text
stringlengths
3
1.74M
label
class label
2 classes
source
stringclasses
3 values
How Convenient and Affordable is it to Call India?.
0non-cybersec
Reddit
Any of you ever have a (romantic) relationship with a significant age gap, whether it's boyfriend/girlfriend, spouse, etc.? What were your families' reactions? How did it turn out?. I ask because while I know everyone's experiences will be different, I believe I will find myself in a relationship with an age gap and I'm... wondering what I might expect?
0non-cybersec
Reddit
Borderlands 2 but without the bright colors or the HUD.
0non-cybersec
Reddit
Interaction of fno-exceptions and POSITION INDEPENDENT CODE. <p>I ran into a rather bizarre issue while building a dynamic library. Here are details with a small example:</p> <p>A simple file called <code>static.h</code> whose contents are:</p> <pre class="lang-cpp prettyprint-override"><code>#pragma once #include &lt;string&gt; std::string static_speak(); </code></pre> <p><code>static.cpp</code> looks like this:</p> <pre class="lang-cpp prettyprint-override"><code>#include &quot;static.h&quot; std::string static_speak() { return &quot;I am static&quot;; } </code></pre> <p>one can build a static library with these two files (using cmake) as:</p> <pre><code>add_library(static static.cpp ) </code></pre> <p>Now, consider another file called <code>shared.cpp</code> whose contents are:</p> <pre><code>#include &quot;static.h&quot; std::string dynamic_speak() { return static_speak() + &quot; I am dynamic&quot;; } </code></pre> <p>One can try to build a dynamic library (again using cmake) as:</p> <pre><code>add_library(shared SHARED shared.cpp ) target_link_libraries(shared PRIVATE static ) </code></pre> <p>When one tries to build the above, one will run into the following error:</p> <pre><code>[4/4] Linking CXX shared library libshared.so FAILED: libshared.so : &amp;&amp; /opt/vatic/bin/clang++ -fPIC -g -shared -Wl,-soname,libshared.so -o libshared.so CMakeFiles/shared.dir/shared.cpp.o libstatic.a &amp;&amp; : /usr/bin/ld: libstatic.a(static.cpp.o): relocation R_X86_64_32 against `.rodata.str1.1' can not be used when making a shared object; recompile with -fPIC /usr/bin/ld: final link failed: Nonrepresentable section on output clang-10: error: linker command failed with exit code 1 (use -v to see invocation) ninja: build stopped: subcommand failed. </code></pre> <p>This makes sense. We didn't compile <code>static</code> with <code>POSITION_INDEPENDENT_CODE</code>. That is easily fixable via:</p> <pre><code>add_library(static static.cpp ) set_target_properties(static PROPERTIES POSITION_INDEPENDENT_CODE ON ) </code></pre> <p>Everything works perfectly now when one compiles <code>shared</code> library.</p> <p>Now here is the problem. Let's say I didn't enable <code>POSITION_INDEPENDENT_CODE</code> but instead disabled exceptions (!) in my code as:</p> <pre><code>set(CMAKE_CXX_FLAGS &quot;${CMAKE_CXX_FLAGS} -fno-exceptions&quot;) </code></pre> <p>Now when I try to compile <code>shared</code>, everything still works!! How are exceptions and fPIC related to each other?</p> <p>Here is a repo to reproduce the issue: <a href="https://github.com/skgbanga/shared" rel="nofollow noreferrer">https://github.com/skgbanga/shared</a></p>
0non-cybersec
Stackexchange
Portals.
0non-cybersec
Reddit
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
This owl staring at me.
0non-cybersec
Reddit
I noticed a lot of you love Aldi. I'm a shift manager there. AMA and I'll tell you the truth.. Pro tips: Most companies say they're all about customer service but Aldi really is. Take advantage of this. If you're looking for something but can't find it, just ask. I guarantee they won't mumble and point in a direction. They'll physically take you there. If there is anything you want done or need help with (other than us bagging your groceries) we'll do it. Don't be "needy" but don't be afraid to ask. If you want the freshest produce arrive when we first open or right after 3pm. Always dig to the bottom of the pile though, we rotate the old produce to the top. Usually, you can put your hand on the product and if it's not cold then it has been sitting out overnight or throughout the day. It doesn't mean it's bad, it's just not the best. Our policy on throwing away bad produce is complete discretion. We ask ourselves "would you buy this?". If it's anything other than yes we pitch it. When buying meat, look at the back of the cooler or the product on the bottom, we put the closest expiration dates in the front to rotate it. Same with bread. The deeper you go the newer it is. We don't rotate anything else in the store. If you're digging to the bottom of the chip box you're wasting your time and making our lives miserable. They all have the same dates. We have a double money back guarantee on our food products. Use this to try new things you'd be hesitant to try anywhere else. If you don't like it, bring it back and we'll give you your money back *and* a similar priced product of your choice. It's a win win. You either discover something new you like or you get your money back and something you're used to. Example, you want to try our chips. You buy it and think it tastes like crap. We'll give you your $3 back and a free box of cookies. Compliment your cashier on his/her hard work. It may mean nothing to you but they are busting their ass and we hardly get encouragement or praise from our superiors. Most of the time we just get told we need to be faster, more efficient, and have better productivity. When they sit down to ring you up, that's a mini break for them because they're doing some serious physical labor when they're not ringing. It's an extremely stressful job and the workload is almost unbearable. A few kind words from a customer could make someone's day significantly better. Alright... Ask away, I'll tell you the truth whether it's good or bad. Edit: realized I posted this way too late. I need sleep. Go ahead and ask away and I promise I'll answer when I wake up. **edit two** heading off to work. Keep the questions coming and I'll answer every one after I get off work. Hope you all have enjoyed it so far.
0non-cybersec
Reddit
How to use node-config in typescript?. <p>After installing <code>node-config</code> and <code>@types/config</code>:</p> <pre><code>yarn add config yarn add --dev @types/config </code></pre> <p>And adding config as described in <a href="https://github.com/lorenwest/node-config" rel="noreferrer">lorenwest/node-config</a>:</p> <pre><code>// default.ts export default { server: { port: 4000, }, logLevel: 'error', }; </code></pre> <p>When I am trying to use in my app:</p> <pre><code>import config from 'config'; console.log(config.server); </code></pre> <p>I am getting the error:</p> <pre><code>src/app.ts(19,53): error TS2339: Property 'server' does not exist on type 'IConfig'. </code></pre>
0non-cybersec
Stackexchange
Keep saved wifi spots when reinstalling Ubuntu. <p>When I upgrade to 13.04 at the end of this month, I want to preserve all the wifi passwords that I have saved from my workplace/friends houses/etc. But I don't want to do an 'upgrade' or anything like that, I like to do a fresh install on a reformatted hard drive. </p> <p>How can I preserve all the saved wifi hotspots?</p>
0non-cybersec
Stackexchange
Where are sql profiler trace files stored?. <p>Can't seem to find an answer to this..</p> <p>During a recent sql profile I noticed C:\ was rapidly filling up.</p> <p>Does anyone know exactly where these files are stored? is it part of SSMS?</p>
0non-cybersec
Stackexchange
Daredevil - Netflix Trailer.
