qid
int64
1
74.7M
question
stringlengths
12
33.8k
date
stringlengths
10
10
metadata
list
response_j
stringlengths
0
115k
response_k
stringlengths
2
98.3k
1,766,842
i am using gwt to build my web site. i would like to create a dropdown/listbox that contains no just text but also images, meaning that in the drop down there will be a what ever widget that ill create. please advise jaimon
2009/11/19
[ "https://Stackoverflow.com/questions/1766842", "https://Stackoverflow.com", "https://Stackoverflow.com/users/162345/" ]
You won't be able to do this with a ListBox, because it just creates an HTML < select> element. You can use a [MenuBar](http://google-web-toolkit.googlecode.com/svn/javadoc/1.5/com/google/gwt/user/client/ui/MenuBar.html) that has one menu with [MenuItem](http://google-web-toolkit.googlecode.com/svn/javadoc/1.5/com/google/gwt/user/client/ui/MenuItem.html)s in it to simulate a dropdown with complex widgets inside it. You will also be able to style the dropdown rather than rely on browser-styled form elements.
Take a look at the Combobox or Suggestion box in [Advanced GWT Components](http://advanced-gwt.sourceforge.net/text-and-button.html).
1,766,842
i am using gwt to build my web site. i would like to create a dropdown/listbox that contains no just text but also images, meaning that in the drop down there will be a what ever widget that ill create. please advise jaimon
2009/11/19
[ "https://Stackoverflow.com/questions/1766842", "https://Stackoverflow.com", "https://Stackoverflow.com/users/162345/" ]
You won't be able to do this with a ListBox, because it just creates an HTML < select> element. You can use a [MenuBar](http://google-web-toolkit.googlecode.com/svn/javadoc/1.5/com/google/gwt/user/client/ui/MenuBar.html) that has one menu with [MenuItem](http://google-web-toolkit.googlecode.com/svn/javadoc/1.5/com/google/gwt/user/client/ui/MenuItem.html)s in it to simulate a dropdown with complex widgets inside it. You will also be able to style the dropdown rather than rely on browser-styled form elements.
Another widget is the DropDownListBox in the GWT incubator. I have not used it, but the stated intent is to provide a rich, stylable ListBox. You can pass raw HTML to the addItem() method. [DropDownListBox](http://code.google.com/p/google-web-toolkit-incubator/wiki/DropDownListBox)
1,766,842
i am using gwt to build my web site. i would like to create a dropdown/listbox that contains no just text but also images, meaning that in the drop down there will be a what ever widget that ill create. please advise jaimon
2009/11/19
[ "https://Stackoverflow.com/questions/1766842", "https://Stackoverflow.com", "https://Stackoverflow.com/users/162345/" ]
You won't be able to do this with a ListBox, because it just creates an HTML < select> element. You can use a [MenuBar](http://google-web-toolkit.googlecode.com/svn/javadoc/1.5/com/google/gwt/user/client/ui/MenuBar.html) that has one menu with [MenuItem](http://google-web-toolkit.googlecode.com/svn/javadoc/1.5/com/google/gwt/user/client/ui/MenuItem.html)s in it to simulate a dropdown with complex widgets inside it. You will also be able to style the dropdown rather than rely on browser-styled form elements.
it is possible to use Tree inside ScrollPanel, without using nested items Tree allows TreeItem to be a Widget
1,766,842
i am using gwt to build my web site. i would like to create a dropdown/listbox that contains no just text but also images, meaning that in the drop down there will be a what ever widget that ill create. please advise jaimon
2009/11/19
[ "https://Stackoverflow.com/questions/1766842", "https://Stackoverflow.com", "https://Stackoverflow.com/users/162345/" ]
Take a look at the Combobox or Suggestion box in [Advanced GWT Components](http://advanced-gwt.sourceforge.net/text-and-button.html).
Another widget is the DropDownListBox in the GWT incubator. I have not used it, but the stated intent is to provide a rich, stylable ListBox. You can pass raw HTML to the addItem() method. [DropDownListBox](http://code.google.com/p/google-web-toolkit-incubator/wiki/DropDownListBox)
1,766,842
i am using gwt to build my web site. i would like to create a dropdown/listbox that contains no just text but also images, meaning that in the drop down there will be a what ever widget that ill create. please advise jaimon
2009/11/19
[ "https://Stackoverflow.com/questions/1766842", "https://Stackoverflow.com", "https://Stackoverflow.com/users/162345/" ]
Take a look at the Combobox or Suggestion box in [Advanced GWT Components](http://advanced-gwt.sourceforge.net/text-and-button.html).
it is possible to use Tree inside ScrollPanel, without using nested items Tree allows TreeItem to be a Widget
64,799
A lot of software installation dialogs on Windows throw up a query to the installing user asking if this software should be installed for **all users** or the **current user**. Why do they do this? Why not just install for all users? What is the real technical difference between the two options? I would like to know the difference in aspects like the registry, file execution permissions, files in the file system, start menu shortcuts and such.
2009/11/03
[ "https://superuser.com/questions/64799", "https://superuser.com", "https://superuser.com/users/1062/" ]
Take a look at the following web site, it goes into pretty good detail on the differences of *all users* and *current user*: [Installation types](http://www.tarma.com/support/tin5/using/installtypes.htm) **Edit:** This is for a particular type of installation setup software, but the information here is valid for most installers with variations in their options prior to the compile stage.
I think the only difference is whether it'll put a shortcut in the all user start menu folder, or in the current user's start menu folder.
64,799
A lot of software installation dialogs on Windows throw up a query to the installing user asking if this software should be installed for **all users** or the **current user**. Why do they do this? Why not just install for all users? What is the real technical difference between the two options? I would like to know the difference in aspects like the registry, file execution permissions, files in the file system, start menu shortcuts and such.
2009/11/03
[ "https://superuser.com/questions/64799", "https://superuser.com", "https://superuser.com/users/1062/" ]
In a nutshell... Install For All Users would be used when you want the program to be "active" for anyone who logs on to the computer with their personal account (if there is more than one login). A good example would be an antivirus program, that you would want to be available while any user is logged in. Install for Current User is normally used under an Administrator account for something that handles disk operations and other admin-type functions, such as Acronis True Image, a keylogger (to track what non-admin users are doing while logged on), and other disk-related or sensitive software.
Take a look at the following web site, it goes into pretty good detail on the differences of *all users* and *current user*: [Installation types](http://www.tarma.com/support/tin5/using/installtypes.htm) **Edit:** This is for a particular type of installation setup software, but the information here is valid for most installers with variations in their options prior to the compile stage.
64,799
A lot of software installation dialogs on Windows throw up a query to the installing user asking if this software should be installed for **all users** or the **current user**. Why do they do this? Why not just install for all users? What is the real technical difference between the two options? I would like to know the difference in aspects like the registry, file execution permissions, files in the file system, start menu shortcuts and such.
2009/11/03
[ "https://superuser.com/questions/64799", "https://superuser.com", "https://superuser.com/users/1062/" ]
Take a look at the following web site, it goes into pretty good detail on the differences of *all users* and *current user*: [Installation types](http://www.tarma.com/support/tin5/using/installtypes.htm) **Edit:** This is for a particular type of installation setup software, but the information here is valid for most installers with variations in their options prior to the compile stage.
I think that there are two ways to answer this question: For a system admin ------------------ * You've got applications that you don't want anyone to use other than yourself--**current user, admin**--, * you've got bs/bloatware apps that you don't want launching in admin mode but somehow monetize things for your company--**current user, guest/non-admin**--, * you've got applications that you're going to control with their built-in security measures, like AV (mentioned by NC Phantom), which has internal password protection--**all users--**, and then * you've got applications that you're going to monitor--**any**. For an every-day user --------------------- * You've got applications you want everybody to be able to use because they're awesome--**all users**--, * you've got applications you want your kids to use but don't want your friends to suddenly think you're using (like Candy Crush)--**current user, guest/non-admin**--, and * you've got applications you don't want your kids to mess up or your wife to know you're using--**current user, admin**. For an advanced every-day user ------------------------------ Make an extra non-admin account for your friends, brother, etc., so they don't get on the guest account, start playing Candy Crush, and annoy the crap out of you.
64,799
A lot of software installation dialogs on Windows throw up a query to the installing user asking if this software should be installed for **all users** or the **current user**. Why do they do this? Why not just install for all users? What is the real technical difference between the two options? I would like to know the difference in aspects like the registry, file execution permissions, files in the file system, start menu shortcuts and such.
2009/11/03
[ "https://superuser.com/questions/64799", "https://superuser.com", "https://superuser.com/users/1062/" ]
In a nutshell... Install For All Users would be used when you want the program to be "active" for anyone who logs on to the computer with their personal account (if there is more than one login). A good example would be an antivirus program, that you would want to be available while any user is logged in. Install for Current User is normally used under an Administrator account for something that handles disk operations and other admin-type functions, such as Acronis True Image, a keylogger (to track what non-admin users are doing while logged on), and other disk-related or sensitive software.
I think the only difference is whether it'll put a shortcut in the all user start menu folder, or in the current user's start menu folder.
64,799
A lot of software installation dialogs on Windows throw up a query to the installing user asking if this software should be installed for **all users** or the **current user**. Why do they do this? Why not just install for all users? What is the real technical difference between the two options? I would like to know the difference in aspects like the registry, file execution permissions, files in the file system, start menu shortcuts and such.
2009/11/03
[ "https://superuser.com/questions/64799", "https://superuser.com", "https://superuser.com/users/1062/" ]
I think that there are two ways to answer this question: For a system admin ------------------ * You've got applications that you don't want anyone to use other than yourself--**current user, admin**--, * you've got bs/bloatware apps that you don't want launching in admin mode but somehow monetize things for your company--**current user, guest/non-admin**--, * you've got applications that you're going to control with their built-in security measures, like AV (mentioned by NC Phantom), which has internal password protection--**all users--**, and then * you've got applications that you're going to monitor--**any**. For an every-day user --------------------- * You've got applications you want everybody to be able to use because they're awesome--**all users**--, * you've got applications you want your kids to use but don't want your friends to suddenly think you're using (like Candy Crush)--**current user, guest/non-admin**--, and * you've got applications you don't want your kids to mess up or your wife to know you're using--**current user, admin**. For an advanced every-day user ------------------------------ Make an extra non-admin account for your friends, brother, etc., so they don't get on the guest account, start playing Candy Crush, and annoy the crap out of you.
I think the only difference is whether it'll put a shortcut in the all user start menu folder, or in the current user's start menu folder.
64,799
A lot of software installation dialogs on Windows throw up a query to the installing user asking if this software should be installed for **all users** or the **current user**. Why do they do this? Why not just install for all users? What is the real technical difference between the two options? I would like to know the difference in aspects like the registry, file execution permissions, files in the file system, start menu shortcuts and such.
2009/11/03
[ "https://superuser.com/questions/64799", "https://superuser.com", "https://superuser.com/users/1062/" ]
In a nutshell... Install For All Users would be used when you want the program to be "active" for anyone who logs on to the computer with their personal account (if there is more than one login). A good example would be an antivirus program, that you would want to be available while any user is logged in. Install for Current User is normally used under an Administrator account for something that handles disk operations and other admin-type functions, such as Acronis True Image, a keylogger (to track what non-admin users are doing while logged on), and other disk-related or sensitive software.
I think that there are two ways to answer this question: For a system admin ------------------ * You've got applications that you don't want anyone to use other than yourself--**current user, admin**--, * you've got bs/bloatware apps that you don't want launching in admin mode but somehow monetize things for your company--**current user, guest/non-admin**--, * you've got applications that you're going to control with their built-in security measures, like AV (mentioned by NC Phantom), which has internal password protection--**all users--**, and then * you've got applications that you're going to monitor--**any**. For an every-day user --------------------- * You've got applications you want everybody to be able to use because they're awesome--**all users**--, * you've got applications you want your kids to use but don't want your friends to suddenly think you're using (like Candy Crush)--**current user, guest/non-admin**--, and * you've got applications you don't want your kids to mess up or your wife to know you're using--**current user, admin**. For an advanced every-day user ------------------------------ Make an extra non-admin account for your friends, brother, etc., so they don't get on the guest account, start playing Candy Crush, and annoy the crap out of you.
2,169
I marveled at the two flight videos today on YouTube by Perseverance helicopter flights during Ingenuity mission. Got me thinking. Why aren’t the helicopter blades wider? I would like to think that in order to compensate for Mars’ thinner air. Doesn’t increasing the area of wing surfaces equal bigger lift? [Video 1](https://m.youtube.com/watch?time_continue=15&v=40FkAA62uNg), [Video 2](https://m.youtube.com/watch?v=qpqhYEkudvw)
2021/11/20
[ "https://drones.stackexchange.com/questions/2169", "https://drones.stackexchange.com", "https://drones.stackexchange.com/users/3741/" ]
Hi mate the design of an ESC with a power limiter is not an easy task. [![enter image description here](https://i.stack.imgur.com/krbAG.png)](https://i.stack.imgur.com/krbAG.png) A purchased ESC will probably have a means of limiting torque or current, but not power. Battery current is probably the best indication of total power delivered by the battery. However a given current level will result in less power as the battery voltage declines. Total battery power is power used by the propellor plus motor losses plus ESC losses. **Answer 1:** The pragmatic approach: You could test a motor-ESC-propellor combination at various speeds then limit the speed to whatever results in 700 W use, you may find various simulators online, like this one: <https://rcplanes.online/calc_motor.htm> . [![![enter image description here](https://i.stack.imgur.com/4d73l.png)](https://i.stack.imgur.com/4d73l.png) See the simulation for a 700 W max system above. **Answer 2:** The electronic engeneering approach: since the instantaneous electrical power is given by the instant voltage\*the instant current, we should measure both and limit the output using a custom designed limiter: The result of the battery power estimate or calculation could be used to reduce the speed command when the power exceeds a set limit (in our case 700 W). The system would essentially prevent the propellor speed from exceeding the speed that results in the set power limit whatever that speed happens to be under the prevailing conditions. Moreover there is a similar discussion here: <https://electronics.stackexchange.com/questions/594444/how-to-do-a-power-limiter-for-brushless-motor> Happy to go in more depth if you may need it.
This is done by choosing the correct battery and propeller combination--that's it. Choose a battery. Fully charge it. Then, start testing propellers with a power meter in series with your battery. Continually reduce the diameter or pitch or both of the propeller until the power is below 700W at full throttle. Done.
41,533
AssalamuAlaykum O-rahmatullah O-barokatuh! When some one is praying can we cross? Give me some proofs of the hadith, JazacAllah-khair! Assalamu'Alaykum O Rahmatullah O Barokatuh!
2017/07/21
[ "https://islam.stackexchange.com/questions/41533", "https://islam.stackexchange.com", "https://islam.stackexchange.com/users/23527/" ]
The narration below indicates that we are commanded to pray behind a Barrier/Sutrah: > > If the one who is praying has set up a sutrah (object to serve as a > screen). In this case it is permissible to pass beyond the sutrah, > because the Prophet (peace and blessings of Allaah be upon him) said: > “If any one of you prays, let him face towards something. If he cannot > find anything, then let him set up a stick. If he cannot do that, then > let him draw a line, then it will not matter if anyone passes in front > of him.” > > > Not quite sure if prayer is interrupted by any one passing infront or is it only those mentioned below: > > The hadeeth of Abu Hurayrah (may Allah be pleased with him) who said: > The Messenger of Allah (blessings and peace of Allah be upon him) > said: “Prayer is interrupted by a woman, a donkey and a dog, but > something like the back of a saddle protects against that.” Narrated > by Muslim (511). > > > However it does seem to be sinful to pass in front of someone praying anyways whether it was one of the above or not, therefore it is better to avoid doing so: > > Prophet (peace and blessings of Allaah be upon him) said: “If the one > who passes in front of a person who is praying knew what (a burden of > sin) he bears, it would be better for him to stand for forty rather > than pass in front of him.” Abu’l-Nadar – one of the narrators – said: > I do not know whether he said forty days or months or years. Narrated > by al-Bukhaari, 510; Muslim, 507 – from Abu Juhaym (may Allaah be > pleased with him). > > > If one happens to be placing a barrier while another tries to pass him then he is to prevent him from passing through: > > Indeed, al-Bukhaari (487) and Muslim (505) narrated that Abu Sa‘eed > al-Khudri (may Allah be pleased with him) I heard the Messenger of > Allah (blessings and peace of Allah be upon him) say: “If one of you > prays facing towards something that is screening him from the people, > and someone wants to pass (directly) in front of him, let him push him > away, and if he insists then let him fight him, for he is nothing but > a devil.” > > > However there happens to be a [scholarly opinion](https://islamqa.info/en/26182) that if the distance is greater than that which is needed to prostrate then one does not have to prevent people from passing. (I have not investigated this in detail)
Default rule: If there's a sutra (barrier like a pole of hands height) then any male can pass. In congregation prayer one can pass in front of anybody except the imam irrespective of barrier.
85,317
I'm an undergraduate electrical engineer. I have studied up to 80 percent of a masters in electrical engineering program and have two IEEE published papers. Is there such a thing as a PhD entrance exam that I can take to prove my ability to pass advanced electrical courses and get admitted directly into a PhD in a university in Europe?
2017/02/19
[ "https://academia.stackexchange.com/questions/85317", "https://academia.stackexchange.com", "https://academia.stackexchange.com/users/69643/" ]
Admission and funding in European PhD programs depends a lot on the university and the country's regulations. You should search for the programs you are interested in applying to and read their specific requirements.
In Germany, it is possible to start your PhD without a master [since 2000](http://www.kmk.org/fileadmin/veroeffentlichungen_beschluesse/2000/2000_04_14-Bachelor-Master-Promotion.pdf) (text only in German). You have to find an advisor and pass a qualifying examination, which differs by university. So, you first have to choose where you want to do your PhD.
85,317
I'm an undergraduate electrical engineer. I have studied up to 80 percent of a masters in electrical engineering program and have two IEEE published papers. Is there such a thing as a PhD entrance exam that I can take to prove my ability to pass advanced electrical courses and get admitted directly into a PhD in a university in Europe?
