/blob/master/DESIGN.md). I will keep this version up to date, but make no guarantee._ Here's my new interactive Handshake, protocol, made for Monocypher. It aims to be simple, and to minimise dependencies (it uses only X25519, Chacha20, and Poly105, two of which are used in Monocypher's AEAD). I've attempted an [informal security analysis](https://github.com/LoupVaillant/Monocypher-Handshake/blob/master/SECURITY_ANALYSIS.md), if anyone is interested in checking it out. In the mean time, here are the specifications below. I'll only have two questions: - Could someone actually implement this spec _without_ looking at my code? - Does it look secure? What are the scary parts? --- _Edit: Below is a version modified thanks to the feedback I got here._ Sender and recipient have the following X25519 key pairs (private half in lower case, public half in upper case): - __(es, ES)__ The sender's ephemeral key. - __(ls, LS)__ The sender's long term key. - __(er, ER)__ The recipient's ephemeral key. - __(lr, LR)__ The recipient's long term key. Those key pairs are used to derive the following shared secrets: - __<ee>__ = X25519(es, ER) = X25519(er, ES) - __<el>__ = X25519(es, LR) = X25519(lr, ES) - __<le>__ = X25519(ls, ER) = X25519(er, LS) Those shared secrets are hashed to derive the following keys: - __CK1:__ HChacha20(HChacha20(zero, <ee>[0:15]), <ee>[16:31]) - __CK2:__ HChacha20(HChacha20(CK1 , <el>[0:15]), <el>[16:31]) - __CK3:__ HChacha20(HChacha20(CK2 , <le>[0:15]), <le>[16:31]) - __AK2:__ Chacha20_stream(K2)[ 0:31] - __EK2:__ Chacha20_stream(K2)[32:63] - __AK3:__ Chacha20_stream(K3)[ 0:31] - __EK3:__ Chacha20_stream(K3)[32:63] _("[x:y]" denotes a range; the streams' nonce and counter are both zero)_ The messages contain the following (Es, Er, and Ls denote the public half of the key pairs, and `||` denotes concatenation): XS = LS XOR EK2 request = ES response = XR || Poly1305(AK2, LR || ES || ER) confirmation = XS || Poly1305(AK3, LR || ES || ER || XS) _Note: We can't reall encrypt <el>, it would hurt the identity hiding properties of the protocol. If we need to make ephemeral public keys indistinguishable from random, we'll have to use [Elligator](https://elligator.cr.yp.to/).)_ The handshake proceeds as follows: 1. The sender sends the _request_ to the recipient. 2. The recipient receives the request, then sends its _response_. 3. The sender authenticates the response, and aborts if it fails. 4. The sender sends its _confirmation_ to the recipient. 5. The recipient decrypts & records the sender's transmitted public key. 6. The recipient authenticates the confirmation, and aborts if it fails. 7. The protocol is complete. The session key is _EK3_.
1cybersec
Reddit
iOS simulator crash in iOS 8.2 and Xcode 6.2 with &quot;Failed to lookup the process ID of #ID after successful launch.&quot;. <p>iOS simulator crash in iOS 8.2 and Xcode 6.2 with an error below</p> <p>"Failed to lookup the process ID of xxx.xxx.xxx after successful launch. Perhaps it crashed after launch. No such process".</p> <p>And I cannot try to simulate my app.</p> <p>I uploaded the image of error.</p> <p><a href="http://imgur.com/2ayGys3">http://imgur.com/2ayGys3</a></p> <p>It works normally when i use iOS 8.1 as a simulator. Regardless of the types of devices and types of projects, it will crash in iOS 8.2 simulator.</p> <p>The iOS simulator itself stands but has nothing on the screen.</p> <p>A thing I care is that I changed my old macbook to new one and copy project files of Xcode from old to new.</p> <p>Do you have any idea of this?..</p>
0non-cybersec
Stackexchange
Is there a non-constant smooth function mapping $\mathbb{R}$ into $\mathbb{Q}$. <p>I cannot think of a non-constant smooth function which maps all real numbers into rational numbers. </p> <p>Can anyone give a simple example ? The simpler, the better !</p>
0non-cybersec
Stackexchange
[OC][ART] The wrath of a dragon.
0non-cybersec
Reddit
Subharmonic function equivalent non-negative laplacian. <p>I want to ask for a proof that if $v(x,y)$ is $C^2$ and is subharmonic [here, define as satisfyingthen $\Delta v \geq 0$ where $\Delta v = \frac{\partial^2 v}{\partial x^2} + \frac{\partial^2 v}{\partial y^2}$ is the Laplacian operator. I think it has something to do with geometric interpretation of $\Delta v$ but I fail to see what kind of interpretation it can be.</p>
0non-cybersec
Stackexchange
Professional RC race (x-post r/BeAmazed).
