qid int64 1 74.7M | question stringlengths 12 33.8k | date stringlengths 10 10 | metadata list | response_j stringlengths 0 115k | response_k stringlengths 2 98.3k |
|---|---|---|---|---|---|
262,390 | In English, do you have a proverb like “big fish eats small fish” which means “justice belongs to the stronger”?
For example, suppose there is a successful new startup. Big companies start to eye the smaller one. Finally they acquire the small startup even though the startup wants to be independent. But the startup couldn’t keep its independence due to its limited financial resources. | 2015/07/26 | [
"https://english.stackexchange.com/questions/262390",
"https://english.stackexchange.com",
"https://english.stackexchange.com/users/105551/"
] | We have an allied proverb sometimes referred to as "the New Golden Rule":
>
> He who has the gold rules.
>
>
>
Doyle, Mieder & Shapiro, *The [Yale] Dictionary of Modern Proverbs* (2012), expresses this saying somewhat differently:
>
> He who has the gold makes the rules.
>
>
>
or
>
> Whoever has the gold rules.
>
>
>
The earliest citation of its first formulation is from 1967 (referring to an earlier *Wizard of Id* cartoon).
---
A much older and very well known expression of the same idea is "**Might makes right**," which I suppose includes the right under big-fish law to eat little fish.
Or again, to invoke the spirit of Anatole France, "The law, in its majestic equality, permits big fish and little fish alike to gulp each other down."
---
And to top things off, we do have the saying "Big fish eat little fish" in English. Here is the entry for that proverb in Martin Manser, *The Facts on File Dictionary of Proverbs* (2002):
>
> **big fish eat little fish** Small organizations or insignificant people tend to be swallowed up or destroyed by those that are greater and more powerful ... The proverb was first recorded in a text dating from before 1200. In Shakespeare's play *Pericles* (2:1), the following exchange occurs between two fishermen: "'Master, I marvel how the fishes live in the sea.' 'Why, as men do a-land—the great ones eat up the little ones.'"
>
>
> | In a larger sense, we can say "Survival of the fittest" which is Darwin's famous theory. It not a proverb, but a phrase that can be used.
This can be used in the context where a company is able to sustain in the volatile global market.
This can also be used in the above scenario of comparing the might of one company against another. |
262,390 | In English, do you have a proverb like “big fish eats small fish” which means “justice belongs to the stronger”?
For example, suppose there is a successful new startup. Big companies start to eye the smaller one. Finally they acquire the small startup even though the startup wants to be independent. But the startup couldn’t keep its independence due to its limited financial resources. | 2015/07/26 | [
"https://english.stackexchange.com/questions/262390",
"https://english.stackexchange.com",
"https://english.stackexchange.com/users/105551/"
] | Another saying that can convey the concept you are referring to is:
***[The law of the jungle](http://idioms.thefreedictionary.com/the+law+of+the+jungle):***
>
> * the way in which only the strongest and cleverest people in a society stay alive or succeed.
>
>
> + I was brought up on the streets where the law of the jungle applies, so I soon learnt how to look after myself.
>
>
>
Cambridge IdiomS Dictionary | An old proverb, **"The weakest go to the wall"** (or "...goes to the wall" as in Romeo and Juliet) looks like what you are looking for.
>
> * "go to the wall" - Lose a conflict, be defeated [TFD](http://idioms.thefreedictionary.com/go+to+the+wall)
>
>
>
There is also **"The House always wins."**, an old proverb where "The House" means a casino, where every game is statistically in the house's favor. |
262,390 | In English, do you have a proverb like “big fish eats small fish” which means “justice belongs to the stronger”?
For example, suppose there is a successful new startup. Big companies start to eye the smaller one. Finally they acquire the small startup even though the startup wants to be independent. But the startup couldn’t keep its independence due to its limited financial resources. | 2015/07/26 | [
"https://english.stackexchange.com/questions/262390",
"https://english.stackexchange.com",
"https://english.stackexchange.com/users/105551/"
] | In a larger sense, we can say "Survival of the fittest" which is Darwin's famous theory. It not a proverb, but a phrase that can be used.
This can be used in the context where a company is able to sustain in the volatile global market.
This can also be used in the above scenario of comparing the might of one company against another. | An old proverb, **"The weakest go to the wall"** (or "...goes to the wall" as in Romeo and Juliet) looks like what you are looking for.
>
> * "go to the wall" - Lose a conflict, be defeated [TFD](http://idioms.thefreedictionary.com/go+to+the+wall)
>
>
>
There is also **"The House always wins."**, an old proverb where "The House" means a casino, where every game is statistically in the house's favor. |
262,390 | In English, do you have a proverb like “big fish eats small fish” which means “justice belongs to the stronger”?
For example, suppose there is a successful new startup. Big companies start to eye the smaller one. Finally they acquire the small startup even though the startup wants to be independent. But the startup couldn’t keep its independence due to its limited financial resources. | 2015/07/26 | [
"https://english.stackexchange.com/questions/262390",
"https://english.stackexchange.com",
"https://english.stackexchange.com/users/105551/"
] | Another saying that can convey the concept you are referring to is:
***[The law of the jungle](http://idioms.thefreedictionary.com/the+law+of+the+jungle):***
>
> * the way in which only the strongest and cleverest people in a society stay alive or succeed.
>
>
> + I was brought up on the streets where the law of the jungle applies, so I soon learnt how to look after myself.
>
>
>
Cambridge IdiomS Dictionary | In a larger sense, we can say "Survival of the fittest" which is Darwin's famous theory. It not a proverb, but a phrase that can be used.
This can be used in the context where a company is able to sustain in the volatile global market.
This can also be used in the above scenario of comparing the might of one company against another. |
285,196 | I have several PDF files in iBooks. I want to open them with the "PDF reader" App instead. How do I do this? | 2017/05/29 | [
"https://apple.stackexchange.com/questions/285196",
"https://apple.stackexchange.com",
"https://apple.stackexchange.com/users/239637/"
] | Another method, simpler, not involving clouds is as follows:
1. Touch and hold on book's icon in iBooks, and, from pop-up menu
choose "Print", see figure below:
[](https://i.stack.imgur.com/BMHyW.png)
2. On the preview page, do inverse pinch (two fingers spread):
[](https://i.stack.imgur.com/uh3z4.png)
3. Now, from Printer options, lower left corner, touch the square to
send to other applications:
[](https://i.stack.imgur.com/n1Vbb.png)
4. And choose where to send a copy - in this example I used Documents
application
[](https://i.stack.imgur.com/gTzrQ.png) | Solution for MacOS (the question originally didn't specify OS)
To do this, just open the folder which contains your iBooks, right click on a particular book, go to "open with", and choose the program you want (say pdf reader).
This [post](https://apple.stackexchange.com/questions/259836/where-are-my-ibooks-stored-in-macos-sierra) describes where the iBooks folder is located in Sierra.
It should look something like this:
[](https://i.stack.imgur.com/IWw0Z.png)
---
Edit:
The OP has now specified that the problem is specific to iOS. Doing this directly is **impossible** due to the way that the iOS manages storage. iOS doesn't have a file system in the way that macOS does. Each file is associated with the operating system or a particular app. According to this [website](https://developer.apple.com/library/content/documentation/FileManagement/Conceptual/FileSystemProgrammingGuide/FileSystemOverview/FileSystemOverview.html) for iOS developers
>
> For security purposes, an iOS app’s interactions with the file system are limited to the directories inside the app’s sandbox directory
>
>
>
This means app A can't just go into app B's storage and read a file (say a PDF document).
Thus, you need a workaround. Personally, I use google drive to sync my books (wirelessly) between my mac and my iPhone/tablets. While you could probably do something like this with iCloud I haven't tried that yet so I'll give my solution. All you have to do is
1. Sign up for a google account if you don't have one already
2. [Download](https://tools.google.com/dlpage/drive) the Google Drive macOS app
3. Make a folder *F* of all your books (iBooks already did this (see my unedited answer)). Then you have 2 choices:
4. Choice 1 (ADVANCED): "Hard link" folder *F* to your Google Drive folder. This will update your google drive automatically every time *F* is edited, say every time you add a new book to *F*. The way to do this is discussed [in this question](https://apple.stackexchange.com/questions/230906/symlink-google-drive). You will need knowledge of the command line.
5. Choice 2 (SIMPLE): Manually copy *F* into your google drive folder. (Note that you can also drag *F* into the google drive folder. **HOWEVER if you do this once *F* is uploaded, *F* will be stored in the (google drive) cloud, and no longer on your computer**.)
6. Download the google drive app on your phone (or tablet or android) and sign in.
7. You can now see the folder *F* on your iphone and any other ios (or Android!!!!!) devices on which you have installed the app.
8. If you have a wifi connection, you can just click on a PDF to open it. If you want to make it so that in the future you can open PDFs without a wifi connection, just follow these [instructions](https://support.google.com/drive/answer/2375012?co=GENIE.Platform%3DiOS&hl=en).
Here's a screenshot of how it should look. [](https://i.stack.imgur.com/sZ3pi.png) |
249,033 | I need an audio streaming setup that supports the following formats: WMA, AAC and MP3. The streams must be compatible both with desktop players like Winamp. Win Media Player and with Flash Player and devices like iPhone, Android, etc.
I'm looking for a single server solution and a single encoder solution that would meet all those requirements. Any ideas? | 2011/03/18 | [
"https://serverfault.com/questions/249033",
"https://serverfault.com",
"https://serverfault.com/users/16330/"
] | I believe that FFserver can do what you're looking for. It's a part of the open source cross-platform FFmpeg suite, available at <http://www.ffmpeg.org/> | A combination of [Digital Rapids](http://www.digital-rapids.com/) various products would do what you want but not for free, not sure of any open source equivalents. |
249,033 | I need an audio streaming setup that supports the following formats: WMA, AAC and MP3. The streams must be compatible both with desktop players like Winamp. Win Media Player and with Flash Player and devices like iPhone, Android, etc.
I'm looking for a single server solution and a single encoder solution that would meet all those requirements. Any ideas? | 2011/03/18 | [
"https://serverfault.com/questions/249033",
"https://serverfault.com",
"https://serverfault.com/users/16330/"
] | Try VLC: <http://www.videolan.org/vlc/>
The most important advantages are: CLI interface + GUI, nearly all OS, remote control over web interface | A combination of [Digital Rapids](http://www.digital-rapids.com/) various products would do what you want but not for free, not sure of any open source equivalents. |
249,033 | I need an audio streaming setup that supports the following formats: WMA, AAC and MP3. The streams must be compatible both with desktop players like Winamp. Win Media Player and with Flash Player and devices like iPhone, Android, etc.
I'm looking for a single server solution and a single encoder solution that would meet all those requirements. Any ideas? | 2011/03/18 | [
"https://serverfault.com/questions/249033",
"https://serverfault.com",
"https://serverfault.com/users/16330/"
] | I believe that FFserver can do what you're looking for. It's a part of the open source cross-platform FFmpeg suite, available at <http://www.ffmpeg.org/> | Try VLC: <http://www.videolan.org/vlc/>
The most important advantages are: CLI interface + GUI, nearly all OS, remote control over web interface |
6,387 | I have no problem with identifying whether a given molecule has geometrical isomerism if it's not cyclic. But cyclic compounds are confusing for me. For example, how to check whether the following molecule posses geometrical isomerism?
[![ 2,2,5,5‐tetramethyl‐4‐[(3Z)‐thiolan‐3‐ylidene]oxane](https://i.stack.imgur.com/QWBVA.png)](https://i.stack.imgur.com/QWBVA.png)
For a molecule to show geometrical isomerism different molecules should be attached to the double bonded carbons. So, I'm sure that geometrical isomerism (if it is present) is along the double bonded carbons. But how to check whether different groups are attached to it when the double bonded carbons are the part of a cycle? | 2013/10/02 | [
"https://chemistry.stackexchange.com/questions/6387",
"https://chemistry.stackexchange.com",
"https://chemistry.stackexchange.com/users/2196/"
] | I hope the statutes of limitation haven't run out. Structure **1** is a (*Z*)-alkene. Using Cahn-Ingold-Prelog (CIP) protocol, the rings are deconstructed as shown in diagram **2**. The larger red arrow marks the higher priority carbon (C,C,C). The smaller red arrow points to the lower priority[carbon (C,H,H). For the blue arrows, sulfur takes priority over carbon. [**Addendum:** *Strictly speaking, the two blue arrows should point to the methylene groups next to the blue sp2 carbon such that C(S,H,H) > C(C,H,H).*] The two larger arrows establish a (*Z*)-configuration. See: [What are the CIP rules for cyclic substituents?](https://chemistry.stackexchange.com/questions/88893/what-are-the-cip-rules-for-cyclic-substituents/89085#89085)
[](https://i.stack.imgur.com/ENHIG.jpg) | Two ways to think about it:
* Intuitively: Take one side of the double bond (say, the sulfur-containing one) and imagine rotating it by 180° (so what was up is now down, in your drawing). Is this molecule the same? If it is, then you don't have isomerism. If the procedure gives a new, different molecule, then you have isomerism.
* More formal: use the Cahn–Ingold–Prelog rules to rank both sides of the two carbon atoms of the double bond. If priorities are different, then you have different isomers (and you can actually assign them a name.
In your particular example, the compound has another isomer, and the one you have drawn has the [(*E*)](http://en.wikipedia.org/wiki/E-Z_notation) configuration. |
236,161 | Is this sentence correct: The teacher told every single one of the pupils rewrite their essays. | 2015/03/28 | [
"https://english.stackexchange.com/questions/236161",
"https://english.stackexchange.com",
"https://english.stackexchange.com/users/115273/"
] | The other answer indicates correctly a "to" is missing in your formulation.
However, you can get rid of "to" in this recast using the subjunctive mood:
*The teacher **required** that every single one of the pupils **rewrite** their essays.*
*The teacher **required** that every single one of the pupils **should rewrite** their essays.*
"require" and "should require" are subjunctive mood forms here.
The subjunctive mood is much more common after "require," which indicates a strong prescription.
E.g.
>
> [Health Effects of Low-level Radiation: Joint Hearing ...](https://books.google.ca/books?id=PCLRAAAAMAAJ&q=%22required%20that%20he%20rewrite%22&dq=%22required%20that%20he%20rewrite%22&hl=en&sa=X&ei=-sUWVeDRD8HbsASH-YDgBQ&redir_esc=y) United
> States. Congress. House. Committee on Interstate and Foreign Commerce.
> Subcommittee on Oversight and Investigations - 1979
>
>
> You're saying that those records came directly from the Federal
> Government ? Dr. BROWER. This was the AEC veterinarian who was under—
> his superiors had taken the records and **required that he rewrite**
> his report
>
>
> | It's fine, it's just missing the word "to":
>
> The teacher told every single one of the pupils **to** rewrite their essays.
>
>
>
It would also be fine to say:
>
> The teacher told all the pupils to rewrite their essays.
>
>
> |
236,161 | Is this sentence correct: The teacher told every single one of the pupils rewrite their essays. | 2015/03/28 | [
"https://english.stackexchange.com/questions/236161",
"https://english.stackexchange.com",
"https://english.stackexchange.com/users/115273/"
] | It's fine, it's just missing the word "to":
>
> The teacher told every single one of the pupils **to** rewrite their essays.
>
>
>
It would also be fine to say:
>
> The teacher told all the pupils to rewrite their essays.
>
>
> | 'Every single one / every single one of the pupils' takes [singular agreement](https://english.stackexchange.com/questions/46311/is-each-and-every-one-of-you-singular-or-plural). So assuming there was one essay per pupil, and gender of the pupils was unknown or mixed , the correct version is
>
> The teacher told every single one of the pupils to rewrite their
> essay.
>
>
> |
236,161 | Is this sentence correct: The teacher told every single one of the pupils rewrite their essays. | 2015/03/28 | [
"https://english.stackexchange.com/questions/236161",
"https://english.stackexchange.com",
"https://english.stackexchange.com/users/115273/"
] | The other answer indicates correctly a "to" is missing in your formulation.
However, you can get rid of "to" in this recast using the subjunctive mood:
*The teacher **required** that every single one of the pupils **rewrite** their essays.*
*The teacher **required** that every single one of the pupils **should rewrite** their essays.*
"require" and "should require" are subjunctive mood forms here.
The subjunctive mood is much more common after "require," which indicates a strong prescription.
E.g.
>
> [Health Effects of Low-level Radiation: Joint Hearing ...](https://books.google.ca/books?id=PCLRAAAAMAAJ&q=%22required%20that%20he%20rewrite%22&dq=%22required%20that%20he%20rewrite%22&hl=en&sa=X&ei=-sUWVeDRD8HbsASH-YDgBQ&redir_esc=y) United
> States. Congress. House. Committee on Interstate and Foreign Commerce.
> Subcommittee on Oversight and Investigations - 1979
>
>
> You're saying that those records came directly from the Federal
> Government ? Dr. BROWER. This was the AEC veterinarian who was under—
> his superiors had taken the records and **required that he rewrite**
> his report
>
>
> | 'Every single one / every single one of the pupils' takes [singular agreement](https://english.stackexchange.com/questions/46311/is-each-and-every-one-of-you-singular-or-plural). So assuming there was one essay per pupil, and gender of the pupils was unknown or mixed , the correct version is
>
> The teacher told every single one of the pupils to rewrite their
> essay.
>
>
> |
18,890 | John 14:16 says:
>
> And I will pray to God that he will send to you another *comforter*, who will abide with you for ever!
>
>
>
Muslims claim that "another comforter" means Ahmad in Arabic, which means "Praised One"; and Muhammad also means "Praise One" hence, Ahmad and Muhammad are synonyms (same meaning).
Hence John 14:16 talks about prophet Muhammad of Islam!
As per me, names given to humans by their elders don't necessary reflect the attributes of that particular human. For example, Shah-Rukh Khan, the superstar of Indian films was named Shah-Rukh by his elders (parents). Shah means king, Rukh means face. Hence, Shah-Rukh means *face of the king*! But, it doesn't mean that actor Shah-Rukh Khan is the King of some country.
Similarly, Muhammad was so named by his grandfather Abdul-Muttalib. It is his original name. But Ahmad is not the original name of prophet Muhammad. Ahmad is an attribute of prophet Muhammad.
Just like Rashid (guided one), Bashir (bringer of good tidings), Rasul (messenger), Nabi (prophet), Mustafa (chosen one) are attributes of the prophet Muhammad, not original-names. The original name of the prophet Muhammad is Muhammad only, name given by his grandfather.
This is the difference between Muhammad and Ahmad.
But sura 61 verse 6 in the Quran, in a nutshell, says:
>
> Jesus told the children of Israel that, after him, a messenger will come whose *name* will be Ahmad.
>
>
>
Name in Arabic means "bisma, us muha, I-sma".
Sura 61, verse 6 should have said "a messenger will come after me who *will be Ahmad*" instead of "whose *name* will be Ahmad".
in sura 61 verse 6 , "AHMAD" is NOUN (name of a person ) instead of ADJECTIVE ( attribute of the person ) which is exactly opposite to John 14:16 in which PARCLETE -COMFORTER-PRAISED-ONE or AHMAD is ADJECTIVE instead of NOUN
As I explained before, there is a vast difference between formal, official names and attributes, which are taken as names of the concerned human. Muhammad is the former (official name) of the prophet, and Ahmad is the attribute of the prophet, assumed as a name of the prophet.
Or John 14:16 should have said: "and I will pray to God that he will send another comforter *whose name will be Praised One or Comforter or Counselor*" (Ahmad in Arabic) instead of "and I will pray to God that he will send another comforter".
I would like to understand if John 14:16 really talks about prophet Muhammad. | 2013/09/07 | [
"https://christianity.stackexchange.com/questions/18890",
"https://christianity.stackexchange.com",
"https://christianity.stackexchange.com/users/5664/"
] | This is an ancient custom which predates Christianity. Pliny (*Natural History* 28.5) records a custom among the Romans of greeting someone who sneezes:
>
> Why is it that we salute a person when he sneezes, an observance which Tiberius Caesar, they say, the most unsociable of men, as we all know, used to exact, when riding in his chariot even? Some there are, too, who think it a point religiously to be observed to mention the name as well of the person whom they salute. [...] These usages have been established by persons who entertained a belief that the gods are ever present, in all our affairs and at all hours, and who have therefore found the means of appeasing them by our vices even.1
>
>
>
So he says that superstitions of this kind are attributable to the belief that certain apparently meaningless events are actually "signs" from some spiritual power. Homer also gives an account of a sneeze-omen in the *Odyssey* 17.528-550, where Penelope predicts that Odysseus will kill her suitors if he returns: at this point, Telemachus sneezes (Τηλέμαχος δὲ μέγ' ἔπταρεν), and Penelope interprets that as a sign that her prediction is true.
The fact that sneezing is involuntary might make it more likely for people to see a hidden hand at work. Augustine ([*On Doctrine* 2.20](http://www.newadvent.org/fathers/12022.htm)) writes about "the most frivolous practices" of superstitious observances when "any part of the body should jump", or "to go back to bed if any one should sneeze when you are putting on your slippers". 2 In this case, the sneeze is interpreted as a divine warning that today is a bad day to do anything important.
Because a sneeze comes from the head, the seat of reason, it may be regarded as being of divine origin, according to the school of Aristotle; and moreover, it was seen as a sign of good health and vitality, unlike coughing, which was more commonly associated with disease (*Problems* chapter 33, "Concerning the nose"). The only Biblical sneeze is in 2 Kings 4, where Elisha restores a dead boy to life, demonstrating a perceived link with the breath of life:
>
> When Elisha came into the house, he saw the child lying dead on his bed. So he went in and closed the door on the two of them, and prayed to the Lord. Then he got up on the bed and lay upon the child, putting his mouth upon his mouth, his eyes upon his eyes, and his hands upon his hands; and while he lay bent over him, the flesh of the child became warm. He got down, walked once to and fro in the room, then got up again and bent over him; the child sneezed seven times, and the child opened his eyes. 2 Kings 4:32-35 (NRSV)
>
>
>
Just from these examples, we can see that sneeze customs are a bit ambiguous when it comes to the sneeze being "good" or "bad". "God bless you!" could be an appropriate response either way. But Scripture also often speaks against the interpretation of omens - or at least encourages people to seek *actual* divine guidance - so we could say that a "get well soon" kind of "bless you" is acceptable, but the "ooh, that's unlucky" kind is not.
I have heard the evil nasal demon explanation many times but I have never seen a source which endorsed the theory. (It's not hard to find people sneering at the silly mediaevals, but this may be yet another case where they weren't so silly.)
1. [Original](http://penelope.uchicago.edu/Thayer/L/Roman/Texts/Pliny_the_Elder/28%2a.html): *cur sternuentes salutamus? quod etiam Tiberium Caesarem, tristissimum, ut constat, hominum, in vehiculo exegisse tradunt, et aliqui nomine quoque consalutare religiosius putant?* [...] *haec instituere illi, qui omnibus negotiis horisque interesse credebant deos et ideo placatos etiam vitiis nostris reliquerunt.* English translation above by John Bostock and H. T. Riley (Taylor and Francis, 1855).
2. [Original](http://www.augustinus.it/latino/dottrina_cristiana/index2.htm) phrases: *inanissimarum observationum*; *si membrum aliquod salierit*; *redire ad lectum si quis dum se calceat sternutaverit*. | The practice is not Christian, by doctrine, but became Christian by circumstance.
During the [Black Death](http://en.wikipedia.org/wiki/Black_Death), a plague which killed approximately 25% of the Earth's population in 14th century, sneezing was thought to be a first symptom of the infected.
But the practice can be traced to long before that, however, it is still related to the Black Death. Gregory I in AD 590 ordered unending prayer and chanting in the streets to help ward off an approaching epidemic.
Wikipedia also says the following are possible:
>
> Another legend holds that the heart stops beating during a sneeze, and that the phrase "bless you" encourages the heart to continue beating.
>
>
> In some cultures, sneezing is seen as a sign of good fortune[1] or God's beneficence. In such cases, "bless you" may be spoken as a recognition of that luck.
>
>
> Alternatively, it may be possible that the phrase began simply as a response for an event that was not well understood at the time.
>
>
>
[Wikipedia discusses this a little bit](http://en.wikipedia.org/wiki/Bless_you). I think there is enough in that article to satisfy your curiosity. |
26,337 | I was recently reading an interlinear of this verse and realized that the Hebrew doesn't refer to any "us" as we see in the English versions. It appears to read:
>
> and make man in image and likeness.
>
>
>
Is there anything in the grammar that suggests that we add "us" or is this merely a translational issue because of Christian belief in trinity? | 2016/12/25 | [
"https://hermeneutics.stackexchange.com/questions/26337",
"https://hermeneutics.stackexchange.com",
"https://hermeneutics.stackexchange.com/users/14172/"
] | The Hebrew word for 'make' is נַֽעֲשֶׂ֥ה, from the root עשׂה. The word has the following morphological parsing:
* Qal stem (also called the paˈʕal): this is the basic Hebrew active stem
* 1st person plural
* Imperfect conjugation: this is the normal future conjugation, but it also marks imperatives, especially for first or third person verbs. The ן (Nun) prefix is the distinctive marker of Imperfect 1pl verbs
Non-second person imperatives are a little odd, and not very common in English. The conventional way to express them is through a "let ..." phrase.
Prefixes and suffixes are extremely important in Hebrew (as they are in English) and they cannot be ignored. This is especially the case because most subject pronouns are marked as suffixes rather than independent words. It is not enough to just look at the meanings of the roots of the words. If your interlinear does not communicate to you the meaning of the prefixes and suffixes then unfortunately you probably need to look for another one. | I sympathize with your unease, but unfortunately we simply must translate it this way because of the limits of the English language. This has to do with the fact that English simply does not have the grammatical mood used in the Biblical Hebrew.
Languages signal the modality of a given verb based on the mood it is placed in (for instance, the indicative, subjunctive, conditional, etc.). In Biblical Hebrew, there is a mood not found in English, the cohortative. This mood is to be contrasted with the imperative. Generally speaking, the cohortative mood expresses the speaker's will, desires, or intentions, whereas the imperative mood is used to expresses the speaker's commands to another. In Gen 1:26, we have:
>
> **וַיֹּאמֶר אֱלֹהִים, נַעֲשֶׂה אָדָם בְּצַלְמֵנוּ**
>
>
>
In this case, we have the Divine speaking in the 1st person common **plural** cohortative for the verb 'עשׂה'. This reading is reinforced when we consider the pronominal suffix 'נו-' ("our") appended to the word 'צלם' ("image"), once again indicating a plural subject (i.e. "**we** desire to make humanity in **our** image").
Therefore, since the verb in this verse is conjugated in the 1st person plural, the most faithful renderings into English will invariably indicate this by using "us" at this point.
As should be clear, the English rendering is simply a faithful translation of the Hebrew, and not at all contingent on doctrinal suppositions concerning a Trinity. |
26,337 | I was recently reading an interlinear of this verse and realized that the Hebrew doesn't refer to any "us" as we see in the English versions. It appears to read:
>
> and make man in image and likeness.
