id
stringlengths 50
55
| text
stringlengths 54
694k
|
---|---|
global_01_local_0_shard_00000017_processed.jsonl/566 | Port-sparc64 archive
Re: Acer M5229 IDE bugs (esp. on sparc64)
On Thu, Feb 14, 2008 at 03:59:53PM -0500, Rafal Boni wrote:
> Thanks for the reply, Manuel.. glad to have input from someone who knows
> the code and ATA(PI) subsystem well!
> Manuel Bouyer wrote:
> >On Thu, Feb 14, 2008 at 02:17:47PM -0500, Rafal Boni wrote:
> [...]
> >>I see that wdc->dma_status is always 0x04 (WDC_DMAST_UNDER), which is a
> >>synthetic error generated only by pciide_dma_finish(). I'm guessing
> >>that the suspect pciiide_dma_finish() is the one called from wdcintr().
> >> Because the rev of the M1559 IDE controller I have doesn't have a
> >>chan-id register to determine which channel caused an interrupt, for
> >>this chip we end up *always* checking both channels, and the code in
> >>wdcintr() / pciide_dma_finish() looks very suspicious... stop DMA first,
> >>ask questions later.
> >
> >AFAIK it's not: before stopping the DMA channel, we check if the controller
> >did interrupt (status & IDEDMA_CTL_INTR).
> A minor point of clarification here... is that status per-controller, or
> per-channel?
It's supposed to be per-channel
> Note that this controller is running in native-PCI mode
> and there is no register to tell is which channel interrupted (see
> aceride.c, ~ line 238). I'm wondering if one channel interrupting could
> have caused the early-DMA termination on the other.
If the IDEDMA_CTL_INTR bit is accurate, it should not. Of course
IDEDMA_CTL_INTR is only meaningfull for DMA transfers, not PIO.
One thing we could make it add a check in pciide_dma_start() that
IDEDMA_CTL_INTR isn't already set.
> >We have to stop the DMA first, because in some case the DMA engine will
> >still
> >be active at end of transfer (if the device has less data to return than
> >requested for example - as the comment says, it's a valid condition for
> >ATAPI devices).
> Interestingly enough, the ATAPI devices connected to this controller on
> both my machines (a V100, V120 and a T1/200) and machines Julian tested
> (a Blade 100 at least, maybe a V120 as well) both are unable to do any
> sort of DMA to/from the CD anyway. I'm not sure it's related to this,
> but maybe... (and not just UDMA... the CD downgrades right through the
> UDMA range to MW DMA and then to PIO 4). Of course, I have no PC's with
> this cursed controller to test if/whether this is somehow related to
> the sparc64 platform or a generic issue ;)
From what I remember when I had such a PC, it's a generic issue.
Some controllers just can't properly do DMA for atapi devices, as they
can't handle non-512 byte transfers.
> >>FreeBSD looks like it does the checks a bit differnetly (their whole
> >>handling of the Bus-Master DMA status register -- IDEDMA_CTL -- is a bit
> >>different, but they key is they look like they check the active status
> >>(IDEDMA_CTL_ACT) before attempting to kill the dma vs. our kill-1st,
> >>check if active later.
> >
> >If this chip asserts IDEDMA_CTL_INTR supriously, and we need to check
> >IDEDMA_CTL_ACT instead, then it's broken. So it needs a private intr
> >routine, and it needs to disable DMA for ATAPI devices.
> Hmm, ok. Is there a reference somewhere for how CTL_INTR, CTL_ACT and
> generation of the actual hardware interrupt should behave with respect
> to each other? What I'm after is a way to actually test if the chip is
> asserting IDEDMA_CTL_INTR spuriously or not.
See http://pdos.csail.mit.edu/6.828/2007/readings/hardware/IDE-BusMaster.pdf
> (The other reason I ask is that given what you say, I can't understand
> why FreeBSD would pre-load that register with CTL_INTR | CTL_ERR (or the
> equivalent bits there... (ATA_BMSTAT_INTERRUPT | ATA_BMSTAT_ERROR)).
This is to clear the interrupt and error bits. They are cleared by writing
a 1 to them (quite classic for bits set to 1 by hardware).
We do it in pciide_dma_init() and pciide_irqack() by writing back the
value we just read from the register.
Manuel Bouyer <bouyer%antioche.eu.org@localhost>
NetBSD: 26 ans d'experience feront toujours la difference
Home | Main Index | Thread Index | Old Index |
global_01_local_0_shard_00000017_processed.jsonl/567 | Subject: NetBSD master CVS tree commits
To: None <[email protected]>
From: None <[email protected]>
List: source-changes
Date: 07/02/1997 05:50:01
Tue Jul 1 22:42:14 PDT 1997
Update of /cvsroot/src/usr.bin/su
In directory netbsd1:/var/slash-tmp/cvs-serv13299
Modified Files:
Makefile su.1 su.c
Log Message:
As per discussion with mrg, back out parts of previous change.
The appropriate entry in /etc/group as returned by getgrnam() is
used to determine if 'su root' may be permitted, rather than
checking if membership exists in the result of getgroups().
The following changes were made regarding the behaviour of the special
group for 'su root'
* allow for definition of SUGROUP (defaults to "wheel") to override group name.
* use getgrnam(SUGROUP) instead of getgrgid(0).
* only scan getgrnam(SUGROUP)->gr_mem when checking for group membership.
* be more specific as to why 'su root' failed
NOTE: If a user's primary group is SUGROUP, and they're not a member
of SUGROUP in /etc/group, they will not be able to su. |
global_01_local_0_shard_00000017_processed.jsonl/569 | Subject: Re: new kpi proposal, sysdisk(9)
To: Elad Efrat <>
From: Bill Studenmund <>
List: tech-kern
Date: 12/31/2006 09:43:41
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
On Sun, Dec 31, 2006 at 01:26:13PM +0200, Elad Efrat wrote:
> Bill Studenmund wrote:
> > One other use for this, though, comes to my mind. It involves the=20
> > raw-access ioctl discussions we had. Unfortunately I do not remember th=
> > outcome of this discussion, but what you're describing above strikes me=
> > a great basis for deciding if "command bypass" ioctls should be blocked=
. I=20
> > personally am much more likely to trust a driver to get the partition=
> > bounds checking code right as opposed to getting every nuance of=20
> > pass-through ioctls right.
> okay, so this becomes an implementation question.
And thank you for being patient with me in this thread. :-)
> showed in this message:
I prefer the latter for two reasons. 1) It gives us a fairly stable=20
disk. We could keep the count in the whole-disk vnode, but then we'd be=20
wasting space in all the other vnodes (since we'd have to have space in=20
the struct they all share). Even if we added the count only to device=20
vnodes, we waste space.
in tty drivers are just calls to tty subsystem routines after the driver=20
verifies the minor number and gets the struct tty.
which you pass the struct disk & all other ioctl parameters. If it returns=
anything other than EPASSTHROUGH, we return that value.
device. Callers ask the driver for its struct disk then they operate on=20
it directly.
I tend to like idea (1) as it encourages all of the processing in one=20
routine we write. (2) encourages disparate parts of the kernel to start=20
knowing about struct disk internals. (1) seems less prone to future=20
problem. :-)
contributed drivers.
Take care,
Content-Type: application/pgp-signature
Content-Disposition: inline
Version: GnuPG v1.4.3 (NetBSD) |
global_01_local_0_shard_00000017_processed.jsonl/571 | Subject: Re: everything is a dependency and preventing removal
To: Jeremy C. Reed <>
From: Alistair Crooks <>
List: tech-pkg
Date: 01/10/2003 10:01:17
On Thu, Jan 09, 2003 at 12:20:32PM -0800, Jeremy C. Reed wrote:
> I am using pkgsrc as a complete operating system, in other words, it
> provides a kernel, glibc (and other libs), gcc, binutils, important shell
> utils, tar (or alternative), ftp client, et cetera.
> Can anyone share an ideas, experiences or examples of other operating
> system packaging tools for preventing accidental removal of important
> packages?
> For example, pkg_add may need tar, maybe gzip libs, maybe ftp, and maybe
> some basic shell utils.
> I guess a few packages could use some identifier indicating that they
> should never be permanently removed, but only updated.
> In my particular case, I could have some .mk definition to set
> DEPENDS+= to a few packages to apply for all packages. That way deleting
> sh-utils (for example) couldn't be removed until all other packages were
> removed first -- which would become impossible.
> So then how to update sh-utils in this case?
> I guess I should also look at the syspkg tools to see what it does to
> prevent accidental removal of /bin/cat or /bin/sh for example.
> Any ideas or pointers would be appriciated.
Not sure about appriciation, but I've been wondering for a while now
if we shouldn't add some kind of analogy of an immutable flag to
packages, which would prevent pkg_delete from deleting a package if it
was present. This might be in the form of yet another variable that
gets sprinkled around package Makefiles, and stored in the package
metadata in ${PKG_DBDIR}, or maybe just a simple chmod in/on the
package metadata dirs, although, as operations on there are done by
root, this may not be as immutable as people would want.
Unfortunately, chflags isn't portable across all the operating systems
that pkgsrc supports.
This would replace the clunky ways we have of doing things at the
moment - see the pkg_install package, and also have the side-benefit
of allowing us to make binary packages of these "non-removable" ones.
