qid
int64
1
74.7M
question
stringlengths
12
33.8k
date
stringlengths
10
10
metadata
list
response_j
stringlengths
0
115k
response_k
stringlengths
2
98.3k
249,225
I just wrote the word “chatter”, but then, googling it, I found no definition in the direction of “one who participates in a computer based chat”. Can the role of such a person be called a “chatter”? If not, then what? Example usage: > > With a Turing test anything that would place the computer at even more of a disadvantage than it already is, is strictly forbidden. Hence the text only chat communication with the skeptics/critics/judges (whatever). One doesn’t want an observant skeptic noting, say, that one **chatter** is metallic with a lot of electric wires, while the other one looks and sounds very much like a human female, has a glass of water at her side, and even wears a nice perfume. > > >
2015/05/29
[ "https://english.stackexchange.com/questions/249225", "https://english.stackexchange.com", "https://english.stackexchange.com/users/123351/" ]
I think that a common definition is: > > * ***chat member*** > > > From *The Internet Encyclopedia*: > > * This type of implementation tends to be significantly slower at distributing messages to [chat members](https://books.google.it/books?id=ACfBmYiNaTcC&pg=PA667&dq=%22chat%20members%22&hl=it&sa=X&ei=QfVnVf6mMqLC7gbO2IDwDA&ved=0CEwQ6AEwBA#v=onepage&q=%22chat%20members%22&f=false). > > > From *Writing and Digital Media* > > * IC contributions are usually sent to the server for distribution to the other [chat members](https://books.google.it/books?id=mUr0AgAAQBAJ&pg=PA66&dq=%22chat%20members%22&hl=it&sa=X&ei=QfVnVf6mMqLC7gbO2IDwDA&ved=0CFsQ6AEwBg#v=onepage&q=%22chat%20members%22&f=false) only when the writer presses the RETURN key to dispatch what is usually a line of text, though in some systems like Hotline the limit may be as much as ... > > > From www.computerworld.com: > > * Anonymous [member](http://www.computerworld.com/article/2492516/cybercrime-hacking/anonymous-member-arrested-during-online-chat-after-threat-against-fbi.html) > arrested during online chat after threat against FBI > > >
Since you've already used "person" and "participant" in the question itself, you're obviously looking for more specific terms. *Chatter* in the sense of "one who chats" is not defined in any dictionary I have found. As already mentioned, an ***interlocutor*** is "a person who takes part in a conversation or dialogue." This is accurate, but it's a five-syllable mouthful. "Conversationalist" and "dialogist" are equally accurate but cumbersome. "Talker" and "Speaker" are only two syllables each, but the idea of chatting back and forth is lost. To discover or create a more specific term for “one who participates in a computer based chat” it may be helpful to specifically define "computer based chat" or give it a richer context. ***Services*** such as AIM, Skype, Facebook Chat and Hangouts havse *uers*. ***Chat rooms*** and ***forums***, usually classify their users as *moderators*, *members*, and *guests*, indicating role permissions in the environment. ***Meetings*** (online or otherwise) typically have one or more *hosts*, *presenters*,*speakers*, *participants*, *attendees*, *listeners*, or *observers*. Similarly, a ***talk show*** usually has a *host*, *staff*, *guests*, and an *audience*. So many terms, but none of them unambiguously referring to *chat users*. I'm not sure there is a one-word solution without supporting context.
249,225
I just wrote the word “chatter”, but then, googling it, I found no definition in the direction of “one who participates in a computer based chat”. Can the role of such a person be called a “chatter”? If not, then what? Example usage: > > With a Turing test anything that would place the computer at even more of a disadvantage than it already is, is strictly forbidden. Hence the text only chat communication with the skeptics/critics/judges (whatever). One doesn’t want an observant skeptic noting, say, that one **chatter** is metallic with a lot of electric wires, while the other one looks and sounds very much like a human female, has a glass of water at her side, and even wears a nice perfume. > > >
2015/05/29
[ "https://english.stackexchange.com/questions/249225", "https://english.stackexchange.com", "https://english.stackexchange.com/users/123351/" ]
The old school way is to refer to them as "**chat users**" or "chat room users" > > Google provides the proof > > > "chat user" 411,000 results > > "chat member" 235,000 results > > > "Please follow the rules when communicating with other chat room users." If you google users with "chat room" , you will find 7,000,000 results. The first results will show popular companies referring to "chat room users" on their websites.
Since you've already used "person" and "participant" in the question itself, you're obviously looking for more specific terms. *Chatter* in the sense of "one who chats" is not defined in any dictionary I have found. As already mentioned, an ***interlocutor*** is "a person who takes part in a conversation or dialogue." This is accurate, but it's a five-syllable mouthful. "Conversationalist" and "dialogist" are equally accurate but cumbersome. "Talker" and "Speaker" are only two syllables each, but the idea of chatting back and forth is lost. To discover or create a more specific term for “one who participates in a computer based chat” it may be helpful to specifically define "computer based chat" or give it a richer context. ***Services*** such as AIM, Skype, Facebook Chat and Hangouts havse *uers*. ***Chat rooms*** and ***forums***, usually classify their users as *moderators*, *members*, and *guests*, indicating role permissions in the environment. ***Meetings*** (online or otherwise) typically have one or more *hosts*, *presenters*,*speakers*, *participants*, *attendees*, *listeners*, or *observers*. Similarly, a ***talk show*** usually has a *host*, *staff*, *guests*, and an *audience*. So many terms, but none of them unambiguously referring to *chat users*. I'm not sure there is a one-word solution without supporting context.
249,225
I just wrote the word “chatter”, but then, googling it, I found no definition in the direction of “one who participates in a computer based chat”. Can the role of such a person be called a “chatter”? If not, then what? Example usage: > > With a Turing test anything that would place the computer at even more of a disadvantage than it already is, is strictly forbidden. Hence the text only chat communication with the skeptics/critics/judges (whatever). One doesn’t want an observant skeptic noting, say, that one **chatter** is metallic with a lot of electric wires, while the other one looks and sounds very much like a human female, has a glass of water at her side, and even wears a nice perfume. > > >
2015/05/29
[ "https://english.stackexchange.com/questions/249225", "https://english.stackexchange.com", "https://english.stackexchange.com/users/123351/" ]
My take is the proper and correct word is *chatter*, and that any ambiguity created by other, parallel, meanings of that word will be resolved by context, just like everything else. Having said that, if you're really in need of an alternative, you may consider ***interlocutor***. From [Collins](http://www.collinsdictionary.com/dictionary/english/interlocutor): > > ***interlocutor***: a person who takes part in a conversation. > > > And again from [Wikipedia](http://en.m.wikipedia.org/wiki/Interlocutor_(linguistics)): > > In linguistics, discourse analysis, and related fields **an *interlocutor* is a person involved in a conversation or dialogue**. > > > **Edit**: Just noticed @DavidPugh [previously suggested this in the comments under the question](https://english.stackexchange.com/questions/249225/what-is-a-person-who-participates-in-computer-network-chatting-called#comment541514_249225). Credit where it's due!
Other answers cover the most appropriate terms, but I'd like to add one more option: Since your question seeks to describe participants in a Turing test, you might call these participants *test candidates*, or just *candidates* (in other words, they are "competing" for candidacy of the status of "most humanlike" in the eyes of the test administrators).
249,225
I just wrote the word “chatter”, but then, googling it, I found no definition in the direction of “one who participates in a computer based chat”. Can the role of such a person be called a “chatter”? If not, then what? Example usage: > > With a Turing test anything that would place the computer at even more of a disadvantage than it already is, is strictly forbidden. Hence the text only chat communication with the skeptics/critics/judges (whatever). One doesn’t want an observant skeptic noting, say, that one **chatter** is metallic with a lot of electric wires, while the other one looks and sounds very much like a human female, has a glass of water at her side, and even wears a nice perfume. > > >
2015/05/29
[ "https://english.stackexchange.com/questions/249225", "https://english.stackexchange.com", "https://english.stackexchange.com/users/123351/" ]
In common sense 'chat users' is the way to go - going vice versa , few foreign languages I know all use a local analog of it . In the Turing test case though, as it is more of an experiment I'd say 'participant' .
I think that a common definition is: > > * ***chat member*** > > > From *The Internet Encyclopedia*: > > * This type of implementation tends to be significantly slower at distributing messages to [chat members](https://books.google.it/books?id=ACfBmYiNaTcC&pg=PA667&dq=%22chat%20members%22&hl=it&sa=X&ei=QfVnVf6mMqLC7gbO2IDwDA&ved=0CEwQ6AEwBA#v=onepage&q=%22chat%20members%22&f=false). > > > From *Writing and Digital Media* > > * IC contributions are usually sent to the server for distribution to the other [chat members](https://books.google.it/books?id=mUr0AgAAQBAJ&pg=PA66&dq=%22chat%20members%22&hl=it&sa=X&ei=QfVnVf6mMqLC7gbO2IDwDA&ved=0CFsQ6AEwBg#v=onepage&q=%22chat%20members%22&f=false) only when the writer presses the RETURN key to dispatch what is usually a line of text, though in some systems like Hotline the limit may be as much as ... > > > From www.computerworld.com: > > * Anonymous [member](http://www.computerworld.com/article/2492516/cybercrime-hacking/anonymous-member-arrested-during-online-chat-after-threat-against-fbi.html) > arrested during online chat after threat against FBI > > >
249,225
I just wrote the word “chatter”, but then, googling it, I found no definition in the direction of “one who participates in a computer based chat”. Can the role of such a person be called a “chatter”? If not, then what? Example usage: > > With a Turing test anything that would place the computer at even more of a disadvantage than it already is, is strictly forbidden. Hence the text only chat communication with the skeptics/critics/judges (whatever). One doesn’t want an observant skeptic noting, say, that one **chatter** is metallic with a lot of electric wires, while the other one looks and sounds very much like a human female, has a glass of water at her side, and even wears a nice perfume. > > >
2015/05/29
[ "https://english.stackexchange.com/questions/249225", "https://english.stackexchange.com", "https://english.stackexchange.com/users/123351/" ]
The old school way is to refer to them as "**chat users**" or "chat room users" > > Google provides the proof > > > "chat user" 411,000 results > > "chat member" 235,000 results > > > "Please follow the rules when communicating with other chat room users." If you google users with "chat room" , you will find 7,000,000 results. The first results will show popular companies referring to "chat room users" on their websites.
Other answers cover the most appropriate terms, but I'd like to add one more option: Since your question seeks to describe participants in a Turing test, you might call these participants *test candidates*, or just *candidates* (in other words, they are "competing" for candidacy of the status of "most humanlike" in the eyes of the test administrators).
249,225
I just wrote the word “chatter”, but then, googling it, I found no definition in the direction of “one who participates in a computer based chat”. Can the role of such a person be called a “chatter”? If not, then what? Example usage: > > With a Turing test anything that would place the computer at even more of a disadvantage than it already is, is strictly forbidden. Hence the text only chat communication with the skeptics/critics/judges (whatever). One doesn’t want an observant skeptic noting, say, that one **chatter** is metallic with a lot of electric wires, while the other one looks and sounds very much like a human female, has a glass of water at her side, and even wears a nice perfume. > > >
2015/05/29
[ "https://english.stackexchange.com/questions/249225", "https://english.stackexchange.com", "https://english.stackexchange.com/users/123351/" ]
My take is the proper and correct word is *chatter*, and that any ambiguity created by other, parallel, meanings of that word will be resolved by context, just like everything else. Having said that, if you're really in need of an alternative, you may consider ***interlocutor***. From [Collins](http://www.collinsdictionary.com/dictionary/english/interlocutor): > > ***interlocutor***: a person who takes part in a conversation. > > > And again from [Wikipedia](http://en.m.wikipedia.org/wiki/Interlocutor_(linguistics)): > > In linguistics, discourse analysis, and related fields **an *interlocutor* is a person involved in a conversation or dialogue**. > > > **Edit**: Just noticed @DavidPugh [previously suggested this in the comments under the question](https://english.stackexchange.com/questions/249225/what-is-a-person-who-participates-in-computer-network-chatting-called#comment541514_249225). Credit where it's due!
On IRC, one of the oldest chat networks, participants in a chat were simply called : "user".
249,225
I just wrote the word “chatter”, but then, googling it, I found no definition in the direction of “one who participates in a computer based chat”. Can the role of such a person be called a “chatter”? If not, then what? Example usage: > > With a Turing test anything that would place the computer at even more of a disadvantage than it already is, is strictly forbidden. Hence the text only chat communication with the skeptics/critics/judges (whatever). One doesn’t want an observant skeptic noting, say, that one **chatter** is metallic with a lot of electric wires, while the other one looks and sounds very much like a human female, has a glass of water at her side, and even wears a nice perfume. > > >
2015/05/29
[ "https://english.stackexchange.com/questions/249225", "https://english.stackexchange.com", "https://english.stackexchange.com/users/123351/" ]
My take is the proper and correct word is *chatter*, and that any ambiguity created by other, parallel, meanings of that word will be resolved by context, just like everything else. Having said that, if you're really in need of an alternative, you may consider ***interlocutor***. From [Collins](http://www.collinsdictionary.com/dictionary/english/interlocutor): > > ***interlocutor***: a person who takes part in a conversation. > > > And again from [Wikipedia](http://en.m.wikipedia.org/wiki/Interlocutor_(linguistics)): > > In linguistics, discourse analysis, and related fields **an *interlocutor* is a person involved in a conversation or dialogue**. > > > **Edit**: Just noticed @DavidPugh [previously suggested this in the comments under the question](https://english.stackexchange.com/questions/249225/what-is-a-person-who-participates-in-computer-network-chatting-called#comment541514_249225). Credit where it's due!
Since you've already used "person" and "participant" in the question itself, you're obviously looking for more specific terms. *Chatter* in the sense of "one who chats" is not defined in any dictionary I have found. As already mentioned, an ***interlocutor*** is "a person who takes part in a conversation or dialogue." This is accurate, but it's a five-syllable mouthful. "Conversationalist" and "dialogist" are equally accurate but cumbersome. "Talker" and "Speaker" are only two syllables each, but the idea of chatting back and forth is lost. To discover or create a more specific term for “one who participates in a computer based chat” it may be helpful to specifically define "computer based chat" or give it a richer context. ***Services*** such as AIM, Skype, Facebook Chat and Hangouts havse *uers*. ***Chat rooms*** and ***forums***, usually classify their users as *moderators*, *members*, and *guests*, indicating role permissions in the environment. ***Meetings*** (online or otherwise) typically have one or more *hosts*, *presenters*,*speakers*, *participants*, *attendees*, *listeners*, or *observers*. Similarly, a ***talk show*** usually has a *host*, *staff*, *guests*, and an *audience*. So many terms, but none of them unambiguously referring to *chat users*. I'm not sure there is a one-word solution without supporting context.
249,225
I just wrote the word “chatter”, but then, googling it, I found no definition in the direction of “one who participates in a computer based chat”. Can the role of such a person be called a “chatter”? If not, then what? Example usage: > > With a Turing test anything that would place the computer at even more of a disadvantage than it already is, is strictly forbidden. Hence the text only chat communication with the skeptics/critics/judges (whatever). One doesn’t want an observant skeptic noting, say, that one **chatter** is metallic with a lot of electric wires, while the other one looks and sounds very much like a human female, has a glass of water at her side, and even wears a nice perfume. > > >
2015/05/29
[ "https://english.stackexchange.com/questions/249225", "https://english.stackexchange.com", "https://english.stackexchange.com/users/123351/" ]
The old school way is to refer to them as "**chat users**" or "chat room users" > > Google provides the proof > > > "chat user" 411,000 results > > "chat member" 235,000 results > > > "Please follow the rules when communicating with other chat room users." If you google users with "chat room" , you will find 7,000,000 results. The first results will show popular companies referring to "chat room users" on their websites.
"mudders" or "spods" A mid-80's technology that is the ancestor to both modern MMORPGs and to what we know as internet chat today was the old Telnet client "multiple user dungeons" or "multiple user domains", called MUDs. Users were called "mudders", and chat-only MUDs with game elements removed, known as "talkers", had users called "spods" <http://en.wiktionary.org/wiki/spod> spod (plural spods) 1.(Internet) one who uses talkers <http://en.wiktionary.org/wiki/talker> talker (plural talkers) ... 5.(Internet) A stripped-down version of a MUD which is designed for talking, that predates instant messengers; a kind of early chat room.
249,225
I just wrote the word “chatter”, but then, googling it, I found no definition in the direction of “one who participates in a computer based chat”. Can the role of such a person be called a “chatter”? If not, then what? Example usage: > > With a Turing test anything that would place the computer at even more of a disadvantage than it already is, is strictly forbidden. Hence the text only chat communication with the skeptics/critics/judges (whatever). One doesn’t want an observant skeptic noting, say, that one **chatter** is metallic with a lot of electric wires, while the other one looks and sounds very much like a human female, has a glass of water at her side, and even wears a nice perfume. > > >
2015/05/29
[ "https://english.stackexchange.com/questions/249225", "https://english.stackexchange.com", "https://english.stackexchange.com/users/123351/" ]
In common sense 'chat users' is the way to go - going vice versa , few foreign languages I know all use a local analog of it . In the Turing test case though, as it is more of an experiment I'd say 'participant' .
"mudders" or "spods" A mid-80's technology that is the ancestor to both modern MMORPGs and to what we know as internet chat today was the old Telnet client "multiple user dungeons" or "multiple user domains", called MUDs. Users were called "mudders", and chat-only MUDs with game elements removed, known as "talkers", had users called "spods" <http://en.wiktionary.org/wiki/spod> spod (plural spods) 1.(Internet) one who uses talkers <http://en.wiktionary.org/wiki/talker> talker (plural talkers) ... 5.(Internet) A stripped-down version of a MUD which is designed for talking, that predates instant messengers; a kind of early chat room.
249,225
I just wrote the word “chatter”, but then, googling it, I found no definition in the direction of “one who participates in a computer based chat”. Can the role of such a person be called a “chatter”? If not, then what? Example usage: > > With a Turing test anything that would place the computer at even more of a disadvantage than it already is, is strictly forbidden. Hence the text only chat communication with the skeptics/critics/judges (whatever). One doesn’t want an observant skeptic noting, say, that one **chatter** is metallic with a lot of electric wires, while the other one looks and sounds very much like a human female, has a glass of water at her side, and even wears a nice perfume. > > >
2015/05/29
[ "https://english.stackexchange.com/questions/249225", "https://english.stackexchange.com", "https://english.stackexchange.com/users/123351/" ]
In common sense 'chat users' is the way to go - going vice versa , few foreign languages I know all use a local analog of it . In the Turing test case though, as it is more of an experiment I'd say 'participant' .
Other answers cover the most appropriate terms, but I'd like to add one more option: Since your question seeks to describe participants in a Turing test, you might call these participants *test candidates*, or just *candidates* (in other words, they are "competing" for candidacy of the status of "most humanlike" in the eyes of the test administrators).
542,926
Reading a popular science book that is pretty accurate and in depth, but stumbled upon this line (translated): > > The variation, that the CMB pattern reveals amounts to less than one hundredth of a percent. > > > I can’t figure out what that’s supposed to mean. What’s the reference magnitude here? Can’t be absolute temperature, that would be nonsensical. Can’t be referring to rms variance or anisotropy either, that’s completely different values. Any idea? Or is it just badly worded?
2020/04/10
[ "https://physics.stackexchange.com/questions/542926", "https://physics.stackexchange.com", "https://physics.stackexchange.com/users/164350/" ]
It means that the maximum amplitude of relative variations in the absolute temperature seen in different patches of the sky is about 1 part in ten thousand. This is frequently plotted in terms (roughly) of the square of the temperature fluctuations versus the angular scale of those fluctuations (see below). [![CMB power spectrum](https://i.stack.imgur.com/M4DRn.jpg)](https://i.stack.imgur.com/M4DRn.jpg) As to how exactly this ubiquitous picture of the CMB power spectrum translates into a rough temperature variation amplitude, I refer you to the as-yet unsatisfactorily (to me) answered question: [How to translate from the CMB Power spectrum to a spectrum of temperature variations](https://physics.stackexchange.com/questions/286521/how-to-translate-from-the-cmb-power-spectrum-to-a-spectrum-of-temperature-variat) Edit: In fact forget the power spectrum, just look at the temperature map (minus the mean temperature) on the sky and note the variation compared to the mean value of 2.7K; about 0.01%. (Note though, this map has also taken out the dipole component due to our motion with respect to the CMB, which causes a larger, smooth variation). [![CMB T map](https://i.stack.imgur.com/UN3Ma.jpg)](https://i.stack.imgur.com/UN3Ma.jpg)
It is variation in temperature. Why would that not make sense?
231
I always get caught playing as an infected no matter how good I hide (because the infected make noises). What would be a good tactic to minimize detection?
2010/07/07
[ "https://gaming.stackexchange.com/questions/231", "https://gaming.stackexchange.com", "https://gaming.stackexchange.com/users/14/" ]
Don't spawn until the last possible moment or they'll hear you. Here are some of my strategies: * **Boomer** - He's slow, so don't try chasing survivors. Get in front of them and spawn as they're coming around a corner, or drop from a higher place in between them and surprise 'em. * **Smoker** - I usually wait for a Boomer to attack and as soon as he explodes on them I grab one, because they're all blind and deaf for a few seconds. This gives me enough time to do some damage. He's also good at grabbing survivors off ledges and high places. * **Charger** - I wait for the survivors to get in a cluster like in a narrow passage and then try to ram them all as it will take a couple of seconds for them to get up and kill you. He's also good to lead survivors back and to delay them by charging one of them across a long distance. * **Spitter** - Just hide and spit. Keep out of sight, as she is slow and dies quickly. Your spit can bounce off walls; use that to spit without exposing yourself. If they've been hit by a Boomer and are getting attacked by common infected then spit at them, as attacking horde slows them down. * **Jockey** - Not a big fan, but I normally wait until the others attack and then sneak in, grab one, and ride off into the sunset. You can use ledges and cliffs to your advantage and walk a survivor off them. Even if they hang on, the rest of the team will either need to go back and lift him up, or leave him hanging and play the rest of the level down one survivor. Also, works well in tandem with a Spitter. * **Hunter** - Hunter is silent when standing and also runs fast; use that to run up to weak survivors from behind and do a scratch and run. Also, pouncing from very high will do a lot of damage. I normally use him to punish any survivors trying to free a teammate from a Smoker or Charger.
Don't hide and kill as fast as possible. They won't hear you if they are already dead. :)
231
I always get caught playing as an infected no matter how good I hide (because the infected make noises). What would be a good tactic to minimize detection?
2010/07/07
[ "https://gaming.stackexchange.com/questions/231", "https://gaming.stackexchange.com", "https://gaming.stackexchange.com/users/14/" ]
Don't hide and kill as fast as possible. They won't hear you if they are already dead. :)
For **Jockey**, a good approach for me was to spawn near a high ground and ride them to a ledge and make them fall. Yes, you die... but you respawn. They don't. Also, a good thing is to combine **spitter** and **jockey**. Keep them in the goo as long as you can. (also can get an achievement there) In fact the best moments to attack with the **jockey** are when the horde is attacking or when one of the survivors is left behind.
231
I always get caught playing as an infected no matter how good I hide (because the infected make noises). What would be a good tactic to minimize detection?
2010/07/07
[ "https://gaming.stackexchange.com/questions/231", "https://gaming.stackexchange.com", "https://gaming.stackexchange.com/users/14/" ]
Don't spawn until the last possible moment or they'll hear you. Here are some of my strategies: * **Boomer** - He's slow, so don't try chasing survivors. Get in front of them and spawn as they're coming around a corner, or drop from a higher place in between them and surprise 'em. * **Smoker** - I usually wait for a Boomer to attack and as soon as he explodes on them I grab one, because they're all blind and deaf for a few seconds. This gives me enough time to do some damage. He's also good at grabbing survivors off ledges and high places. * **Charger** - I wait for the survivors to get in a cluster like in a narrow passage and then try to ram them all as it will take a couple of seconds for them to get up and kill you. He's also good to lead survivors back and to delay them by charging one of them across a long distance. * **Spitter** - Just hide and spit. Keep out of sight, as she is slow and dies quickly. Your spit can bounce off walls; use that to spit without exposing yourself. If they've been hit by a Boomer and are getting attacked by common infected then spit at them, as attacking horde slows them down. * **Jockey** - Not a big fan, but I normally wait until the others attack and then sneak in, grab one, and ride off into the sunset. You can use ledges and cliffs to your advantage and walk a survivor off them. Even if they hang on, the rest of the team will either need to go back and lift him up, or leave him hanging and play the rest of the level down one survivor. Also, works well in tandem with a Spitter. * **Hunter** - Hunter is silent when standing and also runs fast; use that to run up to weak survivors from behind and do a scratch and run. Also, pouncing from very high will do a lot of damage. I normally use him to punish any survivors trying to free a teammate from a Smoker or Charger.
