body1
stringlengths
20
4.1k
body2
stringlengths
23
4.09k
If $A$ is a Markov matrix, all the columns of $A^k$ approaches the steady state vector $x_\textrm{ss}$. How can you prove this? So far I was trying to understand with the decomposition. $A^k = S \Lambda^k S^{-1} = c[x_1, 0 , ..., 0]S^{-1} = c[x_1, x_1, ..., x_1] $ where $x_1$ is the first column of $S$ or an eigenvector of $A^k$ associated with $\lambda = 1$, which is the steady state vector, $x_\textrm{ss}$. Here $c$ is just a constant so that the components of $cx_1$ sum to 1. I can't figure out the last equality. Although the suggested question is very similar to my question, I think my question focuses more on why other columns of $A^k$ which does not have to do with "probability vector" mentioned in the other question. So I don't think this is an exact duplicate.
Can anyone explain me the reason why does any probability vector U0 converge to the same vector Uinfinity when a Markov matrix is acted on it? I don't know how to put this but let me try. If x1 and x2 are two Eigenvectors and the Eigenvalues are 1 and 0.75. In the equation U0 = C1 x1 + C2 x2 Why do I get the same value of C1 irrespective of any probability vector U0 to converge to the same steady state?. Hope this makes sense. Thanks!
I need to prove or disprove: I start with the Big O notation: $\sum \limits_{i=1}^n $ log(i) = Θ(n log n) $\sum$ log i ≤ $\sum$ log n = n log n (dont know if this is enough or not)
I'm interested in the exact barrier of $$\ln(n!)= \Theta(n\ln(n))$$ and if it even exists. This means, there is a $c_1, c_2$ , so that $$\ln(n!) \le \Theta(n\ln(n) c_1$$ $$\ln(n!) \ge \Theta(n\ln(n) c_2$$ or $$0 \le \lim\limits_{n \to \infty}\frac{\ln(n!)}{n\ln(n)} \ge \infty$$ I could use de l'Hospital for the limit fraction, since it's $\frac{\infty}{\infty}$ but the derivate of $\ln(n!)$ causes problems. Also I don't know how I could prove the two statements above or how to prove them wrong. Any help is appreciated.
Could somebody suggest a software more flexible than Beamer (Lyx) to do a good presentation ? An alternative for presentation ? Best,
I have to prepare my slides in latex. A quick search came up with different packages. Before start preparing, I need your experiences. I do not want to regret after learning one as I did, learning vim (now can not quit) instead of emacs. EDIT: After asking this question at that time, I start learning Beamer. Now I'm really happy with that, I created my own template and now it's easier just copying from my .tex files to beamer template. I recommend beamer for powerpoint users who are actively using latex .
If $$\frac{a}{(a,b)}\mid c \;\ \Rightarrow \;\ a\mid b\cdot c$$ $$\frac{a}{(a,b)}\mid c\Rightarrow c=\frac{a}{(a,b)}\cdot k\Rightarrow b\cdot c=\frac{a \cdot b}{(a,b)}\cdot k\Rightarrow b\cdot c=a(\frac{b}{(a,b)}\cdot k)\Rightarrow$$$$a\mid b\cdot c$$ This is correct?
I tried to start by showing that $ \frac{a}{\gcd(a,b)} $ is always an integer, let's call it $d$, because $a$ is always a multiple of $(a,b)$ based on the definition of a g.c.d. I then tried to show that if $a | b$ then $a|bc$ from the theorem that states that $a|b$ implies that $a|bc$ for any integer $c$, but I cant seem to prove that $a | b$ or that $a|bc$ only if $d \mid c$ (where $d = \frac{a}{\gcd(a,b)}$ ). Any help would be much appreciated.
Whenever I try to login to bash using the Windows Subsystem for Linux, I try to cd into C:\Users\, but all I get is directory not found. Where is the C drive for the Windows Linux subsystem? Is it isolated?
On the Bash on Ubuntu on Windows app, I only have root@localhost:~# ls -a .bash_history .bashrc .profile How do I access all of the Windows folders like Documents, Downloads, etc.?
I was wondering if there is a way to place all labels on a map non overlapping, but by extending an arrow/line from the label to the point. I've tried the call out box, but I couldn't find a way to enable all labels, and second extend the lines
I've added symbols to one of my point shapefiles, but for several datapoints this has resulted in symbols stacked on top of each other because there are multiple sample types for one sample location (i.e. water, sediment, and benthic samples collected at one station). The result is a cluttered mess! Can I bring a few of my symbols away from the location and have leaders point to the sampling station? I'm working with ArcView so I can't use the "Disperse Markers" tool. If I download QGIS and deal with my markers in that environment, will my changes "stick" if I bring the layer back into ArcView? (I haven't used QGIS before; is this even possible?) The Maplex extension suggestion doesn't seem to apply to my situation as I am attempting to remove overlap from symbols, not text. I am tring to determine if I can bring some of my symbols (I have 20 different symbols in the layer in question) out on leaders to aviod clutter. Is this even possible? I don't mind putting in a extra time to "fiddle" with my symbols.
I have all the updates needed for windows 8.1 and I still cannot find the update to the 8.1 in the app store. Why can't I get the update?
I have Windows 8 Pro activated with kms. when I open windows store, it doesn't show "win8.1 available". clicking on ms-windows-store:WindowsUpgrade just brings me to windows store main screen slmgr /dli shows volume_kmsclient channel I can upgrade it to WMC. Laptop is W8Pro WMC and update is available, it's retail channel Is W8 for KMS clients delayed or what?
My textbook reads “ Two equipotential surfaces can never intersect because if they did, at the point of intersection, the field would have to have two directions (perpendicular to each surface) which is clearly absurd..” I understand the fact that if there were to be a non-zero field at each point of the surface then since the surface is equipotential the Field must be perpendicular to the surface at each point. But, is it also not possible that the field be zero throughout the two surfaces somehow? In that case, considering the fact that the surfaces must have the same potential . According to me, the argument given in my textbook does not refute such a case. Is it possible? Thanks in advance!
My professor said that the electric field is zero wherever two equipotential surfaces intersect. I can't come up with a reason why. He also claimed two equipotential surfaces cannot intersect as that would give two different potentials at the same point. Why can't there just be two different equipotential surfaces with the same potential that intersect or touch?
I'm somewhat familiar with the typedef enum syntax of C and C++. I'm now programming in Objective-C and came across the syntax in the following example. I'm not sure if the syntax is Objective-C specific or not. But, my question is in the following code snippet, what does syntax like 1 << 0 mean? typedef enum { CMAttitudeReferenceFrameXArbitraryZVertical = 1 << 0, CMAttitudeReferenceFrameXArbitraryCorrectedZVertical = 1 << 1, CMAttitudeReferenceFrameXMagneticNorthZVertical = 1 << 2, CMAttitudeReferenceFrameXTrueNorthZVertical = 1 << 3 } CMAttitudeReferenceFrame;
I've been attempting to learn C in my spare time, and other languages (C#, Java, etc.) have the same concept (and often the same operators) ... What I'm wondering is, at a core level, what does bit-shifting (<<, >>, >>>) do, what problems can it help solve, and what gotchas lurk around the bend? In other words, an absolute beginner's guide to bit shifting in all its goodness.
Is it possible to suspend a stepwise presentation to show a full slide containing say code listings (or a graphic). I don't want the full slide to cover the slide title. \begin{frame}{Really important stuff} \begin{itemize} \pause \item Version control \pause \item Architecture %%% Want to show a full side of listings at this point %%% then return to the stepwise presentation \pause \item Documentation \pause \item Personal development \end{itemize} \end{frame}
I would like to have in beamer something like \begin{frame} The two main reasons are : \begin{itemize} \item First reason \pause \item Second reason \end{itemize} \end{frame} But I would like to insert an image to illustrate the first reason, that would be on another slide, without altering the display of my presentation. I would therefore like to have Slide n : slide a with first item shown Slide n+1 : slide b with an image to illustrate this first item Slide n+2 : slide a with the two items displayed How would it be possible ? And additionnaly would it be possible for the slide b not to be numbered ?
So, I'm working creating a lamp... yes, newbie here. After modeling for a bit, I noticed that my point of origin was no longer the center of my object: How to I reset an object origin point to the center of it's geometry?
How can I change the local origin of an object, without changing the object location in the world space. This is the object located at position (0,0,0) in the world space This is the same object located at position (0,1,0) in the world space, but with its local origin offset so that the object is in the same place Is there a way to do this in a single step?
How do I disable showing all information to the terminal? Is possible to only show errors not log,warnings etc.?
I have a bash script which I use to compile a file with pdflatex twice (to make sure it sorts out references properly, etc.). This is the 'latexbuild' script I use: module load ctan pdflatex --shell-escape --interaction=nonstopmode $1 bibtex $1 pdflatex --shell-escape --interaction=nonstopmode --interaction=batchmode $1 I would then call this script with latexbuild test.tex. It produces a lot of output which I would like to supress, except for the error messages which I'd like to see. Is there any way to only allow error messages to be displayed?
Does apt-get automatically resolve dependencies if you apt-get install a literal list of packages? I understand the default behavior of a command like apt-get install foo is to install the latest version of foo. However, if I do: sudo apt-get install foo bar ... and assume that foo depends on version 2.0 of bar, while the latest version of bar is 3.0. Is apt-get smart enough to install the latest version of foo and version 2.0 of bar, or will it fail as it can't resolve the dependencies?
I have encountered a problem where a package, at a specific version, requires another package, also at a specific version, but Apt-Get selects a newer version of the dependency and then fails. I have experienced this with Puppet Lab's MCollective and the Nginx Mainline PPAs and likely other packages so my question is about the general approach to Apt-Get dependency resolution but I will use Nginx as my example. I have a package mirror (built with Aptly) containing the v1.7.5 of the nginx-full package and all its dependencies and also the newer v1.7.6 package and all its dependencies. If I execute apt-get install nginx-full=1.7.5-1+trusty1 then the install fails with the message: The following packages have unmet dependencies: nginx-full : Depends: nginx-common (= 1.7.5-1+trusty1) but 1.7.6-1+trusty1 is to be installed However, if I execute apt-get install nginx-full=1.7.5-1+trusty1 nginx-common=1.7.5-1+trusty1 then installation succeeds. When I have both versions 1.7.5 and 1.7.6 of the nginx-common package on the mirror and the nginx-full package explicitly states it requires 1.7.5 of nginx-common, and nginx-full is the package I've requested, why does apt-get still select the incompatible 1.7.6 version of nginx-common? Here is the output of dpkg -s nginx-full after installing 1.7.5 showing the exact version dependency constraint: Version: 1.7.5-1+trusty1 Depends: nginx-common (= 1.7.5-1+trusty1), libc6 (>= 2.14), ... In this instance, the chain of exact versions required is short so the workaround is easy but there are at least two problems for me: Other packages have much longer chains of dependencies that are tedious to discover and then append to the apt-get command line. Until a newer version of a dependency is published to a package mirror it is easy to be unaware of the impending issue. What I can't comprehend is why the dependency resolution is apparently ignoring the exact version constraint on the specified package. More importantly I'd like to know how I can ask Apt-Get to honour the constraints without having to manually replicate the package metadata onto my apt-get parameters.
I was just reviewing on Late answer post over stackoverflow, and after moment when I cleared my review, it says following : I was amazed by seeing this message... :) indeed I was paying attention, but my question is what tech or algorithm it follows to check whether reviewers really paying his attention or not ? (My guess is detecting time spending on the question with scroll and mouse moment, but not sure..)
I recently received this rather amusing message while reviewing a user's first post: Congratulations! This was only a test, designed to make sure you were paying attention. This post has already been removed, but thanks for taking time to leave feedback for the author. What is the purpose of this test? How does the audit work? What happens if I fail? Why was the system expecting me to negatively review a good post, or positively review a bad post? A review is obviously an audit. Should I report it? Do review audits count toward the Reviewer badge? Do robo-reviewers dream of electric sheep?
I’m confused on what to do. Recently, I was talking to a guy who came to me first on Snapchat wanting me to be his sugar baby and I agreed. Long story short, he told me he would be giving me an allowance of 5,000 and never did, but tried to send me money. I kind of felt off about the whole deal and told him I wasn’t interested anymore and kept begging me back. I didn’t care about his money to proceed, especially since I never met him, so he apparently sent 1000 to me. I called him on FaceTime to see him in person and he turned out to be someone else, the guy looked like he was from Africa. I was like "WTF?" and he keeps trying to claim it was his chef who answered? That doesn’t make any sense so I blocked him. He keeps trying to contact me and threatening me he wants 1000 as he has to pay off his workers who pissed him off. They’re trying to threaten me with the FBI because I won’t send their 1000 back. If he was a sugar daddy, he should have enough money to pay them off, not ask me for the money. I’ve FaceTimed him but he won’t answer, claiming he’s working and can’t answer. Yet, he has the time to text me. I find this bullshit, but I need to know — is this legit or bullshit?
