text
stringlengths 3
1.74M
| label
class label 2
classes | source
stringclasses 3
values |
---|---|---|
What is something that almost completely turns you off that tends to turn the majority of people on?. For me, it's anything to do with the anus. I see pictures of women bending over with their ass in the air and it does absolutely nothing for me. When i see an anus i think excrement and a bad smell. I see these images and videos everywhere so it must be a huge turn on for most people but not for me. I'm looking forward to hearing some opinions | 0non-cybersec
| Reddit |
Run Raspbian OS from USB Drive Without any Modifications on Raspberry Pi 3. | 0non-cybersec
| Reddit |
What was the goal of creating the feature of immature coins?. <p>I just ran into the idea of immature coins. Can someone explain to me the idea behind immature coins and what was the purpose of it?</p>
| 0non-cybersec
| Stackexchange |
Relationship between the Thickness & Magnetic field penetration of a type-II superconductor?. As I'm learning more about the "[Meissner effect](https://en.wikipedia.org/wiki/Meissner_effect)" relevant to type-II superconductor's, I'm curious if there is a proportionality between a material's thickness, and the magnetic field penetration? The greater thickness = Greater expulsion? | 0non-cybersec
| Reddit |
jekyll minimal mistakes theme throwing "uninitialized constant Faraday::Error::ClientError (NameError)". <p>I'm new to using jekyll and tried installing the <code>minimal-mistakes-jekyll</code> theme as a gem. Added the gem <code>minimal-mistakes-jekyll</code> to my gemfile, updated it with the bundle command, and set it as theme in _config.yml on a directory created by <code>jekyll new mywebsite</code> but it's giving me this error when I try to run bundle exec jekyll serve: </p>
<p><code>/home/theo/gems/gems/octokit-4.14.0/lib/octokit/middleware/follow_redirects.rb:14:in</code> `': uninitialised constant Faraday::Error::ClientError (NameError)
Did you mean? Faraday::ClientError</p>
<p>which persists when I tried using different versions of jekyll. I'm not sure how to fix this, any help would be appreciated! Running Ubuntu 19.04 and ruby 2.5.5, if that's useful.</p>
| 0non-cybersec
| Stackexchange |
"Prisoners in Nicaragua", 11/1928 [2986 x 2360]. | 0non-cybersec
| Reddit |
How to run pm2 so other server users are able to access the process?. <p><strong>When I start my Nodejs app with <a href="https://github.com/Unitech/PM2">pm2</a>, other server users are not able to access the process.</strong></p>
<p>Even if I start pm2 from a custom directory (not current user's <code>~/</code>, what pm2 is using by default):</p>
<pre><code>HOME=/var/www pm2 start app.js
</code></pre>
<p><em>Directory is accessible by any user</em> (comparing to <code>~/</code>, but there's still no way other server user is able to access the process.</p>
<p>When other server user does <code>pm2 list</code>, it shows him 0 processes are running – but there are (started by another user). And when other user tries <code>HOME=/var/www pm2 list</code>, CLI throws an error:</p>
<pre><code>events.js:72
throw er; // Unhandled 'error' event
^
Error: connect EACCES
at errnoException (net.js:905:11)
at Object.afterConnect [as oncomplete] (net.js:896:19)
</code></pre>
<p>So I am wondering how to make sure users are able to access pm2 processes run by other server users? Or it shall be approached differently?</p>
<hr>
<p>I am wondering why every server user is able to make <code>git pull</code> to deploy latest source code from a Git repository, but can't restart <code>pm2</code> process afterwards? Only the user that started <code>pm2</code> process is able to restart it… Weird.</p>
| 0non-cybersec
| Stackexchange |
Evil shadow government. | 0non-cybersec
| Reddit |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
terminator not starting when default python is python3.4 but works if it is python2.7. <p>On Ubuntu 15.10 when changing the symlink /usr/bin/python from python2.7 to python3.4 then terminator won t start anymore.
Do you know what the problem could be and how to fix it?
Thank you :)</p>
| 0non-cybersec
| Stackexchange |
How can I draw nested shape, one on top another. <p>For example, I want to draw a green rectangle with some black circles along the central horizontal axis of it. My main problem is how to let the circles appear on top of the rectangle.</p>
| 0non-cybersec
| Stackexchange |
All Images on HD marked as Hidden. <p>Just got a real scare, all my image files spread across several hard disks suddenly disappeared. Fortunately, I discovered that they had all somehow been set to hidden. I don't really want to leave all hidden files showing so is there any way I can globally remove the hidden attribute, ideally for all images files though I would settle for one image type at at time.</p>
<p>I'm happy enough to do this at command prompt - running Windows 8.1 - but not knowledgeable enough to actually write a script from scratch :)</p>
| 0non-cybersec
| Stackexchange |
Belle and Sebastian Cinemagraph (via Pitchfork). | 0non-cybersec
| Reddit |
Javascript - Can the 'import' keyword be used to import css?. <p>I may be a bit confused here but is there an equivelent of</p>
<p><code>require('../css/mystyles.css')</code></p>
<p>for the <code>import</code> command?</p>
<p>i.e:
<code>import '../css/mystyles.css</code></p>
<p>If no, why not?</p>
<h1>Context:</h1>
<p>Using webpack with vue and hoping to load css files in a manner consistent with the modules</p>
| 0non-cybersec
| Stackexchange |
🔥 🔥 Next time that "lightning striking the ocean" pic gets reposted, I'll say again that it's a photoshop and link to this as proof.. | 0non-cybersec
| Reddit |
How to show that $\mathbb{C}[x,y]/\langle y^2-P(x)\rangle$ is not a UFD (unique factorization domain)?. <blockquote>
<p>I am having trouble showing that $\mathbb{C}[x,y]/\langle y^2-P(x)\rangle$, where $P\in \mathbb{C}[x]$, $\deg P\geq 2$, is not a UFD.</p>
</blockquote>
<p>I actually don't really know where to begin... I've looked for any counterexamples, i.e. a term that has two factorziations, but couldn't find one. Any help would be appreciated.</p>
| 0non-cybersec
| Stackexchange |
Epic spill. | 0non-cybersec
| Reddit |
How to differentiate $\sum_{i}(y_i-t_i)^2$ by $y$?. <p>$L=\sum_{i}(y_i-t_i)^2$</p>
<p>I want to differentiate $L$ by $y$.
Unfortunately I didn't learn this material, so a wild guess would be:</p>
<p>$(1) \frac{dL}{dy}=\frac{d}{dy} (\vec{y}\cdot \vec{y}^T -2\cdot \vec{y} \cdot \vec{t}^T + \vec{t} \cdot \vec{t})$</p>
<p>From here I got to:
$=2\vec{y}-2\vec{t}^T$</p>
<p>But I guess this not ok, because the dimensions are not equal. This means I needed to do:</p>
<p>$(2) \frac{dL}{dy}=\frac{d}{dy} \vec{y}\cdot \vec{y}^T -2\cdot \vec{t} \cdot \vec{y}^T + \vec{t} \cdot \vec{t}$</p>
<p>And then I'll get $=2\vec{y}-2\vec{t}$ which is the correct answer I think.</p>
<p>I switched places because it suited me better, but I don't think that math works that way. I'm sure there is an algorithm for these operations.
How I was supposed to know that I should of opened it like in $(2)$ and not like $(1)$ ?</p>
| 0non-cybersec
| Stackexchange |
GAME (basically GameStop in UK) are teasing us :(. | 0non-cybersec
| Reddit |
Powershell 5 Get-ChildItem LiteralPath doesn't work with Include anymore. <p>Right now I updated to Windows 10 TH2 Build 10586 with PowerShell 5.0.10586.0</p>
<p>Now I got a problem with Get-ChildItem</p>
<pre><code>$files = Get-ChildItem -LiteralPath $path -Force -Recurse -Include *.txt
</code></pre>
<p>This returns ALL files in $path even they are not .txt.
This was working before the update.
When I change it to</p>
<pre><code>$files = Get-ChildItem -Path $path -Force -Recurse -Include *.txt
</code></pre>
<p>it works again. But that's not what I want.
