id
stringlengths 50
55
| text
stringlengths 54
694k
|
---|---|
global_05_local_5_shard_00000035_processed.jsonl/61963 | Andrew Wylie Doesn't Care Who Your Agent Used to Be
Andrew Wylie
Photo: Patrick McMullan
On the agency competition: "The people we represent are not writers who make the most money in the business. The greatest advances are paid either to disgraced politicians or to failed novelists. We don't represent either category."
On the book-publishing industry's profitability: "[It's] dwarfed by shoe shining. It's a very odd, very small business, that no one should get into unless they have no other occupation that they want to be involved in."
On his friendship with rival ICM agent Binky Urban, from whom he wrested the account of Raymond Carver's estate: "Oh sure, we're friends. But we don't go to the same restaurant. I go to San Domenico, she…" [Grove finishes his sentence] "…to Michaels."
On getting Salman Rushdie to work with him: [In the eighties, Wylie legendarily asked Rushdie whether the two could get drinks next time Wylie was in London. When Rushdie said yes, Wylie got on a plane and flew to London that night.] "But he didn't take us on that first time. But the second time I called him, I was in Karachi [Pakistan], and I said, 'I'm coming to London.' He said, 'Where are you?' I said, 'Karachi.' He said, 'What are you doing in Karachi?' I said, 'Representing Benazir Bhutto.' I think that's what caught his attention."
The World According To … Andrew Wylie [Portfolio] |
global_05_local_5_shard_00000035_processed.jsonl/61974 | Voters need 'stupidity' test before casting ballots
Michael Draper
Posted: Saturday, May 15, 2004
This is in response to Mary Wilkes' letter (May 7) suggesting God wants George Bush elected.
I guess that means God wants to gut our environmental protections and befoul our air and water because that is what Bush is doing. I guess God wanted us to invade Iraq looking for weapons that did not exist.
It frightens me to think a person can actually feel God has chosen George Bush to lead this country. If that were the case, wouldn't he have arranged for Bush to get the most popular votes so there would be no question as to whom the country wanted as president? I guess God was not up to the task! Too bad we don't have a stupidity test before we allow people to vote.
Michael Draper
Related Searches
Trending this week:
|
global_05_local_5_shard_00000035_processed.jsonl/62009 | It's Lonely At the Top
Last week, congressional Republicans got together at a Chesapeake Bay resort to contemplate their political fortunes. In one presentation, House Minority Leader Eric Cantor delivered a bit of shocking news to his colleagues: Most people are not, in fact, business owners. It would be a good idea, he suggested, if they could find a way to appeal to the overwhelming majority of Americans who work for somebody else. Their aspirations don't necessarily include opening up their own store or coming up with an amazing new product, so the prospect of lowering the corporate tax rate or slashing environmental regulations may not make their pulses quicken with excitement. They're more concerned with the availability of jobs, the security of health care, and the affordability of education. "Could it actually have taken Republicans that long to realize they should address such problems, especially when Democrats have made huge gains appealing directly to middle-class voters?" asked conservative journalist Byron York, who reported on the meeting. "Apparently, yes. And even now, not all House Republicans are entirely on board. 'It's something that's been growing and taking time for members to get comfortable with,' says a House GOP aide, 'because they did spend the last decade talking about small business owners.'"
You're probably surprised at the Republicans' surprise. But it isn't so much about a numerical misconception—I'm sure that with the possible exception of a couple of the most lunkheaded Tea Partiers, the GOP members of Congress don't actually think that most Americans own businesses—as it is about a moral hierarchy they've spent so much time building up, both in their rhetoric and their own minds.
We all believe that some people are just more important than others, and for conservatives, no one is more important than business owners. Remember how gleeful they were when President Obama said "you didn't build that" when discussing businesses during the 2012 campaign? Sure, he was taken out of context (he was talking about roads and bridges, not the businesses themselves), but Republicans genuinely believed they had found the silver bullet that would take him down. He had disrespected business owners! Surely all America would be enraged and cast him from office! They made it the theme of their convention. They printed banners. They wrote songs about it. And they were bewildered when it didn't work.
Just like those members of Congress listening incredulously to Eric Cantor, they couldn't grasp that the whole country didn't share their moral hierarchy. After years of worrying primarily about the concerns of people who own businesses, they've elevated to gospel truth that the businessman's virtue is unassailable, that his rewards are justly earned, and that no effort should be spared to remove all obstacles from his path. When it comes down to a choice between, say, a business owner who would like to pay his employees as little as possible and a group of employees who'd like to be paid more, conservatives don't just see the choice as a simple one, they can't imagine why anyone wouldn't agree.
As a liberal, I have a different view, precisely because I don't place the businessman at the top of my moral hierarchy. As a society we need entrepreneurs, but there are many kinds of people we need. To be clear, I'm not saying there's anything wrong with business owners, just that the guy who owns the widget factory isn't necessarily a better person than the guy who works on the line making widgets. Owning a business can be difficult and challenging, but so can a lot of things. I know business owners who work very hard to succeed. I also know teachers who get up at 5 in the morning every day to grade papers and plan lessons, and nurses who have to comfort the dying and change people's bedpans. Those jobs are hard, too. And they don't come with the prospect of great wealth if you're good at them.
That matters too, to both liberals and conservatives. Many conservatives find wealth to be a marker of virtue—not a perfect marker, maybe, but pretty close. If you're rich, they plainly believe, it's probably because you worked hard for your money, and if you're poor it's probably because you're lazy and unreliable. Things like unemployment insurance and food stamps only reward the indolent. The bootstraps are just there waiting to be tugged on, and if you haven't grabbed a firm hold you have no one to blame but yourself.
As for the businesspeople themselves, it's little wonder that so many find warmth in the embrace of the GOP, nor that they are shocked and appalled when other people criticize them. The venture capitalist Tom Perkins may have come in for a ton of ridicule when he wrote a letter to the Wall Street Journal suggesting the possibility that liberals will soon be rounding up rich people and herding them into death camps ("I would call attention to the parallels of fascist Nazi Germany to its war on its 'one percent,' namely its Jews, to the progressive war on the American one percent, namely the 'rich'"), but Perkins—a guy who once killed a man with his yacht—was surely speaking for more than a few of his peers. In the Republican party they find not only tireless advocacy for policies that will help them hold and expand their wealth, but the love and admiration they so clearly crave.
In 2012 on Labor Day, that same Eric Cantor tweeted, "Today, we celebrate those who have taken a risk, worked hard, built a business, and earned their success." Even on the day created to honor working people, the only Americans for whom he could spare a thought were business owners. Perhaps in the year and a half since, he has come to a new awareness that even if you work for someone else, like most of us do, you're still worthy of consideration. Whether his party agrees—and whether they'll do anything about it—is another question entirely.
Something our better-off people haven't grasped: Millions of low-income/poor Americans simply didn't know if the Clinton administration was just a weird historic "glitch," or if the Party itself had been pulled so far to the right. They voted for Obama/Dems, most with considerable reluctance. This administration would either strengthen what's left of the New Deal/Great Society, or go in the opposite direction. Now we know. Just as Clinton gave us 8 years of Bush, the next president will be a Republican, elected by the middle class. The bottom line is that it is simply too dangerous for the masses who are not as well-off as middle class to vote for Democrats. I think we can say that the Party is over.
You need to be logged in to comment. |
global_05_local_5_shard_00000035_processed.jsonl/62019 | Search tips
Search criteria
Results 1-1 (1)
Clipboard (0)
Select a Filter Below
Year of Publication
Document Types
1. Orf virus interferes with MHC class I surface expression by targeting vesicular transport and Golgi
The Orf virus (ORFV), a zoonotic Parapoxvirus, causes pustular skin lesions in small ruminants (goat and sheep). Intriguingly, ORFV can repeatedly infect its host, despite the induction of a specific immunity. These immune modulating and immune evading properties are still unexplained.
Here, we describe that ORFV infection of permissive cells impairs the intracellular transport of MHC class I molecules (MHC I) as a result of structural disruption and fragmentation of the Golgi apparatus. Depending on the duration of infection, we observed a pronounced co-localization of MHC I and COP-I vesicular structures as well as a reduction of MHC I surface expression of up to 50%. These subversion processes are associated with early ORFV gene expression and are accompanied by disturbed carbohydrate trimming of post-ER MHC I. The MHC I population remaining on the cell surface shows an extended half-life, an effect that might be partially controlled also by late ORFV genes.
The presented data demonstrate that ORFV down-regulates MHC I surface expression in infected cells by targeting the late vesicular export machinery and the structure and function of the Golgi apparatus, which might aid to escape cellular immune recognition.
PMCID: PMC3439706 PMID: 22809544
Orf virus; Parapoxvirus; MHC class I; Subversion; Immunomodulation; Golgi apparatus
Results 1-1 (1) |
global_05_local_5_shard_00000035_processed.jsonl/62039 | Tetrapod Zoology
I have to admit that I don’t find trace fossils – the vast majority of which are footprints – that interesting. But some trace fossils are very neat and provide excellent information on behaviour and lifestyle. Examples include pterosaur take-off traces, the trackway of the little theropod that does an abrupt about-turn and runs back the way it came, and the Myotragus tracks that show how individuals had to stagger and battle through wet sediment in order to escape alive.
Particularly fun are giant mystery traces: the ones made by large animals doing unusual things… yet what these large animals were, and what they were doing, remains uncertain.
One of my favourite ‘giant mystery tracks’ has only recently come to attention. It was photographed by palaeontologist Tim Palmer in Middle Jurassic sediments from Madagascar and consists of four parallel ‘channels’, generally thought to have been made by the limbs of some very large animal as it dragged itself across an emergent sand-bar [the fossil is shown here, photo from here on the Palaentological Association site]. Dinosaur tracks are preserved on the same surface. The animal changed direction near the end of the preserved section, hence the kink you see in the ‘channels’. The obvious guess is that the track-maker was a giant turtle or (heaven forbid) a plesiosaur, but that can’t work as both animals would leave a belly trace. It’s also difficult to try and make an identification without better photos. You can read a bit more about this weird track on the Palaeontological Association site.
However, this is far from a one-off. Numerous gutter-like trace fossils are known from the sedimentary rocks of the Jurassic though, unlike the Madagascan example, the other ones I know of were definitely not made by limbs. Instead, they represent feeding traces of some sort, and they were made by jaw- or snout-tips.
We have Jörn Geister of the Geologisches Institut at the University of Bern to thank for his excellent paper on an assemblage of giant, gutter-like traces, all discovered in the Middle Jurassic Callovian Marl of Liesberg in Switzerland (Geister 1998). Similar traces are also known from the Upper Jurassic of Spain and have been given the ichnotaxonomic name Megaplanolites ibericus (Calvo et al. 1987). The Swiss traces – which we can be absolutely sure were produced by large vertebrates – were exposed on the sides of what used to be the Liesbergmüli clay pit. Sadly, the pit later became a regional garbage dump and is now filled up with domestic waste [image at top shows the exposed bedding plane at the former clay pit, with silhouette of a 12-m-long pliosaur added for scale. The gutters are obvious. The photo was taken in 1987. ‘In 1998 the bedding plane shown on this photograph was completely covered by garbage’ (Geister 1998, p. 106)].
Three kinds of traces
As you can see from the various pictures used here (all from Geister (1998)), the traces were parallel-sided grooves or gutters. Some were straight; others were sigmoidal and meandering They extended over a large area of exposed surface (20 x 200 m). Some were huge – as much as 9 m long and up to 60 cm in width – while others were smaller, with widths of about 15 cm. It must be concluded that the traces were made by animals pushing their jaws or snout-tips through the once-soft sediment, and this narrows down the possible trace-makers to a select list. More on the identification of the trace-makers in a minute.
Geister (1998) was able to identify three different kinds of gutter-like trace [adjacent image, from Geister (1998), shows schematic longitudinal and transverse sections of Type (a), (b) and (c) traces]. In one type – Trace (a) – the trace-maker gradually pushed its jaw/snout deeper and deeper into the sediment while creating the gutter, eventually reaching a depth of 30 cm. The animal then stopped ‘ploughing’ and pulled its jaw/snout straight out. These gutters tend to be straight. In a second type of gutter – Trace (a) – the animal started making the gutter, and immediately pushed down into the sediment to a depth of 20 cm. It then pushed its jaw/snout horizontally, cutting sideways into the sediment. After ploughing for a few metres, the animal then retracted its jaw/snout sideways (creating a wide depression in the gutter), and it then finished making the trace by pulling out vertically. In the third type of gutter – Trace (c) – the trace-maker began by slowly lowering its jaw/snout 20-30 cm deep into the sediment. It then continued ploughing at this depth, and usually moved to the left or right while doing this, thereby creating a curving trace. Type (c) traces were made by the largest trace-makers: animals with jaw or snout tips 45 or even 60 cm wide that continued ploughing for up to 9 m [a Type a trace shown below. A penknife 85 mm long is visible down at bottom left].
While these traces sound remarkable (well, I think they do), they perhaps aren’t so incredible when we compare them to the feeding traces made by modern-day aquatic tetrapods. Walruses, for example, can and do produce feeding traces on the sea-floor that are as much as 47 m long and 40 cm wide. The giant pits excavated by filter-feeding grey whales can be 25 m long and 1.5 m wide.
Who made the traces?
So: what made the traces? ‘Animals’ is the obvious answer, and ‘big animals’ at that. Furthermore: ‘big animals with pointed structures that can be pushed into, and through, sediment’. It seems inescapable that these animals were pushing their jaw-tips or snouts through the sediment, and – given the parallel-sided, gutter-like shape of the traces – we have to conclude that these were animals with relatively narrow jaw- or snout-tips. While it can’t be entirely ruled out that large fishes (remember that there were some very big fishes in the Jurassic seas of Europe) made some of the traces, ichthyosaurs and plesiosaurs, and perhaps thalattosuchian crocodilians, are the most likely candidates. Geister (1998) suggested that some of the smaller traces (like some of the Type (b) traces) might have been made by the narrow jaws of ichthyosaurs or by small plesiosaurs (the traces that terminated with deep cavities could not have been produced by blunt-snouted plesiosauroids, however), while giant pliosaurs like Liopleurodon – the only animals that are both in the right size range, and capable of sea-floor ploughing – might have made the gigantic Type (c) traces [hypothetical plesiosaur feeding bottom-behaviour depicted below, from Geister (1998). I don’t think that long-necked plesiosaurs would stick their back ends out of the water as shown. I’d also don’t think that a pliosaur would need to adopt the bent-necked posture shown here; the animal could just as well have kept its whole long axis at a diagonal to the substrate].
In recent years the idea that long-necked plesiosaurs were predators of benthic, rather than nectic or planktonic, prey has become popular. This is supported by evidence from stomach contents (McHenry et al. 2005), and it also seems to fit with what we know about plesiosaur neck flexibility and general morphology (a few comments here refer to Lez Noè’s thoughts on this issue). Perhaps, in these gutter-like feeding traces, we have direct evidence for this behaviour.
Additional support for a marine reptile origin for these feeding traces might come from cololites (the fossilised remains of gut contents). It’s well known that ichthyosaur cololites contains lots of cephalopod hooklets as well as fish scales and whatnot (e.g., Pollard 1968). Geister (1998) makes the point that what’s less well known is that ichthyosaur cololites also contain a lot of sand, suggesting that some of these animals ingested a lot of sediment, at least on occasion. The same is also argued to be true for plesiosaurs: again, cololites from these animals contain a lot of sand, gravel and stones, and this might show that these animals swallowed sediment while foraging (e.g., Zhuravlev 1943, Martill 1992). If the idea of ichthyosaurs or pliosaurs scooping up mouthfuls of sediment seems weird, remember that benthic feeding of this sort is not incompatible with the predation on pelagic prey that we’re more used to imagining: the animals concerned were apparently generalists, feeding at various levels within the water column [image below shows hypothetical ‘ploughing’ pliosaur].
Presumably, these animals were searching for what we call infaunal prey: that is, animals that are living buried in the sediment, like molluscs, worms and burrowing crustaceans. Broken mollusc shells were never discovered alongside the gutters, perhaps showing that molluscs were not being caught and eaten. This is, of course, negative evidence: Geister (1998) knew that broken shells were discovered alongside the feeding traces left by walruses, and therefore assumed that shell remains should be found alongside the Swiss traces if molluscs had been unearthed and eaten.
However, this assumes that the sea-floor surface preserved at Liesberg preserves all of the clutter present on the sea-floor just after the gutters had been created, and I think that this might be a questionable inference. It also assumes that – on discovering a mollusc in the sediment – the predator fed by extracting the soft parts and leaving the shell valves behind. This is what walruses do (they suck the mollusc body out and leave the shell behind), but it doesn’t follow that Mesozoic marine reptiles did likewise. It is, after all, conceivable that a predator like a pliosaur might have swallowed bivalves whole. This is (I believe) what crocodiles do with gastropod prey. Anyway, the many crustacean burrows preserved at Liesberg do indicate that these were the prey animals the trace-makers were searching for. Worth noting here is that some plesiosaurs (I’m thinking Pachycostasaurus from the Oxford Clay) have been interpreted as specialist bottom-feeders of crustaceans (Cruickshank et al. 1996).
Incidentally, feeding traces weren’t the only impressions preserved at Liesberg. Geister (1998, Plate 21) also figured a wide, shallow impression – about 4 m long – that appears to have been made by a large vertebrate rubbing its body against the sea floor. Perhaps this represents a site where a creature (an ichthyosaur or plesiosaur?) rubbed its sides against the sediment in order to remove dead skin (Geister 1998). Cetaceans do this at select spots on stony sea floors, and we’d certainly expect Mesozoic marine reptiles to engage in behaviour of this sort.
One final thing that has to be mentioned… if plesiosaurs and/or ichthyosaurs and/or thalattosuchians really were in the habit of ploughing through sediment in quest of infaunal prey, how were they finding these animals? Were they relying on smell, on touch, or on some other sense? The answer is, of course, that we don’t know. The presence of large bifurcating canals within the bones of the ichthyosaur rostrum has led some to speculate that ichthyosaurs had enhanced tactility in the snout, and it’s even been proposed that ichthyosaurs might have had electroreceptive abilities (that is, that they could detect the electrical signals given off by muscular activity in other animals). This is unashamed speculation for sure (the electroreception idea comes from a conference poster and abstract), but it’s at least conceivable that some extinct tetrapods had amazing and unexpectedly weird sensory skills, just as many modern ones do.
So, there we have it. I think the ‘feeding gutters’ preserved at Liesberg and documented by Geister (1998) are remarkable, and this article represents my attempt to make them better known. Most biologists are familiar with the idea that whales, walruses and rays act as ’tillers of the sea floor’* [image above shows a Grey whale scooping up sea-floor sediment for sieving, from here]. We now have evidence that behaviour of this sort wasn’t only a Cenozoic thing: it was also occurring in the Jurassic at least.
* A 1987 article from Scientific American provided my inspiration here: it was titled ‘Whales and walruses as tillers of the sea floor’ (Nelson & Johnson 1987).
For previous Tet Zoo articles on Jurassic marine life see…
Refs – –
Calvo, J. M., Gil, E. & Meléndez, G. 1987. Megaplanolites ibericus (ichnogen. et ichnosp. nov.), a new trace fossil from the Upper Jurassic (uppermost Oxfordian) of Bueña (Teruel Province, Iberian Chain, Spain). Palaeogeography, Palaeoclimatology, Palaeoecology 61, 199-204.
Cruickshank, A. R. I., Martill, D. M. & Noè, L. F. 1996. A pliosaur (Reptilia, Sauropterygia) exhibiting pachyostosis from the Middle Jurassic of England. Journal of the Geological Society, London 153, 873-879.
Geister, J. 1998. Lebensspuren made by marine reptiles and their prey in the Middle Jurassic (Callovian) of Liesberg, Switzerland. Facies 39, 105-124.
Martill, D. M. 1992. Pliosaur stomach contents from the Oxford Clay. Mercian Geologist 13, 37-42.
McHenry, C., Cook, A. G. & Wroe, S. 2005. Bottom-feeding plesiosaurs. Science 310, 75.
Nelson, C. H. & Johnson, K. R. 1987. Whales and walruses as tillers of the sea floor. Scientific American 256 (2), 74-81.
Pollard, J. E. 1968. The gastric contents of an ichthyosaur from the Lower Lias of Lyme Regis, Dorset. Palaeontology 11, 376-388.
Zhuravlev, K. I. 1943. Nakhodki ostatkov verkhnejurskikh reptiliy v Savel’evskom slancevom rudnike. Izvestiya Akademiya Nauk Soyusa SSR, Otdelenie biologich 5, 294-307.
1. #1 C. M. Koseman
December 16, 2009
The four parallel tracks are pretty awesome. What could have caused them? Early attempts at farming by possible dinospohonts? Jurassic equivalents of the Dover footprints? The mind boggles.
2. #2 Darren Naish
December 16, 2009
After I’d written the article I had a crazy idea… rather than being tracks made by limbs, could those parallel channels have been made by four ‘ploughing’ marine reptiles moving in parallel? The sediment was apparently aerially exposed when the track was made, however, so this can’t work… hmmm.
3. #3 Sigmund
December 16, 2009
The Jurassic Pterodactyl Red Arrow display team?
4. #4 Dartian
December 16, 2009
In modern marine biota, for how long do such feeding traces typically last on the seafloor until they’re obliterated by currents? Hours, days, weeks, months?
5. #5 Bill
December 16, 2009
I would like to second Dartian’s question here – how did such a trace become fossilised? I would imagine that they would quickly become obliterated . Was this a possibly an ephemeral lake/lagoon and might this help in identifying the species that caused the traces?
6. #6 John Conway
December 16, 2009
Really awesome post Darren.
The first thing I thought when looking at the four parallel grooves was that something was being dragged. If it was on a sand bar, I guess it could be a large theropod dragging… something. Its own tracks could have been obliterated by the drag marks.
If the trace was made underwater… I dunno. Do aquatic predators drag around their meals?
7. #7 Greg Laden
December 16, 2009
I have often lived in regions with snow, and this quite possibly enhances one’s interest in trace fossils. I saw some very interesting marks on thing snow covering fresh ice the other day which consisted of the landing marks of a small flock of Canad geese, for instance. They were actually rather humorous looking.
8. #8 Karl Zimmerman
December 16, 2009
Wow, the coolest ichnotaxa since I read about that mystery monodactyl theropod from the Jurassic of South America in the new Novas book.
9. #9 Anonymous
December 16, 2009
Maybe just one marine reptile plowing through the sediment (maybe going after a patch of burrowing marine invertebrates or something), then turning around and repeating the motion four more times.
10. #10 Mu
December 16, 2009
The four parallel grooves clearly are the feeding pattern of a hyrda-like four-necked plesiosaur. Good luck describing the neck posture on that one Darren.
11. #11 AnJaCo
December 16, 2009
If only one of the critters had plowed into a buried log and lost a tooth or two…
The four parallel tracks are very parallel. Little/no variation in the distance between them. Also no sign of other marks such as the footprints of the ‘dragger’. As Darren says, better photos would be helpful. Very strange. Filed under “WTF?”
12. #12 Sclerophanax
December 16, 2009
The first thing that came to my mind looking at the four exceedingly weird parallel tracks was that they were left by some kind of a machine, maybe a robotic rover. Proof of alien intelligence or time travel? Yeah, probably not, but it would be incredibly cool if we did one day find something like that in the fossil record.
13. #13 Hank Roberts
December 16, 2009
Chuckle. I imagined something _really_ big floating over the seafloor –neutrally buoyant– reaching down and briefly dragging one limb to turn or slow down, making four claw-marks.
Let’s see, that would scale to what, about the size of the Graf Zeppelin?
14. #14 Ranjit Suresh
December 16, 2009
Darren: You said it couldn’t have been a plesiosaur because it would have left a belly trace behind. But, is it possible that some plesiosaurs could have supported themselves at least partially upright at times, as an alternative means of getting about on land? How about pliosaurs or marine crocodilians? Or is that ruled out by their biomechanics? I’m thinking here, for instance, of the differences between the terrestrial abilities of otariids and phocids.
15. #15 Jerzy
December 16, 2009
So it was TRUE!!!
It’s classical story! Only I forgot the title. Paleontologists dig out, bit by bit, tracks of a predatory dinosaur running towards something. Then they help soldiers from the local military base fix a jeep, putting a band of cloth across one tyre. Then they see an explosion in the base. Then they uncover the dinosaur tracks further and see that they are coming towards fossilized tracks of a jeep with a band on a tyre. It’s all true!
16. #16 Jerzy
December 16, 2009
Somebody can help with the name of the story? 😉
Seriously, they look like tracks of a quadruped, perhaps in shallow water making the body float above, or perhaps a turtle leaving few tracks of the carapace. I cannot imagine animal digging and moving so regularly up and down to make dents in the tracks.
I think one of you geek could figure out what marine animal has hind flippers much closer together than front flippers. Some turtle?
17. #17 Zach Miller
December 16, 2009
Extremely strange. I like the idea of plowing marine reptiles, though. And Darren, did you do the pliosaur picture? I really like it!
18. #18 Darren Naish
December 16, 2009
Thanks as always for comments.
The Swiss traces do raise a lot of questions, and questions that I don’t know the answers to. For gutter-like structures to be preserved in the sediment, they must be infilled by softer sediment (it must be softer, otherwise it wouldn’t become differentially eroded away). This must happen fairly soon after the creation of the gutters, as (presumably) the structures would have been deformed or filled in.
This raises the question of how long such structures persist in the sediment (comments 4 and 5): I have no idea on that, but obviously it can be highly variable and is very dependent on local currents, sedimentation rates, and so on. I did a quick google search, and found that marks made by dredging vessels were still present on the seafloor seven years (!!) after creation, so it seems possible from this that feeding traces could well be preserved if the right kind of sediment was dumped on top.
And, on ‘preservation': the complete and near-perfect preservation of a whole bedding plane covered in burrows and feeding traces suggests rapid deposition of a new, softer (finer-grained?) sediment, and I would guess that some event brought an influx of new sediment to the local system. But I’m no sedimentologist.
One palaeontologist suggested to me today that the traces might not be feeding traces at all, but ‘flute casts': that is, scour marks made by currents. I have no idea whether this might be true, but I find it hard to believe. The traces that Geister described are not parallel (in fact, they meander all over the place and are sometimes at strong angles to each other), and they look too complex and regular to be caused by currents. But I’d be interested in further comments on this, I didn’t pay much attention during sedimentology classes.
And, yeah, I did the pliosaur cartoon, thanks. The proportions are bullshit (forelimbs longer than hindlimbs?) but I did it in a hurry.
19. #19 Erich Fitzgerald
December 16, 2009
Look out next Monday (21 December; London time zone) on the Linnean Society website for new research related to Cenozoic aspects of this blog post.
20. #20 Hank Roberts
December 16, 2009
The story you’re thinking of is Clarke’s “Time’s Arrow”
21. #21 Nathan Myers
December 16, 2009
The four parallel tracks were clearly made by the claws of an immense beast being dragged, backwards, into the water, obviously by an even more immense beast. We see precisely that phenomenon, with huge parallel gouges in the earth, illustrated in the film, “Sky Captain and the World of Tomorrow”, in a scene set on Totenkopf’s island. In that instance the skeleton of the manus responsible for the gouges remains to offer mute confirmation of the interpretation.
If you haven’t seen Sky Captain yet, what are you waiting for?
22. #22 John Harshman
December 16, 2009
Thank you very, very much for the illustration of the plesiosaur as dabbling duck analog. And of course they stuck their tails in the air. That’s how the neontological model does it, and so that’s how the plesiosaur has to do it. And besides, it allows you to reach the bottom at a greater depth.
Is that really the currently popular model? If so, great. I’m in favor of anything with ducks in it.
23. #23 Alton Dooley
December 16, 2009
[from Darren: sorry, delayed by spam-filter]
Brian Beatty and I suggested this benthic feeding behavior in a paper earlier this year, based on rib morphology and lower jaw and cranial injuries. Here’s a link to the paper (it’s open access-scroll down to Jeffersoniana 20 for the link):
And a summary (and reconstruction) is at:
We did not, however, find obvious feeding traces at the site. A turbidity flow is one way you could bury and preserve the traces. There might be other ways, as well.
One thing to note with the parallel traces is that gray whale traces tend to be parallel; I suspect they’re aligned with the current (easier for the whale to stay on course, maybe?).
