text
stringlengths 3
1.74M
| label
class label 2
classes | source
stringclasses 3
values |
---|---|---|
Focus on the Family's idiotic Christian abstinence education program finds new home: China. (It's a little late for that, eh?). | 0non-cybersec
| Reddit |
Best Location for Holiday n Amazing Movement. | 0non-cybersec
| Reddit |
Fighting with real swords WCGW?. | 0non-cybersec
| Reddit |
Transitivity of dual operators. <p>Near the end of this proof of Burnside's theorem: <a href="https://core.ac.uk/download/pdf/82680953.pdf" rel="nofollow noreferrer">https://core.ac.uk/download/pdf/82680953.pdf</a>, it says that it should be clear that since <span class="math-container">$\mathcal{A}$</span> acts transitively on the vector space, the operators dual to things in <span class="math-container">$\mathcal{A}$</span> should act transitively on the dual space.</p>
<p>In other words, given any two non-zero functionals <span class="math-container">$f,f'$</span> on <span class="math-container">$V$</span>, there should be some <span class="math-container">$A \in \mathcal{A}$</span> such that <span class="math-container">$f(Av)=f'(v)$</span> for all <span class="math-container">$v$</span>. And all we know is that for any non-zero <span class="math-container">$w,w'$</span> there is an <span class="math-container">$A\in \mathcal{A}$</span> such that <span class="math-container">$Aw=w'$</span>.</p>
<p>I can't think of any easy explanation for this (that doesn't rely on already having proved the theorem). Can anyone help?</p>
| 0non-cybersec
| Stackexchange |
The insane amount of fog in my town on new years eve. | 0non-cybersec
| Reddit |
On the conditions of a Riemann integral substitution. <p>Consider the following statement: </p>
<blockquote>
<p>Consider two functions <span class="math-container">$f:[a,b]\to \mathbb{R}$</span> and <span class="math-container">$\phi:[c,d]\to [a,b]$</span> with the following properties:<br>
1)<span class="math-container">$f$</span> is continuous<br>
2)<span class="math-container">$\phi$</span> is bijective, <span class="math-container">$\phi$</span> and <span class="math-container">$\phi^{-1}$</span> are differentiable and their derivatives are continuous.<br>
Then <span class="math-container">$$\int_a^b f(x)dx=\int_{\phi^{-1}(a)}^{\phi^{-1}(b)}f(\phi(t))\phi'(t)dt.$$</span></p>
</blockquote>
<p>The proof given in my textbook goes as follows:<br>
Let <span class="math-container">$F:[a,b] \to \mathbb{R}$</span> be an antiderivative of <span class="math-container">$f$</span> (it exists since <span class="math-container">$f$</span> is continuous). Then <span class="math-container">$\int_a^b f(x)dx=F(b)-F(a)(1)$</span>.<br>
By the chain rule, we have that <span class="math-container">$(F\circ \phi)'(t)=F'(\phi(t))\phi'(t)=f(\phi(t))\phi'(t)$</span>, which shows that <span class="math-container">$F\circ \phi$</span> is an antiderivative of <span class="math-container">$(f\circ \phi)\cdot \phi'$</span>.<br>
As a result, <span class="math-container">$\int_{\phi^{-1}(a)}^{\phi^{-1}(b)}f(\phi(t))\phi'(t)dt=(F\circ \phi)(t) |_{\phi^{-1}(a)}^{\phi^{-1}(b)}=F(b)-F(a)(2)$</span>.<br>
From <span class="math-container">$(1)$</span> and <span class="math-container">$(2)$</span> we reach the desired conclusion.<br>
My question is: why is it necessary that <span class="math-container">$\phi$</span> and <span class="math-container">$\phi^{-1}$</span> have continuous derivatives? Wouldn't it be enough if they were just Riemann integrable?</p>
| 0non-cybersec
| Stackexchange |
Chinese remainder theorem, can't figure it out!. <p>x mod 5 = 3</p>
<p>x mod 7 = 5</p>
<p>x mod 11 = 7</p>
<p>How to determine x? I've been searching on YouTube, but they're giving examples in different ways, for example </p>
<p>x ≡ 1(mod 3)</p>
<p>I don't understand it, is it the same as x mod 3 = 1?
Thanks, Im still new and quite slow at math, I'm trying to understand it still </p>
| 0non-cybersec
| Stackexchange |
Crappy. | 0non-cybersec
| Reddit |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
Beautiful girl shows pussy V6Y40ibZUsc. | 1cybersec
| Reddit |
SSRS: Error Getting the Fields And Parameters for a shared Dataset based on a Stored Procedure. <p>I am using SSRS and adding a shared dataset based on a stored procedure with parameters. When I go to refresh the fields so Visual Studio adds the correct parameters and fields, sometimes I get the following error message: </p>
<blockquote>
<p>Could not create a list of fields for the query. Verify that you can connect to the data source and that your query syntax is correct. </p>
</blockquote>
<p>The detail message is </p>
<blockquote>
<p>Procedure or function 'SP NAME' expects parameter '@parameter name', which was not supplied.</p>
</blockquote>
<p>The problem happens quite randomly. Sometimes it works, other times it doesn't. Doesn't matter what is inside the stored procedure. Without the fields and parameter list, you can not add the data set to a report. </p>
<p>Thanks!</p>
| 0non-cybersec
| Stackexchange |
All the zeroes of $p(z)$ lie inside the unit disk. <p>Let $p(z) = c_0 + c_1z + c_2z^2 + \dots + c_nz^n$ where $0 \le c_0 \le c_1 \le \dots \le c_n$. I would like to show that all zeroes of this polynomial lie inside the unit disk by applying Rouche's theorem to the polynomial $(1-z)p(z)$. I'm not completely sure how to do this. Using the given, information I can deduce that
$$|(1 - z)p(z)| \le |c_nz^{n+1}|$$</p>
<p>on the unit circle, but this doesn't really match the assumptions of Rouche's theorem. </p>
<p>Help would be appreciated.</p>
| 0non-cybersec
| Stackexchange |
.htaccess RewriteRule, send requests to PHP script. <p>I'm trying to protect user uploaded files in directory /secret. I created a htaccess file and placed it into that directory.</p>
<pre><code>RewriteBase /secret/
RewriteCond %{REQUEST_URI} !^download.php.*$
RewriteRule .* download.php [QSA,L] #send request to php script, that script sends out the file if user is authenticated
</code></pre>
<p>This is working very well, as long as all the files are in that /secret directory. The problem comes when there are subdirectories, for example /secret/subfolder/document.txt. Now when I request this file with my browser, Apache sends out the file. It will not be rewritten by the rewriterule, and anyone can download that file.</p>
<p>Is there any trick that I could use to redirect all the request inside /secret folder to go throught download.php script? So that /secret/file.txt and /secret/subfolder/document.txt etc would all work. I can do the authentication only with php and I would like to keep my directory structure as it is, since those files are used as links on a various member only pages.</p>
<p>Best regards,
Jdoen</p>
| 0non-cybersec
| Stackexchange |
Proving that $\int_0^\infty\Big(\sqrt[n]{1+x^n}-x\Big)dx~=~\frac12\cdot{-1/n\choose+1/n}^{-1}$. <blockquote>
<p>How can we prove, without employing the aid of residues or various transforms, that, for $n>2$ $$\int_0^\infty\Big(\sqrt[n]{1+x^n}-x\Big)dx~=~\frac12\cdot{-1/n\choose+1/n}^{-1}$$</p>
</blockquote>
<hr>