2017/02/19
[ "https://academia.stackexchange.com/questions/85317", "https://academia.stackexchange.com", "https://academia.stackexchange.com/users/69643/" ]
Admission and funding in European PhD programs depends a lot on the university and the country's regulations. You should search for the programs you are interested in applying to and read their specific requirements.
The Dutch (eg. Eindhoven) situation is that a PhD is normally funded (or done as an external PhD with a company). As such anyone will have to go through what amounts to a "job" interview. Within the system a masters is normally expected, but exceptions can be made, especially for candidates from countries where a masters would not be required to start a PhD. A PhD in The Netherlands will always have a full professor who will function as promotor (under whom's responsibility you would work). You may in addition have a daily supervisor with less experience. You will basically need to convince your interviewers that you can do the research. A common question would be for you to present your Msc thesis (or bsc thesis) as an example of your ability to write, the papers you published could be a good alternative, especially if you were the main (or only author). Be prepared to answer the question why you didn't finish the masters (in this case time can be in your benefit)
85,317
I'm an undergraduate electrical engineer. I have studied up to 80 percent of a masters in electrical engineering program and have two IEEE published papers. Is there such a thing as a PhD entrance exam that I can take to prove my ability to pass advanced electrical courses and get admitted directly into a PhD in a university in Europe?
2017/02/19
[ "https://academia.stackexchange.com/questions/85317", "https://academia.stackexchange.com", "https://academia.stackexchange.com/users/69643/" ]
Admission and funding in European PhD programs depends a lot on the university and the country's regulations. You should search for the programs you are interested in applying to and read their specific requirements.
In Spain it is in general necessary to have an "Oficial" Master's degree to enter a PhD program. The "official" qualifier means that some master's programs are formally recognized as conduits to doctoral programs, whereas others are not. In general a foreign degree would have to be recognized as equivalent to a Spanish degree, usually by the administration of the university offering the doctoral degree. Although there are lots of qualifications to this general statement, applicable in special cases, basically you need to have a master's degree already. [Here](https://www.ucm.es/requisitos-de-acceso-doctorado) and [here](http://www.ucm.es/informacion-adicional-para-alumnos-con-estudios-extranjeros-1) is information (in Spanish) about the requirements at the Universidad Complutense de Madrid, which is probably typical. For someone who does not have an official Spanish master's degree or a foreign degree recognized ("homologado") as such, there is a process to apply for admission, but the details probably depend on the particularities of the applicant. Admission and funding are generally separate matters. The summary with respect to funding is that there isn't much, what there is pays poorly by the standards of northern Europe or the US, and it's competitive to get what little there is.
85,317
I'm an undergraduate electrical engineer. I have studied up to 80 percent of a masters in electrical engineering program and have two IEEE published papers. Is there such a thing as a PhD entrance exam that I can take to prove my ability to pass advanced electrical courses and get admitted directly into a PhD in a university in Europe?
2017/02/19
[ "https://academia.stackexchange.com/questions/85317", "https://academia.stackexchange.com", "https://academia.stackexchange.com/users/69643/" ]
Admission and funding in European PhD programs depends a lot on the university and the country's regulations. You should search for the programs you are interested in applying to and read their specific requirements.
In France, they count it in years of study. My Bachelor in Engineering was 5 years, so that was "equivalent" to a MS in France. I had an MS as well, but I didn't even bother ($) translating it, because it wasn't necessary.
2,713,415
I am looking for any tool or good solution for handling spell check in the RichTextBox for Silverlight 4. Does anyone know of an existing solution or a good way to implement spell checking support for this control?
2010/04/26
[ "https://Stackoverflow.com/questions/2713415", "https://Stackoverflow.com", "https://Stackoverflow.com/users/22381/" ]
Capacity Planning is quite a detailed and extensive area. You'll need to accept an iterative model with a "Theoretical Baseline > Load Testing > Tuning & Optimizing" approach. **Theory** The first step is to decide on the Business requirements: how many users are expected for peak usage ? Remember - these numbers are usually inaccurate by some margin. As an example, let's assume that all the peak traffic (at worst case) will be over 4 hours of the day. So if the website expects 100K hits per day, we dont divide that over 24 hours, but over 4 hours instead. So my site now needs to support a peak traffic of 25K hits per hour. This breaks down to 417 hits per minute, or 7 hits per second. This is on the front end alone. Add to this the number of internal transactions such as database operations, any file i/o per user, any batch jobs which might run within the system, reports etc. Tally all these up to get the number of transactions per second, per minute etc that your system needs to support. This gets further complicated when you have requirements such as "Avg response time must be 3 seconds etc" which means you have to figure in network latency / firewall / proxy etc Finally - when it comes to choosing hardware, check out the published datasheets from each manufacturer such as Sun, HP, IBM, Windows etc. These detail the maximum transactions per second under test conditions. We usually accept 50% of those peaks under real conditions :) But ultimately the choice of the hardware is usually a commercial decision. Also you need to keep a minimum of 2 servers at each tier : web / app / even db for failover clustering. **Load testing** It's recommended to have a separate reference testing environment throughout the project lifecycle and post-launch so you can come back to run dedicated performance tests on the app. Scale this to be a smaller version of production, so if Prod has 4 servers and Ref has 1, then you test for 25% of the peak transactions etc. **Tuning & Optimizing** Too often, people throw some expensive hardware together and expect it all to work beautifully. You'll need to tune the hardware and OS for various parameters such as TCP timeouts etc - these are published by the software vendors, and these have to be done once the software are finalized. Set these tuning params on the Ref env, test and then decide which ones you need to carry over to Production.
Determine your expected load. Setup a machine and run some tests against it with a Load testing tool. How close are you if you only accomplished 10% of the peak load with some margin for error then you know you are going to need some load balancing. Design and implement a solution and test again. Make sure you solution is flexible enough to scale. Trial and error is pretty much the way to go. It really depends on the individual app and usage patterns.
2,713,415
I am looking for any tool or good solution for handling spell check in the RichTextBox for Silverlight 4. Does anyone know of an existing solution or a good way to implement spell checking support for this control?
2010/04/26
[ "https://Stackoverflow.com/questions/2713415", "https://Stackoverflow.com", "https://Stackoverflow.com/users/22381/" ]
Capacity Planning is quite a detailed and extensive area. You'll need to accept an iterative model with a "Theoretical Baseline > Load Testing > Tuning & Optimizing" approach. **Theory** The first step is to decide on the Business requirements: how many users are expected for peak usage ? Remember - these numbers are usually inaccurate by some margin. As an example, let's assume that all the peak traffic (at worst case) will be over 4 hours of the day. So if the website expects 100K hits per day, we dont divide that over 24 hours, but over 4 hours instead. So my site now needs to support a peak traffic of 25K hits per hour. This breaks down to 417 hits per minute, or 7 hits per second. This is on the front end alone. Add to this the number of internal transactions such as database operations, any file i/o per user, any batch jobs which might run within the system, reports etc. Tally all these up to get the number of transactions per second, per minute etc that your system needs to support. This gets further complicated when you have requirements such as "Avg response time must be 3 seconds etc" which means you have to figure in network latency / firewall / proxy etc Finally - when it comes to choosing hardware, check out the published datasheets from each manufacturer such as Sun, HP, IBM, Windows etc. These detail the maximum transactions per second under test conditions. We usually accept 50% of those peaks under real conditions :) But ultimately the choice of the hardware is usually a commercial decision. Also you need to keep a minimum of 2 servers at each tier : web / app / even db for failover clustering. **Load testing** It's recommended to have a separate reference testing environment throughout the project lifecycle and post-launch so you can come back to run dedicated performance tests on the app. Scale this to be a smaller version of production, so if Prod has 4 servers and Ref has 1, then you test for 25% of the peak transactions etc. **Tuning & Optimizing** Too often, people throw some expensive hardware together and expect it all to work beautifully. You'll need to tune the hardware and OS for various parameters such as TCP timeouts etc - these are published by the software vendors, and these have to be done once the software are finalized. Set these tuning params on the Ref env, test and then decide which ones you need to carry over to Production.
Test your app with a sample load and measure performance and load metrics. DB queries, disk hits, latency, whatever. Then get an estimate of the expected load when deployed (go ask the domain expert) (you have to consider average load AND spikes). Multiply the two and add some just to be sure. That's a *really* rough idea of what you need. Then implement it, keeping in mind you usually won't scale linearly and you probably won't get the expected load ;)
241,340
Down here in Atlanta. Installed an 18' LVL to join two living rooms in my 1960s brick ranch. Used joist hangers on most of the 2"x8" ceiling joists, but there is a small number of joists from the previous doorway that spanned roughly 5'. The ceiling joists in this section were notched and rested on a ledger. I've reached out to the engineer who provided my original recommendation letter for permitting, but haven't heard back for some time. I also reached out the County inspection supervisor and I'm awaiting his feedback/recommendation. I'm wondering if I can glue and screw a block shim in the ceiling joist notched from the ledger then hang the modified joist in a joist hanger fastened to the new LVL, or if I should sister a new joist at the end of the notched joist and fasten the new sister joist end to the LVL with a hanger. The existing ceiling joists are ~12' on both sides. I'm also wondering what is the appropriate length of the new sistered joists, I've read any where from 3' to 2/3 the length of the original joist. [![enter image description here](https://i.stack.imgur.com/qcCCO.jpg)](https://i.stack.imgur.com/qcCCO.jpg)
2021/12/19
[ "https://diy.stackexchange.com/questions/241340", "https://diy.stackexchange.com", "https://diy.stackexchange.com/users/146158/" ]
The Code limits notching at end bearing locations to not exceed 1/4 the depth of the joists. (See IBC 2308.8.2) If the notch does not exceed this dimension, you can merely install a joist hanger in the notch fastening it to the joist and then fasten it to the LVL.
The joist notch affects the bearing strength. So I suggest building back as shown below. You shall make sure there are no defects in the makeup block, then use wood adhesive to glue it to the joist. Install the metal hanger once the glue has dried and the block is firmly in place. [![enter image description here](https://i.stack.imgur.com/i9ZSx.png)](https://i.stack.imgur.com/i9ZSx.png) Note: There is a chance you won't need to do anything. However, you need to identify the hanger beside the notch (marked ?), whether it is adequate structurally. **ADD:** [![enter image description here](https://i.stack.imgur.com/dVcL2.png)](https://i.stack.imgur.com/dVcL2.png) The buildup will allow the joist to deliver the designed load to the beam with less stress in the joist at the connection.
241,340
Down here in Atlanta. Installed an 18' LVL to join two living rooms in my 1960s brick ranch. Used joist hangers on most of the 2"x8" ceiling joists, but there is a small number of joists from the previous doorway that spanned roughly 5'. The ceiling joists in this section were notched and rested on a ledger. I've reached out to the engineer who provided my original recommendation letter for permitting, but haven't heard back for some time. I also reached out the County inspection supervisor and I'm awaiting his feedback/recommendation. I'm wondering if I can glue and screw a block shim in the ceiling joist notched from the ledger then hang the modified joist in a joist hanger fastened to the new LVL, or if I should sister a new joist at the end of the notched joist and fasten the new sister joist end to the LVL with a hanger. The existing ceiling joists are ~12' on both sides. I'm also wondering what is the appropriate length of the new sistered joists, I've read any where from 3' to 2/3 the length of the original joist. [![enter image description here](https://i.stack.imgur.com/qcCCO.jpg)](https://i.stack.imgur.com/qcCCO.jpg)
2021/12/19
[ "https://diy.stackexchange.com/questions/241340", "https://diy.stackexchange.com", "https://diy.stackexchange.com/users/146158/" ]
The Code limits notching at end bearing locations to not exceed 1/4 the depth of the joists. (See IBC 2308.8.2) If the notch does not exceed this dimension, you can merely install a joist hanger in the notch fastening it to the joist and then fasten it to the LVL.
Just take an LVL and rip it down to the height you need to fill that void. Secure that ripped LVL to the beam in place, along it's entire length. This creates a ledger for those floor joist to rest on. You will no longer need any joist hanger brackets. The shear loads have been addressed. If you need more room to install the LVL ripper then increase the notch to 1.75" and the LVL will drop right in.
119,825
I have a totally default installation using the Luma theme. When you go to the cart page there is no checkout button. Only a link for "Check out with multiple addresses". I have turned off single page checkout but I don't see why that would make a difference. Any ideas? [![Checkout](https://i.stack.imgur.com/2O1dZ.jpg)](https://i.stack.imgur.com/2O1dZ.jpg)
2016/06/07
[ "https://magento.stackexchange.com/questions/119825", "https://magento.stackexchange.com", "https://magento.stackexchange.com/users/37109/" ]
Just had the same issue, was a combination of these 2 things: 1. The default Tax Destination country (under Sales -> Tax) was set to USA while that was not one of the allowed countries under General -> General 2. Disabled one-page checkout After making the default tax country the same as my default country (under general -> general) and enabling one-page checkout the "Proceed to Checkout" button appeared.
Do you have any errors/notices/warnings at the top of your cart page? Or beside the product name in the cart items list? Looks like you have not enough inventory for the added products, or required custom option is not set someway, so Magento does not allow you to proceed with the checkout.
42,461,569
After installing and starting VNC server on *Compute Engine*'s **Ubuntu16 instance** VNC session cannot be made. I would like to open **Network**'s Firewall ports to see if it would make a difference. How to configure Firewall rule? [![enter image description here](https://i.stack.imgur.com/4TW9m.png)](https://i.stack.imgur.com/4TW9m.png)
2017/02/25
[ "https://Stackoverflow.com/questions/42461569", "https://Stackoverflow.com", "https://Stackoverflow.com/users/1107049/" ]
first create your firewall rule for tcp or udp, then set tag in firewall rule. after creating firewall rule note down tag, go to VM instances click on edit add tag name that you created in firewall rule. it will open that port. [![enter image description here](https://i.stack.imgur.com/xa6Fo.png)](https://i.stack.imgur.com/xa6Fo.png)
[!VM Edit for tag[1](https://i.stack.imgur.com/v1qVV.jpg)](https://i.stack.imgur.com/v1qVV.jpg) This screenshot to edit VM instances and add your tag that you created in firewall rule.
43,315
Using [PyObjC](http://pyobjc.sourceforge.net/), you can use Python to write Cocoa applications for OS X. Can I write native iPhone apps using Python and if so, how?
2008/09/04
[ "https://Stackoverflow.com/questions/43315", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2183/" ]
The iPhone SDK agreement is also rather vague about whether you're even allowed to run scripting languages (outside of a WebView's Javascript). My reading is that it is OK - as long as none of the scripts you execute are downloaded from the network (so pre-installed and user-edited scripts seem to be OK). IANAL etc etc.
The only significant "external" language for iPhone development that I'm aware of with semi-significant support in terms of frameworks and compatibility is [MonoTouch](http://monotouch.net/), a C#/.NET environment for developing on the iPhone.
43,315
Using [PyObjC](http://pyobjc.sourceforge.net/), you can use Python to write Cocoa applications for OS X. Can I write native iPhone apps using Python and if so, how?
2008/09/04
[ "https://Stackoverflow.com/questions/43315", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2183/" ]
Not currently, currently the only languages available to access the iPhone SDK are C/C++, Objective C and Swift. There is no technical reason why this could not change in the future but I wouldn't hold your breath for this happening in the short term. That said, Objective-C and Swift really are not too scary... > > 2016 edit > ========= > > > Javascript with NativeScript framework is available to use now. > > >
**2019 Update:** While Python-iOS development is relatively immature and likely will prevent (afaik) your app from having native UI and functionality that could be achieved in an Apple-supported development language, Apple now seems to allow embedding Python interpreters in Native Swift/Obj-C apps. This supports importing Python libraries and running Python scripts (even with supplied command-line arguments) directly from your Native Swift/Obj-C code. My company is actually wrapping our infrastructure (originally written in Python) in a native iOS application! It works very well and communication between the parts can be easily achieved via a client-server model. Here is a nice library by Beeware with a cookiecutter template if you want to try and run Python scripts in your iOS app: <https://github.com/beeware/Python-Apple-support/tree/3.6>.
43,315
Using [PyObjC](http://pyobjc.sourceforge.net/), you can use Python to write Cocoa applications for OS X. Can I write native iPhone apps using Python and if so, how?
2008/09/04
[ "https://Stackoverflow.com/questions/43315", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2183/" ]
It seems this is now something developers are allowed to do: the iOS Developer Agreement was changed yesterday and appears to have been ammended in a such a way as to make embedding a Python interpretter in your application legal: **SECTION 3.3.2 — INTERPRETERS** **Old:** > > 3.3.2 An Application may not itself install or launch other executable > code by any means, including without > limitation through the use of a > plug-in architecture, calling other > frameworks, other APIs or otherwise. > Unless otherwise approved by Apple in > writing, no interpreted code may be > downloaded or used in an Application > except for code that is interpreted > and run by Apple’s Documented APIs and > built-in interpreter(s). > Notwithstanding the foregoing, with > Apple’s prior written consent, an > Application may use embedded > interpreted code in a limited way if > such use is solely for providing minor > features or functionality that are > consistent with the intended and > advertised purpose of the Application. > > > **New:** > > 3.3.2 An Application may not download or install executable code. > Interpreted code may only be used in > an Application if all scripts, code > and interpreters are packaged in the > Application and not downloaded. The > only exception to the foregoing is > scripts and code downloaded and run by > Apple’s built-in WebKit framework. > > >
You can do this with PyObjC, with a jailbroken phone of course. But if you want to get it into the App Store, they will not allow it because it "interprets code." However, you may be able to use [Shed Skin](http://code.google.com/p/shedskin/), although I'm not aware of anyone doing this. I can't think of any good reason to do this though, as you lose dynamic typing, and might as well use ObjC.
43,315
Using [PyObjC](http://pyobjc.sourceforge.net/), you can use Python to write Cocoa applications for OS X. Can I write native iPhone apps using Python and if so, how?