>
>
>
Is there anything in the grammar that suggests that we add "us" or is this merely a translational issue because of Christian belief in trinity? | 2016/12/25 | [
"https://hermeneutics.stackexchange.com/questions/26337",
"https://hermeneutics.stackexchange.com",
"https://hermeneutics.stackexchange.com/users/14172/"
] | I sympathize with your unease, but unfortunately we simply must translate it this way because of the limits of the English language. This has to do with the fact that English simply does not have the grammatical mood used in the Biblical Hebrew.
Languages signal the modality of a given verb based on the mood it is placed in (for instance, the indicative, subjunctive, conditional, etc.). In Biblical Hebrew, there is a mood not found in English, the cohortative. This mood is to be contrasted with the imperative. Generally speaking, the cohortative mood expresses the speaker's will, desires, or intentions, whereas the imperative mood is used to expresses the speaker's commands to another. In Gen 1:26, we have:
>
> **וַיֹּאמֶר אֱלֹהִים, נַעֲשֶׂה אָדָם בְּצַלְמֵנוּ**
>
>
>
In this case, we have the Divine speaking in the 1st person common **plural** cohortative for the verb 'עשׂה'. This reading is reinforced when we consider the pronominal suffix 'נו-' ("our") appended to the word 'צלם' ("image"), once again indicating a plural subject (i.e. "**we** desire to make humanity in **our** image").
Therefore, since the verb in this verse is conjugated in the 1st person plural, the most faithful renderings into English will invariably indicate this by using "us" at this point.
As should be clear, the English rendering is simply a faithful translation of the Hebrew, and not at all contingent on doctrinal suppositions concerning a Trinity. | Simple answer: It's a twisting of scripture to promote the pagan concept of the trinity. "let us" is added to the verb "make" to complete a phrase but "us" is referring to H430 elohim which in 2,598 occurrences NEVER is used to represent a plural. Elohim IS ALWAYS SINGULAR. Trinitarians conveniently ignore this fact and the fact that in the preceding and following verses God / Elohim is used in the singular sense.
Jeremiah 8:8 Pagan scribes have twisted the word of God (adding another gospel, the trinity). |
26,337 | I was recently reading an interlinear of this verse and realized that the Hebrew doesn't refer to any "us" as we see in the English versions. It appears to read:
>
> and make man in image and likeness.
>
>
>
Is there anything in the grammar that suggests that we add "us" or is this merely a translational issue because of Christian belief in trinity? | 2016/12/25 | [
"https://hermeneutics.stackexchange.com/questions/26337",
"https://hermeneutics.stackexchange.com",
"https://hermeneutics.stackexchange.com/users/14172/"
] | The Hebrew word for 'make' is נַֽעֲשֶׂ֥ה, from the root עשׂה. The word has the following morphological parsing:
* Qal stem (also called the paˈʕal): this is the basic Hebrew active stem
* 1st person plural
* Imperfect conjugation: this is the normal future conjugation, but it also marks imperatives, especially for first or third person verbs. The ן (Nun) prefix is the distinctive marker of Imperfect 1pl verbs
Non-second person imperatives are a little odd, and not very common in English. The conventional way to express them is through a "let ..." phrase.
Prefixes and suffixes are extremely important in Hebrew (as they are in English) and they cannot be ignored. This is especially the case because most subject pronouns are marked as suffixes rather than independent words. It is not enough to just look at the meanings of the roots of the words. If your interlinear does not communicate to you the meaning of the prefixes and suffixes then unfortunately you probably need to look for another one. | Simple answer: It's a twisting of scripture to promote the pagan concept of the trinity. "let us" is added to the verb "make" to complete a phrase but "us" is referring to H430 elohim which in 2,598 occurrences NEVER is used to represent a plural. Elohim IS ALWAYS SINGULAR. Trinitarians conveniently ignore this fact and the fact that in the preceding and following verses God / Elohim is used in the singular sense.
Jeremiah 8:8 Pagan scribes have twisted the word of God (adding another gospel, the trinity). |
16,414,939 | I don't know how search engine bots work, database entries for robots on my browser records are e.g. Googlebot, msnbot, BingBot, etc.
So I don't know if they have javascript enabled or anything.
Why I want to know if they have javascript enabled? Because I want to require Javascript on my site. What I did to do this is that I have an 'overlay' div with a short message that I set to 'display:none' with javascript on page load. So if there is no Javascript the overlay won't dissapear and nothing in the site is clickable or anything.
So can robots still crawl my site even with the Javascript requirement thing I made? Because I want google and other good bots to be able to crawl my site. | 2013/05/07 | [
"https://Stackoverflow.com/questions/16414939",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/1429811/"
] | Search robots can and will crawl your site, but they do not understand JavaScript, so they will ignore any JS. They should however have no issue crawling the page you described. | As far as I know search engines can parse content recognizing different content and behavior. They can also penalize specific hiding content. I suspect Google is a very smart search engine and has the ability to recognize some javascript but the internal behavior of their system is unknown to us. |
16,414,939 | I don't know how search engine bots work, database entries for robots on my browser records are e.g. Googlebot, msnbot, BingBot, etc.
So I don't know if they have javascript enabled or anything.
Why I want to know if they have javascript enabled? Because I want to require Javascript on my site. What I did to do this is that I have an 'overlay' div with a short message that I set to 'display:none' with javascript on page load. So if there is no Javascript the overlay won't dissapear and nothing in the site is clickable or anything.
So can robots still crawl my site even with the Javascript requirement thing I made? Because I want google and other good bots to be able to crawl my site. | 2013/05/07 | [
"https://Stackoverflow.com/questions/16414939",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/1429811/"
] | Yes, since 2010 at least googlebot was known for understanding not direct links created in (some) javascript, but they won't need your javascript to read links, as those are plainly visible in html. The same goes with people browsing with javascript turned off. | As far as I know search engines can parse content recognizing different content and behavior. They can also penalize specific hiding content. I suspect Google is a very smart search engine and has the ability to recognize some javascript but the internal behavior of their system is unknown to us. |
119,256 | At the top of a bottle of pop, there is a corkscrew pattern into which the plastic cap is twisted, tightened and sealed.
What is the name of this feature of the bottle? | 2013/07/15 | [
"https://english.stackexchange.com/questions/119256",
"https://english.stackexchange.com",
"https://english.stackexchange.com/users/32809/"
] | The *fishbowl* is the fishbowl of public scrutiny.
The *one* in *one of someone* is the portrait.
So this is the portrait of a person unable to make the transition to a life wide-open to public scrutiny. | The image below (from *[fishbowl](http://images.yourdictionary.com/fishbowl)* at yourdictionary.com) shows a fishbowl, as often used stereotypically to portray how visible fish are when they live in a transparent glass bowl that anyone can see through. Saying that Governor McDonnell and his wife are in “the Richmond fishbowl” refers to them being highly visible to one and all. Their privacy is limited because they are prominent public figures, at the top of the heap among important people in the Virginia capitol.
 |
119,256 | At the top of a bottle of pop, there is a corkscrew pattern into which the plastic cap is twisted, tightened and sealed.
What is the name of this feature of the bottle? | 2013/07/15 | [
"https://english.stackexchange.com/questions/119256",
"https://english.stackexchange.com",
"https://english.stackexchange.com/users/32809/"
] | The *fishbowl* is the fishbowl of public scrutiny.
The *one* in *one of someone* is the portrait.
So this is the portrait of a person unable to make the transition to a life wide-open to public scrutiny. | A fishbowl is a highly visible way of housing a pet such as a goldfish, because they are on display 24/7.
Richmond is the state capital of Virginia, and the "Richmond fishbowl" is a reference to the fact that being a governor (or first lady) of Virginia in Richmond is like "living in a fishbowl."
The comment was that the "portrait" of Mrs. MacDonnell "painted" by co-workers, was of someone unable to make the leap from "private person" to the "fishbowl" that a First Lady occupies. |
119,256 | At the top of a bottle of pop, there is a corkscrew pattern into which the plastic cap is twisted, tightened and sealed.
What is the name of this feature of the bottle? | 2013/07/15 | [
"https://english.stackexchange.com/questions/119256",
"https://english.stackexchange.com",
"https://english.stackexchange.com/users/32809/"
] | The image below (from *[fishbowl](http://images.yourdictionary.com/fishbowl)* at yourdictionary.com) shows a fishbowl, as often used stereotypically to portray how visible fish are when they live in a transparent glass bowl that anyone can see through. Saying that Governor McDonnell and his wife are in “the Richmond fishbowl” refers to them being highly visible to one and all. Their privacy is limited because they are prominent public figures, at the top of the heap among important people in the Virginia capitol.
 | A fishbowl is a highly visible way of housing a pet such as a goldfish, because they are on display 24/7.
Richmond is the state capital of Virginia, and the "Richmond fishbowl" is a reference to the fact that being a governor (or first lady) of Virginia in Richmond is like "living in a fishbowl."
The comment was that the "portrait" of Mrs. MacDonnell "painted" by co-workers, was of someone unable to make the leap from "private person" to the "fishbowl" that a First Lady occupies. |
5,121 | what is the exact measurement of coffee ground for espresso, I bought a new machine, I don't use coffee pods just coffee grounds. | 2020/02/27 | [
"https://coffee.stackexchange.com/questions/5121",
"https://coffee.stackexchange.com",
"https://coffee.stackexchange.com/users/8503/"
] | Your basket has a size that suits a certain amount of coffee. This can range anywhere between 8-10g to 22g. Check if there are any indicators of this. Failing that, overfill the basket and then sweep your finger across the excess over the top and see how much coffee that is, that's a ballpark figure for how much the basket can comfortably take.
You didn't mention if your machine uses a pressurised portafilter (the handle) or not. You can usually tell as it has a single hole at the bottom and is a little deeper than a standard portafilter. These tend to be more forgiving to mistakes in dosing and pressure.
Learn to tamp your coffee evenly and consistently. There are plenty of videos online on how to do this.
Try to figure out a recipe that works, using the weight of the coffee you put in, how much coffee comes out, and how long it takes for that coffee to come out. The standard recipe that is currently in trend is 18g in, 36g out (we use grams instead of ml for simplicity) in about 28 seconds. This is presuming a basket size of 18g though. | Perfect changes per machine and per user. You will have to experiment. (What a horror! Think about all the coffee)
Pack the coffee; adjust the pressure and give it a go. Be methodical. Change one thing at time. If you're methodical you'll write down your results as you go along.
Have fun. |
5,121 | what is the exact measurement of coffee ground for espresso, I bought a new machine, I don't use coffee pods just coffee grounds. | 2020/02/27 | [
"https://coffee.stackexchange.com/questions/5121",
"https://coffee.stackexchange.com",
"https://coffee.stackexchange.com/users/8503/"
] | Perfect changes per machine and per user. You will have to experiment. (What a horror! Think about all the coffee)
Pack the coffee; adjust the pressure and give it a go. Be methodical. Change one thing at time. If you're methodical you'll write down your results as you go along.
Have fun. | It's an art not a science. I personally don't hit my perfect very often. There are just too many variables: coffee freshness, coffee 'stickyness' aka how well it will compact, size of the grind, how much pressure used to compact into the portafilter, the temperature of the water, the pressure of the water, the length of time to pull the shot etc. I suggest checking out some videos online, finding a starting set up, that is a way to make a decent shot, then experiment from there while trying to adjust one of the variables at a time while keeping the rest the same. Changing more than one will make it too hard to tell what caused the result. Have fun, each shot is a shot of espresso to drink so in my book, it's all good :) |
5,121 | what is the exact measurement of coffee ground for espresso, I bought a new machine, I don't use coffee pods just coffee grounds. | 2020/02/27 | [
"https://coffee.stackexchange.com/questions/5121",
"https://coffee.stackexchange.com",
"https://coffee.stackexchange.com/users/8503/"
] | Your basket has a size that suits a certain amount of coffee. This can range anywhere between 8-10g to 22g. Check if there are any indicators of this. Failing that, overfill the basket and then sweep your finger across the excess over the top and see how much coffee that is, that's a ballpark figure for how much the basket can comfortably take.
You didn't mention if your machine uses a pressurised portafilter (the handle) or not. You can usually tell as it has a single hole at the bottom and is a little deeper than a standard portafilter. These tend to be more forgiving to mistakes in dosing and pressure.
Learn to tamp your coffee evenly and consistently. There are plenty of videos online on how to do this.
Try to figure out a recipe that works, using the weight of the coffee you put in, how much coffee comes out, and how long it takes for that coffee to come out. The standard recipe that is currently in trend is 18g in, 36g out (we use grams instead of ml for simplicity) in about 28 seconds. This is presuming a basket size of 18g though. | It's an art not a science. I personally don't hit my perfect very often. There are just too many variables: coffee freshness, coffee 'stickyness' aka how well it will compact, size of the grind, how much pressure used to compact into the portafilter, the temperature of the water, the pressure of the water, the length of time to pull the shot etc. I suggest checking out some videos online, finding a starting set up, that is a way to make a decent shot, then experiment from there while trying to adjust one of the variables at a time while keeping the rest the same. Changing more than one will make it too hard to tell what caused the result. Have fun, each shot is a shot of espresso to drink so in my book, it's all good :) |
759,706 | I want to import specific font in PowerPoint, but I don't know how...
The powerpoint file would be send to another computer, so, if possible, I want integrate the font directly in the powerpoint file.
Any help appreciate! Thank | 2014/05/28 | [
"https://superuser.com/questions/759706",
"https://superuser.com",
"https://superuser.com/users/327270/"
] | Only the Windows version of PPT can embed fonts and only the Windows version can use fonts that have been embedded. Mac is totally out of the loop here.
On Windows, only Truetype fonts can be embedded (ie, not Type1) and then only those that the manufacturer permits to be embedded.
PPT's warnings when you try to save a file with fonts embedded are weak; they tell you that a font couldn't be embedded, but not WHICH font, or why.
Peter's screenshot shows you how to embed a font; note though that if you choose the "Embed all characters" option, recipients will be able to edit the text in the file, not just view it. Assuming embedding the font is permitted, of course. Embedding all characters will make the PPT file grow by roughly the size of the font file. I'd avoid embedding Arial Unicode.
Is a font embeddable? Go to Control Panel | Fonts and locate the font file.
Right-click it, choose Properties.
Go to the Details tab, look for "Font embeddability:"
Installable (fairly rare) means that the font can be embedded and when your file is opened by the recipient, it'll be installed on their system and will be usable not only in your PPT but by any other document/program on their computer.
Editable means that the font can be embedded and used to view or edit the file in which it's embedded on the recipient's system (but won't be usable by other programs or, I believe, documents on the same PC).
Preview/Print means that the font can be used to view or print the document on the recipient's system but not to edit text. If one of these fonts is embedded, PPT should open the document read-only (but allow the user to substitute a different font if they wish).
There. More than you EVER wanted to know. | Go into File -> Options. Click the "Save" tab on the left. Tick the box for "Embed fonts in the file" (circled in the screenshot below.
So long as there's no need to edit the file on the other computer, this should allow text in any font to appear identical on both computers.
 |
759,706 | I want to import specific font in PowerPoint, but I don't know how...
The powerpoint file would be send to another computer, so, if possible, I want integrate the font directly in the powerpoint file.
Any help appreciate! Thank | 2014/05/28 | [
"https://superuser.com/questions/759706",
"https://superuser.com",
"https://superuser.com/users/327270/"
] | Go into File -> Options. Click the "Save" tab on the left. Tick the box for "Embed fonts in the file" (circled in the screenshot below.
So long as there's no need to edit the file on the other computer, this should allow text in any font to appear identical on both computers.
 | Since Powerpoint for Mac doesn’t embed fonts into presentations (unlike Powerpoint for Microsoft Windows), you are going to have to use an app for this.
Currently, there is only one app on the Mac App Store that can do this for you (Please correct me if I’m wrong).
Presentation Font Embedder is a tool which will walk through the fonts in the Presentation’s slides and will embed suitable ones into the PPTX file accordingly.
You can find the app over here:
<https://itunes.apple.com/app/presentation-font-embedder/id1032355479?ls=1&mt=12>
Disclosure- I am the developer of Presentation Font Embedder.
Please feel free to ask me any question you have using this link:
<http://www.presentationfontembedder.com/ask-us-a-question>
BR,
Sahar Radomsky |
759,706 | I want to import specific font in PowerPoint, but I don't know how...
The powerpoint file would be send to another computer, so, if possible, I want integrate the font directly in the powerpoint file.
Any help appreciate! Thank | 2014/05/28 | [
"https://superuser.com/questions/759706",
"https://superuser.com",
"https://superuser.com/users/327270/"
] | Only the Windows version of PPT can embed fonts and only the Windows version can use fonts that have been embedded. Mac is totally out of the loop here.
On Windows, only Truetype fonts can be embedded (ie, not Type1) and then only those that the manufacturer permits to be embedded.
PPT's warnings when you try to save a file with fonts embedded are weak; they tell you that a font couldn't be embedded, but not WHICH font, or why.
Peter's screenshot shows you how to embed a font; note though that if you choose the "Embed all characters" option, recipients will be able to edit the text in the file, not just view it. Assuming embedding the font is permitted, of course. Embedding all characters will make the PPT file grow by roughly the size of the font file. I'd avoid embedding Arial Unicode.
Is a font embeddable? Go to Control Panel | Fonts and locate the font file.
Right-click it, choose Properties.
Go to the Details tab, look for "Font embeddability:"
Installable (fairly rare) means that the font can be embedded and when your file is opened by the recipient, it'll be installed on their system and will be usable not only in your PPT but by any other document/program on their computer.
Editable means that the font can be embedded and used to view or edit the file in which it's embedded on the recipient's system (but won't be usable by other programs or, I believe, documents on the same PC).
Preview/Print means that the font can be used to view or print the document on the recipient's system but not to edit text. If one of these fonts is embedded, PPT should open the document read-only (but allow the user to substitute a different font if they wish).
There. More than you EVER wanted to know. | Since Powerpoint for Mac doesn’t embed fonts into presentations (unlike Powerpoint for Microsoft Windows), you are going to have to use an app for this.
Currently, there is only one app on the Mac App Store that can do this for you (Please correct me if I’m wrong).
Presentation Font Embedder is a tool which will walk through the fonts in the Presentation’s slides and will embed suitable ones into the PPTX file accordingly.
You can find the app over here:
<https://itunes.apple.com/app/presentation-font-embedder/id1032355479?ls=1&mt=12>
Disclosure- I am the developer of Presentation Font Embedder.
Please feel free to ask me any question you have using this link:
<http://www.presentationfontembedder.com/ask-us-a-question>
BR,
Sahar Radomsky |
34,792 | In an interview with an Ohio television station, [the 2016 Republican nominee for President said](https://www.buzzfeed.com/andrewkaczynski/trump-my-position-on-keeping-terrorists-out-is-what-bothered?utm_term=.mePk0y2gW#.kfLrQGl9d):
>
> when you have radical Islamic terrorists probably all over the place, we’re allowing them to come in [to the United States] by the thousands and thousands.
>
>
>
Later in the same interview:
>
> “And, you know, I’m not going to change my views on that. We have radical Islamic terrorists coming in that have to be stopped. We’re taking them in by the thousands.”
>
>
>
Relatives of mine have expressed the same idea to me. Are thousands and thousands of Islamic terrorists entering the United States? | 2016/08/02 | [
"https://skeptics.stackexchange.com/questions/34792",
"https://skeptics.stackexchange.com",
"https://skeptics.stackexchange.com/users/3837/"
] | This is a claim that he has used multiple times and there has been [no evidence](http://www.politifact.com/truth-o-meter/statements/2016/may/25/donald-trump/donald-trump-says-us-letting-tens-thousands-terror/) to support his claim. As the article notes, "Trump is in the numerical ballpark if he’s referring to the number of refugees being admitted into the United States every year" but it would be wrong to suggest that these immigrants are *all* terrorists.
>
> Trump seems to be referring to terrorists and violent extremists. But there is no evidence that tens of thousands of terrorists are being admitted into the United States today -- much less that they are being "allowed" in, as if there is a visa preference program for terrorists.
>
>
> On the other hand, Trump is in the numerical ballpark if he’s referring to the number of refugees being admitted into the United States every year -- something else he’s expressed reservations about.
>
>
> | I'm not sure to what group of people he is referring - normal Muslim immigrants from non-war zones just relocating to the US? Refugees?
If he is referring to refugees, this is unlikely, as these are screened [extensively](https://www.state.gov/j/prm/releases/factsheets/2016/255967.htm) before admitted to the US:
>
> FACT: All refugees of all nationalities considered for admission to the United States are subject to the highest level of security checks of any category of traveler to our country, involving multiple federal intelligence, security and law enforcement agencies, such as the National Counterterrorism Center, the Federal Bureau of Investigation, and the Departments of Homeland Security, State and Defense, in order to ensure that those admitted are not known to pose a threat to our country. The safeguards include biometric (fingerprint) and biographic checks, and an interview by specially trained DHS officers who scrutinize the applicant’s explanation of individual circumstances to ensure the applicant is a bona fide refugee . Mindful of the particular conditions of the Syria crisis, Syrian refugees go through an enhanced level of review.
>
>
>
[Therefore only a small number of admitted refugees have any ties to terrorism](https://www.washingtonpost.com/news/fact-checker/wp/2015/11/19/the-viral-claim-that-not-one-refugee-resettled-since-911-has-been-arrested-on-domestic-terrorism-charges/):
>
> A State Department spokesperson said of the nearly 785,000 refugees admitted through the U.S. Refugee Admissions Program since 9/11, “only about a dozen — a tiny fraction of one percent of admitted refugees — have been arrested or removed from the U.S. due to terrorism concerns that existed prior to their resettlement in the U.S. None of them were Syrian.”
>
>
>
If he's referring to normal, non-refugee immigration, this becomes harder to analyze for a layman - but in my opinion it's worth bearing in mind that only a [small](http://www.globalresearch.ca/non-muslims-carried-out-more-than-90-of-all-terrorist-attacks-in-america/5333619) (6% from 1980-2005)
fraction of terror attacks are carried out by Muslims (the FBI data is slightly outdated, but less comprehensive, more recent data from the New America Think tank [suggests](http://securitydata.newamerica.net/extremists/deadly-attacks.html) the same - 9 Jihadist attacks vs. 18 by right wingers (due to the one large recent outlier, the Jihadist attacks have killed many more though, which, in my opinion, does not change the point.)
Data from the EU [suggests](https://www.europol.europa.eu/sites/default/files/publications/europol_tesat_2016.pdf) that the low percentage of Islamic terrorism is not limited to the US, and instead applies to the Western world in general- if you look at the numbers from the linked Europol report, in 2015, only 17 out of 211 attacks in the EU were carried out by Islamic terrorists.
All suggests to me that the 'Muslim terrorist' phenomenon is disproportionately overplayed in the media and by politicians, and therefore this statement is likely to be completely false.
As a further indicator, to back up JasonR's comment about Trump's rather pragmatic relationship with the truth, apparently [only 9%](http://www.politifact.com/personalities/donald-trump/) of his statements are factually true. |
34,792 | In an interview with an Ohio television station, [the 2016 Republican nominee for President said](https://www.buzzfeed.com/andrewkaczynski/trump-my-position-on-keeping-terrorists-out-is-what-bothered?utm_term=.mePk0y2gW#.kfLrQGl9d):
>
> when you have radical Islamic terrorists probably all over the place, we’re allowing them to come in [to the United States] by the thousands and thousands.
>
>
>
Later in the same interview:
>
> “And, you know, I’m not going to change my views on that. We have radical Islamic terrorists coming in that have to be stopped. We’re taking them in by the thousands.”
>
>
>
Relatives of mine have expressed the same idea to me. Are thousands and thousands of Islamic terrorists entering the United States? | 2016/08/02 | [
"https://skeptics.stackexchange.com/questions/34792",
"https://skeptics.stackexchange.com",
"https://skeptics.stackexchange.com/users/3837/"
] | This is a claim that he has used multiple times and there has been [no evidence](http://www.politifact.com/truth-o-meter/statements/2016/may/25/donald-trump/donald-trump-says-us-letting-tens-thousands-terror/) to support his claim. As the article notes, "Trump is in the numerical ballpark if he’s referring to the number of refugees being admitted into the United States every year" but it would be wrong to suggest that these immigrants are *all* terrorists.
>
> Trump seems to be referring to terrorists and violent extremists. But there is no evidence that tens of thousands of terrorists are being admitted into the United States today -- much less that they are being "allowed" in, as if there is a visa preference program for terrorists.
>
>
> On the other hand, Trump is in the numerical ballpark if he’s referring to the number of refugees being admitted into the United States every year -- something else he’s expressed reservations about.
>
>
> | Politifact: Pants on Fire
<http://www.politifact.com/truth-o-meter/statements/2016/may/25/donald-trump/donald-trump-says-us-letting-tens-thousands-terror/>
>
> "Trump is certainly wrong on the facts here," said Daveed
> Gartenstein-Ross, a senior fellow at the Foundation for Defense of
> Democracies. That said, Gartenstein-Ross added that more reasonable
> concerns could have been expressed with less "hyperbolic" rhetoric.
>
>
> The recent migrant flows from Syria and Iraq into Europe, he said,
> have provided greater cover for terrorists than experts had predicted
> early on, and while the United States is not facing as much risk from
> its ongoing inflow of refugees, that risk is not zero. Just going by
> the math, some small fraction of refugees can be expected to either be
> well-concealed operatives who made it through the screening process
> or, much more likely, people who self-radicalize after arriving in the
> United States.
>
>
> Still, Gartenstein-Ross agreed that there is no evidence that "tens of
> thousands of them" are already here, as Trump said.
>
>
> |
34,792 | In an interview with an Ohio television station, [the 2016 Republican nominee for President said](https://www.buzzfeed.com/andrewkaczynski/trump-my-position-on-keeping-terrorists-out-is-what-bothered?utm_term=.mePk0y2gW#.kfLrQGl9d):
>
> when you have radical Islamic terrorists probably all over the place, we’re allowing them to come in [to the United States] by the thousands and thousands.
>
>
>
Later in the same interview:
>
> “And, you know, I’m not going to change my views on that. We have radical Islamic terrorists coming in that have to be stopped. We’re taking them in by the thousands.”
>
>
>
Relatives of mine have expressed the same idea to me. Are thousands and thousands of Islamic terrorists entering the United States? | 2016/08/02 | [
"https://skeptics.stackexchange.com/questions/34792",
"https://skeptics.stackexchange.com",
"https://skeptics.stackexchange.com/users/3837/"
] | This is a claim that he has used multiple times and there has been [no evidence](http://www.politifact.com/truth-o-meter/statements/2016/may/25/donald-trump/donald-trump-says-us-letting-tens-thousands-terror/) to support his claim. As the article notes, "Trump is in the numerical ballpark if he’s referring to the number of refugees being admitted into the United States every year" but it would be wrong to suggest that these immigrants are *all* terrorists.
>
> Trump seems to be referring to terrorists and violent extremists. But there is no evidence that tens of thousands of terrorists are being admitted into the United States today -- much less that they are being "allowed" in, as if there is a visa preference program for terrorists.
>
>
> On the other hand, Trump is in the numerical ballpark if he’s referring to the number of refugees being admitted into the United States every year -- something else he’s expressed reservations about.
>
>
> | In order to be a terrorist, a person must have committed an act of terrorism.
