qid int64 1 74.7M | question stringlengths 12 33.8k | date stringlengths 10 10 | metadata list | response_j stringlengths 0 115k | response_k stringlengths 2 98.3k |
|---|---|---|---|---|---|
43,054 | I've been looking for a decent dairy-free coffee creamer alternative. I stumbled upon a [blog post](http://bravoforpaleo.com/2014/01/10/paleo-coffee-creamer/) for 'paleo coffee creamer' that has just 3 ingredients: a can of coconut milk, 2-3 eggs, and some vanilla extract.
In the blog comments, many posters said that there's no way they would include raw eggs in their homemade coffee creamer. I probably would've said the same thing, but the author mentioned something along the lines of 'the heat from the coffee tempers the eggs, making the creamer safe to consume.'
Is this true? | 2014/03/26 | [
"https://cooking.stackexchange.com/questions/43054",
"https://cooking.stackexchange.com",
"https://cooking.stackexchange.com/users/18161/"
] | Many common recipes call for raw eggs, for example Caesar salad, aioli, and pasta carbonara. Some restaurants will label the menu items as such, with a disclaimer on the menu warning of possible hazards to the elderly, the very young, those with compromised immune systems and pregnant women.
You may want to go the route some restaurants use: avoid the issue by using pasteurized eggs from the store, usually found in a carton. | The incidence of bad things in raw eggs is very very low, so I wouldn't worry about consuming them. On the other hand, the line about them being "tempered" and therefore made safe by the coffee is completely incorrect. Unless it's nuclear hot McDonalds coffee, you're not going to be doing anything but moving the bacteria closer to their happy place.
I don't see anything *wrong* with adding raw eggs, but this would severely impair the shelf life of the resultant creamer ([2-4 days is the limit](http://www.foodsafety.gov/keep/charts/eggstorage.html) for raw eggs out of the shell) |
43,054 | I've been looking for a decent dairy-free coffee creamer alternative. I stumbled upon a [blog post](http://bravoforpaleo.com/2014/01/10/paleo-coffee-creamer/) for 'paleo coffee creamer' that has just 3 ingredients: a can of coconut milk, 2-3 eggs, and some vanilla extract.
In the blog comments, many posters said that there's no way they would include raw eggs in their homemade coffee creamer. I probably would've said the same thing, but the author mentioned something along the lines of 'the heat from the coffee tempers the eggs, making the creamer safe to consume.'
Is this true? | 2014/03/26 | [
"https://cooking.stackexchange.com/questions/43054",
"https://cooking.stackexchange.com",
"https://cooking.stackexchange.com/users/18161/"
] | What you're effectively making is egg-nog, but with coconut milk instead of cream or milk, so you should follow general recommendations for making egg-nog these days:
* If you're in the EU (where chickens would have been innoculated against salmonella, and sold with the cuticle on), you may want to wash your eggs in hot, soapy water before using.
* If you're in the US, eggs are already washed, but the chickens haven't been innoculated ... so you may prefer purchasing pasteurized eggs.
* Use fresh eggs (haven't been sitting around as long with the bacteria multiplying), that have been properly handled (in the US, this means refrigerated)
* Examine the shell for cracks; avoid any that don't look fully intact.
* Avoid contact between the inside of the egg and the outside of the shell -- so if you end up with a bit of shell in there, use it for something else, not some raw or barely cooked item.
I would also suspect that there would be a lower chance of salmonella or other problems in free-range eggs vs. factory raised, but I don't know if there's been any validation of that. | The incidence of bad things in raw eggs is very very low, so I wouldn't worry about consuming them. On the other hand, the line about them being "tempered" and therefore made safe by the coffee is completely incorrect. Unless it's nuclear hot McDonalds coffee, you're not going to be doing anything but moving the bacteria closer to their happy place.
I don't see anything *wrong* with adding raw eggs, but this would severely impair the shelf life of the resultant creamer ([2-4 days is the limit](http://www.foodsafety.gov/keep/charts/eggstorage.html) for raw eggs out of the shell) |
74,309 | My old cell phone number had made lots of calls I am not familiar with. I was confronted with a list of calls I know I did not call. I was also told that I was using Skype. I have never used skype, I do not know how to work that program. But, the cell phone company submitted a history of calls made. I called several of these numbers and I do not know the party on the other line. I even asked them if they have ever spoke with me or even recognized my voice, and they said they didn't know me or recognized my voice.
So my question is, is it possible that the cell phone company or someone close to me could have rigged (for better lack of word) my phone to create such a long list? | 2014/12/04 | [
"https://security.stackexchange.com/questions/74309",
"https://security.stackexchange.com",
"https://security.stackexchange.com/users/61955/"
] | The term is "phone number spoofing". It is quite easy to make calls from a phone number other than your own, this is usually done with VoIP software, although I don´t use skype either and I don´t know if skype has this capability. In other words I doubt your phone or the company is the problem. | You mention your "old" cell phone number. It is possible to "clone" a cell phone by making a different handset transmit the same identifying numbers as your own. That's easier to do with a CDMA phone, hence Lucas NN's question in the comments.
I'm not sure hat to tell you to do about this since you haven't really explained the problem that has (apparently) resulted. If your cell carrier is complaining, or perhaps trying to charge you, ask them to provide information about the geographic location from which the unknown calls were made. If you're lucky, it'll be different from where you live.
There's a short article on cloning here: <http://en.wikipedia.org/wiki/Phone_cloning> |
110,115 | Is USB a reasonable choice for a local bus?
what are pros and cons?
what reliability concerns are there?
**Bus spec** device count ~4; peripheral devices are permanently connected to same PCB as host (soldered or via headers).
Some device are puny, e.g. serial port or temperature sensor, some are complex, e.g. an LTE modem or ethernet or wifi. Peripherals are such that are available as standalone USB devices or same chips are used in such devices. Linux is supposed to have all the drivers already.
Ideally I'd use only one bus (with hubs if necessary) for simplicity and eventually modifications without some components and with other low-speed components.
**System spec** ARM, Linux, DC powered, roughly equivalent to an Android tablet. | 2014/05/12 | [
"https://electronics.stackexchange.com/questions/110115",
"https://electronics.stackexchange.com",
"https://electronics.stackexchange.com/users/-1/"
] | What you are looking at is a problem I like to call *bus hierarchy*.
You have high speed devices that need a fast low-latency path to the CPU (like the LTE modem) and slow devices like the temperature sensor. Connecting a full fledged LTE modem over I2C will seriously bottleneck the system. And connecting a temperature sensor on USB is a serious overkill. You need to prioritize.
What devices are to be accessed most often? Which ones need to respond quickly? And which don't need that much bandwidth?
Feel free to edit your question.
---
**Edit:**
USB may not be such an overkill after all. Only in the latest versions of it (2.0, 3.0) it has gotten the notion of being targeted to fast peripherals only. Before that, it was simply a *Universal Serial Bus*.
This doesn't change anything on the fact that it's implementation cost is very often too high. | Based on your needs, yes, usb is ideal. Keep in mind, the U does stand for universal. You can have usb nics, wifi, mouse/keyboard/touchpad/touchscreen, sound cards, webcams, hell, even usb displays. It's not the most effecient, but for two nics, a temperature sensore, and a serial device, its designed for it. So much that the majority of computing device manufacturers rely on it heavily.\*\* Not just cheapo sbcs or tablets, but even heavy hitters like Apple and Dell use it for touchpads and keyboards and webcams and wifi and bluetooth and ir ports in all their laptops.\*\*
USB is ubiquitos, easy to implement, and has a very low board cost in terms of routing and parts.
While you can get 4 port arm devices, most have one or two root ports (buses), then connected to a hub ic. Your biggest bottle neck will be mixing High speed devices with Full or Low speed devices on a single hub. Cheap hub ICs have a Single Transaction Translator, that can bring a single low or medium speed downstream device to a high speed uplink. Better ones will have a MTT, Multiple Transaction Translators, so multiple low speed devices can be bridged at high speed speed. Or simply ensure that the low speed are on one hub while high speed on another.
But since you have arm as the intended SOC, you will have access to proper buses for sound or i2c or spi (for the temp sensor or serial) or video or even a built in ethernet driver minus the magnetics. Higher end ARM chips comparable to cheap Android tablets or routers are fully loaded. |
110,115 | Is USB a reasonable choice for a local bus?
what are pros and cons?
what reliability concerns are there?
**Bus spec** device count ~4; peripheral devices are permanently connected to same PCB as host (soldered or via headers).
Some device are puny, e.g. serial port or temperature sensor, some are complex, e.g. an LTE modem or ethernet or wifi. Peripherals are such that are available as standalone USB devices or same chips are used in such devices. Linux is supposed to have all the drivers already.
Ideally I'd use only one bus (with hubs if necessary) for simplicity and eventually modifications without some components and with other low-speed components.
**System spec** ARM, Linux, DC powered, roughly equivalent to an Android tablet. | 2014/05/12 | [
"https://electronics.stackexchange.com/questions/110115",
"https://electronics.stackexchange.com",
"https://electronics.stackexchange.com/users/-1/"
] | What you are looking at is a problem I like to call *bus hierarchy*.
You have high speed devices that need a fast low-latency path to the CPU (like the LTE modem) and slow devices like the temperature sensor. Connecting a full fledged LTE modem over I2C will seriously bottleneck the system. And connecting a temperature sensor on USB is a serious overkill. You need to prioritize.
What devices are to be accessed most often? Which ones need to respond quickly? And which don't need that much bandwidth?
Feel free to edit your question.
---
**Edit:**
USB may not be such an overkill after all. Only in the latest versions of it (2.0, 3.0) it has gotten the notion of being targeted to fast peripherals only. Before that, it was simply a *Universal Serial Bus*.
This doesn't change anything on the fact that it's implementation cost is very often too high. | Unless the device already has a USB interface, such as a keyboard or mouse, this is going to entail a lot of work and extra hardware. For example, connecting to a temperature sensor that only has an I2C interface. You are not going to be able to add a USB interface to the sensor, so you will have to add a small microcontroller, such as a PIC18 that has both a USB device and I2C interface. The PIC then talks USB back to your host and I2C to the temperature sensor. But why not just connect the temperature sensor directly to your host microcontroller? |
110,115 | Is USB a reasonable choice for a local bus?
what are pros and cons?
what reliability concerns are there?
**Bus spec** device count ~4; peripheral devices are permanently connected to same PCB as host (soldered or via headers).
Some device are puny, e.g. serial port or temperature sensor, some are complex, e.g. an LTE modem or ethernet or wifi. Peripherals are such that are available as standalone USB devices or same chips are used in such devices. Linux is supposed to have all the drivers already.
Ideally I'd use only one bus (with hubs if necessary) for simplicity and eventually modifications without some components and with other low-speed components.
**System spec** ARM, Linux, DC powered, roughly equivalent to an Android tablet. | 2014/05/12 | [
"https://electronics.stackexchange.com/questions/110115",
"https://electronics.stackexchange.com",
"https://electronics.stackexchange.com/users/-1/"
] | What you are looking at is a problem I like to call *bus hierarchy*.
You have high speed devices that need a fast low-latency path to the CPU (like the LTE modem) and slow devices like the temperature sensor. Connecting a full fledged LTE modem over I2C will seriously bottleneck the system. And connecting a temperature sensor on USB is a serious overkill. You need to prioritize.
What devices are to be accessed most often? Which ones need to respond quickly? And which don't need that much bandwidth?
Feel free to edit your question.
---
**Edit:**
USB may not be such an overkill after all. Only in the latest versions of it (2.0, 3.0) it has gotten the notion of being targeted to fast peripherals only. Before that, it was simply a *Universal Serial Bus*.
This doesn't change anything on the fact that it's implementation cost is very often too high. | SPI
Pros
* good for 50Mhz
* can communicate with multiple slaves
* simple protocol
* Full duplex
Cons
* Not a standard interface
I2C
Pros
* many slow chips uses I2C
* broadcast protocol where multiple slaves can reside on the bus
Cons
* slow speed
* more complicated than spi
USB
Pros
* standard interface
* probably driver ready and tested
Cons
* very complicated to debug
* with hub, the peripherals will share bandwidth
Other interfaces include SDIO, UART etc
Again as already mentioned, you will have to define the bus hierarchy with your bandwidth requirements. Probably the LTE modem would require a direct memory interface or a PCI interface.
Also there are phy translators like FTD232 (<http://www.ftdichip.com/FTProducts.htm>) which can do USB-Spi, usb-uart etc and is widely used |
110,115 | Is USB a reasonable choice for a local bus?
what are pros and cons?
what reliability concerns are there?
**Bus spec** device count ~4; peripheral devices are permanently connected to same PCB as host (soldered or via headers).
Some device are puny, e.g. serial port or temperature sensor, some are complex, e.g. an LTE modem or ethernet or wifi. Peripherals are such that are available as standalone USB devices or same chips are used in such devices. Linux is supposed to have all the drivers already.
Ideally I'd use only one bus (with hubs if necessary) for simplicity and eventually modifications without some components and with other low-speed components.
**System spec** ARM, Linux, DC powered, roughly equivalent to an Android tablet. | 2014/05/12 | [
"https://electronics.stackexchange.com/questions/110115",
"https://electronics.stackexchange.com",
"https://electronics.stackexchange.com/users/-1/"
] | Unless the device already has a USB interface, such as a keyboard or mouse, this is going to entail a lot of work and extra hardware. For example, connecting to a temperature sensor that only has an I2C interface. You are not going to be able to add a USB interface to the sensor, so you will have to add a small microcontroller, such as a PIC18 that has both a USB device and I2C interface. The PIC then talks USB back to your host and I2C to the temperature sensor. But why not just connect the temperature sensor directly to your host microcontroller? | Based on your needs, yes, usb is ideal. Keep in mind, the U does stand for universal. You can have usb nics, wifi, mouse/keyboard/touchpad/touchscreen, sound cards, webcams, hell, even usb displays. It's not the most effecient, but for two nics, a temperature sensore, and a serial device, its designed for it. So much that the majority of computing device manufacturers rely on it heavily.\*\* Not just cheapo sbcs or tablets, but even heavy hitters like Apple and Dell use it for touchpads and keyboards and webcams and wifi and bluetooth and ir ports in all their laptops.\*\*
USB is ubiquitos, easy to implement, and has a very low board cost in terms of routing and parts.
While you can get 4 port arm devices, most have one or two root ports (buses), then connected to a hub ic. Your biggest bottle neck will be mixing High speed devices with Full or Low speed devices on a single hub. Cheap hub ICs have a Single Transaction Translator, that can bring a single low or medium speed downstream device to a high speed uplink. Better ones will have a MTT, Multiple Transaction Translators, so multiple low speed devices can be bridged at high speed speed. Or simply ensure that the low speed are on one hub while high speed on another.
But since you have arm as the intended SOC, you will have access to proper buses for sound or i2c or spi (for the temp sensor or serial) or video or even a built in ethernet driver minus the magnetics. Higher end ARM chips comparable to cheap Android tablets or routers are fully loaded. |
110,115 | Is USB a reasonable choice for a local bus?
what are pros and cons?
what reliability concerns are there?
**Bus spec** device count ~4; peripheral devices are permanently connected to same PCB as host (soldered or via headers).
Some device are puny, e.g. serial port or temperature sensor, some are complex, e.g. an LTE modem or ethernet or wifi. Peripherals are such that are available as standalone USB devices or same chips are used in such devices. Linux is supposed to have all the drivers already.
Ideally I'd use only one bus (with hubs if necessary) for simplicity and eventually modifications without some components and with other low-speed components.
**System spec** ARM, Linux, DC powered, roughly equivalent to an Android tablet. | 2014/05/12 | [
"https://electronics.stackexchange.com/questions/110115",
"https://electronics.stackexchange.com",
"https://electronics.stackexchange.com/users/-1/"
] | Unless the device already has a USB interface, such as a keyboard or mouse, this is going to entail a lot of work and extra hardware. For example, connecting to a temperature sensor that only has an I2C interface. You are not going to be able to add a USB interface to the sensor, so you will have to add a small microcontroller, such as a PIC18 that has both a USB device and I2C interface. The PIC then talks USB back to your host and I2C to the temperature sensor. But why not just connect the temperature sensor directly to your host microcontroller? | SPI
Pros
* good for 50Mhz
* can communicate with multiple slaves
* simple protocol
* Full duplex
Cons
* Not a standard interface
I2C
Pros
* many slow chips uses I2C
* broadcast protocol where multiple slaves can reside on the bus
Cons
* slow speed
* more complicated than spi
USB
Pros
* standard interface
* probably driver ready and tested
Cons
* very complicated to debug
* with hub, the peripherals will share bandwidth
Other interfaces include SDIO, UART etc
Again as already mentioned, you will have to define the bus hierarchy with your bandwidth requirements. Probably the LTE modem would require a direct memory interface or a PCI interface.
Also there are phy translators like FTD232 (<http://www.ftdichip.com/FTProducts.htm>) which can do USB-Spi, usb-uart etc and is widely used |
15,586 | I'm looking for malware detection dataset. I have found some but they have very few features from the pe headers, which is not helpful for detecting malware as APIs/resource .... It would be better if there is raw files and i extract the features myself in a server. | 2019/08/09 | [
"https://opendata.stackexchange.com/questions/15586",
"https://opendata.stackexchange.com",
"https://opendata.stackexchange.com/users/22387/"
] | we created Windows API calls sequence of metamorphic malware. In our research, we have translated the families produced by each of the software into 8 main malware families: Trojan, Backdoor, Downloader, Worms, Spyware Adware, Dropper, Virus.
<https://github.com/ocatak/malware_api_class> | Endgame Malware BEnchmark for Research
======================================
The **[EMBER](https://github.com/endgameinc/ember)** dataset is a collection of features from PE files that serve as a benchmark dataset for researchers. The EMBER2017 dataset contained features from 1.1 million PE files scanned in or before 2017 and the EMBER2018 dataset contains features from 1 million PE files scanned in or before 2018. This repository makes it easy to reproducibly train the benchmark models, extend the provided feature set, or classify new PE files with the benchmark models.
This paper describes many more details about the dataset: <https://arxiv.org/abs/1804.04637>
This is the best suitable data set I have found for malware detection. |
18,363 | I had a gmail account and someone accessed it by changing my password. I am extremely angry about this. I changed my password and they accessed it again and changed it once more. I think she was able to reset my password by selecting that she no longer had access to the previous password and secondary email.
I have had a text message from this person who claims she has copies of all the email messages that were in there. Because she accessed it a second time, I have since cancelled the account all together. What can be done about this? | 2011/08/23 | [
"https://webapps.stackexchange.com/questions/18363",
"https://webapps.stackexchange.com",
"https://webapps.stackexchange.com/users/12935/"
] | I'm very sorry to hear about your experience.
If you are able to access the account, I would strongly recommend going through the [Gmail Security Checklist](https://mail.google.com/support/bin/static.py?page=checklist.cs&tab=29488). Since the intruder was able to get in a second time, it's highly likely that they have access to one of your recovery methods (backup email address, answer to the security question, etc) or they have installed a keylogger on your computer. The security checklist will take you through all the steps to check all of these areas and re-secure your account.
However, you mentioned that you have cancelled the account, so I am guessing you are less interested in re-securing the account and more interested in recovering from the situation.
I recommend running full malware scans on your computer, and changing the passwords for any websites associated with your email address, especially if those websites ever emailed you your password in plain text. You might also consider whether pursuing legal action against the intruder is appropriate; depending on the laws where you live, you may have some recourse. | [This article](http://knol.google.com/k/how-to-recover-a-hacked-or-compromised-gmail-account#) has a fairly detailed list of the thing(s) you need to do. I have quoted some of the process below:
>
> Additional Recovery Information
>
>
> Doing a password reset is the easiest way to regain access to an
> account. But it can fail if you forgot your secret question, if the
> recover e-mail address is no longer valid, or it the account was
> compromised and that information changed.
>
>
> The Account Recovery Form is the alternative method. It is important
> that you complete as much of the form as possible, and that the
> information be as accurate as you can make it. If the form is
> rejected you can try submitting it again. You can re-submit it as
> many times as you want, but always wait for a reply to each submission
> before submitting again. If you don't receive a reply, check your
> spam/junk folder (especially if it's a non-Gmail account).
>
>
> It's very important that as you repeatedly submit the Account Recovery
> Form that you fill in more of the blanks with more accurate
> information. There is some threshold of correct information you need
> to prove ownership, so a rejection means you need to supply more.
> Submitting the same form with no additional information multiple times
> does not help.
>
>
> While this system works for many people, there are some cases where it
> can be very frustrating. But don't give up. There's nothing you can
> do (like deleting the account) until you re-gain access to it and
> since Google does not offer live one on one support for the free Gmail
> product directly these are your options.
>
>
> Also realize that the more complicated account recover process (that
> very few people need to use) is one of the trade-offs for not being
> forced to provide a lot of personal information when you create the
> account (that everyone has to do). Many people prefer this for
> privacy reasons.
>
>
> Hints for successful account recovery It's not about the number of
> times you submit the Account Recovery Form, it's about providing more
> and better answers with each attempt. If your submission is rejected,
> you must work harder to provide more answers, and make the answers
> more accurate in subsequent submissions. Wait for a response before
> each new submission (be sure to check Spam). Responses could be
> delayed as much as 24 hours but you should wait a full 48 hours before
> submitting another form. If you are not receiving a response, check
> your Spam or Junk folder on the account you specified for replies.
> Also double (triple) check that you correctly spelled the e-mail
> account name. Duplicate submissions, or submissions without waiting
> for a reply can trigger a submission lock forcing you to wait a few
> days to try again. Make your best guess on every field of the form.
> You never know what will help.
>
>
> There may be one other option for simple password recovery if your
> account wasn't compromised and you simply forgot your password. If
> you have your browser setup to remember your account information you
> may be able to view your saved password. In Firefox, you can use:
> Tools->Options, Security, Saved Password, Show Passwords. If you use
> another browser, then (install and) open Firefox, use File->Import to
> import your settings and then check to see if the saved password is
> accessible. Again, this only works for people who forgot their
> password due to relying on the browser's auto-fill function, but if it
> applies it might be an easier than the above procedures.
>
>
> |
18,363 | I had a gmail account and someone accessed it by changing my password. I am extremely angry about this. I changed my password and they accessed it again and changed it once more. I think she was able to reset my password by selecting that she no longer had access to the previous password and secondary email.
I have had a text message from this person who claims she has copies of all the email messages that were in there. Because she accessed it a second time, I have since cancelled the account all together. What can be done about this? | 2011/08/23 | [
"https://webapps.stackexchange.com/questions/18363",
"https://webapps.stackexchange.com",
"https://webapps.stackexchange.com/users/12935/"
] | [This article](http://knol.google.com/k/how-to-recover-a-hacked-or-compromised-gmail-account#) has a fairly detailed list of the thing(s) you need to do. I have quoted some of the process below:
>
> Additional Recovery Information
>
>
> Doing a password reset is the easiest way to regain access to an
> account. But it can fail if you forgot your secret question, if the
> recover e-mail address is no longer valid, or it the account was
> compromised and that information changed.
>
>
> The Account Recovery Form is the alternative method. It is important
> that you complete as much of the form as possible, and that the
> information be as accurate as you can make it. If the form is
> rejected you can try submitting it again. You can re-submit it as
> many times as you want, but always wait for a reply to each submission
> before submitting again. If you don't receive a reply, check your
> spam/junk folder (especially if it's a non-Gmail account).
>
>
> It's very important that as you repeatedly submit the Account Recovery
> Form that you fill in more of the blanks with more accurate
> information. There is some threshold of correct information you need
> to prove ownership, so a rejection means you need to supply more.
> Submitting the same form with no additional information multiple times
> does not help.
>
>
> While this system works for many people, there are some cases where it
> can be very frustrating. But don't give up. There's nothing you can
> do (like deleting the account) until you re-gain access to it and
> since Google does not offer live one on one support for the free Gmail
> product directly these are your options.
>
>
> Also realize that the more complicated account recover process (that
> very few people need to use) is one of the trade-offs for not being
> forced to provide a lot of personal information when you create the
> account (that everyone has to do). Many people prefer this for
> privacy reasons.
>
>
> Hints for successful account recovery It's not about the number of
> times you submit the Account Recovery Form, it's about providing more
> and better answers with each attempt. If your submission is rejected,
> you must work harder to provide more answers, and make the answers
> more accurate in subsequent submissions. Wait for a response before
> each new submission (be sure to check Spam). Responses could be
> delayed as much as 24 hours but you should wait a full 48 hours before
> submitting another form. If you are not receiving a response, check
> your Spam or Junk folder on the account you specified for replies.
> Also double (triple) check that you correctly spelled the e-mail
> account name. Duplicate submissions, or submissions without waiting
> for a reply can trigger a submission lock forcing you to wait a few
> days to try again. Make your best guess on every field of the form.
> You never know what will help.
>
>
> There may be one other option for simple password recovery if your
> account wasn't compromised and you simply forgot your password. If
> you have your browser setup to remember your account information you
> may be able to view your saved password. In Firefox, you can use:
> Tools->Options, Security, Saved Password, Show Passwords. If you use
> another browser, then (install and) open Firefox, use File->Import to
> import your settings and then check to see if the saved password is
> accessible. Again, this only works for people who forgot their
> password due to relying on the browser's auto-fill function, but if it
> applies it might be an easier than the above procedures.
>
>
> | [This article](http://email.about.com/od/gmailtips/qt/How-To-Find-Out-Whos-Accessing-Your-Gmail-Account-And-Revoke-Access.htm) explains how you can see who or what is accessing your Gmail account. If it's a third-party application you can revoke it, otherwise you'll at leath know who has accessed the account so to know what you're up against. |
18,363 | I had a gmail account and someone accessed it by changing my password. I am extremely angry about this. I changed my password and they accessed it again and changed it once more. I think she was able to reset my password by selecting that she no longer had access to the previous password and secondary email.
I have had a text message from this person who claims she has copies of all the email messages that were in there. Because she accessed it a second time, I have since cancelled the account all together. What can be done about this? | 2011/08/23 | [
"https://webapps.stackexchange.com/questions/18363",
"https://webapps.stackexchange.com",
"https://webapps.stackexchange.com/users/12935/"
] | I'm very sorry to hear about your experience.
If you are able to access the account, I would strongly recommend going through the [Gmail Security Checklist](https://mail.google.com/support/bin/static.py?page=checklist.cs&tab=29488). Since the intruder was able to get in a second time, it's highly likely that they have access to one of your recovery methods (backup email address, answer to the security question, etc) or they have installed a keylogger on your computer. The security checklist will take you through all the steps to check all of these areas and re-secure your account.
However, you mentioned that you have cancelled the account, so I am guessing you are less interested in re-securing the account and more interested in recovering from the situation.
I recommend running full malware scans on your computer, and changing the passwords for any websites associated with your email address, especially if those websites ever emailed you your password in plain text. You might also consider whether pursuing legal action against the intruder is appropriate; depending on the laws where you live, you may have some recourse. | [This article](http://email.about.com/od/gmailtips/qt/How-To-Find-Out-Whos-Accessing-Your-Gmail-Account-And-Revoke-Access.htm) explains how you can see who or what is accessing your Gmail account. If it's a third-party application you can revoke it, otherwise you'll at leath know who has accessed the account so to know what you're up against. |
19,349 | I joined my company about two years ago and the company grew rapidly in size from a very young tech organization of about 100 employees to IPO, especially thanks to my department and - according to the official reviews - many of my own contributions.
I joined as a junior after college and grew to manager. Since the company profits have grown exponentially, they have slowly started hiring much more experienced and qualified new staff to help (and potentially replace? Happened a few times already!!) all graduate-aged "seniors" like myself.
My concern is that my specific job area is quite knowledge-based (IT and business integration) and all newcomers have Masters and PhDs from very prestigious universities! I am a bit clueless as to how I can get on par with all of them without returning to higher education. My undergraduate degree is in the humanities and I learned all my IT skills on the job. I am aware that IT is much much larger than what you actually learn on the job.
I hope you see why I am worried - I would like to continue on my successful path in this company, so what can I do to self-train and avoid being ousted by all these super-qualified newcomers? | 2014/02/16 | [
"https://workplace.stackexchange.com/questions/19349",
"https://workplace.stackexchange.com",
"https://workplace.stackexchange.com/users/15919/"
] | As you said, you are already a ***manager***, and a manager has a totally different skill set. Now that you handle more people, you should undergo managerial training and get certificates. I know that you are overpowered by your subordinates in terms of technical skills, but they are ***not*** in the managerial position. You ***are***. You ***handle*** them.
This is very true not only in your company, but in other companies in all countries as well. I think this is an inevitable phenomena, unless the *managers* also want to be too skilled technically. In my own opinion, managing is difficult to do while doing the technical stuff. Those two things are just hard to fit all in mind, unless you are indeed bright.
Regarding your other question:
"**will managerial skills alone stay in demand, without a complement of technical skills?**"
Of course! Managing is a whole different thing. However, with the growing population of professionals, you might ***want*** to have the technical skills to have an ***edge*** over the others.
What you can do:
1. Attend training and seminars about management (for example, project management).
2. Know what you lack in terms of technical stuff. Once identified, evaluate if you can learn them while studying management.
3. Know your career path. Do you want to pursue being a technical professional, or being a manager?
4. You can take up master's degree and doctoral degree while working, if you want to have your ***reputation*** raised.
Don't be afraid of being ousted by others. You have already proven your worth in the company, keep that in mind. However, of course, don't be left behind. Keep abreast of the latest trends and information in the world of IT. You are already a ***senior*** member of the organization. You ***own*** a part of the company. | I would say that, first of all, it *is* important to stay technically on top of your field, even in addition to being a good people manager.
You ask, ""will managerial skills alone stay in demand, without a complement of technical skills?"
This question assumes that you *have* any managerial skills. Don't get me wrong, I'm not trying to insult you, but I think that's a very *dangerous* assumption to make - because if you're wrong, and as a result, you neglect your technical abilities, you may find yourself out of a job. Assuming you're not a good manager will let you determine what you need to do next to improve.
I often see managers in the technical field who have no managerial skills *or* technical skills. As is often the case, they are strong coders that get promoted to lead groups of coders. Of course, they never had any leadership skill, it was all coding skills. And since now they are no longer responsible for day-to-day coding, they get sloppy.
So, for starters, my advice would be to **please assume both your management skills AND your technical skills need constant improvement.**
In regards to staying on top of your field
------------------------------------------
* Do side projects in your spare time that use that language
* Ask your team members about things you don't understand. In addition to learning, they will respect you more. (No one likes someone who acts like they know everything.)
