body1
stringlengths 20
4.1k
| body2
stringlengths 23
4.09k
|
---|---|
Count of reputation updates without refreshing the page but hover still have the old value. | Reputation has been changed but not reflected on tooltip. |
I am trying to show that the polynomials in $\mathbb C[x,y]$ that contain no terms of the form $c y^m$ where $m>0$ and $c \in \mathbb C^*$ form a non-Noetherian subring. I know that I need to find an ideal that isn't finitely generated but I am not sure how. | Here is the problem I am stuck on: Fix a field $K$ and consider the subring $A \leq K[x,y]$ generated by $K \cup \{x,xy,\dots,\}$. Show that $A$ is not Noetherian. I figure that taking ideals $I_n = (x,xy,\dots,xy^n)$ should give an infinite strictly ascending chain, which would establish that $A$ is not Noetherian, but I cannot figure out how to show that each $I_n$ is a proper subset of $I_{n+1}$. Any help here? |
I want to quick paste some different strings using hotkeys. For example if I press Alt+L in any input form it works like if I pasted loremipsum. Or it may be some abbreviation, for example I enter li, press Tab and get loremipsum. I'm using Linux Mint with KDE desktop. In Windows I could do it using AutoHotkey | I would like to simulate keyboard combinations. I am able to do this on Windows with AutoHotKey. Is there an equivalent app for Ubuntu? |
I can not install nor upgrade anything 'can not get lock var/lib/dpkg/lock-frontend. it is held by the process 2469 ...' could you suggest what to do to ? | I'm trying to run this command in the terminal: sudo apt install software-properties-common This is the error message I get: E: Could not get lock /var/lib/dpkg/lock-frontend - open (11: Resource temporarily unavailable) E: Unable to acquire the dpkg frontend lock (/var/lib/dpkg/lock-frontend), is another process using it? |
When a photon is emitted, does the rest mass of the emitting body decrease by $E/c^2$ wherein E =photon energy? If yes, does the photon have a rest mass equal to $E/c^2$? | Photons are massless, but if $m = 0$ and , then $E = 0c^2 = 0$. This would say that photons have no energy, which is not true. However, given the formula $E = ℎf$, a photon does have energy as $ℎ$ is a non-zero constant and photons with a zero frequency do not exist. What am I missing here, or does the famous formula not apply to photons? |
So I had an argument with someone over telegram if root exists or not in android. My point of view is that like any linux kernels the concept of root exists but it's not accessible to other processes. That's where magisk comes in play, hacks the kernel permitting other apps to use the root functionality. Now the other person mentions that the concept of root doesn't exist in android and mods like magisk implements it. Now, which one is which? Does root exists in android phones or mods like magisk implement it? | is known as a “systemless” root method. It’s essentially a way to modify the system without actually modifying it. Modifications are stored safely in the boot partition instead of modifying the real system files. I have looked around but did not find a sufficient explanation as to how it actually works. How is the root access gained and maintained? What exactly is the role of the boot partition and if it integrates with the system partition how it does it? A really detailed description of how it works lacks from everywhere I searched so it would be really highly appreciated. |
I have installed two versions of Ubuntu on two hard drives in my Asus laptop, one running with Ubuntu 14.04 and the other with 15.10. Originally, both systems worked, however, today when booting up and selecting 14.04, it returned an "cannot enumerate usb devices" error, and then froze. 15.10 is starting fine however, this is from where I am writing now. I made two bootable USB sticks (I tried it from both a Windows machine with Rufus and from Ubuntu 15.10 with unetbootin and the built-in startup disk creator), one with Ubuntu 16.04 and the other with the 64-bit version of Windows 10. All "versions" of the usb sticks return the same results: Booting from the Windows stick freezes a second after the splash screen with the blue logo appears. Also leaving it for quite a long time (an hour), nothing happens. Booting from the Ubuntu 16.04 stick shows the initial menu with "Try Ubuntu" and "Install Ubuntu", but it gets stuck at a black screen after selecting either. The Windows stick is formatted in FAT32 with a GPT partition table, and I made sure it has the file needed for booting. I have obviously tried changing the boot order, enabled and disabled UEFI boot option, along with several other things. What could be the reason for this? My aim is the install a clean dual-boot system with Windows on one hard drive and Ubuntu 16.04 on the second. | I am trying to boot Ubuntu on my computer. When I boot Ubuntu, it boots to a black screen. How can I fix this? Table of Contents: |
Use case: sometimes I comment on a question. Then I decide to delete it. After let's say 2 minutes the user that posted the question answers my comment but my comment is long gone! His reply to my comment is out of context now because no one can see what that comment is referring to (my deleted comment). If I chose to delete the comment it could be hidden but stay there allowing me to bring it back. This can be done with deleted answers right now where I can undelete it if I want. | If moderators can view , can we see comments we've deleted? We can see our deleted answers, but why not our deleted comments? |
Is there a version available for the Samsung Galaxy S6? | With the announcement of the Ubuntu Phone OS I'd like to know what phone (and tablet) models are supported at this time. Note from foss & Oli: We are making this the master question for all future "Will this work on <insert random tablet/phone/device here>?!" questions |
I'm trying to add a sky in my scene by adding a light blue gradient to the world. The problem is that it lights my scene too bright, as you can see in the picture, the underside of the tree is lit and the shadows destroyed. I was trying to follow a tutorial and the creator said he added some extra nodes to stop the scene from being affected by the world properties. Anyone know which nodes these might be? | I am making a skydome and I have a texture hooked up with an emission shader for it, however, since the dome is blue it only emits blue light. Is there a way that I can have the whole sky illuminated and have the light reaching the rest of my scene be a different colour? |
This class ds has two fields, x and y public class ds { private int x; private int y; public ds(int xx, int yy) { x = xx; y = yy; } public int getX() { return x; } public int getY() { return y; } public void setX(int xx) { x = xx; } public void setY(int yy) { y = yy; } } This class ptrs uses ds to print results. I note that the printouts are the same whether int or Integer is used in ds. public class ptrs { public static void main(String[] args) { ds d = new ds(1,2); System.out.println("d.x:" + d.getX()); //1 System.out.println("d.y:" + d.getY()); //2 //t is an object reference (a pointer) which points to d, which in turn points to the ds object ds t = d; System.out.println("t.x:" + t.getX()); //1 System.out.println("t.y:" + t.getY()); //2 t.setX(3); t.setY(4); System.out.println(""); System.out.println("t.x:" + t.getX()); //3 System.out.println("t.x:" + t.getY()); //4 System.out.println("d.x:" + d.getX()); //3 System.out.println("d.y:" + d.getY()); //4 d.setX(5); d.setY(6); System.out.println(""); System.out.println("d.x:" + d.getX()); //5 System.out.println("d.x:" + d.getY()); //6 System.out.println("t.x:" + t.getX()); //5 System.out.println("t.x:" + t.getY()); //6 } } When I call the set methods on either d or t, calling the get methods on either pointer results in the updated values. Why is there apparently different behavior in the next example? public class main { public static void main(String[] args) { Integer i = new Integer(5); Integer a = i; System.out.println("i is " + i ); //5 System.out.println("a is " + a ); //5 i = new Integer(10); System.out.println("i is " + i ); //10 System.out.println("a is " + a ); //5 } } If I set an Integer object reference i to point to an Integer object with value 5, and then make another reference a refer to i, why does a still point to 5 even after I make i reference another Integer object with value 10? Is the difference because in the first example I change fields of the same object, but in the second example I point to a new object? But why would that cause a difference, if that is the reason..? | I always thought Java uses pass-by-reference. However, I've seen a couple of blog posts (for example, ) that claim that it isn't (the blog post says that Java uses pass-by-value). I don't think I understand the distinction they're making. What is the explanation? |
I have noticed people use this code to localize Thread.CurrentThread.CurrentUICulture = new CultureInfo("fr-FR"); Thread.CurrentThread.CurrentCulture = new CultureInfo("fr-FR"); Could anyone tell me what CurrentUICulture and CurrentCulture are? Why do we need to assign same value to both What will happen if I assign the value CultureInfo("fr-FR"); to only CurrentUICulture or CurrentCulture? I would really like to know in detail what CurrentUICulture and CurrentCulture does? Suppose client pc language setting could be German or French etc., but I want to develop my application in such a way that whatever language setting is there, my apps will work in that pc with their language setting. I mean that all the controls will show the text in German or French. I do not want to hard code the culture this way CultureInfo("fr-FR") I would rather the user's language setting dictate the language of my controls. How would I go about doing this? | In .NET there is the CultureInfo class in the System.Globalization namespace. It has two similar properties both returning values of the CultureInfo type: CurrentCulture and CurrentUICulture. What is the difference between them? Which one should I use when and why? |
I am running Rent a car bussines and I am wondering how to setup image for google search... When someone search for Skoda Fabia, I am SEO optimised enough to be shown on the first page of google search, but I also want picture of the car next to the text (on mobile phones). Is there any way to include it on wordpress? Thanks in advance! | Can anyone tell me how Google decides which image to use when it shows an image with the search results (as is the case with mobile search, sometimes)? If you look at these mobile search results … … and take the AliExpress.com result as an example, by inspecting you can see that used by Google seems to have no special declaration, etc. It is just the first JPG that appears in that page's HTML - so I was thinking maybe that's why it's the image that is used in the Google search results. However, when you look at these mobile search results … … and consider the Backpack Billboards result, reveals that being used is actually the seventh image declared in the HTML. So can anyone shed any light on how Google determines which image to be displayed? I would like to know so I can then have control over which image is displayed for my site. Update / Solution Thanks to the answers, below, this is the code I have now added to my head HTML in order to get the thumbnail shown in Google when searching for backpack billboards: <script type="application/ld+json"> { "@context": "http://schema.org/", "@type": "Product", "name": "Regular Backpack Billboard", "image": [ "https://backpackbillboards.com/wp-content/uploads/2017/12/backpack-billboards-1x1.jpg", "https://backpackbillboards.com/wp-content/uploads/2017/12/backpack-billboards-4x3.jpg", "https://backpackbillboards.com/wp-content/uploads/2017/12/backpack-billboards-16x9.jpg" ], "description": "Backpack Billboards feature a rechargeable battery which powers the internal LED lights providing a bright illuminated display for up to 8 hours.", "sku": "BPBB8", "brand": { "@type": "Thing", "name": "Backpack Billboards" }, "offers": { "@type": "Offer", "priceCurrency": "USD", "price": "299.00", "priceValidUntil": "2020-11-11", "itemCondition": "http://schema.org/NewCondition", "availability": "http://schema.org/InStock", "seller": { "@type": "Organization", "name": "Backpack Billboards" } } } </script> |
I want to prove that For every pair of positive integers $(m,n)$, the statement $m!n!(m+n)!|(2m)!(2n)!$ holds. which is equivalent to For every pair of positive integers $(m,n)$, the statement $$ \sum_{i=1}^{\infty}\left\lfloor\frac m{p^i}\right\rfloor+ \sum_{i=1}^{\infty}\left\lfloor\frac n{p^i}\right\rfloor+ \sum_{i=1}^{\infty}\left\lfloor\frac {m+n}{p^i}\right\rfloor \le\sum_{i=1}^{\infty}\left\lfloor\frac {2m}{p^i}\right\rfloor+ \sum_{i=1}^{\infty}\left\lfloor\frac {2n}{p^i}\right\rfloor$$ holds for every prime number $p$. I have tried setting $m=ap+c,n=bp+d$ with $a,b,c,d$ nonnegative integers and $c,d<p$. From that, the inequality becomes $$ a+\sum_{i=1}^{\infty}\left\lfloor\frac a{p^i}\right\rfloor+ b+\sum_{i=1}^{\infty}\left\lfloor\frac b{p^i}\right\rfloor+ a+b+\left\lfloor\frac{c+d}{p}\right\rfloor+ \sum_{i=1}^{\infty}\left\lfloor\frac{a+b}{p^i}+\frac {c+d}{p^{i+1}}\right\rfloor \\\le 2a+\left\lfloor\frac{2c}{p}\right\rfloor+\sum_{i=1}^{\infty}\left\lfloor\frac {2a}{p^i}+\frac{2c}{p^{i+1}}\right\rfloor\\+ 2b+\left\lfloor\frac{2d}{p}\right\rfloor+\sum_{i=1}^{\infty}\left\lfloor\frac {2b}{p^i}+\frac{2d}{p^{i+1}}\right\rfloor$$ $$\iff \sum_{i=1}^{\infty}\left\lfloor\frac a{p^i}\right\rfloor+ \sum_{i=1}^{\infty}\left\lfloor\frac b{p^i}\right\rfloor+ \left\lfloor\frac{c+d}{p}\right\rfloor+ \sum_{i=1}^{\infty}\left\lfloor\frac{a+b+\frac {c+d}{p}}{p^i}\right\rfloor \\\le \left\lfloor\frac{2c}{p}\right\rfloor+\sum_{i=1}^{\infty}\left\lfloor\frac {2a+\frac{2c}{p}}{p^i}\right\rfloor\\+ \left\lfloor\frac{2d}{p}\right\rfloor+\sum_{i=1}^{\infty}\left\lfloor\frac {2b+\frac{2d}{p}}{p^i}\right\rfloor\text.$$ After that, I tried splitting cases based on whether $2c\ge p$, whether $2d\ge p$, and whether $c+d\ge p$. The case where $2c<p$, $2d\ge p$, and $c+d\ge p$ becomes $$\sum_{i=1}^{\infty}\left\lfloor\frac a{p^i}\right\rfloor+ \sum_{i=1}^{\infty}\left\lfloor\frac b{p^i}\right\rfloor+ 1+\sum_{i=1}^{\infty}\left\lfloor\frac{a+b+1}{p^i}\right\rfloor \le \sum_{i=1}^{\infty}\left\lfloor\frac {2a}{p^i}\right\rfloor+ 1+\sum_{i=1}^{\infty}\left\lfloor\frac {2b+1}{p^i}\right\rfloor$$ $$\iff \sum_{i=1}^{\infty}\left\lfloor\frac a{p^i}\right\rfloor+ \sum_{i=1}^{\infty}\left\lfloor\frac b{p^i}\right\rfloor+ \sum_{i=1}^{\infty}\left\lfloor\frac{a+b+1}{p^i}\right\rfloor \le \sum_{i=1}^{\infty}\left\lfloor\frac {2a}{p^i}\right\rfloor+ \sum_{i=1}^{\infty}\left\lfloor\frac {2b+1}{p^i}\right\rfloor$$ $$\iff \sum_{i=1}^{\infty}\left( \left\lfloor\frac a{p^i}\right\rfloor+ \left\lfloor\frac b{p^i}\right\rfloor+ \left\lfloor\frac{a+b+1}{p^i}\right\rfloor\right) \le \sum_{i=1}^{\infty}\left( \left\lfloor\frac {2a}{p^i}\right\rfloor+ \left\lfloor\frac {2b+1}{p^i}\right\rfloor\right)\text.$$ How to carry on from there? | Prove that for all non-negative integers $m,n$, $\frac{(2m)!(2n)!}{m!n!(m + n)!}$ is an integer. I'm not familiar to factorial and I don't have much idea, can someone show me how to prove this? Thank you. |
