body1
stringlengths 20
4.1k
| body2
stringlengths 23
4.09k
|
---|---|
I need a command that colorizes some symbol sequence in output of a certain command. I'd like it like grep make it. $ some-command | grep symbol-sequence However grep removed lines that isn't contained symbol-sequence. I'd like to have all original lines with highlighted symbol-sequence. How it can be done? I have alias grep='grep --color=auto' in ~/.bashrc
|
Say I have the following file: $ cat test test line 1 test line 2 line without the search word another line without it test line 3 with two test words test line 4 By default, grep returns each line that contains the search term: $ grep test test test line 1 test line 2 test line 3 with two test words test line 4 Passing the --color parameter to grep will make it highlight the portion of the line that matches the search expression, but it still only returns lines that contain the expression. Is there a way to get grep to output every line in the source file, but highlight the matches? My current terrible hack to accomplish this (at least on files that don't have 10000+ consecutive lines with no matches) is: $ grep -B 9999 -A 9999 test test If grep can't accomplish this, is there another command-line tool that offers the same functionality? I've fiddled with , but it doesn't seem to have an option for it either.
|
I'm interested in giving The Geometry of Physics a read, and I was wondering what the mathematical and (more importantly) physical prerequisites are. My background is a bit stronger on the mathematical side, and I'm worried that if heavy (or even moderate) exposure to physics is required that I'll miss out on a lot. If someone has read it and has a good sense of this sort of thing, I'd very much appreciate the input! A link to the .
|
How and from where does a mathematician learn physics from a mathematical stand point? I am reading the book by Spivak . The first couple of pages of Lecture 1 of the book summarizes what I intend by physics from a mathematical stand point. I wanted to find out what are the other good sources for other branches of physics.
|
When I initialize an object I want to set this.sound to the current value of Dog.sound. The code below appears to make this.sound a reference to Dog.sound's value. How can I grab the value instead of a reference? init: function() { this.sound = Dog.sound; }
|
What is the most efficient way to clone a JavaScript object? I've seen obj = eval(uneval(o)); being used, but . I've done things like obj = JSON.parse(JSON.stringify(o)); but question the efficiency. I've also seen recursive copying functions with various flaws. I'm surprised no canonical solution exists.
|
After running the following command: nmap -v -p 515 127.0.0.1 Ubuntu Show this Message: PORT STATE SERVICE 515/tcp closed printer How To Change Closed to Open ?
|
For services list on my Ubuntu, Printer service not found on port 515. nmap -sT -O localhost PORT STATE SERVICE 23/tcp open telnet 139/tcp open netbios-ssn 445/tcp open microsoft-ds 631/tcp open ipp 9050/tcp open tor-socks Device type: general purpose Running: Linux 3.X OS CPE: cpe:/o:linux:linux_kernel:3 OS details: Linux 3.12 - 3.19, Linux 3.8 - 3.19 There is no Printer service on port 515. How to add Printer service on port 515? nmap -v -p 515 127.0.0.1 Starting Nmap 7.01 ( https://nmap.org ) at 2016-11-19 13:03 IRST Initiating SYN Stealth Scan at 13:03 Scanning localhost (127.0.0.1) [1 port] Completed SYN Stealth Scan at 13:03, 0.21s elapsed (1 total ports) Nmap scan report for localhost (127.0.0.1) Host is up (0.000065s latency). PORT STATE SERVICE 515/tcp closed printer
|
In my case I want to find (using python regex) all lines not containing the words "error" or "empty". In code: varformals : PAR_OPEN PAR_CLOSE {} | PAR_OPEN varform PAR_CLOSE {} /* error / | error PAR_CLOSE {} / error / | error varform PAR_CLOSE {} / error */ | PAR_OPEN error PAR_CLOSE {} ;
|
I know it's possible to match a word and then reverse the matches using other tools (e.g. grep -v). However, is it possible to match lines that do not contain a specific word, e.g. hede, using a regular expression? Input: hoho hihi haha hede Code: grep "<Regex for 'doesn't contain hede'>" input Desired output: hoho hihi haha
|
No!!! I want to download chrome dev to get dev version of libpepperflash or whatever it is called now and add it to chromium. Also DO pre "stable" channels add repository auto?* If not what is the repository?
|
I want to install Google Chrome Nightly (the dev version) next to the stable version. Is there a PPA for Nightly and 12.04? are the only PPAs I found and they are not working on 12.04 yet.
|
I'm trying to render out an animation, but I keep running into a lot of fireflies. I would like to try to avoid the denoise addon since Im rendering an animation, but at the very least I would like to get my samples down (I'm using 500). My scene is relatively simple, its two low poly hallways with lights and doorways, and the emission on the lights is cranked up the 60 (I use filmic blender color management so it doesn't blow out the image). The only thing in my scene that I think could cause all of these fireflies is the lights, but Im not sure why as Ive used bright lights with filmic blender before and it worked just fine. Also most materials in the scene are over .5 roughness, and I got rid of the metallic materials in my scene and the fireflies were still there. Any help would be appreciated, thanks! Blend File:
|
I often use Cycles' built in Glass BSDF shader to achieve realistic refraction effects, but in many cases, it seems that Cycles' glass caustics creates an unfortunately large number of fireflies (pixels that are abnormally bright relative to their surroundings). In some models of mine, even when I render for 3000 or more samples/pixel, my final image is still covered in fireflies. While I can improve this in many cases by increasing the total amount of light available in the scene, this loses a lot of the potency of the refractive effects I'm looking for, especially in scenes with low light levels. So my question is, how can I reduce the amount of fireflies while using Cycles' caustics without sacrificing the quality of the refractive effects? Note: I am aware that Cycles' caustics will perform much better once Cycles has full support for bidirectional path-tracing, but it looks unlikely that that will become , unfortunately.
|
Before I upgraded to 19.04 "Switch windows of an application" used to switch windows of the current application. For example, if I was using a web browser(focused) and had multiple windows open, I would use the "Switch windows of an application" function to immediately cycle through the windows. Since upgrading to 19.04, this same function starts by cycling through the windows of an application which is not focused. I haven't figured out the logic of which application is chooses. Interestingly, this doesn't happen with every application. Terminator, for example, seems to be cycling through its own windows when in focus and using the window switch function. Anybody else experience this?
|
I've noticed that using Super+Tab in 19.04 starts on the focused application which is not very efficient for quickly switching back and forth between applications. The old functionality was that when you typed Super+Tab it would start on the last application you had focused, not the current. Anyone else seeing this?
|
I am designing a web site for online shopping and I have a question related to that. As you know that shopping website may have different product with different statistic/specification. What is the best way to design a database? Below are the thoughts which comes to my mind Creating different tables for different product type. Ex. Phone, Tv, Video Games, Watches, Clothes, Computer etc. Concern: but let's say a to show mobile specification [just like example] I need to have around 40-50 columns to store a mobile specification. And let's say tomorrow one new feature comes to mobile then I probably have to add one more column which will hold the value for that specific model and for every other mobile that column will be NULL. 2: Having major product tables ex. Electronics, clothing and accessories, health etc.. and a separate specification table for each table. Ex. Electronics table will hold the master details for tablets, mobile, land line etc. and Electronics_Spec will contains the columns with related specification. Concern: There are many characteristic between products which does not match with others. Ex. land line phone will have a specification about wire length while as tablets won't. General concerns: There are certain products which has quite less specifications. Ex: bed, toys , footwear. Is there any other better way to design a database to hold huge specifications related to multiple products? My intention is to save database space to the best. I sincerely apologize for my bad English.
|
I am new to database design. I am designing a database for an E-commerce website, there are a lot of products to be updated, but while designing for product specification table I do not understand whether I need specify all the specifications in a table or do I need to use different tables for different products? For example, consider the products Mobile and book, each of these having unique specifications (such as color,size, cost, model for mobile and title, ISBN, author, cost, year_of_publication, etc. for book), if it is only less number of products then it is possible for me to design, but when there is a thousands of products, it takes a lot of time. Can anyone tell me how to design my database to manage this situation?
|
How can we protect our htaccess file? This code has appeared there several times now: (inserted by hackers) RewriteBase / RewriteCond %{HTTP_USER_AGENT} (google|yahoo|msn|aol|bing) [OR] RewriteCond %{HTTP_REFERER} (google|yahoo|msn|aol|bing) RewriteRule . concernedly-conferrable.php [L,S=10000] It redirects Google traffic away from our site. We changed all the passwords but after a few weeks the same problem again. Many thanks
|
This is a about Server Security - Responding to Breach Events (Hacking) See Also: Canonical Version I suspect that one or more of my servers is compromised by a hacker, virus, or other mechanism: What are my first steps? When I arrive on site should I disconnect the server, preserve "evidence", are there other initial considerations? How do I go about getting services back online? How do I prevent the same thing from happening immediately again? Are there best practices or methodologies for learning from this incident? If I wanted to put a Incident Response Plan together, where would I start? Should this be part of my Disaster Recovery or Business Continuity Planning? Original Version 2011.01.02 - I'm on my way into work at 9.30 p.m. on a Sunday because our server has been compromised somehow and was resulting in a attack on our provider. The servers access to the Internet has been shut down which means over 5-600 of our clients sites are now down. Now this could be an FTP hack, or some weakness in code somewhere. I'm not sure till I get there. How can I track this down quickly? We're in for a whole lot of litigation if I don't get the server back up ASAP. Any help is appreciated. We are running Open SUSE 11.0. 2011.01.03 - Thanks to everyone for your help. Luckily I WASN'T the only person responsible for this server, just the nearest. We managed to resolve this problem, although it may not apply to many others in a different situation. I'll detail what we did. We unplugged the server from the net. It was performing (attempting to perform) a Denial Of Service attack on another server in Indonesia, and the guilty party was also based there. We firstly tried to identify where on the server this was coming from, considering we have over 500 sites on the server, we expected to be moonlighting for some time. However, with SSH access still, we ran a command to find all files edited or created in the time the attacks started. Luckily, the offending file was created over the winter holidays which meant that not many other files were created on the server at that time. We were then able to identify the offending file which was inside the uploaded images folder within a website. After a short cigarette break we concluded that, due to the files location, it must have been uploaded via a file upload facility that was inadequetly secured. After some googling, we found that there was a security vulnerability that allowed files to be uploaded, within the ZenCart admin panel, for a picture for a record company. (The section that it never really even used), posting this form just uploaded any file, it did not check the extension of the file, and didn't even check to see if the user was logged in. This meant that any files could be uploaded, including a PHP file for the attack. We secured the vulnerability with ZenCart on the infected site, and removed the offending files. The job was done, and I was home for 2 a.m. The Moral - Always apply security patches for ZenCart, or any other CMS system for that matter. As when security updates are released, the whole world is made aware of the vulnerability. - Always do backups, and backup your backups. - Employ or arrange for someone that will be there in times like these. To prevent anyone from relying on a panicy post on Server Fault.
|
In my TableViewController.m I can easily get the selected row by doing [tableView indexPathForSelectedRow] but I want to get this value from DIFFERENT view. So when my TableViewController goes to my DetailViewController. I want my DetailViewController to have the data of the selected cell.
|
Being new to objective-c, cocoa, and iPhone dev in general, I have a strong desire to get the most out of the language and the frameworks. One of the resources I'm using is Stanford's CS193P class notes that they have left on the web. It includes lecture notes, assignments and sample code, and since the course was given by Apple dev's, I definitely consider it to be "from the horse's mouth". Class Website: Lecture 08 is related to an assignment to build a UINavigationController based app that has multiple UIViewControllers pushed onto the UINavigationController stack. That's how the UINavigationController works. That's logical. However, there are some stern warnings in the slide about communicating between your UIViewControllers. I'm going to quote from this serious of slides: Page 16/51: How Not To Share Data Global Variables or singletons This includes your application delegate Direct dependencies make your code less reusable And more difficult to debug & test Ok. I'm down with that. Don't blindly toss all your methods that will be used for communicating between the viewcontroller into your app delegate and reference the viewcontroller instances in the app delegate methods. Fair 'nuff. A bit further on, we get this slide telling us what we should do. Page 18/51: Best Practices for Data Flow Figure out exactly what needs to be communicated Define input parameters for your view controller For communicating back up the hierarchy, use loose coupling Define a generic interface for observers (like delegation) This slide is then followed by what appears to be a place holder slide where the lecturer then apparently demonstrates the best practices using an example with the UIImagePickerController. I wish the videos were available! :( Ok, so... I'm afraid my objc-fu is not so strong. I'm also a bit confused by the final line in the above quote. I've been doing my fair share of googling about this and I found what appears to be a decent article talking about the various methods of Observing/Notification techniques: Method #5 even indicates delegates as an method! Except.... objects can only set one delegate at a time. So when I have multiple viewcontroller communication, what am I to do? Ok, that's the set up gang. I know I can easily do my communication methods in the app delegate by reference's the multiple viewcontroller instances in my appdelegate but I want to do this sort of thing the right way. Please help me "do the right thing" by answering the following questions: When I am trying to push a new viewcontroller on the UINavigationController stack, who should be doing this push. Which class/file in my code is the correct place? When I want to affect some piece of data (value of an iVar) in one of my UIViewControllers when I am in a different UIViewController, what is the "right" way to do this? Give that we can only have one delegate set at a time in an object, what would the implementation look like for when the lecturer says "Define a generic interface for observers (like delegation)". A pseudocode example would be awfully helpful here if possible.
|
The inequality is $1000n^3<2^n$ I'm trying to see for what value of $n$ an algorithm A who takes ($1000n^3$) steps takes less time than another algorithm B who takes($2^n$) steps. Any idea how to do that step by step?