I met a guy on a sugar daddy dating site and we talked, I told him my situation and he said he would help. He asked for my bank account information and I told him you can use cash app or PayPal to go through. He said his account manager deals with his finances. So I set up an account with a bank that I don’t use so that my primary account isn’t used. Eventually he was in the process of sending me money and we had agreed on a amount that wasn't crazy. But then he asked for my address and I asked why and he said just wondering. Then said he wanted to send me a surprise for being his baby. Which I didn’t give. Then later on he sent the money and said he sent me a bonus and that I was supposed to use that to pay his mothers caregiver, which he didn’t mention until after. I kept questioning him and he was saying that he works in construction and he’s trusting me to carry out the errand. Then he said don’t let him down and I asked him if he was threatening me and he kept saying I need this done but didn’t really answer my question. Am I being scammed? I’m about to change my password but is this a scam?
I basically wonder if $\displaystyle \int_{- \infty}^{\infty} e^{-x^2}dx$ is convergent or divergent, and if convergent, what is it equal to?
How to prove $$\int_{0}^{\infty} \mathrm{e}^{-x^2}\, dx = \frac{\sqrt \pi}{2}$$
I am trying to upgrade ubuntu 19.04 to 20.20 but have an error like this: update-manager Checking for a new Ubuntu release Your Ubuntu release is not supported anymore. For upgrade information, please visit: http://www.ubuntu.com/releaseendoflife Checking for a new Ubuntu release Your Ubuntu release is not supported anymore. For upgrade information, please visit: http://www.ubuntu.com/releaseendoflife /usr/lib/python3/dist-packages/DistUpgrade/DistUpgradeFetcher.py:23: PyGIWarning: Gtk was imported without specifying a version first. Use gi.require_version('Gtk', '3.0') before import to ensure that the right version gets loaded. from gi.repository import Gtk, Gdk /usr/lib/python3/dist-packages/DistUpgrade/ReleaseNotesViewerWebkit.py:33: PyGIWarning: WebKit2 was imported without specifying a version first. Use gi.require_version('WebKit2', '4.0') before import to ensure that the right version gets loaded. from gi.repository import WebKit2 as WebKit authenticate 'focal.tar.gz' against 'focal.tar.gz.gpg' extracting 'focal.tar.gz'
I'm trying to upgrade from 18.10 to 19.10, using sudo do-release-upgrade however I only get an error: An upgrade from 'cosmic' to 'eoan' is not supported with this tool. I performed the steps to update my sources.list to point to old-release server, as suggested here: This did not help. I get the same error.
When we were asked, "Would you mind...?" we answered, "No, not at all." But can I use "no at all" instead of "not at all?"
Which is correct? Why? Not enough memory No enough memory seems to be significantly more popular on the Internet than the . I want to use such construction as an error message in the program. I think it is a short version of the sentence "There is not enough memory".
When I look at my storage chart about 100 GB is devoted to system storage. Is there any way to clear some space from the system folder and if so how?
Every few days I get notices on my MacBook that it's running or run out of hard drive space. Curiously, restarting the computer will enable me to recover gigabytes of space (this past time, it was able to recover about 2.2GB). However, I can't identify anything in my personal activity that consumed that space. It's possible that it's a rogue iTunes podcast or a huge software update that my Mac is automatically downloading - would either of these reclaim the space upon a restart? One possibility that I can think of is that FileVault has some sort of disk leak, allocating but not freeing files. Does this make sense? Is there a tool that I can run to determine where this space is going? Assuming it is FileVault, should I try to disable it? What's the best way to turn of FileVault on a nearly full computer?
I am trying to figure out the quick way to remember the addition formulas for $\sin$ and $\cos$ using Euler's formula: $$\begin{align} \sin(\alpha + \beta) &= \sin \alpha\;\cos\beta + \cos\alpha\;\sin\beta \\ \cos(\alpha + \beta) &= \cos \alpha\;\cos\beta - \sin\alpha\;\sin\beta \\ \sin(\alpha-\beta) &= \sin\alpha\;\cos\beta - \cos\alpha\;\sin\beta \\ \cos(\alpha-\beta) &= \cos\alpha\;\cos\beta + \sin\alpha\;\sin\beta \end{align}$$ I'm now convinced of why it is true that $e^{ix} = \cos(x) + i\sin(x)$ but I don't know how to use this to derive these four rules.
Why is $\sin(\alpha+\beta)=\sin\alpha\cos\beta+\sin\beta\cos\alpha$? How can we find the RHS if we don't know what it is? (instead of proving the identity itself) I could find a geometric solution in , but is there any solution that doesnt require drawing something? Edit: I now saw some nice proofs using $e$ and Euler's identity. I would appreciate anything NOT using them too, as a change. Out of curiosity, Is there a proof that says you actually "can't" prove the identity using only other simple 1-variable identities like $\sin^2\alpha+\cos^2\alpha=1$?
Due to my country's education (we finish high school later than other countries), a year off, doing master's degree, I am finding myself in my first year of PhD in States being 26 years old, possibly graduating when I am 30. I have recently become very anxious about my age, since scientific career has been always my goal, I feel like I am too old and behind everyone else. In Europe, where I am from, I have been told that age does not matter as much, and what matters is papers/scientific output, especially since the end of PhD, in support of me pursuing the doctoral degree in USA, where it takes longer. I am doing my PhD at one of the top tier schools in a very prolific group, where I am surrounded by people that got their PhD when they were 25... In addition I know from experience of me and others that in my field (physics) women are heavily biased against at all stages. Also, my field requires completion of usually 2 post-docs before applying for positions, which would take around 5 years. I am looking for some input on this and how realistic my chances of staying in academia are, how much age matters when hiring for post-docs/faculty positions (in Europe) and how to cope with age related anxiety in academia.
I am 33. I live in the US. I am a neither a US citizen, nor a green card holder. I have worked in various jobs as a research assistant (physics, biology, economics) usually involving programming, mathematics or statistics. As a newly minted undergraduate, I didn't really have much confidence in myself and I completely ruled out graduate school as pointless. I didn't think of myself as smart enough. I drifted into working in labs, because those are some of the easiest ones for which one can get a work permit in the US as a non-American. Having worked in academia for a while now, I've had a chance to leap into various fields and help build solutions to complex problems. I think I have literally gone as far as I can go researching in academia with no higher degree. I work at one of the top universities in the world. (If you looked at US News rankings or the Academic Ranking of World Universities, it's in the top 5.) Lately, I've been thinking about applying for graduate school. I do have a few papers in various fields. I'm thinking of a PhD in either pure mathematics, applied mathematics, statistics or computer science. I see two big minuses to applying to graduate school: Most people applying are more than a decade younger than I am. (Alas, more than a few gray hairs have made an appearance in recent years.) Perhaps my achievements would look good for someone younger, but partially my achievements are the result of a long career rather than any special brilliance. So, I wonder how my record will be perceived. I did take GRE and I scored 800 quantitative, 800 verbal and a 5 on the essay. (I would most likely have to do a GRE subject test depending on what field I ultimately decided.) Please advise on how accomplished, but older candidates, are viewed in the graduate school application process.
So I have a list of words where I want to remove all punctuation. Here is my code def removePunctuation(words): return set([s.translate(None, string.punctuation) for s in words]) wordsStripped = removePunctuation(words) I am getting the following error TypeError: translate() takes exactly one argument (2 given) I've veen trying a few different ways to do this but with no luck, there's surely an easier way to do this? I'm new to python so excuse me if this is a bad question, any help would be greatly appreciated.
It seems like there should be a simpler way than: import string s = "string. With. Punctuation?" # Sample string out = s.translate(string.maketrans("",""), string.punctuation) Is there?
How can I get equal scaling? In the MWE I would like to have it so that the grid consists of squares. \documentclass{article} \usepackage{geometry} \geometry{textwidth=150mm, textheight=270mm} % Abbildungen erstellen, auch Graphen plotten \usepackage{tikz} %For environment axis \usepackage{pgfplots} \pgfplotsset{compat=1.13} \begin{document} \begin{center} \begin{tikzpicture} \begin{axis}[ samples=60, domain=-10:10, xmax=11, ymin=-2, ymax=102, restrict y to domain=-2:121, axis lines=center, y=0.5cm/2.5, x=0.5cm, grid=both, xtick={-10,...,10}, ytick={0,2,...,100}, xlabel=$x$, xlabel style={at={(1,0)}, anchor=north}, ylabel=$f(x)$, ylabel style={at={(0.52,1)}, anchor=north} ] \addplot [style=ultra thick, blue, axis=equal] {x^2}; \end{axis} \end{tikzpicture} \end{center} \end{document}
I have been searching for hours now on how to fix these small problems, and I am finally admitting defeat and humbly ask for help. Lately I have been going over some of my badly drawn figures, trying to clean the up and whatnot. \documentclass[10pt,a4paper]{article} \usepackage{tikz,tkz-euclide,pgfplots} \usetkzobj{all} \begin{document} \begin{tikzpicture}[x=0.02cm,y=0.02cm,scale=0.8] \tkzInit[ymin=-40,ymax=390,xmin=-40,xmax=540] \tkzClip \draw[help lines,ultra thin,dashed,gray!50!white] (-50,-50) grid (550,400); \coordinate [label=below right:{50}] (x_1) at (50,0); \coordinate [label=below right:{}] (B) at (0,390); \coordinate [label=above right:{\large $y$}] (U) at (0,350); \coordinate [label=above left:{\large $x$}] (A) at (540,0); \coordinate [label=below right:{50}] (x_1) at (50,0); \coordinate [label=below right:{100}] (x_2) at (100,0); \coordinate [label=below right:{150}] (x_3) at (150,0); \coordinate [label=below right:{200}] (x_4) at (200,0); \coordinate [label=below right:{250}] (x_5) at (250,0); \coordinate [label=below right:{300}] (x_6) at (300,0); \coordinate [label=below right:{350}] (x_7) at (350,0); \coordinate [label=below right:{400}] (x_8) at (400,0); \coordinate [label=below right:{450}] (x_9) at (450,0); \coordinate [label=below right:{500}] (x_10) at (500,0); \coordinate [label=below right:{0}] (O) at (0,0); \coordinate [label=above left:{50}] (y_1) at (0,50); \coordinate [label=above left:{100}] (y_2) at (0,100); \coordinate [label=above left:{150}] (y_3) at (0,150); \coordinate [label=above left:{200}] (y_4) at (0,200); \coordinate [label=above left:{250}] (y_5) at (0,250); \coordinate [label=above left:{300}] (y_6) at (0,300); \coordinate [label=above left:{350}] (y_7) at (0,350); \coordinate [label=above left:{\bf Kostnader per m{\aa}ned (kroner)}] (R) at (400,350); \coordinate [label=above left:{\bf Ringetid (minutter)}] (K) at (540,20); \tkzDefPoint(0,-50){C} \tkzDefPoint(-50,0){D} \tkzDefPoint(0,87.50){S} \tkzDefPoint(500,337.50){T} \tkzDrawSegment[thick,-stealth](D,A) \tkzDrawSegment[thick,-stealth](C,B) \tkzDrawSegment[ultra thick,red](S,T) \end{tikzpicture} \vspace*{2ex} \begin{tikzpicture} \begin{axis}[ scale only axis, grid=major, grid style={dashed, gray!40}, axis lines=middle, inner axis line style={-stealth}, xlabel={\begin{tabular}{@{}r@{}}\bf Ringetid (minutter)\\ \large $x$\end{tabular}}, ylabel={\large $y$ \ \ \normalsize \bf Kostnader per m{\aa}ned (kroner)}, ytick={0,50,...,350}, xtick={0,50,...,500}, x tick label style={below right}, y tick label style={above left,}, ymin=-50, ymax=380, xmin=-50, xmax=550, ] \addplot[color=red,very thick] coordinates { (0, 75) (500, 340)}; \end{axis} \end{tikzpicture} \end{document} The first image as a rather messy code, but the output is exactly as I want it. I tried cleaning up the code, but ran into heaps of problems. My main issue how to keep the ratio between the x- and y-axis, is there any way to do this? (Now I also had some problems with the x and y labels, and the thickness of the axis, but I guess that can wait for another answer...). Any other hints on improvements would be great. =)
Should be quite an easy one - I'm getting a dictionary in a .cs file and sending it back to .js as a json, using the following: //return our value return Response.AsJson(MyDictionary); The .js file picks it up here: App.Server.postJSON("/api/stuff/getmyresponse/" + self.id() + "/" + WhatToGet) .then(function (r) { console.log(r); }); This returns the following response, which is expected: Object {3214368: 939000, 3214369: 701000, 3214370: 581000, $id: "100"} (though the id isn't really necessary) Now, what I'm wondering is, in the .js file, how do I start messing around with this data, or at least setting another variable to it and doing stuff like looping through and running some calculations?
