id
stringlengths
50
55
text
stringlengths
54
694k
global_05_local_5_shard_00000035_processed.jsonl/9150
Notebook Dump: Missing High School Oh, man. So late today for a Friday appointment that this post will barely even contain full sentences. Busy week. Exciting new tech on the site. Our first fashion review. And did I get to everything? No way. More Dragon Age, Spore Hero, SimsAnimals Africa, EA Sports Active coverage next week. And that's not counting the games EA showed me that they won't let me write about until weeks beyond that (you've heard of these games before; you just don't know about the new stuff in them, unfortunately). This is Notebook Dump (very special, Terrible Edition). I'm supposed to give an example of something I didn't turn into a post and will never be a post. How about that EA has a game about being in high school coming out for iPhone, but I didn't get to see it? Hmm. (At least I have a screenshot of it in this post. It's called Surviving High School.) Oh: At the DJ Hero event I played the guitar-turntable combo mode. I played the turntable to a Gang Starr song. A guy from Activision played the guitar. I can't remember what his part of the song was. I played on Medium, he played on Expert. We couldn't fail. I asked if the other player could play drums instead. Not in this version, but the team is open to seeing which kinds of songs people want for the future, he told me. That's all I can think of now. Sorry folks. Go back and read my massage story, then. It's informative and partially funny, I think. Have a nice weekend.
global_05_local_5_shard_00000035_processed.jsonl/9152
The iPad 2: Gizmodo's Complete Coverage The iPad 2 is here. And yeah, it's pretty great. Despite the early looks, we're still finding surprises. Like? The screen is definitely better than the original iPad's. That's just the beginning. Here's Gizmodo's ongoing iPad 2 coverage, from speedtests and graphics battles versus the original iPad to essential apps (and app deals), a possible answer to that most pressing of questions—white or black iPad?—and a quick buying guide.
global_05_local_5_shard_00000035_processed.jsonl/9154
The New Game of Thrones Board Game Sounds Excellent, Diabolical I haven't yet been able to track down a copy of the new Game of Thrones board game, let alone carve out four to eight hours to sit down and play through a game. But from the sound of things, that might be for the best. Not because it's bad, but because it requires so much deviousness and backstabbery that it can cost you your real-life friends. Over at the board game site Shut Up & Sit Down, Quintin Smith and Paul Dean (both of whose work you've probably seen at Rock, Paper Shotgun) took a spin through the game and recorded their thoughts on it. In short: it sounds totally great, and totally intimidating. It would appear it takes place more or less during the events of the second book in the Song of Ice and Fire series, A Clash of Kings. Many various families are vying for the throne, and players have an opportunity to represent those bloodlines and forge alliances and connive in order to come out in possession of the Iron Throne. But it's much more complicated and diabolical than that. Betrayal and gang-ups are engineered into the game's fabric, and it really does sound like a board game that could seriously damage friendships, should the players take it too seriously. And given that my friends and I take Monopoly too seriously, we would probably be in trouble. After outlining the basic rules, Smith points out why they engineer forced trust, and therefore eventual betrayal: The rules explicitly state that nobody can show anyone else an order token before they're all flipped and made public, meaning alliances and cease-fires are at all times based on trust. The horror. Simply put, it's this order token mechanic that makes Game of Thrones the fearsome, fantastic, entirely faithful game it is. Everything else is almost window dressing. It's also what makes Game of Thrones a game that destroys relationships. On three occasions in our game - the repelling of a Stark invasion of Greyjoy's foothold in the mainland, a sudden Greyjoy invasion of Lannisport and the undignified destruction of some Tyrell forces down South - players were reduced the kind of polite yet utterly transparent fury that I know, had we been kids, would have seen players walking away from the table to have a cry. The game looks gorgeous, with lots of hand-drawn cards, a huge board, and tons of great-looking pieces and parts. Despite the fact that the rules are more than a touch impenetrable (they clock in at 29 pages of small text), it sounds like something that I would very much like to play, risks be damned. As Dean puts it: Perhaps you're now seeing why this would be both an excellent and terrible Christmas present. It's a gorgeous game. Smart, cruel and pretty in equal measure. A perfect present for that special boy or girl in your life who's both a gamer and a Song of Ice and Fire fan. But board games received on Christmas day tend to be played on Christmas day, and a list of games I'd rather play with my drunk relatives would be as long as my leg and include spin the bottle. Even if everyone understood what the crap they were doing, someone getting betrayed and entering a year-long sulk is a very real prospect. Go check out the full review, and if you track down a copy, let me know how it is. I'm seriously considering getting it for someone in my family. But then again, I love my family, and would never turn against them. Or would I? You know, if this game can get me to turn against my own blood it would be channeling Game of Thrones effectively, indeed. Review: A Game of Thrones [Shut Up & Sit Down] A Game of Thrones: Board Game Edition []
global_05_local_5_shard_00000035_processed.jsonl/9155
Call of Duty Population Explodes to 40 Million Users, Half Coming From Modern Warfare 3 Activision today said its Call of Duty franchise has more than 40 million monthly active users across all of its titles, half of that coming from the latest release, Modern Warfare 3. What's more, there are 7 million users in the game's Call of Duty: Elite online service, 1.5 million of them as paying annual members. In January, Xbox Live reported that the three most recent Call of Duty titles went 1-2-3 in its listing of most popular games played on the Xbox 360. The figure concerns all users playing while logged into Xbox Live, not just multiplayer. Call of Duty: World at War and Call of Duty 4: Modern Warfare also made the top 20. Activision said both games, released in 2008 and 2007, respectively, split 5 million users. Activision confirmed it's working on the second iteration of Call of Duty: Elite, which will support this year's release of the series.
global_05_local_5_shard_00000035_processed.jsonl/9157
Mark Crowe and Scott Murphy, creators of the Space Quest series of adventure games by Sierra Online, today announced they were gettin' the band back together, under the (Two) "Guys from Andromeda" nickname they coined for themselves so long ago. There isn't much yet to announce in the way of funding, game direction or details, but the Two Guys do need your help. The video is just a spread-the-word effort trying to trundle up social media support for their project through Facebook or Twitter or YouTube. The company is also hiring. Space Quest, the sci-fi adventure tale of hapless space janitor Roger Wilco, spawned six titles between 1986 and 1995 for Sierra Online. The Two Guys from Andromeda have returned! [Official Site. h/t Joe C.]
global_05_local_5_shard_00000035_processed.jsonl/9158
The Tricky Math Of A $99 Game Console [Update] Ouya sprung onto people's radar recently with an incredibly desirable, or at the least incredibly interesting pitch. The would-be console makers offer a cheap alternative for gamers to play, and even hack and mod their way through the hardware and games potentially offered on the platform. But Ouya can't possibly be relying on hardware sales for their business model. Speaking with me on Wednesday about Borderlands 2, Randy Pitchford dove into current industry matters. We got on the subject of Ouya (Oh yeah? Ouija?), and he knows that the Ouya makers will have to make money somehow. This sugar-coated pitch can't be everything. Ouya can't continue to exist off of simply Kickstarter profit, that much is obvious. And they can't rely on selling units in the future at $99 a pop. Why not? Pitchford explains: "They asked for a million, so they must have planned this out. They were selling them to the people that were buying them through the Kickstarter for $99. Take a million divided by $99. That's 10k units. Let's imagine their margin on the hardware is $10, which I think is actually exaggerating, considering what's actually in this thing. $10 times 10k units, that's $100k. You can afford four guys for two months. That's not a business. Maybe this is just the thing to get what their business is off the ground, and they'll say whatever they need to say to get Kickstarter to work in their favor." Pitchford guesses that Ouya will take the tried and true method other consoles companies have for monetization, namely taking some sort of cut off of software sales. It seems likely that this could at least be a considered business plan for the Ouya folks in moving forward. [Update: Ouya does take a cut of the revenue made on games sold through their app store, as noted in their FAQ on their Kickstarter page.] Playing off the hype and excitement of the new console, Ouya could be luring us into their field before delving deeper than this tip of the iceberg. Kickstarter is just the first step in a longer business plan set for the future. But is Pitchford excited about this platform, future undisclosed monetization plans or not? Absolutely. "If there's a machine that's capable, that people love using, and there's a lot of people consuming games on it, I'm going to be really excited to create content for it. What it actually is doesn't really matter to me. But it [the Kickstarter draw] is a really clever, interesting play."
global_05_local_5_shard_00000035_processed.jsonl/9160
Why Kids Keep Crapping in Public in China Note: this story contains a subject matter some readers might find uncomfortable. The vast majority of public crapping in China appears to be limited to kids, but a small number of adults also do it—though they tend to be far more discrete. In the countryside, outhouses still exist, and the cities have made leaps and bounds in public restrooms (especially in the years leading up to the Beijing Olympics). However, many toilets in the cities can get dodgy. Below is a public toilet in Beijing with warning signs: Why Kids Keep Crapping in Public in China Why Kids Keep Crapping in Public in China A few years ago, I interviewed a famous industrial designer for a magazine. He's Japanese—not Chinese—and we did not once talk about defecating in public. However, we did talk about this theory that humans have a natural relationship with things. For example, if you have trash in your hand, and you see a bicycle with a basket, you might pitch it in the bicycle's basket. This is littering and isn't socially acceptable, but that bicycle basket does resemble a waste paper basket, and instinctively you might use it for that. Going to the bathroom in public place, perhaps, works on a similar rationale—especially since a Guangzhou subway bin does resemble a toilet. Somewhat. But China is changing. For people in the country's urban middle and upper classes, going to the bathroom in public is increasingly not socially acceptable as it is in more rural areas. When photos, like this recent one of a teen pooping in a trash can, hit the internet, people get upset. Eventually, these social views will continue to filter through society. Norms will continue to change, just as the country continues to change, and these public toilet displays will gradually fade away. (Top photo: DiscoDad | Shutterstock)
global_05_local_5_shard_00000035_processed.jsonl/9161
A Game You Win With Your Blood So. Much. Blood. Haemo is a game in which you're fatally wounded and bleeding from the get-go. I'm not talking Uncharted-2-style cinematic "oh no is the main character of this game who I'll be playing as for the next 12 hours gonna make it through the first five minutes of the game?!?" bleeding, either. Each blood-soaked step your bug-eyed avatar takes brings him/her/it another inch closer to The End. Except that in Haemo, The End really isn't the end at all. Death takes you back to the beginning, but that doesn't mean someone's come through and mopped up all your progress. As you move through the game's invisible maze, your blood slowly but surely marks a path—or multiple paths, really. The maze is large and branches in all sorts of crazy directions. Enemies use this to their advantage; they're white as ghosts and blend almost invisibly into non-bloodied backgrounds. The result is an extremely tense game, albeit one drowned in trial-and-error in addition to, you know, blood. Learning the maze requires time and patience, especially when enemies are almost impossible to see on your first run through an area. A Game You Win With Your Blood It can get pretty frustrating sometimes, especially when your default attack has all the range and power of a mold-soiled trash bag. Enemies appear, you can't react in time, you die through very little fault of your own, repeat. Combine with narrow pathways to maximize incoherent curse word usage. Haemo's concept is incredibly cool, though, and once I started moving around more—rarely pausing despite the fact that skittering around actively drains blood—I had a little more success. You can grab it for free here. Have fun bleeding everywhere and then dying alone and frightened! I know I did.
global_05_local_5_shard_00000035_processed.jsonl/9162
The Braid of First-Person Shooters Is Totally Free Indie developers can be just the best. Like, for instance, when Piotr Iwanicki and and Blue Brick crew (not a '70s funk band, by the way) made Superhot in a 7 Day FPS Challenge, then refined it a bit, and then posted it online for free. And it's brilliant. Kotaku AU describes Superhot as "like Braid with guns," but that only tells part of the story. Perspective matters. Because this game is in first-person, it carries with it the presumptions of the first-person genres. Then, it flips those conventions into something more like a strategy game by causing time to only move as you move. A couple of well-placed enemies and pistols later and the product is a succinct, thoughtful blast. And, lest we forget, this thing is free! Using a Unity web engine, anyone can start cranking away at the faceless enemies in seconds. Click here for the link. That kind of convenience goes a long way. If you'd like to support a fuller version of Superhot for Steam, check out its Steam Greenlight page.
global_05_local_5_shard_00000035_processed.jsonl/9163
You’d think that a high-tech superhero concept like Iron Man wouldn’t work in Skyrim. You’d be wrong. Machinima user Tyrannicon dropped Iron Man into Skyrim and the results are funny and inventive. The Skyrim version of Tony Stark does all right for himself, even though he's limited to a forge and magic spells (and Fus Ro Dah Wayfarers) to create his suit. The nine-minute clip sums up Iron Man’s origin story and delivers a load of magical repulsor beams-vs-broadswords action. Somebody get to working on a mod for this, okay? IRON MAN: Skyrim At The Movies - TYRANNICON [YouTube]
global_05_local_5_shard_00000035_processed.jsonl/9165
I was watching a Scientific American Frontiers episode in which a scientist named Syndonia Bret-Harte was quoted, and I was struck by her name—not so much the last name, allusive though it is, as her given name, which a Google search showed to occur every once in a while (mostly in 19th-century names) but which I could not find in any reference works (dictionaries of names, Greek, Latin, &c). I won’t bore you with the details of how I tracked it down, but I eventually discovered that it’s a variant of Sidonia, whose most common English variant is Sidony. I’ve found two online explanations. The first is here: Sidony: this name was formerly used by Roman Catholics for girls born about the date of the Feast of the Winding Sheet (i.e. of Christ), more formally alluded to as ‘the Sacred Sendon’. ‘Sendon’ or ‘Sindon’ (from Latin ‘sindon,’ Greek sindon ‘fine cloth, linen’) was used in Middle English for a fine cloth, especially one used as a shroud. The Sacred Sendon is supposed to be preserved at Turin. That ‘Sidony’ or ‘Sidonia’ =’Sindonia’ is shown by an example from Shropshire, 1793, ‘Sidonia or Sindonia Wilden.’ ‘Sidonie’ is not uncommon in France, and the Irish ‘Sidney’ is probably really ‘Sidony.’ No early example of the name has been found, but it seems likely that the surname ‘Siddons’ has this origin. But the Dictionary of First Names has a more scholarly version: From Latin Sid{o_}nia, feminine of Sid{o_}nius, in origin an ethnic name meaning ‘man from Sidon’ (the city in Phoenicia). This came to be associated with the Greek word sindon ‘winding sheet’. Two saints called Sidonius are venerated in the Catholic Church: Sidonius Apollinaris, a 4th-century bishop of Clermont, and a 7th-century Irish monk who was the first abbot of the monastery of Saint-Saëns (which is named with a much altered form of his name). Sidonius was not used as a given name in the later Middle Ages, but the feminine form was comparatively popular and has continued in occasional use ever since. It was all worth it to discover the origin of the name of Saint-Saëns! For a little added fun, the Czech equivalent (originally a diminutive) is Zdenek (masc.)/Zdenka (fem.). 1. Thanks for posting this. I saw the same program and the same scientist and was wondering where the name originated. Thanks for sharing your research! 2. My pleasure! 3. Very Interesting! My daughters middle name is Sidonie, I just fell in love with the name(and she has French ancestry on her Dads side so it fits). 4. sidonia mary says: i was named sidonia after grand mother’ s sister they were born in ireland 1830′s i was born 1937 of irish parentage i would like contact with others with name of sidonia.very pleased to find info on origin of name thank you 5. I was named for my Aunt (my mother’s sister). The story I heard as a child was that there were people named Syndonia in my family back in the 1600s and 1700s, but not for a long time after that. My grandmother thought that the name was pretty, and wanted to use it again, so gave it to my Aunt as a middle name. My ancestors on my grandmother’s side were from the UK and Ireland, so this fits with what you have discovered. I am interested to see what you have found, as my family doesn’t have any information on the origin of the name. Thanks for doing this research. By the way, on my other side, my great-great-grandfather was the American author Bret Harte (his pen name; his given name was Francis Harte). He asked his children to take his pen name as their last name, so after several generations, I inherited the name from my Dad. I put the hyphen in to make less confusion when paperwork needs to get filed. 6. Wow, it’s great to hear from you a decade after I posted this! Thanks for the family lore, and I’m glad I was able to help with the etymology. 7. marie-lucie says: Sidonius Apollinaris is known in French as “Sidoine Apollinaire” (with Sidonius > Sidoine as with Antonius > Antoine). I never thought of associating the first name with “Sidonie”, let alone Saint-Saëns. The female name seems to have been relatively popular in the 19th C. It was one of the given names (and the usual one) of the mother of the writer Colette, who referred to her as “Sido” (probably the diminutive her husband used) in her autobiographical works. “Colette” herself was officially Sidonie-Gabrielle Colette (Colette being her father’s last name). I am sure I have heard of other Sidonies among more ordinary women. No other Sidoines among men though. 8. David Marjanović says: I know one; her nickname, of course, is Sido. 9. marie-lucie says: David, what is her approximate age? When I was young, Sidonie would have been hopelessly old-fashioned, but in recent years many old names have been revived. So I would expect a Sidonie to be either very old or very young, but not in between. 10. David Marjanović says: either very old or very young Yep, she’s a few years younger than me. Other names found in that age group are Aurore and Ludivine – the latter of which I found so difficult to even imagine that I asked how it’s spelled, convinced I must have had misheard 2 or 3 times in a row. 11. Brian Woodward says: I have 22 Sindonia/Syndonias in my family tree. The first Sindonia Stanton b30 April 1755 and baptised 20th May Presteigne Wales. Only 3 born in England after 1916. Speak Your Mind
global_05_local_5_shard_00000035_processed.jsonl/9174
Reset your lost OS X password If you've ever forgotten your user account password in OS X, the Hackszine weblog details the simple process of resetting or changing your password. All you need is to remember your username (you do remember that, right?) and then reboot your computer. From there it's command line work: • Hold Apple+S when booting to enter single user mode • #sh /etc/rc • #passwd yourusername • #reboot The only major downside to resetting your password this way is that you'll lose all keychain passwords, but if you've really forgotten your password, it's better than nothing. Windows users, you can also reset a lost or forgotten password. If you feel more adventurous, you can also completely crack the password.
global_05_local_5_shard_00000035_processed.jsonl/9175
Knoword Is a Fun Way to Test (and Expand) Your Vocabulary As you trudge through the last few hours of your Friday, consider easing your boredom with Knoword, a fun game that tests and improves your vocabulary through a definition-based game. Knoword is remarkably enjoyable; it gives you dictionary definitions and the first letter of a word and you have to guess the word within a specific time period to continue. After missing a few, you have to start over. It sounds more difficult than it really is—you might be surprised at how quickly some words come to your mind after reading their dictionary definitions. It's still a good challenge, though, and it's incredibly addictive. It's not exactly going to help your productivity, of course, but you can always ease your conscience by telling yourself it's educational. Hit the link to check it out.
global_05_local_5_shard_00000035_processed.jsonl/9179
Organize Kids Coloring Supplies in a Dish Rack Kids love leaving crayons and coloring books all over the place. If you're a parent or will just have a lot of kids around for the holidays consider using a cheap dish rack as a coloring supplies organizer. Personal weblog Heather J's Life shared how she found the idea in an old issue of Real Simple. Just put crayons in the utensil holder and file books in the dish rack itself. Definitely not rocket science, but if you're about to have a household of kids invade for your house for the holidays it might be worth spending $5 at a dollar store so they can be occupied during their visit.
global_05_local_5_shard_00000035_processed.jsonl/9180
Google Calendar in Windows 8, DIY Mallets, and Laundry Timers Readers offer their best tips for accessing Google Calendar in Windows 8, replacing the rubber mallet you don't have, and timing your laundry. Google Calendar in Windows 8, DIY Mallets, and Laundry Timers Subscribe to Your Google Calendars In Windows 8 with a Workaround Microsoft recently removed the ability to use Google Calendar in Windows 8, but DDenbigh shares a workaround that eases the pain: If you want to subscribe to Google calendars in Windows 8, head to that calendar's settings and find the private ICS feed. Then, subscribe to that in Windows Live calendar. Then you'll be able to view it in Windows 8 (it's read-only, but better than nothing). This works for all your calendars in Google, not just the primary one You can see more detailed instructions here. Google Calendar in Windows 8, DIY Mallets, and Laundry Timers Turn a Hammer Into a Mallet with a Tennis Ball Sometimes, a hammer doesn't do the job, and you need a rubber mallet (or something similar). James solves this problem elegantly: Today I needed a mallet for a car repair, but I don't have one. So I cut a tennis ball and slipped it onto my hammer. Problem solved. Google Calendar in Windows 8, DIY Mallets, and Laundry Timers Use Your Phone's Voice Assistant for an Instant Laundry Timer We've shared a few clever uses for voice recognition, but sicklyslick shares a really simple one: Voice Actions are very useful for laundry. Whenever i do laundry I just tell my phone "remind me to check the laundry in 45 minutes" and Google Now will add an alarm. You can also say "add calendar" or "set an alarm at." Obviously, you can do this with Siri as well. It's simple, but really useful for those of us that forget to set timers, or want to do it as quickly as possible. Google Calendar in Windows 8, DIY Mallets, and Laundry Timers Keep Projects on Separate Drives to Avoid Distraction Geekgirlbarbie keeps herself focused with a few flash drives: I'm very easily distracted, and while I loved the idea of interchangeable workspaces, I've always had trouble figuring out how to do it for digital-based projects. And now I have! For any digital based project, I keep a small separate flash drive, which I label with the projects name. On the flash drive I include any necessary files or PDFs, plus a portable version of Firefox with the websites I need bookmarked: helpful articles, sites to search for information, etc. It keeps me focused, since the project is RIGHT in front of me and takes away a number of distractions ("Where's that file, these are a mess, I should organize them" or "Wow, I haven't worked on this file in 3 days! I'll do that now instead!"). It also makes switching between tasks a breeze: the timer goes off, I eject flash drive, grab different flash drive, and I'm good to go. Photo by
global_05_local_5_shard_00000035_processed.jsonl/9188
Re: Proposed Simplifications to the DeltaV protocol From: Greg Stein <[email protected]> Date: Mon, 26 Mar 2001 22:44:37 -0800 To: [email protected] Message-ID: <[email protected]> On Tue, Mar 27, 2001 at 12:40:51AM -0500, Clemm, Geoff wrote: > The consensus of the room at the DeltaV working group session was that > we should remove the Label header, to avoid this internationalization > problems. Since the Label header is an optimization (i.e. you can use > PROPFIND to determine the information), this was considered the > appropriate response to the area directors concern. Note, the proposal > is not to remove the LABEL method, just to remove the Label header. > Any objections? Hmm. I believe that I do. In my particular scenario, I have a VCC and need to PROPFIND one of many baselines, using a Label as the selector. Without the Label header, I'd have to PROPFIND every single baseline to find the right one, wouldn't I? Is there something that I'm missing? Assuming that I haven't missed something, then yes: I would object. I can't see how to create similar functionality in other ways. >... defer the Variant Option ... > Any objections? Deferral is fine with me. I have no interest in this, and I honestly don't see it as a useful feature for any versioning server. (IOW, with my personal hat on, and my independent hat on, I see no/little utility) > The third proposed simplification was to defer the "Update Option", > with the intention of leaving it out of the protocol unless its > addition is more strongly motivated than it is currently. In > particular, if you want to expose an older version of a VCR, you can > just check out that VCR, copy that older version into the checked-out > resource, and then check it back in. This has the added advantage > that this does not block future work on a linear versioning server, > the way an UPDATE would (i.e. you can only check out the tip in a > linear versioning server). It also has the advantage that it is more > compatible with the baseline and activity features, that want to > define states as merges of baselines and activities, rather than > manipulations of individual versions. > Any objections? I'm not sure about the proposed workaround (that appears to alter the tip, rather than expose an older resource), but I see little use for the UPDATE method, too. Consider: if you have a VCR that you intend to point at an old version for a long period of time, then why not just give out the version resource URL to begin with? A server could also use bindings to establish a collection of older items. You could use baselines. Lastly, you could expose a workspace that has been smacked with MERGE to point at old resources. IOW, I tend to see VCRs as always floating to the latest. Tweaking their value (other than as part of a checkin) seems of little utility. I'm happy to defer/punt the feature. >... folding branch control into the core ... > Any objections? Totally fine. That isn't a big change/imposition. >... packages ... > client workspace configuration management: > core > version-history > working-resource > merge > label > baseline > activity > version-controlled-collection Hey! That looks like Subversion :-) > Any objections to these packages? Greg Stein, http://www.lyra.org/ Received on Tuesday, 27 March 2001 01:44:19 UTC
global_05_local_5_shard_00000035_processed.jsonl/9194
RE: guideline 7.1 about screen flickering (fwd) From: gregory j. rosmaita <[email protected]> Date: Thu, 26 Jul 2001 23:35:15 -0400 (EDT) To: Kynn Bartlett <[email protected]> cc: [email protected], [email protected] Message-ID: <[email protected]> aloha, kynn! Kynn wrote: > >3. what is the foreground color/color of the text? is it green as well? > >(that seems to be the motif) > Red. > >4. is the font used a serif or sans-serif font? > Serif, maybe something like Times New Roman. Is that important? red on green raises a red flag for obvious reasons... i asked about the font because sans-serif fonts are far more popular with low vision users than serif fonts for a number of reasons, the main ones being that they provide sharper, better defined contrast with the background and that they scale much better; from a strictly legal point of view, the "minimum requirement" set by the united states postal service for "large text" for the purpose of sending printed material "free matter for the blind" is 16pt arial (a sans-serif font), which has always sounded pretty small to in any event, considered from a general usability point of view, are not sans-serif fonts considered more "readable" and "easier-on-the-eye" especially when rendered over a variable background (such as from a background image or pattern)? although i don't have a visual memory of the verdana font face because i don't think it had been developed before i lost my sight, i'm sure it is far more legible at any size than "goudy old style", which is why the VICUG NYC (title="Visually Impaired Computer Users' Group of New York City") web site's default stylesheet uses verdana as its base font (with a fallback onto the generic "sans-serif"), but Camera Obscura, my personal site, uses a serif font (actually a few, depending upon your UA's support for stylesheets, your local font library, and/or whether you have configured your UA to ignore author defined fonts and colors or are running a client-side stylesheet) >>i suppose that no one who approaches the graphic with a tabula rasa would >>know the answers to the first 2 questions, which indicates to me that this >>particular graphic isn't a very successful conduit of information... KB response: > Not necessarily, it depends on (a) what it's meant to do, and (b) how > it is used. Let's not assume that looking at a graphic in a background > can tell us anything about how useful it is!! NEW GJR: well, that's why i would have preferred if the UPC webmaster had seen fit to attach a mock-up of the page on which the graphic will be used so that it could also be perceived in context... even the block of markup in which the image will be contained would have provided more context... i also wonder if seeing the graphic in context would have led to different descriptions, such as "American Association for Mental Retardation RADAR logo" or some such... but, we were asked to judge a particular animated graphic in isolation, which is what we've been doing... > >i'm not sure i would if the alt text just said: "RADAR @ AAMR", which > >appears to be the literal textual equivalent for the graphic... still, > >there is a checkpoint in WCAG1 (checkpoint 4.2) which recommends providing > >an expansion for acronyms and abbreviations where they first occur... KB response: > This is an effect of a broken spec for the <img> tag. Currently > you can only do this: > <img alt="RADAR @ AAMR" /> > ...or an expansion of the same. > But ideally you should be able to do: > <img> > <abbr>RADAR</abbr> > <abbr>@</abbr> > <abbr>AAMR</abbr> > </img> > The problem is that <img> is an empty tag when really it should be like > <object>. NEW GJR: well, technically, _i_ could have, since i declared XHTML 1.0 on my "mystery graphic" page, not to mention my personal preference for "rich", rather than constrained mechanisms for providing conditional content, but i don't want to break anyone's browser and i want as many people as possible to be able to use the page, no matter what browser they which is also why i reluctantly continue to use the character-entity code to generate a quote (&#34;) rather than demarcating text as a quote with the Q element... i'd vastly prefer to use the Q element for a number of reasons -- obviously to reflect structure in the markup, is one reason, but an equally important reason is that use of the Q element leaves the choice of quotation convention open to the user (or his or her or her UA, which might interpret Q according to either the natural language in which the OS is running or automatically deliver the appropriate quotation and quotation nesting conventions for a page based on the natural language declared for that page... it also allows for restyling of the entire block demarcated by the opening and closing Q tags, so that it stands out from the rest of the text, at least visually and aurally, using the styling palette currently available... ok, it is a real pain in the posterior to compose email via this particular shell account (which is one of the biggest thorns sticking out of my side, as this is currently my only means of receiving email), so i'll stop for now... did i answer your counter-questions, kynn? CORPORATION, n. An ingenious device for obtaining individual profit without individual responsibility. -- Ambrose Bierce, _The Devil's Dictionary_ Gregory J. Rosmaita, [email protected] Received on Thursday, 26 July 2001 23:35:19 UTC
global_05_local_5_shard_00000035_processed.jsonl/9196
Re: Important: Issues relating to checkpoint 2.1 raised during 30 March teleconference. From: Philippe Le Hegaret <[email protected]> Date: Fri, 31 Mar 2000 19:01:57 +0000 Message-ID: <[email protected]> To: [email protected] From: Ian Jacobs: > Issue 3: What does "content" mean? > There seemed to be disagreement about the definition > of "content" in the Proposed Recommendation: > "In this document, content means the document source, > including its elements, attributes, comments, and other > features defined by a markup language specification such as > HTML 4.01 or an XML application. Refer also > to the definitions of rendered content and equivalent > alternatives for content." > This is distinguished from rendered content, whose > definition begins: > "Rendered content is the part of content that is > rendered after the application of style sheets, > transformations, user agent settings, etc." > In fact, the situation is even more complicated than > that. There seem to be more than two "layers": > - There is document source, which includes associated > style sheets, external content such as images, > and probably information communicated in HTTP headers. > - There is the document tree, which may include > content generated by scripts and transformations. > What about content generated or suppressed due > to user preferences (e.g., use "abbr" for table > cell headers instead of TH content)? > - There is the rendered content, which is what actually > gets presented to the user. In CSS, content generated > by style sheets is considered part of rendered content. > However, will DOM 3 include this as part of the DOM > tree? (I don't know enough about DOM 3 plans to > know this.) > I think "rendered content" is supposed to be "what the > user gets", which is how I heard some people using > "content" yesterday. > Hans refers to these three levels in his email of 31 > March [6]. > I invite people to suggest ideas for clarifying the various > states of content from source to DOM to viewport. DOM Level 1 and 2 address the second layer : the document tree. This is the DOM Level Core. The content generated or suppressed is, from your point of view, part of the third layer. DOM Level 2 address some parts of the first layer : associated Cascading style (with DOM Level 2 CSS). DOM Level 2 HTML gives access to the content of sub in objects and frames only if the sub document is XML or HTML. You don't have access to the content of images or HTTP Headers. DOM Level 3 will address the third layer: the rendered content. We call "Views and Formatting" this future module (see [1]): "The abstract structure and value of the document content is modelled by the DOM core. The physical characteristics and state of the presentation will be modelled by the views and formatting module. Received on Friday, 31 March 2000 14:01:58 UTC
