qid
int64
1
74.7M
question
stringlengths
12
33.8k
date
stringlengths
10
10
metadata
list
response_j
stringlengths
0
115k
response_k
stringlengths
2
98.3k
87,912
To give light to the situation: I am currently one of two programmers working in a small startup software company. Part of my job requires me to learn a Web development framework that I am not currently familiar with. I get paid by the hour. So the question is: Is it wholly ethical to spend multiple hours of the day reading through documentation and tutorials and be paid for this time where I am not actively developing for our product? Or should the bulk of this learning be done at home, or otherwise off hours, to allow for more full-on development of our application during the work day?
2011/06/29
[ "https://softwareengineering.stackexchange.com/questions/87912", "https://softwareengineering.stackexchange.com", "https://softwareengineering.stackexchange.com/users/23415/" ]
Assuming you didn't overtly lie and say you knew it when you were hired, then it is perfectly ethical to spend time learning at work. Learning for work benefits them by giving you knowledge they can use. Now whether or not it's ethical is a separate issue from whether or not they'll mind, so I would ask your boss and then the answer will tell you a lot about the company you're working for (specifically, whether they care about employees or view you solely as a labor cost). Incidentally, I was once overtly lied to in the other direction; I told them upfront that I didn't know the specific technology but was interested in learning, they assured me that I would be trained, and then when I got there and needed to spend time learning before I could be productive they fired me. bastards
> > Should I be paid for time spent learning a framework? > > > Should a lawyer working on retainer be paid for time spent reading legal volumes? The answer to both questions is 'YES'. We have seen the computing world undergo enormous change in the past two decades, and you should expect more of the same for the foreseeable future. An employer should expect and want its employees to keep abreast of these changes so that they retain their value to the company. This is much like the relationship between a client and his/her lawyer that works on retainer. The client would undoubtedly want that lawyer to stay abreast of all changes occurring in the legal world, so that he/she can best represent the client in mediation and court room interactions.
87,912
To give light to the situation: I am currently one of two programmers working in a small startup software company. Part of my job requires me to learn a Web development framework that I am not currently familiar with. I get paid by the hour. So the question is: Is it wholly ethical to spend multiple hours of the day reading through documentation and tutorials and be paid for this time where I am not actively developing for our product? Or should the bulk of this learning be done at home, or otherwise off hours, to allow for more full-on development of our application during the work day?
2011/06/29
[ "https://softwareengineering.stackexchange.com/questions/87912", "https://softwareengineering.stackexchange.com", "https://softwareengineering.stackexchange.com/users/23415/" ]
Of course it's ethical to study and learn a new framework when you're on the clock. You might spend some of your own time on it, but your employer must expect that you need some time to research things at work. I run a web development team and I give all members 5 hours a week - an hour a day - for independent research and self learning. I know what they gain in that time will help them grow as programmers, and I know it's not fair to ask people to use any new technology we don't provide training for. Any solid employer should want their people doing some learning and research on the clock. As an example, I bring in new hires who are smart and can code OOP PHP5 but maybe don't know MVC well enough or don't have experience with Zend or CodeIgniter. But I know they can pick it up, so giving them research time with a mentor helps the company keep a good base of programmers.
Bit of an iffy question. Perhaps spent an hour at the start of each day practicing and learning this framework. Any extra work on it probably should be done outside of company time... Unless, there is a large portion of downtime during your day when you aren't actively working or engaged in a company project.
87,912
To give light to the situation: I am currently one of two programmers working in a small startup software company. Part of my job requires me to learn a Web development framework that I am not currently familiar with. I get paid by the hour. So the question is: Is it wholly ethical to spend multiple hours of the day reading through documentation and tutorials and be paid for this time where I am not actively developing for our product? Or should the bulk of this learning be done at home, or otherwise off hours, to allow for more full-on development of our application during the work day?
2011/06/29
[ "https://softwareengineering.stackexchange.com/questions/87912", "https://softwareengineering.stackexchange.com", "https://softwareengineering.stackexchange.com/users/23415/" ]
Yes, you should. If you didn't lie and claimed to know the framework already, then there's nothing wrong with "on the job training". You should supplement it if you can, but there's nothing wrong here. This **used** to be the normal way of doing things in software development - you would be paid to constantly learn new things, not expected to know everything immediately.
Assuming you didn't overtly lie and say you knew it when you were hired, then it is perfectly ethical to spend time learning at work. Learning for work benefits them by giving you knowledge they can use. Now whether or not it's ethical is a separate issue from whether or not they'll mind, so I would ask your boss and then the answer will tell you a lot about the company you're working for (specifically, whether they care about employees or view you solely as a labor cost). Incidentally, I was once overtly lied to in the other direction; I told them upfront that I didn't know the specific technology but was interested in learning, they assured me that I would be trained, and then when I got there and needed to spend time learning before I could be productive they fired me. bastards
87,912
To give light to the situation: I am currently one of two programmers working in a small startup software company. Part of my job requires me to learn a Web development framework that I am not currently familiar with. I get paid by the hour. So the question is: Is it wholly ethical to spend multiple hours of the day reading through documentation and tutorials and be paid for this time where I am not actively developing for our product? Or should the bulk of this learning be done at home, or otherwise off hours, to allow for more full-on development of our application during the work day?
2011/06/29
[ "https://softwareengineering.stackexchange.com/questions/87912", "https://softwareengineering.stackexchange.com", "https://softwareengineering.stackexchange.com/users/23415/" ]
If your employer wants you to spend your days learning the framework then great, it's both ethical and legal. I've done this in the past, both as a consultant (my consulting company paid) and as an employee. They do it because it makes you more useful. Win-win, assuming what you're learning is useful. If you were hired on the basis that you know it or will pick it up really quickly (it's a dialect of something you already know, for example), then it's tricky. I'd be inclined to ask the employer. If your employer is asking you to spend a lot of your own time learning something you were told they'd pay you to learn, then it's a question of how much you need the job and how useful the framework knowlege is. I don't think it's ethical for the employer to demand this of you, but you might have to do it if this is your only available work.
If it's directly for work, unless there's an understanding otherwise, the company should absolutely pay for it. It doesn't matter if it's all day for two weeks, if that's a reasonable amount of time to learn the framework. If the company hires a programmer with the understanding that they don't already have that skill, the company, generally, should pay for the time for them to learn it. The only exceptions I can think of to this are: 1. If it's not something that's been asked for by the company (even if you think it's valuable for your work) 2. If there was an understanding that you would already know it or that you would learn it on your own time or 3. If it's taking you an unusually long amount of time to learn it, and you need to put in extra time to meet a **reasonable** time requirement from the company.
87,912
To give light to the situation: I am currently one of two programmers working in a small startup software company. Part of my job requires me to learn a Web development framework that I am not currently familiar with. I get paid by the hour. So the question is: Is it wholly ethical to spend multiple hours of the day reading through documentation and tutorials and be paid for this time where I am not actively developing for our product? Or should the bulk of this learning be done at home, or otherwise off hours, to allow for more full-on development of our application during the work day?
2011/06/29
[ "https://softwareengineering.stackexchange.com/questions/87912", "https://softwareengineering.stackexchange.com", "https://softwareengineering.stackexchange.com/users/23415/" ]
If it's directly for work, unless there's an understanding otherwise, the company should absolutely pay for it. It doesn't matter if it's all day for two weeks, if that's a reasonable amount of time to learn the framework. If the company hires a programmer with the understanding that they don't already have that skill, the company, generally, should pay for the time for them to learn it. The only exceptions I can think of to this are: 1. If it's not something that's been asked for by the company (even if you think it's valuable for your work) 2. If there was an understanding that you would already know it or that you would learn it on your own time or 3. If it's taking you an unusually long amount of time to learn it, and you need to put in extra time to meet a **reasonable** time requirement from the company.
It's totally legit though you should also be making some progress. In my opinion you should also be spending some home time furthering your skills. You can't expect your employer to pick up the entire bill for your self-education.
87,912
To give light to the situation: I am currently one of two programmers working in a small startup software company. Part of my job requires me to learn a Web development framework that I am not currently familiar with. I get paid by the hour. So the question is: Is it wholly ethical to spend multiple hours of the day reading through documentation and tutorials and be paid for this time where I am not actively developing for our product? Or should the bulk of this learning be done at home, or otherwise off hours, to allow for more full-on development of our application during the work day?
2011/06/29
[ "https://softwareengineering.stackexchange.com/questions/87912", "https://softwareengineering.stackexchange.com", "https://softwareengineering.stackexchange.com/users/23415/" ]
It's totally legit though you should also be making some progress. In my opinion you should also be spending some home time furthering your skills. You can't expect your employer to pick up the entire bill for your self-education.
Of course it's ethical to study and learn a new framework when you're on the clock. You might spend some of your own time on it, but your employer must expect that you need some time to research things at work. I run a web development team and I give all members 5 hours a week - an hour a day - for independent research and self learning. I know what they gain in that time will help them grow as programmers, and I know it's not fair to ask people to use any new technology we don't provide training for. Any solid employer should want their people doing some learning and research on the clock. As an example, I bring in new hires who are smart and can code OOP PHP5 but maybe don't know MVC well enough or don't have experience with Zend or CodeIgniter. But I know they can pick it up, so giving them research time with a mentor helps the company keep a good base of programmers.
87,912
To give light to the situation: I am currently one of two programmers working in a small startup software company. Part of my job requires me to learn a Web development framework that I am not currently familiar with. I get paid by the hour. So the question is: Is it wholly ethical to spend multiple hours of the day reading through documentation and tutorials and be paid for this time where I am not actively developing for our product? Or should the bulk of this learning be done at home, or otherwise off hours, to allow for more full-on development of our application during the work day?
2011/06/29
[ "https://softwareengineering.stackexchange.com/questions/87912", "https://softwareengineering.stackexchange.com", "https://softwareengineering.stackexchange.com/users/23415/" ]
If it's directly for work, unless there's an understanding otherwise, the company should absolutely pay for it. It doesn't matter if it's all day for two weeks, if that's a reasonable amount of time to learn the framework. If the company hires a programmer with the understanding that they don't already have that skill, the company, generally, should pay for the time for them to learn it. The only exceptions I can think of to this are: 1. If it's not something that's been asked for by the company (even if you think it's valuable for your work) 2. If there was an understanding that you would already know it or that you would learn it on your own time or 3. If it's taking you an unusually long amount of time to learn it, and you need to put in extra time to meet a **reasonable** time requirement from the company.
Bit of an iffy question. Perhaps spent an hour at the start of each day practicing and learning this framework. Any extra work on it probably should be done outside of company time... Unless, there is a large portion of downtime during your day when you aren't actively working or engaged in a company project.
87,912
To give light to the situation: I am currently one of two programmers working in a small startup software company. Part of my job requires me to learn a Web development framework that I am not currently familiar with. I get paid by the hour. So the question is: Is it wholly ethical to spend multiple hours of the day reading through documentation and tutorials and be paid for this time where I am not actively developing for our product? Or should the bulk of this learning be done at home, or otherwise off hours, to allow for more full-on development of our application during the work day?
2011/06/29
[ "https://softwareengineering.stackexchange.com/questions/87912", "https://softwareengineering.stackexchange.com", "https://softwareengineering.stackexchange.com/users/23415/" ]
It's totally legit though you should also be making some progress. In my opinion you should also be spending some home time furthering your skills. You can't expect your employer to pick up the entire bill for your self-education.
Yes, you should. If you didn't lie and claimed to know the framework already, then there's nothing wrong with "on the job training". You should supplement it if you can, but there's nothing wrong here. This **used** to be the normal way of doing things in software development - you would be paid to constantly learn new things, not expected to know everything immediately.
87,912
To give light to the situation: I am currently one of two programmers working in a small startup software company. Part of my job requires me to learn a Web development framework that I am not currently familiar with. I get paid by the hour. So the question is: Is it wholly ethical to spend multiple hours of the day reading through documentation and tutorials and be paid for this time where I am not actively developing for our product? Or should the bulk of this learning be done at home, or otherwise off hours, to allow for more full-on development of our application during the work day?
2011/06/29
[ "https://softwareengineering.stackexchange.com/questions/87912", "https://softwareengineering.stackexchange.com", "https://softwareengineering.stackexchange.com/users/23415/" ]
If it's directly for work, unless there's an understanding otherwise, the company should absolutely pay for it. It doesn't matter if it's all day for two weeks, if that's a reasonable amount of time to learn the framework. If the company hires a programmer with the understanding that they don't already have that skill, the company, generally, should pay for the time for them to learn it. The only exceptions I can think of to this are: 1. If it's not something that's been asked for by the company (even if you think it's valuable for your work) 2. If there was an understanding that you would already know it or that you would learn it on your own time or 3. If it's taking you an unusually long amount of time to learn it, and you need to put in extra time to meet a **reasonable** time requirement from the company.
> > Should I be paid for time spent learning a framework? > > > Should a lawyer working on retainer be paid for time spent reading legal volumes? The answer to both questions is 'YES'. We have seen the computing world undergo enormous change in the past two decades, and you should expect more of the same for the foreseeable future. An employer should expect and want its employees to keep abreast of these changes so that they retain their value to the company. This is much like the relationship between a client and his/her lawyer that works on retainer. The client would undoubtedly want that lawyer to stay abreast of all changes occurring in the legal world, so that he/she can best represent the client in mediation and court room interactions.
87,912
To give light to the situation: I am currently one of two programmers working in a small startup software company. Part of my job requires me to learn a Web development framework that I am not currently familiar with. I get paid by the hour. So the question is: Is it wholly ethical to spend multiple hours of the day reading through documentation and tutorials and be paid for this time where I am not actively developing for our product? Or should the bulk of this learning be done at home, or otherwise off hours, to allow for more full-on development of our application during the work day?
2011/06/29
[ "https://softwareengineering.stackexchange.com/questions/87912", "https://softwareengineering.stackexchange.com", "https://softwareengineering.stackexchange.com/users/23415/" ]
If it's directly for work, unless there's an understanding otherwise, the company should absolutely pay for it. It doesn't matter if it's all day for two weeks, if that's a reasonable amount of time to learn the framework. If the company hires a programmer with the understanding that they don't already have that skill, the company, generally, should pay for the time for them to learn it. The only exceptions I can think of to this are: 1. If it's not something that's been asked for by the company (even if you think it's valuable for your work) 2. If there was an understanding that you would already know it or that you would learn it on your own time or 3. If it's taking you an unusually long amount of time to learn it, and you need to put in extra time to meet a **reasonable** time requirement from the company.
If the company requested/asked you to learn the Framework, then there is no question of being unethical to spend entire working day learning it. However, you should be aggressive to get a grasp of it fast so you can start to develop production code as early as possible. Since you are involved in a Startup with only two of you as programmer, for the benefit of both you and the employer, you may want to wrap up the learning phase fast, hence I would also recommend a bit of study at home.
2,592,068
I'm building my own webserver based on a tutorial. I have found a simple way to initiate a TCP connection and send one segment of http data (the webserver will run on a microcontroller, so it will be very small) Anyway, the following is the sequence I need to go through: 1. receive SYN 2. send SYN,ACK 3. receive ACK (the connection is now established) 4. receive ACK with HTTP GET command 5. send ACK 6. send FIN,ACK with HTTP data (e.g 200 OK) 7. receive FIN,ACK <- I don't recieve this packet! 8. send ACK Everything works fine until I send my acknowledgement and HTTP 200 OK message. The client won't send an acknowledgement to those two packages and thus no webpage is being displayed. I've added a pcap file of the sequence how I recorded it with wireshark. Pcap file: <http://cl.ly/5f5/httpdump2.pcap> All sequence and acknowledgement numbers are correct, checksum are ok. Flags are also right. I have no idea what is going wrong.
2010/04/07
[ "https://Stackoverflow.com/questions/2592068", "https://Stackoverflow.com", "https://Stackoverflow.com/users/310908/" ]
I think that step 6. should be just FIN, without ACK. What packet from the client are you ACKing at that place? Also I don't see why 4. should be an ACK instead of just a normal data packet - the client ACKed the connection at 3. [This](http://commons.wikimedia.org/wiki/File:Tcp_state_diagram_fixed.svg) diagram on TCP states might help.
WireShark says (of the FIN packet): > > Broken TCP: The acknowledge field is > nonzero while the ACK flag is not set > > > I don't know for sure that's what's causing your problem, but if WireShark doesn't like that packet, maybe the client doesn't either. So, it should be FIN+ACK, or you should set the acknowledge field to 0. If that doesn't solve it, you might also try sending the data first, then a separate FIN packet. It's valid to include data with the FIN, but it's more common to send the FIN by itself (as seen in the other pcap trace you posted earlier). Also, you should probably be setting the PUSH flag in the packet with the `200 OK` Finally, I don't see any retransmission attempts for the FIN packet - is that because you stopped the capture right away?
2,592,068
I'm building my own webserver based on a tutorial. I have found a simple way to initiate a TCP connection and send one segment of http data (the webserver will run on a microcontroller, so it will be very small) Anyway, the following is the sequence I need to go through: 1. receive SYN 2. send SYN,ACK 3. receive ACK (the connection is now established) 4. receive ACK with HTTP GET command 5. send ACK 6. send FIN,ACK with HTTP data (e.g 200 OK) 7. receive FIN,ACK <- I don't recieve this packet! 8. send ACK Everything works fine until I send my acknowledgement and HTTP 200 OK message. The client won't send an acknowledgement to those two packages and thus no webpage is being displayed. I've added a pcap file of the sequence how I recorded it with wireshark. Pcap file: <http://cl.ly/5f5/httpdump2.pcap> All sequence and acknowledgement numbers are correct, checksum are ok. Flags are also right. I have no idea what is going wrong.
2010/04/07
[ "https://Stackoverflow.com/questions/2592068", "https://Stackoverflow.com", "https://Stackoverflow.com/users/310908/" ]
The IP length field was consequently counting 8 bits too much. I made a mistake in my calculations. Everythings works like a charm now!
WireShark says (of the FIN packet): > > Broken TCP: The acknowledge field is > nonzero while the ACK flag is not set > > > I don't know for sure that's what's causing your problem, but if WireShark doesn't like that packet, maybe the client doesn't either. So, it should be FIN+ACK, or you should set the acknowledge field to 0. If that doesn't solve it, you might also try sending the data first, then a separate FIN packet. It's valid to include data with the FIN, but it's more common to send the FIN by itself (as seen in the other pcap trace you posted earlier). Also, you should probably be setting the PUSH flag in the packet with the `200 OK` Finally, I don't see any retransmission attempts for the FIN packet - is that because you stopped the capture right away?
5,399
I golf in TI-BASIC (the language that TI-83 and 84 series graphing calculators use), which is an uncommon language, and small even in proportion to the frequency of its use is the number of people in this community who know the details of the language. Therefore, good answers often go unrecognized, and wrong answers are often mistaken for good ones. I feel the need to sort out answers by quality, and use more votes than I otherwise would. Recently, I have been searching for other answers by language in TI-BASIC. There are several very poor answers by the same user, some of which don't work at all: for example, [this answer](https://codegolf.stackexchange.com/questions/25329/multidimensional-array/25456#25456), which badly misunderstands the spec; [this answer](https://codegolf.stackexchange.com/questions/20324/output-in-the-correct-order/20349#20349), which doesn't come close to working; [this answer](https://codegolf.stackexchange.com/a/31482/39328), which doesn't work and is partially plagiarized; and [this answer](https://codegolf.stackexchange.com/questions/31566/find-nearest-number-in-a-given-array/31571#31571), which was at +5 despite not working. I have downvoted about twelve of these, and I honestly believe that they are all of poor quality. I left a comment on almost every one explaining the error in the code. I was flagged for serial downvoting for this behavior; however, I do not see the fault in my actions. I was not acting in revenge, I have never downvoted a TI-BASIC answer that works properly, and I would downvote an answer of similarly poor quality by any user. [When should I vote?](https://meta.stackexchange.com/questions/130046/when-should-i-vote) suggests downvoting answers that "[make] no sense" or "[a]re wrong (in your opinion". 1. Is it correct practice to downvote these answers? 2. If so, how should I proceed? --- Edit: Geobits brought up downvoting sparingly every few days to circumvent the system; I was caught again with four downvotes and will try again with one. I don't think serial vote detection needs a complete overhaul, but as a community (since this problem seems to be specific to code golf) 3. Should we waive serial downvote detection when both of the following are true? * The vote is on an answer. * The voter either leaves a comment that has achieved +1, or upvotes a comment by another user who downvoted. Or could we recommend flagging (for answers that have been pointed out as wrong and not corrected) or some other action instead?
2015/06/08
[ "https://codegolf.meta.stackexchange.com/questions/5399", "https://codegolf.meta.stackexchange.com", "https://codegolf.meta.stackexchange.com/users/39328/" ]
All of the reasons you give for downvoting are acceptable and appropriate reasons. The fact that you're not paying attention to other languages, so you don't downvote other answers that fit those same reasons, makes you no different from anyone else on SE who only pays attention to certain types of questions and answers. If TI-BASIC was the only language you knew, then you'd feel OK doing what you're doing, right?
I think focusing on one language to check for validity is fine. However, mass-downvoting incorrect answers isn't all that helpful. If the author fixes the answer, there's no point in the downvote. If the author doesn't fix it, it should be deleted rather than downvoted (although downvoting an answer is sometimes necessary to allow it to be deleted). My recommendation would be to point out the mistake in the comments, and if the answer is not fixed within a reasonable length of time, aim to delete it (via modhammer, mod flag, VLQ flag, or delete votes, whichever method seems the most likely to produce useful results).
238,418
A lot of websites scanned with securityheaders.io are missing different headers. Should all of these headers be reported as findings or just few of them which are more critical?
2020/09/17
[ "https://security.stackexchange.com/questions/238418", "https://security.stackexchange.com", "https://security.stackexchange.com/users/188823/" ]
Findings are not Vulnerabilities -------------------------------- Should missing security headers be considered a "Finding"? Yes, absolutely. You found a state in the system that is not in accordance to best practice. But what matters is that you put it into proper context. For example, a missing [Content Security Policy](https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP) header is definitely a finding, but not necessarily a vulnerability. Are those headers required? --------------------------- "Required by whom?" I would ask back to you. If the security requirements the company itself writes dictate that all web-applications must contain all security headers that are considered best practice, then they are definitely required. I'm not in the position to comment whether or not there is a legal requirement to have them, although I personally have never heard such a thing. How should I proceed when I see missing security headers? --------------------------------------------------------- I report them as an informational finding. They're a missing security feature, and they should be implemented if it is possible. I would put a bit more emphasis on them if there were related attacks (e.g. XSS and a missing CSP), and would explain how the presence of this header would have made the attack more difficult or even prevented it, but it should still be treated as a low-severity finding.
When you run an automated scanner, the results alone will rarely detect a security issue definitively. It is up to the user to evaluate the scanner's results, and determine the validity (e.g. not false positive) and whether there is any significance. Depending on the particular engagement, it may vary what is considered as a "finding". However, unless you can actually demonstrate a significant negative security impact from the missing/misconfigured header, I would say they are not worth reporting. If part of a larger report, they possibly may be mentioned as an informational finding, but they aren't worth much alone.
238,418
A lot of websites scanned with securityheaders.io are missing different headers. Should all of these headers be reported as findings or just few of them which are more critical?
2020/09/17
[ "https://security.stackexchange.com/questions/238418", "https://security.stackexchange.com", "https://security.stackexchange.com/users/188823/" ]
Findings are not Vulnerabilities -------------------------------- Should missing security headers be considered a "Finding"? Yes, absolutely. You found a state in the system that is not in accordance to best practice. But what matters is that you put it into proper context. For example, a missing [Content Security Policy](https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP) header is definitely a finding, but not necessarily a vulnerability. Are those headers required? --------------------------- "Required by whom?" I would ask back to you. If the security requirements the company itself writes dictate that all web-applications must contain all security headers that are considered best practice, then they are definitely required. I'm not in the position to comment whether or not there is a legal requirement to have them, although I personally have never heard such a thing. How should I proceed when I see missing security headers? --------------------------------------------------------- I report them as an informational finding. They're a missing security feature, and they should be implemented if it is possible. I would put a bit more emphasis on them if there were related attacks (e.g. XSS and a missing CSP), and would explain how the presence of this header would have made the attack more difficult or even prevented it, but it should still be treated as a low-severity finding.
The short answer: it depends on the risk posed to the organization based on the business usage performed by the application. You can let them know the finding exists, but let them know there may be bigger fish to fry.
242,824
Is there a general rule governing the usage of "Of" and "For" when used in the following way: Which is correct "My love of animals" or "My love for animals" ?
2015/05/01
[ "https://english.stackexchange.com/questions/242824", "https://english.stackexchange.com", "https://english.stackexchange.com/users/119160/" ]
To me, there is a distinction, but both uses have their own "correctness" in different situations. "Love of animals" seems to indicate admiration and affection in a general sense, while "love for animals" is a more personally invested, as a doting, caring, sacrificial love, perhaps stronger and more personal than the "love of animals." "For" is more outward-focused, benefitting the object, and "of" simply draws the connection between the noun and object. Refer to this ["of" vs "for" article](http://www.differencebetween.net/language/difference-between-of-and-for/) for a good distinction between the two prepositions.
My **love for animals** is **correct** here, my **love of animals** is **senseless**
13,015
In S2E10 "Valar Morghulis" of *Game of Thrones*, Qhorin Halfhand started provoking and attacking Jon Snow. Why was this? My only thought was that it was to make the Wildlings trust Jon but I don't see how it achieves that!
2013/08/08
[ "https://movies.stackexchange.com/questions/13015", "https://movies.stackexchange.com", "https://movies.stackexchange.com/users/574/" ]
When Halfhand and Jon Snow are the lone survivors of their patrol and are captured by the wildlings, Halfhand orders Jon Snow to defect. The scene which you are questioning is where the actual deed transpires. Halfhand knows that once they reach the Wildling's camp, both of them will be killed or worse, first tortured and then killed. He can also sense that their only chance is if they can convince the Wildling's that Jon Snow is no more a *Crow* . But for that they needed a substantial *hook*. Thus, Qhorin Halfhand engages Jon Snow in a mock fight which leads to Jon Snow claiming Halfhand's life (*which was what Halfhand intended to happen*). Due to this act of his, Jon Snow is able to convince the Wildlings that he never really wanted to be a Night's Watch ranger and despised their authority.
[KeyBrd Basher's answer](https://movies.stackexchange.com/a/13020/11244) is correct in relation to the tv-shows. However, I will add some further clarification from the books: [*A Clash of Kings* spoilers ahead] In the previous scenes, the wildlings are on Jon and Qhorin's tracks in the Skirling Pass. Qhorin urges Jon to yield once they are caught, and *pretend* to be a turncloak. He then makes Jon recite his vows to ensure that he never forgets that he is truly a crow, and makes Jon promise that he will not "balk whatever they ask [of him]". > > [Qhorin]:“If we are taken, you must yield.” > [Jon]:“Yield?” He blinked in disbelief. The wildlings did not make captives of the men they called the crows. They killed them, except for... “They only spare oathbreakers. Those who join them, like Mance Rayder.” > [Qhorin]:“And you.” > [Jon]:“No.” He shook his head. “Never. I won’t.” > [Qhorin]:“You will. I command it of you.” > > *-A Song of Ice and Fire: A Clash of Kings, Chapter Sixty-Eight (Jon VIII).* > > > > > Qhorin at this point knows that the wildlings would want Jon to kill him in order to prove his allegiance to them, but Jon doesn't until the last moment (Qhorin keeps asking Jon "is your sword sharp?"). **It is important to note here that it was the wildlings themselves (Rattleshirt AKA The Lord O' Bones) who wanted Jon to kill Qhorin Halfhand to prove his defection:** > > The big spearwife narrowed her eyes and said, “If the crow would join the free folk, let him show us his prowess and prove the truth of him.” > “I’ll do whatever you ask.” The words came hard, but Jon said them. > Rattleshirt’s bone armor clattered loudly as he laughed. “Then kill the Halfhand, bastard.” > “As if he could,” said Qhorin. “Turn, Snow, and die.” > And then Qhorin’s sword was coming at him and somehow Longclaw leapt upward to block. > > *-A Song of Ice and Fire: A Clash of Kings, Chapter Sixty-Eight (Jon VIII).* > > > > > They then have an epic and ridiculously depressing sword-fight, at the end of which Ghost bites Qhorin's leg and Jon takes the opportunity to slay Qhorin. This seems to appease the wildlings and Rattleshirt begrudgingly allows Jon to make his case with Mance. It is also important to note that Qhorin Halfhand is somewhat of a hero among the Night's Watch, and is well-known, feared and respected by the wildlings (he had in fact recently killed Alfyn Crowkiller in a one-on-one duel), so by killing him (no easy feat), Jon has quite well shown his allegiance to the wildlings!
13,015
In S2E10 "Valar Morghulis" of *Game of Thrones*, Qhorin Halfhand started provoking and attacking Jon Snow. Why was this? My only thought was that it was to make the Wildlings trust Jon but I don't see how it achieves that!