* Stay up-to-date with the field. For example, as a JavaScript programmer, I watch Youtube videos from the JSConf channel where people talk about new developments. I am sure that Python, C# and other concentrations have equivalent Youtube channels too |
6,209 | I am an assistant professor preparing a 5 lecture series 'introduction to programming'. The target audience are first year engineering undergrads - from a mix of mechanical, electrical, electronic, telecomms and civil engineering majors. Some of these students will never have programmed before. We will use Matlab.
I am expecting that many of these students will never have coded before and almost all will not have seen Matlab before. They will need Matlab in all subsequent years of their degree.
Given the extremely limited time for this course, how can I give best bang for their buck, without it being too dry?
Is there something cool we could work towards creating over the 5 weeks?
More info: There are 5 x 4 hours sessions. Classroom cannot be flipped as there will be 50+ students.
Editing here to thank everyone who has taken the time and effort to give extremely helpful detailed replies. I appreciate it guys. | 2020/02/25 | [
"https://cseducators.stackexchange.com/questions/6209",
"https://cseducators.stackexchange.com",
"https://cseducators.stackexchange.com/users/8935/"
] | I teach an introductory programming course, with many students who have never programmed before. My course is 13 weeks, but the first 5 cover what I consider to be the basics. I have 3 hours of lectures and 2 hours of labs per week.
So here's a suggestion for 5 weeks:
Week 1: The basic idea of thinking algorithmically, ordering the steps of a process. You can use the logo turtle to get them to "write some code" on day 1. (see for instance the online editor here: <https://www.tortue-logo.fr/en/logo-turtle>). Then teach variables and expressions, decomposing an arithmetic computation in several steps (e.g. calculating how much you'll spend per month on gasoline, given the distance to your workplace, the mileage of your car, and the price of gas).
Week 2: using if conditions and boolean expressions, with or/and. Incorporating those into algorithms. What you can code with that: things like the absolute value, compute the solutions of a second-degree equation (using built-in square root), calculate income tax in a toy setting (with several tax brackets). If time permits, start talking about loops.
Week 3: Loops. Once you have the semantics of the while / for statements, you show them a classic algorithm such as Euclid's GCD algorithm: describe it by a flowchart and show how to translate it to code. Then move on to trying to figure out the steps of solving a problem, showing them classic techniques like using an accumulator to compute a sum (e.g. the sum of even integers between A and B).
Week 4: Functions. How you can package a computation in a function, with inputs and related outputs. Insists on the goals of modularity, abstraction, etc.
Week 5: Working with lists and / or matrices (since Matlab is heavily focused on matrices). By the end of it they can't do terribly "fun" stuff like games, but there are some scientific applications of interest, like a LFSR to do simple cryptography (that's what I do in my fifth-week lab). For students who aren't afraid of some math, there's plenty of useful math-oriented algorithms like approximating an integral (with rectangles or trapezes and such), using Heron's algorithm to approximate the square root, etc. I think with Matlab you can also plot graphs quite easily, so there are definitely interesting applications there. | I think I'd try to hook them with **image processing**. Maybe with [an edge detection algorithm](https://en.wikipedia.org/wiki/Canny_edge_detector) or [something else along those lines](https://en.wikipedia.org/wiki/Feature_detection_(computer_vision)#Feature_detectors).
Topics that get naturally covered:
* Basic syntax, data, and other features of the language
* Basic program structure and design (not many libraries needed, you get to cook the dark magic yourself)
* Matrix manipulation, (algebra and entrywise)
* "The scientist's approach to programming": try something, look at the result (literally in this case, because the results are pictures), and if it looks good, move on and build on that result. We're not trying to create software engineers here.
Particular benefits:
* Matlab (or Octave) might actually be a good choice for implementing image processing algorithms in the real world, so the topic doesn't feel forced. (Somewhat unlike using Matlab for "intro to programming"..)
* Shows Matlab and programming as a tool for getting work done ("oh, the source image needs to be rotated? Hold on while I whip up this nifty rotation matrix..")
* In case the students don't yet see matrices as the best thing since Sliced ([2019](https://en.wikipedia.org/wiki/Sliced_(TV_series))), this might double as a sales pitch for matrix algebra too.
* **Pretty pictures!**
(Really, the final bullet point is the important thing. Finding the result to an interesting physics problem just doesn't cut it as the behaviour-reinforcing reward a beginning programming student needs. With image manipulation, it's not entirely unheard of that some even fiddle with the code in their free time.) |
6,209 | I am an assistant professor preparing a 5 lecture series 'introduction to programming'. The target audience are first year engineering undergrads - from a mix of mechanical, electrical, electronic, telecomms and civil engineering majors. Some of these students will never have programmed before. We will use Matlab.
I am expecting that many of these students will never have coded before and almost all will not have seen Matlab before. They will need Matlab in all subsequent years of their degree.
Given the extremely limited time for this course, how can I give best bang for their buck, without it being too dry?
Is there something cool we could work towards creating over the 5 weeks?
More info: There are 5 x 4 hours sessions. Classroom cannot be flipped as there will be 50+ students.
Editing here to thank everyone who has taken the time and effort to give extremely helpful detailed replies. I appreciate it guys. | 2020/02/25 | [
"https://cseducators.stackexchange.com/questions/6209",
"https://cseducators.stackexchange.com",
"https://cseducators.stackexchange.com/users/8935/"
] | I studied and TA'd electrical engineering and computer science in college and graduate school. You have a unique opportunity versus most introductory programming languages that use general languages like java or python because Matlab, which is a portmanteau for "Matrix Laboratory", is a language that is meant to be very interactive, intuitive to mathematically-savvy students, and easy to pick up and includes the constructs of 1-d vectors, 2-d matrices, and n-dimensional tensors as first-order data structures (I know you know all this, but I'm stating it for other readers who may be less familiar with this language).
Most of your students will have a background in linear algebra and matrix notation and use in mathematics from their courses in all of the state engineering disciplines. Therefore, you can focus less on teaching fundamental of data types, data structure, control flow logic, hierarchy and namespaces, and instead build up from intuitive Matrix-like mathematical operations that naturally have sequences of repeating steps with exit conditions.
* 1st-week of introduction to typical matrix problems in the engineering sciences, and walking them through building the simple scripts to execute those.
* 2nd-week add Matlab function wrapper per file concept as an introduction to hierarchy and namespace (informally, this is how it works, not focusing on the deeper theoretical aspects) of scoping local variables in input/return values.
* 3rd-week show how there are lots of the simple operations (like matrix multiples, inverting matrices, DFT and FFT, that are prebuilt library functions, and study some tradeoffs on choosing them and how they deal with padding, non-invertible data sets, etc.)
* 4th and 5th-week focus on a large programming project that does something interesting with larger data and doing something iterative like gradient descent on a simple pattern match like regression, or simple cases of convex cost function search, or even backpropagation in a 3-layer neural network.
Pre-build much of the base and helper code and have them learn how to use what they learned so far to code the inner loop of the iterations. Definitely give them the code that they can easily tweek so they get some experience generating graphics to demonstrate (and debug) the optimization iteration sequence. | I think I'd try to hook them with **image processing**. Maybe with [an edge detection algorithm](https://en.wikipedia.org/wiki/Canny_edge_detector) or [something else along those lines](https://en.wikipedia.org/wiki/Feature_detection_(computer_vision)#Feature_detectors).
Topics that get naturally covered:
* Basic syntax, data, and other features of the language
* Basic program structure and design (not many libraries needed, you get to cook the dark magic yourself)
* Matrix manipulation, (algebra and entrywise)
* "The scientist's approach to programming": try something, look at the result (literally in this case, because the results are pictures), and if it looks good, move on and build on that result. We're not trying to create software engineers here.
Particular benefits:
* Matlab (or Octave) might actually be a good choice for implementing image processing algorithms in the real world, so the topic doesn't feel forced. (Somewhat unlike using Matlab for "intro to programming"..)
* Shows Matlab and programming as a tool for getting work done ("oh, the source image needs to be rotated? Hold on while I whip up this nifty rotation matrix..")
* In case the students don't yet see matrices as the best thing since Sliced ([2019](https://en.wikipedia.org/wiki/Sliced_(TV_series))), this might double as a sales pitch for matrix algebra too.
* **Pretty pictures!**
(Really, the final bullet point is the important thing. Finding the result to an interesting physics problem just doesn't cut it as the behaviour-reinforcing reward a beginning programming student needs. With image manipulation, it's not entirely unheard of that some even fiddle with the code in their free time.) |
6,209 | I am an assistant professor preparing a 5 lecture series 'introduction to programming'. The target audience are first year engineering undergrads - from a mix of mechanical, electrical, electronic, telecomms and civil engineering majors. Some of these students will never have programmed before. We will use Matlab.
I am expecting that many of these students will never have coded before and almost all will not have seen Matlab before. They will need Matlab in all subsequent years of their degree.
Given the extremely limited time for this course, how can I give best bang for their buck, without it being too dry?
Is there something cool we could work towards creating over the 5 weeks?
More info: There are 5 x 4 hours sessions. Classroom cannot be flipped as there will be 50+ students.
Editing here to thank everyone who has taken the time and effort to give extremely helpful detailed replies. I appreciate it guys. | 2020/02/25 | [
"https://cseducators.stackexchange.com/questions/6209",
"https://cseducators.stackexchange.com",
"https://cseducators.stackexchange.com/users/8935/"
] | With only 5 sessions, I would abandon the idea of building something cool, and focus with laser-like precision on whatever they *need to know* going forward in their coursework. There is such a small amount of time to learn the basics of any programming language.
MatLab supports lambdas, objects, and GUI design, but unless they are going to get into rather serious programming, I imagine that you would steer clear of these. (I don't know how you would cover any of them in 5 days with novices in any case.)
The danger in heading towards UI and a game is that they will come out without being able to do what they presumably need in the next class, such as matrix multiplication, or graphing an integral multiplication. You may be better using your five sessions to delve into five areas of greatest need, as determined by the future required coursework of your students. | I studied and TA'd electrical engineering and computer science in college and graduate school. You have a unique opportunity versus most introductory programming languages that use general languages like java or python because Matlab, which is a portmanteau for "Matrix Laboratory", is a language that is meant to be very interactive, intuitive to mathematically-savvy students, and easy to pick up and includes the constructs of 1-d vectors, 2-d matrices, and n-dimensional tensors as first-order data structures (I know you know all this, but I'm stating it for other readers who may be less familiar with this language).
Most of your students will have a background in linear algebra and matrix notation and use in mathematics from their courses in all of the state engineering disciplines. Therefore, you can focus less on teaching fundamental of data types, data structure, control flow logic, hierarchy and namespaces, and instead build up from intuitive Matrix-like mathematical operations that naturally have sequences of repeating steps with exit conditions.
* 1st-week of introduction to typical matrix problems in the engineering sciences, and walking them through building the simple scripts to execute those.
* 2nd-week add Matlab function wrapper per file concept as an introduction to hierarchy and namespace (informally, this is how it works, not focusing on the deeper theoretical aspects) of scoping local variables in input/return values.
* 3rd-week show how there are lots of the simple operations (like matrix multiples, inverting matrices, DFT and FFT, that are prebuilt library functions, and study some tradeoffs on choosing them and how they deal with padding, non-invertible data sets, etc.)
* 4th and 5th-week focus on a large programming project that does something interesting with larger data and doing something iterative like gradient descent on a simple pattern match like regression, or simple cases of convex cost function search, or even backpropagation in a 3-layer neural network.
Pre-build much of the base and helper code and have them learn how to use what they learned so far to code the inner loop of the iterations. Definitely give them the code that they can easily tweek so they get some experience generating graphics to demonstrate (and debug) the optimization iteration sequence. |
6,209 | I am an assistant professor preparing a 5 lecture series 'introduction to programming'. The target audience are first year engineering undergrads - from a mix of mechanical, electrical, electronic, telecomms and civil engineering majors. Some of these students will never have programmed before. We will use Matlab.
I am expecting that many of these students will never have coded before and almost all will not have seen Matlab before. They will need Matlab in all subsequent years of their degree.
Given the extremely limited time for this course, how can I give best bang for their buck, without it being too dry?
Is there something cool we could work towards creating over the 5 weeks?
More info: There are 5 x 4 hours sessions. Classroom cannot be flipped as there will be 50+ students.
Editing here to thank everyone who has taken the time and effort to give extremely helpful detailed replies. I appreciate it guys. | 2020/02/25 | [
"https://cseducators.stackexchange.com/questions/6209",
"https://cseducators.stackexchange.com",
"https://cseducators.stackexchange.com/users/8935/"
] | With only 5 sessions, I would abandon the idea of building something cool, and focus with laser-like precision on whatever they *need to know* going forward in their coursework. There is such a small amount of time to learn the basics of any programming language.
MatLab supports lambdas, objects, and GUI design, but unless they are going to get into rather serious programming, I imagine that you would steer clear of these. (I don't know how you would cover any of them in 5 days with novices in any case.)
The danger in heading towards UI and a game is that they will come out without being able to do what they presumably need in the next class, such as matrix multiplication, or graphing an integral multiplication. You may be better using your five sessions to delve into five areas of greatest need, as determined by the future required coursework of your students. | I don't know Matlab, so this answer is mostly about generic programming concepts.
The core of programming is problem solving, so I would think the best use of the limited time you have available would be to focus on computational thinking and providing them with the techniques they will need to be able to think their way around a problem sufficiently to be able to express a solution in code.
Matlab is of course designed specifically for solving problems rooted in various Scientific, Mathematical and Engineering domains, so ideally, any example programs you use for demonstration and explaining the concepts should be as close as possible to the types of problems that the students will be solving by themselves.
One of the pre-requisites for being able to write the code to solve a problem is to have gained a clear understanding of the problem being solved, so it would be useful to stick to problems which the learners would already be able to understand on-paper.
It could be useful to look at the Harvard CS50 syllabus as a starting point, it places a heavy emphasis on developing computational thinking skills by challenging learners to solve typical programming problems: <https://cs50.harvard.edu/ap/syllabus/>
Many of the concepts covered in the first 3-4 lessons of the CS50 syllabus are universally applicable to programming in any language, and David J Malan's delivery of these concepts in his lectures seems to go down very well with his students.
A number of other specific techniques which I believe would be useful:
* Problem decomposition, illustrated by describing a complex problem, analysing it and dividing into sub-problems.
* Steps to solving a problem by starting with example/test inputs, describing the steps, and reaching a result 'by-hand'.
* Pattern recognition and using generalisation to describe a solution using pseudocode, then translation into a runnable program
* Using the debugger to set breakpoints, inspect variables and step through code to find/fix errors.
Terminology, as well as the 'grammar' of the language is of course important too - there's a lot of jargon to to absorb in a very limited space of time.
Newcomers frequently find themselves spending a great deal of time attempting to decypher syntax errors, so some of the most important terminology for them to understand will be the words/phrases which frequently appear in the Matlab error frame - for example, misuse of particular symbols/operators, or incorrect use of particular data types.
Perhaps finally, make sure to include frequent reminders that they can (and should) be making extensive use of Google and StackOverflow to find out what the syntax errors and other jargon means as well. |
6,209 | I am an assistant professor preparing a 5 lecture series 'introduction to programming'. The target audience are first year engineering undergrads - from a mix of mechanical, electrical, electronic, telecomms and civil engineering majors. Some of these students will never have programmed before. We will use Matlab.
I am expecting that many of these students will never have coded before and almost all will not have seen Matlab before. They will need Matlab in all subsequent years of their degree.
Given the extremely limited time for this course, how can I give best bang for their buck, without it being too dry?
Is there something cool we could work towards creating over the 5 weeks?
More info: There are 5 x 4 hours sessions. Classroom cannot be flipped as there will be 50+ students.
Editing here to thank everyone who has taken the time and effort to give extremely helpful detailed replies. I appreciate it guys. | 2020/02/25 | [
"https://cseducators.stackexchange.com/questions/6209",
"https://cseducators.stackexchange.com",
"https://cseducators.stackexchange.com/users/8935/"
] | With only 5 sessions, I would abandon the idea of building something cool, and focus with laser-like precision on whatever they *need to know* going forward in their coursework. There is such a small amount of time to learn the basics of any programming language.
MatLab supports lambdas, objects, and GUI design, but unless they are going to get into rather serious programming, I imagine that you would steer clear of these. (I don't know how you would cover any of them in 5 days with novices in any case.)
The danger in heading towards UI and a game is that they will come out without being able to do what they presumably need in the next class, such as matrix multiplication, or graphing an integral multiplication. You may be better using your five sessions to delve into five areas of greatest need, as determined by the future required coursework of your students. | I teach programming to graduate students in public policy, with a focus on data. So while engineering students might be different, I think there will be a lot of similarities.
Unless you're running an intensive bootcamp where the students will be putting in far more hours than a typical class would call for (are you?), I think the biggest obstacle to doing "something cool" that you'll run into is the uneven abilities of new programmers.
As with my field, I imagine many of your students aren't interested in programming per se; they're interested in programming only as a means to do engineering. In a typical course, this means you're going to have some students still struggling with data types and functions after five weeks, while others are done with that after week one.
If I were teaching a 5-week course myself (I work primarily in Python), I would probably try to have everyone building a game by the end. Something basic, like a card game. While the goal isn't for them to be game developers, it's something many of your students will think is "cool", which will inspire them to get a grasp of how the language works along the way. I might then have them collect the results of iterations of the game into a dataset to do some basic data work with.
I'm not terribly familiar with Matlab, but if that's not a suitable goal for that platform, try to get as close to the game theme as you can. The mix of all types of engineers might make that difficult, but what about something that takes in the design of a wall, then calculations to knock it down? I'm not an engineer, but something that is only loosely practical, fun, and a good primer of the language. |
6,209 | I am an assistant professor preparing a 5 lecture series 'introduction to programming'. The target audience are first year engineering undergrads - from a mix of mechanical, electrical, electronic, telecomms and civil engineering majors. Some of these students will never have programmed before. We will use Matlab.
I am expecting that many of these students will never have coded before and almost all will not have seen Matlab before. They will need Matlab in all subsequent years of their degree.
Given the extremely limited time for this course, how can I give best bang for their buck, without it being too dry?
Is there something cool we could work towards creating over the 5 weeks?
More info: There are 5 x 4 hours sessions. Classroom cannot be flipped as there will be 50+ students.
Editing here to thank everyone who has taken the time and effort to give extremely helpful detailed replies. I appreciate it guys. | 2020/02/25 | [
"https://cseducators.stackexchange.com/questions/6209",
"https://cseducators.stackexchange.com",
"https://cseducators.stackexchange.com/users/8935/"
] | I teach programming to graduate students in public policy, with a focus on data. So while engineering students might be different, I think there will be a lot of similarities.
Unless you're running an intensive bootcamp where the students will be putting in far more hours than a typical class would call for (are you?), I think the biggest obstacle to doing "something cool" that you'll run into is the uneven abilities of new programmers.
As with my field, I imagine many of your students aren't interested in programming per se; they're interested in programming only as a means to do engineering. In a typical course, this means you're going to have some students still struggling with data types and functions after five weeks, while others are done with that after week one.
If I were teaching a 5-week course myself (I work primarily in Python), I would probably try to have everyone building a game by the end. Something basic, like a card game. While the goal isn't for them to be game developers, it's something many of your students will think is "cool", which will inspire them to get a grasp of how the language works along the way. I might then have them collect the results of iterations of the game into a dataset to do some basic data work with.
I'm not terribly familiar with Matlab, but if that's not a suitable goal for that platform, try to get as close to the game theme as you can. The mix of all types of engineers might make that difficult, but what about something that takes in the design of a wall, then calculations to knock it down? I'm not an engineer, but something that is only loosely practical, fun, and a good primer of the language. | I think I'd try to hook them with **image processing**. Maybe with [an edge detection algorithm](https://en.wikipedia.org/wiki/Canny_edge_detector) or [something else along those lines](https://en.wikipedia.org/wiki/Feature_detection_(computer_vision)#Feature_detectors).
Topics that get naturally covered:
* Basic syntax, data, and other features of the language
* Basic program structure and design (not many libraries needed, you get to cook the dark magic yourself)
* Matrix manipulation, (algebra and entrywise)
* "The scientist's approach to programming": try something, look at the result (literally in this case, because the results are pictures), and if it looks good, move on and build on that result. We're not trying to create software engineers here.
Particular benefits:
* Matlab (or Octave) might actually be a good choice for implementing image processing algorithms in the real world, so the topic doesn't feel forced. (Somewhat unlike using Matlab for "intro to programming"..)
* Shows Matlab and programming as a tool for getting work done ("oh, the source image needs to be rotated? Hold on while I whip up this nifty rotation matrix..")
* In case the students don't yet see matrices as the best thing since Sliced ([2019](https://en.wikipedia.org/wiki/Sliced_(TV_series))), this might double as a sales pitch for matrix algebra too.
* **Pretty pictures!**
(Really, the final bullet point is the important thing. Finding the result to an interesting physics problem just doesn't cut it as the behaviour-reinforcing reward a beginning programming student needs. With image manipulation, it's not entirely unheard of that some even fiddle with the code in their free time.) |
6,209 | I am an assistant professor preparing a 5 lecture series 'introduction to programming'. The target audience are first year engineering undergrads - from a mix of mechanical, electrical, electronic, telecomms and civil engineering majors. Some of these students will never have programmed before. We will use Matlab.
I am expecting that many of these students will never have coded before and almost all will not have seen Matlab before. They will need Matlab in all subsequent years of their degree.
Given the extremely limited time for this course, how can I give best bang for their buck, without it being too dry?
Is there something cool we could work towards creating over the 5 weeks?
More info: There are 5 x 4 hours sessions. Classroom cannot be flipped as there will be 50+ students.
Editing here to thank everyone who has taken the time and effort to give extremely helpful detailed replies. I appreciate it guys. | 2020/02/25 | [
"https://cseducators.stackexchange.com/questions/6209",
"https://cseducators.stackexchange.com",
"https://cseducators.stackexchange.com/users/8935/"
] | I teach an introductory programming course, with many students who have never programmed before. My course is 13 weeks, but the first 5 cover what I consider to be the basics. I have 3 hours of lectures and 2 hours of labs per week.
So here's a suggestion for 5 weeks:
Week 1: The basic idea of thinking algorithmically, ordering the steps of a process. You can use the logo turtle to get them to "write some code" on day 1. (see for instance the online editor here: <https://www.tortue-logo.fr/en/logo-turtle>). Then teach variables and expressions, decomposing an arithmetic computation in several steps (e.g. calculating how much you'll spend per month on gasoline, given the distance to your workplace, the mileage of your car, and the price of gas).
Week 2: using if conditions and boolean expressions, with or/and. Incorporating those into algorithms. What you can code with that: things like the absolute value, compute the solutions of a second-degree equation (using built-in square root), calculate income tax in a toy setting (with several tax brackets). If time permits, start talking about loops.
Week 3: Loops. Once you have the semantics of the while / for statements, you show them a classic algorithm such as Euclid's GCD algorithm: describe it by a flowchart and show how to translate it to code. Then move on to trying to figure out the steps of solving a problem, showing them classic techniques like using an accumulator to compute a sum (e.g. the sum of even integers between A and B).
Week 4: Functions. How you can package a computation in a function, with inputs and related outputs. Insists on the goals of modularity, abstraction, etc.
Week 5: Working with lists and / or matrices (since Matlab is heavily focused on matrices). By the end of it they can't do terribly "fun" stuff like games, but there are some scientific applications of interest, like a LFSR to do simple cryptography (that's what I do in my fifth-week lab). For students who aren't afraid of some math, there's plenty of useful math-oriented algorithms like approximating an integral (with rectangles or trapezes and such), using Heron's algorithm to approximate the square root, etc. I think with Matlab you can also plot graphs quite easily, so there are definitely interesting applications there. | I don't know Matlab, so this answer is mostly about generic programming concepts.
The core of programming is problem solving, so I would think the best use of the limited time you have available would be to focus on computational thinking and providing them with the techniques they will need to be able to think their way around a problem sufficiently to be able to express a solution in code.
Matlab is of course designed specifically for solving problems rooted in various Scientific, Mathematical and Engineering domains, so ideally, any example programs you use for demonstration and explaining the concepts should be as close as possible to the types of problems that the students will be solving by themselves.
One of the pre-requisites for being able to write the code to solve a problem is to have gained a clear understanding of the problem being solved, so it would be useful to stick to problems which the learners would already be able to understand on-paper.
It could be useful to look at the Harvard CS50 syllabus as a starting point, it places a heavy emphasis on developing computational thinking skills by challenging learners to solve typical programming problems: <https://cs50.harvard.edu/ap/syllabus/>
Many of the concepts covered in the first 3-4 lessons of the CS50 syllabus are universally applicable to programming in any language, and David J Malan's delivery of these concepts in his lectures seems to go down very well with his students.
A number of other specific techniques which I believe would be useful:
* Problem decomposition, illustrated by describing a complex problem, analysing it and dividing into sub-problems.
* Steps to solving a problem by starting with example/test inputs, describing the steps, and reaching a result 'by-hand'.
* Pattern recognition and using generalisation to describe a solution using pseudocode, then translation into a runnable program
* Using the debugger to set breakpoints, inspect variables and step through code to find/fix errors.
Terminology, as well as the 'grammar' of the language is of course important too - there's a lot of jargon to to absorb in a very limited space of time.
Newcomers frequently find themselves spending a great deal of time attempting to decypher syntax errors, so some of the most important terminology for them to understand will be the words/phrases which frequently appear in the Matlab error frame - for example, misuse of particular symbols/operators, or incorrect use of particular data types.
Perhaps finally, make sure to include frequent reminders that they can (and should) be making extensive use of Google and StackOverflow to find out what the syntax errors and other jargon means as well. |
6,209 | I am an assistant professor preparing a 5 lecture series 'introduction to programming'. The target audience are first year engineering undergrads - from a mix of mechanical, electrical, electronic, telecomms and civil engineering majors. Some of these students will never have programmed before. We will use Matlab.
I am expecting that many of these students will never have coded before and almost all will not have seen Matlab before. They will need Matlab in all subsequent years of their degree.
Given the extremely limited time for this course, how can I give best bang for their buck, without it being too dry?
Is there something cool we could work towards creating over the 5 weeks?
More info: There are 5 x 4 hours sessions. Classroom cannot be flipped as there will be 50+ students.
Editing here to thank everyone who has taken the time and effort to give extremely helpful detailed replies. I appreciate it guys. | 2020/02/25 | [
"https://cseducators.stackexchange.com/questions/6209",
"https://cseducators.stackexchange.com",
"https://cseducators.stackexchange.com/users/8935/"
] | With only 5 sessions, I would abandon the idea of building something cool, and focus with laser-like precision on whatever they *need to know* going forward in their coursework. There is such a small amount of time to learn the basics of any programming language.
MatLab supports lambdas, objects, and GUI design, but unless they are going to get into rather serious programming, I imagine that you would steer clear of these. (I don't know how you would cover any of them in 5 days with novices in any case.)
The danger in heading towards UI and a game is that they will come out without being able to do what they presumably need in the next class, such as matrix multiplication, or graphing an integral multiplication. You may be better using your five sessions to delve into five areas of greatest need, as determined by the future required coursework of your students. | I think I'd try to hook them with **image processing**. Maybe with [an edge detection algorithm](https://en.wikipedia.org/wiki/Canny_edge_detector) or [something else along those lines](https://en.wikipedia.org/wiki/Feature_detection_(computer_vision)#Feature_detectors).
Topics that get naturally covered:
* Basic syntax, data, and other features of the language
* Basic program structure and design (not many libraries needed, you get to cook the dark magic yourself)
* Matrix manipulation, (algebra and entrywise)
* "The scientist's approach to programming": try something, look at the result (literally in this case, because the results are pictures), and if it looks good, move on and build on that result. We're not trying to create software engineers here.
Particular benefits:
* Matlab (or Octave) might actually be a good choice for implementing image processing algorithms in the real world, so the topic doesn't feel forced. (Somewhat unlike using Matlab for "intro to programming"..)
* Shows Matlab and programming as a tool for getting work done ("oh, the source image needs to be rotated? Hold on while I whip up this nifty rotation matrix..")
* In case the students don't yet see matrices as the best thing since Sliced ([2019](https://en.wikipedia.org/wiki/Sliced_(TV_series))), this might double as a sales pitch for matrix algebra too.
* **Pretty pictures!**
(Really, the final bullet point is the important thing. Finding the result to an interesting physics problem just doesn't cut it as the behaviour-reinforcing reward a beginning programming student needs. With image manipulation, it's not entirely unheard of that some even fiddle with the code in their free time.) |
6,209 | I am an assistant professor preparing a 5 lecture series 'introduction to programming'. The target audience are first year engineering undergrads - from a mix of mechanical, electrical, electronic, telecomms and civil engineering majors. Some of these students will never have programmed before. We will use Matlab.
I am expecting that many of these students will never have coded before and almost all will not have seen Matlab before. They will need Matlab in all subsequent years of their degree.
Given the extremely limited time for this course, how can I give best bang for their buck, without it being too dry?
Is there something cool we could work towards creating over the 5 weeks?
More info: There are 5 x 4 hours sessions. Classroom cannot be flipped as there will be 50+ students.
Editing here to thank everyone who has taken the time and effort to give extremely helpful detailed replies. I appreciate it guys. | 2020/02/25 | [
"https://cseducators.stackexchange.com/questions/6209",
"https://cseducators.stackexchange.com",
"https://cseducators.stackexchange.com/users/8935/"
] | I studied and TA'd electrical engineering and computer science in college and graduate school. You have a unique opportunity versus most introductory programming languages that use general languages like java or python because Matlab, which is a portmanteau for "Matrix Laboratory", is a language that is meant to be very interactive, intuitive to mathematically-savvy students, and easy to pick up and includes the constructs of 1-d vectors, 2-d matrices, and n-dimensional tensors as first-order data structures (I know you know all this, but I'm stating it for other readers who may be less familiar with this language).
Most of your students will have a background in linear algebra and matrix notation and use in mathematics from their courses in all of the state engineering disciplines. Therefore, you can focus less on teaching fundamental of data types, data structure, control flow logic, hierarchy and namespaces, and instead build up from intuitive Matrix-like mathematical operations that naturally have sequences of repeating steps with exit conditions.