Another point, with the bent neck in the pliosaur. Gray whales (and humpbacks, which occasionally feed on the seafloor) avoid this by feeding out of one side of the mouth. You can see the gray whale doing that in the photo you included. They are strongly handed, and always use the same side of the mouth for feeding (right-handedness is more common); the baleen plates are shorter on the feeding side from abrasion. I wonder if plesiosaurs and/or pliosaurs show heavier tooth wear on one side? Has anyone looked?
24. #24 Kristoffer
December 17, 2009
Very interesting indeed. Here in Norway we have a lake called Seljordsvatnet, it is the “norwegian Loch Ness” one might say. During one expedition in 2004 similar tracks to these were found on the bottom. At the time they baffled the research team, as they had no good suggestion as to what had made them. It was also recorded some kind of “clicking/humming” noise in the lake, like the sound of echolocation made by whales.
25. #25 Dartian
December 17, 2009
John H.
In some languages (e.g., Danish, Norwegian, Swedish, and Finnish) plesiosaurs are actually called ‘swan lizards’.
26. #26 johannes
December 17, 2009
> Who made the giant Jurassic sea-floor gutters?
This can’t be answered without breaking the Dresden Agreement ;-).
27. #27 Mokele
December 17, 2009
Someone mentioned it earlier, but I think it deserves another mention: if these are feeding tracks, could there be teeth burried in the muck at the edges? Some teeth would undoubtedly be lost during such feeding, and while some might have been ingested and digested, some might have fallen out and been fossilized. Unfortunately, that would mean destroying the traces as you try to find teeth in them…
28. #28 David Marjanović
December 17, 2009
Except that ducks have much lower density than plesiosaurs. A plesiosaur sticking that far out of the water would just fall in.
29. #29 Valentin Fischer
December 18, 2009
All the “-cast” sedimentary figures (load cast, flute cast, scour marks) are usually made by small pebbles forcefully clashed and dragged onto soft sediments by strong waves… These traces are like 0.5-3 cm wide and 5-15 cm long, but relatively quite deep, around 1-5 cm…
If those large traces are “mega flute casts”, made by 10-30 cm boulders, any geologist would be able to identify storm wave sedimentary structures like tempestites, or large bouma sequences, or tsunamites on the above bed. But you mentionned some of these were found in a clay pit… which sounds more like a quieter/deeper palaeoenvironnement.
My 2 cents
30. #30 Douglas McClean
December 18, 2009
What does “nectic” mean? Google doesn’t seem to know, at least on the first page of results.
31. #31 Mark Evans
December 18, 2009
These are impressive trace fossils, but I’m still unsure as to the trace maker.
Even the largest Liopleurodon skull known only has a rostrum around 150 mm in width, about half the size of what would be needed to make most of the traces. The newly-unveiled Weymouth Bay pliosaur would have had a rostrum of the right width. However, this is just about the largest known pliosaur skull, at around 2.25 m in estimated length.
I have been wondering about large filter feeding fish. Even if Leedsichthys is too large (somewhere between 10 and 15 m in length), there were other Middle/Late Jurassic filter feeding pachycormids such as Asthenocormus and Martillichthys.
32. #32 David Marjanović
December 18, 2009
What does “nectic” mean?
Try “nektonic” — opposite of “planktonic”, means, able to swim around on its own. Basically vertebrates and squid, and presumably belemnites. I don’t know if jellyfish count.
33. #33 arachnophile
December 23, 2009
I am overjoyed that some of the more learned readers had the same thought that I did. I wondered about the 4 paralel lines and multiple individuals. As stated there are so many problems with that but I guess I still don’t understand why it is not, in fact, 5 furrows. Shouldn’t it be a jaw and 4 limbs we are seeing evidence of?
I have to state that, at this point I have ingested more than a bit of egg nog and may have missed an obvious part of the article that refers to this.
As always I’m a reader who is a “wannabe” in your world. :) I have to state this because the comments are always intimidating as hell! 😉 Many of your readers are obviously pros.
34. #34 Kris
January 3, 2010
Better late than never…
This makes me think of mosasaurs… specifically Globidens. One would think that it would have done some bottom trolling from time to time given its diet. So, maybe there are mosasaur-made trace fossils, very much like the ones from the Jurassic, that are out there to be discovered.
35. #35 drhook
January 25, 2010
Maybe a giant species of mollusc or crustacean. A horseshoe crab leaves similiar tracks. My bet would be something with a hard undershell with protrusions, forward movement aided by current or legs whose tracks might be washed away quite quickly.
36. #36 Phil gutters
August 15, 2010
It’s a very interesting subject. I think long ago there must have been creatures like giant turtles that would migrate, thus creating huge paths along the sea bed.
37. #37 David Marjanović
August 16, 2010
Then why haven’t we found body fossils of such a beast?
Why would they migrate along the seafloor and not higher up in the water?
38. #38 Zach Miller
August 16, 2010
Because they’re giant LAND turtles, David. They could hold their breath a reeeeally long time.
39. #39 jason
November 13, 2010
Gravity: the sea “floor” was tipped at an angle at the time the “tracks” were made, and some rocks rolled downhill.
40. #40 Darren Naish
November 13, 2010
No. The tracks aren’t all straight (some are curved or meandering), don’t occur in parallel (some are perpendicular to others), and the sediment on the bit of seafloor where the tracks are preserved wouldn’t have piled up to equal depth throughout the section if the seafloor was tilted. Furthermore, in some of the tracks the track-maker pushed sideways into the wall of the gutter it was creating, or probed into the ‘end’ of the gutter, leaving an overhang. And if rolling rocks were responsible, why wouldn’t they be left in situ?
41. #41 Jim Sweeney
November 14, 2010
Re: the four parallel “tracks” and your recent comment, “let’s get things straight and admit up front that Godzilla is not a real animal, nor was it ever.”
Time to reconsider, perhaps?
Just saying…
New comments have been temporarily disabled. Please check back soon. |
global_05_local_5_shard_00000035_processed.jsonl/62044 | Moritz Onken > ElasticSearchX-Model-0.1.3 > README.pod
Annotate this POD
View/Report Bugs
Source Latest Release: ElasticSearchX-Model-0.2.2
package MyModel::Tweet;
use Moose;
use ElasticSearchX::Model::Document;
has date => (
is => 'ro',
required => 1,
isa => 'DateTime',
default => sub { DateTime->now }
package MyModel;
use Moose;
use ElasticSearchX::Model;
my $model = MyModel->new;
my $tweet = $model->index('default')->type('tweet')->put({
message => 'Hello there!'
print $tweet->_id;
This is an ElasticSearch to Moose mapper which hides the REST api behind object-oriented api calls. ElasticSearch types and indices are defined using Moose classes and a flexible DSL.
Deployment statements for ElasticSearch can be build dynamically using these classes. Results from ElasticSearch inflate automatically to the corresponding Moose classes. Furthermore, it provides sensible defaults.
The search API makes the tedious task of building ElasticSearch queries a lot easier.
The ElasticSearchX::Model::Tutorial is probably the best place to get started!
WARNING: This module is being used in production already but I don't consider it being stable in terms of the API and implementation details.
index twitter => ( namespace => 'MyNamespace', traits => ['MyTrait'] );
index facebook => ( types => [qw(FB::User FB::Friends)] );
Adds an index to the model. By default there is a default index, which will be removed once you add custom indices.
See "ATTRIBUTES" in ElasticSearchX::Model::Index for available options.
analyzer lowercase => ( tokenizer => 'keyword', filter => 'lowercase' );
tokenizer camelcase => (
type => 'pattern',
pattern => "([^\\p{L}\\d]+)|(?<=\\D)(?=\\d)|(?<=\\d)(?=\\D)|(?<=[\\p{L}&&[^\\p{Lu}]])(?=\\p{Lu})|(?<=\\p{Lu})(?=\\p{Lu}[\\p{L}&&[^\\p{Lu}]])"
analyzer camelcase => (
type => 'custom',
tokenizer => 'camelcase',
filter => ['lowercase', 'unique']
Adds analyzers, tokenizers or filters to all indices. They can then be used in attributes of ElasticSearchX::Model::Document classes.
Builds and holds the ElasticSearch object. Valid values are:
Connect to a server on, port 9200 with the httptiny transport class and a timeout of 30 seconds.
Connect to and with the same defaults as above.
{ %args }
Passes %args directly to the ElasticSearch constructor.
my $bulk = $model->bulk( size => 100 );
$bulk->commit; # optional
Returns an instance of ElasticSearchX::Model::Bulk.
my $index = $model->index('twitter');
Returns an ElasticSearchX::Model::Index object.
deploy pushes the mapping to the ElasticSearch server. It will automatically try to upgrade your mapping if the types already exists. However, this might not be possible in case you changes a field from one data type to another and ElasticSearch cannot figure out how to translate it. In this case deploy will throw an error message.
To create the indices from scratch, pass delete => 1. This will delete all the data in your indices.
$model->deploy( delete => 1 );
if($model->es_version > 0.02) { ... }
Returns the version number of the ElasticSearch server you are currently connected to. ElasticSearch uses Semantic Versioning. However, release candidates have a special syntax. For example, the version 0.20.0.RC1 would be parsed as 0.020_000_001.
Creating objects is a quite expensive operation. If you are crawling through large amounts of data, you will gain a huge speed improvement by not inflating the results to their document classes (see "raw" in ElasticSearchX::Model::Document::Set).
syntax highlighting: |
global_05_local_5_shard_00000035_processed.jsonl/62045 | Jeffrey Ryan Thalhammer > Dist-Zilla-Plugin-Pinto-Add-0.083 > Dist::Zilla::Plugin::Pinto::Add
Annotate this POD
View/Report Bugs
Module Version: 0.083 Source Latest Release: Dist-Zilla-Plugin-Pinto-Add-0.088
version 0.083
# In your dist.ini
root = ; at lease one root is required
author = YOU ; optional. defaults to username
stack = stack_name ; optional. defaults to undef
no_recurse = 1 ; optional. defaults to 0
authenticate = 1 ; optional. defaults to 0
username = you ; optional. will prompt if needed
password = secret ; optional. will prompt if needed
# Then run the release command
dzil release
Dist::Zilla::Plugin::Pinto::Add is a release-stage plugin that will add your distribution to a local or remote Pinto repository.
IMPORTANT: You will need to install Pinto to make this plugin work. It ships separately so you can decide how you want to install it. I recommend installing Pinto as a stand-alone application as described in Pinto::Manual::Installing and then setting the PINTO_HOME environment variable. Or you can install Pinto from CPAN using the usual tools. Either way, this plugin should just do the right thing to load the necessary modules.
Before releasing, Dist::Zilla::Plugin::Pinto::Add will check if the repository is responding. If not, you'll be prompted whether to abort the rest of the release.
If the authenticate configuration option is enabled, and either the username or password options are not configured, you will be prompted you to enter your username and password during the BeforeRelease phase. Entering a blank username or password will abort the release.
The following parameters can be set in the dist.ini file for your distribution:
This identifies the root of the Pinto repository you want to release to. If REPOSITORY looks like a remote URL (i.e. it starts with "http://") then your distribution will be shipped with Pinto::Remote. Otherwise, the REPOSITORY is assumed to be a path to a local repository directory and your distribution will be shipped with Pinto.
At least one root is required. You can release to multiple repositories by specifying the root attribute multiple times. If any of the repositories are not responding, we will still try to release to the rest of them (unless you decide to abort the release altogether). If none of the repositories are responding, then the entire release will be aborted. Any errors returned by one of the repositories will also cause the rest of the release to be aborted.
author = NAME
This specifies your identity as a module author. It must be alphanumeric characters (no spaces) and will be forced to UPPERCASE. If you do not specify one, it defaults to either your PAUSE ID (if you have one configured in ~/.pause) or your current username.
stack = NAME
This specifies which stack in the repository to put the released packages into. Defaults to undef, which means to use whatever stack is currently defined as the default by the repository.
no_recurse = 0|1
If true, prevents Pinto from recursively importing all the distributions required to satisfy the prerequisites for the distribution you are adding. Default is 0.
authenticate = 0|1
Indicates that authentication credentials are required for communicating with the server (these will be prompted for, if not provided in the dist.ini file as described below). Defaults is false.
username = NAME
Specifies the username to use for server authentication.
password = PASS
Specifies the password to use for server authentication.
The following environment variables can be used to influence the default values used for some of the parameters above.
Sets the default author identity, if the author parameter is not set.
Sets the default username, if the username parameter is not set.
You can release your distribution to multiple repositories by specifying multiple values for the root attribute in your dist.ini file. In that case, the remaining attributes (e.g. stack, author, authenticate) will apply to all the repositories.
However, the recommended way to release to multiple repositories is to have multiple [Pinto::Add] blocks in your dist.ini file. This allows you to set attributes for each repository independently (at the expense of possibly having to duplicating some information).
You can find documentation for this module with the perldoc command.
Internet Relay Chat
Bugs / Feature Requests
Source Code
git clone git://
Jeffrey Ryan Thalhammer <>
syntax highlighting: |
global_05_local_5_shard_00000035_processed.jsonl/62047 | Take the 2-minute tour ×
Hay, i have some files on my server with the owner set to "apache", I'm not quite sure how this happened.
Anyway, i need to change the permission of these files to 0777 so i can download/edit them. However i cannot.
I'm using a 1and1 Linux server and use Plesk to administrate it.
I have the ability to login via SSH. However, if i run chmod or chown i get a "permission denied" error, and if i try to sudo chmod or chown it says the command cannot be found.
When i go to edit my domain details, i get this option
Shell access to server with FTP user's credentials
and have these options
/bin/bash (chrooted)
Any idea's how i should go about changing the permissions or changing the owner?
share|improve this question
Why do you want to change their positions? If they are used by the Apache, then Apache is most likely the owner you want it to have. Is their a specific reason you want to change the files owner? – Dan McGrath Jul 23 '10 at 8:27
They are images, i want to be able to download them from my FTP server. But i always get permission denied. – Dotty Jul 23 '10 at 8:58
3 Answers 3
up vote 2 down vote accepted
Use php's chmod function.
chmod("/somedir/somefile", 0777);
also you can also use shell_exec function
echo shell_exec("chmod 777 /somedir/somefile");
share|improve this answer
chmod works fine, chown doesn't. – Dotty Jul 23 '10 at 10:02
you need to be root the change the owner of "foreign" files. If you not able to gain root access you could try to change the permissions of the files via php.
Try to run the php script in your browser, the owner of the script should be the apache user.
share|improve this answer
I made a simple script called fix.php and wrote "print system('whoami')" and it returns "apache". I then used chmod() and managed to change the permission, however i still cannot do anything with the files, chown() always fails. – Dotty Jul 23 '10 at 8:35
Not all users can automatically change the ownership of even files they own, because there are ways that ability could be twisted into a security risk. I remember reading something about that recently (possibly right here on SF) but I can't remember/find the link... maybe someone else can provide more details. – David Z Jul 23 '10 at 8:50
are you able to read the files? you could read them all and download them with you browser. David is right about the possible security risk but I cant remember the scenario and details – krissi Jul 23 '10 at 9:25
I am able to read the files, i can open them in a browser. This seems the way i will have work. – Dotty Jul 23 '10 at 10:02
david: if somebody set the setuid bit on a file, then gave it away, then ran it it would run as the other user. also, it might count towards the other user's disk quota – immibis Dec 26 '10 at 13:04
This might be a stupid question, but did you try su? I assume you have full control over the server (it's not a shared web host or something) because they wouldn't put everyone's files under the same user "apache"
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62048 | Take the 2-minute tour ×
OK, brief background. I accidently rm -rf my usb external hard drive. Right now I am using Photorec to recover the files. (I accidently deleted 800GB. Its my personal files. Mostly it was media, but I also had other stuff such as pdf, xls, jpg, doc etc.)
So, I attached another external hard drive with 350 GB left to start recover since that is all I got. The files are being dumped right now and I know I will exhaust it soon.
I need some help with automating some of the recovery. The recovery process is dumping files in folders. Each one starts with recup_dir.x
Each of these folders has my files. Right now I want to do something along these lines in each folder; navigate to each folder and copy all the pdf,doc,xls,jpg files to my comp hd and delete them from the other external harddrive so I can go to sleep and hopefully it will at least recover most of the needed files. Can some one help :(
cp *.docx /home/me/Desktop/docx/ || cp *.doc /home/me/Desktop/docx/ || cp *.xls /home/me/Desktop/xls/ || cp *.pdf /home/me/Desktop/pdf/ || cp *.jpg /home/me/Desktop/jpg/ && rm *.doc *.docx *.pdf *.jpg *.xls
share|improve this question
3 Answers 3
I would never, never, delete any files before I had verified that the file recover was successful. Especially not when writing a script, a typo in the script could delete everything.
Better to wipe the disk after the recovering is completed.
That said, I would look into using rsync, it should be a somewhat safe option. It has an option to --remove-source-files which probably is what you are looking for. man pages can be found here.
A problem you have to think about, however, is what would happen if rsync would start to copy a file while it is being recovered/copied to the disk. Again, I think the chance of errors are too high.
share|improve this answer
Disk will run out of space pretty soon. I dont know how photorec will react when it does. Right now I am able to retrieve the files to my desktop. – user55490 Sep 28 '10 at 9:03
Can you please look at the copy mechanism and see what I need to change to copy multiple files to different folders based on file extension. I will not delete/remove untill I am sure, The one I am using is I know wrong... – user55490 Sep 28 '10 at 9:06
Still sounds dangerous to me, if you care for your files I would get another temporary disk to backup files to. Also, the commands you provided could overwrite documents of the same name. – Avada Kedavra Sep 28 '10 at 9:07
Added some thoughts about rsync – Avada Kedavra Sep 28 '10 at 9:19
safer way
rsync --progress -gioprtv <recoverydir>/*.doc* /home/me/Desktop/docx/ && \
rsync --progress -gioprtv <recoverydir>/*.xls /home/me/Desktop/xls/ && \
rsync --progress -gioprtv <recoverydir>/*.jpg /gome/me/Desktop/jpg/ && \
rsync --progress -gioprtv <recoverydir>/*.pdf /gome/me/Desktop/pdf/; \
rsync verifies the files end to end by hashing them, the above should give you an indication as to the process of an individual copy aswell so you're not sat there twiddling your thumbs.
The && ensures that it will only progress if the previous step has completed successfully, this allows you to go back and edit the script if anything goes wrong and repeat the process.
Put it in a file i.e. resovery.sh chmod+x and away you go
NEVER EVER delete the source files until you have had chance to review them.
share|improve this answer
Hey thanks for your response. I still have to try it, but I had a question, my recoverdir has a bunch of sub-directories under which the files are. Is there a way for me to act that kind of script across all sub folders? all the sub-folders are name sub-folder.x in serial increasing order? such as <recoverydir>/<sub-director>.*/*.doc* /Destination/ – user55490 Sep 28 '10 at 9:21
the -gioprtv dictates the following, preserve gid,itemize, preserver oid, preserver permissions, recursive, preserver timestamp, be verbose, so it will resurse over all directories if you remove the/*.ext infavor of just specifying the path – Oneiroi Sep 28 '10 at 10:25
Another thougth, you write that most of your stuff is media but you dont mention that you want to recover these files? If so, it makes more sense to me to reverse the logic and instead delete those files to create room for the files that you want to keep.
If so you could play around with something like this. NOTE THAT THIS CAN DELETE ALL YOUR AVI FILES IN CURRENT FOLDER AND ALL SUBFOLDERS!!
find . -name "*.avi" - verify
find . -name "*.avi" -exec rm -f {} \; - delete
share|improve this answer
That does make sense. Thanks for the suggestion. Right now I am trying to look around to see if I can get some thing like this builtbackwards.com/projects/photorec-sorter for linux. – user55490 Sep 28 '10 at 10:01
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62049 | Take the 2-minute tour ×
i have set folder redirection in the sbs console but it only allows me to this for desktop, documents and start menu but not application data. how do i get it to redirect the application data folder aswell? i no it may have somthing to do with group policies?
All my users are using windows xp the server is windows sbs 2008
share|improve this question
1 Answer 1
up vote 0 down vote accepted
You can edit the "Small Business Server Folder Redirection Policy" GPO to configure additional redirected folders.
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62050 | Take the 2-minute tour ×
I am looking at my Apache access log and there is suspicious activity from several ip ranges. What they have in common is that all of them are identified as "Allegro-Software-WebClient/4.07".
Is there a way for me to create a rule for apf or similar that will do:
share|improve this question
1 Answer 1
up vote 1 down vote accepted
For a firewall to do this, it has to support HTTP protocol inspection which is not supported by most firewalls (if not all). Firewalls usually inspect lower layers.
I suggest to install a proxy like squid in front of apache. The, you can configure it to deny access based on the user-agent (called browser in squid).
acl aclname browser [-i] regexp ...
The proxy server helps also in caching and thus improving your server performance.
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62051 | Take the 2-minute tour ×
Currently our production server runs in system ruby. Passenger handles our rails apps.
Should I move to handling my entire ruby stuff using rvm? What advantage can rvm give me in a production environment? Please advise. I'm a beginner in handling servers. I would need to run one or more apps in the same big server box using passenger.
if I use passenger via rvm, should I install passenger gem for every ruby I install?
share|improve this question
2 Answers 2
If you don't absolutely need to have multiple ruby versions running at the same time I don't see any reason to use rvm. A gemfile and bundle should be good enough to keep the right gems associated with the right application
If you just want to have another version of ruby installed than the system provided, you can compile your self from source or use something like ruby-build.
Rvm does a lot of magic with user PATHs and changes behaviour in the interactive login shell that does not make sense to do on an production server. If you really want two or more versions of ruby (maybe jruby for the application and mri for scripting), rbenv or just setting your PATH right is a better idea.
share|improve this answer
Many of us do need to have multiple ruby versions. Consider the case where all our systems run puppet agents with the system ruby (1.8.7), but the web app needs Ruby 1.9.3 and Rails 3.2, and a second web app which is still stuck on Rails 2.3... – Michael Hampton Nov 13 '13 at 17:32
Yes, and then I think something more simple like rbenv, or just setting your PATH for each app is better. RVM can be used on servers, but it's mostly written to be used in an login shell and aid you with different development environments, so I don't see the reason to use it instead of some simpler alternative. – Mattias Nov 13 '13 at 17:39
rvm will allow you to use latest patch level of your ruby, this includes security patches - which is the main reason for switch
as for running multiple apps on one server the best solution is to use one instance of nginx as a proxy forwarding to unicorn or passenger standalone per app.
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62052 | Take the 2-minute tour ×
I'm having trouble trying to do a simple backup of our 2-server SharePoint 2010 farm. I'm running the backup process with a Powershell command, backing up to a UNC shared folder on the SharePoint server.
I have SP2010 on one server and SQL 2012 on another. SQLserver.exe is being run by a new Managed Service Account. I have put this account into a new group and then I gave that group read/write permissions on the backup share at both the Share and Filesystem level.
My farm account also has read/write access to the backup folder. I'm starting my backup process via Administrator account.
My backup commands:
Add-PsSnapin Microsoft.SharePoint.Powershell
Backup-SPFarm -Directory \\SHAREPOINT\Backup\Sharepoint -BackupMethod full
The error I'm seeing:
[8/13/2012 12:07:01 PM] Warning: [SharePoint_Config] Cannot open backup device '\\SHAREPOINT\Backup\Sharepoint\spbr0001\000000C6.bak'. Operating system error 5(Access is denied.). BACKUP DATABASE is terminating abnormally.
I'm thinking that for some reason MSAs aren't supported with this backup method but I can't find any information on this anywhere. SharePoint 2010 doesn't support using MSAs for running the services but SQL 2012 does.
I am unable to use the MSA as a login account to be able to check if it can access the UNC from the SQL Server properly like I would a normal account.
share|improve this question
After changing SQLserver.exe to run as a normal domain account, also a member of the group with write access to the UNC backup share, it appears to be working. – Jeff Harris Aug 13 '12 at 16:45
I still don't understand why a MSA can't be used to run SQL and backup SharePoint. – Jeff Harris Aug 13 '12 at 16:46
Well, it looks like it works after-all. Maybe I just needed to reboot the SharePoint machine??? Weird... – Jeff Harris Aug 14 '12 at 4:23
Could also be an access denied if the same account's trying to access the same network resource from more than one location (such as would happen if the same MSA was being used to run SQL and your script). – HopelessN00b Aug 15 '12 at 2:28
1 Answer 1
up vote 0 down vote accepted
You've got some sort of permissions mis-setup on the network share of the folder. Did you create the group that the MSA is in on the SharePoint server, the SQL Server or within AD?
What permissions did you give to the group on the folder and the SharePoint server?
share|improve this answer
Created the group in AD. First it only had the MSA that SQLServer.exe used as a member. The group is read/write on both the backup share and the folder. I created a new AD service account (normal user) started SQLserver.exe with this user, and added the user to the aformentioned group. Restarted SharePoint services, ran the backup and all is good now. – Jeff Harris Aug 13 '12 at 23:48
That's strange. The MSA should have worked. I'd assume that Kerberos isn't working correctly on the domain or SQL isn't talking to the domain correctly over Kerberos. There should be some useful information in the security log on the sharepoint server. – mrdenny Aug 14 '12 at 0:12
You are correct, I do not have Kerberos setup. Maybe that is the problem? It's a simple site with the domain primarily supporting this SharePoint app so I didn't bother. Thanks for looking. I will take a look at the logs. :-) – Jeff Harris Aug 14 '12 at 3:46
Well, I have no idea what I did, but when I changed SQLServer back to using the MSA again, then restarted the SharePoint server, the backup works with 0 errors. – Jeff Harris Aug 14 '12 at 4:22
Did you remember to restart the SQL Service? – mrdenny Aug 14 '12 at 4:24
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62053 | Take the 2-minute tour ×
I am doing some distributed work with RackSpace cloud servers and I am using bittorrent to distribute my files. It works surprisingly well. However, distributing the torrent files themselves are not so nice. How would you go around doing that? Right now I just scp the torrent files to the servers, and of course I could write a script that copies it to sqrt(n) servers instructing each to again copy to sqrt(n) but that's a pita to work it.
share|improve this question
4 Answers 4
up vote 23 down vote accepted
Not knowing what exactly your problem is, I can recommend pscp from parallel-ssh as a tool to upload small files to multiple servers.
You prepare a list of servers to upload to and let it know what to take locally and where to put it remotely. For example:
$ pscp -h list-of-servers file.torrent /tmp/
[1] 02:11:22 [SUCCESS]
[2] 02:11:22 [SUCCESS]
[3] 02:11:22 [SUCCESS]
[4] 02:11:22 [SUCCESS]
[5] 02:11:22 [SUCCESS]
[6] 02:11:22 [SUCCESS]
[7] 02:11:25 [FAILURE] Exited with error code 1
share|improve this answer
There's also code.google.com/p/pdsh – chx Oct 31 '12 at 20:03
Given they're very small files typically couldn't you just have a 'dropbox' using HTTP with a cron'ed script doing a curl/wget with wildcard?
share|improve this answer
This is the method I would use, no need to push a file out to each server and maintain a server list, have them periodically check for new .torrent file – jwbensley Oct 31 '12 at 17:41
you could also use Puppet to do this – Noah Yetter Nov 1 '12 at 5:20
You could have the torrent clients check an rss feed for new torrent files or switch to magnet links instead of torrent files.
share|improve this answer
RSS may not be an option if he/she is using a basic command line torrent client. – Hengjie Oct 31 '12 at 22:44
He could you Flexget with rtorrent without gui – chewbakka Nov 1 '12 at 11:07
Yep, flexget and rtorrent would work well for this – Grant Nov 2 '12 at 13:09
+1 "switch to magnet links instead of torrent files." – michael_n Jan 11 '14 at 12:14
You might want to look into murder
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62054 | Take the 2-minute tour ×
I am using Virtual Machine software (VirtualBox) to learn Windows Server 2008 R2 Network Infrastructure (70-642). Trouble is - I'm learning at an extremely slow pace and so the trial periods of my virtual machines are close to running out.
If I delete the VMs then install WS2008R2 from scratch on new VMs is that violating the acceptable use policy of Microsoft?