Is this a bug or am I doing something wrong?</p>
| 0non-cybersec
| Stackexchange |
wireless network for about 100 clients using home-grade equipment. <blockquote>
<p><strong>Possible Duplicate:</strong><br>
<a href="https://serverfault.com/questions/384686/can-you-help-me-with-my-capacity-planning">Can you help me with my capacity planning?</a> </p>
</blockquote>
<p>Let me say that I have already read a similar question here - <a href="https://serverfault.com/questions/360073/high-client-density-low-cost-wifi-network">High client density, low cost wifi network?</a></p>
<p>However, I do not have very low budgetary constraints. However, I am in India and specialized equipment gets to be exponentially much more expensive than in the US. Which is why I need to build it using home-grade wifi equipment.</p>
<p>I just need 100 users of a small office on two floors to be on the same LAN and be able to access the internet through a single fiber optic line. I'm perfectly fine drawing an ethernet cable to connect the various access points, if necessary.</p>
<p>Any idea how to do it ? My max bandwidth is going to be something like 8-12 mbps.</p>
| 0non-cybersec
| Stackexchange |
[S3E9][Spoilers] For readers of the books, did tonight's episode resemble what you've envisioned all this time?. Personally, I enjoyed it. Even though I've been looking forward to it, I still had an "OH, SHIT!" moment which I enjoyed.
Greatjon taking on 4 Freys and biting an ear off would have been great (as would've Catelyn going mad and clawing her face).
Seeing Talisa/Jeyne and the Blackfish there was a little weird, but overall, I think they did a ridiculously great job with it.
Thanks for reopening up emotional scars I thought I had already dealt with, Benioff and Weiss! | 0non-cybersec
| Reddit |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
I stumbled here by accident. Would this be Keto? It's mashed cauliflower crust pizza. 100% Vegetable and Meat. I just pureed cauliflower and a couple eggs to make the crust and bread sticks. Sorry for the FB images, I can get the orgionals if anyone is interested.. | 0non-cybersec
| Reddit |
Proving that matrix $B=C$. <blockquote>
<p>Let $A,B$ be $n×n$ matrices such that $BA = I_n$, where $I_n$ is the identity matrix.<br/>
$(1)$ Suppose that there exists $n×n$ matrix $C$ such that $AC = I_n$. Using properties of the matrix multiplication only (Theorem 2, sec. 2.1, p.113) show that $B = C$.<br/>
$(2)$ Show that if $A, B$ satisfy $BA = I_n$, then C satisfying $AC = I_n$ exists. Hint: Consider equation $Ax ̄ = e_i$ for $e_i$ - an elements from the standard basis of $R^n$. Show that this equation has a unique solution for each $e_i$.<br/>
<a href="http://math.nyu.edu/~neylon/linalgfall04/project1/dj/propofmatrixmult.htm" rel="nofollow">Theorem 2</a></p>
</blockquote>
<p><strong>Attempt:</strong> $(1)$Ehhm... since $BA=I_n$ then $B$ is the inverse of $A$. Same with $C$. And since a matrix has a unique inverse $B=C$. But, I don't see how to prove it using the properties of multiplication only. Maybe something like this:
$$A=B^{-1}I_n=B^{-1}\\A=I_nC^{-1}=C^{-1}\\C^{-1}=B^{-1}\\C=B$$</p>
<p>So, I am not sure about this one because I am using the inverse of a matrix, but I am told to only use the properties of multiplication. Hints please.</p>
<p>$(2)$ Lets say that $BA=I_3$. Then, $\vec e_1=\begin{pmatrix} 1 \\ 0 \\ 0 \end{pmatrix}\; ,\vec e_2=\begin{pmatrix} 0 \\ 1 \\ 0 \end{pmatrix}\; ,\vec e_3=\begin{pmatrix} 0 \\ 0 \\ 1 \end{pmatrix}$. Then, $AC=I_3$, where $C=\begin{pmatrix} c_{11} & c_{12} & c_{13} \\ c_{21} & c_{22} & c_{23} \\ c_{31} & c_{32} & c_{33} \end{pmatrix}$. So, $A\begin{pmatrix} c_{11} \\ c_{21} \\ c_{31} \end{pmatrix}= \vec e_1$. I am trying to use that hint here($A\vec x=e_i$ has a unique solution).How do I show that this system is consistent and has a unique solution. Thanks.</p>
| 0non-cybersec
| Stackexchange |
How would you introduce an agile methodology like scrum?. <p>If you've found agile and walk into a workplace that doesn't particularly follow any methodology and they are resistant to change (as most people usually are), how would you introduce an agile methodology like scrum?</p>
<p><strong>NOTE:</strong></p>
<ul>
<li>Well, I've phrased it as a hypothetical question, but it isn't.</li>
<li>I'm not very confident about Agile myself</li>
</ul>
| 0non-cybersec
| Stackexchange |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
How to get a file out of a failed build-pod from OpenShift?. <p>I have a buildconfig on OpenShift which fails to build. The output tells me that the <code>server.log</code> file might contain more info. But OpenShift is deleting the build-pod immediately after the run, so I can't access the file.</p>
<p>I'm not quite familar with OpenShift, but there does not seem to be a command to start a pod/container. In the buildConfigs Yaml, there is also nothing that looks like it does the trick. Adding a restartPolicy did not help.</p>
<p>How to get the files contents?</p>
<p>edit1: The postCommit hook of the buildConfig does not run. I set it to </p>
<pre><code>postCommit:
script: echo POSTCOMMIT-HOOK && cat /home/payara/paasDomain/logs/server.log
</code></pre>
| 0non-cybersec
| Stackexchange |
udots in TikzPic problem. <p>I'm having a problem making a diagram in tikzpicture. Here's the code:</p>
<pre><code>\documentclass{article}
\usepackage[utf8]{inputenc}
\usepackage{amsmath}
\usepackage{amssymb}
\usepackage{MnSymbol}
\usepackage[.3]{fullpage}
\usepackage{tikz}
\usepackage{tkz-fct}
\usetikzlibrary{matrix,arrows}
\begin{document}
The wedge $W = A_1 \wedge \cdots \wedge A_n$ is a pushout in the category of topological spaces, $\textbf{Top}$.
\begin{center}
\begin{tikzpicture}[node distance=2cm, auto]
\node (one) at (0,2) {\textbf{1}};
\node (A1) at (2, 2) {$A_1$};
\node (An) at (0, 0) {$A_n$};
\node (W) at (2, 0) {$W$};
\node (dots) at (1,1) {$\udots$};
\draw[->] (one) to node {}(A1);
\draw[->] (one) to node {}(An);
\draw[->] (An) to node {}(W);
\draw[->] (A1) to node {} (W);
\node[->] (one) to node {} (dots);
\node[->] (dots) to node {} (W);
\end{tikzpicture}
\end{center}
\end{document}
</code></pre>
<p>And the output lacks the two last arrows. The error message is from tikz and says "A node must have a (possibly empty) label text." The problems only started when I tried to add the dots in there.</p>
<p>Any help would be appreciated.</p>
<p>Also, better suggestions for the diagram would also be welcome!</p>
<p>Thanks</p>
| 0non-cybersec
| Stackexchange |
I was married to a murderer for 8 years and lied to the police about him. He died last year, his crimes going completely unpunished.. When I was 22 I fell in love with a much older man (40 years old) who was in the local crime group. He sold drugs, worked partially in a nightclub, beat women, had a gun on him always etc. And yet, young me loved him for it. It felt cool to me. I had no education, I was born in the USSR and had no money, I didn't care, I wanted to be married to a bad boy who provided for me. My alternatives were dull. This lifestyle was glamorous and sexy to me, at the time.
2 years in was when I first realized he killed a man at the nightclub. He was covered in blood when he came home, and the news said they found a body near the club. Either he helped hide the body, or he did it himself. I never knew what happened.
