qid
int64
1
74.7M
question
stringlengths
12
33.8k
date
stringlengths
10
10
metadata
list
response_j
stringlengths
0
115k
response_k
stringlengths
2
98.3k
5,494,279
I am using my HTC Desire to send NMEA - $GPRMC data to my Laptop(server)! A file named gpsdata.nmea gets created in the server and is getting updated every second with new data. I can view my path if I open the file in Google Earth! However I want to view my path dynamically as it changes.....in Google Earth!!! Is this possible? Or are there any other software that allows this?? Please help me!
2011/03/31
[ "https://Stackoverflow.com/questions/5494279", "https://Stackoverflow.com", "https://Stackoverflow.com/users/651068/" ]
A table should have at least one key but there's no reason to create another one if you aren't going to need it.
To understand the motivation we'd need to understand the application. Reasons not to have one: Guid is all you'll need to access, serach, retrieve, blah the record Reasons to have one: Information is virtualized within the data. Meaning that guid while sufficient for a DB point of view, might not be for a user point of view. the additionnal ID field could be a primary field when considered in terms of a business process, and the content of that field used in other systems
5,494,279
I am using my HTC Desire to send NMEA - $GPRMC data to my Laptop(server)! A file named gpsdata.nmea gets created in the server and is getting updated every second with new data. I can view my path if I open the file in Google Earth! However I want to view my path dynamically as it changes.....in Google Earth!!! Is this possible? Or are there any other software that allows this?? Please help me!
2011/03/31
[ "https://Stackoverflow.com/questions/5494279", "https://Stackoverflow.com", "https://Stackoverflow.com/users/651068/" ]
Whether you also need a surrogate key depends on your particular needs. GUIDS can be slower for joining, but only you can know if they will affect the performance of your system enough to warrant adding an int key. There are also issues with GUIDS and how the data is physically stored on the disk and the performance issues that causes. Additonally, since PKs are in all other indexes, using a GUID for a PK can greatly increase the size of your index. Before commmitting to use GUIDs, you need to do some reading on the performance implications (which may be differnt from database to database). GUIDS are not user friendly. If you don't have a good natural key in a table (sucha as person table where names are not unique and thus are not able to be a natural key) then users may need to have some other value to query on (such as person\_id). THe average employee is going to be happier researching customer 1234 than customer '6214304C-2C56-E011-BACB-00265582C0F2' Nor do I see customers as wanting to call up customer service to ask for help with order number '6E14304C-2C56-E011-BACB-00265582C0F2'. This is not an unimportant consideration. I'm not saying you can't use the GUID (you certainly can), but you need to know before you commit to the path exactly what kinds of issues you might have with using the GUID. Databasesa re not easy to change after there are millions of records, espcially with something as critical to the design as the PK. Many of the problems with GUIDs aren't particularly noticable until you have lots of records. If the database is one that will never have that level of records, you may never run into the issue, but you need to think about the implications in terms of your own expected database use before you decide.
To understand the motivation we'd need to understand the application. Reasons not to have one: Guid is all you'll need to access, serach, retrieve, blah the record Reasons to have one: Information is virtualized within the data. Meaning that guid while sufficient for a DB point of view, might not be for a user point of view. the additionnal ID field could be a primary field when considered in terms of a business process, and the content of that field used in other systems
5,494,279
I am using my HTC Desire to send NMEA - $GPRMC data to my Laptop(server)! A file named gpsdata.nmea gets created in the server and is getting updated every second with new data. I can view my path if I open the file in Google Earth! However I want to view my path dynamically as it changes.....in Google Earth!!! Is this possible? Or are there any other software that allows this?? Please help me!
2011/03/31
[ "https://Stackoverflow.com/questions/5494279", "https://Stackoverflow.com", "https://Stackoverflow.com/users/651068/" ]
A table should have at least one key but there's no reason to create another one if you aren't going to need it.
It's difficult to answer authoritatively without knowing more about your business requirements. It certainly might be legitimate to use a natural primary key. Expand on your requirements here, or do some reading on [natural and synthetic primary keys](http://www.google.com.au/search?q=synthetic%20primary%20key).
5,494,279
I am using my HTC Desire to send NMEA - $GPRMC data to my Laptop(server)! A file named gpsdata.nmea gets created in the server and is getting updated every second with new data. I can view my path if I open the file in Google Earth! However I want to view my path dynamically as it changes.....in Google Earth!!! Is this possible? Or are there any other software that allows this?? Please help me!
2011/03/31
[ "https://Stackoverflow.com/questions/5494279", "https://Stackoverflow.com", "https://Stackoverflow.com/users/651068/" ]
Whether you also need a surrogate key depends on your particular needs. GUIDS can be slower for joining, but only you can know if they will affect the performance of your system enough to warrant adding an int key. There are also issues with GUIDS and how the data is physically stored on the disk and the performance issues that causes. Additonally, since PKs are in all other indexes, using a GUID for a PK can greatly increase the size of your index. Before commmitting to use GUIDs, you need to do some reading on the performance implications (which may be differnt from database to database). GUIDS are not user friendly. If you don't have a good natural key in a table (sucha as person table where names are not unique and thus are not able to be a natural key) then users may need to have some other value to query on (such as person\_id). THe average employee is going to be happier researching customer 1234 than customer '6214304C-2C56-E011-BACB-00265582C0F2' Nor do I see customers as wanting to call up customer service to ask for help with order number '6E14304C-2C56-E011-BACB-00265582C0F2'. This is not an unimportant consideration. I'm not saying you can't use the GUID (you certainly can), but you need to know before you commit to the path exactly what kinds of issues you might have with using the GUID. Databasesa re not easy to change after there are millions of records, espcially with something as critical to the design as the PK. Many of the problems with GUIDs aren't particularly noticable until you have lots of records. If the database is one that will never have that level of records, you may never run into the issue, but you need to think about the implications in terms of your own expected database use before you decide.
It's difficult to answer authoritatively without knowing more about your business requirements. It certainly might be legitimate to use a natural primary key. Expand on your requirements here, or do some reading on [natural and synthetic primary keys](http://www.google.com.au/search?q=synthetic%20primary%20key).
5,494,279
I am using my HTC Desire to send NMEA - $GPRMC data to my Laptop(server)! A file named gpsdata.nmea gets created in the server and is getting updated every second with new data. I can view my path if I open the file in Google Earth! However I want to view my path dynamically as it changes.....in Google Earth!!! Is this possible? Or are there any other software that allows this?? Please help me!
2011/03/31
[ "https://Stackoverflow.com/questions/5494279", "https://Stackoverflow.com", "https://Stackoverflow.com/users/651068/" ]
Whether you also need a surrogate key depends on your particular needs. GUIDS can be slower for joining, but only you can know if they will affect the performance of your system enough to warrant adding an int key. There are also issues with GUIDS and how the data is physically stored on the disk and the performance issues that causes. Additonally, since PKs are in all other indexes, using a GUID for a PK can greatly increase the size of your index. Before commmitting to use GUIDs, you need to do some reading on the performance implications (which may be differnt from database to database). GUIDS are not user friendly. If you don't have a good natural key in a table (sucha as person table where names are not unique and thus are not able to be a natural key) then users may need to have some other value to query on (such as person\_id). THe average employee is going to be happier researching customer 1234 than customer '6214304C-2C56-E011-BACB-00265582C0F2' Nor do I see customers as wanting to call up customer service to ask for help with order number '6E14304C-2C56-E011-BACB-00265582C0F2'. This is not an unimportant consideration. I'm not saying you can't use the GUID (you certainly can), but you need to know before you commit to the path exactly what kinds of issues you might have with using the GUID. Databasesa re not easy to change after there are millions of records, espcially with something as critical to the design as the PK. Many of the problems with GUIDs aren't particularly noticable until you have lots of records. If the database is one that will never have that level of records, you may never run into the issue, but you need to think about the implications in terms of your own expected database use before you decide.
A table should have at least one key but there's no reason to create another one if you aren't going to need it.
25,050
For some reason when I like something on some webpage and click "post to Facebook", this is posted to my profile with a lock icon, meaning that only I can see it. I then need to manually go to Facebook, find this like on my profile page and share it. Where can I set the default visibility of Facebook likes so that my likes are shared immediately, without the need to go to facebook.com?
2012/03/26
[ "https://webapps.stackexchange.com/questions/25050", "https://webapps.stackexchange.com", "https://webapps.stackexchange.com/users/6479/" ]
The privacy of pages you Like is set on your timeline or profile. If you have timeline, go to your timeline and click on Likes, and then Edit in the upper right corner (Edit does not show up until you hover over it): ![Timeline - Edit Likes](https://i.stack.imgur.com/JBwQh.png) Then you can set the privacy of each category of Likes using the button to its right. Most of them are in the category "Other Pages You Like": ![Timeline - Other Pages You Like](https://i.stack.imgur.com/PHH91.png) If you still have the old profile, go to your profile by clicking your name at the top, then click Edit Profile, then the appropriate category that you want to change in the left sidebar. "Other Pages you Like" can be found on the "Activities and Interests" tab. Change the privacy setting using the button to its right: ![Profile - Other Pages You Like](https://i.stack.imgur.com/3Qqdy.png)
The privacy of Like's is dependent on the default setting on your [privacy settings](https://www.facebook.com/settings/?tab=privacy) page. Change it to something that isn't locked. I tested this and verified it's this setting by liking a page somewhere else. In order to see the change take effect you'll need to clear your cache and reload the page (otherwise your old settings will be used to post the `like` to your wall/timeline)
15,432,837
Since I've read [this](http://www.curious-creature.org/docs/android-performance-case-study-1.html) I've been trying to create an emulator where I can use the "Show GPU Overdraw". I followed the tips [here](https://twitter.com/SmoleyPoleyOley/status/275377396985765889) and [there](http://developer.android.com/tools/devices/emulator.html), but in the new tools, when creating a new AVD, I find no way of enabling the GPU emulation. That's probably why I don't see the GPU Overdraw in the emulator, despite having the "Show GPU Overdraw" in the emulator's Developer Settings (note: I am running the emulator via eclipse with the "-gpu on" option) So has anyone been able to have an emulator to display the GPU Overdraw?
2013/03/15
[ "https://Stackoverflow.com/questions/15432837", "https://Stackoverflow.com", "https://Stackoverflow.com/users/752781/" ]
It's working just fine with the emulator as well. Make sure you've got "Use host GPU" enabled when setting up the AVD, and you *need* to be running Android 4.2. Previous versions of Android don't include the feature. Other than that, it's just a matter of enabling the "Show GPU Overdraw" setting in Developer options, and then restart the application you want to analyze. You need to make sure that the application has hardware acceleration enabled, otherwise it won't be drawn by the GPU, and thus you can't show the GPU overdraw. Alternatively, use the "Force GPU rendering" option in developer settings on the Android device. Here's a screenshot of an emulator running Android 4.2 with the option enabled: ![enter image description here](https://i.stack.imgur.com/aQb3g.jpg) And here's my AVD setup, in case you want to have a look at that: ![enter image description here](https://i.stack.imgur.com/UZjUD.jpg)
You have to compile to have at least a minVersion=4 on the AndroidManifest and compile to target=14
2,922
I'm leaning towards atom but I'm not sure.
2010/10/15
[ "https://wordpress.stackexchange.com/questions/2922", "https://wordpress.stackexchange.com", "https://wordpress.stackexchange.com/users/675/" ]
RSS2 is the modernized version of the legacy format, atom is a more recent competing format. Both are read by all commonly used feed parsers. You'll run into a fanboy here and there that will try to convince you that one is better than the other. In reality it makes no difference whatsoever. Use the default. Or toss a coin to pick one.
Yes. The fact of the matter is that people will want to use both for different reasons. Google, for example, converts all RSS feeds to Atom before using them in Google Reader. WordPress, for example, can only read RSS feeds in its built-in feed readers (try importing a Google-ified feed into WordPress and everything breaks!). But which style you use is a matter of personal preference in the end, so you should offer both. This way, the Atom fans can use your Atom feed, and the RSS fans can use your RSS feed. Besides, [WordPress is capable of generating both](http://codex.wordpress.org/WordPress_Feeds) ... so why limit your users?
2,922
I'm leaning towards atom but I'm not sure.
2010/10/15
[ "https://wordpress.stackexchange.com/questions/2922", "https://wordpress.stackexchange.com", "https://wordpress.stackexchange.com/users/675/" ]
RSS2 is the modernized version of the legacy format, atom is a more recent competing format. Both are read by all commonly used feed parsers. You'll run into a fanboy here and there that will try to convince you that one is better than the other. In reality it makes no difference whatsoever. Use the default. Or toss a coin to pick one.
If you are using feedburner you can use [SmartFeed](http://www.google.com/support/feedburner/bin/answer.py?hl=en&answer=78971) which can 'translate' your feed from Atom to Rss so you will not need to provide both formats yourself.
2,922
I'm leaning towards atom but I'm not sure.
2010/10/15
[ "https://wordpress.stackexchange.com/questions/2922", "https://wordpress.stackexchange.com", "https://wordpress.stackexchange.com/users/675/" ]
RSS2 is the modernized version of the legacy format, atom is a more recent competing format. Both are read by all commonly used feed parsers. You'll run into a fanboy here and there that will try to convince you that one is better than the other. In reality it makes no difference whatsoever. Use the default. Or toss a coin to pick one.
If your question is more like "which format is most widely used and supported?", then I got a pretty good answer for you: I analyzed the world's [50 most read blogs according to Technorati](http://technorati.com/blogs/top100), and found that 9 (18%) offered Atom feeds while 48 (96%) offered RSS feeds. I've also never heard about a feed reader that doesn't support RSS (although I haven't tried them all) -- so I would definitely go with RSS instead of Atom, if I had to choose.
2,922
I'm leaning towards atom but I'm not sure.
2010/10/15
[ "https://wordpress.stackexchange.com/questions/2922", "https://wordpress.stackexchange.com", "https://wordpress.stackexchange.com/users/675/" ]
Yes. The fact of the matter is that people will want to use both for different reasons. Google, for example, converts all RSS feeds to Atom before using them in Google Reader. WordPress, for example, can only read RSS feeds in its built-in feed readers (try importing a Google-ified feed into WordPress and everything breaks!). But which style you use is a matter of personal preference in the end, so you should offer both. This way, the Atom fans can use your Atom feed, and the RSS fans can use your RSS feed. Besides, [WordPress is capable of generating both](http://codex.wordpress.org/WordPress_Feeds) ... so why limit your users?
If you are using feedburner you can use [SmartFeed](http://www.google.com/support/feedburner/bin/answer.py?hl=en&answer=78971) which can 'translate' your feed from Atom to Rss so you will not need to provide both formats yourself.
2,922
I'm leaning towards atom but I'm not sure.
2010/10/15
[ "https://wordpress.stackexchange.com/questions/2922", "https://wordpress.stackexchange.com", "https://wordpress.stackexchange.com/users/675/" ]
If your question is more like "which format is most widely used and supported?", then I got a pretty good answer for you: I analyzed the world's [50 most read blogs according to Technorati](http://technorati.com/blogs/top100), and found that 9 (18%) offered Atom feeds while 48 (96%) offered RSS feeds. I've also never heard about a feed reader that doesn't support RSS (although I haven't tried them all) -- so I would definitely go with RSS instead of Atom, if I had to choose.
If you are using feedburner you can use [SmartFeed](http://www.google.com/support/feedburner/bin/answer.py?hl=en&answer=78971) which can 'translate' your feed from Atom to Rss so you will not need to provide both formats yourself.
93,565
Can I correct 2 wire supply by adding a bare copper wire buried to sub-panels? I have two out-buildings with sub-panels fed by 6/2 wire w/ground. The main is 100 amp The sub-panels each has a 50 amp breaker in the main panel and uses two hots and the copper attached to the bonded ground bar in the sub-panels. Both panels have a bonded ground bar and one 6' ground rod with a #6 wire from ground bar to a 6' ground rod. This wire does not go back to the main Thanks to Stack Exchange I know I need to add another ground rod 6' away at each sub-panel and incorporate. I know I need to add another ground bar to use for the ground rods and to float/disconnect the other ground bar to use for the neutrals. Question: Is this true? I was told I did not need to have a ground wire running back to the main panel because a lightning strike would use the ground rod at the sub-panel and it might not be good to have the lightning run back to the main panel. If I do have to have another wire back to the main (I want 240 at the sub-panels) can I just bury a #6? copper wire a few inches in the soil above the buried conduit to use as the neutral or ground and if so which should I use it for. Thank you
2016/06/30
[ "https://diy.stackexchange.com/questions/93565", "https://diy.stackexchange.com", "https://diy.stackexchange.com/users/55849/" ]
You'll need to replace the cable in the conduit with 3 6AWG THHN/THWN dual rated wires + a 10AWG *bare* copper ground. Using the tables from chapter 9 and assuming concentric stranded conductors and a Schedule 80 conduit, this yields 32\*3 + 5 = 101mm^2 of conduit area used out of a maximum of 105mm^2 for a 3/4" conduit. (Trying to use an insulated wire for the ground will lead to an overstuffed conduit.) The easiest way to do this is to pre-twist the wires (black/white/red/bare) together and then attach them to one end of the existing (installed-by-a-monkey-who-doesn't-know-jack-about-Code) NM cable, then start pulling the NM cable out from the other end. Also, as Ed points out, the ground rod's too short -- drive a 10' ground rod properly at each outbuilding and connect it to that outbuilding's subpanel ground bar. While bare wire works for this purpose, it must be 8AWG or 6AWG -- 10AWG is too small for a grounding electrode conductor. HOWEVER, I would use an 8AWG or 6AWG Bare Armored Ground (BAG) cable instead of bare wire to make it crystal clear that this isn't some random wire flapping around in the breeze (it also provides damage protection for the wire, which is especially necessary for 8AWG.)
I can only say this a 6' ground rod is not legal and has not been in my years. A ground rod is 8-10' and if more than one is needed they must be more than 6' apart. 200' from the main I am sure the buildings are not connected and with a new rod at the sub it would be leagal if the ground and neutral are isolated.
217,539
I always thought they were dead in battle. The Borg didn't believe in assimilating lifeforms until "Best of Both Worlds." Yet others argue they were assimilated, and hence they were into assimilation the whole time.
2019/08/15
[ "https://scifi.stackexchange.com/questions/217539", "https://scifi.stackexchange.com", "https://scifi.stackexchange.com/users/-1/" ]
It was revealed in the EU novel *[Greater than the Sum](https://memory-alpha.fandom.com/wiki/Greater_than_the_Sum)* that the eighteen crew members were in fact ***assimilated by the Borg***, rather than killed by exposure to space (or sliced in half by the Borg cutting beam), as the episode would seem to suggest. > > “I’m sorry, have we met before?” > >   “Of course, you wouldn’t recognize me, not like this…” She came to attention. “Lieutenant Rebekah Grabowski, sir. I was a member of your crew aboard the Enterprise-D for nearly two years…until I was taken.” > >   Picard’s jaw dropped. He recognized the name. **He remembered all their names, even after fifteen years. “Rebekah Grabowski. You were…one of the eighteen. The first eighteen people we ever lost to the Borg.”** > >   >   >   “It was difficult for us to function at first,” Hugh told the senior staff as they sat around the table in the observation lounge. The ex-drone-leader of the Liberated, as he called them-had come aboard along with Rebekah Grabowski, who still looked amazed and delighted to be on a Starfleet ship again, even a different Enterprise from the one she’d known. Picard was equally amazed to have her back. **He still remembered the day the Borg had carved a cylindrical section out of the ship like a core sample, taking her and seventeen others with it. At the time, he had not known of assimilation and had believed them to have been killed, discarded by a race that, according to Q, had been interested only in technology** (more proof, in retrospect, that Q was not a reliable source of information). After his experience as Locutus, he had wondered if perhaps they had survived as drones instead, and prayed that they had not. > > >
[Memory Alpha](https://memory-alpha.fandom.com/wiki/Q_Who_(episode)#Act_Three) says they were "vaporized" in the episode summary. The ["Apocrypha"](https://memory-alpha.fandom.com/wiki/Q_Who_(episode)#Apocrypha) section, however, says that in one of the novels, the eighteen *Enterprise* crew members were indeed assimilated instead of outright killed as the episode portrayed.
217,539
I always thought they were dead in battle. The Borg didn't believe in assimilating lifeforms until "Best of Both Worlds." Yet others argue they were assimilated, and hence they were into assimilation the whole time.
2019/08/15
[ "https://scifi.stackexchange.com/questions/217539", "https://scifi.stackexchange.com", "https://scifi.stackexchange.com/users/-1/" ]
The concept of assimilation was introduced in Best of Both Worlds, but later works develop the concept and even retcon it as the modus operandi of the Borg. The Voyager episode Raven, in particular, shows how 7 of 9 was assimilated years before the events of Q Who. As for Guinan not mentioning it - we see multiple times where assimilation is treated as efffectively death - even despite the recovery of individuals such as Picard, so perhaps she just didn't see the point of specifically mentioning it. So, the evidence points to the 18 crew members either dying from decompression or being assimilated. As has been discussed, EU novels indicate assimilation, but the TV shows and movies are silent on this matter. Either way, they would have been listed as simply missing, presumed dead.