I am aware that I can extend the trial, but it seems I can only do that by 10 days at a time. Also I think having to re-install from scratch is a good way to reinforce the knowledge.
share|improve this question
closed as not constructive by RobM, Michael Hampton, pQd, dyasny, ceejayoz Oct 31 '12 at 21:14
possible duplicate of Can you help me with my software licensing issue? – Michael Hampton Oct 31 '12 at 20:08
In the US (I explicitly disclaim any knowledge of licensing otherwise): After the 180 day trial, exclusive of extensions or "valid licensing", you have no right to use the software (there's no limitations on that... (thou shall not). "The Software" in this case applies to the installation of Windows on your computer. It also applies to the source media you used to create that installation. You may obtain new source media to create a new installation and may enter into a new 180 trial license however. Restrictions on use and such apply. – Chris S Oct 31 '12 at 22:34
2 Answers 2
I can't answer your question directly but I would suggest purchasing a TechNet subscription so as not to have to worry about those issues.
share|improve this answer
slmgr /rearm will give you an additional 30 day window. You can rearm up to three times. This will give you an additional 3 months of trial time without having to reinstall.
Also, make sure you know your DNS for 70-642 ;)
As to the actual legality if it - we're sysadmins, not lawyers. We generally refrain from answering these kinds of questions here.
share|improve this answer
|
global_05_local_5_shard_00000035_processed.jsonl/62055 | Take the 2-minute tour ×
I'm trying to install pkg in a limited space embedded system. I use busybox's dpkg. To let dpkg work, I just touch a file
touch /var/lib/dpkg/status
But, it still can not work.
$dpkg -i ntpdate_4.2.4p4+dfsg-8lenny3_sh4.deb
dpkg: package ntpdate depends on netbase, which is not installed or flagged to be installed
How to flag the netbase as installed? I mean cheat to let dpkg treat it could install.
share|improve this question
2 Answers 2
You need dpkg to ignore dependencies, use the following command:
dpkg -i --force-depends mypackage.deb
Or, in case you have more problems arising, use:
dpkg -i --force-all mypackage.deb
But be warned, package dependencies are almost always true dependencies, as in, the program might be linked against them.
And using the above commands, will install the package fine, but dpkg will label it as broken.
share|improve this answer
Hi @Waleed, --force-depends doesn't help with a completely uninitialised dpkg system. --force-all is not recognised by busybox flavor of dpkg. I've updated the question to reflect that. Kind regards, Rob – Robert Ševčík - Robajz Feb 3 at 19:19
The answer might be to use debootstrap anyway. Here's a howto https://www.debian.org/releases/lenny/arm/apds03.html.en
The process I managed to use is with the --foreign parameter, which creates a root filesystem ready to be bootstrapped. My command:
debootstrap --foreign --arch amd64 --variant minbase \
--keyring /usr/share/keyrings/debian-keyring.gpg \
jessie debstaged
cd debstaged
tar -czf ../iso/debstaged.tar.gz *
cd ..
The root filesystem tar/gzipped is in my iso folder that I use to create a bootable CD
Once I boot the CD which only has a minimalist busybox initramfs, I can simply untar that filesystem and complete the installation:
mount /dev/sr0 /mnt
mkdir /tmp/root
mount -t tmpfs debroot /tmp/root
cd /tmp/root
tar -xzf /mnt/debstaged.tar.gz
umount /mnt
chroot . /debootstrap/debootstrap --second-stage
At this point, I have a ready configured debian system root in /tmp/root.
The answer is obviously incomplete, but if we could figure which files are necessary and manage to debinify the busybox system, there could be a way. This resource was quite helpful as well - http://lists.busybox.net/pipermail/busybox/2014-June/081017.html
I should be able to switch to the new root like that, but my kernel doesn't have devtmpfs which is required by systemd init:
echo > /proc/sys/kernel/hotplug
umount /proc
umount /sys
exec switch_root -c /dev/console /tmp/root /sbin/init
Kind regards, Rob
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62056 | Take the 2-minute tour ×
Recently setup an ftp server using FTP 7.5 publishing service... I have tried opening ports 20,21 and that sort of worked but it hang after logging in.... saying Opening binary.....
I disabled the firewall and all works ok... So i tried following this document http://learn.iis.net/page.aspx/309/configuring-ftp-firewall-settings/
but it fails to work, can anyone tell me what i am missing?
I have specifically done this as per the document above
netsh advfirewall set global StatefulFtp disable
and set port channel range to 49152-65535..
As i say as per the document it FAILS won't even log in ... as if there is not ftp service there, with my GUESS opening port 20-21 TCP it sort of works but stops at opening binary.....
If i disabled the firewall completely that it works 100% without problems..
I am using Windows 7 (similar firewall setup to Windows 2008 server)
Any ideas really appreciated
share|improve this question
3 Answers 3
up vote 0 down vote accepted
Using IIS predefined rules for FTP and only apply
netsh advfirewall set global StatefulFtp enable
worked for me
share|improve this answer
Seems like a statefull filtering issue, i think you should enable this feature in your firewall.
share|improve this answer
Is FTP enabled for the private or public profile?
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62057 | Take the 2-minute tour ×
I have a test environment where I converted a disk to dynamic, shrunk a volume, and then expanded another all on the same disk. The result is that disk management in Windows Server 2008 R2 shows two separate partitions in the volume, Backup (G:) 6.21 GB NTFS and Backup (G:) 30.74 GB NTFS. Is this functioning as designed and what is the reason for this? In the past on a basic disk shrinking a volume and extending another would add the shrank and unformatted volume to the same "selection" for the disk, but now they are separate yet add up to the same amount of storage on the partition. Is this because the extended space on the original partition is logical in nature?
Disk Management screenshot
share|improve this question
I just noticed that in the list of volumes in the top that the two partitions don't add up to 36GB in the screenshot, but they did after I refreshed. The partitions are still separate though, in disk management. – Christopher Bruce Dec 10 '13 at 21:01
One of the sys admins at work said that it will join into the original volume on the disk if the unallocated space appears at the end of the sections to the right of Disk 1, which makes complete sense to me so I'm wondering why it just didn't go to the end. I'm assuming because the list of volumes to the right of a physical disk "reflect" where data is written on the physical drive, from the inside of the drive to the outside of the drive the further you go right. – Christopher Bruce Dec 10 '13 at 21:45
Your Answer
Browse other questions tagged or ask your own question. |
global_05_local_5_shard_00000035_processed.jsonl/62058 | Take the 2-minute tour ×
I need to get SSL certificates reissued for about 30 of my clients. I was hoping for an easy way to get the contents of their currents CSRs, pipe them in to openssl req -new ... and generate a whole new set of CSRs and new keys. I saw on the openssl man page that you can do openssl x509 -x509toreq -in cert.pem -out req.pem -signkey key.pem but this expects key.pem to already be created.
Can anyone help with a way to do this other than viewing the contents of each individual cert and copy-n-pasting in to the new request?
share|improve this question
1 Answer 1
up vote 5 down vote accepted
The point of the re-keying exercise is to make a new private/public key pair. The key.pem file referenced in that command is your new private key.
You can create it with the openssl genrsa 2048 > newkey.pem command. You'll probably want to substitute the modulus (key size) you're currently using rather than just blindly using 2048. You can get the modulus of the current cert, if you so choose, with the openssl x590 -noout -modulus -in current.crt command. Counting the number of hex digits after the "=" in the output, and multiply that count by 4 to get the number of bits.
Once you've generated a new private key then you can use the openssl x509 -x509toreq command to generate a new CSR.
I assumed you wouldn't be the only person looking for this and did some searching. I came with this very reasonable looking script to re-key and generate CSRs from the command-line.
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62059 | Take the 2-minute tour ×
If 32-bit processor support is disabled in Windows Server 2008 R2, how does the operating system run 32-bit programs?
share|improve this question
migrated from stackoverflow.com Sep 14 '09 at 17:32
This question came from our site for professional and enthusiast programmers.
The same way 64-bit installations of Windows 7 run 32-bit applications, I assume. – Joachim Sauer Sep 14 '09 at 15:03
FWIW 32 bit processor support isn't "disabled" the OS runs 32 bit applications just fine. – Jim B Sep 30 '12 at 18:00
2 Answers 2
x64 CPUs can actually run 32-bit (x86) code in parallel to 64-bit code. The WOW64 layer of Windows translates the system calls of 32-bit programs to the 64-bit system routines.
share|improve this answer
For more info, see en.wikipedia.org/wiki/WoW64. WOW64 does a good deal more than just translating 32-bit instructions into 64-bit ones; it's a very large and complex compatibility layer that interacts with a lot of different parts of the OS. – Zac B Sep 30 '12 at 17:21
The lack of 32-bit processor support simply means that Server 2008 R2 will not ship with a 32-bit edition, which means it requires a 64-bit processor to run.
It still runs 32-bit applications through the WOW64 compatibility layer.
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62060 | 101 reputation
Binayaka Chakraborty
I am an undergrad in Computer Science and Engineering, currently working as an Assistant Systems Engineer (trainee) at Tata Consultancy Services. I prefer to code in C and Python. My wish list contains, among other things, being proficient enough in PERL to start code-golfing in it.
P.S : Now trying to dirty my hands with JAVA also! :) |
global_05_local_5_shard_00000035_processed.jsonl/62076 |
Forgot your password?
US Government caught manipulating Wikipedia
Comments Filter:
• Because IP addresses, dug up from two years ago, are soooo reliable? I support Wikipedia, have argued for it in my college courses, but I have to take offense with this jab at the edits. If "perceived experts" can make changes to their field of "expertise", then someone from the HoR should be able to make edits to an article they probably have a bit more information on than a bunch of people who read only biased news on the Internet. Wikipedia, wanting to be taken as credible, will have to deal with thes
In space, no one can hear you fart. |
global_05_local_5_shard_00000035_processed.jsonl/62077 |
Forgot your password?
Comment: Prehistoric drone (Score 1) 144
by Bad Science (#41649251) Attached to: Seattle Police Want More Drones, Even While Two Sit Unused
My town is far too small to have a drone, but when I lived in downstate Illinois, a town called Quincy had a remote controlled helicopter with FLIR on it back in the early 2000's.They only used it twice that I'm aware of, and that was to find small children who got lost in cornfields.
|
global_05_local_5_shard_00000035_processed.jsonl/62078 | Follow Slashdot stories on Twitter
Forgot your password?
Comment: Re:Fuck Apple. (Score 1) 543
by CleverBoy (#41350387) Attached to: iPhone 5 Scorns Standards Promise To European Commission
Was that the idea, really? Read it again. We all apparently need to distinguish between what "THE" idea is, and what we think things she be in our own heads. Click the link after "Apple signed an agreement", and then read this part:
"Which is the agreed common interface? On the basis of the Micro-USB interface, the companies have agreed to develop a common specification in order to allow for full compatibility of chargers and mobile phones. These specifications have been translated in European standards. N.B.: The agreement allows for the use of an adaptor.
Sure... its "baby" steps, but there have been an ENORMOUS amount of proprietary charges out there. I've also gotten angry that even the ones that are USB compatible seem to modulate something about what they're doing so that the cable doesn't work with anything other than the charger that ships with the device (re: HP Touchpad, etc). Sometimes its a voltage limitation, but that's where standards help. Got a cable? Great... use any charger. That... is THE idea. Don't hault innovation by putting a constraint on how big, what shape, and how many pins the adapter should have. But, let's get everyone on board first with how you get power to the cable or adapter.
Comment: Re:No. (Score 1) 293
by CleverBoy (#33666308) Attached to: Australian Schools Go iPad-Crazy
Fractions of the price? It will be very, very awesome to see that. Competitors have had many, many months now. Are you going to wield carrier subsidized prices as evidence of this "fraction of the cost", or am I to believe from your comments that other manufacturers will actually offer comparable WiFi Android tablets? Also, will consumers need to hack Android Market onto these tablets, or will there be some other type of store available for app distribution? And what about Google's Chrome strategy? Questions, questions. Still. It would be awesome to see a sub-$500 capacitive multitouch tablet device with WiFi, running Android (or something really nice, other than iOS). Rational people have to admit Apple has really stumped them though.
Comment: Re:What I'd Like to Know (Score 1) 389
by CleverBoy (#32771878) Attached to: EU Plans To Make Apple, Adobe and Others Open Up
The techie community is a little "weird" on the notion of "OPEN". I'd have to read this news more closely, but on first blush, my first thoughts would turn to things like Numbers and Pages. But, ironically, when you look closely, BOTH Numbers and Pages are XML based bundles of media and not proprietary binaries like Adobe's FLA format, the specification for which it does not share. I imagine the MAIN concern, would be being STUCK using a certain piece of software because the file formats cannot be exchanged or read from. Ironically, Apple chose to use an "open" format like AAC, but then applied DRM on top of it to satisfy content holders. Same with its use of MP4 and ePub for sold content. Apple would just as soon NOT protect these formats, but the publishers require that they do. It's pretty clear Apple doesn't care about "lock-in". It simply happens. In the case of consumers, they care about people being able to download good, compelling content... which requires they offer DRM. In the case of developers, they want to create the least complicated environment for developing new technologies... so, people need to use their computers. They tried to put their solutions (like iTunes & Safari) on Windows, with mixed results (many Windows users dismiss these efforts). Allowing ANY old dev environment to create software for managed environments like iOS would be very messy. Much like Android's admirable, but generally haphazard and undependable results in the marketplace.
Comment: Re:News Flash: Apple limits app store! (Score 2, Insightful) 664
by CleverBoy (#31867084) Attached to: Apple Blocks Cartoonist From App Store
Before you runaway with your assumptions... let's review. Sticking with THIS STORY, you're saying that you do not believe it is possible for someone to sell an app on the Internet, that allows you to view offline images of political satire Apple does not wish to carry.
I think you're absolutely wrong, and that if the cartoonist in this story wanted to sell essentially gallery app online and allow customers to download the app to their iPhone for full-screen offline usage... they certainly could.
Apple certainly created this scenario whereby they could make an uprecedented opportunity for developers turn into a liability and indictment on free-speech. As our media convergence happens, I expect to see iPhone OS on more device categories. Until I see XBox, PS3, Nintendo, and others opening up for all comers and content... I think things are decidedly imbalanced in terms of the degree of judgement being paraded around.
Comment: Re:Not unusual (Score 1) 664
by CleverBoy (#31865918) Attached to: Apple Blocks Cartoonist From App Store
They'll certainly be OPEN to the criticisms, but I think those criticisms are without merit. Even as a corporation, Apple has every right to create the type of environment their customers expect. If customers want something more "open" they can switch to Android and download MiKandi. If MiKandi (or something else) really took off on the Android platform, Google would need to make a decision about it.
by CleverBoy (#31865754) Attached to: Apple Blocks Cartoonist From App Store
Exactly. Unfortunately, its "deplorable" that anyone thinks "their definition" of "perfectly acceptable" should overrule everyone else (especially the ones who bare responsibility for what they sell). It's clear Apple is less interested in "blocking" or "surpressing" Flore, and more interested in not arbitrarily enforcing the same clause in their developers agreement.
by CleverBoy (#31865694) Attached to: Apple Blocks Cartoonist From App Store
Your vague and open concept of censorship is very dangerous and ridiculous.
Here's my question. .. You open a medium sized family store, where your customers can buy a generous array of merchandise that you find to by morally edifying and provide significant value. You move about 30-40 items a day, and your store does over $5,000 in revenue every week. One day, someone comes to you asking you to carry their Porn magazine. They insist that they have an audience in your community, and show you their sales figures. You decline. Next week, they bring a number of protesters by your store to picket you for censoring them.
Who's free speech is being violated? Should EVERY store be forced to carry EVERY product anyone offers? Does the delivery mechanism matter (physical vs. digital)? If I was a neo-nazi, and advocated racism, should I be able to ensure my work is placed in Amazon, Barnes and Noble, or Shaws super market?
The store who wants to choose what they stock for customers, or the company selling adult magazines that feels you should stop blocking their product?
If Apple put a filter into Safari that prevented you from creating homepage buttons that link to adult material or controversial websites... and then blocked you from accessing certain urls, and actively analyzed your photo library and prevented you from viewing images it determined were obscene... THAT would be censorship. Without a doubt.
Choosing to only carry certain types of material in the App Store is editorial discretion.
Customers can actively lobby for Apple to provide this material in their stores, arguing that they are underestimating demand and overestimating the negative effect of carrying such products to their brand. But, that's about it. Arguing censorship is a red herring for forcing companies to abandon their brand equity in favor of some naive notion of "free society" that has never been true.
Comment: Re:12 year old product compares to iPad, and couri (Score 1) 293
by CleverBoy (#31857144) Attached to: The iPad vs. Microsoft's "Jupiter" Devices
@soppssa A lot of your commentary is riddled with inaccuracies, or else it would be interesting perspective. I mean, to just take one example... are you not aware of "free ware" in the App Store? Didn't Apple just introduce the iAd platform to help "keep free apps free"? There's a lot else I could comment on, but seriously? The less accurate your comments are, the more irrelevant they are over time when the facts bear out.
Comment: Re:Ok, where are they??? (Score 1) 584
by CleverBoy (#31491136) Attached to: Here Come the Linux iPad Clones
You, unfortunately, are the one warping history... so much you took my laundry list of innovative iPad features and somehow came up with "one feature". How bizarre.
iPad - 0.5", 1.5lbs. 9.7-inch screen (diagonally), 7.5" x 9.5" in dimension. LED backlit, multitouch capacitive display with IPS technology and oleophobic coating. Wireless 802.11a/b/g/n, Bluetooth 2.1 + EDR, built-in speaker & microphone, accelerometer /w screen-lock button, ambient light sensor, and digital compass. 10 hour battery life. Fully multi-touch-capable OS. If you find a device that matches or beats all of those specs for $499 or less... trust me, everyone will say "iPad what?"
"When the HP slate comes out--" Seriously, do you hear yourself? I'm looking forward to it to, but don't make any predictions, buddy. No specs. No price. No FCC. No hands-on. No pre-orders. I'm sorry, but when you join us in the real world, come join us for Adult Swim, the water is real nice this time of day.
I think HP is great (as I said in my previous post). Just because you hate one company so much, doesn't mean you need to have a psychotic break. For what it is, iPad is in a highly desireable class by itself. Months from now, that many not be the case... but, unfortunately, they said that about the iPhone too, and it took years for competitors to really start introducing phones that began to function in the same class (Droid / Nexus One).
Apple's huge gamble is NOT about "missing features". It's about creating a new class of device, and whether people will really want it. Trust me. In order to hit $499, it will be difficult for competitors not to ship a crappy plastic craptacular craplet with a pressure-sensitive screen and stylus. If you've been watching the hard knock-off work pumping out of China its been fascinating. I'm not sure I've seen Chinese companies have such a hard time knocking off anything so much as they've had with the iPhone and now the iPad. Painful.
If you have a moment. Watch some of the iPad hands-on videos circulating out there. I'm personally anxious to see how much abuse Apple has made this capable of taking and still keep up with users. The #1 irritation with current netbooks is sluggishness. The iPad's zippiness has earned uniform praise. On the useability front, that's absolutely HUGE.
by CleverBoy (#31461708) Attached to: Here Come the Linux iPad Clones
Hm. Does editing and presenting Powerpoint Presentations count? How about a multitouch painting program like Brushes that allows you to use layers and exports to Photoshop format? All that was in the January presentation, homie. Is it that you don't think anyone will follow Apple's lead and design fully multitouch productivity applications for the iPad form-factor or that you think no one minds using desktop software on a multitouch slate device?
Regarding the "Compaq TC1100"? Hm. I think these are the two most important qualifiers from the post you were responding to... "like this". A 2-hour battery life device with no capacitive touchscreen OR multitouch capability, no IPS screen technology, and as bulky and desktop OS centric as it was? Yes. As great as HP is, and I hope their newly announced slate gets it right when they release it... they're not shipping anything LIKE the iPad now... or in the past. --And don't get me wrong... most of that responsibility lies with Microsoft and the OS, not with the worthy attempts of the hardware manufacturers. But, there have been shortcomings on both sides that have finally led to new innovations rolling out this year.
If you find a device that matches or beats all of those specs for $499 or less... trust me, everyone will say "iPad what?" You can even find a comparable device for a little more and turn a lot of heads. It doesn't even need to sync with iTunes, allow music, video, and ebook purchases over-the-air. As long as it can play a 720p to 1080p movie and YouTube HD without studdering, we'll do just fine.
Only... you really can't.
Comment: Re:Tivoization (Score 1) 584
by CleverBoy (#31461500) Attached to: Here Come the Linux iPad Clones
Honestly. If you can't point to a comparable device to the iPad, I'm not sure why you would even post a video. The whole point is that the iPad is incorporating a bunch of NEW technology that devices of this size and price have not offered before. How do we know this? Well, just look at the new HP Slate device. It is still a prototype... along with the other slate form-factor devices mentioned at CES. Lenovo just released a new IdeaPad that is the FIRST netbook to have a capacitive touch screen. It's called the IdeaPad S10-3t. Engadget just did a hands-on and said it was very "meh", and the processor was dissappointingly sluggish. Also, by lacking the IPS screen technology of the iPad, the viewing angles truly sucked.
That said, bring on companies who are doing "BETTER" work than Apple. Choice is absolutely awesome. But, Apple is intentionally targeting specific solutions, and its not one-size-fits-all. Let's hope others produce bigger cheaper buckets, but the reason why Apple stuff costs a lot is:
#1.) They use high quality components (cheaper solutions usually value price over craftsmanship) and
#2.) They really try not to chase after the cut throat PC market by differentiating themselves (often they present a great bargain, but competitors undercut them in weeks-months, and they never reprice until they hit a new product cycle).
You can't get something for nothing. There's always a trade-off, even if you don't see it.
Comment: Re:What paradox (Score 1) 945
by CleverBoy (#30902532) Attached to: The Apple Paradox, Closed Culture & Free-Thinking Fans
Here's where you're experience is limited. Free thinking. The Mac was the FIRST of the two platforms to allow people to freely use two monitors and move windows back and forth between them... and to this very day, most of the creative software has significant limitations in Windows that aren't present in the Mac version for reasons that have everything to do with the way the software was originally programmed.
For instance. Photoshop. Let's go there. In Photoshop on my Mac, here's what I can do, that I can't do in Windows. I can stick one view of a photo or painting in one window (magnified), and create another real-time view of that same photo in another window de-magnified... so that as I work in the magnified view (taking up an entire monitor on fullscreen) I can see the demagnified view (fullscreen) in the next window. This also used to be true for Macromedia Director, but its true for Flash development by extension. Stick you "STAGE full screen on one monitor, and have your "score" in the other monitor. Windows is capable of this, but many software packages were written to use MDI and can't change now with so much built upon that foundation.
Wikipedia says this:
"The disadvantage of MDI usually cited is the lack of information about the currently opened windows: In order to view a list of windows open in MDI applications, the user typically has to select a specific menu ("window list" or something similar), if this option is available at all. With an SDI application, the window manager's task bar or task manager displays the currently opened windows. In recent years, applications have increasingly added "task-bars" and "tabs" to show the currently opened windows in an MDI application, which has made this criticism somewhat obsolete."
Unfortunately, the article writer completely ignores MDI's multiple monitor issues.
Ok, so... Mac's have an advantage most non-technical people tend to describe as "I feel more free with using my windows". Another Mac advantage, is that Apple has done a much better job standardizing its interface across the OS. Windows has been catching up to "Spotlight" in the last few years, but hitting a spacebar from the desktop and using "Quickview" to view any document type (as multiple developers submit readers into Apple's pluggable architecture) has been great. I can't say how many times I use the spacebar to "Quickview" items on my desktop. I've added more extensions to "Quickview" inside Zip files and others too. Also, on my Mac, I can hit a function key and have the selected text spoken to me. I can go to ANY Mac installation and set this feature up in seconds. I can also download an automated task that sends any read text to an iTunes audiobook. Which, is extremely great when I want to listen to something on the go that I have no time to read.
One huge feature present in the Mac OS, is the ability to send anything being printed out as a PDF. Whenever I'm remote, or I don't have a printer, or I'm just sending it to Staples for a blown-up version, I use this feature. Standard, fromany program. The "free" program I used to use on Windows was always a pain in the neck, and didn't work anywhere near as seemlessly as the Mac OS implementation that requires no third-party installation (with nag screens).
One of the things my wife's family can attest to, is that owning a Mac has created an explosion of creativity. Using GarageBand (free on every Mac), my young nephews have produced some extremely impressive music. At one point, one nephew wanted to put his music on YouTube with a slideshow, and I suggested he use iMovie (free on every Mac). I expected him to come back and ask me questions on how to use it, but in no time, he was just giving me the YouTube url to go to... and it looked very impressive. I'm also impressed with many other Leopard additions... for instance, the native "Preview" application has me scratching my head how making multiple-page PDFs could be so easy (and free, just dragging pdf pages into one document and arranging them).
Moreover, iPhoto on the Mac has really pressed me to think about being more creative. I took photos from my wedding, and put text to it (in iPhoto), and with one click, purchased a very inexpensive hard cover book version. I was taking a children's storybook writing course and showed the product to my teacher and he was deeply impressed that something like this could be produced so inexpensively ($25 I think for a 52 page hard cover bound book with full color and high quality print). When I finish my children's book, this will be the way I generate copies to send to publishers. The "Places" and "Faces" additions to iPhoto are simply icing on the cake for this great piece of software.
All the stuff I mentioned above... NATIVE. I don't have to install ANYTHING. The fact that Apple's MS Office equivalent is only $79 doesn't hurt either. If you're telling me Windows does all that out of the box. Great. But I think we all know it doesn't. You could go on and on with what Apple has done to help people using its OS, but I think that gives you a general idea.
I'm always looking to check out the state-of-the-art with Windows, but I started Mac, and then realized it was painfully out of day, back when it was OS 9. I jumped ship. I went from being a Windows 2000 fan, to a Windows XP guy... but like I do with Windows now... I kept an eye on the Mac. Once Apple had "fixed" things, and gotten their act together, I came back and got a lot of benefit. At my job, my boss was a PC guy. After a few years as a Windows shop, I convinced him to switch us all over to iMacs running VMware. He's said its been the single greatest decision he's ever made. Our productivity has shot WAY up. Security updates are quick and painless, networking is fairly seemless, and we're continually finding better ways to work. On the flip-side, we deal with lots of clients have are constantly in worlds of hurt on the PC platform. A lot of people make excuses for Windows when they should just keep an open mind about what constitutes "better". With Windows 7 (if you move the whole office over), maybe Microsoft has solved its problems. I can't say yet.
Comment: Re:And I demand a pony and some ice cream! (Score 1) 298
by CleverBoy (#30212212) Attached to: iPhone Owners Demand To See Apple Source Code
I think its very true that the iPhone was ONLY unique in that it was popular when it comes to issues like this. That's why I think the whole notion of suing them for source code is STUPID. Absolutely brain dead.
Moreover, I never understood the compulsion people had to SCREW-UP their firmware, and then cross their fingers that something they did wouldn't "brick" their phones if they tried a vanilla upgrade. Schiller even said at the time... hey, we can't test for conditions we don't support. If you go changing the software on the device, and when it gets upgraded... bad things happen... we're not responsible. In fact, if we see you've altered the device firmware, we can't even offer you support, and we'll likely blacklist your serial number if we see you in the store.
This type of crippling problem is only made more problematic due to the nature of baseband firmware, etc. Critics say Apple should go out of its way to install jailbreaks and unlocks, and do complete restores of the baseband firmware, etc. It's possible they do now, but when this first start? Come on. Mac users have had similar problems using "hacks" to the Mac OS and then trying to upgrade and having their computer go bonkers. We then have the easier option of booting on CD and reinstalling the OS. On the iPhone... not really that simple once you've started editing things you shouldn't be editing.
I will be amused to see how "rooting" on the Android and "jailbreaking" on the Palm Web OS will be like over time. It looks like Palm is so forlorn, they may not want to upset any apple carts by tightening their security (closing exploits) over time as Apple has done... or at least, don't have the resources to do much in that arena (they've seemingly even given up iTunes sync). At the end of the day, iPhone jailbreakers have managed to expose thousands of iPhone owners (not schooled in the ways of geekdom) to the platform's first Worm (focusing as many do on "features" and not security precautions). This is the same level of responsibility Android Market entrusts with its users by giving customers the option to vote yay or nay to "almost" any API request (as if the average consumer won't just brush past these notices).
Ultimately, I think people who color outside the lines for a platform like the iPhone will suffer for it, and it will be more about Murphy's Law or Karma, than something you can readily blame Apple for. I'm sure Apple has been sued for negligence on security far more often at this point... but those stories aren't as sexy. Actually, I guess they are... we just saw that "game stole my data" suit recently. Same thing Apple accused Google Voice of doing ironically.