0non-cybersec
Reddit
How to find Characteristic of quotient ring of polynomial.. <p>How to find the characteristic if degree of f(x) is n? $$\mathrm{char}\Bigl(\mathbb{Z}[x]/\langle f(x)\rangle\Bigr)$$</p>
0non-cybersec
Stackexchange
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
UILabel have a weird grey top line/border in iOS7, how can I remove it?. <p>I have a basic UILabel that I use in a <code>UITableViewCell</code>. I'm experiencing some strange behaviour, on some cells (not all) the UILabel gets a grey top border, see picture below. And I'm not sure how to fix it. </p> <p><img src="https://i.stack.imgur.com/L5Re4.png" alt="enter image description here"> </p> <p>I create my UILabel like this:</p> <pre><code>if (self.postText == nil) { CGRect postTextRect = CGRectMake(self.profileImage.frame.origin.x + self.profileImage.frame.size.width + 5, self.username.frame.origin.y + self.username.frame.size.height, frame.size.width - self.profileImage.frame.size.width - self.profileImage.frame.origin.y -10, self.frame.size.height - self.username.frame.size.height - self.username.frame.origin.y + 40); self.postText = [[UILabel alloc] initWithFrame:postTextRect]; self.postText.backgroundColor = [UIColor whiteColor]; self.postText.textColor = [UIColor darkGrayColor]; self.postText.userInteractionEnabled = NO; self.postText.numberOfLines = 0; [self.containerView addSubview:self.postText]; } </code></pre> <p>Any ideas on how to fix this?</p> <p><strong>Update</strong> </p> <p>My <code>cellForRowAtIndexPath</code> looks like this: </p> <pre><code>- (id)tableView:(UITableView *)tableView cellForRowAtIndexPath:(NSIndexPath *)indexPath { [...] static NSString *postCellIdentifier = @"PostCell"; PostCell *cell = [tableView dequeueReusableCellWithIdentifier:postCellIdentifier]; if (cell == nil) { cell = [[PostCell alloc] initWithStyle:UITableViewCellStyleDefault reuseIdentifier:postCellIdentifier]; } [self configureCell:cell atIndexPath:indexPath forPost:cellPost]; return cell; } </code></pre> <p>And the relevant par of <code>configureCell</code> like this:</p> <pre><code>- (void)configureCell:(PostCell *)cell atIndexPath:(NSIndexPath *)indexPath forPost:(Post *)post { [...] cell.username.text = cellUser.username; cell.selectionStyle = UITableViewCellSelectionStyleNone; CGSize maximumLabelSize = CGSizeMake(cell.postText.frame.size.width, FLT_MAX); CGSize expectedLabelSize = [cell.postText.text sizeWithFont:cell.postText.font constrainedToSize:maximumLabelSize lineBreakMode:NSLineBreakByWordWrapping]; CGRect newFrame = cell.postText.frame; newFrame.size.height = expectedLabelSize.height; cell.postText.frame = newFrame; CGRect containerRect = CGRectMake(5, 5, cell.containerView.frame.size.width, cell.postText.frame.size.height + cell.username.frame.origin.y + cell.username.frame.size.height + 10); if (containerRect.size.height &lt; 65) { containerRect.size.height = 65; } cell.containerView.frame = containerRect; [...] } </code></pre>
0non-cybersec
Stackexchange
Meromorphic Function on Extended Plane. <p>How do I prove that every meromorphic function on the extended plane is a rational function?</p>
0non-cybersec
Stackexchange
In "Lord of the Rings: The Fellow Ship of the Ring" (2001) in this "one does not simply walk into Mordor" scene, whenever Sean Bean looks down it's because he is reading the script on his lap. They had written that speech the night prior to shooting and he didn't have to memorize before shooting..
0non-cybersec
Reddit
What's worse, mom dressing the kid in this, or dad?.
0non-cybersec
Reddit
Mandala/Geometric sleeve forearm progress - Timo Sanders - 5th Estate Tattoo - Gilbert, AZ..
0non-cybersec
Reddit
Can some one explain what a video file format is?. <blockquote> <p><strong>Possible Duplicate:</strong><br> <a href="https://superuser.com/questions/232241/what-is-a-file-format">What is a &ldquo;file format&rdquo;?</a> </p> </blockquote> <p>Can someone explain what a video file format is in laymans terms?</p>
0non-cybersec
Stackexchange
What is your opinion on the quality of Common Projects? Worth it for the price point? How versatile are they?. edit: commont projects achilles low. thinking about buying a pair and want honest opinions
0non-cybersec
Reddit
Real Austrian Kaesespaetzle.