<p><strong>Motivation:</strong> In my <a href="https://math.stackexchange.com/questions/829909">previous question</a>, thanks to Will Jagy's simple but brilliant answer, I was able to express the area of the <a href="http://en.wikipedia.org/wiki/Superellipse" rel="nofollow noreferrer">superellipse</a> $x^n+y^n=r^n$, for odd values of $n=2k+1$, with $k\in\mathbb N^*$, as </p>
<p>$A_n=r^2\displaystyle\cdot{2/n\choose1/n}^{-1}+r^2\cdot{-1/n\choose+1/n}^{-1}$, where the first term, representing the surface inside the </p>
<p>first sector or quadrant, comes from a simple evaluation of the <a href="http://en.wikipedia.org/wiki/Beta_function" rel="nofollow noreferrer">beta function</a>.</p>
<hr>
<p><strong>My fruitless efforts and endeavors:</strong></p>
<p>$\big(1\big).$ Breaking up the integration interval into $(0,1)$ and $(1,\infty)$, expanding the integrand into an appropriate <a href="http://en.wikipedia.org/wiki/Binomial_series" rel="nofollow noreferrer">binomial series</a> for each of the two cases, and then switching the order of summation and integration. In the end, this made me rewrite the initial question in terms of an infinite series, but led me no closer to finding an answer:</p>
<p>$$2a\sum_{k=1}^\infty{a\choose k}\Bigg(\frac1{k+a}+\frac1{k-2a}\Bigg)={-a\choose+a}^{-1}-1.$$
<br>
$\big(2\big).$ Letting $x=\sqrt[n]{\sinh^2t~}$. Needless to say, that did not get me very far either.</p>
<p>$\big(3\big).$ Letting $x^n=u$, we are able to obtain an <a href="http://en.wikipedia.org/w/index.php?title=Wikipedia:Reference_desk/Archives/Mathematics/2014_June_16#June_16" rel="nofollow noreferrer">expression</a> in terms of <a href="http://en.wikipedia.org/wiki/Beta_function#Incomplete_beta_function" rel="nofollow noreferrer">incomplete beta functions</a>.</p>
| 0non-cybersec
| Stackexchange |
If an infrared camera works because "warm things emit light," why doesn't the warm air between the camera and the object also emit light and wipe out the image?. Title is pretty self explanatory... | 0non-cybersec
| Reddit |
Let $\Omega$ be a finite set. Let $\mathcal{F}\subset\mathcal{P}(\Omega)$ be an algebra. Show that $\mathcal{F}$ is a $\sigma$-algebra.. <p>Let <span class="math-container">$\Omega$</span> be a finite set. Let <span class="math-container">$\mathcal{F}\subset\mathcal{P}(\Omega)$</span> be an algebra. Show that <span class="math-container">$\mathcal{F}$</span> is a <span class="math-container">$\sigma$</span>-algebra.</p>
<p><strong>MY ATTEMPT</strong></p>
<p>Since <span class="math-container">$\mathcal{F}$</span> is an algebra, <span class="math-container">$\Omega\in\mathcal{F}$</span>. Moreover, if <span class="math-container">$A\in\mathcal{F}$</span>, then <span class="math-container">$A^{c}\in\mathcal{F}$</span>. Finally, if <span class="math-container">$A,B\in\mathcal{F}$</span>, then <span class="math-container">$A\cup B\in\mathcal{F}$</span>.</p>
<p>Now we have to prove that the countable union of sets in <span class="math-container">$\mathcal{F}$</span> does belong to <span class="math-container">$\mathcal{F}$</span>.</p>
<p>Here it is the sketch of my attempt to prove it: since there are finitely many subsets of <span class="math-container">$\Omega$</span>, the countable union has to have finitely many different sets in its composition. Consequently, such union is a finite union of subsets of <span class="math-container">$\Omega$</span>, which clearly belongs to <span class="math-container">$\mathcal{F}$</span> since it is an algebra.</p>
<p>However I am not sure if it is a good approach or how to formalize it.</p>
<p>Could someone please help me with this?</p>
| 0non-cybersec
| Stackexchange |
Hulu CEO Jason Kilar announces resignation, will leave company in Q1. | 0non-cybersec
| Reddit |
Bit distance and disruption. <p>Earlier, I asked <a href="https://cs.stackexchange.com/questions/27950/disruption-in-the-context-of-genetic-algorithms">a question</a> defining disruption in Genetic Algorithms. Given that definition, I'm still confused on how to answer the following question.</p>
<blockquote>
<p>True or false? For 1-point and 2-point crossover, the schemata
which have bits that are close together on the string encoding
are more likely to be disrupted by crossover.</p>
</blockquote>
<p>From my understanding of cross-over disruption should only be dependant on the number of matching bits strings between parents. So <code>1001</code> would be more likely to be disrupted by <code>0110</code> then by <code>1000</code>. So I answered false, but their justification was that bits closer together encourage disruption, which I don't totally understand.</p>
<p>I'm assuming that "bit distance" can be defined as the number of zeros between sequential bits, but based on my proof above, I really don't see how this could affect disruption. Alternatively, I could consider "bit distance" as being the number of bits to flip to reach from one number to another, but based on my proof above, the greater the distance, the greater the chances of disruption.</p>
<p>Where is the mis-understanding between the official answer and my own?</p>
| 0non-cybersec
| Stackexchange |
What is Neko anyway?. <p>I have started to use Haxe to convert my ActionScript 3 projects into NME, but, I like to know please what is Neko in the world of Linux? I searched for it, I found its an animated cat!</p>
<p>Can any one please explain to me?</p>
| 0non-cybersec
| Stackexchange |
House Panel unanimously passes 9/11 fund for victims after Jon Stewart's testimony. | 0non-cybersec
| Reddit |
Did "Fewer, Bigger, Better" actually work?. | 0non-cybersec
| Reddit |
Conditions under which a convolution transformation is injective in the 1-d Torus. <p>Let $X=[0,1)$ the 1-d torus. Given a bounded positive function $w\colon X\to\mathbb{R}$ with unit integral (I mean $w\geq 0$, $w\in L^\infty(X)$ and $\int_X w\; dx=1$), define</p>
<p>\begin{align*}
T_{w} \colon L^\infty(X) &\to L^\infty(X)\\
f &\mapsto T_wf(x)=\int_0^1 f(y)w(x-y)dy.
\end{align*}</p>
<p>I need to determine conditions for $w$ under which the transformation $T_w$ is injective. I know a counterexample for $w$ continuous with compact support, so those conditions are not enough. </p>
<p>I have read a lot of material about convolutions and integral transformation, but it is mostly about $L^2(\mathbb{R})$, and it haven't been easy to adapt.<br>
For example, I know that if $w=\frac{1}{(b-a)}\chi_{[a,b]} $ $(0\leq a\leq b\leq 1)$, $T_w$ is not injective because if we take $$f(x) = \begin{cases} 1 &\mbox{if } x < \frac{b-a}{2} \\
-1 & \mbox{if } x\geq\frac{b-a}{2} \end{cases} \pmod{b-a}.$$ then $T_wf=0$. But if we extend $T_w$ to $L^2(\mathbb{R})$ it happens to be injective (<a href="https://math.stackexchange.com/questions/866909/another-proof-of-the-iniectivity-of-a-linear-operator">Another proof of the iniectivity of a linear operator</a>).</p>
<p>Working on this problem, I stumbled upon this type of equation $$\int_0^1 f(y)w(x-y)dy=0\quad\forall x\in X$$ from which I would like to conclude that $f\equiv 0$. Any reference would be helpful.</p>
| 0non-cybersec
| Stackexchange |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
Prostate exam. A man goes to the doctor for a prostate exam. He pulls down his pants and after a while the doctor says "You're gonna have to stop masturbating".