[Memory Alpha](https://memory-alpha.fandom.com/wiki/Q_Who_(episode)#Act_Three) says they were "vaporized" in the episode summary. The ["Apocrypha"](https://memory-alpha.fandom.com/wiki/Q_Who_(episode)#Apocrypha) section, however, says that in one of the novels, the eighteen *Enterprise* crew members were indeed assimilated instead of outright killed as the episode portrayed.
217,539
I always thought they were dead in battle. The Borg didn't believe in assimilating lifeforms until "Best of Both Worlds." Yet others argue they were assimilated, and hence they were into assimilation the whole time.
2019/08/15
[ "https://scifi.stackexchange.com/questions/217539", "https://scifi.stackexchange.com", "https://scifi.stackexchange.com/users/-1/" ]
It was revealed in the EU novel *[Greater than the Sum](https://memory-alpha.fandom.com/wiki/Greater_than_the_Sum)* that the eighteen crew members were in fact ***assimilated by the Borg***, rather than killed by exposure to space (or sliced in half by the Borg cutting beam), as the episode would seem to suggest. > > “I’m sorry, have we met before?” > >   “Of course, you wouldn’t recognize me, not like this…” She came to attention. “Lieutenant Rebekah Grabowski, sir. I was a member of your crew aboard the Enterprise-D for nearly two years…until I was taken.” > >   Picard’s jaw dropped. He recognized the name. **He remembered all their names, even after fifteen years. “Rebekah Grabowski. You were…one of the eighteen. The first eighteen people we ever lost to the Borg.”** > >   >   >   “It was difficult for us to function at first,” Hugh told the senior staff as they sat around the table in the observation lounge. The ex-drone-leader of the Liberated, as he called them-had come aboard along with Rebekah Grabowski, who still looked amazed and delighted to be on a Starfleet ship again, even a different Enterprise from the one she’d known. Picard was equally amazed to have her back. **He still remembered the day the Borg had carved a cylindrical section out of the ship like a core sample, taking her and seventeen others with it. At the time, he had not known of assimilation and had believed them to have been killed, discarded by a race that, according to Q, had been interested only in technology** (more proof, in retrospect, that Q was not a reliable source of information). After his experience as Locutus, he had wondered if perhaps they had survived as drones instead, and prayed that they had not. > > >
**SHORT ANSWER:** Nobody knows. **LONG ANSWER:** The evidence is inconclusive. In "Q Who" there was no evidence that the Borg assimilated any biological beings into their collective. So presumably the Borg would probably have killed any Enterprise crew or passengers that survived the decompression when a section of the Enterprise was sliced off and seized by the Borg. But there is no proof that the Borg did kill them. It is possible that the Borg assimilated them, or dropped them off on a habitable planet, or did something else that didn't kill them. In "The Best of Both Worlds" the Borg assimilated one lifeform that we know of, Picard, for the special purpose of serving as a spokesdrone for the Collective during the conquest of the Earth and/or the entire Federation. Picard's message offered some hope of survival for other Earth people/Federation citizens: > > PICARD [on viewscreen]: I am Locutus of Borg. Resistance is futile. Your life as it has been is over. From this time forward, you will service us. > > > <http://www.chakoteya.net/NextGen/174.htm>[1](http://www.chakoteya.net/NextGen/174.htm) This offered some hope that some Earth people/Federation citizens would survive and live as workers for the Borg as employees, serfs, slaves - or possibly farm animals harvested for spare organs for Borg drones needing transplants. Of course Locutus could have been lying to reduce resistance and the actual plan of the Borg could have been extermination. Did the Borg assimilate anybody else during their invasion of the Federation? At the beginning of "The Best of Both Worlds Part 1" the *Enterprise* investigates the disappearance of the New Providence colony on the distant planet Jouret IV. > > [Planet surface] > > > RIKER: Mister O'Brien> > > > [Transporter room] > > > RIKER [OC]: Verify these are accurate coordinates for New Providence colony. > > > O'BRIEN: Coordinates verified, sir. > > > > > > > [Planet surface] > > > > > > > > > O'BRIEN [OC]: You're at the centre of town. > (The centre of town is at the edge of a massive crater) > > > <http://www.chakoteya.net/NextGen/174.htm>[1](http://www.chakoteya.net/NextGen/174.htm) They later search for traces of Borg energy in the soil to verify it was a Borg attack. There is absolutely no mention of getting information from survivors of the attack. So all of the colonists - men, women, and children - were either killed or captured and assimilated by the Borg. And there is no information whether the colonists were 100 percent killed and 0 percent assimilated, or 0 percent killed and 100 percent assimilated, or anywhere in between. In "The Best of Both Worlds Part 2" the *Enterprise* arrives at the site of the battle of Wolf 359 between "forty" starships and the invading Borg Cube. > > WESLEY: We're approaching the Wolf system, Captain. > > > RIKER: On my way. > > > [Bridge] > > > RIKER: Slow to impulse. Take us to the battle coordinates, Mister Crusher. Yellow alert. > > > WORF: Sensors are picking up several vessels, Captain. > > > RIKER: The fleet? > > > DATA: No active subspace fields. Negligible power readings. > > > RIKER: Life signs? > > > DATA: Negative, sir. > > > WORF: Visual contact. > > > RIKER: On screen. > > > (Fragments of starships, some with flashes of fires still burning) > > > SHELBY: The Tolstoy, the Kyushu, the Melbourne. > > > (Riker bows his head briefly for the crew that might have been his) > > > <http://www.chakoteya.net/NextGen/175.htm>[2](http://www.chakoteya.net/NextGen/175.htm) So all the starships that did not successfully retreat from the battle have been smashed. All crew members who didn't escape from the ships that were smashed by the Borg are dead, or else have been captured and assimilated and are now on the Borg cube. Tens, hundreds, or thousands of crew members may have escaped from smashed ships in shuttles and lifeboats. All of those tens, hundreds, or thousands of crew members have either escaped beyond range of the sensors of the *Enterprise*, been killed by the Borg, or been captured by the Borg and assimilated. The last group would now be on the Borg cube. The Borg cube explodes at the end of "The Best of Both Worlds Part 2". That presumably kills all lifeforms inside it, including everyone who might have been assimilated at New providence or Wolf 359. In "The Drumhead" retired Admiral Norah Satie questions Picard: > > SATIE: Tell me, Captain, have you completely recovered from your experience with the Borg? > > > PICARD: Yes, I have completely recovered. > > > SATIE: It must have been awful for you, actually becoming one of them, being forced to use your vast knowledge of Starfleet operations to aid the Borg. Just how many of our ships were lost? Thirty nine? And a loss of life, I believe, measured at nearly eleven thousand. One wonders how you can sleep at night, having caused so much destruction. I question your actions, Captain. I question your choices. I question your loyalty. > > > <http://www.chakoteya.net/NextGen/195.htm>[3](http://www.chakoteya.net/NextGen/195.htm) Admiral Hansen said that "forty" ships were gathered at Wolf 359 to fight the Borg. Satie said that thirty nine were were lost. So possibly there were only thirty nine ships at Wolf 359, and all thirty nine ships were destroyed. Or possibly Satie was wrong and there were forty ships at Wolf 359 and all forty were destroyed - though it would have been odd for her to understate the destruction she accused Picard of causing. Or possibly there were forty or more ships at Wolf 359 and one or more ships escaped. The *Enterprise* NCC-1701 D usually had about a thousand people aboard. If all thirty nine ships at Wolf 359 had that many people aboard, that would make a total of about thirty nine thousand. About thirty nine thousand (or about 38,000 to 40,000) minus almost eleven thousand (or about 10,500 to 11,000) makes a difference of about 27,000 to 29,500 persons. Maybe the difference is that most of the ships at Wolf 359 had much smaller crews than the *Enterprise* NCC-1701 D did. 10,500 to 11,000 divided by 39 is 269.23076 to 282.05128, so we might imagine that the typical ship at Wolf 359 had about 250 to 300 people aboard and everyone was killed. Maybe the difference is that most of the ships at Wolf 359 left most or all of their non combat essential crew and all their passengers at planets or starbases, etc., before reaching Wolf 359 for the battle and so had much fewer people aboard than the *Enterprise* NCC-1701 D did. Maybe tens, or hundreds, or thousands, or possibly tens of thousands, of crew members escaped from the Battle of Wolf 359 and were confirmed to be alive and well in the months before "The Drumhead". Maybe Satie drastically understated the number of deaths at Wolf 359 - though it would have been odd of her to understate the deaths she accused Picard of causing. Possibly the official death count only listed those crew members whose DNA had been identified in body parts found at Wolf 359, and all the thousands of other crew members were listed as "missing, presumed dead". But it would have been odd of Satie to exclude the "missing, presumed dead" from her count of the deaths she accused Picard of causing. Maybe some combination of all four factors explains the 27,000 to 29,500 person difference in fatalities at Wolf 359. So far there is no proof that the Borg assimilated any Federation citizen except for Picard, and no proof that they did not assimilate thousands of Federation citizens. Yeas later, "Emissary", the first episode of *star Trek: Deep Space NIne*, opened with a flashback to the *Saratoga* at the Battle of Wolf 359. The *Saratoga* is wrecked, and Benjamin Sisko's wife Jennifer is killed, but at least one escape pod escapes before the *Saratoga* explodes. Those aboard the escape pod include Benjamin Sisko and his young son Jake. And some fans have wondered how it was possible for this escape pod, and any others, to travel so far before the *Enterprise* arrived at the battle site that the scanners detected no life. Could Ben and Jake Sisko survive? Whether nor not Ben and Jake Sisko actually survived, three years later people who were accepted as Ben and Jake Sisko arrived at Deep Space Nine, where the alleged Commander Benjamin Sisko reported for duty and became the Starfleet commanding officer and the protagonist for all seven seasons of the show. In the television series *Branded* (1965-66) the protagonist Jason McCord was discharged from the US army for allegedly deserting his post at the (fictional) Battle of Bitter Creek, and became known as "the Coward of Bitter Creek". > > All but one man died. > > > There at Bitter Creek. > > > And they say he ran away... > > > And if Ben, Jake, and the others in their escape pod were the only survivors of the Battle of Wolf 359, they might have been suspected of desertion, or possibly of being captured and brainwashed by the Borg and serving as Borg spies. Possibly Ben Sisko would have been discharged from Starfleet and called "the Coward of Wolf 359". So it seems likely to me that a bunch of other shuttlecraft, escape pods, and lifeboats escaped from the starships at Wolf 359, carrying tens, hundreds, thousands, or possibly tens of thousands to persons to safety. Then people would probably either suspect all of the surviors of being cowards or Borg agents, or suspect none of them. So Ben Sisko would probably have continued his Starfleet career normally without being called "the Coward of Wolf 359" or (especially) suspected of being some sort of spy. But this is just speculation on my part. There is no evidence that anyone escaped from Wolf 359 except for Ben, Jake, and anyone else seen in their escape pod. And there is no proof that Ben, Jake, and anyone else seen in their escape pod actually survived and escaped. It is possible that some group, such as the Borg, Species 8472, or the Sphere Builders in *Star Trek: Enterprise* sent duplicates of persons killed at Wolf 359 to pretend to escape from Wolf 359 and spy upon the Federation. Years later, in *Star Trek: First Contact* the Borg ship that travels back into Earth's past has a policy of assimilating every human possible, injecting nanoprobes to turn them into Borg. So did the Borg change their policy between "Q Who" and "The Best of Both Worlds" or between "The Best of Both Worlds" and *Star Trek: First Contact*? Or did different ships and groups of Borg have different policies in "Q Who", "The Best of Both Worlds", and *Star Trek: First Contact*? Or did all Borg have the same policy everywhere during "Q Who", "The Best of Both Worlds", and *Star Trek: First Contact*, but it was a complicated policy mandating extermination in some circumstances and assimilation in other circumstances? I have read that some of the Borg in *Star Trek: First Contact* looked liked that members of such local species as Klingons, Romulans, and Vulcans - I never noticed that myself. If so they would have been assimilated by the Borg in previous battles or invasions, or from among the *Enterprise* crew earlier in the movie. And I have heard that some Borg encountered in *Star Trek: Voyager* in the Delta Quadrant were allegedly Starfleet crew members captured and assimilated at Wolf 359. If so, how did they survive the explosion of the Borg Cube? Presumably the Borg cube could have sent a smaller ship contained within it back to the Delta Quadrant through a Borg transwarp conduit, and some of the people assimilated at Wolf 359 could have been among the drones in that ship sent to the Delta Quadrant. [How did Laura the drone end up in the Delta Quadrant?](https://scifi.stackexchange.com/questions/188358/how-did-laura-the-drone-end-up-in-the-delta-quadrant?rq=1)[4](https://scifi.stackexchange.com/questions/188358/how-did-laura-the-drone-end-up-in-the-delta-quadrant?rq=1) See also: <https://memory-alpha.fandom.com/wiki/Marika_Wilkarah>[5](https://memory-alpha.fandom.com/wiki/Marika_Wilkarah) So therefore, it is possible that the Borg began assimilating a lot of Humans and Federation citizens as early as "The Best of Both Worlds", and possibly as early as "Q Who". But the available evidence is totally inconclusive about the fate of the 18 crew members in "Q Who".
217,539
I always thought they were dead in battle. The Borg didn't believe in assimilating lifeforms until "Best of Both Worlds." Yet others argue they were assimilated, and hence they were into assimilation the whole time.
2019/08/15
[ "https://scifi.stackexchange.com/questions/217539", "https://scifi.stackexchange.com", "https://scifi.stackexchange.com/users/-1/" ]
The concept of assimilation was introduced in Best of Both Worlds, but later works develop the concept and even retcon it as the modus operandi of the Borg. The Voyager episode Raven, in particular, shows how 7 of 9 was assimilated years before the events of Q Who. As for Guinan not mentioning it - we see multiple times where assimilation is treated as efffectively death - even despite the recovery of individuals such as Picard, so perhaps she just didn't see the point of specifically mentioning it. So, the evidence points to the 18 crew members either dying from decompression or being assimilated. As has been discussed, EU novels indicate assimilation, but the TV shows and movies are silent on this matter. Either way, they would have been listed as simply missing, presumed dead.
It was revealed in the EU novel *[Greater than the Sum](https://memory-alpha.fandom.com/wiki/Greater_than_the_Sum)* that the eighteen crew members were in fact ***assimilated by the Borg***, rather than killed by exposure to space (or sliced in half by the Borg cutting beam), as the episode would seem to suggest. > > “I’m sorry, have we met before?” > >   “Of course, you wouldn’t recognize me, not like this…” She came to attention. “Lieutenant Rebekah Grabowski, sir. I was a member of your crew aboard the Enterprise-D for nearly two years…until I was taken.” > >   Picard’s jaw dropped. He recognized the name. **He remembered all their names, even after fifteen years. “Rebekah Grabowski. You were…one of the eighteen. The first eighteen people we ever lost to the Borg.”** > >   >   >   “It was difficult for us to function at first,” Hugh told the senior staff as they sat around the table in the observation lounge. The ex-drone-leader of the Liberated, as he called them-had come aboard along with Rebekah Grabowski, who still looked amazed and delighted to be on a Starfleet ship again, even a different Enterprise from the one she’d known. Picard was equally amazed to have her back. **He still remembered the day the Borg had carved a cylindrical section out of the ship like a core sample, taking her and seventeen others with it. At the time, he had not known of assimilation and had believed them to have been killed, discarded by a race that, according to Q, had been interested only in technology** (more proof, in retrospect, that Q was not a reliable source of information). After his experience as Locutus, he had wondered if perhaps they had survived as drones instead, and prayed that they had not. > > >
217,539
I always thought they were dead in battle. The Borg didn't believe in assimilating lifeforms until "Best of Both Worlds." Yet others argue they were assimilated, and hence they were into assimilation the whole time.
2019/08/15
[ "https://scifi.stackexchange.com/questions/217539", "https://scifi.stackexchange.com", "https://scifi.stackexchange.com/users/-1/" ]
The concept of assimilation was introduced in Best of Both Worlds, but later works develop the concept and even retcon it as the modus operandi of the Borg. The Voyager episode Raven, in particular, shows how 7 of 9 was assimilated years before the events of Q Who. As for Guinan not mentioning it - we see multiple times where assimilation is treated as efffectively death - even despite the recovery of individuals such as Picard, so perhaps she just didn't see the point of specifically mentioning it. So, the evidence points to the 18 crew members either dying from decompression or being assimilated. As has been discussed, EU novels indicate assimilation, but the TV shows and movies are silent on this matter. Either way, they would have been listed as simply missing, presumed dead.