0non-cybersec
Reddit
Our gnome home made from a tree stump..
0non-cybersec
Reddit
Navigation Architecture Component - Unable to navigate to fragment from onResume. <p>I'm testing this new library out and want to navigate to a login fragment if the user isn't signed in. This check is done in in a base fragment like:</p> <pre><code>abstract class SignedInFragment : Fragment() { override fun onResume() { super.onResume() if (FirebaseAuth.getInstance().currentUser == null) { NavHostFragment.findNavController(this /* Fragment */) .navigate(R.id.action_login) } } </code></pre> <p>}</p> <p>But this just ends up in a RuntimeException saying FragmentManager is already executing transactions:</p> <pre><code> java.lang.RuntimeException: Unable to resume activity {me.hammarstrom.loco/me.hammarstrom.loco.MainActivity}: java.lang.IllegalStateException: FragmentManager is already executing transactions at android.app.ActivityThread.performResumeActivity(ActivityThread.java:3645) at android.app.ActivityThread.handleResumeActivity(ActivityThread.java:3685) at android.app.ActivityThread.handleLaunchActivity(ActivityThread.java:2898) at android.app.ActivityThread.-wrap11(Unknown Source:0) at android.app.ActivityThread$H.handleMessage(ActivityThread.java:1593) at android.os.Handler.dispatchMessage(Handler.java:105) at android.os.Looper.loop(Looper.java:164) at android.app.ActivityThread.main(ActivityThread.java:6541) at java.lang.reflect.Method.invoke(Native Method) at com.android.internal.os.Zygote$MethodAndArgsCaller.run(Zygote.java:240) at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:767) </code></pre> <p>The navigation graph looks as following:</p> <pre><code>&lt;?xml version="1.0" encoding="utf-8"?&gt; &lt;navigation xmlns:app="http://schemas.android.com/apk/res-auto" xmlns:android="http://schemas.android.com/apk/res/android" xmlns:tools="http://schemas.android.com/tools" app:startDestination="@id/mainFragment"&gt; &lt;fragment android:id="@+id/loginFragment" android:name="me.hammarstrom.loco.ui.login.LoginFragment" android:label="LoginFragment" &gt; &lt;action android:id="@+id/action_loginFragment_to_signedInFragment" app:destination="@id/signedInFragment" /&gt; &lt;/fragment&gt; &lt;fragment android:id="@+id/signedInFragment" android:name="me.hammarstrom.loco.ui.common.SignedInFragment" android:label="SignedInFragment" /&gt; &lt;fragment android:id="@+id/mainFragment" android:name="me.hammarstrom.loco.ui.main.MainFragment" android:label="MainFragment" /&gt; &lt;action android:id="@+id/action_login" app:destination="@id/loginFragment" /&gt; </code></pre> <p></p> <p>Should this kind of navigation be done in some other way? Am I missing something?</p>
0non-cybersec
Stackexchange
Meal Prep Variety?. Hey guys, i'm gearing up to start doing some serious meal prep soon for a couple of reasons: 1) I need to drop a lot of weight and 2) I'm a CPA about to start a 3.5 month busy season and want to not have to think about what I'm eating or fixing during the week, I want it all done and planned out ahead of time in my spare free time. The one thing I don't think I can do is eat the same thing for dinner for 5-6 nights a week. I already eat the same things for breakfast/lunch which is why dinner is my favorite meal, I can have something different every night. Is it feasible to prep multiple/different dinners for a week ahead of time or will I be dooming myself to spending all of Sunday prepping for the week? Anyone do this and have suggestions for certain particularly easy meal or meals with shared ingredients? Thanks! &#x200B;
0non-cybersec
Reddit
Frameworks needed for secure data collaboration – Nick Halstead – Medium.
1cybersec
Reddit
Grace Slick (NSFW).
0non-cybersec
Reddit
Unexpected journey.
0non-cybersec
Reddit
I see your statue from Italy and raise you for this one from my trip to Japan last month.