2013/08/08
[ "https://movies.stackexchange.com/questions/13015", "https://movies.stackexchange.com", "https://movies.stackexchange.com/users/574/" ]
When Halfhand and Jon Snow are the lone survivors of their patrol and are captured by the wildlings, Halfhand orders Jon Snow to defect. The scene which you are questioning is where the actual deed transpires. Halfhand knows that once they reach the Wildling's camp, both of them will be killed or worse, first tortured and then killed. He can also sense that their only chance is if they can convince the Wildling's that Jon Snow is no more a *Crow* . But for that they needed a substantial *hook*. Thus, Qhorin Halfhand engages Jon Snow in a mock fight which leads to Jon Snow claiming Halfhand's life (*which was what Halfhand intended to happen*). Due to this act of his, Jon Snow is able to convince the Wildlings that he never really wanted to be a Night's Watch ranger and despised their authority.
Both answers are excellent, but I feel it needs to be added that **Qhorin attacked Jon because he knew Jon wouldn't attack him.** This is partly because Jon is loyal, partly due to his respect for Qhorin, and partly because Jon is not the type of person who would sacrifice another to save himself. Rather, Jon is the type of person who would sacrifice himself to save others. It was a practical decision to force Jon's hand, and by extension save Jon, and hopefully, the Night's Watch itself.
13,015
In S2E10 "Valar Morghulis" of *Game of Thrones*, Qhorin Halfhand started provoking and attacking Jon Snow. Why was this? My only thought was that it was to make the Wildlings trust Jon but I don't see how it achieves that!
2013/08/08
[ "https://movies.stackexchange.com/questions/13015", "https://movies.stackexchange.com", "https://movies.stackexchange.com/users/574/" ]
[KeyBrd Basher's answer](https://movies.stackexchange.com/a/13020/11244) is correct in relation to the tv-shows. However, I will add some further clarification from the books: [*A Clash of Kings* spoilers ahead] In the previous scenes, the wildlings are on Jon and Qhorin's tracks in the Skirling Pass. Qhorin urges Jon to yield once they are caught, and *pretend* to be a turncloak. He then makes Jon recite his vows to ensure that he never forgets that he is truly a crow, and makes Jon promise that he will not "balk whatever they ask [of him]". > > [Qhorin]:“If we are taken, you must yield.” > [Jon]:“Yield?” He blinked in disbelief. The wildlings did not make captives of the men they called the crows. They killed them, except for... “They only spare oathbreakers. Those who join them, like Mance Rayder.” > [Qhorin]:“And you.” > [Jon]:“No.” He shook his head. “Never. I won’t.” > [Qhorin]:“You will. I command it of you.” > > *-A Song of Ice and Fire: A Clash of Kings, Chapter Sixty-Eight (Jon VIII).* > > > > > Qhorin at this point knows that the wildlings would want Jon to kill him in order to prove his allegiance to them, but Jon doesn't until the last moment (Qhorin keeps asking Jon "is your sword sharp?"). **It is important to note here that it was the wildlings themselves (Rattleshirt AKA The Lord O' Bones) who wanted Jon to kill Qhorin Halfhand to prove his defection:** > > The big spearwife narrowed her eyes and said, “If the crow would join the free folk, let him show us his prowess and prove the truth of him.” > “I’ll do whatever you ask.” The words came hard, but Jon said them. > Rattleshirt’s bone armor clattered loudly as he laughed. “Then kill the Halfhand, bastard.” > “As if he could,” said Qhorin. “Turn, Snow, and die.” > And then Qhorin’s sword was coming at him and somehow Longclaw leapt upward to block. > > *-A Song of Ice and Fire: A Clash of Kings, Chapter Sixty-Eight (Jon VIII).* > > > > > They then have an epic and ridiculously depressing sword-fight, at the end of which Ghost bites Qhorin's leg and Jon takes the opportunity to slay Qhorin. This seems to appease the wildlings and Rattleshirt begrudgingly allows Jon to make his case with Mance. It is also important to note that Qhorin Halfhand is somewhat of a hero among the Night's Watch, and is well-known, feared and respected by the wildlings (he had in fact recently killed Alfyn Crowkiller in a one-on-one duel), so by killing him (no easy feat), Jon has quite well shown his allegiance to the wildlings!
Both answers are excellent, but I feel it needs to be added that **Qhorin attacked Jon because he knew Jon wouldn't attack him.** This is partly because Jon is loyal, partly due to his respect for Qhorin, and partly because Jon is not the type of person who would sacrifice another to save himself. Rather, Jon is the type of person who would sacrifice himself to save others. It was a practical decision to force Jon's hand, and by extension save Jon, and hopefully, the Night's Watch itself.
62,476
Since the in-game guide is very basic and does not answer these questions, I was hoping there was an on-line manual somewhere that described what is going on in more detail, either from EA or someone else. Where can I find a real manual for *Command & Conquer Red Alert* for iPhone?
2012/04/14
[ "https://gaming.stackexchange.com/questions/62476", "https://gaming.stackexchange.com", "https://gaming.stackexchange.com/users/23859/" ]
Unfortunately, C&C Red Alert is not a big concern for EA since they bought out and shut down the original company Westwood which created the PC game series Command & Conquer. Luckily they added a virtual manual that was built into the game at the main screen; Tap the square on the right side of the screen with the letter "i" in it. This will provide you with a detailed description on everything you need to know about the game.
EA's documentation for this iOS game is paltry. The only in-depth help re: missions and strategy (not controls) is on **its [C&C Wikia page](http://cnc.wikia.com/wiki/Command_&_Conquer:_Red_Alert_%28iPhone%29)**.
62,476
Since the in-game guide is very basic and does not answer these questions, I was hoping there was an on-line manual somewhere that described what is going on in more detail, either from EA or someone else. Where can I find a real manual for *Command & Conquer Red Alert* for iPhone?
2012/04/14
[ "https://gaming.stackexchange.com/questions/62476", "https://gaming.stackexchange.com", "https://gaming.stackexchange.com/users/23859/" ]
Unfortunately, C&C Red Alert is not a big concern for EA since they bought out and shut down the original company Westwood which created the PC game series Command & Conquer. Luckily they added a virtual manual that was built into the game at the main screen; Tap the square on the right side of the screen with the letter "i" in it. This will provide you with a detailed description on everything you need to know about the game.
At this link you can read the orginal release of the Red Alert manual- <http://cnc.wikia.com/wiki/File:Red_Alert_1_Manual.pdf> It's old and recommends you use Windows 95 or DOS but the general rules still stand.
117,171
I have a website that has similar functionality to Stack Overflow where you can click on favorite grey star and it turns yellow (swaps images). It seems like on Stack Overflow it changes instantaneously where on my site I change the image on the callback from an ajax post so it takes a second for the server to commit and then the callback to fire on the client side. I use a loading ajax image in the meantime so its fine but i am trying to figure out if: 1. Stack Overflow changes the image before an ajax post and just assumes it will commit successfully. 2. The site is just that fast that it returns so quickly and updates on a callback. NOTE: I am preloading images, etc.
2011/12/26
[ "https://meta.stackexchange.com/questions/117171", "https://meta.stackexchange.com", "https://meta.stackexchange.com/users/4653/" ]
I believe the answer is (1), the image is changed before the request is even sent. You can test this by clicking the star and then immediately clicking some other link on the page (like the question title). You'll get a popup message saying that there was an error doing the request (because the browser cancelled the ajax request), and the star may or may not have been committed when you reload the page. I can do this reliably, but I'm on the other side of the planet from the SO servers, and therefore the response time is limited by the speed of light.
You can use [CSS Sprites](http://css-tricks.com/css-sprites/), [image preloading](http://www.mediacollege.com/internet/javascript/image/preload.html) and [browser caching](http://code.google.com/speed/page-speed/docs/caching.html) for that :-) When you look at the [CSS Sprite file](http://cdn.sstatic.net/stackoverflow/img/sprites.png?v=4), you also see by it's url that SO is using a [CDN](http://en.wikipedia.org/wiki/Content_delivery_network).
117,171
I have a website that has similar functionality to Stack Overflow where you can click on favorite grey star and it turns yellow (swaps images). It seems like on Stack Overflow it changes instantaneously where on my site I change the image on the callback from an ajax post so it takes a second for the server to commit and then the callback to fire on the client side. I use a loading ajax image in the meantime so its fine but i am trying to figure out if: 1. Stack Overflow changes the image before an ajax post and just assumes it will commit successfully. 2. The site is just that fast that it returns so quickly and updates on a callback. NOTE: I am preloading images, etc.
2011/12/26
[ "https://meta.stackexchange.com/questions/117171", "https://meta.stackexchange.com", "https://meta.stackexchange.com/users/4653/" ]
I believe the answer is (1), the image is changed before the request is even sent. You can test this by clicking the star and then immediately clicking some other link on the page (like the question title). You'll get a popup message saying that there was an error doing the request (because the browser cancelled the ajax request), and the star may or may not have been committed when you reload the page. I can do this reliably, but I'm on the other side of the planet from the SO servers, and therefore the response time is limited by the speed of light.
The image is changed before the AJAX call is made. You can check this using FireBug (or equivalent) to check the net traffic. Also, the image is a sprite, so it doesn't have to load the image either.
117,171
I have a website that has similar functionality to Stack Overflow where you can click on favorite grey star and it turns yellow (swaps images). It seems like on Stack Overflow it changes instantaneously where on my site I change the image on the callback from an ajax post so it takes a second for the server to commit and then the callback to fire on the client side. I use a loading ajax image in the meantime so its fine but i am trying to figure out if: 1. Stack Overflow changes the image before an ajax post and just assumes it will commit successfully. 2. The site is just that fast that it returns so quickly and updates on a callback. NOTE: I am preloading images, etc.
2011/12/26
[ "https://meta.stackexchange.com/questions/117171", "https://meta.stackexchange.com", "https://meta.stackexchange.com/users/4653/" ]
The image is changed before the AJAX call is made. You can check this using FireBug (or equivalent) to check the net traffic. Also, the image is a sprite, so it doesn't have to load the image either.
You can use [CSS Sprites](http://css-tricks.com/css-sprites/), [image preloading](http://www.mediacollege.com/internet/javascript/image/preload.html) and [browser caching](http://code.google.com/speed/page-speed/docs/caching.html) for that :-) When you look at the [CSS Sprite file](http://cdn.sstatic.net/stackoverflow/img/sprites.png?v=4), you also see by it's url that SO is using a [CDN](http://en.wikipedia.org/wiki/Content_delivery_network).
31,063
I do not consider myself a linguist. I just teach English to Japanese audience. So please excuse my ignorance if this is too basic a question. What exactly is the definition of a syllable? What I often see is essentially this: a syllable is a series of sounds with exactly one nucleus, which is a vowel, with optional consonants surrounding it. This works for me because I think the distinction between vowels and consonants are relatively clear (except for glides, IMHO). It gets confusing, however, when you factor in syllabic consonants, which they say can also be nuclei of syllables. I think what we have here now are two *circular* definitions: * A syllable is a series of sounds with exactly one nucleus, which is either a vowel or a syllabic consonant, with optional consonants surrounding it. * A syllabic consonant is a consonant that can be a nucleus of a syllable. The only way to break this cycle is to define either one differently, without referencing the other. One such definition of a syllable I found is [this](https://essentialsoflinguistics.pressbooks.com/chapter/2-6-producing-speech-sounds/): a syllable is marked by a peak in sonority. Admittedly, this is not a precise definition, but I do think it captures the underlying idea. But some would argue that it just paraphrases the criteria of a phone being able to be a nucleus of a syllable or not, as its sonority level being high or low. More importantly, it does not give a concrete threshold of sonority level for a phone to be able to be a syllable nucleus, so it still does not answer when a consonant is considered syllabic and when it is not. I wonder if the notion of syllable is innately understood by native speakers of a particular language, but cannot be objectively defined, particularly not by a quantifiable measure. Perhaps what is often presented as the *definition* of a syllable is actually a mere *description*? To wit, I would like to know if there is a definition of a syllable and that of a syllabic consonant that collectively are not circular in nature. Thank you. P.S. If I am not responding to your comment or answer immediately, that is probably because it is taking me a lot of time to take in your comment or answer. I am a complete layman, so just reading through your comment or answer can be a big task for me. Please pardon my tardiness.
2019/04/04
[ "https://linguistics.stackexchange.com/questions/31063", "https://linguistics.stackexchange.com", "https://linguistics.stackexchange.com/users/24281/" ]
Technically, English (and Turkish) imperatives are pro-drop and feature the null morpheme. But what is arguably really going on here is that the Turkish present-progressive endings are like a compound with copula, and Turkish has null copula for 3rd-person singular. (The actual Turkish 3rd-person present tense is marked, eg etmek / eder.) (This goes back to the etymology of -iyor. If I recall correctly, it is a relatively recent innovation, and had some literal meaning, which is why it works like a noun or adjective, not a suffix - no vowel harmony. And of course English present progressive also uses the copula.) In that case, as we're counting a compound tense with the copula, then any pro-drop language with null copula and compound tenses would qualify. For example, Russian (past tense).
I've seen literature that advances the thesis that languages without "pro-drop" tend to have verb that inflect to distinguish some, but not all person/number categories (I think the typical examples used to illustrate this claim are English, French and German), while languages with "pro-drop" tend to either have inflected verbs that (mostly) distinguish between all the person/number categories, or verbs that do not inflect. This generalization is mentioned in the Wikipedia article on "[Pro-drop languages](https://en.wikipedia.org/wiki/Pro-drop_language#Generalizations_across_languages)". This would imply that in a language with "pro-drop", a null affix would most likely only mark one person/number category, not several. Based on what I've read, marking the third person with a null affix on the verb is not uncommon, although I don't have any numbers to give you. I haven't heard of this being a common strategy for marking the first person singular, although it probably exists in some pro-drop language. [Navajo](https://en.wikipedia.org/wiki/Navajo_grammar#Pronominal_inflection) is an example of a language with prefixes to mark subjects and objects where a third-person subject (singular or plural) is marked with a "null" affix.
261,822
I'm using ubuntu 12.10. Although system is quite fast, I have a very slow download speed. Can anyone help me to fix it? Thanks!
2013/02/27
[ "https://askubuntu.com/questions/261822", "https://askubuntu.com", "https://askubuntu.com/users/127643/" ]
Do you have a reference speed to go by? It may not be related to Ubuntu at all. If you have another operating system or another computer to compare against you might be able to narrow down if its Ubuntu or your router/modem.
Try using IDM (Internet Download Manager). 1. If download speed is still slow, it could indicate a problem with your network configuration OR a problem with your internet connection. 2. If IDM is not compatible with Ubuntu, try downloading and installing "Wine" (to run Windows apps) and try again.
7,655,327
I know it is very new but has anyone started using Twitter's Bootstrap Framework with Zend Framework? I can figure out the basic stuff like getting bootstrap working with my layout pages but how do I use some of the bootstrap form calls with Zend\_Form? Just looking for a place to start with this. Any help with this would be great. Thanks!
2011/10/04
[ "https://Stackoverflow.com/questions/7655327", "https://Stackoverflow.com", "https://Stackoverflow.com/users/501409/" ]
There is an project called EasyBib\_Form\_Decortators, small library to use Bootstrap with Zend Form. It works like a charme, ok some bugs with the "MessageFormatter" View Helper but ok :-) [Easybib](https://github.com/easybib/EasyBib_Form_Decorator)
I just wanted to start and found this as well: <http://zf-boilerplate.com/> It looks really promising. Haven't spent much time with it though.
7,655,327
I know it is very new but has anyone started using Twitter's Bootstrap Framework with Zend Framework? I can figure out the basic stuff like getting bootstrap working with my layout pages but how do I use some of the bootstrap form calls with Zend\_Form? Just looking for a place to start with this. Any help with this would be great. Thanks!
2011/10/04
[ "https://Stackoverflow.com/questions/7655327", "https://Stackoverflow.com", "https://Stackoverflow.com/users/501409/" ]
There is an project called EasyBib\_Form\_Decortators, small library to use Bootstrap with Zend Form. It works like a charme, ok some bugs with the "MessageFormatter" View Helper but ok :-) [Easybib](https://github.com/easybib/EasyBib_Form_Decorator)
There's a few repositories on Github that do exactly that, the one i stuck with so far is: <https://github.com/komola/Bootstrap-Zend-Framework> It did the trick for me so far, though i lately noticed an incompatibility with ZF Version 1.12 This looks like a promising alternative, which i am gonna give a try soon: <https://github.com/Emagister/zend-form-decorators-bootstrap>
7,655,327
I know it is very new but has anyone started using Twitter's Bootstrap Framework with Zend Framework? I can figure out the basic stuff like getting bootstrap working with my layout pages but how do I use some of the bootstrap form calls with Zend\_Form? Just looking for a place to start with this. Any help with this would be great. Thanks!
2011/10/04
[ "https://Stackoverflow.com/questions/7655327", "https://Stackoverflow.com", "https://Stackoverflow.com/users/501409/" ]
I just wanted to start and found this as well: <http://zf-boilerplate.com/> It looks really promising. Haven't spent much time with it though.
There's a few repositories on Github that do exactly that, the one i stuck with so far is: <https://github.com/komola/Bootstrap-Zend-Framework> It did the trick for me so far, though i lately noticed an incompatibility with ZF Version 1.12 This looks like a promising alternative, which i am gonna give a try soon: <https://github.com/Emagister/zend-form-decorators-bootstrap>
16,797,438
I have been struggling adding CoreData.framework to my existing xcode 4.6.2 project. I googled and all the answer I got is by control-click on frameworks folder and Select Add -> Existing Frameworks. This "Existing Framework" is not in the menu.
2013/05/28
[ "https://Stackoverflow.com/questions/16797438", "https://Stackoverflow.com", "https://Stackoverflow.com/users/1002681/" ]
Select your project and then select your target, click on the Tab 'Build phases'. Open the section 'Link Binary with Libraries' and click on the `+` sign. ![Xcode](https://i.stack.imgur.com/YWsME.png)
In Xcode, select your target in the navigator. Click the Build Phases tab. Click the add button under the link with binary box, and select CoreData.framework, if its not there, you might reinstall Xcode.
108,776
This question is different from this [one](https://scifi.stackexchange.com/questions/52560/what-became-of-the-jedi-temples-contents) as the subject of that question is the Temple's information archives, whereas the this question's subject is the temple complex itself. Was it demolished, abandoned or put to any particular use? Answers for both Legends and Disney canon is desired.
2015/11/26
[ "https://scifi.stackexchange.com/questions/108776", "https://scifi.stackexchange.com", "https://scifi.stackexchange.com/users/44906/" ]
According to Disney Canon novel *Tarkin* by James Luceno, the Emperor used it as Imperial Palace. > > BRIGHT-SIDE CORUSCANT air-traffic control directed the Carrion Spike to the Imperial Palace, and there into a courtyard landing field that was large enough to accommodate Victory- and Venator-class Star Destroyers. **As repulsors eased the ship down through the busy skyways and into the court, Tarkin realized that the Emperor’s current residence had once been the headquarters for the Jedi—though practically all that remained of the Order’s elegant Temple complex was its copse of five skyscraping spires, now the pinnacle of a sprawling amalgam of blockish edifaces with sloping façades**. ("Tarkin" by James Luceno, Chapter "Imperial Center") > > > The reason for that wasn't simply political - it was Sith related. > > The two of them were in Sidious’s lair, a small rock-walled enclosure beneath the deepest of the Palace’s several sublevels **that had once been an ancient Sith shrine. That the Jedi had raised their Temple over the shrine had for a thousand years been one of the most closely guarded secrets of those Sith Lords who had perpetuated and implemented the revenge strategy of the Jedi Order’s founders**. > > > The Temple was heavily renovated, except for the Galactic Map > > One of the few areas of the former Jedi Temple that had not undergone renovation was the holographic galactic map, an enormous globular representation of the galaxy located mid-level in what had been the Jedi Council spire. The Order had used the map to keep track of its far-flung members; now it served to identify trouble spots in the Emperor’s realm. > The Emperor had consented to allowing the members of his Ruling Council to confer with > > >
The Jedi Temple became the Emperor's residence: > > As repulsors eased the ship down through the busy skyways and into the court, Tarkin realized that the Emperor’s current residence had once been the headquarters for the Jedi—though practically all that remained of the Order’s elegant Temple complex was its copse of five skyscraping spires, now the pinnacle of a sprawling amalgam of blockish edifaces with sloping façades. > > > ***Tarkin*, p. 55** > > >
108,776
This question is different from this [one](https://scifi.stackexchange.com/questions/52560/what-became-of-the-jedi-temples-contents) as the subject of that question is the Temple's information archives, whereas the this question's subject is the temple complex itself. Was it demolished, abandoned or put to any particular use? Answers for both Legends and Disney canon is desired.
2015/11/26
[ "https://scifi.stackexchange.com/questions/108776", "https://scifi.stackexchange.com", "https://scifi.stackexchange.com/users/44906/" ]
The Jedi Temple became the Emperor's residence: > > As repulsors eased the ship down through the busy skyways and into the court, Tarkin realized that the Emperor’s current residence had once been the headquarters for the Jedi—though practically all that remained of the Order’s elegant Temple complex was its copse of five skyscraping spires, now the pinnacle of a sprawling amalgam of blockish edifaces with sloping façades. > > > ***Tarkin*, p. 55** > > >
CANON: ====== ### The Jedi Temple became the place of residence for Emperor Palpatine: > > the Emperor’s current residence had once been the headquarters for the Jedi > > > - **Tarkin** (page 55) > > > The renovated Jedi temple can even be seen **intact** on Coruscant in *Return of the Jedi* after the Battle of Endor. [![enter image description here](https://i.stack.imgur.com/xvYcD.jpg)](https://i.stack.imgur.com/xvYcD.jpg) --- LEGENDS: ======== ### The damaged Jedi Temple fell into disrepair The Jedi Temple remained abandoned until after the Battle of Endor. [![enter image description here](https://i.stack.imgur.com/bO4ic.jpg)](https://i.stack.imgur.com/bO4ic.jpg) Galen Marek traveled to the abandoned Jedi Temple around 2 BBY. He found it in ruins and overrun with Imperial troops. [The Force Unleashed](http://starwars.wikia.com/wiki/Starkiller%27s_Trial_of_the_Spirit) **Luke went there after the second Death Star was destroyed:** > > It wasn't until the New Republic drove the Empire from Coruscant that the Temple would be visited again. With the capitol in the hands of the Republic, Luke Skywalker travelled to the ancient edifice in order to learn what he could of his lost heritage. Once Skywalker decided to revive the Order he invited one of his students, Tionne, to restore the Archives to their former glory and to add information from the Galactic Civil War. > [Star Wars Battlefront: Renegade Squadron](http://starwars.wikia.com/wiki/Jedi_Temple#cite_note-RS-7) > > >
108,776
This question is different from this [one](https://scifi.stackexchange.com/questions/52560/what-became-of-the-jedi-temples-contents) as the subject of that question is the Temple's information archives, whereas the this question's subject is the temple complex itself. Was it demolished, abandoned or put to any particular use? Answers for both Legends and Disney canon is desired.
2015/11/26
[ "https://scifi.stackexchange.com/questions/108776", "https://scifi.stackexchange.com", "https://scifi.stackexchange.com/users/44906/" ]
According to Disney Canon novel *Tarkin* by James Luceno, the Emperor used it as Imperial Palace. > > BRIGHT-SIDE CORUSCANT air-traffic control directed the Carrion Spike to the Imperial Palace, and there into a courtyard landing field that was large enough to accommodate Victory- and Venator-class Star Destroyers. **As repulsors eased the ship down through the busy skyways and into the court, Tarkin realized that the Emperor’s current residence had once been the headquarters for the Jedi—though practically all that remained of the Order’s elegant Temple complex was its copse of five skyscraping spires, now the pinnacle of a sprawling amalgam of blockish edifaces with sloping façades**. ("Tarkin" by James Luceno, Chapter "Imperial Center") > > > The reason for that wasn't simply political - it was Sith related. > > The two of them were in Sidious’s lair, a small rock-walled enclosure beneath the deepest of the Palace’s several sublevels **that had once been an ancient Sith shrine. That the Jedi had raised their Temple over the shrine had for a thousand years been one of the most closely guarded secrets of those Sith Lords who had perpetuated and implemented the revenge strategy of the Jedi Order’s founders**. > > > The Temple was heavily renovated, except for the Galactic Map > > One of the few areas of the former Jedi Temple that had not undergone renovation was the holographic galactic map, an enormous globular representation of the galaxy located mid-level in what had been the Jedi Council spire. The Order had used the map to keep track of its far-flung members; now it served to identify trouble spots in the Emperor’s realm. > The Emperor had consented to allowing the members of his Ruling Council to confer with > > >
CANON: ====== ### The Jedi Temple became the place of residence for Emperor Palpatine: > > the Emperor’s current residence had once been the headquarters for the Jedi > > > - **Tarkin** (page 55) > > > The renovated Jedi temple can even be seen **intact** on Coruscant in *Return of the Jedi* after the Battle of Endor. [![enter image description here](https://i.stack.imgur.com/xvYcD.jpg)](https://i.stack.imgur.com/xvYcD.jpg) --- LEGENDS: ======== ### The damaged Jedi Temple fell into disrepair The Jedi Temple remained abandoned until after the Battle of Endor. [![enter image description here](https://i.stack.imgur.com/bO4ic.jpg)](https://i.stack.imgur.com/bO4ic.jpg) Galen Marek traveled to the abandoned Jedi Temple around 2 BBY. He found it in ruins and overrun with Imperial troops. [The Force Unleashed](http://starwars.wikia.com/wiki/Starkiller%27s_Trial_of_the_Spirit) **Luke went there after the second Death Star was destroyed:** > > It wasn't until the New Republic drove the Empire from Coruscant that the Temple would be visited again. With the capitol in the hands of the Republic, Luke Skywalker travelled to the ancient edifice in order to learn what he could of his lost heritage. Once Skywalker decided to revive the Order he invited one of his students, Tionne, to restore the Archives to their former glory and to add information from the Galactic Civil War. > [Star Wars Battlefront: Renegade Squadron](http://starwars.wikia.com/wiki/Jedi_Temple#cite_note-RS-7) > > >
229,484
This may sound a nonsense question for some of you but I was trying to visualize how an SMPS initializes. Below is a block-diagram taken from a particular SMPS datasheet: <http://docs-europe.electrocomponents.com/webdocs/0e77/0900766b80e777c4.pdf> [![enter image description here](https://i.stack.imgur.com/od18Q.jpg)](https://i.stack.imgur.com/od18Q.jpg) And before posing my question, I would like to make the assumption that all the electronic circuitry in an SMPS is DC powered by the SMPS’s DC output itself. So I assume there is no internal battery or such sort of thing. If the above statement is true, here is my confusion as follows: Let’s say the SMPS is switched on, and we started to observe what is happening inside the circuit at an extremely slow motion. My logic says that first the AC input power is delivered to the rectifiers and then rectified to a DC voltage. So far so good. But just after that moment, the electronic circuitry should start chopping the DC voltage with PWM to provide a high frequency AC for the transformer. But for that to happen the electronic circuitry should already been supplied with a DC voltage which were not created yet at the output. How initially the electronic circuitry gets DC voltage is very peculiar and confusing for me. Does anyone have an idea?
2016/04/20
[ "https://electronics.stackexchange.com/questions/229484", "https://electronics.stackexchange.com", "https://electronics.stackexchange.com/users/16307/" ]
Without seeing your power supply turn-on and turn-off behavior, there is simply no way to be sure how it will behave on power-on. However, if you're worried about negative excursions, you have a simple way out. Connect the V- input to ground, rather than -15. You're not trying for a bipolar excursion, after all, but rather a constant 3.3 volts. Check [the data sheet](http://www.ti.com/lit/ds/symlink/tl074.pdf) figures 2 and 3, and you'll see that even for a 2 k load, the output will get within 2 volts of the supplies. For a 15 volt supply, this is a range of about 2 to 13 volts. Since you need 3, you should be all set. Actually, you're even better off than the data sheet indicates, since the op amp will be sourcing current at the lower ouput voltages, and the NPN portion of the output stage will be doing the work, and will have 12 volts across it, so there is no chance of the output stage getting starved. EDIT - There is a way to check for transients without a scope, but it will take a bit of extra circuitry, and one or more power supplies. If you make a comparator combined with an SR flip-flop, ![schematic](https://i.stack.imgur.com/ktkBR.png) [simulate this circuit](/plugins/schematics?image=http%3a%2f%2fi.stack.imgur.com%2fktkBR.png) – Schematic created using [CircuitLab](https://www.circuitlab.com/) Use the pot to set your trigger voltage, and close the switch momentarily to reset the flip-flop. The circuit must be live before you turn on the circuit you're testing. If the input drops below the set point, even for a few microseconds, the LED will turn on and stay on until the reset switch is pressed. The CD4011 is powered by +15 and GND, not +/- 15.