2008/09/04
[ "https://Stackoverflow.com/questions/43315", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2183/" ]
Yes you can. You write your code in tinypy (which is restricted Python), then use tinypy to convert it to C++, and finally compile this with XCode into a native iPhone app. Phil Hassey has published a game called Elephants! using this approach. Here are more details, <http://www.philhassey.com/blog/2009/12/23/elephants-is-free-on-the-app-store/>
[Pythonista](http://omz-software.com/pythonista) has an Export to Xcode feature that allows you to export your Python scripts as Xcode projects that build standalone iOS apps. <https://github.com/ColdGrub1384/Pyto> is also worth looking into.
43,315
Using [PyObjC](http://pyobjc.sourceforge.net/), you can use Python to write Cocoa applications for OS X. Can I write native iPhone apps using Python and if so, how?
2008/09/04
[ "https://Stackoverflow.com/questions/43315", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2183/" ]
[BeeWare](https://pybee.org) is an open source framework for authoring native iOS & Android apps.
I think it was not possible earlier but I recently heard about PyMob, which seems interesting because the apps are written in Python and the final outputs are native source codes in various platforms (Obj-C for iOS, Java for Android etc). This is certainly quite unique. [This](http://pyzia.com/technology.html) webpage explains it in more detail. I haven't given it a shot yet, but will take a look soon.
43,315
Using [PyObjC](http://pyobjc.sourceforge.net/), you can use Python to write Cocoa applications for OS X. Can I write native iPhone apps using Python and if so, how?
2008/09/04
[ "https://Stackoverflow.com/questions/43315", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2183/" ]
[BeeWare](https://pybee.org) is an open source framework for authoring native iOS & Android apps.
Technically, as long as the interpreted code ISN'T downloaded (excluding JavaScript), the app may be approved. Rhomobiles "Rhodes" framework does just that, bundling mobile Ruby, a lightweight version of Rails, and your app for distribution via the app-store. Because both the interpreter and the interpreted code are packaged into the final application - Apple doesn't find it objectionable. <http://rhomobile.com/products/rhodes/> Even after the latest apple press release - rhodes apps (mobile ruby) are still viable on the app-store. I'd find it hard to believe that tinyPy or pyObjC wouldn't find a place if there is a willing developer community.
43,315
Using [PyObjC](http://pyobjc.sourceforge.net/), you can use Python to write Cocoa applications for OS X. Can I write native iPhone apps using Python and if so, how?
2008/09/04
[ "https://Stackoverflow.com/questions/43315", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2183/" ]
Yes you can. You write your code in tinypy (which is restricted Python), then use tinypy to convert it to C++, and finally compile this with XCode into a native iPhone app. Phil Hassey has published a game called Elephants! using this approach. Here are more details, <http://www.philhassey.com/blog/2009/12/23/elephants-is-free-on-the-app-store/>
An update to the iOS Developer Agreement means that you can use whatever you like, as long as you meet the developer guidelines. Section 3.3.1, which restricted what developers could use for iOS development, has been entirely removed. Source: <http://daringfireball.net/2010/09/app_store_guidelines>
43,315
Using [PyObjC](http://pyobjc.sourceforge.net/), you can use Python to write Cocoa applications for OS X. Can I write native iPhone apps using Python and if so, how?
2008/09/04
[ "https://Stackoverflow.com/questions/43315", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2183/" ]
It seems this is now something developers are allowed to do: the iOS Developer Agreement was changed yesterday and appears to have been ammended in a such a way as to make embedding a Python interpretter in your application legal: **SECTION 3.3.2 — INTERPRETERS** **Old:** > > 3.3.2 An Application may not itself install or launch other executable > code by any means, including without > limitation through the use of a > plug-in architecture, calling other > frameworks, other APIs or otherwise. > Unless otherwise approved by Apple in > writing, no interpreted code may be > downloaded or used in an Application > except for code that is interpreted > and run by Apple’s Documented APIs and > built-in interpreter(s). > Notwithstanding the foregoing, with > Apple’s prior written consent, an > Application may use embedded > interpreted code in a limited way if > such use is solely for providing minor > features or functionality that are > consistent with the intended and > advertised purpose of the Application. > > > **New:** > > 3.3.2 An Application may not download or install executable code. > Interpreted code may only be used in > an Application if all scripts, code > and interpreters are packaged in the > Application and not downloaded. The > only exception to the foregoing is > scripts and code downloaded and run by > Apple’s built-in WebKit framework. > > >
The only significant "external" language for iPhone development that I'm aware of with semi-significant support in terms of frameworks and compatibility is [MonoTouch](http://monotouch.net/), a C#/.NET environment for developing on the iPhone.
43,315
Using [PyObjC](http://pyobjc.sourceforge.net/), you can use Python to write Cocoa applications for OS X. Can I write native iPhone apps using Python and if so, how?
2008/09/04
[ "https://Stackoverflow.com/questions/43315", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2183/" ]
**2019 Update:** While Python-iOS development is relatively immature and likely will prevent (afaik) your app from having native UI and functionality that could be achieved in an Apple-supported development language, Apple now seems to allow embedding Python interpreters in Native Swift/Obj-C apps. This supports importing Python libraries and running Python scripts (even with supplied command-line arguments) directly from your Native Swift/Obj-C code. My company is actually wrapping our infrastructure (originally written in Python) in a native iOS application! It works very well and communication between the parts can be easily achieved via a client-server model. Here is a nice library by Beeware with a cookiecutter template if you want to try and run Python scripts in your iOS app: <https://github.com/beeware/Python-Apple-support/tree/3.6>.
The only significant "external" language for iPhone development that I'm aware of with semi-significant support in terms of frameworks and compatibility is [MonoTouch](http://monotouch.net/), a C#/.NET environment for developing on the iPhone.
43,315
Using [PyObjC](http://pyobjc.sourceforge.net/), you can use Python to write Cocoa applications for OS X. Can I write native iPhone apps using Python and if so, how?
2008/09/04
[ "https://Stackoverflow.com/questions/43315", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2183/" ]
It seems this is now something developers are allowed to do: the iOS Developer Agreement was changed yesterday and appears to have been ammended in a such a way as to make embedding a Python interpretter in your application legal: **SECTION 3.3.2 — INTERPRETERS** **Old:** > > 3.3.2 An Application may not itself install or launch other executable > code by any means, including without > limitation through the use of a > plug-in architecture, calling other > frameworks, other APIs or otherwise. > Unless otherwise approved by Apple in > writing, no interpreted code may be > downloaded or used in an Application > except for code that is interpreted > and run by Apple’s Documented APIs and > built-in interpreter(s). > Notwithstanding the foregoing, with > Apple’s prior written consent, an > Application may use embedded > interpreted code in a limited way if > such use is solely for providing minor > features or functionality that are > consistent with the intended and > advertised purpose of the Application. > > > **New:** > > 3.3.2 An Application may not download or install executable code. > Interpreted code may only be used in > an Application if all scripts, code > and interpreters are packaged in the > Application and not downloaded. The > only exception to the foregoing is > scripts and code downloaded and run by > Apple’s built-in WebKit framework. > > >
[BeeWare](https://pybee.org) is an open source framework for authoring native iOS & Android apps.
412,241
I have a fresh install of ubuntu 16.04 on a razer stealth rz09 with nvidia gtx1060 gpu (this gpu being the reason i got the machine). The system freezes often upon login, with both the current and previous kernels. If I use one of the grub options to do a dpkg repair occasionally I am able to boot, and I've managed to do apt-get update and upgrade but still hit the boot hang most of the time. I have a windows partition from which I am writing this but would like to continue with linux since the servers I work off are all linux. This is the second time I've installed linux on this machine, the first time getting stuck after attempting a cuda install - but this time the drivers are all stock! I currently boot with 'secure boot disabled' fwiw. Anyway if someone has some pointers I would appreciate it
2017/12/21
[ "https://unix.stackexchange.com/questions/412241", "https://unix.stackexchange.com", "https://unix.stackexchange.com/users/118522/" ]
Using 'nomodeset' in grub as described [here](https://www.linuxmint.com/pictures/screenshots/rosa/nomodeset_bios.webm) and then install of driver using standard install worked for me.
Well, I had the same problem: My PC was freezing randomly. I tried Ubuntu 16, 17 and 18.04 and everything was the same. I tried several drivers and didn't get a solution. I tried several solutions that I found in the forums and got bad and harmful results. My solution was: I stopped using the graphical nvidia card, removed it and now I'm using the integrated Intel HD graphics card (Intel® HD Graphics 530 card (Skylake GT2)) and all the problems were solved!
129,049
From further investigations I see that someone came with an idea that gives support to my theory that elves don't have body fat. Their idea was that Elves [store their energy as ethanol](https://worldbuilding.stackexchange.com/questions/128909/how-could-elves-survive-without-any-fat-cell-in-their-body/128932#128932) in their blood. This idea implies that Elves basically walk around with anti-freeze blood that can protect against infections better than normal blood while also making it so that Elves can't get drunk. But another problem arises, people with low body fat tend to look like road maps,cause even if there are small muscles below the skin, if there is 0 fat to cover it then even the smallest muscles are perfectly visible. [![enter image description here](https://i.stack.imgur.com/dYuym.jpg)](https://i.stack.imgur.com/dYuym.jpg) So, How can Elves have 0% body fat and not look like some freaky walking road map?
2018/11/01
[ "https://worldbuilding.stackexchange.com/questions/129049", "https://worldbuilding.stackexchange.com", "https://worldbuilding.stackexchange.com/users/-1/" ]
Elves have thicker skin. Literally. One of the purposes of fat in the body is kinetic: it serves as a cushion to absorb and distribute the force of impacts - not just in the sense of punches or falling rocks, but also things like the ground impacting your foot as you walk around on it. Since your elves don't have fat, it follows that some other part of the body has to be cushioning it. The dermis - the middle layer of skin - already provides some cushioning effects, so it makes sense to me that in your elves, it would take on this role, becoming thicker, denser, and stiffer than in humans. Therefore, it would be less inclined to mold itself to the contours of the body beneath. (It would also be less able to expand and contract, which would be a problem in a human since our bodies change shape as we gain and lose fat - but conveniently, elves don't do that.) The outer layer of skin would be relatively unaffected, so it shouldn't feel any different to the touch. I would expect that facial muscles might have a harder time flexing the thicker skin, hence why elves are often known for their stoicism - their faces are literally less expressive than humans'. I welcome people who actually know things about anatomy to pick holes in this idea.
Type 1 Muscle Tissue -------------------- As a species your elves have a predisposition to [Type 1 muscle tissue](https://en.wikipedia.org/wiki/Muscle#Types), which is 'slow twitch'. A normal seditary man or a woman is believed to have 45% Type 2 muscle mass and 55% Type 1. However long distance runners have [higher percentages of Type 1 muscle mass](https://en.wikipedia.org/wiki/Myocyte#Fiber_types). In this picture you can actually see that Type 1 muscle users have less definition in their exposed areas. [![muscle fibre types](https://i.stack.imgur.com/nckR0.jpg)](https://i.stack.imgur.com/nckR0.jpg) This would also help explain why your elves can perform endurance tasks well, [which is a common elvish trope](https://www.planet-tolkien.com/board/5/5125/0/elves-vs-men).
48,459,116
I'm looking for some way to block a possibility of making merge of pull requests on the BitBucket if some specified Jenkins task is currently running. Do you know if it is possible? I was looking for that in the Jenkins Git plugin and in the settings of BitBucket but with no success... Thank you in advance for any help!
2018/01/26
[ "https://Stackoverflow.com/questions/48459116", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2905035/" ]
In bitbucket go to the project and then the repository you want to enable this feature for, and under settings->pull request check the option > > Requires a minimum of [n] successful builds > > >
This can be done using the bitbucket build status api. 1) Enable require minimum 1 successful builds in bitbucket repo settings <https://blog.bitbucket.org/2015/11/18/introducing-the-build-status-api-for-bitbucket-cloud/> Then either: Manually in jenkins pipeline fire the API calls to set the build status to in in progress, failed, success Alternatively, using something like the <https://wiki.jenkins.io/display/JENKINS/GitHub+Branch+Source+Plugin> which will do this automatically for you (sending the statuses) plus a host of other things (like automatically discovering new repos with Jenkinsfiles)
354,011
So I know that acting without the foreknowledge of those actions is down to ignorance. This has various implications, the main one being that the responsibility of one's actions is not entirely eradicated, though maybe diminished. We may say, 'how could he know better? He doesn't know what he's doing/the consequences of his actions.'. Or maybe the person should have known better not to act because of their ignorance, in which case they still bear the weight of blame, but their actions weren't necessarily bad. What if however, a person does a seemingly stupid thing, but where they knew exactly what they were doing, or what the consequences would be? Maybe they acted in a way where they wanted to seem ignorant to use this as a pretense for their ultimate aim, but where they don't have to take responsibility for their actions (or at least less responsibility).
2016/10/18
[ "https://english.stackexchange.com/questions/354011", "https://english.stackexchange.com", "https://english.stackexchange.com/users/177671/" ]
In general usage we would say that someone is "*[feign](https://en.oxforddictionaries.com/definition/feign)ing ignorance*".
Sometimes the allegedly innocent motive is called a "pretext" and someone's purported intent can be described as "pretextual." This is particularly a common usage in the context of a claimed justification for improper discrimination, for example, in employment or jury selection which is actually on the basis of race. A somewhat related concept is "willful blindness" where one intentionally avoids gaining knowledge of what a reasonable person would suspect the consequences to be. Also related is the notion of "willful disregard" or "willful and wanton" conduct. When someone actual intends a result with a specific consequence it is said that they act with "scienter" or with "malice" or "malice aforethought", but none of those terms capture the notion of deceit as to one's motive. Another closely related concept is "plausible deniability" which means causing something to happen in a context where you can plausibly claim that you didn't cause the action, but that isn't quite the same grammatically.
9,346
Let's say I had a character which was looking at a book shelf and I wanted to mention a particular book that they were looking at, let's say it's Lord of the Rings, should I put the title in quotes? something like.. > > Jim looked at "Lord of the Rings" > > > Or should it just be.. > > Jim looked at Lord of the Rings > > >
2013/11/12
[ "https://writers.stackexchange.com/questions/9346", "https://writers.stackexchange.com", "https://writers.stackexchange.com/users/6214/" ]
I despise "his or her." It's so bad, it should be unconstitutional. Randomly switching "his" and "her" from sentence to sentence is almost as bad. If you're making a general statement, and you think exclusively using "his" is sexist, then use the plural. > > Fighters fight for the pleasure of the spectator, against their own > safety. > > >
Change something else in the sentence. > > > > > > A fighter is someone who fights for the pleasure of spectators, against his or her own safety. > > > > > > A fighter is someone who fights for the pleasure of the audience, against his or her own safety. > > > > > > > > >
6,733,138
How can i make a script like verify-email.org ? I told in the school, that this is not a problem. But now, I searched the web, and found nothing? E.g. test123@hotmail.com * I don't want only check if the domain exist of the E-Mail address. I want check, the whole E-Mail, if it exists on Hotmail.com? Thanks.
2011/07/18
[ "https://Stackoverflow.com/questions/6733138", "https://Stackoverflow.com", "https://Stackoverflow.com/users/850049/" ]
You can't. You have to send an email and wait for an answer to verify that this address exists.
The only clear way to check an email address is valid is to send it an email. If it isn't valid you will get an undelivered response.
6,733,138
How can i make a script like verify-email.org ? I told in the school, that this is not a problem. But now, I searched the web, and found nothing? E.g. test123@hotmail.com * I don't want only check if the domain exist of the E-Mail address. I want check, the whole E-Mail, if it exists on Hotmail.com? Thanks.
2011/07/18
[ "https://Stackoverflow.com/questions/6733138", "https://Stackoverflow.com", "https://Stackoverflow.com/users/850049/" ]
You can't. You have to send an email and wait for an answer to verify that this address exists.
Like my predecessors wrote, you can only completely veryfiy by sending a mail to the address. However, you could use DNS to check if the domain exists and a MX (Mail Exchange) record is associated with it. It's not a complete solution, but maybe a step that brings you a little further.
6,733,138
How can i make a script like verify-email.org ? I told in the school, that this is not a problem. But now, I searched the web, and found nothing? E.g. test123@hotmail.com * I don't want only check if the domain exist of the E-Mail address. I want check, the whole E-Mail, if it exists on Hotmail.com? Thanks.
2011/07/18
[ "https://Stackoverflow.com/questions/6733138", "https://Stackoverflow.com", "https://Stackoverflow.com/users/850049/" ]
The only clear way to check an email address is valid is to send it an email. If it isn't valid you will get an undelivered response.
Like my predecessors wrote, you can only completely veryfiy by sending a mail to the address. However, you could use DNS to check if the domain exists and a MX (Mail Exchange) record is associated with it. It's not a complete solution, but maybe a step that brings you a little further.
243,425
[This question](https://meta.stackexchange.com/questions/243404/pay-real-money-to-set-bounties-another-method-not-replacing-rep-method) was rapidly down-voted without any response of material to help the user understand why the question was so poorly asked that it justified such rapid and massive down-voting. I have seen this happen before, but didn't bother tracking those questions, so for now I have only the one example to provide. My opinion is that down-voting in most of such cases is more for -1 disagree than for any genuine issues with the question. I just want to suggest that if a question has no answers and some agreed upon negative score (-5? -10?), then no further down-votes should be allowed until an answer is provided. I cannot see any useful purpose to massively down-voting a question without providing a single answer. Please understand this is not intended to be a discussion on the topic of that question.
2014/11/11
[ "https://meta.stackexchange.com/questions/243425", "https://meta.stackexchange.com", "https://meta.stackexchange.com/users/-1/" ]
I disagree with this proposal. I have nothing constructive to add, but I am just posting an answer because I am required to in order to down-vote, since there are already too many down-votes on the proposal. --- The above is essentially the type of answer that this proposal would attract to questions. Not to mention all the extra NAA flags that would go along with it. This is not particularly useful, I believe.