Anyway, "we're working on it".
Take care, |
global_01_local_0_shard_00000017_processed.jsonl/573 |
1. YayDIY says:
I love these! I saw something in similar in the windows of Papyrus earlier this year and was wondering how to re-create the look for spring. I think I might make some for the front door. :) |
global_01_local_0_shard_00000017_processed.jsonl/579 | Take the 2-minute tour ×
My 2004 PT Cruiser just flashed the internal battery light. I was able to drive home, but I noticed that the LED lights on the clock were flickering. I played with the RPM of the motor a bit(manual transmission) and did not see a change. It Seemed to bounce with the roughness of the road.
I have a lot of miles on this car, and it would not suprise me if it was the alternator. I just got a new battery this summer. However, it is acting like a loose connection. How could I tell? I don't want to spend the bucks if I can just tighten a connection somewhere and solve it.
share|improve this question
add comment
2 Answers
Have you checked that the connections to the battery are snug? I don't think a bad connection at the alternator would turn your battery light on, that usually happens when the battery itself is low/disconnected. I would look at the wires on the battery and make sure they are tight and free of corrosion and also follow them to as many connections as you can.
Another possibility is that one of your main fuses is loose or on the brink of failure. I would check that all your fuses in the fuse box are snug and intact, especially the big ones that are mounted using screws.
share|improve this answer
add comment
You can do a very simple check of your alternator by simply measuring the voltage across the battery terminals with the car running. A good alternator would put you somewhere around 14 volts. While performing this check, you should examine the condition of the connections at the battery terminals, as well as the large ground strap from the battery negative to something metal on your engine/frame, and the connection from the alternator to the battery. Look for loose or corroded connections.
A thorough test of your alternator can be done at your local auto parts store, if you bring them the bare alternator. It's a good idea to have them do such a check before you shell out the money for a new one.
share|improve this answer
If he was accelerating the car and nothing happened (it didn't shake or completely turned off) I doubt the issue is at the alternator. – PedroC88 Oct 24 '13 at 20:57
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/583 | When I browse to a question page, one of the requests doesn't complete as times out after 2 minutes. Looking at the source it looks like it's a <script>. This blocks/delays some of the JavaScript on the page. The rest of the page renders properly and I can see all the questions & answers, but the browser 'busy' spinner is still there.
For instance for question: Is svn global ignore recursive?
The request to: http://stackoverflow.com/posts/7599489/ivc/c30c times out after 2 mins.
I happens on all my browsers (IE8, FF 7.01, Chrome 14).
Note: We have a very strict proxy here which tries to strip out ads, spam and social networking sites.
EDIT: I have attached a screenshot from Firebug of the offending request:
enter image description here
share|improve this question
Can't repro, page loads fine. Try without your proxy. – Mat Nov 4 '11 at 10:26
No repro. I can't even find the file you mentioned, can you please point us to the exact resource? Screenshots of Firebug (or similar, showing the timed out request) are welcome, too. – Time Traveling Bobby Nov 4 '11 at 10:27
FYI, it's not even a JavaScript file, so it not loading should not cause any issues with the interface. – lunboks Nov 4 '11 at 10:52
lunbocks - As I said below, all JavaScript execution is blocked until the 2 minutes is up. Meaning that I can't for instance comment on something until it's timed out. Also - the syntax highlighting and the orange background highlighting the current answer remains that colour until the 2 minutes are up. – Phil Peace Dec 5 '11 at 14:07
add comment
1 Answer
That request returns a HTTP 204 No Content. While that's perfectly legal, some broken proxies are known to choke on that. My guess is that's what happens in your environment.
share|improve this answer
I think that's most likely the case. Because it's trying to download a <script> JavaScript is blocked until it times out. – Phil Peace Nov 4 '11 at 11:00
add comment
You must log in to answer this question.
Not the answer you're looking for? Browse other questions tagged . |
global_01_local_0_shard_00000017_processed.jsonl/584 | I have accepted one anwer and I had given one up vote to the answer and again tried to give one more upvote then the vote count was decreemented to the answer and now I can not upvote the anwer like there is one vote already then I upvoted to the answer then vote count to the answer was 2 then I again tried to upvote then vote count was then 1 again and now it canno be upvoted by me,then what is the problem can not I now able to upvote the answer now onwards and other question is can not I give the two upvotes to one answer ?
Error comes like : Vote too old to be changed, unless this answer is edited (click on this box to dismiss)
share|improve this question
is that a riddle? – Nick Dandoulakis Apr 2 '10 at 12:50
@Nick D: I think it's one of those cryptic riddles that doesn't have an actual answer, but prompts you to reconsider your own psyche. – Phoshi Apr 2 '10 at 12:56
I guess that meets the "describe your problem in one sentence" rule. – Gnoupi Apr 2 '10 at 13:02
possible duplicate of meta.stackoverflow.com/questions/6250/… – alex Apr 2 '10 at 13:54
add comment
1 Answer
up vote 1 down vote accepted
Unfortunately, this is normal. When you tried to add a second vote you actually removed the first vote. Now you can't re-upvote due to the "vote too old to be changed" rule. If you post a link to the answer, one of us will edit it for you so you can re-upvote it.
share|improve this answer
@Hari - there you go - you should be able to upvote now. – user27414 Apr 2 '10 at 13:20
add comment
You must log in to answer this question.
Not the answer you're looking for? Browse other questions tagged . |
global_01_local_0_shard_00000017_processed.jsonl/604 | You Really Wanna Reform Politics? First thing we do is kill all the laws that limit campaign contributions
By Jon Birger
(MONEY Magazine) – My favorite political website--hands down--is, a financial database run by the Center for Responsive Politics. With a few keystrokes, visitors can find out anything, from which House member gets the most money from pharmaceutical companies (Rep. Mike Ferguson, R-N.J.) to which candidate Warren Buffett supported, at least financially, for President (Sen. Bob Graham, D-Fla.).
Maybe it's the journalist in me, or just my libertarian streak, but it seems that putting such information at the fingertips of voters is a far more effective way to clean up politics than passing laws that cap how much money people give to parties or politicians. Look at what's happened in the year since the McCain-Feingold campaign-finance bill became law. Barred from making six- and seven-figure donations to political parties, unions and corporate fat cats are now sending their cash to private groups unencumbered by McCain-Feingold. These are the folks who run those oh-so-helpful issue ads imploring voters to "call" Congressman Jones and "ask him why" he raised your taxes or denied your sick grandmother drug benefits. The liberal group just got a whopping $5 million from George Soros and his pals.
I don't see the difference between Soros giving millions to and his donating directly to the Democratic Party. Besides, in a free society, people should be able to spend what they want to push whichever causes and candidates they support. What we need aren't more restrictions on giving but more disclosure on what that money is buying. An ex-Capitol Hill staffer exaggerates only slightly when she tells me that "98% of constituent meetings are with people who contribute money." Maybe I'm naive, but I have to think that laying bare the connection between money and influence would shame politicians into being better public servants.
So here's my idea: Require pols to log all lobbyists and contributors with whom they or their staffers meet and make that information available online. There would be loopholes for national security, and congressmen couldn't be expected to remember everyone who buttonholed them at the local Safeway. Nevertheless, when it comes to disinfecting Washington, partial sunlight would be better than no sunlight at all. --JON BIRGER |
global_01_local_0_shard_00000017_processed.jsonl/622 | 5,354pages on
this wiki
Back to page
Revision as of 10:26, May 19, 2013 by Elveonora (Talk | contribs)
Episode 111
in the preview of shippuden episode 111, it shows tobi and deidara attacking the three-tails-- (talk) 19:19, 29 May 2009 (UTC)
And the point is? Jacce | Talk 19:30, 29 May 2009 (UTC)
Main image
For reason that are beyond me, the anime depiction of the Three-Tails is quite different from the manga depiction. Seriously, it's the exact same scene. They could have literally traced the manga... I therefore propose using the manga image as the main image in the article. --ShounenSuki (talk | contribs) 17:56, 4 June 2009 (UTC)
I dunno..i kinda like the anime image...If it was upto me, i'd replace the manga image as soon as the anime comes out, cause of better graphic's, resolution, color, etc...AlienGamer | Talk 18:39, 4 June 2009 (UTC)
I'm surprised ShounenSuki, to think you'd take up this stance. Regardless, the anime pictures are preferred over the manga. (We've been waiting for a clear picture of the three-tailed beast since the arc started. No fog or anything). The manga picture remains on the page because the coloration is so different.--TheUltimate3 (talk) 18:03, 4 June 2009 (UTC)
I was under the impression that the anime images were preferred over the manga images because the anima is in colour and often the manga is of a very low quality. Neither applies to the Three-Tails' manga image. Also, I am mostly suggesting this because the anime version looks so very different. the manga shows us the Three-Tails as Kishimoto intended it and not a version that looks like the Three-Tails' retarded fat brother...--ShounenSuki (talk | contribs) 18:22, 4 June 2009 (UTC)
O.o..some1 doesn't approve of the anime..but still ecrything the anime does is with permission frm Kishimoto. He has the right to say yes or no, to watevr they produce. These are the basic terms given to a film company by an author. So, since its produced, i'd think it was approved...But still...i'd prefer an anime pic to a manga pic has better clarity, resolutions, color, etc...evn though the 3 tails manga pic is good, the anime pic is better..yes the coloring mite be different, but a vast majority watches the anime more than read the manga, or watches and reads the manga...Only a small minority only reads the manga, so i'd say, that the anime pic caters to a larger audience..but then again, this is only my opinion..AlienGamer | Talk 18:39, 4 June 2009 (UTC)
To correct, a large amount of people read the manga. We'd be out of a job (lol) if that weren't the case. Anywho, I prefer the anime picture, out of consistency. When the anime reaches that point, then that picture is used. Hasn't failed us yet.--TheUltimate3 (talk) 18:44, 4 June 2009 (UTC)
@TheUltimate3: You know how much I love consistency, but I'd take accuracy over constancy any day. Again, if the differences weren't so big, I wouldn't even think of replacing the anime image.