I don't think this is a good solution as a reference voltage. The offset voltage of the opamp will give you a reference voltage different fron the 3.3v you seek. A better solution is a shunt voltage reference diode- something like an LM4050-3.3V. That said, im not convinced about your transient concerns at power up. Like some else said earlier, the supplies will ramp up slowly, so your op-amp output voltage should have no trouble tracking the voltage at the noninverting input. I don't believe you have to worry about any transients at the op-amp's output. If you find the app note, I'd love to read it.
229,484
This may sound a nonsense question for some of you but I was trying to visualize how an SMPS initializes. Below is a block-diagram taken from a particular SMPS datasheet: <http://docs-europe.electrocomponents.com/webdocs/0e77/0900766b80e777c4.pdf> [![enter image description here](https://i.stack.imgur.com/od18Q.jpg)](https://i.stack.imgur.com/od18Q.jpg) And before posing my question, I would like to make the assumption that all the electronic circuitry in an SMPS is DC powered by the SMPS’s DC output itself. So I assume there is no internal battery or such sort of thing. If the above statement is true, here is my confusion as follows: Let’s say the SMPS is switched on, and we started to observe what is happening inside the circuit at an extremely slow motion. My logic says that first the AC input power is delivered to the rectifiers and then rectified to a DC voltage. So far so good. But just after that moment, the electronic circuitry should start chopping the DC voltage with PWM to provide a high frequency AC for the transformer. But for that to happen the electronic circuitry should already been supplied with a DC voltage which were not created yet at the output. How initially the electronic circuitry gets DC voltage is very peculiar and confusing for me. Does anyone have an idea?
2016/04/20
[ "https://electronics.stackexchange.com/questions/229484", "https://electronics.stackexchange.com", "https://electronics.stackexchange.com/users/16307/" ]
If you are not keen on changing the power rails then add a diode (red): - [![enter image description here](https://i.stack.imgur.com/tOvxl.png)](https://i.stack.imgur.com/tOvxl.png) This will ensure that only positive voltages are produced. Also, because the diode is within the feedback loop, accuracy will be maintained. However the TL074 is pretty crappy and will give anything up to a 10 mV error on your 3V3 reference output due to its input offset voltage. Don't forget power supply decouplers too.
I don't think this is a good solution as a reference voltage. The offset voltage of the opamp will give you a reference voltage different fron the 3.3v you seek. A better solution is a shunt voltage reference diode- something like an LM4050-3.3V. That said, im not convinced about your transient concerns at power up. Like some else said earlier, the supplies will ramp up slowly, so your op-amp output voltage should have no trouble tracking the voltage at the noninverting input. I don't believe you have to worry about any transients at the op-amp's output. If you find the app note, I'd love to read it.
180,684
I have a new laptop with windows xp. I want to install ubuntu but I want to have both operating systems: Ubuntu and windows xp. What can I do?
2012/08/26
[ "https://askubuntu.com/questions/180684", "https://askubuntu.com", "https://askubuntu.com/users/85701/" ]
Many if not most people choose to do just that, installing Linux (Ubuntu) for daily usage and keeping their default Windows install for certain programs not supported on Linux (such as Netflix, iTunes, several games, etc.). To install Ubuntu alongside Windows on a separate (aka a separate segment of your hard drive from your default C: drive), burn or purchase an Ubuntu live CD, pop it in your DVD drive and reboot. You can create one by downloading the proper .iso (64 or 32-bit) from [Ubuntu's website](http://www.ubuntu.com) and burning it onto a completely new, blank DVD. Once you boot with the DVD in the tray, you should be prompted to install Ubuntu. Follow the directions and **make sure you select the option to install alongside Windows, not to replace/remove Windows**. If all goes well, after you install Ubuntu you'll be prompted with a screen after boot to select Windows XP or Ubuntu to load. There's another, much easier option to simulate an Ubuntu dual-boot, however. Download the Windows installer for Ubuntu off of [Ubuntu's website](http://www.ubuntu.com) and run it. You'll create a virtual hard drive within your Windows partition and be able to run Ubuntu almost like you would a dual-boot. However, this will cost a slight performance decrease and you won't be able to hibernate (which is notable for laptops). It is easier to install and easier to remove, though, as you can uninstall it just like a program in Windows.
Have you ever used ubuntu before? If not, I highly recommend installing wubi here: <http://www.ubuntu.com/download/help/install-ubuntu-with-windows> This installs ubuntu within windows and allows you to pick windows or ubuntu on boot up. It's not a traditional install but it is much easier. Now if you are really hard set on installing it to it's own partition, I would recommend using the steps provided in this video: <http://www.youtube.com/watch?v=LokDqte3sA4> Honestly the traditional install is not too difficult but if you're not comfortable with messing with partitions than I wouldn't recommend it just yet.
180,684
I have a new laptop with windows xp. I want to install ubuntu but I want to have both operating systems: Ubuntu and windows xp. What can I do?
2012/08/26
[ "https://askubuntu.com/questions/180684", "https://askubuntu.com", "https://askubuntu.com/users/85701/" ]
Many if not most people choose to do just that, installing Linux (Ubuntu) for daily usage and keeping their default Windows install for certain programs not supported on Linux (such as Netflix, iTunes, several games, etc.). To install Ubuntu alongside Windows on a separate (aka a separate segment of your hard drive from your default C: drive), burn or purchase an Ubuntu live CD, pop it in your DVD drive and reboot. You can create one by downloading the proper .iso (64 or 32-bit) from [Ubuntu's website](http://www.ubuntu.com) and burning it onto a completely new, blank DVD. Once you boot with the DVD in the tray, you should be prompted to install Ubuntu. Follow the directions and **make sure you select the option to install alongside Windows, not to replace/remove Windows**. If all goes well, after you install Ubuntu you'll be prompted with a screen after boot to select Windows XP or Ubuntu to load. There's another, much easier option to simulate an Ubuntu dual-boot, however. Download the Windows installer for Ubuntu off of [Ubuntu's website](http://www.ubuntu.com) and run it. You'll create a virtual hard drive within your Windows partition and be able to run Ubuntu almost like you would a dual-boot. However, this will cost a slight performance decrease and you won't be able to hibernate (which is notable for laptops). It is easier to install and easier to remove, though, as you can uninstall it just like a program in Windows.
You can definitely have them both. In the installation of Ubuntu you will be asked if you'd like to install Ubuntu alongside with Windows or if you'd like to totally replace windows. Just pick the alongside option and you're good. :)
836
While I am not interested in hearing the common distinction made in introductory text-books, I am interested in hearing what meaningful distinction there can be between morphology and syntax. Is there any structural, or rather formal, difference between the two? Also if that distinction requires the concept of word, how does one formally describe that?
2011/10/17
[ "https://linguistics.stackexchange.com/questions/836", "https://linguistics.stackexchange.com", "https://linguistics.stackexchange.com/users/429/" ]
The Oxford Concise Dictionary of Linguistics defines morphology as 'The study of the grammatical structures of words and the categories realised by them', and syntax as 'The study of grammatical relations between words and other units within the sentence'. As you point out in your question these (pretty standard) definitions depend on the notion 'word' to delimit the domains of each subject. The notion of 'word' is problematic as there's no good definition that applies across all languages. It seems that it's best (or easiest) to define 'word' on a language by language basis, although even then there are problems as different kinds of 'word' can often be distinguished depending on the sets of criteria used: often there is a 'prosodic word' (defined on phonological bases) which differs from the 'grammatical word' (defined in terms of morphosyntax). If 'word' can be precisely defined in a given language then the domains of morphology and syntax can be fairly clearly distinguished, but if not then there is not a clear boundary. So cross-linguistically the notion of 'word' is fuzzy, as are the terms 'morphology' and 'syntax'. But for most languages, and in most cases, it's still pretty clear what's meant by these terms; and of course there's the term 'morphosyntax' for boundary cases. So while these two terms are not precise they are still useful as a general way of referring to certain domains within a language.
Let me fail to answer your question by asking another question -- what do we GAIN by drawing the distinction? By "ironing out" the distinctions, we can avoid having to postulate quite different grammatical architectures for polysynthetic vs. analytic languages, and we can capture the fact that there are generalizations across these languages. If we have distinct notions of morphology and syntax, the fact that subjects and objects agree with the verb in certain ways regardless of whether there's a word boundary between them or not is completely accidental. Put differently, why should we have phonological atoms be the same as syntactic/semantic atoms at the cost of generality across typologically distinct languages? Remember, although it gets debated a lot in various circles in Linguistics, the standard analyses of verbal morphology in English has pretty much always been syntactic at its core in the Chomskyan generative enterprise since LSLT!
836
While I am not interested in hearing the common distinction made in introductory text-books, I am interested in hearing what meaningful distinction there can be between morphology and syntax. Is there any structural, or rather formal, difference between the two? Also if that distinction requires the concept of word, how does one formally describe that?
2011/10/17
[ "https://linguistics.stackexchange.com/questions/836", "https://linguistics.stackexchange.com", "https://linguistics.stackexchange.com/users/429/" ]
The Oxford Concise Dictionary of Linguistics defines morphology as 'The study of the grammatical structures of words and the categories realised by them', and syntax as 'The study of grammatical relations between words and other units within the sentence'. As you point out in your question these (pretty standard) definitions depend on the notion 'word' to delimit the domains of each subject. The notion of 'word' is problematic as there's no good definition that applies across all languages. It seems that it's best (or easiest) to define 'word' on a language by language basis, although even then there are problems as different kinds of 'word' can often be distinguished depending on the sets of criteria used: often there is a 'prosodic word' (defined on phonological bases) which differs from the 'grammatical word' (defined in terms of morphosyntax). If 'word' can be precisely defined in a given language then the domains of morphology and syntax can be fairly clearly distinguished, but if not then there is not a clear boundary. So cross-linguistically the notion of 'word' is fuzzy, as are the terms 'morphology' and 'syntax'. But for most languages, and in most cases, it's still pretty clear what's meant by these terms; and of course there's the term 'morphosyntax' for boundary cases. So while these two terms are not precise they are still useful as a general way of referring to certain domains within a language.
The very first thing on the [*Syntax Topics* handout](http://www.umich.edu/%7Ejlawler/SyntaxTopics.pdf) for my linguistics classes was: > > Syntax and morphology are the two parts of ***grammar***. > > > 1. *Morphology* deals with the **internal** economy of the word. > 2. *Syntax* deals with the **external** economy of the word. > > > By which is meant that things that take place within the word are morphological, and things that take place between words are syntactic. Without a sense of "word", there would be no easy way to distinguish. But we'd need to distinguish anyway, because there are big differences between grammar as expressed morphologically and grammar as expressed syntactically. And plenty of examples to deal with. In particular, there are many analytic languages where grammar is almost all syntax, like English or Mandarin; and also many synthetic languages where grammar is almost all morphology, like Russian or Inuit. In an analytic language word order is terribly important, and there are many little auxiliaries and articles and particles to augment the word orders. In a synthetic language, word order is mostly a matter of style or taste, because the structure of the sentence is all tied up and color-coded with the agreement phenomena that morphology enables. There are other differences as well. Bound morphemes are very fussy about their order, and normally don't tolerate **any** variance. Syntax, however, spins off variation at the drop of a syllable, resulting in many competing patterns which frequently die off, but just as frequently fission into separate constructions. These are very different kinds of things, even if they do somehow "cover the same ground" semantically. It's not necessary to restrict one's observations to only the generalizations one wants to capture. Generalizations are nice, but facts are more useful. You may encounter people who insist that "syntax" **means** "grammar". That's just the theory talking; normally they're just parroting somebody else's dictum, and normally this marks them as generative theory adherents. That's harmless unless you think they mean what they say; really they just want you to use their terminology as a mark of its superiority. Sort of like saying that "Mercedes-Benz" **means** "automobile". I.e, it's not true, or even really helpful, but it lays out your allegiance clearly and that's the important thing.
836
While I am not interested in hearing the common distinction made in introductory text-books, I am interested in hearing what meaningful distinction there can be between morphology and syntax. Is there any structural, or rather formal, difference between the two? Also if that distinction requires the concept of word, how does one formally describe that?
2011/10/17
[ "https://linguistics.stackexchange.com/questions/836", "https://linguistics.stackexchange.com", "https://linguistics.stackexchange.com/users/429/" ]
The Oxford Concise Dictionary of Linguistics defines morphology as 'The study of the grammatical structures of words and the categories realised by them', and syntax as 'The study of grammatical relations between words and other units within the sentence'. As you point out in your question these (pretty standard) definitions depend on the notion 'word' to delimit the domains of each subject. The notion of 'word' is problematic as there's no good definition that applies across all languages. It seems that it's best (or easiest) to define 'word' on a language by language basis, although even then there are problems as different kinds of 'word' can often be distinguished depending on the sets of criteria used: often there is a 'prosodic word' (defined on phonological bases) which differs from the 'grammatical word' (defined in terms of morphosyntax). If 'word' can be precisely defined in a given language then the domains of morphology and syntax can be fairly clearly distinguished, but if not then there is not a clear boundary. So cross-linguistically the notion of 'word' is fuzzy, as are the terms 'morphology' and 'syntax'. But for most languages, and in most cases, it's still pretty clear what's meant by these terms; and of course there's the term 'morphosyntax' for boundary cases. So while these two terms are not precise they are still useful as a general way of referring to certain domains within a language.
I think another way of getting at the same kind answer is to ask what can be done in morphology that can't be done in syntax. There are approaches to morphology where much of what is traditionally considered with morphology is handled with the same kind of formalism as is used in syntax, and morphology may be referred to as "word syntax" on occasion. However, I do not know of approaches to syntax that strive to account for most common syntactic phenomena using the language of morphology. When word derivations have hierarchical structures, and affixes are given the status of functional heads, it may seem like it's syntax all the way down. There are some facts about inflectional morphology, however, which make syntax-like accounts difficult to pursue to their logical end. (See Ch.1 of Stump 2001 "Inflectional morphology" for discussion) One of these is non-concatenative morphology. In affixal morphology, it is not a real problem to treat the stem and affix as constituents of a tree: [[dog]N.root [-z]PL]N -> dogs. When the morphology is non-affixal, there is a dilemma. But how is "men" derived? In [Distributed Morphology](http://www.ling.upenn.edu/~rnoyer/dm/bib.html), stem-changes are handled in the following way: a zero affix triggers a "readjustment rule" which changes the stem vowel: men = [[man]N.root [zero]PL] -> /man-zero/ -> men. Stump considers this a resort to "extraordinary means", since it seems like quite a large coincidence that so many languages should have an identical (zero) affix triggering stem changes. Non-concatenative morphology is a challenge for syntax-like approaches to morphology because the basic units of syntax are considered to have a strict precedence relationship: for two constituents X and Y, X must either precede Y or follow it; tertium non datur. Another issue is morphologically-conditioned phonological rules. Particular morphemes often trigger specific types of phonological alternations in a language (e.g. changes induced by suffixation of -ity on English nouns), but comparable syntactic phenomena, where, say, a particular type of category triggered an idiosyncratic phonological process in a sister constituent, seem very rare. A third issue is variable exponence. A given property, when realized morphologically, may have a wide range of unrelated exponents. In a single language, plural on nouns may be realized by either a prefix, a change in the stem vowel, or a change in the tone, depending on the word. Parallel phenomena are hard to find in syntax. If the issue is whether there should be a distinction at all, I suspect that it is in theory possible to remodel our theory of language structure so that syntax and morphology are modeled in the same way, but at the moment there are quite a few details of morphology which do not lend themselves to a syntactic explanation.
836
While I am not interested in hearing the common distinction made in introductory text-books, I am interested in hearing what meaningful distinction there can be between morphology and syntax. Is there any structural, or rather formal, difference between the two? Also if that distinction requires the concept of word, how does one formally describe that?
2011/10/17
[ "https://linguistics.stackexchange.com/questions/836", "https://linguistics.stackexchange.com", "https://linguistics.stackexchange.com/users/429/" ]
The Oxford Concise Dictionary of Linguistics defines morphology as 'The study of the grammatical structures of words and the categories realised by them', and syntax as 'The study of grammatical relations between words and other units within the sentence'. As you point out in your question these (pretty standard) definitions depend on the notion 'word' to delimit the domains of each subject. The notion of 'word' is problematic as there's no good definition that applies across all languages. It seems that it's best (or easiest) to define 'word' on a language by language basis, although even then there are problems as different kinds of 'word' can often be distinguished depending on the sets of criteria used: often there is a 'prosodic word' (defined on phonological bases) which differs from the 'grammatical word' (defined in terms of morphosyntax). If 'word' can be precisely defined in a given language then the domains of morphology and syntax can be fairly clearly distinguished, but if not then there is not a clear boundary. So cross-linguistically the notion of 'word' is fuzzy, as are the terms 'morphology' and 'syntax'. But for most languages, and in most cases, it's still pretty clear what's meant by these terms; and of course there's the term 'morphosyntax' for boundary cases. So while these two terms are not precise they are still useful as a general way of referring to certain domains within a language.
Actually, the traditional distinction between morphology and syntax is pretty clear. Morphology studies how words are inflected and new forms created, while syntax studies how they are combined into phrases and sentences. So, for example, *do* > *does* would be an issue in morphology while *dog barks* : *does dog bark?* would be an issue in syntax. The whole confusion arose in the Anglo-Saxon world because English expresses with syntax most of what non-analytic languages express with morphology. As long as the main objects of study for linguistis were Latin and Greek, I don't think anyone mixed the two terms. But after WW2 English became the dominant language and with it, the confusion spread. Linguists who are under weaker influence of American linguistics, however, i.e. those who did not study in an Anglo-Saxon country, or who do not specialize in theoretical linguistics, usually make a very clear distinction between syntax and morphology, often combined with looking down on those who don't. You ask if the distinction is meaningful. Absolutely. It is only in a purely analytic language that syntax can tackle the issues of morphology. But not even English is purely analytic, so if you stick to the traditional understanding, even in English there are problems (e.g. the formation of plural) that syntax can't deal with. It is only because there is so little morphology in English that the term *syntax* came to mean for Anglo-Saxons both syntax *and* morphology simultaneously.
836
While I am not interested in hearing the common distinction made in introductory text-books, I am interested in hearing what meaningful distinction there can be between morphology and syntax. Is there any structural, or rather formal, difference between the two? Also if that distinction requires the concept of word, how does one formally describe that?
2011/10/17
[ "https://linguistics.stackexchange.com/questions/836", "https://linguistics.stackexchange.com", "https://linguistics.stackexchange.com/users/429/" ]
Let me fail to answer your question by asking another question -- what do we GAIN by drawing the distinction? By "ironing out" the distinctions, we can avoid having to postulate quite different grammatical architectures for polysynthetic vs. analytic languages, and we can capture the fact that there are generalizations across these languages. If we have distinct notions of morphology and syntax, the fact that subjects and objects agree with the verb in certain ways regardless of whether there's a word boundary between them or not is completely accidental. Put differently, why should we have phonological atoms be the same as syntactic/semantic atoms at the cost of generality across typologically distinct languages? Remember, although it gets debated a lot in various circles in Linguistics, the standard analyses of verbal morphology in English has pretty much always been syntactic at its core in the Chomskyan generative enterprise since LSLT!
Actually, the traditional distinction between morphology and syntax is pretty clear. Morphology studies how words are inflected and new forms created, while syntax studies how they are combined into phrases and sentences. So, for example, *do* > *does* would be an issue in morphology while *dog barks* : *does dog bark?* would be an issue in syntax. The whole confusion arose in the Anglo-Saxon world because English expresses with syntax most of what non-analytic languages express with morphology. As long as the main objects of study for linguistis were Latin and Greek, I don't think anyone mixed the two terms. But after WW2 English became the dominant language and with it, the confusion spread. Linguists who are under weaker influence of American linguistics, however, i.e. those who did not study in an Anglo-Saxon country, or who do not specialize in theoretical linguistics, usually make a very clear distinction between syntax and morphology, often combined with looking down on those who don't. You ask if the distinction is meaningful. Absolutely. It is only in a purely analytic language that syntax can tackle the issues of morphology. But not even English is purely analytic, so if you stick to the traditional understanding, even in English there are problems (e.g. the formation of plural) that syntax can't deal with. It is only because there is so little morphology in English that the term *syntax* came to mean for Anglo-Saxons both syntax *and* morphology simultaneously.
836
While I am not interested in hearing the common distinction made in introductory text-books, I am interested in hearing what meaningful distinction there can be between morphology and syntax. Is there any structural, or rather formal, difference between the two? Also if that distinction requires the concept of word, how does one formally describe that?
2011/10/17
[ "https://linguistics.stackexchange.com/questions/836", "https://linguistics.stackexchange.com", "https://linguistics.stackexchange.com/users/429/" ]
The very first thing on the [*Syntax Topics* handout](http://www.umich.edu/%7Ejlawler/SyntaxTopics.pdf) for my linguistics classes was: > > Syntax and morphology are the two parts of ***grammar***. > > > 1. *Morphology* deals with the **internal** economy of the word. > 2. *Syntax* deals with the **external** economy of the word. > > > By which is meant that things that take place within the word are morphological, and things that take place between words are syntactic. Without a sense of "word", there would be no easy way to distinguish. But we'd need to distinguish anyway, because there are big differences between grammar as expressed morphologically and grammar as expressed syntactically. And plenty of examples to deal with. In particular, there are many analytic languages where grammar is almost all syntax, like English or Mandarin; and also many synthetic languages where grammar is almost all morphology, like Russian or Inuit. In an analytic language word order is terribly important, and there are many little auxiliaries and articles and particles to augment the word orders. In a synthetic language, word order is mostly a matter of style or taste, because the structure of the sentence is all tied up and color-coded with the agreement phenomena that morphology enables. There are other differences as well. Bound morphemes are very fussy about their order, and normally don't tolerate **any** variance. Syntax, however, spins off variation at the drop of a syllable, resulting in many competing patterns which frequently die off, but just as frequently fission into separate constructions. These are very different kinds of things, even if they do somehow "cover the same ground" semantically. It's not necessary to restrict one's observations to only the generalizations one wants to capture. Generalizations are nice, but facts are more useful. You may encounter people who insist that "syntax" **means** "grammar". That's just the theory talking; normally they're just parroting somebody else's dictum, and normally this marks them as generative theory adherents. That's harmless unless you think they mean what they say; really they just want you to use their terminology as a mark of its superiority. Sort of like saying that "Mercedes-Benz" **means** "automobile". I.e, it's not true, or even really helpful, but it lays out your allegiance clearly and that's the important thing.
Actually, the traditional distinction between morphology and syntax is pretty clear. Morphology studies how words are inflected and new forms created, while syntax studies how they are combined into phrases and sentences. So, for example, *do* > *does* would be an issue in morphology while *dog barks* : *does dog bark?* would be an issue in syntax. The whole confusion arose in the Anglo-Saxon world because English expresses with syntax most of what non-analytic languages express with morphology. As long as the main objects of study for linguistis were Latin and Greek, I don't think anyone mixed the two terms. But after WW2 English became the dominant language and with it, the confusion spread. Linguists who are under weaker influence of American linguistics, however, i.e. those who did not study in an Anglo-Saxon country, or who do not specialize in theoretical linguistics, usually make a very clear distinction between syntax and morphology, often combined with looking down on those who don't. You ask if the distinction is meaningful. Absolutely. It is only in a purely analytic language that syntax can tackle the issues of morphology. But not even English is purely analytic, so if you stick to the traditional understanding, even in English there are problems (e.g. the formation of plural) that syntax can't deal with. It is only because there is so little morphology in English that the term *syntax* came to mean for Anglo-Saxons both syntax *and* morphology simultaneously.
836
While I am not interested in hearing the common distinction made in introductory text-books, I am interested in hearing what meaningful distinction there can be between morphology and syntax. Is there any structural, or rather formal, difference between the two? Also if that distinction requires the concept of word, how does one formally describe that?
2011/10/17
[ "https://linguistics.stackexchange.com/questions/836", "https://linguistics.stackexchange.com", "https://linguistics.stackexchange.com/users/429/" ]
I think another way of getting at the same kind answer is to ask what can be done in morphology that can't be done in syntax. There are approaches to morphology where much of what is traditionally considered with morphology is handled with the same kind of formalism as is used in syntax, and morphology may be referred to as "word syntax" on occasion. However, I do not know of approaches to syntax that strive to account for most common syntactic phenomena using the language of morphology. When word derivations have hierarchical structures, and affixes are given the status of functional heads, it may seem like it's syntax all the way down. There are some facts about inflectional morphology, however, which make syntax-like accounts difficult to pursue to their logical end. (See Ch.1 of Stump 2001 "Inflectional morphology" for discussion) One of these is non-concatenative morphology. In affixal morphology, it is not a real problem to treat the stem and affix as constituents of a tree: [[dog]N.root [-z]PL]N -> dogs. When the morphology is non-affixal, there is a dilemma. But how is "men" derived? In [Distributed Morphology](http://www.ling.upenn.edu/~rnoyer/dm/bib.html), stem-changes are handled in the following way: a zero affix triggers a "readjustment rule" which changes the stem vowel: men = [[man]N.root [zero]PL] -> /man-zero/ -> men. Stump considers this a resort to "extraordinary means", since it seems like quite a large coincidence that so many languages should have an identical (zero) affix triggering stem changes. Non-concatenative morphology is a challenge for syntax-like approaches to morphology because the basic units of syntax are considered to have a strict precedence relationship: for two constituents X and Y, X must either precede Y or follow it; tertium non datur. Another issue is morphologically-conditioned phonological rules. Particular morphemes often trigger specific types of phonological alternations in a language (e.g. changes induced by suffixation of -ity on English nouns), but comparable syntactic phenomena, where, say, a particular type of category triggered an idiosyncratic phonological process in a sister constituent, seem very rare. A third issue is variable exponence. A given property, when realized morphologically, may have a wide range of unrelated exponents. In a single language, plural on nouns may be realized by either a prefix, a change in the stem vowel, or a change in the tone, depending on the word. Parallel phenomena are hard to find in syntax. If the issue is whether there should be a distinction at all, I suspect that it is in theory possible to remodel our theory of language structure so that syntax and morphology are modeled in the same way, but at the moment there are quite a few details of morphology which do not lend themselves to a syntactic explanation.
Actually, the traditional distinction between morphology and syntax is pretty clear. Morphology studies how words are inflected and new forms created, while syntax studies how they are combined into phrases and sentences. So, for example, *do* > *does* would be an issue in morphology while *dog barks* : *does dog bark?* would be an issue in syntax. The whole confusion arose in the Anglo-Saxon world because English expresses with syntax most of what non-analytic languages express with morphology. As long as the main objects of study for linguistis were Latin and Greek, I don't think anyone mixed the two terms. But after WW2 English became the dominant language and with it, the confusion spread. Linguists who are under weaker influence of American linguistics, however, i.e. those who did not study in an Anglo-Saxon country, or who do not specialize in theoretical linguistics, usually make a very clear distinction between syntax and morphology, often combined with looking down on those who don't. You ask if the distinction is meaningful. Absolutely. It is only in a purely analytic language that syntax can tackle the issues of morphology. But not even English is purely analytic, so if you stick to the traditional understanding, even in English there are problems (e.g. the formation of plural) that syntax can't deal with. It is only because there is so little morphology in English that the term *syntax* came to mean for Anglo-Saxons both syntax *and* morphology simultaneously.
352,691
I'm looking for tools that will work on either Linux/Unix or Windows Server that for a given set of servers in an enterprise environent, will: * Identify the server [via hostname, or some other unique attribute] * List the the number & type of CPUs + cores * Enumerate the storage devices used by the server * Provide CPU and storage utilization data * Provide load, network & storage I/O metrics The goal is to gather accurate metrics about the current environment that will drive the design of an equivelent environment virtually or in the IaaS cloud [e.g AWS]. I found a couple of options so far: * [SysTrack Virtual Machine Planner](http://www.lakesidesoftware.com/systrack_vmp.aspx) * [Microsoft Assessment and Planning Toolkit](http://technet.microsoft.com/en-us/library/bb977556.aspx) Some of this data can be gathered directly from the OS but I rather use a tool that has that functionality and presents the data in an easy to understand manner. Does VMWare provide any tools for this? Other suggestions?
2012/01/23
[ "https://serverfault.com/questions/352691", "https://serverfault.com", "https://serverfault.com/users/4302/" ]
VMWare used to offer a product called "Guided Consolidation" that did just what you describe but it appears to no longer by available and possibly replaced with a product I've not personally used called "IT Advisor" that's part of the "[VMWare Go](http://www.vmware.com/products/go/features.html)" product set.
You can also use [Exoprise.com](https://www.exoprise.com), which collects thousands of underlying resource metrics and provide a complete endpoint picture for measuring digital experience.
37,750
Does a self destructing HDD (physically destruction) that will destroy after a certain time exist, or when I use some software to initiate its self-destruction? I guess it need to be set in BIOS or on some other "lower" level? I mean, a HDD that I can buy as a casual customer, and I don't need to be part of a government or some agency. Why I would want something like that? If somebody stole my laptop and accessed my data using the right password, then after 24h I want to destroy the HDD, unless the attacker knows that I have set my HDD to self-destruct on some BIOS-level, and re-enable the next 24 or 48 or some other time hour period e.t.c. But this is just an example, in reality it could be done differently.
