bff_contained_ngram_count_before_dedupe
int64 0
15.3k
| language_id_whole_page_fasttext
dict | metadata
dict | previous_word_count
int64 50
19.6k
| text
stringlengths 197
105k
| url
stringlengths 25
294
| warcinfo
stringclasses 1
value | fasttext_openhermes_reddit_eli5_vs_rw_v2_bigram_200k_train_prob
float64 0.02
1
|
---|---|---|---|---|---|---|---|
1 | {
"en": 0.938180923461914
} | {
"Content-Length": "81420",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:Y23RT2R6UAD47ZQPEH2TAAIEYJE5UUGG",
"WARC-Concurrent-To": "<urn:uuid:93926458-f30e-40f7-9cfd-1bf567515789>",
"WARC-Date": "2014-03-13T21:41:56",
"WARC-IP-Address": "199.27.76.129",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:4XFU2GTMXY6EEK5TYLAKZQSM2BZBMBRL",
"WARC-Record-ID": "<urn:uuid:549b77e1-0d71-4f99-ba15-4327395df98f>",
"WARC-Target-URI": "http://io9.com/5955550/the-first-scientific-name-ever-given-to-a-dinosaur-scrotum-humanum?tag=fossils",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 328 | The first scientific name ever given to a dinosaur fossil? Scrotum humanum
Dinosaur names often have a majestic ring to them: King of the Tyrant Lizards, Swift Seizer, Colossal Iguana. The very first scientific dinosaur name was assigned to a one-ton carnivore that likely ran about on two legs like Tyrannosaurus Rex. And what was the first bone of this great beast named after? Balls.
The first scientific name ever given to a dinosaur fossil? Scrotum humanumS
Let's be fair to Richard Brookes, the physician who coined the name Scrotum humanum in 1763. He had no idea he was describing a dinosaur; in fact, Sir Richard Owen wouldn't coin the word "dinosauria" until the 19th century. A fossilized bone fragment of this particular dino was discovered in a limestone quarry in Oxfordshire, England in 1676. Richard Plot, Professor of Chemistry at the University of Oxford, realized that the bone, which he correctly identified as part of a femur, was too large to belong to any known animal. Plot, describing the bone in his Natural History of Oxfordshire, believed that it must have come from a Biblical human giant. Brookes would redescribe the specimen 90 years later based on Plot's drawing which did, in all honesty, look like a pair of human testicles.
Eventually, the prehistoric owner of the femur bone would get a far more dignified name: Megalosaurus. (Try to make that dirty...oh wait...poor dinosaur.) In fact, Megalosaurus was the first dinosaur to be described and named, by William Buckland in 1824. Still, because the first name every given to the dinosaur was Scrotum humanum—even though it was given just to the femur bone—geologist Bill Sarjeant and paleontologist Beverly Halstead argued that Brookes' name should take priority over Buckland's. The International Commission for Zoological Nomenclature ruled against them, saving Megalosaurus from the indignity of its original testicular name.
Images from Wikimedia Commons.
Jackson, Patrick Wyse, The Chronologers' Quest: The Search for the Age of the Earth [Google Books via mental_floss] | http://io9.com/5955550/the-first-scientific-name-ever-given-to-a-dinosaur-scrotum-humanum?tag=fossils | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.058694 |
26 | {
"en": 0.9489521980285645
} | {
"Content-Length": "91116",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:PMHHJ45OFPOF6RVEDPWFBYHNVZHBUNEU",
"WARC-Concurrent-To": "<urn:uuid:3a696e7c-72a1-4c73-b3ee-f0a1b3ce9824>",
"WARC-Date": "2014-03-13T21:54:32",
"WARC-IP-Address": "199.27.76.129",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:TV7IZ4YDKV6WASRWO3RSEQ6Y3J2BYY65",
"WARC-Record-ID": "<urn:uuid:e82e599a-d64b-4d04-9d11-451397e10b30>",
"WARC-Target-URI": "http://jalopnik.com/5650099/jeremy-clarkson-vs-the-european-union?tag=European-Union",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 336 | Jeremy Clarkson vs. The European UnionS
Our jet-setting guest physicist travels to Brussels and returns with photographic evidence that somewhere in the bowels of the EU, bureaucrats are obsessed with a certain libertarian TV host. —Ed. note
I have no doubt that the single most powerful entity in the world is Jeremy Clarkson. And this has absolutely nothing to do with the fact that he drives the worlds most noteworthy cars every week, nor that he forces celebrities to sit in a reasonably priced car and race against the clock (and each other) on the test track and finally fries anybody who misses a turn or has an abysmal lap time. This is definitely cool but still is not a sign of immense power.
The real catharsis comes when you go to Brussels, the de facto capital of the European Union and the continent, and you realize that the whole thing is concocted with the sole purpose of proving Jeremy Clarkson wrong and thus defeating him. Obvious, this would be their best interest, Clarkson being one of the most pronounced critics of big government, nanny state and their projects. Thus, most probably all members of the European Parliament and all the bureaucrats have this not-so-widely-communicated item at the top of their agenda.
The evidence for this is in plain sight at Brussels Airport. In the Intra-European transit area, at Pier A (which has a cross-section similar to that of a wing, given by a Joukowski-transform) you will see a giant poster over a gate, advertising a community-funded research project in the field of car electronics, a topic closely related to the core competence of Clarkson, challenging explicitly him:
Jeremy Clarkson vs. The European UnionS
Jeremy Clarkson vs. The European Union
Photo Credit: Hannah Johnston/Getty Images and Miklós Tallián. Photo of the author by Dr. Sándor Fehér. | http://jalopnik.com/5650099/jeremy-clarkson-vs-the-european-union?tag=European-Union | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.030805 |
88 | {
"en": 0.9393346905708312
} | {
"Content-Length": "64334",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:ET5L4QU2MUJVEJHZRL3GIGJ6KRCCQRAM",
"WARC-Concurrent-To": "<urn:uuid:1ea6cb0e-6601-4ff4-8cb7-746aba25ebcc>",
"WARC-Date": "2014-03-13T22:10:20",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:GLA3FQYPPBAUXBKJL6ZD65QZN5ACGB4U",
"WARC-Record-ID": "<urn:uuid:906d7412-646d-42e0-9fd1-2f7ec8e81cda>",
"WARC-Target-URI": "http://japanese.stackexchange.com/questions/5731/%E7%8E%8B%E5%B0%86%E7%94%A8%E8%AA%9E-and-chinese?answertab=active",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 665 | Take the 2-minute tour ×
How does 王将用語 (used at 餃子の王将) sound like to Chinese speakers? Are they completely incomprehensible, stupid , funny, etc? How difficult is it for Chinese speakers to learn them?
イーガーコーテル ソーハンイー コーテルリャンナーホー
Origin: 一個鍋貼兒 焼飯一 鍋貼兒二拿回
'one dish of fried dumpling and a fried rice for here and two dishes of fried dumpling to go'.
share|improve this question
Personally, I never have liked the English equivalent of the word 餃子 being "fried dumpling". I wish English would adopt the Japanese word, so we can call them "Gyoza" in English too. – Jesse Good Jun 3 '12 at 20:32
@Jesse Good: +1 I usually ignore it and call it "gyoza" in English anyway. – Chris Harris Jun 3 '12 at 20:41
Voting to close as "too localized" (knowing how Chinese speakers feel about the 用語 used at 餃子の王将 will be of no use for future readers). – Jesse Good Jun 3 '12 at 22:45
How is this a question about Japanese? – Tsuyoshi Ito Jun 5 '12 at 11:31
@Andrew Grimm: This is a nitpicking, but it is incorrect to refer to イーガーコーテル… as “kango.” Kango (漢語) means a Japanese word which has Chinese origin (or sometimes a Japanese word which looks as if it has Chinese origin). – Tsuyoshi Ito Jun 5 '12 at 22:05
show 5 more comments
closed as off topic by Tsuyoshi Ito, Jesse Good, Flaw, atlantiza, istrasci Jun 7 '12 at 2:53
1 Answer
up vote 1 down vote accepted
I am a student of (roughly intermediate) Mandarin Chinese, so not the proper Chinese speaker you're looking for, but I might just know enough of the original vocab here to offer an opinion.
With the aid of the English translation you gave, I was able to guess (although not confidently enough to post at the time) something like 一個鍋貼...飯一鍋貼...二拿 before you updated the question with the origin, but it wasn't easy and I wouldn't have understood if I'd just heard it spoken in real life. The in 鍋貼兒 that presumably led to コーテル instead of コーティエ was confusing for me as I studied in Taiwan where (giving an "er" sound) is commonly omitted in cases like this.
I'm baffled in particular by the pronunciation of and . I guess "hui" isn't easy to convert to the Japanese syllabary, but my 電子辞書 at least gives ホイ as a guide, which seems slightly clearer.
Other things that stood out were 個 -> ガー, where would seem more appropriate given the tonelessness of the character, and 鍋貼兒 -> コーテル, where a better conversion might be グオーティアル. The numbers イー and リャン were by far the most recognisable.
So incomprehensible? When spoken in real life, probably. When written down, maybe just about decipherable for someone with a working knowledge of Chinese and the Japanese syllabary and a lot of patience. Stupid/funny? I have no idea.
In terms of learning them, I wonder if it might be similar to the way I learn Japanese borrowed words from European languages other than English, which by their nature tend to sound similar to the English equivalent. For me this makes them easier to identify when reading or listening, but almost as hard as any other word to remember the correct spelling and pronunciation (for example my recent misspelling of コーヒー which you corrected for me).
Apologies for any mistakes I may have made, particularly related to the Chinese language. Please correct them if you see them!
share|improve this answer
add comment
| http://japanese.stackexchange.com/questions/5731/%E7%8E%8B%E5%B0%86%E7%94%A8%E8%AA%9E-and-chinese?answertab=active | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.230953 |
0 | {
"en": 0.9639636278152466
} | {
"Content-Length": "79385",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:Q6J7OTN45DSN44JF6ISESY2RXVP5XVIK",
"WARC-Concurrent-To": "<urn:uuid:52480a8f-0b76-466a-9808-789aba1f9a95>",
"WARC-Date": "2014-03-13T21:38:16",
"WARC-IP-Address": "199.27.76.192",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:I2EG5HKKR4KYPSSTHMDSAXXGHXBDHEKA",
"WARC-Record-ID": "<urn:uuid:957e66ad-494d-4df8-889d-3f7114582d01>",
"WARC-Target-URI": "http://jezebel.com/5488270/im-the-fashion-expert-around-here-piers-morgan-not-ready-for-primetime?tag=commenting",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 392 | Piers Morgan, arbitrator of all things "sexy and feminine," went on the Today Show this morning to spout things like "more women on the red carpet should think about men." And that's just the beginning.
Morgan appeared alongside Today style editor Bobbie Thomas and they couldn't have picked two more different guests. While Thomas has mostly positive things to say about the fashions, Morgan seems to take a particular pleasure in pointing out physical flaws and making stay in the kitchen-style jokes. Right off the bat, the two disagree about Sandra Bullock, who Morgan says isn't "a great natural beauty compared to the others." When Thomas steps in to defend her Bullock, Morgan shuts her down, saying "Well, I'm the fashion expert around here." Cue uncomfortable laughter.
For the next several minutes, Morgan makes it clear that being a "fashion expert" is somehow synonymous with "jackass." He bemoans Charlize Theron's dress on the grounds that it is an example of "women dressing for women." Carey Mulligan is the "perfect woman" because of the "kitchen utensils" covering her Prada dress. The entire segment is kind of uncomfortable to watch, as the guests clash and host Meredith Vieira does minimal damage control.
Morgan's criticism exemplifies two of the biggest problems of red carpet commentary: mean-spirited bitchiness combined with open sexism. Mocking celebrities has become something of a national pastime, but there is a point where the all-in-good-fun critique veers into dangerous territory. For lack of a better word, Morgan's brand of commentary is purely bitchy. There is nothing fun about his appearance; he isn't trying to be particularly quick or witty. He is little more than a poor man's Simon Cowell, but instead of doling out harsh truths, he plays on stale jokes and outdated stereotypes. In lieu of insight, Morgan panders to our basest impulses. And it seems that far too much of the red carpet talk has fallen into this pattern of alternating between vicious take-downs and praise made fainter by the smattering of backhanded compliments. I'm not exactly a believer in the if you cant say anything nice school of thought, because being truly and consistently nice can get rather boring. But maybe "fashion experts" like Morgan should follow this modified rule, borrowed from our own commenting policies: If your statement is neither complimentary, insightful, or redeemed by the sheer brilliance of your wit, maybe you should keep it to yourself. | http://jezebel.com/5488270/im-the-fashion-expert-around-here-piers-morgan-not-ready-for-primetime?tag=commenting | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.027222 |
0 | {
"en": 0.9537457823753356
} | {
"Content-Length": "77198",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:WRXB43HNTUSNSQK66ZSVAF2IW5DIKUEN",
"WARC-Concurrent-To": "<urn:uuid:60bb8d42-e96a-4f3c-890a-6ee13cec664a>",
"WARC-Date": "2014-03-13T22:17:44",
"WARC-IP-Address": "199.27.78.192",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:CGPOQ6KHFIPLKNRCWWZ5FVQKG6LLGH55",
"WARC-Record-ID": "<urn:uuid:c3903c5c-b941-4875-99d1-ff35d712e74e>",
"WARC-Target-URI": "http://jezebel.com/5783281/taylor-lautner-is-a-vampire-not-a-werewolf?tag=werewolf",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 137 | Taylor Lautner Is A Vampire, Not A Werewolf!S
Is it possible that Taylor Lautner, the 19-year-old actor who plays werewolf Jacob Black in the Twilight films, is actually a vampire who's been a teenager for 46 years — or more? Someone named Natahsa sent this image to teen gossip site Ocean Up, with the message:
Today I was looking at my teacher's yearbook and he graduated in 1965.. So I was flipping through the pictures and came across a Taylor Lautner lookalike!
Some possibilities:
• 1. Taylor Lautner is an actual vampire who never ages.
• 2. Taylor Lautner has a portrait of himself in his attic, and it is hideous.
• 3. Natasha is playing a hoax on us all, and this is a photoshopped yearbook picture.
Personally? I like answer number 2 the best.
Taylor Lautner LOOKALIKE FROM 1965 [OceanUp] | http://jezebel.com/5783281/taylor-lautner-is-a-vampire-not-a-werewolf?tag=werewolf | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.159498 |
0 | {
"en": 0.9581627249717712
} | {
"Content-Length": "73828",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:AUYVDS4G4A6TQBHWKJLNIP2YTQ7HJXL5",
"WARC-Concurrent-To": "<urn:uuid:09c2727c-822e-4370-867e-b915ba5ce077>",
"WARC-Date": "2014-03-13T22:29:40",
"WARC-IP-Address": "199.27.76.192",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:W63N6NYKL7JKDR3SBTYAIIFO7AC6JX2H",
"WARC-Record-ID": "<urn:uuid:39bcda36-bdb6-416e-b265-c64c44c7577d>",
"WARC-Target-URI": "http://jezebel.com/5795026/could-you-take-a-three-minute-shower?tag=beauty",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 232 | Could You Take A Three-Minute Shower?
The Body Shop would like you to at least give it a shot.
The eco-conscious brand issued an "Earth Lovers Three-Minute Shower Challenge" in honor of yesterday's celebration of Earth Day:
To help time yourself, the company suggests playing a three-minute song and trying to finish by the end. Or, you could always count to 180 slowly.
Ah, yes. A relaxing shower should ideally involve focused counting and playing "beat the clock" to the tune of a 2:59 minute song. That's the best part!
In all seriousness, I am well aware of the roughly 70 gallons of water Americans use every time they take a 10-minute shower and yes, that's an insane amount of water waste.
I've always been someone who takes very brief showers (primarily because I always seem to get very, very bored while trying to take one of those ridiculously long, supposedly relaxing showers you always see women taking in the movies), and I think that challenging people to re-evaluate the amount of time they spend in the shower is a terrific idea.
Maybe playing "Let's pretend you live in a dorm where thirty girls are waiting to use the shower and you'd better hurry up and get out of there!" isn't the most user-friendly way of getting people to be more eco-conscious, but hey, whatever works.
Could You Cut Your Shower Time Down to Three Minutes? | http://jezebel.com/5795026/could-you-take-a-three-minute-shower?tag=beauty | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.888248 |
14 | {
"en": 0.8695998787879944
} | {
"Content-Length": "7586",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:LE764QQ4UZNIIQUI7FF6KS3RXBT4RQBR",
"WARC-Concurrent-To": "<urn:uuid:cdee055a-22eb-4d66-b393-e8dfbbd179d0>",
"WARC-Date": "2014-03-13T22:18:15",
"WARC-IP-Address": "128.30.52.56",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:TTBF5HY34TCNYZNDQ7ZZ64D6KCKOWWJB",
"WARC-Record-ID": "<urn:uuid:b8aa8626-a97e-4128-82de-9890dacdf61d>",
"WARC-Target-URI": "http://lists.w3.org/Archives/Public/www-smil/2004JulSep/0007.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 136 |
Fractional Repeat counts?
From: John Navil Joseph <navil@emuzed.com>
Date: Fri, 23 Jul 2004 11:58:10 +0530
To: www-smil@w3.org
Message-ID: <opsbkuw8n0plr6nz@smtp.emuzed.com>
SMIL 2.0 supports fractional repeat counts (ex. repeatCount = "0.75").
Consider the following example.
<video src="video1.mpg4" region="Region1" repeatCount="0.75" />
I suppose that the standard assumes that the intrinsic duration of
is available beforehand for this to work correctly. But on small hand held
devices it may be very expensive to calculate the exact intrinsic duration
of the
streams. (especially for elementary streams as that of MPEG4, AAC).
How does the standard expect the SMIL players to deal with these
situations in which
the intrinsic duration of the media objects is simply "unknown"?
Received on Friday, 23 July 2004 02:37:04 UTC
| http://lists.w3.org/Archives/Public/www-smil/2004JulSep/0007.html | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.062855 |
42 | {
"en": 0.9314783215522766
} | {
"Content-Length": "17096",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:RVPS75XXNGMYUNGF34KRWPXQK5HOAUXQ",
"WARC-Concurrent-To": "<urn:uuid:264a548b-d966-4f42-b5a6-e94c3ef83430>",
"WARC-Date": "2014-03-13T21:37:35",
"WARC-IP-Address": "128.30.52.56",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:URQFJVNLJJAL6LUYGLAS2OPFMFEA7O3X",
"WARC-Record-ID": "<urn:uuid:9a52002f-69e8-47bf-9efb-7598ed264010>",
"WARC-Target-URI": "http://lists.w3.org/Archives/Public/www-style/2011Feb/0412.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 1,381 |
Re: CSS Variables Draft Proposal
From: Boris Zbarsky <bzbarsky@MIT.EDU>
Date: Mon, 14 Feb 2011 16:28:14 -0500
Message-ID: <4D599E6E.8050002@mit.edu>
On 2/14/11 3:46 PM, Tab Atkins Jr. wrote:
> This term is underdefined for my usage,
> and perhaps not exactly what I want, though.
> You can't put a unit in and expect to use it as a unit, for example, the "@var $foo
> px;" is perfectly fine if used as a keyword. This shouldn't be hard -
> the intent is just that you can't store a "partial value" in a
> variable and then compose it with something else to get a whole value
> (so you can't do something like "@var $foo px; p { width: 200$foo;
> }").
> I heard conflicting statements about whether "token" was correct here,
> so I just avoided the issue and used a different word. What is the
> correct term?
I think the problem you're having is that this concept of "value" is not
really exactly how the CSS spec is defined at the moment, and different
UAs have different internal concepts of "value". At least as far as I
can tell.
Offhand, I wouldn't be willing to claim that the same string is always
treated as the same kind of "value" in Gecko, even. It might well be
context-dependent. I'm not saying that's the case; just that nothing
ensures that it's not.
I agree that a raw token stream may not be the right thing due to things
@var foo 255, 255);
which could add pretty oddly if $foo is used like so:
color: rgb(0, $foo, 0);
(though in this case I think it'll just cause the whole property to be
discarded). But if we require that any close parens/curlies/brackets be
matched by open parens/curlies/brackets in the variable definition, then
it seems like a token stream with that restriction might be ok. It
would certainly make it much simpler to specify how variable
substitution should work: you just tokenize the template, replace the
$foo with the corresponding token stream, and then parse the resulting
token stream.
If you want to do this in terms of values, then you have to define
somewhere what the value sets for various properties are, which sounds
like a pretty major undertaking.
> "component value" is defined in CSS2.1, at
> <http://www.w3.org/TR/CSS21/about.html#value-defs>. It's not exactly
> what I want, but it appears to be closer in intent than "token".
Hmm. So the problem is that nothing guarantees that different value
types as defined here will be syntactically distinct (and in fact
they're not). Put another way, you can't tell what sort of value it is
until you see how it's being used. That seems unfortunate.
>> Currently in a situation like that (same property specified multiple times
>> in a declaration) only the last specified value needs to be kept by the UA.
>> It sounds like your proposal is that this is no longer the case with
>> variables, right?
> Yes, though your gloss isn't completely correct, right? If you make a
> declaration block contain the same property twice, and use the CSSOM
> to twiddle whether the second one's value is valid or not, you have to
> pay attention to the first one.
Gecko certainly doesn't. Invalid stuff is dropped at _parse_ time and
not exposed to the CSSOM at all.
In particular, up until now invalid stuff has always been dropped at
parse time, since the whole point is that if you don't know what it is
you can't parse it apart from just skipping over it.
> Do you just let this case fall down a
> slow path, where you effectively reparse the block?
No; this case simply doesn't arise right now. You're introducing it, by
requiring some sort of non-parse-time discarding behavior.
>>> Scoped stylesheets (those created with a `<style scoped>` element in
>>> HTML) have their own nested global scope. Variables created or
>>> imported within a scoped stylesheet are only available within the
>>> scoped stylesheet; variables created in the outer global scope are
>>> still available in a scoped stylesheet.
>> I'm not sure I follow this. Say I have this markup:
>> <div>
>> <p>
>> </p>
>> </div>
>> with stylesheets scoped to the<div> and<p>. If I have an @var in the
>> div-scoped sheet, can the p-scoped sheet use it? Note that rules in the
>> div-scoped sheet apply to the<p> and all, in general.
> No. This is defined by HTML - I'm just restating the restrictions
> that<style scoped> applies, for clarity.
What you're stating is different from what the HTML5 draft says about
<style scoped> as far as I can tell. Again, the div-scoped sheet's
rules apply to the <p> if I read the <style scoped> draft correctly, but
you're saying its @vars do not?
>> This needs to happen to understand how variables can actually be used; see
>> above;
> Does what Bjoern wrote help here?
Not terribly, no. I'll try rereading it again to see if I can make
sense of it this time...
> It'll be overrideable, so I doubt it'll cause any problems.
You mean replaceable?
It can still cause problems even so (esp. if multiple scripts interact,
one of which writes it and one of which wants to mess with your new APIs).
> I'd also like there to be a window.css which forwards to
> window.document.css, for ease of use.
That seems to have even more scope for problems.
>>> To add a new map entry, we first define `css.stylesheet`, which
>>> implements the `StyleSheet` interface. This stylesheet is treated as
>>> an author-level sheet placed after all other author-level sheets.
>>> Creating a new map entry creates a corresponding @var rule in this
>>> stylesheet.
>> What about adding other rules to the sheet? Would they be applied to the
>> document?
> It acts like a stylesheet in the document, so yes.
So a question.... apart from the handling of !important, how is this
different from the override sheet stuff CSSOM specifies already?
>>> Variables appear as themselves in specified values. If the variable is
>>> defined and valid, its computed value is the value of the variable. If not,
>>> its computed value is the variable name.
>> I don't understand this at all, if invalid values are supposed to be treated
>> like parse errors.... What is this trying to say?
> Invalid values are no longer parse errors, since some time before you
> quoted this out of the draft.
That doesn't answer my question. Consider this style:
div { color: red; color: $foo; }
p { color: $foo; }
What is the specified value of "color" for <div>s? What is the computed
value of "color" for <p>s? How do I reconcile those answers with the
text quoted above?
>> 2) Can the type be changed via the CSSOM? I assume yes, to make Daniel
>> happy. ;)
> Yeah.
A followup: what happens if you try to change to an unknown type?
>> @var color $foo 12px;
>> * { font-size: $foo; }
>> then do I get 12px font-size? Or is the variable considered invalid if its
>> value in the @var can't be parsed as its type?
> The validity of the variable can be verified at parse time in this
> proposal, so the $foo declaration would be invalid, and no $foo
> variable would be created. The font-size declaration is then invalid,
> as it references an undefined variable.
OK (though this is not clear from the spec). Let's try a more
interesting testcase:
@var color $foo red;
* { font-family $foo; }
If I have a font with a family name of "red" on my system, will I get it?
>>> The previous suggestion seems to put the typing in the wrong place.
>>> Typing doesn't help the CSS developer in any way, as CSS can figure
>>> out types as necessary all by itself.
>> Maybe... and maybe not. It sort of depends on what variable values "are".
>> See beginning of this mail.
> I mean that you can figure out types at the time of use. You can't
> possibly infer types at definition time, as there is too much
> ambiguity.
OK, but my point is that sometimes you can't really figure out types at
time of use either, without falling back on the actual tokens involved.
>>> This would only work if the OM interfaces were carefully designed in
>>> such a way that there is never ambiguity
>> Seems fragile....
> I agree. We want to try this and see if it works, though, before
> throwing it out.
The problem is that by the time we decide it doesn't work the damage
will have been done: we'll have interfaces we can't drop for compat
reasons but that will sort of suck in actual use. See getComputedStyle
as it is currently practiced.
Received on Monday, 14 February 2011 21:29:17 GMT
| http://lists.w3.org/Archives/Public/www-style/2011Feb/0412.html | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.040906 |
18 | {
"en": 0.6739075779914856
} | {
"Content-Length": "9293",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:JY3PKIIXY44465KZYZDYSVAER6YBJUP5",
"WARC-Concurrent-To": "<urn:uuid:5bc44143-c5a7-49a3-8615-4b4227e2d4e8>",
"WARC-Date": "2014-03-13T22:14:46",
"WARC-IP-Address": "87.253.128.182",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:K475D3STHA32LNF5FBZEEJRXNUIA5F4Y",
"WARC-Record-ID": "<urn:uuid:61abfec1-0016-43ec-805e-6bb181b2782b>",
"WARC-Target-URI": "http://lkml.org/lkml/1998/10/24/78",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 113 |
Messages in this thread
On 23 Oct 1998, H. Peter Anvin wrote:
> That's bigendian (the high-order digit comes first, or to the left,
> because Latin-script text is L->R.) That happens to be pretty much
> the only reason why some computers unfortunately use the same ordering
> in memory.
right, and to note: the people who invented our number scheme, the Arabs,
are writing from R->L. So the 'natural' endianess is the little one;-)
the body of a message to
Please read the FAQ at
\ /
©2003-2011 Jasper Spaans | http://lkml.org/lkml/1998/10/24/78 | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.159092 |
12 | {
"en": 0.8534314036369324
} | {
"Content-Length": "19529",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:URLCFJ7MX6YNG3JJOLTM5ZG7IALXEEJE",
"WARC-Concurrent-To": "<urn:uuid:7f5b3bbf-e49b-4bcb-9cf0-0b77002bd042>",
"WARC-Date": "2014-03-13T22:14:47",
"WARC-IP-Address": "87.253.128.182",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:GSDVL4ORAVG5BVUC6CRVDBESGS5KPQUL",
"WARC-Record-ID": "<urn:uuid:5015ff2b-4d50-43f5-bc8f-067927a2e1bb>",
"WARC-Target-URI": "http://lkml.org/lkml/2007/3/9/279",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 1,587 |
Messages in this thread
SubjectABI coupling to hypervisors via CONFIG_PARAVIRT
* Linus Torvalds <> wrote:
> > Sure, that's clean, From that perspective the apic is a bunch of
> > registers backed by a state machine or something.
> I think you could do much worse than just decide to pick the
> IO-APIC/lapic as your "virtual interrupt controller model". So I do
> *not* think that APICRead/APICWrite are in any way horrible interfaces
> for a virtual interrupt controller. In many ways, you then have a
> tested and known interface to work with.
yes - but we already support the raw hardware ABI, in the native kernel.
paravirt_ops is not 'just another PC sub-arch'. It is not 'just another
hardware driver'. It is not 'just another x86 CPU'. paravirt_ops is much
wider than that, it hooks everywhere and has effect on everything!
Lets take a look at the raw numbers. Here's a typical distro kernel
vmlinux, with and without CONFIG_PARAVIRT [with no paravirt backend
text data bss dec hex filename
139863 49010 57672 246545 3c311 x86-kernel-built-in.o.noparavirt
148865 49310 57672 255847 3e767 x86-kernel-built-in.o.paravirt
text data bss dec hex filename
5154975 586932 221184 5963091 5afd53 vmlinux.noparavirt
5189197 587504 221184 5997885 5b853d vmlinux.paravirt
why did code size increase by +6.4% in arch/i386/ (+0.7% in the
vmlinux)? It is purely because CONFIG_PARAVIRT adds more than _1400_
function call hooks to the x86 arch:
c05c8e60 D paravirt_ops
c0102602: ff 15 9c 8e 5c c0 call *0xc05c8e9c
c0102d37: ff 15 94 8e 5c c0 call *0xc05c8e94
c0102d45: ff 15 94 8e 5c c0 call *0xc05c8e94
c0102d53: ff 15 94 8e 5c c0 call *0xc05c8e94
c0102d61: ff 15 94 8e 5c c0 call *0xc05c8e94
c0102d6f: ff 15 94 8e 5c c0 call *0xc05c8e94
$ objdump -d vmlinux | grep c05c8e | wc -l
_1463_ hooks, spread out all around the x86 arch.
Are these only trivial hooks a'ka alternatives.h? Not at all, these are
full-blown function hooks freely modifiable by a paravirt_ops
implementation, spread throughout the architecture in a finegrained way.
(see my arguments and specific demonstration about the bad effects of
this, four paragraphs below.)
As a comparison: people argued about CONFIG_SECURITY hooks and flamed
about them no end. The reality is, there's only _269_ calls to
security_ops in this same kernel, and i've got CONFIG_SECURITY + SELINUX
enabled. And the only functional modification that security_ops does to
native behavior is "deny the syscall". Not 'full control over
behavior'... In terms of coupling, CONFIG_SECURITY hooks are a walk in
the park, relative to CONFIG_PARAVIRT.
we dont even give /real silicon/ that many hooks! If an x86 CPU came
along that required the addition of 1400+ function hooks then we'd say:
'you must be joking, that's not an x86 CPU! Make it more compatible!'.
please dont get me wrong - 1463 hooks spread out might be fine in the
end, but _if and only if_ there are safeguards in place to make sure
they are just a trivial variation of the hardware ABI - a'ka
asm/alternatives.h. But there is _no_ such safeguard in place today and
we are seeing the bad effects of that _already_, with just a _single_
hypervisor and a _single_ abstraction topic (time), so i'm very strongly
convinced that it's a serious issue that cannot just be glossed over
with "relax, it will work out fine". If there's one thing we learned in
the past 15 years is that ABI issues will haunt us forever.
Let me demonstrate some of the bad effects, and how far we've _already_
deviated from the 'hardware ABI'. An example: one assumes that
paravirt_ops.safe_halt() is a trivial variation of the 'halt
instruction', right? But vmi.c and vmitimer.c does much more than that.
Take a look at vmi_safe_halt() which calls vmi_stop_hz_timer(): it hacks
back a jiffies assumption into its code via paravirt_ops.safe_halt() -
purely via changes local to vmitimer.c, by using next_timer_interrupt()!
Thus it has created a _dual layer_ of dynticks that we specifically
objected against. It does so in spite of our warning about why that is
bad, it does so in spite of Xen having implemented a clockevents driver
in 2 hours, and it does so under the cover of 'oh, this is only a
vmitimer.c local change'. It circumvents the native dynticks framework
and in essence brings in the bad NO_IDLE_HZ technique that we worked so
hard for 2 years not to ever enable for the i386 arch!
so one of my very real problems with paravirt_ops is that due to its
sheer hook-based impact it allows the modification of the hardware ABI
on a _very_ wide scale: both unintentionally and intentionally.
Furthermore, it allows the introduction of hard-to-remove hardwired
quirks that bind one particular paravirt_ops method to the hypervisor
ABI - quirks that are not present in any real silicon! Quirks
_guaranteed by Linux_, by virtue of giving the CONFIG_VMI promise. So we
effectively expose Linux to the hypervisor ABIs, and give hypervisors 'a
license to arbitrary ABI coupling'. With no clear mechanism whatsoever
to remove that coupling. At least crap hardware rots with time and gives
us a chance to remove - but software ABIs and hence "virtual hardware"
seldom rots.
it's hard enough to change the APIC code so that it works on both Intel
and AMD CPUs: and those CPUs /share the ABI/ to a very large degree, by
executing the same code.
and there are no safeguards in place whatsoever to ensure that the
'virtual silicon ABI' matches up to the real silicon ABI. Granted, for
VMI it probably matches up today most likely because VMI came from full
software virtualization that /had/ to emulate all of real silicon. But
from now on, paravirt_ops allows shortcuts, allows changes to semantics
[a shortcut is change of semantics], allows additional ABIs, and we
already see that happenning in vmitimer.c, which is even one of the
/easiest/ paravirtualization topic.
Furthermore, it's only the beginning of the pain. It's the effect of
_ONE_ hypervisor (VMWare/ESX) and _ONE_ abstraction (time). We've got
4-5 hypervisors lined up for the paravirt_ops free-for-all and half a
dozen of fundamental abstractions to cover (of which time is the
simplest)! Please do the math. With paravirt_ops, the complexity of this
is per-hypervisor and per-abstrction and there's no safeguard in place
to let them evolve towards a saner, shared model. It wont happen because
doing a sane, shared ABI is _HARD_. Nobody will go the effort of
implementing the clean solution if they get to play with paravirt_ops,
and _I_ will have the work dumped on me in the architecture, trying to
sort out the mess.
i claim that when the 'API cut' is done at the right level then no more
than say 100 hooks would be needed - with virtually zero kernel size
increase. We've got all the right highlevel abstractions: genirq, gtod,
clockevents. Whatever is missing at the moment from the framework (say
smp_send_reschedule()) we can abstract away. The bonus? It would be
almost directly applicable to other architectures as well. It would also
work with /any/ hypervisor.
Unfortunately, with the current paravirt_ops policy we might end up
seeing none of that unification. 1400+ hooks are just wide enough (by
the law or large numbers) so that any hypervisor can implement a random
ABI that performs close to the 'real' ABI, and has no incentive
whatsoever to play along and make life easier for Linux by having a
sane, unified ABI. Having provided the CONFIG_VMI ABI once, distros will
see themselves forced adding those 1400+ hooks for many, many years to
come, blowing up Linux' instruction cache footprint in a critical area
of code.
And that is why the "paravirt_ops is just virtual hardware" argument is
totally wrong. _Nothing_ limits hypervisors from adding arbitrary ABI
bindings to Linux. For example, VMI does this already and none of the
following are hardware ABIs:
#define VMI_CALL_SetAlarm 68
#define VMI_CALL_CancelAlarm 69
#define VMI_CALL_GetWallclockTime 70
#define VMI_CALL_WallclockUpdated 71
and these ABIs have been objected to by Thomas and me because they are
cycle based - still paravirt_ops allows Linux to become dependent on
these ABIs.
Finally, what would i like to see?
Firstly, i think this has been over-rushed. After years of being happy
with forks of the Linux kernel, all the hypervisors woke up at once and
want to have their stuff upstream /now/. This rush created a hodgepodge
of APIs/ABIs that we now in the end promise to support /all/. (if we
take CONFIG_VMI i can see little ethical reason to not take Xen's
paravirt_ops, lguest's paravirt_ops, KVM's paravirt_ops and i'm sure
Microsoft/Novell will have something nice and different for us too.)
Secondly, i'd like to see a paravirt approach that has /implicit/
safeguards against the following type of crap:
vmitimer.c code has a hardwired assumption that a PIT exists:
/* Disable PIT. */
outb_p(0x3a, PIT_MODE); /* binary, mode 5, LSB/MSB, ch 0 */
it has a hardwired assumption that 'cycles' makes a sense as a way to
communicate time units:
per_cpu(process_times_cycles_accounted_cpu, cpu) + cycles_per_alarm,
it has a hardwired assumption that Linux keeps time in units of
if (rcu_needs_cpu(cpu) || local_softirq_pending() ||
(next = next_timer_interrupt(),
time_before_eq(next, jiffies + HZ/CONFIG_VMI_ALARM_HZ))) {
cpu_clear(cpu, nohz_cpu_mask);
etc. etc. paravirt_ops is _NOT_ just a random driver we can fix in the
future. These are all assumptions that can /easily/ leak out towards the
hypervisor and thus create ABI coupling between that quirk and a
specific version of the hypervisor. Fixing such bad coupling needs
changes on the /hypervisor side/.
Granted, some of these are just harmless quirks that are fixable in
Linux only, but some of these are stiffling because they bind Linux to
the hypervisor ABI.
i might be overreacting, but the effects of 1400+ hooks put into the
code against my objections, which code i helped write for many years,
and that i'd like to help write for many years to come, is no small
issue to me.
the body of a message to
More majordomo info at
Please read the FAQ at
\ /
Last update: 2007-03-09 19:07 [from the cache]
©2003-2011 Jasper Spaans | http://lkml.org/lkml/2007/3/9/279 | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.098825 |
10 | {
"en": 0.6892801523208618
} | {
"Content-Length": "8153",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:34VYPM52A6RJZVS72IGBGKMPF46F6CDJ",
"WARC-Concurrent-To": "<urn:uuid:4c8a1977-c240-4c2f-b1ab-38404b6ebe55>",
"WARC-Date": "2014-03-13T21:43:01",
"WARC-IP-Address": "87.253.128.182",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:6QRSNF44XR3SJWCN5FMASVPCIS4NLJ53",
"WARC-Record-ID": "<urn:uuid:4054d7a0-f832-4c4e-be1b-a858c9429b9d>",
"WARC-Target-URI": "http://lkml.org/lkml/2009/9/25/172",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 85 |
Messages in this thread
SubjectRe: [PATCH] vfs: new O_NODE open flag
On Fri, 25 Sep 2009 13:37:47 BST, "Dr. David Alan Gilbert" said:
> Given an fd opened in this way is it possible to reopen it normally and
> be guarenteed to get the same object?
It's not possible even without this flag. Consider:
fd1 = open("/tmp/foo",flags);
rc = rename("/tmp/foo","/tmp/bar");
fd2 = open("/tmp/foo",flags);
Or were you asking if *absent that sort of tomfoolery* if it would work?
[unhandled content-type:application/pgp-signature]
\ /
Last update: 2009-09-25 19:23 [from the cache]
©2003-2011 Jasper Spaans | http://lkml.org/lkml/2009/9/25/172 | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.219218 |
0 | {
"en": 0.9066975116729736
} | {
"Content-Length": "2007",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:BORGDNABIQ7ZHC3JHLTUQSKP5UESZVEV",
"WARC-Concurrent-To": "<urn:uuid:0ca3353e-ba82-4492-a638-2f41f5b39d38>",
"WARC-Date": "2014-03-13T22:22:49",
"WARC-IP-Address": "149.20.53.86",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:XN5G3LUEZGIAU4QUHWYTRF5TZ7UXTD6X",
"WARC-Record-ID": "<urn:uuid:ee7d508b-5b4d-4cc6-9157-de6740d5e27e>",
"WARC-Target-URI": "http://mail-index.netbsd.org/amiga-dev/1994/05/31/0001.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 228 | Subject: Sup 30 May experiences; mostly works!
To: None <>
From: None <>
List: amiga-dev
Date: 05/31/1994 08:21:11
Howdy, I'm just finishing up compiling the whole smash from
a 30 May sup. It appears to be in working order except for the
1: ite.c, par.c and adosfs/adlookup.c all use the MIN() macro,
this should be changed to use the lower case min() function.
Additionally, ite.c also uses the MAX() macro, this should be
changed to the max() function.
2: On boot, you HAVE to have a floppy in the drive or the boot
will stall. Additionally, my 1.76M floppy registers as 0
rather than the AAAAAAA type so the driver doesn't register it
as a 3.5hd" floppy unit.
3: In the C library, the makefile can't seem to find the cat*.3
man pages in the nls directory, I manually copyed them up a
level and that seemed to satisfy it.
4: On Superkick 3000's you still lose the boot ROM's unless you
do the reboot command; i.e. panics and reboot-without-sync (
For fsck problems on root) still require a power cycle to get
back the machine. B^(. Looks like I'll have to weed out the
more magic bits involved with the SuperKick boot ROM. B^(.
Other than that, things appear to be compiling and installing
Thanks for all the work on converting to Chris! It
was worth the grief! | http://mail-index.netbsd.org/amiga-dev/1994/05/31/0001.html | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.19754 |
49 | {
"en": 0.94236159324646
} | {
"Content-Length": "5808",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:34LJLI4NUE2BMQ6VM4VWLJME2RL3NUKI",
"WARC-Concurrent-To": "<urn:uuid:f9d07ae4-0b02-4f0c-a324-813ced26ece0>",
"WARC-Date": "2014-03-13T22:24:45",
"WARC-IP-Address": "149.20.53.86",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:UFFGQIKKV7CFEB7LUNB3FXM3JA7GYTHG",
"WARC-Record-ID": "<urn:uuid:5bc186d9-256f-4435-a069-c6913ff37fd2>",
"WARC-Target-URI": "http://mail-index.netbsd.org/regional-nyc/2011/11/29/msg000370.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 264 | Regional-nyc archive
> worry about what data might be on them....
> Failing that, does anyone have any other good ideas on how to dispose
> of the things? Breaking the cartridges by hand etc. is a non-starter,
> there are too many of them.
Hand-held tape degaussers are made specifically for the purpose of
erasing tapes for re-use. They were pretty common in the audio and video
recording worlds a couple of decades ago, and I do seem to recall having
seen ones for computer backup tapes as well.
If you use one, however, you'll want to check very carefully that it
will be powerful enough to actually have some effect on your particular
tapes. There's a massive range in coercivity between various tape
formulations, and a degausser designed for old-fashioned ferric oxide
audio tapes may have no effect at all on a more modern computer tape.
You might have better luck with a video tape degausser, particularly if
your tapes are one of the formats based on video tape, such as Exabyte
was, if I recall correctly.
Curt Sampson <> +81 90 7737 2974
telephone. --Bjarne Stroustrup
Home | Main Index | Thread Index | Old Index | http://mail-index.netbsd.org/regional-nyc/2011/11/29/msg000370.html | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.259617 |
20 | {
"en": 0.7424377202987671
} | {
"Content-Length": "4356",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:LMBZ5KF2GYPLKHOXLTNMOJLMLNH5HMTS",
"WARC-Concurrent-To": "<urn:uuid:a1615f36-0c09-43c7-856f-7bb92d37c579>",
"WARC-Date": "2014-03-13T21:46:29",
"WARC-IP-Address": "149.20.53.86",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:6VDPCC3W7TOGRTF4WFDEVZMDKFB7NSHI",
"WARC-Record-ID": "<urn:uuid:e1f4351c-a46c-405c-9a8d-52856bf62ae4>",
"WARC-Target-URI": "http://mail-index.netbsd.org/source-changes/2011/01/09/msg017019.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 136 | Source-Changes archive
CVS commit: src/lib
Module Name: src
Committed By: pooka
Date: Sun Jan 9 14:10:03 UTC 2011
Modified Files:
src/lib/librumpclient: rumpclient.c
src/lib/librumpuser: rumpuser_sp.c sp_common.c
Log Message:
Separate rw_data and rw_done. Otherwise we don't get wakeups for
requests which have a 0-length response (such as copyin 0/0).
This change makes links(1) work against a rump kernel which contains
rumpnet_local. The presence of unix domain sockets caused links
to select() with 0 fds and a timeout, and because copyin never woke
up in the kernel the application blocked indefinitely.
To generate a diff of this commit:
cvs rdiff -u -r1.13 -r1.14 src/lib/librumpclient/rumpclient.c
cvs rdiff -u -r1.31 -r1.32 src/lib/librumpuser/rumpuser_sp.c
cvs rdiff -u -r1.20 -r1.21 src/lib/librumpuser/sp_common.c
copyright notices on the relevant files.
Home | Main Index | Thread Index | Old Index | http://mail-index.netbsd.org/source-changes/2011/01/09/msg017019.html | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.03038 |
48 | {
"en": 0.8683375716209412
} | {
"Content-Length": "5410",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:3PPRBNKTE6RZBI65FQGB4G5LQE2XGMWF",
"WARC-Concurrent-To": "<urn:uuid:10f5dfa3-12ed-4f96-af54-2d5b20a7334d>",
"WARC-Date": "2014-03-13T22:24:16",
"WARC-IP-Address": "149.20.53.86",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:PDXSRPKG63QZITXVLUFDMP352BDYPQEV",
"WARC-Record-ID": "<urn:uuid:0a096717-4dff-486e-9778-f9951e2364e6>",
"WARC-Target-URI": "http://mail-index.netbsd.org/tech-net/2011/11/02/msg002890.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 267 | tech-net archive
Re: removing carp(4)
> In sum, I doubt that carp(4) provides enough utility to justify its
> maintenance cost. If there are arguments to the contrary, I am
> listening.
whatever difference that really makes) does involve a kernel element.
kernel device and interface is that you can attach config and
processes to a proper interface.
This behaves like an interface is expected to for all other purposes,
such as link state monitoring, routing daemons, bpf, ipfilter, passing
through to VM platforms (xen), etc etc. Adding and removing an
etherstub (tun/tap) to a bridge might not preserve the desired
semantics in a predictable fashion for these corner cases. A you've
already observed, it may work for ethernet but not so well on other
link types. It might not converge fast enough if there's some dynamic
bridge protocol (STP, TRILL) in use, either.
So, I think there's a case for at least some of it to remain in
Attachment: pgpqjkf_URWTO.pgp
Description: PGP signature
Home | Main Index | Thread Index | Old Index | http://mail-index.netbsd.org/tech-net/2011/11/02/msg002890.html | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.059269 |
137 | {
"en": 0.9110364317893982
} | {
"Content-Length": "86960",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:5ZLGGRQB7FN3XNTQSKAGQ36AH2IXASNV",
"WARC-Concurrent-To": "<urn:uuid:15256557-706e-4577-a16d-33e147ff78e9>",
"WARC-Date": "2014-03-13T22:16:42",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:3NNHEHSJMA4WOXB6SPQTR7CCA2G5MOVH",
"WARC-Record-ID": "<urn:uuid:0cd9a94d-f3c7-4846-afc9-6e9290f67454>",
"WARC-Target-URI": "http://math.stackexchange.com/questions/125099/connections-motivations-of-sums-of-two-squares-to-from-other-fields-of-math?answertab=active",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 1,140 | Take the 2-minute tour ×
I am to teach section 18 of "Elementary Number Theory" (Dudley) - Sums of Two Squares - to an undergraduate Number Theory class, and am having trouble cultivating anything other than a rote dissection of the lemmas/theorems presented in the text.
