qid int64 1 74.7M | question stringlengths 12 33.8k | date stringlengths 10 10 | metadata list | response_j stringlengths 0 115k | response_k stringlengths 2 98.3k |
|---|---|---|---|---|---|
256,800 | I don't know why but Auto-Merge doesn't work. I'm trying to AutoMerge vertices and it doesn't do anything.
Do I need to do anything to activate it?
Blend:
[](https://blend-exchange.com/b/10AWpVVs/) | 2022/03/17 | [
"https://blender.stackexchange.com/questions/256800",
"https://blender.stackexchange.com",
"https://blender.stackexchange.com/users/131222/"
] | [Auto Merge](https://docs.blender.org/manual/en/latest/modeling/meshes/tools/tool_settings.html#auto-merge-vertices) does require that you enable it; but you've done so already in your blend file. You can check this in the sidebar in the Tool tab:
[](https://i.stack.imgur.com/Elk9F.png)
And I've checked, it does work in your file. If I move any vertex close enough to another vertex that it's connected to by an edge, they do merge. I suspect that your problem is either that you're trying to merge vertices that aren't connected by edges, or that your simply not getting close enough.
In [this answer](https://blender.stackexchange.com/a/256803/42221) Moonboots points out one way to make it easy to get close. I use a different one, [*edge sliding*](https://docs.blender.org/manual/en/latest/modeling/meshes/editing/edge/edge_slide.html), short cut `G``G` and left click to finish. Both of those work in your file.
I've also "eyeballed" a move and it worked. | You would also need to have *Split Edges & Faces* turned on in order to make *Auto Merge* work.
[](https://i.stack.imgur.com/7fOlG.png) |
185,778 | Is there anyway to get it working properly (even as a basic mouse)? The computer just keeps coming back with "Unknown Device". All of the results on google are asking for help or say that the support for this device has been dropped by microsoft and or Logitech. It seems like it should work as a basic wireless mouse though right?
//edit
I don't really care if the extended features work, it would just be nice to use it as a mouse/keyboard.
//update 2
It seems that the problem is 64bit Windows 7 only, it works fine in a 32bit environment. | 2010/09/07 | [
"https://superuser.com/questions/185778",
"https://superuser.com",
"https://superuser.com/users/5042/"
] | * You need to download drivers for that mouse to work correctly .
* For using it as a basic mouse try installing **Microsoft's IntelliPoint mouse driver**
* cool software which may be used as an alternative <http://www.highrez.co.uk/downloads/XMouseButtonControl.htm>
**Note:** *Many people in other forums found 64 bit drivers for M700 from the Logitech home site , for more information go to Logitech website and then go to troubleshooting , there look for "Q: Windows 7 support for my Logitech product"* | If the device isn't recognized automatically, you'll need to download the drivers from a trustworthy site and install it that way. |
185,778 | Is there anyway to get it working properly (even as a basic mouse)? The computer just keeps coming back with "Unknown Device". All of the results on google are asking for help or say that the support for this device has been dropped by microsoft and or Logitech. It seems like it should work as a basic wireless mouse though right?
//edit
I don't really care if the extended features work, it would just be nice to use it as a mouse/keyboard.
//update 2
It seems that the problem is 64bit Windows 7 only, it works fine in a 32bit environment. | 2010/09/07 | [
"https://superuser.com/questions/185778",
"https://superuser.com",
"https://superuser.com/users/5042/"
] | Ok, so the problem was that there were updates to Windows 7 that were preventing it from recognizing the "new" device. | If the device isn't recognized automatically, you'll need to download the drivers from a trustworthy site and install it that way. |
185,778 | Is there anyway to get it working properly (even as a basic mouse)? The computer just keeps coming back with "Unknown Device". All of the results on google are asking for help or say that the support for this device has been dropped by microsoft and or Logitech. It seems like it should work as a basic wireless mouse though right?
//edit
I don't really care if the extended features work, it would just be nice to use it as a mouse/keyboard.
//update 2
It seems that the problem is 64bit Windows 7 only, it works fine in a 32bit environment. | 2010/09/07 | [
"https://superuser.com/questions/185778",
"https://superuser.com",
"https://superuser.com/users/5042/"
] | * You need to download drivers for that mouse to work correctly .
* For using it as a basic mouse try installing **Microsoft's IntelliPoint mouse driver**
* cool software which may be used as an alternative <http://www.highrez.co.uk/downloads/XMouseButtonControl.htm>
**Note:** *Many people in other forums found 64 bit drivers for M700 from the Logitech home site , for more information go to Logitech website and then go to troubleshooting , there look for "Q: Windows 7 support for my Logitech product"* | This link for Setpoint driver-download worked for me under Windows7 64-bit:
<http://www.logitech.com/pub/techsupport/mouse/setpoint480b.exe> |
185,778 | Is there anyway to get it working properly (even as a basic mouse)? The computer just keeps coming back with "Unknown Device". All of the results on google are asking for help or say that the support for this device has been dropped by microsoft and or Logitech. It seems like it should work as a basic wireless mouse though right?
//edit
I don't really care if the extended features work, it would just be nice to use it as a mouse/keyboard.
//update 2
It seems that the problem is 64bit Windows 7 only, it works fine in a 32bit environment. | 2010/09/07 | [
"https://superuser.com/questions/185778",
"https://superuser.com",
"https://superuser.com/users/5042/"
] | Ok, so the problem was that there were updates to Windows 7 that were preventing it from recognizing the "new" device. | This link for Setpoint driver-download worked for me under Windows7 64-bit:
<http://www.logitech.com/pub/techsupport/mouse/setpoint480b.exe> |
102,109 | From what I remember, a guy is transported back in time, a time before dinosaurs. He is told to only travel on certain paths. When he breaks this rule, he bends a blade of grass that a dragonfly/butterfly was supposed to land on and be eaten by some lizard. Since this event doesn't happen, evolution is forever changed. The protagonist finds himself in a land of dinosaurs but now they can talk verbally, they have a government and such, basically dinosaurs evolved into the dominant species. The protagonist is captured by a raptor and taken back to the raptor civilization and is imprisoned there. Can't remember the title of this book. I would recognize the cover of the paperback if I saw it. Any ideas? It's not Thomas Hopps' *Dinosaur Wars* although the there are some similarities... | 2015/09/06 | [
"https://scifi.stackexchange.com/questions/102109",
"https://scifi.stackexchange.com",
"https://scifi.stackexchange.com/users/52656/"
] | Building on Frank's answer, there was a book series based on "A Sound of Thunder", "Ray Bradbury presents Dinosaur World" (actually written by Stephen Leigh). The plot continued the story, and the first one did indeed have the main characters being captured by intelligent dinosaurs, although they were ornithiomimids rather than raptors.
[](https://i.stack.imgur.com/lpW1F.jpg)
There were several black & white interior illustrations by Wayne Barlowe. Here's one of the intelligent dinos:
[](https://i.stack.imgur.com/Pvzxl.jpg) | There are many similar stories and books. I'm not sure of the one you described. But Ray Bradbury wrote a short story "A Sound of Thunder". People are taken on hunting tours in the past. They kill dinosaurs that are about to die, and they must stay on a path. One guy runs off the path. He ends up stepping on a butterfly. When they return to the future they find things subtly different. But there are no intelligent dinosaurs in that story. |
6,326,477 | lets say i have the following GET variables available:
>
> state
>
>
> city
>
>
> bedrooms
>
>
> bathrooms
>
>
> type
>
>
> price
>
>
>
now i want them to come out like this:
mysite.com/state/city/#-bedrooms/#-bathrooms/type/price
however, i want this to work so that if one of these variables are not there, it will still work
i.e.:
mysite.com/state/city/#-bedrooms
or:
mysite.com/state/#-bedrooms/price
how do i do this? | 2011/06/13 | [
"https://Stackoverflow.com/questions/6326477",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/600322/"
] | Not every call to malloc invokes a syscall. On my linux desktop malloc allocates a space in 128KB blocks and then distributes the space. So I will see a syscall every 100-200 malloc calls. On freebsd malloc allocates by 2MB blocks. On your machine numbers will likely differ.
If you want to see syscall on every malloc allocate large amounts of memory (malloc(10\*1024\*1024\*1024)) | What do you think brk is? malloc absolutely is invoking a syscall in this example, the syscall just isn't "malloc". |
6,326,477 | lets say i have the following GET variables available:
>
> state
>
>
> city
>
>
> bedrooms
>
>
> bathrooms
>
>
> type
>
>
> price
>
>
>
now i want them to come out like this:
mysite.com/state/city/#-bedrooms/#-bathrooms/type/price
however, i want this to work so that if one of these variables are not there, it will still work
i.e.:
mysite.com/state/city/#-bedrooms
or:
mysite.com/state/#-bedrooms/price
how do i do this? | 2011/06/13 | [
"https://Stackoverflow.com/questions/6326477",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/600322/"
] | Not every call to malloc invokes a syscall. On my linux desktop malloc allocates a space in 128KB blocks and then distributes the space. So I will see a syscall every 100-200 malloc calls. On freebsd malloc allocates by 2MB blocks. On your machine numbers will likely differ.
If you want to see syscall on every malloc allocate large amounts of memory (malloc(10\*1024\*1024\*1024)) | malloc() calls the system brk() function (in Linux/Unix) - but it only calls it if the local heap is exhausted. I.e. most malloc implementations manage a memory heap obtained via brk(), and if it's too small or too fragmented they ask for more via brk(). |
26,867 | My question is extremely weird, so please don't down vote **before** read it all.
I'm a programmer enthusiastic and a graphic/web designer. 6 months ago, I came across an extremely annoying *huge wall* in my job: I make simple corrections to mistakes that seem to be a waste of my work experience (even if inDesign applies that *curved red line* - that silly red line that also shows if is there a word that is needed there):
1. **I can** simple make a book in 4hours with *money formula*: **3hours** +/- to design it and **1 hour** to read it all searching for language mistakes --> the problem is just 1 hour is not enough to read it all, I deeply fear that all of text that I've simple read has a tinny mistake, and let's do it again --> the time passes and I start to think in all of my other works that are delaying a lot.
**Should I be expected as a graphic designer to proof read an entire book?**
I dunno if this site can be used for a discussion purposes (truly sorry if not), but I need to know what is your experiences and what do you all do in this situation? | 2014/02/01 | [
"https://graphicdesign.stackexchange.com/questions/26867",
"https://graphicdesign.stackexchange.com",
"https://graphicdesign.stackexchange.com/users/17870/"
] | I am a designer *and* a proofreader. I've encountered this situation more than once.
No, you are not expected to proof what you are laying out *unless you explicitly state so in your contract.* And if you do agree to proofreading, then you dang well charge for it.
Your time is not free. Your expertise is not free. If you are being paid to design, then it's the client's responsibility to find and fix any mistakes. Conversely, if you are being paid to proofread, it's the client's job to find someone to design the piece and make the typography work. The proofreader doesn't mark widows; the designer doesn't mark typos. | >
> Should I be expected as a graphic designer to proof read an entire
> book?
>
>
>
As long as your job is specifically as designer: **most certainly not!** Stay clear.
There is a large field devoted specifically for that. Proofreading is a highly skilled task, and as is the case with graphic design, not everyone can do it and do it well.
You should not do it. Or if you do, and are ***actually*** good at it, you must charge for it. The going rates might be higher or lower what you earn as a designer, so make it perfectly clear that these are two extremely specialised tasks.
As we prefer people to understand that graphic designers are people that have skills, that we are not time wasters that just likes to fiddle in illustrator: also respect other peoples fields.
Not everyone can be a good designer, not everyone can be a good proofreader. |
26,867 | My question is extremely weird, so please don't down vote **before** read it all.
I'm a programmer enthusiastic and a graphic/web designer. 6 months ago, I came across an extremely annoying *huge wall* in my job: I make simple corrections to mistakes that seem to be a waste of my work experience (even if inDesign applies that *curved red line* - that silly red line that also shows if is there a word that is needed there):
1. **I can** simple make a book in 4hours with *money formula*: **3hours** +/- to design it and **1 hour** to read it all searching for language mistakes --> the problem is just 1 hour is not enough to read it all, I deeply fear that all of text that I've simple read has a tinny mistake, and let's do it again --> the time passes and I start to think in all of my other works that are delaying a lot.
**Should I be expected as a graphic designer to proof read an entire book?**
I dunno if this site can be used for a discussion purposes (truly sorry if not), but I need to know what is your experiences and what do you all do in this situation? | 2014/02/01 | [
"https://graphicdesign.stackexchange.com/questions/26867",
"https://graphicdesign.stackexchange.com",
"https://graphicdesign.stackexchange.com/users/17870/"
] | I am a designer *and* a proofreader. I've encountered this situation more than once.
No, you are not expected to proof what you are laying out *unless you explicitly state so in your contract.* And if you do agree to proofreading, then you dang well charge for it.
Your time is not free. Your expertise is not free. If you are being paid to design, then it's the client's responsibility to find and fix any mistakes. Conversely, if you are being paid to proofread, it's the client's job to find someone to design the piece and make the typography work. The proofreader doesn't mark widows; the designer doesn't mark typos. | Ideally, there should be at least three steps done by different people -- editing, design, proofreading (or super-ideally, editing, proofreading, design, proofreading). These roles were a lot more fixed before computers. Now, technology makes it physically possible to fudge them without immediate negative consequences; not everyone is educated to the importance (and specialized skills) of each role; a lot of us are at least partially cross-trained; and even more of us *think* we are cross-trained. So scope creep can be a big issue. A good editor or proofreader is usually happy if a designer *happens* to notice a mistake that got through, but in a healthy and professional business arrangement, it shouldn't be your *responsibility*. That said, it's kind of an anything-goes world out there, and while it's good to protect ourselves and the quality of the process, sometimes you have to do stuff that's not ideal. Your best protection is spelling out expectations before a job starts, and then remembering to keep a smile on when you say "no" to inappropriate requests, and in a worst-case scenario, just getting through it and continuing to look for better clients. |
212,872 | Are there any issues with an animal (specifically a multicellular organism with nerves and muscles) having cells with rigid walls, like a plant or fungus? | 2021/09/07 | [
"https://worldbuilding.stackexchange.com/questions/212872",
"https://worldbuilding.stackexchange.com",
"https://worldbuilding.stackexchange.com/users/75161/"
] | How magical is your world?
--------------------------
It's hard to give a solid answer without knowing how the magic works so I'll keep this general.
It's not entirely clear if you want individual coral polyps to be extremely large so a single skeleton can be used for some purpose or if you want to radically increase the generational cycle of a colony of coral polyps, so you get lots of raw reef material to work into some other form.
Either way, **you're going to wreak havoc**.
Giant coral polyps would involve creating new species and/or changing existing ones. We don't have any track record of deliberate speciation so the closest analog I can think of is species introduction (i.e., "invasive species"). Generally, introducing a species to a new environment where it has never existed before is a bad idea. Other species are almost certainly going to be lost in the process, possibly many other species.
Even if you limit yourself to "just" speeding up the life cycle of existing species, you run into problems.
A normal coral polyp has a lifespan of a couple of years. Based on your description you want "decades" of growth in "a few months". Since that's not exactly precise, I'll assume you want 50 years of growth in 3 months which works to a nice 200x increase. So, where is all the food and other resources for all of that coming from? Assuming you're not handwaving it all with magic (and given that you're even asking, I'm assuming that was not your plan), then you need to take those resources from the regional environment and, again, things die on a massive scale.
Once each of those polyps has done its thing, it dies. That means a lot more food for decomposers. On the scale you're describing, most ecosystems cannot handle it. Again, if you're not handwaving it all away, you're throwing the environment into chaos and things die (making everything worse).
TLDR
----
Any time you increase the biomass of a single part of an ecosystem at a rate significantly higher than normal you will almost certainly have an ecological disaster.
BUT...
------
If you're doing all of this with magic, then you can magic in the resources and magic away the waste. You can magically prevent species and habitat loss. You can do whatever you need. If you're going to use magic, embrace it. Or not, maybe you want to explore the consequences of this magic. Then just accept that your merpeople are going to destroy the environment and their descendants will not speak kindly of them. Assuming they’re not among the casualties.
---
*Edited to add the following*
***Addendum: scale matters***
*There's a huge difference in impact between any random merdude can casually make Australia's Great Barrier Reef grow at 200x vs a small number of highly trained/talented/gifted mermages can, with effort, increase the growth rate of coral over 10 square meters. If you limit your scale, you limit the damage.* | Coral Reefs are incredibly important ecosystems. They cover less than 1 percent of oceans but they actually support over 25 percent of all marine life. We don’t need merpeople to grow coral faster. There is a startup called Coral Vita which is accelerating coral growth rates by up to 50 times compared to how fast they grow in nature by using a process called micro-fragmenting. These are land based coral farms and Coral is grown in a controlled environment. |
4,033,271 | I remember reading that the following features lead to the development of interesting frameworks/libraries in Python:-
(I read the article from <http://www.python.org/workshops/2002-02/papers/09/index.htm>)
1. A simple class model, which facilitates inheritance.
2. Dynamic typing, which means that the code needs to assume less.
3. Built-in memory management.
Java is statically compiled, and it has a garbage collector too. I wonder if its class model can be termed simple, however, keeping in mind the above mentioned points I have the following doubts:-
* Does Java has a Twisted analogue in Python(which is just as powerful)? | 2010/10/27 | [
"https://Stackoverflow.com/questions/4033271",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/-1/"
] | [Netty](http://www.jboss.org/netty) is an event-driven networking framework written in Java, so it would most likely be Twisted's equivalent. The features are relatively similar to Twisted, and it seems powerful (I don't have any firsthand experience). It seems like it is still actively maintained. You'd have to look into it yourself to really get an idea of whether or not it meets your requirements. | [Apache Mina v2.0](http://mina.apache.org/) is similar to Twisted. |
4,033,271 | I remember reading that the following features lead to the development of interesting frameworks/libraries in Python:-
(I read the article from <http://www.python.org/workshops/2002-02/papers/09/index.htm>)
1. A simple class model, which facilitates inheritance.
2. Dynamic typing, which means that the code needs to assume less.
3. Built-in memory management.
Java is statically compiled, and it has a garbage collector too. I wonder if its class model can be termed simple, however, keeping in mind the above mentioned points I have the following doubts:-
* Does Java has a Twisted analogue in Python(which is just as powerful)? | 2010/10/27 | [
"https://Stackoverflow.com/questions/4033271",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/-1/"
] | [Netty](http://www.jboss.org/netty) is an event-driven networking framework written in Java, so it would most likely be Twisted's equivalent. The features are relatively similar to Twisted, and it seems powerful (I don't have any firsthand experience). It seems like it is still actively maintained. You'd have to look into it yourself to really get an idea of whether or not it meets your requirements. | There is one built for an openTSDB application. API is similar to python twisted.
<http://tsunanet.net/~tsuna/async/1.0/com/stumbleupon/async/> |
15,510 | I know that if I use self-signed cert, browsers will warn about it to the user, but I want to know that from security viewpoint is self-signed cert as secure as certificate authority(CA)? | 2012/05/31 | [
"https://security.stackexchange.com/questions/15510",
"https://security.stackexchange.com",
"https://security.stackexchange.com/users/6142/"
] | When we talk about security, self-signed and CA signed certificates are providing same 256-bit encryption to your website. But, SSL is not only used for security, but also refer authentication and users trust.
**Drawbacks of Self-Signed Certificate,**
Self-signed certificate and signed certificate carry equal encryption strength but beside this encryption, a self-signed certificate holder will have few drawback of using self-signed certificate.
* Self-signed certificate is ideal for internal testing purpose while signed certificate can be used for internal and external environments.
* Self-signed certificate does not support PKI (public key infrastructure) that builds the trust between the user and the certificate issuer by ensuring the user that a particular signed certificate is valid and offered from reputed CA (certificate authority).
* Browser will throw a warning while encountering with self-signed certificate on contrary, signed certificate have already their root certificates implemented in browser hence, there will be no issue of browser warning during the visit of a website.
* If you are dealing with eCommerce, financial, banking website, then users will not trust self-signed certificate, in that case, you need to go with signed certificate.
* You cannot revoke the self-signed certificate. If a private key of a self-signed certificate is compromised, then attackers can easily customize the certificate.
* If any attacker performs man-in-the-middle attack, a user interacting with the browser could not know that the certificate is changed and used by the attacker until the user inspects the certificate manually. Attacker thus can sniff ongoing transactions details.
* When users face security warnings due to self-signed certificate they may understand that the website is not capable of securing their personal information and they would move away from the site.
* While dealing with self-signed certificate on internal environment, employees are advised to ignore security warnings as a result, they tend to ignore warning in long run even on browsing public sites which may left the organization vulnerable.
Self-signed certificate is available at free while you need to pay few buck for signed certificate. Overall, you will have authenticity, trust, and encryption with signed certificate that can be a great advantage for any online business website.
Please read this [article](https://www.ssl2buy.com/wiki/self-signed-certificate-vs-trusted-ca-signed-certificate/) my company published to know more about the risks in self-signed certificates. | The funny part of all this is that in all the hosting companies I have worked for I have NEVER HEARD OF Verisign, Comodo, or any other Certificate Authority calling to check the information provided by their customer is true. They check that the credit card charges properly, and might check that the billing address matches what the customer said TO BILL THE CREDIT CARD, but NOT to issue a certificate. So while the 'trusted relationship' is implied, it is rarely ACTUALLY THERE! Yep, generating your own cert is ok for internal stuff, but for public facing stuff, where customers will be buying, you need to use a public certificate authority issued certificate. Customers don't understand any of this, nor should they have to, but they are trusting that the Verisign company is trustable (even though they don't check certs before issueing them, they're made by a computer..not a human). Hope this helps. |
15,510 | I know that if I use self-signed cert, browsers will warn about it to the user, but I want to know that from security viewpoint is self-signed cert as secure as certificate authority(CA)? | 2012/05/31 | [
"https://security.stackexchange.com/questions/15510",
"https://security.stackexchange.com",
"https://security.stackexchange.com/users/6142/"
] | As you already said, the browser will issue a warning to the user. This makes it possible to man-in-the-middle the connection. Certificates are about trust and your self-signed certificate lacks the trust-chain you normally get with a CA-signed cert. Consider this: if the client is going through my router to connect to your website, I can intercept the communication, generate a cert on the fly (for the client) and talk to your server using your cert. It would still look the same for the client but on my router I have the unencrypted traffic. | If all your users know you and are confident in you, you can build your own CA for free. OpenSSL for example offers you all you need for that:
* you first build a self signed root certificate
* you optionally use that root certificate to sign an intermediary certificate that you use in following steps or directly use the root
* you send that certificate to all your users asking them to put it in the list of their trusted authorities
* you use it to sign site certificates.
The difference is only legal. If you own the CA **and** the site there is no trusted third party. |
15,510 | I know that if I use self-signed cert, browsers will warn about it to the user, but I want to know that from security viewpoint is self-signed cert as secure as certificate authority(CA)? | 2012/05/31 | [
"https://security.stackexchange.com/questions/15510",
"https://security.stackexchange.com",
"https://security.stackexchange.com/users/6142/"
] | It's not secure, because it makes you vulnerable to a redirection or man-in-the-middle attack. Any attacker can create a self-signed certificate for your domain, and your users won't be able to tell that they've received the wrong one if they're taken to the attacker's site instead of yours. | It is the CA's role to deliver certificates to the various users. If the CA is compromised, any certificate from that CA will be revoked, i.e. it will be invalidated. |
15,510 | I know that if I use self-signed cert, browsers will warn about it to the user, but I want to know that from security viewpoint is self-signed cert as secure as certificate authority(CA)? | 2012/05/31 | [
"https://security.stackexchange.com/questions/15510",
"https://security.stackexchange.com",
"https://security.stackexchange.com/users/6142/"
] | Features
========
A self-signed certificate is capable of having the same security features (encryption, extended validation, permitted usage) as a certificate issued from a leading issuer such as VeriSign or GeoTrust. These options need to be set when the certificate is created.
Trust
=====
However the purpose and the advantage of Public Key Infrastructure (PKI) (such as Internal Certificate Authority used inside an enterprise, VeriSign/Symantec, GeoTrust, and many more) is that there is an existing trust relationship between the client and the certificate issuer (e.g. VeriSign). The client (people and browser) trusts that the issuer has checked you out and has verified you are who you say you are. Certificate issuers have stringent security practises that they have to maintain. This type of relationship is not replicated with a self-signed certificate.
You can install a self-signed certificate into a browser (needs to be done for each browser) to make it recognise the certificate as trusted.
If you do not do this step the user has no way of knowing the certificate has changed unless they manually inspect the certificate. This could be dangerous because someone could intercept the transmission (man-in-the-middle) and the user would not know the certificate/host was the wrong one.
Summary
=======
When looking at functionality alone, a self-signed certificate offers neither more or less security then one issued from a leading certificate authority.
Websites are for users, and a certificate trust is important so the user knows your website is who it says it is.
My personal opinion is that the trust and ease of deployment gained by using a public issuing authority is very important for a public web site, especially if you don’t have an existing close relationship with the people visiting it.
A self-signed certificate may be suitable for limited internal development / testing.
An internal Certificate Authority for use is a good solution for enterprises who use certificates internally and have an expertise in PKI.