@AlienGamer: As far as I know, Kishimoto has absolutely nothing to do with the anime. And although the anime usually has better quality, the problem simply isn't quality here. Just compare the to images, there are major differences between the two Three-Tailses that go beyond simple colours. --ShounenSuki (talk | contribs) 18:59, 4 June 2009 (UTC)
Well, you do have a point....I have no objections to switchin the manga image as the main 1, and placin the anime image somewhere in the article..AlienGamer | Talk 19:02, 4 June 2009 (UTC)
I still say use the anime picture. So as always, report to Dantman and let the boss decide.--TheUltimate3 (talk) 19:38, 4 June 2009 (UTC)
I really don't see how the anime depiction is a huge leap from the manga depiction. The underside of the tails are armored, the anime was able to draw the eye smaller, other than that... it looks the same to me. ~NOTASTAFF Daniel Friesen (DanTMan, Nadir Seen Fire) (talk) Jun 4, 2009 @ 20:31 (UTC)
Are you serious? Maybe it's just me, but in the manga:
• The edge of the plate is rounded
• The undersides of the tails are red
• The spikes on the tails' ends are longer and more slender
• The fangs of the lower jaw are longer
• The spikes around the head are more irregular
• The spikes on the crown of the head are far smaller
• The eye is larger
• The body is less round
• The shell is less flat
• The spikes on the shell are more asymmetrical
• The spikes on the shell are spikier and more slender
• The jaw is less crooked
Also, in the anime picture it seems as if the Three-Tails has four tails. --ShounenSuki (talk | contribs) 22:00, 4 June 2009 (UTC)
Tails can curl perhaps?--TheUltimate3 (talk) 22:05, 4 June 2009 (UTC)
The extra tail is just the middle one coming back down from the top of the screen. The majority of those notes are likely medium differences, anime and manga are not produced the same. Especially things like rounding. Then there's also perspective. ~NOTASTAFF Daniel Friesen (DanTMan, Nadir Seen Fire) (talk) Jun 4, 2009 @ 23:10 (UTC)
I know the "fourth" tail is simply the end of the middle tail, but it still looks like a fourth tail, which an be confusing. At least the manga image shows the whole tails. And in my opinion, the differences I named are big enough to warrant an image change. Funny thing is, it almost seems as if the anime makers made the Three-Tails fatter on purpose. In the anime, the sides of the shell of the three-Tails is round, while in the manga the sides of the shell are very clearly concave... It seems as if the anime makers wanted to make the Three-Tails more cartoonish.
Well, I stated my opinion. If I can't convince you people, I'll let it rest. I'll be bugged by it each time I visit this article, though >< --ShounenSuki (talk | contribs) 23:23, 4 June 2009 (UTC)
Random note here, but they have done this plenty of times with other parts in the anime. When Naruto first ever goes into the first-tail state, it is a clear-cloak, instead of the bubbles you can clearly see in the manga. The demon fox, where in the anime actually looks like a fox during the Naruto/Sasuke fight, in the manga it just looks like an evil, demonic face with strange evil eyes. The fox that Gamabunta and Naruto turn into only has one tail, where as in the anime it is the nine-tailed fox. The anime has always changed the details a bit. --Juubi no Ryuu (talk) 18:05, 20 July 2009 (UTC)
I just opened this page, and noticed the fourth tail looking thing, so I decided to look at the talk page, and I have to say, I think we should change the anime for the manga pic. Just my opinion.Papayaking (talk) 00:37, 3 August 2009 (UTC)
Is it really not possible to find an anime screenshot of the beast without the end of the third tail looking like a fourth tail? ~Hakinu (talk | contribs) 00:40, 3 August 2009 (UTC)
Titans help us. It's gonna look like a fourth tail because people refuse to except that tails have the ability to curve. There is nothing, nothing wrong with the picture we have now.--TheUltimate3 (talk) 00:55, 3 August 2009 (UTC)
No, I'm just saying it might be confusing to people who are new here, and then they're going to come here and complain until someone points out THEY CAN CURVE, then another new person will come and the cycle will continue...Papayaking (talk) 01:16, 3 August 2009 (UTC)
Titans won't save you, sorry :\ Anyway, all I'm saying is that the image is misguiding for people who doesn't know it's curving. I didn't. ~Hakinu (talk | contribs) 01:18, 3 August 2009 (UTC)
three tailed jinchuriki
So Yagura is the three tailed' jinchuriki in manga, and yukimaru is the three tailed' jinchuriki in anime?¿ -- (talk) 22:33, September 14, 2009 (UTC)
I'm not an expert on the anime, but I do believe that Yūkimaru wasn't a jinchūriki at all. --ShounenSuki (talk | contribs) 22:36, September 14, 2009 (UTC)
Yūkimaru was never said to be a host, he could just control the beast. Jacce | Talk 04:33, September 15, 2009 (UTC)
i am confused, in the abilities section it says that the 3-tails has an affinity to water, but it does not have the water icon on the page and i also don't remember that being mentioned. (talk) 21:27, December 3, 2009 (UTC)
Portal to Another Dimension At Bottom of Lake (anime)
When Guren and Yūkimaru get sucked under water after Guren's attempt with her Crystal Release: Jade Crystal Hexagonal Pillars fails, (i think episode 99), Guren makes a mention of "That's the dimension where the Three-Tails appeared! If we're swallowed by it....". Can somebody explain this, please? --Sageofsixpaths (talk) 02:38, December 17, 2009 (UTC)
Isn't Kiri his affilation?-- (talk) 20:44, March 13, 2010 (UTC)
Akatsuki Base
when ever madara go to talk or whatever there is a giant skeleton there could this be the turtles remains?
facepalm* The turtle is sealed inside the Gedo Mazo. Omnibender - Talk - Contributions 21:59, April 5, 2010 (UTC)
ahhhh your right there made of chakra hahaha sorry—This unsigned comment was made by Jake5228 (talkcontribs) .
Four tails?
What the... In the image it has 4 tails! -- Lidor 02:13, August 11, 2010 (UTC)
The two parts in the middle are the same tail, it goes up and down, like an upsidedown U, but the turn is offscreen. Omnibender - Talk - Contributions 02:14, August 11, 2010 (UTC)
Ah, OK Thanx -- Lidor 02:50, August 11, 2010 (UTC)
Reading of 亀 kanji?
Isn't it "kame" reather then "game"?
It is, except in certain combinations with other kanji. —ShounenSuki (talk | contribs | translations) 12:16, October 9, 2010 (UTC)
Chapter 571
In chapter #571. It's been noticed the Three-tails used a technique that roll around itself to make a destructive attack, it somehow looks like Chōji's Spiked Human Bullet Tank. Can we add it as a technique in the infobox? Shakhmoot (talk) 16:17, January 25, 2012 (UTC)
I wouldn't say it's using that jutsu, it was simply rolling around.--Deva 27 16:22, January 25, 2012 (UTC)
Alright, but I think it adds a credit for the Three-Tails' character that it can roll around so easily unlike the other Tailed Beasts, right? So can we add it at least as an unique trait? Shakhmoot (talk) 16:30, January 25, 2012 (UTC)
It's not exactly unique for turtles to you know... roll but that much is exaggerated for lack of a better word but still not a "unique trait".--Cerez365Hyūga Symbol 16:35, January 25, 2012 (UTC)
you got the name wrong, it's isopu not isobu —This unsigned comment was made by Dayle14 (talkcontribs) .
Not what our translator says. Omnibender - Talk - Contributions 18:29, February 3, 2012 (UTC)
Spinning Technique
Hello? I am a Wiki Contributor, I just noticed that you already talked about the fact that if the spinning movement the three-tails used in chapter 571 is a Jutsu or not, I just wanted to tell you that it can actually BE a Jutsu, I am a fan of Naruto since years ago, I never miss one chapter of both Manga or Anime, and I know enough to even be in the Wiki if I want, I am just giving you my opinion, but I am just saying, that it could be cool if you post his spinning tachnique like a Tailed Beast Taijutsu :). Besides, the spanish version of this Wiki has it, why dont you?--—This unsigned comment was made by (talkcontribs) .