The professor copies (exclusively) from the text onto the chalkboard during lectures, but I would like to present the students with something a little more interesting and that they cannot find in their text.
What are the connections of the "Sums of Two Squares" to other fields of mathematics? Why would anyone care about solving $n = x^2 + y^2$ in the integers?
I am aware of the norm of the Gaussian integers, and will probably mention something about how the identity $$(a^2 + b^2)(c^2 + d^2) = (ac -bd)^2 + (ad + bc)^2$$ is deeper than just the verification process of multiplying it out (e.g. I might introduce $\mathbb{Z}[i] $ and mention that "the norm is multiplicative").
What else is there? The book mentions (but only in passing) sums of three and four squares, Waring's Problem, and Goldbach's Conjecture.
Also, I have seen Akhil's answer and the Fermat Christmas question, but these don't admit answers to my question.
share|improve this question
The solutions to $x^2+y^2=n$ describe all the points in $Z^2$ which belong to the same center with the center in $(0,0)$. You can also use them to find the intersection between $Z^2$ and a circle with the centre at some lattice point.... – N. S. Mar 27 '12 at 16:22
@N.S. - I'd vote on that as an answer. – The Chaz 2.0 Mar 27 '12 at 16:24
A theorem says every nonnegative integer is the sum of four squares of nonnegative integers. It is also true that every nonnegative integer is the sum of three triangular numbers, of five pentagonal numbers, of six hexagonal numbers, etc. Maybe that has no relevance to other areas of mathematics, but if you're wondering why you would care about sums of squares, maybe the fact that it's part of this larger pattern matters. – Michael Hardy Mar 27 '12 at 16:24
It sounds from your question like the main problem here is the professor copying directly from the text onto the chalkboard. What a waste of student's time. Does the instructor explain to colleagues why his/her latest research is interesting by reading directly from the paper? Zzzzzz.... – KCd Mar 28 '12 at 1:37
Asking which integers are sums of two squares is a quintessential theme from number theory. Do the students already find the course interesting at all?? Look at the number of solutions x,y for each n and see how erratically that count behaves as n increases step by step. Some regularity appears if we think about it at primes first. This illustrates the difference between the linear ordering way of thinking about integers in many other areas of math vs. the divisibility relation among integers that is central to number theory. – KCd Mar 28 '12 at 1:44
show 1 more comment
3 Answers
up vote 7 down vote accepted
Consider the Laplacian $\Delta = \frac{\partial^2}{\partial x^2} + \frac{\partial^2}{\partial y^2}$ acting on nice functions $f : \mathbb{R}^2 \to \mathbb{C}$ which are doubly periodic in the sense that $f(x, y) = f(x+1, y) = f(x, y+1)$. There is a nice set of eigenvectors one can write down given by $$f_{a,b}(x, y) = e^{2 \pi i (ax + by)}, a, b \in \mathbb{Z}$$
with eigenvalues $-4 \pi^2 (a^2 + b^2)$, and these turn out to be all eigenvectors, so it is possible to expand a suitable class of such functions in terms of linear combinations of the above.
Eigenvectors of the Laplacian are important because they can be used to construct solutions to the wave equation, the heat equation, and the Schrödinger equation. I'll restrict myself to talking about the wave equation: in that context, eigenvectors of the Laplacian give standing waves, and the corresponding eigenvalue tells you what the frequency of the standing wave is. So eigenvalues of the Laplacian on a space tell you about the "acoustics" of a space (here the torus $\mathbb{R}^2/\mathbb{Z}^2$). For more details, see the Wikipedia article on hearing the shape of a drum. A more general keyword here is spectral geometry.
share|improve this answer
By considering different periodicity conditions you can also motivate studying solutions to $n = ax^2 + bxy + cy^2$ for more general $a, b, c$, and working in higher dimensions you can motivate studying more general positive-definite quadratic forms. There is an interesting general question you can ask here about whether you can "hear the shape of a torus" (the answer turns out to be yes in two dimensions if you interpret "shape" suitably and no in general). – Qiaochu Yuan Mar 27 '12 at 16:35
Of course you don't need me to tell you this, but this is a perfect example of what I am looking for. – The Chaz 2.0 Mar 27 '12 at 16:36
@The Chaz: if you liked this then you might want to pick up a copy of Schroeder's Number theory in science and communication and look in particular at section 7.10. – Qiaochu Yuan Mar 27 '12 at 16:39
Thanks again for this answer. I left it "un-accepted" for a while to encourage more answers. – The Chaz 2.0 May 1 '12 at 2:49
add comment
In another direction, counting the solutions $n=ax^2+bxy+cx^2$, to quadratic forms with negative discriminant is often the starting place for a course on Algebraic Number Theory. I believe Gauss was one of the first people to think about this area. This leads to the definition of Class Number, and we can prove things like Dirichlet's Class Number Formula.
Solutions to $x^2+y^2$ is one of the simplest examples to start with.
share|improve this answer
add comment
At a much more elementary level, one might want to draw connections to what they already know.
For example, there is a very nice connection between the identity $(a^2 + b^2)(c^2 + d^2) = (ac -bd)^2 + (ad + bc)^2$ and the addition laws for cosine and sine.
As another example, suppose that $a$ and $b$ are positive, and we want to maximize $ax+by$ subject to $x^2+y^2=r^2$. Using $(a^2+b^2)(x^2+y^2)=(ax+by)^2+(ay-bx)^2$, we can see that the maximum of $ax+by$ is reached when $ay-bx=0$.
Then there is the generalization (Brahmagupta identity). Connection with Fibonacci numbers. Everything is connected to everything else!
share|improve this answer
Could you point me in the direction of the trig identities you had in mind? Also, is there a sign error? I might just be projecting my tendency to make such errors (cf revisions of this question!) – The Chaz 2.0 Mar 27 '12 at 18:28
I was just thinking of $a=\cos x$, $b=\sin x$, $c=\cos y$, $d=\sin y$. That gives the right signs. For the max problem, I probably switched signs, doesn't matter, one can switch signs without changing correctness of identity. – André Nicolas Mar 27 '12 at 19:08
Got it. Maybe the changed signs only matter in the context of the norm in $\mathbb{Z} [i]$... – The Chaz 2.0 Mar 28 '12 at 1:56
add comment
Your Answer
| http://math.stackexchange.com/questions/125099/connections-motivations-of-sums-of-two-squares-to-from-other-fields-of-math?answertab=active | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.233396 |
34 | {
"en": 0.8389293551445007
} | {
"Content-Length": "72673",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:UXAY6PKXKPTPVSB4WMLMFYTDGN5NWW74",
"WARC-Concurrent-To": "<urn:uuid:ec7cafcb-82b3-4b1c-a667-ddbb3db6e73d>",
"WARC-Date": "2014-03-13T22:11:34",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:V7RFAFNQTPHE2KR3CQIORYQ4P67KK23N",
"WARC-Record-ID": "<urn:uuid:271dc6f0-c26c-4b2e-ba25-924fb3f57ffb>",
"WARC-Target-URI": "http://math.stackexchange.com/questions/223900/for-what-values-of-a-will-the-following-sequence-converge",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 476 | Take the 2-minute tour ×
$a \in \mathbb R$ has the decimal expansion $a = a_0.a_1a_2a_3 \ldots a_n \ldots$
Find all values for $a$ for which the sequence $\{a_n\}_{n=1}^{\infty}$ converges.
I rule out irrationals first, because if they can't be represented with integer numerator and denominator, they can't have convergent decimal expansions. But how do I separate the rationals, say differ between say $1/7$ and $1/3$?
share|improve this question
add comment
3 Answers
up vote 2 down vote accepted
As you have observed since $a_k$'s are digits from $0$ to $9$, it will converge only when there exists an $N$ such that $a_n = d \in \{0,1,2,3,4,5,6,7,8,9\}$ for all $n>N$.
(To see this, choose say $\epsilon = 0.1$. Since $a_n$ converges, this means there exists $N(\epsilon)$, such that $\vert a_{n+1} - a_n \vert < \epsilon$ for all $n > N$. But $a_n, a_{n+1} \in \{0,1,2,\ldots,9\}$. Hence, $a_{n+1} = a_n$.)
Hence, $$a = a_0.a_1a_2\ldots a_N dddddd \ldots$$ $$10^Na = a_0 a_1 \ldots a_N . dddd\ldots$$ $$10^{N+1}a = a_0 a_1 \ldots a_N d. dddd\ldots$$ Hence, $$10^{N+1}a - 10^Na = (a_0 a_1 \ldots a_N d - a_0 a_1 \ldots a_N) = M$$ $$a = \dfrac{M}{9 \times 10^N}$$ i.e. in the simplest form ($\gcd$ of numerator and denominator is $1$) the numbers are of the form $$\dfrac{M}{2^{n_1}3^{n_2}5^{n_3}}$$ where $n_1,n_3 \in \mathbb{N}$, $n_2 \in \{0,1,2\}$ and $M \in \mathbb{Z}$ such that $\gcd(M,2^{n_1}3^{n_2}5^{n_3}) = 1$.
share|improve this answer
add comment
Hint: This is a sequence of integers, mostly between $0$ and $9$. It should not be hard to show that it converges iff it is eventually constant.
What real numbers have an evenually constant decimal expansion? Maybe treat eventually $0$ and eventually $9$ separately (you don't need to), and note that $\dfrac{1}{9}=0.1111111\dots$.
share|improve this answer
this is what i'm having difficulty with. rule out the irrationals, so given a rational $a/ b$ is there a way to say this will eventually go constant? – pad Oct 30 '12 at 0:03
No, a general rational will not go eventually constant, almost all of them will not. For example, ask your calculator about $1/7$, or $1/11$. Rationals have decimal expansion which is eventually periodic. – André Nicolas Oct 30 '12 at 0:07
Take a rational which is eventually constant. By mltiplying by a suitable power of $10$, say $10^k$, we get something of form $0.ddddd\dots$. This part is $\dfrac{d}{9}$. So our number is $\dfrac{1}{10^k}(N+\dfrac{d}{9})$. Bring to a common denominator. We get that our original number has shape $\dfrac{A}{9\times 10^k}$. – André Nicolas Oct 30 '12 at 0:10
add comment
A sequence of digits converges if and only if it is eventually constant. If $a\in\Bbb R$, the sequence of digits in the decimal expansion of $a$ is eventually constant if and only if there is some $n\in\Bbb N$ such that the fractional part of $10^na$ is $0$ or $0.ddd\dots$ for some $d\in\{1,\dots,9\}$. Since $0.ddd\dots=\frac{d}9$, you’re looking for real numbers $a$ such that $10^na=\pm\left(m+\frac{d}9\right)$ for some some $m,n\in\Bbb N$ and $d\in\{0,1,\dots,8\}$. (The case $d=9$ is covered by the case $d=0$.) From there you should be able to work out a nice description of these real numbers without too much trouble.
share|improve this answer
add comment
Your Answer
| http://math.stackexchange.com/questions/223900/for-what-values-of-a-will-the-following-sequence-converge | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.983495 |
36 | {
"en": 0.7725797891616821
} | {
"Content-Length": "61927",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:IVB2BHRD7DHOV6DPOYNADBZQ4WAY6TUG",
"WARC-Concurrent-To": "<urn:uuid:9998fbd6-5551-451a-98fa-8f7694b8140e>",
"WARC-Date": "2014-03-13T21:40:20",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:SA5OAFFGJDDIARZL4M5J2LYO7HXYPPA3",
"WARC-Record-ID": "<urn:uuid:ac163098-299a-4ac1-95bb-551fa98e9a09>",
"WARC-Target-URI": "http://math.stackexchange.com/questions/325966/riemann-stieltjes-integrability-question",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 110 | Take the 2-minute tour ×
If $f$ is a bounded real function on $[a,b]$, and $f^2 \in \mathscr R$, does it follow that $f \in \mathscr R$?
share|improve this question
add comment
1 Answer
up vote 2 down vote accepted
No. Consider
$$f(x)=\begin{cases}1 & \mbox{if}\quad x\in\mathbb{Q}\\ -1 & \mbox{if}\quad x\notin\mathbb{Q}\end{cases}$$
share|improve this answer
Thanks, makes perfect sense. – Ernest Singleton Mar 10 '13 at 0:34
add comment
Your Answer
| http://math.stackexchange.com/questions/325966/riemann-stieltjes-integrability-question | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.560369 |
70 | {
"en": 0.7683831453323364
} | {
"Content-Length": "64252",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:KRU266PRVDW4EOEY2C55ZTFSY3XSOVZP",
"WARC-Concurrent-To": "<urn:uuid:07883f34-77e7-4e78-8836-69d714543c8b>",
"WARC-Date": "2014-03-13T21:36:03",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:FYG43H3XH2ILQ33WGWFNGZMZDZ437TET",
"WARC-Record-ID": "<urn:uuid:91ffc7bb-18de-4530-b3cb-e6e0f4f01e23>",
"WARC-Target-URI": "http://math.stackexchange.com/questions/46531/completion-of-the-squares-actually-of-the-quadratic-forms?answertab=active",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 247 | Take the 2-minute tour ×
I have this paragraph in the book I cannot understand (this is not the first time I encounter this thing but I usually move on).
$$A^\prime TA+A^\prime QB+B^\prime UA+B^\prime RB = (A+T^{-1}QB)^\prime T(A+T^{-1}QB)+B^\prime (R-UT^{-1}Q)B$$
I can do the calculus in the reverse order, but I don’t know how is someone supposed to figure out how to do it, and I don’t understand why such a procedure is called “completing the squares”.
Can someone please elaborate on that?
NOTE: prime stands for transpose and those are all matrices.
share|improve this question
Just curious, what book are you using? – Edison Jun 20 '11 at 20:07
Various: System Identification (Stoica), Estimation with application to tracking and navigation (Li, Bar-Shalon)... – gurghet Jun 20 '11 at 21:03
add comment
1 Answer
up vote 4 down vote accepted
Completing the square for a quadratic polynomial of the form $ax^{2}+2bxy+dy^{2}$ is given by $$ a\left(x+\frac{b}{a}y\right)^{2}+\left(d-\frac{b^{2}}{a}\right)y^{2}.$$
If $A$ and $D$ are symmetric square matrices, and $B$ is $n \times m$, then
$$ \left[ {\begin{array}{cc} x \\ y \\ \end{array} } \right]^T \left[ {\begin{array}{cc} A & B \\ B^T & D \\ \end{array} } \right] \left[ {\begin{array}{cc} x \\ y \\ \end{array} } \right] = \left(x+A^{-1}By\right)^{T}A\left(x+A^{-1}By\right)+y^{T}\left(D-BA^{-1}B\right)y $$
Note that the left hand side of your equation can be written as
$$ \left[ {\begin{array}{cc} A^T & B^T \\ \end{array} } \right] \left[ {\begin{array}{cc} T & Q \\ U & R \\ \end{array} } \right] \left[ {\begin{array}{cc} A \\ B \\ \end{array} } \right]. $$
Hope this helps.
share|improve this answer
add comment
Your Answer
| http://math.stackexchange.com/questions/46531/completion-of-the-squares-actually-of-the-quadratic-forms?answertab=active | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 1.000003 |
3 | {
"en": 0.9657317996025084
} | {
"Content-Length": "34485",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:SPHCJ7EYMOAMW76IDNDLTQZLSUPTABXE",
"WARC-Concurrent-To": "<urn:uuid:e176b038-ada7-45ea-993b-7808d5ba0d7e>",
"WARC-Date": "2014-03-13T22:23:31",
"WARC-IP-Address": "66.114.149.59",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:4XGLPB3NNPFR5MPCQKMU4SZ2TGQSCIZU",
"WARC-Record-ID": "<urn:uuid:e373f901-41fa-4169-9ba1-dc2d950a850f>",
"WARC-Target-URI": "http://mathhelpforum.com/math-topics/59930-worded-problems.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 774 | Results 1 to 2 of 2
Math Help - Worded problems.
1. #1
Nov 2008
Worded problems.
Hi, I'm new to the forums and not sure if this post is in the right forum.
I have in total 10 questions that are absolutely doing my head in. If anyone could help me out and show me how to work these out, it'd be much appreciated.
1) In a class of 45 girls, all of whom have chosen to study either history or psychology, or both, 40 are studying psychology and 25 are studying history. How many are studying both?
A.12 B.20 C.22 D.14 E.8
2) A horse breeder owns 25 horses. If there are twice as many black horses as chestnuts, but the number of brown horses is one more than black and chestnut horses together, how many black horses are there?
A.8 B.12 C.9 D.6 E.10
3) A planes compass is upset by a storm so that the needle which should point north now points to the west. If the pilot flies south by his compass what is his true direction?
A.North B.South-West C.East D.West E.North West
4) In a bag of fruit I have as many oranges as apples and twice as many mandarines as oranges. If I have 15 pieces of fruit how many mandarines do I have?
A.6 B.8 C.2 D.7 E.4
5) A factory employed 120 men. If 25% of those were retrenched and 20% of those who remained were retrained for new jobs within the factory, how many men remained at their original job?
A.72 B.45 C.48 D.20 E.66
6) Two trains, X and Y, leave their common origin together on a 1200km trip. Train X travels three times slower than Y. How far has X to go when Y reaches its destination?
A.300km B.600km C.900km D.800km E.100km
7) I have a bag of oranges and bananas but 20% are bad. If there are 10 pieces of rotten fruit and there are 25 good oranges, how many good bananas are there?
A.15 B.20 C.25 D.30 E.35
8) In a class one-third of the students do psychology, two-fifths do economics and the remaining 8 do physics. How many students are there in the class?
A.12 B.30 C.18 D.24 E.16
9) In a garden, one-quarter of the trees are apple trees and one-third are orange trees. The remaining trees are lemons, grown as wind shelter. What is the number of apple trees in the garden?
10) In a crowded bus, five-eigths of the people had seats. Two-thirds of the remainder held straps to support them and the other 2 people had to use the seat back for support. How many people were on the bus?
A.15 B.12 C.16 D.24 E.10
Any help would be very much appreciated, thanks
Follow Math Help Forum on Facebook and Google+
2. #2
Junior Member
Nov 2008
Worded problems.
1. It appears that there are 45 girls and every one of them must be studying at least one subject. If every one of them studied exactly one subject, the sum of those studying history and psychology would be 45. But it's 65, impling that 20 (65-45) are studying both.
2. Algebra.
C = Number of chestnuts,
2C = Number of black horses (twice as many),
C+2C+1 = Number of brown horses (one more than the sum of the other two)
Since there are 25 altogether, 25 = C+2C+C+2C+1. Solve for C and double it to derive the number of black horses.
3. Everything would appear to be shifted counterclockwise by the same amount. So if North is 12 o'clock, west is 9 o'clock, south is 6 o'clock...you can probably figure out the rest.
4. Algebra again.
A = apples
A = oranges (same number as apples)
2A = mandarins (twice as many as oranges)
A+A+2A = 15 (Are you sure that's not 16?)
The rest of these seem to be similar themed problems. Try the above approach of defining one unknown item as a letter of the alphabet and synchronizing the other items to it, as shown above. As you can see from the above, it should work.
I hope this helps.
- Steve
Follow Math Help Forum on Facebook and Google+
Similar Math Help Forum Discussions
1. Worded question.
Posted in the Algebra Forum
Replies: 2
Last Post: January 26th 2011, 10:54 PM
2. Worded problems (difference equations)
Posted in the Algebra Forum
Replies: 3
Last Post: August 24th 2010, 02:00 AM
3. worded problems
Posted in the Algebra Forum
Replies: 8
Last Post: November 27th 2009, 08:44 PM
4. Replies: 5
Last Post: September 12th 2009, 07:42 PM
5. Replies: 2
Last Post: September 12th 2009, 07:08 PM
Search Tags
/mathhelpforum @mathhelpforum | http://mathhelpforum.com/math-topics/59930-worded-problems.html | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.278838 |
18 | {
"en": 0.8909299969673157
} | {
"Content-Length": "53614",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:G5BCW5YV6CWT5YAAK3JGBU73LGL5XSEK",
"WARC-Concurrent-To": "<urn:uuid:4048680e-d5b6-4e7d-b696-348821206871>",
"WARC-Date": "2014-03-13T21:35:40",
"WARC-IP-Address": "198.252.206.24",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:JWR3YEXLTEAWWW6CZDPTXWKAGGMULCAI",
"WARC-Record-ID": "<urn:uuid:3d0b7578-8c18-42f3-bdac-f6c20383c1bc>",
"WARC-Target-URI": "http://mathoverflow.net/questions/117096/extending-cuspidal-representation-to-more-bigger-group",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 490 | Take the 2-minute tour ×
I am thinking of extending an irreducible cuspidal representation to more bigger group. My question is almost same with the earlier one posted by Neal Harris except the only one.
Let me first invoke his original question.
"Let $E/F$ be a quadratic extension of number fields, and let $V$ be an $n$-dimensional Hermitian space over $E$.
Let $\tilde{G} := GU(V)$ and $G := U(V)$. Suppose that $(\pi, V_{\pi})$ is an irreducible cuspidal representation of $G.$
Is there an irreducible cuspidal representation $(\tilde{\pi}, V_{\tilde{\pi}})$ of $\tilde{G}$ such that $V_\pi \subset V_{\tilde{\pi}}|_{G}$? Note that here, the restriction is that of cusp forms, not of the representation itself."
The difference between mine and his is this; While his assumption G=U(2) and $\tilde{G}$=GU(2) hit the condition $\tilde{G}_{der}\subset G\subset\tilde{G}$, a core property after the Mattew's comment on the post, but my situation does not satisfy this.
Because, I am considering the case $G=E^{\times} , \tilde{G}=B^{\times}$ where E/F is quadratic extension of number fields and B is a quaternion algebra over F with a fixed embedding $E \hookrightarrow B$. Is there no hope in this case?
Since this question is very important to me, if you leave some comment or reference treating this, I will be very appreciate to you.
(Harris's original post.
extending cusp forms)
share|improve this question
add comment
1 Answer
up vote 5 down vote accepted
Looked at a slightly different way: the question of what happens when automorphic forms/repns are restricted to subgroups has complicated answers, in general. It can be treated as a problem in spectral decomposition, say in $L^2$. Another keyword is "period integral" for the integral expressions for the spectral components. Some examples are well-known in other terms: the "Mellin transform" integral that produces the standard L-function for GL(2) cuspforms can be construed (on the critical line!) as computing the spectral components of the restriction of the cuspform to the GL(1) imbedded in the upper left corner. The $GL(n-1)\times GL(n)$ integral formulas amount to computing the $GL(n-1)$ components of the restriction of a cuspform from $GL(n)$.
In other cases, sometimes it is feasible or elementary to compute periods of Eisenstein series, while the corresponding periods for cuspforms are much less elementary. (The Gross-Prasad conjectures were/are an example of this.)
In your specific situation, there are results of Waldspurger that may be approximately what you want.
Given that many of these periods/decomposition coefficients are values of L-functions at the center of the critical strip, except for trivial vanishing due to signs in functional equations, it is non-trivial to prove non-vanishing or vanishing. Thus, to ask that such a period be non-zero for exactly one cuspform would seem to be too much to ask, although perhaps very difficult to prove or disprove.
share|improve this answer
Thanks Paul. I will search for Waldspurger's papers. – Jude Dec 25 '12 at 3:18
add comment
Your Answer
| http://mathoverflow.net/questions/117096/extending-cuspidal-representation-to-more-bigger-group | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.160741 |
431 | {
"en": 0.9751017689704896
} | {
"Content-Length": "31055",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:FPHLNVEQTMDVXUVHBDXZN4WSZESBR3SK",
"WARC-Concurrent-To": "<urn:uuid:a0d1a4e5-5e1d-4dc0-ae7a-54097880b57c>",
"WARC-Date": "2014-03-13T21:35:28",
"WARC-IP-Address": "64.124.231.116",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:NV4UHIJYTNKXKGKGMPDDOG355NOL4SIS",
"WARC-Record-ID": "<urn:uuid:1529aa3e-8699-482e-b8b3-e9264ba038a4>",
"WARC-Target-URI": "http://media-1.web.britannica.com/eb-diffs/474/109474-16457-23851.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 1,597 | CherokeeNorth American Indian people Indians of Iroquoian lineage who inhabited eastern Tennessee and the western Carolinas. Formerly they had lived around the Great Lakes, migrating to the south after their defeat by the Delaware and Iroquois. Their population in 1650 has been estimated at 22,500, spread over constituted one of the largest politically integrated tribes at the time of European colonization of the Americas. Their name is derived from a Creek word meaning “people of different speech”; many prefer to be known as Keetoowah or Tsalagi. They are believed to have numbered some 22,500 individuals in 1650, and they controlled approximately 40,000 square miles (100,000 square km) of the Appalachian Mountains in parts of present-day Georgia, eastern Tennessee, and the western Carolinas at that time.
Traditional Cherokee life and culture greatly resembled that of the Creek and other Indians tribes of the Southeast. The Cherokee nation was composed of a confederacy of symbolically red (war) and white (peace) towns. The chiefs of the individual red towns were subordinated to a supreme war chief, while the officials of the individual white towns were under the supreme peace chief. The white peace towns provided sanctuary for wrongdoers; war ceremonies were conducted in red towns.
When first encountered by Europeans Spanish explorers in the mid-16th century, the Cherokee possessed a variety of stone implements including knives, axes, and chisels. They wove baskets, made pottery, and cultivated corn (maize), beans, and squash. Deer, bear, and elk furnished meat and clothing. Cherokee dwellings were bark-roofed, windowless log cabins roofed with bark, with one door and a smokehole smoke hole in the roof. A typical Cherokee town had between 30 and 60 such houses and a council house, where general meetings were held and the a sacred fire burned. An important religious ceremony observance was the Busk, or Green Corn Festival, festival, a first-fruits and new-fires ritecelebration.
The Cherokee wars and treaties, a series of battles and agreements around the period of the American Revolution, effectively reduced Cherokee power and landholdings in Georgia, eastern Tennessee, and western North and South Carolina, freeing this territory for speculation and settlement by the white man. Numbering about 22,000 tribesmen in 200 villages throughout the area, the Cherokee had since the beginning of the 18th century remained friendly to the Spanish, French, and English all attempted to colonize parts of the Southeast, including Cherokee territory. By the early 18th century the tribe had chosen alliance with the British in both trading and military affairs. In 1773 the Treaty of Augusta, concluded at the request of both Cherokee and Creek Indians, ceded more than 2,000,000 tribal acres in Georgia to relieve a seemingly hopeless Indian indebtedness to white tradersDuring the French and Indian War (1754–63) they allied themselves with the British; the French had allied themselves with several Iroquoian tribes which were the Cherokee’s traditional enemies. By 1759 the British had begun to engage in a scorched-earth policy that led to the indiscriminate destruction of native towns, including those of the Cherokee and other British-allied tribes. Tribal economies were seriously disrupted by British actions. In 1773 the Cherokee and Creek had to exchange a portion of their land to relieve the resulting indebtedness, ceding more than two million acres in Georgia through the Treaty of Augusta.
In 1775 the Overhill Cherokee were persuaded at the Treaty of Sycamore Shoals to sell an enormous tract of land in central Kentucky . Although this agreement with the to the privately owned Transylvania Land Company. Although land sales to private companies violated British law, it the treaty nevertheless became the basis for the white takeover colonial settlement of that area. Threatened by colonial encroachment upon their hunting grounds, the Cherokee announced at the beginning of the American Revolution As the American War of Independence loomed, the Transylvania Land Company declared its support of the revolutionaries; the Cherokee became convinced that the British were more likely to enforce boundary laws than a new government and announced their determination to support the crown. Despite British attempts to restrain them, in July 1776 a force of 700 Cherokee under Chief Dragging -canoe attacked two U.S.Canoe attacked the colonist-held forts in North Carolina: of Eaton’s Station and Fort Watauga (in what is now North Carolina) in July 1776. Both assaults failed, and the tribe retreated in disgrace. These raids set off were the first in a series of attacks by Cherokee, Creek, and Choctaw on frontier towns, eliciting a vigorous response by militia and regulars of the Southern states colonies during September and October. At the end of this time, Cherokee power was broken, their crops and villages destroyed, and their warriors dispersed. The humiliated Indians could win peace only by surrendering defeated tribes sued for peace; in order to obtain it, they were forced to surrender vast tracts of territory in North and South Carolina at the Treaty of DeWitt’s Corner (May 20, 1777) and the Treaty of Long Island of Holston (July 20, 1777). As a result, peace reigned on this frontier
Peace reigned for the next two years. When Cherokee raids flared up again in 1780 during the American preoccupation with British armed forces elsewhere, punitive action led by Colonel Col. Arthur Campbell and Colonel Col. John Sevier soon brought them to terms subdued the tribe again. At the The second Treaty of Long Island of Holston (July 26, 1781) , confirmed previous land cessions were confirmed and caused the Cherokee to yield additional territory yielded.
After 1800 the Cherokee were remarkable for their assimilation of white American settler culture. The Cherokee tribe formed a government modeled on that of the United States. Under Chief Junaluska they aided Andrew Jackson against the Creek (see in the Creek War), particularly in the Battle of Horseshoe Bend. They adopted white colonial methods of farming, weaving, and home building. Perhaps most remarkable of all was the syllabary of the Cherokee language, developed in 1821 by Sequoyah, a half- Cherokee who had served with the U.S. Army in the Creek War. The syllabary—a system of writing in which each symbol represents a syllable—was so successful that almost the entire tribe became literate within a short time. A written constitution was adopted, and religious literature flourished, including translations from the Christian scriptures. An Indian Scriptures. Native Americans’ first newspaper, the Cherokee Phoenix, the first of its kind, began publication in February 1828.
But the The Cherokee’s rapid acquisition of white settler culture did not protect them against the land hunger of the settlersthose they emulated. When gold was discovered on Cherokee land in Georgia, agitation for the removal of the Indians tribe increased. In December 1835 the Treaty of New Echota, signed by a small minority of the Cherokee, ceded to the United States all their Cherokee land east of the Mississippi River for $5 ,000,000million. The overwhelming majority of Cherokees tribal members repudiated the treaty and took their case to the U.S. Supreme Court. The court rendered a decision favourable to the Indianstribe, declaring that Georgia had no jurisdiction over the Cherokees Cherokee and no claim to their landsland.
Georgia officials ignored the court’s decision, and President Andrew Jackson refused to enforce it. As a result, the Cherokees were evicted under the , and Congress passed the Indian Removal Act of 1830 to facilitate the eviction of tribal members from their homes and territory. Removal was implemented by 7,000 troops commanded by General Gen. Winfield Scott. Some Scott’s men moved through Cherokee territory, forcing many people from their homes at gunpoint; as many as 15,000 Cherokees Cherokee were first thus gathered into camps while their homes were plundered and burned by local residents. Then the Indians Subsequently these refugees were sent west in groups of about 1,000, most the majority on foot.
The eviction and forced march, which came to be known as the Trail of Tears, took place during the fall and winter of 1838–39 and . Although Congress had allocated funds for the operation, it was badly mismanaged. Inadequate , and inadequate food supplies, shelter, and clothing led to terrible suffering, especially after frigid weather arrived. About 4,000 Cherokees Cherokee died on the 116-day journey, many because the escorting troops refused to slow or stop so that the ill and exhausted could recover.
When the main body had finally reached its new home in what is now northeastern Oklahoma, new controversies began with the settlers already there. Feuds and murders rent the tribe as reprisals were made on those who had signed the Treaty of New Echota.
In Oklahoma the Cherokee joined four other tribes, the tribes—the Creek, Chickasaw, Choctaw, and Seminole, all Seminole—all of which had been forcibly removed from the Southeast by the U.S. government in the 1830s. For three-quarters of a century, each tribe had a land allotment and a quasi-autonomous government modeled on that of the United States. In preparation for Oklahoma statehood (1907), some of this land was allotted to individual Indianstribal members; the rest was opened up to white homesteaders, held in trust by the federal government, or allotted to freed slaves. Tribal governments were effectively dissolved in 1906 but have continued to exist in a limited form. Some Indians now live on tribal landholdings that are informally called reservations. In the late 20th century there were approximately 47,000 Cherokee descendants living in eastern Oklahoma and about 15,000 full-bloods.
At the time of removal in 1838, a few hundred Cherokee individuals escaped to the mountains and furnished the nucleus for the 3,000 several thousand Cherokee who were living in the 20th century lived in western North Carolina in the 21st century. Early 21st-century population estimates indicated more than 730,000 individuals of Cherokee descent living across the United States. | http://media-1.web.britannica.com/eb-diffs/474/109474-16457-23851.html | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.058834 |
33 | {
"en": 0.9044427275657654
} | {
"Content-Length": "2263",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:HBWZY4N3UNXUYOZK6OR4PIVS3MXZY4M3",
"WARC-Concurrent-To": "<urn:uuid:4c994b5e-396b-4c89-ab11-b50469d1d857>",
"WARC-Date": "2014-03-13T22:16:01",
"WARC-IP-Address": "208.185.238.116",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:C3LS6FUGLIWRWKB75O35DF643DVGBIEU",
"WARC-Record-ID": "<urn:uuid:70b7b6a7-20b6-4315-a28c-5bbbba7b5048>",
"WARC-Target-URI": "http://media-2.web.britannica.com/eb-diffs/205/256205-34781-39405.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 156 | Hartog, Dirckalso spelled Dirk Hartog or Dyrck Hartoochz ( flourished 1616Dutch explorer who made the first recorded exploration of the western coast of Australia.
Traveling an eastward route from Amsterdam around the Cape of Good Hope to Java, Hartog sighted and explored the western Australian coastline. He landed (October 1616) and spent three days exploring a desolate offshore island that he named for himself. To mark his landing, he left a flattened pewter plate, inscribed with the details of the visit, nailed on a post on the northern end of the island, now called Cape Inscription. In 1696 another Dutch explorer, Willem de Vlamingh, landed on Dirk Hartogs Island, found Dirck’s Hartog’s plate, replaced it with a newly inscribed dish, and sent the original to Amsterdam, where it can now be seen in the Rijksmuseum.
Until the 19th century the coast of Australia parallel to Dirk Hartogs Island was called Eendrachtsland, in honour of the explorer’s ship, Eendracht. | http://media-2.web.britannica.com/eb-diffs/205/256205-34781-39405.html | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.090175 |
61 | {
"en": 0.9509980082511902
} | {
"Content-Length": "81820",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:DZ2FUIY2H3ALOFOQ6LVWFFQE4USDGQBR",
"WARC-Concurrent-To": "<urn:uuid:c2b94ca4-8ff7-4bb8-8dd8-0071e538830b>",
"WARC-Date": "2014-03-13T22:25:49",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:H5YTCRVU2A2WVCIO2GHBGDKOB3H7ENDX",
"WARC-Record-ID": "<urn:uuid:3d4bc260-428f-4396-aa97-8dfd34a85931>",
"WARC-Target-URI": "http://meta.stackoverflow.com/questions/68753/should-software-vendors-discourage-stackoverflow-questions-from-their-developer/68754",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 1,064 | I work for a software company. We have a number of closed-source products, one open-source product and an ecosystem of partners and application developers who use it to develop their applications.
One day, a member of our developer community might ask a question on StackOverflow, "How do I do this using your API?" What should we do: reply on StackOverflow or create a Q&A or a discussion forum elsewhere?
Here are my own thoughts: From the StackOverflow FAQ: "...if your question generally covers a specific programming problem, a software algorithm, software tools commonly used by programmers, matters that are unique to the programming profession..." Since our product is not a "software tool commonly used by developers", I'm leaning towards not using StackOverflow for such questions and taking our discussions elsewhere. It doesn't seem to me that any reputation points I might get from answering such questions would be honestly earned. On the other hand, what is so great about StackOverflow that developers dumbfounded by some obscure API can ask a question and find someone who has solved that problem before them.
ADDED: Thanks everyone for good answers! My takeaways:
• asking such questions is OK
• if they ask, we'll answer
• we need to have our own forum
share|improve this question
add comment
7 Answers
I think it's perfectly OK for your developers to answer questions on SO about your company's products (and anything else, for that matter).
APIs generally do fall into the category of commonly used tools. In practice, an API that appeals to a small number of developers won't attract many answers. But that's not a reflection of its appropriateness to the site.
The only thing that is discouraged specifically is spammy behavior. When suggesting a product you need to divulge your association with the product. And if all you do is go around suggesting your product any time someone mentions certain keywords, you'll get downvoted, flagged, and possibly even banned. I only mention all this to clarify where the line is. Answering questions about your product is 100% OK.
share|improve this answer
add comment
Third party closed-source add-ons and library questions don't do well at SO. Their market penetration is very small. I'm familiar with the .NET tags, JetBrains' Resharper is pretty wide-spread. Only 625 questions that have that tag. Things go down from there quickly. DevExpress is the bigger library vendor, 390 tagged questions. Infragistics, my personal pet peeve as a company that ships libraries that really seem to give their users a hard time, 220 tagged questions.
These questions don't often get answers. Create some annoyance too because the OP tags them with a major tag like [C#].
DevExpress is notable because they both sponsor this site and put some of their devs under a user name to post answers to specific questions. The effort lasted about 2 months and then just kind of died down, not really missed by many.
There is no substitute for a tool or library vendor running its own support forums. Your customer spent the money with the implicit assumption that they are going to get supported using your product. You can not count on volunteers taking over your duty. You have to staff that forum with experts from your company that help them using your product. It's been this way for as long as I can remember.
It is possible. Study Qt's business model. Or SO's.
share|improve this answer
I very much agree with your point about Infragistics – joshcomley Oct 28 '10 at 13:57
If the Dev team wants to use SO to deliver this kind of support, I don't think the 'small' user base is a problem, because they'll give the most authoritative answer you could ask for. – Ivo Flipse Feb 23 '11 at 13:00
add comment
I would encourage answering such answers on StackOverflow. You never know who else may benefit from the responses. Sometimes the programming ideologies which can be gleaned from the question is more important than the actual "answer."
However, I would really discourage using this site as a replacement for hosting your own support forum.
share|improve this answer
add comment
Odds are, no one knows the product better than your company. That being said, you'll be in the best position to provide meaningful, constructive answers that others will be able to learn from as well.
As long as you don't go off on a Marketing rampage in your answers, I don't see why not.
share|improve this answer
add comment
This is correct.
I also answered here:
share|improve this answer
Well put, my sentiments exactly. – zourtney Oct 27 '10 at 23:24
But the OP is asking about the scenario One day, a member of our developer community might ask a question on StackOverflow - how else can the community adopt a project, if not by asking questions about it? – Pëkka Oct 28 '10 at 10:37
add comment
Probably not. Every piece of software has a vendor in some sense and if all vendors discouraged using StackOverflow then in total we'd have exactly 0 questions, 0 answers and 0 users.
That aside, on StackOverflow one can't address a question to a specific entity or person.
Instead the question is addressed to the whole community and stumbling upon a specific one is somewhat a coincidence. Hence nobody has the obligation to answer. It's completely voluntary.
If reputation points earned by sharing first-hand knowledge make you feel uncomfortable then don't answer. Or do it so badly that you only get downvotes :)
share|improve this answer
add comment
If I post a basic question about X on SO and don't get a good answer, I assume that X is not being used much - this may lead me to deciding not to use X
(Or I choose to use what I know I can get help using from SO.)
share|improve this answer
add comment
You must log in to answer this question.
Not the answer you're looking for? Browse other questions tagged . | http://meta.stackoverflow.com/questions/68753/should-software-vendors-discourage-stackoverflow-questions-from-their-developer/68754 | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.524118 |
36 | {
"en": 0.9560415744781494
} | {
"Content-Length": "87354",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:S5AU52UZSQFZUDPRWFWWP4YUI22H6MDI",
"WARC-Concurrent-To": "<urn:uuid:0ec3e24f-5f7f-41f4-a308-39134da13afc>",
"WARC-Date": "2014-03-13T21:45:47",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:5K44SUZS7JGFMDNPT5PITUFI6JXZYZNE",
"WARC-Record-ID": "<urn:uuid:f0db7b38-bdb4-4cb4-9fb6-0c5b46e81293>",
"WARC-Target-URI": "http://meta.stackoverflow.com/questions/91553/i-see-welcome-back-if-you-found-this-question-useful-message-very-frequent?answertab=active",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 1,478 | For the past few weeks, almost every time I link directly from Google into a question I see the "Welcome back! If you found this question useful, don't forget to vote both the question and the answers up." banner. I've clicked the "hide" link at the bottom of that banner. It will seem to keep it hidden for a little while (in other words, for the next few questions I click into), but then it will show up again a day or two later. This seems like a bug...
share|improve this question
An additional annoying behavior of this is that if you do click to hide it and then click a link within an answer that brings you to another website, when you hit your browser "Back" button to return to the question, the popup will appear again, doubling your frustration. – jomtois Sep 22 '13 at 13:57
add comment
2 Answers
This isn't a bug, this is by design:
only appears if
• you haven't been seen on the target site for 48 hours
• you hold a valid user cookie on the target site
• your account has more than 15 rep on the target site
• you arrive on a question from a search engine
If you are a very infrequent visitor, yet tend to hit a lot of web search results... you might want to log out. But you really should be voting up all those search results if you found them, and they are helping you!
share|improve this answer
I assume you have metrics in place to measure the effectiveness of this prompt? I wonder if you can evaluate the need for the message at runtime so that you don't annoy chronic searchers if they meet some minimum threshold for voting on answers they find. For example, if they vote on n out of 10 questions, perhaps they can hide the message. If their voting patterns change and they only vote on m out of 10, you override their "hide" preference. – user414076 May 17 '11 at 3:39
Jeff - I am honored to be rebutted by you. Still, I feel this prompt ends up being annoying noise after a while... It definitely is no longer encouraging me to vote up good questions. Anyway, thanks. hearts and unicorns... – joe larson May 17 '11 at 15:07
...and as I think about it a bit longer, possibly the problem is that it comes up before I've had a chance to even read the question and answers, so I don't know yet. It's a bit like the salesguy that harasses you as soon as you walk into the store instead of after you've had a chance to look around and get your bearings. Maybe it could show up after a minute or something? Or possibly after I vote up an answer? – joe larson May 17 '11 at 15:09
@Joe, why should the system remind you to vote after you've already done so? – user414076 May 17 '11 at 20:13
@Anthony - the reminder I'm complaining about is a reminder to vote for the Question. I am suggesting that this reminder be shown when a user votes for an Answer (since this indicates they found the general topic of the question useful, useful enough to evaluate and vote for an answer). – joe larson May 17 '11 at 21:03
Oh, right. Very well then, carry on. – user414076 May 17 '11 at 21:04
I've used SO for quite a while now, I know how it works. A message bugging me to vote is annoying and won't affect if I vote that question or answer up. The vast majority of questions I find via Google don't apply to what I'm searching for. If I find a question/answer that helped me or that I find useful/good I'll vote for it, no worries, but that message is annoying! – pbz May 18 '11 at 3:10
As a long time StackOverflow user, this message popup annoys me to distraction, to the point that I've STOPPED VOTING UP THE GOOD QUESTIONS AND ANSWERS out of annoyance. This is very useless, what, because I haven't visited in 24 hours? Why not display if I haven't visited in one hour? Why not have a floating CSS popup that keeps the annoying message up for the entire duration of a visit? – Mike Jun 22 '11 at 16:40
24 hours seems like way too short a time period. It's not like I've forgotten how the site works merely because I was competent enough yesterday to avoid SO for any help. :) It's also more annoying because the message is multi-line - I can't just ignore it easily, like I can with the other notifications. – Xiong Chiamiov Jun 27 '11 at 1:57
I also have to take issue with "If you are a very infrequent visitor, yet tend to hit a lot of web search results... you might want to log out.". If I was an infrequent visitor, I wouldn't mind - clicking away a banner every few weeks isn't a big deal. It's precisely because I visit every other day or so that it's annoying, and the only thing it motivates me to do is stay logged-out (thus, not voting up any questions or answers). I think the root of the problem may be our differing expectations of usage of the site - you seem to think that we should all be visiting multiple times a day. – Xiong Chiamiov Jun 27 '11 at 2:02
@xiong fine; I increased it to 48 hours. This will go out in the next deploy. – Jeff Atwood Jun 27 '11 at 7:01
Personally, Jeff, I really think this should be more like every 5-10 days, definitely not every 48 hours. We're smart people here, we know how the site works, and we know that we can (and should) upvote questions. We don't need to be hounded by a digital mother to do our chores. Would it be so bad if it only popped up once a week? Or only if I haven't upvoted a question for a while? Or maybe only if I have viewed X number of questions without voting? Or maybe just trust that the smart people that use your site, don't need reminding every other day. – KOGI Jul 18 '11 at 22:10
I'm reminded of an article about Joel Spolsky (I think you know him) about little things adding up. In the big scheme of things, this reminder is definitely not a huge deal, but it definitely qualifies as an annoyance (a rather large one to boot). – KOGI Jul 18 '11 at 22:12
The fact that it's once every three days isn't what makes it annoying; it's that it seems like it's every time I visit the site. Normally SO and related sites are the first thing I click on if they appear in Google results; this encourages me to either not do so (!) or to log out (which bothers me, because I like upvoting useful things and leaving helpful comments). I don't mean to sound whiny; I just find it frustrating that something that has made programming so much better seems insistent on driving me away from it. – Xiong Chiamiov Oct 6 '11 at 20:09
How often do most users visit stackoverflow? My guess is that for most users, including myself, "once every 24 hours" and "once every 72 hours" both translate to "every time I visit stackoverflow." For us, this change is not a change. – Tom Future Mar 12 '12 at 22:59
show 5 more comments
The current criteria for choosing when to show the banner are IMHO overly aggressive and will only get worse as Stack Exchange grows. I frequent two or three Stack Exchange sites, but I visit many of the others infrequently. I prefer them to other Q&A sites, because I know they work. But every time I go to a specific Stack Exchange site that I haven't been to recently enough for the current criteria, I get this message.
The message detracts from my experience because:
• It is visually distracting (deliberately because it's animated)
• I can't just ignore it, because it covers up useful UI elements
• It forces me to do extra work to make it go away
• It tells me nothing I didn't already know
Suggested improvement: I suggest the current criteria be expanded to include a condition that checks your frequency of activity across all Stack Exchange sites. "Activity" can include voting not just visiting, and then the message will get to the right people. Clearly targeting this message at people who already vote frequently is unnecessary.
Those of us who are frequent users of the system-at-large, but not that specific site, shouldn't have to put up with this. To be clear, this is making Stack Exchange worse for me, and the impact is increasing as the number of Stack Exchange sites increases.
share|improve this answer
add comment
You must log in to answer this question.
