qid
int64
1
74.7M
question
stringlengths
12
33.8k
date
stringlengths
10
10
metadata
list
response_j
stringlengths
0
115k
response_k
stringlengths
2
98.3k
10,844
There is only mention of tributes from Districts 1 through 12. Are children that live in the Capitol excluded from the Hunger Games?
2012/02/10
[ "https://scifi.stackexchange.com/questions/10844", "https://scifi.stackexchange.com", "https://scifi.stackexchange.com/users/4651/" ]
The children from Capitol were excluded, because the games were meant to remind the defeated districts of the power of Capitol. Spoiler alert: At the end of the third book, the punishment for the defeated Capitol is that the children of the leadership would be forced to participate in the final Hunger Games. > > So, an alternative has been placed on the table. Since my colleagues and I can come to no consensus, it has been agreed we will let the victors decide ... What has been proposed is that in lieu of eliminating the entire Capitol population, we have a final, symbolic Hunger games, using the children directly related to those that held the most power. > > > Katniss is the deciding vote in favor
Only in the VERY LAST HUNGER GAMES. As punishment, they decide to make one last Hunger Games using the capitol children. No mention of capitol children in the games. Just tributes from 1,2,3,4,5,6,7,8,9,10,11,and 12. Right?
10,844
There is only mention of tributes from Districts 1 through 12. Are children that live in the Capitol excluded from the Hunger Games?
2012/02/10
[ "https://scifi.stackexchange.com/questions/10844", "https://scifi.stackexchange.com", "https://scifi.stackexchange.com/users/4651/" ]
The children from Capitol were excluded, because the games were meant to remind the defeated districts of the power of Capitol. Spoiler alert: At the end of the third book, the punishment for the defeated Capitol is that the children of the leadership would be forced to participate in the final Hunger Games. > > So, an alternative has been placed on the table. Since my colleagues and I can come to no consensus, it has been agreed we will let the victors decide ... What has been proposed is that in lieu of eliminating the entire Capitol population, we have a final, symbolic Hunger games, using the children directly related to those that held the most power. > > > Katniss is the deciding vote in favor
they do not have to. But, after the second rebellion when the rebels won as punishment for the capitol they had to sent their children to fight to the death. There is no mention if this ever happened. But there was a vote and the 76th hunger games won
10,844
There is only mention of tributes from Districts 1 through 12. Are children that live in the Capitol excluded from the Hunger Games?
2012/02/10
[ "https://scifi.stackexchange.com/questions/10844", "https://scifi.stackexchange.com", "https://scifi.stackexchange.com/users/4651/" ]
Only in the VERY LAST HUNGER GAMES. As punishment, they decide to make one last Hunger Games using the capitol children. No mention of capitol children in the games. Just tributes from 1,2,3,4,5,6,7,8,9,10,11,and 12. Right?
they do not have to. But, after the second rebellion when the rebels won as punishment for the capitol they had to sent their children to fight to the death. There is no mention if this ever happened. But there was a vote and the 76th hunger games won
42,788
Currently I'm using KeePass as my sensitive data manager. I use just a main password to encrypt the database, but it is not very secure: 9 characters, lower letters and numbers mix with no meaning. Something like **bwkvu5m8i** I want to increase the security of the database, without sacrificing usability much. The only additional option in KeePass is to use a key file, which I can store on an external USB flash drive and plug it into the PC whenever I want to unlock the database. Knowing myself I will probably keep it plugged in 24/7, thus not being much different than storing the key file on the internal hard drive. So are there any other options that doesn't make using KeePass very cumbersome? My main concerns are keyloggers or trojan horses - I am an advanced user and would definitely not open any unknown files, regardless of their origin, but still I'm have the fear of being compromised. Is that even possible?
2013/09/22
[ "https://security.stackexchange.com/questions/42788", "https://security.stackexchange.com", "https://security.stackexchange.com/users/31125/" ]
There's no way to sugar-coat this one. A malware/keylogger installed on your computer means that your passwords are exposed. That's it, there's no way around it. A malware/keylogger will log your master password, intercept the clipboard, somehow access the decrypted database in memory, etc.
You could try to set up some kind of OTP Solution additionally to the password you store in keepass or as a substitute. A rather affordable one could be yubikey (<http://www.yubico.com/products/yubikey-hardware/yubikey/>). You can do stuff like exchanging a linux PAM with a yubico one and use a yubikey to logon to a linux box and so forth... This is not advertising, rather an affordable otp example. Maybe not a solution for every keepass usecase but if you store system credentials in keepass you could add a layer of security to them.... Edit: Also as mentioned use a lot more than 9 digits. Use something long and complex which is still good to type, like a long sentence with some extra special characters in it. Dont do simple stuff like swapping an e with a 3. There are bruteforce plugins for that kind of stuff. Just add random sings at the end/beginning and or middle... Edit2: just found this: <http://keepass.info/help/kb/yubikey.html> see the otp part at the end. I cannot promise you that this is a proper and secure otp implementation and that the plugin is without flaws. However the theory sounds good and its a good starting point to do some research on it or look for some alternatives like this. Edit3: a free alternative to yubikey would be google authenticator app for ios or android which should work fine with keepass OtpKeyProv plugin according to <http://mx.thirdvisit.co.uk/2014/01/02/getting-the-otpkeyprov-hotp-plug-in-to-work-with-google-authenitcator/> (again i cannot promise that the OtpKeyProv implementation is flawless....)
42,788
Currently I'm using KeePass as my sensitive data manager. I use just a main password to encrypt the database, but it is not very secure: 9 characters, lower letters and numbers mix with no meaning. Something like **bwkvu5m8i** I want to increase the security of the database, without sacrificing usability much. The only additional option in KeePass is to use a key file, which I can store on an external USB flash drive and plug it into the PC whenever I want to unlock the database. Knowing myself I will probably keep it plugged in 24/7, thus not being much different than storing the key file on the internal hard drive. So are there any other options that doesn't make using KeePass very cumbersome? My main concerns are keyloggers or trojan horses - I am an advanced user and would definitely not open any unknown files, regardless of their origin, but still I'm have the fear of being compromised. Is that even possible?
2013/09/22
[ "https://security.stackexchange.com/questions/42788", "https://security.stackexchange.com", "https://security.stackexchange.com/users/31125/" ]
There are ways to increase the difficulty of retrieving the KeePass master password, such as setting it to allow entry on the secure desktop only. To prevent someone from getting your KeePass database file and performing brute force on it, you can also increase the AES iteration count that KeePass does during the master password derivation process, so as to increase the effort require to brute force the master key should your database be exfiltrated. There is also an option to set two channel obfuscation during auto type when KeePass does the typing of the username and password for you. It should prevent crude key loggers from retrieving the specific password you use for that site. To prevent malicious access to the KeePass database (and your decryption passphrase, since you need to type it in plaintext somehow...and that can be intercepted if your computer is compromised) in the first place, keep your computer secure. You know the drill: install and update your AV software, keep your computer OS and software updated, have a firewall, review logs regularly etc. Finally, increase the entropy and length of the master password used. Instead of 9 characters, how about 13+? Instead of just lower letters only, what about including uppercase and even a special character or two too? The more unpredictable and longer your password is, the longer it will take for your attacker to brute force the database master key.
Nasrus has given pretty good suggestions. Additionally; I don't know if you are already doing that way, but you can use KeePass on a Linux machine which would be safer. Ubuntu or Debian would be fine, but if you are very concerned, you can try [Tails](https://tails.boum.org/) which aims at preserving your privacy and anonymity by focusing on the security.
42,788
Currently I'm using KeePass as my sensitive data manager. I use just a main password to encrypt the database, but it is not very secure: 9 characters, lower letters and numbers mix with no meaning. Something like **bwkvu5m8i** I want to increase the security of the database, without sacrificing usability much. The only additional option in KeePass is to use a key file, which I can store on an external USB flash drive and plug it into the PC whenever I want to unlock the database. Knowing myself I will probably keep it plugged in 24/7, thus not being much different than storing the key file on the internal hard drive. So are there any other options that doesn't make using KeePass very cumbersome? My main concerns are keyloggers or trojan horses - I am an advanced user and would definitely not open any unknown files, regardless of their origin, but still I'm have the fear of being compromised. Is that even possible?
2013/09/22
[ "https://security.stackexchange.com/questions/42788", "https://security.stackexchange.com", "https://security.stackexchange.com/users/31125/" ]
One of the attacks is registering a debugger for KeePass.exe which would completely replace KeePass.exe with something else, potentially a very good copy that I don't recognize. Others are keyboard loggers. I did the following to prevent access to the main KeePass database: * download the KeePass source * remove the mobile version (because that one didn't compile on my PC) * make some changes, e.g. change the background color and add an icon, so that I can distinguish my own version from others * rename the executable so that it is not affected by a generic debugger attack * add some characters of the password in code, so that a keylogger never gets the complete password * Change the file extension from .kdbx so that someone watching file accesses cannot find out that this is a KeePass variant and someone scanning the disk will also not find it. * Replace all "KeePass" strings in code * Compile the new version * Do not install it, use a portable USB version only * Turn on secure password prompt Although I can not update KeePass easily any more, I still think I have a more secure version which is less attackable. Someone would need to create an attack just for my own version, which is unlikely. You could also: * change the file format a bit, e.g. write additional bytes at the beginning, so that the file is harder to detect by signature scanners. So now the main KeePass database password is quite secure, it's still possible to access passwords that are copied from KeePass into other applications. An attacker can quickly pop up an invisible window and then activate KeePass again. KeePass will then use the invisible window to paste the password to. Even dual-channel auto-type can hardly prevent this attack, especially if the invisible window passes the data on to the correct window, so you won't notice it. While I've not implemented a counter-measure for that, I guess I'd do the following: * output the window title of the window that KeePass will use to paste passwords to * detect short periods of time that KeePass goes into background. Even if you press Alt-Tab twice very fast, there should be ~100 ms between a deactivation and an activation of KeePass An idea which probably needs administrator rights and needs more Windows Internals knowledge than I currently have: * Suspend all programs (or almost all, perhaps keep some Windows executables running) except your modified KeePass and the target program. After pasting the password, un-suspend them. Attackers that e.g. poll the clipboard should be bypassed. Not sure for other notification types like keyboard hooks.
Nasrus has given pretty good suggestions. Additionally; I don't know if you are already doing that way, but you can use KeePass on a Linux machine which would be safer. Ubuntu or Debian would be fine, but if you are very concerned, you can try [Tails](https://tails.boum.org/) which aims at preserving your privacy and anonymity by focusing on the security.
42,788
Currently I'm using KeePass as my sensitive data manager. I use just a main password to encrypt the database, but it is not very secure: 9 characters, lower letters and numbers mix with no meaning. Something like **bwkvu5m8i** I want to increase the security of the database, without sacrificing usability much. The only additional option in KeePass is to use a key file, which I can store on an external USB flash drive and plug it into the PC whenever I want to unlock the database. Knowing myself I will probably keep it plugged in 24/7, thus not being much different than storing the key file on the internal hard drive. So are there any other options that doesn't make using KeePass very cumbersome? My main concerns are keyloggers or trojan horses - I am an advanced user and would definitely not open any unknown files, regardless of their origin, but still I'm have the fear of being compromised. Is that even possible?
2013/09/22
[ "https://security.stackexchange.com/questions/42788", "https://security.stackexchange.com", "https://security.stackexchange.com/users/31125/" ]
There's no way to sugar-coat this one. A malware/keylogger installed on your computer means that your passwords are exposed. That's it, there's no way around it. A malware/keylogger will log your master password, intercept the clipboard, somehow access the decrypted database in memory, etc.
One of the attacks is registering a debugger for KeePass.exe which would completely replace KeePass.exe with something else, potentially a very good copy that I don't recognize. Others are keyboard loggers. I did the following to prevent access to the main KeePass database: * download the KeePass source * remove the mobile version (because that one didn't compile on my PC) * make some changes, e.g. change the background color and add an icon, so that I can distinguish my own version from others * rename the executable so that it is not affected by a generic debugger attack * add some characters of the password in code, so that a keylogger never gets the complete password * Change the file extension from .kdbx so that someone watching file accesses cannot find out that this is a KeePass variant and someone scanning the disk will also not find it. * Replace all "KeePass" strings in code * Compile the new version * Do not install it, use a portable USB version only * Turn on secure password prompt Although I can not update KeePass easily any more, I still think I have a more secure version which is less attackable. Someone would need to create an attack just for my own version, which is unlikely. You could also: * change the file format a bit, e.g. write additional bytes at the beginning, so that the file is harder to detect by signature scanners. So now the main KeePass database password is quite secure, it's still possible to access passwords that are copied from KeePass into other applications. An attacker can quickly pop up an invisible window and then activate KeePass again. KeePass will then use the invisible window to paste the password to. Even dual-channel auto-type can hardly prevent this attack, especially if the invisible window passes the data on to the correct window, so you won't notice it. While I've not implemented a counter-measure for that, I guess I'd do the following: * output the window title of the window that KeePass will use to paste passwords to * detect short periods of time that KeePass goes into background. Even if you press Alt-Tab twice very fast, there should be ~100 ms between a deactivation and an activation of KeePass An idea which probably needs administrator rights and needs more Windows Internals knowledge than I currently have: * Suspend all programs (or almost all, perhaps keep some Windows executables running) except your modified KeePass and the target program. After pasting the password, un-suspend them. Attackers that e.g. poll the clipboard should be bypassed. Not sure for other notification types like keyboard hooks.
42,788
Currently I'm using KeePass as my sensitive data manager. I use just a main password to encrypt the database, but it is not very secure: 9 characters, lower letters and numbers mix with no meaning. Something like **bwkvu5m8i** I want to increase the security of the database, without sacrificing usability much. The only additional option in KeePass is to use a key file, which I can store on an external USB flash drive and plug it into the PC whenever I want to unlock the database. Knowing myself I will probably keep it plugged in 24/7, thus not being much different than storing the key file on the internal hard drive. So are there any other options that doesn't make using KeePass very cumbersome? My main concerns are keyloggers or trojan horses - I am an advanced user and would definitely not open any unknown files, regardless of their origin, but still I'm have the fear of being compromised. Is that even possible?
2013/09/22
[ "https://security.stackexchange.com/questions/42788", "https://security.stackexchange.com", "https://security.stackexchange.com/users/31125/" ]
There are ways to increase the difficulty of retrieving the KeePass master password, such as setting it to allow entry on the secure desktop only. To prevent someone from getting your KeePass database file and performing brute force on it, you can also increase the AES iteration count that KeePass does during the master password derivation process, so as to increase the effort require to brute force the master key should your database be exfiltrated. There is also an option to set two channel obfuscation during auto type when KeePass does the typing of the username and password for you. It should prevent crude key loggers from retrieving the specific password you use for that site. To prevent malicious access to the KeePass database (and your decryption passphrase, since you need to type it in plaintext somehow...and that can be intercepted if your computer is compromised) in the first place, keep your computer secure. You know the drill: install and update your AV software, keep your computer OS and software updated, have a firewall, review logs regularly etc. Finally, increase the entropy and length of the master password used. Instead of 9 characters, how about 13+? Instead of just lower letters only, what about including uppercase and even a special character or two too? The more unpredictable and longer your password is, the longer it will take for your attacker to brute force the database master key.
You could try to set up some kind of OTP Solution additionally to the password you store in keepass or as a substitute. A rather affordable one could be yubikey (<http://www.yubico.com/products/yubikey-hardware/yubikey/>). You can do stuff like exchanging a linux PAM with a yubico one and use a yubikey to logon to a linux box and so forth... This is not advertising, rather an affordable otp example. Maybe not a solution for every keepass usecase but if you store system credentials in keepass you could add a layer of security to them.... Edit: Also as mentioned use a lot more than 9 digits. Use something long and complex which is still good to type, like a long sentence with some extra special characters in it. Dont do simple stuff like swapping an e with a 3. There are bruteforce plugins for that kind of stuff. Just add random sings at the end/beginning and or middle... Edit2: just found this: <http://keepass.info/help/kb/yubikey.html> see the otp part at the end. I cannot promise you that this is a proper and secure otp implementation and that the plugin is without flaws. However the theory sounds good and its a good starting point to do some research on it or look for some alternatives like this. Edit3: a free alternative to yubikey would be google authenticator app for ios or android which should work fine with keepass OtpKeyProv plugin according to <http://mx.thirdvisit.co.uk/2014/01/02/getting-the-otpkeyprov-hotp-plug-in-to-work-with-google-authenitcator/> (again i cannot promise that the OtpKeyProv implementation is flawless....)
42,788
Currently I'm using KeePass as my sensitive data manager. I use just a main password to encrypt the database, but it is not very secure: 9 characters, lower letters and numbers mix with no meaning. Something like **bwkvu5m8i** I want to increase the security of the database, without sacrificing usability much. The only additional option in KeePass is to use a key file, which I can store on an external USB flash drive and plug it into the PC whenever I want to unlock the database. Knowing myself I will probably keep it plugged in 24/7, thus not being much different than storing the key file on the internal hard drive. So are there any other options that doesn't make using KeePass very cumbersome? My main concerns are keyloggers or trojan horses - I am an advanced user and would definitely not open any unknown files, regardless of their origin, but still I'm have the fear of being compromised. Is that even possible?
2013/09/22
[ "https://security.stackexchange.com/questions/42788", "https://security.stackexchange.com", "https://security.stackexchange.com/users/31125/" ]
There are ways to increase the difficulty of retrieving the KeePass master password, such as setting it to allow entry on the secure desktop only. To prevent someone from getting your KeePass database file and performing brute force on it, you can also increase the AES iteration count that KeePass does during the master password derivation process, so as to increase the effort require to brute force the master key should your database be exfiltrated. There is also an option to set two channel obfuscation during auto type when KeePass does the typing of the username and password for you. It should prevent crude key loggers from retrieving the specific password you use for that site. To prevent malicious access to the KeePass database (and your decryption passphrase, since you need to type it in plaintext somehow...and that can be intercepted if your computer is compromised) in the first place, keep your computer secure. You know the drill: install and update your AV software, keep your computer OS and software updated, have a firewall, review logs regularly etc. Finally, increase the entropy and length of the master password used. Instead of 9 characters, how about 13+? Instead of just lower letters only, what about including uppercase and even a special character or two too? The more unpredictable and longer your password is, the longer it will take for your attacker to brute force the database master key.
One of the attacks is registering a debugger for KeePass.exe which would completely replace KeePass.exe with something else, potentially a very good copy that I don't recognize. Others are keyboard loggers. I did the following to prevent access to the main KeePass database: * download the KeePass source * remove the mobile version (because that one didn't compile on my PC) * make some changes, e.g. change the background color and add an icon, so that I can distinguish my own version from others * rename the executable so that it is not affected by a generic debugger attack * add some characters of the password in code, so that a keylogger never gets the complete password * Change the file extension from .kdbx so that someone watching file accesses cannot find out that this is a KeePass variant and someone scanning the disk will also not find it. * Replace all "KeePass" strings in code * Compile the new version * Do not install it, use a portable USB version only * Turn on secure password prompt Although I can not update KeePass easily any more, I still think I have a more secure version which is less attackable. Someone would need to create an attack just for my own version, which is unlikely. You could also: * change the file format a bit, e.g. write additional bytes at the beginning, so that the file is harder to detect by signature scanners. So now the main KeePass database password is quite secure, it's still possible to access passwords that are copied from KeePass into other applications. An attacker can quickly pop up an invisible window and then activate KeePass again. KeePass will then use the invisible window to paste the password to. Even dual-channel auto-type can hardly prevent this attack, especially if the invisible window passes the data on to the correct window, so you won't notice it. While I've not implemented a counter-measure for that, I guess I'd do the following: * output the window title of the window that KeePass will use to paste passwords to * detect short periods of time that KeePass goes into background. Even if you press Alt-Tab twice very fast, there should be ~100 ms between a deactivation and an activation of KeePass An idea which probably needs administrator rights and needs more Windows Internals knowledge than I currently have: * Suspend all programs (or almost all, perhaps keep some Windows executables running) except your modified KeePass and the target program. After pasting the password, un-suspend them. Attackers that e.g. poll the clipboard should be bypassed. Not sure for other notification types like keyboard hooks.
42,788
Currently I'm using KeePass as my sensitive data manager. I use just a main password to encrypt the database, but it is not very secure: 9 characters, lower letters and numbers mix with no meaning. Something like **bwkvu5m8i** I want to increase the security of the database, without sacrificing usability much. The only additional option in KeePass is to use a key file, which I can store on an external USB flash drive and plug it into the PC whenever I want to unlock the database. Knowing myself I will probably keep it plugged in 24/7, thus not being much different than storing the key file on the internal hard drive. So are there any other options that doesn't make using KeePass very cumbersome? My main concerns are keyloggers or trojan horses - I am an advanced user and would definitely not open any unknown files, regardless of their origin, but still I'm have the fear of being compromised. Is that even possible?
