qid
int64
1
74.7M
question
stringlengths
12
33.8k
date
stringlengths
10
10
metadata
list
response_j
stringlengths
0
115k
response_k
stringlengths
2
98.3k
323,025
Preamble -------- On Stack Overflow reputation is used as a *very* rough measurement of how much the site trusts you. Reputation is useful and needed to some extent (or do you want every anonymous user running around with full privileges?) and on the other side of the medal it also brings a lot of problems. Right now...
2016/05/14
[ "https://meta.stackoverflow.com/questions/323025", "https://meta.stackoverflow.com", "https://meta.stackoverflow.com/users/3933332/" ]
No. There are lots of reasons to dislike this proposal, but let's look at this part specifically: > > **Contribution reputation** will indicate how useful your contribution is to other users and how much the site trusts you about your knowledge > > > What does that mean, exactly? The first part, we already have...
Great post, man! A lot of explanation, I love the advantages/disadvantages breakup as well. Speaking about *the idea*... Not quite good. SO is *for asking and answering questions*, users *don't really have to improve other posts*, they don't really have to moderate the site. And having two different reputations is ...
323,025
Preamble -------- On Stack Overflow reputation is used as a *very* rough measurement of how much the site trusts you. Reputation is useful and needed to some extent (or do you want every anonymous user running around with full privileges?) and on the other side of the medal it also brings a lot of problems. Right now...
2016/05/14
[ "https://meta.stackoverflow.com/questions/323025", "https://meta.stackoverflow.com", "https://meta.stackoverflow.com/users/3933332/" ]
While I do think the moderation tools need some improvement, I don't believe this is the correct way to solve the problem. This might surprise you as I ([like Michael](https://meta.stackoverflow.com/a/323035/241211)) would have a high moderation score from this new reputation program. However, let's go back to the sta...
Great post, man! A lot of explanation, I love the advantages/disadvantages breakup as well. Speaking about *the idea*... Not quite good. SO is *for asking and answering questions*, users *don't really have to improve other posts*, they don't really have to moderate the site. And having two different reputations is ...
13,287
We mostly write programme in high level language. So while studying I came across assembly language. So an assembler converts assembly language to machine language and a compiler does the same with high level language. I found assembly language has instructions like move r1 r3 , move a 5 etc. And it is rather hard to s...
2013/07/15
[ "https://cs.stackexchange.com/questions/13287", "https://cs.stackexchange.com", "https://cs.stackexchange.com/users/9094/" ]
There are answers here: * [When do we need assembly language?](https://softwareengineering.stackexchange.com/questions/15896/when-do-we-need-assembly-language) on [Programmers.SE](http://programmers.stackexchange.com) * [Why assembly language is still needed if we have high level languages offering sophisticated tools...
To date myself, I first learned RPG II using an IBM System 32, and later learned APL on a 370. I was all about size and speed. My mantra was smaller and faster. Assembly is the most compact and fastest language out there. I would make test programs in both C and Assembly. Where C programs would require 100's of Kb, an ...
13,287
We mostly write programme in high level language. So while studying I came across assembly language. So an assembler converts assembly language to machine language and a compiler does the same with high level language. I found assembly language has instructions like move r1 r3 , move a 5 etc. And it is rather hard to s...
2013/07/15
[ "https://cs.stackexchange.com/questions/13287", "https://cs.stackexchange.com", "https://cs.stackexchange.com/users/9094/" ]
Let me add one less practical aspect. This is (probably) not a historic reason but a reason for you, today. Assembly (compared to high-level languages) is *naked*. It does not hide anything (that is done in software), and it is simple in the sense that it has a relatively small, fixed set of operations. This can be ...
There are answers here: * [When do we need assembly language?](https://softwareengineering.stackexchange.com/questions/15896/when-do-we-need-assembly-language) on [Programmers.SE](http://programmers.stackexchange.com) * [Why assembly language is still needed if we have high level languages offering sophisticated tools...
13,287
We mostly write programme in high level language. So while studying I came across assembly language. So an assembler converts assembly language to machine language and a compiler does the same with high level language. I found assembly language has instructions like move r1 r3 , move a 5 etc. And it is rather hard to s...
2013/07/15
[ "https://cs.stackexchange.com/questions/13287", "https://cs.stackexchange.com", "https://cs.stackexchange.com/users/9094/" ]
> > So why was assembly language created? or was it the one that came > first even before high level language? > > > Yes, assembly was one of the first programming languages which used text as input, as opposed to soldering wires, using plug boards, and/or flipping switches. Each assembly language was created for...
There are answers here: * [When do we need assembly language?](https://softwareengineering.stackexchange.com/questions/15896/when-do-we-need-assembly-language) on [Programmers.SE](http://programmers.stackexchange.com) * [Why assembly language is still needed if we have high level languages offering sophisticated tools...
13,287
We mostly write programme in high level language. So while studying I came across assembly language. So an assembler converts assembly language to machine language and a compiler does the same with high level language. I found assembly language has instructions like move r1 r3 , move a 5 etc. And it is rather hard to s...
2013/07/15
[ "https://cs.stackexchange.com/questions/13287", "https://cs.stackexchange.com", "https://cs.stackexchange.com/users/9094/" ]
"So why was assembly language created?" Assembly language was created as an exact shorthand for machine level coding, so that you wouldn't have to count 0s and 1s all day. It works the same as machine level code: with instructions and operands. "Which one came first?" Wikipedia has a good article about the [History ...
To date myself, I first learned RPG II using an IBM System 32, and later learned APL on a 370. I was all about size and speed. My mantra was smaller and faster. Assembly is the most compact and fastest language out there. I would make test programs in both C and Assembly. Where C programs would require 100's of Kb, an ...
13,287
We mostly write programme in high level language. So while studying I came across assembly language. So an assembler converts assembly language to machine language and a compiler does the same with high level language. I found assembly language has instructions like move r1 r3 , move a 5 etc. And it is rather hard to s...
2013/07/15
[ "https://cs.stackexchange.com/questions/13287", "https://cs.stackexchange.com", "https://cs.stackexchange.com/users/9094/" ]
"So why was assembly language created?" Assembly language was created as an exact shorthand for machine level coding, so that you wouldn't have to count 0s and 1s all day. It works the same as machine level code: with instructions and operands. "Which one came first?" Wikipedia has a good article about the [History ...
Let me add one less practical aspect. This is (probably) not a historic reason but a reason for you, today. Assembly (compared to high-level languages) is *naked*. It does not hide anything (that is done in software), and it is simple in the sense that it has a relatively small, fixed set of operations. This can be ...
42,081,194
So, let us consider a typical trade finance process flow. Exporter deploys a contract that has conditions of the shipment and a hash is generated once the deployment is finished. **Questions:** 1) Where is the contract stored? 2) How other participants such as customs and importer can access this contract? 3)...
2017/02/07
[ "https://Stackoverflow.com/questions/42081194", "https://Stackoverflow.com", "https://Stackoverflow.com/users/7428897/" ]
There are several aspects to Ethereum and Hyperledger which make them quite different. Let me give a somewhat simplified answer to not get into too much details and a too long answer. First of all, Ethereum is primarily a public blockchain that works in a certain intended way. Similarly, the Bitcoin blockchain works i...
1) The contract resides on the ledger. Whenever a transaction is invoked, the corresponding method in the contract gets executed on all the validating peers. 2) Other participants can access this contract using their pre-defined user credentials, which they can use to enroll themselves and invoke transactions on the c...
544,712
I am new to electronics and still learning so please don’t be too hard on me Here is the circuit I am trying to understand: [![enter image description here](https://i.stack.imgur.com/EOC92.jpg)](https://i.stack.imgur.com/EOC92.jpg) To control to top PNP transistor, there is an optocoupler and 2 resistors. When the...
2021/01/25
[ "https://electronics.stackexchange.com/questions/544712", "https://electronics.stackexchange.com", "https://electronics.stackexchange.com/users/273238/" ]
> > When the opto is off, the base of the PNP is in series with the 10k resistor. I guess that the voltage on the base would be lower then the source voltage as the resistor will have a voltage drop. > > > The idea is that the resistor pulls the base up to the emitter's voltage to prevent it turning on due to leak...
> > How can this pnp be turned off?? > > > A more in-depth conceptual answer to this question can be given if the main BJT input property is taken into account: *BJT can be more easily controlled by voltage than current since its input base-emitter junction behaves as a voltage-stabilizing element*. This propert...
2,580,601
I was looking for a platform where widgets developed using various technologies like Java can communicate with each other. In other words When I add widgets to an interface I need them to talk to each other. For example A Click event in one widget should trigger an event in some other widget. I have been looking into...
2010/04/05
[ "https://Stackoverflow.com/questions/2580601", "https://Stackoverflow.com", "https://Stackoverflow.com/users/-1/" ]
You should also check out the pmrpc library - <http://code.google.com/p/pmrpc/>. Pmrpc is a HTML5 JavaScript library for RPC-style (remote procedure call) inter-window, inter-widget and web workers communication. The implementation of pmrpc is based on the HTML5 postMessage APIs so communication can be cross-domain and...
you could look into "[postmessage](http://ejohn.org/blog/postmessage-api-changes/)", which is a communications API defined in html5 and [supported in most browsers (IE8 included)](http://a.deveria.com/caniuse/#feat=x-doc-messaging). for full cross-browser support (so including IE6/IE7) you could resort to [the jquery p...
5,652,904
i have a similar requirement to stackoverflow to show a number of metrics on a page in my asp.net-mvc site that are very expensive to calculate. Stackoverflow has a lot of metrics on the page (like user accept rate, etc) which clearly is not being calculated on the fly on page request, given that it would be too slow. ...
2011/04/13
[ "https://Stackoverflow.com/questions/5652904", "https://Stackoverflow.com", "https://Stackoverflow.com/users/4653/" ]
yes, the answer is caching, how you do it is (can be) the complicated part, if you are using NHibernate adding caching is really easy, is part of your configuration and on the queries you just add .Cacheable and it manages it for you. Caching also depends on the type of environment, if you're using a single worker, web...
Although this is a somewhat-recent technique, one really great way to structure your system to make stuff like this possible is by using [Command and Query Responsibility Segregation](http://wrightthisblog.blogspot.com/2010/01/cqrs-overview-chicago-altnet-user-group.html), more often referred to by CQRS.
5,652,904
i have a similar requirement to stackoverflow to show a number of metrics on a page in my asp.net-mvc site that are very expensive to calculate. Stackoverflow has a lot of metrics on the page (like user accept rate, etc) which clearly is not being calculated on the fly on page request, given that it would be too slow. ...
2011/04/13
[ "https://Stackoverflow.com/questions/5652904", "https://Stackoverflow.com", "https://Stackoverflow.com/users/4653/" ]
Probably they may be relying on the Redis data store for such calculations and caching. This [post](http://marcgravell.blogspot.com/2011/04/async-redis-await-booksleeve.html) from marcgravell may help.
yes, the answer is caching, how you do it is (can be) the complicated part, if you are using NHibernate adding caching is really easy, is part of your configuration and on the queries you just add .Cacheable and it manages it for you. Caching also depends on the type of environment, if you're using a single worker, web...