Since 2000, there have been 14,000 terrorist events committed. Assuming 10 terrorists per event, that leaves 140,000 potential terrorists in the world.
Lets assume that it is actually half of this in terms of unique people, as several terrorists will commit multiple terrorism crimes. Lets also assume that half of these people are dead or imprisoned.
That means there are 35,000 in the world.
Broadly speaking, we could roughly assume that being as 'the west' has seen <1% of those attacks, it contains 1% of the terrorists, that is to say 350. The USA is roughly a quarter of the population of the west, although certain regions such as France are currently a more significant target. Lets say that means 50 terrorists who have entered the US.
The technical minimum number required for thousands and thousands is 4,000, although I think rounding it to 5,000 is needed before the phrase really becomes legitimate to use.
The unnamed Republican Nominee is out by two orders of magnitude.
Apologies for the terrible source:
<http://www.dailymail.co.uk/news/article-3322308/Number-people-killed-terrorists-worldwide-soars-80-just-year.html> |
34,792 | In an interview with an Ohio television station, [the 2016 Republican nominee for President said](https://www.buzzfeed.com/andrewkaczynski/trump-my-position-on-keeping-terrorists-out-is-what-bothered?utm_term=.mePk0y2gW#.kfLrQGl9d):
>
> when you have radical Islamic terrorists probably all over the place, we’re allowing them to come in [to the United States] by the thousands and thousands.
>
>
>
Later in the same interview:
>
> “And, you know, I’m not going to change my views on that. We have radical Islamic terrorists coming in that have to be stopped. We’re taking them in by the thousands.”
>
>
>
Relatives of mine have expressed the same idea to me. Are thousands and thousands of Islamic terrorists entering the United States? | 2016/08/02 | [
"https://skeptics.stackexchange.com/questions/34792",
"https://skeptics.stackexchange.com",
"https://skeptics.stackexchange.com/users/3837/"
] | I'm not sure to what group of people he is referring - normal Muslim immigrants from non-war zones just relocating to the US? Refugees?
If he is referring to refugees, this is unlikely, as these are screened [extensively](https://www.state.gov/j/prm/releases/factsheets/2016/255967.htm) before admitted to the US:
>
> FACT: All refugees of all nationalities considered for admission to the United States are subject to the highest level of security checks of any category of traveler to our country, involving multiple federal intelligence, security and law enforcement agencies, such as the National Counterterrorism Center, the Federal Bureau of Investigation, and the Departments of Homeland Security, State and Defense, in order to ensure that those admitted are not known to pose a threat to our country. The safeguards include biometric (fingerprint) and biographic checks, and an interview by specially trained DHS officers who scrutinize the applicant’s explanation of individual circumstances to ensure the applicant is a bona fide refugee . Mindful of the particular conditions of the Syria crisis, Syrian refugees go through an enhanced level of review.
>
>
>
[Therefore only a small number of admitted refugees have any ties to terrorism](https://www.washingtonpost.com/news/fact-checker/wp/2015/11/19/the-viral-claim-that-not-one-refugee-resettled-since-911-has-been-arrested-on-domestic-terrorism-charges/):
>
> A State Department spokesperson said of the nearly 785,000 refugees admitted through the U.S. Refugee Admissions Program since 9/11, “only about a dozen — a tiny fraction of one percent of admitted refugees — have been arrested or removed from the U.S. due to terrorism concerns that existed prior to their resettlement in the U.S. None of them were Syrian.”
>
>
>
If he's referring to normal, non-refugee immigration, this becomes harder to analyze for a layman - but in my opinion it's worth bearing in mind that only a [small](http://www.globalresearch.ca/non-muslims-carried-out-more-than-90-of-all-terrorist-attacks-in-america/5333619) (6% from 1980-2005)
fraction of terror attacks are carried out by Muslims (the FBI data is slightly outdated, but less comprehensive, more recent data from the New America Think tank [suggests](http://securitydata.newamerica.net/extremists/deadly-attacks.html) the same - 9 Jihadist attacks vs. 18 by right wingers (due to the one large recent outlier, the Jihadist attacks have killed many more though, which, in my opinion, does not change the point.)
Data from the EU [suggests](https://www.europol.europa.eu/sites/default/files/publications/europol_tesat_2016.pdf) that the low percentage of Islamic terrorism is not limited to the US, and instead applies to the Western world in general- if you look at the numbers from the linked Europol report, in 2015, only 17 out of 211 attacks in the EU were carried out by Islamic terrorists.
All suggests to me that the 'Muslim terrorist' phenomenon is disproportionately overplayed in the media and by politicians, and therefore this statement is likely to be completely false.
As a further indicator, to back up JasonR's comment about Trump's rather pragmatic relationship with the truth, apparently [only 9%](http://www.politifact.com/personalities/donald-trump/) of his statements are factually true. | Politifact: Pants on Fire
<http://www.politifact.com/truth-o-meter/statements/2016/may/25/donald-trump/donald-trump-says-us-letting-tens-thousands-terror/>
>
> "Trump is certainly wrong on the facts here," said Daveed
> Gartenstein-Ross, a senior fellow at the Foundation for Defense of
> Democracies. That said, Gartenstein-Ross added that more reasonable
> concerns could have been expressed with less "hyperbolic" rhetoric.
>
>
> The recent migrant flows from Syria and Iraq into Europe, he said,
> have provided greater cover for terrorists than experts had predicted
> early on, and while the United States is not facing as much risk from
> its ongoing inflow of refugees, that risk is not zero. Just going by
> the math, some small fraction of refugees can be expected to either be
> well-concealed operatives who made it through the screening process
> or, much more likely, people who self-radicalize after arriving in the
> United States.
>
>
> Still, Gartenstein-Ross agreed that there is no evidence that "tens of
> thousands of them" are already here, as Trump said.
>
>
> |
34,792 | In an interview with an Ohio television station, [the 2016 Republican nominee for President said](https://www.buzzfeed.com/andrewkaczynski/trump-my-position-on-keeping-terrorists-out-is-what-bothered?utm_term=.mePk0y2gW#.kfLrQGl9d):
>
> when you have radical Islamic terrorists probably all over the place, we’re allowing them to come in [to the United States] by the thousands and thousands.
>
>
>
Later in the same interview:
>
> “And, you know, I’m not going to change my views on that. We have radical Islamic terrorists coming in that have to be stopped. We’re taking them in by the thousands.”
>
>
>
Relatives of mine have expressed the same idea to me. Are thousands and thousands of Islamic terrorists entering the United States? | 2016/08/02 | [
"https://skeptics.stackexchange.com/questions/34792",
"https://skeptics.stackexchange.com",
"https://skeptics.stackexchange.com/users/3837/"
] | I'm not sure to what group of people he is referring - normal Muslim immigrants from non-war zones just relocating to the US? Refugees?
If he is referring to refugees, this is unlikely, as these are screened [extensively](https://www.state.gov/j/prm/releases/factsheets/2016/255967.htm) before admitted to the US:
>
> FACT: All refugees of all nationalities considered for admission to the United States are subject to the highest level of security checks of any category of traveler to our country, involving multiple federal intelligence, security and law enforcement agencies, such as the National Counterterrorism Center, the Federal Bureau of Investigation, and the Departments of Homeland Security, State and Defense, in order to ensure that those admitted are not known to pose a threat to our country. The safeguards include biometric (fingerprint) and biographic checks, and an interview by specially trained DHS officers who scrutinize the applicant’s explanation of individual circumstances to ensure the applicant is a bona fide refugee . Mindful of the particular conditions of the Syria crisis, Syrian refugees go through an enhanced level of review.
>
>
>
[Therefore only a small number of admitted refugees have any ties to terrorism](https://www.washingtonpost.com/news/fact-checker/wp/2015/11/19/the-viral-claim-that-not-one-refugee-resettled-since-911-has-been-arrested-on-domestic-terrorism-charges/):
>
> A State Department spokesperson said of the nearly 785,000 refugees admitted through the U.S. Refugee Admissions Program since 9/11, “only about a dozen — a tiny fraction of one percent of admitted refugees — have been arrested or removed from the U.S. due to terrorism concerns that existed prior to their resettlement in the U.S. None of them were Syrian.”
>
>
>
If he's referring to normal, non-refugee immigration, this becomes harder to analyze for a layman - but in my opinion it's worth bearing in mind that only a [small](http://www.globalresearch.ca/non-muslims-carried-out-more-than-90-of-all-terrorist-attacks-in-america/5333619) (6% from 1980-2005)
fraction of terror attacks are carried out by Muslims (the FBI data is slightly outdated, but less comprehensive, more recent data from the New America Think tank [suggests](http://securitydata.newamerica.net/extremists/deadly-attacks.html) the same - 9 Jihadist attacks vs. 18 by right wingers (due to the one large recent outlier, the Jihadist attacks have killed many more though, which, in my opinion, does not change the point.)
Data from the EU [suggests](https://www.europol.europa.eu/sites/default/files/publications/europol_tesat_2016.pdf) that the low percentage of Islamic terrorism is not limited to the US, and instead applies to the Western world in general- if you look at the numbers from the linked Europol report, in 2015, only 17 out of 211 attacks in the EU were carried out by Islamic terrorists.
All suggests to me that the 'Muslim terrorist' phenomenon is disproportionately overplayed in the media and by politicians, and therefore this statement is likely to be completely false.
As a further indicator, to back up JasonR's comment about Trump's rather pragmatic relationship with the truth, apparently [only 9%](http://www.politifact.com/personalities/donald-trump/) of his statements are factually true. | In order to be a terrorist, a person must have committed an act of terrorism.
Since 2000, there have been 14,000 terrorist events committed. Assuming 10 terrorists per event, that leaves 140,000 potential terrorists in the world.
Lets assume that it is actually half of this in terms of unique people, as several terrorists will commit multiple terrorism crimes. Lets also assume that half of these people are dead or imprisoned.
That means there are 35,000 in the world.
Broadly speaking, we could roughly assume that being as 'the west' has seen <1% of those attacks, it contains 1% of the terrorists, that is to say 350. The USA is roughly a quarter of the population of the west, although certain regions such as France are currently a more significant target. Lets say that means 50 terrorists who have entered the US.
The technical minimum number required for thousands and thousands is 4,000, although I think rounding it to 5,000 is needed before the phrase really becomes legitimate to use.
The unnamed Republican Nominee is out by two orders of magnitude.
Apologies for the terrible source:
<http://www.dailymail.co.uk/news/article-3322308/Number-people-killed-terrorists-worldwide-soars-80-just-year.html> |
193 | Should we assume a culture neutral perspective when asking a question or it's fine to assume Anime & Manga SE is written mainly from foreigners **and** consequently all question are asked in a non-Japanese cultural perspective?
This issue started to bugs me from [What differentiates anime from regular cartoons](https://anime.stackexchange.com/q/69/98), where "regular" stands for non-anime. Answers to that question clarify how limited that point of view is because, by a Japanese point of view, "regular cartoons" are anime, but the question "foreigner" perspective is still intact.
Three options are available, here a very rough list:
* Japanese perspective: because anime are from Japan (producer perspective)
* Foreigner perspective: because Anime & Manga SE is written in English mainly for a foreign audience (foreigner watcher perspective)
* Neutral perspective: because objectivity and neutrality are major constraints.
Supposing neutral perspective is adopted, should questions have to be rewritten to adapt to that perspective? | 2012/12/15 | [
"https://anime.meta.stackexchange.com/questions/193",
"https://anime.meta.stackexchange.com",
"https://anime.meta.stackexchange.com/users/98/"
] | In the particular case you have listed, I'd rather the title be changed to "What differentiates anime from other cartoons?" (changing "regular" to "other"), which I guess is the neutral perspective. It seems to me that it is best to use objective terms whenever possible.
However, I don't think we should change every question and answer to fit with one particular perspective. It's not a very important consideration, as Alenanno has said. If there's an easy way to change it to the objective perspective, then I think it's alright to do so, but if you find that you have to rewrite entire sentences to accomplish it, then you're probably infringing on the original author's stylistic rights.
tl;dr: We should not mandate a particular perspective, but we should support the objective perspective whenever it is convenient to do so. | I think even Japanese actually use "Anime" to refer to Japanese-style cartoons only. And I doubt you'll ever see a Japanese calling a Disney cartoon "Anime".
I don't think there's an issue here. :) |
126,970 | I'm building a web app, but I'm not a designer, so I rely on a lightweight CSS framework to provide the basic styling and structure of different UI elements. However, I usually struggle with how to structure the web app to provide a good UX.
I googled "web app ux design" (and "ui design"), but most of the results talk about designing a web "site" not a web "app". For example, the main focus seems to be the principles of design, e.g. color/contrast, visual hierarchy, spacing, etc. What I need are things like general app layout, hub & spoke pattern, navigation, side-bars / menus, relationship between conceptual/data model and pages/screens, role-based functionality, record details vs lists/tables, bulk actions, page sections/layout, cards, modal dialogs, in-page actions, form design for simple in-page manipulation vs. complex data entry (multi-step wizards), etc.
Where can I find such a tutorial or guide? I'm willing to even pay for an online course if one is available. | 2019/07/21 | [
"https://ux.stackexchange.com/questions/126970",
"https://ux.stackexchange.com",
"https://ux.stackexchange.com/users/9838/"
] | Depending on technology is a lot of available libraries or visual systems,
for example:
1. Human Interface Guidelines -
<https://developer.apple.com/design/human-interface-guidelines/>
2. Material Design - <https://material.io/design/>
You also have ready UI libraries - for start it's good idea to use it:
1. <https://semantic-ui.com/>
2. <https://material-ui.com/>
3. <https://designrevision.com/react-component-libraries/>
If you don't experience in design You can use free ready components and create the whole system from them.
There are different strategies and methodologies, however my experience and intuition evolved a hollistic view of the project and firstly create an architecture & structure of every pages/interactions.
So at the beginning it is worth defining scopes, modules, and then later defining the details
When it comes to pure design aesthetics, you just have to watch a lot good projects.
For tutorials You can visit this article:
<https://uxdesign.cc/ultimate-start-guide-for-beginner-ux-ui-designer-b848be089589>
I read this few minutes ago and it's a good repository of knowledge for beggining. | I would also recommend checking out Steve Schoger's Refactoring UI work which could be really handy for you. <https://refactoringui.com/>
He has lots of interesting videos on youtube. |
113,592 | Is there any API to get the currently logged in user's name and password in Windows?
Thank you in advance. | 2008/09/22 | [
"https://Stackoverflow.com/questions/113592",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/20208/"
] | Password: No, this is not retained for security reasons - it's used, then discarded. You could retrieve the encrypted password for this user from the registry, given sufficient privileges, then decrypt it using something like [rainbow tables](http://en.wikipedia.org/wiki/Rainbow_table), but that's extremely resource intensive and time consuming using current methods. Much better to prompt the user.
Alternatively, if you want to implement some sort of 'single signon' system as Novell does, you should do it via either a GINA (pre-Vista) or a Credential Provider (Vista), which will result in your code being given the username and password at login, the only time at which the password is available.
For username, getting the *current* username (the one who is running your code) is easy: the GetUserName function in AdvApi32.dll does exactly this for you.
If you're running as a service, you need to remember there is no one "logged in user": there are several at any time, such as LocalSystem, NetworkService, SYSTEM and other accounts, in addition to any actual people. [This article provides some sample code and documentation](http://www.codeproject.com/KB/system/logonsessions.aspx) for doing that. | Note sure how it is done, but "Network Password Recovery" tool from <http://www.nirsoft.net/utils/network_password_recovery.html> seems to get the password from some cache. |
113,592 | Is there any API to get the currently logged in user's name and password in Windows?
Thank you in advance. | 2008/09/22 | [
"https://Stackoverflow.com/questions/113592",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/20208/"
] | You can't get the password of a user since its encrypted (not to mention that its a standard practice not to store passwords in plaintext).
For getting the username, you can use [GetUserName](http://msdn.microsoft.com/en-us/library/ms724432.aspx) or [NPGetUser](http://msdn.microsoft.com/en-us/library/aa378803(VS.85).aspx) | You can get the user name with GetUserName(), but you cannot get the password; this would violate security for dummies 101. |
113,592 | Is there any API to get the currently logged in user's name and password in Windows?
Thank you in advance. | 2008/09/22 | [
"https://Stackoverflow.com/questions/113592",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/20208/"
] | Full details of Authentication in the Windows API can be found on MSDN:
<http://msdn.microsoft.com/en-us/library/aa374735(VS.85).aspx> | You can get the user name with GetUserName(), but you cannot get the password; this would violate security for dummies 101. |
113,592 | Is there any API to get the currently logged in user's name and password in Windows?
Thank you in advance. | 2008/09/22 | [
"https://Stackoverflow.com/questions/113592",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/20208/"
] | GetUserName will get you the name, but the password you can't get. It's not even something Windows stores, AFAIK - only a hash of your password.
Depending on what you're trying to achieve (you can tell us a bit more..) it's possible to impersonate a logged on user and do stuff on his/her behalf. | re "Network Password Recovery" tool
Windows (upto XP) stores a copy of the passwd with a simpler easy to break encryption - for connecting to older style lanmanager network shares.
The tools generaly try all possible passwords against this, using rainbow tables (precaluted encrypted versions of dictionary words) speeds this up.
In XPsp2/3 Vista this feature is removed. The new encryption is much harder to crack and needs many hours to try all possible values, there are online services that will run it on large number of machines to give you a quick answer for a price.
To answer the original poster - you do not generally store the password and compare it with what the user typd in. You encrypt (actually hash) the entered password and store that. To check a password you perform the same encryption on whatever the user enetered and compare that. It is generally impossible to go from the encrypted form back to the real password.
**EDIT** I suspect you are asking the wrong question here - why do you want the password, what are you trying to verify and when? |
113,592 | Is there any API to get the currently logged in user's name and password in Windows?
Thank you in advance. | 2008/09/22 | [
"https://Stackoverflow.com/questions/113592",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/20208/"
] | Password: No, this is not retained for security reasons - it's used, then discarded. You could retrieve the encrypted password for this user from the registry, given sufficient privileges, then decrypt it using something like [rainbow tables](http://en.wikipedia.org/wiki/Rainbow_table), but that's extremely resource intensive and time consuming using current methods. Much better to prompt the user.
Alternatively, if you want to implement some sort of 'single signon' system as Novell does, you should do it via either a GINA (pre-Vista) or a Credential Provider (Vista), which will result in your code being given the username and password at login, the only time at which the password is available.
For username, getting the *current* username (the one who is running your code) is easy: the GetUserName function in AdvApi32.dll does exactly this for you.
If you're running as a service, you need to remember there is no one "logged in user": there are several at any time, such as LocalSystem, NetworkService, SYSTEM and other accounts, in addition to any actual people. [This article provides some sample code and documentation](http://www.codeproject.com/KB/system/logonsessions.aspx) for doing that. | You can't get the password of a user since its encrypted (not to mention that its a standard practice not to store passwords in plaintext).
For getting the username, you can use [GetUserName](http://msdn.microsoft.com/en-us/library/ms724432.aspx) or [NPGetUser](http://msdn.microsoft.com/en-us/library/aa378803(VS.85).aspx) |
108,630 | Ungoliant and Morgoth formed an alliance temporarily and came to Valinor, while Morgoth cast a dark shadow covering them, Ungoliant sucked the light from the Two Trees and darkened Aman, hence why it fell back into darkness. Meanwhile Morgoth and Ungoliant made their escape across the Helcaraxe, once they returned to Middle Earth Ungoliant demanded the silmarils from Morgoth. When he refused, Ungoliant is said to have wrapped him in her webs and he wasn't able to break free until his Balrogs arrived and attacked her and she fled South.
So based on this information about Ungoliant, even though she is a Maia, was she more powerful than Morgoth? | 2015/11/24 | [
"https://scifi.stackexchange.com/questions/108630",
"https://scifi.stackexchange.com",
"https://scifi.stackexchange.com/users/53038/"
] | At the moment of their confrontation, obviously yes. In general, perhaps not; there were some extenuating circumstances at the time:
>
> But Ungoliant had grown great, and he less by the power that had gone out of him
>
>
> *The Silmarillion* III *Quenta Silmarillion* Chapter 9: "Of the Flight of the Noldor"
>
>
>
Ungoliant has been gorging herself on the magic sap of the Trees of Valinor, which has temporarily buffed her strength. Note how she's described while in the process of drinking the Light of the Trees (emphasis mine):
>
> Ungoliant sucked it up, and going then from Tree to Tree she set her black beak to their wounds, till they were drained; and the poison of Death that was in her went into their tissues and withered them, root, branch, and leaf; and they died. And still she thirsted, and going to the Wells of Varda she drank them dry; but Ungoliant belched forth black vapours as she drank, **and swelled to a shape so vast and hideous that Melkor was afraid**.
>
>
> *The Silmarillion* III *Quenta Silmarillion* Chapter 8: "Of the Darkening of Valinor"
>
>
>
Melkor, in contrast, has put a lot of his power outside himself in the course of his mischief-making, so he's not really at full capacity. This process, incidentally, [is what eventually makes him vulnerable](https://scifi.stackexchange.com/questions/27756/other-than-morgoth-were-any-of-the-valar-ever-susceptible-to-physical-injury) and leads to his defeat at the end of the First Age.
Unfortunately, we have [very little definitive idea about what, exactly, Ungoliant *is*](https://scifi.stackexchange.com/questions/54890/is-shelob-a-maia), or how some of the things she *might* be fit into the Middle-earth power structure. With that limitation in mind, it becomes impossible to definitively state which of Ungoliant or Morgoth would have been more powerful in a standard situation. | We don't know whether Ungoliant was a Maia or some other kind of being. Just like Tom Bombadil, she was left an enigma by Tolkien. Tolkien's early version of the legends (The Book of Lost Tales) calls her a primeval spirit, believed to be a creature bred of the darkness of the Void. It is possible that she was a physical manifestation of darkness rather than one of the Ainur. <http://tolkiengateway.net/wiki/Ungoliant>
Thus, I count her as at least equal, if not superior, in strength to Morgoth. |
108,630 | Ungoliant and Morgoth formed an alliance temporarily and came to Valinor, while Morgoth cast a dark shadow covering them, Ungoliant sucked the light from the Two Trees and darkened Aman, hence why it fell back into darkness. Meanwhile Morgoth and Ungoliant made their escape across the Helcaraxe, once they returned to Middle Earth Ungoliant demanded the silmarils from Morgoth. When he refused, Ungoliant is said to have wrapped him in her webs and he wasn't able to break free until his Balrogs arrived and attacked her and she fled South.
So based on this information about Ungoliant, even though she is a Maia, was she more powerful than Morgoth? | 2015/11/24 | [
"https://scifi.stackexchange.com/questions/108630",
"https://scifi.stackexchange.com",
"https://scifi.stackexchange.com/users/53038/"
] | At the moment of their confrontation, obviously yes. In general, perhaps not; there were some extenuating circumstances at the time:
>
> But Ungoliant had grown great, and he less by the power that had gone out of him
>
>
> *The Silmarillion* III *Quenta Silmarillion* Chapter 9: "Of the Flight of the Noldor"
>
>
>
Ungoliant has been gorging herself on the magic sap of the Trees of Valinor, which has temporarily buffed her strength. Note how she's described while in the process of drinking the Light of the Trees (emphasis mine):
>
> Ungoliant sucked it up, and going then from Tree to Tree she set her black beak to their wounds, till they were drained; and the poison of Death that was in her went into their tissues and withered them, root, branch, and leaf; and they died. And still she thirsted, and going to the Wells of Varda she drank them dry; but Ungoliant belched forth black vapours as she drank, **and swelled to a shape so vast and hideous that Melkor was afraid**.
>
>
> *The Silmarillion* III *Quenta Silmarillion* Chapter 8: "Of the Darkening of Valinor"
>
>
>
Melkor, in contrast, has put a lot of his power outside himself in the course of his mischief-making, so he's not really at full capacity. This process, incidentally, [is what eventually makes him vulnerable](https://scifi.stackexchange.com/questions/27756/other-than-morgoth-were-any-of-the-valar-ever-susceptible-to-physical-injury) and leads to his defeat at the end of the First Age.
Unfortunately, we have [very little definitive idea about what, exactly, Ungoliant *is*](https://scifi.stackexchange.com/questions/54890/is-shelob-a-maia), or how some of the things she *might* be fit into the Middle-earth power structure. With that limitation in mind, it becomes impossible to definitively state which of Ungoliant or Morgoth would have been more powerful in a standard situation. | Ungoliant was basically a result of the evil made in the songs of the Ainur by Melkor. So originally Morgoth was stronger than her. But after drinking the light and power of the Two Trees, she became a match for Morgoth. |
108,630 | Ungoliant and Morgoth formed an alliance temporarily and came to Valinor, while Morgoth cast a dark shadow covering them, Ungoliant sucked the light from the Two Trees and darkened Aman, hence why it fell back into darkness. Meanwhile Morgoth and Ungoliant made their escape across the Helcaraxe, once they returned to Middle Earth Ungoliant demanded the silmarils from Morgoth. When he refused, Ungoliant is said to have wrapped him in her webs and he wasn't able to break free until his Balrogs arrived and attacked her and she fled South.
So based on this information about Ungoliant, even though she is a Maia, was she more powerful than Morgoth? | 2015/11/24 | [
"https://scifi.stackexchange.com/questions/108630",
"https://scifi.stackexchange.com",
"https://scifi.stackexchange.com/users/53038/"
] | We don't know whether Ungoliant was a Maia or some other kind of being. Just like Tom Bombadil, she was left an enigma by Tolkien. Tolkien's early version of the legends (The Book of Lost Tales) calls her a primeval spirit, believed to be a creature bred of the darkness of the Void. It is possible that she was a physical manifestation of darkness rather than one of the Ainur. <http://tolkiengateway.net/wiki/Ungoliant>
Thus, I count her as at least equal, if not superior, in strength to Morgoth. | Ungoliant was basically a result of the evil made in the songs of the Ainur by Melkor. So originally Morgoth was stronger than her. But after drinking the light and power of the Two Trees, she became a match for Morgoth. |
568,081 | this is an example circuit in this [PDF from TI](https://www.ti.com/lit/slyy168). (page 19, inrush current stuff)
[](https://i.stack.imgur.com/7H1Mm.jpg)
Description :
>
> In steady-state operation, Q1 is fully turned on and load current
> flows through the series sense resistor Rs and discrete power switch
> Q1. The voltage drop across Rs generates bias voltage VBE for Q2,
> which is used to control Q1 in a closed-loop form. When the load
> current reaches high enough to bias Q2 on, Q2 reduces the
> gate-to-source voltage of Q1 to limit the load current to VBE/Rs.
>
>
> The response time of this discrete approach is much better than a fuse
> or PTC, but still suffers from poor accuracy. Current-limiting
> accuracy can be in the range of 30% considering the variation of VBE
> voltage over temperature. Another disadvantage is the power loss in
> the sense resistor; for a 5-A application, dissipation would be as
> high as 3.25 W (0.65 V × 5 A = 3.25 W). **It is possible to reduce the
> power loss by using either a current-sense amplifier or a fast
> comparator to disable pass switch Q1 in the event of overload**, but
> this adds complexity and cost.