Then he killed another man, only 15 days later. His cousins friend, who I had met before. There was some kind of rift in the business that had lasted for a while between them, and the cousin was a drug addict and a rapist. I know he did it, he didn't tell me outright but he implied it. The cousins friend himself was a brutish, horrific man. From what I understand, he more than deserved it. I have no sympathy for his death.
Maybe 5-6 years later, he shouted at me to throw down his gun from his bedroom drawer, quickly, as quickly as possible. I did, he ran back outside, I heard a flurry of gunfire and a girl shrieking in pain and crying, then another gunshot which ended that. I locked myself in my bathroom door, horrified, literally *petrified* of what had just happened.
I waited a bit, a few months, but that night was the night I realized I had to leave him. During those few months, cops came to my door, and asked me questions about that night. I said I knew nothing, didn't hear anything. They told me she was a dancer at the nightclub he worked at. 19 years old, with a child, born in Baku. I still didn't say anything. They didn't entirely suspect him at that point.
We divorced. I moved to the UK, then to the USA. It has been... let me think, 17 years since I divorced him? I believe. We got married in 1993 and divorced in 2001, so 17 years. I found out he died of a heart attack recently. Well, I found out recently, but the heart attack was last year.
I don't know why I have never told anyone in the West about my experience with him. I tell people I was married before, but to an alcoholic, and that is all I say as to why I broke it off with him. I have never told anyone the real reason.
I feel such immense dread in relation to the fact that I let him kill people and get away with it. He should have suffered and went to jail, and I lied to the police. He killed a 19 year old mother. | 0non-cybersec
| Reddit |
Judgemental equalities of path composition. <p>I have yet another question about Cubical Type Theory, this time involving path composition.</p>
<p>I think I have grasped the face systems and formation of the <code>comp</code> primitive. However, the way it reduces in particular cases is a big mystery to me.</p>
<p>In the following section, let <code>A,X</code> be types, <code>p,q</code> paths (their orientation should be clear from context), <code>a,b,x,...</code> points. Endpoints of the interval are <code>1i</code> and <code>0i</code>.</p>
<p>For example, does <code><i> comp (<_> A) (p @ i) [(i=0i) => <_> a, (i=1i) => <_> b]</code> produce <code>p</code>?</p>
<p>What is the difference between <code><i> comp X (p @ i) []</code> and <code><i> comp X (p @ i) [(i=0i) => <_> a]</code>? Is an omitted face bound the same as identity-path face bound?</p>
<p>How does one prove that <code><i> comp (<_> A) (p @ i) [(i=0i) => <_> a, (i=1i) => q]</code> and <code>comp (<i> Path A a (q @ i)) p []</code> are the same? Or are they?</p>
<p>Last but not least, does it matter which paths we use in the face bounds? I mean what is the difference between <code><i> comp (<_> A) (p @ i) [(i=0i) => <_> a, (i=1i) => q]</code> and <code><i> comp (<_> A) b [(i=0i) => <j> p @ -j, (i=1i) => q]</code>?</p>
<p>The corresponding cubes are:</p>
<pre><code>a - - - - > c
^ ^
| |
| <_> a | q
| |
| p |
a --------> b (comp1)
</code></pre>
<pre><code>a - - - - > c
^ ^
| |
| inv p | q
| |
| <_> b |
b --------> b (comp2)
</code></pre>
<p>I think they ought to be equal, but how does one derive such a judgement?</p>
| 0non-cybersec
| Stackexchange |
Reverse Y-Axis in PyPlot. <p>I have a scatter plot graph with a bunch of random x, y coordinates. Currently the Y-Axis starts at 0 and goes up to the max value. I would like the Y-Axis to start at the max value and go up to 0.</p>
<pre><code>points = [(10,5), (5,11), (24,13), (7,8)]
x_arr = []
y_arr = []
for x,y in points:
x_arr.append(x)
y_arr.append(y)
plt.scatter(x_arr,y_arr)
</code></pre>
| 0non-cybersec
| Stackexchange |
Slugify via helper or store slug on database?. <p>I have a simple question: <strong>Slugify via helper or store the <a href="http://en.wikipedia.org/wiki/Slug_%28web_publishing%29#Slug" rel="nofollow noreferrer" title="'slug is the part of a URL which identifies a page using human-readable keywords....'">slug</a> on database?</strong></p>
<p>I mean, let's suppose that I have <code>Guilherme Oderdenge</code> on database and I want to transform it into a human-readable URL such as <code>http://myapp.com/guilherme-oderdenge/</code>, what's the best way to perform this? Storing <code>guilherme-oderdenge</code> in the database or transforming <code>Guilherme Oderdenge</code> in a slug with a helper like <code>user.name.slugify</code>?</p>
<p>I know there are some ways to reach the expected result, but which one is better? Or at least there is a better way?</p>
<h3>It depends of the technology that you're using</h3>
<p>-<br />
I'm using Ruby On Rails with MySQL.</p>
| 0non-cybersec
| Stackexchange |
Javascript web app and Java server, build all in Maven or use Grunt for web app?. <p>We are doing a web application with AngularJS and we like the idea of using Bower for Dependency Management and Grunt for building, running tests etc. (<a href="http://yeoman.io/">Yeoman</a>)</p>
<p>The server is done with Java using Maven, so of course we would like with a simple <code>mvn install</code> build everything (web application + server)</p>
<p>So what approach you took and why?</p>
<p>1) Treat them as two different applications, which in fact they are. So using different building methods/tools is acceptable.</p>
<p>2) Forget about Grunt Bower, use Maven plugins to build, run tests, manage dependencies for the web application. If that is the case, which ones?</p>
<p>3) Use Maven exec plugin to call Grunt to build the front-end webapp. I see this more as a hack than a solution.</p>
<p>4) Other.</p>
<p>Approach easier to integrate with Jenkins is a plus.</p>
<p>Thanks in advance!</p>
| 0non-cybersec
| Stackexchange |
Send Your Name to Mars: Future Mission. | 0non-cybersec
| Reddit |
Beautiful blue view of the red planet. | 0non-cybersec
| Reddit |
This Seinfeld thing is finally over... or is it?. | 0non-cybersec
| Reddit |
Two buddies now. | 0non-cybersec
| Reddit |
[M22] I've been in love with the love of my life [F23] for almost 7 years now and we're finally together. Problem is, we're cross country form each other and I have no idea how to get to her.. So, i'm not really sure how to start this off, so i'll just jump right in.
I'm head over heals in love with this girl and she feels the exact same about me. She is the only girl that has stood by me and always been there for me throughout my life. We are best friends. Recently we've both been single at the same time, since other times, one of us had been in a dedicated relationship and despite our feelings for each other, we stayed in our current relationships even though we desperately wanted so be with each other.
The reason we we're never together until now and didn't break up with past partners to just be together was because of one problem: We live over a thousand miles apart. We both live in the U.S. I live in Alabama, and she lives in Texas. I guess you can see why this would be a problem. Recently, though, we've decided to just make the jump and be together, even with the distance. We're trying to come up with a way for me to move to Texas.
We've discussed this and I have already traveled a lot for one of my old jobs and i'm already accustomed to moving around the U.S. I wouldn't mind leaving friends/family to finally be with her. She is my best friend, after all. I'm also already used to being alone for the most part due to my old job. Now, I say old job because the guy I worked for drove the company into the ground and I lost my job, unfortunately.
Here's the hard part, I recently bought a car with the money I had saved and I was going to get a job, I was very close to getting a job ( might even still have a chance at it) but after I got the car, I held off getting insurance because i used almost my entire savings just to get the car I needed to be able to have a way too and from work. That came back to bite me in the ass, though. As I was coming home from a funeral about a month later, a guy caused an accident ( and drove off, we didn't see anything other than it was a black sedan) on the interstate/freeway and cause me and another driver to collide. It totaled my car. I now and stuck with no job and i'm down to my last 100$ and living with a friend.
I'm at a point where I can start over somewhere since I have no possessions other than clothes and my laptop. That is it. Which is why I thought it would be the perfect (although not easy) opportunity to finally be with her. I need help with ideas as I have never done this before without help from outside sources.