5,652,904
i have a similar requirement to stackoverflow to show a number of metrics on a page in my asp.net-mvc site that are very expensive to calculate. Stackoverflow has a lot of metrics on the page (like user accept rate, etc) which clearly is not being calculated on the fly on page request, given that it would be too slow. ...
2011/04/13
[ "https://Stackoverflow.com/questions/5652904", "https://Stackoverflow.com", "https://Stackoverflow.com/users/4653/" ]
Probably they may be relying on the Redis data store for such calculations and caching. This [post](http://marcgravell.blogspot.com/2011/04/async-redis-await-booksleeve.html) from marcgravell may help.
Although this is a somewhat-recent technique, one really great way to structure your system to make stuff like this possible is by using [Command and Query Responsibility Segregation](http://wrightthisblog.blogspot.com/2010/01/cqrs-overview-chicago-altnet-user-group.html), more often referred to by CQRS.
14,065
My husband and I have been together for 15 years and have always considered our relationship to be a healthy one. But parenthood has taken its toll and we cannot seem to agree on a number of parenting differences when it comes to our 7 month old daughter. For one, my husband seems to think there is nothing at all wrong...
2014/06/16
[ "https://parenting.stackexchange.com/questions/14065", "https://parenting.stackexchange.com", "https://parenting.stackexchange.com/users/9123/" ]
**Yes, it's okay.** If it's any consolation, the subject matter doesn't register with your daughter -- *yet!* **But** this will soon change, so you're right to address it ahead of that time. Becoming parents means learning how to raise a well-rounded kid, but it also means learning which of your old habits to let g...
Rather than sheltering our children, we teach them right from wrong. We foster their intelligence so that they learn to trust and respect us, and make better choices. Our children will be faced with violence and swear words when they go to school, so we decided that it would be best to expose them to it in a safe situa...
14,065
My husband and I have been together for 15 years and have always considered our relationship to be a healthy one. But parenthood has taken its toll and we cannot seem to agree on a number of parenting differences when it comes to our 7 month old daughter. For one, my husband seems to think there is nothing at all wrong...
2014/06/16
[ "https://parenting.stackexchange.com/questions/14065", "https://parenting.stackexchange.com", "https://parenting.stackexchange.com/users/9123/" ]
**Yes, it's okay.** If it's any consolation, the subject matter doesn't register with your daughter -- *yet!* **But** this will soon change, so you're right to address it ahead of that time. Becoming parents means learning how to raise a well-rounded kid, but it also means learning which of your old habits to let g...
As a parent of children who are 4 and 6, I've been amazed at what things they seem to have retained from a time when I would have thought they were too young to understand it. My son, in particular, seems to keep things at the back of his memory until such time as he gains the mental tools to actually wrestle with them...
14,065
My husband and I have been together for 15 years and have always considered our relationship to be a healthy one. But parenthood has taken its toll and we cannot seem to agree on a number of parenting differences when it comes to our 7 month old daughter. For one, my husband seems to think there is nothing at all wrong...
2014/06/16
[ "https://parenting.stackexchange.com/questions/14065", "https://parenting.stackexchange.com", "https://parenting.stackexchange.com/users/9123/" ]
Even some of the MCs known for their notorious lyrics don't feel that they are suitable for children's ears. To quote [Willie D](http://houstonsoreal.blogspot.com/2005/01/interview-with-willie-d-geto-boys.html) of the Ghetto Boys (censored a bit): > > Interviewer: Well that’s strange to hear coming from the guy who...
Rather than sheltering our children, we teach them right from wrong. We foster their intelligence so that they learn to trust and respect us, and make better choices. Our children will be faced with violence and swear words when they go to school, so we decided that it would be best to expose them to it in a safe situa...
14,065
My husband and I have been together for 15 years and have always considered our relationship to be a healthy one. But parenthood has taken its toll and we cannot seem to agree on a number of parenting differences when it comes to our 7 month old daughter. For one, my husband seems to think there is nothing at all wrong...
2014/06/16
[ "https://parenting.stackexchange.com/questions/14065", "https://parenting.stackexchange.com", "https://parenting.stackexchange.com/users/9123/" ]
Even some of the MCs known for their notorious lyrics don't feel that they are suitable for children's ears. To quote [Willie D](http://houstonsoreal.blogspot.com/2005/01/interview-with-willie-d-geto-boys.html) of the Ghetto Boys (censored a bit): > > Interviewer: Well that’s strange to hear coming from the guy who...
As a parent of children who are 4 and 6, I've been amazed at what things they seem to have retained from a time when I would have thought they were too young to understand it. My son, in particular, seems to keep things at the back of his memory until such time as he gains the mental tools to actually wrestle with them...
14,065
My husband and I have been together for 15 years and have always considered our relationship to be a healthy one. But parenthood has taken its toll and we cannot seem to agree on a number of parenting differences when it comes to our 7 month old daughter. For one, my husband seems to think there is nothing at all wrong...
2014/06/16
[ "https://parenting.stackexchange.com/questions/14065", "https://parenting.stackexchange.com", "https://parenting.stackexchange.com/users/9123/" ]
Honestly at this point the volume is more worrying than the content. They will be listening, and she will be storing words (or rather sounds) away, but without lots of repetition and a lot more development she will not be at the point that they can repeat them... Give them a year. Even then, she will not have a gra...
Rather than sheltering our children, we teach them right from wrong. We foster their intelligence so that they learn to trust and respect us, and make better choices. Our children will be faced with violence and swear words when they go to school, so we decided that it would be best to expose them to it in a safe situa...
14,065
My husband and I have been together for 15 years and have always considered our relationship to be a healthy one. But parenthood has taken its toll and we cannot seem to agree on a number of parenting differences when it comes to our 7 month old daughter. For one, my husband seems to think there is nothing at all wrong...
2014/06/16
[ "https://parenting.stackexchange.com/questions/14065", "https://parenting.stackexchange.com", "https://parenting.stackexchange.com/users/9123/" ]
Honestly at this point the volume is more worrying than the content. They will be listening, and she will be storing words (or rather sounds) away, but without lots of repetition and a lot more development she will not be at the point that they can repeat them... Give them a year. Even then, she will not have a gra...
As a parent of children who are 4 and 6, I've been amazed at what things they seem to have retained from a time when I would have thought they were too young to understand it. My son, in particular, seems to keep things at the back of his memory until such time as he gains the mental tools to actually wrestle with them...
14,065
My husband and I have been together for 15 years and have always considered our relationship to be a healthy one. But parenthood has taken its toll and we cannot seem to agree on a number of parenting differences when it comes to our 7 month old daughter. For one, my husband seems to think there is nothing at all wrong...
2014/06/16
[ "https://parenting.stackexchange.com/questions/14065", "https://parenting.stackexchange.com", "https://parenting.stackexchange.com/users/9123/" ]
As a parent of children who are 4 and 6, I've been amazed at what things they seem to have retained from a time when I would have thought they were too young to understand it. My son, in particular, seems to keep things at the back of his memory until such time as he gains the mental tools to actually wrestle with them...
Rather than sheltering our children, we teach them right from wrong. We foster their intelligence so that they learn to trust and respect us, and make better choices. Our children will be faced with violence and swear words when they go to school, so we decided that it would be best to expose them to it in a safe situa...
160,304
[CKS Dev](https://cksdev.codeplex.com/) does not yet have a version for VS 2015. Can you recommend another tool to quickly update assemblies and layouts pages from Visual Studio 2015 ?
2015/10/22
[ "https://sharepoint.stackexchange.com/questions/160304", "https://sharepoint.stackexchange.com", "https://sharepoint.stackexchange.com/users/7395/" ]
I converted the CKSDEV for VS2013 version to VS2015 and uploaded to Google Drive for all to shaRE. The link above was broken so I thought I would fix that. [CKSDEV for Visual Studio 2015](https://drive.google.com/file/d/0B9ZcIeYIJoUDOGo3bUFMZkdnQWc/view?usp=sharing)
You can use CKSDev in Visual Studio 2015 also try the work around suggested below 1. Open window explorer and go to \Local\Microsoft\VisualStudio\12.0\Extensions 2. Find the folder containing CKSDev – on my machine it was called yqxmnzzs.3tk 3. Copy the folder. 4. Open window explorer and go to \Local\Microsoft\Visual...
174,010
for a traffic management app i should limit bandwidth for clients ip addresses that for each ip there are different limit how can use tc-tbf for specific ip address or is any other solution?
2010/08/24
[ "https://serverfault.com/questions/174010", "https://serverfault.com", "https://serverfault.com/users/48316/" ]
Semi-related to your question, limiting a client's bandwidth is not likely the best solution, as it has to be on a client-by-client basis. You may want to specify the maximum amount of bandwidth that any single client can consume, rather than specify by ip address. Your best bet is going to be QoS, and specifying diff...
This article describes how you can use iptables to rate limit new connections: <http://www.debian-administration.org/articles/187> You could drop the stateful check for NEW and instead restrict it by source IP.
205,782
My setting is set around the 23rd century, and for my military, I was wondering what kind of sidearms they’d use. After searching, I found something interesting: there are pistols chambered in 5.7x28mm rounds (which were originally made for PDWs such as P90s and MP7s). I was wondering, would it make sense for a milita...
2021/06/17
[ "https://worldbuilding.stackexchange.com/questions/205782", "https://worldbuilding.stackexchange.com", "https://worldbuilding.stackexchange.com/users/52876/" ]
5.7x28mm is what the FN Five-Seven pistol is chambered in, and if I'm not mistaken, the 4.8x30mm round made for the MP-7 was also planned to be put into a pistol, although that project was cancelled because the round supposedly didn't provide amazing ballistics when utilized in a pistol. It's the same case with the Fi...
**In the 23rd century?** Standards like ammunition have remarkable longevity because you often design weapons for existing ammo, or slightly improved ammo for existing weapons. Still, over two centuries are a long time to assume that a late 20th century round would still be in use. That would be like finding a [Land P...
210,474
My question is similar to [Is it possible to get an Edit notification on questions that I Vote-to-close?](https://meta.stackexchange.com/questions/73341/is-it-possible-to-get-an-edit-notification-on-questions-that-i-vote-to-close) I believe this would be useful in the scenario if I upvote a question or answer... and t...
2013/12/06
[ "https://meta.stackexchange.com/questions/210474", "https://meta.stackexchange.com", "https://meta.stackexchange.com/users/190291/" ]
It is a great idea in theory, but there's more to it than you make out. Firstly, as people have pointed out, you'd get inundated with reports for completely trivial things. Your (valid) point of: > > the OP changes it to add a bunch of stuff that I no longer think makes it a great answer. > > > Can also be ...
We are not going to implement an auto-notification for things that you voted. If you want to find out about further edits, then use the [follow post](https://meta.stackexchange.com/q/345661/51) feature.
204,312
I am currently working on a mean application, with an Angular frontend and an express/node backend. Frontend and backend communicate together with a REST API. When I deploy the application, both the Angular front-end and the API back-end are served from the same port. What consequences do running both on the same po...