The man asks "Why?"
"Because I'm trying to examine you.", replies the doctor. | 0non-cybersec
| Reddit |
Nine Kings in one photo, 1910 [1500 × 1094]. | 0non-cybersec
| Reddit |
[image] Dr. Rich Carmona, high-school-dropout-turned-US-Surgeon-General, on how he graduated first in his class at medical school.. | 0non-cybersec
| Reddit |
Worrying images of packed metro lines in Paris this morning. | 0non-cybersec
| Reddit |
Welcome to Switzerland. | 0non-cybersec
| Reddit |
When cooking for one other person, how should they tell you your meal sucks?. Should they:
A.) Poke at it but don't actually eat any
B.) Eat it to avoid hurting your feelings
C.) Tell you that they don't like it, giving you an opportunity to scrap the meal for the both of you | 0non-cybersec
| Reddit |
Urban Outfitters - Free Shipping on all orders. No minimum. No code.. | 0non-cybersec
| Reddit |
French UltraMurray, Oil, 16 x 20". | 0non-cybersec
| Reddit |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
Repeated indices Python Pandas from list of dicts. <p>I have a list of dictionaries with two keys. The first key is the shared index and the second key is the column name. I want to convert this list to a Pandas <code>DataFrame</code> object. But when I do that I get repeated index rows where and one columns is blank in every row.</p>
<p>With this code:</p>
<pre><code>import pandas as pd
l = [{'col_a': 0, 'idx': 0},
{'col_b': 5, 'idx': 0},
{'col_a': 1, 'idx': 1},
{'col_b': 6, 'idx': 1},
{'col_a': 2, 'idx': 2},
{'col_b': 7, 'idx': 2},
{'col_a': 3, 'idx': 3},
{'col_b': 8, 'idx': 3},
{'col_a': 4, 'idx': 4},
{'col_b': 9, 'idx': 4}]
df = pd.DataFrame(l)
df = df.set_index('idx')
</code></pre>
<p>I get this</p>
<pre><code> col_a col_b
idx
0 0.0 NaN
0 NaN 5.0
1 1.0 NaN
1 NaN 6.0
2 2.0 NaN
2 NaN 7.0
3 3.0 NaN
3 NaN 8.0
4 4.0 NaN
4 NaN 9.0
</code></pre>
<p>but I want this</p>
<pre><code> col_a col_b
idx
0 0.0 5.0
1 1.0 6.0
2 2.0 7.0
3 3.0 8.0
4 4.0 9.0
</code></pre>
<p>Any ideas? Thanks!</p>
| 0non-cybersec
| Stackexchange |
Jest snapshots not matching - Windows vs Unix/Linux Line Endings. <p>We have a project developed by multiple developers on multiple operating systems. We have a character limit in our prettier config set to 120 characters. Our windows machines are producing snapshots different than our linux/unix machines.</p>
<p>windows:</p>
<pre><code> <h4
className="RightPanel__item--heading heading--headingBlocks
subHeading--headingBlocks subHeading--different"
>
</code></pre>
<p>whereas on our linux/unix machines the snapshot produces the following line:</p>
<pre><code> <h4
className="RightPanel__item--heading heading--headingBlocks subHeading--headingBlocks subHeading--different"
>
</code></pre>
<p>For the linux/unix snapshot, the code ends right on column 119, whereas windows machines produce a new line before the last couple of attributes.
We use React, Jest for Testing, eslint for linting, Babel for transformation. </p>
<h2>Related Configuration</h2>
<ol>
<li>babelrc: transform: { "^.+\.jsx?$": "babel-jest" }</li>
<li>eslintrc: "globals": { "jest": true }</li>
<li>prettierrc: "printWidth": 120</li>
<li>prettierignore: *.snap</li>
</ol>
<h2>Project</h2>
<p>React, Babel, Webpack, vanilla es6+ no typescript project with jest for testing</p>
<h2>Research</h2>
<p>We've tried setting the eslint's "linebreak-style": ["error", "unix"] to see if the eslint change would update the fix the jest snapshot for windows to no avail. We've ensured the same installed version of jest across machines. Same with prettier and eslint. </p>
<p>Any suggestions on how we might fix this issue so tests don't fail for one OS or the other?</p>
| 0non-cybersec
| Stackexchange |
Accessible book on functional programming. <p>I'm looking for a book that explains functional programming in an accessible manner. Also I would prefer one that isn't too dull, and doesn't use an esoteric language.</p>
<p>Ideally it will use examples that demonstrate situations where functional programming leads to more elegant or simpler solutions than imperative approaches.</p>
<p>I have a reasonable amount of programming experience, but no knowledge of functional programming. Thanks for any suggestions</p>
| 0non-cybersec
| Stackexchange |
Need Supply - 20% Off with code Famandfren. NS isn't exactly known for their value, but they have an awesome selection - and 20% off is never bad on high-end, rarely discounted items (22.5% if you include ebates cash back :)) Enjoy!
Needsupply.com | 0non-cybersec
| Reddit |
Functors and Groups. <p>Let $\alpha$ be a functor from the category of groups in the category of groups which assigns to every group $G$ a characteristic subgroup $\alpha (G)$ of $G$ and to every homomorphism $\theta : H \rightarrow K$ the restriction $\theta|_{\alpha(H)}:\alpha(H)\rightarrow \alpha(K)$ (in other words, $\alpha(H)^\theta \leq \alpha(K)$). So we have, in particular, that $\alpha(H)^\theta \leq \alpha(H^\theta)$. Is it true that also happen that $\alpha(H)^\theta$ is equal to $\alpha(H^\theta)$? I think it holds, but why?</p>
<p><strong>References</strong></p>
<p>D.J.S. Robinson, "Finiteness Conditions and Generalized Soluble Groups", Vol. 1 Pag. 18, (1.3, at the bottom of the page) </p>
| 0non-cybersec
| Stackexchange |
Psycho neighbor confronts Robert Robinson. | 0non-cybersec
| Reddit |
binomial determinant. <p>Let <span class="math-container">$n > 0$</span>, then :</p>
<p><span class="math-container">$$ \det \left( {2n \choose n+i-j} \right)_{i,j=0}^{n-1} = \prod_{i=0}^{n-1} \frac{2n+i \choose n}{n+i \choose n} $$</span></p>
<p>The LHS appears to be the determinant of a symetric Toeplitz matrix with binomial coefficients.</p>
<p>Does anyone have an idea on how to proove this formula ?</p>
| 0non-cybersec
| Stackexchange |
How do I make an AWS RDS MySQL Read "replica" have a different schema?. <p>Rather than using the AWS CLI/UI to <strong>create</strong> a read replica, I would like to create a DB instance with a "close enough" schema and <strong>SET</strong> it to be the replica.</p>
<p>I need to make a schema change (a collation change) that cannot be done live in MySQL. I would like to make this change by creating a read "replica" with the schema change, and then promote the read-only "replica".</p>
<p>The problem is that the AWS RDS MySQL read-replica mechanism requires that the two schemas be exact.</p>
<p>I know that this can be done in general in MySQL (although I do not know the specifics); I would like to do this completely within the AWS RDS framework.</p>
| 0non-cybersec
| Stackexchange |
Interesting interview with 'Whiplash' short film producers and the casting of J.K. Simmons a year ago at Sundance. Apparently, J.K. Simmons is Jason Reitman's 'muse' and has played in all his feature films.. | 0non-cybersec
| Reddit |
can vncviewer forward alt key to server for application switch?. <p>I'm using the <code>tightvnc</code> <code>vncviewer</code> to connect to a Windows10 server from my Linux machine running <code>Ubuntu</code>. Now I wish had the option to switch between aplications on the Windows machine using alt-tab over vnc. I've found a plethora of articles describing this on the web but they all seem to refer to the vncviewer that's running on Windows and I did not find any info for the Linux version of it. Can anyone help?</p>
<p>I also started a separate thread in the group: comp.os.linux.networking (subject "can vncviewer forward alt key to server for application switch?") - - I will make sure that answers are synchronized between the two separate threads! </p>
| 0non-cybersec
| Stackexchange |
Dressing your pet up for halloween is kind of cheesy, but this is f*ng awesome (PIC). | 0non-cybersec
| Reddit |
How to stop a new console window from starting when building or debugging a project in Visual studio for Mac Professional?. <p>Everytime I build a project or debug, a new console window pops up with functions runtime information and program output.