Comment: Re:Ironic dichotomy of Apple's Family Values (Score 1) 841
by CleverBoy (#28761833) Attached to: Apple Update Means Palm Pre Can No Longer Sync With iTunes
I think anyone who sees Apple as having done ANYTHING untoward here, is more than a bit brainwashed. There was a time when what Palm did would be called a "hack"... except that its being perpetrated by a corporation that is in turn implicating millions of users into a relationship with Apple that Apple never intended to support. While one could argue that Apple did not have to explicitly close the "hole" Palm was slipping through (as described by DVD Jon), were I Apple, I certainly would have seen NO reason to leave it open. The tech support calls alone by users insisting Apple should be supporting them, polluting its support forums with glitch reports... its an added expense that they don't need.
For instance, there are a number of tools that interface with iTunes in ways Apple fully supports. Blackberry will be releasing one such tool for its users in September, and already has an Mp3 Store tool for Windows and Mac users that simply downloads music and adds it to iTunes in a supported method. For Palm to merely "pretend to be an iPod", is an unreasonable attempt by Palm to leverage Apple's platform, without actually having Apple's cooperation or support.
NO ONE is preventing Palm from releasing a syncing tool that works with iTunes. They're simply prioritizing their resources by spending their time and money elsewhere. Support Mac and PC media syncing? Nah, just pretend you're an iPod and tell our users to download iTunes. I can't count the number of times I've felt disenfranchised by Palm's choice not to make subsequent versions of Palm Desktop compatible with my current Palm device. If someone... like Sony, hacked their Cle firmware to allow it to support new desktop versions without Palm's consent, I'm sure they wouldn't be seen as "clever". They would be forcing Palm to support a larger hardware base.
It's a real trick to make anyone thing Palm is being "hurt" by being knocked off like the leech it was acting like.
Comment: Re:3rd party in background means malware... (Score 1) 166
by CleverBoy (#27572305) Attached to: iPhone Jailbreaking Still Going Strong
Well, here's an interesting problem. On the dismissive side, one could say that anyone who agrees with most of Apple's decisions are naive, foolish, or sycophants. In many cases, this is entirely true. However that doesn't automatically mean that Apple's own arguments hold no water or hidden promise, even IF you disagree with that logic.
Personally, I tend to think differently about Apple's strategy than many of the loud folk on Slashdot. The way I see it, Apple created a platform, and its actively attempting to have it function in a way they see leads to a long-term success. What that has come to mean, is that they are introducing things MUCH slower than the digerati wants them to. Erica Sadun was the first to point out that it seemed Apple's API was coming along very well, long before they exposed it to developers. You can either say: a.) Apple NEVER intended to allow 3rd party native apps. b.) Apple has always intended to allow 3rd party native apps, but needed to commit to a staged release.
The first time I got a peek behind the curtain was at a local "iPhone Tech Talk" here in Massachusetts. Apple showed a big wall of suggestions on the iPhone's direction, and welcomed any other suggestions. On the projector slide was a large "cloud" of virtually everything people had been clamoring for. But, its all being worked on piece by piece.
Its interesting how they prioritized enterprise support, even though they still claimed iPhone to be a consumer product. All the incremental steps I've seen have shown a lot of consideration and internal struggle, and I think... and this is just my personal view, that its needed.
Should Apple simply open the doors to every unintended consequence and hope that the consumer experience isn't ruined? Right now, Apple has the highest satisfaction rating across all smartphones. I think that's their ultimate goal. If something doesn't pass muster, it simply doesn't make it in... no matter what the consequences.
We saw Apple's disasterous Mobile Me launch. This frightened them away from notifications until they "got it right". From what I see, Apple will eventually allow "background" processes. But, I suspect that it may be done after Apple has gotten developers into utilizing the notification system... so that people do not create a "background" app if they do not need to.
I think the same is true for native applications. I think its great that Apple worked (and IS working) on its web app experience. That web app support came before native support I think, was brilliant, and it really set an excellent trend in websites upgrading their mobile sites to acknowledge more powerful mobile devices.
My criticism of Apple comes MORE from the question of WHY they don't open Apple TV up to 3rd party apps, USB device support, and cloud notification. That needs to come soon, because its clear they've been working on this as well.
This image of Apple putting "business interests" before "customer interests", is frankly self-serving at best and quite ignorant at worst. If Apple's consumer rankings and customer experience were being affected by a missing feature, you can be sure this feature would be at the top of Apple's priority. Instead, the only "missing" features are the ones that are desired, but less important than others that eventually made the grade.
I'm torn on background processes. The iPhone has encouraged people to burn through battery power faster than any other cellphone out there, even while employing an improving energy conservation system. Anyone remember when their Macs needed to be restarted with the shift key to leave background extensions off, because the system had become unstable or it wasn't clear what was making the machine slow?
WinMo, Android, and Blackberry can KEEP their BG app implementations. If theirs impresses me... I'll switch. It really HASN'T so far (although Android's and Pre's come close)... so, I'm not sure why some people act like its the bees knees. I just want to hand the iPhone to my mom or my wife and not have to explain anything so esoteric.
In space, no one can hear you fart. |
global_05_local_5_shard_00000035_processed.jsonl/62079 | Please create an account to participate in the Slashdot moderation system
Forgot your password?
Comment: Its all about virii and malware (Score 1) 362
by Viltvodlian Deoderan (#13100232) Attached to: Will You Stick with Apple, After the Switch?
As long as my young teenage friends' virii and other malware don't run on the intel-based mac boxen, I am still committed to my mac. In fact, I might be even more committed because...
switch to intel processors angers some mac loyalists.
mac market share is smaller
writing mac-specific virii is even less appealing
even fewer virii show up.
Sounds good to me.
Mike Jones
computer user since 1985.
mac user since 2004
In space, no one can hear you fart. |
global_05_local_5_shard_00000035_processed.jsonl/62081 | Little Willow [userpic]
Poetry Friday: There's a Kitten by Dallas Clayton
November 16th, 2012 (07:20 am)
Current Mood: thirsty
Current Song: Standing Tall by Bess Rogers
There's a kitten drinking milk
who knows your darkest thoughts,
An open window 'cross the way
who wonders 'bout you lots,
A stranger seven states from here
who sees you in his dreams,
Ghosts of friends who wander through
the moments in between.
- Dallas Clayton
Click here to see the illustrated poem at Dallas Clayton's website.
Check out my exclusive interview with Dallas Clayton.
View all posts tagged as Poetry Friday at Bildungsroman.
View the roundup schedule at A Year of Reading.
Learn more about Poetry Friday. |
global_05_local_5_shard_00000035_processed.jsonl/62099 | Take the 2-minute tour ×
can someone point me to the right content to learn about distributing Akka scala actors across several machines. I know that in the latest release of Akka there is location transparency. However, how does one go about deploying them and calling them?
share|improve this question
1 Answer 1
up vote 2 down vote accepted
It's all documented here: http://doc.akka.io/docs/akka/2.0.1/
When you configure your system according to the documentation you just have to start the application on each server and it should work.
akka {
remote {
transport = "akka.remote.netty.NettyRemoteTransport"
netty {
hostname = ""
port = 2552
actor {
provider = "akka.remote.RemoteActorRefProvider"
deployment {
/sampleActor {
remote = "akka://sampleActorSystem@"
These are the basic setting (taken from the docs) to enable remoting. This tells Akka to use remoting over the NettyRemoteTransport on host x port y and that /sampleActor runs on a remote system on the same machine but a different port.
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62100 | Take the 2-minute tour ×
I have a simple recursive method written in both Java and C#
public static String reverse(String letter) {
if (letter == "")
return "";
return letter.substring(letter.length() - 1)
+ reverse(letter.substring(0, letter.length() - 1));
public static string reverse(string letter)
if (letter == "")
return "";
return letter[letter.Length - 1]
+ reverse(letter.Substring(0, letter.Length - 1));
But the Java version fails at letter == "", it returns false even if the letter is empty. Why does the C# version work while the Java version fails?
share|improve this question
@Douglas: I've reopened the question and wiped the comments. Thanks for your help! – BoltClock Jun 18 '12 at 16:46
@BoltClock: Thanks! – Douglas Jun 18 '12 at 18:23
9 Answers 9
up vote 6 down vote accepted
In both C# and Java, the == operator checks for reference equality by default.
However, in .NET, the == operator is overloaded for the string type to check for value equality instead:
return string.Equals(a, b);
Another factor you need to take into account when using both languages is string interning, which can cause even reference equality to succeed for strings that might appear distinct. From MSDN (for C#):
String interning is applied across both Java and C#, and typically gives consistent results. For example, both languages evaluate string concatenation at compile-time, meaning that "a" + "b" is stored as "ab":
"ab" == "a" + "b" // Java: Gives true
object.ReferenceEquals("ab", "a" + "b") // C#: Gives true
However, when getting a zero-length substring, only C# returns the interned empty string:
"" == "abc".substring(0, 0) // Java: Gives false
object.ReferenceEquals("", "abc".Substring(0, 0)) // C#: Gives true
share|improve this answer
Because for objects the operator == test for equality of references. You must always use equals
share|improve this answer
Which one should I use to check empty string: letter.equals("") or letter.isEmpty() ? – Timeless Jun 16 '12 at 15:45
isEmpty() is self describtive, so I would go for it. – UmNyobe Jun 16 '12 at 15:46
I got it, thanks! So, == in java and c# are different on string, one compares reference, the other compares value. Am I right? – Timeless Jun 16 '12 at 15:49
is it expected, because they are 2 different languages... – UmNyobe Jun 16 '12 at 15:50
Make sure you over the null case then. Otherwise letter.anything will throw a NullPointerException ("something".equals(letter) is always preferable over letter.equals("something") for that reason). – Jay Jun 16 '12 at 15:52
A String is an object.
When you use ==, you are doing an identity comparison. This means that a == b is asking whether a and b are the same object.
The variable letter and the constant object "" are not the same object, so you get false.
Instead, you should be using:
This is asking if the letter object has a value equal to "", which is what you mean to ask.
share|improve this answer
Several ways to do this:
1. For comparing Strings in Java we have to use .equals() or .equalsIgnoreCase() methods. ... if (letter.equals("")) { ...
2. Checking the length tells whether or not this String length is 0. ... if (letter.length() == 0) { ...
3. There is am equivalent for (letter.length() == 0) in Java. That is .isEmpty() method.
Don't forgot to if (letter == null).
share|improve this answer
Some explanation as to why this is necessary would be useful – Dancrumb Jun 16 '12 at 15:44
Yeah, you are right. Give me a sec. – Tooraj Jun 16 '12 at 15:47
In java == compares whether two variables contain the same object. The constant "" will probably always be a different instance of String, even though both instances may contain the same string value.
If you want to compare the contents of the object then, in the case of String, you can do it like this:
share|improve this answer
In Java,
the == operator compares the values in the variables.
So, in case of primitive type variables it will work because the values in the variables are actual values of the primitives.
int a = 1;
int b = 2;
if(a == b) {
In the above it is doing what you think it's doing.
But, in case of reference type variables, the values in the variables are the references to the objects that they are pointing to.
So, if you want to do an identity check (i.e. you want to see if two different variables are pointing to the same object) then you have to use ==. Which will return false if the variables have reference to two different objects (the contents of the objects being same is not relevent).
But, if what you are trying to campare is the contents of the objects then you have to use equals method (but you have to make sure that the equals method has been implemented properly).
String a = "a";
String b = new String("a");
if(a == b) { //... identity check (returns false)
if(a.equals(b)) { //... comparing the contents (returns true)
share|improve this answer
'Cause you're comparing references, use String.equals or String.equalsIgnoreCase
share|improve this answer
You should use equals method like letter.equals("") since equality operator (==) ultimately compare reference of the object and not the value.
Also, for C# a better practice would be to use string.Empty instead "" like
if (letter == string.Empty)
share|improve this answer
== works for String objects((look for string pool java in google), but you should (and must) REALLY use .equals().
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62101 | Take the 2-minute tour ×
I wrote a unit test checking whether initial data is loaded correctly. However the Node.objects.all().count() always returns 0, thus it seems as the fixtures are not loaded at all. There is no output/error msg in the command line that fixtures are not loaded.
from core.models import Node
class NodeTableTestCase(unittest.TestCase):
fixtures = ['core/core_fixture.json']
def setUp(self):
print "nothing to prepare..."
def testFixture(self):
"""Check if initial data can be loaded correctly"""
self.assertEqual(Node.objects.all().count(), 14)
the fixture core_fixture.json contains 14 nodes and I'm using this fixture as a initial data load into the db using the following command:
python manage.py loaddata core/core_fixture.json
They are located in the folder I provided in the settings.py setting FIXTURE_DIRS.
share|improve this question
3 Answers 3
up vote 4 down vote accepted
Found the solution in another thread, answer from John Mee
# Import the TestCase from django.test:
# Bad: import unittest
# Bad: import django.utils.unittest
# Good: import django.test
from django.test import TestCase
class test_something(TestCase):
fixtures = ['one.json', 'two.json']
Doing this I got a proper error message, saying that foreign key is violated and I had to also include the fixtures for the app "auth". I exported the needed data with this command:
manage.py dumpdata auth.User auth.Group > usersandgroups.json
Using Unittest I got only the message that loading of fixture data failed, which was not very helpful.
Finally my working test looks like this:
from django.test import TestCase
class NodeTableTestCase2(TestCase):
fixtures = ['auth/auth_usersandgroups_fixture.json','core/core_fixture.json']
def setUp(self):
# Test definitions as before.
print "welcome in setup: while..nothing to setup.."
def testFixture2(self):
self.assertEqual(Node.objects.all().count(), 11)
share|improve this answer
Make sure you have your app listed in INSTALLED_APPS and that your app contains models.py file.
share|improve this answer
When loading fixtures in test cases, I don't think Django allows you to include the directory name. Try changing your fixtures setting to:
fixtures = ['core_fixture.json',]
You might have to change your FIXTURE_DIRS setting as well, to include the core directory.
If you run your tests in verbose mode, you will see the fixture files that Django attempts to load. This should help you debug your configuration.
python manage.py test -v 2
share|improve this answer
Thanks for the suggestions. I included in the FIXTURE_DIRS also the core directory. Whereas I still can load the fixtures with the loaddata command, I get the following error in running the tests: Check if initial data can be loaded correctly ... FAIL – Thomas Kremmel Jul 23 '12 at 7:31
It might be related to my model signals and some clashing of data. Whereas I do not execute the signal for the loaddata command with "if not kwargs.get('raw', False):", the signal is probably executed while loading the fixtures within a test set. will check it. – Thomas Kremmel Jul 23 '12 at 8:02
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62102 | Take the 2-minute tour ×
I know you can install apps on any server like your own or Heroku, etc. I am more interested in private apps (to which only your shop has access). Are they deployed on shopify itself? Or are they deployed like any other app? IF they are deployed on shopify's servers themselves, can a PUBLIC app be deployed there too?
share|improve this question
1 Answer 1
up vote 2 down vote accepted
Private apps are deployed the exact same way, the only difference is that you have a pregenerated permission for the shop so that access doesn't need to be authorized.
Typically private apps are used for one off scripts, not a real application that the shop owner would use (not always the case, but this is how I would recommend using them). If this is an app that needs to be hosted and the use will access I would suggest creating a partner account and making a 'real' app. There are no drawbacks and most of the tools (gems) are optimized for use with regular apps. It will also be easier to transition to an app for multiple stores in the future, if needed.
John Duff, API and Integrations team @ Shopify
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62103 | Take the 2-minute tour ×
Exception is :
Operation failed String was not recognized as a valid DateTime.
Here is the jQuery reference
<script src="Resource/JS/jquery-1.7.2.min.js" type="text/javascript"></script>
<link href="Resource/css/jquery-ui-1.8.21.custom.css" rel="stylesheet" type="text/css" />
<script src="Resource/JS/jquery-ui-1.8.21.custom.min.js" type="text/javascript"></script>
The function to pop-up DatePicker:
function showDatePicker(datepicker) {
var id = "#" + datepicker;
$(function () {
The input component:
<input id="tbActionDate" type="text" runat="server" class="datePickerControl" clientidmode="Static" onclick="showDatePicker('tbActionDate');" />
And I have tried to do it in this way: $(id).datepicker("option", "dateFormat", "mm/dd/yy"); It doesn't work.
share|improve this question
@pimvdb thx, I've changed the content and title. Please help. – Franva Aug 19 '12 at 12:00
2 Answers 2
You can use latest version of jQuery UI datepicker which has the following useful functions
share|improve this answer
tried, but doesn't work. thx anyway. – Franva Aug 19 '12 at 13:32
not helpful. I did check all of them. Not work for me. Thx anyway. – Franva Aug 20 '12 at 3:41
up vote 0 down vote accepted
I finally figured it out. It wasn't because of the jQuery DatePicker, but the Convert.ToDateTime() in .NET cannot handle the date format (mm/dd/yyyy).
So I wrote my own method to convert it to the right object of DateTime.
Do you guys have any solutions to convert this date format to an object of DateTime in C#?
I've tried to use the CultureInfo to get the local culture object and used it to be a parameter in the Convert.ToDateTime() method, but it doesn't work.
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62104 | Take the 2-minute tour ×
Possible Duplicate:
Big O when adding together different routines
What does O(n) + O(log(n)) reduce to? My guess is O(n) but can not give a rigorous reasoning.
I understand O(n) + O(1) should reduce to O(n) since O(1) is just a constant.
share|improve this question
marked as duplicate by woodchips, Yuck, Nishant, PHeiberg, Hristo Iliev Oct 18 '12 at 8:58
Shouldn't you do your own homework? – user85109 Oct 18 '12 at 3:34
@Yuck Sorry I did not find out that post.. Thanks – Will Best Oct 18 '12 at 3:43
3 Answers 3
up vote 5 down vote accepted
Well since O( f(n) ) + O( g(n) ) = O ( f(n) + g(n) ) We are simply trying to calculate an f(n) such that f(n) > n + log(n)
Since as n grows sufficiently log(n) < n we can say that f(n) > 2n > n + log(n)
Therefore O(f(n)) = O(2n) = O(n)
In a more general sense, O( f(n) ) + O( g(n) ) = O( f(n) ) if c*f(n)>g(n) for some constant c. Why? Because in this case f(n) will "dominate" our algorithm and dictate its time complexity.
share|improve this answer
the answer is O(n). O(log n) is less than O(n). so their addition sums the maximum value that is O(n).
share|improve this answer
Order is always reduced to higher order terms. I can give you intuitive reasoning. Suppose you have O(n + n^2). Then which part would play more important role in run time? n or n^2. Obviously n^2. Because where there n^2 you won't notice effect of n when n is increased or decreased.
As example,
let n = 100, then n^2 = 10000
means n is 0.99% and n^2 is 99.01% of total running time.
What would you consider for runtime?
if n is increased then this difference is clearer.
I think you understand now,
share|improve this answer
|
global_05_local_5_shard_00000035_processed.jsonl/62105 | Take the 2-minute tour ×
I am new in flurry analytics. Need to add flurry analytics in my Iphone Application. I didn't get any site to explain flurry analytics for titanium Iphone.
If any one done this already.. please help me..
share|improve this question
1 Answer 1
up vote 1 down vote accepted
I found appcelerator-flurry-module-for-iphone-ipad-and-android for both apple and android product.
and this is a module for flurry for titanium-android at github.
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62106 | Take the 2-minute tour ×
Hello Facebook debugger tool is returning a 502 error on my url
but returns a 200 code for:
why is this?
share|improve this question
Do you remember what was the problem here? I'm currently having similar problem and I don't have any idea why. :) – Pavel Petrov Nov 15 '14 at 16:55
Your Answer
Browse other questions tagged or ask your own question. |
global_05_local_5_shard_00000035_processed.jsonl/62107 | Take the 2-minute tour ×
So I'd like to read Facebook's locales page and store it in a datastore for use by our app running on Google's App Engine.
I create a URL like this:
URL facebookXmlUrl = new URL( "https://www.facebook.com/translations/FacebookLocales.xml" );
I create my unmarshaller like this:
JAXBContext jaxb = JAXBContext.newInstance( FacebookLocales.class );
Unmarshaller unmarshaller = jaxb.createUnmarshaller();
(Note: The FacebookLocales class pretty mirrors their XML and marshalls to look just like it.)
When I actually try the unmarshall:
FacebookLocales fbLocales = ( FacebookLocales ) unmarshaller.unmarshal( facebookXmlUrl );
I get the following error (even/esp. on the local, development app engine):
java.security.AccessControlException: access denied ("javax.xml.bind.JAXBPermission" "setDatatypeConverter")
I've Googled my little heart out but haven't found anything to help.
share|improve this question
Have you tried the unmarshal method on facebookXmlUrl.openStream()? Can you open the stream? I read somewhere that GAE is a little stringent on opening URLs. – Maarten Oct 2 '13 at 12:31
It is also possible your FacebookLocales has an error. Does it have any private methods? – Maarten Oct 2 '13 at 12:42
Your Answer
Browse other questions tagged or ask your own question. |
global_05_local_5_shard_00000035_processed.jsonl/62108 | Take the 2-minute tour ×
I have a sharekit implementation where everything works fine, but if there is no account set for facebook, upon pressing the settings button, the actionsheet is just dismissed and the user is returned to the app, not to the settings page in system prefs.
How do I get the settings button to send the user to the settings page?
the code i use to init the action sheet:
NSURL *url = [NSURL URLWithString:@"http://test"];
SHKItem *item = [SHKItem URL:url title:@"test"];
SHKActionSheet *actionSheet = [SHKActionSheet actionSheetForItem:item];
// Display the action sheet
[actionSheet showFromTabBar:self.tabBarController.tabBar];
share|improve this question
I'm not trying to be rude, but I'm lost, what exactly is the question here? Is this a statement or you actually need help with something? – XCode Monkey Mar 18 '13 at 0:32
oh sorry. just edited the question to include a question – stackOverFlew Mar 18 '13 at 0:34
Can you please post the code you have issues with? That way we all can try to contribute and offer help. – XCode Monkey Mar 18 '13 at 0:37
done. i mean there isnt much code really – stackOverFlew Mar 18 '13 at 0:46
You probably need an if statement to push the user to the view that you want or to the another view if there is no password or connection. This may already be obvious to you, but I'm away from Mac and have no way of posting a example code for you. Hopefully one of the guys will answer that for you before I get back to my Mac. – XCode Monkey Mar 18 '13 at 0:52
1 Answer 1
up vote 0 down vote accepted
This is a known, unresolved issue with ShareKit. You could submit a pull request to fix it, or work around it by checking SLComposeViewController:
if([SLComposeViewController isAvailableForServiceType:SLServiceTypeFacebook]) {
// show ShareKit
} else {
// tell them to get Facebook
before displaying ShareKit. Of course, that would make it so users without Facebook (like Twitter-only folks) couldn't use ShareKit. On the other hand, you could switch over to Apple's Share Sheets, or write your own, but those also have their disadvantages. Kind of a catch-22.
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62109 | Take the 2-minute tour ×
I have also seen some of the application on iTunes who are capable of getting the users call history like:-https://itunes.apple.com/us/app/callog/id327883585?mt=8
share|improve this question
Did you read how the app you link to works?. – Wain Jun 8 '13 at 9:37
take a look stackoverflow.com/questions/10057395/… – Nitin Gohel Jun 8 '13 at 9:49
WonderShare... It's no personal, but that's not a very good name to mention. – El Tomato Jun 8 '13 at 9:51
Hey, Any solution yet? – OzBoz Dec 15 '14 at 15:43
2 Answers 2
Check this Tutorial : Accessing iPhone Call History
Note : It works only with iOS 4.
share|improve this answer
@SandeepDhama: Mystery Continues... :) – Bhavin Jun 8 '13 at 10:10
@SandeepDhama: Have you solved the issue ? – Bhavin Jun 27 '13 at 14:02
not yet. That is in my holding list. – Sandeep Dhama Jun 28 '13 at 7:17
If you got any possible solution for this question than please share your answer here. Many Thanks – Build Success Oct 29 '13 at 9:54
Dr. Fone tackles iOS data recovery in two ways: Either from the iOS device itself, or—in case you've lost the device—from an iTunes backup. To recover data from a compatible iOS device, you launch Dr. Fone on your PC and connect your device via USB. In order to recover deleted data, Dr. Fone needs your device in DFU mode (Device Firmware Update), which prevents the OS from loading. To accomplish, the software leads you through the process—which simply involves pressing a combination of buttons—as painstakingly as possible. It even shows an on-screen countdown clock, ticking off the seconds that you're required to hold the buttons.
You always want to own full version of Wondershare Dr.Fone for iOS, right? If so, Don't skip this great chance to help you save 30% OFF Wondershare Dr.Fone for iOS at IfCoupons.
share|improve this answer
In the new version, it reads iCloud backups too, I wonder how it's possible. – Luca Molteni Jul 8 '14 at 10:10
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62110 | Take the 2-minute tour ×
How do I paste HTML to the clipboard so that it is recognized as HTML in applications such as Open Office and MS Word? It is possible when using gtkhtml or gecko if you've already rendered it, but I need a straight GTK+ solution.
share|improve this question
1 Answer 1
up vote 4 down vote accepted
You call gtk_clipboard_set_with_data or gtk_clipboard_set_with_owner, passing a GtkTargetEntry with "text/html" as the value for the target field.
It's good practice to also provide "UTF8_STRING" and "STRING" targets for applications that don't support HTML.
Here's an example of some code that does this: GEdit HTML clipboard plugin.
share|improve this answer
This worked great! Thank you very much. – Matthew Talbert Jan 3 '10 at 3:09
That last link to "GEdit HTML clipboard plugin" seems to be broken. – Craig McQueen Aug 6 '14 at 1:18
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62111 | Take the 2-minute tour ×
If I've got a textarea like this:
<textarea id="foo" cols=80 wrap="hard"></textarea>
Is there any way, using JavaScript, to grab the hard-wrapped text?
I've tried the obvious $("#foo").val(), but that returns the unwrapped text.
For example, if the textarea is:
<textarea id="bar" cols=5 wrap="hard">a b c d e f</textarea>
The browser will wrap the text to:
a b c
d e f
And I was some way to grab that text – "a b c\nd e f" (which, because of wrap=hard, is the text that would be sent if the <textarea… was submitted in a <form…).
share|improve this question
Did any of these answers help you? – George W Bush Jul 23 '12 at 16:16
5 Answers 5
Since the formatting is done by the browser on submit, your best bet will be to have the browser submit, but to a location of your choice such as an iframe where you can extract the formatted text from the form or url parameters.
<script type="text/javascript">
function getURLParameter(qs, name)
var regex = new RegExp( pattern );
var res = regex.exec( qs );
if (res == null)
return "";
return res[1];
function getHardWrappedText(){
if (top.location.href !== window.location.href) return;
var frm_url = document.getElementById('ifrm').contentDocument.URL;
if (frm_url.indexOf('http') < 0) return;
var text = unescape(getURLParameter(document.getElementById('ifrm').contentDocument.URL, 'bar')).replace(/\+/g,' ');
<form name="main" method="get" target="ifrm">
<textarea id="bar" name="bar" cols=5 wrap="hard">a b c d e f</textarea>
<input type="submit">
<iframe id="ifrm" name="ifrm" onload="getHardWrappedText();" style="display:none;"></iframe>
share|improve this answer
This works indeed, but it requires a server roundtrip to load the IFrame. – David Nouls Jan 7 '13 at 13:16
I'm assuming that you know the dimensions of the text area (if not, you can probably just get them from the DOM).
Use this to split the string. Go to the xth char (in your example the 5th), and see if the next char is a space. If so (or if there are no spaces in the preceding segment), this is where you split. Otherwise, you find the preceding space and split there.