Heller Wiki Contributor. There was a jutsu page created for it but it was deleted, you can check here to see why. Basically it's just a turtle rolling. If Kishimoto decides to make it a technique that's fine, but for now it just seems like rolling. Also, please remember to sign your posts using four tildes (~~~~) or the signature button--22:16, March 14, 2012 (UTC)
Colored manga appearance
There's always a difference between manga and anime, and since the Three Tails has a coloured page in the manga (its debut), should we put it in his Appearance?--Spcmn (talk) 20:20, July 21, 2012 (UTC)
what difference is that? ----Cerez365Hyūga Symbol(talk) 20:22, July 21, 2012 (UTC)
Minor details like the internal portion of the tails and the body structure. The eyes as well.--Spcmn (talk) 20:27, July 21, 2012 (UTC)
3 known jinchūriki trivia
I think it's worth nothing in the trivia section of this page that Isobu and Kurama both have had three known jinchūriki. And perhaps also that where Kurama had 2 females and one male jinchūriki, it was the opposite with Isobu who had one female and two males as his container.--Reliops (talk) 10:21, May 8, 2013 (UTC)Reliops
You were taught how to count, weren't you? :) Where do you see 3, only Yagura and Rin were its known jinchuuriki, unless I'm missing something--Elveonora (talk) 10:26, May 8, 2013 (UTC)
Whoops, mixed the Isobu up with the Seiken. My bad. No need to be a dick about it though.--Reliops (talk) 11:03, May 8, 2013 (UTC)Reliops
Saiken would still be 2 though.--Cerez365Hyūga Symbol(talk) 11:05, May 8, 2013 (UTC)
I mistakenly counted Utakata as Isobu's jinchūriki.--Reliops (talk) 11:11, May 8, 2013 (UTC)Reliops
It's okay to be a pussy about it, no worries--Elveonora (talk) 11:15, May 8, 2013 (UTC)
Watch it. Omnibender - Talk - Contributions 01:49, May 9, 2013 (UTC)
My bad. @Reliops, it's okay to make mistakes but if you can't see it stated anywhere that it had 3 hosts, then it must have had only 2 with Rin included. But even if it were true, I don't think such a trivia is necessary, it has no relevance if they were male or female thus isn't of high significance enough to be noted. For the other bit, you complained about and called me a di** so I sarcastically answered by calling you an opposite of that. It wasn't meant to invoke anything, I just found it funny. So my apologies if you felt offended, yes it was stupid of me to respond in such a manner and I'm going to change it a little bit right away. So in the end, it might be sight problems instead, nothing with math.--Elveonora (talk) 11:13, May 9, 2013 (UTC)
how do we know yagura wasn't isobu's jinchuriki before rin?, how do we know it wasn't extracted from yagura and then sealed into rin?, then revived wherever it was when deidara went after it?--Caseather (talk) 21:13, May 8, 2013 (UTC)
Because Isobu was Yagura's Biju when Obito controlled him. Rin died before Obito took control of Yagura, and you could forgive yourself the "fools"--Elveonora (talk) 21:15, May 8, 2013 (UTC)
True, Obito's manipulation of Yagura proves that the man was alive long after Rin died. -- (talk) 14:07, May 9, 2013 (UTC)
as much as i hate speculating, technically we don't know that last part, for one we don't even know how old yagura lived to be(beyond being an adult)and we certainly don't know that he was even mizukage at the time of the third shinobi world war or even that he was alive during it, although he most likely was because otherwise he'd be younger than kakashi, which is technically possible but still. --Caseather (talk) 22:35, May 9, 2013 (UTC)
Obito can control jinchuuriki, I doubt he could hold him under genjutsu without Yagura having a tailed beast inside, not to mention it more than certainly happened after Rin got killed since Obito turned "evil" after that point and he was recuperating before that.--Elveonora (talk) 11:10, May 10, 2013 (UTC)
Sanbi is sealed in Rin, Rin dies, Sanbi dies and respawns later, is sealed in Yagura, Yagura dies, Sanbi dies and respawns again and is captured by Akatsuki. It can only be this way, since Obito controlled Yagura after Rin's death. We don't know if Yagura was Mizukage at the time of Rin's death, but that doesn't matter. Seelentau 愛 12:19, May 10, 2013 (UTC)
Sanbi is in Yagura under the control of the real Madara who reveal's himself to Kisame and adds him to the Mist ninja who no the truth and yet are still loyal to him.
Obito is saved by Madara meanwhile in the ongoing 3rd war Ao kills a Hyuga and gets the Byakugan which allows him to break the genjutsu on Yagura who then either kills himself in shame at being controlled or is killed from having the sanbi extracted the by the Madara loyal mist shinobi who then under Madara's orders capture Rin and seal the sanbi in her as a way of breaking Obito and making him loyal to Madara's cause.
Because how else do you explain the Mist choosing to obduct the one shinobi that is the most important to Obito where it turns him evil for Madara to use? (talk) 19:20, May 18, 2013 (UTC)Ushio46.65.118.61 (talk) 19:20, May 18, 2013 (UTC)
Two flaws in your plan, when Tobi revealed himself to Kisame later, Kisame referred to him as "Mizukage-Sama" referencing that he recognised Obito as the person he collaborated with, not Madara. Secondly, Madara couldn't leave his cavern because he needed to be connected to that statue to live. -- (talk) 20:10, May 18, 2013 (UTC)
i thought he called obito "moto mizukage-sama"--Caseather (talk) 23:08, May 18, 2013 (UTC)
He did. That correction came in the volume release. Omnibender - Talk - Contributions 01:04, May 19, 2013 (UTC)
Real Madara was half-dead by the time he and Obito met, there's no way it was him who has met Kisame since that person appeared to have had dark hair still and walked straight. Not to mention there wouldn't have been any reason to obscure the face if it weren't Obito back then.--Elveonora (talk) 10:26, May 19, 2013 (UTC)
Around Wikia's network
Random Wiki |
global_01_local_0_shard_00000017_processed.jsonl/689 | Frozen Pinewood River
Frozen Pinewood River
by Jakub
submit your photo
Hall of Fame
View past winners from this year
Please participate in Meta
and help us grow.
101 reputation
bio website
location Pune, India
age 23
visits member for 1 year, 5 months
seen Sep 26 '12 at 12:21
Software Developer... GOD(read as Google Oriented Developer)
foreach(second s in MyLife)
This user has not answered any questions
This user has not asked any questions
This user has not participated in any tags
Stack Overflow 261 rep 213
Sports 201 rep 14
Server Fault 101 rep 2
Super User 101 rep 2
Meta Stack Overflow 101 rep 2
1 Vote Cast
all time by type
1 up 1 question
0 down 0 answer |
global_01_local_0_shard_00000017_processed.jsonl/703 | Take the 2-minute tour ×
I'm trying to find out your decision rationale of when to do what. Would be great to learn from you. I'm happy to provide more context, but I want to make it general for now.
share|improve this question
What about option #3, "use an open source library?" That can actually be a compromise, because you can tweak it to your needs. – Nathan Long Nov 19 '12 at 15:06
@NathanLong: it's a good point, but I'd expect that if the OP is asking this question, it means it's only this scenario that's interesting. Also, a product can be open source and still be commercially sold, so I think you meant "free software". And depending on the kind of license, you can't necessarily tweak if to your needs (if you plan on reselling and it's incompatible, for instance), so there's a lot of different factors to look at down this road then. (not saying it's a bad suggestion, though) – haylem Nov 20 '12 at 12:38
add comment
6 Answers
It's overly simplified I guess, but that sort of holds true as a general guideline:
In a Personal Environment
• Do I have fun coding it?
• OR do I learn something from coding it?
• Do I have enough time to code it?
If yes, then I prefer to write it than to buy it.
In a Professional Environment
If the total cost of ownership of the product (including development, testing, maintenance, support or any related expenses) is higher than the cost of the product, and that the calculated return on investment won't offset this cost, then you're better off buying it and moving on.
share|improve this answer
+1 very important to occasionally code some stuff up yourself otherwise you end up just joining one thing to another like an Internet Plumber. You also have to balance the "learn something from it" and determine if you want/need to learn that something. – Gary Rowe Nov 19 '12 at 9:36
@GaryRowe: thanks. Must resist making a joke about "Internet Plumber" and current web trends and the web dev job market. Arggghhhh, it's quite tempting though... – haylem Nov 19 '12 at 9:41
In a professional environment, it's not just the development cost, but also the ongoing maintenance cost and the time lost in development. – Gilbert Le Blanc Nov 19 '12 at 14:00
@GilbertLeBlanc: true that, Gilbert. I sort of meant the end-to-end cost, but I'll clarify as you suggested, as it really should be about the product's TCO. – haylem Nov 19 '12 at 15:41
add comment
Things to consider for a make-or-buy decision
• cost of development / cost for maintenance vs. cost of product / cost for maintenance contract: of course, that's the obvious thing, but that's actually not the only thing. For example, if I am going to use the software not only for my own company, but also want to sell it to others, then the calculation looks quite differently
• Availability of a suitable product. For a lot of business processes, there is just no standard of-the-shelve software available. Or there is something available, but it is not suitable, because it contains 100 features from which you need just 3 in a slightly different manner, while 2 other important features are missing.
• Does one want to get dependent from a third-party vendor? Especially smaller vendors provide you always with the risk that the vendor vanishes from the market in the future, or the further development of the product does not go in the direction you need. For a product you have under your own control, you can steer the direction of development much better.