2019/02/26
[ "https://security.stackexchange.com/questions/204312", "https://security.stackexchange.com", "https://security.stackexchange.com/users/174840/" ]
The only consequence that I'm aware of for the markup and API being hosted from the same port on the same server is that they will be considered the same domain in terms of how browsers treat the request. This is actually a good thing in terms of security. It means that you do not have to be concerned with configuring ...
Let's say you have 2 Servers running different APIs and want them to communicate with each other. If client and server are on the same port, they will not be able to communicate since the port is already on listen mode.
99,083
I have a doozy for you. This was a late 80s/early 90s animated movie. I think it might have been a Japanese anime. I remember it featuring two alien factions at war that eventually uploaded their conscience into giant robots. It was surely to sell toys. I remember the leader of the "good" faction was a white robot tha...
2015/08/12
[ "https://scifi.stackexchange.com/questions/99083", "https://scifi.stackexchange.com", "https://scifi.stackexchange.com/users/50534/" ]
It was *[Robotix](https://en.wikipedia.org/wiki/Robotix)*. > > *Robotix* is a 1985 American animated series based on the original [Milton Bradley toyline of the same name](https://en.wikipedia.org/wiki/Robotix_(toyline)) featured on the Super Sunday programming block. The toyline is of the construction type that incl...
That might be the classic *[Challenge of the Go-bots](https://en.wikipedia.org/wiki/Challenge_of_the_GoBots)*, which actually predates Transformers by a small amount of time. > > In the series' backstory, set thousands of years ago on the planet GoBotron, there lived a race of human-like beings known as GoBings. Civi...
374,924
I need to all of timestamps in a column the same amount. I want to write an sql statement like: update sometable set timecol = timecol + <4 months>;
2008/12/17
[ "https://Stackoverflow.com/questions/374924", "https://Stackoverflow.com", "https://Stackoverflow.com/users/6841/" ]
The SQL Profiler will allow you to trace a transaction through, and see exactly what is going on. It is very flexible and allows you to be shown only the events you are interested in, but it won't show it in the tree format I think you're asking about. The profiler is installed as part of the SQL Server Client Tools (...
I guess if this way is doable. You can set up a test environment and run the transaction. Once transaction is submitted, compare the database in test environment with the prodution database. You can use some tool to do this comparation. Like OpenDBDiff or you can look for other tool by googling.
374,924
I need to all of timestamps in a column the same amount. I want to write an sql statement like: update sometable set timecol = timecol + <4 months>;
2008/12/17
[ "https://Stackoverflow.com/questions/374924", "https://Stackoverflow.com", "https://Stackoverflow.com/users/6841/" ]
The SQL Profiler will allow you to trace a transaction through, and see exactly what is going on. It is very flexible and allows you to be shown only the events you are interested in, but it won't show it in the tree format I think you're asking about. The profiler is installed as part of the SQL Server Client Tools (...
I haven't [used this](http://www.dbazine.com/sql/sql-articles/larsen9) yet, it appears to do what you're asking: apply IDE-style debugging tools to T-SQL statements. I woul be interested to see how it works out.
374,924
I need to all of timestamps in a column the same amount. I want to write an sql statement like: update sometable set timecol = timecol + <4 months>;
2008/12/17
[ "https://Stackoverflow.com/questions/374924", "https://Stackoverflow.com", "https://Stackoverflow.com/users/6841/" ]
If you open a connection in Visual Studio, you can run sprocs and queries in debug mode. i.e. you can go step by step over a query with intellisense and see the values in the variables.
The SQL Profiler will allow you to trace a transaction through, and see exactly what is going on. It is very flexible and allows you to be shown only the events you are interested in, but it won't show it in the tree format I think you're asking about. The profiler is installed as part of the SQL Server Client Tools (...
374,924
I need to all of timestamps in a column the same amount. I want to write an sql statement like: update sometable set timecol = timecol + <4 months>;
2008/12/17
[ "https://Stackoverflow.com/questions/374924", "https://Stackoverflow.com", "https://Stackoverflow.com/users/6841/" ]
If you open a connection in Visual Studio, you can run sprocs and queries in debug mode. i.e. you can go step by step over a query with intellisense and see the values in the variables.
I guess if this way is doable. You can set up a test environment and run the transaction. Once transaction is submitted, compare the database in test environment with the prodution database. You can use some tool to do this comparation. Like OpenDBDiff or you can look for other tool by googling.
374,924
I need to all of timestamps in a column the same amount. I want to write an sql statement like: update sometable set timecol = timecol + <4 months>;
2008/12/17
[ "https://Stackoverflow.com/questions/374924", "https://Stackoverflow.com", "https://Stackoverflow.com/users/6841/" ]
If you open a connection in Visual Studio, you can run sprocs and queries in debug mode. i.e. you can go step by step over a query with intellisense and see the values in the variables.
I haven't [used this](http://www.dbazine.com/sql/sql-articles/larsen9) yet, it appears to do what you're asking: apply IDE-style debugging tools to T-SQL statements. I woul be interested to see how it works out.
9,227,962
I would be interested to know, where are the advantages and disadvantages of each vision-based mobile Augmented Reality Frameworks? For what should be decide in which case? Would you choose **Vuforia** in any case, because it is free and without branding? What are important features are missing in one of the frameworks...
2012/02/10
[ "https://Stackoverflow.com/questions/9227962", "https://Stackoverflow.com", "https://Stackoverflow.com/users/683643/" ]
I've used both D'Fusion and Vuforia and here are my feedbacks D’Fusion (Total Immersion) D’Fusion solution is a cross-platform tool which mainly supports Web, iPhone, Android plateforms. Main features are the followings: * It is more UI based (D’Fusion Studio & D’Fusion CV) and enable to build the whole scenario th...
I just used the Metaio SDK Mobile framework. The framework has great potential but has a pretty bad documentation. This highly focused to show 3D objects in front of "real tags", but for a classic AR (with bubbles indicating coordinates) quite a few things are missing. For example I had to implement my own radar becaus...
9,227,962
I would be interested to know, where are the advantages and disadvantages of each vision-based mobile Augmented Reality Frameworks? For what should be decide in which case? Would you choose **Vuforia** in any case, because it is free and without branding? What are important features are missing in one of the frameworks...
2012/02/10
[ "https://Stackoverflow.com/questions/9227962", "https://Stackoverflow.com", "https://Stackoverflow.com/users/683643/" ]
I just used the Metaio SDK Mobile framework. The framework has great potential but has a pretty bad documentation. This highly focused to show 3D objects in front of "real tags", but for a classic AR (with bubbles indicating coordinates) quite a few things are missing. For example I had to implement my own radar becaus...
Metaio also supports cross platform development using AREL in HTML5 based apps See: <https://dev.metaio.com/arel/overview/> Metaio also supports Edge Based Tracking which is very robust and does not suffer from lighting or texture condition changes. For simple Location Based AR using GPS etc. This can be achieved wi...
9,227,962
I would be interested to know, where are the advantages and disadvantages of each vision-based mobile Augmented Reality Frameworks? For what should be decide in which case? Would you choose **Vuforia** in any case, because it is free and without branding? What are important features are missing in one of the frameworks...
2012/02/10
[ "https://Stackoverflow.com/questions/9227962", "https://Stackoverflow.com", "https://Stackoverflow.com/users/683643/" ]
I've used both D'Fusion and Vuforia and here are my feedbacks D’Fusion (Total Immersion) D’Fusion solution is a cross-platform tool which mainly supports Web, iPhone, Android plateforms. Main features are the followings: * It is more UI based (D’Fusion Studio & D’Fusion CV) and enable to build the whole scenario th...
I Have used both Metaio and Vuforia : in my opinion Vuforia is best option as a free of cost and good tracking. Here are some points: Metaio 1. With metaio you can develop very fast. 2. Various tracking are supported e.g. marker, image targets, marker-less, 3D object tracking also. 3. You have to code separately for...
9,227,962
I would be interested to know, where are the advantages and disadvantages of each vision-based mobile Augmented Reality Frameworks? For what should be decide in which case? Would you choose **Vuforia** in any case, because it is free and without branding? What are important features are missing in one of the frameworks...
2012/02/10
[ "https://Stackoverflow.com/questions/9227962", "https://Stackoverflow.com", "https://Stackoverflow.com/users/683643/" ]
I've used both D'Fusion and Vuforia and here are my feedbacks D’Fusion (Total Immersion) D’Fusion solution is a cross-platform tool which mainly supports Web, iPhone, Android plateforms. Main features are the followings: * It is more UI based (D’Fusion Studio & D’Fusion CV) and enable to build the whole scenario th...
Metaio also supports cross platform development using AREL in HTML5 based apps See: <https://dev.metaio.com/arel/overview/> Metaio also supports Edge Based Tracking which is very robust and does not suffer from lighting or texture condition changes. For simple Location Based AR using GPS etc. This can be achieved wi...
9,227,962
I would be interested to know, where are the advantages and disadvantages of each vision-based mobile Augmented Reality Frameworks? For what should be decide in which case? Would you choose **Vuforia** in any case, because it is free and without branding? What are important features are missing in one of the frameworks...
2012/02/10
[ "https://Stackoverflow.com/questions/9227962", "https://Stackoverflow.com", "https://Stackoverflow.com/users/683643/" ]
I Have used both Metaio and Vuforia : in my opinion Vuforia is best option as a free of cost and good tracking. Here are some points: Metaio 1. With metaio you can develop very fast. 2. Various tracking are supported e.g. marker, image targets, marker-less, 3D object tracking also. 3. You have to code separately for...
Metaio also supports cross platform development using AREL in HTML5 based apps See: <https://dev.metaio.com/arel/overview/> Metaio also supports Edge Based Tracking which is very robust and does not suffer from lighting or texture condition changes. For simple Location Based AR using GPS etc. This can be achieved wi...
12,890
When I set my power setting to blank the screen after a set amount of time when the screen goes blank it logs me out of elementary. When I log back in I have to restart my applications. elementary is a wonderful OS but I just can't see a way of fixing this problem. This is getting frustrating as if I have a long down...
2017/08/02
[ "https://elementaryos.stackexchange.com/questions/12890", "https://elementaryos.stackexchange.com", "https://elementaryos.stackexchange.com/users/11706/" ]
I had exactly the same problem on a T430 a year ago. I was going nuts until one of my colleagues calmly pointed out the little switch on the right hand side of the base. I slid this across and wifi sprang to life - essentially it wasn't clear which was was on and which was off. I cursed that I hadn't known about that a...
This might seem silly, but doesn't a hard block mean that there is a physical button or switch on the laptop that turns off all radios? You said that yours is on, but maybe it's broken in the off position? That might explain why it's not working in Windows 10 too. Also check that wifi is enabled in the BIOS.
129,525
**Situation:** On the 2nd of January I had a meeting with my supervisors and agreed on a new task list for the new year, one big task specifically assigned to be finished for end of first quarter (late March). January 21st a gantt chart was released to us with the project included on it, except the due date was now Fe...
2019/02/19
[ "https://workplace.stackexchange.com/questions/129525", "https://workplace.stackexchange.com", "https://workplace.stackexchange.com/users/87172/" ]
First thing first, you **may** have a supervisor trying to make you a scapegoat, in which case you may not get good outcome no matter what you do. So be prepared, start to do some job hunting won't hurt. You may want to verify if it's just a mistake made by your supervisor, keep all your communication in record (best ...