I think forcing answers is a bad idea. Anyone can vote how they want, pretty much. If they choose to downvote, it's not abuse. They are [encouraged to comment](https://meta.stackexchange.com/questions/135/encouraging-people-to-explain-downvotes), but not required to do so, because you can't force them to post a constructive comment, and these discussions often lead to heated arguments, which are not constructive either. Here on Meta Stack Exchange, [feature-request](/questions/tagged/feature-request "show questions tagged 'feature-request'") questions are voted up if people like them, and down if they don't. Leaving a comment is nice, but not absolutely necessary to send the message. The question you used as an example was obviously (to me) a bad idea, so I downvoted. I might have commented, but a comment I agreed with had already been posted, so I upvoted that instead. Same with this post. It wasn't the post quality so much (although it helped) that caused the downvoting, so much as the content of the feature-request, which wasn't a good idea.
243,425
[This question](https://meta.stackexchange.com/questions/243404/pay-real-money-to-set-bounties-another-method-not-replacing-rep-method) was rapidly down-voted without any response of material to help the user understand why the question was so poorly asked that it justified such rapid and massive down-voting. I have seen this happen before, but didn't bother tracking those questions, so for now I have only the one example to provide. My opinion is that down-voting in most of such cases is more for -1 disagree than for any genuine issues with the question. I just want to suggest that if a question has no answers and some agreed upon negative score (-5? -10?), then no further down-votes should be allowed until an answer is provided. I cannot see any useful purpose to massively down-voting a question without providing a single answer. Please understand this is not intended to be a discussion on the topic of that question.
2014/11/11
[ "https://meta.stackexchange.com/questions/243425", "https://meta.stackexchange.com", "https://meta.stackexchange.com/users/-1/" ]
I think forcing answers is a bad idea. Anyone can vote how they want, pretty much. If they choose to downvote, it's not abuse. They are [encouraged to comment](https://meta.stackexchange.com/questions/135/encouraging-people-to-explain-downvotes), but not required to do so, because you can't force them to post a constructive comment, and these discussions often lead to heated arguments, which are not constructive either. Here on Meta Stack Exchange, [feature-request](/questions/tagged/feature-request "show questions tagged 'feature-request'") questions are voted up if people like them, and down if they don't. Leaving a comment is nice, but not absolutely necessary to send the message. The question you used as an example was obviously (to me) a bad idea, so I downvoted. I might have commented, but a comment I agreed with had already been posted, so I upvoted that instead. Same with this post. It wasn't the post quality so much (although it helped) that caused the downvoting, so much as the content of the feature-request, which wasn't a good idea.
Votes (up or down) need to be anonymous and without cap or any action required other than the vote itself. This is because we want, "need", people to vote, and cannot risk losing votes from users who wont be *forced* to make answer (or comment). Stopping people voting means you risk getting a less accurate representation of the general user opinion. You also then only receive votes from user willing to answer (or comment), and by tunnelling votes to a certain "type" of person there is a danger of only getting a "certain type" of mindset/opinion each time. Open community works as you get opinions from all kinds of people/thoughts/ideas, and while comments and answers are more useful in terms of raw opinion, simply having *votes* from different users is paramount to ensuring a varied mindset and opinion. Even if they all agree, and even if it's 30 downvotes. the "varied" user mindset agrees this question (or answer) is terrible, poor, not a good suggestion, etc. If nothing else, they are just as *entitled* to vote as anyone who is happy to or wants to comment/answer, forced or not. > > How about forcing answers when there is rapid down-voting without any answers? > > > Sincerely, I get your logic, I do, and it's admirable your intentions are to improve the site by trying to get some answers out of people rather than a mass downvote attack (etc). However, *forcing answers* for a downvote once a certain downvote threshold is met is not really realistic or useful at all. Sorry, it's simply a bonkers idea. Mad as a bag of frogs! * You'll just (mostly) get poor answers, so your intentions to bring about *improvement* is completely lost * You will lose votes, not good as mentioned above * Rapid downvoting is perfectly fine as it simply signifies a poor question, or poor proposal. This is a big part of the site, and why it works well within a huge community You are also "essentially" suggesting a cap which potentially (and likely will) **limit**: 1. How *bad* a question can be (determined by X max downvotes) 2. How many users can disagree with the idea/opinion/feature request 3. Allowing the first X users to the question to be able to downvote freely, and forcing the remaining ones to answer (or comment) is not fair, at all These would be severely detrimental to the main premise of Stack, that good content is voted up, and bad is voted down out of sight.
243,425
[This question](https://meta.stackexchange.com/questions/243404/pay-real-money-to-set-bounties-another-method-not-replacing-rep-method) was rapidly down-voted without any response of material to help the user understand why the question was so poorly asked that it justified such rapid and massive down-voting. I have seen this happen before, but didn't bother tracking those questions, so for now I have only the one example to provide. My opinion is that down-voting in most of such cases is more for -1 disagree than for any genuine issues with the question. I just want to suggest that if a question has no answers and some agreed upon negative score (-5? -10?), then no further down-votes should be allowed until an answer is provided. I cannot see any useful purpose to massively down-voting a question without providing a single answer. Please understand this is not intended to be a discussion on the topic of that question.
2014/11/11
[ "https://meta.stackexchange.com/questions/243425", "https://meta.stackexchange.com", "https://meta.stackexchange.com/users/-1/" ]
I disagree with this proposal. I have nothing constructive to add, but I am just posting an answer because I am required to in order to down-vote, since there are already too many down-votes on the proposal. --- The above is essentially the type of answer that this proposal would attract to questions. Not to mention all the extra NAA flags that would go along with it. This is not particularly useful, I believe.
Votes (up or down) need to be anonymous and without cap or any action required other than the vote itself. This is because we want, "need", people to vote, and cannot risk losing votes from users who wont be *forced* to make answer (or comment). Stopping people voting means you risk getting a less accurate representation of the general user opinion. You also then only receive votes from user willing to answer (or comment), and by tunnelling votes to a certain "type" of person there is a danger of only getting a "certain type" of mindset/opinion each time. Open community works as you get opinions from all kinds of people/thoughts/ideas, and while comments and answers are more useful in terms of raw opinion, simply having *votes* from different users is paramount to ensuring a varied mindset and opinion. Even if they all agree, and even if it's 30 downvotes. the "varied" user mindset agrees this question (or answer) is terrible, poor, not a good suggestion, etc. If nothing else, they are just as *entitled* to vote as anyone who is happy to or wants to comment/answer, forced or not. > > How about forcing answers when there is rapid down-voting without any answers? > > > Sincerely, I get your logic, I do, and it's admirable your intentions are to improve the site by trying to get some answers out of people rather than a mass downvote attack (etc). However, *forcing answers* for a downvote once a certain downvote threshold is met is not really realistic or useful at all. Sorry, it's simply a bonkers idea. Mad as a bag of frogs! * You'll just (mostly) get poor answers, so your intentions to bring about *improvement* is completely lost * You will lose votes, not good as mentioned above * Rapid downvoting is perfectly fine as it simply signifies a poor question, or poor proposal. This is a big part of the site, and why it works well within a huge community You are also "essentially" suggesting a cap which potentially (and likely will) **limit**: 1. How *bad* a question can be (determined by X max downvotes) 2. How many users can disagree with the idea/opinion/feature request 3. Allowing the first X users to the question to be able to downvote freely, and forcing the remaining ones to answer (or comment) is not fair, at all These would be severely detrimental to the main premise of Stack, that good content is voted up, and bad is voted down out of sight.
98,959
I make fresh pasta regularly and it usually works out well. There is one exception. If I make sheets of pasta for lasagna or cannelloni they tend to stick together during cooking so that I have difficulty separating them from each other and themselves. Does anyone have a suggestion? I have heard that adding oil to the water may help. Thanks.
2019/05/12
[ "https://cooking.stackexchange.com/questions/98959", "https://cooking.stackexchange.com", "https://cooking.stackexchange.com/users/75540/" ]
You may just be cooking too much at once. When I make lasagna or rolled pasta, like cannelloni, I cook 2 to 3 sheets at a time, building my lasagna (or filling the pasta) as I go. I remove the cooked sheets to a clean kitchen towel. Proceed with the construction when they are just cool enough to handle, then add more fresh pasta to the cooking pot.
maybe they stick because they are overcooked...however, when boiling any type of pasta you should always add a spoonful or so of vegetable oil to help them separate. I never pre-cook lasagna sheets...fresh pasta cooks so quickly that it will be thoroughly cooked while in the oven, even if every sauce is pre-cooked...and even store-bought dry lasagna sheets or cannelloni tubes will be entirely cooked if they are covered with sauces and the dish is cooked for 20 or more minutes.
139,179
This is for a medium/high fantasy magic setting with a medieval flavor (a D&D campaign setting) and am trying to get a grasp on expected long term effects/reaction by repeated worldwide devastation that happens on a cycle and a mechanism that would allow nearly in its entirety that it was just a legend or never really happened. Or that it is known by some people ( sages, researchers, secret organization) but nothing is ever done to prepare. The idea is that dragons return to the world briefly for a few months or years and spend the entire time destroying anything and everything they can. These dragons are exceptionally powerful. For the first cycle the world is not prepared and already in a form of dark ages dealing with other problems. Dragons were thought to be extinct and have little in their way then mysteriously vanish and the world is left on its own to recover naturally. New cities, new kingdoms, nature reclaims the waste. Then roughly 1000 years later (timescale flexible) for a second cycle the world is taken by surprise and it happens again. The first 2 occurrences can be explained well enough but after that (by 3 or 4) someone is bound to see a connection. Like a perpetual cycle of apocalypse through post-post-apocalypse. I hate to tie a parallel here but similar to the Matrix without the concept of "The One". Main Question: When knowledge of the events would be recorded or passed down in a legitimate way that would be recoverable and actionable by a world population, by what mechanism might I be able to avoid or ignore the usefulness of this information? I would prefer to avoid civilizations developing dragon fighting weapons and dragon dooms day bunkers or perhaps they wanted to but were somehow prevented from being able to, every time.
2019/02/15
[ "https://worldbuilding.stackexchange.com/questions/139179", "https://worldbuilding.stackexchange.com", "https://worldbuilding.stackexchange.com/users/20626/" ]
**Predictability**. Regardless of exactly how close the cycle is to 1000 years, it is more important to know how exact the intervals actually are. A cycle that is *"exactly 1174 years, 8 months, 19 days, at high noon on that day, EVERY cycle"*, is much more likely to cause world population to prepare in advance for the next cycle than a cycle that is *"every 600 years give or take 150 years"*. Accuracy of predictability will be the single deciding factor. Regardless of what information is recorded, it is only useful if the world population can put it to good use at the correct time. If a cycle comes early, the population will not have prepared in time (never underestimate procrastination). If the cycle comes late, the populace could start to believe that it will not come at all (belief that it has turned out to be a false prophecy, or equivalent) then any preparations they might have made could become dilapited from lack of maintenance, abandoned, or forgotten entirely, so when the cycle does come, they are, again, unprepared but for a very different reason.
A classic case of "We have the knowledge but not the will to use it." The political expedience where the cure is more disagreeable then the disease. How badly do you want the bearer of bad news to suffer in order to save the population? One likely scenario is that a minor nobleman/knight's kingdom/village/area of influence was devastated in the distant past and a blood pact/family curse compels the descendants to look for signs and portents of a "reawakening" of the dragons. Now that the crisis is eminent, the "hero" has to inform/warn the public. Of course the family name is in disgrace so nobody will listen to their warnings of coming danger. This is made worse by the fact the protagonist is a drunk or hears voices or did some sort of faux pas so is totally discredited by the powers that be. One thing he can't be is a beggar on the streets as he would zero standing in the community bases on class/social standing. Another typical scenario is that a young monk is tasked with spreading the warning the masters have discovered/saved of the impending disaster but is socially awkward or that sect is currently in disfavor by the religious hierarchy so he falls in with a group of travelling actors/performers and disseminates his message in the form of a morality play to the masses after escaping from some harrowing adventures. The last scenario is where the powers that be are in denial and attempt to kill the messenger because it would disrupt or inconvenience the rulers and their decadent lifestyle.
139,179
This is for a medium/high fantasy magic setting with a medieval flavor (a D&D campaign setting) and am trying to get a grasp on expected long term effects/reaction by repeated worldwide devastation that happens on a cycle and a mechanism that would allow nearly in its entirety that it was just a legend or never really happened. Or that it is known by some people ( sages, researchers, secret organization) but nothing is ever done to prepare. The idea is that dragons return to the world briefly for a few months or years and spend the entire time destroying anything and everything they can. These dragons are exceptionally powerful. For the first cycle the world is not prepared and already in a form of dark ages dealing with other problems. Dragons were thought to be extinct and have little in their way then mysteriously vanish and the world is left on its own to recover naturally. New cities, new kingdoms, nature reclaims the waste. Then roughly 1000 years later (timescale flexible) for a second cycle the world is taken by surprise and it happens again. The first 2 occurrences can be explained well enough but after that (by 3 or 4) someone is bound to see a connection. Like a perpetual cycle of apocalypse through post-post-apocalypse. I hate to tie a parallel here but similar to the Matrix without the concept of "The One". Main Question: When knowledge of the events would be recorded or passed down in a legitimate way that would be recoverable and actionable by a world population, by what mechanism might I be able to avoid or ignore the usefulness of this information? I would prefer to avoid civilizations developing dragon fighting weapons and dragon dooms day bunkers or perhaps they wanted to but were somehow prevented from being able to, every time.
2019/02/15
[ "https://worldbuilding.stackexchange.com/questions/139179", "https://worldbuilding.stackexchange.com", "https://worldbuilding.stackexchange.com/users/20626/" ]
If the destruction is thorough enough, then the survivors won't be able to tell what happened. I'm talking complete destruction of all buildings. Individuals might survive, but groups would have to be small and avoid buildings. Over 99% of everyone dead. Since destruction is concentrated on buildings, the death toll would be highest in cities--where the most educated generally live. Rumors might survive, but by the time that a thousand years is up, they'd be disbelieved by most. And in terms of the repeat occurrences, they'd be forgotten. That kind of destruction would destroy the written records in which the previous rumors were posted. A century or two after the destruction, people would be wondering how long ago it happened. Why? Because all the calendars were destroyed. People having to live a hunter/gatherer lifestyle while trying to rebuild agriculture don't have time to keep track of the days and years. So when the next time is approaching, they won't know. Because they didn't track the length of the last period. The kind of people who would have done that died in the destruction. The survivors would be trappers, travelers, and the occasional hermit.
A classic case of "We have the knowledge but not the will to use it." The political expedience where the cure is more disagreeable then the disease. How badly do you want the bearer of bad news to suffer in order to save the population? One likely scenario is that a minor nobleman/knight's kingdom/village/area of influence was devastated in the distant past and a blood pact/family curse compels the descendants to look for signs and portents of a "reawakening" of the dragons. Now that the crisis is eminent, the "hero" has to inform/warn the public. Of course the family name is in disgrace so nobody will listen to their warnings of coming danger. This is made worse by the fact the protagonist is a drunk or hears voices or did some sort of faux pas so is totally discredited by the powers that be. One thing he can't be is a beggar on the streets as he would zero standing in the community bases on class/social standing. Another typical scenario is that a young monk is tasked with spreading the warning the masters have discovered/saved of the impending disaster but is socially awkward or that sect is currently in disfavor by the religious hierarchy so he falls in with a group of travelling actors/performers and disseminates his message in the form of a morality play to the masses after escaping from some harrowing adventures. The last scenario is where the powers that be are in denial and attempt to kill the messenger because it would disrupt or inconvenience the rulers and their decadent lifestyle.
139,179
This is for a medium/high fantasy magic setting with a medieval flavor (a D&D campaign setting) and am trying to get a grasp on expected long term effects/reaction by repeated worldwide devastation that happens on a cycle and a mechanism that would allow nearly in its entirety that it was just a legend or never really happened. Or that it is known by some people ( sages, researchers, secret organization) but nothing is ever done to prepare. The idea is that dragons return to the world briefly for a few months or years and spend the entire time destroying anything and everything they can. These dragons are exceptionally powerful. For the first cycle the world is not prepared and already in a form of dark ages dealing with other problems. Dragons were thought to be extinct and have little in their way then mysteriously vanish and the world is left on its own to recover naturally. New cities, new kingdoms, nature reclaims the waste. Then roughly 1000 years later (timescale flexible) for a second cycle the world is taken by surprise and it happens again. The first 2 occurrences can be explained well enough but after that (by 3 or 4) someone is bound to see a connection. Like a perpetual cycle of apocalypse through post-post-apocalypse. I hate to tie a parallel here but similar to the Matrix without the concept of "The One". Main Question: When knowledge of the events would be recorded or passed down in a legitimate way that would be recoverable and actionable by a world population, by what mechanism might I be able to avoid or ignore the usefulness of this information? I would prefer to avoid civilizations developing dragon fighting weapons and dragon dooms day bunkers or perhaps they wanted to but were somehow prevented from being able to, every time.
2019/02/15
[ "https://worldbuilding.stackexchange.com/questions/139179", "https://worldbuilding.stackexchange.com", "https://worldbuilding.stackexchange.com/users/20626/" ]
Maintenance costs. All of those dragon fighting weapons cost money. All of those dragon doomsday bunkers need upkeep. Even if they just sit around, someone has to watch them sit around and keep them useable. Or replace them if they become unusable. It's easy to justify those costs for the first few decades after the dragon attack, because people will still remember it first hand. Then it'll get slightly harder, as people who remember it first hand start dying. Eventually, people will only read about it in books, at which point it will seem like a distant threat that is unlikely to occur again. When that starts happening, some enterprising young prince or duke will say "Yeah, we don't need to be spending all of this gold on dragon survival bunkers. Let's take that money and spend it on Necromancy For All instead!" And so, 1000 years later, there will be necromancers giving out free healing spells on every street corner and no way to repel the next dragon invasion.