Wrap this in a function and you could add in some recursion to find the nth line.
share|improve this answer
That's trie, it is possible to write my own text wrapping algorithm… But the difficulty with that is that it most likely won't match the browser's algorithm, and mass confusion will abound (eg, the browser might wrap "aaa.bb" to "aaa.\nbb", while my algorithm might wrap it to "aaa.b\nb"). – David Wolever Jan 27 '10 at 14:58
It may end up, though, that this is the way to go… In which case I could add some sort of a 'preview', which would (in my case) be able to reduce confusion. – David Wolever Jan 27 '10 at 14:59
I'm afraid that I will need exactly the same. The problem though is that the wordwrap depends on where the user is inserting text in the textarea. It does not always wrap the way you would expect (at least not in IE8/9). – David Nouls Jan 7 '13 at 13:17
Edit 2
The only solution that i can propose is to create a hidden iframe with a name, and target the form submit to that frame. Then the iframe can communicate with its parent throught the window.parent and provide the returned text (which will include the new lines as the form has been normally submitted..)
of course the submit could be called by a script if you wished ..
the following i have strike-through since it does not apply to this case.. a generic way to do this would be
alert( $('<div/>').append($('#foo').clone()).html() );
what this does is
Create a new div (in memory)
clone the desired element #foo and append it to the div we created
extract the inner html (but since we are dealing with the div that we wrapped around our element, we get the elements html ..
obviously i misunderstood .. to get the inside text of an element use the .text() method so
share|improve this answer
Sorry, this doesn't work: t = $("<textarea cols='5' wrap='hard'>a b c d e f g h i</textarea>"); console.log($('<div/>').append(t.clone()).html()) produces "<textarea cols="5" wrap="hard">a b c d e f g h i</textarea>", not "a b c\nd e f\ng h i" (which is what I'm after) – David Wolever Jan 26 '10 at 16:29
misunderstood .. do not be so harsh :D, look at the edit section in my answer .. – Gaby aka G. Petrioli Jan 26 '10 at 16:34
Sorry, .text() doesn't work either: $("<textarea cols='5' wrap='hard'>a b c d e f g h</textarea>").text() ==> "a b c d e f g h" :( – David Wolever Jan 26 '10 at 16:39
You want to automatically create newlines where the text wraps (due to the size of the textarea) ? – Gaby aka G. Petrioli Jan 26 '10 at 16:44
Yea - see my edits to the question. – David Wolever Jan 26 '10 at 16:48
I don't think it's possible out of the box You could wrap the text yourself using textarea's cols value. From the HTML point of view the text in textarea is not wrapped. It's just how it's being displayed for you to be able to read it better.
PS. If you are using jQuery you should use $('#foo') instead of $('[id=foo]') selector as it's much faster (and shorter).
share|improve this answer
The wrapping is mostly for display purposes… Except when wrap=hard - then newlines are added to the text when it is submitted (and they are added "properly" - ie, the browser knows where it has created the "soft" line breaks, so it just converts those to hard breaks). – David Wolever Jan 26 '10 at 16:24
(which is the problem with wrapping the text myself - I'd run the risk of wrapping it differently from the browser, causing mass panic and confusion) – David Wolever Jan 26 '10 at 16:25
(and thanks for the jQuery tip) – David Wolever Jan 26 '10 at 16:26
It's a bit of a hack, but you could create a script on the server that prints out whatever is posted to it in some format (JSON, plain text, whatever suits you) and post your textarea to that script via AJAX whenever you need to get the contents of it.
share|improve this answer
I'd thought about that… But I didn't think it was possible to call the submit method on a form without actually reloading the page (and calling form.submit is the only way I know to hard-wrap the text). Is there some other way to submit a form without a page reload? – David Wolever Jan 26 '10 at 16:55
Using an Ajax call will not reload the page .. that is the whole idea of Ajax.. Check out jQuery's Ajax feature .. – Gaby aka G. Petrioli Jan 26 '10 at 17:01
Yes, but using an Ajax won't cause the text to wrap either. For example, try using Firebug to set wrap=hard on this form: jquery.malsup.com/form then try posting it - the posted text won't include line breaks. – David Wolever Jan 26 '10 at 17:37
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62112 | Take the 2-minute tour ×
I'm looking to generate documentation for a custom JSF 2 composite component library. The composite components are not referenced in any faces-config.xml file, but rather the .xhtml files for the composite components are stored in META-INF/resources and use the new composite:interface tag to define the interface.
For JSP tag libraries, documentation can be generated using https://taglibrarydoc.dev.java.net/ and I'm wondering if there is something similar for my JSF 2 composite component library.
share|improve this question
1 Answer 1
rich-faces component development kit provides documentation annotations http://community.jboss.org/wiki/RichFacesCDKannotations
share|improve this answer
That's not really applicable for JSF 2 composite components though. – digitaljoel Feb 24 '11 at 16:29
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62113 | Take the 2-minute tour ×
Are there any plugins for Google Chrome to make REST calls? Like the Poster plugin for firefox.
I have tried chrome-poster, but it seems it still is on early development
share|improve this question
7 Answers 7
up vote 6 down vote accepted
Did you try this extension: REST Console?
share|improve this answer
You should also give a try to Postman REST Client (Packaged App), which is a fork from Simple REST Client. (There is also a lite version that runs in an ordinary Chrome tab and will suggest upgrading to the Packaged App version).
This extension is also open sourced on github.
Here is a short of its features:
• Compact layout
• HTTP requests with file upload support
• Formatted API responses for JSON and XML
• HATEOS support
• Image previews
• Request history
• Basic Auth and OAuth 1.0 helpers
• Autocomplete for URL and header values
• Key/value editors for adding parameters or header values. Works for URL parameters too.
• Use environment variables to easily shift between settings. Great for testing production, staging or local setups.
• Keyboard shortcuts to maximize your productivity
share|improve this answer
postman rocks....... – Tamil Vendhan Kanagaraju Jan 18 '14 at 4:58
You should try: cREST Client.
share|improve this answer
I would wholeheartedly recommend Advanced Rest Client: https://chrome.google.com/webstore/detail/hgmloofddffdnphfgcellkdfbfbjeloo
It was the only one that made POSTing form content really easy.
share|improve this answer
And here is one more: Dev Http Client
I tried a lot of them and this is the best one I've used so far.
share|improve this answer
I used this DHC Rest API client. We can pass the session values as well as param in very well manner.
share|improve this answer
I this extension: Simple REST Client.
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62114 | Take the 2-minute tour ×
I want to test certain underlying services using PowerMock, but it is complicated.
I would like to get your suggestion
public interface Service{
public void someMethod(){
public ServiceClient implements Service {
public MyServiceClient {
public Service getService(){
return service;
I have written a ServiceUtil which uses MyServiceClient to call and gets the services.
public class ServiceUtil {
private static service s = MyServiceClient.getService();
public void updateService(){
// do some thing with service
Now I want to test ServiceUtil method - updateService. How do I do it?
share|improve this question
1 Answer 1
What you probably want is to inject a mock version of the service. This can be done like this:
service mockService = Mockito.mock(service.class);
Whitebox.setInternalState(serviceutil.class, mockService);
You can read more about bypassing encapsulation here: http://code.google.com/p/powermock/wiki/BypassEncapsulation
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62115 | Take the 2-minute tour ×
I could not find any info on the web and stackoverflow on how to get the first matching character subsequence from a Lucene Document.
ATM i'm using this logic to retrieve results from Lucene:
Document doc=searcher.doc(hit.doc);
String text=doc.get("text");
if (text.length() > 80){
results.add(new SearchResult(doc.get("url"), doc.get("title"), text));
As you can see this just takes the first 80 chars of the searched text and wraps it together with some other data into a SearchResult object.
Is it somehow possible to retrieve the first or even highest scoring subsequence of the text which actually contains any searchterms?
share|improve this question
2 Answers 2
up vote 2 down vote accepted
You need Lucene Highlighter. Here and here you can find some more info on it.
share|improve this answer
Also note that there are several Highlighter implementations for both Lucene 2.x and Lucene 3.0. Take the one that fits your task better. – ffriend Oct 20 '10 at 14:41
It is called hit highlighter. This is probably a duplicate of another highlighter question
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62116 | Take the 2-minute tour ×
I have seen several Questions comparing different ECommerce CMS's:
1. Prestashop compared to Zen-Cart and osCommerce
2. Magento or Prestashop, which is better?
3. Best php/ruby/python e-commerce solution
I was hoping to get some people to weigh in with which they prefer for a relatively small E-shop. I am now primarily looking at PrestaShop and Shopify. I really like that Shopify does the hosting, has quality service, and is simple to understand and theme. However PrestaShop is free and seems to be able to do just as much if not more than Shopify.
I have decided that Magento is too clunky for the project, and have read that many other solutions (osCommerce, ZenCart, OpenCart) are outdated, buggy, or just inferior.
Thank you!
share|improve this question
closed as not constructive by Ken White, NFC guy, Don Roby, Peter Majeed, kapa Dec 22 '12 at 23:30
You should try this module : prestadget.com , you can follow your store from your iPhone and Android Phone, very useful ! – Thomas Decaux Mar 7 '12 at 19:22
2 Answers 2
up vote 22 down vote accepted
"Free" in the e-commerce industry usually works out to a few thousand dollars a month of real cost. E-commerce stores are powering the livelihood of businesses, so there is no way to go with a value hosting company. Additionally security is a huge concern so updates are incredibly important. So this leaves you with a server configuration of at least 2 servers setup in HA environment and a part time operations person performing the maintenance. So once you ensure that you can keep your site up you then have to invest into things that most people don't think off:
• Email service that guarantees delivery
• CDN, your store needs to be fast or you won't sell.
• Fraud protection services ($$$)
Anyways, you get all of the above for 30 bucks a month from a hosted service.
Full disclosure: I'm founder of Shopify. I used to host my own e-commerce store before I started Shopify. 95% of our customers recover the monthly Shopify bill in the first few hours of the first day of each month.
share|improve this answer
you're a founder of Shopify? Or did you mean fonder? In any case thank you very much for the excellent advice. – Zach L Jan 16 '11 at 21:04
Founder and CEO :-) You are welcome. – Tobias Lütke Jan 18 '11 at 21:06
A "few thousand dollars a month"? Sounds like sales-speak to me. Care to elaborate on your numbers? – aefxx Mar 30 '13 at 13:28
@aefxx it's not sales-speak. I'm a developer who wanted to set up his store in Drupal, spent months fighting the bloody thing, gave up and surrendered to Shopify. Boy. I should have done that ages and ages earlier. It's true what he says, now within a day I recoup my shopify fees. It's a no brainer. I hate Drupal and the braindead community it has grown around it now. It was hell and a chore. After switching to Shopify I actually have fun! I do not have the long hours of stress any more. I have long hours of fun doing business and making profit, not fighting with Drupal's tantrums. Ugh. – a20 Dec 26 '14 at 18:07
I love open source and what it stands for. However 98% of open source software have horrible UI & UX. I suppose that's probably because real designers don't really have tools to contribute to open source and it's the engineers doing the UI / UX. It's really horrible though. One doesn't realise the stress of horrible UI / UX until one has a chance to use a well thought out and designed product. Any techie who disagrees with this statement better not have had an iPhone or Macbook ever. – a20 Dec 26 '14 at 18:13
The prices is not the main difference between Shopify and PrestaShop. Talking about the scope- I think both will suit you.
1. Technical Level
The choice of hosted Shopify or open-source PrestaShop may depends on the level of technical skills. Without doubt it is easier to maintain your store with hosted shopping cart which supplies you with regular updates and takes care of bug fixes.
PrestaShop administration is quite intuitive as well. It has the interface with numerous themes, modern designs and easily guided catalogues is attractive for the customers. It goes without saying, that such details help you raise your traffic rates.
1. Performance
Non-hosted installed platforms provide you with control over the speed. As the store is located on your server, you can maintain the necessary speed of connection. Unfortunately, this is not the case with hosted solutions. So, using Shopify you can face issues with low connection speed.
share|improve this answer
-> A hosted cart has an array of programmers & customer service people available to you for $x per mth, far cheaper than the hours you will put into it to debug issues and figure out stuff. -> Performance is better on self-hosted platforms?? Are you kidding? If you're not an expert on database caching & slave / master setups, cdn setup, high availabilty configuration etc etc, you should leave it to the huge team of system admins the hosted platform offers you for $x per mth. You want to run a business or spend time with a spanner inside your server? shakes head in disbelief – a20 Dec 26 '14 at 18:20
|
global_05_local_5_shard_00000035_processed.jsonl/62117 | Take the 2-minute tour ×
I have Facebook Connect Implemented on the IPhone I have a ASP.NET MVC "API" site that I want the IPhone client to connect and login to. This enable me to then connect the facebook user to the internal asp.net memberbership provider.
How would I connect the two end points?
I am not sure a secure way to authenticate the user after they have successfully logged in via the IPhone. The parameters that usually provided by the Facebook Cookie like sig_request..etc... is not available on the IPhone.
Similar to which was never answered: iPhone app using facebook connect login to authenticate with web server possible?
share|improve this question
Your Answer
Browse other questions tagged or ask your own question. |
global_05_local_5_shard_00000035_processed.jsonl/62118 | Take the 2-minute tour ×
I have a string which is lost forever. The only thing I have about it is some magic hash number. Now I have a new string, which could be similar or equal to the lost one. I need to find out how close it is.
Integer savedHash = 352736;
String newText = "this is new string";
if (Math.abs(hash(newText) - savedHash) < 100) {
// wow, they are very close!
Are there any algorithms for this purpose?
ps. The length of the text is not fixed.
pps. I know how usual hash codes work. I'm interested in an algorithm that will work differently, giving me the functionality explained above.
ppps. In a very simple scenario this hash() method would look like:
public int hash(String txt) {
return txt.length();
share|improve this question
Thumbs up for "wow, they're very close!" – mauris Mar 29 '11 at 16:08
The purpose of a has code is to give a good distribution, which means that hash codes for strings that are very close (should) tend to be quite different. – Ingo Mar 29 '11 at 16:10
This isn't possible. That's the whole idea behind a secure hash (or any security-intended algorithm) is that a small change in the plain text should result in a large change in the cipher text. If you could do what you're suggesting then it would be much easier to figure out what the plaintext is from a given hash. The idea is that you can't easily go backwards without a bruteforce-style attack – Chris Thompson Mar 29 '11 at 16:12
What are the restrictions on the hash code? Does it have to be less than a certain length? Otherwise, the "hash code" of the string itself would work. Also, what's your definition of "very close"? do small insertions and deletions mean it's still close (because most of the content is shifted) or completely different (since all the characters at each index are different)? – Paul Mar 29 '11 at 16:23
@0x69 I'm not hacking anything, I need to develop the algorithm, which will generate hash numbers. – yegor256 Mar 30 '11 at 5:53
10 Answers 10
up vote 4 down vote accepted
Standard hashing will not work in this case since close hash values do not imply close strings. In fact, most hash functions are designed to give close strings very different values, so as to create a random distribution of hash values for any given set of input strings.
If you had access to both strings, then you could use some kind of string distance function, such as Levenshtein distance. This calculates the edit distance between two strings, or the number of edits required to transform one to the other.
In this case however, the best approach might be to use some kind of fuzzy hashing technique. That way you don't have to store the original string, and can still get some measure of similarity.
share|improve this answer
Then the OP is out of luck, unless he manages to recover the original string (with high probability) by finding a string that hashes exactly to the original value. – Avi Mar 29 '11 at 16:17
+1 Based on discussion I suspect the quesion is more about edit distance than hashing. – Steve Haigh Mar 29 '11 at 16:26
"levenshtein" requires two strings, while I have just one (see the question). – yegor256 Mar 29 '11 at 16:33
Fuzzy Hashing is the answer, many thanks for the hint! Would be nice if you can edit your answer to remove irrelevant text. Thanks again. – yegor256 Mar 30 '11 at 9:55
Thanks, @yegor256. I edited the answer to just describe the different approaches, and why fuzzy hashing works here. – Avi Mar 30 '11 at 10:15
No, this isn't going to work. The similarity of a hash bears no relation to the similarity of the original strings. In fact, it is entirely possible for 2 different strings to have the same hash. All you can say for sure is that if the hashes are different the strings were different.
[Edited in light of comment, possibility of collision is of course very real]
Edit for clarification:
If you only have the hash of the old string then there is no way you are going to find the original value of that string. There is no algorithm that would tell you if the hashes of 2 different strings represented strings that were close, and even if there was it wouldn't help. Even if you find a string that has an exact hash match with your old string there is still no way you would know if it was your original string, as any number of strings can produce the same hash value. In fact, there is a vast* number of strings that can produce the same hash.
[In theory this vast number is actually infinite but on any real storage system you can't generate an infinte number of strings. In any case your chance of matching an unknown string via this approach is very slim unless your hashes are large in relation to the input string, and even then you will need to brute force your way through every possible string]
share|improve this answer
Yes, usual hashCode() won't work here. I'm after some other algorithm... – yegor256 Mar 29 '11 at 16:11
The possibility isn't just theoretical, but +1 :-). – Mark Peters Mar 29 '11 at 16:11
Hmm, true. It depends on the hashing algorithm, but for real world problems you would hope that hash collisions are unlikely. – Steve Haigh Mar 29 '11 at 16:13
@yegor256 - I'm afraid there isn't any way to get from the hash to the orignal string short of trying every string and looking for a matching hash, and even then you won't know for sure. – Steve Haigh Mar 29 '11 at 16:14
@Steve, I appreciate your answer, but it's out of scope. I'm not interested in regular hash algorithm. I'm interested to find a new algorithm. Are you aware of any? – yegor256 Mar 29 '11 at 16:14
If the hashes don't match then the strings are different.
If the hashes match then the strings are probably the same.
There is nothing else you can infer from the hash value.
share|improve this answer
As others have pointed out, with a typical hash algorithm, it just doesn't work like that at all.
There are, however, a few people who've worked out algorithms that are at least somewhat similar to that. For one example, there's a company called "Xpriori" that has some hashing (or least hash-like) algorithms that allow things like that. They'll let you compare for degree of similarity, or (for example) let you combine hashes so hash(a) + hash(b) == hash(a+b) (for some definition of +, not just simple addition of the numbers). Like with most hashes, there's always a possibility of collision, so you have some chance of a false positive (but by picking the hash size, you can set that chance to an arbitrarily small value).
As such, if you're dealing with existing data, you're probably out of luck. If you're creating something new, and want capabilities on this order, it is possible -- though trying to do it on your own is seriously non-trivial.
share|improve this answer
could you please give a link to Xpriori algorithm? – yegor256 Mar 30 '11 at 6:00
xpriori.com/sites/default/files/… is at least something of a start. – Jerry Coffin Mar 30 '11 at 6:17
No. Hashes are designed so that minor variations in the input string cause huge differences in the resulting hashe. This is very useful for dictionary implementations, as well as verifying the integrity of a file (a single changed bit will cause a completely different hash). So no, it's not some kind of thing you can ever use as an inequality comparison.
share|improve this answer
If the hashCodes are different it cannot be the same String, however many Strings can have the same hashCode().
Depending on the nature of the Strings, doing a plain comparision could be more efficent than comparing the hashCode() it has to inspect and perform a calculation on every character, whereas comparision can store early e.g. if the length is different or as soon as it see a different character.
share|improve this answer
the question is not about hashCode(), please review the updated question again – yegor256 Mar 29 '11 at 16:57
The whole point of hashing algoythims is to maximise the numebr of bits which changes for a single bit being different in the source information. i.e. ideally "A" and "B" would result in a hashCode which has half the bits the same and half being different. i.e. the mapping is effectively random. The concept of closeness is only useful in determining if you have a poor hashing algo. Is this what you are trying to determine? A simple way is to ^ xor the bits and count the number set (ie different), 16 (half) is optmial. – Peter Lawrey Mar 29 '11 at 17:24
Any good hashing algorithm will by definition NEVER yield similar hashes for similar arguments. Otherwise, it would be too easy to crack. If the hashed value of "aaaa" looks similar to "aaab", then that is a poor hash. I have racked ones like that before without too much difficulty (fun puzzle to solve!) But you never know maybe your hash algorithm is poor. An idea what it is?
If you have time, you can just brute force this solution by hashing every possible word. Not elegant, but possible. Easier if you know the length of the original word as well.
If it is a standard has algorithm, like MD5, you can find websites that already have large mappings of source and hash, and get the answer that way. Try http://hashcrack.com/
I used this website successfully after one of our devs left and I needed to recover a password.
share|improve this answer
You can treat the string as a really big number, but that's about the extent of your abilities in the general situation. If you have a specific problem domain, you may be able to compress a representation of the string to something smaller without losses, but still it will not be very useful.
For example, if you are working with individual words, you can use soundex to compare how similar two words will sound...
The best you can do with traditional hash codes will be to compare two strings for equality vs likely inequality. False positives are possible, but there will be no false negatives. You cannot compare for similarity this way, though.
share|improve this answer
soundex won't work, since I don't have the first string. The only thing I have is its "hash code". – yegor256 Mar 29 '11 at 16:22
a normal hash code changes a lot when the object changes a bit. that's made to distinguish different objects and don't care how resembling they could be. therefore the answer is no
share|improve this answer
Well, seems you want not real hash of string, but some fingerprint of string. Because you want it to be of 32-bits one way could be:
Calculate Pearson correlation coefficient between first and second half of string (if string length is odd number of chars, then add some padding) and store this number as 32-bit floating point number. But I'm not sure how reliable this method will be.
Here is C example code (un-optimized) which implements this idea (a little bit modified):
#include <stdio.h>
#include <stdlib.h>
#include <math.h>
#include <string.h>
float mean(char *str) {
char *x;
float sum = 0.0;
for(x=str; *x!='\0'; x++) {
sum += (float) *x;
return sum/strlen(str);
float stddev(char *str) {
char *x;
float sum = 0.0;
float u = mean(str);
sum += ((float)*x - u)*((float)*x - u);
return sqrt(sum/strlen(str));
float covariance(char *str1, char *str2) {
int i;
int im = fmin(strlen(str1),strlen(str2));
float sum = 0.0;
float u1 = mean(str1);
float u2 = mean(str2);
for(i=0; i<im; i++) {
sum += ((float)str1[i] - u1)*((float)str2[i] - u2);
return sum/im;
float correlation(char *str1, char *str2) {
float cov = covariance(str1,str2);
float dev1 = stddev(str1);
float dev2 = stddev(str2);
return cov/(dev1*dev2);
float string_fingerprint(char *str) {
int len = strlen(str);
char *rot = (char*) malloc((len+1)*sizeof(char));
int i;
// rotate string by CHAR_COUNT/2
rot[i] = str[(i+len/2)%len];
rot[len] = '\0';
// now calculate correlation between original and rotated strings
float corr = correlation(str,rot);
return corr;
int main() {
char string1[] = "The quick brown fox jumps over the lazy dog";
char string2[] = "The slow brown fox jumps over the crazy dog";
float f1 = string_fingerprint(string1);
float f2 = string_fingerprint(string2);
if (fabs(f1 - f2) < 0.2) {
printf("wow, they are very close!\n");
return 0;
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62119 | Take the 2-minute tour ×
I am trying to use the Android Facebook sdk to make a post on the user's friend's wall. I have successfully posted to the user's own news feed using similar calls. With my current code, the post to a friend works without a hitch, except that the message is blank. None of the attachments seem to work. It shows up as a completely blank post on the friend's wall.
This is the code I am using:
private void publishChallengeToFriend() {
String description =
"I challenge you to " + m_challenge.getTitle() + "!" +
" I finished this challenge with a score of " + getScore() + "."
+ " Can you beat that?";
Bundle params = new Bundle();
params.putString(Facebook.TOKEN, m_facebook.getAccessToken());
params.putString("message", "");
params.putString("name", "You have been challenged!");
params.putString("caption", "Mobile Challenges");
params.putString("description", description);
m_facebook.request(getFriendId() + "/feed",params, "POST");
catch (Exception e){
Log.d("TAG", "Facebook Error: " + e.getLocalizedMessage());
I have already authorized the user, and I know that works because I can post to the user's own feed. I am aware of the github issue #166 at https://github.com/facebook/facebook-android-sdk/issues/166. I have tried using putByteArray() for each of the attachments by calling getBytes() on each string I would like to transmit. This still shows up as a blank post on the friend's wall.
I am open to using any method of posting on the friend's wall, it doesn't have to be a facebook request. I have also used asyncfacebookrunner.request() and have had the same problem. Ideally, I would like to use a dialog to show this, but I have no idea how to use the dialog() function for friend posts. I use that for status updates without a hitch, however.
Thank you!
share|improve this question
2 Answers 2
up vote 3 down vote accepted
You are putting the message as the description, try moving it to the message parameter, the "description" parameter is a description of a link that you put in the post and will appear under the link. It wont show on your post because your not linking anything! You can see my method for doing it below:
protected void postToWall(String userID){
try {
if (isSession()) {
Bundle params = new Bundle();
response.equals("false")) {
Log.v("Error", "Blank response");
} else {
// no logged in, so relogin
Log.d(TAG, "sessionNOTValid, relogin");
mFacebook.authorize(this, PERMS, new LoginDialogListener());
}catch(Exception e){
this is the result so you can see where the different parameters appear on the post:
enter image description here
share|improve this answer
Thanks! You are definitely on to something, I tried making the message my description instead of the description tag and then the message part was displayed! However, all of the other parameters (name, caption, and even description and link if I define one) still don't show up. All of those parameters worked when I publish to the user's own feed. I want more than just a simple message post on the friend's wall. Any ideas what is going on? – mattgmg1990 Jun 26 '11 at 14:44
added more code to my answer plus a pic of what it looks like on the wall so you can see how it looks – Kenny Jun 26 '11 at 16:21
That was very helpful! I followed exactly what you did and it worked! It is so weird, I think the only thing that changed was the order that I added the attachments to the bundle. – mattgmg1990 Jun 26 '11 at 17:51
It shouldn't really matter what order you add things to the bundle because when facebook processes the request, they search for the key then extract the value. But the main thing is you got it working! – Kenny Jun 26 '11 at 18:05
That's what I thought...but that's all I changed...Weird! But thanks again for all your help, you're right, it's working! – mattgmg1990 Jun 26 '11 at 18:37
Check out my answer here: Post on user's friends facebook wall through android application
share|improve this answer
Thank you! I had looked at that answer several times before I posted this. I have used almost identical code for my application, but, as I stated in a comment on the answer above, none of the parameters show up except the message. I want to use title and caption to make it nicer to look at. Any ideas? – mattgmg1990 Jun 26 '11 at 14:46
Make sure getFriendId() returns what you expect, and what is m_facebook? Have you tried using async runner? – Kon Jun 26 '11 at 15:29
Yes, I know getFriendId() is working since the blank post I am experiencing goes to the correct user. I have tried using async runner and I get the same results :(. Somehow my attachments aren't being sent properly i guess... – mattgmg1990 Jun 26 '11 at 15:39
Hmm.. very strange.. Is it also blank if you post to your own wall? Have you tried that? Also, this may be a dumb suggestion, but try to put strings into bundle in same order as I did in my answer. Also, have you tried not leaving message blank? Pass something in besides an empty string. – Kon Jun 26 '11 at 15:50
Thank you! That did it, the order in which I added the parameters to the bundle made all the difference! I have no idea why this would be but that did it. Thanks for the suggestion. – mattgmg1990 Jun 26 '11 at 17:52
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62120 | Take the 2-minute tour ×
I would like to extend a shared c library (dylib) on Mac OS X by adding a function. Let's call the function const char *get_string(void). Here is my approach:
I created a new shared library containing the get_string(void) function and liked it against the library I wanted to extend. A library wrapper so to speak. So far so good. The next step would be to link an application against my new extended library but the problem is that the extended library does only export the symbol _get_string but not those symbols of the original library. That's why linking against the "extended" library (instead of the original library) produces a lot of unresolved symbol warnings/error.
Is there any way to export all those symbols of the original library (there are a lot) or is there a better approach to solve the problem. Basically I just want to extend an existing library. BTW I have access to the original library's source but I can't just recompile it.
Thanks in advance!
share|improve this question
1 Answer 1
up vote 2 down vote accepted
How about this option to ld:
This is the same as the -lx but specifies that the all symbols in library x should
be available to clients linking to the library being created. This was previously
done with a separate -sub_library option.
share|improve this answer
Tanks, sounds good, but it does not work for me. I use Xcode and set the property "Other Linker Flags" to "-L/usr/local/lib -reexport-lparent" where libparent.dylib should be extended. It seems that libtool is not passing on the reexport flag. The parent library is not even linked against. Do you have any suggestions? – Benjamin Jun 30 '11 at 18:14
The sub_library flag is recognized but nm still does not list the symbols of the parent library – Benjamin Jun 30 '11 at 18:23
The sub_library flag works perfectly. – Benjamin Jun 30 '11 at 18:35
sorry, I avoid xcode like the plague. It's command-lines for me. – bmargulies Jun 30 '11 at 23:21
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62121 | Take the 2-minute tour ×
There are a few different ports of Box2D for JavaScript. Which one is the best?
• Box2DJS - "converted from Box2DFlashAS3_1.4.3.1 in an automatic manner"
• Box2Dflash 2.0 ported to JavaScript - "one big nasty hack that just happens to work"
• box2dweb - "a port of Box2DFlash 2.1a to JavaScript. I developed an ActionScript 3 -to- JavaScript converter to generate the code"
• HBehrens/box2d.js - "a JavaScript Version of Box2D 2.1a" (Added Nov 21, 2011)
• kripken/box2d.js - "a direct port of the Box2D 2D physics engine to JavaScript, using Emscripten" (Added Sep 24, 2013)
Any ideas which version http://chrome.angrybirds.com/ uses, if any?
share|improve this question
6 Answers 6
up vote 57 down vote accepted
Note to readers!