I have a JavaScript object like the following: var p = { "p1": "value1", "p2": "value2", "p3": "value3" }; Now I want to loop through all p elements (p1, p2, p3...) And get their keys and values. How can I do that? I can modify the JavaScript object if necessary. My ultimate goal is to loop through some key value pairs and if possible I want to avoid using eval.
I am an Indian citizen residing in Canada for the last 4 months. If I carry two new handbags to India worth $300 approx, would I be required to pay import duty. I checked the website and it says that you can bring valuables worth Rs.35000 (approx. $600). I just want to make sure that new handbags won't be a problem.
I am planning to travel to India (COK airport, Kerala) from United States. I want to take my laptop as well as my tablet (iPad). Am I allowed to take both in my backpack with my documents related my work. I think I am allowed to take only one computer as per the rule. Will the customs consider my iPad as a computer? What all I can take? One of my friends took 2 laptops (1 work and 1 personal) and had trouble at the airport. Also I am planning to take some wristwatches (7 of them, each avg price is 45 $). I read in a website that I can take stuff up to max 35000 INR. Is that true? In that case, how will I manage my stuff?
I have searched other results and read many of them but I could not get an enough information. My question is that can a website see my MAC address or can they have an information about that I'm the same person under these conditions: I am using a VPN and I use two IPs: first one is normal one, the second one is the VPN's IP. I use two browsers to hide behind browser fingerprinting. I use both browsers with Incognito Mode. I always use one for normal IP, one for the VPN IP. I do not know that if the website uses cookies or not. But can they collect an enough information to prove that these two identities belong to same person? Is there any other way for them to see that I am the same person? I use different IPs, different browsers and I use both browsers in incognito mode. I even changed one of browsers language to only English. So even if they collect my info from browser, they will see two browsers using different languages. (Addition after edit): So I have changed my IP and browser information and the website can not reach this information anymore to prove that I am the same person using two accounts. Then let's come to the title: Can they see my MAC address? Because I think that it is the last way that they can identify me and my main question is that. I wrote the information above to mention that I changed IPs and I have some precautions to avoid browser fingerprinting (btw my VPN provider already has a service about blocking it). I wrote them because I read similar advices in some related questions but my question is that can they see my MAC address (or anything else that can make me detected) despite all these precautions. And lastly, Is there an extra way to be anonymized that I can do? For example, can my system clock or anything else give an information? Thanks in advance.
When you hit up a site, such as cnn.com, does the TCP/IP packet contain the MAC address of your network card? Could cnn.com theoretically record my MAC address?
If I edit a question and then click the "close" link, it doesn't work. Nothing appears on the screen and I'm forced to reload the page before the link works. A covers similar ground (except my edit wasn't inline), however this was apparently fixed. (I've tagged as as this is the only site I have the reputation to reproduce the issue on.)
Seems like a bug: The user: Edits a question Then, he decide to close it. Clicks on the Close button. The popup doesn't appear. Refreshes the page. Click on the close button. The popup appears. After editing in the link appears a hash: #. But I don't think that this is the problem because if I add the hash without editing the close popup appears. It's minor, but I think that is good to be reported and solved. Edit: The close popup doesn't open after we click an edit has been made to this post; click to load.
I installed ubuntu next to windows how would I go about getting windows removed without deleting my ubuntu?
I want to keep Ubuntu but remove Windows.
The $n$-order tridiagonal matrix is defined by $A(i,i)=0, A(i,i+1)=n-i, A(i+1,i)=i$, i.e., $$A=\begin{pmatrix}0&n-1\\1&0&n-2\\&2&0&n-3\\&&\ddots&\ddots&\ddots\\&&&n-2&0&1\\&&&&n-1&0\end{pmatrix}$$ All eigenvalues of $A$ are $-(n-1),-(n-3),\ldots,(n-3),(n-1)$, however, I could not figure out a simple way to show that.
How to find the eigenvalues of $$\begin{bmatrix} 0 & 1 & & &\\ k & 0 & 2 & &\\ & k-1 & 0 & 3 &\\ & &\ddots&\ddots&\ddots\\ & & &2 & 0 &k \\ & & & & 1 &0 \end{bmatrix}$$ I tried recurrence equation, but it doesn't work to find the characteristic polynomial. Any hint or solution are welcomed, thanks for your help! PS:The missing parts are all zeroes.
Is it at all possible to create a table that contains a list that spans across multiple rows. That is the numbering must continue from row 1 to row 2 etc. My use case is that I have a table in a report that contain a single list of items. I wish to refer to these items in other parts of the report and I am constantly updating the table/list with new items. The image below shows part of the table that I would like to create. Notice that the numbered items 21, 22 etc are in different cells of the table. When I insert an item between 21 and 22 I would like all the numbering to be updated.
I want to have numbered listing in each row, I've tried with \rownumber, but it doesn't work. I wrote a number at the beginning, but Could it be automatically? Can you help me? This is my code: \documentclass[10pt, a4paper]{article} \usepackage{fontspec} \setmainfont{Arial} \usepackage{color, colortbl} \definecolor{Gray}{gray}{0.9} \begin{document} \begin{table}[h!] \tiny \begin{tabular}{|>{\raggedright\arraybackslash}m{30mm}|> {\raggedright\arraybackslash}m{5mm}|>{\raggedright\arraybackslash}m{5mm}|>{\raggedright\arraybackslash}m{5mm}|>{\raggedright\arraybackslash}m{5mm}|>{\raggedright\arraybackslash}m{5mm}|>{\raggedright\arraybackslash}m{5mm}|>{\raggedright\arraybackslash}m{5mm}|>{\raggedright\arraybackslash}m{5mm}|>{\raggedright\arraybackslash}m{5mm}|>{\raggedright\arraybackslash}m{5mm}|>{\raggedright\arraybackslash}m{5mm}|>{\raggedright\arraybackslash}m{5mm}|} \hline \multicolumn{1}{|>{\centering\arraybackslash}m{30mm}|}{\rowcolor{Gray}\textbf{Text}} & \multicolumn{1}{|>{\centering\arraybackslash}m{5mm}|}{\textbf{Sem 1}} & \multicolumn{1}{|>{\centering\arraybackslash}m{5mm}|}{\textbf{Sem 2}} & \multicolumn{1}{|>{\centering\arraybackslash}m{5mm}|}{\textbf{Sem 3}} & \multicolumn{1}{|>{\centering\arraybackslash}m{5mm}|}{\textbf{Sem 4}} & \multicolumn{1}{|>{\centering\arraybackslash}m{5mm}|}{\textbf{Sem 5}} & \multicolumn{1}{|>{\centering\arraybackslash}m{5mm}|}{\textbf{Sem 6}} & \multicolumn{1}{|>{\centering\arraybackslash}m{5mm}|}{\textbf{Sem 7}} & \multicolumn{1}{|>{\centering\arraybackslash}m{5mm}|}{\textbf{Sem 8}} & \multicolumn{1}{|>{\centering\arraybackslash}m{5mm}|}{\textbf{Sem 9}} & \multicolumn{1}{|>{\centering\arraybackslash}m{5mm}|}{\textbf{Sem 10}} & \multicolumn{1}{|>{\centering\arraybackslash}m{5mm}|}{\textbf{Sem 11}} & \multicolumn{1}{|>{\centering\arraybackslash}m{5mm}|}{\textbf{Sem 12}}\\ \hline 1. Text text text text text text text text text text text text text &&&&&&&&&&&&\\\hline 2. Text text text text text text text text text text text text text &&&&&&&&&&&&\\\hline 3. Text text text text text text text text text text text text text &&&&&&&&&&&&\\\hline 4. Text text text text text text text text text text text text text &&&&&&&&&&&&\\\hline \hline \end{tabular} \end{table} \end{document}
Is there something in .NET that corresponds to java -Xmx memory size allocation?
Coming from a java background, one of the things I am used to is telling the JVM what the maximum heap size should be. If the running program tries to swallow more than is allowed, and the garbage collector cannot free any more resources, then OutOfMemoryError is thrown and it all goes bang. So setting the maximum heap size is important in Java. Does this apply in .net? Can you set the heap size limits? Does the CLR just keep growing its heap until it reaches the machine's physical limits? Or is it not an issue in .net for some subtle reason that my Java blinkers stop me from seeing?
sudo apt-get install g++ Reading package lists... Done Building dependency tree Reading state information... Done Some packages could not be installed. This may mean that you have requested an impossible situation or if you are using the unstable distribution that some required packages have not yet been created or been moved out of Incoming. The following information may help to resolve the situation: The following packages have unmet dependencies: g++ : Depends: g++-4.7 (>= 4.7.0-1~) but it is not going to be installed E: Unable to correct problems, you have held broken packages.
Occasionally, when I'm installing stuff, I get an error like the following: Some packages could not be installed. This may mean that you have requested an impossible situation or if you are using the unstable distribution that some required packages have not yet been created or been moved out of Incoming. The following information may help to resolve the situation: The following packages have unmet dependencies: package1 : Depends: package2 (>= 1.8) but 1.7.5-1ubuntu1 is to be installed E: Unable to correct problems, you have held broken packages. How can I resolve this?
When I shine a beam of light at a mirror why does the ray go in the exact opposite direction (tested with protractor). Why does it not go back in exactly the same direction? The beam is of an unspecified wavelength, it was just shone from a lightbulb in a box with a slit of a few millimeters to let a beam of light shine through.
From the school physics I know that the material objects bounce from the plane surface at the same angle, losing some kinetic energy. In the same school I was taught that the light (and waves in general) obeys this principle too. Obviously, in the case of light the plane surface should be a perfect mirror. But I can't understand how should this work from the quantum point of view. Let's assume that our mirror consists of a single silver atom. Why should the electrons of this atom re-emit consumed photons at some specific angle?
I have enough credits to graduate a semester early, and will be soon. I know of the perquisites such as the GMAT, but when researching the school I wanted to go to (Fordham) I am worried now that most schools only have a fall intake. I noticed UMaryland has spring intake and Villanova has a summer intake. Will my pool of schools be limited if I want to start in the spring?
I am facing a dilemma regarding whether or not to apply for Spring for PhD programs at some universities in US. What are the pros and cons of applying for PhD or MS programs in Spring?
In Harry Potter and the Sorcerer's Stone, the Mirror of Erised is said to be the ultimate protection against the impure of heart who desire to obtain the Stone only for their own desires. However, the Mirror itself is not stored in Dumbledore's forbidden third-floor corridor until practically the end of the book. Instead, it appears to be collecting dust in an unused classroom at least five floors above the kitchens, until Harry finds it and Dumbledore moves it, following their discussion. It's assumed by the characters that the Stone is hidden underneath Fluffy in the third-floor corridor since it was moved to Hogwarts from the Gringotts vault, but given that the Mirror seems to be the only true protection against a powerful Dark Wizard, wouldn't it make more sense to hide the Stone in the Mirror from the very beginning? Do we know anything else about whether the Sorcerer's Stone was stored in the Mirror of Erised before it was moved into the forbidden third-floor corridor?
So, we know that the Mirror of Erised was the ultimate guardian to the Stone in the first Harry Potter book, but we also know that it wasn't there until about the New Year. The Stone was there for perhaps 4 months before that. Was it just as protected as it could be during those months, or perhaps the mirror was moved back briefly so Harry could look into it? Just curious if there's ever been anything official on this matter.
When developing a page object model, the whole intention is generally to abstract the page into methods that keeps code reusable and increase readability. Something I often get stuck on how high of a level do I abstract something? So for example something like a login form (or really most forms for example). I generally will code out something such as (This is in Cypress fwiw, but pretend it's in whatever automation framework of your choice. Code below is JavaScript): setEmail(value) { const field = cy.get('.form-control[name="username"]'); field.clear(); field.type(value); return this; } setPassword(value) { const field = cy.get('.form-control[name="password"]'); field.clear(); field.type(value); return this; } Generally at this point is where I wonder "Hmmm should I go ahead and wrap this forms n inputs into a larger method such as": login(email, password) { this.setEmail(email); this.setPassword(password); this.submit(); } Which at that point I question: "Why even bother writing the independent input methods". So how do I decide when it's worth writing a large method that encompasses multiple other private methods...and if I write a larger "public" method should I even bother writing smaller private methods? I read somewhere with PoM that we should: Model user behaviour not user interfaces When I think about that statement, especially when it comes to forms it feels like one "larger" method makes sense. The only real advantage I see to splitting them up is in case I need to test negative cases (Such as not all inputs are filled out for instance). Which can technically be conditionally added to a larger form (But can also be a pain when there are multiple inputs). What is the best practice here?