• When do I need a specific software, and what goes quicker: develop it on my own, or buying something, adapt it until it fit's to my processes and roll it out? Buying something from the shelve may seem the quicker and sometimes cheaper alternative, but I personally have seen also scenarios where developing a software exactly for the needs of a company, fitting to existing business processes, saved so much time compared to buy something and teaching several hundreds of users to do their work in a new and different way, that the cost of development were neglectable.
share|improve this answer
add comment
Anything that has to do with cryptography. There are a 100.000 ways to do it wrong and expose your software to serious security vulnerabilities and just a few ways to do it right. High expertise is needed for this.
share|improve this answer
+1 See also: programmers.stackexchange.com/q/175489/7167 – Gary Rowe Nov 19 '12 at 9:51
It's a good point, though I think there are many other things that would also be worthy of falling under the "don't screw with this" label. However, for personal use (and as long as there's no exposure and it's not for sensitive data), giving a shot yourself is still fun with crypto. I re-implemented a few ciphers for fun and self-learning a few years back. Lots of great problems to look at, had a lot of fun doing it, and learned a ton. – haylem Nov 19 '12 at 15:46
I'd avoid buying crypto. The trusted crypto libraries are usually open source or part of the OS. I'd trust my own code over most closed source libraries. I wouldn't use any library that doesn't at least publish a clear and complete specification of how its crypto code works. – CodesInChaos Nov 19 '12 at 15:49
@CodesInChaos quite a few commercial "closed source" packages give you the sourcecode. – Pieter B Nov 19 '12 at 17:46
Actually I think that a peer reviewed code is better, and that assuming that the attacker doesn't know the algo is a mistake. But why do you even link that to cryptography? – Martin Nov 19 '12 at 21:59
add comment
• high time effort, existing fitting product >> buy product
• personal interest in technique or no product existing fitting all requirements >>
develop on my own
share|improve this answer
add comment
On a personal level, I develop on a weird combination of what I want and what would be interesting to write.
On a professional level, @haylem makes a good overall point about when to buy versus when to write. I will say that there is a huge element that is overlooked: opportunity. For larger companies it often makes sense, in my opinion, to custom write core line of business apps (not all line of business apps) when doing so makes the enterprise more nimble. There is an opportunity cost associated with buying software because then your enterprise (not just your IT) are locked into the vendor's way of looking at your domain.
For most things, it doesn't matter. Your accounting system had better not be creative. Your word processor will be just the same as anyone else's. But the things that make you you might be better written in house so that it can adapt to what it is that your business is trying to accomplish.
share|improve this answer
add comment
It is, as pretty much every other answer has said, a cost-benefits decision:
• What will it cost me in man-hours, materials, etc to give this project to a developer in-house, or an external contractor, to custom-develop? (usually high; counting their portion of overhead, plus salary and benefits, an experienced developer will cost you about a grand a day; maybe a bit more or less depending on the finances involved)
• What will it cost me to buy the known product off the shelf? (Depends on the product; general-use programs like text editors are typically cheap, even free, while specialized programs like circuit path design products can cost millions)
• What benefits will I get from a custom-developed solution? (Typically a custom solution is a closer fit to your business and thus can automate or at least digitize more of it)
It comes down to whether the cost, offset by benefits, of a custom-developed solution is less than the cost of the off-the-shelf product.
There are also opportunity costs to consider. Understand that these are not to be included in the real costs of developing vs buying, but in the wider world, you have to consider them. If your in-house development staff is working on this one project, they are not working on any other project; that means if there's another project on the list that is costing you money every day it's not done, it may well be a higher priority causing you to shelve or even cancel custom development and go with the off-the-shelf package. However, if not doing this project means your in-house staff is sitting on their hands, the developer cost is sunk; you're paying your development staff whether they're working or not, so it will cost you less overall if you're using them to their potential.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/704 | Take the 2-minute tour ×
I'm starting to hear rumblings about this project called ASM.js. Currently their web site is terrible and confusing. Here's what I know from my research on the web.
• It is a subset of JavaScript that can be highly optimized. I'm guessing because it avoids the more dynamic parts of the language.
• Performance of code compiled to ASM.js runs at about half the speed of C (not light).
• The intention is for compilers to make their target language ASM.js.
• Firefox is going to be shipping with ASM.js optimization baked in.
• The Mozilla and Unreal teams ported the Unreal Engine to the web with it and its running in a build of Firefox at near-native speeds.
There doesn't seem to be any concrete information on the web about what this really is or the usefulness or ultimate purpose. Is it that I can compile my otherwise server-side code bases and have it run in the browser at close-to-native speeds? What are the ramifications for developers?
share|improve this question
add comment
2 Answers
up vote 12 down vote accepted
You already described that it is. The use is that it's a low-level language that works across all browsers, is quite fast in most and very fast in some. What you make of this is as open-ended as what you do with any other programming language.
The use case Mozilla seems most keen on is this: There are already ways of compiling languages with LLVM backends (most prominently C and C++) to JavaScript, via Emscripten. asm.js is very close to what Emscripten already emits, so this allows Emscripten code (which is already impressively fast on today's JavaScript JIT compilers) to become even faster, furthering the goal of porting existing code bases to the web. Again, what exactly you use this for is your decision. Porting games is one use cases (which Mozilla is apparently actively involved in), but there are countless things written in C and C++, quite a few of which might come in handy for someone's web site. Some I've seen flung around (plus some of my own devising), with no guarantee regarding feasibility:
• Porting general-purpose algorithms (e.g. zlib, libjpeg, openssl, FFT implementations) to empower JavaScript/websites to do more, without having to create a new web standard and depending on individual browsers to implement it.
• Porting interpreters, so that languages other than JavaScript can run in the browser, with less overhead and minimal porting effort.
• Using asm.js as a backend for more compilers, especially those that don't map well to JavaScript and don't need most of its features and overhead. An example could be a language designed for fast numeric work with no memory allocation.
• Using asm.js to create a JIT in JavaScript. It may implement any language at all -- for example ActionScript.
• In the same vein, porting existing JIT compilers to run in the browser (cf. porting interpreters, with effectively nil overhead over JS). This is probably only feasible when JIT compilers are automatically generated, as with PyPy.
share|improve this answer
Here is another good explanation: ejohn.org/blog/asmjs-javascript-compile-target – Jarrod Nettles Apr 3 '13 at 18:36
Here's a proof of concept for porting a JIT to asm.js. It's a unique selling point, most emerging platforms aren't JIT-friendly. – Tobu Jan 26 at 22:54
add comment
Imagine ASM.js as a big binary ArrayBuffer called a heap and a set of JavaScript modules, which begin with a prologue directive: "use asm"; and perform fast low-level operations on raw binary data, similar to assembly languages. Those modules could be written by hand or better compiled from LLVM code by scripts like Emscripten. Their performance could be boosted thanks to the Mozilla OdinMonkey engine, but they are backward-compatible with most of the modern ECMAScript interpreters.
ASM.js is not limited to games, you can even run whole Qt apps in your browser, like these!
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/705 | Take the 2-minute tour ×
I'm trying to learn Scala (I have previously glanced at Erlang, Haskell, Ruby and had similar issues). I do enjoy it, but I feel bad about some things it does and I wonder if that's just due to all the time I've spent with C++.
1. Keeping it clean
I'll start with a problem of my own. With anonymous functions and loops hidden in foreach I feel encouraged to put everything in one line. I quickly end up with something hideous. It's even worse in Ruby where variables don't need to be declared. It's a mess. I wonder if there are any guidelines that can be followed to improve readability or if this is something one just has to get use to when programming in a concise language?
2. Basic control structures
While foreach, map, etc. methods work great in simple cases they fail me in more complex ones. Containers preserve order of objects, and in a way, these methods hide that order form me. Let's say, I want to build an array B from the elements of array A with prime indices. I could do
var i = 0
val B = A.filter( e => { i+=1; is_prime( i ) } )
but it doesn't feel right. There is a duplication of counters - one inside filter, and one of my own. I see no reason why there wouldn't be a function which knows the position of the element it is processing. Am I missing something or is there some logic behind it? Now I just feel encouraged to use the usual C style loops.
3. Scala's hidden inconsistency
Scala seems to boast having so much of it declared in it's libraries. With all the rules Scala needs to make those libraries feel comfortable, the language becomes as big as any other, which seems like missing the point, but that isn't what bothers me. What I dislike is Tuple. With it's special syntax, it acts like a language construct rather than an ordinary class. It feels like Scala is denying that many things are built into it. I'd appreciate it if someone could explain to me why such synthesis of library and language is so often implemented (not only in Scala).
4. Efficiency
Firstly, I understand the benefit of having immutable objects in parallel algorithms, but how often do you actually need the concurrency? There are issues with it other than shared mutable objects. My point is that concurrent design has it's limitations and using it everywhere, like functional languages seem to do, must be terribly inefficient.
Secondly, even if we do consider immutable state a necessity, some algorithms I've seen are ludicrous. I'm thinking about the ones that work with lists as head::tail. I find it hard to believe that an algorithm, described in that way can be efficient. Again, I feel encouraged to write more imperative code. Am I underestimating optimizations or should sensitive algorithms really avoid some concepts?