Do you have any written proof about this? > > one big task specifically assigned to be finished for **end of first quarter (late March)** > > > **If yes**, use it in all discussions and try to negotiate the terms of the change of schedule. Since time is shorter, work has to be "shorter" too. Maybe some documentat...
234,790
Suppose I create an encrypted container using VeraCrypt and want to upload it to Google Drive/One Drive for storage. The container is encrypted with AES-256. I know that no one can extract any meaning from that random data. But I am a *very paranoid* person! I know that the random data doesn't make any sense, but th...
2020/07/17
[ "https://security.stackexchange.com/questions/234790", "https://security.stackexchange.com", "https://security.stackexchange.com/users/238213/" ]
Here is what you asked: "I want to hand the encrypted data to this party to store and process, but I don't want them to *see* the encrypted data." That's not possible or realistic. If you don't want them to have **access** to the data, then don't give them access. Don't give it to them. You could try multiple levels...
The only way to be certain that your data is safe is to manage the storage, network, and transport of the data yourself. Some questions to ask: * Does this data need to go offsite? Can it be stored locally? * Does the provider have any known breaches? * Who uses the provider? IE is `BIGCORP` a customer? * Could you s...
234,790
Suppose I create an encrypted container using VeraCrypt and want to upload it to Google Drive/One Drive for storage. The container is encrypted with AES-256. I know that no one can extract any meaning from that random data. But I am a *very paranoid* person! I know that the random data doesn't make any sense, but th...
2020/07/17
[ "https://security.stackexchange.com/questions/234790", "https://security.stackexchange.com", "https://security.stackexchange.com/users/238213/" ]
Here is what you asked: "I want to hand the encrypted data to this party to store and process, but I don't want them to *see* the encrypted data." That's not possible or realistic. If you don't want them to have **access** to the data, then don't give them access. Don't give it to them. You could try multiple levels...
> > Is there any way of preventing the adversaries from accessing the (encrypted) data at all, even after releasing the data? > > > For almost every single case, there's no way. The "after releasing the data" statement means your data (or a copy of it) left your hands and went to someone else. But there's one way...
234,790
Suppose I create an encrypted container using VeraCrypt and want to upload it to Google Drive/One Drive for storage. The container is encrypted with AES-256. I know that no one can extract any meaning from that random data. But I am a *very paranoid* person! I know that the random data doesn't make any sense, but th...
2020/07/17
[ "https://security.stackexchange.com/questions/234790", "https://security.stackexchange.com", "https://security.stackexchange.com/users/238213/" ]
> > Is there any way of preventing the adversaries from accessing the (encrypted) data at all, even after releasing the data? > > > For almost every single case, there's no way. The "after releasing the data" statement means your data (or a copy of it) left your hands and went to someone else. But there's one way...
The only way to be certain that your data is safe is to manage the storage, network, and transport of the data yourself. Some questions to ask: * Does this data need to go offsite? Can it be stored locally? * Does the provider have any known breaches? * Who uses the provider? IE is `BIGCORP` a customer? * Could you s...
17,331,439
I have this record layout for a field positional .txt database to convert into a MySQL TABLE. There is a column in the record layout titled "PICTURE" I'm not certain what it's describing for the data types. This looks vaguely familiar, perhaps it's a COBOL record layout method? Here are some examples and my assumption...
2013/06/26
[ "https://Stackoverflow.com/questions/17331439", "https://Stackoverflow.com", "https://Stackoverflow.com/users/1573545/" ]
My interpretation, I hope it helps you: * **9(4)**: as you said a number with 4 digits (see the length column in your screen) * **X(4)**: a string with length of 4 (see the length column in your screen) * **999**: a number with 3 digits * **XXX**: a string with the length of 3 * **9(5)V9(4)**: a decimal number with 5 ...
Continuing from 5im's answer. FILLER means empty space. You don't have to put FILLER fields in a database. FILLER fields are either fields that are no longer required, or empty spaces left in the record layout so new information could be added without changing the record length. The decimal numbers like 9(5)V9(4) and...
17,331,439
I have this record layout for a field positional .txt database to convert into a MySQL TABLE. There is a column in the record layout titled "PICTURE" I'm not certain what it's describing for the data types. This looks vaguely familiar, perhaps it's a COBOL record layout method? Here are some examples and my assumption...
2013/06/26
[ "https://Stackoverflow.com/questions/17331439", "https://Stackoverflow.com", "https://Stackoverflow.com/users/1573545/" ]
My interpretation, I hope it helps you: * **9(4)**: as you said a number with 4 digits (see the length column in your screen) * **X(4)**: a string with length of 4 (see the length column in your screen) * **999**: a number with 3 digits * **XXX**: a string with the length of 3 * **9(5)V9(4)**: a decimal number with 5 ...
Following from 5im, in cobol, **S9(7)V99** the sign is normally represented as an **over type** of the lowest order digit. You can see this in the s9(7)V99 fields, they are all 9 bytes long with no space allocated for the sign. The actual sign character used will depend on wether it is an source computer uses **ascii*...
17,331,439
I have this record layout for a field positional .txt database to convert into a MySQL TABLE. There is a column in the record layout titled "PICTURE" I'm not certain what it's describing for the data types. This looks vaguely familiar, perhaps it's a COBOL record layout method? Here are some examples and my assumption...
2013/06/26
[ "https://Stackoverflow.com/questions/17331439", "https://Stackoverflow.com", "https://Stackoverflow.com/users/1573545/" ]
Following from 5im, in cobol, **S9(7)V99** the sign is normally represented as an **over type** of the lowest order digit. You can see this in the s9(7)V99 fields, they are all 9 bytes long with no space allocated for the sign. The actual sign character used will depend on wether it is an source computer uses **ascii*...
Continuing from 5im's answer. FILLER means empty space. You don't have to put FILLER fields in a database. FILLER fields are either fields that are no longer required, or empty spaces left in the record layout so new information could be added without changing the record length. The decimal numbers like 9(5)V9(4) and...
300,973
If you have some burned discs that don't work, you might want to find out at what speed they were burned to perhaps try and re-burn at a lower speed. So if you don't know the original burning speed, how can you find out?
2011/06/23
[ "https://superuser.com/questions/300973", "https://superuser.com", "https://superuser.com/users/7773/" ]
I don't think this information is recorded on the media anywhere. It is prudent to set your burning software to verify the disc after burning and catch speed issues immediately after they occur.
If you already "know this information isn't recorded on the disc", then there's no way to find it out later. Keep in mind that the raw DVD bitstream that is read from the media **always** needs to conform to the specification. This means the bitstream shall always be the same, no matter if burned at 1x speed or (theor...
84,979
I'm getting a red bar on top of each page which says "Stack Overflow works best with JavaScript enabled". My JavaScript is enabled. Otherwise everything is working well. EDIT: nope, I am not using [NoScript](http://en.wikipedia.org/wiki/NoScript) and am also not seeing jQuery effects. It's not blocked. Everything work...
2011/03/28
[ "https://meta.stackexchange.com/questions/84979", "https://meta.stackexchange.com", "https://meta.stackexchange.com/users/159399/" ]
I am using Firefox 4.0 and I get no such warning; JavaScript works fine on Stack Overflow. You are likely using any addons that are disabling JavaScript, such as NoScript. Try disabling them, or creating an exception for Stack Overflow. See also this question: [“Stack Overflow works best with JavaScript enabled”, but I...
Most likely extension related. I'm using Firefox 4, with minimal extensions (web developer + firebug), and have experienced no problems. try disabling all extensions, and then re-enabling them one by one until you find the extension (or combination thereof) that generates the problem. If you still get the problem with ...
25,361,346
I am clicking on my project, then clicking export.After clicking export i choose blackberry -> release build. After this step i click next again, until i reach last step. I select enable digital signing and click on finish. It starts exporting release build , but i get an error Error: Server cannot handle your request ...
2014/08/18
[ "https://Stackoverflow.com/questions/25361346", "https://Stackoverflow.com", "https://Stackoverflow.com/users/3278732/" ]
Only difference is bean can be serialized. From Java docs - <http://docs.oracle.com/javase/7/docs/api/java/io/Serializable.html> Serializability of a class is enabled by the class implementing the java.io.Serializable interface. Classes that do not implement this interface will not have any of their state serialized ...
the JavaBean class must implement either Serializable or Externalizable, must have a no-arg constructor,all JavaBean properties must public setter and getter methods (as appropriate) all JavaBean instance variables should be private
35,887,707
I'm trying to add a `tmx` file in my scene but I get > > EXC\_BAD\_ACCESS > > > please help me ![![My project structure is this](https://i.stack.imgur.com/CwDBc.png) [![enter image description here](https://i.stack.imgur.com/BJsRd.png)](https://i.stack.imgur.com/BJsRd.png) [![enter image description here](http...
2016/03/09
[ "https://Stackoverflow.com/questions/35887707", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2424767/" ]
I managed to remotely connect to my MySQL server from MySQL Workbench running on another server (my application server), although the problem still exist if I do it on the same server. I have tested that by granting WMI permission to the user in MySQL server, the connection works as intended. The following list shows ...
This WMI error has nothing to do with MySQL. [MySQL Workbench uses Windows Management Instrumentation](http://mysqlworkbench.org/2010/12/mysql-workbench-manage-mysql-on-windows-servers-the-windows-way/) (WMI) to manage servers locally or remotely in a Windows based environment. WMI is available on all Windows versions ...
35,887,707
I'm trying to add a `tmx` file in my scene but I get > > EXC\_BAD\_ACCESS > > > please help me ![![My project structure is this](https://i.stack.imgur.com/CwDBc.png) [![enter image description here](https://i.stack.imgur.com/BJsRd.png)](https://i.stack.imgur.com/BJsRd.png) [![enter image description here](http...
2016/03/09
[ "https://Stackoverflow.com/questions/35887707", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2424767/" ]
I ran into this same problem and it seems Workbench has a small bug. For local WMI management the only way I could get it to work was with 127.0.0.1 But not if I used a DNS/NetBios name or local network address. I checked with powershell Get-WmiObject and it will return information with any ComputerName locally i.e. 1...
This WMI error has nothing to do with MySQL. [MySQL Workbench uses Windows Management Instrumentation](http://mysqlworkbench.org/2010/12/mysql-workbench-manage-mysql-on-windows-servers-the-windows-way/) (WMI) to manage servers locally or remotely in a Windows based environment. WMI is available on all Windows versions ...
35,887,707
I'm trying to add a `tmx` file in my scene but I get > > EXC\_BAD\_ACCESS > > > please help me ![![My project structure is this](https://i.stack.imgur.com/CwDBc.png) [![enter image description here](https://i.stack.imgur.com/BJsRd.png)](https://i.stack.imgur.com/BJsRd.png) [![enter image description here](http...
2016/03/09
[ "https://Stackoverflow.com/questions/35887707", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2424767/" ]
I managed to remotely connect to my MySQL server from MySQL Workbench running on another server (my application server), although the problem still exist if I do it on the same server. I have tested that by granting WMI permission to the user in MySQL server, the connection works as intended. The following list shows ...