So i've been working on a Page Object Model framework for a large web application for our current company. It's the first time i've made my own framework and implemented the page object model. Im using Ruby w/Capybara and Selenium-Webdriver for my language/driver of choice. Currently i've divided each page (or obvious "section of the site") into a class file. This class file has methods for just about everything (or an API of sorts). The problem i've ran into is that I am literally writing a method for every single thing....and i've came across 2 ways people seem to do this: Lets pretend for a section/page of the site is a widget creation form, the widget has a name/description and some sort of "type" dropdown. Also a save button to save the widget. Option A (Which is what i've done so far): Make a method for each element (the save button, called save_widget, all the different inputs, etc...) Option B: Have getter and setter methods for each element, then a larger method which uses these private getter and setter methods. With Option A my test scripts end up being longer, and honestly not much different than using selenium calls themselves. Option B would probably call one method (Such as create_widget which would pass in multiple items which that method would call all the smaller getter/setter methods). This would make the test script MUCH shorter and more abstracted. However the getter/setter methods would probably take more actual writing for the page objects themselves (but possibly easier to maintain). Is there a certain style that favors one over the other? The more I think about it the more Option B seems better...but I wonder if in this case abstraction is a good thing.
So I started an acount just for me and then after I started I found out how to start with pikachu so now I want to restart, but I have searched all over the game but could not find a way
I accidentally have choosen Bulbasaur for my starter where I wanted Squirtle. Is there anyway to reset it? I have looked in the options menu and there does not appear to be a way to reset it. I guess that I could make a new Google Play account for it, but that seems like a mess.
When I was learning about GCD and LCM I found this relation somewhere. But I didn't get proof for this relation. $$\frac{\gcd(a,b,c)^2}{\gcd(a,b)*\gcd(b,c)*\gcd(c,a)}=\frac{\operatorname{lcm}(a,b,c)^2}{\operatorname{lcm}(a,b)*\operatorname{lcm}(b,c)*\operatorname{lcm}(c,a)} $$ where GCD represents Greatest Common Divisor and LCM represents lowest common multiple.
Let $(a,b)$ denote the GCD of $a$ and $b$, and let $[a,b]$ denote the LCM of $a$ and $b$. Prove $\frac{[a,b,c]^2}{[a,b][b,c][c,a]}=\frac{(a,b,c)^2}{(a,b)(b,c)(c,a)}$.
Probably goes without saying, but big spoiler alert! The big plot twist of the movie "The Prestige" is that "Borden" is actually two people, Borden, and his brother/assistant "Fallon." At the end of the movie, Angier frames Borden for murdering him, and Borden/Fallon is hung. Then Fallon/Borden comes back and shoots and kills Angier, burns his workshop down, and leaves with his daughter, Jess. It just occurred to me, that I don't actually know which character dies at the end. Is it Borden (The husband of Sarah, and the Father of Jess) dies, and Fallon avenges him and takes care of Jess or Fallon (Sarah's brother in law, Jess's uncle) dies, and Borden avenges him and takes care of Jess? I had always assumed it was the first, but states that it is the second. Is there any concrete evidence either way?
After reading the answer to this question: , in which Angler was told by the wrong twin which knot resulted in his wife's death. Is it possible to tell which Borden is which when watching the movie. Is Christain Bale's performance for each character different enough that every scene with Borden can be determined which is which? The short answer would be yes/no, but a better answer would either present ways to tell the brothers apart, or offer a map of their apperances throughout the film.
I am using Biblatex and sectioning my references into two different sections like this: \printbibliography[type=book,title={Books}] \printbibliography[type=misc,title={Miscellanous}] This works fine, except for the fact that the book section is not numbered the way I want it, I want it to start with '1' and then the next ones '2', '3',... This is how it looks like right now:
I have a document in which the bibliography is splitted via categories. I would like to reference to the elements by numbers [1]. Inside each bibliography, the entries should be sorted by year-name-title (ynt), but the numbers in the first bibliography should be smaller than the numbers in the second one. MWE: \documentclass{article} \usepackage[sorting = ynt,bibstyle=numeric]{biblatex} \usepackage{filecontents} \begin{filecontents}{\jobname.bib} @book{a, author = "I", year = "1973" } @book{a2, author = "I", year = "1923" } @book{b, author = "You", year = "1959" } \end{filecontents} \addbibresource{\jobname.bib} \DeclareBibliographyCategory{own} \begin{document} \nocite{a,a2} \addtocategory{own}{a,a2} \nocite{b} \printbibliography[category=own,title={A}] \printbibliography[notcategory=own,title={B}] \end{document} Now, the order of the numbers in the bibliography is "[1],[3]" in the first list, and "[2]" in the second list. This looks odd and if there are more items, one has to search through both lists in order to find a reference. I would like to have "[1],[2]" in the first list and "[3]" in the second list. An option is to add a "presort" key to the corresponding entries in the bib-file, but I would like to not touch the bib-file. Is there, e.g., any possibility to add the "presort" key afterwards in the tex-file? Or can biblatex sort by category (I searched the manual but did not found any clue)?
I am trying to understand Principal Component Analysis (PCA). I found that introduces it and the concept of the percentage of variance. However, I am very confused about what "Percentage of Variance" (POV) means. Here are the questions I have: Is there a formal definition or mathematics formula to define "percentage of variance"? Do we only use POV for calculating PCA? Is POV used somewhere else? Is POV the same as "Proportion of Variance Explained"? (There are many similar terms online which really confuse me.)
In general, what is meant by saying that the fraction $x$ of the variance in an analysis like PCA is explained by the first principal component? Can someone explain this intuitively but also give a precise mathematical definition of what "variance explained" means in terms of principal component analysis (PCA)? For simple linear regression, the r-squared of best fit line is always described as the proportion of the variance explained, but I am not sure what to make of that either. Is proportion of variance here just the extend of deviation of points from the best fit line?
Why was Dumbledore afraid that Voldemort will get the prophecy? Looking at the prophecy I can't see anything that would help Voldemort and give him new information that would be dangerous for the Order. "The one with the power to vanquish the Dark Lord approaches... born to those who have thrice defied him, born as the seventh month dies... and the Dark Lord will mark him as his equal, but he will have power the Dark Lord knows not... and either must die at the hand of the other for neither can live while the other survives... the one with the power to vanquish the Dark Lord will be born as the seventh month dies...." Voldemort only knew about the first part. I can't see anything in the second part that would have valuable information. So: Either there is some meaning in it that I didn't understand, or the rest of the prophecy really was useless, and I can't see why Dumbledore would put the Order in danger just to guard the prophecy. Dumbledore might have wanted to trick Voldemort into thinking the prophecy is important and make him waste his time by directing his efforts to the useless prophecy. If you can give me evidence for that it would be great.
(And please, nobody say "Cause Dumbedore asked them to") We know one of the tasks of the Order after its re-creation was to keep safe a weapon Voldemort was after. “What’s he after apart from followers?” Harry asked swiftly. He thought he saw Sirius and Lupin exchange the most fleeting of looks before Sirius said, “Stuff he can only get by stealth.” When Harry continued to look puzzled, Sirius said, “Like a weapon. Something he didn’t have last time.” (Order of the Phoenix, Chapter 5, The Order of the Phoenix) Sturgis Podmore was Imperiused while patrolling around the door behind which it was kept, and Arthur Weasley was attacked there by Nagini (or Voldemort in Nagini). “Your father has been injured in the course of his work for the Order of the Phoenix,” said Dumbledore. [...] “The Ministry wouldn’t want everyone to know a dirty great serpent got —” “Arthur!” said Mrs. Weasley warningly. “— got — er — me,” Mr. Weasley said hastily, [...] “You were guarding it, weren’t you?” said George quietly. “The weapon? The thing You-Know-Who’s after?” “George, be quiet!” snapped Mrs. Weasley. “Anyway,” said Mr. Weasley in a raised voice... (Order of the Phoenix, Chapter 22, St Mungo's Hospital) - “Sturgis Podmore,” said Hermione, breathlessly. “Arrested for trying to get through a door. Lucius Malfoy got him too. I bet he did it the day you saw him there, Harry. Sturgis had Moody’s Invisibility Cloak, right? So what if he was standing guard by the door, invisible, and Malfoy heard him move, or guessed he was there, or just did the Imperius Curse on the off chance that a guard was there? So when Sturgis next had an opportunity — probably when it was his turn on guard duty again — he tried to get into the department to steal the weapon for Voldemort" (Order of the Phoenix, Chapter 26, Seen And Unforeseen) We also learn later that about Voldemort and Harry. Voldemort was after it, because he thought its end would tell him how to destroy Harry. And so, since his return to his body, and particularly since your extraordinary escape from him last year, he has been determined to hear that prophecy in its entirety. This is the weapon he has been seeking so assiduously since his return: the knowledge of how to destroy you. (Order of the Phoenix, Chapter 37, The Lost Prophecy) But let's look at the content of the Prophecy, and what part he already knows of: “THE ONE WITH THE POWER TO VANQUISH THE DARK LORD APPROACHES... BORN TO THOSE WHO HAVE THRICE DEFIED HIM, BORN AS THE SEVENTH MONTH DIES... AND THE DARK LORD WILL MARK HIM AS HIS EQUAL, BUT HE WILL HAVE POWER THE DARK LORD KNOWS NOT... AND EITHER MUST DIE AT THE HAND OF THE OTHER FOR NEITHER CAN LIVE WHILE THE OTHER SURVIVES... THE ONE WITH THE POWER TO VANQUISH THE DARK LORD WILL BE BORN AS THE SEVENTH MONTH DIES...” (Order of the Phoenix, Chapter 37, The Lost Prophecy) - “He heard only the first part, the part foretelling the birth of a boy in July to parents who had thrice defied Voldemort." (Order of the Phoenix, Chapter 37, The Lost Prophecy) The bold parts are already known to Voldemort... and the rest of the prophecy does not really gives him valuable information: Mark him as his equal: OK, that's already done. He'll have a power the Dark Lord knows not: Yep, that's love. But since Voldemort does not know of it, he won't be able to understand this sentence. He will imagine another power, but that won't help him (and he probably already guessed this while planning to kill baby Harry). Either must die at the hand of the other...: Alright, so Voldemort should go and kill Harry then! Oh, but he kind of already wanted to anyway, didn't he? Was preventing Voldemort from hearing the end of the Prophecy worth all the trouble and the risks (one member of the Order lost for 6 months to Azkaban, another heavily wounded and happy not to be dead...)? Why did they bother to do so?
I'm making an app for tracking the driven routes via GPS, for the database I used SQLite. When the current position gets changed, the data (latitude, longitude, date) will be saved into the database, so I have a list of many coordinates+dates in my database. Now, I want to calculate the distance for the whole route. I know the start and end position and the intermediate positions. I also know how to calculate a distance between two positions. I do NOT know how to calculate the distance for all segments. Can someone help me? This is how I calculate the distance between two positions: private double calculateDistance(double fromLong, double fromLat,double toLong, double toLat) { double d2r = Math.PI / 180; double dLong = (toLong - fromLong) * d2r; double dLat = (toLat - fromLat) * d2r; double a = Math.pow(Math.sin(dLat / 2.0), 2) + Math.cos(fromLat * d2r) * Math.cos(toLat * d2r) * Math.pow(Math.sin(dLong / 2.0), 2); double c = 2 * Math.atan2(Math.sqrt(a), Math.sqrt(1 - a)); double d = 6367000 * c; return Math.round(d); }
How do I calculate the distance between two points specified by latitude and longitude? For clarification, I'd like the distance in kilometers; the points use the WGS84 system and I'd like to understand the relative accuracies of the approaches available.
[https://example.com/] appears as a clickable link in the preview, but not in the final render when saved. This applies to at least the inline editor (tested on Stack Overflow) and question-ask page here. Probably related bug: also from after the change to CommonMark. (Discovered on Stack Overflow; presumably the URLs in were clickable before the CommonMark changeover, but they aren't now. A recent suggested-edit changed a URL, but left them non-clickable, which I found surprising. For the current version I simply removed the [] around the URLs.)
When editing a question on , I observed that a link which was not rendered in the post was hyperlinked in the edit preview (see pictures below). I tried reproducing it in the to see if this also happens when the post is posted for the first time and observed the same. It seems to be a bug after the shift to CommonMark, leading to the different rendering of links on client and server-side. A link following a special character (without any space) is not hyperlinked in the post but is hyperlinked in the preview. A link separated from the special character with a white space appears to have no such problem. (see pictures below and my ). Link not hyperlinked in post Same link hyperlinked in preview
I'm using Windows 10 and I wanted .pie files to be opened with a jar file I created, so I used assoc and ftype as follows: assoc .pie PieLang ftype PieLang=java -jar pielang.jar "%1" assoc .pie does return .pie = PieLang, and ftpe PieLang does return PieLang=java -jar pielang.jar "%1", so everything should work. However, everytime I open a .pie file, no matter if I do it using double click or using CMD, it will always open with Notepad. Is there any way I can fix that? EDIT: Now I can't change .py files either. But somehow pdf files it does let me change EDIT2: It doesn't work on file properties as well. Instead, when I choose a program as default on the menu, it opens on that program one time, but it doesn't change the default EDIT3: Ramhound's solution doesn't work as I said before. (Asked in StackOverflow and my question was marked "on hold" and they told me to post my question here, so I did)
I would like .txt files to open with Notepad++ by default in Windows 10. I have found the options to change file associations but there is no option to specify custom programs. Here's a screen shot: How can I make Notepad++ default program for .txt files?