Hang back and **never** attack a group. Wait for one of the survivors to lag behind and then act quickly. Most of the time the survivors won't bother doubling back to kill you, so staying behind them will help you stay alive longer. Also: teamwork! Work with your teammates and coordinate your attacks. Again, act swiftly.
231
I always get caught playing as an infected no matter how good I hide (because the infected make noises). What would be a good tactic to minimize detection?
2010/07/07
[ "https://gaming.stackexchange.com/questions/231", "https://gaming.stackexchange.com", "https://gaming.stackexchange.com/users/14/" ]
Hang back and **never** attack a group. Wait for one of the survivors to lag behind and then act quickly. Most of the time the survivors won't bother doubling back to kill you, so staying behind them will help you stay alive longer. Also: teamwork! Work with your teammates and coordinate your attacks. Again, act swiftly.
For **Jockey**, a good approach for me was to spawn near a high ground and ride them to a ledge and make them fall. Yes, you die... but you respawn. They don't. Also, a good thing is to combine **spitter** and **jockey**. Keep them in the goo as long as you can. (also can get an achievement there) In fact the best moments to attack with the **jockey** are when the horde is attacking or when one of the survivors is left behind.
231
I always get caught playing as an infected no matter how good I hide (because the infected make noises). What would be a good tactic to minimize detection?
2010/07/07
[ "https://gaming.stackexchange.com/questions/231", "https://gaming.stackexchange.com", "https://gaming.stackexchange.com/users/14/" ]
Don't spawn until the last possible moment or they'll hear you. Here are some of my strategies: * **Boomer** - He's slow, so don't try chasing survivors. Get in front of them and spawn as they're coming around a corner, or drop from a higher place in between them and surprise 'em. * **Smoker** - I usually wait for a Boomer to attack and as soon as he explodes on them I grab one, because they're all blind and deaf for a few seconds. This gives me enough time to do some damage. He's also good at grabbing survivors off ledges and high places. * **Charger** - I wait for the survivors to get in a cluster like in a narrow passage and then try to ram them all as it will take a couple of seconds for them to get up and kill you. He's also good to lead survivors back and to delay them by charging one of them across a long distance. * **Spitter** - Just hide and spit. Keep out of sight, as she is slow and dies quickly. Your spit can bounce off walls; use that to spit without exposing yourself. If they've been hit by a Boomer and are getting attacked by common infected then spit at them, as attacking horde slows them down. * **Jockey** - Not a big fan, but I normally wait until the others attack and then sneak in, grab one, and ride off into the sunset. You can use ledges and cliffs to your advantage and walk a survivor off them. Even if they hang on, the rest of the team will either need to go back and lift him up, or leave him hanging and play the rest of the level down one survivor. Also, works well in tandem with a Spitter. * **Hunter** - Hunter is silent when standing and also runs fast; use that to run up to weak survivors from behind and do a scratch and run. Also, pouncing from very high will do a lot of damage. I normally use him to punish any survivors trying to free a teammate from a Smoker or Charger.
For **Jockey**, a good approach for me was to spawn near a high ground and ride them to a ledge and make them fall. Yes, you die... but you respawn. They don't. Also, a good thing is to combine **spitter** and **jockey**. Keep them in the goo as long as you can. (also can get an achievement there) In fact the best moments to attack with the **jockey** are when the horde is attacking or when one of the survivors is left behind.
284
I came across a few questions where the asker understands the meaning of a Chinese idiom perfectly, but requested for a similar English idiom instead of just seeking for the translation. Example [this](https://chinese.stackexchange.com/q/3141/878) question. As far as I know, English language and Chinese language work differently. Idioms are unique to a language. Should such questions be allowed? **ADD NOTE** My main concern is whether a proliferation of such questions is healthy to the growth of this site since it is a Chinese Language site, not an English Language site. Idioms require a higher language proficiency, and people who ask such questions may have an unrealistic expectation of what can or cannot be answered. This may leave behind many questions with unaccepted answers and also generate a steady stream of low quality answers by people who thought it as a simple translation problem.
2013/07/22
[ "https://chinese.meta.stackexchange.com/questions/284", "https://chinese.meta.stackexchange.com", "https://chinese.meta.stackexchange.com/users/878/" ]
The best way to deal with that, in my opinion, would be to provide the best Chinese/English idiom that resembles the meaning. If one that has a similar form too exists, then even better. But we're translating the meaning being conveyed. I'd personally aim to that since the literal meaning can simply looked up in dictionaries. The meaning is harder to research. **My answer**: After some thought, this is my take on this. This site already addressed this issue. In our FAQ we decided that any translation from Chinese into any other language, would be better asked on that Target language site. Any translation into Chinese might be asked here at the condition of providing evident research effort and also extensively explaining the original expression or sentence.
I don't think these questions should be allowed, for two reasons: 1. Off-topic. Imagine I ask for translation of an English idiom which I understand perfectly, into Spanish, on ELL or EL&U, it will get -10 votes in 5 minutes and deletion in another 5. It's simply not in the interest of the site and not helping future visitors. 2. Expertise. The participants of this website is consisted of people who provide or seek help in understanding and learning Chinese, not many of which are native English speakers. It may appear 'translation into English' requests on a non-English Q/A site are far more acceptable than the opposite, possibly due to English is *the* universal language which is used to ask and answer questions. However, I think there is a serious confusion of concepts. The 'universal' English we use to ask and answer questions is *'Apprentice English'*. The English proficiency needed to provide a good translation is *'Expert English'*. All SE sites, including CL&U, require its visitors to have *Apprentice English* skill in order to read and post, but to answer these 'translate into English' requests, *Expert English* is required, which is in-scope and guaranteed only on ELL and EL&U sites.
284
I came across a few questions where the asker understands the meaning of a Chinese idiom perfectly, but requested for a similar English idiom instead of just seeking for the translation. Example [this](https://chinese.stackexchange.com/q/3141/878) question. As far as I know, English language and Chinese language work differently. Idioms are unique to a language. Should such questions be allowed? **ADD NOTE** My main concern is whether a proliferation of such questions is healthy to the growth of this site since it is a Chinese Language site, not an English Language site. Idioms require a higher language proficiency, and people who ask such questions may have an unrealistic expectation of what can or cannot be answered. This may leave behind many questions with unaccepted answers and also generate a steady stream of low quality answers by people who thought it as a simple translation problem.
2013/07/22
[ "https://chinese.meta.stackexchange.com/questions/284", "https://chinese.meta.stackexchange.com", "https://chinese.meta.stackexchange.com/users/878/" ]
The best way to deal with that, in my opinion, would be to provide the best Chinese/English idiom that resembles the meaning. If one that has a similar form too exists, then even better. But we're translating the meaning being conveyed. I'd personally aim to that since the literal meaning can simply looked up in dictionaries. The meaning is harder to research. **My answer**: After some thought, this is my take on this. This site already addressed this issue. In our FAQ we decided that any translation from Chinese into any other language, would be better asked on that Target language site. Any translation into Chinese might be asked here at the condition of providing evident research effort and also extensively explaining the original expression or sentence.
Your question actually has a few different points, so here is what I think... **Point 1: We don't want to be answering the same question over and over again** The problem with this question is that the title doesn't really reflect the question. The question really isn't 'can I get a better translation for this' the question is actually 'is it possible to get better translations for idioms once they are translated from the Chinese'. If it is just option 1, then this person needs to show more research effort and the question should be closed. If it is option 2, then it is [answered by user @fivecode](https://chinese.stackexchange.com/a/3178/38), everyone here should now go and up vote his answer and then lets use this as an example next time someone asks for "a better translation" when one doesn't exist. I refuse to believe that my Chinese/English skills are not good enough to answer this. Actually, everyone who has answered that question has provided the same answer and **it is good enough**. Don't look for magic when there isn't any. The magic is in the way it was created in the source language. "好好学习天天向上" If you study hard, you will get ahead. Want a better translation with some magic in it? You won't find one, even with a level 70 English Linguist Wizard Professor. This person [did ask the same question on the ELL site](https://ell.stackexchange.com/questions/6541/is-there-a-similar-idiomatic-phrase-for-reading-is-great-love-reading-read-ex) and got a similar answer, just with some big words thrown in. **Point 2: Idioms are unique to a language. Should such questions be allowed?** Yes, they should be allowed. We shouldn't shy away from anything that is on topic. We want people to approach us with idioms. But, they should be provided to us in the same way as any question on this site. They need to be worthwhile to answer and they need to show some effort. The example question is weak and weak questions provide week answers and get low votes. There are two reasons the example question is weak. 1) "读书好 好读书 读好书" is easy to translate, but the translation is boring. 2) People are not sure what this person really wants when everyone can clearly see what it says. **Point 3: Should we allow questions requesting English as the answer?** This has been asked by myself twice on our meta site and both times the answers have been Yes and with several upvotes. We should have a better understanding of what the "magic" is inside the Chinese text, better than any English site. I personally received a High Distinction (above 90%) when I completed my 'The Chinese Classic Novel' class in university which required me to provide accurate translation of passages of text from the 四大名著. I have seen plenty of average (read crap) translations provided by professional translators and even lived with one for 2 years, I am willing to throw down the gauntlet to anyone with only skill in English to provide a better translation for these types of questions. **So how do we deal with this type of question and prevent a long tail of crap?** I personally have a very soft approach to moderation, because the community as a whole should be the moderators. Only one person has down-voted this question and nobody has voted to close. However, we can make a stand. We can comment to the asker, to get them to show some effort and then either close it because it is too easy to answer and not a wortwhile question *or* we could upvote @fivecode's answer and then close all future questions of this type ("where is the magic in this idiom when there is none" type questions) with a reference pointing back to this question. Lastly, we could just ignore it by not upvoting the question or the answers and leaving it as part of the long tail which is what is happening now. We do have the tools to make the place better, but **YES** this type of question is on topic and **YES** we do have the skills to answer ***well thought, well researched, good quality questions which are similar***.
46,611,819
The issues is as follows, I have a couple of services running that need to copy files from server A to server B, server A being Windows server 2012 R2, server B being Windows server 2016, services are not capable to send credentials or impersonate logged users and apparently the option "Turn off password protected file sharing" is no longer available in Windows server 2016. - server are all into a LAN no internet facing, so turning off password is not a security issue. - No, I did not code the services and I don't have access to code to enable sending user and password. I'm only responsible for setting up the communications. - guess profile is enabled in the local security profiles - both folders (origin and destination) are shared with 'Everyone' for read and write. Does anyone knows how can I remove the password request for shared folders?
2017/10/06
[ "https://Stackoverflow.com/questions/46611819", "https://Stackoverflow.com", "https://Stackoverflow.com/users/8733772/" ]
I've encountered this same problem, the following helped me: This may be due to user name conflicts (ie.) The SharedMachine and ClientMachine**s** have **Same UserNames** So Make sure the **SharedMachine's** UserName does not match the **ClientMachine** UserName. > > Since there is going to be many ClientMachines, Its hard to rename > them all, > > > so Rename the SharedMachine's UserAccounts: > > > -> In the SharedMachine GoTo: **AdministrativeTools -> ComputerManagement -> UsersAndGroups** > > > -> **Rename all the available user Accounts** > > > eg: > > -> Rename the **Administrator**" Account to **SOME\_NAME\_1** > > > -> Rename the **Guest**" Account to **SOME\_NAME\_2** > > > -> **Finally, restart the SharedMachine.** > > >
Hopefully you already found a solution but if not here is some good information. THe turn off password protect sharing option has moved slightly. It is now under "All Networks" instead of the current profile [![enter image description here](https://i.stack.imgur.com/ruRWc.png)](https://i.stack.imgur.com/ruRWc.png) But in server 2016 enabling this might not be the fix you need. I found this other [stack overflow question](https://serverfault.com/questions/682086/how-can-i-get-windows-server-2012-r2-to-stop-asking-for-a-file-share-password) and this was important. If the users are in a different domain they must enter the username as "Guest" This was the true fix for me since the share was under domain:local, no other remote user is in the same local domain, and must use the guest account. They still don't need a password, which is nice Lastly, if none of that works I found this great post: <https://www.kapilarya.com/how-to-turn-off-password-protected-sharing-in-windows-10> In addition to what you've done with sharing and permissions they have two registry settings * HKEY\_LOCAL\_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa **everyoneincludeanonymous** set to 1 * HKEY\_LOCAL\_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters **restrictnullsessaccess** set to 0
59,176
I use BitTorrent Sync to transfer audio files to my Nexus 5. All files are transfered to the 'music' directory. When new files are added to this directory, the only way to update Play Music's library is rebooting android. There is an update button in Play Music ("Vernieuwen" in dutch) but this does not add the new files. To be honest I expected Play Music to automatically add the new files. What can be the cause of this problem? And is there a way to solve it? Possibly related questions: * [Stock Google Music app does not scan subdirectory in Android 4.2.1](https://android.stackexchange.com/questions/38859/stock-google-music-app-does-not-scan-subdirectory-in-android-4-2-1) * [The music player keeps displaying deleted songs. How do I remove them or refresh the library?](https://android.stackexchange.com/questions/10153/the-music-player-keeps-displaying-deleted-songs-how-do-i-remove-them-or-refresh) * [Kitkat 4.4.2 and Play music: won't find files](https://android.stackexchange.com/questions/58809/kitkat-4-4-2-and-play-music-wont-find-files)
2013/12/17
[ "https://android.stackexchange.com/questions/59176", "https://android.stackexchange.com", "https://android.stackexchange.com/users/48626/" ]
One of the advantages of a physical SD card: unmounting and re-mounting it triggers the media scanner. But that's unlikely to be an option for you. 1 Depending on your Android version, there are different apps available on *Google Play* to help you out. The "version difference": starting with Kitkat, the old mechanism of triggering the media scanner does no longer work, "normal apps" are denied the permission to call it. But there's at least one new app available where the dev found a "loop-hole" to give back the functionality. Some examples for pre-Kitkat scanners can be found in the link of "footnote 1", [SD Scanner](http://www.appbrain.com/app/sd-scanner/com.gmail.jerickson314.sdscanner) is the one promising to work with Kitkat. --- 1 see [my answer here](https://android.stackexchange.com/a/54908/16575) for a more detailed explanation of the background
Solution 1: Just play it ------------------------ If you are an KitKat user that just wants to listen the music, regardless of recognizing it on the best way (like showing ID3 tags, allowing to modify files etc.), just use [Es File Explorer](https://play.google.com/store/apps/details?id=com.estrongs.android.pop). So you can see the folders on SD Card, long press on some folders choose to and play it or to add to playlist, all using embedded music player. Solution 2: Play + Modify ------------------------- Want to modify/delete/add media files? Alles klar: only open Es File Explorer, enter on external storage, go to Android\data, create a folder called "com.estrongs.android.pop" (yeah, you can!), and put all media files in it, using subfolders or not. Shazam! KitKat does not allow to modify files on external storage when they are outside the folder of the app that is trying to modify them, but not inside. Help me :) ---------- If you find better app to play these files, inform me, please :) but it is the only one I know that performs Solution 2 on KitKat.
147,734
Most people use their SSD as their primary system installation disk with Windows 7. W7 already has a lot of optimizations for SSDs, both in terms of performance and lifetime. Minimizing writes increases the lifetime of SSDs, so post each suggestion as an answer and let others vote on them. **Update:** I'm not sure anymore that minimizing writes is a good thing [tm], hard facts that SSDs will degrade within a noticeable time are missing and it seems this it can create a bit FUD about the functionality of the SSD. In other words: I question the usefulness of my wiki question.
2010/06/01
[ "https://superuser.com/questions/147734", "https://superuser.com", "https://superuser.com/users/1563/" ]
Move the page file ------------------ Ensure that this is located on another partition.
Move the searcher index to another partition ============================================ ~~The searcher index can get updated quite often, even more so if you've configured additional directories for effective searching (maybe also on other hard disks)~~ OTOH, if you use the searcher a lot you would actually want to benefit from quick access of the SSD so you might not move it off to a non-SSD drive. I've been running the searcher on a non-SSD drive for the matter for a few days and changed it back. I got the impression the system never stops doing anything (audible noise from non-SSD drive) and that it takes much more time. I'm not sure anymore it's a good idea.
309,402
What is the best way of finding out the optimal number of clusters, given that I just have a similarity matrix? Is it possible to do it all in Scikit-learn without any extra implementation? My suggestion? PCA it! Please correct, Thank you!
2017/10/23
[ "https://stats.stackexchange.com/questions/309402", "https://stats.stackexchange.com", "https://stats.stackexchange.com/users/181907/" ]
For methods that are specific to spectral clustering, one straightforward way is to look at the eigenvalues of the graph Laplacian and chose the K corresponding to the maximum drop-off. In R, this is implemented in the CRAN ‘Spectrum’ package <https://cran.r-project.org/web/packages/Spectrum/index.html>. In the Zelnik-Manor et al (2005) paper the authors discuss this and a more sophisticated method that involves rotating the eigenvectors and minimising a cost function using gradient descent for each K. Then K is the one with the lowest cost. You would have to read the paper to get more details. See: Zelnik-Manor, Lihi, and Pietro Perona. "Self-tuning spectral clustering." Advances in neural information processing systems. 2005. There is another school of thought that says we should examine the distribution of the individual eigenvectors when deciding K. Eigenvectors that are less unimodal contain more information. An example of this is the multimodality gap method we came up with, but there are several similar methods which are popular in image analysis. Christopher R John, David Watson, Michael R Barnes, Costantino Pitzalis, Myles J Lewis, Spectrum: fast density-aware spectral clustering for single and multi-omic data, Bioinformatics, btz704. See this paper for a nice example. Alshammari, Mashaan, and Masahiro Takatsuka. "Approximate spectral clustering with eigenvector selection and self-tuned k." Pattern Recognition Letters 122 (2019): 31-37.
Well, if you want to know the optimal number of clusters, one of the most common methods is the **Elbow Curve** method. Basically what you have to do is to look at the graph where X is the number of clusters and Y is your WCSS (Within Cluster Sum of Squares). Since I cannot write formulas here because I'm new or attach images, the WCSS is further discussed here: <https://discuss.analyticsvidhya.com/t/what-is-within-cluster-sum-of-squares-by-cluster-in-k-means/2706/2> Now that you've figured out what WCSS is visually, you'll see that the WCSS is high at the beginning and you'll notice it drop substantially and then after a while, it will still drop but there won't be any substantial change. That point where the last big drop is, that's the optimal number of clusters. That's how you choose the optimal number of clusters while using the Elbow Method. You can simply use `sklearn`'s library for clustering. Refer to this for other techniques: <http://www.sthda.com/english/articles/29-cluster-validation-essentials/96-determining-the-optimal-number-of-clusters-3-must-know-methods/> Hope this helped!
364,422
What's the difference between "boast of" and " boast about" ?
2016/12/20
[ "https://english.stackexchange.com/questions/364422", "https://english.stackexchange.com", "https://english.stackexchange.com/users/211736/" ]
For the most part, the two prepositions can be used interchangeably. According to [The Free Dictonary](http://idioms.thefreedictionary.com/boast+about), "boast of" and "boast about" are practically the same idiom. For example, both of these are valid, > > The chef boasts of his restaurant having the most authentic Italian food in all of New York City. > > > The chef boasts about his restaurant having the most authentic Italian food in all of New York City. > > > A common thing with *boast* is that adjectives are commonly placed between the verb and the proposition. For instance, > > He always boasts highly of/about himself. > > > They never boast highly of/about the unsung heroes. > > > Again, not much difference between *of* and *about* here. One last comment is that if you choose not to use a preposition with *boast*, then the verb can take on a whole new meaning. For *boast* has two meanings according to [Cambridge Dictionary](http://dictionary.cambridge.org/us/dictionary/english/boast), > > 1) to speak too proudly or show too much satisfaction about something or someone connected with you > > > 2) to have or possess something to be proud of > > > The earlier sentences addressed the first definition, but now the second definition can be addressed. > > Harvard boasts high expectations for its students. > > > The coach boasts high hopes for his championship-caliber team. > > > However, *boast* alone can still take on the first definition like it did with a preposition.
To me, things boasted of may or may not be founded whereas things boasted about are generally true. See [example sentences of both](http://www.manythings.org/sentences/words/boast/1.html) here. But the better question is, is boasting ever called for? <http://www.cbsnews.com/news/money-and-manners-are-you-offensive/> <https://mkueber001.wordpress.com/2014/11/18/is-it-bad-manners-to-brag-about-your-kids/> Don't know. Will let you draw your own conclusions.
22,804,110
Why should I use angular.js or other like js frameworks when I know they are not secured. What I mean by security is: * All the code is written in pure javascript. The javascript can be edited in devtools or firebug. Something like form submission can be easily manipulated. Even if I try to do server side validations for all the http requests, I end up doing double the work. How can I effectively use angularjs keeping above in mind? Thanks.
2014/04/02
[ "https://Stackoverflow.com/questions/22804110", "https://Stackoverflow.com", "https://Stackoverflow.com/users/-1/" ]
All client side code is susceptible to modification. For that reason you don't put anything that needs to be secure into the client code. The client code should define the view elements for the end user and give them an easy means to communicate with the server. Regarding security 99% of this needs to be handled server side by appropriately protecting the data that is sensitive. In terms of server to client communication you need to use SSL. Angular has some things built in to help with security see $sce and ngSanitize but IMHO your back-end should be safe because anyone can re-write a front end or use a command line tool to send various curl requests at the server until something gives. The client code really has no need to contain anything proprietary outside of the client code itself if that's your concern you can use obfuscation tools but ultimately even compiled code can be decompiled or disassembled .
You should always do both client and server-side validation. No matter what library you're using, this is required. It shouldn't be seen as "double" the work. It's just "the work". Even if you weren't using Angular (or another Javascript library), I could still use devtools to make a request via Javascript to your server - it still needs to handle it. If you're worried about code security, you can use an obfuscation/minification tool.
22,804,110
Why should I use angular.js or other like js frameworks when I know they are not secured. What I mean by security is: * All the code is written in pure javascript. The javascript can be edited in devtools or firebug. Something like form submission can be easily manipulated. Even if I try to do server side validations for all the http requests, I end up doing double the work. How can I effectively use angularjs keeping above in mind? Thanks.
2014/04/02
[ "https://Stackoverflow.com/questions/22804110", "https://Stackoverflow.com", "https://Stackoverflow.com/users/-1/" ]
All client side code is susceptible to modification. For that reason you don't put anything that needs to be secure into the client code. The client code should define the view elements for the end user and give them an easy means to communicate with the server. Regarding security 99% of this needs to be handled server side by appropriately protecting the data that is sensitive. In terms of server to client communication you need to use SSL. Angular has some things built in to help with security see $sce and ngSanitize but IMHO your back-end should be safe because anyone can re-write a front end or use a command line tool to send various curl requests at the server until something gives. The client code really has no need to contain anything proprietary outside of the client code itself if that's your concern you can use obfuscation tools but ultimately even compiled code can be decompiled or disassembled .
Of course you should use minification js tool for your client side code if you worried about its logic. But keep in ming this: * Do not keep service info (like many id`s and etc.) on client * And always use both type of validation in dangerous places * Use crypto/tokens
22,804,110
Why should I use angular.js or other like js frameworks when I know they are not secured. What I mean by security is: * All the code is written in pure javascript. The javascript can be edited in devtools or firebug. Something like form submission can be easily manipulated. Even if I try to do server side validations for all the http requests, I end up doing double the work. How can I effectively use angularjs keeping above in mind? Thanks.