I want to have the output terminal, debug console, build information etc. in the same visual studio window. I found similar questions but the solution were for the older version of visual studio and my version of visual studio did not have those menu options (No Preview tab or Tools -> options) .
The visual studio version that I have is a Visual Studio for Mac Professional, version 8.1.5 (build 9). </p>
| 0non-cybersec
| Stackexchange |
Can photons only be emitted by electrons?. If so would other elementary particles be able to emit their "own type of photons" to exchange energy? | 0non-cybersec
| Reddit |
Respect❤️. | 0non-cybersec
| Reddit |
Like 5 out of 7. | 0non-cybersec
| Reddit |
/r/movies Front Page Wallpaper is pretty stale. How about a competition for a replacement?. | 0non-cybersec
| Reddit |
Cannot connect bot to Bale messenger API: network connection disconnected. <p>I was trying my first bot in bale messenger but I couldn't and faced this error. Is there any one here to help me?</p>
<pre><code> 2018-05-05 11:13:47,938 network.py:112 WARNING:"network connection disconnected."
2018-05-05 11:13:47,939 network.py:36 ERROR:"connect error: 500, message='Invalid response status'"
Traceback (most recent call last):
File "/home/ehsan/PycharmProjects/example_bots/venv/lib/python3.5/site-packages/balebot/connection/network.py", line 31, in connect self._ws = await self._session.ws_connect(self.construct_url())
File "/home/ehsan/PycharmProjects/example_bots/venv/lib/python3.5/site-packages/aiohttp/helpers.py", line 109, in __await__ ret = yield from self._coro
File "/home/ehsan/PycharmProjects/example_bots/venv/lib/python3.5/site-packages/aiohttp/client.py", line 465, in _ws_connect
headers=resp.headers) aiohttp.client_exceptions.WSServerHandshakeError: 500, message='Invalid response status'
</code></pre>
| 0non-cybersec
| Stackexchange |
@PreDestroy method of a Spring singleton bean not called. <p>I have a Spring bean defined in <code>beans.xml</code> as follows:</p>
<pre><code><context:annotation-config />
[...]
<bean id="myBackend" class="mycompany.BackendBean" scope="singleton" />
</code></pre>
<p>Inside the bean are 2 methods, which must be executed at the start and before termination of the web application:</p>
<pre><code>public class BackendBean implements IBackend {
private static final Logger LOGGER = LoggerFactory
.getLogger(BackendBean.class);
@PostConstruct
public void init()
{
LOGGER.debug("init");
}
@PreDestroy
public void destroy()
{
LOGGER.debug("destroy");
}
}
</code></pre>
<p>When I run the server (<code>mvn jetty:run</code>), I can see the output of the <code>init</code> method in the console, from which I conclude that the <code>init</code> method is executed.</p>
<p>When I press <code>Ctrl-C</code> and Jetty starts to shut down, I don't see the output of the <code>destroy</code> method.</p>
<p>What should I change in order for the <code>destroy</code> method to be executed, when the application is terminated?</p>
| 0non-cybersec
| Stackexchange |
How to correctly split a monolith and rely on the same domain. <h1>Context</h1>
<p>I'm developing a Spring Boot java application. Currently it is a monolith with the rest API and the front end (vaadin driven) in the same big project.</p>
<p>Although this is very easy to develop and deploy, it is getting harder and harder to add features. There are too many concerns in the same application.</p>
<p>Also, I did some load testing on my app and it didn't survive more than ~1.5k (virtual) users using it during 1 minute (+/- 1000 to 4000 requests/s).</p>
<h1>What I have researched already</h1>
<p>I've been reading about microservices for scaling but I'd have to re-write almost the entire application for that, since all my data is relational and stored in a relational database (and I have no clue on how to change that to independent data).</p>
<h1>The problem</h1>
<p>What I tried to do now is to split the project into three sub projects. A data project that contains all domain and services, an API project that contains the REST api, and a internal front-end project that contains the vaadin interal frontend.</p>
<p>The data project would only be a library for the other projects. The API project and the frontend project would both include this data project in their gradle, and both would use this project as a library to access the database.</p>
<p>Splitting this project is beeing quite hard and I don't even know if this is the correct path to follow. So in this case, is splitting a correct decision?</p>
<p>My thought process was that once the projects are split I could develop with more ease, and also I could spawn independent API instances and plug them in a load balancer (although all of them would still use the same database).</p>
<p>On the other hand, this split is causing many dependency issues since the original project was Spring boot and the data project is not going to be 'runnable' (so it can't depend on the boot plugin as I read). But this is a question for stackoverflow only if the achitecture is right.</p>
<h2>TL;DR questions</h2>
<ul>
<li>Is it correct to use a project with both domain and service layer, as a library?</li>
<li>Is it correct to access the same database with more than one application?</li>
<li>If not, what is the correct form of acessing data (read and write) from instances of an api project (to load balance)?</li>
</ul>
| 0non-cybersec
| Stackexchange |
Prevent character or word auto-corrections in Microsoft Word. <p>Is there a way to prevent Microsoft Word 2010 from making any auto-corrections.</p>
<p>Here's one example, that causes issues when creating technical documentation for server build scripts. Copy and Pasting the auto-corrected hyphen causes the command to not run correctly.</p>
<p>If you type <code>./CA -sign</code>, the "-" (hyphen) changes to a "-" (dash) UNICODE character. Pasting into a Putty.exe (Linux emulator session) will cause an error. It's easy to tell if the hyphen changes. It gets wider if using the default font in Word.</p>
| 0non-cybersec
| Stackexchange |
Integrability of $f \circ g$ when $f$ is Riemann integrable and $g$ is continuous.. <p>First I want to refer to
<a href="https://math.stackexchange.com/questions/1041330/show-that-if-fc-d-rightarrow-mathbb-r-is-continuous-and-ga-b-right">show that if $f:[c,d] \rightarrow \mathbb {R}$ is continuous and $g:[a,b] \rightarrow [c,d]$ is Riemann integrable, then $f\circ g$ is also integrable</a>.</p>
<p>My case is slightly different with above link.