When I install binwalk with apt-get install binwalk in Ubuntu 18 I get version 2.1.1 even in there is version 2.2.0. long time ago. why binwalk didn't update in ubuntu repository? By the way, why I can't install those project with apt-get? Who is decided to enter then to Ubuntu repository?
Why are packages in the official Ubuntu repositories older than the latest (upstream) versions from Debian Sid, PPAs, the authors, etc.?
There are four known forces in the universe. Two of these forces are the force of gravity and the force of electromagnetism. The first is the result of the mass of the object that has the gravity. The second is the result of charge in both the affected particle as well as the particles that generated the electrical and magnetic fields. Since both forces operate over spacetime why isn't there a model that common to both?
In classical mechanics, we had Newton's law of gravity $F \propto \frac{Mm}{r^2}$. Because of this, all laws of classical electrostatics applied to classical gravity if we assumed that all charges attracted each other due to Coulomb's law being analogous. We can "tweak" classical electrostatics to fit gravity. In modern physics, does the reverse work? Can we "tweak" General Relativity to accurately describe electrostatics or even electromagnetism?
I have the following code: String s1= "Hi"; String s2="Hi"; String s3=s1.concat(" a"); String s4="Hi a"; System.out.println(s1==s2); System.out.println(s1=="Hi"); System.out.println(s3.equals(s4)); System.out.println(s3==s4); Why is System.out.println(s3==s4) false?
I've been using the == operator in my program to compare all my strings so far. However, I ran into a bug, changed one of them into .equals() instead, and it fixed the bug. Is == bad? When should it and should it not be used? What's the difference?
When speaking about studying is it proper to say in simple present like I study science in the university. or in simple present continuous as I am studying science in the university.
What is the difference between the following sentences? He is always shooting his mouth off about how good he is. (present continuous) He always shoots his mouth off about how good he is. (simple present) In texts they usually use number 1, but I do not see a difference in meaning.
I have a warning triangle on the top of my screen. When I click on it, it says that my update information is outdated. When I type sudo apt-get update && sudo apt-get upgrade into a terminal, I get this message: W: Failed to fetch cdrom://Ubuntu 14.04 LTS _Trusty Tahr_ - Release i386 (20140417)/dists/trusty/main/binary-i386/Packages Please use apt-cdrom to make this CD-ROM recognized by APT. apt-get update cannot be used to add new CD-ROMs W: Failed to fetch cdrom://Ubuntu 14.04 LTS _Trusty Tahr_ - Release i386 (20140417)/dists/trusty/restricted/binary-i386/Packages Please use apt-cdrom to make this CD-ROM recognized by APT. apt-get update cannot be used to add new CD-ROMs E: Some index files failed to download. They have been ignored, or old ones used instead. Any ideas?
When updating I got this error message: W:Failed to fetch cdrom://Ubuntu 11.10 _Oneiric Ocelot_ - Release amd64 (20111012)/dists/oneiric/main/binary-i386/Packages Please use apt-cdrom to make this CD-ROM recognized by APT. apt-get update cannot be used to add new CD-ROMs W:Failed to fetch http://ppa.launchpad.net/synce/ubuntu/dists/your_ubuntu_version/main/source/Sources 404 Not Found What to do?
I have an solid state drive that I develop websites on. The reason I do this is because I work on a few different computers. Historically, I created separate developing environments to use for each machine. This was OK, but if the system changed for some reason, eg, new OS install, it was a pain. So I bought a USB 3.0 enclosure and put a solid state drive in there and it's pretty darn fast, which is good. I was working with three Windows machines and I could simply hook up the drive, launch my XAMPP server and away I went, developing websites: using Dreamweaver, Komodo, Notepad++, Eclipse, etc. Recently, however, one of my Windows machines' hard drive went down and instead of going back to Windows in this case, I went with Ububntu 12.04. I have several Ubuntu workstations and servers and I like Linux, so I thought his was a great opportunity to transition. I went to work installing and trying to set up a LAMP server and, besides from XAMPP 64-bit compatibility out of the box, I'm seeing other issues with getting this Linux server running. I will keep trying to resolve this, but in the meantime... my question is, has anyone ever successfully run both WAMP and LAMP from the same SSD (formatted to NTFS)? I'm sure there are lots of barriers to this happening, like local file system, OS libraries, dependencies, etc. But I was thinking it would be cool if it could be done. I'm no expert, so if this is just plain old stupid, please don't hesitate to let me know.
This is a about the use of a *AMPP's stack. I recently had a talk with some experienced people and they suggested to me not to use a WAMP stack, and instead install apache, mysql and php separately. I don't understand why they have suggested this, though, so can anyone tell me? Is there a particular disadvantage of WAMP, or a particular advantage to installing all of them separately? Since a WAMP stack itself is composed of apache, mysql and php, then what's the difference between using the WAMP stack and installing them all separately?
I am having a problem where I need to obtain some compile-time variable and change the code accordingly. Changing the way it works is not a option. Here is how it works in c: #include <stdio.h> int main(void) { printf("version: %d\n", version); printf("svn: %d\n", svn); return 0; } $ gcc -Dversion=1 -Dsvn=15 main.c -o main $ ./main version: 1 svn: 15 How can i create that behavior in java?
When I used to write libraries in C/C++ I got into the habit of having a method to return the compile date/time. This was always a compiled into the library so would differentiate builds of the library. I got this by returning a #define in the code: C++: #ifdef _BuildDateTime_ char* SomeClass::getBuildDateTime() { return _BuildDateTime_; } #else char* SomeClass::getBuildDateTime() { return "Undefined"; } #endif Then on the compile I had a '-D_BuildDateTime_=Date' in the build script. Is there any way to achieve this or similar in Java without needing to remember to edit any files manually or distributing any seperate files. One suggestion I got from a co-worker was to get the ant file to create a file on the classpath and to package that into the JAR and have it read by the method. Something like (assuming the file created was called 'DateTime.dat'): // I know Exceptions and proper open/closing // of the file are not done. This is just // to explain the point! String getBuildDateTime() { return new BufferedReader(getClass() .getResourceAsStream("DateTime.dat")).readLine(); } To my mind that's a hack and could be circumvented/broken by someone having a similarly named file outside the JAR, but on the classpath. Anyway, my question is whether there is any way to inject a constant into a class at compile time EDIT The reason I consider using an externally generated file in the JAR a hack is because this is) a library and will be embedded in client apps. These client apps may define their own classloaders meaning I can't rely on the standard JVM class loading rules. My personal preference would be to go with using the date from the JAR file as suggested by serg10.
I have been working on a software where there is a section to promote and/or demote other users. For last two days, I have been thinking and searching for a common term to group both of these terms together but it seems like I am out of luck or I am searching in the wrong direction. I was wondering if anyone is aware of a proper term or word which can convey the meaning of promotion/demotion or level change on itself without requiring any further explanation to the user?
I have been working on a software where there is a section to promote and/or demote other users. For last two days, I have been thinking and searching for a common term to group both of these terms together but it seems like I am out of luck or I am searching in the wrong direction. I was wondering if anyone is aware of a proper term or word which can convey the meaning of promotion/demotion or level change on itself without requiring any further explanation to the user? Update To make it clear, it's promotion/demotion just like done in school. So Level, Rank etc are out of question. Also the term will be better suited if it's a verb for Promotion/Demotion.
I am getting the Response size exceeded 15MB organization limit error when i clicked a button from VF page which is not able to trace in debug logs and the debug log as follows: Number of SOQL queries: 1 out of 100 Number of query rows: 550 out of 50000 Number of SOSL queries: 0 out of 20 Number of DML statements: 0 out of 150 Number of DML rows: 0 out of 10000 Maximum CPU time: 0 out of 10000 Maximum heap size: 0 out of 6000000 Number of callouts: 0 out of 100 Number of Email Invocations: 0 out of 10 Number of future calls: 0 out of 50 Number of queueable jobs added to the queue: 0 out of 50 Number of Mobile Apex push calls: 0 out of 10 07:56:46.406 (3406940521)|CUMULATIVE_LIMIT_USAGE_END
I've a Visualforce page that holds a large amount of data. I've used <apex:page readOnly="true"> to avoid the viewstate limit of 135 KB. However, I use a lot of data binding that makes the viewstate heavy. I've recently hit a new limit "Response Size of 15 MB". I believe this is the response size I get from page onload i the process of "Apex ->HTML conversion". Any suggestion on how to proceed will help. I'm trying to reduce the binding but still looking if there are other options available which I'm not aware of.
What is the difference between A a1 = new A(); A a2 = new B(); where B extends A and also what happens if i do the following a1 = new B(); Thanks.
I have seen this mentioned a few times and I am not clear on what it means. When and why would you do this? I know what interfaces do, but the fact I am not clear on this makes me think I am missing out on using them correctly. Is it just so if you were to do: IInterface classRef = new ObjectWhatever() You could use any class that implements IInterface? When would you need to do that? The only thing I can think of is if you have a method and you are unsure of what object will be passed except for it implementing IInterface. I cannot think how often you would need to do that. Also, how could you write a method that takes in an object that implements an interface? Is that possible?
Step 1. Go to Your Name --> My Settings Step 2. select Personal | Reset My Security Token what shown above, creates new security token and sends email to the registered user. how can i know what is the security token value without sending email/clicking "Reset My Security Token" button
I need to get a user's security token but there are other things currently using it so I don't really want to reset it. Is there any way to retrieve this without having to reset it?
I am setting protection in factions on my command block server using adventure mode. I have a command block setting mode to survival in a certain radius, but within that radius I want a smaller radius set to adventure mode. Is there a way to set what's not in the radius of adventure mode to survival mode?
Is there a way to set an "Adventure Mode Boundary" in Minecraft? I am trying to create this village where players can spawn in, and then set out to explore the world and build and do normal minecraft stuff. I don't want them to destroy this village, so I want them to be in adventure mode when they are in the village and then switch them to survival when they leave, and vice-versa. When they return to the village, they get switched back to adventure mode. In other words, I want to set an "Adventure Mode Boundary" to protect buildings. I am working without mods. I am hoping there is an simple way using command blocks.
Prove there exists some $a>0$ such that the series $\sum_nf(an)$ diverges. I think it can be useful to partition $[0, +\infty)$ on $[n, n+1)$ and choose some $a_n$ for every $n$. But I can't understand how to build $a$ from $a_n$. Also I think integral Koshie trapping is useful.
Hi can you help me solve this exercise? Thanks. Let $f: [0;+\infty) \to \mathbb{R}$ be nonnegative and continuous function. Suppose $\forall a > 0$ $\sum_{n=1}^{\infty} f(na)$ is convergent. Prove that $\int_{0}^{\infty}f(x) dx$ is convergent. I tried to solve it by using the Riemann sum, but for fixed a it doesn't work. I have no other ideas.
I got an error message today when opening VS code as sudo/root, "It is recommended not to run Code as 'root'." THis seems so stupid, Visual Studio code is an IDE, an IDE is used to editing files is it not? Without sudo you wouldn't be able to edit, create, delete, modify, or do anything with any file, so what would the point of the IDE be without sudo? I'm struggling to understand why its a bad idea. Am I doing something wrong, and if so what should I do? I'm a web developer, so of course I need write and edit permissions to files. Without that, it wouldn't be an IDE, the program would be useless... I have the files in /var/www/html.
I want to stop having to use sudo everytime I work in /var/www. How can I do that? I simply want to put all of my sites into this directory and work with them without too much pain.
I'm using ffmpeg to convert my files but when I tried to convert WAV -> MP3 I got this error. It's surprising for me cause I installed this one yesterday. What could happen?
I'm running Ubuntu 14.04.1 LTS. The question looks like this , but I followed everything there and installed every package they mentioned but still I am getting the error. I am trying to convert FLAC to MP3 using ffmpeg, with below command: ffmpeg -i hang_drum.flac -acodec libmp3lame destination_path.mp3 Error: ffmpeg version 2.3.3 Copyright (c) 2000-2014 the FFmpeg developers built on Sep 5 2014 17:58:33 with gcc 4.8 (Ubuntu 4.8.2-19ubuntu1) configuration: libavutil 52. 92.100 / 52. 92.100 libavcodec 55. 69.100 / 55. 69.100 libavformat 55. 48.100 / 55. 48.100 libavdevice 55. 13.102 / 55. 13.102 libavfilter 4. 11.100 / 4. 11.100 libswscale 2. 6.100 / 2. 6.100 libswresample 0. 19.100 / 0. 19.100 Input #0, flac, from 'hang_drum.flac': Metadata: TSS : Logic 10.0.6 ENCODER : Lavf55.44.100 Duration: 00:02:36.06, start: 0.000000, bitrate: 627 kb/s Stream #0:0: Audio: flac, 44100 Hz, stereo, s16 I tried: sudo apt-get install ffmpeg libavcodec-extra-53 sudo apt-get install ffmpeg libavcodec-extra-54 sudo apt-get install libmp3lame0 sudo apt-get install libav-tools:i386 sudo apt-get install ffmpeg libav-tools After running these, I'm still getting the same error libmp3lame. What am I missing here?