Not the answer you're looking for? Browse other questions tagged . | http://meta.stackoverflow.com/questions/91553/i-see-welcome-back-if-you-found-this-question-useful-message-very-frequent?answertab=active | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.061104 |
442 | {
"en": 0.9664950966835022
} | {
"Content-Length": "41933",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:TVM2W7YJJ63Q5U744A3AWRWBAPXZ4RY7",
"WARC-Concurrent-To": "<urn:uuid:a4936815-960a-421d-893e-9c7efb8505ba>",
"WARC-Date": "2014-03-13T21:40:25",
"WARC-IP-Address": "157.166.248.108",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:R33KIS2OPHHWG5Y3B7KFWP4GYTPBDOWB",
"WARC-Record-ID": "<urn:uuid:d1cfe64b-4ed4-4e3d-a1c3-c31b507d5944>",
"WARC-Target-URI": "http://money.cnn.com/2013/10/10/news/companies/pbm-pharma-management.pr.fortune/index.html",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 555 | Painful prescription
@FortuneMagazine October 10, 2013: 8:00 AM ET
PDB28 pills
Schenk decided to figure out where Meridian's money was going and why its drug costs were escalating. That was no easy task because, like most PBM customers, Meridian received data only on what it was being charged for each employee prescription. Meridian didn't know what it cost the PBM to fill that order.
When he compared the two lists, the mild-mannered pharmacist was shocked: Express Scripts was making huge gross profits (known as "spreads" in the PBM world) ranging from $5 per order to many multiples of that. In one particularly extreme example, Meridian was billed $92.53 for a prescription for generic amoxicillin filled at an outside pharmacy. Meanwhile, Express Scripts paid $26.91 to Meridian's own pharmacy to fill the same prescription. That meant a spread of $65.62 on one bottle of a generic antibiotic.
Express Scripts vehemently insists it saves money for clients and that the vast majority are satisfied with its service. And like any company -- to state the obvious -- it's entitled to a profit. The question is, Who is making out better -- the PBM or its customers? Many experts say the former. They argue that many companies stick with traditional PBMs because drug pricing is so impossible to untangle that customers have no way to verify how much they're saving, if anything.
Join the Conversation
CNNMoney Sponsors | http://money.cnn.com/2013/10/10/news/companies/pbm-pharma-management.pr.fortune/index.html | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.227871 |
69 | {
"en": 0.964155614376068
} | {
"Content-Length": "72012",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:YMZ5ARCQRFOTWPD6JEPKCITFV5BECZXO",
"WARC-Concurrent-To": "<urn:uuid:549cf102-3d09-447a-a9e5-7fbd13457650>",
"WARC-Date": "2014-03-13T21:51:11",
"WARC-IP-Address": "141.101.114.30",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:GGULBPYMLAKI4UO4SRL4DBOYG27MH7J4",
"WARC-Record-ID": "<urn:uuid:828607f9-81c7-46bf-b102-4cfa0a38c57e>",
"WARC-Target-URI": "http://movieroomreviews.com/hobbit-desolation-smaug/hobbits-tauriel-dangerous-154660",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 310 | The Hobbit's Tauriel is 'dangerous'
Movie Description(Click Here To Hide)
July 7th, 2013
Evangeline Lilly's character in 'The Hobbit: The Desolation of Smaug' is ''dangerous''.
The actress plays Elven warrior Tauriel in the new film and says her alter-ego is far more fiery and brash than Cate Blanchett's wise character, Galadriel.
She explained to Empire magazine: ''She is less wise and much more dangerous. I'm barely 300 years old! She's got a little bit of immaturity and a lot of spontaneity.
''I've been up in trees and scaled walls. I scale an orc at one point - she's almost ninja-esque. She's just slicing through [rivals] like blades of glass to get to the finish line. She has no problem killing; that is what she does. She is a killing machine.''
The 'Lost' star admits landing a part in the trilogy - which is a precursor to the 'Lord of the Rings' movies - was a dream come true as she used to ''fantasise'' about being an elf.
She said: ''This is probably the most tempting role I could be offered.''
However, director Peter Jackson and producers Philippa Boyens and Fran Walsh admit it's a risk to introduce the character into the films as she doesn't appear in the books.
The trio felt 'The Hobbit' needed a female touch and hope Tauriel is a hit with cinema-goers.
Boyens said: ''Tauriel was a complete addition for filmic reasons. You need energy in there - there are young women watching these films. It was an easy decision to make.'' | http://movieroomreviews.com/hobbit-desolation-smaug/hobbits-tauriel-dangerous-154660 | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.019103 |
121 | {
"en": 0.9276107549667358
} | {
"Content-Length": "168339",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:NDFZSWMCRFPFRYQL5W5QGM3N7UDRHTBQ",
"WARC-Concurrent-To": "<urn:uuid:be539184-ad89-4246-a891-c575ce00935f>",
"WARC-Date": "2014-03-13T22:15:03",
"WARC-IP-Address": "67.228.244.148",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:XDSLEVTKZKOISG3U52Z7NPWQHPSP3KRO",
"WARC-Record-ID": "<urn:uuid:28f8ed3c-acad-4d8e-a42e-af523ea17f9f>",
"WARC-Target-URI": "http://n4g.com/news/1295806/atlus-mother-company-owes-a-lot-of-money-to-a-lot-of-people-including-kadokawa-and-nintendo",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 1,137 | Submitted by Abriael 253d ago | news
We already knew that ATLUS’s mother company Index Corporation filed for Civil Rehabilitation (the Japanese equivalent of a soft Bankruptcy) a few days ago, and today we finally know who the main creditors are (Atlus, Kadokawa games, Nintendo, PC, PS Vita, PS3, Wii U, Xbox 360)
Alexious + 253d ago
This game is....interesting...
herbs + 252d ago
If Dragons Crown came to Wii U
I would be so Happy
False-Patriot + 252d ago
Why? This game is coming to PS3 and Vita. You don't like it?
#1.1.1 (Edited 252d ago ) | Agree(2) | Disagree(7) | Report
Blacklash93 + 252d ago
He can't wish for it to be ported to a particular system? Is that a crime against this stupid brand loyalty people are obsessed with?
It's not like he's wishing PS3 and Vita owners can't get it.
#1.1.2 (Edited 252d ago ) | Agree(6) | Disagree(4) | Report
3-4-5 + 251d ago
Nintendo could just take like 50% stock in exchange for no debt and then Atlus games would be over in US on Wii U and 3DS more.
#1.2 (Edited 251d ago ) | Agree(0) | Disagree(1) | Report | Reply
PFFT + 253d ago
looks like it will be a fun game.
Abriael + 253d ago
Yeah but that's not exactly what this article is about... oh well.
Need4Game + 253d ago
Nintendo & Atlus, WIIU may as well live for decades.
Kratoscar2008 + 252d ago
SMTxFE at least means that Nintendo will have to do something about it, i say buy it. Their console still get the most ATLUS games anyways.
jc48573 + 253d ago
man, Kadokawa may as well absorb Atlus.
OrangePowerz + 253d ago
Sony or Nintendo should buy Atlus or anybody else as long as it's not MS.
Kenshin_BATT0USAI + 253d ago
I personally hope no one buys them and they become independent.
OrangePowerz + 253d ago
If they have the finances for that yes, but I'm not sure they have.
DarkBlood + 252d ago
remeber they can not be bought out by a
non-japanese so theres nothing to worry about with microsoft lol
im fine with either sony or nintendo or maybe a joint ownership might be easier
Canary + 252d ago
That's not going to happen.
As I understand it, this "mother company" stuff is a mistranslation--in Japan, Atlus is just the brand-name. The actual company name is Index. So when you hear Index is in trouble, and probably culpable, what that means is that ATLUS, itself, is in trouble.
So, really, there are two possible outcomes: they're bought out by a major publisher, or they dissolve into the ether and their franchises crumble to dust.
_QQ_ + 252d ago
Nintendo just buy Atlus already, and Platinum while you are at it.
Dark_Overlord + 252d ago
I would rather Nintendo didn't, I think they'd restrict some of the themes Atlus employ in their games (Remember this is the same company that refused the Binding Of Isaac due to it's theme)
#6.1 (Edited 252d ago ) | Agree(1) | Disagree(1) | Report | Reply
_QQ_ + 252d ago
Well Atlus makes plenty of their games on the 3ds,if Nintendo is okay with bayo2 i'm sure whatever reason they had for restricting the game you are talking about is gone.
#6.1.1 (Edited 252d ago ) | Agree(1) | Disagree(2) | Report
Dark_Overlord + 252d ago
I was hinting mainly at Persona, have you played them? And oddly enough they've never been on a Nintendo console (coincidence much?).
As for the bayo 2 reference it makes no sense, I don't remember Bayo shooting herself in the head once ;)
#6.1.2 (Edited 252d ago ) | Agree(1) | Disagree(1) | Report
Jyndal + 252d ago
Uh...I don't care who buys Atlus...I just want to know more about the game with the hot witch pictured above :P
lizard81288 + 252d ago
I forgot what it is called, but the Jimquisition did an episode about the game with a thumb nail of her. He says what the game is.
Dark_Overlord + 252d ago
Dragon's Crown :)
RockmanII7 + 252d ago
seriously this comment is not spam. I don't know why N4G doesn't believe me.
Apollosupreme + 252d ago
For the love of God, no, don't not buy Atlas, Nintendo. We don't to have to buy your lame duck Wii U.
MartinB105 + 252d ago
I own a Wii U, and I must say that... I still agree with you. :)
Saints94 + 252d ago
Normally I don't really care.... but the Persona Series needs to be on Sony's consoles.
Pittoo + 252d ago
Atlus? This game will never see the light of day in Europe then.
TongkatAli + 252d ago
Dragons Crown is coming out for Europe this year.
tarbis + 252d ago
Dark_Overlord + 252d ago
Have you not seen the constant bombarding of Shuhei Yoshida in relation to this XD
tarbis + 252d ago
Really? Show me pls. Imma check Yoshida's twitter now. XD
Dark_Overlord + 252d ago
I tried remembering where I'd seen it and can't :( (I'd also cleared my history a day or so ago), but it was a thread where people were posting the emails, tweets etc they'd sent :)
BosSSyndrome + 252d ago
If anyone buys em its gonna have to be nintendo. how else will they finish smt x Fe?
YoungPlex + 252d ago
It's interesting to see that Nintendo is close to the top of the list. I always felt that Nintendo didn't have nearly enough Atlus games compared to Sony platforms. Another interesting point that the author made was that Nintendo could possibly bid on Atlus to offset their debt, but realistically Nintendo would have to pay-off all the debt in order to acquire Atlus as a whole. I think it would be a genius move but not a realistic one.
tiffac008 + 252d ago
Index is currently reorganizing that is why they applied for the Civil Rehabilitation Proceedings. This is not a form of liquidation and absorption proceedings that we saw with THQ and Eidos.
So until further notice Atlus (which is profitable) should continue on making and publishing games.
Add comment
New stories
The Halo Bulletin: 3.12.14
Yoshi's New Island Review | WGTC
Titanfall Eve: “It Was Like Christmas, but Better”
Win a PS4!
CeX review- Donkey Kong Country: Tropical Freeze
| http://n4g.com/news/1295806/atlus-mother-company-owes-a-lot-of-money-to-a-lot-of-people-including-kadokawa-and-nintendo | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.031139 |
16 | {
"en": 0.9517707824707032
} | {
"Content-Length": "44770",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:SP6FMGBFULW6WFHN5PB3EQOXOFJLR7FA",
"WARC-Concurrent-To": "<urn:uuid:b3634fae-57e7-44a3-bc67-f35b10e511c5>",
"WARC-Date": "2014-03-13T22:33:12",
"WARC-IP-Address": "212.58.246.80",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:BGRXPE7ZS64BAVWHI6MTHNOUY2UK2JER",
"WARC-Record-ID": "<urn:uuid:9ec6ac5d-611d-4866-aaf9-c04af62e4ec6>",
"WARC-Target-URI": "http://news.bbc.co.uk/2/hi/europe/884027.stm",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 848 |
BBC News World Edition
You are in: Europe
News Front Page
Middle East
South Asia
Talking Point
Country Profiles
In Depth
BBC Sport
BBC Weather
Friday, 8 September, 2000, 12:17 GMT 13:17 UK
What caused the accident?
No-one has yet established the truth about what caused the Kursk K-141 nuclear submarine to lose contact with the outside world and sink to the bottom of the Barents Sea with all hands on board.
The extent of the damage discovered by rescuers has led experts to conclude that the submarine was hit by a large explosion or that it collided with the sea bed or another large vessel. Some theories suggest a collision triggered an explosion.
Two explosions were heard at the time of the accident, by US and Norwegian authorities monitoring Russian exercises.
The second explosion was reported to be equivalent to two tonnes of TNT and bigger than the first.
The theories about the cause of these explosions abound, and so far none have been substantiated:
• A torpedo in the Kursk's forward compartment - which was carrying up to 30 warheads - exploded.
"There may have been an explosion in one of the weapons systems aboard, for example a torpedo, which then triggered a bigger explosion two minutes later," said Norwegian armed forces spokesman Brigadier Kjell Grandhagen.
Russia's official military newspaper Krasnaya Zvezda has reported that the Kursk's battery and propeller torpedo-launching technology had been replaced with a cheaper and potentially dangerous liquid fuel system, against the wishes of Navy officials. The liquid fuel is highly combustible.
US naval experts also believe volatile fuel could be to blame. Using data obtained from an intelligence gathering ship and two US nuclear submarines that were monitoring the Kursk during exercises, they say the first explosion involved fuel from a torpedo or a long-range anti-shipping missile carried by the sub.
They say this then created a fire which set off other warheads, provoking an explosion which ripped open the Kursk's twin-pressurised hulls.
• The submarine collided with the seabed during a manoeuvre, causing tanks of pressurised air inside the submarine to explode or otherwise triggering a larger explosion. A retired commander of the Black Sea Fleet, Admiral Eduard Baltin, has suggested that the accident was a result of incompetence, bad planning and bad training.
"The Kursk is designed for the ocean, not for shallow waters. Where it was manoeuvring and where it perished is completely wild - strong currents and strong winds. You can't carry out torpedo firing there," he said.
• The submarine collided with a US or British submarine, which triggered a second explosion. Russia's navy chief Mikhail Motsak said three non-Russian submarines were in the Barents Sea at the time of the accident. "We think that it could have been a British submarine", he said. The Russian daily Sevodnya said it had evidence that the Kursk crashed into a US submersible, which then limped into a Norwegian port.
The Pentagon has admitted that two US submarines were in the same zone, but denied they were involved in a collision.
"We have found absolutely no indication that there has been a collision in the area," Norwegian armed forces spokesman Brigadier Kjell Grandhagen has told the BBC.
• It was sunk by an anti-ship missile fired by a Russian cruiser. According to Germany's Berliner Zeitung, quoting a report by Russia's intelligence service the FSB, the Kursk was sunk by a radar-guided Granit missile fired by the Kirov class nuclear-powered cruiser Peter the Great. The FSB, however, has denied knowledge of the report.
• The submarine hit a surface vessel, possibly a Russian ship
• It hit a mine left over from World War II.
It is thought that whatever happened to the Kursk it happened quickly - so quickly that it could not even send out a distress call, or release an emergency beacon.
Vladimir Putin on a submarine
President Vladimir Putin took a trip on a submarine, the Karelia, earlier this year
Doubts have arisen regarding the news disseminated by the Russian navy that seamen inside the vessel had been communicating with rescuers by tapping on the submarine wall.
Russian defence analyst Pavel Felgenhauer says the sounds detected were never more than a faint knocking sound coming from somewhere inside the vessel.
And a US intelligence analysis, details of which were apparently leaked to the US media, is said to indicate that no communication of any kind was heard from inside the submarine at any time after the disaster struck.
The Kursk submarine accident
Key stories
Internet links:
The BBC is not responsible for the content of external internet sites
E-mail this story to a friend
Links to more Europe stories
© BBC ^^ Back to top
| http://news.bbc.co.uk/2/hi/europe/884027.stm | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.041467 |
21 | {
"en": 0.928147792816162
} | {
"Content-Length": "63144",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:DR6GHS65W6CAJN36TRJJICGWIYPPQBV7",
"WARC-Concurrent-To": "<urn:uuid:fb2b3f84-3f16-4548-b74d-830b72043691>",
"WARC-Date": "2014-03-13T21:53:41",
"WARC-IP-Address": "212.58.244.57",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:FVCH5EGFDRJLCIAP3RTQS5AQ3P3I5VPC",
"WARC-Record-ID": "<urn:uuid:8aac167a-9f1a-4747-b819-0ecd752be362>",
"WARC-Target-URI": "http://news.bbc.co.uk/2/hi/science/nature/6610125.stm",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 793 | [an error occurred while processing this directive]
BBC News
watch One-Minute World News
Last Updated: Monday, 30 April 2007, 22:37 GMT 23:37 UK
Arctic melt faster than forecast
By Richard Black
Environment correspondent, BBC News website
Polar bear on ice. Image: SPL
Arctic summer ice has been shrinking by about 9% per decade
Arctic ice is melting faster than computer models of climate calculate, according to a group of US researchers.
Since 1979, the Arctic has been losing summer ice at about 9% per decade, but models on average produce a melting rate less than half that figure.
The scientists suggest forecasts from the Intergovernmental Panel on Climate Change (IPCC) may be too cautious.
The latest observations indicate that Arctic summers could be ice-free by the middle of the century.
"Somewhere in the second half of the century, it would happen," said Ted Scambos of the National Snow and Ice Data Center (NSIDC) at the University of Colorado.
The fact that all models show ice loss over the observed period and all project large ice losses into the future is a very strong message
Marika Holland
"Some computer models show periods of great sensitivity where the Arctic ice system collapses suddenly, and that trend may occur a bit earlier; that's the best guess, but exactly when it's hard to say," he told the BBC News website.
Dr Scambos co-authored the latest study, published in the journal Geophysical Research Letters, with other scientists from NSIDC and from the National Center for Atmospheric Research (NCAR), also in Boulder, Colorado.
They also calculate that about half, if not more, of the warming observed since 1979 originates in humanity's emissions of greenhouse gases.
Model perfection
There are measurements dating back about a century on the extent of Arctic ice, but satellite observations from 1979 onwards are generally thought to provide the most accurate dataset.
The new research involved analysing two periods, 1953-2006 and 1979-2006.
Graph of sea ice decline
The real world looks to be changing faster than the models predict
Records show a shrinkage over the longer period of 7.8% per decade. When only the more recent period is analysed, the rate rises to 9.1% per decade.
For comparison, the researchers looked at a collection of 18 computer models used by the IPCC and other institutions for making projections of future climates.
Models are always verified against real-world data from the recent past to see how well their output mimics reality.
The collection scrutinised here calculated an average decline of only 2.5% per decade for 1953-2006, and 4.3% per decade since 1979 - both well short of the real-world observations.
"There are lessons here for the climate modelling community," acknowledged NCAR's Marika Holland.
"The rate of ice loss, and the location of ice loss - these are things that the models need to improve, and there are physical processes such as the release of methane from melting permafrost that the models don't include."
Constant picture
This is the third time in the last few months that studies have suggested the IPCC's latest major global climate analysis, the Fourth Assessment Report, is too conservative.
Graph of rising Arctic temperature. Source: Arctic Climate Impact Assessment
Air temperatures are rising with respect to the 1961-1990 average
In December, a German team published research suggesting that sea levels could rise by 50-140cm over the coming century. The IPCC, in February, gave a range of 28-43cm.
Then, also in February, came an analysis showing that temperature and sea level rises had been rising at or above the top end of IPCC projections since the panel's previous major assessment in 2001.
This is the opposite view from that put forward by many "climate sceptics", who view the whole field of computer modelling as deeply flawed, and the IPCC as an alarmist organisation.
Because of the way it works, the IPCC is bound to be conservative, as it assesses in considerable depth research already in the public domain. This process takes time, and means the panel's conclusions will always lag behind the latest publications.
Nevertheless, Marika Holland believes there is agreement on the major questions regarding Arctic ice; it is receding, and greenhouse gases of human origin are largely responsible.
"The fact that all models show ice loss over the observed period and all project large ice losses into the future is a very strong message," she said.
Arctic sea ice 'faces rapid melt'
12 Dec 06 | Science/Nature
'Drastic' shrinkage in Arctic ice
14 Sep 06 | Science/Nature
Greenland melt 'speeding up'
11 Aug 06 | Science/Nature
The BBC is not responsible for the content of external internet sites
Has China's housing bubble burst?
How the world's oldest clove tree defied an empire
Why Royal Ballet principal Sergei Polunin quit
Americas Africa Europe Middle East South Asia Asia Pacific | http://news.bbc.co.uk/2/hi/science/nature/6610125.stm | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.018622 |
74 | {
"en": 0.9522290229797364
} | {
"Content-Length": "16903",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:AZPJ22XJJMMEGVW4OFS5RPMXKWP3CB67",
"WARC-Concurrent-To": "<urn:uuid:1caec627-a018-432a-86a4-f57f92c7717d>",
"WARC-Date": "2014-03-13T21:45:40",
"WARC-IP-Address": "67.208.46.156",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:3CZ5B6NVRHW2NIPKEOQ6PEZMFFNZZ4ZO",
"WARC-Record-ID": "<urn:uuid:bbaf7811-35f1-4d6d-ae10-2ac23a776471>",
"WARC-Target-URI": "http://nrn.com/print/corporate/restaurant-traffic-woes-global-problem",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 175 | PORT WASHINGTON N.Y. American restaurant operators might think they had it bad in the first quarter this year, but research released Tuesday by The NPD Group indicates that foodservice outlets in Europe, Canada and Japan also suffered as consumers cut back on spending and restaurant visits.During the first quarter, foodservice traffic was down in France, Germany, Italy, Japan, Spain, the United Kingdom and the United States, and it was essentially flat in Canada.Total spending at foodservice ...
Register to view this article
Why Register?
Already registered? here. | http://nrn.com/print/corporate/restaurant-traffic-woes-global-problem | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.528509 |
2 | {
"en": 0.9837589263916016
} | {
"Content-Length": "100771",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:XKTO5ZLM25SQ44G3FCXGEXKQF3EQVWC4",
"WARC-Concurrent-To": "<urn:uuid:2a852c76-920d-4066-bdf0-ce9b1c3575e1>",
"WARC-Date": "2014-03-13T22:39:14",
"WARC-IP-Address": "205.203.132.1",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:KTMXAVMNHNT5N2LAAMQSP4COZ2A6BF2A",
"WARC-Record-ID": "<urn:uuid:5bd0ae22-baad-4ac0-ad3a-e768db7ac092>",
"WARC-Target-URI": "http://online.wsj.com/news/articles/SB10001424052970203513604577142611440645498?mg=reno64-wsj&url=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB10001424052970203513604577142611440645498.html",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 1,174 | She seems at ease, sitting on the top step of a large front porch, her legs crossed and a long, slim cigarette between her fingers. She wears a bit too much makeup, perhaps, but her face is pleasant and gives no reason to believe that the ensuing conversation won't be the same.
"So, can you tell me a little about your ex-husband?" I ask, standing on the bottom step with a notepad and pen in hand. Her words start flowing, in a tone that could put a baby to sleep, and for a moment it seems that they may never cease.
"Cheating son of a bitch." "Selfish bastard." And worse. They are in sentences, of course, but all I hear is those phrases. I try to display sympathy and concern, but inside I'm smiling because I know, as I always have, that ex-wives, ex-husbands, ex-girlfriends, ex-lovers, ex-anythings make some of the best sources.
Brian Stauffer
My business partner Alan and I had received the call a few days earlier. A local politician was making noise about jumping into a congressional race against a longtime incumbent who was worried, apparently, about his job. The election was more than a year out, and the potential opponent had not yet announced. The task at hand was to try to make sure that he never did.
We get these projects every now and again. "Just see what's out there," they say, "and if there's nothing, so be it." But of all the different types of campaign research we do, this usually proves the most fruitful: local politicians rattling their chains without having thought through the whole idea—and without understanding that longtime incumbents work hard to remain longtime incumbents.
In this case, the front-porch interview isn't going very far; she just doesn't know that much about the man. His business dealings are a mystery to her. His political affairs are an unknown.
"So when you say he's a 'bastard,' I'm just guessing you're talking about your marriage?"
And then she begins. Yes, she is referring to her marriage. Yes, he was the most ill-tempered husband on the face of the earth. And yes, he had left her and started seeing another, younger, woman. They now live together, she tells me. They travel a lot, go to places he never took her. She resents him for all of it.
"Anything else?"
"Oh yeah," she says, almost as an afterthought, "I think he was arrested for beating her up."
These are the moments when a pause is not only mandatory; it is involuntary. I just stare down at my notepad and jot the words "assault" and "arrested." I scribble a big star to the side.
"So, what was that all about?" I ask in a near monotone, still looking down.
She tells me that the couple was going on a vacation out West when the incident supposedly occurred. She doesn't know where they were going, but says he "slapped her around" at an airport en route. She doesn't have much else. She then asks if it is something I can use. I tell her it's possible but that I'm not sure.
But that isn't true. I am sure.
Polling is the lifeblood of any well-funded political campaign. The information that my business partner Alan and I provide is used to develop the questions that pollsters ask of voters. And one thing polls show is that voters will tolerate an awful lot in politicians—cheating on spouses, dalliances with prostitutes, the occasional DUI. But they will never condone domestic violence.
Back at the office, I'm poring over a map, trying to figure out where the slap-down may have occurred. If such an incident did happen, there could be a report on file at one of the big Western airports. I call each of them, but with only a couple left to go, I'm striking out.
The call to the next airport security office starts the same way the others have. I tell the officer that I'm trying to track down some information on an assault that supposedly occurred at one of their gates. I have the name of the assailant and the victim, and I'm hoping for some assistance.
He asks what it's for. I say, "I'm doing some work for a client who needs to track this information down for a project they're trying to resolve in a hurry." Clear but confusing.
"Who's your client?"
"I'm not at liberty to say."
At this point, if the officer asks for additional details about the incident, you're usually golden. This one asks if I have the date of birth of the man I'm inquiring about. Of course I do. I got it from the ex-wife. Do I have the date this happened? No, just a period of time. Do I know what happened? Uh, no, that's why I'm asking.
He seems somewhat satisfied and asks for my phone number. He's going to do some checking and get back to me. Good, but not guaranteed.
Later, he calls back, excited to share. Yes, there is a report of an assault that occurred in one of the terminals between the ex-husband and the girlfriend. It apparently began with an argument that escalated into the slap-around. There was a busted lip, some blood and a short trip to the carpet for the girlfriend. Although the report makes no reference to an actual arrest, it is better than I had hoped.
Alan and I do not relish the pain or misfortune of victims. If you ask us, a man who's responsible for that kind of abuse should get everything that's coming to him and probably more. But it's not for us to decide. Our job is simply to find, document and collect. In our work, the judges and juries reside in the voting booths and campaign offices.
The client or candidate for whom we work generally has the next move. With a report like the one we've just provided, the scenario might go something like this:
A mutual friend of both the incumbent and his potential opponent makes a visit to the potential opponent and explains that a "situation" has arisen that could cause him some embarrassment. The friend offers a few details about the incident and says that it would probably be better if he considered backing off his intentions of running. At this point, the potential candidate acts surprised and insists that he was not involved in any such incident. He tells the friend that he has every intention of running. His insistence quickly turns to silence when the friend pulls out the incident report and hands it to him.
Within a couple of weeks of passing along the faxed report from airport security, Alan and I get an email telling us that the ex-husband has decided, in so many words, to stay put.
"Did you read this?" I ask Alan, almost in passing.
"Yep. Pretty good," he responds without looking up from his computer.
Nothing more is said.
—Mr. Rejebian is the co-author, with Alan Huffman, of the new book "We're With Nobody: Two Insiders Reveal the Dark Side of American Politics," from which this is excerpted. | http://online.wsj.com/news/articles/SB10001424052970203513604577142611440645498?mg=reno64-wsj&url=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB10001424052970203513604577142611440645498.html | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.141881 |
1 | {
"en": 0.9706425070762634
} | {
"Content-Length": "95541",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:M76XUIFKZPPVVGQES2Y7J3WMVWR45I6Q",
"WARC-Concurrent-To": "<urn:uuid:2c1cb8e7-c81b-483c-96e0-a9142b78e75c>",
"WARC-Date": "2014-03-13T21:43:42",
"WARC-IP-Address": "205.203.140.65",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:4YUV2YRKDXN6FCDZGR2TDJ7VNFPSYDJ5",
"WARC-Record-ID": "<urn:uuid:0ee454e0-9eb2-46e9-8865-750058b2d20f>",
"WARC-Target-URI": "http://online.wsj.com/news/articles/SB126161805062603707?mg=reno64-wsj&url=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB126161805062603707.html",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 757 | WASHINGTON -- For consumers, the most confusing part of the health-care bill may be when -- and if -- they will see its benefits.
Under the Senate bill scheduled for a vote Thursday, a slate of provisions designed to be immediately visible to consumers would kick in six months after the bill takes effect.
But those changes wouldn't affect people who stay in employer health plans. For people who buy insurance on their own, the provisions would only have an effect when they buy a new policy. And one of the health bill's most widely debated features -- a mandate that most Americans obtain health insurance or pay a fine -- won't take effect until 2014.
Starting next year, insurance companies would no longer be able to place lifetime caps on coverage, and they would begin to lose their ability to set annual limits on benefits. Insurers would have to pay the entire cost of preventive services such as mammograms, colonoscopies, flu vaccines and assistance to people trying to quit smoking.
But these changes apply only to new insurance plans purchased after the bill takes effect. Employer plans, under which more than 160 million Americans are covered, will be grandfathered in and won't have to adopt such changes.
Insurance companies say they may not be able to put some of the new provisions in place by next year. America's Health Insurance Plans, the main industry lobby, said it could take up to a year to put new plans on the market because they need regulatory approval.
"The timeline to implement new benefits isn't feasible," said Robert Zirkelbach, a spokesman for the group. A Senate Democratic aide said the bill's crafters factored in the time needed to make the changes and considered them reasonable, since they apply largely to new policies.
Other provisions begin to kick in six months after President Barack Obama signs the bill, which could happen next month at the earliest. These include the one where Medicare beneficiaries would get a 50% discount on brand-name prescriptions that fall within a coverage gap known as the doughnut hole.
Some of the bill's provisions could cost consumers money, but most of those will kick in after 2010. By 2011, all consumers would face caps on flexible spending accounts -- which allow people to use tax-free money for health expenses like prescriptions and doctors visits -- of $2,500 a year. Currently, some employers impose their own limits. The bill would also put new restrictions on withdrawals from health savings accounts.
In 2013, people with an insurance plan worth more than $8,500 for an individual and $23,000 for a family will face a new tax of 40% on the amount of the benefit that exceeds those levels. Insurance firms are expected to reduce the benefits in their plans in order to keep them under that level and avoid the tax.
The biggest changes for consumers wouldn't come until 2014. That is when the government will start to hand out tax credits to low- and middle-income Americans to offset the cost of buying insurance and expand the Medicaid federal-state program to provide insurance to a greater swath of the poor.
The most powerful insurance-market changes don't take effect until 2014. Insurance companies insist on getting all the healthy people in the system before they take all adults regardless of pre-existing conditions. Starting that year, insurers would no longer be able to charge older people more than three times as much for insurance. That is also the year states would set up new insurance exchanges where people without employer plans and small businesses would shop for coverage. In addition to plans from private insurers, the exchanges would offer plans administered by the same entity that handles insurance for government workers.
In 2014, consumers will face a $95 fee if they don't carry insurance and are deemed able to afford it. That penalty increases to $495 a year in 2015 and $750 a year by 2016. The Senate bolstered the fine last week so that consumers could have to pay up to 2% of their income, up to the value of the cost of a basic insurance plan, if that level is higher than the $750 fine.
There's a chance that some of the main provisions could end up taking effect a year earlier, in 2013, because that's when they start in the health bill passed by the House. But the Senate bill is expected to form the backbone of any final legislation, and starting them earlier could end up increasing the cost of the bill, something lawmakers want to avoid.
Write to Janet Adamy at janet.adamy@wsj.com | http://online.wsj.com/news/articles/SB126161805062603707?mg=reno64-wsj&url=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB126161805062603707.html | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.040326 |
25 | {
"en": 0.9115393161773682
} | {
"Content-Length": "62741",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:KNWM5LUSJWJPMJTJON6VM4BIFBGFTEQM",
"WARC-Concurrent-To": "<urn:uuid:75385efd-3488-4e96-a625-2be276690e14>",
"WARC-Date": "2014-03-13T22:17:29",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:6HIJFLG2HFAEDROPHTALYC4BW2J4UOZM",
"WARC-Record-ID": "<urn:uuid:9ec18888-71db-4270-b489-ccd5ab98340c>",
"WARC-Target-URI": "http://physics.stackexchange.com/questions/43955/whats-the-lower-limit-for-energy-usage-to-desalinate-water",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 219 | Take the 2-minute tour ×
Consider a desalination process where you enter sea water and receive fresh water and brine (or maybe pure salt).
How do I compute the least amount of energy per mass? I think this has something to do with the entropy of the different mixtures, mostly dependent on the salt concentration in the brine. Is this correct? How to calculate?
share|improve this question
add comment
1 Answer
up vote 2 down vote accepted
Assuming that the process is done at constant temperature and pressure, what you want is the Gibbs free energy difference. The reaction could be taken to be 1 mole of water in brine on one side and one mole of pure water on the other side.
The result should be a positive number since the process is not spontaneous. However the value of $\Delta G$ will be the minimum non-mechanical work necessary for the process.
To understand this read up on the Gibbs free energy.
share|improve this answer
add comment
Your Answer
| http://physics.stackexchange.com/questions/43955/whats-the-lower-limit-for-energy-usage-to-desalinate-water | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.68386 |
25 | {
"en": 0.946347177028656
} | {
"Content-Length": "74421",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:ZPG3J75FKZCN3TC7RC6GYEQUKDCPAMGX",
"WARC-Concurrent-To": "<urn:uuid:b26379ac-4e2a-43fd-9db1-06a4cbd62ac0>",
"WARC-Date": "2014-03-13T22:14:42",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:WTUSPSKYGNLJETN4V6SVUSUHP5YT4FIQ",
"WARC-Record-ID": "<urn:uuid:a27805ec-9b7d-45d8-8213-960df4d274c9>",
"WARC-Target-URI": "http://physics.stackexchange.com/questions/45245/does-closing-curtains-make-your-home-warmer?answertab=oldest",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 691 | Take the 2-minute tour ×
I mean, in the sense that the act of closing curtains would somehow reduce the amount of heat loss of the house to the outside, thus making it warmer for a given supply of heating.
share|improve this question
Why don't you experiment? In many cases (especially if the window is large and/or single glazed and the drapes are heavy and over-sized) just standing next to the window in a pair of shorts is enough to feel the difference on the skin of your legs. – dmckee Nov 27 '12 at 22:28
add comment
3 Answers
up vote 6 down vote accepted
1, you live somewhere that is colder outside than in
2, the curtain has finite thermal resistance (ie some insulating value)
3, the curtain is close enough to the window to reduce convection
Then yes.
Try measuring the air temperature on the window side of the curtain, it should be lower than the room.
share|improve this answer
Curtains will also block infrared radiation ( which is heat) through the window, not only block convection. – anna v Nov 28 '12 at 12:40
@annav, just worked it out at 90W/m^2 for room temp to freezing (assuming perfect BB) not negligble ! – Martin Beckett Nov 28 '12 at 16:42
add comment
To some extent, the answer is yes; however, considering the characteristics of a curtain, the amount of heat conservation is negligible.
share|improve this answer
Er...good curtains constrain convection more than they provide conductive insulation and they work better then you seem to appreciate. As I said above, under the right circumstances the only instrument you need to detect the effect is your skin. – dmckee Nov 27 '12 at 23:09
This was my brain-block too: I had forgotten convection. – user12345 Nov 28 '12 at 12:04
add comment
If the inside surface of the window is colder than the air in your room then the room will lose heat to the window. If this is the case then curtains will reduce the heat loss in exactly the same way that putting on clothes reduces the heat loss from your body.
Double glazing reduces the heat loss from windows, but even so a quick measurement in my living room suggests the inside surface of my (double glazed) window is colder than the rest of the room so curtains will make a difference.
But don't draw the curtains during the day because if the Sun is shining you'll get greenhouse heating of your room. If you draw the curtains the sunshine will heat the curtains, but they'll tend to keep hot air near the window where the heat can conduct outwards.
I did the experiment!
If anyone is still interested, I got up early this morning before the heating was on to measure the temperatures.
My living room has a window at each end, and I closed the curtains on one window and left the curtains open on the other window to act as a control. At 06:30 this morning the temperature in the room was 6ºC. When I placed the thermometer about a mm away from the uncurtained window the temperature was 5ºC, and 1 mm away from the curtained window (i.e. inside the curtains) the temperature was 2ºC. The temperature outside is about zero because there was a frost - I didn't go outside to measure it because it was too cold. Ask Francis Bacon about the dangers of such experiments :-)
So with the curtains closed the temperature at the window was 3 degrees lower showing that the curtains have a significant insulating effect. These are regular curtains, not especially heavy, so it's quite a big effect. I suspect it's not the thermal properties of the curtains that matters, but instead it's their ability to stop air currents from circulating cold air at the window into the rest of the room.
share|improve this answer
add comment
Your Answer
| http://physics.stackexchange.com/questions/45245/does-closing-curtains-make-your-home-warmer?answertab=oldest | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.598247 |
26 | {
"en": 0.9416476488113404
} | {
"Content-Length": "72984",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:CFOQCNMHRDA2BAZO32HFK44TEGVPWQDV",
"WARC-Concurrent-To": "<urn:uuid:4fa45890-9f6c-4d5d-987e-52d7ec6712a6>",
"WARC-Date": "2014-03-13T21:58:06",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:SG57CXPGEU4BLWCCSJGWTWX3HAQS65PA",
"WARC-Record-ID": "<urn:uuid:004493c8-14d3-4023-9432-5cbbb16eff87>",
"WARC-Target-URI": "http://programmers.stackexchange.com/questions/155316/what-ever-happened-to-the-defense-software-reuse-system-dsrs/164093",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 901 | Take the 2-minute tour ×
I've been reading some papers from the early 90s about a US Department of Defense software reuse initiative called the Defense Software Reuse System (DSRS). The most recent mention of it I could find was in a paper from 2000 - A Survey of Software Reuse Repositories
Defense Software Repository System (DSRS)
The DSRS is an automated repository for storing and retrieving Reusable Software Assets (RSAs) [14]. The DSRS software now manages inventories of reusable assets at seven software reuse support centers (SRSCs). The DSRS serves as a central collection point for quality RSAs, and facilitates software reuse by offering developers the opportunity to match their requirements with existing software products. DSRS accounts are available for Government employees and contractor personnel currently supporting Government projects...
...The DoD software community is trying to change its software engineering model from its current software cycle to a process-driven, domain-specific, architecture-based, repository-assisted way of constructing software [15]. In this changing environment, the DSRS has the highest potential to become the DoD standard reuse repository because it is the only existing deployed, operational repository with multiple interoperable locations across DoD. Seven DSRS locations support nearly 1,000 users and list nearly 9,000 reusable assets. The DISA DSRS alone lists 3,880 reusable assets and has 400 user accounts...
The far-term strategy of the DSRS is to support a virtual repository. These interconnected repositories will provide the ability to locate and share reusable components across domains and among the services. An effective and evolving DSRS is a central requirement to the success of the DoD software reuse initiative. Evolving DoD repository requirements demand that DISA continue to have an operational DSRS site to support testing in an actual repository operation and to support DoD users. The classification process for the DSRS is a basic technology for providing customer support [16]. This process is the first step in making reusable assets available for implementing the functional and technical migration strategies.
[14] DSRS - Defense Technology for Adaptable, Reliable Systems
URL: http://ssed1.ims.disa.mil/srp/dsrspage.html
[15] STARS - Software Technology for Adaptable, Reliable Systems
URL: http://www.stars.ballston.paramax.com/index.html
[16] D. E. Perry and S. S. Popovitch, “Inquire: Predicate-based use and reuse,''
in Proceedings of the 8th Knowledge-Based Software Engineering Conference, pp. 144-151, September 1993.
Is DSRS dead, and were there any post-mortem reports on it? Are there other more-recent US government initiatives or reports on software reuse?
share|improve this question
Wow very interesting. I'd imagine most things reusable by the entire defense community would be the kind if stuff reusable by programmers at large. So that kind of stuff would make its way to general libraries and frameworks. – Doug T. Aug 2 '12 at 3:31
add comment
2 Answers
up vote 4 down vote accepted
DSRS had at least one name before that and has had a couple more afterward. I've since forgotten what they are, but you should consider the program dead. Not even pining for the fjords, just dead.
The DoD has gone through many attempts at department-wide reusability programs, and this was one of them. The Ada programming language was another, being a mandatory-use language from 1987 until the late 1990s when the mandate was effectively abandoned. (The number of waivers for non-Ada projects that were being issued by the early 1990s should have been a dead giveaway.)
The post-mortem on most of these programs is pretty simple:
• Trying to do re-use on that scale is a noble idea and can be made to work, but it takes a combination of foresight, determination, coordination and leadership that DoD has never been able to muster.
• There were (and still are) cultural problems with re-use like turf wars between the department's offices and each of those offices running their own re-use programs.
• A lot of defense-related development happens in a bubble, where the contractor is being paid to develop "a" system and doesn't have any real motivation to make the things they build into tools that can be used widely, especially if they're not going to be paid to maintain it for other programs over the long term. Project A isn't going to use its precious budget to do something to help out Project B even though it's all the same big pot of money.
share|improve this answer
Can you comment at all on your background or how you came about this information? – M. Dudley Sep 7 '12 at 16:52
@emddudley: I've worked in defense on and off since the early 1990s. – Blrfl Sep 7 '12 at 17:05
add comment
As a Java programmer working for the Dept of Defense, I've never heard of it and neither has anyone else in the office. I just now Googled it and all I found was the acronym definition but nothing else. I think its safe to say that it died a quiet death. Pity, though, it seems like a good idea.
share|improve this answer
A lot of things that seem like a good idea turn out to be utterly impractical. Writing reusable software is much harder than it sounds. – Michael Borgwardt Sep 7 '12 at 15:04
DSRS predates Java by at least five years, longer if you count its predecessors. – Blrfl Sep 7 '12 at 15:35
add comment
Your Answer
| http://programmers.stackexchange.com/questions/155316/what-ever-happened-to-the-defense-software-reuse-system-dsrs/164093 | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.083466 |
26 | {
"en": 0.9298526644706726
} | {
"Content-Length": "69738",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:GUDULY4FWPO3BLB45MMWYSKFDS353WCD",
"WARC-Concurrent-To": "<urn:uuid:a8eba22e-50ce-40a1-a387-069f95d165e0>",
"WARC-Date": "2014-03-13T22:04:17",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:VG6WTSGIRTFPK4EOA3WEPFAJL4YXYVJA",
"WARC-Record-ID": "<urn:uuid:b5a53b47-869d-4df0-82ba-a447c721230e>",
"WARC-Target-URI": "http://programmers.stackexchange.com/questions/164249/one-page-using-querystring-or-many-folders-and-pages?answertab=active",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 844 | Take the 2-minute tour ×
I have an application where I have the 'core' code in one folder for which there is a virtual directory in the root, such that I can include any core files using /myApp/core/bla.asp. I then have two folders outside of this with a default.asp which currently use the querystring to define what page should be displayed. One page is for general users, the other will only be accessible to users who have permission to manage users / usergroups / permissions. The core code checks the querystring and then checks the permissions for that user. An example of this as it is now is default.asp?action=view&viewtype=list&objectid=server. I am not worried about SEO as this is an internal app and uses Windows Auth.
My question is, is it better the way it is now or would it be better to have something like the following:
• /server/view/list/
• /server/view/?id=123
• /server/create/
• /server/edit/?id=123
• /server/remove/?id=123
In the above folders I would have a home page which defines all the variables which are currently determined by the querystring - in /server/create/ for example, I would define the action as 'create', object name as 'server' and so on.
In terms of future development, I really have no idea which method would be best. I think the 2nd method would be best in terms of following what page does what but this is such a huge change to make at this stage that I would really like some opinions, preferably based on experience.
PS Sorry if the tags are wrong - I am new to this forum and thought this was a bit too much of a discussion for StackOverflow as that is very much right / wrong answer based. I got the idea SE is more discussion based.
share|improve this question
so you are looking for something like mode_rewrite for jsp? What kind of server are you using? here is a sample answer for tomcat on stack overflow. stackoverflow.com/questions/1563799/… – Daniel Iankov Sep 9 '12 at 12:59
No, what I am trying to determine is whether the design is better with just one page for everything, which makes heavy use of the querystring, or using lots of folders which contain files which define the variables themselves. For example /server/create/default.asp would contain the line 'action = CREATE' (where CREATE is a constant defined in /myApp/core/constants.asp). Basically is it better to use ?object=server&action=create or to use /server/create/? – ClarkeyBoy Sep 9 '12 at 13:03
I am just trying it out now actually, just for a couple of objects, to see how much easier it is to add a new object type (category for the knowledge base, for example). – ClarkeyBoy Sep 9 '12 at 13:04
Got it sorted for server, so the user just has to go to /myApp/server/ for the list, and then the edit buttons link to /myApp/server/edit/ and so on. Easy to change and I think it should be easier to manage in this way as I don't have to worry about the user being able to change the querystring (meaning it is more secure). – ClarkeyBoy Sep 9 '12 at 13:11
add comment
1 Answer
The best way is to split it up. This will make it much easier to maintain because there are only small chunks that you need to deal with at any one time.
What you need to do is to first create a framework which will be used universally across all the pages/functions. This will have common bits in it like access control, menus, validation scripts, styles, etc
Then are there any objects that could be shared across pages? Things like business objects, data access layers, report generation, drop downs, etc. Put these into separate classes/files/etc. If you need to code it more than once, it should be in a library type file and included where required.
Now build pages for each discrete action, and group them by functionality or by permissions into separate folders.