2013/09/22
[ "https://security.stackexchange.com/questions/42788", "https://security.stackexchange.com", "https://security.stackexchange.com/users/31125/" ]
There's no way to sugar-coat this one. A malware/keylogger installed on your computer means that your passwords are exposed. That's it, there's no way around it. A malware/keylogger will log your master password, intercept the clipboard, somehow access the decrypted database in memory, etc.
Which is your main threat? 1. For most it might me trojan / keylogger software looking for easy money. Some keyloggers detect when you open Keepass and then steal password and database. * Secure your computer. Offline device/phone could be option. * Avoid writing information you will remember. You can write email1 or companyemail2 instead of your actual email. * Write password always with help of mouse and in wrong order. This will block simple keylogger. * A keyfile might block simple keyloggers. * Keepass and database inside offline virtual machine would block average keylogger from stealing database. 2. Someone wants to go through effort to brute force your database or database is in public. * Choose long random password and use keyfile.
42,788
Currently I'm using KeePass as my sensitive data manager. I use just a main password to encrypt the database, but it is not very secure: 9 characters, lower letters and numbers mix with no meaning. Something like **bwkvu5m8i** I want to increase the security of the database, without sacrificing usability much. The only additional option in KeePass is to use a key file, which I can store on an external USB flash drive and plug it into the PC whenever I want to unlock the database. Knowing myself I will probably keep it plugged in 24/7, thus not being much different than storing the key file on the internal hard drive. So are there any other options that doesn't make using KeePass very cumbersome? My main concerns are keyloggers or trojan horses - I am an advanced user and would definitely not open any unknown files, regardless of their origin, but still I'm have the fear of being compromised. Is that even possible?
2013/09/22
[ "https://security.stackexchange.com/questions/42788", "https://security.stackexchange.com", "https://security.stackexchange.com/users/31125/" ]
One of the attacks is registering a debugger for KeePass.exe which would completely replace KeePass.exe with something else, potentially a very good copy that I don't recognize. Others are keyboard loggers. I did the following to prevent access to the main KeePass database: * download the KeePass source * remove the mobile version (because that one didn't compile on my PC) * make some changes, e.g. change the background color and add an icon, so that I can distinguish my own version from others * rename the executable so that it is not affected by a generic debugger attack * add some characters of the password in code, so that a keylogger never gets the complete password * Change the file extension from .kdbx so that someone watching file accesses cannot find out that this is a KeePass variant and someone scanning the disk will also not find it. * Replace all "KeePass" strings in code * Compile the new version * Do not install it, use a portable USB version only * Turn on secure password prompt Although I can not update KeePass easily any more, I still think I have a more secure version which is less attackable. Someone would need to create an attack just for my own version, which is unlikely. You could also: * change the file format a bit, e.g. write additional bytes at the beginning, so that the file is harder to detect by signature scanners. So now the main KeePass database password is quite secure, it's still possible to access passwords that are copied from KeePass into other applications. An attacker can quickly pop up an invisible window and then activate KeePass again. KeePass will then use the invisible window to paste the password to. Even dual-channel auto-type can hardly prevent this attack, especially if the invisible window passes the data on to the correct window, so you won't notice it. While I've not implemented a counter-measure for that, I guess I'd do the following: * output the window title of the window that KeePass will use to paste passwords to * detect short periods of time that KeePass goes into background. Even if you press Alt-Tab twice very fast, there should be ~100 ms between a deactivation and an activation of KeePass An idea which probably needs administrator rights and needs more Windows Internals knowledge than I currently have: * Suspend all programs (or almost all, perhaps keep some Windows executables running) except your modified KeePass and the target program. After pasting the password, un-suspend them. Attackers that e.g. poll the clipboard should be bypassed. Not sure for other notification types like keyboard hooks.
Which is your main threat? 1. For most it might me trojan / keylogger software looking for easy money. Some keyloggers detect when you open Keepass and then steal password and database. * Secure your computer. Offline device/phone could be option. * Avoid writing information you will remember. You can write email1 or companyemail2 instead of your actual email. * Write password always with help of mouse and in wrong order. This will block simple keylogger. * A keyfile might block simple keyloggers. * Keepass and database inside offline virtual machine would block average keylogger from stealing database. 2. Someone wants to go through effort to brute force your database or database is in public. * Choose long random password and use keyfile.
42,788
Currently I'm using KeePass as my sensitive data manager. I use just a main password to encrypt the database, but it is not very secure: 9 characters, lower letters and numbers mix with no meaning. Something like **bwkvu5m8i** I want to increase the security of the database, without sacrificing usability much. The only additional option in KeePass is to use a key file, which I can store on an external USB flash drive and plug it into the PC whenever I want to unlock the database. Knowing myself I will probably keep it plugged in 24/7, thus not being much different than storing the key file on the internal hard drive. So are there any other options that doesn't make using KeePass very cumbersome? My main concerns are keyloggers or trojan horses - I am an advanced user and would definitely not open any unknown files, regardless of their origin, but still I'm have the fear of being compromised. Is that even possible?
2013/09/22
[ "https://security.stackexchange.com/questions/42788", "https://security.stackexchange.com", "https://security.stackexchange.com/users/31125/" ]
You could try to set up some kind of OTP Solution additionally to the password you store in keepass or as a substitute. A rather affordable one could be yubikey (<http://www.yubico.com/products/yubikey-hardware/yubikey/>). You can do stuff like exchanging a linux PAM with a yubico one and use a yubikey to logon to a linux box and so forth... This is not advertising, rather an affordable otp example. Maybe not a solution for every keepass usecase but if you store system credentials in keepass you could add a layer of security to them.... Edit: Also as mentioned use a lot more than 9 digits. Use something long and complex which is still good to type, like a long sentence with some extra special characters in it. Dont do simple stuff like swapping an e with a 3. There are bruteforce plugins for that kind of stuff. Just add random sings at the end/beginning and or middle... Edit2: just found this: <http://keepass.info/help/kb/yubikey.html> see the otp part at the end. I cannot promise you that this is a proper and secure otp implementation and that the plugin is without flaws. However the theory sounds good and its a good starting point to do some research on it or look for some alternatives like this. Edit3: a free alternative to yubikey would be google authenticator app for ios or android which should work fine with keepass OtpKeyProv plugin according to <http://mx.thirdvisit.co.uk/2014/01/02/getting-the-otpkeyprov-hotp-plug-in-to-work-with-google-authenitcator/> (again i cannot promise that the OtpKeyProv implementation is flawless....)
Which is your main threat? 1. For most it might me trojan / keylogger software looking for easy money. Some keyloggers detect when you open Keepass and then steal password and database. * Secure your computer. Offline device/phone could be option. * Avoid writing information you will remember. You can write email1 or companyemail2 instead of your actual email. * Write password always with help of mouse and in wrong order. This will block simple keylogger. * A keyfile might block simple keyloggers. * Keepass and database inside offline virtual machine would block average keylogger from stealing database. 2. Someone wants to go through effort to brute force your database or database is in public. * Choose long random password and use keyfile.
42,788
Currently I'm using KeePass as my sensitive data manager. I use just a main password to encrypt the database, but it is not very secure: 9 characters, lower letters and numbers mix with no meaning. Something like **bwkvu5m8i** I want to increase the security of the database, without sacrificing usability much. The only additional option in KeePass is to use a key file, which I can store on an external USB flash drive and plug it into the PC whenever I want to unlock the database. Knowing myself I will probably keep it plugged in 24/7, thus not being much different than storing the key file on the internal hard drive. So are there any other options that doesn't make using KeePass very cumbersome? My main concerns are keyloggers or trojan horses - I am an advanced user and would definitely not open any unknown files, regardless of their origin, but still I'm have the fear of being compromised. Is that even possible?
2013/09/22
[ "https://security.stackexchange.com/questions/42788", "https://security.stackexchange.com", "https://security.stackexchange.com/users/31125/" ]
Which is your main threat? 1. For most it might me trojan / keylogger software looking for easy money. Some keyloggers detect when you open Keepass and then steal password and database. * Secure your computer. Offline device/phone could be option. * Avoid writing information you will remember. You can write email1 or companyemail2 instead of your actual email. * Write password always with help of mouse and in wrong order. This will block simple keylogger. * A keyfile might block simple keyloggers. * Keepass and database inside offline virtual machine would block average keylogger from stealing database. 2. Someone wants to go through effort to brute force your database or database is in public. * Choose long random password and use keyfile.
Nasrus has given pretty good suggestions. Additionally; I don't know if you are already doing that way, but you can use KeePass on a Linux machine which would be safer. Ubuntu or Debian would be fine, but if you are very concerned, you can try [Tails](https://tails.boum.org/) which aims at preserving your privacy and anonymity by focusing on the security.
14,027
I am putting together a telephone directory, and I was trying to figure out a good way of getting section markers to work for me. My setup has 3 towns: Burford, Paris and St George. Under each of those there are alphabetic listings, to which I would like to have a marker for each letter to denote the change of the letter in the listing. Ideally I would like the that has an object style. So it would have markers for A-Z under Burford, then A-Z under Paris. When I change the numbering & section options, it just changes the page number. It seems from my reading that this should be possible, but I haven't found any examples of how to do this. [Edit] I have added a photo of what I'm trying to achieve. As you can see I've got a page number, a variable to pull the town name along the page edge. I've added those manually, but the idea behind this question is to figure an automated way of creating markers like that. ![enter image description here](https://i.stack.imgur.com/2qHJO.png)
2013/01/13
[ "https://graphicdesign.stackexchange.com/questions/14027", "https://graphicdesign.stackexchange.com", "https://graphicdesign.stackexchange.com/users/9376/" ]
Okay based on your updated question here is how we do it where I work. Someone else might have a better solution: You're bringing this out from some sort of database presumable and going to be adjusting it in Excel and then importing it as a CSV file to InDesign. We sort stuff like this out in the Excel file so when we do the import it already has the category header (category, state, country, whatever that directory calls for) in place. If you set it up so it imports from Excel with the Paragraph styles already in place its then a simple matter of creating the triangle shape and dropping it behind the letters.
Based on the comment above, it's pretty easy.... ![numbering](https://i.stack.imgur.com/p76Ua.png) Set the section prefix to the town, then choose the Upper Alpha for Style. And you should be set. Note I checked "Include Prefix when numbering" as well. UPDATE ------ For a section marker with the city/town, then pages A-B ![marker](https://i.stack.imgur.com/ik9qD.png) here the section Marker is set to a city/town. Then on a master page you would insert the section marker as well as the current page number: ![page markers](https://i.stack.imgur.com/XYYyk.png) The section marker will only appear on the first page (A) then will be followed by B, C, D, etc. without the town/city.
32,945
I'm writing a science fiction novel and I want to use Jim Morrison (lead singer for The Doors who died 47 years ago) as a minor character. Actually, it is a *copy* of Jim Morrison uploaded after his death into a 13-dimensional computer, which is embedded in my protagonist's brain. Since this is an emulation created after his death and not the living, breathing Jim, would this be enough to protect me from defamation? I'm also considering making him an *altered* personality, deranged from dying and "breaking through to the other side." I may also turn him into a "chimera" personality, half Jim, half host. Could these provide more protection from liability? Is it lawful if Jim speaks or sings some of his lyrics in the story? I've heard that the location of death determines the jurisdiction. Since he died in Paris, how would French law affect this?
2018/10/27
[ "https://law.stackexchange.com/questions/32945", "https://law.stackexchange.com", "https://law.stackexchange.com/users/21430/" ]
You can’t defame a dead person - dead people have no reputation that can be legally damaged. The lyrics are certainly under copyright but usage of a small amount in a different art form is probably fair use/dealing - your publisher’s legal department should be all over this.
The more important question is where you're writing and where you're publishing. If you're in the United States, though, the fact that you're writing a science-fiction novel is enough to protect you from defamation liability. It doesn't matter whether he's alive or dead, original Jim or copied Jim altered Jim. You're not presenting your work as truthful, so it's not actually a statement about him and therefore can't be defamatory. As Dale M pointed out, the fact that he's dead also cuts off defamation liability just about everywhere. The question about lyrics is also jurisdiction-specific. But in the United States, it would probably not be a problem to include a line or two here or there. Set up that way, it would probably be considered fair use and therefore not a copyright violation.
455,476
When I add LIMIT 1 to a MySQL query, does it stop the search after it finds 1 result (thus making it faster) or does it still fetch all of the results and truncate at the end?
2009/01/18
[ "https://Stackoverflow.com/questions/455476", "https://Stackoverflow.com", "https://Stackoverflow.com/users/29595/" ]
Depending on the query, adding a limit clause can have a huge effect on performance. If you want only one row (or know for a fact that only one row can satisfy the query), and are not sure about how the internal optimizer will execute it (for example, WHERE clause not hitting an index and so forth), then you should definitely add a LIMIT clause. As for optimized queries (using indexes on small tables) it probably won't matter much in performance, but again - if you are only interested in one row than add a LIMIT clause regardless.
If you really only expect one single result, it really makes sense to append the LIMIT to your query. I don't know the inner workings of MySQL, but I'm sure it won't gather a result set of 100'000+ records just to truncate it back to 1 at the end..
455,476
When I add LIMIT 1 to a MySQL query, does it stop the search after it finds 1 result (thus making it faster) or does it still fetch all of the results and truncate at the end?
2009/01/18
[ "https://Stackoverflow.com/questions/455476", "https://Stackoverflow.com", "https://Stackoverflow.com/users/29595/" ]
Limit can affect the performance of the query (see comments and the link below) and it also reduces the result set that is output by MySQL. For a query in which you expect a single result there is benefits. Moreover, limiting the result set can in fact speed the total query time as transferring large result sets use memory and potentially create temporary tables on disk. I mention this as I recently saw a application that did not use limit kill a server due to huge result sets and with limit in place the resource utilization dropped tremendously. Check this page for more specifics: [MySQL Documentation: LIMIT Optimization](http://dev.mysql.com/doc/refman/5.0/en/limit-optimization.html)
If you really only expect one single result, it really makes sense to append the LIMIT to your query. I don't know the inner workings of MySQL, but I'm sure it won't gather a result set of 100'000+ records just to truncate it back to 1 at the end..
455,476
When I add LIMIT 1 to a MySQL query, does it stop the search after it finds 1 result (thus making it faster) or does it still fetch all of the results and truncate at the end?
2009/01/18
[ "https://Stackoverflow.com/questions/455476", "https://Stackoverflow.com", "https://Stackoverflow.com/users/29595/" ]
If there is only 1 result coming back, then no, LIMIT will not make it any faster. If there are a lot of results, and you only need the first result, and there is no GROUP or ORDER by statements then LIMIT will make it faster.
If you really only expect one single result, it really makes sense to append the LIMIT to your query. I don't know the inner workings of MySQL, but I'm sure it won't gather a result set of 100'000+ records just to truncate it back to 1 at the end..
455,476
When I add LIMIT 1 to a MySQL query, does it stop the search after it finds 1 result (thus making it faster) or does it still fetch all of the results and truncate at the end?
2009/01/18
[ "https://Stackoverflow.com/questions/455476", "https://Stackoverflow.com", "https://Stackoverflow.com/users/29595/" ]
**The answer, in short, is yes.** If you limit your result to 1, then even if you are "expecting" one result, the query will be faster because your database wont look through all your records. It will simply stop once it finds a record that matches your query.
If you really only expect one single result, it really makes sense to append the LIMIT to your query. I don't know the inner workings of MySQL, but I'm sure it won't gather a result set of 100'000+ records just to truncate it back to 1 at the end..
455,476
When I add LIMIT 1 to a MySQL query, does it stop the search after it finds 1 result (thus making it faster) or does it still fetch all of the results and truncate at the end?
2009/01/18
[ "https://Stackoverflow.com/questions/455476", "https://Stackoverflow.com", "https://Stackoverflow.com/users/29595/" ]
Depending on the query, adding a limit clause can have a huge effect on performance. If you want only one row (or know for a fact that only one row can satisfy the query), and are not sure about how the internal optimizer will execute it (for example, WHERE clause not hitting an index and so forth), then you should definitely add a LIMIT clause. As for optimized queries (using indexes on small tables) it probably won't matter much in performance, but again - if you are only interested in one row than add a LIMIT clause regardless.
Limit can affect the performance of the query (see comments and the link below) and it also reduces the result set that is output by MySQL. For a query in which you expect a single result there is benefits. Moreover, limiting the result set can in fact speed the total query time as transferring large result sets use memory and potentially create temporary tables on disk. I mention this as I recently saw a application that did not use limit kill a server due to huge result sets and with limit in place the resource utilization dropped tremendously. Check this page for more specifics: [MySQL Documentation: LIMIT Optimization](http://dev.mysql.com/doc/refman/5.0/en/limit-optimization.html)
455,476
When I add LIMIT 1 to a MySQL query, does it stop the search after it finds 1 result (thus making it faster) or does it still fetch all of the results and truncate at the end?
2009/01/18
[ "https://Stackoverflow.com/questions/455476", "https://Stackoverflow.com", "https://Stackoverflow.com/users/29595/" ]
Depending on the query, adding a limit clause can have a huge effect on performance. If you want only one row (or know for a fact that only one row can satisfy the query), and are not sure about how the internal optimizer will execute it (for example, WHERE clause not hitting an index and so forth), then you should definitely add a LIMIT clause. As for optimized queries (using indexes on small tables) it probably won't matter much in performance, but again - if you are only interested in one row than add a LIMIT clause regardless.
If there is only 1 result coming back, then no, LIMIT will not make it any faster. If there are a lot of results, and you only need the first result, and there is no GROUP or ORDER by statements then LIMIT will make it faster.
455,476
When I add LIMIT 1 to a MySQL query, does it stop the search after it finds 1 result (thus making it faster) or does it still fetch all of the results and truncate at the end?
2009/01/18
[ "https://Stackoverflow.com/questions/455476", "https://Stackoverflow.com", "https://Stackoverflow.com/users/29595/" ]
Depending on the query, adding a limit clause can have a huge effect on performance. If you want only one row (or know for a fact that only one row can satisfy the query), and are not sure about how the internal optimizer will execute it (for example, WHERE clause not hitting an index and so forth), then you should definitely add a LIMIT clause. As for optimized queries (using indexes on small tables) it probably won't matter much in performance, but again - if you are only interested in one row than add a LIMIT clause regardless.
**The answer, in short, is yes.** If you limit your result to 1, then even if you are "expecting" one result, the query will be faster because your database wont look through all your records. It will simply stop once it finds a record that matches your query.
455,476
When I add LIMIT 1 to a MySQL query, does it stop the search after it finds 1 result (thus making it faster) or does it still fetch all of the results and truncate at the end?
2009/01/18
[ "https://Stackoverflow.com/questions/455476", "https://Stackoverflow.com", "https://Stackoverflow.com/users/29595/" ]
Limit can affect the performance of the query (see comments and the link below) and it also reduces the result set that is output by MySQL. For a query in which you expect a single result there is benefits. Moreover, limiting the result set can in fact speed the total query time as transferring large result sets use memory and potentially create temporary tables on disk. I mention this as I recently saw a application that did not use limit kill a server due to huge result sets and with limit in place the resource utilization dropped tremendously. Check this page for more specifics: [MySQL Documentation: LIMIT Optimization](http://dev.mysql.com/doc/refman/5.0/en/limit-optimization.html)
If there is only 1 result coming back, then no, LIMIT will not make it any faster. If there are a lot of results, and you only need the first result, and there is no GROUP or ORDER by statements then LIMIT will make it faster.
455,476
When I add LIMIT 1 to a MySQL query, does it stop the search after it finds 1 result (thus making it faster) or does it still fetch all of the results and truncate at the end?
2009/01/18
[ "https://Stackoverflow.com/questions/455476", "https://Stackoverflow.com", "https://Stackoverflow.com/users/29595/" ]
Limit can affect the performance of the query (see comments and the link below) and it also reduces the result set that is output by MySQL. For a query in which you expect a single result there is benefits. Moreover, limiting the result set can in fact speed the total query time as transferring large result sets use memory and potentially create temporary tables on disk. I mention this as I recently saw a application that did not use limit kill a server due to huge result sets and with limit in place the resource utilization dropped tremendously. Check this page for more specifics: [MySQL Documentation: LIMIT Optimization](http://dev.mysql.com/doc/refman/5.0/en/limit-optimization.html)
**The answer, in short, is yes.** If you limit your result to 1, then even if you are "expecting" one result, the query will be faster because your database wont look through all your records. It will simply stop once it finds a record that matches your query.