2014/04/02
[ "https://Stackoverflow.com/questions/22804110", "https://Stackoverflow.com", "https://Stackoverflow.com/users/-1/" ]
You should always do both client and server-side validation. No matter what library you're using, this is required. It shouldn't be seen as "double" the work. It's just "the work". Even if you weren't using Angular (or another Javascript library), I could still use devtools to make a request via Javascript to your server - it still needs to handle it. If you're worried about code security, you can use an obfuscation/minification tool.
Of course you should use minification js tool for your client side code if you worried about its logic. But keep in ming this: * Do not keep service info (like many id`s and etc.) on client * And always use both type of validation in dangerous places * Use crypto/tokens
2,246,334
It would make my user's lives much easier if I could do the following; * Allow an Excel document to be viewed (not edited) in Internet Explorer 8 * Facilitate jumping to particular sheets in that document I can embed the Excel file using an iframe which works, but I am utterly stuck when it comes to jumping to a particular named worksheet in that document. Is this possible? I'm thinking either some way to force the document to show a particular worksheet first, via the src attribute, or controlling the embeded doc via javascript.
2010/02/11
[ "https://Stackoverflow.com/questions/2246334", "https://Stackoverflow.com", "https://Stackoverflow.com/users/269684/" ]
Have you tried the PHP excel reader? I used it for similar purposes once. <http://sourceforge.net/projects/phpexcelreader/>
I am not sure if you can do this with JavaScript. But another question. Do you generate this file on the server side? Then you could embed some macro which would jump to this partcular worksheet.
2,246,334
It would make my user's lives much easier if I could do the following; * Allow an Excel document to be viewed (not edited) in Internet Explorer 8 * Facilitate jumping to particular sheets in that document I can embed the Excel file using an iframe which works, but I am utterly stuck when it comes to jumping to a particular named worksheet in that document. Is this possible? I'm thinking either some way to force the document to show a particular worksheet first, via the src attribute, or controlling the embeded doc via javascript.
2010/02/11
[ "https://Stackoverflow.com/questions/2246334", "https://Stackoverflow.com", "https://Stackoverflow.com/users/269684/" ]
Have you tried the PHP excel reader? I used it for similar purposes once. <http://sourceforge.net/projects/phpexcelreader/>
Thought of something. Use AJAX, post back when HTML element changes, re-serve the workbook with a modified open workbook macro that uses the post back data to display the proper worksheet and range. Since there is no browser refresh flash, the user may/will never notice. The only downside, is the round-trip back to the server.
34,521
I saw lot of companies advertising in online or in TV that we can reduce belly fat by using their machines. Is that really works , Is there any disadvantages ? [![enter image description here](https://i.stack.imgur.com/aXFCW.png)](https://i.stack.imgur.com/aXFCW.png)
2017/07/07
[ "https://fitness.stackexchange.com/questions/34521", "https://fitness.stackexchange.com", "https://fitness.stackexchange.com/users/26052/" ]
In short, **you can't target fat loss**, and what these types of companies are claiming is purely marketing. Sure, if you use a machine like this you will burn some calories, and if you burn more calories than you're consuming you will reduce fat (on your entire body) and get some results. The thing is, **these types of machines aren't as effective at burning calories** as doing cardio (running, cycling, swimming) or doing heavy compound lifts (deadlifts, squats). They will burn a lot more calories, and combining this with some ab work like leg raises, crunches or planks will give you more results than these machines. Also, **abs are revealed in the kitchen**, track your caloric intake and make sure you are burning more than you're consuming. And if you want to build some muscle, you have to make sure you get enough protein.
There actually are a few medical things you do (beyond liposuction). Look into CoolScuplting and SculpSure. Both are FDA-approved. No experience with CoolScuplting, be we have a ScuplSure machine at our medi-spa, and I've seen it work firsthand. Up to a 25% reduction in fat for treated areas. Currently approved for abdomen, flanks, back and inner/outer thighs. Uses lasers to burn the fat away. Usually takes about 12 weeks to see full results. That being said, for true body-recomposition, the comments and answers above hold true - abs are (mostly) made in the kitchen. Get into a calorie deficit, and stay there. I say mostly because without direct ab work, abs won't "pop" when you lose all the weight.
231,521
Homeowner says AC guys said unit requires a 15amp 2 pole breaker, does this mean 14/3 wire can be used ? Thought AC units required bigger wire and bigger breaker.
2021/08/07
[ "https://diy.stackexchange.com/questions/231521", "https://diy.stackexchange.com", "https://diy.stackexchange.com/users/140224/" ]
Most traditional split systems that use the heating ductwork don't need the neutral. Some ductless minisplits do have some 120v control or condensate pump options that do require the neutral. So it depends on your system requirements if XX/2 or XX/3 is needed\*\*. As to size the unit should the unit should have a label that specifies two separate numbers, "Maximum Overcurrent Protection" that specifies breaker size, and "Minimum Circuit Ampacity" which applies to wire size. The wire needs to be rated for 125% of that number. So if using 60°C UF cable 14/3 is only good for MCA of 12A. I'm assuming your talking about UF since NM (Romex) can't enter a damp or wet location. If using THWN conductors #14 is good for 16A (using 310.16 75°C rating since 240.3 exempts A/C from 15A limit of 240.4). Additionally the installation instructions may specify minimum size wire, the instructions are part of the UL/ETL/CSA Listing, and the NEC gives higher priority to the Listing than the general provisions in the Code. \*\*Just for clarity, nomenclature for cords (like appliance and extension cords) and cables (NM, MC, UF) are different as used by the NEC. A 14/3 cord counts the ground, cables like NM or UF don't count the ground even though present. So 14/3 UF cable would have 4 wires.
14/3 wire would be OK but considering the load and not knowing the distance I would suggest you use 12/2 with ground. You can run 12/3 with ground but it is not necessary. That would cover you in case the AC needs 110 but I very much doubt it.
231,521
Homeowner says AC guys said unit requires a 15amp 2 pole breaker, does this mean 14/3 wire can be used ? Thought AC units required bigger wire and bigger breaker.
2021/08/07
[ "https://diy.stackexchange.com/questions/231521", "https://diy.stackexchange.com", "https://diy.stackexchange.com/users/140224/" ]
Most traditional split systems that use the heating ductwork don't need the neutral. Some ductless minisplits do have some 120v control or condensate pump options that do require the neutral. So it depends on your system requirements if XX/2 or XX/3 is needed\*\*. As to size the unit should the unit should have a label that specifies two separate numbers, "Maximum Overcurrent Protection" that specifies breaker size, and "Minimum Circuit Ampacity" which applies to wire size. The wire needs to be rated for 125% of that number. So if using 60°C UF cable 14/3 is only good for MCA of 12A. I'm assuming your talking about UF since NM (Romex) can't enter a damp or wet location. If using THWN conductors #14 is good for 16A (using 310.16 75°C rating since 240.3 exempts A/C from 15A limit of 240.4). Additionally the installation instructions may specify minimum size wire, the instructions are part of the UL/ETL/CSA Listing, and the NEC gives higher priority to the Listing than the general provisions in the Code. \*\*Just for clarity, nomenclature for cords (like appliance and extension cords) and cables (NM, MC, UF) are different as used by the NEC. A 14/3 cord counts the ground, cables like NM or UF don't count the ground even though present. So 14/3 UF cable would have 4 wires.
You need to check the label on the AC unit for the proper amperage. The compressor unit will normally be a smaller load than the air handler which might contain a heater. I have a three ton compressor unit that draws 21.5 Amps so I have #10/2 AWG and a 30 Amp breaker. The air handler with a heater has 6/3 with a 60 Amp breaker. Your wiring does seem a little small.
231,521
Homeowner says AC guys said unit requires a 15amp 2 pole breaker, does this mean 14/3 wire can be used ? Thought AC units required bigger wire and bigger breaker.
2021/08/07
[ "https://diy.stackexchange.com/questions/231521", "https://diy.stackexchange.com", "https://diy.stackexchange.com/users/140224/" ]
Most traditional split systems that use the heating ductwork don't need the neutral. Some ductless minisplits do have some 120v control or condensate pump options that do require the neutral. So it depends on your system requirements if XX/2 or XX/3 is needed\*\*. As to size the unit should the unit should have a label that specifies two separate numbers, "Maximum Overcurrent Protection" that specifies breaker size, and "Minimum Circuit Ampacity" which applies to wire size. The wire needs to be rated for 125% of that number. So if using 60°C UF cable 14/3 is only good for MCA of 12A. I'm assuming your talking about UF since NM (Romex) can't enter a damp or wet location. If using THWN conductors #14 is good for 16A (using 310.16 75°C rating since 240.3 exempts A/C from 15A limit of 240.4). Additionally the installation instructions may specify minimum size wire, the instructions are part of the UL/ETL/CSA Listing, and the NEC gives higher priority to the Listing than the general provisions in the Code. \*\*Just for clarity, nomenclature for cords (like appliance and extension cords) and cables (NM, MC, UF) are different as used by the NEC. A 14/3 cord counts the ground, cables like NM or UF don't count the ground even though present. So 14/3 UF cable would have 4 wires.
Ideally check the unit specs, or call the "AC guys" yourself to verify - 14/2 is probably perfectly fine - you can oversize the wire and the size of the wire if it makes you or the homeowner happy, but I'm **suspecting a mini-split** and I know mine draw straight 240 V, no neutral needed, from a 15A breaker (actual minimum circuit ampacity 9.8A or so IIRC, typical draw on a non-extreme day considerably less.) So 14/2 and a 15A double-pole is plenty, and not even close to its limits.
17,186
I have been researching this lately and thought it was amazing. I just don't know where to begin or know any techniques. Can someone list some?
2016/08/08
[ "https://buddhism.stackexchange.com/questions/17186", "https://buddhism.stackexchange.com", "https://buddhism.stackexchange.com/users/9830/" ]
Recently I m reading a dharma book (The Chinese Version), which 25 great beings demonstrated how they practiced mindfulness meditation. The winner is: Guan Shi Yin Bodhisattva practices on hearing: <http://www.cttbusa.org/shurangama5/shurangama5_12.asp> You might be interested to have a read of above link as well as 24 other practices. May you be happy and at ease
Try starting with [accesstoinsight.org](http://www.accesstoinsight.org/lib/authors/thanissaro/concmind.html), [Jon Kabat Zinn](https://www.youtube.com/results?search_query=jon%20kabat-zinn), [Joseph Goldstein](https://www.youtube.com/watch?v=3f0mrUZ0Ga8&list=PLXmodMq3KyittfptG7wvcBfgR5ccaOnlb), [Google Search Inside Yourself](https://www.youtube.com/watch?v=3f0mrUZ0Ga8&list=PLXmodMq3KyittfptG7wvcBfgR5ccaOnlb).
17,186
I have been researching this lately and thought it was amazing. I just don't know where to begin or know any techniques. Can someone list some?
2016/08/08
[ "https://buddhism.stackexchange.com/questions/17186", "https://buddhism.stackexchange.com", "https://buddhism.stackexchange.com/users/9830/" ]
Recently I m reading a dharma book (The Chinese Version), which 25 great beings demonstrated how they practiced mindfulness meditation. The winner is: Guan Shi Yin Bodhisattva practices on hearing: <http://www.cttbusa.org/shurangama5/shurangama5_12.asp> You might be interested to have a read of above link as well as 24 other practices. May you be happy and at ease
You won't learn this one from books, only by trying out and practicing it. The practice is to go beyond concepts like *Now I'm meditating*, *this is good, bad, me, mine...* and focus on the raw experience which is present. If you sit down to start meditating with the intention to be mindfull you might have the feeling *Now I'm meditating*, but in reality all you do is change postures. You should have some basic instructions, but don't get into theory too much. It won't help you, it will only reinforce your opinions and ideas. I'd suggest to get to know the *framework* of **Right Mindfulness**, which are body, feelings, mindstates, mindobjects (*dhamma*). The original teaching from the Buddha himself: [Satipatthana Sutta: The Foundations of Mindfulness](http://www.accesstoinsight.org/tipitaka/mn/mn.010.nysa.html) A more practical guide from Ven. Yuttadhammo (the noting technique): [How to Meditate](http://www.sirimangalo.org/text/how-to-meditate/)
17,186
I have been researching this lately and thought it was amazing. I just don't know where to begin or know any techniques. Can someone list some?
2016/08/08
[ "https://buddhism.stackexchange.com/questions/17186", "https://buddhism.stackexchange.com", "https://buddhism.stackexchange.com/users/9830/" ]
Recently I m reading a dharma book (The Chinese Version), which 25 great beings demonstrated how they practiced mindfulness meditation. The winner is: Guan Shi Yin Bodhisattva practices on hearing: <http://www.cttbusa.org/shurangama5/shurangama5_12.asp> You might be interested to have a read of above link as well as 24 other practices. May you be happy and at ease
The word 'mindfulness' means '*to remember*' or '*keep in mind*'. In the context of Buddhism, it means 'to remember' to practise the factors of the eightfold path. For example, if you are speaking/talking, you remember to speak in a manner that is honest, pleasant/gentle, cordial & beneficial. This is practising mindfulness meditation when meditating upon speech. If practising formal sitting meditation, mindfulness is to remember to keep the mind in state that does not have desire for or get distressed about anything in the world. Therefore, in formal sitting meditation, how to practise mindfulness meditation is to sit without desire or worry & just sit with natural quiet. When this is done properly, awareness of breathing will arise naturally as a sign of right mindfulness & later pleasant feelings will arise as a sign of right mindfulness.
17,186
I have been researching this lately and thought it was amazing. I just don't know where to begin or know any techniques. Can someone list some?
2016/08/08
[ "https://buddhism.stackexchange.com/questions/17186", "https://buddhism.stackexchange.com", "https://buddhism.stackexchange.com/users/9830/" ]
Recently I m reading a dharma book (The Chinese Version), which 25 great beings demonstrated how they practiced mindfulness meditation. The winner is: Guan Shi Yin Bodhisattva practices on hearing: <http://www.cttbusa.org/shurangama5/shurangama5_12.asp> You might be interested to have a read of above link as well as 24 other practices. May you be happy and at ease
How about The Bhante Yuttadhammo channel on YouTube? He has a lot of useful videos but check out "How to Meditate" for beginners. His online videos are beginner to intermediate on much more than only mindfulness and he gives meditation courses from beginner to advanced. The teachers below teach about the same way as Bhante Yuttadhammo and are very beginner friendly: Joseph Goldstein, Bhante Bodhidhamma, Gil Fronsdal Just Google one of the above names in quotes and add "Dhamma talks" There's a Youtuber called "Stephen Proctor" who gives outstanding beginning teachings on mindfulness meditation in my opinion. Has anyone else heard of him? Is it just me or can this guy really teach or what? These teachers practice the same way I try to practice but there are a lot of good teachers who might have a different approach.
17,186
I have been researching this lately and thought it was amazing. I just don't know where to begin or know any techniques. Can someone list some?
2016/08/08
[ "https://buddhism.stackexchange.com/questions/17186", "https://buddhism.stackexchange.com", "https://buddhism.stackexchange.com/users/9830/" ]
Recently I m reading a dharma book (The Chinese Version), which 25 great beings demonstrated how they practiced mindfulness meditation. The winner is: Guan Shi Yin Bodhisattva practices on hearing: <http://www.cttbusa.org/shurangama5/shurangama5_12.asp> You might be interested to have a read of above link as well as 24 other practices. May you be happy and at ease
The detail of the practice is outlined in [Satipatthana Sutta](https://en.wikipedia.org/wiki/Satipatthana_Sutta) and [Anapanasati Sutta](https://en.wikipedia.org/wiki/Anapanasati_Sutta), but these instruction maybe difficult to follow for a beginner. Best is to take a course in it. 2 organisations with a reasonably wide outreach are: * <http://www.internationalmeditationcentre.org/> and * <http://www.dhamma.org> or alternatively look for a teacher in [World Buddhist Directory](http://www.buddhanet.info/wbd/).
17,186
I have been researching this lately and thought it was amazing. I just don't know where to begin or know any techniques. Can someone list some?
2016/08/08
[ "https://buddhism.stackexchange.com/questions/17186", "https://buddhism.stackexchange.com", "https://buddhism.stackexchange.com/users/9830/" ]
Try starting with [accesstoinsight.org](http://www.accesstoinsight.org/lib/authors/thanissaro/concmind.html), [Jon Kabat Zinn](https://www.youtube.com/results?search_query=jon%20kabat-zinn), [Joseph Goldstein](https://www.youtube.com/watch?v=3f0mrUZ0Ga8&list=PLXmodMq3KyittfptG7wvcBfgR5ccaOnlb), [Google Search Inside Yourself](https://www.youtube.com/watch?v=3f0mrUZ0Ga8&list=PLXmodMq3KyittfptG7wvcBfgR5ccaOnlb).
The detail of the practice is outlined in [Satipatthana Sutta](https://en.wikipedia.org/wiki/Satipatthana_Sutta) and [Anapanasati Sutta](https://en.wikipedia.org/wiki/Anapanasati_Sutta), but these instruction maybe difficult to follow for a beginner. Best is to take a course in it. 2 organisations with a reasonably wide outreach are: * <http://www.internationalmeditationcentre.org/> and * <http://www.dhamma.org> or alternatively look for a teacher in [World Buddhist Directory](http://www.buddhanet.info/wbd/).
17,186
I have been researching this lately and thought it was amazing. I just don't know where to begin or know any techniques. Can someone list some?
2016/08/08
[ "https://buddhism.stackexchange.com/questions/17186", "https://buddhism.stackexchange.com", "https://buddhism.stackexchange.com/users/9830/" ]
You won't learn this one from books, only by trying out and practicing it. The practice is to go beyond concepts like *Now I'm meditating*, *this is good, bad, me, mine...* and focus on the raw experience which is present. If you sit down to start meditating with the intention to be mindfull you might have the feeling *Now I'm meditating*, but in reality all you do is change postures. You should have some basic instructions, but don't get into theory too much. It won't help you, it will only reinforce your opinions and ideas. I'd suggest to get to know the *framework* of **Right Mindfulness**, which are body, feelings, mindstates, mindobjects (*dhamma*). The original teaching from the Buddha himself: [Satipatthana Sutta: The Foundations of Mindfulness](http://www.accesstoinsight.org/tipitaka/mn/mn.010.nysa.html) A more practical guide from Ven. Yuttadhammo (the noting technique): [How to Meditate](http://www.sirimangalo.org/text/how-to-meditate/)
The detail of the practice is outlined in [Satipatthana Sutta](https://en.wikipedia.org/wiki/Satipatthana_Sutta) and [Anapanasati Sutta](https://en.wikipedia.org/wiki/Anapanasati_Sutta), but these instruction maybe difficult to follow for a beginner. Best is to take a course in it. 2 organisations with a reasonably wide outreach are: * <http://www.internationalmeditationcentre.org/> and * <http://www.dhamma.org> or alternatively look for a teacher in [World Buddhist Directory](http://www.buddhanet.info/wbd/).
17,186
I have been researching this lately and thought it was amazing. I just don't know where to begin or know any techniques. Can someone list some?
2016/08/08
[ "https://buddhism.stackexchange.com/questions/17186", "https://buddhism.stackexchange.com", "https://buddhism.stackexchange.com/users/9830/" ]
The word 'mindfulness' means '*to remember*' or '*keep in mind*'. In the context of Buddhism, it means 'to remember' to practise the factors of the eightfold path. For example, if you are speaking/talking, you remember to speak in a manner that is honest, pleasant/gentle, cordial & beneficial. This is practising mindfulness meditation when meditating upon speech. If practising formal sitting meditation, mindfulness is to remember to keep the mind in state that does not have desire for or get distressed about anything in the world. Therefore, in formal sitting meditation, how to practise mindfulness meditation is to sit without desire or worry & just sit with natural quiet. When this is done properly, awareness of breathing will arise naturally as a sign of right mindfulness & later pleasant feelings will arise as a sign of right mindfulness.
The detail of the practice is outlined in [Satipatthana Sutta](https://en.wikipedia.org/wiki/Satipatthana_Sutta) and [Anapanasati Sutta](https://en.wikipedia.org/wiki/Anapanasati_Sutta), but these instruction maybe difficult to follow for a beginner. Best is to take a course in it. 2 organisations with a reasonably wide outreach are: * <http://www.internationalmeditationcentre.org/> and * <http://www.dhamma.org> or alternatively look for a teacher in [World Buddhist Directory](http://www.buddhanet.info/wbd/).
17,186
I have been researching this lately and thought it was amazing. I just don't know where to begin or know any techniques. Can someone list some?
2016/08/08
[ "https://buddhism.stackexchange.com/questions/17186", "https://buddhism.stackexchange.com", "https://buddhism.stackexchange.com/users/9830/" ]
How about The Bhante Yuttadhammo channel on YouTube? He has a lot of useful videos but check out "How to Meditate" for beginners. His online videos are beginner to intermediate on much more than only mindfulness and he gives meditation courses from beginner to advanced. The teachers below teach about the same way as Bhante Yuttadhammo and are very beginner friendly: Joseph Goldstein, Bhante Bodhidhamma, Gil Fronsdal Just Google one of the above names in quotes and add "Dhamma talks" There's a Youtuber called "Stephen Proctor" who gives outstanding beginning teachings on mindfulness meditation in my opinion. Has anyone else heard of him? Is it just me or can this guy really teach or what? These teachers practice the same way I try to practice but there are a lot of good teachers who might have a different approach.
The detail of the practice is outlined in [Satipatthana Sutta](https://en.wikipedia.org/wiki/Satipatthana_Sutta) and [Anapanasati Sutta](https://en.wikipedia.org/wiki/Anapanasati_Sutta), but these instruction maybe difficult to follow for a beginner. Best is to take a course in it. 2 organisations with a reasonably wide outreach are: * <http://www.internationalmeditationcentre.org/> and * <http://www.dhamma.org> or alternatively look for a teacher in [World Buddhist Directory](http://www.buddhanet.info/wbd/).
289,979
Well, first of all I don't really know how the hardware of a smartphone is, and I've just programmed for Android. But it feels safe to think that a smartphone is just an old PC with some particular things, but an old PC anyway, I think even the worst smartphone today likely has more power than the an standard PC equiped with the first Pentium 4, and that if Android uses those premises for programming so it would be in Iphone, Windows phone and the like. So, why is its programming so different? I mean, I could write lots of medium sized desktop application programs with any language for that use, and I could hardly notice the difference between running the program in a brand new PC or an old Pentium 4 computer, yeah some mobile apps are big and might require better resource management, but those aren't a lot. I personally find mobile apps would be easier to program this way and that it would be the most logical way for them to have been developed, in fact I don't think they should have a problem to execute any program that for example executes in windows, yeah I know operating system is far from being the same, but support could be included for those programs, as I guess mobile phones have enough power to run lots of them. Is there any failure in my reasoning? Which one? If not, why may they not make it as it's on desktop programming? Thank you.
2015/07/16
[ "https://softwareengineering.stackexchange.com/questions/289979", "https://softwareengineering.stackexchange.com", "https://softwareengineering.stackexchange.com/users/182621/" ]
Like Charles E Grant mentions - there's a lot of hardware on a phone that your average PC doesn't have. However, even if we discount all that - the system architecture of a smartphone is very different to that of an IBM compatible PC. Different processors mean different instruction sets. There's also the issues of the very low power available to phone electronics compares to your old PCs. And then there's the user interface - touch (and multi-touch) is very different to keyboard/mouse. The screen on a phone is much smaller - it may have the same resolution (or better) as compared to VGA, but VGA monitors were physically bigger. And then you have very different OS: iOS, Android, and Windows Mobile are different to their desktop cousins. Chances are, though, you've just used the default development framework for Android - and this can make it seem even more different to PC application development. There are software tools out there to help developers with cross-platform development - frameworks like Qt (C++) and Xamarin (C#) abstract the differences between mobile and desktop app development.
Think of all the hardware a phone has that a typical PC doesn't have! Cellular radio, accelerometers, GPS, touch screen, and a tiny battery with very limited power. Even if you don't use any of that hardware, you are writing your software for a GUI that is optimized for touch devices with a small screen. Microsoft tried to push having a similar GUI on phone and desktops (Windows 8), and it was widely rejected.