I am a student from China. I'm going to attend Carnegie Mellon University in Pittsburgh, PA. I have planned my itinerary, where I will first take a flight from Shanghai to Los Angeles, then I will take another flight from LA to Pittsburgh (layover in Boston). Is there any issue at port of entry with this schedule? | I am a girl in my early twenties traveling to USA from India and in my visa application I have provided the contact address for a relative in San Francisco, and their invitation letter. I would like to visit LA first. Will I face problems during immigration if I land in LA (with an immediate on wards ticket to SF)? I dont plan to get on the flight from LA to SFO. Initially I was planning to fly to SFO from India and then fly to LA immediately after completing immigration at SFO airport. |
In the past 2 years I was granted 10 Schengen Visas from Belgium, Greece, Portugal, Switzerland and France (in December 2018) In February 2019 I applied for a French Visa in the USA & was denied with the following reason: "not convinced of your intention to return" to the USA. The documents & purpose of the trip was the same in December 2018 and February 2019, no difference at all. First visa was approved and I visited France & returned after 7 days, did not of course overstay my visa. The second visa was refused! Anyone experience the same situation? What was the solution? Should I re-apply? Apply for another Schengen visa (not France)? Appeal the decision? | Schengen refusal formulae can be difficult to understand sometimes. Sometimes an applicant receives a refusal with: Justification for the purpose and conditions of the intended stay was not reliable. often accompanied by: Your intention to leave the territory of the Member States before the expiry of the visa applied for could not be ascertained. What is meant by this refusal reason? What are they trying to say? |
i am running my own Mailserver, which works fine, but not for some targets. Basically I can send mails to everybody, except to *@gmx.net and *@web.de, If I do that, it takes about an week and then I get a Undelivered Mail Returned to Sender mail. Within that I find that error: Diagnostic-Code: smtp; 554-gmx.net (mxgmx114) Nemesis ESMTP Service not available 554-No SMTP service 554-Bad DNS PTR resource record. I have been googling for that and found some explanation, but I still do not know what to put where in the DNS record. Right now I have that in the TXT part of the DNS v=spf1 a mx ptr -all But it is not working. How can I fix that? | Currently, my server is running Ubuntu Server. I had the domain "rosresurs.msk.ru". A bit later I've bought a new domain called "rosresurs.net". But when I ran dig command, I saw, that old domain is linked to my server's IP. I've looked to both DNS zones. In .msk.ru there is no server's IP. Domain .net has PTR record. Also, I asked for help my domain hosting. Thay said, that it is out fault. I've searched the whole system for rosresurs.msk.ru and its IP address. I've deleted all that entries. But after 2 days nothing changed. |
I am going to take PChem I in my biochem dept next sem, which is a watered down version of the PChem course in Chem dept. It basically covers thermodynamics and a little bit of quantum stuff. The syllabus says there is no required text, since course notes will be available once we register for class. But I do want to get ahead of class by reading books. I have several books at hand, please give me suggestions on which one should I use and if you have any good free lectures, feel free to post links as well Intro to Molecular thermodynamics by Hanson&Green, PChem for Chem and BioSci by Chang,Molecular Driving Forces by Dill&Bromberg, PChem: A molecular approach by McQuarrie, An introduction to thermal physics by Schroeder,Pchem by castellan, Callen's thermodynamics text and also Fermi's Personally, I found Hanson, Castellan, Dill, and Chang are pretty good, haven't read any other | I took an introductory chemistry course long ago, but the rules seemed arbitrary, and I've forgotten most of what I learned. Now that I have an undergraduate education in physics, I should be able to use physics to learn general chemistry more effectively. What resources, either books or on-line, are useful for physicists to learn the fundamentals of chemistry? I'm not enrolled at a university, so official courses and labs aren't realistic. Please note that I am not looking for books on specialized advanced topics, but a general introduction to chemistry that takes advantage of thermodynamics, statistical mechanics, and quantum mechanics while requiring little or no prior knowledge of chemistry. |
I was about to start my dhcpd service but couldn't do it since it was masked. I tried systemctl unmask dhcpd.service but it does not work. Any suggestion? | root@gcomputer:~# systemctl status x11-common ● x11-common.service Loaded: masked (/dev/null; bad) Active: inactive (dead) I tried systemctl unmask x11-common and systemctl unmask x11-common.service but that did not change anything. How do I unmask it? |
Most of the things I run in the terminal take a long time to compute and I would like to have bash output a time report at the end of every command entered into the terminal. Is there something I can put into my bashrc to do this? Example: $ find / -ls <find / -ls return info> start time = 10:21:54 | end time = 10:31:34 | time lapsed = 00:10:20 $ or $ make all <make all return info> start time = 10:21:54 | end time = 10:31:34 | time lapsed = 00:10:20 It would be nice to be able to add a list of exceptions for commands like cd, but it wouldn't really bother me. | Is it possible to forcibly add a timing alias (for lack of a better way to phrase it) to every command in bash? For example, I would like to have a specific user who, whenever a command is run, it is always wrapped either with date before and after, or time. Is this possible, and, if so, how? |
Networking beginner, but my experience is in web and mobile app development for 10+ years, so I'm not at all new to technology. I recently started working on a new team with some dev-ops engineers and they are very familiar with networking, systems, services, automation, and provisioning. In an effort to inexpensively learn more I got 4 raspberry pis and an unmanaged switch. I'm starting with basic networking and linux administration on my path to learn more about the peripheral and platform technologies that support the applications that I build. I want my Raspberry Pis to be assigned static IPs from my modem/router/wifi-access-point device (Motorola Surfboard G6580), anytime any Raspberry Pi connects. Is it possible to have the Raspberry Pi (or any other device for that matter) request a specific static IP from the DHCP server? The modem has a 192.168.0.1 web address that will allow me to manage the dhcp assignment of static ips based on mac addresses. However, I am curious to know if this is possible to automate with a request from the raspberry pi itself. | I am wondering if there is anything (software or hardware) out there that can do something I think I may have made up, Dynamic Static IPs. The idea is that when a new device connects to the local network this device/software acts as a DHCP server, if the device is new then it dynamically assigns it a new address that has never been used before and stores this MAC Address IP Address combination in a database, if the device's MAC is in the database the devices gets the same IP as before. I am aware this is similar to sticky IP allocation but I don't want the IPs to stick for a while I want them to be superglued on for ever. Bonus question: Is this possible using a Raspberry Pi running Raspbian on a network with around 100 devices? The RPi is already acting as the DHCP server and the router has this capability but it is turned off. Many thanks in advance for any and all help offered! |
I would like to type something similar to the following: i.e., a sum of k ones. Is there an easy way to do this in LaTeX? | I have $m\times n = n + n + \dots + n$ in my text right now, but I would like to put a curly brace under the \dots to emphasize that there are m,n's involved. How would I do this? |
I insert the following simple code in the functions.php to edit the message in the footer dashboard "Thank you for creating with WordPress." but nothing changes. I have Version 4.9.8 Do you think this code is not effected in version 4 ? // Admin footer modification function remove_footer_admin () { echo '<span id="footer-thankyou">Developed by <a href="https://www.example.com" target="_blank">www.example.com</a></span>'; } add_filter('admin_footer_text', 'remove_footer_admin'); | I've used following codes and no luck 1 //Hide admin footer from admin function change_footer_admin () { return ' '; } add_filter('admin_footer_text', 'change_footer_admin', 9999); function change_footer_version() { return ' '; } add_filter( 'update_footer', 'change_footer_version', 9999); 2 function wpbeginner_remove_version() { return ''; } add_filter('the_generator', 'wpbeginner_remove_version'); 3 function my_footer_shh() { remove_filter( 'update_footer', 'core_update_footer' ); } add_action( 'admin_menu', 'my_footer_shh' ); Still I see those texts and version on my footer. So what is the accurate way to remove these? I've added these code snippets into my child theme function.php |
I am trying to remove the write protection on my USB. I run diskpart command in command prompt then it had changed read-only yes to no. But another attribute current read-only state is still yes. DISKPART> detail disk SanDisk Cruzer Blade USB Device Disk ID: 6CA38DCA Type : USB Status : Online Path : 0 Target : 0 LUN ID : 0 Location Path : UNAVAILABLE Current Read-only State : Yes Read-only : No Boot Disk : No Pagefile Disk : No Hibernation File Disk : No Crashdump Disk : No Clustered Disk : No Volume ### Ltr Label Fs Type Size Status Info ---------- --- ----------- ----- ---------- ------- --------- -------- Volume 7 H FAT32 Removable 7632 MB Healthy | Three weeks ago I used 2.2 to install Windows 10 on my machine, and it has write-protected my flash drive. I’ve tried diskpart: diskpart att disk clear readonly clean create partition primary format fs=fat32 quick And it kinda worked, it removed the image off the USB, but now it’s showing: Current Read-only State : Yes Read-only : No Boot Disk : No Pagefile Disk : No Hibernation File Disk : No Crashdump Disk : No Clustered Disk : No And I can’t format it or write on it. The drive is a a Kingston DataTraveler G4 32GB model, without physical switches. How would I restore it back to normal (rw) state? |
Is there any way to get Windows 8 metro UI on Ubuntu? | I have seen tutorials about making linux look like windows 7, but is there a tutorial about making it look like windows 8. |
What should I do next? I've tried to show that $n\sum_{i=1}^n a_i >= \sum_{i=1}^n a_i + n$ but it gets me to sth like: $\sum_{i=1}^n a_i >= \frac{n}{(n-1)}$ $a_1, a_2... \in R$ | How can I show that $n\sum_{i=1}^n {x_i^2} \ge (\sum_{i=1}^n{x_i})^2$ for any natural number $n$ and $x_i \in\mathbb{R}?$ I assume there is something about Cauchy-Schwarz and induction, but I really don't see it. |
I am using a dual boot system with Ubuntu 18.04 and Windows 8.1. So is it possible and how can I merge unallocated 123GiB which I freed in Windows from my D: Drive (/dev/sda2, ntfs) and move them to /dev/sda6 (84.75GiB, ext4)? | Previously, I have installed Windows 7 on my 320 GB laptop with three partitions 173, 84 and 63 GB each. The 63 GB partition was where the Windows was installed. The rest were for file containers. Now I changed my OS to Ubuntu 12.04 LTS. I installed Ubuntu by replacing the entire Windows 7 on the 63 GB partition. The rest of the partitions remain as an NTFS Windows partition and I can still access them both (the 173 and 84 GB partitions). Now I want to change the two partitions of Windows into an Ubuntu format partitions plus most importantly, I want to extend the 63 GB partition to more than a 100 GB because at the moment I am running out of disk space. Whenever I try to install any application, especially using wine, it always complains for a shortage of disk space. How do I do the extending activity before I entirely format my laptop again and lose all the important files on my partitions? |
I am having difficulty defining a correct RewriteRule to forward requests to an application running in tomcat. I have apache with mod_rewrite enabled as well as tomcat setup with an application mounted with mod_jk. Without a virtual host, I can browse to the following url without issue. (context being the application running in tomcat) http://www.domain.com/context How do I configure the RewriteRule to pass requests from domain.com to the application running in tomcat. http://www.domain.com --> http://www.domain.com/context Here is what my current virtual host file looks like <VirtualHost *:80> ServerName www.domain.com <Directory /> Options FollowSymLinks AllowOverride None RewriteEngine On RewriteRule \/$ /context [L] </Directory> <Directory /var/www/html/context/> Options Indexes FollowSymLinks MultiViews AllowOverride None Order allow,deny allow from all </Directory> </VirtualHost> This will pass the request from domain.com to a directory named context in /var/www/html. How do I override the default apache setup to pass the request to the application running in tomcat? Thanks in advance for your help. | This is a about Apache's mod_rewrite. Changing a request URL or redirecting users to a different URL than the one they originally requested is done using mod_rewrite. This includes such things as: Changing HTTP to HTTPS (or the other way around) Changing a request to a page which no longer exist to a new replacement. Modifying a URL format (such as ?id=3433 to /id/3433 ) Presenting a different page based on the browser, based on the referrer, based on anything possible under the moon and sun. Anything you want to mess around with URL Everything You Ever Wanted to Know about Mod_Rewrite Rules but Were Afraid to Ask! How can I become an expert at writing mod_rewrite rules? What is the fundamental format and structure of mod_rewrite rules? What form/flavor of regular expressions do I need to have a solid grasp of? What are the most common mistakes/pitfalls when writing rewrite rules? What is a good method for testing and verifying mod_rewrite rules? Are there SEO or performance implications of mod_rewrite rules I should be aware of? Are there common situations where mod_rewrite might seem like the right tool for the job but isn't? What are some common examples? A place to test your rules The web site is a great place to play around with your rules and test them. It even shows the debug output so you can see what matched and what did not. |
Is it possible for me (parent/admin account) to completely disable Cortana for other users (kids/standard accounts)? ...or at least from using it to search things that are not local on the PC itself. I don't want my children gleaning all the Internet has to offer quite yet. EDIT: @Chirag64 and @mc10 - thank you so much for your answers, but neither answer really addresses my question of "completely disable Cortana for other users (kids/standard accounts)". I do not want to disable it for me, only for my kids...The "duplicate questions" and the one that was linked as having answers - also don't help me with this... | Windows 10 has Cortana, which I don't like. I disabled it as soon as I could. However, looking in Task Manager, the process for Cortana is still running, and can't be effectively terminated: ending the task simply results in the process respawning a few seconds later. Using the command taskkill /IM Cortana.exe /F has the same result: the process respawns. Is there any way to disable Cortana so that the process doesn't keep running in the background, and doesn't respawn if terminated? |