Hope that helps | The funny part of all this is that in all the hosting companies I have worked for I have NEVER HEARD OF Verisign, Comodo, or any other Certificate Authority calling to check the information provided by their customer is true. They check that the credit card charges properly, and might check that the billing address matches what the customer said TO BILL THE CREDIT CARD, but NOT to issue a certificate. So while the 'trusted relationship' is implied, it is rarely ACTUALLY THERE! Yep, generating your own cert is ok for internal stuff, but for public facing stuff, where customers will be buying, you need to use a public certificate authority issued certificate. Customers don't understand any of this, nor should they have to, but they are trusting that the Verisign company is trustable (even though they don't check certs before issueing them, they're made by a computer..not a human). Hope this helps. |
15,510 | I know that if I use self-signed cert, browsers will warn about it to the user, but I want to know that from security viewpoint is self-signed cert as secure as certificate authority(CA)? | 2012/05/31 | [
"https://security.stackexchange.com/questions/15510",
"https://security.stackexchange.com",
"https://security.stackexchange.com/users/6142/"
] | When we talk about security, self-signed and CA signed certificates are providing same 256-bit encryption to your website. But, SSL is not only used for security, but also refer authentication and users trust.
**Drawbacks of Self-Signed Certificate,**
Self-signed certificate and signed certificate carry equal encryption strength but beside this encryption, a self-signed certificate holder will have few drawback of using self-signed certificate.
* Self-signed certificate is ideal for internal testing purpose while signed certificate can be used for internal and external environments.
* Self-signed certificate does not support PKI (public key infrastructure) that builds the trust between the user and the certificate issuer by ensuring the user that a particular signed certificate is valid and offered from reputed CA (certificate authority).
* Browser will throw a warning while encountering with self-signed certificate on contrary, signed certificate have already their root certificates implemented in browser hence, there will be no issue of browser warning during the visit of a website.
* If you are dealing with eCommerce, financial, banking website, then users will not trust self-signed certificate, in that case, you need to go with signed certificate.
* You cannot revoke the self-signed certificate. If a private key of a self-signed certificate is compromised, then attackers can easily customize the certificate.
* If any attacker performs man-in-the-middle attack, a user interacting with the browser could not know that the certificate is changed and used by the attacker until the user inspects the certificate manually. Attacker thus can sniff ongoing transactions details.
* When users face security warnings due to self-signed certificate they may understand that the website is not capable of securing their personal information and they would move away from the site.
* While dealing with self-signed certificate on internal environment, employees are advised to ignore security warnings as a result, they tend to ignore warning in long run even on browsing public sites which may left the organization vulnerable.
Self-signed certificate is available at free while you need to pay few buck for signed certificate. Overall, you will have authenticity, trust, and encryption with signed certificate that can be a great advantage for any online business website.
Please read this [article](https://www.ssl2buy.com/wiki/self-signed-certificate-vs-trusted-ca-signed-certificate/) my company published to know more about the risks in self-signed certificates. | If all your users know you and are confident in you, you can build your own CA for free. OpenSSL for example offers you all you need for that:
* you first build a self signed root certificate
* you optionally use that root certificate to sign an intermediary certificate that you use in following steps or directly use the root
* you send that certificate to all your users asking them to put it in the list of their trusted authorities
* you use it to sign site certificates.
The difference is only legal. If you own the CA **and** the site there is no trusted third party. |
15,510 | I know that if I use self-signed cert, browsers will warn about it to the user, but I want to know that from security viewpoint is self-signed cert as secure as certificate authority(CA)? | 2012/05/31 | [
"https://security.stackexchange.com/questions/15510",
"https://security.stackexchange.com",
"https://security.stackexchange.com/users/6142/"
] | It's not secure, because it makes you vulnerable to a redirection or man-in-the-middle attack. Any attacker can create a self-signed certificate for your domain, and your users won't be able to tell that they've received the wrong one if they're taken to the attacker's site instead of yours. | The funny part of all this is that in all the hosting companies I have worked for I have NEVER HEARD OF Verisign, Comodo, or any other Certificate Authority calling to check the information provided by their customer is true. They check that the credit card charges properly, and might check that the billing address matches what the customer said TO BILL THE CREDIT CARD, but NOT to issue a certificate. So while the 'trusted relationship' is implied, it is rarely ACTUALLY THERE! Yep, generating your own cert is ok for internal stuff, but for public facing stuff, where customers will be buying, you need to use a public certificate authority issued certificate. Customers don't understand any of this, nor should they have to, but they are trusting that the Verisign company is trustable (even though they don't check certs before issueing them, they're made by a computer..not a human). Hope this helps. |
15,510 | I know that if I use self-signed cert, browsers will warn about it to the user, but I want to know that from security viewpoint is self-signed cert as secure as certificate authority(CA)? | 2012/05/31 | [
"https://security.stackexchange.com/questions/15510",
"https://security.stackexchange.com",
"https://security.stackexchange.com/users/6142/"
] | Features
========
A self-signed certificate is capable of having the same security features (encryption, extended validation, permitted usage) as a certificate issued from a leading issuer such as VeriSign or GeoTrust. These options need to be set when the certificate is created.
Trust
=====
However the purpose and the advantage of Public Key Infrastructure (PKI) (such as Internal Certificate Authority used inside an enterprise, VeriSign/Symantec, GeoTrust, and many more) is that there is an existing trust relationship between the client and the certificate issuer (e.g. VeriSign). The client (people and browser) trusts that the issuer has checked you out and has verified you are who you say you are. Certificate issuers have stringent security practises that they have to maintain. This type of relationship is not replicated with a self-signed certificate.
You can install a self-signed certificate into a browser (needs to be done for each browser) to make it recognise the certificate as trusted.
If you do not do this step the user has no way of knowing the certificate has changed unless they manually inspect the certificate. This could be dangerous because someone could intercept the transmission (man-in-the-middle) and the user would not know the certificate/host was the wrong one.
Summary
=======
When looking at functionality alone, a self-signed certificate offers neither more or less security then one issued from a leading certificate authority.
Websites are for users, and a certificate trust is important so the user knows your website is who it says it is.
My personal opinion is that the trust and ease of deployment gained by using a public issuing authority is very important for a public web site, especially if you don’t have an existing close relationship with the people visiting it.
A self-signed certificate may be suitable for limited internal development / testing.
An internal Certificate Authority for use is a good solution for enterprises who use certificates internally and have an expertise in PKI.
Hope that helps | As trust in PKI is somehow broken (comodo etc...), CA signed certificates show give you no popups :)
For internal usage there's no need for CA signed certs. |
15,510 | I know that if I use self-signed cert, browsers will warn about it to the user, but I want to know that from security viewpoint is self-signed cert as secure as certificate authority(CA)? | 2012/05/31 | [
"https://security.stackexchange.com/questions/15510",
"https://security.stackexchange.com",
"https://security.stackexchange.com/users/6142/"
] | It's not secure, because it makes you vulnerable to a redirection or man-in-the-middle attack. Any attacker can create a self-signed certificate for your domain, and your users won't be able to tell that they've received the wrong one if they're taken to the attacker's site instead of yours. | When we talk about security, self-signed and CA signed certificates are providing same 256-bit encryption to your website. But, SSL is not only used for security, but also refer authentication and users trust.
**Drawbacks of Self-Signed Certificate,**
Self-signed certificate and signed certificate carry equal encryption strength but beside this encryption, a self-signed certificate holder will have few drawback of using self-signed certificate.
* Self-signed certificate is ideal for internal testing purpose while signed certificate can be used for internal and external environments.
* Self-signed certificate does not support PKI (public key infrastructure) that builds the trust between the user and the certificate issuer by ensuring the user that a particular signed certificate is valid and offered from reputed CA (certificate authority).
* Browser will throw a warning while encountering with self-signed certificate on contrary, signed certificate have already their root certificates implemented in browser hence, there will be no issue of browser warning during the visit of a website.
* If you are dealing with eCommerce, financial, banking website, then users will not trust self-signed certificate, in that case, you need to go with signed certificate.
* You cannot revoke the self-signed certificate. If a private key of a self-signed certificate is compromised, then attackers can easily customize the certificate.
* If any attacker performs man-in-the-middle attack, a user interacting with the browser could not know that the certificate is changed and used by the attacker until the user inspects the certificate manually. Attacker thus can sniff ongoing transactions details.
* When users face security warnings due to self-signed certificate they may understand that the website is not capable of securing their personal information and they would move away from the site.
* While dealing with self-signed certificate on internal environment, employees are advised to ignore security warnings as a result, they tend to ignore warning in long run even on browsing public sites which may left the organization vulnerable.
Self-signed certificate is available at free while you need to pay few buck for signed certificate. Overall, you will have authenticity, trust, and encryption with signed certificate that can be a great advantage for any online business website.
Please read this [article](https://www.ssl2buy.com/wiki/self-signed-certificate-vs-trusted-ca-signed-certificate/) my company published to know more about the risks in self-signed certificates. |
15,510 | I know that if I use self-signed cert, browsers will warn about it to the user, but I want to know that from security viewpoint is self-signed cert as secure as certificate authority(CA)? | 2012/05/31 | [
"https://security.stackexchange.com/questions/15510",
"https://security.stackexchange.com",
"https://security.stackexchange.com/users/6142/"
] | Features
========
A self-signed certificate is capable of having the same security features (encryption, extended validation, permitted usage) as a certificate issued from a leading issuer such as VeriSign or GeoTrust. These options need to be set when the certificate is created.
Trust
=====
However the purpose and the advantage of Public Key Infrastructure (PKI) (such as Internal Certificate Authority used inside an enterprise, VeriSign/Symantec, GeoTrust, and many more) is that there is an existing trust relationship between the client and the certificate issuer (e.g. VeriSign). The client (people and browser) trusts that the issuer has checked you out and has verified you are who you say you are. Certificate issuers have stringent security practises that they have to maintain. This type of relationship is not replicated with a self-signed certificate.
You can install a self-signed certificate into a browser (needs to be done for each browser) to make it recognise the certificate as trusted.
If you do not do this step the user has no way of knowing the certificate has changed unless they manually inspect the certificate. This could be dangerous because someone could intercept the transmission (man-in-the-middle) and the user would not know the certificate/host was the wrong one.
Summary
=======
When looking at functionality alone, a self-signed certificate offers neither more or less security then one issued from a leading certificate authority.
Websites are for users, and a certificate trust is important so the user knows your website is who it says it is.
My personal opinion is that the trust and ease of deployment gained by using a public issuing authority is very important for a public web site, especially if you don’t have an existing close relationship with the people visiting it.
A self-signed certificate may be suitable for limited internal development / testing.
An internal Certificate Authority for use is a good solution for enterprises who use certificates internally and have an expertise in PKI.
Hope that helps | As you already said, the browser will issue a warning to the user. This makes it possible to man-in-the-middle the connection. Certificates are about trust and your self-signed certificate lacks the trust-chain you normally get with a CA-signed cert. Consider this: if the client is going through my router to connect to your website, I can intercept the communication, generate a cert on the fly (for the client) and talk to your server using your cert. It would still look the same for the client but on my router I have the unencrypted traffic. |
15,510 | I know that if I use self-signed cert, browsers will warn about it to the user, but I want to know that from security viewpoint is self-signed cert as secure as certificate authority(CA)? | 2012/05/31 | [
"https://security.stackexchange.com/questions/15510",
"https://security.stackexchange.com",
"https://security.stackexchange.com/users/6142/"
] | When we talk about security, self-signed and CA signed certificates are providing same 256-bit encryption to your website. But, SSL is not only used for security, but also refer authentication and users trust.
**Drawbacks of Self-Signed Certificate,**
Self-signed certificate and signed certificate carry equal encryption strength but beside this encryption, a self-signed certificate holder will have few drawback of using self-signed certificate.
* Self-signed certificate is ideal for internal testing purpose while signed certificate can be used for internal and external environments.
* Self-signed certificate does not support PKI (public key infrastructure) that builds the trust between the user and the certificate issuer by ensuring the user that a particular signed certificate is valid and offered from reputed CA (certificate authority).
* Browser will throw a warning while encountering with self-signed certificate on contrary, signed certificate have already their root certificates implemented in browser hence, there will be no issue of browser warning during the visit of a website.
* If you are dealing with eCommerce, financial, banking website, then users will not trust self-signed certificate, in that case, you need to go with signed certificate.
* You cannot revoke the self-signed certificate. If a private key of a self-signed certificate is compromised, then attackers can easily customize the certificate.
* If any attacker performs man-in-the-middle attack, a user interacting with the browser could not know that the certificate is changed and used by the attacker until the user inspects the certificate manually. Attacker thus can sniff ongoing transactions details.
* When users face security warnings due to self-signed certificate they may understand that the website is not capable of securing their personal information and they would move away from the site.
* While dealing with self-signed certificate on internal environment, employees are advised to ignore security warnings as a result, they tend to ignore warning in long run even on browsing public sites which may left the organization vulnerable.
Self-signed certificate is available at free while you need to pay few buck for signed certificate. Overall, you will have authenticity, trust, and encryption with signed certificate that can be a great advantage for any online business website.
Please read this [article](https://www.ssl2buy.com/wiki/self-signed-certificate-vs-trusted-ca-signed-certificate/) my company published to know more about the risks in self-signed certificates. | It is the CA's role to deliver certificates to the various users. If the CA is compromised, any certificate from that CA will be revoked, i.e. it will be invalidated. |
14,901 | I know Persian Language, In persian (Farsi) that is an old language we call **Netherlands “*Holland*”** , call **Germany "*Alman*"**, Call **Poland "*Lahestan*"**, call **India "*Hend*"** and etc.
What is the reason and Why these countries have more than one name? | 2014/08/15 | [
"https://history.stackexchange.com/questions/14901",
"https://history.stackexchange.com",
"https://history.stackexchange.com/users/5220/"
] | I will answer the part of your question about these four specific names. The Persian names for Holland and Germany are recent borrowings from French. Lehestān is borrowed from Turkish and derives from the name of the Lendians, a Slavic tribe who once lived in what is now Poland. Hend is an Arabicised form of Middle Persian hindūg, Old Persian hindū-, Sanskrit sindhu-, the ancient name of the province now known as Sindh. | There are many Geo political reasons for that. Most of the other names are kept by other countries. India is called India (from Indus) because British kept it. Its called Hindustan (Land of Hindus) because Arabs kept it. Germans call their country Deutschland but internationally it is called as Germany. It is the same as we have synonyms in any language for a word. If you consider Japan, they call it Nippon meaning Land of rising sun. So these different meanings give a country multiple names. |
14,901 | I know Persian Language, In persian (Farsi) that is an old language we call **Netherlands “*Holland*”** , call **Germany "*Alman*"**, Call **Poland "*Lahestan*"**, call **India "*Hend*"** and etc.
What is the reason and Why these countries have more than one name? | 2014/08/15 | [
"https://history.stackexchange.com/questions/14901",
"https://history.stackexchange.com",
"https://history.stackexchange.com/users/5220/"
] | I will answer the part of your question about these four specific names. The Persian names for Holland and Germany are recent borrowings from French. Lehestān is borrowed from Turkish and derives from the name of the Lendians, a Slavic tribe who once lived in what is now Poland. Hend is an Arabicised form of Middle Persian hindūg, Old Persian hindū-, Sanskrit sindhu-, the ancient name of the province now known as Sindh. | A lot of variation in country names is based on *translations*. For instance, "Netherlands" means "Low Countries" and is called, in French, "*Pays-Bas*" which has the same meaning, but looks significantly different. It shall be noted that the United Nations has [six official languages](http://www.un.org/en/aboutun/languages.shtml) into which most UN documents are translated; therefore, though each UN member decides on its own name, it has to provide (at least) six variants for these six languages. Since these languages use widely different signs, one of them (Chinese) being non-alphabetic, a country cannot, logically, have a single official name valid worldwide.
Beyond translations, it so happens that countries may change names, and the new name is not necessarily adopted immediately and worldwide. For instance, in 1989, [Burma](http://en.wikipedia.org/wiki/Burma) changed its name to "Republic of the Union of Myanmar", shortened to "Myanmar", but many countries refused to recognize the legitimacy of the government of Burma (a military dictatorship), hence its ability to change the formal name of the country. As a UN member, the official English version of the country name is still "Myanmar", but "Burma" remains in wide usage in some other countries. For instance, [this official document](https://www.dfat.gov.au/geo/burma/burma_brief.html) from the Australian government can be seen to use both "Burma" and "Myanmar" as country name, sometimes switching within the same paragraph with no explanation.
Country names have a huge symbolic value and can lead to interferences with and from other countries. Case in point: [Macedonia](http://en.wikipedia.org/wiki/Macedonia_naming_dispute) (in the UN, Macedonia is known as "the former Yugoslav Republic of Macedonia", a name which is officially "provisional" and has been so for more than two decades). |
14,901 | I know Persian Language, In persian (Farsi) that is an old language we call **Netherlands “*Holland*”** , call **Germany "*Alman*"**, Call **Poland "*Lahestan*"**, call **India "*Hend*"** and etc.
What is the reason and Why these countries have more than one name? | 2014/08/15 | [
"https://history.stackexchange.com/questions/14901",
"https://history.stackexchange.com",
"https://history.stackexchange.com/users/5220/"
] | I will answer the part of your question about these four specific names. The Persian names for Holland and Germany are recent borrowings from French. Lehestān is borrowed from Turkish and derives from the name of the Lendians, a Slavic tribe who once lived in what is now Poland. Hend is an Arabicised form of Middle Persian hindūg, Old Persian hindū-, Sanskrit sindhu-, the ancient name of the province now known as Sindh. | Some countries have a "second" name that is derived from its most famous state or province. For instance, "Holland" is the most famous province of the Netherlands, Farsi (Persia) of Iran, etc. "Schweiz" or "Switzerland" is the most famous state of a country whose official name is the "Confederation of Helvetia."
"Germany," in its English form, was named after a group of "Germans," as was Aleman (Alemani). But the country's "real" name, in its native language, is "Deutschland." |
14,901 | I know Persian Language, In persian (Farsi) that is an old language we call **Netherlands “*Holland*”** , call **Germany "*Alman*"**, Call **Poland "*Lahestan*"**, call **India "*Hend*"** and etc.
What is the reason and Why these countries have more than one name? | 2014/08/15 | [
"https://history.stackexchange.com/questions/14901",
"https://history.stackexchange.com",
"https://history.stackexchange.com/users/5220/"
] | I will answer the part of your question about these four specific names. The Persian names for Holland and Germany are recent borrowings from French. Lehestān is borrowed from Turkish and derives from the name of the Lendians, a Slavic tribe who once lived in what is now Poland. Hend is an Arabicised form of Middle Persian hindūg, Old Persian hindū-, Sanskrit sindhu-, the ancient name of the province now known as Sindh. | Historically, every country had many different names - what they called themselves, and what others called them. Conquerors came and said "This is now SomethingLand" while the people who lived there were already calling it "OurIsland" in their language or "LandOfTrees" in their language or whatever. [There is [a claim](http://en.wikipedia.org/wiki/Name_of_Canada) that "Canada" comes from an Iroquoian word for "the village" because someone asked a guide "what do you call all of this place?" - it might not be true though.] Some folks called their neighbours Outsiders and their homes Outside, while those outsiders called themselves something different.
These days we're usually polite and call countries what they want to be called. But even that can be complicated. There is the province thing (this gives you not only Holland for the Netherlands, but England for the UK) but there is also the matter of abbreviations. Do you say the US or the USA or America?
In the end, there are a number of different words for "the Netherlands" in 10 different languages for exactly the same reason there are a number of different words for "cat" or "contract." They are different languages. |
186,297 | Is it a good practice, or is it obsolete? I'm asking because I've never managed to remember a single security question, thus I always write down the answers. I think they are useless, long passwords or 2FA is a much better practice. | 2018/05/22 | [
"https://security.stackexchange.com/questions/186297",
"https://security.stackexchange.com",
"https://security.stackexchange.com/users/178684/"
] | As you can see from other answers on the same topic (searching for "security question" here returns several related questions), traditional security questions like "What's your mother's maiden name?" are now considered very bad practice.
Some websites, instead of traditional security questions, will ask for your phone number or an alternate email address. They might also regularly remind you to check if your profile info is up-to-date, to make sure you still use the email associated with your account, etc. Another way to check your identity might be to ask you questions about how you have been using the service, what private data the service is storing about you, etc. I'm not sure of all the things Google can actually ask you, but I'm pretty sure they can ask you the approximate date when you created your account, or the name of the city where you usually log in.
I still think that security questions can sometimes be useful as additional info, as long as you let the users write their own questions, maybe along with a *clear* and *huge* warning saying that they must not choose questions that can be answered easily by anybody else. But those security questions should not be an easy way to bypass the password login anyway. They should only be used as an exceptional way to help prove the user's identity, and the process should not be automated (a non-automated process might involve a phone call, for example). | In a surprising number of applications a password + security question is considered 2 factor authentication. The idea is that its something you know whereas a password is expected to be something you will remember (I write passwords down too - but in an appropriately encrypted database!).
Yes, there are much better solutions - but the web developers of the world are not standing by waiting to write the perfect authentication mechanism to be used by readers of this website. There are lots of ways to complement (or improve on) password authentication, but they need something which does not inconvenience their users, is available to all their users, which doesn't cost too much, which doesn't span jurisdictional boundaries, which they can understand, which they feel they have some control over... |
186,297 | Is it a good practice, or is it obsolete? I'm asking because I've never managed to remember a single security question, thus I always write down the answers. I think they are useless, long passwords or 2FA is a much better practice. | 2018/05/22 | [
"https://security.stackexchange.com/questions/186297",
"https://security.stackexchange.com",
"https://security.stackexchange.com/users/178684/"
] | It's better than *no* second-factor, but current 2FA standards recommend
1. something you know
2. something you have
A lot of banks use security questions or image-recognition because it's thought to provide an anti-phish protection, where once you are accustomed to seeing your image/ answering your security question, **you** will notice its absence.
This can of course be defeated by having the phishing site forward the username you enter, retrieve the question/image, and display it to you, but that's beyond what most phishing campaigns will do.
tl;dr Security questions are not good if used as *client-verification*, but they can be useful as *server-verification*, so that you can be reasonably sure the site you are logging into is the actual site.
This doesn't apply if the site makes you select the security question each time, but that's not what any banks I've seen using SQs do. | In a surprising number of applications a password + security question is considered 2 factor authentication. The idea is that its something you know whereas a password is expected to be something you will remember (I write passwords down too - but in an appropriately encrypted database!).
Yes, there are much better solutions - but the web developers of the world are not standing by waiting to write the perfect authentication mechanism to be used by readers of this website. There are lots of ways to complement (or improve on) password authentication, but they need something which does not inconvenience their users, is available to all their users, which doesn't cost too much, which doesn't span jurisdictional boundaries, which they can understand, which they feel they have some control over... |
186,297 | Is it a good practice, or is it obsolete? I'm asking because I've never managed to remember a single security question, thus I always write down the answers. I think they are useless, long passwords or 2FA is a much better practice. | 2018/05/22 | [
"https://security.stackexchange.com/questions/186297",
"https://security.stackexchange.com",
"https://security.stackexchange.com/users/178684/"
] | The inherent contradiction of security questions
================================================
For a security question ot be good, it must:
1. Have one definitive unambigious answer that the user would never forget...
2. ...but is secret and hard to guess for everybody else.
The problem is that the higher you score on #1, the lower you score on #2. So you have to walk a tight rope here. If you lean to far towards #1, users will forget the answer and brick their accounts. If you lean to far towards #2, anyone can guess the answer and the question becomes essentially useless.
There probably is no sweet spot here. So should we just ditch the whole concept?
Well, it depends.
When and how to use them
========================
Security questions can be used in many ways.
Let's start with a very bad way to use them - as the only protection for account recovery and password reset. The answer to the question basically becomes a second password that is both easier to crack and guess than the first. That's just spectacularly bad. If you don't believe me, ask [Sarah Palin](https://en.wikipedia.org/wiki/Sarah_Palin_email_hack).
That usage pattern is probably what have given security quesitons their bad name. But is there actually some other legitimate use case for them? Maybe. How about this:
1. As a poor mans 2FA for login or sensitive actions.
2. As a check before sending password reset emails.
In both cases, a determined attacker could find the right answers. But not all attackers are determined. A simple security question could make large scale automated attacks after big data breaches impractical. If I have a million passwords from site A, I can't just test them on site B if B also requires a security question. Or if I breach an email provider, I can't send a million password reset links from all sorts of sites, because I don't know the answer to the security questions.
The backside here is the contradiciton discussed above - the less obvious the answer to the security question is, the more likely users are to brick their account by mistake. There are better solutions here, like real 2FA or account recovery codes. But implementing 2FA can be hard, and so is getting your users to actually print and store those pesky recovery codes. So sometimes, for pragmatic reasons, a security question might a good compromise.
That is the best case I can make for them. I'm not sure if it's a good enough case to actually ever use them.
TL;DR
=====
* It's hard to construct good security questions, because the harder the answer is to guess, the harder it is to remember.
* Still, security questions could be a useful complement to other efforts to protect against dumb automated attacks if you don't have the resources to implement better solutions, such as 2FA. | In a surprising number of applications a password + security question is considered 2 factor authentication. The idea is that its something you know whereas a password is expected to be something you will remember (I write passwords down too - but in an appropriately encrypted database!).
Yes, there are much better solutions - but the web developers of the world are not standing by waiting to write the perfect authentication mechanism to be used by readers of this website. There are lots of ways to complement (or improve on) password authentication, but they need something which does not inconvenience their users, is available to all their users, which doesn't cost too much, which doesn't span jurisdictional boundaries, which they can understand, which they feel they have some control over... |
186,297 | Is it a good practice, or is it obsolete? I'm asking because I've never managed to remember a single security question, thus I always write down the answers. I think they are useless, long passwords or 2FA is a much better practice. | 2018/05/22 | [
"https://security.stackexchange.com/questions/186297",
"https://security.stackexchange.com",
"https://security.stackexchange.com/users/178684/"
] | Security questions are a terrible idea.
* There are no "best practices" like there are for passwords: a password should be hard to guess, long enough, etc. Are security questions any of that? By design, they are the opposite of secure: easy to guess, guessable using a dictionary attack or a list of last names, etc.
* You may not want to let people access your account that know the answer to your security questions (my uncle knows my mother's maiden name, but I don't want them to access accounts of mine).
