qid int64 1 74.7M | question stringlengths 12 33.8k | date stringlengths 10 10 | metadata list | response_j stringlengths 0 115k | response_k stringlengths 2 98.3k |
|---|---|---|---|---|---|
24,951 | My [4yr old son](https://nationalbikechallenge.org/rider/39497) has a [16in Bikestar](http://amzn.com/B003YT1B8E) and at times he maxes out the gearing on it trying to keep up with his old man. How feasible is it to add either a 2 or 3 speed hub to such a bike? I'm concerned about how much space the hub is going to take up and since I doubt the wheel is a 36h, can one be used with less spokes? I know kids grow out of bikes quickly but he is going to have this bike for a few years for now, and this wheel could be passed down to his sister (right now I'm planning on getting the same brand).
While cruising the flats it seems like his cadence is getting close to the high side while doing 7~8 mph. Any bit of downhill causes him to max out and spin crazy. When he wants to pick up the pace a little will also cause him to spin crazy. We have a few hills along our favorite routes that he struggles on so I can't just swap out the existing gearing. The front chain ring fills the chain guard so that is out of the question as well.
*BACKGROUND INFO*:
Ok, so I was mostly joking about the keeping up part, I let him lead and set the pace. When he falls behind, I slow down and let him pass, but stubborn kid likes to follow the trailer ...uh princess chariot... too. He also rides this bike daily to daycare and back (2 miles one way).
This bike was picked with commuting in mind. We got him this bike for his 4th birthday and about a few weeks after ditching the training wheels. He just barely fit it then and rides great with it now so we still have some time with it before he gets a new one.
Alternatives won't work as well since who wants to downgrade? He loves having his own bike. A trailer bike would probably not mesh well, he is already trying to attach his sisters trailer to his bike (and I'm tempted to let him). Long distance isn't an issue with him either, his first ride without training wheels on a 12 inch bike was 15 miles and his first ride with this bike was 21 miles. The common "long way" home from daycare is 10 miles itself. | 2014/10/01 | [
"https://bicycles.stackexchange.com/questions/24951",
"https://bicycles.stackexchange.com",
"https://bicycles.stackexchange.com/users/6782/"
] | It's pretty easy if you have a spoke cutter and are willing to run a funny spoke pattern. I suggest buying (ideally second hand) a three speed hub and lacing it into the 16" rim yourself. With a wheel that small and a child on it there's not enough load to make strength an issue, so you can reasonably either lace a 20 spoke rim to a 36 spoke hub using whatever holes are closest, or ignore two spoke holes in the rim and use every second hole in the hub (18/36). It's probably not going to be pretty, but it will work.
However I think you're going about this backwards. Why are you riding faster than he can? Much as you wouldn't suggest stilts so he can keep up when you walk, gears don't address the problem that you can ride faster than him. He doesn't have the power or endurance you do, so without a power assist he's going to be slower.
If you need to cover long distances, perhaps a trailer bike would be a better solution? That way he can "help", and you can go whatever speed you like. That's generally safer for your kids, since you're in control and the only real risk is them jumping off the bike while you're moving. | Old thread but why don’t you think the other way and do a “dingle” , put in a double chainring and shift on that rather than the sprocket.... too simple folks. |
24,951 | My [4yr old son](https://nationalbikechallenge.org/rider/39497) has a [16in Bikestar](http://amzn.com/B003YT1B8E) and at times he maxes out the gearing on it trying to keep up with his old man. How feasible is it to add either a 2 or 3 speed hub to such a bike? I'm concerned about how much space the hub is going to take up and since I doubt the wheel is a 36h, can one be used with less spokes? I know kids grow out of bikes quickly but he is going to have this bike for a few years for now, and this wheel could be passed down to his sister (right now I'm planning on getting the same brand).
While cruising the flats it seems like his cadence is getting close to the high side while doing 7~8 mph. Any bit of downhill causes him to max out and spin crazy. When he wants to pick up the pace a little will also cause him to spin crazy. We have a few hills along our favorite routes that he struggles on so I can't just swap out the existing gearing. The front chain ring fills the chain guard so that is out of the question as well.
*BACKGROUND INFO*:
Ok, so I was mostly joking about the keeping up part, I let him lead and set the pace. When he falls behind, I slow down and let him pass, but stubborn kid likes to follow the trailer ...uh princess chariot... too. He also rides this bike daily to daycare and back (2 miles one way).
This bike was picked with commuting in mind. We got him this bike for his 4th birthday and about a few weeks after ditching the training wheels. He just barely fit it then and rides great with it now so we still have some time with it before he gets a new one.
Alternatives won't work as well since who wants to downgrade? He loves having his own bike. A trailer bike would probably not mesh well, he is already trying to attach his sisters trailer to his bike (and I'm tempted to let him). Long distance isn't an issue with him either, his first ride without training wheels on a 12 inch bike was 15 miles and his first ride with this bike was 21 miles. The common "long way" home from daycare is 10 miles itself. | 2014/10/01 | [
"https://bicycles.stackexchange.com/questions/24951",
"https://bicycles.stackexchange.com",
"https://bicycles.stackexchange.com/users/6782/"
] | A [Brompton](https://en.wikipedia.org/wiki/Brompton_Bicycle) uses a 16" wheel size, which means you could get a used Brompton wheel with Sturmey Archer 3-speed hub and swap it out. The only problem is that such wheels are rather expensive even used. | Old thread but why don’t you think the other way and do a “dingle” , put in a double chainring and shift on that rather than the sprocket.... too simple folks. |
24,951 | My [4yr old son](https://nationalbikechallenge.org/rider/39497) has a [16in Bikestar](http://amzn.com/B003YT1B8E) and at times he maxes out the gearing on it trying to keep up with his old man. How feasible is it to add either a 2 or 3 speed hub to such a bike? I'm concerned about how much space the hub is going to take up and since I doubt the wheel is a 36h, can one be used with less spokes? I know kids grow out of bikes quickly but he is going to have this bike for a few years for now, and this wheel could be passed down to his sister (right now I'm planning on getting the same brand).
While cruising the flats it seems like his cadence is getting close to the high side while doing 7~8 mph. Any bit of downhill causes him to max out and spin crazy. When he wants to pick up the pace a little will also cause him to spin crazy. We have a few hills along our favorite routes that he struggles on so I can't just swap out the existing gearing. The front chain ring fills the chain guard so that is out of the question as well.
*BACKGROUND INFO*:
Ok, so I was mostly joking about the keeping up part, I let him lead and set the pace. When he falls behind, I slow down and let him pass, but stubborn kid likes to follow the trailer ...uh princess chariot... too. He also rides this bike daily to daycare and back (2 miles one way).
This bike was picked with commuting in mind. We got him this bike for his 4th birthday and about a few weeks after ditching the training wheels. He just barely fit it then and rides great with it now so we still have some time with it before he gets a new one.
Alternatives won't work as well since who wants to downgrade? He loves having his own bike. A trailer bike would probably not mesh well, he is already trying to attach his sisters trailer to his bike (and I'm tempted to let him). Long distance isn't an issue with him either, his first ride without training wheels on a 12 inch bike was 15 miles and his first ride with this bike was 21 miles. The common "long way" home from daycare is 10 miles itself. | 2014/10/01 | [
"https://bicycles.stackexchange.com/questions/24951",
"https://bicycles.stackexchange.com",
"https://bicycles.stackexchange.com/users/6782/"
] | You could buy a rear wheel from Woom with the Scram automatic 2 speed rear hub. It shifts gears when the hub reaches a certain speed.
I am in the same boat as you trying to modify a 16" bike for my 4 year old | Old thread but why don’t you think the other way and do a “dingle” , put in a double chainring and shift on that rather than the sprocket.... too simple folks. |
39,619 | >
> A three line whip is an ultimatum: "Show up and vote the party line, or suffer the consequences." [source](https://politics.stackexchange.com/a/16647/25686)
>
>
>
What's stopping the leaders of a party from three line whipping *every single vote*? Is there a limit on the frequency of its use, or is [the reason it's so uncommon](https://politics.stackexchange.com/a/15520) because of ethics / self control?
Yes, a Three Line Whip [requires](https://politics.stackexchange.com/a/11564/25686) that you are present at the time of voting and that you vote in the way your party wants. If everything gets whipped, you don't have *people* in parliament anymore, you have only political parties.
In the United States I'm used to having only 2, well established, political parties. Republicans always vote together. Democrats always vote together. It's an outlier when a handful of members "cross the aisle" to vote against their party. This makes the stance of the party front and center, and it very much seems that congress members first serve their party before the people of their state.
Is this an attitude change between the nations on how political parties are ran? If a political party has the power to Three Line Whip, why not do it more? | 2019/03/20 | [
"https://politics.stackexchange.com/questions/39619",
"https://politics.stackexchange.com",
"https://politics.stackexchange.com/users/25686/"
] | Yes, a party could pass the equivalent of a three line whip on every single division. However most votes in the House of Commons simply aren't important enough *or likely enough to be affected* for such a hardline policy to be effective. The MPs are also members of the parties and tend to share enough ideology to vote similarly even on matters of conscience. Overall. he main effect would be to seriously annoy the MPs themselves and to mean the party whips having to constantly devise effective punishments.
On the first point, many debates have an audience of a Deputy Speaker in the chair, the MP currently speaking and those MPs who have just spoken and are about to speak. These still have a vote at the end to adjourn the session. On the other, in the last hundred years, most parliaments have had one or other major party in power with large majorities, often on the order of 100 MPs or more. In such a situation Government business will almost always pass, even if many of their MPs are elsewhere doing all kinds of useful things including talking to the people they represent.
You are also somewhat overstating the adherence to party line that US politicians maintain. The website [fivethirtyeight.com](https://projects.fivethirtyeight.com/congress-trump-score/) has given members of the Senate a "Trump Score" for the percentage of time they have voted in line with the president's position. If both caucuses were always united, you would expect one score for Republicans and another score for Democrats. Instead there is a spectrum (although the parties don't intermingle). | Remember what the consequences for defying a whip are, and what they are not.
* The party cannot officially order a MP how to vote. That's why the generally understood convention of underlining suggestions once, twice, or three times developed.
* MPs have the **right** to leave their party. They remain MPs if they do. That is the leverage MPs hold over their party.
* MPs have **no right** to get nominated again by their party for the next election. Running as an independent will be harder. That is the leverage the party holds over the MPs.
So it is a kind of *hang together or hang separately* -- the party leadership can count on the votes of their party when it counts, and *individual* rebels will face the consequences. If whips become too common and resistance becomes widespread, the party leadership has lost control.
To give you another example, the whip is slightly stronger in Germany but the same principle applies. MdBs assemble formally into factions and faction membership helps determine committee memberships and speaking times. A lone MdB is possible, but he or she will be much less effective. MdB may decide to leave their faction (perhaps to join another) and they may be expelled if they violate the "party line" too much. |
13,160 | I was just watching a History Channel documentary [on YouTube](http://www.youtube.com/watch?v=R6JOMvOwECo) called "Kingjongilia" about people who have managed to escape North Korea.
Having visited South Korea a bunch of times now, I realize I didn't notice any kind of museum on these people and their plight. Googling for one now isn't helping much either.
**Is there such a museum somewhere in South Korea?** | 2013/01/30 | [
"https://travel.stackexchange.com/questions/13160",
"https://travel.stackexchange.com",
"https://travel.stackexchange.com/users/140/"
] | Unfortunately, I do not have a positive answer to this question. I have been looking around the web for a few days now and I am almost sure there is no such museum. I have been through the [list of museums in South Korea](http://en.wikipedia.org/wiki/List_of_museums_in_South_Korea) with the help of Google Translate but with no luck. There is not even one comment about such a museum in any website. I think I can safely say such a museum does NOT exist in South Korea. | Specific to defectors, not really. I think that would aggravate things more then anything. While South Koreans are aware of the "struggle" of many of their Northern brethren, things like the Ministry of Unification look actively to bond both cultures rather then highlight the differences.
If you're looking for a glimpse of North Korean life you might want to check out the [Odu Mountain Unification Observatory](http://www.jmd.co.kr/) in Paju. It's a fairly straight forward trip from Seoul and actually has a multi-level gallery that showcases the lives of North Koreans, from their groceries, clothes to "models" of homes. Plus in the basement you can get North Korean made goods, including liquor.
While you're in Paju you can also visit the DMZ, check out the elaborate ceremonies and tension between a bunch of 20 year old soldiers.
Why not actually just visit North Korea? I'm not sure how it is post Kim Jong-Il, but if your Mandarin is decent you can call around some of the travel agents in Dandong that will arrange a visa for you. The visa prices are actually comparable to some other well traveled countries. (Assuming you aren't American). If you're Malay you don't even need a visa :-) |
814,448 | I've heard the terminologies: register, hardware register, program register,register file.
What's the difference between all these? And in assebmly, what is the type of the EAX register? Program register? | 2009/05/02 | [
"https://Stackoverflow.com/questions/814448",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/92676/"
] | A register is a storage area inside the CPU. Here are some definitions:
* A register file is an array of registers - see <http://en.wikipedia.org/wiki/Register_file> for a full description.
* The eax register is the accumulator register of the Intel x86 family of CPUs - it's the place where integer maths gets done.
* The program register (I think you mean program counter) is a special purpose register which contains the address of the next machine code instruction to be executed | A "hardware register" might also refer to a location inside some hardware device. For example, a UART (COM port) looks like a D-shaped connector with 9 or 25 pins from outside the cabinet, but to the device driver it looks like several configuration registers, a status register, and data registers holding the next character to send and the last character received. (I've left out a *lot* of detail there.)
In the x86 architecture those registers are usually located in a special physical address space that is accessed with I/O instructions. In other platforms, it is common for hardware registers to be mapped to some corner of the normal memory space. In either case, one of the important roles of an operating system and its device drivers is to prevent application code from needing to know the details of where the hardware registers are located and what they mean.
In some kinds of hardware devices, the distinction between memory and hardware registers is less clear. For instance, your video adapter contains a block of memory known as the frame buffer that holds the color and brightness values for each individual pixel. Is that memory a large hardware register or is it just a buffer that has an interesting side effect? |
814,448 | I've heard the terminologies: register, hardware register, program register,register file.
What's the difference between all these? And in assebmly, what is the type of the EAX register? Program register? | 2009/05/02 | [
"https://Stackoverflow.com/questions/814448",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/92676/"
] | A register is a storage area inside the CPU. Here are some definitions:
* A register file is an array of registers - see <http://en.wikipedia.org/wiki/Register_file> for a full description.
* The eax register is the accumulator register of the Intel x86 family of CPUs - it's the place where integer maths gets done.
* The program register (I think you mean program counter) is a special purpose register which contains the address of the next machine code instruction to be executed | A register is the most basic data storage device. Now these are the main differences.
A register file is generally a large collection of registers organised in such a way so that they are used for computations. In a modern processor, all computations are performed between values stored in several registers in a register file.
A hardware register generally refers to registers that store configuration and status information. This could be for the processor or some external hardware I/O device.
A programme register may refer to the programme counter, a special register that stores the memory location of the current instruction being executed by the processor. |
814,448 | I've heard the terminologies: register, hardware register, program register,register file.
What's the difference between all these? And in assebmly, what is the type of the EAX register? Program register? | 2009/05/02 | [
"https://Stackoverflow.com/questions/814448",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/92676/"
] | Well, you have general purpose registers, then you have registers which have special usage (for example, the program counter registers), and you have various others (memory/segment registers, SSE).
EAX, EBX, etc. are the standard general purpose registers. You can use them for whatever you want. Usually, the return value is supposed to be put into EAX, but that's it basically. Then you have the stack pointer EBP, which points to the beginning of your stack. Finally, you have to program counter, which points to the current instruction, EIP. On x86, there are some special cases, where two registers get fused when doing 64-bit integer computations. More special cases exist for the string instructions. If you are about to learn assembly, the easiest would be to start with a PowerPC, which has more registers, and you're free to use all of them without restrictions.
All of these registers are of course hardware registers, that is, they are physically built into your CPU ;) The place where they are is called a register file.
The other type of registers you can see is if you have a virtual machine which uses registers ([Parrot](http://www.parrot.org/)), you get "virtual registers", which are later assigned to real registers. This is similar to what you can do when writing a compiler yourself, you basically assume an unlimited amount of registers (that is, you generate a new one on each usage), and do the transformation to real registers in a different phase (register allocation). | A "hardware register" might also refer to a location inside some hardware device. For example, a UART (COM port) looks like a D-shaped connector with 9 or 25 pins from outside the cabinet, but to the device driver it looks like several configuration registers, a status register, and data registers holding the next character to send and the last character received. (I've left out a *lot* of detail there.)
In the x86 architecture those registers are usually located in a special physical address space that is accessed with I/O instructions. In other platforms, it is common for hardware registers to be mapped to some corner of the normal memory space. In either case, one of the important roles of an operating system and its device drivers is to prevent application code from needing to know the details of where the hardware registers are located and what they mean.
In some kinds of hardware devices, the distinction between memory and hardware registers is less clear. For instance, your video adapter contains a block of memory known as the frame buffer that holds the color and brightness values for each individual pixel. Is that memory a large hardware register or is it just a buffer that has an interesting side effect? |
814,448 | I've heard the terminologies: register, hardware register, program register,register file.
What's the difference between all these? And in assebmly, what is the type of the EAX register? Program register? | 2009/05/02 | [
"https://Stackoverflow.com/questions/814448",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/92676/"
] | A register is a storage area inside the CPU. Here are some definitions:
* A register file is an array of registers - see <http://en.wikipedia.org/wiki/Register_file> for a full description.
* The eax register is the accumulator register of the Intel x86 family of CPUs - it's the place where integer maths gets done.
* The program register (I think you mean program counter) is a special purpose register which contains the address of the next machine code instruction to be executed | a register is a small bit of memory that sits inside the CPU. and is used by assembly language to perform various tasks.
could it be that by program register you mean program counter? |
814,448 | I've heard the terminologies: register, hardware register, program register,register file.
What's the difference between all these? And in assebmly, what is the type of the EAX register? Program register? | 2009/05/02 | [
"https://Stackoverflow.com/questions/814448",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/92676/"
] | A register is the most basic data storage device. Now these are the main differences.
A register file is generally a large collection of registers organised in such a way so that they are used for computations. In a modern processor, all computations are performed between values stored in several registers in a register file.
A hardware register generally refers to registers that store configuration and status information. This could be for the processor or some external hardware I/O device.
A programme register may refer to the programme counter, a special register that stores the memory location of the current instruction being executed by the processor. | In relation to the question, there are two general types of registers that you should consider:
* program registers
* hardware registers
The hardware registers are clocked (updated on clock ticks) and are used in the **physical** design of processor circuitry.
The program registers are random-access memory and are held in a register file located in the CPU. Assembly/machine code instructions access these registers through names like %eax, %esp, %rdi, %edi, etc. |
814,448 | I've heard the terminologies: register, hardware register, program register,register file.
What's the difference between all these? And in assebmly, what is the type of the EAX register? Program register? | 2009/05/02 | [
"https://Stackoverflow.com/questions/814448",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/92676/"
] | A "hardware register" might also refer to a location inside some hardware device. For example, a UART (COM port) looks like a D-shaped connector with 9 or 25 pins from outside the cabinet, but to the device driver it looks like several configuration registers, a status register, and data registers holding the next character to send and the last character received. (I've left out a *lot* of detail there.)
In the x86 architecture those registers are usually located in a special physical address space that is accessed with I/O instructions. In other platforms, it is common for hardware registers to be mapped to some corner of the normal memory space. In either case, one of the important roles of an operating system and its device drivers is to prevent application code from needing to know the details of where the hardware registers are located and what they mean.
In some kinds of hardware devices, the distinction between memory and hardware registers is less clear. For instance, your video adapter contains a block of memory known as the frame buffer that holds the color and brightness values for each individual pixel. Is that memory a large hardware register or is it just a buffer that has an interesting side effect? | In relation to the question, there are two general types of registers that you should consider:
* program registers
* hardware registers
The hardware registers are clocked (updated on clock ticks) and are used in the **physical** design of processor circuitry.
The program registers are random-access memory and are held in a register file located in the CPU. Assembly/machine code instructions access these registers through names like %eax, %esp, %rdi, %edi, etc. |
814,448 | I've heard the terminologies: register, hardware register, program register,register file.
What's the difference between all these? And in assebmly, what is the type of the EAX register? Program register? | 2009/05/02 | [
"https://Stackoverflow.com/questions/814448",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/92676/"
] | a register is a small bit of memory that sits inside the CPU. and is used by assembly language to perform various tasks.
could it be that by program register you mean program counter? | In relation to the question, there are two general types of registers that you should consider:
* program registers
* hardware registers
The hardware registers are clocked (updated on clock ticks) and are used in the **physical** design of processor circuitry.
The program registers are random-access memory and are held in a register file located in the CPU. Assembly/machine code instructions access these registers through names like %eax, %esp, %rdi, %edi, etc. |
814,448 | I've heard the terminologies: register, hardware register, program register,register file.
What's the difference between all these? And in assebmly, what is the type of the EAX register? Program register? | 2009/05/02 | [
"https://Stackoverflow.com/questions/814448",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/92676/"
] | Well, you have general purpose registers, then you have registers which have special usage (for example, the program counter registers), and you have various others (memory/segment registers, SSE).
EAX, EBX, etc. are the standard general purpose registers. You can use them for whatever you want. Usually, the return value is supposed to be put into EAX, but that's it basically. Then you have the stack pointer EBP, which points to the beginning of your stack. Finally, you have to program counter, which points to the current instruction, EIP. On x86, there are some special cases, where two registers get fused when doing 64-bit integer computations. More special cases exist for the string instructions. If you are about to learn assembly, the easiest would be to start with a PowerPC, which has more registers, and you're free to use all of them without restrictions.
All of these registers are of course hardware registers, that is, they are physically built into your CPU ;) The place where they are is called a register file.
The other type of registers you can see is if you have a virtual machine which uses registers ([Parrot](http://www.parrot.org/)), you get "virtual registers", which are later assigned to real registers. This is similar to what you can do when writing a compiler yourself, you basically assume an unlimited amount of registers (that is, you generate a new one on each usage), and do the transformation to real registers in a different phase (register allocation). | In relation to the question, there are two general types of registers that you should consider:
* program registers
* hardware registers
The hardware registers are clocked (updated on clock ticks) and are used in the **physical** design of processor circuitry.
The program registers are random-access memory and are held in a register file located in the CPU. Assembly/machine code instructions access these registers through names like %eax, %esp, %rdi, %edi, etc. |
814,448 | I've heard the terminologies: register, hardware register, program register,register file.
What's the difference between all these? And in assebmly, what is the type of the EAX register? Program register? | 2009/05/02 | [
"https://Stackoverflow.com/questions/814448",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/92676/"
] | A register is a storage area inside the CPU. Here are some definitions:
* A register file is an array of registers - see <http://en.wikipedia.org/wiki/Register_file> for a full description.
* The eax register is the accumulator register of the Intel x86 family of CPUs - it's the place where integer maths gets done.
* The program register (I think you mean program counter) is a special purpose register which contains the address of the next machine code instruction to be executed | In relation to the question, there are two general types of registers that you should consider:
* program registers
* hardware registers
The hardware registers are clocked (updated on clock ticks) and are used in the **physical** design of processor circuitry.
The program registers are random-access memory and are held in a register file located in the CPU. Assembly/machine code instructions access these registers through names like %eax, %esp, %rdi, %edi, etc. |
814,448 | I've heard the terminologies: register, hardware register, program register,register file.
What's the difference between all these? And in assebmly, what is the type of the EAX register? Program register? | 2009/05/02 | [
"https://Stackoverflow.com/questions/814448",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/92676/"
] | a register is a small bit of memory that sits inside the CPU. and is used by assembly language to perform various tasks.
could it be that by program register you mean program counter? | A "hardware register" might also refer to a location inside some hardware device. For example, a UART (COM port) looks like a D-shaped connector with 9 or 25 pins from outside the cabinet, but to the device driver it looks like several configuration registers, a status register, and data registers holding the next character to send and the last character received. (I've left out a *lot* of detail there.)
In the x86 architecture those registers are usually located in a special physical address space that is accessed with I/O instructions. In other platforms, it is common for hardware registers to be mapped to some corner of the normal memory space. In either case, one of the important roles of an operating system and its device drivers is to prevent application code from needing to know the details of where the hardware registers are located and what they mean.
In some kinds of hardware devices, the distinction between memory and hardware registers is less clear. For instance, your video adapter contains a block of memory known as the frame buffer that holds the color and brightness values for each individual pixel. Is that memory a large hardware register or is it just a buffer that has an interesting side effect? |
14,222 | Starfleet is supposed to "explore *strange* new worlds and boldly go where no man has gone before", yet most of the time they explore worlds that are more Earth-like than not, and are inhabited by human-like species.
I understand that the out-of-universe reason is that it is difficult to tell a story when the characters are always in space suits, but couldn't the writers have found some other way, rather than skipping all the interesting non-humanoid life forms? I remember the animated series characters using a skin-tight force field (a life-belt?) to explore inhospitable environments.
Or, are there really not that many interesting life forms on other classes of planets? | 2012/04/04 | [
"https://scifi.stackexchange.com/questions/14222",
"https://scifi.stackexchange.com",
"https://scifi.stackexchange.com/users/3247/"
] | I think we are meant to make the assumption that intelligent life in the Alpha quadrant (at least in a form recognizable to humans) is typically humanoid and therefore typically requires an M-class environment. This idea is supported by the TNG episode that touches on the existence of an ancient race of which most known species are descendants ([The Chase](http://en.wikipedia.org/wiki/The_Chase_%28Star_Trek:_The_Next_Generation%29)). But there are exceptional species, e.g. the [Benzites](http://en.memory-alpha.org/wiki/Benzite). | Personally, I don't think they want to explore the worlds. I think they want to meet the people. Humans are social creatures. We saw several times in ST:ENT where Archer chose to go with an inhabited world instead of a astronomical oddity. When they explored that star that was close to supernova, they seemed more interested in meeting the people who were studying it. |
14,222 | Starfleet is supposed to "explore *strange* new worlds and boldly go where no man has gone before", yet most of the time they explore worlds that are more Earth-like than not, and are inhabited by human-like species.
I understand that the out-of-universe reason is that it is difficult to tell a story when the characters are always in space suits, but couldn't the writers have found some other way, rather than skipping all the interesting non-humanoid life forms? I remember the animated series characters using a skin-tight force field (a life-belt?) to explore inhospitable environments.
Or, are there really not that many interesting life forms on other classes of planets? | 2012/04/04 | [
"https://scifi.stackexchange.com/questions/14222",
"https://scifi.stackexchange.com",
"https://scifi.stackexchange.com/users/3247/"
] | One reason is philosophical: *Star Trek* was always as much about entertainment and social commentary as about telling science fiction stories -- actually possibly more so. As such, production staff felt that there always needed to be ways to ensure the audience had just enough familiarity with what was going on to feel comfortable and to be able to draw parallels to the real world easily. That, in turn, meant keeping the environments Earthlike-but-weird.
Another reason is pseudoscientific: At the time *Star Trek*, the original series, was being developed, there was a "theory" that Roddenberry felt had some merit (and touts in all the material he used to sell the series to the studios, and in the early writers' bibles) suggesting that the universe was filled with parallel Earths. This is not parallel-universe theory as we now tend to see it played out both in later *Star Trek* and in other stories like *Sliders*. This is the notion that *in our universe* are multiple, separately evolved planets that nevertheless have people and histories remarkably similar to our own. Several stories clearly play on this, most notably "Bread and Circuses" (in which the Roman Empire survived to see technology equivalent to our 20th Century) and "The Omega Glory", which depicts a world in which the Cold War yielded to actual nuclear war.
And the final reason is budgetary: all those Earth-like worlds meant they could use existing Paramount back-lots, with their pre-built faux-towns and faux-cities that could be redressed to match a variety of needs (or in some cases had been built to mirror a particular time and place for some movie or other and now needed to be used). | In Universe:
------------
The [original studio pitch](http://50yos.tumblr.com/post/79244934260/original-star-trek-pitch-1964) offered by Gene Roddenberry confirmed that Captain Robert April's standing orders were to investigate Class-M planets due to **the limitations of his ship** (landing craft, standard sensor packages, etc).
>
> **Nature and duration of command:**
>
>
> *Galaxy exploration and Class-M investigation: 5 years*
>
>
> You will patrol the ninth quadrant, beginning with Alpha Centauri and
> extending to the outer Pinial Galaxy limit.
>
>
> You will conduct this patrol to accomplish primarily:
>
>
> (a) *Earth security, via exploration of intelligence and social systems
> capable of a galaxial threat, and*
>
>
> (b) *Scientific investigation to add to the earth's body of knowledge
> of life forma and social systems, and*
>
>
> (c) *Any required assistance to the several earth colonies in this
> quadrant, and the enforcement of appropriate statutes affecting such
> Federated commerce vessels and traders as you might contact in the
> course of your mission.*
>
>
> **Consistent with the equipment and limitations of of your cruiser-class
> vessel, you will confine your landings and contacts to planets
> approximating earth-Mars conditions, life, and social orders.**
>
>
>
Out of Universe
---------------
**It's cheaper.**
>
> Some format and budget considerations . . .
>
>
> SETS: Our format is tailored to practical production and cost factors.
> Use of stage sets, backlot and other locations are simplifled by
> Captain April's "Class-M" orders. And our own "Parallel Worlds"
> concept. The majority of story premises listed can be accomplished on
> such sommon studio backlot locales and sets such as Early 1900 Street,
> Oriental Village, Cow town, Border Fort, Victorian Drawing Room,
> Forest and Streamside.
>
>
> |
14,222 | Starfleet is supposed to "explore *strange* new worlds and boldly go where no man has gone before", yet most of the time they explore worlds that are more Earth-like than not, and are inhabited by human-like species.
I understand that the out-of-universe reason is that it is difficult to tell a story when the characters are always in space suits, but couldn't the writers have found some other way, rather than skipping all the interesting non-humanoid life forms? I remember the animated series characters using a skin-tight force field (a life-belt?) to explore inhospitable environments.
Or, are there really not that many interesting life forms on other classes of planets? | 2012/04/04 | [
"https://scifi.stackexchange.com/questions/14222",
"https://scifi.stackexchange.com",
"https://scifi.stackexchange.com/users/3247/"
] | One reason is philosophical: *Star Trek* was always as much about entertainment and social commentary as about telling science fiction stories -- actually possibly more so. As such, production staff felt that there always needed to be ways to ensure the audience had just enough familiarity with what was going on to feel comfortable and to be able to draw parallels to the real world easily. That, in turn, meant keeping the environments Earthlike-but-weird.
Another reason is pseudoscientific: At the time *Star Trek*, the original series, was being developed, there was a "theory" that Roddenberry felt had some merit (and touts in all the material he used to sell the series to the studios, and in the early writers' bibles) suggesting that the universe was filled with parallel Earths. This is not parallel-universe theory as we now tend to see it played out both in later *Star Trek* and in other stories like *Sliders*. This is the notion that *in our universe* are multiple, separately evolved planets that nevertheless have people and histories remarkably similar to our own. Several stories clearly play on this, most notably "Bread and Circuses" (in which the Roman Empire survived to see technology equivalent to our 20th Century) and "The Omega Glory", which depicts a world in which the Cold War yielded to actual nuclear war.