I have done a boxplot to represent my claim frequency. However make 2 and 4 have only 1 whisker. How do I interpret that? | I have a data set that has customerID and daily visits. This dataset records the number of times customers visited the site in a day. customerID TotalVisits 1 6 2 17 3 20 4 25 Just to explore the data further, I tried plotting the TotalVisits values in a box plot. The plot doesn't seem to have a lower whisker. q1=1 and there are no values between q1 and q1-1.5(IQR). The plot has q1, q2 and q3. The minimum value and q1 are the same. Is this why the boxplot doesn't have the lower whisker? Could you please help me with the interpretation? Is it correct to draw a boxplot without any whiskers? [I am new to the site and I am not able to post the image.] |
Does linking from one page(A) to another page(B) [Internal link] reduce the rank of the (A) page? Assume that page A in search engine ranks 2nd, If I link to page B internally Does it affect the rank of page A? | There are lot's of questions here about passing link juice to other pages, including . I've read several of them over the months, but I always come away wondering the same question. Does linking to another page, dilute or burn some of the link juice the linking page has already earned? For example, if my current page has for example, a link juice of 10, and I link to another page, it passes a certain amount of juice (I'll use 90% as an example) of the linking page's juice, giving the page being linked to a .9 boost in it's own link juice. However, does that mean the linking page's page's remaining juice is now less than 10? While some of the questions would imply this to be the case, it seems counter intuitive as no one would ever want to link to any page outside of their own content for fear of losing page rank. |
I need a web server for static web content, a corporate blog and the company e-commerce system. I have some ideas, but thought of seeking additional feedback from the world's best server pros! NOTE 1 - the company has around 300 customers, and revenues around $1 Million. Let's see, several hundred users a day, downloading and otherwise viewing our site. I'm hoping the new server will help us boost traffic so I want to give myself something to grow into. So far, I'm looking at something lie: 8-core Opteron 16-32 GB RAM 4 x 1 TB drives (some kind of RAID) Gigabit LAN Am I on the right track? NOTE 2 - This is what I went with: Rackform nServ A161 Opteron 6128 2.0GHz, 8-Core 16GB (4 x 4GB) Operating at 1333MHz Max (DDR3-1333 2 x Intel 82574L Gigabit Ethernet Controllers Integrated IPMI 2.0 with Dedicated LAN LSI 9260-4i 6Gb/s SAS/SATA RAID 4 X 1TB Seagate Constellation ES Optical Drive: Low-Profile DVD+/-RW Drive Power 350W Power Supply | This is a about Related: I have a question regarding capacity planning. Can the Server Fault community please help with the following: What kind of server do I need to handle some number of users? How many users can a server with some specifications handle? Will some server configuration be fast enough for my use case? I'm building a social networking site: what kind of hardware do I need? How much bandwidth do I need for some project? How much bandwidth will some number of users use in some application? |
when I want to fill 4 selected vertices to get a face to connect 2 different objects, the face gets weird shadows and I also can't sculpt the face. How can I remove these shadows and create a normal face ? : video : file:///C:/Users/WIN10/Videos/Movavi%20Screen%20Recorder/ScreenRecorderProject130.mp4 | While rendering a mesh with smooth shading on, I get a dark region/shadow on certain faces. The effect is more evident when smooth shading is applied to a mesh containing ngons, with the ngons turning black when rendered. The blackening effect is visible in the viewport too. How can I solve this problem? |
First and foremost, thank you for your time with my question. I am attempting to forward all traffic from http:// and https:// to "https://www.[domain].com/[etc]" I am currently able to force all "www." traffic to "https://www." using the setup in httpd.conf below: <VirtualHost *:80> RewriteEngine On RewriteCond %{HTTP:X-Forwarded-Proto} !https RewriteRule ^.*$ https://{%SERVER_NAME}%{REQUEST_URI} </VirtualHost> This setup is unfortunately inconsistent. If for instance I enter "https://[domain].com" into a browser address bar, it will not redirect. On some browsers, "http://[domain].com" will redirect to the non-www "https://[domain].com" as well. Long story short, I am having trouble setting up a proper redirect from any domain prefix to "https://www" on an Amazon EC2 Instance within the httpd.conf file. If you can help me out here, I'd really appreciate it. Thank you again for your time. Edit: There is another Q&A that goes over general rewrite rules, however there are some specific rules for the Amazon EC2 (ELB) that are not covered in that answer. Frankly, I'm not sure if the Amazon EC2 specifics apply to my question, but the code I have (x-forwarded-proto) is specific for the ELB. For what it's worth, I'm asking this question because all of my resources have been exhausted. If I found (or find) an answer somewhere else, I will happily update my question with information and a link. Edit2: The following code redirects from [domain].com, http://[domain.com], and http://www.[domain].com to https://www.[domain].com. Unfortunately https://[domain].com still does not redirect. <VirtualHost *:80> RewriteEngine On RewriteCond %{HTTP:X-Forwarded-Proto} !https RewriteRule ^.*$ https://{%SERVER_NAME}%{REQUEST_URI} RewriteCond %{HTTP_HOST} !^www\. RewriteCond %{HTTPS}s ^on(s)| RewriteRule ^ http%1://www.%{HTTP_HOST}%{REQUEST_URI} [R=301,L] </VirtualHost> Is there a different VirtualHost I need to have set up for the https:// domain redirect? | This is a about Apache's mod_rewrite. Changing a request URL or redirecting users to a different URL than the one they originally requested is done using mod_rewrite. This includes such things as: Changing HTTP to HTTPS (or the other way around) Changing a request to a page which no longer exist to a new replacement. Modifying a URL format (such as ?id=3433 to /id/3433 ) Presenting a different page based on the browser, based on the referrer, based on anything possible under the moon and sun. Anything you want to mess around with URL Everything You Ever Wanted to Know about Mod_Rewrite Rules but Were Afraid to Ask! How can I become an expert at writing mod_rewrite rules? What is the fundamental format and structure of mod_rewrite rules? What form/flavor of regular expressions do I need to have a solid grasp of? What are the most common mistakes/pitfalls when writing rewrite rules? What is a good method for testing and verifying mod_rewrite rules? Are there SEO or performance implications of mod_rewrite rules I should be aware of? Are there common situations where mod_rewrite might seem like the right tool for the job but isn't? What are some common examples? A place to test your rules The web site is a great place to play around with your rules and test them. It even shows the debug output so you can see what matched and what did not. |
We know that Hogwarts students learn how to do in the 6th year. From which point they are expected to use magic nonverbally from there on out. We also know that some wizards can do , such as Hermione with the Confundus Charm at the Quidditch trials. Both of these variants come with warnings that: Wandless magic [...] could be volatile and was often difficult to perform - and Performing spells non-verbally is very difficult and requires a good deal of practise - So my question is, is there any instance of a wizard/witch casting spells/charms/hexes/jinxs both nonverbally and without a wand? And if not, is this explicitly stated to be impossible? As a note, I mean intentional magic. The random loosing of snakes on 11th birthdays does not count. This is not a duplicate of these other questions since none of those answer if a spell can be performed BOTH nonverbally AND without a wand at the same time. For the second time, this is not a dup of because that question deals with wandless and nonverbal separately. | In the beginning of the series, it's mentioned that Muggle-born wizards/witches are identified due to inadvertent spell-casting. However, it seems like later in the book, disarmed wizards/witches are completely helpless. What is the explanation for why some spells can be cast without a wand and is there an in-universe explanation for why this isn't done? Also, are there spells that can be cast non-verbally (with/without a wand)? |
$$\binom{k}{i}\binom{n}{k}=\binom{n}{i}\binom{n-i}{k-i}$$ This identity could be easily shown using algebraic formula of combination. However, I would like to provide a combinatorial proof. I considered applying Pascal's equality, but got stuck. Any advice ? | How do I prove by a combinatorial argument that ${{n}\choose{k}} {{k}\choose{j}} = {{n}\choose{j}} {{n-j}\choose{k-j}}$ |
I have a tikzpicture with a 4 by 1 groupplot generated by matplotlib2tikz and want to make label in the middle of the picture below the graph, similar to what can be achieved with \centering after \end{tikzpicture}. How this can be done? Edit: adding a not-so-minimal working example per @Jan 's request (work in progress). What I've tried is in the secon-to-last line: \begin{tikzpicture} \begin{groupplot}[group style={group size=4 by 1, yticklabels at=edge left, horizontal sep=10pt}] \nextgroupplot[ylabel={\small ylabel}, xmin=0, xmax=60, ymin=0, ymax=60, width=\figurewidth, height=\figureheight, tick align=outside, x grid style={white!80.0!black}, y grid style={white!80.0!black}, axis line style={lightgray!20.0!black}, enlargelimits = false, standard, axis equal ] \addplot [line width=0.7000000000000001pt, black, mark=*, mark size=2, mark options={solid}, only marks] table {% 0.324 0.628 52.706 14.223 }; \addplot [line width=0.7000000000000001pt, black] table {% 0.324 3.05943257386342 52.706 7.39484684158939 }; \addplot [line width=0.7000000000000001pt, black, dashed] table {% 0 0 60 60 }; \nextgroupplot[ xmin=0, xmax=60, ymin=0, ymax=60, width=\figurewidth, height=\figureheight, tick align=outside, x grid style={white!80.0!black}, y grid style={white!80.0!black}, axis line style={lightgray!20.0!black}, enlargelimits = false, standard, axis equal ] \addplot [line width=0.7000000000000001pt, black, mark=*, mark size=2, mark options={solid}, only marks] table {% 0.324 3.241 52.706 5.946 }; \addplot [line width=0.7000000000000001pt, black] table {% 0.324 4.06077185448631 52.706 2.5181107790982 }; \addplot [line width=0.7000000000000001pt, black, dashed] table {% 0 0 60 60 }; \nextgroupplot[ xmin=0, xmax=60, ymin=0, ymax=60, width=\figurewidth, height=\figureheight, tick align=outside, x grid style={white!80.0!black}, y grid style={white!80.0!black}, axis line style={lightgray!20.0!black}, enlargelimits = false, standard, axis equal ] \addplot [line width=0.7000000000000001pt, black, mark=*, mark size=2, mark options={solid}, only marks] table {% 0.324 12.063 52.706 42.776 }; \addplot [line width=0.7000000000000001pt, black] table {% 0.324 11.7510527712628 52.706 41.251917297554 }; \addplot [line width=0.7000000000000001pt, black, dashed] table {% 0 0 60 60 }; \nextgroupplot[ xmin=0, xmax=60, ymin=0, ymax=60, width=\figurewidth, height=\figureheight, tick align=outside, x grid style={white!80.0!black}, y grid style={white!80.0!black}, axis line style={lightgray!20.0!black}, enlargelimits = false, standard, axis equal ] \addplot [line width=0.7000000000000001pt, black, mark=*, mark size=2, mark options={solid}, only marks] table {% 0.324 1.654 52.706 20.3 }; \addplot [line width=0.7000000000000001pt, black] table {% 0.324 1.34479027913101 52.706 20.3653860826401 }; \addplot [line width=0.7000000000000001pt, black, dashed] table {% 0 0 60 60 }; \end{groupplot} \node [anchor=center] at (2\figurewidth,0) {I want a common xlabel}; \end{tikzpicture} Produced this: Btw ylabel is also misplaced but that is for another question Edit2: Solution adapted from the linked by @percusse : \node (title) at ($(group c2r1.center)!0.5!(group c3r1.center)+(0,-0.5\figureheight)$) {THE Title}; | Using the groupplots library in pgfplots, how can a title be set for a group of plots? The following code (basically from the manual) is an example layout. I don't want each plot to have a title, but rather a title be placed centered on top of the group. \documentclass[crop,tikz]{standalone} \usepackage{pgfplots} \usepgfplotslibrary{groupplots} \begin{document} \begin{tikzpicture} \begin{groupplot}[ group style={ {group size=2 by 2}}, height=3cm,width=3cm, title={Title}] \nextgroupplot \addplot coordinates {(0,0) (1,1) (2,2)}; \nextgroupplot \addplot coordinates {(0,2) (1,1) (2,0)}; \nextgroupplot \addplot coordinates {(0,2) (1,1) (2,1)}; \nextgroupplot \addplot coordinates {(0,2) (1,1) (1,0)}; \end{groupplot} \end{tikzpicture} \end{document} |
Let $L , I , \phi$ are self inductance , current and magnetic flux (created by each loop) of a solenoid with $n$ turns . $r$ is the radius of those loops . We have , $LI=n \phi = nAB $ [$A=\pi r^2$] Now according to textbook , "As there are n loops , $\displaystyle B=\frac{n\mu_oI}{2r}$ . Substituting $B$ , $\displaystyle LI=nA\times\frac{n\mu_oI}{2r}\Rightarrow L=\frac{n^2\mu_o \pi r}{2}$ " We considered the fact of n loops when we multiplied $n$ with $\phi$ . Again we multiplied $n$ while calculating $B$ . In the equation $n\phi=nAB$ , $B$ represents magnetic flux density caused by each loop . On the other hand , in the equation $\displaystyle B=\frac{n\mu_oI}{2r}$ , $B$ represents magnetic flux density caused by all loops . We calculated $\displaystyle L=\frac{n^2\mu_o \pi r}{2}$ considering the winding number fact twice . So shouldn't be the equation wrong ? (The question other users are refering as "original" of this question (asked by myself a few weeks ago) isn't totally about self-inductance . This question is regarding to deduction of a equation for self-inductance .) | A current I flows through a solenoid (with n turns). Self inductance is $L$. If the magnetic flux is $\phi$, I am taught that $-n\phi=LI$ I dont understand the part with $n$, why do we have multiply by $n$? $\phi$ itself represents the whole magnetic flux there, if $\phi$ implied the flux only occurred by one coil, then it would be correct. Moreover, flux change by a coil ($n$ turns) in $dt$ time is $d\phi$, so the induced electromagnetic force is $$dE=n \cdot \frac{d\phi}{dt}$$ Why do we multiply by $n$ here? If $\phi$ means the whole flux, then why multiply? |