* Anyone who knows the answer can become a target. To learn your first pet's name or your mother's maiden name, an attacker doesn't need to trick you to figure it out, they can trick it out of your grandma (or a bunch of other people) instead.
* There are common answers. "Favorite food" was the question which I guessed for some people of whom I absolutely did not know their favorite food. Pet names and most other questions fit a nice probability curve.
* You know the data format you're looking for: a mother's maiden name won't have an exclamation mark in the middle or be written in l33tsp3ak to make it harder to guess.
* As a user, I needed my security question once and actually forgot my answer because it had been a few years. My favorite food had changed and I don't know what I put in there a decade ago. My password, on the other hand, I typically remember because I use it every time I log in. If I haven't logged in for a while, I don't know the password but definitely not the security question.
So not only are they insecure, they also don't reach their goal. Don't use secret questions, almost literally *anything* else is better. | In a surprising number of applications a password + security question is considered 2 factor authentication. The idea is that its something you know whereas a password is expected to be something you will remember (I write passwords down too - but in an appropriately encrypted database!).
Yes, there are much better solutions - but the web developers of the world are not standing by waiting to write the perfect authentication mechanism to be used by readers of this website. There are lots of ways to complement (or improve on) password authentication, but they need something which does not inconvenience their users, is available to all their users, which doesn't cost too much, which doesn't span jurisdictional boundaries, which they can understand, which they feel they have some control over... |
186,297 | Is it a good practice, or is it obsolete? I'm asking because I've never managed to remember a single security question, thus I always write down the answers. I think they are useless, long passwords or 2FA is a much better practice. | 2018/05/22 | [
"https://security.stackexchange.com/questions/186297",
"https://security.stackexchange.com",
"https://security.stackexchange.com/users/178684/"
] | The inherent contradiction of security questions
================================================
For a security question ot be good, it must:
1. Have one definitive unambigious answer that the user would never forget...
2. ...but is secret and hard to guess for everybody else.
The problem is that the higher you score on #1, the lower you score on #2. So you have to walk a tight rope here. If you lean to far towards #1, users will forget the answer and brick their accounts. If you lean to far towards #2, anyone can guess the answer and the question becomes essentially useless.
There probably is no sweet spot here. So should we just ditch the whole concept?
Well, it depends.
When and how to use them
========================
Security questions can be used in many ways.
Let's start with a very bad way to use them - as the only protection for account recovery and password reset. The answer to the question basically becomes a second password that is both easier to crack and guess than the first. That's just spectacularly bad. If you don't believe me, ask [Sarah Palin](https://en.wikipedia.org/wiki/Sarah_Palin_email_hack).
That usage pattern is probably what have given security quesitons their bad name. But is there actually some other legitimate use case for them? Maybe. How about this:
1. As a poor mans 2FA for login or sensitive actions.
2. As a check before sending password reset emails.
In both cases, a determined attacker could find the right answers. But not all attackers are determined. A simple security question could make large scale automated attacks after big data breaches impractical. If I have a million passwords from site A, I can't just test them on site B if B also requires a security question. Or if I breach an email provider, I can't send a million password reset links from all sorts of sites, because I don't know the answer to the security questions.
The backside here is the contradiciton discussed above - the less obvious the answer to the security question is, the more likely users are to brick their account by mistake. There are better solutions here, like real 2FA or account recovery codes. But implementing 2FA can be hard, and so is getting your users to actually print and store those pesky recovery codes. So sometimes, for pragmatic reasons, a security question might a good compromise.
That is the best case I can make for them. I'm not sure if it's a good enough case to actually ever use them.
TL;DR
=====
* It's hard to construct good security questions, because the harder the answer is to guess, the harder it is to remember.
* Still, security questions could be a useful complement to other efforts to protect against dumb automated attacks if you don't have the resources to implement better solutions, such as 2FA. | As you can see from other answers on the same topic (searching for "security question" here returns several related questions), traditional security questions like "What's your mother's maiden name?" are now considered very bad practice.
Some websites, instead of traditional security questions, will ask for your phone number or an alternate email address. They might also regularly remind you to check if your profile info is up-to-date, to make sure you still use the email associated with your account, etc. Another way to check your identity might be to ask you questions about how you have been using the service, what private data the service is storing about you, etc. I'm not sure of all the things Google can actually ask you, but I'm pretty sure they can ask you the approximate date when you created your account, or the name of the city where you usually log in.
I still think that security questions can sometimes be useful as additional info, as long as you let the users write their own questions, maybe along with a *clear* and *huge* warning saying that they must not choose questions that can be answered easily by anybody else. But those security questions should not be an easy way to bypass the password login anyway. They should only be used as an exceptional way to help prove the user's identity, and the process should not be automated (a non-automated process might involve a phone call, for example). |
186,297 | Is it a good practice, or is it obsolete? I'm asking because I've never managed to remember a single security question, thus I always write down the answers. I think they are useless, long passwords or 2FA is a much better practice. | 2018/05/22 | [
"https://security.stackexchange.com/questions/186297",
"https://security.stackexchange.com",
"https://security.stackexchange.com/users/178684/"
] | Security questions are a terrible idea.
* There are no "best practices" like there are for passwords: a password should be hard to guess, long enough, etc. Are security questions any of that? By design, they are the opposite of secure: easy to guess, guessable using a dictionary attack or a list of last names, etc.
* You may not want to let people access your account that know the answer to your security questions (my uncle knows my mother's maiden name, but I don't want them to access accounts of mine).
* Anyone who knows the answer can become a target. To learn your first pet's name or your mother's maiden name, an attacker doesn't need to trick you to figure it out, they can trick it out of your grandma (or a bunch of other people) instead.
* There are common answers. "Favorite food" was the question which I guessed for some people of whom I absolutely did not know their favorite food. Pet names and most other questions fit a nice probability curve.
* You know the data format you're looking for: a mother's maiden name won't have an exclamation mark in the middle or be written in l33tsp3ak to make it harder to guess.
* As a user, I needed my security question once and actually forgot my answer because it had been a few years. My favorite food had changed and I don't know what I put in there a decade ago. My password, on the other hand, I typically remember because I use it every time I log in. If I haven't logged in for a while, I don't know the password but definitely not the security question.
So not only are they insecure, they also don't reach their goal. Don't use secret questions, almost literally *anything* else is better. | As you can see from other answers on the same topic (searching for "security question" here returns several related questions), traditional security questions like "What's your mother's maiden name?" are now considered very bad practice.
Some websites, instead of traditional security questions, will ask for your phone number or an alternate email address. They might also regularly remind you to check if your profile info is up-to-date, to make sure you still use the email associated with your account, etc. Another way to check your identity might be to ask you questions about how you have been using the service, what private data the service is storing about you, etc. I'm not sure of all the things Google can actually ask you, but I'm pretty sure they can ask you the approximate date when you created your account, or the name of the city where you usually log in.
I still think that security questions can sometimes be useful as additional info, as long as you let the users write their own questions, maybe along with a *clear* and *huge* warning saying that they must not choose questions that can be answered easily by anybody else. But those security questions should not be an easy way to bypass the password login anyway. They should only be used as an exceptional way to help prove the user's identity, and the process should not be automated (a non-automated process might involve a phone call, for example). |
186,297 | Is it a good practice, or is it obsolete? I'm asking because I've never managed to remember a single security question, thus I always write down the answers. I think they are useless, long passwords or 2FA is a much better practice. | 2018/05/22 | [
"https://security.stackexchange.com/questions/186297",
"https://security.stackexchange.com",
"https://security.stackexchange.com/users/178684/"
] | The inherent contradiction of security questions
================================================
For a security question ot be good, it must:
1. Have one definitive unambigious answer that the user would never forget...
2. ...but is secret and hard to guess for everybody else.
The problem is that the higher you score on #1, the lower you score on #2. So you have to walk a tight rope here. If you lean to far towards #1, users will forget the answer and brick their accounts. If you lean to far towards #2, anyone can guess the answer and the question becomes essentially useless.
There probably is no sweet spot here. So should we just ditch the whole concept?
Well, it depends.
When and how to use them
========================
Security questions can be used in many ways.
Let's start with a very bad way to use them - as the only protection for account recovery and password reset. The answer to the question basically becomes a second password that is both easier to crack and guess than the first. That's just spectacularly bad. If you don't believe me, ask [Sarah Palin](https://en.wikipedia.org/wiki/Sarah_Palin_email_hack).
That usage pattern is probably what have given security quesitons their bad name. But is there actually some other legitimate use case for them? Maybe. How about this:
1. As a poor mans 2FA for login or sensitive actions.
2. As a check before sending password reset emails.
In both cases, a determined attacker could find the right answers. But not all attackers are determined. A simple security question could make large scale automated attacks after big data breaches impractical. If I have a million passwords from site A, I can't just test them on site B if B also requires a security question. Or if I breach an email provider, I can't send a million password reset links from all sorts of sites, because I don't know the answer to the security questions.
The backside here is the contradiciton discussed above - the less obvious the answer to the security question is, the more likely users are to brick their account by mistake. There are better solutions here, like real 2FA or account recovery codes. But implementing 2FA can be hard, and so is getting your users to actually print and store those pesky recovery codes. So sometimes, for pragmatic reasons, a security question might a good compromise.
That is the best case I can make for them. I'm not sure if it's a good enough case to actually ever use them.
TL;DR
=====
* It's hard to construct good security questions, because the harder the answer is to guess, the harder it is to remember.
* Still, security questions could be a useful complement to other efforts to protect against dumb automated attacks if you don't have the resources to implement better solutions, such as 2FA. | It's better than *no* second-factor, but current 2FA standards recommend
1. something you know
2. something you have
A lot of banks use security questions or image-recognition because it's thought to provide an anti-phish protection, where once you are accustomed to seeing your image/ answering your security question, **you** will notice its absence.
This can of course be defeated by having the phishing site forward the username you enter, retrieve the question/image, and display it to you, but that's beyond what most phishing campaigns will do.
tl;dr Security questions are not good if used as *client-verification*, but they can be useful as *server-verification*, so that you can be reasonably sure the site you are logging into is the actual site.
This doesn't apply if the site makes you select the security question each time, but that's not what any banks I've seen using SQs do. |
186,297 | Is it a good practice, or is it obsolete? I'm asking because I've never managed to remember a single security question, thus I always write down the answers. I think they are useless, long passwords or 2FA is a much better practice. | 2018/05/22 | [
"https://security.stackexchange.com/questions/186297",
"https://security.stackexchange.com",
"https://security.stackexchange.com/users/178684/"
] | Security questions are a terrible idea.
* There are no "best practices" like there are for passwords: a password should be hard to guess, long enough, etc. Are security questions any of that? By design, they are the opposite of secure: easy to guess, guessable using a dictionary attack or a list of last names, etc.
* You may not want to let people access your account that know the answer to your security questions (my uncle knows my mother's maiden name, but I don't want them to access accounts of mine).
* Anyone who knows the answer can become a target. To learn your first pet's name or your mother's maiden name, an attacker doesn't need to trick you to figure it out, they can trick it out of your grandma (or a bunch of other people) instead.
* There are common answers. "Favorite food" was the question which I guessed for some people of whom I absolutely did not know their favorite food. Pet names and most other questions fit a nice probability curve.
* You know the data format you're looking for: a mother's maiden name won't have an exclamation mark in the middle or be written in l33tsp3ak to make it harder to guess.
* As a user, I needed my security question once and actually forgot my answer because it had been a few years. My favorite food had changed and I don't know what I put in there a decade ago. My password, on the other hand, I typically remember because I use it every time I log in. If I haven't logged in for a while, I don't know the password but definitely not the security question.
So not only are they insecure, they also don't reach their goal. Don't use secret questions, almost literally *anything* else is better. | It's better than *no* second-factor, but current 2FA standards recommend
1. something you know
2. something you have
A lot of banks use security questions or image-recognition because it's thought to provide an anti-phish protection, where once you are accustomed to seeing your image/ answering your security question, **you** will notice its absence.
This can of course be defeated by having the phishing site forward the username you enter, retrieve the question/image, and display it to you, but that's beyond what most phishing campaigns will do.
tl;dr Security questions are not good if used as *client-verification*, but they can be useful as *server-verification*, so that you can be reasonably sure the site you are logging into is the actual site.
This doesn't apply if the site makes you select the security question each time, but that's not what any banks I've seen using SQs do. |
186,297 | Is it a good practice, or is it obsolete? I'm asking because I've never managed to remember a single security question, thus I always write down the answers. I think they are useless, long passwords or 2FA is a much better practice. | 2018/05/22 | [
"https://security.stackexchange.com/questions/186297",
"https://security.stackexchange.com",
"https://security.stackexchange.com/users/178684/"
] | The inherent contradiction of security questions
================================================
For a security question ot be good, it must:
1. Have one definitive unambigious answer that the user would never forget...
2. ...but is secret and hard to guess for everybody else.
The problem is that the higher you score on #1, the lower you score on #2. So you have to walk a tight rope here. If you lean to far towards #1, users will forget the answer and brick their accounts. If you lean to far towards #2, anyone can guess the answer and the question becomes essentially useless.
There probably is no sweet spot here. So should we just ditch the whole concept?
Well, it depends.
When and how to use them
========================
Security questions can be used in many ways.
Let's start with a very bad way to use them - as the only protection for account recovery and password reset. The answer to the question basically becomes a second password that is both easier to crack and guess than the first. That's just spectacularly bad. If you don't believe me, ask [Sarah Palin](https://en.wikipedia.org/wiki/Sarah_Palin_email_hack).
That usage pattern is probably what have given security quesitons their bad name. But is there actually some other legitimate use case for them? Maybe. How about this:
1. As a poor mans 2FA for login or sensitive actions.
2. As a check before sending password reset emails.
In both cases, a determined attacker could find the right answers. But not all attackers are determined. A simple security question could make large scale automated attacks after big data breaches impractical. If I have a million passwords from site A, I can't just test them on site B if B also requires a security question. Or if I breach an email provider, I can't send a million password reset links from all sorts of sites, because I don't know the answer to the security questions.
The backside here is the contradiciton discussed above - the less obvious the answer to the security question is, the more likely users are to brick their account by mistake. There are better solutions here, like real 2FA or account recovery codes. But implementing 2FA can be hard, and so is getting your users to actually print and store those pesky recovery codes. So sometimes, for pragmatic reasons, a security question might a good compromise.
That is the best case I can make for them. I'm not sure if it's a good enough case to actually ever use them.
TL;DR
=====
* It's hard to construct good security questions, because the harder the answer is to guess, the harder it is to remember.
* Still, security questions could be a useful complement to other efforts to protect against dumb automated attacks if you don't have the resources to implement better solutions, such as 2FA. | Security questions are a terrible idea.
* There are no "best practices" like there are for passwords: a password should be hard to guess, long enough, etc. Are security questions any of that? By design, they are the opposite of secure: easy to guess, guessable using a dictionary attack or a list of last names, etc.
* You may not want to let people access your account that know the answer to your security questions (my uncle knows my mother's maiden name, but I don't want them to access accounts of mine).
* Anyone who knows the answer can become a target. To learn your first pet's name or your mother's maiden name, an attacker doesn't need to trick you to figure it out, they can trick it out of your grandma (or a bunch of other people) instead.
* There are common answers. "Favorite food" was the question which I guessed for some people of whom I absolutely did not know their favorite food. Pet names and most other questions fit a nice probability curve.
* You know the data format you're looking for: a mother's maiden name won't have an exclamation mark in the middle or be written in l33tsp3ak to make it harder to guess.
* As a user, I needed my security question once and actually forgot my answer because it had been a few years. My favorite food had changed and I don't know what I put in there a decade ago. My password, on the other hand, I typically remember because I use it every time I log in. If I haven't logged in for a while, I don't know the password but definitely not the security question.
So not only are they insecure, they also don't reach their goal. Don't use secret questions, almost literally *anything* else is better. |
37,372,466 | I want to change default values which gets populated in the below picture.
[](https://i.stack.imgur.com/2rPwV.png)
I tried modifying get\_v\_role method but it didn't serve my purpose.
Please help. | 2016/05/22 | [
"https://Stackoverflow.com/questions/37372466",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/2911595/"
] | In personalize->personalize settings, there is sort option. It sometimes overwrites this arrangement of values of get\_v method.
Also code can be written in inbound plug of this view. I did it for overview page drop down and it worked. You can try for your search page. | For filtering/changing drop-down value of search parameter, You've to Re-define GET\_DQUERY\_DEFINITIONS method of ZCL\_XXX\_IMPL class of component. GET\_V\_XX methods are only used to modify drop-down/F4 help of view pages not the search view.
**STEPS:**
1. Click F2 while placing the cursor on Account ID(for which parameter you want
to modify) drop-down.
2. Go to BSP Component using t-code - BSP\_WD\_CMPWB
3. Enter the component name and Enhancement set
4. Select the view.
[](https://i.stack.imgur.com/XfY2r.jpg)
5. Go to Implementation class .
[](https://i.stack.imgur.com/3wH35.jpg)
If your component is enhanced then it will be having ZCL\_XXX\_IMPL class. otherwise you've to enhance that component. Click on that class.
6. After that find GET\_DQUERY\_DEFINITIONS method and implement same way as
GET\_V\_XXX. |
428,184 | I want to make it so that there is the text "Display 1" at the top right corner of the secondary display on my computer regardless of the number of applications I have open. No matter how I move the windows open or drag them around, the text "Display 1" will always be there. Though I can customize the text to show some other text.
Is there any application that allows me to do this? I want to use it in a presentation I want to give involving multiple applications running. | 2012/05/24 | [
"https://superuser.com/questions/428184",
"https://superuser.com",
"https://superuser.com/users/135931/"
] | If you went to all the effort of getting a brand-new Graphics card, why waste all the potential with a sub-par power supply?
I recently upgraded my Graphics card to one that required more power, but forgot to check the voltage of my PSU. I instantly started experiencing freeze-ups and BSODs whenever I tried to do anything significant (past web-browsing), which went away when i installed a higher-capacity PSU.
I wouldn't try it, it's not worth it if you can't utilise the card anyway. Go and get a new PSU | This really depends on things like the efficiency of the power supply and how much stuff you have in your computer.
If you are running a relatively bare bones system without a ton of bells and whistles then you would most likely be okay.
That being said you should be fine, the worst that is likely to happen is some system instability if you do demanding things that require more power than the PSU can supply.
BSOD and the like.
So I would try it and if it works then huzzah! |
428,184 | I want to make it so that there is the text "Display 1" at the top right corner of the secondary display on my computer regardless of the number of applications I have open. No matter how I move the windows open or drag them around, the text "Display 1" will always be there. Though I can customize the text to show some other text.
Is there any application that allows me to do this? I want to use it in a presentation I want to give involving multiple applications running. | 2012/05/24 | [
"https://superuser.com/questions/428184",
"https://superuser.com",
"https://superuser.com/users/135931/"
] | This really depends on things like the efficiency of the power supply and how much stuff you have in your computer.
If you are running a relatively bare bones system without a ton of bells and whistles then you would most likely be okay.
That being said you should be fine, the worst that is likely to happen is some system instability if you do demanding things that require more power than the PSU can supply.
BSOD and the like.
So I would try it and if it works then huzzah! | There is no such thing as a minimum PSU requirement for a video card. The only spec that counts is a certain amount of current (number of amps) that will be drawn from the +12V rail. The required power supply depends on the total power used by the video card, CPU, chipset, drives, and other components. And even there, the total rating of the PSU is pretty worthless, you need to check the current provided on each power rail.
Whether you have a 130W Bloomfield processor vs a 65W Deneb or Sandy Bridge is likely going to determine whether you need to upgrade the PSU. |
428,184 | I want to make it so that there is the text "Display 1" at the top right corner of the secondary display on my computer regardless of the number of applications I have open. No matter how I move the windows open or drag them around, the text "Display 1" will always be there. Though I can customize the text to show some other text.
Is there any application that allows me to do this? I want to use it in a presentation I want to give involving multiple applications running. | 2012/05/24 | [
"https://superuser.com/questions/428184",
"https://superuser.com",
"https://superuser.com/users/135931/"
] | If you went to all the effort of getting a brand-new Graphics card, why waste all the potential with a sub-par power supply?
I recently upgraded my Graphics card to one that required more power, but forgot to check the voltage of my PSU. I instantly started experiencing freeze-ups and BSODs whenever I tried to do anything significant (past web-browsing), which went away when i installed a higher-capacity PSU.
I wouldn't try it, it's not worth it if you can't utilise the card anyway. Go and get a new PSU | There is no such thing as a minimum PSU requirement for a video card. The only spec that counts is a certain amount of current (number of amps) that will be drawn from the +12V rail. The required power supply depends on the total power used by the video card, CPU, chipset, drives, and other components. And even there, the total rating of the PSU is pretty worthless, you need to check the current provided on each power rail.
Whether you have a 130W Bloomfield processor vs a 65W Deneb or Sandy Bridge is likely going to determine whether you need to upgrade the PSU. |
205,521 | So I have just begun with world-building, and this is my first map. As you can see on the map, a small range of mountains splits from the main mountains. What I wish to have is a long river that goes from North to South, but that mountain range can be an issue (I'm not sure if it is).
The river that I have drawn goes from Night Lake in the New Mountains and end near the delta in Fiin Sea. Is it possible that a river can travel in such a way?
[](https://i.stack.imgur.com/g8ZNa.jpg)
PS I know my drawing skills are horrible | 2021/06/13 | [
"https://worldbuilding.stackexchange.com/questions/205521",
"https://worldbuilding.stackexchange.com",
"https://worldbuilding.stackexchange.com/users/81361/"
] | **Rivers can pass through mountain ranges**
Mostly they carve out a path over many, many years. Their erosive properties can make underground rivers as well. Though going straight through a large existing mountain range is more difficult. Possibly porous rock and weaker sediments allowed (over time) to create underground rivers, which eventually caused collapses and the river taking much of the debris with it over time. This can be aided by water flow down the mountain itself. Again, this is a slow process, likely making your mountains much less sharp. More like old rounded Caledonides in Norway than the young sharp Himalayas of just a few million years old.
It is also possible that the river was already there when the mountains formed. During the process of rising the river might've been waylaid several times, but kept eroding the rising ground.
You might even show this by an existing, or previously existing lake(s) just before the mountains as the flow of water was regularly reduced at the mountain. If the area has active tectonics the mountains can also still look young. | Many mountain ranges throughout the world have gaps between mountain ranges where rivers flow. The gap may be the result of a major geological fault or due to stream erosion. Do the same. |
205,521 | So I have just begun with world-building, and this is my first map. As you can see on the map, a small range of mountains splits from the main mountains. What I wish to have is a long river that goes from North to South, but that mountain range can be an issue (I'm not sure if it is).
The river that I have drawn goes from Night Lake in the New Mountains and end near the delta in Fiin Sea. Is it possible that a river can travel in such a way?
[](https://i.stack.imgur.com/g8ZNa.jpg)
PS I know my drawing skills are horrible | 2021/06/13 | [
"https://worldbuilding.stackexchange.com/questions/205521",
"https://worldbuilding.stackexchange.com",
"https://worldbuilding.stackexchange.com/users/81361/"
] | Downstream must always be downhill.
The flatland north of the mountains could be a high plateau, such that the mountains are steeper but (in the passes) not actually higher.
Or the gap between individual mountains could be no higher than the flatlands. That's pretty rare, but possible with cinder-cone volcanos.
Or the river could flow through a canyon, possibly because the river predates the upthrust of the mountains.
All of these are rare. This is generally not something you'd expect to see. | Many mountain ranges throughout the world have gaps between mountain ranges where rivers flow. The gap may be the result of a major geological fault or due to stream erosion. Do the same. |
205,521 | So I have just begun with world-building, and this is my first map. As you can see on the map, a small range of mountains splits from the main mountains. What I wish to have is a long river that goes from North to South, but that mountain range can be an issue (I'm not sure if it is).
The river that I have drawn goes from Night Lake in the New Mountains and end near the delta in Fiin Sea. Is it possible that a river can travel in such a way?
[](https://i.stack.imgur.com/g8ZNa.jpg)
PS I know my drawing skills are horrible | 2021/06/13 | [
"https://worldbuilding.stackexchange.com/questions/205521",
"https://worldbuilding.stackexchange.com",
"https://worldbuilding.stackexchange.com/users/81361/"
] | Meet the real world analogy of what you're asking for, the Danube:
[](https://i.stack.imgur.com/YsqCS.png)
At this point it's kind of pointless to ask or debate if it's possible because, well, there it is. | Many mountain ranges throughout the world have gaps between mountain ranges where rivers flow. The gap may be the result of a major geological fault or due to stream erosion. Do the same. |
205,521 | So I have just begun with world-building, and this is my first map. As you can see on the map, a small range of mountains splits from the main mountains. What I wish to have is a long river that goes from North to South, but that mountain range can be an issue (I'm not sure if it is).
The river that I have drawn goes from Night Lake in the New Mountains and end near the delta in Fiin Sea. Is it possible that a river can travel in such a way?
[](https://i.stack.imgur.com/g8ZNa.jpg)
PS I know my drawing skills are horrible | 2021/06/13 | [
"https://worldbuilding.stackexchange.com/questions/205521",
"https://worldbuilding.stackexchange.com",
"https://worldbuilding.stackexchange.com/users/81361/"
] | **Rivers can pass through mountain ranges**
Mostly they carve out a path over many, many years. Their erosive properties can make underground rivers as well. Though going straight through a large existing mountain range is more difficult. Possibly porous rock and weaker sediments allowed (over time) to create underground rivers, which eventually caused collapses and the river taking much of the debris with it over time. This can be aided by water flow down the mountain itself. Again, this is a slow process, likely making your mountains much less sharp. More like old rounded Caledonides in Norway than the young sharp Himalayas of just a few million years old.