2013/06/20
[ "https://security.stackexchange.com/questions/37750", "https://security.stackexchange.com", "https://security.stackexchange.com/users/-1/" ]
There is no hard disk drive, or a solid state drive, or any other non-volatile computer memory on the market that would have self-destruct capabilities and a *casual customer* could buy. There's also a good reason for this. Let's, as an example, see what a military grade RunCore's InVincible SSD does:                     ![RunCore InVincible SSD](https://i.stack.imgur.com/kzorx.jpg)                      [XBitLabs.com: RunCore InVincible SSD Features Physical Self Destruction Capability](http://www.xbitlabs.com/news/storage/display/20120517230601_RunCore_Develops_Self_Destructive_Solid_State_Drive.html) > > Besides typical elimination of all data through overwriting, the > InVincible SSD can completely destroy the data by physically > destroying memory and other chips inside the drive by burning chips > down physically. > > > The RunCore InVincible SSDs allow to protect sensitive data from third > party access in two ways with a single click. One method is an > intelligent elimination of all the data by overwriting the entire disk > with meaningless code. This overwrite-deletion method ensures that > there is no way to potentially recover previous data stored to the > device, effectively setting the SSD back to factory default. Still, > there are various data recovery devices not available commercially > which can, perhaps, recover data even after overwriting. > > > A less subtle method is the physical destruction of memory chips > inside SSD by applying an over-current to the NAND flash memory and > thereby physically destroying them. > > > [Here is a YouTube video presentation from the manufacturer.](https://www.youtube.com/watch?v=GLxaVFBXbCk) But let's make one thing perfectly clear. I'm not in any way endorsing this product. In fact, I don't know of a single store that would be selling them, the presentation documentation and the video are lacking on detail, credibility\* and quality. And all of it was a bit of a joke among friends back when this story hit the web. If you [watch the presentation video](https://www.youtube.com/watch?v=GLxaVFBXbCk), you'll see what I mean for yourself. But let's for a minute assume this drive is real, and it does what it says on the box. Would you be able to buy it as a *casual customer*? No: ![RunCore InVincible SSD - Circuitry after self-destruction](https://i.stack.imgur.com/5oL0D.jpg) This is supposedly how the circuitry looks like after self-destruction. There's been a lot of speculation on the web this image (the only one you'll find) was faked. I can't say it doesn't look like it was faked to me also. Note the PCB assembly helper lines (white) next to the storage chips that seem to have *melted* too. > > RunCore positions its InVincible SSDs for aerospace, military and > general industrial applications, it is unclear whether the company > plans to sell such SSDs to general public and whether the company will > be allowed to do so. > > > There's a good reason for that too, considering it's at the very least a fire hazard, and if you'd use it in your laptop, let's not even consider what all would start happening, if you *forgot about it* and wanted to board an airplane (although same should be true for any other public transportation vehicles, possibly public places too). \* I didn't manage to find a single proof this product actually exists, or that the presentation slides and video were not faked, possibly as a demonstration of planned capabilities for military contractors.
Something [like this](http://www.dvice.com/archives/2012/05/hard_drive_with.php) may be of use, but your best bet would be to customize it using a 3G modem wired up internally that's 'always on' so you can remote kill-switch it. I remember seeing, years ago, a couple of demo units of hard-drives for servers where if they were removed without authorization, the would inject a tube of magnetic particles and sand into the spinning drive platters followed a few seconds later by another injection of quick setting epoxy resin. If i recall correctly, this could also be triggered across the network under certain circumstances. I did look for a link but no luck.
37,750
Does a self destructing HDD (physically destruction) that will destroy after a certain time exist, or when I use some software to initiate its self-destruction? I guess it need to be set in BIOS or on some other "lower" level? I mean, a HDD that I can buy as a casual customer, and I don't need to be part of a government or some agency. Why I would want something like that? If somebody stole my laptop and accessed my data using the right password, then after 24h I want to destroy the HDD, unless the attacker knows that I have set my HDD to self-destruct on some BIOS-level, and re-enable the next 24 or 48 or some other time hour period e.t.c. But this is just an example, in reality it could be done differently.
2013/06/20
[ "https://security.stackexchange.com/questions/37750", "https://security.stackexchange.com", "https://security.stackexchange.com/users/-1/" ]
Something [like this](http://www.dvice.com/archives/2012/05/hard_drive_with.php) may be of use, but your best bet would be to customize it using a 3G modem wired up internally that's 'always on' so you can remote kill-switch it. I remember seeing, years ago, a couple of demo units of hard-drives for servers where if they were removed without authorization, the would inject a tube of magnetic particles and sand into the spinning drive platters followed a few seconds later by another injection of quick setting epoxy resin. If i recall correctly, this could also be triggered across the network under certain circumstances. I did look for a link but no luck.
There really is no need as of current. [Self Encrypting Drives (SED)](http://www.trustedcomputinggroup.org/solutions/data_protection) are available for "causal customers" for a while now, in laptop and enterprise HDD versions from the major HDD manufacturers. The data on those disks is encrypted by a sufficiently strong algorithm (e.g. AES-128), the key is stored on a separate portion of this disk and encrypted by another key which is either supplied by the user (by typing, off a smart card, ...) or residing in the system's TPM. Wiping the keys or forgetting the key-decryption key effectively makes the data unreadable unless someone breaks the encryption algorithm or builds a quantum computer operating with at least 128 qubits which is not likely to happen any time soon. If the data you store on that very disk would significantly be decreased in value in a 10-year timeframe, you can consider an SED to have "safely wiped" the data as soon as the key is gone.
37,750
Does a self destructing HDD (physically destruction) that will destroy after a certain time exist, or when I use some software to initiate its self-destruction? I guess it need to be set in BIOS or on some other "lower" level? I mean, a HDD that I can buy as a casual customer, and I don't need to be part of a government or some agency. Why I would want something like that? If somebody stole my laptop and accessed my data using the right password, then after 24h I want to destroy the HDD, unless the attacker knows that I have set my HDD to self-destruct on some BIOS-level, and re-enable the next 24 or 48 or some other time hour period e.t.c. But this is just an example, in reality it could be done differently.
2013/06/20
[ "https://security.stackexchange.com/questions/37750", "https://security.stackexchange.com", "https://security.stackexchange.com/users/-1/" ]
Something [like this](http://www.dvice.com/archives/2012/05/hard_drive_with.php) may be of use, but your best bet would be to customize it using a 3G modem wired up internally that's 'always on' so you can remote kill-switch it. I remember seeing, years ago, a couple of demo units of hard-drives for servers where if they were removed without authorization, the would inject a tube of magnetic particles and sand into the spinning drive platters followed a few seconds later by another injection of quick setting epoxy resin. If i recall correctly, this could also be triggered across the network under certain circumstances. I did look for a link but no luck.
Testing a self-destruct mechanism is tricky. Sure, all the test models may have worked, but how do you know *yours* does. Seriously though, this isn't a very good idea unless you're guarding the codes to start WWIII. The most likely outcome is that you will lose your data accidentally because you broke your arm and spent 16 hours in the ER.
37,750
Does a self destructing HDD (physically destruction) that will destroy after a certain time exist, or when I use some software to initiate its self-destruction? I guess it need to be set in BIOS or on some other "lower" level? I mean, a HDD that I can buy as a casual customer, and I don't need to be part of a government or some agency. Why I would want something like that? If somebody stole my laptop and accessed my data using the right password, then after 24h I want to destroy the HDD, unless the attacker knows that I have set my HDD to self-destruct on some BIOS-level, and re-enable the next 24 or 48 or some other time hour period e.t.c. But this is just an example, in reality it could be done differently.
2013/06/20
[ "https://security.stackexchange.com/questions/37750", "https://security.stackexchange.com", "https://security.stackexchange.com/users/-1/" ]
There is no hard disk drive, or a solid state drive, or any other non-volatile computer memory on the market that would have self-destruct capabilities and a *casual customer* could buy. There's also a good reason for this. Let's, as an example, see what a military grade RunCore's InVincible SSD does:                     ![RunCore InVincible SSD](https://i.stack.imgur.com/kzorx.jpg)                      [XBitLabs.com: RunCore InVincible SSD Features Physical Self Destruction Capability](http://www.xbitlabs.com/news/storage/display/20120517230601_RunCore_Develops_Self_Destructive_Solid_State_Drive.html) > > Besides typical elimination of all data through overwriting, the > InVincible SSD can completely destroy the data by physically > destroying memory and other chips inside the drive by burning chips > down physically. > > > The RunCore InVincible SSDs allow to protect sensitive data from third > party access in two ways with a single click. One method is an > intelligent elimination of all the data by overwriting the entire disk > with meaningless code. This overwrite-deletion method ensures that > there is no way to potentially recover previous data stored to the > device, effectively setting the SSD back to factory default. Still, > there are various data recovery devices not available commercially > which can, perhaps, recover data even after overwriting. > > > A less subtle method is the physical destruction of memory chips > inside SSD by applying an over-current to the NAND flash memory and > thereby physically destroying them. > > > [Here is a YouTube video presentation from the manufacturer.](https://www.youtube.com/watch?v=GLxaVFBXbCk) But let's make one thing perfectly clear. I'm not in any way endorsing this product. In fact, I don't know of a single store that would be selling them, the presentation documentation and the video are lacking on detail, credibility\* and quality. And all of it was a bit of a joke among friends back when this story hit the web. If you [watch the presentation video](https://www.youtube.com/watch?v=GLxaVFBXbCk), you'll see what I mean for yourself. But let's for a minute assume this drive is real, and it does what it says on the box. Would you be able to buy it as a *casual customer*? No: ![RunCore InVincible SSD - Circuitry after self-destruction](https://i.stack.imgur.com/5oL0D.jpg) This is supposedly how the circuitry looks like after self-destruction. There's been a lot of speculation on the web this image (the only one you'll find) was faked. I can't say it doesn't look like it was faked to me also. Note the PCB assembly helper lines (white) next to the storage chips that seem to have *melted* too. > > RunCore positions its InVincible SSDs for aerospace, military and > general industrial applications, it is unclear whether the company > plans to sell such SSDs to general public and whether the company will > be allowed to do so. > > > There's a good reason for that too, considering it's at the very least a fire hazard, and if you'd use it in your laptop, let's not even consider what all would start happening, if you *forgot about it* and wanted to board an airplane (although same should be true for any other public transportation vehicles, possibly public places too). \* I didn't manage to find a single proof this product actually exists, or that the presentation slides and video were not faked, possibly as a demonstration of planned capabilities for military contractors.
There really is no need as of current. [Self Encrypting Drives (SED)](http://www.trustedcomputinggroup.org/solutions/data_protection) are available for "causal customers" for a while now, in laptop and enterprise HDD versions from the major HDD manufacturers. The data on those disks is encrypted by a sufficiently strong algorithm (e.g. AES-128), the key is stored on a separate portion of this disk and encrypted by another key which is either supplied by the user (by typing, off a smart card, ...) or residing in the system's TPM. Wiping the keys or forgetting the key-decryption key effectively makes the data unreadable unless someone breaks the encryption algorithm or builds a quantum computer operating with at least 128 qubits which is not likely to happen any time soon. If the data you store on that very disk would significantly be decreased in value in a 10-year timeframe, you can consider an SED to have "safely wiped" the data as soon as the key is gone.
37,750
Does a self destructing HDD (physically destruction) that will destroy after a certain time exist, or when I use some software to initiate its self-destruction? I guess it need to be set in BIOS or on some other "lower" level? I mean, a HDD that I can buy as a casual customer, and I don't need to be part of a government or some agency. Why I would want something like that? If somebody stole my laptop and accessed my data using the right password, then after 24h I want to destroy the HDD, unless the attacker knows that I have set my HDD to self-destruct on some BIOS-level, and re-enable the next 24 or 48 or some other time hour period e.t.c. But this is just an example, in reality it could be done differently.
2013/06/20
[ "https://security.stackexchange.com/questions/37750", "https://security.stackexchange.com", "https://security.stackexchange.com/users/-1/" ]
There is no hard disk drive, or a solid state drive, or any other non-volatile computer memory on the market that would have self-destruct capabilities and a *casual customer* could buy. There's also a good reason for this. Let's, as an example, see what a military grade RunCore's InVincible SSD does:                     ![RunCore InVincible SSD](https://i.stack.imgur.com/kzorx.jpg)                      [XBitLabs.com: RunCore InVincible SSD Features Physical Self Destruction Capability](http://www.xbitlabs.com/news/storage/display/20120517230601_RunCore_Develops_Self_Destructive_Solid_State_Drive.html) > > Besides typical elimination of all data through overwriting, the > InVincible SSD can completely destroy the data by physically > destroying memory and other chips inside the drive by burning chips > down physically. > > > The RunCore InVincible SSDs allow to protect sensitive data from third > party access in two ways with a single click. One method is an > intelligent elimination of all the data by overwriting the entire disk > with meaningless code. This overwrite-deletion method ensures that > there is no way to potentially recover previous data stored to the > device, effectively setting the SSD back to factory default. Still, > there are various data recovery devices not available commercially > which can, perhaps, recover data even after overwriting. > > > A less subtle method is the physical destruction of memory chips > inside SSD by applying an over-current to the NAND flash memory and > thereby physically destroying them. > > > [Here is a YouTube video presentation from the manufacturer.](https://www.youtube.com/watch?v=GLxaVFBXbCk) But let's make one thing perfectly clear. I'm not in any way endorsing this product. In fact, I don't know of a single store that would be selling them, the presentation documentation and the video are lacking on detail, credibility\* and quality. And all of it was a bit of a joke among friends back when this story hit the web. If you [watch the presentation video](https://www.youtube.com/watch?v=GLxaVFBXbCk), you'll see what I mean for yourself. But let's for a minute assume this drive is real, and it does what it says on the box. Would you be able to buy it as a *casual customer*? No: ![RunCore InVincible SSD - Circuitry after self-destruction](https://i.stack.imgur.com/5oL0D.jpg) This is supposedly how the circuitry looks like after self-destruction. There's been a lot of speculation on the web this image (the only one you'll find) was faked. I can't say it doesn't look like it was faked to me also. Note the PCB assembly helper lines (white) next to the storage chips that seem to have *melted* too. > > RunCore positions its InVincible SSDs for aerospace, military and > general industrial applications, it is unclear whether the company > plans to sell such SSDs to general public and whether the company will > be allowed to do so. > > > There's a good reason for that too, considering it's at the very least a fire hazard, and if you'd use it in your laptop, let's not even consider what all would start happening, if you *forgot about it* and wanted to board an airplane (although same should be true for any other public transportation vehicles, possibly public places too). \* I didn't manage to find a single proof this product actually exists, or that the presentation slides and video were not faked, possibly as a demonstration of planned capabilities for military contractors.
Testing a self-destruct mechanism is tricky. Sure, all the test models may have worked, but how do you know *yours* does. Seriously though, this isn't a very good idea unless you're guarding the codes to start WWIII. The most likely outcome is that you will lose your data accidentally because you broke your arm and spent 16 hours in the ER.
37,750
Does a self destructing HDD (physically destruction) that will destroy after a certain time exist, or when I use some software to initiate its self-destruction? I guess it need to be set in BIOS or on some other "lower" level? I mean, a HDD that I can buy as a casual customer, and I don't need to be part of a government or some agency. Why I would want something like that? If somebody stole my laptop and accessed my data using the right password, then after 24h I want to destroy the HDD, unless the attacker knows that I have set my HDD to self-destruct on some BIOS-level, and re-enable the next 24 or 48 or some other time hour period e.t.c. But this is just an example, in reality it could be done differently.
2013/06/20
[ "https://security.stackexchange.com/questions/37750", "https://security.stackexchange.com", "https://security.stackexchange.com/users/-1/" ]
There really is no need as of current. [Self Encrypting Drives (SED)](http://www.trustedcomputinggroup.org/solutions/data_protection) are available for "causal customers" for a while now, in laptop and enterprise HDD versions from the major HDD manufacturers. The data on those disks is encrypted by a sufficiently strong algorithm (e.g. AES-128), the key is stored on a separate portion of this disk and encrypted by another key which is either supplied by the user (by typing, off a smart card, ...) or residing in the system's TPM. Wiping the keys or forgetting the key-decryption key effectively makes the data unreadable unless someone breaks the encryption algorithm or builds a quantum computer operating with at least 128 qubits which is not likely to happen any time soon. If the data you store on that very disk would significantly be decreased in value in a 10-year timeframe, you can consider an SED to have "safely wiped" the data as soon as the key is gone.
Testing a self-destruct mechanism is tricky. Sure, all the test models may have worked, but how do you know *yours* does. Seriously though, this isn't a very good idea unless you're guarding the codes to start WWIII. The most likely outcome is that you will lose your data accidentally because you broke your arm and spent 16 hours in the ER.
6,149,885
When I select "File->New->VCL Forms Application - Delphi for Win32" I get auto-generated unit and form with names "unit1.pas" and "Form1" respectively. But one day my Delphi crashed, and now when I press "VCL Forms Application" to create new project, it generates unit and form with names "unit2.pas" and "Form2". How can I fix it? Incidentally, I installed, in front of new, older version of Delphi (so I can build applications for Win98). When I created a new project, I got the same results: "unit2.pas" and "Form2" auto-generated names. So I think that the index for generating names is stored somewhere globally, independently of the Delphi version. I tried to find that index in the Windows registry: (HKCU / HKLM)\Software\(Borland / CodeGear / Embarcadero) and in folders "C:\Program Files\Common Files" "Borland Shared" and "CodeGear Shared". So far without success.
2011/05/27
[ "https://Stackoverflow.com/questions/6149885", "https://Stackoverflow.com", "https://Stackoverflow.com/users/772586/" ]
the number of the auto-generated unit and form names in not stored , is calculated based in the content of the RAD Studio\Project, you can change this folder from the IDE in the Tools/Options -> Environment Options -> Default project folder.
Look at your Documents\RAD Studio\Projects folder. I think new form and unit name is prepared automatically according to the last unit name in that folder.
176,923
I was just given a postscript file containing what I was lead to believe was a document pertaining to some work I was being asked to consult on. Although it didn't seem to contain anything that resembled a document at all. The guy who gave it to me seemed pretty keen for me to run the file in internet explorer. When I did explorer immediately opened and closed, but did not crash. Is it possible that a postscript file can contain a malware of some kind?
2018/01/06
[ "https://security.stackexchange.com/questions/176923", "https://security.stackexchange.com", "https://security.stackexchange.com/users/167840/" ]
I believe that you did no want to ask if a Postscript file can *contain* a virus but if Postscript can be *used as attack vector*. There are actually several examples where the complexity and power of Postscript could be used for malicious purposes: * [Hangul Word Processor and PostScript Abused Via Malicious Attachments](http://blog.trendmicro.com/trendlabs-security-intelligence/hangul-word-processor-postscript-abused-malicious-attachments/). This used a vulnerability (CVE-2017-8291) in the embedded Ghostscript engine and allowed an attacker to cause code execution when the victim was reading an Office document. Note that the same bug in Ghostscript could also be used outside of HWP. * [Microsoft Office CVE-2015-2545 Remote Code Execution Vulnerability](https://www.symantec.com/security_response/vulnerability.jsp?bid=76667). This is a similar issue, only for Microsoft Office. See also [How the EPS File Exploit Works to Bypass EMET (CVE-2015-2545) – A Technical Exploration](http://blog.morphisec.com/exploit-bypass-emet-cve-2015-2545). And because this bug was used widely, the code had probably more bugs and the EPS functionality was not really needed anyway Microsoft finally disabled it: [Support for EPS images has been turned off in Office](https://support.office.com/en-us/article/support-for-eps-images-has-been-turned-off-in-office-a069d664-4bcf-415e-a1b5-cbb0c334a840). * Attacking the network using code execution in networked postscript capable printers: [We don't want to alarm you, but PostScript makes your printer an attack vector](https://www.theregister.co.uk/2017/01/31/postscript_bug/).
PostScript is a [Turing-complete language](https://en.wikipedia.org/wiki/PostScript#The_language), so theoretically, yes, they could be malicious. However, a PostScript viewer wouldn't allow it to affect your files, so it would spend some of your cpu time. On the other hand, you could put a .ps filename to any file, so requesting the file to be opened with Internet Explorer (which is *not* a PostScript viewer¹) could actually intend that Internet Explorer mime-sniffs that it is something else (a MHTML page, perhaps?) and runs on something else. ¹ If it is really PostScript what is being fed to Internet Explorer, the most sensible action I would expect would be an Adobe Acrobat Plugin to be invoked (although I don't remember it being able to handle .ps, you needed a different program for those). Could it be targetting something in such plugin?
31,112,547
Sorry for the silly question, I am new to cloud development. I am trying to develop a realtime processing app in cloud, which can process the data from a sensor in realtime. the data stream is very low data rate, <50Kbps per sensor. probably <10 sensors will be running at once. I am confused, what is the use of Amazon Kinesis for this application. I can use EC2 directly to receive my stream and process it. Why do I need Kinesis?
2015/06/29
[ "https://Stackoverflow.com/questions/31112547", "https://Stackoverflow.com", "https://Stackoverflow.com/users/3714185/" ]
> > Why do I need Kinesis? > > > Short answer, you don't. Yes, you can use EC2 - and probably dozens of other technologies. Here is the first two sentences of the Kinesis product page: > > Amazon Kinesis is a fully managed service for real-time processing of streaming data at massive scale. You can configure hundreds of thousands of data producers to continuously put data into an Amazon Kinesis stream. > > > So, if want to manage the stack yourelf, and/or you don't need massive scale and/or you don't need the ability to scale this processing to hundreds of thousands of simulataneous producers, then Kinesis may be overkill. On the other hand, if the ingestion of this data is mission critical, and you don't have the time, skills or ability to manage the underlying infrastructure - or there is a chance the scale of your application will grow exponentially, then maybe Kinesis is the right choice - only you can decide based on your requirements.
Along with what E.J Brennan Just said, there are many other ways to solve your problem as the rate of data is very low. As far as I know, amazon kinesis runs on ec2 under the hood, so may be your question is why to use kinesis as a streaming solution. for scalability reasons ,you might need the streaming solution in future, as your volume of data grows and as the cost of maintaining the on premises resources increases and the focus shifts from application development to administration. So kinesis for that matter ,would provide pay per use model instead of you worrying about increasing/reducing your resource stack.
201,966
Can a single Apple ID/ iTunes account switch between multiple country AppStores to buy free Apps unique to each country? If I use my single Apple ID/ iTunes account but move & have moved across countries where certain Apps are only on those country AppStores, can I switch between them and buy Free Apps, yet maintain them on my iTunes and iOS devices? Additional Information: I am wondering if this [workaround](https://apple.stackexchange.com/a/116715/38176) worked for someone / still works? It was done on Mac OSX, but I am wondering if it can be done in Windows.
2015/08/25
[ "https://apple.stackexchange.com/questions/201966", "https://apple.stackexchange.com", "https://apple.stackexchange.com/users/38176/" ]
Changing a country of your single Apple ID is a pain. You can do it ones without consequences but the second time you do it you'll be asked to provide credit card details of a "new" country of your residence. The easiest way to use App Store of different countries is to have 2 different Apple ID registered for certain country.
It can be done, but you'll want to follow the steps in this guide (<https://support.apple.com/en-ph/HT201389>) since switching countries back and forth can produce migraines if not done properly. Especially if you have any paid apps or apps that have been removed from the App Store, but you still own.
7,641,209
I'm browsing Nuget libraries from an author and see questionable content.. something that doesn't have the same quality as some of the prior work I've seen. How do I know that the author of a Nuget package is really that person? Can I extend that trust into the built-in update process of Nuget?
2011/10/03
[ "https://Stackoverflow.com/questions/7641209", "https://Stackoverflow.com", "https://Stackoverflow.com/users/328397/" ]
The "author" is simply metadata that is included in the .nuspec file. See (http://docs.nuget.org/docs/reference/nuspec-reference). This can be different than the package owner/creator. In the beginning when NuGet was starting out, there were a few people that were creating packages for projects that they didn't author mainly to get the package in the repository. Now that NuGet is more established, it is recommended that people contact the project owner and have them create their own NuGet package. For packages that have already been uploaded to the repository by someone other than the author, the author can request to have the ownership transferred to them. Since there's no guarantee that the package creator is the original author, I'm not sure how that affects trust. However, if you install a package, it is pretty safe to say that updates will either be from the same person that created the initial package, or potentially it will have transferred to the actual author of the project. In other words, trust will likely be the same or perhaps better (if actual author), but seldom worse than the original package you installed. Hope that helps.
Kiliman's answer is correct and comprehensive. I would like to add that it is up to the community to start writing reviews of nuget packages in the NuGet Gallery. Reviews are very few and far between and they have a star-rating system, so if you don't think a package is useful, or if you have concerns about a particular package, write them there and help your fellow programmers.
7,641,209
I'm browsing Nuget libraries from an author and see questionable content.. something that doesn't have the same quality as some of the prior work I've seen. How do I know that the author of a Nuget package is really that person? Can I extend that trust into the built-in update process of Nuget?
2011/10/03
[ "https://Stackoverflow.com/questions/7641209", "https://Stackoverflow.com", "https://Stackoverflow.com/users/328397/" ]
The "author" is simply metadata that is included in the .nuspec file. See (http://docs.nuget.org/docs/reference/nuspec-reference). This can be different than the package owner/creator. In the beginning when NuGet was starting out, there were a few people that were creating packages for projects that they didn't author mainly to get the package in the repository. Now that NuGet is more established, it is recommended that people contact the project owner and have them create their own NuGet package. For packages that have already been uploaded to the repository by someone other than the author, the author can request to have the ownership transferred to them. Since there's no guarantee that the package creator is the original author, I'm not sure how that affects trust. However, if you install a package, it is pretty safe to say that updates will either be from the same person that created the initial package, or potentially it will have transferred to the actual author of the project. In other words, trust will likely be the same or perhaps better (if actual author), but seldom worse than the original package you installed. Hope that helps.
I know this is a fairly old question, but [this](https://stackoverflow.com/a/7641858/1174149) is the best answer I've found. I'd like to add my $.02 to the till. I've got a couple of packages on nuget.org that are based on another package. [Unity.Mvc3.VB](http://nuget.org/packages/Unity.Mvc3.VB), [Unity.Mvc3.DLL](http://nuget.org/packages/Unity.Mvc3.DLL), and I'm working on a Unity.Mvc4.VB package. They're all based on [Unity.Mvc3](http://nuget.org/packages/Unity.Mvc3) from [devtrends](http://nuget.org/profiles/devtrends). The DLL project basically just installs the assembly reference for Unity.Mvc3 without the c# source code files so that it's a little easier to use in projects of other languages. The VB package(s) include VB.Net versions of the C# source files. Since I didn't write anything other than the nuspec file in the DLL package, I just listed [Paul Hiles](http://nuget.org/packages?q=Paul%20Hiles) as the author and myself as the package owner. For the VB package(s), again I'm listed as the owner, but for the author I list Paul and myself with each of our contributions in parenthesis like so: ![Nuget Package Attribution](https://i.stack.imgur.com/LTQyx.jpg) The idea is that I'm giving credit to the original author of my derivative work.
7,641,209
I'm browsing Nuget libraries from an author and see questionable content.. something that doesn't have the same quality as some of the prior work I've seen. How do I know that the author of a Nuget package is really that person? Can I extend that trust into the built-in update process of Nuget?
2011/10/03
[ "https://Stackoverflow.com/questions/7641209", "https://Stackoverflow.com", "https://Stackoverflow.com/users/328397/" ]
I know this is a fairly old question, but [this](https://stackoverflow.com/a/7641858/1174149) is the best answer I've found. I'd like to add my $.02 to the till. I've got a couple of packages on nuget.org that are based on another package. [Unity.Mvc3.VB](http://nuget.org/packages/Unity.Mvc3.VB), [Unity.Mvc3.DLL](http://nuget.org/packages/Unity.Mvc3.DLL), and I'm working on a Unity.Mvc4.VB package. They're all based on [Unity.Mvc3](http://nuget.org/packages/Unity.Mvc3) from [devtrends](http://nuget.org/profiles/devtrends). The DLL project basically just installs the assembly reference for Unity.Mvc3 without the c# source code files so that it's a little easier to use in projects of other languages. The VB package(s) include VB.Net versions of the C# source files. Since I didn't write anything other than the nuspec file in the DLL package, I just listed [Paul Hiles](http://nuget.org/packages?q=Paul%20Hiles) as the author and myself as the package owner. For the VB package(s), again I'm listed as the owner, but for the author I list Paul and myself with each of our contributions in parenthesis like so: ![Nuget Package Attribution](https://i.stack.imgur.com/LTQyx.jpg) The idea is that I'm giving credit to the original author of my derivative work.