I ran into this same problem and it seems Workbench has a small bug. For local WMI management the only way I could get it to work was with 127.0.0.1 But not if I used a DNS/NetBios name or local network address. I checked with powershell Get-WmiObject and it will return information with any ComputerName locally i.e. 1...
287,777
as I've been learning about tree-based classification algorithms, I've learned the single tree algorithms are 'greedy', meaning that they'll minimize entropy at every stage. This means that sometimes these algorithms will fail to minimize total entropy because they are only looking one step ahead. Here's an example: [!...
2017/06/28
[ "https://stats.stackexchange.com/questions/287777", "https://stats.stackexchange.com", "https://stats.stackexchange.com/users/166253/" ]
In the fitting process of each tree inside the forest greedy decisions are still made. However, in the bagging-also called voting-i.e. when the predictions are combined from all the trees into a single prediction, each tree gets an equal vote. So in short, the RandomForest algorithm is also greedy in the same sense as ...
Well, if you look at the way Random forests work - they work by training multiple decision trees sub-samples that are always the same as the original input sample size and a random selection of variables, repeating this process multiple times. The final result is a function of the result of each individual run such as ...
31,836
I'm currently designing a replacement kitchen for my house. The kitchen is U shaped so going across three walls of the house. The middle wall is not 90 degrees to the other two, it is more like 105 degrees to one wall and 75 degrees to the other. How do you usually fit kitchen cabinets to these corners? What are differ...
2013/09/17
[ "https://diy.stackexchange.com/questions/31836", "https://diy.stackexchange.com", "https://diy.stackexchange.com/users/15141/" ]
Not all corner cabinets make up both sides of a corner. You can get a cabinet for example that is 42" long but with only a 18" door. Another standard cabinet will butt against it to form a corner. Normally a 3" spacer is used to make clearance for drawers and doors to open. You may need more on your smaller angled corn...
You could built a custom corner cabinet. alternatively, don't place a corner cabinet, but rather let the cabinets meet at the corner on their outside corners. Then just cover the gap with counter. Note that the 75 degree wall might cause issues with drawers and doors in the corner. You may want to rethink wrapping ca...
31,836
I'm currently designing a replacement kitchen for my house. The kitchen is U shaped so going across three walls of the house. The middle wall is not 90 degrees to the other two, it is more like 105 degrees to one wall and 75 degrees to the other. How do you usually fit kitchen cabinets to these corners? What are differ...
2013/09/17
[ "https://diy.stackexchange.com/questions/31836", "https://diy.stackexchange.com", "https://diy.stackexchange.com/users/15141/" ]
Well if the walls are down I would use this time to get the middle wall at 90 degrees. You might lose a couple inches of space but your kitchen will look a lot nicer. It's not just the cabinets but you will have to deal with countertops and other issues too. We shim out things if you aren't right at 90 but you are a bi...
You could built a custom corner cabinet. alternatively, don't place a corner cabinet, but rather let the cabinets meet at the corner on their outside corners. Then just cover the gap with counter. Note that the 75 degree wall might cause issues with drawers and doors in the corner. You may want to rethink wrapping ca...
31,836
I'm currently designing a replacement kitchen for my house. The kitchen is U shaped so going across three walls of the house. The middle wall is not 90 degrees to the other two, it is more like 105 degrees to one wall and 75 degrees to the other. How do you usually fit kitchen cabinets to these corners? What are differ...
2013/09/17
[ "https://diy.stackexchange.com/questions/31836", "https://diy.stackexchange.com", "https://diy.stackexchange.com/users/15141/" ]
Not all corner cabinets make up both sides of a corner. You can get a cabinet for example that is 42" long but with only a 18" door. Another standard cabinet will butt against it to form a corner. Normally a 3" spacer is used to make clearance for drawers and doors to open. You may need more on your smaller angled corn...
The simplest solution — *if possible* — would be to not use the bottom of the U, but only the legs. You haven't supplied any dimensions, so I have no idea if this is possible, but that would leave you without any corner cabinets to be fitted. Depending on what you want for your kitchen, you could either leave the bott...
31,836
I'm currently designing a replacement kitchen for my house. The kitchen is U shaped so going across three walls of the house. The middle wall is not 90 degrees to the other two, it is more like 105 degrees to one wall and 75 degrees to the other. How do you usually fit kitchen cabinets to these corners? What are differ...
2013/09/17
[ "https://diy.stackexchange.com/questions/31836", "https://diy.stackexchange.com", "https://diy.stackexchange.com/users/15141/" ]
Well if the walls are down I would use this time to get the middle wall at 90 degrees. You might lose a couple inches of space but your kitchen will look a lot nicer. It's not just the cabinets but you will have to deal with countertops and other issues too. We shim out things if you aren't right at 90 but you are a bi...
The simplest solution — *if possible* — would be to not use the bottom of the U, but only the legs. You haven't supplied any dimensions, so I have no idea if this is possible, but that would leave you without any corner cabinets to be fitted. Depending on what you want for your kitchen, you could either leave the bott...
116,566
I've watched Mr. Robot lately and can't stop thinking why it was so hard to decrypt files encrypted using AES encryption with a 256-bit key. Let us say the only method to find the key is through brute force. Can't we set a computer to brute force starting from the first possible key, and another to begin from the...
2016/03/05
[ "https://security.stackexchange.com/questions/116566", "https://security.stackexchange.com", "https://security.stackexchange.com/users/103485/" ]
Sure it's possible, but it doesn't really help. The number of possibilities is just too large. Consider that a 256-bit key has 2256 possible values. That's 12✕1076, or 12 followed by 76 zeroes. If we generously assume that a computer can test a trillion (that's 1012) possible keys a second, and that we have a trillion...
I did a calculation on this one once. Let's assume AES can only be broken using brute force. Clearly we are going to need a counter, which counts from 0 to 2256-1, and on average it will need to count to 2255. Running this counter takes energy. How much energy does it take? As it turns out, there is a thermodynamic li...
116,566
I've watched Mr. Robot lately and can't stop thinking why it was so hard to decrypt files encrypted using AES encryption with a 256-bit key. Let us say the only method to find the key is through brute force. Can't we set a computer to brute force starting from the first possible key, and another to begin from the...
2016/03/05
[ "https://security.stackexchange.com/questions/116566", "https://security.stackexchange.com", "https://security.stackexchange.com/users/103485/" ]
Sure it's possible, but it doesn't really help. The number of possibilities is just too large. Consider that a 256-bit key has 2256 possible values. That's 12✕1076, or 12 followed by 76 zeroes. If we generously assume that a computer can test a trillion (that's 1012) possible keys a second, and that we have a trillion...
It's not just possible, people have actually done this successfully. But only with very short keys. [distributed.net](https://www.distributed.net/Main_Page) managed to break a 64bit RC5-encryption in 2002 by using a distributed network of computers. The computers were mostly consumer-grade PCs owned by volunteers who ...
116,566
I've watched Mr. Robot lately and can't stop thinking why it was so hard to decrypt files encrypted using AES encryption with a 256-bit key. Let us say the only method to find the key is through brute force. Can't we set a computer to brute force starting from the first possible key, and another to begin from the...
2016/03/05
[ "https://security.stackexchange.com/questions/116566", "https://security.stackexchange.com", "https://security.stackexchange.com/users/103485/" ]
I did a calculation on this one once. Let's assume AES can only be broken using brute force. Clearly we are going to need a counter, which counts from 0 to 2256-1, and on average it will need to count to 2255. Running this counter takes energy. How much energy does it take? As it turns out, there is a thermodynamic li...
It's not just possible, people have actually done this successfully. But only with very short keys. [distributed.net](https://www.distributed.net/Main_Page) managed to break a 64bit RC5-encryption in 2002 by using a distributed network of computers. The computers were mostly consumer-grade PCs owned by volunteers who ...
21,651
That is, does NASA still have all the training equipment, computers and so forth that would be required for a new moon program, or would all of that have to be rebuilt as well as building new rockets?
2017/05/26
[ "https://space.stackexchange.com/questions/21651", "https://space.stackexchange.com", "https://space.stackexchange.com/users/19777/" ]
No Apollo training equipment is still functional, at least at Johnson Space Center (JSC). The Apollo Mission Simulators were removed and sent to museums. The facility space they once occupied in Building 5 was then filled with the Shuttle Mission Simulators. They have now been removed and sent to museums. [![enter i...
First, just about none of the original equipment is in usable condition. It may not be completely impossible to refurbish it, but it would be so far beyond the realm of the achievable that is might as well be. If you really had your heart set on it, some Saturn V's were built for Apollo 18-20 but never flown. Not sure ...
45,076
I have been wanting to have a career mentor for couple years. This year our (software) company is starting a mentoring program. I have two topics that I think I need help in developing my career, and I'm wondering if these are good topics to work with a mentor, or could they raise red flags in HR or my management chai...
2015/05/01
[ "https://workplace.stackexchange.com/questions/45076", "https://workplace.stackexchange.com", "https://workplace.stackexchange.com/users/34724/" ]
The first thing you need to keep in mind is that if the firm has started a mentoring program, its purpose is to help you sort out the kinds of issues you mention. What else would a mentoring program be for, unless you believe it's some kind of trap to get people to expose their weaknesses? That being said, your first ...
One of the useful things to ask a mentor is "if I have these interests and goals, what skills should I be developing/demonstrating to advance my career in that direction?" In other words, if you aren't sure what to ask, it's legitimate to ask for help with that too. Ideally, you'd want a mentor who is at least few ste...
45,076
I have been wanting to have a career mentor for couple years. This year our (software) company is starting a mentoring program. I have two topics that I think I need help in developing my career, and I'm wondering if these are good topics to work with a mentor, or could they raise red flags in HR or my management chai...
2015/05/01
[ "https://workplace.stackexchange.com/questions/45076", "https://workplace.stackexchange.com", "https://workplace.stackexchange.com/users/34724/" ]
The first thing you need to keep in mind is that if the firm has started a mentoring program, its purpose is to help you sort out the kinds of issues you mention. What else would a mentoring program be for, unless you believe it's some kind of trap to get people to expose their weaknesses? That being said, your first ...
I started a mentoring program this year, and I'll say that among the first topics in our first session was - "exactly how far does the right to privacy extend?" It's not that either my mentor or I are particularly paranoid - but both of us understood that when it comes to confidentiality, you can't fix a breach in trus...
45,076
I have been wanting to have a career mentor for couple years. This year our (software) company is starting a mentoring program. I have two topics that I think I need help in developing my career, and I'm wondering if these are good topics to work with a mentor, or could they raise red flags in HR or my management chai...
2015/05/01
[ "https://workplace.stackexchange.com/questions/45076", "https://workplace.stackexchange.com", "https://workplace.stackexchange.com/users/34724/" ]
I started a mentoring program this year, and I'll say that among the first topics in our first session was - "exactly how far does the right to privacy extend?" It's not that either my mentor or I are particularly paranoid - but both of us understood that when it comes to confidentiality, you can't fix a breach in trus...
One of the useful things to ask a mentor is "if I have these interests and goals, what skills should I be developing/demonstrating to advance my career in that direction?" In other words, if you aren't sure what to ask, it's legitimate to ask for help with that too. Ideally, you'd want a mentor who is at least few ste...