global_05_local_5_shard_00000035_processed.jsonl/9197
Re: W3C Patent Policy: Bad for the W3C, bad for business, bad for users From: Bruce Krysiak <[email protected]> Date: Sun, 30 Sep 2001 13:18:04 -0500 I also tend to agree with Alan and Dave. This discussion might be more productive if someone were to present a plausable, concrete story on why the RAND policy will be better for the web than an RF only policy. I can see two possible scenarios for why you might take a RAND stance on this issue: - recognizing a de facto standard that a company has promulgated (maybe Flash, Quicktime, or MP3 would fall into this category?) - there is no other option yet for a standard In either case, I would argue that the W3C should encourage the development of RF standards rather than help proprietary formats "lock-in". I think there should be no W3C standard rather than an official recognition of RAND-based standards - the market will decide which option will win. I think the W3C should represent the voice of the internet community at large and act in their interests as opposed to helping companies "play nice" with each other and figure out how to lock out innovation. Maybe I've missed an important scenario as to why you feel RAND is preferable to straight RF licensing, and I accept there may be something I missed. But in the absence of that scenario, I think it is in the best interests of the web at large for the W3C to continue a policy of RF-only standards promulgation. - Bruce Bruce Krysiak cofounder / chief innovation officer (c) 415.505.3982 /(ho) 415.752.3953 = Aviri - To Blossom = http://volunteer.aviri.com - help NY & DC relief efforts NOW Received on Sunday, 30 September 2001 14:14:09 UTC
global_05_local_5_shard_00000035_processed.jsonl/9198
KCAP2011: Call for participation From: Oscar Corcho <[email protected]> Date: Thu, 21 Apr 2011 19:38:56 +0200 To: <[email protected]>, <[email protected]>, <[email protected]>, <[email protected]>, <[email protected]>, <[email protected]>, <[email protected]>, <[email protected]>, <[email protected]>, <[email protected]>, <[email protected]>, <[email protected]> Message-ID: <C9D6353F.114FE%[email protected]> 6th International Conference on Knowledge Capture June 26-29, 2011 Banff, Alberta, The dates for the KCAP2011 conference are approaching fast. KCAP attendees will enjoy presentations of 19 full papers, which have been selected from the 80 submissions received on the regular call for papers. Additionally, there will be six invited talks from researchers from academia and industry (http://kcap11.stanford.edu/speakers.html), including Brian Gaines, Richard Benjamins, James Fan and Aditya Kalyanpur, Tom Gruber, Bill Swartout, and Bob Wielinga. There will be also a panel reflecting on 25 years of knowledge acquisition research, three workshops (http://kcap11.stanford.edu/workshops.html), two half-day tutorials (http://kcap11.stanford.edu/tutorials.html) and a poster and demo session. Registration to the conference is now possible (details available at http://kcap11.stanford.edu/registration.html), with early registration fees available until April 30th, which we encourage you to benefit from. A block of rooms at the Banff Centre (the conference hotel) has been made and is also ensured until April 26th. Registration can be done at http://kcap11.stanford.edu/venue.html. Note that hotel room fees cover not only the room price but also costs for breakfasts, coffee breaks and We hope to see you soon in Banff. Together we will make this 25th anniversary from the first KAW workshop an unforgettable event. Received on Thursday, 21 April 2011 17:44:12 UTC This archive was generated by hypermail 2.3.1 : Wednesday, 7 January 2015 15:08:06 UTC
global_05_local_5_shard_00000035_processed.jsonl/9199
[css4-images] element() and compositing layers From: Tab Atkins Jr. <[email protected]> Date: Fri, 27 Jul 2012 16:13:15 -0700 Message-ID: <CAAWBYDAs7QZnSiRzRppkyQ+3r+DWtAGhfZ-tk-ZXvC9nC34pmw@mail.gmail.com> This question is more-or-less directed toward the Moz implementors of I presume that you have a similar hardware compositing model to us at WebKit, where some elements establish compositing layers, but not all of them - each node in the compositing tree may contain multiple descendants of the node-establisher. What do you do when a -moz-element() references one of these elements that aren't the root of a compositing-tree layer? I can see a few 1. Split apart the layer so that the referenced element establishes a layer. (This seems to require either making it a stacking context, or doing some more advanced trickery.) 2. Do a paint with the existing layer, but do an ancestry check on each element, skipping painting of those that aren't descendants of the referenced layer. 3. Draw element() images with a different path than what's used for normal page rendering. 4. Something else? Received on Friday, 27 July 2012 23:14:02 UTC
global_05_local_5_shard_00000035_processed.jsonl/9201
Re: ZNG dicussion From: Sebastian Hammer <[email protected]> Date: Fri, 28 Sep 2001 14:58:58 +0200 Message-Id: <> To: Alan Kent <[email protected]>, [email protected] At 10:07 28-09-2001 +1000, Alan Kent wrote: > "I guess providing a 'web service' for access to information resources > to any person with MS Windows on their desktop in a standard way is > not that important to libraries." >but I decided not to! :-) :-) :-) >It would sound sarcastic when all I really wanted to say is I think >a standard web service to existing Z39.50 resources would sharply >increase the accessibility of library information to applications >outside of a library. Whether such need exists, I do not know. >This would not replace Z39.50. It would solve a different need. It might be interesting to actually make a realistic list of such outside applications that might implement ZNG but who are not doing so at the moment. It could help nail down the actual requirements for ZNG, and lift it from the level of a geek activity ("let's do this because it's cool") into something that may address real problems... I don't have to implement ZNG to know that it would work or that it would be very simple to use for very simple applications. What I don't know is whether it has any concrete value *in the current landscape* of implementation and Z39.50 use. I think at least some of us who are concerned are not just reacting negatively to this because it is new, but because we have an interest in, or commitments in, some pretty complicated situations involving installed base, and some careful, semi-political games with vendors who have to invest time and energy in Z*. As you play in this game, you come to realise that the actual technology plays a comparatively small role compared to the "political" maneuvers. John Kunze once put it very nicely when he told me that the real victory of Z39.50 was not really in its engineering or design, but in the consensus that it represented between a large and diverse implementor community. Having watched a few Z39.50-inspired "lightweight" search protocols rise (sort of) and fall over the years, I am less optimistic than some about the guaranteed success of ZNG. But I'm also not too enthusiastic over some of the purely technological arguments.. yes, it is true that basic ZNG servers are trivially simple to write, and so are basic clients which only access one server and block until the result comes back. But if you need a more sophisticated application that queries a number of targets efficiently in parallel, then many of the most basic tools for implementing HTTP-like protocols break down, and you get back to doing some programming that, to abuse a motaphor, is not for people who enjoy eating quiche Received on Friday, 28 September 2001 08:59:34 UTC
global_05_local_5_shard_00000035_processed.jsonl/9206
A Catalogue of Sects There are several answers I’d like to make to this charge. I resisted until I couldn’t “Authority” in a Different Sense Leaf from a manuscript of Augustine at the Bibliothèque nationale de France, Paris, dated c. 7th–8th century (e-codices.unifr.ch). The Catholic Sense of Scripture Monk at work in scriptorium Teaching from the Deposit of Faith Burglechner, The Council of Trent A Well-Built Building The signposts converge Roma signposts All roads lead to Rome. [Source] Waking up Roma sunrise Sunrise over the Vatican. [Source] Coming inside St. John the Evangelist, Oxford, nave A Presence Holy Eucharist elevation The elevation of the Eucharist at the consecration. [Source] St. John the Evangelist Catholic Church, Oxford, Mississippi St. John the Evangelist Catholic Church, Oxford, Mississippi Packed pews Hands raised in worship Emotion is what I grew up with. The New Testament Church: One Body in Christ Albrecht Dürer, Adoration of the Holy Trinity (1511) (<a href="http://commons.wikimedia.org/wiki/File:Adora%C3%A7%C3%A3o_da_Sant%C3%ADssima_Trindade.jpg">Wikimedia</a>) Albrecht Dürer, Adoration of the Holy Trinity (1511) One Body And in other letters: One Church All Saints Were the churches of the New Testament independent of one another? Many Churches Paul Preaching in the Areopagus, Sir James Thornhill One Mind Anthony Van Dyck, The Crucifixion (c. 1622) Next time: “One Body in Christ” Getting saved by a prayer Southern Baptist baptism The Baptism of Cornelius, by Francesco Trevisani “He taught them as one having authority” Hi, I’m back in school now and still trying to organize my time. I haven’t had much of a chance to sit down and write, especially not about any large subjects; but in today’s Mass readings, an idea hit me forcefully that I think I might be able to comment on quickly. This will be an exercise in brevity, both of length and time. Jesus teaching in the synagogue I’ve always been struck by today’s Gospel reading (Mark 1:21–28): “The people were astonished at His teaching, for He taught them as one having authority.” Jesus was something completely different, something no one had ever seen before. Not since Moses himself, the codifier of the Law, had anyone spoken with such authority on the Law and the mind of God toward human behavior. He stood in vivid contrast to the so-called authorities of the day, the Pharisees and Sadducees, the scribes and scholars of the Law. The only authority they ever offered was their own, as they disputed endlessly on the interpretation and application of the Law. They had sola scriptura: Scripture alone, the divine and authoritative Word of God, in the Law and the Prophets — and yet they did not have authority. For all their scholastic eminence and merits, they could offer only disagreement and division. Jesus did not come to give God’s people more of the same: another holy book or another teacher or even another prophet. He came to give them something radically new and different. Jesus spoke with authority, such that there was no question, dispute, or ambiguity about what He meant. And he gave that same authority to His Apostles (Matthew 10:1, 40; Luke 10:16), to speak and to teach with His voice. And the Apostles gave their successors, the bishops, that same authority to teach (1 Timothy 4:11, etc.). And this is the same authority with which the Magisterium of the Church teaches today. By contrast, see the state of teaching in the Protestant churches. When a preacher stands up to teach, he may speak with self-assurance; he may speak from the divine, authoritative Word of God; but he gives an interpretation; he does not speak with authority. In the Protestant world, there are only endless disputes concerning doctrine and interpretation. Sola scriptura — “Scripture alone” — without prophets, without a Christ — is all the Jewish people had before Jesus came. And He came to deliver us from that chaos and confusion, as surely as He came to deliver us from sin and death. The Protestant proposition seeks to return the Church to that: to deny and reject the very authority that made Jesus Christ’s revelation so radical and so powerful a revolution. The Sunday Obligation: “Missing Mass is a Mortal Sin”? Van Gent, Institution of the Eucharist (c. 1474) Justus van Gent, Institution of the Eucharist (c. 1474) A common charge against the Catholic Church that I’ve heard from a number of opponents is against the fact that the Church obligates her children to attend Mass each Sunday and on other declared holy days of obligation, and especially against the fact that “it’s a mortal sin to miss Mass.” Supposedly this is an example of the flagrant and tyrannical legalism of the Church, that she would dare to assert authority over how Christians spend their weekends and even dare to declare, arbitrarily, what is sin and what is not. I’ve always had a simple answer to this challenge, but never had any particular scriptural support to cite. But today in my private Bible study I happened upon it: a clear statement of the mind of God on the matter, and what has always been the mind of the Church. But first, addressing the objections is in order. Not Dictating Sin, but Labeling Sin Return of the Prodigal Son, by Batoni Return of the Prodigal Son (1773), by Pompeo Batoni. First, it’s important to realize that the Church does not have the authority to dictate what is and isn’t sin, beyond what God Himself holds. The Church’s authority and duty is to teach the truth she has received from Scripture and Tradition. When the Church teaches that something is a sin, it is not arbitrary: it’s because something about that act or behavior objectively places one in opposition to God and His order and plan for us. It is that opposition, not anything arbitrary, that makes an act a mortal sin. The Church teaches that in order to be a mortal sin, an act must be of a grave matter, objectively opposed to God’s order, and done with full knowledge and deliberate consent (CCC 1857). A sin is a sin because it is those things, not because the Church declares it sinful; and yes, there are certainly cases, when an act is done in ignorance or against one’s will, that it is not a sin after all. The moral teachings of Scripture and of the Church are there to guide and to guard, to direct God’s people to a safe path; it is only God who judges. The Church declares something a sin not to condemn the sinner, but to warn him, to correct him, to save him. Those who object to the idea of mortal sin in the first place ought to read my recent series on grace and justification and “falling from grace.” Does mortal sin — and does missing Mass — cause a Christian to “lose his salvation”? No — not in the terms that Protestants understand such things. Mortal sin, for a Christian, is more akin to stumbling into mud and hurting oneself than being cast out from the Lord’s kingdom. “Missing Mass is a Mortal Sin”? Jesus and the Eucharist So, “missing Mass is a mortal sin.” Well — it’s not quite that simple. Yes, I know any one of you can dig up quotations from popes, teachers, catechisms, that state in plain terms, “missing Mass is a mortal sin” — when taken out of context. But I am here to say, as anything more than a topical reading would reveal, that there is more to the matter than such a flat declaration. Is simply missing Mass, not going to church on a Sunday, for whatever reason, “grave matter”? Many in today’s western (largely Protestant) world — where church attendance has become casual and inconsequential — would say no, of course not; it is an optional and personal decision. But the more important question to ask is, why did you miss Mass? Was it intentional and deliberate? Could it have been avoided? Did you know better? There are plenty of cases — more than I could possibly name — when missing Mass would not be a sin. Were you elderly and homebound, or even simply sick in bed? Did you have to work, and there was no possible way around it? Were you traveling and not in a place or situation where you could reasonably find a Mass to attend? Were you caring for a new baby or a sick loved one? Did you have other, important family or social obligations that could not be missed or rescheduled? Or did you simply choose, deliberately and intentionally, not to go to Mass? Did you decide that there was something else, a football game or holiday party, that you would rather go to instead? Did you simply not feel like it, out of anger or spite or even apathy? Any priest would tell you that in the former cases, and many more, you were not at fault; the latter are a different situation entirely. Missing the Lord’s Banquet Jan van Eyck, Ghent Alterpiece: Adoration of the Lamb Jan van Eyck, Ghent Alterpiece: The Adoration of the Lamb (c. 1432). Jesus gave several parables in His preaching to the kingdom of God being a great banquet or feast (Matthew 22:1–14, Luke 14:7–24, cf. Revelation 19:6–9). Throughout His ministry, He invited the lost to dine with Him (e.g. Luke 15:2). The Mass, the Eucharist, is the Lord’s Supper — the great feast He has prepared for us, at great cost to Himself, and invited each of us to come and dine with Him (John 6:35; cf. Revelation 3:20), promising to feed us richly with the bread of life, to reward us with the great bounty that awaits, eternal life, and to share with us the most intimate fellowship and communion with Him (cf. 1 Corinthians 10:16). Missing Mass is more than simply “deciding not to go to church today”; to deliberately choose not to go to Mass is to refuse the Lord’s invitation, to say to Him that there are more important things to you. This is the mortal sin: not merely “missing Mass” — which, by itself, might not be a sin at all — but the deliberate rejection of the Lord. And there’s more, a striking biblical support for this teaching, that I was stunned to discover today. Offering the Lord’s Offering at the Appointed Time Marc Chagall, "The Israelites are eating the Passover Lamb" (1931) Marc Chagall, Les Israélites mangent l’Agneau de la Pâque (“The Israelites are eating the Passover Lamb”), 1931 (WikiArt). Of course, as everyone knows, we are to “Remember the sabbath day, to keep it holy” (Exodus 20:8) — and, barring the objections of “Seventh-Day” Christians and some “Hebrew Roots” proponents (which I will address another time), most Christians generally accept the traditional teaching of the Church, that from apostolic times Christians have transferred the Old Testament Sabbath obligation to Sunday in honor of our Lord’s Resurrection. But today I found an even more explicit statement of the Church’s teaching on the Sunday obligation, in the ordinances of the Israelites concerning the Passover: And the Lord spoke to Moses in the wilderness of Sinai, in the first month of the second year after they had come out of the land of Egypt, saying, “Let the people of Israel keep the Passover at its appointed time. On the fourteenth day of this month, in the evening, you shall keep it at its appointed time; according to all its statutes and all its ordinances you shall keep it.” … The Lord said to Moses, “Say to the people of Israel, If any man of you or of your descendants is unclean through touching a dead body, or is afar off on a journey, he shall still keep the Passover to the Lord. … But the man who is clean and is not on a journey, yet refrains from keeping the Passover, that person shall be cut off from his people, because he did not offer the Lord’s offering at its appointed time; that man shall bear his sin. (Numbers 9:1–3, 9–10, 13) Not only is Sunday the fulfillment of the commandment to “remember the Sabbath,” but the Mass is the fulfillment of the Passover, “for Christ, our Passover lamb, has been sacrificed” (1 Corinthians 5:7). To the degree that the Israelites kept the Passover, which marked their liberation from human bondage — that much, and more, should Christians venerate the sacrifice of Christ on Calvary, which sets us free from darkness unto life! Similar to the Church’s teaching, it is only the man who, despite being perfectly well and able, deliberately refrains from keeping the Passover who is to be cut off. But if failing to keep the Passover was such a grave matter for the Israelites, is it not understandable that refusing to honor the Passover of the Lord, refusing to offer the Lord’s offering — ourselves — at the appointed time, is a grave matter for the Church? And yet the Lord, and the Church, is merciful: for this and every other sin, there is forgiveness and healing and a welcoming back to the banquet. “Saying Jesus’s Name Wrong”: A Fallacy of “Hebrew Roots” Andrea Mantegna, Ecce Homo (1502) Andrea Mantegna, Ecce Homo (1502) (WikiArt). One of the most common and insistent tropes of the “Hebrew Roots” movement is the claim that the majority of Christians in the world are “saying Jesus’s name wrong” — that the name “Jesus” itself is improper, a Westernization and a corruption of the Messiah’s true name. The true name of our Lord, the proper way to address Him, these people argue, is by His original Hebrew name, ישוע (yēšūʿa) — most often rendered in English as Yeshua. Make no mistake: It’s quite true that the original, Hebrew and Aramaic name of Jesus was probably ישוע, a variant of the name of the Hebrew leader and hero יהושע (yəhôšūʿa), meaning “The Lord is salvation.” And if you’d like to call the Lord that, then more power to you. But before you go around condemning traditional Christians who hail our Lord Jesus, here are a few things you should consider: 1. There is nothing “traditional” about calling the Lord Yeshua (or Y’shua, or Yah’shua, or any variant). 2. There is nothing “improper,” no form of syncretism or invention or corruption, in the traditional name Jesus. 3. To insist that Yeshua is the only proper name by which to address our Lord is, in fact, to reject the entire received Christian tradition, to disown the Apostles and Evangelists, even to deny Scripture itself — and to contradict the very message of the Gospel. An Invented Tradition Hebrew Roots Proponents of “Hebrew Roots” often support their arguments with claims that they are returning to the “authentic traditions” of the first Jewish Christians. But is this really true? Tradition means what has been handed down. And the truth is that there is no tradition — no writings, no hymns, no inscriptions, no traditional teaching or custom — of our Lord being addressed as Yeshua, passed down by the earliest Christians or by anyone else at all, until the beginnings of the “Messianic” movement in the nineteenth century. Proponents argue that the name Yeshua is what the Apostles themselves would have called the Lord; and that might very well be true. But they left us no record, no tradition of it. Historians believe that Jesus and the Apostles probably spoke Aramaic as their primary language — not Hebrew. Yeshua is a modern reconstruction, based not on Aramaic but on Hebrew pronunciation.* * Jews wrote Aramaic with the Hebrew script, but pronounced it differently than the biblical Hebrew language. Our transliteration of Hebrew is based on the rabbinical pronunciation of the biblical texts. The original Hebrew texts had no vowels; the system of vowels and pronunciations we have of ancient Hebrew today was passed down (and in some cases made up, or at least formalized) by rabbis. So a rabbi reading ישוע in a biblical text would pronounce it completely differently than a first-century Jew on the street speaking Aramaic, reading the same characters. Syriac Christians (see below), whose liturgical language is essentially Aramaic as it would have been spoken in the first century, pronounce these same characters, ישוע, not as “Yeshua” but as “Isho.” On top of this, there is the matter that Hebrew and other Semitic languages can only be transliterated incompletely into English, which lacks both the phonemes and the graphemes to fully express those languages’ sounds and meanings. Even presuming the rabbinic tradition of pronunciation — Yeshua, like any other rendering, is at best an approximation. Rather than adhering to the “true” name of the Lord, proponents of this are just as guilty of “translating” His name into their own language as the early Greek Christians were in calling Him Jesus. There are in fact Christians who have been speaking Aramaic for the past two thousand years, since the time of the Apostles, who have passed down the Christian faith in what can be called its native language: the Syriac Christians, whose liturgical language is essentially Aramaic as Jesus would have spoken it — but they pronounce the Lord’s name not “Yeshua,” but “Isho.” Yeshua was passed down by nobody at all, but invented from imagined traditions in modern times. What the Apostles did pass down to us, the earliest written records preserved of the Christian Church, are the New Testament Scriptures — written not in Hebrew, not in Aramaic, but in Greek. The Name of Jesus Jesus Christ icon Contrary to arguments I am hearing increasingly from “Hebrew Roots” proponents, the name Jesus is not a late, syncretistic introduction by “Rome,” nor a “corruption” of the true Hebrew teaching, nor any other attempt to pull true Christians away from the “Hebrew Roots” of Christianity. When the Apostles and their associates wrote the New Testament Scriptures in Greek — under the guidance and inspiration of the Holy Spirit — they wrote His name as Ἰησοῦς (Iēsous). Every manuscript of every book of the New Testament attests to this. And this was not a novelty, even for the first Christians. The name Ἰησοῦς had already been extant in Greek for several centuries, as the standard transliteration of the Hebrew name (commonly transliterated in English) Joshua. In the Septuagint, the classic translation of the Old Testament Scriptures into Greek, which can be dated as early as the second century B.C., Ἰησοῦς was used as the name of Joshua, both the man and the book. In applying that name to the Christ, Greek-speaking Christians were following conventions established long before His coming. When the Apostle Paul, the first great missionary, carried the Gospel of Christ beyond Judea and Palestine, he carried His name not as Yeshua but as Ἰησοῦς. The name Iesus is a natural transliteration of the Greek name into Latin, and thence, with the translation of the Bible into English, Jesus. Is Scripture itself, then — the divine foundation that even “Messianic” Christians claim — compromised, or corrupt, or flawed? Were the Apostles agents of syncretization or dilution, of leading the people of Christ away from His “Hebrew Roots”? This is in effect what these arguments entail. Clearly, if there were any problem, any heresy or corruption or dilution, in translating the name of the Lord into the native tongues of each of His peoples, then the Apostles themselves would not have done it. Every Tongue Shall Confess Nesterov, Resurrection (c. 1892) Resurrection (c. 1892), by Mikhail Nesterov. St. Paul himself tells us, in fact: Therefore God has highly exalted him and bestowed on him the name which is above every name, that at the name of Jesus every knee should bow, in heaven and on earth and under the earth, and every tongue confess that Jesus Christ is Lord, to the glory of God the Father. (Philippians 2:9–11) Every tongue shall confess that Jesus Christ is Lord” — declared in Greek, what was then the lingua franca of the civilized world. The word tongue in Greek, γλώσσα or glōssa, could also refer to language, as with the Latin lingua, and as we continue to use tongue in English. Was “every tongue” to confess the Lord, but only as Yeshua? Plainly not: in that very sentence, Paul hails Him as Jesus in Greek. Arguing that only “Yeshua,” or any other rendition of the name, is the correct and proper address for our Lord, denies the entire received Christian tradition, the handing down of the faith to every people as the Apostles and their spiritual descendants have done. Just as the Greek people received the name of the Lord as Ἰησοῦς, the English people received Him as Jesus, the Spanish as Jesús, and so forth: Names of the Lord in Various Languages Language Name Transliteration Albanian Jezusi Amharic ኢየሱስ Iyesus Aramaic ܝܫܘܥ Isho Arabic يسوع ʿĪsā Aragonese Chésus Bengali যিশু Jishu Chinese 耶稣 Greek (Koine) Ἰησοῦς Iēsous Greek (Modern) Ιησούς Iēsous Hebrew (Modern) ישו Yeshu Hindi ईसा Jesu Hungarian Jézus Irish Gaelic Íosa Italian Gesù Korean 예수 Latin Iesus Jesus Romanian Isus Russian Иису́с Iisús Church Slavonic Їисъ Slovak Ježiš Tagalog Hesus Tamil இயேசு Turkish İsa Vietnamese Giê-su Yiddish יעזוס Yezus … I think you get the idea; and I’m having far too much fun with this. This is only a random smattering of just a few languages, pulled from Jesus’s Wikipedia article. The point is this: Are any of these languages “wrong”? Were the apostles, missionaries, evangelists, and translators who carried the faith of Christ “to the ends of the earth,” to each one of these peoples, “wrong”? To argue that there is only one name by which Jesus can properly be addressed is to deny the universality, the catholicity, of Christ’s message of salvation; to cast aside the very message of the Gospel, of forgiveness and acceptance and inclusion into Christ for all peoples. Is Jesus a Savior for the Jews only? Or did He come for the lost sheep of every nation, tribe, people, and tongue? The greatest danger of the “Hebrew Roots” movement, I fear, is that it in effect recycles the heresy of the Judaizers, in arguing that the only true way to be a Christian is to be a Jew — an argument that Scripture rejects again and again.
global_05_local_5_shard_00000035_processed.jsonl/9208
Diabetes Management Diabetes Management There are elaborate nutrition goals for people who develop type 2 diabetes.1 To most health care professionals, the nutrition goals are couched in language that is difficult to convey and be understood by patients. This Nutrition Tidbit will outline some simple nutrition concepts for normalizing blood sugar that can assist you in coaching your patients with type 2 diabetes to make a dramatic difference in their eating lives. There is a strong correlation between the amount of carbohydrate eaten at a meal and blood sugar excursion after the meal. Human cells depend on glucose for most of their energy needs. That is why there are such intricate mechanisms in place to make sure glucose levels in the blood stream do not get too high or too low. Without the medical condition of diabetes, there is little need to put much thought into what is eaten because the body can manipulate nutrients to be sure ample glucose is available for cells. However, if type 2 diabetes enters the life of a patient, a conscious effort must be made by the patient to help maintain healthy blood sugars. Yes, there are several very helpful medications that help to modulate blood sugars, but no medication can begin to do the job that the body’s own mechanisms did originally. So, what can a health professional do to help a person improve their blood sugars through diet? At the very least, have your patient fill out a 24-hour food log. • Avoid consuming large amounts of starches, even healthy ones, at a meal or snack! I did NOT say avoid starches, what I mean is that starches need to be eaten in moderation rather than a little starch one meal and a lot the next. Why? Starches do eventually become glucose and an onslaught of glucose, anyway you cut it, will raise blood glucose. This uneven nutrient supply causes the glucose moderating system major problems that could be avoided if carbohydrates were consumed in a regulated fashion. • Eat healthy fats. Eat more mono- and polyunsaturated fats. These are richest in fish, nuts, oils and soy products. Limit saturated and trans-fatty acids. Saturated fats are found primarily in processed foods like margarine, shortening, pre-prepared dinners and animal fats like beef, dairy and pork. Read the food label for the most accurate information. • Refer your patient to a certified diabetes educator. Why? Type 2 diabetes is a serious CHRONIC illness and this expert can help educate, fine-tune and coordinate all of the diabetes management pieces including diet, medications, blood glucose testing, exercise and self-care. • For more information on diabetes, try the following resources: 1. American Diabetes Association. Nutrition principles and recommendations in diabetes. Diabetes Care. 2004;27:S36-46.
global_05_local_5_shard_00000035_processed.jsonl/9222
Francona pregame interview Francona pregame interview What are your thoughts on Joe Torre deciding not to come back to the Yankees? How strange is that going to be next year not to see him there? TERRY FRANCONA: You know, I just actually heard about it a couple minutes ago. I guess I hope that however it came down, and nobody knows but Joe and whoever he was dealing with, I hope Joe is happy. I think he deserves the respect, and I think you're going to hear people in baseball, every area of baseball, say probably very, very kind, respectful things about Joe the next couple days, and they're all deserved. I just hope he's happy. Just further on that, is there going to be something missing between the Red Sox and the Yankees without him on the other side now? I know you mentioned you have a good relationship with him, so I'm curious from a personal standpoint, will that be a little bit different for you? TERRY FRANCONA: Again, you'll have to forgive me if I haven't -- that's not right on the front burner tonight (laughter). There will be a time for that, but we really have other things on our plate right now. No disrespect to any organization or any person. How unexpected is it for you to be this deep in the series without Papelbon having really played a major role? TERRY FRANCONA: He threw two innings in an extra inning game. That's pretty major for me. When you give up seven runs, though, in two separate games, that can be part of that dilemma. And I hope that your question, you're not saying that again. We need Pap to be a part of this game. I think that's stating the obvious. What do you think the team has to do from an offensive standpoint just to kind of get back on track and swing like you were earlier in the playoffs? complete coverage Home  |  News  |  Multimedia  |  Photos TERRY FRANCONA: Pretty much the same outlook we've taken to every game, grind out at bats, get pitches you can handle, and when you get it, handle it. If it's not in the middle of the plate, try to work an at bat where you can get a hitter's count. Again, if he wants to throw strike one down the middle, take an aggressive swing. But more often than not if you get deep into a count, good hitters can do something with those pitches. We don't want to have quick innings. We want to make C.C. work as much as we can. You certainly want to score runs, but sometimes when you don't score runs, it's a byproduct of just making him work and getting him out earlier. Understanding that you're worried about the game on the field. You had told us earlier that you had reached out to Joe. Now that this has happened, will you at some point make a call? TERRY FRANCONA: I'm going to go back -- this is sort of a big day for us to try to win this game. There's time for -- this probably isn't the time for -- we need to try to win this game tonight, or I might be getting phone calls (laughter). Joe might be calling me. Everybody builds up an elimination game or a deciding game or the series could be over Is there a different feeling when you show up here today? Do you talk to anybody, talk to anybody as a group? How is this day different from the rest of the series? TERRY FRANCONA: In the way that we act, none. I think we have a consistent enough approach, and that's what we really try for all year, where you don't have to hit a button or give a speech or do anything like that. Try and approach each game as if it's the last game you'll ever play. We've tried to do that for the most part, treat every game like it's the only one that counts, so when you get into the game it is the only one that counts and you don't have to do anything different. Just checking on the lineup. TERRY FRANCONA: Same as Game 1, Kielty hitting sixth. Did they keep you guys in the dark on that? It wasn't a secret.