>
>
>
**How the suggested comparator would fit into this circuit?**
I don't know which op-amp pins would connect to which components here?
a summarized connections description (or schematic) helps a lot.
Thanks | 2021/06/02 | [
"https://electronics.stackexchange.com/questions/568081",
"https://electronics.stackexchange.com",
"https://electronics.stackexchange.com/users/276459/"
] | Yes, there is a standard way to mount rocker and toggle switches. Unfortunately, that standard is different between the USA and the UK. USA is on up, UK is on down.
I don't know about the rest of the world, it would interesting if locals of other countries/continents would add in comments what their local standard is. | Generally you want the ON to be at the top or up and the OFF to be at the bottom or down. This makes sense from a human factors perspective but there is no hard and fast rule that says you must do it one way or another.
Personally I find it frustrating when power switches are installed with ON in the bottom or down position as it's not intuitive.
Technically, it doesn't matter at all since the switch doesn't care. |
568,081 | this is an example circuit in this [PDF from TI](https://www.ti.com/lit/slyy168). (page 19, inrush current stuff)
[](https://i.stack.imgur.com/7H1Mm.jpg)
Description :
>
> In steady-state operation, Q1 is fully turned on and load current
> flows through the series sense resistor Rs and discrete power switch
> Q1. The voltage drop across Rs generates bias voltage VBE for Q2,
> which is used to control Q1 in a closed-loop form. When the load
> current reaches high enough to bias Q2 on, Q2 reduces the
> gate-to-source voltage of Q1 to limit the load current to VBE/Rs.
>
>
> The response time of this discrete approach is much better than a fuse
> or PTC, but still suffers from poor accuracy. Current-limiting
> accuracy can be in the range of 30% considering the variation of VBE
> voltage over temperature. Another disadvantage is the power loss in
> the sense resistor; for a 5-A application, dissipation would be as
> high as 3.25 W (0.65 V × 5 A = 3.25 W). **It is possible to reduce the
> power loss by using either a current-sense amplifier or a fast
> comparator to disable pass switch Q1 in the event of overload**, but
> this adds complexity and cost.
>
>
>
**How the suggested comparator would fit into this circuit?**
I don't know which op-amp pins would connect to which components here?
a summarized connections description (or schematic) helps a lot.
Thanks | 2021/06/02 | [
"https://electronics.stackexchange.com/questions/568081",
"https://electronics.stackexchange.com",
"https://electronics.stackexchange.com/users/276459/"
] | From a safety perspective, should the device normally be off or on? Because it seems like with on up, the user has to intentionally turn the device on, and accidentally turning it on would be unlikely. While anything brushing against the switch or falling on it would tend to turn it off. | Generally you want the ON to be at the top or up and the OFF to be at the bottom or down. This makes sense from a human factors perspective but there is no hard and fast rule that says you must do it one way or another.
Personally I find it frustrating when power switches are installed with ON in the bottom or down position as it's not intuitive.
Technically, it doesn't matter at all since the switch doesn't care. |
568,081 | this is an example circuit in this [PDF from TI](https://www.ti.com/lit/slyy168). (page 19, inrush current stuff)
[](https://i.stack.imgur.com/7H1Mm.jpg)
Description :
>
> In steady-state operation, Q1 is fully turned on and load current
> flows through the series sense resistor Rs and discrete power switch
> Q1. The voltage drop across Rs generates bias voltage VBE for Q2,
> which is used to control Q1 in a closed-loop form. When the load
> current reaches high enough to bias Q2 on, Q2 reduces the
> gate-to-source voltage of Q1 to limit the load current to VBE/Rs.
>
>
> The response time of this discrete approach is much better than a fuse
> or PTC, but still suffers from poor accuracy. Current-limiting
> accuracy can be in the range of 30% considering the variation of VBE
> voltage over temperature. Another disadvantage is the power loss in
> the sense resistor; for a 5-A application, dissipation would be as
> high as 3.25 W (0.65 V × 5 A = 3.25 W). **It is possible to reduce the
> power loss by using either a current-sense amplifier or a fast
> comparator to disable pass switch Q1 in the event of overload**, but
> this adds complexity and cost.
>
>
>
**How the suggested comparator would fit into this circuit?**
I don't know which op-amp pins would connect to which components here?
a summarized connections description (or schematic) helps a lot.
Thanks | 2021/06/02 | [
"https://electronics.stackexchange.com/questions/568081",
"https://electronics.stackexchange.com",
"https://electronics.stackexchange.com/users/276459/"
] | Yes, there is a standard way to mount rocker and toggle switches. Unfortunately, that standard is different between the USA and the UK. USA is on up, UK is on down.
I don't know about the rest of the world, it would interesting if locals of other countries/continents would add in comments what their local standard is. | From a safety perspective, should the device normally be off or on? Because it seems like with on up, the user has to intentionally turn the device on, and accidentally turning it on would be unlikely. While anything brushing against the switch or falling on it would tend to turn it off. |
207,834 | we are running a program which creates 4-5 processes on our MS SQL Server per instance. When the number of processes surpasses 230 the program stops working and crashes every few minutes(The sql server logs say "All schedulers on node0 appear to be deadlocked due to a large number of worker threads waiting on ASYNC\_NETWORK\_IO. Process utilisation: 0%"). Our solution when this happens is to just kill the processes on the sql server, which seams not to cause any other problems but we would like to solve this problem permanently. How can we fix the root problem? Or if this is something only the developer of the problematic application can do, what possibilities do we have to create a workarround(e.g. a timeout for those processes?) | 2010/12/01 | [
"https://serverfault.com/questions/207834",
"https://serverfault.com",
"https://serverfault.com/users/62150/"
] | edit here /etc/ssh/sshd\_config and change or add UseDNS no
After that restart service ssh demon
then tray again if problem is some
Tray to change or add /etc/ssh/ssh\_config
in the host \* section
CheckHostIP no | mysql service should be started with --skip-name-resolve or you can set the option in /etc/mysql/my.cnf. For ssh you should make sure UseDNS is set to "no" in /etc/ssh/sshd\_config |
134,216 | Many processors / µCs / dev-platforms (BeagleBoard, Arduino,...) use interrupts.
These can be triggered by the detection of:
* HIGH level
* RISING edge
* CHANGING level (either FALLING or RISING edge)
* FALLING edge
* LOW level
Now either of two things must be true:
1. FALLING and LOW (/ RISING and HIGH) are virtually the same
2. When a LOW (/HIGH) level is applied over a non-trivial time, the controller is stuck repeating the interrupt service routine over and over
Both of these don't make sense to me:
The first cannot be true, since it would be totally useless to make the difference in the first place then.
So if the second one is true: how could this be useful? What application is there that is not better off with a combination of RISING and FALLING instead of HIGH?
Research so far:
* This question is just a stub, so it didn't help: <https://electronics.stackexchange.com/questions/92833/what-is-the-difference-between-level-triggering-and-edge-triggering>
* This one is also not too useful as it is about *when* those interrupts are triggered, not the implications of the differences: [What does edge triggered and level triggered mean?](https://electronics.stackexchange.com/questions/21886/what-does-edge-triggered-and-level-triggered-mean)
* This one mainly elaborates on the differences in detection of the different trigger events: [Why edge triggering is preferred over level triggering?](https://electronics.stackexchange.com/questions/65463/why-edge-triggering-is-preferred-over-level-triggering) | 2014/10/14 | [
"https://electronics.stackexchange.com/questions/134216",
"https://electronics.stackexchange.com",
"https://electronics.stackexchange.com/users/35490/"
] | Level triggered (high or low) can allow the source to say "nevermind" or to keep the trigger active until the ISR gets around to it. Interrupt latency is not guaranteed on a single core with multiple triggers, though it's usually pretty fast. Generally, the signal for a level-triggered interrupt is itself edge-triggered and you have to clear it in the ISR or else you'll come right back into it again.
As Ignacio said, level triggered can also do something continuously while active, though you should write your software to not get stuck in an "interrupt loop". Not getting to your main code can be somewhat difficult to debug.
Edge triggered is good for things that happen once on some event. If the event happens again, then your response will happen again, so you'll need to be careful about repeated events like switch bounce. | Level triggering is useful when a continuous action requires firing off repeated events, e.g. ringing a bell while an alarm is active. In this case the ISR would be responsible for energizing and deenergizing a solenoid only once; the fact that the interrupt trigger is still present would be responsible for extending the ring duration. |
134,216 | Many processors / µCs / dev-platforms (BeagleBoard, Arduino,...) use interrupts.
These can be triggered by the detection of:
* HIGH level
* RISING edge
* CHANGING level (either FALLING or RISING edge)
* FALLING edge
* LOW level
Now either of two things must be true:
1. FALLING and LOW (/ RISING and HIGH) are virtually the same
2. When a LOW (/HIGH) level is applied over a non-trivial time, the controller is stuck repeating the interrupt service routine over and over
Both of these don't make sense to me:
The first cannot be true, since it would be totally useless to make the difference in the first place then.
So if the second one is true: how could this be useful? What application is there that is not better off with a combination of RISING and FALLING instead of HIGH?
Research so far:
* This question is just a stub, so it didn't help: <https://electronics.stackexchange.com/questions/92833/what-is-the-difference-between-level-triggering-and-edge-triggering>
* This one is also not too useful as it is about *when* those interrupts are triggered, not the implications of the differences: [What does edge triggered and level triggered mean?](https://electronics.stackexchange.com/questions/21886/what-does-edge-triggered-and-level-triggered-mean)
* This one mainly elaborates on the differences in detection of the different trigger events: [Why edge triggering is preferred over level triggering?](https://electronics.stackexchange.com/questions/65463/why-edge-triggering-is-preferred-over-level-triggering) | 2014/10/14 | [
"https://electronics.stackexchange.com/questions/134216",
"https://electronics.stackexchange.com",
"https://electronics.stackexchange.com/users/35490/"
] | As an addition to the other answers, another look from a practical perspective:
The level triggered interrupt is an indication that a device needs attention. As long as it needs attention, the line is asserted. A device may want the master to clock data out of the devices buffer. It may need immediate attention to prevent buffer overflow (so using interrupt is a good choice vs polling) but it wouldn't be practical if the device has to keep switching edges while the buffer still contains data. The master does its processing as fast as possible, clears the interrupt flag when ready and immediately recognizes that there is more to do.
Edge triggered interrupt is an event notification. When some particular thing happens, the device generates a pulse on the interrupt line and its done (fire and forget). The master just takes notice of it and goes on.
My point is, there is practical use for both. | Level triggering is useful when a continuous action requires firing off repeated events, e.g. ringing a bell while an alarm is active. In this case the ISR would be responsible for energizing and deenergizing a solenoid only once; the fact that the interrupt trigger is still present would be responsible for extending the ring duration. |
134,216 | Many processors / µCs / dev-platforms (BeagleBoard, Arduino,...) use interrupts.
These can be triggered by the detection of:
* HIGH level
* RISING edge
* CHANGING level (either FALLING or RISING edge)
* FALLING edge
* LOW level
Now either of two things must be true:
1. FALLING and LOW (/ RISING and HIGH) are virtually the same
2. When a LOW (/HIGH) level is applied over a non-trivial time, the controller is stuck repeating the interrupt service routine over and over
Both of these don't make sense to me:
The first cannot be true, since it would be totally useless to make the difference in the first place then.
So if the second one is true: how could this be useful? What application is there that is not better off with a combination of RISING and FALLING instead of HIGH?
Research so far:
* This question is just a stub, so it didn't help: <https://electronics.stackexchange.com/questions/92833/what-is-the-difference-between-level-triggering-and-edge-triggering>
* This one is also not too useful as it is about *when* those interrupts are triggered, not the implications of the differences: [What does edge triggered and level triggered mean?](https://electronics.stackexchange.com/questions/21886/what-does-edge-triggered-and-level-triggered-mean)
* This one mainly elaborates on the differences in detection of the different trigger events: [Why edge triggering is preferred over level triggering?](https://electronics.stackexchange.com/questions/65463/why-edge-triggering-is-preferred-over-level-triggering) | 2014/10/14 | [
"https://electronics.stackexchange.com/questions/134216",
"https://electronics.stackexchange.com",
"https://electronics.stackexchange.com/users/35490/"
] | Level triggered (high or low) can allow the source to say "nevermind" or to keep the trigger active until the ISR gets around to it. Interrupt latency is not guaranteed on a single core with multiple triggers, though it's usually pretty fast. Generally, the signal for a level-triggered interrupt is itself edge-triggered and you have to clear it in the ISR or else you'll come right back into it again.
As Ignacio said, level triggered can also do something continuously while active, though you should write your software to not get stuck in an "interrupt loop". Not getting to your main code can be somewhat difficult to debug.
Edge triggered is good for things that happen once on some event. If the event happens again, then your response will happen again, so you'll need to be careful about repeated events like switch bounce. | Edge sensitive interrupt only fires when it detects appropriate edge. That means, only single interrupt will happen. If interrupt is enabled AFTER transition it will not react and message ia lost. Usable when certain event must be captured.
Level sensitive interrupt will happen whenever it will be enabled and appropriate level present. Thus request will be serviced even if interrupt is enabled some time later. Furthermore, multiple devices can be attached to single interrupt line. Usable when state or condition is important.
Your nr. 2 statement is correct. Either interrupt must be disabled or level cause serviced.
In other words, you use edge sensitive when you are waiting for something and level sensitive when something might be already waiting for you. |
134,216 | Many processors / µCs / dev-platforms (BeagleBoard, Arduino,...) use interrupts.
These can be triggered by the detection of:
* HIGH level
* RISING edge
* CHANGING level (either FALLING or RISING edge)
* FALLING edge
* LOW level
Now either of two things must be true:
1. FALLING and LOW (/ RISING and HIGH) are virtually the same
2. When a LOW (/HIGH) level is applied over a non-trivial time, the controller is stuck repeating the interrupt service routine over and over
Both of these don't make sense to me:
The first cannot be true, since it would be totally useless to make the difference in the first place then.
So if the second one is true: how could this be useful? What application is there that is not better off with a combination of RISING and FALLING instead of HIGH?
Research so far:
* This question is just a stub, so it didn't help: <https://electronics.stackexchange.com/questions/92833/what-is-the-difference-between-level-triggering-and-edge-triggering>
* This one is also not too useful as it is about *when* those interrupts are triggered, not the implications of the differences: [What does edge triggered and level triggered mean?](https://electronics.stackexchange.com/questions/21886/what-does-edge-triggered-and-level-triggered-mean)
* This one mainly elaborates on the differences in detection of the different trigger events: [Why edge triggering is preferred over level triggering?](https://electronics.stackexchange.com/questions/65463/why-edge-triggering-is-preferred-over-level-triggering) | 2014/10/14 | [
"https://electronics.stackexchange.com/questions/134216",
"https://electronics.stackexchange.com",
"https://electronics.stackexchange.com/users/35490/"
] | As an addition to the other answers, another look from a practical perspective:
The level triggered interrupt is an indication that a device needs attention. As long as it needs attention, the line is asserted. A device may want the master to clock data out of the devices buffer. It may need immediate attention to prevent buffer overflow (so using interrupt is a good choice vs polling) but it wouldn't be practical if the device has to keep switching edges while the buffer still contains data. The master does its processing as fast as possible, clears the interrupt flag when ready and immediately recognizes that there is more to do.
Edge triggered interrupt is an event notification. When some particular thing happens, the device generates a pulse on the interrupt line and its done (fire and forget). The master just takes notice of it and goes on.
My point is, there is practical use for both. | Edge sensitive interrupt only fires when it detects appropriate edge. That means, only single interrupt will happen. If interrupt is enabled AFTER transition it will not react and message ia lost. Usable when certain event must be captured.
Level sensitive interrupt will happen whenever it will be enabled and appropriate level present. Thus request will be serviced even if interrupt is enabled some time later. Furthermore, multiple devices can be attached to single interrupt line. Usable when state or condition is important.
Your nr. 2 statement is correct. Either interrupt must be disabled or level cause serviced.
In other words, you use edge sensitive when you are waiting for something and level sensitive when something might be already waiting for you. |
44,684 | Personal computers today are usually hundreds of times faster, and have thousands of times more memory then the computers in the time when operating systems with graphical user interface started to become common.
However, even on today's fastest machines and modern operating systems one can encounter situations when the most basic controls become non-responsive or extremely slow. The system grinds towards a halt, and sometimes even the mouse cursor stops moving.
You can't even navigate the file system because its windows are frozen: if you try to open a menu, it is being drawn line by line and pixel by pixel, and by the time it is fully drawn, it is usually too late. This on a machine which could otherwise render high-resolution lifelike 3d simulations.
This would all be avoided if the Os would reserve a certain amount of fixed resources solely for its GUI. Why isn't this implemented, or if it is in some manner, why not fully? I doubt that the answer would be "to not waste resources when they become critical", because in such a situation, freeing up the reserved 0.1% won't save you (I guess even doubling the resources wouldn't save you most of the time), but having fully responsive controls in the task manager, file system viewer, system settings, etc. might have saved you. | 2013/09/06 | [
"https://ux.stackexchange.com/questions/44684",
"https://ux.stackexchange.com",
"https://ux.stackexchange.com/users/15142/"
] | Reserving resources for the GUI would not help if other resources of the computer are occupied. Modern computers balance the need for resources themselves following a predetermined priority list, where the GUI is one among others.
Would it make you feel better about your computer if you could move the mouse around on the screen, but when you interacted with the computer it would not respond? | ### Because the OS can just help, applications get it wrong and users get it wronger
*(notice: this answer is mostly windows-focused, although the general concepts apply to most GUI systems)*
The key is that UI operations are just "regular" operations run by the code of the program.
All the UI actions done in response to some event (window repaint, widgets response to clicks, ...) boil down to a loop that asks messages from the operating system and dispatches them to the correct procedure. Both the message pump, most of the plumbing and the UI code run in the same userland thread, which is commonly called the UI thread (actually you can have multiple UI threads in some cases, but it's a mess and I've never seen anyone doing that for real).
Thus, if a process is hogging the CPU, it can happen that the other processes never get a chance to run, so the message pumps remain blocked and UIs become unresponsive.
So, usually the whole thing depends from process/thread scheduling; kernel architects have produced tons of scheduling algorithms (Linux is often said to have the "scheduler of the week" ), some favoring UI responsiveness; Windows in particular gives a priority boost to the thread of the current active window, and have a switch to favor interactive use or server use (it mostly governs the length of assigned CPU time slices).
Nonetheless, no algorithm is perfect, especially since they strive to find a balance between system responsiveness and allowing CPU-demanding applications to do their job.
Also, there are often problems with novice programmers who have fundamental misunderstandings of about how the message pump machinery works. A typical case is when you ask to some program to do something and its GUI hangs until the operation terminates; here some programmer decided to run a lengthy operation inside a message handler, blocking the message pump and thus the whole GUI of the application.
Another problem comes from "power users": often messing with processes/threads priority can have tragical results: setting CPU-intensive operations to "high priority" ("yay it'll run faster!") results in rarer scheduling of regular priority threads, and thus to GUI slowdown/hang.
---
Thus, to summarize:
* UI slowdown is normally a matter of bad CPU scheduling;
* it's difficult for the system to let just the UI run since it's governed by the various message pumps, so you can't just "let the widgets be responsive" - either you let the whole UI thread run (which may do lots of other stuff), or you don't.
* to keep a responsive UI applications must be smart and keep the main thread just for UI, and delegate CPU-intensive or blocking tasks to *low* priority threads, so that when the CPU is scarce most of the CPU time available will go to keeping the UI going;
* users that mess with process priorities without knowing what they are doing deserve what they get (especially idiots that put heavy processes to "real-time priority", which is even above system-critical processes; almost always the situation ends in forced reboots); on a system that must remain responsive heavy processes must have *low* priority, the UI will keep going and the heavy process will still get 100% CPU if there isn't other work to do. |
44,684 | Personal computers today are usually hundreds of times faster, and have thousands of times more memory then the computers in the time when operating systems with graphical user interface started to become common.
However, even on today's fastest machines and modern operating systems one can encounter situations when the most basic controls become non-responsive or extremely slow. The system grinds towards a halt, and sometimes even the mouse cursor stops moving.
You can't even navigate the file system because its windows are frozen: if you try to open a menu, it is being drawn line by line and pixel by pixel, and by the time it is fully drawn, it is usually too late. This on a machine which could otherwise render high-resolution lifelike 3d simulations.
This would all be avoided if the Os would reserve a certain amount of fixed resources solely for its GUI. Why isn't this implemented, or if it is in some manner, why not fully? I doubt that the answer would be "to not waste resources when they become critical", because in such a situation, freeing up the reserved 0.1% won't save you (I guess even doubling the resources wouldn't save you most of the time), but having fully responsive controls in the task manager, file system viewer, system settings, etc. might have saved you. | 2013/09/06 | [
"https://ux.stackexchange.com/questions/44684",
"https://ux.stackexchange.com",
"https://ux.stackexchange.com/users/15142/"
] | Reserving resources for the GUI would not help if other resources of the computer are occupied. Modern computers balance the need for resources themselves following a predetermined priority list, where the GUI is one among others.
Would it make you feel better about your computer if you could move the mouse around on the screen, but when you interacted with the computer it would not respond? | Many, possibly most, things stemming from user input must be performed synchronously. This is by design. A user action, e.g. button click, invokes an action which often causes an internal state change and then the display to update to reflect that change. To accept input before display is updated, upon a view that is basically obsolete, would open things up to many errors and inconsistencies. In most cases the internal change and display update are fast enough to not be an issue, but in a multitasking virtual memory system the application designer doesn't have control and extraordinary events (e.g. running out of available RAM causing the OS to swap things to/from the disk) can interrupt the usually quick response. Software engineers take great pains to keep the UI as responsive as possible but there's simply no way to ensure it will *always* be responsive in a multitasking virtual memory system.
Of course sometimes it is simply bad application engineering that allows the UI to be less responsive than it could be, but the operating systems have had years and years of refinement and optimization applied towards keeping the UI responsive. |
229,490 | How can one alphabetically sort the contacts on the WhatsApp chat list? Right now, the list is completely random, making it difficult to locate a specific chat by its author (contact name) | 2020/09/16 | [
"https://android.stackexchange.com/questions/229490",
"https://android.stackexchange.com",
"https://android.stackexchange.com/users/332499/"
] | There doesn't seem to be any way to sort them alphabetically in the chat list. Currently the Whatsapp chat list is by chat date, meaning the most recent ones will come up.
If you click on the bottom right green button you can access the contacts list, and those contacts are sorted alphabetically.
[](https://i.stack.imgur.com/6oiu3.jpg) | Whatsapp doesn't officially added this feature.. but if you really want to sort them then download Whatsapp business. You can use label to organize things..
Just like this.. (items are the people actually)
[](https://i.stack.imgur.com/1DMyh.jpg)
I too use whatsapp business and really love its auto reply function.. |
418,426 | I have a server that's currently running SQL Server 2005 Express, and I need to restore a database backup that a developer has modified using SQL Server 2008 R2 [I *think* the full version, but still waiting to hear back on whether it's a full edition or Express].
I know that I can't restore a database from SQL Server 2008 R2 to SQL Server 2005 Express, and I know that I can't even restore a database from SQL Server 2008 R2 to SQL Server 2008. BUT! Can I restore a database from SQL Server 2008 R2 to SQL Server 2008 R2 Express? The only difference here being that one is a full paid version, and the other is the express version. If so, I'll just update the SQL Server 2005 Express server to 2008 R2 Express.
Thanks in advance! | 2012/08/16 | [
"https://serverfault.com/questions/418426",
"https://serverfault.com",
"https://serverfault.com/users/129132/"
] | Yes.
It's the database version that matters and is what gets attached to the database, not the edition of MSSQL used. As long as the database version is the same, you can move it between the free (Express) and paid versions to your heart's content... not that it's a process I'd recommend for recreational purposes.
EDIT: Since it's been mentioned, the relevant database-limitation in SQL Express 2008 R2 is a size limit of 10GB. It also has some limitations on the services and resources available to MSSQL Server, but those won't prevent you from restoring the database to it, only (possibly) using it how you'd like.
[Full Technet feature comparison for 2008 R2 versions linked here](http://msdn.microsoft.com/en-us/library/cc645993%28v=SQL.105%29.aspx). | It depends. If your database includes features that are not supported by the edition you are restoring to the restore will fail. For example, enterprise edition features like data compression and transparent encryption. This is in addition to the physical resource limitations that exist in Express.
If your database falls within the supported features / limitations of Express you should be all set. |
16,713,914 | I am not sure if this is a **bug** with the **new Android GeoFence sample code** or my understanding of what it is supposed to do is wrong. The sample app creates geofences but does not alert when geofence is breached. If anyone would like to give this a try and confirm, you can download the sample code from here :
<https://developer.android.com/training/location/geofencing.html>
This is what I was expecting the sample app to do :
* Setup 2 different geofences. In my case, I picked 2 points a mile
apart by entering their respective lat/long. I also set the radius
to 250m .
* I drove to each of those 2 locations one after another
and I assumed a notification would popup indicating that the geofence
has been breached.
In this case, **no notifications nor any log messages were registered** which means that "ReceiveTransitionsIntentService" never got called. One observation is that **when I drive to the first location and then add a new geofence right at that location**, the notification gets **fired immediately**, but any other location (geofence) I set and drive to, nothing happens.
**Any idea why? Is my understanding correct about the sample app's functionality?**
Do I need to do anything in addition to what is in the sample code to receive an alert when I breach the geofence while driving? **Is geofence monitoring separate from creating geofences, what am I missing here?**
Highly appreciate any input, We are very eager to use this in our app but right now we are stuck.
Thanks,
Torri. | 2013/05/23 | [
"https://Stackoverflow.com/questions/16713914",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/720954/"
] | First of all, your understanding of the app's functionality is correct. Whenever you enter/leave one of your geofences it shows you that in a notification (it's always updating the same notification btw, so keep an eye out for it or you might miss one of the events).
Second, be careful because Geofence 1, by default, is only triggering **ENTER** events. So if you leave that geofence area after being inside it you won't get a notification for that! You can change this behavior in the creation of the mUIGeofence1 object on MainActivity.java.
Lastly, as with all things related to location, this API isn't perfect.. From my tests so far I have never seen it start up the GPS, so when outside it pretty much seems to rely on network locations which can easily not fall under a 500m radius geofence even if you're standing right in the middle of it. During one of the presentations at IO, Reto Meier mentioned that the API would be clever enough to handle battery drain the best way possible, so it would only turn on GPS when the user starts getting close to a geofence - which makes sense - but this never seems to happen unfortunately. | Initially I thought the same. It is because the radius is in Meters, and I thought it would be in KMS / Miles. So I had entered very small values. Then after few experiments I found that out. Entered bigger values and it worked like charm on my Nexus 5 |
16,713,914 | I am not sure if this is a **bug** with the **new Android GeoFence sample code** or my understanding of what it is supposed to do is wrong. The sample app creates geofences but does not alert when geofence is breached. If anyone would like to give this a try and confirm, you can download the sample code from here :
<https://developer.android.com/training/location/geofencing.html>
This is what I was expecting the sample app to do :
* Setup 2 different geofences. In my case, I picked 2 points a mile
apart by entering their respective lat/long. I also set the radius
to 250m .