We love each other and have loved each other for almost 7 years now. Our love for each other has never waned, only grown even despite the distance and time. If soul mates exist, we are it. We are drawn to each other all the time. I can't remember the last day I haven't thought about her before we started talking years ago.
I dropped out of high-school when I was younger and I never got my GED because I never stopped to think about it. I started working and that's what I've been doing ever since.
The main things holding us back from being together is just a job for me in Texas. I have no idea how i'd look for a job there. Especially without a GED. I have no idea how I would make it to that job without a car. These are the only two things keeping us apart. I'm struggling to figure out how to come up with a plan to maybe SOMEHOW find a job and find a way to get to and from it without my own personal transportation until I can afford my own again.
I'm down to my last 100$, I may have a job I can get here in Alabama, but we want to cut out time apart as short as possible, if we can find a way to do it.
Please, if anyone has any ideas of thoughts on the situation, please just leave a comment below. If you'd like, I could probably also get her to come on here and post if she has the time at some point.
Any ideas and thoughts from anyone are greatly appreciated. I have no one to talk to about this and I need help.. we need help.
Thank you, very much.
**TL:DR. Me [22] and girlfriend [23] (known for 7 years) are too far apart and I have no idea how to get to her. Need ideas/suggestions to help make it happen.**
**UPDATE:** After I posted this, I got a job offer that can sustain me for a little while until I can save enough to get the other things done. Transportation problem also go solved in the process. It should be only 2-3 months until I can move over to texas. Feels awesome. | 0non-cybersec
| Reddit |
Chern classes and singular hermitian metrics on vector bundles. <p>Let $L$ be a holomorphic line bundle on a complex manifold $X$, and assume it is equipped with a singular hermitian metric $h$ with local weight $\varphi$. Then, one can show that the de Rham class of $\frac{i}{\pi}\partial \overline{\partial} \varphi$ coincides with the first Chern class $c_1(L)$ of the line bundle.</p>
<p>Is there a generalization of this result to higher-rank vector bundles? </p>
<p>For example, let $E$ be a holomorphic vector bundle of rank $r$ on a complex manifold $X$ and let $h$ be a singular hermitian metric on $E$. Can we describe the Chern clases $c_1(E),\ldots,c_r(E)$ in terms of $h$ and its curvature form? </p>
| 0non-cybersec
| Stackexchange |
Snort and DNS matching, how do those dots get determined?. I'm familiar with making a snort sig on a DNS query, or at least I thought I was. The segments are preceded by a hex value that states how many characters are in the following bit: \[09\]something\[03\]com
​
So this is a weirdish question that I had trouble getting an answer on when googling. How does it know where those periods are?
​
I'm trying to do a DNS signature where there are long random strings separated by periods in a query. Like say 3 long strings 50-60 characters in length. In the payload, its just lines of hex values. How does it know which ones are a period vs the random characters? Is there some way to match on the "period" when you don't know exactly how many characters it will be in front of?
​
Thanks! | 1cybersec
| Reddit |
How to execute code before Nuxt initializes the state store?. <p>I'm trying to load the <code>reflect-metadata</code> polyfill so I can use Inversify with a Nuxt app, but I can't manage to load it early enough to be able to use decorators in Vuex modules. (I tried doing this in a plugin, but plugins seem to be loaded after the initialization process.)</p>
<p>Is it possible to hook into the initialization process <em>before</em> Nuxt loads the store modules - or anything else?</p>
| 0non-cybersec
| Stackexchange |
The deeper you get the weirder things are (Benthocodon). | 0non-cybersec
| Reddit |
What structure does the space of functions into $X$ (or the cartesian exponentiation of $X$) inherit from $X$?. <p>When dealing with a space $X$, that posses a lot of structure (complete lattice, complete metric space, vector space), what can be said about the cartesian exponentiation $X^Y=\{f \mid f:Y\rightarrow X\}$ (whic is the set of functions from another set $Y$ to $X$)?</p>
<p>It is intuitivly clear, that the point-wise versions of operations and relations in $X$ carry over many properties of $X$ to $X^Y$. (e.g. $X^Y$ is also a vector space with point-wise addition and multiplication, it is also a complete lattice with the point-wise or product order. It is also a complete metric space under the maximum (or point-wise) metric).</p>
<p>Is there a field of mathematics, that is concerned with this particular sharing of structure between a space $X$ and its function space $X^Y$?</p>
<p>Or more pragmatically, what results can I use, in order to spare me the proof of these 16 mostly trivial and shallow implications (8 for vector space, 3 for partial order + 1 completeness, 3 for metric + 1 completemess)?</p>
| 0non-cybersec
| Stackexchange |
Is there a program to enable/disable a computer's DVD-ROM drive with a mouse click?. <p>Frequently I have a DVD-disk left in the DVD-ROM drive, which I am kind of reluctant to take out. I have Windows-7 OS which freezes constanly checking on that disk. I do not need that constant checking, because I know what disk I have in the drive.</p>
<p>Is there a way to turn off the DVD-drive when I do not need to use it?</p>
<p>Thank you.</p>
| 0non-cybersec
| Stackexchange |
Someone Please Tell Gov. Nikki Haley to STFU About Contraception. | 0non-cybersec
| Reddit |
nginx proxy_pass works only for root path. <p>I want to setup nginx as a reverse proxy for apache. I have apache on port 8080. It works only for the root path, for example <a href="https://www.example.com" rel="nofollow noreferrer">https://www.example.com</a>, but it won't work for <a href="https://www.example.com/index.html" rel="nofollow noreferrer">https://www.example.com/index.html</a></p>
<pre><code> location / {
try_files $uri $uri/ /index.php;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $remote_addr;
proxy_set_header Host $host;
proxy_pass http://127.0.0.1:8080;
}
</code></pre>
<p>I tried adding slash to the address, like <a href="http://127.0.0.1:8080/" rel="nofollow noreferrer">http://127.0.0.1:8080/</a> but then I got config error. Something like here: <a href="https://stackoverflow.com/questions/21662940/nginx-proxy-pass-cannot-have-uri-part-in-location">https://stackoverflow.com/questions/21662940/nginx-proxy-pass-cannot-have-uri-part-in-location</a> I tried to use the rewrite, but I don't know what should this rewrite be.</p>
| 0non-cybersec
| Stackexchange |
Does a clean and extendable LSTM implementation exists in PyTorch?. <p>I would like to create an <code>LSTM</code> class by myself, however, I don't want to rewrite the classic <code>LSTM</code> functions from scratch again. </p>
<p>Digging in the code of <strong>PyTorch</strong>, I only find a dirty implementation involving at least 3-4 classes with inheritance: </p>
<ol>
<li><a href="https://github.com/pytorch/pytorch/blob/98c24fae6b6400a7d1e13610b20aa05f86f77070/torch/nn/modules/rnn.py#L323" rel="nofollow noreferrer">https://github.com/pytorch/pytorch/blob/98c24fae6b6400a7d1e13610b20aa05f86f77070/torch/nn/modules/rnn.py#L323</a></li>
<li><a href="https://github.com/pytorch/pytorch/blob/98c24fae6b6400a7d1e13610b20aa05f86f77070/torch/nn/modules/rnn.py#L12" rel="nofollow noreferrer">https://github.com/pytorch/pytorch/blob/98c24fae6b6400a7d1e13610b20aa05f86f77070/torch/nn/modules/rnn.py#L12</a></li>
<li><a href="https://github.com/pytorch/pytorch/blob/98c24fae6b6400a7d1e13610b20aa05f86f77070/torch/nn/_functions/rnn.py#L297" rel="nofollow noreferrer">https://github.com/pytorch/pytorch/blob/98c24fae6b6400a7d1e13610b20aa05f86f77070/torch/nn/_functions/rnn.py#L297</a></li>
</ol>
<p>Does a <em>clean</em> <strong>PyTorch</strong> implementation of an <code>LSTM</code> exist somewhere? Any links would help. </p>
<p>For example, I know that clean implementations of a <code>LSTM</code> exists in <strong>TensorFlow</strong>, but I would need to derive a <strong>PyTorch</strong> one. </p>
<p>For a clear example, what I'm searching for is an implementation as clean as <a href="https://github.com/hardmaru/supercell/blob/063b01e75e6e8af5aeb0aac5cc583948f5887dd1/supercell.py#L143" rel="nofollow noreferrer">this</a>, but in <strong>PyTorch</strong>: </p>
| 0non-cybersec
| Stackexchange |
**GPO - How to block creation of folder and files in root directory in Windows 10. <p>I would like to use a GPO setting to block users to create folders and files in the root directory in Windows 10.