global_05_local_5_shard_00000035_processed.jsonl/9230
From Fri Feb 04 22:56:06 2011 Return-Path: Delivered-To: Received: (qmail 84153 invoked from network); 4 Feb 2011 22:56:06 -0000 Received: from (HELO ( by with SMTP; 4 Feb 2011 22:56:06 -0000 Received: (qmail 17668 invoked by uid 500); 4 Feb 2011 22:56:06 -0000 Delivered-To: Received: (qmail 17630 invoked by uid 500); 4 Feb 2011 22:56:05 -0000 Mailing-List: contact; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: Delivered-To: mailing list Received: (qmail 17622 invoked by uid 99); 4 Feb 2011 22:56:05 -0000 Received: from (HELO ( by (qpsmtpd/0.29) with ESMTP; Fri, 04 Feb 2011 22:56:05 +0000 X-ASF-Spam-Status: No, hits=-0.0 required=5.0 tests=SPF_HELO_PASS,SPF_PASS X-Spam-Check-By: Received-SPF: pass ( domain of designates as permitted sender) Received: from [] (HELO ( by (qpsmtpd/0.29) with ESMTP; Fri, 04 Feb 2011 22:55:57 +0000 Received: from [] ([]) by (Sentrion-MTA-4.1.0/Sentrion-MTA-4.1.0) with ESMTP id p14MtaS4011154 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=NO) for ; Fri, 4 Feb 2011 17:55:36 -0500 Message-ID: <> Date: Fri, 04 Feb 2011 17:55:33 -0500 From: Steve Prior User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv: Gecko/20101207 Thunderbird/3.1.7 MIME-Version: 1.0 To: Subject: Does ivy add any default filters used by the ant copy task? Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Copied: Archived I know this is a long shot, but I'm running out of ideas. I'm trying to build a war file from ant using ivy dependencies, but the resulting war file is not working and I've determined that the .class files built in the webapp project itself are getting corrupted during an ant copy task. After some research I see that this is possible if you have any filters enabled, but as far as I know I don't have any, yet the corruption happens anyway. The code for the copy invocation is: See, no filters at all. So the question is by any chance does the inclusion of ivy into the mix by some chance add in any global filters which might be kicking in and causing the problem? This problem is happening on a Windows XP machine. I haven't done anything to set LANG because as far as I know it's needed when filters are involved and I don't (knowingly) have any. If not, any other ideas? I'm asking on this list because even though you don't see any ivy code in the above fragment, it's all around it in the build.xml I'm using. Thanks in advance Steve
global_05_local_5_shard_00000035_processed.jsonl/9233
From Thu May 8 14:35:25 2003 Return-Path: Mailing-List: contact; run by ezmlm Delivered-To: mailing list Received: (qmail 58321 invoked from network); 8 May 2003 14:35:25 -0000 Received: from ( by with SMTP; 8 May 2003 14:35:25 -0000 Received: from grodriguez (localhost []) by (8.11.6/8.11.6) with SMTP id h48EYRm26335 for ; Thu, 8 May 2003 16:34:27 +0200 Message-ID: <017e01c3156f$11e02040$> From: =?iso-8859-1?Q?Gustavo_Rodr=EDguez?= To: Subject: Socket connect timeout Date: Thu, 8 May 2003 16:35:27 +0200 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_017B_01C3157F.D51B1E60" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2600.0000 X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2600.0000 X-Spam-Rating: 1.6.2 0/1000/N ------=_NextPart_000_017B_01C3157F.D51B1E60 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Hi, we're using your FTP client API and would like to use the new = JDK1.4 connect timeout method. We've seen in your source code that = sockets are created in the factory by calling the constructor with host, = port, so that the timeout specified on socketclient.setDefaultTimeout() = is only used for read timeout (socket.setSoTimeout()), and not in = connect-time (socket.setDefaultTimeout()). Is there any new release = implementing timeout at connect-time, or are you planning to deliver it? = Is there any other way to specify a connection time out? Thanks in advance. ------=_NextPart_000_017B_01C3157F.D51B1E60--
global_05_local_5_shard_00000035_processed.jsonl/9234
On 9/13/06, Emmanuel Venisse wrote: > > No, it isn't possible because for the moment, we don't know if a project > site exist. > In a future version, you'll can customize the mail template. > > Emmanuel > > :) .My question should have been , "Is it possible to customize the mail template?If so where is it located?" Jeff Mutonho GoogleTalk : ejbengine Skype : ejbengine Registered Linux user number 366042
global_05_local_5_shard_00000035_processed.jsonl/9241
Hi, I have created a wiki page for this: http://wiki.apache.org/jackrabbit/QueryUsingJdbc You will find an example application that runs a query against a database using the JDBC API and the H2 Database. In the database, a Jackrabbit session is created, and a XPath queries against Jackrabbit is run. This describes a general way how to solve the problem, but needs to be adapter to your needs. Does this solve the problem? Regards, Thomas
global_05_local_5_shard_00000035_processed.jsonl/9244
Sebastian Haase haase at msg.ucsf.edu Fri Jun 25 15:34:01 CDT 2004 Hi John, I wanted to try matplotlib a few days ago, but first I had some trouble compiling it (my debian still uses gcc 2-95, which doesn't understand some 'std' namespace/template stuff) - and then it compiled, but segfaulted. Maybe I didn't get "set NUMERIX" stuff right - how do I know that it actually built _and_ uses the wx-backend ? So it would be nice to get to the ground of this ... Thanks for the comment, On Friday 25 June 2004 02:12 pm, John Hunter wrote: > Sebastian> Hi, The long story is that I'm looking for a good/fast > Sebastian> graph plotting programs; so I found WxPyPlot > Sebastian> (http://www.cyberus.ca/~g_will/wxPython/wxpyplot.html) > Sebastian> It uses wxPython and plots 25000 data points (with > Sebastian> lines + square markers) in under one second - using > Sebastian> Numeric that is. > Not an answer to your question .... > matplotlib has full numarray support (no need to rely on sequence > API). You need to set NUMERIX='numarray' in setup.py before building > it *and* set numerix : numarray in the matplotlib rc file. If you > don't do both of these things, your numarray performance will suffer, > sometimes dramatically. > With this test script > from matplotlib.matlab import * > N = 25000 > x = rand(N) > y = rand(N) > scatter(x,y, marker='s') > #savefig('test') > show() > You can do a scatter plot of squares, on my machine in under a second > using numarray (wxagg or agg backend). Some fairly recent changes to > matplotlib have moved this drawing into extension code, with an approx > 10x performance boost from older versions. The latest version on the > sf site (0.54.2) however, does have these changes. > To plot markers with lines, you would need > plot(x,y, marker='-s') > instead of scatter. This is considerably slower (approx 3s on my > system), mainly because I haven't ported the new fast drawing of > marker code to the line class. This is an easy fix, however, and will > be added in short order. > This SF.Net email sponsored by Black Hat Briefings & Training. > Attend Black Hat Briefings & Training, Las Vegas July 24-29 - > digital self defense, top technical experts, no vendor pitches, > unmatched networking opportunities. Visit www.blackhat.com > _______________________________________________ > Numpy-discussion mailing list > Numpy-discussion at lists.sourceforge.net More information about the Numpy-discussion mailing list
global_05_local_5_shard_00000035_processed.jsonl/9245
[SciPy-Dev] 1.0 roadmap: weave Todd toddrjen@gmail.... Thu Sep 26 08:11:38 CDT 2013 On Thu, Sep 26, 2013 at 2:05 PM, Pauli Virtanen <[email protected]> wrote: > Arnd Baecker <arnd.baecker <at> web.de> writes: > [clip] > > Of course I do understand the reasons to deprecate weave. > > Personally, I only use cython for new code and Numba looks > > extremely promising. So surely the question is, whether porting weave is > > worth the needed effort (as I said, I have no idea how much work is > > necessary for this). > If you drop support for some features that relate to stuff in which > the C API changed a lot in Python 3, such as passing in file pointers, > porting weave to Python 3 is probably doable without too much trouble. > Getting the basics working in my estimation is not hard, the trouble > is in the corners. How much work is porting to python 3 when using weave? If someone is porting to python 3 already, would porting away from weave at the same time add very much additional work? An HTML attachment was scrubbed... URL: http://mail.scipy.org/pipermail/scipy-dev/attachments/20130926/cc4792ab/attachment.html More information about the SciPy-Dev mailing list
global_05_local_5_shard_00000035_processed.jsonl/9256
Social Media The Internet Is Running Out of Space...Kind Of On February 2 around 4 a.m., the Internet will run out of its current version of IP addresses. At least that's what one Internet Service Provider is predicting based on a rate of about one million addresses every four hours. Every device that is connected to the Internet gets a unique code called an IP address (it looks like this). The current system, IPv4, only supports about 4 billion individual IPv4 addresses. As PC World's Chris Head explained in a blog post yesterday, some of these addresses are reusable. The problem, however, is that their one-time use counterparts will eventually lead to the complete depletion of IP addresses. ISP Hurricane Electric has launched Twitter and Facebook accounts that count down to what it has termed the "IPcalypse." Fortunately, some smart folks foresaw this problem long before we did and invented IPv6, a system that invokes both letters and digits to handle 340,282,366,920,938,463,463,374,607,431,768,211,456 addresses (shall we just call it "a zillion?"). Hurricane Electric's doomsday campaign encourages other Internet service providers to transition to that system. Fortunately, the Internet Society's Wiki assures us that IPv4 and IPv6 can coexist during the transition despite being largely incompatible. Software and hardware developers are working on transition mechanisms, and most operating systems install support for IPv6 by default. Since many of us still have some canned food and bottled water stacked up in our basement from the Y2K era, we should be OK either way. Load Comments What's New What's Rising What's Hot
global_05_local_5_shard_00000035_processed.jsonl/9262
If Planet Earth Had a Facebook Account Monday is Earth Day, which means it's time for people around the world to celebrate the planet and advocate its protection. But it's hard to find the perfect way to express your appreciation on this holiday. If the planet used Facebook, would you wish her a happy Earth Day on her Timeline? In this comic, our friends Nitrozac and Snaggy at The Joy of Tech imagine Spacebook, the solar system's social network, and all the entities that would use it. (Who knew Mars was so conniving?) Planet Earth Social Media Comic, Joy of Tech Homepage image via iStockphoto, alxpin Load Comments What's New What's Rising What's Hot
global_05_local_5_shard_00000035_processed.jsonl/9273
Log in merigo's Journal world 4-1 Posting Access: All Members credit! don't hotlink! and all the other mean things people keep on repeating! ¹ comments are a joy, even if it's about that oddly cropped face. ² have fun, as that's all this is to me. ³ a certain stretchable pirate, ahh png not jpeg, baseball according to oofuri, football, gintama, nintendo inc., one piece, our local half-shinigami, shounen boys, video games, xxxholic Welcome to the new LiveJournal Send feedback Switch back to old version LiveJournal Feedback Send another report Close feedback form (optional, if you're a LiveJournal user only) (optional, if you're a LiveJournal user only) (not shown to the public) Provide a link to the page where you are experiencing the error Please take a survey Take a survey Welcome to LiveJournal Create an account
global_05_local_5_shard_00000035_processed.jsonl/9274
What is meta? × (Pro-tip: skip to the bolded part if this is tl;dr for you) Stack Overflow was (and still is) the site I'm currently the most engaged and involved on in terms of reviewing, editing and flagging questions and answers, as well as posting my own answers. However, the first time a question I answered got migrated (to Pro Webmasters), I registered an account on there as well to not only follow the question, but to amend it should the OP follow suit (by registering an account), or have follow-up comments. Regrettably, so many new users and even some semi-established ones, just don't bother registering on the site their question has been migrated to and I think this is a real shame. Particularly for Pro Webmasters, which I think has some really great potential for massive growth, is awesome in its own right and deserves way more traffic which could result from the questions and answers that it could get if more people registered due to their questions being migrated. As it stands now, a lot of the answers to migrated questions* just never get marked as the answer either, due to this issue. Since the OP doesn't get notified about new answers on a migrated question until they've registered an account on the site their question was migrated to either, and the message they're greeted with upon migration itself is very perfunctory in just stating "your question has been migrated" with a link to where it was migrated to, I'd like to make a feature-request that there's a little more prodding and cajoling for the OP to register an account on the site their question was migrated to. Ideas on how to do this if you agree with me, would be very welcome. *Disclosure: I used one of my answers on a migrated question as an example. **I failed at finding suitable synonyms for migrate in the intended context, so apologies for repeating the word ad nauseam above. share|improve this question Note, the OP is already notified on comments and new answers regardless of whether they have an account or not. I am not sure what more we can do. –  waffles Jan 18 '12 at 2:15 see linked question, the answer from Anna is out of date –  waffles Jan 18 '12 at 2:15 Well dang it, @waffles, post that as an answer so I can accept it. It has been two years already... ;-P –  stealthyninja Jun 14 '14 at 23:39 You must log in to answer this question. Browse other questions tagged .
global_05_local_5_shard_00000035_processed.jsonl/9276
What is meta? × I have 'f#' in my list of interesting tags. I've just noticed that questions tagged with 'f#' don't get highlighted. Is this expected? edit: apparently, yes share|improve this question Everywhere, or just on the F# tag page? –  Tim Stone Dec 24 '10 at 23:40 Stone Just on the F# tag page. It's possible that the first time I used the F# tag page was 30 seconds before posting this question, in which case I would guess this behaviour was by design. –  Tim Robinson Dec 24 '10 at 23:43 Ah, in that case see this related question, as the lack of highlighting on that page is now [status-bydesign] per these changes. :) –  Tim Stone Dec 24 '10 at 23:47 1 Answer 1 up vote 2 down vote accepted As Tim Stone noted, this is a (relatively) recent change and by design. share|improve this answer You must log in to answer this question. Not the answer you're looking for? Browse other questions tagged .
global_05_local_5_shard_00000035_processed.jsonl/9278
Projects that are tagged with generalized belief propagation. Logo JMLR libDAI 0.3.1 by jorism - September 17, 2012, 14:17:03 CET [ Project Homepage BibTeX BibTeX for corresponding Paper Download ] 38911 views, 7227 downloads, 2 subscriptions Rating Whole StarWhole StarWhole StarWhole StarWhole Star (based on 1 vote) About: libDAI provides free & open source implementations of various (approximate) inference methods for graphical models with discrete variables, including Bayesian networks and Markov Random Fields. Release 0.3.1 fixes various bugs. The issues on 64-bit Windows platforms have been fixed and libDAI now offers full 64-bit support on all supported platforms (Linux, Mac OSX, Windows). Logo JMLR FastInf 1.0 by arielj - June 4, 2010, 14:04:37 CET [ Project Homepage BibTeX Download ] 8722 views, 2996 downloads, 1 subscription About: The library is focused on implementation of propagation based approximate inference methods. Also implemented are a clique tree based exact inference, Gibbs sampling, and the mean field algorithm. Initial Announcement on
global_05_local_5_shard_00000035_processed.jsonl/9298
tradingmarket en CBS Labels Legitimate Oil Futures Exchange a 'Dark Market' <div class="field field-type-nodereference field-field-source"> <div class="field-items"> <div class="field-item odd"> <div class="field-label-inline-first"> By</div> <a href="/author/jeff-poor">Jeff Poor</a> </div> </div> </div> <p>&nbsp;&nbsp;&nbsp;&nbsp; In the media’s continuous quest to find a culprit for higher prices outside of market forces, the June 17 “CBS Evening News” set its sights on an oil trading market where “speculators can run wild.” This time CBS attacked a trading market based in <st1:city w:st="on">London</st1:city> for being out of the reach of <st1:country-region w:st="on"><st1:place w:st="on">U.S.</st1:place></st1:country-region> regulators.</p><p>&nbsp;</p><p><a href="" target="_blank">read more</a></p> Articles MRC Business Business ArmenKeteyian CBSEveningNews CFTM commodities darkmarket GoldmanSachs ice MichaelGreenberger MorganStanley oilfutures oiltrading tradingmarket Wed, 18 Jun 2008 14:32:02 +0000 admin 26108 at
global_05_local_5_shard_00000035_processed.jsonl/9314
You are viewing nancextoo Previous Entry | Next Entry Funny Things Alexa Has Said When we first moved out to the area we live in now, Alexa was a little over 3 1/2 years old. We were setting up the alarm system in Shawn's shop. He was working on the motion detector trying to figure out where to position it. I said to him, "Why don't you have Alexa walk in front of it and see if she sets the alarm off." Shawn kept fiddling with it, and I noticed that Alexa had gotten very quiet. I looked down at her and she seemed worried. I asked her what was wrong and she said: "I don't want you to take my arm off." It took me a minute to figure out what she was talking about. Then I realized that's what she'd heard when I mentioned setting the alarm off. June 2005 I gave Alexa some milk. Alexa: "You forgot daddy's milk!" Me: "Shawn, would you like some milk?" Shawn: "Sure." Alexa, as I went to get it: "I ordered it for you, Daddy." July 29, 2005 Alexa had been learning about how the meat we eat and the milk we drink comes from animals. Today she asked me what animal toast comes from. June 2006 Alexa, at 5 1/2 years of age, made a cake with minimal help from Daddy. We left it to cool and a little later Alexa asked if she could call her aunt and uncle and cousins who live on the other side of town to say hi. She called them up and then out of the blue, she started inviting all of them over to have some of her cake. She went on and on about how delicious it was going to be and how she'd made it by herself and how she really wanted them to come over and try it. Unable to turn her down, they said they'd come over later that evening. Shawn and I couldn't stop laughing. Because it was like a THREE INCH EASY BAKE OVEN CAKE! Needless to say, we picked up Dunkin' Donuts, too. Alexa was playing on the living room floor with Ben. I picked Ben up to nurse him because we were getting ready to go out and I wanted to feed him first. Alexa stood up, put her hands on her hips, looked at me and said haughtily: "Excuse me! I am the queen of England. And THAT (pointing at Ben) is the king, and he does NOT need breast drinks!" Somewhere around 9/06, when Alexa was in Kindergarten, she really loved library. She would bring home books and one time, early in the school year, I asked her: "What book did you bring home today?" She replied: "I don't know, I can't read!" Alexa was 6 and I was singing the Hokey Pokey for her. After we'd finished doing all of the body parts, I stopped singing. Alexa: "Do more!" Me: "That's it, we did everything." Alexa: (thinks for a second) "Oh, I know! We can put our vaginas in!" Me: "Er...vaginas are private, and I don't think we should sing about them in the Hokey Pokey!" Alexa (age 6) wandered into our bedroom one morning as we were in the process of waking up. Shawn, patting the bed between us: "Come here, Baby." Alexa: "I'm not a baby." Shawn: "I know. But you'll always be my baby." Alexa: "And I'm your princess too, right?" Shawn: "You're my everything." Alexa: "Even your toast?" Shawn: "You're my toast AND my orange juice" One day, in April 2007, six year old Alexa was lying on the floor on her back, and Ben, who was still just a toddler, came over and plopped himself down on her belly. I heard: Alexa: "Ow! My nuts!" Me: "What did you say?" Alexa: "I said, my nuts!" Me: "...what are nuts?" Alexa: "My front privates." Me: "Did you hear a boy in school say that?" Alexa: "Yeah, Nathan!!" Me: "Ah...well nuts is a slang word that boys use for their privates, it's not really something a girl would say!" June, 2007. Alexa is still 6. We had a playdate over at our house. One of the boys who came over was a year older than Alexa. After he left: Alexa: "Mommy, when Shaun is 8, I'll be 7." Me: "Yes, that's right." Alexa: "And when I'm 20, he'll be 21. And when I'm 1,000, he'll be dead." June, 2007, Alexa is 6. Alexa was sitting on the living room floor reading a book she'd taken out from the school library. Ben came over and tried to grab it and ripped a page right out of it. Alexa burst into tears, very upset, and started yelling and sobbing: HE RIPPED MY LIBRARY BOOK!! And I'M going to have to P-p-PAY for it! And I don't even have any m-m-MONEY! On Sunday, June 17th, 2007, when Alexa was still 6 years old, we went to the lake. Alexa was wearing her orange swim floaties. Another little girl started talking to her and asked her if she wanted to have a race. And I heard Alexa say: "I can't move fast with these god-damn floaties on!" In the beginning of July, 2007 (Alexa was 6), we drove past a big billboard with a picture of Kermit The Frog on it. Alexa's seen Kermit on Sesame Street and even had two different stuffed animal Kermits. I guess I took for granted she knew exactly who he was, including his correct name...until we passed that billboard and she said excitedly: "Mommy! Did you see that? It was a big picture of Hermity Frog!" July 20, 2007. Alexa is 6. Alexa: "Mommy, who was born first, you or Daddy?" Me: "I was." Alexa: "Oh. So then you were the first one to take care of me." July 30, 2007. Alexa is 6. Shawn's mom came to visit for the week from Florida. We took her out to lunch and Alexa said to her: "I'm glad you're still alive." Later I asked her why she said that and she said: "Because she's very old!" August 4, 2007. Alexa is still 6. Shawn and I took Alexa out to dinner with relatives. Alexa started telling us a story she'd learned about Amelia Earhardt in school. After explaining about how the plane disappeared and was never found, she informed us quite seriously that: "All they found was a shoe, a bone, and a bitten nail." We all could not stop laughing over the thought of finding a chewed off fingernail and saying it was Amelia Earhardt's! August 13, 2007. Alexa is 6. We were allhanging out in the living room and Shawn and I started rough-housing a little bit with each other and the kids. Alexa suddenly said: "Don't make me turn this into a houseparty!" August 15, 2007. Alexa is 6. I asked Alexa to help me straighten up and she immediately volunteered to sweep the kitchen floor. She spent a LONG time doing so. Finally I told her to stop sweeping and she said: "But sweeping is my life!" August 19, 2007. Alexa is 6. Alexa held up her two middle fingers and said to me: "Mommy, is this a curse?" I said, "yes...I don't know why, but it is. And you better not do that in school, or you would get sent to the principal's office and get a demerit." She said, "I don't do it in school! I only do it in my room when I'm by myself at night!" August 20, 2007. Alexa is 6. Alexa and Melissa were bickering and being generally annoying while we were out doing some errands. We finally told them they were going to get a time out when we got home. In the car on the way home, Alexa kept making loud noises while her baby brother was asleep. I told her to stop, and she did it two more times. So I told her she had to lose her dessert tonight, too. A few minutes later she said to us: "I figured out why you guys take things away from us. ...To torture us." September 30, 2007. Alexa is just about to turn 7. We had a brief conversation about God tonight. It started with her asking me whether a couple of actors were real. I said yes. Then she asked if God was real. I said, "Well, what do YOU believe? A lot of people believe God is real. I believe God is real." She said she did, too. Then Melissa said, "What about Jesus?" Now, Melissa's father and his family are Catholic, and Melissa has been raised Catholic (celebrating the Catholic holidays while she's with her father and even attending a small, private, special needs school that happens to be Catholic). Alexa, on the other hand, is being raised Jewish. She said: "He's not part of our reunion." (She meant "religion") October 3, 2007. Alexa Has Just Turned 7. Alexa was playing with a new doll. It was almost dinner time and Melissa asked if she could go upstairs. I said, "No, I need you to watch Ben for me so I can finish getting dinner ready." Melissa asked if Alexa had to help watch Ben, too. Alexa immediately said, referring to her doll, "No, I'm already watching my baby! I can't take care of two babies!" I said to her, "Well what if you had twins?" To which she replied, "If I had twins, I'd give one to the neighbor!" October 4, 2007. Alexa is 7. Alexa came home from school and said "We played Hangman today. I was the hooker." (Upon further inquiry, she called herself "the hooker" because she was the one who hooked the hangman up to be hung). October 4, 2007. Alexa is 7. Our next door neighbor left a birthday present for Alexa. So after she got home, Alexa went over to say thank you. I heard her ask "Can I come in?" as she got there. When she came back (with a bottle of water and a baggie of chocolate), I told her she'd been gone for a while and that she was supposed to go over there to say thank you, not to invite herself in for a drink and a snack. Alexa: "She said I could come in!" Me: "Yes, because you asked her 'can I come in'." Alexa, laughing: "You're an ear dropper!" instead of eavesdropper) October 23, 2007. Alexa is 7. Alexa was looking at the tag on a stuffed teddy bear and said to me: "Why are all my toys made in China?" October 24, 2007. Alexa is 7. Alexa asked if she could watch Ghostbusters with Melissa. I said No, she asked why, and I explained that she was too young and would find it scary. Melissa chimed in with, "and it has bad words in it." Alexa: "You mean like F - U - C - K?" After I expressed disapproval, she said "What?? Spelling it is better than saying it!!") October 28, 2007. Alexa is 7. Shawn and I were joking around with each other. I said something and then told Alexa to say "right" and agree with me. Shawn started joking around telling her not to. Apparently we got her confused. She finally just put both hands up to hold her head and said "Ask me when I'm 13!" This year, Alexa calls "minimizing" the computer screen "mini sizing." 10/31/07. Alexa is 7. We went Trick or Treating. One lady gave out a nickel and a piece of candy to each trick or treater. Alexa was a little ahead of us and came running back yelling excitedly: "Mommy! Mommy! That house is giving away pieces of money!" Another neighbor told her she had a cool hat (purple, flowery; she was a hippie this year) and said "Can I borrow it some time?" Alexa said: "Ew, no, I don't want to get lice!" 12/24/07. Alexa is 7. I challenged Shawn to a "Biggest Loser" type challenge and said we should make a deal where we compete to see who can lose the biggest percentage of body weight in a certain amount of time and that the winner would get some sort of prize like getting to choose a mini vacation. Alexa said to Shawn, "I can give you a tip on how to win!" -she then whispered to him "eat less!" 12/26/07. Alexa is 7. I suggested pizza for dinner. Alexa gave her usual reaction, which was, "Ohhhh, I don't want pizza!" I joked that she must be the only kid in the world who doesn't like pizza. She then said she wanted Chinese food, instead. While I thought about it for a moment, she said: "Oh, come on, you must be the only adult in the world who doesn't want Chinese food tonight!" 1/8/08. Alexa is 7 and in 2nd Grade. She was in Public School then. We were walking home from the bus stop this afternoon. Alexa: "Gabriel said he loves my boots. But I think he made a mistake and meant to say he LIKES my boots." Me: "Maybe he does love your boots." Alexa: "He can't be in love with boots." Me: "Maybe he meant...." (I was going to say "maybe he meant he really likes your boots") Alexa, interrupting: "...That he loves ME? That would be terrible!" (pause) "I'm not ever getting married until I find a boy I like and who likes me. And he has to like the things I like, and I have to like the things he likes. Then we'd be even. And we could get married and have babies. Unless he already has a wife. Then he'd say 'woman, I'm already married,' and then I'd run off." Not "funny" but cute: 1/19/08 Alexa, age 7, wrote Shawn and I a letter which said: "Dear Mommy and Daddy, I just wanted to say that I love you very very much and your the best parents I could ever have and I think youre doing a good job being parents. Love, Alexa P.S. youre the best" 1/08. Alexa is 7. Alexa went to the grocery store with Shawn. He (who is following along with me at home as I do the Weight Watchers diet) apparently got tempted by some Fudge Stripe cookies and almost bought them. Alexa helped out by saying to him: "Don't do it, Daddy! You're on a diet!" ... or not, by then saying to him: "But if you get them, you have to share them with me!" 2/15/08. Alexa is 7. I was getting some money from a fireproof box we keep in Shawn's computer room so that I could get a couple of things at the store. Alexa saw me and said "what are you doing in daddy's room?" I said, "getting money for the store." And she said: "Are you allowed to do that?" lol...ugh. She needed to immediately learn that just because I am a stay-at-home mom, that does not mean all money is Daddy's1 I was starting dinner and Alexa asked for a snack. I said no, as I was making dinner. Alexa: "Ben gets to have a snack." Me: "He's two. You're old enough to wait." To which she pitifully replied "No, I'm not. I'm only seven. I'm not a teenager." 2/28/08. Alexa is 7. After having had asked me for a couple of things already: Alexa: "Can you get me a glass of milk too? Me, kidding around: "Why do you keep asking me for things?!" Alexa: "I'm just trying to stay alive! You don't want me to die, do you?!" Me: "You're not going to die if you don't get a glass of milk right now." Alexa: "I NEED it for my bones, you know!" 3/2/08. Alexa is 7. Alexa lost another baby tooth. We put it in her little tooth fairy pillow and put it under her pillow as always. In the middle of the night, Shawn went up to deposit the "tooth fairy money"- which is pretty generous, we've been giving her $5.00 per tooth! He found a note from Alexa to the tooth fairy saying: "please give me more than $5.00"!!! So Shawn gave her $5.01. He and I thought that was funny, but Alexa was really happy that she got that extra penny :) 3/22/08. Alexa is 7. "Mom you know what you should make? Pancake puffs. You can put all kinds of things inside them. like: heavenly chocolate jalapeno puffs delicious jams even bananas and you can use them for special occasions like a birthday party." Then she announces "This is all real, Mommy. I'm serious. I saw it on a commercial." 4/2/08. Alexa is 7. As we were walking home from the bus stop and crossing a street, Alexa said quite cheerfully to me: "Look both ways or die! That's the rule!" 4/08. Alexa is 7. Alexa: "Mommy, what's that word...when you win something really big." Me: "the lottery?" Alexa: "No...." Me: "Oh, I know. I'll give you a hint. It starts with a J." Alexa: "Jackbox!" Me: "Close. You got the Jack part right, but it's not box." Alexa: "Give me another hint." Me: " cook in it." Alexa: "Jackpan!" 4/8/08. Alexa is 7. My aunt sent Alexa a few books, including "Tales of a Fourth Grade Nothing." Alexa was only in 2nd grade and I said to her "Maybe you should wait until you're in fourth grade to read that book." Alexa: "No, I'm too young to wait!" Me: "What does that mean?" Alexa: "It means I don't have any patience." 4/12/08. Alexa is 7. I was brushing Alexa's hair as we were getting ready to go out to the library for a used book sale. Alexa immediately started with the "ow, ow, that hurts, ow" stuff, so I bribed her: Me: Look, I'll make you a deal. If you don't whine, pout, cover your head with your hands or yell ow every two seconds, I'll let you buy some books at the library." Alexa, immediately straightening up: "Okay! Can I have a lollipop too?" Me: "No." Alexa: "How about, can we go out to dinner, and I pick where we go?" Me: "No!" Alexa: "Why? It's not like we're poor!" Me: "Being poor has nothing to do with it." Alexa: "Yes it does. Because if you're poor you have no money and you can't go out. And you'd have to be a farmer." Me: "A farmer?" Alexa: "Yep and you'd have to sell your crops and then you'd get rich and have money and then you could buy things." 5/2/08. Alexa is 7. I told Alexa she had to go to bed. She asked if she could watch TV for a while, saying it wasn't a school night. I told her, jokingly, that I was going to think of a number from one to one thousand and if she could guess the number I'd let her watch TV. She guessed "55" and I told her that was right (I would have told her it was right regardless of what she'd guessed). Shawn, of course, knew this, and he started saying I was lying and just telling her she was right, and that the odds were one in a thousand that she'd actually guess it. I told him to stop being negative. He said he wasn't being negative, he was just explaining the odds to her. I said, "She's seven, she doesn't need to know about odds." And Alexa piped in: "I know odds! 1, 3, 5, 7, 9, 11....." 5/19/08. Alexa is 7. We were sitting at a TGIF's restaurant with another couple having dinner. Alexa was doing one of the kids' menu activities, which was seeing how many words you could make out of a longer word, and she suddenly asked: "Mommy, is 'gay' a word?" After a brief pause, I replied, "Yes, it means happy." To which my friend replied "and in California, it means ecstatic." - being as a law was just approved in California to allow gay marriages. 5/22/08. Alexa is 7. Shawn bought me a Wii Fit yesterday and I let Alexa try it out after school today. But shortly into it Melissa reminded her that Shawn had told them both to clean their rooms right after school. So the conversation went like this: Me: Did Daddy tell you to clean your room after school? Alexa: Yes... Me: Oh, then you better go clean it. Alexa: Aww can't I do it later? Me: No, you have girl scouts later, you won't have time. Alexa: Can't I just tell him that I forgot?? 6/08. Alexa is 7. We were in line at the deli counter at the supermarket where I was buying ham and turkey. Alexa: "Can we get bologna? Bologna is familiar to ham." Me: "Familiar?" Alexa: "Yeah." Me: "Do you mean similar?" Alexa: "Yeah. What does familiar mean, anyway?" Me: "Familiar something or someone you know. That would mean you're familiar with it." Alexa: "Well I'm familiar with bologna AND I'm familiar with ham. Because I know bologna and I know ham." 6/25/08. Alexa is 7. As we were driving, Alexa said to me: "When I grow up, I'm going to earn a house with someone to work for me. Like a maid. How do you get a maid, anyway?" Me: "You hire one- you pay someone to come work for you and clean your house." Alexa: "Well, I'm not going to be mean, either. If she does a good job, I'm going to let her go on vacation. Like take a week off and go somewhere." Me: "Will you pay her for the days she doesn't work?" Alexa: "I'll pay her for the days she works. I'll pay her $20.00. Would that be good?" Me: "$20.00 for how long? Like, how often will you give her $20.00?" Alexa: "Like for a week. And if she does a good job, I'll give her $30.00, like every 14 days." 6/29/08. Alexa is 7. We were wrapping presents for my twin nephews' 5th birthday. Alexa was watching. Alexa: "Why don't you just use ribbon to wrap presents, instead of tape? That would be easier." Me: "Actually it really wouldn't be easier." Alexa: "For me it would be. All you have to do is go to the store and buy ribbon...." Me, jokingly: "So it's easier to go to the store and buy ribbon than it is to grab the tape off the shelf?" Alexa: "Well you get it ahead of time. The day my kids are born I'm going to go to the store and get ribbon so then I'll have it for all the birthdays." Me: "You're going to go to the store to buy ribbon the day your kids are born?" Alexa: "Yep. I'll ask someone to babysit them. Just for a minute. And I'll go to the store and buy ribbon." May 16, 2009. Alexa is 7. We were driving in the car when Alexa said "Oh, I found a quarter, but it's under the seat!" She started trying to bend down to the floor to get this quarter. I said to her, "Alexa, you have to sit up properly in the car with your seatbelt on the right way, or else it isn't safe and your seatbelt can't protect you properly if we get into an accident. And a quarter isn't worth that, trust me." Alexa, with the infinite wisdom of an eight year old, replied: "But at least the quarter would help you pay for the hospital if I got hurt." 7/18/09 – Alexa is 7. We visited Quiet Valley Living Historical Farm. Staff dressed in period clothing would re-enact life in the old days. In each building, a different person would talk to us about the room and the things they did there. We saw how they might make toast way back when, how they used coals for cooking, how it took so long to make candles that only burned for 20 minutes, how they kept warm in the winter and different things like that. One girl kept talking about her "sister in law, Cara" and saying how she couldn't cook and how she'd burned a cake she was trying to make because she didn't cool the coals off enough or some such. Ben, three years old, spoke up and said aloud to the room, "My mommy knows how to make cake." Everyone laughed. Then Alexa piped in with, "But usually she just buys them." Everyone laughed harder. October 3, 2009. Alexa just turned 8. There's a diner right in town that we pass all the time as it's right on the main highway going into and out of town. We've gone there multiple times in the past for breakfast, but it's been quite a while since we've gone. So today Alexa randomly asked me, "Mom, we go to the diner, right?" I said, "Well, we have, but it's been a long time since we went there." She said: "When I grow up, I'm going to take my kids there." After a moment, she added: "If I can remember how to get there." October 25, 2009. Alexa is 8. We were in the kitchen and Alexa suddenly demanded: "Why do we have tobacco in our house?" I turned around saying "What?" and saw her holding a little bottle of red sauce. I said "That's not tobacco. That's tabasco." She said: "That's the same thing! Isn't it?" November 13, 2009. Alexa is 8. Alexa was asking if a boy usually asks a girl to marry him, or if a girl could ask a boy. I said a lot of times the boy asks but that sometimes a girl does or they just talk about it together. She asked if I thought somebody would ask her to marry him. I said I'm sure someday somebody will. Which set her off on a train of thought that went: "But I have to make sure I really like him. Like, we will probably spend a day together, maybe have lunch, go out to dinner, he can ask me questions, and I can ask him questions, and then we can decide if we think we should get married." Of course I had to explain that it takes a lot more than one day of spending time with someone before you decide if you love them enough to get married. "How many days?" she then wanted to know. November 17, 2009. Alexa is 8. Alexa and I were sitting in the waiting room of the doctor's office. There was a lady there with a little boy who looked to be maybe a year and a half old. Alexa wandered over to them and very casually, in the same way you might say "I like your shoes," said to the woman: "I like your kid." December, 2009. Alexa is 8. Alexa and I were starting to read a section from "The Care & Keeping Of You, The Body Book For Girls" for Health. This particular section covered "the pubic area." When I first mentioned it, Alexa said: "I know what that is." And she proceeded to point to her eye. I had to inform her that pubic is NOT the same as pupil. 4th Grade, Alexa is 8: Alexa brought some dirty laundry to Shawn in the basement, and started going up to get more. I reminded her that we still had a bit more schoolwork to do. Here’s how the conversation went: Alexa: What’s more important? School or laundry? Me, jokingly: Yes. (meaning: both!) Alexa: Would you rather be educated or naked? Me: Huh? Alexa: Well, if we don’t have any clean clothes, we’ll have nothing to wear, and then we’ll have to walk around with no clothes on! Me: So are you trying to say that laundry is more important than school? Alexa: Yes! And she proceeded to go upstairs and get the rest of the laundry. December, 2010. Alexa recently turned 10. Alexa: “I can’t think of another word that has a suffix.” Me: “Hm. Try to think of a word that ends in ful.” Alexa: “…Waffle?” July 13, 2011. Alexa is 10.9 years old. We were doing Story of the World, reading the chapter on the Phoenicians. In the Usborne Book of World History, there was a section that said: "Occasionally in times of great trouble, the Phoenicians sacrificed children to their gods. The burnt remains were placed in pottery urns, like these, and buried." Alexa looked horrified, exclaiming, “They burned their own children?! Thank God you're not a Phoenician!” Nance - 41, Wife, Homeschooling Mom, Bookworm, Writer, Field Tripper, List Maker, Planner, Chauffeur. Melissa - 22, Special Needs. Is in a sheltered workshop/life skills day program. Likes music, movies, shopping, and reading. Alexa - 14, Left public school in March of 2009 and has been home since, happily homeschooling with Oak Meadow and an eclectic mix of other things. Currently in 8th grade. Enjoys reading, writing, art, singing and music, theater/performing, doing her nails, and sleepovers with friends. Ben - 9, Has never been to any outside school. Currently doing 3rd grade at home. Enjoys computer, video and board games, especially Minecraft and shooter games, silly jokes, soccer, rough-housing, and occasional cuddling and reading. Adelaide - 15 months and my little ray of sunshine. :) Enjoys pointing at things, chasing the cat, trying to pull all the books off my bookshelves, eating, playing, and snuggling. We are a relaxed/eclectic, secular homeschooling family living in Pennsylvania and thoroughly enjoying Life Without School! Alexa is using: Oak Meadow 8 Civics; Oak Meadow 8 English; Oak Meadow Basic Physical Science; Story of the World Middle Ages; and Teaching Textbooks Math Pre-Algebra. Ben is loosely using the Oak Meadow 3rd Grade curriculum (minus the math), Teaching Textbooks Math 3, and Reading Eggspress. I've always been a fairly relaxed homeschooler. While I've buckled down more this year with my 8th grader, in general we do school around life, not life around school. We use mainly a fun, hands on curriculum that isn't overly time consuming and isn't dry or textbookish, and we're always willing to drop it for the time being if something fun, interesting, or educational comes up outside the house. Living is learning! Welcome To My Blog! The ABCs Of Relaxed Homeschooling A Perfect Day Affidavits, Objectives & Samples, Oh My! A Kindergarten Dropout Homeschooling, A Year Later Preschool Or Not? I Wouldn't Have It Any Other Way A Day In The Life Of A New Homeschooler Homeschool Poem What Does A Homeschooler Do Every Day? What Does A Homeschooler Do Every Day Part 2 What About Socialization? Why Homeschool?! Dear Judy Molland What I Really Mean When I Say I Homeschool Funnix Beginning Reading Program Review Getting Started With Spanish Review Growing, Growing Strong Review Insect Lore Negative Review Life of Fred Math Review Little Passports Review Meet The Masters Review Movie Review: Snowmen Oak Meadow Review Sentence Composing For Elementary School Review Story Of The World Review Teaching Textbooks Math Review Times Tales Review Typing Instructor For Kids Platinum Review Alexa's Third Grade Book Log Alexa's Fourth Grade Book Log Alexa's Fifth Grade Book Log Alexa's Sixth Grade Book Log, Year 1 Alexa's Sixth Grade Book Log, Year 2 Alexa's Seventh Grade Book Log Alexa's Eighth Grade Book Log Ben's Pre-K Book Log Ben's Kindergarten Book Log Ben's First Grade Book Log Ben's Second Grade Book Log Ben's Third Grade Book Log Oak Meadow Kindergarten Schedule Sample, With Pics Oak Meadow 4th Grade Schedule Sample, With Pics Oak Meadow 5th Grade Schedule Sample, With Pics Our 6th Grade Stretched Over Two Years Plan Homeschool Affidavit Homeschool Objectives, Elementary and Secondary Level Homeschool Portfolio, UPDATED Summary, To Include With Portfolio, Example 1 Summary, To Include With Portfolio, Example 2 Standardized Test Results Books Featuring Homeschooled Characters, Titles A-I Books Featuring Homeschooled Characters, Titles J-R Books Featuring Homeschooled Characters, Titles S-Z 52 Books In 52 Weeks, Mom & Daughter Style, 2011 Homeschooling Quotes & Funnies Our Fresh Air Fund Experience Funny Things Alexa Has Said Funny Things Ben Has Said My Favorite Links How I Got Alexa's Eczema Under Control! My TTC, Pregnancy, and Miscarriage Saga, PART 1 My TTC, Pregnancy, and Miscarriage Saga, PART 2 My TTC, Pregnancy, and Miscarriage Saga, Part 3 The Family Who Wouldn't Change The Toilet Paper Grab my button for your blog: Be sure to check out: The Ultimate Homeschool Blogroll Homeschool Blinkies: Powered by Designed by Tiffany Chow