A classic case of "We have the knowledge but not the will to use it." The political expedience where the cure is more disagreeable then the disease. How badly do you want the bearer of bad news to suffer in order to save the population? One likely scenario is that a minor nobleman/knight's kingdom/village/area of influence was devastated in the distant past and a blood pact/family curse compels the descendants to look for signs and portents of a "reawakening" of the dragons. Now that the crisis is eminent, the "hero" has to inform/warn the public. Of course the family name is in disgrace so nobody will listen to their warnings of coming danger. This is made worse by the fact the protagonist is a drunk or hears voices or did some sort of faux pas so is totally discredited by the powers that be. One thing he can't be is a beggar on the streets as he would zero standing in the community bases on class/social standing. Another typical scenario is that a young monk is tasked with spreading the warning the masters have discovered/saved of the impending disaster but is socially awkward or that sect is currently in disfavor by the religious hierarchy so he falls in with a group of travelling actors/performers and disseminates his message in the form of a morality play to the masses after escaping from some harrowing adventures. The last scenario is where the powers that be are in denial and attempt to kill the messenger because it would disrupt or inconvenience the rulers and their decadent lifestyle.
139,179
This is for a medium/high fantasy magic setting with a medieval flavor (a D&D campaign setting) and am trying to get a grasp on expected long term effects/reaction by repeated worldwide devastation that happens on a cycle and a mechanism that would allow nearly in its entirety that it was just a legend or never really happened. Or that it is known by some people ( sages, researchers, secret organization) but nothing is ever done to prepare. The idea is that dragons return to the world briefly for a few months or years and spend the entire time destroying anything and everything they can. These dragons are exceptionally powerful. For the first cycle the world is not prepared and already in a form of dark ages dealing with other problems. Dragons were thought to be extinct and have little in their way then mysteriously vanish and the world is left on its own to recover naturally. New cities, new kingdoms, nature reclaims the waste. Then roughly 1000 years later (timescale flexible) for a second cycle the world is taken by surprise and it happens again. The first 2 occurrences can be explained well enough but after that (by 3 or 4) someone is bound to see a connection. Like a perpetual cycle of apocalypse through post-post-apocalypse. I hate to tie a parallel here but similar to the Matrix without the concept of "The One". Main Question: When knowledge of the events would be recorded or passed down in a legitimate way that would be recoverable and actionable by a world population, by what mechanism might I be able to avoid or ignore the usefulness of this information? I would prefer to avoid civilizations developing dragon fighting weapons and dragon dooms day bunkers or perhaps they wanted to but were somehow prevented from being able to, every time.
2019/02/15
[ "https://worldbuilding.stackexchange.com/questions/139179", "https://worldbuilding.stackexchange.com", "https://worldbuilding.stackexchange.com/users/20626/" ]
You could look at the first Pern books for inspiration. They have exactly this situation where the threadfall comes on a periodic cycle every 250 years....but sometimes it misses. They had it miss twice in a row and as a result people became complacent and started thinking it would never come again.
A classic case of "We have the knowledge but not the will to use it." The political expedience where the cure is more disagreeable then the disease. How badly do you want the bearer of bad news to suffer in order to save the population? One likely scenario is that a minor nobleman/knight's kingdom/village/area of influence was devastated in the distant past and a blood pact/family curse compels the descendants to look for signs and portents of a "reawakening" of the dragons. Now that the crisis is eminent, the "hero" has to inform/warn the public. Of course the family name is in disgrace so nobody will listen to their warnings of coming danger. This is made worse by the fact the protagonist is a drunk or hears voices or did some sort of faux pas so is totally discredited by the powers that be. One thing he can't be is a beggar on the streets as he would zero standing in the community bases on class/social standing. Another typical scenario is that a young monk is tasked with spreading the warning the masters have discovered/saved of the impending disaster but is socially awkward or that sect is currently in disfavor by the religious hierarchy so he falls in with a group of travelling actors/performers and disseminates his message in the form of a morality play to the masses after escaping from some harrowing adventures. The last scenario is where the powers that be are in denial and attempt to kill the messenger because it would disrupt or inconvenience the rulers and their decadent lifestyle.
139,179
This is for a medium/high fantasy magic setting with a medieval flavor (a D&D campaign setting) and am trying to get a grasp on expected long term effects/reaction by repeated worldwide devastation that happens on a cycle and a mechanism that would allow nearly in its entirety that it was just a legend or never really happened. Or that it is known by some people ( sages, researchers, secret organization) but nothing is ever done to prepare. The idea is that dragons return to the world briefly for a few months or years and spend the entire time destroying anything and everything they can. These dragons are exceptionally powerful. For the first cycle the world is not prepared and already in a form of dark ages dealing with other problems. Dragons were thought to be extinct and have little in their way then mysteriously vanish and the world is left on its own to recover naturally. New cities, new kingdoms, nature reclaims the waste. Then roughly 1000 years later (timescale flexible) for a second cycle the world is taken by surprise and it happens again. The first 2 occurrences can be explained well enough but after that (by 3 or 4) someone is bound to see a connection. Like a perpetual cycle of apocalypse through post-post-apocalypse. I hate to tie a parallel here but similar to the Matrix without the concept of "The One". Main Question: When knowledge of the events would be recorded or passed down in a legitimate way that would be recoverable and actionable by a world population, by what mechanism might I be able to avoid or ignore the usefulness of this information? I would prefer to avoid civilizations developing dragon fighting weapons and dragon dooms day bunkers or perhaps they wanted to but were somehow prevented from being able to, every time.
2019/02/15
[ "https://worldbuilding.stackexchange.com/questions/139179", "https://worldbuilding.stackexchange.com", "https://worldbuilding.stackexchange.com/users/20626/" ]
### Upkeep Cost It's a waste of money, all those weapons, catapults, soldiers, barracks, bunkers, oracles, etc, used to determine when the dragon will attack and defend ourselves is very expensive. Only during the first years after the attack will people want to pay for it, but, after some time, like a generation, the dragon attack will only be a story, not an immediate threat. Politics will use all that money from taxes to other stuff, like [bread and circuses](https://en.wikipedia.org/wiki/Bread_and_circuses) or anything better. ### Random Cycle Dragons aren't machines, they didn't attack every 1,000 years. Maybe the second attack was 900 years later, and the third was 1,120 years later. These differences reduce the credibility of the cycle. For example, 5 years before the 1,000th year, the king spends a huge amount of money to build an army of dragon-hunters to protect the kingdom. 5 years later, nothing... 10 years later... nothing, 50 years later... still nothing. The king can't pay any longer an army who isn't used and so he dissolves it, 60 years later the dragon comes and kills everybody. Unless you can magically predict when the dragon will come, maintain an army is difficult, more if you promise to people work hard to prepare for the attack, and nothing happens, people won't believe you next time, and obviously, people always forget. ### Memory 1,000 years is a lot of time, plenty of time to forget. With that amount of time, something like a war with a dragon may become a story, a legend, or just a past event that won't occur again. ### Preparation Okay, you just was attacked by a dragon and all is destroyed. A few years later the kingdom starts recovering from the damages. You know you have 1,000 years to prepare until the next attack. What would you do? 99% percent of people will say nothing since they will be dead by that time. Then, after some time, when people start having a chance of still being alive to the event (like 50 years) will say it's plenty of time, and they will wait. People are [procratinators](https://en.wikipedia.org/wiki/Procrastination) by nature, even more, politics. Any politic will leave the preparation (and its costs) to the next, and this the next, and then the other to the next, until it's too late are you are on fire, literally.
A classic case of "We have the knowledge but not the will to use it." The political expedience where the cure is more disagreeable then the disease. How badly do you want the bearer of bad news to suffer in order to save the population? One likely scenario is that a minor nobleman/knight's kingdom/village/area of influence was devastated in the distant past and a blood pact/family curse compels the descendants to look for signs and portents of a "reawakening" of the dragons. Now that the crisis is eminent, the "hero" has to inform/warn the public. Of course the family name is in disgrace so nobody will listen to their warnings of coming danger. This is made worse by the fact the protagonist is a drunk or hears voices or did some sort of faux pas so is totally discredited by the powers that be. One thing he can't be is a beggar on the streets as he would zero standing in the community bases on class/social standing. Another typical scenario is that a young monk is tasked with spreading the warning the masters have discovered/saved of the impending disaster but is socially awkward or that sect is currently in disfavor by the religious hierarchy so he falls in with a group of travelling actors/performers and disseminates his message in the form of a morality play to the masses after escaping from some harrowing adventures. The last scenario is where the powers that be are in denial and attempt to kill the messenger because it would disrupt or inconvenience the rulers and their decadent lifestyle.
59,092
I've noticed since installing Visual Studio 2010 SP1 that I'm having huge performance issues. It will randomly freeze up on me quite a bit. I had no performance issues with Visual Studio 2010 before the upgrade. The only add-on I have running is ReSharper. I'm wondering if anyone else is experiencing performance issues? If so have you found a way to fix them?
2011/03/17
[ "https://softwareengineering.stackexchange.com/questions/59092", "https://softwareengineering.stackexchange.com", "https://softwareengineering.stackexchange.com/users/20391/" ]
Just a small heads up about SP1: * If you have SQL Server Management Studio installed on the same machine, **don't** install SP1 just yet. You will lose all intellisense functionality. This is a major bug that must of slipped through. In terms of performance, I haven't really noticed much of a difference.
I seem to remember reading that in SP1 they switch off hardware gfx acceleration. You can re-enable it in the settings somewhere. Apparently for some people it was causing problems so they disable it by default. I've got it installed on a few machines here and I haven't noticed it running slower, but I've got a dozen plug ins, extensions and so forth enabled as well, so it was never particularly quick...
59,092
I've noticed since installing Visual Studio 2010 SP1 that I'm having huge performance issues. It will randomly freeze up on me quite a bit. I had no performance issues with Visual Studio 2010 before the upgrade. The only add-on I have running is ReSharper. I'm wondering if anyone else is experiencing performance issues? If so have you found a way to fix them?
2011/03/17
[ "https://softwareengineering.stackexchange.com/questions/59092", "https://softwareengineering.stackexchange.com", "https://softwareengineering.stackexchange.com/users/20391/" ]
Just a small heads up about SP1: * If you have SQL Server Management Studio installed on the same machine, **don't** install SP1 just yet. You will lose all intellisense functionality. This is a major bug that must of slipped through. In terms of performance, I haven't really noticed much of a difference.
So it seems like disabling the Productivity Power Tools is the key to solve this problem, at least to help with slowness. At least it worked out for me. Thanks Mark for your question/answer :)
59,092
I've noticed since installing Visual Studio 2010 SP1 that I'm having huge performance issues. It will randomly freeze up on me quite a bit. I had no performance issues with Visual Studio 2010 before the upgrade. The only add-on I have running is ReSharper. I'm wondering if anyone else is experiencing performance issues? If so have you found a way to fix them?
2011/03/17
[ "https://softwareengineering.stackexchange.com/questions/59092", "https://softwareengineering.stackexchange.com", "https://softwareengineering.stackexchange.com/users/20391/" ]
Just a small heads up about SP1: * If you have SQL Server Management Studio installed on the same machine, **don't** install SP1 just yet. You will lose all intellisense functionality. This is a major bug that must of slipped through. In terms of performance, I haven't really noticed much of a difference.
I've had a lot more crashes since installing IronPython, but the main key to crashing appears to involve solutions with projects in 2 or more programming languages. I won't get crashes in C#-only solutions, nor VB-only solutions, but only in the ones with both (and more!) languages. It might also be that those solutions have a lot more projects.
59,092
I've noticed since installing Visual Studio 2010 SP1 that I'm having huge performance issues. It will randomly freeze up on me quite a bit. I had no performance issues with Visual Studio 2010 before the upgrade. The only add-on I have running is ReSharper. I'm wondering if anyone else is experiencing performance issues? If so have you found a way to fix them?
2011/03/17
[ "https://softwareengineering.stackexchange.com/questions/59092", "https://softwareengineering.stackexchange.com", "https://softwareengineering.stackexchange.com/users/20391/" ]
Just a small heads up about SP1: * If you have SQL Server Management Studio installed on the same machine, **don't** install SP1 just yet. You will lose all intellisense functionality. This is a major bug that must of slipped through. In terms of performance, I haven't really noticed much of a difference.
I have tried to use VS 2010 only once, and I am glad we are not upgrading to it for my project. We have to shut down all other applications before we start it. Even then it can take a good 10 minutes to load. We will need the latest PC config with lots of RAM and the latest OS to get it any faster than that.
59,092
I've noticed since installing Visual Studio 2010 SP1 that I'm having huge performance issues. It will randomly freeze up on me quite a bit. I had no performance issues with Visual Studio 2010 before the upgrade. The only add-on I have running is ReSharper. I'm wondering if anyone else is experiencing performance issues? If so have you found a way to fix them?
2011/03/17
[ "https://softwareengineering.stackexchange.com/questions/59092", "https://softwareengineering.stackexchange.com", "https://softwareengineering.stackexchange.com/users/20391/" ]
So it seems like disabling the Productivity Power Tools is the key to solve this problem, at least to help with slowness. At least it worked out for me. Thanks Mark for your question/answer :)
I seem to remember reading that in SP1 they switch off hardware gfx acceleration. You can re-enable it in the settings somewhere. Apparently for some people it was causing problems so they disable it by default. I've got it installed on a few machines here and I haven't noticed it running slower, but I've got a dozen plug ins, extensions and so forth enabled as well, so it was never particularly quick...
59,092
I've noticed since installing Visual Studio 2010 SP1 that I'm having huge performance issues. It will randomly freeze up on me quite a bit. I had no performance issues with Visual Studio 2010 before the upgrade. The only add-on I have running is ReSharper. I'm wondering if anyone else is experiencing performance issues? If so have you found a way to fix them?
2011/03/17
[ "https://softwareengineering.stackexchange.com/questions/59092", "https://softwareengineering.stackexchange.com", "https://softwareengineering.stackexchange.com/users/20391/" ]
I've had a lot more crashes since installing IronPython, but the main key to crashing appears to involve solutions with projects in 2 or more programming languages. I won't get crashes in C#-only solutions, nor VB-only solutions, but only in the ones with both (and more!) languages. It might also be that those solutions have a lot more projects.
I seem to remember reading that in SP1 they switch off hardware gfx acceleration. You can re-enable it in the settings somewhere. Apparently for some people it was causing problems so they disable it by default. I've got it installed on a few machines here and I haven't noticed it running slower, but I've got a dozen plug ins, extensions and so forth enabled as well, so it was never particularly quick...
59,092
I've noticed since installing Visual Studio 2010 SP1 that I'm having huge performance issues. It will randomly freeze up on me quite a bit. I had no performance issues with Visual Studio 2010 before the upgrade. The only add-on I have running is ReSharper. I'm wondering if anyone else is experiencing performance issues? If so have you found a way to fix them?
2011/03/17
[ "https://softwareengineering.stackexchange.com/questions/59092", "https://softwareengineering.stackexchange.com", "https://softwareengineering.stackexchange.com/users/20391/" ]
I have tried to use VS 2010 only once, and I am glad we are not upgrading to it for my project. We have to shut down all other applications before we start it. Even then it can take a good 10 minutes to load. We will need the latest PC config with lots of RAM and the latest OS to get it any faster than that.
I seem to remember reading that in SP1 they switch off hardware gfx acceleration. You can re-enable it in the settings somewhere. Apparently for some people it was causing problems so they disable it by default. I've got it installed on a few machines here and I haven't noticed it running slower, but I've got a dozen plug ins, extensions and so forth enabled as well, so it was never particularly quick...
3,053,217
I'm doing massive tests on a Postgres database... so basically I have 2 table where I inserted 40.000.000 records on, let's say table1 and 80.000.000 on table2 after this I deleted all those records. Now if I do SELECT \* FROM table1 it takes 199000ms ? I can't understand what's happening? can anyone help me on this?
2010/06/16
[ "https://Stackoverflow.com/questions/3053217", "https://Stackoverflow.com", "https://Stackoverflow.com/users/180699/" ]
If you delete all the rows from a table, they are marked as deleted but not actually removed from disk immediately. In order to remove them you need to do a "vacuum" operation- this should kick in automatically some time after such a big delete. Even so, that will just leave the pages empty but taking up quite a bit of disk space without a "vacuum full". If you regularly need to do delete all the rows from a large table, consider using "truncate" instead, which simply zaps the table data file.
The tuples are logically deleted, not fisically. You should perform a VACUUM on the db. [More info here](http://wiki.postgresql.org/wiki/VACUUM_FULL)
3,053,217
I'm doing massive tests on a Postgres database... so basically I have 2 table where I inserted 40.000.000 records on, let's say table1 and 80.000.000 on table2 after this I deleted all those records. Now if I do SELECT \* FROM table1 it takes 199000ms ? I can't understand what's happening? can anyone help me on this?
2010/06/16
[ "https://Stackoverflow.com/questions/3053217", "https://Stackoverflow.com", "https://Stackoverflow.com/users/180699/" ]
The tuples are logically deleted, not fisically. You should perform a VACUUM on the db. [More info here](http://wiki.postgresql.org/wiki/VACUUM_FULL)
If you are deleting all records, use truncate not delete. Further the first time you run it the relation will not be cached (file cache or shared buffers), so it will be slower than subsequent times.
3,053,217
I'm doing massive tests on a Postgres database... so basically I have 2 table where I inserted 40.000.000 records on, let's say table1 and 80.000.000 on table2 after this I deleted all those records. Now if I do SELECT \* FROM table1 it takes 199000ms ? I can't understand what's happening? can anyone help me on this?
2010/06/16
[ "https://Stackoverflow.com/questions/3053217", "https://Stackoverflow.com", "https://Stackoverflow.com/users/180699/" ]
If you delete all the rows from a table, they are marked as deleted but not actually removed from disk immediately. In order to remove them you need to do a "vacuum" operation- this should kick in automatically some time after such a big delete. Even so, that will just leave the pages empty but taking up quite a bit of disk space without a "vacuum full". If you regularly need to do delete all the rows from a large table, consider using "truncate" instead, which simply zaps the table data file.
If you are deleting all records, use truncate not delete. Further the first time you run it the relation will not be cached (file cache or shared buffers), so it will be slower than subsequent times.
42,076
**What mechanisms do you know that prevent your site from being abused by anonymous spammers.** For example, let's say that I have a site where people can vote something. But I *don't* want someone to spam something all the way to the top. So I found (a) creating an account and only allowed to vote once and (b) CAPTCHA to decrease spam. What other methods do you know and how good do they work?