21,052,696
I am planning a 3pt upgrade for our solution, and it will include an upgrade from VS2008 SP1 to VS2013 and .NET 3.5 to 4.5.1 (and also MS SQL Server 2008 to 2012) I am trying to prepare as much as possible in advance so that I can provide accurate LOEs and make the process as painless as possible. However, I haven't had any luck finding information about how to upgrade a solution from VS2008 to VS2013. For anyone who has done this before, are there any guides you found useful or problems that you faced that you wish you had addressed before hand?
2014/01/10
[ "https://Stackoverflow.com/questions/21052696", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2339015/" ]
Without knowing much (really anything) about your project, it is going to be very hard to give you a straight answer. However, I can say this. Microsoft has prided itself since day one on its backwards compatibility. Simply opening the project in VS 2013 will trigger the upgrade process for the actual SLN. This is usually quite painless. Once this is complete, you are still able to target .NET 3.5, so you don't have to make the jump from VS2008 -> VS2013 && NET35 -> NET451 at the same time. The framework itself shouldn't present you with any serious issues, however any referenced 3rd party dlls can cause (sometimes serious) issues. They may not be maintained anymore, may have changed names, or simply do not exist. In this case you will need to find a new library to do what the old one did, which will require refactoring at best, significant rewrite at worst. None of this takes into account the features ADDED to NET45 from NET35, such as the async/await keywords and many, many, many other features. Since your question is very vague, its hard to give you a good answer other than just do it, the update to VS2013 should take very little time, and it will tell you if you are going to have issues even building. Once you do that, it should take no time at all to change your target framework to NET45 or NET451 and find out once again, if you can even compile. Without doing either of those, you cannot possibly estimate the level of work required. Then you still have to do all of your testing to see if something changed at runtime.
The problem is not upgrading from Visual Studio 2008 to 2013, because you can still run and compile .NET 3.5 applications in Visual Studio 2013 just fine. The real time consuming process is migrating from .NET 3.5 to 4.5.1 which can be short or long depending on how large is your application and what technology you use. Usually, .NET 3.5 is very forward compatible. Changing from one runtime to another (3.5 to 4.5) is simply a matter of changing a setting in your Project (Target Framework).
21,052,696
I am planning a 3pt upgrade for our solution, and it will include an upgrade from VS2008 SP1 to VS2013 and .NET 3.5 to 4.5.1 (and also MS SQL Server 2008 to 2012) I am trying to prepare as much as possible in advance so that I can provide accurate LOEs and make the process as painless as possible. However, I haven't had any luck finding information about how to upgrade a solution from VS2008 to VS2013. For anyone who has done this before, are there any guides you found useful or problems that you faced that you wish you had addressed before hand?
2014/01/10
[ "https://Stackoverflow.com/questions/21052696", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2339015/" ]
The problem is not upgrading from Visual Studio 2008 to 2013, because you can still run and compile .NET 3.5 applications in Visual Studio 2013 just fine. The real time consuming process is migrating from .NET 3.5 to 4.5.1 which can be short or long depending on how large is your application and what technology you use. Usually, .NET 3.5 is very forward compatible. Changing from one runtime to another (3.5 to 4.5) is simply a matter of changing a setting in your Project (Target Framework).
Be aware that .NET 4.5 is not supported on Windows XP. If your solution needs to run on XP you need to stay on .NET 4.0 or lower.
21,052,696
I am planning a 3pt upgrade for our solution, and it will include an upgrade from VS2008 SP1 to VS2013 and .NET 3.5 to 4.5.1 (and also MS SQL Server 2008 to 2012) I am trying to prepare as much as possible in advance so that I can provide accurate LOEs and make the process as painless as possible. However, I haven't had any luck finding information about how to upgrade a solution from VS2008 to VS2013. For anyone who has done this before, are there any guides you found useful or problems that you faced that you wish you had addressed before hand?
2014/01/10
[ "https://Stackoverflow.com/questions/21052696", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2339015/" ]
Without knowing much (really anything) about your project, it is going to be very hard to give you a straight answer. However, I can say this. Microsoft has prided itself since day one on its backwards compatibility. Simply opening the project in VS 2013 will trigger the upgrade process for the actual SLN. This is usually quite painless. Once this is complete, you are still able to target .NET 3.5, so you don't have to make the jump from VS2008 -> VS2013 && NET35 -> NET451 at the same time. The framework itself shouldn't present you with any serious issues, however any referenced 3rd party dlls can cause (sometimes serious) issues. They may not be maintained anymore, may have changed names, or simply do not exist. In this case you will need to find a new library to do what the old one did, which will require refactoring at best, significant rewrite at worst. None of this takes into account the features ADDED to NET45 from NET35, such as the async/await keywords and many, many, many other features. Since your question is very vague, its hard to give you a good answer other than just do it, the update to VS2013 should take very little time, and it will tell you if you are going to have issues even building. Once you do that, it should take no time at all to change your target framework to NET45 or NET451 and find out once again, if you can even compile. Without doing either of those, you cannot possibly estimate the level of work required. Then you still have to do all of your testing to see if something changed at runtime.
Be aware that .NET 4.5 is not supported on Windows XP. If your solution needs to run on XP you need to stay on .NET 4.0 or lower.
3,915
There is a nice bit I would love to get/use but it uses a 6mm shank. My router uses 1/4 inch shank. It is a 0.014 inch difference...is it a bad idea to get this? Is there an adapter or something if not? From the comments on an answer: > > My router is a Performax trim router, there is 1/4 collect and 3/8 collect. Not sure of the model. > > >
2016/04/24
[ "https://woodworking.stackexchange.com/questions/3915", "https://woodworking.stackexchange.com", "https://woodworking.stackexchange.com/users/2073/" ]
In short: **No, no, no**. You can technically do this, unluckily, but it is **highly inadvisable**. It is a pity that it just looks like one could do it (1/2'' is not far off compared to 12mm, and 1/4'' is even closer to 6mm) and that with some luck, it indeed *seems* to "work just fine". That is true for the other way around, too. You can hardly tell a difference with the naked eye, and the bits will fit in "just fine" either way. I've seen people do it, too, and they so far got away without accident or even physical injury. (Which makes the whole matter worse because that "proves" that it works.) However, using an imperial bit in the corresponding (well, almost corresponding) metric collet is dangerous *both* during the operation *and* when using the collet with your 6mm bits as intended afterwards. What happens is that you irreversibly widen your collet by a tiny amount (too small to see, but certainly enough to be on the dangerous side). If you are unlucky, the whole thing blows to smithereens at 25k RPM with shrapnel flying all over the place and the bit come off flying in a random direction. If you are lucky it "works fine", but now the collet no longer grips the original bits firmly and safely, so you have the risk of a bit flying away in a random direction every time you use the tool "properly" with the correct bits. Plus, you never know if the collet isn't going to break a month or two later, anyway. The same is true for the opposite case, using a metric bit in an imperial collet. Only in this case, you force the clamps together much more than originally intended. There is a bit of tolerance, so you can certainly fasten the screw harshly enough to do those extra 0.3 millimeters. But it's not what the tool manufacturer intended you to do, or planned in. The bit isn't going to have a sufficiently firm, safe grip, and you cannot be sure whether you have structurally damaged the collet by bending the little clamps too harshly.
My Makita 3709 has only one collet and the instructions booklet say that it's valid both for 6mm AND 1/4" bits. Clearly, if the collet fits 1/4" it can also fit 6mm, probably by just a tiny extra tightening.
3,915
There is a nice bit I would love to get/use but it uses a 6mm shank. My router uses 1/4 inch shank. It is a 0.014 inch difference...is it a bad idea to get this? Is there an adapter or something if not? From the comments on an answer: > > My router is a Performax trim router, there is 1/4 collect and 3/8 collect. Not sure of the model. > > >
2016/04/24
[ "https://woodworking.stackexchange.com/questions/3915", "https://woodworking.stackexchange.com", "https://woodworking.stackexchange.com/users/2073/" ]
It doesn't look like there is a commercial adapter available for this. The smallest I could find are 1/4" to 4 mm. This makes sense due to the wall thickness of a 1/4" to 6 mm adapter would be just 0.175 mm (about 11/64") thick. The best option would be to find a 6 mm collet for your router (if available).
The OP does not have a "trim" router but a "compact" router by Performax which does provide 1/4" and 3/8" collet capacity. The trim router has ONLY the 1/4" size. Now, the answer to his question IMHO is this: If you are going to be doing this regularly, then it is not advisable. If you just want to do this job and this job ONLY, it should be fine. Just take some precautions, and try it momentarily with a slower speed first. If you hear or feel anything out of the ordinary then it's the shank vibrating. If that's the case then stop immediately and get the proper size or adapter.
3,915
There is a nice bit I would love to get/use but it uses a 6mm shank. My router uses 1/4 inch shank. It is a 0.014 inch difference...is it a bad idea to get this? Is there an adapter or something if not? From the comments on an answer: > > My router is a Performax trim router, there is 1/4 collect and 3/8 collect. Not sure of the model. > > >
2016/04/24
[ "https://woodworking.stackexchange.com/questions/3915", "https://woodworking.stackexchange.com", "https://woodworking.stackexchange.com/users/2073/" ]
In short: **No, no, no**. You can technically do this, unluckily, but it is **highly inadvisable**. It is a pity that it just looks like one could do it (1/2'' is not far off compared to 12mm, and 1/4'' is even closer to 6mm) and that with some luck, it indeed *seems* to "work just fine". That is true for the other way around, too. You can hardly tell a difference with the naked eye, and the bits will fit in "just fine" either way. I've seen people do it, too, and they so far got away without accident or even physical injury. (Which makes the whole matter worse because that "proves" that it works.) However, using an imperial bit in the corresponding (well, almost corresponding) metric collet is dangerous *both* during the operation *and* when using the collet with your 6mm bits as intended afterwards. What happens is that you irreversibly widen your collet by a tiny amount (too small to see, but certainly enough to be on the dangerous side). If you are unlucky, the whole thing blows to smithereens at 25k RPM with shrapnel flying all over the place and the bit come off flying in a random direction. If you are lucky it "works fine", but now the collet no longer grips the original bits firmly and safely, so you have the risk of a bit flying away in a random direction every time you use the tool "properly" with the correct bits. Plus, you never know if the collet isn't going to break a month or two later, anyway. The same is true for the opposite case, using a metric bit in an imperial collet. Only in this case, you force the clamps together much more than originally intended. There is a bit of tolerance, so you can certainly fasten the screw harshly enough to do those extra 0.3 millimeters. But it's not what the tool manufacturer intended you to do, or planned in. The bit isn't going to have a sufficiently firm, safe grip, and you cannot be sure whether you have structurally damaged the collet by bending the little clamps too harshly.
My router has a slotted collet with threads on the outside...wherein a reciprocal threaded nut can be screwed down to tighten the collet grip on a shank that is inserted. This allows for a shank of close..but not exact same size to be used. Each manufacturer of tools use different tooling dies. This is why you can buy say a 1/2 inch socket from two different companies...and one fits perfectly on a 1/2 inch nut...and the other may be a little loose...or not go on at all...the size of the nut can even vary from one manufacturer to the next. If a shank fits into a collet easily...and the tightening nut easily locks that shank tightly into the collet...you should be fine. Simply put router collets are designed on the same principle as a drill chuck that accepts different size bits...although not as wide ranging.
3,915
There is a nice bit I would love to get/use but it uses a 6mm shank. My router uses 1/4 inch shank. It is a 0.014 inch difference...is it a bad idea to get this? Is there an adapter or something if not? From the comments on an answer: > > My router is a Performax trim router, there is 1/4 collect and 3/8 collect. Not sure of the model. > > >
2016/04/24
[ "https://woodworking.stackexchange.com/questions/3915", "https://woodworking.stackexchange.com", "https://woodworking.stackexchange.com/users/2073/" ]
In short: **No, no, no**. You can technically do this, unluckily, but it is **highly inadvisable**. It is a pity that it just looks like one could do it (1/2'' is not far off compared to 12mm, and 1/4'' is even closer to 6mm) and that with some luck, it indeed *seems* to "work just fine". That is true for the other way around, too. You can hardly tell a difference with the naked eye, and the bits will fit in "just fine" either way. I've seen people do it, too, and they so far got away without accident or even physical injury. (Which makes the whole matter worse because that "proves" that it works.) However, using an imperial bit in the corresponding (well, almost corresponding) metric collet is dangerous *both* during the operation *and* when using the collet with your 6mm bits as intended afterwards. What happens is that you irreversibly widen your collet by a tiny amount (too small to see, but certainly enough to be on the dangerous side). If you are unlucky, the whole thing blows to smithereens at 25k RPM with shrapnel flying all over the place and the bit come off flying in a random direction. If you are lucky it "works fine", but now the collet no longer grips the original bits firmly and safely, so you have the risk of a bit flying away in a random direction every time you use the tool "properly" with the correct bits. Plus, you never know if the collet isn't going to break a month or two later, anyway. The same is true for the opposite case, using a metric bit in an imperial collet. Only in this case, you force the clamps together much more than originally intended. There is a bit of tolerance, so you can certainly fasten the screw harshly enough to do those extra 0.3 millimeters. But it's not what the tool manufacturer intended you to do, or planned in. The bit isn't going to have a sufficiently firm, safe grip, and you cannot be sure whether you have structurally damaged the collet by bending the little clamps too harshly.
It doesn't look like there is a commercial adapter available for this. The smallest I could find are 1/4" to 4 mm. This makes sense due to the wall thickness of a 1/4" to 6 mm adapter would be just 0.175 mm (about 11/64") thick. The best option would be to find a 6 mm collet for your router (if available).
3,915
There is a nice bit I would love to get/use but it uses a 6mm shank. My router uses 1/4 inch shank. It is a 0.014 inch difference...is it a bad idea to get this? Is there an adapter or something if not? From the comments on an answer: > > My router is a Performax trim router, there is 1/4 collect and 3/8 collect. Not sure of the model. > > >
2016/04/24
[ "https://woodworking.stackexchange.com/questions/3915", "https://woodworking.stackexchange.com", "https://woodworking.stackexchange.com/users/2073/" ]
You NEED a different collet. Your router could be spinning the bit at 20,000 rpm. Ignoring the possibility of damaging your work piece, the personal risk is extremely high. edit: On @AstPace's good suggestion, I've added a couple of relevant points from the comments trail. As this router also has a 3/8" collet, you could use an adapter to get down to a 6mm shank. Now, adapters aren't great, as they're one more thing that can go wrong, but if you were desperate, you can find a 3/8" > 6mm adapter [here](http://www.elairecorp.com/colletadapter.html). (It's much easier to find adapters for 1/2" collets, but I digress.) The most obvious thing would be to find the cutter you want in a shank size you can easily use.
The OP does not have a "trim" router but a "compact" router by Performax which does provide 1/4" and 3/8" collet capacity. The trim router has ONLY the 1/4" size. Now, the answer to his question IMHO is this: If you are going to be doing this regularly, then it is not advisable. If you just want to do this job and this job ONLY, it should be fine. Just take some precautions, and try it momentarily with a slower speed first. If you hear or feel anything out of the ordinary then it's the shank vibrating. If that's the case then stop immediately and get the proper size or adapter.
3,915
There is a nice bit I would love to get/use but it uses a 6mm shank. My router uses 1/4 inch shank. It is a 0.014 inch difference...is it a bad idea to get this? Is there an adapter or something if not? From the comments on an answer: > > My router is a Performax trim router, there is 1/4 collect and 3/8 collect. Not sure of the model. > > >
2016/04/24
[ "https://woodworking.stackexchange.com/questions/3915", "https://woodworking.stackexchange.com", "https://woodworking.stackexchange.com/users/2073/" ]
You NEED a different collet. Your router could be spinning the bit at 20,000 rpm. Ignoring the possibility of damaging your work piece, the personal risk is extremely high. edit: On @AstPace's good suggestion, I've added a couple of relevant points from the comments trail. As this router also has a 3/8" collet, you could use an adapter to get down to a 6mm shank. Now, adapters aren't great, as they're one more thing that can go wrong, but if you were desperate, you can find a 3/8" > 6mm adapter [here](http://www.elairecorp.com/colletadapter.html). (It's much easier to find adapters for 1/2" collets, but I digress.) The most obvious thing would be to find the cutter you want in a shank size you can easily use.
My Makita 3709 has only one collet and the instructions booklet say that it's valid both for 6mm AND 1/4" bits. Clearly, if the collet fits 1/4" it can also fit 6mm, probably by just a tiny extra tightening.
3,915
There is a nice bit I would love to get/use but it uses a 6mm shank. My router uses 1/4 inch shank. It is a 0.014 inch difference...is it a bad idea to get this? Is there an adapter or something if not? From the comments on an answer: > > My router is a Performax trim router, there is 1/4 collect and 3/8 collect. Not sure of the model. > > >
2016/04/24
[ "https://woodworking.stackexchange.com/questions/3915", "https://woodworking.stackexchange.com", "https://woodworking.stackexchange.com/users/2073/" ]
It doesn't look like there is a commercial adapter available for this. The smallest I could find are 1/4" to 4 mm. This makes sense due to the wall thickness of a 1/4" to 6 mm adapter would be just 0.175 mm (about 11/64") thick. The best option would be to find a 6 mm collet for your router (if available).
My router has a slotted collet with threads on the outside...wherein a reciprocal threaded nut can be screwed down to tighten the collet grip on a shank that is inserted. This allows for a shank of close..but not exact same size to be used. Each manufacturer of tools use different tooling dies. This is why you can buy say a 1/2 inch socket from two different companies...and one fits perfectly on a 1/2 inch nut...and the other may be a little loose...or not go on at all...the size of the nut can even vary from one manufacturer to the next. If a shank fits into a collet easily...and the tightening nut easily locks that shank tightly into the collet...you should be fine. Simply put router collets are designed on the same principle as a drill chuck that accepts different size bits...although not as wide ranging.
3,915
There is a nice bit I would love to get/use but it uses a 6mm shank. My router uses 1/4 inch shank. It is a 0.014 inch difference...is it a bad idea to get this? Is there an adapter or something if not? From the comments on an answer: > > My router is a Performax trim router, there is 1/4 collect and 3/8 collect. Not sure of the model. > > >
2016/04/24
[ "https://woodworking.stackexchange.com/questions/3915", "https://woodworking.stackexchange.com", "https://woodworking.stackexchange.com/users/2073/" ]
My Makita 3709 has only one collet and the instructions booklet say that it's valid both for 6mm AND 1/4" bits. Clearly, if the collet fits 1/4" it can also fit 6mm, probably by just a tiny extra tightening.
My router has a slotted collet with threads on the outside...wherein a reciprocal threaded nut can be screwed down to tighten the collet grip on a shank that is inserted. This allows for a shank of close..but not exact same size to be used. Each manufacturer of tools use different tooling dies. This is why you can buy say a 1/2 inch socket from two different companies...and one fits perfectly on a 1/2 inch nut...and the other may be a little loose...or not go on at all...the size of the nut can even vary from one manufacturer to the next. If a shank fits into a collet easily...and the tightening nut easily locks that shank tightly into the collet...you should be fine. Simply put router collets are designed on the same principle as a drill chuck that accepts different size bits...although not as wide ranging.
3,915
There is a nice bit I would love to get/use but it uses a 6mm shank. My router uses 1/4 inch shank. It is a 0.014 inch difference...is it a bad idea to get this? Is there an adapter or something if not? From the comments on an answer: > > My router is a Performax trim router, there is 1/4 collect and 3/8 collect. Not sure of the model. > > >
2016/04/24
[ "https://woodworking.stackexchange.com/questions/3915", "https://woodworking.stackexchange.com", "https://woodworking.stackexchange.com/users/2073/" ]
I'm going to go against the grain here and say it's probably within spec for an ER collet. But one should always refer to the manufacturer for the last word. The ER collets have a "clampling range" which the manufacturer usually specifies. For example, see [Techniks specifications](https://www.techniksusa.com/downloads/catalogs/Collets_Nuts_Catalog.pdf). I've noticed that those ranges appear in other websites, but I'm not sure if they come from Techniks' catalog or from another source. To give an example, if a 1/4" shank measures something between 0.236" and 0.276", then it should still be within the manufacturers recommendation for a 6.0-7.0mm collet (or within 0.216"-0.255" for a 5.5-6.5mm collet). And vice-versa, if a 6mm shank measures anything between 0.211"-0.25", then it is within Technik's 1/4" collet recommendation.
My router has a slotted collet with threads on the outside...wherein a reciprocal threaded nut can be screwed down to tighten the collet grip on a shank that is inserted. This allows for a shank of close..but not exact same size to be used. Each manufacturer of tools use different tooling dies. This is why you can buy say a 1/2 inch socket from two different companies...and one fits perfectly on a 1/2 inch nut...and the other may be a little loose...or not go on at all...the size of the nut can even vary from one manufacturer to the next. If a shank fits into a collet easily...and the tightening nut easily locks that shank tightly into the collet...you should be fine. Simply put router collets are designed on the same principle as a drill chuck that accepts different size bits...although not as wide ranging.
3,915
There is a nice bit I would love to get/use but it uses a 6mm shank. My router uses 1/4 inch shank. It is a 0.014 inch difference...is it a bad idea to get this? Is there an adapter or something if not? From the comments on an answer: > > My router is a Performax trim router, there is 1/4 collect and 3/8 collect. Not sure of the model. > > >
2016/04/24
[ "https://woodworking.stackexchange.com/questions/3915", "https://woodworking.stackexchange.com", "https://woodworking.stackexchange.com/users/2073/" ]
I'm going to go against the grain here and say it's probably within spec for an ER collet. But one should always refer to the manufacturer for the last word. The ER collets have a "clampling range" which the manufacturer usually specifies. For example, see [Techniks specifications](https://www.techniksusa.com/downloads/catalogs/Collets_Nuts_Catalog.pdf). I've noticed that those ranges appear in other websites, but I'm not sure if they come from Techniks' catalog or from another source. To give an example, if a 1/4" shank measures something between 0.236" and 0.276", then it should still be within the manufacturers recommendation for a 6.0-7.0mm collet (or within 0.216"-0.255" for a 5.5-6.5mm collet). And vice-versa, if a 6mm shank measures anything between 0.211"-0.25", then it is within Technik's 1/4" collet recommendation.
The OP does not have a "trim" router but a "compact" router by Performax which does provide 1/4" and 3/8" collet capacity. The trim router has ONLY the 1/4" size. Now, the answer to his question IMHO is this: If you are going to be doing this regularly, then it is not advisable. If you just want to do this job and this job ONLY, it should be fine. Just take some precautions, and try it momentarily with a slower speed first. If you hear or feel anything out of the ordinary then it's the shank vibrating. If that's the case then stop immediately and get the proper size or adapter.
60,921
[![enter image description here](https://i.stack.imgur.com/roiXe.jpg)](https://i.stack.imgur.com/roiXe.jpg) [![enter image description here](https://i.stack.imgur.com/lKq59.jpg)](https://i.stack.imgur.com/lKq59.jpg) I have long been wondering what is the official name of this little air intake tube located in front of the fan blades and its intended functions. I did search it on google but it was in vain. I guess that it may be a pitot tube installed inside a jet engine for gauging the airspeed of the engine intake air.
2019/03/09
[ "https://aviation.stackexchange.com/questions/60921", "https://aviation.stackexchange.com", "https://aviation.stackexchange.com/users/37817/" ]
That's the EPR inlet pressure sensor (there's another one located aft of the engine in the exhaust). EPR = [Engine Pressure Ratio](https://en.wikipedia.org/wiki/Engine_pressure_ratio), one way to measure thrust. [![enter image description here](https://i.stack.imgur.com/MmdMV.jpg)](https://i.stack.imgur.com/MmdMV.jpg) ([source](http://www.industrial-electronics.com/aircraft_10b.html)) See also: * [What is the difference between EPR and rotor speed as thrust setting parameter?](https://aviation.stackexchange.com/q/32301) * [How does the EPR reading behave in reverse, and in reheat modes?](https://aviation.stackexchange.com/q/36951)
One will be the P2 (pressure) sensor, the other will be T2 (temperature)
906,331
Can subsonic help me building these main stored procedures? Can i edit its template to make it generate these SPs? Where to begin learning that?