Kiliman's answer is correct and comprehensive. I would like to add that it is up to the community to start writing reviews of nuget packages in the NuGet Gallery. Reviews are very few and far between and they have a star-rating system, so if you don't think a package is useful, or if you have concerns about a particular package, write them there and help your fellow programmers.
532
I understand bacteria have become resistant to antibiotics due to selection pressures, but how do resistant bacteria process antibiotics when exposed to it, compared to non-resistant bacteria. Also, what research is being conducted to combat bacteria resistant to antibiotics?
2012/01/07
[ "https://biology.stackexchange.com/questions/532", "https://biology.stackexchange.com", "https://biology.stackexchange.com/users/158/" ]
Bacteria usually gain resistance mechanisms through horizontal gene transfer (such as conjugation and phage infection). The four main mechanisms in which bacteria elude antibiotics are: 1. **Drug Inactivation**: For example, E. coli can produce beta-lactamase that inactivate many lactam based antibiotics such as penicillin. 2. **Alteration of Target Site**: Mutations in genes encoding for target sites can reduce drug binding affinity. Example: Random mutations in DNA gyrase and topoisomerase IV reduces binding affinity to fluoroquinolone. 3. **Alteration of Metabolic Pathways**: Many drugs target certain parts of metabolic pathways by inactivating enzymes or sequestering substrates. Bacteria can use alternative metabolic pathways or find ways to uptake the necessary nutrients from the environment. 4. **Reduced drug accumulation**: Caused by reduced drug permeability or the ability of the bacteria to transport drugs out of the cell (for example, tetA encodes for a tetracycline efflux transporter). They can gain these abilities through conjugation, phage infection (transduction), or uptake of environmental DNA (transformation). Wikipedia has a pretty extensive and comprehensive article on antibiotic resistance. There's also a good list of references. <http://en.wikipedia.org/wiki/Antibiotic_resistance>
The lead question you have answered yourself: bacteria become resistant because of the selection pressure caused by the antibiotic's effective suppression of the original non-resistant bacteria. Those variants which resist the suppression are selected for as a natural consequence. How do resistant bacteria process antibiotics? It depends on the details of the particular antibiotic, and perhaps the kind of resistance. Take the case of [penicillin](http://en.wikipedia.org/wiki/Penicillin) and related antibiotics, like [amoxicillin](http://en.wikipedia.org/wiki/Amoxicillin). These antibiotics act by inhibiting the formation of a layer of the cell wall which is essential for many kinds of bacteria. This prevents multiplication of the bacteria and contributes to their distruction. Wikipedia gives [some details on the action of these β-lactam antibiotics](http://en.wikipedia.org/wiki/Beta-lactam_antibiotic). Bacterial resistance to drugs like penicillin usually takes the form of the bacteria producing an enzyme (called β-lactamase) which breaks apart a ring in the drug molecule, disabling it and thus removing its effect on cell wall synthesis. This resistance has become common because of the widespread use of penicillin-like drugs and because of transfer of the gene for it between bacteria species as by [plasmids](http://en.wikipedia.org/wiki/Plasmid). Researchers managed in the 70s to discover and develop an auxilliary weapon in this war. This was [clavulanic acid](http://en.wikipedia.org/wiki/Clavulanic_acid), which has a structure partly similar to the penicillins and like them is attacked by the bacterial β-lactamase enzyme. Unlike the penicilins though, it forms a permanent bond with the enzyme molecule, disabling its activity. This has led to currently effective drugs like [Augmentin](http://en.wikipedia.org/wiki/Amoxicillin/clavulanic_acid) which include in the same pill both amoxicillin and its protector, clavulanic acid.
532
I understand bacteria have become resistant to antibiotics due to selection pressures, but how do resistant bacteria process antibiotics when exposed to it, compared to non-resistant bacteria. Also, what research is being conducted to combat bacteria resistant to antibiotics?
2012/01/07
[ "https://biology.stackexchange.com/questions/532", "https://biology.stackexchange.com", "https://biology.stackexchange.com/users/158/" ]
Bacteria usually gain resistance mechanisms through horizontal gene transfer (such as conjugation and phage infection). The four main mechanisms in which bacteria elude antibiotics are: 1. **Drug Inactivation**: For example, E. coli can produce beta-lactamase that inactivate many lactam based antibiotics such as penicillin. 2. **Alteration of Target Site**: Mutations in genes encoding for target sites can reduce drug binding affinity. Example: Random mutations in DNA gyrase and topoisomerase IV reduces binding affinity to fluoroquinolone. 3. **Alteration of Metabolic Pathways**: Many drugs target certain parts of metabolic pathways by inactivating enzymes or sequestering substrates. Bacteria can use alternative metabolic pathways or find ways to uptake the necessary nutrients from the environment. 4. **Reduced drug accumulation**: Caused by reduced drug permeability or the ability of the bacteria to transport drugs out of the cell (for example, tetA encodes for a tetracycline efflux transporter). They can gain these abilities through conjugation, phage infection (transduction), or uptake of environmental DNA (transformation). Wikipedia has a pretty extensive and comprehensive article on antibiotic resistance. There's also a good list of references. <http://en.wikipedia.org/wiki/Antibiotic_resistance>
> > Also, what research is being conducted to combat bacteria resistant to antibiotics? > > > You've gotten some decent answers for how antibiotic resistance arises, so I thought I'd touch on this a bit. There's three major thrusts to anti-resistance research: 1. Finding new targets and mechanisms. Essentially, creating new antibiotics that are subtly different enough that they slip past existing resistance mechanisms (usually by tacking a more elaborate side-group onto an existing antibiotic) or an entirely new class that targets a different mechanism to disrupt bacteria. This is essentially a drug development task, and is *hard*. 2. Antimicrobial stewardship. This is largely clinical research examining how we use are existing antibiotics. Can we alter the duration/deployment/etc. of a course of antibiotics to minimize the chance of resistance. Can we minimize the number of times we use antibiotics inappropriately, giving rise to resistance with no gain to the patient? 3. Alternate antimicrobial techniques. Can we use non-antibiotic techniques to prevent bacterial infections in the first place, or treat them when they occur? Antimicrobial surfaces, like copper or silver impregnated surfaces, improved surface cleaning, etc.
532
I understand bacteria have become resistant to antibiotics due to selection pressures, but how do resistant bacteria process antibiotics when exposed to it, compared to non-resistant bacteria. Also, what research is being conducted to combat bacteria resistant to antibiotics?
2012/01/07
[ "https://biology.stackexchange.com/questions/532", "https://biology.stackexchange.com", "https://biology.stackexchange.com/users/158/" ]
Bacteria usually gain resistance mechanisms through horizontal gene transfer (such as conjugation and phage infection). The four main mechanisms in which bacteria elude antibiotics are: 1. **Drug Inactivation**: For example, E. coli can produce beta-lactamase that inactivate many lactam based antibiotics such as penicillin. 2. **Alteration of Target Site**: Mutations in genes encoding for target sites can reduce drug binding affinity. Example: Random mutations in DNA gyrase and topoisomerase IV reduces binding affinity to fluoroquinolone. 3. **Alteration of Metabolic Pathways**: Many drugs target certain parts of metabolic pathways by inactivating enzymes or sequestering substrates. Bacteria can use alternative metabolic pathways or find ways to uptake the necessary nutrients from the environment. 4. **Reduced drug accumulation**: Caused by reduced drug permeability or the ability of the bacteria to transport drugs out of the cell (for example, tetA encodes for a tetracycline efflux transporter). They can gain these abilities through conjugation, phage infection (transduction), or uptake of environmental DNA (transformation). Wikipedia has a pretty extensive and comprehensive article on antibiotic resistance. There's also a good list of references. <http://en.wikipedia.org/wiki/Antibiotic_resistance>
Most resistance is acquired by horizontal transfer by various means Conjugation is the sexual transfer Transduction is transfer by viruses that integrate into the genome then when they are activated, they carry bits of the genome attached to their own to a new host Transformation is the uptake of naked plasmid DNA into a new host Transfection is similar to transduction and is viral mediated And of course you have acquired which results from point mutations that alter the cells ability to be harmed by an agent, simple changes like change of the cellular membrane or receptor sites
532
I understand bacteria have become resistant to antibiotics due to selection pressures, but how do resistant bacteria process antibiotics when exposed to it, compared to non-resistant bacteria. Also, what research is being conducted to combat bacteria resistant to antibiotics?
2012/01/07
[ "https://biology.stackexchange.com/questions/532", "https://biology.stackexchange.com", "https://biology.stackexchange.com/users/158/" ]
The lead question you have answered yourself: bacteria become resistant because of the selection pressure caused by the antibiotic's effective suppression of the original non-resistant bacteria. Those variants which resist the suppression are selected for as a natural consequence. How do resistant bacteria process antibiotics? It depends on the details of the particular antibiotic, and perhaps the kind of resistance. Take the case of [penicillin](http://en.wikipedia.org/wiki/Penicillin) and related antibiotics, like [amoxicillin](http://en.wikipedia.org/wiki/Amoxicillin). These antibiotics act by inhibiting the formation of a layer of the cell wall which is essential for many kinds of bacteria. This prevents multiplication of the bacteria and contributes to their distruction. Wikipedia gives [some details on the action of these β-lactam antibiotics](http://en.wikipedia.org/wiki/Beta-lactam_antibiotic). Bacterial resistance to drugs like penicillin usually takes the form of the bacteria producing an enzyme (called β-lactamase) which breaks apart a ring in the drug molecule, disabling it and thus removing its effect on cell wall synthesis. This resistance has become common because of the widespread use of penicillin-like drugs and because of transfer of the gene for it between bacteria species as by [plasmids](http://en.wikipedia.org/wiki/Plasmid). Researchers managed in the 70s to discover and develop an auxilliary weapon in this war. This was [clavulanic acid](http://en.wikipedia.org/wiki/Clavulanic_acid), which has a structure partly similar to the penicillins and like them is attacked by the bacterial β-lactamase enzyme. Unlike the penicilins though, it forms a permanent bond with the enzyme molecule, disabling its activity. This has led to currently effective drugs like [Augmentin](http://en.wikipedia.org/wiki/Amoxicillin/clavulanic_acid) which include in the same pill both amoxicillin and its protector, clavulanic acid.
Most resistance is acquired by horizontal transfer by various means Conjugation is the sexual transfer Transduction is transfer by viruses that integrate into the genome then when they are activated, they carry bits of the genome attached to their own to a new host Transformation is the uptake of naked plasmid DNA into a new host Transfection is similar to transduction and is viral mediated And of course you have acquired which results from point mutations that alter the cells ability to be harmed by an agent, simple changes like change of the cellular membrane or receptor sites
532
I understand bacteria have become resistant to antibiotics due to selection pressures, but how do resistant bacteria process antibiotics when exposed to it, compared to non-resistant bacteria. Also, what research is being conducted to combat bacteria resistant to antibiotics?
2012/01/07
[ "https://biology.stackexchange.com/questions/532", "https://biology.stackexchange.com", "https://biology.stackexchange.com/users/158/" ]
> > Also, what research is being conducted to combat bacteria resistant to antibiotics? > > > You've gotten some decent answers for how antibiotic resistance arises, so I thought I'd touch on this a bit. There's three major thrusts to anti-resistance research: 1. Finding new targets and mechanisms. Essentially, creating new antibiotics that are subtly different enough that they slip past existing resistance mechanisms (usually by tacking a more elaborate side-group onto an existing antibiotic) or an entirely new class that targets a different mechanism to disrupt bacteria. This is essentially a drug development task, and is *hard*. 2. Antimicrobial stewardship. This is largely clinical research examining how we use are existing antibiotics. Can we alter the duration/deployment/etc. of a course of antibiotics to minimize the chance of resistance. Can we minimize the number of times we use antibiotics inappropriately, giving rise to resistance with no gain to the patient? 3. Alternate antimicrobial techniques. Can we use non-antibiotic techniques to prevent bacterial infections in the first place, or treat them when they occur? Antimicrobial surfaces, like copper or silver impregnated surfaces, improved surface cleaning, etc.
Most resistance is acquired by horizontal transfer by various means Conjugation is the sexual transfer Transduction is transfer by viruses that integrate into the genome then when they are activated, they carry bits of the genome attached to their own to a new host Transformation is the uptake of naked plasmid DNA into a new host Transfection is similar to transduction and is viral mediated And of course you have acquired which results from point mutations that alter the cells ability to be harmed by an agent, simple changes like change of the cellular membrane or receptor sites
583,539
I looked at several related questions because some questions remained for me. I have just bought a Asus Ultrabook with Windows 8 pre-installed, 500gb HDD and 24gb SSD. Apparently (according to some other answers to related questions) Windows is installed in the 24gb SSD because it boots very fast. I intend to follow this tutorial <http://www.everydaylinuxuser.com/2014/05/install-ubuntu-1404-alongside-windows.html> but I have few questions about the outcome and process. First, Can I install only Ubuntu in the SSD (considering I'm novice and didn't find any specific tutorial) and keep windows in the HDD, does worth doing that ? I intend to use MatLab, Python (I'm still novice at Python too, so nothing demanding), Mathematica and others, in Windows I need to use AutoCad 2d and some other similar programs. If I do install Ubuntu in SSD, would it be "painful" to access bios as it is with Windows ? (I can't access directly pressing F2, I need to follow some steps and then restart twice the computer.) Then, assuming everything above is ok, does that tutorial works for my case ? He shrinks partitions on Windows, could it result in a problem since "Windows is installed in the SSD"? Obs: I'm assuming that SSD couldn't have Windows and Ubuntu since it is too small.
2015/02/09
[ "https://askubuntu.com/questions/583539", "https://askubuntu.com", "https://askubuntu.com/users/338735/" ]
Don't do it! ------------ Leave the SSD alone and install on the HDD. Then use [`bcache`](https://wiki.archlinux.org/index.php/Bcache) to use the 24GB HDD as a cache for the HDD just like Windows uses [SRT](https://en.wikipedia.org/wiki/Smart_Response_Technology)! Follow this advice: [Installing Ubuntu Alongside a Pre-Installed Windows with UEFI](https://askubuntu.com/questions/221835/installing-ubuntu-on-a-pre-installed-windows-8-64-bit-system-uefi-supported) instead.
You can install Ubuntu on the small SSD. I did that, but that small SSD isn't very reliable. It is already going bad for me, it has many bad sectors. I wouldn't recommend it honestly.
159,169
**Could humanity move a planet such as Jupiter by forcing it to vent its gas?** Assuming we have the technology to do huge mining operations and use these to make some of Jupiter's moons into a huge tube going deep into Jupiter. This tube would carry the gas from the mid area of the planet to space. could this gas tube move gas with just the vacuum, or would it require something else to propel it? If not how could we move Jupiter or a similar gas giant? edit: if you think of the vacuum of space as your mouth, the tube as a straw, and Jupiter as the drink then you get the idea. straws work because we create a lower pressure place at one end of the straw. edit 2: was wrong, you need to fuse the gas coming out of the end of the straw.
2019/10/23
[ "https://worldbuilding.stackexchange.com/questions/159169", "https://worldbuilding.stackexchange.com", "https://worldbuilding.stackexchange.com/users/65697/" ]
Yes, if the tube is a candle. ============================= While a giant tube or straw would not do anything for you on its own (as others have noted, gravity has the same pull inside the tube as outside), we can take it a step further into something that works. An older question on [getting Earth to Jupiter](https://worldbuilding.stackexchange.com/questions/36732/fusion-candle-getting-earth-to-jupiter) mentions the proposed physics of a gas giant-scale fusion torch drive that you can use to ride around on. The explanation there is quite well done, but the short of it is: 1. Your tube feeds materials (at great expense, but given the scale of construction here energy is the least of our concerns) to a large fusion torch on the outer end. 2. The inner end contains another fusion torch to keep our planetary drive afloat, instead of ramming itself into Jupiter's depths at the first opportunity. 3. Maneuvering is accomplished via lateral thrusters (or still more, smaller, fusion torches) that move the whole tube around Jupiter as needed.
If you use the tube idea the gas would just fall back out into Jupiter, also you'd definitely have propel the gas out somehow. Secondly, Jupiter is the second most massive thing in our solar system. It is so big it makes the sun itself wobble. Momentum is *mass x velocity* You want to change its trajectory you will need either a huge amount of mass or a huge amount of velocity. Huge amount of mass is silly because if you could move huge masses on a whim you wouldn't have this issue. What's left is velocity. If you can shoot some asteroids at relativistic speeds you can knock even Jupiter into a new trajectory. That's probably the easiest way to do it.
39,782
My wife has started a business, and the website is an important way to reach potential customers. I'm a software developer, so 'of course' I'm taking care of the technical stuff. I arranged a webhost and uploaded and configured WordPress (which, together with a decent theme, fits our bill nicely). My wife has some knowledge of HTML and CSS, so she can customize the website herself. Now, I want to professionalize this stuff. If anything stupid happens (accidentally mess up a file, bug in WordPress update, site is hacked) we lose the entire site. What do I need to manage the site? When googling this subject, I only find FTP tutorials, which is not quite the level of info I'm after. I've figured: * backup of files + database (I already have these, but I have not tested whether restore works) * a local test environment for editing the theme and testing wordpress updates * a test plan, containing some things to test before uploading the test environment to the live site * versioning - should anything go wrong, we should be able to go to a previous version. * uptime monitoring - if the site goes down, I won't have to hear it from customers Suggested by [bybe](https://webmasters.stackexchange.com/a/39787/21196), mostly security related: * use a VPS. This will shield me from attacks on other shared hosting accounts, however it opens up another can of worms, because I have to keep the server safe *myself*. * remove write permissions on all files that don't need to be writable (template files, .htaccess) * subscribe to the CMS mailing list (Wordpress in this case) and update as soon as new releases are available * minimize the number of CMS plugins - they have their own vulnerabilities * remove the default admin account of the CMS * put the website in maintenance mode when modifying. It allows for a consistent backup and is nicer to visitors. Is there anything missing from this list?
2013/01/05
[ "https://webmasters.stackexchange.com/questions/39782", "https://webmasters.stackexchange.com", "https://webmasters.stackexchange.com/users/21196/" ]
You will definitely want to keep it simple. But ultimately it depends on what kind of site you are going for (will people be able to purchase stuff?). If you have a simple WordPress site, then you would want to make backups (or make sure the copy on the public server is not the only copy; don't backup the static files from the server but DO backup the database every week). For larger sites or if you are storing any user-data on the database, back up more often. For larger e-commerce sites, it may be a good idea to invest in a SSL certificate to gain visitors' trust as well as encrypt the data (you could generate your own self-signed certificate for free but it should only be used in a development environment). Definitely consider renting a VPS or even a dedicated server if you are concerned with security; it offers much greater flexibility but with power comes responsibility (and also the potential to mess things up). You could get really fancy and set up synchronized databases across remote servers, use `rsync` to backup the data on a schedule, etc. But again, keep it simple. For a test environment, not a bad idea, and probably a good thing if you would be changing the design and content often, but you'd want to make sure the WP versions and settings are identical. Very important. Lastly, keep it simple. Human errors in deleting/messing files up are the leading cause for data loss. Hackers are not.
If you afraid of your site getting hacked or getting effected by malwares, then I suggest to use the <http://sucuri.net/> Although is a paid one, but it will take care of your site security quite efficiently. Apart from this, from your side taking precautions is advisable. Get the database backup every week. Set the option of **backup database** in your hosting ON and you will get the database backup in your mail time and again on a regular basis.
39,782
My wife has started a business, and the website is an important way to reach potential customers. I'm a software developer, so 'of course' I'm taking care of the technical stuff. I arranged a webhost and uploaded and configured WordPress (which, together with a decent theme, fits our bill nicely). My wife has some knowledge of HTML and CSS, so she can customize the website herself. Now, I want to professionalize this stuff. If anything stupid happens (accidentally mess up a file, bug in WordPress update, site is hacked) we lose the entire site. What do I need to manage the site? When googling this subject, I only find FTP tutorials, which is not quite the level of info I'm after. I've figured: * backup of files + database (I already have these, but I have not tested whether restore works) * a local test environment for editing the theme and testing wordpress updates * a test plan, containing some things to test before uploading the test environment to the live site * versioning - should anything go wrong, we should be able to go to a previous version. * uptime monitoring - if the site goes down, I won't have to hear it from customers Suggested by [bybe](https://webmasters.stackexchange.com/a/39787/21196), mostly security related: * use a VPS. This will shield me from attacks on other shared hosting accounts, however it opens up another can of worms, because I have to keep the server safe *myself*. * remove write permissions on all files that don't need to be writable (template files, .htaccess) * subscribe to the CMS mailing list (Wordpress in this case) and update as soon as new releases are available * minimize the number of CMS plugins - they have their own vulnerabilities * remove the default admin account of the CMS * put the website in maintenance mode when modifying. It allows for a consistent backup and is nicer to visitors. Is there anything missing from this list?
2013/01/05
[ "https://webmasters.stackexchange.com/questions/39782", "https://webmasters.stackexchange.com", "https://webmasters.stackexchange.com/users/21196/" ]
I'm a new webmaster myself, so I'm far from an expert. What I can tell you, though, is my own experiences over the last few months. A little background: I'm a Windows guy with little Linux/Apache experience, proficient in PHP/HTML/CSS, with a decent base knowledge of WordPress (WP). I setup a local test environment with XAMPP and spent a good amount of time installing/configuring/deleting WP. Then I spent a good few days learning WP plugin development. Did it all locally, creating a small plugin. Got it running fine, uploaded it live, then had to spend a bunch of time trying to figure out why it wasn't working on my live site. I don't remember the exact causes, but it boils down to my host having different settings/permissions/etc., than my local server. While I could have spent a lot more time learning about server management in-depth and trying to match my local-to-live environments, I decided to take an easier route. I setup a live test domain - multiple actually. My hosting plan is a typical shared plan. In fact, it's the cheapest one my host offers, which allows unlimited domain addons but doesn't allow those domains to point anywhere but the root. So I found out how to use .htaccess to dynamically redirect different domains to different directories, some simple cut-n-paste stuff. Then I got some free subdomains through CU.CC. While I wouldn't use them for any true sites because they're not true domains, i.e., you don't 'own' them, they work great for live testing. I use one freebie as a clone of my live site, so if I want to install a plugin or theme I can test it thoroughly before sending it live. Since my test domain is on the same server, I know exactly how my live site will appear. I use another freebie as a general WP testbed. And yet another for general webdev testing. For cloning my site, I use a free WP plugin called 'Duplicator'. It backs up a site's files and database. It also handles all the WP backend stuff necessary if you want to restore to another domain. This works great for my WP testbed, since I only had to install WP once, load it with my dummy content & users, setup my admin prefs like permalinks, timezone, etc. Now I can hack WP all I want then restore the backup at will, to my near-virgin yet configured-as-I-want WP install.
If you afraid of your site getting hacked or getting effected by malwares, then I suggest to use the <http://sucuri.net/> Although is a paid one, but it will take care of your site security quite efficiently. Apart from this, from your side taking precautions is advisable. Get the database backup every week. Set the option of **backup database** in your hosting ON and you will get the database backup in your mail time and again on a regular basis.
39,782
My wife has started a business, and the website is an important way to reach potential customers. I'm a software developer, so 'of course' I'm taking care of the technical stuff. I arranged a webhost and uploaded and configured WordPress (which, together with a decent theme, fits our bill nicely). My wife has some knowledge of HTML and CSS, so she can customize the website herself. Now, I want to professionalize this stuff. If anything stupid happens (accidentally mess up a file, bug in WordPress update, site is hacked) we lose the entire site. What do I need to manage the site? When googling this subject, I only find FTP tutorials, which is not quite the level of info I'm after. I've figured: * backup of files + database (I already have these, but I have not tested whether restore works) * a local test environment for editing the theme and testing wordpress updates * a test plan, containing some things to test before uploading the test environment to the live site * versioning - should anything go wrong, we should be able to go to a previous version. * uptime monitoring - if the site goes down, I won't have to hear it from customers Suggested by [bybe](https://webmasters.stackexchange.com/a/39787/21196), mostly security related: * use a VPS. This will shield me from attacks on other shared hosting accounts, however it opens up another can of worms, because I have to keep the server safe *myself*. * remove write permissions on all files that don't need to be writable (template files, .htaccess) * subscribe to the CMS mailing list (Wordpress in this case) and update as soon as new releases are available * minimize the number of CMS plugins - they have their own vulnerabilities * remove the default admin account of the CMS * put the website in maintenance mode when modifying. It allows for a consistent backup and is nicer to visitors. Is there anything missing from this list?
2013/01/05
[ "https://webmasters.stackexchange.com/questions/39782", "https://webmasters.stackexchange.com", "https://webmasters.stackexchange.com/users/21196/" ]
You will definitely want to keep it simple. But ultimately it depends on what kind of site you are going for (will people be able to purchase stuff?). If you have a simple WordPress site, then you would want to make backups (or make sure the copy on the public server is not the only copy; don't backup the static files from the server but DO backup the database every week). For larger sites or if you are storing any user-data on the database, back up more often. For larger e-commerce sites, it may be a good idea to invest in a SSL certificate to gain visitors' trust as well as encrypt the data (you could generate your own self-signed certificate for free but it should only be used in a development environment). Definitely consider renting a VPS or even a dedicated server if you are concerned with security; it offers much greater flexibility but with power comes responsibility (and also the potential to mess things up). You could get really fancy and set up synchronized databases across remote servers, use `rsync` to backup the data on a schedule, etc. But again, keep it simple. For a test environment, not a bad idea, and probably a good thing if you would be changing the design and content often, but you'd want to make sure the WP versions and settings are identical. Very important. Lastly, keep it simple. Human errors in deleting/messing files up are the leading cause for data loss. Hackers are not.
The other answers have a lot of good advice but assume some greater or lesser expertise in server maintenance and WordPress knowledge that you a) may not have and b) may not have the time to dedicate to really learn it. Assuming you are already paying for hosting and considering upgrading to a VPS I would strongly recommend moving to an ISP that specializes in WordPress hosting and provides malware protection and recovery, security checks on plugins, backups, and upgrades the core for you. Two that I use for clients now are [Pagely](https://page.ly/) and [WP Engine](http://wpengine.com/). A nice bonus is that these ISPs are also optimized to provide a speed boost which WordPress sometimes needs. WP Engine also comes with a staging environment for testing... If you prefer to not use managed hosting, I STRONGLY recommend you subscribe to [VaultPress](http://vaultpress.com/) as your primary backup and security plan. The Premium service level handles both (the regular service is only backup/restore) and the peace of mind alone is worth the fee. VaultPress is pretty pricey and may be more expensive than using the managed hosting recommended above. The third way to go is to piece together security from your experience, plugins, and ability to search on Google and backups/versioning the same way. Again, this assumes a level of expertise with server config and WordPress that you may not have right away and recovering from a WordPress hack can be a miserable experience, moreso if the attacker is executing scripts in the shell.
39,782
My wife has started a business, and the website is an important way to reach potential customers. I'm a software developer, so 'of course' I'm taking care of the technical stuff. I arranged a webhost and uploaded and configured WordPress (which, together with a decent theme, fits our bill nicely). My wife has some knowledge of HTML and CSS, so she can customize the website herself. Now, I want to professionalize this stuff. If anything stupid happens (accidentally mess up a file, bug in WordPress update, site is hacked) we lose the entire site. What do I need to manage the site? When googling this subject, I only find FTP tutorials, which is not quite the level of info I'm after. I've figured: * backup of files + database (I already have these, but I have not tested whether restore works) * a local test environment for editing the theme and testing wordpress updates * a test plan, containing some things to test before uploading the test environment to the live site * versioning - should anything go wrong, we should be able to go to a previous version. * uptime monitoring - if the site goes down, I won't have to hear it from customers Suggested by [bybe](https://webmasters.stackexchange.com/a/39787/21196), mostly security related: * use a VPS. This will shield me from attacks on other shared hosting accounts, however it opens up another can of worms, because I have to keep the server safe *myself*. * remove write permissions on all files that don't need to be writable (template files, .htaccess) * subscribe to the CMS mailing list (Wordpress in this case) and update as soon as new releases are available * minimize the number of CMS plugins - they have their own vulnerabilities * remove the default admin account of the CMS * put the website in maintenance mode when modifying. It allows for a consistent backup and is nicer to visitors. Is there anything missing from this list?