* I drove to each of those 2 locations one after another
and I assumed a notification would popup indicating that the geofence
has been breached.
In this case, **no notifications nor any log messages were registered** which means that "ReceiveTransitionsIntentService" never got called. One observation is that **when I drive to the first location and then add a new geofence right at that location**, the notification gets **fired immediately**, but any other location (geofence) I set and drive to, nothing happens.
**Any idea why? Is my understanding correct about the sample app's functionality?**
Do I need to do anything in addition to what is in the sample code to receive an alert when I breach the geofence while driving? **Is geofence monitoring separate from creating geofences, what am I missing here?**
Highly appreciate any input, We are very eager to use this in our app but right now we are stuck.
Thanks,
Torri. | 2013/05/23 | [
"https://Stackoverflow.com/questions/16713914",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/720954/"
] | Initially I thought the same. It is because the radius is in Meters, and I thought it would be in KMS / Miles. So I had entered very small values. Then after few experiments I found that out. Entered bigger values and it worked like charm on my Nexus 5 | I wrote a test app that used both the Google Play Services Location and Geofence APIs. I used the location API to get current location at a 1-second rate. When I set my geofence I displayed the distance from current location to the geofence center, updated whenever the position updated.
Right after the geofence is set I get the entry event. I clear that event and go for a walk well outside the geofence radius. The distance displayed lags like crazy. It took about three minutes for the position to catch up to me. A similar lag happened on the way back home.
Pity Play Services is closed source, I'd love to understand the limits of their algorithm. |
16,713,914 | I am not sure if this is a **bug** with the **new Android GeoFence sample code** or my understanding of what it is supposed to do is wrong. The sample app creates geofences but does not alert when geofence is breached. If anyone would like to give this a try and confirm, you can download the sample code from here :
<https://developer.android.com/training/location/geofencing.html>
This is what I was expecting the sample app to do :
* Setup 2 different geofences. In my case, I picked 2 points a mile
apart by entering their respective lat/long. I also set the radius
to 250m .
* I drove to each of those 2 locations one after another
and I assumed a notification would popup indicating that the geofence
has been breached.
In this case, **no notifications nor any log messages were registered** which means that "ReceiveTransitionsIntentService" never got called. One observation is that **when I drive to the first location and then add a new geofence right at that location**, the notification gets **fired immediately**, but any other location (geofence) I set and drive to, nothing happens.
**Any idea why? Is my understanding correct about the sample app's functionality?**
Do I need to do anything in addition to what is in the sample code to receive an alert when I breach the geofence while driving? **Is geofence monitoring separate from creating geofences, what am I missing here?**
Highly appreciate any input, We are very eager to use this in our app but right now we are stuck.
Thanks,
Torri. | 2013/05/23 | [
"https://Stackoverflow.com/questions/16713914",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/720954/"
] | The API will never "turn on" GPS. You have to start GPS yourself. | I wrote a test app that used both the Google Play Services Location and Geofence APIs. I used the location API to get current location at a 1-second rate. When I set my geofence I displayed the distance from current location to the geofence center, updated whenever the position updated.
Right after the geofence is set I get the entry event. I clear that event and go for a walk well outside the geofence radius. The distance displayed lags like crazy. It took about three minutes for the position to catch up to me. A similar lag happened on the way back home.
Pity Play Services is closed source, I'd love to understand the limits of their algorithm. |
16,713,914 | I am not sure if this is a **bug** with the **new Android GeoFence sample code** or my understanding of what it is supposed to do is wrong. The sample app creates geofences but does not alert when geofence is breached. If anyone would like to give this a try and confirm, you can download the sample code from here :
<https://developer.android.com/training/location/geofencing.html>
This is what I was expecting the sample app to do :
* Setup 2 different geofences. In my case, I picked 2 points a mile
apart by entering their respective lat/long. I also set the radius
to 250m .
* I drove to each of those 2 locations one after another
and I assumed a notification would popup indicating that the geofence
has been breached.
In this case, **no notifications nor any log messages were registered** which means that "ReceiveTransitionsIntentService" never got called. One observation is that **when I drive to the first location and then add a new geofence right at that location**, the notification gets **fired immediately**, but any other location (geofence) I set and drive to, nothing happens.
**Any idea why? Is my understanding correct about the sample app's functionality?**
Do I need to do anything in addition to what is in the sample code to receive an alert when I breach the geofence while driving? **Is geofence monitoring separate from creating geofences, what am I missing here?**
Highly appreciate any input, We are very eager to use this in our app but right now we are stuck.
Thanks,
Torri. | 2013/05/23 | [
"https://Stackoverflow.com/questions/16713914",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/720954/"
] | The API will never "turn on" GPS. You have to start GPS yourself. | also make sure you have set your radius big enough. I woudl sugget making it 1000 just to see if it works. I'm still playing around with it but the sample code here does work fine:
[How do I use the Android Geofencing API?](https://stackoverflow.com/questions/16769653/how-to-use-android-geofencing-api) |
16,713,914 | I am not sure if this is a **bug** with the **new Android GeoFence sample code** or my understanding of what it is supposed to do is wrong. The sample app creates geofences but does not alert when geofence is breached. If anyone would like to give this a try and confirm, you can download the sample code from here :
<https://developer.android.com/training/location/geofencing.html>
This is what I was expecting the sample app to do :
* Setup 2 different geofences. In my case, I picked 2 points a mile
apart by entering their respective lat/long. I also set the radius
to 250m .
* I drove to each of those 2 locations one after another
and I assumed a notification would popup indicating that the geofence
has been breached.
In this case, **no notifications nor any log messages were registered** which means that "ReceiveTransitionsIntentService" never got called. One observation is that **when I drive to the first location and then add a new geofence right at that location**, the notification gets **fired immediately**, but any other location (geofence) I set and drive to, nothing happens.
**Any idea why? Is my understanding correct about the sample app's functionality?**
Do I need to do anything in addition to what is in the sample code to receive an alert when I breach the geofence while driving? **Is geofence monitoring separate from creating geofences, what am I missing here?**
Highly appreciate any input, We are very eager to use this in our app but right now we are stuck.
Thanks,
Torri. | 2013/05/23 | [
"https://Stackoverflow.com/questions/16713914",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/720954/"
] | also make sure you have set your radius big enough. I woudl sugget making it 1000 just to see if it works. I'm still playing around with it but the sample code here does work fine:
[How do I use the Android Geofencing API?](https://stackoverflow.com/questions/16769653/how-to-use-android-geofencing-api) | I wrote a test app that used both the Google Play Services Location and Geofence APIs. I used the location API to get current location at a 1-second rate. When I set my geofence I displayed the distance from current location to the geofence center, updated whenever the position updated.
Right after the geofence is set I get the entry event. I clear that event and go for a walk well outside the geofence radius. The distance displayed lags like crazy. It took about three minutes for the position to catch up to me. A similar lag happened on the way back home.
Pity Play Services is closed source, I'd love to understand the limits of their algorithm. |
16,713,914 | I am not sure if this is a **bug** with the **new Android GeoFence sample code** or my understanding of what it is supposed to do is wrong. The sample app creates geofences but does not alert when geofence is breached. If anyone would like to give this a try and confirm, you can download the sample code from here :
<https://developer.android.com/training/location/geofencing.html>
This is what I was expecting the sample app to do :
* Setup 2 different geofences. In my case, I picked 2 points a mile
apart by entering their respective lat/long. I also set the radius
to 250m .
* I drove to each of those 2 locations one after another
and I assumed a notification would popup indicating that the geofence
has been breached.
In this case, **no notifications nor any log messages were registered** which means that "ReceiveTransitionsIntentService" never got called. One observation is that **when I drive to the first location and then add a new geofence right at that location**, the notification gets **fired immediately**, but any other location (geofence) I set and drive to, nothing happens.
**Any idea why? Is my understanding correct about the sample app's functionality?**
Do I need to do anything in addition to what is in the sample code to receive an alert when I breach the geofence while driving? **Is geofence monitoring separate from creating geofences, what am I missing here?**
Highly appreciate any input, We are very eager to use this in our app but right now we are stuck.
Thanks,
Torri. | 2013/05/23 | [
"https://Stackoverflow.com/questions/16713914",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/720954/"
] | First of all, your understanding of the app's functionality is correct. Whenever you enter/leave one of your geofences it shows you that in a notification (it's always updating the same notification btw, so keep an eye out for it or you might miss one of the events).
Second, be careful because Geofence 1, by default, is only triggering **ENTER** events. So if you leave that geofence area after being inside it you won't get a notification for that! You can change this behavior in the creation of the mUIGeofence1 object on MainActivity.java.
Lastly, as with all things related to location, this API isn't perfect.. From my tests so far I have never seen it start up the GPS, so when outside it pretty much seems to rely on network locations which can easily not fall under a 500m radius geofence even if you're standing right in the middle of it. During one of the presentations at IO, Reto Meier mentioned that the API would be clever enough to handle battery drain the best way possible, so it would only turn on GPS when the user starts getting close to a geofence - which makes sense - but this never seems to happen unfortunately. | also make sure you have set your radius big enough. I woudl sugget making it 1000 just to see if it works. I'm still playing around with it but the sample code here does work fine:
[How do I use the Android Geofencing API?](https://stackoverflow.com/questions/16769653/how-to-use-android-geofencing-api) |
16,713,914 | I am not sure if this is a **bug** with the **new Android GeoFence sample code** or my understanding of what it is supposed to do is wrong. The sample app creates geofences but does not alert when geofence is breached. If anyone would like to give this a try and confirm, you can download the sample code from here :
<https://developer.android.com/training/location/geofencing.html>
This is what I was expecting the sample app to do :
* Setup 2 different geofences. In my case, I picked 2 points a mile
apart by entering their respective lat/long. I also set the radius
to 250m .
* I drove to each of those 2 locations one after another
and I assumed a notification would popup indicating that the geofence
has been breached.
In this case, **no notifications nor any log messages were registered** which means that "ReceiveTransitionsIntentService" never got called. One observation is that **when I drive to the first location and then add a new geofence right at that location**, the notification gets **fired immediately**, but any other location (geofence) I set and drive to, nothing happens.
**Any idea why? Is my understanding correct about the sample app's functionality?**
Do I need to do anything in addition to what is in the sample code to receive an alert when I breach the geofence while driving? **Is geofence monitoring separate from creating geofences, what am I missing here?**
Highly appreciate any input, We are very eager to use this in our app but right now we are stuck.
Thanks,
Torri. | 2013/05/23 | [
"https://Stackoverflow.com/questions/16713914",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/720954/"
] | First of all, your understanding of the app's functionality is correct. Whenever you enter/leave one of your geofences it shows you that in a notification (it's always updating the same notification btw, so keep an eye out for it or you might miss one of the events).
Second, be careful because Geofence 1, by default, is only triggering **ENTER** events. So if you leave that geofence area after being inside it you won't get a notification for that! You can change this behavior in the creation of the mUIGeofence1 object on MainActivity.java.
Lastly, as with all things related to location, this API isn't perfect.. From my tests so far I have never seen it start up the GPS, so when outside it pretty much seems to rely on network locations which can easily not fall under a 500m radius geofence even if you're standing right in the middle of it. During one of the presentations at IO, Reto Meier mentioned that the API would be clever enough to handle battery drain the best way possible, so it would only turn on GPS when the user starts getting close to a geofence - which makes sense - but this never seems to happen unfortunately. | I wrote a test app that used both the Google Play Services Location and Geofence APIs. I used the location API to get current location at a 1-second rate. When I set my geofence I displayed the distance from current location to the geofence center, updated whenever the position updated.
Right after the geofence is set I get the entry event. I clear that event and go for a walk well outside the geofence radius. The distance displayed lags like crazy. It took about three minutes for the position to catch up to me. A similar lag happened on the way back home.
Pity Play Services is closed source, I'd love to understand the limits of their algorithm. |
16,713,914 | I am not sure if this is a **bug** with the **new Android GeoFence sample code** or my understanding of what it is supposed to do is wrong. The sample app creates geofences but does not alert when geofence is breached. If anyone would like to give this a try and confirm, you can download the sample code from here :
<https://developer.android.com/training/location/geofencing.html>
This is what I was expecting the sample app to do :
* Setup 2 different geofences. In my case, I picked 2 points a mile
apart by entering their respective lat/long. I also set the radius
to 250m .
* I drove to each of those 2 locations one after another
and I assumed a notification would popup indicating that the geofence
has been breached.
In this case, **no notifications nor any log messages were registered** which means that "ReceiveTransitionsIntentService" never got called. One observation is that **when I drive to the first location and then add a new geofence right at that location**, the notification gets **fired immediately**, but any other location (geofence) I set and drive to, nothing happens.
**Any idea why? Is my understanding correct about the sample app's functionality?**
Do I need to do anything in addition to what is in the sample code to receive an alert when I breach the geofence while driving? **Is geofence monitoring separate from creating geofences, what am I missing here?**
Highly appreciate any input, We are very eager to use this in our app but right now we are stuck.
Thanks,
Torri. | 2013/05/23 | [
"https://Stackoverflow.com/questions/16713914",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/720954/"
] | First of all, your understanding of the app's functionality is correct. Whenever you enter/leave one of your geofences it shows you that in a notification (it's always updating the same notification btw, so keep an eye out for it or you might miss one of the events).
Second, be careful because Geofence 1, by default, is only triggering **ENTER** events. So if you leave that geofence area after being inside it you won't get a notification for that! You can change this behavior in the creation of the mUIGeofence1 object on MainActivity.java.
Lastly, as with all things related to location, this API isn't perfect.. From my tests so far I have never seen it start up the GPS, so when outside it pretty much seems to rely on network locations which can easily not fall under a 500m radius geofence even if you're standing right in the middle of it. During one of the presentations at IO, Reto Meier mentioned that the API would be clever enough to handle battery drain the best way possible, so it would only turn on GPS when the user starts getting close to a geofence - which makes sense - but this never seems to happen unfortunately. | The API will never "turn on" GPS. You have to start GPS yourself. |
16,713,914 | I am not sure if this is a **bug** with the **new Android GeoFence sample code** or my understanding of what it is supposed to do is wrong. The sample app creates geofences but does not alert when geofence is breached. If anyone would like to give this a try and confirm, you can download the sample code from here :
<https://developer.android.com/training/location/geofencing.html>
This is what I was expecting the sample app to do :
* Setup 2 different geofences. In my case, I picked 2 points a mile
apart by entering their respective lat/long. I also set the radius
to 250m .
* I drove to each of those 2 locations one after another
and I assumed a notification would popup indicating that the geofence
has been breached.
In this case, **no notifications nor any log messages were registered** which means that "ReceiveTransitionsIntentService" never got called. One observation is that **when I drive to the first location and then add a new geofence right at that location**, the notification gets **fired immediately**, but any other location (geofence) I set and drive to, nothing happens.
**Any idea why? Is my understanding correct about the sample app's functionality?**
Do I need to do anything in addition to what is in the sample code to receive an alert when I breach the geofence while driving? **Is geofence monitoring separate from creating geofences, what am I missing here?**
Highly appreciate any input, We are very eager to use this in our app but right now we are stuck.
Thanks,
Torri. | 2013/05/23 | [
"https://Stackoverflow.com/questions/16713914",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/720954/"
] | Initially I thought the same. It is because the radius is in Meters, and I thought it would be in KMS / Miles. So I had entered very small values. Then after few experiments I found that out. Entered bigger values and it worked like charm on my Nexus 5 | I tried the GeofenceDetection sample code and it is working.
I am using only Wifi and GPS, and set my radius to be 15 meters.
When i walked to the region, it is not immediately show the notification.
After a few seconds, i got "enter" notification.
Also, even if i am standing still in the region, sometimes i got notified
that i am exiting the region. It makes the app feels like it's jumping around in and out of a region. |
16,713,914 | I am not sure if this is a **bug** with the **new Android GeoFence sample code** or my understanding of what it is supposed to do is wrong. The sample app creates geofences but does not alert when geofence is breached. If anyone would like to give this a try and confirm, you can download the sample code from here :
<https://developer.android.com/training/location/geofencing.html>
This is what I was expecting the sample app to do :
* Setup 2 different geofences. In my case, I picked 2 points a mile
apart by entering their respective lat/long. I also set the radius
to 250m .
* I drove to each of those 2 locations one after another
and I assumed a notification would popup indicating that the geofence
has been breached.
In this case, **no notifications nor any log messages were registered** which means that "ReceiveTransitionsIntentService" never got called. One observation is that **when I drive to the first location and then add a new geofence right at that location**, the notification gets **fired immediately**, but any other location (geofence) I set and drive to, nothing happens.
**Any idea why? Is my understanding correct about the sample app's functionality?**
Do I need to do anything in addition to what is in the sample code to receive an alert when I breach the geofence while driving? **Is geofence monitoring separate from creating geofences, what am I missing here?**
Highly appreciate any input, We are very eager to use this in our app but right now we are stuck.
Thanks,
Torri. | 2013/05/23 | [
"https://Stackoverflow.com/questions/16713914",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/720954/"
] | First of all, your understanding of the app's functionality is correct. Whenever you enter/leave one of your geofences it shows you that in a notification (it's always updating the same notification btw, so keep an eye out for it or you might miss one of the events).
Second, be careful because Geofence 1, by default, is only triggering **ENTER** events. So if you leave that geofence area after being inside it you won't get a notification for that! You can change this behavior in the creation of the mUIGeofence1 object on MainActivity.java.
Lastly, as with all things related to location, this API isn't perfect.. From my tests so far I have never seen it start up the GPS, so when outside it pretty much seems to rely on network locations which can easily not fall under a 500m radius geofence even if you're standing right in the middle of it. During one of the presentations at IO, Reto Meier mentioned that the API would be clever enough to handle battery drain the best way possible, so it would only turn on GPS when the user starts getting close to a geofence - which makes sense - but this never seems to happen unfortunately. | I tried the GeofenceDetection sample code and it is working.
I am using only Wifi and GPS, and set my radius to be 15 meters.
When i walked to the region, it is not immediately show the notification.
After a few seconds, i got "enter" notification.
Also, even if i am standing still in the region, sometimes i got notified
that i am exiting the region. It makes the app feels like it's jumping around in and out of a region. |
75,895 | I am doing out some flow charts and am wondering if I am approaching this correctly. In essence, I have several method calls and I am flowcharting each separately. However, several of these methods make a method call for some info and then continue. See this example:

I have 3 other methods that also call GetQueue() and I am wondering if I am representing this correctly. The AddQueue() flow visually looks like it is broken.
NOTE: Changes made in my flowchart:
 | 2011/05/12 | [
"https://softwareengineering.stackexchange.com/questions/75895",
"https://softwareengineering.stackexchange.com",
"https://softwareengineering.stackexchange.com/users/7062/"
] | Use a [subroutine symbol](http://www.breezetree.com/article-excel-flowchart-shapes.htm) for the method call (predefined process)
 | I've recently done some flow-charting and struggled with the same issue, how to present subroutine calls, or perhaps method- and function -calls as you might call them these days.
I settled on a convention that I separate subroutine CALLS from subroutine REFERENCES. For the former I use an ordinary rectangle showing the call with arguments being made, using whatever variables that are in effect at that point in program execution.
I use the doubly sided "predefined process" rectangle simply as a reference to another flowchart which contains the definition of that function or sub-routine. The sub-routine rectangle need not show the arguments of the sub-routine since that is part of the defining flow-chart of the sub-routine in question, but it may be helpful to add them in the reference already so whoever reads it can see the meaning of the actual arguments used in a call.
This increases the number of rectangles but it makes it clearer that those other flowcharts exist to look up the definition of some of the called functions from. Often if a function is simple I will not create a separate diagram for it but just document it verbally.
I also use the "document" symbol to say that details should be looked up from the code-listing.
The point of a flowchart to me is not to create a program, but to make it easier for others to understand a program. I think the help as a birds-eye view and that purpose of them should be kept in mind. They are not for visually describing EVERY detail of your program,details are visible from the code when needed. The flow-chart is just one picture of your program from the high-level view-point.
Keeping flowcharts high-level also means there is less need to keep them up-to-date as code is modified.
They are pictures. Like any good story software documentation should have pictures too which give an alternative viewpoint to the code. |
66,559 | In short: there are a few servers in a small server room. Being cheap general not-really-business-oriented machines, they did not necessarily have good safety features from the beginning, and what's more, they could be arbitrarily modified before being brought to the room and installed there. **How could such a server die a sudden and dramatic death, with the perpetrator able to make practically any preparations for the sabotage?**
I've heard some kinds of chips can explode somehow, but if this scene sounds absolutely implausible, consider what could be different if the servers were manufactured a decade or two into the future.
---
As much as I'd like to learn if blowing up a computer is in any way possible, I also have two conditions specific to my story:
* there must be no visible clue of intentional sabotage — it must look like a technical problem upon visual inspection (so, no explosives inside the server case)
* the attacker must be able to remotely\* start the process at short notice, with at most 3-4 days from the start signal to the final catastrophic event
\* Meaning: from outside the room. E.g., hacking the system, changing voltage or air conditioning of the room. No inside traitor, however.
---
I'm writing a story involving an Internet-connected server which at some point explodes. The system is optimized for the compilation and execution of simple programs as well as for various computations, working as a cloud testing environment for a local community of computer scientists. (The reason why anyone would want to make it blow up is, frankly, difficult to explain.)
The tiny server room where it is located can be assumed to be reasonably safe (physically), however security practices are not the priority for the inexperienced sysadmin. Therefore, the chance of initial compromisation is very realistic (i.e., the outside person installing the server may loosen some screws or even infect the system, and the sysadmin would never notice). Also, the never-updated system could be hacked at any time, since the server is connected to the Internet.
Whether it was from personal experience or science fiction films, I thought the processor overheating would do the job. For example, a bug in the system could suddenly cause a massive amount of computations to be performed, generating constant intense load on the processor, which would ultimately cause it to overheat (and explode...?) However, it now seems to me that more problems need to arise to lead to such an extreme outcome. Since nobody around the server room really knows or cares what is going on (as long as the server is up), and the computer scientists never visit the room themselves, the attacker has lots of opportunities.
If an explosion is really improbable, a similar dramatic incident could happen instead, e.g. the spinning fans could slip off or the box could fall to the floor or catch fire, leading to disastrous consequences and possibly destroying nearby objects in the process (which, come to think of it, could be the ones exploding subsequently). As I noted, the person setting up the server is free to prepare it for anything. | 2017/01/02 | [
"https://worldbuilding.stackexchange.com/questions/66559",
"https://worldbuilding.stackexchange.com",
"https://worldbuilding.stackexchange.com/users/31707/"
] | Not too long ago I had smoke come out of the vent on my computer. It was due to the power connector on an optical drive. It was continuing to burn the plastic, but would not “catch” to burn without the heat source.
I recall when Li-ion batteries were first appearing, an early adopter (because of the low weight to power ratio) was RC aircraft. Many did in fact end in an impressive fireball.
So, being an *early adopter* of some new technology might be key; it doesn’t have all the safety features yet, they apply the low level tech themselves rather than find an already engineered solution, and they don't appreciate the dangers. It also has the advantage that you make up something new so people don't complain that X doesn't behave that way, since you use Y which is made up.
A true explosion in the technical sense seems unlikely because the materials are not explosives. Or maybe the people combined things that were not meant to be explosive, like how airship waterproofing is what today we call *thermite*.
Furthermore, a lot of stuff simply doesn’t burn, and that's also by design. Your people might use different stuff rather than normal, not realizing that it compromises normal fire safety.
Finally, you might have an intentional self-destruct mechanism! Yea, they didn’t know that the cheap ebay drives were surplus from government contractors intended for servers on board military spy planes… | Yes, computer chips can explode, but it's a question of scale.
Cooling fans are controlled by the operating system to keep temperatures within specified limits, starting/speeding them up if more cooling is needed, slowing/stopping them to reduce power consumption and noise when not needed. Also, CPUs will slow themselves down if necessary to reduce generation of heat if there is a threat of overheating.
These measures can be subverted; cause the CPU to work very hard, continue to run at its highest speed with all cooling turned off, and the chip will overheat and go into thermal runaway. It will eventually destroy itself explosively. In human terms, it won't look or sound like much, perhaps all the sound and fury of a Christmas cracker.
There may be smoke, and there may be ensuing fire; computers do contain a fair amount of combustibles - plastics in the circuit boards, chip packaging, insulation, and various mechanical parts. Likely not enough to do anything more than release a harmful dose of toxic smoke, but there is potential to start a larger fire if more combustibles are very close by - as in stacks of paper piled all around the machine. For a single node in a server rack, going "poof" like this would probably do nothing to anything else - nothing within range will be combustible. |
66,559 | In short: there are a few servers in a small server room. Being cheap general not-really-business-oriented machines, they did not necessarily have good safety features from the beginning, and what's more, they could be arbitrarily modified before being brought to the room and installed there. **How could such a server die a sudden and dramatic death, with the perpetrator able to make practically any preparations for the sabotage?**
I've heard some kinds of chips can explode somehow, but if this scene sounds absolutely implausible, consider what could be different if the servers were manufactured a decade or two into the future.
---
As much as I'd like to learn if blowing up a computer is in any way possible, I also have two conditions specific to my story:
* there must be no visible clue of intentional sabotage — it must look like a technical problem upon visual inspection (so, no explosives inside the server case)
* the attacker must be able to remotely\* start the process at short notice, with at most 3-4 days from the start signal to the final catastrophic event
\* Meaning: from outside the room. E.g., hacking the system, changing voltage or air conditioning of the room. No inside traitor, however.
---
I'm writing a story involving an Internet-connected server which at some point explodes. The system is optimized for the compilation and execution of simple programs as well as for various computations, working as a cloud testing environment for a local community of computer scientists. (The reason why anyone would want to make it blow up is, frankly, difficult to explain.)
The tiny server room where it is located can be assumed to be reasonably safe (physically), however security practices are not the priority for the inexperienced sysadmin. Therefore, the chance of initial compromisation is very realistic (i.e., the outside person installing the server may loosen some screws or even infect the system, and the sysadmin would never notice). Also, the never-updated system could be hacked at any time, since the server is connected to the Internet.
Whether it was from personal experience or science fiction films, I thought the processor overheating would do the job. For example, a bug in the system could suddenly cause a massive amount of computations to be performed, generating constant intense load on the processor, which would ultimately cause it to overheat (and explode...?) However, it now seems to me that more problems need to arise to lead to such an extreme outcome. Since nobody around the server room really knows or cares what is going on (as long as the server is up), and the computer scientists never visit the room themselves, the attacker has lots of opportunities.
If an explosion is really improbable, a similar dramatic incident could happen instead, e.g. the spinning fans could slip off or the box could fall to the floor or catch fire, leading to disastrous consequences and possibly destroying nearby objects in the process (which, come to think of it, could be the ones exploding subsequently). As I noted, the person setting up the server is free to prepare it for anything. | 2017/01/02 | [
"https://worldbuilding.stackexchange.com/questions/66559",
"https://worldbuilding.stackexchange.com",
"https://worldbuilding.stackexchange.com/users/31707/"
] | Your server banks are cooled by massive quantities of a [flammable refrigerant](https://www.racplus.com/news/safety-concerns-grow-over-surge-in-use-of-flammable-refrigerants/8620789.article) which ends up getting ignited by a spark from faulty (or sabotaged) electrical wiring. | Yes, computer chips can explode, but it's a question of scale.