0non-cybersec
Reddit
Advice Wanted: My [30sF] husband's [40sM] gender transformation obsession is ruining our relationship. Hi All. Throwaway, obviously. Background: I've \[32F\] been married to my husband \[40M\] for 4 years, together 5. We have two little kids together. This is a pretty long story, but I will try to sum it up without leaving out too many important details. When my husband and I first started dating, I was coming out of a divorce. We ended up taking a cross country trip together very early in our relationship. It was fantastic! Except for the part where I discovered he was still talking to other girls. I was heartbroken, but we had a chat about it... and that was the end of it. Except for the part where I'm not a very good partner and I developed trust issues/snooping behaviors because of it. So after a few months, I was using his computer for work when his AIM list popped up. I scrolled through it, because hey it was there, not expecting to find much. It was extensive... but whatever. Then I discovered a SN that I knew. It was one of my friends that I had met on the same website that I met hubby on. It was a guy. Wait... was he checking up on ME?! Soo after panicking a bit, I reached out to my friend and asked him if he knew \*insert SN here\*. And he told me yes, he knew that SN. That SN had messaged him some really weird stuff. Well, now I HAD to know wtf was going on. What is he messaging my friend about? My friend told me everything and then we actually set it up and caught hubby in the act. He had been messaging people under a fake female profile and talking about gender transformation. Like actually sending pictures with a whole complete backstory and everything. WTF???? A big fight/conversation ensues. I'm not okay with this, because he's basically cat fishing people and using other people's information. But eventually... we get past everything. I'm feeling like a good partner, trying to be understanding that everybody has their kinks and I'm promised that it won't happen again. I'm given excuses: it started out as an experiment and he did it while he was lonely/bored. I'm not completely happy with the relationship. Then I get pregnant. So I marry him, because that's what was expected and I needed the health insurance. For a long time, everything was really good! Or was it because I was so happy with a distraction and he was getting better at hiding it? I'm honestly not too sure. We ended up having another baby and things were going smoothly, or so I thought. Guys. I caught him doing it again. He has done this repeatedly throughout the time we've been together, but this most recent discovery is really bothering me. This time I was smart and I didn't tell him HOW I knew. I just told him I knew what he was doing. And we had a HUGE fight about it. He demanded that I tell him how I knew and would not let up. I outright refused. We fought some more. He tried to make ME seem like the bad person. He seemed sad, like a puppy dog. Then for a couple days nothing happened. Christmas came and I suddenly got the new computer that I've wanted for years. And we haven't spoken of it since. I created a fake profile to monitor his activity and guess who was logged on just 3 days ago? Yup. I'm not really sure what I'm asking of you guys. Support? Advice? Has this happened to any of you? Is this \*just a kink\*? Are straight, married guys really into gender transformation? Like, obsessed with it that they order gender bender eBooks on Amazon and create fake profiles of girls that have "transformed" to chat with other people about? It this just a fantasy, curiosity or is he gay? I've asked him this before and he can't explain it. He's curious about it all, but no, he's NOT gay. He doesn't want to be a female but he's curious as to what it's like. Have I mentioned that he lies a lot and is charming? Maybe I could handle the eBooks & blogs about it... but the cat fishing thing is NOT cool. Especially as an adult. At the beginning of our relationship, we had sex all the time. Our drives matched perfectly and I was so happy (probably part of the reason I stayed, TBH). But we didn't have sex for 9 months while I was pregnant with my daughter. Kind of understandable, I was sorta sick some of the times. But she's 8 months old now and we've only had sex maybe... 5 times??? I'm in my 30s, my libido is through the roof. I know he's older & has health issues (asthma, Crohn's)... but is it me or is it him??? I bounce back from pregnancy like a champ, I'm 5'9" and 140 lbs, I take very good care of myself. I get compliments all the time. I really don't think it's my physical appearance that's bothering him. It can't be the baby. She sleeps through the night and I do 95% of the work involved with her. I put on things that are sexy and I try so hard. I just don't know where to go from here and that's why I'm turning to you guys. I'm at the point where I'm considering having affair to get what I'm missing from this relationship. At this point, it's not just the physical part. He's not there emotionally either. He's completely unhelpful and oblivious - just in his own world most of the time. And honestly, it's hard to be with someone who tells you one thing and then completely does another. I've tried to be open with him and communicate what I need... but it'll just always come back to this. I know, I know... I should go to counseling. But what are they \*really\* going to tell me to do? I don't know that I want to be with him anymore but leaving is too difficult at this time. (I'm a SAHM with no income or family nearby). All I wanted out of life is a family, but this situation is not what I had in mind. :( &#x200B; &#x200B; tl;dr My husband seems to be obsessed with gender transformation and is talking to people online as a female. This is ruining our relationship and I don't know what to do.