Remember that a query string is an easy way for a user to enter in false data - does the application require a level of robustness? Best way is to use a session type object for passing information between pages for a security and integrity point of view.
share|improve this answer
Thanks for the input adam, much appreciated. I basically have it in this kinda layout: /ab/abCore/--all the core code files in here, then /ab/[business-object-name]/ for the list, /ab/[b-o-n]/edit/?id= for the edit page and then same for create / delete. Each business object has its own 'setup' file which sets all the variables which apply to all actions, then the individual homepages override them if they have to. All stylesheets are in one folder, scripts in another and images in another. It really is looking very neat now, and so easy to tell what should display what. – ClarkeyBoy Sep 10 '12 at 19:18
In some cases I have nested business objects - for example /customer/contact/, /customer/address/, /customer/contact/address/ and so on. – ClarkeyBoy Sep 10 '12 at 19:19
add comment
Your Answer
| http://programmers.stackexchange.com/questions/164249/one-page-using-querystring-or-many-folders-and-pages?answertab=active | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.022006 |
69 | {
"en": 0.9053027033805848
} | {
"Content-Length": "79150",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:RRCFQQQ4P2WUY556EDNIXEPIHHIQTDQE",
"WARC-Concurrent-To": "<urn:uuid:5db5818f-84da-4dcb-ad4c-1e1dff970810>",
"WARC-Date": "2014-03-13T22:16:53",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:2NECPIT2RMV7O6OE3QFPO7FPPOAIUEQN",
"WARC-Record-ID": "<urn:uuid:d249a2e0-559e-46e2-9dec-48e062ba565c>",
"WARC-Target-URI": "http://programmers.stackexchange.com/questions/210149/more-accurate-random-in-c",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 1,591 | Take the 2-minute tour ×
I have 3 IPs and every IP has a weight, I want to return the IP's according to its weights using the random function. For example if we have 3 IP's
• X with weight 3
• Y with weight 3
• and Z with weight 3
I want to return X in 33.3% of cases and Y in 33.3% of cases and Z in 33.3% of cases, depending on random function in C.
I have tried this code :
double r = rand() / (double)RAND_MAX;
double denom = 3 + 3 + 3;
if (r < 3 / denom) {
// choose X
} else if (r < (3 + 3) / denom) {
// choose Y
} else {
// choose Z
I repeat the function 1000 and I get: Choose x 495 times and Choose y 189 times and choose z 316 times. But what I want is to get X:333 y:333 Z:334 How can the weighted random be more accurate?
share|improve this question
random will always be random..., unless you go with a true round robin – ratchet freak Sep 1 '13 at 15:23
Do you understand about variance in random distributions? What you've described is an example of a multinomial distribution, so the variance in each of your variables will be n * (0.33) * (0.66), where n is the number of trials. Your results will always jitter around the mean values of 0.33. – Charles E. Grant Sep 1 '13 at 16:18
For what it's worth, I just ran a variant of that algorithm using FreeBSD's rand() routine, and while it didn't look particularly balanced by eye, it never approached the skew in the results that centosuser posted. – Aidan Cully Sep 1 '13 at 17:25
-1 for the contradictory title – Dave Hillier Sep 1 '13 at 19:03
Random means having a "lack of pattern or predictability in events". Your definition of random seems a little different. Given a trillion tries you'd expect a random distribution to be approximately 1/3 1/3 1/3, but only approximately. If with only 1000 tries you got 333, 333 and 334 I would strongly suspect that the random function was broken – Richard Tingle Sep 2 '13 at 12:11
show 4 more comments
closed as off-topic by Kilian Foth, Michael Kohne, World Engineer Sep 4 '13 at 12:46
3 Answers
up vote 2 down vote accepted
(This part of the question was associated with revision 2 and is still quite applicable to that problem)
The standard approach to doing this is to populate an array with the appropriate weights:
[x, x, x, x, x, x, y, y, y, y, z, z]
1 2 3 4 5 6 1 2 3 4 1 2
and then pick one at random.
Please note that random is random. It is very unlikely that you will ever a perfect distribution.
If you want to guarantee the distribution, you need to do (mostly) away with the random.
Instead, shuffle the above array. For example, one shuffling would give you:
[x, y, z, y, x, x, y, x, z, y, x, x]
And then loop over the array again and again returning the current index. It isn't random anymore, but it will guarantee the distribution remains what you are looking for always. This is just a slightly more 'random' version of a round robin distribution.
If this is attempting to load balance something, the round robin is a better approach and you might want to consider a evenly distributed round robin:
[x, y, x, y, x, z]
This has the same distribution as above and tries to keep everything at an even distance so not as to saturate any one resource.
As an aside, to the question of rand being poor, you may be dealing with an older standard library. From rand3 man page
However, on older rand() implementations, and on current
implementations on different systems, the lower-order bits are much
applications intended to be portable when good randomness is needed.
(Use random(3) instead.)
This can be demonstrated using the following C program that spits out the consecutive low byte and low nybbles from rand(). I happen to have a more modern system and don't have access to anything that might demonstrate this low order less randomness.
You can test it on your system with the following code which looks at the low byte, low 4 bits, and low 2 bits.
#include <stdlib.h>
#include <stdio.h>
int main (int argc, char** argv) {
int i, r;
int a8, a4, a2;
FILE *fp0xff = fopen("low8.out", "w");
FILE *fp0x0f = fopen("low4.out", "w");
FILE *fp0x03 = fopen("low2.out", "w");
/* 1 of 4 */
r = rand();
a8 = r & 0xff;
a4 = r & 0x0f;
a2 = r & 0x03;
fprintf(fp0xff, "%c",a8);
/* 2 of 4 */
r = rand();
a8 = r & 0xff;
a4 = (a4 << 4) | (r & 0x0f);
a2 = (a2 << 2) | (r & 0x03);
fprintf(fp0xff, "%c",a8);
fprintf(fp0x0f, "%c",a4);
/* 3 of 4 */
r = rand();
a8 = r & 0xff;
a4 = r & 0x0f;
fprintf(fp0xff, "%c",a8);
/* 4 of 4 */
r = rand();
a8 = r & 0xff;
fprintf(fp0xff, "%c",a8);
fprintf(fp0x0f, "%c",a4);
fprintf(fp0x03, "%c",a2);
return 0;
The output of this program can then be examined using ent which runs a number of tests of randomness against a stream of bytes.
Running this against the low2.out on my system produces:
Entropy = 7.982762 bits per byte.
Optimum compression would reduce the size
of this 10000 byte file by 0 percent.
Chi square distribution for 10000 samples is 240.46, and randomly
would exceed this value 73.46 percent of the times.
Arithmetic mean value of data bytes is 127.6318 (127.5 = random).
Monte Carlo value for Pi is 3.150060024 (error 0.27 percent).
Serial correlation coefficient is -0.002842 (totally uncorrelated = 0.0).
Which is frankly, a reasonably good random stream.
The reason I am testing the low two bytes is that you are doing things with % 9 which works only with these low bits. You may find that your random number generator is old and might need to implement your own (if that degree of randomness is something that you need to work with).
One approach would be, well, to implement your own. The Mersenne twister is quite well regarded and you can find implementations for a wide range of languages quite easily.
The other thing to do would be to shift the random number you get down 8 bits to get rid of any low order less randomness and use those bits.
You can get an idea of the poor quality of rand in some generators from Random.org.
For, example, rand() called by php on Windows produces the following:
enter image description here
(from Random.org)
Which is quite certainly, not a good random.
share|improve this answer
round robin is good when the weights is equals ,,, but when the weights are different ,,there isn't any better solution than using the random ,,but the problem that it is not accurate – centosuser Sep 1 '13 at 15:57
@centosuser, you haven't really understood MichaelT's solution. The example he gives doesn't have equal weights. He's using the weights listed in your original post before your edit. – Charles E. Grant Sep 1 '13 at 16:26
@centosuser using any weights, you can shuffle the weighted array and loop over that. It doesn't matter what the weights are. It is also possible, that you've got a poor random number generator, and I went into that area with this latest edit. – MichaelT Sep 1 '13 at 16:42
@CharlesE.Grant Its also possible, that he's dealing with a poor random number generator. There are still quite a few of them out there. Combined with looking effectively at %9 he's often looking at the low bits which are often less than ideal. There are some approaches to addressing this (like shifting the low bits off or using a different random function). – MichaelT Sep 1 '13 at 16:44
add comment
I would usually do something like this:
int r = rand();
if (r % 3 == 0) {
// choose X
} else if (r % 3 == 1) {
// choose Y
} else {
// choose Z
It's probably not perfect (I think RAND_MAX might give a Y instead of Z or something like that), but if the random number generator works properly, you'd expect to see a good distribution of X, Y and Z. The expected deviance from a uniform distribution would be less than the sample size you're using now.
share|improve this answer
add comment
If you want to truly guarantee that you'll get exactly the distribution you want, you can create a pool of values that you pull from:
int xpool = 333;
int ypool = 333;
int zpool = 334;
int x = 0;
int y = 0;
int z = 0;
for(unsigned int trial=0;trial<1000;trial++) {
unsigned int r = rand() % (xpool + ypool + zpool);
if(r < xpool) {
else if(r < xpool + ypool ) {
else {
cout << "x: " << x << " y:" << y << " z:" << z << endl;
This will guarantee that you always have an exact distribution, but the order will be as random as rand() can make it. This works well if the number of choices is low, and you know how many trials you will have ahead of time.
It depends on what you want. If you want something to give a good weighted distribution with infinite trials, use @MichaelT's answer. If you want to guarantee an exact distribution and know the number of trials, the do something like this.
share|improve this answer
add comment
| http://programmers.stackexchange.com/questions/210149/more-accurate-random-in-c | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.531812 |
45 | {
"en": 0.9373729825019836
} | {
"Content-Length": "96982",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:D5JRBDXUNKMS3NN2GL36QPWAERNZ3EFB",
"WARC-Concurrent-To": "<urn:uuid:72b741b2-4d0d-42aa-ad95-b50423c6d72e>",
"WARC-Date": "2014-03-13T22:08:53",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:EBWBDGOH5S7L23L7FIQJYMH4JGJCUULA",
"WARC-Record-ID": "<urn:uuid:12a20ef1-7f64-4800-b876-165153eb0c02>",
"WARC-Target-URI": "http://programmers.stackexchange.com/questions/5034/what-s-the-minimal-requirement-for-a-code-be-considered-an-ai-implementation?answertab=votes",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 1,257 | Take the 2-minute tour ×
I'd like to know at what point can be considerated an AI implementation?
I means, what is the minimal requeriment for that?
Can you give a simple code example?
share|improve this question
possible duplicate of Will we ever develop artificial intelligence? (Covers same ground) – user8 Sep 18 '10 at 4:18
sorry, but there is nothing duplicated. – killown Sep 18 '10 at 6:02
This question is so very unclear. Relates to the field of AI ≠ would be considered AGI. – Tobu Nov 24 '10 at 22:51
add comment
5 Answers
up vote 13 down vote accepted
Any program in which the decisions made at time t are impacted by the outcome of decisions made at time t-1. It learns.
A very simple construct within the field of Neural Networks is a Perceptron. It learns by adjusting weights given to different input values based on the accuracy of the result. It is trained with a known set of good inputs. Here is an article that covers the theory behind a single layer Perceptron network including an introduction to the the proof that networks of this type can solve specific types of problems:
If the exemplars used to train the perceptron are drawn from two linearly separable classes, then the perceptron algorithm converges and positions the decision surface in the form of a hyperplane between the two classes.
Here is a book chapter in PDF form that covers the topic. Here is an Excel Spreadsheet that explains a bit more with a concrete example. And finally, here is a beautiful Javascript Example that you can watch learn.
share|improve this answer
thanks, this is an approach from what I wanna to know. – killown Sep 18 '10 at 6:27
wow thank you man – killown Sep 18 '10 at 18:02
this is all that I need thanks again – killown Sep 18 '10 at 18:06
I don't know... this is a good definition of learning systems, but artificial intelligence is a broader field, surely? If you pick up a text on AI you'll find subjects such as decision trees, search algorithms etc., which don't "learn" in the sense that you mean. – Ben Sep 19 '10 at 18:03
That is a very good point. True, Wikipedia notes that "AI textbooks define the field as "the study and design of intelligent agents"[1] where an intelligent agent is a system that perceives its environment and takes actions that maximize its chances of success.[2]" en.wikipedia.org/wiki/Artificial_intelligence which is a very good definition. I have always been partial to having 'learning' as part of the definition, because the bar is much lower if you do. You don't have to mimic a level of knowledge, just the capacity to improve. Learning AI is sexy AI. – Larry Smithmier Sep 20 '10 at 2:37
add comment
I'd say some sort of decision-making and/or learning algorithm would be involved. You can read about different sub-problems within AI in this Wikipedia article.
Depending on what you needed AI for, there'd need to be an implementation of some subset of those.
share|improve this answer
thank you, I will read this article. – killown Sep 18 '10 at 6:15
add comment
Depends on how your want to define AI. The working definition I was given in my intro to AI class was:
AI is any program that does something computers are not traditionally good at but humans are.
Examples being game AI, natural language processing, image processing, etc.
Assuming such a definition for AI, there's no 'minimal requirements'- a Tic-Tac-Toe AI is just a simple decision tree, for example. For a small enough subset of NLP, "Hello World" is AI. There's no real answer to your question in that regard.
share|improve this answer
I just want a example code, when you start learn programming you have the "Hello World" example, then I need a "Hello word" of AI programming. – killown Sep 18 '10 at 6:32
As I said, that depends on what you define as "AI." – Fishtoaster Sep 18 '10 at 14:31
RIGHT. And usually the rule is, as soon as computers get good at doing it, you have to stop calling it AI :) – Joel Spolsky Nov 25 '10 at 1:26
add comment
I would consider any machine that is both useful and permanently beyond my understanding to be artificially intelligent (although I dare not suggest that such machine might exist outside of fiction lest my geekhood would be cast into doubt).
alt text
A less personal definition:
A machine can be considered artificially intelligent if it can solve classes of problem that were not envisaged by its designers.
Preumably, the architects of such a machine must endow their creation with the ability to lean, or else they must be possessors of extreem good fortune. By definition, trivial machine learning is precluded (so no, your tic-tac-toe solver dosn't count). Either way, happy + surprised should characterise the mood of that machine's engineers.
The closest I can get to a code sample? Is this:
This works quite well on my machine (indeed, this automiton sometimes appears prescentient) but YMMV.
share|improve this answer
add comment
It passes the Turing Test? In other words, a human being wouldn't be able to definitely tell the actions of your code from that of another human being attempting to do the same thing. Basically, can it fool someone?
share|improve this answer
-1 Passing the Turing Test is hardly the -minimal- requirement for code to be considered an AI implementation. – adamk Nov 24 '10 at 22:59
@adamk Surely this depends on what your definition of "AI implementation" is? The fact that the OP stated what is the "minimal requirement" without first defining what "AI" is renders the word "minimal" redundant. How do you know what "minimal" means without a definition of "AI"? It doesn't make sense. My answer addresses one commonly-accepted test to define AI which is all you can really do. So mark my answer down, but realise your subjective view of "minimal" is no more correct than mine. – Dan Diplo Nov 25 '10 at 11:52
The Turing test is a measure of a machines intelligence evaluated by a human judge conversing in natural language with both a machine and a human. If the judge cannot tell which is the machine, then the AI implementation passes the test. However, a machines intelligence is not limited to communication via natural language. Using the same evaluation methodology a judge could watch the moves of Garry Kasparov playing chess against Deep Blue and be incapable of telling which is the real player, 'fooling' the judge, thereby defining the machines intelligence in this area. – adamk Nov 25 '10 at 18:58
Extrapolating from that, as playing chess is much simpler and therefore has more minimal requirements to complete the implementation than any implementation meeting the requirements of the Turing Test. However, I was a bit pissed last night, and although I disagree with your answer, it didn't really deserve a down vote so I apologise for that. – adamk Nov 25 '10 at 19:00
Fair enough. But I would personally exclude being able to play chess from any definition of "AI" since machines excel at chess mainly due to brute-force (having a massive database of opening/closing moves) rather than through other means. I still think the general definition of being able to "fool someone" that it could be human (or other living entity) is a reasonable rule of thumb for an AI. – Dan Diplo Nov 26 '10 at 10:13
add comment
Your Answer
| http://programmers.stackexchange.com/questions/5034/what-s-the-minimal-requirement-for-a-code-be-considered-an-ai-implementation?answertab=votes | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.920073 |
27 | {
"en": 0.9682488441467284
} | {
"Content-Length": "137791",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:NUJYTQWFCGKDPNVK2YPSTNAO5OYFFK5M",
"WARC-Concurrent-To": "<urn:uuid:f2b0e74c-cbb9-4e4d-9b98-a40feea5a610>",
"WARC-Date": "2014-03-13T22:04:34",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:7VAKXX4G7WOE2ABXXOFIZMXS2VSSZK2V",
"WARC-Record-ID": "<urn:uuid:c4e8016c-b6fe-4254-ad24-ee137bd14f05>",
"WARC-Target-URI": "http://programmers.stackexchange.com/questions/81221/why-do-companies-tell-me-they-want-me-as-an-in-house-employee-not-as-a-contract",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 4,141 | Take the 2-minute tour ×
Money is not what is at issue here. What is at issue is independence and to make sure I will contribute by working at my field of expertise, tactfulness, and ensuring everyone's expectations are in-line.
Companies that are trying to develop new software products tell me they want me as an in-house employee, and not as a contractor.
After just finishing my PhD, I am an expert in a very specialized kind of data analysis, not in general programming. My programming skills were gained as a by-product of my academic research.
I believe I am called a 'domain expert' rather than a 'software engineer'. My coding is focused on implementing a specific class of data analysis algorithms, so I consider myself more of an a academic excelling at thinking of creative ways of developing tools to solve problems, who programs to test and implement these new ideas, rather then being a corporate programmer.
I am looking for work as a contractor in my field of expertise and would prefer to earn less money and have less benefits working as a short-term contractor helping people with what I am an expert in rather than being a in-house employee.
Some of the problems they have discussed seem perfectly suited for me to work with them for only a few months and then move on and let their real coders take over. I have helped academics in this manner.
I am in the USA.
The problem:
Companies say I need to be an in-house employee for intellectual property reasons.
The question:
Wouldn't it be easy for them to just have me sign a contract saying all my work is owned by them?
If I work as a contractor, they can let me go when my value diminishes and save lots of money and I could just focus on what I think is a fun way to work--moving from problem to problem.
What am I missing here?
share|improve this question
I hope you get an answer that helps but almost all responses should be read with the caveat "I am not a lawyer". Also employment law varies from place to place so I'm not sure how helpful any answers will be without your location, but then you may run foul of the "too localised" rule. – Kevin D Jun 3 '11 at 8:07
Oh, what a delightful can of worms you have opened :) Unfortunately, it's not so easy. – Tim Post Jun 3 '11 at 8:30
What makes you think that you cannot move from project to project as an employee? Being an employee is "just" the way the contracts are formulated and for employers a safequard wrt copyright etc (as others have mentioned). Being an employee, there is still nothing stopping you from moving to another project. It may take quitting your current job, but how is that any different from quitting a project as a contractor? I honestly think it's a matter of perspective. – Marjan Venema Jun 3 '11 at 8:59
@Marjan Venema comment and @Ant's answer leads to the paradox. Ethically, I want the employer's expectations of the work timeline and role to be in-line with my own expectations. The tricky tact part is that, as a person without a reputation and negotiation skills, I want to avoid putting idea in empployer's head of jumping ship. I want more confidence that their perspective of my domain expert role is not cloudy; At the same time, I am hesitant to talk openly along the lines of your comment in order to avoid making them feel I will jump ship too early. – indiehacker Jun 3 '11 at 17:50
just make it clear from the outset that you are interested in "that" particular project. That you will move on when the projects is finished, whether moving on means within or outside of the company. No dilemma's there, ethical or otherwise. Companies don't expect you to stay for life, in fact they would be very surprised indeed if you didn't go looking for other challenges. Companies (should) know it is hard to hang on to good people. Plus: things change, often in unexpected ways. And companies know that too. – Marjan Venema Jun 3 '11 at 18:10
show 1 more comment
10 Answers
It's cheaper
Hiring people is generally much cheaper than normal contractor rates, not many companies will come out flat and say this though so they state a number of "non-reasons".
enter image description here
share|improve this answer
I don't know what country you are in but ion the U.S. a full time employee costs a lot more than a contractor. Companies where I live ALWAYS want to hire contractors. FTE cost more becuase of insurance, unemployment, etc – Jonathan Kaufman Jun 3 '11 at 13:08
It also depends on the workplace. A lot of workplaces expect you to work extra hours and nevermind about the overtime pay you are missing. Long story short - know your employer, know what you value. If you want stability (gives you a chance to focus on things other than looking for the next consulting gig), then go in-house. Typically, if you're young, it makes a lot of sense to get some advanced experience as a consultant. – altCognito Jun 3 '11 at 13:56
@ataddeini Not exactly. No one who fails to calculate cost of labor stays in business very long. What happens often though is the internal accounting is sort of broken such that FTE work "for free" on projects whereas contractors have to be paid directly from the project budget. If project sponsors can get work done and bury the cost they will. – Jeremy Jun 3 '11 at 13:59
I agree with Jonathan Kaufman: It certainly is not cheaper (at least in the U.S.). After benefits, and all the other payroll taxes etc., it's much cheaper to hire a contractor. Especially if something happens. It's harder to fire an employee, the employee can try to sue you for all sorts of reasons etc. It's a much bigger deal to hire an employee than to a consultant. – Richard DesLonde Jun 3 '11 at 17:00
@vartec: Yeah, I understand that, but double is a lot. Maybe you have an additional 30% on top of a salary for an FTE at most, but no way you have 100%. And really, whether or not it ends up being more or less expensive depends hugely on the organization size/structure/industry/market/etc...I'm just saying it's difficult for some clients to get past the shock value of hourly rates for contractors/consultants. – ataddeini Jun 3 '11 at 21:01
show 8 more comments
Hmm. From the question it appears you want to be a consultant, not a contractor. You want to go to a company, give them the benefit of yout specialised expertise and then move on to the next.
From my knowledge of how businesses work, what you want to do is set up a consulting company that can be hired to present your knowledge to the company and then be hired to transfer that knowledge to the company's employees. Companies like this - they get better trained employees rather than spending money on the same skills that would then leave the company.
The benefit to you is that you get to charge loads more - consultants are expected to be expensive, and worth every penny (even if really, they're not, trust me on this). The disadvantage to you is that you have be more professional, you have to provide a service (of education) as a company selling something rather than a person popping in for a month or two to have a few chats. That means you'll need to formalise your training in powerpoints and white papers and thick bound reference manuals.
The latter is probably not as much fun, but then.. I got to tell you, work generally isn't.
share|improve this answer
Very nice and needed explanation that clarifies a new perspective I need to contemplate. Thanks. – indiehacker Jun 3 '11 at 17:12
Given @Dave_Post's answer, I am unclear about the threat even a consultant poses to intellectual property. It seems the value of a consultant to a small start-up team depends on the consultant becoming intimately aware of the product's design and customizing his/her expertise educational presentations and white papers to showing how the client can innovate her specific product. So it seems a small start-up team would avoid risk of a out-of-house consultant. – indiehacker Jun 3 '11 at 17:30
not necessarily, lots of companies buy in education - ie training - for everything. I've been trained in Oracle for example, the trainer didn't need to tailor it to my company's products. He might tailor the training to the aspects we are most interested in, but that's to be expected. You can provide x days of customisation and tailored on-site consultancy if you want. You can provide whatever service you want to a company, there's no fixed templates you must use. – gbjbaanb Jun 4 '11 at 22:32
add comment
You'll run into this frequently, depending on where you live and where the company lives.
The first thing we need to do is disassemble the term intellectual property. You have:
• Copyright
• Patent
• Trademark
Lets look at these things individually.
Under normal employment, depending on what you sign, your employer owns your output, sometimes during off hours. That is not the case when you are contractor, as you are a vendor that owns the copyright unless it is specifically assigned. This can be a managerial headache that many companies want to avoid.
I hate software patents, with a passion. However, if you come up with what decision makers deem to be a patentable process for 'doing something', the company needs to own it first. That brings us back to copyright.
This isn't really a key issue. Many companies furnish their logo to be printed on devices, literature, etc to third party vendors that produce devices and literature. However, we get back to administrative stuff, you need (in many places) explicit written permission to produce builds that contain trademarked media (text, logo, etc).
This is all solved by hiring employees and not worrying about holes in a master contractor agreement, project specific agreement and how any of the above might nullify your existing NDA. Remember, project contracts do tend to change often due to scope creep. This is the work of lawyers, who cost money, and they'd probably rather save that.
If you live in another country, under a different legal system, the potential problem multiplies, when in fact it's probably a null scenario.
In reality, seldom do these problems actually surface .. but they could and that's what guides policy decisions.
You can't hate the world for what it is, all you can do is work around it.
share|improve this answer
@Tim_Post Thanks for this answer. It is now clear why in-house is demanded. BUT now I am curious about how this plays out with @gbjbaanb's answer of being in a role of a consultant below. – indiehacker Jun 3 '11 at 17:21
There's other forms of intellectual property, like trade secrets. Copyrights, trademarks, and patents are legal constructs that let companies put information out in the public. If a trade secret gets out, like their code or who their clients are, they have no legal recourse. This sort of thing is usually covered by contract though. – Philip Jun 3 '11 at 21:46
@Philip - Trade secrets are also covered by non-disclosure agreements and (sometimes) non-compete agreements. The specific issue of copyright with a vendor is, the vendor has to assign ownership to you, in many places that isn't an automatic thing. An NDA, which would protect trade secrets, only asserts ownership of stuff by the company, which you aren't allowed to talk about. – Tim Post Jun 3 '11 at 23:00
add comment
"Intellectual property" aside, there are other very good reasons not to take on an expert who can leave on a whim.
Let's take you out of your comfort zone. Imagine you run a company that has decided to start a new project researching the genetic makeup of a particularly obscure virus. What you personally know about this virus could be written on the back of an envelope, so you hire a PhD graduate to work on the project. The graduate has very in-depth knowledge of this virus because he studied it as his PhD research topic.
The chances of you finding another graduate like him are tiny. You really need someone who is a domain expert in this very specific field. He wants to be taken on as a contractor so you hire him.
Six months into the project. You've spent a few hundred thousand dollars so far. Your graduate contractor decides he wants to leave. Tomorrow. The project isn't finished. It's too far along to scrap without taking a massive loss and you can't find anyone to replace him.
If only you'd have the foresight to hire him as a full-time employee.
share|improve this answer
Having hired him as an employee is not going to safeguard you against his knowledge leaving the company. Employees can also decide to leave, possibly not tommorrow, but within two weeks to a month in almost all jurisdictions, unless a specific notice period has been agreed upon. And that is something you can put in a contract with a contractor as well. – Marjan Venema Jun 3 '11 at 8:16
And in this scenario the difference between the contractor leaving tomorrow and the full time employee leaving after the minimum contractual notice period is what? You still can't replace him, he can still leave, the project still won't be completed (unless you happen to be very close to completion anyway) – Kevin D Jun 3 '11 at 8:16
I know that in the US it doesn't make much difference - people can leave whenever they like. Here in the UK it makes a huge difference. My notice period is 3 months, which I am legally obliged to adhere to. If I was a contractor I'd never agree to such a long notice period. Full time == security for both sides here. – Ant Jun 3 '11 at 8:33
@Ant: 3 months notice period would be exceptional where I live (Netherlands). Notice period by law is the same as the payment period, but that can be extended in the employment contract. – Marjan Venema Jun 3 '11 at 9:02
+1. Of course full-time employees can leave as well. But statistically speaking, the don't. At least not as quickly as short-time contractors/consultants. (If they do leave as quickly, that's a sign that something is terribly wrong with your company!) – nikie Jun 3 '11 at 9:08
show 5 more comments
I'm fairly sure the main reason we prefer full-time employees over contractors is that we pay them less...
share|improve this answer
I was under the impression that to a company a contractor costs roughly the same as a regular employee once you've factored in everything (National Insurance in the UK for example). Perhaps it's different in the US. – ChrisF Jun 3 '11 at 9:18
In my region benefits will probably account for around 15 to 20 percent of your overall compensation. Contractors around here generally make 1.5X to 2X more. The main difference is that contractors are not getting paid when there is not a big project to work on, where employees can muddle through the slow times, making it much more stable. – Morgan Herlocker Jun 3 '11 at 13:13
@ironcode, benefits usually actually cost roughly twice your salary – HLGEM Jun 3 '11 at 16:53
@HLGEM - I did a bit of research. It varies company to company, but the general figures I saw were between 15%-35% of the average employee's gross salary. This is not counting operational costs such as work equipment, office space, etc. Even so the estimates on that seem to add around 10%. This would put some of the beefiest benefit packages at around 45%, which is no where near the 200% you suggest. I can add up my own as well and come to around 20%. Am I missing something? – Morgan Herlocker Jun 3 '11 at 17:13
Its generally budget constraints, stop thinking in terms of who gets what, start thinking in terms of having a chunk of money to spend on getting the project done. A contractor can fit in the project budget and be fired when its complete. – gbjbaanb Jul 7 '11 at 16:03
show 2 more comments
Besides intellectual property their are also tax concerns to deal with independent contractors. If you are going to hire a contractor they need to be treated like a contractor and not an employee. The employer looses a fair bit of control in the when and how things get done with a contractor versus an employee.
Also a disgruntled contractor can always come back later and try to claim they really should have been an employee and the state department of labor or the IRS will audit the company. If the disgruntled contractor wins they get the employer half of FICA taxes and the employer owes taxes, penalties, and unemployment insurance. The differences between employee and contractor are particularly vague making it hard for a company to know if they are in fact complying with the law. It is easier to default to hiring employees than to hire contractors that may be questionable. If you only do business with one company, work from their office, using their equipment the company is going to have a very hard time defending their decision to classify you as a contractor rather than an employee.
Some more information from the IRS on contractors versus employees.
share|improve this answer
+1 for pointing out that there are certain situations where one MUST be a full-time employee, by law. – Joshua Carmody Jun 3 '11 at 14:43
To clarify the last point, if they hire the contractor through a placement firm that has the contractor on staff (i.e. receiving a W-2) they are not treated as a contractor for IRS purposes. Thats why you see postings for short term contractors with CORP to CORP only because they do not want to open up the can of worms that exists with IRS when hiring indviduals as contractors. – ben f. Jun 3 '11 at 21:10
add comment
If it's cheaper or not is arguable (total cost of full-time employee is 2-4x his salary).
I'd rather believe it's about loyalty or rather how corporation middle management perceives it. Many managers think if someone is full-time employee, then he's "part of the team", thus automatically loyal forver to the corporation. On the other hand the perceive external contractors as the name indicates — something external. Also full-time contract most often means exclusive contract, while external contractors might have other clients. Generally middle managers perceive full-timers as more stable option.
Of course this is logical fallacy. Actually it's much easier to get guarantees from contractor, than full-timer. In fact most countries have laws protecting employee rights, but not really contractor right. So employee may leave, and company can't do anything about it, on the other hand contractor usually has no easy way of terminating his contract short. Also non-competence contracts in many countries have been deemed to have no legal value in case of employees, but they still apply to contractors.
share|improve this answer
add comment
While it's certainly possible that cost, not intellectual property, is really the driving issue, there are cases in specialized fields where there are substantial intellectual property issues.
How close is your specific area of data analysis to what a company would regard as core to their business or key to their competitive advantage? How likely would the analysis you do for one company inform your future analysis for its biggest competitor?
If you were an expert in, for example, data analysis to provide recommendations to shoppers, it would be very unlikely that a company like Amazon would want to hire you on a short-term basis rather than as a full-time employee. Amazon has already invested quite a bit in this type of data analysis and would tend to be concerned that you would come in for a few months, help them improve their recommendation engine, but also end up absorbing a lot of their existing tricks and discoveries. That would make you particularly attractive to competitors to Amazon that have much less invested in recommendation engines and would potentially erode Amazon's existing competitive advantage. If they hired you as an employee, on the other hand, it would generally be much easier to restrict you from working for a competitor doing the same thing for some time.
If this is really their issue, you could potentially negotiate that sort of non-compete agreement with the companies you do work for. But that would require some good lawyering to ensure both that you don't end up in a situation where you can't legally work for anyone for a period of time and that the company doesn't end up in trouble with the IRS for treating you like an employee while paying you as a consultant. On the other hand, companies may just feel more comfortable ensuring that only employees have access to their "secret sauce".
share|improve this answer
add comment
This is a bit of a tangent, but - part of the reason why some companies want all fulltime employees is because their projects are a (long term) mess.
The only way things get done (and maintained) is by having people around who've been there forever and know the Big Ball of Mud (and the huge "inner platform") inside out. I've worked at companies where the ramp up time to learn the beast and get comfortable with it is as much as 12 months or more. In this scenario, it makes sense to find stability-oriented people who will stick around and put up with the beast forever. Simply because whenever anyone leaves - the ramp up time for a new warm body to get productive is so expensive.
I don't know how this might relate to your specialty. Maybe the companies you are approaching think they could use someone with your specialty on staff forever, rather than to just solve a one-off problem. But this is a rather typical case: companies often want a huge manifest of fulltimers (perhaps even ALL fulltimers) because their stuff is too hard to pick up for a shorter term stint. And once they have someone on the hook they want to keep them.
(Even more tangentially - I now think of this as a job smell. If I hear in a interview that "there is a lot to learn" and that there is a massive ramp up time at the shop, I'm out the door. Unless of course, there is some very very specific domain-based knowledge to learn, but definitely not just orientation with the programming side of things itself.)
share|improve this answer
add comment
I suspect 2 possible situations
1. Non-compete
2. The W2 vs 1099 situation.
Non-compete My suspicion is that they want you to sign a non-compete agreement. Depending on which state you are in, and which state the company is headquartered in, non-compete agreements might be worthless (such as in California) or they might have vicious fangs (such as in NY or OH). Non-competes are quite common for employees and most companies make them a requirement of employment. No consultant or contractor would sign a non-compete agreement.
Up until the 1970s, it was quite common for a non-compete clause to last 10 years after termination of employment. Since then, such contracts have been whittled down to about 1 year.
Signing one might mean that you can't work for a year if you quit working for them - if your research is "hot stuff". It might also mean that they can prevent you from working for their competitor and that hiring you as an employee would be the cheapest way to deny their enemy of your expertise.
The quickest way to determine if this is the reason that they want you as an employee would be to say "OK, I'll be an employee, but I refuse to sign any non-compete clause".
W2 vs 1099 Doctors, lawyers and accountants may set up "professional corporations". The Tax Reform Act of 1986 added restrictions to make it almost impossible for programmers and engineers to do so (if you remember the guy who flew his plane into an IRS building last year, this was what his complaint was about). This means that if you want to be a contractor/consultant as well as a programmer, you'll need to be an employee of some other company. The rules for being a 1099 contractor for engineers and programmers are strenuous enough that the vast majority of companies can't be bothered to figure them out - so they flat out don't bother and require you to be a W2 employee of some other company.
share|improve this answer
add comment
Your Answer
| http://programmers.stackexchange.com/questions/81221/why-do-companies-tell-me-they-want-me-as-an-in-house-employee-not-as-a-contract | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.457315 |
26 | {
"en": 0.9466148018836976
} | {
"Content-Length": "97978",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:U7TRSIQC7XK7VYXAQLIA3AYMLWDUZHNP",
"WARC-Concurrent-To": "<urn:uuid:a3cd268e-a0f4-433c-88c7-2e6e3ee914ba>",
"WARC-Date": "2014-03-13T22:27:12",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:JB5RZZ7OYIVWZJNNMZDTRBAXAYYHUESU",
"WARC-Record-ID": "<urn:uuid:667e78a6-d3de-4cbb-90a0-63c6a4154efa>",
"WARC-Target-URI": "http://programmers.stackexchange.com/questions/83554/formatting-code-a-bad-thing-when-using-a-vcs?answertab=active",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 1,739 | Take the 2-minute tour ×
I almost always format my code before I commit to make sure it's done properly. Most of my team don't really care and don't always format their code properly (minor things that don't affect the code but affect readability when trying to maintain it).
I recently installed the VS power tools that has an option "Format on save", and made a change to a file that wasn't formatted prior. The development VP just came to me and reprimanded me for formatting since it shows up in the merging tool as having almost the entire file changed, instead of just a line or two (so he can't see exactly what I modified easily), and told me to disable the format on save in the future. While I understand that concern, I find it difficult sometimes to sort through the code that is unformatted, and IMO it should be formatted properly all the time anyways. Note that I'm not just reformatting things on a whim., but as I write code I'll either use the power tool or hit the key command to format the text to make it easier to read, and in SVN this shows up as a modification.
So I ask, is always formatting the code actually a bad thing? Are his concerns more valid than making sure the code is readable?
share|improve this question
he's right, so why not get all the team to use the format-on-save tool too, then you'll all get nicely formatted code that is easy to read, and easy to view commit diffs. – gbjbaanb Jun 13 '11 at 15:25
Most good file compare tools have a filter for "unimportant differences" or "ignore whitespace". Some, like Beyond Compare, ship with prebuilt language-specific filters. Use it to your advantage if you have it. – Michael K Jun 13 '11 at 15:35
The formatting of the code is as important as the changes that were made. Readability has to be one of the highest priorities when you're on a team. Your VP should know that and be concerned about it. – Edgar Gonzalez Jun 13 '11 at 15:42
@Edgar: +1. The VP is being too picky. Readability first... and a whitespace ignore option means that this is no big deal. And it also means there is a bigger problem because the rest of the team don't care. The VP should be more concerned about that. – quickly_now Jun 14 '11 at 6:26
add comment
5 Answers
I am a formatting nit-picker too, so here a few tips:
• Required first step: get the team to agree on some basic formatting standard, such as tabs vs. spaces, brace positions, comment styles, etc. Now your formatting changes won't be a complete surprise to everyone, and you won't step on any toes.
• Clean up the formatting only around the code you change. If you make changes to just one function, then clean up that function. At least over time you'll have better-looking code.
• Do major formatting overhauls as a separate commit, with no other code changes. You should only do these when you're less likely to want to compare code after the change to before the change, since comparing across a diff like that can be annoying. I usually do cleanups as the first thing before major development on that code.
• Get a good diff tool that can do language-dependent marking of significant changes and non-significant changes. My favorite diff too Beyond Compare marks actual code changes in one color and whitespace/comment only differences in another.
edit for one more tip:
• It varies form language to language, but for most truly cosmetic changes to the code, you should be able to compare compiled binaries before and after a major cleanup to be absolutely sure you didn't muck it up.
share|improve this answer
As long as you don't include VC tags in the binary (or build information). – Vatine Jun 14 '11 at 9:41
add comment
You should not be re-formatting and committing changes to other people's code unless:
• you are the manager attempting to establish team coding standards
• your manager has asked you to clean up the code to adhere to team coding standards
• your are cleaning up code from a developer no longer on your team to adhere to team coding standards.
You'll notice in all cases I refer to team coding standards. I am a strong believer in reasonable, agreed-upon coding standards for the team. If you have them, then the original developer should go back and clean up his or her code to adhere to the team standards, you should not do that behind their back. If you do not have standards (and you should), then you should not be modifying another team member's code to adhere to your philosophies, especially behind their back. Remember, you are part of a team and while coding standards are important, so are the trust and respect between team members.
share|improve this answer
"Behind their back": this goes back to the psychological issues of code ownership (or development turf war). – rwong Jun 13 '11 at 19:55
"Other people's code" is an interesting way of saying it. I work on my company's product, compiled from the code my company owns, that my team members and I work on. It isn't behind their back in any way to fix it to the standards while working on it. However, I do agree that the ideal solution is to make the original developer clean it up to the standard. – Caleb Huitt - cjhuitt Jun 14 '11 at 2:13
@Caleb: Gets hard if they just flat out refuse. – quickly_now Jun 14 '11 at 6:29
By "other people's code" I don't mean ownership, I mean something they wrote and believe they are still responsible for supporting. In the absence of coding standards, if I implement a class with 1,000 lines of code and you make changes to 2 lines to correct some behavior and reformat the whole file, I'm going to be very surprised when I open the file. As members of a team we shouldn't do that to each other. If you check that file in with a full reformatting and don't even give me a heads up, that is not very team friendly. – cdkMoose Jun 14 '11 at 14:01
In OPs original discussion, I read that to be an environment without coding standards (or not well enforced), that is why I answered as such. In that environment, one developer should not be imposing his standards on others. – cdkMoose Jun 14 '11 at 14:03
add comment
First off, your team needs to pick a formatting convention and stick with it. You need to come to an agreement and have everyone stick to it so you don't have people fighting over what things should look like. This should not just be something you do on your own.
As for your real question. Formatting code is not a bad thing. What is bad is making major formatting changes in the same commit as code changes. When your team comes to consensus about how things should be formatted, make one pass thru the code and format everything. Check that is by itself. The commit message will make it clear that the changes are just white space and not functional. Then when you need to make functional changes, they are in a different commit so they can be clearly seen.
share|improve this answer
it still doesn't help if you want to compare changes from several revisions ago, but its better than code change + format changes in 1 go. Of course, this answer also applies to refactoring. – gbjbaanb Jun 13 '11 at 15:24
+1: In addition to this, it's good to use something like Stylecop or some other tool that autoformats and enforces style. Then, synchronize the settings between all of the team members so that the formatting is consistent across everyone and you don't necessarily have to remember what the "right" format rule is. – Ryan Hayes Jun 13 '11 at 15:30
If the OP was reprimanded for trying to format one document, something tells me he wouldn't be able to suggest using StyleCop. – Wayne M Jun 13 '11 at 15:33
@gbjbaanb: Yes. This is why it is best to make these kind of decisions at the start. The project I am on now has the Eclipse formatter settings checked into the repository so we know everyone has the same settings. – unholysampler Jun 13 '11 at 15:51
@quickly_now: This is why we have managers with veto rights. If people can't agree, they can make a decision. – unholysampler Jun 14 '11 at 12:13
show 2 more comments
No, formatting code is very important. However, commits should be done in two groups:
1. Cosmetic changes - anything that makes the code more readable.
2. The other changes - everything else that affects the code.
Use the commit message to signify that only cosmetics have been changed. These can be easily skipped over when searching for more substantial modifications.
share|improve this answer
Additionally, it is also a good practice to decide on a certain formatting convention between your team. Don't just format code from other people without discussing this first. – Steven Jeuris Jun 13 '11 at 15:07
Yeah.. But you know, sometimes it's so tempting to format that damn mess "while you're at it". Also, trying to separate cosmetic changes from functional changes can be a pain if you use VS and it formats something automatically. Oh, and nobody will say that you are doing some stupid formatting while you have Very Important Tasks to do by looking at commit history – Dyppl Jun 14 '11 at 6:20
add comment
You both have a point, but you can both get what you want. Format the code first, check in that change only. Next, make your functional changes and check that in as a second step.
share|improve this answer
I think this is the best solution for your current situation, but you should talk about it with your team. However, you do have a bigger problem, which is the lack of a coding standard. – Thomas Owens Jun 13 '11 at 15:06
Agreed. I wonder if the OP's environment is one of those cowboy places where standards are eschewed to "crank things out quick". – Wayne M Jun 13 '11 at 15:23
add comment
Your Answer
| http://programmers.stackexchange.com/questions/83554/formatting-code-a-bad-thing-when-using-a-vcs?answertab=active | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.208705 |
15 | {
"en": 0.9172265529632568
} | {
"Content-Length": "81413",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:LES3C6KQS3HUP5R35VDZ4PKZN3733U2F",
"WARC-Concurrent-To": "<urn:uuid:7c2e0224-72ad-403f-8db4-d8ef13a259d7>",
"WARC-Date": "2014-03-13T22:10:53",
"WARC-IP-Address": "190.93.245.208",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:JGLFX7ESG3P2ZTGCENWFJ4DAMEG3PGRZ",
"WARC-Record-ID": "<urn:uuid:9707c35e-074e-456e-bda0-c0d8b2872e2f>",
"WARC-Target-URI": "http://quizlet.com/3349543/richard-part3-flash-cards/",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 736 | Created by ubiquitous4g
Remove ads
20 terms
[VERB] When something shrivels or when something shrivels it, it becomes dryer and smaller, often with lines in its surface, as a result of losing the water it contains.
쪼글쪼글해지다; 쪼글쪼글하게 만들다
The face was as brown and wrinkled as a _____ed apple.
[NOUN] Your ankle is the joint where your foot joins your leg.
I twisted my ankle and it swelled up
VERB[slang]often foll by around)to loiter or walk aimlessly
자동사] (英) 어슬렁[어정]거리다; 빈둥거리다
He's happy to _____ around the house all day
[NOUN] A trout is a fairly large fish that lives in rivers and streams. 송어
I can fish for ____ in this stream
[NOUN] A stream is a small narrow river. 개울
유의어 [명사] river, brook, burn, ...
I can fish for trout in this _____
[VERB] When you tickle someone, you move your fingers lightly over a sensitive part of their body, often in order to make them laugh. 동사 (손가락으로 장난치는) 간지럼을 태우다
I used to ____ my kitty
doze off
to go to sleep, especially during the day
(특히 낮에) 잠이 들다
My cat dozed off in front of the fire
[ADJ] [INFORMAL] If you describe something as diabolical, you are emphasizing that it is very bad, extreme, or unpleasant. (비격식 특히 英) 끔찍한, 진저리나는
[VERB] [INFORMAL] If you whack someone or something, you hit them hard. 동사[vn] (비격식) 세게 치다, 후려치다
She _____ed him with bat
[EXCLAM] People sometimes shout `Hooray!' when they are very happy and excited about something.
감탄사; 만세(즐거움・찬성의 표시로 지르는 소리
_______, our team won the game!
[VERB] If you flop into a chair, for example, you sit down suddenly and heavily because you are so tired
동사(down/back) (너무 지쳐서) 털썩 주저앉다[눕다]
The rabbit ___ped back, unconscious
[VERB] If you clasp someone or something, you hold them tightly in your hands or arms. [vn] (꽉) 움켜쥐다[움켜잡다] [유의어] grasp, hold, press,
She _____ed the children to her
[VERB] When you unwrap something, you take off the paper, plastic, or other covering that is around it.
[VN] (포장지 등을) 풀다 /[유의어] wrap up
Don't _____ your present until your birthday
[NOUN] Plaster is a smooth paste made of sand, lime, and water which goes hard when it dries. Plaster is used to cover walls and ceilings and is also used to make sculptures. 동의어 [명사] stucco, gypsum
명사 1. [석고]반죽 2. 소석고; 깁스 (붕대)
She broke her leg a month ago and it's still in ______
[NOUN] Suppertime is the period of the day when people have their supper. It can be in the early part of the evening or just before they go to bed at night.
명사 저녁 식사 시간 ((보통 오후 5-7시 사이))
It is _______ and the food is on the table
[ADJ] If someone's body or a part of their body is bloated, it is much larger than normal, usually because it has a lot of liquid or gas inside it. 형용사/ 부은, 부푼
His stomach was bloated from eating too much
[NOUN] [BRIT] A baron is a man who is a member of the lowest rank of the nobility
명사1. 남작 2. (특정 산업 분야의) 부호[거물]
_____s had to swear an oath of allegiance to the king
[NOUN] A splint is a long piece of wood or metal that is fastened to a broken arm, leg, or back to keep it still.
명사 (접골 치료용) 부목(副木)
The _____ should be snug but not tight
[ADV] If you say that something is presumably the case, you mean that you think it is very likely to be the case, although you are not certain 부사]아마, 짐작컨대
[동의어] seemingly, apparently, on the face of it
They are presumably talking about xboyfriend.
[NOUN] A triumph is a great success or achievement, often one that has been gained with a lot of skill or effort. 명사;업적[승리], 대성공 [유의어] success, victory,
The winning team returned home in triumph with trophy.