Question:
If $f:[c,d]\to\mathbb{R}$ is Riemann integrable and $g:[a,b]\to[c,d]$ is continuous, then is $f\circ g$ also integrable?</p>
<p>I guess that it's not true but I failed to find a counterexample.
Please help me.</p>
| 0non-cybersec
| Stackexchange |
How u/RayRod747's Super Saiyan gif made me feel.. | 0non-cybersec
| Reddit |
Internal website to securely share secrets(credentials) that can expire?. I'm looking for a website I can deploy internally only that will allow my users and external vendors/clients the ability to send text securely that will automatically be erased after a period of time. The information would be stored in an encrypted manner and salted.
We have deployed a customized Zendto setup however I'm not looking to use that for this method because we need to only send passwords most of the time and it must time out sooner (even based on the exposure of the secret) and the information is not encrypted in a stored state with Zendto.
Anyone have such a website deployed? open source of course is preferred. | 0non-cybersec
| Reddit |
C question: single dereference on a void** double indirection pointer. <p>I got this message: </p>
<pre><code>expected 'void **' but argument is of type 'char **'
</code></pre>
<p>when I tried to compile something similar to this: </p>
<pre><code>void myfree( void **v )
{
if( !v || !*v )
return;
free( *v );
*v = NULL;
return;
}
</code></pre>
<p><br><br>
I found what I think is a solution after reading this question on stack overflow:<br>
<a href="https://stackoverflow.com/questions/2943983/avoid-incompatible-pointer-warning-when-dealing-with-double-indirection">Avoid incompatible pointer warning when dealing with double-indirection - Stack Overflow</a><br>
<br>
So I adjusted to something like this: </p>
<pre><code>#include <stdio.h>
#include <stdlib.h>
void myfree( void *x )
{
void **v = x;
if( !v || !*v )
return;
free( *v );
*v = NULL;
return;
}
int main( int argc, char *argv[] )
{
char *test;
if( ( test = malloc( 1 ) ) )
{
printf( "before: %p\n", test );
myfree( &test );
printf( "after: %p\n", test );
}
return 0;
}
</code></pre>
<p>Is this legal C? I am dereferencing a void pointer aren't I? </p>
<p>Thanks guys<br>
<br>
<br>
<strong>EDIT 12/10/2010 4:45PM EST:</strong><br>
As it has been pointed out <code>free(NULL)</code> is safe and covered by the C standard. Also, as discussed below my example above is not legal C. See caf's answer, Zack's answer, and my own answer.<br>
<br>
Therefore it's going to be easier for me to initalize any to-be-malloc'd pointers as NULL and then later on to just free() and NULL out directly in the code: </p>
<pre><code>free( pointer );
pointer = NULL;
</code></pre>
<p>The reason I was checking for NULL in myfree() like I did was because of my experiences with fclose(). <code>fclose(NULL)</code> can segfault depending on platform (eg xpsp3 msvcrt.dll 7.0.2600.5512) and so I had assumed (mistakenly) the same thing could happen with free(). I had figured rather than clutter up my code with if statements I could better implement in a function. </p>
<p>Thanks everyone for all the good discussion</p>
| 0non-cybersec
| Stackexchange |
Soft dependency in systemd. <p>I am trying to understand if there is a way to create a soft dependency between systemd services. Basically, I'd like to create an "umbrella" service that starts other services marked as (soft-) dependencies, but <strong>if and only if they are enabled</strong> -- the umbrella should <strong>never</strong> start a dependant service that is disabled.</p>
<p>More specifically, I have received a <a href="https://github.com/brontolinux/cfengine-systemd/pull/1/commits/ff8085b9ca739d2c3e3e9ebcbaf559230e4db216" rel="nofollow noreferrer">pull request</a> for <a href="https://github.com/brontolinux/cfengine-systemd" rel="nofollow noreferrer">cfengine-systemd</a> that aims to create such an umbrella unit. Unfortunately, the proposed <code>cfengine3.service</code> unit doesn't honour the enabled/disabled state of the dependant units and starts them in any case.</p>
<p>I had tried myself to do the same previously by means of a target unit, but <a href="https://github.com/brontolinux/cfengine-systemd/commit/97887c6700866844b4ea6c84d5d8f246b53adfe9" rel="nofollow noreferrer">failed shamefully</a>.</p>
<p>Any clues?</p>
<p>Thanks in advance</p>
<p><strong>Update</strong> following Michael's question: I would say that if <code>cfengine3.service</code> is disabled, systemd should not try to start the dependant services.</p>
| 0non-cybersec
| Stackexchange |
What lives at the end of my bed. | 0non-cybersec
| Reddit |
[Homemade] Fondant Octopus. | 0non-cybersec
| Reddit |
Mac Pro 2,1 Only Shows Flashing Question Mark After Update. <p>So, I have an older Mac Pro 2,1 that I received. Had a fresh install of Mavericks and nothing else. It worked fine, with exception to slow redraw speeds on the screen. When I got it plugged into a network for the first time, it said there were updates, so I let it do the updates.</p>
<p>When I returned to the machine, it was simply sitting at a white screen. After waiting several hours with no change, I turned the machine off, and rebooted. I was met with the flashing question mark on a folder icon.</p>
<p>The Mac has the Apple RAID card in it, and 4 1TB drives.</p>
<p>Pressing <em>any</em> of the startup commands during boot does nothing; I still get the flashing icon. <kbd>Command</kbd><kbd>R</kbd> doesn't work. <kbd>C</kbd> doesn't work. The only two that do anything is <kbd>Command</kbd><kbd>Option</kbd><kbd>P</kbd><kbd>R</kbd> (reset NVRAM) and <kbd>Option</kbd> (Startup Disc select). However, even when using those two, they still result in a flashing question mark icon.</p>
<p>Any clues? I'm wondering if the RAID card went bad or something. It was complaining of a bad battery.</p>
| 0non-cybersec
| Stackexchange |
Guy I went to highschool with. Oh dear.. | 0non-cybersec
| Reddit |
Printing Variable names and contents as debugging tool; looking for emacs/Python shortcut. <p>I find myself adding debugging "print" statements quite often -- stuff like this:</p>
<pre><code>print("a_variable_name: %s" % a_variable_name)
</code></pre>
<p>How do you all do that? Am I being neurotic in trying to find a way to optimize this? I may be working on a function and put in a half-dozen or so of those lines, figure out why it's not working, and then cut them out again.</p>
<p>Have you developed an efficient way of doing that?</p>
<p>I'm coding Python in Emacs.</p>
| 0non-cybersec
| Stackexchange |
Proving that matrix is similar to its transpose. <p>One way to prove that a matrix and its transpose are similar is to apply polynomial matrix theory. </p>
<p>I wonder if there is another way to do that. Thanks. </p>
| 0non-cybersec
| Stackexchange |
At what moment did you realize you were really an adult?. | 0non-cybersec
| Reddit |
Face It Gearbox, BattleBorn Is Free-To-Play - GameRaven. | 0non-cybersec
| Reddit |
Zach Galifianakis gave one the best monologue SNL has ever had last night.. | 0non-cybersec
| Reddit |
Is it time to swap your Mac for a Windows laptop?. | 0non-cybersec
| Reddit |
How do website owners make money? Especially something like TPB, which is free to all and I'd assume nobody would be willing to do business with them? (Excuse my ignorance). | 0non-cybersec
| Reddit |
Is it a problem for Google if robots.txt blocks URLs in the sitemap?. <p>I had submitted my site's URL to Google Webmaster Tools. I am using OpenCart. I also have robots.txt file which is accessible to Googlebot.</p>
<p>Now issue I am facing: Googlebot is blocked from accessing 450 URLs by robots.txt but these URLs are present in the sitemap which I submitted. Now I am seeing almost 150 warnings on the "Google Index" page of Google Webmasters Tools.</p>
<p>Will this effect the website indexing? I do not know how to control the sitemap. am using the default sitemap for OpenCart.</p>
| 0non-cybersec
| Stackexchange |
What is your favorite line/lyric from a song?. I have two, which would have to be: "You're not obliged to swallow anything you despise" - The Shins (Sleeping Lessons) and "Life's not a bitch/Life is a beautiful woman" - Aesop Rock (Daylight). | 0non-cybersec
| Reddit |
Launch. | 0non-cybersec
| Reddit |
The joke’s on you. | 0non-cybersec
| Reddit |
Avoid The Bancorp like the plague! (long). Hi r/pf. I want to let you all know the experience I'm having with a financial institution.