156,103
In the TV series Sense 8, we learn from Jonas and Will's conversation that any sensate outside the cluster needs to make eye contact with a person to be able to talk to him/her the way sensates inside a cluster do. Once Whispers makes eye contact with any person in a cluster he is able to hunt the cluster using that on...
2017/03/30
[ "https://scifi.stackexchange.com/questions/156103", "https://scifi.stackexchange.com", "https://scifi.stackexchange.com/users/75265/" ]
*Spoilers below.* **In-Universe:** As we see with Nyles Bolger in [Episode 7](https://en.wikipedia.org/wiki/Sense8_(season_1)#Episodes), being lobotomized is not mutually exclusive with being under Whisper's control. Was Nyles exposed to Whispers before his lobotomy, or after? We don't know... but we do see Whispers ...
The fact that Nomi was already in the hospital for her accident was likely too convenient to pass up. In the end, the mission of BPO is to destroy sensates. Depriving them of their shared abilities (and creating soldiers, as in Nyles) is as important as tracking down more. And with Jonas actively interacting with the n...
156,103
In the TV series Sense 8, we learn from Jonas and Will's conversation that any sensate outside the cluster needs to make eye contact with a person to be able to talk to him/her the way sensates inside a cluster do. Once Whispers makes eye contact with any person in a cluster he is able to hunt the cluster using that on...
2017/03/30
[ "https://scifi.stackexchange.com/questions/156103", "https://scifi.stackexchange.com", "https://scifi.stackexchange.com/users/75265/" ]
*Spoilers below.* **In-Universe:** As we see with Nyles Bolger in [Episode 7](https://en.wikipedia.org/wiki/Sense8_(season_1)#Episodes), being lobotomized is not mutually exclusive with being under Whisper's control. Was Nyles exposed to Whispers before his lobotomy, or after? We don't know... but we do see Whispers ...
I look at it like a priorities situation. While they may have just found out about Nomi. They were more concerned that they had just captured Jonas who had been a thorn in their side for years with intimate knowledge of their organization. While Nomi didn't even know what a sensate was. In this instance Jonas would tak...
156,103
In the TV series Sense 8, we learn from Jonas and Will's conversation that any sensate outside the cluster needs to make eye contact with a person to be able to talk to him/her the way sensates inside a cluster do. Once Whispers makes eye contact with any person in a cluster he is able to hunt the cluster using that on...
2017/03/30
[ "https://scifi.stackexchange.com/questions/156103", "https://scifi.stackexchange.com", "https://scifi.stackexchange.com/users/75265/" ]
*Spoilers below.* **In-Universe:** As we see with Nyles Bolger in [Episode 7](https://en.wikipedia.org/wiki/Sense8_(season_1)#Episodes), being lobotomized is not mutually exclusive with being under Whisper's control. Was Nyles exposed to Whispers before his lobotomy, or after? We don't know... but we do see Whispers ...
It was Dr.Metzger that tried to operate on Nomi's brain, before Will helped them escape from the medical gurney.
156,103
In the TV series Sense 8, we learn from Jonas and Will's conversation that any sensate outside the cluster needs to make eye contact with a person to be able to talk to him/her the way sensates inside a cluster do. Once Whispers makes eye contact with any person in a cluster he is able to hunt the cluster using that on...
2017/03/30
[ "https://scifi.stackexchange.com/questions/156103", "https://scifi.stackexchange.com", "https://scifi.stackexchange.com/users/75265/" ]
*Spoilers below.* **In-Universe:** As we see with Nyles Bolger in [Episode 7](https://en.wikipedia.org/wiki/Sense8_(season_1)#Episodes), being lobotomized is not mutually exclusive with being under Whisper's control. Was Nyles exposed to Whispers before his lobotomy, or after? We don't know... but we do see Whispers ...
The Chairman was controlling the Dr. If the lobotomy was done on Nomi, then Whispers wouldn't know about her or be able to get to her in time. Plus her brain scans showed she was just starting to turn Sensate. The chairman just wanted all Sensate to die. But Whispers had his own goal.
156,103
In the TV series Sense 8, we learn from Jonas and Will's conversation that any sensate outside the cluster needs to make eye contact with a person to be able to talk to him/her the way sensates inside a cluster do. Once Whispers makes eye contact with any person in a cluster he is able to hunt the cluster using that on...
2017/03/30
[ "https://scifi.stackexchange.com/questions/156103", "https://scifi.stackexchange.com", "https://scifi.stackexchange.com/users/75265/" ]
The fact that Nomi was already in the hospital for her accident was likely too convenient to pass up. In the end, the mission of BPO is to destroy sensates. Depriving them of their shared abilities (and creating soldiers, as in Nyles) is as important as tracking down more. And with Jonas actively interacting with the n...
It was Dr.Metzger that tried to operate on Nomi's brain, before Will helped them escape from the medical gurney.
156,103
In the TV series Sense 8, we learn from Jonas and Will's conversation that any sensate outside the cluster needs to make eye contact with a person to be able to talk to him/her the way sensates inside a cluster do. Once Whispers makes eye contact with any person in a cluster he is able to hunt the cluster using that on...
2017/03/30
[ "https://scifi.stackexchange.com/questions/156103", "https://scifi.stackexchange.com", "https://scifi.stackexchange.com/users/75265/" ]
The fact that Nomi was already in the hospital for her accident was likely too convenient to pass up. In the end, the mission of BPO is to destroy sensates. Depriving them of their shared abilities (and creating soldiers, as in Nyles) is as important as tracking down more. And with Jonas actively interacting with the n...
The Chairman was controlling the Dr. If the lobotomy was done on Nomi, then Whispers wouldn't know about her or be able to get to her in time. Plus her brain scans showed she was just starting to turn Sensate. The chairman just wanted all Sensate to die. But Whispers had his own goal.
156,103
In the TV series Sense 8, we learn from Jonas and Will's conversation that any sensate outside the cluster needs to make eye contact with a person to be able to talk to him/her the way sensates inside a cluster do. Once Whispers makes eye contact with any person in a cluster he is able to hunt the cluster using that on...
2017/03/30
[ "https://scifi.stackexchange.com/questions/156103", "https://scifi.stackexchange.com", "https://scifi.stackexchange.com/users/75265/" ]
I look at it like a priorities situation. While they may have just found out about Nomi. They were more concerned that they had just captured Jonas who had been a thorn in their side for years with intimate knowledge of their organization. While Nomi didn't even know what a sensate was. In this instance Jonas would tak...
It was Dr.Metzger that tried to operate on Nomi's brain, before Will helped them escape from the medical gurney.
156,103
In the TV series Sense 8, we learn from Jonas and Will's conversation that any sensate outside the cluster needs to make eye contact with a person to be able to talk to him/her the way sensates inside a cluster do. Once Whispers makes eye contact with any person in a cluster he is able to hunt the cluster using that on...
2017/03/30
[ "https://scifi.stackexchange.com/questions/156103", "https://scifi.stackexchange.com", "https://scifi.stackexchange.com/users/75265/" ]
I look at it like a priorities situation. While they may have just found out about Nomi. They were more concerned that they had just captured Jonas who had been a thorn in their side for years with intimate knowledge of their organization. While Nomi didn't even know what a sensate was. In this instance Jonas would tak...
The Chairman was controlling the Dr. If the lobotomy was done on Nomi, then Whispers wouldn't know about her or be able to get to her in time. Plus her brain scans showed she was just starting to turn Sensate. The chairman just wanted all Sensate to die. But Whispers had his own goal.
62,739
Facebook is charging me money on a daily basis without any kind of authorization. I want to close FB Ads account and it's been so hard. I finally found the button and it doesn't seem to work on any browser. After I click nothing happens! ![enter image description here](https://i.stack.imgur.com/8ynnv.png) Do you thi...
2014/06/21
[ "https://webapps.stackexchange.com/questions/62739", "https://webapps.stackexchange.com", "https://webapps.stackexchange.com/users/72653/" ]
You should contact facebook support about this. They can probably make the change on the server side for you. Also try unchecking all and press save changes. If that doesn't work, report that to facebook support as well.
With Firefox didn't work. I tried with Internet Explorer and it worked!
121,967
I am wondering if anyone who is a software developer looking for employment finds jobs on [Github Jobs](https://jobs.github.com/). I will begin my job search soon and was wondering if employers favor applications from Github Jobs more than traditional sources. Does anyone think Github Jobs is better than Indeed or ot...
2018/11/01
[ "https://workplace.stackexchange.com/questions/121967", "https://workplace.stackexchange.com", "https://workplace.stackexchange.com/users/93542/" ]
Most of the time, systems like this all feed resumes into the same pool. Then, someone filters the applications and sends them to hiring managers/etc. There are even software tools which employers can use to send a single job to *all* the various job sites. By far and away the "best" way to apply is if you know someo...
So here's a fun story on how IT recruitment works! A typical flow, assuming the recruiter has the job requirement: 1. Go to the major job (dice, monster etc) boards, get all the CVs that were uploaded in the last week. Check to see if any of them match the job keywords 2. Go to linked in, for a small monthly fee you c...
53,200
My mind is hazy, I'm completely stunned Is it seriously dangerous - should I run? What day is it? What month? What year? Is it night so soon filled with shadows I fear? Take heed! Beware! My brother, my friend I paid the price so you can see the journey's end Cause it's all the same - all but one affai...
2017/07/06
[ "https://puzzling.stackexchange.com/questions/53200", "https://puzzling.stackexchange.com", "https://puzzling.stackexchange.com/users/35972/" ]
The answer is > > Dare > > > In light of the hint, we are trying to find a four letter word for each line. My mind is hazy, I'm completely stunned > > Daze > > > Is it seriously dangerous - should I run? > > Dire > > > What day is it? What month? What year? > > Date > > > Is it night so ...
I think it is: > > subject 16 of the game assassin's creed II (haven't finished the game yet, so not sure if all lines are correct) > > > My mind is hazy, I'm completely stunned > > being to long in the animus has bad effects on your mind and health > > > Is it seriously dangerous - should I run? > > t...
687
When we can use "recent past"? How much past time qualifies for "recent past"?
2010/08/13
[ "https://english.stackexchange.com/questions/687", "https://english.stackexchange.com", "https://english.stackexchange.com/users/313/" ]
It would depend on the subject at hand. In certain circles, anything in the Cenozoic Era might count as the 'recent past'. I've certainly used the term myself in ordinary conversation to mean 'since the last ice age'.
When referring to historic and architectural resources, there is the "fifty year rule", which means that the resources are younger than fifty years old.
90,318
I recently saw this being used on a church [website](https://www.theliftchurch.tv/), where they describe themselves as "a regional, Spirit-filled, Word-based church led by Pastors Keith and Margie Nix." Now, I understand "Word-based". They hold to *sola scriptura*. That's easy. But it kind of threw me to see "Spirit-...
2022/03/29
[ "https://christianity.stackexchange.com/questions/90318", "https://christianity.stackexchange.com", "https://christianity.stackexchange.com/users/-1/" ]
The term "Spirit Filled" is a Pentecostal / Charismatic term or idiom. It means that the church practices the various activities associated with that movement as far as "praying in tongues", Faith Healing, and sometimes some of the other alleged miraculous "gifts of the Spirit", aka charisms of the Bible mentioned in 1...