0non-cybersec
Reddit
Simple module over $ֿ\mathbb{Z}G$ has a $\mathbb{Z}N$ composition series when $N \triangleleft G$ is nilpotent and of finite-index. <p>Assume that <span class="math-container">$M$</span> is a simple <span class="math-container">$\mathbb{Z}G$</span> module with <span class="math-container">$G$</span> finitely-generated, virtually nilpotent group.</p> <p>Take <span class="math-container">$N\leq G$</span> to be a normal, finite index, nilpotent subgroup.</p> <p>The claim is that <span class="math-container">$M$</span> has a finite-length composition series as a <span class="math-container">$\mathbb{Z}N$</span>-module. How can I see this?</p> <p>One approach I've tried: I know that a module has a finite-length composition series if and only if the module is both Artinian and Noetherian. Now in fact I can prove (with some &quot;heavier&quot; theorems) that <span class="math-container">$M$</span> is Noetherian in this case (this follows because <span class="math-container">$N$</span> is also finitely generated, and nilpotent, hence polycyclic, in essence). But, this approach doesn't use the fact the <span class="math-container">$M$</span> is simple as a <span class="math-container">$\mathbb{Z}G$</span>-module and moreoever I can't prove the descending-chain-condition anyways.</p>
0non-cybersec
Stackexchange
MSBuild: imported project ... Sdk.props was not found. <p>I installed Build Tools for Visual Studio 2017 and tried to build the <a href="https://github.com/DiscUtils/DiscUtils" rel="noreferrer">DiscUtils solution</a> with:</p> <pre><code>&amp; "C:\Program Files (x86)\Microsoft Visual Studio\2017\BuildTools\MSBuild\15.0\Bin\MSBuild.exe" DiscUtils.sln </code></pre> <p>I get for all 51 C# projects:</p> <pre><code>error MSB4019: The imported project "C:\Program Files (x86)\Microsoft Visual Studio\2017\BuildTools\MSBuild\Sdks\Microsoft.NET.Sdk\Sdk\Sdk.props" was not found. Confirm that the path in the &lt;Import&gt; declaration is correct, and that the file exists on disk. </code></pre>
0non-cybersec
Stackexchange
Integration of $\int \frac{\arcsin{e^x}}{e^x}dx$. <p>I've got a problem with this integral:</p> <p>$$\int \frac{\arcsin{e^x}}{e^x}dx$$</p> <p>I got such a result: $$\int\frac{\arcsin{e^x}}{e^x}dx=-\frac{\arcsin{e^x}}{e^x}-\ln|\sqrt{e^{-2x}-1}+e^{-x}|+C$$ but the wolphram alpha and the book where this integral is as an exersise give this answer:</p> <p>$$\int\frac{\arcsin{e^x}}{e^x}dx=x-e^x\arcsin{e^x}-\ln(1+\sqrt{1-e^{2x}})+C$$</p> <p>Where do I make a misteake? This is my solution:</p> <p>$$\int \frac{\arcsin{e^x}}{e^x}dx=\int \frac{e^x\arcsin{e^x}}{e^{2x}}dx $$</p> <p>Now,</p> <p>$t=e^x$</p> <p>$dt=e^xdx$</p> <p>$$\int \frac{\arcsin{e^x}}{e^x}dx=\int\frac{\arcsin{t}}{t^2}dt$$</p> <p>Now, I integrate by parts:</p> <p>$u=\arcsin{t},\ v^{'}=\frac{1}{t^2}$</p> <p>$u^{'}=\frac{1}{\sqrt{1-t^2}},\ v=-\frac 1t$</p> <p>Hence, $$\int \frac{\arcsin{t}}{t^2}dt=-\frac{\arcsin{t}}{t}+\int\frac{dt}{t\sqrt{1-t^2}}$$</p> <p>$s=\frac 1t$</p> <p>$t=\frac 1s$</p> <p>$dt=-\frac{1}{s^2}ds$</p> <p>and I get</p> <p>$$\int\frac{dt}{t\sqrt{1-t^2}}=-\int\frac{ds}{s^2\sqrt{1-\frac{1}{s^2}}\cdot \frac 1s}= -\int\frac{ds}{\sqrt{s^2-1}}=-\ln|\sqrt{s^2-1}+s|+C^{'}$$</p> <p>From this we get:</p> <p>$$\int\frac{\arcsin{e^x}}{e^x}dx=-\frac{\arcsin{e^x}}{e^x}-\ln|\sqrt{e^{-2x}-1}+e^{-x}|+C$$</p>
0non-cybersec
Stackexchange
Rank of matrices problem. <p>Let $A$ and $D$ be two square matrices. Let $P$ be defined as</p> <p>$P= \left( \begin{array}{ccc} A &amp; B \\ C &amp; D \end{array} \right)$. If $A$ is an invertible matrix of order $k$, show that rank $P$= $k+$rank$(D-CA^{-1}B)$. Deduce from this that if rank $P = $ rank $A$, then $D=CA^{-1}B$.</p> <p>I would appreciate any hints or ideas to show this.</p>
0non-cybersec
Stackexchange
How to create a custom layer in Keras with &#39;stateful&#39; variables/tensors?. <p>I would like to ask you some help for creating my custom layer. What I am trying to do is actually quite simple: generating an output layer with 'stateful' variables, i.e. tensors whose value is updated at each batch.</p> <p>In order to make everything more clear, here is a snippet of what I would like to do:</p> <pre><code>def call(self, inputs) c = self.constant m = self.extra_constant update = inputs*m + c X_new = self.X_old + update outputs = X_new self.X_old = X_new return outputs </code></pre> <p>The idea here is quite simple:</p> <ul> <li><code>X_old</code> is initialized to 0 in the <code>def__ init__(self, ...)</code></li> <li><code>update</code> is computed as a function of the inputs to the layer</li> <li>the output of the layer is computed (i.e. <code>X_new</code>)</li> <li>the value of <code>X_old</code> is set equal to <code>X_new</code> so that, at the next batch, <code>X_old</code> is no longer equal to zero but equal to <code>X_new</code> from the previous batch.</li> </ul> <p>I have found out that <code>K.update</code> does the job, as shown in the example:</p> <pre><code> X_new = K.update(self.X_old, self.X_old + update) </code></pre> <p>The problem here is that, if I then try to define the outputs of the layer as:</p> <pre><code>outputs = X_new return outputs </code></pre> <p>I will receiver the following error when I try model.fit():</p> <pre><code>ValueError: An operation has `None` for gradient. Please make sure that all of your ops have gradient defined (i.e. are differentiable). Common ops without gradient: K.argmax, K.round, K.eval. </code></pre> <p>And I keep having this error even though I imposed <code>layer.trainable = False</code> and I did not define any bias or weights for the layer. On the other hand, if I just do <code>self.X_old = X_new</code>, the value of <code>X_old</code> does not get updated.</p> <p>Do you guys have a solution to implement this? I believe it should not be that hard, since also stateful RNN have a 'similar' functioning.</p> <p>Thanks in advance for your help!</p>
0non-cybersec
Stackexchange
In The Shawshank Redemption, Andy plays a recording of Mozart's duet, "Sull'aria . . . che soave zeffiretto" from The Marriage of Figaro. The version played features Edith Mathis and Gundula Janowitz and was released in 1968, at least ten years after the scene occurs in the movie's timeframe..
0non-cybersec
Reddit
failing with creating ftp server. <p>so i'm tring to create an ftp server on one of the computers i had at home, but i'm keep on failing.</p> <p>so what i did:</p> <ol> <li><p>created an acount at NoIP, and got ddns. - working fine.</p></li> <li><p>set an sataic ip to the pc with the ftp server installed and running on it.(10.0.0.10:1990).</p></li> </ol> <p>3.set an port forwarding on my rotuer(dlink 6740U). <a href="https://i.stack.imgur.com/MtliB.png" rel="nofollow noreferrer">the settings</a> </p> <ol start="4"> <li><p>updated my firmware to the last one.</p></li> <li><p>speaked with my ISP provider and thay said: "we block noting".</p></li> </ol> <p>result : no connection. can some one help me? my ddns is: erlichsefi.ddns.net </p>
0non-cybersec
Stackexchange
AMC Website Accidentally Reveals Walking Dead Character Death.
0non-cybersec
Reddit
Solar farm is shaped like a panda,2017 [750 × 449].
0non-cybersec
Reddit
dpkg is broken, how to recover?. <p>When I ran <code>apt-get</code>, the system said that dpkg is broken, use <code>sudo dpkg --configure -a</code> to recover, but when I ran <code>sudo dpkg --configure -a</code>, it showed the following error message:</p> <pre><code>dpkg: error: liboil0.3:amd64 0.3.16-1ubuntu2 (Multi-Arch: no) is not co-installable with liboil0.3 which has multiple installed instances </code></pre> <p>How do I fix this? Please help.</p>
0non-cybersec
Stackexchange
Updating a collection name in Cloud Firestore. <p>Can we change the name of a collection in Cloud Firestore? I have created a collection with 200 documents. Now I want to change the name of the collection. In the Firebase console, I could not find a way to do this.</p> <p>Is it possible to change a collection's name either through code or in the console. Or Is it possible to export documents from Firestore, create a new collection and then import those documents again?</p> <p>Please help.</p>
0non-cybersec
Stackexchange
[50/50] cool alarm clock design (sfw) | using your toe as a doorstop (nsfw).
0non-cybersec
Reddit
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
Visited Nærøyfjord last week in Norway... It was amazing. One of the longest and biggest fjords of Norway..
0non-cybersec
Reddit
TIL RIP-Tire can be frozen yet still move.
0non-cybersec
Reddit
I think someone has gender identity issues..
0non-cybersec
Reddit
Sudo, Virtualbox, and Permission issues. (The Good, The Bad, The Ugly). <p>I'm testing a development image of Linux Mint built by myself and a friend. I'm testing it out by trying to do all the normal things that you would do in a web development workflow (Install an editor, bring up vagrant boxes, etc). While doing this I ran into an interesting permissions issue. When I tried to sudo anything in my <code>$HOME</code> directory I was met with a permission denied. for example </p> <pre><code>sudo vim ~/bad.txt </code></pre> <p>was met with:</p> <pre><code>~/bad.txt" [Permission Denied] </code></pre> <p>So as a test I created a folder in my <code>~/</code> directory and <code>chmod 777</code> it and everything worked in there. So I proceeded to install Vagrant and VirtualBox and noting seemed to go wrong until I ran vagrant up for a plain scotchbox. Where I received the following error</p> <pre><code>There was an error while executing `VBoxManage`, a CLI used by Vagrant for controlling VirtualBox. The command and stderr is shown below. Command: ["import", "/public/home/username/.vagrant.d/boxes/scotch-VAGRANTSLASH-box/2.5/virtualbox/box.ovf", "--vsys", "0", "--vmname", "scotch-box_default_1446564755217_55786_1449843924304_26032", "--vsys", "0", "--unit", "7", "--disk", "/username/VirtualBox/Machines/scotch-box_default_1446564755217_55786_1449843924304_26032/box-disk1.vmdk"] Stderr: 0%...10%...20%...30%...40%...50%...60%...70%...80%...90%...100% Interpreting /public/home/username/.vagrant.d/boxes/scotch-VAGRANTSLASH-box/2.5/virtualbox/box.ovf... OK. 0%... Progress state: VBOX_E_IPRT_ERROR VBoxManage: error: Appliance import failed VBoxManage: error: Could not create the directory '/username/VirtualBox/Machines/scotch-box_default_1446564755217_55786_1449843924304_26032' (VERR_ACCESS_DENIED) VBoxManage: error: Details: code VBOX_E_IPRT_ERROR (0x80bb0005), component Appliance, interface IAppliance VBoxManage: error: Context: "int handleImportAppliance(HandlerArg*)" at line 779 of file VBoxManageAppliance.cpp </code></pre> <p>As you can see it's trying to read a folder named my username in the / directory. So it seems that not only permissions are messed up but something with the path to home is also messed up. So what we would like a little help with is understanding where we screwed up and how we can go about fixing it.</p> <p>I've looked for similar issues so I've checked </p> <pre><code>sudo su - id </code></pre> <p>and the UID is indeed 0. I really want to understand where we screwed up here so we can avoid the same mix ups in the future. Thanks.</p>
0non-cybersec
Stackexchange
How do I change the amount of memory flash can use in chrome?. <p>I've noticed that when I load many flash videos, when flash uses too much memory to store the videos, the flash player crashes on all tabs:</p> <blockquote> <p>The following plug-in has crashed : Shockwave Flash</p> </blockquote> <p>Can I increase the amount of memory flash can use ?</p>
0non-cybersec
Stackexchange
Temptalia's review of the Too Faced White Chocolate Bar palette....ouch.. She had no mercy and [gave it a straight F](https://www.temptalia.com/too-faced-white-chocolate-eyeshadow-palette-review-photos-swatches/). According to her, there were issues with consistency, application, and wear time pretty much across the board. It's a wonder why Too Faced would even bother releasing this when the White Chocolate Chip palette was so poorly received. One would think they were trying to start fresh and do it right this time, but the quality makes it seem more like a holiday cash grab. Also, Temptalia's "look" with it, lol....barely looks like she's wearing eyeshadow at all.