I would like to create a series of containers in the same size but with different contents, making such that the contained text reduces its font size if it would not fit the container otherwise. Is there any way to automatically reduce font size to avoid overflowing of the container? This question is a duplicate of . | I would like to fit text (potentially several paragraphs) into a box of given size. This should be done by adjusting the fontsize of the contained text. Clarification edit: The given dimensions are the maximum space the result should occupy. There is no need to fill the box fully, but under no circumstances should the dimensions be exceeded. Something like \fitbox{<width>}{<height}{Some text to be squeezed into a box \par With paragraphs} or \begin{fitbox}{<width>}{<height>} Some text to be squeezed into a box With paragraphs \end{fitbox} There are a number of questions here that ask the same in the title, but then only target to constrain the width or the height. I want to constrain both. Also, I would like the text only the be adjusted in the fontsize, not scaled disproportionally in one direction. @TH solves this for another question by fitting text on a page. Unfortunately, my TeX knowledge is too limited to adapt that to a box. See here: For a page-fitting, his solution looks great to me. Maybe that's a starting point. Edit: comparing the solutions from Werner and Martin I've used XeLaTeX from TeXLive 2011 to compare the solutions from Werner and Martin below. The font is a TrueType Times New Roman vector font. The fitboxes are contained in a framebox to help comparison. Case 1 is a box of 2cm x 2cm. Case 2 is the same text in a box of 8cm x 2cm. Both boxes can be stacked next to each other horizontally and only consume the space they should. However, in Case 1 the box with Martin's approach is too high, while Werner's box fits the content correctly. Edit 2: some more tests show: both suggestions can fail After some more tests, the case illustrated below fails for both suggestions from Werner and Martin. That means, the question is still open. As Werner points out in a comment to his answer, the reason is that TeX cannot hyphenate the pattern. At the same time, it finds it acceptable to set it into the box and run over the edge. After some research I believe that the algorithm after each line would have to check for \badness and if that exceeds 10000 reduce the font size further. At least the points in that direction. Has anyone the insights and experience to put these pieces and the excellent work from Werner and Martin together into something that works and really stays inside the given box? Edit 3: Another idea that might help to solve this Another approach that might help would be a way to measure the width of the longest word (or box) of the paragraph, let's say it is wl. The associated font size is f. The maximum desired box width as given by the user is wmax. Then, the upper bound for the font size could be calculated by fmax = f * wmax / wl This, of course, assumes that everything works out proportionally, which probably isn't entirely true considering inter word and inter character spacing. But it should be sufficiently good to keep the text in the fitbox horizontally. Since this can only shrink the fontsize (it's an upper bound), the vertical condition if met before would still be met afterwards. That means, this could be applied after the suggestion of @Werner as a check and adjustment if required. Does anyone have the TeX experience to stick that in? |
In domain configuration at CloudFlare, the DNS section stores the record definitions. What is the exact purpose of NS record here? If configured, it shows something like: Type | Name | Value | TTL -----+------------+---------------------------+---------- NS | domain.com | managed by ns1.domain.com | Automatic But the NS at authoritative DNS server (registrar) is configured accordingly to the CloudFlare assignments: adi.ns.cloudflare.com bob.ns.cloudflare.com And the latter are presented if the domain is queried for example by any DNS propagation checker (e.g. whatsmydns.net). The domain is being managed by their DNS anyway, so what's the purpose of defining the NS records in CloudFlare configuration panel? | $ORIGIN example.com. ; not necessary, using this to self-document $TTL 3600 @ IN SOA ns1.example.com. admin.example.com. ( 1970010100 7200 1800 1209600 300) @ IN NS ns1.example.com. @ IN NS ns2.example.com. @ IN A 198.51.100.1 ns1 IN A 198.51.100.2 ns2 IN A 198.51.100.3 sub1 IN NS ns1.example.edu. sub2 IN NS ns1.sub2 ns1.sub2 IN A 203.0.113.1 ; inline glue record The role of a NS record beneath the apex of a domain is well-understood; they exist to delegate authority for a subdomain to another nameserver. Examples of this above would include the NS records for sub1 and sub2. These allow the nameserver to hand out referrals for portions of the domain that it does not consider itself authoritative for. The purpose of the NS records at the apex of a domain, ns1 and ns2 in this case, seem to be less understood by the internet at large. My understanding (which may not be holistic) is as follows: They are not used by caching DNS servers in order to determine the authoritative servers for the domain. This is handled by , which is defined at the registrar level. The registrar never uses this information to generate the glue records. They used to delegate authority for the entire domain to other nameservers. Trying to do so with software such as ISC BIND will not result in the "expected" referral behavior at all, as the nameserver will continue to consider itself authoritative for the zone. They are not used by the nameserver to determine whether it should return authoritative responses (AA flag set) or not; that behavior is defined by whether the software is told to be a master or a slave for the zone. Most nameserver software will quite happily serve apex NS records that disagree with the information contained by the upstream glue records, which will in turn cause well-known DNS validation websites to generate warnings for the domain. With this being the case, what are we left with? Why are we defining this information if it doesn't appear to be consumed by caching DNS servers on the internet at large? |
Question: Show that if $ $ $ k |n \implies F_k |F_n$ $ $ Comments: I ran into this problem the other day and have not figured it out yet. I think it has something to do with the order of the period of the Fibonacci sequence modulo $m$, for some $ m \in \Bbb{N}$ | Question: Let $m,n\in\mathbb{N}$, prove that if $n|m$, $F_n|F_m$. I've tried to use induction, but I don't really know where to start since there's $2$ numbers: $n$ and $m\ \dots$ I did induction before with just $1$ number, like proving $1+2+\cdots+n=\frac{n(n+1)}{2}$, that's only dealing with one number $n$, but with this I have no clue how to do it. Can anyone give me a little hint on how to start, I don't want you to do whole problem for me but can I have some hint so I know where to start? Thanks for the help! |
Quantum physics says that energy is quantised, and since the energy of a photon is only dependent on the wavelength, the wavelength of a photon is quantised. This means that even though an infinite amount of numbers exist between 380 and 700, there is a finite amount of wavelength a photon can have between 380nm and 700nm. 1) How can I mathematical predict if it is possible for a photon to have a given frequency? 2) How many possible frequencies can a photon have within the ? 3) In general, in there an equation for how many possible frequencies a photon can have within any given range? Edit: I managed to find an answer on . "[T]he frequency available [for a photon of light] is continuous and has no upper or lower bound, so there is no finite lower limit or upper limit on the possible energy of a photon." I think that what it is meant when physicists say 'energy is quantized' is that particles of matter have quantized energy levels, but the energy levels of particles carrying energy between that matter (e.g. photons) are not quantized. | I'm just starting to learn physics and I have a question (that is probably stupid.) I learned that energy levels that the bound electron can have are discrete. I also learned that when an electron transitions from one level to another, a photon with a specific wavelength (energy) is created and released into the wild. My question is this: are there holes in the electromagnetic spectrum, values of frequency that the created photon can't possibly have? |
I am just wondering if I can legally use a nickname or not to use my official name (Passport name) as the author's name of a conference or a journal publication? My official name is quite long and I am planning to change it in the future. Is it possible to put the name that I am going to call myself in the future as the author's name? | Is it possible to publish under a nom de plume (pen name, pseudonym)? ... and still take credit for the work? I may have a chance to publish with the professor I am working with soon and if I am on the list of authors I would like to use a nom de plume, but I would also like to use the publication to apply to graduate schools next time. Is it possible to have my cake and eat it in the case? EDIT: Sorry for missing this out; The reason for wanting to publish under a nom de plume is that I would merely want my career to be tracked under a different name. Not to hide identity; I am perfectly fine with what EnergyNumbers was suggesting. |
Let $A \in M_5(\mathbb R)$ ; if what is rank $adj(A)$ when rank of $A$ is $3$ or $5$ respectively ? In general , if $A \in M(n,\mathbb R)$ , and rank of $A$ is $m(<n)$ , then what is the rank of the adjugate of $A$ ? I think that if rank $A=n$ , then det $A \ne 0$ , then det $(adjA)=(det A)^{n-1} \ne 0$ , then $adj A$ should also have rank $n$ ; but I can't figure out what if rank$A$ is less than $n$ . Please help. Thanks in advance | Let $A$ be a square and singular matrix of order $n$. Is $\operatorname{adj}(A)$ necessarily singular? What would be the rank of $\operatorname{adj}(A)$? |
Is there a direct command to plot the modified Bessel functions?, I could find the below code to plot the bessel functions, but i couldn't find a similar one to plot the modified ones. \documentclass[border=12pt]{standalone} \usepackage{pgfplots} \pgfplotsset{compat=newest} \directlua{ ffi=require("ffi") ffi.cdef[[ double jn(int n, double x); double yn(int n, double x); ]] } \pgfmathdeclarefunction{BesselJ}{2}{% \edef\pgfmathresult{% \directlua{tex.print(ffi.C.jn(\pgfmathfloatvalueof{#1},\pgfmathfloatvalueof{#2}))}% }% } \begin{document} \begin{tikzpicture} \begin{axis}[ x axis line style={-stealth}, y axis line style={-stealth}, axis lines*=center, cycle list={[samples of colormap={6 of viridis}]}, enlargelimits=false, domain=0:20, restrict y to domain=-2:1.5, ymin=-1, ymax=1.3, samples=100, no markers] \pgfplotsinvokeforeach{0,...,2}{ \addplot { BesselJ(#1,x) }; \addlegendentry{$J_{#1}(x)$}; } \end{axis} \end{tikzpicture} \end{document} | I need to plot the Bessel functions of first and second kind (J and Y), and the modified Bessel functions of first and second kind (I and K), with integer order, from order 0 to order 5, using pgfplots. Several solutions have been already presented in other questions, but: Gnuplot makes available for plots only the Bessel functions of the first and second kind and only of order 0 and 1, so is not suitable. I would not like to use nor pstricks, neither LuaTeX, so also and are not suitable. is quite similar, but has no answer and no examples in the comments. How to accomplish this with pgfplots? Also an external solution with numpy, scipy and Matplotlib as in would be ok (however, the code seems to work only for the J function). I tried using the code in the last linked , inserting as an \addplot the file example-04.txt. It works for the function J, but it prints unacceptable values (e+09) for function Y, which is very large and negative near 0. The code which generates example-04.txt is Python and here it would be almost certainly OT. |
What did I need to take to the embassy for my interview | The UK Visas and Immigration Directorate publishes that provides helpful tips that can result in successful visa applications. Section 2 of this guidance opens is entitled "other documents you may want to provide" (emphasis mine). Section 2: other documents you may want to provide – all visitors This section provides guidance on the types of documents that you may want to provide to help us consider your application against the Immigration Rules. Previous travel documents/passports, which show previous travel. Financial documents showing that you have sufficient funds available. These must clearly show that you have access to the funds, such as: bank statements building society book proof of earnings such as a letter from employer confirming employment details (start date of employment, salary, role, company contact details) where a third party (who is either in the UK or will be legally in the UK at the time of your visit) is providing financial support to you e.g. a business, a friend or a relative, documents to show that they have sufficient resources to support you in addition to themselves and any dependant family should be provided The first item is "bank statements" and this ties in with the , which says... evidence that you can support yourself during your trip, eg bank statements or payslips from the last 6 months (Note 'eg' is a Latin abbreviation meaning "for example"; this appears to be optional rather than a fixed requirement.) Question: How should someone interpret this such that the chances of success are maximized? How many statements should I submit? What are they looking for and what do my bank statements tell about me? |
I am working on a C# Razor site and I am POSTing from a boostrap modal which then returns a new view and model. To reload the entire page with the response, I am using the following line within this code block. $("html").html(response); function addDevice(e) { e.preventDefault(); var ID = $("#txtNewDeviceID").val(); var Name = $("#txtNewDeviceName").val(); $.post('@Url.Action("AddDevice", "Devices")', { 'DeviceID': ID, 'DeviceName': Name }, function (response) { $('#newDeviceModal').modal('hide'); $("html").html(response); AttachBindings(); }); } Here is the code behind AttachBindings(): function AttachBindings() { $(document).on('click', 'table tr', {}, tableClick); $(document).on('keyup', '#search', {}, search); $(document).on('click', '#btnAdd', {}, function (e) { addDevice(e); }); $(document).on('click', '#btnRemove', {}, function (e) { removeDevice(e); }); $(document).on('click', '#btnUpdate', {}, function (e) { updateDevice(e); }); } Unfortunately AttachBindings() is never hit and I can't seem to find a way to reattach these events. The only event that seems to work is keyup which is attached to #search. Any ideas on how to fix this? | I have a bit of code where I am looping through all the select boxes on a page and binding a .hover event to them to do a bit of twiddling with their width on mouse on/off. This happens on page ready and works just fine. The problem I have is that any select boxes I add via Ajax or DOM after the initial loop won't have the event bound. I have found this plugin (), but before I add another 5k to my pages with a plugin, I want to see if anyone knows a way to do this, either with jQuery directly or by another option. |