2009/05/25
[ "https://Stackoverflow.com/questions/906331", "https://Stackoverflow.com", "https://Stackoverflow.com/users/20126/" ]
1.7GB is the 2GB (default) user mode address space less 384MB. SQL Server leaves the 384 MB by default. If you had /3GB set and 3GB RAM, it would use 2.7GB. See this article, [KB 316749](http://support.microsoft.com/default.aspx?scid=kb;EN-US;316749) which applies to SQL 7 through to SQL 2005. Oddly, I've not found this information anywhere else, even with SQL Server memory whitepapers. It's easily reproducable though.
SQL Server manages it's own memory pool, and will release memory back to the OS under memory pressure (down to the minimum set in SQL's configured values. So you do not need to be concerned.
373,963
I have been just closing the screen and I found that very convenient, but, is it better to turn off each night? Does this make any difference how long the laptop will last?
2012/01/03
[ "https://superuser.com/questions/373963", "https://superuser.com", "https://superuser.com/users/56808/" ]
For the most part I would say no, it does not matter, **as long as you have it on a hard surface where proper cooling can be achieved.** In my personal experience the hard drive of a laptop is typically the part most likely to fail, and after that the motherboard itself (usually due to a fried on board GPU). Almost all laptop failures I see are due to heat (leaving laptop on a bed, carpet, or other soft surface that does not permit good air flow). I used a laptop as a server for a while and didn't turn it off or even restart it for a year and eight months! That was several years ago and that laptop is still going strong (it was new in 2003). Most all solid state devices are pretty tough, as long as they are not abused (AKA improper cooling). And for the non-solid state part (your spinning hard drive) studies have shown (most notabley [Google's massive hard drive failure study](http://static.googleusercontent.com/external_content/untrusted_dlcp/research.google.com/en/us/archive/disk_failures.pdf)) that drives that are cooled then reheated actually fail more often than those that are just left heated/running.
Theoretically yes, it matters. Practically, not really. Most computers nowadays are pretty solid in regards to quality, and it is a fair chance that you'll be sooner changing computers than that it is going to die out of wear and tear. I put my home laptop into standby mode each night ... currently it is 28 days since it has last been restarted. It is a 6 and something year old machine. The main reason I do that however, is not to save the laptop but to enable me to sleep better.
373,963
I have been just closing the screen and I found that very convenient, but, is it better to turn off each night? Does this make any difference how long the laptop will last?
2012/01/03
[ "https://superuser.com/questions/373963", "https://superuser.com", "https://superuser.com/users/56808/" ]
Theoretically yes, it matters. Practically, not really. Most computers nowadays are pretty solid in regards to quality, and it is a fair chance that you'll be sooner changing computers than that it is going to die out of wear and tear. I put my home laptop into standby mode each night ... currently it is 28 days since it has last been restarted. It is a 6 and something year old machine. The main reason I do that however, is not to save the laptop but to enable me to sleep better.
If the environment is good enough to help preventing over-heating of the laptop, it should really not be a very big problem. In my experience, I have seen both people maintaining their laptop like a kid by turning it off even if they were away for half an hour and people who almost had it running the entire day. Well finally, the laptop which was overused or abused still works fine while the other one which was well used is now having serious problems with its battery. Personally I do not like to work with a laptop that is fuming. So I give it a break when it gets hot. Otherwise it keeps running and when I go to sleep, I hibernate it. In that way it conserves power while all my programs are in the same state when I start my laptop again.
373,963
I have been just closing the screen and I found that very convenient, but, is it better to turn off each night? Does this make any difference how long the laptop will last?
2012/01/03
[ "https://superuser.com/questions/373963", "https://superuser.com", "https://superuser.com/users/56808/" ]
For the most part I would say no, it does not matter, **as long as you have it on a hard surface where proper cooling can be achieved.** In my personal experience the hard drive of a laptop is typically the part most likely to fail, and after that the motherboard itself (usually due to a fried on board GPU). Almost all laptop failures I see are due to heat (leaving laptop on a bed, carpet, or other soft surface that does not permit good air flow). I used a laptop as a server for a while and didn't turn it off or even restart it for a year and eight months! That was several years ago and that laptop is still going strong (it was new in 2003). Most all solid state devices are pretty tough, as long as they are not abused (AKA improper cooling). And for the non-solid state part (your spinning hard drive) studies have shown (most notabley [Google's massive hard drive failure study](http://static.googleusercontent.com/external_content/untrusted_dlcp/research.google.com/en/us/archive/disk_failures.pdf)) that drives that are cooled then reheated actually fail more often than those that are just left heated/running.
If the environment is good enough to help preventing over-heating of the laptop, it should really not be a very big problem. In my experience, I have seen both people maintaining their laptop like a kid by turning it off even if they were away for half an hour and people who almost had it running the entire day. Well finally, the laptop which was overused or abused still works fine while the other one which was well used is now having serious problems with its battery. Personally I do not like to work with a laptop that is fuming. So I give it a break when it gets hot. Otherwise it keeps running and when I go to sleep, I hibernate it. In that way it conserves power while all my programs are in the same state when I start my laptop again.
172,188
I believe that having the ability to edit anything without the need for peer-review is great privilege that must not be given indiscriminately, that's why I like the 2k rep limit. **That's not enough** There are [many examples](https://stackoverflow.com/review/suggested-edits/1691555) of [1k+ users](https://stackoverflow.com/review/suggested-edits/1690343) [having their](https://stackoverflow.com/review/suggested-edits/1668330) [edits rejected](https://stackoverflow.com/review/suggested-edits/1649914). Those users will soon be able to edit anything. I suggest taking the suggested-edits history into account before giving the user the ability to edit without peer-review. For example, there can be a minimum number of suggested edits with a minimum percentage of accepted edits.
2013/03/16
[ "https://meta.stackexchange.com/questions/172188", "https://meta.stackexchange.com", "https://meta.stackexchange.com/users/190495/" ]
> > That's not enough. > > > Why isn't it? Do you have evidence that there are a plethora of users who tip over the threshold and begin making a bunch of bad edits that need to be rolled back? Even then, the proper action is to roll them back and notify them of their mistakes. That's why those features exist. If their behavior gets extraordinarily bad, then flag for a moderator to take action. > > There are many examples of 1k+ users having their edits rejected. > > > Those aren't really "good" examples. Suggested edits tend to be held to higher standards than regular edits, requiring approval from *multiple* other users. They even have a minimum character limit that doesn't exist for users with full editing privileges. In cases of edits being rejected as too minor, those edits aren't necessarily *bad* but just don't address everything in the post, and they certainly shouldn't be held against the user in question. > > I suggest taking the suggested-edits history into account before giving the user the ability to edit without peer-review. > > > A reject history is not *necessarily* a bad thing. Hopefully, through the rejections, the user has learned from their mistakes and improved the quality of edits that they're making. Users who get too many rejects get banned for a while which is a big indicator that their actions require improvement. For those complaining that they never see them, that's a flaw of the system. I don't see how making the privilege more complicated with something like this is a "solution" to not giving users proper feedback on their rejections. > > There can be a minimum number of suggested edits with a minimum percentage of accepted edits. > > > This completely ignores users who just plain don't participate in the suggested edits system as frequently as others. Just because they've only made a few edits since they joined doesn't mean they're not qualified to make more edits. You also don't account for the many, *many* users who reached 2,000 reputation *before* the suggested edits system was even put into effect and wouldn't have much of a history at all (aside from tag wiki edits). Sorry, but I don't find a user's suggested edit history to be a good indication of their editing abilities, nor have I seen any evidence that the way things currently work is causing any noticeable harm. There are probably just as many users out there that would qualify under these terms making bad edits to posts that need rolled back. What do you propose we do to stop *them*?
> > There are many examples of 1k+ users having their edits rejected. Those users will soon be able to edit anything. > > > All of those edits have something in common: they were rejected for being "too minor." So how much you support this depends on how much you believe that small fix edits are a bad thing. It makes sense that you shouldn't get 2 rep for fixing a typo. We don't want people farming 1k of rep just by making minor typo fixes. But as far as I'm concerned, if you have 2k rep, you should be able to fix typos to your heart's content. I don't believe that people should have to fix everything in a post, or even most things, just to fix *something*. If I only want to take 5 seconds to correct a typo, I should be able to do so. I earned that right by participating in SO, by gaining 2k rep. My counter-question is why *shouldn't* these people be allowed to improve posts? It'd be one thing if you were talking about people who are doing bad things to posts. But these are improving the post. Not as much as some might like, but they're making the questions or answers better.
348,684
I've edited an MP4 movie file in Quicktime Player Version 10.5. When I try to save the edited file, I get: The operation could not be completed. Does anyone know what causes this and/or how it can be solved? macOS Mojave 10.14.2 / Quicktime Player 10.5 / MacBook Pro (Retina, 13-inch, Early 2015)
2019/01/15
[ "https://apple.stackexchange.com/questions/348684", "https://apple.stackexchange.com", "https://apple.stackexchange.com/users/155274/" ]
For me, the error came as I was editing in Quick-Time by right-clicking on the imported video in the Photos app. Once I dragged the video (export) to a directory, and **then** edited the `.mp4` file, all was fine. No errors when Trimming and Saving.
I get this error all the time as well (usually with error code -12780). I have a feeling it is related to files that have small errors (like missing keyframes, or a videotrack that is out of sync with the audiotrack). Unfortunately the only solution i have found thus far is re-encoding the video and trying again (using a tool like ffmpeg or Handbrake) or using editing software like Premiere Pro / iMovie / Final Cut. In both cases, you need to re-encode the video and it will take some time.
348,684
I've edited an MP4 movie file in Quicktime Player Version 10.5. When I try to save the edited file, I get: The operation could not be completed. Does anyone know what causes this and/or how it can be solved? macOS Mojave 10.14.2 / Quicktime Player 10.5 / MacBook Pro (Retina, 13-inch, Early 2015)
2019/01/15
[ "https://apple.stackexchange.com/questions/348684", "https://apple.stackexchange.com", "https://apple.stackexchange.com/users/155274/" ]
For me, the error came as I was editing in Quick-Time by right-clicking on the imported video in the Photos app. Once I dragged the video (export) to a directory, and **then** edited the `.mp4` file, all was fine. No errors when Trimming and Saving.
Not an actual answer. But inform some important piece of information. I encounter the same problem. The error code is "-12769" Found out that there are some input videos which worked. And when I compare both info of videos. A video that's work : [![Good video](https://i.stack.imgur.com/iT4iE.png)](https://i.stack.imgur.com/iT4iE.png) A video that's doesn't : [![Bad video](https://i.stack.imgur.com/JSkIg.png)](https://i.stack.imgur.com/JSkIg.png) The only difference is encoding software between Lavf57.19.100 vs Lavf58.12.100
348,684
I've edited an MP4 movie file in Quicktime Player Version 10.5. When I try to save the edited file, I get: The operation could not be completed. Does anyone know what causes this and/or how it can be solved? macOS Mojave 10.14.2 / Quicktime Player 10.5 / MacBook Pro (Retina, 13-inch, Early 2015)
2019/01/15
[ "https://apple.stackexchange.com/questions/348684", "https://apple.stackexchange.com", "https://apple.stackexchange.com/users/155274/" ]
I had a similar problem when I downloaded a youtube video, opened in Quicktime to "trim" the video and quick time would not complete the operation. I ran the youtube video through Vlc Crunch (free video converter)as mp4 again and then Quicktime worked fine.
This is an old question but I will answer it for others having the same issue. (Added note: I just realized my error is slightly different - it won't save because I don't have permission). I just solved it by changing the folder it's saved to. It was defaulting to my Mac hard drive and for some reason would not save there. I changed it to another folder and it saved just fine. Hope this helps someone.
348,684
I've edited an MP4 movie file in Quicktime Player Version 10.5. When I try to save the edited file, I get: The operation could not be completed. Does anyone know what causes this and/or how it can be solved? macOS Mojave 10.14.2 / Quicktime Player 10.5 / MacBook Pro (Retina, 13-inch, Early 2015)
2019/01/15
[ "https://apple.stackexchange.com/questions/348684", "https://apple.stackexchange.com", "https://apple.stackexchange.com/users/155274/" ]
Guyz hello, i'm on High Sierra, i have that error "The operation could not be completed / Impossibile completare l'operazione", it happens often when i trim / cut a downloaded .mp4 video(same happened on el capitan), i think it cause there are small problems/errors after the download of a video, also if video is well played by Quick Time / VLC. So i simply copy the downloaded video and paste it in another location, example - copy from download folder and paste to desktop. Then i can save the trimmed / cutted video. I think after copy in some magic way OSX corrects those small errors. Hope it will work for you also! Have a nice day!^^
This is an old question but I will answer it for others having the same issue. (Added note: I just realized my error is slightly different - it won't save because I don't have permission). I just solved it by changing the folder it's saved to. It was defaulting to my Mac hard drive and for some reason would not save there. I changed it to another folder and it saved just fine. Hope this helps someone.
348,684
I've edited an MP4 movie file in Quicktime Player Version 10.5. When I try to save the edited file, I get: The operation could not be completed. Does anyone know what causes this and/or how it can be solved? macOS Mojave 10.14.2 / Quicktime Player 10.5 / MacBook Pro (Retina, 13-inch, Early 2015)
2019/01/15
[ "https://apple.stackexchange.com/questions/348684", "https://apple.stackexchange.com", "https://apple.stackexchange.com/users/155274/" ]
I had a similar problem when I downloaded a youtube video, opened in Quicktime to "trim" the video and quick time would not complete the operation. I ran the youtube video through Vlc Crunch (free video converter)as mp4 again and then Quicktime worked fine.
Not an actual answer. But inform some important piece of information. I encounter the same problem. The error code is "-12769" Found out that there are some input videos which worked. And when I compare both info of videos. A video that's work : [![Good video](https://i.stack.imgur.com/iT4iE.png)](https://i.stack.imgur.com/iT4iE.png) A video that's doesn't : [![Bad video](https://i.stack.imgur.com/JSkIg.png)](https://i.stack.imgur.com/JSkIg.png) The only difference is encoding software between Lavf57.19.100 vs Lavf58.12.100
348,684
I've edited an MP4 movie file in Quicktime Player Version 10.5. When I try to save the edited file, I get: The operation could not be completed. Does anyone know what causes this and/or how it can be solved? macOS Mojave 10.14.2 / Quicktime Player 10.5 / MacBook Pro (Retina, 13-inch, Early 2015)
2019/01/15
[ "https://apple.stackexchange.com/questions/348684", "https://apple.stackexchange.com", "https://apple.stackexchange.com/users/155274/" ]
Guyz hello, i'm on High Sierra, i have that error "The operation could not be completed / Impossibile completare l'operazione", it happens often when i trim / cut a downloaded .mp4 video(same happened on el capitan), i think it cause there are small problems/errors after the download of a video, also if video is well played by Quick Time / VLC. So i simply copy the downloaded video and paste it in another location, example - copy from download folder and paste to desktop. Then i can save the trimmed / cutted video. I think after copy in some magic way OSX corrects those small errors. Hope it will work for you also! Have a nice day!^^
Not an actual answer. But inform some important piece of information. I encounter the same problem. The error code is "-12769" Found out that there are some input videos which worked. And when I compare both info of videos. A video that's work : [![Good video](https://i.stack.imgur.com/iT4iE.png)](https://i.stack.imgur.com/iT4iE.png) A video that's doesn't : [![Bad video](https://i.stack.imgur.com/JSkIg.png)](https://i.stack.imgur.com/JSkIg.png) The only difference is encoding software between Lavf57.19.100 vs Lavf58.12.100
348,684
I've edited an MP4 movie file in Quicktime Player Version 10.5. When I try to save the edited file, I get: The operation could not be completed. Does anyone know what causes this and/or how it can be solved? macOS Mojave 10.14.2 / Quicktime Player 10.5 / MacBook Pro (Retina, 13-inch, Early 2015)
2019/01/15
[ "https://apple.stackexchange.com/questions/348684", "https://apple.stackexchange.com", "https://apple.stackexchange.com/users/155274/" ]
I found a workaround. It seems that QuickTime is able to handle the file via the **Share** feature but not the **Export**. You can choose to **share to Messages** and then save the file from there, or use [Shareful](https://apps.apple.com/us/app/shareful/id1522267256?mt=12), a small free app that lets you enable a "Save as" option in the Share menu. [![Share -> Save As…](https://i.stack.imgur.com/8eipy.png)](https://i.stack.imgur.com/8eipy.png)
This is an old question but I will answer it for others having the same issue. (Added note: I just realized my error is slightly different - it won't save because I don't have permission). I just solved it by changing the folder it's saved to. It was defaulting to my Mac hard drive and for some reason would not save there. I changed it to another folder and it saved just fine. Hope this helps someone.
348,684
I've edited an MP4 movie file in Quicktime Player Version 10.5. When I try to save the edited file, I get: The operation could not be completed. Does anyone know what causes this and/or how it can be solved? macOS Mojave 10.14.2 / Quicktime Player 10.5 / MacBook Pro (Retina, 13-inch, Early 2015)
2019/01/15
[ "https://apple.stackexchange.com/questions/348684", "https://apple.stackexchange.com", "https://apple.stackexchange.com/users/155274/" ]
Guyz hello, i'm on High Sierra, i have that error "The operation could not be completed / Impossibile completare l'operazione", it happens often when i trim / cut a downloaded .mp4 video(same happened on el capitan), i think it cause there are small problems/errors after the download of a video, also if video is well played by Quick Time / VLC. So i simply copy the downloaded video and paste it in another location, example - copy from download folder and paste to desktop. Then i can save the trimmed / cutted video. I think after copy in some magic way OSX corrects those small errors. Hope it will work for you also! Have a nice day!^^
I get this error all the time as well (usually with error code -12780). I have a feeling it is related to files that have small errors (like missing keyframes, or a videotrack that is out of sync with the audiotrack). Unfortunately the only solution i have found thus far is re-encoding the video and trying again (using a tool like ffmpeg or Handbrake) or using editing software like Premiere Pro / iMovie / Final Cut. In both cases, you need to re-encode the video and it will take some time.
348,684
I've edited an MP4 movie file in Quicktime Player Version 10.5. When I try to save the edited file, I get: The operation could not be completed. Does anyone know what causes this and/or how it can be solved? macOS Mojave 10.14.2 / Quicktime Player 10.5 / MacBook Pro (Retina, 13-inch, Early 2015)
2019/01/15
[ "https://apple.stackexchange.com/questions/348684", "https://apple.stackexchange.com", "https://apple.stackexchange.com/users/155274/" ]
For me, the error came as I was editing in Quick-Time by right-clicking on the imported video in the Photos app. Once I dragged the video (export) to a directory, and **then** edited the `.mp4` file, all was fine. No errors when Trimming and Saving.
This is an old question but I will answer it for others having the same issue. (Added note: I just realized my error is slightly different - it won't save because I don't have permission). I just solved it by changing the folder it's saved to. It was defaulting to my Mac hard drive and for some reason would not save there. I changed it to another folder and it saved just fine. Hope this helps someone.
348,684
I've edited an MP4 movie file in Quicktime Player Version 10.5. When I try to save the edited file, I get: The operation could not be completed. Does anyone know what causes this and/or how it can be solved? macOS Mojave 10.14.2 / Quicktime Player 10.5 / MacBook Pro (Retina, 13-inch, Early 2015)
2019/01/15
[ "https://apple.stackexchange.com/questions/348684", "https://apple.stackexchange.com", "https://apple.stackexchange.com/users/155274/" ]
I found a workaround. It seems that QuickTime is able to handle the file via the **Share** feature but not the **Export**. You can choose to **share to Messages** and then save the file from there, or use [Shareful](https://apps.apple.com/us/app/shareful/id1522267256?mt=12), a small free app that lets you enable a "Save as" option in the Share menu. [![Share -> Save As…](https://i.stack.imgur.com/8eipy.png)](https://i.stack.imgur.com/8eipy.png)
Not an actual answer. But inform some important piece of information. I encounter the same problem. The error code is "-12769" Found out that there are some input videos which worked. And when I compare both info of videos. A video that's work : [![Good video](https://i.stack.imgur.com/iT4iE.png)](https://i.stack.imgur.com/iT4iE.png) A video that's doesn't : [![Bad video](https://i.stack.imgur.com/JSkIg.png)](https://i.stack.imgur.com/JSkIg.png) The only difference is encoding software between Lavf57.19.100 vs Lavf58.12.100
1,175,215
I'm running 1511 version of Windows 10 Pro. Update 1607 doesn't work at all. It was tried to be installed about 10 times and each time it fails completely. I have set postpone updates to avoid installing this update over and over but now it doesn't work any more for this update. So now it's being downloaded over and over, after restart it fails installing and then it will be downloaded again and fails again. Is there any way to block this update? I'm afraid it will either destroy my SSD one day or after 100 or so attempt finally it will crash Windows and I will have to install it from scratch.
2017/02/04
[ "https://superuser.com/questions/1175215", "https://superuser.com", "https://superuser.com/users/374851/" ]
To sum up, It seems there's no way to block this update any more. The only way to install it in my case was downloading ISO file download [media creation tool](https://www.microsoft.com/en-gb/software-download/windows10) and choosing to create ISO file, burning it to DVD and when running choosing installation of fresh system. All other methods in my case failed.
Somebody linked this question to mine as it was similar so I figured that after finding the solution I should also post it here so more people could find it: > > EDIT, SOLUTION FOUND!!! > > > Okay so it looks like I may have cracked this :D > > > 1. Install Windows 10 1511 with NIC cable unplugged. > 2. Connect the NIC cable and download Microsoft's Wushowhide tool (KB 3073930). > 3. Let Windows Update find updates. > 4. Use the Wushowhide tool to block the 1607 update. > 5. As it's already downloaded or downloading the 1607 update you need to stop the Windows Update service, delete everything in the download > cache, then restart the service and reboot. > 6. That's it, it should now download and apply all updates except 1607 (and updates for 1607). > > > Glad I was able to solve this instead of having to drop £1K on a new > CPU/board/RAM, but I still say it was a TERRIBLE move by Microsoft to > make an update that was causing widespread issues mandatory. > > >
1,175,215
I'm running 1511 version of Windows 10 Pro. Update 1607 doesn't work at all. It was tried to be installed about 10 times and each time it fails completely. I have set postpone updates to avoid installing this update over and over but now it doesn't work any more for this update. So now it's being downloaded over and over, after restart it fails installing and then it will be downloaded again and fails again. Is there any way to block this update? I'm afraid it will either destroy my SSD one day or after 100 or so attempt finally it will crash Windows and I will have to install it from scratch.
2017/02/04
[ "https://superuser.com/questions/1175215", "https://superuser.com", "https://superuser.com/users/374851/" ]
To sum up, It seems there's no way to block this update any more. The only way to install it in my case was downloading ISO file download [media creation tool](https://www.microsoft.com/en-gb/software-download/windows10) and choosing to create ISO file, burning it to DVD and when running choosing installation of fresh system. All other methods in my case failed.
try using **WinaeroTweaker**, and set the settings notify to update. It worked when I used windows 10. download link - <http://winaero.com/request.php?1796>
1,175,215
I'm running 1511 version of Windows 10 Pro. Update 1607 doesn't work at all. It was tried to be installed about 10 times and each time it fails completely. I have set postpone updates to avoid installing this update over and over but now it doesn't work any more for this update. So now it's being downloaded over and over, after restart it fails installing and then it will be downloaded again and fails again. Is there any way to block this update? I'm afraid it will either destroy my SSD one day or after 100 or so attempt finally it will crash Windows and I will have to install it from scratch.
2017/02/04
[ "https://superuser.com/questions/1175215", "https://superuser.com", "https://superuser.com/users/374851/" ]
To sum up, It seems there's no way to block this update any more. The only way to install it in my case was downloading ISO file download [media creation tool](https://www.microsoft.com/en-gb/software-download/windows10) and choosing to create ISO file, burning it to DVD and when running choosing installation of fresh system. All other methods in my case failed.