And the final reason is budgetary: all those Earth-like worlds meant they could use existing Paramount back-lots, with their pre-built faux-towns and faux-cities that could be redressed to match a variety of needs (or in some cases had been built to mirror a particular time and place for some movie or other and now needed to be used). | Personally, I don't think they want to explore the worlds. I think they want to meet the people. Humans are social creatures. We saw several times in ST:ENT where Archer chose to go with an inhabited world instead of a astronomical oddity. When they explored that star that was close to supernova, they seemed more interested in meeting the people who were studying it. |
14,222 | Starfleet is supposed to "explore *strange* new worlds and boldly go where no man has gone before", yet most of the time they explore worlds that are more Earth-like than not, and are inhabited by human-like species.
I understand that the out-of-universe reason is that it is difficult to tell a story when the characters are always in space suits, but couldn't the writers have found some other way, rather than skipping all the interesting non-humanoid life forms? I remember the animated series characters using a skin-tight force field (a life-belt?) to explore inhospitable environments.
Or, are there really not that many interesting life forms on other classes of planets? | 2012/04/04 | [
"https://scifi.stackexchange.com/questions/14222",
"https://scifi.stackexchange.com",
"https://scifi.stackexchange.com/users/3247/"
] | I would probably say out of universe they could not make a full episode on planets that had nothing on them. They could only do so much with an empty planet. Whereas class M/Earth like planets they could introduce new species easily. In universe answer I would say that they did but because the vessels in the episodes were not science vessels they were never tasked with such a mission. The Enterprise was the flag ship for the federation, I would probably say combat and diplomatic missions were more important for that vessel. That is my theory. | Personally, I don't think they want to explore the worlds. I think they want to meet the people. Humans are social creatures. We saw several times in ST:ENT where Archer chose to go with an inhabited world instead of a astronomical oddity. When they explored that star that was close to supernova, they seemed more interested in meeting the people who were studying it. |
14,222 | Starfleet is supposed to "explore *strange* new worlds and boldly go where no man has gone before", yet most of the time they explore worlds that are more Earth-like than not, and are inhabited by human-like species.
I understand that the out-of-universe reason is that it is difficult to tell a story when the characters are always in space suits, but couldn't the writers have found some other way, rather than skipping all the interesting non-humanoid life forms? I remember the animated series characters using a skin-tight force field (a life-belt?) to explore inhospitable environments.
Or, are there really not that many interesting life forms on other classes of planets? | 2012/04/04 | [
"https://scifi.stackexchange.com/questions/14222",
"https://scifi.stackexchange.com",
"https://scifi.stackexchange.com/users/3247/"
] | One reason is philosophical: *Star Trek* was always as much about entertainment and social commentary as about telling science fiction stories -- actually possibly more so. As such, production staff felt that there always needed to be ways to ensure the audience had just enough familiarity with what was going on to feel comfortable and to be able to draw parallels to the real world easily. That, in turn, meant keeping the environments Earthlike-but-weird.
Another reason is pseudoscientific: At the time *Star Trek*, the original series, was being developed, there was a "theory" that Roddenberry felt had some merit (and touts in all the material he used to sell the series to the studios, and in the early writers' bibles) suggesting that the universe was filled with parallel Earths. This is not parallel-universe theory as we now tend to see it played out both in later *Star Trek* and in other stories like *Sliders*. This is the notion that *in our universe* are multiple, separately evolved planets that nevertheless have people and histories remarkably similar to our own. Several stories clearly play on this, most notably "Bread and Circuses" (in which the Roman Empire survived to see technology equivalent to our 20th Century) and "The Omega Glory", which depicts a world in which the Cold War yielded to actual nuclear war.
And the final reason is budgetary: all those Earth-like worlds meant they could use existing Paramount back-lots, with their pre-built faux-towns and faux-cities that could be redressed to match a variety of needs (or in some cases had been built to mirror a particular time and place for some movie or other and now needed to be used). | I would probably say out of universe they could not make a full episode on planets that had nothing on them. They could only do so much with an empty planet. Whereas class M/Earth like planets they could introduce new species easily. In universe answer I would say that they did but because the vessels in the episodes were not science vessels they were never tasked with such a mission. The Enterprise was the flag ship for the federation, I would probably say combat and diplomatic missions were more important for that vessel. That is my theory. |
14,222 | Starfleet is supposed to "explore *strange* new worlds and boldly go where no man has gone before", yet most of the time they explore worlds that are more Earth-like than not, and are inhabited by human-like species.
I understand that the out-of-universe reason is that it is difficult to tell a story when the characters are always in space suits, but couldn't the writers have found some other way, rather than skipping all the interesting non-humanoid life forms? I remember the animated series characters using a skin-tight force field (a life-belt?) to explore inhospitable environments.
Or, are there really not that many interesting life forms on other classes of planets? | 2012/04/04 | [
"https://scifi.stackexchange.com/questions/14222",
"https://scifi.stackexchange.com",
"https://scifi.stackexchange.com/users/3247/"
] | In Universe:
------------
The [original studio pitch](http://50yos.tumblr.com/post/79244934260/original-star-trek-pitch-1964) offered by Gene Roddenberry confirmed that Captain Robert April's standing orders were to investigate Class-M planets due to **the limitations of his ship** (landing craft, standard sensor packages, etc).
>
> **Nature and duration of command:**
>
>
> *Galaxy exploration and Class-M investigation: 5 years*
>
>
> You will patrol the ninth quadrant, beginning with Alpha Centauri and
> extending to the outer Pinial Galaxy limit.
>
>
> You will conduct this patrol to accomplish primarily:
>
>
> (a) *Earth security, via exploration of intelligence and social systems
> capable of a galaxial threat, and*
>
>
> (b) *Scientific investigation to add to the earth's body of knowledge
> of life forma and social systems, and*
>
>
> (c) *Any required assistance to the several earth colonies in this
> quadrant, and the enforcement of appropriate statutes affecting such
> Federated commerce vessels and traders as you might contact in the
> course of your mission.*
>
>
> **Consistent with the equipment and limitations of of your cruiser-class
> vessel, you will confine your landings and contacts to planets
> approximating earth-Mars conditions, life, and social orders.**
>
>
>
Out of Universe
---------------
**It's cheaper.**
>
> Some format and budget considerations . . .
>
>
> SETS: Our format is tailored to practical production and cost factors.
> Use of stage sets, backlot and other locations are simplifled by
> Captain April's "Class-M" orders. And our own "Parallel Worlds"
> concept. The majority of story premises listed can be accomplished on
> such sommon studio backlot locales and sets such as Early 1900 Street,
> Oriental Village, Cow town, Border Fort, Victorian Drawing Room,
> Forest and Streamside.
>
>
> | First your premise is wrong. Starfleet has multiple missions and purposes, but it's the Enterprise specifically that:
>
> Space: the final frontier. These are the voyages of the starship Enterprise. Its five-year mission: to explore strange new worlds
>
>
>
The Enterprise, both TOS and TNG, has a duty to explore strange new worlds. But that's only part of the mission.
>
> to seek out new life and new civilizations, to boldly go where no man has gone before.
>
>
>
It is being sent to search for new sentient, sapient life. People it can trade and learn from, or from who it should prepare to defend from if they are a threat.
Second, strange has multiple meanings. While the first means different and weird, hard to understand, the second meaning is unknown, foreign, ***alien***. This is in line with the Enterprise mission, seeking new people. It's a first contact mission.
Third, apparently in universe, the Enterprise mission statement comes from Cochrane, from the Enterprise Pilot.
>
> On this site, a powerful engine will be built. An engine that will someday help us to travel a hundred times faster than we can today. Imagine it – ***thousands of inhabited planets at our fingertips...*** and we'll be able to explore ***those strange new worlds***, and seek out new life and new civilizations. This engine will let us go boldly... where no man has gone before. *emphasis mine*
>
>
>
Out of universe, the intention was the same.
Finally, the mission is first contact and planetary charting. Strange planets, ones that don't have any sentient life or ruins detectable, are still noted, scanned, and mapped, **for future research** and follow up by dedicated long term teams. Case in point, Wrath of Khan, a research team returns to the sister planet that Khan was dumped on. Ceti Alpha VI was not expected to have any sentient life. Ceti Alpha V was "barely" Class M as it was too, no sentient life either. Both were cataloged by the Enterprise.
As a parting note, there were only a handful of classification for planets used on screen. Only some of these are considered to have life of any kind. Some classes are Gas Giants and the Demon worlds. Some are life less, atmosphere less rock planets or moons. Class L only had vegetable life. Class h is "generally uninhabitable". Class K needs Terra forming or pressure domes. The Enterprise can scan planets from space for life signs, or signs of civilization like ruins, buildings, man made structures. If a non Class M planet has no signs of life, they catalog it and move on. |
14,222 | Starfleet is supposed to "explore *strange* new worlds and boldly go where no man has gone before", yet most of the time they explore worlds that are more Earth-like than not, and are inhabited by human-like species.
I understand that the out-of-universe reason is that it is difficult to tell a story when the characters are always in space suits, but couldn't the writers have found some other way, rather than skipping all the interesting non-humanoid life forms? I remember the animated series characters using a skin-tight force field (a life-belt?) to explore inhospitable environments.
Or, are there really not that many interesting life forms on other classes of planets? | 2012/04/04 | [
"https://scifi.stackexchange.com/questions/14222",
"https://scifi.stackexchange.com",
"https://scifi.stackexchange.com/users/3247/"
] | In Universe:
------------
The [original studio pitch](http://50yos.tumblr.com/post/79244934260/original-star-trek-pitch-1964) offered by Gene Roddenberry confirmed that Captain Robert April's standing orders were to investigate Class-M planets due to **the limitations of his ship** (landing craft, standard sensor packages, etc).
>
> **Nature and duration of command:**
>
>
> *Galaxy exploration and Class-M investigation: 5 years*
>
>
> You will patrol the ninth quadrant, beginning with Alpha Centauri and
> extending to the outer Pinial Galaxy limit.
>
>
> You will conduct this patrol to accomplish primarily:
>
>
> (a) *Earth security, via exploration of intelligence and social systems
> capable of a galaxial threat, and*
>
>
> (b) *Scientific investigation to add to the earth's body of knowledge
> of life forma and social systems, and*
>
>
> (c) *Any required assistance to the several earth colonies in this
> quadrant, and the enforcement of appropriate statutes affecting such
> Federated commerce vessels and traders as you might contact in the
> course of your mission.*
>
>
> **Consistent with the equipment and limitations of of your cruiser-class
> vessel, you will confine your landings and contacts to planets
> approximating earth-Mars conditions, life, and social orders.**
>
>
>
Out of Universe
---------------
**It's cheaper.**
>
> Some format and budget considerations . . .
>
>
> SETS: Our format is tailored to practical production and cost factors.
> Use of stage sets, backlot and other locations are simplifled by
> Captain April's "Class-M" orders. And our own "Parallel Worlds"
> concept. The majority of story premises listed can be accomplished on
> such sommon studio backlot locales and sets such as Early 1900 Street,
> Oriental Village, Cow town, Border Fort, Victorian Drawing Room,
> Forest and Streamside.
>
>
> | Personally, I don't think they want to explore the worlds. I think they want to meet the people. Humans are social creatures. We saw several times in ST:ENT where Archer chose to go with an inhabited world instead of a astronomical oddity. When they explored that star that was close to supernova, they seemed more interested in meeting the people who were studying it. |
14,222 | Starfleet is supposed to "explore *strange* new worlds and boldly go where no man has gone before", yet most of the time they explore worlds that are more Earth-like than not, and are inhabited by human-like species.
I understand that the out-of-universe reason is that it is difficult to tell a story when the characters are always in space suits, but couldn't the writers have found some other way, rather than skipping all the interesting non-humanoid life forms? I remember the animated series characters using a skin-tight force field (a life-belt?) to explore inhospitable environments.
Or, are there really not that many interesting life forms on other classes of planets? | 2012/04/04 | [
"https://scifi.stackexchange.com/questions/14222",
"https://scifi.stackexchange.com",
"https://scifi.stackexchange.com/users/3247/"
] | I think we are meant to make the assumption that intelligent life in the Alpha quadrant (at least in a form recognizable to humans) is typically humanoid and therefore typically requires an M-class environment. This idea is supported by the TNG episode that touches on the existence of an ancient race of which most known species are descendants ([The Chase](http://en.wikipedia.org/wiki/The_Chase_%28Star_Trek:_The_Next_Generation%29)). But there are exceptional species, e.g. the [Benzites](http://en.memory-alpha.org/wiki/Benzite). | First your premise is wrong. Starfleet has multiple missions and purposes, but it's the Enterprise specifically that:
>
> Space: the final frontier. These are the voyages of the starship Enterprise. Its five-year mission: to explore strange new worlds
>
>
>
The Enterprise, both TOS and TNG, has a duty to explore strange new worlds. But that's only part of the mission.
>
> to seek out new life and new civilizations, to boldly go where no man has gone before.
>
>
>
It is being sent to search for new sentient, sapient life. People it can trade and learn from, or from who it should prepare to defend from if they are a threat.
Second, strange has multiple meanings. While the first means different and weird, hard to understand, the second meaning is unknown, foreign, ***alien***. This is in line with the Enterprise mission, seeking new people. It's a first contact mission.
Third, apparently in universe, the Enterprise mission statement comes from Cochrane, from the Enterprise Pilot.
>
> On this site, a powerful engine will be built. An engine that will someday help us to travel a hundred times faster than we can today. Imagine it – ***thousands of inhabited planets at our fingertips...*** and we'll be able to explore ***those strange new worlds***, and seek out new life and new civilizations. This engine will let us go boldly... where no man has gone before. *emphasis mine*
>
>
>
Out of universe, the intention was the same.
Finally, the mission is first contact and planetary charting. Strange planets, ones that don't have any sentient life or ruins detectable, are still noted, scanned, and mapped, **for future research** and follow up by dedicated long term teams. Case in point, Wrath of Khan, a research team returns to the sister planet that Khan was dumped on. Ceti Alpha VI was not expected to have any sentient life. Ceti Alpha V was "barely" Class M as it was too, no sentient life either. Both were cataloged by the Enterprise.
As a parting note, there were only a handful of classification for planets used on screen. Only some of these are considered to have life of any kind. Some classes are Gas Giants and the Demon worlds. Some are life less, atmosphere less rock planets or moons. Class L only had vegetable life. Class h is "generally uninhabitable". Class K needs Terra forming or pressure domes. The Enterprise can scan planets from space for life signs, or signs of civilization like ruins, buildings, man made structures. If a non Class M planet has no signs of life, they catalog it and move on. |
14,222 | Starfleet is supposed to "explore *strange* new worlds and boldly go where no man has gone before", yet most of the time they explore worlds that are more Earth-like than not, and are inhabited by human-like species.
I understand that the out-of-universe reason is that it is difficult to tell a story when the characters are always in space suits, but couldn't the writers have found some other way, rather than skipping all the interesting non-humanoid life forms? I remember the animated series characters using a skin-tight force field (a life-belt?) to explore inhospitable environments.
Or, are there really not that many interesting life forms on other classes of planets? | 2012/04/04 | [
"https://scifi.stackexchange.com/questions/14222",
"https://scifi.stackexchange.com",
"https://scifi.stackexchange.com/users/3247/"
] | One reason is philosophical: *Star Trek* was always as much about entertainment and social commentary as about telling science fiction stories -- actually possibly more so. As such, production staff felt that there always needed to be ways to ensure the audience had just enough familiarity with what was going on to feel comfortable and to be able to draw parallels to the real world easily. That, in turn, meant keeping the environments Earthlike-but-weird.
Another reason is pseudoscientific: At the time *Star Trek*, the original series, was being developed, there was a "theory" that Roddenberry felt had some merit (and touts in all the material he used to sell the series to the studios, and in the early writers' bibles) suggesting that the universe was filled with parallel Earths. This is not parallel-universe theory as we now tend to see it played out both in later *Star Trek* and in other stories like *Sliders*. This is the notion that *in our universe* are multiple, separately evolved planets that nevertheless have people and histories remarkably similar to our own. Several stories clearly play on this, most notably "Bread and Circuses" (in which the Roman Empire survived to see technology equivalent to our 20th Century) and "The Omega Glory", which depicts a world in which the Cold War yielded to actual nuclear war.
And the final reason is budgetary: all those Earth-like worlds meant they could use existing Paramount back-lots, with their pre-built faux-towns and faux-cities that could be redressed to match a variety of needs (or in some cases had been built to mirror a particular time and place for some movie or other and now needed to be used). | First your premise is wrong. Starfleet has multiple missions and purposes, but it's the Enterprise specifically that:
>
> Space: the final frontier. These are the voyages of the starship Enterprise. Its five-year mission: to explore strange new worlds
>
>
>
The Enterprise, both TOS and TNG, has a duty to explore strange new worlds. But that's only part of the mission.
>
> to seek out new life and new civilizations, to boldly go where no man has gone before.
>
>
>
It is being sent to search for new sentient, sapient life. People it can trade and learn from, or from who it should prepare to defend from if they are a threat.
Second, strange has multiple meanings. While the first means different and weird, hard to understand, the second meaning is unknown, foreign, ***alien***. This is in line with the Enterprise mission, seeking new people. It's a first contact mission.
Third, apparently in universe, the Enterprise mission statement comes from Cochrane, from the Enterprise Pilot.
>
> On this site, a powerful engine will be built. An engine that will someday help us to travel a hundred times faster than we can today. Imagine it – ***thousands of inhabited planets at our fingertips...*** and we'll be able to explore ***those strange new worlds***, and seek out new life and new civilizations. This engine will let us go boldly... where no man has gone before. *emphasis mine*
>
>
>
Out of universe, the intention was the same.
Finally, the mission is first contact and planetary charting. Strange planets, ones that don't have any sentient life or ruins detectable, are still noted, scanned, and mapped, **for future research** and follow up by dedicated long term teams. Case in point, Wrath of Khan, a research team returns to the sister planet that Khan was dumped on. Ceti Alpha VI was not expected to have any sentient life. Ceti Alpha V was "barely" Class M as it was too, no sentient life either. Both were cataloged by the Enterprise.
As a parting note, there were only a handful of classification for planets used on screen. Only some of these are considered to have life of any kind. Some classes are Gas Giants and the Demon worlds. Some are life less, atmosphere less rock planets or moons. Class L only had vegetable life. Class h is "generally uninhabitable". Class K needs Terra forming or pressure domes. The Enterprise can scan planets from space for life signs, or signs of civilization like ruins, buildings, man made structures. If a non Class M planet has no signs of life, they catalog it and move on. |
14,222 | Starfleet is supposed to "explore *strange* new worlds and boldly go where no man has gone before", yet most of the time they explore worlds that are more Earth-like than not, and are inhabited by human-like species.
I understand that the out-of-universe reason is that it is difficult to tell a story when the characters are always in space suits, but couldn't the writers have found some other way, rather than skipping all the interesting non-humanoid life forms? I remember the animated series characters using a skin-tight force field (a life-belt?) to explore inhospitable environments.
Or, are there really not that many interesting life forms on other classes of planets? | 2012/04/04 | [
"https://scifi.stackexchange.com/questions/14222",
"https://scifi.stackexchange.com",
"https://scifi.stackexchange.com/users/3247/"
] | I would probably say out of universe they could not make a full episode on planets that had nothing on them. They could only do so much with an empty planet. Whereas class M/Earth like planets they could introduce new species easily. In universe answer I would say that they did but because the vessels in the episodes were not science vessels they were never tasked with such a mission. The Enterprise was the flag ship for the federation, I would probably say combat and diplomatic missions were more important for that vessel. That is my theory. | First your premise is wrong. Starfleet has multiple missions and purposes, but it's the Enterprise specifically that:
>
> Space: the final frontier. These are the voyages of the starship Enterprise. Its five-year mission: to explore strange new worlds
>
>
>
The Enterprise, both TOS and TNG, has a duty to explore strange new worlds. But that's only part of the mission.
>
> to seek out new life and new civilizations, to boldly go where no man has gone before.
>
>
>
It is being sent to search for new sentient, sapient life. People it can trade and learn from, or from who it should prepare to defend from if they are a threat.
Second, strange has multiple meanings. While the first means different and weird, hard to understand, the second meaning is unknown, foreign, ***alien***. This is in line with the Enterprise mission, seeking new people. It's a first contact mission.
Third, apparently in universe, the Enterprise mission statement comes from Cochrane, from the Enterprise Pilot.
>
> On this site, a powerful engine will be built. An engine that will someday help us to travel a hundred times faster than we can today. Imagine it – ***thousands of inhabited planets at our fingertips...*** and we'll be able to explore ***those strange new worlds***, and seek out new life and new civilizations. This engine will let us go boldly... where no man has gone before. *emphasis mine*
>
>
>
Out of universe, the intention was the same.
Finally, the mission is first contact and planetary charting. Strange planets, ones that don't have any sentient life or ruins detectable, are still noted, scanned, and mapped, **for future research** and follow up by dedicated long term teams. Case in point, Wrath of Khan, a research team returns to the sister planet that Khan was dumped on. Ceti Alpha VI was not expected to have any sentient life. Ceti Alpha V was "barely" Class M as it was too, no sentient life either. Both were cataloged by the Enterprise.
As a parting note, there were only a handful of classification for planets used on screen. Only some of these are considered to have life of any kind. Some classes are Gas Giants and the Demon worlds. Some are life less, atmosphere less rock planets or moons. Class L only had vegetable life. Class h is "generally uninhabitable". Class K needs Terra forming or pressure domes. The Enterprise can scan planets from space for life signs, or signs of civilization like ruins, buildings, man made structures. If a non Class M planet has no signs of life, they catalog it and move on. |
649,647 | On my local network there are (among others) 5 machines (running
Debian Jessie or Arch) wirelessly connected to a Netgear WNDR4000
router. Below is a graph of the ping times to the router
from each of the machines, collected over a period of around half an hour.

Observations:
* When things are going well, the ping times are all below 3ms (under
1ms for two of the machines, including the problem machine *purple*)
* At irregular intervals (of the order of 100s), three of these
machines (*red*, *green*, *purple*) suffer degradation of ping times, while the other two appear unaffected.
* The degradation periods coincide for all 3 machines.
* The degradation for *purple* is two orders of magnitude more severe than
for *green* and *red*, with ping times typically reaching over 20000ms
for *purple* and 200ms for *red* and *green*.
* If *purple* is physically moved nearer the router, the degradation
completely disappears for *purple* while continuing as before for both
*red* and *green*.
* *Red* is 3m away and in direct line of sight from the base station;
*purple*'s usual location is about 10m away without direct line of
sight.
This makes network access on *purple* intolarably slow (when it is in
its normal location).
Can you suggest how to go about diagnosing and fixing the problem? | 2014/12/06 | [
"https://serverfault.com/questions/649647",
"https://serverfault.com",
"https://serverfault.com/users/257425/"
] | Clearly you have an interference problem. Interference can come from passive elements like aluminum wall studs or thick floors, but those are not likely to show the periodic pattern you see. So something electric or electronic is periodically emitting. Finding it may be expensive or tough, but you have a few options.
1. **Graph more.** It would be nice to make sure that this isn't a bandwidth limitation of your own creation. Looking at the bandwidth consumed on your uplink and each of the clients might lead to a similar looking graph and the source of your problem.
2. **Upgrade firmware.** Being on the latest firmware could get you past a bug in their code causing this. Plus it helps reduce the chances of your router being remotely compromised.
3. **Mitigate it.** Get a wifi analyzer for your phone. Look at who is using what bands when purple is pokey particularly. You may find that switching from 7 to 1 or 14 takes care of your problem. The analyzer should show you how the channels spread out into each other, so if you are in a really busy area going for the in-betweens of 4 or 11 would let you reduce the congestion.
4. **Migrate.** Can you move the WAP to a different location? Placing it in a place just a foot away can significantly effect propagation within a building.
5. **Ground it.** Make sure all of your AV equipment (TV's, stereos, etc.) is properly grounded.
6. **Find it.** You could use a spectrum analyzer and a directional antenna to find the emitter, but the spectrum analyzer is big bucks. If you know a ham (an amateur radio operator), they may have this gear laying around already; offer them food and don't be surprised if more than one shows up. The ham will also know the FCC regs inside and out which will be great if you actually find the source. Without bribing anyone you could try cutting things off and see if gets better, but it might not be your stuff causing the problem. When dealing with VCR's and TV's you may need to completely unplug them.
Good luck. | To me, the intermittent nature indicates a hardware problem. Wireless routers go bad often. I'd try a new router and see if that doesn't resolve it. Maybe you can replace under warranty with Netgear if it's not too old?
Or you could always run a bunch of cat-5 and mini switches everywhere, the wired part of the router is probably fine. |
649,647 | On my local network there are (among others) 5 machines (running
Debian Jessie or Arch) wirelessly connected to a Netgear WNDR4000
router. Below is a graph of the ping times to the router
from each of the machines, collected over a period of around half an hour.

Observations:
* When things are going well, the ping times are all below 3ms (under
1ms for two of the machines, including the problem machine *purple*)
* At irregular intervals (of the order of 100s), three of these
machines (*red*, *green*, *purple*) suffer degradation of ping times, while the other two appear unaffected.
* The degradation periods coincide for all 3 machines.
* The degradation for *purple* is two orders of magnitude more severe than
for *green* and *red*, with ping times typically reaching over 20000ms
for *purple* and 200ms for *red* and *green*.
* If *purple* is physically moved nearer the router, the degradation
completely disappears for *purple* while continuing as before for both
*red* and *green*.
* *Red* is 3m away and in direct line of sight from the base station;
*purple*'s usual location is about 10m away without direct line of
sight.
This makes network access on *purple* intolarably slow (when it is in
its normal location).
Can you suggest how to go about diagnosing and fixing the problem? | 2014/12/06 | [
"https://serverfault.com/questions/649647",
"https://serverfault.com",
"https://serverfault.com/users/257425/"
] | To me, the intermittent nature indicates a hardware problem. Wireless routers go bad often. I'd try a new router and see if that doesn't resolve it. Maybe you can replace under warranty with Netgear if it's not too old?
Or you could always run a bunch of cat-5 and mini switches everywhere, the wired part of the router is probably fine. | Go to Control Panel > Network and Sharing Center > Change adapter Settings > Right Click "Local Area Connection" > Properties
Disable "Internet protocol Version 6 (TCP/IPv6)"
Disable "Link-Layer Topology Discovery Mapper I/O Driver"
Disable "Link-Layer Topology Discovery Responder"
I had Ping spikes from 30ms up to 3000ms, sometimes even "Ping request timed out" reply. After I've done this my ping returned to normal again. |
649,647 | On my local network there are (among others) 5 machines (running
Debian Jessie or Arch) wirelessly connected to a Netgear WNDR4000
router. Below is a graph of the ping times to the router
from each of the machines, collected over a period of around half an hour.

Observations:
* When things are going well, the ping times are all below 3ms (under
1ms for two of the machines, including the problem machine *purple*)
* At irregular intervals (of the order of 100s), three of these
machines (*red*, *green*, *purple*) suffer degradation of ping times, while the other two appear unaffected.
* The degradation periods coincide for all 3 machines.
* The degradation for *purple* is two orders of magnitude more severe than
for *green* and *red*, with ping times typically reaching over 20000ms
for *purple* and 200ms for *red* and *green*.
* If *purple* is physically moved nearer the router, the degradation
completely disappears for *purple* while continuing as before for both
*red* and *green*.
* *Red* is 3m away and in direct line of sight from the base station;
*purple*'s usual location is about 10m away without direct line of
sight.
This makes network access on *purple* intolarably slow (when it is in
its normal location).
Can you suggest how to go about diagnosing and fixing the problem? | 2014/12/06 | [
"https://serverfault.com/questions/649647",
"https://serverfault.com",
"https://serverfault.com/users/257425/"
] | Clearly you have an interference problem. Interference can come from passive elements like aluminum wall studs or thick floors, but those are not likely to show the periodic pattern you see. So something electric or electronic is periodically emitting. Finding it may be expensive or tough, but you have a few options.
1. **Graph more.** It would be nice to make sure that this isn't a bandwidth limitation of your own creation. Looking at the bandwidth consumed on your uplink and each of the clients might lead to a similar looking graph and the source of your problem.
2. **Upgrade firmware.** Being on the latest firmware could get you past a bug in their code causing this. Plus it helps reduce the chances of your router being remotely compromised.
3. **Mitigate it.** Get a wifi analyzer for your phone. Look at who is using what bands when purple is pokey particularly. You may find that switching from 7 to 1 or 14 takes care of your problem. The analyzer should show you how the channels spread out into each other, so if you are in a really busy area going for the in-betweens of 4 or 11 would let you reduce the congestion.
4. **Migrate.** Can you move the WAP to a different location? Placing it in a place just a foot away can significantly effect propagation within a building.
5. **Ground it.** Make sure all of your AV equipment (TV's, stereos, etc.) is properly grounded.
6. **Find it.** You could use a spectrum analyzer and a directional antenna to find the emitter, but the spectrum analyzer is big bucks. If you know a ham (an amateur radio operator), they may have this gear laying around already; offer them food and don't be surprised if more than one shows up. The ham will also know the FCC regs inside and out which will be great if you actually find the source. Without bribing anyone you could try cutting things off and see if gets better, but it might not be your stuff causing the problem. When dealing with VCR's and TV's you may need to completely unplug them.
Good luck. | I had it with an idle Wi-Fi network (Windows 7, various TP-LINK USB adapters). The ping fluctuates, making any remote terminal work a nightmare.
Solved by putting a constant load on the Wi-Fi network (e.g. fetching a small file from the router's web server in a loop). |
649,647 | On my local network there are (among others) 5 machines (running
Debian Jessie or Arch) wirelessly connected to a Netgear WNDR4000
router. Below is a graph of the ping times to the router
from each of the machines, collected over a period of around half an hour.

Observations:
* When things are going well, the ping times are all below 3ms (under
1ms for two of the machines, including the problem machine *purple*)
* At irregular intervals (of the order of 100s), three of these
machines (*red*, *green*, *purple*) suffer degradation of ping times, while the other two appear unaffected.
* The degradation periods coincide for all 3 machines.
* The degradation for *purple* is two orders of magnitude more severe than
for *green* and *red*, with ping times typically reaching over 20000ms
for *purple* and 200ms for *red* and *green*.
* If *purple* is physically moved nearer the router, the degradation
completely disappears for *purple* while continuing as before for both
*red* and *green*.
* *Red* is 3m away and in direct line of sight from the base station;
*purple*'s usual location is about 10m away without direct line of
sight.
This makes network access on *purple* intolarably slow (when it is in
its normal location).
Can you suggest how to go about diagnosing and fixing the problem? | 2014/12/06 | [
"https://serverfault.com/questions/649647",
"https://serverfault.com",
"https://serverfault.com/users/257425/"
] | Clearly you have an interference problem. Interference can come from passive elements like aluminum wall studs or thick floors, but those are not likely to show the periodic pattern you see. So something electric or electronic is periodically emitting. Finding it may be expensive or tough, but you have a few options.
