text
stringlengths 3
1.74M
| label
class label 2
classes | source
stringclasses 3
values |
---|---|---|
AngularJS Karma-jasmine and visual studio 2015. <p>I have an angularJS application and now I would like to start testing it.
So I have watched a few tutorials, but none of them show you how to set up testing with visual studio 2015.
Does anyone know about a good resource to read or can help me set it up.</p>
<p>The questions I have are:</p>
<ol>
<li>Do I need to set up separate views for each test?</li>
<li>Apart from installing karma-jasmine and karma-chrome-launcher do I need to install anything else?</li>
<li>How can I view my tests in a browser?</li>
</ol>
<p>Any help given will be awesome.</p>
| 0non-cybersec
| Stackexchange |
Prove an equality with floor function.. <p>Let $p\in \Bbb N \ne 0$ and $x\in \Bbb R$.</p>
<p>prove that</p>
<p>$$\left\lfloor \frac {\lfloor px \rfloor}{p} \right\rfloor=\lfloor x\rfloor$$</p>
<p>I tried using the double inequality
$$\lfloor px\rfloor \le px<\lfloor px\rfloor +1$$</p>
<p>and divided by $p$ but a small problem remains.</p>
| 0non-cybersec
| Stackexchange |
Level up!. | 0non-cybersec
| Reddit |
"The most common outfit of rape victims is jeans and a t-shirt or sweatshirt. " . | 0non-cybersec
| Reddit |
Asymptotic behavior of the hypergeometric function. <p>I'm trying to understand the asymptotic behavior of the hypergeometric function
<span class="math-container">$$
_2F_1(a, b; c; z)
$$</span>
at fixed argument <span class="math-container">$0 < z < 1$</span> when some of the parameters <span class="math-container">$a$</span>, <span class="math-container">$b$</span> and <span class="math-container">$c$</span> are large.</p>
<p>There are two specific cases I'm interested in, but I only know the answer in one of them. Let me start with the solved example to set the stage:</p>
<p>1) Consider
<span class="math-container">$$
_2F_1(a + n, b + n; c + 2n; z)
$$</span>
in the limit <span class="math-container">$n \to \infty$</span>. In this case one can use the saddle-point method in the integral representation of the hypergeometric function to show that
<span class="math-container">$$
_2F_1(a + n, b + n; c + 2n; z) \approx (1-z)^{(c-a-b-1/2)/2}
\left( 2 \frac{1 - \sqrt{1-z}}{z} \right)^{2n + c - 1}
$$</span>
This is the kind of result I'm after: it shows that the hypergeometric function grows at most like <span class="math-container">$2^{2n}$</span> when <span class="math-container">$|z|<1$</span>.</p>
<p>2) Now consider the other case of interest
<span class="math-container">$$
_2F_1(a + n, b - n; c; z)
$$</span>
It is similar to the first case in the sense that the parameters are "balanced" in <span class="math-container">$n$</span>. But now one of these parameters goes negative at large <span class="math-container">$n$</span>, and I can observe numerically that the function oscillates in <span class="math-container">$n$</span>. I assume that there should be an asymptotic expression for the amplitude of these oscillations, but I am not able to get one.</p>
<p>I cannot make progress neither with the saddle-point method nor with a variety of hypergeometric identities. Does anyone have a solution, or at least a suggestion on how to attack the problem?</p>
| 0non-cybersec
| Stackexchange |
I'm getting InvalidCastException while actually casting nothing. <pre><code>AutoResetEvent receiver = new AutoResetEvent(false);
Thread t = null;
t = new Thread(new ThreadStart(() =>
{
while (Browser.ReadyState != WebBrowserReadyState.Complete) // error
{
Thread.Sleep(10);
}
receiver.Set();
t.Abort();
}));
t.Start();
// Timeout
success = receiver.WaitOne(10000);
</code></pre>
<p>Browser is</p>
<pre><code>public WebBrowser Browser { get; set; }
</code></pre>
<p><img src="https://i.stack.imgur.com/xdIyo.png" alt="Screenshot"></p>
<p>I don't really understand why I get such error. The Browser.ReadyState is a enum type <code>WebBrowserReadyState</code></p>
<p>So what do you think?</p>
<p>EDIT:
<strong>First:</strong>
<img src="https://i.stack.imgur.com/GKVu8.png" alt="SS1">
<strong>Second:</strong>
<img src="https://i.stack.imgur.com/2fj1V.png" alt="SS2"></p>
| 0non-cybersec
| Stackexchange |
Selfie thread. | 0non-cybersec
| Reddit |
Big $O$ -- $k^n$ vs $(k-1)^n\cdot n$, $(k>1)$. <p>I tried to do the following:</p>
<p><span class="math-container">$$ k^n = (k-1)^n\cdot \left(\frac{k}{k-1}\right)^{n}$$</span></p>
<p>Now if i compare the above expression on the R.H.S with <span class="math-container">$$(k-1)^n \cdot n$$</span> I just need to compare <span class="math-container">$n$</span> and <span class="math-container">$\left(\frac{k}{k-1}\right)^{n}$</span>.</p>
<p>Now <span class="math-container">$\frac{k}{k-1}$</span> will definitely be greater than 1, so let <span class="math-container">$\frac{k}{k-1} = c$</span> , so this will reduce into <span class="math-container">$c^n$</span> which is greater than n.</p>
<p>Where am i going wrong?</p>
<p>The answer given is that <span class="math-container">$(k-1)^n\cdot n > k^n$</span></p>
| 0non-cybersec
| Stackexchange |
What is an API. | 0non-cybersec
| Reddit |
$\{y_m\}_{m=1}^{\infty}$ does not converge to $y\in\mathbb{R}^\mathbb{N}$ with respect to box topology. <p>For each $m\in \mathbb{N}$, define $$y_m(j)= y(j), \;\;\;\;\mbox{if $\;\;$ $j\leq m$,}$$ and $$y_m(j)=0, \;\;\;\; \mbox{if $\;\;$ j>m}.$$</p>
<p>How will I show that $\{y_m\}_{m=1}^{\infty}$ does not converge to $y\in \mathbb{R}^\mathbb{N}$ such that $y(j)\neq 0$ for all $j\in\mathbb{N}$ when endowed in box topology.</p>
<p>In particular, what open box in $\mathbb{R}^{\mathbb{N}}$ contains $y$ but not $y_m$?</p>
<p>Please help me with this problem in the book. Thank you!</p>
| 0non-cybersec
| Stackexchange |
Way We Hear It: Bruce Arians and Arizona Cardinals will agree to part ways after season. | 0non-cybersec
| Reddit |
Help me with my DILLemma.... This one is weird...
I grew up eating lots of dill (Eastern European lineage). I love the stuff. I've been cooking with it for years, mostly in soups.
The past year or so, in Orange County, CA, I've been cooking soups and all the dill I buy around here is as bland as it gets- have shopped at Trader Joe's, Sprouts, Whole Foods, Stater Bros.- always flavorless. When you open the little packets to smell it, 95% have absolutely zero aroma and they've been adding virtually no flavor to my food, which are both just wrong for such an aromatic, fresh herb!
When I visited my parents in LA a few weeks ago, we made dill pickle soup with fresh dill and sure enough, resplendent with dill flavor.
I thought maybe the supply around here is bad or something. I asked some Russians at a local Russian market where they recommend getting dill, and they said Super King (a large ethnic supermarket chain) or a local Persian market whose name they couldn't recall.
I exclaimed at Super King, since that's where we shop up in LA and I never had a clue they had one down here.
I went right then and there to the local SK, found the dill, smelled it and tasted a bit, and it was right on! Success, right? Wrong. I smelled it once or twice to more to ensure it was potent, when this nasty, old sock/mildew smell hit me. I picked up another bunch- same. It was the case with all of them. I was disgusted and searched Yelp for the Persian market they recommended. Found a European/Middle Eastern market and went there.
Same deal. "Real" dill but with real mildew/sock odor! Before smelling the bad part I tasted a tiny bit and it too, like SK's, had the flavor/potency I was looking for.
(Note that never growing up, or since, had I smelled this stink with fresh dill, only the real, refreshing dill aroma.)
So I'm both baffled and at a loss for a plan of action:
1. Why on Earth do all the supermarkets here have flavorless dill? It's all "organic" and expensive and of supposedly higher quality, but it tastes like water. It has no flavor and almost no smell, good or bad.
2. Likewise, why would local ethnic markets have actual potent dill?
3. The heck is this nasty funk? I know all the dill at these markets is sitting in the open and drenched in water. That it (?)
4. What do I do? I don't have the time to grow my own or go hunt down farmers' markets. I'm super busy and one of the reasons I make soups is that I can mindlessly and relatively quickly make up a huge pot to last me weeks. Simplicity is a selling point for me. Me needs good dill that doesn't stink!
Help me, Moldy None? | 0non-cybersec
| Reddit |
The snow slowly melting on the front porch looks like an Ice Tornado. | 0non-cybersec
| Reddit |
Removing Carrier Branding from the Pulldown?. How would I go about doing this? (Moto Droid 2.2) | 0non-cybersec
| Reddit |
NServiceBus, MassTransit and Rabbit MQ or Kafka?. <p>I am trying to learn messaging system. I have found that many options like
RabbitMq
NServiceBus
MassTransit
Kafka
...</p>
<p>My questions is:</p>
<p>What is the difference between each one?
What is the use of each?(usage scenario)</p>
| 0non-cybersec
| Stackexchange |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
How to use a defined property value as another property in pure CSS?. <p>How to use a defined property value as another property in <strong>pure CSS</strong> just like this:</p>
<pre><code>.test {
color: #66ccff;
text-shadow: 0 0 8px valueOf(color);
}
</code></pre>
<p>'color' can be changed at anytime.</p>
| 0non-cybersec
| Stackexchange |
How to display an image that we received through Ajax call?. <p>Web server generates images and sends them to client directly. There are no URLs to the images, for security reasons. For example, if I enter <code>/images/25</code> URL in the browser server will send it and browser will download it. </p>
<p>Now I want to get this image from Ajax call and then display it on existing page. I can get the image data. My question is: how can I display an image?</p>
<pre><code>$.get("/images/25", function (rawImageData) {
// ??? Need to add an image to DOM
});
</code></pre>
<p><strong>Update</strong></p>
<p>I apologize for being so stupid. Thank you, JW. Of course I can just put img tag with src to my URL. It does not matter if this is a direct URL to an image file or the server sends it dynamically.</p>
| 0non-cybersec
| Stackexchange |
Tragic Azeroth part V.. | 0non-cybersec
| Reddit |
Is $\exp \left(-\sum_{i=1}^d \frac{(x_i - y_i)^2}{s_i^2} \right) $ analytic in $\mathbf{x}$ on $\mathbb{R}^d$?. <p>I would like to know whether the following statement is true. </p>
<p><strong>Conjecture</strong>: For all $\mathbf{y} \in \mathbb{R}^d$, $s_1>0,\ldots,s_d>0$, $f_{\mathbf{y}}(\mathbf{x}) := \exp \left(-\sum_{i=1}^d \frac{(x_i - y_i)^2}{s_i^2} \right) $ is analytic in $\mathbf{x}$ on $\mathbb{R}^d$.</p>
<p>Apology if this is a very well known fact. I am not working in this area. </p>
<p>If it is true, could you please give me a reference? If this is not known, could you please let me know how I might show it? So far, I have been trying to show it by using Proposition 2.2.10 in <a href="http://www.springer.com/la/book/9780817642648" rel="nofollow">A Primer of Real Analytic Functions</a> which gives a condition on the partial derivatives for a function on $\mathbb{R}^d$ to be analytic. I have not yet succeeded.</p>
<p>Another thing I notice is that if $d=1$, then $f_y(x) = \exp\left( -(x-y)^2/s^2\right)$ is known as a <a href="https://en.wikipedia.org/wiki/Gaussian_function" rel="nofollow">Gaussian function</a>. A Gaussian function is known to be analytic. In our case, we have a product $d$ Gaussian functions. That is, $f_\mathbf{y}(\mathbf{x})$ is separately analytic on each coordinate of $\mathbf{x}$. I would like to know if it is jointly analytic in $\mathbf{x}$.</p>
<p>Thanks. (This is not a homework question.)</p>
| 0non-cybersec
| Stackexchange |
Exit code of traps in Bash. <p>This is <code>myscript.sh</code>:</p>
<pre><code>#!/bin/bash
function mytrap {
echo "Trapped!"