This question was originally asked and answered in 2011, but I'll do my best to keep it up to date!
Here's what I've found:
• kripken/box2d.js is a port of Box2D using Emscripten and works well. Start with this.
• Box2DJS is a port of Box2DFlash box2dweb is a port of version 2.1a.
• Box2DJS works "as a CommonJS module without any modifications at all" [1]
• Box2DJS "not up-to-date and you have to import a big amount of JavaScript files in every project" [2]
• box2dweb is contained in a single file [2]
• box2dweb is "a much newer port and has a lot fewer issues" than Box2DJS [3]. However, switching might introduce new issues [4].
• Box2DJS depends on Prototype but box2dweb does not [5]
• Seth Ladd has promoted box2dweb with examples on his blog [6]
• Nobody seems to be using the third alternative.
There's also a similar discussion on gamedev.stackexchange.com.
I'd say that the winner is kripken/box2d.js.
share|improve this answer
box2d is not as up to date as box2dweb. a lot of core classes are missing from the minified file. – dopatraman Jan 22 '13 at 20:55
I personally used box2dJS in one project porting my existing iOS box2D game. What I found with the version difference is that some code from iOS works doesn't work in the JS version and the dev halt. After that, I used half a week to change all the code to box2dweb and every thing work fine as same as my iOS box2d game. So the version difference matters a lot. – Makzan Aug 2 '13 at 9:01
the emscripten port is pretty cool, but the last time i used it i found it to be buggy (including random freezes), and very hard to debug, due to the nature of emscripten. – bunnyhero Apr 12 at 19:04
This question and its best answer are from 2011. One recent new option is box2.js, an Emscripten translation of the C++ code to Javascript. As of August 2013 it's more up-to-date than the other ports I've found, and the demos seem to work.
share|improve this answer
Thanks @Nelson, I added it to the question – a paid nerd Sep 24 '13 at 15:30
I did't use any of these libs, but box2d.js and "fun with VTables" doesn't sound cool. – cubuspl42 Dec 12 '13 at 12:09
Probably the best place to keep up to date with Box2D JavaScript ports is the official forum: http://box2d.org/forum/viewforum.php?f=22
JSBox2D looks like a good start.
I would definitely have a look into Matter.js, which seems very well built and very quick. I'm going down this path. http://brm.io/matter-js
share|improve this answer
How has Matter.js worked for you? – David Y. Stephenson Jan 29 at 20:12
LiquidFun (With JS Bindings)
LiquidFun is, at the time I'm posting this, the most recent port to JS. It has all the features of Box2D and liquid physics features. It's ported using emscripten, so performance is decent.
share|improve this answer
Box2DWeb supports most of the API from the original C++ Box2D except chain shapes. :/
It is the most widely used Javascript Box2D. If you need the API documentation for Box2DWeb, check out Box2DFlash. http://www.box2dflash.org/docs/2.1a/reference/
Box2DWeb is auto generated from Box2DFlash using a compiler. So the API is the same.
I doubt Box2DWeb will get any update in the future anymore as Box2DFlash has shown no activities anymore. You can see the author's rational on why he decided not to write a direct Box2D --> Box2DWeb port.
share|improve this answer
The next contender for Box2D so far is PhysicsJS. wellcaffeinated.net/PhysicsJS/ (my 2cents) – Vennsoh Jul 29 '14 at 1:20
Google has released a plugin, LiquidFun (Go google) during I/O 2014. You will need Box2D v2.3 to use it. It is pretty awesome. – Vennsoh Jul 29 '14 at 1:38
Box2d-html5 is also another box2d port including Google's LiquidFun) and active update.
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62122 | Take the 2-minute tour ×
I have a high score database for a game that tracks every play in a variety of worlds. What I want to do is find out some statistics on the plays, and then find where each world "ranks" according to each other world (sorted by number of times played).
So far I've got all my statistics working fine, however I've run into a problem finding the ranking of each world.
I'm also pretty sure doing this in three separate queries is probably a very slow way to go about this and could probably be improved.
I have a timestamp column (not used here) and the "world" column indexed in the DB schema. Here's a selection of my source:
function getStast($worldName) {
// ## First find the number of wins and some other data:
$query = "SELECT COUNT(*) AS total,
AVG(score) AS avgScore,
SUM(score) AS totalScore
FROM highscores
WHERE world = '$worldName'
AND victory = 1";
$win = $row['total'];
// ## Then find the number of losses:
$query = "SELECT COUNT(*) AS total
FROM highscores
WHERE world = '$worldName'
AND victory = 0";
$loss = $row['total'];
$total = $win + $loss;
// ## Then find the rank (this is the broken bit):
$query="SELECT world, count(*) AS total
FROM highscores
WHERE total > $total
GROUP BY world
ORDER BY total DESC";
$rank = $row['total']+1;
// ## ... Then output things.
I believe the specific line of code that's failing me is in the RANK query,
WHERE total > $total
Is it not working because it can't accept a calculated total as an argument in the WHERE clause?
Finally, is there a more efficient way to calculate all of this in a single SQL query?
share|improve this question
1 Answer 1
up vote 4 down vote accepted
I think you might want to use 'having total > $total'?
SELECT world, count(*) AS total
FROM highscores
GROUP BY world
having total > $total
share|improve this answer
or does that run into the same issue? – Louis Apr 29 '09 at 1:17
"Invalid SQL Syntax" errors on both "where" and "having" :( – Andy Moore Apr 29 '09 at 1:47
revised, is that what you were using? – Louis Apr 29 '09 at 3:24
Aha! I had the "HAVING" statement before the "Group by". Woops! – Andy Moore Apr 29 '09 at 9:18
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62123 | Take the 2-minute tour ×
The scenario is around calling an external SSL SOAP web service from within Mirth. The web service is requires an SSL/TLS connection along with a client certificate.
The intention is to use the built-in SOAP Sender Destination to call the remote secure web service, and somehow include that client certificate.
I understand that you first need to install that client certificate into the Java runtime. This may be within the Java runtime's certificate store or the Jetty certstore.
The platform:
• Windows 2003 SP2
• Mirth 1.8
• Java jre1.5.0_09
Question: what configuration steps (Mirth, JRE certificate stores, etc.) would you suggest to successfully have a Mirth SOAP Sender include a client certificate (*.cer) when calling a web service secured by SSL?
share|improve this question
3 Answers 3
The Java runtime, or more specifically, the Sun JSSE provider, will present a client certificate if some system properties are set. You can read details in the JSSE Reference Guide, but the important properties are javax.net.ssl.keyStore and javax.net.ssl.keyStorePassword.
There are a few drawbacks to this approach. First, setting the key store password as a system property makes it accessible to any code running in that process—although this can be controlled if a SecurityManager is installed. Second, these settings will be used for any SSL sockets created through the "default" SSLContext. If you need different credentials for different endpoints, you'll need a Mirth-specific solution.
No starting point was specified in the question, but if starting from scratch, the easiest approach is to create a new Java Key Store ("JKS" format) and generate a new key pair and a CSR. After sending the CSR to the CA and getting a certificate back, import it into the same key store. That key store is ready to use.
If a certificate is already available, it is likely to be in a stored with its corresponding private key in PKCS #12 format (.p12 or .pfx file). These can be used directly by a Java application, but the javax.net.ssl.keyStoreType property will need to be set to "PKCS12"
share|improve this answer
up vote 1 down vote accepted
Mirth 1.8 cannot send a client cert when calling a SOAP web service.
share|improve this answer
I'm late a bit here for this but actually there is a possibility that it could. By sending a few config parameters to the JVM you could get the underlying SOAP engine to switch to HTTPs and provide the proper certificate.
refer to this question for details on which parameters to set for configuring the VM
you will notice there are quite a few things to take care of. Normally HTTPs and client authentication should "just work" once you configured your certificates appropriately. BUT there are some servers out there that are not so friendly to B2B style clients so you have to watch out.
Using JDK 6_21 and a few tweaks with the certificate I was able to get one of them servers to behave but it was long and painful on our side for something that takes about 15 minutes to configure properly on the server.
here is another question that address this very issue (client side authentication towards unfriendly servers).
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62126 | Keeping You in Stitches
Keeping You In Stitches
Published Tuesday, August 24, 2004
click photo to enlarge
To the Aleut peoples, Alaska was Alyeska, meaning the great land. Visitors today are likely to agree: Alaska is truly one of the worlds special places. Those who visit cant help marveling at the exotic wildlife, magnificent mountains, glacier-carved valleys and steep, rocky coastline. And after days on board you encounter one wonder after another.
The sheer size of Alaska is difficult to imagine: It is one-fifth the size of the rest of the United States. Alaska is large in other ways. It has six distinct climatic regions, the tallest mountains, the biggest glaciers, the most plentiful fishing and the wildest nature preserves on the continent. The first settlers in Alaska arrived at least 20,000 years ago, when hunters from Asia followed large game over the Bering Strait land bridge into North America.
By the time the first Europeans arrived, in the mid-1700s, they found several diverse cultures living in Alaska. Whalers inhabited the treeless tundra along the coast, and nomadic caribou hunters roamed the forested interior along the Yukon River. Alaskas panhandle was home to members of the Tingit, Tsimshian and Haida groups, who lived in a lush coastal environment. Alaska was made a U.S. territory in 1912, but statehood wasnt granted until 1959. Then, in 1968, the discovery of oil at Prudhoe Bay sparked a new rush to Alaska. The construction of the Alaska Pipeline from the Beaufort Sea to the Gulf of Alaska in the 1970s brought new wealth, new jobs and new environmental concerns. Even now, the debate continues as to how much of Alaskas pristine wilderness should be developed.
Most recently, the focus has been on oil development in the Arctic National Wildlife Refuge, declining populations of marine mammals in the Bering Sea, and the impact from a massive increase in cruise-ship travel and other tourist activity, especially in southeastern Alaska.
From Sunday to Tuesday we traveled toward the Hubbard Glacier. Many lectures were made available and I enjoyed attending them. They shared great tidbits of information such as: Alaskas record low temperature is -80F in 1971 at Prospect Creek Camp north of Fairbanks, and the record high is 100F recorded in 1915 at Fort Yukon in the interior. The male-to-female ratio across the state has often been quite imbalanced. As a result a saying began among Alaskan women that in Alaska the odds are good, but the goods are odd. This joke of course has failed to wither with time. Juneau is the only U.S. state capital that cannot be reached by highway. Alaska is actually the closest state to Europe.
Tuesday afternoon we approached Hubbard Glacier west of Skagway. Its vastness may be difficult to perceive from the deck of a ship. It is 76 miles long with a cliff face 6 miles wide. It is the longest tidewater glacier in North America. The beautiful color of blue shimmered off the ice and because the day was clear and sunny, the view was fabulous. Thunder sounded, as a result of pieces of ice breaking away.
As you can see in the photo, the glacier mixed with the misty fjords. As the sun was setting in the western sky, it was time to get dressed for dinner. So what exactly do you wear on board such a magnificent ship? Stay tuned next week.
Read more Sally Cowan online
StAugustine AllAccess
Trending this week:
|
global_05_local_5_shard_00000035_processed.jsonl/62146 | Take the 2-minute tour ×
Will a new style 4 in 3 modulecoolermaster stack (STB-3T4-E3-GP, a drive bay converter to convert 3x 5.25" bays into 4x 3.5" bays) fit an older style stacker810Stacker 810 case - in particular does anyone have first-hand experience of this?
share|improve this question
no direct experience, but the drive-bay converter you've linked to claims to be ATX compatible, so it should work. i don't think ATX cases have changed all that much. – quack quixote Jun 7 '10 at 20:04
It should in theory but Coolermaster fairly conspicuously don't mention the 810 in the product docs. 810s have removable drive blanks in the front of the case that specifically fit into the fascia and the grill on the front of the STB module might possibly not fit. I can't find any discussion in forums that says anything definitive either way about whether this will fit. In the worst case I could just buy an 830. They're not all that expensive. – ConcernedOfTunbridgeWells Jun 8 '10 at 9:37
1 Answer 1
up vote 2 down vote accepted
I know this is a super old question, but I thought this may help someone who may still be looking for the answer (like I was). I just took the risk and bought one of the new cages. I can confirm that the STB-3T4-E3-GP works just fine in the Stacker 810. You just attach the black rails that came with the 810 to the sides of the drive cage and it slides in/locks into the tower just like the standard drive cage that the case shipped with. It's also flush with the front bezel.
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62147 | Take the 2-minute tour ×
I have a 450MB PST file (Outlook 2003 backup file) saved from a PC before it crashed.
I would like to break it up into its components i.e.
1. Save attachments to folders on my PC
2. Paste text emails into a word processor
3. ... etc.
However I don't want to buy Office Professional 2003 or later solely for importing the PST into Outlook 2003+. Outlook Express cannot import PST files - only Outlook can do this properly.
Is there another way to access the 450MB file?
share|improve this question
2 Answers 2
Wil's suggestion is probably the best way to go. However, if you're looking for something more robust for a network environment, "Kernel for Exchange Server" will let you look at .pst files as well as the raw .edb files from an Exchange server. You can browse individual items and export them as well.
share|improve this answer
Thank you both! I’ll have a look at your suggestions. It’s just for one PC. – Nobler Aug 25 '10 at 13:55
There are third party tools for opening PST files - however I have not seen any good (free) ones that I could recommend.
Alternatively, you could download Thunderbird - a free email client by the Mozilla team, which can import PST files.
The best solution is probably to download a trial of Office, then you can use the full Outlook to do what you want.
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62148 | Take the 2-minute tour ×
I'm having a bit of bother with Flash Player 10.1 on Mac OS X 10.6.4 using Safari 5.0.2 and Firefox 3.6.10. In the last couple of days, every time I visit GMail with the Flash plug-in installed in /Library/Internet Plug-ins, the browser freezes, beachballs and has to be force-quit. Removing the Flash plug-in cures the problem, and having only the Flash plug-in installed will trigger the problem, so it's not a conflict. The same problem seems to occur with the BBC iPlayer, though some websites that use Flash (YouTube, for example) seem to work just fine.
I've tried un-installing and re-installing Flash, clearing caches in Safari, downloading Firefox to see if it's broken there too, repairing permissions and all the other placebos I know, but nothing has made any difference. I'm suspicious of it being a corrupt setting or cache file that's knocking Flash over (it works fine on all the other similarly-configured Macs I use) - where does it keep its user files? Other troubleshooting suggestions are most welcome.
[edit] Thank you to all those who've suggested ClickToPlugin and similar, however it's not really a solution - while I've no idea why GMail wants Flash, I'm experiencing this problem with sites that require Flash, such as the iPlayer
share|improve this question
3 Answers 3
up vote 1 down vote accepted
I had the same issue, what happened was I downloaded or had automatically loaded a plugin to download flash objects - well it killed performance and in some cases flash files failed to load. I tried down grading Flash - removed Shockwave and still slow. Found out the plug-in was a killer. (ran process monitor and saw proc name - killed, but respawned, google'd it to get path - removed; rebooted; and performance worked.)
I also ended up:
1. Get a copy of Snow Leopard Cache Cleaner (see apple site for latest - FREE).
2. Run "Repair Permissions", "Run maintenance scripts", and "Clear System Log Archives" under Maintain.
3. Run Optimize Files and Optimize File Cache under optimize.
4. Check the resources under the Login Items. Remove as appropriate.
5. Resetting your Mac's PRAM and NVRAM (see: link text )
ALSO - as mentioned -- do get ClickToPlugin -- stops flash from loading, you control what gets loaded when.
share|improve this answer
I had to do a deep cache clean, but SLCC sorted it in the end. – Scott Oct 5 '10 at 18:37
My first suggestion to anyone with Flash is to install ClickToPlugin. This will prevent Flash from auto-loading, and you can load it on-demand by clicking the frame where Flash would normally appear. This works on Safari, and there is an add-on for Firefox like it - I believe it is called FlashBlock.
As per your problem, the easiest way to find preference files is to open a new finder window to your hard drive. Type in the search box, "Flash". This will start showing results. Now, above the results and below the toolbar, there is a new set of options to refine the search. Add a filter to include the system files. Remove anything in a "cache" folder or with a ".plist" extension.
share|improve this answer
You might try testing out Google Chrome. Google recently partnered up with Adobe and now ships the flash player as a part of their browser, so you might see if the version shipped with Chrome works on your system.
share|improve this answer
I'd rather not change browser unless I have to. I use Safari elsewhere. Plus, I quite like Safari. :-) – Scott Oct 4 '10 at 21:59
@Scott I wasn't intending to plug; If it does work, you could always look into extracting the plugin that Chrome uses and trying to install it into Safari – Darth Android Oct 4 '10 at 22:07
It's the same version that Safari can use - however the Flash plug-in is updated with Chrome instead of via Apple Security Updates or updating it yourself manually. – Chealion Oct 5 '10 at 6:50
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62149 | Take the 2-minute tour ×
I have an older Dell E520 that I've been using as a sort of development server. Over the last 6 months I've had two hard drives and 2 DVD drives fail in this box.
Is this just really bad luck? Is this box just cursed, or could there be something else causing the failures? Maybe a bad power supply?
share|improve this question
Either a bad PSU or really nasty AC supplying it – Moab Dec 31 '10 at 2:48
1 Answer 1
up vote 2 down vote accepted
Bad power supply, or even bad power to the system, causing over- or under-volting.
Replace your power supply, and run off clean power (you can get a reasonable UPS for a reasonable price).
share|improve this answer
Incidentally, I refer to undervolting as "brownouts" and get funny looks. What does everyone else call that? – user3463 Dec 31 '10 at 2:48
I've always said "brownout", but undervolting is more obvious, I guess. Probably the safest option. – jcrawfordor Dec 31 '10 at 4:18
I guess it's just semantics, and funny looks aren't always a bad thing. At least you get noticed :-) – user3463 Dec 31 '10 at 4:19
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62150 | Take the 2-minute tour ×
Possible Duplicate:
Can I combine two LANs into one to get double speed?
I have a similar situation as this question. But I'm using Windows 7 32-bit on my laptop.
I have a 128 kbps DSL connection and another GPRS connection from mobile to PC via USB cable.
How can I use both connections to improve my speed? Or is it possible to use them on different browsers? Like one for IE and one for Chrome. If it is not possible then, it's alright if I at least get an improved combined speed.
share|improve this question
marked as duplicate by Ƭᴇcʜιᴇ007, studiohack Feb 21 '11 at 15:59
1 Answer 1
You can't use two internet connections for either of the things you want to do. You will have to use one or the other because the computer has no way of determining which to use for each browser, nor can it split the connection between the two for improved speed.
Short answer: You can't.
share|improve this answer
Thanks for the answer and thanks very much for correcting my English. :) – IsmailS Feb 20 '11 at 17:19
You're welcome, @Ismail. ^^ – Wuffers Feb 20 '11 at 17:22
|
global_05_local_5_shard_00000035_processed.jsonl/62151 | Take the 2-minute tour ×
I've got a problem with a couple hard drives, I recently switched from a Debian Linux install to Windows 7, installation went without problems but now I find that there is no way to format a couple of hard drives I have installed:
one is a Hitachi 1TB with two partitions both NTFS formatted and I can access only one of the two.
the second is a WDD 800GB, it contains one full partition EXT3 formatted, so that's not a surprise that is not recognized.
The problem here is that Windows recognizes the two drives and lists them in the control panel's devices list but doesn't allow me to do any action on them. AFAIK the problem with the first drive first partition (which is NTFS formatted) has something to do with MBR, maybe Linux messed with it and Windows 7 is incapable of using it.
My first course of action will be recovering the data in the first partition and moving it to the second, but after that how can I format the two drives? Do I have to reinstall the whole OS and use the partition manager of Windows 7 installer or are there other ways?
share|improve this question
5 Answers 5
If you only want to format these drives for use with Windows 7, and don't care about any data that is on them currently, there is no need to install any additional software.
Hit the Windows key, type disk management into the search box, and then press Enter. This will present you with a window that will show the disks and allow you to format and/or partition them. You can also set up advanced features like software raid and more from here. The only thing you will not be able to do from here is mount these disks as they are, because about the only file systems Windows understands are FAT, NTFS, and the various optical formats.
share|improve this answer
Ensuring you are making it only to that(those disks) disk and not your system one, you have several options:
First of all, Testdisk, which is free, and serves for many things: http://www.cgsecurity.org/wiki/TestDisk
MBRFix (free(donation)) http://www.sysint.no/products/Download/tabid/536/language/nb-NO/Default.aspx
CLIfreeware version of MBRWizzard. http://firesage.com/mbrwizard.php
share|improve this answer
Try the free EXT file system driver for Windows:
Ext2 Installable File System For Windows
Hopefully that will allow you to access the ext3 formatted volume in addition to replacing it with NTFS.
share|improve this answer
(Nearly four years later, but I came across this in google).
While TestDisk (listed above) should solve the problem of the missing partition, for the other disk where you just need to read the Linux files, the best solution I found was http://www.diskinternals.com/linux-reader/; It displayed files on a Linux disk clearly and simply and allowed copying to Windows.
share|improve this answer
You probably need to set the partition type of the partition to the file system you formated it with also. Linux does not care that much about it whereas Windows fails to read out partitions if the type is not set correctly. There are various tools to accomplish this, from the Linux shell you could use fdisk for example.
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62152 | Take the 2-minute tour ×
What is the difference between multiple CPU processors (ie: Pentium D) and multicore processors (ie: Core 2 duo)?
share|improve this question
migrated from stackoverflow.com Mar 20 '11 at 15:46
This question came from our site for professional and enthusiast programmers.
3 Answers 3
up vote 7 down vote accepted
Multiple CPU processors (like the Pentium D) are literally just two distinct CPUs (two dies) that just happen to share the same physical package.
So, instead of having 2 CPUs in 2 sockets, you have 2 CPUs that just happen to fit in one socket together. Basically, there's no difference between having, say, 2 physical early-generation Xenon CPUs (each in their own socket) and a single Pentium D. (Note: This is very much a simplification.)
Multi-core CPU processors (like the the Core 2 series) are two processing units that share the same die (silicon substrate).
So, the multiple CPU processors are like having 2 CPUs which are just conveniently packaged together, whereas the multi-core CPU processors are 2 CPUs on the same chip.
If this seems like a subtle distinction, that's because it is.
Of course, there's more to it than that - for one thing, having the two CPUs on the same die is more efficient (both power-consumption-wise as well as instruction-wise, due to a different internal design). Additionally, having the CPU cores on the same die means they can share things like L1 cache, whereas when the two CPUs are physically separate dies, they each have to have their own cache.
It gets even more complicated when you throw quad-core chips into the mix, because they are 2 dual-core chips which just happen to share the same physical packaging... kind of like the Pentium D. But that's a digression for another day.
share|improve this answer
thanks everyones :) – sumeyye Mar 26 '11 at 0:12
The difference is really all down to busses.
A dual-core CPU is like having two CPUs inside one chip. But, they both have to access the motherboard resources through the one set of pins. Granted, the number of pins is pretty huge these days compared with the older CPUs.
Having two (or more) separate CPUs has the advantage that each CPU has direct access to the motherboard resources through its own set of pins.
While not a massive difference in speed, for memory or IO intensive operations (not CPU bound) the dual CPU model is marginally faster.
share|improve this answer
my question is very easy, not about new technology. What is the innovation with pentium family? I heard that pentium family has two cpu, is that true? and what's different between two cpu and dual core ? thanks.. – sumeyye Mar 20 '11 at 16:01
@sumeyye: Your question was VERY unclear. Matt's answer is about as close to an answer as was possible (multiple CPUs vs. multicore CPUs). There are no more Pentiums, and what you're saying about them is false (in a general way), check out Intel Pentium on Wikipedia. – Ƭᴇcʜιᴇ007 Mar 20 '11 at 16:04
Matt: that's only half the truth... there are resources on the die that every core has access to without having to go over a bus, like the CPU cache. – Florenz Kley Mar 20 '11 at 19:02
sumeye: if a question is easy or not is something you only can answer if you know the answer, right? Matt did a good job, answering a very broad question in a sensible way. Your questions mixes up three in one - Pentium vs. Core architecture, single-cpu vs. multi-cpu, single-core vs. multi-core. Not easy to divine what you want to know. – Florenz Kley Mar 20 '11 at 19:06
@FlorenzKley I have highlighted the bit that states not CPU bound i.e., things outside the die. – Majenko Mar 20 '11 at 20:19
The questions is pretty unclear, but one thing you may be thinking about is Hyper-Threading. Many Pentium D processors are actually single-core, but appear to Windows to support 2 threads, or 2 virtual CPUS.
With Hyper-Threading, there is one 1 CPU but it can maintain the state of two threads at the same time such that when one thread is waiting for a long process, like waiting for the HDD or a memory operation, the other thread can execute. This can allow a single-core CPU to be up to 30% more efficient with multi-threaded code due to being able to execute more commands instead of stalling and waiting on long operations.
share|improve this answer
All Pentium Ds are dual core. – MDMarra Mar 20 '11 at 18:49
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62153 | Take the 2-minute tour ×
I'm currently running a check disk on my external hard drive, and it's in phase 4 with no visible progress on the progress bar. Unfortunately, I have to turn off the computer that's running the test. Will shutting off/unplugging the hard drive prematurely cause the drive any harm?
share|improve this question
1 Answer 1
up vote 1 down vote accepted
Put your ear on the drive case and listen for a minute, if you hear no sounds of the read/write heads moving, unplug it, modern drives are very tolerant of unexpected shut downs regardless of when it happens, the only side effect could be corrupt data or an unbootable system drive.
If you hear a repetitious clicking at regular intervals, the drive may have suffered the click of death. Unplug it.
On a hard disk drive, the click of death refers to a similar phenomenon; the head actuator may click as the drive repetitively tries to recover from one or more errors. The clicking sounds can be the heads repetitively loading or unloading, or they can be the sounds of the actuator striking a stop, or both
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62154 | Take the 2-minute tour ×
A screen of mine burnt out, and was replaced with a screen of lower resolution. It works in safe mode as that is in 800x600 resolution, but when I try to boot to normal mode, it fails. Is there a way to change the resolution for normal mode in safe mode?
share|improve this question
3 Answers 3
up vote 2 down vote accepted
Once you're in Safe Mode, try setting the resolution to 800x600. That should persist once you boot into normal mode.
share|improve this answer
Warning: This might not work in Windows 8. – T.E.D. Dec 15 '12 at 5:40
If all else fails, uninstall the graphics card from the "Device Manager" while in safe-mode, and restart in normal mode. Then install the drivers again.
share|improve this answer
I just had this exact thing happen to me (in my case I have a game that occasionally hoses my desktop resolution which shall go nameless but whose initials are SWTOR).
The problem is that I'm running under Windows 8. On my system at least, the accepted answer no longer works. You can change the resolution under safe mode, but rather than changing your desktop resolution, it will instead change the resolution you get next time you boot into safe mode (a change that seems not only unhelpful, but actively dangerous).
I also tried uninstalling the monitor driver, and that didn't help. I didn't try the video card. I'll try that next time.
The least destructive solution I've found is to restore the system from a recent restore point. I had one from the day before, but even if it had been weeks, that would be better than the previous solution I used (reinstalling Windows).
share|improve this answer
protected by slhck Nov 4 '13 at 19:27
Would you like to answer one of these unanswered questions instead?
|
global_05_local_5_shard_00000035_processed.jsonl/62155 | Take the 2-minute tour ×
I have downloaded the latest Ubuntu.iso and extracted it to /tmp/ubuntu/ on my laptop. In the folder isolinux there is an isolinux.cfg file. I am trying to prepare a USB stick by modifying those files, so that when I boot from USB it opens VNC and puts a static IP of
How can I enable VNC and a static IP so that from my laptop I can do the installation of Ubuntu 11.04 without using a keyboard or mouse?
share|improve this question
1 Answer 1
up vote 0 down vote accepted
Ubuntu's equivalent for anaconda is kickstart. This might be what you're looking for.
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62156 | Take the 2-minute tour ×
I've received a great answer about sorting XML - I need to use XSLT. But how do I actually do that? What software is required?
What command or application do I need to start to get a "converted" XML output file, given that I've got an XML file and an XSLT file as input?
I don't have any development environment installed; this is a regular office computer with WinXP+IE7.