1. **Graph more.** It would be nice to make sure that this isn't a bandwidth limitation of your own creation. Looking at the bandwidth consumed on your uplink and each of the clients might lead to a similar looking graph and the source of your problem.
2. **Upgrade firmware.** Being on the latest firmware could get you past a bug in their code causing this. Plus it helps reduce the chances of your router being remotely compromised.
3. **Mitigate it.** Get a wifi analyzer for your phone. Look at who is using what bands when purple is pokey particularly. You may find that switching from 7 to 1 or 14 takes care of your problem. The analyzer should show you how the channels spread out into each other, so if you are in a really busy area going for the in-betweens of 4 or 11 would let you reduce the congestion.
4. **Migrate.** Can you move the WAP to a different location? Placing it in a place just a foot away can significantly effect propagation within a building.
5. **Ground it.** Make sure all of your AV equipment (TV's, stereos, etc.) is properly grounded.
6. **Find it.** You could use a spectrum analyzer and a directional antenna to find the emitter, but the spectrum analyzer is big bucks. If you know a ham (an amateur radio operator), they may have this gear laying around already; offer them food and don't be surprised if more than one shows up. The ham will also know the FCC regs inside and out which will be great if you actually find the source. Without bribing anyone you could try cutting things off and see if gets better, but it might not be your stuff causing the problem. When dealing with VCR's and TV's you may need to completely unplug them.
Good luck. | Go to Control Panel > Network and Sharing Center > Change adapter Settings > Right Click "Local Area Connection" > Properties
Disable "Internet protocol Version 6 (TCP/IPv6)"
Disable "Link-Layer Topology Discovery Mapper I/O Driver"
Disable "Link-Layer Topology Discovery Responder"
I had Ping spikes from 30ms up to 3000ms, sometimes even "Ping request timed out" reply. After I've done this my ping returned to normal again. |
649,647 | On my local network there are (among others) 5 machines (running
Debian Jessie or Arch) wirelessly connected to a Netgear WNDR4000
router. Below is a graph of the ping times to the router
from each of the machines, collected over a period of around half an hour.

Observations:
* When things are going well, the ping times are all below 3ms (under
1ms for two of the machines, including the problem machine *purple*)
* At irregular intervals (of the order of 100s), three of these
machines (*red*, *green*, *purple*) suffer degradation of ping times, while the other two appear unaffected.
* The degradation periods coincide for all 3 machines.
* The degradation for *purple* is two orders of magnitude more severe than
for *green* and *red*, with ping times typically reaching over 20000ms
for *purple* and 200ms for *red* and *green*.
* If *purple* is physically moved nearer the router, the degradation
completely disappears for *purple* while continuing as before for both
*red* and *green*.
* *Red* is 3m away and in direct line of sight from the base station;
*purple*'s usual location is about 10m away without direct line of
sight.
This makes network access on *purple* intolarably slow (when it is in
its normal location).
Can you suggest how to go about diagnosing and fixing the problem? | 2014/12/06 | [
"https://serverfault.com/questions/649647",
"https://serverfault.com",
"https://serverfault.com/users/257425/"
] | I had it with an idle Wi-Fi network (Windows 7, various TP-LINK USB adapters). The ping fluctuates, making any remote terminal work a nightmare.
Solved by putting a constant load on the Wi-Fi network (e.g. fetching a small file from the router's web server in a loop). | Go to Control Panel > Network and Sharing Center > Change adapter Settings > Right Click "Local Area Connection" > Properties
Disable "Internet protocol Version 6 (TCP/IPv6)"
Disable "Link-Layer Topology Discovery Mapper I/O Driver"
Disable "Link-Layer Topology Discovery Responder"
I had Ping spikes from 30ms up to 3000ms, sometimes even "Ping request timed out" reply. After I've done this my ping returned to normal again. |
546,496 | It is a well-known rule of English grammar that *either* takes *or* and *neither* takes *nor*. *Nary* comes from the phrase "ne'er a" and is considered a non-standard variant of *not*, e.g.:
>
> Nary a soul had I seen for three days... [(source)](https://books.google.ca/books?id=ncXvKmGXQAUC&pg=PA60&dq=%22nary+a+soul%22&hl=en&sa=X&ved=2ahUKEwj1vqvbweTrAhWymOAKHUKOBJ0Q6AEwCXoECAYQAg#v=onepage&q=%22nary%20a%20soul%22&f=false)
>
>
>
What if I also hadn't seen a star-nosed mole for three days and I wanted to communicate this very significant piece of information in the same sentence? How would I write this?
**What conjunction should *nary* take?**
Thanks in advance! | 2020/09/12 | [
"https://english.stackexchange.com/questions/546496",
"https://english.stackexchange.com",
"https://english.stackexchange.com/users/386505/"
] | *Merriam-Webster's Eleventh Collegiate Dictionary* (2003), a resource that tends to be parsimonious with its usage labels, identifies *nary* as a dialect word:
>
> **nary** *adj* {alter. of *ne'er a*} (1848) *dial* : not any: not one {I must have it back as I have *nary* other copy —Flannery O'Connor} — **nary a** *or* **nary an** : not a single {survived the accident with *nary a* scratch}
>
>
>
Dialect words tend to appear in settings where the speaker or writer is less concerned with grammatical nicety than with matching perceived common usage—and in the case of "nary a X nor/or a Y," results on the ground seem to vary.
Thus, for example, "[Sporting Adventures of Charles Carrington, Esq.](https://books.google.com/books?id=UjIFAAAAQAAJ&pg=RA1-PA61&dq=%22nary+a%22+or&hl=en&newbks=1&newbks_redir=0&sa=X&ved=2ahUKEwiw_YbjzuTrAhW6JzQIHRasCCU4FBDoATABegQIABAC#v=onepage&q=%22nary%20a%22%20or&f=false)" in *London Society: An Illustrated Magazine of Light and Amusing Literature* (January 1875) has this instance:
>
> 'So yeu've come here [to a small town outside New York City] to see our glorious American constitootion. Wall, I guess yeu'll be pretty considerable surprised—tarnation surprised, doggoned if you won't. We're an almighty nation, we air. Going a-shooting, air yeu? Wall, I calkerlate we've got more game hereabouts than would fill all London, and enough ships in our little river the Mississi-pi to tow your little island across the broad Atlantic—we hev, indeed, stranger. There's lots of grouse; but **nary a** buffeler, bar, **nor** alligater about here. But I s'pose yeu means to take up yer fixins here in this feather-bed bully hotel afore yeu makes tracks?'
>
>
>
And from Ray Johnstone, [*Maude Blackstone: The Millionaire's Daughter*](https://books.google.com/books?id=YKgRAAAAYAAJ&pg=PA149&dq=%22nary+an%22+nor&hl=en&newbks=1&newbks_redir=0&sa=X&ved=2ahUKEwii4tLH5-TrAhUrJzQIHXPzCukQ6AEwA3oECAEQAg#v=onepage&q=%22nary%20an%22%20nor&f=false) (1901):
>
> I says tu brother Joshua when we left the ranch to go tu bed, 'Let ius get up before daylight an' harness up our nags, Betsy and Nancy, an' go an' see the elephant'; an' now we've been out on the prairie fer four hours, an' **nary an Injun nor nary an' elephant nor tiger** have we sot eyes on' ceptin' yerselves, meanin' no offense.
>
>
>
But contrarily, "[One of the Towns](https://books.google.com/books?id=CQNKAQAAMAAJ&pg=RA1-PA278&dq=%22nary+a%22+nor&hl=en&newbks=1&newbks_redir=0&sa=X&ved=2ahUKEwi0laaB1eTrAhVQqp4KHfiiBZk4ChDoATAGegQICBAC#v=onepage&q=%22nary%20a%22%20nor&f=false)" in *The Western Literary Messenger* (Buffalo, New York: February 1857) has this:
>
> Men and women marry, and have children born unto them, and die in the town of German. But there is **nary a** priest **or** minister of the gospel, of any denomination, within her borders, to bless the banns, or christen the child, or o give ghostly comfort in the parting hour.
>
>
>
And perhaps most beguilingly, from M.G. McClelland, "[Mac's Old Horse](https://books.google.com/books?id=Lc1hcua1QDkC&pg=PA479&dq=%22nary+a%22+nor&hl=en&newbks=1&newbks_redir=0&sa=X&ved=2ahUKEwiAzav4zeTrAhXpIDQIHXllAFEQ6AEwAHoECAQQAg#v=onepage&q=%22nary%20a%22%20nor&f=false)," in *The Century* (July 1888):
>
> Mac cussed hard as he peered around him, / **Nary a** thing could he find **or** see; / **Never a** ghost, **nor** a witch, **nor** spirit, / **Nor** even the trunk of a blasted tree.
>
>
>
This last instance is striking because the writer juxtaposes an instance of "**nary a** ... **or** ... with an instance of "**Never a** ... **nor** ... **nor** ... **nor** ..." Notice, though, that the "or" is used to conjoin two verbs (*find* and *see*), whereas the "Nary a" refers to a noun (*thing*). In contrast, the "Never a ... nor ..." series applies to a set of nouns (*ghost*, *witch*, *spirit*, and *trunk*) comprehended by the the "Never a" opener. So the usage here may not be inconsistent as a matter of grammatical usage.
Searches for fairly recent instances of the simple case of "Nary a[n] X or/nor Y" yield plenty of matches for both "or" and "nor" forms. The following examples are by no means exhaustive, and most come from a fairly narrow range of publication dates (2002–2008).
---
***Recent examples of 'nary a[n] X nor [a] Y'***
From Jerome Lofgren, "[Nary a Nose nor Tail](https://books.google.com/books?id=BOnDUJfSafMC&pg=PA23&dq=%22nary+a+nose+nor+tail+were+seen%22&hl=en&newbks=1&newbks_redir=0&sa=X&ved=2ahUKEwizg_u93-TrAhVPFjQIHbghAxYQ6AEwAHoECAAQAg#v=onepage&q=%22nary%20a%20nose%20nor%20tail%20were%20seen%22&f=false)," *A Town Called Isle* (2002):
>
> And the old man would say, "Ne, **nary a nose nor tail** were seen."
>
>
> ...
>
>
> "Ne," Grandpa replied sadly. "**Nary a nose nor tail** were seen." He gave his grandson a wink.
>
>
>
From Joseph Citro, [*Green Mountain Ghosts, Ghouls & Unsolved Mysteries*](https://books.google.com/books?id=dejhSPGP3BQC&pg=PT207&dq=%22nary+a%22+nor&hl=en&newbks=1&newbks_redir=0&sa=X&ved=2ahUKEwjM9OTO3eTrAhVOGDQIHd2aDjo4ChDoATABegQIBhAC#v=onepage&q=%22nary%20a%22%20nor&f=false) (1994):
>
> At last the fatal day—March 25, 1844—came and went with **nary a bang nor a whimper**.
>
>
>
From Robert Sprecht, [*Tisha: The Story of a Young Teacher in the Alaska Wilderness*](https://books.google.com/books?id=b1vtNVe3ilwC&pg=PA379&dq=%22nary+a%22+nor&hl=en&newbks=1&newbks_redir=0&sa=X&ved=2ahUKEwjXxua63eTrAhWRCTQIHcgCCb4Q6AEwB3oECAgQAg#v=onepage&q=%22nary%20a%22%20nor&f=false) (1982):
>
> "No race, no stop," he repeated. "C'mon, boy, it's an easy mile, **nary a bump nor a bang**. How about it?"
>
>
>
From Mae Henderson, [*Borders, Boundaries, and Frames: Essays in Cultural Studies*](https://books.google.com/books?id=H64caxPLpJwC&pg=PA171&dq=%22nary+a%22+nor&hl=en&newbks=1&newbks_redir=0&sa=X&ved=2ahUKEwjXxua63eTrAhWRCTQIHcgCCb4Q6AEwBXoECAQQAg#v=onepage&q=%22nary%20a%22%20nor&f=false) (1995):
>
> At least, it was something of a shock for me to glance over this year's program for the English Institute and realize that in all the twelve titles for the current talks there was **nary a parenthesis, nor a pun, nor a hyphenated term, nor any inverted or disinverted commas**: no, there was no point of punctuation more complicated than a colon.
>
>
>
From Dean Budnick, [*"Jam Bands": North America's Hottest Live Groups*](https://books.google.com/books?id=0d7ach9LFKUC&pg=PA77&dq=%22nary+an%22+or&hl=en&newbks=1&newbks_redir=0&sa=X&ved=2ahUKEwj_mfP95uTrAhUEKH0KHfo6DpU4FBDoATAIegQIABAC#v=onepage&q=%22nary%20an%22%20or&f=false) (1998):
>
> The Emma Gibbs Band features **nary an Emma nor a Gibbs**, but the Winston-Salem, North Carolina, sextet does provide some upbeat, jaunty grooves.
>
>
>
From Carolyn Dunn, [*The Winter Garden Mystery*](https://books.google.com/books?id=2A_QD_RNhXwC&pg=PA13&dq=%22nary+a%22+nor&hl=en&newbks=1&newbks_redir=0&sa=X&ved=2ahUKEwjXxua63eTrAhWRCTQIHcgCCb4Q6AEwCHoECAkQAg#v=onepage&q=%22nary%20a%22%20nor&f=false) (2001):
>
> **Nary a cabbage nor a Brussels sprout** dares show its head in the front gardens.
>
>
>
From a 2000 translation by David Assaf of [*Journey to a Nineteenth-century Shtetl: The Memoirs of Yekhezkel Kotik*](https://books.google.com/books?id=knrfpytrp6YC&pg=PA254&dq=%22nary+a%22+nor&hl=en&newbks=1&newbks_redir=0&sa=X&ved=2ahUKEwjXxua63eTrAhWRCTQIHcgCCb4Q6AEwAHoECAUQAg#v=onepage&q=%22nary%20a%22%20nor&f=false) (2002):
>
> Of all those coming to her father-in-law's house there was **nary a rabbi nor a scholar, nor a pious one** among them.
>
>
>
>
> From David Barker, [*Rushed to Judgment: Talk Radio, Persuasion, and American Political Behavior*](https://books.google.com/books?id=5twBpNXXVvAC&pg=PA55&dq=%22nary+a%22+nor&hl=en&newbks=1&newbks_redir=0&sa=X&ved=2ahUKEwjXxua63eTrAhWRCTQIHcgCCb4Q6AEwCXoECAYQAg#v=onepage&q=%22nary%20a%22%20nor&f=false) (2002):
>
>
>
>
> In today's political climate, **nary a political nor a policy-related decision** is made without great consideration being given to how that decision will play out with the electorate[.]
>
>
>
From an [unidentified article](https://books.google.com/books?id=WgcKAQAAMAAJ&q=%22nary+an%22+nor&dq=%22nary+an%22+nor&hl=en&newbks=1&newbks_redir=0&sa=X&ved=2ahUKEwjBps2z6uTrAhWjKH0KHaSOBeYQ6AEwCHoECAkQAg) in *Chicago*, volume 54 (2005):
>
> It is a sad commentary on an institution we have loved for so long which has let us down time and again with **nary an apology nor the accountability** of bishops who stand as guilty as perpetrators.
>
>
>
From Thomas Fahey, [*Considering Aaron Sorkin: Essays on the Politics, Poetics and Sleight of Hand in the Films and Television Series*](https://books.google.com/books?id=KyYTBQAAQBAJ&pg=PA101&dq=%22nary+a%22+or&hl=en&newbks=1&newbks_redir=0&sa=X&ved=2ahUKEwinwonK7uTrAhWzoFsKHTHlDrU4UBDoATADegQIAhAC#v=onepage&q=%22nary%20a%22%20or&f=false) (2005):
>
> To add to the film's emphasis on intelligence rather than beauty or physical attraction, there is **nary a love scene nor a scantily clad body** in the entire movie.
>
>
>
From Steve Hockensmith, [*Holmes on the Range*](https://books.google.com/books?id=QoI17QbuXFcC&pg=PT16&dq=%22nary+an%22+or&hl=en&newbks=1&newbks_redir=0&sa=X&ved=2ahUKEwj5lYiD6eTrAhWioFsKHfM_Dfo4ChDoATAFegQIBBAC#v=onepage&q=%22nary%20an%22%20or&f=false) (2007):
>
> But there was **nary an oyster nor a drop of Scotch**, of course.
>
>
>
From Jim Bernhard, [*Porcupine, Picayune, & Post: How Newspapers Get Their Names*](https://books.google.com/books?id=6wxlAAAAMAAJ&q=%22nary+an%22+nor&dq=%22nary+an%22+nor&hl=en&newbks=1&newbks_redir=0&sa=X&ved=2ahUKEwjBps2z6uTrAhWjKH0KHaSOBeYQ6AEwBnoECAcQAg) (2007):
>
> It is not a comprehensive list of every English-language general-interest newspaper in the world, nor is it a scholarly study with footnoted documentation—**nary an *ibid*. nor an *op. cit.*** will be found in these pages.
>
>
>
From Curtis Badger, [*A Natural History of Quiet Waters: Swamps and Wetlands of the Mid-Atlantic Coast*](https://books.google.com/books?id=DoqwrjneVRcC&pg=PP54&dq=%22nary+a%22+or&hl=en&newbks=1&newbks_redir=0&sa=X&ved=2ahUKEwiGg_PC7OTrAhXYGDQIHXLtBHY4FBDoATAEegQIAhAC#v=onepage&q=%22nary%20a%22%20or&f=false) (2007):
>
> There was **nary a blade of grass nor a sprig of sedge** to be found.
>
>
>
From Christopher Wren, [*Walking to Vermont: From Times Square into the Green*](https://www.google.com/search?q=%22nary+a%22+or&lr=lang_en&tbs=cdr:1,cd_min:2004,cd_max:2008,lr:lang_1en&tbm=bks&sxsrf=ALeKk00ATyb2ytWBpBn_ig9uXP0budJ-RQ:1599956132632&ei=pGRdX5X9JeL99AOE1bdI&start=50&sa=N&ved=0ahUKEwiV38OH7eTrAhXiPn0KHYTqDQk4KBDy0wMIiQE&biw=1215&bih=1158&dpr=1.09) (2007):
>
> Further ahead, a maroon sign gilded with gold paint announced a new development for Salmon Daily Brook Farm, though **nary a brook nor farm nor salmon** were in sight.
>
>
>
From Taylor Clark, Starbucked: [*A Double Tall Tale of Caffeine, Commerce, and Culture*](https://books.google.com/books?id=v4s5l_41mKEC&pg=PT32&dq=%22nary+a%22+or&hl=en&newbks=1&newbks_redir=0&sa=X&ved=2ahUKEwiB7qqR7eTrAhWeJzQIHWkqA8E4MhDoATAEegQIBBAC#v=onepage&q=%22nary%20a%22%20or&f=false) (2007):
>
> **Nary a chair nor a stool** was in sight.
>
>
>
---
***Recent examples of 'nary a[n] X or [a] Y'***
From Dana Fewell, [*Reading Between Texts: Intertextuality and the Hebrew Bible*](https://books.google.com/books?id=LFIvJSmEXyAC&pg=PA53&dq=%22nary+a%22+nor&hl=en&newbks=1&newbks_redir=0&sa=X&ved=2ahUKEwjXxua63eTrAhWRCTQIHcgCCb4Q6AEwBnoECAcQAg#v=onepage&q=%22nary%20a%22%20nor&f=false) (1992):
>
> It is all good, very good (Gen 1:31), not marred by evil or by any negative; there is **nary a no, a not or a nor** in Genesis 1.
>
>
>
From Richard Mohr & George Ohr, [*Pottery, Politics, Art: George Ohr and the Brothers Kirkpatrick*](https://books.google.com/books?id=IXuBucEMRnkC&pg=RA1-PA101&dq=%22nary+an%22+or&hl=en&newbks=1&newbks_redir=0&sa=X&ved=2ahUKEwjw0_rF5uTrAhUhNX0KHaJiCmM4ChDoATAJegQICBAC#v=onepage&q=%22nary%20an%22%20or&f=false) (2003):
>
> **Nary an eagle, elk, salmon, or Douglas fir** is to be found in the inventory of the Kirkpatricks' Nature.
>
>
>
From Mereille Guiliano, [*French Women Don't Get Fat*](https://books.google.com/books?id=5I2e_6MAmAEC&pg=PA54&dq=%22nary+a%22+or&hl=en&newbks=1&newbks_redir=0&sa=X&ved=2ahUKEwiZz_6R8uTrAhXEN30KHZiKDQU4oAEQ6AEwAXoECAIQAg#v=onepage&q=%22nary%20a%22%20or&f=false) (2004):
>
> Supermarket cookies and pints of ice cream were always on hand, but **nary a fresh vegetable or fruit**.
>
>
>
From Steven Raichlen, [*Raichlen's Indoor! Grilling*](https://www.google.com/search?q=%22nary+a%22+or&lr=lang_en&tbs=cdr:1,cd_min:2004,cd_max:2008,lr:lang_1en&tbm=bks&sxsrf=ALeKk02o4n0i9D1zhOAO2HyrdXRpphrBtg:1599957691801&ei=u2pdX4a0MITr9AP6oZroBw&start=210&sa=N&ved=0ahUKEwjG_f_u8uTrAhWENX0KHfqQBn04yAEQ8tMDCJoB&biw=1215&bih=1158&dpr=1.09) (2004):
>
> The Rendezvous grills its ribs over an open charcoal fire, with **nary a log or hickory chip** in sight.
>
>
>
From Michael Nystrom-Schut, [*Keeping It Real in an Unreal World: Staying as Real as Possible in a World of Illusion*](https://books.google.com/books?id=Nfo-AQAAQBAJ&pg=PA175&dq=%22nary+a%22+or&hl=en&newbks=1&newbks_redir=0&sa=X&ved=2ahUKEwjG3ur08-TrAhU_JzQIHUo5D8443AEQ6AEwCXoECAkQAg#v=onepage&q=%22nary%20a%22%20or&f=false) (2004):
>
> What's sometimes amazing is how we quietly succumb to the leadership, incredibly so, with **nary a whimper or a cry** of "foul."
>
>
>
From Elbert Maloney, [*Chapman Boater's Handbook*](https://books.google.com/books?id=Y8LBmS7tE34C&pg=PA202&dq=%22nary+a%22+or&hl=en&newbks=1&newbks_redir=0&sa=X&ved=2ahUKEwimqpG07-TrAhUTCjQIHf7ZBKc4eBDoATABegQIABAC#v=onepage&q=%22nary%20a%22%20or&f=false) (2005):
>
> Not only do they stay soft and cozy the whole week long , with **nary a rip or tear**, they also store in about a quarter of the space taken up by ordinary bed linen.
>
>
>
From Vern Madison & Connie Madison, [*Living the Dream: Sailing the South Pacific and Southeast Asia*](https://books.google.com/books?id=14Tazq4Yum4C&pg=PA217&dq=%22nary+a%22+or&hl=en&newbks=1&newbks_redir=0&sa=X&ved=2ahUKEwiXsc7-7-TrAhVQGDQIHWGkCm04ggEQ6AEwA3oECAIQAg#v=onepage&q=%22nary%20a%22%20or&f=false) (2005):
>
> Our wind vane piloted us flawlessly, with **nary a vibration or rattle** in the struts, which I had overhauled in Noumea.
>
>
>
From Charles Swartz, [*Understanding Digital Cinema: A Professional Handbook*](https://books.google.com/books?id=tYw3ehoBnjkC&pg=PA15&dq=%22nary+an%22+or&hl=en&newbks=1&newbks_redir=0&sa=X&ved=2ahUKEwj5lYiD6eTrAhWioFsKHfM_Dfo4ChDoATAEegQIABAC#v=onepage&q=%22nary%20an%22%20or&f=false) (2005):
>
> It is interesting to note that many directors pose for photographs, pictured in front of editing devices or sound mixing consoles, albeit with **nary an editor or mixer**, their necessary collaborators and oftentimes saviors, in frame.
>
>
>
From Fran Sorin, [*Digging Deep: Unearthing Your Creative Roots Through Gardening*](https://books.google.com/books?id=iPyJ5qbQNm4C&pg=PT9&dq=%22nary+a%22+or&hl=en&newbks=1&newbks_redir=0&sa=X&ved=2ahUKEwi69_Hq7eTrAhWeGDQIHVAmAi44PBDoATADegQIAxAC#v=onepage&q=%22nary%20a%22%20or&f=false) (2007):
>
> Never had I envisioned that the ground would be completely bare—with **nary a flower or tree** in sight!
>
>
>
From Jessica Auerbach, [*And Nanny Makes Three: Mothers and Nannies Tell the Truth About Work, Love, Money, and each Other*](https://books.google.com/books?id=oWBEAQAAQBAJ&pg=PA86&dq=%22nary+a%22+or&hl=en&newbks=1&newbks_redir=0&sa=X&ved=2ahUKEwjG_f_u8uTrAhWENX0KHfqQBn04yAEQ6AEwCHoECAcQAg#v=onepage&q=%22nary%20a%22%20or&f=false) (2007):
>
> ... Elle Macpherson, "the Body," producing two beautiful sons with **nary a stretch mark or increase** in the size of her minuscule, butt-hugging, belly—baring jeans; ...
>
>
>
From Tristan Egolf, [*Kornwolf: A Novel*](https://books.google.com/books?id=WKkKx97oKlcC&pg=PA15&dq=%22nary+a%22+or&hl=en&newbks=1&newbks_redir=0&sa=X&ved=2ahUKEwjG3ur08-TrAhU_JzQIHUo5D8443AEQ6AEwBXoECAYQAg#v=onepage&q=%22nary%20a%22%20or&f=false) (2007):
>
> But **nary a phone call or visit**.
>
>
>
From Larry Carlson, [*Before the Colors Fade: God, Cebu and War*](https://books.google.com/books?id=CXaQAAAAQBAJ&pg=PA41&dq=%22nary+a%22+or&hl=en&newbks=1&newbks_redir=0&sa=X&ved=2ahUKEwi69_Hq7eTrAhWeGDQIHVAmAi44PBDoATAAegQIAhAC#v=onepage&q=%22nary%20a%22%20or&f=false) (2008):
>
> He swallowed the Garmale with **nary a shudder or grimace**.
>
>
>
Matt Telles, [*Python Power!: The Comprehensive Guide*](https://books.google.com/books?id=wbELAAAAQBAJ&pg=PA463&dq=%22nary+an%22+or&hl=en&newbks=1&newbks_redir=0&sa=X&ved=2ahUKEwj5lYiD6eTrAhWioFsKHfM_Dfo4ChDoATAIegQICBAC#v=onepage&q=%22nary%20an%22%20or&f=false) (2008):
>
> The early Internet Web pages were plain text, with **nary an image or graphic** to be seen.
>
>
>
And from David Gilbert, [*The Normals: A Novel*](https://books.google.com/books?id=tqFO3YO9ECAC&pg=PA17&dq=%22nary+a%22+or&hl=en&newbks=1&newbks_redir=0&sa=X&ved=2ahUKEwjG_f_u8uTrAhWENX0KHfqQBn04yAEQ6AEwB3oECAkQAg#v=onepage&q=%22nary%20a%22%20or&f=false) (2008):
>
> **Nary a sprain or dislocation**, a tear or rupture.
>
>
>
---
***Conclusions***
The fact that few of the preceding examples are self-consciously dialectal indicates to me that the word *nary* is becoming a part of accepted nondialect English, at least in the United States. But because the "nary a[n] X or/nor a Y" formulation arose out of dialect use, it doesn't seem to have benefited (or suffered) from formal enforcement by publishers of a standardized treatment on the question of "or" versus "nor."
One interesting distinction that may not be immediately obvious in the examples I've listed above involves the presence or absence of an indefinite article before the Y term in the phrase. Of the fifteen recent examples of "nary a[n] X nor" listed, twelve conclude with "nor a[n] Y," one with "nor the Y," and two with "nor Y." In sharp contrast, of the fourteen recent examples of "nary a[n] X or" listed, two conclude with "or a[n] Y" and twelve with "or Y." This difference doesn't strike me as being the result of random variation or chance. To the contrary, I think, that most English speakers and writers probably naturally gravitate toward "or" when they are dealing with a "nary a[n] X or/nor Y" situation and toward "nor" when they are dealing with a "nary a[n] X or/nor a[n] Y."
Applying this insight to the poster's original question, I would recommend using either the the wording
>
> Nary a soul or star-nosed mole had I seen for three days ...
>
>
>
or the wording
>
> Nary a soul nor a star-nosed mole had I seen for three days
>
>
>
to the situation he originally proposed. Since souls and star-nosed moles do not make a comfortable natural pairing of similar things I would prefer the second option. But if the situation involved "a white-eyed vireo" instead of "a soul" as the paired object, I don't think you could go wrong with either
>
> Nary a white-eyed vireo or star-nosed mole had I seen for three days ...
>
>
>
or
>
> Nary a white-eyed vireo nor a star-nosed mole had I seen for three days ...
>
>
> | In [COCA](https://www.english-corpora.org/coca/), there are 50 results for *nary* followed by *or*, but only 8 for *nary* followed by *nor*. The [iWeb](https://www.english-corpora.org/iweb/) corpus is similar: ~300 results for *nary*/*or* and ~50 for *nary*/*nor*.
I would say then that both are acceptable, but *or* is preferred.
Here's the search I used, which can be used on any of the [English-corpora.org corpora](https://www.english-corpora.org/m/) (though you may not get enough results):
[](https://i.stack.imgur.com/YBNh6.png) |
17,229 | Is there a way I can import my ReadItLater's exported html file into my Instapaper? | 2011/07/10 | [
"https://apple.stackexchange.com/questions/17229",
"https://apple.stackexchange.com",
"https://apple.stackexchange.com/users/3089/"
] | Though I don't have a tool now, I guess it can be done in couple of ways. Yes, no one click solution.
1. Email each url to your personal instapaper id ([Refer this Lifehacker article](http://lifehacker.com/5493449/instapaper-adds-email-functionality-for-easy-article-saving))
2. Can parse your export list and use simple API from Instapaper to add the links to your account. [Refer API docs](http://www.instapaper.com/api/simple)
**Update**:
As I said earlier, it is not a one click solution but doable. As a matter of fact, I did create an extension for chrome to do this. Here is the link <http://minus.com/mc3va2C>
**Update 2**:
The source of the extension is available @ <https://github.com/palaniraja/RIL2Insta> | No, there is no way of doing this. *With those applications.* |
75,923 | Genesis 24:37 NASB
>
> My master made me swear, saying, ‘You shall not take a wife for my son from the daughters of the Canaanites, in whose land I live; 38 but you shall go to my father’s house and to my relatives, and take a wife for my son.’
>
>
>
If it were idolatry that Abraham wanted to shield Isaac from since his ancestors are clearly attested as worshipers of idols.God had actually removed Abraham from his kinfolks in order to deal with idolatry.
Joshua 24:2 NASB
>
> Joshua said to all the people, “This is what the Lord, the God of Israel says: ‘From ancient times your fathers lived beyond the Euphrates River, namely, Terah, the father of Abraham and the father of Nahor, and they served other gods.