0non-cybersec
Reddit
Ziggy Stardust: The Motion Picture (1983), David Bowies last concert as Ziggy Stardust, filmed in The Hammersmith Odeon on July 3rd, 1973..
0non-cybersec
Reddit
NFL season opener will be Ravens @ Broncos on Thursday night.
0non-cybersec
Reddit
Java BigDecimal Possible Overflow Bug. <p>I was testing boundary conditions on some code involving a <code>BigDecimal</code>, and I noticed that when a <code>BigDecimal</code> is initialized with the String <code>"1e2147483647"</code> it behaves unexpectedly. It seems to have a value between <code>0</code> and <code>1e-2147483647</code>. When I try calling <code>intValue()</code>, I get a <code>NegativeArraySizeException</code>. I should note that <code>2147483647</code> is the max value of an integer on my system. Am I doing something wrong, or is this a problem with <code>BigDecimal</code>?</p> <pre><code>BigDecimal test = new BigDecimal("1e2147483647"); test.compareTo(new BigDecimal(0)); //Returns 1 test.compareTo(new BigDecimal("1e-2147483647")); //Returns -1 test.intValue(); //Throws NegativeArraySizeException </code></pre>
0non-cybersec
Stackexchange
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
ELI5: Why can't we regulate pressure in an airplane to stop ears from popping?.
0non-cybersec
Reddit
The simplest way to make damn near perfect roast chicken (Thomas Keller recipe) [PICS, Glorious PICS]. Crisp, crackling skin and juicy, flavorful meat... what more can you ask for? I know everyone and their mom has blogged about this, but once I tried this chicken, I had to add my voice to the chorus. Hell, Thomas Keller said this would be his choice for his last meal and I don't blame him. See below for my version. I brined mine, but I've made it since without the brine and it was still damn good. This also looks damn impressive, so if you want to show off a bit, it's a good dish for that, without requiring you to slave over the stove for hours on end. Without further ado... [Thomas Keller's roast chicken: Food, By Z style](http://www.foodbyz.com/2010/07/06/thomas-kellers-last-meal-roast-chicken/).
0non-cybersec
Reddit
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
PoisonTap - exploiting locked computers over USB.
1cybersec
Reddit
The Soviet Union's 50 Megaton Monster Nuke.
0non-cybersec
Reddit
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
Who should sign mail with Dkim?. <p>I have an exchange server configured to use an external smarthost to send email. If I want to complete my messages with DKIM signature should it set to my Exchage server o may I ask to my provider (smarthost) to sign them?</p>
0non-cybersec
Stackexchange
Can a problem be solved if value of $z$ is not given?. <p>Can a problem like the following be solved with Cramer's rule?</p> <p>$\left\{\begin{array}{l} &amp;8x+6y-3z=42\\ &amp;3x-6y+z=18\\ &amp;4x-3y-12=0\\ \end{array}\right.$</p> <p>In this problem $z$ is not given for the 3rd equation.</p> <p>Can a such problem be solved in this case? How? </p>
0non-cybersec
Stackexchange
Try me I'm unroastable.
0non-cybersec
Reddit
python-augeas, yum update error in CentOS7. <p>I'm coming across this error below when I run: <code>sudo yum update</code></p> <pre><code>Downloading packages: No Presto metadata available for base python-augeas-0.5.0-2.el7.noarch.rpm | 25 kB 00:00 Running transaction check Running transaction test Transaction test succeeded Running transaction Updating : python-augeas-0.5.0-2.el7.noarch 1/2 Error unpacking rpm package python-augeas-0.5.0-2.el7.noarch error: unpacking of archive failed on file /usr/lib/python2.7/site-packages/python_augeas-0.5.0-py2.7.egg-info: cpio: rename Verifying : python-augeas-0.5.0-2.el7.noarch 1/2 python-augeas-0.4.1-5.el7.noarch was supposed to be removed but is not! Verifying : python-augeas-0.4.1-5.el7.noarch 2/2 Failed: python-augeas.noarch 0:0.4.1-5.el7 python-augeas.noarch 0:0.5.0-2.el7 Complete! </code></pre> <p>I see that the update is expecting a file to be removed. My plan was to find it and remove and then try the update again. However, <code>find -iname "python-augeas-0.4.1-5.el7.noarch"</code> doesn't return anything for me, so I have my doubts that removing that file is the way to go.</p> <p>Admittedly I'm not a sys admin or even very competent when it comes to stuff like this. Any help is appreciated. Thanks.</p> <hr> <p>EDIT 1:</p> <p>As suggested by Michael Hampton, here are the permissions and attributes:</p> <pre><code>$ ls -ld /usr/lib/python2.7/site-packages/python_augeas-0.5.0-py2.7.egg-info drwxr-xr-x. 2 root root 4096 Jun 29 2015 /usr/lib/python2.7/site-packages/python_augeas-0.5.0-py2.7.egg-info $ lsattr -d /usr/lib/python2.7/site-packages/python_augeas-0.5.0-py2.7.egg-info ---------------- /usr/lib/python2.7/site-packages/python_augeas-0.5.0-py2.7.egg-info </code></pre> <hr> <p>EDIT 2:</p> <p>I uninstalled the package with <code>sudo yum remove python-augeas</code>. I then reinstalled with the following error:</p> <pre><code>$ sudo yum install python-augeas Loaded plugins: fastestmirror, langpacks, remove-with-leaves Loading mirror speeds from cached hostfile * base: mirrors.rit.edu * epel: mirror.steadfast.net * extras: centos.chi.host-engine.com * nux-dextop: mirror.li.nux.ro * updates: mirrors.rit.edu Resolving Dependencies --&gt; Running transaction check ---&gt; Package python-augeas.noarch 0:0.5.0-2.el7 will be installed --&gt; Finished Dependency Resolution Dependencies Resolved ====================================================================================================================================================== Package Arch Version Repository Size ====================================================================================================================================================== Installing: python-augeas noarch 0.5.0-2.el7 base 25 k Transaction Summary ====================================================================================================================================================== Install 1 Package Total download size: 25 k Installed size: 71 k Is this ok [y/d/N]: y Downloading packages: python-augeas-0.5.0-2.el7.noarch.rpm | 25 kB 00:00:00 Running transaction check Running transaction test Transaction test succeeded Running transaction Installing : python-augeas-0.5.0-2.el7.noarch 1/1 Error unpacking rpm package python-augeas-0.5.0-2.el7.noarch error: unpacking of archive failed on file /usr/lib/python2.7/site-packages/python_augeas-0.5.0-py2.7.egg-info: cpio: rename Verifying : python-augeas-0.5.0-2.el7.noarch 1/1 Failed: python-augeas.noarch 0:0.5.0-2.el7 Complete! </code></pre> <hr> <p>EDIT 3:</p> <p>Michael Hampton was correct about the permissions of my directory:</p> <pre><code>$ ls -ld /usr/lib/python2.7/site-packages/ drwxr-xr-x. 161 root root 12288 Jan 14 12:47 /usr/lib/python2.7/site-packages/ </code></pre> <p>Solution:</p> <pre><code>sudo chmod 777 /usr/lib/python2.7/site-packages/ sudo yum install -y python-augeas </code></pre>
0non-cybersec
Stackexchange
Extract substring of characters from column. <p>I have a column in SharePoint containing information like this:</p> <p><b>ABCD-D-12345678-10012-.PDF<p> XYZAB-D1-87654321-2110-.PDF<p> ABCD-D0-12345678-10012-.PDF<p> XYZAB-D1-87654321-2110-.PDF<p></b></p> <p>I need to break down this file name into the following groups:<p></p> <p><b>Product#</b> (first part of the string, includes the first dash)<p></p> <p>ABCD-D<p> XYZAB-E1<p> ABCD-A0<p> XYZAB-D1<p></p> <p><b>Serial#</b> (second part of the string, ignores dashes)<p> 12345678<p> 87654321<p> 12345678<p> 87654321<p></p> <p><b>Part#</b> (third part of the string, ignores dashes)<p> 10012<p> 2110<p> 10012<p> 2110<p></p> <p>I'm having a hard time getting <b>"LEFT"</b>; <b>"MID"</b> and <b>"RIGHT"</b> to ignore the first dash to create the first group. The same is true finding the items that are in the mid section. </p> <p>I've tried this <b>=LEFT(Name1,INT(FIND("-",Name1)))</b> but I need it to include the first dash and the rest of the characters until the next dash.</p> <p>The goal is to be able to create three calculated columns where each one of them extracts the data as described above. </p>
0non-cybersec
Stackexchange
How to add iframe to vbulletin?. <p>I want users to be able to embed to iframe videos, no matter from which site. Currently when you do that, the system seems to strip the iframe. I am wondering how to enable posting iframe. I also I'd like to know whether there are any risks in embeding iframes that justified limiting the ability to certain user groups. Thanks</p>
0non-cybersec
Stackexchange
What does Keccak being &quot;efficiently invertible&quot; mean?. <p>Reading through <a href="https://en.wikipedia.org/wiki/SHA-3#Security_against_quantum_attacks" rel="nofollow noreferrer">Wikipedia</a>, I saw this:</p> <blockquote> <p>It has been shown that the Merkle–Damgård construction, as used by SHA-2, is collapsing and, by consequence, quantum collision-resistant, but for the sponge construction used by SHA-3, the authors provide proofs only for the case that the block function f is not efficiently invertible; Keccak-f[1600], however, is efficiently invertible, and so their proof does not apply.</p> </blockquote> <p>So:</p> <ol> <li><p>What does "efficiently invertible" mean in this case? It isn't reversible (as in decryption), so what else could that mean?</p></li> <li><p>Why is Keccak invertible? Is it by design or did they not bother as it's not important?</p></li> </ol>
0non-cybersec
Stackexchange
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
Events?. If Niantic ends up doing periodic events like most other noble games, what kind of events would you guys like to see? Off the top of my head I can think of a few possible events, some better than others. • catch event - ranking event based on number of Pokemon caught within a set amount of time. • personal raid - during the special event raid Pokemon have a chance to spawn on a personal level, ranking based on how many of these Pokemon were found and captured or found and defeated in battle. • team raid - one massive over leveled Pokemon spawns that anybody can attack, the team that deals the most damage wins. • gym capture event - event points earned by capturing event gyms during the event. • pokestop visit event - ranking based on how many pokestops visited during the event. What kind of events would you like to see happen once the game is out?