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Reload the page to try again!
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
NEW! Voice Recording
Click the mic to start.
Create Set | http://quizlet.com/3349543/richard-part3-flash-cards/ | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.363611 |
39 | {
"en": 0.9256174564361572
} | {
"Content-Length": "68378",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:BEU3M2MRVBRTL5J5VTNS6YQ7VIROQXL4",
"WARC-Concurrent-To": "<urn:uuid:3444a1d7-2f1d-4a03-8df2-1f173100a988>",
"WARC-Date": "2014-03-13T22:21:30",
"WARC-IP-Address": "23.21.63.143",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:KZ2CJR52BPPWQ4RMV33YQO3UZZFIRUUP",
"WARC-Record-ID": "<urn:uuid:4a44ef2c-a709-48a4-92f0-86a29430356b>",
"WARC-Target-URI": "http://rapgenius.com/The-notorious-big-somebody-gotta-die-lyrics",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 620 | The Notorious B.I.G. – Somebody Gotta Die Lyrics
You pyonged “The Notorious B.I.G. – Somebody Got...”
Save Note No Thanks
Caution: You are now annotating this song as
[Verse One]
I'm sittin in the crib dreamin' about Lear jets and coupes
The way Salt shoops and how they sell records like Snoop, (oops!)
I'm interrupted by a doorbell, 3:52, who the hell is this?
I gets up quick, cocks my shit
Stop the dogs from barkin', then proceed to walkin'
It's a face that I seen before
My nigga Sing, we used to sling on the 16th floor
Check it, I look deeper
I see blood up on his sneakers
And his fist gripped a chrome four-fifth
So I dip, nigga, is you creepin or speakin?
I opens up the door, pitiful, "Is he in critical?
Retaliation for this one won't be minimal
Cuz I'm a criminal way before the rap shit
Bust the gat shit
, Puff won't even know what happened
If it's done smoothly,
silencers on the Uzi
Stash in the hooptie, my alibi, any cutie
With a booty that done fuck Big Pop
Head spinnin, reminiscin' 'bout my man C-Rock
[Hook: repeat 2X]
Somebody gotta die
If I go, you got to go
Somebody gotta die
Let the gunshots blow
Somebody gotta die
Nobody got to know
That I killed yo ass in the mist, kid
[Verse Two]
Fillin' clips, he explained our situation
Precisely, so we know exactly what we facin'
"Some kid named Jason, In a Honda station wagon
Rock had a grip so they formed up a clique
A small crew
'Round the time I was locked up with you"
"True indeed,"
"But yo nigga, let me proceed
Damn where was I? Yeah...
Went outta town, blew the fuck up
C-Rock went home and Jay got stuck the fuck up
Hit him twice, caught him right for the Persian white
Pistol whipped his kids, and taped up his wife
(Niggas is trife)
He figured Rock set 'em up, no question
Wet em up no less than 50 shots in his direction"
"What kinda gats?" "Heckler & Kochs and Calicos
But fuck that, I know where all them niggas rest at
In the buildin' hustlin', and they don't be strapped
Supreme in black is downstairs, the engine runnin'
[Verse Three]
Exchanged hugs and pounds before the throw down
How it's gonna go down, lay these niggas low-down
"Slow down, fuck all that plannin' shit
Run up in they cribs, and make the cats abandon ship"
See niggas like you do ten year bids
Miss the niggas they want, and murder innocent kids
Not I, one niggas in my eye
That's Jason
Ain't no slugs gonna be wasted
Revenge I'm tastin at the tip of my lips
I can't wait to feel my clip in his hips
"Pass the chocolate Thai"
Sing ain't lie
There's Jason with his back to me
Talkin to his faculty
I start to get a funny feeling
Put the mask on in case his niggas start squealin'
Scream his name out (Ay yo playboy!), squeezed six, nothin' shorter
Nigga turned around holdin' his daughter
Edit song description to add:
| http://rapgenius.com/The-notorious-big-somebody-gotta-die-lyrics | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.501802 |
11 | {
"en": 0.7706959843635559
} | {
"Content-Length": "14310",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:UKZBH22R6VWDTS7C523F4DDFNS42RMOA",
"WARC-Concurrent-To": "<urn:uuid:a9c2cd52-d705-491f-bf6f-044e107cef25>",
"WARC-Date": "2014-03-13T23:02:40",
"WARC-IP-Address": "199.15.176.161",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:6HWXGQFUMWP36YEG5IH4BDOMVF64ICSG",
"WARC-Record-ID": "<urn:uuid:96635d2d-849b-478d-8748-54d815b7621c>",
"WARC-Target-URI": "http://search.cpan.org/dist/Encoding-FixLatin/script/fix_latin",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 302 | Grant McLean > Encoding-FixLatin > fix_latin
Annotate this POD
Open 0
View/Report Bugs
fix_latin - filters a data stream that is predominantly utf8 and 'fixes' any latin (ie: non-ASCII 8 bit) characters
fix_latin options <input_file >output_file
-? detailed help message
The script acts as a filter, taking source data which may contain a mix of ASCII, UTF8, ISO8859-1 and CP1252 characters, and producing output will be all ASCII/UTF8.
Multi-byte UTF8 characters will be passed through unchanged (although over-long UTF8 byte sequences will be converted to the shortest normal form). Single byte characters will be converted as follows:
0x00 - 0x7F ASCII - passed through unchanged
0x80 - 0x9F Converted to UTF8 using CP1252 mappings
0xA0 - 0xFF Converted to UTF8 using Latin-1 mappings
Display this documentation.
This script was originally written to assist in converting a Postgres database from SQL-ASCII encoding to UNICODE UTF8 encoding. The following examples illustrate its use in that context.
If you have a SQL format dump file that you would normally restore by piping into 'psql', you can simply filter the dump file through this script:
fix_latin < dump_file | psql -d database
If you have a compressed dump file that you would normally restore using 'pg_restore', you can omit the '-d' option on pg_restore and pipe the resulting SQL through this script and into psql:
pg_restore -O dump_file | fix_latin | psql -d database
To take a look at non-ASCII lines in the dump file:
perl -ne '/^COPY (\S+)/ and $t = $1; print "$t:$_" if /[^\x00-\x7F]/' dump_file
This script is implemented using the Encoding::FixLatin Perl module. For more details see the module documentation with the command:
perldoc Encoding::FixLatin
In particular you should read the 'LIMITATIONS' section to understand the circumstances under which data corruption might occur.
Copyright 2009-2010 Grant McLean <grantm at>
syntax highlighting: | http://search.cpan.org/dist/Encoding-FixLatin/script/fix_latin | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.021065 |
1 | {
"en": 0.9488786458969116
} | {
"Content-Length": "65256",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:QXKM22CVEGLRHJRZX7W6EX2FTLRDD3X4",
"WARC-Concurrent-To": "<urn:uuid:e326fdd6-50f9-4108-93ea-597b3ce6978b>",
"WARC-Date": "2014-03-13T22:14:34",
"WARC-IP-Address": "23.3.13.248",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:DIMNB7NWOTNMWWUUOISPWUL5SCLCVBN7",
"WARC-Record-ID": "<urn:uuid:440ee7ff-9672-4389-8ea7-147c6a51fcfd>",
"WARC-Target-URI": "http://seekingalpha.com/article/490241-how-to-play-the-inevitable-spanish-restructuring",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 621 | Seeking Alpha
Seeking Alpha Portfolio App for iPad
Contrarian, macro
Profile| Send Message| (1,141)
By now, most people who follow the market are probably acutely aware of the laundry list of arguments that support the contention that stocks will likely continue to sell-off over the coming weeks. Nearly three quarters of the economic data released lately have come in below expectations, both the Dow and the S&P 500 dropped below their respective 50 day moving averages this week, the VIX broke above its 50 day moving average Monday, the VIX/VXV term structure is rapidly flattening out, and on and on.
What investors should really be watching, however, is the situation in Spain. The fact is, it is deteriorating faster than virtually anyone expected. Yields on Spanish 10-year bonds jumped nearly 20 basis points Tuesday and are now flirting with 6% - within shouting distance of 7% - the level at which the country is effectively priced-out of the market. As these yields rise, the underlying bonds lose value, causing bond holders to incur losses.
The problem for Spain is that its banks are the bond holders. Spanish banks increased their holdings of risky Spanish debt by 68 billion euros in the four months ended February. Spain's banks were able to make these purchases largely because the ECB loaned them money as part of the LTRO program. With no more LTROs on the horizon, Spain's banks will be unable to make further purchases. This is a problem because if the banks scale-back their bond-buying and no one else steps in (foreign investors are wary of Spanish government debt), the price of the bonds will likely fall amid the flagging demand.
If you're a Spanish bank then you face the following absurd predicament: buy more risky Spanish bonds or watch the price of the risky Spanish bonds you already own continue to decline because your purchases are the only thing supporting them. This is an untenable situation.
Foreign demand for the debt is likely the only thing that could save Spain, but the country's failure to meet deficit targets has largely scared-off investors. If Spain's banks fall it would be catastrophic for the country as "Spain's three biggest banks are nearly twice as big as the entire Spanish economy" according to Brian Sullivan of CNBC. Make no mistake, Spain will need a bailout this year or next.
In the worst case scenario (as put forth by Carmel Asset Managment) Spain's national debt will jump from 60% of GDP to 90%, housing prices in the country will fall by 35% causing GDP to contract by an extra 2% in 2013 and 2014, the country's banks will need to be recapitalized (a real problem considering the current bailout mechanisms aren't large enough to get the job done), and the economy will continue to deteriorate as the unemployment rate spikes.
The head of the Bank of Spain highlighted the vicious cycle the country is caught in Tuesday when he noted that if the economy contracts further, the country's banks will likely need more capital - of course, implementation of the austerity measures which are a de facto precondition for attracting foreign investment in the country's bonds will almost ensure that the economy does contract further, thus necessitating the need for more capital. It is clear then how all the negatives are beginning to reinforce each other.
Before you think about 'buying the dip' in U.S. stocks then, consider the implications on world markets of a Spanish restructuring. If you have no idea what the scope of such an event might be, consider this: Spain is five times the size of Greece in economic terms. Bet against Banco Santander (STD) and BBVA (BBVA). Long puts on the S&P 500 (SPY).
Source: How To Play The Inevitable Spanish Restructuring | http://seekingalpha.com/article/490241-how-to-play-the-inevitable-spanish-restructuring | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.331195 |
74 | {
"en": 0.9192164540290833
} | {
"Content-Length": "59171",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:2CR522S7SH5KUE2LSIUQM3PUFTDH64N7",
"WARC-Concurrent-To": "<urn:uuid:0ad02a05-c923-48c4-914a-7a9c53391f35>",
"WARC-Date": "2014-03-13T21:36:25",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:YFTROTGCIRMWMT262M3ZBUJV447JMIJT",
"WARC-Record-ID": "<urn:uuid:624553d2-e26e-426d-8170-1a6065495a4e>",
"WARC-Target-URI": "http://serverfault.com/questions/356432/migration-of-core-banking-application-from-windows-server-2003-to-windows-server",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 296 | Take the 2-minute tour ×
The following tasks were considered for value upgrade to Windows Server 2008. However, the later decision is just to go with platform upgrade from windows server 2003 to windows server 2008 32 Bit
1. Analyze the prerequiesites before installing windows server 2008
2. Identify dependent programs and their implementation aspects & prepare a document
3. List down breaking changes in windows server 2008
4. Prepare Run Environment upgrade requirements
5. Run regression test, volume and performance test
I need details on which of those steps are relevant for a plain platform upgrade from Windows Server 2003 to Windows Server 2008
share|improve this question
There is not windows 2008 32bit. The only 32bit versions of 2k8 are for testing. – t1nt1n Feb 3 '12 at 6:53
@t1nt1n that is factually incorrect. 2008R2 is the first OS with no 32bit versions, 2008 still ship in 32bit versions – Mathias R. Jessen Feb 3 '12 at 8:15
add comment
closed as not a real question by EEAA, Iain Feb 3 '12 at 8:25
1 Answer
Given the little information you've provided, I'd say that all steps are relevants. If you need more details, you'll need to provide (a lot) more details yourself
share|improve this answer
add comment
| http://serverfault.com/questions/356432/migration-of-core-banking-application-from-windows-server-2003-to-windows-server | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.052331 |
21 | {
"en": 0.919227123260498
} | {
"Content-Length": "71131",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:C6BQJWLANALG4E5U335Z3XUM4AAISPFV",
"WARC-Concurrent-To": "<urn:uuid:3f1aab5f-b17f-4e28-b099-65b657ff218f>",
"WARC-Date": "2014-03-13T22:11:16",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:ELUEQQMN2SEZDJ3QIR6Q23U6FMKEVGAB",
"WARC-Record-ID": "<urn:uuid:7011badb-7597-490b-9fdd-b1e4a27f13e9>",
"WARC-Target-URI": "http://sharepoint.stackexchange.com/questions/10892/what-permission-level-do-i-need-to-manage-shared-service-providers",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 602 | Take the 2-minute tour ×
I want to turn on the search in my local development MOSS 2007 install.
• I have an account on the local computer
• I am in the Farm Administrators group
• I can log into Central Admin and see many of the settings
But when I try to Manage This Farms Shared Services I get the following error
You do not have the correct permissions to perform this task. You must be a member of the local administrators group. For more information, contact your system administrator.
I inherited this farm, and the guy who set it up a couple of years ago doesn't recall much of what he did. I need to be able to give him some pretty clear directions on where to add me so I can get work
share|improve this question
add comment
2 Answers
up vote 4 down vote accepted
You should be granted permission on the SSP Administration site collection. If you are given Viewer rights, you can see all of the administration pages, however, you will need to have other permissions granted for some items to be managed. I would set it to full control on that site collection.
For more information: http://technet.microsoft.com/en-us/library/cc262153(office.12).aspx
share|improve this answer
Ah ha! So the SSP is a different site? So being a Farm Admin doesn't make me a site collection admin in the SSP? – MrChrister Apr 8 '11 at 22:36
This is correct. It is a different site and a different web application than Central Administration. – Lori Apr 10 '11 at 20:10
hmm in SP2010 you also need to be local administrator to be able to see services. not sure ifi this is the case too for moss – Anders Rask Apr 11 '11 at 7:19
@Anders Rask - I am in the local admin group on the machine, unless I do not understand local admin. – MrChrister Apr 11 '11 at 21:59
yep thats it :-) – Anders Rask Apr 12 '11 at 6:37
add comment
Lori's answer is best for your specific question, but if you just inherited this farm, there are a lot of other things you will need to get from the previous admin. Here are a few:
1. The ID and password for all related service accounts, including Setup, Farm, Application Pool, Search, Crawl and SSP.
2. If your farm uses one ID for all of the IDs mentioned above, add "Rebuild Farm" to your list of tasks. What you have right now is dangerous from a security perspective and is not recommended for a production farm.
3. Add your Administrative domain ID into the Local Administrators group for each server in the farm (ideally, this would be handled via being added to the proper AD group)
4. Learn about the database server. Where is it? who manages it? How is it set for resources? Which exact version of SQL Server is it running? What patch level?
5. If your database server is not managed by a DBA, then you will need permissions into that database instance as well.
share|improve this answer
thanks for the info. It isn't a production farm, we are trying to figure out what to ask for from the production folks. I will look into the perms stuff and the database. Everything is on two machines for us here with the DB being the standout. – MrChrister Apr 8 '11 at 22:38
add comment
Your Answer
| http://sharepoint.stackexchange.com/questions/10892/what-permission-level-do-i-need-to-manage-shared-service-providers | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.031873 |
0 | {
"en": 0.9717382788658142
} | {
"Content-Length": "51902",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:IAMD3Z2STPFCQFAQ45F54TPVIELEPOJU",
"WARC-Concurrent-To": "<urn:uuid:56021bef-9ede-4d29-ac7d-9ae3e33b2481>",
"WARC-Date": "2014-03-13T22:06:03",
"WARC-IP-Address": "216.34.181.45",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:A67DUWNYLNTB5NQIP6S7MDFIIMUXKW3G",
"WARC-Record-ID": "<urn:uuid:51768321-3c36-4a81-bc50-531c7def751b>",
"WARC-Target-URI": "http://slashdot.org/~HeatingEngineer",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 313 | Forgot your password?
Comment: Every Launch is Amazing (Score 1) 130
by HeatingEngineer (#36725508) Attached to: CmdrTaco Watches Atlantis Liftoff
Have worked at the space center for 29 years in Nov. I was not here for the first several launches. There were people who launched Atlantis in the firing room that that has launched STS 1. Anyone in the world that launches rockets is doing a hard, amazing job. Things like this are important. Very Important. There are other things that are very important. Just like going into space they, need to be done, and done as well as they can be, and improve over time. But they aren't urgent and won't constantly be the center of everyone's focus and interest. But they are very important. When the new rockets start launching try to see at least one launch in your life. It's the same as watching the first boats leave shore or the first aircraft taking off. But it's still hard; it's still costly (that's getting better); it still takes a long time to design, build, test and get to successful, consistent launch rates. Unfortunately we all get caught up in the "thick of thin things" and loose sight of these very important things. So, watch for the complacency, the loss of focus, send emails, speak up (constructively), vote, send letters, get your frequent dose of inspiration start these steps all over again when needed.
Comment: It's just hard ... (Score 1) 255
by HeatingEngineer (#25525691) Attached to: Setbacks Cast Doubt On NASA's Ares Project
.... as are all efforts on the edge of understanding and capability. Going into space still takes a long time, costs lots of money and requires working through many things that don't work to get to one way that does. Don't get distracted by those who have more opinion and bandwidth to blair than common sense or wisdom.
God doesn't play dice. -- Albert Einstein | http://slashdot.org/~HeatingEngineer | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.090098 |
13 | {
"en": 0.9656090140342712
} | {
"Content-Length": "87504",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:O7YQNWCG5PTXHFCC22SKC3ZFQYX4PXW7",
"WARC-Concurrent-To": "<urn:uuid:2fd15c09-c132-406d-a266-348901206b95>",
"WARC-Date": "2014-03-13T22:15:11",
"WARC-IP-Address": "216.34.181.45",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:ZVRSEDJTUVTXKM3U73EPLMRQ2KMEF6IV",
"WARC-Record-ID": "<urn:uuid:a38f0609-67b7-4ffe-b3db-c4b589b410fb>",
"WARC-Target-URI": "http://slashdot.org/~ThatsNotPudding/tags/pricks",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 390 | Forgot your password?
Comment: Put it another way (Score 1) 219
by ThatsNotPudding (#46474899) Attached to: Is the New "Common Core SAT" Bill Gates' Doing?
Would we all enjoy an announcement that the Koch Brothers will offer to fully-fund public education on the state level, but only if the state agrees to teach only the political, economic and scientific theory that the brothers approve (with violations being an instant termination)?
Public Education should be just that, not a plaything of the 1%; not for ideological reasons nor for 30 pieces of silver to cover budget shortfalls.
Comment: Best answer (Score 1) 459
by ThatsNotPudding (#46462267) Attached to: The $100,000 Device That Could Have Solved Missing Plane Mystery
The best answer I've seen as to what happened: this was a failed take-over of the plane (suicide attack, not high-jacking). It didn't work, so no one is going to claim responsibility (along with not tipping their hand at future attempts). And as it went into the sea at speed nearly perpendicular, not much of a debris field, just like the Airbus out of South America a few years ago.
Comment: Careful what you wish for (Score 1) 181
by ThatsNotPudding (#46429367) Attached to: Physics Forum At Fermilab Bans Powerpoint
This reminds me of a Calc lecturer I had that when hearing a request from the hall to slow down his board work, relayed a story that when he was in college, his Calc prof had broken his writing arm but soon taught himself to use his other hand instead.
Once he was healed, he then started using both hands to write on the chalk board during his lectures.
Comment: Keystone XL (Score 1) 247
by ThatsNotPudding (#46429309) Attached to: BP Finds Way To Bypass US Crude Export Ban
This is the exact reason for the Keystone XL pipeline terminating at Houston. It was never for supplying the US domestic market; it is solely for the export of crude (or meta-crude) on the more lucrative international market, resulting in not one penny lower gas prices for consumers.
This is why it's so hard to have respect for the extremist Right supporters: slavishly voting against their own interests in the childish fantasy that by letting billionaires become trillionaires, they themselves - by some inexplicable miracle - will become millionaires instead of the real downward spiral into poverty.
| http://slashdot.org/~ThatsNotPudding/tags/pricks | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.050777 |
4 | {
"en": 0.9713844656944276
} | {
"Content-Length": "85350",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:EFNQNCFLVQHXF3GOS4A4HXTJ7JA75GCC",
"WARC-Concurrent-To": "<urn:uuid:614125d3-815b-41e1-9288-f5d3d9dc3ed9>",
"WARC-Date": "2014-03-13T22:12:49",
"WARC-IP-Address": "216.34.181.45",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:OZIRU2LEXLDVMTTZDOFOFJ4QK4ZOEYSW",
"WARC-Record-ID": "<urn:uuid:477e2d59-6ba4-45ac-b987-0d6982fa5a35>",
"WARC-Target-URI": "http://slashdot.org/~fedos",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 431 | Forgot your password?
Comment: Re:Why aren't we already using bone made bones? (Score 1) 102
by fedos (#39329565) Attached to: World's First Biodegradable Joint Implant Grows New Joints
The claim was that there are countries that "ban or restrict", and the request was for a list of that "banned or restricted". These countries restrict research.
from the fine wikipedia article "India banned in 2004 reproductive cloning, permitted therapeutic cloning."
And did you notice that I didn't include India? If you want to criticize the list that I provided then look only at the countries in my list. I specifically tailored it to not include countries that only restricts or bans cloning. This is why I gave the list to begin with instead of just linking to the Wikipedia site, something that took me less than two minutes to find so I don't know why you couldn't look up the list yourself in the first place.
Seriously, so many people are quick to demand "citation, plz" for easy to find information about well-known facts that it dilutes the calls for evidence of the claims of absolute quacks.
Comment: Re:If they hadn't brought their drone (Score 1) 1127
by fedos (#39110449) Attached to: Hunters Shoot Down Drone of Animal Rights Group
What protects a plane flying over your property from physical threat from you is not that there are living people on board, but airspace rules. Your property does not extend indefinitely into the sky. At a certain altitude it becomes public property. This is why planes are able to fly over your property without an easement, and it's why governments are able to regulate building heights.
As long as this drone was within this space, it was not trespassing. Of course, if it was high enough to be in controlled airspace then it would have legal problems.
Bottom line is regardless of whether or not it's legal for the drone to be where it was, the hunters had no right to shoot it. Let's say that you and I are in some sort of neighbors' over what you're doing on your property (we'll say what you're doing is legal, but it causes a nuisance to me), so I sneak on over with a camera to photograph how bad it is. I've broken the law by trespassing. If you catch me, this does not give you the right to destroy my camera. You call the cops and they give me a citation; destroying my property would give me just as much right to call the cops as you have.
| http://slashdot.org/~fedos | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.732917 |
11 | {
"en": 0.9580593705177308
} | {
"Content-Length": "11734",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:MEI45GVQ3R2VF4DBLFLZCAHN4RUYOT7X",
"WARC-Concurrent-To": "<urn:uuid:f5372b3e-11ee-4aad-b540-4ff60eeff002>",
"WARC-Date": "2014-03-13T22:45:01",
"WARC-IP-Address": "66.111.101.251",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:4C5NUENG5XMIWLZPYE6BXPO4ZYFI5KDY",
"WARC-Record-ID": "<urn:uuid:ed6740d3-142f-4613-b143-977e045490a3>",
"WARC-Target-URI": "http://southeastfarmpress.com/print/management/there-s-technique-hiring-keeping-good-farm-labor",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 473 | Employees enable farm operators to do much more than they ever could on their own.
The can also add skills and perspectives farm owners don’t possess.
The bottom line is that employees make you better.
Why then do so many producers think just the opposite? Why is it that some owners think of them more as a necessary evil instead of an asset and a partner in reaching goals? The answer lies in your attitude and the actions that result from your attitude.
Hiring employees is a great opportunity to add to your team. Consider it like draft day for a major league ball team. Everyone has high hopes for what the team can become with the new additions. But all too often, farmers dread hiring.
Part of the answer is to get a plan for hiring. Michigan State University ExtensionEducator Stan Moore’s article, “Get serious about hiring” discusses how to make that plan.
But before you execute a plan to add team members, you need to take a look deep within yourself and your operation. Is your farm a good place to work? Do you convey a positive attitude and outlook? Is the place physically attractive and clean and does the work environment convey respect for employees? Do you speak well of employees?
If the answer to any of these is “no” then you need to make some changes or you will simply hire a temporary employee who will move along to a better place soon. Always strive to be the “better place”.
The “better place” doesn’t need to be newer or nicer, but it does need to be clean and well organized. More than that, it is defined by how you, as the owner, interact with employees. You make it the better place, or a place to leave, by your attitude about employees. When you have first looked inside, you can begin to look outside.
Farming has many demands and limitations. Sometimes, farmers think they cannot compete with other industry for quality employees because of those demands. That is not necessarily true and it may be that some farmers use it as an excuse to account for their own poor performance in hiring.
Make the strength of your operation the way in which you work together as a team. There is nothing more compelling than feeling the pride of working together to accomplish important things. If that is the attitude you convey, you will find greater success in hiring and in keeping great employees. Managing well will lead to hiring well.
More from Southeast Farm Press
Flax making inroads in North Carolina
Here are some pigweed control options following Tennessee corn harvest
South Carolina counties get disaster relief
Control pesky pasture weeds with timely mowing, herbicides | http://southeastfarmpress.com/print/management/there-s-technique-hiring-keeping-good-farm-labor | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.029073 |
244 | {
"en": 0.8276686668395996
} | {
"Content-Length": "80648",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:OWBMAR464CRWYRTYL4PXEUOKQPFPKVQG",
"WARC-Concurrent-To": "<urn:uuid:76fe2960-89eb-47af-96a2-95e8ac9e01d0>",
"WARC-Date": "2014-03-13T22:58:58",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:I6ZGQ5IPUWX46TKLESWFDQ6HC7AFYIFA",
"WARC-Record-ID": "<urn:uuid:a8972cbe-76a5-49b0-b373-ffd2c279ec6d>",
"WARC-Target-URI": "http://stackoverflow.com/questions/10356026/how-do-i-combine-these-two-regular-expressions-into-one",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 726 | Take the 2-minute tour ×
I'm writing a rudimentary lexer using regular expressions in JavaScript and I have two regular expressions (one for single quoted strings and one for double quoted strings) which I wish to combine into one. These are my two regular expressions (I added the ^ and $ characters for testing purposes):
var singleQuotedString = /^'(?:[^'\\]|\\'|\\\\|\\\/|\\b|\\f|\\n|\\r|\\t|\\u[0-9A-F]{4})*'$/gi;
var doubleQuotedString = /^"(?:[^"\\]|\\"|\\\\|\\\/|\\b|\\f|\\n|\\r|\\t|\\u[0-9A-F]{4})*"$/gi;
Now I tried to combine them into a single regular expression as follows:
var string = /^(["'])(?:[^\1\\]|\\\1|\\\\|\\\/|\\b|\\f|\\n|\\r|\\t|\\u[0-9A-F]{4})*\1$/gi;
However when I test the input "Hello"World!" it returns true instead of false:
alert(string.test('"Hello"World!"')); //should return false as a double quoted string must escape double quote characters
I figured that the problem is in [^\1\\] which should match any character besides \1 (which is either a single or a double quote - the delimiter of the string) and \\ (which is the backslash character).
The regular expression correctly filters out backslashes and matches the delimiters, but it doesn't filter out the delimiter within the string. Any help will be greatly appreciated. Note that I referred to Crockford's railroad diagrams to write the regular expressions.
share|improve this question
add comment
3 Answers
up vote 4 down vote accepted
You can't refer to a matched group inside a character class: (['"])[^\1\\]. Try something like this instead:
(you'll need to add some more escapes, but you get my drift...)
A quick explanation:
(['"]) # match a single or double quote and store it in group 1
( # start group 2
(?!\1|\\). # if group 1 or a backslash isn't ahead, match any non-line break char
| # OR
\\[bnfrt] # match an escape sequence
| # OR
\\u[a-fA-F\d]{4} # match a Unicode escape
| # OR
\\\1 # match an escaped quote
)* # close group 2 and repeat it zero or more times
\1 # match whatever group 1 matched
share|improve this answer
I never knew you could do something like (?!\1|\\).. On MDN it says that 'x(?!y)' matches 'x' only if 'x' is not followed by 'y'. – Aadit M Shah Apr 27 '12 at 19:26
@Aadit M Shah - Its a poor analogy. You are always at a position between characters in regular expressions, like a cursor. Assertions stand still and (?!) and (?=) always refer to whats to the right of the current position. Its immaterial what is to the left of it other than if it didn't match, you would not be at this assertion. – sln Apr 27 '12 at 22:30
Makes sense. Perhaps the MDN page should be updated. – Aadit M Shah Apr 27 '12 at 22:46
@Aadit M Shah - No need to tell Microsoft the errors of its ways, its a company that consumes technology (with docs). Just google 'x' only if 'x' is not followed by 'y' – sln Apr 30 '12 at 0:49
@sin - MDN stands for Mozilla Developer Network. Not Microsoft Developer Network. That's MSDN. Mozilla is the pioneer in JavaScript technology. Which self respecting programmer would go to Microsoft for any purpose? – Aadit M Shah Apr 30 '12 at 4:38
show 1 more comment
This should work too (raw regex).
If speed is a factor, this is the 'unrolled' method, said to be the fastest for this kind of thing.
(['"]) # Capture a quote
(?!\\|\1). # As many non-escape and non-quote chars as possible
\\ # escape plus,
[\/bfnrt] # /,b,f,n,r,t or u[a-9A-f]{4} or captured quote
| u[0-9A-F]{4}
| \1
/1 # Captured quote
share|improve this answer
add comment
Well, you can always just create a larger regex by just using the alternation operator on the smaller regexes
Or explicitly:
var string = /(?:^'(?:[^'\\]|\\'|\\\\|\\\/|\\b|\\f|\\n|\\r|\\t|\\u[0-9A-F]{4})*'$)|(?:^"(?:[^"\\]|\\"|\\\\|\\\/|\\b|\\f|\\n|\\r|\\t|\\u[0-9A-F]{4})*"$)/gi;
Finally, if you want to avoid the code duplication, you can build up this regex dynamically, using the new Regex constructor.
var quoted_string = function(delimiter){
return ('^' + delimiter + '(?:[^' + delimiter + '\\]|\\' + delimiter + '|\\\\|\\\/|\\b|\\f|\\n|\\r|\\t|\\u[0-9A-F]{4})*' + delimiter + '$').replace(/\\/g, '\\\\');
//in the general case you could consider using a regex excaping function to avoid backslash hell.
var string = new RegExp( '(?:' + quoted_string("'") + ')|(?:' + quoted_string('"') + ')' , 'gi' );
share|improve this answer
I though of that; and then I thought that there must be a better way to do it. =) – Aadit M Shah Apr 27 '12 at 18:50
Would you happen to know why [^\1\\] doesn't work as expected? – Aadit M Shah Apr 27 '12 at 18:53
@AaditMShah: I just don't think you can use backreferences inside the classes like that. In any case I wrote down a version that does not duplicate the regex, but now you have to decide if you think it is more readable or not ;) – missingno Apr 27 '12 at 19:05
add comment
Your Answer
| http://stackoverflow.com/questions/10356026/how-do-i-combine-these-two-regular-expressions-into-one | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.799525 |
20 | {
"en": 0.8815048336982727
} | {
"Content-Length": "63001",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:4LJLFW5H2WVW4JT4DQT2RN7DMVCOHYYH",
"WARC-Concurrent-To": "<urn:uuid:fc8feb64-7ff8-4c74-ac9e-b74999649025>",
"WARC-Date": "2014-03-13T22:40:39",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:6IFAXQH3HR3JQUZEB3FPLYFA2WLE7M5C",
"WARC-Record-ID": "<urn:uuid:1a2f2352-0575-42be-8016-fe2b3e383bde>",
"WARC-Target-URI": "http://stackoverflow.com/questions/10563469/delete-files-if-the-user-uninstall-the-application-in-blackberry",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 209 | Take the 2-minute tour ×
I need to store some data in my Blackberry application so i'm using files,i'm storing these files in the internal memory of the device , but if i uninstalled the application i need these files to be removed too. Is there a way to store the files in the same path of the application package , or any other way to delete them if the application was uninstalled?
This is the path which i'm using:
try {
fileconn = (FileConnection) Connector.open("file:///store/home/user/data.txt");
share|improve this question
add comment
1 Answer
What kind of data are you storing? If you can store the data in the app's PersistentStore instead, it will automatically be deleted when the app is uninstalled.
share|improve this answer
I'm caching a lot of data, Xml files, so i need to keep them in the internal memory,i found some code about CodeModuleListener, but i did not figure out how to use it. – Reham May 14 '12 at 7:05
add comment
Your Answer
| http://stackoverflow.com/questions/10563469/delete-files-if-the-user-uninstall-the-application-in-blackberry | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.170904 |
98 | {
"en": 0.936838448047638
} | {
"Content-Length": "61242",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:GEZSIT7V47UA4MQJLTZ4GTJEBMLFGDVT",
"WARC-Concurrent-To": "<urn:uuid:a90abe20-64ff-41f0-8a39-aedb86fa9910>",
"WARC-Date": "2014-03-13T22:43:47",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:SZXSKRBVIKW5T4DBKJXF6GBVRXQEWO5O",
"WARC-Record-ID": "<urn:uuid:9cfbe278-c279-4163-83e0-659426de7037>",
"WARC-Target-URI": "http://stackoverflow.com/questions/1108238/differences-between-gnu-lgpl-v2-1-and-gnu-lgpl-v3",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 431 | Take the 2-minute tour ×
What are the differences between GNU LGPL v2.1 and GNU LGPL v3?
I know I can read the legal text and compare them, but it's a pain to understand these legal stuffs.
Can you give in a few bullet points the major changes in human language :) ?
EDIT: I know the differences between GNU GPL v2 and GNU GPL v3. I want to know the specific changes in GNU LGPL.
share|improve this question
add comment
closed as off topic by Robert Harvey May 7 '13 at 16:36
2 Answers
Having an interest in the subject too, I took a look at the two licences. (I should first point out that I am not a lawyer, but have done plenty of contract stuff in past lives.)
The key differentiator between LGPL v2.1 and LGPL v3 seems to be one of structure. In outline, LGPL v2.1 was somewhat of a stand-alone licence, whereas LGPL v3 opens with:
In OO terms, LGPL v3 inherits from the GPL v3, overriding certain bits to allow redistribution of the LGPL-covered software as part of a "Combined Work" without requiring the release of the source (for the rest of the combined work).
So, if your prospective users might be scared off by GPL v3, then maybe it makes sense to release under LGPL v2.1.
share|improve this answer
add comment
You could look at what Simon Phipps blogged when OpenOffice.org went to LGPL v3.
I guess this is a major point:
This is probably related to the Novell-Microsoft deal which caused "some disturbance in the force" in the open source community.
It also seems that the Free Software Foundation has made some clarifications regarding the definition of a program.
share|improve this answer
add comment
| http://stackoverflow.com/questions/1108238/differences-between-gnu-lgpl-v2-1-and-gnu-lgpl-v3 | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.446516 |
20 | {
"en": 0.7820044159889221
} | {
"Content-Length": "69976",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:PX6E7JUN63WMNN35XZCBMECAPBWVT33X",
"WARC-Concurrent-To": "<urn:uuid:d616dfae-06a8-4f1a-9082-d633ed0ef560>",
"WARC-Date": "2014-03-13T22:42:33",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:JLB2L2F7NFB42JTC7YGRIFCDQK7BVKKZ",
"WARC-Record-ID": "<urn:uuid:d3069a9d-516d-43e9-8f62-99fe29c89a86>",
"WARC-Target-URI": "http://stackoverflow.com/questions/11819700/how-do-i-search-throughout-all-of-my-javascript-in-chrome-developer-tools-on-a-m",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 211 | Take the 2-minute tour ×
On a windows machine, I can use Ctrl + Shift + F to find a phrase in the javascript rendered on a page using the "Sources" tab of Chrome developer tools.
However, if I use this keyboard combination on a Mac, the entire page becomes full screen. What is the analogous keyboard shortcut on a Mac to search javascript sources?
share|improve this question
Possible duplicate of How to search all loaded scripts in Chrome Developer Tools?. Answer: "Cmd + Option + F on mac". – Cupcake Jul 10 '13 at 17:27
add comment
2 Answers
Looks like Cmd+Alt / Opt+F works.
share|improve this answer
That's Cmd+(Opt+F) on mac – Shanimal Jul 20 '13 at 7:23
add comment
Have you tried Cmd+Shift+F? I don't have a Mac handy to test this on, but usually the Cmd key on a Mac replaces the Ctrl key in Windows hot keys.
share|improve this answer
Cmd + Shift + F is "Enter Presentation Mode" on a Mac – user456584 Jan 17 '13 at 1:23
add comment
Your Answer
| http://stackoverflow.com/questions/11819700/how-do-i-search-throughout-all-of-my-javascript-in-chrome-developer-tools-on-a-m | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.280611 |
24 | {
"en": 0.8778098225593567
} | {
"Content-Length": "63197",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:CH6WXK36H5MQG6CYOALI6YJCQH2MBFXT",
"WARC-Concurrent-To": "<urn:uuid:e129d6c7-13a5-44fe-849f-1e919c8f2365>",
"WARC-Date": "2014-03-13T22:21:15",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:POCFFSKEAUNAGBURULOACDHLYGSOOHY7",
"WARC-Record-ID": "<urn:uuid:4eef017c-c795-418f-a642-5899255032a8>",
"WARC-Target-URI": "http://stackoverflow.com/questions/13600249/how-to-set-laptimer-in-multiplayer-games-in-unity3d",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 188 | Take the 2-minute tour ×
As I'm new to the coding and unity3d I'm finding tough to set the lap timer for my racing game which is the multiplayer game.
share|improve this question
The unity tag is for Microsoft Unity. Please don't misuse it. – Lex Li Dec 31 '12 at 12:10
add comment
1 Answer
Well in terms of just code.
Will give you the time (duh)
So you'd do something like the following
function Awake() {
startTime = Time.time;
function OnGUI () {
var currentLap = Time.time - startTime;
currentLap is the current time since the script started. So you could run the code in the "Awake()" method when the race starts. Then on screen display what the current lap time is.
Found a nice example from the Unity Developer Network that might be exactly what your looking for here
share|improve this answer
add comment
Your Answer
| http://stackoverflow.com/questions/13600249/how-to-set-laptimer-in-multiplayer-games-in-unity3d | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.834401 |
25 | {
"en": 0.7889423370361328
} | {
"Content-Length": "62379",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:5FDRV2UESZAD53WBNKP2R6HVVTKOH2LT",
"WARC-Concurrent-To": "<urn:uuid:4e8e6e97-c740-4b46-a3ba-6d3c71799804>",
"WARC-Date": "2014-03-13T21:54:56",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:T2OH2S7X7PQOA3V6MO53I7LHWJ2SBOMX",
"WARC-Record-ID": "<urn:uuid:d0e3e8a7-9577-4405-a27d-868b452f6bf6>",
"WARC-Target-URI": "http://stackoverflow.com/questions/14187692/how-to-decode-html-entities-in-javascript-using-in-a-ruby-on-rails-project/14200365",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 281 | Take the 2-minute tour ×
I am dealing with Ruby on Rails and JavaScript.
The main basic idea is that I create an object in my model's class function and call this function in JavaScript. The problem there is that anywhere the HTML entities are encoded.
Now in detail:
In my model's function getData(firstOpt, secondOpt, amount) I create an object that looks as follows (when I call the function in the ruby console):
[#<JobCompact build_compact_id: 324>, #<JobCompact build_compact_id: 325>, #<JobCompact build_compact_id: 325>]
Now I put this into an array (because I want to have more entries in that array later) at the first position:
data[0] = firstLang
(note: I also tried -> data[0] = firstLang.to_json)
In the end I just return the array data. Now I call the function in JavaScript:
var curData = <%= BuildCompact.getData("ruby", "rubinius", 15) %>;
And the error is: Uncaught SyntaxError: Unexpected token ILLEGAL
because it translated my result of the ruby function to: var curData = [[#<JobCompact id: 841, language: "ruby", version: "1.609481891837258" etc.
I also tried to decode the result:
var curData = htmlentities((<%= BuildCompact.getData("ruby", "rubinius", 15) %>).toString());
And many other variants of that but I cannot figure it out. Has anybody had a similar problem?
NOTE: I hope that post is NOT a duplicate because I do not know where to encode (in Ruby oder Javascript).
share|improve this question
add comment
1 Answer
up vote 0 down vote accepted
Ok, the answer to MY question is:
var curData = <%=raw BuildCompact.getData("ruby", "rubinius", 500).to_json %>;
share|improve this answer
add comment
Your Answer
| http://stackoverflow.com/questions/14187692/how-to-decode-html-entities-in-javascript-using-in-a-ruby-on-rails-project/14200365 | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.61009 |
20 | {
"en": 0.9247843027114868
} | {
"Content-Length": "61320",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:GMC62SFS5INZKB5U45SNSVAE3P4MGJFA",
"WARC-Concurrent-To": "<urn:uuid:cd0c2a38-47fb-4ed2-8aad-c9db14718b73>",
"WARC-Date": "2014-03-13T21:40:51",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:U2RNVZOK6UXQQ7GVK5AXTCPQ5W4GAYNO",
"WARC-Record-ID": "<urn:uuid:47210cfb-5633-403d-b7e5-6fb984feaf5d>",
"WARC-Target-URI": "http://stackoverflow.com/questions/14420051/how-do-the-results-of-bin-compile-in-a-heroku-buildpack-relate-to-the-slug",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 198 | Take the 2-minute tour ×
Does anyone know for sure exactly how the bin/compile phase of a buildpack relates to the slug and deployment? Does the entire BUILD_DIR from the compile phase get tgz'd and unpacked at /app?
share|improve this question
add comment
1 Answer
up vote 1 down vote accepted
Yes, as specified in the buildpack documentation:
The application in BUILD_DIR along with all changes made by the compile script will be packaged into a slug.
share|improve this answer
Ah ok. That sentence is pretty vague; I figured if it were that simple they'd say that "the contents of BUILD_DIR after bin/compile finishes running will be deployed as /app (aka the slug)" it would've been more clear. Also I am not clear on if the only thing in /app is BUILD_DIR or if there is stuff there before the slug is dumped in there. – apinstein Jan 21 '13 at 1:29
add comment
Your Answer
| http://stackoverflow.com/questions/14420051/how-do-the-results-of-bin-compile-in-a-heroku-buildpack-relate-to-the-slug | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.474492 |
20 | {
"en": 0.9348435997962952
} | {
"Content-Length": "64056",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:FT3MSICND3KSVM3OU2NTWBZLRM274EOG",
"WARC-Concurrent-To": "<urn:uuid:2a4d3f5d-81eb-4c23-b84a-651763e685bc>",
"WARC-Date": "2014-03-13T21:50:24",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:JZSD4LRVEWAR3AGLXWYAMYJRSQ7OB5V3",
"WARC-Record-ID": "<urn:uuid:056a9a07-8ead-4ec1-9290-74bb065f3438>",
"WARC-Target-URI": "http://stackoverflow.com/questions/15473076/using-mip-starts-in-ilog-cplex-optimizer-java-api",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 379 | Take the 2-minute tour ×
I can't find a way to efficiently use MIP starts in CPLEX java API.
I have a linear problem that I need to solve many times by changing just one constraint or changing the objective so I thought that starting from a solution (with MIP starts) could be a good way to speed up the calculations.
So in order to do that, after the first time I solve the problem, I save all variables in an array of IloNumVar and double that I pass to my other cplex objects with cplex.addMIPStart.
The problem is it doesn't speed up anything it makes it slower and gives me this message :
Warning: No solution found from 1 MIP starts.
So maybe I shouldn't give the MIP start all the variables but how do I know what variables to give it ?
I also tried to change the MIP start effort but it does not seem to make any difference ...
Why doesn't it make calculations faster ? Is there a better way to solve many problems that have just a few differences ?
share|improve this question
You should note that you've cross-posted this to OR-exchange. – raoulcousins Mar 18 '13 at 20:04
add comment
1 Answer
This message usually means that you either haven't specified values for enough decision variables in your model, or the values you have given to cplex aren't feasible. You can check feasibility by using IloNumVar.setBounds on the variables then trying to solve the model. If that comes up infeasible, then you can write an iis file. CPLEX tries, but isn't able to make use of your mipstart, so it runs slower. A good MIP start can improve the solution time dramatically, especially if cplex has a hard time finding a first-feasible solution and your MIP start has an objective function value that is close to optimal, but for many instances, it doesn't make any difference. Warm starting MIPs is much harder than warm-starting LPs.
share|improve this answer
add comment
Your Answer
| http://stackoverflow.com/questions/15473076/using-mip-starts-in-ilog-cplex-optimizer-java-api | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.736861 |
20 | {
"en": 0.7601488828659058
} | {
"Content-Length": "68034",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:2QIML2KWF6HR2JB2Y4ENSY7BRT3XZSVK",
"WARC-Concurrent-To": "<urn:uuid:8c967976-c5ee-48d9-a50e-953b4d36592b>",
"WARC-Date": "2014-03-13T22:43:26",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:JZNJQFMJW45JJSRXOADGXLPW7F7GGHVA",
"WARC-Record-ID": "<urn:uuid:3195e663-7e24-44cc-9ea0-56d58a4bd330>",
"WARC-Target-URI": "http://stackoverflow.com/questions/357370/load-freemarker-templates-from-database",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 406 | Take the 2-minute tour ×
I would like to store my FreeMarker templates in a database table that looks something like:
template_name | template_content
hello |Hello ${user}
goodbye |So long ${user}
When a request is received for a template with a particular name, this should cause a query to be executed, which loads the relevant template content. This template content, together with the data model (the value of the 'user' variable in the examples above), should then be passed to FreeMarker.
However, the FreeMarker API seems to assume that each template name corresponds to a file of the same name within a particular directory of the filesystem. Is there any way I can easily have my templates loaded from the DB instead of the filesystem?
EDIT: I should have mentioned that I would like to be able to add templates to the database while the application is running, so I can't simply load all templates at startup into a new StringTemplateLoader (as suggested below).