Searching on internet I found the setting </p>
<blockquote>
<p>Computer configuration -> Policies -> Windows settings-> Security
Settings-> File System</p>
</blockquote>
<p>where I created an entry for %SystemDrive%\ where Authenticated users have "<strong>Deny</strong>" to "<strong>Create Files/Write data</strong>" and "<strong>Create folders/append data</strong>", applied to "<strong>This folder only</strong>".</p>
<p>After saving and linking the GPO, I rebooted the workstation to get the new policies but the settings does not block anything.</p>
<p>Any idea what could be wrong? any other suggestion to achieve the same result?</p>
<p>thanks a lot.</p>
| 0non-cybersec
| Stackexchange |
Paris, Notre Dame attack: man hits policeman with hammer, gets shot down by other policeman. | 0non-cybersec
| Reddit |
DMARC failure on forwarded SharePoint Online emails. <p>I have a client that uses SharePoint Online but insists on using Gmail. Each user has a O365 account with an Exchange Online mailbox and mail flow/delivery options are set to forward all incoming mail to the corresponding user's Gmail address.</p>
<p>From Monday (08/10/2018), all forwarded mail from [email protected] (the default from-address of SharePoint Online used for alerts and workflow email) has ended up in the Spam folder of each user's Gmail account. The same happens when forwarding to a @outlook.com account.</p>
<p>It appears that the forwarded mails are failing DMARC so are being quarantined by the recipient mailbox.</p>
<p>Header:</p>
<pre><code>Authentication-Results: spf=pass (sender IP is 213.199.154.180)
smtp.mailfrom=mytenant.onmicrosoft.com; outlook.com; dkim=pass (signature was
verified) header.d=mytenant.onmicrosoft.com;outlook.com; dmarc=fail
action=oreject header.from=sharepointonline.com;
Received-SPF: Pass (protection.outlook.com: domain of mytenant.onmicrosoft.com
designates 213.199.154.180 as permitted sender)
receiver=protection.outlook.com; client-ip=213.199.154.180;
helo=EUR01-DB5-obe.outbound.protection.outlook.com;
</code></pre>
<p>The way I understand it, DKIM and SPF are passing but DMARC is failing because the <em>header.d</em> address does not match the <em>header.from</em> address.</p>
<p>Is that about right? Is there any way around this? Is there some way I can "whitelist" the sharepointonline.com domain so that these forwarded mails are no longer quarantined?</p>
<p>I don't fully understand how all this works but shouldn't this not be a problem as mytenant.microsoft.com and sharepointonline.com are both MS-owned domains?</p>
| 0non-cybersec
| Stackexchange |
Polymorphism in Excel Dna / F#. <p>In F# / Excel-Dna, what is the idiomatic way to rewrite the following function for a vector of strings? (i.e. a function which sorts a "vector" (=1d Excel range) of strings).</p>
<pre><code>[<ExcelFunction(Category="Some Cat", Description="Sort 1d range filled with doubles.")>]
let mySortDouble (vect : double[]) : double[] =
Array.sort vect
</code></pre>
<p>If I merely replace the double types with string types in the above snippet, I get this error message : <code>Initialization [Error] Method not registered - unsupported signature, abstract or generic: 'MyFSFunctions.mySortString'</code></p>
<p>I saw <a href="https://stackoverflow.com/questions/46407760/excel-dna-f-error-initialization-error-method-not-registered">this previous question</a> where Govert suggests to use the "Registration extensions" but I have not found how to use it to answer my current question. </p>
| 0non-cybersec
| Stackexchange |
I made this painting. . | 0non-cybersec
| Reddit |
Ubuntu 18.04 fails to boot even in recovery mode (stuck on loading initial ram disk) on ASUS UX433FA. <p>So I had a working dual boot set up with Ubuntu 18.04 and Windows 10, when I ran an apt upgrade and now I can no longer boot into Ubuntu (windows works fine), with the recovery mode output stuck at “Loading initial ramdisk”. Previously, I’ve noted that my laptop is unable to run Ubuntu 19.04 (but it is able to run 18.10), with it also resulting in the same problem of being stuck on “loading initial ramdisk”.</p>
<p>I ran the yannubuntu boot repair tool, which fixed the problem for exactly one boot - without any apt upgrades or installations, the laptop failed to boot on successive attempts. Boot repair doesn’t work on further attempts either, here is the pastebin from the output: <a href="http://paste.ubuntu.com/p/wkGfGdQgJH/" rel="noreferrer">http://paste.ubuntu.com/p/wkGfGdQgJH/</a></p>
<p>This laptop model has no discrete graphics card so it’s not a driver issue with that.</p>
<p>Running the Linux 5.1.1 kernel, and switching to an older kernel does not help either</p>
| 0non-cybersec
| Stackexchange |
[Request] Religious or Emotional Documentary. I just watched Going Clear on HBO - the Scientology doc that everyone is talking about. Now I'm in the mood for more.
Some of my favorites have been Jesus Camp, Dear Zachary, and things of that nature. Anything else that you can recommend? Maybe something I've missed? | 0non-cybersec
| Reddit |
Christmas is coming early. | 0non-cybersec
| Reddit |
"Yeah, this'll do. Right here is perfect.". | 0non-cybersec
| Reddit |
An unintentionally S&M moment [Mangaka san to Assistant san]. | 0non-cybersec
| Reddit |
Caught Reggie Mid Yawn. | 0non-cybersec
| Reddit |
Making the sham that is police unions more relatable. | 0non-cybersec
| Reddit |
This napkin. | 0non-cybersec
| Reddit |
LPT: If on the brink, or currently are, homeless get a gym membership if able. It’ll (in some cases) provide showers, warmth, and water.. | 0non-cybersec
| Reddit |
How to backup Sharepoint databases. <p>I am responsible for backups of normal DBs, but SharePoint is handled by others. Bit worried that we miss something here.</p>
<p>Is SharePoint backup handled completely through some tool in SharePoint, or should I also make regular SQL Backups of the databases outside SharePoint?</p>
| 0non-cybersec
| Stackexchange |
UK goes more than 100 hours without using coal power for first time in a century. | 0non-cybersec
| Reddit |
The "Crystal Head" Vodka bottle gets a facial reconstruction. | 0non-cybersec
| Reddit |
There's a hospital ship waiting for sick Puerto Ricans -- but no one knows how to get on it. | 0non-cybersec
| Reddit |
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
| Stackexchange |
Saw these shoes on my trip to Hong Kong.... | 0non-cybersec
| Reddit |
How to take a screenshot every n second?. <p>What software can I use to take screenshots with a set interval? I'd like to take screenshots every 2 second or so. Command-line and GUI are both ok.</p>
<p>I'd prefer software that can also resize and compress each screenshot. </p>
| 0non-cybersec
| Stackexchange |
Even the LastPass Will be Stolen Deal with It!. | 1cybersec
| Reddit |
WCGW when you don't keep your eyes on the road.. | 0non-cybersec
| Reddit |
Bought my first house, 1 room dedicated to battlestations.. | 0non-cybersec
| Reddit |
Booting with an SSD. | 0non-cybersec
| Reddit |
How long do you wait to have sex with someone new?. This may have already been asked at some point here but I'm new and wasn't sure what to search for to find this. So how long do you typically wait to sleep with a new partner? I realize most of us probably don't have a set amount of time so just an idea.