global_05_local_5_shard_00000035_processed.jsonl/9325
Star Wars official shirt-line is a step away from contemporary fashion, literally by Gavril Mankoo We’ve always been fans of the Star Wars franchise and more often than not, merchandise of the same has left us wide-eyed and drooling in our laps. This time around though, we’ve stumbled across what could pretty much be hailed as the Ugliest Star Wars Merchandise ever sold, hailing from the stables of Tokyo/Paris based Comme des Garçon. This line of licensed Star Wars apparel includes shirts with the names of character names and the like scrawled all over that we wouldn’t wish to be caught dead in. priced at a whopping $350 a piece, these shirts are a fashion disaster to say the least and we’d rather use that very precise sum of money to pick out better and more tasteful merchandise like the R2D2 Money Box, the LightSaber Book Stand or the Storm Trooper sneakers!
global_05_local_5_shard_00000035_processed.jsonl/9330
BBC Homepage World Service Education BBC Homepagelow graphics version | feedback | help BBC News Online  You are in: World: Europe Front Page  Middle East  South Asia  From Our Own Correspondent  Letter From America  UK Politics  Talking Point  In Depth  Monday, 14 May, 2001, 17:00 GMT 18:00 UK Reign of two halves for Berlusconi Silvio Berlusconi Berlusconi: Stormed to power using football metaphors By David Willey in Rome Media tycoon Silvio Berlusconi had his first taste of prime ministerial power seven years ago. His centre-right victory, in March 1994, came only months after he had created a new party from scratch. Forza Italia replaced the Christian Democrat and Socialist parties which had imploded as a result of the "Tangentopoli" or "Bribesville" scandal. Francesco Rutelli Left-wing candidate Francesco Rutelli has closed on Berlusconi Using the language and slogans of the football field, Berlusconi created a new simplistic political language which immediately won over many Italians used to the deliberately obscurantist terminology of the fusty old political parties. He talked incessantly about "coming out onto the field", "players" and "winning the game". He seemed to have a magic touch. Even the Milan football team he owned (and still owns) won the European Champions League title with a 4-0 victory over Barcelona that year. Born-again fascists On 29 March 1994, Forza Italia became Italy's largest single political party, winning 21% of the general election vote, beating the former communists - now retitled the PDS or the Democratic Party of the Left - by just under one percentage point. The former neo-Fascist party or MSI - renamed Alleanza Nazionale after abjuring its Fascist origins - got a record 13% of the vote, while the Northern League got 8%. On 11 May, a centre-right coalition was put together - after some exhaustive haggling between the partners. The end came rapidly after only seven months of Berlusconi government No fewer than five ministries went to the Alleanza Nazionale. Although both the right and the left had promised reform of a state in which the ordinary voter had little confidence, they preferred to believe that Mr Berlusconi, the country's most successful entrepreneur, with his business acumen and dynamism was more likely to succeed. There was a weakness in his position however. Although he had a working majority in the Chamber of Deputies, he had none in the upper house, the Senate. Nuns with election poster The election has been closely-fought In the early months after his election victory, it looked as if Mr Berlusconi might achieve his ambition of becoming leader of a reformed political system as quickly as he had given birth to Forza Italia. In the European elections of June 1994, the new Berlusconi party got 30.6% of the votes and, together with his two coalition partners, had just over 50% of the total. An opinion poll taken that summer found that over 70% of Italians believed their country needed a "strong leader". But things turned quickly sour. Umberto Bossi, when he saw a fall-off in support for his separatist Northern League in the European elections, began to doubt whether Mr Berlusconi was sincere in his promises to push federalism. Unwise words As for Gianfranco Fini, his unwise public statement that Mussolini was "the greatest statesman of the 20th century" was immediately splashed around the world, and created doubts in the minds of many Europeans about the seriousness of the credentials of his made-over post-Fascist party. In July 1994, Mr Berlusconi's Justice Minister, Alfredo Biondi, issued a decree in effect bringing to an end the judicial process called "Clean Hands", which had upset the old political system so entirely as to provide the conditions for the successful creation of Forza Italia. The conflict-of-interest dispute over the public and private roles of Italy's wealthiest citizen who was also serving as prime minister was never resolved There was an immediate outcry from the judges and prosecutors of "Clean Hands" that Mr Berlusconi was trying to destroy their work, and was trying to save the thousands of politicans and businessmen - including himself - who had been indicted on corruption charges. The decree was withdrawn. Failure to reform the state pension scheme turned out to be another stumbling block. On 12 November, one-and-a-half million workers demonstrated in Rome against Mr Berlsuconi's pension cutting budget. It was the biggest trade union demonstration in the history of Italy's postwar republic. Corruption charges The end came rapidly after only seven months of Berlusconi government. On 22 November 1994, Mr Berlusconi was chairing a United Nations conference in Naples on organised crime when he received papers from Milan prosecutors informing him he was under formal investigation on corruption charges. On 13 December, he appeared before the magistrates. Umberto Bossi withdrew his support from the government and on 22 December 1994 Silvio Berlusconi resigned, bringing to an end to yet another "revolving door" Italian government which had lasted just seven months. The economic and organisational problems of the Italian state had not been solved. Search BBC News Online Advanced search options Launch console See also: Internet links: The BBC is not responsible for the content of external internet sites E-mail this story to a friend Links to more Europe stories
global_05_local_5_shard_00000035_processed.jsonl/9354
The Sideshow New Stratolaunch plane will take people into Earth’s orbit Eric Pfeiffer The Sideshow View photo The Stratolaunch will soon take tourists into space Microsoft co-founder Paul Allen is teaming up with aerospace pioneer Burt Rutan to build a giant machine that is part airplane and part spaceship. The new vehicle will be able to transport people and cargo into Earth's orbit and is scheduled to be commercially available by 2016. Unlike traditional rockets, the Stratolaunch will not require a launch pad for liftoff. Instead, the plane will ascend to a heightened elevation--and then the rocket portion of the craft will release and blast the ship into space. You can watch a computer simulation of a Stratolaunch mission here: Powered by six 747 engines, the new craft should also be far more fuel efficient than traditional shuttle launches, since it will bypass the standard supply of expensive rocket fuel needed to propel a shuttle up from the ground. The craft will also be enormous, with a wingspan of 385 feet, (making it larger than a football field) while weighing 1.2 million pounds. And the Stratolaunch will not be restrained by the factors that normally dictate when a shuttle can launch into space from the ground. Allen and Rutan are competing with other private companies in a race to deliver people and goods to the International Space Station, now that NASA has cancelled its space shuttle program. The pair are teaming up with another Internet mogul, Elon Musk, founder of PayPal and Tesla, who is providing funds for the spaceship and booster components. Allen is no stranger to space exploration, having already won the Ansari X Prize in 2004, for his sponsorship of a craft that went into space but not into orbit. If all goes to plan, the Stratolaunch program will be involved in satellite transport--while also promoting space tourism. Other popular Yahoo! News stories: Video: Dogs look out car windows in slow motion Gun in plane carry-on bag accidentally fired by police officer Eggbert, the giant talking egg who knows your name View Comments (71)
global_05_local_5_shard_00000035_processed.jsonl/9377
Skip to content, or skip to search. Skip to content, or skip to search. The Boy Can't Help It His younger brother, Peter, is now a conservative columnist for the London Express. He tells me in a phone call that he did indeed hope to be a navy officer until an eye defect cut those plans short. With the amused and resigned tone of the second-born, Peter admits that "Christopher was always the kind of person picked for school plays to play the lead role." Arriving at Oxford in 1967 at the height of the antiwar movement, Hitchens declared himself a socialist and threw himself into revolutionary activity. "He was very dashing," recalls Martin Walker, a classmate and now a Brussels-based reporter for The Guardian of London, "and rather Byronic, a compelling public speaker." Hitchens still cites his arrest record with pride: He was locked up for disrupting the speech of a reactionary politician and for trying to disrupt a cricket match against an all-white South African team. In between rallies, he also wrote the society column for the student paper and book reviews for The New Statesman. At Oxford, Hitchens discovered the pleasures of crossing class lines. "Christopher always moved easily in upper-class and fashionable circles," says Walker. "He was criticized for being a 'champagne socialist' or a 'country-house revolutionary.' " Harry Evans, now the editorial director of the Daily News, recalls hiring Hitchens, just out of college, as a writer for the Sunday Times of London in the early seventies. "The quality of his mind impressed us all. It was surprising to find someone challenging the conventional wisdom who was barely old enough to know what the conventional wisdom was." The most searing drama of Hitchens's life, a story that makes the current controversy seem like a stroll through the cherry blossoms, occurred in 1973, when he was 24 and living in London. His parents' marriage was in trouble; his mother had an affair with a defrocked vicar, and she eventually moved out. "I met her one day when she had been shopping," Hitchens says, "and there was a man carrying her parcels. I just knew. My father was a great guy, loyal, solid, hardworking, very principled, boring. This guy was charming but hopeless, couldn't hold a job." Like so many writers, Hitchens frequently mines his own life for material. But the one thing he's never written or talked about publicly is his mother's death. Perhaps because he's turning 50, about her age when she died, he's been thinking about it a lot, and the terrible details pour out. Hitchens was in London when he got the news: The first report was that she had been murdered in Athens. His voice is steady as he describes the scene with a reporter's eye -- the smell of the blood, the crime-scene photos, the view from the Athens hotel room where his mother was found dead. "I had to go take care of it," he says, flying down alone to find out what had happened. What he found was a suicide note addressed to him: His mother had taken sleeping pills while her lover had slashed himself repeatedly. "It was terrible to see the room and the really awful police photographs," he said. His mother had apparently had a change of mind and knocked over the phone in an attempt to get help, help that never came. Finding the note addressed solely to him was especially distressing. "Knowing and believing you're your mother's favorite is a great thing for a guy, Freud says, but it's another thing to have it in writing." Current Issue Subscribe to New York Give a Gift
global_05_local_5_shard_00000035_processed.jsonl/9417
Bill Thayer [Link to a series of help pages] [Link to the next level up] [Link to my homepage] This webpage reproduces an article in American Journal of Philology Vol. 54, No. 4 (Oct.‑Dec. 1933), pp362‑367. The text is in the public domain. This page has been carefully proofread and I believe it to be free of errors. If you find a mistake though, please let me know! p362 On Suetonius, Nero, 33.1. In the Classical Weekly, XXVI (1933), p151, H. C. Nutting says of my translation of "Denique bustum eius consaepiri nisi humili levique maceria neglexit," that it reads as if the active form of the infinitive had been used by Suetonius. That is quite true, but I trust it is not necessary to add that I did not mistake consaepiri for an active or for a deponent. Nutting's explanation of the meaning of the sentence is, that Nero gave slight heed to the scant honoring of the place of Claudius's burning; i.e. he did not intervene and arrange for the proper marking of the spot. Professor Knapp, in an editorial footnote, says: "I take it that Professor Nutting would translate thus: 'He disregarded the fact that the funeral-place was being fenced about (by nothing except) etc.' " This seems a fair interpretation, but both translations seem to indicate that the place was fenced about by someone other than Nero, and that he did not intervene and have a better job done; the question naturally arises, by whom was the fencing done, and when. To my mind "bustum consaepiri" simply means the enclosing of the bustum, and that idea is expressed by my translation. It might have been safer for one's reputation as a grammarian to follow Holland's version, "Finally, he neglected the place of his funerall fire, suffering it to be empaled, but with sleight stuffe and low railes of timber" (Holland follows the reading materia of all the manuscripts, instead of the conjecture maceria, which is accepted by Ihm and by most modern editors); or that of Stahr: "Endlich liess er aus Nichtachtung seine Brandstätte nur mit einer niedrigen und schlechten Mauer umgeben." Except for the slight risk involved (which I feel inclined to run) my rendering seems more concise and equally explicit; all three seem to me better than those suggested in the Classical Weekly. Besides the mere translation the passage in Nero 33.1 suggests several interesting problems; otherwise it would hardly be worth discussing. First of all, what is the meaning of bustum? The word is defined by Paul. Fest. s.v. as follows: "Bustum proprie dicitur locus, in quo mortuus est combustus et sepultus, diciturque bustum, quasi bene ustum; ubi vero combustus quis tantummodo, alibi vero est sepultus, is locus ab urendo ustrina p363vocatur; sed modo busta sepulcra appellamus; cf. Servius ad Aen. XI.201. These statements, exclusive of the false etymology and sometimes of the use of ustrina, are so abundantly confirmed by the passages cited in the Thes. Ling. Lat., that further evidence seems unnecessary. Suetonius has bustum in three places. In Jul. 84.5, "bustum frequentarunt (Iudaei)," the reference is clearly to the place where his body was burned. Was it also the place where his bones (or ashes) lay, as is demanded by proper and original meaning of the word? According to Cassius Dio, XLIV.51.1, before the altar which now marks the spot had been set up, Caesar's freedmen had taken up his bones and deposited them in the family tomb. This is believed to be the tumulus Iuliae (Top. Dict. Anc. Rome, p542), which was perhaps also sometimes called C. Iulii tumulus (Livy, Perioch. 142; not 140, as in the Top. Dict.). This disposal of the dictator's bones seems probable enough according to Roman usage. It might be questioned because of the number of things which were burned with Caesar's body (Suet. Jul. 84.3, 4), which would seem to have made the collecting of his bones, if any were left unconsumed, or of any authentic ashes, a difficult matter; because of the troublous times which followed; and because of the belief that he had been transported to heaven (Jul. 88): perhaps also because the spot was marked by the altar and the column of Numidian marble, in lieu of the usual tumulus. If we accept Dio's testimony, Suetonius should, according to the definition of Festus, have used the word ustrina. That he did not do so is not surprising. The word is rare, except in inscriptions (Suetonius nowhere uses it), and seems commonly (if not always) to be used of crematories connected with great family tombs: ustrinum Antoninorum, ustrinum Domus Augustae (Top. Dict. p545); or with such common burial places as columbaria (Marquardt, Privatleben, p369, note 6). Moreover they were not loca religiosa (Ibid. p381) and they were forbidden within the city by the Twelve Tables (Cic. de Leg. II.58). It seems probable that Suetonius here used the word in its proper sense, and not in the later one of a tomb, which would certainly be out of place in this connection. In Nero 38.2, ad monumentorum bustorumque deversoria plebe compulsa, the word is contrasted with monumentorum and may perhaps be used in its proper sense; it is probably more naturally p364taken as a synonym for sepulcrorum, although taking refuge in busta would emphasize the wretched plight of the commons. In Nero 33.1 there are several problems connected with the use of the word. In Claud. 45 we are told that Claudius was buried with the usual pomp of imperial funerals and enrolled among the gods, an honor neglected and finally annulled by Nero; cf. Nero 9. The splendor of his obsequies is confirmed by Tacitus (Ann. XII.69 and XIII.2, where he calls it censorium funus) and by Dio, LX.35.2. Tacitus in the former of his two references says: "funeris solemne perinde ac divo Augusto celebratur, aemulante Agrippina proaviae Liviae magnificentiam," and Dio uses substantially the same language, adding the name of Nero to that of Agrippina. Naturally, it seems to me, this would imply that his ashes were taken to the Mausoleum of Augustus, a supposition which is perhaps supported by his inclusion in the family of Augustus in the inscriptions from the arch at Pavia (Dessau, 107). Of this however we have no direct evidence (Top. Dict. p334); an additional argument in its favor is perhaps that the same thing is true of Tiberius, although it is generally assumed that his ashes were deposited in the Mausoleum on the ground that their exclusion would surely have been emphasized by our classical authorities (Top. Dict. l.c.). Why should not this also be assumed in the case of Claudius, particularly in view of the language used by Tacitus and Dio? But Suetonius may use the word bustum here in its proper sense, and there may have been somewhere a tumulus Claudi. If the ashes of Claudius actually found rest in the Mausoleum, his body would naturally have been cremated in the ustrinum connected with that monument (Top. Dict. p545), and the reference to his bustum by Suetonius is meaningless; if it is authoritative, it is good evidence that Claudius did not have a place in the Mausoleum. If not, where were his ashes taken? Perhaps to the sepultura gentis Claudiae sub Capitolio, which is not to be identified with the so‑called Sepulcrum Claudiorum (Top. Dict. p487); perhaps they were buried on the spot where his body was cremated. We may compare the disposal of the ashes of Nero in the family tomb of the Domitii (Suet. Nero 50), where his tomb is called monimentum, but in Nero 57.1, tumulum. In Claud. 46, among the omens that foretold that emperor's death, is cited the striking by lightning of the p365tomb (monumentum) of his father Drusus. Since it is all but certain that Drusus was consigned to the Mausoleum of Augustus, "the tomb of his father Drusus" apparently refers to that edifice. It is natural enough for Suetonius so to designate the tomb in that connection; for the striking of the Mausoleum would not necessity be an omen of the death of Claudius (whether or not his ashes were there); but the striking of Drusus' tomb in the Mausoleum, or of the Mausoleum referred to as the container of his tomb, would be such an omen. Since in Livy, Perioch. 142, we are told that the ashes of Drusus were put in tumulo C. Iulii, it seems barely possible that tumulus C. Iulii is a loose, or erroneous designation of the Mausoleum, especially in view of the fact that the evidence for the collection and disposal of the ashes of the divine Julius is so scanty. The writer of the Periocha may have thought that the ashes were later deposited in the Mausoleum, or he may have disregarded chronology. It is usually supposed that he referred to the tumulus Iuliae (Top. Dict. p542); if so, he was doubtless wrong. Who enclosed the bustum of Claudius with a low and mean wall? Obviously Nero, if Suetonius is to be trusted. When did he do it? Probably not at the time of the splendid public funeral, unless it was a temporary wall, to be replaced later by a better one; that would be out of keeping with the effort of Nero and Agrippina to emulate the magnificence of the obsequies of Augustus. When did Nero neglect to supply a better wall? Most naturally, I should say, when he annulled the deification of Claudius, which Smilda (Vita Claudi, p175) with probability assumes to have been the time when Nero almost destroyed the temple of Claudius which was begun by Agrippina and restored or rebuilt by Vespasian (Suet. Vesp. 9.1). These questions and their answers have some bearing on the translation of our passage, of which, however, enough has been said. Was it usual to surround busta by a wall? It seems probable enough, but the information about busta in our dictionaries of antiquities is provokingly scanty, and nothing is said on that point, I think, either by Marquardt, Privatleben, p380, or in the long article "Funus" in Daremberg and Saglio. Marquardt gives us the best account of a bustum; he says, among other things, that after the body had been cremated, the bones were p366collected and placed in an urn. The urn was set in the midst of the ashes of the funeral pyre and covered with earth; then a tumulus was erected over the spot. If the body was not burnt and buried in the same place, the former ceremony was performed in an ustrina. Thus we see that bustum and tumulus were frequently synonymous; in fact, they ought always to be so when the former word is used in its strict sense. Now it seems clear from such literary testimony as we have, as well as from the Etruscan tumuli surviving at Cervetri and elsewhere, that such structures had a foundation of stone about their base, and so might perhaps be said to be "surrounded by a wall"; the "wall" however was not something external, but κρηπίς of the tumulus (Casaubon on Nero 33). In the note referred to, Casaubon says: "semper autem monimenta suorum sepiebant veteres, tenuiores quidem maceria aut humili aliqua levique materia; honestiores vero lorica e silice vel saxo aut marmore." The reference to "humili aliqua levique materia" seems to have been inspired by the reading materia in Suet. Nero 33.1 (now generally abandoned); at least I can find no other reference to a wooden wall in such cases. The first example which Casaubon cites in support of his general statement is Suet. Nero 50, "in eo monimento solium porphyritici marmoris circumsaeptum est lapide Thasio"; in Nero 57 the same monument is referred to as a tumulus. In Virgil, Culex 395 ff. the construction of a tumulus, with a κρηπίς of marble is thus described: Congestum cumulavit opus atque aggere multo telluris tumulus formatum crevit in orbem. Quem circum lapidem levi de marmore formans conserit, assiduae curae memor. Digest XI.7.37, "si amplum quid aedificari testator iusserit, veluti incircum porticationes, eos sumptus funeris causa non esse," which Casaubon also cites in this connection, is thing quite different. All this seems to suggest that bustum in Nero 33.1 was not only the place where the body of Claudius was burned, but also the place where his ashes were deposited and surmounted by a tumulus; that this tumulus for some unknown reason was not surrounded at once with a foundation wall, but only after Nero had ceased to honor the memory of his predecessor, and probably p367after the death of Agrippina. But it is questionable just how much reliance can be placed on this sentence. In the Thes. Ling. Lat., s.v. bustum, all the references to the word in Suetonius are put together under the caption "2. latiore sensu i. q. tumulus (rogus, sepulcrum)". This seems doubtful; at least, the matter seems to call for further consideration. John C. Rolfe. University of Pennsylvania. [image ALT: Valid HTML 4.01.] Page updated: 4 Feb 09
global_05_local_5_shard_00000035_processed.jsonl/9439
Take the 2-minute tour × I am highly interested in learning how to program but I am unsure whether I want to lean towards web developing or software programming. Or does computer programming cover both in a nut shell? Where should or how should I start? share|improve this question closed as not constructive by Tim Post, user281377, Yannis Mar 30 '12 at 7:44 4 Answers 4 Web development and traditional client application development (which is what I assume you mean by "software programming") are very different things. When writing a web app, you take input from a client and produce HTML as output, to be rendered in the client's browser. Web programming is basically stateless. This means that because the browser does not maintain an open connection with your server, you can't assume anything about past interactions when a new request comes in. Everything you create has to be based on the data that the browser sends you and the data you have stored in the database. (It's possible to save some data in memory on the server so you don't always need to read the database for everything if you've got the same user making a bunch of requests in a short amount of time, but since the Web connection is stateless and doesn't remain open, you have no way of knowing when they're finished, so you have to make sure all data gets stored in the database.) On the other hand, when writing a traditional app, you generally directly control not only the data but also the code that draws what the user sees. And knowing when the program is in use and when it's being shut down is an inherent part of the program, so you can rely a lot more heavily on in-memory data, and only worry about saving data when it's appropriate to do so within the context of your program. Also, a traditional app is run directly on a user's computer and is only used by one person at a time, whereas a webserver can have to service hundreds or even thousands of connections from different people all at once. To give a simple example, let's say you have a game where a character can walk around on a map. In a traditional program, your code draws the scene, the user uses the keyboard or mouse to tell the character to move to another position, and your program draws the movement to the screen. It's probably animated, because that's not hard to do if you know a few things about sprites. Doing that on a web app would be very different. The user has a webpage open in their browser that displays the map and the character. They select a new position to move to by clicking on it. Your page has code in it that tells the browser to send a request to execute that move to your server over HTTP. Your server receives it. First it has to validate it, (you have to make sure it's a legal move; since the move command is just a Web request, it's very easy for someone to try to cheat by just sending the server whatever they want, whether or not it actually makes sense according to the rules,) by looking up the character's current position in the database and making sure it's possible to execute that move. Then (assuming it's valid) it calculates the effects of the move on the game, saves the changes to the database, and creates a new webpage containing the updated game map to send back to the user's browser. This is a bit of an over-generalization (on both sides) but that's the general idea of the difference between Web programming and traditional app programming. Which one you should lean more towards depends on what it is you're interested in creating. That's really the first question you should answer. If you just say "I want to program something," then you've got no starting point. But if you say "I want to write a XYZ" then you have an actual goal, and you can start to learn how it's done. One bit of advice, and this is another generalization, but it's a useful one. When you get down to it, programming really only consists of two basic tasks: breaking down a problem into a set of smaller sub-problems, and expressing small problems in formal logic so that a computer can understand them. If you can learn to do those two things really well, the rest is just specific techniques and gaining the experience to know which one to use where. share|improve this answer Hey, web server is a traditional program in itself. The program that you run on a web server is what falls under web programming (client side and server side). –  kadaj Mar 30 '12 at 6:45 Interest is something that is developed when you actually work on that thing. So IMHO you should give a try to both for some amount of time.Later find out the pros and cons of working with both. Try finding out which one was easier to code or to understand,which one made you curious and develop inside you want to learn more. Speaking about Computer Programming its really a very wide topic. Web Application and Software Programming is nothing less wider. Web application is not just setting up a website and connecting to the database.Its much more then that. You need to be very creative while designing a website to attract more people more over the security concerns is also an important aspect. You also have different technologies to develop an web app.Getting familiar with the technologies will be something you will need to do on your own. Software Programming its not just your desktop applications.You also have your CNC programming, OS , Drivers ,Gaming and much more. Technologies that you use are also numerous. One More thing I want you to consider is the Market condition what's the latest thing. Have a try at it cause its easier to find a job with a Latest technology knowledge then the one that is Outdated. share|improve this answer Web development isn't exactly programming at first. Web development is centered on formatting and displaying a semi-static page to the user. One does not need algorithms etc for this(not much at any rate), one just needs some aesthetic sense. On the other hand, when you program, you start off with logic. I feel that this is a better thing to do, because once you know programming, segueing into webdev is pretty easy. The "learning web development" process is like this: • Learn HTML/CSS . This is not programming. • Learn a bit of javascript for simple interactiveness. You still don't really learn programming this way. • Design some web pages. No programming required(HTML!=programming), its all aesthetic sense. • Decide to learn stuff like PHP. For most practical purposes of webdev, you still aren't programming much. • Learn advanced JS and advanced PHP. Use it. Now you're programming. The "learn programming language" process is like this: • Learn basic syntax. If, for, while. • Learn about functions. • Write great algorithms. This is programming. Web development focuses on the content displayed to the user. There really aren't too many algorithms etc involved--devising algorithms is what makes programming great--and you don't really need to apply any logical skills. On the other hand, programming does focus on content, but it also heavily focusses on optimization and algorithms. You really have to think here. Besides, most programming languages are more structured. Actually, over here, it really depends on what you're interested in. I find logical thinking more fun. Webdesigning only becomes fun for me when there's a large structured environment involved. The simple stuff you mostly do in webdev gets boring. For you, it may be different. You may want to try out both programming and webdev simultaneously(not too hard--they don't conflict). Just a note:In contrast with whatever I said here, I personally started my foray into programming via HTML. I learned JS, and I went to other programming languages from there. But that's only because I focussed on algorithms even while scripting JS. share|improve this answer It depends on where your interest really lies. I like to communicate and interact with the operating systems directly. So I go with software programming. You get to learn about the system more. Web programming can be divided into client side and server side programming. In client side you do stuffs using javascript, css, html and the like and on the server side you can use the technology depending on the server you choose. Of course the server can also do presentation. In both cases you have to deal with the same thing, i.e. the logic, presentation, persistence. What differs is the programming language and the technology stack. share|improve this answer
global_05_local_5_shard_00000035_processed.jsonl/9440
141 reputation bio website svn.apada.nl/svn/… location Netherlands age 39 visits member for 4 years seen Dec 13 '13 at 17:25 Music maniac, wanabe musician, Delphi addict. Delphi is just hobby, but quite a serious one. I sincerely like being helpful. Answering questions and coming up with solutions are also a kind of nice training for me. Some of my special interests are: graphics / drawing, component building, and VCL knowledge. Answers I am most proud of: Key sorting, Intersection and duplicates of arrays, Smooth zooming, Master & slaves, The size independent image badge positioner, TAwImageGrid. And it baffles me I keep getting upvotes on this simple answer. 141 Reputation 5 Feb 20 '13 5 Jan 19 '13 10 Jun 3 '11 20 Jun 1 '11 100 May 28 '11
global_05_local_5_shard_00000035_processed.jsonl/9442
Real Marriage, Real Life Laughing at marriage, that age-old comedy staple, is trendy once again. The Bachelor, The Bachelorette, Joe Millionaire and the "reality" genre's latest entry, Married by America: Watching what fools these mortals be is setting Nielsen records. And why not? Unlike the terrifyingly high-stakes disputes over Iraq, smallpox vaccinations, airport security and secret detentions, marriage has an easy-to-follow story line -- one we're all sure we understand better than the players do. But do these programs also reflect a new zeitgeist, a marrying mood? Are millions tuning in merely for distraction from the prospect of international thuggery? Or, given our scary times, are they ready to say goodbye to the commitment-free singles on Seinfeld, hoping to settle their own uncertain plotlines once and for all? If it's the latter, they'll be disappointed. Once upon a time, marriage could be life's answer. Because of capitalism, that can never be true again. What's capitalism got to do with it? If you look closely, you'll find two ideas about marriage running through these reality shows. The first: The only moral reason to marry is for love. While that's the American philosophy of marriage today, it's a recent idea historically. The second: Money influences your choice of mate. That thought, currently taboo, is actually quite traditional. With that in mind, consider Joe Millionaire. Twenty women competed to win the affections of a man they thought had inherited $50 million. But as the audience knew (and the women didn't during filming), "Joe" was actually Evan Marriott, a construction worker earning $19,000 a year, a fact he revealed only after choosing his prospective bride. Joe said he liked construction work better than college, and would rather be poor than unhappy. In good fairy-tale fashion, our simple hero selected -- from the seething pool of aspiring actresses and catty sophisticates hoping never to work again -- another simple peasant, er, impoverished substitute teacher doing what she loved. Viewer faith in true love was renewed. But finances are what triumphed: These two are a perfect socioeconomic match. Or consider Married by America, now under way. After having mates chosen for them (first winnowed down by friends and families, final selections by viewer votes), five singles were "engaged" to five strangers on stage. Those couples who do marry after a month's onscreen cohabitation will win a list of consumer prizes, including that American dream, the single-family house -- the payoff for making love and war in front of the nation. Here's my bet: Those couples best matched socioeconomically are most likely to win the real estate. Tying marriage to money may sound crass, but it's more traditional than today's desperation dating. Ketubah, dowry, bride-price, breach-of-contract suits: In most eras and cultures, finances have been negotiated up front. Arranged marriages, in which a person's friends and family selected a prospect of equivalent socioeconomic "worth," worked out just as well as (if not better than) Today we still find love based on compatible finances. You can see it in The New York Times wedding pages: Marriages are financial mergers, although today's wealth comes in the form of a CV, a union card or a string of degrees. What is a college education fund but an updated dowry, an investment in a child's financial future? And when was the last time you knew a corporate lawyer to marry a postal worker or (except in a J. Lo movie) a maid to wed a future U.S. senator? Here's what's historically new: Few couples today are yoked together in daily labor. Traditionally, husbands and wives were business partners; one brought in the fish, the other hawked them at the market. Working and sleeping together gave them a good shot at love -- and a reason to stay together when love wasn't there. But capitalism turned us into workers as mobile as cellular phones, able to make a living one by one. There's no FDIC guarantee on today's marital investment; we don't have to stay together to stay alive -- even if, in these parlous times, it can seem as if we do. After the international traumas of the 1930s and '40s, shell-shocked young people raced down the aisle -- and then, 20 years later, raced back out again. So far, almost no reality-show pair has made it more than a few minutes after the program's end. That's what makes it comedy. Don't you wish the mistakes in our international reality show could be so easily undone? You need to be logged in to comment.