3,045
**Problem:** I have two spreadsheets that each serve different purposes but contain one particular piece of data that needs to be the same in both spreadsheets. This piece of data (one of the columns) gets updated in spreadsheet A but needs to also be updated in spreadsheet B. **Goal:** A solution that would somehow link these two spreadsheets together (keep in mind that they exist on two separate LAN shares on the network) so that when A is updated, B is automatically updated for the corresponding record. \*Note that I understand fully that a database would probably be a better plan for tasks such as these but unfortunately I have no say in that matter. \*\*Note also that this needs to work for Office 2003 and Office 2007
2008/08/06
[ "https://Stackoverflow.com/questions/3045", "https://Stackoverflow.com", "https://Stackoverflow.com/users/271/" ]
So you mean that AD743 on spreadsheet B must be equal to AD743 on spreadsheet A? Try this: * Open both spreadsheets on the same machine. * Go to AD743 on spreadsheet B. * Type =. * Go to spreadsheed A and click on AD743. * Press enter. You'll notice that the formula is something like '*[path-to-file+file-name].worksheet-name!AD743*'. The value on spreadsheet B will be updated when you open it. In fact, it will ask you if you want to update. Of course, your connection must be up and running for it to update. Also, you can't change the name or the path of spreadsheet A.
I can't say if this is overkill without knowing the details of your usage case, but consider creating a spreadsheet C to hold all data held in common between the two. Links can become dizzyingly complex as spreadsheets age, and having a shared data source might help clear up the confusion. Perhaps even more "enterprise-y" is the concept of just pasting in all data that otherwise would be shared. That is the official best practice in my company, because external links have caused so much trouble with maintainability. It may seem cumbersome at first, but I've found it may just be the best way to promote maintainability in addition to ease of use, assuming you don't mind the manual intervention.
5,451,607
I need to use NTLM V2 SSO for a web application deployed on Tomcat 6 (Redhat Linux). I know of the JCifs library but it's NTLM filter supports only NTLM V1 and not V2. They recommend JESPA as an alternative but I would rather have an open source solution. I know of [Waffle](http://waffle.codeplex.com/) which does NTLM V1,V2 with zero configuration but works only on server deployed on windows. Do you know of an NTLM V2 SSO NTLM filter for application servers deployed on Linux ?
2011/03/27
[ "https://Stackoverflow.com/questions/5451607", "https://Stackoverflow.com", "https://Stackoverflow.com/users/325284/" ]
Try this --> <http://tomcatspnego.codeplex.com/>
Oakland Software supports NTLM v2. See <http://oaklandsoftware.com/product_http/compare.html>.
5,451,607
I need to use NTLM V2 SSO for a web application deployed on Tomcat 6 (Redhat Linux). I know of the JCifs library but it's NTLM filter supports only NTLM V1 and not V2. They recommend JESPA as an alternative but I would rather have an open source solution. I know of [Waffle](http://waffle.codeplex.com/) which does NTLM V1,V2 with zero configuration but works only on server deployed on windows. Do you know of an NTLM V2 SSO NTLM filter for application servers deployed on Linux ?
2011/03/27
[ "https://Stackoverflow.com/questions/5451607", "https://Stackoverflow.com", "https://Stackoverflow.com/users/325284/" ]
There's a SourceForget project with a Java SSO servlet filter: <https://sourceforge.net/projects/ntlmv2auth/> Uses an NTLMv2 extension of JCIFS from the Liferay Portal project.
Oakland Software supports NTLM v2. See <http://oaklandsoftware.com/product_http/compare.html>.
5,451,607
I need to use NTLM V2 SSO for a web application deployed on Tomcat 6 (Redhat Linux). I know of the JCifs library but it's NTLM filter supports only NTLM V1 and not V2. They recommend JESPA as an alternative but I would rather have an open source solution. I know of [Waffle](http://waffle.codeplex.com/) which does NTLM V1,V2 with zero configuration but works only on server deployed on windows. Do you know of an NTLM V2 SSO NTLM filter for application servers deployed on Linux ?
2011/03/27
[ "https://Stackoverflow.com/questions/5451607", "https://Stackoverflow.com", "https://Stackoverflow.com/users/325284/" ]
Try this --> <http://tomcatspnego.codeplex.com/>
Go for Kerberos. NTLM is proprietary and insecure compared to Digest and Kerberos.
5,451,607
I need to use NTLM V2 SSO for a web application deployed on Tomcat 6 (Redhat Linux). I know of the JCifs library but it's NTLM filter supports only NTLM V1 and not V2. They recommend JESPA as an alternative but I would rather have an open source solution. I know of [Waffle](http://waffle.codeplex.com/) which does NTLM V1,V2 with zero configuration but works only on server deployed on windows. Do you know of an NTLM V2 SSO NTLM filter for application servers deployed on Linux ?
2011/03/27
[ "https://Stackoverflow.com/questions/5451607", "https://Stackoverflow.com", "https://Stackoverflow.com/users/325284/" ]
There's a SourceForget project with a Java SSO servlet filter: <https://sourceforge.net/projects/ntlmv2auth/> Uses an NTLMv2 extension of JCIFS from the Liferay Portal project.
Go for Kerberos. NTLM is proprietary and insecure compared to Digest and Kerberos.
5,451,607
I need to use NTLM V2 SSO for a web application deployed on Tomcat 6 (Redhat Linux). I know of the JCifs library but it's NTLM filter supports only NTLM V1 and not V2. They recommend JESPA as an alternative but I would rather have an open source solution. I know of [Waffle](http://waffle.codeplex.com/) which does NTLM V1,V2 with zero configuration but works only on server deployed on windows. Do you know of an NTLM V2 SSO NTLM filter for application servers deployed on Linux ?
2011/03/27
[ "https://Stackoverflow.com/questions/5451607", "https://Stackoverflow.com", "https://Stackoverflow.com/users/325284/" ]
There's a SourceForget project with a Java SSO servlet filter: <https://sourceforge.net/projects/ntlmv2auth/> Uses an NTLMv2 extension of JCIFS from the Liferay Portal project.
Try this --> <http://tomcatspnego.codeplex.com/>
5,451,607
I need to use NTLM V2 SSO for a web application deployed on Tomcat 6 (Redhat Linux). I know of the JCifs library but it's NTLM filter supports only NTLM V1 and not V2. They recommend JESPA as an alternative but I would rather have an open source solution. I know of [Waffle](http://waffle.codeplex.com/) which does NTLM V1,V2 with zero configuration but works only on server deployed on windows. Do you know of an NTLM V2 SSO NTLM filter for application servers deployed on Linux ?
2011/03/27
[ "https://Stackoverflow.com/questions/5451607", "https://Stackoverflow.com", "https://Stackoverflow.com/users/325284/" ]
Try this --> <http://tomcatspnego.codeplex.com/>
Jespa is the premier NTLMv2 solution right now and it is what replaced the old JCIFS Filter: <http://www.ioplex.com/jespa.html> Just download the package and try the example webapp as described in the Requirements and Installation sections of the Jespa Operator's Manual. Once you see that work it should be fairly easy to incorporate it into your application. There is a Filter but there are other more sophisticated ways to integrate as well. Jespa is a commercial solution.
5,451,607
I need to use NTLM V2 SSO for a web application deployed on Tomcat 6 (Redhat Linux). I know of the JCifs library but it's NTLM filter supports only NTLM V1 and not V2. They recommend JESPA as an alternative but I would rather have an open source solution. I know of [Waffle](http://waffle.codeplex.com/) which does NTLM V1,V2 with zero configuration but works only on server deployed on windows. Do you know of an NTLM V2 SSO NTLM filter for application servers deployed on Linux ?
2011/03/27
[ "https://Stackoverflow.com/questions/5451607", "https://Stackoverflow.com", "https://Stackoverflow.com/users/325284/" ]
There's a SourceForget project with a Java SSO servlet filter: <https://sourceforge.net/projects/ntlmv2auth/> Uses an NTLMv2 extension of JCIFS from the Liferay Portal project.
Jespa is the premier NTLMv2 solution right now and it is what replaced the old JCIFS Filter: <http://www.ioplex.com/jespa.html> Just download the package and try the example webapp as described in the Requirements and Installation sections of the Jespa Operator's Manual. Once you see that work it should be fairly easy to incorporate it into your application. There is a Filter but there are other more sophisticated ways to integrate as well. Jespa is a commercial solution.
12,669
In DC comics, speedsters play a pretty big part, with Flash being one of the better known heroes. Speedster powers are impressive and formidable, which is partly why Flash is such a prominent hero. Since Marvel has the equivalent of a speedster in Quicksilver, why is he not as prominent in the Marvel universe as Flash is in the DC universe?
2012/03/07
[ "https://scifi.stackexchange.com/questions/12669", "https://scifi.stackexchange.com", "https://scifi.stackexchange.com/users/4728/" ]
The Flash was invented in 1940. Quicksilver was invented in 1964. As the son of Magneto, Quicksilver was more of a sidekick / second class character to the comics. It is also impossible to believe that Quicksilver wasn't partially inspired by the Flash. Given that the comic industry already had a well established speedster to follow (The Flash) there likely wasn't much appeal to a new character with the same powers. Why aren't speedsters more common or popular in general? It may be due to the challenges of making them interesting to the reader: > > "Speedsters make me nervous, because if you play them accurately, they're impossible to beat...The moment someone sees him coming, it's too late. You shout, "It's the Flash!" and you haven't even got "It's" out before you're done...I could deal with Impulse because he was easily distracted." - Peter David (Young Justice) > > > There are also scientific challenges ([Wikipedia Speedster](http://en.wikipedia.org/wiki/Speedster_%28fiction%29)): > > The use of speedsters in fiction requires artistic license due to the laws of physics that would prohibit such abilities. Moving at the speed of sound, for example, would create sonic booms that are usually not heard in such stories. An enormous amount of energy would be required to sustain such speeds, and as some speedsters can actually move close to or at the speed of light, this would cause them to gain near-infinite energy, according to the laws of relativity. > > > In addition to [Quicksilver](http://marvel.com/universe/Quicksilver) there are other super fast meta-humans in the Marvel universe, they are just even less well known. Taken from the [Marvel.com/Universe/](http://marvel.com/universe/) * [Speed Demon](http://marvel.com/universe/Speed_Demon) * [Lightspeed](http://marvel.com/universe/Lightspeed) * [Speed](http://marvel.com/universe/Speed) * [Super Sabre](http://marvel.com/universe/Super_Sabre) * [Northstar](http://marvel.com/universe/Northstar) This list is not meant to be definitive, but rather an example to show that Quicksilver is not the sole speedster running around the Marvel universe.
I would say two reasons. 1) Marvel has a tendency to be grounded more in reality (real locations, attempts at realistic explanations). For example "running around the earth backwards really fast to turn back time" wouldn't work for most Marvel fans. 2) Marvel has a prevalence of teleporters. IIRC DC doesn't have many people who can outright teleport. Thus in a world where I can instantly travel through a rift in hell, who cares if I can run fast?
12,669
In DC comics, speedsters play a pretty big part, with Flash being one of the better known heroes. Speedster powers are impressive and formidable, which is partly why Flash is such a prominent hero. Since Marvel has the equivalent of a speedster in Quicksilver, why is he not as prominent in the Marvel universe as Flash is in the DC universe?
2012/03/07
[ "https://scifi.stackexchange.com/questions/12669", "https://scifi.stackexchange.com", "https://scifi.stackexchange.com/users/4728/" ]
I would say two reasons. 1) Marvel has a tendency to be grounded more in reality (real locations, attempts at realistic explanations). For example "running around the earth backwards really fast to turn back time" wouldn't work for most Marvel fans. 2) Marvel has a prevalence of teleporters. IIRC DC doesn't have many people who can outright teleport. Thus in a world where I can instantly travel through a rift in hell, who cares if I can run fast?
Marvel also tends to underpower their characters compared to DC. like Batman (big fan, favorite comic character) never being able to get hit because of years of training or Superman being completely and utterly indistructable. In comparison, Spiderman is pretty much "heightened body functions" with "spider sense" and wall-climbing or Cyclops who can only shoot optic blasts out of his eyes (I do not know too much about Cyclops).
12,669
In DC comics, speedsters play a pretty big part, with Flash being one of the better known heroes. Speedster powers are impressive and formidable, which is partly why Flash is such a prominent hero. Since Marvel has the equivalent of a speedster in Quicksilver, why is he not as prominent in the Marvel universe as Flash is in the DC universe?
2012/03/07
[ "https://scifi.stackexchange.com/questions/12669", "https://scifi.stackexchange.com", "https://scifi.stackexchange.com/users/4728/" ]
I would say two reasons. 1) Marvel has a tendency to be grounded more in reality (real locations, attempts at realistic explanations). For example "running around the earth backwards really fast to turn back time" wouldn't work for most Marvel fans. 2) Marvel has a prevalence of teleporters. IIRC DC doesn't have many people who can outright teleport. Thus in a world where I can instantly travel through a rift in hell, who cares if I can run fast?
I don't know about speedsters but as I see it marvel tries to be accurate to the premises of the hero powers in a world that apparently works like ours to some extent.Even if this is something too general,they try to at least make characters that make sense and the powers are tangible and measurable.Sure there are times when this does not apply and I call it bad writing,unless the omnipotent being fits to the stories.The little I know about dc though tells me a different story.Vague divine powers that contradict the plots,beings with limitless/vague/ potential that could end the plot in one or two frames,and too much iconic stuff.Too iconic to be sci fi or superheroing for me.And too wannabe serious to be purely surreal.
12,669
In DC comics, speedsters play a pretty big part, with Flash being one of the better known heroes. Speedster powers are impressive and formidable, which is partly why Flash is such a prominent hero. Since Marvel has the equivalent of a speedster in Quicksilver, why is he not as prominent in the Marvel universe as Flash is in the DC universe?
2012/03/07
[ "https://scifi.stackexchange.com/questions/12669", "https://scifi.stackexchange.com", "https://scifi.stackexchange.com/users/4728/" ]
I would say two reasons. 1) Marvel has a tendency to be grounded more in reality (real locations, attempts at realistic explanations). For example "running around the earth backwards really fast to turn back time" wouldn't work for most Marvel fans. 2) Marvel has a prevalence of teleporters. IIRC DC doesn't have many people who can outright teleport. Thus in a world where I can instantly travel through a rift in hell, who cares if I can run fast?
The Flash is the most popular speedster. When you try to make a hero as or more popular then him, it's really hard to do. The Flash also is way to OP for Marvel to make something similar. With the power used correctly, the Flash pretty much has infinite power. DC has no use for another super hero speedster, it doesn't make sense. Another DC hero speedster wouldn't make it far at all.
12,669
In DC comics, speedsters play a pretty big part, with Flash being one of the better known heroes. Speedster powers are impressive and formidable, which is partly why Flash is such a prominent hero. Since Marvel has the equivalent of a speedster in Quicksilver, why is he not as prominent in the Marvel universe as Flash is in the DC universe?
2012/03/07
[ "https://scifi.stackexchange.com/questions/12669", "https://scifi.stackexchange.com", "https://scifi.stackexchange.com/users/4728/" ]
The Flash was invented in 1940. Quicksilver was invented in 1964. As the son of Magneto, Quicksilver was more of a sidekick / second class character to the comics. It is also impossible to believe that Quicksilver wasn't partially inspired by the Flash. Given that the comic industry already had a well established speedster to follow (The Flash) there likely wasn't much appeal to a new character with the same powers. Why aren't speedsters more common or popular in general? It may be due to the challenges of making them interesting to the reader: > > "Speedsters make me nervous, because if you play them accurately, they're impossible to beat...The moment someone sees him coming, it's too late. You shout, "It's the Flash!" and you haven't even got "It's" out before you're done...I could deal with Impulse because he was easily distracted." - Peter David (Young Justice) > > > There are also scientific challenges ([Wikipedia Speedster](http://en.wikipedia.org/wiki/Speedster_%28fiction%29)): > > The use of speedsters in fiction requires artistic license due to the laws of physics that would prohibit such abilities. Moving at the speed of sound, for example, would create sonic booms that are usually not heard in such stories. An enormous amount of energy would be required to sustain such speeds, and as some speedsters can actually move close to or at the speed of light, this would cause them to gain near-infinite energy, according to the laws of relativity. > > > In addition to [Quicksilver](http://marvel.com/universe/Quicksilver) there are other super fast meta-humans in the Marvel universe, they are just even less well known. Taken from the [Marvel.com/Universe/](http://marvel.com/universe/) * [Speed Demon](http://marvel.com/universe/Speed_Demon) * [Lightspeed](http://marvel.com/universe/Lightspeed) * [Speed](http://marvel.com/universe/Speed) * [Super Sabre](http://marvel.com/universe/Super_Sabre) * [Northstar](http://marvel.com/universe/Northstar) This list is not meant to be definitive, but rather an example to show that Quicksilver is not the sole speedster running around the Marvel universe.
Marvel also tends to underpower their characters compared to DC. like Batman (big fan, favorite comic character) never being able to get hit because of years of training or Superman being completely and utterly indistructable. In comparison, Spiderman is pretty much "heightened body functions" with "spider sense" and wall-climbing or Cyclops who can only shoot optic blasts out of his eyes (I do not know too much about Cyclops).
12,669
In DC comics, speedsters play a pretty big part, with Flash being one of the better known heroes. Speedster powers are impressive and formidable, which is partly why Flash is such a prominent hero. Since Marvel has the equivalent of a speedster in Quicksilver, why is he not as prominent in the Marvel universe as Flash is in the DC universe?
2012/03/07
[ "https://scifi.stackexchange.com/questions/12669", "https://scifi.stackexchange.com", "https://scifi.stackexchange.com/users/4728/" ]
The Flash was invented in 1940. Quicksilver was invented in 1964. As the son of Magneto, Quicksilver was more of a sidekick / second class character to the comics. It is also impossible to believe that Quicksilver wasn't partially inspired by the Flash. Given that the comic industry already had a well established speedster to follow (The Flash) there likely wasn't much appeal to a new character with the same powers. Why aren't speedsters more common or popular in general? It may be due to the challenges of making them interesting to the reader: > > "Speedsters make me nervous, because if you play them accurately, they're impossible to beat...The moment someone sees him coming, it's too late. You shout, "It's the Flash!" and you haven't even got "It's" out before you're done...I could deal with Impulse because he was easily distracted." - Peter David (Young Justice) > > > There are also scientific challenges ([Wikipedia Speedster](http://en.wikipedia.org/wiki/Speedster_%28fiction%29)): > > The use of speedsters in fiction requires artistic license due to the laws of physics that would prohibit such abilities. Moving at the speed of sound, for example, would create sonic booms that are usually not heard in such stories. An enormous amount of energy would be required to sustain such speeds, and as some speedsters can actually move close to or at the speed of light, this would cause them to gain near-infinite energy, according to the laws of relativity. > > > In addition to [Quicksilver](http://marvel.com/universe/Quicksilver) there are other super fast meta-humans in the Marvel universe, they are just even less well known. Taken from the [Marvel.com/Universe/](http://marvel.com/universe/) * [Speed Demon](http://marvel.com/universe/Speed_Demon) * [Lightspeed](http://marvel.com/universe/Lightspeed) * [Speed](http://marvel.com/universe/Speed) * [Super Sabre](http://marvel.com/universe/Super_Sabre) * [Northstar](http://marvel.com/universe/Northstar) This list is not meant to be definitive, but rather an example to show that Quicksilver is not the sole speedster running around the Marvel universe.
I don't know about speedsters but as I see it marvel tries to be accurate to the premises of the hero powers in a world that apparently works like ours to some extent.Even if this is something too general,they try to at least make characters that make sense and the powers are tangible and measurable.Sure there are times when this does not apply and I call it bad writing,unless the omnipotent being fits to the stories.The little I know about dc though tells me a different story.Vague divine powers that contradict the plots,beings with limitless/vague/ potential that could end the plot in one or two frames,and too much iconic stuff.Too iconic to be sci fi or superheroing for me.And too wannabe serious to be purely surreal.
12,669
In DC comics, speedsters play a pretty big part, with Flash being one of the better known heroes. Speedster powers are impressive and formidable, which is partly why Flash is such a prominent hero. Since Marvel has the equivalent of a speedster in Quicksilver, why is he not as prominent in the Marvel universe as Flash is in the DC universe?