With help from this site, I created a small package that I want to share: XML-Sorter_v0.3.zip
share|improve this question
2 Answers 2
up vote 5 down vote accepted
First decide whether you want to use XSLT 1.0 or 2.0. XSLT 2.0 is a much richer language, and the only reason for preferring XSLT 1.0 is that it's supported in a wider range of environments (for example, in the browser).
Then decide what XSLT processor you want to use. There's a wide choice for XSLT 1.0, a rather narrower choice for XSLT 2.0.
Then look in the documentation for that XSLT processor to find out how to run it.
Given that you seem to be OK with running the transformation from the Windows command line, I would recommend using Saxon-HE which you can get from http://saxon.sf.net/. You will need to install Java, and then you can run it as described here:
If you prefer a simple GUI interface, consider "Kernow for Saxon".
If you want a development environment with a nice editor and debugger, you will have to pay for it, but Stylus Studio and oXygen are both good value, and both give you a choice of XSLT engines.
share|improve this answer
Installing a development suite seems like overkill, but I've just downloaded the saxon jar file. That seems to do the trick - at least it generates an output file! Whether that file is correct, is not part of my question here. Thanks!! – Torben Gundtofte-Bruun Nov 14 '11 at 15:49
An XSLT Processor like Xalan-J for a command line solution. For a GUI editor/debugger you can use Eclipse, a tutorial here.
Edit: A fully web-based solution found here
share|improve this answer
The web-based solution link was a nice edit. – Robino Mar 6 at 15:19
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62157 | Take the 2-minute tour ×
The touch lights on my Dell Studio XPS 1647 (running Windows 7) are broken. For most features: volume, playing and pausing media, this isn't an issue, I can do it another way. But for the wireless this is a huge problem: I can't find a way to turn it back on. The wireless says "Not connected: No connections are available." I know my wireless works (I'm using it in my Macbook right now) and there are many other wireless networks in my apartment building. Before, this would mean I needed to tap that touch light to turn it back on, but they don't work. Troubleshooting tells me I need to "use the switch to enable wireless capability on this computer." I've searched everywhere for another way to enable the wireless not using that touch light, but I can't find a thing! There has got to be a way. I've tried uninstalling and reinstalling the drivers for the wireless card, but no luck. I've also tried a variety of things to get the touch lights working again. I don't care how complicated it is--I just need to turn my wireless back on!
share|improve this question
1 Answer 1
up vote 1 down vote accepted
I believe that this thread will get you headed in the right direction. It appears that you can turn the button on/off, which means that the user must have the ability to turn the wireless on another way.
share|improve this answer
It worked! Here are the instructions from that thread that resolved the issue: I believe you can disable the device in the BIOS / System setup. Hold F2 during start up to get into the BIOS, go to the Advanced tab, and at the buttom of the settings list there is an item called "Wireless" - there's an option there where you can specify which devices it controls, and is sounds like to me you want to set it to "NONE". Once you do this, you'll have to toggle them on/off within Windows instead. Restarted my PC and the wireless was on! – alli Apr 12 '12 at 16:02
Cool. Glad it worked! – tjd802 Apr 12 '12 at 19:48
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62158 | Take the 2-minute tour ×
I have an HP Probook 4740s running windows 7 Professional which came with 4GB of RAM.
I just upgraded the RAM by adding another 8GB in the free slot.
However, Windows now takes a lot longer to start up (feels like about 3 times or more).
In addition, applications seem to respond more sluggishly.
Windows (in the My Computer properties) is reporting 12GB of RAM.
I didn't expect that the laptop would be faster, only to be able to run more programs comfortably without swapping slowing it down when switching between them (as I was maxing out the available memory already). I did not expect Windows to perform worse.
Can you think of any reasons why it could hamper performance?
enter image description here
share|improve this question
What is windows reporting as the currently installed memory after the upgrade (right click My Computer and go to properties to find it)? If you went over the motherboards limit for max RAM that could cause the problem. – Scott Chamberlain Sep 5 '13 at 6:29
Windows is reporting 12GB (I added the detail to my question as per SE guidelines). – mydoghasworms Sep 5 '13 at 7:01
2 Answers 2
up vote 6 down vote accepted
As per Factory Specs
Memory, maximum
8 GB 1333 MHz DDR3 SDRAM
As your have breached this limit by running 12GB I'm not surprised your experiencing performance issues.
This was a partial answer. I don't know why breaching this limitation affects performance, I just know it does
Thoughts on this limitation
Hardware limitations on maximum ram capacity is what caused the issue but why?
It would appear that windows could see all the available capacity of RAM but when trying to address certain regions which it believed were available it was failing due to the hardware limitation. As such it was experiencing lagging well trying to search for available segments.
But this leaves a few more question:
• Why did it go past POST when a hardware limitation was breached?
• Why was windows unable to detect the limitation?
• Why wasn't windows displaying errors instead of running slower?
I hope someone with more experience is able to shed some light on why this behavior occurs when the hardware limitation is breached
share|improve this answer
Most likely the bios does not recognize the new RAM at all so if he had 2x 2GB before and replaced one of them with the 8GB stick it now only sees the one 2GB stick. – Scott Chamberlain Sep 5 '13 at 6:34
He said he added it to a free slot and if it's like most HP laptops I pull apart they like to use 4GB sticks over 2x 2GB (Probably cheaper) – 50-3 Sep 5 '13 at 6:37
Mmm, that's interesting about the maximum memory. Thanks for pointing that out. I will uninstall the original 4GB memory and see if that helps, although Windows does recognize the 12GB of RAM correctly. Let me see if downgrading to 8GB will make it better. – mydoghasworms Sep 5 '13 at 7:02
Try memtest86, memtest86+ or Windows Memory Diagnostic, that will give lots of info about your memory – golimar Sep 5 '13 at 8:01
Well, going down to 8GB memory has dramatically improved the performance of my machine, so even though I don't know the detail, this answer is good enough for me. Thanks! – mydoghasworms Sep 5 '13 at 8:29
It is a dual-channel motherboard that you forced into a slow single-channel mode by using 2 different sticks of RAM.
This can severely hamper performance, especially if the sticks have a different speed-rating too.
Single channel-single stick is often a lot faster than single channel with 2 sticks.
That 8 GB limit stated by HP is bogus. Windows wouldn't be able to see 12 if that was the case.
That motherboard (Intel HM76 chipset) should be able to take up to 2x8 GB according to Intel.
HP (and a lot of other manufacturers) are known to "limit" the maximum RAM in their specs if, at the time of writing of the specs, they don't offer those particular SO-DIMMS as an upgrade or option.
Those specs rarely get adjusted if such RAM becomes available later.
That doesn't mean it won't work, unless they specifically programmed the BIOS to prohibit this, which is very rare. (And in that case the laptop wouldn't get past POST.)
Always check the motherboard chipset/CPU specs for the real story. The motherboard chipset or the CPU in 99 out of the 100 cases is the limiting factor when it comes to maximum RAM specifications.
share|improve this answer
It's your answer which is bogus. The Serial Presence Detect chips on the DIMMs (SPD) will report all 12 GB, because that feature doesn't use the address lines. But if you simply don't have the address lines to send address 0x000 00002 0000 0000, then you can't use those reported 12 GB. – MSalters Sep 5 '13 at 10:11
@MSalters You are in the wrong: Windows would not even be able to boot unless the memory is really usable. As Windows DOES boot in this config the memory is really there and usable. Don't downmod unless you have really thought the matter through. I checked the Intel manufacturer docs on this motherboard chipset. Not wiring the extra address-lines is not supported by the chipset anyway, so it is even technically not possible to have the system support less than 16 GB. (Unless by artificially software-limiting in BIOS, but then the system shouldn't POST with > 8 GB.) – Tonny Sep 5 '13 at 13:35
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/62160 |
Take a look at the full list here:
While you’re at it, start with Marc and Bradley’s presentation: Lessons Learned: Designing and Deploying the Windows Azure Pack in the Real-World. I liked it so much and I think its such a great starting point that I’m going to embed it here so there’s no effort whatsoever required for you to watch. 😉
Lastly, take a look at the Building Clouds blog. There’s a lot of great resources available for working with Windows Azure Pack and related components.
Join the conversation |
global_05_local_5_shard_00000035_processed.jsonl/62183 | Tolkien Gateway
Grond (battering ram)
Revision as of 21:33, 9 June 2009 by JJKB (Talk | contribs)
Grond was a battering ram, used by Sauron's forces to destroy the Great Gate of Minas Tirith during the Battle of the Pelennor Fields. It was named intentionally to evoke the memory of the mace of Morgoth, the "Hammer of the Underworld".
In Adaptions
Peter Jackson's The Return of the King: In this film, ram took the shape of the whole wolf's body, instead of just it's head. There are inscriptions on it. Grond appears earlier in the battle than in the book. |
global_05_local_5_shard_00000035_processed.jsonl/62184 | Tolkien Gateway
Revision as of 10:19, 23 August 2010 by Morgan (Talk | contribs)
Political information
Head of StateDenethor (Nando)
Societal information
LocationEasternmost Beleriand
Historical information
Formed fromTeleri who abandoned the Great Journey
EstablishmentFirst Age
Dissolutionafter the War of Wrath
Ossiriand was a region of eastern Beleriand.
The Seven Rivers were, from north to south:
1. River Gelion
2. River Ascar or Rathlóriel
3. River Thalos
4. River Legolin
5. River Brilthor
6. River Duilwen
7. River Adurant, with Tol Galen
Ossiriand is Sindarin, meaning 'the Land of Seven Rivers'[1] (alternatively 'Land of Seven Streams'[2]). Early names used by Tolkien for this region were Ossiriande[3], Assariad and Ossiriath[4]
|
global_05_local_5_shard_00000035_processed.jsonl/62185 | The “Soft Tyranny” Born Of “Trust Us”
Bob Barr
6/19/2013 8:41:00 AM - Bob Barr
“If you have nothing to hide, you have nothing to fear.” This is the mentality shared by a growing number of Americans who would allow government to run roughshod over their rights, rather than raise concern about the vast expansion of the Surveillance State in the past decade. To this cadre of citizens, government knows best as its leaders implore us to “trust them” while they pursue the “bad guys” on our behalf.
Were it that simple.
The admonition to “trust us” is more than a simple justification of government malfeasance. Big Government cheerleaders use it to “freedom-shame” their critics by setting up a straw-man argument that if one opposes surreptitious surveillance or illegal methods of law enforcement investigations, one obviously must be guilty of some crime they wish to hide. After all, how can you not “trust” Uncle Sam in this 21st Century? How can one be skeptical of a government so benevolent it has gone $17 trillion in debt caring for us?
The answer lies in our Constitution, as well as in the Federalist Papers that so eloquently explain our system of government. As noted in Federalist 51, written 225 years ago by James Madison, the “Father of the Constitution” (I paraphrase): “If men were angels, we would have no need of government, but men are not angels and we therefore institute government among men to protect us from the abuses in which government inevitably will engage if left to its own devices.”
Clearly, our Founding Fathers understood the fundamental nature of government: that, as an institution, government seeks power. They knew also that power, once obtained, tends to corrupt, hence the checks and balances built into in our constitutional republic.
Yet, in our post-9/11 world, the will to demand government operate within the law and the Constitution, and the courage to criticize it when it appears not to so operate, too often is trumped by fear. Fear in myriad permutations – fear of terrorist attacks, fear of crime, fear of accidents, fear of . . . you name it.
As Edmund Burke understood in 1757, “no passion so effectively robs the mind of all its powers of acting and reasoning as fear.” Unfortunately, government leaders today -- as in 1776 when John Adams noted that “fear is the foundation of most governments” – understand this fact all too well.
|
global_05_local_5_shard_00000035_processed.jsonl/62197 | Language Selection
English French German Italian Portuguese Spanish
BBC iPlayer Linux screenshots
Filed under
More Here
More in Tux Machines
Watch Netflix outside the US, for nearly free (without paying for a tunnel)
Some services line Netflix have an annoying geolocation restriction that made them unavailable outside the United States. In case of Netflix, this is due to licensing issues. It's not a slim difference: do you want to be able to access just over one thousand movies, or would you prefer to have access to over thirteen thousand movies? Unfortunately, getting around the geolocation issue is not for everybody: it's based on the principle of browsing the Internet bouncing off an IP address (Internet address) located in the US (instead of using your own IP address, geolocated wherever you are). One common way of doing so is by using a tunnel: in short, you are creating a "virtual cable" to a host in the US, and are using that virtual cable to direct all of your Internet traffic. Using a tunnel, magically, you are located in the US as far as anybody else is concerned. The problem with tunnels is that they are expensive: the average price is around $5/month. That's nearly the cost of your whole Netflix subscription, just for the privilege of using Netflix in the first place! Well, there is another solution -- one that I consider much better.
Wondering If HP Will Release Linux++ This Month
So far in 2015 we haven't heard much at all about The Machine... Besides that X.Org veteran Keith Packard left Intel to join HP where he's working on The Machine. Thus now being into June 2015, I'm wondering if this month we'll see the debut of Linux++, "Software that emulates the hardware design of The Machine and other tools will be released so that programmers can test their code against the new operating system. Linux++ is intended to ultimately be replaced by an operating system designed from scratch for The Machine, which HP calls Carbon," according to one of the earlier reports. Read more
Deepin 2014.3 at a Glance
|
global_05_local_5_shard_00000035_processed.jsonl/62198 | Archived Discussion
Headrock: We need to put the image of her house on the article. Preferably with the caption "EPIC FAIL", driving the point home.
Wikipedia is using this image with all the required explanations, which I think are also suitable for TV Tropes. The original image is here, though again, who's got the time to read all the rules about this sort of stuff?
So whaddayasay? We post it? |
global_05_local_5_shard_00000035_processed.jsonl/62201 | [[quoteright:320:[[VideoGame/TheLastOfUs http://static.tvtropes.org/pmwiki/pub/images/tlou-joel-sarah-ellie-threatened_8719.jpg]]]]
[[caption-width-right:320:Top picture: the night of the ZombieApocalypse outbreak. Bottom picture: 20 years later.]]
When it comes to a character's {{Backstory}}, there is usually one event that stands out among all the rest and made the character what they are. They watched their parents die. They killed someone... or failed to. They let someone down. They ran away from something. This event will surely be the core of their DarkAndTroubledPast, something that they have been spending the rest of their life coping with, living in the shadow of, accepting, or just trying to put out of memory...
Simply put, backstory is a theme. And themes need resolutions. Thanks to the LawOfConservationOfDetail, you can probably bet that the resolution to a character's backstory will involve them facing the exact same or similar event that haunted their past, allowing them to conquer their demons once and for all... or die by them. Such event is guaranteed to be a climax of some sort.
History tends to repeat itself in the following ways:
* Character finds themselves faced with the same decision as before. They'll either make the right decision this time, or fail the same way again.
* Character finds themselves faced with a danger, obstacle, or enemy from their past, something they have a very strong, personal grudge against. If they failed the first time, or perhaps succeeded out of pure luck, they'll be able to stand up to it with their own skill this time... or fail again.
* Character finds themselves faced with the same type of tragedy from their past. This time, they'll be emotionally mature enough to handle it.
* Character sees someone else going through the same series of events they did. They'll have a chance to help... or use it against them.
Note that a simple ChekhovsGun cannot qualify. It's also not a realization, symbolic or otherwise, that they've failed or accomplished some life's goal or made some dead person happy. This needs to be a full-blown parallelism between what happened before the story started and what happened during the story.
Compare with BookEnds and MyGreatestSecondChance.
Has nothing to do with putting your MichaelJackson album on repeat all night.
[[folder:Anime and Manga]]
* Juri in ''RevolutionaryGirlUtena'' has in her backstory been in a romantic triangle with Shiori and another nameless boy from the duelling club. The boy was interested in her, Juri was in love with Shiori, and Shiori was uninterested in the boy but interested in hurting Juri and so convinced the boy to go out with her instead. During the Akio Ohtori Arc, Ruka, the former captain of the Duelist club appears, and starts going out with Shiori, although he's really interested in Juri and is trying to make Juri forget her infatuation with Shiori.
* ''Anime/DaphneInTheBrilliantBlue'' ends with Maia applying for the Oceans Academy again, like in the first episode (in which she failed)... Or does it?
* For some students of the Afterlife High School in ''Anime/AngelBeats'', one of the reason you are there is to repeat your life's story, and making the right choice this time around. That, or simply having a good enough time.
* In ''Manga/FullmetalAlchemist'', Scar starts out a member of an oppressed ethnic group, the Ishvalans, wanting revenge on those who nearly wiped out his people, namely Amestris. By the end of the story, he pays an instrumental role in saving Amestris.
* In ''Anime/YuGiOh5Ds'', [[TheAce Jack Atlas]] and [[WorthyOpponent Dragan]] fought a turbo duel that the latter was [[ThrowingTheFight forced to throw]] in order to save his father's life. Years later, when they fought another duel, they both drew the exact same cards they had drawn last time. Both realized that Fate itself wanted them to replay the duel to see who should've won.
* In ''Film/{{Hook}}'', Hook gets eaten by the (apparently not dead) crocodile that bit his hand off.
* ''Film/TopGun'': The main character's co-pilot is killed in a freak accident after their plane stalls because they flew through another plane's "jet wash." In the final battle, the same thing happens, with a number of implications played out (Maverick keeps his plane in the air this time, but loses his nerve, and starts to flee before having an Underdog Comeback moment and saving the day).
* In ''WesternAnimation/KungFuPanda'', Master Shifu fights a rematch against Tai Lung, his old apprentice-turned-evil, but loses again.
** You could also say Tai Lung's story repeats itself too--after being denied the Dragon Scroll, he is defeated, paralyzed, and imprisoned; twenty years later he escapes, tries to claim it again, and is again defeated, even when he attempts to use on Po the same move which had defeated him the first time.
** Perhaps more importantly, the parallels between Tai Lung's and Tigress' training, and Shifu's differing reactions.
* In ''Film/{{James and the Giant Peach}}'', James' parents were killed by a runaway rhinoceros. Sure enough, in the movie version, the rhino reappeared.
* The entire ''Literature/HarryPotter'' series revolves around how Harry miraculously survived a death spell from Voldemort ([[spoiler: thanks to his mother sacrificing herself to protect him]]), and chronicles how he gets strong enough to finally face him in a rematch. [[spoiler: Which he wins by being willing to sacrifice himself and miraculously surviving exactly the same spell]].
* At the very beginning of ''[[WarchildSeries Warchild]]'', Jos is abducted by pirates and abused by their captain Falcone. He escapes. Much of the rest of the book is spent showing him coping with that experience and the difficulties he has in trusting people because of it. But you know [[BigBad Falcone]] will be showing up again. Sure enough, in the climax, [[spoiler: he captures Jos yet again and repeats the same pattern of abuse. And this time Jos can't even repress the memory. Unusually, Jos isn't able to face his demon or die by them. He's rescued. Not that it stops him from killing Falcone the third time they meet, when it's Falcone who's been captured.]]
[[folder:Live Action TV]]
* The ''Series/StarTrekTheOriginalSeries'' episode "Obsession", where Captain Kirk couldn't save people from a monster.
* ''Series/{{Birds of Prey}}'' did it with ComicBook/BlackCanary, recreating her traumatic kidnapping in order to allow her to come out ahead and prove to herself that she was stronger. Or something.
* This is often used in ''Series/{{Highlander}}: The Series''. In the past an Immortal enemy killed someone Duncan cared about. In the present Duncan must face him again and this time stop him from killing Duncan's friends and/or lover.
* This is used in ''Series/TeenWolf''. Derek has first-hand experience and reasoning as to why he thinks Scott shouldn't date an Argent.
[[folder:Video Games]]
* The ''Franchise/MetalGear'' series deserves its own section.
** ''VideoGame/MetalGearSolid'': Snake's inability to [[ShootTheDog kill Fox to ensure an easy victory]], because he had learned from his mistakes of killing Fox and Big Boss in ''VideoGame/MetalGear2''.
** ''VideoGame/MetalGearSolid2'': Subtle one. Otacon loses his father - and almost his sister - due to a drowning suicide by the former. If he had been there, he would have been able to save them - but he was in his room [[{{Squick}} having sex with his stepmother]] at the time, and therefore didn't respond to his sister's cries for help. At the end of the Tanker chapter, Snake calls for Otacon to save him from drowning. This time Otacon saves him by ''riding a boat out onto the sea in a thunderstorm'' just to pull him out of the water.
** ''VideoGame/MetalGearSolidPortableOps'': Big Boss assassinated The Boss, but, when his old friend Python begs for him to finish him off the same way The Boss did, he tries to save him instead.
** ''VideoGame/MetalGearSolid4'': [[spoiler: Naomi]] dies in similar circumstances to Sniper Wolf (even the music is the same), and Otacon is overwhelmed. However, instead of grieving, he quotes the line ''Snake'' uttered after Wolf's death ("I don't have any tears left to shed"), and shakily gets on with life.
* ''Franchise/DevilMayCry'': Dante - who lost his his mother as a child - nearly lost Trish as well, who basically is a demonic clone of her.
* Shadow from ''VideoGame/{{Sonic Adventure 2}}'' is shocked into [[FakeMemories realizing his past]] after Amy Rose coincidentally uses the same phrase that the late Maria Robotnik did, and thus decides that, to make it up to Maria for the damage he's done, he'll stop the [[ColonyDrop Space Colony ARK from hitting the Earth]].
** Though it probably wasn't real, ''VideoGame/ShadowTheHedgehog'' featured a level where Shadow could have the choice to stop the G.U.N. soldiers from killing Maria.
* Archer's backstory in ''VisualNovel/FateStayNight'' works this way, putting him in his current position at the game's beginning. As a human, Archer [[spoiler: when he was called Shirou]] was unable to save people from a disaster, which eventually led to his making a [[DealWithTheDevil contract with the world]] to prevent the same thing happening in his adulthood.
* In ''VideoGame/BlazeUnion'', Gulcasa loses a number of people important to him through death and betrayal. He blames this on his own personal weakness (although every circumstance was pretty much out of his control) and vows to gain the power that he needs to really protect his loved ones. Three years later, another large-scale conflict starts; whether or not Gulcasa is capable of protecting his allies depends entirely on whether you're playing ''YggdraUnion'' ([[spoiler:he can't]]) or ''YggdraUnison'' ([[spoiler:he does]]).
* [[TearJerker Tatsuya Suou]]'s history in {{Persona 2}}. He pretty much threw the weight of the world on his shoulders and tasked himself to destroy [[EldritchAbomination Nyarlathotep]]'s plans before they started so his friends wouldn't have to suffer. He failed.
* In ''VideoGame/DisgaeaHourOfDarkness'', the HeroicSacrifice is a recurring theme for Laharl's character. [[spoiler:Part of his reason for hating love was that his mother, who tried to instill such ideals, sacrificed her life to cure Laharl of an incurable disease. This would later repeat itself at the end of the game where Flonne offers herself up to be punished by the Seraph so that Laharl and the others would be spared. Then, after defeating the Seraph, Laharl attempts to sacrifice his life to bring Flonne back to life, though whether he does so or not depends on the ending the player received[[note]]Canonically, he doesn't have to. Vyers stops Laharl moments before he sacrifices himself and the Seraph, having been spared by Laharl, brings Flonne back to life as a FallenAngel.[[/note]]]].
** And it continues to bite Laharl in ''VideoGame/DisgaeaDimension2''. [[spoiler:Sicily tries to give up her life in exchange for the kidnapped angels, but Laharl talks her out of it. He even comments that she's just like their mother. If the player receives a certain ending, though, Sicily chooses to sacrifice her life despite Laharl desperately pleading her not to.]]
* In Videogame/TheLastOfUs (trope image), a ZombieApocalypse breaks out and Joel has to carry his daughter to safety through a hostile environment. [[spoiler:At the end of the game (20 years later), he ends up having to carry his surrogate daughter to safety through a hostile environment.]]
* ''ABrokenWinter'': After failing to save his son's life, Kuroda is given the chance to save his best friend's son, Kokkan, which he does eventually. He then raises the child in his son's place, even going so far as to alter public records to keep Kokkan's true identity (wanted son of a terrorist) a secret* ''{{MAG ISA}}'' -- the entire comic is all about the recurring theme of being alone. Both among the protagonists and antagonists.
* ''Webcomic/{{MAG ISA}}'' -- the entire comic is all about the recurring theme of being alone. Both among the protagonists and antagonists.
[[folder:Western Animation]]
* ''WesternAnimation/AvatarTheLastAirbender'': Happened over and over again with Zuko. Most notably was his final showdown with his father where he was about to get burned once more, but instead [[CrowningMomentOfAwesome deflected his father's lightning]] |
global_05_local_5_shard_00000035_processed.jsonl/62202 | Analysis: Butterfly Of Death And Rebirth
Inexact title. See the list below. We don't have an article named Analysis/ButterflyOfDeathAndRebirth, exactly. We do have:
If you meant one of those, just click and go. If you want to start a Analysis/ButterflyOfDeathAndRebirth page, just click the edit button above. Be careful, though, the only things that go in the Main namespace are tropes. Don't put in redirects for shows, books, etc.. Use the right namespace for those. |
global_05_local_5_shard_00000035_processed.jsonl/62203 | Analysis: Duel Nature
Inexact title. See the list below. We don't have an article named Analysis/DuelNature, exactly. We do have:
If you meant one of those, just click and go. If you want to start a Analysis/DuelNature page, just click the edit button above. Be careful, though, the only things that go in the Main namespace are tropes. Don't put in redirects for shows, books, etc.. Use the right namespace for those. |
global_05_local_5_shard_00000035_processed.jsonl/62204 | Analysis: Sora No Woto
• Existentialism: Sora No Woto touches several points of Existentialism, most notably Angst, Despair and the Absurd. An overarching theme of the show is how people give meaning to their lives, from religion to sticking up for their True Companions or their country, or clinging to delusions like Madam Jacquotte, in the face of an aloof, uncaring universe, contrasted to the pointlessness of it ("If the world is going to die, what are we fighting for?"). The episodes where this is more blatant are episode seven and the last DVD episode (in particular Rio's final voice-over). Filicia Heideman in particular is a textbook case of The Anti-Nihilist.
Filicia in episode seven: There can't possibly be any meaning in this world. But isn't that wonderful in its own right? Because if there isn't any, we can find our own.
• Rio's answer to the question posited in episode seven (What are we fighting for?):
Let's go, to our dreams and more. Even if the world is to die, everything until that moment is our future.
|
global_05_local_5_shard_00000035_processed.jsonl/62205 | Awesome: Jimmy Buffett
Inexact title. See the list below. We don't have an article named Awesome/JimmyBuffett, exactly. We do have:
If you meant one of those, just click and go. If you want to start a Awesome/JimmyBuffett page, just click the edit button above. Be careful, though, the only things that go in the Main namespace are tropes. Don't put in redirects for shows, books, etc.. Use the right namespace for those. |
global_05_local_5_shard_00000035_processed.jsonl/62206 | Awesome: Sexing The Cherry
Inexact title. See the list below. We don't have an article named Awesome/SexingTheCherry, exactly. We do have:
If you meant one of those, just click and go. If you want to start a Awesome/SexingTheCherry page, just click the edit button above. Be careful, though, the only things that go in the Main namespace are tropes. Don't put in redirects for shows, books, etc.. Use the right namespace for those. |
global_05_local_5_shard_00000035_processed.jsonl/62208 | Funny: Tales Of The Sundered Lands
Inexact title. See the list below. We don't have an article named Funny/TalesOfTheSunderedLands, exactly. We do have:
If you meant one of those, just click and go. If you want to start a Funny/TalesOfTheSunderedLands page, just click the edit button above. Be careful, though, the only things that go in the Main namespace are tropes. Don't put in redirects for shows, books, etc.. Use the right namespace for those. |
global_05_local_5_shard_00000035_processed.jsonl/62209 | Heartwarming: Di C Entertainment
Inexact title. See the list below. We don't have an article named Heartwarming/DiCEntertainment, exactly. We do have:
If you meant one of those, just click and go. If you want to start a Heartwarming/DiCEntertainment page, just click the edit button above. Be careful, though, the only things that go in the Main namespace are tropes. Don't put in redirects for shows, books, etc.. Use the right namespace for those. |
global_05_local_5_shard_00000035_processed.jsonl/62210 | Heartwarming: Hoodwinked
Inexact title. See the list below. We don't have an article named Heartwarming/Hoodwinked, exactly. We do have:
If you meant one of those, just click and go. If you want to start a Heartwarming/Hoodwinked page, just click the edit button above. Be careful, though, the only things that go in the Main namespace are tropes. Don't put in redirects for shows, books, etc.. Use the right namespace for those. |
global_05_local_5_shard_00000035_processed.jsonl/62211 | Heartwarming: Stuck
Inexact title. See the list below. We don't have an article named Heartwarming/Stuck, exactly. We do have:
If you meant one of those, just click and go. If you want to start a Heartwarming/Stuck page, just click the edit button above. Be careful, though, the only things that go in the Main namespace are tropes. Don't put in redirects for shows, books, etc.. Use the right namespace for those. |
global_05_local_5_shard_00000035_processed.jsonl/62212 | Redundancy: Web Animation
• Also from Homestar Runner, Cheat Commandos member Reinforcements: "Justice Rocket Backpack Rocket Rocket, fire!"