0non-cybersec
Reddit
Whether a series is convergent or divergent. <p>Is it true that if $\sum u_n$ is convergent, where $u_n$'s are positive real numbers then $\sum \dfrac{u_1+u_2+...+u_n}{n}$ is divergent?</p> <p>I know that if $\lim_{n\to\infty}u_n =0$ then $\lim_{n\to\infty}\dfrac{u_1+u_2+...+u_n}{n}=0$ and it is the necessary condition for a series to be convergent.</p> <p>Someone help please.</p>
0non-cybersec
Stackexchange
arXiv:cond-mat/9709092v1 [cond-mat.dis-nn] 8 Sep 1997 ar X iv :c on d- m at /9 70 90 92 v1 [ co nd -m at .d is -n n] 8 S ep 1 99 7 Statistical Topography of Glassy Interfaces Chen Zeng Department of Physics, Rutgers University, Piscataway, NJ 08855, USA Jané Kondev Department of Physics, Brown University, Providence, RI 02912, USA D. McNamara and A. A. Middleton Department of Physics, Syracuse University, Syracuse, NY 13210, USA (October 17, 2018) Statistical topography of two-dimensional interfaces in the presence of quenched disorder is studied utilizing combinatorial optimization algorithms. Finite-size scaling is used to measure geo- metrical exponents associated with contour loops and fully packed loops. We find that contour-loop exponents depend on the type of disorder (periodic “vs” non-periodic) and they satisfy scaling rela- tions characteristic of self-affine rough surfaces. Fully packed loops on the other hand are unaffected by disorder with geometrical exponents that take on their pure values. Elastic manifolds in random media are used to model various condensed-matter systems with quenched disor- der, including flux-line arrays in dirty type-II supercon- ductors [1], and charge density waves [2]. These dis- parate systems exhibit a common feature, namely a low temperature glassy phase in which static and dynamic properties are dominated by the disorder. One of the simplest models used to study this glassy phase is given by a 2-dimensional isotropic interfaces embedded in a 3-dimensional disordered medium. The interface Hamil- tonian in the continuum limit is H({h(x)}) = ∫ d2x [ K 2 |∇h(x)|2 + V [x, h(x)] ] , (1) where h(x) is the height of the interface above a flat basal plane indexed by a 2-dimensional vector x, and K is the elastic stiffness constant. Depending on whether the otherwise uncorrelated random potential V [x, h(x)] is non-periodic or periodic along the height direction, the interface is usually referred to as a random manifold or a random elastic medium, respectively [3]. Much of the analytical understanding of these glassy interfaces comes from functional renormalization group calculations [4,5]. The random manifold is found to have a zero-temperature fixed point characterized by a rough- ness exponent ζ ≈ 0.41 [4], i.e., the width (W ) of the interface, as measured by the square root of the height variance, scales with its lateral linear size (L) asW ∼ Lζ. The random elastic medium on the other hand exhibits a low-temperature fixed line below a glass transition. Along this line the interface is super-rough (W ∼ ln(L)), while in the high temperature phase it ismarginally rough (W ∼ √ ln(L)) [5]. Recent numerical studies of the exact ground-state roughness based on combinatorial optimiza- tion algorithms strongly support the above picture [6]. In this letter, we apply further refined implementations of these polynomial-in-time algorithms to study the to- pography [7] of disordered interfaces at zero temperature. In contrast to the usual paradigm of a rugged landscape [8] where the surface morphology is described in terms of height-height correlations, we instead focus on extended, non-local features of the random geometry as expressed by contour loops (i.e., lines of constant height) and fully- packed loops (defined below). We measure different geo- metrical exponents for the two types of loops and check various scaling relations among them (see Eq. (5)). This approach has proven to be very useful in characterizing the morphology of rough surfaces whenever the complete height profile is available [9]. From the results obtained for contour loops our main conclusion is that the glassy interfaces studied are self- affine and rough with roughness exponents in good agree- ment with theoretical findings. The study of fully packed loops on the other hand addresses the question of the effect of quenched disorder on critical fluctuations. Namely, the discrete interface models we employ map to disordered fully packed loop models. In the absence of disorder this loop model is critical and its exponents have been calculated exactly using Bethe ansatz and Coulomb gas techniques [10]. Unexpectedly, here we find that the values of the pure exponents are unaffected by disorder. a. Models and algorithms To simulate both random and random-periodic interfaces, we consider a simple cu- bic lattice with random bond weights (energies) and its directed (111)-interface. This interface, to be precise, is defined on the dual lattice with each elementary plaque- tte (a square) intersecting a single bond of the simple cubic lattice. The cost of such an interface is defined to be the sum of the weights of all the bonds that it cuts. In the case of the random manifold the integer- valued weight of each bond is chosen independently and 1 http://arxiv.org/abs/cond-mat/9709092v1 uniformly in the interval [0, 1000]. When simulating a random elastic medium the random weights are sampled in the same way with the important difference that the weights of all the bonds directly above one another along the (111) direction are set equal. In other words, the bond disorder is uncorrelated for the former and peri- odic along the height direction for the latter, reflecting the intrinsic periodicity of the random elastic medium [3]. The problem of finding the ground state of an interface in the presence of quenched disorder is that of minimiz- ing its total energy cost. Employing max-flow-min-cut and minimum-cost perfect-matching algorithms, for the case of random disorder and random-periodic disorder respectively, enables us to determine the exact ground state interface in time that grows only polynomialy with L. This allows us to simulate relatively large system sizes for many disorder realizations. The max-flow-min-cut algorithm interprets the simple cubic lattice as a directed flow network. Each bond of the lattice is directed along the (111) direction, and its ran- dom weight specifies the maximum amount of flow that can be accommodated in this bond. The algorithm finds the interface of minimum cost by searching instead for the maximum flow (with flow conservation) that can be sustained between the bottom and top layers with the in- terface sandwiched in between; see Fig.1. The algorithm works because the interface of minimum cost is the bot- tleneck through which all flow must pass. Fully-Packed Loops (FPL)Contour Loops (CL) FIG. 1. (111) interface of a simple cubic lattice and its two loop representations. An example of a ground-state interface confined between two flat (111) layers is shown. The level set at mean height consists of closed contour loops due to peri- odic boundary conditions. Also shown is the fully-packed-loop (FPL) representation of the same interface (see text for details of construction). Next we note that the (111) projection of the interface gives a rhombus tiling of the plane, which is also equiva- lent to a complete (perfect) dimer covering of a hexagonal lattice. The hexagonal lattice (L) in question is the dual of the triangular lattice formed by the vertices of the rhombi, while the dimers lie perpendicular to their short diagonals [11]. This mapping is purely geometrical in na- ture, but when the disorder is periodic it facilitates the task of finding the interface of minimum cost. Namely, the periodic disorder can be represented entirely by ran- dom bonds on L, and the minimization problem becomes one of finding the perfect matching (dimer covering) with minimum cost. Detailed descriptions of both algorithms can be found in Ref. [12]. b. Geometric exponents and scaling Given the exact shape of the (111)-interface its topography is completely characterized by a contour plot with the level spacing equal to a single step of the the discrete height. The contour plot consists of contour loops which live along the bonds of the hexagonal lattice L. The contours are closed due to periodic boundary conditions which we im- pose in both lateral directions. For example, in Fig.1 we have drawn all the contour loops at mean height, for the (111) interface shown. The union of all the contour loops for different realizations of disorder is the contour loop ensemble. Apart from this natural contour-loop characterization, there exists yet another interesting loop representation of the (111)-interface, the fully-packed loops (FPL). These loops owe their existence to the one-to-one mapping be- tween a (111)-interface and a complete dimer covering of the hexagonal lattice L. By removing the bonds of L that coincide with the dimers, we are left with a configuration of fully-packed loops, as shown in Fig.1, where every site of L belongs to one and only one loop. A physical realiza- tion of FPL are the magnetic domain walls in the ground state of the Ising antiferromagnet on the triangular lat- tice [11]. FPL models of general loop fugacity in the absence of disorder have been studied recently [10] and were shown to be critical for values of the loop fugacity that does not exceed two. The interface-FPL mapping thus allows us to consider the effect of quenched disorder on the critical FPL model on the honeycomb lattice with fugacity equal to one. Following Ref. [9], we consider the fractal dimension of a loop D, the loop distribution exponent τ , the loop correlation exponent xl, and finally the interface rough- ness