**SHORT ANSWER:** Nobody knows. **LONG ANSWER:** The evidence is inconclusive. In "Q Who" there was no evidence that the Borg assimilated any biological beings into their collective. So presumably the Borg would probably have killed any Enterprise crew or passengers that survived the decompression when a section of the Enterprise was sliced off and seized by the Borg. But there is no proof that the Borg did kill them. It is possible that the Borg assimilated them, or dropped them off on a habitable planet, or did something else that didn't kill them. In "The Best of Both Worlds" the Borg assimilated one lifeform that we know of, Picard, for the special purpose of serving as a spokesdrone for the Collective during the conquest of the Earth and/or the entire Federation. Picard's message offered some hope of survival for other Earth people/Federation citizens: > > PICARD [on viewscreen]: I am Locutus of Borg. Resistance is futile. Your life as it has been is over. From this time forward, you will service us. > > > <http://www.chakoteya.net/NextGen/174.htm>[1](http://www.chakoteya.net/NextGen/174.htm) This offered some hope that some Earth people/Federation citizens would survive and live as workers for the Borg as employees, serfs, slaves - or possibly farm animals harvested for spare organs for Borg drones needing transplants. Of course Locutus could have been lying to reduce resistance and the actual plan of the Borg could have been extermination. Did the Borg assimilate anybody else during their invasion of the Federation? At the beginning of "The Best of Both Worlds Part 1" the *Enterprise* investigates the disappearance of the New Providence colony on the distant planet Jouret IV. > > [Planet surface] > > > RIKER: Mister O'Brien> > > > [Transporter room] > > > RIKER [OC]: Verify these are accurate coordinates for New Providence colony. > > > O'BRIEN: Coordinates verified, sir. > > > > > > > [Planet surface] > > > > > > > > > O'BRIEN [OC]: You're at the centre of town. > (The centre of town is at the edge of a massive crater) > > > <http://www.chakoteya.net/NextGen/174.htm>[1](http://www.chakoteya.net/NextGen/174.htm) They later search for traces of Borg energy in the soil to verify it was a Borg attack. There is absolutely no mention of getting information from survivors of the attack. So all of the colonists - men, women, and children - were either killed or captured and assimilated by the Borg. And there is no information whether the colonists were 100 percent killed and 0 percent assimilated, or 0 percent killed and 100 percent assimilated, or anywhere in between. In "The Best of Both Worlds Part 2" the *Enterprise* arrives at the site of the battle of Wolf 359 between "forty" starships and the invading Borg Cube. > > WESLEY: We're approaching the Wolf system, Captain. > > > RIKER: On my way. > > > [Bridge] > > > RIKER: Slow to impulse. Take us to the battle coordinates, Mister Crusher. Yellow alert. > > > WORF: Sensors are picking up several vessels, Captain. > > > RIKER: The fleet? > > > DATA: No active subspace fields. Negligible power readings. > > > RIKER: Life signs? > > > DATA: Negative, sir. > > > WORF: Visual contact. > > > RIKER: On screen. > > > (Fragments of starships, some with flashes of fires still burning) > > > SHELBY: The Tolstoy, the Kyushu, the Melbourne. > > > (Riker bows his head briefly for the crew that might have been his) > > > <http://www.chakoteya.net/NextGen/175.htm>[2](http://www.chakoteya.net/NextGen/175.htm) So all the starships that did not successfully retreat from the battle have been smashed. All crew members who didn't escape from the ships that were smashed by the Borg are dead, or else have been captured and assimilated and are now on the Borg cube. Tens, hundreds, or thousands of crew members may have escaped from smashed ships in shuttles and lifeboats. All of those tens, hundreds, or thousands of crew members have either escaped beyond range of the sensors of the *Enterprise*, been killed by the Borg, or been captured by the Borg and assimilated. The last group would now be on the Borg cube. The Borg cube explodes at the end of "The Best of Both Worlds Part 2". That presumably kills all lifeforms inside it, including everyone who might have been assimilated at New providence or Wolf 359. In "The Drumhead" retired Admiral Norah Satie questions Picard: > > SATIE: Tell me, Captain, have you completely recovered from your experience with the Borg? > > > PICARD: Yes, I have completely recovered. > > > SATIE: It must have been awful for you, actually becoming one of them, being forced to use your vast knowledge of Starfleet operations to aid the Borg. Just how many of our ships were lost? Thirty nine? And a loss of life, I believe, measured at nearly eleven thousand. One wonders how you can sleep at night, having caused so much destruction. I question your actions, Captain. I question your choices. I question your loyalty. > > > <http://www.chakoteya.net/NextGen/195.htm>[3](http://www.chakoteya.net/NextGen/195.htm) Admiral Hansen said that "forty" ships were gathered at Wolf 359 to fight the Borg. Satie said that thirty nine were were lost. So possibly there were only thirty nine ships at Wolf 359, and all thirty nine ships were destroyed. Or possibly Satie was wrong and there were forty ships at Wolf 359 and all forty were destroyed - though it would have been odd for her to understate the destruction she accused Picard of causing. Or possibly there were forty or more ships at Wolf 359 and one or more ships escaped. The *Enterprise* NCC-1701 D usually had about a thousand people aboard. If all thirty nine ships at Wolf 359 had that many people aboard, that would make a total of about thirty nine thousand. About thirty nine thousand (or about 38,000 to 40,000) minus almost eleven thousand (or about 10,500 to 11,000) makes a difference of about 27,000 to 29,500 persons. Maybe the difference is that most of the ships at Wolf 359 had much smaller crews than the *Enterprise* NCC-1701 D did. 10,500 to 11,000 divided by 39 is 269.23076 to 282.05128, so we might imagine that the typical ship at Wolf 359 had about 250 to 300 people aboard and everyone was killed. Maybe the difference is that most of the ships at Wolf 359 left most or all of their non combat essential crew and all their passengers at planets or starbases, etc., before reaching Wolf 359 for the battle and so had much fewer people aboard than the *Enterprise* NCC-1701 D did. Maybe tens, or hundreds, or thousands, or possibly tens of thousands, of crew members escaped from the Battle of Wolf 359 and were confirmed to be alive and well in the months before "The Drumhead". Maybe Satie drastically understated the number of deaths at Wolf 359 - though it would have been odd of her to understate the deaths she accused Picard of causing. Possibly the official death count only listed those crew members whose DNA had been identified in body parts found at Wolf 359, and all the thousands of other crew members were listed as "missing, presumed dead". But it would have been odd of Satie to exclude the "missing, presumed dead" from her count of the deaths she accused Picard of causing. Maybe some combination of all four factors explains the 27,000 to 29,500 person difference in fatalities at Wolf 359. So far there is no proof that the Borg assimilated any Federation citizen except for Picard, and no proof that they did not assimilate thousands of Federation citizens. Yeas later, "Emissary", the first episode of *star Trek: Deep Space NIne*, opened with a flashback to the *Saratoga* at the Battle of Wolf 359. The *Saratoga* is wrecked, and Benjamin Sisko's wife Jennifer is killed, but at least one escape pod escapes before the *Saratoga* explodes. Those aboard the escape pod include Benjamin Sisko and his young son Jake. And some fans have wondered how it was possible for this escape pod, and any others, to travel so far before the *Enterprise* arrived at the battle site that the scanners detected no life. Could Ben and Jake Sisko survive? Whether nor not Ben and Jake Sisko actually survived, three years later people who were accepted as Ben and Jake Sisko arrived at Deep Space Nine, where the alleged Commander Benjamin Sisko reported for duty and became the Starfleet commanding officer and the protagonist for all seven seasons of the show. In the television series *Branded* (1965-66) the protagonist Jason McCord was discharged from the US army for allegedly deserting his post at the (fictional) Battle of Bitter Creek, and became known as "the Coward of Bitter Creek". > > All but one man died. > > > There at Bitter Creek. > > > And they say he ran away... > > > And if Ben, Jake, and the others in their escape pod were the only survivors of the Battle of Wolf 359, they might have been suspected of desertion, or possibly of being captured and brainwashed by the Borg and serving as Borg spies. Possibly Ben Sisko would have been discharged from Starfleet and called "the Coward of Wolf 359". So it seems likely to me that a bunch of other shuttlecraft, escape pods, and lifeboats escaped from the starships at Wolf 359, carrying tens, hundreds, thousands, or possibly tens of thousands to persons to safety. Then people would probably either suspect all of the surviors of being cowards or Borg agents, or suspect none of them. So Ben Sisko would probably have continued his Starfleet career normally without being called "the Coward of Wolf 359" or (especially) suspected of being some sort of spy. But this is just speculation on my part. There is no evidence that anyone escaped from Wolf 359 except for Ben, Jake, and anyone else seen in their escape pod. And there is no proof that Ben, Jake, and anyone else seen in their escape pod actually survived and escaped. It is possible that some group, such as the Borg, Species 8472, or the Sphere Builders in *Star Trek: Enterprise* sent duplicates of persons killed at Wolf 359 to pretend to escape from Wolf 359 and spy upon the Federation. Years later, in *Star Trek: First Contact* the Borg ship that travels back into Earth's past has a policy of assimilating every human possible, injecting nanoprobes to turn them into Borg. So did the Borg change their policy between "Q Who" and "The Best of Both Worlds" or between "The Best of Both Worlds" and *Star Trek: First Contact*? Or did different ships and groups of Borg have different policies in "Q Who", "The Best of Both Worlds", and *Star Trek: First Contact*? Or did all Borg have the same policy everywhere during "Q Who", "The Best of Both Worlds", and *Star Trek: First Contact*, but it was a complicated policy mandating extermination in some circumstances and assimilation in other circumstances? I have read that some of the Borg in *Star Trek: First Contact* looked liked that members of such local species as Klingons, Romulans, and Vulcans - I never noticed that myself. If so they would have been assimilated by the Borg in previous battles or invasions, or from among the *Enterprise* crew earlier in the movie. And I have heard that some Borg encountered in *Star Trek: Voyager* in the Delta Quadrant were allegedly Starfleet crew members captured and assimilated at Wolf 359. If so, how did they survive the explosion of the Borg Cube? Presumably the Borg cube could have sent a smaller ship contained within it back to the Delta Quadrant through a Borg transwarp conduit, and some of the people assimilated at Wolf 359 could have been among the drones in that ship sent to the Delta Quadrant. [How did Laura the drone end up in the Delta Quadrant?](https://scifi.stackexchange.com/questions/188358/how-did-laura-the-drone-end-up-in-the-delta-quadrant?rq=1)[4](https://scifi.stackexchange.com/questions/188358/how-did-laura-the-drone-end-up-in-the-delta-quadrant?rq=1) See also: <https://memory-alpha.fandom.com/wiki/Marika_Wilkarah>[5](https://memory-alpha.fandom.com/wiki/Marika_Wilkarah) So therefore, it is possible that the Borg began assimilating a lot of Humans and Federation citizens as early as "The Best of Both Worlds", and possibly as early as "Q Who". But the available evidence is totally inconclusive about the fate of the 18 crew members in "Q Who".
29,970,439
I can view files on my embedded Windows CE device via Windows CE Remote File Viewer, but would prefer to do it through the command line. Is this possible?
2015/04/30
[ "https://Stackoverflow.com/questions/29970439", "https://Stackoverflow.com", "https://Stackoverflow.com/users/366786/" ]
Yes, since SO is for programmers the answer is following api's: [CeFindFirstFile](https://msdn.microsoft.com/en-us/library/aa917424.aspx) [CeFindNextFile](https://msdn.microsoft.com/en-us/library/aa918923.aspx)
Somebody's done the hard work for you already. The xda project has a set of command line utilities that communicate over RAPI including: pdir - list wince directory <http://itsme.home.xs4all.nl/projects/xda/tools.html>
6,408,771
Is there a way to directly use HTML tags in iPhone SDK? I was wondering how could I display the following text using HTML in a UILabel : > > My *name* is **Nitish** and I am **24** years *old*. > > >
2011/06/20
[ "https://Stackoverflow.com/questions/6408771", "https://Stackoverflow.com", "https://Stackoverflow.com/users/541786/" ]
It does not seem to be allowed. Look at following post as well: * [iPhone - UILabel containing text with multiple fonts at the same time](https://stackoverflow.com/questions/1417346/iphone-uilabel-containing-text-with-multiple-fonts-at-the-same-time/1417365#1417365) Look at this alternative as well: * [iPhone - UILabel containing text with multiple fonts at the same time (another asnwer)](https://stackoverflow.com/questions/1417346/iphone-uilabel-containing-text-with-multiple-fonts-at-the-same-time/1532634#1532634)
You can't use UILabel to display richtext, you will have to move to CoreText. <https://github.com/Cocoanetics/NSAttributedString-Additions-for-HTML> will allow you to create NASttributeString from HTML source.
6,408,771
Is there a way to directly use HTML tags in iPhone SDK? I was wondering how could I display the following text using HTML in a UILabel : > > My *name* is **Nitish** and I am **24** years *old*. > > >
2011/06/20
[ "https://Stackoverflow.com/questions/6408771", "https://Stackoverflow.com", "https://Stackoverflow.com/users/541786/" ]
You can't use UILabel to display richtext, you will have to move to CoreText. <https://github.com/Cocoanetics/NSAttributedString-Additions-for-HTML> will allow you to create NASttributeString from HTML source.
This library might help. <https://github.com/elijahdou/RTLabel> Simple rich text display for iOS using html-like markups
6,408,771
Is there a way to directly use HTML tags in iPhone SDK? I was wondering how could I display the following text using HTML in a UILabel : > > My *name* is **Nitish** and I am **24** years *old*. > > >
2011/06/20
[ "https://Stackoverflow.com/questions/6408771", "https://Stackoverflow.com", "https://Stackoverflow.com/users/541786/" ]
It does not seem to be allowed. Look at following post as well: * [iPhone - UILabel containing text with multiple fonts at the same time](https://stackoverflow.com/questions/1417346/iphone-uilabel-containing-text-with-multiple-fonts-at-the-same-time/1417365#1417365) Look at this alternative as well: * [iPhone - UILabel containing text with multiple fonts at the same time (another asnwer)](https://stackoverflow.com/questions/1417346/iphone-uilabel-containing-text-with-multiple-fonts-at-the-same-time/1532634#1532634)
This library might help. <https://github.com/elijahdou/RTLabel> Simple rich text display for iOS using html-like markups
411,201
There was a term I read years ago, probably in my college course on childhood development, and for the life of me I cannot remember the actual term. It describes a trip or experience where a pre-adult leaves their home for a period and experiences life away from their parents and household rules and such. After the trip/experience, the youth returns home. It's either implied or explicitly more than 1 day, and usually between a week and 6 months in length. Typical examples are summer camp and boarding school. It could also be an extended field trip, living with a relative during the summer, or going on a camping trip (provided their parents don't go on the same trip). Kiki's training period in a new city in [*Kiki's Delivery Service*](http://www.imdb.com/title/tt0097814/) would fit the bill. I *think* it started with ex-, but I could be wrong on that since the word often goes with "experience". Example sentence: "My son is 12 now, and he should really have a(n) \_\_\_\_\_ experience soon."
2017/09/22
[ "https://english.stackexchange.com/questions/411201", "https://english.stackexchange.com", "https://english.stackexchange.com/users/101837/" ]
Aussies (I think) use "walkabout," tho not exclusively for that age group. Maybe 'visionquest,' for the meditatively inclined. The only 'ex' word that comes to mind is "expedition."
The word ***extrafamilial*** exists and both Merriam Webster and the OED have entries for it. (MW spells it as a single word, OED hyphenates it) The OED entry, with the sole example given is: > > extra-faˈmilial adj. outside the family. > > > 1952 C. P. Blacker Eugenics: Galton & After xi. 312 Their > nutrition is surprisingly average—doubtless due to extra-familial > feeding in schools. > > >
411,201
There was a term I read years ago, probably in my college course on childhood development, and for the life of me I cannot remember the actual term. It describes a trip or experience where a pre-adult leaves their home for a period and experiences life away from their parents and household rules and such. After the trip/experience, the youth returns home. It's either implied or explicitly more than 1 day, and usually between a week and 6 months in length. Typical examples are summer camp and boarding school. It could also be an extended field trip, living with a relative during the summer, or going on a camping trip (provided their parents don't go on the same trip). Kiki's training period in a new city in [*Kiki's Delivery Service*](http://www.imdb.com/title/tt0097814/) would fit the bill. I *think* it started with ex-, but I could be wrong on that since the word often goes with "experience". Example sentence: "My son is 12 now, and he should really have a(n) \_\_\_\_\_ experience soon."
2017/09/22
[ "https://english.stackexchange.com/questions/411201", "https://english.stackexchange.com", "https://english.stackexchange.com/users/101837/" ]
For some Amish and some other Mennonites, it's [rumspringa](https://en.wikipedia.org/wiki/Rumspringa). It's a Pennsylvania German noun meaning "*running around*". It serves as an adolescent rite of passage, before deciding whether to commit to the community.
The word ***extrafamilial*** exists and both Merriam Webster and the OED have entries for it. (MW spells it as a single word, OED hyphenates it) The OED entry, with the sole example given is: > > extra-faˈmilial adj. outside the family. > > > 1952 C. P. Blacker Eugenics: Galton & After xi. 312 Their > nutrition is surprisingly average—doubtless due to extra-familial > feeding in schools. > > >
299,880
> > What's he doing? > > > Is this "what's" contraction the same as: > > What's his last name? > > > What's the last time he showered? > > > Why or why not? I ask because the first sentence sounds a little unnatural to me (but I'm not a native English speaker). And the other two sound natural.
2021/10/12
[ "https://ell.stackexchange.com/questions/299880", "https://ell.stackexchange.com", "https://ell.stackexchange.com/users/1806/" ]
In the initial example sentence > > Dr Iannis had enjoyed a satisfactory day in which none of his patients had died or got any worse. > > > Neither a patient dying nor a patient getting worse would be things that Dr Iannis did. But in the proposed parallel sentence > > (1) I had enjoyed a satisfactory day in which none of my tasks had been procrastinated and no time been wasted idling. > > > both procrastination and idling would seem to be things that the speaker had done, or rather failed to do. This makes (1) somewhat less natural than the initial example, IMO. But it does not make (1) wrong, and if the somewhat unusual stylistic effect is intended, that is fine. But please be aware that this does have a somewhat odd effect, adn a reader is apt to read it over twice before accepting it, I think I agree with Kate Bunting that "*procrastinate*" isn't normally used with a direct object. But I don't think that such a use is totally unacceptable, any more than verbing a noun not usually treated as a verb. It does add to the unusual effect, and might be part of the intended style. The phrase "put off" is clearer and less surprising, and would probably be better unless the odd stylistic effect is part of the author's intent, which I rather suspect it is here.
Yes, it is the past perfect and *had* is intended to apply to both verbs. Your first sentence works, except that *procrastinate* isn't normally used with a direct object. You could say 'none of my tasks had been put off'.
276,104
I have some LDO regulators but I cannot dissipate enough heat. Is it possible to reduce voltage on each branch before going through the regulator ? I was thinking about some resistors. [![Diagram](https://i.stack.imgur.com/dSdxV.jpg)](https://i.stack.imgur.com/dSdxV.jpg)
2016/12/21
[ "https://electronics.stackexchange.com/questions/276104", "https://electronics.stackexchange.com", "https://electronics.stackexchange.com/users/126774/" ]
Since you're using a linear regulator, not a buck converter (as @AliChen pointed out), the total power you dissipate will be (Vout - Vin) \* current. Adding resistors won't change this equation; it will just move heat from the regulator chip to the resistor. If you want to avoid the heat dissipation, you should use a buck converter. (The first line of your question says you're using a buck converter, but in the comments you say it's a LM2940 regulator, not a buck converter.) To put some numbers on this, you say you have 5 branches, each with 5V at .7A. So linear regulation will dissipate 7V \* 3.5A = 24.5 watts. If you use a 90% efficient buck converter, you will dissipate 10% \* 5V \* 3.5A which is just 1.75 watts. Alternatively, can you use a 9V (or lower) power supply? This would cut the dissipation down to 14 watts.
I am reasonably confident that a modern 3.5A internal power switch buck running at 1MHz or so will be of the same order of size as your 5 linear regs + 5 tants (Especially once you beef the voltage rating on those 6.3V tants up to something that might actually make them reliable!), and will be FAR more efficient . LM8610AC looks sane at first glance, datasheet has a 2MHz design with a 2.2uH inductor and all ceramic caps which looks reasonable to me. Layout matters with that stuff, so follow the datasheet design.
3,854,167
I now have 2 users whose names are not correctly displayed in the 'welcome' menu at the top right of the page. The first user married and her surname changed. The new name was entered in ActiveDirectory but her maiden name is still displayed. In the second case, a LAN id was reallocated to a new department member. The name of the previous user is displayed in the portal. The AD synchronising appears to be running every night and I can see no errors there. The AD entries for the 2 users appears correct and no hint of the previous data. What else can I do to force an update of the user information?
2010/10/04
[ "https://Stackoverflow.com/questions/3854167", "https://Stackoverflow.com", "https://Stackoverflow.com/users/11249/" ]
I have experenced this before, on the Microsoft blogs there is this helpful post <http://blogs.msdn.com/b/krichie/archive/2006/02/18/534767.aspx> I hope it helps you
This kind of information is stored in the content database's [UserInfo table](http://msdn.microsoft.com/en-us/library/dd588089%28office.11%29.aspx). [This article](http://blogs.msdn.com/b/spfargo/archive/2009/02/13/guidance-user-info-synch-in-moss-2007.aspx) may be useful to you. Keep in mind that changing the data in the UserInfo table directly is not supported. If you still want to edit this manually, you'll have to use the object model.
3,854,167
I now have 2 users whose names are not correctly displayed in the 'welcome' menu at the top right of the page. The first user married and her surname changed. The new name was entered in ActiveDirectory but her maiden name is still displayed. In the second case, a LAN id was reallocated to a new department member. The name of the previous user is displayed in the portal. The AD synchronising appears to be running every night and I can see no errors there. The AD entries for the 2 users appears correct and no hint of the previous data. What else can I do to force an update of the user information?
2010/10/04
[ "https://Stackoverflow.com/questions/3854167", "https://Stackoverflow.com", "https://Stackoverflow.com/users/11249/" ]
This kind of information is stored in the content database's [UserInfo table](http://msdn.microsoft.com/en-us/library/dd588089%28office.11%29.aspx). [This article](http://blogs.msdn.com/b/spfargo/archive/2009/02/13/guidance-user-info-synch-in-moss-2007.aspx) may be useful to you. Keep in mind that changing the data in the UserInfo table directly is not supported. If you still want to edit this manually, you'll have to use the object model.
1. check the effective permission of user/group by accessing the portal URL link, click on site actions --> site settings -->check effective permissions 2. make sure to note down the effective permission for user/group without fail 3. click on all people link above site permissions and search for the user/group name which should still be displaying old name 4. remove the user/group name from all people 5. add the user/group name to the required group as per note done in step no. 2 6. now if user close the browser (refresh the page) and re-login new diaply name would be displayed
3,854,167
I now have 2 users whose names are not correctly displayed in the 'welcome' menu at the top right of the page. The first user married and her surname changed. The new name was entered in ActiveDirectory but her maiden name is still displayed. In the second case, a LAN id was reallocated to a new department member. The name of the previous user is displayed in the portal. The AD synchronising appears to be running every night and I can see no errors there. The AD entries for the 2 users appears correct and no hint of the previous data. What else can I do to force an update of the user information?
2010/10/04
[ "https://Stackoverflow.com/questions/3854167", "https://Stackoverflow.com", "https://Stackoverflow.com/users/11249/" ]
I have experenced this before, on the Microsoft blogs there is this helpful post <http://blogs.msdn.com/b/krichie/archive/2006/02/18/534767.aspx> I hope it helps you
1. check the effective permission of user/group by accessing the portal URL link, click on site actions --> site settings -->check effective permissions 2. make sure to note down the effective permission for user/group without fail 3. click on all people link above site permissions and search for the user/group name which should still be displaying old name 4. remove the user/group name from all people 5. add the user/group name to the required group as per note done in step no. 2 6. now if user close the browser (refresh the page) and re-login new diaply name would be displayed
3,854,167
I now have 2 users whose names are not correctly displayed in the 'welcome' menu at the top right of the page. The first user married and her surname changed. The new name was entered in ActiveDirectory but her maiden name is still displayed. In the second case, a LAN id was reallocated to a new department member. The name of the previous user is displayed in the portal. The AD synchronising appears to be running every night and I can see no errors there. The AD entries for the 2 users appears correct and no hint of the previous data. What else can I do to force an update of the user information?
2010/10/04
[ "https://Stackoverflow.com/questions/3854167", "https://Stackoverflow.com", "https://Stackoverflow.com/users/11249/" ]
I have experenced this before, on the Microsoft blogs there is this helpful post <http://blogs.msdn.com/b/krichie/archive/2006/02/18/534767.aspx> I hope it helps you
No need to change data directly OR manually update the SQL table. When you remove the user from any group, this also removes the user from the userInfo table in the Microsoft SQL Server database. When you re-add the user, the user's information is automatically updated in this table.