>
>
>
We are further told that even during that time of Rebecca they still worshiped idols as alluded to in the discourse between Laban and Jacob in the book of Genesis.
Genesis 31:31-32 NASB
>
> Then Jacob replied to Laban, “Because I was afraid, for I thought that you would take your daughters from me by force. 32 The one with whom you find your gods shall not live; in the presence of our relatives [s]point out what is yours [t]among my belongings and take it for yourself.” Now Jacob did not know that Rachel had stolen them.
>
>
>
It seems idolatry had not stopped with their ancestors but had continued with the other generations
Why then did Abraham insist that Isaac marry from his kinfolks? | 2022/04/26 | [
"https://hermeneutics.stackexchange.com/questions/75923",
"https://hermeneutics.stackexchange.com",
"https://hermeneutics.stackexchange.com/users/16527/"
] | "Bone and flesh" (or a slight variation) acts in Scripture as Hebraism with the meaning of biological relative. Sometimes a slight variation is a merism for the human body as a whole.
* Gen 2:23 - Then the man said, “This at last is bone of my bones and flesh of my flesh; she shall be called Woman, because she was taken out of Man.”
* Job 33:21 - His flesh wastes away from sight, and his hidden bones protrude.
* Luke 24:39 - Look at my hands and my feet. It is I myself! Touch me and see; a ghost does not have flesh and bones, as you see I have.”
* 2 Sam 19:13 - And say to Amasa, ‘Are you not my bone and my flesh? God do so to me and more also, if you are not commander of my army from now on in place of Joab.’”
* Gen 29:14 - and Laban said to him, “Surely you are my bone and my flesh!” And he stayed with him a month.
* 2 Sam 5:1 - Then all the tribes of Israel came to David at Hebron and said, “Behold, we are your bone and flesh.
* Prov 3:8 - This will bring healing to your body and refreshment to your bones.
Thus, such passages allude to the entire physical body and its relationship with another human relative.
Note: In the NT "flesh and blood" has the meaning of simply mortal or human and appears to allude to the sacrifices of the Torah. | The term "flesh and bones" in Job 2:5, did not referred to Job's wife nor Eve. It was exactly referred to Job, his physical body. There is no connection to Job 2:9.
In chapter 1, Satan suggested to strike everything Job had, then Job would surely curse the Lord (Job 1:11 NIV). So Job lost his children and his livestock, nevertheless, Job did not sin by charging God with wrongdoing (Job 1:22 NIV). So Satan's initial plan didn't work out.
In chapter 2, Satan made up another plan, he said;
>
> 4 “Skin for skin!” Satan replied. “A man will give all he has for his
> own life.
>
>
> 5 But now stretch out your hand and strike his flesh and
> bones, and he will surely curse you to your face.”
>
>
>
What is "Skin for skin"? Satan meant Job's children and livestock were replenishable. Just like if you peeled off your skin, it will grow back. So Satan suggested that it needed to strike Job's body directly, in his pain he would surely curse the Lord.
So why the term "flesh and bones" does not mean Job's wife, and has no connection to Job 2:9? It is because Job's wife was also "skin" to Job. If I were Job and hearing what she said in Job 2:9, I was surely made her replenishable. |
75,923 | Genesis 24:37 NASB
>
> My master made me swear, saying, ‘You shall not take a wife for my son from the daughters of the Canaanites, in whose land I live; 38 but you shall go to my father’s house and to my relatives, and take a wife for my son.’
>
>
>
If it were idolatry that Abraham wanted to shield Isaac from since his ancestors are clearly attested as worshipers of idols.God had actually removed Abraham from his kinfolks in order to deal with idolatry.
Joshua 24:2 NASB
>
> Joshua said to all the people, “This is what the Lord, the God of Israel says: ‘From ancient times your fathers lived beyond the Euphrates River, namely, Terah, the father of Abraham and the father of Nahor, and they served other gods.
>
>
>
We are further told that even during that time of Rebecca they still worshiped idols as alluded to in the discourse between Laban and Jacob in the book of Genesis.
Genesis 31:31-32 NASB
>
> Then Jacob replied to Laban, “Because I was afraid, for I thought that you would take your daughters from me by force. 32 The one with whom you find your gods shall not live; in the presence of our relatives [s]point out what is yours [t]among my belongings and take it for yourself.” Now Jacob did not know that Rachel had stolen them.
>
>
>
It seems idolatry had not stopped with their ancestors but had continued with the other generations
Why then did Abraham insist that Isaac marry from his kinfolks? | 2022/04/26 | [
"https://hermeneutics.stackexchange.com/questions/75923",
"https://hermeneutics.stackexchange.com",
"https://hermeneutics.stackexchange.com/users/16527/"
] | "Bone and flesh" (or a slight variation) acts in Scripture as Hebraism with the meaning of biological relative. Sometimes a slight variation is a merism for the human body as a whole.
* Gen 2:23 - Then the man said, “This at last is bone of my bones and flesh of my flesh; she shall be called Woman, because she was taken out of Man.”
* Job 33:21 - His flesh wastes away from sight, and his hidden bones protrude.
* Luke 24:39 - Look at my hands and my feet. It is I myself! Touch me and see; a ghost does not have flesh and bones, as you see I have.”
* 2 Sam 19:13 - And say to Amasa, ‘Are you not my bone and my flesh? God do so to me and more also, if you are not commander of my army from now on in place of Joab.’”
* Gen 29:14 - and Laban said to him, “Surely you are my bone and my flesh!” And he stayed with him a month.
* 2 Sam 5:1 - Then all the tribes of Israel came to David at Hebron and said, “Behold, we are your bone and flesh.
* Prov 3:8 - This will bring healing to your body and refreshment to your bones.
Thus, such passages allude to the entire physical body and its relationship with another human relative.
Note: In the NT "flesh and blood" has the meaning of simply mortal or human and appears to allude to the sacrifices of the Torah. | A great question! There is a lot going on here with bone (less so with flesh).
Some excerpts from TDOT[1] explain this:
>
> we find poetic usage in the figurative language of the Psalms and
> wisdom aphorisms.8 Since bones are “man’s most durable part—his core,
> so to speak,” **ʿeṣem takes on the meaning “self,”** as in the formula
> beʿeṣem hayyôm hazzeh, “on the very day” (Gen. 7:13; etc.).9
>
>
>
So an alternate meaning for "bone" - eṣem - is "self", and it has the connotation of "permanent self", or "true self", or "inner self". This is a hint of life beyond the grave, as the bones persist even when the flesh rots and falls off.
It is for this reason that not a bone of Christ could be broken, or why the passover lamb must be divided without breaking any bones. To break a bone would be to break the eternal self, and the cross did not break Christ's bones, only his flesh was marred. Ezekiel's "valley of dry bones" is another example, as a picture of resurrection and receiving a new body (flesh) on the old bones (your eternal self). When a dead man is thrown into Elisha's grave, he revives when he touches Elisha's bones, because the bones represent the inner life and thus the spiritual power of Elisha, now uncovered by the flesh and thus potent.
2 Kings 13.21 (KJV):
>
> And it came to pass, as they were burying a man, that, behold, they
> spied a band of men; and they cast the man into the sepulchre of
> Elisha: and when the man was let down, and **touched the bones** of
> Elisha, he revived, and stood up on his feet.
>
>
>
As another example of resurrection, Jacob's *bones* were carried to the promised land. Not his flesh. And Joseph made his sons promise to carry his *bones* to the promised land as well. Not his body, but his bones. (Gen 50.25)
The flesh, on the other hand, connotes the complement, the outward self, the frail self, the self that can be wounded and marred by the vicissitudes of life, and the self that withers with age. It is also the self that bears the curse. Paul says that no *flesh* can glory in God's presence (1 Cor 1.29).
Together, then, flesh and bones cover everything, but contra Dottard, I would not call it a *merism* ("from A to Z") but rather that together flesh and bones are everything. From this, we get a *kinship formula*. Here is TDOT again[1]:
>
> The words for the fundamental constituents of the human body, → בשׂר
> bāśār and ʿeṣem (cf. Job 2:5), are used in the “kinship formula” ʿaṣmî
> ûḇeśārî ʾattâ/ʾattem, which emphasizes the close relationship between
> individuals (Gen. 29:14; 2 S. 19:14 [Eng. v. 13]) or groups (Jgs. 9:2;
> 2 S. 5:1 [par. 1 Ch. 11:1]; 19:13).17 In Gen. 2:23 this formula,
> “physically graphic,”18 describes the relationship between man and
> woman.
>
>
>
---
[1] K. -M. Beyse, “עֶצֶם,” ed. G. Johannes Botterweck, Helmer Ringgren, and Heinz-Josef Fabry, trans. David E. Green, Theological Dictionary of the Old Testament (Grand Rapids, MI; Cambridge, U.K.: William B. Eerdmans Publishing Company, 2001), 305. |
147,463 | My bank recently revamped its website, and it changed for the better as far as I’m concerned. Especially, security seems to have been dramatically enhanced.
Most importantly, they introduced a rather unusual (I’ve never seen this before) identification method, which they call the ‘electronic certificate’. Basically, you have to go to the bank in person and the guy gives you a tiny, cheap USB stick with a very low capacity. From this point, you’ll be required to plug the stick into your computer every time you want to log in. The stick alone is not enough, you also have to type your password — basically, 2-factor-authentification with a USB device being the second factor.
**How can this possibly work?** Of course, I believe the USB stick to contain certificates/encryption keys of some kind, that are used in the login process, but they don’t require the user to install any software on the machine. I find it rather creepy that a website accessed from a sandboxed web browser, with no plug-in/module/app/toolbar installed whatsoever, can see the USB stick you just plugged in. And not only *see* this stick, but read it and use its content deeply enough to log you to the most sensitive level of your online banking app.
I am not a big fan of plugging unknown devices into my computer to begin with, and my warning light flashed when this was explained to me, so I went for another identification method (you can choose). I’m just curious.
PS: the measure obviously does not apply to their mobile apps, since smartphones don’t have USB ports, but that’s not a big deal because you cannot do much with their phone app (it's mainly a consultation app, not something you can actually make big payments/transfers with).
Edit: no open file dialog is used, which would make the explanation quite clear. | 2017/01/06 | [
"https://security.stackexchange.com/questions/147463",
"https://security.stackexchange.com",
"https://security.stackexchange.com/users/-1/"
] | It's most likely a device that pretends to be a keyboard and is thus recognized by any OS without requiring special drivers. Internally, it would probably use HOTP (or TOTP, if it had an RTC chip and a battery) and just "type" the OTP each time the button is pressed, like a [Yubikey](https://www.yubico.com/products/yubikey-hardware/) or similar U2F device.
The browser doesn't talk nor know the USB is there; it just instructs the user to press a physical button on the device (to tell the device to "type" the code, as the browser itself can't talk to it) and then interprets whatever keystrokes (up to the length of the code) it receives as coming from the device. | As some of the other answers mentioned, this is most likely a USB security token. Think of it as a smart card reader + embedded smart card (and sometimes they are actually implemented this way). Think [CAC card](https://en.wikipedia.org/wiki/Common_Access_Card) used by US defense organizations. Think PGP card. Some Yubikey models also support acting as a smart card.
This kind of devices is widely used by banks in China to protect their online banking website / desktop client software, and my answer is mostly based on my personal experience using these tokens in China.
How do you use it?
------------------
When you sign up for online banking and opt for a USB token, the bank gives you the token, creates a public/private key pair and your personal certificate, and load those into the token. You set a password on the token, which is separate from your online banking login password.
You install the driver provided by the bank on your personal computer, plug the token in, and navigate to the bank's website. Whenever you log in or perform a sensitive operation (transferring funds, changing contact information, authorizing online purchase, etc.), the browser / operating system prompts for your token password, the light on the token blinks for a few seconds, and the transaction goes through.
Wait, I have to install drivers?
--------------------------------
Yes. The Windows operating system has a standard smart card interface, but each model of USB token still requires a driver. Very rarely, Windows Update will install the correct drivers for you, but in most cases you will have to download a package from the bank's website.
Often the only supported operating system is Windows, and the only supported browser is IE. (They like them some ActiveX.) It is certainly possible in general for smart cards / USB tokens to support other OS / browsers, see CAC card above; you have to check compatibility with your own bank.
So how does it authenticate you?
--------------------------------
The browser asks the OS to ask the token to sign a small piece of data (perhaps your transaction details). The token signs it, using your private key and certificate. The browser sends the signature to the bank. The bank verifies the signature, and is satisfied that only the token they gave you have the private key to produce this signature.
The private key never leaves the token. If properly designed, the token should never divulge the private key. |
147,463 | My bank recently revamped its website, and it changed for the better as far as I’m concerned. Especially, security seems to have been dramatically enhanced.
Most importantly, they introduced a rather unusual (I’ve never seen this before) identification method, which they call the ‘electronic certificate’. Basically, you have to go to the bank in person and the guy gives you a tiny, cheap USB stick with a very low capacity. From this point, you’ll be required to plug the stick into your computer every time you want to log in. The stick alone is not enough, you also have to type your password — basically, 2-factor-authentification with a USB device being the second factor.
**How can this possibly work?** Of course, I believe the USB stick to contain certificates/encryption keys of some kind, that are used in the login process, but they don’t require the user to install any software on the machine. I find it rather creepy that a website accessed from a sandboxed web browser, with no plug-in/module/app/toolbar installed whatsoever, can see the USB stick you just plugged in. And not only *see* this stick, but read it and use its content deeply enough to log you to the most sensitive level of your online banking app.
I am not a big fan of plugging unknown devices into my computer to begin with, and my warning light flashed when this was explained to me, so I went for another identification method (you can choose). I’m just curious.
PS: the measure obviously does not apply to their mobile apps, since smartphones don’t have USB ports, but that’s not a big deal because you cannot do much with their phone app (it's mainly a consultation app, not something you can actually make big payments/transfers with).
Edit: no open file dialog is used, which would make the explanation quite clear. | 2017/01/06 | [
"https://security.stackexchange.com/questions/147463",
"https://security.stackexchange.com",
"https://security.stackexchange.com/users/-1/"
] | It's probably just a USB smartcard reader, with inserted SIM sized smartcard.
Manual installation of drivers is not needed since at least generic drivers for both reader and card are already installed in most modern OSs.
See the image below for example of such device:
[](https://i.stack.imgur.com/Z3Ysw.jpg)
There is certificate with private key stored on that SIM smartcard inside reader. When you plug it in the computer, that certificate from smartcard gets loaded into OS certificate store. From there on it basically behaves just like any other certificate which is saved on computer and can be used for accessing secured resources, signing documents/mail, encrypting stuff, etc.
This one in particular is issued by Cert Authority which is trusted by my bank (web banking) and State (mostly used by me for IRS related stuff and requesting real documents). | This sounds like a Yubikey. They're well known and work great.
<https://www.yubico.com/products/yubikey-hardware/yubikey4/>
* Regarding not needing drivers: The Yubikey identifies itself as a keyboard so any machine with a keyboard driver can read the text output from it.
* How it works: You push the button and the Yubikey issues a public key (from a secure private key embedded in the device). The bank can then
authenticate you and confirm that you have the thing you know (your
password) and the thing you have (your physically secured private
key).
* Why it's secure: It's not possible for software on your
computer to get access to your private key so malware cannot copy the
key and pretend to be you. It would have to be physically stolen from you. (which is possible, but that's why you pair it with something you know)
* Who uses them and why: Google helped design the yubikey so they could
solve the problem of malware on a computer grabbing local credentials
while the user was not present. Every Google engineer has one. I've
used them for years and deployed numerous 2fa solutions around them. |
147,463 | My bank recently revamped its website, and it changed for the better as far as I’m concerned. Especially, security seems to have been dramatically enhanced.
Most importantly, they introduced a rather unusual (I’ve never seen this before) identification method, which they call the ‘electronic certificate’. Basically, you have to go to the bank in person and the guy gives you a tiny, cheap USB stick with a very low capacity. From this point, you’ll be required to plug the stick into your computer every time you want to log in. The stick alone is not enough, you also have to type your password — basically, 2-factor-authentification with a USB device being the second factor.
**How can this possibly work?** Of course, I believe the USB stick to contain certificates/encryption keys of some kind, that are used in the login process, but they don’t require the user to install any software on the machine. I find it rather creepy that a website accessed from a sandboxed web browser, with no plug-in/module/app/toolbar installed whatsoever, can see the USB stick you just plugged in. And not only *see* this stick, but read it and use its content deeply enough to log you to the most sensitive level of your online banking app.
I am not a big fan of plugging unknown devices into my computer to begin with, and my warning light flashed when this was explained to me, so I went for another identification method (you can choose). I’m just curious.
PS: the measure obviously does not apply to their mobile apps, since smartphones don’t have USB ports, but that’s not a big deal because you cannot do much with their phone app (it's mainly a consultation app, not something you can actually make big payments/transfers with).
Edit: no open file dialog is used, which would make the explanation quite clear. | 2017/01/06 | [
"https://security.stackexchange.com/questions/147463",
"https://security.stackexchange.com",
"https://security.stackexchange.com/users/-1/"
] | It's most likely a device that pretends to be a keyboard and is thus recognized by any OS without requiring special drivers. Internally, it would probably use HOTP (or TOTP, if it had an RTC chip and a battery) and just "type" the OTP each time the button is pressed, like a [Yubikey](https://www.yubico.com/products/yubikey-hardware/) or similar U2F device.
The browser doesn't talk nor know the USB is there; it just instructs the user to press a physical button on the device (to tell the device to "type" the code, as the browser itself can't talk to it) and then interprets whatever keystrokes (up to the length of the code) it receives as coming from the device. | Sounds like a theoretical idea I had about a decade ago.
Pretty much every OS supports USB network devices. Your USB stick may pretend to be a network card, connected to a a local network, with a webserver on that network too. That webserver can have HTTPS certificates, too.
Your webbrowser can make HTTPS requests to that webserver, and discover that the USB stick and bank website trust eachother. This isn't considered a sandbox escape, because neither the browser nor the OS know that the webserver is actually on the USB stick.
IP warning: to the best of my knowledge, my former employer holds a patent on this idea in most jurisdictions. Contact a patent attorney before copying this idea. |
147,463 | My bank recently revamped its website, and it changed for the better as far as I’m concerned. Especially, security seems to have been dramatically enhanced.
Most importantly, they introduced a rather unusual (I’ve never seen this before) identification method, which they call the ‘electronic certificate’. Basically, you have to go to the bank in person and the guy gives you a tiny, cheap USB stick with a very low capacity. From this point, you’ll be required to plug the stick into your computer every time you want to log in. The stick alone is not enough, you also have to type your password — basically, 2-factor-authentification with a USB device being the second factor.
**How can this possibly work?** Of course, I believe the USB stick to contain certificates/encryption keys of some kind, that are used in the login process, but they don’t require the user to install any software on the machine. I find it rather creepy that a website accessed from a sandboxed web browser, with no plug-in/module/app/toolbar installed whatsoever, can see the USB stick you just plugged in. And not only *see* this stick, but read it and use its content deeply enough to log you to the most sensitive level of your online banking app.
I am not a big fan of plugging unknown devices into my computer to begin with, and my warning light flashed when this was explained to me, so I went for another identification method (you can choose). I’m just curious.
PS: the measure obviously does not apply to their mobile apps, since smartphones don’t have USB ports, but that’s not a big deal because you cannot do much with their phone app (it's mainly a consultation app, not something you can actually make big payments/transfers with).
Edit: no open file dialog is used, which would make the explanation quite clear. | 2017/01/06 | [
"https://security.stackexchange.com/questions/147463",
"https://security.stackexchange.com",
"https://security.stackexchange.com/users/-1/"
] | One way it could work is that Chrome supports FIDO U2F without plugin. Given that now Chrome is now the most popular browser and that Chrome runs on Windows, Mac, and Linux, it's not totally incorrect to claim that "it works in any device that has a USB port, Windows, Mac, Linux and more, and to work out of the box".
Did they claim that it works in any browsers or just any OS? | It's probably just a USB smartcard reader, with inserted SIM sized smartcard.
Manual installation of drivers is not needed since at least generic drivers for both reader and card are already installed in most modern OSs.
See the image below for example of such device:
[](https://i.stack.imgur.com/Z3Ysw.jpg)
There is certificate with private key stored on that SIM smartcard inside reader. When you plug it in the computer, that certificate from smartcard gets loaded into OS certificate store. From there on it basically behaves just like any other certificate which is saved on computer and can be used for accessing secured resources, signing documents/mail, encrypting stuff, etc.
This one in particular is issued by Cert Authority which is trusted by my bank (web banking) and State (mostly used by me for IRS related stuff and requesting real documents). |
147,463 | My bank recently revamped its website, and it changed for the better as far as I’m concerned. Especially, security seems to have been dramatically enhanced.
Most importantly, they introduced a rather unusual (I’ve never seen this before) identification method, which they call the ‘electronic certificate’. Basically, you have to go to the bank in person and the guy gives you a tiny, cheap USB stick with a very low capacity. From this point, you’ll be required to plug the stick into your computer every time you want to log in. The stick alone is not enough, you also have to type your password — basically, 2-factor-authentification with a USB device being the second factor.
**How can this possibly work?** Of course, I believe the USB stick to contain certificates/encryption keys of some kind, that are used in the login process, but they don’t require the user to install any software on the machine. I find it rather creepy that a website accessed from a sandboxed web browser, with no plug-in/module/app/toolbar installed whatsoever, can see the USB stick you just plugged in. And not only *see* this stick, but read it and use its content deeply enough to log you to the most sensitive level of your online banking app.
I am not a big fan of plugging unknown devices into my computer to begin with, and my warning light flashed when this was explained to me, so I went for another identification method (you can choose). I’m just curious.
PS: the measure obviously does not apply to their mobile apps, since smartphones don’t have USB ports, but that’s not a big deal because you cannot do much with their phone app (it's mainly a consultation app, not something you can actually make big payments/transfers with).
Edit: no open file dialog is used, which would make the explanation quite clear. | 2017/01/06 | [
"https://security.stackexchange.com/questions/147463",
"https://security.stackexchange.com",
"https://security.stackexchange.com/users/-1/"
] | It's probably just a USB smartcard reader, with inserted SIM sized smartcard.
Manual installation of drivers is not needed since at least generic drivers for both reader and card are already installed in most modern OSs.
See the image below for example of such device:
[](https://i.stack.imgur.com/Z3Ysw.jpg)
There is certificate with private key stored on that SIM smartcard inside reader. When you plug it in the computer, that certificate from smartcard gets loaded into OS certificate store. From there on it basically behaves just like any other certificate which is saved on computer and can be used for accessing secured resources, signing documents/mail, encrypting stuff, etc.
This one in particular is issued by Cert Authority which is trusted by my bank (web banking) and State (mostly used by me for IRS related stuff and requesting real documents). | As some of the other answers mentioned, this is most likely a USB security token. Think of it as a smart card reader + embedded smart card (and sometimes they are actually implemented this way). Think [CAC card](https://en.wikipedia.org/wiki/Common_Access_Card) used by US defense organizations. Think PGP card. Some Yubikey models also support acting as a smart card.
This kind of devices is widely used by banks in China to protect their online banking website / desktop client software, and my answer is mostly based on my personal experience using these tokens in China.
How do you use it?
------------------
When you sign up for online banking and opt for a USB token, the bank gives you the token, creates a public/private key pair and your personal certificate, and load those into the token. You set a password on the token, which is separate from your online banking login password.
You install the driver provided by the bank on your personal computer, plug the token in, and navigate to the bank's website. Whenever you log in or perform a sensitive operation (transferring funds, changing contact information, authorizing online purchase, etc.), the browser / operating system prompts for your token password, the light on the token blinks for a few seconds, and the transaction goes through.
Wait, I have to install drivers?
--------------------------------
Yes. The Windows operating system has a standard smart card interface, but each model of USB token still requires a driver. Very rarely, Windows Update will install the correct drivers for you, but in most cases you will have to download a package from the bank's website.
Often the only supported operating system is Windows, and the only supported browser is IE. (They like them some ActiveX.) It is certainly possible in general for smart cards / USB tokens to support other OS / browsers, see CAC card above; you have to check compatibility with your own bank.
So how does it authenticate you?
--------------------------------
The browser asks the OS to ask the token to sign a small piece of data (perhaps your transaction details). The token signs it, using your private key and certificate. The browser sends the signature to the bank. The bank verifies the signature, and is satisfied that only the token they gave you have the private key to produce this signature.
The private key never leaves the token. If properly designed, the token should never divulge the private key. |
147,463 | My bank recently revamped its website, and it changed for the better as far as I’m concerned. Especially, security seems to have been dramatically enhanced.
Most importantly, they introduced a rather unusual (I’ve never seen this before) identification method, which they call the ‘electronic certificate’. Basically, you have to go to the bank in person and the guy gives you a tiny, cheap USB stick with a very low capacity. From this point, you’ll be required to plug the stick into your computer every time you want to log in. The stick alone is not enough, you also have to type your password — basically, 2-factor-authentification with a USB device being the second factor.
**How can this possibly work?** Of course, I believe the USB stick to contain certificates/encryption keys of some kind, that are used in the login process, but they don’t require the user to install any software on the machine. I find it rather creepy that a website accessed from a sandboxed web browser, with no plug-in/module/app/toolbar installed whatsoever, can see the USB stick you just plugged in. And not only *see* this stick, but read it and use its content deeply enough to log you to the most sensitive level of your online banking app.
I am not a big fan of plugging unknown devices into my computer to begin with, and my warning light flashed when this was explained to me, so I went for another identification method (you can choose). I’m just curious.
PS: the measure obviously does not apply to their mobile apps, since smartphones don’t have USB ports, but that’s not a big deal because you cannot do much with their phone app (it's mainly a consultation app, not something you can actually make big payments/transfers with).
Edit: no open file dialog is used, which would make the explanation quite clear. | 2017/01/06 | [
"https://security.stackexchange.com/questions/147463",
"https://security.stackexchange.com",
"https://security.stackexchange.com/users/-1/"
] | What your bank gave you is an [USB security token](https://en.wikipedia.org/wiki/Security_token) with a digital certificate ([like these](http://www.gemalto.com/readers/tokens)). These are [standardized](https://en.wikipedia.org/wiki/PC/SC) hardware devices which almost every operating system supports plug&play out of the box. They are very common for implementing multi-factor-authentication to high-security systems in enterprise IT.
Your web browser uses HTTPS with client-based certificates to access your bank's website. It uses your operating systems certificate store to find an installed certificate which matches the identity the webserver requests. When you have a standard USB security token installed, the operating system will also look for any certificates on the token.
The operating system can not do the verification process with the webserver by itself, because the token doesn't allow to read the private key of the certificates stored on it directly. The token includes the hardware to do the verification. So the private key never leaves the USB stick. That means even if your PC is compromised by malware, the private key of the certificate isn't in danger of being stolen (but keep in mind that this method doesn't provide any protection after the authentication was successful. Malware can still screw with your web browser).
By the way: Which bank is that? If my bank would also support this authentication method, I might even start doing online banking. | Sounds like a theoretical idea I had about a decade ago.
Pretty much every OS supports USB network devices. Your USB stick may pretend to be a network card, connected to a a local network, with a webserver on that network too. That webserver can have HTTPS certificates, too.
Your webbrowser can make HTTPS requests to that webserver, and discover that the USB stick and bank website trust eachother. This isn't considered a sandbox escape, because neither the browser nor the OS know that the webserver is actually on the USB stick.
IP warning: to the best of my knowledge, my former employer holds a patent on this idea in most jurisdictions. Contact a patent attorney before copying this idea. |
147,463 | My bank recently revamped its website, and it changed for the better as far as I’m concerned. Especially, security seems to have been dramatically enhanced.
Most importantly, they introduced a rather unusual (I’ve never seen this before) identification method, which they call the ‘electronic certificate’. Basically, you have to go to the bank in person and the guy gives you a tiny, cheap USB stick with a very low capacity. From this point, you’ll be required to plug the stick into your computer every time you want to log in. The stick alone is not enough, you also have to type your password — basically, 2-factor-authentification with a USB device being the second factor.
**How can this possibly work?** Of course, I believe the USB stick to contain certificates/encryption keys of some kind, that are used in the login process, but they don’t require the user to install any software on the machine. I find it rather creepy that a website accessed from a sandboxed web browser, with no plug-in/module/app/toolbar installed whatsoever, can see the USB stick you just plugged in. And not only *see* this stick, but read it and use its content deeply enough to log you to the most sensitive level of your online banking app.
I am not a big fan of plugging unknown devices into my computer to begin with, and my warning light flashed when this was explained to me, so I went for another identification method (you can choose). I’m just curious.
PS: the measure obviously does not apply to their mobile apps, since smartphones don’t have USB ports, but that’s not a big deal because you cannot do much with their phone app (it's mainly a consultation app, not something you can actually make big payments/transfers with).
Edit: no open file dialog is used, which would make the explanation quite clear. | 2017/01/06 | [
"https://security.stackexchange.com/questions/147463",
"https://security.stackexchange.com",
"https://security.stackexchange.com/users/-1/"
] | What your bank gave you is an [USB security token](https://en.wikipedia.org/wiki/Security_token) with a digital certificate ([like these](http://www.gemalto.com/readers/tokens)). These are [standardized](https://en.wikipedia.org/wiki/PC/SC) hardware devices which almost every operating system supports plug&play out of the box. They are very common for implementing multi-factor-authentication to high-security systems in enterprise IT.
Your web browser uses HTTPS with client-based certificates to access your bank's website. It uses your operating systems certificate store to find an installed certificate which matches the identity the webserver requests. When you have a standard USB security token installed, the operating system will also look for any certificates on the token.
The operating system can not do the verification process with the webserver by itself, because the token doesn't allow to read the private key of the certificates stored on it directly. The token includes the hardware to do the verification. So the private key never leaves the USB stick. That means even if your PC is compromised by malware, the private key of the certificate isn't in danger of being stolen (but keep in mind that this method doesn't provide any protection after the authentication was successful. Malware can still screw with your web browser).
By the way: Which bank is that? If my bank would also support this authentication method, I might even start doing online banking. | It's most likely a device that pretends to be a keyboard and is thus recognized by any OS without requiring special drivers. Internally, it would probably use HOTP (or TOTP, if it had an RTC chip and a battery) and just "type" the OTP each time the button is pressed, like a [Yubikey](https://www.yubico.com/products/yubikey-hardware/) or similar U2F device.
The browser doesn't talk nor know the USB is there; it just instructs the user to press a physical button on the device (to tell the device to "type" the code, as the browser itself can't talk to it) and then interprets whatever keystrokes (up to the length of the code) it receives as coming from the device. |
147,463 | My bank recently revamped its website, and it changed for the better as far as I’m concerned. Especially, security seems to have been dramatically enhanced.
Most importantly, they introduced a rather unusual (I’ve never seen this before) identification method, which they call the ‘electronic certificate’. Basically, you have to go to the bank in person and the guy gives you a tiny, cheap USB stick with a very low capacity. From this point, you’ll be required to plug the stick into your computer every time you want to log in. The stick alone is not enough, you also have to type your password — basically, 2-factor-authentification with a USB device being the second factor.