exponent ζ. These geometrical exponents are used to characterize the morphology of an interface which is sta- tistically invariant under the rescaling h(x) → b−ζh(bx), where b > 1 is an arbitrary rescaling parameter; such interfaces are termed self-affine. The natural quantities associated with a loop are its length s and the radius of gyrationR, both measured here in units of the lattice spacing. For the ensemble of loops we define n(s,R), the number density of loops of length s and radius R. Contour loops of a self-affine interface have no characteristic length scale and we anticipate a scaling form for the number density: n(s,R) = s−(1/D+τ)f(s/RD) . (2) 2 Integrating n(s,R) over all radii gives the number density of loops of length s, n(s) ∼ s−τ , (3) which we use to extract the exponents τ and D (see the following section). Yet another measure that was introduced in Ref. [9] is the loop correlation function g(r) which gives the proba- bility that two points separated by distance r belong to the same loop. Just like in the case of the number density of loops we anticipate a power law g(r) ∼ r−2xl , (4) where xl is the loop correlation exponent. In Ref. [9] scaling relations were derived for the loop exponents τ , D, and xl assuming a self-affine interface of roughness ζ: D = 2− xl − ζ/2 τ = 1 + (2− ζ)/D . (5) These results follow from sum rules for the average loop length and the average number of large loops (i.e., those with radii comparable to ρ) inside an area of linear size ρ. Eq. 5 tells us that there are only two independent ex- ponents so measuring all four and checking the validity of the scaling relations provides an important consistency check on the assumed self-affine nature of the rough inter- face. Furthermore, the second scaling relation suggests a method for measuring the roughness exponent directly from the loop data. Namely, integrating n(s,R) over all s and making use of D(τ − 1) = 2− ζ, we find n(R) ∼ Rζ−3 (6) for the number density of loops of radius R. c. Numerical results We first describe our results for the random elastic medium. Four different sample sizes, L = 72, 120, 240, and 480 were simulated with 104 disor- der realizations for each size. The fractal dimension D and loop exponent τ can be simultaneously extracted from n(s) using a finite- size scaling (FSS) form n(s) = s−τfn(s/L D), which follows from Eq. 3. In order to minimize the statisti- cal noise at large s, we consider instead the cumulative number density N(s) ≡ ∫ s̃>s n(s̃)ds̃, with the scaling form N(s) = s1−τfN(s/L D). Results are summarized in Fig 2. The power-law scaling regime is evident over three decades in loop length (40 < s < 40000). The deviations from scaling at small and large s are attributed to the lat- tice cutoff and finite lattice size, respectively. The best data collapses yield D = 1.46± 0.01 and τ = 2.32± 0.01 for CL, and D = 1.75±0.01 and τ = 2.15±0.01 for FPL. 10 0 10 2 10 4 10 6 s 10 −9 10 −6 10 −3 10 0 N (s ) CL (L=480) FPL (L=480) 0.0 2.0 4.0 6.0 s/L D 0.0 10.0 20.0 N (s )/ s 1− τ L=72 L=120 L=240 L=480 D=1.46 τ=2.32 D=1.75 τ=2.15FPL CL FIG. 2. Cumulative number density N(s) (normalized by total loop number), for CL and FPL; L = 480. FSS analysis for L = 72, 120, 240, and 480, is shown in the inset and used to determine exponents D and τ (see text). N(s) is binned in intervals of 0.08s at successive s to estimate the systematic errors which are smaller than the symbols shown. We have also computed the loop correlation function g(r), from which the exponent xl is extracted using a scaling form g(r) = r−2xlfg(r/L). The best data col- lapses, shown in the inset of Fig. 3, yield xl = 0.50±0.01 and xl = 0.25 ± 0.01 for CL and FPL, respectively. An exact value (xexactl = 1/2) of the loop correlation expo- nent for CL was proposed for self-affine rough surfaces independent of the roughness [9]. Our results (see Ta- ble I) therefore provide further evidence of the universal nature of xl for contour loops. 10 0 10 1 10 2 10 3 r 10 −8 10 −6 10 −4 10 −2 10 0 g (r ) CL (L=480) FPL (L=480) 0.0 1.0 2.0 3.0 r/L 0.0 0.2 0.5 0.8 1.0 g (r )/ r− 2 x l L=72 L=120 L=240 L=480FPL (2xl=0.50) CL (2xl=1.00) FIG. 3. Loop correlation function g(r) for both CL and FPL; L = 480. FSS plots are shown in the inset; systematic errors estimated as in Fig. 2 are smaller then the symbols shown. From Eq. 6 it follows that the roughness exponent ζ can be obtained from n(R). Once again we consider the cumulative number density N(R) for which we pro- pose the scaling form: N(R) = Rζ−2fN(R/L). The re- sults of the FSS analysis are given in Fig 4 which yields ζ = 0.08 ± 0.01 and ζ = 0.00 ± 0.01 for CL and FPL, respectively. 3 10 0 10 1 10 2 10 3 R 10 −9 10 −6 10 −3 10 0 N (R ) CL (L=480) FPL (L=480) 0.0 0.5 1.0 1.5 2.0 R/L −0.5 3.5 7.5 11.5 15.5 N (R )/ R ζ− 2 L=72 L=120 L=240 L=480 FPL (ζ=0.00) CL (ζ=0.08) FIG. 4. Cumulative number density N(R) (normalized by total loop number) for both CL and FPL; L = 480. FSS plots are shown in the inset; systematic errors estimated as in Fig. 2 are smaller then the symbols shown. Given the numerical values of the geometrical expo- nents in the case of the random elastic medium, which are summarized in Table I, it is straightforward to check that the scaling relations, given by Eq. 5, hold for both CL and FPL. Although the small non-zero roughness ζ = 0.08 appears to be in disagreement with the super-rough sce- nario (ζ = 0), it can in fact be understood as an effective exponent due to the extra log-divergence of the interface width. We therefore expect this effective roughness to approach zero with increasing system size as 1/ lnL. We also carried out numerical simulations for the ran- dom manifold. Our results for the geometrical exponents are summarized in Table I. They were obtained in the exact same fashion as in the case of the random elastic medium using a FSS analysis for L = 64, 72, 96, and 150, with the interfaces confined between two boundary layers separated by H = 55, 58, 65, and 78, respectively; see Fig. 1. For each system size 6 × 103 disorder re- alizations were simulated. Our three main conclusions are: First, the roughness exponent ζ = 0.40(2) obtained from N(R) is in excellent agreement with that obtained from a more traditional approach that relies on measur- ing height fluctuations [6]. Second, as in the case of the random elastic medium, geometric exponents of both CL and FPL satisfy scaling relations given in Eq. (5) giving strong support to the claim that this glassy interface is self-affine. Finally, and quite surprisingly, the geometric exponents for FPL remain unchanged from the random- periodic case. Moreover, their values agree, within sta- tistical errors, with those obtained in the absence of dis- order, where the interface is marginally rough due to en- tropic fluctuations [10]. In conclusion, we have measured the geometrical expo- nents of contour loops and fully packed loops associated with the ground states of interfaces in the presence of quenched random and periodically-random disorder. The contour loop results are consistent with the ground state interfaces being self-affine and rough, with roughness ex- ponents in agreement with renormalization group calcu- lations. The geometrical exponents for the fully packed loops were found to be unaffected by the disorder. This discovery is rather unexpected in light of the fact that there is a 1-1 mapping between the two loop types, and it calls for a more detailed study of disordered fully packed loop models with general loop weights. We thank J. Cardy, C.L. Henley, J. Jacobsen, P. Leath, C. Marchetti, and V. Pasquier for useful discussions. We acknowledge support by the NSF through grants DMR- 9214943 (CZ), DMR-9357613 (JK), and DMR-9702242 and Alfred P. Sloan Fellowship (AAM). TABLE I. Geometric exponents of both contour loops (CL) and fully-packed loops (FPL). Rational numbers are the pro- posed exponents. Random Elastic Medium Contour Loops (CL) Fully-Packed Loops (FPL) D = 1.46 ± 0.01 (3/2) D = 1.75± 0.01 (7/4) τ = 2.32 ± 0.01 (7/3) τ = 2.15± 0.01 (15/7) xl = 0.50 ± 0.01 (1/2) xl = 0.25 ± 0.01 (1/4) ζ = 0.08± 0.01 (0) ζ = 0.00 ± 0.01 (0) Random Manifold Contour Loops (CL) Fully-Packed Loops (FPL) D = 1.31 ± 0.02 (?) D = 1.74± 0.01 (7/4) τ = 2.19 ± 0.02 (?) τ = 2.15± 0.01 (15/7) xl = 0.49 ± 0.02 (1/2) xl = 0.25 ± 0.01 (1/4) ζ = 0.40± 0.02 (?) ζ = 0.01 ± 0.01 (0) [1] G. Blatter et al, Rev. Mod. Phys. 66, 1125 (1994). [2] G. Grüner, Rev. Mod. Phys. 60, 1129 (1988). [3] L. Balents, Lecture Notes (unpublished). [4] D.S. Fisher, Phys. Rev. Lett. 56, 1964 (1986). [5] J.L. Cardy and S. Ostlund, Phys. Rev. B 25, 6899 (1982); J. Toner and D. P. DiVincenzo, Phys. Rev. B 41, 632 (1990); Y.-C. Tsai and Y. Shapir, Phys. Rev. Lett. 69, 1773 (1992). [6] A.A. Middleton, Phys. Rev. E. 52, R3337 (1995); C. Zeng et al, Phys. Rev. Lett. 77, 3204 (1996); H. Rieger and U. Blasum, Phys. Rev. B. 55, R7394 (1997). [7] For a review of statistical topography see M.B. Isichenko, Rev. Mod. Phys. 64, 961 (1992). [8] D. Sherrington, to be published in Physica D (1997). [9] J. Kondev and C.L. Henley, Phys. Rev. Lett. 74, 4580 (1995); J. Kondev, D.G. Salinas, and C.L. Henley, un- published. [10] H.W.J. Blöte and B. Nienhuis, Phys. Rev. Lett. 72, 1372 (1994); M.T. Batchelor et al, Phys. Rev. Lett. 73, 2646 (1994); J. Kondev et al, J. Phys. A 29, 6489 (1996). [11] H W J Blöte, and H J Hilhorst, J. Phys. A: Math. Gen. 15, L631 (1982). B. Nienhuis et al, J. Phys. A: Math. Gen. 17, 3559 (1984); C. Zeng and C.L. Henley, Phys. Rev. B. 55, 14935 (1997). [12] U. Derigs, Programming in Networks and Graphs, Springer-Verlag, New York (1988); H. Rieger, Lecture Notes in Physics, Springer-Verlag, New York (1997). 4
0non-cybersec
arXiv