* 1st-week of introduction to typical matrix problems in the engineering sciences, and walking them through building the simple scripts to execute those.
* 2nd-week add Matlab function wrapper per file concept as an introduction to hierarchy and namespace (informally, this is how it works, not focusing on the deeper theoretical aspects) of scoping local variables in input/return values.
* 3rd-week show how there are lots of the simple operations (like matrix multiples, inverting matrices, DFT and FFT, that are prebuilt library functions, and study some tradeoffs on choosing them and how they deal with padding, non-invertible data sets, etc.)
* 4th and 5th-week focus on a large programming project that does something interesting with larger data and doing something iterative like gradient descent on a simple pattern match like regression, or simple cases of convex cost function search, or even backpropagation in a 3-layer neural network.
Pre-build much of the base and helper code and have them learn how to use what they learned so far to code the inner loop of the iterations. Definitely give them the code that they can easily tweek so they get some experience generating graphics to demonstrate (and debug) the optimization iteration sequence. | I don't know Matlab, so this answer is mostly about generic programming concepts.
The core of programming is problem solving, so I would think the best use of the limited time you have available would be to focus on computational thinking and providing them with the techniques they will need to be able to think their way around a problem sufficiently to be able to express a solution in code.
Matlab is of course designed specifically for solving problems rooted in various Scientific, Mathematical and Engineering domains, so ideally, any example programs you use for demonstration and explaining the concepts should be as close as possible to the types of problems that the students will be solving by themselves.
One of the pre-requisites for being able to write the code to solve a problem is to have gained a clear understanding of the problem being solved, so it would be useful to stick to problems which the learners would already be able to understand on-paper.
It could be useful to look at the Harvard CS50 syllabus as a starting point, it places a heavy emphasis on developing computational thinking skills by challenging learners to solve typical programming problems: <https://cs50.harvard.edu/ap/syllabus/>
Many of the concepts covered in the first 3-4 lessons of the CS50 syllabus are universally applicable to programming in any language, and David J Malan's delivery of these concepts in his lectures seems to go down very well with his students.
A number of other specific techniques which I believe would be useful:
* Problem decomposition, illustrated by describing a complex problem, analysing it and dividing into sub-problems.
* Steps to solving a problem by starting with example/test inputs, describing the steps, and reaching a result 'by-hand'.
* Pattern recognition and using generalisation to describe a solution using pseudocode, then translation into a runnable program
* Using the debugger to set breakpoints, inspect variables and step through code to find/fix errors.
Terminology, as well as the 'grammar' of the language is of course important too - there's a lot of jargon to to absorb in a very limited space of time.
Newcomers frequently find themselves spending a great deal of time attempting to decypher syntax errors, so some of the most important terminology for them to understand will be the words/phrases which frequently appear in the Matlab error frame - for example, misuse of particular symbols/operators, or incorrect use of particular data types.
Perhaps finally, make sure to include frequent reminders that they can (and should) be making extensive use of Google and StackOverflow to find out what the syntax errors and other jargon means as well. |
6,209 | I am an assistant professor preparing a 5 lecture series 'introduction to programming'. The target audience are first year engineering undergrads - from a mix of mechanical, electrical, electronic, telecomms and civil engineering majors. Some of these students will never have programmed before. We will use Matlab.
I am expecting that many of these students will never have coded before and almost all will not have seen Matlab before. They will need Matlab in all subsequent years of their degree.
Given the extremely limited time for this course, how can I give best bang for their buck, without it being too dry?
Is there something cool we could work towards creating over the 5 weeks?
More info: There are 5 x 4 hours sessions. Classroom cannot be flipped as there will be 50+ students.
Editing here to thank everyone who has taken the time and effort to give extremely helpful detailed replies. I appreciate it guys. | 2020/02/25 | [
"https://cseducators.stackexchange.com/questions/6209",
"https://cseducators.stackexchange.com",
"https://cseducators.stackexchange.com/users/8935/"
] | I don't know Matlab, so this answer is mostly about generic programming concepts.
The core of programming is problem solving, so I would think the best use of the limited time you have available would be to focus on computational thinking and providing them with the techniques they will need to be able to think their way around a problem sufficiently to be able to express a solution in code.
Matlab is of course designed specifically for solving problems rooted in various Scientific, Mathematical and Engineering domains, so ideally, any example programs you use for demonstration and explaining the concepts should be as close as possible to the types of problems that the students will be solving by themselves.
One of the pre-requisites for being able to write the code to solve a problem is to have gained a clear understanding of the problem being solved, so it would be useful to stick to problems which the learners would already be able to understand on-paper.
It could be useful to look at the Harvard CS50 syllabus as a starting point, it places a heavy emphasis on developing computational thinking skills by challenging learners to solve typical programming problems: <https://cs50.harvard.edu/ap/syllabus/>
Many of the concepts covered in the first 3-4 lessons of the CS50 syllabus are universally applicable to programming in any language, and David J Malan's delivery of these concepts in his lectures seems to go down very well with his students.
A number of other specific techniques which I believe would be useful:
* Problem decomposition, illustrated by describing a complex problem, analysing it and dividing into sub-problems.
* Steps to solving a problem by starting with example/test inputs, describing the steps, and reaching a result 'by-hand'.
* Pattern recognition and using generalisation to describe a solution using pseudocode, then translation into a runnable program
* Using the debugger to set breakpoints, inspect variables and step through code to find/fix errors.
Terminology, as well as the 'grammar' of the language is of course important too - there's a lot of jargon to to absorb in a very limited space of time.
Newcomers frequently find themselves spending a great deal of time attempting to decypher syntax errors, so some of the most important terminology for them to understand will be the words/phrases which frequently appear in the Matlab error frame - for example, misuse of particular symbols/operators, or incorrect use of particular data types.
Perhaps finally, make sure to include frequent reminders that they can (and should) be making extensive use of Google and StackOverflow to find out what the syntax errors and other jargon means as well. | I think I'd try to hook them with **image processing**. Maybe with [an edge detection algorithm](https://en.wikipedia.org/wiki/Canny_edge_detector) or [something else along those lines](https://en.wikipedia.org/wiki/Feature_detection_(computer_vision)#Feature_detectors).
Topics that get naturally covered:
* Basic syntax, data, and other features of the language
* Basic program structure and design (not many libraries needed, you get to cook the dark magic yourself)
* Matrix manipulation, (algebra and entrywise)
* "The scientist's approach to programming": try something, look at the result (literally in this case, because the results are pictures), and if it looks good, move on and build on that result. We're not trying to create software engineers here.
Particular benefits:
* Matlab (or Octave) might actually be a good choice for implementing image processing algorithms in the real world, so the topic doesn't feel forced. (Somewhat unlike using Matlab for "intro to programming"..)
* Shows Matlab and programming as a tool for getting work done ("oh, the source image needs to be rotated? Hold on while I whip up this nifty rotation matrix..")
* In case the students don't yet see matrices as the best thing since Sliced ([2019](https://en.wikipedia.org/wiki/Sliced_(TV_series))), this might double as a sales pitch for matrix algebra too.
* **Pretty pictures!**
(Really, the final bullet point is the important thing. Finding the result to an interesting physics problem just doesn't cut it as the behaviour-reinforcing reward a beginning programming student needs. With image manipulation, it's not entirely unheard of that some even fiddle with the code in their free time.) |
312,478 | I'm a mechanical engineer so I don't know much about electric circuits and power generation to begin with. Can somebody explain what a harmonic is in the power grid and what is the reason why it is bad? I understand it comes from non-linear electric loads but what does that mean? | 2017/06/22 | [
"https://electronics.stackexchange.com/questions/312478",
"https://electronics.stackexchange.com",
"https://electronics.stackexchange.com/users/152846/"
] | A particular reason why the electricity companies think harmonics are bad is that they have to supply them (which means a generally slightly thicker cable on average) AND they can't usually bill the user for them. There are exceptions of course (for higher energy users) and they are encouraged (by the cost of their bill) to keep harmonics low and power factor as close to unity as possible.
A harmonic is a term that nearly always applies to a non-linear load distorting the normally sineusoidal load current. Basically it's not a higher power consumption but it does mean the infrastructure has to be able to cope with the basic billable currents and the generally non-billable harmonics: -
[](https://i.stack.imgur.com/lJvhY.png) | If you understand how roller bearing create pulses from irregular surfaces , then you can imagine current gets bumps and harmonics from irregular impedance. It causes more heat and wear. In magnetics once the force reaches saturation like a spring bottoming out, the force rises sharply causing damage from excess current.
The nonlinear behavior of all magnetic cores is just like backlash on a belt drive but perhaps smoother. The hysteresis and stiffness or steep slope of some vs others that are smoother in motors of all kinds affects the amount of harmonics generated. Also SMPS supplies need to be active power factor corrected now if for large AC-DC supplies in IEC standards. 50% THD reduces PF by 10% which adds to the stored energy in the grid and increases conduction losses.
Harmonics are also generated by line frequency current pulses such as old linear diode bridge cap linear supplies that are anything but linear on the front end. THe current only charges ~ 10% or <30% depending on load and rating and then discharges to the regulators the rest of the time between each half cycle. These pulses create more damaging **even** harmonics which add in phase in the transformer neutral wire, while odd harmonics tend to cancel when in a differential mode or delta 3 phase system. (perfect 50% square waves have no even harmonics)
**,Thus the harmonics are like bumps in a roller bearing surface impedance** that add excess heat, stress forces, lower efficiency , insulation capabilities which all results in lower lifetime and higher cost of ownership. |
312,478 | I'm a mechanical engineer so I don't know much about electric circuits and power generation to begin with. Can somebody explain what a harmonic is in the power grid and what is the reason why it is bad? I understand it comes from non-linear electric loads but what does that mean? | 2017/06/22 | [
"https://electronics.stackexchange.com/questions/312478",
"https://electronics.stackexchange.com",
"https://electronics.stackexchange.com/users/152846/"
] | A particular reason why the electricity companies think harmonics are bad is that they have to supply them (which means a generally slightly thicker cable on average) AND they can't usually bill the user for them. There are exceptions of course (for higher energy users) and they are encouraged (by the cost of their bill) to keep harmonics low and power factor as close to unity as possible.
A harmonic is a term that nearly always applies to a non-linear load distorting the normally sineusoidal load current. Basically it's not a higher power consumption but it does mean the infrastructure has to be able to cope with the basic billable currents and the generally non-billable harmonics: -
[](https://i.stack.imgur.com/lJvhY.png) | The following may help understand non-linear loads and how they generate harmonics.

[simulate this circuit](/plugins/schematics?image=http%3a%2f%2fi.stack.imgur.com%2frhzSX.png) – Schematic created using [CircuitLab](https://www.circuitlab.com/)
[](https://i.stack.imgur.com/dIkNs.gif)
*Figure 1. A simple bridge rectifier, smoothing capacitor and resistive load.*
The circuit of Figure 1 should be easy enough to understand. When the top AC input is positive current flows through D2, R1 and D3 back to the other AC line. C1 charges up and maintains voltage on the load. For a mechanical engineer this would be analogous to having two pulsed hydraulic supplies, four non-return valves (D1 - 4), a pressure reservoir (C1) and the load (R1).
Form the above it should be seen that current (flow) on the first pulse will follow the supply pressure but that on subsequent pulses no current will flow until the reservoir pressure is exceeded by the supply pressure. The result is that the required current flows in pulses - see the black curves in Figure 2.
*Figure 2. Rectified AC (red), capacitor voltage (blue) and rectifier current (black). The AC current (to the left of the rectifier on Figure 1) will look similar to the black curve except that each half cycle will alternate above and below the line.*
It should also be intuitive that since the rectifier provides current in pulses that the peak current may be many times the average current.
Since any periodic wave can be formed by the addition of a sine wave of the fundamental frequency and its harmonics (in varying amounts) the distorted current demand creates harmonics in the current supply.
[](https://i.stack.imgur.com/27HVo.gif)
*Figure 3. This fabulous illustration of the Fourier Transform by Lucas V. Barbosa on Wikipedia's [Fourier transform](https://en.wikipedia.org/wiki/Fourier_transform) page shows the transformation of a periodic waveform from the time domain to the frequency domain. The frequency plot shows the relative strength of the harmonics with clarity that could not be obtained from staring at the time plot.* |
312,478 | I'm a mechanical engineer so I don't know much about electric circuits and power generation to begin with. Can somebody explain what a harmonic is in the power grid and what is the reason why it is bad? I understand it comes from non-linear electric loads but what does that mean? | 2017/06/22 | [
"https://electronics.stackexchange.com/questions/312478",
"https://electronics.stackexchange.com",
"https://electronics.stackexchange.com/users/152846/"
] | The following may help understand non-linear loads and how they generate harmonics.

[simulate this circuit](/plugins/schematics?image=http%3a%2f%2fi.stack.imgur.com%2frhzSX.png) – Schematic created using [CircuitLab](https://www.circuitlab.com/)
[](https://i.stack.imgur.com/dIkNs.gif)
*Figure 1. A simple bridge rectifier, smoothing capacitor and resistive load.*
The circuit of Figure 1 should be easy enough to understand. When the top AC input is positive current flows through D2, R1 and D3 back to the other AC line. C1 charges up and maintains voltage on the load. For a mechanical engineer this would be analogous to having two pulsed hydraulic supplies, four non-return valves (D1 - 4), a pressure reservoir (C1) and the load (R1).
Form the above it should be seen that current (flow) on the first pulse will follow the supply pressure but that on subsequent pulses no current will flow until the reservoir pressure is exceeded by the supply pressure. The result is that the required current flows in pulses - see the black curves in Figure 2.
*Figure 2. Rectified AC (red), capacitor voltage (blue) and rectifier current (black). The AC current (to the left of the rectifier on Figure 1) will look similar to the black curve except that each half cycle will alternate above and below the line.*
It should also be intuitive that since the rectifier provides current in pulses that the peak current may be many times the average current.
Since any periodic wave can be formed by the addition of a sine wave of the fundamental frequency and its harmonics (in varying amounts) the distorted current demand creates harmonics in the current supply.
[](https://i.stack.imgur.com/27HVo.gif)
*Figure 3. This fabulous illustration of the Fourier Transform by Lucas V. Barbosa on Wikipedia's [Fourier transform](https://en.wikipedia.org/wiki/Fourier_transform) page shows the transformation of a periodic waveform from the time domain to the frequency domain. The frequency plot shows the relative strength of the harmonics with clarity that could not be obtained from staring at the time plot.* | If you understand how roller bearing create pulses from irregular surfaces , then you can imagine current gets bumps and harmonics from irregular impedance. It causes more heat and wear. In magnetics once the force reaches saturation like a spring bottoming out, the force rises sharply causing damage from excess current.
The nonlinear behavior of all magnetic cores is just like backlash on a belt drive but perhaps smoother. The hysteresis and stiffness or steep slope of some vs others that are smoother in motors of all kinds affects the amount of harmonics generated. Also SMPS supplies need to be active power factor corrected now if for large AC-DC supplies in IEC standards. 50% THD reduces PF by 10% which adds to the stored energy in the grid and increases conduction losses.
Harmonics are also generated by line frequency current pulses such as old linear diode bridge cap linear supplies that are anything but linear on the front end. THe current only charges ~ 10% or <30% depending on load and rating and then discharges to the regulators the rest of the time between each half cycle. These pulses create more damaging **even** harmonics which add in phase in the transformer neutral wire, while odd harmonics tend to cancel when in a differential mode or delta 3 phase system. (perfect 50% square waves have no even harmonics)
**,Thus the harmonics are like bumps in a roller bearing surface impedance** that add excess heat, stress forces, lower efficiency , insulation capabilities which all results in lower lifetime and higher cost of ownership. |
184,580 | I was trying to make my character do wave in air but the mesh seems to fall off everytime.
I cannot identify the problem. See the images.
[](https://i.stack.imgur.com/vr635.jpg)
[](https://i.stack.imgur.com/mcsT4.jpg)
[](https://i.stack.imgur.com/9c2dR.jpg)
[](https://i.stack.imgur.com/5rGVE.jpg)
[](https://blend-exchange.giantcowfilms.com/b/8sSdPJBm/) | 2020/06/29 | [
"https://blender.stackexchange.com/questions/184580",
"https://blender.stackexchange.com",
"https://blender.stackexchange.com/users/95678/"
] | You need to change the *IK Pole Angles* to -90° so that it doesn't deform your mesh:
[](https://i.stack.imgur.com/Ie2W2.jpg)
Also you need to change the modifiers stack, this seems to be more logical (and enable the *Armature* modifier's *Preserve Volume* option):
[](https://i.stack.imgur.com/3sHyU.jpg) | The mesh appears to be pinching due to the rotation the arms are using to get into the wave position. Try bending the arms in a more natural way and adjusting weight paint. As of now the shoulder is rolling in such a way that along with the weight paint is causing the mesh to roll too far. |
83,696 | Consider two tetrahedrons one placed inside the other.
Prove that the sum of all 6 sides of inner tetrahedron is at most the sum of the 6 sides of exterior tetrahedron. | 2011/12/17 | [
"https://mathoverflow.net/questions/83696",
"https://mathoverflow.net",
"https://mathoverflow.net/users/6140/"
] | The conjecture about the quotient of the sums of the lengths of edges for a tetrahedron inside another was formulated (a long time ago) by Jerzy Browkin, who saw that, somewhat paradoxically it can be greater than 1, and even arbitrarily close to 4/3, as his examples proved it. He asked if $\frac 43$ is the least upper bound of such quotients.
The conjecture was solved in 1961 by Wlodzimierz Kuperberg and myself. We published it in 1962 or 1963, in Polish, in Wiadomosci Matematyczne (of Polish Mathematical Society). Years later an English translation was published in Alabama Journal of Mathematics (or similar). And a powerful complete multidimensional generalization was obtained and published by Carl Linderholm, [An inequality for simplices](http://link.springer.com/article/10.1007%2FBF00147532) .
Ancient Greeks could easily formulate and solve the given problem (in 3d) but (as long as we know) never did--it took Jerzy Browkin to raise it. | Sum of the 6 edges of the inner tetrahedron can be larger than the sum of the 6 edges of the outer tetrahedron.
Imagine the outer tetrahedron with 3 sides of 1000 and 3 sides of 1. The inner tetrahedron has 2 vertices close to the top and 2 vertices close to the bottom.
Sum of outer = 1000+1000+1000+1+1+1=3003
Sum of inner = 990+990+990+990+1+1= 3962
[enter image description here](https://i.stack.imgur.com/GTpzV.png) |
333,656 | When generating entangled photons by means of Spontaneous Parametric Down-Conversion [SPDC](https://en.wikipedia.org/wiki/Spontaneous_parametric_down-conversion), the usual assumption is that the two photons are created at the same time. I have not been able to find any papers which discuss this assumption, nor experimental papers in which the delay has been measured.
I'm looking for (A) papers which discuss the above, or (B) measure the above. What follows describes what we are doing in the lab.
Our setup is type I SPDC using a 90 mW CW diode laser operating at 402 nm, with two pieces of BBO with the optic axes at 90 degrees. We use high efficiency interference filters to remove light that is away from the degenerate wavelength, which is 804 nm.
In our experiment we are finding that the quantum efficiency (pair correlation) increases very rapidly as the temporal binning is increased from a few hundred picoseconds to a few nanoseconds, flattening out around 10 ns. The corresponding Poisson statistics for "accidental pairs" should grow linearly with the increase of temporal binning, and our experiments with non-entangled light are consistent with the Poisson statistic estimates.
For example, with 135,000 counts per second on detector 1, and 146,000 counts per second on detector 2, the Poisson statistic for pair detection is 95 pairs per second for 10 ns binning, but the actual pair rate is 37,000 pairs per second, which is a quantum efficiency of over 26%.
The quantum efficiency declines as the temporal binning is reduced; at 240 ps the quantum efficiency is about 2%.
Our timer-counter clocks at 81 ps per tick; 81 ps of time corresponds to a distance of (300 um/ps x 81 ps) = 24.3 mm, or about an inch. 10 ns corresponds to 3 meters, or about 10 feet. The single-photon detectors are symmetrically placed, and essentially have identical distances to the BBO crystal, about 1200 mm.
We are currently running some additional experiments, gathering data for a series of temporal bin durations so that we can plot the rate of increase with increased time. | 2017/05/17 | [
"https://physics.stackexchange.com/questions/333656",
"https://physics.stackexchange.com",
"https://physics.stackexchange.com/users/106192/"
] | The assumption that the photons are created at the same time is a good one: you're looking for the problem in the wrong place.
What you've observed is almost certainly due to technical details of the detectors you're using. There is a time interval between when a detector absorbs a photon and when you get the electrical signal indicating this happened (latency); more importantly, this time interval also has a variance (jitter). These values can be on the order of nanoseconds depending on the type of detectors you're using.
One more thing: assuming you do have a small enough jitter to resolve relative timing of events by better than 10ns (quite likely you do), did you try readjusting the relative delay between the signals from the two detectors after reducing the time bin sizes? Maybe the two detectors' time bins are "misaligned" by a few nanoseconds: at 10ns the bins are so large that this misalignment doesn't matter. | >
> When generating entangled photons by means of Spontaneous Parametric Down-Conversion SPDC, the usual assumption is that the two photons are created at the same time. I have not been able to find any papers which discuss this assumption, nor experimental papers in which the delay has been measured.
>
>
> I'm looking for (A) papers which discuss the above, or (B) measure the above. What follows describes what we are doing in the lab.
>
>
>
To talk of photons and entanglement one needs Feynman diagrams. Here is [a diagram](https://arxiv.org/ftp/arxiv/papers/1307/1307.2248.pdf) two entangled photons :
[](https://i.stack.imgur.com/W1QXo.png)
>
> (a) Feynman diagrams of the emission process. The wavy lines indicate photons, dashed lines indicate holes, and the solid lines indicates electrons. The double-arrowed electron propagators describe the Green functions resulting from non-vanishing [](https://i.stack.imgur.com/XtnHZ.png)
> terms.
>
>
> (b) Feynman diagrams of the density matrix calculations
>
>
>
Please note that in [feynman diagrams](http://hyperphysics.phy-astr.gsu.edu/hbase/Particles/expar.html) of this type, time is in the y axis, but the x axis is mathematical, an iconal variable representing the mathematical formulation of the virtual particle exchanges, not a real space difference to be crossed and thus take time.
In general virtual displacements within the Feynman diagrams have no meaning in the laboratory. In this sense the two photons in the basic figure (a) have no time displacement and thus are coincident in their emergence, afaik, no time delay.
Searching for "Feynman diagrams for SPDC entangled photons" I discovered that the term "Feynman diagram" is expanded in this research domain, for example [fig 5 here](https://arxiv.org/pdf/0910.5797.pdf), and [figure 2 here](https://arxiv.org/pdf/quant-ph/9903048.pdf) . If the method follows the Feynman diagram rules , the conclusion should be the same, there is no predictable spatial separation between the two emission vertices (that would take time to "cross",) and there vertices are on the same time axis.. |
84,077 | With apologies for the (only somewhat) click-bait title, in an answer to another question (see [this answer](https://law.stackexchange.com/a/84028/44033)) the statement
>
> Typically the only thing a legal entity that is not a natural person cannot do is sign a marriage contract.
>
>
>
was made. Some commenters disputed this, asking, e.g.,
>
> Can a business become a (natural) child's legal guardian, can a business have power of attorney over a (natural) person, etc.?
>
>
>
This got me curious:
**Can any legal entity adopt a child?**
Or does one, perhaps, need two corporations to do this? Of course, the answer to the above may be a simple "no" for trivial reasons, but my question is really closer to asking the looser question:
**What is the most ridiculous thing a legal entity can do that one would only expect a natural person to be able to do?**
I'm happy with any interpretation of "ridiculous", here. As pertains to jurisdiction, I've put the tag [united-states](/questions/tagged/united-states "show questions tagged 'united-states'") for starters, but I am interested in other jurisdictions too, e.g., the UK (one commenter mentioned that corporations frequently vote in elections in the City of London). | 2022/09/06 | [
"https://law.stackexchange.com/questions/84077",
"https://law.stackexchange.com",
"https://law.stackexchange.com/users/44033/"
] | In the US, adoptions follow state law. [Here](https://apps.leg.wa.gov/rcw/default.aspx?cite=26.33&full=true) is the law for Washington state. RCW 26.33.140 says that "Any person who is legally competent and who is eighteen years of age or older may be an adoptive parent". The word "person" does not have a statutory meaning under this title, thus it has its ordinary meaning. There are discussions in case law regarding the "person" status of corporations, but those extensions of the meaning "person" involve extending a constitutional right which refers to a "person" to corporations. A corporation can hold property, enter contracts, and sue and be sued just like a person, and from the earliest days esp. Trustees of Dartmouth College v. Woodward, 17 U.S. 518, the US courts have recognized that corporations as having the same rights as natural persons to contract and to enforce contracts. But corporations can't vote or get married. So, in Washington you have to be a person-person. And, presumably in all states. | In **Germany** a legal person can't adopt a person, but can be the **legal guardian** ("Vormund") if a child has no parents. There are special "Vormundschaftsvereine" (associations for guardianship), typically charitable societies. They need a permission of the state and shall only be appointed as a guardian by the family court, if no natural person as a volunteer guardian is available, [§ 1791a BGB](http://www.gesetze-im-internet.de/englisch_bgb/englisch_bgb.html#p6144).
I don't know, how often this is done. The association can't get any payment for the guardianship ([§ 1836 III BGB](http://www.gesetze-im-internet.de/englisch_bgb/englisch_bgb.html#p6317)), so the normal case seems to be that a employee of the association is appointed as a natural person.
From 2023 this will be the only option (and clearly named in § 1774 I Nr. 3 BGB new). The guardianship of the association is not longer possible. |
84,077 | With apologies for the (only somewhat) click-bait title, in an answer to another question (see [this answer](https://law.stackexchange.com/a/84028/44033)) the statement
>
> Typically the only thing a legal entity that is not a natural person cannot do is sign a marriage contract.
>
>
>
was made. Some commenters disputed this, asking, e.g.,
>
> Can a business become a (natural) child's legal guardian, can a business have power of attorney over a (natural) person, etc.?
>
>
>
This got me curious:
**Can any legal entity adopt a child?**
Or does one, perhaps, need two corporations to do this? Of course, the answer to the above may be a simple "no" for trivial reasons, but my question is really closer to asking the looser question:
**What is the most ridiculous thing a legal entity can do that one would only expect a natural person to be able to do?**
I'm happy with any interpretation of "ridiculous", here. As pertains to jurisdiction, I've put the tag [united-states](/questions/tagged/united-states "show questions tagged 'united-states'") for starters, but I am interested in other jurisdictions too, e.g., the UK (one commenter mentioned that corporations frequently vote in elections in the City of London). | 2022/09/06 | [
"https://law.stackexchange.com/questions/84077",
"https://law.stackexchange.com",
"https://law.stackexchange.com/users/44033/"
] | In the US, adoptions follow state law. [Here](https://apps.leg.wa.gov/rcw/default.aspx?cite=26.33&full=true) is the law for Washington state. RCW 26.33.140 says that "Any person who is legally competent and who is eighteen years of age or older may be an adoptive parent". The word "person" does not have a statutory meaning under this title, thus it has its ordinary meaning. There are discussions in case law regarding the "person" status of corporations, but those extensions of the meaning "person" involve extending a constitutional right which refers to a "person" to corporations. A corporation can hold property, enter contracts, and sue and be sued just like a person, and from the earliest days esp. Trustees of Dartmouth College v. Woodward, 17 U.S. 518, the US courts have recognized that corporations as having the same rights as natural persons to contract and to enforce contracts. But corporations can't vote or get married. So, in Washington you have to be a person-person. And, presumably in all states. | [england-and-wales](/questions/tagged/england-and-wales "show questions tagged 'england-and-wales'"), [northern-ireland](/questions/tagged/northern-ireland "show questions tagged 'northern-ireland'") (partially)
In theory, yes.
>
> [Interpretation Act 1976, Schedule 1](https://www.legislation.gov.uk/ukpga/1978/30/schedule/1):
>
> “Person” includes a body of persons corporate or unincorporate. [Applies to legislation after 1889]
>
>
>
>
> [Adoption and Children Act 2002, Section 51](https://www.legislation.gov.uk/ukpga/2002/38/section/51):
>
>
> 1. An adoption order may be made on the application of one person who has attained the age of 21 years and is not married or a civil partner.
> 2. An adoption order may be made on the application of one person who has attained the age of 21 years if the court is satisfied that the person is the partner of a parent of the person to be adopted.
> 3. An adoption order may be made on the application of one person who has attained the age of 21 years and is married if the court is satisfied [of various conditions]
>
>
>
In practice, no.
While "one person" may include a body corporate, the conditions under which a person may adopt cannot be satisfied by a corporation. While it cannot marry (and could theoretically satisfy the marriage condition of s.51(1)), it cannot "attain an age". Different terminology is used for the age of corporations.
The word *person* occurs over 500 times in the Act, but it is not separately defined and in many cases it could refer to a corporation. To rely on a particular construction of half a dozen words is either a marvel of concision or an enormous lapse.
There are other safeguards, in that a judge has to be satisfied of the suitability of the prospective adopter before making an order. The practicalities involved in caring for an adopted child would make the nebulous arrangement of adoption by a company difficult to justify as "suitable". |
84,077 | With apologies for the (only somewhat) click-bait title, in an answer to another question (see [this answer](https://law.stackexchange.com/a/84028/44033)) the statement
>
> Typically the only thing a legal entity that is not a natural person cannot do is sign a marriage contract.
>
>
>
was made. Some commenters disputed this, asking, e.g.,
>
> Can a business become a (natural) child's legal guardian, can a business have power of attorney over a (natural) person, etc.?
>
>
>
This got me curious:
**Can any legal entity adopt a child?**
Or does one, perhaps, need two corporations to do this? Of course, the answer to the above may be a simple "no" for trivial reasons, but my question is really closer to asking the looser question:
**What is the most ridiculous thing a legal entity can do that one would only expect a natural person to be able to do?**
I'm happy with any interpretation of "ridiculous", here. As pertains to jurisdiction, I've put the tag [united-states](/questions/tagged/united-states "show questions tagged 'united-states'") for starters, but I am interested in other jurisdictions too, e.g., the UK (one commenter mentioned that corporations frequently vote in elections in the City of London). | 2022/09/06 | [
"https://law.stackexchange.com/questions/84077",
"https://law.stackexchange.com",
"https://law.stackexchange.com/users/44033/"
] | In **Germany** a legal person can't adopt a person, but can be the **legal guardian** ("Vormund") if a child has no parents. There are special "Vormundschaftsvereine" (associations for guardianship), typically charitable societies. They need a permission of the state and shall only be appointed as a guardian by the family court, if no natural person as a volunteer guardian is available, [§ 1791a BGB](http://www.gesetze-im-internet.de/englisch_bgb/englisch_bgb.html#p6144).