**How can this possibly work?** Of course, I believe the USB stick to contain certificates/encryption keys of some kind, that are used in the login process, but they don’t require the user to install any software on the machine. I find it rather creepy that a website accessed from a sandboxed web browser, with no plug-in/module/app/toolbar installed whatsoever, can see the USB stick you just plugged in. And not only *see* this stick, but read it and use its content deeply enough to log you to the most sensitive level of your online banking app.
I am not a big fan of plugging unknown devices into my computer to begin with, and my warning light flashed when this was explained to me, so I went for another identification method (you can choose). I’m just curious.
PS: the measure obviously does not apply to their mobile apps, since smartphones don’t have USB ports, but that’s not a big deal because you cannot do much with their phone app (it's mainly a consultation app, not something you can actually make big payments/transfers with).
Edit: no open file dialog is used, which would make the explanation quite clear. | 2017/01/06 | [
"https://security.stackexchange.com/questions/147463",
"https://security.stackexchange.com",
"https://security.stackexchange.com/users/-1/"
] | One way it could work is that Chrome supports FIDO U2F without plugin. Given that now Chrome is now the most popular browser and that Chrome runs on Windows, Mac, and Linux, it's not totally incorrect to claim that "it works in any device that has a USB port, Windows, Mac, Linux and more, and to work out of the box".
Did they claim that it works in any browsers or just any OS? | This sounds like a Yubikey. They're well known and work great.
<https://www.yubico.com/products/yubikey-hardware/yubikey4/>
* Regarding not needing drivers: The Yubikey identifies itself as a keyboard so any machine with a keyboard driver can read the text output from it.
* How it works: You push the button and the Yubikey issues a public key (from a secure private key embedded in the device). The bank can then
authenticate you and confirm that you have the thing you know (your
password) and the thing you have (your physically secured private
key).
* Why it's secure: It's not possible for software on your
computer to get access to your private key so malware cannot copy the
key and pretend to be you. It would have to be physically stolen from you. (which is possible, but that's why you pair it with something you know)
* Who uses them and why: Google helped design the yubikey so they could
solve the problem of malware on a computer grabbing local credentials
while the user was not present. Every Google engineer has one. I've
used them for years and deployed numerous 2fa solutions around them. |
147,463 | My bank recently revamped its website, and it changed for the better as far as I’m concerned. Especially, security seems to have been dramatically enhanced.
Most importantly, they introduced a rather unusual (I’ve never seen this before) identification method, which they call the ‘electronic certificate’. Basically, you have to go to the bank in person and the guy gives you a tiny, cheap USB stick with a very low capacity. From this point, you’ll be required to plug the stick into your computer every time you want to log in. The stick alone is not enough, you also have to type your password — basically, 2-factor-authentification with a USB device being the second factor.
**How can this possibly work?** Of course, I believe the USB stick to contain certificates/encryption keys of some kind, that are used in the login process, but they don’t require the user to install any software on the machine. I find it rather creepy that a website accessed from a sandboxed web browser, with no plug-in/module/app/toolbar installed whatsoever, can see the USB stick you just plugged in. And not only *see* this stick, but read it and use its content deeply enough to log you to the most sensitive level of your online banking app.
I am not a big fan of plugging unknown devices into my computer to begin with, and my warning light flashed when this was explained to me, so I went for another identification method (you can choose). I’m just curious.
PS: the measure obviously does not apply to their mobile apps, since smartphones don’t have USB ports, but that’s not a big deal because you cannot do much with their phone app (it's mainly a consultation app, not something you can actually make big payments/transfers with).
Edit: no open file dialog is used, which would make the explanation quite clear. | 2017/01/06 | [
"https://security.stackexchange.com/questions/147463",
"https://security.stackexchange.com",
"https://security.stackexchange.com/users/-1/"
] | One way it could work is that Chrome supports FIDO U2F without plugin. Given that now Chrome is now the most popular browser and that Chrome runs on Windows, Mac, and Linux, it's not totally incorrect to claim that "it works in any device that has a USB port, Windows, Mac, Linux and more, and to work out of the box".
Did they claim that it works in any browsers or just any OS? | As some of the other answers mentioned, this is most likely a USB security token. Think of it as a smart card reader + embedded smart card (and sometimes they are actually implemented this way). Think [CAC card](https://en.wikipedia.org/wiki/Common_Access_Card) used by US defense organizations. Think PGP card. Some Yubikey models also support acting as a smart card.
This kind of devices is widely used by banks in China to protect their online banking website / desktop client software, and my answer is mostly based on my personal experience using these tokens in China.
How do you use it?
------------------
When you sign up for online banking and opt for a USB token, the bank gives you the token, creates a public/private key pair and your personal certificate, and load those into the token. You set a password on the token, which is separate from your online banking login password.
You install the driver provided by the bank on your personal computer, plug the token in, and navigate to the bank's website. Whenever you log in or perform a sensitive operation (transferring funds, changing contact information, authorizing online purchase, etc.), the browser / operating system prompts for your token password, the light on the token blinks for a few seconds, and the transaction goes through.
Wait, I have to install drivers?
--------------------------------
Yes. The Windows operating system has a standard smart card interface, but each model of USB token still requires a driver. Very rarely, Windows Update will install the correct drivers for you, but in most cases you will have to download a package from the bank's website.
Often the only supported operating system is Windows, and the only supported browser is IE. (They like them some ActiveX.) It is certainly possible in general for smart cards / USB tokens to support other OS / browsers, see CAC card above; you have to check compatibility with your own bank.
So how does it authenticate you?
--------------------------------
The browser asks the OS to ask the token to sign a small piece of data (perhaps your transaction details). The token signs it, using your private key and certificate. The browser sends the signature to the bank. The bank verifies the signature, and is satisfied that only the token they gave you have the private key to produce this signature.
The private key never leaves the token. If properly designed, the token should never divulge the private key. |
147,463 | My bank recently revamped its website, and it changed for the better as far as I’m concerned. Especially, security seems to have been dramatically enhanced.
Most importantly, they introduced a rather unusual (I’ve never seen this before) identification method, which they call the ‘electronic certificate’. Basically, you have to go to the bank in person and the guy gives you a tiny, cheap USB stick with a very low capacity. From this point, you’ll be required to plug the stick into your computer every time you want to log in. The stick alone is not enough, you also have to type your password — basically, 2-factor-authentification with a USB device being the second factor.
**How can this possibly work?** Of course, I believe the USB stick to contain certificates/encryption keys of some kind, that are used in the login process, but they don’t require the user to install any software on the machine. I find it rather creepy that a website accessed from a sandboxed web browser, with no plug-in/module/app/toolbar installed whatsoever, can see the USB stick you just plugged in. And not only *see* this stick, but read it and use its content deeply enough to log you to the most sensitive level of your online banking app.
I am not a big fan of plugging unknown devices into my computer to begin with, and my warning light flashed when this was explained to me, so I went for another identification method (you can choose). I’m just curious.
PS: the measure obviously does not apply to their mobile apps, since smartphones don’t have USB ports, but that’s not a big deal because you cannot do much with their phone app (it's mainly a consultation app, not something you can actually make big payments/transfers with).
Edit: no open file dialog is used, which would make the explanation quite clear. | 2017/01/06 | [
"https://security.stackexchange.com/questions/147463",
"https://security.stackexchange.com",
"https://security.stackexchange.com/users/-1/"
] | >
> ....they don’t require the user to install any software on the machine....
> I thought that the ability for a webpage to browse the file system freely without user action is too commonly restricted by default
>
>
>
Yes, that should definitely not be possible without smartcard drivers.
This is a fundamental security mechanism of any browser.
What gives the clou that the certificate is read without clicking an "open file" dialog, a Java dialog or pre-installing drivers? You said you chose another verification option.
This sounds like the USB key used, for example, by the Bank Of China. [Such technology is described here.](http://www.icbc.com.cn/icbc/html/e_guanggao/udun/udun_e.html)
>
> was said to be compatible with "any device that has a USB port"
>
>
>
Having a PKCS#11 cert, or a #12 to combine with a passphrase will work on all OSses.
This is the same way password managers like keepass work, combining something you know with something you have to get 2 factors of authentication. | It's most likely a device that pretends to be a keyboard and is thus recognized by any OS without requiring special drivers. Internally, it would probably use HOTP (or TOTP, if it had an RTC chip and a battery) and just "type" the OTP each time the button is pressed, like a [Yubikey](https://www.yubico.com/products/yubikey-hardware/) or similar U2F device.
The browser doesn't talk nor know the USB is there; it just instructs the user to press a physical button on the device (to tell the device to "type" the code, as the browser itself can't talk to it) and then interprets whatever keystrokes (up to the length of the code) it receives as coming from the device. |
67,228,783 | I am trying to give unauthenticated access (timebound) to list and download objects in a Google Storage bucket, and found Signed URLs can do the trick. But Signed URLs are good for a single object, and they have mentioned in the documentation <https://cloud.google.com/storage/docs/access-control/signed-urls#considerations>
>
> When working with signed URLs, keep in mind the following:
>
>
> Signed URLs can only be used to access Cloud Storage resources through
> XML API endpoints.
>
>
> Signed URLs can generally be made for any XML API request; however,
> the Node.js Cloud Storage Client Libraries currently can only make
> signed URLs for individual objects. For example, it cannot be used to
> make signed URLs for listing objects in a bucket.
>
>
>
Is there a way, in Node.js, Python, Java or any other client library or by manually creating signed urls where I can share the link with users so they can browse the bucket and download the required objects?
Thanks! | 2021/04/23 | [
"https://Stackoverflow.com/questions/67228783",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/2012163/"
] | The short answer is not.
But I can explain why. In fact, you have to understand why the signed URL are great and useful.
I will take an example. You have a file of 1Tb and a requester want to download it. You have 2 solutions
* Download the file locally on the server, and then let the user downloading the file from the server
* Let the user directly download the file from the original location (cloud Storage).
---
In the first solution, the user is already authenticated on the server, and it's easy to let them downloaded securely the file. However, you need a huge temporary storage to store temporarily the file before the download by the user
In the second solution, no storage issue (and thus work also with serverless solution, Cloud Run, Cloud Function and App Engine) but you need to delegate the authorization to download the file: It's the purpose of the signed URL.
---
Now, go back to your use case: you want to delegate the file list feature. Why? because you have storage issues? Performance issues? Or by convenience?
Because this solution solves nothings, it has not been implemented. So you need to provide the list of files directly from your server, and then to delegate the download with a signed URL with the user has picked the files that they want.
---
**EDIT 1**
You need to have a Google Identity (User account or service account) to be authorized by IAM service to access to your bucket info.
But, there is a new feature that you can use if you have a non-google managed identity token. You an use [Workload Identity Pool](https://cloud.google.com/iam/docs/manage-workload-identity-pools-providers).
The idea is the following:
* Configure a provider to extract the correct data from the identity token that you have
* Configure a mapping between identity token claims and the service account to impersonate
* Impersonate the service account, generate an access token from it and then use this token to access to all the API granted on the service account.
I don't find the feature handful to use, but it works great and fit your requirements! | You cannot use signed URLs for this. You could give the user's account real permission on the bucket, but use a [conditional IAM policy](https://cloud.google.com/iam/docs/conditions-overview) to make it temporary, like in [this example](https://cloud.google.com/iam/docs/policies#conditional-bindings). |
935,833 | I look for a book/resource which display the general idea of the proof of Fermat last theorem in a simple manner for the public.
I mean, books which is not for mathematicians but for the general public. Books like:
>
> *Gödel's Theorem: An Incomplete Guide to Its Use and Abuse* by Torkel Franzén
>
>
>
Do anyone now any books of this kind? Also, articles or any resources are good. | 2014/09/18 | [
"https://math.stackexchange.com/questions/935833",
"https://math.stackexchange.com",
"https://math.stackexchange.com/users/50948/"
] | Two books which *might* be what you're looking for (haven't read them myself) are [*Invitation to the Mathematics of Fermat-Wiles*](http://books.google.de/books/about/Invitation_to_the_Mathematics_of_Fermat.html?id=W1Nso5E6G3YC&redir_esc=y) by Yves Hellegouarch and the 3rd edition of [*Algebraic Number Theory and Fermat's Last Theorem*](http://books.google.de/books/about/Algebraic_Number_Theory_and_Fermat_s_Las.html?id=PIibasv45boC&redir_esc=y) by Ian Stewart and David Tall. | The upcoming book [Summing It Up](https://www.amazon.co.uk/Summing-Up-Modern-Number-Theory/dp/0691170193/) by Robert Gross and Avner Ash seems to be the type of book that you want. I believe the third section of the book will go into the topics relevant to understanding Fermat's Last Theorem, according to the description on the linked page. |
935,833 | I look for a book/resource which display the general idea of the proof of Fermat last theorem in a simple manner for the public.
I mean, books which is not for mathematicians but for the general public. Books like:
>
> *Gödel's Theorem: An Incomplete Guide to Its Use and Abuse* by Torkel Franzén
>
>
>
Do anyone now any books of this kind? Also, articles or any resources are good. | 2014/09/18 | [
"https://math.stackexchange.com/questions/935833",
"https://math.stackexchange.com",
"https://math.stackexchange.com/users/50948/"
] | It's very hard, if not impossible, to write such a book. Gödel's theorems are about the foundations of math, and so they don't actually use any significant mathematical results other than what they introduce. The main ideas, such as Gödel numbering, are essentially self-contained, and you can explain them to an audience of mathematically-minded people with enough patience.
On the other hand the proof of Fermat's Last Theorem depends crucially on various huge machineries developed throughout the 20th century, which are in turn based on and motivated by ideas from the 19th century. The new ideas involved all occur in a pre-existing conceptually advanced part of the mathematical spectrum, almost the polar opposite of logic and foundations in its reliance on earlier work.
One can try to give some ideas, but unfortunately it becomes extremely vague and confusing very fast. If the audience doesn't know what an elliptic curve is, one may be tempted to to speak vaguely of "doughnut shapes". For representation theory of Galois groups one could think of 'possible manifestations of the symmetry inherent in numbers', and instead of modular forms you might say 'highly symmetric functions'. But then you end up talking nonsense:
The proof involves showing that doughnut shapes are in some sense the same as highly symmetric functions. It had been shown beforehand that every doughnut surface has a highly symmetric function associated to it, but that this might be a bijection was a relatively new idea. It was established by recasting the problem in the world of possible manifestations of the symmetry inherent in numbers. Each doughnut shape results in such a manifestation, as does each highly symmetric function. One can then reformulate the bijection as a relation between the manifestations of symmetries of numbers associated to doughtnut shapes and to highly symmetric functions. Now one key idea is to consider these objects in a number system where numbers that have the same residue modulo $p$ are identified. It had been conjectured that certain manifestations of number symmetry in this world actually come from the regular world of manifestations of ...
It starts to sound like complete non-sense very quickly, and it would have to go on like that for dozens and dozens of pages.
On the other hand if you try to actually define what these things are and proceed rigorously you will not get very far. The Galois group is typically defined at the end of a year-long abstract algebra course. Even if you're willing to just consider examples and definitions, with no proofs for any theorems, you still need to define what a group is, what fields are, what field extensions are, what is a representation, etc. etc.
It's probably more fruitful to read about the general ideas involved instead, as opposed to how they were actually used. If a book can give a public audience some idea of what elliptic curves and modular forms are, that's already a very impressive accomplishment.
Another way to approach it is to read about the history of the problem, the people involved, and slowly the various ideas they introduced to tackle it. This would itself be a good introduction to modern number theory.
I like the Nova documentary 'The Proof'. It's fit for a public audience and does give them some ideas. I doubt you can expect much more, but I'd love to be proved wrong. | Two books which *might* be what you're looking for (haven't read them myself) are [*Invitation to the Mathematics of Fermat-Wiles*](http://books.google.de/books/about/Invitation_to_the_Mathematics_of_Fermat.html?id=W1Nso5E6G3YC&redir_esc=y) by Yves Hellegouarch and the 3rd edition of [*Algebraic Number Theory and Fermat's Last Theorem*](http://books.google.de/books/about/Algebraic_Number_Theory_and_Fermat_s_Las.html?id=PIibasv45boC&redir_esc=y) by Ian Stewart and David Tall. |
935,833 | I look for a book/resource which display the general idea of the proof of Fermat last theorem in a simple manner for the public.
I mean, books which is not for mathematicians but for the general public. Books like:
>
> *Gödel's Theorem: An Incomplete Guide to Its Use and Abuse* by Torkel Franzén
>
>
>
Do anyone now any books of this kind? Also, articles or any resources are good. | 2014/09/18 | [
"https://math.stackexchange.com/questions/935833",
"https://math.stackexchange.com",
"https://math.stackexchange.com/users/50948/"
] | Simon Singh's book, creatively titled "Fermat's Last Theorem" ("Fermat's Enigma" in the US), was a very fun read for a 15 year-old me many years ago :) It gives a lot of the history, as well as a rough outline of the proof (at the "using-lines-of-dominoes-to-explain-proof-by-induction" level). | [Fearless symmetry](http://press.princeton.edu/titles/8755.html) by Avner Ash and Robert Gross is not specifically about Fermat's theorem, but goes through some theory behind the proof. It's quite involved for being a pop science book and I applaud the authors for even trying to present topics such as quadratic reciprocity, elliptic curve theory and Frobenius groups to a broad audience. |
935,833 | I look for a book/resource which display the general idea of the proof of Fermat last theorem in a simple manner for the public.
I mean, books which is not for mathematicians but for the general public. Books like:
>
> *Gödel's Theorem: An Incomplete Guide to Its Use and Abuse* by Torkel Franzén
>
>
>
Do anyone now any books of this kind? Also, articles or any resources are good. | 2014/09/18 | [
"https://math.stackexchange.com/questions/935833",
"https://math.stackexchange.com",
"https://math.stackexchange.com/users/50948/"
] | [Fearless symmetry](http://press.princeton.edu/titles/8755.html) by Avner Ash and Robert Gross is not specifically about Fermat's theorem, but goes through some theory behind the proof. It's quite involved for being a pop science book and I applaud the authors for even trying to present topics such as quadratic reciprocity, elliptic curve theory and Frobenius groups to a broad audience. | The Epilogue in Ribenboim's book *Fermat's Last Theorem for Amateurs* is about the closest you'll get, I think. Of course, it still requires some mathematical skill just to hang with the "overview" — but, as Prometheus pointed out, you can't talk about FLT without using "real math".
For the record, the whole Ribenboim is a great book. |
935,833 | I look for a book/resource which display the general idea of the proof of Fermat last theorem in a simple manner for the public.
I mean, books which is not for mathematicians but for the general public. Books like:
>
> *Gödel's Theorem: An Incomplete Guide to Its Use and Abuse* by Torkel Franzén
>
>
>
Do anyone now any books of this kind? Also, articles or any resources are good. | 2014/09/18 | [
"https://math.stackexchange.com/questions/935833",
"https://math.stackexchange.com",
"https://math.stackexchange.com/users/50948/"
] | Simon Singh's book, creatively titled "Fermat's Last Theorem" ("Fermat's Enigma" in the US), was a very fun read for a 15 year-old me many years ago :) It gives a lot of the history, as well as a rough outline of the proof (at the "using-lines-of-dominoes-to-explain-proof-by-induction" level). | The upcoming book [Summing It Up](https://www.amazon.co.uk/Summing-Up-Modern-Number-Theory/dp/0691170193/) by Robert Gross and Avner Ash seems to be the type of book that you want. I believe the third section of the book will go into the topics relevant to understanding Fermat's Last Theorem, according to the description on the linked page. |
935,833 | I look for a book/resource which display the general idea of the proof of Fermat last theorem in a simple manner for the public.
I mean, books which is not for mathematicians but for the general public. Books like:
>
> *Gödel's Theorem: An Incomplete Guide to Its Use and Abuse* by Torkel Franzén
>
>
>
Do anyone now any books of this kind? Also, articles or any resources are good. | 2014/09/18 | [
"https://math.stackexchange.com/questions/935833",
"https://math.stackexchange.com",
"https://math.stackexchange.com/users/50948/"
] | The Epilogue in Ribenboim's book *Fermat's Last Theorem for Amateurs* is about the closest you'll get, I think. Of course, it still requires some mathematical skill just to hang with the "overview" — but, as Prometheus pointed out, you can't talk about FLT without using "real math".
For the record, the whole Ribenboim is a great book. | Two books which *might* be what you're looking for (haven't read them myself) are [*Invitation to the Mathematics of Fermat-Wiles*](http://books.google.de/books/about/Invitation_to_the_Mathematics_of_Fermat.html?id=W1Nso5E6G3YC&redir_esc=y) by Yves Hellegouarch and the 3rd edition of [*Algebraic Number Theory and Fermat's Last Theorem*](http://books.google.de/books/about/Algebraic_Number_Theory_and_Fermat_s_Las.html?id=PIibasv45boC&redir_esc=y) by Ian Stewart and David Tall. |
935,833 | I look for a book/resource which display the general idea of the proof of Fermat last theorem in a simple manner for the public.
I mean, books which is not for mathematicians but for the general public. Books like:
>
> *Gödel's Theorem: An Incomplete Guide to Its Use and Abuse* by Torkel Franzén
>
>
>
Do anyone now any books of this kind? Also, articles or any resources are good. | 2014/09/18 | [
"https://math.stackexchange.com/questions/935833",
"https://math.stackexchange.com",
"https://math.stackexchange.com/users/50948/"
] | It's very hard, if not impossible, to write such a book. Gödel's theorems are about the foundations of math, and so they don't actually use any significant mathematical results other than what they introduce. The main ideas, such as Gödel numbering, are essentially self-contained, and you can explain them to an audience of mathematically-minded people with enough patience.
On the other hand the proof of Fermat's Last Theorem depends crucially on various huge machineries developed throughout the 20th century, which are in turn based on and motivated by ideas from the 19th century. The new ideas involved all occur in a pre-existing conceptually advanced part of the mathematical spectrum, almost the polar opposite of logic and foundations in its reliance on earlier work.
One can try to give some ideas, but unfortunately it becomes extremely vague and confusing very fast. If the audience doesn't know what an elliptic curve is, one may be tempted to to speak vaguely of "doughnut shapes". For representation theory of Galois groups one could think of 'possible manifestations of the symmetry inherent in numbers', and instead of modular forms you might say 'highly symmetric functions'. But then you end up talking nonsense:
The proof involves showing that doughnut shapes are in some sense the same as highly symmetric functions. It had been shown beforehand that every doughnut surface has a highly symmetric function associated to it, but that this might be a bijection was a relatively new idea. It was established by recasting the problem in the world of possible manifestations of the symmetry inherent in numbers. Each doughnut shape results in such a manifestation, as does each highly symmetric function. One can then reformulate the bijection as a relation between the manifestations of symmetries of numbers associated to doughtnut shapes and to highly symmetric functions. Now one key idea is to consider these objects in a number system where numbers that have the same residue modulo $p$ are identified. It had been conjectured that certain manifestations of number symmetry in this world actually come from the regular world of manifestations of ...
It starts to sound like complete non-sense very quickly, and it would have to go on like that for dozens and dozens of pages.
On the other hand if you try to actually define what these things are and proceed rigorously you will not get very far. The Galois group is typically defined at the end of a year-long abstract algebra course. Even if you're willing to just consider examples and definitions, with no proofs for any theorems, you still need to define what a group is, what fields are, what field extensions are, what is a representation, etc. etc.
It's probably more fruitful to read about the general ideas involved instead, as opposed to how they were actually used. If a book can give a public audience some idea of what elliptic curves and modular forms are, that's already a very impressive accomplishment.
Another way to approach it is to read about the history of the problem, the people involved, and slowly the various ideas they introduced to tackle it. This would itself be a good introduction to modern number theory.
I like the Nova documentary 'The Proof'. It's fit for a public audience and does give them some ideas. I doubt you can expect much more, but I'd love to be proved wrong. | Perhaps the closest thing is this article:
>
> ["A marvelous proof"](http://www.jstor.org/stable/2975598), by Fernando Gouvêa,
>
> *The American Mathematical Monthly*, 101 (3), March 1994, pp. 203–222.
>
>
>
This article got the MAA Lester R. Ford Award in 1995.
This and other papers (with various degrees of difficulty) can be found at [Bluff your way in Fermat's Last Theorem](http://math.stanford.edu/~lekheng/flt/). |
935,833 | I look for a book/resource which display the general idea of the proof of Fermat last theorem in a simple manner for the public.
I mean, books which is not for mathematicians but for the general public. Books like:
>
> *Gödel's Theorem: An Incomplete Guide to Its Use and Abuse* by Torkel Franzén
>
>
>
Do anyone now any books of this kind? Also, articles or any resources are good. | 2014/09/18 | [
"https://math.stackexchange.com/questions/935833",
"https://math.stackexchange.com",
"https://math.stackexchange.com/users/50948/"
] | Perhaps the closest thing is this article:
>
> ["A marvelous proof"](http://www.jstor.org/stable/2975598), by Fernando Gouvêa,
>
> *The American Mathematical Monthly*, 101 (3), March 1994, pp. 203–222.
>
>
>
This article got the MAA Lester R. Ford Award in 1995.
This and other papers (with various degrees of difficulty) can be found at [Bluff your way in Fermat's Last Theorem](http://math.stanford.edu/~lekheng/flt/). | Two books which *might* be what you're looking for (haven't read them myself) are [*Invitation to the Mathematics of Fermat-Wiles*](http://books.google.de/books/about/Invitation_to_the_Mathematics_of_Fermat.html?id=W1Nso5E6G3YC&redir_esc=y) by Yves Hellegouarch and the 3rd edition of [*Algebraic Number Theory and Fermat's Last Theorem*](http://books.google.de/books/about/Algebraic_Number_Theory_and_Fermat_s_Las.html?id=PIibasv45boC&redir_esc=y) by Ian Stewart and David Tall. |
935,833 | I look for a book/resource which display the general idea of the proof of Fermat last theorem in a simple manner for the public.
I mean, books which is not for mathematicians but for the general public. Books like:
>
> *Gödel's Theorem: An Incomplete Guide to Its Use and Abuse* by Torkel Franzén
>
>
>
Do anyone now any books of this kind? Also, articles or any resources are good. | 2014/09/18 | [
"https://math.stackexchange.com/questions/935833",
"https://math.stackexchange.com",
"https://math.stackexchange.com/users/50948/"
] | Perhaps the closest thing is this article:
>
> ["A marvelous proof"](http://www.jstor.org/stable/2975598), by Fernando Gouvêa,
>
> *The American Mathematical Monthly*, 101 (3), March 1994, pp. 203–222.
>
>
>
This article got the MAA Lester R. Ford Award in 1995.
This and other papers (with various degrees of difficulty) can be found at [Bluff your way in Fermat's Last Theorem](http://math.stanford.edu/~lekheng/flt/). | The upcoming book [Summing It Up](https://www.amazon.co.uk/Summing-Up-Modern-Number-Theory/dp/0691170193/) by Robert Gross and Avner Ash seems to be the type of book that you want. I believe the third section of the book will go into the topics relevant to understanding Fermat's Last Theorem, according to the description on the linked page. |
935,833 | I look for a book/resource which display the general idea of the proof of Fermat last theorem in a simple manner for the public.
I mean, books which is not for mathematicians but for the general public. Books like:
>
> *Gödel's Theorem: An Incomplete Guide to Its Use and Abuse* by Torkel Franzén
>
>
>
Do anyone now any books of this kind? Also, articles or any resources are good. | 2014/09/18 | [
"https://math.stackexchange.com/questions/935833",
"https://math.stackexchange.com",
"https://math.stackexchange.com/users/50948/"
] | [Fearless symmetry](http://press.princeton.edu/titles/8755.html) by Avner Ash and Robert Gross is not specifically about Fermat's theorem, but goes through some theory behind the proof. It's quite involved for being a pop science book and I applaud the authors for even trying to present topics such as quadratic reciprocity, elliptic curve theory and Frobenius groups to a broad audience. | The upcoming book [Summing It Up](https://www.amazon.co.uk/Summing-Up-Modern-Number-Theory/dp/0691170193/) by Robert Gross and Avner Ash seems to be the type of book that you want. I believe the third section of the book will go into the topics relevant to understanding Fermat's Last Theorem, according to the description on the linked page. |
45,835 | I have created a Leave Authorisation Form using Infopath 2010 and published it to Forms Library. I have also created a SharePoint designer 2010 custom approval workflow and published it to forms library.
User opens the leave form in browser and fills the info and submits the form and workflow is initiated and manager receives a email. Until here its fine.
When the manager opens the Infopath form how can I provide him an option of approving or rejecting the form that will invoke the workflow. I don't want manager to browse the forms library and then selecting the item from the List and then starting the approval workflow.
Is it possible to customise the InfoPath without any custom code? | 2012/09/18 | [
"https://sharepoint.stackexchange.com/questions/45835",
"https://sharepoint.stackexchange.com",
"https://sharepoint.stackexchange.com/users/5888/"
] | You will need to configure the search box from the Site Collection > Site Settings > Search Settings page. Enable *Custom Scopes* and select the dropdown mode *Do not show scopes dropdown, and default to target results page*. These settings are, however, only available with SharePoint Server search features enabled on the site collection. | If *sharepoint* the name of your application pool you could try to add the url to access mappings. |
15,959 | What is it? Is sex just for pleasure with your partner breaking a precept? Eg with a condom. And is being circumcised bad over personal preferences/ (hygiene,aesthetic)? is oral and anal sex bad? Is masturbation bad? And is circumcising your sons bad? | 2016/07/22 | [
"https://buddhism.stackexchange.com/questions/15959",
"https://buddhism.stackexchange.com",
"https://buddhism.stackexchange.com/users/8734/"
] | Sexual misconduct is defined in the Pali scriptures as having sex with someone else's partner or fiancee and with those living under the protection of their parents or an institution (in the case parents, if the parents disapprove).
The purpose of refraining from sexual misconduct is to not harm/damage existing relationships.
Therefore, having sex for pleasure, using a condom, circumcision, masturbation & oral & anal sex are not, in themselves, sexual misconduct (even though some of these things can be unwholesome & unskilful). | Generally speaking, sexual misconduct means any sexual conduct that involves violence or lying.
One kind of sex is no worse than the other. It all leads to suffering.
I have never heard of anything on circumcision in the Buddha's teaching but there is a rule that monastics can't cut the penis clear off. |
15,959 | What is it? Is sex just for pleasure with your partner breaking a precept? Eg with a condom. And is being circumcised bad over personal preferences/ (hygiene,aesthetic)? is oral and anal sex bad? Is masturbation bad? And is circumcising your sons bad? | 2016/07/22 | [
"https://buddhism.stackexchange.com/questions/15959",
"https://buddhism.stackexchange.com",
"https://buddhism.stackexchange.com/users/8734/"
] | In general, the Pali Canon is quite exoteric and seems to equate sexual misconduct with various kinds of adulteries. Of course, for a monastic any sexual activity at all with the sole exception of involuntary nocturnal emissions is forbidden by the Vinaya. | Generally speaking, sexual misconduct means any sexual conduct that involves violence or lying.