Can I standardly use transformation facts to solve an equation or to find the zeros of a function? ( Example of horizontal stretch).. <ul> <li>Suppose I am asked to find the zeros of :</li> </ul> <p><span class="math-container">$$g(x)= - \frac 12 (\frac 19x^2 - 4)^2$$</span>. </p> <ul> <li>Is the following reasoning formally correct: </li> </ul> <p>(1) <span class="math-container">$g(x)= f(\frac 13 x)$</span> with <span class="math-container">$f(x)= - \frac 12 (x^2 - 4)^2$</span>. </p> <p>(2) I know that in general, if <span class="math-container">$g(x)=f(kx)$</span> then <span class="math-container">$g = \{(\frac xk, y) | (x,y)\in f\}$</span>. </p> <p>(3) The set of all points in <span class="math-container">$f$</span> with a null <span class="math-container">$y$</span> cordinate is : <span class="math-container">$\{ (-2, 0) , (2,0) \}$</span> , since </p> <p><span class="math-container">$ - \frac 12 (x^2 - 4)^2 = 0 \iff (x^2 - 4)^2 = 0 \iff (x^2 - 4)=0 \iff x^2 = 4$</span> <span class="math-container">$ \iff (x=2 \lor x=-2)$</span>. </p> <p>(4) So, the set of all points in <span class="math-container">$g$</span> with a null <span class="math-container">$y$</span>-coordinate is : </p> <p><span class="math-container">$\{(\frac {-2}{k}, 0), (\frac {2}{k}, 0) \} = \{ ( \frac {-2}{\frac 13}, 0), (\frac {2}{\frac 13}, 0)\} = \{( -6,0), (6,0)\}$</span></p> <p>(5) Therefore, the zeros of function <span class="math-container">$g$</span> are <span class="math-container">$x=-6$</span> and <span class="math-container">$x=6$</span>. </p> <p>My question : is using transformation facts a valid way of solving an equation or of finding the zeros of a function? Incidentally, is it standardly accepted in an exam? </p>
0non-cybersec
Stackexchange
Import font, straight integral symbol. <p>I tried a lot (2 days) and try to find a way to extend a answer </p> <p><a href="https://tex.stackexchange.com/questions/304656/using-xits-with-pdflatex">Using XITS with pdflatex</a></p> <p>but I am unable to understand the method here. How do I extend above answer to include vertical closed integrals like '\oint'</p> <p>I have been using straight vertical integral symbols so far and now I need closed integral. How do I do that</p> <p><a href="https://i.stack.imgur.com/u2rSv.jpg" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/u2rSv.jpg" alt="enter image description here"></a></p>
0non-cybersec
Stackexchange
I’m terrified just saying.
0non-cybersec
Reddit
uTorrent causes DNS to stop working occasionally. <p>While using uTorrent, DNS periodically stops responding.</p> <p>The problem appears to not be related to too much bandwidth usage (as seen from the router to the computer), but may be related to some form of flood-protection provided by the router (more incoming connections to router than Windows will accept).</p> <p>How do I get the network to work properly (while still being able to use uTorrent, of course)?</p>
0non-cybersec
Stackexchange
Do women know when they're being handled by a wingman?.
0non-cybersec
Reddit
TIL Smoking hookah is no safer than smoking cigarettes and in fact "Smokers may absorb more of the toxic substances also found in cigarette smoke than cigarette smokers do.".
0non-cybersec
Reddit
Search and replace in a range of line and column. <p>I want to apply a search and replace regular expression pattern that work only in a given range of line and column on a text file like this : </p> <pre><code>AAABBBFFFFBBBAAABBB AAABBBFFFFBBBAAABBB GGGBBBFFFFBHHAAABBB </code></pre> <p>For example i want to replace BBB with YYY in line range 1 to 2 and from column 4 to 6, then obtaining this output : </p> <pre><code>AAAYYYFFFFBBBAAABBB AAAYYYFFFFBBBAAABBB GGGBBBFFFFBHHAAABBB </code></pre> <p>Is there a way to do it with Vim ?</p>
0non-cybersec
Stackexchange
[Image] The difference between a boss and a leader.
0non-cybersec
Reddit
Hey /r/Mac! I am at the South Pole for a year and my MacBook Pro doesn't have GarageBand on it as I assumed it would! We don't have the bandwidth for iTunes so I need help!. Hello, all. As stated I am at the South Pole for a year. I just arrived a couple of weeks ago and brought with me my newly purchased factory refurbished 2014 MacBook Pro, which is my first ever Apple anything. I will be here for a year and I was very much looking forward to using GarageBand to help me learn a new instrument since I will have a decent amount of free time on my hands. However, to my confusion GB isn't installed on my machine, and we do not have the bandwidth to connect to iTunes, let alone the bandwidth to be able to download the app and the libraries from anywhere else. Can anyone help me with any kind of DVD/USB with the app and the libraries on it? Flat-pack mail such as small padded envelopes make it here pretty quickly and I would gladly reimburse the sender the shipping fees for Priority Mail. Again, I am new to Mac and do not know what my options are in this situation, so I appreciate your time and consideration.
0non-cybersec
Reddit
Naive Question About Quantifiers: for all, for some, where, and given.... <p>I was bumped into a question related to quantifiers: and was wondering if anyone can give me a further explanation for the following four statements:</p> <p>Let <span class="math-container">$f: \mathbb{R} \to \mathbb{R}$</span> be a function,</p> <blockquote> <p>Statement 1: Given <span class="math-container">$\epsilon&gt;0$</span>, <span class="math-container">$|f(x)|&lt;\varepsilon$</span></p> <p>Statment 2: <span class="math-container">$|f(x)|&lt;\varepsilon$</span> for all <span class="math-container">$\varepsilon&gt;0$</span></p> <p>Statment 3: <span class="math-container">$|f(x)|&lt;\varepsilon$</span> where <span class="math-container">$\varepsilon &gt;0$</span>.</p> <p>Statment 4: <span class="math-container">$|f(x)| &lt; \varepsilon$</span> for some <span class="math-container">$\varepsilon&gt;0$</span>.</p> </blockquote> <p>I think statement 1 and statement 2 are equivalent and statement 3 and stamens 4 are equivalent. Is my understanding correct?</p> <p>Thank you.</p> <p>[Updated Comment] For sure this is not a homework question, since I been argued with my friend about this topic so I'm trying to seek a more crystal clear way to enhance my understanding..</p>
0non-cybersec
Stackexchange
Cybersecurity Firm Finds Way to Alter WhatsApp Messages.
1cybersec
Reddit
Process is disabled in VS2010 attach to process dialog. <p>I have a VS2010 running on a WTS machine (Windows2008). I'm trying to attach the debugger into a process. The process is running a WPF client. The process is presented in the attach to process dialog, but grayed out and the attach button is disabled.</p> <p>I read through the discussions, and confirmed managed code is enabled for debugger, with no luck. Here are two screenshots representing the current situation (in the first image, the process I'm trying to debug is marked in blue - please note I'm running as admin):</p> <p>snapshot goes here - but was removed by stack overflow...</p> <p>After trying the automatic code type selection, I tried the manual way, with no luck. Here is the screenshot:</p> <p>snapshot goes here - but was removed by stack overflow...</p> <p>Any help would be appreciated.</p> <p>Thanks, Busi</p>
0non-cybersec
Stackexchange
Mixed race couple priest refused to marry celebrates 70th anniversary.
0non-cybersec
Reddit
XCTestCase with Auth0: How to dismiss security alert “XXXX” Wants to Use “auth0.com” to Sign In. <p>So recently Apple introduced this prompt: “XXXX” Wants to Use “auth0.com” to Sign In Where “XXXX” is the ios app name.</p> <p><a href="https://i.stack.imgur.com/ajYob.png" rel="noreferrer"><img src="https://i.stack.imgur.com/ajYob.png" alt="enter image description here"></a></p> <p>This alert/dialog comes up when in the case of Auth0 the user clicks on “Login with Google” or “Login with Facebook”. That’s all nice but when running IOS UI tests, this dialog doesn’t go away when using the usual way of dismissing system dialogs:</p> <pre><code>func doUserLogin(_ app: XCUIApplication) { app.staticTexts["notLoggedInActivelabel"].tap() // this will bring up oauth0 login window in ios // setup a handler to dismiss the system alert let handler = self.addUIInterruptionMonitor (withDescription: "allow oauth") { (alert) -&gt; Bool in // code should come here where the dialog is presented, // but it never does .... alert.buttons["Continue"].tap() // click Continue Button return true } // click the login with GOOGLE button. This brings up dialog “XXXX” Wants to Use “auth0.com” to Login app.scrollViews.otherElements.buttons["LOG IN WITH GOOGLE"].tap() // this step is required when using addUIInterruptionMonitor app.tap() removeUIInterruptionMonitor(handler) } </code></pre> <p>It kinda makes sense to me: This is a security system dialog introduced by Apple in order to improve security. Having it easily dismissed in the code would defeat the purpose.<br> But still, anyone knows if it's possible to dismiss this dialog in an XCTestCase?</p>
0non-cybersec
Stackexchange
How to get enumerated captions below Tikz pictures?. <p>I did some dirty stuff in order to get the captions (i) and (ii) as seen below.</p> <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src="https://i.stack.imgur.com/lw7z2.jpg" alt="tikzwithcap"></p> <p>Basically what I did was add nodes (i) and (ii). The code used was basically the one given in <a href="https://tex.stackexchange.com/a/233398/25723">this</a> answer. It might be important to mention that this was done within two minipages, each with its own tikzpicture.</p> <p>How can I do this in a proper way?</p> <p>An ideal solution would contemplate different sorts of enumerations (letters, numerals, etc).</p>
0non-cybersec
Stackexchange
Steam.tv is live -- and it appears to be Valve's Twitch competitor.