I don't know, how often this is done. The association can't get any payment for the guardianship ([§ 1836 III BGB](http://www.gesetze-im-internet.de/englisch_bgb/englisch_bgb.html#p6317)), so the normal case seems to be that a employee of the association is appointed as a natural person.
From 2023 this will be the only option (and clearly named in § 1774 I Nr. 3 BGB new). The guardianship of the association is not longer possible. | [england-and-wales](/questions/tagged/england-and-wales "show questions tagged 'england-and-wales'"), [northern-ireland](/questions/tagged/northern-ireland "show questions tagged 'northern-ireland'") (partially)
In theory, yes.
>
> [Interpretation Act 1976, Schedule 1](https://www.legislation.gov.uk/ukpga/1978/30/schedule/1):
>
> “Person” includes a body of persons corporate or unincorporate. [Applies to legislation after 1889]
>
>
>
>
> [Adoption and Children Act 2002, Section 51](https://www.legislation.gov.uk/ukpga/2002/38/section/51):
>
>
> 1. An adoption order may be made on the application of one person who has attained the age of 21 years and is not married or a civil partner.
> 2. An adoption order may be made on the application of one person who has attained the age of 21 years if the court is satisfied that the person is the partner of a parent of the person to be adopted.
> 3. An adoption order may be made on the application of one person who has attained the age of 21 years and is married if the court is satisfied [of various conditions]
>
>
>
In practice, no.
While "one person" may include a body corporate, the conditions under which a person may adopt cannot be satisfied by a corporation. While it cannot marry (and could theoretically satisfy the marriage condition of s.51(1)), it cannot "attain an age". Different terminology is used for the age of corporations.
The word *person* occurs over 500 times in the Act, but it is not separately defined and in many cases it could refer to a corporation. To rely on a particular construction of half a dozen words is either a marvel of concision or an enormous lapse.
There are other safeguards, in that a judge has to be satisfied of the suitability of the prospective adopter before making an order. The practicalities involved in caring for an adopted child would make the nebulous arrangement of adoption by a company difficult to justify as "suitable". |
263,790 | My kid likes to listen to music on her iPad, but she can't read yet (she's working on it) so she has to play each song for a few seconds to find the song to which she wants to listen. Is there a way to enable VoiceOver for just the Music app? Enabling it for the entire device is annoying. Or is there an alternate way to play music that will speak the song titles? | 2016/12/06 | [
"https://apple.stackexchange.com/questions/263790",
"https://apple.stackexchange.com",
"https://apple.stackexchange.com/users/290/"
] | Click on the **Advanced** link on the bottom left. It will show you an option to continue on to the site you want to visit.
Chrome will show you this page if it finds problems with certificates, http vs https, etc. It's just to let you know that it thinks something's not right and it gives you the option to continue or go back. | The simplest method I often use to bypass this is to click on the Advanced link and then Process to the site.
In most cases, this connection error occurs because your computer has a wrong date & time. You need to check it as well.
You can also ignore the ssl from the Google Chrome shortcut by adding this code: "--ignore-certificate-errors", [according this guide](https://usefulpcguide.com/16666/your-connection-is-not-private/).
If the problem persists, I would recommend you to uninstall your Google Chrome, download a new & latest version and reinstall it. Before doing so, make sure you have backup it with ChromeSync or manually, in order to restore all data back when reinstalling the Chrome browser. |
126,203 | In Burning Wheel, artha is rewarded at the end of a session. I am running a four-hour convention game, and hence a one-shot, where this is less meaningful than in campaign play.
Furthermore, the game is a blood opera - there are many characters, some of whom will certainly come to conflict (direct or indirect).
Should we:
* Give artha as per written rules, when we end playing?
* Hold a mid-session pause, give artha then, and at the end of play?
* Give artha after every scene, if any was earned?
These would only apply to end-of-session artha, not to "workhorse" and other end-of-scenario rewards.
I am looking for experiences of people who have ran Burning Wheel as a one-shot in a convention setting or similar location, where most of the players are unknown and there is little reason to believe they will ever come to play these characters again. | 2018/07/13 | [
"https://rpg.stackexchange.com/questions/126203",
"https://rpg.stackexchange.com",
"https://rpg.stackexchange.com/users/3263/"
] | In the current **Burning Wheel Gold** example scenarios, [Twilight in the Duchy Verdorben](https://store.burningwheel.com/twilight-in-the-duchy-verdorben/), characters in the first scenario are pre-loaded with 2 Fate and 1 Persona each but 1 Fate and 1 Persona in the followup scenarios. It also includes this reminder at the end of each scenario:
>
> Be sure to review Beliefs and award artha after concluding the action of the scenario.
>
>
>
**Burning Wheel Revised**'s The Gift scenario—which has blood opera tendencies—has this advice:
>
> All of the characters are pre-loaded with three points of fate, two points of persona and a deeds point. In a smaller game, you might award artha in play. In a bigger game, don’t worry about it. Just play and burn the artha as a finite commodity.
>
>
>
In my experience, characters are usually more involved in the situation than wanting explicit rules instruction. I usually only bring up artha when they're making a roll where it would make a significant difference. I'll wait for someone to ask about how to get more artha before explaining it, or I'll add an offhand comment about artha rewards when they mention a Belief or Trait in their play. | Artha is for more than spending.
--------------------------------
This is what I've seen running BW and its derivatives in con slots: It helps to provide some artha, and asking the artha questions at end of session helps with wrapping up.
It works well to preload characters with some artha so you can demonstrate the "spending artha" part of the game. However, you should still award artha at end of session, even if there's no possible way the players could spend it.
Why?
**Awarding artha encourages people to reflect on the session.** Every question requires you to think back on play to answer it, so wrapping up a con session by awarding artha will get people to think about the game in the way it wants to be thought about. |
65,040 | I have recorded a vocal for my music.
Now I want to pitch my vocal, as to also have a 3rd harmonizing vocal. I have heard a lot that people say that a 3rd voice is the best voice and sweetest one for making a harmonized vocal. But I wonder if they are talking about a minor 3rd, or a major 3rd voice?
I read that if you play C and sing it, then your 3rd voice will be E. But what if I play F sharp, should I harmonize it with A sharp or with A?
(I know that I could sing any note for harmonizing, but I just wonder which one is for 3rd voice. ) | 2017/12/30 | [
"https://music.stackexchange.com/questions/65040",
"https://music.stackexchange.com",
"https://music.stackexchange.com/users/46637/"
] | The basic harmony is usually a third above (or a 6th below, which is the same note an octave lower. Example: **in C** - sing a C - the harmony will be an E, either the one directly above, or directly below. So here, we can call it a major third above, for simplicity. However - in key C major, the note that harmonises with D will be an F. this is because they're *both* from the C key - diatonic. Technically, it makes *that* interval a minor 3rd, but so what? It sounds good, and doesn't suddenly make the song go into a minor key!
When you need a harmony for an F note (still in key C), it'll be an A - straight from the C scale, as that A is a third above the original F.
'When someone sings an F diez(#)' it will depend on **which key you're in at that time**. If it's the same song, in C, then I'm guessing the underlying chord is a D major/seventh, and thus an A natural will fit best.
To summarise - use notes usually from the key/scale at the time. Use notes from the harmony used at the time, which may be different, but usually still diatonic.
If you're just singing along, really, you shouldn't worry about whether it's a major or a minor third you're actually singing - your ear ought to tell you. Maj/min 3rd is more of academic interest - and a heck of a lot of folk who harmonise spontaneously won't even be aware what notes they are singing - except that they'll be the right ones, judging by the best judges we use - our ears. | It's good to HARMONIZE, not just slavishly double the melody a fixed interval above. Yes, thirds are useful. Sometimes they fit above the melody, sometimes under it. This will very likely change over the course of the song. Sometimes it will be best to sing a few notes in unison, then open out into harmony. Sometimes one singer can echo a phrase that the other has just sung. Another good trick is to find the dominant (5th note of the scale) and stick on it until your ears tell you it MUST move one note up or down. |
37,957,903 | I am new to Eclispe. I just met a problem. I copy a piece code from a website into the Eclipse. the IDE editor prompt that: Syntax error on tokens, delete these tokens
I am sure that my code is OK. If I manually input the code, it's ok. I open the java file from Notepad++. I found there are some blank spaces(green highlighted). If I remove the green highlighted blanks, the Eclipse errors is gone.
I post some images. I googled for a while, but I didn't find useful information, so I seek help here.
What are those blank spaces? How to eliminate the error when copying?
Why does this happen?
[](https://i.stack.imgur.com/HF4UX.jpg)
[](https://i.stack.imgur.com/umPNP.jpg) | 2016/06/22 | [
"https://Stackoverflow.com/questions/37957903",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/2527825/"
] | Please remove red space, and press Tab again. | all the problematic spaces can be quickly removed using the Find/Replace dialog, select one of the red spaces then insert a normal space in the "Replace with" textfield and finally "Replace All" |
37,957,903 | I am new to Eclispe. I just met a problem. I copy a piece code from a website into the Eclipse. the IDE editor prompt that: Syntax error on tokens, delete these tokens
I am sure that my code is OK. If I manually input the code, it's ok. I open the java file from Notepad++. I found there are some blank spaces(green highlighted). If I remove the green highlighted blanks, the Eclipse errors is gone.
I post some images. I googled for a while, but I didn't find useful information, so I seek help here.
What are those blank spaces? How to eliminate the error when copying?
Why does this happen?
[](https://i.stack.imgur.com/HF4UX.jpg)
[](https://i.stack.imgur.com/umPNP.jpg) | 2016/06/22 | [
"https://Stackoverflow.com/questions/37957903",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/2527825/"
] | Avoid copy pasting code from any other place. Type in the code by yourself, it will help because the problem of non-breaking spaces will not occur. | all the problematic spaces can be quickly removed using the Find/Replace dialog, select one of the red spaces then insert a normal space in the "Replace with" textfield and finally "Replace All" |
37,957,903 | I am new to Eclispe. I just met a problem. I copy a piece code from a website into the Eclipse. the IDE editor prompt that: Syntax error on tokens, delete these tokens
I am sure that my code is OK. If I manually input the code, it's ok. I open the java file from Notepad++. I found there are some blank spaces(green highlighted). If I remove the green highlighted blanks, the Eclipse errors is gone.
I post some images. I googled for a while, but I didn't find useful information, so I seek help here.
What are those blank spaces? How to eliminate the error when copying?
Why does this happen?
[](https://i.stack.imgur.com/HF4UX.jpg)
[](https://i.stack.imgur.com/umPNP.jpg) | 2016/06/22 | [
"https://Stackoverflow.com/questions/37957903",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/2527825/"
] | Just cut the code from eclipse save the file and then open compose gmail and paste it and copy same come back to eclipse and paste and save the file. | all the problematic spaces can be quickly removed using the Find/Replace dialog, select one of the red spaces then insert a normal space in the "Replace with" textfield and finally "Replace All" |
157,129 | Do zombie villagers in the Xbox 360 edition spawn randomly or does there have to be villagers in the world originally | 2014/02/21 | [
"https://gaming.stackexchange.com/questions/157129",
"https://gaming.stackexchange.com",
"https://gaming.stackexchange.com/users/69937/"
] | As of [TU14](http://minecraft.gamepedia.com/Xbox_360_Edition_version_history#xbox-TU14), Zombie Villagers are part of console edition.
[From the wiki](http://minecraft.gamepedia.com/Zombie_villager#Variants):
>
> Zombie villagers comprise 5% of all spawned zombies. They behave as ordinary zombies, but their character model's head and face is reminiscent of that of a villager, shaded with a darker green hue.
>
>
> Zombie villagers can also result from zombie attacks on villagers. If any type of zombie kills a villager, there is a chance that the villager will transform into a zombie villager (100% on hard difficulty, 50% on normal, 0% on easy).
>
>
>
Zombie villagers will spawn in worlds where there are no villagers. | A few months ago, Zombie Testificates were added in an update to the XBox 360 (I don't have it for PC, so I was super psyched when I first saw this). |
53,716 | In ***Captain America: Civil War***, when Tony visits the Raft, a floating prison in the middle of the ocean, we see Wanda in a straight jacket in her own isolated cell. Makes sense considering how powerful she is. But could she be realistically constrained? In the comics, from what I understand, not a chance. But in the MCU, if she can create a 100ft crater using Vision as the wrecking ball, not to mention how exceedingly strong Vision is, she should be able to easily break out of her cell. Right?
I think the best explanation is that she's accepting her fate, at least temporarily. She's been through an emotional ride and doesn't have the drive to break out and figure out what's next. And given Captain America frees them soon enough, I think it makes sense that she could wait that long. Is that a more realistic explanation? | 2016/05/31 | [
"https://movies.stackexchange.com/questions/53716",
"https://movies.stackexchange.com",
"https://movies.stackexchange.com/users/35242/"
] | Of the four Team Cap members contained on the **Raft**, only Wanda is restrained. Only Wanda cannot talk. Only Wanda isn't moving around. Only Wanda looks braindead.
[](https://i.stack.imgur.com/dfJRZ.png)
She was not only in a straightjacket, preventing her from using her hands which it seems she needs to do to focus her magic/powers, ***but she also had a pair of blinking lights and a collar around her neck.*** The MCU wiki and tumblr in general call it a shock collar, but I didn't see any shock involved, it may be that simple or more involved. Of course, Hawkeye proved all it took to stop her in ***Age of Ultron*** was a taser arrow to the head. Sleepy Wanda is no threat.
Marvel comics, and really any comic or series where people, mutants or enhanced humans have powers, often have some device, usually a collar, that is used by normals to remove/restrict/dampen/depower them. Two related tropes [Power Nullifier](http://tvtropes.org/pmwiki/pmwiki.php/Main/PowerNullifier) and [Slave Collar](http://tvtropes.org/pmwiki/pmwiki.php/Main/SlaveCollar). Loki's muzzle comes to mind, as well as Loreli's (and Sif's) in Agents of SHIELD
[](https://i.stack.imgur.com/cBgj3m.jpg)[](https://i.stack.imgur.com/HPWtNm.jpg)[](https://i.stack.imgur.com/18PUsm.gif)[](https://i.stack.imgur.com/MQht6m.png)
The movies haven't gone the cartoony route of Agents of SHIELD tree sap prison cells and stuff, keep in mind that technology is abundant in the movies.
In ***Age of Ultron***, the Avengers capture the Hydra base, and recover some or all of the data on the creation and study of the Twins, which Sharon gives to Cap during it. At the end, between AoU and Captain America 3, Wanda has trained with the Avengers, leading to more data. In ***Civil War***, Tony basically hands over the Avengers to Senator "Thunderbolt" Ross and the UN, and having fought with Wanda and the rest of Team Cap, likely used that data to form a way to keep Wanda from using her powers.
### Essentially, they are keeping her sedated or shocked, restrained, and depowered as best they can. A comatose or heavily drugged prisoner is a prisoner who can't fight. If Wanda is unrestrained she can bring buildings down with her mind. The other three are normal peak humans, unenhanced, so they don't need to be kept sedated. | From the [wiki](https://en.wikipedia.org/wiki/Scarlet_Witch#Powers_and_abilities):
>
> Casting a hex requires a gesture and concentration on her part, though the gestures are largely a focus for the concentration
>
>
>
With her in the straight jacket, she cannot gesture and use her hexes. It can also be assumed the she is drugged, but we have no proof of that.
What we must remember is that Tony Stark is essentially the Marvel Bruce Wayne. When Batman was part of the Justice League, he kept files on how he would defeat each of its members in case it was ever needed.
Given Stark's nature, its not far fetched to believe that he would do something similar if only just to better understand the powers of his fellow Avengers. |
53,716 | In ***Captain America: Civil War***, when Tony visits the Raft, a floating prison in the middle of the ocean, we see Wanda in a straight jacket in her own isolated cell. Makes sense considering how powerful she is. But could she be realistically constrained? In the comics, from what I understand, not a chance. But in the MCU, if she can create a 100ft crater using Vision as the wrecking ball, not to mention how exceedingly strong Vision is, she should be able to easily break out of her cell. Right?
I think the best explanation is that she's accepting her fate, at least temporarily. She's been through an emotional ride and doesn't have the drive to break out and figure out what's next. And given Captain America frees them soon enough, I think it makes sense that she could wait that long. Is that a more realistic explanation? | 2016/05/31 | [
"https://movies.stackexchange.com/questions/53716",
"https://movies.stackexchange.com",
"https://movies.stackexchange.com/users/35242/"
] | From the [wiki](https://en.wikipedia.org/wiki/Scarlet_Witch#Powers_and_abilities):
>
> Casting a hex requires a gesture and concentration on her part, though the gestures are largely a focus for the concentration
>
>
>
With her in the straight jacket, she cannot gesture and use her hexes. It can also be assumed the she is drugged, but we have no proof of that.
What we must remember is that Tony Stark is essentially the Marvel Bruce Wayne. When Batman was part of the Justice League, he kept files on how he would defeat each of its members in case it was ever needed.
Given Stark's nature, its not far fetched to believe that he would do something similar if only just to better understand the powers of his fellow Avengers. | I think another reason maybe because of everything that's happened. I would say it's about a week and like 2-3 days since the bombing accident. I think it would have taken a day or two for the Accords to be made after the accident, another a day or two for the Accords to be presented to the Avengers, three days for them to sign, a day for the car park fight and then they were arrested and taken to the Raft the next day, which adds up to about a week and a few days. It would have been a long week for her so she's probably tired. On top of that, it probably hasn't been that long since her twin brother died (I say 6 months tops, if that) and that would also mean it would have been about half a year since she was freed from Hydra and being in a cage/prison environment. For her to suddenly be back in it may make her go into a sort of in shock headset, where she didn't even try to fight back. |
53,716 | In ***Captain America: Civil War***, when Tony visits the Raft, a floating prison in the middle of the ocean, we see Wanda in a straight jacket in her own isolated cell. Makes sense considering how powerful she is. But could she be realistically constrained? In the comics, from what I understand, not a chance. But in the MCU, if she can create a 100ft crater using Vision as the wrecking ball, not to mention how exceedingly strong Vision is, she should be able to easily break out of her cell. Right?
I think the best explanation is that she's accepting her fate, at least temporarily. She's been through an emotional ride and doesn't have the drive to break out and figure out what's next. And given Captain America frees them soon enough, I think it makes sense that she could wait that long. Is that a more realistic explanation? | 2016/05/31 | [
"https://movies.stackexchange.com/questions/53716",
"https://movies.stackexchange.com",
"https://movies.stackexchange.com/users/35242/"
] | From the [wiki](https://en.wikipedia.org/wiki/Scarlet_Witch#Powers_and_abilities):
>
> Casting a hex requires a gesture and concentration on her part, though the gestures are largely a focus for the concentration
>
>
>
With her in the straight jacket, she cannot gesture and use her hexes. It can also be assumed the she is drugged, but we have no proof of that.
What we must remember is that Tony Stark is essentially the Marvel Bruce Wayne. When Batman was part of the Justice League, he kept files on how he would defeat each of its members in case it was ever needed.
Given Stark's nature, its not far fetched to believe that he would do something similar if only just to better understand the powers of his fellow Avengers. | Wanda is restrained in a straitjacket, a shock collar, and is almost certainly heavily drugged.
The shock collar is likely triggered by detecting neural activity as well as physical; the drugs limit her to basic mental functions and were the drugs to become ineffective, the collar could automatically activate.
Wanda IMHO likely does posess Chaos Magic (going by Joe Russo's comments) but has yet to realize it.
The combination of the drugs imprisoning her mind, the straitjacket imprisoning her body, on top of being in an underwater prison. Given the script's emphasis on her lack of rights due to having no nation, torture is not out of the question to have happened.
Even worse, she is also in a separate hall to the other Team Cap members. "RL-8" refers to "Raft Level 8", and there are multiple halls, likely 6-18 per level.
Clint says "gentlemen, the futurist is here!", were Wanda present, he would surely have said "ladies and gentlemen". She's not in that hall.
She also appears to have no bed in her cell.
Sam, Clint, and Scott likely had no idea of her treatment.
Interesting to note; Wanda's deteriorating relationship with humans arguably mirrors Thanos's hateful relationship with the Eternals.
Another thing to note is that if Chthon is indeed active in the MCU, Wanda is now going to be very susceptible to his influence. |
53,716 | In ***Captain America: Civil War***, when Tony visits the Raft, a floating prison in the middle of the ocean, we see Wanda in a straight jacket in her own isolated cell. Makes sense considering how powerful she is. But could she be realistically constrained? In the comics, from what I understand, not a chance. But in the MCU, if she can create a 100ft crater using Vision as the wrecking ball, not to mention how exceedingly strong Vision is, she should be able to easily break out of her cell. Right?
I think the best explanation is that she's accepting her fate, at least temporarily. She's been through an emotional ride and doesn't have the drive to break out and figure out what's next. And given Captain America frees them soon enough, I think it makes sense that she could wait that long. Is that a more realistic explanation? | 2016/05/31 | [
"https://movies.stackexchange.com/questions/53716",
"https://movies.stackexchange.com",
"https://movies.stackexchange.com/users/35242/"
] | Of the four Team Cap members contained on the **Raft**, only Wanda is restrained. Only Wanda cannot talk. Only Wanda isn't moving around. Only Wanda looks braindead.
[](https://i.stack.imgur.com/dfJRZ.png)
She was not only in a straightjacket, preventing her from using her hands which it seems she needs to do to focus her magic/powers, ***but she also had a pair of blinking lights and a collar around her neck.*** The MCU wiki and tumblr in general call it a shock collar, but I didn't see any shock involved, it may be that simple or more involved. Of course, Hawkeye proved all it took to stop her in ***Age of Ultron*** was a taser arrow to the head. Sleepy Wanda is no threat.
Marvel comics, and really any comic or series where people, mutants or enhanced humans have powers, often have some device, usually a collar, that is used by normals to remove/restrict/dampen/depower them. Two related tropes [Power Nullifier](http://tvtropes.org/pmwiki/pmwiki.php/Main/PowerNullifier) and [Slave Collar](http://tvtropes.org/pmwiki/pmwiki.php/Main/SlaveCollar). Loki's muzzle comes to mind, as well as Loreli's (and Sif's) in Agents of SHIELD
[](https://i.stack.imgur.com/cBgj3m.jpg)[](https://i.stack.imgur.com/HPWtNm.jpg)[](https://i.stack.imgur.com/18PUsm.gif)[](https://i.stack.imgur.com/MQht6m.png)
The movies haven't gone the cartoony route of Agents of SHIELD tree sap prison cells and stuff, keep in mind that technology is abundant in the movies.
In ***Age of Ultron***, the Avengers capture the Hydra base, and recover some or all of the data on the creation and study of the Twins, which Sharon gives to Cap during it. At the end, between AoU and Captain America 3, Wanda has trained with the Avengers, leading to more data. In ***Civil War***, Tony basically hands over the Avengers to Senator "Thunderbolt" Ross and the UN, and having fought with Wanda and the rest of Team Cap, likely used that data to form a way to keep Wanda from using her powers.
### Essentially, they are keeping her sedated or shocked, restrained, and depowered as best they can. A comatose or heavily drugged prisoner is a prisoner who can't fight. If Wanda is unrestrained she can bring buildings down with her mind. The other three are normal peak humans, unenhanced, so they don't need to be kept sedated. | I think another reason maybe because of everything that's happened. I would say it's about a week and like 2-3 days since the bombing accident. I think it would have taken a day or two for the Accords to be made after the accident, another a day or two for the Accords to be presented to the Avengers, three days for them to sign, a day for the car park fight and then they were arrested and taken to the Raft the next day, which adds up to about a week and a few days. It would have been a long week for her so she's probably tired. On top of that, it probably hasn't been that long since her twin brother died (I say 6 months tops, if that) and that would also mean it would have been about half a year since she was freed from Hydra and being in a cage/prison environment. For her to suddenly be back in it may make her go into a sort of in shock headset, where she didn't even try to fight back. |
53,716 | In ***Captain America: Civil War***, when Tony visits the Raft, a floating prison in the middle of the ocean, we see Wanda in a straight jacket in her own isolated cell. Makes sense considering how powerful she is. But could she be realistically constrained? In the comics, from what I understand, not a chance. But in the MCU, if she can create a 100ft crater using Vision as the wrecking ball, not to mention how exceedingly strong Vision is, she should be able to easily break out of her cell. Right?
I think the best explanation is that she's accepting her fate, at least temporarily. She's been through an emotional ride and doesn't have the drive to break out and figure out what's next. And given Captain America frees them soon enough, I think it makes sense that she could wait that long. Is that a more realistic explanation? | 2016/05/31 | [
"https://movies.stackexchange.com/questions/53716",
"https://movies.stackexchange.com",
"https://movies.stackexchange.com/users/35242/"
] | Of the four Team Cap members contained on the **Raft**, only Wanda is restrained. Only Wanda cannot talk. Only Wanda isn't moving around. Only Wanda looks braindead.
[](https://i.stack.imgur.com/dfJRZ.png)
She was not only in a straightjacket, preventing her from using her hands which it seems she needs to do to focus her magic/powers, ***but she also had a pair of blinking lights and a collar around her neck.*** The MCU wiki and tumblr in general call it a shock collar, but I didn't see any shock involved, it may be that simple or more involved. Of course, Hawkeye proved all it took to stop her in ***Age of Ultron*** was a taser arrow to the head. Sleepy Wanda is no threat.
Marvel comics, and really any comic or series where people, mutants or enhanced humans have powers, often have some device, usually a collar, that is used by normals to remove/restrict/dampen/depower them. Two related tropes [Power Nullifier](http://tvtropes.org/pmwiki/pmwiki.php/Main/PowerNullifier) and [Slave Collar](http://tvtropes.org/pmwiki/pmwiki.php/Main/SlaveCollar). Loki's muzzle comes to mind, as well as Loreli's (and Sif's) in Agents of SHIELD
[](https://i.stack.imgur.com/cBgj3m.jpg)[](https://i.stack.imgur.com/HPWtNm.jpg)[](https://i.stack.imgur.com/18PUsm.gif)[](https://i.stack.imgur.com/MQht6m.png)
The movies haven't gone the cartoony route of Agents of SHIELD tree sap prison cells and stuff, keep in mind that technology is abundant in the movies.
In ***Age of Ultron***, the Avengers capture the Hydra base, and recover some or all of the data on the creation and study of the Twins, which Sharon gives to Cap during it. At the end, between AoU and Captain America 3, Wanda has trained with the Avengers, leading to more data. In ***Civil War***, Tony basically hands over the Avengers to Senator "Thunderbolt" Ross and the UN, and having fought with Wanda and the rest of Team Cap, likely used that data to form a way to keep Wanda from using her powers.
### Essentially, they are keeping her sedated or shocked, restrained, and depowered as best they can. A comatose or heavily drugged prisoner is a prisoner who can't fight. If Wanda is unrestrained she can bring buildings down with her mind. The other three are normal peak humans, unenhanced, so they don't need to be kept sedated. | Wanda is restrained in a straitjacket, a shock collar, and is almost certainly heavily drugged.
The shock collar is likely triggered by detecting neural activity as well as physical; the drugs limit her to basic mental functions and were the drugs to become ineffective, the collar could automatically activate.
Wanda IMHO likely does posess Chaos Magic (going by Joe Russo's comments) but has yet to realize it.
The combination of the drugs imprisoning her mind, the straitjacket imprisoning her body, on top of being in an underwater prison. Given the script's emphasis on her lack of rights due to having no nation, torture is not out of the question to have happened.
Even worse, she is also in a separate hall to the other Team Cap members. "RL-8" refers to "Raft Level 8", and there are multiple halls, likely 6-18 per level.
Clint says "gentlemen, the futurist is here!", were Wanda present, he would surely have said "ladies and gentlemen". She's not in that hall.
She also appears to have no bed in her cell.
Sam, Clint, and Scott likely had no idea of her treatment.
Interesting to note; Wanda's deteriorating relationship with humans arguably mirrors Thanos's hateful relationship with the Eternals.
Another thing to note is that if Chthon is indeed active in the MCU, Wanda is now going to be very susceptible to his influence. |
53,716 | In ***Captain America: Civil War***, when Tony visits the Raft, a floating prison in the middle of the ocean, we see Wanda in a straight jacket in her own isolated cell. Makes sense considering how powerful she is. But could she be realistically constrained? In the comics, from what I understand, not a chance. But in the MCU, if she can create a 100ft crater using Vision as the wrecking ball, not to mention how exceedingly strong Vision is, she should be able to easily break out of her cell. Right?
I think the best explanation is that she's accepting her fate, at least temporarily. She's been through an emotional ride and doesn't have the drive to break out and figure out what's next. And given Captain America frees them soon enough, I think it makes sense that she could wait that long. Is that a more realistic explanation? | 2016/05/31 | [
"https://movies.stackexchange.com/questions/53716",
"https://movies.stackexchange.com",
"https://movies.stackexchange.com/users/35242/"
] | Wanda is restrained in a straitjacket, a shock collar, and is almost certainly heavily drugged.
The shock collar is likely triggered by detecting neural activity as well as physical; the drugs limit her to basic mental functions and were the drugs to become ineffective, the collar could automatically activate.
Wanda IMHO likely does posess Chaos Magic (going by Joe Russo's comments) but has yet to realize it.
The combination of the drugs imprisoning her mind, the straitjacket imprisoning her body, on top of being in an underwater prison. Given the script's emphasis on her lack of rights due to having no nation, torture is not out of the question to have happened.
Even worse, she is also in a separate hall to the other Team Cap members. "RL-8" refers to "Raft Level 8", and there are multiple halls, likely 6-18 per level.
Clint says "gentlemen, the futurist is here!", were Wanda present, he would surely have said "ladies and gentlemen". She's not in that hall.
She also appears to have no bed in her cell.
Sam, Clint, and Scott likely had no idea of her treatment.
Interesting to note; Wanda's deteriorating relationship with humans arguably mirrors Thanos's hateful relationship with the Eternals.