2013/01/05
[ "https://webmasters.stackexchange.com/questions/39782", "https://webmasters.stackexchange.com", "https://webmasters.stackexchange.com/users/21196/" ]
I'm a new webmaster myself, so I'm far from an expert. What I can tell you, though, is my own experiences over the last few months. A little background: I'm a Windows guy with little Linux/Apache experience, proficient in PHP/HTML/CSS, with a decent base knowledge of WordPress (WP). I setup a local test environment with XAMPP and spent a good amount of time installing/configuring/deleting WP. Then I spent a good few days learning WP plugin development. Did it all locally, creating a small plugin. Got it running fine, uploaded it live, then had to spend a bunch of time trying to figure out why it wasn't working on my live site. I don't remember the exact causes, but it boils down to my host having different settings/permissions/etc., than my local server. While I could have spent a lot more time learning about server management in-depth and trying to match my local-to-live environments, I decided to take an easier route. I setup a live test domain - multiple actually. My hosting plan is a typical shared plan. In fact, it's the cheapest one my host offers, which allows unlimited domain addons but doesn't allow those domains to point anywhere but the root. So I found out how to use .htaccess to dynamically redirect different domains to different directories, some simple cut-n-paste stuff. Then I got some free subdomains through CU.CC. While I wouldn't use them for any true sites because they're not true domains, i.e., you don't 'own' them, they work great for live testing. I use one freebie as a clone of my live site, so if I want to install a plugin or theme I can test it thoroughly before sending it live. Since my test domain is on the same server, I know exactly how my live site will appear. I use another freebie as a general WP testbed. And yet another for general webdev testing. For cloning my site, I use a free WP plugin called 'Duplicator'. It backs up a site's files and database. It also handles all the WP backend stuff necessary if you want to restore to another domain. This works great for my WP testbed, since I only had to install WP once, load it with my dummy content & users, setup my admin prefs like permalinks, timezone, etc. Now I can hack WP all I want then restore the backup at will, to my near-virgin yet configured-as-I-want WP install.
The other answers have a lot of good advice but assume some greater or lesser expertise in server maintenance and WordPress knowledge that you a) may not have and b) may not have the time to dedicate to really learn it. Assuming you are already paying for hosting and considering upgrading to a VPS I would strongly recommend moving to an ISP that specializes in WordPress hosting and provides malware protection and recovery, security checks on plugins, backups, and upgrades the core for you. Two that I use for clients now are [Pagely](https://page.ly/) and [WP Engine](http://wpengine.com/). A nice bonus is that these ISPs are also optimized to provide a speed boost which WordPress sometimes needs. WP Engine also comes with a staging environment for testing... If you prefer to not use managed hosting, I STRONGLY recommend you subscribe to [VaultPress](http://vaultpress.com/) as your primary backup and security plan. The Premium service level handles both (the regular service is only backup/restore) and the peace of mind alone is worth the fee. VaultPress is pretty pricey and may be more expensive than using the managed hosting recommended above. The third way to go is to piece together security from your experience, plugins, and ability to search on Google and backups/versioning the same way. Again, this assumes a level of expertise with server config and WordPress that you may not have right away and recovering from a WordPress hack can be a miserable experience, moreso if the attacker is executing scripts in the shell.
7,639,002
I was making a section with questions and answers, and want them to be hidden, till a user clicks on the relevant part of the section. This is very similar to the question asked here : [jquery Simple SlideToggle in sections](https://stackoverflow.com/questions/7622530/jquery-simple-slidetoggle-in-sections) However, i have multiple questions in a section, flow being like : All questions and answers are hidden. When someone clicks on a section, all the relevant questions in that section open up and when one clicks on the question, it's answer gets displayed. When I click on another question, the previous open answer hides. and the relavent answer opens. When an answer opens and someone clicks on another section, that section opens up hiding up all the other sections. How does one do this?? Here is a sample jsfiddle, if someone can help. <http://jsfiddle.net/NpGMh/1/> Thanks.
2011/10/03
[ "https://Stackoverflow.com/questions/7639002", "https://Stackoverflow.com", "https://Stackoverflow.com/users/837358/" ]
Take a look at this [fiddle](http://jsfiddle.net/NpGMh/3/). I think that's what you intended. I used the `nextUntil` selector to get all siblings within that section up until the next section.
have you looked at the [jquery ui accordian](http://docs.jquery.com/UI/API/1.8/Accordion#overview)?
85,183
The director for the department of the business I work in has resigned and left at short notice. As a manager, any risks with employees on my team leaving I feel I should flag, as a given, to the business owner, who is currently standing in for the director. However, I know that some of my peers are going to leave too, some of which I know would be unexpected to the owner, as they've weathered many difficult transitions before and are somewhat critical to the business. I'm not sure if I should flag the risks of the other managers leaving to the owner, and if I should, how best to approach it. Without the director in place, I fear that the risks associated with the current situation or their departure may not be as visible as they should be and the knowledge and skills they possess will cause significant disruption to the business. I don't want to talk out of turn, but given that I'm not looking to leave, I would prefer to have some contingency planning in place to ensure any disruption from their departure is minimized... Edit: Given some comments have not understood what I'm asking: * Should I tell the owner there is a risk of the other managers leaving and why, as well as highlight the risks that we will attract as a result? I've considered other "top" answers to similar questions and the consensus is generally "That's your managers problem, let them manage it" - My manager/director has left so the owner may be unaware of this risk and the impact it has on the business. * The other managers reasons for leaving are as a result of multiple iterations of restructuring the department and changing approaches to delivery, and feeling like we're not moving forward as a department. In attempts to improve department performance, there has been a restructure every 2 years, with previous methodologies and planning being thrown out each time.
2017/02/17
[ "https://workplace.stackexchange.com/questions/85183", "https://workplace.stackexchange.com", "https://workplace.stackexchange.com/users/64665/" ]
Of course you should flag this to your boss (or their boss if your boss is gone). Here's my logic: 1. Risks to the company are risks to your job, you should do what you can to reduce these risks 2. Telling your grandboss about issues that they might not be aware of is not skipping the chain of command if you have no chain of command 3. Helping your grandboss out at this stage will show that you actually care about the company, making it easier for complaints to be heard in future
If your manager has left, the next higher person in the management chain ***is*** your manager until the company announces otherwise. If you would have told your manager, tell your manager.
37
Ideally, Moderators♦ are elected by the community, but until the community is large enough to hold a proper election, we will be appointing three provisional Moderators to fill those roles. We need your help. Please nominate folks you would like to see become provisional moderators for this site. Your input will provide valuable insight to help us make our selections. You can read more about the process here: **[Moderators Pro Tempore](https://blog.stackoverflow.com/2010/07/moderator-pro-tempore/).** The Nomination Process: ----------------------- * **Nominate a user** by posting an 'answer' below. Each nomination should be a separate answer. Use the template at the bottom of this post to complete your nomination. * **Self nominations are encouraged.** This is a volunteer activity, so users should not feel obligated to accept these positions. A self-nomination is simply a way to say, "I am very much interested in this, so let my record speak for itself." * **Tell us about the candidates.** Nominations can include links to other activities like Area 51 participation, participation in other sites, or any relevant thoughts/links that may help us make an informed decision. * **Nominees!** Please indicate your acceptance by editing the answer to accept/decline the nomination. And please ensure your profile email is correct so we can contact you. Optionally, you are encouraged to write a bit about yourself following your acceptance. > > I accept/decline this nomination. > > > Hi, I am name/location/fun fact (all optional). I live in <location>, so I am generally active on this site from <time> to <time>. Some other things you may want to know about me are… > > > Here is what we'll be looking for in a Moderator candidate: ----------------------------------------------------------- We are looking for members who are deeply engaged in the community's development; members who: * Have been consistently active during the earliest weeks of this site's creation * Show an interest in their meta's community-building activities * Lead by example, showing patience and respect for their fellow community members in everything they write * Exhibit those intangible traits discussed in [**A Theory of Moderation**](https://blog.stackoverflow.com/2009/05/a-theory-of-moderation/) --- Nomination Template ------------------- To nominate a candidate, copy and paste the text below as an answer and complete your nomination writeup: > > <a href="https://stellar.stackexchange.com/users/**UserID**"> > > <img src="https://stellar.stackexchange.com/users/flair/**UserID**.png"></a> > > <a href="https://stellar.meta.stackexchange.com/users/**UserID**"> > > <img src="https://stellar.meta.stackexchange.com/users/flair/**UserID**.png"></a> > > > ###Notes: > > > This nominee would be a good choice because … > > > ![](https://i.stack.imgur.com/8Akvq.png)
2018/02/02
[ "https://stellar.meta.stackexchange.com/questions/37", "https://stellar.meta.stackexchange.com", "https://stellar.meta.stackexchange.com/users/2/" ]
[![](https://stellar.stackexchange.com/users/flair/169.png)](https://stellar.stackexchange.com/users/169) [![](https://stellar.meta.stackexchange.com/users/flair/169.png)](https://stellar.meta.stackexchange.com/users/169) **I self-nominate.** ### Notes: I would be a good choice because I check the site often, am open about my mistakes, and look for ways to improve. I am not self-nominating myself out of pride, but to help the Stellar community as a whole. I am open to criticism because it helps me grow (see: the meta site and my declined/downvoted answers) haven't really been active in asking/answering questions, and it is because I am not the most informed person on this site. I do hang out in the review queues very often, though. I am also one of the community members that helped out with [lumenaut inflation pool](http://lumenaut.net). Edit: I also try to frequently edit poorly formatted posts or posts with low readability. **I accept this nomination.** I live in NYC, so my active hours are from 10pm to 4am UTC, usually
[![](https://stellar.stackexchange.com/users/flair/16.png)](https://stellar.stackexchange.com/users/16) [![](https://stellar.meta.stackexchange.com/users/flair/16.png)](https://stellar.meta.stackexchange.com/users/16) ### Notes: This nominee would be a good choice because I see them answering and overall being an active member of the community often. They seem to be very knowledgeable and their answers are always clean (concise & well formatted). They also respond to feedback and accept it, which are good qualities that are necessary for a good moderator. Example [(look at the comments)](https://stellar.stackexchange.com/questions/193/can-an-inflation-pool-be-hacked-to-send-all-weekly-lumens-to-1-address-third-p/194#194) And yes, I do not know who this person is at all.
37
Ideally, Moderators♦ are elected by the community, but until the community is large enough to hold a proper election, we will be appointing three provisional Moderators to fill those roles. We need your help. Please nominate folks you would like to see become provisional moderators for this site. Your input will provide valuable insight to help us make our selections. You can read more about the process here: **[Moderators Pro Tempore](https://blog.stackoverflow.com/2010/07/moderator-pro-tempore/).** The Nomination Process: ----------------------- * **Nominate a user** by posting an 'answer' below. Each nomination should be a separate answer. Use the template at the bottom of this post to complete your nomination. * **Self nominations are encouraged.** This is a volunteer activity, so users should not feel obligated to accept these positions. A self-nomination is simply a way to say, "I am very much interested in this, so let my record speak for itself." * **Tell us about the candidates.** Nominations can include links to other activities like Area 51 participation, participation in other sites, or any relevant thoughts/links that may help us make an informed decision. * **Nominees!** Please indicate your acceptance by editing the answer to accept/decline the nomination. And please ensure your profile email is correct so we can contact you. Optionally, you are encouraged to write a bit about yourself following your acceptance. > > I accept/decline this nomination. > > > Hi, I am name/location/fun fact (all optional). I live in <location>, so I am generally active on this site from <time> to <time>. Some other things you may want to know about me are… > > > Here is what we'll be looking for in a Moderator candidate: ----------------------------------------------------------- We are looking for members who are deeply engaged in the community's development; members who: * Have been consistently active during the earliest weeks of this site's creation * Show an interest in their meta's community-building activities * Lead by example, showing patience and respect for their fellow community members in everything they write * Exhibit those intangible traits discussed in [**A Theory of Moderation**](https://blog.stackoverflow.com/2009/05/a-theory-of-moderation/) --- Nomination Template ------------------- To nominate a candidate, copy and paste the text below as an answer and complete your nomination writeup: > > <a href="https://stellar.stackexchange.com/users/**UserID**"> > > <img src="https://stellar.stackexchange.com/users/flair/**UserID**.png"></a> > > <a href="https://stellar.meta.stackexchange.com/users/**UserID**"> > > <img src="https://stellar.meta.stackexchange.com/users/flair/**UserID**.png"></a> > > > ###Notes: > > > This nominee would be a good choice because … > > > ![](https://i.stack.imgur.com/8Akvq.png)
2018/02/02
[ "https://stellar.meta.stackexchange.com/questions/37", "https://stellar.meta.stackexchange.com", "https://stellar.meta.stackexchange.com/users/2/" ]
[![](https://stellar.stackexchange.com/users/flair/169.png)](https://stellar.stackexchange.com/users/169) [![](https://stellar.meta.stackexchange.com/users/flair/169.png)](https://stellar.meta.stackexchange.com/users/169) **I self-nominate.** ### Notes: I would be a good choice because I check the site often, am open about my mistakes, and look for ways to improve. I am not self-nominating myself out of pride, but to help the Stellar community as a whole. I am open to criticism because it helps me grow (see: the meta site and my declined/downvoted answers) haven't really been active in asking/answering questions, and it is because I am not the most informed person on this site. I do hang out in the review queues very often, though. I am also one of the community members that helped out with [lumenaut inflation pool](http://lumenaut.net). Edit: I also try to frequently edit poorly formatted posts or posts with low readability. **I accept this nomination.** I live in NYC, so my active hours are from 10pm to 4am UTC, usually
[![](https://stellar.stackexchange.com/users/flair/683.png)](https://stellar.stackexchange.com/users/683) [![](https://stellar.meta.stackexchange.com/users/flair/683.png)](https://stellar.meta.stackexchange.com/users/683) [![profile for Chenmunka on Stack Exchange, a network of free, community-driven Q&A sites](https://stackexchange.com/users/flair/3210846.png "profile for Chenmunka on Stack Exchange, a network of free, community-driven Q&A sites")](https://stackexchange.com/users/3210846/chenmunka) I would like to put myself forward as a moderator of this site. I am already a pro-tem moderator at [Retrocomputing.SE](https://retrocomputing.stackexchange.com/) and so I am familiar with the [Theory of Moderation](https://stackoverflow.blog/2009/05/18/a-theory-of-moderation/) applied to these sites. Why has it taken me so long after this call was posted to volunteer? Because I am here to learn rather than to teach. I am not (yet) an expert in Stellar so I have been reticent in coming forward. There are more knowledgeable people out there than me. However, I am gaining more knowledge by the day. By increasing my involvement here and bringing my experience of the SE network, I hope to both improve myself and help this valuable site through to eventual graduation.
37
Ideally, Moderators♦ are elected by the community, but until the community is large enough to hold a proper election, we will be appointing three provisional Moderators to fill those roles. We need your help. Please nominate folks you would like to see become provisional moderators for this site. Your input will provide valuable insight to help us make our selections. You can read more about the process here: **[Moderators Pro Tempore](https://blog.stackoverflow.com/2010/07/moderator-pro-tempore/).** The Nomination Process: ----------------------- * **Nominate a user** by posting an 'answer' below. Each nomination should be a separate answer. Use the template at the bottom of this post to complete your nomination. * **Self nominations are encouraged.** This is a volunteer activity, so users should not feel obligated to accept these positions. A self-nomination is simply a way to say, "I am very much interested in this, so let my record speak for itself." * **Tell us about the candidates.** Nominations can include links to other activities like Area 51 participation, participation in other sites, or any relevant thoughts/links that may help us make an informed decision. * **Nominees!** Please indicate your acceptance by editing the answer to accept/decline the nomination. And please ensure your profile email is correct so we can contact you. Optionally, you are encouraged to write a bit about yourself following your acceptance. > > I accept/decline this nomination. > > > Hi, I am name/location/fun fact (all optional). I live in <location>, so I am generally active on this site from <time> to <time>. Some other things you may want to know about me are… > > > Here is what we'll be looking for in a Moderator candidate: ----------------------------------------------------------- We are looking for members who are deeply engaged in the community's development; members who: * Have been consistently active during the earliest weeks of this site's creation * Show an interest in their meta's community-building activities * Lead by example, showing patience and respect for their fellow community members in everything they write * Exhibit those intangible traits discussed in [**A Theory of Moderation**](https://blog.stackoverflow.com/2009/05/a-theory-of-moderation/) --- Nomination Template ------------------- To nominate a candidate, copy and paste the text below as an answer and complete your nomination writeup: > > <a href="https://stellar.stackexchange.com/users/**UserID**"> > > <img src="https://stellar.stackexchange.com/users/flair/**UserID**.png"></a> > > <a href="https://stellar.meta.stackexchange.com/users/**UserID**"> > > <img src="https://stellar.meta.stackexchange.com/users/flair/**UserID**.png"></a> > > > ###Notes: > > > This nominee would be a good choice because … > > > ![](https://i.stack.imgur.com/8Akvq.png)
2018/02/02
[ "https://stellar.meta.stackexchange.com/questions/37", "https://stellar.meta.stackexchange.com", "https://stellar.meta.stackexchange.com/users/2/" ]
[![](https://stellar.stackexchange.com/users/flair/111.png)](https://stellar.stackexchange.com/users/111) [![](https://stellar.meta.stackexchange.com/users/flair/111.png)](https://stellar.meta.stackexchange.com/users/111) [![](https://stackexchange.com/users/flair/19417.png)](https://stackexchange.com/users/19417/synesso) ### Notes: I self-nominate. I am committed to furthering the knowledge of the Stellar community through the StackExchange platform. I see the role of moderator as one of a light-handed curator; someone who keeps the organic growth of the community healthy - intervening when necessary to keep the site on-topic. Any moderator actions would be accompanied by explicit communication, because community members deserve to know why exceptional actions are taken. I'm a long term StackExchange user, with 18k reputation on StackOverflow and membership of dozens of other communities. I have addressed many flagged issues on StackOverflow over the years. I am currently building (yet another) language SDK for the Stellar API, so am actively learning the minutiae of those endpoints. **I accept this nomination.** I live in Australia. From time to time there are koalas in my yard. I am generally active on this site from 11pm to 7am UTC.
[![](https://stellar.stackexchange.com/users/flair/16.png)](https://stellar.stackexchange.com/users/16) [![](https://stellar.meta.stackexchange.com/users/flair/16.png)](https://stellar.meta.stackexchange.com/users/16) ### Notes: This nominee would be a good choice because I see them answering and overall being an active member of the community often. They seem to be very knowledgeable and their answers are always clean (concise & well formatted). They also respond to feedback and accept it, which are good qualities that are necessary for a good moderator. Example [(look at the comments)](https://stellar.stackexchange.com/questions/193/can-an-inflation-pool-be-hacked-to-send-all-weekly-lumens-to-1-address-third-p/194#194) And yes, I do not know who this person is at all.
37
Ideally, Moderators♦ are elected by the community, but until the community is large enough to hold a proper election, we will be appointing three provisional Moderators to fill those roles. We need your help. Please nominate folks you would like to see become provisional moderators for this site. Your input will provide valuable insight to help us make our selections. You can read more about the process here: **[Moderators Pro Tempore](https://blog.stackoverflow.com/2010/07/moderator-pro-tempore/).** The Nomination Process: ----------------------- * **Nominate a user** by posting an 'answer' below. Each nomination should be a separate answer. Use the template at the bottom of this post to complete your nomination. * **Self nominations are encouraged.** This is a volunteer activity, so users should not feel obligated to accept these positions. A self-nomination is simply a way to say, "I am very much interested in this, so let my record speak for itself." * **Tell us about the candidates.** Nominations can include links to other activities like Area 51 participation, participation in other sites, or any relevant thoughts/links that may help us make an informed decision. * **Nominees!** Please indicate your acceptance by editing the answer to accept/decline the nomination. And please ensure your profile email is correct so we can contact you. Optionally, you are encouraged to write a bit about yourself following your acceptance. > > I accept/decline this nomination. > > > Hi, I am name/location/fun fact (all optional). I live in <location>, so I am generally active on this site from <time> to <time>. Some other things you may want to know about me are… > > > Here is what we'll be looking for in a Moderator candidate: ----------------------------------------------------------- We are looking for members who are deeply engaged in the community's development; members who: * Have been consistently active during the earliest weeks of this site's creation * Show an interest in their meta's community-building activities * Lead by example, showing patience and respect for their fellow community members in everything they write * Exhibit those intangible traits discussed in [**A Theory of Moderation**](https://blog.stackoverflow.com/2009/05/a-theory-of-moderation/) --- Nomination Template ------------------- To nominate a candidate, copy and paste the text below as an answer and complete your nomination writeup: > > <a href="https://stellar.stackexchange.com/users/**UserID**"> > > <img src="https://stellar.stackexchange.com/users/flair/**UserID**.png"></a> > > <a href="https://stellar.meta.stackexchange.com/users/**UserID**"> > > <img src="https://stellar.meta.stackexchange.com/users/flair/**UserID**.png"></a> > > > ###Notes: > > > This nominee would be a good choice because … > > > ![](https://i.stack.imgur.com/8Akvq.png)
2018/02/02
[ "https://stellar.meta.stackexchange.com/questions/37", "https://stellar.meta.stackexchange.com", "https://stellar.meta.stackexchange.com/users/2/" ]
[![](https://stellar.stackexchange.com/users/flair/7.png)](https://stellar.stackexchange.com/users/7) [![](https://stellar.meta.stackexchange.com/users/flair/7.png)](https://stellar.meta.stackexchange.com/users/7) ### Notes: Hi! I'm nominating myself. I'm Ali, I'm the developer evangelist at Stellar.org and I was the one who created the area51 proposal! I'm here to answer questions on behalf of the Stellar team - it's now part of my (and @Rob's) job. I look forward to generating a conversation and providing answers to help people develop using Stellar. Thank you so much for creating this platform for us and our community! (I accept this nomination)
[![](https://stellar.stackexchange.com/users/flair/16.png)](https://stellar.stackexchange.com/users/16) [![](https://stellar.meta.stackexchange.com/users/flair/16.png)](https://stellar.meta.stackexchange.com/users/16) ### Notes: This nominee would be a good choice because I see them answering and overall being an active member of the community often. They seem to be very knowledgeable and their answers are always clean (concise & well formatted). They also respond to feedback and accept it, which are good qualities that are necessary for a good moderator. Example [(look at the comments)](https://stellar.stackexchange.com/questions/193/can-an-inflation-pool-be-hacked-to-send-all-weekly-lumens-to-1-address-third-p/194#194) And yes, I do not know who this person is at all.
37
Ideally, Moderators♦ are elected by the community, but until the community is large enough to hold a proper election, we will be appointing three provisional Moderators to fill those roles. We need your help. Please nominate folks you would like to see become provisional moderators for this site. Your input will provide valuable insight to help us make our selections. You can read more about the process here: **[Moderators Pro Tempore](https://blog.stackoverflow.com/2010/07/moderator-pro-tempore/).** The Nomination Process: ----------------------- * **Nominate a user** by posting an 'answer' below. Each nomination should be a separate answer. Use the template at the bottom of this post to complete your nomination. * **Self nominations are encouraged.** This is a volunteer activity, so users should not feel obligated to accept these positions. A self-nomination is simply a way to say, "I am very much interested in this, so let my record speak for itself." * **Tell us about the candidates.** Nominations can include links to other activities like Area 51 participation, participation in other sites, or any relevant thoughts/links that may help us make an informed decision. * **Nominees!** Please indicate your acceptance by editing the answer to accept/decline the nomination. And please ensure your profile email is correct so we can contact you. Optionally, you are encouraged to write a bit about yourself following your acceptance. > > I accept/decline this nomination. > > > Hi, I am name/location/fun fact (all optional). I live in <location>, so I am generally active on this site from <time> to <time>. Some other things you may want to know about me are… > > > Here is what we'll be looking for in a Moderator candidate: ----------------------------------------------------------- We are looking for members who are deeply engaged in the community's development; members who: * Have been consistently active during the earliest weeks of this site's creation * Show an interest in their meta's community-building activities * Lead by example, showing patience and respect for their fellow community members in everything they write * Exhibit those intangible traits discussed in [**A Theory of Moderation**](https://blog.stackoverflow.com/2009/05/a-theory-of-moderation/) --- Nomination Template ------------------- To nominate a candidate, copy and paste the text below as an answer and complete your nomination writeup: > > <a href="https://stellar.stackexchange.com/users/**UserID**"> > > <img src="https://stellar.stackexchange.com/users/flair/**UserID**.png"></a> > > <a href="https://stellar.meta.stackexchange.com/users/**UserID**"> > > <img src="https://stellar.meta.stackexchange.com/users/flair/**UserID**.png"></a> > > > ###Notes: > > > This nominee would be a good choice because … > > > ![](https://i.stack.imgur.com/8Akvq.png)
2018/02/02
[ "https://stellar.meta.stackexchange.com/questions/37", "https://stellar.meta.stackexchange.com", "https://stellar.meta.stackexchange.com/users/2/" ]
[![](https://stellar.stackexchange.com/users/flair/16.png)](https://stellar.stackexchange.com/users/16) [![](https://stellar.meta.stackexchange.com/users/flair/16.png)](https://stellar.meta.stackexchange.com/users/16) ### Notes: This nominee would be a good choice because I see them answering and overall being an active member of the community often. They seem to be very knowledgeable and their answers are always clean (concise & well formatted). They also respond to feedback and accept it, which are good qualities that are necessary for a good moderator. Example [(look at the comments)](https://stellar.stackexchange.com/questions/193/can-an-inflation-pool-be-hacked-to-send-all-weekly-lumens-to-1-address-third-p/194#194) And yes, I do not know who this person is at all.
[![](https://stellar.stackexchange.com/users/flair/683.png)](https://stellar.stackexchange.com/users/683) [![](https://stellar.meta.stackexchange.com/users/flair/683.png)](https://stellar.meta.stackexchange.com/users/683) [![profile for Chenmunka on Stack Exchange, a network of free, community-driven Q&A sites](https://stackexchange.com/users/flair/3210846.png "profile for Chenmunka on Stack Exchange, a network of free, community-driven Q&A sites")](https://stackexchange.com/users/3210846/chenmunka) I would like to put myself forward as a moderator of this site. I am already a pro-tem moderator at [Retrocomputing.SE](https://retrocomputing.stackexchange.com/) and so I am familiar with the [Theory of Moderation](https://stackoverflow.blog/2009/05/18/a-theory-of-moderation/) applied to these sites. Why has it taken me so long after this call was posted to volunteer? Because I am here to learn rather than to teach. I am not (yet) an expert in Stellar so I have been reticent in coming forward. There are more knowledgeable people out there than me. However, I am gaining more knowledge by the day. By increasing my involvement here and bringing my experience of the SE network, I hope to both improve myself and help this valuable site through to eventual graduation.
37
Ideally, Moderators♦ are elected by the community, but until the community is large enough to hold a proper election, we will be appointing three provisional Moderators to fill those roles. We need your help. Please nominate folks you would like to see become provisional moderators for this site. Your input will provide valuable insight to help us make our selections. You can read more about the process here: **[Moderators Pro Tempore](https://blog.stackoverflow.com/2010/07/moderator-pro-tempore/).** The Nomination Process: ----------------------- * **Nominate a user** by posting an 'answer' below. Each nomination should be a separate answer. Use the template at the bottom of this post to complete your nomination. * **Self nominations are encouraged.** This is a volunteer activity, so users should not feel obligated to accept these positions. A self-nomination is simply a way to say, "I am very much interested in this, so let my record speak for itself." * **Tell us about the candidates.** Nominations can include links to other activities like Area 51 participation, participation in other sites, or any relevant thoughts/links that may help us make an informed decision. * **Nominees!** Please indicate your acceptance by editing the answer to accept/decline the nomination. And please ensure your profile email is correct so we can contact you. Optionally, you are encouraged to write a bit about yourself following your acceptance. > > I accept/decline this nomination. > > > Hi, I am name/location/fun fact (all optional). I live in <location>, so I am generally active on this site from <time> to <time>. Some other things you may want to know about me are… > > > Here is what we'll be looking for in a Moderator candidate: ----------------------------------------------------------- We are looking for members who are deeply engaged in the community's development; members who: * Have been consistently active during the earliest weeks of this site's creation * Show an interest in their meta's community-building activities * Lead by example, showing patience and respect for their fellow community members in everything they write * Exhibit those intangible traits discussed in [**A Theory of Moderation**](https://blog.stackoverflow.com/2009/05/a-theory-of-moderation/) --- Nomination Template ------------------- To nominate a candidate, copy and paste the text below as an answer and complete your nomination writeup: > > <a href="https://stellar.stackexchange.com/users/**UserID**"> > > <img src="https://stellar.stackexchange.com/users/flair/**UserID**.png"></a> > > <a href="https://stellar.meta.stackexchange.com/users/**UserID**"> > > <img src="https://stellar.meta.stackexchange.com/users/flair/**UserID**.png"></a> > > > ###Notes: > > > This nominee would be a good choice because … > > > ![](https://i.stack.imgur.com/8Akvq.png)
2018/02/02
[ "https://stellar.meta.stackexchange.com/questions/37", "https://stellar.meta.stackexchange.com", "https://stellar.meta.stackexchange.com/users/2/" ]
[![](https://stellar.stackexchange.com/users/flair/111.png)](https://stellar.stackexchange.com/users/111) [![](https://stellar.meta.stackexchange.com/users/flair/111.png)](https://stellar.meta.stackexchange.com/users/111) [![](https://stackexchange.com/users/flair/19417.png)](https://stackexchange.com/users/19417/synesso) ### Notes: I self-nominate. I am committed to furthering the knowledge of the Stellar community through the StackExchange platform. I see the role of moderator as one of a light-handed curator; someone who keeps the organic growth of the community healthy - intervening when necessary to keep the site on-topic. Any moderator actions would be accompanied by explicit communication, because community members deserve to know why exceptional actions are taken. I'm a long term StackExchange user, with 18k reputation on StackOverflow and membership of dozens of other communities. I have addressed many flagged issues on StackOverflow over the years. I am currently building (yet another) language SDK for the Stellar API, so am actively learning the minutiae of those endpoints. **I accept this nomination.** I live in Australia. From time to time there are koalas in my yard. I am generally active on this site from 11pm to 7am UTC.