If electromagnetic waves cause disturbances in the Electric Field… what “is” in this E Field which photons Interact with? I ask because in Vacuum, there are no electrons to excite. So what is “it” that's adding up in the E Field as a disturbance in wave propagation?
There was a reason why I constantly failed physics at school and university, and that reason was, apart from the fact I was immensely lazy, that I mentally refused to "believe" more advanced stuff until I understand the fundamentals (which I, eventually, never did). As such, one of the most fundamental things in physics that I still don't understand (a year after dropping out from the university) is the concept of . No one cared to explain what a field actually is, they just used to throw in a bunch of formulas and everyone was content. The school textbook definition for a field (electromagnetic in this particular case, but they were similar), as I remember it, goes like: An electromagnetic field is a special kind of substance by which charged moving particles or physical bodies with a magnetic moment interact. A special kind of substance, are they for real? This sounds like the authors themselves didn't quite understand what a field is so they decided to throw in a bunch of buzzwords to make it sounds right. I'm fine with the second half but a special kind of substance really bugs me, so I'd like to focus on that. Is a field material? Apparently, it isn't. It doesn't consist of particles like my laptop or even the light. If it isn't material, is it real or is it just a concept that helps to explain our observations? While this is prone to speculations, I think we can agree that in scope of this discussion particles actually do exist and laws of physics don't (the latter are nothing but human ideas so I suspect Universe doesn't "know" a thing about them, at least if we're talking raw matter and don't take it on metalevel where human knowledge, being a part of the Universe, makes the Universe contain laws of physics). Any laws are only a product of human thinking while the stars are likely to exist without us homo sapiens messing around. Or am I wrong here too? I hope you already see why I hate physics. Is a field not material but still real? Can something "not touchable" by definition be considered part of our Universe by physicists? I used to imagine that a "snapshot" of our Universe in time would contain information about each particle and its position, and this would've been enough to "de" it but I guess my programmer metaphors are largely off the track. (Oh, and I know that the uncertainty principle makes such (de)serialization impossible — I only mean that I thought the Universe can be "defined" as the set of all material objects in it). Is such assumption false? At this point, if fields indeed are not material but are part of the Universe, I don't really see how they are different from except for perhaps a more geeky flavor. When I talked about this with the teacher who helped me to prepare for the exams (which I did pass, by the way, it was before I dropped out), she said to me that, if I wanted hardcore definitions, a field is a function that returns a value for a point in space. Now this finally makes a hell lot of sense to me but I still don't understand how mathematical functions can be a part of the Universe and shape the reality.
Can I cancel my Apple ID? I have 3 accounts and I only need one.
I'm going thru a phone swap, and I now realize that I have multiple ID's "codename" "[email protected]" "[email protected]" I've tested all three, and they all have different login passwords. Not sure how I got here but I'd like to clean the mess up. Is there any way to delete / remove / erase unwanted ID's so they don't exist anymore? (Note: their existence creates total havoc with any type of ID edit...) I see from that I can't merge the apple ID's, but can I simply delete the unwanted ID's?
I'd like to specify a Twitter list to search for a specified hash tag. Searching by a hash tag is easy: will search all of Twitter for the #geocamsu hash tag. I'd like to limit that search to a particular list but do not see an option for doing so on their advanced search page. Is there something I'm missing that allows for specifying a list?
That is, I have created a Twitter list with some 100 members and would like to search for a particular word within all users of the list.
I didn't find a direct solution for it. Can I modify encrypted data without accessing it? If there is an example, I would appreciate it.
I would like to encode some data with a key, and send it to a third party. They don't know the key to decode it, but I would like to make it possible for them to apply some modifications on it. Then they send i back, I can get decode it, and get the result. For example let the encoded data is the integer 5. I encode it with a key k and it becomes xxxxxx. The user can apply operations to xxxxxx without knowing k, like +5 and *2. After those operaions, the encoded value becomes yyyyyy. If I decode the value with the key k, it should be 20, as if I applied +5 and *2 on the original data 5. Are there any cryptographic algorithms like that?
Caps lock keyboard indicator is ON after waking up from suspension, but in fact it is turned OFF. So I have to press the CAPS LOCK button twice to make it normal. So the problem is with indicator only, capitalization works. Notebook: HP Pavilion g6 1075er OS: Ubuntu 12.04 I came to Ubuntu a month ago, and I never experienced this problem in Windows. Couldn't find relevant answer on web. I have no changes for Caps lock button in keyboard layout settings.
I have a laptop which I hook up to an external display when I'm at home. I also connected an external keyboard and mouse which makes it more comfortable for me. I have noticed that pressing caps lock on the external keyboard does not light up the capslock indicator of the laptop keyboard (and vice versa). When googling, I came across the setleds function, but when I type it into a console all I get is this: KDGKBLED: Inappropriate ioctl for device Error reading current flags setting. Maybe you are not on the console? Any idea if I can get this working?
I am a beginner in the world of Ubuntu (and all forms of Linux OS). I recently was given an old laptop that I would love to bring back to life. The laptop is a Toshiba Portege 3500 tablet laptop (one with rotating screen to use as tablet). It currently has Windows XP installed. I have very little knowledge of BIOS, but I did make it into the boot menu. I changed the directory to boot from the CD-ROM drive (external, as there is no installed drive). When I attempt to install Ubuntu 14.04.2 from a DVD, it shows a black screen with a cursor on it, but even after a few minutes, nothing appears on screen. Should I be seeing a landing page? I am also wondering if I should bother updating any drivers. I can't connect wirelessly right now, and I think the card cannot recognize WPA or any "newer" wifi routers. This laptop is circa 2005 iirc. Correct me if I'm wrong. Any help would be appreciated. I'm new but willing to learn. Thanks!
I am trying to boot Ubuntu on my computer. When I boot Ubuntu, it boots to a black screen. How can I fix this? Table of Contents:
I have problem with my double arrays. After i run my File i got "null" values. I do not know to parse this array above. public class TestDesposit { public static void main(String[] args) { double [] rev = {1.0, 2.0, 3.0, 4.0, 5.0, 6.0, 7.0, 8.0, 9.0, 10.0, 11.0, 12.0}; double [] exp = {0.0, 1.0, 0.0, 0.0, 0.0, 0.0, 0.0, 3.0, 0.0, 0.0, 0.0, 0.0}; Result res = new Result (exp, rev); System.out.println(Arrays.toString(res.Resultat())); } } public class Result { double [] mExpenses; double [] mRevenue; double [] mResult; public Result (double[] pExpenses, double[] pRevenue) { mExpenses = pExpenses; mRevenue = pRevenue; } public double [] Resultat () { for (int i = 0; i == 12; i++) { mResult[i] = mRevenue[i] - mExpenses[i]; } return mResult; } }
What are Null Pointer Exceptions (java.lang.NullPointerException) and what causes them? What methods/tools can be used to determine the cause so that you stop the exception from causing the program to terminate prematurely?
I am attempting to write a bash script that operates on each directory in a subset. Unfortunately the path contains spaces, and I am unable to change the name. The for loop insists on breaking at each space; I have tried dozens of variants, but am unable to come up with a solution. A simplified version is below. #!/bin/bash SOURCE="/Volumes/Time Machine Backups/Backups.backupdb/Zaphod" for file in `ls -d "$SOURCE"/201*` do echo "File: $file" done Can anyone suggest how I can get every entry e.g. /Volumes/Time Machine Backups/Backups.backupdb/Zaphod/2017-06-30-215735 in a separate variable.
I want to rotate all the images in a directory that match a pattern. So far I have: for file in `ls /tmp/p/DSC*.JPG`; do convert $file -rotate 90 file+'_rotated'.JPG done but that gives no output?
Lets suppose two students are talking to each other and one of them asks the other one: Hey Andrew, do you know what is the passing... in the exam? Is there a fixed term in American English or all the listed terms bellow mean the same: Passing mark Passing grade Passing score Passing point
Let's suppose a teacher wants to punish a student and wants to decrease his / her achieved points on a test paper; he would say something to the student; I would like to know which one of the following self-made examples may work here: I have to take two marks of you. I have to take two grades of you. I have to take two scores of you. I have to take two points of you. For me all the first three mean the same and though the last one is not the same, but works here either. I need to get your feedback.
I'm trying to run Binvox () via web server, on an Amazon EC2 server with Nvidia GRID K520 GPU and running Ubuntu 14.04. I'm using the system(binvox, $ret) function call in my PHP script. However, Binvox uses an X11 window to display its processing, and thus fails to run. According to the documentation, the -pb option should make it work on a headless server, however, that did not work for me. I tried using Xvfb to run it but I get the following error: Xlib: extension "GLX" missing on display ":99". freeglut (./binvox): OpenGL GLX extension not supported by display ':99' Note that applications like firefox and xclock work fine with Xvfb, but I get a similar error with glxinfo. I tried the suggestions/solutions given and , but it did not work for me. I'm not sure where should I start looking to fix it.
I'm working in a koding terminal running ubuntu 13.04, and I'm trying to run an application that requires an x-screen (even to run in terminal mode). I am unable to connect with x11 forwarding, and I'm wondering if there is a workaround that will allow me to run this application (lmms). $ lmms -v lmms: cannot connect to X server $ uname -a Linux vm-2.masd.koding.kd.io 3.9.0-0-generic #4userns5 SMP Mon May 13 06:15:34 PDT 2013 x86_64 x86_64 x86_64 GNU/Linux $ lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 13.04 Release: 13.04 Codename: raring Thanks in advance!
I am currently developing a quad copter controller that is touch screen and powered by Raspberry Pi. I already know how to program using Python, but I am having trouble making it run my only app on start up...any suggestions?
I read about how to enable and disable services in Ubuntu and it seems that there are different possibilities to manage them. The first method I found is update-rc.d to add new services to startup, which aims on the /etc/init.d folder and its contents. The other one I found is to edit .conf files in the /etc/init folder. What's the recommended way to enable / disable / add services and why? Could you please give a short bulletproof step by step example on how to add a service in Ubuntu and enable and disable it?
Example: A news show puts an image of donald trump holding up a fish on the screen. The announcer says: "Here's a photo of a slimy, scaly, reptile -- and he's holding a fish, too." I'm not sure if you'd classify this as a specific genre of joke, or wordplay, or pun. But I'm curious if there's a term specifically for it?
The Late Show host, Stephen Colbert (an American talk show host, don't mind that, just think of him as some random guy you don't have to care about) quite often uses a type of joke whereby he describes one thing to mislead you, then name the other thing that you've thought the preceding description described but in fact didn't. For example: "Some people are buying the wrong 'Fire and Fury'", instead picking up 'Fire and Fury: The Allied Bombing of Germany, 1942-1945' (...) This is amazing, this is the meeting of Disney and Beyonce. Disney isn't buying all of Fox (...) "not included in the acquisition: Fox News," which really is surprising, cause you'd think that Is there a term for this kind of joke?
This question is already answered on here. head over to that link. I have been sitting here wondering if zero is even or odd and if it is even why is it even. I have no justification for why it is odd or even. Understanding that justification would be great. It feels even, but no idea why.
Some books say that even numbers start from $2$ but if you consider the number line concept, I think zero($0$) should be even because it is in between $-1$ and $+1$ (i.e in between two odd numbers). What is the real answer?
I previous asked on StackOverflow. I was recommended here for help. There are some more details on that question. Someone has somehow gained unauthorized access to my website. They have been changing the PHP source code of the site to inject Google ads. My database and other sites on the hosting plan seem unaffected, though I have everything backed up just in case they are able to get deeper access. The site is hosted on a shared hosting, It's coded in PHP (version 7.4) and running under Apache. The hosting provider was not helpful. The recommended changing my passwords (which I had already done: FTP, CPanel, and hosting account passwords). They claim they don't have any logs on the system to check. The ads are still being re-inserted into the code every time I remove them. The injected code is different every time, and does not appear to be computer-generated, so I am certain the changes are being made by an actual human with access to the system, not malware. At the recommendation of one of the StackOverflow answers, I am scanning the site for vulnerabilities with Arachni. That scan has been running for about an hour and a half and is still going, but so far nothing helpful has surfaced there. I need to figure out how the attacker is gaining access to change my source code. I'm out of ideas for places to look. How can I detect how the attacker is accessing the server so I can shut them out?