}
trap mytrap EXIT
exit 3
</code></pre>
<p>And when I run it:</p>
<pre><code>> ./myscript.sh
echo $?
3
</code></pre>
<p>Why is the exit code of the script the exit code with the trap the same as without it? Usually, a function returns implicitly the exit code of the last command executed. In this case:</p>
<ol>
<li>echo returns 0</li>
<li>I would expect <code>mytrap</code> to return 0</li>
<li>Since <code>mytrap</code> is the last function executed, the script should return 0</li>
</ol>
<p>Why is this not the case? Where is my thinking wrong?</p>
| 0non-cybersec
| Stackexchange |
Docker with yarn. <p>First time trying to get yarn and docker working together.
How can I stop yarn from installing the packages every single time I run <code>docker build</code> command?</p>
<p>I've found some solutions like storing <code>node_modules</code> in a temporary directory and then linking it, but with various packages installed I get too many errors to handle. Is there maybe a way to compare my <code>yarn.lock</code> with the one existing inside Docker or any other solutions?</p>
<p>Dockerfile:</p>
<pre><code>FROM node:8.9.1-alpine
COPY package.json yarn.lock /usr/src/
RUN cd /usr/src \
&& yarn install --pure-lockfile
COPY . /usr/src
EXPOSE 3005
</code></pre>
<p>With this setup I get a message saying <code>Sending build context to Docker daemon 375.2MB</code>, then the <code>yarn install</code> is run as usual, fetching the packages every single time.</p>
| 0non-cybersec
| Stackexchange |
Baz Luhrmann to make Netflix musical. | 0non-cybersec
| Reddit |
How to prove what values of $\beta$ would $f{\left (x,y \right )} = -\beta x y + x^{2} + y^{2}$ is always greater than 0. <p>$\beta \in R$</p>
<p>$f{\left (x,y \right )} = -\beta x y + x^{2} + y^{2}$</p>
<p>For what values is $\beta$, $f(x,y) \geq 0$</p>
<p>Note: I know that when $-2 \leq \beta \leq 2$, $f(x,y) \geq 0$, but how do I prove it?</p>
| 0non-cybersec
| Stackexchange |
Evaluating the arc length integral $\int\sqrt{1+\frac{x^4-8x^2+16}{16x^2}} dx$. <blockquote>
<p>Find length of the arc from $2$ to $8$ of $$y = \frac18(x^2-8 \ln x)$$</p>
</blockquote>
<p>First I find the derivative, which is equal to $$\frac{x^2-4}{4x} .$$</p>
<p>Plug it into the arc length formula $$\int\sqrt{1+\left(\frac{dy}{dx}\right)^2} dx$$ and get</p>
<p>$$\int\sqrt{1+\frac{x^4-8x^2+16}{16x^2}} dx.$$</p>
<p>I am not sure how to proceed from here, as I cant figure out a way to put the sqrt argument into a form that I can find the square root of</p>
| 0non-cybersec
| Stackexchange |
GRUB rescue error on installed Ubuntu 13.04 with my Windows 8 pro. I tried to merge a partition of e drive that was not my os drive. <p>I have installed Ubuntu 13.04 on my Windows 8 Pro of HP dv6 7012tx. When I am opening my laptop, its showing these error before showing Windows 8 logo.</p>
<pre><code>error : unknown filesystem.
grub rescue>
</code></pre>
<p>Please help me to solve my problem as HP customer care told me to format my entire laptop what I don't wanna do. Help me to resolve or uninstalled Ubuntu via commandline.</p>
<p>Thanks.</p>
| 0non-cybersec
| Stackexchange |
How does 'addEventListener` work behind the scenes?. <p>So, I have had this curiosity for quite a while now. I want to know, how <code>addEventListener</code> works behind the scenes. I know what it does but I am just not able to get my head around how it does it. </p>
<p>I have checked many links and resources and <a href="https://stackoverflow.com/questions/33914044/how-does-addeventlistener-work-under-the-hood">this</a> is the one that was closest to what I was looking for but still no success.</p>
<p>To clarify on what I am really looking for, I want to know how can one create his own <code>addEventListener</code> function that would take the first argument as the event name and the second argument as the callback that would accept the <code>eventArgs</code> argument.</p>
| 0non-cybersec
| Stackexchange |
Possible A Record Conflict. <p>I just inherited management of the domain names from another person who resigned from my company. I am new to this type of task. </p>
<p>I want to map the new ip address I bought to the following example domain</p>
<p>*.subdomain.apps.domain.com</p>
<p>However when I look up the other anames in our domain, there is already an entry for *.apps.domain.com</p>
<p>If I add the new A Name Record for *.subdomain.apps.domain.com mapped to the new ip address will there be a conflict if a user goes to the said domain having also an A Name for *.apps.domain.com? </p>
| 0non-cybersec
| Stackexchange |
Wildflower bouquet- done by Brad Snow at Kulture Shock in SLC, UT. | 0non-cybersec
| Reddit |
Some Bizarre Black Holes Put On Light Shows. | 0non-cybersec
| Reddit |
Infected Body Parts Rented Out for Medical Training: Officials. | 0non-cybersec
| Reddit |
Align multiple equations with text. <p>I have 4 equations (2 on each line) separated by text. I cannot get the equal signs (red box) to align.
Here is the code to recreate the image:</p>
<pre><code>\begin{equation*}
\eta_{1 i}=x_{1 i}^{T} \beta \qquad \quad \eta_{2 i}=x_{2 i}^{T} \alpha
\end{equation*}
where
\begin{equation*}
\theta_{1}=h_{1}(\eta_{1 i}) \qquad \quad \theta_{2}=h_{2}(\eta_{2 i})
\end{equation*}
</code></pre>
<p><a href="https://i.stack.imgur.com/2s8lU.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/2s8lU.png" alt="enter image description here"></a></p>
<p>I have tried with alignedat but cannot find a way to include the text "where" to be left justified</p>
<pre><code> \begin{equation*}
\begin{alignedat}{2}
\eta_{1 i}&=x_{1 i}^{T} \beta \qquad \quad &\eta_{2 i}&=x_{2 i}^{T} \alpha\\
\theta_{1}&=h_{1}(\eta_{1 i}) \qquad \quad &\theta_{2}&=h_{2}(\eta_{2 i})
\end{alignedat}
\end{equation*}
</code></pre>
<p><a href="https://i.stack.imgur.com/fKpkS.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/fKpkS.png" alt="enter image description here"></a></p>
| 0non-cybersec
| Stackexchange |
The Dreams We Have, The Love We Share. | 0non-cybersec
| Reddit |
16Shop: Commercial Phishing Kit Has A Hidden Backdoor - Akamai Security Intelligence and Threat Research Blog. | 1cybersec
| Reddit |
scikit-learn classification on soft labels. <p>According to the documentation it is possible to specify different loss functions to <code>SGDClassifier</code>. And as far as I understand <code>log loss</code> is a <code>cross-entropy</code> loss function which theoretically can handle soft labels, i.e. labels given as some probabilities [0,1].</p>
<p>The question is: is it possible to use <code>SGDClassifier</code> with <code>log loss</code> function out the box for classification problems with soft labels? And if not - how this task (linear classification on soft labels) can be solved using scikit-learn?</p>
<p><strong>UPDATE:</strong></p>
<p>The way <code>target</code> is labeled and by the nature of the problem hard labels don't give good results. But it is still a classification problem (not regression) and I wan't to keep probabilistic interpretation of the <code>prediction</code> so regression doesn't work out of the box too. Cross-entropy loss function can handle soft labels in <code>target</code> naturally. It seems that all loss functions for linear classifiers in scikit-learn can only handle hard labels.</p>
<p>So the question is probably:</p>
<p>How to specify my own loss function for <code>SGDClassifier</code>, for example. It seems <code>scikit-learn</code> doesn't stick to the modular approach here and changes need to be done somewhere inside it's sources</p>
| 0non-cybersec
| Stackexchange |
Saw this guy "driving" in my neighborhood. | 0non-cybersec
| Reddit |
[US] 30 for 30: Small Potatoes: Who Killed the USFL? (2009) - Documentary discussing the rise and fall of the NFL's greatest competitor, featuring a testy interview with former New Jersey Generals owner Donald Trump. | 0non-cybersec
| Reddit |
Is it ok to use C# Property like this. <p>One of my fellow developer has a code similar to the following snippet
<code></p>
<pre><code>class Data
{
public string Prop1
{
get
{
// return the value stored in the database via a query
}
set
{
// Save the data to local variable
}
}
public void SaveData()
{
// Write all the properties to a file
}
}
class Program
{
public void SaveData()
{
Data d = new Data();
// Fetch the information from database and fill the local variable
d.Prop1 = d.Prop1;
d.SaveData();
}
}
</code></pre>
<p></code></p>
<p>Here the Data class properties fetch the information from DB dynamically. When there is a need to save the Data to a file the developer creates an instance and fills the property using self assignment. Then finally calls a save. I tried arguing that the usage of property is not correct. But he is not convinced. </p>
<p>This are his points</p>
<ol>
<li>There are nearly 20 such properties.</li>
<li>Fetching all the information is not required except for saving.</li>
<li>Instead of self assignment writing an utility method to fetch all will have same duplicate code in the properties.</li>
</ol>
<p>Is this usage correct? </p>
| 0non-cybersec
| Stackexchange |
Drag lock doesn't get disabled. <p>I've enabled dragging in the touchpad settings in Accessibility, but I've also chosen "without drag lock". However, the dragging still continues after I lift my finger, just as it does when I choose "with drag lock". Is this a known problem in Yosemite?</p>
| 0non-cybersec
| Stackexchange |
What are the real life implications for an Apache 2 license?. <p>I want to use <a href="http://code.google.com/p/svg-edit/" rel="noreferrer">SVG Edit</a> for a project. This software is distributed under the Apache 2 license.</p>
<p>I've seen that:</p>
<ul>
<li>all copies, modified or unmodified,
are accompanied by a copy of the
licence</li>
<li>all modifications are clearly marked
as being the work of the modifier</li>
<li>all notices of copyright, trademark
and patent rights are reproduced
accurately in distributed copies</li>
<li>the licensee does not use any
trademarks that belong to the
licensor</li>
</ul>
<p>Do these pertain to the code or should I display the license somewhere in the GUI? The <a href="http://svg-edit.googlecode.com/svn/branches/2.5.1/editor/svg-editor.html" rel="noreferrer">original software</a> displays a "powered by SVG Edit", is it ok if I remove this? And most importantly: what is the correct etiquette for doing this? I don't want to be a jerk, but at the same time I want to simplify the UI as much as possible and removing the link will be part of it if it's not considered <em>rude</em>.</p>
| 0non-cybersec
| Stackexchange |
My brain hurt. | 0non-cybersec
| Reddit |
BoJack Horseman: The star of a hit 90s sitcom who is now washed up and living with his roommate, Todd, voiced by Aaron Paul.. | 0non-cybersec
| Reddit |
[UK]Jaguar appears stopped at a green then appears to run the red light. Not sufficient evidence to prosecute.. | 0non-cybersec
| Reddit |
is there a better way to handle index.html with Tornado?. <p><br>
I want to know if there is a better way to handle my index.html file with Tornado.<br></p>
<p>I use StaticFileHandler for all the request,and use a specific MainHandler to handle my main request. If I only use StaticFileHandler I got a 403: Forbidden error</p>
<pre><code>GET http://localhost:9000/
WARNING:root:403 GET / (127.0.0.1): is not a file
</code></pre>
<p>here how I doing now:</p>
<pre class="lang-py prettyprint-override"><code>import os
import tornado.ioloop
import tornado.web
from tornado import web
__author__ = 'gvincent'
root = os.path.dirname(__file__)
port = 9999
class MainHandler(tornado.web.RequestHandler):
def get(self):
try:
with open(os.path.join(root, 'index.html')) as f:
self.write(f.read())
except IOError as e:
self.write("404: Not Found")
application = tornado.web.Application([
(r"/", MainHandler),
(r"/(.*)", web.StaticFileHandler, dict(path=root)),
])
if __name__ == '__main__':
application.listen(port)
tornado.ioloop.IOLoop.instance().start()
</code></pre>
| 0non-cybersec
| Stackexchange |
Where's iOS 4.2 image file?. <p>On Apple Developers portal, under downloads I get this:</p>
<p><img src="https://i.stack.imgur.com/cygEE.png" alt="alt text"></p>
<p><strong>Where are the iPhone 3G / 4 / iPad versions of the OS?</strong></p>
<p>As I had beta 2 on my iPad (I'm have a iOS developer account), and I want to update to the new one, iTunes says iPad has version 4.2 (witch is right, 4.2b) and mentions, that there is no newer version.</p>
| 0non-cybersec
| Stackexchange |
What is this weird white stuff on my grass? (located in the UK). | 0non-cybersec
| Reddit |
Discontinuity of principal argument in nonpositive real axis. <p>Let $\operatorname{Arg}(z)$ be principal argument function defined in branch $(-\pi, \pi]$.<br>
Prove that $\operatorname{Arg}(z)$ is discontinuous in every point in nonpositive real axis.</p>
<p>"Solution":<br>
Let $z_0$ be a point on the nonpositive part of real axis.<br>
By $z$ approaching $z_0$ "from below" the $\operatorname{Arg}(z)$ reaches $\pi$<br>
By $z$ approaching $z_0$ "from top" the $\operatorname{Arg}(z)$ reaches $-\pi$<br>
Therefore for two given paths $\operatorname{Arg}(z)$ has two different limits.<br>
Therefore $\operatorname{Arg}(z)$ has no limit.</p>
<p>Can you please help me find more rigorous solution which specifically bases on
$\operatorname{Arg}(z) = \arctan\left(\frac{y}{x}\right) + \pi$?