0non-cybersec
Reddit
to land a punch.
0non-cybersec
Reddit
Why is Windows 7 throttling my laptop CPU?. <p>I have been dealing with this problem for <em>months</em>. </p> <h2>The Computer</h2> <ul> <li><strong>Model</strong>: Dell XPS M1330 (<a href="http://reviews.cnet.com/laptops/dell-xps-m1330/4507-3121_7-32465545.html" rel="nofollow noreferrer">specs found here</a>; I have the full 4GB of RAM)</li> <li><strong>Age</strong>: 3+ years</li> <li><strong>OS</strong>: Windows 7 Professional x64</li> </ul> <h2>Problem Investigation</h2> <p>One day I noticed that my computer was intermittently experiencing major slowdowns. It was to the point where there are sometimes several seconds of delay between me pressing a key and the character appearing on the screen. At first I thought that a Chrome update was causing the browser to eat all of my CPU, but eventually I figured out it was happening even when Chrome wasn't open. Finally I got the bright idea to use the Resource Monitor and noticed that Windows was routinely throttling my CPU to 25%.</p> <h2>What I've Tried</h2> <ul> <li>I checked the health of my disk drive and ran pretty much every system maintenance utility that Windows ships with and the problem persisted. </li> <li>I have systematically played with power settings</li> <li>After some Google searching, I found out that the most common reason for this is overheating. So I did the following: <ul> <li>Had all my fans cleaned</li> <li>Had the thermal paste on the heatsinks replaced</li> <li>Used SpeedFan to confirm that temperatures are all normal (except for the GPU, which is apparently normal for this model).</li> </ul></li> </ul> <p>The problem persists. In fact, sometimes it's even worse now. If I really need to I'll suck it up and buy a new one, but I would like advice on how to proceed from here.</p>
0non-cybersec
Stackexchange
How can I generate keypairs, and check the public key against a known public key to check for a match?. <p>Running on headless Ubuntu Linux. I would like to use <a href="https://github.com/SjorsO/keys-generator" rel="nofollow noreferrer">this keypair generator</a>, and check the public keys generated with each run against a single other public key.</p> <p>I know that "recovering" a lost private key is impossible and what not. But I'm not asking if this is a good or bad idea, I'm asking how I can accomplish the process of generating the keypairs and checking the public key. The address I'm checking against is pre-HD wallets. I don't know if that makes a difference, but may be relevant.</p> <p>Consider this a proof-of-concept, demonstration. I would like to generate the keys, compare against the known public key string, then if a match is found: record the public and private key information to a file.</p> <p>I'm thinking I would grep/sed this, or maybe awk, but ultimately, need some direction.</p>
0non-cybersec
Stackexchange
Finding half a diagonal in a rhombus using trigonometric ratios?. <p>So, if you take a rhombus, then call the bottom left hand corner $A$, the top left hand corner $B$, the top right hand corner $C$, and the bottom right hand corner $D$. Then draw the two diagonals. </p> <p>The angle of the bottom left hand corner is $60°$. The side lengths are $10$ cm. Call the point where the diagonals bisect each other $X$. I have to find the distance of $AX$.</p>
0non-cybersec
Stackexchange
How to call data datafetch function only after data is completely store in core data in swift?. <p>I am getting some data from API which I am storing in core data, and retrieving that data stored in core data and displaying it on collectionview.</p> <p>Currently i m facing issue like. my data fetching function is getting called before data stored in function completion hence getting 0 records first time.</p> <pre><code>override func viewDidLoad() { super.viewDidLoad() self.fetchExchangeRateData() // API calling + saving data to core data self.retrieveExchangeRateData(). // data fetching from core data } @objc func fetchExchangeRateData() { if isConnectedToInternet() == true { let webserviceURLNew = webserviceURL + &quot;live?access_key=&quot; + accessToken + &quot;&amp;format=1&quot; Webservice.shared.getExchangeRateData(with: webserviceURLNew) { (exchangeRateData, error) in if error != nil { return } guard let exchangeRateData = exchangeRateData else {return} self.exchangeRateData = exchangeRateData CoreManager.shared.saveExchangeRateData(exchangeRate: self.exchangeRateViewModel!.exchangeRate) } } else { showAlert(title: &quot;No Internet Connection&quot;, message: &quot;Please check your internet connection&quot;) } } </code></pre> <p>Please suggest the way yo handle this problem.</p>
0non-cybersec
Stackexchange
My two favorite shows and my Emmy, in a new display..
0non-cybersec
Reddit
YSK: recalls of frozen vegetables at Costco, and Kroger-affiliated stores. I recently received notifications that frozen vegetables sold at Costco (CRF and Watts Bros brands) and Kroger brand frozen vegetables are being recalled due to listeria contamination. Listeria is nothing to screw around with. If you have these frozen vegetables, return them!
0non-cybersec
Reddit
UWP - TextBox is missing the line feed (\n) character in Windows 10 build 14393. <p>After retargeting my UWP project to Windows 10 build 14393 (Anniversary update) I found that the line feed (<strong>\n</strong>) character is missing from the output Text when I press enter in a TextBox with <code>AcceptsReturn="True"</code>. When I retarget back to 10240, pressing enter in the TextBox produces the expected CR+LF characters i.e. <strong>\r\n</strong>.</p> <p>If this is a feature and not a bug, what can I do to bring back the classic TextBox behavior when pressing enter adds both CR and LF characters to the output Text?</p>
0non-cybersec
Stackexchange
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
SVN - Using branch for beta release of game and advise for repository layout?. <p>I'm setting up the SVN repository for my hobby game project.</p> <p>I have the main version of the game and a beta version. The game is already online with a few players. The beta version is isolated from the main game and is used to test new features and changes which might break the main game.</p> <p>For the beta version I would like to use a branch. Majority of the codebase is just the same with a few variations so using a branch seems the most sensible option. The branch would be pretty much permanent. Certain approved features would eventually be moved to the main version.</p> <p>For the main version I'm using the trunk.</p> <p>This is how my repository layout would look like:</p> <pre><code>/ trunk/ source branches/ Dev-July-2020/ source BETA/ source tags/ 1.0.0/ source 1.0.1/ source 1.0.2/ source ...etc </code></pre> <p>Is it OK to have a permanent branch like that? According to the SVN handbook branches normally have a finite lifespan. Here my 'Dev-July-2020' branch is a temporary one like that and is used for normal development work for the main version (small changes and bugfixes). These will be eventually be merged back to the trunk and the branch would be deleted. The source in the trunk is pretty much stable and the tags are snapshots of the trunk.</p> <p>Does my repository layout look decent or are there things that I should definitely change/reconsider?</p>
0non-cybersec
Stackexchange
In which Matt Damon sits around for eleven hours over the course of two days, drinking beer and telling stories..
0non-cybersec
Reddit
Public bus attempting to return into Steven King book.
0non-cybersec
Reddit
Laura Loomer in response to the recent attack in NYC..
0non-cybersec
Reddit
What was the first internet community you participated in?. Mine would be the forums on Nickelodeon. I remember that they were HTML based and I would spend all day making crazy marquees and all sorts of stuff. I think I left when they changed their format. What about you Reddit?
0non-cybersec
Reddit
ITAP of a biker in Copenhagen.