Another thing to note is that if Chthon is indeed active in the MCU, Wanda is now going to be very susceptible to his influence. | I think another reason maybe because of everything that's happened. I would say it's about a week and like 2-3 days since the bombing accident. I think it would have taken a day or two for the Accords to be made after the accident, another a day or two for the Accords to be presented to the Avengers, three days for them to sign, a day for the car park fight and then they were arrested and taken to the Raft the next day, which adds up to about a week and a few days. It would have been a long week for her so she's probably tired. On top of that, it probably hasn't been that long since her twin brother died (I say 6 months tops, if that) and that would also mean it would have been about half a year since she was freed from Hydra and being in a cage/prison environment. For her to suddenly be back in it may make her go into a sort of in shock headset, where she didn't even try to fight back. |
16,506 | I am writing a new CV. I want to choose a title for a section which specifies the courses I've taken at the graduate level. Since I've attended more than one graduate programs, which one of these is preferred for the title?
1. Courses taken at graduate level
2. Courses taken in graduate program | 2011/03/16 | [
"https://english.stackexchange.com/questions/16506",
"https://english.stackexchange.com",
"https://english.stackexchange.com/users/6156/"
] | I think **Courses taken at graduate level** is more appropriate since it will imply that you are referring to all the courses you have pursued while in graduate program(s).
On the other hand, **Courses taken in graduate program** would limit the clarity and one may end up assuming that you did only one graduate program.
On you can say **Courses pursued in graduate programs**, but the first one seems more appropriate to me.
Thanks. | You could just sum it up as
>
> Post-graduate courses
>
>
>
or
>
> Post-graduate course work
>
>
>
or
>
> Post-graduate studies
>
>
> |
16,506 | I am writing a new CV. I want to choose a title for a section which specifies the courses I've taken at the graduate level. Since I've attended more than one graduate programs, which one of these is preferred for the title?
1. Courses taken at graduate level
2. Courses taken in graduate program | 2011/03/16 | [
"https://english.stackexchange.com/questions/16506",
"https://english.stackexchange.com",
"https://english.stackexchange.com/users/6156/"
] | Firstly, "**courses taken at graduate level**" just about sounds perfect.
It also removes the need to pinpoint any specific program that was taken.
"courses taken at graduate program", on the other hand should ideally be followed by the name of the program. This should be used only in the event that you have taken multiple programs at graduate level and is redundant otherwise. | You could just sum it up as
>
> Post-graduate courses
>
>
>
or
>
> Post-graduate course work
>
>
>
or
>
> Post-graduate studies
>
>
> |
16,506 | I am writing a new CV. I want to choose a title for a section which specifies the courses I've taken at the graduate level. Since I've attended more than one graduate programs, which one of these is preferred for the title?
1. Courses taken at graduate level
2. Courses taken in graduate program | 2011/03/16 | [
"https://english.stackexchange.com/questions/16506",
"https://english.stackexchange.com",
"https://english.stackexchange.com/users/6156/"
] | I think **Courses taken at graduate level** is more appropriate since it will imply that you are referring to all the courses you have pursued while in graduate program(s).
On the other hand, **Courses taken in graduate program** would limit the clarity and one may end up assuming that you did only one graduate program.
On you can say **Courses pursued in graduate programs**, but the first one seems more appropriate to me.
Thanks. | Firstly, "**courses taken at graduate level**" just about sounds perfect.
It also removes the need to pinpoint any specific program that was taken.
"courses taken at graduate program", on the other hand should ideally be followed by the name of the program. This should be used only in the event that you have taken multiple programs at graduate level and is redundant otherwise. |
2,055,932 | Do you know any online problem sets or contests that accept solutions in Haskell? I know only [El Judge](http://acm.mipt.ru/twiki/bin/view/ELJudge/WebHome), but unfortunately it has some problems with ghc, so any Haskell problem is rejected with "memory limit" resolution. | 2010/01/13 | [
"https://Stackoverflow.com/questions/2055932",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/11732/"
] | Check out [99 haskell problems](http://www.haskell.org/haskellwiki/H-99%3a_Ninety-Nine_Haskell_Problems) | [Coderforces.com](http://codeforces.com/)
You can also see how others have solved a problem using Haskell, e.g., submissions by [watashi](http://codeforces.com/submissions/watashi) and [jbin](http://codeforces.com/submissions/bjin) (jbin and watashi are both ACM-ICPC world finals champions, in 2012 and 2010 respectively.)
jbin's github: <https://github.com/bjin/puzzles> |
2,055,932 | Do you know any online problem sets or contests that accept solutions in Haskell? I know only [El Judge](http://acm.mipt.ru/twiki/bin/view/ELJudge/WebHome), but unfortunately it has some problems with ghc, so any Haskell problem is rejected with "memory limit" resolution. | 2010/01/13 | [
"https://Stackoverflow.com/questions/2055932",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/11732/"
] | [Google Code Jam](http://code.google.com/codejam/) | Did you just miss [ICFP Programming Contest](http://en.wikipedia.org/wiki/ICFP_Programming_Contest)? |
2,055,932 | Do you know any online problem sets or contests that accept solutions in Haskell? I know only [El Judge](http://acm.mipt.ru/twiki/bin/view/ELJudge/WebHome), but unfortunately it has some problems with ghc, so any Haskell problem is rejected with "memory limit" resolution. | 2010/01/13 | [
"https://Stackoverflow.com/questions/2055932",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/11732/"
] | [Project Euler](http://projecteuler.net/) problems are quite a good fit for Haskell. You run your own code and submit your answer on the website. | Did you just miss [ICFP Programming Contest](http://en.wikipedia.org/wiki/ICFP_Programming_Contest)? |
2,055,932 | Do you know any online problem sets or contests that accept solutions in Haskell? I know only [El Judge](http://acm.mipt.ru/twiki/bin/view/ELJudge/WebHome), but unfortunately it has some problems with ghc, so any Haskell problem is rejected with "memory limit" resolution. | 2010/01/13 | [
"https://Stackoverflow.com/questions/2055932",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/11732/"
] | [Code Chef](http://www.codechef.com/) accepts Haskell. | [Google Code Jam](http://code.google.com/codejam/) |
2,055,932 | Do you know any online problem sets or contests that accept solutions in Haskell? I know only [El Judge](http://acm.mipt.ru/twiki/bin/view/ELJudge/WebHome), but unfortunately it has some problems with ghc, so any Haskell problem is rejected with "memory limit" resolution. | 2010/01/13 | [
"https://Stackoverflow.com/questions/2055932",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/11732/"
] | [Facebook Puzzles](http://www.facebook.com/careers/puzzles.php) (GHC Haskell 6.8.2) | * [HackerRank](https://www.hackerrank.com/environment): HaskellPlatform 2013.2.0.0 + logict lens pipes mwc-random hashtables regex-pcre hmatrix aeson and hashmap libraries
* [HackerEarth](http://www.hackerearth.com/docs/judge/#language-compilers): GHC 7.4.1 |
2,055,932 | Do you know any online problem sets or contests that accept solutions in Haskell? I know only [El Judge](http://acm.mipt.ru/twiki/bin/view/ELJudge/WebHome), but unfortunately it has some problems with ghc, so any Haskell problem is rejected with "memory limit" resolution. | 2010/01/13 | [
"https://Stackoverflow.com/questions/2055932",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/11732/"
] | [Sphere Online Judge (SPOJ)](http://www.spoj.pl)
It uses ghc 6.10.4 compiler. | [Project Euler](http://projecteuler.net) |
2,055,932 | Do you know any online problem sets or contests that accept solutions in Haskell? I know only [El Judge](http://acm.mipt.ru/twiki/bin/view/ELJudge/WebHome), but unfortunately it has some problems with ghc, so any Haskell problem is rejected with "memory limit" resolution. | 2010/01/13 | [
"https://Stackoverflow.com/questions/2055932",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/11732/"
] | [Facebook Puzzles](http://www.facebook.com/careers/puzzles.php) (GHC Haskell 6.8.2) | Did you just miss [ICFP Programming Contest](http://en.wikipedia.org/wiki/ICFP_Programming_Contest)? |
2,055,932 | Do you know any online problem sets or contests that accept solutions in Haskell? I know only [El Judge](http://acm.mipt.ru/twiki/bin/view/ELJudge/WebHome), but unfortunately it has some problems with ghc, so any Haskell problem is rejected with "memory limit" resolution. | 2010/01/13 | [
"https://Stackoverflow.com/questions/2055932",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/11732/"
] | [Code Chef](http://www.codechef.com/) accepts Haskell. | [Project Euler](http://projecteuler.net) |
2,055,932 | Do you know any online problem sets or contests that accept solutions in Haskell? I know only [El Judge](http://acm.mipt.ru/twiki/bin/view/ELJudge/WebHome), but unfortunately it has some problems with ghc, so any Haskell problem is rejected with "memory limit" resolution. | 2010/01/13 | [
"https://Stackoverflow.com/questions/2055932",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/11732/"
] | * [exercism](http://exercism.io/) has exercises in Haskell.
* [CodinGame](http://www.codingame.com/) accepts.
* others like [UVa Online Judge](http://uva.onlinejudge.org/), Google Code Jam, Project Euler and etc, don't require a specific programming language.
Additionally, there's the [Programming Contests](http://www.haskell.org/haskellwiki/Programming_contests) page in Haskell.org. | * [HackerRank](https://www.hackerrank.com/environment): HaskellPlatform 2013.2.0.0 + logict lens pipes mwc-random hashtables regex-pcre hmatrix aeson and hashmap libraries
* [HackerEarth](http://www.hackerearth.com/docs/judge/#language-compilers): GHC 7.4.1 |
2,055,932 | Do you know any online problem sets or contests that accept solutions in Haskell? I know only [El Judge](http://acm.mipt.ru/twiki/bin/view/ELJudge/WebHome), but unfortunately it has some problems with ghc, so any Haskell problem is rejected with "memory limit" resolution. | 2010/01/13 | [
"https://Stackoverflow.com/questions/2055932",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/11732/"
] | [Sphere Online Judge (SPOJ)](http://www.spoj.pl)
It uses ghc 6.10.4 compiler. | [Facebook Puzzles](http://www.facebook.com/careers/puzzles.php) (GHC Haskell 6.8.2) |
184,055 | We all know how an electric current causes magnetic fields. But when a single electron is flowing through the wire, how is this electron creating the magnetic field or how are electrons responsible for magnetic field around a wire? | 2015/05/14 | [
"https://physics.stackexchange.com/questions/184055",
"https://physics.stackexchange.com",
"https://physics.stackexchange.com/users/80742/"
] | In the FLRW model which is used today normal (baryonic) matter and dark matter together add up to matter. It dilutes with the growing radius to the third power (because volume is proportional to radius³). So the ratio matter : dark matter is and was always the same, at least in the plot you showed and the model that was used there.
Edit: Maybe the 5.25 to 5 change John Rennie mentioned comes from matter which has been transformed into radiation with time (the sun for example radiates away 4e26 Watt, which means it converts a little more than 4e9 kg of baryonic matter to photons every second. Dark Matter on the other hand can or at least does not transform into radiation energy like normal matter does inside stars). | I the very early universe there was very little atoms. Atoms are mainly made from exploding stars. I the first pie chart there are less atoms and more photons. This is because that was the initial state and the universe. It was highly fence with photons and neutrinos going in all directions.
They will be more of all materials in the second pie chart. For matter and universe has increased in volume with starts ending and expelling larger atoms. The Higgs field continues to create matter. Its just the ratios that have changed. Its not worth put the photons and neutrinos on the second pie chart. Although there quantity has dramatically increased the ratios now are so much lower that the atom ratio.
More humility learning needs to come before your question about dark matter ratios can be answered. |
184,055 | We all know how an electric current causes magnetic fields. But when a single electron is flowing through the wire, how is this electron creating the magnetic field or how are electrons responsible for magnetic field around a wire? | 2015/05/14 | [
"https://physics.stackexchange.com/questions/184055",
"https://physics.stackexchange.com",
"https://physics.stackexchange.com/users/80742/"
] | The following graph indicates the amount of radiation, matter (which almost is entirely made of dark matter), and dark energy vs time. We are at a point in time where dark energy has just started to dominate. For instance, if you go back to the first few years, radiation was the most abundant source of energy.
 | I the very early universe there was very little atoms. Atoms are mainly made from exploding stars. I the first pie chart there are less atoms and more photons. This is because that was the initial state and the universe. It was highly fence with photons and neutrinos going in all directions.
They will be more of all materials in the second pie chart. For matter and universe has increased in volume with starts ending and expelling larger atoms. The Higgs field continues to create matter. Its just the ratios that have changed. Its not worth put the photons and neutrinos on the second pie chart. Although there quantity has dramatically increased the ratios now are so much lower that the atom ratio.
More humility learning needs to come before your question about dark matter ratios can be answered. |
59,588 | There are two vents going up to our roof, one is the normal vent from the furnace exhaust straight up to the roof. But right next to it there's a second vent pipe, a little larger and single wall. This second pipe starts at the top of the furnace closet, about three feet above the furnace, has no obvious function and also vents out to the roof. It is not hooked to the furnace. The roofers are not able to properly cap these two vents because they are so close together, so we would like to just get rid of that second one, but we don't know if it has some official function.
Some previous owner of this 1960's California house made modifications and we just want to get it back to normal code. The furnace closet also used to have a drywall ceiling which was apparently partly ripped away, and we don't know what the code requirement is, aside from providing the proper clearance from the furnace vent to combustible materials. The furnace closet at this time is open to the attic. The odd second pipe which we want to remove seems to be part of the original house construction, judging by the way it's fitted into the ceiling drywall.
Combustion supply air comes from the crawl space below which is well vented.
I took a close look at a friend's house and that furnace closet has no ceiling and only the one vent that goes from the furnace to the roof. Can anybody comment on this situation and help us decide what to do here? Can we get rid of that second vent? What about the drywall ceiling above the furnace? Thanks | 2015/02/16 | [
"https://diy.stackexchange.com/questions/59588",
"https://diy.stackexchange.com",
"https://diy.stackexchange.com/users/32769/"
] | It could be an intake. Furnaces require combustion air, which can only be taken from certain sources. If the furnace is in a utility closet (or surrounded by living space), the pipe could be supplying combustion air. If this is the case, it cannot be removed.
Without more detail, it's impossible to definitively answer this question. | It sounds like this pipe was originally an air intake, but that since it was installed, the furnace closet has been substantially altered. Since you're in California and this involves combustion appliances, there's bound to be a code official involved at some point, and he'll tell you what an appropriate source of combustion air would be. It's possible you'll be able to remove this original air vent if the inspector approves of the combustion air coming from somewhere else.
Another option is to simply shorten the vent so it pulls combustion air from the attic, assuming the attic is a vented one that is effectively open to the outside. That's how my own furnace closet is set up, and it's perfectly code-compliant. That would allow you to remove the part of the vent that goes through the roof. |
59,588 | There are two vents going up to our roof, one is the normal vent from the furnace exhaust straight up to the roof. But right next to it there's a second vent pipe, a little larger and single wall. This second pipe starts at the top of the furnace closet, about three feet above the furnace, has no obvious function and also vents out to the roof. It is not hooked to the furnace. The roofers are not able to properly cap these two vents because they are so close together, so we would like to just get rid of that second one, but we don't know if it has some official function.
Some previous owner of this 1960's California house made modifications and we just want to get it back to normal code. The furnace closet also used to have a drywall ceiling which was apparently partly ripped away, and we don't know what the code requirement is, aside from providing the proper clearance from the furnace vent to combustible materials. The furnace closet at this time is open to the attic. The odd second pipe which we want to remove seems to be part of the original house construction, judging by the way it's fitted into the ceiling drywall.
Combustion supply air comes from the crawl space below which is well vented.
I took a close look at a friend's house and that furnace closet has no ceiling and only the one vent that goes from the furnace to the roof. Can anybody comment on this situation and help us decide what to do here? Can we get rid of that second vent? What about the drywall ceiling above the furnace? Thanks | 2015/02/16 | [
"https://diy.stackexchange.com/questions/59588",
"https://diy.stackexchange.com",
"https://diy.stackexchange.com/users/32769/"
] | It could be an intake. Furnaces require combustion air, which can only be taken from certain sources. If the furnace is in a utility closet (or surrounded by living space), the pipe could be supplying combustion air. If this is the case, it cannot be removed.
Without more detail, it's impossible to definitively answer this question. | That pipe could also be an old sewer vent pipe that got disconnected during previous renovations but not removed. In these parts at least, it is the norm for there to be a vent pipe for the sewer line on the roof to allow noxious gasses to escape and prevent air-locks in the sewer line.
It could be an air intake for the furnace too, but knowing how leaky California houses are I doubt that would be much of an issue esp. if your furnace closet is open to the attic.
I'd have them shorten the pipe to be below roof level and beg forgiveness later if need be. |
6,972,578 | I'm building an application which will be available on several platforms (web, iphone, android...). They all display data from the same database.
What's the best way of storing some decorated text in the database to easily display it on all platforms? By saying decorated text, I mean on decorations like bold, italic, underline...
One option might be writing a BB code parser for each platform and storing a BB Code decorated text in database, but it doesn't sound like the best solution to me.
Any opinions? :) | 2011/08/07 | [
"https://Stackoverflow.com/questions/6972578",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/307352/"
] | From your description and code snippets it looks like you have manually implemented a UINavigationController - and in the process created a lot of work for yourself.
Apple provide the UINavigationContoller class as a core part of the UIKit framework for presenting users with a hierarchy of views. This hierarchy is implemented using a stack data structure, where the stack is composed of a number of UIViewController instances. The usage of a stack fits well with the navigation paradigm, as the user moves through the navigation hierarchy more views are pushed onto the stack. Take for example the Contacts app, its UINavigationController contains at first a UIViewController listing all contacts. Subsequently when a user taps on a contacts name they are presented with that contact's information. This translates to a new UIViewController containing the contact's information being pushed onto the UINavigationController's stack. Subsequently when the user moves back to the list of contacts they pop the contact information UIViewController from the stack.
The easiest way to see how this all works in practice is to create a new 'Navigation Based' project and look at the code. | I hope you might be knowing about inbuilt video player, you can make use of this to play video which can be presented as modal view:
MPMoviePlayerViewController \*m\_MoviePlayer =[[MPMoviePlayerViewController alloc] initWithContentURL:pUrl];
[self presentMoviePlayerViewControllerAnimated:m\_MoviePlayer]; |
27,412 | I've downloaded the IOS5 IPSW from Apple's site and want to update it from within iTunes. So,
* Does the update require an Internet connection?
* Does the iPhone switch off/reboot just as the update is initiated?
I ask because I'm at my new place where I'm yet to setup an Internet connection & my iPhone tethered to my laptop is my only Internet connection. I don't want my phone to be bricked because it cannot verify the update or what-not because there's no Internet connection. | 2011/10/13 | [
"https://apple.stackexchange.com/questions/27412",
"https://apple.stackexchange.com",
"https://apple.stackexchange.com/users/2110/"
] | Yes it does. It has to verify the firmware with Apple's servers (gs.apple.com). If it cannot, it will error out (usually presenting a 3XXX error, which is quite often 3004) and fail to update. | it does require internet. Just made the answer short. |
256,577 | Is there a command that will deny anyone else to edit the directory I created?
They also have admin rights, but I only want to let them read the file not able to edit/delete it.
I know chmod commands, but that provides the permission only and anyone with root privilege can still make the changes. | 2016/01/20 | [
"https://unix.stackexchange.com/questions/256577",
"https://unix.stackexchange.com",
"https://unix.stackexchange.com/users/152210/"
] | No. You cannot do anything to prevent other people with root access on the machine from modifying your files or directories. Root users have full access by definition, and any permission or ACL that you could set can be easily unset by them. | **Yes , there is a solution.**
You should just cut the directory and place it on a server where only you have the root access and privilege. Then share that directory with all other users through NFS from that server and restrict them to read access by using root squash.
**Reference:**
Root squash is a reduction of the access rights for the remote superuser (root) when using identity authentication (local user is the same as remote user). It is primarily a feature of NFS but may be available on other systems as well.
This problem arises when a remote file system is shared by multiple users. These users belong to one or multiple groups. In Unix, every file and folder normally has separate permissions (read, write, execute) for the owner (normally the creator of the file), for the group to which the owner belongs, and for the "world" (all other users). This allows restriction of read and write access only to the authorized users while in general the NFS server must also be protected by firewall.
A superuser has more rights than an ordinary user, being able to change the file ownership, set arbitrary permissions, and access all protected content. **Even users that do need to have root access to individual workstations may not be authorized for the similar actions on a shared file system. Root squash reduces rights of the remote root, making one no longer superuser. On UNIX like systems, root squash option can be turned on and off in /etc/exports file on a server side.**
After implementing the root squash, the authorized superuser performs restricted actions after logging into an NFS server directly and not just by mounting the exported NFS folder. |
29,956,254 | I'm a newbie at SOAP and web services (2 day experience).
I use Bonita Open Solution as a BPMS in which I have a 'WebServer SOAP 1.2' connector. I need to get and write data from/into a database using SOAP. I don't want to use the 'SQL Server' connector which is based on JDBC because the system will be tightly-coupled.
Is there any already implemented SOAP web service in SQL Server 2008 to do that or should I develop my own? In case I should develop my own, I'm guessing the best way to do so is using ASP.NET, am I right? | 2015/04/29 | [
"https://Stackoverflow.com/questions/29956254",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/3711885/"
] | Before you do *anything*, you need to decide exactly which data is required by the BPMS system and what access it requires. For instance, it may need read access to some data, but read and write to other data. Your service should only expose the data and operations which are actually *required*, and nothing more.
Your data is precious - don't expose more of it than necessary.
I recommend that you use Entity Framework in a database-first mode, but only add the required tables to the model. Then, simplify the model by removing columns which are not required, simplifying relationships, etc. Thus, you are exposing a conceptual model of your data which makes sense to the consumer, rather than having to expose every implementation detail of your database (do you really need to expose every junction table, for instance?)
It is then pretty simple to write a WCF service that uses Entity Framework to do the hard work of data access. | Even if deprecated, Sql Server 2008 has native SOAP web services (see [Native XML Web Services: Deprecated in SQL Server 2008](https://msdn.microsoft.com/en-us/library/cc280436%28v=sql.105%29.aspx)).
You need to balance the risk of a Sql Server upgrade against the cost of developing (and maintain) a custom service. |
110,966 | I've been working on a Pathfinder campaign. The backstory of the homebrew campaign I'm running implies that some characters are born with an amount of magical strength that sticks with them throughout their life. If someone were to be a powerful mage, it would be due to the fortune of their birth.
My idea was that I could add another Ability Score (Magic) and use that as a substitute for the modifier on rolls related to magic instead of things like Charisma, Intelligence, or Wisdom.
Would this break the game? Looking for feedback on this change from people more experienced with the Pathfinder system.
Thank you. | 2017/12/02 | [
"https://rpg.stackexchange.com/questions/110966",
"https://rpg.stackexchange.com",
"https://rpg.stackexchange.com/users/39771/"
] | When to Homebrew
----------------
First, let's start with some theory. Ask yourself "why do I want to create this homebrew rule?" Is it because it provides for something the current rules don't, or because it sounds cool to make it? You should have a clear vision for what your rule provides that the existing rules don't.
Current Options
---------------
As far as you flavor goes, Pathfinder's core rules already contain exactly this idea. The [Sorceror](http://www.d20pfsrd.com/classes/core-classes/sorcerer/) is a class which explicitly gets its spellcasting power from its heritage. They are born with magical power lurking within them. Your proposed homebrew is redundant with existing options.
Another Issue: Scope
--------------------
Another consideration might be the difficulty of the proposed rule. Creating a homebrew item, spell, feat, etc. is easier because you haven't touched the underlying rules. In this case you are proposing a change to the fundamental aspects of a character. Any change here will have an influence on nearly every other aspect of a character. Attributes influence class abilities (including spells), skills, saving throws, feats, and more. Are you really ready to re-balance all of those based on your idea?
To be clear you don't just need to re-balance the parts explicitly tied to spellcasting, you need to consider its effect on *everything*. If a Wizard uses your Magic attribute instead of Intelligence, that will also dramatically decrease their skill points. It will decrease their Intelligence-based skills. They may not qualify for some feats, which explicitly require a base Intelligence score.
Alternatives
------------
All of my campaign settings take place in my own creations. I nearly always tinker with the default races, classes, etc. to fit the world I am creating. Generally, it is much easier to *cut* published material than it is to add to it. Just tell your players that for flavor reasons, the only full spell-casters available are Sorcerors. | The game system uses the six ability scores as its foundation. Tampering with this foundation by adding another ability score will create an enormous amount of work for you because the game assumes there are only six ability scores. This will have the following impacts.
1. **Every spellcaster (including martials) will become more MAD.** (*M*ultiple *A*bility *D*ependent.) Since this new ability score has no inherent value beyond spellcasting, this will result in all spellcasters needing more ability scores. This will be bad for gish classes and martials like the paladin because these classes already need physical ability scores to function.
2. **Creates a terrible dilemma for skill-based spellcasters.** Bards, inquisitors, and similar spellcasters that are primarily skill-focused will suffer because now there's an opportunity cost between investing in skill ability scores and investing in the Magic ability score.
3. **Less distinction between spellcasting classes.** Now that all spellcasters need the exact same ability score to function, you will see less distinction between spellcasting classes. No more can we assume sorcerers and bards will be more charismatic. Nor we can assume clerics will be wise or the wizards intelligent. This hurts the flavor of each class's method of spellcasting.
4. **Requires an enormous amount of new content changes.** You will now have to add new magic items, spells, feats, etc. that will interact with the new ability score. Races will have to be changed. This is a lot of new work for you that will ultimately not be very fruitful.
Overall, adding a Magic ability score will create an enormous amount of work for you and your players while not really accomplishing much aside from homogenizing the flavor of spellcasting classes and increasing the opportunity costs of being a spellcaster (of any kind) or a skill monkey. |
6,979 | I share a small room with my brother, and recently he got a desktop computer (he was using a laptop beforehand).
The room's layout is such that my table is right next to the door, while his table is on the other side of the room, directly opposite the door.
Since it was a new computer, he had to redownload all his games and programs. Initially he was using the computer's internal wifi card, and I suggested hooking up a LAN cable from outside temporarily to download his games quicker. I now regret it, because he now insists on leaving the LAN cable connected to his computer permanently.
This brings up a number of issues.
* The LAN cable runs from the living room all the way to my room. It is not hooked to the wall or the ceiling, just trailed on the floor without being secured in any way. This is a tripping hazard for people walking in the corridor outside.
* The cable is led into my room by jamming it through the gap between the sides of the door. More often than not, opening/closing the door will result in the door being jammed since it is not a flat LAN cable. We turn on the A/C at night and leave the door closed, so every time someone enters/exits the room the door gets jammed pretty often.
* My work table is next to the door, and when I pull out my chair to sit down / get up, it runs over the LAN cable, and jams the wheels of the chair as well. This has forced me to sit in an awkward way where my chair and body is facing in a slant direction towards the table in order to avoid the cable, which is not very comfortable.
* There is only one bedframe for one person to sleep, and every night at bedtime someone (usually me) has to move a mattress from another room into my room for the other person to sleep. The cables running from outside complicate this a little because I have to lift / toss it around to avoid snagging the cables. Previously I could simply push/drag it along the floor as there was nothing blocking the way.
I've tried repeatedly to convince him to unplug it and just use wifi, but he seems pretty damn adamant about it. Here's what I tried -
* Ask multiple times, with increasing exasperation each time, "Please unplug the LAN cable and just use wifi.". He either says "later" nonchalantly or ignores me.
* Reason with the reasons stated above to convince him. Ignored or retorted with "how do you even jam the door like that??"
* Reason that his in game ping is not going to be affected by a noticeable amount. Not convinced.
* Compromise with a suggestion - "If you really want a LAN cable, drill a hole in the wall and install a network switch, *please*." Ignored.
The only option I have left is just unplug the cable while he isn't home but I really fear this would lead to conflict. Since young he always had power over me and I really can't do anything if he remains stubborn about a particular issue. But this is one issue that is causing me considerable amounts of inconvenience that I can't just let it go. | 2017/11/19 | [
"https://interpersonal.stackexchange.com/questions/6979",
"https://interpersonal.stackexchange.com",
"https://interpersonal.stackexchange.com/users/9135/"
] | This problem is not inconveniencing your brother, and he has shown to be disinclined to alter his behavior due to the inconvenience to you. It is possible that convincing him of the scope of the inconvenience on your part might change his mind ([here is an excellent example of a problem that was resolved that way](https://interpersonal.stackexchange.com/questions/5873/co-tenants-set-up-an-inflatable-pool-outside-my-window-its-now-breeding-bugs)), but given what you've said so far it does not seem likely.
If your brother is only going to alter his behavior to his own benefit, your only options are to **alter the situation so that it begins to inconvenience him, or remove his ability to maintain the status quo.**
Either of those options is going to bring you into conflict with your brother, unless you can effect the change without your brother knowing that you caused it. StephenG suggested a way in which the current setup is already a potential inconvenience (a tripping hazard is also a yanking hazard) - making this potential inconvenience a reality may convince him. Or it might not, in which case a more direct confrontation may be needed. | First of all an IT solution may be possible. Consider using a [Powerline network adapter set](https://en.wikipedia.org/wiki/Power-line_communication).
I've used those myself and it may be an option in your case. They don't require any physical alteration to the property.
That said your situation is one that depends on your ages.
If *either* of you are minors then whether or not the cable is allowed is a decision that needs to be made by the relevant legal guardian(s) ( usually parents ). So in that case you present your case to the "authorities" and *they* decide.
**If you are both adults** then I'd suggest this :
>
> The only option I have left is just unplug the cable while he isn't home but I really fear this would lead to conflict.
>
>
>
You can always plug it back in when he's back home. However this will eventually lead to conflict.
But sometimes the conflict is necessary. Avoiding it doesn't fix the problem and your brother seems to exploit this.
>
> Since young he always had power over me and I really can't do anything if he remains stubborn about a particular issue.
>
>
>
Perhaps it's time you started being stubborn too. :-) He is just using your reluctance to confront him. Remember that this was supposed to be a temporary measure, and you are both past that now.
What will eventually happen, whether either of you wants it or not, is that someone will trip on this cable and his precious computer will likely get yanked violently in the process - this I've had happen myself.
So it's really in his interests to deal with this issue.
If this argument fails, then you have been reasonable and, honestly, I'd suggest you just take the cable out at the router end. It's a hazard and a considerable inconvenience and it was supposed to be temporary.