I understand that I have to find two paths for which $$\lim_{x \to x_0, \ y \to y_0}\operatorname{Arg}(z)$$ does not exist. But what are they?</p>
| 0non-cybersec
| Stackexchange |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
natbib + BibTeX: suppress url if doi is available. <p>I am using <code>natbib</code> (+ BibTeX). Some entries in my bibliography file (<code>.bib</code>) have the field <code>doi</code>, some have <code>url</code> and some have both.
I would like to edit the bibliography style file (<code>.bst</code>) so that, if <code>doi</code> is available, <code>url</code> is suppressed.</p>
<p>At the moment, the <code>.bst</code> file has the functions:</p>
<pre><code>FUNCTION {format.doi}
{ doi empty$
{ "" }
{
new.block
"\doi{" doi * "}" *
}
if$
}
FUNCTION {format.url}
{
url
duplicate$ empty$
{ pop$ "" }
{ "\urlprefix\url{" swap$ * "}" * }
if$
}
</code></pre>
<p>[I was looking for a solution to this problem and found some similar questions and answers. However, they didn't address this specific case. After searching and trying, I could solve it. I present the solution as a reply for my own question to document it.]</p>
| 0non-cybersec
| Stackexchange |
Differential Fault Analysis of AES. <p>Let's say: an error is induced into an implementation of the AES-128 to produce a faulty ciphertext. The error is a one-byte eror and is always induced on the last state byte, during round9, before the <code>MixColumns</code> operation. The induced errors are unknown and can be different. However the key is the same in both cases.</p>
<p>Then how can I recover 4 bytes of the last round key? Which bytes of that round key can I recover and what's their value?</p>
<pre><code>ciphertext1 = 0xe719f8ab9e0b846f0cf2e5c32a0e5b45
faultytext1 = 0xe719f86f9e0beb6f0c97e5c38b0e5b45
ciphertext2 = 0x78f272c7cf5383085fa240236d97130f
faultytext2 = 0x78f27277cf53e7085f944023fa97130f
</code></pre>
| 1cybersec
| Stackexchange |
Paper Title (use style: paper title)
A Link Quality Model for Generalised Frequency
Division Multiplexing
Ghaith R. Al-Juboori(1), David Halls(2), Angela Doufexi(1) and Andrew R. Nix(1)
(1)Communication Systems & Networks Group, Department of Electrical and Electronic Engineering
University of Bristol, Bristol, United Kingdom
(2)Telecommunication Research Laboratory, Toshiba, Bristol, United Kingdom
Email: {Ghaith.Al-juboori, Angela.Doufexi, Andy.nix}@bristol.ac.uk, [email protected]
Abstract − 5G systems aim to achieve extremely high data rates,
low end-to-end latency and ultra-low power consumption.
Recently, there has been considerable interest in the design of 5G
physical layer waveforms. One important candidate is Generalised
Frequency Division Multiplexing (GFDM). In order to evaluate its
performance and features, system-level studies should be
undertaken in a range of scenarios. These studies, however,
require highly complex computations if they are performed using
bit-level simulators. In this paper, the Mutual Information (MI)
based link quality model (PHY abstraction), which has been
regularly used to implement system-level studies for Orthogonal
Frequency Division Multiplexing (OFDM), is applied to GFDM.
The performance of the GFDM waveform using this model and the
bit-level simulation performance is measured using different
channel types. Moreover, a system-level study for a GFDM based
LTE-A system in a realistic scenario, using both a bit-level
simulator and this abstraction model, has been studied and
compared. The results reveal the accuracy of this model using
realistic channel data. Based on these results, the PHY abstraction
technique can be applied to evaluate the performance of GFDM
based systems in an effective manner with low complexity. The
maximum difference in the Packet Error Rate (PER) and
throughput results in the abstraction case compared to bit-level
simulation does not exceed 4% whilst offering a simulation time
saving reduction of around 62,000 times.
Index Terms − 5G; GFDM; LTE-A; MI-based link quality model
I. INTRODUCTION
The requirements for 5G systems vary depending on the
scenario considered, such as Internet of Thinks (IoT), Machine
Type Communication (MTC) and high data rate mobile
communications. Different techniques need to be deployed to
achieve these requirements, including Massive MIMO,
millimetre wave bands and using new physical layer
waveforms. The selection of the air interface is key due to its
impacts on the transceiver complexity and the system level
performance [1].
Orthogonal Frequency Division Multiplexing (OFDM) is
successfully used in many wireless standards such as Wireless
Local Area Networks (WLANs) and the 4G cellular mobile
standards (LTE & LTE-A). This success is due to its desirable
features such as robustness to Inter-Symbol Interference (ISI)
and low implementation complexity due to the efficient use of
Inverse Fast Fourier Transform/Fast Fourier Transform
(IFFT/FFT ) processing [2]. On the other hand, OFDM suffers
from several disadvantages for example, its high out of band
radiation, high sensitivity to Carrier Frequency Offset (CFO)
and high peak to average power ratio (PAPR) [3]. These
drawbacks may prevent it from being used in 5G systems.
Recent research looking into the selection of a new air
interface for 5G has focused mainly in two areas. The first has
proposed enhancements and alternatives to the OFDM
waveform, in order to improve many of its features such as the
spectral containment and the sensitivity to CFO, as in [4]. The
second area is looking at alternative waveforms to OFDM.
Many candidates have been proposed such as Generalised
Frequency Division Multiplexing (GFDM), Filter Bank Multi-
Carrier (FBMC) [5] and Universal Filtered Multi-Carrier
(UFMC) [6]. In this paper, we focus on the GFDM waveform.
System-level performance studies are necessary to accurately
evaluate the performance of a system using a GFDM waveform,
however, these studies have high computational complexity if
they are implemented using bit-level simulators.
In this paper, the link quality model, which is often used to
evaluate the system-level performance for OFDM [7], in a
simple and low complexity manner, is investigated for GFDM.
To the best of our knowledge, this subject is not investigated
yet. The Mutual Information (MI) based link quality model is
used because it outperforms other models, as illustrated in
section III. The remainder of this paper is organised as follows:
in section II, a brief description of the GFDM air interface, its
features and a low complexity transceiver model are given. In
section III, general descriptions of the link quality model and
the MI-based link quality model (for OFDM & GFDM) are
presented. The simulation parameters which have been used in
this paper are listed in section IV. The results are shown and
discussed in section V. Finally; the conclusions are given in
section VI.
II. GFDM SYSTEM MODEL
A. GFDM Overview
GFDM is a digital multicarrier modulation scheme, and its
flexibility helps it to address the different requirements of 5G;
the basic structure for the GFDM transmitter is illustrated in
Fig. 1. The GFDM block consists of K subcarriers and M sub-
symbols per subcarrier, unlike OFDM which has only one
symbol per subcarrier. A pulse shape filtering process is used
on each subcarrier to reduce the Out-Of-Band (OOB) radiation.
mailto:Ghaith.Al-juboori,%20Angela.Doufexi,%20Andy.nix%[email protected]
Different types of filters (orthogonal and non-orthogonal) can
be used as a prototype filter, and this increases the flexibility of
the GFDM waveform [8]. An up-conversion process is
performed before adding the sub-carriers signals together to
form the final GFDM signal. The GFDM signal can be
expressed as:
𝑥[𝑛] = ∑ ∑ 𝑔𝑘,𝑚
𝑀−1
𝑚=0
[𝑛]𝑑𝑘,𝑚,
𝐾−1
𝑘=0
(1)
where 𝑑𝑘,𝑚 is the complex data symbol which is transmitted on
the sub-carrier k and the sub-symbol m. 𝑔𝑘,𝑚 represents the
time and frequency shifted version of the impulse response of
the prototype filter, it can be written as:
𝑔𝑘,𝑚[𝑛] = 𝑔[(𝑛 − 𝑚𝐾)𝑚𝑜𝑑𝑁]𝑒
−𝑗2𝜋
𝑘
𝐾
𝑛
, (2)
where n is the sampling index (n=0,……., N-1) and N is equal
to K by M.
+S/P X(n)
d0,0 , … , d0,M-1
UP
CONVERSION
UP SAMPLING
FILTERING
XX
Exp(0)
XX
Exp(j2π((K-1)/K)n)
dK-1,0 ,…, dK-1,M-1
MAPPING
BINARY
DATA
gTx[n]
N
N
Fig. 1: The Basic GFDM Transmitter [9].
Direct implementation of the two above equations (1 and 2)
requires a number of complex multiplications which is equal to
NKM2. However, in this paper, the method used in [3] and
implied a significant reduction in the computation complexity
by reformulating the GFDM transmitter in a similar fashion to
that used in OFDM (employing an IFFT/FFT), is applied.
After the GFDM modulator, the cyclic prefix (NCP samples)
is added to the GFDM signal. One of the important reasons for
this addition is in order to be able to perform the equalisation
process at the receiver side in the frequency domain. After that,
the signal is transmitted through the channel. Assuming perfect
synchronisation and channel estimation processes, the reverse
steps are applied to get the estimated data sequence at the
receiver. Several methods can be used to implement the GFDM
demodulator such as a matched filter, zero forcing and
Minimum Mean Square Error (MMSE); for more details, please
see [1]. The zero forcing method is applied in the paper.
III. LINK QUALITY MODEL
Recently, the link quality model (a PHY abstraction
method) has been effectively employed for evaluating system
performance and in predicting link adaptation precisely based
on the Signal to Interference and Noise Ratio (SINR) measured
by the receiver [10]. The link quality model comprises a vector
of received SINR, the post processing SINR across the coded
block at the input of the decoder for certain channel realisation
is mapped into a single value which is called the Effective SINR
(ESINR). Using this value, the model can predict the Block
Error Rate (BLER), i.e, the Packet Error Rate (PER), for a given
channel snapshot across the OFDM subcarriers which are used
to transmit the coded block. Fig. 2 illustrates the basic concepts
of the abstraction approach which is explained in detail in the
following. Firstly, the post processing SINR per sub-carrier n
(frequency sample) for a certain user i is calculated as [11]:
𝑆𝐼𝑁𝑅𝑖(𝑛) =
𝑃𝑡𝑥
(𝑖)
. 𝑃𝑙𝑜𝑠𝑠
(𝑖)
. |𝐻(𝑖)(𝑛)|
2
𝜎2 + ∑ 𝑃
𝑡𝑥
(𝑞)
. 𝑃
𝑙𝑜𝑠𝑠
(𝑞)
. |𝐻(𝑞)(𝑛)|2
𝑁𝐼
𝑞=1
𝑞≠𝑖
, (3)
where q represents the interferer, NI is the total number of
interferers, Ptx is the transmitted power and Ploss is the path loss
including shadowing. Secondly, the abstraction transforms the
vector of SINR for a certain block (OFDM block) using a
mapping function Ф (SINR) to another domain, which is related
to the mapping function. After that, the transformed values are
linearly averaged over the block before the average value is
returned back to the SINR domain to get the ESINR (γeff) using
Ф-1 as shown in the following equation:
𝛾𝑒𝑓𝑓 = Ф
−1 [
1
𝐽
∑ Ф(𝛾𝑗)
𝐽
𝑗=1
] , (4)
where J is the number of sub-carriers and 𝛾𝑗 is the SINR for the
sub-carrier i. Different methods for mapping have been
discussed in the literature, namely the Exponential Effective
SINR mapping, where Ф is replaced by the negative
exponential function and Mutual Information Effective SINR
Mapping (MIESM). In this paper, the MIESM method is
proposed due to its simple structure and high accuracy
compared to the other methods [10]. The details of this
approach will be given in the next sub-section. Finally, the
ESINR (γeff) will be used to calculate the BLER based SNR
versus BLER curves in the Additive White Gaussian Noise
(AWGN) case. This technique has been widely validated for
OFDM waveform in different works, for example [10, 11].