This is a about Server Security - Responding to Breach Events (Hacking) See Also: Canonical Version I suspect that one or more of my servers is compromised by a hacker, virus, or other mechanism: What are my first steps? When I arrive on site should I disconnect the server, preserve "evidence", are there other initial considerations? How do I go about getting services back online? How do I prevent the same thing from happening immediately again? Are there best practices or methodologies for learning from this incident? If I wanted to put a Incident Response Plan together, where would I start? Should this be part of my Disaster Recovery or Business Continuity Planning? Original Version 2011.01.02 - I'm on my way into work at 9.30 p.m. on a Sunday because our server has been compromised somehow and was resulting in a attack on our provider. The servers access to the Internet has been shut down which means over 5-600 of our clients sites are now down. Now this could be an FTP hack, or some weakness in code somewhere. I'm not sure till I get there. How can I track this down quickly? We're in for a whole lot of litigation if I don't get the server back up ASAP. Any help is appreciated. We are running Open SUSE 11.0. 2011.01.03 - Thanks to everyone for your help. Luckily I WASN'T the only person responsible for this server, just the nearest. We managed to resolve this problem, although it may not apply to many others in a different situation. I'll detail what we did. We unplugged the server from the net. It was performing (attempting to perform) a Denial Of Service attack on another server in Indonesia, and the guilty party was also based there. We firstly tried to identify where on the server this was coming from, considering we have over 500 sites on the server, we expected to be moonlighting for some time. However, with SSH access still, we ran a command to find all files edited or created in the time the attacks started. Luckily, the offending file was created over the winter holidays which meant that not many other files were created on the server at that time. We were then able to identify the offending file which was inside the uploaded images folder within a website. After a short cigarette break we concluded that, due to the files location, it must have been uploaded via a file upload facility that was inadequetly secured. After some googling, we found that there was a security vulnerability that allowed files to be uploaded, within the ZenCart admin panel, for a picture for a record company. (The section that it never really even used), posting this form just uploaded any file, it did not check the extension of the file, and didn't even check to see if the user was logged in. This meant that any files could be uploaded, including a PHP file for the attack. We secured the vulnerability with ZenCart on the infected site, and removed the offending files. The job was done, and I was home for 2 a.m. The Moral - Always apply security patches for ZenCart, or any other CMS system for that matter. As when security updates are released, the whole world is made aware of the vulnerability. - Always do backups, and backup your backups. - Employ or arrange for someone that will be there in times like these. To prevent anyone from relying on a panicy post on Server Fault.
Trying to delete a particular element from a linked list void delete(int num) { Node node = head; Node prev = null; if(head.data == num) { head = head.next; } while(node.next!=null) { prev= node; if(node.next.data==num) { node.next=node.next.next; node=prev; } node= node.next; } if(node.data == num) { prev.next = null; } } error java.lang.NullPointerException at hackerEarth.linkedList.delete(linkedList.java:44) at hackerEarth.linkedList.main(linkedList.java:67) line 44 is - while(node.next!=null) line 67 is - delete(sc.nextInt());
What are Null Pointer Exceptions (java.lang.NullPointerException) and what causes them? What methods/tools can be used to determine the cause so that you stop the exception from causing the program to terminate prematurely?
What is the best way to know the best selection method for our logistic regression model ? Forward Selection Backward Elimination Step-wise Selection Full Model. I am running logistic regression in SAS EG. I have tried running each of them for the data that we have but for each method I get different results. Some of the factors are common but some are not. Basically, I just want to understand the logic behind selection of the method. So, Is there a way we can identify that for a specific data one method is better than the other based on the results that we get ? Please help. Thanks
Suppose we have $n$ covariates $x_1, \dots, x_n$ and a binary outcome variable $y$. Some of these covariates are categorical with multiple levels. Others are continuous. How would you choose the "best" model? In other words, how do you choose which covariates to include in the model? Would you model $y$ with each of the covariates individually using simple logistic regression and choose the ones with a significant association?
I was reading and I found the in the Python documentation, but I don't fully understand how the result is produced. Example: >>> def make_incrementor(n): ... return lambda x: x + n ... >>> f = make_incrementor(42) >>> f(0) 42 >>> f(1) 43 What I don't fully understand is how the number 42 gets increased to 43 when x isn't set inside the function. From my understanding every call to f is like calling a new instance of the method, but it doesn't behave that way. Questions: Why is the first call to f done like this: f = make_incrementor(42) but the other calls aren't ? How does x get set so that every number passed to the function as an argument gets added to it?
For a person without a comp-sci background, what is a lambda in the world of Computer Science?
I have the following code: class Animal { public virtual void Invoke() { Console.WriteLine("Animal"); } } class Dog : Animal { public override void Invoke() { Console.WriteLine("Dog"); } } class Dobberman : Dog { public new void Invoke() { Console.WriteLine("Dobberman"); } } class Program { static void Main(string[] args) { Animal dog = new Dobberman(); dog.Invoke(); Dobberman dog2 = new Dobberman(); dog2.Invoke(); } } Why would it print "Dog" in the first output? and why "Dobberman" in the second? What is going on under the hood?
What are differences between declaring a method in a base type "virtual" and then overriding it in a child type using the "override" keyword as opposed to simply using the "new" keyword when declaring the matching method in the child type?
So I am kinda worried about installing Ubuntu on my main PC, since I love it. But the problem is, my motherboard is UEFI. Its a gigabyte h81m-hd3. Would it be safe to dual boot Windows and Linux on this? Also, is the installation as easy as installing it on a PC that has BIOS? (I have Ubuntu on my laptop) Also, last question, let's say I installed Ubuntu and Windows, and Windows gets an update, can the update break the Grub2 bootloader? Thanks for your help, if I am able to install Ubuntu 16.04 on my custom build PC I'd be happy as hell.
Is it safe to run Windows and Ubuntu together on one PC? Will it "mess with" my computer? I'm using Windows 7. Thanks!
In my main menu I have a "menu item 1" that links to mynode1. I have successfully implemented hook_permission() and hook_node_access() so that users who do not have the "access menu item 1" permission cannot access mynode1. I assumed that the menu item link "menu item 1" would automatically be hidden by Drupal, but this is not the case. Therefore I now would like to hide that menu item to users who do not have "access menu item 1" permission. Does anyone have a code sample that would hide a menu link based on permission? (I tried hook_menu_alter() with no luck.)
I have created a panel page (i.e using panels). I can add html content to it from the panel itself using add content->New custom content. I can also add css classes (add body css classes). Now I would like to add a jquery button to that panel page. I could add a javascript to my theme but then it would be called on every page load not only this specific panel-page. So I would like to add my javascript through my module. But how do I programatically check that the current page beeing viewed is that specific page panel? Is there a hook that lets me check that? Thanks, baba
I am having some issues related to the precision with Decimals. Let's take a look at the following scenario: Decimal total = (5 / 3) * 3; System.debug(total) // this will print 4.9999999999999999 total = 5 * 3 / 3; System.debug(total) // this will print 5 The reason seems that in the first operation, the number that arrives at the multiplication is 1.66666666666666666 (Decimal precision) Is there any know bug from salesforce with this? Because in other languages I don't observe this behavior.
Ok I hope I am mising something here as I really don't want this to be a bug. The following piece of code returns 2. Per my understanding of the ceiling functionality, the result should be 3 because 7/3 is roughly 2.33333 and the ceiling should return 3. Is this a bug or am I missing something? Thanks. Integer pageNumber = (Integer) Math.ceil(7/3); This returns 2 and not 3 as expected. It works fine on other input. For example: Integer pageNumber = (Integer) Math.ceil(8/5); This returns 2 as expected.
I've been experimenting with fresh coconuts lately (they are amazing), but one thing I haven't figured out yet is how to make a nice creamy coconut milk. Mainly to make hot chocolate and eat with fruits like an yogurt, So I put the coconut water and the meat in a (not very good) blender, strained it through a sieve and refrigerated it, this is the result: The part at the top is a grainy, watery coconut mush, I was expecting it to be like cream/yogurt And the part at the bottom I assume it's really just coconut water. Looking at a carton of store-bought full fat coconut milk it contains chemical emulsifiers and thickeners, so is there no way of achieving a natural creamy coconut milk? And the store bought one never mentions it was pasteurized, one of my ideas was water bathing the glass. I also thought abount whisking it but not sure about it yet. So, what can be done to achieve a homogenous, creamy, eat-by-itself, homemade coconut milk? In regards to the duplicate question, I want to know how to emulsify it, the store bought ones do not completely separate this way and the top part is creamy unlike mine.
I made some coconut milk. After a day in the fridge there was two layers of liquid in the jar, coconut water and solid coconut which I found out afterwards that it is called coconut butter! When I stir them together to have my coconut milk back, it didn't work. Is there a way to prevent this? If not, is there a way to have coconut milk again?
I want to transfer files from my Ubuntu (installed on VirtualBox Version 5.1.26) to Windows 7 host. I'm able to copy files from my host to guest using Shared Clipboard but I want to copy the other way round. I already installed Guest Additions as mentioned in I've been through many other posts on the Internet but none worked for me. I can use WinScp or Putty or any other file transfer applications but that's not what I want, I don't want to use any alternative file sharing software for this.
I have an Ubuntu 12.04 machine on which I have installed VirtualBox with Ubuntu 12.04 as the guest OS. How can I share files between the host and guest? I have installed the guest additions also but still it’s not able to mount the sf_shared folders if even it’s mounted. This means I'm unable to retrieve the file from the host.
Very new to bash as you will see in code below. I want to get the file size in bytes of a file, compare that to a fixed value and send an email if the latter is too small. Code: #!/bin/bash f=$(find /var/lib/xxxxxx/backups/xxxxxxxxDB*.gz -ctime 0 -print -exec ls -l {} \; | awk '{print $5}') if [$f -lt 60000000000] ; then echo "hello"; fi The output of the command above is 18607414901 bytes, i.e. 18gb. What I want is to execute command if that is less than 60gb. The echo command is used just to test that. ./backupsql.sh: line 4: [: missing `]'
I am using the below script to move two days back when script runs at starting two days of the year and also check first and second days of every month and move two days back. if [$month="01"] && [$day="01"]; then date="$last_month/$yes_day/$last_year" fulldate="$last_month/$yes_day/$last_year" else if [$month="01"] && [$day="02"]; then date="$last_month/$yes_day/$last_year" fulldate="$last_month/$yes_day/$last_year" else if [ $day = "01" ]; then date="$last_month/$yes_day/$year" fulldate="$year$last_month$yes_day" else if [ $day = "02" ]; then date="$last_month/$yes_day/$year" fulldate="$year$last_month$yes_day" else date="$month/$yes_day/$year" fulldate="$year$month$yes_day" fi fi fi fi But my bad am getting the below error message Etime_script.sh: line 19: [06=01]: command not found Etime_script.sh: line 24: [06=01]: command not found
I'm running a binomial GLM in R. The data for the model comes from survey responses. The response variable is 'change in wellbeing' and the predictor variables are derived from several other questions from the survey. Many of the predictor variables are categorical, with several levels. The number of responses in each level can be very different, e.g., we have a variable 'employment status' with the following levels and numbers of respondents in each level: Retired - 650 Employed (full time) - 150 Employed (part time) - 200 Student - 3 Unemployed - 10 There are similar patterns for predictor variables such as 'ethnicity' and 'disability', with one or two of the levels containing most of the respondents, and a few other factor levels with very low numbers of respondents in them. As far as I'm aware, it's still okay to run models when some of the predictor variables look like this. The problem being that the statistical power for those levels with very low sample sizes will be very poor (e.g., from the above example, it's unlikely we'd be able to tell if being unemployed is a strong predictor of wellbeing). However, I'm wondering if there may be other problems or consideration to make when data looks like this. My questions are: Is it still okay to run models when the data look like this? Or may some factor levels need grouping? Will data like this cause any computational problems when running a model? Are there any other considerations to make when data looks like this?
I have a dataset of around 120000 (120K) unique individuals. I am fitting a binary logistic regression, where I have around 150 variables to choose from. For the categorical variables, some are very imbalanced. For example, there is a variable that can take on Yes (=1) or No (=0). There are 119K individuals with Yes and the remaining 1K with No. What are the consequences of having such a variable in the logistic regression? Can it make my results unstable if I have many of these (say 10-20 similar variables), when using stepwise (forward) or backward automatic selection procedures? What if the predictor / variable is not binary, but has for example 5 categories where 1 category is largely over or underrepresented?
I have to do an hypothesis test for two series, both distributed as a Poisson. The first groups has its mean, and the second another one: i have to test the significance of this difference. Which test should i use? The t-test for the difference between two means? I try the U-test, but I don't think it's ok cause it's only for continuous distribution, not discrete as Poisson ones.
This is an elementary question, but I wasn't able to find the answer. I have two measurements: n1 events in time t1 and n2 events in time t2, both produced (say) by Poisson processes with possibly-different lambda values. This is actually from a news article, which essentially claims that since $n_1/t_1\neq n_2/t_2$ that the two are different, but I'm not sure that the claim is valid. Suppose that the time periods were not chosen maliciously (to maximize the events in one or the other). Can I just do a t-test, or would that not be appropriate? The number of events is too small for me to comfortably call the distributions approximately normal.