Cheers, Don
share|improve this question
add comment
2 Answers
We use a StringTemplateLoader to load our tempates which we got from the db (as Dan Vinton suggested)
Here is an example:
StringTemplateLoader stringLoader = new StringTemplateLoader();
String firstTemplate = "firstTemplate";
stringLoader.putTemplate(firstTemplate, freemarkerTemplate);
// It's possible to add more than one template (they might include each other)
// String secondTemplate = "<#include \"greetTemplate\"><@greet/> World!";
// stringLoader.putTemplate("greetTemplate", secondTemplate);
Configuration cfg = new Configuration();
Template template = cfg.getTemplate(firstTemplate);
Edit You don't have to load all templates at startup. Whenever we will access the template, we'll fetch it from the DB and load it through the StringLoader and by calling template.process() we generate (in our case) the XML output.
share|improve this answer
add comment
A couple of ways:
• Create a new implementation of TemplateLoader to load templates direct from the database, and pass it to your Configuration instance using setTemplateLoader() prior to loading any templates.
• Use a StringTemplateLoader that you configure from your database when your application starts. Add it to the configuration as above.
Edit in light of the questioner's edit, your own implementation of TemplateLoader looks like the way to go. Check the Javadoc here, it's a simple little interface with only four methods, and its behaviour is well documented.
share|improve this answer
add comment
Your Answer
| http://stackoverflow.com/questions/357370/load-freemarker-templates-from-database | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.0861 |
49 | {
"en": 0.9386844635009766
} | {
"Content-Length": "113396",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:7OXZOLN74J5GHU226JNGV4LPJXM355TQ",
"WARC-Concurrent-To": "<urn:uuid:6795a817-0779-4e0d-bb9e-99f917a66a44>",
"WARC-Date": "2014-03-13T22:10:48",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:OFDFCVKYDFFDPPNDIDDNRUDXF2HZRYHU",
"WARC-Record-ID": "<urn:uuid:2022032e-6b15-4191-b8b2-5dc5184401a9>",
"WARC-Target-URI": "http://stackoverflow.com/questions/3616295/why-no-sanity-checks-in-legacy-strcpy",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 1,913 | Take the 2-minute tour ×
Following is the most popular implementation of strcpy in traditional systems. Why dest and src are not checked for NULL in the start? I heard once that in old days the memory was limited so short code was always preferred. Will you implement strcpy and other similar functions with NULL pointer checks at the start now days? Why not?
char *save = dest;
return save;
share|improve this question
It may be safer in general. But that also means experienced developers have to pay the cost of safety (that they do not need) just so that inexperienced developers do not snarf up. – Loki Astari Sep 1 '10 at 9:09
Experienced developers have to pay the cost of safety (that they do not think they need)... (FTFY). – Brian Hooper Sep 1 '10 at 10:21
@Brian Hooper - no, if you're using C, you should know exactly what you need. My embedded code never, ever needs NULL checks on strcpy because all buffers are statically allocated and used directly. There is absolutely no way I will ever pass NULL to strcpy. So why would I want to pay the price? There's no "do not think I need" about it. – detly Sep 1 '10 at 11:39
Not crashing on NULL pointers is not safety unless that's what's specified. Handling that case when it's not specified means passing off the problem to another function - which might have unexpected consequences. The only safe program is a terminated one. – jbcreix Sep 1 '10 at 12:53
Useless NULL checks in functions that do not assign special meaning to NULL arguments are a bane of bad C libraries. They lock you into added waste and encourage bad coders to toss NULL pointers around as if they were a universally-valid "empty string" or something. – R.. Sep 1 '10 at 13:10
show 2 more comments
9 Answers
NULL is a bad pointer, but so is (char*)0x1. Should it also check for that? In my opinion (I don't know the definitive reason why), sanity checks in such a low-level operation are uncalled for. strcpy() is so fundamental that it should be treated something like as asm instruction, and you should do your own sanity checks in the caller if needed. Just my 2 cents :)
share|improve this answer
I agree: low level routines should be implemented for efficiency and high level routines should add security when applicable. – Matthieu M. Sep 1 '10 at 11:51
+1 for pointing out that NULL is only one example of the 99.9% of pointer space that's likely also invalid. – R.. Sep 1 '10 at 13:12
What makes you say (char*)0x1 is necessarily a bad pointer? In C99, the null pointer is a special case in that it "is guaranteed to compare unequal to a pointer to any object or function." ( – JeremyP Sep 1 '10 at 14:36
i'm just illustrating a point, no need to be pedantic. On my machine, 0x1 is a bad pointer. Will you also criticize R for his inaccurate statistic of 99.9% as well? :P – tenfour Sep 1 '10 at 15:03
If your program's size in memory is 4 megs on a 32-bit machine, then 99.9% of possible pointers are invalid -- and that's assuming char pointers with no alignment restrictions. Change that to int and the threshold goes up by 4x. And of course if you're on a 64-bit machine, 99.999999% of pointer values will be invalid in the vast majority of programs. – R.. Feb 1 '11 at 1:55
add comment
There are no sanity checks because one of the most important underlying ideologies of C is that the developer supplies the sanity. When you assume that the developer is sane, you end up with a language that can be used to do just about anything, anywhere.
This is not an explicitly stated goal — it's quite possible for someone to come up with an implementation that does check for this, and more. Maybe they have. But I doubt that many people used to C would clamour to use it, since they'd need to put the checks in anyway if there was any chance that their code would be ported to a more usual implementation.
share|improve this answer
...the developer supplies the sanity. - I like that ;) – caf Sep 1 '10 at 9:11
add comment
The whole C language is written with the motto "We'll behave correctly provided the programmer knows what he's doing." The programmer is expected to know to make all the checks he needs to make. It's not just checking for NULL, it's ensuring that dest points to enough allocated memory to hold src, it's checking the return value of fopen to make sure the file really did open successfully, knowing when memcpy is safe and when memmove is required, and so on.
Getting strcpy to check for NULL won't change the language paradigm. You will still need to ensure that dest points to enough space -- and this is something that strcpy can't check for without changing the interface. You will also need to ensure that src is '\0'-terminated, which again strcpy can't possibly check.
There are some C standard library functions which do check for NULL: for example, free(NULL) is always safe. But in general, C expects you to know what you're doing.
[C++ generally eschews the <cstring> library in favour of std::string and friends.]
share|improve this answer
+1 for std::string – jk. Sep 1 '10 at 10:02
..which is so utterly incompatible, it seems to be designed to hurt. – peterchen Sep 1 '10 at 10:50
add comment
1. It's usually better for the library to let the caller decide what it wants the failure semantics to be. What would you have strcpy do if either argument is NULL? Silently do nothing? Fail an assert (which isn't an option in non-debug builds)?
2. It's easier to opt-in than it is to opt-out. It's trivial to write your own wrapper around strcpy that validates the inputs and to use that instead. If, however, the library did this itself, you would have no way of choosing not to perform those checks short of re-implementing strcpy. (For example, you might already know that the arguments you pass to strcpy aren't NULL, and it might be something you care about if you're calling it in a tight loop or are concerned about minimizing power usage.) In general, it's better to err on the side of granting more freedom (even if that freedom comes with additional responsibility).
share|improve this answer
+1 for custom wrapper that implements your error handling policy. (Though I probably wouldn't wrap strcpy individually. I use a StrOnBuf class that wraps the core character buffer manipulation routines, and can be configured to truncate silently, truncate with debug assert, or throw). – peterchen Sep 1 '10 at 10:52
+1 Point 1 is the answer to OP's question. – Alexandre C. Sep 1 '10 at 11:23
add comment
The most likely reason is: Because strcpy is not specified to work with NULL inputs (i.e. its behaviour in this case is undefined).
So, what should a library implementer choose to do if a NULL is passed in? I would argue that the best thing do to is to let the application crash. Think of it this way: A crash is a fairly obvious sign that something has gone wrong... silently ignoring a NULL input, on the other hand, may mask a bug that will be much harder to detect.
share|improve this answer
No. strcpy on NULL input is undefined behaviour, which may crash, or it may silently do the right thing. You certainly can't rely on a runtime error from using strcpy with NULL. – Philip Potter Sep 1 '10 at 8:51
It might do, but the reality is that it won't. – DeadMG Sep 1 '10 at 9:09
@Philip: Good point -- I've edited the answer to remove the erroneous statement that "the correct thing to do is to crash" (but I would still argue that it's the best thing to do). – Martin B Sep 1 '10 at 9:18
add comment
NULL checks were not implemented because C's earliest targets supported strong memory protections. When a process attempted to read from or write to NULL, the memory controller would signal the CPU that an out-of-range memory access was attempted (segmentation violation), and the kernel would kill the offending process.
This was an alright answer, because code attempting to read from or write to a NULL pointer is broken; the only answer is to re-write the code to check return values from malloc(3) and friends and take corrective action. By the time you're trying to use pointers to unallocated memory, it is too late to make a correct decision about how to fix the situation.
share|improve this answer
add comment
You should think of the C standard library functions as the thinnest possible additional layer of abstraction above the assembly code that you don't want to churn out to get your stuff over the door. Everything beyond that, like error checking, is your responsibility.
share|improve this answer
add comment
According to me any function you would want to define would have a pre-condition and a post-condition. Taking care of the preconditions should never be part of a function. Following is a precondition to use strcpy taken from the man page.
The strcpy() function copies the string pointed to by src (including the terminating '\0' character) to the array pointed to by dest. The strings may not overlap, and the destination string dest must be large enough to receive the copy.
Now if the precondition is not met then things might be undefined.
Whether I would include a NULL check in my strcpy now. I would rather have another safe_strcpy, giving safety the priority I would definitely include NULL checks and handle overflow conditions. And accordingly my precondition gets modified.
share|improve this answer
add comment
There is simply no error semantic defined for it. In particular there is no way for strcpy to return an error value. C99 simply states:
The strcpy function returns the value of s1.
So for a conforming implementation there wouldn't even a possibility to return the information that something went wrong. So why bother with it.
All this is voluntary, I think, since strcpy is replaced by most compilers by very efficient assembler directly. Error checks are up to the caller.
share|improve this answer
Since behavior is undefined if NULL is passed, strcpy could conceivably return something other than s1 when s1 is NULL. Or it could fail to return at all (crash or infinite loop). – R.. Sep 1 '10 at 12:56
What if you are the first one and were asked to design strcpy from scratch and also write the C99 standards youself. Would you change it to return some error value? – user436748 Sep 1 '10 at 14:39
@user436748: unfortunately this is purely hypothetical, three options. For a design as "high level" I would just require it to return NULL if on error, to set errno with an indication and also that the original data is unchanged in such a case. this is done in several other places, but not here for strcpy. If I would design it as "low level" I'd go for "just do the right thing" but I would in addition require it to produce a segfault in case that one of the pointers is NULL. Then, you asked, for real C99 you could go for char* strcpy(char s1[static 1], char const s2[static 1]); – Jens Gustedt Sep 1 '10 at 15:04
add comment
Your Answer
| http://stackoverflow.com/questions/3616295/why-no-sanity-checks-in-legacy-strcpy | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.467048 |
21 | {
"en": 0.909986972808838
} | {
"Content-Length": "73967",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:O2GE5RZPP4B7QYZJEIVUY62LPNY26RJE",
"WARC-Concurrent-To": "<urn:uuid:d44d8739-b8af-4c74-8f05-de7487f2e2ae>",
"WARC-Date": "2014-03-13T22:57:50",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:5H7JGE2JVXE2TUUQKQRJEM3LFYDSUUZA",
"WARC-Record-ID": "<urn:uuid:03cf1167-5fb6-4e6f-9725-bf14f2a3a970>",
"WARC-Target-URI": "http://stackoverflow.com/questions/4074176/included-openssl-as-a-static-library-but-its-still-looking-for-a-dll",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 510 | Take the 2-minute tour ×
I installed OpenSSL 1.0.0 on Windows using the installer available at: http://www.slproweb.com/products/Win32OpenSSL.html
I added the .lib files to my project (this is Visual Studio, added it to Project Settings->Linker->Input), and it compiles and works fine. But when I remove the OpenSSL DLL files in Windows\system32, it complains that
"Debugger:: An unhandled non-continuable STATUS_DLL_NOT_FOUND exception was thrown during process load"
Any idea why it's still looking for the DLL even when it's compiled with the static libs? I'm not referencing the DLLs anywhere in the project. The static libs I included are libeay32.lib and ssleay32.lib.
Thanks, -M
share|improve this question
There are also static .lib files in that distribution and they're > 10 MB in size (don't know why so much). I haven't tried that yet, but it seems to be what you need. – Roman Plášil Nov 3 '11 at 15:37
add comment
3 Answers
up vote 0 down vote accepted
It's looking for the DLLs because the code is loaded dynamically at runtime. The code in the static libraries is just a set of stub functions which call into the DLL -- compare the sizes of the .lib and .dll files, and I bet you'll see that the DLLs are much larger, since that's where the bulk of the actual encryption code lies.
Hence, as you found out, you should not delete the DLLs. In order to distribute your program properly, you'll also need to distribute those DLLs with it in order for it to work correctly. However, keep in mind that there are legal issues with doing this, since there are US export restrictions on certain encryption code. So be extra careful in redistributing those DLLs -- make extra sure what you're doing is legal.
share|improve this answer
Thanks Adam. Is there a way to do away with the need for the DLLs entirely? I'd prefer to just compile with static libs and not have to distribute the DLLs along with the app... Btw it looks like the lib file is 754KB and the DLL is 1.09MB -- it's larger but not very much larger. Still just a stub, do you think? – mindthief Nov 2 '10 at 1:51
You can do that, but you'll have to compile openssl as a static library – taxilian Jul 14 '11 at 23:40
add comment
use libeay32MT.lib file that have almost 19 mb size as your library. because it is a static library but libeay32.lib is a library for using the dll.
share|improve this answer
add comment
You can get static libraries here:
(see http://www.ie7pro.com/openssl.html).
These are built with static runtime libraries so if you are using VC++ you may need to go to:
Configuration Properties--> C/C++--> Code Generation--> Runtime Library
and select /MT instead of /MD to avoid linkage conflicts (or alternatively use the /NODEFAULTLIB:LIBCMT, etc. in Linker--> Command Line--> Additional Options).
share|improve this answer
add comment
Your Answer
| http://stackoverflow.com/questions/4074176/included-openssl-as-a-static-library-but-its-still-looking-for-a-dll | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.147212 |
20 | {
"en": 0.8707922697067261
} | {
"Content-Length": "61894",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:OQQ7DWXORFABLL5OJPVVVTRCGTDSZARQ",
"WARC-Concurrent-To": "<urn:uuid:9095bcc6-8b56-44a0-9a57-5c8470355e32>",
"WARC-Date": "2014-03-13T22:52:59",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:ASDAQ25H2WRDQBZWMQOHUJIB62GNXFPO",
"WARC-Record-ID": "<urn:uuid:c57451f3-7ad3-41c1-835f-4415637051d6>",
"WARC-Target-URI": "http://stackoverflow.com/questions/5100437/how-do-i-switch-from-portupgrade-to-portmaster/5100729",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 132 | Take the 2-minute tour ×
I've given a FreeBSD to run a webserver and I always use Portmaster, but it's been installed with Portupgrade.
Is there any problem if I simply start using Portmaster?
share|improve this question
Belongs on unix.stackexchange.com. – Yasir Arsanukaev Feb 24 '11 at 5:28
add comment
1 Answer
up vote 3 down vote accepted
Portupgrade and portmaster are interchangeable. You can safely use them together on one box, since they are separated from ports database.
share|improve this answer
add comment
Your Answer
| http://stackoverflow.com/questions/5100437/how-do-i-switch-from-portupgrade-to-portmaster/5100729 | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.978401 |
27 | {
"en": 0.8920857906341553
} | {
"Content-Length": "67007",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:LG44272QH6WTRBFS4MIW6VZ6DCBLKSWQ",
"WARC-Concurrent-To": "<urn:uuid:5621785a-1f6a-4f28-b4ed-b778b2ed94c9>",
"WARC-Date": "2014-03-13T22:14:03",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:LMP2XFX4DEVWYBFXXFYUU4TMTU2O2IV2",
"WARC-Record-ID": "<urn:uuid:0deb1d86-a3ec-4059-9421-b4e098b2aa3c>",
"WARC-Target-URI": "http://stackoverflow.com/questions/6260409/facebook-fb-ui-oauth-popup-on-canvas-page",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 317 | Take the 2-minute tour ×
I am trying to use the FB.ui oauth popup on a Facebook Canvas Page. I am using the latest Javascript SDK.
On a Page Tab, it works great to just do: FB.ui({method: 'oauth'}, callback); That gives me the allow access popup and then calls my callback with the response perfectly. No redirect is necessary.
However when I try the exact same thing on a Canvas, I get a FB dialog that says "An error occurred. Please try again later". Has anyone gotten it to work, or know of any workarounds?
I did have success with the top.location.href = "http://www.facebook.com/dialog/oauth?client_id=xxx&redirect_uri=xxx approach, but I would prefer to not have to redirect if possible.
share|improve this question
add comment
2 Answers
up vote 5 down vote accepted
It turns out that FB.login(callback) works fine on a canvas page, and it avoids the redirect as well.
So the answer for me was to just change the FB.ui to instead do FB.login. The response sent to the callback is slightly different from FB.ui, but very close.
FB.login(function(response) {
if(response && response.session) {
//do stuff with session
share|improve this answer
Thanks, I had the same problem (and before I used FB.ui I had my own custom popup setup, which was ugly) – Bart van Heukelom Sep 12 '11 at 20:43
add comment
What does "it does not work" mean? The popup might be blocked if it's not called in reaction to a user event (like a a mouse click).
share|improve this answer
I updated the question to explain that better. I get a FB dialog that says "An error occurred. Please try again later." – Melinda Weathers Jun 7 '11 at 14:16
add comment
Your Answer
| http://stackoverflow.com/questions/6260409/facebook-fb-ui-oauth-popup-on-canvas-page | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.054739 |
20 | {
"en": 0.8791237473487854
} | {
"Content-Length": "88846",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:6BKISOJ3I4GKB6KZYGLRBZ74B3PIK4PP",
"WARC-Concurrent-To": "<urn:uuid:9fa648e0-03a9-4073-859c-eee9fe448ac6>",
"WARC-Date": "2014-03-13T22:16:53",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:GZJT3SQZLWZLFT6WUT6LQQ63C7B2WCY5",
"WARC-Record-ID": "<urn:uuid:abe1b525-1c59-46f9-82c3-3e00c88b54dc>",
"WARC-Target-URI": "http://stackoverflow.com/questions/994773/can-dom-parsers-read-inside-html-comments-or-is-regex-the-only-way/994802",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 841 | Take the 2-minute tour ×
I am creating very simple CMS for my organisation.
My strategy is to embed editable content between tags called < editable >. However to hide these from the browser I am commenting them out. So an example of an editable region will look like this.
<!-- <editable name="news_item> Today's news is ... </editable> -->
With the content "Today's news is ... " being picked up by the CMS and made editable in the online HTML editor.
I would like to be able to "grab" the name attribute's value as well as the content contained within the tags.
Is there a simple way to do this with XPath, XQuey type things, or is regex the best way to go ( ]esp. given that the regex will not need too much fault tolerance, since I know exactly what the xml will be, because I will be writing the code that generates it).
share|improve this question
why are you putting news content into a webpage and then commenting it out to hide it from the webpage? Have you considered storing this editable content in a database? I suppose I don't fully understand the concept though – Carson Myers Jun 15 '09 at 7:00
Please correct me if I am missing something very obvious but why can't you keep your editable content as 'hidden' if you want to hide it from browsers instead of adding them as comments? – Aamir Jun 15 '09 at 7:02
no reason why you can't, just I've written a number of CMS...es, and I was just having a hard time understanding the way you are storing the data. In any case, there are already a number of good answers. – Carson Myers Jun 15 '09 at 7:05
We want to display the content such as News Items ... or Main Page text .... but we want this to be editable. So you can think of the <editable> tags as placeholders, which tell our app, what content is editable. The point of this is that we do not need a DB, and can simply display flat HTML files. Our needs are very simple and this is a quick and dirty solution. – Ankur Jun 15 '09 at 7:16
add comment
6 Answers
up vote 3 down vote accepted
By DOM Parser, do you mean javascript? If so, this blog post suggests that you can indeed slice and dice HTML comments. And, because mentioning javascript without mentioning jQuery is a sin, here's a jQuery plugin that will find all the HTML comments for you.
share|improve this answer
I like the idea of using jQuery – Ankur Jun 15 '09 at 7:17
The blog talks about exactly what I want to do. Good to know I am not the only one. – Ankur Jun 15 '09 at 7:19
add comment
Most parsers are able to get comments without a problem. They will not probably parse them into a DOM structure, but you could do that with them manually once you get the actual comments.
This is an example using BeautifulSoup with Python:
>>> from BeautifulSoup import BeautifulSoup, Comment
>>> html_document = """
... <html>
... <head>
... </head>
... <body>
... <h1>My Html Document</h1>
... <!-- This is a normal comment. -->
... <p>This is some more text.</p>
... <!-- <editable name="news_item">Today's news is Paolo Rocks!</editable> -->
... <p>Yet More Content</p>
... </body>
... </html>
... """
>>> soup = BeautifulSoup(html_document)
>>> comments = soup.findAll(text=lambda text:isinstance(text,Comment))
>>> comments
[u' This is a normal comment. ', u' <editable name="news_item">Today\'s news is
Paolo Rocks!</editable> ']
>>> for comment in comments:
... editable = BeautifulSoup(comment).find('editable')
... if editable is not None:
... print editable['name'], editable.contents
news_item [u"Today's news is Paolo Rocks!"]
share|improve this answer
add comment
The whole point of a comment is that the DOM will not parse the content. So the whole comment is just text.
I'd be inclind to use RegEx in this case.
However if you certain the content is HTML you would create a DOM element (say a DIV) and assign the comment text to the innerHTML. The you could examine the DOM created from the element. Once you aquired what you need you could drop the DIV element which you would never have added to the current document.
share|improve this answer
You could also use display:none on the div so it doesn't take up space or display its content, and then just leave it there with the data inside. That should work unless you run into browser compatibility issues. – teh_noob Jun 15 '09 at 7:06
add comment
I'm pretty sure that you'd need to manually parse it via regex or another method. Comments aren't seen as DOM elements as far as I'm aware.
share|improve this answer
Comments are DOM elements. Is just that their contents aren't parsed as XML. – Ionuț G. Stan Jun 15 '09 at 7:02
add comment
You can use a DIV with a costum attribute like Dojo does a lot:
<div ParseByCMS="true">foobar foo bar foobaz</div>
After that you just use javascript or xslt to parse it and remove it.
share|improve this answer
add comment
If you're using PHP.
$xpath = new DOMXpath(new DOMDocument());
// Search for comments
$comments = $xpath->query('//comment()');
share|improve this answer
add comment
Your Answer
| http://stackoverflow.com/questions/994773/can-dom-parsers-read-inside-html-comments-or-is-regex-the-only-way/994802 | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.030845 |
0 | {
"en": 0.8538309931755066
} | {
"Content-Length": "12967",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:3GMPKHUYEVA6T7MYR35N5TRGRVGOL5ZK",
"WARC-Concurrent-To": "<urn:uuid:8e9440be-0f92-4675-920e-a21615c8eae3>",
"WARC-Date": "2014-03-13T22:50:06",
"WARC-IP-Address": "23.62.6.216",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:A23GGWTA3JNUJXFL27UJEDUUL2SFKJWF",
"WARC-Record-ID": "<urn:uuid:ff28a0f8-cdd4-45bd-8cf5-acade2366bd4>",
"WARC-Target-URI": "http://sto-forum.perfectworld.com/showpost.php?p=3969336&postcount=1",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 94 | View Single Post
Lt. Commander
Join Date: Dec 2007
Posts: 120
# 1 F2P vs PvP vs Klingons
01-25-2012, 10:13 AM
I created a new toon to swim with the f2p flow but why we have pvp Fed vs Kling under lvl 20? Klingons start with lvl 20 so all new F2P Players(fed) joining the vs kling pvp and never gets a match until they reach 20.
Maybe Cryptic disable the fed vs kling under 20 that the f2p player dont waste time in the query for it and just joining the fed vs fed. | http://sto-forum.perfectworld.com/showpost.php?p=3969336&postcount=1 | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.096442 |
16 | {
"en": 0.9525026679039
} | {
"Content-Length": "58810",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:EDKK6E33X4FWFZXRAIYUH73D572NF7S7",
"WARC-Concurrent-To": "<urn:uuid:95ed01eb-5623-4a3d-9e28-7926eb3a376c>",
"WARC-Date": "2014-03-13T22:33:47",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:B6K5YY3FKRLR4BZGWXMWPIKJAJXRLFBW",
"WARC-Record-ID": "<urn:uuid:cb37734a-5e2b-494b-8007-53b439fe47a6>",
"WARC-Target-URI": "http://superuser.com/questions/141327/mysterious-os-x-filevault-related-home-directory",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 239 | Take the 2-minute tour ×
I recently enabled FileVault on Snow Leopard, and after doing so, found a directory /Users/<myusername>.4529809818604982560, containing the original (unencrypted) contents of my home directory, owned by root:wheel with permissions 700, side-by-side with my normal home directory. Does anyone know why this was created (maybe a temporary backup that didn't get erased), or whether deleting it will be harmful?
share|improve this question
add comment
1 Answer
What I always do in this case (i.e. file you think should have been deleted, but aren't sure if it's still used) is rename the file or move it someplace else temporarily. Shut down, reboot, and try to get into your account. If everything appears intact, you can mount your correct Filevault home, etc., and after a couple days haven't noticed any ill effects, then delete the old file. But of course, if things are all screwed up, just move the file back to where it was before and return to head scratching.
(PS. Before trying this, make sure there is a second account on the machine, with admin privileges, so that if you are hosed you can use that account to log back in and move the file back where it belongs.)
share|improve this answer
add comment
Your Answer
| http://superuser.com/questions/141327/mysterious-os-x-filevault-related-home-directory | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.307402 |
21 | {
"en": 0.8569919466972351
} | {
"Content-Length": "65819",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:VUFWOIIXFBURQRG2VBC64H5HCK5YIVIU",
"WARC-Concurrent-To": "<urn:uuid:cffad8ed-9808-4646-8a41-2ff57be12fb1>",
"WARC-Date": "2014-03-13T22:33:44",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:NNZBTEFMENXMBFQTMIHCEFUCBY6J53AJ",
"WARC-Record-ID": "<urn:uuid:579eb32d-ca95-4b43-92f9-4362756d440c>",
"WARC-Target-URI": "http://superuser.com/questions/199789/disable-firefox-persona-instant-preview",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 192 | Take the 2-minute tour ×
I find it highly annoying having the entire browser flicker and act up when moving the mouse over a persona. How can i disable the instant preview for firefox personas?
share|improve this question
add comment
2 Answers
up vote 1 down vote accepted
You don't need to do that.
Install the Personas Plus extension from http://www.getpersonas.com/en-US. After you install and restart Firefox, go to addons (tools > addons), click preferences for the Personas Plus addon, and uncheck "show preview when selecting from menu".
share|improve this answer
add comment
It is a piece of Javascript running that is annoying you so the easiest way to disable it is to install the NoScript add-on. Once installed you can easily set it up to block the page in question from running the javascript that is annoying you.
share|improve this answer
add comment
Your Answer
| http://superuser.com/questions/199789/disable-firefox-persona-instant-preview | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.192652 |
115 | {
"en": 0.942825734615326
} | {
"Content-Length": "83212",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:AKDJJJRPV5VN5WXYF2FIPS2LWERW7TPN",
"WARC-Concurrent-To": "<urn:uuid:546fe179-4318-4039-9e9d-af7e4eae2ecc>",
"WARC-Date": "2014-03-13T21:37:16",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:TN7LB32KJZECZVKH254XSLILMNKFFFWF",
"WARC-Record-ID": "<urn:uuid:65ca1662-76eb-4e4b-a000-73042d24e673>",
"WARC-Target-URI": "http://superuser.com/questions/32932/is-there-a-way-to-find-out-what-application-using-most-of-bandwidth-in-linux",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 598 | Take the 2-minute tour ×
I'm looking for an utility that could show me how much of a bandwidth each process are using. It should just print the data and exit as I want to feed that list into conky.
share|improve this question
add comment
4 Answers
You can try NetHogs.
share|improve this answer
Almost exactly what I need but it just doesn't work :( – vava Aug 31 '09 at 17:24
Well, what doesn't work? Any errors? Doesn't it start at all? Console output? – Milde Sep 1 '09 at 7:14
Thank you very much. – Saeed Zarinfam Sep 24 '12 at 11:27
add comment
There is quite a few listed here.
My favorites however remain iftop and tcpdump. Wireshark is also a very good option.
share|improve this answer
I have ethical issues with Wireshark, if not alone on the network... Unless you have a way to make it probe only the localhost, in which case I'm interested. – Gnoupi Aug 31 '09 at 14:18
If you don't enable promiscuous mode it should only capture traffic directed to your host. – Amuck Aug 31 '09 at 15:57
Huh, not one of those utilities can tell me which process are using most bandwidth and that's what I'm after. – vava Aug 31 '09 at 17:25
add comment
Check out the answer here: link
share|improve this answer
Actually it does, assuming you have a few programs in mind you'd like to check. You can manually monitor each one based on the port it uses. – th3dude Aug 31 '09 at 17:54
Yeah, would be really fun checking Azureus that way :) – vava Sep 1 '09 at 2:27
add comment
Try atop ... to get the most out of it you may have to enable some additional kernel patches (I/O accounting patches).
If atop isn't an option then use netstat -anp --inet (as root) to provide a listing of which TCP/UDP ports are in use by which processes (or possibly use lsof for that). From there simply iterate over each process that's got an open socket and either attach to it using ltrace -S or strace to look at the reads, writes, sends and receives, or use tcpdump with a filter specifying your local IP address(es) and the TCP/UDP ports that were listed.
atop is certainly the most convenient of these ... if you have it and the necessary kernel support installed. In the past I've had customers and employers set up special systems (different from their production images) for the sole purpose of supporting I/O profiling using atop. However these other techniques will get you there.
I'm sure we could also do something using SystemTap ... but I don't know of any easy pre-cooked recipes for doing this. SystemTap is very much a programming analysis tool.
share|improve this answer
add comment
Your Answer
| http://superuser.com/questions/32932/is-there-a-way-to-find-out-what-application-using-most-of-bandwidth-in-linux | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.031099 |
21 | {
"en": 0.8470361232757568
} | {
"Content-Length": "60120",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:OT5WF2TCKVAZTYT7DJBAUKVXYUJB3DXO",
"WARC-Concurrent-To": "<urn:uuid:2a8944ea-ed78-4c89-b64a-3db28b19217c>",
"WARC-Date": "2014-03-13T22:33:41",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:4QTDRACTPB5O2ZMNZ5NFRKICX7QSMDSU",
"WARC-Record-ID": "<urn:uuid:dd102e18-a321-4650-85d6-bc4265a54d69>",
"WARC-Target-URI": "http://superuser.com/questions/489705/debain-wheezy-gnome-3-remove-users-from-login-menu",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 101 | Take the 2-minute tour ×
I have upgraded to wheezy from squeeze and several users such as qmail are visible on the login menu. How do I remove them?
share|improve this question
add comment
1 Answer
In /etc/gdm3/greeter.gsettings uncomment the line "disable-user-list=true". Restart.
# - Disable user list
share|improve this answer
add comment
Your Answer
| http://superuser.com/questions/489705/debain-wheezy-gnome-3-remove-users-from-login-menu | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.926346 |
33 | {
"en": 0.9009665846824646
} | {
"Content-Length": "69501",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:TLV7OKRF54UHI3ETX24H67YFWGT47XWS",
"WARC-Concurrent-To": "<urn:uuid:b4ac0904-a3c1-4f38-b2e3-953a1945c39d>",
"WARC-Date": "2014-03-13T22:17:04",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:IDXSPIQQCF6CRDEZBLYEJRKFCA45QQ2E",
"WARC-Record-ID": "<urn:uuid:b2b69349-d098-4c19-bcf0-ca8eb4b317ae>",
"WARC-Target-URI": "http://tex.stackexchange.com/questions/23109/hyphenating-hyphens-how-to-change-the-default-discretionary",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 605 | Take the 2-minute tour ×
My language, Portuguese, have undergone another orthography reform (those committees simply can't avoid themselves from doing this mess from time to time.) Now we have to adapt, which brings us to my problem.
By the new rule, when a line break occurs at one word's literal hyphen, it should be doubled, appearing at the end of the first line and at the beginning of the second one.
A phrase like “Terão que adaptar-se ou perecer!”, broken at the hyphen, should look like this:
Terão que adaptar-
-se ou perecer!
In TeX terms, each literal hyphen should be replaced by
or followed by
But TeX's (apparently) hard coded discretionary for literal hyphen is \discretionary{}{}{} (called “empty discretionary”), inserted after every “-” [The TeXBook, p. 95].
The obvious solution
is hardly usable because you cannot redefine a character like “-”, heavy used by TeX assignments, without getting too much trouble.
Is there a right way to get this effect? Or only by diving into TeX's source code or waiting for LuaTeX?
share|improve this question
The standard babel way to proceed would be to activate " and define a shortcut "-. The activation of - can be done, either, but one has to remember to say \string- when the hyphen is needed in the context of a numeric assignment. – egreg Jul 15 '11 at 7:54
@Caio: Interesting, I was unaware of that specific rule, thanks for bringing this up. Sadly, we have to adapt (I think the transition period ends this year), but I'll resist until the very last minute. =) – Paulo Cereda Jul 16 '11 at 20:32
add comment
2 Answers
up vote 8 down vote accepted
One approach without requiring LuaTeX would be to take a similar tack to the way hyphenation is/used to be handled in German. Something like
Some filler text.
Some filler text.
Some filler text.
Some filler text.
Some"-hyphenated word.
Of course, this requires the use of one additional character, which may not be desirable. On the other hand, I don't think that there is a hook in the TeX engine to alter things, so the only 'no input change' way to alter things is I guess to use LuaTeX.
share|improve this answer
Hyphenated words are badly common in Portuguese, using this method would make the manuscript too messy. Thanks for the advice, I'll research LuaTeX for an answer and give a feedback to this forum. – Caio Lopes Jul 16 '11 at 3:32
add comment
The alternative I commonly use is the redefinition of the underscore to provide this doubled-when-broken hyphen:
This keeps the meaning of _ in mathematical mode, which is essential!! Also, take care not to use _ in your labels, as they will not work. I usually write \label{my-section} anyway, so this is not a problem for me.
Now, you just need to write Terão que adaptar_se ou perecer!, which I think is still very readable and has the advantage of using a single character as well.
I usually place code similar to that in a separate .sty file which I import whenever I need it. This package helps me write small portions of Portuguese text inside documents with English as main language, which changes hyphenation rules (provided babel is loaded with Portuguese language) and also emits a \frenchspacing that disables the "double space" at the end of sentences that is traditional in English typography but not in Portuguese.
share|improve this answer
add comment
Your Answer
| http://tex.stackexchange.com/questions/23109/hyphenating-hyphens-how-to-change-the-default-discretionary | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.051049 |
31 | {
"en": 0.8374587893486023
} | {
"Content-Length": "73840",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:SZHNKMW3D33KXX4GIOELM3CMOYWRMVMY",
"WARC-Concurrent-To": "<urn:uuid:05242b9f-74e7-440c-92bf-6803cab05c45>",
"WARC-Date": "2014-03-13T22:13:34",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:BLN3EYWQANTZD5XKARWOQPGB3UBLJFVT",
"WARC-Record-ID": "<urn:uuid:af182dc1-4b72-4a62-ab91-c30f24d95965>",
"WARC-Target-URI": "http://tex.stackexchange.com/questions/46223/if-document-class-is-equal-to-something-then-do-not-use-package",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 392 | Take the 2-minute tour ×
I am trying to create a file which includes common packages and macros I use. It is something like this.
... other packages and macros
But some packages clash with each other in combinations. For example when I try to use
It gives error since IEEEtran already created command appendix.
I would like to get some solution to this problem something like below.
if document class is not IEEEtran
end if
share|improve this question
add comment
2 Answers
up vote 5 down vote accepted
A way is
But I believe that documents written for submission should not have any reference to conflicting packages (and so tricks like this one). How would you use the commands provided by appendix if the document class is IEEEtran?
share|improve this answer
I do not plan to use appendix commands in this conference submission , but I use that commands in my thesis. – Atilla Ozgur Feb 29 '12 at 10:51
add comment
I was advised once to test on functionality rather than on class name. The problem is that both appendix.sty and IEEEtran.cls defines \appendices. So only load the appendix package if there isn't already a command \appendices defined. Here is a working example:
\title{Test of conditional use of the appendix package}
\usepackage{lipsum} % just for dummy text
\ifcsname appendices\endcsname
% do nothing
\ifcsame is available on all e-TeX builds and is documented (along with other ways to check if a command is defined) here.
share|improve this answer
This will do nothing for all classes that define \appendix, including article, report, book, memoir. – egreg Feb 29 '12 at 22:23
@Matthew: Please something is wrong with your use of \ifcsname! – Ahmed Musa Mar 1 '12 at 2:22
@egreg: I thought that's what the OP wanted. He said the problem was the existence of the command \appendix. After creating a MWE I see that's not the problem: it's the existence of the command \appendices. I've updated my answer so that appendix.sty is loaded in article.cls, etc. – Matthew Leingang Mar 10 '12 at 12:32
@AhmedMusa: Yes, I was missing \endcsname. Thanks for noticing. – Matthew Leingang Mar 10 '12 at 12:32
add comment
Your Answer
| http://tex.stackexchange.com/questions/46223/if-document-class-is-equal-to-something-then-do-not-use-package | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.01906 |
27 | {
"en": 0.9512887001037598
} | {
"Content-Length": "67331",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:J3SAHUYZFK735QFRIUI7ZJSBA5LIZW53",
"WARC-Concurrent-To": "<urn:uuid:37be11bc-eb5e-44c2-953d-91f40b8d9147>",
"WARC-Date": "2014-03-13T21:49:12",
"WARC-IP-Address": "74.84.198.240",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:MESJTFTQWLBU5BJBFFVC6GQWVGF7TX7S",
"WARC-Record-ID": "<urn:uuid:9ba85001-c090-4c4b-951c-f9fddedb5fe2>",
"WARC-Target-URI": "http://townhall.com/columnists/jacobsullum/2008/06/04/fake_teams,_real_money",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 484 | Jacob Sullum
Recommend this article
In the 2007 romantic comedy "Knocked Up" a woman who suspects her husband of having an extramarital affair discovers he is actually sneaking off to play fantasy baseball. In real life, people who participate in fantasy sports generally do not feel a need to hide what they're doing, and neither do the companies that offer them the opportunity.
Fantasy sports is a burgeoning industry in the United States, one that's likely to grow even faster now that the U.S. Supreme Court has let stand an appellate ruling that makes the business easier and cheaper to run. But the legitimacy of fantasy sports highlights the arbitrariness of U.S. gambling law, which for no good reason prohibits forms of betting that many millions of Americans enjoy.
Participants in fantasy sports choose real players for pretend teams that compete against each other based on the players' real-world performance. The online industry that facilitates these contests, which emerged a decade ago, today consists of more than 100 companies, including major players such as ESPN and Yahoo! Sports, and generates about $500 million in revenue each year, mainly from participant fees and advertising, according to the Fantasy Sports Trade Association (FSTA).
The FSTA expects the industry's growth to accelerate as a result of the Supreme Court's recent refusal to hear Major League Baseball's appeal of a 2007 decision by the U.S. Court of Appeals for the 8th Circuit. Last fall, in response to a lawsuit by CBC Marketing and Distribution, which operates CDM Fantasy Sports, the 8th Circuit ruled that companies like CBC need not pay license fees to professional sports leagues because they have a First Amendment right to use players' names and statistics.
Freed from the burden of getting league permission and paying millions of dollars in license fees, fantasy sports businesses are likely to expand and proliferate. Already, the FSTA estimates, 18 million Americans play fantasy sports. Mostly they do it for fun, but they can also win prizes, ranging from bobblehead dolls to cash awards as high as $25,000.
In other words, sports fans are paying for the chance to win money in contests that hinge on the performance of professional athletes. Why isn't this gambling?
One answer is that playing fantasy sports requires knowledge and skill. But so do sports betting and poker.
Here's the real reason playing fantasy sports is not gambling: The government says it isn't. The Unlawful Internet Gambling Enforcement Act, which took effect at the beginning of last year, includes a specific exemption for fantasy sports, provided the prizes are determined in advance and the imaginary teams do not correspond to any real teams.
Recommend this article
Jacob Sullum
©Creators Syndicate | http://townhall.com/columnists/jacobsullum/2008/06/04/fake_teams,_real_money | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.259299 |
32 | {
"en": 0.9852327704429626
} | {
"Content-Length": "68617",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:QZE2FWAWUZXRDB3QRJALYO3VVXP3BBVI",
"WARC-Concurrent-To": "<urn:uuid:13cf1644-b4c0-49b7-856f-c63ee5c1d51d>",
"WARC-Date": "2014-03-13T22:27:40",
"WARC-IP-Address": "74.84.198.240",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:5VDRFXNEKI336NDWHG5EY2YYSGJQNKQT",
"WARC-Record-ID": "<urn:uuid:94421ed0-9353-4170-9801-dc077894e9d5>",
"WARC-Target-URI": "http://townhall.com/news/us/2014/02/06/montana-schools-locked-down-after-armed-robberies-n1790843",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 463 | Recommend this article
MISSOULA, Mont. (AP) — The University of Montana and other schools lifted lockdowns Thursday prompted by the armed robbery of two Missoula businesses, but the suspect remained at large, police said.
The Motel 6 and the Taco Bell restaurant on East Broadway were robbed at gunpoint around 9 a.m., Detective Sgt. Travis Welsh said. The university campus was put on lockdown at about 10:20 a.m., shortly after a man carrying a gun and a plastic bag was seen running along Arthur Avenue near the university.
UM spokeswoman Peggy Kuhr said city and UM campus police believe the robbery suspect matches the description of Kevin Briggs, a suspect in a Bozeman attempted rape who escaped from the police station there on Feb. 1.
Briggs, 28, is described as being 5 feet, 5 inches tall with a medium build. UM and Missoula police issued an alert on Wednesday saying Bozeman police learned Briggs might be heading for Missoula because he had connections there.
A witness at the motel described the robbery suspect as a white male about 5 feet, 5 inches tall with brown hair. He was wearing a red Hellgate High School letterman jacket with the name "Jennifer" on it, as well as a teal bandanna and sunglasses, and bags over shoes. He also had a semi-automatic pistol.
A witness at Taco Bell described the suspect as a white man wearing a blue hoodie, with black sunglasses, jeans, dark shoes and light socks. He had a white bandanna over his face with black gloves and brandished a black semi-automatic pistol.
Police were not sure if they were dealing with two suspects or if the suspect changed clothes.
Missoula police confirmed Briggs had been in their city Saturday night, hours after his escape. Police spokesman Travis Welsh told KECI-TV that Briggs asked an acquaintance if he could stay with him in town, but the friend said no.
The university lifted its lockdown shortly before 1 p.m., saying there was no indication the suspect was still in the area. Missoula Public Schools also lifted its lockdowns and said students would be dismissed at their regular times.
UM officials said Thursday afternoon that classes were resuming, but they reminded students to remain alert. The men's basketball game against Portland State was played as scheduled, with Montana winning 82-76.
Meanwhile in Bozeman, prosecutors filed several felony charges against Briggs, and a warrant was issued for his arrest. His former girlfriend reported he tried to rape her, and choked and strangled her. He faces charges of aggravated assault, attempted sexual intercourse without consent, escape and assault on a peace offer.
Briggs is a registered sex offender who is on probation. He was convicted of kidnapping and raping his 14-year-old former girlfriend in Helena in early 2003.
Recommend this article | http://townhall.com/news/us/2014/02/06/montana-schools-locked-down-after-armed-robberies-n1790843 | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.029758 |
74 | {
"en": 0.9746078252792358
} | {
"Content-Length": "42723",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:DB3NVEOUZ34WUHJVUDFBE2C2U2TC2Z7H",
"WARC-Concurrent-To": "<urn:uuid:a3a8a412-36aa-4b24-a7ed-538c44d7ee87>",
"WARC-Date": "2014-03-13T21:38:33",
"WARC-IP-Address": "74.84.198.240",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:67DKT6RWZAWW74UU5FXQXI5FBETZEKCW",
"WARC-Record-ID": "<urn:uuid:795c6b0b-b8c0-4226-ba5f-0e6aea69fe6c>",
"WARC-Target-URI": "http://townhall.com/social/jasoncharleston-543961/double_murder_on_gunfree_college_campus_in_wyoming_cmt_5927975",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 259 | In response to:
Double Murder on "Gun-Free" College Campus in Wyoming
JasonCharleston Wrote: Dec 01, 2012 1:56 PM
Young men on anti-anxiety drugs is a really, really bad idea as well. There are some things you want people to be anxious about. Mass homicide being one of them. Also, you give a sick twist limitless cash. Joker killer used his college loans to a $5000 gun.
AZYaateeh Wrote: Dec 01, 2012 7:10 PM
Wow, do you often shoot your mouth off about issues you know nothing about?
Hint, anxious people are more likely to be violent—because more things seem like a threat. Also, clinical "anxiety" is, biochemically, basically the same thing as sleep deprivation (the same chemical that gets depleted when you don't sleep is the one people with anxiety disorders are low on).
And hey, guess what, know what one symptom of sleep deprivation is? Lack of inhibitions. As in, they're more likely to try mass homicide. Which they wouldn't, if their brain-chemistry were working right.
Wyoming state gun laws leave it to the... | http://townhall.com/social/jasoncharleston-543961/double_murder_on_gunfree_college_campus_in_wyoming_cmt_5927975 | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.33505 |
34 | {
"en": 0.942665994167328
} | {
"Content-Length": "41744",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:D4XKHKKL4P32MFAEYL3ZL6RLY5KUULK3",
"WARC-Concurrent-To": "<urn:uuid:1f65fc6d-4b38-4676-96b4-37da3fa553d2>",
"WARC-Date": "2014-03-13T21:51:12",
"WARC-IP-Address": "74.84.198.240",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:SF6ZM3SKXEO5DT4MXAIZ46PMYOF3ZT6E",
"WARC-Record-ID": "<urn:uuid:047eb05d-682b-4914-85de-c95f654a5f47>",
"WARC-Target-URI": "http://townhall.com/social/mskelly-376461/pinhead-bureaucrats-threaten-family-with-possible-prison-sentence-for-rescuing-a-baby-deer-n1500902_cmt_6292279",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 169 | In response to:
Ms Kelly Wrote: Jan 30, 2013 9:59 AM
No. The simple and amicable solution for a FREE people is for the government to butt the hell out of silly issues that harm no one. Does the government exist to serve the people; or do the people exist to serve the government? THE PEOPLE have made it pretty clear what they think on this issue. Does the government care about the will of the people anymore? THAT is the real issue here.
| http://townhall.com/social/mskelly-376461/pinhead-bureaucrats-threaten-family-with-possible-prison-sentence-for-rescuing-a-baby-deer-n1500902_cmt_6292279 | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.076401 |
6 | {
"en": 0.8651268482208252
} | {
"Content-Length": "172262",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:IKUE75UE3UNQYOIBBRHR7KIGJFYGVXP3",
"WARC-Concurrent-To": "<urn:uuid:0385bf65-00e5-4942-815e-9546212dbe58>",
"WARC-Date": "2014-03-13T22:05:50",
"WARC-IP-Address": "206.190.57.61",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:IKICVVVH5JIIFBH3OCP7PAHOPXJ3PYG4",
"WARC-Record-ID": "<urn:uuid:d322f35c-be58-45fa-acc4-19cc3931bde7>",
"WARC-Target-URI": "http://uk.eurosport.yahoo.com/news/superbikes-assen-wsbk-laverty-pips-sykes-win-race-145000366.html",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 450 | Superbikes - Assen WSBK: Laverty pips Sykes to win race two
Aprilia’s Eugene Laverty battled to the bitter end with Kawasaki’s Tom Sykes to claim first place on the podium in the second World Superbike race at Assen this afternoon.