|
I'm new to this website. I've checked the other topics and couldn't find the answer to my question. I've also tried to find the result with TI-CAS but the only thing it does is simplify the inequality which really doesn't help at all. the equation is : $1000n^3 < 2^n$ Now I've been trying to use log but it gets me nowhere (I haven't seen this form before), the answer is supposed to be 24 but I'm not sure. So my question is how to solve step by step this inequality for n. Could you guys help me with this one?
|
I'm trying to call OnClick() on a file input field but the window for selecting the file doesn't appear. I tried the same on Chrome and Edge and it works perfectly. var input = document.createElement('input'); input.setAttribute('id', 'InputField'); input.setAttribute('type', 'file'); input.setAttribute('accept', 'image/*'); input.style.visibility = 'hidden'; input.onclick = function() { console.log('File loading clicked'); }; input.click() PS: in the 'duplicated' i didn't finded any working functions, probably because the answers are from 7 years ago.
|
I'd like to make a click event fire on an <input type="file"> tag programmatically. Just calling click() doesn't seem to do anything or at least it doesn't pop up a file selection dialog. I've been experimenting with capturing events using listeners and redirecting the event, but I haven't been able to get that to actually perform the event like someone clicked on it.
|
I meet a lot of people regularly who have the knowledge and interest to participate in various SE communities however, many a time they do not know of SE, or of the existence of any site beyond Stack Overflow. So, in such cases, what would be a good that would make them log on to Stack Exchange and explore the Network?
|
What's the best blog post/video/tweet/whatever to explain how the Stack Exchange system works to regular people? I am trying to gauge interest for a new Stack Exchange site, but I want to explain it to people as best (and preferably) as visually as I can. Any YouTube clips breaking it down? anyone? Note: I am fully aware of , but mine is about Stack Exchange, not Stack Overflow. Most people think I'm describing traditional forum software, which they know sucks. Is there some way to describe the magic of how the design of the Stack Exchange system actually produces useful results very quickly? I can describe generally that it is a Q&A site that users vote on the answers, but Stack Overflow feels like so much more. Am I perhaps thinking too big about this?
|
I am dealing with problem where i have to increase the sales by product recommendation.I only have customer data and product that they have purchased.No ratings,reviews or feedback is present.What approach fit best for my problem.
|
I'm exploring options for recommender systems optimized for the insurance industry, which would take into account i) product holdings ii) user characteristics (segment, age, affluence, etc.). I want to stress that a) there are no product ratings available, thus collaborative filtering is not an option b) recommended products don't have to be similar to products that have already been purchased, thus item-to-item recommendations are most probably not relevant. Keep in mind that in insurance you rarely want to recommend similar products to those already purchased ones, as someone with the Car insurance is unlikely to want to buy another Motor product, rather Home or maybe Travel, etc. That's why I want to develop recommendations on similarities between the users based on their purchase history and/or demographics Ideally, I'd like to be able to implement it in R, if not possible, then in Python. Thanks for help and suggestions!
|
I did this: ssh -f user@host "screen -dm -S screenName" Now I want to add a bash script command to this line so that the command is executed then the screen detaches. edit: so I want to do so ssh -f user@host "screen -dm -S screenName bash bashing.sh" bashing.sh: #!/bin/bash echo "testing it"; but actually nothing happens when I run the command over ssh. Even when I just from the server run this command only screen -dm -S screenName bash bashing.sh. edit 1: I tried everything so far in the answers and comments and even in the suggested question as duplicate but nothing works for me, so any help would be still very appreciated. Sincerely
|
I'd like to do a one line bash command that automatically does this: screen -S myserver python myserver.py # inside the new screen CTRL A, D (detach) I think this won't work: screen -S myserver && python myserver.py because python myserver.py won't be started inside the screen.
|
Given a GeoJSON in EPSG3857: { "type": "Feature", "properties": {}, "geometry": { "type": "LineString", "coordinates": [ [ -13720479.997764934, 5688254.733325758 ], [ -13720479.47473932, 5688241.794717406 ] ] } } I am trying to convert the GeoJSON to EPSG 4326 for a Leaflet map. The user input in the map comes in EPSG 3857. I want to do the conversion with JavaScript after the user enters the GeoJSON. So I am looking for a JavaScript library that I can use. I am not looking for tools with whom I can convert the GeoJSON outside of my script (like GDAL/OGR) . I tried Proj4 but didn't get it to work. Is it possible to use Proj4 to convert line strings? If not, what other options should I consider? var epsg4326 = new Proj4js.Proj('EPSG:4326'); var epsg3857 = new Proj4js.Proj('EPSG:3857'); var geoJSONOBJ4 = new Proj4js.Point(geoJSONOBJ3); Proj4js.transform(epsg4326,epsg3857,geoJSONOBJ4);
|
I am using this to convert a GeoJSON point from EPSG:3857 to EPSG:4326. My command fails. What am I doing wrong? $ echo '{"type":"Point","coordinates":[-13720479.997764934,5688254.733325758]}' | reproject --from=EPSG:3857 --to=EPSG:4326 /usr/local/lib/node_modules/reproject/cli.js:98 throw new Error("Could not find definition for CRS \"" + crsName + "\"."); ^ Error: Could not find definition for CRS "EPSG:3857". at lookupCrs (/usr/local/lib/node_modules/reproject/cli.js:98:10) at Object.<anonymous> (/usr/local/lib/node_modules/reproject/cli.js:25:1) at Module._compile (module.js:456:26) at Object.Module._extensions..js (module.js:474:10) at Module.load (module.js:356:32) at Function.Module._load (module.js:312:12) at Function.Module.runMain (module.js:497:10) at startup (node.js:119:16) at node.js:901:3
|
Reference: To form a richer representation of the data, each hidden layer is composed of multiple feature maps, $\{h^{(k)}, k=0..K\}$. The weights W of a hidden layer can be represented in a 4D tensor containing elements for every combination of destination feature map, source feature map, source vertical position, and source horizontal position. What I can't understand: let's say we slide 2 3-D filters across image, producing two feature maps. How we can be sure, that parameters of our 2 filters won't move close to same value through backpropagation? So that we won't obtain from 3 channels (RGB) two channels, which are highly correlated? And the more filters I want to introduce, the less obvious for me that some of them (at least) or many of them (in worst case) won't be basically similar vectors in weights space ($w_{1}, w_{2}, w_3 ... w_n .$)
|
Based from what I have learned, we use multiple filters in a Conv Layer of a CNN to learn different feature detectors. But since these filters are applied similarly (i.e. slided and multiplied to regions of the input), wouldn't they just learn the same parameters during training? Hence the use of multiple filters would be redundant?
|
I have a main directory and its sub-directories as; main_directory == main_directory 0001 0102 0203 ... == first order sub_directories 001 002 003 ... == second order sub_directories I use below command to merge all data.txt files in the second order sub_directories find path_to_main_directory -name '*data.txt' -exec cat {} + > data_all However, I see that data_all file doesn't seem orderly, such as (which I want); 0001/001+0001/002+.... it seems that the order is random. Is there a way to merge all files orderly?
|
I use the command find . -type f -exec sha256sum {} \; > sha256SumOutput to hash every file in a folder hierarchy. Unfortunately, sha256sum doesn't get the file names from find in alphabetical oder. How can this be fixed? I'd like to have them ordered before they are hashed so they are hashed in alphabetical order (this has a reason).
|
So I have seen this type of graphic design used in several places. Here is an example: The exact pattern I am pointing to is how the triangles are drawn in a way that gives a sense of dimension and depth. Here is another example: Is there a specific name for this design method?
|
What is the design style called where they create form with simple shapes, usually triangles like they have done with the ground in the Or like the images below:
|
How do we evaluate $\int\frac{1}{\ln{x}}dx$? Is it a special integral, or some simple function, or what substitution will help?
|
What is the value of $$\int\frac{1}{\log x}dx$$ I have tried many times, but failed everytime. Can anyone help me out in solving this question.
|
When I vote to close a question, there's a message saying that I have X votes left. I assume those regenerate after some time? What are the rules on that? Is it different for different sites across the Stack Exchange network?
|
What limits are there on how I can vote? How often can I vote? How do my votes become locked/unlocked?
|
I installed MuseScore on Ubuntu 18.04 using snap from the terminal. After I installed it I wanted to add it to the dock. Instead of the usual 'Add to Favorites' I get 'Quit' and 'All Windows >'. What do I need to do to add MuseScore to the Dock?
|
How can I add new programs to the launcher (or the dock in Ubuntu 17.10 and later) in Ubuntu?
|
I'm trying to install GNU tar-1.28 and when I type ./configure I get: ./configure: line 3064: config.log: Permission denied ./configure: line 3074: config.log: Permission denied line 3064: | #define HAVE_DECL_FWRITE_UNLOCKED 1 line 3074: | #define HAVE_GETCWD 1 Can anyone help me fix these errors?
|
I installed python 3.6.1 from python.org and extracted the file. Then I did: cd Desktop cd Python-3.6.1 ./configure But then I got an error: ./configure: line 2328 config.log: Permission denied ./configure: line 2338 config.log: Permission denied What can I do to fix this?
|
I was checking back and my original unanswered question "Scrub PDF Malware Files to XPS Format" seems to have been removed from Stack Overflow/Stack Exchange (as in I've searched everywhere and can't find it) and is also not listed in my user account. An exact duplicate of my original question is now located at and a few others. Does the Stack Exchange network discard or delete old unanswered questions? Why is my question missing from the site and now located at a clone site under a different author?
|
Related to Meta Super User efforts: and Meta Server Fault efforts: We already auto-remove negatively voted unanswered old questions automatically after 30 days, network wide, with no human intervention required. I was thinking we might extend that to remove old, unanswered zero score questions... based on the following criteria: fewer than (question age in days * 1.5) views 0 score or lower, or 1 score or lower if the original author is deleted no answers 1 comment or fewer asked more than 1 year ago (thus based on creation date, not last activity date, so , or a user editing it, does not give a doomed question 365 more days of zombie "life") See the results of this query on: (10509) | (787) | (650) This query has been refined based on the comments, and this is the final version that will roll out tonight. Every site in the network (except metas) will automatically delete old questions that meet this criteria from this point forward.
|
I am trying to record a video with Quicktime Player but whenever I record it shows a green screen. When I try to watch the video when I record the screen: P.S I am using an iMac...
|
When I record a screen with a standard QuickTime Player functionality, I get a completely green video. I'm using Mac OS X 10.8, Mountain Lion, and a Retina MacBook Pro 15". Does anybody know what is the issue and how it can be fixed?
|
I have a problem with below if condition. if(!(type=="image/jpeg" || type=="image/png" || type=="image/gif")){ throw new ValidatorException(new FacesMessage(FacesMessage.SEVERITY_ERROR, "Only jpeg, png or gif", "")); } When type is image/jpeg, it still throws ValidatorException. When I hardcode type directly to image/jpeg, it works. So I hope that you help me, because I really don't know where is problem.
|
I've been using the == operator in my program to compare all my strings so far. However, I ran into a bug, changed one of them into .equals() instead, and it fixed the bug. Is == bad? When should it and should it not be used? What's the difference?
|
Say there are 12 different kinds of toys available and you don't know which one you'll get as a free gift when you buy a Happy Meal. How many Happy Meals do you have to order before you can collect the whole set? Assuming the toys are allocated randomly and the number produced is the same for each toy.
|
Assume last year I commuted to work in a taxi, and suppose if there are $n$ taxis in the fleet I used. If I took one of these taxis every trip at random and with replacement, then what is the number of trips I need to make in order to use every taxi in the fleet?
|
I am an indian national, currently staying in USA. My current H1B Visa has expired and I am planning to travel back to india via London, UK. Will I require an airside transit Visa for London?
|
Is there a website or some other way to find out if I need a transit visa for a short stop in the UK on my way somewhere else? Ideally this should give me the answer for all nationalities, and take into account any other visas I may have.
|
I was trying to clean my ubuntu system and saw that most of the system directories look 100% full. Is this normal? How can I clean these (if unnecessary) files?