[![](https://stellar.stackexchange.com/users/flair/683.png)](https://stellar.stackexchange.com/users/683) [![](https://stellar.meta.stackexchange.com/users/flair/683.png)](https://stellar.meta.stackexchange.com/users/683) [![profile for Chenmunka on Stack Exchange, a network of free, community-driven Q&A sites](https://stackexchange.com/users/flair/3210846.png "profile for Chenmunka on Stack Exchange, a network of free, community-driven Q&A sites")](https://stackexchange.com/users/3210846/chenmunka) I would like to put myself forward as a moderator of this site. I am already a pro-tem moderator at [Retrocomputing.SE](https://retrocomputing.stackexchange.com/) and so I am familiar with the [Theory of Moderation](https://stackoverflow.blog/2009/05/18/a-theory-of-moderation/) applied to these sites. Why has it taken me so long after this call was posted to volunteer? Because I am here to learn rather than to teach. I am not (yet) an expert in Stellar so I have been reticent in coming forward. There are more knowledgeable people out there than me. However, I am gaining more knowledge by the day. By increasing my involvement here and bringing my experience of the SE network, I hope to both improve myself and help this valuable site through to eventual graduation.
37
Ideally, Moderators♦ are elected by the community, but until the community is large enough to hold a proper election, we will be appointing three provisional Moderators to fill those roles. We need your help. Please nominate folks you would like to see become provisional moderators for this site. Your input will provide valuable insight to help us make our selections. You can read more about the process here: **[Moderators Pro Tempore](https://blog.stackoverflow.com/2010/07/moderator-pro-tempore/).** The Nomination Process: ----------------------- * **Nominate a user** by posting an 'answer' below. Each nomination should be a separate answer. Use the template at the bottom of this post to complete your nomination. * **Self nominations are encouraged.** This is a volunteer activity, so users should not feel obligated to accept these positions. A self-nomination is simply a way to say, "I am very much interested in this, so let my record speak for itself." * **Tell us about the candidates.** Nominations can include links to other activities like Area 51 participation, participation in other sites, or any relevant thoughts/links that may help us make an informed decision. * **Nominees!** Please indicate your acceptance by editing the answer to accept/decline the nomination. And please ensure your profile email is correct so we can contact you. Optionally, you are encouraged to write a bit about yourself following your acceptance. > > I accept/decline this nomination. > > > Hi, I am name/location/fun fact (all optional). I live in <location>, so I am generally active on this site from <time> to <time>. Some other things you may want to know about me are… > > > Here is what we'll be looking for in a Moderator candidate: ----------------------------------------------------------- We are looking for members who are deeply engaged in the community's development; members who: * Have been consistently active during the earliest weeks of this site's creation * Show an interest in their meta's community-building activities * Lead by example, showing patience and respect for their fellow community members in everything they write * Exhibit those intangible traits discussed in [**A Theory of Moderation**](https://blog.stackoverflow.com/2009/05/a-theory-of-moderation/) --- Nomination Template ------------------- To nominate a candidate, copy and paste the text below as an answer and complete your nomination writeup: > > <a href="https://stellar.stackexchange.com/users/**UserID**"> > > <img src="https://stellar.stackexchange.com/users/flair/**UserID**.png"></a> > > <a href="https://stellar.meta.stackexchange.com/users/**UserID**"> > > <img src="https://stellar.meta.stackexchange.com/users/flair/**UserID**.png"></a> > > > ###Notes: > > > This nominee would be a good choice because … > > > ![](https://i.stack.imgur.com/8Akvq.png)
2018/02/02
[ "https://stellar.meta.stackexchange.com/questions/37", "https://stellar.meta.stackexchange.com", "https://stellar.meta.stackexchange.com/users/2/" ]
[![](https://stellar.stackexchange.com/users/flair/7.png)](https://stellar.stackexchange.com/users/7) [![](https://stellar.meta.stackexchange.com/users/flair/7.png)](https://stellar.meta.stackexchange.com/users/7) ### Notes: Hi! I'm nominating myself. I'm Ali, I'm the developer evangelist at Stellar.org and I was the one who created the area51 proposal! I'm here to answer questions on behalf of the Stellar team - it's now part of my (and @Rob's) job. I look forward to generating a conversation and providing answers to help people develop using Stellar. Thank you so much for creating this platform for us and our community! (I accept this nomination)
[![](https://stellar.stackexchange.com/users/flair/683.png)](https://stellar.stackexchange.com/users/683) [![](https://stellar.meta.stackexchange.com/users/flair/683.png)](https://stellar.meta.stackexchange.com/users/683) [![profile for Chenmunka on Stack Exchange, a network of free, community-driven Q&A sites](https://stackexchange.com/users/flair/3210846.png "profile for Chenmunka on Stack Exchange, a network of free, community-driven Q&A sites")](https://stackexchange.com/users/3210846/chenmunka) I would like to put myself forward as a moderator of this site. I am already a pro-tem moderator at [Retrocomputing.SE](https://retrocomputing.stackexchange.com/) and so I am familiar with the [Theory of Moderation](https://stackoverflow.blog/2009/05/18/a-theory-of-moderation/) applied to these sites. Why has it taken me so long after this call was posted to volunteer? Because I am here to learn rather than to teach. I am not (yet) an expert in Stellar so I have been reticent in coming forward. There are more knowledgeable people out there than me. However, I am gaining more knowledge by the day. By increasing my involvement here and bringing my experience of the SE network, I hope to both improve myself and help this valuable site through to eventual graduation.
161,695
After a recent update, I now see this bar that fluctuates a lot throughout a match. What does this signify? ![enter image description here](https://i.stack.imgur.com/mmtqQ.png)
2014/03/25
[ "https://gaming.stackexchange.com/questions/161695", "https://gaming.stackexchange.com", "https://gaming.stackexchange.com/users/18818/" ]
[The commander patch notes for update 2.0 was released today, here.](http://battlelog.battlefield.com/bf4/forum/threadview/2979150493891514981/) > > UI - New features: > **- Squad progression bar added to squads.** > > > *I am assuming this means the squad progression bar for field upgrades.*
That bar shows the commander the field upgrades of each squad. In Battlefield 2 and other previous iterations of the series, the commander is able to keep close tabs on, and control, every squad on the team. When played correctly, the commander is invaluable to the team's success and squad leaders that coordinate with a good commander are unstoppable.
224,162
**I’m building a colossal tower. This tower forgoes the use of steel and concrete completely in favor of cheap lighter-than-air modules.** These modules have cube-shaped frames made of carbon fiber and other lightweight materials. To achieve lift, hydrogen sacs are used. Unfortunately more flammable than helium but more plentiful, easy to produce and ergonomically viable. I know you will inevitably comment about it being a giant firecracker so let me list my security measures. * In case of fire, modules placed directly above and under the afflicted area will instantly deflate their sacks to prevent further damage. In the worst-case scenario the escaping gas may also catch fire. Thankfully it is released laterally so as to protect the other modules. * In case the first measure isn’t enough to stop the explosions, modules above and under the afflicted area detach from the tower to be reassembled later. * [Other security measures of your choice.] Moving on with the presentation: The modules have no propulsion system of their own. Instead drones move the modules into and out of place. When replacing a worn down or damaged module from the middle of the tower, cables connecting the modules are attached to their distant neighbors and later pulled closer together once the faulty module is removed. The modules are designed to last for long periods of time. As such they refill themselves over time. Filters on them sides collect moisture from the air to use for electrolysis powered by solar panels. Furthermore a computer chip controls the center of mass of the module (as well as the safety protocols). Due to the square-cube-law stating that the linear size of an object being doubled leads to an eightfold increase in volume, the mass of each module is negated at a sufficient size. The cubic design keeps the materials used in the frame to a minimum while providing a stable shape to be stacked. The cost efficiency of the modules makes it so they can be produced by the thousands. Now that we are done with the technicalities, how do you protect this lighter-than-air tower from wind? ------------------------------------------------------------------------------------------------------- The technology level is slightly futuristic. Things like cost and labor are completely irrelevant in my setting. As for the purpose of the tower... well, I’ll come to that later. For now it’s simply a very tall vertical structure meant to be as tall as physically possible.
2022/02/13
[ "https://worldbuilding.stackexchange.com/questions/224162", "https://worldbuilding.stackexchange.com", "https://worldbuilding.stackexchange.com/users/88214/" ]
**Artificial eye of the storm** Engineering a series of large ground-based structures that are meant to generate artificial wind currents that spiral around the tower(with sufficient leeway of distance between the tower and the currents) and create a wind wall may be the way to go with this one. The wind wall will stop any natural winds frem getting to the tower and will ensure that there is little to no wind going on where the tower itself is. Just make sure that the eye's wall actually remains stationary as you wouldn't want the extremely strong winds of the wall shredding your tower to pieces once it starts to move as hurricanes and the like tend to do.
The modules have no propulsion system of their own. **They are drones.** That way you can use those other drones to deliver chocolate and flowers. Your modules can propel themselves and do so to resist the wind when that is needed. Onboard hydrogen reserves are kept in a compressed gas cylinder. They can be used to recharge the buoyant elements, or used as fuel for the drones via a fuel cell.
224,162
**I’m building a colossal tower. This tower forgoes the use of steel and concrete completely in favor of cheap lighter-than-air modules.** These modules have cube-shaped frames made of carbon fiber and other lightweight materials. To achieve lift, hydrogen sacs are used. Unfortunately more flammable than helium but more plentiful, easy to produce and ergonomically viable. I know you will inevitably comment about it being a giant firecracker so let me list my security measures. * In case of fire, modules placed directly above and under the afflicted area will instantly deflate their sacks to prevent further damage. In the worst-case scenario the escaping gas may also catch fire. Thankfully it is released laterally so as to protect the other modules. * In case the first measure isn’t enough to stop the explosions, modules above and under the afflicted area detach from the tower to be reassembled later. * [Other security measures of your choice.] Moving on with the presentation: The modules have no propulsion system of their own. Instead drones move the modules into and out of place. When replacing a worn down or damaged module from the middle of the tower, cables connecting the modules are attached to their distant neighbors and later pulled closer together once the faulty module is removed. The modules are designed to last for long periods of time. As such they refill themselves over time. Filters on them sides collect moisture from the air to use for electrolysis powered by solar panels. Furthermore a computer chip controls the center of mass of the module (as well as the safety protocols). Due to the square-cube-law stating that the linear size of an object being doubled leads to an eightfold increase in volume, the mass of each module is negated at a sufficient size. The cubic design keeps the materials used in the frame to a minimum while providing a stable shape to be stacked. The cost efficiency of the modules makes it so they can be produced by the thousands. Now that we are done with the technicalities, how do you protect this lighter-than-air tower from wind? ------------------------------------------------------------------------------------------------------- The technology level is slightly futuristic. Things like cost and labor are completely irrelevant in my setting. As for the purpose of the tower... well, I’ll come to that later. For now it’s simply a very tall vertical structure meant to be as tall as physically possible.
2022/02/13
[ "https://worldbuilding.stackexchange.com/questions/224162", "https://worldbuilding.stackexchange.com", "https://worldbuilding.stackexchange.com/users/88214/" ]
**Artificial eye of the storm** Engineering a series of large ground-based structures that are meant to generate artificial wind currents that spiral around the tower(with sufficient leeway of distance between the tower and the currents) and create a wind wall may be the way to go with this one. The wind wall will stop any natural winds frem getting to the tower and will ensure that there is little to no wind going on where the tower itself is. Just make sure that the eye's wall actually remains stationary as you wouldn't want the extremely strong winds of the wall shredding your tower to pieces once it starts to move as hurricanes and the like tend to do.
**They are cylindrical instead of square.** *M. A. Golding* made this comment, but I wanted to really expand the details. In college I studied architecture and construction, and one of our major projects was regarding the design of emergency shelters and disaster proofing. For structures designed to withstand tornadoes and hurricane force winds (assuming subterranean wasn't an option) a round shape was always superior, either conical or domed. The lack of flat sides prevents wind from any direction getting a grasp on the structure, as well as can be used to properly redirect wind in a safer way. Additionally, with a tower in mind, this is exactly why wind turbines have round towers. The wind force directly hitting a flat surface puts too much stress on the tower to be safe, but the rounded face automatically diverts the wind to either side. Lattice tower designs are an alternative solely because air flows throw them nearly unencumbered, but there are other structural risks associated that make them less feasible as they get larger. [![enter image description here](https://i.stack.imgur.com/lT78C.png)](https://i.stack.imgur.com/lT78C.png) In square towers the wind puts more force on the flat surfaces, and has the potential to essentially create artificial canyons and wind tunnels (hence Chicago is known as the windy city). In a stand alone tower of independent sections I expect it much more likely that the wind force will constantly push the sections out of place and not likely in a consistent way. You will probably need some other means to continuously move them back into place, but rounded sections will likely have far less drift.[![enter image description here](https://i.stack.imgur.com/X0Z5Y.png)](https://i.stack.imgur.com/X0Z5Y.png) Engineers working on space elevator concepts have struggled with this issue for quite some time, as the wind force adds quite a bit of additional tension to the cable beyond that of its weight. If you are expecting your tower to have some sort of sway to it (which would probably be most accurate depending on the altitude) it might look something like this:[![enter image description here](https://i.stack.imgur.com/cixkR.png)](https://i.stack.imgur.com/cixkR.png) Following that train of thought, what you described brings to mind paper lanterns that come in both square and cylindrical or even spherical varieties. The mental image combined with the topic of wind turbines reminded me that inflatable kite turbines exist. Without context for the function of your tower segments it might be worth looking into. [![enter image description here](https://i.stack.imgur.com/vlEz7.png)](https://i.stack.imgur.com/vlEz7.png) **There are gaps between segments or they are wedge shaped** If you expect to follow more traditional skyscraper designs then there are a number of things that could be changed as well. An air gap between segments would decreases the chances of creating a vacuum behind the structure. A sort of airfoil or wedge design might also be useful for all the same reasons listed above, assuming the segments can rotate to face the wind. [![enter image description here](https://i.stack.imgur.com/vUdIB.png)](https://i.stack.imgur.com/vUdIB.png) [![enter image description here](https://i.stack.imgur.com/2UP7V.png)](https://i.stack.imgur.com/2UP7V.png) The list could really go on, but unfortunately narrowing it down heavily requires the context of purpose and function. [Here](https://www.simscale.com/blog/2020/02/building-aerodynamics-and-wind-effects/) is just one of many articles on line that might be helpful, but the google search results could fill thousands of pages.
224,162
**I’m building a colossal tower. This tower forgoes the use of steel and concrete completely in favor of cheap lighter-than-air modules.** These modules have cube-shaped frames made of carbon fiber and other lightweight materials. To achieve lift, hydrogen sacs are used. Unfortunately more flammable than helium but more plentiful, easy to produce and ergonomically viable. I know you will inevitably comment about it being a giant firecracker so let me list my security measures. * In case of fire, modules placed directly above and under the afflicted area will instantly deflate their sacks to prevent further damage. In the worst-case scenario the escaping gas may also catch fire. Thankfully it is released laterally so as to protect the other modules. * In case the first measure isn’t enough to stop the explosions, modules above and under the afflicted area detach from the tower to be reassembled later. * [Other security measures of your choice.] Moving on with the presentation: The modules have no propulsion system of their own. Instead drones move the modules into and out of place. When replacing a worn down or damaged module from the middle of the tower, cables connecting the modules are attached to their distant neighbors and later pulled closer together once the faulty module is removed. The modules are designed to last for long periods of time. As such they refill themselves over time. Filters on them sides collect moisture from the air to use for electrolysis powered by solar panels. Furthermore a computer chip controls the center of mass of the module (as well as the safety protocols). Due to the square-cube-law stating that the linear size of an object being doubled leads to an eightfold increase in volume, the mass of each module is negated at a sufficient size. The cubic design keeps the materials used in the frame to a minimum while providing a stable shape to be stacked. The cost efficiency of the modules makes it so they can be produced by the thousands. Now that we are done with the technicalities, how do you protect this lighter-than-air tower from wind? ------------------------------------------------------------------------------------------------------- The technology level is slightly futuristic. Things like cost and labor are completely irrelevant in my setting. As for the purpose of the tower... well, I’ll come to that later. For now it’s simply a very tall vertical structure meant to be as tall as physically possible.
2022/02/13
[ "https://worldbuilding.stackexchange.com/questions/224162", "https://worldbuilding.stackexchange.com", "https://worldbuilding.stackexchange.com/users/88214/" ]
**Artificial eye of the storm** Engineering a series of large ground-based structures that are meant to generate artificial wind currents that spiral around the tower(with sufficient leeway of distance between the tower and the currents) and create a wind wall may be the way to go with this one. The wind wall will stop any natural winds frem getting to the tower and will ensure that there is little to no wind going on where the tower itself is. Just make sure that the eye's wall actually remains stationary as you wouldn't want the extremely strong winds of the wall shredding your tower to pieces once it starts to move as hurricanes and the like tend to do.
Guy wires. ========== All tall towers rely on guy wires to maintain their rigidity and resist wind shear. The height of your tower was never specified but the guy system used is very much determined by the height. I have maintained 1,600 foot tall towers with eight V-guys. The picture below shows the general strategy for very tall structures. [![Guy system for 1,000 foot antenna tower](https://i.stack.imgur.com/H1N1s.png)](https://i.stack.imgur.com/H1N1s.png)
224,162
**I’m building a colossal tower. This tower forgoes the use of steel and concrete completely in favor of cheap lighter-than-air modules.** These modules have cube-shaped frames made of carbon fiber and other lightweight materials. To achieve lift, hydrogen sacs are used. Unfortunately more flammable than helium but more plentiful, easy to produce and ergonomically viable. I know you will inevitably comment about it being a giant firecracker so let me list my security measures. * In case of fire, modules placed directly above and under the afflicted area will instantly deflate their sacks to prevent further damage. In the worst-case scenario the escaping gas may also catch fire. Thankfully it is released laterally so as to protect the other modules. * In case the first measure isn’t enough to stop the explosions, modules above and under the afflicted area detach from the tower to be reassembled later. * [Other security measures of your choice.] Moving on with the presentation: The modules have no propulsion system of their own. Instead drones move the modules into and out of place. When replacing a worn down or damaged module from the middle of the tower, cables connecting the modules are attached to their distant neighbors and later pulled closer together once the faulty module is removed. The modules are designed to last for long periods of time. As such they refill themselves over time. Filters on them sides collect moisture from the air to use for electrolysis powered by solar panels. Furthermore a computer chip controls the center of mass of the module (as well as the safety protocols). Due to the square-cube-law stating that the linear size of an object being doubled leads to an eightfold increase in volume, the mass of each module is negated at a sufficient size. The cubic design keeps the materials used in the frame to a minimum while providing a stable shape to be stacked. The cost efficiency of the modules makes it so they can be produced by the thousands. Now that we are done with the technicalities, how do you protect this lighter-than-air tower from wind? ------------------------------------------------------------------------------------------------------- The technology level is slightly futuristic. Things like cost and labor are completely irrelevant in my setting. As for the purpose of the tower... well, I’ll come to that later. For now it’s simply a very tall vertical structure meant to be as tall as physically possible.
2022/02/13
[ "https://worldbuilding.stackexchange.com/questions/224162", "https://worldbuilding.stackexchange.com", "https://worldbuilding.stackexchange.com/users/88214/" ]
The modules have no propulsion system of their own. **They are drones.** That way you can use those other drones to deliver chocolate and flowers. Your modules can propel themselves and do so to resist the wind when that is needed. Onboard hydrogen reserves are kept in a compressed gas cylinder. They can be used to recharge the buoyant elements, or used as fuel for the drones via a fuel cell.
Guy wires. ========== All tall towers rely on guy wires to maintain their rigidity and resist wind shear. The height of your tower was never specified but the guy system used is very much determined by the height. I have maintained 1,600 foot tall towers with eight V-guys. The picture below shows the general strategy for very tall structures. [![Guy system for 1,000 foot antenna tower](https://i.stack.imgur.com/H1N1s.png)](https://i.stack.imgur.com/H1N1s.png)
224,162
**I’m building a colossal tower. This tower forgoes the use of steel and concrete completely in favor of cheap lighter-than-air modules.** These modules have cube-shaped frames made of carbon fiber and other lightweight materials. To achieve lift, hydrogen sacs are used. Unfortunately more flammable than helium but more plentiful, easy to produce and ergonomically viable. I know you will inevitably comment about it being a giant firecracker so let me list my security measures. * In case of fire, modules placed directly above and under the afflicted area will instantly deflate their sacks to prevent further damage. In the worst-case scenario the escaping gas may also catch fire. Thankfully it is released laterally so as to protect the other modules. * In case the first measure isn’t enough to stop the explosions, modules above and under the afflicted area detach from the tower to be reassembled later. * [Other security measures of your choice.] Moving on with the presentation: The modules have no propulsion system of their own. Instead drones move the modules into and out of place. When replacing a worn down or damaged module from the middle of the tower, cables connecting the modules are attached to their distant neighbors and later pulled closer together once the faulty module is removed. The modules are designed to last for long periods of time. As such they refill themselves over time. Filters on them sides collect moisture from the air to use for electrolysis powered by solar panels. Furthermore a computer chip controls the center of mass of the module (as well as the safety protocols). Due to the square-cube-law stating that the linear size of an object being doubled leads to an eightfold increase in volume, the mass of each module is negated at a sufficient size. The cubic design keeps the materials used in the frame to a minimum while providing a stable shape to be stacked. The cost efficiency of the modules makes it so they can be produced by the thousands. Now that we are done with the technicalities, how do you protect this lighter-than-air tower from wind? ------------------------------------------------------------------------------------------------------- The technology level is slightly futuristic. Things like cost and labor are completely irrelevant in my setting. As for the purpose of the tower... well, I’ll come to that later. For now it’s simply a very tall vertical structure meant to be as tall as physically possible.
2022/02/13
[ "https://worldbuilding.stackexchange.com/questions/224162", "https://worldbuilding.stackexchange.com", "https://worldbuilding.stackexchange.com/users/88214/" ]
**They are cylindrical instead of square.** *M. A. Golding* made this comment, but I wanted to really expand the details. In college I studied architecture and construction, and one of our major projects was regarding the design of emergency shelters and disaster proofing. For structures designed to withstand tornadoes and hurricane force winds (assuming subterranean wasn't an option) a round shape was always superior, either conical or domed. The lack of flat sides prevents wind from any direction getting a grasp on the structure, as well as can be used to properly redirect wind in a safer way. Additionally, with a tower in mind, this is exactly why wind turbines have round towers. The wind force directly hitting a flat surface puts too much stress on the tower to be safe, but the rounded face automatically diverts the wind to either side. Lattice tower designs are an alternative solely because air flows throw them nearly unencumbered, but there are other structural risks associated that make them less feasible as they get larger. [![enter image description here](https://i.stack.imgur.com/lT78C.png)](https://i.stack.imgur.com/lT78C.png) In square towers the wind puts more force on the flat surfaces, and has the potential to essentially create artificial canyons and wind tunnels (hence Chicago is known as the windy city). In a stand alone tower of independent sections I expect it much more likely that the wind force will constantly push the sections out of place and not likely in a consistent way. You will probably need some other means to continuously move them back into place, but rounded sections will likely have far less drift.[![enter image description here](https://i.stack.imgur.com/X0Z5Y.png)](https://i.stack.imgur.com/X0Z5Y.png) Engineers working on space elevator concepts have struggled with this issue for quite some time, as the wind force adds quite a bit of additional tension to the cable beyond that of its weight. If you are expecting your tower to have some sort of sway to it (which would probably be most accurate depending on the altitude) it might look something like this:[![enter image description here](https://i.stack.imgur.com/cixkR.png)](https://i.stack.imgur.com/cixkR.png) Following that train of thought, what you described brings to mind paper lanterns that come in both square and cylindrical or even spherical varieties. The mental image combined with the topic of wind turbines reminded me that inflatable kite turbines exist. Without context for the function of your tower segments it might be worth looking into. [![enter image description here](https://i.stack.imgur.com/vlEz7.png)](https://i.stack.imgur.com/vlEz7.png) **There are gaps between segments or they are wedge shaped** If you expect to follow more traditional skyscraper designs then there are a number of things that could be changed as well. An air gap between segments would decreases the chances of creating a vacuum behind the structure. A sort of airfoil or wedge design might also be useful for all the same reasons listed above, assuming the segments can rotate to face the wind. [![enter image description here](https://i.stack.imgur.com/vUdIB.png)](https://i.stack.imgur.com/vUdIB.png) [![enter image description here](https://i.stack.imgur.com/2UP7V.png)](https://i.stack.imgur.com/2UP7V.png) The list could really go on, but unfortunately narrowing it down heavily requires the context of purpose and function. [Here](https://www.simscale.com/blog/2020/02/building-aerodynamics-and-wind-effects/) is just one of many articles on line that might be helpful, but the google search results could fill thousands of pages.
Guy wires. ========== All tall towers rely on guy wires to maintain their rigidity and resist wind shear. The height of your tower was never specified but the guy system used is very much determined by the height. I have maintained 1,600 foot tall towers with eight V-guys. The picture below shows the general strategy for very tall structures. [![Guy system for 1,000 foot antenna tower](https://i.stack.imgur.com/H1N1s.png)](https://i.stack.imgur.com/H1N1s.png)
220,937
I am preparing for a Systems Admin(linux) role for a big company(top 10 companies) and one of the requisite is knowledge of a language like perl, python or Ruby. I have a phone interview which involves sharing a editor with the interviewer, now what kind of coding exercise can I expect on a phone interview or a regular interview? I have used shell for most of my day-to-day tasks and occasionally Perl and python for bigger tasks. Now I don't expect them to ask > > Write a script that syncs AD users to > LDAP. > > > I don't think data structures, algorithms or sorting questions apply to me role? Can you give me any examples of SysAdmin related coding questions?
2011/01/11
[ "https://serverfault.com/questions/220937", "https://serverfault.com", "https://serverfault.com/users/43487/" ]
I don't like interviews to feel like exams. It should be more about figuring out if the person is overall a good fit for the position and for the organization, and not so much about putting the interviewee on the spot. Now, sure, a good sysadmin has to be able to whip up a useful script under pressure, but it's not the same kind of pressure. Therefore, rather than asking a series of questions, I'd be more inclined to chat a bit about scripting language preferences, culture, and so on. (This should be particularly effective for Python, Perl, or Ruby!) Generally, this should be enough to get a feel for the interviewee's *engagement* with the language or languages of choice, which is more important than the ability to answer some carefully-selected clever question right there on paper. You can always ask for sample scripts to be e-mailed after the interview. (And then you can Google bits of the code to see if it's plagiarized....)
In my experience sysadmin questions in interviews tend to often be based on file processing. For example, "take this logfile and extract the unique IP addresses along with a count of each" is something I was asked in an interview not too long ago. The [FizzBuzz](http://www.hollenback.net/index.php/FizzBuzz) test remains one of favorite programming questions too.
220,937
I am preparing for a Systems Admin(linux) role for a big company(top 10 companies) and one of the requisite is knowledge of a language like perl, python or Ruby. I have a phone interview which involves sharing a editor with the interviewer, now what kind of coding exercise can I expect on a phone interview or a regular interview? I have used shell for most of my day-to-day tasks and occasionally Perl and python for bigger tasks. Now I don't expect them to ask > > Write a script that syncs AD users to > LDAP. > > > I don't think data structures, algorithms or sorting questions apply to me role? Can you give me any examples of SysAdmin related coding questions?
2011/01/11
[ "https://serverfault.com/questions/220937", "https://serverfault.com", "https://serverfault.com/users/43487/" ]
I don't like interviews to feel like exams. It should be more about figuring out if the person is overall a good fit for the position and for the organization, and not so much about putting the interviewee on the spot. Now, sure, a good sysadmin has to be able to whip up a useful script under pressure, but it's not the same kind of pressure. Therefore, rather than asking a series of questions, I'd be more inclined to chat a bit about scripting language preferences, culture, and so on. (This should be particularly effective for Python, Perl, or Ruby!) Generally, this should be enough to get a feel for the interviewee's *engagement* with the language or languages of choice, which is more important than the ability to answer some carefully-selected clever question right there on paper. You can always ask for sample scripts to be e-mailed after the interview. (And then you can Google bits of the code to see if it's plagiarized....)