They were all filled with the Holy Spirit. None was not filled. > > And when they had prayed, the place was shaken where they were assembled together; and they were all filled with the Holy Ghost, and they spake the word of God with boldness. [Acts 4:31 KJV] > > > To be one of these people, one must also be fille...
49,467,397
In unity3d, I dragged two cubes next together but when hit play they have a gap like the picture. [![](https://i.stack.imgur.com/JXTB9.png)](https://i.stack.imgur.com/JXTB9.png) [![enter image description here](https://i.stack.imgur.com/Y2Hol.png)](https://i.stack.imgur.com/Y2Hol.png)
2018/03/24
[ "https://Stackoverflow.com/questions/49467397", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2469592/" ]
Press and hold the V key to activate the vertex snapping mode. Do this in the unity editor when moving the cubes to ensure they are exactly aligned.
As it was mentioned, seam between objects appear because there is two different objects which are has no common relations (vertices i.e.). If you want some modeling or level design right inside Unity it's a good idea to use tools such as ProBuilder which is part of Unity now. In a few words, ProBuilder provide support...
2,554,537
I want to visualize components and connections of a [HVAC](https://en.wikipedia.org/wiki/Duct_(HVAC)) system with .NET/C#. The diagrams will just include a few different components and their connections. They do not have to comply to any formal standard and should look alike the diagrams attached. In addition the user ...
2010/03/31
[ "https://Stackoverflow.com/questions/2554537", "https://Stackoverflow.com", "https://Stackoverflow.com/users/271968/" ]
I would try to host VS studio designer in application , how you can host workflow designer for instance. Read about VS extensibilities
It doesn't get more free than System.Drawing... Seriously, given your requirements I'm not sure you need a framework or library. The most complex part of the system you describe is drawing the lines between components. If that doesn't have to get fancy (automatic layout, detecting where the lines overlay other lines/b...
2,554,537
I want to visualize components and connections of a [HVAC](https://en.wikipedia.org/wiki/Duct_(HVAC)) system with .NET/C#. The diagrams will just include a few different components and their connections. They do not have to comply to any formal standard and should look alike the diagrams attached. In addition the user ...
2010/03/31
[ "https://Stackoverflow.com/questions/2554537", "https://Stackoverflow.com", "https://Stackoverflow.com/users/271968/" ]
Julian, Please check out GraphSharp: <http://graphsharp.codeplex.com/Release/ProjectReleases.aspx>
It doesn't get more free than System.Drawing... Seriously, given your requirements I'm not sure you need a framework or library. The most complex part of the system you describe is drawing the lines between components. If that doesn't have to get fancy (automatic layout, detecting where the lines overlay other lines/b...
2,554,537
I want to visualize components and connections of a [HVAC](https://en.wikipedia.org/wiki/Duct_(HVAC)) system with .NET/C#. The diagrams will just include a few different components and their connections. They do not have to comply to any formal standard and should look alike the diagrams attached. In addition the user ...
2010/03/31
[ "https://Stackoverflow.com/questions/2554537", "https://Stackoverflow.com", "https://Stackoverflow.com/users/271968/" ]
Small/open source C# library on Git renders to HTML5 (You can modify to render to for example WPF or Winform as well) <https://gridwizard.wordpress.com/2015/03/25/simple-c-library-to-render-graph-to-flowchart>
It doesn't get more free than System.Drawing... Seriously, given your requirements I'm not sure you need a framework or library. The most complex part of the system you describe is drawing the lines between components. If that doesn't have to get fancy (automatic layout, detecting where the lines overlay other lines/b...
2,554,537
I want to visualize components and connections of a [HVAC](https://en.wikipedia.org/wiki/Duct_(HVAC)) system with .NET/C#. The diagrams will just include a few different components and their connections. They do not have to comply to any formal standard and should look alike the diagrams attached. In addition the user ...
2010/03/31
[ "https://Stackoverflow.com/questions/2554537", "https://Stackoverflow.com", "https://Stackoverflow.com/users/271968/" ]
Julian, Please check out GraphSharp: <http://graphsharp.codeplex.com/Release/ProjectReleases.aspx>
I would try to host VS studio designer in application , how you can host workflow designer for instance. Read about VS extensibilities
2,554,537
I want to visualize components and connections of a [HVAC](https://en.wikipedia.org/wiki/Duct_(HVAC)) system with .NET/C#. The diagrams will just include a few different components and their connections. They do not have to comply to any formal standard and should look alike the diagrams attached. In addition the user ...
2010/03/31
[ "https://Stackoverflow.com/questions/2554537", "https://Stackoverflow.com", "https://Stackoverflow.com/users/271968/" ]
Small/open source C# library on Git renders to HTML5 (You can modify to render to for example WPF or Winform as well) <https://gridwizard.wordpress.com/2015/03/25/simple-c-library-to-render-graph-to-flowchart>
I would try to host VS studio designer in application , how you can host workflow designer for instance. Read about VS extensibilities
2,554,537
I want to visualize components and connections of a [HVAC](https://en.wikipedia.org/wiki/Duct_(HVAC)) system with .NET/C#. The diagrams will just include a few different components and their connections. They do not have to comply to any formal standard and should look alike the diagrams attached. In addition the user ...
2010/03/31
[ "https://Stackoverflow.com/questions/2554537", "https://Stackoverflow.com", "https://Stackoverflow.com/users/271968/" ]
Julian, Please check out GraphSharp: <http://graphsharp.codeplex.com/Release/ProjectReleases.aspx>
Small/open source C# library on Git renders to HTML5 (You can modify to render to for example WPF or Winform as well) <https://gridwizard.wordpress.com/2015/03/25/simple-c-library-to-render-graph-to-flowchart>
272,398
Meta is great , but I'm really curious how the product management side of Stack Overflow interacts with this site. Someone comes on meta and says "XYZ is a problem", but I'm sure you guys working for Stack Overflow have your own list of priorities. But are these priorities kept in-house? Are there laws requiring that...
2014/09/29
[ "https://meta.stackoverflow.com/questions/272398", "https://meta.stackoverflow.com", "https://meta.stackoverflow.com/users/763029/" ]
Anything tagged [feature-request](/questions/tagged/feature-request "show questions tagged 'feature-request'") OR [bug](/questions/tagged/bug "show questions tagged 'bug'") and **NOT** tagged [status-declined](/questions/tagged/status-declined "show questions tagged 'status-declined'") and **NOT** tagged [status-comple...
All of the questions tagged [status-planned](/questions/tagged/status-planned "show questions tagged 'status-planned'") are features that SE has planned to release.
61,878
Requirements: * only publisher can create messages * publisher & subscriber can both read messages and authenticate the publisher * offline message transfer * messages can't be read by non-participants * subscribers can be mobile platforms (Android, iPhone), i.e. less powerful processors * messages lifetime target is ...
2018/08/29
[ "https://crypto.stackexchange.com/questions/61878", "https://crypto.stackexchange.com", "https://crypto.stackexchange.com/users/60829/" ]
There are some interesting examples in section 3.4.2 of [Katz-Lindell](https://www.crcpress.com/Introduction-to-Modern-Cryptography/Katz-Lindell/p/book/9781466570269) book. Here is just one of them: During World War II, the British placed mines at certain locations and (intentionally) managed to let the Germans discov...
The lead up to the Battle of [Midway](https://en.wikipedia.org/wiki/Battle_of_Midway) also involved a chosen plaintext attack. The Americans had mostly broken the Japanese code [JN-25b](https://www.nsa.gov/about/cryptologic-heritage/center-cryptologic-history/pearl-harbor-review/jn25.shtml), and knew the Japanese were ...
61,878
Requirements: * only publisher can create messages * publisher & subscriber can both read messages and authenticate the publisher * offline message transfer * messages can't be read by non-participants * subscribers can be mobile platforms (Android, iPhone), i.e. less powerful processors * messages lifetime target is ...
2018/08/29
[ "https://crypto.stackexchange.com/questions/61878", "https://crypto.stackexchange.com", "https://crypto.stackexchange.com/users/60829/" ]
It's not necessary that you encounter a situation like this in the real world to motivate the definition. There are some weaker adversaries that you would like to rule out in your security model, and CPA-security usually would encompass them all. Think for example of an encryption scheme which is intended to be used ...
Another WW2 example. German U-boats always started their encrypted transmissions with a weather report in a standard format which was revealed when the British captured a copy of the weather codebook. If the British knew what the weather was like at the time and place of the transmission, then they knew what the plaint...
61,878
Requirements: * only publisher can create messages * publisher & subscriber can both read messages and authenticate the publisher * offline message transfer * messages can't be read by non-participants * subscribers can be mobile platforms (Android, iPhone), i.e. less powerful processors * messages lifetime target is ...
2018/08/29
[ "https://crypto.stackexchange.com/questions/61878", "https://crypto.stackexchange.com", "https://crypto.stackexchange.com/users/60829/" ]
Bruce Schneier foresaw your skepticism and directly answered this question in ["Applied Cryptography"](https://www.safaribooksonline.com/library/view/applied-cryptography-protocols/9781119096726): > > Known-plaintext attacks and chosen-plaintext attacks are more common than you might think. It is not unheard-of for a...
Practical chosen-plaintext attacks have been discovered against modern cryptosystems like TLS/SSL. One noteworthy type of vulnerability can occur when a cryptosystem includes a compression step before encryption (which TLS used to do). This led to several well-known exploits such as [CRIME](https://en.wikipedia.org/wik...
61,878
Requirements: * only publisher can create messages * publisher & subscriber can both read messages and authenticate the publisher * offline message transfer * messages can't be read by non-participants * subscribers can be mobile platforms (Android, iPhone), i.e. less powerful processors * messages lifetime target is ...
2018/08/29
[ "https://crypto.stackexchange.com/questions/61878", "https://crypto.stackexchange.com", "https://crypto.stackexchange.com/users/60829/" ]
Practical chosen-plaintext attacks have been discovered against modern cryptosystems like TLS/SSL. One noteworthy type of vulnerability can occur when a cryptosystem includes a compression step before encryption (which TLS used to do). This led to several well-known exploits such as [CRIME](https://en.wikipedia.org/wik...
Another WW2 example. German U-boats always started their encrypted transmissions with a weather report in a standard format which was revealed when the British captured a copy of the weather codebook. If the British knew what the weather was like at the time and place of the transmission, then they knew what the plaint...
61,878
Requirements: * only publisher can create messages * publisher & subscriber can both read messages and authenticate the publisher * offline message transfer * messages can't be read by non-participants * subscribers can be mobile platforms (Android, iPhone), i.e. less powerful processors * messages lifetime target is ...
2018/08/29
[ "https://crypto.stackexchange.com/questions/61878", "https://crypto.stackexchange.com", "https://crypto.stackexchange.com/users/60829/" ]
There are some interesting examples in section 3.4.2 of [Katz-Lindell](https://www.crcpress.com/Introduction-to-Modern-Cryptography/Katz-Lindell/p/book/9781466570269) book. Here is just one of them: During World War II, the British placed mines at certain locations and (intentionally) managed to let the Germans discov...