I personally wait until I feel I trust my SO and more of a relationship has been established. The last 2 guys I dated, it was about 2 months before we had sex, counting from first date/start of hanging out. This is partly because of not having an opportunity to do so sooner and partly me waiting to be sure about each guy. My last boyfriend said it was a long time to wait, although he didn't seem too bothered by it. It's not like I set out thinking "ok no sex until we've been dating for 2 months", so I don't think it's weird, but it did get me wondering. I also took my time with him because our first date was also our first time meeting (yay online dating).
I just know that casual sex isn't for me because I get too emotionally invested and end up hurt, so this is like my way of being more careful.
Anyway, what are your rules of thumb?
Edit: I should also note that we fool around and stuff, I'm specifically talking about PIV. I could never go more than 2 months for sure, and I could never go more than a month not doing anything at all. | 0non-cybersec
| Reddit |
When she doesn’t do anal... but her friend does 😏 #wingwoman. | 0non-cybersec
| Reddit |
What is "overlapping instructions" obfuscation?. <p>I analyzed some binaries in x86/x86-64 using some obfuscation tricks. One was called <em>overlapping instructions</em>. Can someone explain how does this obfuscation work and how to work around?</p>
| 1cybersec
| Stackexchange |
[WP] Canada has suddenly gone dark. No communication, no trade, no activity from within. Nothing for days. Alaska, now cut off from mainland US, is slowly ceasing in contact with the US federal government until a final correspondence is given: "Leave us. Reinforce the border. Don't ever open it.". | 0non-cybersec
| Reddit |
Diffie-Hellman Key Exchange in $GF(2^5)$. <p>Stuck in a question where the DHKE (Diffie-Hellman key exchange ) is done in the $GF(2^5)$. The irreducible polynomial is $P(x) = x^5+x^2+1$. The $\alpha$ value is $x^2$. If the private keys of $a = 3$ and $b = 12$ what is the session key $K_{ab}$?</p>
<p>Now the calculation of $K_{ab}$ = $\alpha^{ab} \bmod P(x)$. This would translate to $x^{2^{36}}$. Can anyone suggest how to further break this? Should we use the concept of cyclic groups or square-multiply algo here?</p>
| 0non-cybersec
| Stackexchange |
[GIF REQUEST] There Will Be Blood "I'm your brother from another mother". It's about an hour and 18 minutes in | 0non-cybersec
| Reddit |
[50/50] chop chop motherfucker[NSFW]/Clop Clop Motherfucker. | 0non-cybersec
| Reddit |
Numbers $a$ for which every Sophie Germain safe Prime ($2p+1$) it is a quadratic residue $\pmod {2p+1}$ $>$ $a$. <p>Are there any numbers $a$ (not a perfect square of course) for which every Sophie Germain prime $p$ $>$ $a$, $a$ will always be a quadratic residue $\pmod {2p+1}$. In other words, the Legendre Symbol ($a$ | $2p+1$) $=$ $1$ whenever $p$ is a Sophie Germain Prime greater than $a$.</p>
<p>The only $a$ I was able to find is $3$, and it is a quadratic residue to all <a href="https://oeis.org/A005385" rel="nofollow">"safe" primes</a> (primes of the form $2p+1$ with $p$ prime) where $p$ $>$ $3$. The proof for this is that when $p$ $>$ $3$ and $p$ is prime, $p$ $=$ $±1$ $\pmod 6$. Then $2p+1$ is $3$ or $11$ $\pmod {12}$. $p$ $=$ $1$ $\pmod 6$ cannot be a Sophie Germain Prime, otherwise it is divisible by $3$. This leaves $p$ $=$ $5$ $\pmod 6$, and $2p+1$ $=$ $11$ $\pmod {12}$. $3$ is a quadratic residue to any prime $±1$ $\pmod {12}$, as mentioned in my previous posts. </p>
<p>Anyways, despite all of my work above, my question here is weather or not there exists another integer $a$ with the same properties as $3$. For example, $a$ $≠$ $2$, $5$, $7$, $8$, $10$, or $11$ as shown with ($2$ | $11$) $=$ $-1$, ($5$ | $23$) $=$ $-1$, ($6$ | $59$) $=$ $-1$, ($7$ | $23$) $=$ $-1$, ($8$ | $59$) $=$ $-1$, ($10$ | $23$) $=$ $-1$, ($11$ | $47$) $=$ $-1$. $12$ is my next possible choice, (since perfect squares are excluded) but is anyone able to demonstrate a proof/disproof that $3$ is the only such number? Thanks for help.</p>
| 0non-cybersec
| Stackexchange |
How does one update a Jailbroken 4S on 6.1 to 6.1.1 and preserve their jailbreak?. <p>I'm running a iOS 6.1 on a jailbroken iPhone 4S. I was one of the many to jailbreak my phone when evasi0n came out. As some of you may know, Apple has released iOS 6.1.1, an 'emergency' update for some battery and other issues experienced on the 4S. I'm one of those affected by the battery issues (its not the jailbreak's fault, I'm very conservative with what I install).</p>
<p>I'm hesitant to just hit update in iTunes. Do I need to restore my phone first to a fresh 6.1.1, restore all my data then re-jailbreak? Am I going to have to install all of my tweaks again? Thanks for any input on this.</p>
| 0non-cybersec
| Stackexchange |
How do I disable or enable Gradle / Maven auto-import for an IntelliJ IDEA project?. <p>I inadvertently clicked the link to enable auto import of a Gradle project I was working on. How do I disable it for the current project? The only option I'm finding is for disabling it by default for all projects.</p>
<p>I'm on IDEA 2017.1.</p>
| 0non-cybersec
| Stackexchange |
List of Figures - how to add caption label. <p>I'm using the <code>caption</code> package.
In the List-Of-Figures I get only the numbers, but I also want to have the prefix.
It currently looks like that:</p>
<blockquote>
<p>List of Figures<br>
1 Caption of Figure 1........1<br>
2 Caption of Figure 2........9 </p>
</blockquote>
<p>And I want it to look like:</p>
<blockquote>
<p>List of Figures<br>
Figure 1: Caption of Figure 1...1<br>
Figure 2: Caption of Figure 2...9 </p>
</blockquote>
<p>The same format is already used for the captions themselves.</p>
| 0non-cybersec
| Stackexchange |
oh no ... not the nail clipper .... | 0non-cybersec
| Reddit |
Configuring jenkins with bitbucket error. <p>I've got an ssh key in ~/.ssh/id_rsa.pub when I login as the jenkins user.</p>
<p>I've imported this into bitbucket correctly and it has accepted the key.</p>
<p>When I try to do a git clone (to the correct URL) I still get....</p>
<pre><code>Building in workspace /var/lib/jenkins/jobs/Google adwords/workspace
Checkout:workspace / /var/lib/jenkins/jobs/Google adwords/workspace - hudson.remoting.LocalChannel@2c473996
Using strategy: Default
Cloning the remote Git repository
Cloning repository origin
ERROR: Error cloning remote repo 'origin' : Could not clone [email protected]:DAVID99WORLD/assessme.git
hudson.plugins.git.GitException: Could not clone [email protected]:DAVID99WORLD/assessme.git
at hudson.plugins.git.GitAPI.clone(GitAPI.java:268)
at hudson.plugins.git.GitSCM$2.invoke(GitSCM.java:1122)
at hudson.plugins.git.GitSCM$2.invoke(GitSCM.java:1064)
at hudson.FilePath.act(FilePath.java:842)
at hudson.FilePath.act(FilePath.java:824)
at hudson.plugins.git.GitSCM.checkout(GitSCM.java:1064)
at hudson.model.AbstractProject.checkout(AbstractProject.java:1256)
at hudson.model.AbstractBuild$AbstractBuildExecution.defaultCheckout(AbstractBuild.java:589)
at jenkins.scm.SCMCheckoutStrategy.checkout(SCMCheckoutStrategy.java:88)
at hudson.model.AbstractBuild$AbstractBuildExecution.run(AbstractBuild.java:494)
at hudson.model.Run.execute(Run.java:1502)
at hudson.maven.MavenModuleSetBuild.run(MavenModuleSetBuild.java:477)
at hudson.model.ResourceController.execute(ResourceController.java:88)
at hudson.model.Executor.run(Executor.java:236)
Caused by: hudson.plugins.git.GitException: Command "git clone --progress -o origin [email protected]:DAVID99WORLD/assessme.git /var/lib/jenkins/jobs/Google adwords/workspace" returned status code 128:
stdout: Cloning into '/var/lib/jenkins/jobs/Google adwords/workspace'...