global_05_local_5_shard_00000035_processed.jsonl/9478
Jerome Quelin > CPANPLUS-Dist-Mageia-2.000 > CPANPLUS::Dist::Mageia Annotate this POD View/Report Bugs Module Version: 2.000   Source   Latest Release: CPANPLUS-Dist-Mageia-2.101 CPANPLUS::Dist::Mageia - a cpanplus backend to build mageia rpms version 2.000 CPANPLUS::Dist::Mageia is a distribution class to create mageia packages from CPAN modules, and all its dependencies. This allows you to have the most recent copies of CPAN modules installed, using your package manager of choice, but without having to wait for central repositories to be updated. You can either install them using the API provided in this package, or manually via rpm. Some of the bleading edge CPAN modules have already been turned into mageia packages for you, and you can make use of them by adding the cooker repositories (main & contrib). Note that these packages are built automatically from CPAN and are assumed to have the same license as perl and come without support. Please always refer to the original CPAN package if you have questions. my $bool = CPANPLUS::Dist::Mageia->format_available; Return a boolean indicating whether or not you can use this package to create and install modules in your environment. It will verify if you are on a mageia system, and if you have all the necessary components avialable to build your own mageia packages. You will need at least these dependencies installed: rpm, rpmbuild and gcc. my $bool = $mga->init; Sets up the CPANPLUS::Dist::Mageia object for use. Effectively creates all the needed status accessors. Called automatically whenever you create a new CPANPLUS::Dist object. my $bool = $mga->prepare; Prepares a distribution for creation. This means it will create the rpm spec file needed to build the rpm and source rpm. This will also satisfy any prerequisites the module may have. Note that the spec file will be as accurate as possible. However, some fields may wrong (especially the description, and maybe the summary) since it relies on pod parsing to find those information. Returns true on success and false on failure. You may then call $mga->create on the object to create the rpm from the spec file, and then $mga->install on the object to actually install it. my $bool = $mga->create; Builds the rpm file from the spec file created during the create() step. Returns true on success and false on failure. You may then call $mga->install on the object to actually install it. my $bool = $mga->install; Installs the rpm using rpm -U. If run as a non-root user, uses sudo. This assumes that current user has sudo rights (without password for max efficiency) to run rpm. Returns true on success and false on failure $ cpan2dist --format=CPANPLUS::Dist::Mageia Some::Random::Package Scan for proper license Right now we assume that the license of every module is the same as perl itself. Although correct in almost all cases, it should really be probed rather than assumed. Long description Right now we provided the description as given by the module in it's meta data. However, not all modules provide this meta data and rather than scanning the files in the package for it, we simply default to the name of the module. CPANPLUS::Backend, CPANPLUS::Module, CPANPLUS::Dist, cpan2dist, rpm, urpmi You can look for information on this module at: Jerome Quelin This software is copyright (c) 2011 by Jerome Quelin. syntax highlighting:
global_05_local_5_shard_00000035_processed.jsonl/9479
Peter Lavender > Padre > Padre::Feature Annotate this POD View/Report Bugs Module Version: 1.00   Source   Padre::Feature - Constants to support currying of feature_* config options Padre::Config contains a series of "feature" settings, stored in the feature_* configuration namespace. These settings are intended to allow the optional removal of unwanted features (and their accompanying bloat), and the optional inclusion of experimental features (and their accompanying instability). To allow both the removal and inclusion of option features to be done efficiently, Padre checks the configuration at startup time and cooks these preferences down into constants in the Padre::Feature namespace. With this mechanism the code for each feature can be compiled away entirely when it is not in use, making Padre faster and recovering the memory that these features would otherwise consume. The use of a dedicated module for this purpose ensures this config to constant compilation is done in a single place, and provides a module dependency target for modules that use this system. Copyright 2008-2013 The Padre development team as listed in syntax highlighting:
global_05_local_5_shard_00000035_processed.jsonl/9485
Seeking Alpha Guggenheim BRIC ETF (EEB) Visit Seeking Alpha's EEB vs. ETF Alternatives EEB Description The Fund seeks investment results that correspond generally to the performance, before the Fund’s fees and expenses, of an equity index called BNY Mellon BRIC Select DR Index (the “BRIC Index” or the “Index”). See more details on sponsor's website
global_05_local_5_shard_00000035_processed.jsonl/9487
Take the 2-minute tour × I've looked hard at other threads similar to this, but still can't find anyone with a good recommendation for a cross-platform (OSX, Windows) team workflow in InDesign that is easy and doesn't require users to work directly off a network share. Does anyone have any real world experience supporting a check-in / check-out system for InDesign such as this: • designer gets latest project files from network share or version control system to OSX • designer works on files locally • designer commits work back to the network share or version control system • editor gets latest project files from network share or version control system to Windows • editor works on files locally • editor commits work back to the network share or version control system I'm considering Subversion since there are multiple clients across both platforms. I use SVN for our app dev teams and love it. But would the repository get bloated with nothing but large binary files being committed all the time? Can I disable versioning and just have it keep the last version (no worse than a network share)? The point is to have a system where people can work locally, not have to worry about overwriting each other's work, and easily get and commit changes. share|improve this question Is Adobe Version Cue (included in Creative Suite) not fitting the bill? –  Sven Sep 1 '10 at 16:12 Does Adobe have tools to "diff" & merge InDesign documents? –  JanC Sep 1 '10 at 16:22 Meant to mention this in my post. Version Cue has been documented by many who have used it as a miserable attempt at a solution in this space. See this blog series for example: outsmartcomputers.com/2009/05/… –  Todd Price Sep 2 '10 at 16:47 Version Cue has been discontinued by Adobe. I've been hoping this would lead to other tools appearing, but so far the market has been quiet. –  Martijn Heemels Dec 23 '11 at 23:55 3 Answers 3 up vote 1 down vote accepted no, SVN cannot store the 'only last version', I think (of all the SCMs I've used) that Visual Source Safe is the only one to have this feature. SVN handles binaries quite happily, and committing them will only add the diffs to the repo, so its not going to bloat that quickly. It'll still bloat compared to text files though (my experience: putting 1MB dlls in there doesn't bloat it very much at all). You can de-bloat occasionally by exporting the entire repository, then deleting it, and adding the exported files back in. You lose history (obviously) but you will have just the latest version of the files and a tiny, trim repo afterwards. If you don't care about the history this would work. Just don't use the same repo with files you do care about their history - or dump/filter/load those files to keep it. SVN handles large repo sizes quite well, I have one with 300,000 revisions and 12Gb in size. You will have issues with locking, as you cannot merge changes from 2 binary files into 1. So your designers will have to adopt the lock-modify-commit model. Also, if you have the right setup, you can work with SVN on a webdav share - so the repo appears to the designers as a network share. They copy off the share to local, edit the file, then copy it back and it performs a commit in the background. However, this does not lock the file, so overwrites will occur. Your team may be happy with that limitation though as it means they don't ever have to worry about updating their working copy and still get the benefit of history. edit: FYI, you can see how large a delta is by looking in the SVN repo directly. SVN stores each revision as a file in a directory called db/revs. With the latest versions, there will be one directory for each 1000 revisions, named with the number. So, assuming you have less than a thousand revisions, there will be a directory called '0', in there will be 1 file per revision. Check something in, and look at the size of that file. That's the delta size (for the entire revision, you can get the size of each individual file inside that, but it requires looking at the file's contents - easier to commit just 1 file in that revision to see). share|improve this answer Good thoughts, thanks. I wouldn't go with WebDAV because all it gives us is versioning, which we don't (currently) care about. But I wasn't aware that SVN stores deltas only for commits on binaries. That's potentially good news. –  Todd Price Sep 2 '10 at 16:50 Thanks for the update! That's extremely helpful as I'd planned to dig in and see the delta sizes myself today. –  Todd Price Sep 8 '10 at 12:07 It sounds like Subversion is your most likely answer, however you cannot merge changes in binaries. I believe that Git and Mercurial will suffer from the same problem. share|improve this answer Right, binary merges aren't generically possible because the content type isn't known. I suppose one could create a merge for a specific binary type such as InDesign though. Text files themselves are just a special kind of binary where merge algorithms are widely available. –  Todd Price Sep 2 '10 at 16:57 no, you cannot merge binaries in SVN. With text files you can cherry pick revisions to merge.. that simply would not work (sensibly) with binary files. Instead you get to choose which one to take (ie as a 'merge' would otherwise be a windiff-style merging that takes one file and turns it into another, you might as well take the final result). However, you can diff/merge with known binary types (eg jpg) where the diffs make sense and could be merged. (eg araxis.com/merge/topic_comparing_image_files.html) - see TortoiseIDiff for a less-featured version. –  gbjbaanb Sep 8 '10 at 16:14 I may be wrong, but isn't one of the main promises of SVN that it can actually deal with incremental changes in binaries? Anyways, for a designer I would recommend using Subversion with a client like this one: share|improve this answer This app looks promising. Do you have experience with it personally? –  Todd Price Sep 2 '10 at 16:58 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/9488
Take the 2-minute tour × I run this from a cronjob: tar -czvf /var/backups/svn.tgz /var/svn/* That generates this on stderr: tar: Removing leading `/' from member names I would like to avoid this because it is not a real error (for me!). I want on stderr only things that I should worry about? How can I kill that message? I have the feeling that it is a matter of using the tar -C option but I am not sure and I don't know how. Thanks for the help, share|improve this question 1 Answer 1 up vote 7 down vote accepted your options: -P, --absolute-names : don't strip leading `/'s from file names -C / (and a relative path for things to go into the tar) ...depends on what you want. Example usage of creating a tar archive using the -C option (thus removing leaning slash): tar -czf /tmp/archive.tgz -C /etc . share|improve this answer I don't want -P. I want -C but I can't get it to work. –  dan Nov 11 '10 at 15:11 I have found it out: tar -czvf /var/backups/svn.tgz -C / var/svn/ –  dan Nov 11 '10 at 15:13 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/9489
Take the 2-minute tour × I was looking at my harddrive with gparted, and noticed a small partition at /dev/sda5. I cannot cd into that folder directly, but I was hoping to find out what is on that partition. How do I do this? Do I need to mount it? share|improve this question can you post the output of fdisk -l? –  hmontoliu Aug 10 '11 at 14:44 No output from disk -l –  coffee Aug 10 '11 at 14:50 Run it as root. Also give us the output of cat /proc/meminfo. –  quanta Aug 10 '11 at 15:37 It's swap. –  Michael Lowman Aug 10 '11 at 15:54 3 Answers 3 up vote 2 down vote accepted From reading everything you've posted, it's swap space. You cannot mount it, and there is nothing interesting to see there anyway. All that it contains is memory pages that needed to be moved from RAM to disk to make room for actively running processes. Read Here for more info on swap space. share|improve this answer Right, what Zypher said. If the information is needed for some kind of investigation, then processing the data in swap may actually be useful. If that's the case then @coffee needs to clarify his intent. –  Scott Pack Aug 10 '11 at 15:59 Interesting, thanks! I am trying to figure out if I can remove this partition. I am trying to extend my main partition, but this bit is in the way.. –  coffee Aug 10 '11 at 17:09 I wouldn't recommend it. –  Zypher Aug 10 '11 at 17:23 Yes, determine the file system type with fsck -N /dev/sda5 or file -s /dev/sda5 and mount by executing mkdir /mnt/sda5 && mount -t <type> /dev/sda5 /mnt/sda5. share|improve this answer using fsck "fsck.swap: not found". Using file -s "no read permission" –  coffee Aug 10 '11 at 14:55 You must run the command as root user. –  quanta Aug 10 '11 at 15:12 Thanks. It's a Linux/i386 swap file (new style). Does this complicate things? Thanks for your help –  coffee Aug 10 '11 at 15:28 You need to mount the partition to see what's inside. However, you can mount it read-only to prevent even accidentally changing anything. This is done like this mount --read-only /dev/sda5 tmp share|improve this answer "/dev/sda5 looks like swapspace - not mounted" –  coffee Aug 10 '11 at 14:50 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/9490
Take the 2-minute tour × I am observing anomalous behavior Cisco concerning routers. Scenario 1: • Ping from Server A to Cisco Router 1905 - 0.3 ms • Ping from Server A through Cisco Router 1905 to Server B - 3.2 ms Scenario 2: • Ping from Server A to Cisco Router 1700 - 1 ms • Ping from Server A through Cisco Router 1700 to Server B - 3.3 ms When I try to ping Lan interface of 1905 from Server A I am getting 0.3-0.5 ms but when I try to ping LAN Interface of 1700 router from Server A I am getting 1.02ms. Can any one explain why this difference of .7 ms is not reflected when I try to Ping Server B from Server A, I am getting constant of 3.2 -3.3 ms share|improve this question 3 Answers 3 Don't ever use a ping to a Cisco router interface for anything other than diagnosing general connectivity. Responding to ICMP messages is (and has always been) just about the lowest priority on the box. This is true from the smallest to the largest routers and is called out. Ping -through- the router to something else (i.e. some sort of host). This is incidentally true not only of Cisco routers but plenty of others. The only exception to this is using SLA monitoring, which is a set of features that run at a higher priority to measure the latency of a given link. This is a very different animal than pinging a router interface, though. share|improve this answer If you are pinging the router itself, you are interacting with the IOS management plane. So the operating system needs to be woken up and respond to your ICMP query. If you have two different platforms (1700 and 1905), possibly with differing versions and feature sets, and different configurations to keep it busy, you should expect differing results. Forwarding traffic between servers, using the routers forwarding plane, is probably getting hardware assistance and is going to be less varying. That all said, why are you even interested in a few milliseconds here? Don't you have more important things to worry about ;-) share|improve this answer I am trying to understand latencies in the network. This has completely stumped my understanding of networks. If ping time to router is 0.3 ms and to server B is 3.3 ms, then ping time from Router to Server B is 3 ms. In second case, by same logic, ping time from Router to Server B is 2.3 ms. But that network is essentially the same. So how does one reconcile this? –  Shoonya May 12 '12 at 14:46 I guess what I was trying to say is that pinging to the router is a different function from pinging through the router. When you ping from server A to server B, the router management function is not involved, just the forwarding function. When you ping between servers, the router (normally) will just treat this like any other IP packet. Ping the router address however means the management process have to spend a little time interpreting the ping (ICMP) packet and then respond. Most routers will treat management functions like this at a lower priority, than forwarding. –  martyvis May 13 '12 at 3:11 I think you are right - supportforums.cisco.com/thread/206613. However then how do i estimate the latency of the network? –  Shoonya May 13 '12 at 3:47 The latency of the network is what you saw in your ping from server A to server B. If there are more than one router or switch between the two, then you should install another device at a close point to point that, that way you can determine the latency at each hop. You might also consider using traceroute, which uses a slightly difference mechanism. You have to be a little careful using ICMP to measure latency, as being a management protocol packet it might be treated differently. For instance you might be better using a "TCP ping", measuring the ACK response to the SYN in a TCP handshake. –  martyvis May 13 '12 at 5:35 Trying to find where latency in the network happens using ping is, at best, tricky. At worst, not possible. In the best case, you simply have to account for the fact that the router responding to ping is completely unrelated to how fast the router can send a ping packet from one interface to another (most routers respond to ping with close to the least priority, so ping response times tend to vary a lot and are usually much higher than the latency introduced when just forwarding). The 0.7 ms you have seen can probably be accounted for by the 1905 having more space CPU cycles than the 1700. Using traceroute (or similar) to find the path a connection takes through the network may be useful, followed by checking traffic levels on intermediate hops. However, that will only reveal delays introduced at routing points. There may be slow-down in switches as well as routers. On the whole, 3 ms is probably not too much of an issue and if it is, there may be other ways of alleviating that. In the past, I've seen (some) OLTP applicatiosn getting slow when FE/BE delay has increased by a few ms, but making sure they can have multiple outstanding queries took care of a lot of that (parallel queries instead of strict serialisation). I'd say it's more common that varying latency usually causes more problem than a constant (although possibly higher) latency. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/9491
Take the 2-minute tour × I have a dedicated server with a big block of IPv6 IPs. I'd like to be able to use a randomized IPv6 IP within that block and run all outgoing connections through that single selected IP. I've already accomplished the same thing with IPv4 by using iptables: iptables -t nat -A POSTROUTING -p tcp -m tcp ! -s XXX.XXX.XXX.XXX -j SNAT --to-source XXX.XXX.XXX.XXX Since ip6tables doesn't seem to have a NAT table, I started looking for alternatives... One alternative I found is : NATP66 . If I installed and compiled everything for NATP66 to work I think I could probably use this ip6tables rule: ip6tables -t nat66 -A POSTROUTING -p tcp -m tcp ! -s IPV6_IP_GOES_HERE -j SNAT66 --to-range IPV6_IP_GOES_HERE The thing I didn't like about NATP66 is the fact that I have to recompile the kernel in order to make it work (and I really want to stay away from having to do that unless it was my last option). share|improve this question closed as not a real question by HopelessN00b, Brent Pabst, Scott Pack, rnxrx, Ward Nov 9 '12 at 3:38 May one ask WHY you're trying to do this? –  MadHatter Nov 8 '12 at 7:33 1 Answer 1 I recommend to just add the addresses you want to use to a real or dummy interface and then just configure your application to use them. share|improve this answer
global_05_local_5_shard_00000035_processed.jsonl/9492
Take the 2-minute tour × I am able to ssh into an ec2 instance as the root user using the private key .pem that was generated when I created the instance. $ ssh -i Desktop/key.pem [email protected] I then created a new user $ useradd dummy When I run the following command to sign in as the dummy user $ ssh -i Desktop/key.pem [email protected] I get the following error Permission denied How do I ssh into the new instance as the dummy user? share|improve this question 2 Answers 2 up vote 2 down vote accepted As Roman points out, you need to copy the public part of your key (usually ending .pub) to this file: /home/dummy/.ssh/authorized_keys: scp id_rsa.pub [email protected]:/home/dummy/.ssh/authorized_keys Note, youll probably have to create the .ssh folder in /home/dummy first. Then make sure the authorized_keys file has the correct permissions: chmod 600 /home/dummy/.ssh/authorized_keys Also, just to be safe, set the Selinux context too: restorecon /home/dummy/.ssh/authorized_keys share|improve this answer I am still getting the same error. I followed your instructions exactly. EDIT Setting the permissions to 700 on .ssh on the remote server resolved it. –  user784637 Jul 8 '13 at 21:12 Had the exact same problem today, restorecon saved me. Thanks! –  Wiesław Herr Jan 30 at 13:20 You need to add your generated key to the newly created user's authorized_keys. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/9496
The Shakespeare Conference: SHK 10.1449 Thursday 19 August 1999. Date: Wednesday, 18 Aug 1999 21:20:20 -0400 Subject: TV Shakespeare Near the beginning of the crosss-dressing romantic comedy _Nobody's Perfect_ (dir. Robert Kaylor, 1989) (the title alludes to the last line of Billy Wilder's Some Like It Hot), a student in an English class recites the last three lines of Sonnet 10: Or to thyself at least kind-hearted prove: Make thee another self for love of me, That beauty still may live in thee. The film is, sadly, pretty bad. It aired on the Romance movie channel August 18 at 8 p.m. For more info go to the Internet Movie data base at: Subscribe to Our Feeds Make a Donation Consider making a donation to support SHAKSPER.
global_05_local_5_shard_00000035_processed.jsonl/9497
Have you exercised your Right to Read? I read banned books.Have you exercised your right to read whatever you want this week? It’s almost the end of Banned Book Week 2012, but don’t stop freeing your mind after Oct. 6th. I’m currently reading Little Brother by Cory Doctorow, because of the Sci-Fi/Fantasy class I’ve been taking. I don’t know if it’s ever been on an official Banned Book list, but it’s a reminder of what a loss of liberties, even in the name of stopping terrorism, can do to us as a society. No authority figure should take away our freedom to speak out against wrongs, hide books from us because they go against their agenda, or invade our privacy in an attempt to do either of those things. To my way of thinking, how could anyone have wanted to ban Huckleberry Finn or To Kill a Mockingbird? How could anyone have sought to stem the tide of Harry Potter?Banned Books As an erotic romance author, I know that feeling of censorship whether it’s over cover art or where I should be able to sell my books or how I could write such smut in the first place. Those mean voices creep into the writing process and you have to smack them down with a baseball bat so that you can write the hot, challenging sex scenes that readers enjoy. Don’t let fear or public opinion influence your reading or writing choices. Celebrate your freedom! Banned Books Week Posted in Blog, Events
global_05_local_5_shard_00000035_processed.jsonl/9510
The Christie’s Post-War and Contemporary Art Day auction saw a piece of work donated by renowned Bansky sell for $75,000. This well known piece of work the combines a stop sign with a pigeon on enamel on aluminum has seen the proceeds go to the restoration fund of the Defensetration in San Francisco. Thanks to Arrested Motion for the info.
global_05_local_5_shard_00000035_processed.jsonl/9511
Follow Slashdot blog updates by subscribing to our blog RSS feed Forgot your password? + - The Future of Linux: Evolving Everywhere Submitted by snydeq snydeq writes: Serdar Yegalulp offers a long view of the current evolution of Linux, one that sees the open source OS firmly entrenched as a cornerstone of IT, evolving in almost every direction at once — including most demonstrably toward the mobile and embedded markets. 'If Linux acceptance and development are peaking, where does Linux go from up? Because Linux is such a mutable phenomenon and appears in so many incarnations, there may not be any single answer to that question. More important, perhaps, is how Linux — the perennial upstart — will embrace the challenges of being a mature and, in many areas, market-leading project. Here's a look at the future of Linux: as raw material, as the product of community and corporate contributions, and as the target of any number of challenges to its ethos, technical prowess, and growth.' The Future of Linux: Evolving Everywhere Comments Filter:
global_05_local_5_shard_00000035_processed.jsonl/9512
Forgot your password? Subversion Project Migrates To Git 162 Posted by timothy from the seasonal-variety dept. Comment: Re:Windows 8 seems like a solid product (Score 4, Interesting) 558 by BenLeeImp (#40845917) Attached to: Windows 8 Is Ready You use a subscriber account to read the articles early, but use a different account to post shill. Just keep mashing F5 on the main page with your text ready in notepad. That way you avoid the karma hit and recognition as a shill poster. Just make a new one when it outlives its usefulness. I'm not sure how it can be fixed off the top of my head. Maybe prevent new accounts from getting top post until they've made X other posts? Comment: Re:Google+ and Circles (Score 3, Informative) 274 by BenLeeImp (#40690525) Attached to: Facebook Loses Users, Satisfaction Higher at Google+ Well, the visibility of the things you publish is based on who you have in your circles, so it doesn't really matter who adds you. That's kind of the point of the circles. You don't need a separate "fan" page, for instance, in order to publish different things for public/private consumption. Comment: Re:How stupid they think hackers are? (Score 1) 184 by BenLeeImp (#40675555) Attached to: Android Jelly Bean Much Harder To Hack He used a subscriber account to read the story early, type up a rather lengthy response, and then posted it using a brand-new account. You can tell this because his comment was posted in the same minute as the article, yet clearly took more than one minute to post. Astroturfers seem to use this method to post scathing commentary about company X (Google seems to be the most common), while avoiding the permanent karma hit (and recognition as an astroturfer) to their subscriber account. It could also just be a troll posing as an astroturfer, and using this method to irritate the community. That distinction is largely irrelevant, however.