Sykes was leading until the final three laps, when the Irish rider decided to make his move. The Huddersfield lad did put up on strong fight, but he ran on to the curb in the final chicane giving Laverty the opportunity to take the lead, and eventually his second World Superbike win of the year.
Sykes was not the only Kawasaki on the podium, as young French rider Loris Baz claimed the final step of the podium, but had to contend with challenges from Pata Honda’s Jonathan Rea, and earlier during the 22 lap race a charge from Aprilia’s Sylvain Guintoli.
The Frenchman appeared to have tyre issues as he fell off the pace, letting GoldBet BMW’s Chaz Davies to take fifth place, with less than four hundredths of a second separating the two bikes as they crossed the finishing line.
Fixi Crescent Suzuki’s Leon Camier ended the final World Superbike race of the day in a respectable seventh, after riding a faultless race with a huge hole in his leg.
The Brit managed to keep GoldBet BMW’s Marco Melandri at bay, and his Suzuki team-mate Jules Cluzel. The Frenchman eventually retired due to a technical problem with his GSXR1000, with only seven laps remaining out on the Dutch circuit.
Cluzel was not the only racer to retire, Althea Aprilia’s Davide Giugliano was up in third position, but crashed and saw his bike go up in flames, which abruptly ended his race weekend.
Ducati Alstare’s Carlos Checa was off the pace again, and ended the race in tenth. The former champion was overtaken by Melandri and Red Devils Aprilia’s Michel Fabrizio who finished just inside the top ten in ninth.
Click here for times.
Assen World Superbike race two results:
1. Eugene Laverty (Aprilia Racing Team) Aprilia RSV4 Factory 35'36.814
2. Tom Sykes (Kawasaki Racing Team) Kawasaki ZX-10R 35'36.903
3. Loris Baz (Kawasaki Racing Team) Kawasaki ZX-10R 35'42.662
4. Jonathan Rea (Pata Honda World Superbike) Honda CBR1000RR 35'42.704
5. Chaz Davies (BMW Motorrad GoldBet SBK) BMW S1000 RR 35'44.173
6. Sylvain Guintoli (Aprilia Racing Team) Aprilia RSV4 Factory 35'44.218
7. Leon Camier (Fixi Crescent Suzuki) Suzuki GSX-R1000 35'57.909
8. Marco Melandri (BMW Motorrad GoldBet SBK) BMW S1000 RR 36'04.081
9. Michel Fabrizio (Red Devils Roma) Aprilia RSV4 Factory 36'07.047
10. Carlos Checa (Team Ducati Alstare) Ducati 1199 Panigale R 36'09.215
11. Ayrton Badovini (Team Ducati Alstare) Ducati 1199 Panigale R 36'16.738
12. Max Neukirchner (MR-Racing) Ducati 1199 Panigale R 36'20.718
13. Ivan Clementi (HTM Racing) BMW S1000 RR 36'36.983
14. Federico Sandi (Team Pedercini) Kawasaki ZX-10R 36'38.667
15. Mark Aitchison (Team Effenbert Liberty Racing) Ducati 1098R 36'39.478
RT. Jules Cluzel (Fixi Crescent Suzuki) Suzuki GSX-R1000 24'31.112
RT. Davide Giugliano (Althea Racing) Aprilia RSV4 Factory 8'07.727
RT. Vittorio Iannuzzo (Grillini Dentalmatic SBK) BMW S1000 RR 3'39.175 | http://uk.eurosport.yahoo.com/news/superbikes-assen-wsbk-laverty-pips-sykes-win-race-145000366.html | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.050391 |
0 | {
"en": 0.93621164560318
} | {
"Content-Length": "38825",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:HQEH7OFGBXACDTON4QCY6M3GAOLCZM6B",
"WARC-Concurrent-To": "<urn:uuid:b41a44e0-85e4-4795-8191-24ff7d312d8d>",
"WARC-Date": "2014-03-13T22:30:11",
"WARC-IP-Address": "199.27.72.131",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:OQAFMDPP4R7CFK6GZT5GFSHHNIP7FGLC",
"WARC-Record-ID": "<urn:uuid:5a0e57a9-8a39-45e5-aabd-fce65e1b32fb>",
"WARC-Target-URI": "http://uncyclopedia.wikia.com/wiki/Bathtub",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 692 | From Uncyclopedia, the content-free encyclopedia
Jump to: navigation, search
Every few years a drought will affect the sea level, and abandoned ships, soap, and slippers emerge.
The Bathtub is a small body of water located on the west side of Condominiumland, which is accessible through the Hallway Passage.
edit Dimensions
The Bathtub has a surface area of 0.00000033 square miles (0.00000085 km2) and a maximum depth of 0.9 ft (0.27 meters). It is fed by one main tributary, which periodically raises water levels to within 0.1 feet of the edge of the basinal structure. The waters of the Bathtub have also occasionally spilled over the edges, causing extreme hydrological damages to the surrounding areas.
Tides in the Bathtub are almost undetectable because of its small size, but still exist and can be accessed for running small power plants. During drainage seasons, violent whirlpools may spontaneously form whose direction of rotation is strongly influenced by ambient Coriolis forces.
edit Salinity
The waters of the Bathtub contain relatively low quantities of dissolved salts. However, they are much higher in concentration than the other oceans in dirt, mud, animal hairs, dead leaves, rambunctious children, food crumbs and boogers.
edit Temperature
The temperature in the open waters can sometimes reach those of the better Hot Springs or the large inland Hot Tubs. Cooling occurs when the air pressure and heat evaporation combine to balance the temperature of the standing water with the surrounding landscape.
edit Geology
A schematical look at the container.
Careful analysis of the thousands of ring-shaped deposits on the steeply-sloping sides of the Bathtub indicate many separate periods of inundation, interspersed by drainage events over the course of the past several million years. Exploration of the bottom of the Bathtub by deep-sea divers has revealed a relatively smooth surface, which is occasionally interrupted by multicolored adhesions similar in appearance to [[wikipedia:Coral|coral reefs. Also near the bottom is a circular aperture, which is believed responsible for occasional whirlpool activity (mentioned above).
The Bathtub contains several large floating continents composed of a low-density foam-like substance. Computer simulations of the history of the movements, collisions, and breakup of these continents are indicatative of the presence of deep underwater currents. What causes these currents is presently unknown, but are currently hypothesized to be due to the unpredictable movements of a naked organic creature with a hyperactive bowel.
edit Marine Ecology
The Bathtub is home to a great number of indigenous aquatic species, such as the sponge, the rubber ducky, the purple octopus with three googly eyes, bacteria, and,
of course, the deadly bathtub shark.
edit Shipping
Maritime traffic on the Bathtub is extensive during the summer months. Ships regularly haul dozens of tiny plastiform passengers from one edge of the Bathtub to the other whislt going "Tooot toot tooOOT!!! Oh noes! look, the big red boat crashed against the purple octopus! Help, we're SINKING (glub glub glub)!" Unfortunately, catastrophic accidents are all too frequent, mostly due to navigational error.
Horse in bathtub
The displacement of water ascertained by submerging non-oceanic bodies into the miniscule sea can be calculated to the square drop.
edit Environmental Woes
In recent years, the sensitive environment of the Bathtub has been ominously threatened by various chemical pollutants, such as harsh detergents, multicolored paint spills, Mister Bubble, and unidentified gaseous anomalies. The innumerable shipwrecks which litter the bottom of the Bathtub also pose an unwarranted hazard to the indigenous wildlife.
Since the costs of restoring the Bathtub to its pristine unpolluted state are estimated to be incalculable, focus has been shifted instead to prevention of future degradation by banning the wholesale introduction of foodstuffs, electrically-powered machines, and large canine companions.
edit Exploration
Teams of divers and bathers have entered the waters of Bathtub, and have reported slippery sides and sometimes stray hairs of unknown origin.
Film director James Cameron is the only person to have driven a deep-sea vehicle into the bowels of the pipe which satellite X-ray technology discovered at the bottom of the Bathtub in 1978. Cameron floated down the pipe in his one-man bubble-shaped machine a few months ago, and is expected back any day now.
edit See Also
Personal tools | http://uncyclopedia.wikia.com/wiki/Bathtub | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.019222 |
39 | {
"en": 0.9115573763847352
} | {
"Content-Length": "73480",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:Z6M6ZO7UWJPC6MXK4QO5454XOY4EJTPX",
"WARC-Concurrent-To": "<urn:uuid:21922761-c8c9-4772-b1fc-c7d5b0b45640>",
"WARC-Date": "2014-03-13T21:40:44",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:VUWDTPTHFOW2DP4EPV7KKQP7A3LJAELP",
"WARC-Record-ID": "<urn:uuid:67bf5834-e46e-453d-9e60-e2b5020d2aaa>",
"WARC-Target-URI": "http://unix.stackexchange.com/questions/71090/cannot-create-a-partition-after-the-4th",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 614 | Take the 2-minute tour ×
When using cfdisk to partition for Arch Linux, I found that after the 4th partition, I can't make any more.
enter image description here
I'm using VMWare Player as a VM, and I'm using a single fake HD file. Earlier I thought it was that I was using split HD files, but I'm wrong. Is there any way around this?
share|improve this question
See the Arch Wiki partitioning article: "Primary partitions can be bootable and are limited to four partitions per disk or RAID volume." – jasonwryan Apr 4 '13 at 0:28
Wow, I'm blind... Thanks for showing me the wiki C: – SuperCheezGi Apr 4 '13 at 0:31
That is a limitation of the DOS partitioning scheme (I don't know if that is the right name): At most 4 primary partitions. – vonbrand Apr 4 '13 at 0:37
add comment
3 Answers
up vote 4 down vote accepted
PC partitions are a bit limited and awkward for historical reasons. You can only have 4 primary partitions, sda1 through sda4. The reason is that the primary partition table in the boot sector has only room for 4 entries. If you want to have more partitions, you need them to be logical partitions. Logical partitions are contained in an extended partition, so to have a logical partition, you must have an extended partition. That extended partition requires an entry in the boot sector, of which all 4 are already taken.
Delete one of the primary partitions, create an extended partition, and make as many logical partitions as you want. (Well, up to 11 of these, as Linux only supports partitions numbered up to 15.)
Linux doesn't care whether it's using primary partitions or logical partitions.
Since the disk is presumably going to be used only under Linux, my recommendation is to forget about PC partitions. The point of them is that they are understood by every operating system. If you aren't sharing the disk between multiple operating systems, they're irrelevant. Use Linux's native partitioning system instead: LVM. Make the whole disk an LVM physical volume, make a volume group containing just that physical volume, and create as many logical volumes inside that volume group as you like.
share|improve this answer
Thanks, this helped C: – SuperCheezGi Apr 5 '13 at 21:37
add comment
Can not create more than 4 primary partition, in case you need more than 4 partition then follow this steps:
1. Create 3 Primary Partition
2. Create 1 Extended Partition
3. Then you create N of Partition from the Extended Partition.
Thanks, Ela
share|improve this answer
While your answer is correct, it is not as thorough as Gilles' and will not add anything to people's understanding of the issue... – jasonwryan Apr 4 '13 at 6:28
add comment
Partition table size in MBR is 64 bytes , 16 bytes for each partition , that why we can create only 4 primary partition.
Extended Partition also count Primary partition , in Extended you can create Multiple logical volume up 63. but if you are going to create using fdisk then it can not handle partition after 16th and you can't create more than 1TB using fdisk. so you can use parted or gparted for the same.
from 1-4 partition is reserve for primary , if you create two primary partition(sda1,sda2) and next logical partition partition sda5
Refer this page for more information
share|improve this answer
add comment
Your Answer
| http://unix.stackexchange.com/questions/71090/cannot-create-a-partition-after-the-4th | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.614143 |
57 | {
"en": 0.943164885044098
} | {
"Content-Length": "80258",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:KZ6NIBGSLIKZGWW7GNHV2GJH2RZZFYW3",
"WARC-Concurrent-To": "<urn:uuid:a5bd5d93-fe85-4399-bbb2-a7233c10cb83>",
"WARC-Date": "2014-03-13T21:37:50",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:DLV47KO76MMAJTFZOS6YDYUKLUDLFNUB",
"WARC-Record-ID": "<urn:uuid:bc4f320b-c172-43b0-a4dd-4f586453e47c>",
"WARC-Target-URI": "http://ux.stackexchange.com/questions/44013/how-to-use-repeatable-alert-sounds-without-driving-the-user-crazy",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 1,161 | Take the 2-minute tour ×
I'm making an app for a small business that alerts the user when they have a new order. It should play some kind of ding to get the user's attention. People will be using this app for eight hours a day or more, so I'm worried about creating a chinese water torture effect from the poor user hearing this ding over and over all day long.
Is this a legitimate concern? Are there certain sounds that are more pleasant to hear over and over? Would it be worth it/a bad idea/unnecessary to have a variety of different sounds?
share|improve this question
Is the user able to turn the audio notification on and off? – Matt Obee Aug 22 '13 at 13:17
@Matt Obee, that would probably be up to the boss, if they allow their employees to turn off the alert. I would go with no, since these orders are time sensitive and they need to be alerted when one comes up. – ridiculously happy Aug 22 '13 at 13:19
What about letting the user choose the sound from set? At least he could feel (an illusion of) control – Alexey Kolchenko Aug 22 '13 at 13:56
What's the context? Is the app running on a mobile device or a desktop? Is the device shared by multiple users or does each user have it running on their own device? – Matt Obee Aug 22 '13 at 14:10
There are probably some "Acoustic issues" - certain sounds / beats are probably more intrusive than others. This might be worth looking at ux.stackexchange.com/questions/14170/… – PhillipW Aug 22 '13 at 15:44
show 5 more comments
4 Answers
First, an anecdote from Jeff Bezos, Amazon founder:
Then an idea of how to live with your "bells" (you have several ones!). Setup two types of alert. On new order comming:
• first display visual alert (changing color of a block on the page, blinking tab title in browser or favicon to focus attention to the order page, notification in Chrome etc.). Visual alert is less distractive for operator and other people in the office.
• use sound alert in case of no reaction from operator within reasonable period of time.
• change sound alert as a function of time, starting from quiet and gentle sound to more loud and urgent one.
• use snooze while signalling.
This approach allows to minimize bell rings and sound distraction in your office.
There is also important psychology trick which I've mentioned in a comment. If the sound alert is mandatory you could use false dilemma effect, (choice without choice). It's a situation in which limited alternatives are considered, when in fact there is at least one additional option.
An example is a question: "Would you like a tea or coffee?" which pushes user to choose between two options while he actually would prefer just a cup of water. This is NLP trick ).
For sound alert it could be used, too. Let user chooses a sound from a set. Making a choice, user will feel a freedom of choice and control. While actually it's only illusion of control and choice from limited set of options is actually "choice without choice".
And more anecdote from Inmates Are Running the Asylum by Alan Cooper concerning bad designed in-flight entertainment system:
With cash collection connected to content delivery by computer, the flight attendant had to first get the cash from the passenger, then walk all the way to the head end of the cabin, where the attendant's console was, enter an attendant password, then perform a cash-register-like transaction. Only when that transaction was completed could the passenger actually view a movie or listen to music. This inane product design forced the flight attendants to walk up and down those narrow aisles hundreds of extra times during a typical trip. Out of sheer frustration, the flight attendants would trip the circuit breaker on the IFE system at the beginning of each long flight, shortly after departure. They would then blandly announce to the passengers that, sorry, the system was broken and there would be no movie on this flight.
This is a hint of why some sound speaker in your office could be non-working suddenly.
share|improve this answer
add comment
You're right about worring if too much / too frequent audio notification won't bother your client / his employees.
I don't have more details about your app and the business it's related, so I'm not sure if these alternatives could be discussed with him:
• does it really need to be an audio ? Couldn't be some visual sign, and and audio alert after ´x´ seconds / minutes if nothing is done ?
• how loud does it have to be ? Too loud is anoying, too soft and people will get used to it and will ignore...
• Can't it be an audio alert for every x requests ?
• Couldn't it be customizable ?
share|improve this answer
add comment
Make it non-repeatable (at least within a given business day).
Even if an order takes on average 5 minutes to process, then at peak days you still have less than 100 orders per person. It's not that hard to make a library of 100 sounds: the simplest approach would be to announce "order number one", "order number two", ..., "order one hundred" . This is pretty simple to record (even with different voices), and will give your users minor feeling of curiosity ("how many orders am I going to have today?", or "wow, it's order 60 already, and it's not even lunch"), or competition, or whatever.
If you feel ambitious, you can add programmatic voice modifications, tone modulations, and other bells & whistles -- to keep the users forever entertained.
share|improve this answer
add comment
First of all it is a legitimate concern, and secondly an audio notification should definitely be something that can be toggled on and off. If there are individuals that should not be allowed to turn it off, then you can just define permissions on the audio option, so that only certain users can turn it on and off.
Also, if you're worried about users becoming tired of the sound, it maybe worth it to allow them to select from a variety of sounds. That has a few benefits:
• If a user grows tired of the sound, they can select another one.
• If there are multiple instances of the software running in earshot, users will be able to distinguish which one received a new order.
• Alerts sounds are a very personal setting, and it has been extremely common for software to allow their users to customize them.
share|improve this answer
add comment
Your Answer
| http://ux.stackexchange.com/questions/44013/how-to-use-repeatable-alert-sounds-without-driving-the-user-crazy | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.14103 |
0 | {
"en": 0.8093537092208862
} | {
"Content-Length": "51590",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:GQKU6WEX7XJ6NFNQSARFFUVEZA4UQVWT",
"WARC-Concurrent-To": "<urn:uuid:14760cb3-65b9-47f2-a9bf-2faa2a8dddb1>",
"WARC-Date": "2014-03-13T22:15:40",
"WARC-IP-Address": "107.162.132.18",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:ZAOT4CAW2SQD7XK5JO7EN2SH3C3LDVHJ",
"WARC-Record-ID": "<urn:uuid:94a1a026-b40c-4dfe-ab33-9032803f4874>",
"WARC-Target-URI": "http://vimeo.com/transitiontowns",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 74 | Transition Towns Plus
SW UK, worldwide
User Stats
Profile Images
User Bio
Selection of videos from Transition Network. All videos that appear here are either ours or those that we have favourited - get in touch if you have a video you want to share. You can find a wider range of movement videos on youtube:
External Links
1. breadcrumb
2. nu project
3. andreas teuchert
4. Transition Malvern Hills
5. Transition US | http://vimeo.com/transitiontowns | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.855258 |
37 | {
"en": 0.9252556562423706
} | {
"Content-Length": "22638",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:KEKHBQJXZ5IG7TNMEZ4DQPUEDPJJPQEP",
"WARC-Concurrent-To": "<urn:uuid:bfc5ab68-1c2d-40c3-8b67-660be4d458f6>",
"WARC-Date": "2014-03-13T23:00:48",
"WARC-IP-Address": "199.79.48.26",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:GCJ3XFYTEQBY6OF5KHAQOGM5MOIJJO3K",
"WARC-Record-ID": "<urn:uuid:e5a4fc1b-cd9b-46c4-a91d-41387b2b8fe6>",
"WARC-Target-URI": "http://wamu.org/audio-player?nid=43087",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 61 | Now Playing
Winter Wonderland? Not In New England
Unseasonable temperatures and lack of snow have a lot of New Englanders singing the blues. In Maine, snowmobiling, ice fishing and Nordic skiing are a big part of the winter economy. Downhill ski areas are making due with man-made snow, but those other industries have no choice but to wait for Mother Nature. | http://wamu.org/audio-player?nid=43087 | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.094329 |
73 | {
"en": 0.9504380226135254
} | {
"Content-Length": "55878",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:FPW6674NEGQRS72RLP7R6QRXSK3JN5G7",
"WARC-Concurrent-To": "<urn:uuid:b8a4dd0d-2690-4f09-a926-2d111d856951>",
"WARC-Date": "2014-03-13T22:13:25",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:JQEUDCE35Z34MOBCHHYZZD622LOZHYHW",
"WARC-Record-ID": "<urn:uuid:80d3c1db-8b28-4aa8-b854-c4eeed65d927>",
"WARC-Target-URI": "http://webapps.stackexchange.com/questions/22543/facebook-list-of-people-didnt-accept-friend-request-yet?answertab=oldest",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 241 | Take the 2-minute tour ×
Possible Duplicate:
Knowing who I sent a friend request to on Facebook
How can I get list of people whom I've sent friend request but they didn't accept it yet in Facebook?
share|improve this question
add comment
marked as duplicate by Eight Days of Malaise, phwd Jan 8 '12 at 6:46
1 Answer
Per Facebook help:
There's currently no place on the site where you can see all your sent pending requests. However, if you go to someone's profile (timeline) you can tell your friend status based on the following.
However, there some scripts like Unfriend Finder that can track your pending friend requests as long as you add people after the script is installed.
share|improve this answer
add comment
| http://webapps.stackexchange.com/questions/22543/facebook-list-of-people-didnt-accept-friend-request-yet?answertab=oldest | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.417962 |
69 | {
"en": 0.9601390957832336
} | {
"Content-Length": "53387",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:FFGMED6KLC2B3C33D34VWSXJXCXE4FLG",
"WARC-Concurrent-To": "<urn:uuid:47b5f505-907b-4964-b5c3-e760b87aa910>",
"WARC-Date": "2014-03-13T21:38:44",
"WARC-IP-Address": "74.121.194.235",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:L5CYHFQEBSV25VJHMGRFYIQA43J5LCP2",
"WARC-Record-ID": "<urn:uuid:65cfd977-f4de-4acf-8ed4-a44afe432f46>",
"WARC-Target-URI": "http://wilsoncenter.org/event/brace-and-social-inequalityb",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 1,007 | Race and Social Inequality
August 13, 2003 // 12:00am
Event Co-sponsors:
Latin American Program
As part of an ongoing program jointly sponsored by Brazil's Ministry of Culture and Brazil @ The Wilson Center three scholars presented their findings after two months of research at the Wilson Center. Brazilian Minister of Culture Gilberto Gil and his staff also participated by live videoconference, from Brasília, DF Brazil.
Debora Carrari, who arrived this summer with her recently completed Masters Degree in Conflict Analysis from Nova Southeastern University, discussed the implications of police behavior in the context of the concerns with racial equality. Based on the assumption that discriminatory practices in law enforcement have a significant impact on racial equality, she focused on racially biased police behavior in Brazil and the United States. Utilizing publicized documents and statistics, she compared police behavior in both countries, and investigated the structural mechanisms that help perpetuate racial inequality through discriminatory law enforcement.
Katia Santos, from the University of Georgia, focused on Afro-Brazilian women and their struggle to gain access to education in a context of social and racial oppression. She was also concerned with disenfranchisement in a society that she believes is still shaped by the rules of what many in Brazil would term an era of "amiable" slavery. By examining literature produced by African-American scholars on issues related to black women and blacks in general, she is interested in discovering ways to empower Afro-Brazilians. Katia felt that because black populations in Brazil and the U.S. are both derived from forced African diasporas, U.S. civil rights accomplishments could be used as a guide by Afro-Brazilians.
Liv Sovik, from the Universidade Federal do Rio de Janeiro, discussed the influence of popular culture on the formation of new identities and the resulting increase in attention towards the margins of Brazilian society. She focused on the demand by Afro-Brazilians for equality as well as more specific policies designed to address social inequalities. Liv is concerned with the impact of "whiteness" as an aesthetic ideal and a social determinant. She believes that social limitations stem not only from prejudice against Afro-Brazilians, but also from the elevation of "whiteness" to the top of the social pyramid. She posed the question: "What can be done to remove whiteness from the top of the social scale?" Sovik believes that it is necessary to consider whiteness not in demographic terms, but instead as a social value that has a broad impact across all areas of society. Nevertheless, she believes that although the self-perception of black identity is increasing in Brazil, this does not indicate that Brazil is headed for a dynamic similar to that in the U.S. after the civil rights movement. There are, however, affinities and similarities between Brazil and the U.S.— whiteness, for example, continues to be valued in both countries as a social and aesthetic ideal.
Minister of Culture Gilberto Gil underscored the difficulties in comparing realities in Brazil and the US. He noted that despite superficially similar conditions, race relations have evolved on different paths in Brazil and the U.S. In Brazil he noted that after slavery, blacks were not formally segregated, as in the US. He pointed out that, despite the lack of ideological segregation, there were social, political and economic separations in place.
Minister Gil also observed that, soon after slavery, there were important contingents of blacks living well with whites and other races in Brazil. In the US, however, segregation was a pervasive and largely accepted practice for an extended period of time.
Ron Walters from the University of Maryland agreed with Carrari's findings on the similarities between rates of incarceration in Brazil and the U.S. In the U.S., although rates of arrest are higher for whites, 53% of the prison population is black – and blacks compose only 13% of the American population. Walters highlighted the lack of legislation to address racial profiling, equalization of sentencing, and targeted policing which are generally limited to black communities.
Dr. Walters applauded Santos's description of her experiences and challenges as a black woman coming up through the educational system in Brazil. He raised the issue of identity, and in particular highlighted the concept of being both black and a woman. As Walters sees it, the black female identity is one of double oppression, which historically has only guaranteed diminished access to the opportunity structure. Walters also stressed the importance of viewing the black-white paradigm in light of the struggle for civil rights.
On Sovik, Walters continued his discussion of civil rights noting that the struggle which resulted in this regime benefits all, in the form of laws relating to public accommodation, voting, and housing. This raises the issue of the intersection between power and identity; in America, a unified collective identity meant power, and with struggle, resulted in the establishment of a civil rights regime. Walters agreed with the need for activism in the federal government, positing that if the civil rights agenda in the US had been put to a vote it would have failed. He feels it is necessary for the federal government to look beyond the dangerous and regressive politics of fear by "adopting an enlightened view of its own future."
For Dr. Walters, in both countries the future will require the development of regimes that "promote, enrich and give citizenship of full meaning to all individuals," regardless of race, creed or color. Walters concluded by noting that accomplishing these goals would expand the historically limited circle of democratic participation to the entire population.
Wilson Center Photo Gallery
Browse or share photos from the Wilson Center’s events.
To Attend an Event
Unless otherwise noted:
Experts & Staff | http://wilsoncenter.org/event/brace-and-social-inequalityb | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.059426 |
0 | {
"en": 0.896507740020752
} | {
"Content-Length": "65504",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:M3T5XHN4IQHLKNDV77UDMHT4EPB4M66R",
"WARC-Concurrent-To": "<urn:uuid:f9e5a152-3ecd-46ec-a337-b28f89dd99c1>",
"WARC-Date": "2014-03-13T21:41:55",
"WARC-IP-Address": "67.208.46.176",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:DKLU3O4VKCYOPDMIR5437UYEDSY5NTQU",
"WARC-Record-ID": "<urn:uuid:7c1d7959-0749-4843-868a-ad9defc0c3e5>",
"WARC-Target-URI": "http://windowsitpro.com/systems-management/new-features-longhorn",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 660 | At last year's Microsoft Professional Developers Conference (PDC), Microsoft presented a preview of what to expect in the next version of Windows, code-named Longhorn. Although Microsoft might not release the new version until 2006, the Longhorn development cycle is well underway. In this Top 10, I present 10 of the most significant new features that Microsoft plans for the next version of Windows. (In case you were wondering, Microsoft named Longhorn after a saloon near Whistler Mountain in British Columbia, Canada.)
10. Windows .NET Framework— Although Microsoft hasn't made a big deal out of it, the inclusion of the .NET Framework with the next version of Windows shouldn't surprise anyone. The .NET Framework will make deploying Microsoft .NET applications throughout the enterprise easier by eliminating the need to separately download and install the .NET Framework.
9. XAML— Pronounced "zamel," XAML stands for Extensible Markup Language. XAML is a declarative markup language that developers can use in Longhorn to create UI objects much like Web site designers use HTML to create Web pages. XAML supports graphics and can be used to connect .NET Common Language Runtime (CLR) objects.
8. Contacts—With Longhorn, your list of contacts is basically built into the OS rather than being maintained by a separate application such as Microsoft Outlook or by a customer relationship management (CRM) application such as FrontRange Solutions' GoldMine. Longhorn provides the elements and controls you need to manage your list of contacts. The contacts feature uses the new WinFS file system, which I discuss later.
7. Notifications—Another big change that's planned for the Longhorn version of Windows is a change in the way Windows handles notifications. Longhorn offers an API for sending notifications to users. The new notifications model puts the user in control of how notifications are delivered. Users can specify when notifications may or may not be delivered and which type of applications a notification can interrupt.
6. Palladium—Longhorn includes the controversial Palladium security standard. Palladium is a security technology that works with Digital Rights Management (DRM) to control which types of applications and documents the system can work with. Microsoft pushes Palladium as a security tool to protect users from viruses and other ill-intentioned code, but the technology's opponents characterize it as Big Brotherism.
5. Aero—The code name for the Longhorn user experience, Aero is a set of guidelines that developers should follow to make the most of Longhorn's new graphical environment. The key components of the Aero interface in Longhorn include transparent windows, a built-in buddy list, and a dockable task pane.
4. WinFX—WinFX is a managed-code API for the Longhorn OS that essentially replaces the old Win32 API set. WinFX integrates .NET managed code with the underlying OS. Those who are already writing .NET applications will be pleased to learn that the WinFX classes are compatible with the .NET Framework.
3. Indigo—A new communications subsystem that's built into Longhorn, Indigo basically integrates Web services into the OS. Indigo is built on top of the .NET Framework and lets you build service-oriented applications. Windows Server 2003 and Windows XP will also support Indigo.
2. Avalon—Not to be confused with the Aero user experience, Avalon is the code name for Longhorn's new graphical architecture. In Avalon, Microsoft has rewritten Longhorn's graphic stack from the ground up. Avalon replaces the old user32.dll file and graphics device interface (GDI) that provided the graphics support for all previous versions of Windows. Like DirectX, Avalon addresses the hardware directly for improved performance and 3-D graphics. Avalon also provides a screen resolution of 120dpi, up from the current standard of 96dpi.
1. WinFS—Although the preceding features are all fairly sizeable changes for the Windows platform, without a doubt the biggest change is the introduction of the WinFS file system. At its core, WinFS uses a version of the Microsoft SQL Server Yukon database engine to enable relational searches of the Windows data store. WinFS doesn't replace NTFS but rather sits on top of it, integrating rich new search capabilities into Windows as well as introducing a new programming model for data retrieval. | http://windowsitpro.com/systems-management/new-features-longhorn | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.040045 |
22 | {
"en": 0.8716973066329956
} | {
"Content-Length": "61613",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:EG36VYQ7JG376VD5IZX4WJROWPPQ6OX2",
"WARC-Concurrent-To": "<urn:uuid:4b6f66b9-6de5-426b-a762-af10e23a07f8>",
"WARC-Date": "2014-03-13T22:14:02",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:EOIATJUJMAKDAHLWOP7NUW2N4TCLMOKV",
"WARC-Record-ID": "<urn:uuid:a62be382-246e-4b3b-94cb-77be89acd0ee>",
"WARC-Target-URI": "http://wordpress.stackexchange.com/questions/22255/how-to-make-sticky-posts-for-category-pages",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 182 | Take the 2-minute tour ×
how do I make certain posts to stay at the top for each category page. That is I want sticky posts for category pages. Thanks
share|improve this question
add comment
1 Answer
take a look a on AStickyPostOrderER.it'll helps you.:)
share|improve this answer
Thanks. I am using that but it does not order the posts properly. I also wanted a solution without using plugins. – Jzigbe Jul 7 '11 at 9:22
just mention these details while asking question.then only we can answer exactly. – Ramkumar Jul 7 '11 at 9:29
Why don't you want to use a plugin, your asking for functionality that does not come out of the box, your options are use that plugin or create your own custom loops. – Wyck Oct 14 '11 at 6:20
add comment
Your Answer
| http://wordpress.stackexchange.com/questions/22255/how-to-make-sticky-posts-for-category-pages | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.044936 |
46 | {
"en": 0.954255223274231
} | {
"Content-Length": "36828",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:PNZPMOS4N3ZDCXJFKBZQQVT4JAXG6CSC",
"WARC-Concurrent-To": "<urn:uuid:e618f0e9-3a92-4be5-8b2f-9a4fdd229cc4>",
"WARC-Date": "2014-03-13T21:37:12",
"WARC-IP-Address": "23.15.7.163",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:77UUNVLKXD72S6F3P6W2MAMSDYQWSYKP",
"WARC-Record-ID": "<urn:uuid:8b6bb05b-6947-40ba-abbb-bfc9f3353530>",
"WARC-Target-URI": "http://www.abc.net.au/science/articles/2005/10/27/1491875.htm?site=science&topic=latest",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 290 | Skip to navigation | Skip to content
Selfish chimps don't give a monkey's
No, I don't think I'll give you my bananas (Image: iStockphoto)
Chimpanzees share many traits with humans but altruism, it seems, is not one of them, scientists say.
Although chimps live in social groups and co-operate and hunt together, when it comes to helping non-related group members, they don't put up with any monkey business.
When given the opportunity to help themselves and other chimps they often choose the selfish option, scientists report in today's issue of the journal Nature.
"This is the first experiment to show that chimps don't share the same concern for the welfare of others as do humans, who routinely donate blood ... volunteer for military duty and perform other acts that benefit perfect strangers," says Professor Joan Silk, a US anthropologist at the University of California, Los Angeles.
To test how altruistic chimps are, Silk and her colleagues studied the behaviour of two separate groups of chimps in captivity.
They devised an experiment in which chimps on one side of a window could pull a handle to provide a tray of food for themselves or to also give the same reward to a monkey in another room on the opposite side of the window.
Both groups of unrelated chimpanzees behaved in a similar way. They decided to reward themselves but not others.
The scientists say chimps may have not understand they could deliver food to the other room.
"Yet, potential recipients sometimes displayed begging gestures, suggesting that at least they had some understanding of the other's role in delivering reward to them," Silk says.
Tags: environment, science-and-technology, zoology | http://www.abc.net.au/science/articles/2005/10/27/1491875.htm?site=science&topic=latest | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.22155 |
11 | {
"en": 0.9736374616622924
} | {
"Content-Length": "18726",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:E5MGFPRWJCVEXPUL7C2HUEJCDATM2MFS",
"WARC-Concurrent-To": "<urn:uuid:b656d4d3-e989-4f38-ba6b-d375d5a53dd1>",
"WARC-Date": "2014-03-13T21:41:15",
"WARC-IP-Address": "54.208.77.188",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:FEEAPQGQH7RIQGUZASBRUPOLXB6CC34W",
"WARC-Record-ID": "<urn:uuid:75c18c9b-3757-4e29-b130-7663f8586d2f>",
"WARC-Target-URI": "http://www.advrider.com/forums/showpost.php?p=16424058&postcount=110",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 805 | View Single Post
Old 07-18-2011, 02:18 PM #110
neduro OP
neduro's Avatar
Joined: Jul 2003
Location: Colorado Springs, CO
Oddometer: 11,686
So, why am I announcing my intention to go to Dakar in July when the race isn't until January? Because I have to. The short story is, I can afford to make the start line with a bare minimum effort (I use the term "afford" loosely here ).
Without making this sound like an NPR fund drive, I need your help to go beyond the bare minimum (and a big thanks to those who have already donated!). In the next few weeks, I have to make a critical decision; whether to have mechanical assistance or not. That decision depends on how fundraising gets started, because while I'm going to dig deep and invest everything I can to be there, I simply can't afford some of the elective costs (that greatly improve the chance of a finish) without your help.
The decision to take a mechanic will have to be made by August 5. The mechanic's entry and truck seat are about $25k (split between entry fee to the ASO, truck costs, and travel). To take a seat in Rally PanAms truck, I need about $15k in commitments by that date (we're at about $3k as of this morning). If we make that number, it will be a huge improvement over what I can afford alone. So, if you're interested and able, please take a look at and see if something fits for you sooner rather than later.
I can't say enough good things about the sponsors that have stepped up to help me. I approached only those companies that I truly believe in the people and the product, and then I made the pitch that by providing discount codes, we could create a win/win situation: they'd help me get support from you all, and you would get products at an amazing price that offset your donation.
OK, enough of that. Today's purchase was tires, can't afford the risk of them being out of stock, so when I got a confirmed source for 9 606 fronts and 9 908 rears at cost, I jumped on it:
It seems early, but in fact it's not so much- A quick review of the timeline involved: The bikes are available for pickup about December 28 in Buenos Aires before a January 1 start, which means they ship from Europe in late November. US competitors are not obliged to ship via France, but it makes sense to do so, as the cost is included in entry and our bikes and gear receive the same attention in customs as everyone else. Shipping to Europe is cheaper than shipping to South America... so that means my stuff has to ship to Europe in October.
I'm a big believer in testing, and that means planning on the chance of failure. So, the tests need to occur with enough time to address whatever lessons I learn and retest. Two cycles of this at a month each (about the quickest you can rely on getting or making specialized parts, etc) means for an October ship date, the first draft of the bike needs to be done in August. It's mid July, and I just bought the bike... so I'm already under the gun. This is just an extension of how the race will be, and at a philosophical level, how life seems to be. There's always more to do than time to do it in, so I don't perceive this pressure as hardship, simply as reality. In fact, it's one of the things I like best, because it brings a focus and a commitment.
Support trucks operate with roughly the same timeline, hence the need for commitment in early August as they try to fill their seats and cargo capacity before making the investment to have the truck where it needs to be.
Last weekend, we got started. Here, Ganshert and GSNorCal look at the first mockup of a fairing:
And here, C.Vestal, Aurel (visiting from France!) and GSNorCal discuss how to best mount the rear tank.
Our progress deserves a proper post all its own, and I'll get that done soon. As it sits today, the bike is in a lot of pieces, waiting for stuff to arrive. I think it will come together and look like a rally bike very quickly, though. It better, because I'm going to bring it to the Wolfman Luggage shop for the grand opening party they are having on July 30.
So, this is the first post of many to sign off with a lot to do, and not a lot of time to do it in (ALTDANALOTTDII- isn't that handy?).
neduro is offline Reply With Quote | http://www.advrider.com/forums/showpost.php?p=16424058&postcount=110 | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.027366 |
38 | {
"en": 0.9615016579627992
} | {
"Content-Length": "128268",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:ZPSKQYVHMFALK6H3ZOYIRZUFW7G3LCA6",
"WARC-Concurrent-To": "<urn:uuid:14605e23-a852-45a1-9c9b-4d7b0632fa44>",
"WARC-Date": "2014-03-13T22:25:59",
"WARC-IP-Address": "198.16.5.137",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:TYPHIDUK7UE4R3XAHTJHIY6TNPO65IYI",
"WARC-Record-ID": "<urn:uuid:36b5c5cd-4dc8-4272-897a-fc27de590cc8>",
"WARC-Target-URI": "http://www.alternet.org/story/139869/how_is_it_that_the_wall_street_journal_editors_have_absolutely_no_memory_of_the_last_8_years",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 1,413 | comments_image Comments
They are blaming Obama for spending, after Bush's accomplishments: a crippled economy, two failed wars and environmental crisis?
Is it worth your time and effort trying to engage in rational discussions with the increasingly nutty and frantic mouth-breathers on the political right? Or are were they all genetically wired at birth to become hybrids of Grandpa Simpson and Mr. Burns?
The only reason I mention this is that last night, as is my ritual, I settled in with the Wall Street Journal for my daily recon-mission into conservative "Neverland," -- a blame-free zone where the words, " Wow, we were sure wrong about that!" are never uttered.
I was doing fine, until I reached Neverland's dark heart, the WSJ Editorial Page -- a vortex of swirling nonsense where cocksure neo-cons rhetorically goose step in a tight clockwise circle -- much like that roiling red spot of hot gas on Venus that roils madly but never seems to move or change.
In yesterdays editorial the editors were wringing their hands over all things Obama, in particular his budget and related economic rescue spending. Here's how they ended that piece:
"Mr. Obama is more popular than is policies, and sooner or later the twain shall meet. For now, we are living in another era of unchecked liberal government. The reckoning will come when Americans discover how much it costs.”
That's when I spit my evening brandy out of my nose. I mean, really?! The sheer chutzpah of it staggers the mind of anyone not on heavy doses of anti-psychotic drugs.
Where does a sane person, one with a functioning memory, even begin?
First, these are the same people over at the WS Journal who supported the hyper-conservative GW Bush administration. You know, the guys who left us a world economy in near-depression, two unwon wars, and ice caps melting faster than Joe Lieberman and Arlen Specter can change their spots.
So, if as the WSJ editors warn Mr. Obama faces an inevitable day of "reckoning" over his spending, shouldn't they first "reckon" with the trillions of dollars in debt their friends in the Bush administration left taxpayers holding? Shouldn't they first ask, "how much did Bush's policies cost us?”
Well, let's see. If they can't or won't do it, we can. After all we have all the receipts, and we're still getting bills for stuff we didn't even know about until now. But we can make a start:
The first thing the WSJ's friends did when they got in office eight years ago was to eat through the nation's entire supply of seed corn, stored for them by those damn liberals, the Clinton administration. When Poppa Bush handed Bill Clinton the keys to the White House he also handed him a $290 billion deficit.
Eight years later, when Bill Clinton handed the keys to Sonny Bush he hande him a $231 billion budget surplus -- the greatest surplus in U.S. History.
Not only did those damn Clinton liberals manage a budget surplus but were at the same time able to pay down the national debt by a staggering 2.4 trillion.
Within two years the budget surpluses were gone, and the national debt was on it's way back up as the Bushies began borrowing again to make ends meet. By the time they left office they'd add another $5 trillion to the national debt.
Then, once the seed corn was gone, the Bushies started to borrow and spend and cut taxes too boot since, to quote Dick Cheney, "deficits don't matter." Suddenly now, the WSJ editors and their dwindling army of dittoheads are all atwitter over "Obama's mounting deficits."
Then there's the cost of Bush-era deregulation. Those expenses all came due just as George W. Bush was hightailing it out of Dodge last January -- just in the nick of time. The full cost of failing (or just plain refusing) to police corporate America, especially the financial services sector, has already cost us trillions of dollars, and the full cost may not be known for a decade. because all those chickens haven't come home to roost yet. But they're on their way.
Not to pile on but, then there's the cost of all the environmental degradation that occurred on their watch. Instead of addressing the mounting evidence they took a page from Big Tobacco's playbook, first using phony science to deny global warming was even happening. Then, once it became impossible to deny it any longer, they changed their argument to "Sure, but there's no proof than human activities have anything to do with global warming." It was an argument designed to preclude even trying to do anything about global warming, and it worked. (Unfortunately we can't sue them like we did Big Tobacco.)
Then there's the war in Iraq. That little mistake cost us $12 billion a month for more than five of Bush's eight years in office -- in all nearly a trillion bucks down a sandy rat hole, and counting.
In Afghanistan they spent a small fortune unseating the Taliban and trying to kill or capture the actual people who planned the 9-11 attacks. On the very verge of success though the Bushies lost interest, turning their attention to Iraq before they achieved those goals in Afghanistan. In the end all the billions of dollars, (and hundreds of US soldier's lives) spent in Afghanistan achieved nothing. All they did was allow the Taliban and al Qaida to infect neighboring Pakistan, regroup and re-engage in Afghanistan, where they now control most of the country once again. Hundreds of billions of dollars down the drain there too, and also, still counting.
All that money the Bush administration spent, wasted, misappropriated, and, in the end, what did we get for those trillions? Well, we got partial ownership of Iraq, full ownership of Afghanistan, and a growing ownership share in nuclear-armed, Taliban/al Qaida infested Pakistan.
Such a deal. Yet during all that no one at the WSJ predicted Bush would "face a day of reckoning when Americans found out how much it all cost."
Obama's spending is also at historic highs. But there's "spending" and there's "spending." Governments, just as households, face two kinds of spending decisions: discretionary spending and capital-investment spending.
Discretionary spending satisfies the "I may not need it but I want it” reflex. Capital spending is money invested in things that promise to generate a return over time. Home improvements, are good example of household capital spending as they increase the value of a family's main asset, their home. That big screen TV, on the other hand, is discretionary spending.
The Bushies did very little capital investing and a whole lot of discretionary spending. For example:
Obama is investing in education, because it's going to be educated, uneducated or mis-educated, children who will shape America's future. And right now our schools are turning out an demonstrably inferior product.
Obama is investing in emerging technologies that hold the promise that someday will free us from the nut-hold of those smarmy phony Saudi "Princes." And, will begin the process of cleaning up the environment, before the environment decides to do the job herself -- by getting rid of us.
Obama is restructuring the tax code, so that those who actually go to work, and actually provide services or real producing stuff real people really need, get to keep more of what they make.
That's the opposite of what the Bush administration did when they funneled tax breaks to those who already were doing just fine, thank you very much, while producing little more than paper, much of which has turned out to be so worthless you can't even pay anyone to take off our hands.
I won't belabor the point. But for the WSJ editors to posit that voters will soon be aghast at the cost of Obama's policies, couldn't go unnoticed. Because they sure didn't notice the ruinousness policies of the Bush administration when they could have, and when they should have.
And finally, of all people on earth who should know the difference between out of control discretionary spending, and wise capital spending, it should be the guys and gals running the newspaper a friend of mine refers to as "capitalism's racing form."
But of course, the do know the difference. But they are to mainstream American politics what the Taliban are to mainstream Islam: not just wrong, but crazy-wrong.
See more stories tagged with: | http://www.alternet.org/story/139869/how_is_it_that_the_wall_street_journal_editors_have_absolutely_no_memory_of_the_last_8_years | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.223005 |
24 | {
"en": 0.9522709250450134
} | {
"Content-Length": "339119",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:C6EM5NG7UV6PMJUBE2HAGTR43B7KNDRP",
"WARC-Concurrent-To": "<urn:uuid:fbb003e1-cc42-4213-bf34-97920e069622>",
"WARC-Date": "2014-03-13T22:10:11",
"WARC-IP-Address": "80.90.45.16",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:ZAN2SHESS6DL5O3TNHLJDHLDRJZHZM4N",
"WARC-Record-ID": "<urn:uuid:04b93591-302b-43ca-8a1d-40640d973a18>",
"WARC-Target-URI": "http://www.alzheimer-europe.org/FR%E0%B9%80%E0%B8%99/Dementia/Alzheimer-s-disease/How-is-Alzheimer-s-disease-diagnosed",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 1,502 | Basket | Login | Register
How is it diagnosed?