It is also possible that the river was already there when the mountains formed. During the process of rising the river might've been waylaid several times, but kept eroding the rising ground.
You might even show this by an existing, or previously existing lake(s) just before the mountains as the flow of water was regularly reduced at the mountain. If the area has active tectonics the mountains can also still look young. | Downstream must always be downhill.
The flatland north of the mountains could be a high plateau, such that the mountains are steeper but (in the passes) not actually higher.
Or the gap between individual mountains could be no higher than the flatlands. That's pretty rare, but possible with cinder-cone volcanos.
Or the river could flow through a canyon, possibly because the river predates the upthrust of the mountains.
All of these are rare. This is generally not something you'd expect to see. |
205,521 | So I have just begun with world-building, and this is my first map. As you can see on the map, a small range of mountains splits from the main mountains. What I wish to have is a long river that goes from North to South, but that mountain range can be an issue (I'm not sure if it is).
The river that I have drawn goes from Night Lake in the New Mountains and end near the delta in Fiin Sea. Is it possible that a river can travel in such a way?
[](https://i.stack.imgur.com/g8ZNa.jpg)
PS I know my drawing skills are horrible | 2021/06/13 | [
"https://worldbuilding.stackexchange.com/questions/205521",
"https://worldbuilding.stackexchange.com",
"https://worldbuilding.stackexchange.com/users/81361/"
] | **Rivers can pass through mountain ranges**
Mostly they carve out a path over many, many years. Their erosive properties can make underground rivers as well. Though going straight through a large existing mountain range is more difficult. Possibly porous rock and weaker sediments allowed (over time) to create underground rivers, which eventually caused collapses and the river taking much of the debris with it over time. This can be aided by water flow down the mountain itself. Again, this is a slow process, likely making your mountains much less sharp. More like old rounded Caledonides in Norway than the young sharp Himalayas of just a few million years old.
It is also possible that the river was already there when the mountains formed. During the process of rising the river might've been waylaid several times, but kept eroding the rising ground.
You might even show this by an existing, or previously existing lake(s) just before the mountains as the flow of water was regularly reduced at the mountain. If the area has active tectonics the mountains can also still look young. | Meet the real world analogy of what you're asking for, the Danube:
[](https://i.stack.imgur.com/YsqCS.png)
At this point it's kind of pointless to ask or debate if it's possible because, well, there it is. |
804,300 | I've browsed this site for a while but never had a need to ask a question until now, so here goes. I have a network setup question that I'm hoping the community can shed some light on. There is an effort in our office space to overhaul the network setup. We are an independent company in a shared office space with a few other independent companies. The office space provider has a redundant, fat internet pipe that will be shared with the groups in the space. They are setting this up by giving each group it's own VLAN which they will administer for each of us. We want to ensure our data and resources are protected, but that we can still access our network remotely so the VLAN as security doesn't work for us. What are the best options for this type of setup and maintaining our security? We hoping they'd split out the traffic in a DMZ for each company to a private network, but this doesn't seem to be an option. I read this post: [How do VLANs work?](https://serverfault.com/questions/188350/how-do-vlans-work/188419#188419) on VLANs as it seemed to be a similar setup in a hypothetical problem, and followed up reading this: [How many VLANs are too few and too many?](https://serverfault.com/questions/63683/how-many-vlans-are-too-few-and-too-many/63763#63763) which were helpful and confirmed our concerns with VLANs. What we're still looking for is if there is a good setup for this shared pipe which allows us to control our own company security.
Thanks in advance. | 2016/09/20 | [
"https://serverfault.com/questions/804300",
"https://serverfault.com",
"https://serverfault.com/users/376774/"
] | One reason why people discourage the use of VLANs for security is that there have been some attacks which allow for VLAN hopping, due to misconfigurations of the switches.
The VLAN hopping attacks that exist all depend on a few factors:
* The switch speaks some kind of trunk protocol to you, allowing you to "register" for a different VLAN. This should never occur on a customer port.
* The port is a tagged port, and the switch isn't protected against double tagged packets. This is only an issue if you have users on VLAN-tagged portst. Even then, it's only an issue if you allow untagged packets on trunk ports between switches which you shouldn't.
The "packets travel on the same wire" reasoning is valid, if the attacker has access to the physical wire in question. If that's the case, you have a lot bigger problems than what VLANs can solve.
So basically you can use VLANs as a security measure, but make sure that you never, ever speak VLAN tags with other users of that network, and do keep track of which switch features are enabled on ports facing such entities.
To make sure that your network is secure you can perform [network security testing](https://www.ixiacom.com/products/breakingpoint) with tools like Ixia's BreakingPoint.
You can simulate your traffic and validate your infrastructure, inject security attacks and malware into that traffic and test the resiliency of your security infrastructure. | I don't think there is a "good" setup that you can have in a unsecured office space. Someone can simply unplug a network cable and plug in and have access to your "stuff". I'll just say that you need to worry about the "worst people" not the accidental stuff. The answer is to setup one port that has a configured and plug it into a firewall of some type that you have full control of and secure it. Then on or behind the firewall you can setup your network and, remote access. |
804,300 | I've browsed this site for a while but never had a need to ask a question until now, so here goes. I have a network setup question that I'm hoping the community can shed some light on. There is an effort in our office space to overhaul the network setup. We are an independent company in a shared office space with a few other independent companies. The office space provider has a redundant, fat internet pipe that will be shared with the groups in the space. They are setting this up by giving each group it's own VLAN which they will administer for each of us. We want to ensure our data and resources are protected, but that we can still access our network remotely so the VLAN as security doesn't work for us. What are the best options for this type of setup and maintaining our security? We hoping they'd split out the traffic in a DMZ for each company to a private network, but this doesn't seem to be an option. I read this post: [How do VLANs work?](https://serverfault.com/questions/188350/how-do-vlans-work/188419#188419) on VLANs as it seemed to be a similar setup in a hypothetical problem, and followed up reading this: [How many VLANs are too few and too many?](https://serverfault.com/questions/63683/how-many-vlans-are-too-few-and-too-many/63763#63763) which were helpful and confirmed our concerns with VLANs. What we're still looking for is if there is a good setup for this shared pipe which allows us to control our own company security.
Thanks in advance. | 2016/09/20 | [
"https://serverfault.com/questions/804300",
"https://serverfault.com",
"https://serverfault.com/users/376774/"
] | One reason why people discourage the use of VLANs for security is that there have been some attacks which allow for VLAN hopping, due to misconfigurations of the switches.
The VLAN hopping attacks that exist all depend on a few factors:
* The switch speaks some kind of trunk protocol to you, allowing you to "register" for a different VLAN. This should never occur on a customer port.
* The port is a tagged port, and the switch isn't protected against double tagged packets. This is only an issue if you have users on VLAN-tagged portst. Even then, it's only an issue if you allow untagged packets on trunk ports between switches which you shouldn't.
The "packets travel on the same wire" reasoning is valid, if the attacker has access to the physical wire in question. If that's the case, you have a lot bigger problems than what VLANs can solve.
So basically you can use VLANs as a security measure, but make sure that you never, ever speak VLAN tags with other users of that network, and do keep track of which switch features are enabled on ports facing such entities.
To make sure that your network is secure you can perform [network security testing](https://www.ixiacom.com/products/breakingpoint) with tools like Ixia's BreakingPoint.
You can simulate your traffic and validate your infrastructure, inject security attacks and malware into that traffic and test the resiliency of your security infrastructure. | I think that this all boils down to whether or not the provider what will be administrating the VLANs is capable (i.e. they know what they are doing) and trustworthy. If the network architecture has been properly designed, and the VLANs have been set up and secured properly, then VLANs should adequately separate network traffic in your shared office environment. You still will be able to use VPNs for remote network access if you use VLANs.
Rather than worry about the VLANs, I think that you should be more concerned about hardening security for local network. The following may seem like common sense for you but many people fail to cover the basics: for example, make sure that software firewalls are enabled on all your servers and clients and restrict service access only to sources that need it, keep anti-virus software up to date, and keep your servers/clients patched and up to date. A proxy server can help you authenticate users trying to access external networks and can perform simple web filtering. There are open source platforms that can help you detect unauthorized network access or analyze network traffic for intrusions or other anomalies.
The point is, VLANs should work just fine for you. Just make sure that your provider is doing a good job, and keep them accountable by asking for lots of documentation and asking lots of questions. Then do your part by making your local network as secure and safe as possible. |
61,469 | I have a B.Sc. in CS, but I want to further in the GIS (geographical information system) line. I am thinking I'd have to do some sort of post-graduate diploma in GIS, before I can go for a M.Sc., which is necessary to hit my mark, seemingly...
I need your guidance about this case.
Thank you very much | 2016/01/11 | [
"https://academia.stackexchange.com/questions/61469",
"https://academia.stackexchange.com",
"https://academia.stackexchange.com/users/47321/"
] | I can't comment with authority on your specific case, but some GIS masters courses may not assume much GIS-specific prior knowledge. You should probably have an interest in mapping, cartography or spatial data, and - since you are coming from a CS direction - in databases or spatial computing; but interest does not necessarily mean in-depth knowledge.
I think my advice would be "find a course that interests you, and discuss it with the person in charge of admissions". | Not necessarily...
Transition of CS students to other majors could be easier than the others in some cases. There are a great deal of ***computational*** projects within the science and engineering, could which be done, as well as possible, by the fellows who have deep ideas about the computation and implementation of simulated complex systems. As an example, I know a graduate of CS, who did changed his major to chemistry, to work on the simulation of an electro-chemical quantum reaction. He is really successful to handle the case, truly.
In such cases, one could assert that the target person might need to work hard, firstly, to construct the desired seminal background for collaboration in the new field, but this stuff is not often too tough for determined people, considerably; and the consequences would be noticeable, as the computational aspects of the project would be progressed.
So, if you are going to work on such computational subjects within your target field (GIS, or something), you better ***prepare a coherent SoP and assert on your goal within that. Then, your CS background would not be considered as an irrelevant background, but a to-the-point one, probably.***
Best |
18,754,911 | I found two kernel modules in /lib/modules folder, they are **mali.ko** and **ump.ko**, and I tried to google some information about it, unfortunately, I found nothing valuable information.
if you have worked on those two kernel modules, can you tell me what they are used for ?
thanks. | 2013/09/12 | [
"https://Stackoverflow.com/questions/18754911",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/2273587/"
] | The Mali GPU kernel device driver [mali.ko] handles:
* Access to the Mali GPU hardware
* Interrupt handling
* Low level memory management
The UMP kernel device driver [ump.ko] handles:
* Access to allocated UMP memory through a secure ID. This enables memory to be shared across different applications, drivers and hardware components to facilitate zero-copy operations.
* The physical adress information required to set up an MMU or MPU table.
{MMU= Memory Management Unit; MPU= Memory Protection Unit}
* A method to map UMP memory into CPU adress space, to enable reading and writing. | mali.ko : graphics processing unit for ARM ( <http://en.wikipedia.org/wiki/Mali_(GPU)> )
ump.ko : that I do not know |
78,049 | I don't understand expression
>
> **barking up a wrong tree**
>
>
>
Does it think about putting bark on tree or taking it off?
A person says
>
> you're barking up the wrong tree
>
>
>
and he means
>
> don't bother me
>
>
>
But what is it from?
Does he mean the bark is wrong kind for the tree?
Like "I am oak, take your pine bark!"
In Croation we say **the wall is closed** meaning you have the wrong wall, have to climb through another with window.
Is that how this means? | 2016/01/06 | [
"https://ell.stackexchange.com/questions/78049",
"https://ell.stackexchange.com",
"https://ell.stackexchange.com/users/26798/"
] | You have a hunting dog that helps you catch a wild animal. If it climbs up a tree, the dog is supposed to bark at the tree it climbed up. Imagine the situation where the dog is barking at a different (wrong) tree and you would be very disappointed at the dog.
1. It could mean as a dog:
>
> You are wasting your efforts and energy by pursuing the wrong path. In
> other words, you made the wrong choice.
>
>
>
2. As a tree:
>
> You are asking the wrong person. You have to ask somebody else. Leave me
> alone. I am not the tree you want.
>
>
>
The verb [**bark**](http://www.merriam-webster.com/dictionary/bark) means the following:
>
> to make the characteristic short loud cry of a dog.
>
>
>
It has nothing to do with the noun *bark*:
>
> the tough exterior covering of a woody root or stem.
>
>
>
[Merriam-Webster] | Although the other skin of a tree is referred to as it **bark**, this is not what is meant by
>
> Barking up the wrong tree.
>
>
>
When a dog **gives chase** to a cat(as an example), it will **bark** while it frantically runs after the cat.
The cat may **run up a tree** to escape, leaving the barking dog below.
If the dog gets confused, (s)he may bark at/up a **tree with no cat**.
This is **barking up the wrong tree**
Looking for something in the **wrong place** |
78,049 | I don't understand expression
>
> **barking up a wrong tree**
>
>
>
Does it think about putting bark on tree or taking it off?
A person says
>
> you're barking up the wrong tree
>
>
>
and he means
>
> don't bother me
>
>
>
But what is it from?
Does he mean the bark is wrong kind for the tree?
Like "I am oak, take your pine bark!"
In Croation we say **the wall is closed** meaning you have the wrong wall, have to climb through another with window.
Is that how this means? | 2016/01/06 | [
"https://ell.stackexchange.com/questions/78049",
"https://ell.stackexchange.com",
"https://ell.stackexchange.com/users/26798/"
] | Here is a dog who is **barking**:
[](https://i.stack.imgur.com/DKCY4.png)
["Drooker style dog"](https://commons.wikimedia.org/wiki/File:Drooker_style_dog.svg) by [Balthazar](https://commons.wikimedia.org/wiki/User:Balthazar), licensed [CC-BY-SA 3.0](https://creativecommons.org/licenses/by-sa/3.0/deed.en)
Here is a dog who is **barking up a tree**:
[](https://i.stack.imgur.com/0Egrw.jpg)
["Treeing Fiest"](https://commons.wikimedia.org/wiki/File:Unknown_dog_breed_treeing.jpg) by Scochran4, licensed [CC-BY 3.0](https://creativecommons.org/licenses/by/3.0/us/deed.en)
There is an animal in the tree that the dog wants to catch.
But what if the dog picked the wrong tree? (Maybe the animal jumped into a different tree and the dog didn't see. Maybe the dog didn't see which tree the animal climbed, and guessed wrong.) Then we could say that the dog is **barking up the wrong tree**.
When you ask someone for information, and they say, "You're barking up the wrong tree," it means, "I don't have the information you want."
This is metaphorically like the dog (you) trying to catch the animal (information) in the tree (person). The dog is barking up some tree, but the animal isn't in that tree. The animal is in a different tree. Similarly, you're looking for information from a person, but that person doesn't have the information. Someone else knows the information you want. | Although the other skin of a tree is referred to as it **bark**, this is not what is meant by
>
> Barking up the wrong tree.
>
>
>
When a dog **gives chase** to a cat(as an example), it will **bark** while it frantically runs after the cat.
The cat may **run up a tree** to escape, leaving the barking dog below.
If the dog gets confused, (s)he may bark at/up a **tree with no cat**.
This is **barking up the wrong tree**
Looking for something in the **wrong place** |
78,049 | I don't understand expression
>
> **barking up a wrong tree**
>
>
>
Does it think about putting bark on tree or taking it off?
A person says
>
> you're barking up the wrong tree
>
>
>
and he means
>
> don't bother me
>
>
>
But what is it from?
Does he mean the bark is wrong kind for the tree?
Like "I am oak, take your pine bark!"
In Croation we say **the wall is closed** meaning you have the wrong wall, have to climb through another with window.
Is that how this means? | 2016/01/06 | [
"https://ell.stackexchange.com/questions/78049",
"https://ell.stackexchange.com",
"https://ell.stackexchange.com/users/26798/"
] | You have a hunting dog that helps you catch a wild animal. If it climbs up a tree, the dog is supposed to bark at the tree it climbed up. Imagine the situation where the dog is barking at a different (wrong) tree and you would be very disappointed at the dog.
1. It could mean as a dog:
>
> You are wasting your efforts and energy by pursuing the wrong path. In
> other words, you made the wrong choice.
>
>
>
2. As a tree:
>
> You are asking the wrong person. You have to ask somebody else. Leave me
> alone. I am not the tree you want.
>
>
>
The verb [**bark**](http://www.merriam-webster.com/dictionary/bark) means the following:
>
> to make the characteristic short loud cry of a dog.
>
>
>
It has nothing to do with the noun *bark*:
>
> the tough exterior covering of a woody root or stem.
>
>
>
[Merriam-Webster] | This well-known phrase is an idiom, part of colloquial (AmE at least) speech, that means:
* you are investigating something/gathering information, and
* the action you're currently taking to find information will not help you, and
* you probably don't know this, so that's why someone is telling you this.
Contrived example:
>
> A: Hey Bob, I'm looking for Sally. (A thinks Bob knows where Sally is)
>
>
> B: You're barking up the wrong tree, my friend. She hasn't been around here for months. (A obviously is not aware that Sally hasn't been around for months)
>
>
>
If you ask someone for information, and they respond with "you are barking up the wrong tree", they are indirectly telling you that they have not been involved whatsoever in what you are asking. It's not quite equivalent to "don't bother me" - more like "don't bother me because I can't help you get what you want."
Another contrived example:
>
> Police officer: Sally said she talked to you at the restaurant, before she was murdered. What did she say to you?
>
>
> Suspect: You're barking up the wrong tree. I've never been at that restaurant.
>
>
> |
78,049 | I don't understand expression
>
> **barking up a wrong tree**
>
>
>
Does it think about putting bark on tree or taking it off?
A person says
>
> you're barking up the wrong tree
>
>
>
and he means
>
> don't bother me
>
>
>
But what is it from?
Does he mean the bark is wrong kind for the tree?
Like "I am oak, take your pine bark!"
In Croation we say **the wall is closed** meaning you have the wrong wall, have to climb through another with window.
Is that how this means? | 2016/01/06 | [
"https://ell.stackexchange.com/questions/78049",
"https://ell.stackexchange.com",
"https://ell.stackexchange.com/users/26798/"
] | You have a hunting dog that helps you catch a wild animal. If it climbs up a tree, the dog is supposed to bark at the tree it climbed up. Imagine the situation where the dog is barking at a different (wrong) tree and you would be very disappointed at the dog.
1. It could mean as a dog:
>
> You are wasting your efforts and energy by pursuing the wrong path. In
> other words, you made the wrong choice.
>
>
>
2. As a tree:
>
> You are asking the wrong person. You have to ask somebody else. Leave me
> alone. I am not the tree you want.
>
>
>
The verb [**bark**](http://www.merriam-webster.com/dictionary/bark) means the following:
>
> to make the characteristic short loud cry of a dog.
>
>
>
It has nothing to do with the noun *bark*:
>
> the tough exterior covering of a woody root or stem.
>
>
>
[Merriam-Webster] | Here is a dog who is **barking**:
[](https://i.stack.imgur.com/DKCY4.png)
["Drooker style dog"](https://commons.wikimedia.org/wiki/File:Drooker_style_dog.svg) by [Balthazar](https://commons.wikimedia.org/wiki/User:Balthazar), licensed [CC-BY-SA 3.0](https://creativecommons.org/licenses/by-sa/3.0/deed.en)
Here is a dog who is **barking up a tree**:
[](https://i.stack.imgur.com/0Egrw.jpg)
["Treeing Fiest"](https://commons.wikimedia.org/wiki/File:Unknown_dog_breed_treeing.jpg) by Scochran4, licensed [CC-BY 3.0](https://creativecommons.org/licenses/by/3.0/us/deed.en)
There is an animal in the tree that the dog wants to catch.
But what if the dog picked the wrong tree? (Maybe the animal jumped into a different tree and the dog didn't see. Maybe the dog didn't see which tree the animal climbed, and guessed wrong.) Then we could say that the dog is **barking up the wrong tree**.
When you ask someone for information, and they say, "You're barking up the wrong tree," it means, "I don't have the information you want."
This is metaphorically like the dog (you) trying to catch the animal (information) in the tree (person). The dog is barking up some tree, but the animal isn't in that tree. The animal is in a different tree. Similarly, you're looking for information from a person, but that person doesn't have the information. Someone else knows the information you want. |
78,049 | I don't understand expression
>
> **barking up a wrong tree**
>
>
>
Does it think about putting bark on tree or taking it off?
A person says
>
> you're barking up the wrong tree
>
>
>
and he means
>
> don't bother me
>
>
>
But what is it from?
Does he mean the bark is wrong kind for the tree?
Like "I am oak, take your pine bark!"
In Croation we say **the wall is closed** meaning you have the wrong wall, have to climb through another with window.
Is that how this means? | 2016/01/06 | [
"https://ell.stackexchange.com/questions/78049",
"https://ell.stackexchange.com",
"https://ell.stackexchange.com/users/26798/"
] | Here is a dog who is **barking**:
[](https://i.stack.imgur.com/DKCY4.png)
["Drooker style dog"](https://commons.wikimedia.org/wiki/File:Drooker_style_dog.svg) by [Balthazar](https://commons.wikimedia.org/wiki/User:Balthazar), licensed [CC-BY-SA 3.0](https://creativecommons.org/licenses/by-sa/3.0/deed.en)
Here is a dog who is **barking up a tree**:
[](https://i.stack.imgur.com/0Egrw.jpg)
["Treeing Fiest"](https://commons.wikimedia.org/wiki/File:Unknown_dog_breed_treeing.jpg) by Scochran4, licensed [CC-BY 3.0](https://creativecommons.org/licenses/by/3.0/us/deed.en)
There is an animal in the tree that the dog wants to catch.
But what if the dog picked the wrong tree? (Maybe the animal jumped into a different tree and the dog didn't see. Maybe the dog didn't see which tree the animal climbed, and guessed wrong.) Then we could say that the dog is **barking up the wrong tree**.
When you ask someone for information, and they say, "You're barking up the wrong tree," it means, "I don't have the information you want."
This is metaphorically like the dog (you) trying to catch the animal (information) in the tree (person). The dog is barking up some tree, but the animal isn't in that tree. The animal is in a different tree. Similarly, you're looking for information from a person, but that person doesn't have the information. Someone else knows the information you want. | This well-known phrase is an idiom, part of colloquial (AmE at least) speech, that means:
* you are investigating something/gathering information, and
* the action you're currently taking to find information will not help you, and
* you probably don't know this, so that's why someone is telling you this.
Contrived example:
>
> A: Hey Bob, I'm looking for Sally. (A thinks Bob knows where Sally is)
>
>
> B: You're barking up the wrong tree, my friend. She hasn't been around here for months. (A obviously is not aware that Sally hasn't been around for months)
>
>
>
If you ask someone for information, and they respond with "you are barking up the wrong tree", they are indirectly telling you that they have not been involved whatsoever in what you are asking. It's not quite equivalent to "don't bother me" - more like "don't bother me because I can't help you get what you want."
Another contrived example:
>
> Police officer: Sally said she talked to you at the restaurant, before she was murdered. What did she say to you?
>
>
> Suspect: You're barking up the wrong tree. I've never been at that restaurant.
>
>
> |
1,270,900 | I've read <http://www.hanselman.com/blog/ELMAHErrorLoggingModulesAndHandlersForASPNETAndMVCToo.aspx> and would like to use it in my mvc application; I'm running the MVC 2 preview.
My problem is, that when I follow instructions in article (providing dll and modifying web.config), I encounter an error when accessing <http://localhost:62864/elmah.axd> (ressource not found).
Any suggestions?
Any references to a good "get started" article on elmah?
Thanks,
Anders | 2009/08/13 | [
"https://Stackoverflow.com/questions/1270900",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/122985/"
] | Sounds like you might find the answer in [this](https://stackoverflow.com/questions/933554/elmah-not-working-with-asp-net-site) question. | The [project page](http://code.google.com/p/elmah/) on Google code has some links to some discussion groups (fifth box down on the right-side of the page. You might get more help there.
Andy |
7,600 | The standard cursor movement keys on the TI-99/4, /4A and apparently /8 were Function + E (for up), S (for left), D (for right), and X (for down). These keys were also often used (without needing the function key) for games.
WordStar on CP/M used the same keys, albeit using Control rather than Function (as Function was a somewhat specific key to the TI keyboard). A number of other CP/M and early DOS applications copied the WordStar combinations, so they were quite common for a while.
Was this coincidental, did one of these copy the other, or did they both derive from some common older source that I'm not aware of? | 2018/09/15 | [
"https://retrocomputing.stackexchange.com/questions/7600",
"https://retrocomputing.stackexchange.com",
"https://retrocomputing.stackexchange.com/users/547/"
] | >
> Was this coincidental, did one of these copy the other, or did they both derive from some common older source that I'm not aware of?
>
>
>
I wouldn't make a bet, but Wordstar is what I would have said as well - or more correct, keyboard layout, as the selection is not an invention out of nowhere, but follows a logic based on common (terminal) keyboard layout.
ESDX (and ESDF for games and DEC alike T-Bar cursors) is the first cursor like location that can be used across various keyboards. These letters are the same on English and German Keyboards (QWERTZ/QWERTY key order) and at least close to each other and as well on the left side for French Keyboards (AZERTY). On terminals, where there is no scan code, but letters and letter wise assigned control codes this avoids the need for country/keyboard dependant command routines - and, equal important, different manuals and key sheets. These three keyboard layouts [cover a great deal in Europe](https://commons.wikimedia.org/wiki/File:Latin_keyboard_layouts_by_country_in_Europe_map.PNG) and worldwide. | For wordstar the original diamond was chosen probably because the ctrl key position on a lot of older keyboards made it a natural extension and it can be used by the left hand solo. It also avoid the Ctrl-H and Ctrl-M which would be used for backspace and carriage return. While it's possible that the TI engineers were influenced by Wordstar the dates make that seem a little bit unlikely. (Wordstar is 1978 and the TI is 1979)
As an aside Apple II prior to the Autostart ROM used Esc-A,B,C,D for cursor movement, the Autostart ROM added the I,J,K,M diamond instead (where ESC toggled in and out of movement mode). So the idea of diamond for movement was not unusual.