global_05_local_5_shard_00000035_processed.jsonl/9515
Slashdot is powered by your submissions, so send in your scoop Forgot your password? + - VideoLAN Advises Against The Use Of Clam AntiVirus Submitted by BroBerry BroBerry writes: Clam AntiVirus is arguably the most famous and most used open source antivirus out there. It seems that Clam AntiVirus has failed to update their engine that the other famous open source project VideoLAN issued an advisory against the use of Clam Antivirus. According to VideoLAN, their new version of the all versatile VLC media player 1.0.5 was released on 28 January 2010. Clam AntiVirus since then incorrectly claims the media player contains a Trojan. However, the unacceptable point for VideoLAN is that even after a month Clam AntiVirus fails to issue updates. So many new computer viruses appearing every day that even the commercial companies fails to keep up. Being open source may also mean limited time and resources, can open source antivirus program be a reliable product. News of this will surely spread quickly over the internet, would it hurts Clam AntiVirus credibility in the long run? + - UK Police retains DNA data despite promise not to-> Submitted by Link to Original Source Comment: Re:Got to go to a tropical island for three months (Score 1) 122 by GingerDog (#23378582) Attached to: Sailing Robots To Attempt Atlantic Crossing well, at the very least they have to go to France for the launch anyway :) The professor involved did spend most of a year sailing around the Carribean a few years ago, so you might not be far from the truth there :). I've heard it's undergone some considerable testing, so would hope it'll at least get half way (a bit like Beagle the space ship thing)
global_05_local_5_shard_00000035_processed.jsonl/9517
Forgot your password? Submission Summary: 0 pending, 8 declined, 3 accepted (11 total, 27.27% accepted) It's funny. Laugh. + - Why You'll Hate A Mac Submitted by SimianOverlord SimianOverlord writes: The Guardian's Charlie Brooker reacts to Apple's latest ad campaign in the UK with a thoughtful and insightful rant in which he discusses why he hates Macs. So many good bits, but the particular quote "But then, if the ads were really honest, [the mac] would be dressed in unbelievably po-faced avant-garde clothing with a gigantic glowing apple on his back." is my own personal favourite.
global_05_local_5_shard_00000035_processed.jsonl/9518
Forgot your password? Comment: Re:Mythbusters show just how impaired you are at . (Score 1) 996 Perhaps YOU are impaired at .08%, but a percentage of alcohol in the blood doesn't tell the whole story. I recently gave up drinking (unless it's a social event), and I used to consume 8+ beers and be pretty much fine (daily). I just had a beer and a large glass of wine after dinner (after losing 50 lbs and cutting drinking for 4 months) and I'm ready for a nap. I wouldn't trust me with a wooden spoon, much less a 5,000lb automobile. Comment: Re:Playing devils advocate here... (Score 1) 379 by notdotcom.com (#42564785) Attached to: Crowd Funding For Crank Physics What happens with this design if the pedals are at TDC and BDC, with a weight hanging off the top pedal? It should go forward as that is the direction of the "Z" arm. By my understanding that is one of his design goals, to eliminate the dead spots as with regular straight arms in the same situation nothing happens (you would need forward motion to move the arm). No, no it won't go forward with balanced weights on each equal-length lever attached to a pivot in the center. The #$#@ dead spots are STILL THERE, they just happen to "look" like they are in a different place. Comment: Losing any faith in Slashdot (Score 1) 379 by notdotcom.com (#42564665) Attached to: Crowd Funding For Crank Physics Really? Slashdot can't even understand something that would be taught in week one or two of high school physics? Doesn't anyone remember the calculations for torque and how when "johnny" ties a rope to the end of the wrench and pulls on that for "torque", it doesn't actually change anything? Also, this has been all over the internet quite literally for months. Slashdot is getting this story after it is how many months old? Comment: Donate what you can. I give 20 bucks, maybe 40. (Score 1, Interesting) 113 Comment: Re:Qualcomm is but a shadow of AMD (Score 1) 331 by notdotcom.com (#41718767) Attached to: Is Qualcomm the New AMD? In AMD's defence - CPU speed doesn't actually matter that much. This is one of those odd quirks of where we are in the software - hardware cycles. A good GPU will likely have *much* more impact on your noticeable computer performance than a 10% faster CPU. It's really bad form to release a brand new CPU that is actually slower than your old one (clock for clock, in absolute terms, etc.) and the tech press pounced on them for it. But AMD *could* have and should have made the argument probably correctly that you're better off with an AMD Fusion product than an Intel i5 with on chip piece of shit HD graphics 3000 from intel. Granted intel has improved a lot now that they've given up on Larrabee but their HD graphics chips are still horrible compared to what AMD (ATI) can bring to the table. Well, the benefit to using Intel for "everything" is that at least their drivers are open source. I have a brand new i5 laptop for work. While they are handed out with windows, they do allow you to use any OS that you'd like (unsupported). Using Linux with the i5 machine showed intel for Proc, Wireless, and graphics, and I didn't have to mess with or agree to use "non-free" drivers to operate the machine's wireless or to run dual 24-inch 1920x1200 monitors with no problems. Of course, I'm a 2D kind of guy for work, but when the machine "just works" with almost any OS that you can throw at it, I'm happy. by notdotcom.com (#41718697) Attached to: Smartphone Mugging More Popular Than Ever Is this a common tactic for stealing phones? Maybe. If you handed it to him, he'd probably run. If it was still in your pocket, instinct causes many people to reach for it to see if its still there. Even if you refuse the request, his buddy the pickpocket knows where it is now. Indeed, I was VERY careful to be aware of where my phone was for the remainder of that trip, and I be "aware" while getting off the last train and walking to my truck. I'm about 6'5, 265lbs, with a 36 inch waist, These people work in gangs. So unless you want to add 'skilled at practical self defense' to that (not all martial arts qualifies) that won't matter much. One guy grabs your phone and runs, two or three trip you, knock you down and kick the crap out of you. I would not add "skilled at practical self defense against multiple attackers with nothing to lose" to my resume. I was in that situation when I was 18, and 75 lbs lighter, and I wouldn't want to play that game again. I have "good" health insurance, but it's not worth $700 to get a new set of teeth, and I also have homeowners, auto, and phone insurance. At that point, I'd let 'em have it. Hell, I might show them how to use it. My bigger question is if this was common "step 1" to stealing a smartphone. The person was able to display a (cheap) phone and state that their battery was dead. But, if I had my phone die, I couldn't call anyone because I don't know any phone numbers! I came to the conclusion that future protocol would be to ask if it was an "emergency" and offer to dial 911 for them MYSELF while they waited. Otherwise, no, you're not using my phone. Comment: Re:Naw... (Score 2) 140 by notdotcom.com (#41718345) Attached to: Visa and MasterCard Take Fight To Scammers It's also worth mentioning that the rich just get thier drugs by making appointments. If they are paying $500 cash to their psychiatrist or neurologist for thier "ADHD" or "Migraines", you can bet that they will walk away with prescriptions for amphetimines (adderal), or narcotics (morphine, oxycontin, etc). It just happens to be "legal" for the rich if they pay someone to tell them that they need to take it. If you're poor and do some meth or heroin for basically the same reasons, you're going to jail. Big Pharma made a ton of money pushing Valium to women in the 60s/70s for "life's everyday stresses". Turns out that it's highly addictive and creates dependency. It's also highly abused, even today (and the analogues - Xanax, Ativan, etc) Comment: Re:BEWARE !! THE SMARTPHONE BANDIT STRIKES AT WILL (Score 5, Interesting) 285 by notdotcom.com (#41718291) Attached to: Smartphone Mugging More Popular Than Ever I had somebody ask me to use my smartphone at a light rail station in a reasonably nice part of Denver (at 11pm). I politely refused, but I couldn't help but wonder if this person was out to 1) just make a call, which was obviously not an emergency, 2) call some sort of pay-per-call or txt number that would put $20 on my phone bill and the person would get a commission, or 3) just start running, or pull out a weapon, and steal my phone. Is this a common tactic for stealing phones? I couldn't help but wonder if I should have let the person use it (I'm about 6'5, 265lbs, with a 36 inch waist, I exercise, etc - so it's not like I was picked out as being the "easy target") In the end, I concluded that I was right to refuse a stranger access to my $700 "pocket computer" which contains all of my personal information, and costs about a hundred bucks a month to keep services to, in addition to the cost of the device. Comment: Re:I am wary of these (Score 1) 391 by notdotcom.com (#41688519) Attached to: Nissan Develops Emergency Auto-Steering System Have you ever considered that these systems might be connected to other systems? If you're in a low area of Florida, near a coast, river, ocean, etc (determined by GPS), during a wet/hurricane season (determined by date/time, humidity and temp sensors), crossing standing water (determined by moisture, humidity sensors, on-board cameras, input from differential and traction control sensors, engine speed, load, and RPM, emergency warning systems via radio), and going less than 25 MPH (speed sensors, GPS, cameras, etc)... then perhaps the system could be bypassed for those occasions when you needed to cross a foot of water over the road. Maybe it also just has an "off road" mode that would disable it (after a nice lawyer screen). Comment: Re:And this is why the USA is in trouble (Score 1) 234 by notdotcom.com (#41688365) Attached to: Malware Is 'Rampant' On Medical Devices In Hospitals If you're actually poor, and you have a medical EMERGENCY or something that you could go to the emergency room for (a child's fever), do you really think that your credit is the first thing that comes to mind? If I can go and get my broken arm fixed, or my child's fever treated without paying on the spot (or through insurance), and I'm really broke, how do I act when the (enormous) bill arrives? If I were worried about where food or shelter was coming from, I'd toss it in the trash... I'd never pay. I had (some) money, and I was insured. When I went to the ER after tweaking my back moving, I was "rewarded" with a black mark on my credit report because I needed more insurance paperwork, and at the time I was covered under my parent's insurance and in college (with many mailing addresses per year). This was almost 20 years ago, but still... Something like "could not contact payor" (I never got a bill, nor did my parents), and a $275 mark on my credit for some vioxx and advice to rest, was my "scar" for trying to deal with a hospital ER and our insurance "systems". Comment: Re:What about networks (Score 1) 234 by notdotcom.com (#41688267) Attached to: Malware Is 'Rampant' On Medical Devices In Hospitals $50k seems excessive, but... We paid ~$900k for a tiered SAN with about 100TB of (fast) capacity. We paid another 350k+ for the ability to back it up (quantum / tapes), and we paid about 100k in fibre channel switches, HBAs, and the rest of the package. We also funded a DR site with almost identical hardware and licenses for $600k (plus high speed data dupe to the DR site links). So if it costs "IT" 1.9 million dollars for SAN storage hardware, back-ups, off-site HIPAA-compliant tape storage, backup media, and associated hardware (NOT including time for deployment, admin, backup, enterprise level backup software and servers, restore, cooling, power, security), how much do you think is fair? That's the "raw" cost of about $20k/TB in this particular instance for just the hardware. Comment: Re:Not really a news story (Score 2) 334 by notdotcom.com (#41431881) Attached to: Apple Reportedly Luring Ex-Google Mappers With Jobs Exactly this. I had signed a "non-compete" agreement with an employer, and I wanted to move. Not only did they officially void the non-compete, but they also told me that it was "essentially impossible to enforce" - particularly in a right-to-work state. It was intended to intimidate. It failed.
global_05_local_5_shard_00000035_processed.jsonl/9519
Follow Slashdot stories on Twitter Forgot your password? + - Survive the Slashdot effect-> Submitted by Link to Original Source + - Iran capture drone by spoofing GPS-> Submitted by kbdd Link to Original Source Data Storage + - Data for the Future Submitted by Anonymous Coward An anonymous reader writes: I am working on a personal project of mine and I have been doing most of this work on my computer and online. Even though I have physical copies of the more important things (that is how I received them, so I digitized them myself) Sometimes I worry. Not about data failure, I have backups in 4 places (Web-server, PC, File Server, USB), this is about making sure that this data is usable to future generations. With the fast pace of software and technology advancements I fear that come a few years I may have to be switching platforms just so this data can remain accessible and easily available. What are the options to make sure that all this important information that we have now can remain available to future generations? + - Nine successful, effective IT project tips-> Submitted by coondoggie writes: "Most often when the watchdogs at the Government Accountability Office are called into to check out an agency, process or project they are looking for something that has gone wrong. This week, however the group took a look at some government IT projects that have gone right and came up with some best practices other government agencies or in public corporations could emulate to achieve success in their own IT projects." Link to Original Source + - ShootPaul. No, really. Just log in and shoot him.-> Submitted by Anonymous Coward An anonymous reader writes: Turns out someone in Saint Louis, Missouri is toting an online, interactive game (much like a live FPS) where you can shoot someone with paintballs in an enclosed room. Yes, an actual person, actual paintballs. Send them some Epson Salt and let it rip. Link to Original Source Comment: Power Supply/Small BJT Amplifier (Score 2, Insightful) 364 by sabrex15 (#28711579) Attached to: Low-Budget Electronics Projects For High School? How about a power supply they can use to charge their small devices? All you need for a basic power supply are a transformer, some diodes, resistors and capacitors. Or a small voltage divider bias BJT amplifier? a couple capacitors, an NPN transistor, and some resistors. Could be used to amplify music coming from an iPod and show the principals of amplification. Scientists Discover Proteins Controlling Evolution 436 Posted by samzenpus from the let-the-flamewar-begin dept. + - Why is autorun always selected?? Submitted by sabrex15 writes: "After numerous encounters with various installation routines within Windows, why do so many applications prefer to automatically be started with the system, when its function does not require that option?"
global_05_local_5_shard_00000035_processed.jsonl/9520
Forgot your password? Comment: Re:Can Apple survive and/or flourish w/o Steve Job (Score 3, Interesting) 612 by stetho70 (#41530299) Attached to: Ask Steve Wozniak Anything The first time Steve Jobs left Apple I was an Apple employee. The change in the company was almost immediate and felt everywhere but this wasn't because of Jobs going, it was because of what was left. I've also had the privilege of being a Research In Motion employee and watching them do exactly the same thing Apple did - releasing hundreds of products to match their competitors instead of being different to the competitors. Woz is right (as always) about Apple being a one product company back then but at the time we had about 30 different versions of the same product. One of the first things Jobs did upon his return (after I'd been made redundant - boo) was to get rid of the crap and make something that people wanted to own, not something that you had to own if you wanted to use Photoshop or Illustrator. Or Quark Xpress. Anyway - my point is Apple are very good at making products people want to own, not products they need. If they carry on like that they'll be fine.
global_05_local_5_shard_00000035_processed.jsonl/9522
Click here to close now. @MicroservicesE Blog Authors: Pat Romanski, Blue Box Blog, Elizabeth White, VictorOps Blog, Liz McMillan Related Topics: @MicroservicesE Blog, Industrial IoT, Agile Computing, Release Management , CMS @MicroservicesE Blog: Article Twenty-Thousand Men Pregnant Because of Bad Data Tens of Thousands of UK Men Can't Be Wrong Nearly 20,000 British men were pregnant in 2009 and 2010 - according to the UK's National Health System. 8,000 of them had office appointments with their gynecologists, and a total of 17,000 of them were admitted to hospitals to undergo various obstetric services related to their pregnancies. As a big believer in equality across all genders, faiths and genetic backgrounds - I was initially very enthusiastic about this medical breakthrough. But my excitement was short-lived as I shortly found out that it was simply a matter of bad data introduced as data were manually re-entered from one system into another (because the systems were not integrated), or as data were transcribed from paper to machine, or simply mis-keyed into the original system. I've written quite a bit on bad data, how pervasive the problem is, and how expensive it is - for example "$3 Trillion Problem" In this case, the mistake perhaps cost $50 to $70 million for the hospital admissions and gynecologist visits. Perhaps lab tests were also ordered, but I haven't figured that into the cost. I feel very sorry for the guys that underwent such tests - how do you put a price tag on that? Additionally, these admissions and visits for pregnancy-related issues were INSTEAD of admissions for real and needed medical conditions - which means you need to factor in the "value of time lost" for those patients. And any potential increases in costs associated with delaying treatment for their real medical conditions. So ballpark - maybe we're talking about $100 million or so. But that's only for male pregnancy.  There's more - 3,000 kids under 20 who got sent to Geriatric Services. 1600 adults who got sent to adolescent psychiatry by mistake. Thousands of adults who got sent to pediatricians (colic?  teething pains?) and many more categories of screw-ups. What about situations where someone needed a scan to diagnose potential cancer and got sent to a dermatologist for treatment of stubborn acne pimples instead? So what's the cost of this very preventable problem - a simple and very narrow issue dealing with something called an ICD code - International Classification of Diseases code? Hundreds of millions of dollars? A billion dollars?  A few billion?  It's certainly a very small part of $3 trillion. But the UK's National Health System is chronically underfunded -  you need to wait for up to two months to begin treatment for suspected cancers, 3 months for a heart bypass operation (versus about 24 hours here in the U.S. with private insurance) - and for them, a few hundred million or a few billion is a very big deal. Using manual data or application integration techniques; poorly designed codes that are easy to mis-enter; badly written applications that don't check for basic things like "If you're a guy, you're probably not pregnant" - all a recipe for expensive disaster.  And all common place.  Bad Data and Sick Applications.  And simply unacceptable. More Stories By Hollis Tibbetts He tweets actively as @SoftwareHollis Additional information is available at Comments (0) Share your thoughts on this story. Add your comment @MicroservicesExpo Stories Projections published in the OpenStack Pulse 2014 report from 451 Research indicate that OpenStack-based market revenue is expected to exceed $3 billion by 2018. Matt and I first met in the Summer of 2014 at DevOpsDays Minneapolis. My first introduction came when he (and several other DoD alums) participated in an impressive round of DevOps Karaoke. Matt gave an IGNITE talk on day two of the event titled “How to Hire Your First DevOp” as well. I learned during that event that he co-hosted a DevOps specific podcast that was gaining in popularity. It made perfect sense. Not long after Minneapolis, I began trading emails with the organizers of DevOpsDays C... Many people recognize DevOps as an enormous benefit – faster application deployment, automated toolchains, support of more granular updates, better cooperation across groups. However, less appreciated is the journey enterprise IT groups need to make to achieve this outcome. The plain fact is that established IT processes reflect a very different set of goals: stability, infrequent change, hands-on administration, and alignment with ITIL. So how does an enterprise IT organization implement change...
global_05_local_5_shard_00000035_processed.jsonl/9560
Take the 2-minute tour × I am trying to get the x axis labels to be rotated 45 degrees on a barplot with no luck. This is the code I have below: barplot(((data1[,1] - average)/average) * 100, srt = 45, adj = 1, xpd = TRUE, names.arg = data1[,2], col = c("#3CA0D0"), main = "Best Lift Time to Vertical Drop Ratios of North American Resorts", ylab = "Normalized Difference", yaxt = 'n', cex.names = 0.65, cex.lab = 0.65) share|improve this question 4 Answers 4 up vote 16 down vote accepted Here's a kind of hackish way. I'm guessing there's an easier way. But you could suppress the bar labels and the plot text of the labels by saving the bar positions from barplot and do a little tweaking up and down. Here's an example with the mtcars data set: x <- barplot(table(mtcars$cyl), xaxt="n") labs <- paste(names(table(mtcars$cyl)), "cylinders") text(cex=1, x=x-.25, y=-1.25, labs, xpd=TRUE, srt=45, pos=2) share|improve this answer las=3 makes the labels perpendicular to the axis but I'm looking to make them at 45 degrees. From the documentation I think the srt and adj settings should do it, but it doesn't. Didn't know about rseek.org, thanks for that. –  David Apr 23 '12 at 19:27 @David, using base R graphics, you could see if the following reference can be adapted to barplot() cran.r-project.org/doc/FAQ/… –  BenBarnes Apr 23 '12 at 19:42 @David I updated my response per your response –  Tyler Rinker Apr 23 '12 at 19:49 Thanks for the help guys. Ended up using @BenBarnes method because I saw it first. But tried out both and they work. –  David Apr 23 '12 at 19:58 use optional parameter las=2 . barplot(mytable,main="Car makes",ylab="Freqency",xlab="make",las=2) enter image description here share|improve this answer This is an old thread, but it helped me to find a solution that I would like to share. It uses the barplot's argument space=1 to make the columns' width equal to the columns' interval space. This way, it was possible to adapt the code provided in the R FAQ that was pinpointed by @BenBarnes under the Tyler Rinker's answer. par(mar = c(7, 4, 2, 2) + 0.2) #add room for the rotated labels #use mtcars dataset to produce a barplot with qsec colum information mtcars = mtcars[with(mtcars, order(-qsec)), ] #order mtcars data set by column "qsec" (source: http://stackoverflow.com/questions/1296646/how-to-sort-a-dataframe-by-columns-in-r) end_point = 0.5 + nrow(mtcars) + nrow(mtcars)-1 #this is the line which does the trick (together with barplot "space = 1" parameter) barplot(mtcars$qsec, col="grey50", ylab="mtcars - qsec", ylim=c(0,5+max(mtcars$qsec)), xlab = "", #rotate 60 degrees, srt=60 text(seq(1.5,end_point,by=2), par("usr")[3]-0.25, srt = 60, adj= 1, xpd = TRUE, labels = paste(rownames(mtcars)), cex=0.65) enter image description here share|improve this answer You may use It is written here: http://www.statmethods.net/graphs/bar.html share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/9561
Take the 2-minute tour × I downloaded Bonjour SDK for windows, and learned from the Chat example how you add bonjour service to your program. This worked fine. But on a fresh installed Win 7 machine I only get error messages. Do I always have to install Bonjour framework before any program can run Bonjour or did I simply ship the wron dlls? share|improve this question 1 Answer 1 Yes. You have to distribute the framework. After you install the SDK on the development machine, in the C:\Program Files\Bonjour\Installer (or the custom path where you installed it), there are two installers (32 and 64 bit). You should distribute those and install them prior to running your program. You can read more here: https://developer.apple.com/softwarelicensing/agreements/bonjour.html#bonjourwin share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/9562
Take the 2-minute tour × I made an accordion menu that replaces the select form control, and I want to use css3 transitions to make it expand/contract smoothly. Here's a link to the jsfiddle: http://jsfiddle.net/hKsCD/4/ To achieve the desired effect I need to animate the height of each of the links, but I'm not sure how to do that. CSS3 transitions are confusing. O_o share|improve this question 1 Answer 1 up vote 1 down vote accepted .accordion { height: 20px; /*define height to start from*/ transition: height 2s; -moz-transition: height 2s; /* Firefox 4 */ -webkit-transition: height 2s; /* Safari and Chrome */ -o-transition: height 2s; /* Opera */ .accordion.expanded { height: 400px;/*desired height when expanded*/ you have to be careful though when the height varies from one element to another, you should use a max-width workaround in these cases as "height:auto" won't work. e.g. replace height in example above with max-height and in the expanded state set max-height to something the element will never reach (not too high though, as speed of animation is calculated in respect to the height to be animated --> a max-width that's too high (e.g. 9999px) results in an animation that's so fast you don't notice it) share|improve this answer Each of the accordions will have a different number of options, and thus different heights. I tried using max-height, but that doesn't work because when the class expanded gets removed, all of the options (<a> elements) disappear instantly. The transition needs to be applied to all of the options not the menu itself. I tried applying a height transition on the options, but it's not animating. Here is my attempt: jsfiddle.net/hKsCD/5 –  Zephlon May 1 '12 at 5:07 After playing around with it some more, I got it figured out. It just needs a little polish. jsfiddle.net/hKsCD/6 Thank you for your help. –  Zephlon May 1 '12 at 5:17 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/9563
Take the 2-minute tour × Possible Duplicate: I'm trying to generate unique id (alpha-numeric string). I'm using curent timestamp for that. I have two questions: 1. Will md5(stamp1) be different from md5(stamp2) if stamp1 != stamp2. 2. Is there a common way to generate unique string? PS: the easiest way of cause is to take stamp as id. Still I dont want that it was easy to find out how id is generated share|improve this question marked as duplicate by Gordon, Sarfraz, hakre, PeeHaa, Shikiryu Jun 14 '12 at 8:08 Are you looking for uniqid()? –  user212218 Jun 14 '12 at 6:44 Also possible duplicate of the Related Section and re you first part of the question: did you try? –  Gordon Jun 14 '12 at 6:44 3 Answers 3 up vote 7 down vote accepted 1. Yes, in most cases, they will be different. Chances of hash collisions are very, very low (think one in billions). 2. The built in function uniqid() is great for this. You could even do md5(uniqid()), but be aware, this won't increase the entropy of the GUID. For increased entropy, you can call the function like this: uniqid('',TRUE); share|improve this answer I completely agree with xbonez's answer but I would like to add that depending on what you are using it for there are a few other considerations. • If this is for a database id you can normally rely on the auto increment or other unique key functions of the database system to generate the id • if this is for file names use tempnam instead • you might want to use both the timestamp and a random number in the md5 since it is very conceivable that several users could hit the page on the same timestamp share|improve this answer for the third issue, another workaround would be to provide a prefix to uniqid() such as, maybe, the user's ID, or a portion of his IP address. –  xbonez Jun 14 '12 at 6:50 In fact, if rand() is seeded by timestamp, two users who visit at the same timestamp would receive the same random number. –  xbonez Jun 14 '12 at 6:51 Using hash-functions will never be truly unique, but you can put together another string that is much closer, i.e. taking their IP address and appending the request microtime, like this: $strUnique = sprintf('%u', ip2long($_SERVER['REMOTE_ADDR'])) . floor(microtime(true) * 1000); For this to not be unique, two visitors would have to load the page from the same IP address at the exact same microsecond, which is more unlikely than two hashes being equal. share|improve this answer
global_05_local_5_shard_00000035_processed.jsonl/9564
Take the 2-minute tour × I have a minimum of 12 positions. The min and max values are 0 and 1. Hence if I want to draw a sinewave across my 12 positions (i.e. one value for each position) I would have a list of values like this: 0.5, 0.66, 0.83, 1, 0.83, 0.66, 0.5, 0.33. 0.16, 0, 0.16, 0.33, 0.5 But what if I wanted to expand the number of poisitons to 24, or 48, or 96, etc. How would I work out the values (i.e. some algorithm rather than doing it by hand) ? Note that my sinewave is not a repeating sinewave, just a single figure as constructed by the list above. share|improve this question 1 Answer 1 up vote 1 down vote accepted A sine wave equation is y = sin x (for the "unit" sine wave). What you need to do is divide your x axis into the number of positions that you want to display, then display those x values. Since your x max is 1, use: NOTE: Since a sine wave doesn't end at 1 on the x-axis, I am assuming that you want it to be bound to those values, as such the x-axis will be scaled so that 1.0 = 2*Pi double xStep = 1.0/NumberOfPositions; then do: for(double x = 0.0; x < 1.0; x += xStep) double yValue = Math.Sin(x*2*Math.PI); // Since you want 2*PI to be at 1 double xStep = 1.0/NumberOfPositions; double[] yValues = new double[NumberOfPositions+1]; double[] xValues = new double[NumberOfPositions+1]; for (int i = 0; i < NumberOfPositions+1; i++) xValues[i] = i * xStep; yValues[i] = Math.Sin(xValues[i]*2*Math.PI); // Since you want 2*PI to be @ 1 share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/9565
Take the 2-minute tour × Since I've finally got an answer for this question: Can you send a signal to windows explorer to make it refresh the systray icons, that asks about getting rid of dead systray icons, I would like to ask for the opposite. Is there a way to "nudge" an application to re-show it's systray icon if it has been lost? It happens to my Apache Monitor ever since I install Avira AV. Ok, granted, it could only be a side effect, but it's quite annoying to have the running app killed an then restart it, just because it's not displaying the systray icon correctly. Thanks in advance, share|improve this question 3 Answers 3 up vote 3 down vote accepted I've written a project that sends a TaskbarCreated message to all of the top-level windows in the system. If they've registered a tray icon, that should cause them to restore the icon after explorer has crashed. I've released the source under the MIT license, and provided a link to the compiled console application (with Lazarus) in the readme file. There are certainly a few refinements that could be made, like not sending the message if the icon is known to be in the tray already, but for now this app causes the icons that I know go missing on an Explorer crash to reappear. share|improve this answer I'm going to have a test on this. But you are now looking at the new winning answer. Thanks!! –  Gustavo Carreno Mar 23 '13 at 16:31 Restoring the task bar icon is something that is implemented by the application itself (rather than Explorer). There is a window message called "TaskbarCreated" (its value can be obtained with RegisterWindowMessage("TaskbarCreated")) that an application needs to respond to, in order to restore the task bar icon when necessary. For example, the application can do this: const int uTaskbarCreatedMsg = RegisterWindowMessage("TaskbarCreated"); Then in its WndProc function: // ... handle other messages if (msg == uTaskbarCreatedMsg) { // fill in details to create icon Shell_NotifyIcon(NIM_ADD, &nid); return 0; // ... default message handling So in order to force an application to restore its task bar icon, you will need to send the same TaskbarCreated message to the appropriate window within the application. One way to get the HWND to the window is to use FindMessage (and since Apache Monitor is open source, it's easy to discover which window to look for). share|improve this answer Your solution is from the point of view of the application that has the icon. What I'm looking for is an external way to signal that app to refresh the icon or signal SysTray to refresh it's list of icons. –  Gustavo Carreno Jul 12 '09 at 9:05 Sending that app the TaskbarCreated message might just do the trick. Otherwise, if the Apache Monitor application doesn't support that message, then since it's open source you can add the capability using the above code. –  Greg Hewgill Jul 12 '09 at 9:08 I looked up the source for the Apache Monitor application (here: svn.apache.org/viewvc/httpd/httpd/trunk/support/win32/… ) and it appears as though it has supported the TaskbarCreated message since its first version in 2001. So, if you run into a situation where its icon disappears, then sending that message to Apache Monitor should tell it to recreate its icon in Explorer. –  Greg Hewgill Jul 12 '09 at 9:30 Thanks Greg for the thorough investigation. I'll have a play with sending those messages and see if it works. Could you re-phrase your answer so it shows this new solution? This way I can mark it the chosen answer. Thanks!! –  Gustavo Carreno Jul 13 '09 at 10:55 This worked for me (Windows 7 - 64 bit) 1. Launch taskmanager 2. Kill apachemonitor process 3. Launch apachemonitor from Start menu You should now see the icon in the systray share|improve this answer I've down voted because the purpose of my question was to actually avoid what you just suggested. –  Gustavo Carreno Mar 6 '12 at 13:11 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/9566