2. I see no reason why there wouldn't be a function which knows the position of the element it is processing. I think, the reason is that scala has functional heritage, and in functional world you write declarative, i.e. what you need (instead of imperative how to do it, directly defining underlying logic). Anyways, zipWithIndex method of collections, possibly can solve that particular problem. – om-nom-nom Aug 7 '11 at 11:19
Your 2nd example isn't even functional programming... Why would you ever use it like that? Don't mix a filter with state. Thats just evil. – alternative Aug 7 '11 at 12:42
A.zipWithIndex collect { case (n, idx) if is_prime(idx) => n } – incrop Aug 7 '11 at 13:18
Try Python, it is clean. for lineNum, line in enumerate(lines): ... – Job Aug 7 '11 at 15:25
Job's Python code translates to Scala as for ((lineNum, line) <- lines.zipWithIndex) ... – Kipton Barros Aug 7 '11 at 15:58
show 1 more comment
migration rejected from stackoverflow.com Jul 8 '13 at 12:50
closed as too broad by MichaelT, Bart van Ingen Schenau, Dynamic, Martijn Pieters, Yusubov Jul 8 '13 at 12:50
5 Answers
It's hard to answer the first question because you don't show what you mean by it. Maybe it is something you should get used to, maybe you are going overboard with it. Breaking long computations into subparts is encouraged, even if the language don't actually impose it.
When it comes to indices, you should avoid using them. An index refers to the absolute position of an element, which is hardly ever needed in algorithms. More often, what is important is the relative order. For example, if you need to compare an element to its adjacency, you can use sliding. If you truly need absolute indices, use zipWithIndex.
Tuple is, indeed, an exception. However, aside a few concessions to Java interoperability, it is the only one that is more or less gratuitous. Others, such as function, are required to achieve goals of the language.
As for efficiency, you are obviously ignorant of persistent data structures. For instance, head::tail is constant time, both when composing and when decomposing. For instance, look at this implementation of split (the first one), which beats Java's precisely because it uses List and :: instead of array. And how many times have you cloned some data structure before passing it or when receiving it? How many times have you worked around a function being destructive? You never have to do that with immutable data.
add comment
Flexible control structures
As others have said, Scala actually has a really nice high level syntax. For example, generalizing your code a little,
for ((e, i) <- elements.zipWithIndex;
if isPrime(i);
...) yield e
The nice thing about this is that it's all user extensible. Scala for comprehensions translate into regular calls to methods map, flatMap, filter, and foreach, which you can define yourself on your own classes.
This high-level style does incur a performance penalty. For maximum performance, you might want to go with while loops, and you'll get almost exactly the same byte-code as the equivalent Java.
Immutability is optional
Regarding your point about efficiency, Scala tries to make a functional (immutable) style natural and easy, but it certainly doesn't enforce it or even twist your arm. The best evidence of this is to look at the implementation of Scala's collection libraries, where mutable variables and while loops are commonly used for brevity and performance (rather than "purely functional" tail-recursion, say), even when constructing immutable collections. The external interface presented to the user is more important than the internal implementation details. Overall, Scala is very pragmatic in this aspect.
Benefits of a functional style
As you mentioned, one benefit of immutable data structures is that they make concurrency easier. But there are additional strong benefits to using a functional style,
• It is easier to reason about the correctness of code with immutable objects. For example, if I call a big, complicated function that someone else wrote, I can be sure the function can't change any of the immutable objects I pass as parameters.
• Persistence of immutable objects makes it easier to implement certain code. For example, modifications to a mutable Array basically "lose" the original (unmodified) array. However, an immutable Vector in Scala will be preserved no matter what operations you later perform (if you want to replace an element, say, you can simultaneously have a new Vector and the old unmodified one). Scala lets you have your cake and eat it too, because operations to create new modified Vector instances are efficient (order log(N)). As Daniel Sobral says, immutable data structures completely obviate the need to clone (deep copy) anything.
add comment
• Keeping it clean. The usual general rule is that reading good code (in the language of choice) is helpful. More specifically, functional code is more compact - but that also means that you should have even smaller functions with meaningful names, to improve again readability. For instance, consider this Position class, taken straight from actual code implementing an hexagonal grid for a board game:
object Pos {
val directions: List[Pos] = List(Pos(-1, 1), Pos(0, 1), Pos(1, 0))
val increments = directions ++ (directions map (- _))
case class Pos(x: Int, y: Int) {
def +(p: Pos) = Pos(x + p.x, y + p.y)
def *(i: Int) = Pos(x * i, y * i)
def unary_- = Pos(-x, -y)
def adjacents = Pos.increments.map(this + _)
def adjacentTo(p: Pos) = this.adjacents.contains(p)
All those methods are one-liners, and many of them could have been defined inline in client code. Yet, giving them names will make the client code more readable - see adjacentTo which is a client of adjacents and computes whether two cells are next to each other. I don't claim this code is perfect, but that often the size of a function in a functional program is smaller than in Java.
• Efficiency: In addition to the others, I'd like to point out that you are worrying about efficiency of details; while writing your program you should concentrate on having high-level efficient algorithms for the places where it really matters. "Premature optimization is the root of all evil", as D. Knuth said: often to optimize code you must reduce its clarity or maintainability. You should do so only for hotspots identified through profiling, since they will be very often unexpected. And also for them, before addressing the details you should concentrate on the big picture.
add comment
With respect to ...
Keeping it clean and** Basic control structures**, you are right to wonder if there are any guidelines that can be followed to improve readability, but that doesn't mean that you won't have to get used to it : )
For example, to build primes in a more "readable" way ... it is recommended to use the userscore character:
def main(args : Array[String]) {
var a = List(0, 1, 2, 3, 4, 5)
var b = a.filter(isPrime(_))
def isPrime(n: Int) = (2 until n) forall (n % _ != 0)
The underscore is used in several different circumstances ... mostly when you want a variable name but don't care what the name of the variable is, as in the case above.
To make the above code even more concise:
var b = a.filter(n => {(2 until n) forall (n % _ != 0)})
but personally ... I like the initial one much better. If I encountered the expression just above, my initial reaction would be to "extract method" to make the code clearer.
With respect Scala's hidden inconsistency and what you call the synthesis of library and language ... I see it less as the synthesis between library and language but the ability to blur the distinction what the language designers provide and what others can provide in that language (whether it be in the library or in my own code.) Ultimately providing a language that is more able to change with my own needs.
Martin Odersky explains in Programming Scala:
and then goes on to give an example in Scala and Java using factorials:
def factorial(x: BigInt): BigInt =
if (x == 0) 1 else x * factorial(x 1)
BigInt looks like a built-in type, because you can use integer literals and operators such as * and with values of that type. Yet it is just a class that happens to be defined in Scala’s standard library. If the class were missing, it would be straightforward for any Scala programmer to write an implementation, for instance, by wrapping Java’s class java.math.BigInteger (in fact that’s how Scala’s BigInt class is implemented).
Contrast that to using BigInteger in Java ... and you start to see why the synthesis of language and library is desirable:
import java.math.BigInteger
def factorial(x: BigInteger): BigInteger =
if (x == BigInteger.ZERO)
And if that wasn't enough ... from Odersky:
And finally ... on Efficency, I agree. Using functional languages everywhere does have its limitations and in some cases is either inefficient or complicated. That is one of the reasons I especially like Scala. It doesn't force me to use functions over objects where objects and mutable state is the better choice.
add comment
To summarize and, hopefully, simplify what others have said here, you are going through a barrier on a road from one theory of programming to another very different conceptual framework. Your journey is actually even more difficult, because your path leads you even farther than that into a brave new programming world!
Firstly, you are grappling with significant differences between the object-oriented vs. functional programming approaches. That test of courage is a very old initiation rite that has blocked many before you. It is similar to the terrible time most of us had adapting from C to C++, with what then seemed C++'s infernally inefficient way of doing things. I suggest that you read, or at least browse, the time-honored old standard, SICP, The Structure and Interpretation of Computer Programs, for which free versions are still available (SICP in PDF, and SICP in HTML). Understanding the fundamentals of functional programming will smooth your ride considerably.
Secondly, however, your transitional barriers are yet higher. Some of us have noticed that we like certain features of object-oriented programming and certain features of functional programming. We want to have our cake and eat it two [sic (not "sick")]! This has led to a new wave of languages that some have called "object-functional." In these newer languages—among which you will find Scala, Fantom, and F#—you will find features from both programming paradigms. Perhaps this will remind you of the history of your own C++ programming language, which permitted blended procedural and object-oriented programming in what initially seemed to many of us a toxic brew! Many bottles of aspirin, acetaminophen, and ibuprofen were emptied before we collectively developed best practices that made C++ the workable and powerful tool it is now. When dealing with an object-functional language, such as Scala, you will want to carefully consider how to select the best tools from Scala's kit to solve the particular problems on which you are working. Apply the right tool in the correct context and you will find that Scala repays you handsomely for the time you invest in learning its proper use.
So I advise you to continue along the path you started because I can sense that you saw some vision of something worthwhile down that long and winding road! I assure you that many who have gone before you would not gladly turn back, perhaps as you would probably not care to revert to assembler language, except under extreme duress! You are in pursuit of a worthy goal and I wish you well!
add comment
|
global_01_local_0_shard_00000017_processed.jsonl/712 | Ain't no toilet paper but this smell like the shit don't it?
from Wiz Khalifa – Won't Land Lyrics on Rap Genius
Ah, another classic “money out the ass” joke. They aren’t in a bathroom, but Wiz’s music is the shit.