I had a small 401k with my previous company. I was inexperienced with financial matters at the time and didn't roll my 401k over on my own, so after about six months the company transferred my 401k to something called The Bancorp in something called a "Safe Harbor IRA".
I've learned a lot since then thanks to r/pf and r/fi, and frankly had forgotten about the small amount of money I had in that old IRA. About two months ago I decided to consolidate all my investments at Vanguard. This is where the nightmare began.
I called The Bancorp to see how to do that. After numerous calls, it has become clear to me that this institution's business model is to make it as difficult as possible to access your money and eat away at it in fees. Here's what I've discovered.
The Bancorp has no physical locations, so you must deal with them over the phone.
Do you want to check your balance? Sorry, you can't log on to a website. You have to call and ask what your balance is.
Do you want to know what type of fund holds your assets (mutual fund, money market, etc.?) Sorry, we won't tell you that and play dumb unless you explain to them what the difference is between a mutual fund and a money market account is (you need this information to roll over funds).
Do you need to update your information over the phone, like your address? Sorry, you can't do that. You have to print out and mail them a form. This I learned after about the 8th call after I was assured on previous calls that my address had been updated.
Can they accurately update your personal information? No, they can't. It will be wrong.
How do you get a balance statement for Vanguard to initiate the rollover? They have to email it to you. When you get the email, half of your information will be wrong. When you ask for a corrected email, they don't send it.
Look, I'll stay on the phone while you email a corrected balance statement, ok? I just want to be done with you people. Sorry, we can't do that. It takes 2-3 days to send an email, even to an irate customer.
I'll stay on the line while you contact that department and get my balance verification email sent out, ok? Sorry, we don't have a way to contact that department.
Do you want to have a supervisor call you back? Sorry, we're not calling you back.
I have been working on this for two months now. Every day off I have I spend an hour on the phone with these people. I am no closer to getting my money out today than I was two months ago. Every time I think I'm getting closer to getting everything together I get further away from the finish line.
The reason I'm posting is to let anyone who is leaving a position to start a new one is that you need to roll over your IRA immediately, otherwise you may lose control of your assets. Fortunately in my case it's a small amount, but if you have significant assets it could become a nightmare if a company like The Bancorp gets a hold of your money.
Thanks for listening.
| 0non-cybersec
| Reddit |
If Facebook can have Reactions, why not PowerPoint?. | 0non-cybersec
| Reddit |
My [23F] boyfriend [23F] thinks ill of working women. I've been with my partner for 2.5 years. We have a great relationship, but there's this one blip.
All of the women in his life, whether they be his mother, other relatives, or exes, have been housewives/housewife types.
We've discussed all of our future plans, and we've discussed at length the fact that I want my own career outside of taking care of our house and future kids. He feels uneasy about it, because the only women he's known in his life have stayed at home while the husband works. The ones he has known to hold jobs that also have families are emotionally distant from their husbands and kids.
I tell him to trust me, and he says he will, and believes I can handle multiple things at once. We're both at a point now where we're both holding full time jobs, more or less with the exact same schedule.
We've been through me doing full time school, holding a part time job, volunteering with our church on the weekends, and having a relationship and outside social life together. I know having kids, a marriage and a full time job are on a different plane than these things, but I do have a lot of faith in my ability to give the most amount of attention as I can to multiple things at once.
I still sense a little bit of unease when we bring future kids and working up to him. He knows I'm nothing like the other women he's witnessed with full time jobs and families, but I feel sometimes like I don't have anything else to tell him but "trust me."
It's starting to get a little frustrating. Am I wrong for that? What else can I say to ease his fears? (Please, no "you should break up" advice. I want to try and fix this to the best of my ability before considering pulling any plug.)
**tl;dr**: My partner has had little experience with women working full time while having a family, and the experience he has had has been negative. How do I convince him that I'm not gonna forget about home life while working full time? | 0non-cybersec
| Reddit |
Does standard configuration in Tomcat pose any security risk?. <p>I have a simple test website on Tomcat running on RaspberryPi. Pi is behind a router. Port forwarding is on and I can access the website from the Internet.</p>
<p>What are the security risks of standard out of the box configuration? Only user and password to Tomcat changed or actually added.</p>
<p>Can someone access my RaspberryPi because of that Tomcat?</p>
<p>Wasn't sure if that question should go to Server Fault or here.