I eliminated updating Win 10 this way: 1. I determined what IP this update was originating from and blocked it with a firewall rule. 2. I blocked the win10 Update exe in my firewall's Programs db. 3. I took ownership of the update file and folders (one in c drive, one in Windows) and denied access to System and Trusted Installer. Then I deleted them. 4. Finally, I wrote a firewall rule to block the Microsoft update service IP. Now I pick and choose what updates I want to download and install manually. And the aggravating update pop-up and the automatic download of Win 10 Anniversary Edition is GONE! 5. As an added precaution I blocked my anti-virus program from updating to a newer version,in case MS forces the company to change engine to keep me from blocking them.
14,302
OK, I know how it sounds, but this really happened today! As is usual with boys, while changing the diaper he transformed into a fountain. I tried to cover myself with my hand, which deflected the stream and a few drops got into his ear. I was told that you should not try to wash/clean internal parts of an ear of a new-born child. OTOH, I believe that humidity inside ear, hygiene, and aesthetics provide some good reasons to clean up the mess in this case. Are the acids from child's urine dangerous for ears? What should I use to clean it up?
2014/07/07
[ "https://parenting.stackexchange.com/questions/14302", "https://parenting.stackexchange.com", "https://parenting.stackexchange.com/users/9323/" ]
Just a few drops of urine is entirely inconsequential. You can wipe away any wetness that is on the skin and in the outer ear, but don't do anything inside the ear canal. If it's *a lot* then you could wash the outer ear just like you would during bath-time, but still leave the inner ear alone. The fresh air often encourages a bit of peeing but [as I mentioned here](https://parenting.stackexchange.com/a/4466/109) you can avoid "rogue peeing" by covering the crotch with a washcloth when you open the diaper.
Urine is sterile leaving the baby's bladder, but doesn't stay that way for long; it is an ideal growth medium for bacteria. Personally, I would rinse it out, just as I would had it hit any other part of his body. There is nothing wrong with getting clean water in your baby's ears. You will not get water in the inner ear (that is the third and deepest part of the ear) or the middle ear (where ear infections occur). The outer ear ends at the tympanic membrane (aka the ear drum), which will keep everything out of the middle ear. The infant's ear canal is not deep or angled at this point, and it should be easy to rinse out. While you are washing the scalp/face/etc., just let some drops of *clean warm water* run from the outer ear into the canal (Cool water won't hurt him, but it's uncomfortable; in fact, using cold water ellicits an attack of vertigo; the test is called "cold water calorics"!) When the canal is full, turn your baby's head so that the water runs out. If it's been a while since this happened, repeat once. Dry well with a towel, again turning your baby's head so that the canal drains. Male infants do urinate on themselves. You would wash his face if he urinated on it, wouldn't you? Same applies to the ear. No biggie. He won't get "swimmer's ear" if that's what you're afraid of, and a middle ear infection is not possible this way. I'd be more concerned about bacteria growing in what little urine is left in the ear canal than any harm from rinsing it out.
8,520,626
Looking at [Twitter OAuth Libraries](https://dev.twitter.com/docs/twitter-libraries), I saw this note: > > Be cautious when using JavaScript with OAuth. Don't expose your keys. > > > Then, looking at [jsOAuth examples](https://github.com/bytespider/jsOAuth), I noticed that the keys are exposed in the code. So my question is: How it is possible to not expose your keys when you use an OAuth library in Javascript? Thanks. UPDATE: Ok, maybe jsOAuth is not the right library to use, but how it is possible to do authentication with OAuth on a full Javascript web site?
2011/12/15
[ "https://Stackoverflow.com/questions/8520626", "https://Stackoverflow.com", "https://Stackoverflow.com/users/856672/" ]
As said in the documentation linked by you: > > Written in JavaScript, jsOAuth aims to be a fully featured open source OAuth library for use in Adobe AIR, Appcelerator Titanium and PhoneGAP. In fact, anywhere that javascript can be used and has cross-domain XMLHttpRequests. **For security reasons jsOAuth doesn't run in the browser. Browsers are only mentioned here for running the test suite**. If you need jsOAuth in the browser, write an extension. > > > --- A good answer to your added question is available here: * [Secure OAuth in Javascript](https://stackoverflow.com/questions/6144826/secure-oauth-in-javascript)
The only really reasonable way, right now, to do OAuth 1 in the browser, is to route API-calls via your server. There simply is no way, as far as I have understood it, around this. If you do OAuth 1.0a calls through JavaScript from the browser -> You will HAVE to expose your consumer secret and access token secret, to at least the end user. You cannot store these credentials in: * a cookie, the user can find them. * local storage, the user can find them (better than cookie though, since it does not entail sending a cookie back and forth all the time over HTTP) * in javascript, the user can find them (although this is probably your best bet since it is easier to obscure). If it were only the access token secret that was exposed to the end user, that would be bearable - since it is in fact he/she who have authenticated your application. But losing your consumer secret is really not so hot, it means that your application is eligible for identity theft. I.e someone else could write an app that claims to be your app. Even if you made it work securely in the browser, you are hampered by cross domain security blocks.
8,520,626
Looking at [Twitter OAuth Libraries](https://dev.twitter.com/docs/twitter-libraries), I saw this note: > > Be cautious when using JavaScript with OAuth. Don't expose your keys. > > > Then, looking at [jsOAuth examples](https://github.com/bytespider/jsOAuth), I noticed that the keys are exposed in the code. So my question is: How it is possible to not expose your keys when you use an OAuth library in Javascript? Thanks. UPDATE: Ok, maybe jsOAuth is not the right library to use, but how it is possible to do authentication with OAuth on a full Javascript web site?
2011/12/15
[ "https://Stackoverflow.com/questions/8520626", "https://Stackoverflow.com", "https://Stackoverflow.com/users/856672/" ]
As said in the documentation linked by you: > > Written in JavaScript, jsOAuth aims to be a fully featured open source OAuth library for use in Adobe AIR, Appcelerator Titanium and PhoneGAP. In fact, anywhere that javascript can be used and has cross-domain XMLHttpRequests. **For security reasons jsOAuth doesn't run in the browser. Browsers are only mentioned here for running the test suite**. If you need jsOAuth in the browser, write an extension. > > > --- A good answer to your added question is available here: * [Secure OAuth in Javascript](https://stackoverflow.com/questions/6144826/secure-oauth-in-javascript)
You could also make a script that sends all necessary values and parameters to the server to do the signing with. The signed URL can then be sent back to the client (browser) that in turn does the actual request. I have implemented OAuth 1.0a on the Twitter API that way using jsonp requests. The benefit of this is that the response body is not relayed via your server, saving bandwidth. That way you can have your cookie and eat it too.
8,520,626
Looking at [Twitter OAuth Libraries](https://dev.twitter.com/docs/twitter-libraries), I saw this note: > > Be cautious when using JavaScript with OAuth. Don't expose your keys. > > > Then, looking at [jsOAuth examples](https://github.com/bytespider/jsOAuth), I noticed that the keys are exposed in the code. So my question is: How it is possible to not expose your keys when you use an OAuth library in Javascript? Thanks. UPDATE: Ok, maybe jsOAuth is not the right library to use, but how it is possible to do authentication with OAuth on a full Javascript web site?
2011/12/15
[ "https://Stackoverflow.com/questions/8520626", "https://Stackoverflow.com", "https://Stackoverflow.com/users/856672/" ]
The only really reasonable way, right now, to do OAuth 1 in the browser, is to route API-calls via your server. There simply is no way, as far as I have understood it, around this. If you do OAuth 1.0a calls through JavaScript from the browser -> You will HAVE to expose your consumer secret and access token secret, to at least the end user. You cannot store these credentials in: * a cookie, the user can find them. * local storage, the user can find them (better than cookie though, since it does not entail sending a cookie back and forth all the time over HTTP) * in javascript, the user can find them (although this is probably your best bet since it is easier to obscure). If it were only the access token secret that was exposed to the end user, that would be bearable - since it is in fact he/she who have authenticated your application. But losing your consumer secret is really not so hot, it means that your application is eligible for identity theft. I.e someone else could write an app that claims to be your app. Even if you made it work securely in the browser, you are hampered by cross domain security blocks.
You could also make a script that sends all necessary values and parameters to the server to do the signing with. The signed URL can then be sent back to the client (browser) that in turn does the actual request. I have implemented OAuth 1.0a on the Twitter API that way using jsonp requests. The benefit of this is that the response body is not relayed via your server, saving bandwidth. That way you can have your cookie and eat it too.
158,593
While at home for the holidays, I noticed that the old iMac is probably on its last legs. I'd like to get a Time Capsule so that the documents are backed up when the time comes. However, the thought crossed my mind that the old iMac with OS X 10.5 might not be compatible with the new Time Capsule.
2014/11/29
[ "https://apple.stackexchange.com/questions/158593", "https://apple.stackexchange.com", "https://apple.stackexchange.com/users/98840/" ]
The new Time Capsules require OS X 10.75 and later: <http://www.apple.com/airport-time-capsule/specs/> Your best option is to upload your documents online (Dropbox, Google Drive, etc.) as your 10.5 backup on an external drive say, may not restore to the current version of OS X.
Purchase an inexpensive USB external HD and either manually copy the user's data from iMac to HD, or do a Time Machine or [SuperDuper!](http://www.shirt-pocket.com/SuperDuper/SuperDuperDescription.html) backup. Time Machine and Migration Assistant are a perfect pair for restoring older systems to new. Be aware that in order to run Migration Assistant on a newer version of Mac OS X, the Time Machine source backup must be created on a Snow Leopard (10.6.8 latest) or later installation, so you will need to upgrade this Mac, if possible. You can purchase Snow Leopard from Apple for [$19.99](http://store.apple.com/us/product/MC573Z/A/mac-os-x-106-snow-leopard).
102,172
I've read that putting a dynamic clock or meteo widget on the page could boost SEO because each time Googlebot visits the page, it thinks the page has been updated with new content. It seems to me that this advice is really really outdated but I wanted to check with experts first.
2016/12/19
[ "https://webmasters.stackexchange.com/questions/102172", "https://webmasters.stackexchange.com", "https://webmasters.stackexchange.com/users/1430/" ]
Working from this: *...dynamic clock or meteo widget on the page could boost the SEO... ...has been updated with new content.* Short answer? No. Not even close. Search engines, using more than one page, can determine patterns within the HTML DOM model that separates the header, footer, sidebar, and any other page element that is truly **not** content. The idea is to evaluate the content and not things that do not add value to the content directly. *Let's assume for a moment, that the "clock" is within the content itself.* Search engines do not look at content in a linear way. It can't. Computers do not read and cannot evaluate what *they see* in a way that humans can. For this reason, the evaluation of the content uses semantic analysis including semantic topic scores, semantic linguistics, and others to evaluate the content itself. What Google, in particular, *sees* would be small changes in content scoring if at all. These methods adequately handle restructuring and reordering of content, spinning content, keyword stuffing, content gibberish, and any other trick that was designed to deceive search engines. Content has to have meaning. Adding erroneous elements that do not add meaning do not add value. It is that simple. For content to be fresh, there are several factors that are in play. One is whether or not new content is update routinely. Another is whether older content is updated periodically as appropriate. Another still is how factual a page is as compared to other content on the web. There are quite a few metrics that determine freshness. Not every page has to be updated to be considered fresh. Relevance and search engine result page (SERP) performance is a factor too. Freshness is not simply updating a page. It is a series of metrics site wide that determines if content is fresh. As a warning, please do not follow the advice of junk SEO sites. There are too many of them. There are no tricks that work. Any SEO advice that is even hinting at an advantage outside of creating compelling, well written, sought after, and well structured content is very likely leading you down a very foolish path.
Fresh content doesn't even always help SEO. For many (probably most) topics Google likes content that is tried and true. Content to which it knows users react favorably. Some areas, like news, require fresh content. Google has the concept of [query deserves freshness](https://moz.com/blog/whiteboard-friday-query-deserves-freshness) or QDF. If timely information is important to the visitors in your niche, then you should put the actual date and time for the article prominently on the page so that users can know whether it is fresh or not. Putting a clock on the page is no way to fool Google into thinking you have timely, relevant news articles.
318,535
So I have a question for those who are a little more clued up on this than myself. I have a laptop which is about 2 years old now and has been plaguing me with various issues for some time. The most common issues I get are overheating, complete halts, and random shutdowns. The difference between overheating shutdowns and random ones are that when it overheats, it shuts down telling me that it's reached a critical temperature, whilst random is like someone pulled the power out and just goes pooof and off it is. At first I thought I might have bad ventilation, serious overheating on the CPU, RAM and things like that. But I happened to stumble upon a small issue being mentioned on a hard drive test. Over the last few days things went from bad to worse. For instance, last night I had booted the laptop from cold and opened the Downloads folder (which was slow, unresponsive and buggy for a few seconds) and then opened a video file (something i've done 1000x without issues) only this time I heard the startup music but the screen was blank, so trying to close the app, I discovered the laptop had completely frozen, no mouse movement and no response to any keyboard, so I was forced to do a restart. Needless ton say, I'm now doing a `dd` clone to another hard drive I have. I want to say before I actually ask the question, that I had opened up the laptop a few weeks ago and to my surprise saw nothing wrong at all, no dust, no hint of burn marks, everything looked completely in tact. My question is, if my harddrive is the problem and it's starting to fail, can that also be responsible for heating issues?
2013/07/10
[ "https://askubuntu.com/questions/318535", "https://askubuntu.com", "https://askubuntu.com/users/57196/" ]
> > My question is, if my harddrive is the problem and it's starting to fail, can that also be responsible for heating issues? > > > I won't say it's impossible but I've never seen it. Most disks are quite a long way away from the important parts. I'm sure some know-it-all will come along with an example where the disk is mounted on the CPU as its heatsink, but that isn't common. The HD is usually nice and accessible for maintenance, upgrades, etc. I would sooner blame the repetitive overheating doing damage. I've had a few thermal casualties over a couple of decades and not one left a scorch mark. The slot-CPU casing melted once (that was fun) but that was the only time I've ever *seen* evidence that the system got too hot. And remember there's nothing to say that this is just one issue. Disks fail all the time. Laptops cook themselves all the time. It could be possible that both are happening to you.
If you are able to test run the laptop while it is open you night check the heat pipe. its the flattened tube that runs from the CPU to the vents in the back or side on the unit, i have encountered at least one machine whos heat pipe leaked out the gas and the CPU got hot to the point of thermal shutdown but the fan exaust was still cold. the heat pipe wasn't transferring the heat away!
580,302
According to <https://www.britannica.com/science/Schwarzschild-radius>, the Schwarzschild radius for a black hole with the mass of the Sun is about 2 miles. My question is what is inside of it? Is whatever is inside of it similar to what surrounds it? Can particles escape? Or does the whole sun have to collapse into it for particles to be trapped inside of it?
2020/09/17
[ "https://physics.stackexchange.com/questions/580302", "https://physics.stackexchange.com", "https://physics.stackexchange.com/users/7870/" ]
It's not relevant to the physics of the sun. Nothing happens there. You can construct an exact solution to general relativity describing an idealized star (spherically symmetric, nonrotating, surrounded by vacuum). You do this by combining an interior solution describing the matter with an exterior solution describing the vacuum around it. The vacuum part of the solution is the Schwarzschild geometry. If you extend the Schwarzschild geometry inward to the center, strange things happen at the Schwarzschild radius. But in the stellar model, that part of the solution isn't used; a different solution to general relativity applies there. The odd behavior of the vacuum solution would only be relevant if the star collapsed to a size comparable to that radius, which never happens to solar-mass stars.
The schwarzschild radius defines the location of the event horizon that surrounds a black hole. Note that there *is* no black hole inside the sun because the density of the material in the sun's core is insufficient to create one. But if there were, the rest of the sun would fall into it quickly and from our point of view all that matter would get squashed onto the event horizon and flattened to zero thickness. As stated in your question, for that to happen, the mass of the entire sun would need to be compressed down into a sphere 2 km across. This will never occur in the sun's lifetime.
4,828,781
I am currently building an online store using magento. After placing an order, customers automatically receive an "order confirmation". However, I would like to check first first if this order can be processed (for several reasons) and after that, send an "order acceptance" email saying that we accepted the order starting to process it. I cant believe that magento lacks this feature. However I also need to send several other emails: * when payment is received * when more preoducts need to be ordered * when we received the products otderd by the customer.. Does anybody have any clue, how something like this can be accomplished? Thanks in advance!
2011/01/28
[ "https://Stackoverflow.com/questions/4828781", "https://Stackoverflow.com", "https://Stackoverflow.com/users/593899/" ]
do you know any other e-commerce platform on php that has this feature ? You most certainly can 1. overwrite the saveOrder() method in Mage\_Checkout\_Model\_Type\_Onepage that calls out the sending of this e-mail 2. overwrite sendNewOrderEmail() method in Mage\_Sales\_Model\_Order that defines this method 3. overwrite the canSendNewOrderEmail() method in Mage\_Sales\_Helper\_Data that handles the validation if sending this mail is allowed 4. edit the sales\_email/order/enabled config value, that is used to control the condition on helper method, to be false from admin page After that you have to implement your own status based e-mail sending in your extension observer . You can observe the save\_order\_after event to do that and you can call for the same method as it is accessible from order object
**Note : This is commercial software** We have used this extension by [amasty called order status](http://amasty.com/order-status.html). It works very well. It will fire off an email from the transactional emails when a certain status has been changed.
16,856,572
I am creating a Rails 3.2 application where I use Paymill to handle payments. I can make one off payments using Active merchant. The problem with this is I cannot find a way to send the name of the buyer and the email address so the Paymill Client is incomplete. Also I would like to be able to create a Paymill subscription using Active merchant. Is this possible? I know there is a Javascript version of the payment system and it works. Problem is I do not want to use Javascript, only ruby. I have used this guide: [How to make a payment via Paymill using Ruby](https://stackoverflow.com/questions/15089973/how-to-make-a-payment-via-paymill-using-ruby) Thankful for all help!
2013/05/31
[ "https://Stackoverflow.com/questions/16856572", "https://Stackoverflow.com", "https://Stackoverflow.com/users/261694/" ]
Please, do NOT use Active Merchant if you don't have the proper PCI certifications. The Javascript version is the only way to use our service and profiting from our PCI compliance. That being said, please take a look at the following paymill-ruby-wrapper, which has been provided by a third party developer - maybe it serves your purpose: <https://github.com/dkd/paymill-ruby> Best regards, Julian (disclaimer: I work at PAYMILL)
Julian is right, you should *not* use ActiveMerchant except if you have the proper PCI certifications. It seems you want to do something like this: 1) Create a client object, passing the name (description) and email as parameters. See this: <https://www.paymill.com/de-de/dokumentation/referenz/api-referenz/#create-new-client> 2) Create a payment method object, passing the client as parameter (and the token retrieved by the JavaScript bridge): <https://www.paymill.com/de-de/dokumentation/referenz/api-referenz/#create-new-credit-card-payment-with> 3) Make a new transaction, passing the payment method object: <https://www.paymill.com/de-de/dokumentation/referenz/api-referenz/#create-new-transaction-with> And to create a subscription, you need to have an offer object and a client with a valid payment method: <https://www.paymill.com/de-de/dokumentation/referenz/api-referenz/#create-new-subscription>
72,614
my webserver software is nginx which runs very well on macbook air using mac os x 10.7.5 when i go to <http://myapp.localhost> on my macbook air, i can access my website perfectly which is running on localhost. how can i access the website from my iPad? I am asking because i want to test if my website allows tablet to access just as well on desktop browsers. i have two possible setups. 1) macbook air running HUAWEI-MOBILEModem and using INTERNET SHARING to allow the iPad to access. 2) when both macbook air and iPad are accessing the same WIFI connection. Please provide solutions for both scenarios. UPDATE: i have more than 1 app running on my macbook air nginx webserver. for conveniences, let's call them * <http://myapp1.localhost> * <http://myapp2.localhost> etc. How can my iPad access the correct webapp hosted on my macbook air? **UPDATE** on my macbook air, i access different webapps because i edited my /etc/hosts file.
2012/11/25
[ "https://apple.stackexchange.com/questions/72614", "https://apple.stackexchange.com", "https://apple.stackexchange.com/users/21537/" ]
In **both scenarios**, using the IP or *machinename.local* address of the Mac will only give you the default website on that Mac. Your web apps are all at the top-level so Nginx is expecting different hostnames in the request. Problem is, these hostnames end in .localhost which isn't being resolved by DNS, so the iPad doesn't know where myapp2.localhost is, and the request never reaches Nginx on the Mac. You've already gotten around this problem somehow when testing from the Mac. Maybe you've edited the /etc/hosts file, or you have a GUI that does that? However, you can't modify the iPad hosts file without jailbreaking. A simple workaround is to change the default website in Nginx to the webapp you want to test from the iPad - then you could use the *machinename.local* address from the iPad. But you have to change this every time you want to test a different webapp. More complicated workarounds would be to a) configure Apache on the Mac as a proxy server, and configure the iPad browser to use that as its proxy; b) set up a DNS server on your local network; c) use instead the iPad simulator on the Mac, while modifying the /etc/hosts file; or d) jailbreak the iPad and modify /etc/hosts.
* Turn Web Sharing on: ![Turn web sharing on](https://i.stack.imgur.com/7TmRp.png) * Put your website inside `~/Sites` * Access via URL as displayed above
19,110
As an orthodox Jew I have seen quite a stir lately regarding the topic of biblical criticism, specifically towards the Old Testament (Torah). I have perused several questions in this stack which seem to address this topic in general, and learned a lot about apologetics, but I have not seen answers that address some of the major claims of biblical criticism, especially as it pertains to the Old Testament. For example: 1. The story of Noah and the flood seems to be contradicted by archaeological evidence as well as having been 'borrowed' from earlier flood narratives such as the Gilgamesh story 2. Many of the portions of the Old Testament seem to be borrowed from earlier near eastern texts such as the Hammurabi code 3. The notion that there are multiple authors ([documentary hypothesis](https://en.wikipedia.org/wiki/Documentary_hypothesis)) of the Old Testament. In short, how does Christianity deal with some of the major contentions of biblical criticism towards the Old Testament? --- I apologize if any parts of my question offend any sensibilities to which I am unaware.
2013/09/17
[ "https://christianity.stackexchange.com/questions/19110", "https://christianity.stackexchange.com", "https://christianity.stackexchange.com/users/5796/" ]
Christians are very diverse on how they handle this type of criticism. Probably the most visible school of thought in today's media are the [literalists](http://en.wikipedia.org/wiki/Biblical_literalism). These Christians accept that the Bible was fully authored by God and is complete and infallible. For them, Gilgamesh is either [fiction](http://www.godandscience.org/apologetics/gilgamesh.html) or [a pagan account of the Genesis story](http://www.icr.org/article/noah-flood-gilgamesh/). Hammurabi's code is [a set of inferior pagan laws](http://www.godandscience.org/apologetics/code_of_hammurabi.html). The most liberal Christians treat the Bible as one of many worthwhile ancient writings and as a product of the sharing of knowledge across cultures. The Genesis account was [inspired](http://www.religioustolerance.org/noah_com.htm) by Gilgamesh. Mosaic Law and Hammurabi's Code [may have been derived from the same source](http://history.howstuffworks.com/historical-events/code-of-hammurabi2.htm). Most Christians fall somewhere in between the two. The Bible wasn't written in a vacuum and it's just a matter of course that there are similarities to other writings from other cultures. It doesn't change the Bible's supremacy and it doesn't impact their faith. An explanation I heard from a conservative reform Jew fits nicely. God spoke to lots of people. The Jews were just the ones who heard and obeyed. That there were multiple authors of the Bible is just a given. Even the most conservative literalists believe that God used many people to write His word. Different groups might disagree on how many authors there were, but there was definitely more than one.
1. Archaeology does not contradict a worldwide flood. There are different opinions on the matter. For more in-depth information watch these presentations as they present an alternate view. Especially presentations 2 (A Universal Flood) and 3 (Bones in Stones). The complete presentation can be seen [here](https://www.youtube.com/watch?v=nfDB7OUBh-k&list=PL3CB9DAF62BC67143), they are by a Researcher and Professor in Zoology. 2. This is also a matter of opinion. Many different people could write about a different event and that does not necessarily mean they borrowed from one another. They merely wrote about the event. The Epic of Gilgamesh could just easily be a story "based on true events." Just like today's movies, much of it could've been made up just for entertainment value, or to fit into a certain belief system. One more thing about this. Just because they were written first, does not necessarily mean they are more truthful. The reason we believe that the Genesis account is truthful is because we believe that the whole Bible is inspired. Jesus spoke about Noah, Lot, Adam, and other Old Testament characters as historical figures, not simply characters from a fable. 3. Also along with what Narnian said about literary analysis that suggests that there were multiple authors, in the New Testament some of the writings are attributed to the people that we believe today. For example, Luke attributes the quotation from Isaiah to Isaiah; Luke 4:16-18.