To help improve the meaning of these lyrics, visit “Won't Land” by Wiz Khalifa Lyrics and leave a comment on the lyrics box |
global_01_local_0_shard_00000017_processed.jsonl/715 | Fat Joe – So Much More Lyrics
Produced By: Cool & Dre
You pyonged “Fat Joe – So Much More”
Save Note No Thanks
Caution: You are now annotating this song as
This should be played at high volume
[Fat Joe]
This is, this is, this is
Cook! Cool n Dre!
Ain't nobody seeing this right here, we see nobody
I know you came to party so (Oh) get up on yo feet (The god just stepped in town)
Yeah baby just trip that body (come on down), and sing along wit me (come on)
I know you've been searchin' for someone who
Satisfies you and gives you so much more
(Yo) Caution when my lip just twitch to one side
We don't bitch, we don't snitch
We thick, and just ride
And I, never gave a fuck about popo
Niggas so gangsta, making songs bout my .44
My, mymy fofo fofofofo
It gets worse, kick my shit when I visit the church
I'm down wit TD Jakes and Kirk Franklin
Better have my offerin' plate filled wit' franklins
Blasphemy, I got niggas that'll blast for me
Ribs touchin and they askin' me, Crack! Nigga!
Show me where the safe bet, I'll lay 'em down with the mac
Leave 'em face flat, listen
You don't wanna start no drama
We don't scrap when there's problems we just clap and revolve 'em
And get it coke, let it go, head it ___, sippin mo, didn't know? Better know now
Puff and pass in the Hilton suite
Crush and pass, is the sick, tape me
I'll probably when i, ask her didn't know the dick ten feet
You'll need a ladder just to sit on me
(Good! God!) In the race screamin' viva Tito
Wit' Don 'kee Maddison Square, arena people
I pull mammi to the side, she feel me
Yellin' punta a gasolina
Now how many bricks does it take, to marble out a 36 room estate
Follow me, I'm from Philly where they eat cheese steaks
In a red belly, call a bitch v8 (Uh yeah)
It's Joe cr-eal, for-real
And even warn the kids in school on coke deals (Crack!)
(I'm back!) And that's the seltzer
You should know how the shit gon' go, follow me!
That's the sound of a man, workin' on a train
There he ain't (crack!) yeah
And we don't see nobody
Make your hair stand up like you're "Growin Up Gotti"
Hit lyrics everytime we come out, nigga
Use a fist 'fo' it come out ya mouth
The way I'm stackin white these days
Looking like a chick that go wit Flava Flav
And I'm so so real, niggas wanna kill the Don
Front of my house, probably wit my son in my arms
But I, drop 'em like its hot
Pass 'em the Glock, my little shorty's a chip off the old block
Go against Coke, let 'em and show
I give you 10 ways to kill off the whole block (Nigga!)
[Hook 3X]
Yeah, that's how a motherfucker go down
3 o'clock in the mornin', m.i.a. nigga
Missin' in action down in Miami nigga
Bitch, its Crack!
Cool n Dre, realz
Uh oh, sound all fuckin shitty
Edit song description to add:
|
global_01_local_0_shard_00000017_processed.jsonl/733 | HKUST Library Institutional Repository Banner
HKUST Institutional Repository >
Computer Science and Engineering >
CSE Master Theses >
Please use this identifier to cite or link to this item:
Title: A software architecture for multimedia object communication and synchronization
Authors: Fung, Chi-leung
Issue Date: 1993
Abstract: The rapid advance in various technologies like communication networks, work-station and compression algorithms triggers the popularity of multimedia applications. Supporting different media streams in multimedia applications imposes new requirements on the design of multimedia software. This thesis presents a programming model and a software architecture designed for supporting distributed multimedia applications. The main contribution of the model and the architecture is to alleviate the burden of the multimedia application programmers by abstracting the details on communication and synchronization from the programmers. The Object-oriented approach is employed in the design of the model and the architecture. In the model, there are two major categories of multimedia objects, primitive object and composite object. Each primitive object represents a multimedia stream such as an audio stream, a video stream or a text data stream. On the other hand, a composite object does not represent any multimedia stream but is used to represent a group of temporulIy related primitive objects and/or other composite objects. The model supports the specification of temporal synchronization between data objects declaratively. A novel algorithm is devised to transform the declarative specification into operational realization. The implementation of the architecture can thus automatically realize the synchronization specificatious. At run-time, the composite object will make use of the specifications to orchestrate the contained objects when they are being played back. Thus the synchronization properties of multimedia objects cau be accomplished easily via the use of composite objects. From the communication perspective, if a multimedia object wants to send its data to another host, it just needs to create a destination endpoint, which is an abstraction of the destination host. A peer multimedia object will be created in the destination host automatically by the supporting run-time system. Then, the two peer objects can send the media data through the endpoints. This abstraction makes the underlying communication issue transparent to the applications. Besides the abstraction of communication and synchronization, the architecture also provides the user a set of application programming interface to manipulate the multimedia objects easily and effectively. An implementation of the architecture is completed and several sample applications are built to demonstrate the ease of programming distributed multimedia applications without the concern of the communication and synchronization details.
xiv, 118 leaves : ill. ; 30 cm
HKUST Call Number: Thesis COMP 1993 FungCL
Appears in Collections:CSE Master Theses
Files in This Item:
File Description SizeFormat
|
global_01_local_0_shard_00000017_processed.jsonl/739 | Samsung NV7 OPS review
What about ISO sensitivity settings? Well, on one hand, the NV7 maxes out at ISO 1000, which is pretty low from a spec comparison standpoint. However, the NV7's photos have so much noise--unless scaled down, anything above ISO 200 looks more Impressionist than Realist--the availability of any higher settings becomes a moot issue. In addition, the NV7 has some of the poorest white balance I've seen in a while. When set manually, photos render fine, but the automatic setting yields extremely pink results under incandescent, fluorescent, and outdoor light, and the tungsten preset still succumbs to a yellow cast under tungsten lights. You can record 30fps (frames per second) VGA-resolution movies with the NV7, which it encodes as AVI files using the Xvid codec (provided on CD). The codec is pretty efficient--49 seconds of video took 15.64MB, or 327KB/sec--but the video looks just OK. And though the zoom works during movie capture, the camera intentionally--and irritatingly--drops audio while you're zooming.
The NV7 OPS' performance matches its image quality, delivering acceptable but not great speed for its class. Based on CNET Labs' test results, it wakes up and shoots in a longish 3.1 seconds, with a respectable shutter lag of 0.5 and 1.0 second in bright and dim light, respectively. The 2 seconds it takes between consecutive single images puts it slightly behind the competition, though the 2.3 seconds it takes with flash enabled puts it ahead. Unfortunately, its continuous shooting is fixed at about 8 frames and .8fps, regardless of image size.
The Samsung NV7 OPS shows a promising interface but is held back by sluggish performance and so-so photos. Though it's hard to find the combination of manual features and longish zoom range in its price range, you probably want to check out some alternatives such as the Pansonic Lumix DMC-TZ3.
Shooting speed (in seconds)
(Shorter bars indicate better performance)
Typical shot-to-shot time
Time to first shot
Shutter lag (dim)
Shutter lag (typical)
Canon Powershot A710 IS
Casio Exilim EX-V7
Samsung NV7 OPS
Panasonic Lumix DMC-TZ3
Typical continuous-shooting speed (in frames per second)
(Longer bars indicate better performance)
Samsung NV7 OPS
What You'll Pay
• Similar model: $
Pricing is currently unavailable.
• Set Price Alert
Member Comments
Add Your Comment
Conversation powered by Livefyre
Where to Buy
Pricing is currently unavailable.
Set price alert
|
global_01_local_0_shard_00000017_processed.jsonl/747 | UppercuT is THE conventional build for .NET! UppercuT seeks to solve both maintenance concerns and ease of build to help you concentrate on what you really want to do: write code. Upgrading the build should take seconds, not hours. And that is where UppercuT will beat any other automated build system hands down. UppercuT uses conventions and has a simple configuration file for you to edit. Getting from zero to build takes literally less than five minutes. If you are still writing your own build scripts, you are working too hard. UppercuT is extremely powerful because it is customizable and extendable. Every step of the build process is customizable with a pre, post and replace hook. UppercuT is not a build server, but it integrates nicely with CruiseControl.NET, TeamCity, Hudson, etc.
installgem install uppercutbuild -v
Rob "FerventCoder" Reynolds, Dru Sellers
26,385 total downloads 930 for this version
gem "uppercutbuild", "~>"
1. August 19, 2011 (13.7 MB)
2. August 19, 2011 (13.7 MB)
3. August 10, 2011 (13.7 MB)
4. March 10, 2011 (14.5 MB)
5. January 23, 2011 (14.4 MB)
Show all versions (28 total)
Runtime Dependencies
1. thor >= 0.13.8 |
global_01_local_0_shard_00000017_processed.jsonl/748 | Alan K. Stebbens > Term-Query-2.0 > Term::Query
Annotate this POD
New 1
Open 0
View/Report Bugs
Term::Query - Table-driven query routine.
use Term::Query
qw( query query_table query_table_set_defaults query_table_process );
$result = query $prompt, $flags, [ $optional_args ];
$ok = query_table \@array;
query_table_set_defaults \@array;
$ok = query_table_process \@array, \&flagsub, \&querysub;
Given $prompt and $flags, and possibly additional arguments, depending upon the characters in $flags, query issues a prompt to STDOUT and solicits input from STDIN. The input is validated against a set of test criteria as configured by the characters in $flags; if any of the tests fail, an error message is noted, and the query is reattempted.