2012/03/07
[ "https://scifi.stackexchange.com/questions/12669", "https://scifi.stackexchange.com", "https://scifi.stackexchange.com/users/4728/" ]
The Flash was invented in 1940. Quicksilver was invented in 1964. As the son of Magneto, Quicksilver was more of a sidekick / second class character to the comics. It is also impossible to believe that Quicksilver wasn't partially inspired by the Flash. Given that the comic industry already had a well established speedster to follow (The Flash) there likely wasn't much appeal to a new character with the same powers. Why aren't speedsters more common or popular in general? It may be due to the challenges of making them interesting to the reader: > > "Speedsters make me nervous, because if you play them accurately, they're impossible to beat...The moment someone sees him coming, it's too late. You shout, "It's the Flash!" and you haven't even got "It's" out before you're done...I could deal with Impulse because he was easily distracted." - Peter David (Young Justice) > > > There are also scientific challenges ([Wikipedia Speedster](http://en.wikipedia.org/wiki/Speedster_%28fiction%29)): > > The use of speedsters in fiction requires artistic license due to the laws of physics that would prohibit such abilities. Moving at the speed of sound, for example, would create sonic booms that are usually not heard in such stories. An enormous amount of energy would be required to sustain such speeds, and as some speedsters can actually move close to or at the speed of light, this would cause them to gain near-infinite energy, according to the laws of relativity. > > > In addition to [Quicksilver](http://marvel.com/universe/Quicksilver) there are other super fast meta-humans in the Marvel universe, they are just even less well known. Taken from the [Marvel.com/Universe/](http://marvel.com/universe/) * [Speed Demon](http://marvel.com/universe/Speed_Demon) * [Lightspeed](http://marvel.com/universe/Lightspeed) * [Speed](http://marvel.com/universe/Speed) * [Super Sabre](http://marvel.com/universe/Super_Sabre) * [Northstar](http://marvel.com/universe/Northstar) This list is not meant to be definitive, but rather an example to show that Quicksilver is not the sole speedster running around the Marvel universe.
The Flash is the most popular speedster. When you try to make a hero as or more popular then him, it's really hard to do. The Flash also is way to OP for Marvel to make something similar. With the power used correctly, the Flash pretty much has infinite power. DC has no use for another super hero speedster, it doesn't make sense. Another DC hero speedster wouldn't make it far at all.
12,669
In DC comics, speedsters play a pretty big part, with Flash being one of the better known heroes. Speedster powers are impressive and formidable, which is partly why Flash is such a prominent hero. Since Marvel has the equivalent of a speedster in Quicksilver, why is he not as prominent in the Marvel universe as Flash is in the DC universe?
2012/03/07
[ "https://scifi.stackexchange.com/questions/12669", "https://scifi.stackexchange.com", "https://scifi.stackexchange.com/users/4728/" ]
Marvel also tends to underpower their characters compared to DC. like Batman (big fan, favorite comic character) never being able to get hit because of years of training or Superman being completely and utterly indistructable. In comparison, Spiderman is pretty much "heightened body functions" with "spider sense" and wall-climbing or Cyclops who can only shoot optic blasts out of his eyes (I do not know too much about Cyclops).
I don't know about speedsters but as I see it marvel tries to be accurate to the premises of the hero powers in a world that apparently works like ours to some extent.Even if this is something too general,they try to at least make characters that make sense and the powers are tangible and measurable.Sure there are times when this does not apply and I call it bad writing,unless the omnipotent being fits to the stories.The little I know about dc though tells me a different story.Vague divine powers that contradict the plots,beings with limitless/vague/ potential that could end the plot in one or two frames,and too much iconic stuff.Too iconic to be sci fi or superheroing for me.And too wannabe serious to be purely surreal.
12,669
In DC comics, speedsters play a pretty big part, with Flash being one of the better known heroes. Speedster powers are impressive and formidable, which is partly why Flash is such a prominent hero. Since Marvel has the equivalent of a speedster in Quicksilver, why is he not as prominent in the Marvel universe as Flash is in the DC universe?
2012/03/07
[ "https://scifi.stackexchange.com/questions/12669", "https://scifi.stackexchange.com", "https://scifi.stackexchange.com/users/4728/" ]
Marvel also tends to underpower their characters compared to DC. like Batman (big fan, favorite comic character) never being able to get hit because of years of training or Superman being completely and utterly indistructable. In comparison, Spiderman is pretty much "heightened body functions" with "spider sense" and wall-climbing or Cyclops who can only shoot optic blasts out of his eyes (I do not know too much about Cyclops).
The Flash is the most popular speedster. When you try to make a hero as or more popular then him, it's really hard to do. The Flash also is way to OP for Marvel to make something similar. With the power used correctly, the Flash pretty much has infinite power. DC has no use for another super hero speedster, it doesn't make sense. Another DC hero speedster wouldn't make it far at all.
12,669
In DC comics, speedsters play a pretty big part, with Flash being one of the better known heroes. Speedster powers are impressive and formidable, which is partly why Flash is such a prominent hero. Since Marvel has the equivalent of a speedster in Quicksilver, why is he not as prominent in the Marvel universe as Flash is in the DC universe?
2012/03/07
[ "https://scifi.stackexchange.com/questions/12669", "https://scifi.stackexchange.com", "https://scifi.stackexchange.com/users/4728/" ]
The Flash is the most popular speedster. When you try to make a hero as or more popular then him, it's really hard to do. The Flash also is way to OP for Marvel to make something similar. With the power used correctly, the Flash pretty much has infinite power. DC has no use for another super hero speedster, it doesn't make sense. Another DC hero speedster wouldn't make it far at all.
I don't know about speedsters but as I see it marvel tries to be accurate to the premises of the hero powers in a world that apparently works like ours to some extent.Even if this is something too general,they try to at least make characters that make sense and the powers are tangible and measurable.Sure there are times when this does not apply and I call it bad writing,unless the omnipotent being fits to the stories.The little I know about dc though tells me a different story.Vague divine powers that contradict the plots,beings with limitless/vague/ potential that could end the plot in one or two frames,and too much iconic stuff.Too iconic to be sci fi or superheroing for me.And too wannabe serious to be purely surreal.
7,402,269
I have an existing EJB project set up in Eclipse Helios, and would like to slowly introduce Scala into the project. The Scala IDE has been installed successfully, and I'm able to create standalone scala project. The issue however comes when trying to use my existing project with scala additions. I've went as far as manually editing the .project, .classpath, and related files under .settings of the project's home directory for eclipse. However I still have the issue where the Java compiler tries to compiles .scala classes, which results in errors and ultimately not being able to build the project. Has anyone faced a similar scenario or are there any workarounds? Thanks in advance.
2011/09/13
[ "https://Stackoverflow.com/questions/7402269", "https://Stackoverflow.com", "https://Stackoverflow.com/users/321225/" ]
You should be able to right-click the project, go to "Scala" and click on "add scala nature". Then `.scala` files should be recognized as such. You might also have to add the scala library to your dependencies. Depending on whether this is a "simple" Eclipse project or you're using Maven there might be other steps required.
Right click on project, and choose **Configure**/Add Scala Nature.
9,764
I was keeping an eye on a friend's flight on [PlaneFinder](http://planefinder.net/). It was meant to be flying past my office, so I walked to the window to see (the airport is about a minute away when they pass, so it's pretty low). However it was about two minutes later that the plane went past. What gives? I can't see flight sites showing it in advance, but on the map it was showing it low over Richmond, Vancouver and inline with my building - it would be incredibly hard for me to mis-read the map, but I can't think of any other option.
2012/09/26
[ "https://travel.stackexchange.com/questions/9764", "https://travel.stackexchange.com", "https://travel.stackexchange.com/users/101/" ]
There's a service called [Flightradar24](http://www.flightradar24.com/how-it-works), and they have this to say in the description: > > In addition to ADS-B data, we also get data from the Federal Aviation Administration (FAA) in the United States. This data is based on radar data and includes all commercial air traffic in US and Canadian air space (i.e. not just planes with ADS-B transponders). Unlike the ADS-B data that is presented real-time, the FAA data is delayed by roughly 5 minutes due to FAA regulations. > > > [ADS-B](http://en.wikipedia.org/wiki/ADS-B) stands for *Automatic dependent surveillance-broadcast*, a GPS-based surveillance system that broadcasts a signal with plane's position in real time and can be intercepted by anyone with the necessary equipment. From the [PlaneFinder FAQ](http://planefinder.net/about/faqs/), they use the same ADS-B information that FlightRadar does, and I imagine every similar service under the sun. I assume the FAA is the only source of flight information in US and Canada, so similar applications would use the same database, and with the same delay.
The flight tracker websites actually have an incentive to not be exactly correct, and they argue that this is for security. The cynical mind would suggest it just gives them a bit of a cost saving when it comes to information polling, updates etc. Generally they will be within five minutes or so and reasonably accurate on flight paths (around here they seem to be within a few hundred feet)
9,764
I was keeping an eye on a friend's flight on [PlaneFinder](http://planefinder.net/). It was meant to be flying past my office, so I walked to the window to see (the airport is about a minute away when they pass, so it's pretty low). However it was about two minutes later that the plane went past. What gives? I can't see flight sites showing it in advance, but on the map it was showing it low over Richmond, Vancouver and inline with my building - it would be incredibly hard for me to mis-read the map, but I can't think of any other option.
2012/09/26
[ "https://travel.stackexchange.com/questions/9764", "https://travel.stackexchange.com", "https://travel.stackexchange.com/users/101/" ]
There's a service called [Flightradar24](http://www.flightradar24.com/how-it-works), and they have this to say in the description: > > In addition to ADS-B data, we also get data from the Federal Aviation Administration (FAA) in the United States. This data is based on radar data and includes all commercial air traffic in US and Canadian air space (i.e. not just planes with ADS-B transponders). Unlike the ADS-B data that is presented real-time, the FAA data is delayed by roughly 5 minutes due to FAA regulations. > > > [ADS-B](http://en.wikipedia.org/wiki/ADS-B) stands for *Automatic dependent surveillance-broadcast*, a GPS-based surveillance system that broadcasts a signal with plane's position in real time and can be intercepted by anyone with the necessary equipment. From the [PlaneFinder FAQ](http://planefinder.net/about/faqs/), they use the same ADS-B information that FlightRadar does, and I imagine every similar service under the sun. I assume the FAA is the only source of flight information in US and Canada, so similar applications would use the same database, and with the same delay.
I have this [iPad App](http://itunes.apple.com/be/app/flightradar24-pro/id382069612?mt=8) that lets you monitor live flights feed. One of the great features is that you point your iPad to a contrail and it tells you the details of that specific flight. As you can see on the example below there is some delay of seconds, probably caused by the internet feeds of the different information sources ![enter image description here](https://i.stack.imgur.com/MNOpr.jpg) I would consider that live though.I have only tried this app in Europe, but there the responses seems to be accurate.
9,764
I was keeping an eye on a friend's flight on [PlaneFinder](http://planefinder.net/). It was meant to be flying past my office, so I walked to the window to see (the airport is about a minute away when they pass, so it's pretty low). However it was about two minutes later that the plane went past. What gives? I can't see flight sites showing it in advance, but on the map it was showing it low over Richmond, Vancouver and inline with my building - it would be incredibly hard for me to mis-read the map, but I can't think of any other option.
2012/09/26
[ "https://travel.stackexchange.com/questions/9764", "https://travel.stackexchange.com", "https://travel.stackexchange.com/users/101/" ]
I have this [iPad App](http://itunes.apple.com/be/app/flightradar24-pro/id382069612?mt=8) that lets you monitor live flights feed. One of the great features is that you point your iPad to a contrail and it tells you the details of that specific flight. As you can see on the example below there is some delay of seconds, probably caused by the internet feeds of the different information sources ![enter image description here](https://i.stack.imgur.com/MNOpr.jpg) I would consider that live though.I have only tried this app in Europe, but there the responses seems to be accurate.
The flight tracker websites actually have an incentive to not be exactly correct, and they argue that this is for security. The cynical mind would suggest it just gives them a bit of a cost saving when it comes to information polling, updates etc. Generally they will be within five minutes or so and reasonably accurate on flight paths (around here they seem to be within a few hundred feet)
147,441
I am studying computer engineering and I really like computer architecture and digital design, whereas at the same time I also enjoy algorithms and programming so much (I know software engineering is much more than that). I am taking more credits in both software and hardware, but would that help if I want to have a job in both areas? I don't know if this is the right community to ask so sorry if this is the wrong place :)
2019/11/02
[ "https://workplace.stackexchange.com/questions/147441", "https://workplace.stackexchange.com", "https://workplace.stackexchange.com/users/111441/" ]
The skills you're trying to obtain are highly sought after in the Embedded and Wearable device fields. My undergraduate degree is in Computer Science, but I'm old enough to have learned about computers when a firm grasp on electronics was required. Today I work on industrial control systems doing embedded Linux development. A fair part of my work requires that I'm able to read schematic diagrams and implement software based on the physical hardware. It's not as glamorous as web development or "apps", but this is the kind of software which makes the real world work.
> > I am taking more credits in both software and hardware, but would that help if I want to have a job in both areas? > > > Of course it would, if nothing else it will give you actual knowledge in the fields.
147,441
I am studying computer engineering and I really like computer architecture and digital design, whereas at the same time I also enjoy algorithms and programming so much (I know software engineering is much more than that). I am taking more credits in both software and hardware, but would that help if I want to have a job in both areas? I don't know if this is the right community to ask so sorry if this is the wrong place :)
2019/11/02
[ "https://workplace.stackexchange.com/questions/147441", "https://workplace.stackexchange.com", "https://workplace.stackexchange.com/users/111441/" ]
> > I am taking more credits in both software and hardware, but would that help if I want to have a job in both areas? > > > Of course it would, if nothing else it will give you actual knowledge in the fields.
I'd recommend taking a look at Mechatronics Engineering. It's a multidisciplinary Engineering field that combines Computer, Control, Mechanical and Electrical Engineering and is highly sought after as far as multidisciplinary Engineering goes. Especially in Digital Engineering fields, there are numerous fields you can get into. These Engineers work with CPUs, microcontrollers, FPGAs, ASICs and SoC devices and usually end up in Aerospace/Defence, Oil, banking/finance and CPU/general-ASIC design industries. Its a massive sector that many people overlook. I'm more than slightly biased, because I'm a senior FPGA engineer specialising in SystemVerilog but in my opinion it is one of the best career choices for an Engineer and gives you numerous options to specialise post-degree.
147,441
I am studying computer engineering and I really like computer architecture and digital design, whereas at the same time I also enjoy algorithms and programming so much (I know software engineering is much more than that). I am taking more credits in both software and hardware, but would that help if I want to have a job in both areas? I don't know if this is the right community to ask so sorry if this is the wrong place :)
2019/11/02
[ "https://workplace.stackexchange.com/questions/147441", "https://workplace.stackexchange.com", "https://workplace.stackexchange.com/users/111441/" ]
The skills you're trying to obtain are highly sought after in the Embedded and Wearable device fields. My undergraduate degree is in Computer Science, but I'm old enough to have learned about computers when a firm grasp on electronics was required. Today I work on industrial control systems doing embedded Linux development. A fair part of my work requires that I'm able to read schematic diagrams and implement software based on the physical hardware. It's not as glamorous as web development or "apps", but this is the kind of software which makes the real world work.
I'd recommend taking a look at Mechatronics Engineering. It's a multidisciplinary Engineering field that combines Computer, Control, Mechanical and Electrical Engineering and is highly sought after as far as multidisciplinary Engineering goes. Especially in Digital Engineering fields, there are numerous fields you can get into. These Engineers work with CPUs, microcontrollers, FPGAs, ASICs and SoC devices and usually end up in Aerospace/Defence, Oil, banking/finance and CPU/general-ASIC design industries. Its a massive sector that many people overlook. I'm more than slightly biased, because I'm a senior FPGA engineer specialising in SystemVerilog but in my opinion it is one of the best career choices for an Engineer and gives you numerous options to specialise post-degree.
4,315,359
I must create a web site optimised for mobile devices, can I use html5 and css3? What are the main limitations? Which devices are compatible? (IOS, Android...) Regards
2010/11/30
[ "https://Stackoverflow.com/questions/4315359", "https://Stackoverflow.com", "https://Stackoverflow.com/users/454998/" ]
You can, with some limitations. Basically you'd better use some "pre-cooked" framework like Senche Touch or jQuery Mobile. Simple answer: the best support for HTML5 in mobile phones is given by iOS and Android browsers.
Yes you can! and about compatibity... it depends on the browser... the new versions of safari that run on the iOs 4++ support html 5...
4,315,359
I must create a web site optimised for mobile devices, can I use html5 and css3? What are the main limitations? Which devices are compatible? (IOS, Android...) Regards
2010/11/30
[ "https://Stackoverflow.com/questions/4315359", "https://Stackoverflow.com", "https://Stackoverflow.com/users/454998/" ]
Yes - to a degree. The website <http://caniuse.com/> details HTML5 availability for the following browsers: * iOS Safari * Opera Mini * Opera Mobile * Android Browser
Yes you can! and about compatibity... it depends on the browser... the new versions of safari that run on the iOs 4++ support html 5...
4,315,359
I must create a web site optimised for mobile devices, can I use html5 and css3? What are the main limitations? Which devices are compatible? (IOS, Android...) Regards
2010/11/30
[ "https://Stackoverflow.com/questions/4315359", "https://Stackoverflow.com", "https://Stackoverflow.com/users/454998/" ]
You can, with some limitations. Basically you'd better use some "pre-cooked" framework like Senche Touch or jQuery Mobile. Simple answer: the best support for HTML5 in mobile phones is given by iOS and Android browsers.
Back in April, [sources announced](http://www.gsmarena.com/lg_gd880_mini_launched_packs_html5compatible_web_browser-news-1560.php) that LG would be the first company to launch an HTML5 compatible browser. Where this was over 6 months ago, I haven't been able to find any other sources that woukd indicate whether any phone browsers would support it. The best thing to do would to point your mobile device ([or emulate one](http://www.klauskomenda.com/archives/2008/03/17/testing-on-mobile-devices-using-emulators/)) to a [site made with HTML5](http://html5gallery.com/2010/11/for-the-record/). --- After a little more research I found this quote from the [apple.com](http://www.apple.com/html5/) site. > > *"Every new Apple mobile device and every new Mac — along with the latest version of Apple’s >Safari web browser — supports web standards including HTML5, CSS3, and JavaScript."* > > > --- Also for Android, [check this page](http://developer.android.com/sdk/android-2.0-highlights.html).
4,315,359
I must create a web site optimised for mobile devices, can I use html5 and css3? What are the main limitations? Which devices are compatible? (IOS, Android...) Regards
2010/11/30
[ "https://Stackoverflow.com/questions/4315359", "https://Stackoverflow.com", "https://Stackoverflow.com/users/454998/" ]
Yes - to a degree. The website <http://caniuse.com/> details HTML5 availability for the following browsers: * iOS Safari * Opera Mini * Opera Mobile * Android Browser
Back in April, [sources announced](http://www.gsmarena.com/lg_gd880_mini_launched_packs_html5compatible_web_browser-news-1560.php) that LG would be the first company to launch an HTML5 compatible browser. Where this was over 6 months ago, I haven't been able to find any other sources that woukd indicate whether any phone browsers would support it. The best thing to do would to point your mobile device ([or emulate one](http://www.klauskomenda.com/archives/2008/03/17/testing-on-mobile-devices-using-emulators/)) to a [site made with HTML5](http://html5gallery.com/2010/11/for-the-record/). --- After a little more research I found this quote from the [apple.com](http://www.apple.com/html5/) site. > > *"Every new Apple mobile device and every new Mac — along with the latest version of Apple’s >Safari web browser — supports web standards including HTML5, CSS3, and JavaScript."* > > > --- Also for Android, [check this page](http://developer.android.com/sdk/android-2.0-highlights.html).
4,315,359
I must create a web site optimised for mobile devices, can I use html5 and css3? What are the main limitations? Which devices are compatible? (IOS, Android...) Regards
2010/11/30
[ "https://Stackoverflow.com/questions/4315359", "https://Stackoverflow.com", "https://Stackoverflow.com/users/454998/" ]
You can, with some limitations. Basically you'd better use some "pre-cooked" framework like Senche Touch or jQuery Mobile. Simple answer: the best support for HTML5 in mobile phones is given by iOS and Android browsers.
iOS and Android will both support HTML5 and CSS3 (and well). You'll run into some problems with windows mobile (which runs a modified version of ie7)
4,315,359
I must create a web site optimised for mobile devices, can I use html5 and css3? What are the main limitations? Which devices are compatible? (IOS, Android...) Regards
2010/11/30
[ "https://Stackoverflow.com/questions/4315359", "https://Stackoverflow.com", "https://Stackoverflow.com/users/454998/" ]
Yes - to a degree. The website <http://caniuse.com/> details HTML5 availability for the following browsers: * iOS Safari * Opera Mini * Opera Mobile * Android Browser
iOS and Android will both support HTML5 and CSS3 (and well). You'll run into some problems with windows mobile (which runs a modified version of ie7)
4,315,359
I must create a web site optimised for mobile devices, can I use html5 and css3? What are the main limitations? Which devices are compatible? (IOS, Android...) Regards
2010/11/30
[ "https://Stackoverflow.com/questions/4315359", "https://Stackoverflow.com", "https://Stackoverflow.com/users/454998/" ]
Yes - to a degree. The website <http://caniuse.com/> details HTML5 availability for the following browsers: * iOS Safari * Opera Mini * Opera Mobile * Android Browser
You can, with some limitations. Basically you'd better use some "pre-cooked" framework like Senche Touch or jQuery Mobile. Simple answer: the best support for HTML5 in mobile phones is given by iOS and Android browsers.