Other folks have provided some great examples of exercises you might encounter, so I'll leave that as handled. I want to mention, though, that as important as getting the code running is making it maintainable - this is maybe more important in sysadmin-land than anywhere else, since we're the kind of people who tend to write a script and then forget about it for years until something breaks it, unlike application developers who spend a lot of time in close contact with their codebase and can get used to its idiosyncrasies. I've hired for sysadmin positions, and that clarity is something I look for in code samples. Intelligible variable names following a consistent naming scheme; sufficient commenting; separating configuration from code (a lot of my perl-programming coworkers have the very bad habit of storing their script configuration in big comma-delimited inline string scalars, a typo in which turns what should have been a warning into a full-on messy die); etc. I heartily recommend [Damian Conway's 'Perl Best Practices'](http://oreilly.com/catalog/9780596001735) as a reference in this area. Hope it helps; good luck with your interview!
1,061
Simply put, is there enough gold natively in the game to allow your characters to train to the maximum level (IIRC, 200)? Even counting bank interest accrual, I was never able to do it. I have maxed out the levels before, but it always involved hex-editing the gold in my party. (I never hex-edited experience, though; I just have a fondness for killing the Mega Dragon.)
2010/07/09
[ "https://gaming.stackexchange.com/questions/1061", "https://gaming.stackexchange.com", "https://gaming.stackexchange.com/users/58/" ]
It's actually very easy to have more than enough money to get your characters to 200 via the "Inheritance" trick. I did this on Cloud-side. It's a bit complicated, but very possible. First, with the default party (DO NOT yet make your actual party) go to the magic mirror and go to Rivercity. Save, fight, and load if you ever get overwhelmed or killed. You start near the bank, which will turn out to be convenient, for right now deposit all your gems. Take the back road south of the bank to the River City labor board, where you should work for the money to buy Lloyd's Beacon. Go to the portal and go to Shangri-la. Get the free guild membership, and then at the magic guild buy Lloyd's beacon. Use Mr. Wizard to get back to Vertigo. In Vertigo, go to the bank and withdraw enough gems to cast Lloyd's beacon at least twice, go to the portal, set your Lloyd's beacon there and go to Count du Money. There you will see a pedestal and 2 piles of money, what hasn't already been robbed from the back door to the dragons lair. Take them and cast Lloyd's Beacon, returning to Vertigo's portal. Almost done, go to Rivercity via the portal, deposit the 1,000 gems and 50,000 gold. Then go to the labor board, and work until you're 100 years old, it won't take long. Check your bank, you should have around 160 million and 2 million gems. More than enough. Now, go to the inn, make your real party, and you are funded.
I really don't think so, at a certain point the gold exponent simply becomes too high. I can't recall however if enemies respawn in WoX (as they did in For Blood and Honor) if they did then the answer shifts to 'technically' yes. But I'd hardly consider it reasonable.
1,061
Simply put, is there enough gold natively in the game to allow your characters to train to the maximum level (IIRC, 200)? Even counting bank interest accrual, I was never able to do it. I have maxed out the levels before, but it always involved hex-editing the gold in my party. (I never hex-edited experience, though; I just have a fondness for killing the Mega Dragon.)
2010/07/09
[ "https://gaming.stackexchange.com/questions/1061", "https://gaming.stackexchange.com", "https://gaming.stackexchange.com/users/58/" ]
I really don't think so, at a certain point the gold exponent simply becomes too high. I can't recall however if enemies respawn in WoX (as they did in For Blood and Honor) if they did then the answer shifts to 'technically' yes. But I'd hardly consider it reasonable.
When maxing characters, the two concerns are gold and exp. Gold can be obtained through the inheritance trick. On the exp side, my favorite solution is the Sky Bandits on the skyroad of darkside. Walk around the skyroad until you encounter bandits, and pick the fight dialogue choice. You will fight three cloud dragons. Then spin in a circle and they will attack again. You can repeat as long as you want. And you can set a beacon at the spot and come back later to get more exp. Having high speed on three characters that can each one shot a dragon with default attack will be ideal there.
1,061
Simply put, is there enough gold natively in the game to allow your characters to train to the maximum level (IIRC, 200)? Even counting bank interest accrual, I was never able to do it. I have maxed out the levels before, but it always involved hex-editing the gold in my party. (I never hex-edited experience, though; I just have a fondness for killing the Mega Dragon.)
2010/07/09
[ "https://gaming.stackexchange.com/questions/1061", "https://gaming.stackexchange.com", "https://gaming.stackexchange.com/users/58/" ]
It's actually very easy to have more than enough money to get your characters to 200 via the "Inheritance" trick. I did this on Cloud-side. It's a bit complicated, but very possible. First, with the default party (DO NOT yet make your actual party) go to the magic mirror and go to Rivercity. Save, fight, and load if you ever get overwhelmed or killed. You start near the bank, which will turn out to be convenient, for right now deposit all your gems. Take the back road south of the bank to the River City labor board, where you should work for the money to buy Lloyd's Beacon. Go to the portal and go to Shangri-la. Get the free guild membership, and then at the magic guild buy Lloyd's beacon. Use Mr. Wizard to get back to Vertigo. In Vertigo, go to the bank and withdraw enough gems to cast Lloyd's beacon at least twice, go to the portal, set your Lloyd's beacon there and go to Count du Money. There you will see a pedestal and 2 piles of money, what hasn't already been robbed from the back door to the dragons lair. Take them and cast Lloyd's Beacon, returning to Vertigo's portal. Almost done, go to Rivercity via the portal, deposit the 1,000 gems and 50,000 gold. Then go to the labor board, and work until you're 100 years old, it won't take long. Check your bank, you should have around 160 million and 2 million gems. More than enough. Now, go to the inn, make your real party, and you are funded.
Most monsters in WoX do not respawn. However, there are certain locations where monsters can, for farming purposes. 1. Nightshadow. Enter the town at night, and the female vampires respawn (low XP per kill though) 2. Castle Xeen. Do not destroy the guard making machine and the Xeen guards will keep appearing every time you ascend or descend the stairs. Use the side towers to farm xp. 3. Sky Bandits (3x cloud dragons). Though the positions where they appear are fixed, the probability of them appearing is random. 4. Sandro if you do not get his heart from the sewers. +100 gems too. I'm not sure if the monsters in Asp regenerates if you do not destroy the machine, the same for Lord Xeens in Dungeon of Death. I'm also not sure if you can keep ringing the gong in Darkstone Tower to generate Onyx Golems. Those are tough though. --- Instead of using the bank/inheritance technique, I am grinding out gold in another fashion, which takes less game time, but a lot more of player's time. I use Sandro to make gems (by this time, I can easily kill him before he attacks me), and then mine out the Gemstone Mines (rolling only for gemstones, reload if gems are obtaineed). I roll for Plate Armour/Mail (for higher profits) at the smiths and then sell. Rinse and repeat. This way, in less than 2 game years, I can get enough gold to train to 200. The XP from killing Sandro is also useful in having the required XP for training. Use the remaining level raising items/awards (Clouds + Darkside, all untouched to date) to reach 255. It's boring, but you can simply use your current characters for it. I inter-spaced these gold grinding operations b/w stages of Darkside, once I have the ability to safely grind gems from Sandro. This helps preventing it from becoming too boring. All you need is to have 250k gold for the initial Gemstone Mine replenishment, Sandro's quest uncompleted (and not having his heart in your quest inventory!), sufficient stats to kill him before he attacks (you can use the Day of XXX spells at 5AM to maximize efficiency. You can even cheese it with the Xeen Slayer Sword, which bypass all physical attack resistance). Needless to say, you will have the Merchant's skill a long time ago for everyone in the party.
1,061
Simply put, is there enough gold natively in the game to allow your characters to train to the maximum level (IIRC, 200)? Even counting bank interest accrual, I was never able to do it. I have maxed out the levels before, but it always involved hex-editing the gold in my party. (I never hex-edited experience, though; I just have a fondness for killing the Mega Dragon.)
2010/07/09
[ "https://gaming.stackexchange.com/questions/1061", "https://gaming.stackexchange.com", "https://gaming.stackexchange.com/users/58/" ]
It's actually very easy to have more than enough money to get your characters to 200 via the "Inheritance" trick. I did this on Cloud-side. It's a bit complicated, but very possible. First, with the default party (DO NOT yet make your actual party) go to the magic mirror and go to Rivercity. Save, fight, and load if you ever get overwhelmed or killed. You start near the bank, which will turn out to be convenient, for right now deposit all your gems. Take the back road south of the bank to the River City labor board, where you should work for the money to buy Lloyd's Beacon. Go to the portal and go to Shangri-la. Get the free guild membership, and then at the magic guild buy Lloyd's beacon. Use Mr. Wizard to get back to Vertigo. In Vertigo, go to the bank and withdraw enough gems to cast Lloyd's beacon at least twice, go to the portal, set your Lloyd's beacon there and go to Count du Money. There you will see a pedestal and 2 piles of money, what hasn't already been robbed from the back door to the dragons lair. Take them and cast Lloyd's Beacon, returning to Vertigo's portal. Almost done, go to Rivercity via the portal, deposit the 1,000 gems and 50,000 gold. Then go to the labor board, and work until you're 100 years old, it won't take long. Check your bank, you should have around 160 million and 2 million gems. More than enough. Now, go to the inn, make your real party, and you are funded.
When maxing characters, the two concerns are gold and exp. Gold can be obtained through the inheritance trick. On the exp side, my favorite solution is the Sky Bandits on the skyroad of darkside. Walk around the skyroad until you encounter bandits, and pick the fight dialogue choice. You will fight three cloud dragons. Then spin in a circle and they will attack again. You can repeat as long as you want. And you can set a beacon at the spot and come back later to get more exp. Having high speed on three characters that can each one shot a dragon with default attack will be ideal there.
1,061
Simply put, is there enough gold natively in the game to allow your characters to train to the maximum level (IIRC, 200)? Even counting bank interest accrual, I was never able to do it. I have maxed out the levels before, but it always involved hex-editing the gold in my party. (I never hex-edited experience, though; I just have a fondness for killing the Mega Dragon.)
2010/07/09
[ "https://gaming.stackexchange.com/questions/1061", "https://gaming.stackexchange.com", "https://gaming.stackexchange.com/users/58/" ]
Most monsters in WoX do not respawn. However, there are certain locations where monsters can, for farming purposes. 1. Nightshadow. Enter the town at night, and the female vampires respawn (low XP per kill though) 2. Castle Xeen. Do not destroy the guard making machine and the Xeen guards will keep appearing every time you ascend or descend the stairs. Use the side towers to farm xp. 3. Sky Bandits (3x cloud dragons). Though the positions where they appear are fixed, the probability of them appearing is random. 4. Sandro if you do not get his heart from the sewers. +100 gems too. I'm not sure if the monsters in Asp regenerates if you do not destroy the machine, the same for Lord Xeens in Dungeon of Death. I'm also not sure if you can keep ringing the gong in Darkstone Tower to generate Onyx Golems. Those are tough though. --- Instead of using the bank/inheritance technique, I am grinding out gold in another fashion, which takes less game time, but a lot more of player's time. I use Sandro to make gems (by this time, I can easily kill him before he attacks me), and then mine out the Gemstone Mines (rolling only for gemstones, reload if gems are obtaineed). I roll for Plate Armour/Mail (for higher profits) at the smiths and then sell. Rinse and repeat. This way, in less than 2 game years, I can get enough gold to train to 200. The XP from killing Sandro is also useful in having the required XP for training. Use the remaining level raising items/awards (Clouds + Darkside, all untouched to date) to reach 255. It's boring, but you can simply use your current characters for it. I inter-spaced these gold grinding operations b/w stages of Darkside, once I have the ability to safely grind gems from Sandro. This helps preventing it from becoming too boring. All you need is to have 250k gold for the initial Gemstone Mine replenishment, Sandro's quest uncompleted (and not having his heart in your quest inventory!), sufficient stats to kill him before he attacks (you can use the Day of XXX spells at 5AM to maximize efficiency. You can even cheese it with the Xeen Slayer Sword, which bypass all physical attack resistance). Needless to say, you will have the Merchant's skill a long time ago for everyone in the party.
When maxing characters, the two concerns are gold and exp. Gold can be obtained through the inheritance trick. On the exp side, my favorite solution is the Sky Bandits on the skyroad of darkside. Walk around the skyroad until you encounter bandits, and pick the fight dialogue choice. You will fight three cloud dragons. Then spin in a circle and they will attack again. You can repeat as long as you want. And you can set a beacon at the spot and come back later to get more exp. Having high speed on three characters that can each one shot a dragon with default attack will be ideal there.
26,466,249
i was working with xcode 4.6.1 with OSX Maverick, today i installed OSX Yosimite 10.10 then suddenly xcode keep crashing, i can't even open the XCode. I have pasted the trace log here. any help how to solve this will be grateful. Thanks. Log --- > > Application Specific Information: > ProductBuildVersion: 4H512 > UNCAUGHT EXCEPTION (NSInternalInconsistencyException): Error getting value for key 'delegateClass' of extension 'Xcode.IDEiPhoneOrganizer.MenuDefinition.Screenshots' in plug-in 'com.apple.dt.IDE.IDEiPhoneSupport' > UserInfo: { > NSUnderlyingError = "Error Domain=DVTPlugInErrorDomain Code=2 \"Loading a plug-in failed.\" UserInfo=0x4031d3980 {DVTPlugInIdentifierErrorKey=com.apple.dt.IDE.IDEiPhoneSupport, DVTPlugInExecutablePathErrorKey=/Volumes/Xcode/Xcode.app/Contents/Developer/Platforms/iPhoneOS.platform/Developer/Library/Xcode/PrivatePlugIns/IDEiPhoneSupport.ideplugin/Contents/MacOS/IDEiPhoneSupport, NSLocalizedRecoverySuggestion=The plug-in or one of its prerequisite plug-ins may be missing or damaged and may need to be reinstalled., NSLocalizedDescription=Loading a plug-in failed., NSFilePath=/Volumes/Xcode/Xcode.app/Contents/Developer/Platforms/iPhoneOS.platform/Developer/Library/Xcode/PrivatePlugIns/IDEiPhoneSupport.ideplugin, NSLocalizedFailureReason=The plug-in \U201ccom.apple.dt.IDE.IDEiPhoneSupport\U201d at path \U201c/Volumes/Xcode/Xcode.app/Contents/Developer/Platforms/iPhoneOS.platform/Developer/Library/Xcode/PrivatePlugIns/IDEiPhoneSupport.ideplugin\U201d could not be loaded. The plug-in or one of its prerequisite plug-ins may be missing or damaged., NSUnderlyingError=0x401bb9100 \"The bundle \U201cIDEiPhoneSupport\U201d couldn\U2019t be loaded because it is damaged or missing necessary resources.\"}"; > } > > >
2014/10/20
[ "https://Stackoverflow.com/questions/26466249", "https://Stackoverflow.com", "https://Stackoverflow.com/users/4161956/" ]
I upgraded to Yosemite and needed Xcode 4.4.1 to maintain a personal project that runs on a 2nd generation iPod touch. The best solution I found was to partition my Yosemite drive and install Mavericks and the old version of Xcode on the new partition. Note that you’ll have to install Mavericks from an external drive or a USB stick. I followed [these instructions](http://www.macworld.com/article/2056561/how-to-make-a-bootable-mavericks-install-drive.html "How to make a bootable Mavericks install drive").
stating the obvious maybe, but have you considered upgrading your xcode? or did this error occur during an upgrade attempt? I'm sure 4.6 was not designed for Yosemite (as xcode 6.x is already out and work well for me under Yosemite)
1,016
I'm developing a large chat application; the public beta had over sixty-five thousand participants, so I need the final version to be complete. Hence I am asking this question. My application needs to work in all the languages that I can expect my visitors to see it in. I want to cover (most) of the written/read languages of countries ***that have internet***. With some research; I've compiled the following list: (In the order I should prioritize translating my application into it. **Bold** indicates a completed translation.) * **English** * **Japanese** * **Lithuanian** * Chinese (Vernacular?) * Spanish * Portuguese * Arabic * Hindi * Indonesian (?) * Russian * German
2011/11/11
[ "https://linguistics.stackexchange.com/questions/1016", "https://linguistics.stackexchange.com", "https://linguistics.stackexchange.com/users/507/" ]
It sounds to me like what you really need to understand is: which language will the *likely users* of your application be using? As a starting point, here's a list of the most common languages used online: <http://www.internetworldstats.com/stats7.htm> (The design may be horrible, but the data seems pretty legitimate). Additionally, [this report](http://www.bcg.com/documents/file58645.pdf) lists the countries with the greatest engagement with instant messaging: ![enter image description here](https://i.stack.imgur.com/s7yTM.png) Chinese - topping both lists - should be your priority. The language used online in China is [vernacular written Chinese](http://en.wikipedia.org/wiki/Written_vernacular_Chinese) (based on Mandarin). It would be very unusual to see 'Traditional Chinese' in a web interface. Although India is #2 in IM use, the majority of Indian web user's use English. Hindi is still rare online ([source](http://books.google.com/books?id=wSlOkuwWKo4C&pg=PA150#v=onepage&q&f=false)). Thus, I would suggest Portuguese and Spanish as your next priority, to capture a large section of the South American user-base (as well as a portion of European users). Russian and Arabic - which has seen the largest growth in internet usage over the past decade ([source](http://www.scottmclay.co.uk/foreign-language-internet-good-business/)) - German, Japanese would all be valid additions. Incidentally, if you're translating common UI elements, take a look at the [Pootle Terminology](http://pootle.locamotion.org/projects/terminology/) project, and [Microsoft's UI translations](http://www.microsoft.com/Language/en-US/Translations.aspx).
For users outside of Europe, I'd add French and Malay.
1,016
I'm developing a large chat application; the public beta had over sixty-five thousand participants, so I need the final version to be complete. Hence I am asking this question. My application needs to work in all the languages that I can expect my visitors to see it in. I want to cover (most) of the written/read languages of countries ***that have internet***. With some research; I've compiled the following list: (In the order I should prioritize translating my application into it. **Bold** indicates a completed translation.) * **English** * **Japanese** * **Lithuanian** * Chinese (Vernacular?) * Spanish * Portuguese * Arabic * Hindi * Indonesian (?) * Russian * German
2011/11/11
[ "https://linguistics.stackexchange.com/questions/1016", "https://linguistics.stackexchange.com", "https://linguistics.stackexchange.com/users/507/" ]
It sounds to me like what you really need to understand is: which language will the *likely users* of your application be using? As a starting point, here's a list of the most common languages used online: <http://www.internetworldstats.com/stats7.htm> (The design may be horrible, but the data seems pretty legitimate). Additionally, [this report](http://www.bcg.com/documents/file58645.pdf) lists the countries with the greatest engagement with instant messaging: ![enter image description here](https://i.stack.imgur.com/s7yTM.png) Chinese - topping both lists - should be your priority. The language used online in China is [vernacular written Chinese](http://en.wikipedia.org/wiki/Written_vernacular_Chinese) (based on Mandarin). It would be very unusual to see 'Traditional Chinese' in a web interface. Although India is #2 in IM use, the majority of Indian web user's use English. Hindi is still rare online ([source](http://books.google.com/books?id=wSlOkuwWKo4C&pg=PA150#v=onepage&q&f=false)). Thus, I would suggest Portuguese and Spanish as your next priority, to capture a large section of the South American user-base (as well as a portion of European users). Russian and Arabic - which has seen the largest growth in internet usage over the past decade ([source](http://www.scottmclay.co.uk/foreign-language-internet-good-business/)) - German, Japanese would all be valid additions. Incidentally, if you're translating common UI elements, take a look at the [Pootle Terminology](http://pootle.locamotion.org/projects/terminology/) project, and [Microsoft's UI translations](http://www.microsoft.com/Language/en-US/Translations.aspx).
I agree with Alex Peattie: # of websites in a language does not always correlate with # of users of software in the language. Having said that, <http://googleresearch.blogspot.com/2011/07/languages-of-world-wide-web.html> might give you some ideas about what languages are most popular online. The data is from Google's researchers, and so, ought to be trustworthy.
4,746,399
I know how to check if a X,Y point is a single rectangular region, but say I have multiple regions that can potentially overlap ( the regions would have X,Y,Width,Height,Z-index ( or x1,y1,x2,y2 if that's easier -- I am not fussed on how I store that, if it's relevant ) Are there any efficient algorithms to determine if the point is inside one of the regions without having to iterate over every region. I would prefer something without a long recalculation time when a region is added or removed, however that will be rarer then lookups. Thank you!
2011/01/20
[ "https://Stackoverflow.com/questions/4746399", "https://Stackoverflow.com", "https://Stackoverflow.com/users/23033/" ]
You could store your regions into a [Quadtree](http://en.wikipedia.org/wiki/Quadtree) (or Octree if 3D). This would help you to reject most of the regions before getting into the real collision-test. If you have multiple layers, simply have a quadtree per layer and use the relevant one according to the layer in which your point lies.
[Volumetric kd-trees](http://en.wikipedia.org/wiki/Kd-tree#Volumetric_objects)?
1,362,831
What are the differences between using a VS integrated tool like Testdriven.net or using a GUI test runner like Icarus or NUnit GUI? What do you prefer and why? So far i've found that reports are better in Icarus than in td.net, which only features a commandline output. However td.net is faster to use, i can execute single tests more easily without having to uncheck the rest first. NCover integration is very nice also.
2009/09/01
[ "https://Stackoverflow.com/questions/1362831", "https://Stackoverflow.com", "https://Stackoverflow.com/users/125407/" ]
Icarus has one great feature that keeps me using it. It is the automatic reload and rerun of tests. I keep Icarus hovering over on the left hand monitor. Each time I build in Visual Studio, Icarus reloads the assemblies and runs all the tests. It's sort of like the instant feedback of Resharper's Solution Analysis, except for tests instead of syntax. Running the tests is automatic and doesn't seem to affect the performance of Visual Studio (likely b/c Icarus is it's own process, not hosted inside the IDE). To enable this configuration go to Icarus->Options->Test Explorer. Check 'Always reload files' and 'Run tests after reload'.
Do you have a Continuous Integration server (like a build server, but runs unit tests)? If so, you can set up gallio to run your unit tests and have all the reporting information there while allowing the developers to use something with faster feedback while they are working. If there is no option, I prefer something that is integrated into the IDE like Testdrvien. The immediate feedback is really helpful when refactoring a piece of code or developing something new under TDD. Besides, if you don't have the sanity checking going on at a single point (like a CI server), you are going to want as many eyes as you can find on those unit tests. Developers tend to use whatever is easiest and, generally, an integrated test suite is easier than a separate component.
2,374,192
I know FFT is used in signal processing ( at last check), the Lucas-Lehmer Test and probably many other things. But what is the Fast Fourier Transform and what area's of math will help me understand transforms like it ( and yes I know of the area Fourier analysis, just not if anything about it) I've read a little of the FFT wikipedia article and some on DFT etc. But I'm not even sure I understand them enough. and yes I know it's not for [simpletons](http://mersenneforum.org/showthread.php?t=120) like me.
2017/07/27
[ "https://math.stackexchange.com/questions/2374192", "https://math.stackexchange.com", "https://math.stackexchange.com/users/-1/" ]
First let me begin with a simple explanation of the fourier transform. It takes a signal from the time-domain to the frequency domain. This means that instead of seeing a sine wave we see a point on a graph. And because any real signal can be described as the sum of sines, we get many points, that if connected form a line graph in the frequency plot. The Fast fourier transform is a mathematical trick that significantly reduces the time it takes to do a fourier transform significantly. FFT algorithms require that you have samples in powers of 2, because they all divide the problem into tiny parts. The small parts are faster to calculate (here the discrete fourier transform formula is used), and the final result is combined from all the small ones. So instead of doing 1 DFT of size 4096, it can do 256 DFTs of size 16. The mathematical explanation is pretty advanced, check out the Cooley Tukey algorithm.
<http://download.ni.com/evaluation/pxi/Understanding%20FFTs%20and%20Windowing.pdf> I used this for my senior thesis on signal processing. Just make an account and you'll be able to open the paper, it is very reliable.
177,531
So I just had a bit of a panic and realised that the app name I want may not be available. Just went ahead and created an app in iTunes Connect using the bundle id, sigh of relief, it is available. I am about a week or two away from finishing. Filled out Description and uploaded one screenshot. How long do I have to finish these details before it is deleted? Do I need to enter any more details or click on submit for review yet?
2015/03/20
[ "https://apple.stackexchange.com/questions/177531", "https://apple.stackexchange.com", "https://apple.stackexchange.com/users/118881/" ]
Apple has changed the rules a number of times, but a fairly recent (October 2014) [blog post](http://blog.salsitasoft.com/apples-new-app-name-reservation-policy/) suggests that these app name reservations no longer automatically expire. The author says he received the following e-mail from Apple: ![E-Mail from Apple stating app name expiration is no longer a feature of their program.](https://i.stack.imgur.com/fzZFx.png) This was posted as an [answer to a similar question on Stack Overflow](https://stackoverflow.com/a/28179794). The [accepted answer to that question](https://stackoverflow.com/a/17748195) still states there is a time limit of 180 days, but the answer was last edited in March 2014, and the quote it gives no longer seems to appear on the page it links to.
Forever. I have a project I made in November, and it's still here. (Even better: if you make some bad project, you can't delete it until you release it to the App Store!)
165,978
We're trying to write a custom scripting language. There has been a suggestion to make the language forgiving by providing **case insensitive** keywords. I personally do not like the idea, but there are few people in my team leaning towards it, saying it will make the end user happy! Examples of languages like FORTRAN, BASIC, SQL are given saying that these are case insensitive. Is this a good idea?
2012/09/24
[ "https://softwareengineering.stackexchange.com/questions/165978", "https://softwareengineering.stackexchange.com", "https://softwareengineering.stackexchange.com/users/61418/" ]
> > Examples of languages like FORTRAN, BASIC, SQL are given saying that these are case insensitive. > > > The reason why FORTRAN and SQL (and COBOL) are case insensitive is that they were originally designed for use on machines where the normal character sets had only uppercase letters. Case insensitivity in those languages (at least) is more a historical artefact than an language design choice. Now you could argue that case insensitivity of more forgiving, but the flip side is that case sensitivity results in more readable code because it fOrCeS tHe cOdEr tO uSe cOnSiStEnT cApItAlIzAtIoN.
I can't believe that someone said "case sensitivity makes reading code easier". It most certainly does not! I've looked over a colleague's shoulder at variables called Company and company (public variable Company, matched private variable company) and his choice of font and colour makes it incredibly difficult to tell the difference between the two - even when next to each other. The correct statement should be "mixed case makes reading code easier". That's a much more obvious truth - e.g. variables called CompanyName and CompanyAddress rather than companyname. But no language I know of makes you only use lower case variable names. The most insane convention I know of is the "uppercase public, lowercase private" one. It is just asking for trouble! My take on errors is "better that something fail noisily and as soon as possible rather than quietly fail but appear to succeed". And there's no sooner than compile time. If you mistakenly use a lower case variable when you meant to use the uppercase, it will often compile **if you are referencing it within the same class**. Thus, you can appear to succeed in both compile and run time but be subtly doing the wrong thing, and perhaps not detect it for a long time. When you do detect that there's something wrong Far better to use a convention where the private variable hass a suffix - e.g. Company public variable, CompanyP private variable. **Nobody** is going to accidentally mix up the two, and they appear together in the intellisense. This contrasts with an objection people have to Hungarian notation, where a prefixed private variable pCompany would not appear in a good place in the intellisesne. This convention has all of the advantages of the dreadful upper/lower case convention and none of its drawbacks. The fact that people feel the need to appeal to case sensitivity to distinguish between variables shows both a lack of imagination and a lack of common sense, in my opinion. Or, sadly, the human sheep like habit of following a convention because "that's the way it's always been done" Make the things you work with clearly and obviously different to each other, even if they're related!!
165,978
We're trying to write a custom scripting language. There has been a suggestion to make the language forgiving by providing **case insensitive** keywords. I personally do not like the idea, but there are few people in my team leaning towards it, saying it will make the end user happy! Examples of languages like FORTRAN, BASIC, SQL are given saying that these are case insensitive. Is this a good idea?
2012/09/24
[ "https://softwareengineering.stackexchange.com/questions/165978", "https://softwareengineering.stackexchange.com", "https://softwareengineering.stackexchange.com/users/61418/" ]
Case sensitivity considered harmful. ------------------------------------ Life is not case sensitive and neither are users or programmers. Case sensitive languages are a historical accident, of constrained systems which found case-insensitive comparisons difficult. This handicap no longer exists, so there is no reason to make a case-sensitive computer system ever again. I would go so far as to say that ***case sensitivity is evil***, since it puts the convenience of the computer before that of the user. (Related, I recall a few years back, some genius refused to pay his credit card bill because his name was in all caps, but he spelt it mixed case. Therefore, he argued, it was not properly addressed to him and wasn't a valid demand for payment. The Judge treated the argument as it deserved).
You shouldn't introduce case insensitivity without a very good reason to do so. For example, dealing with case comparisons with Unicode can be a bitch. The case sensitivity (or lack thereof) of older languages is immaterial, as their needs were *very* different. Programmers in this era expect case sensitivity.