I'd suggest the Powerline is a potential compromise, but my gut feeling is that he'll refuse this.
If that happens then every time he puts in the cable, take it out at the router.
Yes, this may result in a bloody great row. Have it. I think you need to draw a line on this.
Remember that you can let him scream the place down - just take no notice. Just say calmly that you've explained the problems many times and as he won't act responsibly, then you'll have to keep doing this. Don't get involved in a major discussion, don't enter a debate. Tell him to find a solution that works for both of you or you'll be just as stubborn as he is about this.
This cable is not *needed*, it's just *wanted*. On the other hand the safety and inconvenience are issues that *need* fixing, not just "wants". |
6,979 | I share a small room with my brother, and recently he got a desktop computer (he was using a laptop beforehand).
The room's layout is such that my table is right next to the door, while his table is on the other side of the room, directly opposite the door.
Since it was a new computer, he had to redownload all his games and programs. Initially he was using the computer's internal wifi card, and I suggested hooking up a LAN cable from outside temporarily to download his games quicker. I now regret it, because he now insists on leaving the LAN cable connected to his computer permanently.
This brings up a number of issues.
* The LAN cable runs from the living room all the way to my room. It is not hooked to the wall or the ceiling, just trailed on the floor without being secured in any way. This is a tripping hazard for people walking in the corridor outside.
* The cable is led into my room by jamming it through the gap between the sides of the door. More often than not, opening/closing the door will result in the door being jammed since it is not a flat LAN cable. We turn on the A/C at night and leave the door closed, so every time someone enters/exits the room the door gets jammed pretty often.
* My work table is next to the door, and when I pull out my chair to sit down / get up, it runs over the LAN cable, and jams the wheels of the chair as well. This has forced me to sit in an awkward way where my chair and body is facing in a slant direction towards the table in order to avoid the cable, which is not very comfortable.
* There is only one bedframe for one person to sleep, and every night at bedtime someone (usually me) has to move a mattress from another room into my room for the other person to sleep. The cables running from outside complicate this a little because I have to lift / toss it around to avoid snagging the cables. Previously I could simply push/drag it along the floor as there was nothing blocking the way.
I've tried repeatedly to convince him to unplug it and just use wifi, but he seems pretty damn adamant about it. Here's what I tried -
* Ask multiple times, with increasing exasperation each time, "Please unplug the LAN cable and just use wifi.". He either says "later" nonchalantly or ignores me.
* Reason with the reasons stated above to convince him. Ignored or retorted with "how do you even jam the door like that??"
* Reason that his in game ping is not going to be affected by a noticeable amount. Not convinced.
* Compromise with a suggestion - "If you really want a LAN cable, drill a hole in the wall and install a network switch, *please*." Ignored.
The only option I have left is just unplug the cable while he isn't home but I really fear this would lead to conflict. Since young he always had power over me and I really can't do anything if he remains stubborn about a particular issue. But this is one issue that is causing me considerable amounts of inconvenience that I can't just let it go. | 2017/11/19 | [
"https://interpersonal.stackexchange.com/questions/6979",
"https://interpersonal.stackexchange.com",
"https://interpersonal.stackexchange.com/users/9135/"
] | First of all an IT solution may be possible. Consider using a [Powerline network adapter set](https://en.wikipedia.org/wiki/Power-line_communication).
I've used those myself and it may be an option in your case. They don't require any physical alteration to the property.
That said your situation is one that depends on your ages.
If *either* of you are minors then whether or not the cable is allowed is a decision that needs to be made by the relevant legal guardian(s) ( usually parents ). So in that case you present your case to the "authorities" and *they* decide.
**If you are both adults** then I'd suggest this :
>
> The only option I have left is just unplug the cable while he isn't home but I really fear this would lead to conflict.
>
>
>
You can always plug it back in when he's back home. However this will eventually lead to conflict.
But sometimes the conflict is necessary. Avoiding it doesn't fix the problem and your brother seems to exploit this.
>
> Since young he always had power over me and I really can't do anything if he remains stubborn about a particular issue.
>
>
>
Perhaps it's time you started being stubborn too. :-) He is just using your reluctance to confront him. Remember that this was supposed to be a temporary measure, and you are both past that now.
What will eventually happen, whether either of you wants it or not, is that someone will trip on this cable and his precious computer will likely get yanked violently in the process - this I've had happen myself.
So it's really in his interests to deal with this issue.
If this argument fails, then you have been reasonable and, honestly, I'd suggest you just take the cable out at the router end. It's a hazard and a considerable inconvenience and it was supposed to be temporary.
I'd suggest the Powerline is a potential compromise, but my gut feeling is that he'll refuse this.
If that happens then every time he puts in the cable, take it out at the router.
Yes, this may result in a bloody great row. Have it. I think you need to draw a line on this.
Remember that you can let him scream the place down - just take no notice. Just say calmly that you've explained the problems many times and as he won't act responsibly, then you'll have to keep doing this. Don't get involved in a major discussion, don't enter a debate. Tell him to find a solution that works for both of you or you'll be just as stubborn as he is about this.
This cable is not *needed*, it's just *wanted*. On the other hand the safety and inconvenience are issues that *need* fixing, not just "wants". | First of all, for this particular problem, you can find several other solutions (other answers cover that better than I could)
Second of all, if you want your him to do something about it, you're gonna have to make him understand that it's a really problem. You can do that by explaining in detail how and why it bothers you and how to solve it and ask him to solve it.
What seems to be happening thought is that he doesn't listen or take into account to your explanations. If that is the case, a confilct is kind of unavoidable. A conflict however, doesn't mean a fight. You need to muster some courage and be very firm about your position:
>
> This bothers me, and you have plenty of other ways to get an internet connection without bothering me. If you don't do anything about it, I will simply unplug you so that it doesn't bother me anymore.
>
>
>
Now I know that confronting your older brother is a scary thing, however if you always bow down to him, he will always abuse of his power and not take your opinion in consideration. If you can stand your ground a few times, the next time such a situation arises, finding a solution together as equals will be much simpler. |
6,979 | I share a small room with my brother, and recently he got a desktop computer (he was using a laptop beforehand).
The room's layout is such that my table is right next to the door, while his table is on the other side of the room, directly opposite the door.
Since it was a new computer, he had to redownload all his games and programs. Initially he was using the computer's internal wifi card, and I suggested hooking up a LAN cable from outside temporarily to download his games quicker. I now regret it, because he now insists on leaving the LAN cable connected to his computer permanently.
This brings up a number of issues.
* The LAN cable runs from the living room all the way to my room. It is not hooked to the wall or the ceiling, just trailed on the floor without being secured in any way. This is a tripping hazard for people walking in the corridor outside.
* The cable is led into my room by jamming it through the gap between the sides of the door. More often than not, opening/closing the door will result in the door being jammed since it is not a flat LAN cable. We turn on the A/C at night and leave the door closed, so every time someone enters/exits the room the door gets jammed pretty often.
* My work table is next to the door, and when I pull out my chair to sit down / get up, it runs over the LAN cable, and jams the wheels of the chair as well. This has forced me to sit in an awkward way where my chair and body is facing in a slant direction towards the table in order to avoid the cable, which is not very comfortable.
* There is only one bedframe for one person to sleep, and every night at bedtime someone (usually me) has to move a mattress from another room into my room for the other person to sleep. The cables running from outside complicate this a little because I have to lift / toss it around to avoid snagging the cables. Previously I could simply push/drag it along the floor as there was nothing blocking the way.
I've tried repeatedly to convince him to unplug it and just use wifi, but he seems pretty damn adamant about it. Here's what I tried -
* Ask multiple times, with increasing exasperation each time, "Please unplug the LAN cable and just use wifi.". He either says "later" nonchalantly or ignores me.
* Reason with the reasons stated above to convince him. Ignored or retorted with "how do you even jam the door like that??"
* Reason that his in game ping is not going to be affected by a noticeable amount. Not convinced.
* Compromise with a suggestion - "If you really want a LAN cable, drill a hole in the wall and install a network switch, *please*." Ignored.
The only option I have left is just unplug the cable while he isn't home but I really fear this would lead to conflict. Since young he always had power over me and I really can't do anything if he remains stubborn about a particular issue. But this is one issue that is causing me considerable amounts of inconvenience that I can't just let it go. | 2017/11/19 | [
"https://interpersonal.stackexchange.com/questions/6979",
"https://interpersonal.stackexchange.com",
"https://interpersonal.stackexchange.com/users/9135/"
] | So there are many great answers here. I want to point out another option which
you can add to any of them: do nothing!
>
> The cable is led into my room by jamming it through the gap between the sides of the door. More often than not, opening/closing the door will result in the door being jammed since it is not a flat LAN cable.
>
>
>
and
>
> My work table is next to the door, and when I pull out my chair to sit down / get up, it runs over the LAN cable, and jams the wheels of the chair as well.
>
>
>
This LAN cable is not going to last forever. This kind of abuse damages the cables, eventually degrading signal quality. At some point, it will stop working.
I point this out because it means that while you are busy trying to find an amicable resolution to this issue, physics is going to take care of it eventually. This means you can be comfortable using less forceful approaches on your brother, without having to fear that he's going to use this LAN cable forever because you didn't push hard enough.
So stick to the nice friendly helpful approaches. Be nice. Nature will not be nice. You and nature can play good cop/bad cop =) | First of all an IT solution may be possible. Consider using a [Powerline network adapter set](https://en.wikipedia.org/wiki/Power-line_communication).
I've used those myself and it may be an option in your case. They don't require any physical alteration to the property.
That said your situation is one that depends on your ages.
If *either* of you are minors then whether or not the cable is allowed is a decision that needs to be made by the relevant legal guardian(s) ( usually parents ). So in that case you present your case to the "authorities" and *they* decide.
**If you are both adults** then I'd suggest this :
>
> The only option I have left is just unplug the cable while he isn't home but I really fear this would lead to conflict.
>
>
>
You can always plug it back in when he's back home. However this will eventually lead to conflict.
But sometimes the conflict is necessary. Avoiding it doesn't fix the problem and your brother seems to exploit this.
>
> Since young he always had power over me and I really can't do anything if he remains stubborn about a particular issue.
>
>
>
Perhaps it's time you started being stubborn too. :-) He is just using your reluctance to confront him. Remember that this was supposed to be a temporary measure, and you are both past that now.
What will eventually happen, whether either of you wants it or not, is that someone will trip on this cable and his precious computer will likely get yanked violently in the process - this I've had happen myself.
So it's really in his interests to deal with this issue.
If this argument fails, then you have been reasonable and, honestly, I'd suggest you just take the cable out at the router end. It's a hazard and a considerable inconvenience and it was supposed to be temporary.
I'd suggest the Powerline is a potential compromise, but my gut feeling is that he'll refuse this.
If that happens then every time he puts in the cable, take it out at the router.
Yes, this may result in a bloody great row. Have it. I think you need to draw a line on this.
Remember that you can let him scream the place down - just take no notice. Just say calmly that you've explained the problems many times and as he won't act responsibly, then you'll have to keep doing this. Don't get involved in a major discussion, don't enter a debate. Tell him to find a solution that works for both of you or you'll be just as stubborn as he is about this.
This cable is not *needed*, it's just *wanted*. On the other hand the safety and inconvenience are issues that *need* fixing, not just "wants". |
6,979 | I share a small room with my brother, and recently he got a desktop computer (he was using a laptop beforehand).
The room's layout is such that my table is right next to the door, while his table is on the other side of the room, directly opposite the door.
Since it was a new computer, he had to redownload all his games and programs. Initially he was using the computer's internal wifi card, and I suggested hooking up a LAN cable from outside temporarily to download his games quicker. I now regret it, because he now insists on leaving the LAN cable connected to his computer permanently.
This brings up a number of issues.
* The LAN cable runs from the living room all the way to my room. It is not hooked to the wall or the ceiling, just trailed on the floor without being secured in any way. This is a tripping hazard for people walking in the corridor outside.
* The cable is led into my room by jamming it through the gap between the sides of the door. More often than not, opening/closing the door will result in the door being jammed since it is not a flat LAN cable. We turn on the A/C at night and leave the door closed, so every time someone enters/exits the room the door gets jammed pretty often.
* My work table is next to the door, and when I pull out my chair to sit down / get up, it runs over the LAN cable, and jams the wheels of the chair as well. This has forced me to sit in an awkward way where my chair and body is facing in a slant direction towards the table in order to avoid the cable, which is not very comfortable.
* There is only one bedframe for one person to sleep, and every night at bedtime someone (usually me) has to move a mattress from another room into my room for the other person to sleep. The cables running from outside complicate this a little because I have to lift / toss it around to avoid snagging the cables. Previously I could simply push/drag it along the floor as there was nothing blocking the way.
I've tried repeatedly to convince him to unplug it and just use wifi, but he seems pretty damn adamant about it. Here's what I tried -
* Ask multiple times, with increasing exasperation each time, "Please unplug the LAN cable and just use wifi.". He either says "later" nonchalantly or ignores me.
* Reason with the reasons stated above to convince him. Ignored or retorted with "how do you even jam the door like that??"
* Reason that his in game ping is not going to be affected by a noticeable amount. Not convinced.
* Compromise with a suggestion - "If you really want a LAN cable, drill a hole in the wall and install a network switch, *please*." Ignored.
The only option I have left is just unplug the cable while he isn't home but I really fear this would lead to conflict. Since young he always had power over me and I really can't do anything if he remains stubborn about a particular issue. But this is one issue that is causing me considerable amounts of inconvenience that I can't just let it go. | 2017/11/19 | [
"https://interpersonal.stackexchange.com/questions/6979",
"https://interpersonal.stackexchange.com",
"https://interpersonal.stackexchange.com/users/9135/"
] | This problem is not inconveniencing your brother, and he has shown to be disinclined to alter his behavior due to the inconvenience to you. It is possible that convincing him of the scope of the inconvenience on your part might change his mind ([here is an excellent example of a problem that was resolved that way](https://interpersonal.stackexchange.com/questions/5873/co-tenants-set-up-an-inflatable-pool-outside-my-window-its-now-breeding-bugs)), but given what you've said so far it does not seem likely.
If your brother is only going to alter his behavior to his own benefit, your only options are to **alter the situation so that it begins to inconvenience him, or remove his ability to maintain the status quo.**
Either of those options is going to bring you into conflict with your brother, unless you can effect the change without your brother knowing that you caused it. StephenG suggested a way in which the current setup is already a potential inconvenience (a tripping hazard is also a yanking hazard) - making this potential inconvenience a reality may convince him. Or it might not, in which case a more direct confrontation may be needed. | First of all, for this particular problem, you can find several other solutions (other answers cover that better than I could)
Second of all, if you want your him to do something about it, you're gonna have to make him understand that it's a really problem. You can do that by explaining in detail how and why it bothers you and how to solve it and ask him to solve it.
What seems to be happening thought is that he doesn't listen or take into account to your explanations. If that is the case, a confilct is kind of unavoidable. A conflict however, doesn't mean a fight. You need to muster some courage and be very firm about your position:
>
> This bothers me, and you have plenty of other ways to get an internet connection without bothering me. If you don't do anything about it, I will simply unplug you so that it doesn't bother me anymore.
>
>
>
Now I know that confronting your older brother is a scary thing, however if you always bow down to him, he will always abuse of his power and not take your opinion in consideration. If you can stand your ground a few times, the next time such a situation arises, finding a solution together as equals will be much simpler. |
6,979 | I share a small room with my brother, and recently he got a desktop computer (he was using a laptop beforehand).
The room's layout is such that my table is right next to the door, while his table is on the other side of the room, directly opposite the door.
Since it was a new computer, he had to redownload all his games and programs. Initially he was using the computer's internal wifi card, and I suggested hooking up a LAN cable from outside temporarily to download his games quicker. I now regret it, because he now insists on leaving the LAN cable connected to his computer permanently.
This brings up a number of issues.
* The LAN cable runs from the living room all the way to my room. It is not hooked to the wall or the ceiling, just trailed on the floor without being secured in any way. This is a tripping hazard for people walking in the corridor outside.
* The cable is led into my room by jamming it through the gap between the sides of the door. More often than not, opening/closing the door will result in the door being jammed since it is not a flat LAN cable. We turn on the A/C at night and leave the door closed, so every time someone enters/exits the room the door gets jammed pretty often.
* My work table is next to the door, and when I pull out my chair to sit down / get up, it runs over the LAN cable, and jams the wheels of the chair as well. This has forced me to sit in an awkward way where my chair and body is facing in a slant direction towards the table in order to avoid the cable, which is not very comfortable.
* There is only one bedframe for one person to sleep, and every night at bedtime someone (usually me) has to move a mattress from another room into my room for the other person to sleep. The cables running from outside complicate this a little because I have to lift / toss it around to avoid snagging the cables. Previously I could simply push/drag it along the floor as there was nothing blocking the way.
I've tried repeatedly to convince him to unplug it and just use wifi, but he seems pretty damn adamant about it. Here's what I tried -
* Ask multiple times, with increasing exasperation each time, "Please unplug the LAN cable and just use wifi.". He either says "later" nonchalantly or ignores me.
* Reason with the reasons stated above to convince him. Ignored or retorted with "how do you even jam the door like that??"
* Reason that his in game ping is not going to be affected by a noticeable amount. Not convinced.
* Compromise with a suggestion - "If you really want a LAN cable, drill a hole in the wall and install a network switch, *please*." Ignored.
The only option I have left is just unplug the cable while he isn't home but I really fear this would lead to conflict. Since young he always had power over me and I really can't do anything if he remains stubborn about a particular issue. But this is one issue that is causing me considerable amounts of inconvenience that I can't just let it go. | 2017/11/19 | [
"https://interpersonal.stackexchange.com/questions/6979",
"https://interpersonal.stackexchange.com",
"https://interpersonal.stackexchange.com/users/9135/"
] | This problem is not inconveniencing your brother, and he has shown to be disinclined to alter his behavior due to the inconvenience to you. It is possible that convincing him of the scope of the inconvenience on your part might change his mind ([here is an excellent example of a problem that was resolved that way](https://interpersonal.stackexchange.com/questions/5873/co-tenants-set-up-an-inflatable-pool-outside-my-window-its-now-breeding-bugs)), but given what you've said so far it does not seem likely.
If your brother is only going to alter his behavior to his own benefit, your only options are to **alter the situation so that it begins to inconvenience him, or remove his ability to maintain the status quo.**
Either of those options is going to bring you into conflict with your brother, unless you can effect the change without your brother knowing that you caused it. StephenG suggested a way in which the current setup is already a potential inconvenience (a tripping hazard is also a yanking hazard) - making this potential inconvenience a reality may convince him. Or it might not, in which case a more direct confrontation may be needed. | So there are many great answers here. I want to point out another option which
you can add to any of them: do nothing!
>
> The cable is led into my room by jamming it through the gap between the sides of the door. More often than not, opening/closing the door will result in the door being jammed since it is not a flat LAN cable.
>
>
>
and
>
> My work table is next to the door, and when I pull out my chair to sit down / get up, it runs over the LAN cable, and jams the wheels of the chair as well.
>
>
>
This LAN cable is not going to last forever. This kind of abuse damages the cables, eventually degrading signal quality. At some point, it will stop working.
I point this out because it means that while you are busy trying to find an amicable resolution to this issue, physics is going to take care of it eventually. This means you can be comfortable using less forceful approaches on your brother, without having to fear that he's going to use this LAN cable forever because you didn't push hard enough.
So stick to the nice friendly helpful approaches. Be nice. Nature will not be nice. You and nature can play good cop/bad cop =) |
6,979 | I share a small room with my brother, and recently he got a desktop computer (he was using a laptop beforehand).
The room's layout is such that my table is right next to the door, while his table is on the other side of the room, directly opposite the door.
Since it was a new computer, he had to redownload all his games and programs. Initially he was using the computer's internal wifi card, and I suggested hooking up a LAN cable from outside temporarily to download his games quicker. I now regret it, because he now insists on leaving the LAN cable connected to his computer permanently.
This brings up a number of issues.
* The LAN cable runs from the living room all the way to my room. It is not hooked to the wall or the ceiling, just trailed on the floor without being secured in any way. This is a tripping hazard for people walking in the corridor outside.
* The cable is led into my room by jamming it through the gap between the sides of the door. More often than not, opening/closing the door will result in the door being jammed since it is not a flat LAN cable. We turn on the A/C at night and leave the door closed, so every time someone enters/exits the room the door gets jammed pretty often.
* My work table is next to the door, and when I pull out my chair to sit down / get up, it runs over the LAN cable, and jams the wheels of the chair as well. This has forced me to sit in an awkward way where my chair and body is facing in a slant direction towards the table in order to avoid the cable, which is not very comfortable.
* There is only one bedframe for one person to sleep, and every night at bedtime someone (usually me) has to move a mattress from another room into my room for the other person to sleep. The cables running from outside complicate this a little because I have to lift / toss it around to avoid snagging the cables. Previously I could simply push/drag it along the floor as there was nothing blocking the way.
I've tried repeatedly to convince him to unplug it and just use wifi, but he seems pretty damn adamant about it. Here's what I tried -
* Ask multiple times, with increasing exasperation each time, "Please unplug the LAN cable and just use wifi.". He either says "later" nonchalantly or ignores me.
* Reason with the reasons stated above to convince him. Ignored or retorted with "how do you even jam the door like that??"
* Reason that his in game ping is not going to be affected by a noticeable amount. Not convinced.
* Compromise with a suggestion - "If you really want a LAN cable, drill a hole in the wall and install a network switch, *please*." Ignored.
The only option I have left is just unplug the cable while he isn't home but I really fear this would lead to conflict. Since young he always had power over me and I really can't do anything if he remains stubborn about a particular issue. But this is one issue that is causing me considerable amounts of inconvenience that I can't just let it go. | 2017/11/19 | [
"https://interpersonal.stackexchange.com/questions/6979",
"https://interpersonal.stackexchange.com",
"https://interpersonal.stackexchange.com/users/9135/"
] | So there are many great answers here. I want to point out another option which
you can add to any of them: do nothing!
>
> The cable is led into my room by jamming it through the gap between the sides of the door. More often than not, opening/closing the door will result in the door being jammed since it is not a flat LAN cable.
>
>
>
and
>
> My work table is next to the door, and when I pull out my chair to sit down / get up, it runs over the LAN cable, and jams the wheels of the chair as well.
>
>
>
This LAN cable is not going to last forever. This kind of abuse damages the cables, eventually degrading signal quality. At some point, it will stop working.
I point this out because it means that while you are busy trying to find an amicable resolution to this issue, physics is going to take care of it eventually. This means you can be comfortable using less forceful approaches on your brother, without having to fear that he's going to use this LAN cable forever because you didn't push hard enough.
So stick to the nice friendly helpful approaches. Be nice. Nature will not be nice. You and nature can play good cop/bad cop =) | First of all, for this particular problem, you can find several other solutions (other answers cover that better than I could)
Second of all, if you want your him to do something about it, you're gonna have to make him understand that it's a really problem. You can do that by explaining in detail how and why it bothers you and how to solve it and ask him to solve it.
What seems to be happening thought is that he doesn't listen or take into account to your explanations. If that is the case, a confilct is kind of unavoidable. A conflict however, doesn't mean a fight. You need to muster some courage and be very firm about your position:
>
> This bothers me, and you have plenty of other ways to get an internet connection without bothering me. If you don't do anything about it, I will simply unplug you so that it doesn't bother me anymore.
>
>
>
Now I know that confronting your older brother is a scary thing, however if you always bow down to him, he will always abuse of his power and not take your opinion in consideration. If you can stand your ground a few times, the next time such a situation arises, finding a solution together as equals will be much simpler. |
11,571 | Ignoring the whole movie situation along with the power demands, what do you think Iron Man's repulsors use to "repulse" his targets? I don't think they are lasers or electric beams, or "reverse magnetism", but I'm guessing its some sort of focused sonic waave or a shock wave generator. | 2011/06/25 | [
"https://physics.stackexchange.com/questions/11571",
"https://physics.stackexchange.com",
"https://physics.stackexchange.com/users/4144/"
] | I bet it's imagination. In imagination-land everything is possible :-)
In reality them most compact & efficient are conventional weapons.
Then probably only 10kW CO2 laser, which is real, but not as cool as in movie. | As pointed out by BarsMonster ,newton's Third law says the iron man will be acted upon by the equal and opposite force which he is exerting on any body. Hence its just mere imagination. |
9,811 | 
This dialog box pops up so much that it's annoying. Please have it removed or allow something like 5 comment upvotes every 5 seconds.
At the least, make the box very small or replace the vote button with another graphic for 5 seconds. | 2009/07/26 | [
"https://meta.stackexchange.com/questions/9811",
"https://meta.stackexchange.com",
"https://meta.stackexchange.com/users/130059/"
] | Jeff's not explicitly stated here (*but otherwise mentioned other places*) reasoning, as far as I can tell, for declining this request:
* Less than 5 seconds would lead to a drastic increase in up votes for comments.
* This is bad, because
+ Jeff does not want comments to become too much of a platform for expressing one's opinion
+ (On Questions with many Answers) comments with some/high votes are filtered *into* the main page views, and those without are hidden, and need to be explicitly expanded to be seen. Increase the comment votes too much and this functionality loses its value or ability to segregate the worthy from the unworthy.
* He has demonstrated this, somewhat cryptically, by up voting every comment before his in this question.
* Jeff just gets stubborn that way about certain points. If the idea truly is decent, he'll come along eventually. It's his website, he *can cry if he wants to...cry if he wants to.*
**The man has a vision, and extensive comment voting is not in that vision.** | Along these lines, how about removing the restriction for those above 10k rep? Or even some other number. |
9,811 | 
This dialog box pops up so much that it's annoying. Please have it removed or allow something like 5 comment upvotes every 5 seconds.
At the least, make the box very small or replace the vote button with another graphic for 5 seconds. | 2009/07/26 | [
"https://meta.stackexchange.com/questions/9811",
"https://meta.stackexchange.com",
"https://meta.stackexchange.com/users/130059/"
] | Jeff's not explicitly stated here (*but otherwise mentioned other places*) reasoning, as far as I can tell, for declining this request:
* Less than 5 seconds would lead to a drastic increase in up votes for comments.
* This is bad, because
+ Jeff does not want comments to become too much of a platform for expressing one's opinion
+ (On Questions with many Answers) comments with some/high votes are filtered *into* the main page views, and those without are hidden, and need to be explicitly expanded to be seen. Increase the comment votes too much and this functionality loses its value or ability to segregate the worthy from the unworthy.
* He has demonstrated this, somewhat cryptically, by up voting every comment before his in this question.
* Jeff just gets stubborn that way about certain points. If the idea truly is decent, he'll come along eventually. It's his website, he *can cry if he wants to...cry if he wants to.*
**The man has a vision, and extensive comment voting is not in that vision.** | Why it bothers me? Sometimes I read a comment that is a good question, and, since it IS a good question, I want to read the next comment right away because now I'm dying of curiosity! Now, I'm satisfied, both a good question and a good answer, I want to upvote both!
A good solution that will prevent us being annoyed and abusers from ...abusing: Allow 3 comment upvotes in 15 seconds! (assuming the time from page load is >15sec, otherwise spammers/abusers get's 2 extra upvotes at no 'cost'.)
There, you have exactly 100% the same efficacy against spammers/abusers, and you do not annoy the poor curious readers with short attention spans for upvotes. |
18,866,422 | Recently I have read in a book that Concurrency is a fundamental tool for multiprocessor programming.
>
> Than how is it useful for single core processor?
>
>
> | 2013/09/18 | [
"https://Stackoverflow.com/questions/18866422",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/2764279/"
] | >
> Concurrency is a fundamental tool for multiprocessor programming.
>
>
>
Yes, but it can also help in other areas. For instance, concurrency can also improve throughput on a single core system if the cpu is not the bottleneck (for instance, because the threads spend most of their time waiting for I/O from disk or the network). | Concurrency is helpful whenever there are multiple tasks that need to be run simultaneously. A very common example is in GUI programming; you don't want your UI to freeze up while the program waits for data to load from the disk or network, so you have a thread that just manages the UI elements (called the Event Dispatch Thread in Swing/AWT), and background threads that take care of communications or long-running calculations. The OS swaps them back and forth to make sure that the UI gets redrawn while other tasks are still active. |
18,866,422 | Recently I have read in a book that Concurrency is a fundamental tool for multiprocessor programming.
>
> Than how is it useful for single core processor?
>
>
> | 2013/09/18 | [
"https://Stackoverflow.com/questions/18866422",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/2764279/"
] | >
> Concurrency is a fundamental tool for multiprocessor programming.
>
>
>
Yes, but it can also help in other areas. For instance, concurrency can also improve throughput on a single core system if the cpu is not the bottleneck (for instance, because the threads spend most of their time waiting for I/O from disk or the network). | Being able to switch between running thread is useful for the perception of performance on a single core processor. In many systems, the graphical parts of the UI is updated by another thread than the one doing the work. It would be frustrating for the user to not have any feedback while a long task is running. Another useful application of concurrency on a single core, would be to start a long running task with low priority while the user is free to do other stuff at the same time. |
9,475,200 | I had SQL Server Express 2008, 2008 R2, and 2012 RC0 installed when I created an `.mdf` file. Now I cannot open it in 2008 R2. How can I check which version the file is, if I don't have 2012 RC0 installed anymore?
I removed all SQL Server versions from the computer and reinstalled 2008 R2. Looking through other posts, I see that I probably should have "detached" the database file first, but I did not know that at the time. | 2012/02/28 | [
"https://Stackoverflow.com/questions/9475200",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/343302/"
] | [How to determine the database version of an MDF file](http://rusanu.com/2011/04/04/how-to-determine-the-database-version-of-an-mdf-file/):
>
> the version of the MDF will be the DWORD value at offset 0×12064 in
> the file.
>
>
> | Files are not versiones by express or not - only by file version / sql server version.
All the ones you name are downward compatible (2001 R2 opens a 2008 file and updates it). At the end thus.... it has to be 2012 RC0 if it is not able to be opened with 2008 R2. Simple logical elimination, no file check needed. |
481,745 | I want to monitor server health,ie CPU ,memory,swap and disk usage. what is the difference if I use simple linux commands like top,iostat etc and if I use nagios plugins... | 2013/02/23 | [
"https://serverfault.com/questions/481745",
"https://serverfault.com",
"https://serverfault.com/users/161439/"
] | Using the Linux commands are more of a slice in time than a monitoring tool. Nagios allows you to run checks on a specific items like CPU, Memory, swap... This gives you the ability to alert (Email, SMS...) when something is out of a particular metric. For instance, if your drive fills to 80% you can be alerted to go and do something about it. Another example would be if your CPU usage shoots up you can get an alert.