[](https://i.stack.imgur.com/kFjGL.png) |
603 | I'm creating a paid event that has free/discounted tickets for members. The idea is to encourage visitors to become members when signing up for the event. I feel like this is a common usage scenario, but don't see how this be done without sending people off to a separate membership registration form. | 2015/04/16 | [
"https://civicrm.stackexchange.com/questions/603",
"https://civicrm.stackexchange.com",
"https://civicrm.stackexchange.com/users/323/"
] | There's an extension my colleague built for a client of ours that handles this: <https://github.com/aghstrategies/com.aghstrategies.eventmembershipsignup>
It should work for you. Unfortunately, we just haven't had the time to get it documented as much as I'd like (or to list it in the extensions directory). If you end up implementing this, please drop me a note at andrew -at- aghstrategies.com. I'd love to hear what suggestions you have, since it is on my to-do list to get it listed and write the documentation needed. | My company expects to create a new order API by June for 4.7 that will facilitate this, but we don't yet have funding to change pricesets so there is a single type for all three current areas. |
2,642,364 | AJAX is a pain in the ass because it essentially means you'll have to write two sets of similarish code: one for browsers with JavaScript enabled and those without.
Not only this, but you have to connect JavaScript events to hook into your models and display the results.
And if all that weren't bad enough, you need to send an address change with the request, otherwise the user won't be able to "click back" correctly (if confused look at what happens to the address bar when you click links in GMail).
**We're searching for something that had the foresight and design goals with all these concerns in mind.**
Performance and security are also obvious major concerns.
We love config-based systems as well, where you don't have to write a lot of code you just drop it into an easily read config format.
It's like asking for the holy grail right? | 2010/04/15 | [
"https://Stackoverflow.com/questions/2642364",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/313670/"
] | Have you given a look to [Pyjamas](http://pyjs.org/)
Quoted from the site
>
> Why should I use it?
>
>
> You can write web applications in
> python - a readable programming
> language - instead of in HTML and
> Javascript, both of which become
> quickly unreadable for even
> medium-sized applications. Your
> application's design can benefit from
> encapsulating high level concepts into
> classes and modules (instead of trying
> to fit as much HTML as you can stand
> into one page); you can reuse - and
> import - classes and modules.
>
>
> Also, the AJAX library takes care of
> all the browser interoperability
> issues on your behalf, leaving you
> free to focus on application
> development instead of learning all
> the "usual" browser incompatibilities.
>
>
> | Two approaches to this problem generally. One is for the framework to try and do it all, like Microsoft's ASP.NET with its Ajax toolkit. This includes server side controls that produce Ajax functionality with all client- and server-side code generated for you. For example, their UpdatePanel control allows for partial page updates via an Ajax call. However, it is not universally popular as a framework in general because their Page and Control models are sometimes seen as too heavyweight and overbloated.
A second, "slimmer" approach would be to separate the concerns. Let jQuery or a similar library deal with cross-browser inconsistencies and the client side of the Ajax call, and use a simple lightweight server-side web framework, such as Groovy on Grails or Microsoft ASP.NET MVC (there are others as I'm sure people will point out). Any decent framework should be capable of easily producing either JSON or XML data in response to an Ajax call.
As for browsers with Javascript disabled - this is the twenty first century. Do you really have to cater for them any more? |
2,642,364 | AJAX is a pain in the ass because it essentially means you'll have to write two sets of similarish code: one for browsers with JavaScript enabled and those without.
Not only this, but you have to connect JavaScript events to hook into your models and display the results.
And if all that weren't bad enough, you need to send an address change with the request, otherwise the user won't be able to "click back" correctly (if confused look at what happens to the address bar when you click links in GMail).
**We're searching for something that had the foresight and design goals with all these concerns in mind.**
Performance and security are also obvious major concerns.
We love config-based systems as well, where you don't have to write a lot of code you just drop it into an easily read config format.
It's like asking for the holy grail right? | 2010/04/15 | [
"https://Stackoverflow.com/questions/2642364",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/313670/"
] | Yes, the [NOLOH PHP Framework](http://www.noloh.com) (the site itself was written in NOLOH) is that holy grail. NOLOH was developed from the ground up to address these issues. You develop in a single language on the server-side and it takes care of the rest. No need to worry about AJAX, or cross browser issues. NOLOH's been around since 2005 and is being used in various companies large and small. It significantly outperforms the competition in performance due to it's lightweight and on-demand nature.
NOLOH recently gave a talk at Confoo, the most applicable parts of that presentation to your question are the [live examples](http://www.youtube.com/watch?v=qLFc-aF2fDI), and the [basic coding](http://www.youtube.com/watch?v=cdD9hSuq7aw).
If you're curious about the power of NOLOH you can also check out this Steve Jobs like [one more thing](http://www.youtube.com/watch?v=8r0FR0Dx4zE) demonstrating the upcoming automatic Comet.
Disclaimer: I'm a co-founder of NOLOH.
Enjoy. | Two approaches to this problem generally. One is for the framework to try and do it all, like Microsoft's ASP.NET with its Ajax toolkit. This includes server side controls that produce Ajax functionality with all client- and server-side code generated for you. For example, their UpdatePanel control allows for partial page updates via an Ajax call. However, it is not universally popular as a framework in general because their Page and Control models are sometimes seen as too heavyweight and overbloated.
A second, "slimmer" approach would be to separate the concerns. Let jQuery or a similar library deal with cross-browser inconsistencies and the client side of the Ajax call, and use a simple lightweight server-side web framework, such as Groovy on Grails or Microsoft ASP.NET MVC (there are others as I'm sure people will point out). Any decent framework should be capable of easily producing either JSON or XML data in response to an Ajax call.
As for browsers with Javascript disabled - this is the twenty first century. Do you really have to cater for them any more? |
2,642,364 | AJAX is a pain in the ass because it essentially means you'll have to write two sets of similarish code: one for browsers with JavaScript enabled and those without.
Not only this, but you have to connect JavaScript events to hook into your models and display the results.
And if all that weren't bad enough, you need to send an address change with the request, otherwise the user won't be able to "click back" correctly (if confused look at what happens to the address bar when you click links in GMail).
**We're searching for something that had the foresight and design goals with all these concerns in mind.**
Performance and security are also obvious major concerns.
We love config-based systems as well, where you don't have to write a lot of code you just drop it into an easily read config format.
It's like asking for the holy grail right? | 2010/04/15 | [
"https://Stackoverflow.com/questions/2642364",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/313670/"
] | Have you given a look to [Pyjamas](http://pyjs.org/)
Quoted from the site
>
> Why should I use it?
>
>
> You can write web applications in
> python - a readable programming
> language - instead of in HTML and
> Javascript, both of which become
> quickly unreadable for even
> medium-sized applications. Your
> application's design can benefit from
> encapsulating high level concepts into
> classes and modules (instead of trying
> to fit as much HTML as you can stand
> into one page); you can reuse - and
> import - classes and modules.
>
>
> Also, the AJAX library takes care of
> all the browser interoperability
> issues on your behalf, leaving you
> free to focus on application
> development instead of learning all
> the "usual" browser incompatibilities.
>
>
> | Yes, the [NOLOH PHP Framework](http://www.noloh.com) (the site itself was written in NOLOH) is that holy grail. NOLOH was developed from the ground up to address these issues. You develop in a single language on the server-side and it takes care of the rest. No need to worry about AJAX, or cross browser issues. NOLOH's been around since 2005 and is being used in various companies large and small. It significantly outperforms the competition in performance due to it's lightweight and on-demand nature.
NOLOH recently gave a talk at Confoo, the most applicable parts of that presentation to your question are the [live examples](http://www.youtube.com/watch?v=qLFc-aF2fDI), and the [basic coding](http://www.youtube.com/watch?v=cdD9hSuq7aw).
If you're curious about the power of NOLOH you can also check out this Steve Jobs like [one more thing](http://www.youtube.com/watch?v=8r0FR0Dx4zE) demonstrating the upcoming automatic Comet.
Disclaimer: I'm a co-founder of NOLOH.
Enjoy. |
2,642,364 | AJAX is a pain in the ass because it essentially means you'll have to write two sets of similarish code: one for browsers with JavaScript enabled and those without.
Not only this, but you have to connect JavaScript events to hook into your models and display the results.
And if all that weren't bad enough, you need to send an address change with the request, otherwise the user won't be able to "click back" correctly (if confused look at what happens to the address bar when you click links in GMail).
**We're searching for something that had the foresight and design goals with all these concerns in mind.**
Performance and security are also obvious major concerns.
We love config-based systems as well, where you don't have to write a lot of code you just drop it into an easily read config format.
It's like asking for the holy grail right? | 2010/04/15 | [
"https://Stackoverflow.com/questions/2642364",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/313670/"
] | Have you given a look to [Pyjamas](http://pyjs.org/)
Quoted from the site
>
> Why should I use it?
>
>
> You can write web applications in
> python - a readable programming
> language - instead of in HTML and
> Javascript, both of which become
> quickly unreadable for even
> medium-sized applications. Your
> application's design can benefit from
> encapsulating high level concepts into
> classes and modules (instead of trying
> to fit as much HTML as you can stand
> into one page); you can reuse - and
> import - classes and modules.
>
>
> Also, the AJAX library takes care of
> all the browser interoperability
> issues on your behalf, leaving you
> free to focus on application
> development instead of learning all
> the "usual" browser incompatibilities.
>
>
> | The [jQuery BBQ: Back Button & Query Library](http://benalman.com/projects/jquery-bbq-plugin/) aims to help with ajax "back button" issue. You might check it out if you're considering jQuery for your ajax functionality. |
2,642,364 | AJAX is a pain in the ass because it essentially means you'll have to write two sets of similarish code: one for browsers with JavaScript enabled and those without.
Not only this, but you have to connect JavaScript events to hook into your models and display the results.
And if all that weren't bad enough, you need to send an address change with the request, otherwise the user won't be able to "click back" correctly (if confused look at what happens to the address bar when you click links in GMail).
**We're searching for something that had the foresight and design goals with all these concerns in mind.**
Performance and security are also obvious major concerns.
We love config-based systems as well, where you don't have to write a lot of code you just drop it into an easily read config format.
It's like asking for the holy grail right? | 2010/04/15 | [
"https://Stackoverflow.com/questions/2642364",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/313670/"
] | Yes, the [NOLOH PHP Framework](http://www.noloh.com) (the site itself was written in NOLOH) is that holy grail. NOLOH was developed from the ground up to address these issues. You develop in a single language on the server-side and it takes care of the rest. No need to worry about AJAX, or cross browser issues. NOLOH's been around since 2005 and is being used in various companies large and small. It significantly outperforms the competition in performance due to it's lightweight and on-demand nature.
NOLOH recently gave a talk at Confoo, the most applicable parts of that presentation to your question are the [live examples](http://www.youtube.com/watch?v=qLFc-aF2fDI), and the [basic coding](http://www.youtube.com/watch?v=cdD9hSuq7aw).
If you're curious about the power of NOLOH you can also check out this Steve Jobs like [one more thing](http://www.youtube.com/watch?v=8r0FR0Dx4zE) demonstrating the upcoming automatic Comet.
Disclaimer: I'm a co-founder of NOLOH.
Enjoy. | The [jQuery BBQ: Back Button & Query Library](http://benalman.com/projects/jquery-bbq-plugin/) aims to help with ajax "back button" issue. You might check it out if you're considering jQuery for your ajax functionality. |
551,484 | I was trying to control the remote start circuit for a generator. The circuit operates on a 12V automotive battery, so it's around 13.5V. The circuit draws around 13mA. I grabbed a 2N2222A and wired up a simple circuit with the generator control inputs on the collector and emitter. With the base at ground, the generator fired up as soon as I connected it across C-E. I didn't expect this.
I went back to the bench and hooked up a 9V battery across the C-E and measured 165mA. Then I read the datasheet more carefully. The max C-E breakdown voltage rating is 40V, but that's at 10mA. I try some more experimentation. Add a 1.5K resistor in series with the 9V battery, for a max 6mA. Now the leakage across C-E is .3mA. Try a 510 ohm resistor (18mA) - leakage has jumped to about 6mA.
What in the datasheet should have warned me that this transistor was unsuitable for this application?
EDIT:
Forget all that about the generator - it's just a distraction where I was attempting to explain why I was trying this experiment.
Just look at this very simple circuit:
[](https://i.stack.imgur.com/QLzGb.png)
With a 1.5K resister, the meter shows about .3mA. With a 500 ohm resistor current jumps to about 6mA.
I tried this with a half dozen transistors from 3 different batches. One batch is claimed to be genuine Fairchild parts. All act pretty much the same. | 2021/03/05 | [
"https://electronics.stackexchange.com/questions/551484",
"https://electronics.stackexchange.com",
"https://electronics.stackexchange.com/users/133243/"
] | Note the variants in pinouts (image from Wikipedia):
[](https://i.stack.imgur.com/CUjmB.jpg)
I would also not be totally gobsmacked to see a "2222" made with Japanese-standard E-C-B pinout from some Asian source. Check an unsullied transistor with diode range on a multimeter.
The diode forward voltage that is slightly lower than the other is the C-B junction. Or plug it into the hFE tester on your multimeter- assuming only E/C are unknown from your diode test and the higher gain identifies the correct orientation. Usually they won't be close (like ~10 vs. ~200).
---
As far as what could kill a correctly connected transistor, should that happen, the culprit could be an inductive load or a violation of the safe operating area (SOA). If no SOA chart is shown on the datasheet, avoid combinations of high Vce with high current (as can happen when switching an inductive load, even with a flyback diode). A beefier transistor (for example using a 600mA transistor to switch a 150mA inductive load rather than a 200mA transistor) usually prevents any problems. Without a flyback diode, of course the energy in the magnetic field goes into the tiny transistor die and can damage it if/when it avalanches, at more than 40V in this case. | You have probably connected it backward. Recheck the connections, there are a couple of different pinouts depending upon the specific device.
Commmon arrangements are base-collector-emitter or emitter-base-collector.
In the reverse direction, the base-emitter junction will breakdown at about 6-7V. That would be consistent with your second experiment. |
4,962,422 | I have checked some of ASP.NET MVC themes from Microsoft's web site but they are not very professional looking and classy.
Is there any web site that you can recommend in which I can find premium (beautiful looking and professsional) web site designs(themes) for ASP.NET MVC? | 2011/02/10 | [
"https://Stackoverflow.com/questions/4962422",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/333878/"
] | I've had great luck buying HTML themes from [ThemeForest](http://themeforest.net/) and using them in my ASP.NET MVC projects. | You might take a look at the [MVC Design Gallery](http://mvccontribgallery.codeplex.com/). |
2,729 | I am looking for my ancestry and starting on my Father's side of the family. I am currently looking for my great great grandparents and further back on my Father's side.
My Grandpa (Father's father) is from Israel but I know that his family were originally from Poland (possibly Warsaw) I have the names of my Great Grandfather and my Great Grandmother and their dates.
* Michael Patron (Great Grandfather) 1897-1972 (said to be in WW1)
* Genia (Zeimer) Patron (Great Grandmother) 1900-1983.
They died either in Israel or South Africa.
I'm looking for Immigration documents and/or marriage licenses, birth certificates, anything that would help me delve further into my family's history
I've searched most of the obvious sites like familysearch and my heritage and I use my surname (patron) or type in an ancestors name and date of birth and death, but I only get other "Patrons" from America and such and seeing as I don't have any family in America, the search is useless. If I go onto google and type in my ancestors name it comes up with "patron saint of..." or "michael patron on facebook". | 2012/12/18 | [
"https://genealogy.stackexchange.com/questions/2729",
"https://genealogy.stackexchange.com",
"https://genealogy.stackexchange.com/users/539/"
] | In general, online records related to Jews from Poland from the 19th century are not as dense as those from Western Europe or from the US. [JewishGen](http://www.jewishgen.org/) has some related information, and you should definitely explore the [JRI-Poland](http://www.jewishgen.org/jri-pl/jriplweb.htm) database, but I would not necessarily expect to find information on arbitrary individuals.
**UPDATE**: For the record, there are quite a few people with the last name `Patron` listen on JRI-Poland, including some from the Warsaw area. I didn't see any obvious matches in my casual search, but you might find some promising leads. | With the information provided above I'm thinking a surname change is at play. "Patron" is defined as chosen, this does not confirm my theory but being that the person your looking for was presumably from Poland, names usually aren't that simple. Was he Jewish? This would help you find your ancestor.
<http://www.yivoencyclopedia.org/article.aspx/Poland/Poland_from_1795_to_1939>
The way I'd go is to track down the history by studying his migration. The records you seek will be time based. Therefore, find the events of history and search these for your ancestor. It may help to work your way backwards and search border crossings, arrival, and departure records for Israel as well as Poland, and Germany. Parrish or Synagogue records may produce valid records.
I hope this helps. : } |
104,193 | I just read this article in CNN "Eating chilies cuts risk of death from heart attack and stroke, study says" and when I read this line:
>
> Carried out in Italy, where chili is a common ingredient, the study
> compared the risk of death among 23,000 people, some of whom ate chili
> and some of whom didn't.
>
>
>
I've seen that some Italian dishes call for the addition of dried chili flakes, but a common ingredient? I'm married to a Malay - chili peppers *are* a common ingredient. It seems as common as salt.
Maybe I'm thinking of the wrong types of chili peppers. We always have a supply of Thai chilies around, but no pepperoncinis.
So what have I missed in Italian cooking where chilies are a common ingredient?
Or is what we have here in America as Italian cooking just isn't the real deal? | 2019/12/19 | [
"https://cooking.stackexchange.com/questions/104193",
"https://cooking.stackexchange.com",
"https://cooking.stackexchange.com/users/80074/"
] | I'm not Italian either, but I've travelled there (and I'm starting an ocean closer than you). Chillies are used in some dishes, sometimes just a tiny amount, but in sauces like arrabiata they're important. I've had them on pizza in Italy too, but the pizza places I've been to were catering for tourists or styled themselves as modern with a huge variety of toppings, so I'm not sure how traditional they are there.
There are also (thanks @Luciano for reminding me) plenty of spicy, even very spicy, salamis and other sausages. These may be served on pizza or in other ways. | In the Calabria region of Italy, chili peppers grow natively and are present in the local dishes. |
104,193 | I just read this article in CNN "Eating chilies cuts risk of death from heart attack and stroke, study says" and when I read this line:
>
> Carried out in Italy, where chili is a common ingredient, the study
> compared the risk of death among 23,000 people, some of whom ate chili
> and some of whom didn't.
>
>
>
I've seen that some Italian dishes call for the addition of dried chili flakes, but a common ingredient? I'm married to a Malay - chili peppers *are* a common ingredient. It seems as common as salt.
Maybe I'm thinking of the wrong types of chili peppers. We always have a supply of Thai chilies around, but no pepperoncinis.
So what have I missed in Italian cooking where chilies are a common ingredient?
Or is what we have here in America as Italian cooking just isn't the real deal? | 2019/12/19 | [
"https://cooking.stackexchange.com/questions/104193",
"https://cooking.stackexchange.com",
"https://cooking.stackexchange.com/users/80074/"
] | Chili is more commonly used in the south of Italy, particularly Sicily (and Calabria). A "peperoncino" is just a diminutive of "peperone" - a pepper. It doesn't indicate a particular variety of chili.
I'd just like to add that there's a difference between the use of an ingredient in traditional dishes, and everyday use in cooking. At home people cook all kinds of stuff in the north too, including the use of chilies. I took these pictures today in the supermarket (north of Tuscany):
[](https://i.stack.imgur.com/NZyFP.jpg)
[](https://i.stack.imgur.com/UJLey.jpg)
[](https://i.stack.imgur.com/uXXc7.jpg)
[](https://i.stack.imgur.com/RdJHE.jpg) | In the Calabria region of Italy, chili peppers grow natively and are present in the local dishes. |
104,193 | I just read this article in CNN "Eating chilies cuts risk of death from heart attack and stroke, study says" and when I read this line:
>
> Carried out in Italy, where chili is a common ingredient, the study
> compared the risk of death among 23,000 people, some of whom ate chili
> and some of whom didn't.
>
>
>
I've seen that some Italian dishes call for the addition of dried chili flakes, but a common ingredient? I'm married to a Malay - chili peppers *are* a common ingredient. It seems as common as salt.
Maybe I'm thinking of the wrong types of chili peppers. We always have a supply of Thai chilies around, but no pepperoncinis.
So what have I missed in Italian cooking where chilies are a common ingredient?
Or is what we have here in America as Italian cooking just isn't the real deal? | 2019/12/19 | [
"https://cooking.stackexchange.com/questions/104193",
"https://cooking.stackexchange.com",
"https://cooking.stackexchange.com/users/80074/"
] | **Disclosure:** I am Italian but no professional, so what I will say is based on my own experience and could be inaccurate/wrong.
There is sure plenty of use for chili peppers in italian cousine. It is really traditional in the southern region of Calabria and close ones, but it is used throughout the whole country.
Together with the already mentioned *Arrabbiata* pasta sauce, in which spicy chili peppers is the main ingredient, there are several other dishes and cured meat product (sausages and such) that contains or, sometimes, heavily rely on that spicyness ( for example [Nduja](https://en.wikipedia.org/wiki/%27Nduja) ).
Also, plenty of other plates can be adjusted to become spicy using dried chili flakes, especially for tomato based dishes, if it is of your taste. | In the Calabria region of Italy, chili peppers grow natively and are present in the local dishes. |
104,193 | I just read this article in CNN "Eating chilies cuts risk of death from heart attack and stroke, study says" and when I read this line:
>
> Carried out in Italy, where chili is a common ingredient, the study
> compared the risk of death among 23,000 people, some of whom ate chili
> and some of whom didn't.
>
>
>
I've seen that some Italian dishes call for the addition of dried chili flakes, but a common ingredient? I'm married to a Malay - chili peppers *are* a common ingredient. It seems as common as salt.
Maybe I'm thinking of the wrong types of chili peppers. We always have a supply of Thai chilies around, but no pepperoncinis.
So what have I missed in Italian cooking where chilies are a common ingredient?
Or is what we have here in America as Italian cooking just isn't the real deal? | 2019/12/19 | [
"https://cooking.stackexchange.com/questions/104193",
"https://cooking.stackexchange.com",
"https://cooking.stackexchange.com/users/80074/"
] | I'd like to point out that the detail in your quote is "where chili is a common ingredient"
Using chilies *often* is not the same thing as always eating spicy food. Southern Italian cooking uses chilies *often*, but not necessarily to create very spicy food.
Some preparations (arrabiata, fra diavolo, etc) may be spicy, but many things can use chilies and not be hot and spicy--milder chilies, or smaller amounts can be used simply to create flavor, without heat.
I think it's fair to say that Italian cooking uses chilies ***often*** while also clarifying that Italian cooking uses significantly less chilies (volume wise) than some other cuisine known for being hot & spicy. | In the Calabria region of Italy, chili peppers grow natively and are present in the local dishes. |
17,312 | Most sites that list cooking competitions are unfortunately holed up in one groups' pages and not easily searched.
I am looking for a site that indexes cooking competitions across various formats (i.e. chili, bbq, chowder, *whatever*), can provide event information, filter geographically and by event type.
A great site would index the events themselves as its sole function, but might also provide guidance/community elements.
What sites are currently out there that fit this bill? | 2011/08/30 | [
"https://cooking.stackexchange.com/questions/17312",
"https://cooking.stackexchange.com",
"https://cooking.stackexchange.com/users/15/"
] | The site that has the best information I've found in regards to competitive cooking is [Contest Cook](http://www.contestcook.com/). They don't quite meet all your criteria in terms of searchability, but they do some levels of sorting and provide a wealth of information on the contests they list (which are quite numerous). | The art of SEO (search engine optimization) is somewhere between elusive and completely ignored by a good number of people out there building websites. As a result even the best search engines often can not aggregate all of the "cooking competitions" in Columbus any more than they could find all the heavy metal being played in Cleveland on any given weekend.
So, I am afraid the short answer to your question is "No, There isn't".
The 'trick' is to find a way to get all of the hosts of cooking competitions to be willing to go to one place and list their competition. You have no doubt heard of Craig's List and Angie's List, well you can start mfg's list and see if you can't get some traction. Maybe Kraft or Ben E Keith will sponsor you? It is a good idea, but somebody has to make it happen. |
18,036 | I am looking to make a group of Vanguard Veterans who wield Power Swords, but since they are not on the sprue I will have to pilfer them from other boxed sets. But since the GW website is rather incomplete regardings sprues, I cannot really tell where I can find these things.
Note that I am looking for right-handed Power Swords for models in Power Armor, either consisting of one part or the hand/weapon + weapon arm combination. | 2014/06/29 | [
"https://boardgames.stackexchange.com/questions/18036",
"https://boardgames.stackexchange.com",
"https://boardgames.stackexchange.com/users/7893/"
] | Alright, I have done some more research, asked around and I have come to the following conclusion regarding the Power Weapons on the sprues of the regular Space Marines. Some are entire arms, others are just hands. Likewise some weapons have one bladed edge, the others two.
Tactical Marines Squad
* 1 left-handed double-bladed Power Sword, hand.
Assault Marines Squad
* 1 left-handed double-bladed Power Sword, arm.
* 1 left-handed single-bladed Power Axe, arm.
(Note: on the older sprues these are both right-handed)
Devastator Marines Squad
* 1 left-handed double-bladed Power Sword, hand.
* 1 left-handed single-bladed Power Axe, hand.