Cooling fans are controlled by the operating system to keep temperatures within specified limits, starting/speeding them up if more cooling is needed, slowing/stopping them to reduce power consumption and noise when not needed. Also, CPUs will slow themselves down if necessary to reduce generation of heat if there is a threat of overheating.
These measures can be subverted; cause the CPU to work very hard, continue to run at its highest speed with all cooling turned off, and the chip will overheat and go into thermal runaway. It will eventually destroy itself explosively. In human terms, it won't look or sound like much, perhaps all the sound and fury of a Christmas cracker.
There may be smoke, and there may be ensuing fire; computers do contain a fair amount of combustibles - plastics in the circuit boards, chip packaging, insulation, and various mechanical parts. Likely not enough to do anything more than release a harmful dose of toxic smoke, but there is potential to start a larger fire if more combustibles are very close by - as in stacks of paper piled all around the machine. For a single node in a server rack, going "poof" like this would probably do nothing to anything else - nothing within range will be combustible. |
66,559 | In short: there are a few servers in a small server room. Being cheap general not-really-business-oriented machines, they did not necessarily have good safety features from the beginning, and what's more, they could be arbitrarily modified before being brought to the room and installed there. **How could such a server die a sudden and dramatic death, with the perpetrator able to make practically any preparations for the sabotage?**
I've heard some kinds of chips can explode somehow, but if this scene sounds absolutely implausible, consider what could be different if the servers were manufactured a decade or two into the future.
---
As much as I'd like to learn if blowing up a computer is in any way possible, I also have two conditions specific to my story:
* there must be no visible clue of intentional sabotage — it must look like a technical problem upon visual inspection (so, no explosives inside the server case)
* the attacker must be able to remotely\* start the process at short notice, with at most 3-4 days from the start signal to the final catastrophic event
\* Meaning: from outside the room. E.g., hacking the system, changing voltage or air conditioning of the room. No inside traitor, however.
---
I'm writing a story involving an Internet-connected server which at some point explodes. The system is optimized for the compilation and execution of simple programs as well as for various computations, working as a cloud testing environment for a local community of computer scientists. (The reason why anyone would want to make it blow up is, frankly, difficult to explain.)
The tiny server room where it is located can be assumed to be reasonably safe (physically), however security practices are not the priority for the inexperienced sysadmin. Therefore, the chance of initial compromisation is very realistic (i.e., the outside person installing the server may loosen some screws or even infect the system, and the sysadmin would never notice). Also, the never-updated system could be hacked at any time, since the server is connected to the Internet.
Whether it was from personal experience or science fiction films, I thought the processor overheating would do the job. For example, a bug in the system could suddenly cause a massive amount of computations to be performed, generating constant intense load on the processor, which would ultimately cause it to overheat (and explode...?) However, it now seems to me that more problems need to arise to lead to such an extreme outcome. Since nobody around the server room really knows or cares what is going on (as long as the server is up), and the computer scientists never visit the room themselves, the attacker has lots of opportunities.
If an explosion is really improbable, a similar dramatic incident could happen instead, e.g. the spinning fans could slip off or the box could fall to the floor or catch fire, leading to disastrous consequences and possibly destroying nearby objects in the process (which, come to think of it, could be the ones exploding subsequently). As I noted, the person setting up the server is free to prepare it for anything. | 2017/01/02 | [
"https://worldbuilding.stackexchange.com/questions/66559",
"https://worldbuilding.stackexchange.com",
"https://worldbuilding.stackexchange.com/users/31707/"
] | Yes, computer chips can explode, but it's a question of scale.
Cooling fans are controlled by the operating system to keep temperatures within specified limits, starting/speeding them up if more cooling is needed, slowing/stopping them to reduce power consumption and noise when not needed. Also, CPUs will slow themselves down if necessary to reduce generation of heat if there is a threat of overheating.
These measures can be subverted; cause the CPU to work very hard, continue to run at its highest speed with all cooling turned off, and the chip will overheat and go into thermal runaway. It will eventually destroy itself explosively. In human terms, it won't look or sound like much, perhaps all the sound and fury of a Christmas cracker.
There may be smoke, and there may be ensuing fire; computers do contain a fair amount of combustibles - plastics in the circuit boards, chip packaging, insulation, and various mechanical parts. Likely not enough to do anything more than release a harmful dose of toxic smoke, but there is potential to start a larger fire if more combustibles are very close by - as in stacks of paper piled all around the machine. For a single node in a server rack, going "poof" like this would probably do nothing to anything else - nothing within range will be combustible. | Besides turning cooling of and overcharging the batteries you could also try to spin the harddrives over their max speed maby, you can get them to shatter. The harddrive shards could also make some big damage allthoug this is very unlikely to happen. |
66,559 | In short: there are a few servers in a small server room. Being cheap general not-really-business-oriented machines, they did not necessarily have good safety features from the beginning, and what's more, they could be arbitrarily modified before being brought to the room and installed there. **How could such a server die a sudden and dramatic death, with the perpetrator able to make practically any preparations for the sabotage?**
I've heard some kinds of chips can explode somehow, but if this scene sounds absolutely implausible, consider what could be different if the servers were manufactured a decade or two into the future.
---
As much as I'd like to learn if blowing up a computer is in any way possible, I also have two conditions specific to my story:
* there must be no visible clue of intentional sabotage — it must look like a technical problem upon visual inspection (so, no explosives inside the server case)
* the attacker must be able to remotely\* start the process at short notice, with at most 3-4 days from the start signal to the final catastrophic event
\* Meaning: from outside the room. E.g., hacking the system, changing voltage or air conditioning of the room. No inside traitor, however.
---
I'm writing a story involving an Internet-connected server which at some point explodes. The system is optimized for the compilation and execution of simple programs as well as for various computations, working as a cloud testing environment for a local community of computer scientists. (The reason why anyone would want to make it blow up is, frankly, difficult to explain.)
The tiny server room where it is located can be assumed to be reasonably safe (physically), however security practices are not the priority for the inexperienced sysadmin. Therefore, the chance of initial compromisation is very realistic (i.e., the outside person installing the server may loosen some screws or even infect the system, and the sysadmin would never notice). Also, the never-updated system could be hacked at any time, since the server is connected to the Internet.
Whether it was from personal experience or science fiction films, I thought the processor overheating would do the job. For example, a bug in the system could suddenly cause a massive amount of computations to be performed, generating constant intense load on the processor, which would ultimately cause it to overheat (and explode...?) However, it now seems to me that more problems need to arise to lead to such an extreme outcome. Since nobody around the server room really knows or cares what is going on (as long as the server is up), and the computer scientists never visit the room themselves, the attacker has lots of opportunities.
If an explosion is really improbable, a similar dramatic incident could happen instead, e.g. the spinning fans could slip off or the box could fall to the floor or catch fire, leading to disastrous consequences and possibly destroying nearby objects in the process (which, come to think of it, could be the ones exploding subsequently). As I noted, the person setting up the server is free to prepare it for anything. | 2017/01/02 | [
"https://worldbuilding.stackexchange.com/questions/66559",
"https://worldbuilding.stackexchange.com",
"https://worldbuilding.stackexchange.com/users/31707/"
] | Backup battery bank failure
===========================
As you've noted, it would be difficult to get computer chips to fail - they simply don't contain anything all that explosive. About the best you can do is an electrical fire resulting in exploding capacitors, but they're more like popcorn than an all-out fireball *boom*. So, we'll have to focus on the surrounding infrastructure - the most likely candidate being batteries.
Datacenters typically have large banks of backup batteries (Google, for example, has a battery in [each of their racks](https://cnet4.cbsistatic.com/img/ODt1FkLz25YmW72t0HPDvm2DWMI=/620x0/2009/04/01/66450093-fdc0-11e2-8c7c-d4ae52e62bcc/Google_data_centers-1.jpg)) - classic examples look like this:
[](https://i.stack.imgur.com/oiqyb.jpg)
The great thing about typical batteries is they are rather good at exploding. A novice datacenter admin might try to mimic Google using cheap batteries with imperfections - making their setup rather vulnerable to a major problem.
**Remote triggering a battery failure**
It would have to be poorly designed but let's try it anyway! So, the first thing that would be needed is the safety vents on the batteries would have to get blocked up. Maybe they could be blocked up by dust - after all, dust is a common problem in servers anyway. The above image is even pretty dusty.
You'll next need to build up some heat around that battery - this part could *kind of* be performed remotely. Assuming they used a Google-style design and the battery is in the rack, then we could maybe pull it off by making the CPU get way too hot. Disable the fans and overclock it, then make the server run something seriously intensive. If possible, disable the CPU's thermal safety measures *(this is hard, but it's likely that it's optional anyway; dust ignites rather easily)*. Do this to all the racks to make the heat really climb for the one at the top of the cabinet. If you're lucky, dust around one of the CPU's would catch fire; a short amount of time later, that fire engulfs the battery.
Rather usefully, this scenario doesn't necessarily require any physical access too as it can be explained with a series of novice mistakes.
**Summary**
A stack of poorly designed, very dusty Google replicas with a cheap built in battery. Maybe even place the battery right next to the CPU to give it the best chance it can get!
[](https://i.stack.imgur.com/5o9nd.jpg)
Next, it sounds like your datacenter isn't big enough to have either of these, but let's consider them anyway.
Diesel generator fire
=====================
Many datacenters also have diesel generators as a backup. A somewhat famous example was during hurricane Sandy in NYC when the guys at Squarespace manually [hauled diesel up 18 flights of stairs](https://www.squarespace.com/press/2012-11-1-fuel-buckets-keep-new-york-data-centre-live-through-the-hurricane) to keep the servers online. This could be used as a nice source of something classically explosive nearby.
Cooling system failure
======================
A major source of cost and complexity in an average datacenter is the cooling system - large pipes filled with warm water.
So, if one of the pipes became clogged in some way and the datacenter builder didn't bother with all the normal safety measures (such as [an expansion tank](https://en.wikipedia.org/wiki/Expansion_tank)) then the heat would build in the system potentially taking it to breaking point. Water explosions are wonderfully powerful, but there's no fireball of course - so it depends on the kind of effect you're after!
Fire sprinklers
===============
Rather ironically, a fire sprinkler can cause a fire when electronics are involved. Let's say the perpetrator triggers the fire alarm which in turn rains down water on the rack. That generates sparks, which in turn starts an electrical fire. The fire then proceeds to explode one or all of the batteries using the setup above.
In this scenario, for some physical accuracy, the top server would spark but would be too wet to ignite any dust. One of the lower servers would receive enough of the water (but not too much to drench it) to be the actual ignition source.
The bonus of using a sprinkler is it would be a lot easier to pull off remotely; it wouldn't involve breaking basically every safety measure a CPU has. It's also rather subtle - a novice probably wouldn't bother checking the ceiling when positioning their servers.
Or..
====
Hit [backspace](https://www.youtube.com/watch?v=B1XqrTgRpfM&t=2m22s):
[](https://i.stack.imgur.com/J9E6k.gif)
Shift is *even better*:
[](https://i.stack.imgur.com/ov7mZ.gif) | The server / computer has none or very few flammable parts
The small batteries are very small and would be hard to over charge
Can get a capacitor to pop but that is far from an explosion
Memory and CPU is mostly sand and it is not going to explode or catch on fire.
A fan might heat up and have a short electrical fire.
The operating systems protects the hardware in that a regular program cannot control hardware directly. It is call the hardware abstraction layer.
I think the best shot would be to hack the EPROM to shut off a fan and hack the thermal sensor to not report over heat. Even access to the EPROM from a regular program is not easy. Hope the EPROM fails as part of the overheat or they just don't check.
An OpenSource OS like Linux you might be able to do it but still you are just going to fry (short) some components. No fire or explosion. |
66,559 | In short: there are a few servers in a small server room. Being cheap general not-really-business-oriented machines, they did not necessarily have good safety features from the beginning, and what's more, they could be arbitrarily modified before being brought to the room and installed there. **How could such a server die a sudden and dramatic death, with the perpetrator able to make practically any preparations for the sabotage?**
I've heard some kinds of chips can explode somehow, but if this scene sounds absolutely implausible, consider what could be different if the servers were manufactured a decade or two into the future.
---
As much as I'd like to learn if blowing up a computer is in any way possible, I also have two conditions specific to my story:
* there must be no visible clue of intentional sabotage — it must look like a technical problem upon visual inspection (so, no explosives inside the server case)
* the attacker must be able to remotely\* start the process at short notice, with at most 3-4 days from the start signal to the final catastrophic event
\* Meaning: from outside the room. E.g., hacking the system, changing voltage or air conditioning of the room. No inside traitor, however.
---
I'm writing a story involving an Internet-connected server which at some point explodes. The system is optimized for the compilation and execution of simple programs as well as for various computations, working as a cloud testing environment for a local community of computer scientists. (The reason why anyone would want to make it blow up is, frankly, difficult to explain.)
The tiny server room where it is located can be assumed to be reasonably safe (physically), however security practices are not the priority for the inexperienced sysadmin. Therefore, the chance of initial compromisation is very realistic (i.e., the outside person installing the server may loosen some screws or even infect the system, and the sysadmin would never notice). Also, the never-updated system could be hacked at any time, since the server is connected to the Internet.
Whether it was from personal experience or science fiction films, I thought the processor overheating would do the job. For example, a bug in the system could suddenly cause a massive amount of computations to be performed, generating constant intense load on the processor, which would ultimately cause it to overheat (and explode...?) However, it now seems to me that more problems need to arise to lead to such an extreme outcome. Since nobody around the server room really knows or cares what is going on (as long as the server is up), and the computer scientists never visit the room themselves, the attacker has lots of opportunities.
If an explosion is really improbable, a similar dramatic incident could happen instead, e.g. the spinning fans could slip off or the box could fall to the floor or catch fire, leading to disastrous consequences and possibly destroying nearby objects in the process (which, come to think of it, could be the ones exploding subsequently). As I noted, the person setting up the server is free to prepare it for anything. | 2017/01/02 | [
"https://worldbuilding.stackexchange.com/questions/66559",
"https://worldbuilding.stackexchange.com",
"https://worldbuilding.stackexchange.com/users/31707/"
] | Backup battery bank failure
===========================
As you've noted, it would be difficult to get computer chips to fail - they simply don't contain anything all that explosive. About the best you can do is an electrical fire resulting in exploding capacitors, but they're more like popcorn than an all-out fireball *boom*. So, we'll have to focus on the surrounding infrastructure - the most likely candidate being batteries.
Datacenters typically have large banks of backup batteries (Google, for example, has a battery in [each of their racks](https://cnet4.cbsistatic.com/img/ODt1FkLz25YmW72t0HPDvm2DWMI=/620x0/2009/04/01/66450093-fdc0-11e2-8c7c-d4ae52e62bcc/Google_data_centers-1.jpg)) - classic examples look like this:
[](https://i.stack.imgur.com/oiqyb.jpg)
The great thing about typical batteries is they are rather good at exploding. A novice datacenter admin might try to mimic Google using cheap batteries with imperfections - making their setup rather vulnerable to a major problem.
**Remote triggering a battery failure**
It would have to be poorly designed but let's try it anyway! So, the first thing that would be needed is the safety vents on the batteries would have to get blocked up. Maybe they could be blocked up by dust - after all, dust is a common problem in servers anyway. The above image is even pretty dusty.
You'll next need to build up some heat around that battery - this part could *kind of* be performed remotely. Assuming they used a Google-style design and the battery is in the rack, then we could maybe pull it off by making the CPU get way too hot. Disable the fans and overclock it, then make the server run something seriously intensive. If possible, disable the CPU's thermal safety measures *(this is hard, but it's likely that it's optional anyway; dust ignites rather easily)*. Do this to all the racks to make the heat really climb for the one at the top of the cabinet. If you're lucky, dust around one of the CPU's would catch fire; a short amount of time later, that fire engulfs the battery.
Rather usefully, this scenario doesn't necessarily require any physical access too as it can be explained with a series of novice mistakes.
**Summary**
A stack of poorly designed, very dusty Google replicas with a cheap built in battery. Maybe even place the battery right next to the CPU to give it the best chance it can get!
[](https://i.stack.imgur.com/5o9nd.jpg)
Next, it sounds like your datacenter isn't big enough to have either of these, but let's consider them anyway.
Diesel generator fire
=====================
Many datacenters also have diesel generators as a backup. A somewhat famous example was during hurricane Sandy in NYC when the guys at Squarespace manually [hauled diesel up 18 flights of stairs](https://www.squarespace.com/press/2012-11-1-fuel-buckets-keep-new-york-data-centre-live-through-the-hurricane) to keep the servers online. This could be used as a nice source of something classically explosive nearby.
Cooling system failure
======================
A major source of cost and complexity in an average datacenter is the cooling system - large pipes filled with warm water.
So, if one of the pipes became clogged in some way and the datacenter builder didn't bother with all the normal safety measures (such as [an expansion tank](https://en.wikipedia.org/wiki/Expansion_tank)) then the heat would build in the system potentially taking it to breaking point. Water explosions are wonderfully powerful, but there's no fireball of course - so it depends on the kind of effect you're after!
Fire sprinklers
===============
Rather ironically, a fire sprinkler can cause a fire when electronics are involved. Let's say the perpetrator triggers the fire alarm which in turn rains down water on the rack. That generates sparks, which in turn starts an electrical fire. The fire then proceeds to explode one or all of the batteries using the setup above.
In this scenario, for some physical accuracy, the top server would spark but would be too wet to ignite any dust. One of the lower servers would receive enough of the water (but not too much to drench it) to be the actual ignition source.
The bonus of using a sprinkler is it would be a lot easier to pull off remotely; it wouldn't involve breaking basically every safety measure a CPU has. It's also rather subtle - a novice probably wouldn't bother checking the ceiling when positioning their servers.
Or..
====
Hit [backspace](https://www.youtube.com/watch?v=B1XqrTgRpfM&t=2m22s):
[](https://i.stack.imgur.com/J9E6k.gif)
Shift is *even better*:
[](https://i.stack.imgur.com/ov7mZ.gif) | Not too long ago I had smoke come out of the vent on my computer. It was due to the power connector on an optical drive. It was continuing to burn the plastic, but would not “catch” to burn without the heat source.
I recall when Li-ion batteries were first appearing, an early adopter (because of the low weight to power ratio) was RC aircraft. Many did in fact end in an impressive fireball.
So, being an *early adopter* of some new technology might be key; it doesn’t have all the safety features yet, they apply the low level tech themselves rather than find an already engineered solution, and they don't appreciate the dangers. It also has the advantage that you make up something new so people don't complain that X doesn't behave that way, since you use Y which is made up.
A true explosion in the technical sense seems unlikely because the materials are not explosives. Or maybe the people combined things that were not meant to be explosive, like how airship waterproofing is what today we call *thermite*.
Furthermore, a lot of stuff simply doesn’t burn, and that's also by design. Your people might use different stuff rather than normal, not realizing that it compromises normal fire safety.
Finally, you might have an intentional self-destruct mechanism! Yea, they didn’t know that the cheap ebay drives were surplus from government contractors intended for servers on board military spy planes… |
66,559 | In short: there are a few servers in a small server room. Being cheap general not-really-business-oriented machines, they did not necessarily have good safety features from the beginning, and what's more, they could be arbitrarily modified before being brought to the room and installed there. **How could such a server die a sudden and dramatic death, with the perpetrator able to make practically any preparations for the sabotage?**
I've heard some kinds of chips can explode somehow, but if this scene sounds absolutely implausible, consider what could be different if the servers were manufactured a decade or two into the future.
---
As much as I'd like to learn if blowing up a computer is in any way possible, I also have two conditions specific to my story:
* there must be no visible clue of intentional sabotage — it must look like a technical problem upon visual inspection (so, no explosives inside the server case)
* the attacker must be able to remotely\* start the process at short notice, with at most 3-4 days from the start signal to the final catastrophic event
\* Meaning: from outside the room. E.g., hacking the system, changing voltage or air conditioning of the room. No inside traitor, however.
---
I'm writing a story involving an Internet-connected server which at some point explodes. The system is optimized for the compilation and execution of simple programs as well as for various computations, working as a cloud testing environment for a local community of computer scientists. (The reason why anyone would want to make it blow up is, frankly, difficult to explain.)
The tiny server room where it is located can be assumed to be reasonably safe (physically), however security practices are not the priority for the inexperienced sysadmin. Therefore, the chance of initial compromisation is very realistic (i.e., the outside person installing the server may loosen some screws or even infect the system, and the sysadmin would never notice). Also, the never-updated system could be hacked at any time, since the server is connected to the Internet.
Whether it was from personal experience or science fiction films, I thought the processor overheating would do the job. For example, a bug in the system could suddenly cause a massive amount of computations to be performed, generating constant intense load on the processor, which would ultimately cause it to overheat (and explode...?) However, it now seems to me that more problems need to arise to lead to such an extreme outcome. Since nobody around the server room really knows or cares what is going on (as long as the server is up), and the computer scientists never visit the room themselves, the attacker has lots of opportunities.
If an explosion is really improbable, a similar dramatic incident could happen instead, e.g. the spinning fans could slip off or the box could fall to the floor or catch fire, leading to disastrous consequences and possibly destroying nearby objects in the process (which, come to think of it, could be the ones exploding subsequently). As I noted, the person setting up the server is free to prepare it for anything. | 2017/01/02 | [
"https://worldbuilding.stackexchange.com/questions/66559",
"https://worldbuilding.stackexchange.com",
"https://worldbuilding.stackexchange.com/users/31707/"
] | Backup battery bank failure
===========================
As you've noted, it would be difficult to get computer chips to fail - they simply don't contain anything all that explosive. About the best you can do is an electrical fire resulting in exploding capacitors, but they're more like popcorn than an all-out fireball *boom*. So, we'll have to focus on the surrounding infrastructure - the most likely candidate being batteries.
Datacenters typically have large banks of backup batteries (Google, for example, has a battery in [each of their racks](https://cnet4.cbsistatic.com/img/ODt1FkLz25YmW72t0HPDvm2DWMI=/620x0/2009/04/01/66450093-fdc0-11e2-8c7c-d4ae52e62bcc/Google_data_centers-1.jpg)) - classic examples look like this:
[](https://i.stack.imgur.com/oiqyb.jpg)
The great thing about typical batteries is they are rather good at exploding. A novice datacenter admin might try to mimic Google using cheap batteries with imperfections - making their setup rather vulnerable to a major problem.
**Remote triggering a battery failure**
It would have to be poorly designed but let's try it anyway! So, the first thing that would be needed is the safety vents on the batteries would have to get blocked up. Maybe they could be blocked up by dust - after all, dust is a common problem in servers anyway. The above image is even pretty dusty.
You'll next need to build up some heat around that battery - this part could *kind of* be performed remotely. Assuming they used a Google-style design and the battery is in the rack, then we could maybe pull it off by making the CPU get way too hot. Disable the fans and overclock it, then make the server run something seriously intensive. If possible, disable the CPU's thermal safety measures *(this is hard, but it's likely that it's optional anyway; dust ignites rather easily)*. Do this to all the racks to make the heat really climb for the one at the top of the cabinet. If you're lucky, dust around one of the CPU's would catch fire; a short amount of time later, that fire engulfs the battery.
Rather usefully, this scenario doesn't necessarily require any physical access too as it can be explained with a series of novice mistakes.
**Summary**
A stack of poorly designed, very dusty Google replicas with a cheap built in battery. Maybe even place the battery right next to the CPU to give it the best chance it can get!
[](https://i.stack.imgur.com/5o9nd.jpg)
Next, it sounds like your datacenter isn't big enough to have either of these, but let's consider them anyway.
Diesel generator fire
=====================
Many datacenters also have diesel generators as a backup. A somewhat famous example was during hurricane Sandy in NYC when the guys at Squarespace manually [hauled diesel up 18 flights of stairs](https://www.squarespace.com/press/2012-11-1-fuel-buckets-keep-new-york-data-centre-live-through-the-hurricane) to keep the servers online. This could be used as a nice source of something classically explosive nearby.
Cooling system failure
======================
A major source of cost and complexity in an average datacenter is the cooling system - large pipes filled with warm water.
So, if one of the pipes became clogged in some way and the datacenter builder didn't bother with all the normal safety measures (such as [an expansion tank](https://en.wikipedia.org/wiki/Expansion_tank)) then the heat would build in the system potentially taking it to breaking point. Water explosions are wonderfully powerful, but there's no fireball of course - so it depends on the kind of effect you're after!
Fire sprinklers
===============
Rather ironically, a fire sprinkler can cause a fire when electronics are involved. Let's say the perpetrator triggers the fire alarm which in turn rains down water on the rack. That generates sparks, which in turn starts an electrical fire. The fire then proceeds to explode one or all of the batteries using the setup above.
In this scenario, for some physical accuracy, the top server would spark but would be too wet to ignite any dust. One of the lower servers would receive enough of the water (but not too much to drench it) to be the actual ignition source.
The bonus of using a sprinkler is it would be a lot easier to pull off remotely; it wouldn't involve breaking basically every safety measure a CPU has. It's also rather subtle - a novice probably wouldn't bother checking the ceiling when positioning their servers.
Or..
====
Hit [backspace](https://www.youtube.com/watch?v=B1XqrTgRpfM&t=2m22s):
[](https://i.stack.imgur.com/J9E6k.gif)
Shift is *even better*:
[](https://i.stack.imgur.com/ov7mZ.gif) | Yes, computer chips can explode, but it's a question of scale.
Cooling fans are controlled by the operating system to keep temperatures within specified limits, starting/speeding them up if more cooling is needed, slowing/stopping them to reduce power consumption and noise when not needed. Also, CPUs will slow themselves down if necessary to reduce generation of heat if there is a threat of overheating.
These measures can be subverted; cause the CPU to work very hard, continue to run at its highest speed with all cooling turned off, and the chip will overheat and go into thermal runaway. It will eventually destroy itself explosively. In human terms, it won't look or sound like much, perhaps all the sound and fury of a Christmas cracker.
There may be smoke, and there may be ensuing fire; computers do contain a fair amount of combustibles - plastics in the circuit boards, chip packaging, insulation, and various mechanical parts. Likely not enough to do anything more than release a harmful dose of toxic smoke, but there is potential to start a larger fire if more combustibles are very close by - as in stacks of paper piled all around the machine. For a single node in a server rack, going "poof" like this would probably do nothing to anything else - nothing within range will be combustible. |
66,559 | In short: there are a few servers in a small server room. Being cheap general not-really-business-oriented machines, they did not necessarily have good safety features from the beginning, and what's more, they could be arbitrarily modified before being brought to the room and installed there. **How could such a server die a sudden and dramatic death, with the perpetrator able to make practically any preparations for the sabotage?**
I've heard some kinds of chips can explode somehow, but if this scene sounds absolutely implausible, consider what could be different if the servers were manufactured a decade or two into the future.
---
As much as I'd like to learn if blowing up a computer is in any way possible, I also have two conditions specific to my story:
* there must be no visible clue of intentional sabotage — it must look like a technical problem upon visual inspection (so, no explosives inside the server case)
* the attacker must be able to remotely\* start the process at short notice, with at most 3-4 days from the start signal to the final catastrophic event
\* Meaning: from outside the room. E.g., hacking the system, changing voltage or air conditioning of the room. No inside traitor, however.