One kind of sex is no worse than the other. It all leads to suffering.
I have never heard of anything on circumcision in the Buddha's teaching but there is a rule that monastics can't cut the penis clear off. |
15,959 | What is it? Is sex just for pleasure with your partner breaking a precept? Eg with a condom. And is being circumcised bad over personal preferences/ (hygiene,aesthetic)? is oral and anal sex bad? Is masturbation bad? And is circumcising your sons bad? | 2016/07/22 | [
"https://buddhism.stackexchange.com/questions/15959",
"https://buddhism.stackexchange.com",
"https://buddhism.stackexchange.com/users/8734/"
] | Sexual misconduct is defined in the Pali scriptures as having sex with someone else's partner or fiancee and with those living under the protection of their parents or an institution (in the case parents, if the parents disapprove).
The purpose of refraining from sexual misconduct is to not harm/damage existing relationships.
Therefore, having sex for pleasure, using a condom, circumcision, masturbation & oral & anal sex are not, in themselves, sexual misconduct (even though some of these things can be unwholesome & unskilful). | In general, the Pali Canon is quite exoteric and seems to equate sexual misconduct with various kinds of adulteries. Of course, for a monastic any sexual activity at all with the sole exception of involuntary nocturnal emissions is forbidden by the Vinaya. |
15,959 | What is it? Is sex just for pleasure with your partner breaking a precept? Eg with a condom. And is being circumcised bad over personal preferences/ (hygiene,aesthetic)? is oral and anal sex bad? Is masturbation bad? And is circumcising your sons bad? | 2016/07/22 | [
"https://buddhism.stackexchange.com/questions/15959",
"https://buddhism.stackexchange.com",
"https://buddhism.stackexchange.com/users/8734/"
] | Sexual misconduct is defined in the Pali scriptures as having sex with someone else's partner or fiancee and with those living under the protection of their parents or an institution (in the case parents, if the parents disapprove).
The purpose of refraining from sexual misconduct is to not harm/damage existing relationships.
Therefore, having sex for pleasure, using a condom, circumcision, masturbation & oral & anal sex are not, in themselves, sexual misconduct (even though some of these things can be unwholesome & unskilful). | Ideally, sexual pleasure should be avoided since it is craving. But Buddha knew that this was difficult for the laity. Therefore, he suggested that the laity should avoid sexual misconduct. Sexual misconduct is simply sexual behavior which is outside social acceptance. And you can interpret that according to your own society. |
15,959 | What is it? Is sex just for pleasure with your partner breaking a precept? Eg with a condom. And is being circumcised bad over personal preferences/ (hygiene,aesthetic)? is oral and anal sex bad? Is masturbation bad? And is circumcising your sons bad? | 2016/07/22 | [
"https://buddhism.stackexchange.com/questions/15959",
"https://buddhism.stackexchange.com",
"https://buddhism.stackexchange.com/users/8734/"
] | In general, the Pali Canon is quite exoteric and seems to equate sexual misconduct with various kinds of adulteries. Of course, for a monastic any sexual activity at all with the sole exception of involuntary nocturnal emissions is forbidden by the Vinaya. | Ideally, sexual pleasure should be avoided since it is craving. But Buddha knew that this was difficult for the laity. Therefore, he suggested that the laity should avoid sexual misconduct. Sexual misconduct is simply sexual behavior which is outside social acceptance. And you can interpret that according to your own society. |
15,081 | So I have a polygon feature classes with unique identifying names to them that I want to use to rename some other feature classes that are of the point feature type and have the same geography of one of the matching polygon feature classes. Basically the points from the second feature class fit within the polygon feature class. The point feature class has no name identify to it so I would like to change that and add at least part of the name of the polygon feature class to the name based on that fact they share the same geography.
I was thinking I could use the Select by Location tool but the problem is I basically just have a bunch of unnamed point feature classes in a folder so it's not like I can select individual feature classes. So some how I need to iterate thru all point feature classes and rename them based on the polygon feature class they match up to. I'm guessing I may use Arcpy to do this. Any help or direction would be appreciated. | 2011/09/28 | [
"https://gis.stackexchange.com/questions/15081",
"https://gis.stackexchange.com",
"https://gis.stackexchange.com/users/405/"
] | Cartographic rules to represent the relief as contours are presented in [Imhof's famous book on relief representation, chapter C](http://esripress.esri.com/display/index.cfm?fuseaction=display&websiteID=118&moduleID=1). Some of these rules are given on [this wikipedia page](http://en.wikipedia.org/wiki/Cartographic_relief_depiction#Contour_lines). The main recommendation when simplifying contours it to preserve the terrain main characteristics.
Smoothing the contours independently do not prevent them to overlap: It is advised to smooth the DTM first. A traditional Gaussian smoothing with a suitable parameter depending on the target resolution allows to erase the small details. A drawback is that DTM smoothing fills the valleys and depressions, and flattens the ridges and peaks. Using the douglass-peucker filter algorithm like [in this paper](http://www.isprs.org/proceedings/XXXVII/congress/1_pdf/129.pdf) may be a solution. There are also [number of methods](http://www.citeulike.org/user/jgaffuri/tag/contour) based on the use of contour smoothing algorithms constrained by the drainage network or a skeleton. Finally, to prevent the contours to overlap in sloppy parts, it is possible [to erase them locally](http://www.geos.ed.ac.uk/homes/wam/MackSteven2006.pdf) or also [deform them](http://icaci.org/documents/ICC_proceedings/ICC2009/html/refer/19_2.pdf). | I want to second @whuber's comment. Quantitative Analysis is always better from a DEM directly and Visual Analysis is often better when done from a Hillshade rather than contours.
To answer the question directly:
In ArcGIS I would use either Focal Statistics or Aggregate [Spatial Analyst Toolbox] to smooth the resulting contour lines. Because contours are a visual analysis feature the amount of smoothing will vary on your need. So you'll have to experiment and see what works best for your project.
Smoothing the lines after generating them does work but is a little clunky compared to modifying the raster first. One post-contour generation clean up I often do is to select the lines of a certain length (e.g. <10' long) and delete them. This rids the data of "noisy" little bits of closed contours (i.e. tiny loops) that are unlikely to reflect the actual character of the surface being modeled by the contours.
Other things you might look at [ArcGIS users] are:
Making a Raster Mosaic and/or Focal Statistics Raster Mosaic and use a model to generate contours for the whole dataset.
Making 3D contours for AutoCAD use.
Watch out for areas of unusual DEM data (e.g. large expanses of low lying ground needing different contour intervals to accurately represent the surface, areas of dense vegetation giving bogus Bare Earth values, areas of vertical relief - cliffs, etc). |
15,081 | So I have a polygon feature classes with unique identifying names to them that I want to use to rename some other feature classes that are of the point feature type and have the same geography of one of the matching polygon feature classes. Basically the points from the second feature class fit within the polygon feature class. The point feature class has no name identify to it so I would like to change that and add at least part of the name of the polygon feature class to the name based on that fact they share the same geography.
I was thinking I could use the Select by Location tool but the problem is I basically just have a bunch of unnamed point feature classes in a folder so it's not like I can select individual feature classes. So some how I need to iterate thru all point feature classes and rename them based on the polygon feature class they match up to. I'm guessing I may use Arcpy to do this. Any help or direction would be appreciated. | 2011/09/28 | [
"https://gis.stackexchange.com/questions/15081",
"https://gis.stackexchange.com",
"https://gis.stackexchange.com/users/405/"
] | Cartographic rules to represent the relief as contours are presented in [Imhof's famous book on relief representation, chapter C](http://esripress.esri.com/display/index.cfm?fuseaction=display&websiteID=118&moduleID=1). Some of these rules are given on [this wikipedia page](http://en.wikipedia.org/wiki/Cartographic_relief_depiction#Contour_lines). The main recommendation when simplifying contours it to preserve the terrain main characteristics.
Smoothing the contours independently do not prevent them to overlap: It is advised to smooth the DTM first. A traditional Gaussian smoothing with a suitable parameter depending on the target resolution allows to erase the small details. A drawback is that DTM smoothing fills the valleys and depressions, and flattens the ridges and peaks. Using the douglass-peucker filter algorithm like [in this paper](http://www.isprs.org/proceedings/XXXVII/congress/1_pdf/129.pdf) may be a solution. There are also [number of methods](http://www.citeulike.org/user/jgaffuri/tag/contour) based on the use of contour smoothing algorithms constrained by the drainage network or a skeleton. Finally, to prevent the contours to overlap in sloppy parts, it is possible [to erase them locally](http://www.geos.ed.ac.uk/homes/wam/MackSteven2006.pdf) or also [deform them](http://icaci.org/documents/ICC_proceedings/ICC2009/html/refer/19_2.pdf). | There is a easy way using gdal\_contour. After setting all option in the dialog window you can then edit the command line and instead the "-i interval" you can use fixed levels "-fl levels". Like the image shows bellow. You can check other options here <http://www.gdal.org/gdal_contour.html>
[](https://i.stack.imgur.com/H2Pta.png) |
329,669 | The selling point of Documentation, and what made it so attractive and sexy was this:
>
> Documentation will complement documentation where it falls through
>
>
>
I'm unsure where I read it, there's another quote that is more recent:
>
> Docs is intended to **solve the problem of bad documentation** for various frameworks out there.
>
>
>
The important part here is that that was practically the only motivation (if anyone has tried reading MSDN some years ago, here's another victim) I had. BUT! There are documentation that is just that good, that anything more just spoils it. I'm unsure how to signalize that. Is there a way we can just redirect people that lands on certain topics to those documentation? | 2016/07/26 | [
"https://meta.stackoverflow.com/questions/329669",
"https://meta.stackoverflow.com",
"https://meta.stackoverflow.com/users/792066/"
] | Being as it is my *first post*, I wanted to take the opportunity to introduce myself. I am Vasudha, the new product manager for SO Documentation. Am super thrilled to be here and I can’t wait to work with all of you to get Documentation to the right place!
The question you raise is a good one and one that we have been talking about on the team as well. We recently went through an extensive round of user research where we interviewed both users (with different levels of activity on Docs) and non-users of the product. A bunch of patterns emerged and we identified the top barriers and motivations to the use of Documentation. As part of that, the need for features that enable better attributing, linking and referencing of existing documentation, came to light. While SO Docs is example focused, and aims to provide users with more ways to apply the said topic; providing context, definition and enough information to make the topic clear and complete is a must.
The lack of such attribution tools have manifested in other ways - one of them being [plagiarism](https://meta.stackoverflow.com/questions/346235/rolling-back-plagiarism-rejected), since some of our users that really like the content on a different site, choose to paste it onto SO.
We have also seen some good ways our community has gotten around this hurdle -
1. >
> [](https://stackoverflow.com/documentation/android/85/getting-started-with-android#t=201704061905247523993)
>
>
>
2. >
> [](https://stackoverflow.com/documentation/android/85/getting-started-with-android#t=201704061905247523993)
>
>
>
3. >
> [](https://stackoverflow.com/documentation/c%2b%2b/206/getting-started-with-c-language/774/hello-world#t=201704101947126278575)
>
>
>
Until we make attribution and linking officially available within the product, I’d be a proponent of the above approach.
Without a doubt, we still stand true to what Kevin Montrose mentioned in our [first post](https://meta.stackoverflow.com/questions/303865/warlords-of-documentation-a-proposed-expansion-of-stack-overflow) to the community about Docs -
>
> **What *should* be documented?**
>
>
> Anything where we can actually make it
> better. If a project already has awesome documentation that's easy to
> search and cite, then there's no need to duplicate it on Stack
> Overflow. We're interested in fixing what's broken with documentation,
> not just moving them onto Stack Overflow.
>
>
>
We realize we need to make it easy for the community to be easily able to point to such references. And that’s exactly what we intend to do! | Here is a suggestion of a light-weight way to do this. I think we actually need two distinct ways of sending the reader to the right place.
* A Topic Alias is just an alternative name for an existing topic in the same "Book". It shows up in the "topic finder", but when the reader clicks on it, they end up on the primary (aliased) Topic. This could be implemented as extra metadata on the primary Topic.
* A Redirection Topic is a "reduced functionality" Topic. It would have a title, and a remarks section, and nothing else. It would (should) not allow people to add examples, syntax, etc. The recommended way of using it would be to put a brief summary of what the topic is about, with links to other Topics in this and other Books where there the real material exists. Typically, there would be multiple links.
For example a "Unit testing" redirection topic in the "Java Language" would link to the separate Books on "Junit" and "TestNG", and possibly to a hypothetical Topic on unit testing in a hypothetical book on Software Development Practice.
The same model could be applied at the Book level as well. |
857,681 | I am in the process of upgrading my computer to a larger SSD as Windows system drive.
My problem is that the old SSD has a very annoying trait of choosing some random old data to present for deleted sectors - and over time a lot of this has accumulated at the tail end of files that don't fill the last cluster completely. No matter what I tried so far to clean this up has done any good, the more I try the more old garbage the drive seems to pull out of its hidden storage pool - so much in fact that a blanket cloning of the drive is completely out of the question. I want this data gone for my upgrade.
Does anybody know some drive cloning software that copies only the actual content of the files and not entire sectors? | 2014/12/28 | [
"https://superuser.com/questions/857681",
"https://superuser.com",
"https://superuser.com/users/402501/"
] | I'm really not quite sure what the problem is your referencing and, to be honest, I wonder if you're suffering from a case of "A little knowledge...". Hard drives do accumulate dead data, but it's unlikely to be of any concern whatsoever while the file system is doing its job. Even less on on an SSD where seek times are essentially null.
Anyway, what you're after is pretty much the default anyway - you simply want a piece of software which does a file system aware file and partition copy - rather than a bit for bit forensic copy. The latter takes MUCH MUCH longer and so is rarely the standard.
CloneZilla should do what you need, but so should any consumer off the shelf cloning software. | What's you're looking for it's a driver's backup and restore. Check there: [Windows Driver Backup and Restore](http://www.techsupportalert.com/best-free-windows-driver-backup.htm) |
14,697 | Hi Just wanted to ask how to make my bike faster.
Do I change the front chainring to a larger one, if so do I have to get a whole new drive train or can I just get another shimano large ring. Can I get a smaller cog at the back, will that make my bike faster?
Please take a look at my bike. here are the specs
Shifters: R660 Shimano trigger, Front derailleur: R453 Shimano, Rear derailleur: Shimano Sora, Cassette: FAC MICHE 9s 12X26 Bottom bracket: FC453 Shimano 50/39/30, Chain: KMC Z9000
here's the site with more information
<http://www.btwin.com/en/fitness-road-bikes/3856-b-twin-forme-5.html>
I just want to know if I can change anything to make it faster but I don't know what to change. thanks
Thanks
David | 2013/03/03 | [
"https://bicycles.stackexchange.com/questions/14697",
"https://bicycles.stackexchange.com",
"https://bicycles.stackexchange.com/users/6272/"
] | There's a nice [gear calculator](http://sheldonbrown.com/gears/) at Sheldon's site. I did a quick calculation for you, and at 50/12, at 90 RPM, you should be going 47.4 km/h. If you upgraded your front chainring to a 54, and your back cassette to go down to 11, at the same RPM you could go 55.8 km/h, which is a significant increase. You can play around with different options on the calculator to see how much it would help to get different gearing combinations.
You might find that you won't get much extra speed out of bigger gears as your bike has a somewhat upright posture and therefore you'll be quite limited in what kind of speed you can get. I think that 50 km/h is plenty fast for a bike and that you should just focus more on going faster on the flats and uphills. | By far the easiest option is change the cassette to an 26\*11. Reducing the smallest cog from 12 to 11 will give you about 9% more speed for the same cadence. To get the same out the front, you would need to go to a 54 large chain ring. An other option would be to go to a 52/12 - quite a common size.
You failed to mention what wheel size you are running - this has a big impact on gearing.....
As Danial asked though - 50/11 is an insanely large top gear (assuming 700C wheels), very few people could push that for any length of time. It is unlikely your speed problem is gearing with a 50/12 - is you cadence high enough? |
36,275,852 | In a scenario like below

assignee and assigner are keys of developer and tester. how to map the emp\_id as a foreign key without getting duplicated? | 2016/03/29 | [
"https://Stackoverflow.com/questions/36275852",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/5614342/"
] | start a service and your alarm code in that.Once the alarm is done start your application through notification or as per your logic. | You should use Service, Open your activity through service. [Service](http://developer.android.com/guide/components/services.html) |
95,334 | Why didn't Elrond send one of his sons in the company? | 2015/07/13 | [
"https://scifi.stackexchange.com/questions/95334",
"https://scifi.stackexchange.com",
"https://scifi.stackexchange.com/users/48137/"
] | This isn't explained in-universe, but there are a few factors that may have contributed:
* **They were busy doing behind-the-scenes work for the fellowship.** In *Fellowship of the Ring* we learn that Elladan and Elrohir were part of a large-scale scouting effort before the fellowship left Rivendell:
>
> Some of the scouts have been sent out already. More will go tomorrow. Elrond is sending Elves, and they will get in touch with the Rangers, and maybe with Thranduil's folk in Mirkwood. And Aragorn has gone with Elrond's sons. We shall have to scour the lands all round for many long leagues before any move is made.
>
>
> *Fellowship of the Ring* Book II Chapter 3: "The Ring Goes South"
>
>
>
And later that they were on some secret mission, most likely to Lothlórien:
>
> The sons of Elrond, Elladan and Elrohir, were the last to return; they had made a great journey, passing down the Silverlode into a strange country, but of their errand they would not speak to any save to Elrond.
>
>
> *Fellowship of the Ring* Book II Chapter 3: "The Ring Goes South"
>
>
>
It's possible that they continued doing work of this kind, keeping the path relatively clear for the fellowship.
* **They were helping the Rangers.** It's not exactly clear what the Rangers are up to after the Council of Elrond (they're certainly not doing a good job keeping Saruman out of the Shire). However, Elladan and Elrohir accompany a contingent of them at least for part of the time, meeting up with Aragorn and the Rohirrim at Dunharrow:
>
> 'All is well,' said Aragorn, turning back. 'Here are some of my own kin from the far land where I dwelt. But why they come, and how many they be, Halbarad shall tell us.'
>
>
> 'I have thirty with me,' said Halbarad. 'That is all of our kindred that could be gathered in haste; but the brethren Elladan and Elrohir have ridden with us, desiring to go to the war. We rode as swiftly as we might when your summons came.'
>
>
> *Return of the King* Book V Chapter 2: "The Passing of the Grey Company"
>
>
>
It's possible that Elladan and Elrohir were helping out the Dúnedain with whatever it is they were doing.
* **He was going to, but didn't get a chance.** It's worth remembering how the final two spots in the fellowship were filled:
>
> 'The Company of the Ring shall be Nine; and the Nine Walkers shall be set against the Nine Riders that are evil. With you and your faithful servant, Gandalf will go; for this shall be his great task, and maybe the end of his labours.
>
>
> 'For the rest, they shall represent the other Free Peoples of the World: Elves, Dwarves, and Men. Legolas shall be for the Elves; and Gimli son of Glóin for the Dwarves. They are willing to go at least to the passes of the Mountains, and maybe beyond. For men you shall have Aragorn son of Arathorn, for the Ring of Isildur concerns him closely.'
>
>
> *[[Boromir is joining them because he and Aragorn are going to Minas Tirith](https://scifi.stackexchange.com/questions/88001/why-was-boromir-allowed-to-join-the-fellowship-of-the-ring)]*
>
>
> 'There remain two more to be found,' said Elrond. 'These I will consider. Of my household I may find some that it seems good to me to send.'
>
>
> 'But that will leave no place for us!' cried Pippin in dismay. 'We don't want to be left behind. We want to go with Frodo.'
>
>
> 'That is because you do not understand and cannot imagine what lies ahead,' said Elrond.
>
>
> 'Neither does Frodo,' said Gandalf, unexpectedly supporting Pippin. 'Nor do any of us see clearly. It is true that if these hobbits understood the danger, they would not dare to go. But they would still wish to go, or wish that they dared, and be shamed and unhappy. I think, Elrond, that in this matter it would be well to trust rather to their friendship than to great wisdom.
>
>
> *Fellowship of the Ring* Book II Chapter 3: "The Ring Goes South"
>
>
>
It's entirely possible that he would have chosen his sons to join the fellowship, but the other seven got filled up before he could pick from his own house, and then Merry and Pippin claimed the last ones. Them's the breaks.
Having said that, the *correct* answer is the out-of-universe one: Tolkien hadn't conceived of them yet. The sons of Elrond make their first appearance in a series of chapter outlines for *Return of the King*, dated by Christopher Tolkien to 1946:
>
> [Ch.] 45. King and Aragorn (with Merry, Legolas, Gimli) ride to the Hornburg. Overtaken by the Sons of Elrond and 30 Rangers seeking Aragorn (probably because of messages sent by Galadriel to Elrond). King rides to Dunharrow by mountain roads. Aragorn (Legolas and Gimli) and Rangers go by open road. Aragorn reveals he has looked in Palantír, and seeks the Paths of the Dead.
>
>
> *History of Middle-earth* VIII *The War of the Ring* "Part 3: Minas Tirith" Chapter III "Minas Tirith"
>
>
>
Just based on that short excerpt, we can see that we're very close to the final version of the story; despite being quite far out from publishing (*Return of the King* was first published 9 years after this was written), the plot quite closely resembles the final product.
Even if Tolkien had thought of adding them to the fellowship (which seems unlikely; from a narrative perspective they don't add much), it was probably not worth substantially rewriting two-thirds of his manuscript. | To supplement, rather than supplant, Jason Baker's excellent answer above, I can only offer the following note. In a sense, Elrond *did* send his son on the quest. In *The Tale of Aragorn and Arwen*, which is found in the Appendices to *The Lord of the Rings*, we read this passage:
>
> [After his father Arathorn's death] Aragorn, being now the Heir of Isildur, was taken with his mother to dwell in the house of Elrond; and Elrond took the place of his father and came to love him as a son of his own.
>
>
>
There are several other references to the relationship between Elrond and Aragorn, and almost all of them paint the relationship as one between a father and his son, including this one, from the same source:
>
> "**My son**, years come when hope will fade, and beyond them little is clear to me. And now a shadow lies between us. Maybe, it has been appointed so, that by my loss the kingship of Men may be restored. Therefore, though **I love you**, I say to you: Arwen Undómiel shall not diminish her life's grace for less cause. She shall not be the bride of any Man less than the King of both Gondor and Arnor. To me then even our victory can bring only sorrow and parting - but to you hope of joy for a while. For a while. **Alas, my son!** I fear that to Arwen the Doom of Men may seem hard at the ending."
>
>
>
Note that here, Elrond doesn't say that he loves Aragorn *like* a son; he literally calls him "My son".
Of course, Aragorn did indeed go with the Fellowship of the Ring, so one of Elrond's sons was among the Fellowship.
So, as Obi Wan Kenobi would say, Elrond did send his son to accompany the Ring on its journey to Mordor - "from a certain point of view". |
95,334 | Why didn't Elrond send one of his sons in the company? | 2015/07/13 | [
"https://scifi.stackexchange.com/questions/95334",
"https://scifi.stackexchange.com",
"https://scifi.stackexchange.com/users/48137/"
] | This isn't explained in-universe, but there are a few factors that may have contributed:
* **They were busy doing behind-the-scenes work for the fellowship.** In *Fellowship of the Ring* we learn that Elladan and Elrohir were part of a large-scale scouting effort before the fellowship left Rivendell:
>
> Some of the scouts have been sent out already. More will go tomorrow. Elrond is sending Elves, and they will get in touch with the Rangers, and maybe with Thranduil's folk in Mirkwood. And Aragorn has gone with Elrond's sons. We shall have to scour the lands all round for many long leagues before any move is made.
>
>
> *Fellowship of the Ring* Book II Chapter 3: "The Ring Goes South"
>
>
>
And later that they were on some secret mission, most likely to Lothlórien:
>
> The sons of Elrond, Elladan and Elrohir, were the last to return; they had made a great journey, passing down the Silverlode into a strange country, but of their errand they would not speak to any save to Elrond.
>
>
> *Fellowship of the Ring* Book II Chapter 3: "The Ring Goes South"
>
>
>
It's possible that they continued doing work of this kind, keeping the path relatively clear for the fellowship.
* **They were helping the Rangers.** It's not exactly clear what the Rangers are up to after the Council of Elrond (they're certainly not doing a good job keeping Saruman out of the Shire). However, Elladan and Elrohir accompany a contingent of them at least for part of the time, meeting up with Aragorn and the Rohirrim at Dunharrow:
>
> 'All is well,' said Aragorn, turning back. 'Here are some of my own kin from the far land where I dwelt. But why they come, and how many they be, Halbarad shall tell us.'
>
>
> 'I have thirty with me,' said Halbarad. 'That is all of our kindred that could be gathered in haste; but the brethren Elladan and Elrohir have ridden with us, desiring to go to the war. We rode as swiftly as we might when your summons came.'
>
>
> *Return of the King* Book V Chapter 2: "The Passing of the Grey Company"
>
>
>
It's possible that Elladan and Elrohir were helping out the Dúnedain with whatever it is they were doing.
* **He was going to, but didn't get a chance.** It's worth remembering how the final two spots in the fellowship were filled:
>
> 'The Company of the Ring shall be Nine; and the Nine Walkers shall be set against the Nine Riders that are evil. With you and your faithful servant, Gandalf will go; for this shall be his great task, and maybe the end of his labours.
>
>
> 'For the rest, they shall represent the other Free Peoples of the World: Elves, Dwarves, and Men. Legolas shall be for the Elves; and Gimli son of Glóin for the Dwarves. They are willing to go at least to the passes of the Mountains, and maybe beyond. For men you shall have Aragorn son of Arathorn, for the Ring of Isildur concerns him closely.'
>
>
> *[[Boromir is joining them because he and Aragorn are going to Minas Tirith](https://scifi.stackexchange.com/questions/88001/why-was-boromir-allowed-to-join-the-fellowship-of-the-ring)]*
>
>
> 'There remain two more to be found,' said Elrond. 'These I will consider. Of my household I may find some that it seems good to me to send.'
>
>
> 'But that will leave no place for us!' cried Pippin in dismay. 'We don't want to be left behind. We want to go with Frodo.'
>
>
> 'That is because you do not understand and cannot imagine what lies ahead,' said Elrond.
>
>
> 'Neither does Frodo,' said Gandalf, unexpectedly supporting Pippin. 'Nor do any of us see clearly. It is true that if these hobbits understood the danger, they would not dare to go. But they would still wish to go, or wish that they dared, and be shamed and unhappy. I think, Elrond, that in this matter it would be well to trust rather to their friendship than to great wisdom.
>
>
> *Fellowship of the Ring* Book II Chapter 3: "The Ring Goes South"
>
>
>
It's entirely possible that he would have chosen his sons to join the fellowship, but the other seven got filled up before he could pick from his own house, and then Merry and Pippin claimed the last ones. Them's the breaks.
Having said that, the *correct* answer is the out-of-universe one: Tolkien hadn't conceived of them yet. The sons of Elrond make their first appearance in a series of chapter outlines for *Return of the King*, dated by Christopher Tolkien to 1946:
>
> [Ch.] 45. King and Aragorn (with Merry, Legolas, Gimli) ride to the Hornburg. Overtaken by the Sons of Elrond and 30 Rangers seeking Aragorn (probably because of messages sent by Galadriel to Elrond). King rides to Dunharrow by mountain roads. Aragorn (Legolas and Gimli) and Rangers go by open road. Aragorn reveals he has looked in Palantír, and seeks the Paths of the Dead.
>
>
> *History of Middle-earth* VIII *The War of the Ring* "Part 3: Minas Tirith" Chapter III "Minas Tirith"
>
>
>
Just based on that short excerpt, we can see that we're very close to the final version of the story; despite being quite far out from publishing (*Return of the King* was first published 9 years after this was written), the plot quite closely resembles the final product.
Even if Tolkien had thought of adding them to the fellowship (which seems unlikely; from a narrative perspective they don't add much), it was probably not worth substantially rewriting two-thirds of his manuscript. | According to their [wiki page](http://lotr.wikia.com/wiki/Elrohir)
The WERE a part of the fellowship....sort of. It was their job to scout out ahead of the fellowship before they even set out. Later, they joined [The grey company](http://lotr.wikia.com/wiki/Grey_Company) , the greatest mortal soldiers of middle earth. With this great company, they apparently followed the fellowship through the paths of the dead, subsequently fighting with Aragorn and the ghost army in the battle of Pellenor Field. |
95,334 | Why didn't Elrond send one of his sons in the company? | 2015/07/13 | [
"https://scifi.stackexchange.com/questions/95334",
"https://scifi.stackexchange.com",
"https://scifi.stackexchange.com/users/48137/"
] | This isn't explained in-universe, but there are a few factors that may have contributed:
* **They were busy doing behind-the-scenes work for the fellowship.** In *Fellowship of the Ring* we learn that Elladan and Elrohir were part of a large-scale scouting effort before the fellowship left Rivendell:
>
> Some of the scouts have been sent out already. More will go tomorrow. Elrond is sending Elves, and they will get in touch with the Rangers, and maybe with Thranduil's folk in Mirkwood. And Aragorn has gone with Elrond's sons. We shall have to scour the lands all round for many long leagues before any move is made.
>
>
> *Fellowship of the Ring* Book II Chapter 3: "The Ring Goes South"
>
>
>
And later that they were on some secret mission, most likely to Lothlórien:
>
> The sons of Elrond, Elladan and Elrohir, were the last to return; they had made a great journey, passing down the Silverlode into a strange country, but of their errand they would not speak to any save to Elrond.
>
>
> *Fellowship of the Ring* Book II Chapter 3: "The Ring Goes South"
>
>
>
It's possible that they continued doing work of this kind, keeping the path relatively clear for the fellowship.
* **They were helping the Rangers.** It's not exactly clear what the Rangers are up to after the Council of Elrond (they're certainly not doing a good job keeping Saruman out of the Shire). However, Elladan and Elrohir accompany a contingent of them at least for part of the time, meeting up with Aragorn and the Rohirrim at Dunharrow:
>
> 'All is well,' said Aragorn, turning back. 'Here are some of my own kin from the far land where I dwelt. But why they come, and how many they be, Halbarad shall tell us.'
>
>
> 'I have thirty with me,' said Halbarad. 'That is all of our kindred that could be gathered in haste; but the brethren Elladan and Elrohir have ridden with us, desiring to go to the war. We rode as swiftly as we might when your summons came.'
>
>
> *Return of the King* Book V Chapter 2: "The Passing of the Grey Company"
>
>
>
It's possible that Elladan and Elrohir were helping out the Dúnedain with whatever it is they were doing.
* **He was going to, but didn't get a chance.** It's worth remembering how the final two spots in the fellowship were filled:
>
> 'The Company of the Ring shall be Nine; and the Nine Walkers shall be set against the Nine Riders that are evil. With you and your faithful servant, Gandalf will go; for this shall be his great task, and maybe the end of his labours.