(Note: this is on the sprues of the new boxed set)
Vanguard Veterans
* 1 right-handed single-bladed Power Sword, hand.
* 1 right-handed single-bladed Power Axe, hand.
Command Squad
* 1 left-handed double-bladed Power Sword, arm. Note that this one is intended for the Company Champion, not for the Sergeant as is usual.
Space Marine Commander
* 1 left-handed double-bladed Power Sword, arm. | Another option is to buy your bits individually. There are tons of options out there, one example is [Hoard O Bits](https://hoardobits.com/cgi-bin/hob/shop.pl?cat1=sword&view=02172017-2-10) though you might want to dig around a bit, this was a fairly quick search. You can also often find bit sellers on eBay. |
50,965 | I've a Marin San Rafael, 2005. The cassette is an 8 speed 11-28 shimano, exact model number unknown. The chain and freewheel are whatever came with the bike..
I've always thought the chain had a problem, stiff link perhaps, because it would feel like it skipped a tooth/jumped particularly when running on the smallest two cogs and pedalling hard.. everything else has been mechanically good, though lately the freewheel has developed a problem, probably stuck pawls. It's slipped and crunched enough times that I'd say it warrants replacing rather than cleaning and regreasing..
The bike has always been stored indoors, some use in wet weather but mainly dry, and has probably done about 2000 miles. I'm reasonably tall/heavy at 193cm/110kg and live in a hilly region which may have contributed to what I think is a premature failure
So, I'm setting about ordering bits but I'm not sure what to get - there aren't any obvious model numbers on these components and I can't find exact specs on what came as standard
* If I replace like for like, do chain/free/cassette come as a set?
* Will any shimano 8 speed cassette fit?
* Do chains have a standard length and need shortening to suit?
* What keywords do I need to search (e.g. eBay) for to ensure I get the set of things I need?
* If I go for upgraded components (cos I don't think I'll be getting smaller any time soon), are there particular keywords to search/look in the tech specs for (e.g. Number of pawls-I've no idea what makes one freewheel more heavy duty than another)?
* Are they a standard fitment hence a drop in replacement or do other things need to be changed too/do I need to match it to the hub?
I don't use the bike enough to warrant eg a sprag hub and rear wheel rebuild, but l'll be using it regularly, soon
Note, I'm not after particular product recommendations, I'm after knowing how to search for and buy the right set things over the the internet, what things are called, what's needed to ensure the job can be done in one swoop working finding something missing - the mechanics of fitting them is not part of the question either | 2017/11/12 | [
"https://bicycles.stackexchange.com/questions/50965",
"https://bicycles.stackexchange.com",
"https://bicycles.stackexchange.com/users/35477/"
] | Your easiest solution is to simply buy another of exactly what you have
* 8 speed cassette, 11-28 teeth
* 8 speed chain.
They don't come as a set - you need to buy one of each. Its up to you if you want to get cheaper or more expensive parts. The lifespan and weight is what varies with price.
Depending on wear, your front chainrings might be getting tired. But I've seen some severely worn ones still working fine.
Any 8 speed chain will be fine - you could even mix and match KMC chain with a Shimano cassette. But you need 8 speed chain (possibly labelled as 6/7/8 speed) and you need an 8 speed cassette.
If you want to get a bit more adventurous you could look at a 30 or 32 tooth big cog. This would give you a lower-low gear for hillclimbing. Its totally up to you whether this is required.
Downside of enlarging the cassette is that your rear derailleur might not fit, or it might chatter on the lowest gear.
Chains come in lengths longer than what you need. 114 or 116 links (or half-links) So you shorten them to the same *number* of links as your old chain.
You'll need tools to do this - there are some special bike tools.
* Cassette lockring remover (Undoes the lockring retaining the cassette on the freehub)
* Chain whip (to hold the cassette and therefore the freehub still while using the lockring remover)
* Chain tool (to shorten and fit the new chain you need a chain tool. Chain will probably come with a one-time use pin, or you can fit a master link to make life easier next time.)
Also need rags and cleaners etc, and possibly chain lubricant. | On the off chance that future users in my position (mechanically competent, but never really done any bicycle maintenance / don't know terms) here are the answers I've uncovered along the way since posting this question:
>
> If I replace like for like, do chain/free/cassette come as a set?
>
>
>
No, but they're relatively cheap components and mostly\* inter-compatible so it doesn't matter, just base the buying decision on the number of gears and get chain, cassette etc that are suitable for X gears.
\*see last paragraph
>
> Will any shimano 8 speed cassette fit?
>
>
>
Quick bit of terminology: a freewheel is a bunch of cogs and a one way ratchet device. A freehub body is a one way ratchet device. A cassette is a bunch of cogs. A freehub is probably an entire wheel hub (that the spokes mount to) and one way ratchet device. A usable wheel needs to feature cogs, a one way ratchet, hub, (and spokes and so on). How a wheel is composed varies, but 7 speed and earlier tech is probably a freewheel plus hub. 8 speed and later tech is probably a cassette and freehub if it's entry level kit. If higher spec out of the factory it's probably a cassette, freehub body and hub as separable components.
In my case in my entry level bike had a shimano FH-RM30 freehub and the local bike shop advised I couldn't separate it so building a whole new wheel, respoke etc if I wanted to replace the freehub. As it was (and in concurrence with advice here) it was more cost effective to just get a second hand wheel (rim, spokes and hub - not sure if the one I was sold was a freehub or a freehub body plus hub). I also purchased a new cassette and chain, and they fitted the cassette, saving me the need to purchase the relevant tool.
>
> Do chains have a standard length and need shortening to suit?
>
>
>
They need shortening. I purchased a tool and SRAM chain that came with a split link device, making it easier to rejoin
>
> What keywords do I need to search (e.g. eBay) for to ensure I get the set of things I need?
>
>
>
Examine the wheel and determine how it's constructed or look up model numbers to see if the freehub body can be separated from the hub. If it can't, buying another wheel may be more constant effective.
>
> If I go for upgraded components (cos I don't think I'll be getting smaller any time soon), are there particular keywords to search/look in the tech specs for (e.g. Number of pawls-I've no idea what makes one freewheel more heavy duty than another)?
>
>
>
Terminology confusion with freewheel/freehub in my case - there are a litany of upgraded components but the lowest cost path of least resistance is either replacing like for like, or replacing the wheel. The total cost for a second hand wheel, cassette, chain and chain tool was £80 - all I need to do is swap the tyre and tube over and fit the chain (and that doesn't need tools other than a chain linker)
>
> Are they a standard fitment hence a drop in replacement or do other things need to be changed too/do I need to match it to the hub?
>
>
>
My reading led me to believe that freehub/freehub-bodies and cassette pairings are often manufacturer specific, so a cassette from one make may not fit the splines of another. If ordering in a shop, this shouldn't be a mistake as they can be trial fitted there and then, only if internet ordering |
26,549 | If protectionism is injurious to a state, is the success of mercantilist China *in spite of* its protectionist measures?
Furthermore, if the academic consensus is that most instances of protectionism are akin to using self-harm in retaliation to a perceived offensive measure, why is it still so prevalent (for example the EU Common Agricultural Policy)?
**References:**
>
> Protectionism is used for a number of reasons, some of which are
> outlined here, but is generally acknowledged to be ineffective and
> harmful to a country’s economic interests in the longer term. This is
> because it prevents the mutual gains from trade being realised, and,
> by restricting competition, limits the incentives for firms to improve
> their efficiency.
>
>
>
<https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/43315/11-718-protectionism.pdf>
>
> Our main conclusion is that, in all the scenarios we consider,
> protectionism is not an effective tool for macroeconomic stimulus.
>
>
>
<https://www.nber.org/papers/w24353> | 2019/01/22 | [
"https://economics.stackexchange.com/questions/26549",
"https://economics.stackexchange.com",
"https://economics.stackexchange.com/users/5505/"
] | I am not an expert on this issue, but pending an expert's answer on this matter, here are my two cents.
**1. It is not true that there is a consensus that protectionism is almost always a bad thing for a country.**
Many slightly non-orthodox economists (e.g. Dani Rodrik, Chang Ha-Joon) have pointed out that protectionism is a perfectly good strategy that many developing/industrializing countries have adopted, including the US in the 19th century, Japan and Korea in the 20th, and now China in the 21st.
I believe Rodrik and Chang's main argument for protectionism in this context is the infant industry argument. Another argument is the second-best argument. See [this other answer of mine](https://economics.stackexchange.com/a/20867/18).
**2. China's protectionism has been selective.**
In my vague impression as a non-expert, in most industries in which China exports heavily (except perhaps steel), there has been little protection and great competition. Think for example of clothing and the electronics manufacturing base centered around the Pearl River Delta and Shenzhen. These are industries in which every cost advantage and innovation are ruthlessly and instantly seized upon, to the advantage of both producers and consumers (including consumers around the world).
I believe the IT industry is where China engages most heavily in protectionism. As is well known to the man on the street, many technology platforms like Google, Facebook, and YouTube do not operate in China either because they have been outright banned or because of the onerous censorship requirements. The result is that local substitutes have flourished (Baidu/Sogou for search, WeChat/Weibo/QQ for social media, Tudou for video, Taobao/Alibaba for ecommerce) and Tencent and Alibaba are among the worlds largest firms, even though most people outside China may know little of them.
But perhaps the greater bone of contention is China's "theft" of intellectual property (IP). As an explicit/implicit condition of entry, tech firms trying to enter China are usually forced to hand over their IP.
Again, these are merely my vague impressions and hopefully an expert can back these up or correct me with more concrete facts and statistics.
**3. One argument against protectionism is that it provokes retaliation, which can be damaging.**
However, for the past many decades, the many countries to which China exports have shown great restraint and retaliated little. These are for reasons that I am not sure about and which I hope an expert will explain. (Perhaps this is simply the same restraint that has been somewhat shown -- not always consistently and often arbitrarily -- to other developing countries in the past.)
This is now changing with the aggressive trade war launched by Trump and there are now indeed fears and perhaps even signs that China may be suffering as a result of this trade war. Huawei and ZTE are two Chinese companies that have suffered heavily from the US's uncertain on-and-off bans in the past year.
This however is to not to say that Trump's trade war is the best approach. See for example this recent piece by the right-wing, pro-trade Cato Institute (["Disciplining China’s Trade Practices at the WTO - How WTO Complaints Can Help Make China More Market-Oriented", Nov 2018](https://www.cato.org/publications/policy-analysis/disciplining-chinas-trade-practices-wto-how-wto-complaints-can-help)). I think many economists would agree that if China does indeed engage in protectionism and one wishes to retaliate, then the means of retaliation should be through multilateral, rules-based organizations like the WTO, and not unilateral, arbitrary trade wars such as those currently being undertaken by Trump.
**4. Your example of the EU Common Agricultural Policy.**
I think economists are almost universally agreed that protection for agriculture in rich countries is bad for most parties (the only beneficiaries being the farmers who receive the subsidies). I have never come across any modern economist defending any such policies.
Besides, I am not aware that China engage in much agricultural protectionism and indeed, I don't think this is what people think of when talking of China's protectionism. (Recently China has imposed heavier tariffs on pork and soybeans imports from the US, but these I believe are merely strategic retaliatory measures against Trump's trade war.) | It’s difficult to disentangle exactly what you are asking in this question because of the poor grammar.
It’s been pointed out that both the UK and US have both employed protectionist measures to protect their economies before they were judged strong enough to compete. Sometimes these measures can last for some time. For example Ha Joon Chang in his book on the illusions of capitalism wrote that the textile industry in Britain was protected for around a century, if not more.
The modern twist on this is that protectionism can occur whilst still loudly proclaiming the benefits of ‘free trade’. |
65,915 | I am imagining a story where people store heat in the summer for use in the winter and store cold in the winter for use in the summer, unleashing the appropriate temperature when needed.
But without hand-waving it away, how would such a thing work? I care not whether this device is magic or technology. (Keep in mind I'm not talking about currently known heat pump technology, which takes a lot of space, and transfers current temperatures from the ground and using the differential to change the building's comfort level.)
Whatever it is I want it to be about the size of a good sized urn, maybe working along the idea that if sat in a sunny place it would absorb heat and be able to release it at a later time, and if set in a cold / snowy place it can absorb cold, and have some sort of release valve. The amount of heat / cold stored would be proportional to the size of the vase. | 2016/12/25 | [
"https://worldbuilding.stackexchange.com/questions/65915",
"https://worldbuilding.stackexchange.com",
"https://worldbuilding.stackexchange.com/users/23009/"
] | Fermilab once built a house over a 10 foot by 10 foot by 10 foot pool of water. During the winter, they pulled heat out of the water, making ice. During the summer, they pumped heat out of the house into the ice, air conditioning the house and melting the ice.
They said that this system worked surprising well.
Now, do you allow a magical heat pumps? Because making a heat pump will take some good manufacturing knowledge, such as making metal tubing.
Keep in mind, as well, that old houses allowed a lot of outside air in which greatly increases the load on the HVAC. Very well insulated homes need to cool they sweaty hot humans during the winter. Do you allow magical foam insulation? | You can base everything around buildings with high thermal mass coupled with High R-value insulation. You can look into things like Earthbag houses or even primitive Adobe, if you make the walls thick enough. line the exterior walls with bailed hay, which should give you an R-value of around 2 per inch, if I remember right, not counting the inherent properties of the earthbags or adobe.
Sure you end up with walls 3 foot thick, but they mean you have a very thermally efficient house, so long as you figure out how to insulate the roof well. There are even earthbag like constructions in a beehive shape that turn the wall into a roof, more or less.
Your vase of handwavium would have less heat to move around, allowing more flexibility with how you could do it.
Finally, you could just put everyone in hobbit holes, or dwarf mines. Underground temperatures require very little thermal interference to maintain the perfect temperature, so long as you get below the frost line. |
65,915 | I am imagining a story where people store heat in the summer for use in the winter and store cold in the winter for use in the summer, unleashing the appropriate temperature when needed.
But without hand-waving it away, how would such a thing work? I care not whether this device is magic or technology. (Keep in mind I'm not talking about currently known heat pump technology, which takes a lot of space, and transfers current temperatures from the ground and using the differential to change the building's comfort level.)
Whatever it is I want it to be about the size of a good sized urn, maybe working along the idea that if sat in a sunny place it would absorb heat and be able to release it at a later time, and if set in a cold / snowy place it can absorb cold, and have some sort of release valve. The amount of heat / cold stored would be proportional to the size of the vase. | 2016/12/25 | [
"https://worldbuilding.stackexchange.com/questions/65915",
"https://worldbuilding.stackexchange.com",
"https://worldbuilding.stackexchange.com/users/23009/"
] | Well as you haven't said much about size constraints, I'd suggest storing it in much the same way we do now, in something unimaginatively called [Thermal Storage](https://en.wikipedia.org/wiki/Thermal_energy_storage). Large mass of something with good insulation. When it gets hot, it stays hot and vice versa for the cold. I know of at least one molten salt heat storage system (I forget where), they used solar power to heat up the salt and the use the heat at night, I think it stored several Gigawatt-hours of energy and could remain hot for ages. For a 6 month shelf life, just beef up the insulation (there used to be a rumor that the insulation on the space shuttle's liquid hydrogen tanks was sooo good it could keep ice frozen for 12 years) | We used to do this all the time, at least in the storing "cold" way. But it only worked on a very large scale. We used to have ice houses that would store huge quantities of ice. the buildings were well insulated and the ice that would last through to the next winter. they could be used for food storage because they stayed cold all year. <https://en.wikipedia.org/wiki/Ice_house_(building)>
lots of buildings work by storing the "cold" of night into the day and the heat of the day into the night to keep a mild temperature. there are several ways to do this but all require lots of mass. The simplest is just building really thick stone or earth walls.
the thermal inertia of something as small as an urn is just too small to work so you really will have to use hand waving magic. If you limit it to magic that stores or release energy on demand you can do this just fine.
I seem to remember a story where they did just that with specially carved stones of various sizes. one type could be prevented from warming (thus storing cold) and another could be prevented from radiating heat (thus storing heat) the cold ones were somewhat limited becasue they could not get colder than the coldest winter night, but the hot ones could reach some real extremes in temperature (they are warmed by sunlight so they can eventually reach the temperature of the surface of the sun, except they would melt first) to the point they were usually housed in metal frames to keep people from getting too close while active. I wish I could remember where I read that, it might have been a campaign setting.
This does mean you would need more cold stones than hot ones, and not just because it is easier to heat a room than cool it.
I have also seen a variation on this with a magical artifact that is always the same temprature, which just due to how temprature works will tend to bring any room it is in to the same temprature over time as long as it is not to big. if the temprature was set when you made each one you can get a lot of mileage out of the idea. make refrigerators in winter and bread ovens in summer. Or create your house climate control on a nice spring day. |
65,915 | I am imagining a story where people store heat in the summer for use in the winter and store cold in the winter for use in the summer, unleashing the appropriate temperature when needed.
But without hand-waving it away, how would such a thing work? I care not whether this device is magic or technology. (Keep in mind I'm not talking about currently known heat pump technology, which takes a lot of space, and transfers current temperatures from the ground and using the differential to change the building's comfort level.)
Whatever it is I want it to be about the size of a good sized urn, maybe working along the idea that if sat in a sunny place it would absorb heat and be able to release it at a later time, and if set in a cold / snowy place it can absorb cold, and have some sort of release valve. The amount of heat / cold stored would be proportional to the size of the vase. | 2016/12/25 | [
"https://worldbuilding.stackexchange.com/questions/65915",
"https://worldbuilding.stackexchange.com",
"https://worldbuilding.stackexchange.com/users/23009/"
] | Magic
=====
You said you don't care if it is magic or not. So the simple thing to do is use magic. Have some kind of magical storage device that takes charging. In the summer it absorbs heat and in the winter it releases it. | Either go with current technology or tweak it with a *teeny* bit of magic.
We can store lots of heat in latent form with special substances such as Glauber salts or some waxes. You can use handwavium chloride, with a very high latent heat and a metastable form (sort of super Glauber) that can be ignited in winter. Never travel in the cold months without several packets.
Or you can have some plant use it to build its own substance taking advantage of summer heat (lowering the temperature while doing so) and burn said plant in winter.
Otherwise, you will need some nigh perfect insulator and store heat in some thermal reservoir - underground, or in water tanks. |
65,915 | I am imagining a story where people store heat in the summer for use in the winter and store cold in the winter for use in the summer, unleashing the appropriate temperature when needed.
But without hand-waving it away, how would such a thing work? I care not whether this device is magic or technology. (Keep in mind I'm not talking about currently known heat pump technology, which takes a lot of space, and transfers current temperatures from the ground and using the differential to change the building's comfort level.)
Whatever it is I want it to be about the size of a good sized urn, maybe working along the idea that if sat in a sunny place it would absorb heat and be able to release it at a later time, and if set in a cold / snowy place it can absorb cold, and have some sort of release valve. The amount of heat / cold stored would be proportional to the size of the vase. | 2016/12/25 | [
"https://worldbuilding.stackexchange.com/questions/65915",
"https://worldbuilding.stackexchange.com",
"https://worldbuilding.stackexchange.com/users/23009/"
] | We used to do this all the time, at least in the storing "cold" way. But it only worked on a very large scale. We used to have ice houses that would store huge quantities of ice. the buildings were well insulated and the ice that would last through to the next winter. they could be used for food storage because they stayed cold all year. <https://en.wikipedia.org/wiki/Ice_house_(building)>
lots of buildings work by storing the "cold" of night into the day and the heat of the day into the night to keep a mild temperature. there are several ways to do this but all require lots of mass. The simplest is just building really thick stone or earth walls.
the thermal inertia of something as small as an urn is just too small to work so you really will have to use hand waving magic. If you limit it to magic that stores or release energy on demand you can do this just fine.
I seem to remember a story where they did just that with specially carved stones of various sizes. one type could be prevented from warming (thus storing cold) and another could be prevented from radiating heat (thus storing heat) the cold ones were somewhat limited becasue they could not get colder than the coldest winter night, but the hot ones could reach some real extremes in temperature (they are warmed by sunlight so they can eventually reach the temperature of the surface of the sun, except they would melt first) to the point they were usually housed in metal frames to keep people from getting too close while active. I wish I could remember where I read that, it might have been a campaign setting.
This does mean you would need more cold stones than hot ones, and not just because it is easier to heat a room than cool it.
I have also seen a variation on this with a magical artifact that is always the same temprature, which just due to how temprature works will tend to bring any room it is in to the same temprature over time as long as it is not to big. if the temprature was set when you made each one you can get a lot of mileage out of the idea. make refrigerators in winter and bread ovens in summer. Or create your house climate control on a nice spring day. | Maybe have a material that either captures or gives out heat by changing the thermal properties like changing polarity of a magnet. During summers the material absorbs heat and cools the room. And during winter we change the "polarity" So that it gives off the heat stored inside |
65,915 | I am imagining a story where people store heat in the summer for use in the winter and store cold in the winter for use in the summer, unleashing the appropriate temperature when needed.
But without hand-waving it away, how would such a thing work? I care not whether this device is magic or technology. (Keep in mind I'm not talking about currently known heat pump technology, which takes a lot of space, and transfers current temperatures from the ground and using the differential to change the building's comfort level.)
Whatever it is I want it to be about the size of a good sized urn, maybe working along the idea that if sat in a sunny place it would absorb heat and be able to release it at a later time, and if set in a cold / snowy place it can absorb cold, and have some sort of release valve. The amount of heat / cold stored would be proportional to the size of the vase. | 2016/12/25 | [
"https://worldbuilding.stackexchange.com/questions/65915",
"https://worldbuilding.stackexchange.com",
"https://worldbuilding.stackexchange.com/users/23009/"
] | Magic
=====
You said you don't care if it is magic or not. So the simple thing to do is use magic. Have some kind of magical storage device that takes charging. In the summer it absorbs heat and in the winter it releases it. | huh... isn't the key to store cold/heat, the insulation of the vessel?
Lower the temperature of a fluid as much as you can - [nitrogen for example](https://en.wikipedia.org/wiki/Liquid_nitrogen) - and store in a container made of a [ferromagnetic material](https://en.wikipedia.org/wiki/Category:Ferromagnetic_materials) .
Keep the container in a [vacuum chamber](https://en.wikipedia.org/wiki/Vacuum_chamber) and [magnetically levitate](https://en.wikipedia.org/wiki/Magnetic_levitation) it.
You have the cold storage.
Do the same for a fluid heated as much as you can and you have heat storage.
The magic here would be to find ferromagnetic materials that can endure both very low and very high temperatures.
If the purpose is to heat/cool a room to a comfortable temperature for a human being, I think not much magic is needed. |
65,915 | I am imagining a story where people store heat in the summer for use in the winter and store cold in the winter for use in the summer, unleashing the appropriate temperature when needed.
But without hand-waving it away, how would such a thing work? I care not whether this device is magic or technology. (Keep in mind I'm not talking about currently known heat pump technology, which takes a lot of space, and transfers current temperatures from the ground and using the differential to change the building's comfort level.)
Whatever it is I want it to be about the size of a good sized urn, maybe working along the idea that if sat in a sunny place it would absorb heat and be able to release it at a later time, and if set in a cold / snowy place it can absorb cold, and have some sort of release valve. The amount of heat / cold stored would be proportional to the size of the vase. | 2016/12/25 | [
"https://worldbuilding.stackexchange.com/questions/65915",
"https://worldbuilding.stackexchange.com",
"https://worldbuilding.stackexchange.com/users/23009/"
] | huh... isn't the key to store cold/heat, the insulation of the vessel?
Lower the temperature of a fluid as much as you can - [nitrogen for example](https://en.wikipedia.org/wiki/Liquid_nitrogen) - and store in a container made of a [ferromagnetic material](https://en.wikipedia.org/wiki/Category:Ferromagnetic_materials) .
Keep the container in a [vacuum chamber](https://en.wikipedia.org/wiki/Vacuum_chamber) and [magnetically levitate](https://en.wikipedia.org/wiki/Magnetic_levitation) it.
You have the cold storage.
Do the same for a fluid heated as much as you can and you have heat storage.
The magic here would be to find ferromagnetic materials that can endure both very low and very high temperatures.
If the purpose is to heat/cool a room to a comfortable temperature for a human being, I think not much magic is needed. | Maybe have a material that either captures or gives out heat by changing the thermal properties like changing polarity of a magnet. During summers the material absorbs heat and cools the room. And during winter we change the "polarity" So that it gives off the heat stored inside |
65,915 | I am imagining a story where people store heat in the summer for use in the winter and store cold in the winter for use in the summer, unleashing the appropriate temperature when needed.
But without hand-waving it away, how would such a thing work? I care not whether this device is magic or technology. (Keep in mind I'm not talking about currently known heat pump technology, which takes a lot of space, and transfers current temperatures from the ground and using the differential to change the building's comfort level.)
Whatever it is I want it to be about the size of a good sized urn, maybe working along the idea that if sat in a sunny place it would absorb heat and be able to release it at a later time, and if set in a cold / snowy place it can absorb cold, and have some sort of release valve. The amount of heat / cold stored would be proportional to the size of the vase. | 2016/12/25 | [
"https://worldbuilding.stackexchange.com/questions/65915",
"https://worldbuilding.stackexchange.com",
"https://worldbuilding.stackexchange.com/users/23009/"
] | We used to do this all the time, at least in the storing "cold" way. But it only worked on a very large scale. We used to have ice houses that would store huge quantities of ice. the buildings were well insulated and the ice that would last through to the next winter. they could be used for food storage because they stayed cold all year. <https://en.wikipedia.org/wiki/Ice_house_(building)>
lots of buildings work by storing the "cold" of night into the day and the heat of the day into the night to keep a mild temperature. there are several ways to do this but all require lots of mass. The simplest is just building really thick stone or earth walls.
the thermal inertia of something as small as an urn is just too small to work so you really will have to use hand waving magic. If you limit it to magic that stores or release energy on demand you can do this just fine.