2008/09/03
[ "https://Stackoverflow.com/questions/42076", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2644/" ]
![Captcha](https://i.stack.imgur.com/zyh7b.png) From [Quantum Random Bit Generator Service](http://random.irb.hr/signup.php), via [MNeylon](http://www.mneylon.com/blog/archives/2008/09/02/captcha-sorts-out-the-nerds-from-the-boys/)
This is the study area of [Human Computation](http://en.wikipedia.org/wiki/Human_computation). there is an excellent video from Luis von Ahn here: <http://video.google.com/videoplay?docid=-8246463980976635143>
42,076
**What mechanisms do you know that prevent your site from being abused by anonymous spammers.** For example, let's say that I have a site where people can vote something. But I *don't* want someone to spam something all the way to the top. So I found (a) creating an account and only allowed to vote once and (b) CAPTCHA to decrease spam. What other methods do you know and how good do they work?
2008/09/03
[ "https://Stackoverflow.com/questions/42076", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2644/" ]
The big thing I've noticed is that whatever you do, you want your system to be unique. You want an attacker to have to tailor their automation program for your specific site, rather than just throw a pre-existing script at it that will work almost anywhere. It doesn't even have to be cryptographically secure; it just has to make your site a little different from the norm. This doesn't mean you can't or shouldn't use something like a pre-built captcha widget. Absolutely do use one of those as a staring point! It just means you have to customize it somewhere so that something extra happens that is outside the norm and will break any pre-existing script that could normally defeat it. If your site gets big enough that you have attackers targeting it specifically, then your simple little customization probably won't hold up anymore and you might have do something a little more special and think about real cryptography and all that. But that's one of those things that's a "good" problem to have.
stackoverflow has a few features that help with this; I think the single most useful step you can take is disabling the ability of anonymous users and new accounts to vote. This way, no one can sign up for hundreds of accounts and use their one vote to overpower other users. I'd say requiring a few posts or membership for a certain period of time are both decent options. Some would say you could allow one vote per IP address to help address this, but I've played plenty of games where malicious users with a nigh-infinite number of proxies defied IP address-based security. It's a deterrent, but a savvy user will get around it easily.
42,076
**What mechanisms do you know that prevent your site from being abused by anonymous spammers.** For example, let's say that I have a site where people can vote something. But I *don't* want someone to spam something all the way to the top. So I found (a) creating an account and only allowed to vote once and (b) CAPTCHA to decrease spam. What other methods do you know and how good do they work?
2008/09/03
[ "https://Stackoverflow.com/questions/42076", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2644/" ]
* Limit the number of votes per IP address per time * Block anonymizing proxies. * For voting: How about shuffling the value that has to be returned by the form on a "per session basis". Once "1" means the first item, "2" means the second. Then "77" means the first item, "812" means the second, ... could be some simple maths behind the scene, but it prevents users from just sending the same HTTP query over and over again. * What's worked for me very well: Use AJAX forms, not simple HTTP forms. Technically it's not much more complicated to fake votes, but I have written a simple blog software and it's only SPAM protection mechanism is to submit the comments via AJAX - no SPAM so far.
This is the study area of [Human Computation](http://en.wikipedia.org/wiki/Human_computation). there is an excellent video from Luis von Ahn here: <http://video.google.com/videoplay?docid=-8246463980976635143>
42,076
**What mechanisms do you know that prevent your site from being abused by anonymous spammers.** For example, let's say that I have a site where people can vote something. But I *don't* want someone to spam something all the way to the top. So I found (a) creating an account and only allowed to vote once and (b) CAPTCHA to decrease spam. What other methods do you know and how good do they work?
2008/09/03
[ "https://Stackoverflow.com/questions/42076", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2644/" ]
* Limit the number of votes per IP address per time * Block anonymizing proxies. * For voting: How about shuffling the value that has to be returned by the form on a "per session basis". Once "1" means the first item, "2" means the second. Then "77" means the first item, "812" means the second, ... could be some simple maths behind the scene, but it prevents users from just sending the same HTTP query over and over again. * What's worked for me very well: Use AJAX forms, not simple HTTP forms. Technically it's not much more complicated to fake votes, but I have written a simple blog software and it's only SPAM protection mechanism is to submit the comments via AJAX - no SPAM so far.
There's a few ideas in the answers to the [Best non-image based CAPTCHA?](https://stackoverflow.com/questions/8472/best-non-image-based-captcha) question if you haven't seen it already.
42,076
**What mechanisms do you know that prevent your site from being abused by anonymous spammers.** For example, let's say that I have a site where people can vote something. But I *don't* want someone to spam something all the way to the top. So I found (a) creating an account and only allowed to vote once and (b) CAPTCHA to decrease spam. What other methods do you know and how good do they work?
2008/09/03
[ "https://Stackoverflow.com/questions/42076", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2644/" ]
![alt text](https://i.stack.imgur.com/X11ol.png) From [xkcd](http://xkcd.com/233/)
stackoverflow has a few features that help with this; I think the single most useful step you can take is disabling the ability of anonymous users and new accounts to vote. This way, no one can sign up for hundreds of accounts and use their one vote to overpower other users. I'd say requiring a few posts or membership for a certain period of time are both decent options. Some would say you could allow one vote per IP address to help address this, but I've played plenty of games where malicious users with a nigh-infinite number of proxies defied IP address-based security. It's a deterrent, but a savvy user will get around it easily.
42,076
**What mechanisms do you know that prevent your site from being abused by anonymous spammers.** For example, let's say that I have a site where people can vote something. But I *don't* want someone to spam something all the way to the top. So I found (a) creating an account and only allowed to vote once and (b) CAPTCHA to decrease spam. What other methods do you know and how good do they work?
2008/09/03
[ "https://Stackoverflow.com/questions/42076", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2644/" ]
The big thing I've noticed is that whatever you do, you want your system to be unique. You want an attacker to have to tailor their automation program for your specific site, rather than just throw a pre-existing script at it that will work almost anywhere. It doesn't even have to be cryptographically secure; it just has to make your site a little different from the norm. This doesn't mean you can't or shouldn't use something like a pre-built captcha widget. Absolutely do use one of those as a staring point! It just means you have to customize it somewhere so that something extra happens that is outside the norm and will break any pre-existing script that could normally defeat it. If your site gets big enough that you have attackers targeting it specifically, then your simple little customization probably won't hold up anymore and you might have do something a little more special and think about real cryptography and all that. But that's one of those things that's a "good" problem to have.
I normally use a combination of the two: anonmous user is free to browse everything, but if he wants to vote, then he has to register. In the registration process, depending on the situation, I use an optin thru mail (to complete registration and confirm that at least the mailbox exists) and/or a CAPTCHA. From that point on you can decide if the user can vonte more than once, or any other rule. Btw I'm not a fan of the IP-based constraints: there are a lot of situation in which big organization's network use few IP for all their users, so the risk to block users that could vote is high.
42,076
**What mechanisms do you know that prevent your site from being abused by anonymous spammers.** For example, let's say that I have a site where people can vote something. But I *don't* want someone to spam something all the way to the top. So I found (a) creating an account and only allowed to vote once and (b) CAPTCHA to decrease spam. What other methods do you know and how good do they work?
2008/09/03
[ "https://Stackoverflow.com/questions/42076", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2644/" ]
![alt text](https://i.stack.imgur.com/X11ol.png) From [xkcd](http://xkcd.com/233/)
Charge for votes, like they do on some television "talent" shows, and get spammed all the way to the bank! Seriously, this is a really tough problem, and someday (maybe soon, if you listen to Ray Kurzweil), computers will do testing to screen out humans. The answers I'm adding to the list have obvious drawbacks, but just for the sake of enumeration: moderation (have humans do the testing), and IP-based tracking (limit the number of votes from a host).
99,411
Maybe someone has experience in this field. I'd like to overmold a PCBA, which has SMT components, with a low pressure molding process. I am concerned about the temperature of the hotmelt material when it reaches the PCBA. The temperature should be between 200°C and 215°C. Does anyone know if this material temperature could be a problem for the electronic components? Do I have the risk that the solder melts? Is this stress too harmful for the components? I am not quite sure if the components will be able to withstand this temperature or if I should take as a reference the reflow temperatures of the components.
2014/02/11
[ "https://electronics.stackexchange.com/questions/99411", "https://electronics.stackexchange.com", "https://electronics.stackexchange.com/users/37013/" ]
Make the two input resistors significantly bigger (say 10xR) - the gain will now be lower but you can added an extra amplifier onto Vout to restore the gain you need. Be aware of common mode problems with this type of circuit - you'll probably need to use 0.1% (or better) resistors to get an accurate representation of your 1-5V signal.
unlike Andy's answear i wouldn't use input resistors on your input. they add [noise](http://en.wikipedia.org/wiki/Johnson%E2%80%93Nyquist_noise) to your signal. of course its depending on your application. what i would use is something like an [AD8479](http://www.analog.com/static/imported-files/data_sheets/AD8479.PDF) which is exactly what i think you want. high input offset voltage is the keyword here
99,411
Maybe someone has experience in this field. I'd like to overmold a PCBA, which has SMT components, with a low pressure molding process. I am concerned about the temperature of the hotmelt material when it reaches the PCBA. The temperature should be between 200°C and 215°C. Does anyone know if this material temperature could be a problem for the electronic components? Do I have the risk that the solder melts? Is this stress too harmful for the components? I am not quite sure if the components will be able to withstand this temperature or if I should take as a reference the reflow temperatures of the components.
2014/02/11
[ "https://electronics.stackexchange.com/questions/99411", "https://electronics.stackexchange.com", "https://electronics.stackexchange.com/users/37013/" ]
Make the two input resistors significantly bigger (say 10xR) - the gain will now be lower but you can added an extra amplifier onto Vout to restore the gain you need. Be aware of common mode problems with this type of circuit - you'll probably need to use 0.1% (or better) resistors to get an accurate representation of your 1-5V signal.
The voltages at the input terminals must be within the common mode input range of the op-amp, and the output must of course not exceed maximum output range. Unfortunately, all the 741 data sheets I can find don't actually have the common mode input range specced. I'd avoid that op-amp anyway, and move to a rail to rail for what little I know about your application
99,411
Maybe someone has experience in this field. I'd like to overmold a PCBA, which has SMT components, with a low pressure molding process. I am concerned about the temperature of the hotmelt material when it reaches the PCBA. The temperature should be between 200°C and 215°C. Does anyone know if this material temperature could be a problem for the electronic components? Do I have the risk that the solder melts? Is this stress too harmful for the components? I am not quite sure if the components will be able to withstand this temperature or if I should take as a reference the reflow temperatures of the components.
2014/02/11
[ "https://electronics.stackexchange.com/questions/99411", "https://electronics.stackexchange.com", "https://electronics.stackexchange.com/users/37013/" ]
unlike Andy's answear i wouldn't use input resistors on your input. they add [noise](http://en.wikipedia.org/wiki/Johnson%E2%80%93Nyquist_noise) to your signal. of course its depending on your application. what i would use is something like an [AD8479](http://www.analog.com/static/imported-files/data_sheets/AD8479.PDF) which is exactly what i think you want. high input offset voltage is the keyword here
The voltages at the input terminals must be within the common mode input range of the op-amp, and the output must of course not exceed maximum output range. Unfortunately, all the 741 data sheets I can find don't actually have the common mode input range specced. I'd avoid that op-amp anyway, and move to a rail to rail for what little I know about your application
71,586
I own a domain, which I will call example.com. In June, I received an email, purporting to be from the Play Station Network, addresses to first.last@example.com. (I receive all the email for the domain. "First" and "Last" are distinctive names which are not my name.) It was an account registration confirmation. I wasn't sure how anyone could have signed up as first.last@example.com, as it's my domain and most web sites require a confirmation link to be clicked. I changed all my passwords, just in case. first.last@example.com then opened a PayPal account and has been successfully sending small (~$10) payments to MicroSoft Payments and other vendors. No money has been stolen from me, yet, so I have no reason to involve the police. I sent these emails to PayPal's fraud address, but I was ignored. Today, I have received multiple emails from PayPal saying that "my" bank has declined payments. Once again, no money has been stolen from me. What is going on? I am nervous that I am being targeted for a scam. Thoughts: 1. If they actually had access to my email account, they could have reset my passwords and stolen a few domains from me. This has not happened. 2. Are any of the emails that I've received at first.last@example.com actually from the purported senders? They all seem to come through mail2world.com and have a open, red padlock in gmail. 3. Who can I contact about this to have it stopped? PayPal do not respond. Should I contact the companies they've paid?
2016/10/10
[ "https://money.stackexchange.com/questions/71586", "https://money.stackexchange.com", "https://money.stackexchange.com/users/49295/" ]
You've already done what's necessary, by not confirming the subscription request. The only thing you know has happened is that someone typed your user ID into a registration field, which could just have been a typing error. Nothing else appears to be at risk.
> > No money has been stolen from me, yet, so I have no reason to involve the police. > > > Attempting to commit a crime can be reported. This is no different from someone planning to rob a bank, but not done yet. Agreed that given your scenario police may not act. Best is block email on domain. You may be using some mail service. Generally the emailid is restricted. It is unclear how the scammer got some control of email address. Possible some sites don't verify the email via link, or the scammer used alternative method to authenticate the email.
71,586
I own a domain, which I will call example.com. In June, I received an email, purporting to be from the Play Station Network, addresses to first.last@example.com. (I receive all the email for the domain. "First" and "Last" are distinctive names which are not my name.) It was an account registration confirmation. I wasn't sure how anyone could have signed up as first.last@example.com, as it's my domain and most web sites require a confirmation link to be clicked. I changed all my passwords, just in case. first.last@example.com then opened a PayPal account and has been successfully sending small (~$10) payments to MicroSoft Payments and other vendors. No money has been stolen from me, yet, so I have no reason to involve the police. I sent these emails to PayPal's fraud address, but I was ignored. Today, I have received multiple emails from PayPal saying that "my" bank has declined payments. Once again, no money has been stolen from me. What is going on? I am nervous that I am being targeted for a scam. Thoughts: 1. If they actually had access to my email account, they could have reset my passwords and stolen a few domains from me. This has not happened. 2. Are any of the emails that I've received at first.last@example.com actually from the purported senders? They all seem to come through mail2world.com and have a open, red padlock in gmail. 3. Who can I contact about this to have it stopped? PayPal do not respond. Should I contact the companies they've paid?
2016/10/10
[ "https://money.stackexchange.com/questions/71586", "https://money.stackexchange.com", "https://money.stackexchange.com/users/49295/" ]
You've already done what's necessary, by not confirming the subscription request. The only thing you know has happened is that someone typed your user ID into a registration field, which could just have been a typing error. Nothing else appears to be at risk.
It's hard to say if this is a scam or not because of the, um, free-wheeling way PayPal does things. Someone recently opened a Paypal account using a secondary email address of mine (one that Comcast forced me to create, and which was in a recent breach). Paypal *does not confirm* they have access to the email, but lets them set up an account and add a phone number for confirmation, making it impossible for me to just reset the password and close the account. Paypal is remarkably reluctant to do anything about this; I've not been able to get them to do anything at all in several months. So far the person using the account has not defrauded anyone, but who knows. Try calling Paypal and insisting to speak to someone in the fraud department, and mention that you are planning to report this to your local police or the FBI if they don't do something about it. Maybe you'll have better luck.
71,586
I own a domain, which I will call example.com. In June, I received an email, purporting to be from the Play Station Network, addresses to first.last@example.com. (I receive all the email for the domain. "First" and "Last" are distinctive names which are not my name.) It was an account registration confirmation. I wasn't sure how anyone could have signed up as first.last@example.com, as it's my domain and most web sites require a confirmation link to be clicked. I changed all my passwords, just in case. first.last@example.com then opened a PayPal account and has been successfully sending small (~$10) payments to MicroSoft Payments and other vendors. No money has been stolen from me, yet, so I have no reason to involve the police. I sent these emails to PayPal's fraud address, but I was ignored. Today, I have received multiple emails from PayPal saying that "my" bank has declined payments. Once again, no money has been stolen from me. What is going on? I am nervous that I am being targeted for a scam. Thoughts: 1. If they actually had access to my email account, they could have reset my passwords and stolen a few domains from me. This has not happened. 2. Are any of the emails that I've received at first.last@example.com actually from the purported senders? They all seem to come through mail2world.com and have a open, red padlock in gmail. 3. Who can I contact about this to have it stopped? PayPal do not respond. Should I contact the companies they've paid?
2016/10/10
[ "https://money.stackexchange.com/questions/71586", "https://money.stackexchange.com", "https://money.stackexchange.com/users/49295/" ]
You've already done what's necessary, by not confirming the subscription request. The only thing you know has happened is that someone typed your user ID into a registration field, which could just have been a typing error. Nothing else appears to be at risk.
The one question that hasn't been answered is how did they fake the email from your domain. That is very simple - they used what's called an open relay. An open relay server (most email servers are configured not to do this) will allow emails to be sent from wherever without verification. Think of it as like sending a letter to someone and writing a return address on the envelope - no one can verify this. I could send an email from bill.gates@microsoft.com using an open relay. When you look at the headers of the message, you'll see the origin of the email which will most likely be an IP address.
71,586
I own a domain, which I will call example.com. In June, I received an email, purporting to be from the Play Station Network, addresses to first.last@example.com. (I receive all the email for the domain. "First" and "Last" are distinctive names which are not my name.) It was an account registration confirmation. I wasn't sure how anyone could have signed up as first.last@example.com, as it's my domain and most web sites require a confirmation link to be clicked. I changed all my passwords, just in case. first.last@example.com then opened a PayPal account and has been successfully sending small (~$10) payments to MicroSoft Payments and other vendors. No money has been stolen from me, yet, so I have no reason to involve the police. I sent these emails to PayPal's fraud address, but I was ignored. Today, I have received multiple emails from PayPal saying that "my" bank has declined payments. Once again, no money has been stolen from me. What is going on? I am nervous that I am being targeted for a scam. Thoughts: 1. If they actually had access to my email account, they could have reset my passwords and stolen a few domains from me. This has not happened. 2. Are any of the emails that I've received at first.last@example.com actually from the purported senders? They all seem to come through mail2world.com and have a open, red padlock in gmail. 3. Who can I contact about this to have it stopped? PayPal do not respond. Should I contact the companies they've paid?