On Server Fault, there is a similar question, but unanswered 6 months old.</p>
| 0non-cybersec
| Stackexchange |
Glasses detection. <p>What I'm trying to do is measure the thickness of the eyeglasses frames. I had the idea to measure the thickness of the frame's contours (may be a better way?). I have so far outlined the frame of the glasses, but there are gaps where the lines don't meet. I thought about using HoughLinesP, but I'm not sure if this is what I need.</p>
<p>So far I have conducted the following steps:</p>
<ul>
<li>Convert image to grayscale</li>
<li>Create ROI around the eye/glasses area</li>
<li>Blur the image</li>
<li>Dilate the image (have done this to remove any thin framed glasses)</li>
<li>Conduct Canny edge detection</li>
<li>Found contours</li>
</ul>
<p>These are the results:</p>
<p><img src="https://i.imgur.com/jNcl1vo.png" alt=""></p>
<p><img src="https://i.imgur.com/10StwCL.png" alt=""></p>
<p>This is my code so far:</p>
<pre><code>//convert to grayscale
cv::Mat grayscaleImg;
cv::cvtColor( img, grayscaleImg, CV_BGR2GRAY );
//create ROI
cv::Mat eyeAreaROI(grayscaleImg, centreEyesRect);
cv::imshow("roi", eyeAreaROI);
//blur
cv::Mat blurredROI;
cv::blur(eyeAreaROI, blurredROI, Size(3,3));
cv::imshow("blurred", blurredROI);
//dilate thin lines
cv::Mat dilated_dst;
int dilate_elem = 0;
int dilate_size = 1;
int dilate_type = MORPH_RECT;
cv::Mat element = getStructuringElement(dilate_type,
cv::Size(2*dilate_size + 1, 2*dilate_size+1),
cv::Point(dilate_size, dilate_size));
cv::dilate(blurredROI, dilated_dst, element);
cv::imshow("dilate", dilated_dst);
//edge detection
int lowThreshold = 100;
int ratio = 3;
int kernel_size = 3;
cv::Canny(dilated_dst, dilated_dst, lowThreshold, lowThreshold*ratio, kernel_size);
//create matrix of the same type and size as ROI
Mat dst;
dst.create(eyeAreaROI.size(), dilated_dst.type());
dst = Scalar::all(0);
dilated_dst.copyTo(dst, dilated_dst);
cv::imshow("edges", dst);
//join the lines and fill in
vector<Vec4i> hierarchy;
vector<vector<Point>> contours;
cv::findContours(dilated_dst, contours, hierarchy, CV_RETR_TREE, CV_CHAIN_APPROX_SIMPLE);
cv::imshow("contours", dilated_dst);
</code></pre>
<p>I'm not entirely sure what the next steps would be, or as I said above, if I should use HoughLinesP and how to implement it. Any help is very much appreciated!</p>
| 0non-cybersec
| Stackexchange |
store a Certificate in a TPM?. <p>Is there any point to store a Certificate in a TPM?</p>
<p>From what I understand a certificate is public knowledge. The only concern about certificates is accepting a rogue certificate.</p>
| 0non-cybersec
| Stackexchange |
Image disappears when using \textwidth or \columnwidth. <p>I am trying to insert an image in my document using one of the relative scales, such as <code>\columnwidth</code> or <code>\textwidth</code>. When I use one of them, the image disappears, but the label is present on the text:
<a href="https://i.stack.imgur.com/rqWc1.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/rqWc1.png" alt="Figure disappears"></a></p>
<pre><code>\begin{figure*}[htbp]
\centerline{\includegraphics[scale=\columnwidth]{LaTeX/images/test-image.png}}
\caption{This is a test image.}
\label{ux1}
\end{figure*}
</code></pre>
<p>However, if I set the scale to a number, such as <code>0.30</code>:</p>
<p><a href="https://i.stack.imgur.com/ntFeg.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/ntFeg.png" alt="enter image description here"></a></p>
<pre><code>\begin{figure*}[htbp]
\centerline{\includegraphics[scale=0.30]{LaTeX/images/test-image.png}}
\caption{This is a test image.}
\label{ux1}
\end{figure*}
</code></pre>
<p>The same happens when I use the <code>figure</code> environment (without the *) for a single-column image. Since this is a template, I am not sure if I am allowed to change the document's structure.</p>
<p>Any ideas?</p>
| 0non-cybersec
| Stackexchange |
ISO用語解説:フォローアップ. | 1cybersec
| Reddit |
NBA Schedule to release Aug 6th at 6PM. What games are you looking forward to for:
Season opener
Thanksgiving
Christmas Day
or in general | 0non-cybersec
| Reddit |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
[Pic] [NSV] - 6 months LazyKeto, bonus kitty!. [Progress Pic](http://imgur.com/gallery/cItZJiY/new)
Stats: 32 Male, USA, 71", 241 lbs --> 198 lbs.
Currently around 1690 Calories, the staples are Bunless Burgers over Spinach and Barbacoa/Steak Salad Bowls.
I tend to do hard boiled eggs & bacon crumbles for breakfast, a salad at lunch and then usually one of the above for dinner.
Lots of water, coffee with cream and the occassional diet cola for lunch (I really need to cut down).
A year ago, I never though I'd see anything below 200 in my life again, and now I'm not even sure what my new goal should be. But I feel better than I have in...years.
I've also been hittin' the gym 4 days a week, 3 Lifting 1 HiiT Cardio. Its more or less StrongLifts 5x5 + a Bootcamp Class.
* Bench from 85 --> 195
* Squat from 95 --> 255
* Deadlift from 135 --> 300
My Curl still sucks, and I hurt my wrist a few months ago, so I'm being gentle with it.
Be gentle Reddit :D | 0non-cybersec
| Reddit |
Modern Europe: Rotterdam. | 0non-cybersec
| Reddit |
Connect HTTP Proxy with Authorization with Fiddler. <p>I would like to connect to a HTTP Proxy with Fiddler Core.</p>
<p>I'm using the <code>oSession['X-OverrideGateway'] = "HOSTNAME:PORT"</code> code to do it.</p>
<p>Now authentication is needed for the proxy. I see in <a href="https://stackoverflow.com/questions/2989466/configuring-fiddler-to-use-company-networks-proxy">other question</a> a <a href="https://stackoverflow.com/a/4945865/4080226">solution</a>. It says:</p>
<pre><code>oSession.oRequest["Proxy-Authorization"] = "Basic sOMeBASE64eNCODEdSTRING=";
</code></pre>
<p>Where the hash at the end is the Base64 coding of the '<code>username:password</code>'</p>
<p><strong>My question about this workaround:</strong></p>
<p>It results a <code>HTTP_PROXY_AUTHORIZATION</code> HTTP header to my requests. Not just from fiddler to the proxy, but also from the proxy to the web.</p>
<p>Shouldn't it be removed by the proxy?</p>
<p>Is there a workaround with Fiddler so I can connect a HTTP Proxy with credentials without HTTP headers?</p>
<p>I would like to use Fiddler Core.</p>
<p><strong>UPDATE:</strong></p>
<p>As I can see the image</p>
<p><a href="https://i.stack.imgur.com/qBEsI.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/qBEsI.png" alt="Http Proxy Authentication process"></a></p>
<p>I only have to provide the Proxy-Authorization header if a Proxy Authentication header was in a response with a status code. It seams ok. But in fiddler core how can I reach the previous response? If I just simply save into a field variable it won't work, since the order of the traffic is not</p>
<p>Request, Response, Request, Response, etc.</p>
<p>But mor like</p>
<p>Request, Response (407), Request, Request, etc.</p>
<p>In the 2nd example on the 3rd Request we shouldn't send the Proxy Authorization header but we will, since the last Response was a 407.</p>
<p>Any ideas?</p>
| 0non-cybersec
| Stackexchange |
PyDev: Running code to interactive console. <p>As my problem is quite simple I'll try to make this question simple aswell. The problem I'm having concerns the PyDev interactive console. I can bring up the console just fine without problems, and even use it as an interactive shell, just as I would be able to with IDLE. However, when I try to run my code that I've written in my project module, it won't run to the interactive console, but to the Eclipse default console. The default console displays the program just fine, but since it's not an interactive shell, I can't do anything afterwards. </p>
<p>With that being said, my question is: How do I get my code to run to the PyDev interactive console, and not the Eclipse default one? Thanks in advance!</p>
| 0non-cybersec
| Stackexchange |
Why do ADC's refuse to buy Executioners Calling against Dr. Mundo?. Happened to me quite often.
I often tell them to buy Executioners but they won't listen to me.
Then after the game they complain about Mundo being too op and too hard to kill.