I do not want an update to kill all my add-ons, but also would like to enjoy the advantages of FireFoX qua**um. How can I install one of them next to the other one? Linux can be installed without overwriting Windows/default OS (some PCs ship FreeDos). But what about applications? Windows allows installing onto an alternative directory. | The main reason I want to use firefox ESR is to use a proprietary database tool for work that only allows oracle-java based web logins for linux (or a windows only thin client). I also want to use the full version of the outlook web application which only works in firefox. I don't want to run the NPAPI plugins for normal web browsing and email. I have the repo version of firefox installed and firefox ESR installed in /opt/firefox and linked to /usr/local/firefox-esr When I run firefox any attempt to run firefox-esr either brings up a window without the NPAPI plugins. If I try running with the --new-instance or --no-remote options I receive the following error: Firefox is already running, but is not responding. To open a new window, you must first close the existing Firefox process, or restart your system. Regardless which one I start first, I can only open that one, and get the above error if I attempt to sidestep. What makes this an especially annoying problem is that I often have to respond to emails that I need to access the database to deal with. So either I close and open many windows. |
The situation: as of now, I have 781 rep on (a beta site). This grants me access to the First Posts, Late Answers, Close Votes, and Reopen Votes queues on main, as well as . On main, I have a link to "review" in the top bar. On meta, however, . If I go directly to , though, I can access the queues just fine. This appears to be a bug of some sort - once I have access to at least one review queue on meta (which happens at 500 rep on beta sites), I should see the "review" link in the top bar. Note that there seems to be some amount of rep between 781 and 6331 that causes the "review" link to appear on meta - I have 6331 rep on , and . | I committed and joined in private beta. As per private beta privilege page casting close and reopen votes requires only 1 reputation. So anyone is able to access close votes and reopen votes review queues. But there is no link of the review page in the top bar or anywhere. So I thought I am not able to access any review queue. I opened the review page by typing the URL manually (to see review statistics for curiosity). But I found that I can access close & reopen votes review queues. Probably I won't be able to access any review queue if I have less than 350 and the site goes to public beta. But during private beta off topics, unclear, or closable questions are likely to come. So it is very important to close/reopen them during private beta. So can we please add the "review" link in the top bar if I am able to review some queues? |
It seems my reputation is not increasing even after I did some edits on some questions and answers recently. I don't see any increase in my reputation even after the edits that were proposed and approved. Here's my reputation tab: Here's my latest activity (suggestions I made): Is it likely to be solved recently? Or, is it just occurring with me? | In the last week+ I've edited a lot of posts (through seeing many issues) and earned reasonable rep for it (despite accepted edits in the suggested queue). But, for some reason, I no-longer earn rep for editing... I noticed this in the last 24 hours and I'd like to know why? I've had both the time and inclination to edit posts - Because I feel I'm contributing, earning rep and also because I believe it's valuable to others (if a post is clearer, even by a marginal amount, then people are more likely to readily understand, comment and answer!). My edits have included many corrections including, but not limited to: Correcting or enabling code display (through poor markdown) Improving formatting Grammar and associated issues Plural usage and punctuation Etc. And in various combinations. ... But never removing or correcting the manner in which the OP communicates. Sometimes, I find myself wanting to just apply the <code> tag to missed opportunities, but I can't (yet). Sure, there are probably instances of edits where I've done little to improve a post; but sometimes a 'little' counts, but I'm confused as to why I'm no-longer receiving rep for my efforts... Is there some sort of imposed/modded limit/flag for users editing too many posts or with too many rejected edits? |
I want to ask that, is there any intuitive way one can understand that why $\oint \mathbf B\cdot \mathrm d\mathbf l$ across a closed loop is $0$ when a wire not enclosed by the loop has current flowing through it. In other words why do external currents don't matter? | I have a question about why this is true $\oint B\cdot d\ell = \mu_0$ $I_{enclosed}$ My problem is that I am not really seeing visually or mathematically why the magnetic field generated by a current that doesn’t pass through the loop will not contribute to the integral. Any advice or intuition is aprecciated thanks. |
All i want to know is it injection or only sql error SELECT * FROM users_address WHERE user_id = You have an error in your SQL syntax; check the manual that corresponds to your MariaDB server version for the right syntax to use near 'order by 1 LIMIT 0, 25' at line 3 | If user input is inserted without modification into an SQL query, then the application becomes vulnerable to , like in the following example: $unsafe_variable = $_POST['user_input']; mysql_query("INSERT INTO `table` (`column`) VALUES ('$unsafe_variable')"); That's because the user can input something like value'); DROP TABLE table;--, and the query becomes: INSERT INTO `table` (`column`) VALUES('value'); DROP TABLE table;--') What can be done to prevent this from happening? |
I saw the Let $\mathbf{A}$ be a $n\times n$-matrix, and $p(\lambda)=\det(\lambda \mathbf{I}_n-\mathbf{A})$ the characteristic polynomial of $\mathbf{A}$. Then $p(\mathbf{A})=\mathbf{0}$ and I thought it was trivial since $\det(\mathbf{A}-\mathbf{A})=0$. I checked with and learned that this didn't work because $\lambda$ is a scalar, and $\det(\mathbf{0})$ is also a scalar, and not a matrix. This brings me to my question: Are there any other results that seem trivial, but aren't? | In , I asked about proof of statements which are simple but incorrect. Here, I ask about statements which seems, at a first glance, straightforward, but if we try to write a proof, we can see it's much harder than it looked. So I expect the answers to contain: the statement; why it looks easy to prove; why actually it isn't. |
I want to be able to change and store all the settings blender has in a configuration file. Eventually I would like to be able to make self-contained blender plugins that also affect the configuration of blender. I'm sure there must also exist some settings that are not available in the GUI. For example, I would like to able to configure vim-like keychords for changing the focus of split views, creating them, etc. and in general being able to configure my keys very flexibly. | I constantly stay up to date with each new release of Blender, but this means my preferences are wiped clean each time. How do I export/import these preferences to avoid loosing my carefully crafted set up each time? |
Every time I use sudo apt-get upgrade, I get errors with the linux-image-extra and linux-image-generic. I am new to Ubuntu so I would like to know if these "image" files are the same as in Windows? What is the problem with my system if these image files can not be upgraded? Output from df -h Filesystem Size Used Avail Use% Mounted on /dev/mapper/ubuntu--vg-root 291G 16G 261G 6% / none 4,0K 0 4,0K 0% /sys/fs/cgroup udev 1,4G 4,0K 1,4G 1% /dev tmpfs 288M 1,2M 287M 1% /run none 5,0M 0 5,0M 0% /run/lock none 1,5G 216K 1,5G 1% /run/shm none 100M 64K 100M 1% /run/user /dev/sda1 236M 208M 16M 94% /boot /home/mama/.Private 291G 16G 261G 6% /home/mama Link to paste.ubuntu.com: . | My /boot partition is nearly full and I get a warning every time I reboot my system. I already deleted old kernel packages (linux-headers...), actually I did that to install a newer kernel version that came with the automatic updates. After installing that new version, the partition is nearly full again. So what else can I delete? Are there some other files associated to the old kernel images? Here is a list of files that are on my /boot partition: :~$ ls /boot/ abi-2.6.31-21-generic lost+found abi-2.6.32-25-generic memtest86+.bin abi-2.6.38-10-generic memtest86+_multiboot.bin abi-2.6.38-11-generic System.map-2.6.31-21-generic abi-2.6.38-12-generic System.map-2.6.32-25-generic abi-2.6.38-8-generic System.map-2.6.38-10-generic abi-3.0.0-12-generic System.map-2.6.38-11-generic abi-3.0.0-13-generic System.map-2.6.38-12-generic abi-3.0.0-14-generic System.map-2.6.38-8-generic boot System.map-3.0.0-12-generic config-2.6.31-21-generic System.map-3.0.0-13-generic config-2.6.32-25-generic System.map-3.0.0-14-generic config-2.6.38-10-generic vmcoreinfo-2.6.31-21-generic config-2.6.38-11-generic vmcoreinfo-2.6.32-25-generic config-2.6.38-12-generic vmcoreinfo-2.6.38-10-generic config-2.6.38-8-generic vmcoreinfo-2.6.38-11-generic config-3.0.0-12-generic vmcoreinfo-2.6.38-12-generic config-3.0.0-13-generic vmcoreinfo-2.6.38-8-generic config-3.0.0-14-generic vmcoreinfo-3.0.0-12-generic extlinux vmcoreinfo-3.0.0-13-generic grub vmcoreinfo-3.0.0-14-generic initrd.img-2.6.31-21-generic vmlinuz-2.6.31-21-generic initrd.img-2.6.32-25-generic vmlinuz-2.6.32-25-generic initrd.img-2.6.38-10-generic vmlinuz-2.6.38-10-generic initrd.img-2.6.38-11-generic vmlinuz-2.6.38-11-generic initrd.img-2.6.38-12-generic vmlinuz-2.6.38-12-generic initrd.img-2.6.38-8-generic vmlinuz-2.6.38-8-generic initrd.img-3.0.0-12-generic vmlinuz-3.0.0-12-generic initrd.img-3.0.0-13-generic vmlinuz-3.0.0-13-generic initrd.img-3.0.0-14-generic vmlinuz-3.0.0-14-generic Currently, I'm using the 3.0.0-14-generic kernel. |
It has been a while since and some new features were added. When that happened, a new tag [tag-watching] is created. This was created as a master tag of already present . However, there is some inconsistency after this process. There are many old questions tagged with like this one So, merge these tags. In the section, it shows that there are 420 questions with and only 16 with . When we click on former, we see all 420 questions. But the hover and tags give a wrong count. While we write a question, we are shown tag suggestions. When we write questions on this topic i.e,. favorite tags, we are suggested the synonym but not the master tag . Is this also caused due to the same reason To solve this, can we merge both these tags? This is a request asking merge of these two tags different from asking why is a tag synonym showing up on a question. By performing merge, inconsistency in showing number of questions in search and tags section will be solved. | The question seems to be tagged with , which, last I checked, is a synonym of . How is it possible that a question can be tagged with a synonym? Don't synonyms automatically get replaced on questions? |
After migrating 2007 to 2010, the 2007 site has been displayed in the sharepoint 2010. But when i am trying to upgrade, the visual upgrade is not available and site settings is also not available. Please help, Thanks | I have followed this link for migrating SharePoint 2007 to 2010: When navigating to my site after migration only the empty team site is visible. None of the data is available. Visual upgrade option is not there. Where am I going wrong? |
How Can I download a SharePoint folder included with documents? I understand how I can download a document from SP but I'm wondering if I can do the same with a folder. | I have multiple folders and sub folders in a SharePoint document library. How to download multiple folders and subfolders from this library at once? |
I am planning to attend a PhD program in the future. Should I be honest that I have some experience of attending a full-time Master degree in the past for three years? I had a somewhat rocky relationship with the thesis supervisor resulting in me being kicked out from the program. I am a bit worried that revealing this might be not too beneficial for me during the application process. Can I pretend that I did something else during the three years? In reality, I did some work in a part-time manner while attending my old program (self-employed). | I attended a 2y MSc mixed mode (Coursework+Thesis) program which is incomplete as of today. I have completed two semesters and still 2 more semesters to go. I have dropped 3rd semester and never attended the 4th one. Coz, I ran out of money. I didn't like the program as it contained too much coursework. A whole load of coursework unrelated to my area of research interest was hindering my effort towards getting into research. Suppose, I am interested in Machine Learning. But, I have to study Economics and so on. Now, I found that I, actually, can apply to Ph.D. programs without completing an MSc program (there are a lot of universities which accept Ph.D. students without MSc). I have good GRE score, so the chance of getting into a Ph.D. program is very high. But, I am worried that my previous incomplete MSc program will discredit my CV and statement of purpose as the dropped semester would be considered as failed courses. Would it be a crime to not to disclose the incomplete MSc program? What would be the possible consequence of concealing an incomplete degree? |
I often hear that having an SVN repository doesn't cancel need for backups. How is such backup done? I mean the repository will inflate over time, won't it? So do I back it up as a whole every time or what do I do? What's the easiest way to do such backups? | I'm new to SVN and I'd like to know what methods are available for backing up repositories in a Windows environment? |
I am a new linux user and I am struck while attempting to run Super Beam. Whenever I use the commands: chmod +x SuperBeam-5.0.3-linux.sh sudo ./SuperBeam-5.0.3-linux.sh to run the program, I get an error on terminal: Could not find or load main class com.liveqos.superbeam.desktop.SuperBeamApp | When I try to run a simple Hello World program I keep getting a message saying Could not find the main class. I found which suggested that my CLASSPATH variable is messed up, but I couldn't find a way to fix it. What am I doing wrong? |
I am trying to run an MQTT client that receives and publishes messages at the same time. What I am trying to do is to stop the while loop responsible for publishing when I receive a message. But running never becomes False for the while loop and the loop is never broken. What should I do? I just want to break the loop when a message is received. Here's my code: running = True def on_message(client, userdata, msg): print(msg) running = False print(running) # it becomes False here client.on_connect = on_connect client.on_message = on_message client.connect(HOST, 1883, 60) client.loop_start() # used to receive on_message events while the while loop is true while running: #publish and do something until running is False | How can I create or use a global variable in a function? If I create a global variable in one function, how can I use that global variable in another function? Do I need to store the global variable in a local variable of the function which needs its access? |