---
I'm writing a story involving an Internet-connected server which at some point explodes. The system is optimized for the compilation and execution of simple programs as well as for various computations, working as a cloud testing environment for a local community of computer scientists. (The reason why anyone would want to make it blow up is, frankly, difficult to explain.)
The tiny server room where it is located can be assumed to be reasonably safe (physically), however security practices are not the priority for the inexperienced sysadmin. Therefore, the chance of initial compromisation is very realistic (i.e., the outside person installing the server may loosen some screws or even infect the system, and the sysadmin would never notice). Also, the never-updated system could be hacked at any time, since the server is connected to the Internet.
Whether it was from personal experience or science fiction films, I thought the processor overheating would do the job. For example, a bug in the system could suddenly cause a massive amount of computations to be performed, generating constant intense load on the processor, which would ultimately cause it to overheat (and explode...?) However, it now seems to me that more problems need to arise to lead to such an extreme outcome. Since nobody around the server room really knows or cares what is going on (as long as the server is up), and the computer scientists never visit the room themselves, the attacker has lots of opportunities.
If an explosion is really improbable, a similar dramatic incident could happen instead, e.g. the spinning fans could slip off or the box could fall to the floor or catch fire, leading to disastrous consequences and possibly destroying nearby objects in the process (which, come to think of it, could be the ones exploding subsequently). As I noted, the person setting up the server is free to prepare it for anything. | 2017/01/02 | [
"https://worldbuilding.stackexchange.com/questions/66559",
"https://worldbuilding.stackexchange.com",
"https://worldbuilding.stackexchange.com/users/31707/"
] | You'd be surprised how much stuff is handled in software these days. For example, one fellow [discovered](http://arstechnica.com/apple/2011/07/how-charlie-miller-discovered-the-apple-battery-hackhow-a-security-researcher-discovered-the-apple-battery-hack/) that a Macbook with a compromised kernel could actually break into the microcontroller in the battery, and reflash its firmware. (The battery was using its own off-the-shelf OS, and Apple hadn't changed the default password on the batteries it shipped.)
In any case, this software is responsible for handling charging and discharging. If I recall correctly, lithium batteries will catch fire if they're discharged too much, and then you try to re-charge them. According to [Wikipedia](https://en.wikipedia.org/wiki/Lithium-ion_battery):
>
> Discharging beyond 2 V can also result in capacity fade. The (copper) anode current collector can dissolve into the electrolyte. When charged, copper ions can reduce on the anode as metallic copper. Over time, copper dendrites can form and cause a short in the same manner as lithium.
>
>
> | Besides turning cooling of and overcharging the batteries you could also try to spin the harddrives over their max speed maby, you can get them to shatter. The harddrive shards could also make some big damage allthoug this is very unlikely to happen. |
66,559 | In short: there are a few servers in a small server room. Being cheap general not-really-business-oriented machines, they did not necessarily have good safety features from the beginning, and what's more, they could be arbitrarily modified before being brought to the room and installed there. **How could such a server die a sudden and dramatic death, with the perpetrator able to make practically any preparations for the sabotage?**
I've heard some kinds of chips can explode somehow, but if this scene sounds absolutely implausible, consider what could be different if the servers were manufactured a decade or two into the future.
---
As much as I'd like to learn if blowing up a computer is in any way possible, I also have two conditions specific to my story:
* there must be no visible clue of intentional sabotage — it must look like a technical problem upon visual inspection (so, no explosives inside the server case)
* the attacker must be able to remotely\* start the process at short notice, with at most 3-4 days from the start signal to the final catastrophic event
\* Meaning: from outside the room. E.g., hacking the system, changing voltage or air conditioning of the room. No inside traitor, however.
---
I'm writing a story involving an Internet-connected server which at some point explodes. The system is optimized for the compilation and execution of simple programs as well as for various computations, working as a cloud testing environment for a local community of computer scientists. (The reason why anyone would want to make it blow up is, frankly, difficult to explain.)
The tiny server room where it is located can be assumed to be reasonably safe (physically), however security practices are not the priority for the inexperienced sysadmin. Therefore, the chance of initial compromisation is very realistic (i.e., the outside person installing the server may loosen some screws or even infect the system, and the sysadmin would never notice). Also, the never-updated system could be hacked at any time, since the server is connected to the Internet.
Whether it was from personal experience or science fiction films, I thought the processor overheating would do the job. For example, a bug in the system could suddenly cause a massive amount of computations to be performed, generating constant intense load on the processor, which would ultimately cause it to overheat (and explode...?) However, it now seems to me that more problems need to arise to lead to such an extreme outcome. Since nobody around the server room really knows or cares what is going on (as long as the server is up), and the computer scientists never visit the room themselves, the attacker has lots of opportunities.
If an explosion is really improbable, a similar dramatic incident could happen instead, e.g. the spinning fans could slip off or the box could fall to the floor or catch fire, leading to disastrous consequences and possibly destroying nearby objects in the process (which, come to think of it, could be the ones exploding subsequently). As I noted, the person setting up the server is free to prepare it for anything. | 2017/01/02 | [
"https://worldbuilding.stackexchange.com/questions/66559",
"https://worldbuilding.stackexchange.com",
"https://worldbuilding.stackexchange.com/users/31707/"
] | The problem you have with having anything dramatic happen is everything is isolated.
For example, a power supply under the right conditions might catch fire for a bit, but is encased in a metal shell that would limit or prevent its spread. The following is about the best you can get.
Let's pretend the servers were purchased with no name power supplies, and were already running at 105% of max. Due to cheapness, the safe guards provided by normal manufacturers was left out. Now some motherboards allow overclocking via software, so with the correct virus you could potentially push it even further over the top causing the whole system to draw even more power. Then runs software to max the CPU and GPU. You might also be able to A. stop the fans,on the motherboard or B. override any alarms when you force the fans to 1rpm.
At this point you might be able to melt some wires inside the power supply. Largely the CPU have heat sensors built-in, and would automatically throttle the speed down to prevent damage. You would have to be a super genius to alter the CPU as it is all encrypted in multiple layers by Intel.
Maybe you could get the capacitors to pop, and a small fire that would be contained by either the metal case of the power supply or the chassis. An actual explosion would be almost impossible. The super cheap components inside the power supply would quickly melt or short out, and cause an open circuit disrupting the short. Either that or trip the circuit breakers, and that would stop the short.
Typically servers are connected to UPS, which would detect the short and turn off.
If you significantly tampered with the electrical system, maybe you could have a fire, maybe. As in prevent the any breakers in the whole electrical box from tripping.
Your only hope is the building catches fire, and there is a gas station with a giant propane tank outside which the fire can spread to and then EXPLOSION!!!! | You'd be surprised how much stuff is handled in software these days. For example, one fellow [discovered](http://arstechnica.com/apple/2011/07/how-charlie-miller-discovered-the-apple-battery-hackhow-a-security-researcher-discovered-the-apple-battery-hack/) that a Macbook with a compromised kernel could actually break into the microcontroller in the battery, and reflash its firmware. (The battery was using its own off-the-shelf OS, and Apple hadn't changed the default password on the batteries it shipped.)
In any case, this software is responsible for handling charging and discharging. If I recall correctly, lithium batteries will catch fire if they're discharged too much, and then you try to re-charge them. According to [Wikipedia](https://en.wikipedia.org/wiki/Lithium-ion_battery):
>
> Discharging beyond 2 V can also result in capacity fade. The (copper) anode current collector can dissolve into the electrolyte. When charged, copper ions can reduce on the anode as metallic copper. Over time, copper dendrites can form and cause a short in the same manner as lithium.
>
>
> |
66,559 | In short: there are a few servers in a small server room. Being cheap general not-really-business-oriented machines, they did not necessarily have good safety features from the beginning, and what's more, they could be arbitrarily modified before being brought to the room and installed there. **How could such a server die a sudden and dramatic death, with the perpetrator able to make practically any preparations for the sabotage?**
I've heard some kinds of chips can explode somehow, but if this scene sounds absolutely implausible, consider what could be different if the servers were manufactured a decade or two into the future.
---
As much as I'd like to learn if blowing up a computer is in any way possible, I also have two conditions specific to my story:
* there must be no visible clue of intentional sabotage — it must look like a technical problem upon visual inspection (so, no explosives inside the server case)
* the attacker must be able to remotely\* start the process at short notice, with at most 3-4 days from the start signal to the final catastrophic event
\* Meaning: from outside the room. E.g., hacking the system, changing voltage or air conditioning of the room. No inside traitor, however.
---
I'm writing a story involving an Internet-connected server which at some point explodes. The system is optimized for the compilation and execution of simple programs as well as for various computations, working as a cloud testing environment for a local community of computer scientists. (The reason why anyone would want to make it blow up is, frankly, difficult to explain.)
The tiny server room where it is located can be assumed to be reasonably safe (physically), however security practices are not the priority for the inexperienced sysadmin. Therefore, the chance of initial compromisation is very realistic (i.e., the outside person installing the server may loosen some screws or even infect the system, and the sysadmin would never notice). Also, the never-updated system could be hacked at any time, since the server is connected to the Internet.
Whether it was from personal experience or science fiction films, I thought the processor overheating would do the job. For example, a bug in the system could suddenly cause a massive amount of computations to be performed, generating constant intense load on the processor, which would ultimately cause it to overheat (and explode...?) However, it now seems to me that more problems need to arise to lead to such an extreme outcome. Since nobody around the server room really knows or cares what is going on (as long as the server is up), and the computer scientists never visit the room themselves, the attacker has lots of opportunities.
If an explosion is really improbable, a similar dramatic incident could happen instead, e.g. the spinning fans could slip off or the box could fall to the floor or catch fire, leading to disastrous consequences and possibly destroying nearby objects in the process (which, come to think of it, could be the ones exploding subsequently). As I noted, the person setting up the server is free to prepare it for anything. | 2017/01/02 | [
"https://worldbuilding.stackexchange.com/questions/66559",
"https://worldbuilding.stackexchange.com",
"https://worldbuilding.stackexchange.com/users/31707/"
] | Backup battery bank failure
===========================
As you've noted, it would be difficult to get computer chips to fail - they simply don't contain anything all that explosive. About the best you can do is an electrical fire resulting in exploding capacitors, but they're more like popcorn than an all-out fireball *boom*. So, we'll have to focus on the surrounding infrastructure - the most likely candidate being batteries.
Datacenters typically have large banks of backup batteries (Google, for example, has a battery in [each of their racks](https://cnet4.cbsistatic.com/img/ODt1FkLz25YmW72t0HPDvm2DWMI=/620x0/2009/04/01/66450093-fdc0-11e2-8c7c-d4ae52e62bcc/Google_data_centers-1.jpg)) - classic examples look like this:
[](https://i.stack.imgur.com/oiqyb.jpg)
The great thing about typical batteries is they are rather good at exploding. A novice datacenter admin might try to mimic Google using cheap batteries with imperfections - making their setup rather vulnerable to a major problem.
**Remote triggering a battery failure**
It would have to be poorly designed but let's try it anyway! So, the first thing that would be needed is the safety vents on the batteries would have to get blocked up. Maybe they could be blocked up by dust - after all, dust is a common problem in servers anyway. The above image is even pretty dusty.
You'll next need to build up some heat around that battery - this part could *kind of* be performed remotely. Assuming they used a Google-style design and the battery is in the rack, then we could maybe pull it off by making the CPU get way too hot. Disable the fans and overclock it, then make the server run something seriously intensive. If possible, disable the CPU's thermal safety measures *(this is hard, but it's likely that it's optional anyway; dust ignites rather easily)*. Do this to all the racks to make the heat really climb for the one at the top of the cabinet. If you're lucky, dust around one of the CPU's would catch fire; a short amount of time later, that fire engulfs the battery.
Rather usefully, this scenario doesn't necessarily require any physical access too as it can be explained with a series of novice mistakes.
**Summary**
A stack of poorly designed, very dusty Google replicas with a cheap built in battery. Maybe even place the battery right next to the CPU to give it the best chance it can get!
[](https://i.stack.imgur.com/5o9nd.jpg)
Next, it sounds like your datacenter isn't big enough to have either of these, but let's consider them anyway.
Diesel generator fire
=====================
Many datacenters also have diesel generators as a backup. A somewhat famous example was during hurricane Sandy in NYC when the guys at Squarespace manually [hauled diesel up 18 flights of stairs](https://www.squarespace.com/press/2012-11-1-fuel-buckets-keep-new-york-data-centre-live-through-the-hurricane) to keep the servers online. This could be used as a nice source of something classically explosive nearby.
Cooling system failure
======================
A major source of cost and complexity in an average datacenter is the cooling system - large pipes filled with warm water.
So, if one of the pipes became clogged in some way and the datacenter builder didn't bother with all the normal safety measures (such as [an expansion tank](https://en.wikipedia.org/wiki/Expansion_tank)) then the heat would build in the system potentially taking it to breaking point. Water explosions are wonderfully powerful, but there's no fireball of course - so it depends on the kind of effect you're after!
Fire sprinklers
===============
Rather ironically, a fire sprinkler can cause a fire when electronics are involved. Let's say the perpetrator triggers the fire alarm which in turn rains down water on the rack. That generates sparks, which in turn starts an electrical fire. The fire then proceeds to explode one or all of the batteries using the setup above.
In this scenario, for some physical accuracy, the top server would spark but would be too wet to ignite any dust. One of the lower servers would receive enough of the water (but not too much to drench it) to be the actual ignition source.
The bonus of using a sprinkler is it would be a lot easier to pull off remotely; it wouldn't involve breaking basically every safety measure a CPU has. It's also rather subtle - a novice probably wouldn't bother checking the ceiling when positioning their servers.
Or..
====
Hit [backspace](https://www.youtube.com/watch?v=B1XqrTgRpfM&t=2m22s):
[](https://i.stack.imgur.com/J9E6k.gif)
Shift is *even better*:
[](https://i.stack.imgur.com/ov7mZ.gif) | Your server banks are cooled by massive quantities of a [flammable refrigerant](https://www.racplus.com/news/safety-concerns-grow-over-surge-in-use-of-flammable-refrigerants/8620789.article) which ends up getting ignited by a spark from faulty (or sabotaged) electrical wiring. |
66,559 | In short: there are a few servers in a small server room. Being cheap general not-really-business-oriented machines, they did not necessarily have good safety features from the beginning, and what's more, they could be arbitrarily modified before being brought to the room and installed there. **How could such a server die a sudden and dramatic death, with the perpetrator able to make practically any preparations for the sabotage?**
I've heard some kinds of chips can explode somehow, but if this scene sounds absolutely implausible, consider what could be different if the servers were manufactured a decade or two into the future.
---
As much as I'd like to learn if blowing up a computer is in any way possible, I also have two conditions specific to my story:
* there must be no visible clue of intentional sabotage — it must look like a technical problem upon visual inspection (so, no explosives inside the server case)
* the attacker must be able to remotely\* start the process at short notice, with at most 3-4 days from the start signal to the final catastrophic event
\* Meaning: from outside the room. E.g., hacking the system, changing voltage or air conditioning of the room. No inside traitor, however.
---
I'm writing a story involving an Internet-connected server which at some point explodes. The system is optimized for the compilation and execution of simple programs as well as for various computations, working as a cloud testing environment for a local community of computer scientists. (The reason why anyone would want to make it blow up is, frankly, difficult to explain.)
The tiny server room where it is located can be assumed to be reasonably safe (physically), however security practices are not the priority for the inexperienced sysadmin. Therefore, the chance of initial compromisation is very realistic (i.e., the outside person installing the server may loosen some screws or even infect the system, and the sysadmin would never notice). Also, the never-updated system could be hacked at any time, since the server is connected to the Internet.
Whether it was from personal experience or science fiction films, I thought the processor overheating would do the job. For example, a bug in the system could suddenly cause a massive amount of computations to be performed, generating constant intense load on the processor, which would ultimately cause it to overheat (and explode...?) However, it now seems to me that more problems need to arise to lead to such an extreme outcome. Since nobody around the server room really knows or cares what is going on (as long as the server is up), and the computer scientists never visit the room themselves, the attacker has lots of opportunities.
If an explosion is really improbable, a similar dramatic incident could happen instead, e.g. the spinning fans could slip off or the box could fall to the floor or catch fire, leading to disastrous consequences and possibly destroying nearby objects in the process (which, come to think of it, could be the ones exploding subsequently). As I noted, the person setting up the server is free to prepare it for anything. | 2017/01/02 | [
"https://worldbuilding.stackexchange.com/questions/66559",
"https://worldbuilding.stackexchange.com",
"https://worldbuilding.stackexchange.com/users/31707/"
] | Not too long ago I had smoke come out of the vent on my computer. It was due to the power connector on an optical drive. It was continuing to burn the plastic, but would not “catch” to burn without the heat source.
I recall when Li-ion batteries were first appearing, an early adopter (because of the low weight to power ratio) was RC aircraft. Many did in fact end in an impressive fireball.
So, being an *early adopter* of some new technology might be key; it doesn’t have all the safety features yet, they apply the low level tech themselves rather than find an already engineered solution, and they don't appreciate the dangers. It also has the advantage that you make up something new so people don't complain that X doesn't behave that way, since you use Y which is made up.
A true explosion in the technical sense seems unlikely because the materials are not explosives. Or maybe the people combined things that were not meant to be explosive, like how airship waterproofing is what today we call *thermite*.
Furthermore, a lot of stuff simply doesn’t burn, and that's also by design. Your people might use different stuff rather than normal, not realizing that it compromises normal fire safety.
Finally, you might have an intentional self-destruct mechanism! Yea, they didn’t know that the cheap ebay drives were surplus from government contractors intended for servers on board military spy planes… | You'd be surprised how much stuff is handled in software these days. For example, one fellow [discovered](http://arstechnica.com/apple/2011/07/how-charlie-miller-discovered-the-apple-battery-hackhow-a-security-researcher-discovered-the-apple-battery-hack/) that a Macbook with a compromised kernel could actually break into the microcontroller in the battery, and reflash its firmware. (The battery was using its own off-the-shelf OS, and Apple hadn't changed the default password on the batteries it shipped.)
In any case, this software is responsible for handling charging and discharging. If I recall correctly, lithium batteries will catch fire if they're discharged too much, and then you try to re-charge them. According to [Wikipedia](https://en.wikipedia.org/wiki/Lithium-ion_battery):
>
> Discharging beyond 2 V can also result in capacity fade. The (copper) anode current collector can dissolve into the electrolyte. When charged, copper ions can reduce on the anode as metallic copper. Over time, copper dendrites can form and cause a short in the same manner as lithium.
>
>
> |
371,059 | I often see the word 'nuance' used when describing a politicians views. One example of this in a sentence is that "This person lacks nuance." I'm having trouble understanding this in the context of the main definition which is "a subtle difference in or shade of meaning, expression, or sound." Is there a separate meaning when used in this context?
Here are some other examples: <https://www.google.com/search?q=trump+nuance> | 2017/01/31 | [
"https://english.stackexchange.com/questions/371059",
"https://english.stackexchange.com",
"https://english.stackexchange.com/users/217758/"
] | Though it's not a single word and it doesn't have the meaning of "on the basis of rules," **out of hand** best fits your frame sentence, implying from the context that applicants from a particular group/class are being denied entry across the board as opposed to "case by case."
Slightly paraphrased definition from the Cambridge Dictionary online:
>
> [out of hand](http://dictionary.cambridge.org/dictionary/english/out-of-hand) - refusing something completely without thinking about or discussing it
>
>
>
And a good usage example in a legal context from a piece on *ex parte*:
>
> The truth is, when an ex parte motion is received by the clerk’s office, a staff member slides it in front of a judge, who is usually busy doing something else, such as reviewing cases, eating lunch, or getting ready to go home. While the courts are happy to issue temporary orders in truly emergent situations, the fact that such motions, often filed when there is no true need for emergency relief, are a huge inconvenience is the most likely reason so many are denied **out of hand**.[1](http://legaldictionary.net/ex-parte/)
>
>
>
So, plugging it into your frame sentence:
>
> Such people can be denied case-by-case, but not **out of hand**.
>
>
>
In other words, the people may be denied entry, but not without their individual application being considered first.
Note for non-native speakers: The phrase *out of hand* has a second meaning of "wild" or "out of control." The intended use of the phrase is normally clear from context. | **Jurisprudence ?**
**1**. The philosophy or science of law.
**2**. A division, type, or particular body of law: modern jurisprudence;
federal jurisprudence; bankruptcy jurisprudence. |
83,949 | Beside the fact that maximum parsimony is computationally cheap, what other good arguments are there for it? Is there any model behind this principle? Why would one expect this principle to provide right phylogeny in any situation at all ? | 2019/04/24 | [
"https://biology.stackexchange.com/questions/83949",
"https://biology.stackexchange.com",
"https://biology.stackexchange.com/users/17429/"
] | The idea of parsimony is that when constructing **[phylogenetic trees](https://www.khanacademy.org/science/high-school-biology/hs-evolution/hs-phylogeny/a/phylogenetic-trees)** a simple hypothesis (*e.g.*, four evolutionary changes are necessary to connect two taxa) is more likely to be true than a more complex hypothesis (*e.g.*, 15 evolutionary changes) (source: [Berkeley University](https://evolution.berkeley.edu/evolibrary/article/0_0_0/evotrees_build_07)).
The reason is that for a certain taxon to evolve, there must be a certain number of [evolutionary changes](http://nectunt.bifi.es/to-learn-more-overview/mechanisms-of-evolutionary-change/). In the end, this happens by more or less stochastic processes [(Dingli & Pacheco, 2011)](https://bmcbiol.biomedcentral.com/articles/10.1186/1741-7007-9-41) that randomly generate genetic changes (**[mutations](https://evolution.berkeley.edu/evolibrary/article/mutations_01)**). The characteristics of better fit individuals survive, while those of the least fit are terminated from the gene pool. Hence, every additional change that must be adopted to create a new taxon from another means that the chance that that happens decreases exponentially; it's all a matter of statistics. The less the number of changes needed, the higher the chance that that might have actually happened.
**Reference**
**-** [Dingli & Pacheco, *BMC Biology* (2011);**9**:41](https://bmcbiol.biomedcentral.com/articles/10.1186/1741-7007-9-41) | Generally speaking, parsimony consists in not making unnecessary [ad hoc hypotheses](https://en.wikipedia.org/wiki/Ad_hoc_hypotheses).
In the case of phylogeny, parsimony can be used at two stages: when inferring the number of character changes for a given topology and then when choosing among topologies.
One does not expect parsimony to provide the right phylogeny in any situation. It is just the most sensible we can do when no further information about evolutionary processes is available. This is why parsimony is a popular choice when it comes to deal with morphological data: models of character evolution are not as easy to devise for morphological data as for molecular data.
In the case of phylogeny based on molecular data such as protein or DNA sequences, models of evolutionary changes exist, which are not based on ad hoc hypotheses, but on reasonably good knowledge gathered from disciplines such as molecular biology, biochemistry, etc.
Under these models, "hidden" multiple character changes are expected along long enough branches. This may lead to differences with respect to the most simple parsimony criterion, when inferring the number of character changes in a topology.
In such a case, simple parsimony may not be the most sensible approach to phylogeny resconstruction. |
8,694,534 | while in graduate school for biomedical eng I developed a device we called a "vein finder". It was a simple device that was good enough for our eng school to patent.
I think it would be very very easy to use the iphone camera to develop an iphone app whereby MD's/ nurses/EMT's could use the app to easily identify peripherial veins that are not visible to the naked eye. This would be invaluable in starting IV's and giving bedside medications. The vein finder was esp helpful for patients in shock who had poor venous filling and therefore didn't have veins that "popped into view" with a tourniquet.
It would require using the iphone light at specific wavelengths... anybody have any idea if that is possible? | 2012/01/01 | [
"https://Stackoverflow.com/questions/8694534",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/1125270/"
] | I don't think you have any control over the flash light that illuminates images. You can only turn it on and off. I also doubt you would be able to get the specific wavelengths you need.
My suggestion would be to look into building a peripheral light device which plugs in to the headphone jack for power and has the necessary functions for emitting light at different wavelengths. That way, you would be able to get the exact result you require.
You may also need to look into the camera itself, as it may not have the ability to capture the light at the wavelengths you may require. Hope that Helps! | Do you mean overlaying veins over the picture on the camera? It would be easy if the veins are always in the same place... What would your imagined procedure be for using this app?
EDIT: You can not manipulate the iPhone light for different frequencies; you can only turn it on and off. You would need to get a separate external light for that. |
8,694,534 | while in graduate school for biomedical eng I developed a device we called a "vein finder". It was a simple device that was good enough for our eng school to patent.
I think it would be very very easy to use the iphone camera to develop an iphone app whereby MD's/ nurses/EMT's could use the app to easily identify peripherial veins that are not visible to the naked eye. This would be invaluable in starting IV's and giving bedside medications. The vein finder was esp helpful for patients in shock who had poor venous filling and therefore didn't have veins that "popped into view" with a tourniquet.
It would require using the iphone light at specific wavelengths... anybody have any idea if that is possible? | 2012/01/01 | [
"https://Stackoverflow.com/questions/8694534",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/1125270/"
] | Do you mean overlaying veins over the picture on the camera? It would be easy if the veins are always in the same place... What would your imagined procedure be for using this app?
EDIT: You can not manipulate the iPhone light for different frequencies; you can only turn it on and off. You would need to get a separate external light for that. | Apologies for massive necro!
The LED light of the iPhone is not the problem - most white light sources contain IR or near-IR (in fact they are made up from the entire visible spectrum). Daylight works very well too.
The problem is the receiver. Most camera lenses, including smartphones, have an IR filter - thus cutting out the useful part of the spectrum. All we need is a digital camera with IR filter removed, that has a viewfinder (where you'll see the veins). |
8,694,534 | while in graduate school for biomedical eng I developed a device we called a "vein finder". It was a simple device that was good enough for our eng school to patent.
I think it would be very very easy to use the iphone camera to develop an iphone app whereby MD's/ nurses/EMT's could use the app to easily identify peripherial veins that are not visible to the naked eye. This would be invaluable in starting IV's and giving bedside medications. The vein finder was esp helpful for patients in shock who had poor venous filling and therefore didn't have veins that "popped into view" with a tourniquet.
It would require using the iphone light at specific wavelengths... anybody have any idea if that is possible? | 2012/01/01 | [
"https://Stackoverflow.com/questions/8694534",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/1125270/"
] | I don't think you have any control over the flash light that illuminates images. You can only turn it on and off. I also doubt you would be able to get the specific wavelengths you need.
My suggestion would be to look into building a peripheral light device which plugs in to the headphone jack for power and has the necessary functions for emitting light at different wavelengths. That way, you would be able to get the exact result you require.
You may also need to look into the camera itself, as it may not have the ability to capture the light at the wavelengths you may require. Hope that Helps! | To work around the fact that you can't set the wavelength of the built in light, you should use an external light along with the iOS device. |
8,694,534 | while in graduate school for biomedical eng I developed a device we called a "vein finder". It was a simple device that was good enough for our eng school to patent.