stderr: Host key verification failed.
fatal: The remote end hung up unexpectedly
</code></pre>
<p>Does anyone know of a reason why this would occur? According to the documentation I've read ~/.ssh is the correct directory as the jenkins user for this file to exist.</p>
<p>EDIT : My jenkins user does not have a known_hosts file in ~/.ssh but my root level ones do - should it? I can do a clone with my jenkins user just fine and it doesn't mention the host at all as jenkins user.</p>
| 0non-cybersec
| Stackexchange |
On a special continuous extension of Sylvester's Theorem. <hr>
<p><strong>Notations.</strong> Denote by <span class="math-container">$S^{-}\left\{a_0,a_1,\ldots,a_m\right\}$</span> the number of strict sign changes in the indicated sequence <span class="math-container">$\left\{a_j\right\}_{j=0}^{m}$</span> of real numbers (i.e., when counting the sign changes, zero terms are discarded). Let <span class="math-container">$Z\left(f\right)$</span> be the number of zeros (counting their multiplicities as well) of a <span class="math-container">$C^{\infty}$</span> real-valued real function <span class="math-container">$f$</span> over its definition domain <span class="math-container">$\operatorname{Dom}\left(f\right)$</span>.</p>
<hr>
<p>One of J. J. Sylvesters's results can be formulated in the next</p>
<blockquote>
<p><strong>Theorem (Sylvester's classic result).</strong> Let <span class="math-container">$\left\{\varphi_{j}\right\}_{j=0}^{m}$</span> be a sequence of strictly increasing real numbers and assume that the <em>polynomial</em>
<span class="math-container">\begin{equation}
p\left(u\right) = \sum_{j=0}^{m} a_j \left(u - \varphi_{j}\right)^{q},~u \in \mathbb{R}
\label{eq:q_polynomial}
\end{equation}</span>
does not vanish identically, where <span class="math-container">$q\in\mathbb{N}_{\geq 1}$</span> and the sequence <span class="math-container">$\left\{a_j\right\}_{j=0}^{m}$</span> consists of non-zero real numbers. Then,
<span class="math-container">\begin{equation}
Z\left(p\right)
\leq
S^{-}\left\{a_0, a_1, \ldots, a_{m},\left(-1\right)^{q}a_0\right\}.
\label{eq:Sylvester_s_classic_inequality}
\end{equation}</span></p>
</blockquote>
<p>The theorem above can be found, e.g., in: </p>
<ul>
<li>[J. J. Sylvester, 1908. <em>Collected mathematical papers</em>, Vol. II, Cambridge, p. 408];</li>
<li>[Gy. Pólya, I. J. Schönberg, 1958. <em>Remarks on de la Vallée Poussin means and convex conformal maps of the circle</em>, Pacific Journal of Mathematics, 8(2):295<span class="math-container">$-$</span>334, p. 299, <a href="https://projecteuclid.org/euclid.pjm/1103040105" rel="nofollow noreferrer">https://projecteuclid.org/euclid.pjm/1103040105</a>];</li>
<li>[S. Karlin, 1968. <em>Total positivity</em>, Vol. I, Stanford University Press, California, Lemma 3.1, p. 466].</li>
</ul>
<hr>
<p><strong>Question.</strong> I would be interested in the validity of a special continuous extension of Sylvester's classic result. Can anyone either prove or disprove the next statement? </p>
<blockquote>
<p><strong>Statement to be proved/disproved.</strong> Let <span class="math-container">$\left\{ \varphi_{j}\right\} _{j=0}^{m}$</span> be a sequence of strictly
increasing real numbers and consider the <em>function</em>
<span class="math-container">\begin{equation}
p\left( u\right) =\sum_{j=0}^{m}a_{j}\left( \left( u-\varphi_{j}\right)
^{2}\right) ^{q+\alpha},~u\in\mathbb{R},\label{eq:q_alpha_function}%
\end{equation}</span>
where <span class="math-container">$q\in\mathbb{N}_{\geq1}$</span>, <span class="math-container">$\alpha\in\left( 0,1\right) $</span>, while the
sequence <span class="math-container">$\left\{ a_{j}\right\} _{j=0}^{m}$</span> consists of non-zero real
numbers. Then,
<span class="math-container">\begin{equation}
Z\left( p\right) \leq S^{-}\left\{ a_{0},a_{1},\ldots,a_{m},a_{0}\right\}.
\end{equation}</span></p>
</blockquote>
<hr>
<p><strong>Remarks.</strong> Note that, for <span class="math-container">$\alpha \in \left\{0,1\right\}$</span>, the statement in the question is true, since in these cases the function <span class="math-container">$p$</span> becomes a polynomial, and one can apply Sylvester's classic result for the even powers <span class="math-container">$2q$</span> and <span class="math-container">$2(q+1)$</span>. The function <span class="math-container">$p$</span> is <span class="math-container">$C^\infty$</span> almost everywhere, which can make it difficult to study the higher order zeros of <span class="math-container">$p$</span>. It would suffice to prove/disprove the statement by counting the zeros of <span class="math-container">$p$</span> as simple points (in the obvious geometric sense) over <span class="math-container">$\mathbb{R}$</span>.</p>
<hr>
<p><strong>Thank you for your time and energy for dealing with my question.</strong></p>
| 0non-cybersec
| Stackexchange |
Networking Ubuntu in Virtualbox with Windows 7 host without router. I've been trying to do this for weeks, googling and searching and not having any luck. My networking skills are really, really weak, so I finally broke down and decided to ask for help.
I have my computer set up for web development work. I run Ubuntu as a server, and then use an IDE and photoshop in Windows as a host. Everything was working great, but I moved and now I don't have a router, I just have a cable modem. I'm trying to access my Ubuntu Virtualbox server from browsers in Windows 7, and it's not working.
I tried to create a network bridge, and when I did I lost internet. Connection sharing got my guest on the internet, but no network.
So, basically, I need to access my virtualbox guest from my windows 7 host without a router. Is this even possible?
Thanks
EDIT:
For anyone who finds this in google or whatever, i fixed it by going back to VMWare. | 1cybersec
| Reddit |
How is Ruby module inclusion not really 'multiple inheritance' and how does the Ruby style avoid the problems associated with multiple inheritance?. <p>Matz supposedly said "mixins could do almost everything multiple inheritance do, without the associated drawbacks" (Matz words)."</p>
<p>First of all, why is Ruby module inclusion not 'multiple inheritance' ? It seems to me there is very little difference between modules and classes. The fact you cannot instantiate a module is irrelevant when it is used as a superclass. </p>
<p>I also know that successive module inclusion forms a single inheritance chain (not tree) extending upwards from the class. But this, to me, is not sufficient to distinguish it from 'multiple inheritance' as the Python multiple inheritance system also "linearizes" the superclass chain (using the <a href="http://www.python.org/download/releases/2.3/mro/" rel="noreferrer">C3 algorithm</a>) it's just that Ruby 'linearizing' process is significantly simpler.</p>
<p>So what exactly distinguishes Ruby module mixins from multiple inheritance in say a language like Python? And why don't the arguments behind the Python adoption of the c3 MRO algorithm apply to Ruby? And if they do apply - why did Ruby decide not to adopt this algorithm ? </p>
<p>thanks</p>
| 0non-cybersec
| Stackexchange |
What is your favorite poem? What does it mean to you?. | 0non-cybersec
| Reddit |
Moving in to my first apartment and really need to start eating better. What are the basic non-perishables I should stock up on?. I'm sure this has been asked before, but I can't find a comprehensive list anywhere, and we all know how bad reddit's search function is.