19,110
As an orthodox Jew I have seen quite a stir lately regarding the topic of biblical criticism, specifically towards the Old Testament (Torah). I have perused several questions in this stack which seem to address this topic in general, and learned a lot about apologetics, but I have not seen answers that address some of the major claims of biblical criticism, especially as it pertains to the Old Testament. For example: 1. The story of Noah and the flood seems to be contradicted by archaeological evidence as well as having been 'borrowed' from earlier flood narratives such as the Gilgamesh story 2. Many of the portions of the Old Testament seem to be borrowed from earlier near eastern texts such as the Hammurabi code 3. The notion that there are multiple authors ([documentary hypothesis](https://en.wikipedia.org/wiki/Documentary_hypothesis)) of the Old Testament. In short, how does Christianity deal with some of the major contentions of biblical criticism towards the Old Testament? --- I apologize if any parts of my question offend any sensibilities to which I am unaware.
2013/09/17
[ "https://christianity.stackexchange.com/questions/19110", "https://christianity.stackexchange.com", "https://christianity.stackexchange.com/users/5796/" ]
1. Archaeology does not contradict a worldwide flood. There are different opinions on the matter. For more in-depth information watch these presentations as they present an alternate view. Especially presentations 2 (A Universal Flood) and 3 (Bones in Stones). The complete presentation can be seen [here](https://www.youtube.com/watch?v=nfDB7OUBh-k&list=PL3CB9DAF62BC67143), they are by a Researcher and Professor in Zoology. 2. This is also a matter of opinion. Many different people could write about a different event and that does not necessarily mean they borrowed from one another. They merely wrote about the event. The Epic of Gilgamesh could just easily be a story "based on true events." Just like today's movies, much of it could've been made up just for entertainment value, or to fit into a certain belief system. One more thing about this. Just because they were written first, does not necessarily mean they are more truthful. The reason we believe that the Genesis account is truthful is because we believe that the whole Bible is inspired. Jesus spoke about Noah, Lot, Adam, and other Old Testament characters as historical figures, not simply characters from a fable. 3. Also along with what Narnian said about literary analysis that suggests that there were multiple authors, in the New Testament some of the writings are attributed to the people that we believe today. For example, Luke attributes the quotation from Isaiah to Isaiah; Luke 4:16-18.
The question does not ask whether biblical criticism is true, but merely how some Christians deal with biblical criticism. Most Christians are largely unaware of biblical Higher Criticism or simply choose to ignore it as being of little concern to them. Christians in this latter group is unlikely to change their strongly held faith just because some biblical traditions are being questioned. Others look for evidence to support the Bible as they read and interpret it, and seek to undermine the conclusions of critical scholars. Sometimes, unqualified 'biblical archaeologists' have set out to use their limited skills to prove the historicity of the Battle of Jericho or the biblical Flood. As an example several 'biblical archaeologists' have visited Mount Ararat, in Turkey, and claimed to have found evidence of Noah's Ark, although in each case, no evidence was available for the general public. Some of these expeditions involved a large boat-shaped geological feature to be seen at Akyayla, a few kilometres from Mt Ararat. According to 'biblical archaeologist' Ron Wyatt, he arranged 'chemical analysis' tests of the feature that “positively prove it to be composed of very ancient wood and metal.” Ian Wilson says, in *[Before the Flood](http://rads.stackoverflow.com/amzn/click/0312319711)*, page 37, the carbon percentages quoted by Wyatt fall within the normal bounds of soil and show no evidence of wood. He says that instead of the 'metal brackets' for ships' fittings, as claimed by Wyatt, the true explanation is that the Akyayla site is rich in naturally occurring manganese nodules that are high in iron. There no geological or archaeological evidence for the Flood itself, but this does not stop some Christians from claiming that professional scientists have misinterpreted the evidence. Although the message of the Pentateuch would remain the same whether or not this was written by Moses, some Christians are adamant that Moses wrote the entire Pentateuch, including the report of his own death ([Deuteronomy 34:7](http://www.kingjamesbibleonline.org/book.php?book=Deuteronomy&chapter=34&verse=7)). For them, the proofs of multiple authorship are irrelevant, because if they learnt as children that Moses was the sole author of the Pentateuch, then this is undeniably true. A [Catholic view](http://www.catholic.com/magazine/articles/is-everything-in-the-bible-true), expressed by Pope Leo XIII, is that the sacred writers "did not seek to penetrate the secrets of nature, but rather described and dealt with things in more or less figurative language, or in terms which were commonly used at the time and which in many instances are in daily use at this day, even by the most eminent men of science" (*Proventissimus Deus*, 18).
19,110
As an orthodox Jew I have seen quite a stir lately regarding the topic of biblical criticism, specifically towards the Old Testament (Torah). I have perused several questions in this stack which seem to address this topic in general, and learned a lot about apologetics, but I have not seen answers that address some of the major claims of biblical criticism, especially as it pertains to the Old Testament. For example: 1. The story of Noah and the flood seems to be contradicted by archaeological evidence as well as having been 'borrowed' from earlier flood narratives such as the Gilgamesh story 2. Many of the portions of the Old Testament seem to be borrowed from earlier near eastern texts such as the Hammurabi code 3. The notion that there are multiple authors ([documentary hypothesis](https://en.wikipedia.org/wiki/Documentary_hypothesis)) of the Old Testament. In short, how does Christianity deal with some of the major contentions of biblical criticism towards the Old Testament? --- I apologize if any parts of my question offend any sensibilities to which I am unaware.
2013/09/17
[ "https://christianity.stackexchange.com/questions/19110", "https://christianity.stackexchange.com", "https://christianity.stackexchange.com/users/5796/" ]
1. Archaeology does not contradict a worldwide flood. There are different opinions on the matter. For more in-depth information watch these presentations as they present an alternate view. Especially presentations 2 (A Universal Flood) and 3 (Bones in Stones). The complete presentation can be seen [here](https://www.youtube.com/watch?v=nfDB7OUBh-k&list=PL3CB9DAF62BC67143), they are by a Researcher and Professor in Zoology. 2. This is also a matter of opinion. Many different people could write about a different event and that does not necessarily mean they borrowed from one another. They merely wrote about the event. The Epic of Gilgamesh could just easily be a story "based on true events." Just like today's movies, much of it could've been made up just for entertainment value, or to fit into a certain belief system. One more thing about this. Just because they were written first, does not necessarily mean they are more truthful. The reason we believe that the Genesis account is truthful is because we believe that the whole Bible is inspired. Jesus spoke about Noah, Lot, Adam, and other Old Testament characters as historical figures, not simply characters from a fable. 3. Also along with what Narnian said about literary analysis that suggests that there were multiple authors, in the New Testament some of the writings are attributed to the people that we believe today. For example, Luke attributes the quotation from Isaiah to Isaiah; Luke 4:16-18.
**In short, how does Christianity deal with some of the major contentions of biblical criticism towards the Old Testament?** The literalists contend the academic assertions are false (intentionally or otherwise). The accommodationists attempt to find a way to build a compromise usually at the expense of what is written in the Bible. This is similar to what passes for science these days in regard to evolution. However with literary criticism the flaws are more apparent. For example, the assertion of multiple authors is often based on the declaration of someone that they have detected a stylistic difference that "proves" that the same person could not have written a document attributed to him. Using an example from evolutionary "science", the measurement of something like ice cores is hindered by the fact that the weight of the ice causes anything more than a few centuries old to be fused together. A person attempting to discover something beyond the point of differentiation has to make assumptions and interpret his measurements using "fudge factors". Most people are bored by the details of both literary criticism and evolutionary science. They usually take at face value whatever the media tells them which is usually a distillation of what is popular or sensational. As a literalist, I expect there to be accusations and declarations from a variety of sources against the Bible and God. > > John 15:19 If ye were of the world, the world would love his own: but > because ye are not of the world, but I have chosen you out of the > world, therefore the world hateth you. > > >
19,110
As an orthodox Jew I have seen quite a stir lately regarding the topic of biblical criticism, specifically towards the Old Testament (Torah). I have perused several questions in this stack which seem to address this topic in general, and learned a lot about apologetics, but I have not seen answers that address some of the major claims of biblical criticism, especially as it pertains to the Old Testament. For example: 1. The story of Noah and the flood seems to be contradicted by archaeological evidence as well as having been 'borrowed' from earlier flood narratives such as the Gilgamesh story 2. Many of the portions of the Old Testament seem to be borrowed from earlier near eastern texts such as the Hammurabi code 3. The notion that there are multiple authors ([documentary hypothesis](https://en.wikipedia.org/wiki/Documentary_hypothesis)) of the Old Testament. In short, how does Christianity deal with some of the major contentions of biblical criticism towards the Old Testament? --- I apologize if any parts of my question offend any sensibilities to which I am unaware.
2013/09/17
[ "https://christianity.stackexchange.com/questions/19110", "https://christianity.stackexchange.com", "https://christianity.stackexchange.com/users/5796/" ]
Christians are very diverse on how they handle this type of criticism. Probably the most visible school of thought in today's media are the [literalists](http://en.wikipedia.org/wiki/Biblical_literalism). These Christians accept that the Bible was fully authored by God and is complete and infallible. For them, Gilgamesh is either [fiction](http://www.godandscience.org/apologetics/gilgamesh.html) or [a pagan account of the Genesis story](http://www.icr.org/article/noah-flood-gilgamesh/). Hammurabi's code is [a set of inferior pagan laws](http://www.godandscience.org/apologetics/code_of_hammurabi.html). The most liberal Christians treat the Bible as one of many worthwhile ancient writings and as a product of the sharing of knowledge across cultures. The Genesis account was [inspired](http://www.religioustolerance.org/noah_com.htm) by Gilgamesh. Mosaic Law and Hammurabi's Code [may have been derived from the same source](http://history.howstuffworks.com/historical-events/code-of-hammurabi2.htm). Most Christians fall somewhere in between the two. The Bible wasn't written in a vacuum and it's just a matter of course that there are similarities to other writings from other cultures. It doesn't change the Bible's supremacy and it doesn't impact their faith. An explanation I heard from a conservative reform Jew fits nicely. God spoke to lots of people. The Jews were just the ones who heard and obeyed. That there were multiple authors of the Bible is just a given. Even the most conservative literalists believe that God used many people to write His word. Different groups might disagree on how many authors there were, but there was definitely more than one.
The question does not ask whether biblical criticism is true, but merely how some Christians deal with biblical criticism. Most Christians are largely unaware of biblical Higher Criticism or simply choose to ignore it as being of little concern to them. Christians in this latter group is unlikely to change their strongly held faith just because some biblical traditions are being questioned. Others look for evidence to support the Bible as they read and interpret it, and seek to undermine the conclusions of critical scholars. Sometimes, unqualified 'biblical archaeologists' have set out to use their limited skills to prove the historicity of the Battle of Jericho or the biblical Flood. As an example several 'biblical archaeologists' have visited Mount Ararat, in Turkey, and claimed to have found evidence of Noah's Ark, although in each case, no evidence was available for the general public. Some of these expeditions involved a large boat-shaped geological feature to be seen at Akyayla, a few kilometres from Mt Ararat. According to 'biblical archaeologist' Ron Wyatt, he arranged 'chemical analysis' tests of the feature that “positively prove it to be composed of very ancient wood and metal.” Ian Wilson says, in *[Before the Flood](http://rads.stackoverflow.com/amzn/click/0312319711)*, page 37, the carbon percentages quoted by Wyatt fall within the normal bounds of soil and show no evidence of wood. He says that instead of the 'metal brackets' for ships' fittings, as claimed by Wyatt, the true explanation is that the Akyayla site is rich in naturally occurring manganese nodules that are high in iron. There no geological or archaeological evidence for the Flood itself, but this does not stop some Christians from claiming that professional scientists have misinterpreted the evidence. Although the message of the Pentateuch would remain the same whether or not this was written by Moses, some Christians are adamant that Moses wrote the entire Pentateuch, including the report of his own death ([Deuteronomy 34:7](http://www.kingjamesbibleonline.org/book.php?book=Deuteronomy&chapter=34&verse=7)). For them, the proofs of multiple authorship are irrelevant, because if they learnt as children that Moses was the sole author of the Pentateuch, then this is undeniably true. A [Catholic view](http://www.catholic.com/magazine/articles/is-everything-in-the-bible-true), expressed by Pope Leo XIII, is that the sacred writers "did not seek to penetrate the secrets of nature, but rather described and dealt with things in more or less figurative language, or in terms which were commonly used at the time and which in many instances are in daily use at this day, even by the most eminent men of science" (*Proventissimus Deus*, 18).
19,110
As an orthodox Jew I have seen quite a stir lately regarding the topic of biblical criticism, specifically towards the Old Testament (Torah). I have perused several questions in this stack which seem to address this topic in general, and learned a lot about apologetics, but I have not seen answers that address some of the major claims of biblical criticism, especially as it pertains to the Old Testament. For example: 1. The story of Noah and the flood seems to be contradicted by archaeological evidence as well as having been 'borrowed' from earlier flood narratives such as the Gilgamesh story 2. Many of the portions of the Old Testament seem to be borrowed from earlier near eastern texts such as the Hammurabi code 3. The notion that there are multiple authors ([documentary hypothesis](https://en.wikipedia.org/wiki/Documentary_hypothesis)) of the Old Testament. In short, how does Christianity deal with some of the major contentions of biblical criticism towards the Old Testament? --- I apologize if any parts of my question offend any sensibilities to which I am unaware.
2013/09/17
[ "https://christianity.stackexchange.com/questions/19110", "https://christianity.stackexchange.com", "https://christianity.stackexchange.com/users/5796/" ]
Christians are very diverse on how they handle this type of criticism. Probably the most visible school of thought in today's media are the [literalists](http://en.wikipedia.org/wiki/Biblical_literalism). These Christians accept that the Bible was fully authored by God and is complete and infallible. For them, Gilgamesh is either [fiction](http://www.godandscience.org/apologetics/gilgamesh.html) or [a pagan account of the Genesis story](http://www.icr.org/article/noah-flood-gilgamesh/). Hammurabi's code is [a set of inferior pagan laws](http://www.godandscience.org/apologetics/code_of_hammurabi.html). The most liberal Christians treat the Bible as one of many worthwhile ancient writings and as a product of the sharing of knowledge across cultures. The Genesis account was [inspired](http://www.religioustolerance.org/noah_com.htm) by Gilgamesh. Mosaic Law and Hammurabi's Code [may have been derived from the same source](http://history.howstuffworks.com/historical-events/code-of-hammurabi2.htm). Most Christians fall somewhere in between the two. The Bible wasn't written in a vacuum and it's just a matter of course that there are similarities to other writings from other cultures. It doesn't change the Bible's supremacy and it doesn't impact their faith. An explanation I heard from a conservative reform Jew fits nicely. God spoke to lots of people. The Jews were just the ones who heard and obeyed. That there were multiple authors of the Bible is just a given. Even the most conservative literalists believe that God used many people to write His word. Different groups might disagree on how many authors there were, but there was definitely more than one.
**In short, how does Christianity deal with some of the major contentions of biblical criticism towards the Old Testament?** The literalists contend the academic assertions are false (intentionally or otherwise). The accommodationists attempt to find a way to build a compromise usually at the expense of what is written in the Bible. This is similar to what passes for science these days in regard to evolution. However with literary criticism the flaws are more apparent. For example, the assertion of multiple authors is often based on the declaration of someone that they have detected a stylistic difference that "proves" that the same person could not have written a document attributed to him. Using an example from evolutionary "science", the measurement of something like ice cores is hindered by the fact that the weight of the ice causes anything more than a few centuries old to be fused together. A person attempting to discover something beyond the point of differentiation has to make assumptions and interpret his measurements using "fudge factors". Most people are bored by the details of both literary criticism and evolutionary science. They usually take at face value whatever the media tells them which is usually a distillation of what is popular or sensational. As a literalist, I expect there to be accusations and declarations from a variety of sources against the Bible and God. > > John 15:19 If ye were of the world, the world would love his own: but > because ye are not of the world, but I have chosen you out of the > world, therefore the world hateth you. > > >
19,110
As an orthodox Jew I have seen quite a stir lately regarding the topic of biblical criticism, specifically towards the Old Testament (Torah). I have perused several questions in this stack which seem to address this topic in general, and learned a lot about apologetics, but I have not seen answers that address some of the major claims of biblical criticism, especially as it pertains to the Old Testament. For example: 1. The story of Noah and the flood seems to be contradicted by archaeological evidence as well as having been 'borrowed' from earlier flood narratives such as the Gilgamesh story 2. Many of the portions of the Old Testament seem to be borrowed from earlier near eastern texts such as the Hammurabi code 3. The notion that there are multiple authors ([documentary hypothesis](https://en.wikipedia.org/wiki/Documentary_hypothesis)) of the Old Testament. In short, how does Christianity deal with some of the major contentions of biblical criticism towards the Old Testament? --- I apologize if any parts of my question offend any sensibilities to which I am unaware.
2013/09/17
[ "https://christianity.stackexchange.com/questions/19110", "https://christianity.stackexchange.com", "https://christianity.stackexchange.com/users/5796/" ]
**In short, how does Christianity deal with some of the major contentions of biblical criticism towards the Old Testament?** The literalists contend the academic assertions are false (intentionally or otherwise). The accommodationists attempt to find a way to build a compromise usually at the expense of what is written in the Bible. This is similar to what passes for science these days in regard to evolution. However with literary criticism the flaws are more apparent. For example, the assertion of multiple authors is often based on the declaration of someone that they have detected a stylistic difference that "proves" that the same person could not have written a document attributed to him. Using an example from evolutionary "science", the measurement of something like ice cores is hindered by the fact that the weight of the ice causes anything more than a few centuries old to be fused together. A person attempting to discover something beyond the point of differentiation has to make assumptions and interpret his measurements using "fudge factors". Most people are bored by the details of both literary criticism and evolutionary science. They usually take at face value whatever the media tells them which is usually a distillation of what is popular or sensational. As a literalist, I expect there to be accusations and declarations from a variety of sources against the Bible and God. > > John 15:19 If ye were of the world, the world would love his own: but > because ye are not of the world, but I have chosen you out of the > world, therefore the world hateth you. > > >
The question does not ask whether biblical criticism is true, but merely how some Christians deal with biblical criticism. Most Christians are largely unaware of biblical Higher Criticism or simply choose to ignore it as being of little concern to them. Christians in this latter group is unlikely to change their strongly held faith just because some biblical traditions are being questioned. Others look for evidence to support the Bible as they read and interpret it, and seek to undermine the conclusions of critical scholars. Sometimes, unqualified 'biblical archaeologists' have set out to use their limited skills to prove the historicity of the Battle of Jericho or the biblical Flood. As an example several 'biblical archaeologists' have visited Mount Ararat, in Turkey, and claimed to have found evidence of Noah's Ark, although in each case, no evidence was available for the general public. Some of these expeditions involved a large boat-shaped geological feature to be seen at Akyayla, a few kilometres from Mt Ararat. According to 'biblical archaeologist' Ron Wyatt, he arranged 'chemical analysis' tests of the feature that “positively prove it to be composed of very ancient wood and metal.” Ian Wilson says, in *[Before the Flood](http://rads.stackoverflow.com/amzn/click/0312319711)*, page 37, the carbon percentages quoted by Wyatt fall within the normal bounds of soil and show no evidence of wood. He says that instead of the 'metal brackets' for ships' fittings, as claimed by Wyatt, the true explanation is that the Akyayla site is rich in naturally occurring manganese nodules that are high in iron. There no geological or archaeological evidence for the Flood itself, but this does not stop some Christians from claiming that professional scientists have misinterpreted the evidence. Although the message of the Pentateuch would remain the same whether or not this was written by Moses, some Christians are adamant that Moses wrote the entire Pentateuch, including the report of his own death ([Deuteronomy 34:7](http://www.kingjamesbibleonline.org/book.php?book=Deuteronomy&chapter=34&verse=7)). For them, the proofs of multiple authorship are irrelevant, because if they learnt as children that Moses was the sole author of the Pentateuch, then this is undeniably true. A [Catholic view](http://www.catholic.com/magazine/articles/is-everything-in-the-bible-true), expressed by Pope Leo XIII, is that the sacred writers "did not seek to penetrate the secrets of nature, but rather described and dealt with things in more or less figurative language, or in terms which were commonly used at the time and which in many instances are in daily use at this day, even by the most eminent men of science" (*Proventissimus Deus*, 18).
382,635
I'm trying to be more *privacy* aware now by using free software instead of pirating paid ones (GIMP and DaVinci Resolve instead of pirated copies of Adobe Photoshop and Premiere etc.). For years I've been downloading pirated and cracked software and giving them permissions to do whatever they want on my MacBook Pro. I have now uninstalled all those software, but I feel that it's not enough. I gave so many permissions that I wouldn't be surprised if some malicious files or code were still active on my MacBook. What can I do to fix that?
2020/02/20
[ "https://apple.stackexchange.com/questions/382635", "https://apple.stackexchange.com", "https://apple.stackexchange.com/users/363091/" ]
A recommended course of action would be to backup your user data (data files that you have created, not the apps and their settings) onto a different (external) drive, wipe your Mac clean and start over. This could be the most sure-shot way to ensure that your computer is free of any/all malicious apps/permissions/plug-ins. When backing up the data, make sure you backup **all** the crucial files as well as app and system configurations (such as browser bookmarks, info about any installed plugins, contacts etc.) and don't miss anything. Files can be copied onto a different external volume, browser bookmarks and any similar data from apps exported (for later import), user data such as Notes, Contacts, Reminders synced via iCloud etc. However, **do not** backup any apps/plug-ins etc. Another important tip is to **not** use any data backup service such as Apple's Time Machine or something similar from a 3rd party that backs up and restore the entire system. Doing this wouldn't serve the purpose you are looking for. It's crucial to handpick and selectively backup only the user data files. Any apps that you are using, and wish to use should be re-installed after the fresh install of macOS, from the Mac App Store or from the vendor's original distribution source. Once all the backup is done, and you are sure you have everything that you'd be needing, you should go ahead and create a bootable macOS installer. A working Mac is required to create a bootable macOS installer. So we'd be doing this before wiping the disk clean. This would ensure that we have a bootable installer handy if needed after we have wiped the disk clean and have lost access to an installed copy of macOS. The step by step instructions to create a bootable macOS can be found here: * [How to create a bootable installer for macOS](https://support.apple.com/HT201372) You should also sign out of iCloud (after making sure any data that backs up to iCloud is successfully synced) and turn-off Find My Mac. Doing so would disassociate your Mac from your Apple ID. For a comprehensive list of actions to take, you can refer to the following Apple Support document: * [What to do before you sell, give away, or trade in your Mac](https://support.apple.com/HT201065) Now the data backup is taken care of, we are ready to wipe the disk clean. Be doubly sure about backing up any necessary data as wiping the disk clean would make you lose access to the entire installation and any data on your MacBook's disk. Proceed ahead to erase your Mac's disk to wipe it clean. You can find the step by step instructions here: * [How to erase a disk for Mac](https://support.apple.com/HT208496) Alternatively, you can also boot your Mac using the bootable USB installer that we created earlier, access the Disk Utility and wipe the internal drive. Once you are done erasing the disk, proceed ahead to reinstall macOS afresh. You can use the bootable installer that we created earlier on. Alternatively, if you have a decent Internet connection, and if your Mac supports it, an Internet Recovery can be attempted too. (I would personally recommend going with the bootable USB installer.) To learn more about Internet Recovery, refer to the Apple Support document: * [About macOS Recovery](https://support.apple.com/HT201314). Once you are done installing macOS, signing-in with your Apple ID and setting up your Mac, you can start by installing the required apps. Two reliable sources to obtain Apps are: 1. [Mac App Store](https://developer.apple.com/app-store/mac/) (built into macOS). 2. [Homebrew](https://brew.sh) and [Homebrew Cask](https://formulae.brew.sh/cask/) (A community developed package manager for macOS, which lets you easily install and manage UNIX command-line tools, and popular 3rd-party GUI apps respectively). You can now start restoring your data: * Once iCloud is enabled, any data that syncs to iCloud would get restored onto the system. Go to System Preferences app → Apple ID → iCloud (On macOS Catalina) or System Preferences app → iCloud (On earlier releases of macOS) and check what apps you wish to sync with iCloud. The checked apps would sync their data to the system. * Restore by importing, any app data that you previously backed up by exporting (such as browser bookmarks). * Any app and their plugins that can be obtained from the developer's website/source of distribution should be installed from the original source. If an app that you use doesn't have a free alternative available, prefer purchasing from the vendor and installing a non-pirated version to ensure that your computer doesn't get compromised and you have a complete peace of mind. **P.S.**: If you are concerned about rouge apps getting unintended access to your personal data and wish to guard your self against it, consider installing macOS Catalina, the current latest release of macOS. macOS Catalina has improved security and a permission-based system for apps to access user data and files (kinda similar to iOS). One major downside of using macOS Catalina could be that it has completely dropped support for 32-bit apps. While a majority of supported apps are 64-bit now, you may still wish to consult with app vendors to see if they offer a 64-bit version of their app that you wish to use, and there's no alternative available for the same. If such becomes the case, you may consider sticking with the last stable release of the previous version of macOS, i.e. macOS Mojave 10.14.6 which is well supported too. But since you are concerned about the safety of your data and rogue apps, you should give serious thought to go with macOS Catalina. This article on WIRED sheds some light: * [The MacOS Catalina Privacy and Security Features You Should Know](https://www.wired.com/story/macos-catalina-privacy-security-features/)
I personally recommend Malware Bytes: <https://www.malwarebytes.com/mac/> You **do not need** the paid version, you don't even need the trial of the paid version. Download the software and decline the trial. You just want to run a scan of your computer. It will give you instructions to resolve any issues, in most cases automatically. [![Scan Running in Malwarebytes](https://i.stack.imgur.com/v1TyN.png)](https://i.stack.imgur.com/v1TyN.png)
382,635
I'm trying to be more *privacy* aware now by using free software instead of pirating paid ones (GIMP and DaVinci Resolve instead of pirated copies of Adobe Photoshop and Premiere etc.). For years I've been downloading pirated and cracked software and giving them permissions to do whatever they want on my MacBook Pro. I have now uninstalled all those software, but I feel that it's not enough. I gave so many permissions that I wouldn't be surprised if some malicious files or code were still active on my MacBook. What can I do to fix that?