5,729
I am working on building a headboard with a 10" wide panel that attaches to a curved leg. I am concerned that the panel will be restricted from moving due to the curve of the leg or create a gap between the leg and the panel. Does anyone have any suggestions on how to attach them panel to the leg? I would like to keep this as solid wood, if possible. I have attached a simplified drawing. [![enter image description here](https://i.stack.imgur.com/S0bzn.png)](https://i.stack.imgur.com/S0bzn.png)
2017/03/23
[ "https://woodworking.stackexchange.com/questions/5729", "https://woodworking.stackexchange.com", "https://woodworking.stackexchange.com/users/3489/" ]
You can do it if make that panel veneer on a plywood substrate - then you can glue it into a dado, or use some kind of fasteners, or biscuits. Laying up panels is a skill you will not be sorry you learned. You have nothing holding the curved vertical members together except the panel. As far as I can see - I could be wrong. If you are going to stabilize your design using A solid wood panel, it will more than likely crack, because you will have to lock that panel in in order to achieve the rigidity you need for the headboard. I hate to say it, because I think I can see you are going for something minimal, but this design wants upper and lower stretchers if you need to use solid lumber. Good luck!
The "leg" (10" wide, headboard, I have to assume there are multiple "legs") is curved. Simplify your life on the panels and cut the slots in the legs "straight" and deep; making the panels either a trapezoid or a rectangle. Then borrow a standard trick from frame and panel and insert a couple of rubber balls in each slot, which help to keep the panel centered as it shrinks and swells. Make the panel sufficiently wide (and the slots sufficiently deep, plus a bit) that any expected shrinkage will not cause a gap. **Edit:** (*Grain was vertical in early comments, has now changed to horizontal*) So, now that you've changed your mind on the grain direction, make the slots longer than the panel and glue and/or pin only the center of the panel, so that movement is possible without damage.
5,729
I am working on building a headboard with a 10" wide panel that attaches to a curved leg. I am concerned that the panel will be restricted from moving due to the curve of the leg or create a gap between the leg and the panel. Does anyone have any suggestions on how to attach them panel to the leg? I would like to keep this as solid wood, if possible. I have attached a simplified drawing. [![enter image description here](https://i.stack.imgur.com/S0bzn.png)](https://i.stack.imgur.com/S0bzn.png)
2017/03/23
[ "https://woodworking.stackexchange.com/questions/5729", "https://woodworking.stackexchange.com", "https://woodworking.stackexchange.com/users/3489/" ]
You can do it if make that panel veneer on a plywood substrate - then you can glue it into a dado, or use some kind of fasteners, or biscuits. Laying up panels is a skill you will not be sorry you learned. You have nothing holding the curved vertical members together except the panel. As far as I can see - I could be wrong. If you are going to stabilize your design using A solid wood panel, it will more than likely crack, because you will have to lock that panel in in order to achieve the rigidity you need for the headboard. I hate to say it, because I think I can see you are going for something minimal, but this design wants upper and lower stretchers if you need to use solid lumber. Good luck!
Per your most recent comment, the center panel grain runs horizontal. In that case there will not be any horizontal expansion to consider and the legs will maintain the same positions relative to the top cross beam that connects this leg with one on the other side of the headboard. The panel will expand and contract vertically and the amount of movement can be calculated (see the "wood-movement" tag wiki for links to calculators). You can easily absorb and conceal that movement by providing shoulders on the panel's tenons stopping the tenon short of the end by 1/2" to 3/4" from the end. Make the dado it fits in longer than the tenon to allow expansion of the panel. The dado should stop short of the end of the shoulder to insure that the shoulder always covers the dado. Finally, glue the panel to the legs only at the center so that the expansion (up and down) in the leg dados can occur.
5,729
I am working on building a headboard with a 10" wide panel that attaches to a curved leg. I am concerned that the panel will be restricted from moving due to the curve of the leg or create a gap between the leg and the panel. Does anyone have any suggestions on how to attach them panel to the leg? I would like to keep this as solid wood, if possible. I have attached a simplified drawing. [![enter image description here](https://i.stack.imgur.com/S0bzn.png)](https://i.stack.imgur.com/S0bzn.png)
2017/03/23
[ "https://woodworking.stackexchange.com/questions/5729", "https://woodworking.stackexchange.com", "https://woodworking.stackexchange.com/users/3489/" ]
If the central panel is solid wood and the grain orientation is vertical as you indicate in the Comments expansion will be side to side, not up and down, so there's no real issue with the attachment of the legs to it. There will be a potential issue between the assembled headboard and anything you want to fix it to (because it will change width during the year) but that's a subject for another Question. You can of course minimise seasonal movement by selecting quarter-sawn wood for the central panel. As I touch on in [this previous Answer](https://woodworking.stackexchange.com/questions/3441/what-is-the-maximum-width-for-a-full-cross-grain-glue-up/3533#3533) the expansion of QS wood can be significantly lower than for a flat-sawn piece of the same species. I know you indicate that you would prefer to use solid wood throughout but if the central panel is made from plywood or another board material you'll have no issues with movement to concern you.
The "leg" (10" wide, headboard, I have to assume there are multiple "legs") is curved. Simplify your life on the panels and cut the slots in the legs "straight" and deep; making the panels either a trapezoid or a rectangle. Then borrow a standard trick from frame and panel and insert a couple of rubber balls in each slot, which help to keep the panel centered as it shrinks and swells. Make the panel sufficiently wide (and the slots sufficiently deep, plus a bit) that any expected shrinkage will not cause a gap. **Edit:** (*Grain was vertical in early comments, has now changed to horizontal*) So, now that you've changed your mind on the grain direction, make the slots longer than the panel and glue and/or pin only the center of the panel, so that movement is possible without damage.
5,729
I am working on building a headboard with a 10" wide panel that attaches to a curved leg. I am concerned that the panel will be restricted from moving due to the curve of the leg or create a gap between the leg and the panel. Does anyone have any suggestions on how to attach them panel to the leg? I would like to keep this as solid wood, if possible. I have attached a simplified drawing. [![enter image description here](https://i.stack.imgur.com/S0bzn.png)](https://i.stack.imgur.com/S0bzn.png)
2017/03/23
[ "https://woodworking.stackexchange.com/questions/5729", "https://woodworking.stackexchange.com", "https://woodworking.stackexchange.com/users/3489/" ]
If the central panel is solid wood and the grain orientation is vertical as you indicate in the Comments expansion will be side to side, not up and down, so there's no real issue with the attachment of the legs to it. There will be a potential issue between the assembled headboard and anything you want to fix it to (because it will change width during the year) but that's a subject for another Question. You can of course minimise seasonal movement by selecting quarter-sawn wood for the central panel. As I touch on in [this previous Answer](https://woodworking.stackexchange.com/questions/3441/what-is-the-maximum-width-for-a-full-cross-grain-glue-up/3533#3533) the expansion of QS wood can be significantly lower than for a flat-sawn piece of the same species. I know you indicate that you would prefer to use solid wood throughout but if the central panel is made from plywood or another board material you'll have no issues with movement to concern you.
Per your most recent comment, the center panel grain runs horizontal. In that case there will not be any horizontal expansion to consider and the legs will maintain the same positions relative to the top cross beam that connects this leg with one on the other side of the headboard. The panel will expand and contract vertically and the amount of movement can be calculated (see the "wood-movement" tag wiki for links to calculators). You can easily absorb and conceal that movement by providing shoulders on the panel's tenons stopping the tenon short of the end by 1/2" to 3/4" from the end. Make the dado it fits in longer than the tenon to allow expansion of the panel. The dado should stop short of the end of the shoulder to insure that the shoulder always covers the dado. Finally, glue the panel to the legs only at the center so that the expansion (up and down) in the leg dados can occur.
3,875,521
I have deployed and then redeployed a .wsp on a Sharepoint 2010 server (the solution was developed on another 2010 server). The solution contains 2 web parts. After retracting and removing the old solution, I added and deployed the same solution again, with no errors. Afterwards, I deactivated and reactivated the feature installed through my .wsp file. The problem is that whenever I try to add one of those 2 web parts to a page, I get an error saying "The operation could not be completed because the item was removed from the gallery". Do you have any ideea what's happening? Anu help is greatly appreciated!
2010/10/06
[ "https://Stackoverflow.com/questions/3875521", "https://Stackoverflow.com", "https://Stackoverflow.com/users/468299/" ]
Usually this happens if the web part gets orphaned in the web part gallery. Try Deactivating your solution and Retract and Uninstall your wsp. Then check the Web Part Gallery for the site collection. If you still see your web parts there then manually delete them. Then you can Add and Deploy your wsp and activate your solution. The web parts should then be available in the web part gallery and be able to be added to your pages.
I came across a more simple solution which worked well for me. Go to the webparts gallery at *Site Settings/Galleries/Web parts* and delete problematic webpart entry. Then deactivate and reactivate the wsp which contains that webpart and everything should work fine. No need for redeployment or uninstalling. [Source](https://kmukesh.wordpress.com/2012/03/09/the-operation-could-not-be-completed-because-item-was-removed-from-the-gallery/)
3,875,521
I have deployed and then redeployed a .wsp on a Sharepoint 2010 server (the solution was developed on another 2010 server). The solution contains 2 web parts. After retracting and removing the old solution, I added and deployed the same solution again, with no errors. Afterwards, I deactivated and reactivated the feature installed through my .wsp file. The problem is that whenever I try to add one of those 2 web parts to a page, I get an error saying "The operation could not be completed because the item was removed from the gallery". Do you have any ideea what's happening? Anu help is greatly appreciated!
2010/10/06
[ "https://Stackoverflow.com/questions/3875521", "https://Stackoverflow.com", "https://Stackoverflow.com/users/468299/" ]
Usually this happens if the web part gets orphaned in the web part gallery. Try Deactivating your solution and Retract and Uninstall your wsp. Then check the Web Part Gallery for the site collection. If you still see your web parts there then manually delete them. Then you can Add and Deploy your wsp and activate your solution. The web parts should then be available in the web part gallery and be able to be added to your pages.
I have the same issue, but in my case after a thorough search in web part gallery found out that some web parts having the same name, but without assembly's prefix have created. The solution is just to sort the web parts with the date and you'll get the new web parts. Some times it happens that every thing is same as before, but SharePoint forgets the settings which are placed in webpart.xml file
3,875,521
I have deployed and then redeployed a .wsp on a Sharepoint 2010 server (the solution was developed on another 2010 server). The solution contains 2 web parts. After retracting and removing the old solution, I added and deployed the same solution again, with no errors. Afterwards, I deactivated and reactivated the feature installed through my .wsp file. The problem is that whenever I try to add one of those 2 web parts to a page, I get an error saying "The operation could not be completed because the item was removed from the gallery". Do you have any ideea what's happening? Anu help is greatly appreciated!
2010/10/06
[ "https://Stackoverflow.com/questions/3875521", "https://Stackoverflow.com", "https://Stackoverflow.com/users/468299/" ]
I came across a more simple solution which worked well for me. Go to the webparts gallery at *Site Settings/Galleries/Web parts* and delete problematic webpart entry. Then deactivate and reactivate the wsp which contains that webpart and everything should work fine. No need for redeployment or uninstalling. [Source](https://kmukesh.wordpress.com/2012/03/09/the-operation-could-not-be-completed-because-item-was-removed-from-the-gallery/)
I have the same issue, but in my case after a thorough search in web part gallery found out that some web parts having the same name, but without assembly's prefix have created. The solution is just to sort the web parts with the date and you'll get the new web parts. Some times it happens that every thing is same as before, but SharePoint forgets the settings which are placed in webpart.xml file
3,552
As far as I understand, [Monty Python Fluxx](http://wunderland.com/LooneyLabs/Fluxx/MontyPython/index.html) is a separate game, not an expansion pack, that doesn't *require* the original Fluxx deck to play. But *can* it be used with the original deck - can it be used to supplement the original cards, or does it not work like that? (This related question [What are the differences between the Fluxx games?](https://boardgames.stackexchange.com/questions/2373/what-are-the-differences-between-the-fluxx-games) didn't quite answer my question.)
2011/05/27
[ "https://boardgames.stackexchange.com/questions/3552", "https://boardgames.stackexchange.com", "https://boardgames.stackexchange.com/users/1312/" ]
You certainly can just shuffle the decks together, try to play a game with them, and see what happens. The core rules of Fluxx are always pretty much the same, after all. However, everything I've heard from people who've tried something like this suggests that, for maximum enjoyment, you'll probably want to start removing cards that don't work well in the combined game; or adding your own homebrew cards that *will* work well in the new game. I'm not very familiar with Monty Python Fluxx, but I've played a bit of Zombie Fluxx - and it's pretty well optimised on its own. I *could* add my basic Fluxx game into the mix, but then the zombie theme would be much diluted. It would be much harder to assemble a critical mass of zombie cards to achieve one of the zombie Goals - or indeed the non-zombie cards required for a base set goal. But in the end Fluxx is a game that it's best not too take *too* seriously. If all you're after is a nice long, random game with the possibility of unexpected interactions between cards from different sets, then I don't see why you wouldn't want to at least give a mega-game using cards from multiple expansions a try!
You can definitely use multiple Fluxx decks together, but it will slow the game down - different games use different Keepers, so it will take longer for players to get the right combinations together to meet Goals.
3,552
As far as I understand, [Monty Python Fluxx](http://wunderland.com/LooneyLabs/Fluxx/MontyPython/index.html) is a separate game, not an expansion pack, that doesn't *require* the original Fluxx deck to play. But *can* it be used with the original deck - can it be used to supplement the original cards, or does it not work like that? (This related question [What are the differences between the Fluxx games?](https://boardgames.stackexchange.com/questions/2373/what-are-the-differences-between-the-fluxx-games) didn't quite answer my question.)
2011/05/27
[ "https://boardgames.stackexchange.com/questions/3552", "https://boardgames.stackexchange.com", "https://boardgames.stackexchange.com/users/1312/" ]
You certainly can just shuffle the decks together, try to play a game with them, and see what happens. The core rules of Fluxx are always pretty much the same, after all. However, everything I've heard from people who've tried something like this suggests that, for maximum enjoyment, you'll probably want to start removing cards that don't work well in the combined game; or adding your own homebrew cards that *will* work well in the new game. I'm not very familiar with Monty Python Fluxx, but I've played a bit of Zombie Fluxx - and it's pretty well optimised on its own. I *could* add my basic Fluxx game into the mix, but then the zombie theme would be much diluted. It would be much harder to assemble a critical mass of zombie cards to achieve one of the zombie Goals - or indeed the non-zombie cards required for a base set goal. But in the end Fluxx is a game that it's best not too take *too* seriously. If all you're after is a nice long, random game with the possibility of unexpected interactions between cards from different sets, then I don't see why you wouldn't want to at least give a mega-game using cards from multiple expansions a try!
**Can? Yes.** **Should? No.** The only Fluxx sets with significant goal & keeper overlap are Fluxx and Family Fluxx; certain keepers are duplicated. Those two can be mixed, and mixing those two isn't a clear "Should not"... but the others, they definitely fall into "should not." Such mixing definitely lengthens the game, as needed keepers are harder to acquire. It also reduces the skill factor and increases the luck factor of victory. If, however, you simply want to mix the new rule cards and action cards, playing with only one set's goals and keepers, that does work somewhat better. It still potentially lengthens the game. (See note.) --- Note: I say potentially, as the shortest game I've ever played was a combined Fluxx/Family Fluxx game. First goal was runny chocolate, I had sun and several other keepers, and the 1st player played "Play all"... and played a chocolate. I drew, got "Steal a keeper", stole his chocolate, and played my sun, thus filling the goal, and winning, 2 minutes into the game.
3,552
As far as I understand, [Monty Python Fluxx](http://wunderland.com/LooneyLabs/Fluxx/MontyPython/index.html) is a separate game, not an expansion pack, that doesn't *require* the original Fluxx deck to play. But *can* it be used with the original deck - can it be used to supplement the original cards, or does it not work like that? (This related question [What are the differences between the Fluxx games?](https://boardgames.stackexchange.com/questions/2373/what-are-the-differences-between-the-fluxx-games) didn't quite answer my question.)
2011/05/27
[ "https://boardgames.stackexchange.com/questions/3552", "https://boardgames.stackexchange.com", "https://boardgames.stackexchange.com/users/1312/" ]
You certainly can just shuffle the decks together, try to play a game with them, and see what happens. The core rules of Fluxx are always pretty much the same, after all. However, everything I've heard from people who've tried something like this suggests that, for maximum enjoyment, you'll probably want to start removing cards that don't work well in the combined game; or adding your own homebrew cards that *will* work well in the new game. I'm not very familiar with Monty Python Fluxx, but I've played a bit of Zombie Fluxx - and it's pretty well optimised on its own. I *could* add my basic Fluxx game into the mix, but then the zombie theme would be much diluted. It would be much harder to assemble a critical mass of zombie cards to achieve one of the zombie Goals - or indeed the non-zombie cards required for a base set goal. But in the end Fluxx is a game that it's best not too take *too* seriously. If all you're after is a nice long, random game with the possibility of unexpected interactions between cards from different sets, then I don't see why you wouldn't want to at least give a mega-game using cards from multiple expansions a try!
Yes, with houserules -------------------- The biggest problem with combining Fluxx sets is that it's more difficult to achieve goals. Most versions of Fluxx have 100 cards, and a particular goal usually requires 2 Keepers (so there are 97 cards that are not relevant to the goal). If you add another 100 cards, now 197 cards are not relevant to that goal. To try to mitigate this, our group has implemented the following houserules, and been pretty happy with the results: * The number of starting cards is 3 + the number of additional sets. * The number of Goals allowed in play are 1 + the number of additional sets. Players win if they match the criteria for any Goal. "Double Agenda" cards that allow two Goals are now treated as "+1 Goal Limit" cards. If this Goal Limit is reached, new Goals can replace any Goals currently in play. We have found that this works reasonably well even with sets like Monty Python Fluxx and prevents a combined game from slogging.
3,552
As far as I understand, [Monty Python Fluxx](http://wunderland.com/LooneyLabs/Fluxx/MontyPython/index.html) is a separate game, not an expansion pack, that doesn't *require* the original Fluxx deck to play. But *can* it be used with the original deck - can it be used to supplement the original cards, or does it not work like that? (This related question [What are the differences between the Fluxx games?](https://boardgames.stackexchange.com/questions/2373/what-are-the-differences-between-the-fluxx-games) didn't quite answer my question.)
2011/05/27
[ "https://boardgames.stackexchange.com/questions/3552", "https://boardgames.stackexchange.com", "https://boardgames.stackexchange.com/users/1312/" ]
**Can? Yes.** **Should? No.** The only Fluxx sets with significant goal & keeper overlap are Fluxx and Family Fluxx; certain keepers are duplicated. Those two can be mixed, and mixing those two isn't a clear "Should not"... but the others, they definitely fall into "should not." Such mixing definitely lengthens the game, as needed keepers are harder to acquire. It also reduces the skill factor and increases the luck factor of victory. If, however, you simply want to mix the new rule cards and action cards, playing with only one set's goals and keepers, that does work somewhat better. It still potentially lengthens the game. (See note.) --- Note: I say potentially, as the shortest game I've ever played was a combined Fluxx/Family Fluxx game. First goal was runny chocolate, I had sun and several other keepers, and the 1st player played "Play all"... and played a chocolate. I drew, got "Steal a keeper", stole his chocolate, and played my sun, thus filling the goal, and winning, 2 minutes into the game.
You can definitely use multiple Fluxx decks together, but it will slow the game down - different games use different Keepers, so it will take longer for players to get the right combinations together to meet Goals.
3,552
As far as I understand, [Monty Python Fluxx](http://wunderland.com/LooneyLabs/Fluxx/MontyPython/index.html) is a separate game, not an expansion pack, that doesn't *require* the original Fluxx deck to play. But *can* it be used with the original deck - can it be used to supplement the original cards, or does it not work like that? (This related question [What are the differences between the Fluxx games?](https://boardgames.stackexchange.com/questions/2373/what-are-the-differences-between-the-fluxx-games) didn't quite answer my question.)
2011/05/27
[ "https://boardgames.stackexchange.com/questions/3552", "https://boardgames.stackexchange.com", "https://boardgames.stackexchange.com/users/1312/" ]
You can definitely use multiple Fluxx decks together, but it will slow the game down - different games use different Keepers, so it will take longer for players to get the right combinations together to meet Goals.