3,854,167
I now have 2 users whose names are not correctly displayed in the 'welcome' menu at the top right of the page. The first user married and her surname changed. The new name was entered in ActiveDirectory but her maiden name is still displayed. In the second case, a LAN id was reallocated to a new department member. The name of the previous user is displayed in the portal. The AD synchronising appears to be running every night and I can see no errors there. The AD entries for the 2 users appears correct and no hint of the previous data. What else can I do to force an update of the user information?
2010/10/04
[ "https://Stackoverflow.com/questions/3854167", "https://Stackoverflow.com", "https://Stackoverflow.com/users/11249/" ]
No need to change data directly OR manually update the SQL table. When you remove the user from any group, this also removes the user from the userInfo table in the Microsoft SQL Server database. When you re-add the user, the user's information is automatically updated in this table.
1. check the effective permission of user/group by accessing the portal URL link, click on site actions --> site settings -->check effective permissions 2. make sure to note down the effective permission for user/group without fail 3. click on all people link above site permissions and search for the user/group name which should still be displaying old name 4. remove the user/group name from all people 5. add the user/group name to the required group as per note done in step no. 2 6. now if user close the browser (refresh the page) and re-login new diaply name would be displayed
31,571,931
Is it possible to make FF Reader View default for normal browsing? I've looked in about:config and only see 1 line regarding.
2015/07/22
[ "https://Stackoverflow.com/questions/31571931", "https://Stackoverflow.com", "https://Stackoverflow.com/users/5145079/" ]
I also understand why they do it. But I disagree. If the pages don't load well, then it is (or should be) an option for the user to load the full page. That is, consider it to be a toggle, where each page can be "reader view" or "standard view" and the user can easily switch between then. Then the question is just which is default. Once loaded, the other option can be selected, if the page is too ugly in the view that is chosen.
There are times I wish the same. However, I understand why they don't do it: If you click on a link - for example on the news.google.com page, when you click on the reader view, you get a message, "Automatic content extraction failed" due to the layout and multiple pictures/headings in columns. If you're on the main Google News page and click on a link and then click on the Reader View, you get mixed results - some articles render well, others don't accept the rerendering. Other pages I've viewed - main page of cnsnews.com for instance, will attempt to render in reader view but it is butt ugly. So, it is tough to "always" show in reader view.
25,479,775
How to make a wizard style like: <http://www.codecademy.com/courses/web-beginner-en-HZA3b/0/1?curriculum_id=50579fb998b470000202dc8b> (when open page then it shows a tooltip with "NEXT" button on it which explains how to use the application) I have searched for JQuery Wizard or Steps on Google but nothing similar found. I have tried to use <http://thecodemine.org/#> a formwizard and adapt to my website but with no result because it is for forms. If this isn't the place to ask questions as this, please tell me to delete.
2014/08/25
[ "https://Stackoverflow.com/questions/25479775", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2571001/" ]
Also you can use <http://linkedin.github.io/hopscotch/> for normal or <http://bootstraptour.com/> if you using bootstrap
Try "Website Tour Plugin": <http://tympanus.net/codrops/2010/12/21/website-tour/> It is similar to your recommended link.
67,305
I know that you can integrate Google calendar with evolution, but it doesn't seems to work for me. Once I add something to my Google calendar, it never updates in Evolution. Please don't send me to [the Ubuntu help wiki page](https://help.ubuntu.com/community/GoogleCalendarWithEvolution) because I already tried following the instructions there a lot of times and nothing works.
2011/10/16
[ "https://askubuntu.com/questions/67305", "https://askubuntu.com", "https://askubuntu.com/users/24345/" ]
**Calendar Extension for Thunderbird** Install this plug-in: [xul-ext-lightning](http://packages.ubuntu.com/xul-ext-lightning) [![Install xul-ext-lightning](https://hostmar.co/software-small)](http://apt.ubuntu.com/p/xul-ext-lightning) --- **Google calendar and Evolution....** Currently there is a bug in evolution. A workaround to do the following: * [Option to sync to Google Calendar doesn't show up in Evolution](https://askubuntu.com/questions/73828/option-to-sync-to-google-calendar-doesnt-show-up-in-evolution/73856#73856) --- **How to migrate from evolution to Thunderbird...** * [Migrating from Evolution to Thunderbird](https://askubuntu.com/questions/27410/migrating-from-evolution-to-thunderbird/27413#27413)
I'm using Thunderbird with the addon Lightning to integrate my GCal with Ubuntu and I'm happy with that.
274,489
I want to ask if magnetic field lines are always circular and If YES , Then WHY ??? Or on What basis we can say that magnetic field lines are always circular ?? I am confused with the topic . It is my humble request to help me out if you can . I am waiting for your answer . I shall be highly obliged to you if you clear this doubt .
2016/08/15
[ "https://physics.stackexchange.com/questions/274489", "https://physics.stackexchange.com", "https://physics.stackexchange.com/users/121512/" ]
Magnetic field lines always follow a closed path. That is, they are always loops. If you see a diagram showing 'ends' of field lines, it is only showing part of the lines--in that case we can assume that one 'end' of a line shown in the diagram actually loops back to the other 'end' of that same line. The loops certainly don't have to follow an exact circle, though. They can be elliptic or any oddball shape you can imagine. Their shape depends on the various structures that create them.
Magnetic field lines aren't always circular it's just that the most simple magnetic fields (those around wires or solenoids) are circular or elliptical. Really though, magnetic field shapes are just dependent on the movement and distribution of charge. You can see here how field lines in the middle of a loop with current would be straight. [![You can see here how field lines in the middle of a loop with current would be straight.](https://i.stack.imgur.com/D6w8p.jpg)](https://i.stack.imgur.com/D6w8p.jpg)
274,489
I want to ask if magnetic field lines are always circular and If YES , Then WHY ??? Or on What basis we can say that magnetic field lines are always circular ?? I am confused with the topic . It is my humble request to help me out if you can . I am waiting for your answer . I shall be highly obliged to you if you clear this doubt .
2016/08/15
[ "https://physics.stackexchange.com/questions/274489", "https://physics.stackexchange.com", "https://physics.stackexchange.com/users/121512/" ]
Magnetic field lines always follow a closed path. That is, they are always loops. If you see a diagram showing 'ends' of field lines, it is only showing part of the lines--in that case we can assume that one 'end' of a line shown in the diagram actually loops back to the other 'end' of that same line. The loops certainly don't have to follow an exact circle, though. They can be elliptic or any oddball shape you can imagine. Their shape depends on the various structures that create them.
Many magnetic fields are circular. Think about how currents in electro-magnets and generators flow. They flow in circular patterns so the magnetic field sometimes copies patterns of electron movement.
37,315
Noodles are tasty. I like them, but why are they also used as an exclamation of dismay in the following? > > Oh Noodles! > > >
2011/08/09
[ "https://english.stackexchange.com/questions/37315", "https://english.stackexchange.com", "https://english.stackexchange.com/users/1696/" ]
It has no real origin, just something one could say any other day. My friend says "Oh, fish!", and that doesn't have an etymology or an origin either, just an expression that someone might use idiosyncratically.
I would imagine that someone using such an expression indeed does NOT like noodles. It's a euphemism. Instead of saying some sort of expletive he's cleaned his diction up and used something he thinks that would be humorous. I approve =) I also LOVE noodles.
37,315
Noodles are tasty. I like them, but why are they also used as an exclamation of dismay in the following? > > Oh Noodles! > > >
2011/08/09
[ "https://english.stackexchange.com/questions/37315", "https://english.stackexchange.com", "https://english.stackexchange.com/users/1696/" ]
It has no real origin, just something one could say any other day. My friend says "Oh, fish!", and that doesn't have an etymology or an origin either, just an expression that someone might use idiosyncratically.
In "[Two Towers](https://books.google.com/books?id=2jf8Tna_MxMC&pg=PA240&dq=%22Noodles!%20My%20beautiful%20rope!%22&hl=en&newbks=1&newbks_redir=0&source=gb_mobile_search&sa=X&ved=2ahUKEwi3l_W-gq75AhWAEFkFHVNOBnoQ6AF6BAgGEAM#v=onepage&q=%22Noodles!%20My%20beautiful%20rope!%22&f=false)" by J.R.R. Tolkien (1954), Sam Gamjee goes "Noodles!" as an exclamation. Based on the context, I'm guessing it's like "oh shit!" > > But Sam did not answer: he was staring back up the cliff. 'Ninnyhammers!' he said. 'Noodles! My beautiful rope! There it is tied to a stump, and we're at the bottom.' > > >
37,315
Noodles are tasty. I like them, but why are they also used as an exclamation of dismay in the following? > > Oh Noodles! > > >
2011/08/09
[ "https://english.stackexchange.com/questions/37315", "https://english.stackexchange.com", "https://english.stackexchange.com/users/1696/" ]
In "[Two Towers](https://books.google.com/books?id=2jf8Tna_MxMC&pg=PA240&dq=%22Noodles!%20My%20beautiful%20rope!%22&hl=en&newbks=1&newbks_redir=0&source=gb_mobile_search&sa=X&ved=2ahUKEwi3l_W-gq75AhWAEFkFHVNOBnoQ6AF6BAgGEAM#v=onepage&q=%22Noodles!%20My%20beautiful%20rope!%22&f=false)" by J.R.R. Tolkien (1954), Sam Gamjee goes "Noodles!" as an exclamation. Based on the context, I'm guessing it's like "oh shit!" > > But Sam did not answer: he was staring back up the cliff. 'Ninnyhammers!' he said. 'Noodles! My beautiful rope! There it is tied to a stump, and we're at the bottom.' > > >
I would imagine that someone using such an expression indeed does NOT like noodles. It's a euphemism. Instead of saying some sort of expletive he's cleaned his diction up and used something he thinks that would be humorous. I approve =) I also LOVE noodles.
5,321,789
Has anyone here done any benchmarking of Chameleon versus Jinja2, in respect to performance? I'm more used to the Jinja syntax, since I come from Django, but as Pyramid suggests to use Chameleon, I'm thinking if it would be nice to give it a try - despite having an awkward syntax, IMO.
2011/03/16
[ "https://Stackoverflow.com/questions/5321789", "https://Stackoverflow.com", "https://Stackoverflow.com/users/420539/" ]
I think they are pretty close, and each would probably win depending on the benchmark. I think it's better to pick a templating engine based on how much you like the syntax (I prefer [pyTenjin](http://www.kuwata-lab.com/tenjin/)) and how easy it is to integrate it into your own project/framework. Jinja2 is similar to Mako in speed (~20x faster than Django): [source](http://jinja.pocoo.org/docs/faq/) Chameleon is also about 20x faster than Django: [source](http://blog.penzilla.net/2010/02/python-template-language-performance.html) And pyTenjin is also up there: [source](http://www.kuwata-lab.com/tenjin/#Introduction)
Keep in mind that jinja2 also has an "official" set of pyramid bindings via [pyramid\_jinja2](http://pypi.python.org/pypi/pyramid_jinja2) The fact that Chamelon is anymore "core" than Jinja2 is mostly an artifact of pyramid's history of repoze.bfg
5,321,789
Has anyone here done any benchmarking of Chameleon versus Jinja2, in respect to performance? I'm more used to the Jinja syntax, since I come from Django, but as Pyramid suggests to use Chameleon, I'm thinking if it would be nice to give it a try - despite having an awkward syntax, IMO.
2011/03/16
[ "https://Stackoverflow.com/questions/5321789", "https://Stackoverflow.com", "https://Stackoverflow.com/users/420539/" ]
Template engines are rarely the cause of performance problems, even if chameleon is slightly faster than Jinja2 I doubt the effort of learning a new template language etc. is worth it. Optimization of database queries and caching will probably result in more performance than you could gain by switching the template engine and take little effort.
I think they are pretty close, and each would probably win depending on the benchmark. I think it's better to pick a templating engine based on how much you like the syntax (I prefer [pyTenjin](http://www.kuwata-lab.com/tenjin/)) and how easy it is to integrate it into your own project/framework. Jinja2 is similar to Mako in speed (~20x faster than Django): [source](http://jinja.pocoo.org/docs/faq/) Chameleon is also about 20x faster than Django: [source](http://blog.penzilla.net/2010/02/python-template-language-performance.html) And pyTenjin is also up there: [source](http://www.kuwata-lab.com/tenjin/#Introduction)
5,321,789
Has anyone here done any benchmarking of Chameleon versus Jinja2, in respect to performance? I'm more used to the Jinja syntax, since I come from Django, but as Pyramid suggests to use Chameleon, I'm thinking if it would be nice to give it a try - despite having an awkward syntax, IMO.
2011/03/16
[ "https://Stackoverflow.com/questions/5321789", "https://Stackoverflow.com", "https://Stackoverflow.com/users/420539/" ]
Template engines are rarely the cause of performance problems, even if chameleon is slightly faster than Jinja2 I doubt the effort of learning a new template language etc. is worth it. Optimization of database queries and caching will probably result in more performance than you could gain by switching the template engine and take little effort.
Keep in mind that jinja2 also has an "official" set of pyramid bindings via [pyramid\_jinja2](http://pypi.python.org/pypi/pyramid_jinja2) The fact that Chamelon is anymore "core" than Jinja2 is mostly an artifact of pyramid's history of repoze.bfg
4,547,952
How do we check there are any memory leaks in a web site? Are there any tools available for free to check memory leakage in the web portal. I am using the php and Mysql technologies for the site.
2010/12/28
[ "https://Stackoverflow.com/questions/4547952", "https://Stackoverflow.com", "https://Stackoverflow.com/users/238052/" ]
Is the time an essential part of the problem you're solving? Or is it an implementation detail? If the problem you're solving is one of memory use, two other possibilities spring to mind: * An LRU Map. There are a number of these on the web. * A Map backed by WeakReference or SoftReference objects, which allow the GC to collect those items. **EDIT** In that case, there are some existing implementations that might save you some time. For instance: * [TimedHashMap](http://reteptools.kenai.com/api/retepTools/SNAPSHOT/uk/org/retep/util/collections/TimedHashMap.html) (one implementation) * [TimedHashMap](http://code.google.com/p/modex44107gr1/source/browse/trunk/Routage/src/Utils/TimedHashMap.java?r=578) (another implementation)
If you are doing this because of some memory issue (the map is a temporal cache), you should probably consider using soft references ([documentation](http://download.oracle.com/javase/1.4.2/docs/api/java/lang/ref/SoftReference.html)).
4,547,952
How do we check there are any memory leaks in a web site? Are there any tools available for free to check memory leakage in the web portal. I am using the php and Mysql technologies for the site.
2010/12/28
[ "https://Stackoverflow.com/questions/4547952", "https://Stackoverflow.com", "https://Stackoverflow.com/users/238052/" ]
Is the time an essential part of the problem you're solving? Or is it an implementation detail? If the problem you're solving is one of memory use, two other possibilities spring to mind: * An LRU Map. There are a number of these on the web. * A Map backed by WeakReference or SoftReference objects, which allow the GC to collect those items. **EDIT** In that case, there are some existing implementations that might save you some time. For instance: * [TimedHashMap](http://reteptools.kenai.com/api/retepTools/SNAPSHOT/uk/org/retep/util/collections/TimedHashMap.html) (one implementation) * [TimedHashMap](http://code.google.com/p/modex44107gr1/source/browse/trunk/Routage/src/Utils/TimedHashMap.java?r=578) (another implementation)
Take a look at [Guava](http://guava-libraries.googlecode.com/svn/trunk/javadoc/com/google/common/collect/MapMaker.html) - it's a collection library from Google. In particular, you want to look at CacheBuilder and its computing maps. One of its features is "time-based expiration of entries, measured since last access or last write", sounds like exactly what you're looking for. (Edited to talk about CacheBuilder; it's new since I posted this and is more relevant to the question)
67,895
Is it common to switch between natural, harmonic, and melodic minor scales when playing the same piece or is it best to stick with one?
2018/03/13
[ "https://music.stackexchange.com/questions/67895", "https://music.stackexchange.com", "https://music.stackexchange.com/users/46644/" ]
It depends to a degree on what genre of music it is, but it's not uncommon to use the notes from the different minor scales. In early music, the melodic was favoured, going up in melody one way, and using slightly different notes if the melody descended. Some pieces use solely the harmonic minor notes, and some only the natural minor notes. In fact, for all three, the first five notes in the scale are the same anyway. There are also modes which work in a minor fashion - the Aeolian is the natural minor, but there's also the Dorian and Phrygian, all containing that minor third from the root, making them ideal for a minor flavoured piece. Jazzers seem to like the melodic minor scale notes, but use the ascending set only.
Well, it depends on whether you are playing melody or harmony, obviously. It's also pretty common for melodic instrument to play melodic minor on ascending scales and natural minor on descending scales. Whether it's "best to stick with one" very much depends on the character of the piece and the intent of the interpreter. The original of "Greensleeves" is a bit of a mixture of natural and melodic minor but it maps pretty well to the Dorian mode, and when you are playing it modally, sticking with the scale (and the respective harmonizations) makes for a more consistent character. But if you are not after that sort of medieval or renaissance character, it's rather more than less common to vary according to local criteria.
67,895
Is it common to switch between natural, harmonic, and melodic minor scales when playing the same piece or is it best to stick with one?
2018/03/13
[ "https://music.stackexchange.com/questions/67895", "https://music.stackexchange.com", "https://music.stackexchange.com/users/46644/" ]
From a "Common Practice" point of view, there is only the minor mode; there is also only a single minor scale but two of the notes are mutable. The sixth and seventh notes of the minor scale can be either the normal (agrees with the key signature) or raised. Which note is used depends mostly on local harmonic or melodic action or the whim of the composer. There are a few common practices but these are often violated for artistic reasons. For melodies. (I'll use b and # for the two forms of notes 6 and 7 regardless of the actual signature used. Also normal and raised or flat and sharp. There's not a good terminology.) If the prevailing harmony is dominant, the raised forms of notes 6 and 7 are used. If the prevailing harmony is subdominant, the normal forms of notes 6 and 7 are used. If the prevailing harmony is tonic, the raised forms of notes 6 and 7 are preferred in ascending melodic lines and the normal forms in descending melodic lines. Sometimes, especially in instrumental music, the normal form of note 6 and raised from of note 7 is used. An arpeggio of a dominant ninth chord uses notes 4,5,6,and the #7 and 2 (or 9). The upper neighbor of 5 is the flat form of 6 as this makes a semitone and is much stronger sounding than the raised form. For harmony. The major form of the dominant chord is preferred at cadences; the minor chord is common other places. The major IV chord does occur but not as often as the iv chord. The ii0 is common but ii minor and II do occur, the latter acting as a secondary dominant. The augmented III chord is rare except as a passing harmony The VII chord occurs often (and acts a bit like a subdominant) as does the #vii0 which acts similarly to the vii0 in a major key. The practice of using various minor scales isn't common in the classical era; it's a more recent viewpoint. It doesn't much matter how one derives things if they sound good.
Well, it depends on whether you are playing melody or harmony, obviously. It's also pretty common for melodic instrument to play melodic minor on ascending scales and natural minor on descending scales. Whether it's "best to stick with one" very much depends on the character of the piece and the intent of the interpreter. The original of "Greensleeves" is a bit of a mixture of natural and melodic minor but it maps pretty well to the Dorian mode, and when you are playing it modally, sticking with the scale (and the respective harmonizations) makes for a more consistent character. But if you are not after that sort of medieval or renaissance character, it's rather more than less common to vary according to local criteria.
67,895
Is it common to switch between natural, harmonic, and melodic minor scales when playing the same piece or is it best to stick with one?
2018/03/13
[ "https://music.stackexchange.com/questions/67895", "https://music.stackexchange.com", "https://music.stackexchange.com/users/46644/" ]
From a "Common Practice" point of view, there is only the minor mode; there is also only a single minor scale but two of the notes are mutable. The sixth and seventh notes of the minor scale can be either the normal (agrees with the key signature) or raised. Which note is used depends mostly on local harmonic or melodic action or the whim of the composer. There are a few common practices but these are often violated for artistic reasons. For melodies. (I'll use b and # for the two forms of notes 6 and 7 regardless of the actual signature used. Also normal and raised or flat and sharp. There's not a good terminology.) If the prevailing harmony is dominant, the raised forms of notes 6 and 7 are used. If the prevailing harmony is subdominant, the normal forms of notes 6 and 7 are used. If the prevailing harmony is tonic, the raised forms of notes 6 and 7 are preferred in ascending melodic lines and the normal forms in descending melodic lines. Sometimes, especially in instrumental music, the normal form of note 6 and raised from of note 7 is used. An arpeggio of a dominant ninth chord uses notes 4,5,6,and the #7 and 2 (or 9). The upper neighbor of 5 is the flat form of 6 as this makes a semitone and is much stronger sounding than the raised form. For harmony. The major form of the dominant chord is preferred at cadences; the minor chord is common other places. The major IV chord does occur but not as often as the iv chord. The ii0 is common but ii minor and II do occur, the latter acting as a secondary dominant. The augmented III chord is rare except as a passing harmony The VII chord occurs often (and acts a bit like a subdominant) as does the #vii0 which acts similarly to the vii0 in a major key. The practice of using various minor scales isn't common in the classical era; it's a more recent viewpoint. It doesn't much matter how one derives things if they sound good.