Typical ADC-Players | 0non-cybersec
| Reddit |
Symbol.prototype Comparison Error. <p>Why do I get this error:</p>
<pre><code>Uncaught TypeError: Symbol.prototype [ @@toPrimitive ] requires that 'this' be a Symbol
</code></pre>
<p>when I run this code?</p>
<pre><code>3 == Symbol.prototype
</code></pre>
<p>I'm still trying to work out the reason why by myself and so far using a <code>try-catch</code> block to hold it down for awhile but I want a reason for the error.</p>
| 0non-cybersec
| Stackexchange |
Kernel and OS Versioning. <p>Can you run 4.15 kernel on Ubuntu 16.04? The broader question is what is the relationship between kernel versioning and OS versioning? When do you need to upgrade your OS to run a new kernel? I am pretty sure I'm running kernel 4.15 on Ubuntu 16.04 but that doesn't make sense to me since Ubuntu 18.04 uses Kernel 4.15 also. </p>
| 0non-cybersec
| Stackexchange |
Cursed_Tickets. | 0non-cybersec
| Reddit |
Does the following Diffie-Hellman problem hold in bilinear groups $G\times G \rightarrow G_T$. <p>For every PPT distinguisher A there exists a negligible function $neg(·)$ such that for all $\lambda$</p>
<p>$|\Pr[A(1^\lambda, g,g_1^a,g_1^b,g_1^{ab}) = 1] - \Pr[A(1^\lambda, g,g_1^a,g_1^b,g_1^z) = 1]| \leq \textsf{negl}(\lambda)$</p>
<p>where $g$ is a generator of group $G$ of order $p$ where $p$ is a prime of length approximately $\lambda$, $g_1 = g^r \in G$, and $r,a,b,z$ are randomly chosen from $Z_p$</p>
| 0non-cybersec
| Stackexchange |
Which concrete applications benefit from Oblivious RAM constructions?. <p>The main motivation for Oblivious RAM (ORAM) is that, for instance, in the "cloud" setting a client outsources his data to a server in the form of encrypted blocks. Later on, he wants to perform read and write operation on these encrypted blocks, which apparently may leak information about what data is stored. ORAM now ensures that the server cannot tell which blocks the client is interested in and whether he is reading or writing. </p>
<p><strong>My question is</strong>: Are there any concrete examples/attacks, where the access pattern on encrypted data leaks sensitive data? </p>
| 0non-cybersec
| Stackexchange |
Sony Expects PlayStation VR’s Library To Increase From 150 Titles To 280 By The End Of 2018. | 0non-cybersec
| Reddit |
Deploy OS from Locally Stored WIM. <p>I have a OS Deployment task sequence that is advertised to clients. During the <code>Apply Operating System</code> step in the sequence a WIM image file is downloaded from winPE then applied. Is it possible to have this image retrieved locally, such as from another connected hard drive or partition that has the image preloaded?</p>
| 0non-cybersec
| Stackexchange |
Why do my IIS6 requests freeze for a long time in the HTTPSYS_CACHEABLE stage?. <p>One of my applications was experiencing intermittent delays in a specific part of the system. Users would click the "Save" button, and sometimes it would take an extra 30 seconds to respond. I turned on <a href="http://msdn.microsoft.com/en-us/library/0x5wc973%28v=VS.85%29.aspx" rel="nofollow noreferrer">ASP.NET tracing</a> and then used <a href="http://www.microsoft.com/technet/prodtechnol/WindowsServer2003/Library/IIS/592e2b3e-02d5-4b37-b0dc-a728e0636974.mspx?mfr=true" rel="nofollow noreferrer">Logman and ETW</a> to record detailed traces.</p>
<p>The trace showed that the delay happened in the "HTTPSYS_CACHEABLE" stage. But, I could not figure out why that was causing a delay. I didn't find any useful documentation about the trace stages in IIS6, and Google didn't find anyone else who had solved this problem.</p>
<p>I tried to disable HTTP.SYS caching by changing a registry key and by editing machine.config. Neither action caused any change in the page performance or the trace logs.</p>
<p>The relevant part of the trace results is this section. Note the gap between the timestamps.</p>
<pre><code>IISCache: URL_CACHE_ACCESS_END - IIS ends accessing URL cache
ErrorCode: 0x00000000
PhysicalPath: H:\JobTraQ_Site\
URLInfoFromCache: 1
URLInfoAddedToCache: 0
ContextIDSeq: 4
Timestamp: 00:30:29.406.250000
IISCache: HTTPSYS_CACHEABLE - IIS decides if the request is HTTP.SYS cacheable
Reason: RESPONSE_MORE_DATA
HttpsysCacheable: 0
ContextIDSeq: 4
Timestamp: 00:30:53.421.875000
</code></pre>
| 0non-cybersec
| Stackexchange |
Europe Tackling Big Space Projects in 2013. | 0non-cybersec
| Reddit |
They look worried??. | 0non-cybersec
| Reddit |
Transfer mail from local machine to Gmail. <p>I'm trying to use Gmail to manage a MS Exchange email that I log into with Outlook Web Access. The Exchange email has IMAP and SMTP access but not POP3 access so I can't use Gmail's "check mail from other accounts" feature but I can use the "send mail as" feature. An inbox rule to forward all mail to the Gmail account doesn't work either.</p>
<p>I want to use Fetchmail and something else, possibly Postfix, to retrieve mail from the Exchange email and pass it along to Gmail. I'm not sure what the proper name is for that second operation, that is, placing the retrieved emails in my Gmail but not sending them to Gmail. Maybe "transferring"? or "pushing" an email? This might be why I can't find what I want on Google. I don't I want to forward the mail. It should appear in Gmail as if I had used the "check mail from other accounts" feature.</p>
<p>Right now, Fetchmail works - I can retrieve mail from the Exchange server, but I don't know where to go from here or what terms I should be using to search. I think what I should be trying to do is use Postfix to transfer the mail to Gmail via SMTP but I'm unsure.</p>
<p>There are a few questions and blog posts out there by people trying to access Exchange with Gmail. Those all involve either forwarding (doesn't work for me) or using just Fetchmail. The Fetchmail-only solutions specify smtp.google.com as the smtphost in the poll. I can't get this to work and it doesn't make sense that it would since the Gmail password is never given. (Further searching - it looks like fetchmail doesn't support ssl on the smtp side.) Some solutions also suggest using Thunderbird to do this. I'd rather not.</p>
<p>I can't find anything on Google about people using Postfix to transfer mail to Gmail. Instead I find I lot of people relaying mail through Gmail.</p>
<p>Is the approach I've outlined sensible or do I fundamentally misunderstand something? Can I use Postfix to transfer mail, already retrieved, via SMTP to Gmail as described? What is the appropriate name for transferring mail like this?</p>
<p>EDIT: The transfer to Gmail should be automatic and regular. This is not intended as a onetime backup but rather as a way to receive email.</p>
<p>Thanks.</p>
| 0non-cybersec
| Stackexchange |
To much at once?. Hey I plan on attempting the c25k again. I failed to do it last time cause Im lazy and winter lol. I never struggled during any of the weeks. Im just naturally lazy XD I also plan on doing the 100 pushups / 200 sit ups and 200 squats from the Just 6 Weeks app. Do you guys think that would be to much all at once? | 0non-cybersec
| Reddit |
Jenny Lake, Moose, Wyoming [OC] [4272x2848]. | 0non-cybersec
| Reddit |
Subsets and Splits