|
looking at df -h, I realized I have this /dev/loop0 mounted on /snap/core/3604 and it's always 100% full : root@maxipc:~# df -h Filesystem Size Used Avail Use% Mounted on udev 7.8G 0 7.8G 0% /dev tmpfs 1.6G 9.9M 1.6G 1% /run /dev/sda3 116G 38G 73G 35% / tmpfs 7.8G 20M 7.8G 1% /dev/shm tmpfs 5.0M 4.0K 5.0M 1% /run/lock tmpfs 7.8G 0 7.8G 0% /sys/fs/cgroup /dev/loop0 84M 84M 0 100% /snap/core/3604 /dev/sda1 239M 111M 111M 50% /boot cgmfs 100K 0 100K 0% /run/cgmanager/fs tmpfs 1.6G 44K 1.6G 1% /run/user/1000 When I do a umount /snap/core/3604orumount /dev/loop0 it will unmount so it's apparently not busy at all(also when i try to remount /dev/loop0 again, it doesnt remount because, of course, it's not in fstab. in it, it looks like there is a whole little, cute and tiny root filesystem squashed in that 84M: root@maxipc:~# ls -la /snap/core/3604 total 4 drwxr-xr-x 24 root root 333 Nov 30 12:39 . drwxr-xr-x 3 root root 4096 Dec 26 20:29 .. drwxr-xr-x 2 root root 1937 Nov 30 12:38 bin drwxr-xr-x 6 root root 129 Nov 30 12:38 boot drwxr-xr-x 4 root root 1160 Nov 30 12:38 dev drwxr-xr-x 80 root root 2399 Nov 30 12:38 etc drwxr-xr-x 2 root root 3 Apr 12 2016 home drwxr-xr-x 20 root root 406 Nov 30 12:38 lib drwxr-xr-x 2 root root 43 Nov 30 12:38 lib64 drwxr-xr-x 2 root root 3 Nov 30 12:35 media drwxr-xr-x 3 root root 45 Nov 30 12:39 meta drwxr-xr-x 2 root root 3 Nov 30 12:35 mnt drwxr-xr-x 2 root root 3 Nov 30 12:35 opt drwxr-xr-x 2 root root 3 Apr 12 2016 proc drwx------ 2 root root 46 Nov 30 12:38 root drwxr-xr-x 8 root root 115 Nov 30 12:38 run drwxr-xr-x 2 root root 2349 Nov 30 12:38 sbin drwxr-xr-x 2 root root 58 Nov 30 12:39 snap drwxr-xr-x 2 root root 3 Nov 30 12:35 srv drwxr-xr-x 2 root root 3 Feb 5 2016 sys drwxrwxrwt 2 root root 3 Nov 30 12:37 tmp drwxr-xr-x 11 root root 151 Nov 30 12:38 usr drwxr-xr-x 12 root root 172 Nov 30 12:38 var drwxr-xr-x 2 root root 3 Nov 30 12:36 writable and when I try to do a fuser -m /snap/core/3604 to see who uses the mount, nothing shows up. it reappears every single boot, and I don't know how the heck it's coming up, oh also, there is no sign of it in /etc/fstab. it's also squashfs file system. it looks like it's harmless but I just wanna know why it does what it does. what is it? any help/reply would be appreciated. Thank you in advance, MG ps: I thought this question is different because the loop device is mounted as if it is an primary and working filesystem eventhough it's not busy at all. it gets umounted everytime if you want to, but it shows up again after boot. usually loop devices come up by df -H but for me this loop device comes up even among things that gnome graphical tools show, just like how a hardrive shows in your nautilus.
|
I am running a VMWare Player with a Ubuntu 12.04 LTS Precise Pangolin as Guest on my Windows 7. Sometimes I get the shutdown blue screen error in Windows, this time it happened when I was running the Player. When I restarted everything Ubuntu gave me the "Login Loop" on adminstrator login. I log in and there's this black screen where I can only read: piix4...smbus:0.0.0.07.3 Host Smbus controller not enabled . When I go to the prompt in root mode it fails to update and only upgraded, specially some plugins ( I think graphic plugins) which also appear in one an error message after quitting the prompt, but they´are successfully installed. They are not the error message. After that I have been working with the Fail/safe Mode recovery panel. When I try to update via Root I get errors like this: W:failed to fetch http://extras.ubuntu.com/ubuntu/dists/precise/release.gpg could not resolve 'extras/ubuntu.com There are 8 more like this referring to areas like: -archive/canonical.com -ppa.Launchpad.net -security.Ubuntu.com -Us.archive.ubuntu.com - release.gpg precise-updates/release.gpg precise_backport/release.gpg Final Message: some index files failed to download.....they have been ignored or old files are used. The black screens most of the time pass by too fast for me to pick up any information. But in general I think I have done everything I was able to in the recovery panel including updating network and graphic packages and recovering filesystem packages and the basic stuff ( I am a beginner regarding Linux ) in the root prompt. Now I am stuck in this screen with graphic options: - Run in low-graphics mode just for one session - Reconfigure Graphics - Troubleshoot the error - Exit to console login I am trying to choose to reconfigure graphics but the mouse disappears in the virtual machine screen and sometimes when options change it´s only the first and last option. But this happens from the blue without messages. This particular option menu is in the regular GUI style against a black screen in Terminal style. Really strange.
|
My Ubuntu is stuck in a login loop when trying to enter my desktop. When I login, the screen gets black and soon after that the login screen comes back. I've read that the problem might be caused by an error depending on the graphics, here's my graphics card: ATI Radeon 7670M
|
Most of the time I see $(command) used, but I have also seen "$(command)" for example: if [ "$(command)" ]; then stuff fi What is the purpose of the quotes in the second example?
|
Or, an introductory guide to robust filename handling and other string passing in shell scripts. I wrote a shell script which works well most of the time. But it chokes on some inputs (e.g. on some file names). I encountered a problem such as the following: I have a file name containing a space hello world, and it was treated as two separate files hello and world. I have an input line with two consecutive spaces and they shrank to one in the input. Leading and trailing whitespace disappears from input lines. Sometimes, when the input contains one of the characters \[*?, they are replaced by some text which is is actually the name of files. There is an apostrophe ' (or a double quote ") in the input and things got weird after that point. There is a backslash in the input (or: I am using Cygwin and some of my file names have Windows-style \ separators). What is going on and how do I fix it?
|
I have been trying to update from ubuntu 12.10 to 13.04 for several days. Whenever I try to run the upgrade, I get the following message: W:Failed to fetch http://extras.ubuntu.com/ubuntu/dists/raring/main/source/Sources 404 Not Found , W:Failed to fetch http://extras.ubuntu.com/ubuntu/dists/raring/main/binary-i386/Packages 404 Not Found , E:Some index files failed to download. They have been ignored, or old ones used instead. The update then terminates. Is there any work around to this?
|
Recently I have installed an older version of Ubuntu on my old machine. Whenever I try to install any software, I get an error saying it couldn't be found: $ sudo apt-get install vlc Reading package lists... Done Building dependency tree Reading state information... Done E: Couldn't find package vlc
|
I am using Etoro to trade US stocks and they charge overnight fees. However, nowhere can I find a definition of what an overnight fee in the context of stock broking is. Their Terms & Conditions only state that they charge an overnight fee and an internet search for overnight fees only delivers results for postal services. Is an overnight fee the fee charged to the client for accepting orders while the market is closed, or is it charged on all stock holdings, i.e. a daily charge for open positions?
|
I'm trying to learn about stock markets. I eventually want to invest a small amount over a long period. Yet, I notice on a lot of broker sites that they tend to charge an overnight fee for any stocks held over night. I presume this is every night thereafter? I just wondered because it seems like a wall when you want to let your stock price grow, and an overnight charge eats into this. or, is this only the case for "CFD" stocks? I'm confused. Any help? Cheers
|
Is it possible to create a new default master page in SPD or edit the default one? I dont want to enable SharePoint Publishing Infrastructure as it results in problems with templates. The idea is to create a site collection (1 top site and 3 subs) and then template these out. According to it's possible to direcly go to /_layouts/ChangeSiteMasterPage.aspx and select master page however this works only with SharePoint Publishing Infrastructure enabled. Thanks
|
When building a SharePoint 2010 site, we have a root Publishing site that has been branded up using a custom Master Page. We'd now like to add some Team Sites below the publishing site, and have our branding and other look and feel changes applied there too, and for that we need to change the "System Master" setting of the Team Site. The "Master page" options in the site settings are only available if I've enabled the Publishing features in the team site, but I'd rather not do this if I can avoid it. Ideally, this should be enabled as soon as a new team site is created, without the site owner having to change the site settings.
|
I'm constantly seeing myself having to go through a long process to get my search result for unanswered questions and I can't seem to find the efficient way to go about it. I have saved favorite tags , , and . I want to search for questions where any or more of these tags exist. If I click on the saved favorite tag and then , the PHP will be replaced, so I always have to select from the unanswered tags (where the selection is added not replaced). So I'm always clicking the 3 tags which I have to find in the "unanswered tags" group. Is there any way I can search all my favorite tags at once?
|
Is there a way to search questions that are tagged with either tag1 or tag2? Actually, I would like the general filter, ([tag1] AND [tag2], ...) OR ([tag3] AND [tag4], ...) OR ... And even [tag1] AND ([tag2] OR [tag3]) I need that because I'm looking for interesting questions and I have to search for each tag separately.
|
So I do know how to find the answer n/m, using l'hopital's rule, but how to find it without using that rule? $\lim _{x\to 1}\left(\frac{x^n-1}{x^m-1}\right)=\frac{n}{m}$
|
$$\lim_{x\rightarrow 1} \frac{x^m-1}{x^n-1}$$ I found this in a book (recommended by the professor) without solutions or hints. My problem is that I can't find definitions about this kind of problems and I have no idea how to start, any kind of help would be great. So far I've been dealing with "$\lim_{x\rightarrow ∞}$" only. Also without L'Hospital, because we haven't had this in lecture.
|
I remember I learned a structure like the one that this post’s title mentions: All I {need to do | have to do | must do} is do something. But is it correct to use "to do something" after the "is" — as compared with just plain "do something" without the "to"? Or to be more specific, which of the following sentences in each pair is correct, or are both version correct? The second one in each case adds "to" to the formula: Pair #1: All I must do is prepare myself for the test. All I must do is to prepare myself for the test. Pair #2: What we should do is teach children how to think. What we should do is to teach children how to think. As far as I could remember, both forms should be fine. But it seems that all the materials, texts, and articles I've read so far use the first form only. Furthermore, I'd really appreciate it if you could show me some references, like webpages or some book, where I could find more information about this point.
|
I was speaking to an English learner and said, “All you have to do is read a lot.” And they thought that sentence wasn’t grammatically correct because I dropped the word to between is and read. They thought it should be “All you have to do is to read a lot.” That sounds weird to me. How do I explain to them the reason you drop the to? Or am I incorrect and it really should have a to?
|
What is the difference between the code below? Both methods achieve the same output of removing 4 from the list. static void Main(string[] args) { var list = new List<int> {1, 2, 3, 4, 5, 6, 7, 8, 9}; ModifyList(ref list); Console.WriteLine(string.Join(", ", list)); list.Add(4); ModifyList(list); Console.WriteLine(string.Join(", ", list)); Console.ReadLine(); } public static void ModifyList(ref List<int> list) { list.Remove(4); } public static void ModifyList(List<int> list) { list.Remove(4); }
|
What is the difference between a parameter passed by reference a parameter passed by value? Could you give me some examples, please?
|
There are similar posts like this but some don't resolve my problem, some I get stuck on certain steps and can't continue forward like this video () at step 1 I get "package git has no installation candidate" then after doing sudo apt install git I see the same thing. And some posts are left unanswered 6 years 7 months later so I'm going to take a wild guess and say this is an ongoing issue. My problem is I can't pick up any wi-fi signals or Ubuntu isn't reading my wi-fi card (not exactly sure what problem is). I installed Linux Mint dual booted with Windows 10 and wi-fi works no problem on Windows. I couldn't figure out how to get wi-fi to work on Mint, got frustrated and though Ubuntu might work, nope, wi-fi still doesn't connect. Is there a input I can use to show someone what my set up is or what you would specifically like to see? (again, sorry I don't know what words to use to describe my issue) edit: lspci -knn | grep Net -A3; rfkill list 02:00.0 Network controller [0280]: Realtek Semiconductor Co., Ltd. RTL8821CE 802.11ac PCIe Wireless Network Adapter [10ec:c821] Subsystem: Lenovo RTL8821CE 802.11ac PCIe Wireless Network Adapter [17aa:c024] 0: ideapad_wlan: Wireless LAN Soft blocked: no Hard blocked: no 1: ideapad_bluetooth: Bluetooth Soft blocked: no Hard blocked: no 2: hci0:Bluetooth Soft blocked: no Hard blocked: no and so far, none of the listed websites, githubs, links, workarounds, etc. have solved my issue.
|
We just bought a Lenovo (which is supposed to have the Intel 8265 for wireless). This laptop was bought in part because it is certified to run Ubuntu and as such to me at least it would make sense for things to work out of the box... but no such luck. First, I installed Ubuntu 17.10 and after installation realised Wi-Fi was not working. I also tried Ubuntu 16.04 from a USB drive since that is the version of Ubuntu it is certified for, but no luck there either. The wireless chip is not detected by lshw (or even lspci by the looks of it), ip link does not show a wireless interface, and the iwlwifi kernel module is not loaded at boot (I can load this myself using modprobe iwlwifi but this does not make Wi-Fi work). I think it is a combined Wi-Fi/Bluetooth chip, and Bluetooth does appear to work (or at least Bluetooth shows up in Gnome and rfkill list). modinfo iwlwifi | grep 8265 shows me a file ending in -34 is supposedly loaded but only a file ending in -33 (and some other lower numbers) is present in /lib/firmware, if that helps). I have also installed the Linux 4.14.9 kernel in an attempt to get things to work, but this did not resolve the issue either. Further information root@ThinkPad-E570:~# modinfo iwlwifi | grep 8265 firmware: iwlwifi-8265-34.ucode root@ThinkPad-E570:~# rfkill list all 0: tpacpi_bluetooth_sw: Bluetooth Soft blocked: no Hard blocked: no 1: hci0: Bluetooth Soft blocked: no Hard blocked: no root@ThinkPad-E570:~# dmesg | grep iwl root@ThinkPad-E570:~# lspci -nnk | grep 0280 -A3 05:00.0 Network controller [0280]: Realtek Semiconductor Co., Ltd. Device [10ec:c821] Subsystem: Lenovo Device [17aa:c024] Update I just noticed that the laptop does not have an Intel wireless chip at all, but in fact has a Realtek one... which means that the of the shop I bought this laptop at were not accurate... Sigh. Same problem stands, however, just with a crappier wireless chip.
|
Most proofs i checked are written with a local coordinate patch, is there a simple coordinate independent formulation on how to verify that [X, Y] (f) is indeed a vector field? My teacher didn't bother to write it down. Also i understand how we get to the double sum expression of the bracket (thanks to the leibniz rule among other things) but why do the second derivatives cancel out at the end? Thanks.
|
I want to understand what exactly means to ask the question if the Lie bracket $[X,Y]$ of two vector fields $X,Y\in \mathcal{XM}$, where $\mathcal{M}$ is a differentiable manifold, is well defined. What does it mean conceptually that the Lie bracket is well defined? How could I prove that indeed it is well defined? Can I do it use it a specific basis, say, $e_x = \partial/\partial x$ and $e_y = \partial / \partial y$?