It depends to a degree on what genre of music it is, but it's not uncommon to use the notes from the different minor scales. In early music, the melodic was favoured, going up in melody one way, and using slightly different notes if the melody descended. Some pieces use solely the harmonic minor notes, and some only the natural minor notes. In fact, for all three, the first five notes in the scale are the same anyway. There are also modes which work in a minor fashion - the Aeolian is the natural minor, but there's also the Dorian and Phrygian, all containing that minor third from the root, making them ideal for a minor flavoured piece. Jazzers seem to like the melodic minor scale notes, but use the ascending set only.
185,914
I have an outdoor light that is run by a regular wall switch. I want to change this to a mechanical timer switch. The mechanical timer switch has two ports for wires. When I opened the wall switch I found three black wires: one in each of the push in ports and one under a side screw. How do I wire in the mechanical switch that has two ports when I have three black wires attached to the old regular wall switch?
2020/03/04
[ "https://diy.stackexchange.com/questions/185914", "https://diy.stackexchange.com", "https://diy.stackexchange.com/users/113031/" ]
Sometimes receptacles and switches are used to join two wires together out of convenience. What you have is a regular switch with two terminals, but the electrician has used a push terminal and a screw terminal to join two hot (black) wires. The push terminal and screw terminal next to it are the same electrical connection. Lets say the top of the switch has a black wire on the screw *and* one in the push terminal and the bottom of the switch just has one wire in the push terminal... To hook up the new switch, you're going to pigtail the top two wires to one terminal on the timer. That means connecting the two black wires and a new short length of black wire with a wire nut and then connecting that short wire to the switch. The wire currently going to the bottom of your switch will just get connected to the other terminal on the timer.
OK, you've got a hot,black, wire coming from a breaker into the switch. From there another black wire is connected to almost the same location of the switch, probably using a backstab, making that wire hot to go to another location. Those two wires should be wire nutted together with a 6" piece of appropriately sized wire and connected to the line side of the switch. The black wire at the opposite end of the switch is the load wire going to the outdoor light and should be connected to the load side of the switch. If line and load terminals are not indicated, then either terminal can be used for your feed or light wire. As always, remember to turn off the power when doing any of this work and if you have a voltage tester or meter, verify the hot wires.
11,823,628
> > **Possible Duplicate:** > > [upload picture to emulator gallery](https://stackoverflow.com/questions/5151744/upload-picture-to-emulator-gallery) > > > I m using Android 4.1 (API 16). I want add images on android emulator. How can I implement this step by step? I have seen so many ways for that in stackoverflow but I'm not getting exact answer.
2012/08/06
[ "https://Stackoverflow.com/questions/11823628", "https://Stackoverflow.com", "https://Stackoverflow.com/users/1554297/" ]
You can also use the DDMS tool in eclipse to push or pull a file onto the emulator. On a 2.2 emulator I was able to push some .jpg images into the /mnt/sdcard/DCIM/100ANDRO folder using DDMS. I then had to go into the running emulator itself, select "Dev Tools" from the Apps screen, the select "Media Scanner" to get the emulator to recognize the files so they would be displayed in the Media Gallery.
Check it out from tutorials of SDK docs is a good option. As I am not sure what you want to get here. Just assume that, you want show images in your application. The basic way like this, 1. put a "ImageView" item in layout file, 2. put image file in res/drawable/ directory, 3. change the android:src item in layout file to the image file name, trim the extension part of the file name.
11,823,628
> > **Possible Duplicate:** > > [upload picture to emulator gallery](https://stackoverflow.com/questions/5151744/upload-picture-to-emulator-gallery) > > > I m using Android 4.1 (API 16). I want add images on android emulator. How can I implement this step by step? I have seen so many ways for that in stackoverflow but I'm not getting exact answer.
2012/08/06
[ "https://Stackoverflow.com/questions/11823628", "https://Stackoverflow.com", "https://Stackoverflow.com/users/1554297/" ]
You can also use the DDMS tool in eclipse to push or pull a file onto the emulator. On a 2.2 emulator I was able to push some .jpg images into the /mnt/sdcard/DCIM/100ANDRO folder using DDMS. I then had to go into the running emulator itself, select "Dev Tools" from the Apps screen, the select "Media Scanner" to get the emulator to recognize the files so they would be displayed in the Media Gallery.
You can do by opening "File Explorer". ![enter image description here](https://i.stack.imgur.com/EygiN.png)
11,823,628
> > **Possible Duplicate:** > > [upload picture to emulator gallery](https://stackoverflow.com/questions/5151744/upload-picture-to-emulator-gallery) > > > I m using Android 4.1 (API 16). I want add images on android emulator. How can I implement this step by step? I have seen so many ways for that in stackoverflow but I'm not getting exact answer.
2012/08/06
[ "https://Stackoverflow.com/questions/11823628", "https://Stackoverflow.com", "https://Stackoverflow.com/users/1554297/" ]
You can use ADB to add images or any files to emulator. For example, adb -s emulator-5554 push c:/myfoto.jpg mnt/sdcard/myfolder There is software is also available to push file to emulator called Quick ADB pusher
Check it out from tutorials of SDK docs is a good option. As I am not sure what you want to get here. Just assume that, you want show images in your application. The basic way like this, 1. put a "ImageView" item in layout file, 2. put image file in res/drawable/ directory, 3. change the android:src item in layout file to the image file name, trim the extension part of the file name.
11,823,628
> > **Possible Duplicate:** > > [upload picture to emulator gallery](https://stackoverflow.com/questions/5151744/upload-picture-to-emulator-gallery) > > > I m using Android 4.1 (API 16). I want add images on android emulator. How can I implement this step by step? I have seen so many ways for that in stackoverflow but I'm not getting exact answer.
2012/08/06
[ "https://Stackoverflow.com/questions/11823628", "https://Stackoverflow.com", "https://Stackoverflow.com/users/1554297/" ]
the easiest way if you are using eclipse is to: 1. start your emulator (ensure you have an sdcard.img set up when you set up the AVD) 2. go to DDMS at the top right-hand corner ![DDMS view](https://i.stack.imgur.com/Fv9Xv.png) 3. Simply select the "Push a file onto the device" logo at the top righthand corner ![Push file](https://i.stack.imgur.com/MyO0c.png) 4. Select your files, hit 'Open' and you are done!
Check it out from tutorials of SDK docs is a good option. As I am not sure what you want to get here. Just assume that, you want show images in your application. The basic way like this, 1. put a "ImageView" item in layout file, 2. put image file in res/drawable/ directory, 3. change the android:src item in layout file to the image file name, trim the extension part of the file name.
11,823,628
> > **Possible Duplicate:** > > [upload picture to emulator gallery](https://stackoverflow.com/questions/5151744/upload-picture-to-emulator-gallery) > > > I m using Android 4.1 (API 16). I want add images on android emulator. How can I implement this step by step? I have seen so many ways for that in stackoverflow but I'm not getting exact answer.
2012/08/06
[ "https://Stackoverflow.com/questions/11823628", "https://Stackoverflow.com", "https://Stackoverflow.com/users/1554297/" ]
You can use ADB to add images or any files to emulator. For example, adb -s emulator-5554 push c:/myfoto.jpg mnt/sdcard/myfolder There is software is also available to push file to emulator called Quick ADB pusher
You can do by opening "File Explorer". ![enter image description here](https://i.stack.imgur.com/EygiN.png)
11,823,628
> > **Possible Duplicate:** > > [upload picture to emulator gallery](https://stackoverflow.com/questions/5151744/upload-picture-to-emulator-gallery) > > > I m using Android 4.1 (API 16). I want add images on android emulator. How can I implement this step by step? I have seen so many ways for that in stackoverflow but I'm not getting exact answer.
2012/08/06
[ "https://Stackoverflow.com/questions/11823628", "https://Stackoverflow.com", "https://Stackoverflow.com/users/1554297/" ]
the easiest way if you are using eclipse is to: 1. start your emulator (ensure you have an sdcard.img set up when you set up the AVD) 2. go to DDMS at the top right-hand corner ![DDMS view](https://i.stack.imgur.com/Fv9Xv.png) 3. Simply select the "Push a file onto the device" logo at the top righthand corner ![Push file](https://i.stack.imgur.com/MyO0c.png) 4. Select your files, hit 'Open' and you are done!
You can do by opening "File Explorer". ![enter image description here](https://i.stack.imgur.com/EygiN.png)
35,360,081
I'm working on a problem that involves classifying a large database of texts. The texts are very short (think 3-8 words each) and there are 10-12 categories into which I wish to sort them. For the features, I'm simply using the tf–idf frequency of each word. Thus, the number of features is roughly equal to the number of words that appear overall in the texts (I'm removing stop words and some others). In trying to come up with a model to use, I've had the following two ideas: * Naive Bayes (likely the sklearn multinomial Naive Bayes implementation) * Support vector machine (with stochastic gradient descent used in training, also an sklearn implementation) I have built both models, and am currently comparing the results. What are the theoretical pros and cons to each model? Why might one of these be better for this type of problem? I'm new to machine learning, so what I'd like to understand is *why* one might do better. Many thanks!
2016/02/12
[ "https://Stackoverflow.com/questions/35360081", "https://Stackoverflow.com", "https://Stackoverflow.com/users/3334595/" ]
The biggest difference between the models you're building from a "features" point of view is that Naive Bayes treats them as independent, whereas SVM looks at the interactions between them to a certain degree, as long as you're using a non-linear kernel (Gaussian, rbf, poly etc.). So if you have interactions, and, given your problem, you most likely do, an SVM will be better at capturing those, hence better at the classification task you want. The consensus for ML researchers and practitioners is that in almost all cases, the SVM is better than the Naive Bayes. From a theoretical point of view, it is a little bit hard to compare the two methods. One is probabilistic in nature, while the second one is geometric. However, it's quite easy to come up with a function where one has dependencies between variables which are not captured by Naive Bayes (y(a,b) = ab), so we know it isn't an universal approximator. SVMs with the proper choice of Kernel are (as are 2/3 layer neural networks) though, so from that point of view, the theory matches the practice. But in the end it comes down to performance on *your* problem - you basically want to choose the simplest method which will give good enough results for your problem *and* have a good enough performance. Spam detection has been famously solvable by just Naive Bayes, for example. Face recognition in images by a similar method enhanced with boosting etc.
* Support Vector Machine (SVM) is better at full-length content. * Multinomial Naive Bayes (MNB) is better at snippets. MNB is stronger for snippets than for longer documents. While (Ng and Jordan, 2002) showed that NB is better than SVM/logistic regression (LR) with few training cases, MNB is also better with short documents. SVM usually beats NB when it has more than 30–50 training cases, we show that MNB is still better on snippets even with relatively large training sets (9k cases). Inshort, NBSVM seems to be an appropriate and very strong baseline for sophisticated classification text data. > > Source Code: <https://github.com/prakhar-agarwal/Naive-Bayes-SVM> > > > Reference: <http://nlp.stanford.edu/pubs/sidaw12_simple_sentiment.pdf> > > > Cite: Wang, Sida, and Christopher D. Manning. "Baselines and bigrams: > Simple, good sentiment and topic classification." Proceedings of the > 50th Annual Meeting of the Association for Computational Linguistics: > Short Papers-Volume 2. Association for Computational Linguistics, > 2012. > > >
81,289
I have a set of Avid Juicy 3 calipers that I have sucessfully replaced the pistons and seals on. Getting the pistons out of one of the calipers was not so easy though, and I ended up drilling the middle of the piston, putting in a self tapping screw and pulling out the piston with a mole wrench, like the cork from a bottle. This was OK because I was renewing the pressure foot as well as the seals. The downside was the little dimple left in the caliper body where the drill overshot or the screw pressed. I have a couple of other caliper bodies in need of some work with a similar problem and wonder whether there is a better method or a trick to ease the piston/pressure foot out (potentially so it can be reused!). I have tried compressed air with no success and hydraulically seperating the caliper halves with rubber over the port then pumping the bleed port with dot fluid and the syringe, also no go. I feel like I'm missing something but it may be that the caliper is completely siezed and the corkscrew is all that's left.
2021/10/20
[ "https://bicycles.stackexchange.com/questions/81289", "https://bicycles.stackexchange.com", "https://bicycles.stackexchange.com/users/53287/" ]
Not sure if it's helpful but here is a generic plan for popping pistons with a compressor. Use this kind of blower attachment, with a conical rubber or plastic nozzle. [![enter image description here](https://i.stack.imgur.com/mKzb2.png)](https://i.stack.imgur.com/mKzb2.png) Split the caliper in its two halves and drain the fluid best as possible. Most caliper halves will have one side with the hose inlet, and then when you open it there will be a port for fluid to pass through into the other half. The other half will have the bleed valve, which you keep closed, and a port for fluid that joins with the one on the other half. [![juicy 3](https://i.stack.imgur.com/p5M8L.png)](https://i.stack.imgur.com/p5M8L.png) Starting with the half with the bleed port, put it down on a bench and take a rag and hold it over the piston so it doesn't go flying when you pop it out. Then jam the conical air blower into the fluid port and let it rip. Typically they come out with a loud pop; it's an actual explosion you're creating so be ready. The other side is the same except you have to have one fingertip covering either the hose port or the fluid port on the caliper split while the blower jams into the other entry point. If this doesn't work then the piston seal is probably some especially terrible kind of destroyed, like expanded from fluid contamination. I don't have a great generic plan for what to do then, as it's a rarity for me that I'd be trying to bring a system like that back to life.
I actually finally just managed to solve this puzzle on my old juicy 7 brakes which I'm renovating. There is a simple trick which I employed to get better access to the pistons and force them out hydraulicly. Separate the caliper halves and then re-attach them, but only with the banjo bolt and bleed screw, and with halves rotated against each other by 180 degrees. You still get a hydraulic seal but have much better access as each piston is now facing the open air where you can get a clamp on them. Next open the master cylinder cover on the lever and clamp it upright in a vice, then bleed the brake by feeding fluid into the master cylinder and drawing it through the brake with a syringe on the bleed nipple, as you normally would while bleeding. Then you can pump the lever to force more fluid into the caliper and force the pistons out. Continue to feed more fluid into the master cylinder as the pistons get further out. If one of the pistons is coming out faster then you now have plenty of room to clamp it. Wait until the dominant piston is nearly all the way out, clamp it, and then continue to pump the lever and feed more fluid in until the other piston is nearly out. Then remove the clamp and continue to pump until both pistons pop out. Cheers.
483,209
In the comments section of this [question](https://law.stackexchange.com/questions/29543/isnt-upskirting-illegal-in-the-uk-why?noredirect=1#comment65966_29543) the subject derailed slightly: is the word *upskirting* dependent on today's technology or is it older?
2019/01/28
[ "https://english.stackexchange.com/questions/483209", "https://english.stackexchange.com", "https://english.stackexchange.com/users/74225/" ]
The first example of ***upskirting*** quoted by the OED is from 1998. And it would appear that it does not predate digital photography. > > The habit or practice of taking upskirt photographs or videos. See > upskirt adj. and n. > > > 1998 Re: Lets start Interesting Post in alt.native (Usenet > newsgroup) 12 Sept. Thus begins the fine distinctions of ‘privacy’ > rights in public places, of which the issue of ‘upskirting’ is just > one. > > > 2000 Atlanta Jrnl. & Constit. (Nexis) 10 Oct. a12 Beginning today, > Ohio law increases the penalties for secretly taking pictures up a > woman's skirt.., called ‘upskirting’. > > > 2005 West Australian (Perth) (Nexis) 17 Feb. 38 He would hide the > camera inside a backpack..and..film up his victims' skirts (known as > upskirting). > > > 2012 C. Quigley & D. Pollock What on Earth are you Wearing? (new > ed.) 97/1 When my mum was at school, they wouldn't let the boys wear > patent-leather shoes because they thought they would use them to look > up girls' skirts. I guess this was the beta version of upskirting. > > > 2017 Times (Nexis) 15 Aug. (Times 2 section) 7 The offence of > voyeurism doesn't cover upskirting. > > >
The term ***[upskirt](https://nancyfriedman.typepad.com/away_with_words/2016/06/word-of-the-week-upskirt.html)*** appears to have been used as early as in June 1998: > > “A video, usually taken in a crowded location such as a shopping mall, that is shot up a woman’s skirt” without the woman’s permission or even knowledge. (Source: Word Spy) > > > Urban Dictionary’s earliest entry for upskirting is from 2006, but ***Word Spy found a 1998 mention in the Washington Post:*** > > > * What began as a small photo gallery on the Internet a couple of years ago has rapidly expanded to more than 40 such “Upskirt” sites, including one devoted entirely to shots taken up skirts in Maryland, said [Alexandria detective Harold] Duquette, who has been tracking the trend. > —Patricia Davis, “Video Peeping Toms Seeing More Trouble,” ***The Washington Post, June 7, 1998*** > > > (nancyfriedman.typepad.com)
483,209
In the comments section of this [question](https://law.stackexchange.com/questions/29543/isnt-upskirting-illegal-in-the-uk-why?noredirect=1#comment65966_29543) the subject derailed slightly: is the word *upskirting* dependent on today's technology or is it older?
2019/01/28
[ "https://english.stackexchange.com/questions/483209", "https://english.stackexchange.com", "https://english.stackexchange.com/users/74225/" ]
The first example of ***upskirting*** quoted by the OED is from 1998. And it would appear that it does not predate digital photography. > > The habit or practice of taking upskirt photographs or videos. See > upskirt adj. and n. > > > 1998 Re: Lets start Interesting Post in alt.native (Usenet > newsgroup) 12 Sept. Thus begins the fine distinctions of ‘privacy’ > rights in public places, of which the issue of ‘upskirting’ is just > one. > > > 2000 Atlanta Jrnl. & Constit. (Nexis) 10 Oct. a12 Beginning today, > Ohio law increases the penalties for secretly taking pictures up a > woman's skirt.., called ‘upskirting’. > > > 2005 West Australian (Perth) (Nexis) 17 Feb. 38 He would hide the > camera inside a backpack..and..film up his victims' skirts (known as > upskirting). > > > 2012 C. Quigley & D. Pollock What on Earth are you Wearing? (new > ed.) 97/1 When my mum was at school, they wouldn't let the boys wear > patent-leather shoes because they thought they would use them to look > up girls' skirts. I guess this was the beta version of upskirting. > > > 2017 Times (Nexis) 15 Aug. (Times 2 section) 7 The offence of > voyeurism doesn't cover upskirting. > > >
**upskirt** (adj.) [Etymonine.com](https://www.etymonline.com/word/upskirt#etymonline_v_49958) by 1997, from up (adv.) + skirt (n.). As a verb by 2008. > > "Upskirt" videos, usually taken using low-hanging bags, feature > up-close-and-personal crotch shots of leggy, panty-clad young women. > ["Weekly World News," Sept. 29, 1998] > > > The word is ~ 20 years old. The practice? Since Adam and Eve were evicted from the garden! Small cameras etc (digital) have facilitated such. I suspect though the practice of 'photographing' occurred back in the 8mm and flash photography days.
483,209
In the comments section of this [question](https://law.stackexchange.com/questions/29543/isnt-upskirting-illegal-in-the-uk-why?noredirect=1#comment65966_29543) the subject derailed slightly: is the word *upskirting* dependent on today's technology or is it older?