Take the 2-minute tour × I am looking for an API which can convert media file to any other format eg:- .3gp to .avi in java. I googled around and came accross ffmpeg but still no clue if it can be used to achieve functionality with android project. If you can share some more information about any API that you have used then it would be of great help. share|improve this question 1 Answer 1 It's available in the newer API. PS: If you get this working, let me know, I have a project where I intend to use this. share|improve this answer do you have any samples created using this ? –  mehul9595 Feb 21 '13 at 10:05 It's on my list of things to do once I figure out how to limit the frames. –  mcollard Feb 21 '13 at 16:13 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/9567
Take the 2-minute tour × I want to preload all images in a directory called img,and that directory also contains sub directory called ui_images. I know how to preload specific images by putting their names in an array and doing the preloading work, but i want to know how to tell the script to search dynamically for all images in that directory img and img/ui_images? Here's my code : var preloadImg = function(imgArr){ $.each(imgArr, function(index,value){ $("<img/>")[0].src = value; var arrimg = ['img/check.png','img/add_sub.png']; share|improve this question There is no way to do this. At least, no good way. Http offers nothing like directory listing or anything like that. So the client would have to basically try every possible file name. What you can do is have your server code investigate the directory and dump all the files into a JS array that jquery consumes. –  Matt Greer Sep 9 '12 at 20:47 2 Answers 2 up vote 4 down vote accepted There is no generally available facility for doing a directory listing in http. The options I can think of are: 1. Name your images in a predictable fashion like (img001, img002, etc...) and then you can load images until you get an error. 2. Name your images in a predictable fashion like (img001, img002, etc...) and then code in one numeric limit value into your web page for how many there are. 3. Create an ajax call (on both client and server) that will give you a list of image names to preload. 4. Have your server embed an array of image names into the page so you know what to preload. share|improve this answer I was looking at improving the performance on one of my sites and looked into this. My solution seems to work and I haven't seen it anywhere else yet. Its a two step approach using jquery and php 1. // Preload images via jquery .load and delete once their cached via the callback <div id="preload"></div> $('#preload').load('preload.php', function() { 2. // preload.php below - loop through the image folder and insert the images into a hidden div <div style="display:none"> $dirf = 'images'; $dir = scandir($dirf); foreach ($dir as $file) { if (($file != '..') && ($file != '.')) { echo "<img src='images/$file' />"; This worked in Firefox but feel free to critique or improve share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/9568
Take the 2-minute tour × I am updating twitter status using my application and facing a problem. stdClass Object ( [request] => /1/statuses/update.json [error] => Could not authenticate you. ) But i have authenticate just 2 minutes ago and again its showing same error using code given bellow. $status = substr($status,0,139); if($E_oauth_token != "" && $E_oauth_token_secret != "") $twitteroauth = new TwitterOAuth(YOUR_CONSUMER_KEY, YOUR_CONSUMER_SECRET, $E_oauth_token, $E_oauth_token_secret); $access_token = $twitteroauth->getAccessToken($tweet_verifier); $params = array('status' => $status); print_r($twitteroauth->post('statuses/update', $params)); catch(exception $e) echo $e; share|improve this question Again i have authorize application and update one status for next status it says could not authenticate you. –  Huzoor Bux Nov 6 '12 at 12:46 1 Answer 1 I have found solution for this and explain on this site you can easily check. There is two types of oauth tokens one is temporary and with that temporary we have to get permanent token explained here Twitter OAuth in PHP. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/9569
Take the 2-minute tour × I want to embed my gists (gist.github) in my blogger blog. But as explained in this question dynamic views directly don't support javascript. From the moski's(as mentioned in the answer) blog its possible to embed a gist. What if I want to only embed only one file of my gist? For example: <script src="https://gist.github.com/3975635.js?file=regcomp.c"></script> share|improve this question 1 Answer 1 Looking at moski's blog, his description and gist snippets (gistLoader.js and gistBlogger.js), I can suppose that to reach your goal you have to edit that code a little bit. Currently, when you add <script src="https://raw.github.com/moski/gist-Blogger/master/public/gistLoader.js" type="text/javascript"></script> at the bottom of your posts, what this script does is looking for this other code you added into your blog <div class="gistLoad" data-id="GistID" id="gist-GistID">Loading ....</div> retrieves the data-id attribute, and injects the required code to load the script with src set to 'https://gist.github.com/' + id + '.js' Now, if I correctly figured out what the code does, editing the second moski's HTML code in this way: <div class="gistLoad" data-id="GistID" data-file="GistFile" id="gist-GistID">Loading ....</div> and the function in moski's gistBlogger.js in order to retrieve (when defined) the new data-file attribute, you can generate a new src to inject, like that: 'https://gist.github.com/' + id + '.js?file=' + file It should works. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/9570
Take the 2-minute tour × I'm not sure why the following example code doesn't free up all the timer memory. It starts at around 133kb, if you tap the screen it creates 10,000 timers. After they have run, they should be cleaned up. However after removing all the timers, it levels out at about 389kb. Am I missing something? local timersFired = 0 local timers = {} local maxTimers = 10000 Runtime:addEventListener("touch", function(e) if(e.phase == "began") then print("TIMERS CREATED") timers = {} for i=1,maxTimers do table.insert(timers, timer.performWithDelay(3000, function(e) timersFired = timersFired + 1 end, 1)) Runtime:addEventListener("enterFrame", function(e) if(timersFired == maxTimers) then print("KILLED TIMERS") for i=1,maxTimers do local aTimer = timers[i] timers[i] = nil timers = nil timersFired = 0 print( "MemUsage: " .. collectgarbage("count") ) share|improve this question I read this many times, and I can only conclude that Corona SDK is the one leaking :/ –  speeder Nov 19 '12 at 16:05 1 Answer 1 Perhaps not your only problem, but the for loop that removes the timers will only remove half of them. The loop runs from 1 to #timers. The first time through, i is 1, and it removes the first timer. The second time through, i is incremented to 2, but the elements in the array have shifted down in the meantime, so the code skips timer #2, and proceeds to delete what was originally timer #3. And so on. The end result is that you only remove the timers from the odd positions in the timers array, leaving half of them still taking memory. A while (#timers > 0) do loop will work better, or a for i = #timers, 1, -1 do loop that removes the last timer each time. You can verify if this is a part of the problem by creating perhaps only 10 timers. Print "created" as each one that's created, and print "deleted" as each is destroyed. You should see 10 creates and 10 deletes. (I'm thinking you'll only see 5 deletes.) share|improve this answer Unfortunately this isn't the problem. timers[i] = nil does not shift down the other elements, table.remove would do that. I verified that 10 created and 10 deleted statements are printed to double check. –  aaronjbaptiste Nov 29 '12 at 8:12 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/9571
Take the 2-minute tour × I am newbie in Codeigniter so I don't know how to do this. Actually my view page has five rows which I generated through for loop in which each row contain two select boxes and two input boxes. I don't know how to get these values first in jQuery and then pass into controller. Actually I know how to grab values from a simple textboxes but because I generate them in a loop and give them a separate id, so I don't know how to get the values in jQuery and then pass to the controller. This is my view <th>Selling Price:</th> <tr> //Categories <td><?php echo form_dropdown('cat_id', $records2, '#', "id='category_".$i."' onchange='getItems(this.value,".$i.")' ");?> <!-- Items --> <td>form_dropdown('item_id', $records3, '#', "id='items_".$i."'"); ?> </td> <!-- end of Items --> <td> <?php echo form_input($price); ?></td> <td><?php echo form_input($quantity); }?></td> The item options is based on the categories selection, means if I select some option from categories, then the items against categories show in a second select box. Here is my Javascript for functionality of top two select boxes <script type="text/javascript"> function getItems(category_id,index) { $("#items_" + index + " > option").remove(); type: "POST", url: "stockInController/get_Items/"+category_id, success: function(items) var opt = $('<option />'); $('#items_'+ index).append(opt); Now the problem is here; I want to get the values from all the rows and then pass into controller. This is the javascript for catching and then sending values to controller <script type="text/javascript"> $('#btns').click(function() { // $("#form").serialize() Here, I am not doing right, first I don't know how to get values of item and categories here and then the other thing is how to be able to get multiple textbox values because there are five rows, and the textvalues in which values are filled are to be sent var item_id = $('#items').val(); var price = $('#price').val(); var quantity = $('#quantity').val(); var form_data = { cat_id: $('#cat_id').val(), quantity: $('#quantity').val(), item_id: $('#items').val(), url: "<?php echo site_url('salesController/addSales'); ?>", type: 'POST', data: form_data, dataType: 'json', success: function(msg) { if(msg.res == 1) return false; Here is my controller and I don't know to get multiple values here also. Here is the code of what I am doing, I know I am wrong, but I don't know how to make it right $data = array( 'cat_id' => $this->input->post('cat_id'), 'item_id' => $this->input->post('item_id'), 'price' => $this->input->post('sales_date'), 'quantity' => $this->input->post('sales_bill_no'), share|improve this question 2 Answers 2 up vote 0 down vote accepted In your case, set the name of your input and select elements like this cat_ids[], item_ids[], prices[] and quantities[]. Note the [] at the end of these name (I have changed the name to make it in plural-form, this is just a name convention :) ). In the controllers $this->input->post('cat_ids') will return an array named cat_id and contains all your ids, this is the same for $this->input->post('item_ids'), $this->input->post('prices'), ... You can use a for loop like this to traverse through all posted values: for($i = 0; $i < count($data['cat_id']); $i++) $yourItem = array ( 'cat_id' => $data['cat_id'][$i], 'item_id' => $data['item_id'][$i], 'price' => $data['price'][$i], 'quantity' => $data['quantity'][$i], To send the form data in Ajax uses jQuery you can set your form_data=$('your-form-id').serialize(); instead of building its value by your hand :) share|improve this answer ok i'll try this and then reply you but what about the jquery function here var item_id = $('#items').val(); here i am doing wrong because my item id is constantly changing and going to 0 -4 like this item_0, item_1 .. how to i grab values this in jquery ? –  user1972143 Jan 19 '13 at 13:13 I have update my answer with a modification in how to get the form data :) –  Hieu Le Jan 19 '13 at 13:15 thanksssssssss it works .. u r genious ..... all is working except quantity and price is not going into the database.. as u said i have changed the name of price and quantity textboxes to price[] and quantity[].. and i am getting value in controller like that of price and quantity 'price' => $this->input->post('price').. am i doing right .. i think i have to changed this to 'price' => $this->input->post('price[]') am i right ? –  user1972143 Jan 19 '13 at 13:55 ok ok i get it .. i know what was going wrong,,, thank you man .. u have done a lot for me .. god blessed you –  user1972143 Jan 19 '13 at 13:59 If your input element name is price and quantity and you have to use $this->input->post('price') and $this->input->post('quantity') in your controller. I found that you have to modify your echo form_input($price) and echo form_input($quantity) to include the name. –  Hieu Le Jan 19 '13 at 14:00 dont know about php but maybe you could send multiple params in request like: var cat_id = $('#cat_id').val(); type: 'POST', data: 'cat_id='+cat_id+'&quantity='+quantity+'&item_id='+item_id, success: function() { in groovy I would parse them like params.item_id etc... maybe this helps you or someone to help you share|improve this answer yeah this is incredibly insanse good shit bud –  thegrunt Jan 29 '13 at 22:32 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/9572
Take the 2-minute tour × There are two scenarios I need to clarify: 1. An executable compiled with .NET 3.5 needs to use a library compiled with .NET 1.1 and the library must run on the 1.1 runtime. 2. An executable compiled with .NET 1.1 needs to use a library compiled with .NET 3.5. I cannot find a reliable source stating that it is not possible to load two versions of the .NET runtime and Microsoft's documentation is very vague on this matter. share|improve this question 3 Answers 3 up vote 7 down vote accepted No -- you can't load the CLR into the same process twice. See the documentation for CLR Hosting As with earlier versions of the runtime, the CorBindToRuntimeEx function initializes the runtime. You can choose which version of the runtime to load, but a process can host only one version. share|improve this answer You can if you're using the .Net 4.0 hosting API rather than the .Net 2.0 hosting API... –  Len Holgate Sep 23 '10 at 9:19 .NET 4 promises to enable hosting of different CLR versions in the same process by means of In-Process Side by Side. share|improve this answer For case #1, is there any particular reason (say, breaking changes) which requires the library to be hosted in the 1.1 runtime? Is it possible to expose the library via a 1.1-compiled web service, and have the executable point to the web service instead? (Or some other remoting technique, to get the library in its own process?) For case #2, is it possible to recompile the 1.1 app under 2.0/3.5, such that it can reside in the same process? In any event, Rob Walker is right (and I upvoted) -- you simply can't host 2 versions of the runtime in the same process. So you need to work around it somehow. I'd imagine that in both cases, source must be available, so recompilations and retesting should play. share|improve this answer John, you are right, we will have to workaround it as changing the code is not desirable. I just wanted to be sure that we were not overlooking s simpler solution. –  CodeForNothing Oct 14 '08 at 18:29 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/9573
Take the 2-minute tour × The .gitignore file is very useful in ignoring some of the files that we don't want to control. Unfortunately, it cannot be used when the file is already under version control. For example, my .gitignore (which is already added to git) file might be different than what my coworker wants it to be (e.g. I want to ignore Vim files). Whenever I make changes to this file, git shows it as a modified file. So my questions: 1. Is there any way to ignore changes for a certain file, which is already controlled by Git?! 2. Is there any way to commit these changes, but keep it for myself only? Obviously, I don't want to use a branch, because I am working on a certain branch. share|improve this question None of the answers answer the main question - number 1, including the accepted one. The question was about ignoring files that are already controlled, not .gitignore not exlude will do the job –  shealtiel Feb 16 '11 at 0:50 The git-update-index answer is the correct answer. –  Jason May 3 '13 at 17:00 5 Answers 5 up vote 8 down vote accepted If you want to exclude files that are specific to your process (such as Vim temporary files), edit the (local) file .git/info/exclude and add your exclusion patterns there. This file is designed for developer-specific exclusions rather than .gitignore, which is designed for project-wide exclusions. The short summary is, everybody should agree on what is added to .gitignore. For files where you don't agree, use .git/info/exclude. share|improve this answer I added version controlled files to .get/info/exclude but they continued to appear as modified files. –  paullb Sep 17 '14 at 8:26 This ISN'T RIGHT!!!! Use Aristotle Pagaltzis' response below. –  paullb Oct 6 '14 at 8:54 The original question is looking for a way for different coworkers to ignore different sets of files. My answer introduces the .git/info/exclude file which is designed for this purpose. However, if you generalise the question into "how do I ignore changes to any file that is already added to Git", then yes, you need a different solution because that's a different problem. I wouldn't recommend the general solution for this specific problem, however, because coworkers can then no longer share changes to .gitignore. –  Greg Hewgill Oct 6 '14 at 16:42 Here is a generalized, ubiquitos (not individual) solution for those using Git under SmartGitHG viusal interface: • choose a folder you want to ignore in "Repositories" window; • select all the files from that folder in "Files" window (unhide unchanged files by clicking the respective filter icon in the Right Top region of the main window); • click "Remove" on control panel (check the "Delete local files" check box if you need it); • commit local changes; • rightclick on the folder in "Repositories" window; • click "Ignore". share|improve this answer Use git-update-index to temporarily ignore changes to files that are already under version control: git update-index --assume-unchanged <files> To undo that use: git update-index --no-assume-unchanged <files> Also have a look at the skip-worktree and no-skip-worktree options for update-index if you need this to persist past a git-reset share|improve this answer I've written about three ways of excluding files elsewhere. In summary: 1. A global git ignore file applies to all repositories on that system 2. The .gitignore file in the repository applies the the repository and all clones of that repository. 3. The .git/info/exclude file applies only to that repository. The lower items in the list have priority over the higher items, and a ! in front of an item in any of the patterns in the file reverses a previous exclusion. This paradigm is seen elsewhere in Git. For example, if you were using submodules, the url to the submodule to use is in the the .gitmodules file in the repository, but you can over-ride the url to use in the .git/config file. share|improve this answer it doesn't apply to files that are already versioned –  Agent_L Apr 10 '14 at 12:49 I cannot really answer the general question (having Git ignore tracked files) - it strikes me as a feature that would be much more detrimental than useful. However, the gitignore manual page specifies a few ways to configure patterns for excluded files. In particular, it gives explicit instructions on how to use these various ways: Meaning that your .gitignore file should not be different from your coworkers - it is working as intended. There you have it. Specify a core.excludesfile file path into your ~/.gitconfig file, and then put into it the patterns that you want to exclude. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/9574
Take the 2-minute tour × I want my program by default to stdout, but give the option of writing it to a file. Should I create my own print function and call that testing that there is an output file or is there a better way? That seems inefficient to me, but every way I can think of calls an additional if test for every print call. I know this really doesn't matter in the long run probably, at least of this script, but I'm just trying to learn good habits. share|improve this question 6 Answers 6 up vote 2 down vote accepted Write to a file object, and when the program starts either have that object point to sys.stdout or to a file specified by the user. Mark Byers' answer is more unix-like, where most command line tools just use stdin and stdout and let the user do redirection as they see fit. share|improve this answer Thanks, this is probably what I'll do. –  kryptobs2000 Feb 13 '11 at 0:35 Just write to standard out using print. If the user wants to redirect the output to a file they can do that: python foo.py > output.txt share|improve this answer Excellent point, I didn't think of that. However I still can't do that for this particular case because I also print status messages to stdout which I would not want to be going into the file. –  kryptobs2000 Feb 13 '11 at 0:34 @kryptobs2000: you do know that stderr exists for status and error messages, don't you? What's the point in sending status messages to sys.stdout? –  tzot Feb 19 '11 at 20:12 No, you don't need to create separate print function. In Python 2.6 you have this syntax: # suppose f is an open file print >> f, "hello" # now sys.stdout is file too print >> sys.stdout, "hello" In Python 3.x: print("hello", file=f) # or print("hello", file=sys.stdout) So you really don't have to differentiate files and stdout. They are the same. A toy example, which outputs "hello" the way you want: #!/usr/bin/env python3 import sys def produce_output(fobj): print("hello", file=fobj) # this can also be # fobj.write("hello\n") if __name__=="__main__": if len(sys.argv) > 2: print("Too many arguments", file=sys.stderr) f = open(argv[1], "a") if len(argv)==2 else sys.stdout Note that the printing procedure is abstracted of whether it is working with stdout or a file. share|improve this answer Wow, thanks, I'm surprised I didn't know that. I am using python 3 and that seems like a very elegant solution. –  kryptobs2000 Feb 13 '11 at 0:38 I recommend you using the logging module and logging.handlers... stream, output files, etc.. share|improve this answer If you using subprocess module, then based on an option you take from your command line, you can have the stdout option to an open file object. This way, from within the program you can redirect to a file. import subprocess with open('somefile','w') as f: proc = subprocess.Popen(['myprog'],stdout=f,stderr=subprocess.PIPE) out,err = proc.communicate() print 'output redirected to somefile' share|improve this answer My reaction would be to output to a temp file, then either dump that to stdio, or move it to where they requested. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/9575
Take the 2-minute tour × Please edit the title with the proper name for this kind of initialization. For example, doing something like this: foreach (DataRow row in data.Rows) Person newPerson = new Person() Id = row.Field<int>("Id"), Name = row.Field<string>("Name"), LastName = row.Field<string>("LastName"), DateOfBirth = row.Field<DateTime>("DateOfBirth") Setting a breakpoint to an individual assignation is not possible, the breakpoint is set to the entire block. If I want to see specifically where my code is breaking, I have to use: foreach (DataRow row in data.Rows) Person newPerson = new Person(); newPerson.Id = row.Field<int>("Id"); newPerson.Name = row.Field<string>("Name"); newPerson.LastName = row.Field<string>("LastName"); newPerson.DateOfBirth = row.Field<DateTime>("DateOfBirth"); Or maybe I'm missing something. :) Can you properly debug when using that 'fancy' object initializer? Thank you. share|improve this question 1 Answer 1 up vote 1 down vote accepted Object initializers are just syntactic sugar and get translated when they're compiled. Your original object initializer becomes something like this: var temp = new Person(); temp.Id = row.Field<int>("Id"); temp.Name = row.Field<string>("Name"); temp.LastName = row.Field<string>("LastName"); temp.DateOfBirth = row.Field<DateTime>("DateOfBirth"); var person = temp; Since the whole block is translated like that you can't break inside one step. If you absolutely need to break on one particular step, you have a few options. 1. Break it up. Don't use object initializers while debugging, and you can put them back afterwords. 2. Temp variables. Instead of assigning Id = row.Field<int>("Id") directly, assign row.Field<int>("Id") to a temp variable first (or whichever one you want to debug) and then assign the temp variable to the object initializer property. 3. Method call. You can wrap some of the code in a custom method call solely to allow you to add a breakpoint within your custom method. You could even generalize it like this: Id = BreakThenDoSomething(row.Field<int>("Id")); public static T BreakThenDoSomething<T>(Func<T> f) return f(); share|improve this answer Note that tools like ReSharper can break up initializers for you, and can put them back together again when you're done. –  John Saunders Feb 25 '11 at 2:12 @John Saunders, good addition, ReSharper is a great tool. –  Samuel Neff Feb 25 '11 at 14:51 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/9576
Take the 2-minute tour × My problem is that I don't have the HTML code to change the id's to remove the '.'... Is it possible to handle such id's, lets say: <td id='my.id'> In the CSS file to do something like: #[my.id]{ ... } I know this doesn't work (that's more access approach), but I wonder if there's a syntax for this in CSS? share|improve this question Whoever wrote that CSS needs to be slapped. –  dmackerman Mar 2 '11 at 14:39 you may want to accept the answer that worked for you. (Click the check mark by the question) –  Nivas Mar 2 '11 at 14:39 @Nivas , For some reason i need to wait for 2 mins..... i will the moment i can :) –  Bjorkson Mar 2 '11 at 14:42 5 Answers 5 up vote 1 down vote accepted Try #my\.id it the CSS. I'm not sure if it works on all browsers though. I'd recommend avoiding dots in id's share|improve this answer thanks, worked like magic –  Bjorkson Mar 2 '11 at 14:37 Use "\" to escape special characters. <div id="id.id">Red Color</div> color: red; This question is perhaps related. share|improve this answer This, surprisingly to me, works. I have only tested this in Chrome. #my\.id { share|improve this answer Use a backslash before the dot: color: red; border: 1px dashed #f00; Example here for you :) share|improve this answer It is not allowed to use a DOT in a selector as far as I know :) share|improve this answer it is very much allowed as per the html specs: ID and NAME tokens must begin with a letter ([A-Za-z]) and may be followed by any number of letters, digits ([0-9]), hyphens ("-"), underscores ("_"), colons (":"), and periods ("."). –  Martin Jespersen Mar 2 '11 at 14:39 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/9577
Take the 2-minute tour × I am using the Ninject and Ninject.Web assemblies with a web forms application. In the global.asax file I specify the bindings like so: public class Global : NinjectHttpApplication protected override IKernel CreateKernel() IKernel kernel = new StandardKernel(); // Vendor Briefs. // Search Services. // Error Logging return kernel; Then in my pages I simply have to make them inherit from Ninject.Web.PageBase. Then I can set up properties on the code behind pages and put the [inject] attribute over it. public IVendorBriefController vendorBriefController { get; set; } This works great. But now I need to do some dependency injection in the Global.asax file itself. I need an instance of IErrorLogEntryController in my Application_Error event. How do I resolve this and use my specified binding for the abstract type? protected void Application_Error(object sender, EventArgs e) IErrorLogEntryController = ???; share|improve this question 3 Answers 3 up vote 4 down vote accepted Simply do the same thing in your Global class public IErrorLogEntryController ErrorLogEntryController { get; set; } NinjectHttpApplication injects itself after the kernel is created. share|improve this answer I had tried this at very first, but we were using an old version of Ninject.Web. After updating the assemblies, this worked. Thanks! –  Alex Ford May 11 '11 at 17:32 That's a better answer than mine. Very nice! –  John Bledsoe May 11 '11 at 20:17 If you're using the Ninject.Web library for ASP.NET WebForms, you should just be able to get the kernel from the KernelContainer static class. In this library, the KernelContainer class seems to be the starting point for service location using Ninject. Once you have the kernel, you can get any dependency you need. protected void Application_Error(object sender, EventArgs e) IErrorLogEntryController = KernelContainer.Kernel.Get<IErrorLogEntryController>(); share|improve this answer When I type this. I'm not seeing Kernel as a property... I even tried casting it. ((NinjectHttpApplication)this). and still no property called Kernel. The link you provided looks like it is in the Ninject.Mvc namespace. I am using Ninject.Web (a library for web forms). But, I do see how to fix this. I can just add the kernel as a public property in my global file. Thank you. –  Alex Ford May 10 '11 at 20:03 I modified your answer to reflect this small difference and accepted it :) –  Alex Ford May 10 '11 at 20:09 Thanks for accepting, but I don't think you need to create a property. You can just get the kernel from the static KernelContainer class. –  John Bledsoe May 10 '11 at 20:14 @Chevex: Doesn't that property you added end up being null whenever the event handler runs? I believe the CreateKernel method only runs once on AppDomain startup, but the Global Object will be recreated on every request? –  qes May 10 '11 at 20:16 I'm not sure why, but I don't see this static class anywhere in the Ninject.Web namespace. @qes I'm not sure I haven't actually tested this yet. Hmmmm, maybe I jumped the gun. I wish I could find this KernelContainer. –  Alex Ford May 10 '11 at 20:17 protected void Application_Start() HttpContext.Current.Application["UnityContainer"] = System.Web.Mvc.DependencyResolver.Current.GetService(typeof(EFUnitOfWork)); share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/9578
Take the 2-minute tour × My customTabBar application loads a view controller when one of the custom tab bar buttons is pressed. One of the tab bar buttons, opens a UIImagePickerController with an overlay on top but the buttons in the overlay are not shown - the overlay is actually Nil. The sequence is the following: 1. The AppDelegate allocates and initializes the various controllers for each custom tab bar button in the applicationDidFinishLaunching; 2. The cameraTabViewController allocates and initializes various subview controllers including the subViewCamera inside its init method: self.subViewCamera = [[ModalCameraViewController alloc] init]; 3. When the camera tab bar button is pressed, the related view controller invokes (void)viewDidAppear:(BOOL)animated { [self openSubViewCamera:nil]; [super viewDidAppear:animated]; 4. The subViewCamera instantiates an UIImagePickerController and shows it: cameraUI = [[UIImagePickerController alloc] init]; if ( self.cameraOverlayView == Nil ) { } else { cameraUI.cameraOverlayView = self.cameraOverlayView; [controller presentModalViewController:cameraUI animated:NO]; At this point, the imagePicker modal window is presented but the overlay view is missing and the log shows the line THE CAMERA OVERLAY VIEW IS NIL. If I replace the cameraTabViewController directly with the subViewCamera in the appDelegate when the custom tab bar is built, everything works as expected and the camera is shown with the overlay but unfortunately I can't leave it in this way because I also need the other subviews. The main difference seems to be that in the first case the nib file is actually not loaded and the outlets are left nil (the viewDidLoad() method of the ModalCameraViewController is not even called). I also tried to change the step 2. so that the subViewCamera is initialized with an initWithNibName() with no success. share|improve this question When you switch tabs do the overlays appear? –  Praveen S Aug 4 '11 at 13:35 The overlay is supposed to appear only on the camera tab and no, it doesn't show up at all. –  stack-o-frankie Aug 4 '11 at 13:40 What exactly do you mean by Overlay ? –  Legolas Aug 4 '11 at 14:00 Ok, I solved the problem: I needed to add the view of the subViewCamera to the view of the TabBarViewController first in order for the nib file to be fully loaded and the IBOutlets to be correctly initialized (including the overlayView). –  stack-o-frankie Aug 4 '11 at 14:20 :-) noob mistake. If you had pasted more code we could have found that out, plus your description is very confusing. –  Praveen S Aug 4 '11 at 14:43 Your Answer Browse other questions tagged or ask your own question.