|
Since this morning I have on my phone this weird toast message, that keep appearing. 文件耗时: 477 ms/number: 118 Does anyone have an idea what is this and how to remove it?
|
I recently received some updates today from the Play Store. Every so often a pop notification, one of those bubble ones at the bottom of the screen with Chinese characters. The most recent update I've noticed is the ES File Explorer. I wouldn't mind, but my device is rooted and so I am at risk. I have a screenshot of the notification. My device is the Samsung Galaxy Tab A 9.7 and I have stock ROM installed. What my question(s) are: Do I have a virus (it's not being picked up by Avast) and if I do, how do I remove it?
|
In one of our PROD Servers... The Total Physical RAM is 128GB The Total RAM I assigned for SQL Server is 122GB. When I checked the SQL Server there were no Open Transactions, No Blockings....But still the Memory Consumption is higher and it show 99% in Task Manager and performace has been slowed down. Should we increase the Memory or I don't understand if OS or SQL Server does not have enough Memory. Please advice if we need to allot some enough Memory to OS too...
|
I'm trying to come up with a sane way to understand if the max server memory (mb) setting is appropriate (either should be lower, or higher, or stay the way it is). I am aware that max server memory (mb) should always be low enough to leave room for the operating system itself, etc. The environment I'm looking at has several hundred servers; I need a reliable formula I can use to determine if the present size of the buffer pool is appropriate since RAM is costed per GB allocated to each server. The entire environment is virtualized, and "physical" RAM allocated to a VM can easily be changed up or down. I have a particular SQL Server Instance I'm looking at now with a PLE of 1,100,052 seconds, which equates to 12.7 days (the amount of time the server has been up). The server has a max server memory setting of 2560MB (2.5GB), of which only 1380MB (1.3GB) is actually committed. I've read several items including one by Jonathan Keheyias () and another by Paul Randal (), and several others. Jonathan advocates monitoring for a PLE below 300 per 4GB of buffer pool as being too low. For the SQL Server Instance above, 300 * (2.5 / 4) = 187 results in a really really low target PLE below 300. This instance has 290GB of SQL Server data (not including log files), and is only used for integration testing. Assuming the last 12 days is representative of typical usage for this server, I'd say the max server memory (mb) setting could be lowered. At the other end of the scale, I have another integration-test server with a PLE of 294, that has a max server memory (mb) setting of only 1GB. This server has only 224MB of SQL Server data not including logs, and is running some BizFlow databases. This server might benefit from a higher max server memory (mb) setting. I'm thinking a good starting place for targets that might be assigned too much memory could include looking at: SELECT RamMB = physical_memory_in_bytes / 1048576 , BufferPoolCommittedMB = bpool_committed * 8192E0 / 1048576 , BufferPoolCommitTargetMB = bpool_commit_target * 8192E0 / 1048576 , PercentOfDesiredSizeMB = CONVERT(INT,(CONVERT(DECIMAL(18,2),bpool_committed) / bpool_commit_target) * 100) FROM sys.dm_os_sys_info; If BufferPoolCommitTargetMB / BufferPoolCommittedMB is greater than 1, the server is not using the entire buffer pool. If the machine in question also has a PLE of greater than "x" then it might be a good candidate for a decrease in max server memory (mb). Since the Buffer Manager:Lazy writes/sec performance counter tracks the number of times SQLOS has written pages out to disk between checkpoints due to memory pressure, this might be another good thing to look at. DECLARE @WaitTime DATETIME; SET @WaitTime = '00:00:15'; DECLARE @NumSeconds INT; SET @NumSeconds = DATEDIFF(SECOND, 0, @WaitTime); DECLARE @LazyWrites1 BIGINT; DECLARE @LazyWrites2 BIGINT; SELECT @LazyWrites1 = cntr_value FROM sys.dm_os_performance_counters dopc WHERE ( dopc.counter_name LIKE 'Lazy writes/sec%' COLLATE SQL_Latin1_General_CP1_CI_AS ) AND dopc.object_name = 'MSSQL$' + CONVERT(VARCHAR(255), SERVERPROPERTY('InstanceName')) + ':Buffer Manager'; WAITFOR DELAY @WaitTime; SELECT @LazyWrites2 = cntr_value FROM sys.dm_os_performance_counters dopc WHERE ( dopc.counter_name LIKE 'Lazy writes/sec%' COLLATE SQL_Latin1_General_CP1_CI_AS ) AND dopc.object_name = 'MSSQL$' + CONVERT(VARCHAR(255), SERVERPROPERTY('InstanceName')) + ':Buffer Manager'; SELECT LazyWritesPerSecond = (@LazyWrites2 - @LazyWrites1) / @NumSeconds; The above code assumes the server is under load during the 15 seconds it takes to run, otherwise it will report 0; which might be a misleading false-negative. Should I also look at PAGELATCHIO_* wait stats or some other wait type as an indicator of memory pressure, or lack thereof? My question is, how can I reliably determine a "good" target value for PLE and max server memory (mb)?
|
I have a html file that I want to do some scrapping using python 3, this is the content of the table that I want to get the data <tr valign="top" class="font10_n"> <td>a</td> <td><b>Date Registered</b></td> <td>04-JULY-2018</td> <td>&nbsp;</td> </tr> This is my current code import re ... html = html_content registered = re.search(r"""<td><b>Date Registered<\/b><\/td> <td>(.*)</td>""", html).group(1) print('Registered Date : ' + registered) I want to make the search only 1 line, is it possible and how to make it?
|
I have this gigantic ugly string: J0000000: Transaction A0001401 started on 8/22/2008 9:49:29 AM J0000010: Project name: E:\foo.pf J0000011: Job name: MBiek Direct Mail Test J0000020: Document 1 - Completed successfully I'm trying to extract pieces from it using regex. In this case, I want to grab everything after Project Name up to the part where it says J0000011: (the 11 is going to be a different number every time). Here's the regex I've been playing with: Project name:\s+(.*)\s+J[0-9]{7}: The problem is that it doesn't stop until it hits the J0000020: at the end. How do I make the regex stop at the first occurrence of J[0-9]{7}?
|
I know that we can shut down windows after some specific time like this shutdown -s -t <time> But how can I do the same when I want my pc to sleep after some specific amount of time?? is there any command?? Also it will be helpful if you told me the command for Linux too, Cause i rarely use windows.
|
I know that almost everything on Windows, like opening any sort of application, can be done from the command prompt or from the Run menu. How can I put my computer to sleep or shut it down? What is the command for that?
|
So I learned that I tend to forget and unconsciously omit relative pronouns from my sentences, because apart from the fact that the meaning of some clauses without them remain clear and obvious, I find that relative pronouns make sentences superfluous. Instead of writing “the meat that are chilling in the freezer are spoiled”, I write “the meat chilling in the freezer are spoiled.” Or, “I believe it's true” instead of “I believe that it's true.” I find that many people do this, too. At first, I thought it's grammatically incorrect and is not acceptable in formal writing, but I recently came across a professional article that did the same thing. I'm just wondering whether it was a mistake or the editors deliberately left it that way because it's not really incorrect. So my question is, is the omission of relative pronouns acceptable? Or better yet, are relative pronouns always necessary?
|
He will understand that I was not joking. He will understand I was not joking. Which of the sentences is correct? Are there any specific rules about the use of "that" in the sentences I reported as example?
|
I am learning about interfaces in Java and one example they give is being able to create a linked list using the List interface List<String> strings = new LinkedList<>(); but they don't go into any detail. Why would I want to do this as oppose to LinkedList<String> strings = new LinkedList<>();?
|
I have seen this mentioned a few times and I am not clear on what it means. When and why would you do this? I know what interfaces do, but the fact I am not clear on this makes me think I am missing out on using them correctly. Is it just so if you were to do: IInterface classRef = new ObjectWhatever() You could use any class that implements IInterface? When would you need to do that? The only thing I can think of is if you have a method and you are unsure of what object will be passed except for it implementing IInterface. I cannot think how often you would need to do that. Also, how could you write a method that takes in an object that implements an interface? Is that possible?
|
Why Tommen is called "first of his name" while there has been a ?
|
Tommen ascends to the Iron Throne after his brother Joffrey's death, and at least in the TV series is referred to as being the "First of his Name". However, there were already at least two Lannister Kings of the West, or the Westerlands, or of Casterly Rock, named Tommen. So, why isn't the books' King Tommen the third of his name?
|
I did a fresh install of Ubuntu 18.4 LTS, coming from Windows, and everything was working great! I installed my needed apps; I'll list them below in case they have something to do with the problem, and the system did an update. I rebooted and now the terminal is refusing to run. If I try and open it, all that happens is that it tries to load but stops after about 5 seconds or so. I've downloaded xterm so that I could use terminal commands again, but this has caused problems with updates & installs as well. I'd sincerely appreciate any help, I cannot seem to figure out what's wrong and I really don't want to have to reinstall the OS.
|
I have upgraded python to version 3.7 and now my terminal is not opening up. I followed this post Commands I ran are as follows, sudo apt-get install python3.7 sudo update-alternatives --install /usr/bin/python3 python3 /usr/bin/python3.6 1 sudo update-alternatives --install /usr/bin/python3 python3 /usr/bin/python3.7 2 sudo update-alternatives --config python3 Entered 2 for python3.7 I can't open terminal and run commands. My ubuntu version is, Ubuntu 18.04.2 LTS
|
I'm playing XCOM: Enemy Within. I've already researched all the corpses type and had lots of plasma weapons for my entire troops. It seems no need to stun enemies and capture them alive. Will I get corpses if I stun the enemies instead of kill them? If I can only get their weapons and nothing else, maybe I don't need to bother capture them any more. Thanks for the answers :D
|
Aside from being able to interrogate an alien in the Alien Containment chamber, are there any particular advantages to risk trying to stun an alien instead of just killing it outright?
|
If we know the state of the universe at a certain point in time, is the future set? There have been quite a few similar questions on here and some of the answers were quite useful to me. But there is still some confusion on my part since there seem to be 2 different kinds of answers to this question: The Schrödinger equation is deterministic. The indeterminism comes from the collapse of the wavefunction when a measurement is made. So the future is not set. A wavefunction only appears to collapse if your quantum system doesn't describe your measuring apparatus as well. A measurement involves entangling the measured system and the measuring system, and in the process simply spreads the coherence from the initial state over both systems. There is no loss of information, it's hard to unentangle the two systems, but theoretically it's possible. So 'knowing the state of the universe at a certain point in time' would be equivalent to knowing the wave function of the universe at a certain point in time, which will then evolve deterministically. So to me this would seem to imply that the future is set. There have also been some answers saying it depends on the interpretation of quantum mechanics and hence the above question doesn't really have an answer rooted in physics. So my question: Does physics provide an answer to the above question and if so, which of the above answers (if any) is correct?
|
I'm not sure if this is the right place to ask this question. I realise that this maybe a borderline philosophical question at this point in time, therefore feel free to close this question if you think that this is a duplicate or inappropriate for this forum. Anyway, I'm an electrical engineer and I have some basic knowledge of quantum mechanics. I know that Schrödinger's equation is deterministic. However, quantum mechanics is much deeper than that and I would like to learn more. If this question is not clearly answerable at this point than can anyone point out some recognized sources that try to answer this question. I would appreciate it if the source is scientific and more specifically, is related to quantum theory.
|
I used to work with two displays. As usual I make full screen on the second monitor for watching web video while continuing to work on the laptop monitor. In Ubuntu it's always opening in full screen mode on the laptop monitor. Is it possible to open full screen on the second monitor if so,how can I do this?
|
I have a dual monitor set-up. When I'm on YouTube, and I click the fullscreen icon, the fullscreen automatically goes to the second monitor. How do I get it to go fullscreen on my main monitor?
|
So, I was searching for ways of finding the dual of $l_\infty(\mathbb{R})$, (the space of bounded sequences of real numbers, under the infinity norm, i.e., $$||x|| = sup_{n\in\mathbb{N}} |x_n|.$$ I tried to approach the same way I did for $l_1, l_p, c_0$ and other similar spaces, however, I was not able to find any Schauder Basis for $l_\infty$. So I started searching, but I didn't find anything concrete about it. Does anybody knows an explicit "calculation" of $(l_\infty)^*$, or a book or paper that shows a way to obtain it?
|
Can we identify the dual space of $l^\infty$ with another "natural space"? If the answer is yes, what can we say about $L^\infty$? By the dual space I mean the space of all continuous linear functionals.