2019/01/28
[ "https://english.stackexchange.com/questions/483209", "https://english.stackexchange.com", "https://english.stackexchange.com/users/74225/" ]
The first example of ***upskirting*** quoted by the OED is from 1998. And it would appear that it does not predate digital photography. > > The habit or practice of taking upskirt photographs or videos. See > upskirt adj. and n. > > > 1998 Re: Lets start Interesting Post in alt.native (Usenet > newsgroup) 12 Sept. Thus begins the fine distinctions of ‘privacy’ > rights in public places, of which the issue of ‘upskirting’ is just > one. > > > 2000 Atlanta Jrnl. & Constit. (Nexis) 10 Oct. a12 Beginning today, > Ohio law increases the penalties for secretly taking pictures up a > woman's skirt.., called ‘upskirting’. > > > 2005 West Australian (Perth) (Nexis) 17 Feb. 38 He would hide the > camera inside a backpack..and..film up his victims' skirts (known as > upskirting). > > > 2012 C. Quigley & D. Pollock What on Earth are you Wearing? (new > ed.) 97/1 When my mum was at school, they wouldn't let the boys wear > patent-leather shoes because they thought they would use them to look > up girls' skirts. I guess this was the beta version of upskirting. > > > 2017 Times (Nexis) 15 Aug. (Times 2 section) 7 The offence of > voyeurism doesn't cover upskirting. > > >
The earliest use I can find of *upskirt* in a related sense is in Jack van Niftrik's 1980 novel *Where Rumour Never Reaches*: > > He experienced the contrasting sensations of sorrow at the plight of the Nongamas, the Bikos and the Molefes of the world and a flash of sexual desire by a breathtaking upskirt glimpse of honeyed thighs and white triangle of underwear. > > > This use is of course an adjective rather than a verb, and it seems that adjective and noun uses are by far the most common. The OED only lists adjective and noun senses, though it does list the noun *upskirting* as a separate noun (earliest attested use being in 1998) which it says is derived from the adjective rather than from *upskirt* as a verb. (This does not mean it is denying a verb use that it doesn't record). Of course, English speakers verb adjectives and nouns all the time, whether directly or to form a gerund form like *upskirting*, so as long as we can find the adjective *upskirt* as something deliberately sought (rather than the accidental glimpse van Niftrik's novel describes) we can expect it. The OED has both adjective and noun forms of *upskirt* attested in 1994. To conjecture about how far back it may go we can ask how far back we could reasonably expect to find *upskirting*. Pornographic pictures showing a view up a skirt exist from the early days of photography, (and in painting Fragonad's *Les Hasards heureux de l'escarpolette* shows a man enjoying such a view, without sharing it with the painting's audience, as far back as ca 1767 while Marilyn Monroe's famous revealing moment in *The Seven Year Itch* in 1955 was not the earliest in moving pictures by a large measure) but since the gerund form generally refers to deliberately surreptitious pictures taken without consent, the phenomenon of upskirting really depended reasonably fast film and either on the telephoto lens, or small "spy" cameras, so really not much earlier than the 1980s as something that wouldn't need remarkably exotic equipment. (Ubiquitous mobile phone cameras of course make it much easier today). One only needs terms when discussing something though, which means not just someone actively taking such photographs, but a community of people sharing them and discussing the taking of them. That doesn't really seem to have predated Usenet in any large-scale and continuous manner, so we could take 1980, being the time that it first became possible to share binary files such as photographs on Usenet, as the earliest it could possibly go back to. Realistically we're probably talking about the late 80s or early 90s, but almost certainly no earlier than 1980, and clearly by the time of the first OED attested use in 1998.
483,209
In the comments section of this [question](https://law.stackexchange.com/questions/29543/isnt-upskirting-illegal-in-the-uk-why?noredirect=1#comment65966_29543) the subject derailed slightly: is the word *upskirting* dependent on today's technology or is it older?
2019/01/28
[ "https://english.stackexchange.com/questions/483209", "https://english.stackexchange.com", "https://english.stackexchange.com/users/74225/" ]
The word **upskirt** to refer to photographs taken up women's skirts was coined no later than 1995. The Internet domain upskirts.com was registered on 1995-10-13, and upskirt.com followed shortly after on 1996-06-10. The term **upskirt** predates smart phones or other cell phones with cameras. A *Washington Post* article reprinted in the June 8, 1998, [*Amarillo (TX) Daily News*](https://newspaperarchive.com/amarillo-daily-news-jun-08-1998-p-41/) warns: > > In what they describe as a growing trend, police are beginning to catch video voyeurs trying to shoot private parts in public places. These men are aiming the latest compact camcorders up women’s skirts in crowded stores and shopping malls, parks and fairs - and often posting the pictures on the Internet. > > > . . . [P]olice arrested a 21-year-old man who was holding a palm-size video camera under a woman’s dress. . . [P]olice nabbed a 19-year-old man toting a bulky VHS video camera. He was angling for similar shots in the china department. . . > > > What began as a small photo gallery on the Internet a couple of years ago has rapidly expanded to more than 40 such “Upskirt” sites. . . > > > [![enter image description here](https://i.stack.imgur.com/jNBpj.png)](https://i.stack.imgur.com/jNBpj.png)
The term ***[upskirt](https://nancyfriedman.typepad.com/away_with_words/2016/06/word-of-the-week-upskirt.html)*** appears to have been used as early as in June 1998: > > “A video, usually taken in a crowded location such as a shopping mall, that is shot up a woman’s skirt” without the woman’s permission or even knowledge. (Source: Word Spy) > > > Urban Dictionary’s earliest entry for upskirting is from 2006, but ***Word Spy found a 1998 mention in the Washington Post:*** > > > * What began as a small photo gallery on the Internet a couple of years ago has rapidly expanded to more than 40 such “Upskirt” sites, including one devoted entirely to shots taken up skirts in Maryland, said [Alexandria detective Harold] Duquette, who has been tracking the trend. > —Patricia Davis, “Video Peeping Toms Seeing More Trouble,” ***The Washington Post, June 7, 1998*** > > > (nancyfriedman.typepad.com)
483,209
In the comments section of this [question](https://law.stackexchange.com/questions/29543/isnt-upskirting-illegal-in-the-uk-why?noredirect=1#comment65966_29543) the subject derailed slightly: is the word *upskirting* dependent on today's technology or is it older?
2019/01/28
[ "https://english.stackexchange.com/questions/483209", "https://english.stackexchange.com", "https://english.stackexchange.com/users/74225/" ]
The word **upskirt** to refer to photographs taken up women's skirts was coined no later than 1995. The Internet domain upskirts.com was registered on 1995-10-13, and upskirt.com followed shortly after on 1996-06-10. The term **upskirt** predates smart phones or other cell phones with cameras. A *Washington Post* article reprinted in the June 8, 1998, [*Amarillo (TX) Daily News*](https://newspaperarchive.com/amarillo-daily-news-jun-08-1998-p-41/) warns: > > In what they describe as a growing trend, police are beginning to catch video voyeurs trying to shoot private parts in public places. These men are aiming the latest compact camcorders up women’s skirts in crowded stores and shopping malls, parks and fairs - and often posting the pictures on the Internet. > > > . . . [P]olice arrested a 21-year-old man who was holding a palm-size video camera under a woman’s dress. . . [P]olice nabbed a 19-year-old man toting a bulky VHS video camera. He was angling for similar shots in the china department. . . > > > What began as a small photo gallery on the Internet a couple of years ago has rapidly expanded to more than 40 such “Upskirt” sites. . . > > > [![enter image description here](https://i.stack.imgur.com/jNBpj.png)](https://i.stack.imgur.com/jNBpj.png)
**upskirt** (adj.) [Etymonine.com](https://www.etymonline.com/word/upskirt#etymonline_v_49958) by 1997, from up (adv.) + skirt (n.). As a verb by 2008. > > "Upskirt" videos, usually taken using low-hanging bags, feature > up-close-and-personal crotch shots of leggy, panty-clad young women. > ["Weekly World News," Sept. 29, 1998] > > > The word is ~ 20 years old. The practice? Since Adam and Eve were evicted from the garden! Small cameras etc (digital) have facilitated such. I suspect though the practice of 'photographing' occurred back in the 8mm and flash photography days.
483,209
In the comments section of this [question](https://law.stackexchange.com/questions/29543/isnt-upskirting-illegal-in-the-uk-why?noredirect=1#comment65966_29543) the subject derailed slightly: is the word *upskirting* dependent on today's technology or is it older?
2019/01/28
[ "https://english.stackexchange.com/questions/483209", "https://english.stackexchange.com", "https://english.stackexchange.com/users/74225/" ]
The word **upskirt** to refer to photographs taken up women's skirts was coined no later than 1995. The Internet domain upskirts.com was registered on 1995-10-13, and upskirt.com followed shortly after on 1996-06-10. The term **upskirt** predates smart phones or other cell phones with cameras. A *Washington Post* article reprinted in the June 8, 1998, [*Amarillo (TX) Daily News*](https://newspaperarchive.com/amarillo-daily-news-jun-08-1998-p-41/) warns: > > In what they describe as a growing trend, police are beginning to catch video voyeurs trying to shoot private parts in public places. These men are aiming the latest compact camcorders up women’s skirts in crowded stores and shopping malls, parks and fairs - and often posting the pictures on the Internet. > > > . . . [P]olice arrested a 21-year-old man who was holding a palm-size video camera under a woman’s dress. . . [P]olice nabbed a 19-year-old man toting a bulky VHS video camera. He was angling for similar shots in the china department. . . > > > What began as a small photo gallery on the Internet a couple of years ago has rapidly expanded to more than 40 such “Upskirt” sites. . . > > > [![enter image description here](https://i.stack.imgur.com/jNBpj.png)](https://i.stack.imgur.com/jNBpj.png)
The earliest use I can find of *upskirt* in a related sense is in Jack van Niftrik's 1980 novel *Where Rumour Never Reaches*: > > He experienced the contrasting sensations of sorrow at the plight of the Nongamas, the Bikos and the Molefes of the world and a flash of sexual desire by a breathtaking upskirt glimpse of honeyed thighs and white triangle of underwear. > > > This use is of course an adjective rather than a verb, and it seems that adjective and noun uses are by far the most common. The OED only lists adjective and noun senses, though it does list the noun *upskirting* as a separate noun (earliest attested use being in 1998) which it says is derived from the adjective rather than from *upskirt* as a verb. (This does not mean it is denying a verb use that it doesn't record). Of course, English speakers verb adjectives and nouns all the time, whether directly or to form a gerund form like *upskirting*, so as long as we can find the adjective *upskirt* as something deliberately sought (rather than the accidental glimpse van Niftrik's novel describes) we can expect it. The OED has both adjective and noun forms of *upskirt* attested in 1994. To conjecture about how far back it may go we can ask how far back we could reasonably expect to find *upskirting*. Pornographic pictures showing a view up a skirt exist from the early days of photography, (and in painting Fragonad's *Les Hasards heureux de l'escarpolette* shows a man enjoying such a view, without sharing it with the painting's audience, as far back as ca 1767 while Marilyn Monroe's famous revealing moment in *The Seven Year Itch* in 1955 was not the earliest in moving pictures by a large measure) but since the gerund form generally refers to deliberately surreptitious pictures taken without consent, the phenomenon of upskirting really depended reasonably fast film and either on the telephoto lens, or small "spy" cameras, so really not much earlier than the 1980s as something that wouldn't need remarkably exotic equipment. (Ubiquitous mobile phone cameras of course make it much easier today). One only needs terms when discussing something though, which means not just someone actively taking such photographs, but a community of people sharing them and discussing the taking of them. That doesn't really seem to have predated Usenet in any large-scale and continuous manner, so we could take 1980, being the time that it first became possible to share binary files such as photographs on Usenet, as the earliest it could possibly go back to. Realistically we're probably talking about the late 80s or early 90s, but almost certainly no earlier than 1980, and clearly by the time of the first OED attested use in 1998.
4,861,392
if u have any kind of link or example about this please send me...
2011/02/01
[ "https://Stackoverflow.com/questions/4861392", "https://Stackoverflow.com", "https://Stackoverflow.com/users/554830/" ]
Use the built-in HTTP API. Start here: <http://developer.android.com/reference/org/apache/http/client/HttpClient.html>
Kindly check the following url for reference <http://www.josecgomez.com/2010/04/30/android-accessing-restfull-web-services-using-json/>
11,694
[Cherenkov Radiation](http://en.wikipedia.org/wiki/Cherenkov_radiation) (in my layman's understanding) is a blue light that appears when particles with an electric charge go through a medium faster than the speed of light in that medium. ![enter image description here](https://i.stack.imgur.com/vlfEW.jpg) I regularly listen to an Australian science podcast called [Dr Karl with TripleJ FM.](http://www.abc.net.au/science/drkarl/scienceontriplej/). Dr Karl has mentioned more than a couple of times that he went to see this effect at a lab in Australia, but has never made it clear whether he did this because he's in the science world, or as a regular Joe tourist. I did a quick search but can't find anything online. Anyone know if there are tours, preferably in North America or Oceania, where you can see this?
2013/01/13
[ "https://travel.stackexchange.com/questions/11694", "https://travel.stackexchange.com", "https://travel.stackexchange.com/users/101/" ]
The main campus of Penn State University has an educational nuclear reactor facility, the [Breazeale reactor](http://www.rsec.psu.edu/?l=6&p=2), that offers tours to the public. As part of the tour, they take you through the reactor room where you can see the Cerenkov radiation from the uranium. The reactor itself is submerged under something like 15 feet of water, which is ample protection from the damaging radiation, but still allows you to get a good view of the shiny blueness :-) Their tour program is mostly geared toward larger groups, like science classes, but I don't believe you *have* to be affiliated with a class or educational institution to get in. If you want to just go by yourself, it certainly couldn't hurt to contact someone at the facility and ask what the opportunities are. All the contact information you need should be on their website, which I've linked above. --- P.S. Your layman's understanding of the nature of Cerenkov radiation sounds quite correct.
The Technical University of Munich operates the research reactor [FRM II](https://en.wikipedia.org/wiki/Forschungsreaktor_M%C3%BCnchen_II) ([official website](https://www.frm2.tum.de/en/home/)). It is a very small reactor with only a single fuel rod ([fotos](https://mlz-garching.de/neutronenforschung/neutronenquelle.html), [panorama](https://mlz-garching.de/panorama/full/en/index.html)), so there is not much Cherenkov radiation to see though. Furthermore, sometimes it is shutdown for maintenance. Nevertheless a visit is certainly worth it. They offer [guided tours](https://www.frm2.tum.de/en/guided-tours/), mostly to students of the university, and once a year there is an open day for the general public (last one was in [September 2019](https://www.tum.de/nc/die-tum/aktuelles/pressemitteilungen/details/35702/)). For schools and student groups they also arrange separate tours.
11,694
[Cherenkov Radiation](http://en.wikipedia.org/wiki/Cherenkov_radiation) (in my layman's understanding) is a blue light that appears when particles with an electric charge go through a medium faster than the speed of light in that medium. ![enter image description here](https://i.stack.imgur.com/vlfEW.jpg) I regularly listen to an Australian science podcast called [Dr Karl with TripleJ FM.](http://www.abc.net.au/science/drkarl/scienceontriplej/). Dr Karl has mentioned more than a couple of times that he went to see this effect at a lab in Australia, but has never made it clear whether he did this because he's in the science world, or as a regular Joe tourist. I did a quick search but can't find anything online. Anyone know if there are tours, preferably in North America or Oceania, where you can see this?
2013/01/13
[ "https://travel.stackexchange.com/questions/11694", "https://travel.stackexchange.com", "https://travel.stackexchange.com/users/101/" ]
The main campus of Penn State University has an educational nuclear reactor facility, the [Breazeale reactor](http://www.rsec.psu.edu/?l=6&p=2), that offers tours to the public. As part of the tour, they take you through the reactor room where you can see the Cerenkov radiation from the uranium. The reactor itself is submerged under something like 15 feet of water, which is ample protection from the damaging radiation, but still allows you to get a good view of the shiny blueness :-) Their tour program is mostly geared toward larger groups, like science classes, but I don't believe you *have* to be affiliated with a class or educational institution to get in. If you want to just go by yourself, it certainly couldn't hurt to contact someone at the facility and ask what the opportunities are. All the contact information you need should be on their website, which I've linked above. --- P.S. Your layman's understanding of the nature of Cerenkov radiation sounds quite correct.
Reed College, an undergraduate institution in Portland, Oregon, maintains a [research reactor](https://reactor.reed.edu). The FAQ says that tours can be arranged for groups; the page does not say if an individual may join. My son attended Reed 2000-2004, and I took a tour during that time. Cherenkov Radiation was indeed visible, and interesting!
28,386,446
I'm new to liferay. And I've some basic question that what is liferay all about. What is a liferay plugin project or service builder project? Is liferay any framework,GUI tool, a content manager or WHAT? I know that you guys are not engaged with this tool in this BLOG but still somehow it is related to java. So please guys help me.
2015/02/07
[ "https://Stackoverflow.com/questions/28386446", "https://Stackoverflow.com", "https://Stackoverflow.com/users/1257846/" ]
Have you tried reading the [liferay](/questions/tagged/liferay "show questions tagged 'liferay'") tag-wiki on stackoverflow? Just hover your mouse over it and you will have answers to all your questions. And if you want more just click on the pop-up and you would also find details about how to learn more about Liferay. Still as per the norms of answering, here are some brief answers to your question: > > Is liferay any framework,GUI tool, a content manager or WHAT? > > > Liferay is an open source JSR 286 compliant web-portal and social platform, written in Java. It includes content-management and more. It has different plugins known as portlets like Blogs, Forums, Document management, Content management etc. > > What is a liferay plugin project or service builder project? > > > Plugin projects are nothing but small components/applications/widgets that run in the portal. Some might have UI and others might run in the backend. Service Builder is a framework in liferay to ease development of services which might include service to access database, web-services, json web-services. Everything else is given in the tag-wiki and the wiki also includes links to official resources if you wish to use/develop in liferay.
***plugins are features which developers add them to portals like liferay. for example: liferay hooks are defined to do some tasks, like user's authentication, adding users, etc .. and we want change (override) that hooks, so we need develop ext plugins to do this for us.***
8,281,843
I have an object which is already exists in the database and I want to modify it's ID, Nhibernate is considering it as a new object and save it instead of update. I have many silly solutions in mind but I want the efficient one.
2011/11/26
[ "https://Stackoverflow.com/questions/8281843", "https://Stackoverflow.com", "https://Stackoverflow.com/users/822588/" ]
I think it is because you are dismissing it right away
It's a problem related with your workflow. Since you're doing additional tasks on the UI thread, the ProgressDialog doesn't get to be shown. You should either spawn a thread for doing the extra work, then dismiss your dialog and launch your new Intent with runOnUiThread() or with a Handler. Although, the best option would be using AsyncTask, showing your ProgressDialog onPreExecute(), doing your work in doInBackground() and then dismissing it onPostExecute() and launching your new activity.
212,358
I'm curious - is there a term for a character that is used to denote a highlighted option in text-based navigation? For example, say we have this menu when navigating a text-only menu: > > One > > > > Two > > > Three > > > In the example, we can see that option "Two" is highlighted. But is there a name for the character that denotes the highlighted option? Note: I do know that this particular character is called a "greater than" sign, but I'm after the name of the highlight character, regardless of whether it's an at symbol or an asterisk Is there one, or am I right to use "highlight character" to refer to the character that prefixes "Two" in the list above?
2014/12/07
[ "https://english.stackexchange.com/questions/212358", "https://english.stackexchange.com", "https://english.stackexchange.com/users/100296/" ]
I would call it a **selector**, since it is used to select an option in the menu. [Google](https://www.google.com/webhp?tab=ww&ei=RvODVLOzJdD_sATimQI&ved=0CAQQ1S4#q=define:selector) defines *selector* as: > > a person or thing that selects something, in particular. > > > Also, "highlight character" limits you to a single character. What if you wanted to change it from ">" to "->"? Then "highlight character" wouldn't be accurate since it's more than one character.
The name is the name of the particular character used (if a character is used). There is no general term that I am aware of. In some lists on a computer form, one or more options may be selected by default (e.g. by a background colour, by bolding, or by an adjacent symbol such as an asterix to indicate this to the user). Bolding or colouring are not characters but do service to 'highlight' that the item is 'selected'. More usually though the use of a background colour around text or symbols on a computer screen is called "highlighting".
212,358
I'm curious - is there a term for a character that is used to denote a highlighted option in text-based navigation? For example, say we have this menu when navigating a text-only menu: > > One > > > > Two > > > Three > > > In the example, we can see that option "Two" is highlighted. But is there a name for the character that denotes the highlighted option? Note: I do know that this particular character is called a "greater than" sign, but I'm after the name of the highlight character, regardless of whether it's an at symbol or an asterisk Is there one, or am I right to use "highlight character" to refer to the character that prefixes "Two" in the list above?
2014/12/07
[ "https://english.stackexchange.com/questions/212358", "https://english.stackexchange.com", "https://english.stackexchange.com/users/100296/" ]
I would call it a **selector**, since it is used to select an option in the menu. [Google](https://www.google.com/webhp?tab=ww&ei=RvODVLOzJdD_sATimQI&ved=0CAQQ1S4#q=define:selector) defines *selector* as: > > a person or thing that selects something, in particular. > > > Also, "highlight character" limits you to a single character. What if you wanted to change it from ">" to "->"? Then "highlight character" wouldn't be accurate since it's more than one character.
In this context, I would call it an *arrow,* *pointer* or *highlight symbol*. I should stress, however, that these are my own personal usages. I suggest you try soliciting an industry-specific answer from one of the StackExchange computer-related Q&A sites, such as the [User Experience site](https://ux.stackexchange.com/).