System Level Link Level
-Generate Frequency
selective channel H(f).
-Determine the
received SINR of each
sub-carrier.
Link Adaptation
,Scheduling,ARQ ,etc
Mapping Function
e.g. MIESM,EESM
BLERAWGN
(PHY Abstraction
Mapping)
Throughput, Packet
Error Rate(PER), etc.
BLER
SINR =[SINR1,……..SINRJ]
Fig. 2: PHY link-to-system mapping procedure.
A. Mutual Information Based Link Quality Model
As mentioned in [10], the MI-based PHY abstraction
technique can be separated into modulation and coding models.
Accordingly, Fig. 3 shows the MI-based link quality model
structure, and a brief description for each model is given below:
1-Modulation Model
In this model, the description of the maximum channel
capacity of a specific modulation scheme is given based on a
symbol-by-symbol basis without considering the decoding
information loss. The Symbol Information (SI) of the channel
symbol, for a given SNR value (γ), is expressed as:
𝑆𝐼(𝛾, 𝑚) = 𝐸 [𝑙𝑜𝑔2
𝑃(𝑌|𝑋, 𝛾)
∑ 𝑃(𝑋)𝑃(𝑌|𝑋, 𝛾)𝑋
], (5)
where 𝐸 is the expected value, 𝑌 is the complex value channel
output symbol with SNR equal to γ, m is the modulation order,
𝑃(𝑌|𝑋, 𝛾) is the AWGN channel transition probability density
conditioned on the noiseless channel symbol 𝑋, and 𝑃(𝑋) =
1
2𝑚
is assumed.
Mod. Model Coding Model
Collection &
correction Stage
MI-metric
Quaility Mapping
Stage
SINR1
SINR2
SINRJ
SI1
SI2
SIJ
S
I
SINR
BPSK
QPSK
16QAM
64QAM
BLER
Eff-SINR
Cr=rn
Cr=r1
MI To
Eff-SINR
Mapping BLER
Multi-state Channel Quality
of one coding block
Mapping Function
Fig. 3: MI-based quality model structure.
2-Coding Model.
This model contains two stages; the SI collection /correction
stage and the quality mapping stage. In the first stage, the SI of
J symbols in each block are collected/corrected and added
together to get the Received coded Bit Information (RBI).
These symbols have SINR values of {𝛾1, 𝛾2, … , 𝛾𝐽} and
modulation orders of {𝑚1, 𝑚2, … , 𝑚𝐽} and the RBI’s
calculation is expressed as:
𝑅𝐵𝐼 = ∑ 𝑆𝐼(𝛾𝑗 , 𝑚𝑗)
𝐽
𝑗=1 (6)
The Received Bit Information Rate (RBIR), which is equivalent
to the sample average of the normalised SI over the received
block for code blocks for a given modulation, with a value in
the range [0,1], can be evaluated as:
𝑅𝐵𝐼𝑅 = 𝑅𝐵𝐼/ ∑ 𝑚𝑗
𝐽
𝑗 (7)
To take the practical coding loss from the Shannon limit into
consideration (the correction process in the first stage), the SI
values can be multiplied by (𝛾𝑐𝑜𝑑𝑒) before they are combined.
As stated in [10], 𝛾𝑐𝑜𝑑𝑒 is close to 1 for Turbo and convolutional
codes. Finally, the RBIR value is then mapped again to the
SINR domain to get the ESINR which will be used to get the
BLER value based on the AWGN look-up table. The coding
model only relates to the performance of the coding system in
AWGN, decoding algorithm and block size.
B. Mutual Information Based Link Quality Model for GFDM
According to the method which is used to implement the
GFDM transceiver in this study [3], the M data sub-symbols
are firstly converted to the frequency domain by taking the FFT.
Since this process distributes the M sub-symbols on M
frequency samples, therefore, the SI distribution is assumed to
be uniform over the frequency samples. Based on this
assumption, the same steps can be used for calculating MI in
the GFDM case as are used for OFDM waveforms [10].
IV. SIMULATION PARAMETERS
A. AWGN and Rayleigh channel models
Here, a comparison between the simulation results and the
PHY abstraction results in the case of AWGN and narrowband
Rayleigh is shown. A cyclic prefix is used to prevent ISI. The
parameters that are used in this case are listed in Table I.
TABLE I: SIMULATION PARAMETERS
Parameter Value
No. of sub-carriers 64
No. of sub-symbols 9
Filter types Dirichlet, RC-0.1, RC-0.9
Channel types AWGN, Narrow band Rayleigh
Channel coding Turbo code
MCS modes QPSK-1/3, 16QAM-1/3
B. System level parameters
A comparison between the system-level results for LTE-A
based on the GFDM waveform using the bit-level simulator,
which is already done by the authors as a part of a previous
study [9], and the PHY abstraction method is also presented. A
3GPP macro-cellular deployment with a frequency reuse factor
of one is used. There are three sectors in each cell, and the cell
radius, cell diameter and Inter-Site Distance (ISD) are R, 2R and
3R respectively [12]. The User Equipment (UEs) locations were
randomly distributed at the street level in the cell and at a
distance between 50-1000 m from the main Base Station (BS).
The 3D extended 3GPP-ITU channel model has been used,
where the effect of the elevation is also taken into consideration
[13]. Table II summarises the system level parameters that have
been used in this case. One thousand channel snapshots have
been produced for each link (between each UE and the main BS
and each UE and each one of the other six first-tier interfering
BSs) to get statistically relevant performance results. The
GFDM parameters for this case are listed in Table III.
TABLE II: SYSTEM-LEVEL PARAMETERS
Parameter Value
Channel model Extended 3D 3GPP-ITU (SISO)
PDSCH simulation models Bit level Simulator & PHY Abstract
Bandwidth 20 MHz
Carrier Frequency 2.6 GHz
Environment Urban-Macro
Cell Radius 500 m
BS transmit power 43 dBm
No. of users per cell 900
BS antenna height 25 m
Antennas Measured patch BS & UE handset as
in[14]
BS down tilt 10 º
Minimum user sensitivity -120 dBm
Link direction Downlink (from BS to UE)
Noise Figure 9 dB
TABLE III: GFDM PARAMETERS
Parameter Value
Sub-frame duration 1ms or 30,720 samples
GFDM symbol duration 66.67µs or 2048 samples
Sub-symbol duration 4.17µs or 128 samples
Subcarrier spacing 240 kHz
Sampling frequency 30.72 MHz
Total No. of sub-carrier (K) 128
No. of active subcarriers (Kon ) 75
No. of sub-symbols per GFDM
symbol (M)
15
No. of GFDM per sub-frame 15
Cyclic prefix length 4.17µs or 128 samples
Prototype filter Dirichlet
Channel coding Turbo code
MCS modes QPSK1/3, 16QAM1/2, 64QAM2/3
V. RESULTS
A. Comparison using AWGN and Rayleigh channel models.
Fig. 4 shows the BER versus SNR performance for two
Modulation & Coding Schemes (MCSs) and three types of
filters for the bit-level and PHY abstraction methods in an
AWGN channel. As we can see, the PHY abstraction results
closely match the simulation results. In this case, the channel
frequency samples are equal to one (AWGN channel), and the
SNR per each frequency sample will be equal (no interference
between the UEs is assumed). This means that the mapping,
averaging and quality mapping processes (look-up table) are
working properly based on the frequency sampling. Moreover,
we see a difference depending on the filter type used at each
MCS. For example, the Dirichlet filter has the best performance
compared to the RC filters due to the absence of Inter-Carrier
Interference (ICI). Additionally, there is a degradation in the
RC filter’s performance due to ICI. This degradation depends
on the roll-off factor of the filter, for example, the difference is
fairly negligible in the case of a roll-off factor of 0.1 when
compared to the orthogonal filter, whilst it becomes around 2
dB in the case of a roll-off factor of 0.9.
Fig. 4: Performance of the two approaches in AWGN.
Fig. 5 illustrates the performance of GFDM in a narrowband
Rayleigh channel. The channel frequency response, in this case,
is flat, this means that the SNR per frequency sample in each
block will be equal. As can be seen, results show a very good
match between the two approaches. Furthermore, a difference
in performance depending on the filter type is also seen.
Fig. 5: Performance Comparison in narrowband Rayleigh
B. System-level analysis
In order to represent realistic channel scenarios for system-
level analysis, the 3D-3GPP ITU channel model is used here.
Both PER and throughput metrics are shown in the performance
evaluation since they are common metrics used in system-level
studies. Fig. 6 illustrates the performance of the two approaches
(the bit-level simulation and the PHY abstraction), PER versus
the SNR at a certain UE location. As mentioned in [10], the
accuracy term, which is used to measure the accuracy of the
PHY abstraction method, is defined as the maximum SINR
difference between the simulated and the predicted results at
BLERs from 1% to 10%. Table IV lists the accuracy term for
different MCSs. It can be seen that the maximum difference is
around 0.6 dB in the 64QAM-2/3 MCS. The above results are
for a unity adjusting factor (γcode). However, we found that in
this case, the best value of γcode depends on the channel type, i.e.
it is not the same value for different channel types.
TABLE IV: Accuracy for different MCSs
MCSs Accuracy 1~10% BLER
QPSK-1/3 0.5 dB
16QAM-1/2 0.5 dB
64QAM-2/3 0.62 dB
Fig. 6: Performance Comparison for certain UE.
Fig. 7 represents the Cumulative Distribution Function
(CDF) of the PER for the UEs in interference-free (SNR) and
0 2 4 6 8 10 12
10
-4
10
-3
10
-2
10
-1
10
0
SNR(dB)
B
E
R
RBIR-RC0.1-16QAM
RBIR-RC0.1-QPSK
RBIR-RC0.9-16QAM
RBIR-RC0.9-QPSK
RBIR-Diri-16QAM
RBIR-DiriQPSK
Sim-RC0.1-16QAM
Sim-RC0.1-QPSK
Sim-RC0.9-16QAM
Sim-RC0.9-QPSK
Sim-Diri-16QAM
Sim-Diri-QPSK
Difference
due to ICI
RC-0.9
16QAM
Difference
due to ICI
RC-0.9
QPSK
0 5 10 15 20 25 30 35 40
10
-4
10
-3
10
-2
10
-1
10
0
SNR(dB)
B
E
R
RBIR-RC0.1-16QAM
RBIR-RC0.1-QPSK
RBIR-RC0.9-16QAM
RBIR-RC0.9-QPSK
RBIR-Diri-16QAM
RBIR-Diri-QPSK
Sim-RC0.1-16QAM
Sim-RC0.9-16QAM
Sim-Diri-16QAM
Sim-RC0.1-QPSK
Sim-RC0.9-QPSK
Sim-Diri-QPSK
0 5 10 15 20 25 30 35 40
10
-3
10
-2
10
-1
10
0
SNR(dB)
P
E
R
Sim-GFDM-QPSK-1/3
Sim-GFDM-16QAM-1/2
Sim-GFDM-64QAM-2/3
RBIR-GFDM-QPSK-1/3
RBIR-GFDM-16QAM-1/2
RBIR-GFDM-64QAM-2/3
interference present (SINR) cases in both methods. The effect
of taking the interference into consideration which leads to
increase PER is clearly seen in this figure. Moreover, the results
of the two methods are close, and the maximum difference
between them is around 4%.
a: SNR case b: SINR case
Fig. 7: CDF of UEs PER in SNR and SINR cases
Fig. 8 shows the CDF for the throughput for both
approaches in interference-free and interference-included
cases; given the use of adaptive MCS selection, i.e. for each
user the best MCS mode is selected. It can be observed that the
simulation and PHY abstraction results are very similar. The
throughput for both approaches is clearly much better in the
interference-free case. It can be seen that 65% of the UEs have
a throughput greater than 20 Mbps in the interference-free case;
while just 20% of the UEs achieve this rate when interference
is considered in the simulator. However, the difference between
the two methods is less in the interference-included case, which
is the more realistic case. Additionally, the maximum
difference in the throughput’s CDF values in both cases,
interference-free and included, does not exceed 4%.