I seem to remember a story where they did just that with specially carved stones of various sizes. one type could be prevented from warming (thus storing cold) and another could be prevented from radiating heat (thus storing heat) the cold ones were somewhat limited becasue they could not get colder than the coldest winter night, but the hot ones could reach some real extremes in temperature (they are warmed by sunlight so they can eventually reach the temperature of the surface of the sun, except they would melt first) to the point they were usually housed in metal frames to keep people from getting too close while active. I wish I could remember where I read that, it might have been a campaign setting.
This does mean you would need more cold stones than hot ones, and not just because it is easier to heat a room than cool it.
I have also seen a variation on this with a magical artifact that is always the same temprature, which just due to how temprature works will tend to bring any room it is in to the same temprature over time as long as it is not to big. if the temprature was set when you made each one you can get a lot of mileage out of the idea. make refrigerators in winter and bread ovens in summer. Or create your house climate control on a nice spring day. | You can base everything around buildings with high thermal mass coupled with High R-value insulation. You can look into things like Earthbag houses or even primitive Adobe, if you make the walls thick enough. line the exterior walls with bailed hay, which should give you an R-value of around 2 per inch, if I remember right, not counting the inherent properties of the earthbags or adobe.
Sure you end up with walls 3 foot thick, but they mean you have a very thermally efficient house, so long as you figure out how to insulate the roof well. There are even earthbag like constructions in a beehive shape that turn the wall into a roof, more or less.
Your vase of handwavium would have less heat to move around, allowing more flexibility with how you could do it.
Finally, you could just put everyone in hobbit holes, or dwarf mines. Underground temperatures require very little thermal interference to maintain the perfect temperature, so long as you get below the frost line. |
65,915 | I am imagining a story where people store heat in the summer for use in the winter and store cold in the winter for use in the summer, unleashing the appropriate temperature when needed.
But without hand-waving it away, how would such a thing work? I care not whether this device is magic or technology. (Keep in mind I'm not talking about currently known heat pump technology, which takes a lot of space, and transfers current temperatures from the ground and using the differential to change the building's comfort level.)
Whatever it is I want it to be about the size of a good sized urn, maybe working along the idea that if sat in a sunny place it would absorb heat and be able to release it at a later time, and if set in a cold / snowy place it can absorb cold, and have some sort of release valve. The amount of heat / cold stored would be proportional to the size of the vase. | 2016/12/25 | [
"https://worldbuilding.stackexchange.com/questions/65915",
"https://worldbuilding.stackexchange.com",
"https://worldbuilding.stackexchange.com/users/23009/"
] | We used to do this all the time, at least in the storing "cold" way. But it only worked on a very large scale. We used to have ice houses that would store huge quantities of ice. the buildings were well insulated and the ice that would last through to the next winter. they could be used for food storage because they stayed cold all year. <https://en.wikipedia.org/wiki/Ice_house_(building)>
lots of buildings work by storing the "cold" of night into the day and the heat of the day into the night to keep a mild temperature. there are several ways to do this but all require lots of mass. The simplest is just building really thick stone or earth walls.
the thermal inertia of something as small as an urn is just too small to work so you really will have to use hand waving magic. If you limit it to magic that stores or release energy on demand you can do this just fine.
I seem to remember a story where they did just that with specially carved stones of various sizes. one type could be prevented from warming (thus storing cold) and another could be prevented from radiating heat (thus storing heat) the cold ones were somewhat limited becasue they could not get colder than the coldest winter night, but the hot ones could reach some real extremes in temperature (they are warmed by sunlight so they can eventually reach the temperature of the surface of the sun, except they would melt first) to the point they were usually housed in metal frames to keep people from getting too close while active. I wish I could remember where I read that, it might have been a campaign setting.
This does mean you would need more cold stones than hot ones, and not just because it is easier to heat a room than cool it.
I have also seen a variation on this with a magical artifact that is always the same temprature, which just due to how temprature works will tend to bring any room it is in to the same temprature over time as long as it is not to big. if the temprature was set when you made each one you can get a lot of mileage out of the idea. make refrigerators in winter and bread ovens in summer. Or create your house climate control on a nice spring day. | huh... isn't the key to store cold/heat, the insulation of the vessel?
Lower the temperature of a fluid as much as you can - [nitrogen for example](https://en.wikipedia.org/wiki/Liquid_nitrogen) - and store in a container made of a [ferromagnetic material](https://en.wikipedia.org/wiki/Category:Ferromagnetic_materials) .
Keep the container in a [vacuum chamber](https://en.wikipedia.org/wiki/Vacuum_chamber) and [magnetically levitate](https://en.wikipedia.org/wiki/Magnetic_levitation) it.
You have the cold storage.
Do the same for a fluid heated as much as you can and you have heat storage.
The magic here would be to find ferromagnetic materials that can endure both very low and very high temperatures.
If the purpose is to heat/cool a room to a comfortable temperature for a human being, I think not much magic is needed. |
65,915 | I am imagining a story where people store heat in the summer for use in the winter and store cold in the winter for use in the summer, unleashing the appropriate temperature when needed.
But without hand-waving it away, how would such a thing work? I care not whether this device is magic or technology. (Keep in mind I'm not talking about currently known heat pump technology, which takes a lot of space, and transfers current temperatures from the ground and using the differential to change the building's comfort level.)
Whatever it is I want it to be about the size of a good sized urn, maybe working along the idea that if sat in a sunny place it would absorb heat and be able to release it at a later time, and if set in a cold / snowy place it can absorb cold, and have some sort of release valve. The amount of heat / cold stored would be proportional to the size of the vase. | 2016/12/25 | [
"https://worldbuilding.stackexchange.com/questions/65915",
"https://worldbuilding.stackexchange.com",
"https://worldbuilding.stackexchange.com/users/23009/"
] | Magic
=====
You said you don't care if it is magic or not. So the simple thing to do is use magic. Have some kind of magical storage device that takes charging. In the summer it absorbs heat and in the winter it releases it. | Fermilab once built a house over a 10 foot by 10 foot by 10 foot pool of water. During the winter, they pulled heat out of the water, making ice. During the summer, they pumped heat out of the house into the ice, air conditioning the house and melting the ice.
They said that this system worked surprising well.
Now, do you allow a magical heat pumps? Because making a heat pump will take some good manufacturing knowledge, such as making metal tubing.
Keep in mind, as well, that old houses allowed a lot of outside air in which greatly increases the load on the HVAC. Very well insulated homes need to cool they sweaty hot humans during the winter. Do you allow magical foam insulation? |
65,915 | I am imagining a story where people store heat in the summer for use in the winter and store cold in the winter for use in the summer, unleashing the appropriate temperature when needed.
But without hand-waving it away, how would such a thing work? I care not whether this device is magic or technology. (Keep in mind I'm not talking about currently known heat pump technology, which takes a lot of space, and transfers current temperatures from the ground and using the differential to change the building's comfort level.)
Whatever it is I want it to be about the size of a good sized urn, maybe working along the idea that if sat in a sunny place it would absorb heat and be able to release it at a later time, and if set in a cold / snowy place it can absorb cold, and have some sort of release valve. The amount of heat / cold stored would be proportional to the size of the vase. | 2016/12/25 | [
"https://worldbuilding.stackexchange.com/questions/65915",
"https://worldbuilding.stackexchange.com",
"https://worldbuilding.stackexchange.com/users/23009/"
] | Well as you haven't said much about size constraints, I'd suggest storing it in much the same way we do now, in something unimaginatively called [Thermal Storage](https://en.wikipedia.org/wiki/Thermal_energy_storage). Large mass of something with good insulation. When it gets hot, it stays hot and vice versa for the cold. I know of at least one molten salt heat storage system (I forget where), they used solar power to heat up the salt and the use the heat at night, I think it stored several Gigawatt-hours of energy and could remain hot for ages. For a 6 month shelf life, just beef up the insulation (there used to be a rumor that the insulation on the space shuttle's liquid hydrogen tanks was sooo good it could keep ice frozen for 12 years) | I agree with the answers/comments that the question is a bit too broad. If you want actually working stuff, then the molten salt storage or a heat pump (as suggested by others) would be the way to go. If you want it in a (small) urn, then you have to resort to magic. So, how to do it magically with an explanation?
**Maxwell's Demon**
If you don't want to just say "it's a magical urn [cough, cough, mumble, mumble]", then I suggest you make it contain a Maxwellian demon (well, I guess imp if it should fit a small urn).
[Maxwell's demon](https://en.m.wikipedia.org/wiki/Maxwell%27s_demon) is a thought experiment by Maxwell to show how the second law of thermodynamics (which say that the total amount of disorder (entropy) in a system has to increase) can be violated. The deamon will, in the thought experiment, choose which gas molecules which get to pass a barrier and, thus, over time the order of the system would increase since the demon would organize the molecules. This is disproven by noting that the demon need to spend energy to determine which molecule to put where and, thus, the global entropy will increse anyway even if some molecules get ordered. This is at least the case for a world without magic.
With magic allowed, the demon (or imp) would live in the urn and selectively choose which molecules get to interact with the urn. This would mean that on a warm day only high energetic molecules (i.e. the warm ones) get to interact with the urn, they lose energy during the interaction and cool down. On a cold day, the demon would do the opposite and only allow "cold" molecules to interact and they would thus gain energy from the storage in the urn. The urn itself can be of any outer material and contains an inner storage cage (to keep the demon/imp in), which is made from some enchanted metal. Inside the storage cage is the demon/imp (obviously) and a semi liquid or plasma-like magical goo which stores the energy. You could use some real compound with high heat capacity (e.g., water), but if you already went for a deamon, then a purple glowing magical goo would fit better. I would personally call the goo Thermoglium, Magmalite, or perhaps Maxwellate. |
23,400 | I have been searching for the title of a TOS-TNG crossover novel for some time. I believe it was published in the early 1990s, as I do not remember Voyager or DS9 being on TV. It was also before ST:Generations was made. I know it is not the novel Star Trek: Federation, as the two crews actually work together and meet one another. Also, I seem to remember that the front cover said something to the effect of, "at last, the generations meet!" | 2012/09/13 | [
"https://scifi.stackexchange.com/questions/23400",
"https://scifi.stackexchange.com",
"https://scifi.stackexchange.com/users/8770/"
] | How about [Star Trek: Crossover](http://memory-beta.wikia.com/wiki/Crossover_%28novel%29)? | Federation.
Published in 1994. I bought it at a Waldenbooks in a mall near Groton, CT when I was 18. I was right out of boot camp
<https://memory-alpha.fandom.com/wiki/Federation_(novel)>
 |
23,400 | I have been searching for the title of a TOS-TNG crossover novel for some time. I believe it was published in the early 1990s, as I do not remember Voyager or DS9 being on TV. It was also before ST:Generations was made. I know it is not the novel Star Trek: Federation, as the two crews actually work together and meet one another. Also, I seem to remember that the front cover said something to the effect of, "at last, the generations meet!" | 2012/09/13 | [
"https://scifi.stackexchange.com/questions/23400",
"https://scifi.stackexchange.com",
"https://scifi.stackexchange.com/users/8770/"
] | How about [Star Trek: Crossover](http://memory-beta.wikia.com/wiki/Crossover_%28novel%29)? | "At last, the generations meet" appears on the cover of the book, [Unification](https://memory-alpha.fandom.com/wiki/Unification_(novel))
[](https://i.stack.imgur.com/L84uU.png)
This is a novelization of the two-part TNG episode with the same name. I think that the only TOS character who appears, though, is Spock.
It was released in 1991. |
29,917 | I have heard conflicting instructions regarding primer on drywall, some saying one and some saying two coats. The bucket of Killz2 itself says reapply after 1 hr, implying two coats are needed (I am sure they want to sell more product). I have also heard varying customer feedback regarding Killz2.
Is it enough to apply just one coat of Killz2 primer on drywall or should I go with two? I have already done some painting with just a single coat and it turned out fine. | 2013/07/22 | [
"https://diy.stackexchange.com/questions/29917",
"https://diy.stackexchange.com",
"https://diy.stackexchange.com/users/9354/"
] | Well it isn't about how many coats it is about coverage. If all that you see is your white Killz then that is enough for all dry walls.
It is very hard to say 1 vs 2 coats. I paint heavy. One of my coats my be 1.5-2 of another person's. Your paint benefits from primer not the primer that is under the primer.
Now for wet applications (bathrooms mainly) I might put on 2 thick coats of something like killz to act as a greater barrier not to help the painting process.
Note - I have a paint crew that used to work for me. Their paint jobs looks perfect. They used two coats. But their first primer coat was thin (half mine) and there were definitely coverage issues. They were efficient vs my heavy style of just get it over with. They probably got their two coats on faster than my one but they did have to wait for drying time in between... and without the heavy hand theirs looked smoother. | I apply 2 coats when I'm covering a strong color, or when covering serious stains on the wall.
The original Killz is oil based and I've heard that it covers better, but I've had no issues with a single coat over drywall using the water-based Killz2.
However, when I use Killz2 on raw wood, I use 2 coats. That is mostly because I sand in between coats to get a good clean finish.
Bottom line, if you can still see the color or patches of color after the first coat, either coat again, or spot coat. |
29,917 | I have heard conflicting instructions regarding primer on drywall, some saying one and some saying two coats. The bucket of Killz2 itself says reapply after 1 hr, implying two coats are needed (I am sure they want to sell more product). I have also heard varying customer feedback regarding Killz2.
Is it enough to apply just one coat of Killz2 primer on drywall or should I go with two? I have already done some painting with just a single coat and it turned out fine. | 2013/07/22 | [
"https://diy.stackexchange.com/questions/29917",
"https://diy.stackexchange.com",
"https://diy.stackexchange.com/users/9354/"
] | Yes one coat should be plenty for new drywall, you can get it tinted to be similar to your final paint color also to limit the number of paint coats you need after the primer potentially. | I apply 2 coats when I'm covering a strong color, or when covering serious stains on the wall.
The original Killz is oil based and I've heard that it covers better, but I've had no issues with a single coat over drywall using the water-based Killz2.
However, when I use Killz2 on raw wood, I use 2 coats. That is mostly because I sand in between coats to get a good clean finish.
Bottom line, if you can still see the color or patches of color after the first coat, either coat again, or spot coat. |
29,917 | I have heard conflicting instructions regarding primer on drywall, some saying one and some saying two coats. The bucket of Killz2 itself says reapply after 1 hr, implying two coats are needed (I am sure they want to sell more product). I have also heard varying customer feedback regarding Killz2.
Is it enough to apply just one coat of Killz2 primer on drywall or should I go with two? I have already done some painting with just a single coat and it turned out fine. | 2013/07/22 | [
"https://diy.stackexchange.com/questions/29917",
"https://diy.stackexchange.com",
"https://diy.stackexchange.com/users/9354/"
] | I apply 2 coats when I'm covering a strong color, or when covering serious stains on the wall.
The original Killz is oil based and I've heard that it covers better, but I've had no issues with a single coat over drywall using the water-based Killz2.
However, when I use Killz2 on raw wood, I use 2 coats. That is mostly because I sand in between coats to get a good clean finish.
Bottom line, if you can still see the color or patches of color after the first coat, either coat again, or spot coat. | On my bathroom that had stains I used two coats... on my other bathrooms that has no stains, I will use two coats - because simply put, bathrooms are things you want to have the safest possible result and that implies all possible barriers between water, steam and drywall ... or they become wetwalls and that ain't no good.
On top of that.... you are already up to the neck on the job, might as well go above and beyond to save future trouble.
I's say two on bathroms; one *very well done* in other rooms. |
29,917 | I have heard conflicting instructions regarding primer on drywall, some saying one and some saying two coats. The bucket of Killz2 itself says reapply after 1 hr, implying two coats are needed (I am sure they want to sell more product). I have also heard varying customer feedback regarding Killz2.
Is it enough to apply just one coat of Killz2 primer on drywall or should I go with two? I have already done some painting with just a single coat and it turned out fine. | 2013/07/22 | [
"https://diy.stackexchange.com/questions/29917",
"https://diy.stackexchange.com",
"https://diy.stackexchange.com/users/9354/"
] | Well it isn't about how many coats it is about coverage. If all that you see is your white Killz then that is enough for all dry walls.
It is very hard to say 1 vs 2 coats. I paint heavy. One of my coats my be 1.5-2 of another person's. Your paint benefits from primer not the primer that is under the primer.
Now for wet applications (bathrooms mainly) I might put on 2 thick coats of something like killz to act as a greater barrier not to help the painting process.
Note - I have a paint crew that used to work for me. Their paint jobs looks perfect. They used two coats. But their first primer coat was thin (half mine) and there were definitely coverage issues. They were efficient vs my heavy style of just get it over with. They probably got their two coats on faster than my one but they did have to wait for drying time in between... and without the heavy hand theirs looked smoother. | On my bathroom that had stains I used two coats... on my other bathrooms that has no stains, I will use two coats - because simply put, bathrooms are things you want to have the safest possible result and that implies all possible barriers between water, steam and drywall ... or they become wetwalls and that ain't no good.
On top of that.... you are already up to the neck on the job, might as well go above and beyond to save future trouble.
I's say two on bathroms; one *very well done* in other rooms. |
29,917 | I have heard conflicting instructions regarding primer on drywall, some saying one and some saying two coats. The bucket of Killz2 itself says reapply after 1 hr, implying two coats are needed (I am sure they want to sell more product). I have also heard varying customer feedback regarding Killz2.
Is it enough to apply just one coat of Killz2 primer on drywall or should I go with two? I have already done some painting with just a single coat and it turned out fine. | 2013/07/22 | [
"https://diy.stackexchange.com/questions/29917",
"https://diy.stackexchange.com",
"https://diy.stackexchange.com/users/9354/"
] | Yes one coat should be plenty for new drywall, you can get it tinted to be similar to your final paint color also to limit the number of paint coats you need after the primer potentially. | On my bathroom that had stains I used two coats... on my other bathrooms that has no stains, I will use two coats - because simply put, bathrooms are things you want to have the safest possible result and that implies all possible barriers between water, steam and drywall ... or they become wetwalls and that ain't no good.
On top of that.... you are already up to the neck on the job, might as well go above and beyond to save future trouble.
I's say two on bathroms; one *very well done* in other rooms. |
9,629,687 | I have a try-catch statement in a Java servlet class. Netbeans shows an error on this:
>
> try-with-resources is not supported in -source 1.6
> (use -source 7 or higher to enable try-with-resources)
>
>
>
How can I get rid of this error? | 2012/03/09 | [
"https://Stackoverflow.com/questions/9629687",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/1253758/"
] | It looks like you found my thread from the NetBeans forums, in which I posted the solution:
>
> I got the error to go away.
>
>
> Right click on project > Properties > Sources > Source/Binary Format:
> JDK 7 > OK.
>
>
>
Source:
* Error: "try-with-resources is not supported in -source 6 (use -source 7 or higher to enable try-with-resources)":
<http://forums.netbeans.org/ntopic42154.html> | Ok it didn't work for me. Because in "Source/Binary Format:" there isn't "JDK 7".
My solution was: Right click on project > Properties > Libraries > Manage Plataforms > Add Plataform, and choose your "jdk1.7.0\_45" directory click on NEXT put a name "JDK 1.7" and FINISH.
Now you can modify your source format: Right click on project > Properties > Sources > Source/Binary Format: JDK 7 > OK. |
8,409 | What types of algorithms that are capable of signing a message are out there that run on a physical level, e.g. lacking the infrastructure of a standard PC, no memory, processor or motherboard in the traditional sense?
I'm curious whether there are some strong really low level implementations (if these statements don't contradict each other) | 2013/05/18 | [
"https://crypto.stackexchange.com/questions/8409",
"https://crypto.stackexchange.com",
"https://crypto.stackexchange.com/users/6967/"
] | It is well known that you can compute any combinatoric function (and hence, any encryption method) with a sufficient number of NAND gates, and so the answer to your question would appear to be "yes, any algorithm is able to run on a "physical level", without a fancy GUI, multitheaded operating system, memory, processor or even a motherboard".
However, I do notice that in the question title, you mention "Encryption", while in the text, you mention "Signing". Now, we in the cryptographical community use those terms to mean rather different things:
* Encryption means a method of transforming the data in such a way that someone without the 'key' cannot read it (but someone with the key can).
* Signing means a method of producing a tag with the data and a 'private key', in such a way that someone with the 'public key' can verify that the data and the tag correspond to each other.
In addition, there is a third option, which we don't call signing, but is sometimes confused with it:
* A Message Authentication Code (MAC) is a method of producing a tag with the data and a 'key' in such a way that someone else with the 'key' can verify that the data and the tag correspond to each other.
Signatures and MAC do sound similar; the distinction is that with a MAC, the person authenticating the MAC can also generate valid MACs if he wants; with a signature, someone with only the public key cannot generate valid signatures. This is a distinction that sometimes comes in handy, however known signature methods are considerably more expensive than MACs. Because of this, we never use a signature unless we need this additional property.
Now that we have defined the terms, we can get back to your question: is your question about encryption, signature generation or MACs?
Well, in practice, it is quite possible to encrypt data or generate MACs without any processor being involved, and we actually sometimes do it in practice.
When we're talking about generating signatures, well, it's more questionable. Generating a signature is considerably more complex; you could do it without an internal processor (using a pile of NAND gates), however, it's not clear why anyone would choose to. I don't know the internals of every crypto chip that does signatures (or even the internals of everything I've used), but of the ones that I do know, they all have an internal processor involved (at the very least, to orchestrate the signature process) | There are [cryptography algorithms for hardware applications](http://www.ecrypt.eu.org/stream/) with restricted resources such as limited storage, gate count, or power consumption. and as @rath said There are some ASICs that do specialized crypto such as SHA or AES. But:
What is the communication protocol?
Is the communication protocol implemented on the hardware?
Which part of data should be encrypted?
And many other questions about structure and protocol......?
If the protocol is TCP/IP and HTTP header of packets should not be encrypted. And the hardware should separate header and data part. All such processes needs processing on the hardware. [SecNet 54](http://rf.harris.com/capabilities/communications-security/secnet.asp) is a hardware that has physical level encryption but building such a hardware can be technically complicated. |
148,880 | So I've been looking into bldc and motor drivers lately (ESCs). Generally larger the BLDC motor the larger the FETs need to be in order to suppluly needed current. One can do this either by using a higher powered FET or stacking them up (quite literally). Tesla cars use motors that are quite large. How large do the FETs need to be to run them? | 2015/01/13 | [
"https://electronics.stackexchange.com/questions/148880",
"https://electronics.stackexchange.com",
"https://electronics.stackexchange.com/users/23573/"
] | A little googling suggests these are the parts [IXGX72N60](http://ixapps.ixys.com/DataSheet/DS100011A(IXGX72N60C3H1%29.pdf) | They don't use MOSFETs at all- they'd be too expensive in such high voltage (375V battery voltage). They use IGBTs, in banks amounting to something like [66-72 total](http://auto.howstuffworks.com/tesla-roadster.htm) of them for all three phases, reportedly.
The Tesla motor can (briefly) produce something like 400HP (300kW)- some of the data says 185kW which may be more sustainable- which implies currents in the 250-800A region. So maybe 60A/600V IGBTs, but I'm not sure anyone has publicly given the part number.
Nice car by the way, a colleague has one. |
37,345 | In the movie Inside Out, I found that the personified emotions Anger and Fear inside the main character (Riley) are **male** whereas Joy, Disgust and Sadness are **female**. Is there any reason why it has been designed like that for a 11 year old girl?
In [the second trailer,](https://www.youtube.com/watch?v=_MC3XuMvsDI) we see that the emotions inside the mother are all female, while the ones inside the father are all male. On top of that, while each emotion (Anger, Joy, etc) look alike from person to person, all the emotions inside the mother and the father look like them (The mother's emotions all have her same haircut & glasses, the father's have his haircut & mustache).
Is there a in world or out of universe explanation for the mix & match look of Riley's emotions?
 | 2015/06/28 | [
"https://movies.stackexchange.com/questions/37345",
"https://movies.stackexchange.com",
"https://movies.stackexchange.com/users/6314/"
] | Director Pete Docter and Pixar founder John Lasseter explain why Riley's emotions are mixed while her parents' are not.
First, the parents' emotions are due to both emotional development and story and acting flow:
>
> I [Docter] remember, we talked to John and he said, ‘Well, I thought you did it because, as adults, we become more kind of set in our ways. As a kid, you can... anywhere is possible.’
>
>
> Docter said that they were ultimately two things that were absolutely vital to the scene: clarity and comedy. Had Riley’s parents both had multi-gendered emotions like their daughter, the scene would have been going back between 18 different characters, and it was a bit unruly unless everyone was identifiable. Not only did making the emotions gender specific in the parents make the sequence easier to follow, but it also opened up an opportunity to create a few extra laughs.
> Explained the director:
>
> **For the comedy of it, we’re cutting between 18 characters and 4 locations in that dinner scene, so we just went broad with it - kind of how SNL would do it. They all have like dopey obvious mustaches or big red glasses so that you’re instantly clear on, ‘Oh, it’s mom; it’s dad.’** <http://www.cinemablend.com/new/Why-Inside-Out-Main-Character-Has-Male-Female-Emotions-72176.html>
>
>
>
So the parents are simplified to make the scene easier to follow, and because as Adults, they have already developed their adult personality/emotions. Riley has not yet.