212,358
I'm curious - is there a term for a character that is used to denote a highlighted option in text-based navigation? For example, say we have this menu when navigating a text-only menu: > > One > > > > Two > > > Three > > > In the example, we can see that option "Two" is highlighted. But is there a name for the character that denotes the highlighted option? Note: I do know that this particular character is called a "greater than" sign, but I'm after the name of the highlight character, regardless of whether it's an at symbol or an asterisk Is there one, or am I right to use "highlight character" to refer to the character that prefixes "Two" in the list above?
2014/12/07
[ "https://english.stackexchange.com/questions/212358", "https://english.stackexchange.com", "https://english.stackexchange.com/users/100296/" ]
"Highlight character" doesn't make much sense to me. Presumably, if you press `Enter`, that is the menu item that responds. By definition, that's a [cursor](http://en.wikipedia.org/wiki/Cursor_(computing)). > > In computing, a **cursor** is an indicator used to show the position on a computer monitor or other display device that will respond to input from a text input or pointing device. > > >
The name is the name of the particular character used (if a character is used). There is no general term that I am aware of. In some lists on a computer form, one or more options may be selected by default (e.g. by a background colour, by bolding, or by an adjacent symbol such as an asterix to indicate this to the user). Bolding or colouring are not characters but do service to 'highlight' that the item is 'selected'. More usually though the use of a background colour around text or symbols on a computer screen is called "highlighting".
212,358
I'm curious - is there a term for a character that is used to denote a highlighted option in text-based navigation? For example, say we have this menu when navigating a text-only menu: > > One > > > > Two > > > Three > > > In the example, we can see that option "Two" is highlighted. But is there a name for the character that denotes the highlighted option? Note: I do know that this particular character is called a "greater than" sign, but I'm after the name of the highlight character, regardless of whether it's an at symbol or an asterisk Is there one, or am I right to use "highlight character" to refer to the character that prefixes "Two" in the list above?
2014/12/07
[ "https://english.stackexchange.com/questions/212358", "https://english.stackexchange.com", "https://english.stackexchange.com/users/100296/" ]
"Highlight character" doesn't make much sense to me. Presumably, if you press `Enter`, that is the menu item that responds. By definition, that's a [cursor](http://en.wikipedia.org/wiki/Cursor_(computing)). > > In computing, a **cursor** is an indicator used to show the position on a computer monitor or other display device that will respond to input from a text input or pointing device. > > >
In this context, I would call it an *arrow,* *pointer* or *highlight symbol*. I should stress, however, that these are my own personal usages. I suggest you try soliciting an industry-specific answer from one of the StackExchange computer-related Q&A sites, such as the [User Experience site](https://ux.stackexchange.com/).
895,213
I am connecting to my home Hamachi-powered VPN with my Android (v4.4.x) mobile device using IPSec. The VPN connection is working fine, except that I am unable to configure the connection as "always-on" within Android's VPN settings. As a result the connection frequently drops and requires me to go back into my mobile device's Android settings and restart the VPN manually, which is annoying and sort of defeats the purpose of having a VPN. (Side note: A bit more about the "always on" setting can be found here near the bottom of the article: <http://www.howtogeek.com/135036/how-to-connect-to-a-vpn-on-android/>.) The cause of my problem is that Android requires a static VPN Server IP address before it will accept a VPN connection as "always on", and Hamachi doesn't use a static IP for mobile VPN connections. Instead, it only uses the static url "m.hamachi.cc". So, I have two questions: First, how can I set up my VPN connection as "always on", given that the VPN server doesn't have a static IP address, which is required? Second, why does Google require a static IP for an always-on connection, what is the benefit to that? Thanks, I'd appreciate any ideas.
2015/03/28
[ "https://superuser.com/questions/895213", "https://superuser.com", "https://superuser.com/users/352447/" ]
It's quite a long time since this has been asked, but I am trying to answer it anyway. Based on the answer in this [thread](https://code.google.com/p/android/issues/detail?id=67151), the issue is DNS spoofing: Always-on vpn is there to protect you from a network you can't control. If you have a DNS name in place instead of an ip, the device would have to resolve this name BEFORE the vpn tunnel is established. But this resolution would happen on a network you don't trust, so you couldn't be sure that the ip returned for the name is the correct one. One scenario would be, that the dns server in the untrusted network would give you the ip to a VPN server under it's control to which then your credentials would be sent (instead of your own server).
You can't rely on any communication before establishing VPN tunnel. VPN tunnel establishment should begin with setting up certificate-based encrypted connection, so ARP Poisoning mentioned by Aron can't affect it (since attacking computer would have no way of actually establishing a connection, it can only prevent communication between you and network, therefore changing attack from MITM to DOS) Therefore any DNS query to establish server IP could be compromised (or just blocked, so you never actually connect). You have to provide DNS servers to prevent leaking of information to your current ISP.
318,616
Can anyone tell me if I can use an standard 1 TB SATA HDD on a Dell Poweredge SC1420? Let's say this one: <http://www.compusa.com/applications/SearchTools/item-details.asp?EdpNo=61389&CatId=2459> or can you point me where to get a SATA HDD for this kind of server?
2011/10/05
[ "https://serverfault.com/questions/318616", "https://serverfault.com", "https://serverfault.com/users/88776/" ]
Dell's documentation for the model (check their web site, I've not used Dell but I know HP have a good repository of documentation of even old servers so Dell may have too) - server specs usually list recommended upgrade parts and if a 1TB SATA model is listed for this machine then chances are that any 1TB model will work. More useful information to look for is what I/O controller (or motherboard chipset) that machine uses: you can use that information to lookup the official specs for the board/chipset and see what drives it has been tested against. Again you will find this information somewhere in Dell's documentation, or failing that you can open the machine and see if it is written anywhere obvious (it will be on the board somewhere, and some server manufacturers include a basic spec list on the inside of the case).
1. Dell's [PowerEdge SC1420 spec sheet](http://www.dell.com/downloads/global/products/pedge/en/sc1420_specs.pdf) indicates that this model shipped with either a SCSI controller or a SATA controller. Which controller do you have? 2. Given that you are obviously working on a very low-budget project, I would recommend [Aventis Systems](http://www.aventissystems.com) as a source for *used* Dell server hard drives.
480,729
I'm trying to start a website that shows jobs in the more "shunned" industries like smoking or alcohol but I'm having a hard time thinking of a word that sums up all of them. Is there a word for these industries?
2019/01/10
[ "https://english.stackexchange.com/questions/480729", "https://english.stackexchange.com", "https://english.stackexchange.com/users/331480/" ]
**Vice** industries might fit. A good example of this usage is an article from *Fortune* magazine entitled: > > [The 5 Biggest Vice Industries in the World](http://fortune.com/2016/03/24/vice-industries/) > > > The five industries the article discusses are: 1. Alcohol 2. Tobacco 3. The Military-Industrial Complex 4. Illicit Drugs 5. Gambling
I agree with Jason, they are definitely all recreational drugs. I suppose if you want a word with a less negative connotation than ‘drugs’ (considering the angle you are coming from), maybe something like ‘recreational substances’ could be appropriate. Other than that, hard to think of anything the would concisely capture all of those, and also not be too vague or euphemistic
480,729
I'm trying to start a website that shows jobs in the more "shunned" industries like smoking or alcohol but I'm having a hard time thinking of a word that sums up all of them. Is there a word for these industries?
2019/01/10
[ "https://english.stackexchange.com/questions/480729", "https://english.stackexchange.com", "https://english.stackexchange.com/users/331480/" ]
**Vice** industries might fit. A good example of this usage is an article from *Fortune* magazine entitled: > > [The 5 Biggest Vice Industries in the World](http://fortune.com/2016/03/24/vice-industries/) > > > The five industries the article discusses are: 1. Alcohol 2. Tobacco 3. The Military-Industrial Complex 4. Illicit Drugs 5. Gambling
All of these substances are [**intoxicants**](https://www.merriam-webster.com/dictionary/intoxicant) (which by definition means something that intoxicates). [Intoxicate](https://www.merriam-webster.com/dictionary/intoxicates), as a verb, means: "to excite or stupefy by alcohol or a drug especially to the point where physical and mental control is markedly diminished" According to the Business Dictionary an [intoxicant](http://www.businessdictionary.com/definition/intoxicant.html) is a: "Substance which when taken into a body by one mean or another produces a condition of diminished mental and physical ability, hyperexcitability, or stupefaction." However, the industry of intoxicants is not an officially recognized umbrella term for the industries of these differing substances (and there isn't a widely recognized umbrella term as proposed in the OP. Typically the pharmaceutical industry encompasses legal drugs and the other proposed intoxicants having their own uniquely recognized industries as well. (Tobacco industry, alcohol industry, etc).
480,729
I'm trying to start a website that shows jobs in the more "shunned" industries like smoking or alcohol but I'm having a hard time thinking of a word that sums up all of them. Is there a word for these industries?
2019/01/10
[ "https://english.stackexchange.com/questions/480729", "https://english.stackexchange.com", "https://english.stackexchange.com/users/331480/" ]
I agree with Jason, they are definitely all recreational drugs. I suppose if you want a word with a less negative connotation than ‘drugs’ (considering the angle you are coming from), maybe something like ‘recreational substances’ could be appropriate. Other than that, hard to think of anything the would concisely capture all of those, and also not be too vague or euphemistic
All of these substances are [**intoxicants**](https://www.merriam-webster.com/dictionary/intoxicant) (which by definition means something that intoxicates). [Intoxicate](https://www.merriam-webster.com/dictionary/intoxicates), as a verb, means: "to excite or stupefy by alcohol or a drug especially to the point where physical and mental control is markedly diminished" According to the Business Dictionary an [intoxicant](http://www.businessdictionary.com/definition/intoxicant.html) is a: "Substance which when taken into a body by one mean or another produces a condition of diminished mental and physical ability, hyperexcitability, or stupefaction." However, the industry of intoxicants is not an officially recognized umbrella term for the industries of these differing substances (and there isn't a widely recognized umbrella term as proposed in the OP. Typically the pharmaceutical industry encompasses legal drugs and the other proposed intoxicants having their own uniquely recognized industries as well. (Tobacco industry, alcohol industry, etc).
17,264
I'm looking for a **free/gratis** (online or offline) CSS 3 Editor. I found this one <http://www.cssportal.com/online-css-editor> but it is way too basic. Plataforms: **online / windows.**
2015/02/17
[ "https://softwarerecs.stackexchange.com/questions/17264", "https://softwarerecs.stackexchange.com", "https://softwarerecs.stackexchange.com/users/3408/" ]
[Backets](http://brackets.io/) is an open source HTML, JS and CSS editor sponsored by Adobe. It's clean and comfortable to use if you already know CSS. It includes a "live preview" option and can extract design information from PSD files. There are also extensions for you to add extra features.
I would suggest you: * **Liveweave** (<http://liveweave.com>) is a HTML5, CSS3 & JavaScript editor with real-time (live) preview
438,454
For some reason I'm unable to share a window or full screen on Chrome with Google Meet on Mac. Versions: * Chrome: Version 99.0.4844.74 (Official Build) (x86\_64) * Mac: Monterey 12.3 In the Mac settings under security, screen recording is enabled for Chrome. I've tried restarting Chrome, restarting the computer, disabling and enabling screen recording for Chrome from the settings (with Chrome restarts in between) but nothing seems to work. The screen sharing also doesn't work for google meet (the app). [![enter image description here](https://i.stack.imgur.com/RTG63.png)](https://i.stack.imgur.com/RTG63.png) [![enter image description here](https://i.stack.imgur.com/KzGei.png)](https://i.stack.imgur.com/KzGei.png)
2022/03/17
[ "https://apple.stackexchange.com/questions/438454", "https://apple.stackexchange.com", "https://apple.stackexchange.com/users/192220/" ]
Had the same issue but updated to the latest version of Chrome (99.0.4844.83 (Official Build) (arm64)) and issue gone
Login to google accout in **Safari browser** and then try to share screen on Google meet. It will work. It has an issue with Google Chrome in Mac.
438,454
For some reason I'm unable to share a window or full screen on Chrome with Google Meet on Mac. Versions: * Chrome: Version 99.0.4844.74 (Official Build) (x86\_64) * Mac: Monterey 12.3 In the Mac settings under security, screen recording is enabled for Chrome. I've tried restarting Chrome, restarting the computer, disabling and enabling screen recording for Chrome from the settings (with Chrome restarts in between) but nothing seems to work. The screen sharing also doesn't work for google meet (the app). [![enter image description here](https://i.stack.imgur.com/RTG63.png)](https://i.stack.imgur.com/RTG63.png) [![enter image description here](https://i.stack.imgur.com/KzGei.png)](https://i.stack.imgur.com/KzGei.png)
2022/03/17
[ "https://apple.stackexchange.com/questions/438454", "https://apple.stackexchange.com", "https://apple.stackexchange.com/users/192220/" ]
Had the same issue but updated to the latest version of Chrome (99.0.4844.83 (Official Build) (arm64)) and issue gone
I can confirm this behavior. It Version 99.0.4844.74 (Official Build) (arm64) and it still there. Unfortunately, from Safari you cannot share a "window" from another application. So, I have to go to Firefox to get this option. It doesn't work in Chrome. The problem became consistant after the last OS update. Prior this, it was erratic (a complete restart of the computer OR a "Force Quit") of google chrome did the job. Now, Chrome is unable to share windows altogether.
996,764
Can the Meltdown and Spectre vulnerabilities affect also computers with encrypted home directory and usage of a VPN service? In Other words, would hackers still be able to steal passwords when encrypted transmissions and VPN services are implemented?
2018/01/16
[ "https://askubuntu.com/questions/996764", "https://askubuntu.com", "https://askubuntu.com/users/781058/" ]
Yes. Disk encryption protects against access to the disk when it is not in use, for instance if someone steals your computer. VPN protects against anyone sniffing the wire. Meltdown and Spectre can give attackers local access to the data, before it is encrypted. For the system to use any kind of information, it more or less **has** to be available in un-encrypted form. Whenever it is available in un-encrypted form any attacker with superuser access to the computer can copy it at will.
Yes, in fact this is one of the hypothetical situations where these vulnerabilities might be attacked: when using encryption and trying to access the in-memory encryption key normally unavailable to other processes.
996,764
Can the Meltdown and Spectre vulnerabilities affect also computers with encrypted home directory and usage of a VPN service? In Other words, would hackers still be able to steal passwords when encrypted transmissions and VPN services are implemented?
2018/01/16
[ "https://askubuntu.com/questions/996764", "https://askubuntu.com", "https://askubuntu.com/users/781058/" ]
Yes. Disk encryption protects against access to the disk when it is not in use, for instance if someone steals your computer. VPN protects against anyone sniffing the wire. Meltdown and Spectre can give attackers local access to the data, before it is encrypted. For the system to use any kind of information, it more or less **has** to be available in un-encrypted form. Whenever it is available in un-encrypted form any attacker with superuser access to the computer can copy it at will.
Yes. It might allow an attacker, say, by you visiting his website, to read memory of apps you have currently running. The memory content could be cookies to website you're currently logged in, saved passwords in your password manager, configuration of your VPN connection or even an encryption key you use for home directory. On the other hand if you're 100% sure you're not going to run any 3rd party code (by downloading some untrusted software or running a browser/visiting websites), you're pretty much save. Actually that's the Microsoft's view on that matter: they assumed most Windows Server instances run in an "isolated" environment, where users put only trusted apps, so Meltdown/Spectre fixes aren't needed to be enabled there on default.
996,764
Can the Meltdown and Spectre vulnerabilities affect also computers with encrypted home directory and usage of a VPN service? In Other words, would hackers still be able to steal passwords when encrypted transmissions and VPN services are implemented?
2018/01/16
[ "https://askubuntu.com/questions/996764", "https://askubuntu.com", "https://askubuntu.com/users/781058/" ]
Yes. Disk encryption protects against access to the disk when it is not in use, for instance if someone steals your computer. VPN protects against anyone sniffing the wire. Meltdown and Spectre can give attackers local access to the data, before it is encrypted. For the system to use any kind of information, it more or less **has** to be available in un-encrypted form. Whenever it is available in un-encrypted form any attacker with superuser access to the computer can copy it at will.
The vulnerabilities allow reading data from other programs, so if any other program has the unencrypted data, a malicious program can read it. So if you type your password into another program, your password can be stolen. Moreover, if you access any encrypted data, then it has to be unencrypted for you to see it, so it can be stolen. Depending on how your disk encryption works, data on your disk may be unencrypted even if you don't directly access it. If you're using end-to-end encryption, such as a VPN, well, your computer is an end, so the data is being unencrypted once it gets to your computer, so it's vulnerable. If you have an encrypted file, and the password is not stored on your computer, and you don't ever access it, then the unencrypted data is not vulnerable (unless the encryption can be otherwise broken). But as soon as you mount an encrypted drive, it's vulnerable.
996,764
Can the Meltdown and Spectre vulnerabilities affect also computers with encrypted home directory and usage of a VPN service? In Other words, would hackers still be able to steal passwords when encrypted transmissions and VPN services are implemented?
2018/01/16
[ "https://askubuntu.com/questions/996764", "https://askubuntu.com", "https://askubuntu.com/users/781058/" ]
Yes. Disk encryption protects against access to the disk when it is not in use, for instance if someone steals your computer. VPN protects against anyone sniffing the wire. Meltdown and Spectre can give attackers local access to the data, before it is encrypted. For the system to use any kind of information, it more or less **has** to be available in un-encrypted form. Whenever it is available in un-encrypted form any attacker with superuser access to the computer can copy it at will.
Yes. Encrypting your disks and network connections still leaves your entire random access memory readable by a malicious process running on the same computer. Local storage, network traffic, and RAM are 3 completely different things. To exploit the meltdown and spectre flaws, the malicious process needs to be running on your computer. This can happen, for example if you run a program from some unknown/untrusted source, or if some webpage manages to maniplate the JIT compiler of your browser's javascript engine into running such code.
996,764
Can the Meltdown and Spectre vulnerabilities affect also computers with encrypted home directory and usage of a VPN service? In Other words, would hackers still be able to steal passwords when encrypted transmissions and VPN services are implemented?
2018/01/16
[ "https://askubuntu.com/questions/996764", "https://askubuntu.com", "https://askubuntu.com/users/781058/" ]
Yes, in fact this is one of the hypothetical situations where these vulnerabilities might be attacked: when using encryption and trying to access the in-memory encryption key normally unavailable to other processes.
Yes. It might allow an attacker, say, by you visiting his website, to read memory of apps you have currently running. The memory content could be cookies to website you're currently logged in, saved passwords in your password manager, configuration of your VPN connection or even an encryption key you use for home directory. On the other hand if you're 100% sure you're not going to run any 3rd party code (by downloading some untrusted software or running a browser/visiting websites), you're pretty much save. Actually that's the Microsoft's view on that matter: they assumed most Windows Server instances run in an "isolated" environment, where users put only trusted apps, so Meltdown/Spectre fixes aren't needed to be enabled there on default.
996,764
Can the Meltdown and Spectre vulnerabilities affect also computers with encrypted home directory and usage of a VPN service? In Other words, would hackers still be able to steal passwords when encrypted transmissions and VPN services are implemented?
2018/01/16
[ "https://askubuntu.com/questions/996764", "https://askubuntu.com", "https://askubuntu.com/users/781058/" ]
Yes, in fact this is one of the hypothetical situations where these vulnerabilities might be attacked: when using encryption and trying to access the in-memory encryption key normally unavailable to other processes.
The vulnerabilities allow reading data from other programs, so if any other program has the unencrypted data, a malicious program can read it. So if you type your password into another program, your password can be stolen. Moreover, if you access any encrypted data, then it has to be unencrypted for you to see it, so it can be stolen. Depending on how your disk encryption works, data on your disk may be unencrypted even if you don't directly access it. If you're using end-to-end encryption, such as a VPN, well, your computer is an end, so the data is being unencrypted once it gets to your computer, so it's vulnerable. If you have an encrypted file, and the password is not stored on your computer, and you don't ever access it, then the unencrypted data is not vulnerable (unless the encryption can be otherwise broken). But as soon as you mount an encrypted drive, it's vulnerable.
996,764
Can the Meltdown and Spectre vulnerabilities affect also computers with encrypted home directory and usage of a VPN service? In Other words, would hackers still be able to steal passwords when encrypted transmissions and VPN services are implemented?
2018/01/16
[ "https://askubuntu.com/questions/996764", "https://askubuntu.com", "https://askubuntu.com/users/781058/" ]
Yes, in fact this is one of the hypothetical situations where these vulnerabilities might be attacked: when using encryption and trying to access the in-memory encryption key normally unavailable to other processes.
Yes. Encrypting your disks and network connections still leaves your entire random access memory readable by a malicious process running on the same computer. Local storage, network traffic, and RAM are 3 completely different things. To exploit the meltdown and spectre flaws, the malicious process needs to be running on your computer. This can happen, for example if you run a program from some unknown/untrusted source, or if some webpage manages to maniplate the JIT compiler of your browser's javascript engine into running such code.