Finally, the total time required to run the system-level
simulation using the PHY abstraction on a PC was 1.59 hours.
The expected time required to run the full bit-level simulation
on a PC-based is around 98,000 hours (although the simulation
was actually executed on the High-Performance Computing
platform at the University of Bristol). This means that around
62,000 times saving in time can be obtained.
Fig. 8: CDF of UEs Throughput in SNR and SINR cases.
VI. CONCLUSION
This paper has proposed an MI-based link quality model for
the GFDM waveform. As the simulation results show, the
results of the bit-level simulator and the PHY abstraction model
are very closely matched. Moreover, a system-level study in a
realistic channel scenario was presented for GFDM.
These results demonstrate that the MI-based link quality
model (PHY abstraction) can be used effectively in the
implementation of GFDM based system system-level studies
and can lead to a significant reduction in the computational
complexity. This will save time and resources required to
measure and study GFDM performance and to analyse its
suitability as a new waveform for 5G systems.
ACKNOWLEDGMENTS
Ghaith Al-Juboori would like to thank the Higher Committee
for Education Development (HCED) in Iraq, Ministry of Oil
and the University of Baghdad for sponsoring his PhD studies.
REFERENCE
[1] N. Michailow, M. Matthe, I. S. Gaspar, A. N. Caldevilla, L. L.
Mendes, A. Festag, et al., "Generalized Frequency Division
Multiplexing for 5th Generation Cellular Networks,"
Communications, IEEE Transactions on, vol. 62, pp. 3045-3061,
2014.
[2] L. L. Hanzo, Y. Akhtman, L. Wang, and M. Jiang, MIMO-OFDM
for LTE, WiFi and WiMAX: Coherent versus Non-coherent and
Cooperative Turbo Transceivers vol. 26: John Wiley & Sons, 2011.
[3] N. Michailow, I. Gaspar, S. Krone, M. Lentmaier, and G. Fettweis,
"Generalized frequency division multiplexing: Analysis of an
alternative multi-carrier technique for next generation cellular
systems," in Wireless Communication Systems (ISWCS), 2012
International Symposium on, 2012, pp. 171-175.
[4] G. Berardinelli, K. Pajukoski, E. Lahetkangas, R. Wichman, O.
Tirkkonen, and P. Mogensen, "On the Potential of OFDM
Enhancements as 5G Waveforms," in Vehicular Technology
Conference (VTC Spring), 2014 IEEE 79th, 2014, pp. 1-5.
[5] B. Farhang-Boroujeny, "OFDM Versus Filter Bank Multicarrier,"
IEEE Signal Processing Magazine, vol. 28, pp. 92-112, 2011.
[6] V. Vakilian, T. Wild, F. Schaich, S. t. Brink, and J. F. Frigon,
"Universal-filtered multi-carrier technique for wireless systems
beyond LTE," in 2013 IEEE Globecom Workshops (GC Wkshps),
2013, pp. 223-228.
[7] N. J. Y. Sun, B. Porat, et al. ''Overview on RBIR-based PHY
Abstraction'' [Online]. Available:
https://mentor.ieee.org/802.11/documents?is_dcn=RBIR&is_group
=00ax
[8] N. Michailow, M. Lentmaier, P. Rost, and G. Fettweis, "Integration
of a GFDM secondary system in an OFDM primary system," in
Future Network & Mobile Summit (FutureNetw), 2011, 2011, pp. 1-
8.
[9] G. R. Al-Juboori, A. Doufexi, and A. R. Nix, "System level 5G
evaluation of GFDM waveforms in an LTE-A platform," in 2016
International Symposium on Wireless Communication Systems
(ISWCS), 2016, pp. 335-340.
[10] W. Lei, T. Shiauhe, and M. Almgren, "A fading-insensitive
performance metric for a unified link quality model," in Wireless
Communications and Networking Conference, 2006. WCNC 2006.
IEEE, 2006, pp. 2110-2114.
[11] D. Halls, A. Nix, and M. Beach, "System level evaluation of UL and
DL interference in OFDMA mobile broadband networks," in 2011
IEEE Wireless Communications and Networking Conference, 2011,
pp. 1271-1276.
[12] 3GPP TS 36.942 V10.2.0, " Evolved Universal Terrestrial Radio
Access (EUTRA):Radio Frequency (RF) System Scenarios,"
December 2010.
[13] R. Almesaeed, A. S. Ameen, E. Mellios, A. Doufexi, and A. R. Nix,
"A proposed 3D extension to the 3GPP/ITU channel model for 800
MHz and 2.6 GHz bands," in Antennas and Propagation (EuCAP),
2014 8th European Conference on, 2014, pp. 3039-3043.
[14] R. Almesaeed, A. S. Ameen, A. Doufexi, and A. R. Nix, "Exploiting
the elevation dimension of MIMO system for boosting handset
capacity," in 2015 IEEE International Conference on
Communication Workshop (ICCW), 2015, pp. 1281-1285.
0 0.2 0.4 0.6 0.8 1
0
0.2
0.4
0.6
0.8
1
PER
P
r
o
b
a
b
il
it
y
(
P
E
R
<
a
b
s
c
is
s
a
)
RBIR-MCS-1(QPSK-1/3))
RBIR-MCS-4(16QAM-1/2))
RBIR-MCS-7(64QAM-2/3))
Sim.-MCS-1(QPSK-1/3))
Sim.-MCS-4(QPSK-1/3))
Sim-MCS-7(64QAM-2/3))
0 0.2 0.4 0.6 0.8 1
0
0.2
0.4
0.6
0.8
1
PER
P
r
o
b
a
b
il
it
y
(
P
E
R
<
a
b
s
c
is
s
a
)
RBIR-MCS-1(QPSK-1/3)
Sim-MCS-1(QPSK-1/3)
RBIR-MCS-4(16QAM-1/2)
Sim-MCS-4(16QAM-1/2)
RBIR-MCS-7(64QAM-2/3)
Sim-MCS-7(64QAM-2/3)
0 20 40 60 80
0
0.2
0.4
0.6
0.8
1
Throughput (Mbps)
P
ro
b
(x
<
=
a
b
s
c
is
s
a
)
Comparison between RBIR & Sim throughput using GFDM
GFDM-SNR
GFDM-SINR
GFDM-SNR-RBIR
GFDM-SINR-RBIR
https://mentor.ieee.org/802.11/documents?is_dcn=RBIR&is_group=00ax
https://mentor.ieee.org/802.11/documents?is_dcn=RBIR&is_group=00ax
| 0non-cybersec
| arXiv |
Rails: Form for selecting an existing parent when creating new child records?. <p>I have a has_many and belongs_to association set up between two models: Project and Task. </p>
<p>I'd like to be able to create a form which enables me to create a new Task and assign an existing Project as a parent. For example, this form might have a pulldown for selecting from a list of existing projects.</p>
<p>There are only a finite set of projects available in this application, so I've created Project records via a seeds.rb file. I do not need to make a form for creating new Projects.</p>
<p>I believe I've achieved a solution by using a <code>collection_select</code> form helper tag in the new Task form. I'm pretty happy with how this works now, but just curious if there are other approaches to this problem.</p>
<pre><code>#models/project.rb
class Project < ActiveRecord::Base
has_many :tasks, :dependent => :destroy
end
#models/task.rb
class Task < ActiveRecord::Base
belongs_to :project
end
#controllers/tasks_controller.rb
class TasksController < ApplicationController
def new
@task = Task.new
respond_to do |format|
format.html # new.html.erb
format.xml { render :xml => @task }
end
end
def create
@task = Task.new(params[:task])
respond_to do |format|
if @task.save
format.html { redirect_to(@task, :notice => 'Task was successfully created.') }
format.xml { render :xml => @task, :status => :created, :location => @task }
else
format.html { render :action => "new" }
format.xml { render :xml => @task.errors, :status => :unprocessable_entity }
end
end
end
end
#views/new.html.erb
<h1>New task</h1>
<%= form_for(@task) do |f| %>
<div class="field">
<%= f.label :name %><br />
<%= f.text_field :name %>
</div>
<div class="select">
<%= collection_select(:task, :project_id, Project.all, :id, :name) %>
</div>
<div class="actions">
<%= f.submit %>
</div>
<% end %>
<%= link_to 'Back', tasks_path %>
</code></pre>
| 0non-cybersec
| Stackexchange |
Behavior of IPSec when receive window gets full. <p>How does IPSec behave when an incoming package can't be marked received in the receive window without the receive window being moved in such a way that a not-yet received package's spot is pushed out of the window?</p>
| 0non-cybersec
| Stackexchange |
My party's pet goblins. I'm currently running a 5th edition game using the Mines of Phandelver module, and my party came up against a unique difficulty.
At the beginning of the module, when the party was ambushed by the Cragmaw clan, they captured one of the goblins alive and negotiated the location of the Cragmaw hideout in exchange for the goblin's life. Later, they took on the Redbrand ruffians, and came to a similar exchange with the goblin Droop: information in exchange for his life.
It has gotten increasingly difficult for the party to justify their ever-growing menagerie of goblins, but they weren't sure what to do with the things. Both of the goblins had been entirely helpful to the good-aligned party (goblins being by nature both disloyal and cowardly), so the idealistic members of the party were loathe to summarily execute them, but the practical members of the party pointed out that the goblins would, if released on their own recognizance, immediately return to a life of raiding and scavenging from vulnerable human settlements for sustenance.
One of the members of the party is a highly charismatic tiefling sorcerer, and he came up with the idea of convincing the goblins that all tieflings were, at one point, goblins. But through performing numerous good deeds over the years, they earned the right to ascend into tieflinghood. He rolled a natural 20 on his Charisma (deception) check, which made the goblins' Wisdom checks effectively moot. He convinced the *hell* out of them.
There are now at least two goblins in Faerun who are convinced that, should they perform enough good works, they will become tieflings. And, having done so, they will be able to demand the respect that they deserve from their larger goblinoid cousins, the hobgoblins and bugbears. | 0non-cybersec
| Reddit |
AngularJS - rejected $http promise with $routeProvider:resolve. <p>I am trying to use <code>resolve</code> in a <code>$routeProvider</code> to display the new route only when a <code>$http</code> request is finished. If the request is successful, the promise resulting from the $http.post() is resolved and the view is rendered. But if the request fails (timeout or internal error for eg.), the promise is never resolved and the the view is never rendered. How can I deal with request failure using <code>resolve</code> ? </p>
<p>The most important parts of the code is bellow :</p>
<p>app.js</p>
<pre><code>$routeProvider.when('/warrantyResult', {
templateUrl : 'partials/warranty-result.html',
controller : 'WarrantyResultCtrl',
resolve : {
response : [ 'Warranty', function(Warranty) {
return Warranty.sendRequest();
} ]
}
});
</code></pre>
<p>controllers.js</p>
<pre><code>angular.module('adocDemo.controllers', []).controller('HomeCtrl', [ '$scope', function($scope) {
} ]).controller('WarrantyCtrl', [ '$scope', '$http', '$location', 'Warranty', function($scope, $http, $location, Warranty) {
$scope.submitWarranty = function() {
$scope.loading = true;
Warranty.setRequestData($scope.data);
$location.path('/warrantyResult');
};
} ]).controller('WarrantyResultCtrl', [ '$scope', 'Warranty', function($scope, Warranty) {
$scope.request = Warranty.getRequestData();
$scope.response = Warranty.getResponseData();
} ]);
</code></pre>
<p>services.js</p>
<pre><code>angular.module('adocDemo.services', []).factory('Warranty', [ '$http', '$timeout', function($http, $timeout) {
/**
* This service is used to query the Warranty Webmethod. The sendRequest
* method is automaticcaly called when the user is redirected to
* /warrantyResult route.