Alzheimer's disease
Alzheimer's disease is a form of dementia but is not necessarily caused by the same factors which cause other forms of dementia. However, despite a considerable amount of research, the actual cause of the disease remains unknown. There is no single test to determine whether someone has Alzheimer's disease. It is diagnosed by a process of elimination, as well as a careful examination of a person's physical and mental state, rather than by finding actual evidence of the disease.
A carer or relative may be asked to provide information about the person's behaviour, e.g. difficulties getting dressed, washing, handling finances, keeping appointments, travelling alone, managing at work and using household appliances. A neuropsychological assessment is usually carried out. This involves finding out about possible problems with memory, language, planning and attention. A simple test called the Mini-Mental State Examination is often used. This involves the person being asked to answer questions such as: What is the date? What city are we in? What is this called? (shown a watch). Another part of the test is to follow a series of simple instructions.
A number of tests may be carried out (e.g. blood and urine samples) in order to rule out the possibility of other illnesses which might explain the dementia syndrome or illnesses which might aggravate an already existing case of Alzheimer's disease. In addition to this, a few methods of brain imaging have been developed which produce images of the living brain, thereby revealing possible differences between the brains of people with Alzheimer's disease and those of non-affected individuals. These tests provide a risk-free and pain-free means of examining the brain of a living person. Although they cannot lead to a certain diagnosis of Alzheimer's disease, some doctors may use one or more of these techniques to give more weight to a diagnosis.
Methods of brain imaging
Magnetic Resonance Imaging This permits an extremely detailed image of the brain's structure. When one image is placed over another, taken a few months' later, it is possible to see changes at an early stage in a certain part of the brain.
CT (Computed Tomography) Scanning This measures the thickness of a part of the brain which becomes rapidly thinner in people with Alzheimer's disease.
SPECT (Single Photon Emission Computed Tomography) Scanning This can be used to measure the flow of blood in the brain, which has been found to be reduced in people with Alzheimer's disease as a consequence of nerve cells not working properly.
PET (Positron Emission Tomography) The use of this scanning technique is often limited to research settings. It can detect changes in the way the brain of someone with Alzheimer's disease functions. It can, for example, detect abnormal patterns of glucose usage by the brain.
The importance of an early diagnosis
Although it is not possible to accurately predict dementia, it is extremely important that people who have dementia obtain an early diagnosis. It is only by obtaining a diagnosis that the correct medical treatment can be prescribed. Existing drug treatment is most effective in the early stages, so delaying diagnosis prevents people from benefiting from the latest medical advances, which in many cases lead to a temporary improvement of symptoms.
However, memory problems are not always a sign of dementia. Although mental faculties change with age, ageing is not synonymous with dementia. Many older people need more time to assimilate information and this may affect their capacity to learn and remember things. Nevertheless, older people are often worried about these changes and are afraid that they might be developing dementia.
At the same time, many people do not know what the symptoms are. This is not surprising, as different kinds of dementia have different symptoms. Furthermore, some forms of dementia (e.g. Alzheimer's disease) are insidious. The following table describes some of the early symptoms of different kinds of dementia.
Alzheimer's disease
• Difficulties with memory and orientation
• Difficulty finding one’s words
• Personality change
• Lack of interest in hobbies
Vascular dementia
• Slowing down of thought and movement
Pick's disease and frontal lobe degeneration
• Loss of control and inhibitions
• Personality change
• Difficulties with language
Dementia with Lewy Bodies
• Cognitive decline
• Similar symptoms to those of Parkinson's disease
• Visual hallucinations
Creutzfeld-Jacob Disease
• Odd lapses of memory and mood swings
• Lack of co-ordination
• Inclination to withdraw from social activities
• Attention difficulties (very rapid progression usually)
The presence of one or more of these symptoms does not necessarily mean that a person has dementia. In fact, in the case of older people, the symptoms of depression are very similar to those observed in the early stages of dementia and it is not uncommon for the two to be mixed up. Sometimes, the symptoms are linked to other disorders such as thyroid gland dysfunction, lack of vitamin B12, disorders of the metabolic system, alcohol or drug abuse, infections, surgical operations, stress and intolerance of medication. In such cases, the symptoms may be reversible.
A differential diagnosis is clearly essential in order to rule out other causes for the symptoms experienced and correctly diagnose dementia. In case of concern, the family doctor/general practitioner should be consulted. He or she will carry out a few tests and if his/her suspicions are confirmed refer the person concerned to the relevant specialists for further tests.
What are the different kinds of diagnosis?
There are three possibilities for a diagnosis of Alzheimer's disease : possible, probable and certain Alzheimer's disease.
Possible Alzheimer's disease
A diagnosis of possible Alzheimer's disease is based on the observation of clinical symptoms and the deterioration of two or more cognitive functions (e.g. memory, language or thought) when a second illness is present which is not considered to be the cause of dementia, but makes the diagnosis of Alzheimer's disease less certain.
Probable Alzheimer's disease
The diagnosis is classed as probable on the basis of the same criteria used to diagnose possible Alzheimer's disease, but in the absence of a second illness.
Certain Alzheimer's disease
Identification of characteristic plaques and tangles in the brain is the only way to confirm with certainty the diagnosis of Alzheimer's disease. For this reason, the third diagnosis, that of certain Alzheimer's disease, can only be made by brain biopsy or after an autopsy has been carried out.
Should the person be informed of their diagnosis?
Nowadays more and more people with Alzheimer's disease are being informed of their diagnosis. This is perhaps due to a greater awareness of the disease. Some people might not want to be informed of the diagnosis. However, it is generally considered that everyone should have the right and be given the opportunity to decide whether they would rather know or waive this right. There are pros and cons involved in informing someone of their diagnosis. Also once the decision has been made to inform someone about their diagnosis the problem may arise of how to inform the person.
Pros and cons of telling the person
In many cases a diagnosis is made as a result of concern expressed by members of the family. Often the person with dementia is unaware or does not agree that they have a problem. They are therefore not interested in obtaining a diagnosis. Some might feel depressed about knowing or feel that they would have been happier not knowing. However, there are many advantages to knowing. When a person knows that they have Alzheimer's disease and understands what it involves, they can plan how to make the most of the remaining years of relative unimpaired mental functioning. They can also take an active role in planning their care, arrange who will care for them, make important financial decisions and even decide to participate in research or make the necessary arrangements to donate brain tissue after their death for research.
How to inform the person of the diagnosis
Some relatives and friends may find it difficult to approach the subject. Some people would prefer to be told privately on a one-to-one basis, whereas others might find it more reassuring to be told in the presence of their family, who could give them moral and emotional support. Another possibility is to arrange for the person's doctor to tell them. It might help to arrange to go to the doctor together or for the person to go alone. The doctor could then answer any questions that either the carer and/or the person with dementia might have. The way the diagnosis is explained will depend on the person's ability to understand. Some people might understand an explanation of what the disease is, how it tends to progress and the consequences for daily living, whereas others might only be able to grasp that they have a disease which involves the loss of memory. Once informed, they may need support to come to terms with feelings of anger, self-blame, fear and depression. Some might be able to benefit from counselling and support groups, provided that the disease is not too far advanced.
Last Updated: mercredi 05 août 2009
• Send this page to a friend | http://www.alzheimer-europe.org/FR%E0%B9%80%E0%B8%99/Dementia/Alzheimer-s-disease/How-is-Alzheimer-s-disease-diagnosed | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.098704 |
445 | {
"en": 0.9602711200714112
} | {
"Content-Length": "81016",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:CFEATFBUV5HKX6XC7QW7FX464OSMUBRG",
"WARC-Concurrent-To": "<urn:uuid:c8649aa0-393b-4171-bdb3-456786aadfca>",
"WARC-Date": "2014-03-13T22:06:30",
"WARC-IP-Address": "198.41.180.57",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:X56CTKQ6NPQ7MMVSSAE6KDLKDEZNFWDH",
"WARC-Record-ID": "<urn:uuid:4522e5f2-d400-407d-aa75-35ee5e8b5359>",
"WARC-Target-URI": "http://www.animenewsnetwork.com/right-turn-only/2012-12-04",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 3,886 | When Gulls Cry
by Carlo Santos, Dec 4th 2012
Well, what do you know, it's December 2012 already. Is everyone prepared for the end of the world? Thankfully, my apocalyptic death probably won't come from being crushed under a stack of falling manga ... because I store most of it in piles on the floor.
Vol. 2
(by Kent Minami and Nozomu Tamaki, Seven Seas, $11.99)
"Hell's demons have attacked Mitsuru again and again—and now he wants to know why. His archangel protector Gabriel has answers for him, but a shocking revelation may shatter their bond of friendship forever.
Volume 2 of Angel Para Bellum is just as good as the first in terms of butt-kicking action—and now it's developing a background story to go with all that. The first half is a crowd-pleaser all the way, leading off with an intense sniper mission, followed by a car chase so speedy that anyone with motion sickness issues may want to read it from a distance. Even a flashback chapter, which explains how the current characters got pulled into this supernatural turf war, can't help but tell its story with a storm of bullets and supernatural explosions. But this volume's most explosive moment comes when Mitsuru has an unexpected family reunion, and learns something that may well blow his naïve young mind. If anyone thought this was a straight-up good vs. evil war, well ... the end of Volume 2 has suddenly made it hard to pick sides. The story moves at a brisk pace thanks to sharp, high-contrast artwork that focuses on the characters' actions and puts aside unnecessary fluff. When Azrael fires her twin pistols and leaps across city streets, her presence stands out amongst everything else—just as it ought to.
Even with a plot that's starting to show some substance, Angel Para Bellum is still basically "girls with guns" and "angels versus demons" smashed together. The more Azrael tries to explain the origins of what she's fighting for, the more it sounds like someone just looked up a bunch of Biblical words, then decided to assign them arbitrarily to this series. Mitsuru's role as the "chosen one," and the family ties that are brought up in the last chapter, are just a couple more off-the-shelf plot devices that are thrown in to make the story sound important. The placement of the flashback chapter is also ill-advised—it's actually the original pilot that kicked off the whole series, but shoehorning it into this part of the series breaks up the flow of the main story. The artwork also disappoints just as often as it impresses, with flat background visuals that look like cardboard city dioramas instead of the real thing, and many areas of white and grey that lack any interesting details or textures. Oh, and the angels' impractical, revealing outfits are as ridiculous and hard to believe as they've always been.
It's a little better than Volume 1, with more back-story and character conflict, but the plot still rests on too many clichés, and the art is only good during gunfights. This one ranks a C.
Vol. 1
(by MiSun Kim, Yen Press, $18.99)
"We are pirates...
Yup, we are totally pirates...
Whatever anyone may think, we are definitely pirates...
We have a captain, a crew (?), and even Robin, so we are absolutely pirates...
Captain Aron is a brainless idiot, and Robin only loves money, but we are still pirates...
Sailing in search of treasure (or not), we are unquestionably pirates...
So, in conclusion, we are pirates...!"
That's right, folks. No matter how many times the "Absurd Armada" may try to convince themselves, their incompetence makes them the last people anyone would expect to be pirates. That's what makes the series so funny: whatever these swashbucklers do, they're going to screw it up. Even funnier is how many variations there are on the "well-intentioned idiot" character type: there's the self-absorbed captain, his ridiculously photogenic first mate, a chef whose culinary skills are literally deadly, and a disturbingly skilled hairdresser (yes, they recruited a hairdresser aboard the ship). What's more, Aron's aristocratic family and the military forces that keep trying to capture him are dysfunctional in their own ways. The series also invents many wacky adventure scenarios, from sea monsters to desert islands to snowy mountain ranges and—in the brilliant final act of this volume—a madcap attempt at stealing the king's treasure, where all the characters show up at once. Full-color art and distinctive character designs make these four-panel strips stand out visually; there's definitely a lot more to the action than just people standing around and trading quips. Between the swordfights, chase scenes, fancy outfits, and incompetent pirates, what's not to like?
It may be in full color, on outsize glossy pages, but it's still a gag strip—and that means lots of stop-and-go storytelling, as Aron's Absurd Armada tries to squeeze in a joke every four panels. Even in the midst of grand battles and world-spanning adventures, Aron and friends try to dish out punchlines of varying quality. When a character overreacts for no reason, or makes an off-color "gay" joke (juuust not a good idea), it's a clear sign that the series is trying to find humor where there isn't any. Every now and then, the format does switch into "standard" comic paneling—but even these moments run on the one-joke-at-a-time structure, instead of telling a continuous story. It's so disjointed that instead of feeling like a high-seas excursion, it's more like we're getting the awkwardly-captioned vacation photos. The artwork also ends up being limited by panel size, with only enough room for character illustrations and not much else. Backgrounds are often forgotten (unless it's something simple like a ship's deck or a castle corridor), and areas of blank space get cluttered up by needless lines of dialogue.
You know, I'm just glad it's a gag strip that doesn't involve high school girls hanging out. Although not terribly sophisticated, Aron's absurd humor still earns a B-.
Vol. 53
(by Tite Kubo, Viz Media, $9.99)
"Ichigo Kurosaki never asked for the ability to see spirits—he was born with the gift. When his family is attacked by a Hollow—a malevolent lost soul—Ichigo becomes a Soul Reaper, dedicating his life to protecting the innocent and helping the tortured spirits themselves find peace.
Ichigo is rescued from the pit of despair once again by Rukia. And she's not the only member of Soul Society who shows up to help out. Now having finally regained his true Soul Reaper powers, Ichigo faces off against Ginjo with no restraints."
If absence makes the heart grow fonder, you're going to fall in love with Volume 53 of Bleach, where several long-missed characters make their comeback. Sure, the Fullbringers and their special powers are nice, but nobody beats Soul Society's finest when it comes to pure swagger. With a single smirk, a slash of a sword, or a wisecracking line, each of the new arrivals in this volume commands attention—that's how charismatic they are, even after all this time. The stylish, dynamic artwork is also perfectly suited to showing off their combat moves: severe columns of ice, razor-sharp petals flying through the air, pure superhuman strength, and more. And if there's anything more exciting than seeing these familiar powers in action, it's seeing how they measure up against Ichigo's newfound enemies. From a visual perspective, Tite Kubo is also back to doing what he does best: extreme close-ups, surprising angles, incredible moves condensed to the most simple, striking lines, and panels that flow effortlessly from page to page. New characters and surprise twists may have caught the attention of fans in the recent volumes of Bleach—yet it's the return to familiar faces that makes this one shine.
Sounds like someone's a little too infatuated with the Soul Society faction in Bleach, simply because of their dramatic re-appearance. In truth, the only thing their comeback does is plunge the series right back into the dumb things it's always done: endless battle scenes, flip-flopping from one fight to another, and zero story or character development. Seriously, Bleach's idea of catching up with a longtime ally is having him say, "Oh, I was training for 17 months since the last story arc, so now I'm super-strong." What, do these people just hang out at the dojo and work out all day? The decision to split up Ichigo's buddies and have them fight against Ginjo's minions one-on-one is even more galling—this is exactly what happened during the previous arc, and shows no creative thinking at all. To make it even more contrived, they're partitioned off into "alternate dimension rooms," which conveniently absolves Kubo of needing to draw proper backgrounds. (He does have a little fun with Rukia's space, though.) Normally, the idea of alternate dimensions provides an opportunity for creative experimentation, but knowing this series, it's just an opportunity to get lazy again.
Sadly, all the great story twists and shocking developments were used up last volume. The battles here have enough entertainment value for a B-, but it's pretty hollow entertainment.
Vol. 1
(by Ema Toyama, Kodansha Comics, $10.99)
"Cell phone novelist Yukina Himuro has decided that, in order to satisfy her fans' demand for love stories, she must experience romance firsthand. But with her icy reputation, how can she find someone willing to play the part of boyfriend? By blackmailing the most popular boy in school, of course!"
Can a typical school romance about a mismatched boy and girl turn out to be insanely good? It can if it's Missions of Love. At first, the concept just sounds generically cute: Yukina orders school heartthrob Kitami to perform various "missions" to help her understand how love works. However, the real fun starts when the two of them lock horns in a series of devious mind games. Yukina, as one might have guessed, is anything but a typical romantic heroine: she's aloof, scheming, and quietly observes people so she can take advantage of them later. Kitami, meanwhile, acts all perfect on the outside, but has some dark motives of his own. That's the real dramatic angle here: the story of this couple is not "When will they fall in love?", but rather, "When will one outwit the other?" The artwork does its best to make these characters likable, even with their dysfunctional personalities—Yukina's piercing eyes and Kitami's textbook pretty-boy looks are an instant attention-grabber. This volume also proves that dialogue scenes can be visually engaging, with various screentones and textured backgrounds helping to fill out blank areas. In many ways, this series simply defies expectations.
The main characters' personalities may defy the norm, but ... isn't that basically the norm these days? Yukina is practically a checklist of all the "negative" traits one expects from the anti-sugary-sweet protagonist: she has no friends, always looks angry, and conveniently has a secret side gig (Teenage cell phone novelist is just another way of saying teenage manga-ka, isn't it?) And then, of course, she focuses on the hottest guy in school—who has a scarily overprotective fan club. Come on, if this series were truly overthrowing genre tropes, it should have at least thrown out the one about going after Mr. Perfect. Then comes the most predictable trope of all: the one where Yukina's pretend-boyfriend scheme may be leading to hints of actual love. Definitely saw that one coming from before Page 1. Even the artwork is subject to the conventions of the genre—the series takes place at school, so expect the usual desks, classrooms, and corridors everywhere. In addition, the childlike character designs will disappoint those who wanted the visuals to at least be as sophisticated as the mind-game-playing storyline.
Okay, so it's still a standard boy-meets-girl romance at heart—but the battle of wills between the two main characters is so addictive that it's totally worth a B+.
Vol. 1: Legend of the Golden Witch
(by Ryukishi07 and Kei Natsumi, Yen Press, $18.99)
Umineko isn't the first locked-room mystery or occult thriller, but it takes these genres to unprecedented heights. This ambitious work includes eighteen key characters, ten very specific prophecies, and jams it all into a manga that spans 500 pages in the first act alone. It sounds daunting at first, yet the story makes itself remarkably accessible. Starting from just Battler's point of view, it then branches out to the cousins, the parents, and the servants, until each member of the Ushiromiya family is introduced in detail—and suddenly, recognizing every single one of them isn't that hard. Then come the ominous pronouncements, a horrific murder (easily ranking among the five goriest things you'll ever see in manga), and emotional breakdowns that hit even harder than the crime itself. The well-dressed, distinctively drawn characters help make this complex story easy to follow, as do the panel layouts with well-spaced images and text. The artwork also has a natural flair for the dramatic, with characters who truly act out their feelings, and lots of creepy, ethereal visions when the series visits its occult side. Once you've been pulled into this world and its severe logic, there's no getting out.
For readers who enjoy innovation and unpredictability, the formal structure of Umineko may be exactly what they don't want. This story basically makes up a bunch of picky rules and conditions so that nobody can question any possible plot holes: here's an exact list of victims and suspects, here's a setting where none of them can leave, and here's a disturbing poem that predicts everything that will happen. Wow, could they possibly pile up any more clichés from the world of mysteries and thrillers? Oh, right, they also included the adorable little kid that suddenly starts acting really creepy. Even one of the story's unique creations—its huge cast of characters—can be a weakness, like in the early stages when they try to introduce all the parents at once. The series' overall balance is good, but some individual scenes just cram too many people into one place. Lots of screaming and overacting may also put off those who dislike extreme melodrama. The artwork has hit-or-miss moments as well, with interior mansion shots that look flat and boring, and conversation scenes that devolve into the much-dreaded "talking head" sequences.
Despite the precise "rules and conditions," this mystery brings out an incredible amount of suspense and horror—enough to earn a B+.
Vol. 2
(by Gail Carriger and Rem, Yen Press, $12.99)
"Settling into her new life as the Lady Woolsey, Alexia finds her days quite challenging whether it is a regiment of supernatural soldiers camped out on her front lawn or the demands of being the Queen's 'muhjah.' There never seems to be a want of new hurdles to overcome. But when stories of supernaturals rendered normal by some unknown force begin cropping up, Alexia has a rather serious mystery on her hands. Can she root out the cause of this phenomenon, which smacks of some larger plot at work?"
Among all the Victorian fiction franchises with sassy female leads, there's one thing that sets Soulless apart: the confident, witty dialogue. Volume 2 of the manga adaptation continues that proud tradition with lots of sarcastic 19th-century comebacks—but the story is just as engaging as the humor, if not more so. Carriger makes the most out of the genre, weaving familiar ideas into a unique adventure: a supernatural mystery with dangerous implications, werewolf family politics, stylish steampunk gadgets, and of course, a few physical altercations. The book is structured as a standard whodunit, but formula aside, readers will be too busy enjoying the comical banter, ever-shifting romantic polygons, an exhilarating airship ride, and some shocking lycanthropic action right at the end. Let's also not forget how well Rem pulls off the look of the series, with wonderfully detailed costumes, lavish backgrounds, and even minor expressions and gestures that give each character the spark of life. Whether it's a formal social function at a London club, or a fight for one's life in a Scottish castle (wow, this story really does go through every possible scenario), each scene is rendered with great artistic polish.
Although it's now a graphic novel, Soulless still gets held back by the conventions of regular prose novels—like taking way too long to become interesting. The main mystery is revealed early on, but all the dramatic revelations and blockbuster action scenes are saved for the last two chapters. That means there's about two hundred pages of formal Victorian dialogue and exceedingly British behavior to wade through. Are you interested in lovers quibbling with each other, or ancient family feuds? Congratulations, that's what you'll have to sit through before they even start figuring out where the supernatural de-powering came from. Compare this to standard seralized manga—where something has to happen every chapter—and the first two-thirds of this book feel painfully slow. It also gives away some of the plot points too easily, as the old "Gun in Act 1 must be fired in Act 3" principle is applied with the clumsiness of an amateur creative-writing exercise. The dialogue can also be overkill at times, despite being so well-written—it's just that nobody uses that many fancy words in real life, no matter how educated and high-society they are.
Probably the best of all the manga-styled Victorian adventures out there, Japanese, international, or otherwise. It's got great art, smart dialogue, and a story that entertains in every possible way (even if it takes a while to build up).
If there's one thing you can count on in Reader's Choice, it's that our very own iron man Eric P. always has something to say! And this time it's words of warning ...
Is there a manga that's rubbed you the wrong way? Or perhaps you have a more positive recommendation? All opinions are welcome at RTO, so feel free to send your reviews in at any time!
Vols. 1-3 Omnibus
(by Yu Aida, Seven Seas, $15.99-16.99)
The secretive Social Welfare Agency takes young girls from the verge of death and gives them a second chance at life—by modifying them into super-strong cyborg assassins. And that's really all there is to what Gunslinger Girl is about. We follow the lives of these cyborg girls and their grown male handlers, with no real linear storyline except for some reoccurring characters.
When I first saw the Gunslinger Girl anime series, like a lot of people I was intrigued by it. It was sad and cruel in a morally questionable way. Does saving these girls' lives justify making them into efficient killing machines that obey orders without question? Jose, one of the handlers, struggles with this issue, while raising his girl, Henrietta, like she was his own daughter/little sister. There was never any clear-cut answer, leaving the series in that moral gray area. There was also one particular controversy with the series, namely the lolicon aspect. Some even flat-out believe this is a fantasy series for pedophiles. I honestly never thought of that watching the anime. Sure the girls are affectionate of their handlers, but it partly has to do with their conditioning as much as a typical little girl's crush.
When I decided to read the manga, however—I unfortunately got that other sense. From where the Il Teatrino anime's story left off, we get a new girl added to the cast, Petrushka, an older one but still aged 16. Her handler has her literally reshaped into the kind of girl he wants to work with and look at. He has her made into a taller, more adult size, he dresses her up in the kind of outfit where she displays her navel, and last but not least he gets her into the habit of smoking. Beforehand, he even "joked" about giving her a belly ring, but even by then, I was finally starting to feel unsettled. If he had said "make her boobs bigger," I would've genuinely been upset. Unlike the anime, I was recognizing this manga as a series about full grown men having full control over underage girls, fashioning them to their personal ideals. Then later we have Triela go undercover as an adult-sized agent—augmented somehow, because she's a cyborg? Either way, despite her true age, her handler takes one look at her adult body, and one cannot help but get the sense of his being taken by her beauty and wondering possible what-ifs.
It was all the last straw and I was officially disturbed. Once the sense of just what audience this manga was made for was finally hitting home, I was unable to shake it since, nor could I continue reading. If you're someone who's better capable of turning a blind eye to these certain aspects, this manga does continue where the anime left off with more missions and adventures for the characters. Yet for all of Gunslinger Girl's popularity, if you find these elements just as bothersome as I do, you're really better off being satisfied with just the anime.
- Your name
- Author/Artist
- Publisher
discuss this in the forum (18 posts) |
bookmark/share with:
RIGHT TURN ONLY!! archives
Around The Web | http://www.animenewsnetwork.com/right-turn-only/2012-12-04 | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.113656 |
0 | {
"en": 0.972180187702179
} | {
"Content-Length": "11186",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:VNQCCJGLE5URLHKY4DWI2P7DT3YMX46X",
"WARC-Concurrent-To": "<urn:uuid:3ba4e4a4-effc-4f6b-9eed-13bbd302a7b6>",
"WARC-Date": "2014-03-13T22:15:27",
"WARC-IP-Address": "173.199.182.120",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:NRMHP2YSSKVMIQKYPFHKHZCSQPTPI5W4",
"WARC-Record-ID": "<urn:uuid:38de8887-983a-4863-9c87-8a8ba0f39626>",
"WARC-Target-URI": "http://www.apug.org/forums/viewpost.php?p=1324128",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 64 | As Roger said "if you could get it going forward."
Unfortunately you can't find it because it's gone. Out of production. Living in the land of Kodachrome.
And it breaks my heart. Kodachrome/Ilfochrome was part of what drew me back to the darkroom after the kid was raised.
I'm just praying I don't have to raise my own chickens to make albumen prints one day. | http://www.apug.org/forums/viewpost.php?p=1324128 | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.322793 |
0 | {
"en": 0.9827511310577391
} | {
"Content-Length": "10402",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:U43DIRNFO6TGMHY2JLIBNKTEJ27ZAW2J",
"WARC-Concurrent-To": "<urn:uuid:5afa21c8-694a-43ab-a486-6f72b49d214e>",
"WARC-Date": "2014-03-13T22:41:26",
"WARC-IP-Address": "173.199.182.120",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:SB47SCGAKNYT6DXORGVESDP2U7M4JVBU",
"WARC-Record-ID": "<urn:uuid:19d49964-c417-492f-b5f2-a4710cb679f7>",
"WARC-Target-URI": "http://www.apug.org/forums/viewpost.php?p=1481575",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 71 | Basically, it's not for geeks who think they can correct anyting in Fauxtoshop after they've utterly botched the exposure in the first place because their idea of a camera is something which is supposed to operate without them thinking at all. In her younger days, even Aunt Maude figured out the sunny
sixteen rule and knew how to put on a slide show of her honeymoon in Peoria using chrome fim. | http://www.apug.org/forums/viewpost.php?p=1481575 | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.337789 |
56 | {
"en": 0.9805434942245485
} | {
"Content-Length": "12170",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:KRY2LLCG37JEWA44FFWTOQFCIBZF7QMA",
"WARC-Concurrent-To": "<urn:uuid:28343210-c318-4bee-a61d-0c0bfdf61a90>",
"WARC-Date": "2014-03-13T21:37:19",
"WARC-IP-Address": "173.199.182.120",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:XLGPRRIXYHW7HIE5CDB2MHQWEA46GOLO",
"WARC-Record-ID": "<urn:uuid:f3c28baf-7c5c-4c30-972c-8c01a4fb1963>",
"WARC-Target-URI": "http://www.apug.org/forums/viewpost.php?p=70998",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 387 |
I spent this afternoon being dragged off to a camera shop to check out his short list: Leica R4 and 5s and a Contax 167MT. The Leicas had f2, 50mm Summicrons and the Contax a Carl Zeiss f 1.7, 50mm. I was able to confirm to him that all were fully working, indeed the Contax (which was much newer) looked virtually unused, and all the glass was in perfect condition. But although I have used an R4 a few times, and the 5 seems to be much the same but with a wider shutter speed range, I had never met this Contax model before. If it was me I'd go for one of the Leicas, if only because I like a traditional shutter speed dial and the Contax has a switch arrangement (but a normal lens aperture ring), but I really do not feel able to comment on the Contax, which was a bit cheaper. It seemed to be a beautiful mechanism, with absolutely no discernible kick from the mirror and shutter, but I otherwise don't know anything about it.
Does anyone have any experience with this camera and feel able to comment on how it compares with an R4 or 5. Specifically: how does the glass compare and which is more likely to be reliable long term under heavy use in a high vibration environment like a Cessna 150 cockpit? The Leica would be used with a power winder (the Contax has an integral winder) and I gather that he plans to keep his new camera almost permanently in the aircraft and use it for this application only, using his existing kit for everything else (Olympus OM bought, I suspect, because that is what I use). A 50mm is all you really need in the air, so he considers that this means that the cost and availability of lenses and other system equipment isn't relevant (in my experience, dream on, but there you go), ditto flash sync etc. He shoots colour neg only, mostly one handed whilst flying the plane with the other.
Many thanks. David. | http://www.apug.org/forums/viewpost.php?p=70998 | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.481783 |
14 | {
"en": 0.926178812980652
} | {
"Content-Length": "55036",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:DBSYIABHZ6JIIMW2Y4OITX7HPLAXQU4I",
"WARC-Concurrent-To": "<urn:uuid:f8f02ea4-f4f7-49c7-a915-1ad3f5f53495>",
"WARC-Date": "2014-03-13T21:44:51",
"WARC-IP-Address": "23.0.160.81",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:CFYESLZMCNF44DE4E3OOLQN6OLTIMKJF",
"WARC-Record-ID": "<urn:uuid:9c7bba74-da0b-4938-bd9d-1ce8721c7bc7>",
"WARC-Target-URI": "http://www.ask.com/question/what-is-the-definition-of-afforestation",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 191 | Advantages of Afforestation?
Afforestation is the process of planting of trees for the purpose of creating woodland or forest. In the context of the common agricultural policy, the term refers to measures co-financed by the European Union to encourage new woodland development with a view to its beneficial effects for the environment.
1 Additional Answer Answer for: what is the definition of afforestation
[uh-fawr-ist, uh-for-]
Q&A Related to "Advantages of Afforestation?"
afforest: establish a forest on previously unforested land
Explore this Topic
Afforestable is the adjective form of afforestation, which means to turn fallow land into a forest. Any land with the capacity to be converted into a forest is ...
Afforest means to establish a forest on previously unforested land. Example of a sentence with the word afforest is: 'We are going to afforest the area that was ...
Afforestment is defined as the act of establishing a forest on a land that has never been forested before. Many governments and non-governments organisations encourage ... | http://www.ask.com/question/what-is-the-definition-of-afforestation | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.088801 |
0 | {
"en": 0.986903190612793
} | {
"Content-Length": "24883",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:CSK7OSUM4FCH4F4MVSLJGCNXPGOIB6MZ",
"WARC-Concurrent-To": "<urn:uuid:ead24d36-42c7-49e6-9129-f4e8f7167119>",
"WARC-Date": "2014-03-13T21:43:19",
"WARC-IP-Address": "208.115.115.85",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:JSH6CAFU2DMBMGDHEDYDKSTAVOJM3FAJ",
"WARC-Record-ID": "<urn:uuid:af871192-bbca-4a01-8b54-d09c0d88638b>",
"WARC-Target-URI": "http://www.avvo.com/attorneys/01730-ma-pamela-brown-1371544/reviews.html",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 75 | Pamela Brown is beyond excellent both as an attorney and a human being. We were fortunate to find her when our monastery community
was in the process of settling in nearby Westford in 2004. As monks we were not particularly savvy when it can to legal and land use issues. She and her paralegal, Lisa, seemingly sailed right through the turbulent process although I am certain it was a matter of long and hard work. | http://www.avvo.com/attorneys/01730-ma-pamela-brown-1371544/reviews.html | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.039691 |
2 | {
"en": 0.9776707291603088
} | {
"Content-Length": "15648",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:L45O43I3ZQQSP24EWQTMD2IDWNV2L6AM",
"WARC-Concurrent-To": "<urn:uuid:d94efea3-195c-40e2-88f6-782255e193bc>",
"WARC-Date": "2014-03-13T22:11:07",
"WARC-IP-Address": "50.56.49.247",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:RLHTHESVNVNZRJUTMTLUSHGLE6ASUE3M",
"WARC-Record-ID": "<urn:uuid:7b63f525-da06-421d-959d-cfc22ac20216>",
"WARC-Target-URI": "http://www.bayweekly.com/old-site/year01/issue9_17/burton9_17.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 1,295 | Bill Burton on the Bay
Vol. 9, No. 17
April 26-May 2, 2001
Current Issue
It Takes All Kinds to Make a Symphony
Dock of the Bay
Letters to the Editor
Burton on the Bay
Chesapeake Outdoors
Not Just for Kids
Eight Days a Week
What's Playing Where
Music Notes
Sky Watch
Bay Classifieds
Behind Bay Weekly
Advertising Info
Distribution spots
Contact us
TV Rules
A Quick Tour Through the 78-Year History of the Boob Tube
-Henry Wadsworth Longfellow, 1807-1882: The Theologian's Tale
n the above, the great New England poet was referring to ships that pass by night, but how appropriate those words are at the moment. This is, I'm told, National Turn Off the Television Week. Ah A look at the big screen, the usual voice followed by canned laughter, then darkness as the picture tube is turned off and silence prevails.
One might even suggest that the bard's Village Blacksmith do better than pull the plug. He could make the week's observance permanent with a mighty blow from his hammer.
Just think. Had television been around on April 19, 1775, today we might all be watching BBC's higher grade of telly programming, seeing we could have lost the Revolution because the Minutemen and their families of Lexington being glued to their screens wouldn't have heard the silversmith ride by with his warning - the British are coming.
The Birth of IC ...
Thankfully, it wasn't until 158 years after the legendary ride across the countryside that the first mention of television appeared in the press - but that's not what it was called. On Dec. 23, 1923, when Calvin Coolidge was in the White House, there were reports of something called the iconoscope - imagine telling someone today that you're going to catch Survivor on the iconoscope. What would be the abbreviation? IC?
Only 17 days before, Coolidge became the first president ever to address the nation via radio, and Silent Cal's message was heard by thousands. Incidentally, what goes around comes around: The president's message was on tax cuts.
Radio was still in its infancy, but 34-year-old Russian-born engineer Vladimir Zworkin had the idea of creating a picture on radio sets. When he demonstrated a crude prototype, people didn't know what to think. More than half the nation hadn't even heard a radio.
On April 7, 1927 - the year that Gene Tunney survived the controversial long count to unseat Jack Dempsey, Babe Ruth swatted 60 homers, Lindy and the Spirit of St. Louis crossed the Atlantic and Sacco and Vanzeti were electrocuted - something called television was formally introduced to Americans.
And the image wasn't some scantily clad lady with suggestive words, or cops and robbers in shoot-outs, or someone trying to make a million bucks by out-surviving someone else on an island - in between commercials, of course. There was Cal's Secretary of Commerce Herbert Hoover in Washington addressing a group of bankers and investors in New York City 225 miles away.
Credit for refining the new movie pictures on radio went to Scottish inventor John L. Baird, with help from Albert Einstein (then still a German). Baird had the audacity to predict that someday television would become a household appliance.
On April 30, 1939, Franklin Delano Roosevelt did Silent Cal one better. At the New York World's Fair, he became the first president to appear on the tube (NBC). It was an occasion I well remember seeing. I was on an eighth grade trip to the Big Apple at the time and got my first glimpse of television at one of the exhibits. But I found Ripley's Believe It or Not display more exciting. After all, I had seen picture shows in movie houses.
On August 26 of that year, there were only 400 TV sets around and black and white images were rather fuzzy, but Red Barber was in the catbird seat broadcasting the first game of a doubleheader played by the Cincinnati Reds and the Dodgers, then still firmly planted in Brooklyn.
...and Couch Potatoes
That, my friends, was also the beginning of another byword across the nation: couch potato. Until then, via radio, sports fans could take in a game while reading the daily newspaper or a book, fixing the porch screen or leaky kitchen sink, maybe even painting a ceiling. But once a picture of the action was available, the couch would become the grandstand.
Of course, all that didn't come about that quickly. A big war was impending and television had to wait - though on August 29, 1940, CBS announced plans to begin experimenting with color TV on its New York station, WXAB.
By 1948, the first TV was installed in an aircraft, a Capital Airlines flight from between Washington and Chicago, and Candid Camera, Arthur Godfrey and Milton Berle were on the menu in homes. Programming was fairly decent back then. Still many homes were TV-less, and those who didn't have sets visited those who did. The big picture tube was round and vulnerable, and if it didn't burn out, one of the smaller tubes did, and everyone would head to another household with a working set.
In 1950, as more homes got sets to pretty much put to an end the potluck supper routine and lugging younger kids in pajamas from house to house so parents could watch I Love Lucy, a not-very-well-known Yankee gave us an inkling of what was to come. He wasn't very popular for speaking out.
Nation of Morons
Daniel Marsh, president of Boston University, delivered the shocker. "If the television craze continues, we are destined to have a nation of morons," he said as he backed up his assertion with the news that a national survey showed children watch TV 27 hours a week, which was only 45 minutes less than they spent in school.
That was about the time that colored screens were becoming available to everyone watching Your Show of Shows, The Gary Moore Show, The Kate Smith Hour, The Steve Allen Show, What's My Line, The George Burns and Gracie Allen Show and Truth or Consequences - all still reasonable family-type productions.
By then, the couch potatoes were not just men taking in sports and The Lone Ranger, but also women and children. People knew what day of the week it was by what was playing on the tube. In the evening, kitchens were lonely places, occupied only long enough to pop TV dinners in the oven, and dining rooms were dark as families took bites with their eyes glued to the tube.
This nation and much of the world has changed. Not only are there television sets in the kitchen, living room, den, workshop, all the bedrooms and the office, but also portables on the beach, in the boat, the RV (primitive camping is setting up in a park without a 19-inch color set complete with video capabilities) and even hooked up to the computer. Let's not forget the hand-held sets used by some to steal a look-see when the golf tournament is on during church services, weddings and - who knows - maybe even funerals.
Kids don't read, they watch. Same with parents, and usually they don't do it together. No one knows who's watching what, and too many of the shows warrant parental nixes, yet the craze continues. TV rules.
And now, this curmudgeon writer who watches probably less than a hundred hours of programming a year learns there's the big week to turn off the TV, which prompts the thought that there's even something wrong with that.
Turning the television off means it has to be on in the first place. Which is the biggest mistake of all. Enough said.
Copyright 2001
Bay Weekly | http://www.bayweekly.com/old-site/year01/issue9_17/burton9_17.html | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.020162 |
18 | {
"en": 0.9724196791648864
} | {
"Content-Length": "90207",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:6L234NL7CXFRQDNNDVVOC6GFZFAJZSNX",
"WARC-Concurrent-To": "<urn:uuid:e3cf2356-3c58-4f96-99e3-9f0914b29b0b>",
"WARC-Date": "2014-03-13T22:23:16",
"WARC-IP-Address": "77.245.91.249",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:TX4A7PZYXZUNLMMYQAEA353NGLFTHVH5",
"WARC-Record-ID": "<urn:uuid:08fcc4fe-695f-49ea-96f8-633a62039efb>",
"WARC-Target-URI": "http://www.belfasttelegraph.co.uk/business/money/investments/inflation-is-the-risk-we-all-face-28485829.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 726 | Belfast Telegraph
Thursday 13 March 2014
Inflation is the risk we all face
The investor is likely to concentrate on essential stocks such as food, water and commodities
The quantitative easing, which both the US and the UK are pursuing, is unprecedented.
It is without doubt the largest reflationary act in history. It has been instigated primarily as a counter to deflationary forces, but there is a fine line between doing that in the longer term and sparking off a bout of serious inflation.
Despite all comments to the contrary, there is a distinct possibility that we could experience inflation, which would cause all sorts of problems for investors over the longer term.
However we are taught to worry only about the short term and in this many investors are appearing bullish, particularly about equities and commodities.
Fear is falling on the markets and whilst investor blood pressures were rising very steeply last year they are now subsiding to the point where investors are again asking where they should be investing. With deposit rates at, or near, an all time low, putting cash here is not the solution. Thus there is likely to be a scramble for assets, especially those that can deliver secure returns — like Life Settlement Funds — irrespective of economic growth, or the lack of it and whether there is either inflation or deflation.
Whilst “austerity” is perhaps too strong a word to describe the economy going forward, it is highly likely to be a less frivolous one. We are less likely to buy a handbag at £700 for example, and more likely to buy something seen as more durable.
This behaviour will also, I think, be seen in the investor, who is likely to concentrate on essential stocks such as food, water and commodities.
Stocks that pay an above average dividend will also be sought, as will certain energy stocks. So things, using the stock ‘green shoots’ phrase, do in the short term appear to be looking better.
Beyond this, however, will be much harder to predict. There is a good chance that this temporary euphoria in the equity markets will be followed by the bout of inflation mentioned above. But would the onset of some inflation be such a bad thing?
One of the least painful ways of dealing with the credit crunch could, for example, be to let house prices rise so that a lot of the bad debt would then be written back into the banks’ balance sheets.
The downside of this would be that it robs investors of the value of their savings and pensions. But as a strategy, it could get a government out of trouble and has done so on many occasions in the past. This said, it would take time for this to happen and in the meantime the good “old lady of Threadneedle Street’s” target of 2% inflation, is unlikely to get much attention.
Taking all this into account then, where is the investor likely to find an inflation-beating investment? A lot will depend on the time horizon the investor has to work with and the exact goals they are seeking to achieve. In addition to the many suggestions mooted in recent weeks in this column, gold is as ever a generally good bet because of its defensive qualities.
Another serious consideration would be to get into investments that are not near the epicentre of the credit crunch. This means taking a hard look at where natural resources are plentiful and where there is growth — for example some of the emerging markets where the demographics are good and the population aspires to higher standards of living. Countries with high cash levels, well-managed economies and rising middle classes that are focussed on improving their own economies should all out perform both the UK and US.
In practice this means taking a serious look at what you currently have and judging what else is available that will fit both your time period and risk appetite.
One thing is sure — “easy” it is not going to be. The days when you could simply pile into a market on general good sentiment are over and you will have to be much more canny to make those profit targets.
| http://www.belfasttelegraph.co.uk/business/money/investments/inflation-is-the-risk-we-all-face-28485829.html | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.044022 |
28 | {
"en": 0.8779032826423645
} | {
"Content-Length": "42732",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:KCFZT3KRNTBJPMRAUWZS2TX7KHFFZFAE",
"WARC-Concurrent-To": "<urn:uuid:12ed3801-94b3-4750-a43a-4d19f0ee415c>",
"WARC-Date": "2014-03-13T21:43:48",
"WARC-IP-Address": "141.101.112.21",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:SFQZFWGIS2Q2NR7LFIARIQEL5CV3QHM7",
"WARC-Record-ID": "<urn:uuid:e8de9aac-c6f6-424d-9c59-a535cfa63820>",
"WARC-Target-URI": "http://www.biblestudytools.com/lexicons/greek/nas/eklegomai.html",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 214 | The NAS New Testament Greek Lexicon
Strong's Number: 1586
Original WordWord Origin
eklegomaimiddle voice from (1537) and (3004) (in its primary sense)
Transliterated WordTDNT Entry
Phonetic SpellingParts of Speech
ek-leg'-om-ahee Verb
1. to pick out, choose, to pick or choose out for one's self
1. choosing one out of many, i.e. Jesus choosing his disciples
2. choosing one for an office
3. of God choosing whom he judged fit to receive his favours and separated from the rest of mankind to be peculiarly his own and to be attended continually by his gracious oversight
1. i.e. the Israelites
4. of God the Father choosing Christians, as those whom he set apart from the irreligious multitude as dear unto himself, and whom he has rendered, through faith in Christ, citizens in the Messianic kingdom: (James 2:
2. so that the ground of the choice lies in Christ and his merits only
NAS Word Usage - Total: 22
choose 4, chose 7, chosen 8, made a choice 1, picking 1, select 1
NAS Verse Count
1 Corinthians2
Bibliography Information
Thayer and Smith. "Greek Lexicon entry for Eklegomai". "The NAS New Testament Greek Lexicon". . 1999. | http://www.biblestudytools.com/lexicons/greek/nas/eklegomai.html | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.126243 |
0 | {
"en": 0.9664102792739868
} | {
"Content-Length": "37753",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:HZ4DWWLFGASGXHSHYCSJBS7F43VTMYJW",
"WARC-Concurrent-To": "<urn:uuid:590e57ae-ef15-4c02-8649-7eedb57ae8cf>",
"WARC-Date": "2014-03-13T21:58:10",
"WARC-IP-Address": "206.225.11.171",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:U7MHX5SXAFEUVA6ESACQ4VM7H25DLYUC",
"WARC-Record-ID": "<urn:uuid:32f659c3-62b1-4e3e-8661-6e8532c20248>",
"WARC-Target-URI": "http://www.bmwmoa.org/forum/showthread.php?69161-Nashville-Vanderbilt-area-restarants&goto=nextnewest",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:11482f7b-6653-4727-bd56-713398e34252>"
} | 169 | The city of Marion, Ar. is hosting the Sultana Exhibit this summer now thru July 26. The Sultana was a steam paddlewheel ship that burned and sank just outside of Marion April 26, 1865. It was and still is the worst maritime disaster in American history. Over 1800 loss of life, as a comparison the famous sinking of the Titanic caused about 1500 lost lives. This is also considered a Civil War event as a majority of the loss of lives were Union pow's being tranported home at the end of that war. The exhibit is in Angelo's Grove Shopping Center 303 Bancario Dr. Behind Wendy's on Highway 64. Exit 10 I-55. The exhibit is 10 minutes north I-40 in West Memphis and 5 minutes off I-55. If your a Civil War, disaster, Mississippi River, or history buff it's a good stop. Probably takes less than an hour to do it. Monday tru Sat. 10 am -5:30 pm Sun. 1 pm- 5 pm. And to top it off, it's FREE. | http://www.bmwmoa.org/forum/showthread.php?69161-Nashville-Vanderbilt-area-restarants&goto=nextnewest | robots: classic
hostname: ip-10-183-142-35.ec2.internal
software: Nutch 1.6 (CC)/CC WarcExport 1.0
isPartOf: CC-MAIN-2014-10
operator: CommonCrawl Admin
description: Wide crawl of the web with URLs provided by Blekko for March 2014
publisher: CommonCrawl
format: WARC File Format 1.0
conformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf | 0.201847 |