0non-cybersec
Reddit
Using Mac mini (late 2014) with macOSCatalina ver. 10.15.4 and a 2 TB HD for Time Machine Backup. <p>I'm trying to restore my contacts using Time Machine. I open Contacts, Enter Time Machine but all the dates on the right side are greyed out and the up and down arrows next to the current time machine page are also greyed out. The only available options are the CANCEL button at the bottom or RED close button on the 'Today' page. I have several months of data stored on this TM Disk but this is the first time I've tried to recall any data. Why can't I go back in time?</p>
0non-cybersec
Stackexchange
Any help identifying the breed of my pup?. Here she is the day we got her at 2 months (5lbs): http://imgur.com/2OwW9 Here she is again at 4 months (10.5 lbs): http://imgur.com/9hAy0 The shelter we got her from thought she was a Rough Collie mix of some sort but I'm skeptical. She is now about 5 months old at 12.5 lbs. Any thoughts? Thanks!
0non-cybersec
Reddit
[Weekly Discussion] Does theism entail normative skepticism? Street's version of the problem of evil.. The argument that I’ll be summarizing in this thread is Street’s variation on the problem of evil from [this](https://files.nyu.edu/ss194/public/sharonstreet/Writing_files/Paper%2010%20for%20website%20-%20If%20Everything%20Happens%20for%20a%20Reason,%20Then%20We%20Don%E2%80%99t%20Know%20What%20Reasons%20Are.pdf) paper. While this is a version of the problem of evil, it's worth noting that it's not obviously open to the usual repies. What's more, it seems to target replies that this or that is what's really valuable in particular. The rough structure of the argument is as follows: (1) If theism is true, then everything happens for a reason. [From the content of theism] (2) If everything happens for a reason, then we are hopeless judges of what reasons are. [To be supported in a bit] (3) But we aren’t hopeless judges of what reasons are (normative skepticism is seriously implausible, especially for the theist). [Premise from common sense] (4) So theism is false. [Via some modus tollens moves backwards through 3, 2, and 1] The sort of theism that’s being targeted here is that of a standard monotheistic religion. Namely Christianity, Judaism, and Islam. These religions share a characterization of God which is that of an all-knowing, all-powerful, and all-good being. Also, normative skepticism should not be confused with meta-ethical skepticism. The latter is skepticism about whether or not there are any moral facts. The former (and what we're interested in here) is skepticism about what you ought to do. So normative skepticism is true if you know that you ought morally to either murder so-and-so or that you ought morally not to murder so-and-so, but you have no way of knowing which is correct. **Setting Up the Argument** Now on to the argument. Imagine a fatal car crash as a result of drunk driving, something that happens thousands of times a year in the US alone. Now suppose that you’re in a position that you know such a car crash is about to occur and you have the power to stop it, but you do nothing. Any sensible person will say of you that you are not a good person. Let’s call this judgment ‘Platitude’: (Platitude) If you know that a car crash is about to happen and have the power to stop it, yet you do nothing, you are not morally good. God knows about and has the power to stop any of these crashes, but God is a good being. This suggests two possibilities: either Platitude is an incorrect moral judgment or God is not morally good and standard monotheism is false. So we have this dilemma. The theist obviously does not want to go with the latter horn, so let’s explore the former: how might Platitude be incorrect? Well the most obvious way and a way that’s been explored in past responses to the problem of evil is to say that we’re unaware of some circumstances that make Platitude incorrect. This may either be some factual circumstances, so perhaps its Hitler in the car, that, if we knew them, would cause us to change our moral judgment, or some moral circumstances, so we’re just wrong in general when we think that you ought to stop harm if you can. This yields the following substantive normative claim: (N) *For any apparent evil that has ever happened or ever will happen, there is some set of circumstances such that God has a morally good reason to permit it to happen.* There are three scenarios in which N might be true: God’s morally good reasons are agent-neutral, God’s morally good reasons are agent-relative, or God’s morally good reasons are sometimes agent-neutral and sometimes agent-relative. We’ll go over these terms mean and why each of these scenarios fails in turn. **God’s Reasons are Agent-Neutral** First of all, let’s be clear about what reasons are in this context. We’re talking about normative reasons for action. These are commonly things like: you should do your homework, winning the World Cup is a good reason to celebrate, an so on. Normative reasons for action are reasons that we (as agents capable of responding to such reasons) ought to do something or other. Reasons are agent-neutral just in case all agents have the same reasons, regardless of their particular circumstances. So if it’s true that God has reason allow this particular car accident, then it’s true for everyone that they ought to allow it as well. If God’s reasons are agent-neutral, then we’re practically paralyzed when it comes to acting on our moral judgments. Suppose that you seem some drunk hobbling to their car. As they zip away, you see two children in the back frightened by the erratic driving. Obviously the right thing to do here is to call 911 and report this vehicle so that the police can pull them over, arrest the drunk driver, and spare the kids (and any other potential victims) from the possibility of a fatal crash. But then you think to yourself “hold on, God