|
On a Lenovo Yoga 2 Pro laptop, 8GB RAM, Intel Core i7, running Windows 8.1 I'm seeing the following. In situations of high system load (high CPU/memory usage), the System process starts using high CPU in addition to the CPU already used by other processes. This has been happening for at least a year. Examples of the situations when this happens: Many Google Chrome tabs open with the Developer Tools open for some of them A Virtualbox virtual machine with 2-3GB RAM doing some heavy lifting on top of the usual browsers, background apps A Java application using 1GB of RAM, 3GB of virtual memory using 100% of one CPU core on top of the usual browsers, background apps The irony of the situation is that when the system is already under heavy load, the System using more CPUs causes even more of a slowdown. Using Process Explorer I've been able to pinpoint the thread within System that uses high CPU to be ntoskrnl.exe!KeRegisterBugCheckReasonCallback. This is a function that should be called by drivers when a BSOD is happening (). However in my case no BSOD happens. The issue occurs even with no USB devices attached, so none of those can be the cause. I've done a WPA trace when the issue occurred as explained in , screenshot below. This doesn't tell me much more than resources are used within ntoskrnl.exe with the nearest driver in the trail being fltmgr.sys. That doesn't help me a lot because it's not a specific driver that I can uninstall or upgrade. Any pointers to further debug this are welcome! Process Explorer for the System process while the issue is happening: WPA trace:
|
I have noticed that from some time my system is freezing and its probably caused by the high CPU usage which is caused by the system process. All applications I'm running is the Skype, TeamSpeak and Chrome so it definitely shouldnt eat that amount of CPU. You can see the problem itself and running processes in the screenshot below: Sometimes CPU usage is reaching 90%, but the average usage is like 40-65%. My PC parameters: Windows 8 (customer preview) Intel Core i3 - 2350M 8 GB RAM I'd appreciate any help attempt! Regards. --UPDATE-- As the user below posted a great answer, I have noticed that the process that is eating the most CPU in the system is called Arthurx.sys, simple google tells that it's a TPLink driver (an wifi adapter, I have bought like 2 weeks ago!) drivers has been installed from the Windows MSDN, but also tried to install the drivers from the attached CD, but it doesn't help. From the system start, it is using like 5% of the CPU only, but after 2-4 hours of working it is growing up and reaching 40-60% of the CPU usage. Device name: TPLink WN722N
|
I don't understand very well the quotient, so, I do not know if calculate is the correct word, but I need to simplify the expression $$ \mathbb{Z}[x] /\langle2x-1\rangle $$
|
Suppose it asks to show $\mathbb{Z}[x]/(2x-1) \cong \mathbb{Z}[\frac{1}{2}]$ Cand I do like this ? First of all elements of $\mathbb{Z}[x]/(2x-1)$ is of form $\frac{m}{2^n}+(2x-1)$ and also all elements of $\mathbb{Z}[\frac{1}{2}]$ are of form $\frac{m}{2^n}$. Now define a normal projection $\mathbb{Z}[\frac{1}{2}] \to \mathbb{Z}[x]/(2x-1)$ where $a \to a+(2x-1)$ for all $a\in \mathbb{Z}[\frac{1}{2}]$. So kernal is srt of all $a$ such that $2x-1|a \implies a=0$ so both are isomorphic.
|
If $f(z)$ is an analytic function, then find the value of the integration $$\int_{0}^{2\pi}f(e^{it}) \cos t \, dt.$$ My Work: Taking $e^{it} = z$ the integrand becomes of the form $$i\frac{f(z)\operatorname{Re(z)}}{z}$$ on the simple closed contour $|z|=1$. But how can I proceed from here? Please help.
|
$f$ be analytic function, could any one tell me how to find the value of $$\int_{0}^{2\pi} f(e^{it})\cos t \,\mathrm dt$$ I am not able to apply any complex analysis result here, could any one give me hint?
|
There's something which I don't quite get about black holes and event horizons (feel free to tell me if I got something completely backwards at any step along the way): Say we have a singularity and we launch a particle from the singularity's Schwarzchild radius R at the speed of light directed outwards from the black hole - wouldn't that particle be able to escape beyond R, slowly decelerating in a parabolic path to a halt somewhere outside it (at a radius of, say, R1)? If so - wouldn't an observer A between R and R1 be able to see that particle as it decelerates? And if so, we couldn't define the event horizon to be at R, because light from R can affect A who's outside it. We couldn't define the event horizon to be at R1 either, because light from the observer could escape R1 entirely. So where would we define the event horizon in the case presented above? How can there be an event horizon if light can be launched slightly below it and take an parabolic path outside it, even if only for a moment?
|
In (ignoring Hawking radiation), why is a black? Why nothing, not even light, can escape from inside a black hole? To make the question simpler, say, why is a black hole black?
|
Use the defintion of a logarithmic function to prove $$ \frac{1}{x+1} \le \ln(1+\frac{1}{x}) \le \frac{1}{x}$$ for any positive integer x. ( Using defintion : $e^y=\ln^{-1}y$ ) Attempt: Using the definition, $e^y=\ln^{-1}y$ , I tried to prove the right hand side of the equality first by $ 1 +\frac{1}{x} \gt \frac{1}{x}$, $\ln(1 +\frac{1}{x})\lt \frac{1}{x} \Rightarrow e^{\ln(\frac{x+1}{x})} \le e^{\frac{1}{x}}$ but I am really stuck and lost on how I should do it so that one of the sides there is ln and the other side is the value and also for the equality to be $\le$ as $ 1 +\frac{1}{x} \gt \frac{1}{x}$ is strictly less than and is not equal.
|
I looking for help with proving the following inequality. Any relevant logarithmic identities would be great. Tried differentiating and taking limits and I'm lost as to how to approach this. $$\frac 1{x+1}<\ln\left(\frac{x+1}x\right)<0.5\left(\frac 1x+\frac 1{x+1}\right)$$
|
Say I have a somecommands.sh and I use chmod 777 to make it executable. Why I have to type ./scommand.sh instead of typing just somecommand.sh to run it from its own directory? Does this make any sense? If it's able to omit, what should I do? Thanks
|
Why do we use ./filename to execute a file in linux? Why not just enter it like other commands gcc, ls etc...
|
What are the orders of the elements in $\mathbb{Z}_n$? If $n$ is prime then 0 has order 1 and the rest order $n$. If $a|n$ then $a$ has order $n/a$, and if $a$ is prime then it has order $n$. So are the orders of the elements divisors of n? Say, we take $\mathbb{Z}_{120}$. Are the orders appearing the divisors of 120?
|
I have this question: Let $x, n$ be integers with $n \geq 2$ and $n$ not dividing $x$. Show that the order o($\bar{x}$) of $x \in Z_n$ is $o(\bar{x})= \frac{n}{HCF(x, n)}$ I've been thinking about it for ages but I still don't get why. A hint would be appreciated.
|
For example I've array generated with the loop like this. var array=[]; for(var i=1; i<=30; i++) { array.push(i); } console.log(array); I want to output the combination of all the possible group of 7 numbers from the array. For example a sample output may look like : [1,5,14,4,30,23,19]. If I would to calculate the possible combination with the combination formula. It would be something like this: n!/r!(n-r)! And it is going to be a huge number. I've found a , but what it does is that it prints out all the possible numbers according to the length of array. But my need is to find out the possible combination of 7 numbers from total 30 integers. How would I solve this problem logically and practically with javascript.
|
I want to write a function that takes an array of letters as an argument and a number of those letters to select. Say you provide an array of 8 letters and want to select 3 letters from that. Then you should get: 8! / ((8 - 3)! * 3!) = 56 Arrays (or words) in return consisting of 3 letters each.
|
In my book they calculated the $28$th Fibonacci number and said $F_{28} = 3 \times 13 \times 19 \times 281 = 317811$. This made me wonder if there was an easier way to find the $28$th Fibonacci number than by doing it by hand.
|
I was reading up on the Fibonacci Sequence, $\text {{1,1,2,3,5,8,13,....}}$ when I've noticed some were able to calculate specific numbers. So far I've only figured out creating an array and counting to the value, which is incredibly simple, but I reckon I can't find any formula for calculating a Fibonacci number based on it's position. Is there a way to do this? If so, how are we able to apply these formulas to arrays?
|
My laptop battery died before I was able to save and close the game. Now when I start Minecraft, my game is not listed. I can see the folder of my game in Windows Explorer. How do I get Minecraft to open that game again?
|
I was playing on my main world when my laptop ran out of power. I found a charger and woke it up, but Minecraft had crashed. Now, it doesn't appear in the world selection screen! I have verified that it still exists in the Minecraft folder, and the directory contents look to be in order. Does Minecraft save an internal flag somewhere when it crashes hard? If so, how do I reset it?
|
I am just wondering about the difference between: in contrast to and in contrast with
|
In my writing I often like to make a comparison between two things. However, I'm not sure how I should start my sentence and if it's even a good idea to start it this way. Example: React has a special way of dealing with dynamic data. In contrast with / to more traditional frameworks that require a full reload everytime data changes, React does .... [etc.] Should I use with or to, and is this grammatically correct? Are there any other ways I can write a comparison in an interesting way?
|
Leia openly admitted her belief that they got off too easily from Death Star - they only sent 4 fighters after them instead of hundreds. So she knew she was being tracked (the 1976 novelization 100% confirms that with more details). If so, why in the world did she make Han fly Millennium Falcon straight to Rebel main base on Yavin, leading Death Star straight to it? (they didn't know where the base was before that!) - instead of, say, having Han fly her and Luke to some waypoint and changing ships on the way, or at the very least, scanning Millennium Falcon for tracking devices thoroughly for a week while hanging out in the middle of uninhabited space? NOTE: Leia clearly did NOT give up Yavin to Imperials during interrogation, otherwise Vader and Tarkin wouldn't need the tracking device so much: " I'm taking an awful risk, Vader. This had better work." So, there doesn't seem to be any rush to reach Yavin ASAP.
|
In A New Hope, after Han and Luke fight off the TIE Fighters while escaping from the Death Star, these exchanges happen: INT. DEATH STAR - CONTROL ROOM Darth Vader strides into the control room, where Tarkin is watching the huge view screen. A sea of stars is before him. TARKIN Are they away? VADER They have just made the jump into hyperspace. TARKIN You're sure the homing beacon is secure aboard their ship? I'm taking an awful risk, Vader. This had better work. INT. MILLENNIUM FALCON - COCKPIT Han, removes his gloves and smiling, is at the controls of the ship. Chewie moves into the aft section to check the damage. Leia is seated near Han. HAN Not a bad bit of rescuing, huh? You know, sometimes I even amaze myself. LEIA That doesn't sound too hard. Besides, they let us go. It's the only explanation for the ease of our escape. HAN Easy... you call that easy? LEIA They're tracking us! HAN Not this ship, sister. Frustrated, Leia shakes her head. LEIA At least the information in Artoo is still intact. HAN What's so important? What's he carrying? LEIA The technical readouts of that battle station. I only hope that when the data is analyzed, a weakness can be found. It's not over yet! Leia doesn't even know if there is a weakness, let alone whether they'll find one. If she (correctly) realizes that they're being tracked, why doesn't she suggest that the Millennium Falcon go somewhere besides Yavin 4 instead of just frustratedly shaking her head? I know the plans , but it seems unlikely that continuing to fly to the secret Rebel base in the ship she's certain is being tracked is the only option. They are already in hyperspace when this conversation happens, but they apparently have time to talk for a little while after, so presumably they'd have time to stop and reroute.
|
We are trying to save result of a query in database by tokenizing a column but query is taking more than 3 minutes to finish his objective. My question is, do we have any faster way to tokenize a column? Query: Select * from ( SELECT TblTwo.ID Desc_ID, (CASE WHEN TblTwo.Description_Type = 'Default' THEN coalesce(tblOne.Code + ' ','') ELSE '' END) + TblTwo.[Description] AS String FROM TableOne tblOne INNER JOIN TableTwo TblTwo ON tblOne.CodeID = TblTwo.CodeID WHERE TblTwo.Description_Type IN ('Default','Custom') )ResultOne ---- Return almost 20000 rows and take 1 sec to execute CROSS APPLY dbo.udf_TokenString(String) ---- return almost 194379 rows and take 3 mins to execute Result of drived table ResultOne : Desc_ID String 1 HCD.39877 2 HCD.39777 Personal test history of documents 4 CD.397 Unspecified document text 5 N.7 This is end of file Script of function: CREATE FUNCTION [dbo].udf_TokenString (@string VARCHAR(MAX)) RETURNS @Results TABLE ( Item VARCHAR(255), location INT, Sequence INT IDENTITY PRIMARY KEY ) AS BEGIN DECLARE @Len INT, @Start INT, @end INT, @Cursor INT,@length INT SELECT @Cursor=1, @len=LEN(@string) WHILE @cursor<@len BEGIN SELECT @start=PATINDEX('%[^.A-Za-z0-9][A-Za-z0-9%]%', ' '+SUBSTRING (@string,@cursor,50) )-1 IF @start<0 break SELECT @length=PATINDEX('%[^.A-Z''a-z0-9-%]%',SUBSTRING (@string,@cursor+@start+1,50)+' ') INSERT INTO @results(item, location) SELECT SUBSTRING(@string,@cursor+@start,@length), @cursor+@start SELECT @Cursor=@Cursor+@Start+@length+1 END RETURN END GO
|
I wrote a Table Valued Function in Microsoft SQL Server 2008 to take a comma delimited column in a database to spit out separate rows for each value. Ex: "one,two,three,four" would return a new table with only one column containing the following values: one two three four Does this code look error prone to you guys? When I test it with SELECT * FROM utvf_Split('one,two,three,four',',') it just runs forever and never returns anything. This is getting really disheartening especially since there are no built in split functions on MSSQL server (WHY WHY WHY?!) and all the similar functions I've found on the web are absolute trash or simply irrelevant to what I'm trying to do. Here is the function: USE *myDBname* GO SET ANSI_NULLS ON GO SET QUOTED_IDENTIFIER ON GO ALTER FUNCTION [dbo].[utvf_SPlit] (@String VARCHAR(MAX), @delimiter CHAR) RETURNS @SplitValues TABLE ( Asset_ID VARCHAR(MAX) NOT NULL ) AS BEGIN DECLARE @FoundIndex INT DECLARE @ReturnValue VARCHAR(MAX) SET @FoundIndex = CHARINDEX(@delimiter, @String) WHILE (@FoundIndex <> 0) BEGIN DECLARE @NextFoundIndex INT SET @NextFoundIndex = CHARINDEX(@delimiter, @String, @FoundIndex+1) SET @ReturnValue = SUBSTRING(@String, @FoundIndex,@NextFoundIndex-@FoundIndex) SET @FoundIndex = CHARINDEX(@delimiter, @String) INSERT @SplitValues (Asset_ID) VALUES (@ReturnValue) END RETURN END
|
How can I make my custom blocks "have" NBT data, such as damage values, or full blown custom NBT tags? My specific case is adding a "luck" component to my custom block, which can be anywhere between -100 and 100, and depending on that value, when placed and broken in the world, would do something different, for example, if the value is positive, it would drop a diamond, when it's negative it would summon primed tnt, and if it's zero it would create a dirt hut. I think I can work those out, but I first need my block to be able to store data. Thank you for your time.