Another WW2 example. German U-boats always started their encrypted transmissions with a weather report in a standard format which was revealed when the British captured a copy of the weather codebook. If the British knew what the weather was like at the time and place of the transmission, then they knew what the plaint...
61,878
Requirements: * only publisher can create messages * publisher & subscriber can both read messages and authenticate the publisher * offline message transfer * messages can't be read by non-participants * subscribers can be mobile platforms (Android, iPhone), i.e. less powerful processors * messages lifetime target is ...
2018/08/29
[ "https://crypto.stackexchange.com/questions/61878", "https://crypto.stackexchange.com", "https://crypto.stackexchange.com/users/60829/" ]
Bruce Schneier foresaw your skepticism and directly answered this question in ["Applied Cryptography"](https://www.safaribooksonline.com/library/view/applied-cryptography-protocols/9781119096726): > > Known-plaintext attacks and chosen-plaintext attacks are more common than you might think. It is not unheard-of for a...
It's not necessary that you encounter a situation like this in the real world to motivate the definition. There are some weaker adversaries that you would like to rule out in your security model, and CPA-security usually would encompass them all. Think for example of an encryption scheme which is intended to be used ...
61,878
Requirements: * only publisher can create messages * publisher & subscriber can both read messages and authenticate the publisher * offline message transfer * messages can't be read by non-participants * subscribers can be mobile platforms (Android, iPhone), i.e. less powerful processors * messages lifetime target is ...
2018/08/29
[ "https://crypto.stackexchange.com/questions/61878", "https://crypto.stackexchange.com", "https://crypto.stackexchange.com/users/60829/" ]
It's not necessary that you encounter a situation like this in the real world to motivate the definition. There are some weaker adversaries that you would like to rule out in your security model, and CPA-security usually would encompass them all. Think for example of an encryption scheme which is intended to be used ...
Another scenario: a disk encryption system where the attacker can let the system store chosen files in a known location (like a Downloads folder), and can observe the cipher text later.
61,878
Requirements: * only publisher can create messages * publisher & subscriber can both read messages and authenticate the publisher * offline message transfer * messages can't be read by non-participants * subscribers can be mobile platforms (Android, iPhone), i.e. less powerful processors * messages lifetime target is ...
2018/08/29
[ "https://crypto.stackexchange.com/questions/61878", "https://crypto.stackexchange.com", "https://crypto.stackexchange.com/users/60829/" ]
Bruce Schneier foresaw your skepticism and directly answered this question in ["Applied Cryptography"](https://www.safaribooksonline.com/library/view/applied-cryptography-protocols/9781119096726): > > Known-plaintext attacks and chosen-plaintext attacks are more common than you might think. It is not unheard-of for a...
The lead up to the Battle of [Midway](https://en.wikipedia.org/wiki/Battle_of_Midway) also involved a chosen plaintext attack. The Americans had mostly broken the Japanese code [JN-25b](https://www.nsa.gov/about/cryptologic-heritage/center-cryptologic-history/pearl-harbor-review/jn25.shtml), and knew the Japanese were ...
61,878
Requirements: * only publisher can create messages * publisher & subscriber can both read messages and authenticate the publisher * offline message transfer * messages can't be read by non-participants * subscribers can be mobile platforms (Android, iPhone), i.e. less powerful processors * messages lifetime target is ...
2018/08/29
[ "https://crypto.stackexchange.com/questions/61878", "https://crypto.stackexchange.com", "https://crypto.stackexchange.com/users/60829/" ]
Bruce Schneier foresaw your skepticism and directly answered this question in ["Applied Cryptography"](https://www.safaribooksonline.com/library/view/applied-cryptography-protocols/9781119096726): > > Known-plaintext attacks and chosen-plaintext attacks are more common than you might think. It is not unheard-of for a...
Another WW2 example. German U-boats always started their encrypted transmissions with a weather report in a standard format which was revealed when the British captured a copy of the weather codebook. If the British knew what the weather was like at the time and place of the transmission, then they knew what the plaint...
61,878
Requirements: * only publisher can create messages * publisher & subscriber can both read messages and authenticate the publisher * offline message transfer * messages can't be read by non-participants * subscribers can be mobile platforms (Android, iPhone), i.e. less powerful processors * messages lifetime target is ...
2018/08/29
[ "https://crypto.stackexchange.com/questions/61878", "https://crypto.stackexchange.com", "https://crypto.stackexchange.com/users/60829/" ]
Practical chosen-plaintext attacks have been discovered against modern cryptosystems like TLS/SSL. One noteworthy type of vulnerability can occur when a cryptosystem includes a compression step before encryption (which TLS used to do). This led to several well-known exploits such as [CRIME](https://en.wikipedia.org/wik...
The lead up to the Battle of [Midway](https://en.wikipedia.org/wiki/Battle_of_Midway) also involved a chosen plaintext attack. The Americans had mostly broken the Japanese code [JN-25b](https://www.nsa.gov/about/cryptologic-heritage/center-cryptologic-history/pearl-harbor-review/jn25.shtml), and knew the Japanese were ...
135,819
What does a proxy do and how is it related to getting out of my network to the outside network?
2010/04/28
[ "https://superuser.com/questions/135819", "https://superuser.com", "https://superuser.com/users/54843/" ]
Proxy means something like "a thing which acts on behalf of another thing". It's an english word, rather than an IT word. For example, voting by proxy is when you ask someone else to vote in your place, usually because you trust their decisions. In the case of web proxies, it's a like a local webserver that can be ask...
If you're talking about a proxy server for the web, it's a server that you make a request for a web page to, then it turns around and gets the page and hands it back to your machine. Usually it caches the page in the process. Then if it's handling an office, for example, and you go to Microsoft.com, and three other pe...
1,493
I'm making a trip back home (to the coast) shortly, and I would like to bring back sand from the beach with me as a keepsake or memento. It's just a short weekend trip, and I won't be checking any luggage, so I was wondering if it's even worth bothering trying to bring sand aboard the plane in my carry-on? If so, what...
2011/08/09
[ "https://travel.stackexchange.com/questions/1493", "https://travel.stackexchange.com", "https://travel.stackexchange.com/users/588/" ]
While I was going to add this as a comment, I think it's more suitable as what SHOULD be the answer. While it may be fun to do, environmentally you really shouldn't do it. In addition to potential disease transfers, bugs or contamination, if everyone did this, think how it'd affect the beach! You're essentially doing ...
TSA held up my backpack containing a bag of beach sand. They did a chemical test for explosives on it, then sent me on my way. Eugene, Oregon.
1,493
I'm making a trip back home (to the coast) shortly, and I would like to bring back sand from the beach with me as a keepsake or memento. It's just a short weekend trip, and I won't be checking any luggage, so I was wondering if it's even worth bothering trying to bring sand aboard the plane in my carry-on? If so, what...
2011/08/09
[ "https://travel.stackexchange.com/questions/1493", "https://travel.stackexchange.com", "https://travel.stackexchange.com/users/588/" ]
It isn't a weapon, tool, flammable, explosive, chemical or liquid, so I can't imagine that it would be a problem. It isn't listed by the [TSA as a prohibited item](http://www.tsa.gov/travelers/airtravel/prohibited/permitted-prohibited-items.shtm). I'd say just put it in the bottom of your bag and not worry about it. I...
It is not a problem with TSA. Last year, the only suitcase that was opened by the TSA was the one with a small bottle of sand. The airport was San Fransisco The destination was Europe
1,493
I'm making a trip back home (to the coast) shortly, and I would like to bring back sand from the beach with me as a keepsake or memento. It's just a short weekend trip, and I won't be checking any luggage, so I was wondering if it's even worth bothering trying to bring sand aboard the plane in my carry-on? If so, what...
2011/08/09
[ "https://travel.stackexchange.com/questions/1493", "https://travel.stackexchange.com", "https://travel.stackexchange.com/users/588/" ]
While I was going to add this as a comment, I think it's more suitable as what SHOULD be the answer. While it may be fun to do, environmentally you really shouldn't do it. In addition to potential disease transfers, bugs or contamination, if everyone did this, think how it'd affect the beach! You're essentially doing ...
I brought black sand back to Canada from Dominica (an island in the Caribbean) last month. I kept the sand in a water bottle and I travelled carry on only. When TSA opened my bag, they asked me what it was and I told them “oh that’s some black sand I brought home with me from Dominica. I’m going to put it in a bottle a...
1,493
I'm making a trip back home (to the coast) shortly, and I would like to bring back sand from the beach with me as a keepsake or memento. It's just a short weekend trip, and I won't be checking any luggage, so I was wondering if it's even worth bothering trying to bring sand aboard the plane in my carry-on? If so, what...
2011/08/09
[ "https://travel.stackexchange.com/questions/1493", "https://travel.stackexchange.com", "https://travel.stackexchange.com/users/588/" ]
It isn't a weapon, tool, flammable, explosive, chemical or liquid, so I can't imagine that it would be a problem. It isn't listed by the [TSA as a prohibited item](http://www.tsa.gov/travelers/airtravel/prohibited/permitted-prohibited-items.shtm). I'd say just put it in the bottom of your bag and not worry about it. I...
TSA held up my backpack containing a bag of beach sand. They did a chemical test for explosives on it, then sent me on my way. Eugene, Oregon.
1,493
I'm making a trip back home (to the coast) shortly, and I would like to bring back sand from the beach with me as a keepsake or memento. It's just a short weekend trip, and I won't be checking any luggage, so I was wondering if it's even worth bothering trying to bring sand aboard the plane in my carry-on? If so, what...
2011/08/09
[ "https://travel.stackexchange.com/questions/1493", "https://travel.stackexchange.com", "https://travel.stackexchange.com/users/588/" ]
It isn't a weapon, tool, flammable, explosive, chemical or liquid, so I can't imagine that it would be a problem. It isn't listed by the [TSA as a prohibited item](http://www.tsa.gov/travelers/airtravel/prohibited/permitted-prohibited-items.shtm). I'd say just put it in the bottom of your bag and not worry about it. I...
I brought black sand back to Canada from Dominica (an island in the Caribbean) last month. I kept the sand in a water bottle and I travelled carry on only. When TSA opened my bag, they asked me what it was and I told them “oh that’s some black sand I brought home with me from Dominica. I’m going to put it in a bottle a...
1,493
I'm making a trip back home (to the coast) shortly, and I would like to bring back sand from the beach with me as a keepsake or memento. It's just a short weekend trip, and I won't be checking any luggage, so I was wondering if it's even worth bothering trying to bring sand aboard the plane in my carry-on? If so, what...
2011/08/09
[ "https://travel.stackexchange.com/questions/1493", "https://travel.stackexchange.com", "https://travel.stackexchange.com/users/588/" ]
While I was going to add this as a comment, I think it's more suitable as what SHOULD be the answer. While it may be fun to do, environmentally you really shouldn't do it. In addition to potential disease transfers, bugs or contamination, if everyone did this, think how it'd affect the beach! You're essentially doing ...
I had a small amount of beach sand from a Florida beach and it was confiscated by TSA agents at the Tampa airport. The sand came from a relatives beachfront home and they said it was ok for me to have it.