global_05_local_5_shard_00000035_processed.jsonl/9579
Take the 2-minute tour × I have a DOM element (#installations) with a number of children, only one of them has a class .selected. I need to select this class and the first 3 of the rest (:not(.selected)) and show them - the goal is to have only 4 elements shown, regardless of which element has the class .selected. The problem is, in the expression: #installations > *:not(.selected):nth-of-type(-n+3), .selected :nth-of-type() disregards the :not() selector and just selects the first 3 children of #installation. For example, if I have this HTML: <div id="installations"> <div id="one"/> <div id="two"/> <div id="three" class="selected"/> <div id="four"/> <div id="five"/> I will only have one, two, three selected and not the first four. The logical implication is that :nth-of-type() will have only (one, two, four, five) to select from, since :not() already excluded the selected one, thus selecting (one, two, four), and then the other part of the selector , .selected will add the selected element. If .selected is not in the first four elements, let's say it's the sixth, we will have the first three + sixth elements selected. To clarify: selecting .selected plus 3 adjacent elements is also fine. However, I this is also difficult in case .selected is in the last 3 (if we select the next 3 adjacent elements) share|improve this question Pseudo-classes are not processed sequentially; they are all evaluated together on each and every one of your elements. See this answer for details (also covers :not()). In your case, :not(.selected):nth-of-type(-n+3) picks up the first two elements (the third being .selected), and .selected picks up the third. –  BoltClock Dec 25 '11 at 21:01 That is the problem. If only I could exclude .selected in the first part of the selector (before the first pseudo-class). Alternatively, I can put a class ".unselected" on all the other elements, but I was hoping for a cleaner solution. –  Ivo Dec 25 '11 at 21:08 2 Answers 2 up vote 20 down vote accepted As mentioned in my comment, pseudo-classes are not processed sequentially; they are all evaluated together on each and every one of your elements. See this answer for details. After a bit of tinkering around, given your HTML and the conditions by which to select elements, I came up with the following, long list of selectors: /* The first three children will always be selected at minimum */ #installations > div:nth-child(-n+3), /* Select .selected if it's not among the first three children */ #installations > div.selected, /* If .selected is among the first three children, select the fourth */ #installations > div.selected:nth-child(-n+3) ~ div:nth-child(4) For this to work, one simple assumption has to be made: the selected class will only appear on one element at a time. You'll need to combine all three selectors in the same rule in order to match the four elements you're looking for. Notice the commas in my code. Interactive jsFiddle demo (for testing the selector with the class in different child elements) For what it's worth, it's easier if you can fall back to JavaScript. As an example, if you use jQuery, its :lt() selector makes things a little simpler: // Apply styles using this selector instead: #installations > div.with-jquery .children('div.selected, div:not(.selected):lt(3)') Interactive jsFiddle demo (ignore the JS code in this demo, it's only there to make it interactive) share|improve this answer Yes, exactly what I was looking for. Thank you. –  Ivo Dec 25 '11 at 21:37 @Ivo: No problem. Let's just say I needed a puzzle to crack my head on :) –  BoltClock Dec 25 '11 at 21:40 What you need to use are adjacent sibling selectors. Here's an example I cooked up that is working in Safari (not tested elsewhere). Only 'Two', 'Three', and 'Four' items are displayed. <!DOCTYPE html> .the-list li {display:none;} .the-list li.selected {display:block;} .the-list li.selected + li {display:block;} .the-list li.selected + li + li {display:block;} <ol class='the-list'> <li class='selected'>Two</li> share|improve this answer Adjacent sibling selectors are supported by every browser, business requirements notwithstanding (read: except IE6). –  BoltClock Dec 25 '11 at 21:13 Wait wait, the OP wants the first three + selected, unless selected is in the first three, in which case it skips it and selects the other three elements surrounding it? –  Purag Dec 25 '11 at 21:16 And if the last element has the class ".selected", only it will be displayed. Doesn't work as well. –  Ivo Dec 25 '11 at 21:31 Yup -- looks like I didn't read the original question quite thoroughly enough. At some degree of complexity, CSS alone ceases to be a good tool for the job. I think using some JavaScript for this one will remove a lot of pain. Even if you come up with a CSS rule that will work, if the code for it is nearly impenetrable, what happens the next time you have to maintain it? –  Steve Jorgensen Dec 25 '11 at 21:37 @Steve Jorgensen: You're right, using JS will save a lot of pain. See my updated answer. It just happens that a CSS solution exists here given the circumstances... –  BoltClock Dec 25 '11 at 21:59 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/9580
Take the 2-minute tour × I created a simple templating/content parser where you can specify where blocks of text should be placed in the final output page. The "markup" I settled on is something like @blockname> on it's own line. So to put a block of text in the body, you would start the text with @body>. The blockname can be anything you want to use, but it can't contain spaces or line breaks. Everything works fine, except if there is a text string like @body> embedded in the text. It splits on the embedded text too. This seems really simple, I just want to match a line that starts with @ followed by any non-white space characters and ending with > at the end of the line. The command I have right now that almost works is: preg_split('/@([^\s].*?[^>])>/', $tpl, -1, PREG_SPLIT_NO_EMPTY | PREG_SPLIT_DELIM_CAPTURE); It seems I should just be able to use ^@([^\s].*?[^>])>$, but that doesn't work at all. I feel I'm missing something simple. I've tried a bunch of modifiers at the end to no avail. Example text to parse: .example {font-weight:bold;} function example() { This is some sample @body> text to show That ideally the regex split would come back with: [0] => css [1] => .example {font-weight:bold;} [2] => js [3] => function example() { [4] => body [5] => This is some sample @body> text to show share|improve this question ^ only matches the start of the string, not the start of each line. Either use modifiers to match at each line or split your string beforehand. –  knittl Jan 28 '12 at 15:26 Wouldn't it be easier to define an escape sequence? Just tell users that if they want something that looks like a markup tag in the body of the content, it must be escaped? That is, after all, the purpose of things like &lt;, &gt; etc in HTML - to overcome the exact problem that you have... –  DaveRandom Jan 28 '12 at 15:31 1 Answer 1 up vote 3 down vote accepted You can do that with: With PHP quoting. You were probably missing the /m switch which makes ^/$ match beginning/end of lines, and not only strings. share|improve this answer That seems to be only parsing on the first instance it encounters. Why the double \\ in front of the S? –  Brent Baisley Jan 28 '12 at 17:24 Because \ needs to be escaped in double quoted strings. And it works just fine, eg ideone.com/6DOtg , altho I'd use preg_replace/preg_replace_callback for this. –  Qtax Jan 28 '12 at 20:51 Finally discovered that preg_split is working different on different systems. On my OSX 10.8/PHP 5.3.6 system your suggestion works fine. On my Debian Squeeze/PHP 5.3.3 setup it fails completely, no parsing. –  Brent Baisley Feb 27 '12 at 2:52 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/9581
Take the 2-minute tour × I am having trouble configuring my ServiceStack REST service to work on my production IIS 7.5 box. It works fine running localhost, and it also works fine if I deploy in the root of "Default Web Site" - /EmployeeSvc. I have a virtual directory structure under Default Web Site for organizational purposes (note custom path in web.config). I can browse successfully to the default.htm at this location, but when I try to execute the built-in /hello example I receive: Like I said, the built-in /hello example works perfectly from localhost and from a root iis folder under default web site, but not from within a directory structure. What am I doing wrong with the location-path? Thanks in advance! Here is web.config: <location path="Employees-NoAuth/WebServices/EmployeeSvc"> <!-- Required for IIS 7.0 --> <modules runAllManagedModulesForAllRequests="true"/> <validation validateIntegratedModeConfiguration="false" /> <add path="*" name="ServiceStack.Factory" type="ServiceStack.WebHost.Endpoints.ServiceStackHttpHandlerFactory, ServiceStack" preCondition="integratedMode" resourceType="Unspecified" allowPathInfo="true" verb="*" /> <customErrors mode="RemoteOnly"/> share|improve this question Note: "Server Error 404 - File or directory not found" is an ASP.NET error, i.e. your path isn't making it to the ServiceStack handler - that's the first thing that needs resolving. –  mythz Feb 16 '12 at 18:30 I am very new to servicestack, but do you by any chance have additional system.webServer entry in your web.config? I had the same problem using service stack along the ria services. If you do let me know, and I'll tell you what to do. –  epitka Mar 22 '13 at 13:52 1 Answer 1 I'd try the following: 1. Remove location node from web.config. Move SS configuration out of it. 2. Register base URL path in your class derived from AppHostBase: public override void Configure(Container container) this.SetConfig(new EndpointHostConfig { ServiceStackHandlerFactoryPath = "base/path" }); share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/9582
Take the 2-minute tour × So I've been at this mode thing for a while, and got some help figuring out just how to do it on here and thought I might ask for a little more assitance. I've got this much figured out. map<int,unsigned> frequencyCount; //This is my attempt to increment the values of the map everytime one of the same numebers unsigned currentMax = 0; unsigned checked = 0; unsigned mode = 0; for(auto it = frequencyCount.cbegin(); it != frequencyCount.cend(); ++it ) if (it ->second > currentMax) mode = it->first; currentMax = it->second; if (currentMax == 1) cout << "There is no mode in the vector" << endl; else { cout << " The mode of the vector is: " << mode << endl; So it will reutrn the most frequently occuring int within the vector, and return that there is no mode if the none of the map values exceed 1. Now I've been trying to figure out what to in the case of more than one mode, ex. 1 2 3 3 4 4 5 currently returns 3. I would like to reutrn 3 and 4. Logically I would say an if statement checking the variable which occurs most frequently against the second most frequent would work. Of course there is the possibility of 400 modes if the test data is large enough though. So I would need to create a loop the goes through checking and exits when the current variable is no longer equal to the one that occurs one less frequently than it. I'm just really not sure how to go about that. Any advice on where to get started? share|improve this question From your example ("1 2 3 3 4 4 5") it looks like the vector is sorted. Is that so? –  jogojapan Feb 21 '12 at 4:02 Yes, it is sorted, that is the first thing I did in order to find the max and min values of the vector. –  Sh0gun Feb 21 '12 at 23:14 1 Answer 1 up vote 0 down vote accepted As you point out, the mode is not necessarily unique. So, you should supply the answer as a set of numbers, as you've correctly stated. I would create a vector to store the set of unique modes from your set, then output the content of the mode vector. std::vector<float> Modes; // 3 is detected as mode as it occurs 3 times in your set // 4 is also detected as mode, since it also occurs 3 times in your set // output the modes for the set std::cout << "the following mode(s) were detected in the set"; for( int n = 0; n < Modes.size(); n ++ ) std::cout << "Mode: " << Modes[n] << "\n"; hope this makes sense share|improve this answer What I gather from this is that what I should do is. 1. Find the max in the map which = the mode 2. Find all other values in the map = to the max 3. Push all of those into a new modes vector 4. Print out the contents of the new vector This is what I will be trying, I'll get back to you as soon as I succeed or fail miserably. Thanks for the advice! –  Sh0gun Feb 21 '12 at 23:11 Sounds correct, good luck ;) –  user206705 Feb 22 '12 at 0:35 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/9615
Take the 2-minute tour × I'm using Office 2007 on Windows Vista and occasionally, when copying from Word to Excel, or text from a website to Word, I will get the hour glass for 10 + seconds and sometimes for about a minute. It should just be simple text and I don't understand why it takes so long. share|improve this question What computer are you using? –  Ivo Flipse Feb 10 '10 at 16:21 I'm seeing a very similar thing in Excel - pasting can take up to a minute to do nothing particularly complex with no major recalculation. Googling it seems to be not uncommon. –  Jon Hopkins Feb 12 '10 at 16:02 I'm using an HP 8510w. –  Nick Feb 17 '10 at 13:13 Is Word/Excel auto-saving in the background at the same time? –  user45699 Aug 9 '10 at 23:09 5 Answers 5 Not exactly sure why it would be slow coming from Word or Excel, could be many reasons. Copying text from a website to (newer) MS Office applications, on the other hand, is slow because the Office app will go out to the website you got the text from and try to determine how CSS (and other technologies) are affecting the appearance of text so that when you paste it it looks accurate to how it looks on the website. In the past I've been known to just paste into Notepad from the Web and then copy from Notepad into Word. This avoids Word going and checking formatting on the web page, as it was pasted as pure text in Notepad. It's annoying though ;) There are several Cut & Paste options in Word 2007 you may be able to play with to get it to behave a little more to your liking. You can get to them like this: • Start Word 2007. • Click the Microsoft Office Button, and then click Word Options. • In the Word Options dialog box, click Advanced, and then scroll down to the Cut, copy and paste section. share|improve this answer Might be a virtual memory issue. Do you still have free memory? Some of the data that you can copy from Excel/Word can be extremely large because it saves all of the markup as well as the plaintext. share|improve this answer I've got three solutions to suggest (apart from going back to using an Abacus or your fingers). First, try to select/copy/paste with a different web browser. I often find that if I try more than one browser I'll find one that handles the copy and paste of the custom background formatting better. For example, on some websites IE8 recently began replacing spaces in the filename with with plus symbols when downloading files. This extremely annoying problem was completely resolved by pasting the URL into Firefox and downloading the file from there. Second, if you're using a firewall, try denying Word 2007 access to the internet. There's still some delay, but it's quicker. Third, if it's not a massive table-formatted selection, try pasting into Wordpad (instead of Notepad), then copy and pasting from Wordpad to Word. Wordpad can often preserve significant portions of the formatted structure of your paste selection. Notepad will strip out ALL formatting and it may take you much longer to fix your pasted text from Notepad than the original wait pasting directly to Word. Its a frustrating mix of no web-page formatting standards, browser/OS ability, and an overly-helpful Office 2007. Hope one of these suggestions makes things a little easier for you! share|improve this answer I had the same issue - copy and paste within Office 2007 (any program) was taking forever. 10 seconds or so. It turned out to be Photoshop Elements Backup that was running in background that was the problem. As soon as I killed that - Office worked fine. share|improve this answer I know this was an old link, but I just had the same issue. Photoshop Organizer was running in the backbround, and when I killed that process, cut and paste worked fine. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/9616
Take the 2-minute tour × I'm looking for a software that will help me backup a server with 5TB of data. My wishlist: • Backup on 1-2TB SATA disks • Should need little to no configuration (just the directories to backup and the slot of my RAID system where it can find a backup disk) • No or smart compression (most data is audio and video files) • Easy restore of all data • Backup should start by switching drives • Software should make sure that the backups are redundant enough (so that failing sectors of a disk don't mean data loss) • When I rename/move a file, it should notice and just record the change (instead of backing up the whole file again). Or maybe automatic deduplication. • Spin down the backup drive when it doesn't need it to extend disk life • It should keep deleted files for a period of time but I also need an option to purge files more quickly • I'd prefer if it kept files together (so if they are in the same directory, they should also end up on the same disk). Maybe it should use two backup disks: One with all incremental changes and then one with an archive. Anything you could recommend? [EDIT] I'm on Linux :-) share|improve this question 3 Answers 3 I recommend Acronis share|improve this answer The feature list sounds good; only the price is prohibitive for my use case. –  Aaron Digulla Aug 3 '10 at 10:30 Hopefully someone will post an alternative. –  Moab Aug 3 '10 at 14:24 OK, I assume you use Windows OS? Try Symantec backup system recovery desktop/server edition depends what OS you have. Other good program is ViceVersa. Both of them has trial, and you can try it before you buy it. Hope it helps:) share|improve this answer Oops. Sorry, I'm on Linux. –  Aaron Digulla Aug 2 '10 at 11:29 You can write a cron job to do the backup. In my server, I just TAR everything needed to be backup to other data storage server via network every night. After a successful TAR action, I delete the old copy of backup. In your case, I think it takes more than a night to backup all your data. Are your files being changed frequently? If only a small part of the 5TB is changed, consider the use of FTP instead of cp. Only overwrites the files that is needed to be transferred. More, FTP scripts are not difficult to be written. Give it a try. Work / Not Working ? Tell us after try. share|improve this answer Since there is no way to fit the data on a single disk, I need a program which can distribute the backups on several disks which aren't connected to the PC all the time. –  Aaron Digulla Aug 3 '10 at 10:28 Interesting. My solution is still valid, but you have to split the TAR action. Set different time to run the cron job, when the related external hard disk is online. Or you can execute the TAR scripts manually. –  Raptor Aug 4 '10 at 2:23 Why this doesn't work for me: too much hassle and too inefficient. I want deduplication. I want cheap snapshots. I want easy recovery. And most of all, I want a ready solution, rather than a programming tool. There are plenty of Windows packages that have these, now just need to find one for a headless linux server... –  romkyns Jan 18 '11 at 21:36 Still not matching the requestion from the OP, but WTF? Tar? I like tar, but in G-ds name if you suggest something like that start with rsync, which would only copy over changes. With tars you would be doing full backups, and a 5TB full backup will take almost a day. –  Hennes Jan 24 '14 at 18:06 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/9617
Take the 2-minute tour × Is it possible to adjust the starting page for the automatic numbering in MS Publisher 2007. I'm trying to get 'Page 1' to display on the bottom of my third actual page. share|improve this question 1 Answer 1 You probably need to use sections to do this. See Microsoft Publisher help on breaking a document into sections to restart page numbering or start on a particular page. On the Insert menu, click Section. Select the Begin a section with this page check box. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/9619
Take the 2-minute tour × A friend of mine keep telling me that if I keep bulky files on the desktop then Windows try to load them in cache and slow down? I'm (almost) sure that this is not the case but how can I demonstrate it? share|improve this question migrated from stackoverflow.com Aug 27 '09 at 14:19 This question came from our site for professional and enthusiast programmers. this kind of questions should be asked on superuser.com –  bernhardrusch Aug 27 '09 at 14:18 7 Answers 7 Well, if you have a roaming (network) profile that includes your desktop it could make logon/logoff very painful... share|improve this answer +1 Generally this should only really affect performance in the enterprise, where roaming profiles are common. –  Marko Carter Aug 27 '09 at 14:27 Actually if you have a very large zipfile on the desktop, it can cause a lot of speed issues. Personal experience: Prevent Explorer from Freezing With Large Zip Files on Vista share|improve this answer If you have alot of shortcuts on your desktop it can impact performance on start up. This is mainly from offline/network shortcuts where the computer has to run off to all the places they link to, to check if they still exist and cache them so that when you want to use them they appear to be faster to access than they really are. Shortcuts that don't resolve will then try to resolve each time you drag items/files over the top of them, even if you don't drop them on that shortcut, giving you a small amount of system lag each time. share|improve this answer The only thing I can think of that could possibly be an explanation for what your friend is thinking is that files on the desktop will be indexed. That's also true for your Documents folder, however, and once the file has been indexed it won't continue to impact performance (and even for huge files the performance impact should be pretty minimal). You could demonstrate it by putting massive files on the desktop and measuring performance, but I think this is something you can safely assume will not be an issue. share|improve this answer The indexer will only index files it knows how to index. Since most really large files are not really really large text files the indexer will maybe look inside for metadata (for video files, for example) but not more. –  Joey Aug 27 '09 at 15:30 I have seen numerous cases were simply moving files off the desktop has noticabally increased the speed of a PC, I do not know the reason why (and in fact stumbeled on this artical while reaserching it) however I have only seen this problem on systems with less than 1GB of ram running Windows XP and less than 2GB of ram with Windows Vista, were multiple gigabytes of files are stored on the desktop. I have also had instances were moving files out-of the profile (documents picrtures, music ect) to another folder e.g. a new folder off the root of C: or on another partition/drive if available can noticabally speed up the PC. I work in IT support, If someone compalins about a slow PC the first thing i try is removing files from the desktop, I then put shortcuts to the files back on the desktop share|improve this answer I always keep huge files (like dVD images to burn) on my desktop and it doesnt slow down at all. The only thing that might slow down things a lottle would be loading different icons (icons as in images), but with a semi-newer computer this shouldnt affect you at all. share|improve this answer Even the icons shouldn't do much in terms of performance. Maybe that was the case when Windows 3 was new ... –  Joey Aug 27 '09 at 15:29 Thats why I used the word "might". –  mauro.dec Aug 28 '09 at 12:55 It depends on the type of file. If you have files for which Explorer is capable of generating a preview or metadata (either directly or through an installed handler/shell-extension), then it could cause the system to be slow since the desktop is always “visible” (even if it’s covered by windows, it still had to be loaded during boot). For example, a very large video file will cause Explorer to slow down when first loading the desktop (afterwards, it should indeed be cached, so unless you move it around or modify it, it should not cause slow-downs due to re-reads). If the file does not get a thumbnail or preview and is represented by a static icon, then the size is irrelevant; you could have a 50GB file and Explorer won’t even flinch because it doesn’t care. What you should be even more worried about than the size of the file is having thumbnail-able files that are corrupt. If the file is corrupt, then Explorer could all but freeze while trying to read it and generate a thumbnail. This is particularly common with damaged/half-downloaded video files (look up “avi windows freeze”). share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/9620
Take the 2-minute tour × I am trying to write a formula to calculate the following: How many rows contain "bruteforce" in column A and "Pass" in the column where row A contains "build three"? enter image description here Now, I have gotten somewhat close to this. This formula will give the total number of cells containing 'PASS' in the column in which row 1 contains "build three": =COUNTIF(OFFSET(D2:Z3500, 0, MATCH("build three", D1:F1)-1, 3499,1), "Pass") However, I don't know where to go from here. An additional requirement is to avoid any VBA. share|improve this question 2 Answers 2 up vote 2 down vote accepted I would suggest using INDEX rather than OFFSET and if you use that within a COUNTIFS (with an "S") function you can include the column A criterion too, i.e. =COUNTIFS(INDEX(D2:Z3500,0,MATCH("build three",D1:Z1,0)),"Pass",A2:A3500,"bruteforce") share|improve this answer Why not work in 2 step: create an extra column (f.e. in "G") and check if the conditions are met for that row. In some cell ("H2") count the number of "true" values in the range of "G". Check this solution. For some reason, the google doc can't handle the match formula, so replace the formula in "G2" with this one: =IF(A2="bruteforce";IF(INDEX(A$1:G$7;ROW(A2);MATCH("build three";A$1:H$1))="Pass";TRUE;FALSE);FALSE) share|improve this answer Please note there are column conditions as well - I need to only count columns whose value in row 1 is "build three". This may be column F in my example, but it cannot be assumed to be column F. It could be any column. –  Adam S Apr 24 '12 at 14:45 Slipped my mind: edited now, should be deling with it now, or use barry's solutions, it seems good too. –  Terry Apr 24 '12 at 15:28 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/9621
Take the 2-minute tour × When PDF files are returned by a Google search, sometimes I'd like to just download them, rather than viewing them in the browser. Google results with a PDF How on earth do I do this in Chrome? I can't right-click the link and Save As, because that link isn't really to the PDF. Note: This is not a duplicate of Download arbitrary file with Google Chrome because the solution given was to simply right-click and Save As, which does not work in this situation. share|improve this question It's not really a link (anymore), that's why you can't right it and select Save As. –  James K Sep 13 '12 at 22:05 It is a link, but the URL is actually google.co.uk/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&c... –  Rocketmagnet Sep 13 '12 at 22:07 I didn't mean the blue link text, I meant the green text used to be a link, but Google changed that some time ago. About the same time that the advanced search switches + and - started bringing up empty searches. –  James K Sep 13 '12 at 22:29 Stupid Google... –  Rocketmagnet Sep 13 '12 at 22:36 Indeed. It's like their motto has changed to "Don't be evil, just be annoying." –  James K Sep 13 '12 at 22:51 5 Answers 5 The only way I know to do this for a PDF file would be to disable Chrome's automatic mode of opening PDF's. I'm using the latest Chrome on OS X: Chrome Menu -> Settings -> Advanced Settings -> Content Settings -> Disable Individual Plugins -> Disable Chrome's PDF Reader Or the short way: chrome://plugins Now when you click the file it should automatically download it. You can further read about disabling PDF in Browser over here: Stop PDFs from displaying inside Google Chrome Hope that helps! share|improve this answer Thanks. This is such an annoying lack of a feature. My usual method is to write an HTML file, and put the URL in as a link so that I can open it up and do save as. –  Rocketmagnet Sep 13 '12 at 22:03 EDIT: Actually I misunderstood your question. You can just load the PDF page and the press CTRL+S. Google is trying to gather more information by first sending you to a google URL that then forwards you to the PDF. That's why the plain-text "link" is no-longer an actual link. You can select / highlight the text URL, right click on it, the click "go to www.glyn.de/data..." Google Results Once the page is loaded, press CTRL+S share|improve this answer No, that does not save the file. Again it tries to open it in the browser. –  Rocketmagnet Sep 13 '12 at 21:48 Much better! Chrome tries to load the PDF (and as usual Adobe dies for some reason) but I can still save with ctrl+S. –  Rocketmagnet Sep 13 '12 at 22:07 Mr. Justin Pot describes what to do for Chrome and Firefox here: http://www.makeuseof.com/tag/copy-crapfree-urls-googles-search-results/ Summary: Chrome: Install 'Don't track me Google' Firefox: Install the Firefox addin 'Google/Yandex search link fix' PS. This issue had caused me to change my home page to search.yahoo.com - I still have the Google search tool however at the top. With Yahoo, the links are real links, so you can click 'Save Link As' and save your PDF as you used to be able to. (You also get the old Google cached links which is another benefit) share|improve this answer There is an extension in Chrome Extension market which directly download pdf instead of opening. "Direct Pdf Download" Link is :- https://chrome.google.com/webstore/detail/direct-pdf-download/igpfkcnkddfkacjpffopkioandifnkpi share|improve this answer When you perform a Google query, the links in the results page do not actually point to the pages you expect. Instead, they point to a Google server which logs which link you click and then redirects you to the actual page. They do this so that they can track the results (i.e., which of the results we found were actually desirable by the user?) The problem is that they trick users and hide this behavior. When the page loads, it uses JavaScript to print the actual/correct URL to the status bar when you hover the cursor over a link in the results page, but the link still points to page on their servers instead of the page/resource expected. That’s why when you try to save a non-HTML result, you get the wrong thing. (You can actually see the redirection in action by right-clicking a link, dismissing the context-menu, then hovering over a link. You’ll notice that the correct URL is show before right-clicking, and then the Google URL is shown after. In fact, if you disable JavaScript altogether, the hiding mechanism goes away and you can see that the links are all to Google’s server.) There is an easy fix however, just install a browser extension to override this tracking and make the links point to the actual pages/files. There are plenty available; just search for Google tracking or something to that effect. Note however that not all will work correctly, so you may have to test a few. My personal recommendation is the googlePrivacy user-script. Not only does it work, but because it’s just a user-script instead of a full-fledge extension, it doesn’t use as much resources. Now, whenever a Google search returns non-HTML results, you can simply right-click the link and select Save As or hold Alt (or ⌥ (Option) on Macs) and left-click it. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/9622
Take the 2-minute tour × Possible Duplicate: How do I search in lists with irssi? Folks, The irssi irc client operates in a condensed window, without the option of scrolling up and down through output. So when i run the /list command on a busy irc network, is there any way to pipe that output to a file? Any way to do : /list | grep -i blah Is there a shortcut to scroll irssi window? share|improve this question marked as duplicate by akira, Indrek, Tom Wijsman, soandos, Sirex Sep 25 '12 at 22:45 I'm pretty sure you can scroll. Have you tried page up/down? –  Phoshi Sep 25 '12 at 18:01 updown on mbp? dont know what that is :) –  Clustermagnet Sep 25 '12 at 18:32 @Phoshi: Have fun searching in 13,000 channels on FreeNode! :P –  Tom Wijsman Sep 25 '12 at 18:38 @Clustermagnet: Some networks don't want you to do this because of the amount of traffic it takes, and some even automatically disconnect you for flooding. You might want to try a website instead which makes it handy to search for channels on and across networks. –  Tom Wijsman Sep 25 '12 at 18:39 guys, solved! on mbp you can use /elist -min 100, then hit fn+arrow up :) –  Clustermagnet Sep 25 '12 at 18:45 1 Answer 1 Another interesting way of listing interesting channels: • Install elist addon for irssi http://scripts.irssi.org/ • /elist -min 100 on macbook pro, using iterm, hit FN+arrow keys for page up/dn in irssi :) share|improve this answer
global_05_local_5_shard_00000035_processed.jsonl/9623
Take the 2-minute tour × In Excel or OpenOffice calc I have | Foo | Bar | | A | 1 | | B | 2 | Is it possible to use VLOOKUP to search a value in the Bar column and return the value in the Foo column? share|improve this question No it isn't, which is why Jook's answer doesn't use it. VLOOKUP can only use the left hand column. –  AndrewC Sep 28 '12 at 5:58 1 Answer 1 up vote 6 down vote accepted Try this solution: This chooses a specific cell out of a matrix. MATCH retrieves the row inside the matrix B:B where "2" was found with exact match (0). INDEX uses this row, and a given column (1), to refer to a specific cell inside a matrix A:B. "Foo" would be in column A, "Bar" would be column B. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/9624
Take the 2-minute tour × I've noticed on many small PC cases that the hard drives are installed vertically. In midi cases, towers and others of a larger housing, they are in the horizontal position. What impact on a hard drive does a vertical position have? Does it affect the life? Is it more prone to errors? (Not of SSDs (solid-state drive), just plain hard drive with all its mechanical parts inside.) share|improve this question See also: serverfault.com/questions/13839/… –  hyperslug Oct 3 '09 at 18:51 just don't change vertical position while the drive is in operation. if you need to reposition a drive, turn the computer off first. –  quack quixote Oct 3 '09 at 20:19 Somebody need to try hanging hard drives vertically like a gyroscope. - youtube.com/watch?v=8H98BgRzpOM –  RamyenHead Jun 2 '10 at 14:01 Answers currently lacking any scientific study –  user76871 May 31 '11 at 2:30 9 Answers 9 up vote 22 down vote accepted It shouldn't matter which way you do it these days. But there's one possible caveat of making it vertical: Under situations where cooling is at premium and you don't have the means to increase cooling of your system, mounting the disk horizontally with the label facing upwards could be seen as an advantage, since heat rises away from the disk surface more efficiently than if the disk was mounted vertically. But even so, any impact on performance or disk lifetime would only be noticeable in years to come. Just thought nevertheless to make this note. share|improve this answer One might think that a vertically-mounted HD is more efficient because of the convection currents the heat would cause. It would be nice to see a source or reference. –  user76871 May 31 '11 at 2:36 Actually if heat is your problem then you should install the PCB facing up because the electronics is the heat sensitive part not the HDA (Head-Disk Assembly). –  chx Jul 22 '12 at 16:09 According to several manufacturers, mounting a 3/5" hard drive horizontally, vertically, or sideways doesn't affect the hard drive life significantly. These are statements taken from the hard drive literature at each manufacturer's website; it's four years old but things probably haven't changed much. The drive will operate in all axes (6 directions). Performance and error rate will stay within specification limits if the drive is operated in the other orientations from which it was formatted. Western Digital: Physical mounting of the drive: WD drives will function normally whether they are mounted sideways or upside down (any X, Y, Z orientation). The hard drive can be mounted in any orientation. As long as it is securely attached to the chassis, hard disk drives may be mounted either horizontally or vertically depending on how your computer's case is constructed. When asked if the drive could be mounted at askew angles, their official positions were: Manufacturer Contact method Response WD Tech support, email 90 degrees. Hitachi Hitachi documentation 90 degrees. Samsung Tech support, phone 90 degrees. Fujitsu Tech support, chat 90 degrees +-5. Seagate Tech support, email 90 degrees preferred, but diagonal OK. Maxtor Tech support, phone 90 degrees preferred, but in real world, whatever. By 90 degrees, they mean vertical, horizontal, or sideways. share|improve this answer So all these hard drives can meet together to try Kama Sutra, producing baby hard drives. –  RamyenHead Jun 2 '10 at 14:06 Isn't that where SSD's came from?? –  captainroxors Aug 21 '14 at 23:22 At one time (long ago) manufactures advised against changing the orientation of a drive without reformatting it. This was due to the heads being affected by gravity and becoming misaligned with respect to the data. I have not seen such a notice in quite some time. share|improve this answer Voice coil drives (anything newer than the old ST506/412 drives in the original AT/XT) won't have this issue. The old stepper motor drives could have, but I never found it to be an issue. –  Brian Knoblauch Dec 29 '09 at 14:13 I have had many different combinations down to even mounting horizontal (no hard drive space, so just put a screw through the hole for a fan! I can say that I have not seen any difference what so ever in life. share|improve this answer I have a TB Samsung 7200 rpm that in the vertical position gives SMART errors but is okay in the horizontal position. It's a mystery, perhaps gravity is upsetting the mechanics. share|improve this answer Old thread but I thought I'd put in my input. Every drive I have ever owned, external or internal...the ONLY ones that failed were the ones positioned vertically. My 2.5" samsung external drive has been positioned horizontally and its been working perfectly for 3 years, while my other external 2.5" was positioned vertically and it failed within a month. My WD my book 1tb is only vertical because the feet are positioned to stand it vertically. I will NEVER put a drive vertical...same goes for gaming systems. Horizontal will prolong life. If someone says its ok to go vertical...dont listen to them. share|improve this answer I had a drive that did not work anymore in vertical position. After dismounting, it ran successfuly in horizontal orientation and I was happy to be able to make a backup... Not sure if this has any relevance to the topic. share|improve this answer I mount hard drives vertically and horizontally and it doesn't affect performance at all. Oh and I work in IT :) share|improve this answer mounting a hard disk drive vertically or horizontally does not affect the life span. share|improve this answer protected by studiohack May 31 '11 at 2:21 Would you like to answer one of these unanswered questions instead?
global_05_local_5_shard_00000035_processed.jsonl/9625
Take the 2-minute tour × I've been experiencing strange download behavior in a torrent manager on archlinux. Whenever I try to download a torrent my speed starts dropping and getting back to the same level again and again. For example: my max speed is 250 kb/sec in any torrent manager, as soon as I start a download the speed gradually drops from 250kb/sec to 100 kb/sec and then to 0 kb/sec in ~30 seconds, when it reaches 0kb/sec it starts increasing up to 250kb/sec back again. The cycle continues for the period of the torrent download. I can overcome this issue by setting "no encryption" in torrent download settings. When "no encryption" option is used, the speed stabilizes and does not jump. This behaviour is being noticed in any torrent manager I tried. I didn't have this issue on debian with the same configuration. ADSL modem configured in bridge mode. What can cause this issue? Any ideas? share|improve this question What ISP do you use? It could, possibly, be a function of their system and may be worth checking into. –  nerdwaller Nov 19 '12 at 15:08 I don't think it is ISP, since everything was ok in debian with the very same config. I can ask them after all, but maybe there is something you guys know here. –  minerals Nov 19 '12 at 15:10 Disable the system firewall and try it again. A boneheaded firewall rule (like blocking all ICMP) can do this. –  David Schwartz Nov 19 '12 at 15:29 I must have missed the debian piece, my apology. –  nerdwaller Nov 19 '12 at 16:08 Your Answer Browse other questions tagged or ask your own question.