allows [a drunk driving accident every 90 seconds](http://www.madd.org/drunk-driving/about/drunk-driving-statistics.html) and God’s reasons are agent-neutral, so if God has reason to allow these accidents, then so do I.” How do you know, then, whether or not this could be one of the ‘good’ crashes? Well you don’t… you have no way of knowing here whether or not you have reason to call 911 and stop the driver or whether you have reason to allow the driver to continue. What’s more, the two are mutually exclusive: if you have reason to do one, that counts as a reason against doing the other. So you’re practically paralyzed; one of your options is something that you have reason to do (so it’s the right thing) and the other is something that you have reason not to do (so it’s the wrong thing), but you have no idea which is which. So scenario #1, that God’s reasons are agent-neutral, is bunk. If the theist accepts #1, then she has to become a normative skeptic. This is untenable, so let’s look at the second scenario. **God’s Reasons are Agent-Relative** Reasons are agent-relative if the reasons for action that you have depend on your particular circumstances as an agent. This is obviously the case for many of our day-to-day prudential reasons. If I like tuna more than salmon, then I have reason to order the tuna for dinner while my friend, who likes the salmon more, has reason to order the salmon. If God’s reasons are agent-relative, then whatever good reasons God has for allowing car crashes are reasons for God to allow them, but not reasons for us in virtue of our being human (or something like that). So when you see that drunk driver speeding off, you can be confident that, even if God has reason to allow that accident, you have reason to stop it, so you can be confident in the knowledge that you should call 911. OK, so we know that our reasons are different from God’s, but how do we know what they are? We have two possibilities: a secular moral epistemology or a sacred moral epistemology. Exploring secular moral epistemology is too great a project for this thread, but we might gloss on two worries: first, there are independent worries about theories in secular ethics that the theist will have to head off if she takes this route and, second, one good reason to adopt theism is supposed to be the aid it gives us in moral philosophy, so turning to secular ethics undermines one reason for believing theism in the first place. On the sacred moral epistemology, how might we learn what our moral reasons are? Well the most obvious way is just for God to tell us. God made us and has, presumably, engineered the divide between his reasons and ours, so he knows what all of our reasons are. Furthermore, God is good, so he’d wish to give us the opportunity to do good as well. So how might God tell us what our reasons are? The candidates seem to be things like innate moral sense, private religious experiences, and the like. Importantly, among the candidates are not things like spoken word, written instructions, and so on. But consider this: if God knows what our reasons are, has the power to tell us, and wants us to have the power to do good, then his communications should be clear and unmistakable. This would still leave room for free will, since you could ignore your reasons, but would allow for those who were willing to do good to know what was good in the first place. Yet, our communications with God are not like this and, even among people who claim to know what God has identified as good reasons for action, there’s widespread disagreement (over whether or not Christianity should permit gay marriage, for example). So God’s moral communications should be clear and distinct, but they obviously aren’t and we’re still in the dark about what our reasons are, as was the case with scenario #1. **Closing Thoughts** OK, I know I promised three scenarios, but the third is just that some of our reasons are agent-neutral and some are agent-relative. However, in this scenario we don’t know which are which and, even if we did, that wouldn’t help us escape the worries for both sorts of reasons taken individually. Before I close this out, I’d like to head off an obvious objection: what about free will. It’s common to respond to iterations of the problem of evil by pointing out that free will is valuable, so in permitting people to do evil, God is actually promoting the most good outcome because he’s allowing our wills to remain free. This option, however, is covered amongst the circumstances that have informed N from way back a few sections ago and does nothing to alleviate the worries spawned from N in the three scenarios discussed.
0non-cybersec
Reddit
Randomized algorithm that &quot;looks&quot; deterministic?. <p>Is there an interesting example of a randomized algorithm for a search problem that always outputs the <em>same</em> (correct) answer, regardless of its internal randomness, but which exploits the randomness so that its expected running time is better than the running time of the fastest known deterministic algorithm for the problem?</p> <p>In particular, I was wondering if there is such an algorithm for finding a prime between n and 2n. There's no known polynomial time deterministic algorithm. There's a trivial randomized algorithm that works just by sampling random integers in the interval, which works thanks to the <a href="http://en.wikipedia.org/wiki/Prime_number_theorem">prime number theorem</a>. But is there an algorithm of the above kind whose expected running time is intermediate between the two?</p> <p>EDIT: To refine my question slightly, I wanted such an algorithm for a problem where there are <em>many</em> possible correct outputs, and yet the randomized algorithm settles on one independent of its randomness. I realize that the question is probably not fully specified...</p>
0non-cybersec
Stackexchange
Seriously, Disney?.