2020/02/20
[ "https://apple.stackexchange.com/questions/382635", "https://apple.stackexchange.com", "https://apple.stackexchange.com/users/363091/" ]
To compliment what has been already said, in the future you could also use network monitor software like LuLu to prevent internet access to apps (legitimate or not) on your system. That way your data doesn't leave your computer, or less of it, at least.
I personally recommend Malware Bytes: <https://www.malwarebytes.com/mac/> You **do not need** the paid version, you don't even need the trial of the paid version. Download the software and decline the trial. You just want to run a scan of your computer. It will give you instructions to resolve any issues, in most cases automatically. [![Scan Running in Malwarebytes](https://i.stack.imgur.com/v1TyN.png)](https://i.stack.imgur.com/v1TyN.png)
382,635
I'm trying to be more *privacy* aware now by using free software instead of pirating paid ones (GIMP and DaVinci Resolve instead of pirated copies of Adobe Photoshop and Premiere etc.). For years I've been downloading pirated and cracked software and giving them permissions to do whatever they want on my MacBook Pro. I have now uninstalled all those software, but I feel that it's not enough. I gave so many permissions that I wouldn't be surprised if some malicious files or code were still active on my MacBook. What can I do to fix that?
2020/02/20
[ "https://apple.stackexchange.com/questions/382635", "https://apple.stackexchange.com", "https://apple.stackexchange.com/users/363091/" ]
A recommended course of action would be to backup your user data (data files that you have created, not the apps and their settings) onto a different (external) drive, wipe your Mac clean and start over. This could be the most sure-shot way to ensure that your computer is free of any/all malicious apps/permissions/plug-ins. When backing up the data, make sure you backup **all** the crucial files as well as app and system configurations (such as browser bookmarks, info about any installed plugins, contacts etc.) and don't miss anything. Files can be copied onto a different external volume, browser bookmarks and any similar data from apps exported (for later import), user data such as Notes, Contacts, Reminders synced via iCloud etc. However, **do not** backup any apps/plug-ins etc. Another important tip is to **not** use any data backup service such as Apple's Time Machine or something similar from a 3rd party that backs up and restore the entire system. Doing this wouldn't serve the purpose you are looking for. It's crucial to handpick and selectively backup only the user data files. Any apps that you are using, and wish to use should be re-installed after the fresh install of macOS, from the Mac App Store or from the vendor's original distribution source. Once all the backup is done, and you are sure you have everything that you'd be needing, you should go ahead and create a bootable macOS installer. A working Mac is required to create a bootable macOS installer. So we'd be doing this before wiping the disk clean. This would ensure that we have a bootable installer handy if needed after we have wiped the disk clean and have lost access to an installed copy of macOS. The step by step instructions to create a bootable macOS can be found here: * [How to create a bootable installer for macOS](https://support.apple.com/HT201372) You should also sign out of iCloud (after making sure any data that backs up to iCloud is successfully synced) and turn-off Find My Mac. Doing so would disassociate your Mac from your Apple ID. For a comprehensive list of actions to take, you can refer to the following Apple Support document: * [What to do before you sell, give away, or trade in your Mac](https://support.apple.com/HT201065) Now the data backup is taken care of, we are ready to wipe the disk clean. Be doubly sure about backing up any necessary data as wiping the disk clean would make you lose access to the entire installation and any data on your MacBook's disk. Proceed ahead to erase your Mac's disk to wipe it clean. You can find the step by step instructions here: * [How to erase a disk for Mac](https://support.apple.com/HT208496) Alternatively, you can also boot your Mac using the bootable USB installer that we created earlier, access the Disk Utility and wipe the internal drive. Once you are done erasing the disk, proceed ahead to reinstall macOS afresh. You can use the bootable installer that we created earlier on. Alternatively, if you have a decent Internet connection, and if your Mac supports it, an Internet Recovery can be attempted too. (I would personally recommend going with the bootable USB installer.) To learn more about Internet Recovery, refer to the Apple Support document: * [About macOS Recovery](https://support.apple.com/HT201314). Once you are done installing macOS, signing-in with your Apple ID and setting up your Mac, you can start by installing the required apps. Two reliable sources to obtain Apps are: 1. [Mac App Store](https://developer.apple.com/app-store/mac/) (built into macOS). 2. [Homebrew](https://brew.sh) and [Homebrew Cask](https://formulae.brew.sh/cask/) (A community developed package manager for macOS, which lets you easily install and manage UNIX command-line tools, and popular 3rd-party GUI apps respectively). You can now start restoring your data: * Once iCloud is enabled, any data that syncs to iCloud would get restored onto the system. Go to System Preferences app → Apple ID → iCloud (On macOS Catalina) or System Preferences app → iCloud (On earlier releases of macOS) and check what apps you wish to sync with iCloud. The checked apps would sync their data to the system. * Restore by importing, any app data that you previously backed up by exporting (such as browser bookmarks). * Any app and their plugins that can be obtained from the developer's website/source of distribution should be installed from the original source. If an app that you use doesn't have a free alternative available, prefer purchasing from the vendor and installing a non-pirated version to ensure that your computer doesn't get compromised and you have a complete peace of mind. **P.S.**: If you are concerned about rouge apps getting unintended access to your personal data and wish to guard your self against it, consider installing macOS Catalina, the current latest release of macOS. macOS Catalina has improved security and a permission-based system for apps to access user data and files (kinda similar to iOS). One major downside of using macOS Catalina could be that it has completely dropped support for 32-bit apps. While a majority of supported apps are 64-bit now, you may still wish to consult with app vendors to see if they offer a 64-bit version of their app that you wish to use, and there's no alternative available for the same. If such becomes the case, you may consider sticking with the last stable release of the previous version of macOS, i.e. macOS Mojave 10.14.6 which is well supported too. But since you are concerned about the safety of your data and rogue apps, you should give serious thought to go with macOS Catalina. This article on WIRED sheds some light: * [The MacOS Catalina Privacy and Security Features You Should Know](https://www.wired.com/story/macos-catalina-privacy-security-features/)
To compliment what has been already said, in the future you could also use network monitor software like LuLu to prevent internet access to apps (legitimate or not) on your system. That way your data doesn't leave your computer, or less of it, at least.
395,256
I am working on a Windows Forms application in VS 2008, and I want to display one image over the top of another, with the top image being a gif or something with transparent parts. Basically I have a big image and I want to put a little image on top if it, so that they kinda appear as one image to the user. I've been trying to use a picturebox, but this doesn't seem to have worked, any suggestions?
2008/12/27
[ "https://Stackoverflow.com/questions/395256", "https://Stackoverflow.com", "https://Stackoverflow.com/users/30025/" ]
PictureBox has 2 layers of images: BackgroundImage and Image, that you can use independently of each other including drawing and clearing.
I've always found that I've had to composite the images myself, using a single picturebox or control. Having two pictureboxes with transparent parts has never worked for me.
223,825
Part No. is 024 134A. Says Japan M5 on the bottom, visible through a hole in the PCB, not pictured. It is a memory lockout chip for Gameboy, it disables the SRAM when the Gameboy is powered down. I'm looking for a pinout. [![Picture of IC](https://i.stack.imgur.com/cKcXw.jpg)](https://i.stack.imgur.com/cKcXw.jpg) Edit: This photo is of Tetris DX. Pokemon Yellow marks the IC as 001 134A. is there a difference? Also, google turned up nothing.
2016/03/21
[ "https://electronics.stackexchange.com/questions/223825", "https://electronics.stackexchange.com", "https://electronics.stackexchange.com/users/57453/" ]
[That would be an MM1134](http://www.digchip.com/datasheets/parts/datasheet/304/MM1134-pdf.php) as indicated [on this site.](https://www.insidegadgets.com/2011/03/19/gbcartread-arduino-based-gameboy-cart-reader-%E2%80%93-part-1-read-the-rom/) The manufacturer seems to be Mitsumi rather than Maxim or Microchip. Makes sense for a japanese product. It is indeed used to disconnect the SRAM when power is off.
My mistake got the wrong chip first time. The chip is a 134A the leading 001 and 024 could be manufacturer codes, batches etc. You are correct in saying it is a RAM power down chip. After a little search on google I've come across [this basic sketch](http://www.devrs.com/gb/files/134a.gif) which is what I think you're after
49,657
I'm writing a novel which essentially has the main character go from place to place and retrieve a single object from each person they encounter. My problem is that while I can think of possible conflicts within each chapter, an overarching conflict seems to elude me. Were it not for the fact that the main character is undergoing character development, the chapters would almost be able to be published as stand-alone segments. Similar to TV mystery series where the main characters (detectives, coroners etc) are the same every episode but there's a new problem. Is there a name for this kind of novel? Is this structure feasible/ engaging enough?
2020/01/13
[ "https://writers.stackexchange.com/questions/49657", "https://writers.stackexchange.com", "https://writers.stackexchange.com/users/42738/" ]
> > Is there a name for this kind of novel? > > > As others have pointed out, it could easily be called "serial storytelling", or even more specifically, "[fetch quest of the week](https://en.wikipedia.org/wiki/Villain_of_the_week)". What you describe, however, also reminds me of a type of narrative called "[**frame story**](https://en.wikipedia.org/wiki/Frame_story)". Examples include, but are definitely not limited to: * Boccaccio's [Decameron](https://en.wikipedia.org/wiki/Decameron); * Chaucer's [Canterbury Tales](https://en.wikipedia.org/wiki/The_Canterbury_Tales); * [Arabian Nights](https://en.wikipedia.org/wiki/One_Thousand_and_One_Nights); * Telling stories around a camp-fire; The idea is to set up a narrative, and then insert other narratives in there, a "**story within a story**". In order to create "an overarching sense of conflict" **you can use a frame story to tie all the episodes together**. You could have the main character directly addressing the reader, and tell their quests and tribulations, and maybe even have the main character add their own commentary. Lovecraft has done this in his stories, usually they begin with a character who says, "I've seen things you wouldn't believe, I might commit suicide later, but I have to warn the world about this indescribable, fish-shaped ancient evil." In the same vein, there are stories where the narrator says that they've "found" a manuscript (a trope called "false document" or "**found manuscript**" according to [wikipedia](https://en.wikipedia.org/wiki/False_document)), and are translating/transcribing it for posterity. Furthermore, you could have a **third party** (depending on the setting, the main character's squire, their assigned FBI agent, a historian...) narrate or write about the main character's exploits. Or even go full meta and write about an author who is writing a story...
I think I understand your problem and I don't have an answer to your question about a name. However, I do have a suggestion: write all the separate stories and then see if an overall conflict emerges or occurs to you. It is possible that while you are editing the first draft an idea will come to you or you may be more able to impose an idea. Character development can be conflict. For example, someone who realises that their goal is selfish or that the goal is wrong is in conflict. Economic pressure -- the character keeps running out of money -- could link the stories. a turbulent relationship might work. The overall conflict may not be directly linked to the stories and still hold the lot together. Think of 'One Thousand and One Nights'.
49,657
I'm writing a novel which essentially has the main character go from place to place and retrieve a single object from each person they encounter. My problem is that while I can think of possible conflicts within each chapter, an overarching conflict seems to elude me. Were it not for the fact that the main character is undergoing character development, the chapters would almost be able to be published as stand-alone segments. Similar to TV mystery series where the main characters (detectives, coroners etc) are the same every episode but there's a new problem. Is there a name for this kind of novel? Is this structure feasible/ engaging enough?
2020/01/13
[ "https://writers.stackexchange.com/questions/49657", "https://writers.stackexchange.com", "https://writers.stackexchange.com/users/42738/" ]
> > Is there a name for this kind of novel? > > > As others have pointed out, it could easily be called "serial storytelling", or even more specifically, "[fetch quest of the week](https://en.wikipedia.org/wiki/Villain_of_the_week)". What you describe, however, also reminds me of a type of narrative called "[**frame story**](https://en.wikipedia.org/wiki/Frame_story)". Examples include, but are definitely not limited to: * Boccaccio's [Decameron](https://en.wikipedia.org/wiki/Decameron); * Chaucer's [Canterbury Tales](https://en.wikipedia.org/wiki/The_Canterbury_Tales); * [Arabian Nights](https://en.wikipedia.org/wiki/One_Thousand_and_One_Nights); * Telling stories around a camp-fire; The idea is to set up a narrative, and then insert other narratives in there, a "**story within a story**". In order to create "an overarching sense of conflict" **you can use a frame story to tie all the episodes together**. You could have the main character directly addressing the reader, and tell their quests and tribulations, and maybe even have the main character add their own commentary. Lovecraft has done this in his stories, usually they begin with a character who says, "I've seen things you wouldn't believe, I might commit suicide later, but I have to warn the world about this indescribable, fish-shaped ancient evil." In the same vein, there are stories where the narrator says that they've "found" a manuscript (a trope called "false document" or "**found manuscript**" according to [wikipedia](https://en.wikipedia.org/wiki/False_document)), and are translating/transcribing it for posterity. Furthermore, you could have a **third party** (depending on the setting, the main character's squire, their assigned FBI agent, a historian...) narrate or write about the main character's exploits. Or even go full meta and write about an author who is writing a story...
This would be serial storytelling, which is quite commonly found on television these days, but originated in literature, though many of the most famous "serial" books are typically sold with the complete story intact, making it the literature equivelent to binge watching a season of television on Netflix. Originally, the format was used by many authors to publish their books much quicker than publishing full length novels. Typically the author would sell the story to a literary magazine which would publish the next chapter in each issue and would typically publish the whole story over the course of a preset negotiated issue period (typically weekly or monthly). Others had in house writers who would either work on the next chapter of the same story or an anthology style. As I said, many a famous classical series were published in this way including "Uncle Tom's Cabin", many of Charles Dickens' works ("The Pickwick Papers" being the novel that established this style's viability), "Sherlock Holmes" (most were self contained adventures of the characters, but Hound of the Baskerville was a "multipart episode" equivalent for the time. The death of Sherlock Holmes was actually Doyle's attempt to leave the series despite the high fan demand for the works. Serialization did make the jump to other mediums, including Comics, Film, Radio, Television. During the golden age and to a lesser extent, even today, many comic book characters started off as one off stories in anthology titles that gained popularity to such a degree, they came to dominate the title's story output. Action Comics debuted with it's signature character, Superman, and these days it's a title in D.C.'s Superman comic lines. A similar situation exists for Batman and Detective comics, but in some cases the Anthology comic predated it's signature hero. For example, Amazing Fantasy was 15 issues deep before it's star attraction, a friendly neigborhood hero named Spider-man debuted... in what was to be the final issue before the entire magazine ceased production, and Thor first appeared in the 83rd issue of his featuring anthology Journey into Mystery. These days, the "Anthology" title of a major superhero typically retains a second story that will feature a member of the feature hero's cast or a promotional story line for an upcoming new title comic series. Further more comics these days tend to run a serial storyline with each episode being a chapter that will last from 2 to 6 issues and then collected and sold as a "trade" book where the whole story is told. Cliffhangers originated in golden age Film serials as a gimmick to ensure the audience comes back for the next entry. Typically, a Film serial was intended for kids and featured many popular Superheroes (Superman, Batman, and Captain Marvel (the one that yells "SHAZAM" not the one that Nick Fury has on Beeper) are some classic examples, but Flash Gordon had several series). These were normally cheaper than a theater's evening attractions, which is saying something when the evening shows were a dime, and that included the film, a news reel, a cartoon, and change for popcorn. Even then, day shows often did double features so that could be two films, a news reel, a cartoon, change for your popcorn and three hours for mom and dad to not have to worry about Jr. Cliffhanger endings were staples (so named because they typically had the heroes hanging from a cliff, though the danger where they would break the story did change... but the unresolved situation would hang over the kids head for a full week before he could find out that they were saved within a minute of the show's start). The film genre died as TV came to take over serial formats, though it would see a revival by George Lucas in the form of Star Wars and later Indiana Jones which was a love letter to pulp serials of the day, and later evolved to it's final form, the cinematic universe, where superheroes once again became the top dog. The genre died when episodic storytelling became much easier on TV, and the promise of finding out more when you "TUNE IN NEXT WEEK" was even cheaper as the shows rarely had a multi-episode story-line. I Love Lucy did several gimmick, the most famous of which was the show's portrayal of Lucile Ball's real life pregnancy. By a lucky chance, the birth of Lucy's TV son aired mere hours before the birth of her real life son (the episode was taped in advance and the script decided to say the TV child was a boy, despite not knowing the real child. The papers did joke that "Lucy sticks to script" the next morning. Serialized TV grew slowly, but it became much more prominant with the advent of DVD collections of a show's season (over coming the difficulties of people not being able to reliably see a critical episode of a season). These shows still split the episode into mostly "Monster of the week" and "Mytharch shows" with the former dominating the bulk of a single season while the later would often be built close to planned production breaks (Typically Mytharchs would be in the first episode of a season, a cliffhanger surrounding the winter break, and a season finale (Either eliminating the season long story or cliffhanging into the next season). An occasional mytharch story was thrown in the midway point between the mid-season break and the season's opening and closing episode. The rest was pretty much filler (Mytharch and Monster of the week originate from an early user, X-Files, with Mytharch relying on the alien conspiracy while the Monster of the Week was anything but the aliens and rarely connected to anything else, with a few twists thrown in... a few mytharcs started as feeling like monster of the week (Red Museum), while some Monster of the Weeks were deliberate spoofs of the alien plot (Joe Chung's From Outer Space). Serial literature has been making a comeback however, thanks to the internet and blogs, an author can self publish a story on his/her blog and do a serial installment (typically weekly) and some discussion of notes or behind the scenes or AMA engagements with the audience occupying the wait time between story content. The novel/web novel "Worm" about a superhero/villain is one of the noted early successes of this style with the author having concluded the novel and published it in book format and having produced two other novels in such a format and presently working on a Worm sequel as well. The limitation here is that much of the advertising needs to be self generated, facilitating online engagement from the author that wasn't required from the Magazines of yore.
49,657
I'm writing a novel which essentially has the main character go from place to place and retrieve a single object from each person they encounter. My problem is that while I can think of possible conflicts within each chapter, an overarching conflict seems to elude me. Were it not for the fact that the main character is undergoing character development, the chapters would almost be able to be published as stand-alone segments. Similar to TV mystery series where the main characters (detectives, coroners etc) are the same every episode but there's a new problem. Is there a name for this kind of novel? Is this structure feasible/ engaging enough?
2020/01/13
[ "https://writers.stackexchange.com/questions/49657", "https://writers.stackexchange.com", "https://writers.stackexchange.com/users/42738/" ]
> > Is there a name for this kind of novel? > > > As others have pointed out, it could easily be called "serial storytelling", or even more specifically, "[fetch quest of the week](https://en.wikipedia.org/wiki/Villain_of_the_week)". What you describe, however, also reminds me of a type of narrative called "[**frame story**](https://en.wikipedia.org/wiki/Frame_story)". Examples include, but are definitely not limited to: * Boccaccio's [Decameron](https://en.wikipedia.org/wiki/Decameron); * Chaucer's [Canterbury Tales](https://en.wikipedia.org/wiki/The_Canterbury_Tales); * [Arabian Nights](https://en.wikipedia.org/wiki/One_Thousand_and_One_Nights); * Telling stories around a camp-fire; The idea is to set up a narrative, and then insert other narratives in there, a "**story within a story**". In order to create "an overarching sense of conflict" **you can use a frame story to tie all the episodes together**. You could have the main character directly addressing the reader, and tell their quests and tribulations, and maybe even have the main character add their own commentary. Lovecraft has done this in his stories, usually they begin with a character who says, "I've seen things you wouldn't believe, I might commit suicide later, but I have to warn the world about this indescribable, fish-shaped ancient evil." In the same vein, there are stories where the narrator says that they've "found" a manuscript (a trope called "false document" or "**found manuscript**" according to [wikipedia](https://en.wikipedia.org/wiki/False_document)), and are translating/transcribing it for posterity. Furthermore, you could have a **third party** (depending on the setting, the main character's squire, their assigned FBI agent, a historian...) narrate or write about the main character's exploits. Or even go full meta and write about an author who is writing a story...
This is "serial" or "episodic" adventure, like many TV shows. Traditionally, such adventures are tied together by some overarching goal or frame story. There must be some reason the character is collecting the items. In *The Odyssey*, Odysseus endured obstacles along the way to getting home. In *The Labors of Hercules*, Hercules served his cousin's bizarre whims in return for immortality to atone for an act of madness. But in modern television, the characters just face adventure after adventure, often right up until they get canceled. A novel should have a more meaningful plot; once the character has all the items, presumably **something** will happen. But just having the main character grow, learn, and change **could** be enough. It wouldn't be too different from some Medieval stories that tied episodes together with a final one in which things the character learned in previous adventures allowed him to complete the final challenge (I'm thinking of things like "The Brave Little Tailor"). Even the labors of Hercules actually ended when Hercules managed to drag Cerberus from Hades, and his terrified cousin promised to release him from his labors if he returned Cerberus to Hades--the final episode simply broke the frame story.
4,639,050
How can I share one or more folders from one or more branches of a git repository?
2011/01/09
[ "https://Stackoverflow.com/questions/4639050", "https://Stackoverflow.com", "https://Stackoverflow.com/users/568730/" ]
Another potential option: If you have branch A (which has folders v, w, and x) and branch B (with folders x, y, and z) and you want folder x to always be the same, then this may be a situation where you want folder x to be in a different branch. Then both branch A and B can merge with X.
Within one Git repo, you don't have to do anything to share a directory between branches: simply don't mark it for removal (`git rm`), and when you create or checkout a branch, that directory will still be there.