0non-cybersec
Reddit
Dependency of the properties of numbers&#39; subsets. <p>Let $a$ be the number of different sums of all the subsets of a set $A$ of $n$ real numbers (let's suppose the sum of an empty set is $0$). Let $b$ be the number of ordered pairs of the subsets of $A$ with the same sums (the subsets in the pair may be the same one, but they are in that case only one pair). Prove that $6^n\ge ab$<br/> <br/>I don't know if it will have any use but I figured out that the number of subsets is $2^n$, $2^n\ge a\ge 1$, $(2^n\cdot(2^n-1))\ge b\ge2^n$. $b$ for a subset of subsets with the same sum is increasing faster than the number of subsets inside this subset. Experimenting I only managed to receive sums of $2$s with different exponents.</p>
0non-cybersec
Stackexchange
python38, python3, python 2.7, and python 3.8, a file called &quot;secretstorage&quot; and some serious file differences. <p>I have Xubuntu based on 20.04. A newish install. My security is a VPN and the firewall from the router. </p> <p>I have python2.7, python3(no decimal), and python3.8. python3 is VERY different from the others. It includes a folder and filed called "secretstorage" that I assumed was an easter egg. Many files in there seem to be appended with x.egg.info. </p> <p>In /etc, all three have a single file. python3 has one marked debian_config. The others have a file called sitecustomized.py</p> <p>Under the /bin folder, python2.7 and python3.8 seem normal to my untrained eye. python3 has a folder filled with dist-packages that looks like the install pkgs of games and emulators I got from Lutris, recently. Many end with .egg.info and there is one called secretstorage, which originally made me laugh. It contained what was at least one clearly a joke file(I haven't looked at the others) that pretended to be a file accidentally partially decoded. I don't specifically remember doing a hash check, but I have been consistent about it since learning about them. </p> <p>The secretstorage file has some sort of wiki entry that makes it seem legit. There also seems to be a redirect to python2.7.1 a couple of levels inside the python3 directory that I have not taken a pic of, yet.</p> <p>I have not deleted anything because I am not sure I would get it all and also for documentation. Plus, I am not sure if it is a joke, tbh. I have many pictures of it all, though.</p> <p>So, should I delete this as malware that I somehow got from Lutris.com or perhaps a man-in-the-middle situation, I guess? </p> <p>Am I being pranked, or is this a legit problem? Some Bing searches, and a search of LinuxQuestions, as well as Ask Ubuntu find no matches to secretstorage, python38, python3(no decimal).</p>
0non-cybersec
Stackexchange
Today is my Birthday and no one remembered. I mean no one! I have a sort of SO (its complicated at the moment) who has know me as a friend for 10 years! He even forgot. I talked with several friends about my Birthday last week. They forgot. I'm not a kid and Birthdays aren't a huge deal but I'm just so tired of reminding people that I excist. I always remember everyone's Birthdays and try to let them know they are loved. If moneys tight I make them a present but I always do something for the people I love. EDIT to add I bought myself a switch for my birthday and breath of the wild. I've been enjoying it lots. Decided to spoil myself I just want someone to do the same for me someday and I'm now 29. I want to feel like someone genuinely cares about me. Okay end rant. Bed time. EDIT so I didn't check my inbox for two weeks or my posts and my inbox is flooded with beautiful messages. You guys are amazing! The day didn't get much better but the last two weeks got better and I've been happily busy. Thank you all so much for the messages, comments and awards! Like omg thank you
0non-cybersec
Reddit
Remove 1-854-459-2756 pop-up | Free Tool Click to Remove 18544592756.
1cybersec
Reddit
Sell me distributed revision control. <p>I know 1000s of similar topics floating around. I read at lest 5 threads here in SO But why am I still not convinced about DVCS?</p> <p>I have only following questions (note that I am selfishly worried only about Java projects)</p> <ul> <li>What is the advantage or value of committing locally? What? really? All modern IDEs allows you to keep track of your changes? and if required you can restore a particular change. Also, they have a feature to label your changes/versions at IDE level!?</li> <li>what if I crash my hard drive? where did my local repository go? (so how is it cool compared to checking in to a central repo?)</li> <li>Working offline or in an air plane. What is the big deal?In order for me to build a release with my changes, I must eventually connect to the central repository. Till then it does not matter how I track my changes locally.</li> <li>Ok Linus Torvalds gives his life to Git and <em>hates</em> everything else. Is that enough to blindly sing praises? Linus lives in a different world compared to offshore developers in my mid-sized project?</li> </ul> <p>Pitch me!</p>
0non-cybersec
Stackexchange
What impossible to obtain world statistic would you want to know the most?.
0non-cybersec
Reddit
How can the character set for popup menus be controlled in xterm. <p>Somewhere along the way I've changed a setting that has caused the popup windows in xterm to be displayed in Greek characters. The text in the main window is fine, its just the popup windows that are in Greek. How can I change back to using English characters in the popups?</p>
0non-cybersec
Stackexchange
What is the difference between Cond and Case?. <p>In the Elixir programming language, there are two similar constructs <code>cond</code> and <code>case</code>. Both resemble the <code>switch</code> or <code>select</code> statements from other langages</p> <p>both <code>cond</code> and <code>case</code> are described on <a href="https://elixir-lang.org/getting-started/case-cond-and-if.html#case" rel="noreferrer">this page</a></p>
0non-cybersec
Stackexchange
Working with SAML 2.0 in C# .NET 4.5. <p>I am trying to use pure .NET (no external classes, controls, helpers) to create a SAML message. I found some code on the interwebs; this is what I have:</p> <pre><code>private static SamlAssertion createSamlAssertion() { // Here we create some SAML assertion with ID and Issuer name. SamlAssertion assertion = new SamlAssertion(); assertion.AssertionId = "AssertionID"; assertion.Issuer = "ISSUER"; // Create some SAML subject. SamlSubject samlSubject = new SamlSubject(); samlSubject.Name = "My Subject"; // // Create one SAML attribute with few values. SamlAttribute attr = new SamlAttribute(); attr.Namespace = "http://daenet.eu/saml"; attr.AttributeValues.Add("Some Value 1"); //attr.AttributeValues.Add("Some Value 2"); attr.Name = "My ATTR Value"; // // Now create the SAML statement containing one attribute and one subject. SamlAttributeStatement samlAttributeStatement = new SamlAttributeStatement(); samlAttributeStatement.Attributes.Add(attr); samlAttributeStatement.SamlSubject = samlSubject; // Append the statement to the SAML assertion. assertion.Statements.Add(samlAttributeStatement); //return assertion return assertion; } </code></pre> <p>and here is the code I am using to get the XML:</p> <pre><code>var sb = new StringBuilder(); var settings = new XmlWriterSettings { OmitXmlDeclaration = true, Encoding = Encoding.UTF8 }; using (var stringWriter = new StringWriter(sb)) using (var xmlWriter = XmlWriter.Create(stringWriter, settings)) using (var dictionaryWriter = XmlDictionaryWriter.CreateDictionaryWriter(xmlWriter)) { var samlAssertSerializer = new SamlSerializer(); var secTokenSerializer = new WSSecurityTokenSerializer(); assertion.WriteXml( dictionaryWriter, samlAssertSerializer, secTokenSerializer ); } </code></pre> <p>This seemed like it was going to work. However, the message is produces is SAML version 1.0 - I need to work with 2.0.</p> <p>I know I can do some sloppy work and replace some values here and there and this system would work fine. There are very little differences in the message, version being the most important. I am having a hard time finding information on SAML 2.0 for .NET. I do know SAML 2.0 was implemented into .NET recently. I am using Framework 4.5 so I should have access to it. The MSDN page for SamlAssertion says the "majorVersion" is a constant, always set to '1'.</p> <p>I'm guessing there is another namespace I could be working with, but I haven't found it. My requirement is just to get the XML SAML message. I don't need to sign with X509, I don't need the token. Just the SAML XML message.</p> <p>Again, this is a question trying to find out how to do this in native .NET. I have found several SAML helpers and lots of code on how to build the message manually- I'm trying to find the CORRECT solution, if it exists.</p> <p>EDIT: I have found I can use Saml2Assertion. However, I am unable to find a way to get the SAML message written to xml now.</p> <p>EDIT2: I have found how to write the Saml2Assersion object to xml. Sadly, it does not keep the SAML syntax, it writes in pure XML without <code>&lt;saml&gt;</code> tags.</p>
0non-cybersec
Stackexchange
How to quit TeX in interactive mode on CLI in Windows 10?. <p>Suppose I have a file named <code>demo.tex</code> containing:</p> <pre><code>\hrule \vskip 1in \centerline{\bf A SHORT STORY} \vskip 6pt \centerline{\sl by A. U. Thor} \vskip .5cm Once upon a time, in a distant galaxy called \"O\"o\c c, there lived a computer named R.~J. Drofnats. Mr.~Drofnats---or ‘‘R. J.,’’ as he preferred to be called---was happiest when he was at work typesetting beautiful documents. \vskip 1in \hrule \vfill\eject </code></pre> <p>I open <code>cmd</code> on Windows 10 then excute <code>C:\&gt;tex demo.tex</code>. Then there is a star or two stars in the next line. Knuth said that use <code>\relax</code> to quit, but it doesn't works for me. How could I quit?</p> <p>By the way, could I use TeXstudio to run <code>demo.tex</code>?</p>
0non-cybersec
Stackexchange
Implicit Function Theorem Help in a Macroeconomic Model. <p>I'm having trouble with this problem:</p> <p>"A macroeconomic model contains the following equations characterizing its steady state:</p> <p>$1=B(f'(K)+1-Y)$</p> <p>$C+YK=f(K)$</p> <p>$B$ and $Y$ are parameters between $0$ and $1$.</p> <p>The question is, "do these equations implicitly define $C$ and $K$ as $C^1$ functions of $Y$ in an open ball around $(C^*,K^*)$? If so find the derivatives of these implicit functions with respect to $Y$.</p> <p>Now I have no problem doing implicit function theorem problems in my textbook. But I don't know where to start with this one. Help! Can I just take the derivative of $f(k)$ and plug it into the first function?</p> <p>EDIT: Here is what I know about $f$: $$f:\mathbb{R}^+ \to \mathbb{R}^+ , f \in C^2 \text{ and } f' &gt; 0, f'' &lt; 0.$$</p>
0non-cybersec
Stackexchange
3DS is a helluva drug.
0non-cybersec
Reddit
Roommates.
0non-cybersec
Reddit
All of these NBA scores are tied at the same time.
0non-cybersec
Reddit
'The Fall' Is One Of Gaming's Most Overlooked Sci-Fi Stories ($1 on PSN).
0non-cybersec
Reddit
Microservices API gateway vs. Microservices Chassis. <p>I am new to microservices, I heard about microservices chassis but I cant find enough resources online. I would like to know what is the difference between microservices chassis framework and API gateway because as far as I know chassis frmework solves cross-cutting concern problems and some of them are already solved by API gateway .</p> <p>is there any recommendations for a microservices chassis framework for .net ? </p>
0non-cybersec
Stackexchange
No✔️.
0non-cybersec
Reddit