0non-cybersec
Reddit
Can I control power to one USB port?. <p>I have a Microsoft Reclusa and I don't want the backlight on while I am not there. I want to turn the USB port's power off to stop the backlight at night. Is there any software that will do this for me?</p>
0non-cybersec
Stackexchange
Unable to printf floating point numbers from executable shared library. <p>I'm developing a shared library which can be executed independently to print it's own version number.</p> <p>I've defined a custom entry point as:</p> <pre><code>const char my_interp[] __attribute__((section(".interp"))) = "/lib64/ld-linux-x86-64.so.2"; void my_main() { printf("VERSION: %d\n", 0); _exit(0); } </code></pre> <p>and I compile with </p> <pre><code>gcc -o list.os -c -g -Wall -fPIC list.c gcc -o liblist.so -g -Wl,-e,my_main -shared list.os -lc </code></pre> <p>This code <strong>compiles</strong> and <strong>runs</strong> perfectly. </p> <p>My issue is when I change the parameter of the printf to be a float or double (%f or %lf). The library will then compile but <strong>segfault</strong> when run.</p> <p>Anyone have any ideas?</p> <p><em><strong>edit1:</em></strong></p> <p>Here is the code that segfaults:</p> <pre><code>const char my_interp[] __attribute__((section(".interp"))) = "/lib64/ld-linux-x86-64.so.2"; void my_main() { printf("VERSION: %f\n", 0.1f); _exit(0); } </code></pre> <p><em><strong>edit2:</em></strong></p> <p>Additional environmental details:</p> <pre><code>uname -a </code></pre> <p>Linux mjolnir.site 3.1.10-1.16-desktop #1 SMP PREEMPT Wed Jun 27 05:21:40 UTC 2012 (d016078) x86_64 x86_64 x86_64 GNU/Linux</p> <pre><code>gcc --version </code></pre> <p>gcc (SUSE Linux) 4.6.2</p> <pre><code>/lib64/libc.so.6 </code></pre> <p>Configured for x86_64-suse-linux. Compiled by GNU CC version 4.6.2. Compiled on a Linux 3.1.0 system on 2012-03-30.</p> <p><em><strong>edit 3:</em></strong></p> <p>Output in /var/log/messages upon segfault:</p> <p>Aug 11 08:27:45 mjolnir kernel: [10560.068741] liblist.so[11222] general protection ip:7fc2b3cb2314 sp:7fff4f5c7de8 error:0 in libc-2.14.1.so[7fc2b3c63000+187000]</p>
0non-cybersec
Stackexchange
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
Windows 10 cannot clear readonly attribute from HDD. <p>I have a 2TB WD Re hard drive that I was planning to use in a RAID 1 setup for data storage on my desktop, but I am unable to delete the existing partitions and reformat the drive.</p> <p>I'm running Windows 10 Pro 1909.</p> <p>In Disk Manager it shows the following: <a href="https://i.stack.imgur.com/mTf1v.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/mTf1v.png" alt="enter image description here"></a></p> <p>This HDD was previously used in another system, but has been on the shelf for a while and I don't remember the details of its previous life. Based on the name and the fact that Windows shows double it's extra capacity, it was obviously used to store backups and possibly as part of a drive is Storage Spaces.</p> <p>I have used DiskPart to clear the read only attribute from the drive. Each time I do so DiskPart tells me it is successful in clearing the attribute, but the disk remains read only.</p> <p>I have also tried a couple of tools from EaseUS (EaseUS Tools M and Partition Master Professional) to no avail. </p> <p>Other sites have suggested editing the registry to clear the read-only attribute at Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies; this path doesn't exist in my registry. I've searched for a similar setting, but haven't found one.</p> <p>I've also found sites that suggest running CHKDSK. I'm unable to run in /F mode because of the read-only setting; running CHKDSK in read-only mode returned no issues.</p> <p>I've pretty much run out of ideas to try at this point. The only other thing I've come across is to try GParted in Linux and or this: <a href="https://superuser.com/questions/1478014/locked-usb-partition-read-only-cannot-format">Locked usb partition read only cannot format</a> post, suggesting to overwrite the disk with dd in Linux.</p> <p>I don't have Linux installed on any physical computers (all VMs), but will set one up to tonight, if all else fails.</p> <p>Any additional ideas on things to try are welcome. I do have a hammer I can use, as a last resort.</p>
0non-cybersec
Stackexchange
Is the equator of a 3-sphere a 2-sphere?. <p>In analogy with the equator of a 2-sphere (parametrized by 2 angles) being a 1-sphere (parametrized by one of them), js the equator of a 3-sphere (3 angles) a 2-sphere?</p>
0non-cybersec
Stackexchange
I think it's time Arcade Sona gets a proper partner. [Skin Idea]. Arcade Miss Fortune What she looks like in my mind: * Passive: pixel hearts and maybe a SPD(+UP arrow) when it kicks in, similar to the double shield(+UP Arrow) from sona's W. * Double Up (Q): when it hits the second target a little "COMBO x2" or "HITS x2" sign in pixel font * Impure Shots (W): Uh? DMG(+LightBlue UP arrow), lightblue since it's magic dmg >_> * Make It Rain (E): Coin shower, with appropriate DINGs! sounds * Bullet Time (R): MetalSlug-like particles * General look: an outfit on the same page with Arcade Sona * Guns: Time Crisis Pink and Blue guns edit: I totally forgot autos "Basic attacks could be lazer tag" suggested by W-man
0non-cybersec
Reddit
Cooking with yellows.