I have been given an AR model with seasonal variation. \begin{equation} (1-\theta_1B)(1-\theta_2B^8)(log(Y_t)-\mu)=\epsilon_t \end{equation} Setting $X_t=log(Y_t)-\mu$ one gets the following \begin{equation}X_t=\epsilon_t+\theta_1X_{t-1}+\theta_2X_{t-8}-\theta_1\theta_2X_{t-9}. \end{equation} We are given $\theta_1$, $\theta_2$ and the last 16 observations of $log(Y_t)$. $\epsilon_t$ is white noise and $\epsilon_t\sim N(0,\sigma_{\epsilon}^2)$. The one and two step predictions thus become (where the know observations are called $\textbf{X}_t$). \begin{align} E[X_{t+1}|\textbf{X}_t]&=E[\epsilon_{t+1}|\textbf{X}_t]+\theta_1E[X_{t}|\textbf{X}_t]+\theta_2E[X_{t-7}|\textbf{X}_t]-\theta_1\theta_2E[X_{t-8}|\textbf{X}_t]\\&=\theta_1X_{t}+\theta_2X_{t-7}-\theta_1\theta_2X_{t-8}=\hat{X_{t+1}}\\ E[X_{t+2}|\textbf{X}_t]&=E[\epsilon_{t+2}|\textbf{X}_t]+\theta_1E[X_{t+1}|\textbf{X}_t]+\theta_2E[X_{t-6}|\textbf{X}_t]-\theta_1\theta_2E[X_{t-7}|\textbf{X}_t]\\&=\theta_1E[X_{t+1}|\textbf{X}_t]+\theta_2X_{t-6}-\theta_1\theta_2X_{t-7}=\hat{X_{t+2}} \end{align} And the variance of the prediction errors become \begin{align} V[X_{t+1}-\hat{X_{t+1}}]&=V[\epsilon_{t+1}+\theta_1X_{t}+\theta_2X_{t-7}-(\theta_1\theta_2X_{t-8}-\theta_1X_{t}+\theta_2X_{t-7}-\theta_1\theta_2X_{t-8})]\\ &=\sigma_\epsilon^2\\ V[X_{t+2}-\hat{X_{t+2}}]&=V[\epsilon_{t+2}+\theta_1X_{t+1}+\theta_2X_{t-6}-\theta_1\theta_2X_{t-7}-(\theta_1E[X_{t+1}|\textbf{X}_t]+\theta_2X_{t-6}-\theta_1\theta_2X_{t-7})]\\ &=V[\epsilon_{t+1}+\theta_1(X_{t+1}-\hat{X_{t+1}})]=(1+\theta_1^2)\sigma_\epsilon^2 \end{align} My issue is now that I need the 95% prediction interval. What I thought (and my question is whether this is correct) I could was the following where $\hat{log(Y_{t+1})}=\hat{X_{t+1}}+\mu$, $\hat{log(Y_{t+2})}=\hat{X_{t+2}}+\mu$, $V[log(Y_{t+1})-\hat{log(Y_{t+1})}]=\sigma_\epsilon^2$ and $V[log(Y_{t+2})-\hat{log(Y_{t+2})}]=(1+\theta_1^2)\sigma_\epsilon^2$. As $log(Y_t)$ can be written as an MA process then $log(Y_t)$ follows a normal distribution and thus $Y_t$ follows a log-normal distribution. Thus using expressions from gives that the 95% ($\alpha=0.05$) prediction interval for $Y_{t+k}$ becomes \begin{align} &[lnN_{\frac{\alpha}{2}}(m_k,v_k),\ lnN_{\frac{1-\alpha}{2}}(\text{exp}(m_k,v_k)]\\ m_k&=\text{exp}(\hat{log(Y_{t+k})}+\frac{V[log(Y_{t+k})-\hat{log(Y_{t+k})}]^2}{2}\\ v_k&=(\text{exp}(V[log(Y_{t+k})-\hat{log(Y_{t+k})}])-1)\text{exp}(2\hat{log(Y_{t+k})}+V[log(Y_{t+k})-\hat{log(Y_{t+k})}]^2) \end{align} Where $lnN_{\frac{\alpha}{2}}(m_k,v_k)$ is the $\frac{\alpha}{2}$ quantile of a log-normal distribution with mean and variance respectively $m_k$ and $v_k$. | I am attempting to use simple linear regression to construct a 95% prediction interval for a continuous response variable (Y) using a continuous input variable (X). When examining my data, I realized that if I log-transform both X and Y, the assumptions of equal variance and normality are essentially met, but if I do not log transform both variables, they are not. I'm able to run all of the R code needed to get the prediction interval for the transformed data, and I've read online and elsewhere how to interpret this interval. However, is there a way to get a 95% prediction interval on the untransformed scale using the 95% prediction interval on the log-transformed scale? In other words, I'm interested in talking about the conditional mean response instead of the median response (which, according to what I've read, is how I must interpret my prediction interval). I could exponentiate the interval endpoints, but I'm fairly sure that's incorrect because E(e^{Y}) is usually not equal to e^{E(Y)}. |
I am trying to find a way to import an image, so that I can use it for 2D animation. Is there any way to use an image so it imports as an object like a plane? Thanks! | I'm using Blender 2.74 and have added a picture as a background in the view , it is visible in the view but it doesn't appear in the render ,why is that ? here is the picture Many thanks, Meri |
Lets assume my system has the root ( / ) partition located on "/dev/sda1" and the /home partition is located on "/dev/sda2", Why does "/home" have " / " at the beginning since " / " is on a different partition? | I have done some research about this on Google, but the results were cloudy. Why is the / sign used to denote the root directory. Are there any solid reasons behind it? |
Has anyone found a fix to this yet? I have upgraded to IOS 9.3. I have reset my iPhone. But it still won't open links. | Update 2: Update: . My Safari on iOS 9.2.1 (update: and now 9.3) won’t open most links anymore, i.e. tapping on a link on a page does not do anything. Worse, other apps like Messages, Chrome are having issues when they try to open URL/Links. The common issue is pauses when tapping links and even Mobile Safari tap and hold (to get the app open a link in a new tab), the device freezes and eventually crashes. Looking at the html source for the links causing issues, it seems all scheme absolute links are affected (e.g. http://example.com/something), while relative links work (e.g. /some/page.html). This makes me think third party registration of URL handlers (or what they are called) is related to the bug All apps that can open links, such as Mail or Spark, are affected. Tapping a link freezes the device. Tap & hold and then selecting copy link, switch to Safari or Chrome and paste URL sometimes helps/works. It happens mostly on Google and DuckDuckGo result pages. On some other pages it works. I tried things to rule out a simple setting error: disable all content blockers delete website data from Safari (in preferences app) kill all apps, restart iOS. Tried Chrome, and it doesn't work there on simple taps, but tap and hold works, and I can open them in a new tab at least. My conclusion is that this bug relates to iOS 9.2 and third party app updates triggering bad behavior, I saw constant crashes of the swdc process in my iPhone logs and I . Suspect apps include: Wikipedia Booking.com Is there a way to list these apps that change link handling so I can selectively uninstall them? |
My Western Digital External Hard Drive recently stopped working and started giving a clicking noise. Western Digital says that I need to send it to an authorized data recovery center for the warranty to not be void. However, I am in Sri Lanka and have no method of sending the drive. It gets recognized by Windows Disk Manger (partially). The first time, it asked me to create a partition table, with MBP or GUID as the options (or something to that extent). Once I select OK, it gives me an error telling that an I/O error occurred. I could not get a screenshot. When I try to recreate the error, it doesn't appear. Now it just shows that it is an Unknown and Uninitialized Drive. My question is this: Is there any way to recover the data by using something like a magnetic reader on top of the drive so that it doesn't need to be opened, which would void the warranty. I backed-up my data to the cloud storage provider, Box, using Box Sync and a symbolic link, but when the drive stopped working Box Sync automatically deleted the files half way before I could stop it. Is there any way to recover this data? According to an answer at , the problem might be related to "The actuator arm (or whatever controls it). I appreciate any help ASAP on solving this problem. | I have an HP server with a two-year-old 174 GB hard disk. Suddenly, the server cannot boot from hard disk. The drive makes noises (tic tic tic) and the server says the hard drive should be replaced. I opened the front cover of the server and noticed the red LED of the hard disk is illuminated. That hard disk holds very important data. Is there any way to recover the data from it? |
Before I read the formula of the area of revolution which is $\int 2\pi y \,ds$, where $ds = \sqrt{1 + \frac{dy}{dx}^2}$, I thought of deriving it myself. I tried to apply the same logic used for calculating the volume of revolution (e.g., $\int \pi y^2 dx $). My idea is to use many tiny hollow cylinders (inspired from the shell method), each has a surface area of $(2\pi y) (dx)$: $2\pi y$ is the circumference of the cylinder, and $dx$ is the height of the cylinder Their product is the surface area of the hollow (e.g., empty from the inside) cylinder. With this logic, the area is $\int 2\pi y dx$. Where is my mistake? Also it's confusing why for the volume it was enough to partition the object using cylinders and for areas not. | Geometrically speaking, it seems to me that if you have for example $y^2=8x$ revolved around the x-axis, taking the limit of the sum of $n$ surfaces of cylinders as $n$ approaches infinity should give you the surface area of that surface of revolution. This is how the author initially derives the formula for finding the volume of solids of revolution. Take a rectangle under the curve over $\Delta x$ and revolve it around the axis to get an approximation of the volume of the solid over that interval. Add up those rectangles over $n$ changes in $x$ and take the limit as $n$ approaches infinity, which is the integral of the function that gives you the $y$ value (radius of that approximating cylinder) for each $x$ value. Following the same principle, why wouldn't we be able to take those same cylinders, but instead of taking their volume, taking their surface area and take the limit as the number of those cylinders approaches zero? In other words, in this case each $y$ value is given by $y = \sqrt{8x}$, which is the radius of that cylinder of height $\Delta x$ and an approximation of the surface area over that interval. Why doesn't that work? Why do we need to deal with arc length? I don't understand why it doesn't work in this case, it seems to me that you're still getting a better and better approximation of surface area as those cylinders get smaller and smaller, eventually getting the exact surface area with the limit as their number goes to infinity. PS: I saw this but it's still not making sense visually/geometrically. |
I'm attempting to draw an ellipse based on two points. For each of these points I have a vector showing the direction the curve of the ellipse should be at this point (I suppose another way of looking at it is that I have 2 tangent lines to the to the ellipse with the intersection point for each). I know normally 2 points would not be enough to determine the ellipse, but I thought the vectors might make it possible. Ideally I'm trying to calculate the center point and the major and minor axis (I guess either the actual points or the vector from the center). I'm not quite sure how to proceed with this, or whether it's actually possible, but any help would be greatly appreciated, thanks. Edit: Added a simple example of what I'm talking about. For the record, the calculation will be in 3D space. Okay, so the I have the two tangent lines illustrated here, in the form of a point and a (normalized) vector, the point being the intersection point with the ellipse (it's part of the line and the ellipse). By vectors from the center point for the axes I just meant it as an alternative way of finding the minor and major axis points, stupid thing to put in). Edit 2: Let's assume they're not parallel. | Please answer to a question , how to find an ellipse which passes the 2 given points and has the given tangents at them. And one related question is that the given condition can decide just one ellipse which satisfies it? Thank you in advance. Edit : May be , I can say the first answer (by Mr. André Nicolas) is for the general case. Is there no special case where only a finite set of ellipses satisfies the condition? Edit : According to the answers and comments , I can compute an arbitrary chosen ellipse for my condition (using the method by Mr.Patrick Da Silva). But there are possibly many others which satisfy my conditions. Am I right? |
I'm starting my own campaign this weekend and had questions about how the surprise aspects work in D&D 5e. I know this question has been asked before, but I have yet to see an answer describing what takes place when there are multiple attackers and defenders. In the Lost Mines campaign, there is a goblin ambush section where EACH goblin must roll for stealth and compare it with the passive ability of the characters. As a DM, do I just arbitrarily decide which goblin attacks which character? And what if there are more goblins than characters rolling for stealth? What if multiple goblins attack one person? Or does each goblin have to have a higher stealth roll than ALL the party members passive perception? How is that all decided? | Here’s the basic rule for Surprise (Player’s Basic Rules, p. 69): If neither side tries to be stealthy, they automatically notice each other. Otherwise, the DM compares the Dexterity (Stealth) checks of anyone hiding with the passive Wisdom (Perception) score of each creature on the opposing side. Any character or monster that doesn’t notice a threat is surprised at the start of the counter. I’m not sure how to interpret that last sentence. For example, suppose that the players try to sneak up on on some monsters, so they roll Dexterity (Stealth) checks. The thief and the champion both roll 14, but the evoker only rolls 9. The DM compares this to the monsters’ passive Perception: a cyclops with 8, a dire wolf with 13, and a giant owl with 15. The cyclops doesn’t notice any threat, so it’s surprised. The owl notices all the threats, so it’s not surprised. But what about the dire wolf? It notices the evoker but not the rogue or the champion. Which is correct: The dire wolf noticed a threat (the evoker) so it’s not surprised. It didn’t notice a threat (the rogue and champion) so it’s surprised. If the former is true, could the rogue and champion take advantage of the group check rule to help the less-stealthy evoker hide from the dire wolf? Group Checks (Player’s Basic Rules, p. 59): To make a group ability check, everyone in the group makes the ability check. If at least half the group succeeds, the whole group succeeds. Otherwise, the group fails. Group checks don’t come up very often, and they’re most useful when all the characters succeed or fail as a group. covers a couple of related situations, where a rogue sneaks up separately from the rest of the players, or where all of the monsters use a single group Dexterity (Stealth) roll, but not this case where all of the players try to sneak with different rolls. |
I've not been able to find any solutions to this other than "monitor responses and match for patterns of fraud". Let's say I make a client-side HTML/JS skill game, moving a butterfly net left and right to catch falling stars. At the end of the game, the JS sends a request to the server, something like { "stars_collected":30, "user_id":38194723, "session_id":'dDhw83hDEknd83y727dhd' } This is sent to Nothing's stopping the client from just sending a fraudulent http request written by the end-user { "stars_collected":9999999999999, "user_id":38194723, "session_id":'dDhw83hDEknd83y727dhd' } Now, obviously, the server side can mitigate some things such as always have a maximum obtainable number of stars etc. My question is, can the data in the request be encoded/signed in some way so that the end-user can never actually see how the level_complete request is formulated? | I'm talking about an action game with no upper score limit and no way to verify the score on the server by replaying moves etc. What I really need is the strongest encryption possible in Flash/PHP, and a way to prevent people calling the PHP page other than through my Flash file. I have tried some simple methods in the past of making multiple calls for a single score and completing a checksum / fibonacci sequence etc, and also obfuscating the SWF with Amayeta SWF Encrypt, but they were all hacked eventually. Thanks to StackOverflow responses I have now found some more info from Adobe - and - which I think I can use for the encryption. Not sure this will get me around CheatEngine though. I need to know the best solutions for both AS2 and AS3, if they are different. The main problems seem to be things like TamperData and LiveHTTP headers, but I understand there are more advanced hacking tools as well - like CheatEngine (thanks Mark Webster) |