Yes, with houserules -------------------- The biggest problem with combining Fluxx sets is that it's more difficult to achieve goals. Most versions of Fluxx have 100 cards, and a particular goal usually requires 2 Keepers (so there are 97 cards that are not relevant to the goal). If you add another 100 cards, now 197 cards are not relevant to that goal. To try to mitigate this, our group has implemented the following houserules, and been pretty happy with the results: * The number of starting cards is 3 + the number of additional sets. * The number of Goals allowed in play are 1 + the number of additional sets. Players win if they match the criteria for any Goal. "Double Agenda" cards that allow two Goals are now treated as "+1 Goal Limit" cards. If this Goal Limit is reached, new Goals can replace any Goals currently in play. We have found that this works reasonably well even with sets like Monty Python Fluxx and prevents a combined game from slogging.
3,552
As far as I understand, [Monty Python Fluxx](http://wunderland.com/LooneyLabs/Fluxx/MontyPython/index.html) is a separate game, not an expansion pack, that doesn't *require* the original Fluxx deck to play. But *can* it be used with the original deck - can it be used to supplement the original cards, or does it not work like that? (This related question [What are the differences between the Fluxx games?](https://boardgames.stackexchange.com/questions/2373/what-are-the-differences-between-the-fluxx-games) didn't quite answer my question.)
2011/05/27
[ "https://boardgames.stackexchange.com/questions/3552", "https://boardgames.stackexchange.com", "https://boardgames.stackexchange.com/users/1312/" ]
**Can? Yes.** **Should? No.** The only Fluxx sets with significant goal & keeper overlap are Fluxx and Family Fluxx; certain keepers are duplicated. Those two can be mixed, and mixing those two isn't a clear "Should not"... but the others, they definitely fall into "should not." Such mixing definitely lengthens the game, as needed keepers are harder to acquire. It also reduces the skill factor and increases the luck factor of victory. If, however, you simply want to mix the new rule cards and action cards, playing with only one set's goals and keepers, that does work somewhat better. It still potentially lengthens the game. (See note.) --- Note: I say potentially, as the shortest game I've ever played was a combined Fluxx/Family Fluxx game. First goal was runny chocolate, I had sun and several other keepers, and the 1st player played "Play all"... and played a chocolate. I drew, got "Steal a keeper", stole his chocolate, and played my sun, thus filling the goal, and winning, 2 minutes into the game.
Yes, with houserules -------------------- The biggest problem with combining Fluxx sets is that it's more difficult to achieve goals. Most versions of Fluxx have 100 cards, and a particular goal usually requires 2 Keepers (so there are 97 cards that are not relevant to the goal). If you add another 100 cards, now 197 cards are not relevant to that goal. To try to mitigate this, our group has implemented the following houserules, and been pretty happy with the results: * The number of starting cards is 3 + the number of additional sets. * The number of Goals allowed in play are 1 + the number of additional sets. Players win if they match the criteria for any Goal. "Double Agenda" cards that allow two Goals are now treated as "+1 Goal Limit" cards. If this Goal Limit is reached, new Goals can replace any Goals currently in play. We have found that this works reasonably well even with sets like Monty Python Fluxx and prevents a combined game from slogging.
201,857
I am searching for good books and articles about TCP/IP, mainly the security aspects of TCP/IP protocols. I have TCP/IP Illustrated and the TCP Guide, but they kinda lack on description of 'classic' attacks and how the internals of protocols relate to those attacks. PS: Seeing the first real answer made me remember to add that this is strictly for studying purposes, I have no intention of going black hat at this point, I am just preparing for job interviews :)
2010/11/15
[ "https://serverfault.com/questions/201857", "https://serverfault.com", "https://serverfault.com/users/48752/" ]
Unfortunately I don't know of many references that talk about attacks in terms of how they interact with the protocol stack. I'd imagine following mailing lists like [Bugtraq](http://www.securityfocus.com/) will keep you on top of current vulnerabilities, but it sounds like you're looking for more of a primer. I've been told that [Hacking Exposed](http://www.amazon.co.uk/Hacking-Exposed-Sixth-Security-Solutions/dp/0071613749/) is a good general reference for those interested in learning about attack vectors; it's on my reading list, but I haven't got around to it yet. [Building Internet Firewalls](http://www.amazon.co.uk/Building-Internet-Firewalls/dp/B0043EWUPM/), though fairly old, still offers an excellent overview of how to think about security when designing your network.
There are a number of online resources - as nutty as it sounds setup a secondary PC - or use a vps and then browse a large number of the hacking websites on the web. BlackHat conferences while a bit expensive, will teach you a large amount about TCP/IP... Architecturally here are few things I can tell you regarding TCP/IP * Since TCP/IP identifies parties by addresses hacker's attempt to spoof addresses * Address resolution within TCP/IP, DNS and ARP are not authenticated * You can easily masquerade as some other person or node * ARP spoofing circumvents switches.... Some TCP/IP Explolits include: * MAC Layer (ethernet) TCP/IP exploits * TCP Session hijacking * TCP Session application peeking/viewing * TCP Password Monitoring * Various Back channels * DOS: * Packet Generation Attacks & Relays These few things should help you get started in google searches ... I can post more on each - however truth to be told... I would rather not Teach Hacking in a public community
201,857
I am searching for good books and articles about TCP/IP, mainly the security aspects of TCP/IP protocols. I have TCP/IP Illustrated and the TCP Guide, but they kinda lack on description of 'classic' attacks and how the internals of protocols relate to those attacks. PS: Seeing the first real answer made me remember to add that this is strictly for studying purposes, I have no intention of going black hat at this point, I am just preparing for job interviews :)
2010/11/15
[ "https://serverfault.com/questions/201857", "https://serverfault.com", "https://serverfault.com/users/48752/" ]
I really prefer this book: [http://www.amazon.com/Network-Security-Architectures-Sean-Convery/dp/158705115X](http://rads.stackoverflow.com/amzn/click/158705115X) It is very detailed. Some (good and free) white paper on secure design is available here: <http://cisco.com/go/safe>
There are a number of online resources - as nutty as it sounds setup a secondary PC - or use a vps and then browse a large number of the hacking websites on the web. BlackHat conferences while a bit expensive, will teach you a large amount about TCP/IP... Architecturally here are few things I can tell you regarding TCP/IP * Since TCP/IP identifies parties by addresses hacker's attempt to spoof addresses * Address resolution within TCP/IP, DNS and ARP are not authenticated * You can easily masquerade as some other person or node * ARP spoofing circumvents switches.... Some TCP/IP Explolits include: * MAC Layer (ethernet) TCP/IP exploits * TCP Session hijacking * TCP Session application peeking/viewing * TCP Password Monitoring * Various Back channels * DOS: * Packet Generation Attacks & Relays These few things should help you get started in google searches ... I can post more on each - however truth to be told... I would rather not Teach Hacking in a public community
201,857
I am searching for good books and articles about TCP/IP, mainly the security aspects of TCP/IP protocols. I have TCP/IP Illustrated and the TCP Guide, but they kinda lack on description of 'classic' attacks and how the internals of protocols relate to those attacks. PS: Seeing the first real answer made me remember to add that this is strictly for studying purposes, I have no intention of going black hat at this point, I am just preparing for job interviews :)
2010/11/15
[ "https://serverfault.com/questions/201857", "https://serverfault.com", "https://serverfault.com/users/48752/" ]
I really prefer this book: [http://www.amazon.com/Network-Security-Architectures-Sean-Convery/dp/158705115X](http://rads.stackoverflow.com/amzn/click/158705115X) It is very detailed. Some (good and free) white paper on secure design is available here: <http://cisco.com/go/safe>
Unfortunately I don't know of many references that talk about attacks in terms of how they interact with the protocol stack. I'd imagine following mailing lists like [Bugtraq](http://www.securityfocus.com/) will keep you on top of current vulnerabilities, but it sounds like you're looking for more of a primer. I've been told that [Hacking Exposed](http://www.amazon.co.uk/Hacking-Exposed-Sixth-Security-Solutions/dp/0071613749/) is a good general reference for those interested in learning about attack vectors; it's on my reading list, but I haven't got around to it yet. [Building Internet Firewalls](http://www.amazon.co.uk/Building-Internet-Firewalls/dp/B0043EWUPM/), though fairly old, still offers an excellent overview of how to think about security when designing your network.
201,857
I am searching for good books and articles about TCP/IP, mainly the security aspects of TCP/IP protocols. I have TCP/IP Illustrated and the TCP Guide, but they kinda lack on description of 'classic' attacks and how the internals of protocols relate to those attacks. PS: Seeing the first real answer made me remember to add that this is strictly for studying purposes, I have no intention of going black hat at this point, I am just preparing for job interviews :)
2010/11/15
[ "https://serverfault.com/questions/201857", "https://serverfault.com", "https://serverfault.com/users/48752/" ]
I good (and free) resource from Cisco can be found here: [ISP Security Issues in ISP Security Issues in today’s Internet](ftp://ftp-eng.cisco.com/cons/isp/documents/Hoover-Security.pdf) There is also the complete text to [IOS Essentials](ftp://ftp-eng.cisco.com/cons/isp/documents/IOSEssentialsPDF.zip) in PDF format from Cisco Press along with several other documents available in the same FTP directory if you are interested in some best practices for Cisco gear. Both of these documents are from 2002. Another good resource would be the [Nmap Network Scanning](http://nmap.org/book/) book by Gordon “Fyodor” Lyon. If you understand how nmap does its thing, you will gain a much deeper understanding of networking and security.
There are a number of online resources - as nutty as it sounds setup a secondary PC - or use a vps and then browse a large number of the hacking websites on the web. BlackHat conferences while a bit expensive, will teach you a large amount about TCP/IP... Architecturally here are few things I can tell you regarding TCP/IP * Since TCP/IP identifies parties by addresses hacker's attempt to spoof addresses * Address resolution within TCP/IP, DNS and ARP are not authenticated * You can easily masquerade as some other person or node * ARP spoofing circumvents switches.... Some TCP/IP Explolits include: * MAC Layer (ethernet) TCP/IP exploits * TCP Session hijacking * TCP Session application peeking/viewing * TCP Password Monitoring * Various Back channels * DOS: * Packet Generation Attacks & Relays These few things should help you get started in google searches ... I can post more on each - however truth to be told... I would rather not Teach Hacking in a public community
201,857
I am searching for good books and articles about TCP/IP, mainly the security aspects of TCP/IP protocols. I have TCP/IP Illustrated and the TCP Guide, but they kinda lack on description of 'classic' attacks and how the internals of protocols relate to those attacks. PS: Seeing the first real answer made me remember to add that this is strictly for studying purposes, I have no intention of going black hat at this point, I am just preparing for job interviews :)
2010/11/15
[ "https://serverfault.com/questions/201857", "https://serverfault.com", "https://serverfault.com/users/48752/" ]
I really prefer this book: [http://www.amazon.com/Network-Security-Architectures-Sean-Convery/dp/158705115X](http://rads.stackoverflow.com/amzn/click/158705115X) It is very detailed. Some (good and free) white paper on secure design is available here: <http://cisco.com/go/safe>
There is no good books, its just in which book you have got the information you are looking for! Check out if this page gives you the correct info - <http://goo.gl/CaR44>
201,857
I am searching for good books and articles about TCP/IP, mainly the security aspects of TCP/IP protocols. I have TCP/IP Illustrated and the TCP Guide, but they kinda lack on description of 'classic' attacks and how the internals of protocols relate to those attacks. PS: Seeing the first real answer made me remember to add that this is strictly for studying purposes, I have no intention of going black hat at this point, I am just preparing for job interviews :)
2010/11/15
[ "https://serverfault.com/questions/201857", "https://serverfault.com", "https://serverfault.com/users/48752/" ]
Unfortunately I don't know of many references that talk about attacks in terms of how they interact with the protocol stack. I'd imagine following mailing lists like [Bugtraq](http://www.securityfocus.com/) will keep you on top of current vulnerabilities, but it sounds like you're looking for more of a primer. I've been told that [Hacking Exposed](http://www.amazon.co.uk/Hacking-Exposed-Sixth-Security-Solutions/dp/0071613749/) is a good general reference for those interested in learning about attack vectors; it's on my reading list, but I haven't got around to it yet. [Building Internet Firewalls](http://www.amazon.co.uk/Building-Internet-Firewalls/dp/B0043EWUPM/), though fairly old, still offers an excellent overview of how to think about security when designing your network.
I good (and free) resource from Cisco can be found here: [ISP Security Issues in ISP Security Issues in today’s Internet](ftp://ftp-eng.cisco.com/cons/isp/documents/Hoover-Security.pdf) There is also the complete text to [IOS Essentials](ftp://ftp-eng.cisco.com/cons/isp/documents/IOSEssentialsPDF.zip) in PDF format from Cisco Press along with several other documents available in the same FTP directory if you are interested in some best practices for Cisco gear. Both of these documents are from 2002. Another good resource would be the [Nmap Network Scanning](http://nmap.org/book/) book by Gordon “Fyodor” Lyon. If you understand how nmap does its thing, you will gain a much deeper understanding of networking and security.
201,857
I am searching for good books and articles about TCP/IP, mainly the security aspects of TCP/IP protocols. I have TCP/IP Illustrated and the TCP Guide, but they kinda lack on description of 'classic' attacks and how the internals of protocols relate to those attacks. PS: Seeing the first real answer made me remember to add that this is strictly for studying purposes, I have no intention of going black hat at this point, I am just preparing for job interviews :)
2010/11/15
[ "https://serverfault.com/questions/201857", "https://serverfault.com", "https://serverfault.com/users/48752/" ]
I really prefer this book: [http://www.amazon.com/Network-Security-Architectures-Sean-Convery/dp/158705115X](http://rads.stackoverflow.com/amzn/click/158705115X) It is very detailed. Some (good and free) white paper on secure design is available here: <http://cisco.com/go/safe>
I good (and free) resource from Cisco can be found here: [ISP Security Issues in ISP Security Issues in today’s Internet](ftp://ftp-eng.cisco.com/cons/isp/documents/Hoover-Security.pdf) There is also the complete text to [IOS Essentials](ftp://ftp-eng.cisco.com/cons/isp/documents/IOSEssentialsPDF.zip) in PDF format from Cisco Press along with several other documents available in the same FTP directory if you are interested in some best practices for Cisco gear. Both of these documents are from 2002. Another good resource would be the [Nmap Network Scanning](http://nmap.org/book/) book by Gordon “Fyodor” Lyon. If you understand how nmap does its thing, you will gain a much deeper understanding of networking and security.
201,857
I am searching for good books and articles about TCP/IP, mainly the security aspects of TCP/IP protocols. I have TCP/IP Illustrated and the TCP Guide, but they kinda lack on description of 'classic' attacks and how the internals of protocols relate to those attacks. PS: Seeing the first real answer made me remember to add that this is strictly for studying purposes, I have no intention of going black hat at this point, I am just preparing for job interviews :)
2010/11/15
[ "https://serverfault.com/questions/201857", "https://serverfault.com", "https://serverfault.com/users/48752/" ]
I really prefer this book: [http://www.amazon.com/Network-Security-Architectures-Sean-Convery/dp/158705115X](http://rads.stackoverflow.com/amzn/click/158705115X) It is very detailed. Some (good and free) white paper on secure design is available here: <http://cisco.com/go/safe>
I would suggest to check IBM book this is great book and would help you a lot. This has TCP/IP Security related chapter also. <http://www.redbooks.ibm.com/abstracts/gg243376.html?Open>
201,857
I am searching for good books and articles about TCP/IP, mainly the security aspects of TCP/IP protocols. I have TCP/IP Illustrated and the TCP Guide, but they kinda lack on description of 'classic' attacks and how the internals of protocols relate to those attacks. PS: Seeing the first real answer made me remember to add that this is strictly for studying purposes, I have no intention of going black hat at this point, I am just preparing for job interviews :)
2010/11/15
[ "https://serverfault.com/questions/201857", "https://serverfault.com", "https://serverfault.com/users/48752/" ]
I would suggest to check IBM book this is great book and would help you a lot. This has TCP/IP Security related chapter also. <http://www.redbooks.ibm.com/abstracts/gg243376.html?Open>
There is no good books, its just in which book you have got the information you are looking for! Check out if this page gives you the correct info - <http://goo.gl/CaR44>
201,857
I am searching for good books and articles about TCP/IP, mainly the security aspects of TCP/IP protocols. I have TCP/IP Illustrated and the TCP Guide, but they kinda lack on description of 'classic' attacks and how the internals of protocols relate to those attacks. PS: Seeing the first real answer made me remember to add that this is strictly for studying purposes, I have no intention of going black hat at this point, I am just preparing for job interviews :)
2010/11/15
[ "https://serverfault.com/questions/201857", "https://serverfault.com", "https://serverfault.com/users/48752/" ]
Unfortunately I don't know of many references that talk about attacks in terms of how they interact with the protocol stack. I'd imagine following mailing lists like [Bugtraq](http://www.securityfocus.com/) will keep you on top of current vulnerabilities, but it sounds like you're looking for more of a primer. I've been told that [Hacking Exposed](http://www.amazon.co.uk/Hacking-Exposed-Sixth-Security-Solutions/dp/0071613749/) is a good general reference for those interested in learning about attack vectors; it's on my reading list, but I haven't got around to it yet. [Building Internet Firewalls](http://www.amazon.co.uk/Building-Internet-Firewalls/dp/B0043EWUPM/), though fairly old, still offers an excellent overview of how to think about security when designing your network.
There is no good books, its just in which book you have got the information you are looking for! Check out if this page gives you the correct info - <http://goo.gl/CaR44>
1,772
I ask to seek kindly advice and recommendations on improvement. These 2 open questions [Pilot passed out in a small GA plane. What can a passenger do?](https://aviation.stackexchange.com/q/19636/128) and [Can a passenger realistically replace suddenly incapacitated pilots?](https://aviation.stackexchange.com/q/8986/128) have received many upvotes and views, but [my original](https://aviation.stackexchange.com/q/163/128) was closed and criticised. What might I have neglected?
2015/09/03
[ "https://aviation.meta.stackexchange.com/questions/1772", "https://aviation.meta.stackexchange.com", "https://aviation.meta.stackexchange.com/users/-1/" ]
Disclaimer: this is my opinion as a user of this site, not as a moderator. I did vote to close yours as opinion based for a few of the reasons mentioned below. There are a few things I can spot right away: 1. The GA question is specific. It's a particular situation with only a few answers. It also has examples of actual saves by passengers, so answers involve little opinion. 2. The incapacitation question is again, pretty specific. Pilots can't fly; what can passengers do. The obvious answer here is 'they can try to fly the plane', with variations on what else is an option. 3. Your question is pretty vague. "Suppose that an aircraft is in an exigency or emergency solely related to aviation." That's a huge, wide-open question. 4. Your writing style, and I mean no offense, is pretty hard to read. You use large words when small would do, some of them uncommon (exigency, affrighting). In several places you provide synonyms that don't clarify. This doesn't help - it makes it hard to follow and hard (not impossible) to grasp your intent. 5. Your question contained many, many sub-questions that could on their own have been answered. 6. Your real-world example is an assumption that a non-pilot might have saved AF447. In reality it seems like a situation in which a passenger's help would be least welcome. Imagine you're fighting a shark for your life: someone says, "hey, did you try punching it in the nose?" **I think it boils down to: your question was more complicated to read.** Many vague questions make for an opinion based response, which is probably why five users voted to close. --- Sidebar on readability: I dumped your question into the excellent [Hemingway readability app](http://hemingwayapp.com) and it highlighted 8 of 10 sentences as "hard to read" or "very hard to read": [![enter image description here](https://i.stack.imgur.com/ssUaG.jpg)](https://i.stack.imgur.com/ssUaG.jpg) The GA question, on the other hand, was pretty straightforward: [![enter image description here](https://i.stack.imgur.com/JKRXu.jpg)](https://i.stack.imgur.com/JKRXu.jpg)
In addition to writing style and the question being very broad, I think a lot of the negative reception also had to do with the assumption that a passenger with no actual flight training would be useful to the flight crew of an airliner. It's roughly comparable to asking "When a patient starts having complications during spinal surgery, how can a hospital visitor who has surgery experience from playing [Operation](https://en.wikipedia.org/wiki/Operation_(game)) enter the operating room to help the neurosurgeons?" The answer, of course, being that they can't because they'd have no idea what's going on and they'd be a distraction to the highly-trained people who are trying to figure out what's going on and fix it. In the case of AF447, it's unlikely that the passengers even had much idea that something was wrong prior to impacting the water. Even a trained pilot probably wouldn't have known that anything serious was going on unless they happened to be monitoring a GPS unit at the time. Asking if a passenger could be useful to the flight crew in a specific type of emergency probably would have been better received, since it's specific and doesn't start with the assumption that the passenger actually would be useful. Making the assumption that someone with no training would be able to fix a problem that people with several years of training couldn't comes across as arrogant, though. By the way, I hope this answer does not come across as being offensive. No offense is intended. I'm just trying to give an honest assessment of why I think that question was not received well.