|
This question was recently split into different questions for each workaround. See meta posts for more information. Can you use NBT tags in commands? I’ve tried commands that normally work in Java Edition like: give @s minecraft:planks 30 1 {display:{Lore:["Wooden planks"]}} give @s stone_pickaxe{Unbreakable:1b} give @s item_frame{EntityTag:{Invisible:1b}} summon villager ~ ~ ~ {Offers:{Recipes:[{buy:{id:"emerald",Count:5b},sell:{id:"diamond_sword"}}]}} summon tnt ~ ~ ~ {Fuse:20s}
|
I have Asus g551 laptop, it has uefi so during startup it gives ROG (Asus brand for gamers) logo then it begins. I am wondering if I installed Ubuntu besides my windows. It would give me a choice of what os I enter? Hardware: Asus G551 laptop
|
I'm absolutely new to Linux. I would like to know how to install Ubuntu alongside the pre-installed Windows 8+ OS. Should I do it with Wubi, or through the Live USB/DVD? What steps do I need to take to correctly install Ubuntu?
|
I'm using VMWare, and running debian and whenever I run a new terminal my commands like "ls" seem to be lost. I've tried the solutions listed here for instance: When I do: PATH=/usr/bin:/bin:/usr/sbin:/sbin:/usr/local/bin:/usr/X11/bin it works temporarily. When I do: cd ~ nano .bash_profile export PATH=/usr/bin:/bin:/usr/sbin:/sbin:/usr/local/bin:/usr/X11/bin:$PATH -- the file changes and the save reflects but when I open a new terminal the commands are forgotten again. Edit: rowen@debianRhys:~$ echo $PATH /home/rowen/bin:PATH source .bash_profile bash: dircolors: command not found
|
I'm using Linux Mint. My login shell (cat /etc/passwd | grep myUserName) is bash. After I start my graphical desktop environment and run a terminal emulator from it, I can see that .bash_profile is not sourced (environment vars that are exported in it are unset). But if I log in from a text console (ctrl+alt+F1) or manually run bash -l from the terminal emulator, .bash_profile works fine. Am I wrong when I think that .bash_profile should be sourced when X starts and all export'ed vars should be available in the terminal, running from X? P.S. Placing everything in .bashrc and sourcing it from .bash_profile is not good idea (): environment stuff should be sourced only once.
|
I have installed Ubuntu 12.04 on my desktop. I have got NVIDIA 8400GS which is giving me a lot of problems. Ubuntu does not take the drivers automatically and I'm forced to work in 800 x 600. I tried to install additional drivers but it did not do anything rather it gave me an error after installation and I had to reinstall the system. Now I'm trying to install the drivers manually, but when I go to Console mode and turning off the graphics via Ctrl+Alt+F1, the screen remains black and whatever I type, nothing happens. How can I fix it?
|
After booting to the GUI in 12.04, I attempt to move to the virtual terminal (or shell, or tty) via Ctrl-Alt-F1 (F1 through F6), and the screen remains blank. I have tried all 6 tty instances and the results are the same. Ctrl-alt-F7 brings me back to the GUI without a problem. Any thoughts?
|
What is the difference between these functions? And what are the advantages and disadvantages? let Test = function(name) { this.name = name; this.complete = function() { console.log(`completing task${this.name}`) } } and let Test = function(name) { this.name = name; } Test.prototype.complete = function() { console.log(`completing task${this.name}`) }
|
What's the difference between var A = function () { this.x = function () { //do something }; }; and var A = function () { }; A.prototype.x = function () { //do something };
|
So, I have the following indefinite integral: $$\int sin(u)e^u \ du$$ I tried solving it using integration by parts, but it just kept repeating itself. What should I do?
|
I'm trying to solve the integral of $\left(\int e^x\,\sin x\,\,dx\right)$ (My solution): $\int e^x\sin\left(x\right)\,\,dx=$ $\int \sin\left(x\right) \,e^x\,\,dx=$ $\left(\sin(x)\,\int e^x\right)-\left(\int\sin^{'}(x)\,\left(\int e^x\right)\right)$ $\left(\sin(x)\,e^x\right)-\left(\int\cos(x)\,e^x\right)$ $\left(\sin(x)\,e^x\right)-\left(\cos(x)\,e^x-\left(\int-\sin\left(x\right)\,e^x\right)\right)$ $\left(\sin(x)\,e^x\right)-\left(\cos(x)\,e^x-\left(-\sin\left(x\right)\,e^x-\int-\cos\left(x\right)\,e^x\right)\right)$ I don't know how to complete because the solution gonna be very complicated.
|
I believe that this may require the use of Fermat's Little Theorem. I rewrote it as $(a+1)^p - a^p \equiv 1 \pmod{p}$ because the right-hand side looks similar to Fermat's Little Theorem, but I was unable to figure out how I can get the left-hand side to become $a^{(p-1)}$.
|
a, b are integers. p is prime. I want to prove: $(a+b)^{p} \equiv a^p + b^p \pmod p$ I know about Fermat's little theorem, but I still can't get it I know this is valid: $(a+b)^{p} \equiv a+b \pmod p$ but from there I don't know what to do. Also I thought about $(a+b)^{p} = \sum_{k=0}^{p}\binom{p}{k}a^{k}b^{p-k}=\binom{p}{0}b^{p}+\sum_{k=1}^{p-1} \binom{p}{k} a^{k}b^{p-k}+\binom{p}{p}a^{p}=b^{p}+\sum_{k=1}^{p-1}\binom{p}{k}a^{k}b^{p-k}+a^{p}$ Any ideas? Thanks!
|
I have a dataset of the popularity of a certain word on the internet, and they are weekly counts from 2010-09-05 to 2015-09-27 and has an upward trend. I'm having a hard time identifying the model from its graphs, and I would love some help to interpret its ACF and PACF models. Thanks in advance!
|
How do you estimate the appropriate forecast model for a time series by visual inspection of the ACF and PACF plots? Which one (i.e., ACF or PACF) tells the AR or the MA (or do they both)? Which part of the graphs tell you the seasonal and non-seasonal part for a seasonal ARIMA? Consider the ACF and PCF functions displayed below. They are from a log transformed series that's been differenced twice, one simple difference and one seasonal (, ). How would you characterize the series? What model best fits it?
|
I have studied "structure theorem for Artin rings" which states "An Artin ring $A$ is unique a finite direct product of Artin local rings". Let $A$ be Artin ring. By Chinese remainder theorem, $A \cong \prod (A/m_i^k)$, in which $m_i$ is a maximal ideal in $A$ and $R^k= (m_1 \cap m_2 \cap... \cap m_n)^k =0 $. Since $A$ is Artin then $A/m_i^k$ is also Artin. However, I do not understand why $A/m_i^k$ is a local ring. I am beginner then could you help me explain in detail about it? I guess the maximal ideal of the ring $A/m_i^k$ is $m_i/m_i^k$. Thank you in advance.
|
Say I have a commutative ring $R$ with a maximal ideal $m$. Then $m/m^k$ is a maximal ideal in $R/m^k$ for any $k$. Is it the only maximal ideal, i.e. is $R/m^k$ a local ring? This is a well known result for $k = 1$, as $R/m$ is a field. It seems to be true in other cases, e.g. $p\mathbb{Z}\subset \mathbb{Z}$ for prime $p$ and for $(x,y) \subset \mathbb{F}[x,y]$, the maximal ideal generated by $x$ and $y$ in a polynomial ring over the field $\mathbb{F}$. Equivalently, if an element $x\notin m$, is $x + m^k$ an invertible element in $R/m^k$?
|
I was looking at the somatic cell cloning of goats. One of the advantages of the process said was All offspring produced are female. Now I'm confused. How is this the case? I know that the embryo after electrofusion is injected into a surrogate mother, but I don't understand how the advantage is that they are "all ... female."
|
As a student of biology when ever I come by artificial cloning, I always find examples of females being cloned - Dolly the sheep, CopyCat, Daisy, etc. The only male I could see was Fibro mouse and a few more. What is the reason behind this? Is the male genome more difficult to be cloned? I am specifically looking for genetic reasons or other complications.
|
How could I bypass blocked files from "untrusted" sources? I am using 15.10 (Wily Werewolf)
|
I'm trying to run a jar application under Ubuntu, so I installed OpenJDK Java 7 Runtime, but when I open this application I got this message : The file '/home/aimad/Programms/jMerise/JMerise.jar' is not marked as executable. If this was downloaded or copied from an untrusted source, it may be dangerous to run. For more details, read about the executable bit.
|
I am level 18 in Pokemon go. I have a 407 CP Squritle and a 188 CP Wartortle. Which should I evolve to produce a higher level Blastoise?
|
What I mean is how does the game increase the CP of an evolving pokemon? For instance I have a pidgey (278CP) when I evolved it became a pidgeotto (489CP), but when I leveled up my weedle (140CP) it became kakuna (150CP). With some pokemon it seems to be doubled, others tripled, and some not at all
|
I have a line that looks as follows: F::enable<sizeof(value_type), offset>(index); I get the following compiler error (GCC 6.3.1): error: invalid operands of types ‘<unresolved overloaded function type>’ and ‘long unsigned int’ to binary ‘operator<’ Obviously, the left angle bracket is being interpreted as the less than operator, instead of the start of a template parameter list. F is a template parameter (class F) which I expect to contain a static member function with the signature: template <GLsizei stride, const GLvoid* offset> static void enable(GLuint index); I've tried liberally inserting whitespaces, looked into typedeffing the function, looked into moving to a regular function (not possible due to inheritance things). I have commented out the line to see if something above was causing the problem, no dice. Is there any way of explaining to the compiler that I don't want to compare a function and a size_t, I want to call a particular specialization of static member function in a class?
|
In templates, where and why do I have to put typename and template on dependent names? What exactly are dependent names anyway? I have the following code: template <typename T, typename Tail> // Tail will be a UnionNode too. struct UnionNode : public Tail { // ... template<typename U> struct inUnion { // Q: where to add typename/template here? typedef Tail::inUnion<U> dummy; }; template< > struct inUnion<T> { }; }; template <typename T> // For the last node Tn. struct UnionNode<T, void> { // ... template<typename U> struct inUnion { char fail[ -2 + (sizeof(U)%2) ]; // Cannot be instantiated for any U }; template< > struct inUnion<T> { }; }; The problem I have is in the typedef Tail::inUnion<U> dummy line. I'm fairly certain that inUnion is a dependent name, and VC++ is quite right in choking on it. I also know that I should be able to add template somewhere to tell the compiler that inUnion is a template-id. But where exactly? And should it then assume that inUnion is a class template, i.e. inUnion<U> names a type and not a function?