*/
var isDataSet = false;
var requestData = undefined;
var responseData = undefined;
return {
setRequestData : function(data) {
//Setting the data
isDataSet = true;
},
getRequestData : function() {
return requestData;
},
sendRequest : function(data) {
if(isDataSet) {
var request = $http.post('url/to/webservice', requestData);
request.success(function(data) {
responseData = data;
});
return request;
}
},
getResponseData : function() {
return responseData;
}
};
} ]);
</code></pre>
<p>I know i could use a promise around the $http call and resolve it even if the request is a failure, but I'm wondering if there is a simpler solution.</p>
<p>Thanks for reading and, hopefully, helping :)</p>
| 0non-cybersec
| Stackexchange |
Business internet multiple external IP's to one internal network. <p>I have small business internet. Currently the modem they have given me has 4 ethernet ports on it. I would like to get a block of 4 or 5 static IP's from them but I'm wondering what kind of equipment do I need to do the NAT to have one internal network. I have a linksys router with DD-WRT on it but it seems incapable of performing this task. If anyone has done this or something similar I am open to all suggestions.</p>
| 0non-cybersec
| Stackexchange |
Hardware requirements for 100 virtualized high performance Windows 7 desktops?. <p>We are debating whether to add Client Hyper-V or VMWare Player Pro to new Windows 10 desktops later this year and have our developers run their developer tools in a Windows 7 VM on their local desktop.
For security reasons, they will not have admin rights on their local workstation which will only be used to host their VM(s) and for office work not requiring admin rights such as email, web, Microsoft Office etc.).</p>
<p>The developers would have admin rights on the VMs instead. The VMs would be on an isolated network VLAN and AD domain with no Internet access and no direct file transfer or network access between the VM and host. The users will do all their development and testing inside the VMs.</p>
<p>I have not been able to find a true virtual machine "player" that only allows using existing VMs and not creating new ones when installed on a workstation. </p>
<p>Client Hyper-V does not work at all unless the users have either local admin rights on the host machine or are members of the Hyper-V Administrators group which allows them unlimited configuring of VM settings which will make it pretty simple for them to get around restrictions even without admin rights on the host.
VMWare Player is not just a player. It also allows creating new VMs even without admin rights.</p>
<p>Is there any alternative vm software that allows use of existing VMs on their local workstation, but not adding or reconfiguring VM hardware?</p>
<p>If that cannot be done, how can we build a highly available virtual server in Hyper-V that would have the performance needed for heavy software development, long queries and builds and debugging etc.. Many of the developers work with 10 or more applications running at the same time and have 16GB RAM on their current systems.</p>
<p>So, I would guess we would need 2 very powerful severs with a huge amount of RAM to run 100 high memory VMs simultaneously and some kind of virtual SAN. It will also need the disk space and I/O to handle 100 busy workstation VMs. </p>
<p>If there were 100 VMs, we could run 50 on each in a 2 member failover cluster. If one goes down, the other would need to be able to handle the load of all 100 without a problem. We could also do planned live migrations to do maintenance such a Windows Update reboots on the hosts.
We would then need SCVMM to manage them and assign private cloud access to the users so they can access the VMs and also create/revert checkpoints on their software testing VMs.</p>
<p>Since we have limited money, what would be a cost effective hardware design that could make this work (server specs etc.) and what ballpark price range would we expect to pay using hardware from a manufacturer like Dell or HP etc..? </p>
<p>If the costs are astronomical, we would then go back to the plan of adding VMs locally on workstations and try to find ways to restrict the users from creating unauthorized VMs.</p>
| 0non-cybersec
| Stackexchange |
Changing parameters for GCP CLoud run with gcloud command. <p>When we change <code>labels</code> for existing <code>CLoud Run serivces</code> using <code>gcloud</code> command , it does a <code>deployment</code> as well as <code>revision</code> change</p>
<pre><code> $gcloud run services update test --update-labels env=prod,test=test1
✓ Deploying... Done.
✓ Creating Revision...
✓ Routing traffic...
Done.
Service [test1] revision [test1-00003-wik] has been deployed and is serving 100 percent of traffic at https://test1-ukliefksia-uc.a.run.app
</code></pre>
<p>Does it cause downtime during label only change without any code change ? It seems traffic is routed and so no downtime for application . Please confirm</p>
| 0non-cybersec
| Stackexchange |
How does it make you feel?. | 0non-cybersec
| Reddit |
Awesome tribute to Murakami. | 0non-cybersec
| Reddit |
SRP-6 vulnerabilities when N is small. <p>I'm one of the developers of an application which uses SRP-6 as the authentication mechanism. The authentication part of the code is very old and uses N with only 256 bits (all arithmetic is done in modulo N). After receiving reports of stolen passwords we upgraded to SRP-6a with the size of N 1024 bits.</p>
<p>We are still investigating (both on the client and server side) how the passwords were stolen/broken. I know that SRP-6 with such a low N value is vulnerable to man-in-the-middle attacks and "two-for-one" guessing (<a href="http://srp.stanford.edu/srp6.ps" rel="nofollow">SRP-6 Improvements and Refinements</a> paper by Thomas Wu). The attacks were probably made only on the client side, but this made me very curious.</p>
<p>Would it be possible for an attacker to launch an offline dictionary/brute-force attack on the B public key:</p>
<blockquote>
<p>B = (k*v + g^b % N) % N <br>
N - 256 bits long <br>
b - 152 bits long (random private key - generated using OpenSSL library)</p>
</blockquote>
<p>Is it possible with modern technology? Could the attacker somehow predict or find out the random value b, extract v=g^x % N, then perform a discrete logarithm and find x?</p>
| 1cybersec
| Stackexchange |
Everyone you know will be able to rate you on the terrifying ‘Yelp for people’ — whether you want them to or not. | 0non-cybersec
| Reddit |
MVC controller API access in Blazor not working with .NET Core 3.0. <p>I am trying to setup a Blazor Server side app, but running into an issue with the app reading data from my MVC Controller API. I have a controller for my model Study called StudyController. I can access the json data for my GetAll() route "/studies" when I launch the Blazor app, but the Blazor app is not reading the data. Code below:</p>
<p>StudyController:</p>
<pre><code>[Route("studies")]
[ApiController]
public class StudyController : ControllerBase
{
private StudyRepository _ourCustomerRespository;
public StudyController()
{
_ourCustomerRespository = new StudyRepository();
}
//[Route("Studies")]
[HttpGet]
public List<Study> GetAll()
{
return _ourCustomerRespository.GetStudies();
}
}
</code></pre>
<p>Razor page function section trying to access data:</p>
<pre><code>@functions {
IList<Study> studies = new List<Study>();
protected async Task OnInitAsync()
{
HttpClient Http = new HttpClient();
studies = await Http.GetJsonAsync<List<Study>>("/studies");
}
}
</code></pre>
<p>Startup.cs configuration code:</p>
<pre><code> public void ConfigureServices(IServiceCollection services)
{
services.AddMvc(options => options.EnableEndpointRouting = false)
.SetCompatibilityVersion(CompatibilityVersion.Version_3_0);
services.AddControllers();
services.AddRazorPages();
services.AddServerSideBlazor();
services.AddSingleton<WeatherForecastService>();
}
// This method gets called by the runtime. Use this method to configure the HTTP request pipeline.
public void Configure(IApplicationBuilder app, IWebHostEnvironment env)
{
if (env.IsDevelopment())
{
app.UseDeveloperExceptionPage();
}
else
{
// The default HSTS value is 30 days. You may want to change this for production scenarios, see https://aka.ms/aspnetcore-hsts.
app.UseHsts();
}
app.UseHttpsRedirection();
app.UseStaticFiles();
app.UseRouting();
app.UseMvcWithDefaultRoute();
app.UseEndpoints(endpoints =>
{
endpoints.MapControllers();
endpoints.MapBlazorHub();
endpoints.MapFallbackToPage("/_Host");
});
}
</code></pre>
| 0non-cybersec
| Stackexchange |
Compactness of $\ A= \{f: f$ is power series with infinite radius of convergence and is bounded by $1\}$. <p>Consider the set <span class="math-container">$\ K=C[0,1]$</span>, the set of continuous functions on <span class="math-container">$\ [0,1]$</span>, with the supremum norm. Let
<span class="math-container">$\ A= \{f: f$</span> is power series with infinite radius of convergence and is bounded by <span class="math-container">$1\}$</span>.
I am asked to prove or disprove whether A is compact or not.</p>
<p>I tried noting a counterexample to show that the set isn't closed.
<span class="math-container">$$ \sum^{\infty}_{k=0}\frac{(-1)^{k}x^{2k+1}}{(2k+1)!}=\sin(x) $$</span></p>
<p>This is a power series which converges to <span class="math-container">$\sin(x)$</span> which isn't in the set. Does this work?</p>
| 0non-cybersec
| Stackexchange |
How to login into mysql shell from localhost instead of '%'?. <p>I need to grant a permission to a newly created user. I have access to root. But, i can't grant a permission to a new user. When I run:</p>
<pre><code>grant all privileges on 'newuser'.* to 'newuser'@localhost;
</code></pre>
<p>I got this:</p>
<pre><code>ERROR 1044 (42000): Access denied for user 'root'@'%' to database 'newuser'
</code></pre>
<p>The part that I don't understand is why do I logged in as <code>'root'@'%'</code>? Since I logged in with this command:</p>
<pre><code>mysql --protocol TCP -h localhost -u root -p
</code></pre>
<p>But this:</p>
<pre><code>select user(), current_user();
</code></pre>
<p>gives me this:</p>
<pre><code>+----------+----------------+
| user() | current_user() |
+----------+----------------+
| root@::1 | root@% |
+----------+----------------+
</code></pre>
<p>I know only <code>'root'@'localhost'</code> has grant privilege. Then I check <code>mysql.user</code> table which gives me output (only different columns shown here):</p>
<pre><code>+-----------+---------+------------+-----------------------+
| Host | User | Grant_priv | authentication_string |
+-----------+---------+------------+-----------------------+
| localhost | root | Y | |
| % | root | N | NULL |
+-----------+---------+------------+-----------------------+
</code></pre>
<p>Other columns that is not included above for <code>'root'@'localhost'</code> and <code>'root'@'%'</code> are identical.</p>
<p>So, back to my question: How to login into mysql shell from localhost instead of '%'?</p>
<p><strong>NOTE</strong>: I run mysql version 5.5.21 on windows 10 machine.</p>
| 0non-cybersec
| Stackexchange |
Was told to post here - Inspired by Deus Ex: Human revolution's aesthetics. | 0non-cybersec
| Reddit |
(Face Progress Pic) 217lbs to 193lbs and the beginning of a proper beard...hey ladies?. | 0non-cybersec
| Reddit |
After installing Linux Mint 19.1 on SSD_Caddy, it has not been recognised. <ul>
<li><p>Linux Mint 19.1 is installed successfully on a SSD in Caddy in place of DVD driver, on a Laptop Toshiba Satellite C650</p></li>
<li><p>But after installing, Linux Mint 19.1 is not been recognised.</p></li>
<li>This SSD itself with the same Linux Mint 19.1, works fine when connecting it externally through an Enclosure USB.</li>
<li>The SSD itself is able to be written or read files easily through the Caddy</li>
<li>I tried with two Caddies, with the same result.</li>
<li>I tried also two SSDs, with the same result.
Any help is very appreciated</li>
</ul>
| 0non-cybersec
| Stackexchange |
Beautyticket.com 50% off sale Wednesday 4/20-Friday 4/22. Personally I'm too broke right now to take advantage of anymore sales, but here's one more so I can live vicariously through you all! Take an extra 50% off your beautyticket.com purchase from Wednesday through Friday with the code **BIRTHDAY50**. Although the code won't work on items in the VIP room those items will also be discounted even further. The sale starts Wednesday 4/20 and goes through Friday 4/22.