>
>
> 'For the rest, they shall represent the other Free Peoples of the World: Elves, Dwarves, and Men. Legolas shall be for the Elves; and Gimli son of Glóin for the Dwarves. They are willing to go at least to the passes of the Mountains, and maybe beyond. For men you shall have Aragorn son of Arathorn, for the Ring of Isildur concerns him closely.'
>
>
> *[[Boromir is joining them because he and Aragorn are going to Minas Tirith](https://scifi.stackexchange.com/questions/88001/why-was-boromir-allowed-to-join-the-fellowship-of-the-ring)]*
>
>
> 'There remain two more to be found,' said Elrond. 'These I will consider. Of my household I may find some that it seems good to me to send.'
>
>
> 'But that will leave no place for us!' cried Pippin in dismay. 'We don't want to be left behind. We want to go with Frodo.'
>
>
> 'That is because you do not understand and cannot imagine what lies ahead,' said Elrond.
>
>
> 'Neither does Frodo,' said Gandalf, unexpectedly supporting Pippin. 'Nor do any of us see clearly. It is true that if these hobbits understood the danger, they would not dare to go. But they would still wish to go, or wish that they dared, and be shamed and unhappy. I think, Elrond, that in this matter it would be well to trust rather to their friendship than to great wisdom.
>
>
> *Fellowship of the Ring* Book II Chapter 3: "The Ring Goes South"
>
>
>
It's entirely possible that he would have chosen his sons to join the fellowship, but the other seven got filled up before he could pick from his own house, and then Merry and Pippin claimed the last ones. Them's the breaks.
Having said that, the *correct* answer is the out-of-universe one: Tolkien hadn't conceived of them yet. The sons of Elrond make their first appearance in a series of chapter outlines for *Return of the King*, dated by Christopher Tolkien to 1946:
>
> [Ch.] 45. King and Aragorn (with Merry, Legolas, Gimli) ride to the Hornburg. Overtaken by the Sons of Elrond and 30 Rangers seeking Aragorn (probably because of messages sent by Galadriel to Elrond). King rides to Dunharrow by mountain roads. Aragorn (Legolas and Gimli) and Rangers go by open road. Aragorn reveals he has looked in Palantír, and seeks the Paths of the Dead.
>
>
> *History of Middle-earth* VIII *The War of the Ring* "Part 3: Minas Tirith" Chapter III "Minas Tirith"
>
>
>
Just based on that short excerpt, we can see that we're very close to the final version of the story; despite being quite far out from publishing (*Return of the King* was first published 9 years after this was written), the plot quite closely resembles the final product.
Even if Tolkien had thought of adding them to the fellowship (which seems unlikely; from a narrative perspective they don't add much), it was probably not worth substantially rewriting two-thirds of his manuscript. | Don't forget also that Gandalf states that the hope of the fellowship lies in secrecy and not in strength and that even having Glorfindel in their ranks would help.
Seeing as Legolas was already going to be travelling that direction(ish) it makes sense that he would be the one of elf kind in the fellowship |
95,334 | Why didn't Elrond send one of his sons in the company? | 2015/07/13 | [
"https://scifi.stackexchange.com/questions/95334",
"https://scifi.stackexchange.com",
"https://scifi.stackexchange.com/users/48137/"
] | To supplement, rather than supplant, Jason Baker's excellent answer above, I can only offer the following note. In a sense, Elrond *did* send his son on the quest. In *The Tale of Aragorn and Arwen*, which is found in the Appendices to *The Lord of the Rings*, we read this passage:
>
> [After his father Arathorn's death] Aragorn, being now the Heir of Isildur, was taken with his mother to dwell in the house of Elrond; and Elrond took the place of his father and came to love him as a son of his own.
>
>
>
There are several other references to the relationship between Elrond and Aragorn, and almost all of them paint the relationship as one between a father and his son, including this one, from the same source:
>
> "**My son**, years come when hope will fade, and beyond them little is clear to me. And now a shadow lies between us. Maybe, it has been appointed so, that by my loss the kingship of Men may be restored. Therefore, though **I love you**, I say to you: Arwen Undómiel shall not diminish her life's grace for less cause. She shall not be the bride of any Man less than the King of both Gondor and Arnor. To me then even our victory can bring only sorrow and parting - but to you hope of joy for a while. For a while. **Alas, my son!** I fear that to Arwen the Doom of Men may seem hard at the ending."
>
>
>
Note that here, Elrond doesn't say that he loves Aragorn *like* a son; he literally calls him "My son".
Of course, Aragorn did indeed go with the Fellowship of the Ring, so one of Elrond's sons was among the Fellowship.
So, as Obi Wan Kenobi would say, Elrond did send his son to accompany the Ring on its journey to Mordor - "from a certain point of view". | According to their [wiki page](http://lotr.wikia.com/wiki/Elrohir)
The WERE a part of the fellowship....sort of. It was their job to scout out ahead of the fellowship before they even set out. Later, they joined [The grey company](http://lotr.wikia.com/wiki/Grey_Company) , the greatest mortal soldiers of middle earth. With this great company, they apparently followed the fellowship through the paths of the dead, subsequently fighting with Aragorn and the ghost army in the battle of Pellenor Field. |
95,334 | Why didn't Elrond send one of his sons in the company? | 2015/07/13 | [
"https://scifi.stackexchange.com/questions/95334",
"https://scifi.stackexchange.com",
"https://scifi.stackexchange.com/users/48137/"
] | To supplement, rather than supplant, Jason Baker's excellent answer above, I can only offer the following note. In a sense, Elrond *did* send his son on the quest. In *The Tale of Aragorn and Arwen*, which is found in the Appendices to *The Lord of the Rings*, we read this passage:
>
> [After his father Arathorn's death] Aragorn, being now the Heir of Isildur, was taken with his mother to dwell in the house of Elrond; and Elrond took the place of his father and came to love him as a son of his own.
>
>
>
There are several other references to the relationship between Elrond and Aragorn, and almost all of them paint the relationship as one between a father and his son, including this one, from the same source:
>
> "**My son**, years come when hope will fade, and beyond them little is clear to me. And now a shadow lies between us. Maybe, it has been appointed so, that by my loss the kingship of Men may be restored. Therefore, though **I love you**, I say to you: Arwen Undómiel shall not diminish her life's grace for less cause. She shall not be the bride of any Man less than the King of both Gondor and Arnor. To me then even our victory can bring only sorrow and parting - but to you hope of joy for a while. For a while. **Alas, my son!** I fear that to Arwen the Doom of Men may seem hard at the ending."
>
>
>
Note that here, Elrond doesn't say that he loves Aragorn *like* a son; he literally calls him "My son".
Of course, Aragorn did indeed go with the Fellowship of the Ring, so one of Elrond's sons was among the Fellowship.
So, as Obi Wan Kenobi would say, Elrond did send his son to accompany the Ring on its journey to Mordor - "from a certain point of view". | Don't forget also that Gandalf states that the hope of the fellowship lies in secrecy and not in strength and that even having Glorfindel in their ranks would help.
Seeing as Legolas was already going to be travelling that direction(ish) it makes sense that he would be the one of elf kind in the fellowship |
95,334 | Why didn't Elrond send one of his sons in the company? | 2015/07/13 | [
"https://scifi.stackexchange.com/questions/95334",
"https://scifi.stackexchange.com",
"https://scifi.stackexchange.com/users/48137/"
] | According to their [wiki page](http://lotr.wikia.com/wiki/Elrohir)
The WERE a part of the fellowship....sort of. It was their job to scout out ahead of the fellowship before they even set out. Later, they joined [The grey company](http://lotr.wikia.com/wiki/Grey_Company) , the greatest mortal soldiers of middle earth. With this great company, they apparently followed the fellowship through the paths of the dead, subsequently fighting with Aragorn and the ghost army in the battle of Pellenor Field. | Don't forget also that Gandalf states that the hope of the fellowship lies in secrecy and not in strength and that even having Glorfindel in their ranks would help.
Seeing as Legolas was already going to be travelling that direction(ish) it makes sense that he would be the one of elf kind in the fellowship |
243,352 | The heat proved too much for a few people who'd gone off too fast for their capabilities and ended up suffering from exhaustion.
Does prove mean this to show a particular quality after a period of time like in this example The new treatment has proved to be very effective or this is a special phrase which you should use with too much?
end up doing something What does it mean? I read the definition in the dictionary but still can't get what it means when we use with the ing form. Does it have only one meaning? | 2020/04/02 | [
"https://ell.stackexchange.com/questions/243352",
"https://ell.stackexchange.com",
"https://ell.stackexchange.com/users/112210/"
] | "Proved" or "proven" in these contexts means "turned out to be".
There is an initial unknown situation (how would the runners fare in the heat? How would the new treatment go?), and as the situation is played out, the result becomes clear - the result is proven, like a scientific experiment. That is what the "end up" refers to - at the end of the situation, the initial "question" is answered.
It is fine to use it in everyday speech, it might be a *tiny* bit more formal than common, everyday language in the 21st century, but it is still very accepted.
You don't need to specify time using "ended up" or similar, and you don't need to use it with "too much", it's fine by itself. | To prove something means to show it is true but can also mean “found to be” Adding ing to a word means you are doing that thing at the moment. So proving would mean you are currently in the act of showing truth. |
1,160,539 | I know glassfish can authenticate against an LDAP server, I also know it can authenticate against my own database. What I would like to do is authenticate users against LDAP, but get their roles from my own database.
Where would I start learning how to create my own custom authentication module? | 2009/07/21 | [
"https://Stackoverflow.com/questions/1160539",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/74894/"
] | [HERE](http://x-techteam.blogspot.com/2008/03/glassfish-login-module-simple-example.html) is the step-by-step instructions of how to do this. | See the [Glassfish security FAQ](https://glassfish.dev.java.net/javaee5/security/faq.html), specifically "How do I write/configure my own login module and plug it into GlassFish?"
and [this sun document](http://developers.sun.com/appserver/reference/techart/as8_authentication/) |
98,552 | Im trying to create some realistic mockups of canvas prints laying next to cars, or even hanging on walls. Need to know that extra step i need to know to make these look real. [](https://i.stack.imgur.com/EuHYj.jpg) | 2017/09/18 | [
"https://graphicdesign.stackexchange.com/questions/98552",
"https://graphicdesign.stackexchange.com",
"https://graphicdesign.stackexchange.com/users/103032/"
] | 1) When combining images from multiple sources, ideally you want to use images of the same quality. The color looks fine but the quality of the canvas/text looks much nicer than the background. I would suggest finding a higher-resolution background image. You can also tell by the sharp border of the canvas.
2) Adding subtle shadows. Add some slight shadows to the right of the canvas.
3) The canvas perspective looks off. The left side shouldn't be much smaller than the right if we are viewing a front facing. I am basing this on the bottom of the canvas which isn't turned much.
4) Make the sign sit closer to the car. It looks like the sign needs to lean onto the car to stand up but in the photo it looks like it isn't leaning back. I would just raise the whole canvas thing up above that circle thing. | This answer is rewritten. I also edited a little your image to make it more consistent.
All this is only based on my speculations because there's no facts available about the wanted forms, positions and colors.
[](https://i.stack.imgur.com/3ephO.jpg)
The edits:
1. The text plate is straightened. I wanted to drag its bottom end towards the bottom left corner to make it more tilted against the car, but I hadn't the original plain image. The tilting reveals more of it.
It probably would be a good idea to mirror the original photo left-right. Then the text could be in the light and still stay at the left side of the image and lean against the car skewed as you originally wanted it.
2. I reshaped the visible narrow side of the text plate to approximate projected rectangle. The white stroke at the right vertical edge of the plate was removed
3. The narrow side was made brighter to stay in accordance with the light direction in the original image. A shadow is added respectively at the bottom.
4. A small reflection is painted to chrome
5. The plate is blurred approximately to the same unsharpness as the original
6. The image has got a little contrast because the blurring made 365 CHANCES difficult to read. 1 YEAR= was too bright, so it was kept out of the boosting
. It still is a little too bright.
7. The plate and the original image had different colors. I desaturated all and recolored all to the same hue and saturation. The hue is random. As well it would have been possible to leave it fully desaturated or to copy the hue from your image.
The photo is so unsharp that there's no need to worry about canvas texture and how it is taken into the account in the appearances of the texts. This becomes a problem in higher resolution images which show the canvas details. |
12,183,688 | I wrote a Java program. For a small input, after warm-up (the first 50 runs), its running time turns to be around 2 milliseconds.
In this case, could we get any benefit if I use multiple threads version? If not, what are the overhead hidden the benefits of parallel execution? | 2012/08/29 | [
"https://Stackoverflow.com/questions/12183688",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/1258409/"
] | Most likely the overhead of starting the threads would far outweigh any speedup. On windows you'll even have trouble measuring the execution time reliably for such fast programs.
But of course, you must ask yourself if you truly need any speedup for a program that runs in 2 ms. | Id depends on if 2ms is too slow. It also depends if you want to run the tasks concurrently.
Why not use an Executor to run your tasks then you can add threads as you need them. |
12,183,688 | I wrote a Java program. For a small input, after warm-up (the first 50 runs), its running time turns to be around 2 milliseconds.
In this case, could we get any benefit if I use multiple threads version? If not, what are the overhead hidden the benefits of parallel execution? | 2012/08/29 | [
"https://Stackoverflow.com/questions/12183688",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/1258409/"
] | Most likely the overhead of starting the threads would far outweigh any speedup. On windows you'll even have trouble measuring the execution time reliably for such fast programs.
But of course, you must ask yourself if you truly need any speedup for a program that runs in 2 ms. | Well, 2ms is at least a candidate for splitting up over multiple threads. Continually creating/running/terminating/joining threads is a non-starter - hopeless design. If signaling work to a set of dedicated threads or issuing work to a pool, it all depends on the work done and the data organization.
If there is any blocking, or CPU-intensive, work that an be effectively performed in parallel in those 2ms, then you could give it a go. The key issue with CPU-intensive work is how much data and how it is organized. If the data to be worked on can easily be chopped up into nice, [L1-cache-size or smaller] chunks, you're onto a winner. If not, be prepared for a dissapointment.
You could, of course, try it and see.. |
456,671 | I just finished my first PCB with KiCad. Now, I need to produce it and I need the Pick and Place file. When I try to generate footprint position files the software produce the message "No footprint for automated placement". I'm using the version 5.1.4-e60b266 for ubuntu 18.04.1.
How can I generate this file? How can I solve?
[](https://i.stack.imgur.com/w2l4M.png)
This is my PCB:
[](https://i.stack.imgur.com/NBOTE.png) | 2019/09/08 | [
"https://electronics.stackexchange.com/questions/456671",
"https://electronics.stackexchange.com",
"https://electronics.stackexchange.com/users/88419/"
] | Pick and place, and thus the \*.pos file, is relevant to surface mount technology. The automatic placement of through-hole technology is not something that is worth the money to invest in due to the volumes produced. The problem with leaded is the need to position each leg for each hole.
If you place an test surface-mount component, you will see a \*.pos file can be generated as there is x-y coordinates that makes sense for such a part. | The same problem occurred to me today using KiCad Version 5.1.4. - And I think I've found a solution to the problem:
---
**1) Temporary solution:**
KiCad: Pcbnew:
'File' -> 'Fabrication Outputs' -> 'Footprint Position (.pos) file...' ->
'Generate Footprint Position Files':
Check this checkbox in the 'Generate Footprint Position Files' dialog:
**'Include footprints with SMD pads even if not marked Surface Mount'**
[](https://i.stack.imgur.com/eTSqB.png)
---
**2) Fix footprints:**
One of my custom footprints was not marked as 'Surface Mount'. Somehow this made it impossible for KiCad to export the 'Footprint Position' file (the 'No footprint for automated placement' warning shows up and no footprints will be exported).
So, **make sure that your SMD footprints are all marked in the footprint editor under 'Fabrication Attributes'**:
[](https://i.stack.imgur.com/CNjGI.png) |
456,671 | I just finished my first PCB with KiCad. Now, I need to produce it and I need the Pick and Place file. When I try to generate footprint position files the software produce the message "No footprint for automated placement". I'm using the version 5.1.4-e60b266 for ubuntu 18.04.1.
How can I generate this file? How can I solve?
[](https://i.stack.imgur.com/w2l4M.png)
This is my PCB:
[](https://i.stack.imgur.com/NBOTE.png) | 2019/09/08 | [
"https://electronics.stackexchange.com/questions/456671",
"https://electronics.stackexchange.com",
"https://electronics.stackexchange.com/users/88419/"
] | Pick and place, and thus the \*.pos file, is relevant to surface mount technology. The automatic placement of through-hole technology is not something that is worth the money to invest in due to the volumes produced. The problem with leaded is the need to position each leg for each hole.
If you place an test surface-mount component, you will see a \*.pos file can be generated as there is x-y coordinates that makes sense for such a part. | A Centroid file (\*.pos) is not required for Throughhole (THT) only projects. It is only required for placing SMT components. |
456,671 | I just finished my first PCB with KiCad. Now, I need to produce it and I need the Pick and Place file. When I try to generate footprint position files the software produce the message "No footprint for automated placement". I'm using the version 5.1.4-e60b266 for ubuntu 18.04.1.
How can I generate this file? How can I solve?
[](https://i.stack.imgur.com/w2l4M.png)
This is my PCB:
[](https://i.stack.imgur.com/NBOTE.png) | 2019/09/08 | [
"https://electronics.stackexchange.com/questions/456671",
"https://electronics.stackexchange.com",
"https://electronics.stackexchange.com/users/88419/"
] | The same problem occurred to me today using KiCad Version 5.1.4. - And I think I've found a solution to the problem:
---
**1) Temporary solution:**
KiCad: Pcbnew:
'File' -> 'Fabrication Outputs' -> 'Footprint Position (.pos) file...' ->
'Generate Footprint Position Files':
Check this checkbox in the 'Generate Footprint Position Files' dialog:
**'Include footprints with SMD pads even if not marked Surface Mount'**
[](https://i.stack.imgur.com/eTSqB.png)
---
**2) Fix footprints:**
One of my custom footprints was not marked as 'Surface Mount'. Somehow this made it impossible for KiCad to export the 'Footprint Position' file (the 'No footprint for automated placement' warning shows up and no footprints will be exported).
So, **make sure that your SMD footprints are all marked in the footprint editor under 'Fabrication Attributes'**:
[](https://i.stack.imgur.com/CNjGI.png) | A Centroid file (\*.pos) is not required for Throughhole (THT) only projects. It is only required for placing SMT components. |
8,381,345 | What are the query browsers for DB2 e.g Database Administrator(Data Studio), Toad for DB2 etc? I worked with them but are there more ? | 2011/12/05 | [
"https://Stackoverflow.com/questions/8381345",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/2214674/"
] | You can find a list of browsers in Wikipedia:
<http://en.wikipedia.org/wiki/Comparison_of_database_tools#General>
and look at "Other" column. You will see which tools work with DB2.
The popular ones are:
* Toad for DB2 <http://www.toadworld.com/products#ibm-db2>
* SQuirreL <http://www.squirrelsql.org>
* SQL Maestro <http://www.sqlmaestro.com/products/db2/maestro/>
* Altova DatabaseSpy <http://www.altova.com/databasespy.html>
* Embarcardero PowerStudio for DB2 <http://www.embarcadero.com/products/db-powerstudio-for-db2>
Or
* IBM Data Studio (Free) <http://www-01.ibm.com/software/data/optim/data-studio/>
* Technology Explorer (from IBM, on PHP) <http://sourceforge.net/projects/db2mc/>
* Control Center (Deprecated, included in IBM Data server client) | I find [DbVisualizer](http://www.dbvis.com/) to be outstanding even when compared to many native tools.
 |
8,381,345 | What are the query browsers for DB2 e.g Database Administrator(Data Studio), Toad for DB2 etc? I worked with them but are there more ? | 2011/12/05 | [
"https://Stackoverflow.com/questions/8381345",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/2214674/"
] | I find [DbVisualizer](http://www.dbvis.com/) to be outstanding even when compared to many native tools.
 | I recommend the IBM data studio among the free tools. It lets you
* Manipulate(Create , modify, execute) stored procedures
* See explain plans - run performance analysis
* Let you open unlimited connections which some of the free tools doesn't let you.
Also, it's based on eclipse framework, so if you are already using eclipse its almost a breeze to learn. Toad freeware is also cool, however the freeware has a licensing limitation of max 5 per enterprise.
Also, check the [latest IBM data studio download](http://www.ibm.com/developerworks/downloads/im/data/) |
8,381,345 | What are the query browsers for DB2 e.g Database Administrator(Data Studio), Toad for DB2 etc? I worked with them but are there more ? | 2011/12/05 | [
"https://Stackoverflow.com/questions/8381345",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/2214674/"
] | I've recently discovered DBeaver (<http://dbeaver.jkiss.org>) and I love it.
Runs on Win and Linux (on Centos7 I just unpacked an archive and ran executable), it's open source and without need of external driver it has connected to DB2 server right away. Same for PostgreSQL and MS SQL Server.
Not sure how it compares with other in feature set though, but user experience compared to previously used Squirrel is amazing. | I find [DbVisualizer](http://www.dbvis.com/) to be outstanding even when compared to many native tools.
 |
8,381,345 | What are the query browsers for DB2 e.g Database Administrator(Data Studio), Toad for DB2 etc? I worked with them but are there more ? | 2011/12/05 | [
"https://Stackoverflow.com/questions/8381345",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/2214674/"
] | You can find a list of browsers in Wikipedia:
<http://en.wikipedia.org/wiki/Comparison_of_database_tools#General>
and look at "Other" column. You will see which tools work with DB2.
The popular ones are:
* Toad for DB2 <http://www.toadworld.com/products#ibm-db2>
* SQuirreL <http://www.squirrelsql.org>
* SQL Maestro <http://www.sqlmaestro.com/products/db2/maestro/>
* Altova DatabaseSpy <http://www.altova.com/databasespy.html>
* Embarcardero PowerStudio for DB2 <http://www.embarcadero.com/products/db-powerstudio-for-db2>
Or
* IBM Data Studio (Free) <http://www-01.ibm.com/software/data/optim/data-studio/>
* Technology Explorer (from IBM, on PHP) <http://sourceforge.net/projects/db2mc/>
* Control Center (Deprecated, included in IBM Data server client) | I recommend the IBM data studio among the free tools. It lets you
* Manipulate(Create , modify, execute) stored procedures
* See explain plans - run performance analysis
* Let you open unlimited connections which some of the free tools doesn't let you.
Also, it's based on eclipse framework, so if you are already using eclipse its almost a breeze to learn. Toad freeware is also cool, however the freeware has a licensing limitation of max 5 per enterprise.
Also, check the [latest IBM data studio download](http://www.ibm.com/developerworks/downloads/im/data/) |
8,381,345 | What are the query browsers for DB2 e.g Database Administrator(Data Studio), Toad for DB2 etc? I worked with them but are there more ? | 2011/12/05 | [
"https://Stackoverflow.com/questions/8381345",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/2214674/"
] | You can find a list of browsers in Wikipedia:
<http://en.wikipedia.org/wiki/Comparison_of_database_tools#General>
and look at "Other" column. You will see which tools work with DB2.
The popular ones are:
* Toad for DB2 <http://www.toadworld.com/products#ibm-db2>
* SQuirreL <http://www.squirrelsql.org>
* SQL Maestro <http://www.sqlmaestro.com/products/db2/maestro/>
* Altova DatabaseSpy <http://www.altova.com/databasespy.html>
* Embarcardero PowerStudio for DB2 <http://www.embarcadero.com/products/db-powerstudio-for-db2>
Or
* IBM Data Studio (Free) <http://www-01.ibm.com/software/data/optim/data-studio/>
* Technology Explorer (from IBM, on PHP) <http://sourceforge.net/projects/db2mc/>
* Control Center (Deprecated, included in IBM Data server client) | I've recently discovered DBeaver (<http://dbeaver.jkiss.org>) and I love it.
Runs on Win and Linux (on Centos7 I just unpacked an archive and ran executable), it's open source and without need of external driver it has connected to DB2 server right away. Same for PostgreSQL and MS SQL Server.
Not sure how it compares with other in feature set though, but user experience compared to previously used Squirrel is amazing. |
8,381,345 | What are the query browsers for DB2 e.g Database Administrator(Data Studio), Toad for DB2 etc? I worked with them but are there more ? | 2011/12/05 | [
"https://Stackoverflow.com/questions/8381345",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/2214674/"
] | I've recently discovered DBeaver (<http://dbeaver.jkiss.org>) and I love it.
Runs on Win and Linux (on Centos7 I just unpacked an archive and ran executable), it's open source and without need of external driver it has connected to DB2 server right away. Same for PostgreSQL and MS SQL Server.
Not sure how it compares with other in feature set though, but user experience compared to previously used Squirrel is amazing. | I recommend the IBM data studio among the free tools. It lets you
* Manipulate(Create , modify, execute) stored procedures
* See explain plans - run performance analysis
* Let you open unlimited connections which some of the free tools doesn't let you.
Also, it's based on eclipse framework, so if you are already using eclipse its almost a breeze to learn. Toad freeware is also cool, however the freeware has a licensing limitation of max 5 per enterprise.
Also, check the [latest IBM data studio download](http://www.ibm.com/developerworks/downloads/im/data/) |
21,403 | I am designing a 12VDC, 200mA transformerless power supply using 1N4007(diode) for rectification, a ceramic capacitor 475k and 10R resistor for limiting, a zener diode (1N4742A) for a regulated output. After the connections am not still getting the output current, the current is needed to drive a relay of 12VDC 160mA. | 2011/10/27 | [
"https://electronics.stackexchange.com/questions/21403",
"https://electronics.stackexchange.com",
"https://electronics.stackexchange.com/users/6291/"
] | **Summary**
* **ALWAYS remember that any part of this circuit MUST be considered to be live and that a user may die if they touch any part of this circuit.**
* If your circuit is half wave and operating at 110 VAC and 60 Hz then the capacitor needs to be about 10 uF.
* If your circuit is half wave and operating at 230 VAC and 50 Hz then Iout should be about 190 mA. If it isn't then you **may** have the zener in the wrong position.
* The zener diode should be on the AC side of the rectifier diode.
* Note that capacitor tolerances can be wide - your capacitor **actual** value needs to be at least as large as calculations indicate.
* A comprehensive design guide can be found in
Microchip AN954 [Transformerless Power Supplies ...](http://ww1.microchip.com/downloads/en/AppNotes/00954A.pdf)
An offline transformerless supply can be made using a series capacitor to provide series impedance.
capacitor impedance is 1/(2 x Pi x frequency x C).
For say 1 uF at say 60 Hz Xc = 1/( 2 x 3.14 x 60 x 1E-6) =~ 2650 ohms reactive
For 110 VAC if this capacitor was placed across the mains the AC current flow would be
I = V/R = 110/2650 = 40 mA.
To get 160 mA the capacitor would need to be 4 uF.
BUT that's for AC power.
If a full wave bridge is used the power delivered at DC is the same but if, as is usual, half wave is used then the capacitor needs to be about double or here = 8 uF. Say 10 uF actual.
IF the 475k capacotor = 4.7 uF (as it appears) and if you are running on 110 VAC then your capacitor appears to be about half the size it should be.
Note also the comment on zener placement below. .
To make this into a power supply, rather than just connecting across the mains a "load" is created which uses the AC current to create a lower voltage supply. The driving voltage is now Vac - Vdc. Not much change usually. A simple version of this looks like this:

The resistor limits surge current. It can play a role in voltage dropping if large enough but is usually small.
The zener diode provides its breakdown voltage in one direction and acts like a diode in the other direction. Without this diode action the capacitor would have no AC return path and the circuit would not work.
If the zener is moved to the DC side of D2 then a reverse biased diode must be used where the zener now is
\_\_
The power output can be about doubled by using full wave rectification - like so:

An online calculator that allows the design of a full wave transformerless power supply [can be found here](http://www.daycounter.com/Circuits/Transformerless-Power-Supplies/Transformerless-Power-Supplies.phtml) .
Using this calculator a value of 10 uF gave 218 mA at ~12 VDC for 110 VAC, 60 Hz input. 50 Hz gave 180 mA.
230 VAC, 50 HZ, 4.75 uF **full wave** , 12 VDC gives 192 mA
A half wave circuit will give about half that.
---
ADDED
C1 MUST be mains rated.
BR1 can be 4 x 1N400x diodes or a mains rated bridge. (Theoretically does not need to be mains rated but ...).
Caps that are rated to connect across mains (phase-neutral) are X rated and must withstand Vrms x 1.414 **PLUS** expected peaks and surges and transients. They are made of sterner stuff than eg just a 230 VAC x 1.414 Volt cap for 230 VAC operation. Caps that are designed to operate from mains to ground (eg phase-ground) are Y rated - a lesser but still demanding requirement. | 200mA is a lot for a capacitve dropper supply. If you're driving a relay, consider using one with a 24 or 48V coil instead of 12V, so less current is needed.
Take a look at Power Integrations Linkswitch-TN devices, which can be a good alternative to capacitor droppers when the current requirement is more than can be got with a sensible-sized capacitor. |
23,108 | One of my weaknesses as a PM is not being able to delegate and manage work assigned to others. What are ways you can tackle this? Granted I have high expectations of others, but sometimes they just don't meet the basic requirements.
Example:
I asked someone to do a task for me, and 2 hours before the deadline they present it to me clearly showing no effort was put into it. I had to scramble and re-do it myself. In this scenario, how do you deal with this person? Is there a better way of asking them to do it? How can I enforce it so they do it better next time? | 2017/12/19 | [
"https://pm.stackexchange.com/questions/23108",
"https://pm.stackexchange.com",
"https://pm.stackexchange.com/users/27570/"
] | A few suggestions:
Don't delegate & disappear until the deadline. Check in with them once or twice, just informally to ask how it's going, do they need any clarification from you, are they having any problems.
Be sure everyone is clear on what the priority of the delegated task is, especially if the people you've delegated to have other usual tasks, and possibly other people that are setting their priorities or depending on them.
And when things do go wrong, don't think "enforce". Think "ask." Ask them about it (after you've calmed down from having had to scramble to do it yourself, and after putting any thoughts of what *you* think happened firmly out of your mind), in a non-judgmental, non-authoritarian, curious way.
For example, in the situation you describe, I might say something like:
*So, I appreciate that you turned the thing in on time, and that it had (something else I can remotely find to praise about it), but I was surprised that it didn't include (specific things that you had expected it to include). Was I not clear about that, or ...?*
Note that I'm leading with the assumption that the fault might have been mine. I will do this even if I am 99.999% sure that it was not, partly because I have learned that communications problems usually have fault on both sides, but mostly because it is the least accusatory framing I can provide, so it is least likely to provoke a defensive, self-justifying response, and most likely to elicit an open, productive response.
Hopefully, the response identifies what the other person thought the problem was, and the conversation can then proceed collaboratively to figure out how we can avoid a similar problem next time. Sometimes I will offer a solution (eg, "would it be helpful if I checked in with you halfway thru?") and sometimes (usually not the first time) I will assert a solution I want to try (eg, "OK, well, next time I would like to see your design/prelim draft so we can make sure we're on the same page earlier").