|
I can't find any guide about how to make a tornado plot in latex/overleaf. Does anybody know how to make one? I'm working on an economical analysis and want to show how changes will affect the production cost. Inspiration pictures: Edit: The question was marked to have a duplicate question, but I tried to use this one () as a base, but I'm not satisfied unfortunately, and I'm stuck. There is still a lot until I have it more equal to my two inspiration pictures, for instance: The % values represent the % of the total. How do I remove them and rather show the change from the main value (?), as shown in the two example pictures? How do I insert x- and y-axis? I removed the header/title, it's not necessary as I will have a figure text underneath. I'm sorry if I fail to explain my question, I'm as I mention very new to latex/overleaf :) I appreciate your feedback and answers! (I also tried to use this: but I found that one to be even more difficult to understand. I want the y-axis not to be numbered, but with text, and don't know how to change that.) \documentclass{standalone} \usepackage[svgnames]{xcolor} \usepackage{tikz} \usepackage{pgfplotstable} \usepackage{wasysym} \begin{document} \pgfplotstableread[col sep=comma]{ unit,min,max Lipid content,1000,1300 Growth rate,800,1000 Main equipment cost basis,500,500 Operating factor,50,400 }\loadedtable \newlength{\dy}\setlength{\dy}{\baselineskip} \newlength{\dx}\setlength{\dx}{0.007em} \newlength{\temp} \pgfplotstablegetrowsof{\loadedtable} \pgfmathparse{\pgfplotsretval-1} \edef\rows{\pgfmathresult} % compute total for percentages \setlength{\temp}{0pt} \foreach \y in {0,1,...,\rows}{% \pgfplotstablegetelem{\y}{min}\of\loadedtable \global\advance\temp by \pgfplotsretval pt \pgfplotstablegetelem{\y}{max}\of\loadedtable \global\advance\temp by \pgfplotsretval pt } \pgfmathparse{0.01\temp} \edef\total{\pgfmathresult} \noindent\begin{tikzpicture} \foreach \y in {0,1,...,\rows}{% \pgfplotstablegetelem{\y}{unit}\of\loadedtable \node[left] at (-19em,-\y\dy) {\strut\pgfplotsretval}; \pgfplotstablegetelem{\y}{min}\of\loadedtable \node[left] at (-15em,-\y\dy) {\strut\pgfplotsretval}; \node[left,fill=Navy,text width=\pgfplotsretval\dx,text height=.8\dy,inner sep=0] at (0,-\y\dy+0.1\dy) {}; \pgfmathparse{\pgfplotsretval/\total} \pgfmathprintnumberto[fixed,precision=2]{\pgfmathresult}{\per} \node[left] at (-\pgfplotsretval\dx,-\y\dy) {\small\strut\per\%}; \pgfplotstablegetelem{\y}{max}\of\loadedtable \node[left] at (17em,-\y\dy) {\strut\pgfplotsretval}; \node[right,fill=HotPink,text width=\pgfplotsretval\dx,text height=.8\dy,inner sep=0] at (0,-\y\dy+0.1\dy) {}; \pgfmathparse{\pgfplotsretval/\total} \pgfmathprintnumberto[fixed,precision=2]{\pgfmathresult}{\per} \node[right] at (\pgfplotsretval\dx,-\y\dy) {\small\strut\per\%}; } \end{tikzpicture} \end{document}
|
To display a sensitivity analysis I want to produce a . In the plot a specific base case value is compared to the values produced after changing parameters in the model. I started from this . With this I was able to get this MWE: \usepackage{pgf} \usepackage{tikz} \usepackage{pgfplots} \pgfplotsset{compat=newest} \usetikzlibrary{positioning} \usetikzlibrary{calc} \usetikzlibrary{intersections,backgrounds} \usetikzlibrary{decorations.pathmorphing} \pgfplotsset{ TornadoPlot/.style={% Overall settings width = 1\textwidth, line width=1pt, tick style={line width=0.8pt}, xmin = -50, xmax = 50, xtick = {-50, -40, -30, -20, -10, 0, 10, 20, 30, 40, 50}, xticklabels = {-50, -40, -30, -20, -10, 0, 10, 20, 30, 40, 50}, xmajorgrids = true, minor x tick num = 1, tick align = outside, xtick pos = left, ytick pos = left, xbar, bar shift=0pt, height = 7cm, enlarge y limits = 0.1, ytick = {0,1,2,3,4,5,6}, nodes near coords={ \pgfkeys{/pgf/fpu=true}% \pgfmathparse{\pgfplotspointmeta}% \pgfmathprintnumber{\pgfmathresult} }, nodes near coords align = {horizontal}, before end axis/.code={ \draw ({rel axis cs:0,0}-|{axis cs:0,0}) -- ({rel axis cs:0,1}-|{axis cs:0,0}); } } } \begin{document} \begin{tikzpicture} \begin{axis}[TornadoPlot, legend style={at={(0.975,0.25)}}] \addplot[fill=green!40] coordinates{(-3.5,0) (-16,1) (-17.5,2) (-19,3) (-34,4) (-27,5) (-22,6)}; \addplot[fill=red!40] coordinates{(4,0) (19,1) (12.5,2) (28.5,3) (34,4) (82,5) (38,6)}; \legend{upside, downside} \end{axis} \end{tikzpicture} \end{document} However, one of the bars (82, 5) has a positive x value that is outside the range of the domain of the plot. Can I restrict the length of that bar and force a break, while still displaying the original value of x? I have seen for vertical bar-charts, but so far I have not been able to reproduce this for my tornado plot.
|
I am having a small doubt regarding maximum of random variables. I have $$Z= \max\{ X_1, X_2,\dots X_p, \dots X_N\}$$ where all $X_i$ are independent, identically distributed. Now, If for sure, I know that $$X_p>X_{p+1}>\dots>X_N$$ the can i say that the CDF of $Z$, $$\begin{align*}P(Z<z)&= P\left(\max\{ X_1, X_2,\dots X_p, \dots X_N\}<z\right)\\&=P\left(\max\{ X_1, X_2,\dots X_p\}<z\right)\\&=\left[P(X_1<z)\right]^{N-p-1}\end{align*}$$ How to find CDF of $Z$ in this case ? Is there any theorem that reduce the size of total variables for certain condition ?
|
I am having a small doubt regarding maximum of random variables. I have $$Z= \max\{ X_1, X_2,\dots X_p, \dots X_N\}$$ where all $X_i$ are independent, identically distributed. Now, If for sure, I know that $$\{X_1,\dots,X_p\}>X_{p+1}>\dots>X_N$$ the can i say that the CDF of $Z$, $$\begin{align*}P(Z<z)&= P\left(\max\{ X_1, X_2,\dots X_p, \dots X_N\}<z\right)\\&=P\left(\max\{ X_1, X_2,\dots X_p\}<z\right)\\&=\left[P(X_1<z)\right]^{N-p-1}\end{align*}$$ How to find CDF of $Z$ in this case ? Is there any theorem that reduce the size of total variables for certain condition ?
|
How do I find out if someone has been on my computer remotely or through a network? I am on a network with quite a few different people at my house.
|
In Mac OS X, if I don't touch it for a while, it will lock the screen and one must use password to unlock it, but this kind of log in is not recorded by last command. I want to know if anybody tried to break into my MacBook when I am not in front of it. Is there any way I can log such attempts?
|
Will I get tax refunded at the USA airport for a new iPhone I purchased there? I am an Indian and was in the US on a holiday.
|
I'm visiting the US for vacations (specifically Manhattan) and wanted to buy a digital camera. The guy at the shop told me that I can get back what I pay in NYC taxes for that camera if I present the ticket at the airport, when I'll be returning home. And that this is not applicable to clothes but it does to electronic stuff. Is any of this true?
|
As stated in , Gaussian Discriminant Analysis (GDA) can also be expressed in the form of $\frac{1}{1+\exp(-\theta^Tx)}$, where $\theta$ is some appropriate function of $φ$, $\Sigma$, $u_0$, and $u_1$. So why can't logistic regression predict model like them?
|
I found some pros of discriminant analysis and I've got questions about them. So: When the classes are well-separated, the parameter estimates for logistic regression are surprisingly unstable. Coefficients may go to infinity. LDA doesn't suffer from this problem. If number of features is small and the distribution of the predictors $X$ is approximately normal in each of the classes, the linear discriminant model is again more stable than the logistic regression model. What is stability and why is it important? (If logistic regression provides a good fit that does its job, then why should I care about stability?) LDA is popular when we have more than two response classes, because it also provides low-dimensional views of the data. I just don't understand that. How does LDA provide low-dimensional views? If you can name more pros or cons, that would be nice.
|
i'm having problems with footnote position. For example, here in this picture: The footnote is in the end of page, but sometimes it gets too high, like: There's something I can do to fix this? I'm pretty new in Latex And sorry for my english, I'm still practicing... haha
|
How do I make the space under footnotes disappear? And to space over the footnote's bar? Code: \documentclass[12pt,french]{report} \usepackage{mathptmx} \usepackage{helvet} \usepackage{courier} \usepackage[T1]{fontenc} \usepackage[cp1250]{inputenc} \usepackage[a4paper]{geometry} \geometry{verbose,margin=1in,headheight=12pt,headsep=25pt} \usepackage{fancyhdr} \pagestyle{fancy} \setlength{\parskip}{\medskipamount} \setlength{\parindent}{0pt} \usepackage{babel} \makeatletter \addto\extrasfrench{% \providecommand{\og}{\leavevmode\flqq~}% \providecommand{\fg}{\ifdim\lastskip>\z@\unskip\fi~\frqq}% } \makeatother \usepackage{latexsym} \usepackage{pifont} \usepackage{color} \usepackage{float} \usepackage{textcomp} \usepackage{graphicx} \usepackage{setspace} \usepackage[unicode=true, bookmarks=true,bookmarksnumbered=true,bookmarksopen=false, breaklinks=true,pdfborder={0 0 0},backref=false,colorlinks=false] {hyperref} \hypersetup{pdftitle={tito}, pdfauthor={abc}, pdfkeywords={kiko}} \usepackage{lipsum} \makeatletter \usepackage{multicol} \usepackage{fancyhdr} \usepackage{multirow} \usepackage{longtable} \setcounter{secnumdepth}{4} \setcounter{tocdepth}{4} \usepackage{array} \newcommand{\ts}{\textsuperscript} \renewcommand\theparagraph{\alph{paragraph}.} \renewcommand\paragraph{\@startsection{paragraph}{4}{\z@}% {3.25ex \@plus1ex \@minus.2ex}% {0.5ex \@plus .2ex}% {\normalfont\normalsize\bfseries}} \renewcommand*\l@paragraph{\@dottedtocline{4}{10em}{2em}} \def\thickhrulefill{\leavevmode \leaders \hrule height 1ex \hfill \kern \z@} \def\@makechapterhead#1{% \vspace*{10\p@}% {\parindent \z@ {\reset@font \usefont{OT1}{phv}{m}{n} \LARGE Chapitre \thechapter\par\nobreak}% \par\nobreak \vspace*{30\p@} \interlinepenalty\@M \usefont{OT1}{ptm}{b}{n} {\raggedright \Huge #1}% \par\nobreak \vskip 20\p@ \hrule height 1pt \par\nobreak \vskip 45\p@ }} \def\@makeschapterhead#1{% \vspace*{10\p@}% {\parindent \z@ {\raggedleft \reset@font \scshape \vphantom{\@chapapp{} \thechapter} \par\nobreak}% \par\nobreak \vspace*{30\p@} \interlinepenalty\@M \usefont{OT1}{ptm}{b}{n} {\raggedright \Huge #1}% \par\nobreak \par\nobreak \vskip 45\p@ }} \lhead{\nouppercase\leftmark} \chead{} \rhead{} \lfoot{} \cfoot{\thepage} \rfoot{} \renewcommand{\footrulewidth}{0.4pt} \pretolerance=10000 \hyphenpenalty=10000 \exhyphenpenalty=10000 \AtBeginDocument{ \def\labelitemi{\Pisymbol{psy}{183}} \def\labelitemii{\(\rhd\)} \def\labelitemiii{\(\rhd\)} \def\labelitemiv{\(\ast\)} } \makeatother \begin{document} \chapter{Chap} \lipsum[1]\footnote{\lipsum[1]} \lipsum[1-8] \end{document}
|
I have a several Grails services that are invoked from Flex code using Spring BlazeDS integration. I wanted to add some general debug logging using the groovy metaClass. I have the following in a bootstrap class: class MyBootStrap { def grailsApplication def init = { servletContext -> initServiceCallLogging() } def destroy = { } private def initServiceCallLogging() { grailsApplication.serviceClasses.each { serviceClass -> serviceClass.metaClass.invokeMethod = { name, args -> log.debug "Method $name invoked" def metaMethod = delegate.metaClass.getMetaMethod(name, args) def result = metaMethod.invoke(delegate, args) return result } } } } This works fine as long as the Service method is called from e.g. a Grails Controller or Service but when directly called from Flex (via BlazeDS), the method calls are not intercepted. Anyone an idea how this can be solved or is this not possible via metaprogramming and should Spring AOP be used? Thx
|
I know Googling I can find an appropriate answer, but I prefer listening to your personal (and maybe technical) opinions. What is the main reason of the difference between Java and C# in throwing exceptions? In Java the signature of a method that throws an exception has to use the "throws" keyword, while in C# you don't know in compilation time if an exception could be thrown.
|
I have two power sources, one is solar panels (DC), another is from grid (AC). Is it possible to combine these two power sources with solar getting higher priority ? By high priority I mean draw power from grid only if solar is not sufficient or absent. Final output is required to be AC One way would be to convert grid ac to dc, matched to dc output of solar panels, and then some how combine them (with priority for solar) and then convert back to AC. Grid-tie setup is not possible. Also Grid is too unstable (not available every 3rd or 4th hour) so I am going to need batteries any way. I want to prioritize use of power sources in this way: Solar Grid Batteries. So if solar is not sufficient it should tap grid (if available) for deficit power else it should use batteries. I want to minimize cycling of batteries and use only as a last resort. I have come across a which supports solar first, then battery and lastly Grid. Manual states that You can set the discharge voltage level of battery at which point it will point back to grid until batteries are fully charged then back to batteries and so on. Maybe I am being too conservative with cycling of batteries. I would like to know if use of batteries only as a backup is possible given my required priorities. uses only one source at the a time but I want to use both sources at the same time such that if solar is insufficient, don't turn it off, rather augment it with grid. For example if solar can deliver 2 Amps and I need 5 amps in total, I want a way to be able to draw remaining 3 amps from the grid. And if load requires 2 amps, stop taking from grid. Is it possible ? For simplification lets assume grid also supplies in DC. Also I have some controller d1 connected with Panels which convert output of panels to 24v dc and another device d2 to convert grid to 24v dc as well. I want to combine d1 and d2 to add currents with above mentioned priorities.
|
I have a power supply of 5v DC 5Ah and a 12v 2Ah lead battery. I was thinking to make a circuit to switch battery line when power is off. I made a little schema, what i'd have to put instead of switch that i draw? Here's the circuit schematics I made. Thank you
|
I have created a CNAME for www.example.com to example.org I would like to create a CNAME for example.com to example.org Or, do I not need to do that? Our former email domain rather than pointing to an IP address now needs to point to a cloud domain.
|
This is a about CNAMEs at the apices (or roots) of zones It's relatively common knowledge that CNAME records at the apex of a domain are a taboo practice. Example: example.com. IN CNAME ithurts.example.net. In a best case scenario nameserver software might refuse to load the configuration, and in the worst case it might accept this configuration and invalidate the configuration for example.com. Recently I had a webhosting company pass instructions to a business unit that we needed to CNAME the apex of our domain to a new record. Knowing that this would be a suicide config when fed to BIND, I advised them that we would not be able to comply and that this was bunk advice in general. The webhosting company took the stance that it is not outright forbidden by standard defining RFCs and that their software supports it. If we could not CNAME the apex, their advice was to have no apex record at all and they would not provide a redirecting webserver. ...What? Most of us know that insists that A CNAME record is not allowed to coexist with any other data., but let's be honest with ourselves here, that RFC is only Informational. The closest I know to verbiage that forbids the practice is from : If a CNAME RR is present at a node, no other data should be present; this ensures that the data for a canonical name and its aliases cannot be different. Unfortunately I've been in the industry long enough to know that "should not" is not the same as "must not", and that's enough rope for most software designers to hang themselves with. Knowing that anything short of a concise link to a slam dunk would be a waste of my time, I ended up letting the company get away with a scolding for recommending configurations that could break commonly used software without proper disclosure. This brings us to the Q&A. For once I'd like us to get really technical about the insanity of apex CNAMEs, and not skirt around the issue like we usually do when someone posts on the subject. is off limits, as are any other Informational RFC applicable here that I didn't think of. Let's shut this baby down.