I usually find beautyticket's items to be meh, but you can find some real gems in there sometimes. Currently in stock, MAC eyeshadows in: Bright Sunshine, Warming Trend, Top Knot, Climate Blue, Nocturnelle, Dazzlelight, Stars'N'Rockets, Blanc Type, Rule, Scene, Newly Minted, Wondergrass (Atlantic Blue, Bitter, Contrast, Creme de Violet, Goldmine, Naval, and Print are in the VIP room)
They also have lots of Pixi, Smashbox, and Too Faced items. | 0non-cybersec
| Reddit |
Indicate command line activation successfully completed UWP. <p>I am working on a text-editor app that can be activated via command line. The argument provided is treated as path to file, i.e. <code>pad</code> launches the app but <code>pad "C:\Sample.txt"</code> launches the app and then displays the "Sample.txt" file. This works well in command prompt, but in power-shell after command is executed, the execution completes only after the app is closed. Also, the execution is recorded as failed. Is there any way I can notify the command to be completed successfully from my app itself??</p>
<p>Example of the difference in command line activation of Windows Terminal in both command prompt and power-shell:
<a href="https://drive.google.com/file/d/15gBiCcio3feGwxappgyBm68lezK5I0t2/view?usp=sharing" rel="nofollow noreferrer">https://drive.google.com/file/d/15gBiCcio3feGwxappgyBm68lezK5I0t2/view?usp=sharing</a></p>
| 0non-cybersec
| Stackexchange |
Fractional ideals of maximal orders in quaternion algebras. <p>Let <em>D</em> be a skew field that is central and finite-dimensional over a number field <em>F</em> (in particular: a quaternion algebra over F). Let $\Delta$ $\subseteq$ <em>D</em> be a maximal $\mathcal{O}$$_{F}$-order. Let $\mathfrak{b}$ be a fractional left $\Delta$-ideal and say we have a $\mathbb{Z}$-basis $\omega_1, . . . , \omega_n$ for $\Delta$ with $\omega_1 = 1$. </p>
<p>According to the definition of fractional ideals, we can find <em>d</em> $\in$ $\Delta$ such that <em>d</em>$\mathfrak{b}$ (or $\mathfrak{b}$<em>d</em>?) $\subseteq$ $\Delta$.</p>
<p>Given this setting, what do we know about <em>d</em>? A paper I have recently read has led me to believe that <em>d</em> $\in$ $\mathbb{Z}$ but I don't see why that would be the case. </p>
| 0non-cybersec
| Stackexchange |
How I Keep the Snacking Reasonable.. On day 1, September 14th, I told myself that there would be no 'cheat days,' no 'cheat meals,' and no snacking on junk. healthy foods only. It's been working pretty well, but I must admit that I can't snack on half an avocado, piece of string cheese, and nuts all of the time.
I began thinking of a reasonable snack that I could take once a week. After a few days the idea of buying a bag of popcorn kernels came to mind, and so I did it. It became obvious after the first round that the combination of high calorie / fatty oil would really get in the way of my 130 calorie snack.
So I went out and purchased an air popper for $18 at Wal Mart. After the first round of that it became apparent that trying to add salt and extremely low calorie white cheddar seasoning would only result in them sliding off the popcorn to the bottom of the bowl. Dang! Fortunately, I was able to pick up a bottle of Crisco butter spray. It has no cals, no carbs, no protein, nothing.
It tastes like movie theater popcorn, and it's great! I felt I should share this with /r/loseit in the event that anyone is looking for a light, 'healthy,' and affordable snack to munch on. I know, I know, the air popper is $18, but two bags of kernels, a bottle of crisco spray, and a small bottle of seasoning comes out to $9 and you can get about 60 snacks out of it so consider the air popper as an investment.
I decided that thursday night will be popcorn night for me. I eat it while I'm watching 30 Rock and The Office. | 0non-cybersec
| Reddit |
When is 2 a primitive root for a Sophie Germain prime $p$ or its associate $2p + 1$?. <p>A prime $p$ is a Sophie Germain prime if its associate $2p + 1$ is also prime.</p>
<p>When is $2$ a primitive root for a Sophie Germain prime $p$ or its associate $2p + 1$?</p>
<p>A previous question found that a Sophie Germain prime $p > 3$ is of the form $6k - 1$: Frank Hubeny (<a href="https://math.stackexchange.com/users/312852/frank-hubeny">https://math.stackexchange.com/users/312852/frank-hubeny</a>), Show that a Sophie Germain prime $p$ is of the form $6k - 1$ for $p > 3$, URL (version: 2016-02-21): <a href="https://math.stackexchange.com/q/1665580">Show that a Sophie Germain prime $p$ is of the form $6k - 1$ for $p > 3$</a></p>
<p>So far from the discussion there is an answer for the associate prime $2p + 1$. If $p \equiv 1 \pmod{4}$ then $2p + 1 \equiv 3 \pmod{8}$. This implies $2$ is a primitive root modulo $2p + 1$ since that would make $2$ a quadratic nonresidue of $2p + 1$.</p>
<p>Can anything be said about the Sophie Germain prime $p$ itself given that $2p + 1$ is a prime?</p>
| 0non-cybersec
| Stackexchange |
Problem accessing web based email with Firefox. <p>I am running Natty Narwhal and all of a sudden I am unable to access any web based email (like Yahoo mail) I enter my user name & password and hit the login button and the page that loads keeps resetting really fast and never finishes loading. the URL keeps changing with each reset. if I did not know any better I would assume that it was trying every user name/password combination to attempt to get illegal access to an/my account. However I have been able to bypass that using the Tor browser so I know that is is local to MY copy of Firefox but I do not know what files to replace/remove/edit to fix this problem. Yes I have done a virus scan with Clam Anti virus and found nothing. Please someone HELP!</p>
| 0non-cybersec
| Stackexchange |
All camera commercials should be shot with the camera they are advertising.. | 0non-cybersec
| Reddit |
MWC 2017 showed us the power of nostalgia. | 0non-cybersec
| Reddit |
Software Invoicing System. <p>I own a software firm and I was wondering if is there any invoicing system which I can utilize for free? The system must have required features like Creating Milestones for a particular project, letting client escrow money, allowing client to release payment for individual milestones and to manage all projects efficiently there?</p>
<p>Do you think something similar is already built?</p>
| 0non-cybersec
| Stackexchange |
JQuery - Call the jquery button click event based on name property. <p>I have one <strong>HTML button</strong> like,</p>
<pre><code><input type="button" id="btnSubmit" name="btnName" class="btnclass" value="Click Me" />
</code></pre>
<p>I want to call <strong>JQuery button click</strong> event based on <code>id</code> property means,
we use the code like,</p>
<pre><code>$("#btnSubmit").click(function(){
////////
});
</code></pre>
<p>as well as call <strong>button click</strong> event based on <code>class</code> property means,
we use the code like,</p>
<pre><code>$(".btnclass").click(function(){
/////////
});
</code></pre>
<p>and My question is, I want to call the <strong>button click</strong> event based on <code>name</code> property means, How to do this?</p>
| 0non-cybersec
| Stackexchange |
Five in-home robots that could change your life. | 0non-cybersec
| Reddit |
Found this walking home from college in Welland Ontario.. | 0non-cybersec
| Reddit |
student-teacher model in keras. <p>I'm converting student-teacher model in below url to keras one.</p>
<p><a href="https://github.com/chengshengchan/model_compression/blob/master/teacher-student.py" rel="nofollow noreferrer">https://github.com/chengshengchan/model_compression/blob/master/teacher-student.py</a></p>
<p>How can I give input to two model(student, teacher) and get one output from only student in keras?
I'll set teacher's all tensors with trainable=false, and loss function as difference between student and teacher's output like below : </p>
<pre><code>tf_loss = tf.nn.l2_loss(teacher - student)/batch_size
</code></pre>
<p>As I know, it is possible to give input to only one model when defining model.fit. But in this cases, I should it to both of teacher and student model.</p>
<p>Thank in advance!</p>
| 0non-cybersec
| Stackexchange |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
What is this method called - Abelization of a Group.. <p>Today, I wanted to make a post for this <a href="https://math.stackexchange.com/q/417691/8581">question</a>. There are some approach in which we can overcome the problem like <a href="https://math.stackexchange.com/a/417751/8581">this</a> and <a href="https://math.stackexchange.com/a/59314/8581">this</a>. According to my knowledge, I could solve the problem via the approach I had learned. Since I don't know <em>what is this way called</em>, so I refused to post an answer. I am very thankful if somebody tells me <strong>what is the method named?</strong> Here is some of the preliminaries but not the whole things because it is difficult for me to translate whole story (sorry).</p>
<blockquote>
<p><strong>Definition:</strong> Let $R=\{r_1,r_2,...,r_m\}$, $X=\{x_1,x_2,...,x_n\}$ and $G=\langle X| R\rangle$. And consider the abelian group $G/G'$. If $\alpha_{ij}$ be the sum of the powers of $x_j$ in relation $r_i$ so we can call the following matrix, the <strong>relation matrix</strong> of abelian group $G/G'$: $$M=\begin{pmatrix}
\alpha_{11} & \alpha_{12} & ... & \alpha_{1n}\\
\alpha_{21} & \alpha_{22} & ... & \alpha_{2n}\\
\vdots &\vdots &\vdots &\vdots\\
\alpha_{m1} & \alpha_{m2} & ... & \alpha_{mn}
\end{pmatrix}$$</p>
<p><strong>Definition:</strong> Let $G=\langle X| R\rangle$, such that $|X|-|R|\le 0$. If we can make $M$ to have an standard diagonal form: $$D:=\begin{pmatrix}
d_1 & 0 & ... & 0 & 0\\
0 & d_2 & ... & 0 & 0\\
0 & 0 & d_3 &0 & 0\\
\vdots &\vdots &\vdots &\vdots &d_k\\
0 & 0 & 0 &0 & 0\\\vdots &\vdots &\vdots &\vdots &\vdots\\0 & 0 & 0 &0 & 0
\end{pmatrix}_{m\times n}$$ wherein $d_i\in\mathbb N\cup\{0\}$, by employing elementary row operations, then we can have $G/G'\cong\mathbb Z_{d_1}\times\mathbb Z_{d_2}\times...\mathbb Z_{d_k}$.</p>
<p><strong>For example:</strong> Let $$G=\langle a,b\mid a^{2^{n-1}}=1, a^{2^{n-2}}=b^2, b^{-1}ab=a^{-1}\rangle$$ so $$G/G'=\langle a,b\mid a^{2^{n-1}}=1, a^{2^{n-2}}=b^2, a^2=1, [a,b]=1\rangle$$ Now we have $$M=\begin{pmatrix}
2^{n-1} & 0\\
2^{n-2} & -2\\
2 &0\\
\end{pmatrix}\xrightarrow{R_3\leftrightarrow R_1}\begin{pmatrix}
2 & 0\\
2^{n-2} & -2\\
2^{n-1} &0\\
\end{pmatrix}\to\begin{pmatrix}
2 & 0\\
0 & -2\\
0 &0\\
\end{pmatrix}$$ So $G/G'\cong\mathbb Z_{2}\times\mathbb Z_{2}$.</p>
</blockquote>
<p>Thanks for your time reading my question. :)</p>
| 0non-cybersec
| Stackexchange |
Disable PDF preview for large files in vifm. <p>I have <a href="https://github.com/cirala/vifmimg" rel="nofollow noreferrer">combined</a> vifm with Ueberzug to preview PDF files in a pane. This is very useful for small files, unfortunately it is quite annoying with large files while scrolling across files is not smooth anymore. The chunk of code that enables preview functionality is as follows:</p>
<pre><code>fileviewer *.pdf
\ vifmimg pdfpreview %px %py %pw %ph %c
\ %pc
\ vifmimg clear
</code></pre>
<p><strong>Question:</strong> how to disable PDF preview for files larger than 10M? I experiment with</p>
<pre><code>fileviewer *.pdf
\ if getfsize(expand("%c")) > 10 | echo File too large! | endif
\ vifmimg pdfpreview %px %py %pw %ph %c
\ %pc
\ vifmimg clear
</code></pre>
<p>but without success.</p>
<p>Any idea is appreciated.</p>
| 0non-cybersec
| Stackexchange |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
What does the beam size represent in the beam search algorithm?. <p>I have a question about the <em>beam search algorithm</em>. </p>
<p>Let's say that <code>n = 2</code> (the number of nodes we are going to expand from every node). So, at the beginning, we only have the root, with 2 nodes that we expand from it. Now, from those two nodes, we expand two more. So, at the moment, we have 4 leafs. We will continue like this till we find the answer. </p>
<p><em>Is this how beam search works? Does it expand only <code>n = 2</code> of every node, or it keeps 2 leaf nodes at all the times?</em> </p>
<p>I used to think that <code>n = 2</code> means that we should have 2 active nodes at most from each node, not two for the whole tree.</p>
| 0non-cybersec
| Stackexchange |
A restaurant offers 5 choices of appetizer, 10 choices of main meal and 4 choices of dessert.. <p>A customer can choose to eat just one course, or two different courses, or all three courses. Assuming all choices are available, how many different possible meals does the restaurant offer?</p>