I think it would be very very easy to use the iphone camera to develop an iphone app whereby MD's/ nurses/EMT's could use the app to easily identify peripherial veins that are not visible to the naked eye. This would be invaluable in starting IV's and giving bedside medications. The vein finder was esp helpful for patients in shock who had poor venous filling and therefore didn't have veins that "popped into view" with a tourniquet.
It would require using the iphone light at specific wavelengths... anybody have any idea if that is possible? | 2012/01/01 | [
"https://Stackoverflow.com/questions/8694534",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/1125270/"
] | I don't think you have any control over the flash light that illuminates images. You can only turn it on and off. I also doubt you would be able to get the specific wavelengths you need.
My suggestion would be to look into building a peripheral light device which plugs in to the headphone jack for power and has the necessary functions for emitting light at different wavelengths. That way, you would be able to get the exact result you require.
You may also need to look into the camera itself, as it may not have the ability to capture the light at the wavelengths you may require. Hope that Helps! | Apologies for massive necro!
The LED light of the iPhone is not the problem - most white light sources contain IR or near-IR (in fact they are made up from the entire visible spectrum). Daylight works very well too.
The problem is the receiver. Most camera lenses, including smartphones, have an IR filter - thus cutting out the useful part of the spectrum. All we need is a digital camera with IR filter removed, that has a viewfinder (where you'll see the veins). |
8,694,534 | while in graduate school for biomedical eng I developed a device we called a "vein finder". It was a simple device that was good enough for our eng school to patent.
I think it would be very very easy to use the iphone camera to develop an iphone app whereby MD's/ nurses/EMT's could use the app to easily identify peripherial veins that are not visible to the naked eye. This would be invaluable in starting IV's and giving bedside medications. The vein finder was esp helpful for patients in shock who had poor venous filling and therefore didn't have veins that "popped into view" with a tourniquet.
It would require using the iphone light at specific wavelengths... anybody have any idea if that is possible? | 2012/01/01 | [
"https://Stackoverflow.com/questions/8694534",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/1125270/"
] | To work around the fact that you can't set the wavelength of the built in light, you should use an external light along with the iOS device. | Apologies for massive necro!
The LED light of the iPhone is not the problem - most white light sources contain IR or near-IR (in fact they are made up from the entire visible spectrum). Daylight works very well too.
The problem is the receiver. Most camera lenses, including smartphones, have an IR filter - thus cutting out the useful part of the spectrum. All we need is a digital camera with IR filter removed, that has a viewfinder (where you'll see the veins). |
8,776 | I have some questions about creating an Object Repository for a selenium project:
1) What are the main reasons that we create an Object Repository, as opposed to hard coding the element IDs in our page classes?
2) What is the best approach to do this? I have seen people use an OR class with public static strings, and others create the OR class with private members with get/setters.
Your input is appreciated! | 2014/06/03 | [
"https://sqa.stackexchange.com/questions/8776",
"https://sqa.stackexchange.com",
"https://sqa.stackexchange.com/users/7266/"
] | The correct approach is to
* have the locators in each page object class as By variables or
* use page factory which declares the web elements and their locators together
In my opinion, using object repositories in Selenium projects is a bad practice.
The object repository concept comes from record-and-playback tools such as QTP.
The object repository is a tree-like structure that is created while recording a test.
It has attributes for each element of the page used in the test.
Selenium does not have any record-and-play feature for test automation (Selenium IDE is not an automation tool).
Using object repositories in Selenium projects (as property or csv or xml files) has many disadvantages such as
1. since each locator is a line in a text file, it is impossible to open the declaration of the locator in the IDE (using F3 or Open Declaration)
2. page object classes with no locator variables break the class encapsulation principle (methods of a class should execute on variables of a class)
3. object repositories do not scale well for big pages; since big pages are bad and should be broken down in small pages, should we not have object repositories for each page widget?
4. object repositories do not work with page factory
Read more about the disadvantages on this medium.com article:
<https://medium.com/@alexsiminiuc3/dont-use-object-repositories-with-selenium-webdriver-ad14096528e5> | I am not sure what is your definition of "Object Repository". I am going to assume it is some kind of central place for locators of page elements (by id, name, link text, css, or even xpath). If i am wrong, we can just kill the answer.
In few places I've seen suggesting one central file for all locators, but it can grow pretty big pretty fast. I am using pageObject design pattern, and locators seems to belong to the page, so I keep them there. I am also using Python so I mostly keep it simple. |
8,776 | I have some questions about creating an Object Repository for a selenium project:
1) What are the main reasons that we create an Object Repository, as opposed to hard coding the element IDs in our page classes?
2) What is the best approach to do this? I have seen people use an OR class with public static strings, and others create the OR class with private members with get/setters.
Your input is appreciated! | 2014/06/03 | [
"https://sqa.stackexchange.com/questions/8776",
"https://sqa.stackexchange.com",
"https://sqa.stackexchange.com/users/7266/"
] | The correct approach is to
* have the locators in each page object class as By variables or
* use page factory which declares the web elements and their locators together
In my opinion, using object repositories in Selenium projects is a bad practice.
The object repository concept comes from record-and-playback tools such as QTP.
The object repository is a tree-like structure that is created while recording a test.
It has attributes for each element of the page used in the test.
Selenium does not have any record-and-play feature for test automation (Selenium IDE is not an automation tool).
Using object repositories in Selenium projects (as property or csv or xml files) has many disadvantages such as
1. since each locator is a line in a text file, it is impossible to open the declaration of the locator in the IDE (using F3 or Open Declaration)
2. page object classes with no locator variables break the class encapsulation principle (methods of a class should execute on variables of a class)
3. object repositories do not scale well for big pages; since big pages are bad and should be broken down in small pages, should we not have object repositories for each page widget?
4. object repositories do not work with page factory
Read more about the disadvantages on this medium.com article:
<https://medium.com/@alexsiminiuc3/dont-use-object-repositories-with-selenium-webdriver-ad14096528e5> | As to how:
Define things that belong to the page at the page level, like title and url.
Then locators as a sub or extension of the page.
A webelement can have multiple locators, getting the locators out of a defined webelement is a pain (reflection only) and usually is needed when you need to wait for a webelement to appear/disappear on a page.
As to why:
In selenium it usually is referred to as an Page Factory and not so much an object repository.
If you see an object repo being created anyway it usually is because the people who created it are used to having it like that. As others have suggested prob due to usage of other automation tools. |
157,852 | My laptop came presupplied with a Vista Professional installation and no Vista installation DVD. It has now stopped booting, stuck in a cycle of failing startup repairs.
I have a Windows 7 Ultimate DVD, but when I boot from it and select the option to upgrade an existing Windows installation, it states that the upgrade should be performed from within the existing Windows installation as a live upgrade.
Without being able to load the original Vista installation, how can I perform an upgrade to Windows 7 without losing my user accounts and installed programs?
Although I back up most of my data I really need to get the upgrade working in order to sanity check that I'm not losing anything important.
Thanks in advance. | 2010/06/28 | [
"https://superuser.com/questions/157852",
"https://superuser.com",
"https://superuser.com/users/17873/"
] | Have you tried recovering your Vista installation using the Vista recovery disk? Download it [here](http://neosmart.net/blog/2008/windows-vista-recovery-disc-download/), burn it and boot from it. | You will have to repair the Vista installation to do an Upgrade to preserve your accounts and settings. Here is a link to the advanced methods of boot repair, it will require the recovery disc mentioned by BloodPhilia, or borrow a Vista Install disc from someone to repair. Or try the W7 disc you have to repair the boot issue.
<http://support.microsoft.com/kb/927392/en-us>
. |
28,632,922 | I am probably missing something basic here, but I'm playing around with the Git version of TFS.
I am using Visual Studio 2015 preview (maybe that is my problem), so from a solution I created a master and I made a branch from this master; I'll call it version2.
I made changes to version 2, but I did not commit merge sync or anything. So after messing around with version 2 I went back into Team Explorer, went to the branches tab, and double clicked main (I also tried right click switch).
I was hoping my Solution Explorer would not show the changes I made to version 2, because I had now switched to main. But that is not the case, and I am still seeing all the changes I made in version 2 in Solution Explorer. So how do I get Solution Explorer to reflect the branch I am currently working on? | 2015/02/20 | [
"https://Stackoverflow.com/questions/28632922",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/2744722/"
] | Git's model is fundamentally different than TFVC. You need to commit the file to your branch (you don't necessarily need to push the change or the branch to the remote server). Once you commit the change, switching branches will behave in the fashion you're expecting.
Git is based on the model of committing changes to local branches frequently. Even if the code doesn't yet compile, it's fine to commit it to a local branch... you can always rebase or cherry-pick later on. | By default in Git if you have pending changes that you have not committed and you switch branch the changes are moved to the new branch. Git is assuming that this is what you want.
If you want to leave the changes on v2 you need to commit the changes with that branch checkout. You can then switch to the v1 branch and see the solution change. |
102,157 | The Remorhaz (page 258 MM) has an ability called Heated Body:
>
> **Heated Body.** A creature that touches the remorhaz or hits it with a melee attack while within 5 feet of it takes 10 (3d6) fire damage.
>
>
>
How often does this damage occur, and what exactly is the scope of qualifying scenarios where this would trigger?
If another creature *A* is grappling the remorhaz, does damage only occur on creature *A*'s turn, only on the remorhaz's turn, once per round, multiple times in a round?
Also, if a creature touches the remorhaz, damage occurs, but what happens if the remorhaz touches the creature? The damage from **Heated Body** is included in the remorhaz's **Bite** attack, but not in its **Swallow** ability. Will the creature swallowed by the remorhaz take 6d6 acid damage + 3d6 fire damage (since the creature is touching the remorhaz inside of it), or only the acid damage? | 2017/06/23 | [
"https://rpg.stackexchange.com/questions/102157",
"https://rpg.stackexchange.com",
"https://rpg.stackexchange.com/users/27023/"
] | ***Rhemorhaz Trait: Heated Body*** MM Pg.258
>
> Heated Body: A creature that touches the remorhaz or hits it with a
> melee Attack while within 5 feet of it takes 10 (3d6) fire damage.
>
>
>
***Special Traits*** MM pg.11
>
> Special traits (which appear after a monster’s challenge rating but
> before any actions or reactions) are characteristics that are likely
> to be relevant in a Combat encounter and that require some
> explanation.
>
>
>
If you notice, the MM states that a *special trait* is listed before *actions and reactions*, seperating it from the two - it is neither considered an action nor a reaction. This means that ***every melee attack connected with the creature would trigger this effect***. So, a fighter with multiattack would trigger the counter damage upon each attack, so long as it is a *melee attack*.
As far as the second part of your question, every time something touches the creature, it would also trigger the effect. So, a grappler who unknowingly grabs hold of this creature would suffer the damage of its ability, however, the grappler would take the damage ***once***, as it has only *touched the creature once*.
Whether or not the Rhemorhaz Heated Body trait would affect creatures ***it touches or attacks*** would probably come down to ***RAI*** (Rules As Intended). The developers more than likely intended for this to *only act as a counter ability*, meaning that any attacks it makes on another creature ***would not trigger the Heated Body trait***, as its attacks have several additional effects of their own. So, the unfortunate victims of the Rhemoraz's swallow attack would merely suffer the 6d6 acid damage, while still painful, it would not be so harsh as another 3d6 fire damage.
Hopefully this clears up your question. | In general, within any area effect and persistent damage, you suffer the damage once per round. Meanwhile, with any touch or contact based attack form, such as a monk touching a lava monster or a fencing bard stabbing a lightning creature, the opportunity to suffer damage is proportionate to the number of attacks.
if you suffer damage by approaching the creature, then the damage is per round, if you suffer damage by contacting the creature, then the damage is per attack. The creature description is listed as damage per attack, not damage per round. Treat it as *briefly* touching an electric fence.
With regard to the swallowed creature, the damage listed can be used without adding more damage, using the electricity analogy again, treat the swallowed creature as if grounded/in a Faraday cage, so unless the text explicitly lists the swallow/acid damage as adding additional heat damage, don't. |
2,952,353 | Can anyone please help me?
I am having bunch of .sql files. I want to parse (validate) those files before executing them on server.
I have many online sites which parse the code. But I want to parse the code using C#.
So please can you guide. If there is any tool, dll I need to use.
I just want to parse the file and not execute it | 2010/06/01 | [
"https://Stackoverflow.com/questions/2952353",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/317255/"
] | You can have procedure which can get the query as input and
in SQL Server side you can have a [SET PARSEONLY ON](http://msdn.microsoft.com/en-us/library/ms178629.aspx) statement and then "run" the
query. The query won't actually run, but any errors will be reported. | You should ask yourself twice (or maybe even three times :-)) if you really want to do this.
Even if you find a solution, that seems to work for the files you have now, there will probably be all sorts of corner cases that wont be covered. The suggestion of having a local database engine parse it, is sort-of workable, but there can still be many small syntax differences between what you do locally and what happens on the server.
My advice is to let the server parse and validate it - it's basically the only way to be really sure. |
2,952,353 | Can anyone please help me?
I am having bunch of .sql files. I want to parse (validate) those files before executing them on server.
I have many online sites which parse the code. But I want to parse the code using C#.
So please can you guide. If there is any tool, dll I need to use.
I just want to parse the file and not execute it | 2010/06/01 | [
"https://Stackoverflow.com/questions/2952353",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/317255/"
] | The [DMS Software Reengineering Toolkit](http://www.semanticdesigns.com/Products/DMS/DMSToolkit.html) has SQL parsers, used to build many SQL-based tools.
One such tool is a [Formatter](http://www.semanticdesigns.com/Products/Formatters)Formatter, which parses the source text and formats the result nicely. If the formatter fails to parse the source, it produces a nonzero process status.
You could simply "format" a file; if the formatting fails, it isn't legal syntax.
These formatters are commercial products.
EDIT Aug 2011: DMS SQL parser now handles full SQL 2011 standard grammar. | A quick google threw up <http://www.antlr.org/> with a [plugin for ms sql](http://www.antlr.org/grammar/1062280680642/MS_SQL_SELECT.html) or one of the [other sql dialects](http://www.antlr.org/grammar/list) |
2,952,353 | Can anyone please help me?
I am having bunch of .sql files. I want to parse (validate) those files before executing them on server.
I have many online sites which parse the code. But I want to parse the code using C#.
So please can you guide. If there is any tool, dll I need to use.
I just want to parse the file and not execute it | 2010/06/01 | [
"https://Stackoverflow.com/questions/2952353",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/317255/"
] | A way to do it is to execute it on the server, except with [SET PARSEONLY ON](http://msdn.microsoft.com/en-us/library/ms178629.aspx) (so that it's parsed but not executed): I think that's how the MS Query Analyzer does it. | A quick google threw up <http://www.antlr.org/> with a [plugin for ms sql](http://www.antlr.org/grammar/1062280680642/MS_SQL_SELECT.html) or one of the [other sql dialects](http://www.antlr.org/grammar/list) |
2,952,353 | Can anyone please help me?
I am having bunch of .sql files. I want to parse (validate) those files before executing them on server.
I have many online sites which parse the code. But I want to parse the code using C#.
So please can you guide. If there is any tool, dll I need to use.
I just want to parse the file and not execute it | 2010/06/01 | [
"https://Stackoverflow.com/questions/2952353",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/317255/"
] | You should ask yourself twice (or maybe even three times :-)) if you really want to do this.
Even if you find a solution, that seems to work for the files you have now, there will probably be all sorts of corner cases that wont be covered. The suggestion of having a local database engine parse it, is sort-of workable, but there can still be many small syntax differences between what you do locally and what happens on the server.
My advice is to let the server parse and validate it - it's basically the only way to be really sure. | A quick google threw up <http://www.antlr.org/> with a [plugin for ms sql](http://www.antlr.org/grammar/1062280680642/MS_SQL_SELECT.html) or one of the [other sql dialects](http://www.antlr.org/grammar/list) |
2,952,353 | Can anyone please help me?
I am having bunch of .sql files. I want to parse (validate) those files before executing them on server.
I have many online sites which parse the code. But I want to parse the code using C#.
So please can you guide. If there is any tool, dll I need to use.
I just want to parse the file and not execute it | 2010/06/01 | [
"https://Stackoverflow.com/questions/2952353",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/317255/"
] | A way to do it is to execute it on the server, except with [SET PARSEONLY ON](http://msdn.microsoft.com/en-us/library/ms178629.aspx) (so that it's parsed but not executed): I think that's how the MS Query Analyzer does it. | You should ask yourself twice (or maybe even three times :-)) if you really want to do this.
Even if you find a solution, that seems to work for the files you have now, there will probably be all sorts of corner cases that wont be covered. The suggestion of having a local database engine parse it, is sort-of workable, but there can still be many small syntax differences between what you do locally and what happens on the server.
My advice is to let the server parse and validate it - it's basically the only way to be really sure. |
2,952,353 | Can anyone please help me?
I am having bunch of .sql files. I want to parse (validate) those files before executing them on server.
I have many online sites which parse the code. But I want to parse the code using C#.
So please can you guide. If there is any tool, dll I need to use.
I just want to parse the file and not execute it | 2010/06/01 | [
"https://Stackoverflow.com/questions/2952353",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/317255/"
] | You can have procedure which can get the query as input and
in SQL Server side you can have a [SET PARSEONLY ON](http://msdn.microsoft.com/en-us/library/ms178629.aspx) statement and then "run" the
query. The query won't actually run, but any errors will be reported. | The [DMS Software Reengineering Toolkit](http://www.semanticdesigns.com/Products/DMS/DMSToolkit.html) has SQL parsers, used to build many SQL-based tools.
One such tool is a [Formatter](http://www.semanticdesigns.com/Products/Formatters)Formatter, which parses the source text and formats the result nicely. If the formatter fails to parse the source, it produces a nonzero process status.
You could simply "format" a file; if the formatting fails, it isn't legal syntax.
These formatters are commercial products.
EDIT Aug 2011: DMS SQL parser now handles full SQL 2011 standard grammar. |
2,952,353 | Can anyone please help me?
I am having bunch of .sql files. I want to parse (validate) those files before executing them on server.
I have many online sites which parse the code. But I want to parse the code using C#.
So please can you guide. If there is any tool, dll I need to use.
I just want to parse the file and not execute it | 2010/06/01 | [
"https://Stackoverflow.com/questions/2952353",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/317255/"
] | [Antler Parser Generator](http://www.antlr.org/) is your best bet. There might be a pre-defined grammar for the version of SQL you want to parse already. | A quick google threw up <http://www.antlr.org/> with a [plugin for ms sql](http://www.antlr.org/grammar/1062280680642/MS_SQL_SELECT.html) or one of the [other sql dialects](http://www.antlr.org/grammar/list) |
2,952,353 | Can anyone please help me?
I am having bunch of .sql files. I want to parse (validate) those files before executing them on server.
I have many online sites which parse the code. But I want to parse the code using C#.
So please can you guide. If there is any tool, dll I need to use.
I just want to parse the file and not execute it | 2010/06/01 | [
"https://Stackoverflow.com/questions/2952353",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/317255/"
] | [Antler Parser Generator](http://www.antlr.org/) is your best bet. There might be a pre-defined grammar for the version of SQL you want to parse already. | Visual Studio used to have something called Visual Studio for Database Professionals. It was later rolled into Team Developer.
Anyway, they "compiled" the sql code by executing it in a database and testing the results. I imagine if that's how they were verifying it worked, it's probably the best way for you to do as well. |
2,952,353 | Can anyone please help me?
I am having bunch of .sql files. I want to parse (validate) those files before executing them on server.
I have many online sites which parse the code. But I want to parse the code using C#.
So please can you guide. If there is any tool, dll I need to use.
I just want to parse the file and not execute it | 2010/06/01 | [
"https://Stackoverflow.com/questions/2952353",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/317255/"
] | You can have procedure which can get the query as input and
in SQL Server side you can have a [SET PARSEONLY ON](http://msdn.microsoft.com/en-us/library/ms178629.aspx) statement and then "run" the
query. The query won't actually run, but any errors will be reported. | A quick google threw up <http://www.antlr.org/> with a [plugin for ms sql](http://www.antlr.org/grammar/1062280680642/MS_SQL_SELECT.html) or one of the [other sql dialects](http://www.antlr.org/grammar/list) |
2,952,353 | Can anyone please help me?
I am having bunch of .sql files. I want to parse (validate) those files before executing them on server.
I have many online sites which parse the code. But I want to parse the code using C#.
So please can you guide. If there is any tool, dll I need to use.
I just want to parse the file and not execute it | 2010/06/01 | [
"https://Stackoverflow.com/questions/2952353",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/317255/"
] | You can have procedure which can get the query as input and
in SQL Server side you can have a [SET PARSEONLY ON](http://msdn.microsoft.com/en-us/library/ms178629.aspx) statement and then "run" the
query. The query won't actually run, but any errors will be reported. | Visual Studio used to have something called Visual Studio for Database Professionals. It was later rolled into Team Developer.
Anyway, they "compiled" the sql code by executing it in a database and testing the results. I imagine if that's how they were verifying it worked, it's probably the best way for you to do as well. |
1,533,276 | I have a instance of Oracle Access Manager set up on Server A and a copy of WebGate set up on Apache on Server B which should be working but isn't. When I try to access http(s)://hostname:port/access/oblix/apps/ webgate/bin/webgate.cgi?progid=1 as specified in the [directions](http://download.oracle.com/docs/cd/B28196_01/idmanage.1014/b25353/webgate.htm) after everything is set up, I get a web page that says:
>
> No Response from Application Web Server
>
>
> There was no response from the application web server for the page you requested.
> Please notify the site's webmaster and try your request again later.
>
>
>
I get the same error message when accessing other pages which are set up to be protected by WebGate with LocationMatch in Apache's httpd.conf.
Also, I'm not getting any output in webgate/access/oblix/logs/oblog.log even though webgate/access/oblix/conf/oblog\_config\_wg.xml has the log level set to LOGLEVEL\_TRACE.
Does anyone have thoughts on what config files to check that could be causing this problem?
Edit 1: I've found that when I access a page protected by WebGate, the Apache error\_log has this:
>
> [Thu Oct 8 09:44:23 2009] [notice] child pid 4970 exit signal Segmentation fault (11)
>
>
>
Edit 2: Also, for some reason, pages which are to be protected by WebGate don't trigger an update to Apache's access\_log, even though they do return that error message. | 2009/10/07 | [
"https://Stackoverflow.com/questions/1533276",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/466/"
] | Ah the joy of the webgate install. Here are the usual questions I ask myself:
Does the apache user also own the directory where webgate is installed?
Are you running this on an OS and Apache version verified by Oracle?
Is your httpd.conf correctly setup with the WebGate configs?
Did you put
LD\_ASSUME\_KERNEL=2.4.19
export LD\_ASSUME\_KERNEL
in your init.d/httpd file?
Are you clocks in sync between the Access server and the apache host? | Reinstalling Webgate fixed the problem. Not sure what screwed it up. |
1,533,276 | I have a instance of Oracle Access Manager set up on Server A and a copy of WebGate set up on Apache on Server B which should be working but isn't. When I try to access http(s)://hostname:port/access/oblix/apps/ webgate/bin/webgate.cgi?progid=1 as specified in the [directions](http://download.oracle.com/docs/cd/B28196_01/idmanage.1014/b25353/webgate.htm) after everything is set up, I get a web page that says:
>
> No Response from Application Web Server
>
>
> There was no response from the application web server for the page you requested.
> Please notify the site's webmaster and try your request again later.
>
>
>
I get the same error message when accessing other pages which are set up to be protected by WebGate with LocationMatch in Apache's httpd.conf.
Also, I'm not getting any output in webgate/access/oblix/logs/oblog.log even though webgate/access/oblix/conf/oblog\_config\_wg.xml has the log level set to LOGLEVEL\_TRACE.
Does anyone have thoughts on what config files to check that could be causing this problem?
Edit 1: I've found that when I access a page protected by WebGate, the Apache error\_log has this:
>
> [Thu Oct 8 09:44:23 2009] [notice] child pid 4970 exit signal Segmentation fault (11)
>
>
>
Edit 2: Also, for some reason, pages which are to be protected by WebGate don't trigger an update to Apache's access\_log, even though they do return that error message. | 2009/10/07 | [
"https://Stackoverflow.com/questions/1533276",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/466/"
] | Ah the joy of the webgate install. Here are the usual questions I ask myself:
Does the apache user also own the directory where webgate is installed?
Are you running this on an OS and Apache version verified by Oracle?
Is your httpd.conf correctly setup with the WebGate configs?
Did you put
LD\_ASSUME\_KERNEL=2.4.19
export LD\_ASSUME\_KERNEL
in your init.d/httpd file?
Are you clocks in sync between the Access server and the apache host? | i got
>
> [2014-03-27T04:41:51.2101+05:30] [OHS] [NOTIFICATION:16] [OHS-9999] [core.c] [pid: 14931] [tid: 139749613860672] [user: root] [VirtualHost: main] child pid 14952 exit signal Segmentation fault (11)
>
>
>
along with
>
> Directory does not exist for read/write [.../oracle/middleware/Oracle\_WT1/log] []
>
>
>
in OHS\_HOME/network/log/sqlnet.log
After changing file permission of OHS directory appropriately. This issue got resolved for me. |
1,533,276 | I have a instance of Oracle Access Manager set up on Server A and a copy of WebGate set up on Apache on Server B which should be working but isn't. When I try to access http(s)://hostname:port/access/oblix/apps/ webgate/bin/webgate.cgi?progid=1 as specified in the [directions](http://download.oracle.com/docs/cd/B28196_01/idmanage.1014/b25353/webgate.htm) after everything is set up, I get a web page that says:
>
> No Response from Application Web Server
>
>
> There was no response from the application web server for the page you requested.
> Please notify the site's webmaster and try your request again later.
>
>
>
I get the same error message when accessing other pages which are set up to be protected by WebGate with LocationMatch in Apache's httpd.conf.
Also, I'm not getting any output in webgate/access/oblix/logs/oblog.log even though webgate/access/oblix/conf/oblog\_config\_wg.xml has the log level set to LOGLEVEL\_TRACE.
Does anyone have thoughts on what config files to check that could be causing this problem?
Edit 1: I've found that when I access a page protected by WebGate, the Apache error\_log has this:
>
> [Thu Oct 8 09:44:23 2009] [notice] child pid 4970 exit signal Segmentation fault (11)
>
>
>
Edit 2: Also, for some reason, pages which are to be protected by WebGate don't trigger an update to Apache's access\_log, even though they do return that error message. | 2009/10/07 | [
"https://Stackoverflow.com/questions/1533276",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/466/"
] | Reinstalling Webgate fixed the problem. Not sure what screwed it up. | i got
>
> [2014-03-27T04:41:51.2101+05:30] [OHS] [NOTIFICATION:16] [OHS-9999] [core.c] [pid: 14931] [tid: 139749613860672] [user: root] [VirtualHost: main] child pid 14952 exit signal Segmentation fault (11)
>
>
>
along with
>
> Directory does not exist for read/write [.../oracle/middleware/Oracle\_WT1/log] []
>
>
>
in OHS\_HOME/network/log/sqlnet.log
After changing file permission of OHS directory appropriately. This issue got resolved for me. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.