1,772
I ask to seek kindly advice and recommendations on improvement. These 2 open questions [Pilot passed out in a small GA plane. What can a passenger do?](https://aviation.stackexchange.com/q/19636/128) and [Can a passenger realistically replace suddenly incapacitated pilots?](https://aviation.stackexchange.com/q/8986/128) have received many upvotes and views, but [my original](https://aviation.stackexchange.com/q/163/128) was closed and criticised. What might I have neglected?
2015/09/03
[ "https://aviation.meta.stackexchange.com/questions/1772", "https://aviation.meta.stackexchange.com", "https://aviation.meta.stackexchange.com/users/-1/" ]
Disclaimer: this is my opinion as a user of this site, not as a moderator. I did vote to close yours as opinion based for a few of the reasons mentioned below. There are a few things I can spot right away: 1. The GA question is specific. It's a particular situation with only a few answers. It also has examples of actual saves by passengers, so answers involve little opinion. 2. The incapacitation question is again, pretty specific. Pilots can't fly; what can passengers do. The obvious answer here is 'they can try to fly the plane', with variations on what else is an option. 3. Your question is pretty vague. "Suppose that an aircraft is in an exigency or emergency solely related to aviation." That's a huge, wide-open question. 4. Your writing style, and I mean no offense, is pretty hard to read. You use large words when small would do, some of them uncommon (exigency, affrighting). In several places you provide synonyms that don't clarify. This doesn't help - it makes it hard to follow and hard (not impossible) to grasp your intent. 5. Your question contained many, many sub-questions that could on their own have been answered. 6. Your real-world example is an assumption that a non-pilot might have saved AF447. In reality it seems like a situation in which a passenger's help would be least welcome. Imagine you're fighting a shark for your life: someone says, "hey, did you try punching it in the nose?" **I think it boils down to: your question was more complicated to read.** Many vague questions make for an opinion based response, which is probably why five users voted to close. --- Sidebar on readability: I dumped your question into the excellent [Hemingway readability app](http://hemingwayapp.com) and it highlighted 8 of 10 sentences as "hard to read" or "very hard to read": [![enter image description here](https://i.stack.imgur.com/ssUaG.jpg)](https://i.stack.imgur.com/ssUaG.jpg) The GA question, on the other hand, was pretty straightforward: [![enter image description here](https://i.stack.imgur.com/JKRXu.jpg)](https://i.stack.imgur.com/JKRXu.jpg)
You are comparing two different situations: * The other questions are about **replacing a pilot**, implying there is no other possibility to land than someone taking control. At least you do the most urgent, contact ATC, engage autopilot, etc. Having a simulator experience is obviously significant. You don't have to discuss a plan with an existing crew, you are alone, in charge. The discussion is about the actual outcome of such experience. * Your question is about **helping a regular crew**, and specifically AF447 about sensing the aircraft is stalled. That's another scenario, and doing better than a crew of three, of which two pilots very experienced on the aircraft type is not realistic at first sight (specially without CRM training). Nobody will be confident in you in this case. So the negative reception of your question because this is not seen as a possible solution. The closed question may have contributed to the rejection reaction in parallel.
1,772
I ask to seek kindly advice and recommendations on improvement. These 2 open questions [Pilot passed out in a small GA plane. What can a passenger do?](https://aviation.stackexchange.com/q/19636/128) and [Can a passenger realistically replace suddenly incapacitated pilots?](https://aviation.stackexchange.com/q/8986/128) have received many upvotes and views, but [my original](https://aviation.stackexchange.com/q/163/128) was closed and criticised. What might I have neglected?
2015/09/03
[ "https://aviation.meta.stackexchange.com/questions/1772", "https://aviation.meta.stackexchange.com", "https://aviation.meta.stackexchange.com/users/-1/" ]
In addition to writing style and the question being very broad, I think a lot of the negative reception also had to do with the assumption that a passenger with no actual flight training would be useful to the flight crew of an airliner. It's roughly comparable to asking "When a patient starts having complications during spinal surgery, how can a hospital visitor who has surgery experience from playing [Operation](https://en.wikipedia.org/wiki/Operation_(game)) enter the operating room to help the neurosurgeons?" The answer, of course, being that they can't because they'd have no idea what's going on and they'd be a distraction to the highly-trained people who are trying to figure out what's going on and fix it. In the case of AF447, it's unlikely that the passengers even had much idea that something was wrong prior to impacting the water. Even a trained pilot probably wouldn't have known that anything serious was going on unless they happened to be monitoring a GPS unit at the time. Asking if a passenger could be useful to the flight crew in a specific type of emergency probably would have been better received, since it's specific and doesn't start with the assumption that the passenger actually would be useful. Making the assumption that someone with no training would be able to fix a problem that people with several years of training couldn't comes across as arrogant, though. By the way, I hope this answer does not come across as being offensive. No offense is intended. I'm just trying to give an honest assessment of why I think that question was not received well.
You are comparing two different situations: * The other questions are about **replacing a pilot**, implying there is no other possibility to land than someone taking control. At least you do the most urgent, contact ATC, engage autopilot, etc. Having a simulator experience is obviously significant. You don't have to discuss a plan with an existing crew, you are alone, in charge. The discussion is about the actual outcome of such experience. * Your question is about **helping a regular crew**, and specifically AF447 about sensing the aircraft is stalled. That's another scenario, and doing better than a crew of three, of which two pilots very experienced on the aircraft type is not realistic at first sight (specially without CRM training). Nobody will be confident in you in this case. So the negative reception of your question because this is not seen as a possible solution. The closed question may have contributed to the rejection reaction in parallel.
18,120
How do we know the laws of physics are the same throughout the universe? Intuitively I would say they would vary in two natural ways: the constants in the equations may vary or the math in the equations may vary. As a guess they could change over a long time. What is the farthest radius we can prove from Earth, with absolute certainty, that the laws of physics do not vary? I am aware this may not be a radius but a more complex shape that cannot be simply described by a radius. The nearest answer I can think of for a radius is a guess. And that guess is based on the farthest physics experiment we have done from earth, which I think is an experiment with mirrors on the moon. Therefore if we assume (I don't know if this assumption is 100% reasonable) all physics laws hold because this experiment works. Then the radius is the distance to the moon. This doesn't give a concrete answer for the radius, merely an educated guess.
2016/08/29
[ "https://astronomy.stackexchange.com/questions/18120", "https://astronomy.stackexchange.com", "https://astronomy.stackexchange.com/users/14021/" ]
Let's start in the middle: > > What is the furthest radius we can prove from earth, with absolute certaintity, that the laws of physics do not vary? > > > Zero. Proofs are found in mathematics and court rooms, and are impossible in natural science. The best we can do is have [falsifiable](https://en.wikipedia.org/wiki/Falsifiability) theories. This holds for every description of reality - there's no "proof" even for the Laws of Gravity. So, what could we observe that would tell us that physical constants or relationships between physical quantities are different in other parts of the universe, or at other times during its existence? * Gravity: For galaxy clusters, we have independent mass measurements from several different sources that agree within their (admittedly large) error bars. Gravitational lensing, velocity dispersion of the member galaxies and X-ray temperatures are all in agreement. So the laws of gravity seem to work even at redshifts up to 0.5 or even higher. * Atomic physics: We observe highly redshifted objects. The wavelength of the light emitted by these objects is made longer by the expansion of the universe. Observing redshifted spectral lines of different chemical elements (or molecules) tells us that atomic physics worked the same when and where this light was emitted. If the transition levels between electron orbits had changed over time, we would get different redshifts for the same objects depending on what element's spectral line we observe. * Nucleosythesis: Shortly after the big bang, the temperature lowered such that protons and neutrons were no longer created and destroyed constantly. A free neutron has a half live of about 8.5 minutes before it decays into a proton and an electron. Our theories predict that we'd get a helium (2x proton, 2x neutron) content in the universe of about 25%. (The rest of the "normal" matter being essentially all hydrogen), and that is indeed what we observe. Now, the helium content is dependent both on the matter density at the time this took place and the half live of the neutron. From other observations (BAO come to mind) we are fairly certain that we got the matter density about right. Which leaves only a small wiggle room for the half live of the neutron, and hence for changes in the weak force. * We've covered gravity, electromagnetism, and the weak force. I don't know any good test for the strong force. For a change of natural laws over time, we can look at the isotope distribution in rocks here on earth. We should be able to tell whether the decay rate of various elements was different at earlier times by looking at how many of each of their decay products are around. To summarize, we cannot say with "absolute certainty", but what we observe seems to indicate that natural laws are the same throughout the universe.
i am by no means a scientist, thus nor an astrophysicist. i have a background in electrical engineering and a curiosity for cosmology. i ended up here essentially because i'm looking for answers to the question asked above. it seems to me that the following information is revelant to the question : a fairly recent (2017.09.20) article published on the NASA website mentions a study which reveals that the two methods used to compute Hubble's constant (one is based on observations of type 1a supernovae, the other on the CMB) disagree (although the Standard Model of Cosmology predicts their agreement) : « A recent study using the first method yielded an 8% greater expansion rate than the second method’s result. » - <https://science.nasa.gov/science-news/news-articles/hubbles-contentious-constant-news> the article doesn't mention a clear explanation for this discrepency. for instance, perhaps there are holes in one or both computation methods. if i understand correctly : since it is believed that the CMB informs us about the early universe, but this is not so for type 1a supernovae, then another possible explanation is that both measurements are valid, and the discrepency means that something has changed over time. for instance, the article asks the question « Or are dark energy’s or dark matter’s properties changing over time? ». given the importance of Hubble's constant, perhaps this points to the fact that physics have changed over time.
18,120
How do we know the laws of physics are the same throughout the universe? Intuitively I would say they would vary in two natural ways: the constants in the equations may vary or the math in the equations may vary. As a guess they could change over a long time. What is the farthest radius we can prove from Earth, with absolute certainty, that the laws of physics do not vary? I am aware this may not be a radius but a more complex shape that cannot be simply described by a radius. The nearest answer I can think of for a radius is a guess. And that guess is based on the farthest physics experiment we have done from earth, which I think is an experiment with mirrors on the moon. Therefore if we assume (I don't know if this assumption is 100% reasonable) all physics laws hold because this experiment works. Then the radius is the distance to the moon. This doesn't give a concrete answer for the radius, merely an educated guess.
2016/08/29
[ "https://astronomy.stackexchange.com/questions/18120", "https://astronomy.stackexchange.com", "https://astronomy.stackexchange.com/users/14021/" ]
Let's start in the middle: > > What is the furthest radius we can prove from earth, with absolute certaintity, that the laws of physics do not vary? > > > Zero. Proofs are found in mathematics and court rooms, and are impossible in natural science. The best we can do is have [falsifiable](https://en.wikipedia.org/wiki/Falsifiability) theories. This holds for every description of reality - there's no "proof" even for the Laws of Gravity. So, what could we observe that would tell us that physical constants or relationships between physical quantities are different in other parts of the universe, or at other times during its existence? * Gravity: For galaxy clusters, we have independent mass measurements from several different sources that agree within their (admittedly large) error bars. Gravitational lensing, velocity dispersion of the member galaxies and X-ray temperatures are all in agreement. So the laws of gravity seem to work even at redshifts up to 0.5 or even higher. * Atomic physics: We observe highly redshifted objects. The wavelength of the light emitted by these objects is made longer by the expansion of the universe. Observing redshifted spectral lines of different chemical elements (or molecules) tells us that atomic physics worked the same when and where this light was emitted. If the transition levels between electron orbits had changed over time, we would get different redshifts for the same objects depending on what element's spectral line we observe. * Nucleosythesis: Shortly after the big bang, the temperature lowered such that protons and neutrons were no longer created and destroyed constantly. A free neutron has a half live of about 8.5 minutes before it decays into a proton and an electron. Our theories predict that we'd get a helium (2x proton, 2x neutron) content in the universe of about 25%. (The rest of the "normal" matter being essentially all hydrogen), and that is indeed what we observe. Now, the helium content is dependent both on the matter density at the time this took place and the half live of the neutron. From other observations (BAO come to mind) we are fairly certain that we got the matter density about right. Which leaves only a small wiggle room for the half live of the neutron, and hence for changes in the weak force. * We've covered gravity, electromagnetism, and the weak force. I don't know any good test for the strong force. For a change of natural laws over time, we can look at the isotope distribution in rocks here on earth. We should be able to tell whether the decay rate of various elements was different at earlier times by looking at how many of each of their decay products are around. To summarize, we cannot say with "absolute certainty", but what we observe seems to indicate that natural laws are the same throughout the universe.
We can't know for certain. However, we can state with confidence what would be broken were it not to be true, provided a certain mathematical formulation is valid. This is *Noether's theorem* <https://en.wikipedia.org/wiki/Noether%27s_theorem> TL;DR what breaks is the conservation of linear momentum. If you consider that the laws of physics may vary with time rather than place, what breaks is the conservation of energy. Both subject to the constraint that a Lagrangian formulation is valid. I've encountered serious physicists discussing the possibility that that time-invariance might not hold for the early stages of the universe. The consequence would be non-conservation of energy on the largest cosmological scales, which is where the evidence for this conservation law is least strong. (We have to posit the existence of dark matter and dark energy, and also not all the universe is observable).
18,120
How do we know the laws of physics are the same throughout the universe? Intuitively I would say they would vary in two natural ways: the constants in the equations may vary or the math in the equations may vary. As a guess they could change over a long time. What is the farthest radius we can prove from Earth, with absolute certainty, that the laws of physics do not vary? I am aware this may not be a radius but a more complex shape that cannot be simply described by a radius. The nearest answer I can think of for a radius is a guess. And that guess is based on the farthest physics experiment we have done from earth, which I think is an experiment with mirrors on the moon. Therefore if we assume (I don't know if this assumption is 100% reasonable) all physics laws hold because this experiment works. Then the radius is the distance to the moon. This doesn't give a concrete answer for the radius, merely an educated guess.
2016/08/29
[ "https://astronomy.stackexchange.com/questions/18120", "https://astronomy.stackexchange.com", "https://astronomy.stackexchange.com/users/14021/" ]
Let's start in the middle: > > What is the furthest radius we can prove from earth, with absolute certaintity, that the laws of physics do not vary? > > > Zero. Proofs are found in mathematics and court rooms, and are impossible in natural science. The best we can do is have [falsifiable](https://en.wikipedia.org/wiki/Falsifiability) theories. This holds for every description of reality - there's no "proof" even for the Laws of Gravity. So, what could we observe that would tell us that physical constants or relationships between physical quantities are different in other parts of the universe, or at other times during its existence? * Gravity: For galaxy clusters, we have independent mass measurements from several different sources that agree within their (admittedly large) error bars. Gravitational lensing, velocity dispersion of the member galaxies and X-ray temperatures are all in agreement. So the laws of gravity seem to work even at redshifts up to 0.5 or even higher. * Atomic physics: We observe highly redshifted objects. The wavelength of the light emitted by these objects is made longer by the expansion of the universe. Observing redshifted spectral lines of different chemical elements (or molecules) tells us that atomic physics worked the same when and where this light was emitted. If the transition levels between electron orbits had changed over time, we would get different redshifts for the same objects depending on what element's spectral line we observe. * Nucleosythesis: Shortly after the big bang, the temperature lowered such that protons and neutrons were no longer created and destroyed constantly. A free neutron has a half live of about 8.5 minutes before it decays into a proton and an electron. Our theories predict that we'd get a helium (2x proton, 2x neutron) content in the universe of about 25%. (The rest of the "normal" matter being essentially all hydrogen), and that is indeed what we observe. Now, the helium content is dependent both on the matter density at the time this took place and the half live of the neutron. From other observations (BAO come to mind) we are fairly certain that we got the matter density about right. Which leaves only a small wiggle room for the half live of the neutron, and hence for changes in the weak force. * We've covered gravity, electromagnetism, and the weak force. I don't know any good test for the strong force. For a change of natural laws over time, we can look at the isotope distribution in rocks here on earth. We should be able to tell whether the decay rate of various elements was different at earlier times by looking at how many of each of their decay products are around. To summarize, we cannot say with "absolute certainty", but what we observe seems to indicate that natural laws are the same throughout the universe.
Science is based on guesses, paraphrasing Feynman. We guess that something works in a certain way. A good guess explains the existing data and makes predictions which can be tested The best guess is the good guess which is simplest i.e. minimises the number of additional assumptions. So the assumption by Newton that gravity works for planets in the same way as it does for throwing stones while walking along a beach was, in essence, just a guess.
18,120
How do we know the laws of physics are the same throughout the universe? Intuitively I would say they would vary in two natural ways: the constants in the equations may vary or the math in the equations may vary. As a guess they could change over a long time. What is the farthest radius we can prove from Earth, with absolute certainty, that the laws of physics do not vary? I am aware this may not be a radius but a more complex shape that cannot be simply described by a radius. The nearest answer I can think of for a radius is a guess. And that guess is based on the farthest physics experiment we have done from earth, which I think is an experiment with mirrors on the moon. Therefore if we assume (I don't know if this assumption is 100% reasonable) all physics laws hold because this experiment works. Then the radius is the distance to the moon. This doesn't give a concrete answer for the radius, merely an educated guess.
2016/08/29
[ "https://astronomy.stackexchange.com/questions/18120", "https://astronomy.stackexchange.com", "https://astronomy.stackexchange.com/users/14021/" ]
We can't know for certain. However, we can state with confidence what would be broken were it not to be true, provided a certain mathematical formulation is valid. This is *Noether's theorem* <https://en.wikipedia.org/wiki/Noether%27s_theorem> TL;DR what breaks is the conservation of linear momentum. If you consider that the laws of physics may vary with time rather than place, what breaks is the conservation of energy. Both subject to the constraint that a Lagrangian formulation is valid. I've encountered serious physicists discussing the possibility that that time-invariance might not hold for the early stages of the universe. The consequence would be non-conservation of energy on the largest cosmological scales, which is where the evidence for this conservation law is least strong. (We have to posit the existence of dark matter and dark energy, and also not all the universe is observable).
Science is based on guesses, paraphrasing Feynman. We guess that something works in a certain way. A good guess explains the existing data and makes predictions which can be tested The best guess is the good guess which is simplest i.e. minimises the number of additional assumptions. So the assumption by Newton that gravity works for planets in the same way as it does for throwing stones while walking along a beach was, in essence, just a guess.
18,120
How do we know the laws of physics are the same throughout the universe? Intuitively I would say they would vary in two natural ways: the constants in the equations may vary or the math in the equations may vary. As a guess they could change over a long time. What is the farthest radius we can prove from Earth, with absolute certainty, that the laws of physics do not vary? I am aware this may not be a radius but a more complex shape that cannot be simply described by a radius. The nearest answer I can think of for a radius is a guess. And that guess is based on the farthest physics experiment we have done from earth, which I think is an experiment with mirrors on the moon. Therefore if we assume (I don't know if this assumption is 100% reasonable) all physics laws hold because this experiment works. Then the radius is the distance to the moon. This doesn't give a concrete answer for the radius, merely an educated guess.
2016/08/29
[ "https://astronomy.stackexchange.com/questions/18120", "https://astronomy.stackexchange.com", "https://astronomy.stackexchange.com/users/14021/" ]
One problem with your question is that it is a bit of a paradox. If a Law of Physics appears to vary depending on time/place being observed then, because of what it means to be a physical law, we've simply misunderstood the law itself or aren't observing all forces at work. Here's a super simple example. [![enter image description here](https://i.stack.imgur.com/zA6Jf.png)](https://i.stack.imgur.com/zA6Jf.png) These people haven't found a place in the universe where gravity acts differently, they're simply being pushed harder by a fan than the gravity is pulling down on them. Of course, if the only information you had about them was this picture you wouldn't know that and might think that gravity acts differently where they are. If scientists observe variances is how a law behaves and simply waves their hand saying "oh the law works differently there" then that isn't science anymore. We'd want to know why the law appears to work differently in one place vs another. Edit: One example that is maybe more to OP's point is dark energy. We observe that the Universe is expanding at an increasing rate even though our Laws of Physics, specifically gravity predict that its expansion would cause it to decelerate. Rather than shrugging their shoulders and saying "well the Laws of Physics just work differently at the edge of the Universe" scientists theorized something called dark matter to explain why the Universe's expansion is accelerating despite gravity.
Science is based on guesses, paraphrasing Feynman. We guess that something works in a certain way. A good guess explains the existing data and makes predictions which can be tested The best guess is the good guess which is simplest i.e. minimises the number of additional assumptions. So the assumption by Newton that gravity works for planets in the same way as it does for throwing stones while walking along a beach was, in essence, just a guess.