<p>So here is what I thought of. Since the question said that a customer can choose one, two or all of three courses, I would use a Venn diagram for this matter. </p>
<p>First of all I created a situation where A would represent appetizer, B would be main meal and C would be desserts. So if I use a Venn diagram, the intersection in this case which can represent the customer choosing from one up to all three courses. The part where I got confused is will the intersection point between each 3 section of the Venn diagram have different unknowns? Help me out. </p>
| 0non-cybersec
| Stackexchange |
Why does summing up two inequalities alter the solution?. <p>Sorry for the basic question. But take for example:</p>
<p>$$3x-8\leq 0$$</p>
<p>$$-2+3x-x^2\leq 0$$</p>
<p>If we sum these two inequalities we obtain:
$$0\leq x^2-6x+10$$</p>
<p>The solution of this inequality is of course any $x \in \mathbb{R}$. However, we can also attempt to solve them separetly and obtain:
$$x
\leq 8/3$$
$$(x-2)(x-1)\geq 0$$</p>
<p>which of course implies that $x \in (-\infty,1]\cup[2,8/3]$.</p>
| 0non-cybersec
| Stackexchange |
This guy streamed a whole UFC match pretending it was a video game so it wouldn't be taken down for copyright.... | 0non-cybersec
| Reddit |
How can I give temperature monitoring absolute priority over stress testing?. <p>I am trying to stress test my home-built NAS for cooling problems.</p>
<p>Since neither <code>stress</code>, nor <code>FIRESTARTER</code> nor <code>mprime95</code> look after the
temperatures, I want to write a small script that kills all of them (ie the
one of them I am currently running) if the temperature goes up too much:</p>
<pre><code>sudo renice -n -20 $$; \
maxitemp=0; \
while [ $maxitemp -le 40 ]; do
sleep 1
maxitemp=$(s-tui -j | jq "[.Temp|.[]|tonumber]|max")
echo "$(date +%Y-%m-%d_%H:%M:%S) Maximal Temperature $maxitemp"
done; \
echo "$(date +%Y-%m-%d_%H:%M:%S) EMERGENCY KILL BECAUSE OF HIGH TEMPERATURE" | tee -a ~/stresstest.txt; \
killall stress; \
killall FIRESTARTER; \
killall mprime
</code></pre>
<p>However, if I boot up my Ubuntu live CD, connect it to the internet, install
s-tui and jq and mprime and run it, prime95 starts the workers and the
computer (a laptop, since I am testing the test before really running it on
my precious NAS) <strong>stops responding</strong>, I cannot cancel prime95, no mouse
moves any more, just the optical drive goes crazy. <strong>I have to stop it by
pressing the power button long enough to switch the machine off.</strong>
Even when I replace the script from above with a simple</p>
<pre><code>sudo renice -n -20 $$; \
sleep 30;
killall mprime
</code></pre>
<p>Why is that so? How can I give my monitoring and safety nets absolute priority
over the stressing?</p>
<hr>
<h1>Update</h1>
<p>It turned out that priorization was not the problem but mprime using too much RAM which pushed the swap/disk cache out of the RAM what made the drive go crazy and the system unresponsive. </p>
<p><a href="https://www.mersenneforum.org/showthread.php?t=25429" rel="nofollow noreferrer">https://www.mersenneforum.org/showthread.php?t=25429</a></p>
<p>I'll leave this question here because I think the answer of powerload79 can be very helpful to others!</p>
| 0non-cybersec
| Stackexchange |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
$x^2+y^2=2z^2$, positive integer solutions. <p>Determine all positive integer solutions of the equation $x^2+y^2=2z^2$.</p>
<p>First I assume $x \geq y$, and I have $x^2-z^2=z^2-y^2$. Then I have $(x-z)(x+z)=(z-y)(z+y)$, but from here, I don't know how it can help me to describe solutions (I know that there are infinitely many). </p>
| 0non-cybersec
| Stackexchange |
How to find out what causes user shell to be changed to /bin/false. <p>I have the case when one of my users are getting login disabled automatically.</p>
<p>I was trying to find out what is causing this. Found that rkhunter app was monitoring changes in /etc/passwd and restoring saved version in case if change was detected.
Now I have removed rkhunter completelly. But case is still there.</p>
<p>I see in /var/log/secure the lines like
'change user xxx shell from /bin/bash to /bin/false'</p>
<p>And thats all what I have found. Obviously, there is some app that are runing usermod command to do that change.
But I unlikelly unable to find it.</p>
<p>Does anyone had such cases in experience? How can I find source of the issue?</p>
| 0non-cybersec
| Stackexchange |
Vue.JS - how to use localstorage with Vue.JS. <p>I am working on Markdown editor with Vue.JS, and I tried to use localstorage with it to save data but I don't know how to save new value to data variables in Vue.JS whenever the user types!</p>
| 0non-cybersec
| Stackexchange |
ping receives no packets, but tcpdump can see them coming in. <p>I'm migrating an old Ubuntu OpenVZ instance (Jaunty) to a new CentOS 6.3 host (using vzdump/vzrestore).</p>
<p>Now networking does not work properly. Facts:</p>
<ul>
<li>It works just fine if a setup a new OpenVZ instance.</li>
<li>I can connect INTO the old instance perfectly well, but it cannot connect to the outside.</li>
<li>It cannot ping the host, nor anything else.</li>
<li>I've cleared all iptables rules both on host and inside the VE.</li>
</ul>
<p>ping:</p>
<pre><code>root@dolores:/# ping 8.8.8.8
PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.
^C
--- 8.8.8.8 ping statistics ---
11 packets transmitted, 0 received, 100% packet loss, time 9999ms
</code></pre>
<p>At the same time within the VE:</p>
<pre><code>17:49:12.730360 IP dolores > 8.8.8.8: ICMP echo request, id 59701, seq 1, length 64
17:49:12.735095 IP 8.8.8.8 > dolores: ICMP echo reply, id 59701, seq 1, length 64
17:49:13.730305 IP dolores > 8.8.8.8: ICMP echo request, id 59701, seq 2, length 64
17:49:13.735524 IP 8.8.8.8 > dolores: ICMP echo reply, id 59701, seq 2, length 64
17:49:14.730411 IP dolores > 8.8.8.8: ICMP echo request, id 59701, seq 3, length 64
</code></pre>
<p>This output occasionally occurs with some delay, I believe because tcpdump tries to reverse-DNS the ips involved:</p>
<pre><code>17:47:20.977819 IP dolores.40623 > 213.133.98.97.domain: 60247+ PTR? 8.8.8.8.in-addr.arpa. (38)
</code></pre>
<p>I can run tcpdump on the host and get the same output immediately.</p>
<p>Of course, <code>/sys/devices/virtual/net/venet0/statistics/rx_bytes</code> is updating, and none of the <code>/sys/devices/virtual/net/venet0/statistics/rx_</code> error files make a peep.</p>
<p>What's the deal? Where would I look now? The problem must be related to the Ubuntu VE itself, I assume, since it works with newly created ones.</p>
<p>Some more output in case it helps:</p>
<pre><code>root@dolores:/# ifconfig -a
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:0 (0.0 B) TX bytes:0 (0.0 B)
venet0 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00
inet addr:127.0.0.2 P-t-P:127.0.0.2 Bcast:0.0.0.0 Mask:255.255.255.255
UP BROADCAST POINTOPOINT RUNNING NOARP MTU:1500 Metric:1
RX packets:39652 errors:0 dropped:0 overruns:0 frame:0
TX packets:39398 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:3344760 (3.3 MB) TX bytes:3303115 (3.3 MB)
venet0:0 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00
inet addr:78.46.236.xxx P-t-P:78.46.236.xxx Bcast:0.0.0.0 Mask:255.255.255.255
UP BROADCAST POINTOPOINT RUNNING NOARP MTU:1500 Metric:1
</code></pre>
<p>.</p>
<pre><code>root@dolores:/# route
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
default * 0.0.0.0 U 0 0 0 venet0
</code></pre>
<p>On the host:</p>
<pre><code>[root@olive ~]# route
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
static.xxx.236. * 255.255.255.255 UH 0 0 0 venet0
78.46.236.xxx * 255.255.255.224 U 0 0 0 eth0
link-local * 255.255.0.0 U 1002 0 0 eth0
default gw-wan2.little- 0.0.0.0 UG 0 0 0 eth0
</code></pre>
| 0non-cybersec
| Stackexchange |
What does "Throws" do and how is it helpful?. <p>I am new to Java and have just came across a tutorial which uses the"Throws" keyword in a method. I have done a little research into this but still do not really understand it.</p>
<p>From what I have seen so far, it is telling the compiler that a certain exception may be thrown in that particular method. Why do we need to tell the compiler this? I have made many programs using merely a try-catch statement in my methods and it has worked just fine - surely it is these try-catch statements which manage exceptions, right?</p>
| 0non-cybersec
| Stackexchange |
How to pipe output of 'say' to another command. <p>'say' has both -o and -n arguments for various ways to direct the output, but I don't see any way to simply pipe the output to another command (say, sox). Is this a limitation of say, or is there a basic Unix shell feature that will do this?</p>
| 0non-cybersec
| Stackexchange |
WIBTA if I asked my fiancé to not invite the mother of his son to our wedding?. Throwaway because fiancé knows my main account.
My fiancé has a 14 year old son with another woman. They dated in high school, she got pregnant and they tried to make it work but it didn't. Now they have an agreement on 50/50 custody of the boy. I get along with their son very well, he's excited for the wedding and he's going to be our ring bearer.
His mother is another story. In the past 5 years our interactions are not even interactions really. If she calls and I'm the one that picks it up, she just goes "I want to talk to \[son's name\]" or "Let me talk to \[fiancé's name\]". When I had to take their son to her place for the first time becasue my fiancé was busy I said a "Hello, good afternoon" and her response was to close the door once her son had entered the house without saying a word. Nowadays she still does it but I gave up on saying anything long ago. She also refuses to come to the birthday parties we throw for their son and throws her own parties instead where only my fiancé gets invited.
Yesterday while looking through our wedding plans I went to check the guest list and I noticed that my fiancé had included her. He's not pleased with the way she treats me by any means but there are moments where keeping the peace for the sake of their son is the less troubled route. This being one of those. I get what he's trying to do, it is certainly easier for me to understand this than it is for their son. But I really don't want her at the wedding. It's going to be a small one just for us and those we truly care about and having here there just makes it lose the meaning. | 0non-cybersec
| Reddit |
.htaccess File is being Ignored. <p>I have been following <a href="https://www.digitalocean.com/community/tutorials/how-to-use-the-htaccess-file" rel="nofollow noreferrer">this tutorial</a> for setting up my htaccess file. Mainly for SSL reasons and error document reasons <br></p>
<ol>
<li>First issue is this apache2 location:</li>
</ol>
<hr>
<p>sudo nano /etc/apache2/sites-available/default
<hr>
When I use the above filepath it takes me to an empty file. However I figured that it is referring to my Apache2 config file, which is:
<hr>
/etc/apache2/apache2.conf
<hr>
Correct me if I'm wrong though.</p>
<ol start="2">
<li>Secondly, within this file, the tutorial (and many other tutorials) are pointing me a directory. Once the directory is edited, it should look like this: <br>
<code><Directory /var/www/>
Options Indexes FollowSymLinks MultiViews
AllowOverride All
Order allow,deny
allow from all
</Directory></code><br>
However, my directory is not like this. This is mine: <br></li>
</ol>
<p><code><Directory /var/www/SalesChecker>
Options Indexes FollowSymLinks
AllowOverride None
Require all granted
</Directory></code>
<br>
When I try to edit my own directory in any way, it seems to break the apache server and then I am unable to view any of my files from a browser. Also, why is my directory so dissimilar to the example's? <br></p>
<p>My .htaccess file has an error 404 ready to go, but when a user enters an incorrect URL on my server, my error page is ignored (which isn't surprising considering I know that Apache isn't overriding All)</p>
<p>Does anyone have any suggestions or ideas? Is my logic correct here? Am I looking in the wrong Apache folder? Or why when I try to edit my directory it breaks the website? <br></p>
<p>My .htaccess file is in my main website folder.</p>
<p>I'm a newbie to Apache and Linux work in general so any suggestions at all that would improve my knowledge would be appreciated. <br></p>
<p>Thanks! </p>
| 0non-cybersec
| Stackexchange |
Sql server active/passive vs active/active clustering. <p>What is the difference between SQL Server clustering methods:
- Active/Active
- Active/Passive</p>
<p>in simple worlds and an example usage scenario per method...</p>
| 0non-cybersec
| Stackexchange |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.