996,764
Can the Meltdown and Spectre vulnerabilities affect also computers with encrypted home directory and usage of a VPN service? In Other words, would hackers still be able to steal passwords when encrypted transmissions and VPN services are implemented?
2018/01/16
[ "https://askubuntu.com/questions/996764", "https://askubuntu.com", "https://askubuntu.com/users/781058/" ]
Yes. It might allow an attacker, say, by you visiting his website, to read memory of apps you have currently running. The memory content could be cookies to website you're currently logged in, saved passwords in your password manager, configuration of your VPN connection or even an encryption key you use for home directory. On the other hand if you're 100% sure you're not going to run any 3rd party code (by downloading some untrusted software or running a browser/visiting websites), you're pretty much save. Actually that's the Microsoft's view on that matter: they assumed most Windows Server instances run in an "isolated" environment, where users put only trusted apps, so Meltdown/Spectre fixes aren't needed to be enabled there on default.
The vulnerabilities allow reading data from other programs, so if any other program has the unencrypted data, a malicious program can read it. So if you type your password into another program, your password can be stolen. Moreover, if you access any encrypted data, then it has to be unencrypted for you to see it, so it can be stolen. Depending on how your disk encryption works, data on your disk may be unencrypted even if you don't directly access it. If you're using end-to-end encryption, such as a VPN, well, your computer is an end, so the data is being unencrypted once it gets to your computer, so it's vulnerable. If you have an encrypted file, and the password is not stored on your computer, and you don't ever access it, then the unencrypted data is not vulnerable (unless the encryption can be otherwise broken). But as soon as you mount an encrypted drive, it's vulnerable.
996,764
Can the Meltdown and Spectre vulnerabilities affect also computers with encrypted home directory and usage of a VPN service? In Other words, would hackers still be able to steal passwords when encrypted transmissions and VPN services are implemented?
2018/01/16
[ "https://askubuntu.com/questions/996764", "https://askubuntu.com", "https://askubuntu.com/users/781058/" ]
Yes. Encrypting your disks and network connections still leaves your entire random access memory readable by a malicious process running on the same computer. Local storage, network traffic, and RAM are 3 completely different things. To exploit the meltdown and spectre flaws, the malicious process needs to be running on your computer. This can happen, for example if you run a program from some unknown/untrusted source, or if some webpage manages to maniplate the JIT compiler of your browser's javascript engine into running such code.
The vulnerabilities allow reading data from other programs, so if any other program has the unencrypted data, a malicious program can read it. So if you type your password into another program, your password can be stolen. Moreover, if you access any encrypted data, then it has to be unencrypted for you to see it, so it can be stolen. Depending on how your disk encryption works, data on your disk may be unencrypted even if you don't directly access it. If you're using end-to-end encryption, such as a VPN, well, your computer is an end, so the data is being unencrypted once it gets to your computer, so it's vulnerable. If you have an encrypted file, and the password is not stored on your computer, and you don't ever access it, then the unencrypted data is not vulnerable (unless the encryption can be otherwise broken). But as soon as you mount an encrypted drive, it's vulnerable.
359,198
I'm using QGIS 3.4.12 and wanted to make a map with the [Craig Retro-azimuthal projection](https://en.wikipedia.org/wiki/Craig_retroazimuthal_projection). The projection is not implemented in Proj4 and I couldn't find information about implementing new projections in the QGIS documentation. Is there anyway to "Install" the projection in QGIS?
2020/04/22
[ "https://gis.stackexchange.com/questions/359198", "https://gis.stackexchange.com", "https://gis.stackexchange.com/users/127541/" ]
[QGIS uses](https://qgis.org/api/classQgsCoordinateReferenceSystem.html#details) the [PROJ](https://proj.org/) library for coordinate transformations and projections. Unfortunately, the Craig Retro-azimuthal projection is [not implemented in the PROJ library](https://github.com/OSGeo/PROJ/blob/master/src/pj_list.h). Implementing it for use in QGIS requires adding the necessary code (written in C) to the PROJ library, compiling the PROJ library, and then compiling a new version of QGIS linked to the new version of the PROJ library. Here are examples of how other projections were added to the PROJ library: [Tobler-Mercator projection](https://github.com/OSGeo/PROJ/pull/1153), [Equal Earth projection](https://github.com/OSGeo/PROJ/pull/1090). Your best bet might be to [open a feature request](https://github.com/OSGeo/PROJ/issues). The Craig Retro-azimuthal projection is implemented in other programs: * [D3](https://github.com/d3/d3-geo-projection#geoCraig) (with a fun [interactive example](https://www.jasondavies.com/maps/craig/)) * [Geocart](https://www.mapthematics.com/ProjectionsList.php?Projection=212)
You should first check the web site epsg.io to see if you can find the projection you want. If you can, it is a fair chance that QGIS can load it. If it is not a recognized projection, you can create a custom projection and save it for re-use but only if you know the parameters of the projection you require, or you can derive the parameters from known points. Look up Proj4 specifications on the web to see the sorts of information you need. See (among others) this post: [Defining new custom projections in QGIS?](https://gis.stackexchange.com/questions/20566/defining-new-custom-projections-in-qgis) And this post: [Create custom projection using either QGIS or ArcGIS Desktop?](https://gis.stackexchange.com/questions/34501/create-custom-projection-using-either-qgis-or-arcgis-desktop)
1,341
My main job for the last 4 years has been as a "developer" maintaining an install of a large enterprise Classic ASP web application provided by a third party. This was my first web developer job. Any tips on positioning this job on my resume? Obviously the technologies are not going to be what anyone is looking for, but I work hard :) so I need to make it count for something.
2012/05/16
[ "https://workplace.stackexchange.com/questions/1341", "https://workplace.stackexchange.com", "https://workplace.stackexchange.com/users/816/" ]
If the technology is not "sexy" enough, try to explore other aspects of the application you maintained. * Was it business critical? * What type of value did it, and by extension you, deliver to the company? * Did you do anything beyond "developer" (like effort estimations, requirements analysis, technical project management, architecture etc etc)? * Were there any aspects of the application or the maintenance process that was significantly improved by you? * Did you interact with other stakeholders? And so on. There are many more aspects of software than the mere technology. Also, don't try to hide the fact that it was a legacy system. The vast majority of software work is maintaining legacy systems of varying degrees of "antiqueness".
You may have trouble getting through resume screens and picky HR drones, but fortunately this only seems to be an issue with large employers who are more concerned with filtering out resumes than looking for the perfect developer. Small employers and software shops simply tend to be more open to people with varying bakgrounds. If you can demonstrate on your resume that you had a number of responsibilities, took leadership or ownership, have the ability to quickly pick up new domain knowledge then these are all things that shine through what you are working on specifically. Furthermore if the legacy technologies and poorly written software that you maintain are such that you can identify everything wrong with them and how newer technologies improve upon or help prevent these pitfalls then you are better than most. I would want to work with such a person described above over a poor developer that does not grasp these concepts but has direct experience working in newer technologies.
1,341
My main job for the last 4 years has been as a "developer" maintaining an install of a large enterprise Classic ASP web application provided by a third party. This was my first web developer job. Any tips on positioning this job on my resume? Obviously the technologies are not going to be what anyone is looking for, but I work hard :) so I need to make it count for something.
2012/05/16
[ "https://workplace.stackexchange.com/questions/1341", "https://workplace.stackexchange.com", "https://workplace.stackexchange.com/users/816/" ]
If the technology is not "sexy" enough, try to explore other aspects of the application you maintained. * Was it business critical? * What type of value did it, and by extension you, deliver to the company? * Did you do anything beyond "developer" (like effort estimations, requirements analysis, technical project management, architecture etc etc)? * Were there any aspects of the application or the maintenance process that was significantly improved by you? * Did you interact with other stakeholders? And so on. There are many more aspects of software than the mere technology. Also, don't try to hide the fact that it was a legacy system. The vast majority of software work is maintaining legacy systems of varying degrees of "antiqueness".
Let's look at this from another angle: * What skills did you use or gain in maintaining this application? Did you troubleshoot issues, develop customer service skills, prioritize what to fix, communicate with the vendor regularly, or something else? What were common tasks that you gained proficiency in as a result of this experience? Were there any project management lessons you learned from this position? What methodologies were used around the maintenance,e.g. did you use any ITIL processes or formal development methodologies like Agile or Waterfall? * Did you learn Classic ASP on this job? Did you find any scalability, reliability, or other -ability issues with this in your time maintaining the installation? * When you say a large install, could you quantify that to some degree: How many servers, how much traffic was handled? Did you have to configure IIS in any way? Did you ever have tickets go to Microsoft or another software vendor to assist you in issues with this application?
1,341
My main job for the last 4 years has been as a "developer" maintaining an install of a large enterprise Classic ASP web application provided by a third party. This was my first web developer job. Any tips on positioning this job on my resume? Obviously the technologies are not going to be what anyone is looking for, but I work hard :) so I need to make it count for something.
2012/05/16
[ "https://workplace.stackexchange.com/questions/1341", "https://workplace.stackexchange.com", "https://workplace.stackexchange.com/users/816/" ]
You may have trouble getting through resume screens and picky HR drones, but fortunately this only seems to be an issue with large employers who are more concerned with filtering out resumes than looking for the perfect developer. Small employers and software shops simply tend to be more open to people with varying bakgrounds. If you can demonstrate on your resume that you had a number of responsibilities, took leadership or ownership, have the ability to quickly pick up new domain knowledge then these are all things that shine through what you are working on specifically. Furthermore if the legacy technologies and poorly written software that you maintain are such that you can identify everything wrong with them and how newer technologies improve upon or help prevent these pitfalls then you are better than most. I would want to work with such a person described above over a poor developer that does not grasp these concepts but has direct experience working in newer technologies.
Let's look at this from another angle: * What skills did you use or gain in maintaining this application? Did you troubleshoot issues, develop customer service skills, prioritize what to fix, communicate with the vendor regularly, or something else? What were common tasks that you gained proficiency in as a result of this experience? Were there any project management lessons you learned from this position? What methodologies were used around the maintenance,e.g. did you use any ITIL processes or formal development methodologies like Agile or Waterfall? * Did you learn Classic ASP on this job? Did you find any scalability, reliability, or other -ability issues with this in your time maintaining the installation? * When you say a large install, could you quantify that to some degree: How many servers, how much traffic was handled? Did you have to configure IIS in any way? Did you ever have tickets go to Microsoft or another software vendor to assist you in issues with this application?
22,707,447
after searching about it i found some info (yet confusing for me) > > Cygwin is a Unix-like environment and command-line interface for Microsoft Windows. > > > i found the above line in wikipedia but what does that mean? i'm not getting a clear idea about MinGW and cygwin and msys, please help
2014/03/28
[ "https://Stackoverflow.com/questions/22707447", "https://Stackoverflow.com", "https://Stackoverflow.com/users/3255739/" ]
Because it keeps confusing people: 1. Cygwin: think of it as an OS. It provides a POSIX C runtime built on top of Windows so you can compile most Unix software to run on top of it. It comes with GCC, and to some extent, you can call the Win32 API from within Cygwin, although I'm not sure that is meant to happen or work at all. 2. MSYS(2): a fork of Cygwin which has path translation magic to make native Windows programs work nicely with it. Its main goal is to provide a shell so you can run autotools configure scripts. You are not meant to build MSYS applications at all. Note that MSYS2 strives for much more and contains a full-blown package management system so you can easily install MinGW-w64 libraries and tools. 3. MinGW(-w64): A native Windows port of the GCC compiler, including Win32 API headers and libs. It contains a tiny POSIX compatibility layer (through e.g. winpthreads, the unistd.h headers and some other bits), but you cannot compile POSIX software with this. This is best compared to MSVC, which also produces native code using the Win32 API. Note that there are MinGW-w64 cross-compilers that run on Cygwin. With MSYS2, I frankly don't see a good reason to do that. Might as well run a VM with Linux if you're going to use Cygwin for that.
More or less from its [web page](http://cygwin.org) cygwin is 1. a POSIX compatibility layer on top of windows API. This is mainly encapsulated in a cygwin1.dll 2. a distribution system and repository of open source software compiled with this dll. In a nutshell, if you have a linux source, you can try to recompile for cygwin and be able to run it on windows... This enables to have accessible many of the typical unix commands (shells, gcc/g++, find....) Alternatives are: * MSYS: are a set of typical unix command implemented in windows. * mingw: A gcc/g++ target able to produce win32 programs (note that cygwin gcc/g++ programs will have a dependency on cygwin1.dll that mingw programs will not have).
1,267,412
I have a user base that is forced to use IE 7. I have created a web site that will be getting a new URL. Is there a way to force a bookmark to update to point to the new URL when a user hits the old site via a bookmark in IE?
2009/08/12
[ "https://Stackoverflow.com/questions/1267412", "https://Stackoverflow.com", "https://Stackoverflow.com/users/30850/" ]
No - there's no way to forcibly update people's bookmarks, and that is a Good Thing™. However it looks like it's possible to provide people the option to do so, by giving them a Javascript popup as described [here](http://www.hypergurl.com/bookmark.html). This might be what you're after, though it might not supersede or replace an existing bookmark. It also fails gracefully for noncompatible browsers, which is nice.
Nope. Your best bet is to include a message on the old site that says, "We've moved, and here's the new site. Remember to update your bookmarks." You can also add a Javascript button that will make it simple for unsophisticated users (<http://labnol.blogspot.com/2006/01/add-to-favorites-ie-bookmark-firefox.html>).
1,267,412
I have a user base that is forced to use IE 7. I have created a web site that will be getting a new URL. Is there a way to force a bookmark to update to point to the new URL when a user hits the old site via a bookmark in IE?
2009/08/12
[ "https://Stackoverflow.com/questions/1267412", "https://Stackoverflow.com", "https://Stackoverflow.com/users/30850/" ]
No - there's no way to forcibly update people's bookmarks, and that is a Good Thing™. However it looks like it's possible to provide people the option to do so, by giving them a Javascript popup as described [here](http://www.hypergurl.com/bookmark.html). This might be what you're after, though it might not supersede or replace an existing bookmark. It also fails gracefully for noncompatible browsers, which is nice.
If you are working within an organization, you may also want to have your desktop support team push out, as part of the software updates, links to your new site. This is especially useful if the site is the default home page of most of the users.
1,267,412
I have a user base that is forced to use IE 7. I have created a web site that will be getting a new URL. Is there a way to force a bookmark to update to point to the new URL when a user hits the old site via a bookmark in IE?
2009/08/12
[ "https://Stackoverflow.com/questions/1267412", "https://Stackoverflow.com", "https://Stackoverflow.com/users/30850/" ]
Nope. Your best bet is to include a message on the old site that says, "We've moved, and here's the new site. Remember to update your bookmarks." You can also add a Javascript button that will make it simple for unsophisticated users (<http://labnol.blogspot.com/2006/01/add-to-favorites-ie-bookmark-firefox.html>).
If you are working within an organization, you may also want to have your desktop support team push out, as part of the software updates, links to your new site. This is especially useful if the site is the default home page of most of the users.
833,245
Window of any program is black or white after maximizing it and the computer is very slow until the actuall view of program is drawn (it takes at least 5 seconds). This occurs after working for a long time in some RAM consuming software or after resuming Windows from sleep. This is how it looks like: ![This is how it looks like](https://i.stack.imgur.com/JeTz7.png) My system: Intel core i3-3120M 2.50 GHz RAM 4 GB Previously I had a computer with i5 and 4GB RAM and these things almost never occured. So is it a RAM problem or I need a more powerful processor ?
2014/10/29
[ "https://superuser.com/questions/833245", "https://superuser.com", "https://superuser.com/users/384848/" ]
If you Cmd/Shift/drag from either side of the window, it will resize equally from all sides & allow you to reach the part you can't see. Alternatively, switching to & from fullscreen should resize it too.
When you try to save look to the right of the where you would name your document, there is an up arrow, press that twice and the save option will appear by highlighting the full document.
307,668
### Preface *Skip this if you just want the question, just some background* We've been using Google Apps for Domains for years with out any (major) issues. But yesterday I removed an alias domain and added it new (secondary) domain. Then I changed my primary email address form richard@old-company.co.uk to richard@newcompany.com. But, this removed my admin rights, I just keep getting bounced to; > > <https://www.google.com/a/cpanel/newcompany.com/UserHub> > > > I can't login using richard@old-company.co.uk at: > > <https://www.google.com/a/old-company.co.uk/> > > > It fails and trying to reset the admin password results in a server error. And to boot richard@old-company.co.uk was/is my only admin account. All this has resulted in my email richard@newcompany.com working but all other \*@newcompany.com emails bouncing - \*@old-company.co.uk still work however. ### Question After scouring Google forums for answers to the above situation it seems this is a semi-regular issue but Google can take 2 weeks to respond! What I need is an emergency mail server, I just want to point my newcompany.com MX records at this server and it to accept all emails (I can filter later). Are there services that do this, anyone will do (except Google).
2011/09/02
[ "https://serverfault.com/questions/307668", "https://serverfault.com", "https://serverfault.com/users/1786/" ]
What about something like MXLogic? (which was sold to mcafee) It's a SaaS spam filter, but most provide outage protection, where they are storing the email for the length of the outage. "McAfee intelligently synchronizes and delivers an accurate record of up to 60 rolling days of outage-period message activity"
Might be just as quick to get a VPS from somewhere, install Exim and deliver all the mail to a single local user (after changing your MX to point to that server obviously).
307,668
### Preface *Skip this if you just want the question, just some background* We've been using Google Apps for Domains for years with out any (major) issues. But yesterday I removed an alias domain and added it new (secondary) domain. Then I changed my primary email address form richard@old-company.co.uk to richard@newcompany.com. But, this removed my admin rights, I just keep getting bounced to; > > <https://www.google.com/a/cpanel/newcompany.com/UserHub> > > > I can't login using richard@old-company.co.uk at: > > <https://www.google.com/a/old-company.co.uk/> > > > It fails and trying to reset the admin password results in a server error. And to boot richard@old-company.co.uk was/is my only admin account. All this has resulted in my email richard@newcompany.com working but all other \*@newcompany.com emails bouncing - \*@old-company.co.uk still work however. ### Question After scouring Google forums for answers to the above situation it seems this is a semi-regular issue but Google can take 2 weeks to respond! What I need is an emergency mail server, I just want to point my newcompany.com MX records at this server and it to accept all emails (I can filter later). Are there services that do this, anyone will do (except Google).
2011/09/02
[ "https://serverfault.com/questions/307668", "https://serverfault.com", "https://serverfault.com/users/1786/" ]
Might be just as quick to get a VPS from somewhere, install Exim and deliver all the mail to a single local user (after changing your MX to point to that server obviously).
We use [www.dnsmadeeasy.com](http://www.dnsmadeeasy.com) to provide backup Mail servers for us. Costs about $13/year. We simply add their mail servers to our MX records (just a lower priority than our primary server which is located elsewhere) and it works great. When our primary server comes back online we get the queued email, or if the server died, we'd sort out a new mail server and insert a new MX record. We use [verygoodemail.com](http://Www.verygoodemail.com) (UK based, excellent customer service) for hosted email on one of our domains. It's very good value (like the suggestion for hosted exchange at rackspace)
307,668
### Preface *Skip this if you just want the question, just some background* We've been using Google Apps for Domains for years with out any (major) issues. But yesterday I removed an alias domain and added it new (secondary) domain. Then I changed my primary email address form richard@old-company.co.uk to richard@newcompany.com. But, this removed my admin rights, I just keep getting bounced to; > > <https://www.google.com/a/cpanel/newcompany.com/UserHub> > > > I can't login using richard@old-company.co.uk at: > > <https://www.google.com/a/old-company.co.uk/> > > > It fails and trying to reset the admin password results in a server error. And to boot richard@old-company.co.uk was/is my only admin account. All this has resulted in my email richard@newcompany.com working but all other \*@newcompany.com emails bouncing - \*@old-company.co.uk still work however. ### Question After scouring Google forums for answers to the above situation it seems this is a semi-regular issue but Google can take 2 weeks to respond! What I need is an emergency mail server, I just want to point my newcompany.com MX records at this server and it to accept all emails (I can filter later). Are there services that do this, anyone will do (except Google).
2011/09/02
[ "https://serverfault.com/questions/307668", "https://serverfault.com", "https://serverfault.com/users/1786/" ]
What about something like MXLogic? (which was sold to mcafee) It's a SaaS spam filter, but most provide outage protection, where they are storing the email for the length of the outage. "McAfee intelligently synchronizes and delivers an accurate record of up to 60 rolling days of outage-period message activity"
Why not a [hosted Exchange account at Rackspace](http://www.rackspace.com/apps/email_hosting/exchange_hosting/)? 10 bucks a mailbox; setup your recipient policy, mailboxes, (remove mailbox size limits), accepted domain, change over your MX. Done. Pull everyone's mail down as a PST when you're done; re-import into Google via their migration tools.