Communications problems are SO common. It is SO easy to think that everything made it out of your head and into your words when really only half of it did -- and this is true on both sides. It's often helpful to point that out (eg, "Oh I see, I said X and what I meant was X+Z, but I wasn't explicit about the Z part so you assumed I wanted X+Y") as it can become an area for continuously working towards improvement.
It's hard to move from "I asked you to do this thing and I ended up redoing it myself, dammit" to "OK, well *that* didn't work out how I expected. What do you think happened?" And it can take a few hours or a day or two to get there, especially at first. But I have found it well worth it: both in terms of fostering a collaborative, productive team, and in terms of lowering my stress level. :)
Good luck! | To add to [Vicki](https://pm.stackexchange.com/users/11661/vicki-laidler)'s great [answer](https://pm.stackexchange.com/a/23112/4384):
Once you *train* people that you will redo sloppy work and fill in for them, they will rely on it.
As a general rule, a PM never does any work, a PM does PM.
How to do this? See [Vicki](https://pm.stackexchange.com/users/11661/vicki-laidler)'s detailed [answer](https://pm.stackexchange.com/a/23112/4384). |
23,108 | One of my weaknesses as a PM is not being able to delegate and manage work assigned to others. What are ways you can tackle this? Granted I have high expectations of others, but sometimes they just don't meet the basic requirements.
Example:
I asked someone to do a task for me, and 2 hours before the deadline they present it to me clearly showing no effort was put into it. I had to scramble and re-do it myself. In this scenario, how do you deal with this person? Is there a better way of asking them to do it? How can I enforce it so they do it better next time? | 2017/12/19 | [
"https://pm.stackexchange.com/questions/23108",
"https://pm.stackexchange.com",
"https://pm.stackexchange.com/users/27570/"
] | A few suggestions:
Don't delegate & disappear until the deadline. Check in with them once or twice, just informally to ask how it's going, do they need any clarification from you, are they having any problems.
Be sure everyone is clear on what the priority of the delegated task is, especially if the people you've delegated to have other usual tasks, and possibly other people that are setting their priorities or depending on them.
And when things do go wrong, don't think "enforce". Think "ask." Ask them about it (after you've calmed down from having had to scramble to do it yourself, and after putting any thoughts of what *you* think happened firmly out of your mind), in a non-judgmental, non-authoritarian, curious way.
For example, in the situation you describe, I might say something like:
*So, I appreciate that you turned the thing in on time, and that it had (something else I can remotely find to praise about it), but I was surprised that it didn't include (specific things that you had expected it to include). Was I not clear about that, or ...?*
Note that I'm leading with the assumption that the fault might have been mine. I will do this even if I am 99.999% sure that it was not, partly because I have learned that communications problems usually have fault on both sides, but mostly because it is the least accusatory framing I can provide, so it is least likely to provoke a defensive, self-justifying response, and most likely to elicit an open, productive response.
Hopefully, the response identifies what the other person thought the problem was, and the conversation can then proceed collaboratively to figure out how we can avoid a similar problem next time. Sometimes I will offer a solution (eg, "would it be helpful if I checked in with you halfway thru?") and sometimes (usually not the first time) I will assert a solution I want to try (eg, "OK, well, next time I would like to see your design/prelim draft so we can make sure we're on the same page earlier").
Communications problems are SO common. It is SO easy to think that everything made it out of your head and into your words when really only half of it did -- and this is true on both sides. It's often helpful to point that out (eg, "Oh I see, I said X and what I meant was X+Z, but I wasn't explicit about the Z part so you assumed I wanted X+Y") as it can become an area for continuously working towards improvement.
It's hard to move from "I asked you to do this thing and I ended up redoing it myself, dammit" to "OK, well *that* didn't work out how I expected. What do you think happened?" And it can take a few hours or a day or two to get there, especially at first. But I have found it well worth it: both in terms of fostering a collaborative, productive team, and in terms of lowering my stress level. :)
Good luck! | You are only looking at the individual as a possible root cause of the mediocre performance. This is not unusual, unfortunately, but it is also not very effective. You need to look at the entire system: processes--including the supporting processes such as QA (@VickiLaidler's suggestion) and risk--tooling; knowledge--both tacit and explicit--and your talent.
And you need to monitor performance over time. The human talent is the least reliable; there is quite a variance in all of our performance. Even the best pilot will bounce one in every now and again. So you need to measure and monitor your talent's performance over time to find his/her modal performance level.
In most cases, the human is not what's broken. There are other drivers that disable human performance no matter who (s)he is. You need to take a more sophisticated approach on this very complex topic of performance than what you are seeking here. |
23,108 | One of my weaknesses as a PM is not being able to delegate and manage work assigned to others. What are ways you can tackle this? Granted I have high expectations of others, but sometimes they just don't meet the basic requirements.
Example:
I asked someone to do a task for me, and 2 hours before the deadline they present it to me clearly showing no effort was put into it. I had to scramble and re-do it myself. In this scenario, how do you deal with this person? Is there a better way of asking them to do it? How can I enforce it so they do it better next time? | 2017/12/19 | [
"https://pm.stackexchange.com/questions/23108",
"https://pm.stackexchange.com",
"https://pm.stackexchange.com/users/27570/"
] | A few suggestions:
Don't delegate & disappear until the deadline. Check in with them once or twice, just informally to ask how it's going, do they need any clarification from you, are they having any problems.
Be sure everyone is clear on what the priority of the delegated task is, especially if the people you've delegated to have other usual tasks, and possibly other people that are setting their priorities or depending on them.
And when things do go wrong, don't think "enforce". Think "ask." Ask them about it (after you've calmed down from having had to scramble to do it yourself, and after putting any thoughts of what *you* think happened firmly out of your mind), in a non-judgmental, non-authoritarian, curious way.
For example, in the situation you describe, I might say something like:
*So, I appreciate that you turned the thing in on time, and that it had (something else I can remotely find to praise about it), but I was surprised that it didn't include (specific things that you had expected it to include). Was I not clear about that, or ...?*
Note that I'm leading with the assumption that the fault might have been mine. I will do this even if I am 99.999% sure that it was not, partly because I have learned that communications problems usually have fault on both sides, but mostly because it is the least accusatory framing I can provide, so it is least likely to provoke a defensive, self-justifying response, and most likely to elicit an open, productive response.
Hopefully, the response identifies what the other person thought the problem was, and the conversation can then proceed collaboratively to figure out how we can avoid a similar problem next time. Sometimes I will offer a solution (eg, "would it be helpful if I checked in with you halfway thru?") and sometimes (usually not the first time) I will assert a solution I want to try (eg, "OK, well, next time I would like to see your design/prelim draft so we can make sure we're on the same page earlier").
Communications problems are SO common. It is SO easy to think that everything made it out of your head and into your words when really only half of it did -- and this is true on both sides. It's often helpful to point that out (eg, "Oh I see, I said X and what I meant was X+Z, but I wasn't explicit about the Z part so you assumed I wanted X+Y") as it can become an area for continuously working towards improvement.
It's hard to move from "I asked you to do this thing and I ended up redoing it myself, dammit" to "OK, well *that* didn't work out how I expected. What do you think happened?" And it can take a few hours or a day or two to get there, especially at first. But I have found it well worth it: both in terms of fostering a collaborative, productive team, and in terms of lowering my stress level. :)
Good luck! | It appears that you tend to be a perfectionist. Aren't you? Well, that's one of the challenge you got to face if you are a perfectionist. In adverse situations, the team members might also play games. That's natural in a highly political environment.
Is being perfectionist your problem? No. Then, how will you overcome the situation. There are ways and means to control the situation and it's purely in your hands. It's only you. Does it sound like a self-help cliché? Yes, it is.
Does it hold true for all those perfectionists? Quite naturally. Let us analyze the situation further.
Consider you assign a task to your team member. You would assume that by assigning a task to your teammate, the individual would take the ownership and revert to you when complete. If this is the case, then, your expectation is very much correct. That's how your team members would need to function. But you need to understand that they are not "YOU". They are different and have their own characteristics. You will need to accept this and change your mindset. This is the first step to success. Do you agree?
**Okay, I have changed / ready to change my mindset. Now, What?**
Well, there are umpteen ways to attack this problem. Instead of enlisting a huge set of possible solutions, let us narrow down to only two areas. What would it be? It would be: a) hard-way, b) soft-way. These two "ways" shall be your highway to your success. Crap, is what you will think. No, it is not. There is no other option other than to keep reading. Please bear with me.
**Hard-way**:
Okay, so what is that hard-way? It is all about preparing the hard deliverables. What else, it would be your "task sheet" also known as Work-breakdown-structure (WBS) that spells out who does what and when. But then, you would ask, I have the task sheet prepared. Now, what?
The answer to this question would be: If you have prepared this WBS all alone thinking that your team members will need to go by your schedule, than I am sorry. You are at fault. You are preparing to blow your own trumpet. Trust me, that happens. I have committed that mistake and have burned my fingers and toes.
You should possibly involve your team members, brainstorm (yup, that's the buzz word), and then arrive at the WBS. The next activity shall be to communicate. But to whom? To the stakeholders. Communication is key. Please note. The moment you broadcast, your team will feel the heat. They will get to know that the tasks are getting noticed from top to bottom. Use the communication tool wisely.
The next set of activity shall be to keep monitoring and tracking. This is very essential. Publish the status religiously - rain or shine. This means you will need to over-communicate regularly until you gain traction.
Figure out the results. You will be surprised to believe the story. You can create history.
**Soft-way**:
Now the soft part. This is very essential. You know that "give respect to take respect" is a famous adage. But then, that's what everyone expect. Please look at your team members as equal. Never indulge into any gossip. At times, just by using the magical words (please, thank you, etc), you could sense where your project is moving to. Always, be calm. Never vent. Your behavior at work depends on your project and your professional success.
Soft skills are very important to delegate and to get the work done. You might sometimes need to keep prodding. That happens, but then, as a PM, you got to see yourself as a guide.
Hope this helps you. |
23,108 | One of my weaknesses as a PM is not being able to delegate and manage work assigned to others. What are ways you can tackle this? Granted I have high expectations of others, but sometimes they just don't meet the basic requirements.
Example:
I asked someone to do a task for me, and 2 hours before the deadline they present it to me clearly showing no effort was put into it. I had to scramble and re-do it myself. In this scenario, how do you deal with this person? Is there a better way of asking them to do it? How can I enforce it so they do it better next time? | 2017/12/19 | [
"https://pm.stackexchange.com/questions/23108",
"https://pm.stackexchange.com",
"https://pm.stackexchange.com/users/27570/"
] | A few suggestions:
Don't delegate & disappear until the deadline. Check in with them once or twice, just informally to ask how it's going, do they need any clarification from you, are they having any problems.
Be sure everyone is clear on what the priority of the delegated task is, especially if the people you've delegated to have other usual tasks, and possibly other people that are setting their priorities or depending on them.
And when things do go wrong, don't think "enforce". Think "ask." Ask them about it (after you've calmed down from having had to scramble to do it yourself, and after putting any thoughts of what *you* think happened firmly out of your mind), in a non-judgmental, non-authoritarian, curious way.
For example, in the situation you describe, I might say something like:
*So, I appreciate that you turned the thing in on time, and that it had (something else I can remotely find to praise about it), but I was surprised that it didn't include (specific things that you had expected it to include). Was I not clear about that, or ...?*
Note that I'm leading with the assumption that the fault might have been mine. I will do this even if I am 99.999% sure that it was not, partly because I have learned that communications problems usually have fault on both sides, but mostly because it is the least accusatory framing I can provide, so it is least likely to provoke a defensive, self-justifying response, and most likely to elicit an open, productive response.
Hopefully, the response identifies what the other person thought the problem was, and the conversation can then proceed collaboratively to figure out how we can avoid a similar problem next time. Sometimes I will offer a solution (eg, "would it be helpful if I checked in with you halfway thru?") and sometimes (usually not the first time) I will assert a solution I want to try (eg, "OK, well, next time I would like to see your design/prelim draft so we can make sure we're on the same page earlier").
Communications problems are SO common. It is SO easy to think that everything made it out of your head and into your words when really only half of it did -- and this is true on both sides. It's often helpful to point that out (eg, "Oh I see, I said X and what I meant was X+Z, but I wasn't explicit about the Z part so you assumed I wanted X+Y") as it can become an area for continuously working towards improvement.
It's hard to move from "I asked you to do this thing and I ended up redoing it myself, dammit" to "OK, well *that* didn't work out how I expected. What do you think happened?" And it can take a few hours or a day or two to get there, especially at first. But I have found it well worth it: both in terms of fostering a collaborative, productive team, and in terms of lowering my stress level. :)
Good luck! | Couple of comments for you:
>
> Granted I have high expectations of others, but sometimes they just
> don't meet the basic requirements.
>
>
>
* Spend more time thinking about your hiring / selection process
* Avoid becoming a policeman
* Read and think about [Setup to Fail](https://hbr.org/1998/03/the-set-up-to-fail-syndrome)
* Immediately show that you care and work on the right outcomes
>
> we had a meeting about the requirements and had everyone agree before
> any work was done.
>
>
>
* If you procure services, make sure you understand this subject
* Two weeks you say without communication would be foolish
>
> no effort was put into it.
>
>
>
* Effort is too subjective. Either the work fulfills the requirements or not. |
23,108 | One of my weaknesses as a PM is not being able to delegate and manage work assigned to others. What are ways you can tackle this? Granted I have high expectations of others, but sometimes they just don't meet the basic requirements.
Example:
I asked someone to do a task for me, and 2 hours before the deadline they present it to me clearly showing no effort was put into it. I had to scramble and re-do it myself. In this scenario, how do you deal with this person? Is there a better way of asking them to do it? How can I enforce it so they do it better next time? | 2017/12/19 | [
"https://pm.stackexchange.com/questions/23108",
"https://pm.stackexchange.com",
"https://pm.stackexchange.com/users/27570/"
] | A few suggestions:
Don't delegate & disappear until the deadline. Check in with them once or twice, just informally to ask how it's going, do they need any clarification from you, are they having any problems.
Be sure everyone is clear on what the priority of the delegated task is, especially if the people you've delegated to have other usual tasks, and possibly other people that are setting their priorities or depending on them.
And when things do go wrong, don't think "enforce". Think "ask." Ask them about it (after you've calmed down from having had to scramble to do it yourself, and after putting any thoughts of what *you* think happened firmly out of your mind), in a non-judgmental, non-authoritarian, curious way.
For example, in the situation you describe, I might say something like:
*So, I appreciate that you turned the thing in on time, and that it had (something else I can remotely find to praise about it), but I was surprised that it didn't include (specific things that you had expected it to include). Was I not clear about that, or ...?*
Note that I'm leading with the assumption that the fault might have been mine. I will do this even if I am 99.999% sure that it was not, partly because I have learned that communications problems usually have fault on both sides, but mostly because it is the least accusatory framing I can provide, so it is least likely to provoke a defensive, self-justifying response, and most likely to elicit an open, productive response.
Hopefully, the response identifies what the other person thought the problem was, and the conversation can then proceed collaboratively to figure out how we can avoid a similar problem next time. Sometimes I will offer a solution (eg, "would it be helpful if I checked in with you halfway thru?") and sometimes (usually not the first time) I will assert a solution I want to try (eg, "OK, well, next time I would like to see your design/prelim draft so we can make sure we're on the same page earlier").
Communications problems are SO common. It is SO easy to think that everything made it out of your head and into your words when really only half of it did -- and this is true on both sides. It's often helpful to point that out (eg, "Oh I see, I said X and what I meant was X+Z, but I wasn't explicit about the Z part so you assumed I wanted X+Y") as it can become an area for continuously working towards improvement.
It's hard to move from "I asked you to do this thing and I ended up redoing it myself, dammit" to "OK, well *that* didn't work out how I expected. What do you think happened?" And it can take a few hours or a day or two to get there, especially at first. But I have found it well worth it: both in terms of fostering a collaborative, productive team, and in terms of lowering my stress level. :)
Good luck! | Work environments changed a lot since the apparition of emails and voice messaging, not so long ago. I remember a time when people had only the choice to answer the phone or not. More recently appeared "gaming" in work places, gaming like in video games, people choosing their avatar and playing it along the days, the weeks and even the months. Now a days, everybody want to manage and managing is seen by many as "making it do by others", blaming others in case of problems. My stereotyped answer is not very far from the truth. People game their job when they don't have the competence to do it: to take the eat and face difficulties. Gaming in work places is a true cancer. If a boss has to delegate to look competent, employees have to blame an other employee to look competent. Happily, is it just a phase we are going through. The law of profit is implacable. No company has the luxury of having gaming employees always focusing on blaming others than to do what they are legally obliged to do. Usually when an employee does not want to do a job he or she is paid for, the employer can fire him or her. Many public companies are stuck with that cancer because the budget comes from a government and seems to be eternal. My solution in my studies and in the work places I was in, was always to do my work alone if it was my responsibility to do so. I prefer to talk to my boss and establish an agreement with him or her on who does the job, when and at what salary. I assured the success of my studies like that in which there was a lot of team works to do. Frank discussions are avoided more and more. Face to face discussions too. When will the bell of profit ring to bring back people in reality? A work place it not a gaming lounge and success is not always blaming others to get the promotion. |
116,322 | Which is correct? And is there a difference?
>
> 1. He became blind when he was at the age of 50 years.
> 2. He became blind at the age 50.
> 3. when he was at the age of 50 years, he became blind.
>
>
> | 2017/01/20 | [
"https://ell.stackexchange.com/questions/116322",
"https://ell.stackexchange.com",
"https://ell.stackexchange.com/users/46429/"
] | They are all technically correct, and your meaning would be easily understood by a native speaker, but each sounds a little odd, here's a breakdown:
>
> He became blind when he was at the age of 50 years.
>
>
>
This isn't ungrammatical, but sounds a little awkward. It sounds fine without "years" at the end. We understand that years is implied since you're talking about age already.
>
> He became blind at the age 50.
>
>
>
This is another example of having more words than is necessary. It would sound more natural as "He became blind at age 50". The phrase "At age X, something happened" is a very common construction.
>
> when he was at the age of 50 years, he became blind.
>
>
>
Again, with this I'd just take out "years", and then it sounds fine.
I can't give a deep answer as to why that is, but these are just stock phrases/idioms that take on a life of their own.
---
Like the other answer mentions, if I wanted to make them sound even more natural, I would probably say something like
>
> He went blind when he was 50 years old
>
>
>
or
>
> He went blind when he was 50
>
>
> | There is no difference in meaning. The one I prefer is #2 because it says the same as the others in less words. However, the word "the" was unnecessary and should have been left out. A native speaker would not have included it.
2a) He became blind at age 50.
Idiomatically, the most common way people refer to age is "50 years old". So most often it would be expressed as:
2b) He became blind when he was 50 years old.
That said, I still prefer #2a due to its brevity. |
61,593,044 | I´m new to Python and I´m having a problem. I have 2 lists containing the names of the columns of a dataset: one has all the columns names (columnas = total.columns.values.tolist()); and the other one has a subset of them ( in the form of "c = [a,b,c,d,c,e,...]".
I would like to know how could I check if each element in "c" is contained in the longer list "columnas". The result i have been trying to get is as it follows ( this is just an example):
a: True
b: True
c: False
...
Looking forward to your answers, Santiago | 2020/05/04 | [
"https://Stackoverflow.com/questions/61593044",
"https://Stackoverflow.com",
"https://Stackoverflow.com/users/13400164/"
] | Running your NodeJS as a Docker container in Elastic Beanstalk will definitely give you more control over your application.
However, it depends how much time you want to invest. Their maybe slightly more time in deploying with Docker, especially if you haven't used it before. | >
> In which situations is it more recomendable to use docker over a
> normal nodejs service? (Giving the fact that I will use Elastic
> beanstalk)
>
>
>
First, if you really interested to run docker container in AWS, then [ECS](https://aws.amazon.com/ecs/) is what you need to run your application, lot of reason to run docker in ECS over elastic beanstalk
* Serverless ([faragate](https://aws.amazon.com/fargate/))
* Scaling
* Container management
* Ci/CD with code deploy etc
>
> Amazon Elastic Container Service (Amazon ECS) is a fully managed container orchestration service. Customers such as Duolingo, Samsung, GE, and Cook Pad use ECS to run their most sensitive and mission-critical applications because of its security, reliability, and scalability.
>
>
>
[AWS ECS getting-started](https://aws.amazon.com/ecs/getting-started/)
docker is recommended if you manage multiple environments in short as its not simple question to answer but better to go with Docker as this what future deman, if you just want to want to run dev like environment then elastic beanstalk is fine. |
8,786 | Here is a question that has been bothering me for a while. Do right-handed fighter pilots use their right hand to hold the control stick? **And do left-handed fighter pilots use their left hand?**
Or is it the other way around? Or do they maybe use both hands a lot of the time? It also brings up the question as to what the other hand is expected to do and which side of the cockpit the most common control buttons are on.
My guess is that since most people are right handed, they use their right hand. There's also triggers on the yoke so it seems all the more likely that the right hand is used for right-handers.
I'm asking because you look at **video games and their controllers**. They always use the **left joystick** for moving the character. In the case of flight simulators, the **left joystick** is used as the 'stick' or yoke. So you're pretty much left with no choice but to use your left thumb. Not saying this is awkward for video games, however, on those big joysticks for PC games, I remember I always used my right hand.
Also, let's ignore civil commercial piloting because those seem to usually use steering wheel type controls, not a traditional stick. Please let me know if you're a fighter pilot when you answer, because the triggers on the yoke have an effect on which hand you're most comfortable with. | 2014/09/27 | [
"https://aviation.stackexchange.com/questions/8786",
"https://aviation.stackexchange.com",
"https://aviation.stackexchange.com/users/3674/"
] | Most fighter pilots, regardless of their handedness, use their right hand to fly the stick, and their left hand to move the throttle(s)/PCL (Power Control Lever). This is just how most fighter cockpits are set up, with the power on the left side.

The sticks are also not really usable for a left hander because a few of the buttons would be inaccessible with a left hand on the stick. In some cases (like the F-16), the cockpit uses a *sidestick* layout, with the stick on the edge of the cockpit, rather than in between the pilot's legs.

So no, **it would not really be possible for left-handed pilots to fly with their left hand on the stick for long periods of time** (I will note, that if you need to select something on the right side, most will hold the stick lightly in their left hand for a brief second, actuate the item with their right hand, and then switch back) unless the entire cockpit were redesigned, which is just not worth it. | I am an ex-military pilot and retired airline pilot who is still an active pilot in general aviation. The simple answer is that single seat and tandem seat cockpits are set up with the throttle and trim on the left, so that the stick has to be handled with the right hand.
With a few exceptions side by side cockpits have wheels and the throttle and trim are between the seats so that the pilot in the left seat, usually the pilot in command, uses his left hand on the wheel and the other pilot uses his right hand on the wheel.
I never have trouble switching back and forth, but some people do. |
8,786 | Here is a question that has been bothering me for a while. Do right-handed fighter pilots use their right hand to hold the control stick? **And do left-handed fighter pilots use their left hand?**
Or is it the other way around? Or do they maybe use both hands a lot of the time? It also brings up the question as to what the other hand is expected to do and which side of the cockpit the most common control buttons are on.
My guess is that since most people are right handed, they use their right hand. There's also triggers on the yoke so it seems all the more likely that the right hand is used for right-handers.
I'm asking because you look at **video games and their controllers**. They always use the **left joystick** for moving the character. In the case of flight simulators, the **left joystick** is used as the 'stick' or yoke. So you're pretty much left with no choice but to use your left thumb. Not saying this is awkward for video games, however, on those big joysticks for PC games, I remember I always used my right hand.
Also, let's ignore civil commercial piloting because those seem to usually use steering wheel type controls, not a traditional stick. Please let me know if you're a fighter pilot when you answer, because the triggers on the yoke have an effect on which hand you're most comfortable with. | 2014/09/27 | [
"https://aviation.stackexchange.com/questions/8786",
"https://aviation.stackexchange.com",
"https://aviation.stackexchange.com/users/3674/"
] | Most fighter pilots, regardless of their handedness, use their right hand to fly the stick, and their left hand to move the throttle(s)/PCL (Power Control Lever). This is just how most fighter cockpits are set up, with the power on the left side.

The sticks are also not really usable for a left hander because a few of the buttons would be inaccessible with a left hand on the stick. In some cases (like the F-16), the cockpit uses a *sidestick* layout, with the stick on the edge of the cockpit, rather than in between the pilot's legs.

So no, **it would not really be possible for left-handed pilots to fly with their left hand on the stick for long periods of time** (I will note, that if you need to select something on the right side, most will hold the stick lightly in their left hand for a brief second, actuate the item with their right hand, and then switch back) unless the entire cockpit were redesigned, which is just not worth it. | Its not just fighter planes that have the stick in the right and power in the left. That's the way tandem (front-and-back seating) aircraft are set up in general. You can see the throttle on the left-hand wall in this Citabria:
[](https://i.stack.imgur.com/EzuTi.jpg)
And gliders and helicopters are also set up with "the stick" in the right hand and "power" in the left.
Even though a glider doesn't have an engine, most of them have some kind of airbrakes, which are deployed just as if it was a throttle. Pushing the lever forward with the left hand decreases drag and pulling backwards increases drag. This isn't the same as thrust, but to a power pilot, it feels fairly natural to push forward to go faster and pull backwards to go slower. The speed brake handle in this glider is the blue handle on the left.
[](https://i.stack.imgur.com/Sd0cF.jpg)
In a helicopter, the right hand (no matter which side the pilot sits on) is for the cyclic, which (for the post part) controls pitch and roll, and the left hand controls the collective and throttle, which together work to add and remove power from the aircraft. This also feels fairly natural to pilots who are used to stick in the right, throttle in the left. The big difference is that the collective is an "up/down" control like a [Johnson bar](https://en.wikipedia.org/wiki/Johnson_bar_(vehicle)), not a "forward/back" control, and you put it down to reduce power and up to increase power. Furthermore, the throttle, when manually controlled, is a twist grip on the collective, which operates more like a motorcycle throttle. You can see the heli controls in this simulator.
[](https://i.stack.imgur.com/2uJDg.jpg) |
8,786 | Here is a question that has been bothering me for a while. Do right-handed fighter pilots use their right hand to hold the control stick? **And do left-handed fighter pilots use their left hand?**
Or is it the other way around? Or do they maybe use both hands a lot of the time? It also brings up the question as to what the other hand is expected to do and which side of the cockpit the most common control buttons are on.
My guess is that since most people are right handed, they use their right hand. There's also triggers on the yoke so it seems all the more likely that the right hand is used for right-handers.
I'm asking because you look at **video games and their controllers**. They always use the **left joystick** for moving the character. In the case of flight simulators, the **left joystick** is used as the 'stick' or yoke. So you're pretty much left with no choice but to use your left thumb. Not saying this is awkward for video games, however, on those big joysticks for PC games, I remember I always used my right hand.
Also, let's ignore civil commercial piloting because those seem to usually use steering wheel type controls, not a traditional stick. Please let me know if you're a fighter pilot when you answer, because the triggers on the yoke have an effect on which hand you're most comfortable with. | 2014/09/27 | [
"https://aviation.stackexchange.com/questions/8786",
"https://aviation.stackexchange.com",
"https://aviation.stackexchange.com/users/3674/"
] | I am an ex-military pilot and retired airline pilot who is still an active pilot in general aviation. The simple answer is that single seat and tandem seat cockpits are set up with the throttle and trim on the left, so that the stick has to be handled with the right hand.
With a few exceptions side by side cockpits have wheels and the throttle and trim are between the seats so that the pilot in the left seat, usually the pilot in command, uses his left hand on the wheel and the other pilot uses his right hand on the wheel.
I never have trouble switching back and forth, but some people do. | Its not just fighter planes that have the stick in the right and power in the left. That's the way tandem (front-and-back seating) aircraft are set up in general. You can see the throttle on the left-hand wall in this Citabria:
[](https://i.stack.imgur.com/EzuTi.jpg)
And gliders and helicopters are also set up with "the stick" in the right hand and "power" in the left.
Even though a glider doesn't have an engine, most of them have some kind of airbrakes, which are deployed just as if it was a throttle. Pushing the lever forward with the left hand decreases drag and pulling backwards increases drag. This isn't the same as thrust, but to a power pilot, it feels fairly natural to push forward to go faster and pull backwards to go slower. The speed brake handle in this glider is the blue handle on the left.
[](https://i.stack.imgur.com/Sd0cF.jpg)
In a helicopter, the right hand (no matter which side the pilot sits on) is for the cyclic, which (for the post part) controls pitch and roll, and the left hand controls the collective and throttle, which together work to add and remove power from the aircraft. This also feels fairly natural to pilots who are used to stick in the right, throttle in the left. The big difference is that the collective is an "up/down" control like a [Johnson bar](https://en.wikipedia.org/wiki/Johnson_bar_(vehicle)), not a "forward/back" control, and you put it down to reduce power and up to increase power. Furthermore, the throttle, when manually controlled, is a twist grip on the collective, which operates more like a motorcycle throttle. You can see the heli controls in this simulator.
[](https://i.stack.imgur.com/2uJDg.jpg) |
16,778 | I am looking for a visual tail tool that can monitor several local or remote log files.
Optional features that interest me: color highlight based on log error level, coloring for special words, filtering of messages and/or notifications on new activity. | 2011/06/30 | [
"https://apple.stackexchange.com/questions/16778",
"https://apple.stackexchange.com",
"https://apple.stackexchange.com/users/1916/"
] | I found a tool that can do this [GeekTool](http://projects.tynsoe.org/en/geektool/), it even has a version that works on Lion (see the forum).
It can be used to do just simple tails, without filtering or other stuff, so maybe someone has a better alternative. | [PostRemoteLog](http://www.oriontransfer.co.nz/projects/admin-toolbox/post-remote-log/index) (free)
---------------------------------------------------------------------------------------------------
PostRemoteLog has Growl notifications support and it is free. |
16,778 | I am looking for a visual tail tool that can monitor several local or remote log files.
Optional features that interest me: color highlight based on log error level, coloring for special words, filtering of messages and/or notifications on new activity. | 2011/06/30 | [
"https://apple.stackexchange.com/questions/16778",
"https://apple.stackexchange.com",
"https://apple.stackexchange.com/users/1916/"
] | I found a tool that can do this [GeekTool](http://projects.tynsoe.org/en/geektool/), it even has a version that works on Lion (see the forum).
It can be used to do just simple tails, without filtering or other stuff, so maybe someone has a better alternative. | Might I suggest the [LogTail macOS app](https://itunes.apple.com/us/app/logtail/id1073404370?ls=1&mt=12) - it checks all the requirements you mentioned (except the notifications part). It has SSH based remote log viewing functionality and can tail the remote log file (configurable polling interval). You can setup multiple SSH servers and browse them to select the log file to view.
It supports filtering and/or highlighting search patterns, searching the remote log file incrementally, and lets you adjust the foreground, background colors and font.
Also, it doesn't load the entire remote log file at once but intelligently fetches content based on your scrolling actions, so it is quite efficient.
The app [site](http://www.logtailapp.com/) has more information. Hope it helps!
PS: I'm the app developer :) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.