However, Nagios and simple Linux tools only give you a slice of time. Nagios will give you some idea of what is going on over time. If you want to know what your server is doing over a period of time, which is arguably more useful in 'monitoring.' You may consider something like Cacti. Cacti is basically like Nagios, only instead of alerting you, it graphs the performance over time. So, if you have a time period where your CPU is shooting up, you can go and look at the server during that time, and potentially find other issues that are occurring like RAM usage increase.
You can take a look at Cacti here: <http://www.cacti.net/> | nagios is a system that can alert you if something on your server goes wrong. It can send you emails, and the emails can also be forwarded into SMS if you want to do so.
Using comands like top/iostat always require you to go there, execute them, and look at the output. |
131,195 | This sugar daddy has been texting me and telling me to be his baby. Jokingly, I told him yes and he sent me a lot of money. Now, he wants it back. I tried sending it back in multiple ways but it won't let me because I am under 18. He has threatened me with the FBI saying he has my address and that I am being tracked. I don’t know what to do at this point. | 2020/09/24 | [
"https://money.stackexchange.com/questions/131195",
"https://money.stackexchange.com",
"https://money.stackexchange.com/users/102798/"
] | **You are being scammed.**
A sugar daddy who doesn't know you in person is almost always a scam.
A common type of scam is where someone sends you money and then asks you to send some of it to someone else. Having done this you would find the money you were sent was fraudulent or reversed, leaving you out of pocket for whatever you sent. You can read about it on this site and many other places.
This is just a slight variation where instead of getting you to send money to someone else they get you to send it back by threatening you. If you do it you will again find the original deposit reversed, leaving you poorer by whatever you sent back.
Your correct action is to say and do nothing. Send no money. Have no contact with the person and ignore their messages (block them if you can). The police will not come for you. If there is a fraud prevention organization where you live talk to them.
Eventually the money will vanish from your account. Do not spend it or transfer it to another account, and make sure you keep enough money in the account so when it is reversed you don't go overdrawn. | You are being scammed. Or at least he tried.
His threats are empty. If he goes to the FBI he’ll go to jail for years for sending money to an underage girl for sex. That’s a serious crime. So that’s not going to happen.
You can be sure that there is some trickery involved that will make the money disappear from your account. Most likely he broke into someone’s bank account and the money is stolen. He’ll keep anything you send him, and that’s the scam.
Do nothing. Don’t reply to him. Ignore him. Don’t spend the money, because your bank *will* remove it. If it’s still in your account say in six years then ask here again, but that’s very very unlikely. Important is that as long as you don’t respond to anything he says and don’t send any money you are absolutely safe. Nothing he can do. |
124,618 | I paid for an SSL certificate from Namecheap, I think it was certified by ComodoSSL. It cost me 7$, it took them a week to activate and I had to do it myself from SSH while editing my site's configuration files.
Then a friend made me aware of [Let's Encrypt](https://letsencrypt.org/) who not only give out free SSL certificates, but they can be installed by running a single command.
I'm sure I'm missing something here, but why would I want to pay for an SSL certificate when I can get one installed easily, for free, with automatic renewal set up? | 2019/08/16 | [
"https://webmasters.stackexchange.com/questions/124618",
"https://webmasters.stackexchange.com",
"https://webmasters.stackexchange.com/users/101377/"
] | Let's Encrypt is superior in many ways, including the ones that you have mentioned, such as:
1. It's free. Hard to get past that.
2. It has automatic renewal (I'm sure it's not JUST exclusive with Let's Encrypt, however)
3. It's pretty easy to set up.
4. Google and many others support it as a trusted CA, which is a huge deal when it comes to SEO and security.
**However, there are a couple of cons.**
1. The verification system that it works on to make sure that, you, well, own the site, is not compatible with some website hosts, I have had a fair amount of headache trying to get Let's Encrypt work on InfinityFree and I just accepted the fate that I couldn't do it.
2. You don't get any kind of insurance that says "If this breaks, we'll help you out" since it's open-source, you are on your own if Let's Encrypt doesn't work or is somehow cracked. | LetsEncrypt certificates are great. I use them myself instead of buying certificates. There are a few drawbacks:
* LetsEncrypt certificates only last 3 months. Most purchased certificates are good for one or two years. That means that you absolutely need an automated process in place to renew your certificates or it is going to be too easy to forget.
* LetsEncrypt only offer the lowest validation type of certificate. Domain Validation (DV) only validates that the owner of the certificate has control over the domain. Organization Validation (OV) certificates also check the documentation of the person or company requesting the certificate. Extended Validation (EV) certificates require even further checks. The better your certificate, the harder it is to be forged, and the more your site's authenticity can be trusted because of it. In practice, browsers only give a visual nod to EV certs, usually showing something in green in the address bar for them. Up to this point, most users don't know or care about the different validation levels.
* Wild card certificates are a bit harder to obtain from LetsEncrypt. From other places you generally just pay more money. LetsEncrypt requires DNS validation for wildcard certificates.
Historically, security certificates have always cost something. Other companies that have offered free certificates have come and gone. I used to use StartSSL which offered a single domain free certificate until they did some shady stuff and browsers stopped trusting their certificates. LetsEncrypt has fewer limits than previous free certificate vendors and is far more automated. It also has some big supporters such as the EFF, Mozilla, Chrome, and Cisco. See <https://letsencrypt.org/sponsors/> It appears to be well enough run that I expect it to be around for years. |
124,618 | I paid for an SSL certificate from Namecheap, I think it was certified by ComodoSSL. It cost me 7$, it took them a week to activate and I had to do it myself from SSH while editing my site's configuration files.
Then a friend made me aware of [Let's Encrypt](https://letsencrypt.org/) who not only give out free SSL certificates, but they can be installed by running a single command.
I'm sure I'm missing something here, but why would I want to pay for an SSL certificate when I can get one installed easily, for free, with automatic renewal set up? | 2019/08/16 | [
"https://webmasters.stackexchange.com/questions/124618",
"https://webmasters.stackexchange.com",
"https://webmasters.stackexchange.com/users/101377/"
] | LetsEncrypt certificates are great. I use them myself instead of buying certificates. There are a few drawbacks:
* LetsEncrypt certificates only last 3 months. Most purchased certificates are good for one or two years. That means that you absolutely need an automated process in place to renew your certificates or it is going to be too easy to forget.
* LetsEncrypt only offer the lowest validation type of certificate. Domain Validation (DV) only validates that the owner of the certificate has control over the domain. Organization Validation (OV) certificates also check the documentation of the person or company requesting the certificate. Extended Validation (EV) certificates require even further checks. The better your certificate, the harder it is to be forged, and the more your site's authenticity can be trusted because of it. In practice, browsers only give a visual nod to EV certs, usually showing something in green in the address bar for them. Up to this point, most users don't know or care about the different validation levels.
* Wild card certificates are a bit harder to obtain from LetsEncrypt. From other places you generally just pay more money. LetsEncrypt requires DNS validation for wildcard certificates.
Historically, security certificates have always cost something. Other companies that have offered free certificates have come and gone. I used to use StartSSL which offered a single domain free certificate until they did some shady stuff and browsers stopped trusting their certificates. LetsEncrypt has fewer limits than previous free certificate vendors and is far more automated. It also has some big supporters such as the EFF, Mozilla, Chrome, and Cisco. See <https://letsencrypt.org/sponsors/> It appears to be well enough run that I expect it to be around for years. | The simple answer to this is many webmasters just don't want to do these things which unnecessarily consume their precious time. In case of letsencrypt its easy to use and free but you have to remember and re-install the certificate every 3 months. If you don't or just forget to do it then you site will show 404 error to your visitors and search engines. |
124,618 | I paid for an SSL certificate from Namecheap, I think it was certified by ComodoSSL. It cost me 7$, it took them a week to activate and I had to do it myself from SSH while editing my site's configuration files.
Then a friend made me aware of [Let's Encrypt](https://letsencrypt.org/) who not only give out free SSL certificates, but they can be installed by running a single command.
I'm sure I'm missing something here, but why would I want to pay for an SSL certificate when I can get one installed easily, for free, with automatic renewal set up? | 2019/08/16 | [
"https://webmasters.stackexchange.com/questions/124618",
"https://webmasters.stackexchange.com",
"https://webmasters.stackexchange.com/users/101377/"
] | LetsEncrypt certificates are great. I use them myself instead of buying certificates. There are a few drawbacks:
* LetsEncrypt certificates only last 3 months. Most purchased certificates are good for one or two years. That means that you absolutely need an automated process in place to renew your certificates or it is going to be too easy to forget.
* LetsEncrypt only offer the lowest validation type of certificate. Domain Validation (DV) only validates that the owner of the certificate has control over the domain. Organization Validation (OV) certificates also check the documentation of the person or company requesting the certificate. Extended Validation (EV) certificates require even further checks. The better your certificate, the harder it is to be forged, and the more your site's authenticity can be trusted because of it. In practice, browsers only give a visual nod to EV certs, usually showing something in green in the address bar for them. Up to this point, most users don't know or care about the different validation levels.
* Wild card certificates are a bit harder to obtain from LetsEncrypt. From other places you generally just pay more money. LetsEncrypt requires DNS validation for wildcard certificates.
Historically, security certificates have always cost something. Other companies that have offered free certificates have come and gone. I used to use StartSSL which offered a single domain free certificate until they did some shady stuff and browsers stopped trusting their certificates. LetsEncrypt has fewer limits than previous free certificate vendors and is far more automated. It also has some big supporters such as the EFF, Mozilla, Chrome, and Cisco. See <https://letsencrypt.org/sponsors/> It appears to be well enough run that I expect it to be around for years. | Not everything can use automated renewal
========================================
CertBot makes it easy to use for websites... but what if you're using certificates for other things?
We have an LDAP server that our website authenticates with. It runs over a secure port, but it needs a signed certificate to run. I could go with a free wildcard certificate... but that means converting the certificate to PKCS12 every 3 months (web servers use PEM) and then importing the new certificate. Oh, and our network firewall uses PKCS12, too. That's a lot of hassle for free. |
124,618 | I paid for an SSL certificate from Namecheap, I think it was certified by ComodoSSL. It cost me 7$, it took them a week to activate and I had to do it myself from SSH while editing my site's configuration files.
Then a friend made me aware of [Let's Encrypt](https://letsencrypt.org/) who not only give out free SSL certificates, but they can be installed by running a single command.
I'm sure I'm missing something here, but why would I want to pay for an SSL certificate when I can get one installed easily, for free, with automatic renewal set up? | 2019/08/16 | [
"https://webmasters.stackexchange.com/questions/124618",
"https://webmasters.stackexchange.com",
"https://webmasters.stackexchange.com/users/101377/"
] | Let's Encrypt is superior in many ways, including the ones that you have mentioned, such as:
1. It's free. Hard to get past that.
2. It has automatic renewal (I'm sure it's not JUST exclusive with Let's Encrypt, however)
3. It's pretty easy to set up.
4. Google and many others support it as a trusted CA, which is a huge deal when it comes to SEO and security.
**However, there are a couple of cons.**
1. The verification system that it works on to make sure that, you, well, own the site, is not compatible with some website hosts, I have had a fair amount of headache trying to get Let's Encrypt work on InfinityFree and I just accepted the fate that I couldn't do it.
2. You don't get any kind of insurance that says "If this breaks, we'll help you out" since it's open-source, you are on your own if Let's Encrypt doesn't work or is somehow cracked. | The simple answer to this is many webmasters just don't want to do these things which unnecessarily consume their precious time. In case of letsencrypt its easy to use and free but you have to remember and re-install the certificate every 3 months. If you don't or just forget to do it then you site will show 404 error to your visitors and search engines. |
124,618 | I paid for an SSL certificate from Namecheap, I think it was certified by ComodoSSL. It cost me 7$, it took them a week to activate and I had to do it myself from SSH while editing my site's configuration files.
Then a friend made me aware of [Let's Encrypt](https://letsencrypt.org/) who not only give out free SSL certificates, but they can be installed by running a single command.
I'm sure I'm missing something here, but why would I want to pay for an SSL certificate when I can get one installed easily, for free, with automatic renewal set up? | 2019/08/16 | [
"https://webmasters.stackexchange.com/questions/124618",
"https://webmasters.stackexchange.com",
"https://webmasters.stackexchange.com/users/101377/"
] | Let's Encrypt is superior in many ways, including the ones that you have mentioned, such as:
1. It's free. Hard to get past that.
2. It has automatic renewal (I'm sure it's not JUST exclusive with Let's Encrypt, however)
3. It's pretty easy to set up.
4. Google and many others support it as a trusted CA, which is a huge deal when it comes to SEO and security.
**However, there are a couple of cons.**
1. The verification system that it works on to make sure that, you, well, own the site, is not compatible with some website hosts, I have had a fair amount of headache trying to get Let's Encrypt work on InfinityFree and I just accepted the fate that I couldn't do it.
2. You don't get any kind of insurance that says "If this breaks, we'll help you out" since it's open-source, you are on your own if Let's Encrypt doesn't work or is somehow cracked. | Not everything can use automated renewal
========================================
CertBot makes it easy to use for websites... but what if you're using certificates for other things?
We have an LDAP server that our website authenticates with. It runs over a secure port, but it needs a signed certificate to run. I could go with a free wildcard certificate... but that means converting the certificate to PKCS12 every 3 months (web servers use PEM) and then importing the new certificate. Oh, and our network firewall uses PKCS12, too. That's a lot of hassle for free. |
124,618 | I paid for an SSL certificate from Namecheap, I think it was certified by ComodoSSL. It cost me 7$, it took them a week to activate and I had to do it myself from SSH while editing my site's configuration files.
Then a friend made me aware of [Let's Encrypt](https://letsencrypt.org/) who not only give out free SSL certificates, but they can be installed by running a single command.
I'm sure I'm missing something here, but why would I want to pay for an SSL certificate when I can get one installed easily, for free, with automatic renewal set up? | 2019/08/16 | [
"https://webmasters.stackexchange.com/questions/124618",
"https://webmasters.stackexchange.com",
"https://webmasters.stackexchange.com/users/101377/"
] | Not everything can use automated renewal
========================================
CertBot makes it easy to use for websites... but what if you're using certificates for other things?
We have an LDAP server that our website authenticates with. It runs over a secure port, but it needs a signed certificate to run. I could go with a free wildcard certificate... but that means converting the certificate to PKCS12 every 3 months (web servers use PEM) and then importing the new certificate. Oh, and our network firewall uses PKCS12, too. That's a lot of hassle for free. | The simple answer to this is many webmasters just don't want to do these things which unnecessarily consume their precious time. In case of letsencrypt its easy to use and free but you have to remember and re-install the certificate every 3 months. If you don't or just forget to do it then you site will show 404 error to your visitors and search engines. |
4,565,032 | I have a question which bothered me for a long time. We all know Android is an open sourced project. But why so many people even developers are looking forward a new release? If it is open sourced, before Google releases Android 2.3, we cannot find any 2.3 code from repository? Thank you! | 2010/12/30 | [
"https://Stackoverflow.com/questions/4565032",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/547589/"
] | There are different degrees of open source. While Google open sources each Android release, they don't do it until after each version releases.
Thus, the development of the core Android platform is not actually open while it's happening.
However, the Android Development Tools are developed in open source and it's possible to participate in those as it actually occurs.
Lots more info at <http://source.android.com/faqs.html> | hey echo... android is a hot property in tech town today.. people say that it will give apple a run for its money... So, there is no big surprise when people wait for itz release.. More over, from a developer point of view, the present 2.2 version very difficult and fro user point of view, they are waiting for some new features to be added.... It might be an open source but brand GOOGLE has made it such a hot property |
266,363 | I need to cut an access panel on the wall for plumber to replace bathroom drain pipes. The cutting doesn't worry me and I've done all the measurements. My bathroom has tile walls so I have to cut the panel out on the wall opposite the bathroom.
But there's a problem: the access panel would overlap an outlet.
The plumber has requested a 14x14 access, but having the panel centered at the location specified would mean it covers an existing electrical outlet.
What do I do in this situation? | 2023/02/06 | [
"https://diy.stackexchange.com/questions/266363",
"https://diy.stackexchange.com",
"https://diy.stackexchange.com/users/162630/"
] | You either come up with different access area for the plumber or you move the receptacle. But even a different access area could get tricky. Let's say the receptacle is at the bottom of the area so you start the 14" vertical 4" higher up. What if the electric cable is coming down from above? Then it is hanging in the middle of the access area!
The good news is that generally speaking there is a lot of flexibility on receptacle placement, particularly vertically. If you have conduit this will be a bit more complicated, but if you have cables (as most of the US/Canada, which would match your measurement in inches) then it shouldn't be too hard:
* Cut a couple of small exploratory holes (e.g., 3" square) within the target area and near the existing receptacles.
* Look inside those holes to figure out whether the cable is coming from below or above. Or sideways. Or more than one cable from multiple directions.
* If there is only one cable (or more than one, but all from one direction) then moving the receptacle should be easy.
* If there are multiple cables then this gets a little more complicated. Cables can (with rare exceptions that are really designed for emergency repairs and not for routine movement of receptacles) only be joined inside junction boxes, and junction boxes must always be accessible (i.e., they can't be hidden behind the access panel, unless the access panel is just a simple door with no tools required to remove it.) If, for example, you have a cable from the left and a cable from the right, you might move the existing box to the left of the access area and add a new box to the right of the access area (so each cable goes for a shorter distance than it currently goes) and add a new cable between the two boxes. If you do that, put a receptacle in the new box and it will make it be useful rather than just a strange blank plate. | The plumber needs *at least* 14x14 inches - she surely won't complain if given more generous access. The reason she's asking for 14 inch width is likely an assumption that studs in the wall are spaced 16 inches on center, meaning the space between two studs is about 14.5 inches. Also because there are plastic access panels which can be installed over a 14x14 hole in lieu of repairing the drywall. Because there's an outlet in the way the access panel "repair" shortcut won't work here.
It's rather challenging to make a nice repair of drywall when there is a joint right next to an opening or an edge (like an electrical outlet box or baseboard). Cut the drywall panel larger to keep clear of the box. Make it two stud-bays wide with that outlet in the center, and tall enough that the horizontal cuts are 6 to 8 inches away from the outlet box. Keep equally far away from the baseboard if possible, or just center the lower cut between the baseboard and outlet box if they're closer than 12 inches to each other.
Make the vertical cuts centered on the wall studs. Use a magnet to locate the fasteners in the section being removed -- there's a fair chance they'll be screws, and if so, you can remove them and then the cut-out panel is likely to remain in condition good enough to be re-installed. |
5,377,291 | I want to have SVN branch name added (under the title) as sort of version information. I want it to be done automatically so that when I copy files generating the documentation to another (new) branch I get that info put in automatically. Any hints?
Thanks! | 2011/03/21 | [
"https://Stackoverflow.com/questions/5377291",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/669359/"
] | You cannot protect the algorithm you are writing by changing it to C .. May be you can encrypt the source files. Try [truecrypt](http://www.truecrypt.org/)
**Edit**
After some googling i found these articles related to ruby code obfuscation
1. [protecting-your-ruby-source-code-for-end-user-applications/](http://web.archive.org/web/20110828153039/http://seanmountcastle.com/2007/12/protecting-your-ruby-source-code-for-end-user-applications/)
2. [Ruby Encoder Protects Source Code for US Department of Defense Project](http://www.prlog.org/10390387-ruby-encoder-protects-source-code-for-us-department-of-defense-project.html)
3. <http://rubyencoder.com/> | You can try some code obfuscation techniques. For example [RubyEncoder](http://rubyencoder.com/ "RubyEncoder") compiles Ruby source code into a encrypted bytecode format. And here is another thread related to your question [Ruby obfuscator](https://stackoverflow.com/questions/2123437/ruby-obfuscator) |
5,377,291 | I want to have SVN branch name added (under the title) as sort of version information. I want it to be done automatically so that when I copy files generating the documentation to another (new) branch I get that info put in automatically. Any hints?
Thanks! | 2011/03/21 | [
"https://Stackoverflow.com/questions/5377291",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/669359/"
] | You cannot protect the algorithm you are writing by changing it to C .. May be you can encrypt the source files. Try [truecrypt](http://www.truecrypt.org/)
**Edit**
After some googling i found these articles related to ruby code obfuscation
1. [protecting-your-ruby-source-code-for-end-user-applications/](http://web.archive.org/web/20110828153039/http://seanmountcastle.com/2007/12/protecting-your-ruby-source-code-for-end-user-applications/)
2. [Ruby Encoder Protects Source Code for US Department of Defense Project](http://www.prlog.org/10390387-ruby-encoder-protects-source-code-for-us-department-of-defense-project.html)
3. <http://rubyencoder.com/> | If you are willing to craft your own solution instead of buying and already made one like [RubyEncoder](http://rubyencoder.com/), as stated on other answer here, there is an [article](http://mountcastle.posterous.com/protecting-your-ruby-source-code-for-end-user) that try to describe a method to protect your source code, and you can also implement all sort of protection you think is feasible, as you are going to do all by hand:
<http://mountcastle.posterous.com/protecting-your-ruby-source-code-for-end-user> |
19,602,154 | I need some help with installing Shiny package on the following system:
Ubuntu 12.04 64 bits
R version 3.0.2 "Frisbee Sailing"
When I try to install a Shiny package by running:
sudo su - -c "R -e \"install.packages('shiny', repos='<http://cran.rstudio.com/>')\""
I tried different repos or even by running install.packages('shiny') in R session as sudo, the package fails to install.
There's no errors, but rather a message that "The downloaded source packages are in '/tmp/....'
and when I try to use it (library(shiny)), I got an error that package was not found.
Now, I did not have same issue and everything worked fine on:
Ubuntu 12.04 64 bits
R version 3.0.1 "Good Sport".
Please, help me see what I am missing here. | 2013/10/26 | [
"https://Stackoverflow.com/questions/19602154",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/-1/"
] | The issues you are describing are caused by out-of-memory crashes. You are probably on a VPS like EC2 or something similar. If you are using the free micro instance on EC2 or the lowest package( 512mb ram) on digital ocean then you should enable swap (you should enable swap anyway). For EC2 see [How do you add swap to an EC2 instance?](https://stackoverflow.com/questions/17173972/how-do-you-add-swap-to-an-ec2-instance) . For digital ocean see <https://www.digitalocean.com/community/articles/how-to-add-swap-on-ubuntu-12-04> | Actually, I just tried to install a different library, ggplot2, and it is the same issue.
So, it is not related to Shiny package. All the libraries I tried to install just keep being saved to a /tmp folder as archived gz files. Not really sure why R does not install them.
So, eventually I just used R CMD INSTALL [path to the package .gz]
and it worked all right. I installed all 3 libraries in the following order: Rcpp, httpuv and the shiny. library(shiny) command now loads the library ok. |
205,514 | In the Harry Potter books, Diffindo is called the 'Severing Charm' and it’s most commonly used to cut ropes and the like. However, in the last book Hermione uses it on Ron but misses, creating a 'slash in his jeans' and his knee gets cut, causing him to 'roar in pain'.
We've only seen Sectumsempra used once on screen when Harry directly uses it on Malfoy in the sixth book, but there it's mentioned that he is 'waving his wand wildly'. Wouldn't Diffindo, if used in such a fashion also cause a similar effect? Similarly, if it was able to cut Ron, it would also be able to, say, chop off an ear (George's)?
In that case, how are these two spells different, except for Sectumsempra seemingly used exclusively to hurt humans? | 2019/02/17 | [
"https://scifi.stackexchange.com/questions/205514",
"https://scifi.stackexchange.com",
"https://scifi.stackexchange.com/users/111841/"
] | Sectumsempra can't be healed in the normal way, because it is "Dark magic", as we see when George's ear was cut off. | Sectumsempra is just more powerful.
===================================
I found an interesting Quora post on this and it seems relevant enough so here goes...
>
> Sectumsempra is extremely similar to a severing charm named Diffindo. Here's it's description.
>
>
>
> >
> > With the Severing Charm, cutting or tearing objects is a simple matter of wand control. The spell can be quite precise in skilled hands, and the Severing Charm is widely used in a variety of wizarding trades. Useful as it is, this charm should be practiced with caution, as a careless swipe of the wand can cause injury.
> >
> >
> >
>
>
> Which is extremely similar to what we know of Sectumsempra and it's after-effects.
>
>
>
> >
> > Blood spurted from Malfoy's face and chest as though he had been slashed with an invisible sword. He staggered backward and collapsed onto the waterlogged floor with a great splash, his wand falling from his limp right hand. Slipping and staggering, Harry got to his feet and plunged toward Malfoy, whose face was now shining scarlet, his white hands scrabbling at his blood-soaked chest.
> >
> >
> >
>
>
> (It should also be noted that the power of Sectumsempra can be controlled. When Severus used it on James, it only resulted in a little gash on his cheek, while Harry's wild cast almost resulted in Draco's death.)
>
>
> Though the two are quite similar, they do have a few differences
> Sectumsempra is a curse, classified as dark magic, while Diffindo is a charm.
> Organs severed with Sectumsempra cannot be grown back. Those severed by Diffindo probably can
> They both have different wand movements.
> *- [How did Snape invent the Sectumsempra in “Harry Potter”? - Quora](https://www.quora.com/How-did-Snape-invent-the-Sectumsempra-in-%E2%80%9CHarry-Potter%E2%80%9D)*
>
>
>
The post goes on to speculate that Snape perfected the Diffindo charm from "a charm used for cutting herbs" into "a curse capable of cutting through human flesh". So, from this we can see that Sectumsempra is (in essence) a refined Diffindo. |
205,514 | In the Harry Potter books, Diffindo is called the 'Severing Charm' and it’s most commonly used to cut ropes and the like. However, in the last book Hermione uses it on Ron but misses, creating a 'slash in his jeans' and his knee gets cut, causing him to 'roar in pain'.
We've only seen Sectumsempra used once on screen when Harry directly uses it on Malfoy in the sixth book, but there it's mentioned that he is 'waving his wand wildly'. Wouldn't Diffindo, if used in such a fashion also cause a similar effect? Similarly, if it was able to cut Ron, it would also be able to, say, chop off an ear (George's)?
In that case, how are these two spells different, except for Sectumsempra seemingly used exclusively to hurt humans? | 2019/02/17 | [
"https://scifi.stackexchange.com/questions/205514",
"https://scifi.stackexchange.com",
"https://scifi.stackexchange.com/users/111841/"
] | Diffindo is more easily countered.
==================================
While Diffindo and Sectumsempra both can be countered by other spells, Diffindo is far more easily countered. Reparo, a relatively common spell, can completely reverse its effect when used once.
>
> “He pulled the old copy of Advanced Potion-Making out of his bag and tapped the cover with his wand, muttering, *‘Diffindo!’* The cover fell off. He did the same thing with the brand new book (Hermione looked scandalised). He then swapped the covers, tapped each and said, *‘Reparo!*”
> *- Harry Potter and the Half-Blood Prince, Chapter 11 (Hermione’s Helping Hand)*
>
>
>
However, when Harry cast Sectumsempra on Draco, Snape had to use the counter-curse multiple times.
>
> “Pushing Harry roughly aside, he knelt over Malfoy, drew his wand and traced it over the deep wounds Harry’s curse had made, muttering an incantation that sounded almost like song. The flow of blood seemed to ease; Snape wiped the residue from Malfoy’s face and repeated his spell. Now the wounds seemed to be knitting.”
> *- Harry Potter and the Half-Blood Prince, Chapter 24 (Sectumsempra)*
>
>
>
After repeating the counter-curse three times, Snape still had to take Draco to the hospital wing, and that was with Harry not even knowing what the spell did and never having cast it before. Presumably it could be even more damaging when used by someone experienced, and may have more severe effects in that case.
>
> “When Snape had performed his counter-curse for the third time, he half-lifted Malfoy into a standing position.
> ‘You need the hospital wing. There may be a certain amount of scarring, but if you take dittany immediately we might avoid even that … come …”
> *- Harry Potter and the Half-Blood Prince, Chapter 24 (Sectumsempra)*
>
>
>
Additionally, it takes that specific counter-curse to even have a chance of healing the wounds Sectumsempra creates. When George’s ear is cut off, his mother (and the rest of the Order) can’t make it grow back because Sectumsempra is dark magic.
>
> “Mrs Weasley had staunched his bleeding now, and by the lamplight Harry saw a clean, gaping hole where George’s ear had been.
>
>
> ‘How is he?’
>
>
> Mrs Weasley looked round and said, ‘I can’t make it grow back, not when it’s been removed by Dark Magic. But it could have been so much worse … he’s alive.”
> *- Harry Potter and the Deathly Hallows, Chapter 5 (Fallen Warrior)*
>
>
>
Though they both have the effect of cutting, Diffindo is more easily countered and doesn’t leave the cuts is makes as difficult to heal by the usual magical methods.
Difindo can be used painlessly.
===============================
As is seen when Hermione accidentally cuts Ron with it, Diffindo, the Severing Charm, can possibly cause pain when used on flesh.
>
> “*D – Diffindo,’* she said, pointing her wand at Ron, who roared in pain as she slashed open the knee of his jeans, leaving a deep cut. ‘Oh, I’m so sorry, Ron, my hand’s shaking! *Diffindo!*’
> The severed ropes fell away. Ron got to his feet, shaking his arms to regain feeling in them.”
> *- Harry Potter and the Deathly Hallows, Chapter 9 (A Place to Hide)*
>
>
>
However, there’s a way to use it painlessly for amputation, since Newt Scamander mentions that owners of Crups are required by law to use a painless Severing Charm to remove their tail.
>
> “Crup owners are legally obliged to remove the Crup’s tail with a painless Severing Charm while the Crup is six to eight weeks old, lest Muggles notice it.”
> *- Fantastic Beasts and Where to Find Them*
>
>
>
There doesn’t seem to be any evidence that Sectumsempra can be used painlessly, though it’s impossible to rule it out entirely, it seems unlikely from what’s known about its effects.
Sectumsempra is Dark, Diffindo isn’t.
=====================================
When George’s ear is cut off by Sectumsempra, his mother mentions that the spell used was Dark magic.
>
> “Mrs Weasley looked round and said, ‘I can’t make it grow back, not when it’s been removed by Dark Magic. But it could have been so much worse … he’s alive.”