• Thy Dungeonman 3 repeats "Upon the table there is a stein."
• Yet another Homestar example, from the SBEmail "more armies": "The drive! The power! The motivation! The fortitude! The power again!"
• "Oh! I guess I forgort to port. Oh! I guess I forgrat to prat. Oh! 'GORKA FA PORK!!"
• "Poopsmith, you smell like a Crapsmith!"
• Somewhat lampshaded in Where U Goin' 2:
Strong Bad: Maybe he's just going to the ATM machine.
Strong Mad: THAT'S REDUNDANT!
• The theme to the 20X6 anime:
Challenge and fighting!
We're fighting the challenge tonight!
Everyone's fighting the challenge that's ought to be fighting!
• The Red vs. Blue PSA introducing Grifball features Simmons and Church representing the "American Grifball League of America".
• In the first episode of Furious Famicom Faggot, Furious plays Super Mario Bros. 2, and comments on the character selection screen with, "You can be any of these stupid assholes. You can pick Mario, Luigi, Toad, Luigi, or the princess!"
• In Baby Cakes Diary #2, Babycakes describes how his father was scared of the moon when it "got all blue, and blue-lookin'."
• Charlie The Unicorn. "Candy Mountain! It's a land of sweets and joy... and joyness..."
• asdfmovie for sure.
"I baked you a pie!"
"Oh boy! What flavor?"
• Or most recently
"I'm going to punch your face..."
"...In the face!"
(Cue closeup on guy's face, revealing a second face)
• Dusk's Dawn: "What happened here? Is anypony able to tell me what happened here?" |
global_05_local_5_shard_00000035_processed.jsonl/62213 | Tear Jerker: The Cinema Snob
• "There's no such thing as happy dreams, right? Everyone has nightmares every night like me? Please tell me I'm normal." Yep, you now want to hug a short, bearded, jackass film snob.
• The Cinema Bum. Despite being used for a brief sketch, Brad's performance of him as a desperate vagrant lamenting his life is really convincing, and you just can't help but feel sorry for the poor bastard whenever you see him. Somebody buy that man a sandwich, please. Unfortunately, as of the Plutonium Baby review, he's most likely dead from the freezing weather outside.
• He came back in the review of The Legend of Boggy Creek, only to be brutally murdered by Travis Crabtree, who had been sent into a mindless killing spree by his titular song. Doubles as Nightmare Fuel.
• A minor example, but one that does stick-out nonetheless. At the end of his Sleepaway Camp III review, after finding out that the girlfriend of a Meet Cute couple already has a boyfriend, the look of betrayal is painfully clear on Brad's face, even if it was merely meant for a joke (especially painful since he had rooted for the couple to survive throughout the entire movie).
• During the Snob's review of Miami Connection, Snob remembers that they used to have a guy for these kinds of movies. Cut to Kung Tai Ted paralyzed in a wheelchair in the corner.
Snob: "Well, THAT was sad..." |
global_05_local_5_shard_00000035_processed.jsonl/62214 | Tearjerker: Prophesies Destinies And Killing Gods
With as much violence and darkness the Heroes experience, there are plenty of Tear Jerkers to go around.
• The destruction of the first tower. Most of the tower was turned to dust and it is so radioactive that they still cannot return for nostalgia purposes for many years to come.
• Ray's reaction to seeing a brothel. Any semblance of stoicism went through the window very quickly, leaving him a broken, screaming mess, as two years worth of repressed memories about Ninian's slow descent into drugs and prostitution resurfaced. |
global_05_local_5_shard_00000035_processed.jsonl/62215 | Trivia: The Streets of San Francisco
• Hey, It's That Guy!
• Richard Hatch as Inspector Dan Robbins.
• Tim O'Connor as Lt. Roy Devitt.
• You may not know Denver Pyle from looking at him, but if you listen to him you can hear Uncle Jesse.
• Yes, that's Arnold Schwarzenegger in a rare (even then) villainous role as an unbalanced, murderous bodybuilder in "Dead Lift."
• Both Starsky & Hutch appeared on the show (in separate episodes). Someone might have noticed, given how both series use the same typeface for their credits.
• Nor are they the only future TV detectives to turn up, with Mary Beth Lacey in "Commitment" and Kris Munroe in "Blockade."
• "The Hard Breed" has Jim Rockford's dad and J.R. Ewing's dad. And speaking of Rockford, his friend on the force Dennis Becker turns up in "Rampage."
• Playing Against Type: Ever wanted to see Bill Bixby as a ruthless assassin? "Target: Red" is for you.
Alternative Title(s):
The Streets Of San Fransisco |
global_05_local_5_shard_00000035_processed.jsonl/62216 | Inexact title. See the list below. We don't have an article named Tropers/Rem, exactly. We do have:
If you meant one of those, just click and go. If you want to start a Tropers/Rem page, just click the edit button above. Be careful, though, the only things that go in the Main namespace are tropes. Don't put in redirects for shows, books, etc.. Use the right namespace for those. |
global_05_local_5_shard_00000035_processed.jsonl/62217 | Western Animation: Skysurfer Strike Force
"When a mysterious explosion destroys an artificial intelligence lab, Adam Hollister is framed. His son, Jack Hollister, sets out to prove his father's innocence, that someone else had caused the explosion and had stolen an experimental computer brain. Merging it with his own brain, he transforms into the master criminal known as Cybron. To fight Cybron and his evil Bioborgs, Jack Hollister becomes Skysurfer One, leader of the Skysurfer Strike Force."
—The Opening Narration from the first season.
Skysurfer Strike Force is a syndicated cartoon show that aired on the BKN cartoon block. debuted in 1992. Created by Ruby-Spears Productions, this series ran from November 22, 1996 to March 6, 1997.
As the Opening Narration above explains, the show featured five heroes, named the Skysurfers. Led by Jack Hollister aka Skysurfer One, the Skysurfers fight show Big Bad, Cybron and his Bioborgs to stop his attempts at world domination and clear the late Adam Hollister's name. The Skysurfers used technologically advanced watches called Digitrans that transformed them from their casual clothing to battle gear and weapons. During the transformations, their cars transform into rocket-powered surfboards that they can ride in the air.
Skysurfer Strike Force provides examples of: |
global_05_local_5_shard_00000035_processed.jsonl/62218 | YMMV: Ouke No Monshou
Inexact title. See the list below. We don't have an article named YMMV/OukeNoMonshou, exactly. We do have:
If you meant one of those, just click and go. If you want to start a YMMV/OukeNoMonshou page, just click the edit button above. Be careful, though, the only things that go in the Main namespace are tropes. Don't put in redirects for shows, books, etc.. Use the right namespace for those. |
global_05_local_5_shard_00000035_processed.jsonl/62220 | id summary reporter owner description type status priority milestone component resolution keywords cc branch branch_author launchpad_bug 3004 FilePath.setContent should do an atomic rename on Windows where possible glyph "It would really be helpful to have someone who knows a lot of Windows stuff look at this ticket and figure out what the right thing to do is. Using the python stdlib's default os.rename, the right thing to do would be to prefer ending up in a more-consistent state. Currently `setContent` will delete the old file before moving the new file into place. It might also be advisable to have a ""repair"" method to complete setContent operations which died after the file was written but before it was moved into place. This should be a separate ticket since UNIX can leave extraneous temporary files around too, but whether it needs to differ per platform depends on whether we can use this: It looks like the [http://msdn2.microsoft.com/en-us/library/aa365242(VS.85).aspx MoveFileWithProgress] (or `MoveFileEx`, or even `MoveFileTransacted` on Vista) may provide an atomic-rename facility. If we can invoke these without external dependencies it might be better to forego the use of the `os` module in this case. " defect new normal core exarkun Trent.Nelson zooko@… davidsarah |
global_05_local_5_shard_00000035_processed.jsonl/62225 | Slash Boxes
All the Perl that's Practical to Extract and Report
use Perl Log In
Log In
[ Create a new account ]
Beatnik (493)
(email not shown publicly)
Project Daddy of Spine [], a mod_perl based CMS.
Journal of Beatnik (493)
Thursday May 18, 2006
12:34 PM
Illegal user knocking
[ #29635 ]
Since I've opened my SSH port to the world (for subversion reasons), I get a daily wave of taiwanese people trying to access my box. They're using random user names. So far, none has gotten in.. When I discovered it, this afternoon, I added a few things to my sshd config (lowering the auth attempts, disabling password authentication). I might just disable SSH again and move towards HTTP access.
Some resources:
A Cure for the Common SSH Login Attack
Muppet SSH brute-forcer
More | Login | Reply
Loading... please wait. |
global_05_local_5_shard_00000035_processed.jsonl/62226 | You are viewing joshua_
Joshua's weblog - September 9th, 2011
September 9th, 2011
September 9th, 2011
11:24 pm
It turns out that if you fight hard enough, you *can* get useful internal tools released to the world.
The MODS kernel driver is a toolkit something like UIO, but more suited for experimentation; it seems that it might make a good platform, for instance, for students experimenting with drivers without wanting to go too deep into crashing their system by writing bad kernel-mode code.
Although it was originally from NVIDIA, it is NOT an official NVIDIA release; any support questions (and patches!) should go to my personal e-mail address.
(buy PVC)
Previous Day 2011/09/09
Next Day
My Website Powered by |
global_05_local_5_shard_00000035_processed.jsonl/62240 | You are viewing we_love_secret6
29 July 2011 @ 02:38 am
Womanthology, and Batgirl speaks out
Apparently I can post but still not comment, so I'm abusing mod privilege to pimp an awesome project. (DDoSers, you suck monkey balls.)
* Barbara Kesel (Writer/Editor Marvel, DC, Crossgen, Image, Dark Horse)
* Gail Simone ( DC writer, Wonder Woman, Birds of Prey, Secret Six)
* Annie Nocenti ( Marvel writer, Daredevil, Editor for Uncanny X-Men, New Mutants)
* Ming Doyle ( Boom, Image, Marvel artist)
* Devin Grayson (DC writer; Batman, Nightwing, New Titans)
* Lauren Montgomery (Director & Storyboard Artist - Justice League, DC)
* Fiona Staples (DC, Wildstorm, IDW , Vertigo artist)
* June Brigman (Creator; Brenda Starr, Power Pack)
* Samantha Newark (Voice of JEM, Singer/Vocals - God of War, Hook)
* Bonnie Burton(
"Read more and/or pledge your support at the Womanthology Kickstarter page.
And as an added incentive point of interest, DC Women Kicking Ass have published an interview with Kyrax2, the Batgirl!Steph at San Diego ComiCon who called DiDio & co out on DCnU's 'diversity'. |
global_05_local_5_shard_00000035_processed.jsonl/62248 | Main Page
From PC-BSD Wiki
Revision as of 18:43, 13 February 2013 by Tigersharke (Talk | contribs)
Jump to: navigation, search
Welcome to the PC-BSD® Wiki!
Documentation Projects Development
Wireless Testing
Driver Function & Compatability
Game Testing
Discovering what works and how
Simplifying the PBI creation process
Pkgsrc in PC-BSD®
Exploring NetBSD pkgsrc potential
Turn FreeBSD into PC-BSD®
Conversion instructions for v9.0
Solving some problems
Where to find help
Various resources for assistance
Press, licensing and other queries
A Jail Management Tool
The PBI Manager
A Command line Tool Suite
PC-BSD® Users Handbook
Currently under development
Handbook Errata
Corrections after publishing
Wiki Site TODO
Suggested/implemented changes
FreeBSD® Ideas page
Concepts for possible development
PC-BSD® Trac
Source, Reports, or Requests
Become a Developer
How to help with code
Bluetooth Testing
How to help development
The PBI9 Format
Improved for 9.0 and beyond
PBI Build Testing
Getting ports turned into PBIs
PC-BSD® 9.2 Task List
Things to do for the next Version
Google Summer of Code
Application and Information
Tasks Looking for People
How YOU can contribute
Personal tools |
global_05_local_5_shard_00000035_processed.jsonl/62249 | Why this Site?
• Our Mission:
• How you can participate:
• 'Like' our Wikipediocracy page on Facebook.
• Follow Wikipediocracy on Twitter!
MPs Wiki pages edited before election to make them look better, all from IP addresses inside the House of Commons. telegraph.co.uk/news…
Google Search
Press Releases
• Please click here for recent Wikipediocracy press releases.
Gender, Bending Wikipedia
By Moxie
This article explains how a single user on Wikipedia with an agenda can manipulate the project over an extended period. Wikipedia lists a number of articles under the category “English murderers“, and as of writing this category has a handful of subcategories: English assassins (7), English murderers of children (36), English people convicted of murder (155), English female murderers (40), and English regicides (mostly those involved in the execution of Charles I). For some reason Wikipedia does not have a category “English male murderers” which some may consider a bias in itself.
Lets focus on the two categories English people convicted of murder (155) and English female murderers (40). It turns out that 35 of the 40 “English female murderers” are also in the category “English people convicted of murder”; the remainder are male. Assuming that eventually the missing 5 women will get added to the category, Wikipedia has 120 articles (75%) concerning male murderers and 40 articles (25%) concerning female murderers. How does this compare to actual gender breakdown of murder convictions in England?
In 1995/6 (which does not seem to be a special year) there were 935 males convicted of murder (90%) and 101 females convicted of murder (10%). How is it that a female is 2.5 times more likely to be listed as a murderer on wikipedia than a male? Enter the special interest contributor by the name of Shakehandsman, a Wikipedian who tends to add negative copy to articles on women. Even when Shakehandsman isn’t writing overt negative comment, his additions are designed to denigrate the person indirectly. For example here is the before and after Shakehandsman version of the article on journalist Lorraine Davidson. Astute readers will see the section on her personal life has been added replete with a link to material that Shakehandsman would not have been able to add directly. Shakehandsman has been pursuing an agenda against women from his very first edit in 2006 to his latest series of edits in April 2012.
How does Shakehandsman’s agenda affect the imbalance in male/female murderers? Well, not only has Shakehandsman written 5 of the 40 articles in the category “English female murderers”, but he has also edited 29 of the other ones too. The vast majority of the articles that reference “English female murderers” do so because Shakehandsman has added the category either directly to the article, or indirectly by adding them surreptitiously to page redirects that hardly any other Wikipedia contributors are keeping an eye on, in some cases even creating the redirect as well.
The way that Shakehandsman pushes an agenda on Wikipedia can be observed with the article he created about Rekha Kumari-Baker. Naturally he added the “English female murderers” category but also a whole bunch more, including “English people of Indian descent” and “People from Cambridgeshire”. The point of categories is that they provide more links to the article, and more ways by which the article may be found. But just to be sure Shakehandsman also created an article on the “Cambridge Crown Court“, along with a section on Notable cases which, at the time of writing, had one single entry on … yep, you guessed it. Still Shakehandsman isn’t done yet because Wikipedia is littered with articles on all sorts of trivia, one of which is devoted to East Road in Cambridge, so what better than to make that article link to the new Crown Court article, too.
According to Wikipedia editing rules, the Kumari-Baker article shouldn’t even exist, given that any such article should be about the case, not the perpetrator. Shakehandsman created a chain of links, from the East Road article to the Crown Court article and on to the article on Kumari-Baker for one reason, and one reason alone. Five years on from the case, not many visitors to Wikipedia will recall Kumari-Baker, let alone search the site for her name. They may, however, look up Cambridge Crown Court, and curiosity may lead them to the article on Kumari-Baker, and then perhaps to all those other evil women carefully curated under “English female murderers” and “English child murderers”.
Photo credit – Flickr/Digital Sextant: licensed under Creative Commons, Attribution 2.0 Generic (CC BY 2.0)
9 comments to Gender, Bending Wikipedia
• Delicious carbuncle
Wikipedia has Shakehandsman to thank for a couple of articles on UK shelters for abused women. Why would someone who seems to have a fear and dislike for women create such articles? In order to label them “feminist” organizations, of course. And as a vehicle for him to attack his favourite targets. like this gem in Eaves Housing For Women: “In April 2011 it was announced that Eaves had lost its central government funding for the POPPY project, with the contract for helping victims of trafficking going to the Salvation Army instead. The reason given by government for the change of service provider was that the Salvation Army was able to offer “victims a more diverse range of services”.[8] Former Labour Party MP Vera Baird criticised the decision suggesting women would not seek help from “uniformed male Christians”.[9]”
Snakehands is a sockpuppet of Shakehandsman. He seems to have abandoned both of these accounts and moved on to another.
• Tim Davenport (Carrite, Randy From Boise)
Of course, the skew towards female murderers may well be related to how newsworthy they are because they are different from the norm. More different = more coverage = more interest in writing the bios = more WP articles.
By the way, has anyone ever studied the disproportionate number of female murderers on the Perry Mason television show… Hmmm, something MUST be fishy here…
• Of course there will be more sensational reporting of women that kill than on men that kill. Which is another of the underlying problem of wikipedia. The processes are geared, not towards educational content, but towards the sensational, the purient, the bizarre, and the downright weird.
• Pedro
This is my first time coming to “wikipediocracy” and I must say I am rather underwhelmed. This article is, in a word, stupid. It’s perhaps unfair for me to judge a site based on one article but perhaps a better name for the site would be idiocracy. Whoever wrote this tripe has their tin-foil hat wound a bit too tight.
• Pray tell, dear Pedro, why you think this article is stupid. Why would anyone care about the underwhelmed nature of your existence? And while we’re at it, what is your handle on Wikipedia?
• “Pedro”. Not likely his real name. Hiding like a coward.
• DiL
Reading through this some of the things that are mentioned really do not surprise me having edited with this user before. At least his prejudice is reduced to being subtle and pointless by the rules of the website
• Michael
Wow, looks like Shakehandsman is back. Still adding a bunch of stuff from the Daily Mail and other tabloids to women’s BLPs and still trying to convince readers that violence against white people is everywhere.
Leave a Reply
You can use these HTML tags
|
global_05_local_5_shard_00000035_processed.jsonl/62262 | Skip to main content
How to buy
Business Partners: Mangalore
Automation Technologies
Type of BP T2Reseller
City Mangalore
Company Name Automation Technologies
ContactPerson Arun Pinto
Address with Pin Code "Santhrupthi" Mangalanagar, Mangaladevi, Mangalore-575001
Landline 0824-2416761
HO Location Mangalore
Branch Locations NA
Product Sold Servers Yes
Storage Yes
We're here to help
|
global_05_local_5_shard_00000035_processed.jsonl/62299 | Agile Coaching for Your Agile Company
Coaching and training are indispensable to Agile transformations. This can be difficult for some organizations to accept.Agile frameworks are simple to understand, but there are many nuances to handling the complexities involved in an Agile transformation.While it is often helpful to tap into outside resources (books, websites, courses or consultants), the organization will need someone who understands the subtleties of Agile transformations and the context of the organization to make the transition as successful as possible.We refer to this role as the “internal Agile coach” and we often encourage clients to identify one or more such individuals as the organization's need for Agile knowledge and understanding grows. Being an Agile coach requires a wide range of human qualities, skills and experience, and selecting one for the company should be done carefully.In this article, we discuss when you need an Agile coach, what an Agile coach does, and a few tips on how you might create your own internal Agile coach.
Part I - When do you need an internal coach?
1. Symptoms of the Need for Coaching
Many companies embark on their Agile journey alone. Some will persist in the Do-It-Yourself (DIY) method and others will determine that they need help in the form of expert training and coaching provided by a professional Agile consultant from outside the company. As Agile spreads within the enterprise it will either become apparent or the Agile consultant will suggest that the company create an internal coaching position to better serve the needs of the evolving organization.
Sometimes the need is not so obvious. DIY companies in particular can take a long time to realize that Agile expertise exists and that not enough of it is available within the company.
Deciding to create internal Agile expertise can be guesswork or deliberate. Some symptoms of an organization ready for a funded, centralized, dependable, persistent corporate Agile presence are:
• There is no way to judge the success of the existing Agile teams
• Teams show a wide variance in their success
• Teams show largely unsatisfactory Agile implementations, a lack of success, or a lack of benefits compared to what went before
• Your outside consultant(s) becomes a bottleneck to your rollout
• For financial reasons – they just cost too much
• Because they cannot meet your demand
• Because they are not experienced enough to meet all of your needs
• Your Agile implementation is moving from individual teams to programs
• Other organizations within the company notice that they are not aligned with the Agile organizations
The first three are about how well your Agile teams are doing. If you are well into the adoption of Agile methods and you can’t tell how well your teams are doing, or if your teams are doing poorly, you will want to take action. In a PMO-driven world, you would put in numerous rules and oversight to address these issues. In an Agile world, you want to provide support, training, and education in order to make teams more successful in discovering the best implementations and benefits from Agile methods. You will also want to distil and synthesize from your successes a localized formula for adopting Agile, so that training and coaching can be as effective as possible within your organization.
One good way to do this is to provide someone who is well versed in Agile and who can both assess Agile maturity and provide coaching services (see below) to your teams.
The next symptom refers to what happens when you outgrow your external source of Agile expertise. Eventually, you will want to become self-sustaining and you will need to shift Agile expertise in-house. The items listed here are the symptoms you will begin to feel as you go beyond the need for Agile introductory training.
The last two symptoms are natural outgrowths of a successful Agile adoption. You will eventually want to apply Agile principles to large-scale projects, and will also notice as Agile takes hold that some of the organizations outside of the development teams are asking for training to align themselves better with the new rhythm and style of the Agile teams.
The thoughtful reader will notice that we have just argued that there is a need for internal coaching if your Agile tranformation is going poorly, or if it is going well. In other words, there is an eventual need for Agile coaching in nearly all companies that choose to adopt Agile methods.
Part II - What does an internal coach do?
2. Training (those new to Agile)
Training is one of the primary functions of an Agile coach. New
About the author
AgileConnection is one of the growing communities of the TechWell network.
|
global_05_local_5_shard_00000035_processed.jsonl/62300 | How to Forbid Unauthorized Access to Window's Clipboard
Member Submitted
Though Microsoft's Office Clipboard is one of the fundamental parts of the Windows operating system, there is little information about how it works, especially in the low level. In this article, Vladimir explains the Clipboard internals by showing how you can forbid access to it. He simplified the task as much as possible to focus on the most important parts.
About the author
AgileConnection is one of the growing communities of the TechWell network.
|
global_05_local_5_shard_00000035_processed.jsonl/62359 | The U.S. And Castro, 1959–1962
By the time Castro reached Havana, the 26 July Movement had grown to tens of thousands. No one will ever know how many there actually were in the movement, since no membership cards were ever issued: anyone could grow a beard and call himself a fidelista in early 1959. There was no congress of the movement, few officers, and no agreement on policy. Castro must have kept his eyes open toward the communists from the start, since Russia, the headquarters of the communist world, would be an alternative to the United States as a buyer of sugar and a supplier of arms. No doubt Raúl Castro, as a real communist, and Che Guevara, a long-time communist sympathizer, had been quick to point this out to Fidel. Even so, the thrust of the movement that Castro headed was in the beginning primarily nationalist and not communist, nor even particularly socialist. Castro told Rómulo Betancourt, the democratic President of Venezuela, in early 1959 that he was determined above all to have a row with the United States in order to purge Cuba of many past humiliations at the hands of the “monster of the north,” as the United States had been termed by José Marti, the Cuban nationalist hero of the 1890’s who was one of the chief inspirational figures of Castro’s revolution.
In slightly different circumstances, in a different generation, with a different international posture by the world communist movement, Castro perhaps could have lurched as easily toward the Right, as toward the Left—say, toward Peronism or fascism. Fascist techniques were used so much during the early days of the Cuban revolution in 1959 and 1960 that, indeed, that useful term “fascist left” might have been coined to apply to it. Castro’s cult of heroic leadership, of endless struggle, of exalted nationalism had characterized all fascist movements in Europe. The emotional oratory, the carefully staged mass meetings, the deliberate exacerbation of tension before the “leader” spoke, the banners, and the mob intimidation—all these Castroist techniques recalled the days of Nazism. Castro’s movement gained its initial support less from the organized workers than from the same rootless petty bourgeois classes that supported fascism in Europe in the 1920’s. As in Hitler’s Germany, the workers joined the movement late, only after they saw that it was beginning to be successful and would be in power for a long time.
The temptation, however, for Castro to turn the movement toward communism must have been strong in 1959, since he knew that would be the course which would most infuriate the United States. It was risky to be sure, but he was, above all, the man for risks. As for the old communists, they had in their ranks, as Castro later put it to the New York Times ’s Herbert Matthews, “men who were truly revolutionary, loyal, honest and trained. I needed them.” Castro, no doubt, was surprised by the ease with which the old institutions collapsed before him. They did so because they had been compromised by their support of, or association with, the discredited Batista. Castro could not have known how feeble the liberal response would be, since his own movement had been built partly on liberal enthusiasm. But he did know that if he lost the liberals, he would require a disciplined bureaucracy in their place—“I need them.” That was a true comment on Castro’s association with the communists in 1959.
There is also another simple, but essential point to make: everything in Castro’s past life suggested that if he were faced with having to choose between fidelismo (which would, in the end, imply adopting the rule of law and a risk of losing an election) and communism (which could give him an opportunity to remain in power for a long time), he would choose the latter. The brutality of communist regimes in practice never seemed to trouble him. In February, 1959, he made it perfectly clear that air force officers who had fought for Batista had to be found guilty of war crimes; a verdict of innocence, first returned, was rejected. Whatever hesitation Castro did display in 1959 was caused, surely, by anxiety lest an alliance with the communists might give power to them and their secretary-general, and not to himself. He needed to make certain that he could ride the tiger personally before he let it out of its cage. In this, he was showing himself primarily not the communist, but the Latin American caudillo that he really always has been.
Castro began to make use of the communists in the armed forces from the moment he arrived in Havana. Guevara made sure that the files of the BRAC, Batista’s anticommunist police section, were seized immediately after victory. The BRAC’s director was shot without a trial as soon as Castro’s men reached the capital. A prominent communist, Armando Acosta, was made commander of the old fortress of La Punta in Havana as early as January 5,1959—before Castro himself was in the city. Communist “instructors” moved into the army at once. Other communists were utilized from the start in the Institute of Agrarian Reform, which was established in May, 1959. By the end of that year, communists also were being appointed to ministries that were being abandoned by regular civil servants and fidelistas . |
global_05_local_5_shard_00000035_processed.jsonl/62367 | Pirates & Capitalists Testo
Testo Pirates & Capitalists
Amici, ecco i finalisti
like a drunken crew on a sinking ship
we are ill fated and at fault
trampling our brethren
in a self induced stupor of selfishness
panicked and narcissistic
plump faces stricken with terror
regrets bite like the sting of salt in wounds
foretold, mocked and ignored
never has a punishment been so deserved
as the waves lap at your feet
and your breath turns to gasps
a million 'I told you so`s' will weigh upon your shoulders
as the spite drips from my tongue
I will curse your very existence
and as the water fills my lungs
I shall reflect on all
a civilisation founded on dead consciences and hearts to match
the anger seeps from me into the black
sadness consumes as I try to forget
and I will drift beneath the darkness
finally accepting the fate you have decided for us all
and mother earth will lay her head down for the last time
exhausted and defeated
this is the end |
global_05_local_5_shard_00000035_processed.jsonl/62368 | Baby Come Back Testo
Testo Baby Come Back
Amici, ecco i finalisti
[Verse 1]
I was a fool to let you go
Let you walk right out my door
It was a bad mistake I made
And i regret it to this day
If I had a second chance
Girl i promise I'd make it last
So tonight I erase my pride
If you let me back inside
Baby come back
Baby come back to me
I don't want to be free
Baby come back to me
Baby come back
[Repeat 2x]
Over and over I try to forget you
But it seems too hard
My feelings for you I can't disregard
You're not my baby anymore baby
All I want is to bring your love back baby
It's not about sex baby
You're the best lady
Please have baby
Forever my lady
[Repeat chorus until end] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.