18,120
How do we know the laws of physics are the same throughout the universe? Intuitively I would say they would vary in two natural ways: the constants in the equations may vary or the math in the equations may vary. As a guess they could change over a long time. What is the farthest radius we can prove from Earth, with absolute certainty, that the laws of physics do not vary? I am aware this may not be a radius but a more complex shape that cannot be simply described by a radius. The nearest answer I can think of for a radius is a guess. And that guess is based on the farthest physics experiment we have done from earth, which I think is an experiment with mirrors on the moon. Therefore if we assume (I don't know if this assumption is 100% reasonable) all physics laws hold because this experiment works. Then the radius is the distance to the moon. This doesn't give a concrete answer for the radius, merely an educated guess.
2016/08/29
[ "https://astronomy.stackexchange.com/questions/18120", "https://astronomy.stackexchange.com", "https://astronomy.stackexchange.com/users/14021/" ]
Let's start in the middle: > > What is the furthest radius we can prove from earth, with absolute certaintity, that the laws of physics do not vary? > > > Zero. Proofs are found in mathematics and court rooms, and are impossible in natural science. The best we can do is have [falsifiable](https://en.wikipedia.org/wiki/Falsifiability) theories. This holds for every description of reality - there's no "proof" even for the Laws of Gravity. So, what could we observe that would tell us that physical constants or relationships between physical quantities are different in other parts of the universe, or at other times during its existence? * Gravity: For galaxy clusters, we have independent mass measurements from several different sources that agree within their (admittedly large) error bars. Gravitational lensing, velocity dispersion of the member galaxies and X-ray temperatures are all in agreement. So the laws of gravity seem to work even at redshifts up to 0.5 or even higher. * Atomic physics: We observe highly redshifted objects. The wavelength of the light emitted by these objects is made longer by the expansion of the universe. Observing redshifted spectral lines of different chemical elements (or molecules) tells us that atomic physics worked the same when and where this light was emitted. If the transition levels between electron orbits had changed over time, we would get different redshifts for the same objects depending on what element's spectral line we observe. * Nucleosythesis: Shortly after the big bang, the temperature lowered such that protons and neutrons were no longer created and destroyed constantly. A free neutron has a half live of about 8.5 minutes before it decays into a proton and an electron. Our theories predict that we'd get a helium (2x proton, 2x neutron) content in the universe of about 25%. (The rest of the "normal" matter being essentially all hydrogen), and that is indeed what we observe. Now, the helium content is dependent both on the matter density at the time this took place and the half live of the neutron. From other observations (BAO come to mind) we are fairly certain that we got the matter density about right. Which leaves only a small wiggle room for the half live of the neutron, and hence for changes in the weak force. * We've covered gravity, electromagnetism, and the weak force. I don't know any good test for the strong force. For a change of natural laws over time, we can look at the isotope distribution in rocks here on earth. We should be able to tell whether the decay rate of various elements was different at earlier times by looking at how many of each of their decay products are around. To summarize, we cannot say with "absolute certainty", but what we observe seems to indicate that natural laws are the same throughout the universe.
One problem with your question is that it is a bit of a paradox. If a Law of Physics appears to vary depending on time/place being observed then, because of what it means to be a physical law, we've simply misunderstood the law itself or aren't observing all forces at work. Here's a super simple example. [![enter image description here](https://i.stack.imgur.com/zA6Jf.png)](https://i.stack.imgur.com/zA6Jf.png) These people haven't found a place in the universe where gravity acts differently, they're simply being pushed harder by a fan than the gravity is pulling down on them. Of course, if the only information you had about them was this picture you wouldn't know that and might think that gravity acts differently where they are. If scientists observe variances is how a law behaves and simply waves their hand saying "oh the law works differently there" then that isn't science anymore. We'd want to know why the law appears to work differently in one place vs another. Edit: One example that is maybe more to OP's point is dark energy. We observe that the Universe is expanding at an increasing rate even though our Laws of Physics, specifically gravity predict that its expansion would cause it to decelerate. Rather than shrugging their shoulders and saying "well the Laws of Physics just work differently at the edge of the Universe" scientists theorized something called dark matter to explain why the Universe's expansion is accelerating despite gravity.
18,120
How do we know the laws of physics are the same throughout the universe? Intuitively I would say they would vary in two natural ways: the constants in the equations may vary or the math in the equations may vary. As a guess they could change over a long time. What is the farthest radius we can prove from Earth, with absolute certainty, that the laws of physics do not vary? I am aware this may not be a radius but a more complex shape that cannot be simply described by a radius. The nearest answer I can think of for a radius is a guess. And that guess is based on the farthest physics experiment we have done from earth, which I think is an experiment with mirrors on the moon. Therefore if we assume (I don't know if this assumption is 100% reasonable) all physics laws hold because this experiment works. Then the radius is the distance to the moon. This doesn't give a concrete answer for the radius, merely an educated guess.
2016/08/29
[ "https://astronomy.stackexchange.com/questions/18120", "https://astronomy.stackexchange.com", "https://astronomy.stackexchange.com/users/14021/" ]
Science is based on guesses, paraphrasing Feynman. We guess that something works in a certain way. A good guess explains the existing data and makes predictions which can be tested The best guess is the good guess which is simplest i.e. minimises the number of additional assumptions. So the assumption by Newton that gravity works for planets in the same way as it does for throwing stones while walking along a beach was, in essence, just a guess.
i am by no means a scientist, thus nor an astrophysicist. i have a background in electrical engineering and a curiosity for cosmology. i ended up here essentially because i'm looking for answers to the question asked above. it seems to me that the following information is revelant to the question : a fairly recent (2017.09.20) article published on the NASA website mentions a study which reveals that the two methods used to compute Hubble's constant (one is based on observations of type 1a supernovae, the other on the CMB) disagree (although the Standard Model of Cosmology predicts their agreement) : « A recent study using the first method yielded an 8% greater expansion rate than the second method’s result. » - <https://science.nasa.gov/science-news/news-articles/hubbles-contentious-constant-news> the article doesn't mention a clear explanation for this discrepency. for instance, perhaps there are holes in one or both computation methods. if i understand correctly : since it is believed that the CMB informs us about the early universe, but this is not so for type 1a supernovae, then another possible explanation is that both measurements are valid, and the discrepency means that something has changed over time. for instance, the article asks the question « Or are dark energy’s or dark matter’s properties changing over time? ». given the importance of Hubble's constant, perhaps this points to the fact that physics have changed over time.
2,662
Taking into account that Blender release cycle will be pretty fast from 2.80 up, is it ok to answer using features available in master branch? Pros: * Answers could be simpler * They can be future proof Cons: * Not all users are comfortable using not-stable branch * ??? Personally I'm using master for my daily work without any issues. Also I can see that more and more people in Blender community are using it, but it's only my observation from Twitter/BA/DevTalk/YouTube. I'm not asking about experimental branches like sculpt or functions. Just master. My heart say yes, my brain - hell no! What do you think about it?
2019/09/11
[ "https://blender.meta.stackexchange.com/questions/2662", "https://blender.meta.stackexchange.com", "https://blender.meta.stackexchange.com/users/29370/" ]
I do this already. I don't see why not, but make sure to link the commit where the feature was added (and/or a relevant discussion on the tracker) and include the version number of the release it is expected to be be in. > > X feature doesn't work like that currently, but as of commit [`gf098d0j`](https://just_an_example) (September 12 2029) you can use *magic unicorn button* to get the effect you want. This feature will be in 2.93, or in a recent [development version](https://blender.stackexchange.com/q/3438/599). > > > Also of course explain how to use the new feature to solve the OPs question, with the caveat that the explanation applies to how blender works as of now and may no longer apply by the time the release rolls around. --- The same applies to experimental branches; if there's a branch which solves a problem the OP has, by all means, mention it. Just be sure to note the caveats involved with using it (unstable/maybe hard to install/etc)
I tend to stay with the stable main releases for answers, however that is not to say upcoming feature should not be in answers. A good example of this was when cycles got the shadow catcher. There was no good way to do that before, so having an answer that pointed people to the daily builds was immensely useful. Plus when feature X rolls around to the stable build we already have an answer documenting how to use feature X. Like gandalf said (not *that* Gandalf) if it is clearly labeled that this is a experimental/master/daily build/upcoming feature then there is no reason not to put master branch feature in answers. Its no different then when we answer with a feature and say added in blender 2.xx. TLDR: Sure, just make it clear that this feature is not in "normal blender."
257,334
I am trying to install SP1 on a Windows 7 Ultimate box using Windows Update, but it fails with this code: 800F0A09 and no further explanation. I have tried to google that, but I am not getting anything useful back. Windows online help is not useful either... Any suggestion? Thanks!
2011/03/14
[ "https://superuser.com/questions/257334", "https://superuser.com", "https://superuser.com/users/16382/" ]
According to a [german blog article](http://www.borncity.com/blog/2011/02/23/windows-7-service-pack-1-troubleshooting-tipps/) it's a problem with Microsoft Security Essentials or Microsoft Forefront Client blocking the installation/deinstallation process. It advises to update those packages. See also [this Microsoft page](http://windows.microsoft.com/en-us/windows7/why-am-i-receiving-a-message-about-microsoft-security-essentials-or-microsoft-forefront-client-security-when-installing-a-service-pack?71173c08).
I accept that the Online Windows Update should work without any problem, but in your case it has not worked. Hope this is not a bug and something to do with Internet download/connection! I always prefer the Offline Installer, which gives me flexibility to install it at any time or on any number of computers. Give a try with the Offline Installer: <http://www.microsoft.com/downloads/en/details.aspx?FamilyID=c3202ce6-4056-4059-8a1b-3a9b77cdfdda&displaylang=en>
257,334
I am trying to install SP1 on a Windows 7 Ultimate box using Windows Update, but it fails with this code: 800F0A09 and no further explanation. I have tried to google that, but I am not getting anything useful back. Windows online help is not useful either... Any suggestion? Thanks!
2011/03/14
[ "https://superuser.com/questions/257334", "https://superuser.com", "https://superuser.com/users/16382/" ]
According to a [german blog article](http://www.borncity.com/blog/2011/02/23/windows-7-service-pack-1-troubleshooting-tipps/) it's a problem with Microsoft Security Essentials or Microsoft Forefront Client blocking the installation/deinstallation process. It advises to update those packages. See also [this Microsoft page](http://windows.microsoft.com/en-us/windows7/why-am-i-receiving-a-message-about-microsoft-security-essentials-or-microsoft-forefront-client-security-when-installing-a-service-pack?71173c08).
The hotfix [Forefront Client Security Antimalware Update](http://support.microsoft.com/kb/2394433) may not work, depending on your version of Forefront. You may try uninstalling forefront, installing sp1 via windows update, and re-installing Forefront afterwards. This worked for me, but the above answer did not.
85,193
I looked at one of my approved edits and found I had a whopping four rejected edits (that is much more than what I expected). I was able to see a snippet of a half a dozen recent edits and see the one that was rejected and I guessed why. I would really like to see which others were rejected. How can I do that?
2011/03/29
[ "https://meta.stackexchange.com/questions/85193", "https://meta.stackexchange.com", "https://meta.stackexchange.com/users/152038/" ]
You can also use [Data Explorer](https://data.stackexchange.com/) to [search for your suggestions that were rejected or approved](https://data.stackexchange.com/stackoverflow/query/752249/users-suggested-edits). (Or search for [rejected edits](https://data.stackexchange.com/stackoverflow/s/1799/my-rejected-edits) and [accepted edits](https://data.stackexchange.com/stackoverflow/s/1800/my-accepted-edits) separately.) Since implementation of the ["Magic Column with arbitrary URL"](https://meta.stackexchange.com/q/104772/158912) feature-request, I updated the queries and added a link to the suggested edit page itself.
There's no convenient way, on your own and without a ♦, to see your history of edit suggestions short of keeping track of them yourself. Diamonds possess a limitted ability to view the history of edit suggestions of users, so you might be able to ask one to help you. As a normal user, you can hackshod your way into finding out, though, by first finding any of your edit suggestions (approved or rejected), and checking the edit suggestion page. At the bottom will be a list of "recent edits", which will shuffle based on what edit suggestion you're looking at. The length of time this will take to sift through depends on your volume of suggestions, but I've successfully used it to review 30 of my edit suggestions once, so it should be able to find your rejections if you keep at it.
5,836,449
We are trying to figure out a way to see if a dll on a user pc is different from the deployment server. We can't use a timestamp because our build script builds everything everytime (and this is the way we want to keep it). We also prefer not to use version # because we can definitely see people forgetting this a lot. Some of our dlls change all the time (at least a couple times a week). I tried to create an XML File with the MD5 hash of every file but apparently this won't work because the hash changes every time we compile it even if there was no changes. Is there any other way?
2011/04/29
[ "https://Stackoverflow.com/questions/5836449", "https://Stackoverflow.com", "https://Stackoverflow.com/users/127954/" ]
Since the DLLs produce different hashes, it's clear that something changes on each compile. Perhaps something internal is timestamp-driven or randomized. Theoretically it's probably possible using reflection or ildasm and some smart comparison of the results, but that would be a lot harder than revising your process to use incrementing version strings. I suggest that you automate your build process and automatically increment the version string in assemblyinfo.cs each build. If you are using source control, your build script could check it out, increment it, and check it back in. Hope this helps.
You probably have an incremental build number that gets included in some version string of your dll. Have you tried doing a diff on your dlls? If that is the case you may be able to "mask" the version string on the fly for the calculation of you md5 hash.
5,836,449
We are trying to figure out a way to see if a dll on a user pc is different from the deployment server. We can't use a timestamp because our build script builds everything everytime (and this is the way we want to keep it). We also prefer not to use version # because we can definitely see people forgetting this a lot. Some of our dlls change all the time (at least a couple times a week). I tried to create an XML File with the MD5 hash of every file but apparently this won't work because the hash changes every time we compile it even if there was no changes. Is there any other way?
2011/04/29
[ "https://Stackoverflow.com/questions/5836449", "https://Stackoverflow.com", "https://Stackoverflow.com/users/127954/" ]
I was recently asked to do a similar task and I used the [Reflector Diff AddIn](http://www.codingsanity.com/diff.htm).
You probably have an incremental build number that gets included in some version string of your dll. Have you tried doing a diff on your dlls? If that is the case you may be able to "mask" the version string on the fly for the calculation of you md5 hash.
333,219
**Context:** Some documentation topics like design-patterns have pending approvals regarding the content in the topic for a long time. Only 69 people have been awarded bronze tag. In this scenario, is it OK to contact one or two of these 69 people on attend review of these topics by leaving a comment in one of the questions answered by that expert. The only problem I can see here is comment is not related to the question. Content of comment : > > Hi SomeX, on a different note , can you help others in reviewig the documentation content in design-patterns topic? Only 69 people have been awarded bronze badge for this topic and you are one of them. > > >
2016/08/26
[ "https://meta.stackoverflow.com/questions/333219", "https://meta.stackoverflow.com", "https://meta.stackoverflow.com/users/4999394/" ]
Please don't. If you've been paying any attention to the discussions about Documentation that occurred here on Meta, you know that quite a few experts have made the *conscious decision to not participate in Documentation*. The last thing they need is being nagged to participate.
It's unlikely for Stack Overflow to suddenly allow for notifications to appear which a user has not explicitly opted in for, especially to target specific users (even if it's not by name, but rather by the fact that they have a bronze badge). However, I wonder if this speaks more to a point of there not being enough active participants in the tag you're trying to get reviewed for there to be sufficient activity and clean-up.
333,219
**Context:** Some documentation topics like design-patterns have pending approvals regarding the content in the topic for a long time. Only 69 people have been awarded bronze tag. In this scenario, is it OK to contact one or two of these 69 people on attend review of these topics by leaving a comment in one of the questions answered by that expert. The only problem I can see here is comment is not related to the question. Content of comment : > > Hi SomeX, on a different note , can you help others in reviewig the documentation content in design-patterns topic? Only 69 people have been awarded bronze badge for this topic and you are one of them. > > >
2016/08/26
[ "https://meta.stackoverflow.com/questions/333219", "https://meta.stackoverflow.com", "https://meta.stackoverflow.com/users/4999394/" ]
Please don't. If you've been paying any attention to the discussions about Documentation that occurred here on Meta, you know that quite a few experts have made the *conscious decision to not participate in Documentation*. The last thing they need is being nagged to participate.
Comments like *Thanks*, *You're welcome*, *Vote on my questions!*, or *Upvote my answers please* are really annoying as many Stack Overflow users have notifications switched on on their smartphones. Would a person notified with a vote request be happy after being called from the couch, where he was watching a movie, drinking wine with his wife? Stack Overflow notifications are used to inform user that someone has taken an action that he expects somehow. Not to get in touch with another user. As someone mentioned above, if we allowed such commenting, good users would be permanently flooded by recruitment companies trying to get in touch with programmers.
227,616
How much rep could a rep farm farm if a rep farm could farm rep?
2014/04/01
[ "https://meta.stackexchange.com/questions/227616", "https://meta.stackexchange.com", "https://meta.stackexchange.com/users/172936/" ]
A rep farm would farm as much rep as they could farm *if* a rep farm could farm rep.
Because rainbow bacon stripes: ![bacon!](https://i.stack.imgur.com/ikYZG.jpg)
6,206,856
I need some clarification on Hibernate merge method. How does it exactly work. When i have an entity that is detached, and I want it to get reatached, does Hibernate look only un current session for same entity, or in all Hibernate sessions? Is there any way to use merge on transistent entity?
2011/06/01
[ "https://Stackoverflow.com/questions/6206856", "https://Stackoverflow.com", "https://Stackoverflow.com/users/739927/" ]
Hibernate's merge is to be used when you might have more than one instance of an object in the current memory at one time, and you want Hibernate to save any and all changes made to any instance of the object. This can happen, for example, when you've loaded the object through two different means during validation. An issue that can cause confusion is the difference between an application session and a Hibernate session. It's possible to open and close more than one Hibernate session during an application session. If you load an object instance in the first Hibernate session, then close the session, that instance becomes detached. If you open a new session, then load the same object (same ID), Hibernate will construct a new instance, and if you try to use saveOrUpdate on the object obtained in the first session, Hibernate will throw a NonUniqueObjectException. So while the current Hibernate session is only concerned with itself, part of its infrastructure is to be aware of what objects exist in the larger application session that are mapped Hibernate entities and thus it should consider in operations like save or merge. Merge is a way to tell Hibernate "I want you assume any changes I made to this Hibernate entity should be saved, even if I made them to a different instance of the object than the once I'm asking you to save." SaveOrUpdate is a way to tell Hibernate to be more conservative and throw an Exception instead. There's some more specifics about the differences between Hibernate's saveOrUpdate and merge [in this article](http://www.stevideter.com/2008/12/07/saveorupdate-versus-merge-in-hibernate/) in my blog.
it looks in the current hibernate session only, not all hibernate sessions. for your second question, you cannot by definition of 'transient' (what i believe you meant, not 'tansistent'). Transient means the entity has not been saved. Merge means nothing hear.
377,186
> > Caveat - I am not the iOS developer but have been asked to research > this > > > We submit our native iOS financial app to the Apple store for review and the person who previously managed the submission process insisted we had to provide Apple with a username and password to be able to login to our app to review the pages The process to create and provide Apple with a username/password is very time consuming and alerts our security teams as our app holds sensitive data about people Is it the case that Apple requires to be able to login to review? If so, how do people with financial/banking apps manage this? We cannot really create dummy users as this will skew our stats and as mentioned before, our security team do not like it Many thanks
2019/12/10
[ "https://apple.stackexchange.com/questions/377186", "https://apple.stackexchange.com", "https://apple.stackexchange.com/users/109626/" ]
[App Store Review Guidelines](https://developer.apple.com/app-store/review/guidelines/) necessitates this. You will be rejected if the app requires login and you do not provide credentials. > > Before you submit: > > > * Provide an active demo account and login information, plus any other hardware or resources that might be needed to review your app (e.g. login credentials or a sample QR code). > > > > > 2.1 App Completeness > > > … Make sure your app has been tested on-device for bugs and stability before you submit it, and include demo account info (and turn on your back-end service!) if your app includes a login. … > > > Also, how does your security team ensure that your first two users won’t see each other’s data? If adding a third account for Apple breaks your security, you’ve got your research can be concluded with the answer: the back end team is not ready to ship.
> > Is it the case that Apple requires to be able to login to review? > > > Yes. If your app requires a login to access all the functionality, Apple requires you to provide one, so that they can review the app in its entirely. Absence of login information may prevent Apple from reviewing the app in its entirely. > > If so, how do people with financial/banking apps manage this? > > > Ask your software development team with a dummy/demo account with placeholder data. This should let the review team at Apple review the app UI and functionality to make sure they are in compliance with the guidelines. > > We cannot really create dummy users as this will skew our stats and as mentioned before, our security team do not like it > > > Only likely way to move ahead at this point would be to request the IT/security/software development team to set up an exception, so that the review team at Apple can do their job.