0non-cybersec
Reddit
Do I have to release the code of a MIT licensed software running a GPL library?. <p>Lets say I'm using <a href="https://github.com/rogerwang/node-webkit" rel="nofollow">Node-Webkit</a>, an MIT licensed app runtime. Now, let's say I decide to include a Javascript library which is GPL licensed: while I do not modify the downloaded JS file, I do write my own code making use of the library's functions. I plan to sell the final obfuscated executable and I'm wondering: what's the final license of the complete software? Do I only have to release the GPL library or does the GPL license apply for all the code I wrote? What happens to Node-Webkit's MIT license?</p>
0non-cybersec
Stackexchange
Code Vein - Official Trailer.
0non-cybersec
Reddit
That's what I call friendship.
0non-cybersec
Reddit
Atmosphere - Between the Lines.
0non-cybersec
Reddit
Network Drivers for DH67BL motherboard with i7 Intel processor. <p>I have an issue while installing motherboard software for DH67BL. </p> <p>In ubuntu it's not connecting to the network and unable to find the suitable drivers for the ubuntu server version. Any help or guidance in this regard will be helpful. Are there any rpm or deb files available for this version of the motherboard that I can download?</p>
0non-cybersec
Stackexchange
how to change time column in HTML layout of Log4j2. <p>For my application I need HTML layout for logging events.The time in time column appears in milli seconds but I need it in dd-MM-yyyy:HH:mm:ss.sssZ format. How do I do that? Because HTML layout of log4j2 does not support pattern attribute. So I'm not able to set new pattern for time.</p>
0non-cybersec
Stackexchange
Making Philosophy Matter—or Else.
0non-cybersec
Reddit
Networking With Windows 7 And Windows Xp. <p>I Want Implement A Peer To Peer Network By Windows 7 And Windows Xp.How Quick And Professional Reference Can I Use?</p>
0non-cybersec
Stackexchange
Parker Brothers Choppers Creates Real Life Functional Tron Lightcycle - The designers of Parker Brothers Choppers have managed to turn the iconic CGI Tron Lightcycle into a real, rideable motorcycle..
0non-cybersec
Reddit
Tweaking site based on bounce rate. <p>I am trying to understand numbers I see on my site and need some help.</p> <pre><code>Entry pages | Entries Bounced | % Bounced index.php | 23737.0 | 16512.0 | 70.0 404.php | 22726.0 | 15477.0 | 68.0 downloadform.php | 9718.0 | 6538.0 | 67.0 product1.php | 7534.0 | 3213.0 | 43.0 </code></pre> <p>Does this mean visitors to my third entry (Where I ask visitors to fill out a form before downloading free s/w) are leaving in droves? That page is a form, which when submitted still displays the same URL. Does that affect the bounce rate calculation? I understand the <code>index.php</code>. 70% of the visitors are leaving quickly. I need an exit survey for that page (any effective methods?). That <code>404.php</code> is a bother too (something from the old site, people must have bookmarked).</p> <p>And another of my stats reports says:</p> <p>Exit page | # of visits</p> <pre><code>404.php | 31282.0 index.php | 29846.0 downloadform.php | 10640.0 product1.php | 7227.0 </code></pre> <p>I am trying to make sense of this data for further tweaking.</p>
0non-cybersec
Stackexchange
Found this in my driveway. Any ideas?.
0non-cybersec
Reddit
This is the only logical explanation.
0non-cybersec
Reddit