>
> ***Interviewer:*** *What was the thought process behind the genders of the emotions?*
>
> **Docter:** Again, it was intuitive. It felt to me like Anger's very masculine, I don't know why. And then some of it came to casting... Sadness felt a little more feminine and Mindy Kahling as Disgust felt right. And someone balanced too. Plus the female roles lead because it's inside a girl. With mom and dad, we skewed them all male and all female for a quick read, because you have to understand where we are, which is a little phony but hopefully people don't mind! <http://www.empireonline.com/empireblogs/empire-states/post/p1463>
>
>
>
So in short, Riley's emotions are mixed because, as a pre-teen, she's likely not to have developed a strict outer personality. She's still growing, and developing her own style. She's still raw and malleable, impressionable. Secondary to this is of course the rule of funny. Having some of the emotions as male is purely for show. | The times when you see emotions in other people's heads the character models are designed to look like the ones for Riley dressed up as the character. All of "dad's" emotions are just wearing short hair and a mustache. Mom's emotions with the exception of sadness are dressed like her. In the end credits the "emotions in costume" bit is even more obvious.
So for the sake of making the characters and settings memorable when we're not in Riley's head the characters are themed to look like that person. |
37,345 | In the movie Inside Out, I found that the personified emotions Anger and Fear inside the main character (Riley) are **male** whereas Joy, Disgust and Sadness are **female**. Is there any reason why it has been designed like that for a 11 year old girl?
In [the second trailer,](https://www.youtube.com/watch?v=_MC3XuMvsDI) we see that the emotions inside the mother are all female, while the ones inside the father are all male. On top of that, while each emotion (Anger, Joy, etc) look alike from person to person, all the emotions inside the mother and the father look like them (The mother's emotions all have her same haircut & glasses, the father's have his haircut & mustache).
Is there a in world or out of universe explanation for the mix & match look of Riley's emotions?
 | 2015/06/28 | [
"https://movies.stackexchange.com/questions/37345",
"https://movies.stackexchange.com",
"https://movies.stackexchange.com/users/6314/"
] | Director Pete Docter and Pixar founder John Lasseter explain why Riley's emotions are mixed while her parents' are not.
First, the parents' emotions are due to both emotional development and story and acting flow:
>
> I [Docter] remember, we talked to John and he said, ‘Well, I thought you did it because, as adults, we become more kind of set in our ways. As a kid, you can... anywhere is possible.’
>
>
> Docter said that they were ultimately two things that were absolutely vital to the scene: clarity and comedy. Had Riley’s parents both had multi-gendered emotions like their daughter, the scene would have been going back between 18 different characters, and it was a bit unruly unless everyone was identifiable. Not only did making the emotions gender specific in the parents make the sequence easier to follow, but it also opened up an opportunity to create a few extra laughs.
> Explained the director:
>
> **For the comedy of it, we’re cutting between 18 characters and 4 locations in that dinner scene, so we just went broad with it - kind of how SNL would do it. They all have like dopey obvious mustaches or big red glasses so that you’re instantly clear on, ‘Oh, it’s mom; it’s dad.’** <http://www.cinemablend.com/new/Why-Inside-Out-Main-Character-Has-Male-Female-Emotions-72176.html>
>
>
>
So the parents are simplified to make the scene easier to follow, and because as Adults, they have already developed their adult personality/emotions. Riley has not yet.
>
> ***Interviewer:*** *What was the thought process behind the genders of the emotions?*
>
> **Docter:** Again, it was intuitive. It felt to me like Anger's very masculine, I don't know why. And then some of it came to casting... Sadness felt a little more feminine and Mindy Kahling as Disgust felt right. And someone balanced too. Plus the female roles lead because it's inside a girl. With mom and dad, we skewed them all male and all female for a quick read, because you have to understand where we are, which is a little phony but hopefully people don't mind! <http://www.empireonline.com/empireblogs/empire-states/post/p1463>
>
>
>
So in short, Riley's emotions are mixed because, as a pre-teen, she's likely not to have developed a strict outer personality. She's still growing, and developing her own style. She's still raw and malleable, impressionable. Secondary to this is of course the rule of funny. Having some of the emotions as male is purely for show. | The reasons of comedy and drama, as described by Word of God in cde's answer, are clearly the most important. Diverse cast of Riley's emotions makes the movie more interesting.
I would like to add three complementary points no one else mentioned:
**1. Sexism**
Once we assume that all emotions in one's head must have [gender](https://en.wikipedia.org/wiki/Gender) and it must be similar to person's [assigned gender](http://gender.wikia.com/wiki/Assigned_Sex), we start slipping into deep sexist swamp where only "Woman's Tears", "Man's Rage" and other non-objective abominations dwell.
Fortunately, Inside Out is far from being sexist. While Riley has some stereotypical "girlish" traits, they are affectionately deconstructed all the time. Moreover, Riley is shown as a plucky, independent girl: she plays hockey, talks back to her parents, and her inner life is not limited to Imaginary Boyfriend Machine.
**2. Family**
Note that Riley's Sadness looks like a daughter of mom's Sadness, and Riley's Anger is a younger version of dad's Anger, sans the moustache. It can emphasize the fact that Riley has inherited the traits of both of her parents. Her dad taught her how to be fair and assertive, and her mom taught her how to understand other people.
**3. Main vs supporting emotions**
While Riley has all kinds of "men", "women" and "monsters" in her head, her two most important emotions are Joy and Sadness, who are "female". They are her avatars in her inner journey; and the three remaining emotions, Fear, Anger and Disgust, serve their role only in *specific* situations (eating broccoli, playing hockey, dealing with electric cables). Their attempt to drive Riley for a prolonged period of time was a desperate measure and almost led to a disaster.
It's arguably easy to imagine "female" Fear and "male" Disgust, or even "female" Anger similar to mom's. But imagine for a second that either Joy or Sadness is "male". Or even both. That would raise *a lot* more questions.
So, while diversity is respected and silly gender stereotypes are mocked, Riley is still a vanilla [cisgender](https://en.wikipedia.org/wiki/Cisgender) girl. She is not exactly an old-style Disney princess, but on the other hand she is not [an asexual introvert](http://www.imdb.com/title/tt2294629/), or a [crossdresser](http://www.imdb.com/title/tt0120762/), or [into hairy guys](http://www.imdb.com/title/tt0101414/). See? Nothing to worry about. |
37,345 | In the movie Inside Out, I found that the personified emotions Anger and Fear inside the main character (Riley) are **male** whereas Joy, Disgust and Sadness are **female**. Is there any reason why it has been designed like that for a 11 year old girl?
In [the second trailer,](https://www.youtube.com/watch?v=_MC3XuMvsDI) we see that the emotions inside the mother are all female, while the ones inside the father are all male. On top of that, while each emotion (Anger, Joy, etc) look alike from person to person, all the emotions inside the mother and the father look like them (The mother's emotions all have her same haircut & glasses, the father's have his haircut & mustache).
Is there a in world or out of universe explanation for the mix & match look of Riley's emotions?
 | 2015/06/28 | [
"https://movies.stackexchange.com/questions/37345",
"https://movies.stackexchange.com",
"https://movies.stackexchange.com/users/6314/"
] | Director Pete Docter and Pixar founder John Lasseter explain why Riley's emotions are mixed while her parents' are not.
First, the parents' emotions are due to both emotional development and story and acting flow:
>
> I [Docter] remember, we talked to John and he said, ‘Well, I thought you did it because, as adults, we become more kind of set in our ways. As a kid, you can... anywhere is possible.’
>
>
> Docter said that they were ultimately two things that were absolutely vital to the scene: clarity and comedy. Had Riley’s parents both had multi-gendered emotions like their daughter, the scene would have been going back between 18 different characters, and it was a bit unruly unless everyone was identifiable. Not only did making the emotions gender specific in the parents make the sequence easier to follow, but it also opened up an opportunity to create a few extra laughs.
> Explained the director:
>
> **For the comedy of it, we’re cutting between 18 characters and 4 locations in that dinner scene, so we just went broad with it - kind of how SNL would do it. They all have like dopey obvious mustaches or big red glasses so that you’re instantly clear on, ‘Oh, it’s mom; it’s dad.’** <http://www.cinemablend.com/new/Why-Inside-Out-Main-Character-Has-Male-Female-Emotions-72176.html>
>
>
>
So the parents are simplified to make the scene easier to follow, and because as Adults, they have already developed their adult personality/emotions. Riley has not yet.
>
> ***Interviewer:*** *What was the thought process behind the genders of the emotions?*
>
> **Docter:** Again, it was intuitive. It felt to me like Anger's very masculine, I don't know why. And then some of it came to casting... Sadness felt a little more feminine and Mindy Kahling as Disgust felt right. And someone balanced too. Plus the female roles lead because it's inside a girl. With mom and dad, we skewed them all male and all female for a quick read, because you have to understand where we are, which is a little phony but hopefully people don't mind! <http://www.empireonline.com/empireblogs/empire-states/post/p1463>
>
>
>
So in short, Riley's emotions are mixed because, as a pre-teen, she's likely not to have developed a strict outer personality. She's still growing, and developing her own style. She's still raw and malleable, impressionable. Secondary to this is of course the rule of funny. Having some of the emotions as male is purely for show. | As the film makers seem to suggest, I think the choice of diverse ages and sexes for each character inside Riley's mind as opposed to the more uniform characters of the parents was made mainly for dramatic and comedic purposes with the possible acception of Joy.
The film plays a little fast and loose with various psychological theories and is a mash up of many different schools of thought. In the case of joy I felt that the film took some cues character wise from the model of John Bowlby's attachment theory, the accepted central drive of most modern psychology.
Joy is 'born' as a reflection of the mothers gaze right at the beginning of the film and of Riley's life. Joy is taller and more the mothers age and temperament than the other characters of Riley's mind, so as well as representing the emotion of joy, she seemed to also perhaps be representative of the girl's central attachment figure. An internalised figure we install in our minds of our main attachment figure in the outside world, usually the mother, who acts, at least within secure attachment, as a sort of internal guardian. A sympathetic and positive figure who is consistently supportive and loving, from which we build and maintain a strong sense of self and independence.
As if to verify this, Joy refers at the beginning and end of the film to Riley as 'our little girl', a common way of thinking of 'our' selves through the internal attachment figure of others. Riley displays a fear of loosing her attachment both external and internal, 'family' island turns grey and crumbles, not because she is sad but because she will not allow herself to be. In line with an insecure attachment style she becomes fearful of showing not so much her sadness but her vulnerability.
When she allows herself to be vulnerable at the end in front of her parents and they accept that then Joy can return because secure attachment is strengthened externally and internally, family island (or rather the positive internalised attachment figure of her real parents) is rejuvenated and strengthened, this enables her to form a new secure base not only in San Francisco but also within her psyche, from which she can go out from and return.
In line with this theory it would make some sense that the more mature characters of the mother and father have developed away from the internalised attachment figure of their parents and developed a more uniform reflection of self, hence why their internal characters look the same.
After Riley grows at the end of the film she gains emotional complexity and her emotions become less separate, perhaps another reason why the adult emotions have become more homogenous and alike. But we are moving outside accepted theory here and into Pixar land where thankfully, at least for entertainments sake, anything goes.
Strength is born from accepted and shared vulnerability. A powerful film which I hope will inspire people to discover the joy and strength of secure and earned secure attachment. |
37,345 | In the movie Inside Out, I found that the personified emotions Anger and Fear inside the main character (Riley) are **male** whereas Joy, Disgust and Sadness are **female**. Is there any reason why it has been designed like that for a 11 year old girl?
In [the second trailer,](https://www.youtube.com/watch?v=_MC3XuMvsDI) we see that the emotions inside the mother are all female, while the ones inside the father are all male. On top of that, while each emotion (Anger, Joy, etc) look alike from person to person, all the emotions inside the mother and the father look like them (The mother's emotions all have her same haircut & glasses, the father's have his haircut & mustache).
Is there a in world or out of universe explanation for the mix & match look of Riley's emotions?
 | 2015/06/28 | [
"https://movies.stackexchange.com/questions/37345",
"https://movies.stackexchange.com",
"https://movies.stackexchange.com/users/6314/"
] | The reasons of comedy and drama, as described by Word of God in cde's answer, are clearly the most important. Diverse cast of Riley's emotions makes the movie more interesting.
I would like to add three complementary points no one else mentioned:
**1. Sexism**
Once we assume that all emotions in one's head must have [gender](https://en.wikipedia.org/wiki/Gender) and it must be similar to person's [assigned gender](http://gender.wikia.com/wiki/Assigned_Sex), we start slipping into deep sexist swamp where only "Woman's Tears", "Man's Rage" and other non-objective abominations dwell.
Fortunately, Inside Out is far from being sexist. While Riley has some stereotypical "girlish" traits, they are affectionately deconstructed all the time. Moreover, Riley is shown as a plucky, independent girl: she plays hockey, talks back to her parents, and her inner life is not limited to Imaginary Boyfriend Machine.
**2. Family**
Note that Riley's Sadness looks like a daughter of mom's Sadness, and Riley's Anger is a younger version of dad's Anger, sans the moustache. It can emphasize the fact that Riley has inherited the traits of both of her parents. Her dad taught her how to be fair and assertive, and her mom taught her how to understand other people.
**3. Main vs supporting emotions**
While Riley has all kinds of "men", "women" and "monsters" in her head, her two most important emotions are Joy and Sadness, who are "female". They are her avatars in her inner journey; and the three remaining emotions, Fear, Anger and Disgust, serve their role only in *specific* situations (eating broccoli, playing hockey, dealing with electric cables). Their attempt to drive Riley for a prolonged period of time was a desperate measure and almost led to a disaster.
It's arguably easy to imagine "female" Fear and "male" Disgust, or even "female" Anger similar to mom's. But imagine for a second that either Joy or Sadness is "male". Or even both. That would raise *a lot* more questions.
So, while diversity is respected and silly gender stereotypes are mocked, Riley is still a vanilla [cisgender](https://en.wikipedia.org/wiki/Cisgender) girl. She is not exactly an old-style Disney princess, but on the other hand she is not [an asexual introvert](http://www.imdb.com/title/tt2294629/), or a [crossdresser](http://www.imdb.com/title/tt0120762/), or [into hairy guys](http://www.imdb.com/title/tt0101414/). See? Nothing to worry about. | The times when you see emotions in other people's heads the character models are designed to look like the ones for Riley dressed up as the character. All of "dad's" emotions are just wearing short hair and a mustache. Mom's emotions with the exception of sadness are dressed like her. In the end credits the "emotions in costume" bit is even more obvious.
So for the sake of making the characters and settings memorable when we're not in Riley's head the characters are themed to look like that person. |
37,345 | In the movie Inside Out, I found that the personified emotions Anger and Fear inside the main character (Riley) are **male** whereas Joy, Disgust and Sadness are **female**. Is there any reason why it has been designed like that for a 11 year old girl?
In [the second trailer,](https://www.youtube.com/watch?v=_MC3XuMvsDI) we see that the emotions inside the mother are all female, while the ones inside the father are all male. On top of that, while each emotion (Anger, Joy, etc) look alike from person to person, all the emotions inside the mother and the father look like them (The mother's emotions all have her same haircut & glasses, the father's have his haircut & mustache).
Is there a in world or out of universe explanation for the mix & match look of Riley's emotions?
 | 2015/06/28 | [
"https://movies.stackexchange.com/questions/37345",
"https://movies.stackexchange.com",
"https://movies.stackexchange.com/users/6314/"
] | As the film makers seem to suggest, I think the choice of diverse ages and sexes for each character inside Riley's mind as opposed to the more uniform characters of the parents was made mainly for dramatic and comedic purposes with the possible acception of Joy.
The film plays a little fast and loose with various psychological theories and is a mash up of many different schools of thought. In the case of joy I felt that the film took some cues character wise from the model of John Bowlby's attachment theory, the accepted central drive of most modern psychology.
Joy is 'born' as a reflection of the mothers gaze right at the beginning of the film and of Riley's life. Joy is taller and more the mothers age and temperament than the other characters of Riley's mind, so as well as representing the emotion of joy, she seemed to also perhaps be representative of the girl's central attachment figure. An internalised figure we install in our minds of our main attachment figure in the outside world, usually the mother, who acts, at least within secure attachment, as a sort of internal guardian. A sympathetic and positive figure who is consistently supportive and loving, from which we build and maintain a strong sense of self and independence.
As if to verify this, Joy refers at the beginning and end of the film to Riley as 'our little girl', a common way of thinking of 'our' selves through the internal attachment figure of others. Riley displays a fear of loosing her attachment both external and internal, 'family' island turns grey and crumbles, not because she is sad but because she will not allow herself to be. In line with an insecure attachment style she becomes fearful of showing not so much her sadness but her vulnerability.
When she allows herself to be vulnerable at the end in front of her parents and they accept that then Joy can return because secure attachment is strengthened externally and internally, family island (or rather the positive internalised attachment figure of her real parents) is rejuvenated and strengthened, this enables her to form a new secure base not only in San Francisco but also within her psyche, from which she can go out from and return.
In line with this theory it would make some sense that the more mature characters of the mother and father have developed away from the internalised attachment figure of their parents and developed a more uniform reflection of self, hence why their internal characters look the same.
After Riley grows at the end of the film she gains emotional complexity and her emotions become less separate, perhaps another reason why the adult emotions have become more homogenous and alike. But we are moving outside accepted theory here and into Pixar land where thankfully, at least for entertainments sake, anything goes.
Strength is born from accepted and shared vulnerability. A powerful film which I hope will inspire people to discover the joy and strength of secure and earned secure attachment. | The times when you see emotions in other people's heads the character models are designed to look like the ones for Riley dressed up as the character. All of "dad's" emotions are just wearing short hair and a mustache. Mom's emotions with the exception of sadness are dressed like her. In the end credits the "emotions in costume" bit is even more obvious.
So for the sake of making the characters and settings memorable when we're not in Riley's head the characters are themed to look like that person. |
37,345 | In the movie Inside Out, I found that the personified emotions Anger and Fear inside the main character (Riley) are **male** whereas Joy, Disgust and Sadness are **female**. Is there any reason why it has been designed like that for a 11 year old girl?
In [the second trailer,](https://www.youtube.com/watch?v=_MC3XuMvsDI) we see that the emotions inside the mother are all female, while the ones inside the father are all male. On top of that, while each emotion (Anger, Joy, etc) look alike from person to person, all the emotions inside the mother and the father look like them (The mother's emotions all have her same haircut & glasses, the father's have his haircut & mustache).
Is there a in world or out of universe explanation for the mix & match look of Riley's emotions?
 | 2015/06/28 | [
"https://movies.stackexchange.com/questions/37345",
"https://movies.stackexchange.com",
"https://movies.stackexchange.com/users/6314/"
] | The reasons of comedy and drama, as described by Word of God in cde's answer, are clearly the most important. Diverse cast of Riley's emotions makes the movie more interesting.
I would like to add three complementary points no one else mentioned:
**1. Sexism**
Once we assume that all emotions in one's head must have [gender](https://en.wikipedia.org/wiki/Gender) and it must be similar to person's [assigned gender](http://gender.wikia.com/wiki/Assigned_Sex), we start slipping into deep sexist swamp where only "Woman's Tears", "Man's Rage" and other non-objective abominations dwell.
Fortunately, Inside Out is far from being sexist. While Riley has some stereotypical "girlish" traits, they are affectionately deconstructed all the time. Moreover, Riley is shown as a plucky, independent girl: she plays hockey, talks back to her parents, and her inner life is not limited to Imaginary Boyfriend Machine.
**2. Family**
Note that Riley's Sadness looks like a daughter of mom's Sadness, and Riley's Anger is a younger version of dad's Anger, sans the moustache. It can emphasize the fact that Riley has inherited the traits of both of her parents. Her dad taught her how to be fair and assertive, and her mom taught her how to understand other people.
**3. Main vs supporting emotions**
While Riley has all kinds of "men", "women" and "monsters" in her head, her two most important emotions are Joy and Sadness, who are "female". They are her avatars in her inner journey; and the three remaining emotions, Fear, Anger and Disgust, serve their role only in *specific* situations (eating broccoli, playing hockey, dealing with electric cables). Their attempt to drive Riley for a prolonged period of time was a desperate measure and almost led to a disaster.
It's arguably easy to imagine "female" Fear and "male" Disgust, or even "female" Anger similar to mom's. But imagine for a second that either Joy or Sadness is "male". Or even both. That would raise *a lot* more questions.
So, while diversity is respected and silly gender stereotypes are mocked, Riley is still a vanilla [cisgender](https://en.wikipedia.org/wiki/Cisgender) girl. She is not exactly an old-style Disney princess, but on the other hand she is not [an asexual introvert](http://www.imdb.com/title/tt2294629/), or a [crossdresser](http://www.imdb.com/title/tt0120762/), or [into hairy guys](http://www.imdb.com/title/tt0101414/). See? Nothing to worry about. | As the film makers seem to suggest, I think the choice of diverse ages and sexes for each character inside Riley's mind as opposed to the more uniform characters of the parents was made mainly for dramatic and comedic purposes with the possible acception of Joy.
The film plays a little fast and loose with various psychological theories and is a mash up of many different schools of thought. In the case of joy I felt that the film took some cues character wise from the model of John Bowlby's attachment theory, the accepted central drive of most modern psychology.
Joy is 'born' as a reflection of the mothers gaze right at the beginning of the film and of Riley's life. Joy is taller and more the mothers age and temperament than the other characters of Riley's mind, so as well as representing the emotion of joy, she seemed to also perhaps be representative of the girl's central attachment figure. An internalised figure we install in our minds of our main attachment figure in the outside world, usually the mother, who acts, at least within secure attachment, as a sort of internal guardian. A sympathetic and positive figure who is consistently supportive and loving, from which we build and maintain a strong sense of self and independence.
As if to verify this, Joy refers at the beginning and end of the film to Riley as 'our little girl', a common way of thinking of 'our' selves through the internal attachment figure of others. Riley displays a fear of loosing her attachment both external and internal, 'family' island turns grey and crumbles, not because she is sad but because she will not allow herself to be. In line with an insecure attachment style she becomes fearful of showing not so much her sadness but her vulnerability.
When she allows herself to be vulnerable at the end in front of her parents and they accept that then Joy can return because secure attachment is strengthened externally and internally, family island (or rather the positive internalised attachment figure of her real parents) is rejuvenated and strengthened, this enables her to form a new secure base not only in San Francisco but also within her psyche, from which she can go out from and return.
In line with this theory it would make some sense that the more mature characters of the mother and father have developed away from the internalised attachment figure of their parents and developed a more uniform reflection of self, hence why their internal characters look the same.
After Riley grows at the end of the film she gains emotional complexity and her emotions become less separate, perhaps another reason why the adult emotions have become more homogenous and alike. But we are moving outside accepted theory here and into Pixar land where thankfully, at least for entertainments sake, anything goes.
Strength is born from accepted and shared vulnerability. A powerful film which I hope will inspire people to discover the joy and strength of secure and earned secure attachment. |
33,812 | As a European citizen I am somewhat puzzled by how American credit scores work. The US is one of the few, possibly the only country where such a strong focus is put on the utilization history of personal credit (cards), to the point where people try to work out the best strategy to optimising their credit score.
As I understand it most other countries would build a credit report based on debt payment history (utilities, taxes, bills), income and the presence of any registered instances of non-payment. However, as stated in [this article](http://www.joetaxpayer.com/your-fico-score/), that's only a minor element of an American credit report:
>
> There are those (such as Dave Ramsey) who will tell you to avoid all credit cards. This is nonsense. Graduate college, get a good job, save for a house, and you’ll find that without any credit history your options to get a mortgage will be limited despite the nice downpayment and low debt to income that new mortgage would cost you.
>
>
>
While I understand that this type of credit score will easily weed out true bad apples, I cannot see the advantage in this type of scoring for ranking people with no history of non-payment.
While I can't speak for all of Europe, in my experience the majority of credit cards are never used except for online purchases or in places where debit cards are not accepted. People then generally set-up direct debit to pay off the balance automatically each month. These cards never accrue interest and likely see a limit utilization of 0-5% per month. Owning a credit card is also still not that common.
In the end, it seems to me like the credit score boils down to having a proven track record of **spending your money**. This just does not strike me as a particularly effective metric. What then are the reasons that this system is still being used?
*I struggled somewhat with writing my thoughts on this down. Note that I'm not looking for a debate but want to find out how and why this system of credit scoring came about and if it is actually proven effective. I've read statements from banks that "it does" and I'm sure it works for non-payers but have found little about its value for the rest of us.* | 2014/07/01 | [
"https://money.stackexchange.com/questions/33812",
"https://money.stackexchange.com",
"https://money.stackexchange.com/users/15119/"
] | Let's say you own a store, and you are looking to hire a front-counter person. You'll be leaving this person alone with the cash register on a regular basis, so you want someone trustworthy. You have two candidates:
Bob has never stolen from a cash register in his life. He has spent the last three years working a job where his employer regularly leaves him alone with the cash register.
Ann has never stolen from a cash register in her life. She has never had a job where she was left alone with a cash register.
All else being equal, Bob is the slightly safer choice because he's had more opportunities to fail and hasn't, while Ann is a more unknown quantity.
By the same token, a person who regularly borrows money and pays it back is somewhat safer to loan money to than someone who's never borrowed money before, simply because the latter is a more unknown quantity. | Here is a less scientific view of why there is a focus on credit utilization, it is the easiest to control by doing something.
The focus on utilization is coming from the people asking the questions regarding how to improve their score, some even have an obsession with trying to wring a few more points even though they have no immediate need for a loan.
Look at the other factors:
* Payment History: 35%
* Length of Credit History: 15%
* New Credit: 10%
* Types of Credit Used:10%
That means that for 70% the best advice is either wait for your history to get longer, don't open a new line, or don't close an old line.
Therefore the only thing they control is to get their utilization score down. If they pay off balance that saves them interest, if they ask for or are award an increase in credit line that also brings down their utilization number.
If it is the easiest to improve, it will garner a greater focus from consumers, therefore it seems that the credit industry focuses on it. In reality each consumer has to look at their situation to see which part of their overall score they need to focus on. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.