|
Is there a recommended way to calculate the new position of a point in a map when "moving" the point for example 10 kilometers to south ? Example: Point = { lat : 'LATITUDE VALUE', lng : 'LONGITUDE VALUE' } Now we want to get the new Position of the Point when the Point is moving like this: Point_2 = movePoint(Point, 10, 'kilometers', 'south'); // returns lat,lng Now I am looking for a recommended way to calculate something like this or maybe with a framework like turfjs (I think turfjs is not providing this ?)
|
I am wanting to find a latitude and longitude point given a bearing, a distance, and a starting latitude and longitude. This appears to be the opposite of this question (). I have already looked into the haversine formula and think it's approximation of the world is probably close enough. I am assuming that I need to solve the haversine formula for my unknown lat/long, is this correct? Are there any good websites that talk about this sort of thing? It seems like it would be common, but my googling has only turned up questions similar to the one above. What I am really looking for is just a formula for this. I'd like to give it a starting lat/lng, a bearing, and a distance (miles or kilometers) and I would like to get out of it a lat/lng pair that represent where one would have ended up had they traveled along that route.
|
I really need some good tips for Duke Fishron. I can never seem to kill him. I am using the chlorophyte shot bow with holy arrows. I also have Vampire knives just in case. I am using ironskin, pumpkin pie, swiftness, and some others. What am i missing here?
|
I've been trying for a long time to beat Duke Fishron, but I always keep getting hurt badly and need to retreat. What I've tried is using the weapons I got from the Moon Lord, flying around it and attacking, and shooting at it with weapons from the Arms Dealer. I've tried Solar eruption, Vortex Beater, Stardust Dragon Staff, Nebula Arcanum, and the S.D.M.G Any tips on how I could defeat him?
|
This is an exercise in my abstract algebra reader, in the chapter about polynomial rings. Let $n \in \Bbb N$. Let $p>2$ a prime number. And let $n$ not divisble by $p-1$. Show that $$1^n+2^n+...+(p-1)^n \equiv 0 \pmod {p}$$ Our teacher assistant gave a hint to solve this with induction. We have tried to solve this using induction, but after some hours tring, I don't believe anyomre that this is possible. At least, I don't think I'm able to do that with my current knowlegde about mathematics. If someone has an idea how to solve this with induction (or maybe an other way), then I'm all ears.
|
Calculate for every positive integer $n$ and for every prime $p$ the expression $$1^n +2^n + \cdots +(p-1)^n \mod p$$ I need your help for this. I don't know what to do, but I'll show you what I know. Wilson's theorem The identity $X^p-X = \prod_{a \in \mathbb{F}_p-1}(X-a)$ $\exists a \in \mathbb{Z}, \ a^2 \equiv -1 \mod p \qquad \iff \qquad p \equiv 1 \mod 4$ Now can you please provide me a hint?
|
I've a script which Takes $_POST['messages'] and then saves the user's messages to MySQL database. What's the best approach to prevent SQL Injection and saving the messages(which could be alphabets, numbers, special characters) to the Database so that it won't affect the script+databse queries. I mean, is there any approach to encode the data or change the special characters to encoded characters like ? to %3F so something. I'm using PHP, MySQL(MySQL PDO Wrapper Class).
|
If user input is inserted without modification into an SQL query, then the application becomes vulnerable to , like in the following example: $unsafe_variable = $_POST['user_input']; mysql_query("INSERT INTO `table` (`column`) VALUES ('$unsafe_variable')"); That's because the user can input something like value'); DROP TABLE table;--, and the query becomes: INSERT INTO `table` (`column`) VALUES('value'); DROP TABLE table;--') What can be done to prevent this from happening?
|
if i have a group G, and a normal cyclic subgroup H, any subgroup of H is normal to G? It is to H, but i don't know to G. Can you give me some help with this?
|
Exercise 11, page 45 from Hungerford's book Algebra. If $H$ is a cyclic subgroup of $G$ and $H$ is normal in $G$, then every subgroup of $H$ is normal in $G$. I am trying to show that $a^{-1}Ka\subset K$, but I got stuck. What I am supposed to do now? Thanks for your kindly help.
|
When navigating to your own network profile and selecting Update profile info from a profile which has formatting i.e. links, it doesn't seem the formatting is copied over to the Stack Exchange profile. I imagine the generic Stack Exchange profile is different from Meta.StackExchange where Meta is an actual community, so it has its own profile. I'm not sure if this is expected? I am filing a bug anyway, but feel free to close if this is expected. Stack Overflow Profile: Stack Exchange Profile:
|
I noticed that, unlike my profile on every SE site, when I push the profile changes to stackexchange.com, there are no links and nothing is clickable. This appears to be . Although it may reduce spam, it renders my SE network profile useless. I primarily use SE for professional sites, so I link to my LinkedIn and Stack Overflow Career profiles in my About Me. I also link to a public Amazon Wishlist and PayPal donation link (yes, I've made about $5 from what I'm guessing is Stack Exchange). However, all of these are dead on the main SE profile. Externally, I tend to link to my SE profile instead of individual site profiles. Since I'm in software development, I prefer to link to one profile instead of five profiles (Software Engineering, Stack Overflow, Project Management, SQA and Testing, The Workplace). However, it means that anyone who comes into this link sees mention of a profile on LinkedIn or Stack Overflow Careers as well as a way to give me things for my contributions and can't do anything. This renders my SE profile mostly useless. It links to all of my SE accounts, but people can't use my profile to find me on other services as I intend. If anyone were to find it referenced somewhere, they would hit a small blocker. That, to me, defeats the point of a profile. I understand the need for anti-spam measures, but the only way to pull a profile is to pull it from an existing SE site. Reputation should be considered. I'm not sure what the right thing to do is, but either reputation on the network should be considered and if it meets a threshold, links should be enabled. Alternately, reputation information should come from the site where the profile is pulled from and if it meets a threshold, links should be enabled. Regardless, a fully functional cross-site profile is essential to me to effectively use SE as a small part of a portfolio.
|
My breath was taken away by this. I tried to run my JAGS model with different number burn-in samples but it still takes the same amout of time!! n.iter n.burnin time saved iterations per chain 2000 1000 66s 1000 5000 4000 64s 1000 20000 19000 62s 1000 n.chains was 2 and n.thin was 1. So in each of the 3 model runs, I had different burn-in period, but the same second stage (n.iter - n.burnin, i.e. 1000 iterations per chain). All 3 models run for the same period of time!!! Does this mean that the burn-in phase takes zero time? This is really a strange result, doesn't correspond to how I supposed the MCMC works. I thought that the burn-in phase is exactly the same computation process as the second stage, with the only difference that the samples are discarded. I have used function to run JAGS.
|
I found out that the function jags() in the R2jags package sometimes does not remove the burn in part even with the option n.burnin=##. Here is a very simple example in R (a simple linear model): library(R2jags) N <- 1000 y <- rnorm(N) x <- rnorm(N) data <- list("N", "y", "x") inits <- function(){list(beta0=rnorm(1), beta1=rnorm(1), tau=1)} parameters <- c("beta0", "beta1", "tau") the model m.bug is like this: model{ for (i in 1:N){ y[i] ~ dnorm(mu[i], tau) mu[i] <- beta0 + beta1*x[i] } beta0 ~ dnorm(0, 0.00001) beta1 ~ dnorm(0, 0.00001) tau ~ dgamma(0.001, 0.001) sigma2 <- 1/tau } using "jags()" in R2jags package like this: m <- jags(data, inits, parameters, "m.bug", n.chains=3, n.iter=2000, n.burnin=1000, n.thin=1) My question: In the output of m, the posterior estimates are based on the right number of interations (1000), but if we check the traceplot (using traceplot(m)), the burnin part seems still there(e.g. the first few values for "tau" are not converged). Why? and there is only one progress bar (uaually two, one for burn-in, one for the rest). also, if I change n.iter=2000, n.burnin=1000 to n.iter=2001000, n.burnin=2000000 the elapsed time does not change, which is "too fast" for so many iterations. ps. I used R version 2.15.2 and R2jags version 0.03-08
|
How do I use the substitution $p = x + \frac{1}{x}$ to show that the equation $$2x^4+x^3-6x^2+x+2=0$$ reduces to $2p^2+p-10=0$. Now, I can do the problem in reverse, but when I try solving $p = x + \frac{1}{x}$ for $x$ and substituting, the resulting equation is too complicated and nothing like the form required.
|
By using the substitution $p=x+\frac{1}{x}$, show that the equation $$2x^4+x^3-6x^2+x+2=0$$ reduces to $2p^2+p-10=0$. I can't think of anything that produces a useful result, I tried writing p as $p=\frac{x^2+1}{x}$ and finding areas to substitute but have come with no progress. Could someone offer a slight hint on how to proceed? Thanks
|
When I switch from Sculpt mode to Edit mode, I run into an issue where the faces on one arm of my model are not showing. Beforehand, I had applied the mirror modifier so that I may use the hide option in sculpt mode. Thank you in advance for any help! PS. This is the first time I am posting a question so forgive any incorrectness in my methods or if my question is foolish.
|
I have append a mesh (rex) from this .blend . In edit Mode I see different vertices from objcet mode (see pictures). The vertices of belt are missing! OBJECT MODE: EDIT MODE: How can I edit vertices of belt? Is It a bug? This is my .blend maybe can help.
|
I have refugee travel documents from USA, I’m willing to travel to Iran but my transit is in Dubai and I have to wait in Dubai around 13 hours. Do I have to apply for any type of visa in order to stay in transit in Dubai?
|
Do I need a transit visa for a layover via airports in the UAE, such as Dubai International Airport or Abu Dhabi International Airport? If so, what are the requirements for such a visa? Can I get the transit visa on arrival?
|
For a longtime I try to get Imagemagick running on my Ubuntu 18.04. After a alot of searching and reading I am stuck now installing libheif-dev. It seems there is an easy solution for 20.04 LTS: But on 18.04 LTS I am stuck. Can somebody help me how to install libheif-dev? Te error I get is: make[1]: Entering directory '/home/m0ps/Desktop/video2/BSgen/ImageMagick-7.0.11-4' CCLD utilities/magick MagickCore/.libs/libMagickCore-7.Q16HDRI.so: undefined reference to `heif_image_set_raw_color_profile' MagickCore/.libs/libMagickCore-7.Q16HDRI.so: undefined reference to `heif_have_decoder_for_format' MagickCore/.libs/libMagickCore-7.Q16HDRI.so: undefined reference to `heif_context_add_exif_metadata' MagickCore/.libs/libMagickCore-7.Q16HDRI.so: undefined reference to `heif_image_handle_get_luma_bits_per_pixel' MagickCore/.libs/libMagickCore-7.Q16HDRI.so: undefined reference to `heif_context_add_XMP_metadata' MagickCore/.libs/libMagickCore-7.Q16HDRI.so: undefined reference to `heif_image_handle_get_raw_color_profile_size' MagickCore/.libs/libMagickCore-7.Q16HDRI.so: undefined reference to `heif_image_handle_get_raw_color_profile' MagickCore/.libs/libMagickCore-7.Q16HDRI.so: undefined reference to `heif_have_encoder_for_format' MagickCore/.libs/libMagickCore-7.Q16HDRI.so: undefined reference to `heif_context_read_from_memory_without_copy' MagickCore/.libs/libMagickCore-7.Q16HDRI.so: undefined reference to `heif_has_compatible_brand' collect2: error: ld returned 1 exit status Makefile:8043: recipe for target 'utilities/magick' failed make[1]: *** [utilities/magick] Error 1 make[1]: Leaving directory '/home/m0ps/Desktop/video2/BSgen/ImageMagick-7.0.11-4' Makefile:6120: recipe for target 'all' failed make: *** [all] Error 2 I installed libheif as described here: libheif is installed but with libheif there is a problem: (base) m0ps@m0ps:/usr/local/lib$ pkg-config libheif --modversion 1.11.0 (base) m0ps@m0ps:/usr/local/lib$ pkg-config libheif-dev --modversion Package libheif-dev was not found in the pkg-config search path. Perhaps you should add the directory containing `libheif-dev.pc' to the PKG_CONFIG_PATH environment variable No package 'libheif-dev' found I was searching for 'libheif-dev.pc' but did not find in on my machine
|
How do I get to the Universe Repository in supported versions of Ubuntu?
|
I wanted to lock any directory with a password, is it possible to set up pin or password for any directory or file without using third party tools like cryptkeeper.
|
Is there any simple (IE: right click in Nautilus) way to password protect a particular folder/file in Ubuntu? I've got a few files containing sensitive info and I'd much prefer that if/when I leave my computer alone, they aren't accidentally accessed by someone else. The secruty does not have to be extremely tight. My only concern is that when family/friends come over, I don't really like the idea of them looking at my bank details, accounts or, you guessed it, porn collection. A simple, effective way to let me put my machine in the hands of someone else knowing that said machine can not cause me embarresment is the sole reason why I'd like to see this in Ubuntu.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.