**Edit: thanks guys!**
So far we have:
*Dry Goods:*
* Brown Rice
* Whole Wheat Pasta
* Oatmeal
* Flour
* Sugar
* Beans
* Peanut Butter
*Canned:*
* Canned Tuna
* Broth
*Condiments:*
* Soy sauce
* Hot sauce
*Spice:*
* Salt / pepper
* Thyme
* Cayenne
* Old Bay
* Curry powder
* Garlic powder
* Cinnamon
* Rosemary
*Other:*
* Olive Oil
* Baking spray (Pam)
* Vinegar
| 0non-cybersec
| Reddit |
Finally in Onederland. Down 75+ lbs in 8 months!. [before and after pics](https://imgur.com/gallery/0rnVYKn)
I hope I can be inspiration to someone since I really can’t believe these photos. I’ve tried dieting just about all of my life. My mom made feel terrible about my weight at a young age when I wasn’t even overweight so my life of yo-yo dieting began when I was 14. I showed my fiancé the pics and he was shocked and couldn’t really remember me looking so big. I haven’t been this small in 10 years. The crazy thing is that this wasn’t that hard and I haven’t even started exercising. I plan to but I just haven’t gotten around to it (I’m a terrible procrastinator and been busy with school, buying a house and planning a wedding, and working full time). I started with strict keto and then got lazy with it since I eat the same things pretty much all the time so I stopped tracking my macros. I stalled for a bit but after some cheat meals and getting back on the keto wagon I had lost a couple pounds and finally got below 200! I started this journey when I got engaged and now I can’t wait to be seen in my wedding dress. | 0non-cybersec
| Reddit |
A few pics from my trip to La Jolla, California - stunning coastline!. | 0non-cybersec
| Reddit |
Home router to interconnect network. <p>Is it possible to use a home router to interconnect two or more routers? After a mistake I had some devices on 192.168.1.0/24 and others on 192.168.10.0/24. Obviously they don't communicate, because I need a router to interconnect them. Is this correct?
Can use a home router to get them communicate.</p>
| 0non-cybersec
| Stackexchange |
Bricked laptop in Ubuntu 12.04 ; with wifi adaptor. <p>I am using a <em>Asus laptop</em> with Ubuntu 12.04. </p>
<p>My internal wifi adapter stopped working. So I put in a <em>usb adapter</em>. But then I had two adapters both trying to connect to the same network, from Which neither can connect. They keep knocking each other offline. </p>
<p>So after doing some research I was went into <code>etc/network/interfaces</code> and changed it. So that <code>wlan0</code> was <em>manual start instead of auto start</em>. At that point I tried to reboot, and at the splash screen I got a message that the computer was <em>waiting network connection</em>. After a minute or two, that changes to <em>continue booting without correct network configuration</em>. And that's it, it just sits there, doing nothing. </p>
<p>So I boot up with my live CD, and used <code>gksudo nautilus</code>, and went back into the <em>Operating system filesystem</em> (not the filesystem on the cd), and corrected the changes made in the interfaces file,then reboot. Still the same. <code>continue booting without correct network configuration</code>, error msg. I have went back and verified the corrections I made were accurate against the CD filesystem. </p>
<blockquote>
<p><em>So what is happening ?</em> </p>
<p><em>How did I mess up that bad by just adding <code>iface wlan0 inet manual</code> (
from those instructions I found
<a href="https://askubuntu.com/questions/168032/how-to-disable-built-in-wifi-and-use-only-usb-wifi-card?">here</a>
) ?</em></p>
</blockquote>
<p>I decided that was easier than blacklisting, because well it just seemed easier. Just my luck. </p>
<p>Here are the results of some terminal commands, I got these from booting onto the Live CD. I've also had two adapters plugged in together with no problem, but it kept saying <em>wlan0 connected</em> , <em>wlan1 disconnected</em> etc. Until I either get this fixed, or reinstall for all practical purposes it is bricked. </p>
<p>I do have the <kbd>FN</kbd>+<kbd>F2</kbd> combination, I didn't do that to start with because that also turns off the <em>USB adapter</em> . After turning wifi off, and rebooting still the same thing, here's the results leaving off the <em>Wired ethernet</em> other than just to mention it. Also you will notice that the wireless adapters are both the same brand, which is unusual. </p>
<pre><code>lspci -nn
02:00.0 Network Controller [0280]: Ralink Corp. RT5390 Wireless 802.11n 1T/1R PCIe [1814:5390]
lsusb
Bus 002 Device 003: ID 148f:5370 Ralink Technology, Corp. RT5370 Wireless Adapter
sudo lshw -c network
* network
description: Wireless interface
product RT5390 Wireless 802.11n 1T/1R PCIe
Vendor Ralink Corp
physical id: 0
bus info: pci@0000:02:00.0
logical name: wlan0
version: 00
serial: 08:ed:b9:6a:0f
width: 32 bits
clock: 33MHZ
capabilities: pm mse pciexpress bus_master cap_list ethernet physical wireless
configuration: broadcast=yes driver=rt2800pci driverversion=3.8.0-23-generic
firmware=0.34 latency=0 link=no multicast=yes wireless=IEEE 802.11bgn
resources: irq:17 memory:de800000-de80ffff
*-network
description: Wireless interface
Physical id: 1
bus info: usb@2:1.2
logical name: wlan1
serial: 7c:dd:90:12:d2:f2
capabilities: ethernet physical wireless
configeration: broadcast=yes driver=rt2800usb driverversion=3.8.0-23-generic firmware=0.29 link=no multicast=yes wireless=IEEE 802.11bgn
*-network
description: Ethernet interface
pysical id: 0
logical name: eth0
sudo rfkill list all
0: asus-wlan: Wireless LAN
Soft blocked: yes
Hard blocked: no
1: phy0: Wireless LAN
Soft blocked: yes
hard blocked: yes
2: phy1 Wireless LAN
Soft blocked: yes
Hard blocked: no
</code></pre>
| 0non-cybersec
| Stackexchange |
Formatting a Windows 8 drive to install Windows 7. <p>I have problems with my Windows 8 due to compatibility issues with some of my applications. I need remove this Windows 8 and install Windows 7.</p>
<p>How do I do this?</p>
| 0non-cybersec
| Stackexchange |
My friend looking badass.. | 0non-cybersec
| Reddit |
Uhhhhhhhh.... why?. | 0non-cybersec
| Reddit |
How do I show that Lκ = Vκ?. <p>I'm trying to show that Lκ is a model of ZFC if κ is weakly inaccessible. How do I show that Lκ = Vκ? Since we know Vκ is a model of ZFC I believe this is all I have left to show that Lκ is a model.</p>
| 0non-cybersec
| Stackexchange |
NODE JS- EXPRESS: Unable to retrieve value from HTTP Context for POST and PUT requests while it works for GET. <p>In Node.js and Express framework, I am unable to retrieve value from HTTP Context for POST and PUT requests while it works for GET. I am using httpContext to set a unique requestId identifier so that I can use it while logging to trace API requests.</p>
<p>I found out that HttpContext could be reset by some other packages in middle ware, is there a better way to store data for a request scope which could be accessed in all modules.</p>
<p>app.js file</p>
<pre><code>
const app = express();
app.use(httpContext.middleware);
//Assign unique identifier to each req
app.use(function (req, res, next) {
let test = uuidv1();
httpContext.set("reqId", test);
next();
});
const PORT = process.env.PORT || 3001;
Connection.setupPool();
app.use(express.json());
app.use(helmet());
if (app.get("env") === "development") {
app.use(morgan("tiny"));
}
//use to access a resource in the root through url
app.use(express.static("resource"));
app.use("/users", userRouter);
//Code For Instagram authentication Using Passport
logger.info("End-Instagram Authentication Configuration");
app.listen(PORT, () => {
logger.info(`app running port ${PORT}`);
});
</code></pre>
<p>My code for retrieving the reqId from httpContext</p>
<p>logger.js</p>
<pre><code> message = httpContext.get("reqId") ? "RequestId: " +
httpContext.get("reqId")+" "+ message: ""+ message ;
</code></pre>
| 0non-cybersec
| Stackexchange |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.