I have a Java program that runs a batch file on Windows with Runtime.getRuntime().exec() using the following command: cmd /C start "Title" "C:\Folder\file.bat" The Java program ends quickly since cmd /C carries out the command and then terminates (1) and start "Title" "C:\Folder\file.bat" starts the batch script (2). Thus the process (the batch file) will continue running independently. Now, suppose that I have an shell script (e.g. file.sh), which I want to launch from Java and has a similar behavior. How could it be the equivalent command (3) in Linux? Notes See See The title ("Title") is not required. | I am trying to add terminal as external tool to compile javascript with node.js. I am following this which is based on windows , and i am stuck at figuring out location of terminal application. Where is the terminal located in Ubuntu? |
My phone has recently been stolen. I have been trying to locate it. I had previously set up the Find My iPhone app and after the theft, I have changed all my iCloud and Gmail passwords. Can the person with my iPhone change it over to his iCloud account so that the Find My iPhone app won't work for me? | Apple showed this new feature in iOS 7 called Activation Lock, that if you enable "Find My iPhone" on a device that is lost or stolen, a person that finds/gets the iPhone will not be able to wipe it or reset it. I'm curious whether the lock is designed to prevent these avenues to defeat the lock: Can they completely drain the battery and leave the phone in that state for a couple of months and then try it? Or, can they use any third-party software that can access iPhone from outside the iTunes and wipe it that way? Or, can they simply "jailbreak" it and forget about this Activation Lock? By what methods can this lock be defeated or bypassed? |
As you can see in the picture below, the diagram is shifted to the left. The code I am using to display this image is give below: \begin{center} \includegraphics[width=\textwidth]{"Law 2".png} \end{center} The name of the image file is "Law 2". How should I go about fixing this problem? I've also read answers to a related question, but, since I am a beginner in Latex, it's difficult for me to understand their logic. So, an ideal answer would be one that strictly deals with my case. Update After trying \fbox{\includegraphics{"Law 2".png}} I got, the following: Update After trying \fbox{\includegraphics[width=\textwidth]{"Law 2".png}} I got the following picture: | I'm inserting an image with a simple: \includegraphics[height=5cm]{filename.png} This results in an image that maintains the aspect ratio, and so gives me something like 6cm width. I only really want the left side of the image though, and would like to crop it to 50% width. Is it possible to do this? If possible, I'd like to do this in a portable way (i.e. something that other authors of this document won't have to install packages for, and something that works with a reasonably old version of pdflatex - our computers at work are in sore need of an upgrade). |
Is the research / TA stipend for PhD students at U.S. universities taxed as income? | I'm currently in the process of applying for various scholarships to fund my PhD. Many scholarships mention explicitly the approximate amount per year of the scholarship. This is usually the amount excluding tuitions, so the amount mentioned is intended to be a stipend to cover living expenses. I've never seen it mentioned anywhere, nor could I find a definite answer of this online: will this stipend be taxed? E.g., should I subtract a certain percentage off the scholarship amount that's mentioned, to calculate my real monthly income? Does this depend on the country the scholarship is given in, or are there international agreements on this? I'm in the initial stages of setting up my PhD programme, therefore I'm in contact with professors in New Zealand, Australia, the United States and Canada, so ideally, answers to my question apply to any of these countries. If it's relevant: I'm a dual citizen (European/American Citizen). |
I need to make an id with a specific format where 2 first digit are year, and the rest are just incremental number with 000 as spacer between year and incremental number where the qty of 0 will decrease along with increasingly incremental number such as 190001,190002,.....,190180,...,191400. All i can think of using $id = ''; if(srtrlen($number) == 1){ $id = date('y',time()).'000'.$number; } elseif(strlen($number)==2){ $id = date('y',time()).'00'.$number; } . . . else{ $id = date('y',time()).$number; } | I need to cast single figures (1 to 9) to (01 to 09). I can think of a way but its big and ugly and cumbersome. I'm sure there must be some concise way. Any Suggestions |
The following code: \begin{align*} 2(3-x) \leq 2 &\Leftrightarrow 6-2x &\leq 2 \\ & \Leftrightarrow -2x &\leq 2-6 \end{align*} looks like this does not align \leq, how one can align in this example the \leq signs? Thnak you! | What is the difference between align and alignat environments? |
Consider Euler's Formula: $$e^{i\theta}=cos(\theta)+isin(\theta)$$ Using this, the value of $i$ is $e^{{i\pi}/2}$. Following this: $$i^i=e^{i^2\pi/2}$$ The accepted principal result of this is that $$i^i=e^{-\pi/2}$$ I appreciate that the result given is one of many solutions - but for my question here, I'm only focussing on this case. Instead of simply using $i^2=-1$, I will separate the exponent for $i^i=e^{i*i\pi/2}$. Going back to Euler's Formula, and inserting ${\theta=i\pi/2}$ we get: $$i^i=\cos (i\pi/2) + i\sin (i\pi/2)$$ Which gives $$cosh(\pi/2)+i*sinh(pi/2)$$ Or roughly $2.509+2.301i$ Again - I know there are many different solutions here, I'm just focussing on the principal case. Why is there a contradiction here? What exactly causes my method to not yield the same result? Originally my answer was marked as duplicate - however the thread I was linked to did not contain this method - and the reasons for its failure was said to be due to $ln(i)$ not being well defined over complex space (I used $ln(i)$ in my original question) . Considering that I can now show my method without the use of $ln(i)$, I am wondering if there is another reason why my method is incorrect. | According to WolframAlpha, but I don't know how I can prove it. |
How much AWG do I need for my circuit wires knowing that the current can vary 10 to 20A with 12V supply And what is the cheapest and safest way to join 2 wires together ? | I've been working on providing power for high current applications for my project. I'm working on a project with high current (or at least compared to what I'm used to...) What a lot of people point to online is tables that you can look up the resistance for AWG per foot, and then you can calculate the current drop of your wire. However, with that current drop, how much of a voltage drop will make my wire "too hot" and risk a fire? Am I looking at this the wrong way? How do I calculate the temperature of the wire and decide when it'll be too hot, and I should use a thicker wire? |
Not sure if Stack Overflow needs donations or if its rich. But since I get help from the community, I'd be happy to make a donation. How do I do this? | Besides contributing and answers, are there any other ways that I can contribute to Stack Overflow and its family of websites? I would be happy to give a donation contribute code SFOU has been helping me tremendously, so it's only fair if I can give back something. |
Back after a long time. Very stressed and need to go to sleep so.. I'll make it short ^^; I am working on short animations with transparent backgrounds, in order to superimpose the clips over videos taken in real life. They'll be, maybe, a few seconds long. Most of them will only take over a small section of the screen, OR take over different parts of the screen (as in, the size will change). An object flying towards the screen and out of sight would start off tiny, then move to take over 1/3 of the screen, then disappear. See? Problem is, as you'd know, Blender renders the empty space (often over 95% of the screen), wasting tons of time. My PC is not the best. Rendering one frame at 1080p takes over 2 and a half minutes. (The test project I'm doing is 60 frames, but It could always get longer so.. I'd like to get a solution right now) If the object was stationary, I could just use the Render Region and be done with it. But it moves, which means I need to animate (keyframe) my Render Region! I've looked this up and there seems to be ONE person who actually made this possible, Markus from Blenderartists.org. He wrote a script that makes Render Regions keyframable, perfect for my issue. However, it seems to be outdated. Entering the script into Blender's Python console leads to a long sting of errors: There seems to be an add-on on sale for $6~7 that does this, but that's a last resort. Are there any ways I can animate/keyframe a Render Region? | This is a bit of a trick question. We know that HOLDOUT will subtract objects from renders. My question is slightly more elaborate. I had a render that I spent a fair amount of money on (render farm), only to find out that a material was set to the wrong settings. So I'm re-rendering the animation with every other object BUT the one I need using the HOLDOUT feature. However, Blender is crawling all over the rendering even though 80% of the frame is 100% transparent. I'd love a way to have Blender only render the area where the object exists. I know about setting a render area method, but the problem arises where I need the object to be in the EXACT location that its predecessor was that had the material problem, so rendering the entire 4k frame is very helpful for a clean overlay. |
I'm trying to create a PyPI (Python) package repository on a Debian 8 server running Nginx 1.6.2. I want to make all the files in a particular directory tree available for downloading to my other servers via HTTP. My Python packages are all kept in the /var/www/packages directory: /var/www/packages /var/www/packages/Django-1.8.4-py2.py3-none-any.whl /var/www/packages/simple /var/www/packages/simple/index.html /var/www/packages/simple/django /var/www/packages/simple/django/Django-1.8.4-py2.py3-none-any.whl -> ../../Django-1.8.4-py2.py3-none-any.whl If I try to read my packages directory from another server using curl, I get the following error: $ curl -I http://example.com/packages/simple/django/Django-1.8.4-py2.py3-none-any.whl $ HTTP/1.1 502 Bad Gateway If I just try to display the Nginx default home page, I'm getting the same error: 502 Bad Gateway The /var/log/nginx/error.log file shows this error in either case: 2019/02/06 00:53:52 [alert] 3736#0: 768 worker_connections are not enough 2019/02/06 00:53:52 [error] 3736#0: *765 recv() failed (104: Connection reset by peer) while reading response header from upstream, client: 127.0.0.1, server: example.com, request: "GET / HTTP/1.0", upstream: "http://127.0.0.1:80/", host: "example.com:80" Here is my Nginx configuration file: upstream pypi { server 127.0.0.1 fail_timeout=0; } server { server_name example.com; root /var/www/packages; location / { proxy_set_header Host $host:$server_port; proxy_set_header X-Forwarded-Proto $scheme; proxy_set_header X-Real-IP $remote_addr; proxy_pass http://pypi; # <- Error here } } As I understand it, this error means that Nginx, which is acting as a proxy, is trying to relay information from another server but has received a bad response from that server. But in this situation, I'm merely trying to make a directory tree on the proxy server available via HTTP so, strictly speaking, there is no other server. To troubleshoot the problem, I commented out the root directive and the entire location block. When I did this, the 502 error went away and I could at least see the default Nginx home page. Then I began uncommenting each directive each directive in the location block, one at a time. By doing this, I found that I could continue to see the Nginx page if I uncommented the entire location block except for the proxy_pass directive. That proxy_pass line is what's causing the problem. What does proxy_pass have to be set to in a situation like this? And do I set root to /var/www/packages since that's the root directory for my packages? | We currently have a web app built to run on an angular framework on Nginx running on Ubuntu 1.10.3. The error log for an attempt to access the site is: 30364#30364: 1000 worker_connections are not enough 30364#30364: *5179370 recv() failed (104: Connection reset by peer) while reading response header from upstream server:mysite request: "GET / HTTP/1.1" upstream: myip:80 host:mysite 30364#30364: 1000 worker_connections are not enough 30364#30364: *5179454 no live upstreams while connecting to upstream My Nginx.conf: user www-data; worker_processes auto; pid /run/nginx.pid; events { worker_connections 1000; } http{ sendfile on; tcp_nopush on; tcp_nodelay on; keepalive_timeout 65; types_hash_max_size 2048; include /etc/nginx/mime.types; default_type application/octet-stream;ssl_protocols TLSv1 TLSv1.1 TLSv1.2; # Dropping SSLv3, ref: POODLE ssl_prefer_server_ciphers on; access_log /var/log/nginx/access.log; error_log /var/log/nginx/error.log; gzip on; gzip_disable "msie6"; include /etc/nginx/conf.d/*.conf; include /etc/nginx/sites-enabled/*; } My default.conf: server { listen 80 default_server; listen [::]:80 default_server; listen 443 ssl; ssl_certificate /etc/letsencrypt/live/mysite/fullchain.pem; ssl_certificate_key /etc/letsencrypt/live/mysite/privkey.pem; root /home/admin_user/myroot; large_client_header_buffers 4 32k; index index.html index.htm index.nginx-debian.html; server_name myserver; add_header Strict-Transport-Security max-age=500; location / { proxy_pass http://mysite; proxy_http_version 1.1; proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection 'upgrade'; proxy_set_header Host $host; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for ; proxy_set_header X-Forwarded-Proto https; } } The file structure of my root directory is along these lines. Dashes denote levels. -root --app ---controllers models services styles views --bower_components --config --data --data.xlsx --file.jpg --index.html --node_modules --package.json --Procfile --public ---app.js img --server.js This by all means is not a full view of the file structure, but I thought it may be helpful. |
import java.util.*; class TestCollection13{ public static void main(String args[]){ HashMap<Integer,String> hm=new HashMap<Integer,String>(); hm.put(100,"Amit"); hm.put(101,"Vijay"); hm.put(102,"Rahul"); for(Map.Entry m:hm.entrySet()){ System.out.println(m.getKey()+" "+m.getValue()); } } } in this above HaspMap program i can not understand the logic behind this for loop . why Map.Entry is needed and what is the function of entrySet() ?? help me regarding this please . thanks in advance | If I have an object implementing the Map interface in Java and I wish to iterate over every pair contained within it, what is the most efficient way of going through the map? Will the ordering of elements depend on the specific map implementation that I have for the interface? |