> *- Harry Potter and the Deathly Hallows, Chapter 5 (Fallen Warrior)*
>
>
>
By contrast, Diffindo doesn’t seem to be classified as Dark magic. Ron uses it in fourth year to remove lace from the secondhand dress robes his mother bought him. It’s highly unlikely he’d use Dark magic, especially for such a relatively simple task (easily accomplished by scissors) in a fairly non-urgent situation.
>
> “In a desperate attempt to make them look more manly, he used a Severing Charm on the ruff and cuffs. It worked fairly well; at least he was now lace-free, although he hadn’t done a very neat job, and the edges still looked depressingly frayed as they set off downstairs.”
> *- Harry Potter and the Goblet of Fire, Chapter 23 (The Yule Ball)*
>
>
>
Sectumsempra therefore would be classified as Dark magic, while Diffindo would not. There are practical differences in how Dark magic affects what it’s used on, like its making the wounds it creates difficult to heal, which differentiates the two spells in their respective effects. Also, its classification as Dark magic would make certain wizards who’d willingly use Diffindo unwilling to use Sectumsempra, even for the same things they’d use Diffindo for, because they don’t want to use magic considered Dark. | Sectumsempra can't be healed in the normal way, because it is "Dark magic", as we see when George's ear was cut off. |
205,514 | In the Harry Potter books, Diffindo is called the 'Severing Charm' and it’s most commonly used to cut ropes and the like. However, in the last book Hermione uses it on Ron but misses, creating a 'slash in his jeans' and his knee gets cut, causing him to 'roar in pain'.
We've only seen Sectumsempra used once on screen when Harry directly uses it on Malfoy in the sixth book, but there it's mentioned that he is 'waving his wand wildly'. Wouldn't Diffindo, if used in such a fashion also cause a similar effect? Similarly, if it was able to cut Ron, it would also be able to, say, chop off an ear (George's)?
In that case, how are these two spells different, except for Sectumsempra seemingly used exclusively to hurt humans? | 2019/02/17 | [
"https://scifi.stackexchange.com/questions/205514",
"https://scifi.stackexchange.com",
"https://scifi.stackexchange.com/users/111841/"
] | Sectumsempra can't be healed in the normal way, because it is "Dark magic", as we see when George's ear was cut off. | I would like to disagree with [Bellatrix's answer](https://scifi.stackexchange.com/a/205552/100430) (no disrespect intended):
>
> While Diffindo and Sectumsempra both can be countered by other spells, Diffindo is far more easily countered. Reparo, a relatively common spell, can completely reverse its effect when used once.
>
>
>
I would argue that the fact that Reparo can reverse the effects of Diffindo but not Sectumsempra does not necessarily mean that the latter is more powerful. It may simply be that Reparo is only meant for repairing objects but not humans, as I argued in [this answer](https://scifi.stackexchange.com/a/205703/100430).
>
> However, when Harry cast Sectumsempra on Draco, Snape had to use the counter-curse multiple times.
>
>
>
This would make sense even if Sectumsempra was not inherently more powerful; slicing up a human can cause severe injury including a lot of blood loss. Snape trying multiple times only means that Draco was seriously wounded.
>
> Additionally, it takes that specific counter-curse to even have a chance of healing the wounds Sectumsempra creates. When George’s ear is cut off, his mother (and the rest of the Order) can’t make it grow back because Sectumsempra is dark magic.
>
>
>
I would argue that we don't actually see evidence that there is some unique way to heal Sectumsempra that only Snape knows. This is what Snape actually did:
>
> Pushing Harry roughly aside, he knelt over Malfoy, drew his wand, and traced it over the deep wounds Harry's curse had made, muttering an incantation that sounded almost like song. The flow of blood seemed to ease; Snape wiped the residue from Malfoy's face and repeated his spell. Now the wounds seemed to be knitting.
>
>
>
There doesn't seem to be anything here to indicate that this was not simply a standard way to heal major injuries. All it seems that Snape did was stop the bloodflow and seal the wounds. Those are things that would not be unique to Sectumsempra-inflicted injuries. It is possible that Snape was simply a highly skilled wizard with particular knowledge of healing spells.
As for George's ear, I would argue that we shouldn't interpret Mrs. Weasley's words too literally/precisely. The reason why she can't fix George's ear is not simply that Dark Magic was involved. If that was the case then Malfoy's wounds would have been unhealable as well. Or since Snape was able to heal Malfoy's wounds it would follow that he could also reattach George's ear. But I don't think that is very reasonable. Surely, Snape was not the single greatest wizard in the world. If Snape had managed to find away to heal such an injury there surely could have been someone else in the world who had managed it as well, and Mrs. Weasley should not have been so dismissive. Consider that Sectumsempra was not a secret spell that no one else knew about; as Lupin said:
>
> Sectumsempra was always a specialty of Snape's.
>
>
>
This implies that while Snape was especially known for using it, others were well aware of it as well.
Additionally, what is actually the difference between Dark Magic and non-Dark magic? When you perform a healing spell does the body run a check to see whether the magic that cursed it was Dark or not and if it detects Darkness it decides not to heal? That seems quite far-fetched. Instead I would argue that the only thing that really matters is the destructiveness that occurred. Certain things can be healed because there was simply less damage. Other things cannot be healed because the damage is too great. In Malfoy's case the wounds were serious, but at the end of the day they were just cuts. Cuts can be repaired relatively easily. In George's case, on the other hand, the entire limb was severed from his body. That amount of destructiveness cannot be repaired by magic because it would require growing an entire new limb. When Mrs. Weasley said that she can't regrow it since it was removed by Dark Magic, we should interpret that as meaning that it can't be regrown because it was removed, and it happens to be that generally it is Dark Magic that removes limbs.
In other words, my point is that it wouldn't make a difference whether the magic that removed the limb was Dark or not; but any magic that would slice off a limb would probably be Dark.
>
> However, there’s a way to use it painlessly for amputation, since Newt Scamander mentions that owners of Crups are required by law to use a painless Severing Charm to remove their tail.
>
>
>
This does not necessarily mean that there is a fundamental difference between Diffindo cutting and Sectumsempra cutting. It is possible that "a painless Severing Charm" means that you have do use an anesthesia charm beforehand, or that simply Crups don't have much feeling in their tails so cutting them would be painless regardless.
>
> By contrast, Diffindo doesn’t seem to be classified as Dark magic. Ron uses it in fourth year to remove lace from the secondhand dress robes his mother bought him. It’s highly unlikely he’d use Dark magic, especially for such a relatively simple task (easily accomplished by scissors) in a fairly non-urgent situation.
>
>
>
I would argue that this is not really a relevant distinction. Magic would be Dark or not Dark dependent on what the magic does. If two spells did the same thing then they would either be both Dark or both not Dark. The fact that Diffindo is not Dark should only indicate that it is not the same spell as Sectumsempra which is Dark; it doesn't tell us what the difference is, though.
**So what is actually the difference between Diffindo and Sectumsempra?**
I would argue, as I discussed at length in [this answer](https://scifi.stackexchange.com/questions/106494/what-effect-would-reducto-have-if-used-on-a-human?noredirect=1&lq=1), that there are fundamentally different classes of spells. Some spells are designed for human use and some spells are designed for object use. Diffindo and Sectumsempra both create cutting effects. I would argue that the difference between them is simply that Diffindo is designed for cutting objects and Sectumsempra is designed for cutting humans. That is *why* Sectumsempra is dark and Diffindo is not, and Diffindo is more easily reversed. |
205,514 | In the Harry Potter books, Diffindo is called the 'Severing Charm' and it’s most commonly used to cut ropes and the like. However, in the last book Hermione uses it on Ron but misses, creating a 'slash in his jeans' and his knee gets cut, causing him to 'roar in pain'.
We've only seen Sectumsempra used once on screen when Harry directly uses it on Malfoy in the sixth book, but there it's mentioned that he is 'waving his wand wildly'. Wouldn't Diffindo, if used in such a fashion also cause a similar effect? Similarly, if it was able to cut Ron, it would also be able to, say, chop off an ear (George's)?
In that case, how are these two spells different, except for Sectumsempra seemingly used exclusively to hurt humans? | 2019/02/17 | [
"https://scifi.stackexchange.com/questions/205514",
"https://scifi.stackexchange.com",
"https://scifi.stackexchange.com/users/111841/"
] | Diffindo is more easily countered.
==================================
While Diffindo and Sectumsempra both can be countered by other spells, Diffindo is far more easily countered. Reparo, a relatively common spell, can completely reverse its effect when used once.
>
> “He pulled the old copy of Advanced Potion-Making out of his bag and tapped the cover with his wand, muttering, *‘Diffindo!’* The cover fell off. He did the same thing with the brand new book (Hermione looked scandalised). He then swapped the covers, tapped each and said, *‘Reparo!*”
> *- Harry Potter and the Half-Blood Prince, Chapter 11 (Hermione’s Helping Hand)*
>
>
>
However, when Harry cast Sectumsempra on Draco, Snape had to use the counter-curse multiple times.
>
> “Pushing Harry roughly aside, he knelt over Malfoy, drew his wand and traced it over the deep wounds Harry’s curse had made, muttering an incantation that sounded almost like song. The flow of blood seemed to ease; Snape wiped the residue from Malfoy’s face and repeated his spell. Now the wounds seemed to be knitting.”
> *- Harry Potter and the Half-Blood Prince, Chapter 24 (Sectumsempra)*
>
>
>
After repeating the counter-curse three times, Snape still had to take Draco to the hospital wing, and that was with Harry not even knowing what the spell did and never having cast it before. Presumably it could be even more damaging when used by someone experienced, and may have more severe effects in that case.
>
> “When Snape had performed his counter-curse for the third time, he half-lifted Malfoy into a standing position.
> ‘You need the hospital wing. There may be a certain amount of scarring, but if you take dittany immediately we might avoid even that … come …”
> *- Harry Potter and the Half-Blood Prince, Chapter 24 (Sectumsempra)*
>
>
>
Additionally, it takes that specific counter-curse to even have a chance of healing the wounds Sectumsempra creates. When George’s ear is cut off, his mother (and the rest of the Order) can’t make it grow back because Sectumsempra is dark magic.
>
> “Mrs Weasley had staunched his bleeding now, and by the lamplight Harry saw a clean, gaping hole where George’s ear had been.
>
>
> ‘How is he?’
>
>
> Mrs Weasley looked round and said, ‘I can’t make it grow back, not when it’s been removed by Dark Magic. But it could have been so much worse … he’s alive.”
> *- Harry Potter and the Deathly Hallows, Chapter 5 (Fallen Warrior)*
>
>
>
Though they both have the effect of cutting, Diffindo is more easily countered and doesn’t leave the cuts is makes as difficult to heal by the usual magical methods.
Difindo can be used painlessly.
===============================
As is seen when Hermione accidentally cuts Ron with it, Diffindo, the Severing Charm, can possibly cause pain when used on flesh.
>
> “*D – Diffindo,’* she said, pointing her wand at Ron, who roared in pain as she slashed open the knee of his jeans, leaving a deep cut. ‘Oh, I’m so sorry, Ron, my hand’s shaking! *Diffindo!*’
> The severed ropes fell away. Ron got to his feet, shaking his arms to regain feeling in them.”
> *- Harry Potter and the Deathly Hallows, Chapter 9 (A Place to Hide)*
>
>
>
However, there’s a way to use it painlessly for amputation, since Newt Scamander mentions that owners of Crups are required by law to use a painless Severing Charm to remove their tail.
>
> “Crup owners are legally obliged to remove the Crup’s tail with a painless Severing Charm while the Crup is six to eight weeks old, lest Muggles notice it.”
> *- Fantastic Beasts and Where to Find Them*
>
>
>
There doesn’t seem to be any evidence that Sectumsempra can be used painlessly, though it’s impossible to rule it out entirely, it seems unlikely from what’s known about its effects.
Sectumsempra is Dark, Diffindo isn’t.
=====================================
When George’s ear is cut off by Sectumsempra, his mother mentions that the spell used was Dark magic.
>
> “Mrs Weasley looked round and said, ‘I can’t make it grow back, not when it’s been removed by Dark Magic. But it could have been so much worse … he’s alive.”
> *- Harry Potter and the Deathly Hallows, Chapter 5 (Fallen Warrior)*
>
>
>
By contrast, Diffindo doesn’t seem to be classified as Dark magic. Ron uses it in fourth year to remove lace from the secondhand dress robes his mother bought him. It’s highly unlikely he’d use Dark magic, especially for such a relatively simple task (easily accomplished by scissors) in a fairly non-urgent situation.
>
> “In a desperate attempt to make them look more manly, he used a Severing Charm on the ruff and cuffs. It worked fairly well; at least he was now lace-free, although he hadn’t done a very neat job, and the edges still looked depressingly frayed as they set off downstairs.”
> *- Harry Potter and the Goblet of Fire, Chapter 23 (The Yule Ball)*
>
>
>
Sectumsempra therefore would be classified as Dark magic, while Diffindo would not. There are practical differences in how Dark magic affects what it’s used on, like its making the wounds it creates difficult to heal, which differentiates the two spells in their respective effects. Also, its classification as Dark magic would make certain wizards who’d willingly use Diffindo unwilling to use Sectumsempra, even for the same things they’d use Diffindo for, because they don’t want to use magic considered Dark. | Sectumsempra is just more powerful.
===================================
I found an interesting Quora post on this and it seems relevant enough so here goes...
>
> Sectumsempra is extremely similar to a severing charm named Diffindo. Here's it's description.
>
>
>
> >
> > With the Severing Charm, cutting or tearing objects is a simple matter of wand control. The spell can be quite precise in skilled hands, and the Severing Charm is widely used in a variety of wizarding trades. Useful as it is, this charm should be practiced with caution, as a careless swipe of the wand can cause injury.
> >
> >
> >
>
>
> Which is extremely similar to what we know of Sectumsempra and it's after-effects.
>
>
>
> >
> > Blood spurted from Malfoy's face and chest as though he had been slashed with an invisible sword. He staggered backward and collapsed onto the waterlogged floor with a great splash, his wand falling from his limp right hand. Slipping and staggering, Harry got to his feet and plunged toward Malfoy, whose face was now shining scarlet, his white hands scrabbling at his blood-soaked chest.
> >
> >
> >
>
>
> (It should also be noted that the power of Sectumsempra can be controlled. When Severus used it on James, it only resulted in a little gash on his cheek, while Harry's wild cast almost resulted in Draco's death.)
>
>
> Though the two are quite similar, they do have a few differences
> Sectumsempra is a curse, classified as dark magic, while Diffindo is a charm.
> Organs severed with Sectumsempra cannot be grown back. Those severed by Diffindo probably can
> They both have different wand movements.
> *- [How did Snape invent the Sectumsempra in “Harry Potter”? - Quora](https://www.quora.com/How-did-Snape-invent-the-Sectumsempra-in-%E2%80%9CHarry-Potter%E2%80%9D)*
>
>
>
The post goes on to speculate that Snape perfected the Diffindo charm from "a charm used for cutting herbs" into "a curse capable of cutting through human flesh". So, from this we can see that Sectumsempra is (in essence) a refined Diffindo. |
205,514 | In the Harry Potter books, Diffindo is called the 'Severing Charm' and it’s most commonly used to cut ropes and the like. However, in the last book Hermione uses it on Ron but misses, creating a 'slash in his jeans' and his knee gets cut, causing him to 'roar in pain'.
We've only seen Sectumsempra used once on screen when Harry directly uses it on Malfoy in the sixth book, but there it's mentioned that he is 'waving his wand wildly'. Wouldn't Diffindo, if used in such a fashion also cause a similar effect? Similarly, if it was able to cut Ron, it would also be able to, say, chop off an ear (George's)?
In that case, how are these two spells different, except for Sectumsempra seemingly used exclusively to hurt humans? | 2019/02/17 | [
"https://scifi.stackexchange.com/questions/205514",
"https://scifi.stackexchange.com",
"https://scifi.stackexchange.com/users/111841/"
] | Diffindo is more easily countered.
==================================
While Diffindo and Sectumsempra both can be countered by other spells, Diffindo is far more easily countered. Reparo, a relatively common spell, can completely reverse its effect when used once.
>
> “He pulled the old copy of Advanced Potion-Making out of his bag and tapped the cover with his wand, muttering, *‘Diffindo!’* The cover fell off. He did the same thing with the brand new book (Hermione looked scandalised). He then swapped the covers, tapped each and said, *‘Reparo!*”
> *- Harry Potter and the Half-Blood Prince, Chapter 11 (Hermione’s Helping Hand)*
>
>
>
However, when Harry cast Sectumsempra on Draco, Snape had to use the counter-curse multiple times.
>
> “Pushing Harry roughly aside, he knelt over Malfoy, drew his wand and traced it over the deep wounds Harry’s curse had made, muttering an incantation that sounded almost like song. The flow of blood seemed to ease; Snape wiped the residue from Malfoy’s face and repeated his spell. Now the wounds seemed to be knitting.”
> *- Harry Potter and the Half-Blood Prince, Chapter 24 (Sectumsempra)*
>
>
>
After repeating the counter-curse three times, Snape still had to take Draco to the hospital wing, and that was with Harry not even knowing what the spell did and never having cast it before. Presumably it could be even more damaging when used by someone experienced, and may have more severe effects in that case.
>
> “When Snape had performed his counter-curse for the third time, he half-lifted Malfoy into a standing position.
> ‘You need the hospital wing. There may be a certain amount of scarring, but if you take dittany immediately we might avoid even that … come …”
> *- Harry Potter and the Half-Blood Prince, Chapter 24 (Sectumsempra)*
>
>
>
Additionally, it takes that specific counter-curse to even have a chance of healing the wounds Sectumsempra creates. When George’s ear is cut off, his mother (and the rest of the Order) can’t make it grow back because Sectumsempra is dark magic.
>
> “Mrs Weasley had staunched his bleeding now, and by the lamplight Harry saw a clean, gaping hole where George’s ear had been.
>
>
> ‘How is he?’
>
>
> Mrs Weasley looked round and said, ‘I can’t make it grow back, not when it’s been removed by Dark Magic. But it could have been so much worse … he’s alive.”
> *- Harry Potter and the Deathly Hallows, Chapter 5 (Fallen Warrior)*
>
>
>
Though they both have the effect of cutting, Diffindo is more easily countered and doesn’t leave the cuts is makes as difficult to heal by the usual magical methods.
Difindo can be used painlessly.
===============================
As is seen when Hermione accidentally cuts Ron with it, Diffindo, the Severing Charm, can possibly cause pain when used on flesh.
>
> “*D – Diffindo,’* she said, pointing her wand at Ron, who roared in pain as she slashed open the knee of his jeans, leaving a deep cut. ‘Oh, I’m so sorry, Ron, my hand’s shaking! *Diffindo!*’
> The severed ropes fell away. Ron got to his feet, shaking his arms to regain feeling in them.”
> *- Harry Potter and the Deathly Hallows, Chapter 9 (A Place to Hide)*
>
>
>
However, there’s a way to use it painlessly for amputation, since Newt Scamander mentions that owners of Crups are required by law to use a painless Severing Charm to remove their tail.
>
> “Crup owners are legally obliged to remove the Crup’s tail with a painless Severing Charm while the Crup is six to eight weeks old, lest Muggles notice it.”
> *- Fantastic Beasts and Where to Find Them*
>
>
>
There doesn’t seem to be any evidence that Sectumsempra can be used painlessly, though it’s impossible to rule it out entirely, it seems unlikely from what’s known about its effects.
Sectumsempra is Dark, Diffindo isn’t.
=====================================
When George’s ear is cut off by Sectumsempra, his mother mentions that the spell used was Dark magic.
>
> “Mrs Weasley looked round and said, ‘I can’t make it grow back, not when it’s been removed by Dark Magic. But it could have been so much worse … he’s alive.”
> *- Harry Potter and the Deathly Hallows, Chapter 5 (Fallen Warrior)*
>
>
>
By contrast, Diffindo doesn’t seem to be classified as Dark magic. Ron uses it in fourth year to remove lace from the secondhand dress robes his mother bought him. It’s highly unlikely he’d use Dark magic, especially for such a relatively simple task (easily accomplished by scissors) in a fairly non-urgent situation.
>
> “In a desperate attempt to make them look more manly, he used a Severing Charm on the ruff and cuffs. It worked fairly well; at least he was now lace-free, although he hadn’t done a very neat job, and the edges still looked depressingly frayed as they set off downstairs.”
> *- Harry Potter and the Goblet of Fire, Chapter 23 (The Yule Ball)*
>
>
>
Sectumsempra therefore would be classified as Dark magic, while Diffindo would not. There are practical differences in how Dark magic affects what it’s used on, like its making the wounds it creates difficult to heal, which differentiates the two spells in their respective effects. Also, its classification as Dark magic would make certain wizards who’d willingly use Diffindo unwilling to use Sectumsempra, even for the same things they’d use Diffindo for, because they don’t want to use magic considered Dark. | I would like to disagree with [Bellatrix's answer](https://scifi.stackexchange.com/a/205552/100430) (no disrespect intended):
>
> While Diffindo and Sectumsempra both can be countered by other spells, Diffindo is far more easily countered. Reparo, a relatively common spell, can completely reverse its effect when used once.
>
>
>
I would argue that the fact that Reparo can reverse the effects of Diffindo but not Sectumsempra does not necessarily mean that the latter is more powerful. It may simply be that Reparo is only meant for repairing objects but not humans, as I argued in [this answer](https://scifi.stackexchange.com/a/205703/100430).
>
> However, when Harry cast Sectumsempra on Draco, Snape had to use the counter-curse multiple times.
>
>
>
This would make sense even if Sectumsempra was not inherently more powerful; slicing up a human can cause severe injury including a lot of blood loss. Snape trying multiple times only means that Draco was seriously wounded.
>
> Additionally, it takes that specific counter-curse to even have a chance of healing the wounds Sectumsempra creates. When George’s ear is cut off, his mother (and the rest of the Order) can’t make it grow back because Sectumsempra is dark magic.
>
>
>
I would argue that we don't actually see evidence that there is some unique way to heal Sectumsempra that only Snape knows. This is what Snape actually did:
>
> Pushing Harry roughly aside, he knelt over Malfoy, drew his wand, and traced it over the deep wounds Harry's curse had made, muttering an incantation that sounded almost like song. The flow of blood seemed to ease; Snape wiped the residue from Malfoy's face and repeated his spell. Now the wounds seemed to be knitting.
>
>
>
There doesn't seem to be anything here to indicate that this was not simply a standard way to heal major injuries. All it seems that Snape did was stop the bloodflow and seal the wounds. Those are things that would not be unique to Sectumsempra-inflicted injuries. It is possible that Snape was simply a highly skilled wizard with particular knowledge of healing spells.
As for George's ear, I would argue that we shouldn't interpret Mrs. Weasley's words too literally/precisely. The reason why she can't fix George's ear is not simply that Dark Magic was involved. If that was the case then Malfoy's wounds would have been unhealable as well. Or since Snape was able to heal Malfoy's wounds it would follow that he could also reattach George's ear. But I don't think that is very reasonable. Surely, Snape was not the single greatest wizard in the world. If Snape had managed to find away to heal such an injury there surely could have been someone else in the world who had managed it as well, and Mrs. Weasley should not have been so dismissive. Consider that Sectumsempra was not a secret spell that no one else knew about; as Lupin said:
>
> Sectumsempra was always a specialty of Snape's.
>
>
>
This implies that while Snape was especially known for using it, others were well aware of it as well.
Additionally, what is actually the difference between Dark Magic and non-Dark magic? When you perform a healing spell does the body run a check to see whether the magic that cursed it was Dark or not and if it detects Darkness it decides not to heal? That seems quite far-fetched. Instead I would argue that the only thing that really matters is the destructiveness that occurred. Certain things can be healed because there was simply less damage. Other things cannot be healed because the damage is too great. In Malfoy's case the wounds were serious, but at the end of the day they were just cuts. Cuts can be repaired relatively easily. In George's case, on the other hand, the entire limb was severed from his body. That amount of destructiveness cannot be repaired by magic because it would require growing an entire new limb. When Mrs. Weasley said that she can't regrow it since it was removed by Dark Magic, we should interpret that as meaning that it can't be regrown because it was removed, and it happens to be that generally it is Dark Magic that removes limbs.
In other words, my point is that it wouldn't make a difference whether the magic that removed the limb was Dark or not; but any magic that would slice off a limb would probably be Dark.
>
> However, there’s a way to use it painlessly for amputation, since Newt Scamander mentions that owners of Crups are required by law to use a painless Severing Charm to remove their tail.
>
>
>
This does not necessarily mean that there is a fundamental difference between Diffindo cutting and Sectumsempra cutting. It is possible that "a painless Severing Charm" means that you have do use an anesthesia charm beforehand, or that simply Crups don't have much feeling in their tails so cutting them would be painless regardless.
>
> By contrast, Diffindo doesn’t seem to be classified as Dark magic. Ron uses it in fourth year to remove lace from the secondhand dress robes his mother bought him. It’s highly unlikely he’d use Dark magic, especially for such a relatively simple task (easily accomplished by scissors) in a fairly non-urgent situation.
>
>
>
I would argue that this is not really a relevant distinction. Magic would be Dark or not Dark dependent on what the magic does. If two spells did the same thing then they would either be both Dark or both not Dark. The fact that Diffindo is not Dark should only indicate that it is not the same spell as Sectumsempra which is Dark; it doesn't tell us what the difference is, though.
**So what is actually the difference between Diffindo and Sectumsempra?**
I would argue, as I discussed at length in [this answer](https://scifi.stackexchange.com/questions/106494/what-effect-would-reducto-have-if-used-on-a-human?noredirect=1&lq=1), that there are fundamentally different classes of spells. Some spells are designed for human use and some spells are designed for object use. Diffindo and Sectumsempra both create cutting effects. I would argue that the difference between them is simply that Diffindo is designed for cutting objects and Sectumsempra is designed for cutting humans. That is *why* Sectumsempra is dark and Diffindo is not, and Diffindo is more easily reversed. |
43,415 | I have a Cannon MP560 that kept having communications errors. One of the suggestions I read was to remove the printer from the print & scan menu and re-add it. Once I did that the scanner disappeared as well and I cannot get OSX 10.7 to recognize this device as a scanner again.
* Does anybody know how I can get OSX to recognize this device as a scanner again?
Here are some screenshots of my print & scan screen and my add printer dialogue. Bonjour does not show me any information about this device either.

 | 2012/03/12 | [
"https://apple.stackexchange.com/questions/43415",
"https://apple.stackexchange.com",
"https://apple.stackexchange.com/users/13615/"
] | Canon has updated most of their software (Easy-PhotoPrintEX, MP Navigator) and their drivers (printer, scanner) around the time when Lion came out. Make sure that you have the latest drivers installed.
You can download all the Canon software for your MP560 Scanner **[here](http://www.usa.canon.com/cusa/macosx_lion/multifunction_printers/pixma_mp_series/pixma_mp560#DriversAndSoftware)**.
Also, be sure to connect your printer via cable in order to use it as a scanner:
 | How to scan wirelessly: if anyone is still interested in using their MP560 scanner wirelessly on OSX Mavericks, I successfully used *Image Capture* from Applications.
Note the printer must be installed and recognized as a wireless printer - the MP560 will show up twice. Initially I had to install the MP560 via USB cable. |
43,415 | I have a Cannon MP560 that kept having communications errors. One of the suggestions I read was to remove the printer from the print & scan menu and re-add it. Once I did that the scanner disappeared as well and I cannot get OSX 10.7 to recognize this device as a scanner again.
* Does anybody know how I can get OSX to recognize this device as a scanner again?
Here are some screenshots of my print & scan screen and my add printer dialogue. Bonjour does not show me any information about this device either.

 | 2012/03/12 | [
"https://apple.stackexchange.com/questions/43415",
"https://apple.stackexchange.com",
"https://apple.stackexchange.com/users/13615/"
] | Canon has updated most of their software (Easy-PhotoPrintEX, MP Navigator) and their drivers (printer, scanner) around the time when Lion came out. Make sure that you have the latest drivers installed.
You can download all the Canon software for your MP560 Scanner **[here](http://www.usa.canon.com/cusa/macosx_lion/multifunction_printers/pixma_mp_series/pixma_mp560#DriversAndSoftware)**.
Also, be sure to connect your printer via cable in order to use it as a scanner:
 | New Scanning Instructions:
Canon MP560 to Mac Computer with OS X Yosemite
(Use USB cable to port)
Go to system Preference
Printer/Scanner Icon
Hit open scanner
Hit scan button and open MP Navigator
Default printer last printer used (MP560)
(Use USB cable to port and indicates on line)
Hit scan
Do selection as needed/required
I set the scan to go desktop to see immediately |
43,415 | I have a Cannon MP560 that kept having communications errors. One of the suggestions I read was to remove the printer from the print & scan menu and re-add it. Once I did that the scanner disappeared as well and I cannot get OSX 10.7 to recognize this device as a scanner again.
* Does anybody know how I can get OSX to recognize this device as a scanner again?
Here are some screenshots of my print & scan screen and my add printer dialogue. Bonjour does not show me any information about this device either.

 | 2012/03/12 | [
"https://apple.stackexchange.com/questions/43415",
"https://apple.stackexchange.com",
"https://apple.stackexchange.com/users/13615/"
] | Canon has updated most of their software (Easy-PhotoPrintEX, MP Navigator) and their drivers (printer, scanner) around the time when Lion came out. Make sure that you have the latest drivers installed.
You can download all the Canon software for your MP560 Scanner **[here](http://www.usa.canon.com/cusa/macosx_lion/multifunction_printers/pixma_mp_series/pixma_mp560#DriversAndSoftware)**.
Also, be sure to connect your printer via cable in order to use it as a scanner:
 | After updating my Mac to Yosemite, my Canon MX350 wouldn't scan.
Type in
www.usa.canon.com/cusa/support/consumer
You'll be on Get Product Support.
Type in your model (eg. PIXMA MX350) click Go.
You should see Operating System Yosemite (detected).
Look for the series Scanner Driver Ver. and click Select.
Then you'll see Download and click that and go through the download "motions.
Restart the computer and your scanner should be working great. I just clicked on the icon MP Navigator EX in my dock and viola, it was all there.
This is how I fixed mine after spending hours watching videos and reading so many suggestions. I just did this and actually figured it out myself.
Hope this can help others!!
Cheers! |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.