2016/10/10
[ "https://money.stackexchange.com/questions/71586", "https://money.stackexchange.com", "https://money.stackexchange.com/users/49295/" ]
You've been targeted by an attempt of phishing. Nowadays it's quite easy to fake an email from PayPal etc. So they're trying to make you believe that you need to click on the links from PayPal and login to figure out what's going on. Don't ever do that. If you did, change all your passwords quickly.
> > No money has been stolen from me, yet, so I have no reason to involve the police. > > > Attempting to commit a crime can be reported. This is no different from someone planning to rob a bank, but not done yet. Agreed that given your scenario police may not act. Best is block email on domain. You may be using some mail service. Generally the emailid is restricted. It is unclear how the scammer got some control of email address. Possible some sites don't verify the email via link, or the scammer used alternative method to authenticate the email.
71,586
I own a domain, which I will call example.com. In June, I received an email, purporting to be from the Play Station Network, addresses to first.last@example.com. (I receive all the email for the domain. "First" and "Last" are distinctive names which are not my name.) It was an account registration confirmation. I wasn't sure how anyone could have signed up as first.last@example.com, as it's my domain and most web sites require a confirmation link to be clicked. I changed all my passwords, just in case. first.last@example.com then opened a PayPal account and has been successfully sending small (~$10) payments to MicroSoft Payments and other vendors. No money has been stolen from me, yet, so I have no reason to involve the police. I sent these emails to PayPal's fraud address, but I was ignored. Today, I have received multiple emails from PayPal saying that "my" bank has declined payments. Once again, no money has been stolen from me. What is going on? I am nervous that I am being targeted for a scam. Thoughts: 1. If they actually had access to my email account, they could have reset my passwords and stolen a few domains from me. This has not happened. 2. Are any of the emails that I've received at first.last@example.com actually from the purported senders? They all seem to come through mail2world.com and have a open, red padlock in gmail. 3. Who can I contact about this to have it stopped? PayPal do not respond. Should I contact the companies they've paid?
2016/10/10
[ "https://money.stackexchange.com/questions/71586", "https://money.stackexchange.com", "https://money.stackexchange.com/users/49295/" ]
You've been targeted by an attempt of phishing. Nowadays it's quite easy to fake an email from PayPal etc. So they're trying to make you believe that you need to click on the links from PayPal and login to figure out what's going on. Don't ever do that. If you did, change all your passwords quickly.
It's hard to say if this is a scam or not because of the, um, free-wheeling way PayPal does things. Someone recently opened a Paypal account using a secondary email address of mine (one that Comcast forced me to create, and which was in a recent breach). Paypal *does not confirm* they have access to the email, but lets them set up an account and add a phone number for confirmation, making it impossible for me to just reset the password and close the account. Paypal is remarkably reluctant to do anything about this; I've not been able to get them to do anything at all in several months. So far the person using the account has not defrauded anyone, but who knows. Try calling Paypal and insisting to speak to someone in the fraud department, and mention that you are planning to report this to your local police or the FBI if they don't do something about it. Maybe you'll have better luck.
71,586
I own a domain, which I will call example.com. In June, I received an email, purporting to be from the Play Station Network, addresses to first.last@example.com. (I receive all the email for the domain. "First" and "Last" are distinctive names which are not my name.) It was an account registration confirmation. I wasn't sure how anyone could have signed up as first.last@example.com, as it's my domain and most web sites require a confirmation link to be clicked. I changed all my passwords, just in case. first.last@example.com then opened a PayPal account and has been successfully sending small (~$10) payments to MicroSoft Payments and other vendors. No money has been stolen from me, yet, so I have no reason to involve the police. I sent these emails to PayPal's fraud address, but I was ignored. Today, I have received multiple emails from PayPal saying that "my" bank has declined payments. Once again, no money has been stolen from me. What is going on? I am nervous that I am being targeted for a scam. Thoughts: 1. If they actually had access to my email account, they could have reset my passwords and stolen a few domains from me. This has not happened. 2. Are any of the emails that I've received at first.last@example.com actually from the purported senders? They all seem to come through mail2world.com and have a open, red padlock in gmail. 3. Who can I contact about this to have it stopped? PayPal do not respond. Should I contact the companies they've paid?
2016/10/10
[ "https://money.stackexchange.com/questions/71586", "https://money.stackexchange.com", "https://money.stackexchange.com/users/49295/" ]
You've been targeted by an attempt of phishing. Nowadays it's quite easy to fake an email from PayPal etc. So they're trying to make you believe that you need to click on the links from PayPal and login to figure out what's going on. Don't ever do that. If you did, change all your passwords quickly.
The one question that hasn't been answered is how did they fake the email from your domain. That is very simple - they used what's called an open relay. An open relay server (most email servers are configured not to do this) will allow emails to be sent from wherever without verification. Think of it as like sending a letter to someone and writing a return address on the envelope - no one can verify this. I could send an email from bill.gates@microsoft.com using an open relay. When you look at the headers of the message, you'll see the origin of the email which will most likely be an IP address.
494,425
Below solid black curve is the bandwidth of a signal(a 4kHz RC low pass filter). And when we sample the signal at 8kHz rate due to folding the blue dashed line shows the aliasing: [![enter image description here](https://i.stack.imgur.com/8xvGb.png)](https://i.stack.imgur.com/8xvGb.png) 1-) It looks very symmetric but how can we calculate the overall shape of the original bandwidth plus the aliasing? Should we add or multiply these curves? 2-) And from [here](https://www.wescottdesign.com/articles/Sampling/sampling.pdf) I found the above curve which the author is able to quantify **50:1 signal energy to alias ratio**. What is meant by that and how can that be calculated?
2020/04/20
[ "https://electronics.stackexchange.com/questions/494425", "https://electronics.stackexchange.com", "https://electronics.stackexchange.com/users/161776/" ]
You add the energies in the signal and aliased curves. Now if you assume the aliasing is completely de-correlated with the signal, you can treat them as two independent sources (like a "random walk" with 2 steps in statistics) you can use an RMS summation of the amplitudes. Since the crossover at 4 kHz has both amplitudes as 0.7, or -3dB, the result is simply a flat line at 1 independent of frequency. But it's a dangerous assumption and probably wrong for certain signals, so it's worth considering a worst case scenario, where the aliasing is perfectly correlated and in phase with the signal : in this case you can add amplitudes, giving a peak of 1.4 (+3dB) at 4 kHz. With regard to: > > Can you fix this problem by increasing the filter order? Not really. Figure 7 on page 10 shows the result of using a 6th-order Butterworth low pass filter instead of a 1st-order filter. We’ve improved the situation > > > Well he's right : you can't fix the problem simply by increasing filter order. You can improve it (decreasing the "alias" energy below 4 kHz and narrowing the +3dB peak in the worst case, thus decreasing its area). Thus you have improved the situation somewhat, but not fixed it. A fix : if you need to reduce the aliasing energy below some level : would involve reducing the filter cutoff frequency - as well as optionally increasing the order - such that the attenuation at Fs/2 (4 kHz here) met your target. And regarding comments to the other answer : aliasing below 4 kHz is the system response (due to the sampling process) to energy after the filter above 4 kHz. (which btw sounds nasty). Aliasing at 7 kHz is huge because the filter has no attenuation at 1 kHz. It would also sound nasty but will be removed by the DAC's reconstruction filter.
> > It looks very symmetric but how can we calculate the overall shape of the original bandwidth plus the aliasing? Should we add or multiply these curves? > > > Neither! This is just an amplitude spectrum plot. There's nothing said about the phase of the signals at the individual frequencies. For example, if the signal at originally 12 kHz was highly correlated, in that it was the same, but with a negative sign, as the signal at 4 kHz, the sum of nyquist zone + alias would cancel out. If it was in-phase, it would constructively add. If we assume the signal to be uncorrelated, e.g. by being white noise, OK; the powers would add. Powers adding up means you get the square root of the resulting power as amplitude; so not even in that case could you just add the amplitude graphs. (That's one of the practical reasons why we use *power* spectral densities and not *amplitude* spectral densities to describe stochastic signals, by the way.)
10,438,158
I have a product which bootloader and application are compiled using a compiler (gnuarm GCC 4.1.1) that generates "arm-elf". The bootloader and application are segregated in different FLASH memory areas in the linker script. The application has a feature that enables it to call the bootloader (as a simple c-function with 2 parameters). I need to be able to upgrade existing products around the world, and I can safely do this using always the same compiler. Now I'd like to be able to compile this product application using a new GCC version that outputs arm-eabi. Everything will be fine for new products, where both application and bootloader are compiled using the same toolchain, but what happens with existing products? If I flash a new application, compiled with GCC 4.6.x and arm-none-eabi, will my application still be able to call the bootloader function from the old arm-elf bootloader? --- Furthermore, not directly related to the above question, can I mix object files compiled with arm-elf into a binary compiled with arm-eabi? --- EDIT: I think is good to make clear I am building for a bare metal ARM7, if it makes any difference...
2012/05/03
[ "https://Stackoverflow.com/questions/10438158", "https://Stackoverflow.com", "https://Stackoverflow.com/users/466339/" ]
No. An ABI is the magic that makes binaries compatible. The Application Binary Interface determines various conventions on how to communicate with other libraries/applications. For example, an ABI will define calling convention, which makes implicit assumptions about things like which registers are used for passing arguments to C functions, and how to deal with excess arguments. I don't know the exact differences between EABI and ABI, but you can find some of them by reading up on EABI. [Debian's page](http://wiki.debian.org/ArmEabiPort) mentions the syscall convention is different, along with some alignment changes. Given the above, of course, you cannot mix arm-elf and arm-eabi objects. The above answer is given on the assumption that you talk to the bootloader code in your main application. Given that the interface may be very simple (just a function call with two parameters), it's possible that it might work. It'd be an interesting experiment to try. However, it is not \*\* guaranteed\*\* to work. Please keep in mind you do not have to use EABI. You can generate an arm-elf toolchain with gcc 4.6 just as well as with older versions. Since you're using a binary toolchain on windows, you may have more of a challenge. I'd suggest investigating [crosstool-ng](http://crosstool-ng.org/), which works quite well on Linux, and may work okay on cygwin to build the appropriate toolchain.
I *Think* that this will be OK. I did a migration something like this myself, from what I remember I only ran into a problem to do with handling division. [This is the best info I can find about the differences](http://wiki.debian.org/ArmEabiPort), it suggests that if you don't have struct alignment issues, you may be OK.
10,438,158
I have a product which bootloader and application are compiled using a compiler (gnuarm GCC 4.1.1) that generates "arm-elf". The bootloader and application are segregated in different FLASH memory areas in the linker script. The application has a feature that enables it to call the bootloader (as a simple c-function with 2 parameters). I need to be able to upgrade existing products around the world, and I can safely do this using always the same compiler. Now I'd like to be able to compile this product application using a new GCC version that outputs arm-eabi. Everything will be fine for new products, where both application and bootloader are compiled using the same toolchain, but what happens with existing products? If I flash a new application, compiled with GCC 4.6.x and arm-none-eabi, will my application still be able to call the bootloader function from the old arm-elf bootloader? --- Furthermore, not directly related to the above question, can I mix object files compiled with arm-elf into a binary compiled with arm-eabi? --- EDIT: I think is good to make clear I am building for a bare metal ARM7, if it makes any difference...
2012/05/03
[ "https://Stackoverflow.com/questions/10438158", "https://Stackoverflow.com", "https://Stackoverflow.com/users/466339/" ]
There is always the option of making the call to bootloader in inline assembly, in which case you can adhere to any calling standard you need :). However, besides the portability issue it introduces, this approach will also make two assumptions about your bootloader and application: * you are able to detect in your app that a particular device has a bootloader built with your non-EABI toolchain, as you can only call the older type bootloader using the assembly code. * the two parameters you mentioned are used as primitive data by your bootloader. Should the bootloader use them, for example, as pointers to structs then you could be facing issues with incorrect alignment, padding and so forth.
I *Think* that this will be OK. I did a migration something like this myself, from what I remember I only ran into a problem to do with handling division. [This is the best info I can find about the differences](http://wiki.debian.org/ArmEabiPort), it suggests that if you don't have struct alignment issues, you may be OK.
226,786
In the following sentence: > > By the year 2050, we will have 10 billion people on our planet. Linking this rise to the ‘what’ and ‘how’ of feeding the entire population in a sustainable manner is what **got Varun Deshpande and Ramya Ramamurthy of the US-based Good Food Institute’s (GFI) India chapter started on creating their new podcast, Feeding 10 Billion**. “Our food system is broken. The greenhouse gases emitted by industrial animal agriculture are more than the emissions by all forms of transportation combined. However, demand for meat continues to rise, and telling people what they should eat or guilting them into giving up meat doesn’t work,” says Ramamurthy, adding that the way forward is to offer people protein made in a better way. > > > **got somebody on doing something** I think this usage is wrong, because it is usually used as **get somebody to do something/get somebody doing something**. Also I don’t understand meaning of the term **India chapter started**
2019/10/05
[ "https://ell.stackexchange.com/questions/226786", "https://ell.stackexchange.com", "https://ell.stackexchange.com/users/-1/" ]
You've mis-parsed this. "started" is part of the phrase you're confused about: it's "got somebody started on doing something". It's not part of "India chapter". You might rewrite this as: > > Varun Deshpande and Ramya Ramamurthy are members of the India chapter of the US-based Good Food Institute’s (GFI). > > > Linking this rise to the ‘what’ and ‘how’ of feeding the entire population in a sustainable manner is what got them started on creating their new podcast, Feeding 10 Billion. > > >
[...] got Varun Deshpande and Ramya Ramamurthy of the US-based Good Food Institute’s (GFI) India chapter started on creating their new podcast, Feeding 10 Billion. I am removing where these guys work to show the usage: [...] **got** Varun Deshpande and Ramya Ramamurthy started on[...] creating their new podcast, Feeding 10 Billion. **got them started on their new podcast** means: caused them to start doing it. Another example: Person 1: What got you started on writing? Person 2: Answer: Reading great authors. Now: US-based Good Food Institute’s (GFI) India chapter means: The India Chapter of the Good Food Institute. written in the question in the possessive form. The phrase is: to get started on doing something I got started on answering this question five minutes ago.
40,837,759
The subject pretty much speaks for itself, but I am quite confident that if I deploy a standard Web API to an Azure web site, it will work without issue using standard forms authentication. So I assume an Azure API app has some added extra's, like security and other services. What does an Azure app offer me that a standard one doesn't, and if not using the extras, is there any reason to create an Azure app especially for deployment to Azure?
2016/11/28
[ "https://Stackoverflow.com/questions/40837759", "https://Stackoverflow.com", "https://Stackoverflow.com/users/8741/" ]
Azure API Management is a way to publish and consume your Web APIs, it enables you to categorize your APIs, create segments and add pricing for each segment, it also offers many other features like caching, throttling, and format conversion. All of these features can be enabled by some manipulation of a simple XML file. API Apps allow you to host your APIs, monitor it and easily deploy your Web APIs to Azure. So, you can assume that it is an addition to Web API
**Web Apps** and **API Apps** are both part of **App Service**. They are both web hosting platforms. And as you said, a Web API will work just fine in a Web App. Before, API Apps had certain features that Web Apps did not, though that has changed. Web Apps also support e.g. Swagger definitions now. The difference between the two at present time is the icon. That's what it says in the documentation.
582,782
I am working on a photo site and one of more active users asked about pushing content to cell phones. The site is built on django, and I was wondering if anyone knows a **good way of allowing users to download and store content (images) on their cell phones**? As a side question... is it possible to accept payment for the content via the cell phone or would that have to take place on the site?
2009/02/24
[ "https://Stackoverflow.com/questions/582782", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2908/" ]
I enjoyed [these dot net rocks tv videos by Mark Miller on The Science of a Great User Experience](http://www.dnrtv.com/default.aspx?showNum=112) really got me thinking about good ui: <http://www.dnrtv.com/default.aspx?showNum=112> <http://www.dnrtv.com/default.aspx?showNum=123>
If you want to concentrate on just one feature, have a look at ITunes' search box which filters as you type. Other software may have had this before, but this was I think the first place I encountered it. The difference between this and classic search was an eye opener for me in terms of readability. Auto-complete which you see in so many places is another one. I'd recommend IntelliJ IDEA for the way it took auto-completion which emacs, Visual studio etc had for ages and added autocompletion for variable names and method names in a manner which almost seemed psychic the first time you encountered it.
582,782
I am working on a photo site and one of more active users asked about pushing content to cell phones. The site is built on django, and I was wondering if anyone knows a **good way of allowing users to download and store content (images) on their cell phones**? As a side question... is it possible to accept payment for the content via the cell phone or would that have to take place on the site?
2009/02/24
[ "https://Stackoverflow.com/questions/582782", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2908/" ]
I enjoyed [these dot net rocks tv videos by Mark Miller on The Science of a Great User Experience](http://www.dnrtv.com/default.aspx?showNum=112) really got me thinking about good ui: <http://www.dnrtv.com/default.aspx?showNum=112> <http://www.dnrtv.com/default.aspx?showNum=123>
Google for HIG. Human Interface Guidelines typically include lots of research into best-practice in user interfaces, and explain in great detail how to design each aspect of a program. Also, have a google for "user-interface hall of shame" or something like that.
582,782
I am working on a photo site and one of more active users asked about pushing content to cell phones. The site is built on django, and I was wondering if anyone knows a **good way of allowing users to download and store content (images) on their cell phones**? As a side question... is it possible to accept payment for the content via the cell phone or would that have to take place on the site?