\exi. environment sends `undefined sequence' error. How can I fix it? Here is the code of the main tex file. \documentclass [PhD] {uclathes} \usepackage[normalem]{ulem} \usepackage{linguex} \begin {document} \chapter{Introduction} \exi. [BeP interesting [Be ] [PredP this book \sout{interesting}]] \end {document} | The latex file has problems installing/using the linguex package in a ucla thesis latex template (uclathes) (downloaded from GitHub). I inserted it in a preamble of the mother tex file, but it keeps sending `undefined sequence' errors every time I use it to gloss linguistic examples in the \exig. environment and I don't know how to fix it so that the error stops occurring. What is confusing is that all the examples in \exig. are perfectly printed out when compiled in the pdf despite the fact that they appear labeled as errors in tex document. Here is the (near minimal) code of the main tex file. \documentclass [PhD] {uclathes} \usepackage{linguex} \begin {document} \chapter{Introduction} \exig. Vazan je zadatak.\\ important be{\sc.prs.3sg} task\\ `A task is important.' \end {document} |
I was editing my .bash_profile and .bash_login, and I accidentally added a circular reference so that two files were including each other. After closing the session and trying to sign in again, the circular reference hangs the process. Fortunately, this was on WSL so I can edit the file using Windows, and I also had a separate session still open so I didn't even need to. However, hypothetically if this was not the case, how would one sign in to Linux without loading the profile files, or how could one sign in and remove the circular reference? | I mistakenly have source .bash_profile in the bashrc file and vice versa. Now when I tried to ssh into the machine (ec2), it will stuck at loading bash and get connection closed in a second. Is there a way I could fix it? Could I mount the disk to another ec2 instance to fix the bash files? Update 1: I tried the following: % ssh -i "my-pem.pem" -t ubuntu@<server_address>.amazonaws.com "/bin/bash --noprofile --norc" Connection to <server_address>.amazonaws.com closed. Nothing else showed up. Do you have any idea on what was going wrong? For sanity check, if I do ssh -i "my-pem.pem"ubuntu@<server_address>.amazonaws.com, the message will be ... 28 packages can be updated. 0 of these updates are security updates. To see these additional updates run: apt list --upgradable New release '20.04.2 LTS' available. Run 'do-release-upgrade' to upgrade to it. Last login: Mon Feb 22 23:17:41 2021 from ip Connection to <server_address>.amazonaws.com closed. Solution Just ssh onto the machine and immediately do Ctrlc and fix the bash files. |
So, I installed 16.04 a few days ago and had to reinstall some apps. One of them was avidemux. After I installed it from the software center I couldn't get it to work properly. It wouldn't even load a video clip before giving me an error message and closing. After trying many command prompts to purge the avidemux files, I still can't get it to reinstall from the software center... Any tips? I posted the question a few days ago and didn't get a response. | I installed 16.04 a few days ago and had to reinstall some apps. One of them was avidemux. After I installed it from the Software Center, I couldn't get it to work properly. It wouldn't even load a video clip before giving me an error message and closing. After trying many commands to purge the avidemux files, I still can't get it to reinstall from the Software Center... Any tips? |
So using the definition of periodic function which is there exist $p \neq 0$ such that $f(x+p) = f(x)$ for all $x\in \mathbb{R}$. I know that I only need to prove on the interval $[a,b]$ which other part of the function just repeats what it looks like on the interval $[a,b]$. Where do I go from here? | A function $f:\mathbb{R}\to \mathbb{R}$ is periodic if there exits $p>0$ such that $f(x+P)=f(x)$ for all $x\in \mathbb{R}$. Show that every continuous periodic function is bounded and uniformly continuous. For boundedness, I first tried to show that since the a periodic function is continuous, it is continuous for the closed interval $[x_0,x_0+P]$. I know that there is a theorem saying that if it is continuous on a closed interval, then it is bounded. However, I'm not allowed to state that theorem directly. Should I just aim for a contradiction by supposing f is not bounded on the interval stated above? |
I am trying to use sed in a bash file to add the following after it finds AddDefaultCharset UTF-8 <IfModule mime_magic_module> MIMEMagicFile conf/magic </IfModule> To simplify things I am focusing just on adding the first line until I get it right, I have this so far..... sed '/AddDefaultCharset UTF-8/a <IfModule mime_magic_module>' /home/testfile.ini But when I try running this it just echos out the entire file, where am I going wrong? | Is this possible? I read somewhere that the following command would do it: sed -e [command] [file] but it appeared to do the same thing as just sed [command] [file] (it did not save the changes). Is there any way to do this using sed? |
I am trying to clarify my understanding of terminal here. Terminal is actually a device (keyboard+monitor). When in CLI mode, the input from your keyboard goes directly to shell and also displayed on monitor. Meanwhile, when using GUI mode, you have to open terminal emulator program to interact with shell. The input from your keyboard goes to terminal emulator program and also displayed on terminal emulator window on monitor. The input does not directly goes to shell. The terminal emulator program will relay the input from your keyboard to shell. The terminal emulator program communicates with the shell using pseudo-terminal. There is no terminal emulator program involved when you go straight to CLI from boot. Please comment and correct me if anything wrong with my understanding. Update: I read back . I think what I should ask is the difference between text terminal (boot straight to text mode) and GUI terminal because I thought terminal=text terminal, terminal emulator=GUI terminal e.g. Gnome Terminal, which are wrong. From the answers in regards to before this update, a user is actually using terminal emulator program (user space) too like in GUI mode. May I know is it TTY program because I found TTY process when running command 'ps aux'. I never knew there is terminal emulator program involved too (not referring to terminal emulator in kernel space) in text mode. Update2: I read . According to it, text mode is console, meanwhile terminal software in GUI mode is terminal emulator. Well, it makes sense and it is same with my understanding before. However, according , terminal emulator is in the kernel space instead of user space. Interestingly, the diagram refers to text mode. | I think these terms almost refer to the same thing, when used loosely: terminal shell tty console What exactly does each of these terms refer to? |
I am using Ubuntu 18.04 and I wanted to access a directory which only root could read or write to. I read somewhere I could launch nautilus as root with this command: sudo -H nautilus which opened a file explorer which still didn't have root permissions. This is the error that came up in the console: $ sudo -H nautilus Gtk-Message: 11:26:52.751: GtkDialog mapped without a transient parent. This is discouraged. (nautilus:3453): Gtk-CRITICAL **: 11:26:52.752: gtk_widget_show: assertion 'GTK_IS_WIDGET (widget)' failed ** (nautilus:3453): CRITICAL **: 11:26:52.752: setup_side_pane_width: assertion 'priv->sidebar != NULL' failed ** (nautilus:3453): WARNING **: 11:26:52.925: Unable to get contents of the bookmarks file: Error opening file /root/.gtk-bookmarks: No such file or directory ** (nautilus:3453): WARNING **: 11:26:52.925: Unable to get contents of the bookmarks file: Error opening file /root/.gtk-bookmarks: No such file or directory I then found out I could reach the directory just by directing a normal file explorer to admin://<absolute path of directory>. That did it, but now every time I log into my account there's a popup showing up after a couple of minutes saying System problem detected. I am guessing it has something to do with that sudo -H nautilus I ran. I didn't reboot in between the two solutions so I can't really say. PS: That directory I wanted to access was one created by an unfinished photorec I did to recover a file. For some reason I wasn't able to delete that directory, named recup_dir.1, because I didn't have permission. | I'd like to know if there a way to be granted root rights while using Nautilus 2.30 ? For example I'd like to move some old folders of long unused users from the home directory - remains of previous distros (Debian). Of course I can open a terminal, but I want to know if it is possible to do that with a mouse in Nautilus. |
If T is a linear transformation on $R^n$ with $||T - I||<1$, prove that $T$ is invertible and that the series $\sum_{k=0}^\infty(I-T)^k$ converges absolutely to $T^{-1}.$ (Use the geometric series) | Prove that if $\|A\| < 1$, then $I-A$ is invertible. Here, $\|\cdot\|$ is a matrix norm induced by a vector norm. This lemma is referred to as Neumann Lemma. Any ideas on how to go ahead with this? Thanks. |
I have a code like this, but I don't know why result variable have false value after execution the code int x = 234; boolean result = (x<0250); and also why the following code doesn't work properly? System.out.println(0250); it prints 168 !! why?! | This prints 83 System.out.println(0123) However this prints 123 System.out.println(123) Why does it work that way? |
I got an invitation to review a scientific paper from a journal. I accepted the offer to review but was wondering what benefits I might get if I review a paper? Can I write it in my CV as I will be applying for a Ph.D. position soon? Someone told me if I write it in my CV that I reviewed an article, no professor is gonna hire me thinking she already knows so many things and it will be hard to control her during the whole Ph.D.! Still, I accepted the offer out of excitement. Also, if my review is not up to the mark, is it like the editors will never give me anything to review again? | I do not understand what good it does them. A professor said it gives opportunity to read papers he would not read on his own. I am sure there is more to it but I do not see what they gain by participating in peer review process. It takes time, it is not paid and not even publicly acknowledged. Why do they do it? |
So i'm a little shaky on limits and I want to show I could take the limit of$ \frac{x^{2.5}}{100^{x}} $ but it would get very messy with L'Hopitals rule is their an easier way to show that this goes to 0 without having to do a bunch of algebra? | In other words, how to prove: For all real constants $a$ and $b$ such that $a > 1$, $$\lim_{n\to\infty}\frac{n^b}{a^n} = 0$$ I know the definition of limit but I feel that it's not enough to prove this theorem. |
I get the following error every time I run Sudo commands : sudo: /etc/sudoers is world writable sudo: no valid sudoers sources found, quitting sudo: unable to initialize policy plugin I used to be able to run such commands but now, anything I do on terminal ends up with the same result. I'm running on MacOS Catalina. Hope someone will be able to help me out | When I use the sudo command I get an error message. sudo: /etc/sudoers is world writable sudo: no valid sudoers sources found, quitting sudo: unable to initialize policy plugin If I try to use chmod on sudoers I get the message "Operation not permitted". Can someone help me fix things so sudo works again? |
So my follower, Stenvar, in Skyrim got lost and I can't find him anywhere. I have tried to use a console command to get to him. What I did was pressing ` key to open up the console and all that I achieved was some stuff like Compiled script not saved! or item 000b998c not found for parameter ObjectReferenceID. Here is what I'm typing: prid 000b988c moveto player | I had parked my follower at an inn with a bunch of valuable items that I didn't want to carry. I guess I have been out a bit too long as this message appears: Your follower tires of waiting and leaves. There have been other situations where my follower has mysteriously disappeared as well. How can I find my follower when they get up and leave or disappear into thin air? |
Being an Australian I am accustomed to -t past tenses like learnt and spelt, so naturally I would write and say "earnt". However, when I wrote "earnt" in an email, Outlook underlined it as a misspelt word. I did some further research and discovered that in all English dialects "earned" is used instead of "earnt". Why is this the case, and for how long has it been? As mentioned in a similar question on this site, Wiktionary is the only online dictionary with an entry for "earnt". NOTE: I checked for this same question on this site, but it only had what I already knew (the validity of the word). I would like to know why "earnt" is not a word. | Is the past tense for the word "earn" "earned" or "earnt", and does the word "earnt" even exist? |
I seem to remember being taught to use a comma after introductory phrases, such as in Tomorrow, I will go to the store. However, a friend of mine says a comma is not needed here. Is the comma correct, incorrect, or optional? Would it make a difference if the introductory phrase were longer? After breakfast tomorrow, I will go to the store. Thanks! | I am no native speaker and always confused about the comma in introductory phrases, in particular in prepositional phrases. Is there any hard rule when a comma must be set? If I make a google search for certain phrases, I often find both variants. Typical examples where I am not sure whether a comma must be set are: First[ly][,] I must phone mother In this case[,] we must... For simple problems[,] the algorithm... From Lemma 1.2[,] we obtain... For a typical user[,] the algorithm... In our theory[,] we... A dark line on the horizon[,] the mountain range we were headed for seemed somehow not as threatening as when we had started out on the trip. Avidly reading her novel[,] Jane did not notice that her stop was approaching. To be sure[,] it is not easy to see a solution. When you get to Rome[,] give me a ring. |
I was trying to find out how to disable locking iphone while my app is running but I wasn´t succesful. Do you know if it is even possible? My app is reading values from some hardware in real time and it is really annoying when display is locking all the time. I am not talking about running app in the background... Thank you guys! | how to set iPhone device to stay active ( to not lock ) while my app is running ? Any idea |
Is it correct to say "MIGHT I have a look around? OR "MAY" I have a look around? Which is correct and why ? Thanks | On an average Sunday, you might find yourself In the sentence above, the possibility of the person reading finding themselves doing what it says is pretty high. It's almost certain. Should I use may instead? Might still sounds better when the sentence is read. I often find sentences where may might be more appropriate but might sounds better. Even in this previous sentence I used might even though what I'm describing is much more likely than not. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.