Using unison for synchronization on mac, I would like to ignore files such as .DS_store in each directory. In my profile file, I put, as described in section "Ignored path" of . ignore = Regex *.DS_Store ignore = Regex *\.DS_Store ignore = Regex "*.DS_Store" but either it didn't work or I have the error: line 33: Malformed pattern "Regex *.DS_Store".
I wrote a regular expression which works well in a certain program (grep, sed, awk, perl, python, ruby, ksh, bash, zsh, find, emacs, vi, vim, gedit, …). But when I use it in a different program (or on a different unix variant), it stops matching. Why?
This is my formula in cell D2: =SUMPRODUCT(B:B=B2;F:F>F2)+1 The values in column are all of the same length, and are continually updated by contributions from google forms. Therefore a condition based on length makes no sense. How can I make an Arrayformula of this, so that the B2's and F2's change with the row numbers? The function "indirect" isn't possible in an Arrayformula.
I have the following random data in sheet one A orange D yellow C yellow B orange B orange C blue A yellow D blue C orange C blue In sheet two I use the following query function: A1=UNIQUE(QUERY(Sheet1!A1:B10,"select A, B order by A asc")) C1=sumproduct(Sheet1!A:A=A1,Sheet1!B:B=B1) C2=sumproduct(Sheet1!A:A=A2,Sheet1!B:B=B2) C3=sumproduct(Sheet1!A:A=A3,Sheet1!B:B=B3) . . . Which returns the following: A orange 1 A yellow 1 B orange 2 C yellow 1 C blue 2 C orange 1 D yellow 1 D blue 1 Instead of using sum product in each row, I want arrayformula to expand automatically. When I use E1=ArrayFormula(sumproduct(A1:A10=C1:C,B1:B10=D1:D)) I get Error: Array arguments to EQ are of different size. Please help me out.
I have a sequence $(a_n)$ defined such that $a_n = F_n/F_{n+1}$, where $F_n$ is the $n$th Fibonacci number. I want to show that there exists a real $b \in (0,1)$ such that: $$|a_{n+2} - a_{n+1}| \leq b |a_{n+1} - a_n|$$ holds for all $n \geq 1$. I've been able to rearrange this inequality to: $$\frac{1}{|(1+a_n)(1+a_{n+1})|}\leq b$$ but here I get stuck. I recognize that the terms in $(a_n)$ are not uniformly increasing or decreasing, i.e. the subsequence $(a_{2n})$ is increasing and the subsequence $(a_{2n+1})$ is decreasing, but I don't know if this is useful. Any help?
If a sequence is given by $S_{n+1}=S_n + S_{n-1}$ where $S_1=1$ and $S_2=2$ and we let $a_n=S_n/S_{n-1}$ for all $n \geq 2$. For each $n \geq 2$, prove that $|a_{n+1}-a_n| \leq (2/3)^2 |a_n - a_{n-1}|$? This is what I'm thinking... Let n=3. Then $|a_{n+1}-a_n| \leq (2/3)^{2}|a_n - a_{n-1}|$ is true for $n=3$ since $|a_{4}-a_3| \leq (2/3)^{2}|a_3 - a_2|$ $|\frac{5}{3}-\frac{3}{2}| \leq (2/3)^{2}|\frac{3}{2}-2|$ $\frac{1}{6} \leq (2/3)^{2}(1/2$ $\frac{1}{6} \leq 2/9$ Now let $n=k$ where $k \in \mathbb{R}$ such that $ k \geq 2$. Then $|a_{k+1}-a_k| \leq (2/3)^{2}|a_k - a_{k-1}|$ $|\frac{S_{k+1}}{S_k}-\frac{S_k}{S_{k-1}}| \leq (2/3)^{2}|\frac{S_{k}}{S_{k-1}}-\frac{S_{k-1}}{S_{k-2}}|$ $\frac{1}{S_kS_{k-1}} \leq (2/3)^{2}\frac{S_{k}S_{k-2}-S^2_{k-1}}{S_{k-1}S_{k-2}}$ Thus, it holds for $n=k+1$
I am still confused, despite similar questions being asked, about the difference between the variance and standard deviation in statistics. Why is the variance squared?
In the definition of standard deviation, why do we have to square the difference from the mean to get the mean (E) and take the square root back at the end? Can't we just simply take the absolute value of the difference instead and get the expected value (mean) of those, and wouldn't that also show the variation of the data? The number is going to be different from square method (the absolute-value method will be smaller), but it should still show the spread of data. Anybody know why we take this square approach as a standard? The definition of standard deviation: $\sigma = \sqrt{E\left[\left(X - \mu\right)^2\right]}.$ Can't we just take the absolute value instead and still be a good measurement? $\sigma = E\left[|X - \mu|\right]$
Within an array, how can I remove records with a repeated value? For example, I have: container_array ( [0] => sub_array ( [order_id] => 14539972 [name] => Desiree ) [1] => sub_array ( [order_id] => 14570621 [name] => Jana ) [2] => sub_array ( [order_id] => 14574112 [name] => Debra ) [3] => sub_array ( [order_id] => 14570621 [name] => Jana ) [4] => sub_array ( [order_id] => 14570621 [name] => Jana ) ) Order ID 14570621 is repeated multiple times. How can I remove the duplicates so that only one remains? The resulting array should be: container_array ( [0] => sub_array ( [order_id] => 14539972 [name] => Desiree ) [1] => sub_array ( [order_id] => 14570621 [name] => Jana ) [2] => sub_array ( [order_id] => 14574112 [name] => Debra ) )
How can I remove duplicate values from a multi-dimensional array in PHP? Example array: Array ( [0] => Array ( [0] => abc [1] => def ) [1] => Array ( [0] => ghi [1] => jkl ) [2] => Array ( [0] => mno [1] => pql ) [3] => Array ( [0] => abc [1] => def ) [4] => Array ( [0] => ghi [1] => jkl ) [5] => Array ( [0] => mno [1] => pql ) )
I'm using kubuntu 16.04 The settings are a little messed up and I'm not able to get them back to how it looks like when you create a new account. I would like to reset all system settings so that it looks like a newly installed kubuntu. How can I do that?
KDE and Gnome Desktops were looking awesome on my Ubuntu 14.04 LTS, today everything seemed ugly. Slim long font, arabic letters in Chromium/Firefox are barely readable no matter how big I made them on system font settings. How can I get back to my previous looks settings, without compromising other settings and tweaks? Here are my versions: kde4-config -v: Qt: 4.8.6 KDE Development Platform: 4.13.3 kde4-config: 1.0 kded4 --version: Qt: 4.8.6 KDE Development Platform: 4.13.3 KDE Daemon: 4.13.3
"Due to" is used on a very wide scale as "because of" but some colleagues and friends pointed out to me that this is wrong and "due to" should be used "caused by"...my question is that in the best publications and newspapers I see "due to" as "because of"...is it a matter of style or there is a linguistic rule behind it?
Is it fine to use due to in place of because of ? How about the other way around? Are any of these sentences ungrammatical? He was lost because of the storm. He was lost due to the storm. He lost his way due to the storm. He lost his way because of the storm.
I have a Seagull "4 star" "Marathon" "non-stick cookware" pan. I have decoated much of the black metallic coating of that pan with a . I made the above decoating the above after a few months in which the pan had some matt black carbonated stain with some scratches in it, which kept staying there insistently and no liquid soa[ liquid-soap marination with gentle cloth scotch brite wiping helped. My problem First, I am not sure it is still safe to use and second, after removal, one might be able to see a new, even bigger such black "carbonated" stain, appearing around the newly exposed metal. My question I removed some of the black metallic covering the pan (and now one part of the metal is exposed and another became blacker → matt black), is it still safe to use? Update I tried to pour some well refined sunflower oil and heat it, then most of the uncovered metallic part became yellow (I have no idea how to explain it); this yellowishness didn't come down with a napkin → why wouldn't it?
Everyday I have to cook using some share kitchenware, and I came across some old non-sticky frying pan that have significant scratch marks on them. I was told by my parents that I should not use any non-sticky cookware with scratch marks on them, they said cooking with them will cause some harmful/toxic substance release to the food. I have asked if they got any reference to that claim but they never told me about it. I just don't understand if those non-sticky layer can contaminate my food, why it will only be dangerous when there is scratch marks on them but not in normal condition. Could anyone tell me those frying pans are safe to use? Although there are new one in the share kitchen which I can use, I would still like to know if that safety issue is true. It would be nice if there is also reference given.
Should there be a comma in this: providing young adults access to drugs grants younger teens complete access, which can not be accepted given the consequences that would follow
I'm not sure which of the following sentences is correct. Is the comma mandatory, optional or unnecessary? I've googled a bit about this topic, but I got confused. Our mapping contains 2000 words, which map to more than one lemma. or Our mapping contains 2000 words which map to more than one lemma. Context: In total, there are more than 2000 words. I've read . If I understand the answers correctly, my "which map to more than one lemma" is a defining clause and no comma is required. But is it wrong to add one?
I recently received a "DNA Match" on my account to some one who shows 1,177 cM shared. I am trying to understand what this is really telling me. This is important to me as I do not know who my Father is but suspect I have a whole set of half siblings from his side. I know who my mother was and have met my 1/2 siblings from her marriage to their Father, hence knowing my niece as stated below. I have another post that shows 810 cM shared and that individual is my niece by my half sister.
Given two tests that share some cM of autosomal DNA, how can I easily find the predicted relationships that such shared cM would suggest? For example, a 2,200 cM match suggests it could be either: grandparent, half-sibling, or grandchild.
When I try to start gnome terminal from launcher, nothing happens. except terminal Icon starts glowing for a few seconds and then nothing .... But when I try to open it through urxvt, It starts without any kind of error or output.
I've installed Ubuntu 16.04 and everything seems to work fine, except that I cannot start gnome-terminal from Unity launcher or from a shortcut locked to the side panel. However, gnome-terminal starts fine from Xterm or from right-click>Open Terminal. I can also run gnome-terminal by Alt-F2. So, this seems to be a problem with Unity? When pressing on gnome-terminal from Unity launcher or from a shortcut, the gnome-terminal icon just pulsates a bit, after which the shell terminates. I never see the shell itself, just its icon on the sidebar. Searching for Terminal in Unity launcher, it finds gnome-terminal, but its name is "nlykkei@nlykkei-Ubuntu:~" and not the usual "Terminal". Also, gnome-terminal doesn't show colors anymore, like green for an executable, etc. Can someone guide me on how to restore my Unity Terminal? I've already spent 2-3 hours on Google, attempting to solve the problem by configuring locale settings.
If something increase $50$ to $200$, I know that it is $400\%$ increment using common sense. I can get this using $\dfrac{200}{50}\times 100\% = 400\%$. If something increase $50$ to $52$, I know that it is $4\%$ increment using common sense. But if I apply the same logic, $\dfrac{52}{50}\times 100\% = 104\%$. What is the problem in my logic?
When someone uses the phrase "percent increase" what does that mean? For example, if something took 4 seconds before and now it takes 1 second, would that be a 400% increase?
I use Windows. I want to delete all files and subfolders older than 5 days by system call. I have this command, but i want to delete all files and subfolders older than 5 days. FOR /D %i IN (C:\mydir*) DO RD /S /Q "%i" DEL /Q C:\mydir*.* Do you know an easier way?
I'm looking to make a "Drop Folder" in a windows shared drive that is accessible to everyone. I'd like files to be deleted automagically if they sit in the folder for more than X days. However, it seems like all methods I've found to do this, use the last modified date, last access time, or creation date of a file. I'm trying to make this a folder that a user can drop files in to share with somebody. If someone copies or moves files into here, I'd like the clock to start ticking at this point. However, the last modified date and creation date of a file will not be updated unless someone actually modifies the file. The last access time is updated too frequently... it seems that just opening a directory in windows explorer will update the last access time. Anyone know of a solution to this? I'm thinking that cataloging the hash of files on a daily basis and then expiring files based on hashes older than a certain date might be a solution.... but taking hashes of files can be time consuming. Any ideas would be greatly appreciated! Note: I've already looked at quite a lot of answers on here... looked into File Server Resource Monitor, powershell scripts, batch scripts, etc. They still use the last access time, last modified time or creation time... which, as described, do not fit the above needs.
Why is the set of polynomials $M=\{ f(x)=2\lambda+7\lambda x +4\lambda x^2 + x^3 | \lambda \in $R$\}$ not a vector space over $R$?
This is one of my linear algebra problems: Prove that polynomials of degree $n$ does not (The professor made these words bold intentionally) form a vector space. From what I read, the set of polynomials of degree $n$ should be a vector space, because: There is an "One" and a "Zero" in this set; We can find inverse for addition and multiplication from this set; It follows all the axioms of addition. It follows all the axioms of scalar multiplication. Then can someone give me some hints to prove it does not form a vector space?