2009/02/24
[ "https://Stackoverflow.com/questions/582782", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2908/" ]
If you want to concentrate on just one feature, have a look at ITunes' search box which filters as you type. Other software may have had this before, but this was I think the first place I encountered it. The difference between this and classic search was an eye opener for me in terms of readability. Auto-complete which you see in so many places is another one. I'd recommend IntelliJ IDEA for the way it took auto-completion which emacs, Visual studio etc had for ages and added autocompletion for variable names and method names in a manner which almost seemed psychic the first time you encountered it.
You can check case studys on websites of GUI companys. I fund few at [www.puzzlehead.com](http://www.puzzlehead.com) Check there and also other sites.
582,782
I am working on a photo site and one of more active users asked about pushing content to cell phones. The site is built on django, and I was wondering if anyone knows a **good way of allowing users to download and store content (images) on their cell phones**? As a side question... is it possible to accept payment for the content via the cell phone or would that have to take place on the site?
2009/02/24
[ "https://Stackoverflow.com/questions/582782", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2908/" ]
You can look at [Thirteen23 Experiences](http://www.thirteen23.com/experiences/)
You can check case studys on websites of GUI companys. I fund few at [www.puzzlehead.com](http://www.puzzlehead.com) Check there and also other sites.
582,782
I am working on a photo site and one of more active users asked about pushing content to cell phones. The site is built on django, and I was wondering if anyone knows a **good way of allowing users to download and store content (images) on their cell phones**? As a side question... is it possible to accept payment for the content via the cell phone or would that have to take place on the site?
2009/02/24
[ "https://Stackoverflow.com/questions/582782", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2908/" ]
Where you can really make a difference with GUI design is if you are addressing a difficult to understand concept in a GUI. When you are doing that, creativity is critical. When dealing with complex hardware configurations (something I had to do a lot, but probably doesn't apply to you), I've had good luck going to tech manuals and tech support people and trying to completely understand the problem. Then I took the methods they used to show me (diagrams from the manuals, whiteboard drawings, etc) and tried to code them into a GUI. Had a couple massive successes with this. Iteration is also critical. Prototype something quickly then beg everyone you see to try it. Ask them to solve a problem, then watch where they go first and watch what they have problems with. Address every problem and stumbling block. Don't be afraid to throw it all away and start over, it was only prototype code. Separate your GUI from your implementation so that you can swap out the GUI if you find a better approach.
To make things usable, you need to make sure that you follow existing conventions for your target platform and application type. For example, if you're developing a Windows App you'd better make sure that control-c copies, control-v pastes, control-s saves, etc. The File menu better be the leftmost item in the menu bar, and the Help menu better by the rightmost item. If you don't follow existing conventions, users are going to get annoyed with your application very quickly.
582,782
I am working on a photo site and one of more active users asked about pushing content to cell phones. The site is built on django, and I was wondering if anyone knows a **good way of allowing users to download and store content (images) on their cell phones**? As a side question... is it possible to accept payment for the content via the cell phone or would that have to take place on the site?
2009/02/24
[ "https://Stackoverflow.com/questions/582782", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2908/" ]
Where you can really make a difference with GUI design is if you are addressing a difficult to understand concept in a GUI. When you are doing that, creativity is critical. When dealing with complex hardware configurations (something I had to do a lot, but probably doesn't apply to you), I've had good luck going to tech manuals and tech support people and trying to completely understand the problem. Then I took the methods they used to show me (diagrams from the manuals, whiteboard drawings, etc) and tried to code them into a GUI. Had a couple massive successes with this. Iteration is also critical. Prototype something quickly then beg everyone you see to try it. Ask them to solve a problem, then watch where they go first and watch what they have problems with. Address every problem and stumbling block. Don't be afraid to throw it all away and start over, it was only prototype code. Separate your GUI from your implementation so that you can swap out the GUI if you find a better approach.
You can check case studys on websites of GUI companys. I fund few at [www.puzzlehead.com](http://www.puzzlehead.com) Check there and also other sites.
582,782
I am working on a photo site and one of more active users asked about pushing content to cell phones. The site is built on django, and I was wondering if anyone knows a **good way of allowing users to download and store content (images) on their cell phones**? As a side question... is it possible to accept payment for the content via the cell phone or would that have to take place on the site?
2009/02/24
[ "https://Stackoverflow.com/questions/582782", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2908/" ]
Google for HIG. Human Interface Guidelines typically include lots of research into best-practice in user interfaces, and explain in great detail how to design each aspect of a program. Also, have a google for "user-interface hall of shame" or something like that.
You can check case studys on websites of GUI companys. I fund few at [www.puzzlehead.com](http://www.puzzlehead.com) Check there and also other sites.
582,782
I am working on a photo site and one of more active users asked about pushing content to cell phones. The site is built on django, and I was wondering if anyone knows a **good way of allowing users to download and store content (images) on their cell phones**? As a side question... is it possible to accept payment for the content via the cell phone or would that have to take place on the site?
2009/02/24
[ "https://Stackoverflow.com/questions/582782", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2908/" ]
Where you can really make a difference with GUI design is if you are addressing a difficult to understand concept in a GUI. When you are doing that, creativity is critical. When dealing with complex hardware configurations (something I had to do a lot, but probably doesn't apply to you), I've had good luck going to tech manuals and tech support people and trying to completely understand the problem. Then I took the methods they used to show me (diagrams from the manuals, whiteboard drawings, etc) and tried to code them into a GUI. Had a couple massive successes with this. Iteration is also critical. Prototype something quickly then beg everyone you see to try it. Ask them to solve a problem, then watch where they go first and watch what they have problems with. Address every problem and stumbling block. Don't be afraid to throw it all away and start over, it was only prototype code. Separate your GUI from your implementation so that you can swap out the GUI if you find a better approach.
Google for HIG. Human Interface Guidelines typically include lots of research into best-practice in user interfaces, and explain in great detail how to design each aspect of a program. Also, have a google for "user-interface hall of shame" or something like that.
582,782
I am working on a photo site and one of more active users asked about pushing content to cell phones. The site is built on django, and I was wondering if anyone knows a **good way of allowing users to download and store content (images) on their cell phones**? As a side question... is it possible to accept payment for the content via the cell phone or would that have to take place on the site?
2009/02/24
[ "https://Stackoverflow.com/questions/582782", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2908/" ]
I enjoyed [these dot net rocks tv videos by Mark Miller on The Science of a Great User Experience](http://www.dnrtv.com/default.aspx?showNum=112) really got me thinking about good ui: <http://www.dnrtv.com/default.aspx?showNum=112> <http://www.dnrtv.com/default.aspx?showNum=123>
To make things usable, you need to make sure that you follow existing conventions for your target platform and application type. For example, if you're developing a Windows App you'd better make sure that control-c copies, control-v pastes, control-s saves, etc. The File menu better be the leftmost item in the menu bar, and the Help menu better by the rightmost item. If you don't follow existing conventions, users are going to get annoyed with your application very quickly.
582,782
I am working on a photo site and one of more active users asked about pushing content to cell phones. The site is built on django, and I was wondering if anyone knows a **good way of allowing users to download and store content (images) on their cell phones**? As a side question... is it possible to accept payment for the content via the cell phone or would that have to take place on the site?
2009/02/24
[ "https://Stackoverflow.com/questions/582782", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2908/" ]
Where you can really make a difference with GUI design is if you are addressing a difficult to understand concept in a GUI. When you are doing that, creativity is critical. When dealing with complex hardware configurations (something I had to do a lot, but probably doesn't apply to you), I've had good luck going to tech manuals and tech support people and trying to completely understand the problem. Then I took the methods they used to show me (diagrams from the manuals, whiteboard drawings, etc) and tried to code them into a GUI. Had a couple massive successes with this. Iteration is also critical. Prototype something quickly then beg everyone you see to try it. Ask them to solve a problem, then watch where they go first and watch what they have problems with. Address every problem and stumbling block. Don't be afraid to throw it all away and start over, it was only prototype code. Separate your GUI from your implementation so that you can swap out the GUI if you find a better approach.
If you want to concentrate on just one feature, have a look at ITunes' search box which filters as you type. Other software may have had this before, but this was I think the first place I encountered it. The difference between this and classic search was an eye opener for me in terms of readability. Auto-complete which you see in so many places is another one. I'd recommend IntelliJ IDEA for the way it took auto-completion which emacs, Visual studio etc had for ages and added autocompletion for variable names and method names in a manner which almost seemed psychic the first time you encountered it.
4,562,502
I have seen similar posts but couldn't find any answer.. Kindly advise whether its possible or not?
2010/12/30
[ "https://Stackoverflow.com/questions/4562502", "https://Stackoverflow.com", "https://Stackoverflow.com/users/-1/" ]
Are you talking about 3rd party applications or the inbuilt applications of the iPhone? If you are talking about 3rd party application then forget it.. As told by @KingOfBliss apple restricts it. And if you want to open inbuilt applications like camera, photo, contacts,safari web then you can do it. You can get sample code for implementing all these from [here](http://developer.apple.com/library/ios/navigation/#section=Resource%20Types&topic=Sample%20Code)... Hope it helps... hAPPY iCODING...
Apple restrict you to open 3rd party application, but you can open some application like safari,contacts,etc.,
4,562,502
I have seen similar posts but couldn't find any answer.. Kindly advise whether its possible or not?
2010/12/30
[ "https://Stackoverflow.com/questions/4562502", "https://Stackoverflow.com", "https://Stackoverflow.com/users/-1/" ]
Applications can register a custom URL format, and then other applications can call that URL to trigger that application, pass it data, etc. Some of Apple's built-ins have URL formats that they've published, and some 3rd party apps have (and advertise) them too. If you're building more than one app, you can obviously customize your URL scheme to have your apps talk to each other more or less freely.
Apple restrict you to open 3rd party application, but you can open some application like safari,contacts,etc.,
4,562,502
I have seen similar posts but couldn't find any answer.. Kindly advise whether its possible or not?
2010/12/30
[ "https://Stackoverflow.com/questions/4562502", "https://Stackoverflow.com", "https://Stackoverflow.com/users/-1/" ]
Are you talking about 3rd party applications or the inbuilt applications of the iPhone? If you are talking about 3rd party application then forget it.. As told by @KingOfBliss apple restricts it. And if you want to open inbuilt applications like camera, photo, contacts,safari web then you can do it. You can get sample code for implementing all these from [here](http://developer.apple.com/library/ios/navigation/#section=Resource%20Types&topic=Sample%20Code)... Hope it helps... hAPPY iCODING...
Applications can register a custom URL format, and then other applications can call that URL to trigger that application, pass it data, etc. Some of Apple's built-ins have URL formats that they've published, and some 3rd party apps have (and advertise) them too. If you're building more than one app, you can obviously customize your URL scheme to have your apps talk to each other more or less freely.
15,927
I already tried this <http://hg.orfeo-toolbox.org/OTB-Qgis-plugins/> repository and couldn't get it... This guy seems to have it: <http://www.elance.com/samples/orfeo-toolbox-qgis/24111664/>
2011/10/19
[ "https://gis.stackexchange.com/questions/15927", "https://gis.stackexchange.com", "https://gis.stackexchange.com/users/3530/" ]
I did it following this: <http://wiki.orfeo-toolbox.org/index.php/Quantum_GIS_access_to_OTB_applications>
Here are some resources that answer your question: <http://wiki.orfeo-toolbox.org/index.php/Quantum_GIS_plugins> <http://osgeo-org.1803224.n2.nabble.com/Is-there-a-way-of-installing-the-qgis-plugin-for-ORFEO-Toolbox-OTB-td5963420.html>
15,927
I already tried this <http://hg.orfeo-toolbox.org/OTB-Qgis-plugins/> repository and couldn't get it... This guy seems to have it: <http://www.elance.com/samples/orfeo-toolbox-qgis/24111664/>
2011/10/19
[ "https://gis.stackexchange.com/questions/15927", "https://gis.stackexchange.com", "https://gis.stackexchange.com/users/3530/" ]
I did it following this: <http://wiki.orfeo-toolbox.org/index.php/Quantum_GIS_access_to_OTB_applications>
I've been struggling trying to make OTB work on QGIS 3.18.1-Zürich running on a GNU/Linux Debian machine. I finally succeeded, so I guess I'll share my experience here, since it wasn't really obvious. I have all OTB packages installed by the apt package management system, and the binaries and libraries are located in /usr/bin/ and in /usr/lib/x86\_64-linux-gnu/otb/applications/ I enabled OTB in the QGIS options dialog box: [![QGIS options parameters dialog box](https://i.stack.imgur.com/OgAMK.png)](https://i.stack.imgur.com/OgAMK.png) The **tricky part** was **not** to put "/usr/bin/" in the "OTB directory" ("Répertoire OTB" on my French version) where the OTB binaries are actually located, but simply "/usr/". It took me a long while to figure this out. Hope this may help others.
15,927
I already tried this <http://hg.orfeo-toolbox.org/OTB-Qgis-plugins/> repository and couldn't get it... This guy seems to have it: <http://www.elance.com/samples/orfeo-toolbox-qgis/24111664/>
2011/10/19
[ "https://gis.stackexchange.com/questions/15927", "https://gis.stackexchange.com", "https://gis.stackexchange.com/users/3530/" ]
Here are some resources that answer your question: <http://wiki.orfeo-toolbox.org/index.php/Quantum_GIS_plugins> <http://osgeo-org.1803224.n2.nabble.com/Is-there-a-way-of-installing-the-qgis-plugin-for-ORFEO-Toolbox-OTB-td5963420.html>
The right way is to install the new analysis framework and then the (new) plugins for Orfeo (and SAGA). Announcement and instructions: <http://lists.osgeo.org/pipermail/qgis-user/2011-October/013923.html>
15,927
I already tried this <http://hg.orfeo-toolbox.org/OTB-Qgis-plugins/> repository and couldn't get it... This guy seems to have it: <http://www.elance.com/samples/orfeo-toolbox-qgis/24111664/>
2011/10/19
[ "https://gis.stackexchange.com/questions/15927", "https://gis.stackexchange.com", "https://gis.stackexchange.com/users/3530/" ]
This is how I installed it on Windows 8.1 running QGIS 2.18.16: * Download zip file for Windows 64bit version from <https://www.orfeo-toolbox.org/download/> * Unzipped it to a sensible location (i.e. not a temporary location) * Start QGIS * Go to menu option Processing > Options * Expand Providers > Orfeo Toolbox * For OTB application folder set the value to be the folder path to the bin folder, for example if you have unzipped the download to c:\scratch then the bin folder would be C:\Scratch\OTB-6.4.0-Win64\bin * Set the OTB command line tools folder to the same bin folder * Press OK * If you get a Wrong value error message about a msys folder you then need to go to Providers > Grass Commands and clear the value in Msys folder, this is some sort of bug in QGIS. * Restart QGIS **IMPORTANT: Folder path must not have spaces, so c:\Program Files will not work!** *This approach got it working but I have not fully tested all the functionality. The reason is that I was interested in a specific function that it had.*
Here are some resources that answer your question: <http://wiki.orfeo-toolbox.org/index.php/Quantum_GIS_plugins> <http://osgeo-org.1803224.n2.nabble.com/Is-there-a-way-of-installing-the-qgis-plugin-for-ORFEO-Toolbox-OTB-td5963420.html>
74,614
I'm having a major headache inducing issue with iCloud sync. My wife and I have shared calendars for a long time and it has helped us a great deal. The problem now is that my wife's iPhone has stopped syncing it's calendar with iCloud. If we log onto her account at iCloud.com and add somehting, it syncs to my iPhone as usual, but not to hers. If I add something to my calendar in my iPhone or iCloud.com, it does in fact sync to her iPhone with some lag. What seems to be cut off from iCloud is her own calendar. I have tried all possible settings with iCloud and calendar app etc, nothing works. And yes, I've tried turning it off and back on again. Did a soft reset, didn't help. Please, any ideas as to what can be causing this? Regards, Martin
2012/12/12
[ "https://apple.stackexchange.com/questions/74614", "https://apple.stackexchange.com", "https://apple.stackexchange.com/users/36462/" ]
Try creating a new calendar within her iCloud account. Don't share it yet. Add, edit, and delete events both on her iPhone and iCloud.com through a browser. If this works as expected, share the new calendar with your iCloud account. Repeat the add/edit/delete cycle to see if changes propagate across all devices now. If this works too, use the new calendar instead of the old calendar going forward.
I discovered what the problem was on my husband's iPhone 4. He uses iCloud as well as Gmail calendars. When he was creating a calendar event, he didn't realize that the Gmail calendar was being used. He could see the event on his Gmail calendar but it wouldn't sync to my iCloud calendar. When creating an event, check below to see if you have an option to change the calendar (below the Alert). Once he chose the iCloud email, it sync'd just fine.
54,940,299
I have created a sample project and have Azure server to maintain resources and security at same time. In my ASP web application i want to create Login system and i want it to protect using Azure security vault. Basically i want to store them in Azure vault. I have gone through understand of keys and secrets and Azure AD authentication using SDK in my web application but i am not getting understanding about making use of Keys/ Secret for User ID and Password that can help user to login into my application. Should i save username or password of a user inside keyvault. If i am doing it then what is the purpose of getting these values because they are simply accessible through URL. I tried looking for various examples but they were all using OWIN authentication using Social networking website but in my case I will be no social network login. Looking for help to understand where how can i use of Azure key vault's Key/Secret in the context of securing user's login credentials. Any hint would be helpful. Ref : Key Vault REST APIs <https://learn.microsoft.com/en-us/rest/api/keyvault/>
2019/03/01
[ "https://Stackoverflow.com/questions/54940299", "https://Stackoverflow.com", "https://Stackoverflow.com/users/11134776/" ]
Do not store user credentials in Key Vault. That is not its purpose. If you store passwords, you need to store them in a database after hashing them securely. Lot of emphasis on securely. There should never be a way for you to recover a user's password.
If you are trying to keep the user information inside azure and use it in your application, what is need is Azure Active Directory. You can have a look at the [examples on how to implement AD](https://learn.microsoft.com/en-us/azure/active-directory/develop/quickstart-v1-aspnet-webapp) in mvc project. You use Azure Key Vault for the secrets that your program need or some secrets that you want to give access to a set or users. You don's use Azure key vault to store general user and password information. Hope this helps.