When STDIN is not a tty (not interactive), prompts are not issued, and errors cause a return rather than attempting to obtain more input. This non-interactive behaviour can be disabled by setting the variable $Foce_Interactive as below:
$Term::Query::Force_Interactive = 1;
When $Force_Interactive is a non-null, non-zero value, query will issue prompts, error messages, and ask for additional input even when the input is not interactive.
The query_table subroutine performs multiple queries, by invoking query, setting associated variables with the results of each query. Prompts, flags, and other arguments for each query are given in an array, called a query table, which is passed to the query_table subroutine by reference.
The query_table_set_defaults subroutine causes any variables named in the given query table array to be assigned their corresponding default values, if any. This is a non-interactive subroutine.
A general interface to processing a query table is available with the query_table_process subroutine. It accepts a query table array, and two subroutine references, a &flagsub and a &querysub. The &flagsub is invoked on each each flag character given in the $flags argument of the query table (see below). The &querysub is invoked for each query in the query table.
The query_table and query_table_set_defaults subroutines both use query_table_process to perform their functions.
Query Table
The format of the query table array passed to query_table, query_table_set_defaults, and query_table_process subroutines is:
@array = ( $prompt1, $flags1, [ $arglist1, ... ],
$prompt2, $flags2, [ $arglist2, ... ],
$promptN, $flagsN, [ $arglistN, ... ] );
In English, there are three items per query: a prompt string, a flags string, and an array of arguments. Note that the syntax used above uses [ ... ] to denote a Perl 5 anonymous array, not an optional set of arguments. Of course, if there are no arguments for a particular query, the corresponding anonymous array can be the null string or zero.
The query table design is such that a query table can be created with a set of variables, their defaults, value constraints, and help strings, and it can be used to both initialize the variables' values and to interactively set their new values. The query_table_set_defaults subroutine performs the former, while query_table does the latter.
Flag Characters
With typical usage, given $prompt and $flags, query prints $prompt and then waits for input from the user. The handling of the response depends upon the flag characters given in the $flags string.
The flag characters indicate the type of input, how to process it, acceptable values, etc. Some flags simply indicate the type or processing of the input, and do not require additional arguments. Other flags require that subsequent arguments to the query subroutine be given. The arguments must be given in the same order as their corresponding flag characters.
The ordering of the flags in the $flags argument is important -- it determines the ordering of the tests. For example, if both the a and m flags are given as "am", then this indicates that an after subroutine call should be performed first, followed by a regular expression match test.
All tests are applied in the order given in the $flags until a particular test fails. When a test fails, an error message is generated and the input is reattempted, except in the case of the I flag.
Flag Characters Without Arguments
The input must be an integer.
The input must be a number, real or integer.
The input is a "yes" or "no", with a default answer of "yes".
The input is a "yes" or "no", with a default answer of "no".
Some input is required; an empty response will be refused. This option is only meaningful when there is no default input (see the d flag character below).
Strip and squeeze the input. Leading and trailing blanks are eliminated, and embedded whitespace is "squeezed" to single blank characters. This flag is implied by the k and K flags.
Do not treat input of ? as a request for help. This disables automatic help, unless implemented with the after (a flag) subroutine.
Flag Characters With Arguments
The following flag characters indicate the presence of an argument to query. The arguments must occur in the same order as their corresponding flag characters. For example, if both the V and h flags are given as "Vh", then the first argument must be the variable name, and the next the help string, in that order.
a \&after
The next argument is the after subroutine, to be invoked after the input has been solicited. This feature provides for an "open ended" input validation, completely at the control of the user of the Query module. The after subroutine is invoked in this manner:
&$after( \$input );
If the after sub returns an undef, then query processing stops with an immediate undef return value.
If the after sub returns a null or zero value, then the input is rejected and resolicted. No error messages are displayed except the "Please try again." message.
Since the after sub has the reference to the $input variable, it is free to change the value of input indirectly; ie:
$$input = $some_new_value;
b \&before
The next argument is the before subroutine, to be invoked before any input is attempted. If the before sub returns a non-null, non-zero value, the current query will be attempted. If a null or zero value is returned, the current query will be abandoned, with a null return.
This feature, used in a query table, allows for selective queries to be programmed by using before subs on the optional queries. For example, using the following anonymous sub as the b flag argument:
sub { $> == 0; }
will cause the corresponding query to only be issued for the root user.
The ordering of the b flag in the $flags argument is unimportant, since, by definition, this test is always performed before attempting any input.
d $default
The next argument is the default input. This string is used instead of an empty response from the user. The default value can be a scalar value, a reference to a scalar value, or a reference to a subroutine, which will be invoked for its result only if a default value is needed (no input is given).
h $help_string
The next argument is the help string, which is printed in response to an input of "?". In order to enter a ? as actual text, it must be prefixed with a backslash: "\".
k \@array
The next argument is a reference to an array of allowable keywords. The input is matched against the array elements in a case-insensitive manner, with unambiguous abbreviations allowed. This flag implies the s flag.
The matching can be made case-sensitive by setting the following variable prior to the invocation of query:
$Query::Case_sensitive = 1;
By default, this variable is null.
K \@array
The next argument is a reference to an array of disallowed keywords In this case, for the input to be unacceptable, it must match exactly, case-insensitive, one of the array elements. This flag implies the s flag.
The k option is useful for soliciting new, unique keywords to a growing list. Adding new fields to a database, for example.
The matching can be made case-sensitive by setting the $Query::Case_sensitive variable (see above).
l $maxlen
The next argument specifies the maximum length of the input.
m $regular_expression
The next argument specifies a regular expression pattern against which the input will be matched.
I $reference
The next argument is the input: either a simple scalar value, or a reference to a value, such as a SCALAR variable reference (eg: \$somevar), or a CODE reference (eg: sub {..}). In any case, the resulting value is used as input instead of reading from STDIN.
If the input returned by the reference does not match other constraints, additional input is not attempted. An error message is noted, and an undef return is taken.
This option is handy for applications which have already acquired the input, and wish to use the validation features of query.
It is also useful to embed a query definition in a query table which does not actually perform a query, but instead does a variable assignment dynamically, using the I reference value.
J $reference
The next argument is the input reference, as with the I flag, except that if the input fails any of the constraints, additional input is solicited from the input. In other words, the J flag sets a one-time only input reference. Think of it as jumping into the query loop with an initial input.
V variable_name_or_ref
The next argument is the variable name or reference to receive the validated input as its value. This option, and its corresponding variable name, would normally be present on all entries used with query_table in order to retain to the values resulting from each query.
The value can either be a string representing the variable name, or a reference to a variable, eg: \$some_var.
The query processing proceeds basically in the same order as defined by the flags argument, with some exceptions. For example, the before subroutine is always performed prior to input.
There are implicit precedences in the ordering of some of the flag tests. Generally, flags have their corresponding tests performed in the same order as the given flags. Some flag tests, however, require that other flags' tests be performed beforehand in order to be effective. For example, when given the k flag and an s flag, stripping the input would only be effective if the strip were done on the input before testing the input against the keyword table. In other words, the s flag has precedence over the k flag. If the user supplies the flags string as "ks", the effective ordering would still be "sk".
The table below indicates the precedences of the flag tests:
Given Flag Flags With Higher Precedence
i (int) s (strip), d (default), h (help)
k (key) s (strip), d (default), h (help)
K (nonkey) s (strip), d (default), h (help)
l (maxlen) d (default), h (help)
m (match) d (default), h (help)
n (numeric) s (strip), d (default), h (help)
N (no) s (strip), d (default), h (help)
r (required) d (default), h (help)
s (strip) d (default), h (help)
Y (yes) s (strip), d (default), h (help)
Except for the implied precedence indicated in the table above, the ordering of the flag tests proceeds in the same order as given in the flags argument.
Excepting the precedences above, query processing proceeds generally as described below.
The following are typical usage samples:
This variable is used to control the width of output when listing the keyword arrays. If not defined, 80 is used by default.
Used to produce usage error messages.
Used to produce displays of the keyword arrays.
Copyright (C) 1995 Alan K. Stebbens <>
Input is required.
Issued when an empty response is given, and there is no default input.
Please answer with 'yes' or 'no', or enter '?' for help.
Issued for Y or N flagged queries, and the input is not reconizeable.
Please enter an integer number.
Printed when non-integer input is given for i flagged queries.
Please enter a number, real or integer.
Printed when non-numeric input is given for n flagged queries.
The input '$input' is ambiguous; it matches the following:
Issued in response to k flagged queries with input which matches more than one of the allowed keywords.
The input '$input' fails to match any of the allowed keywords:
Printed when input to a k flagged query does not match any of the keywords.
The input '%s' matches a disallowed keyword '%s'.
Printed when the input matches one of the unacceptable keywords given on a K flagged query.
'%s' fails to match '%s'
This results from input failing to match the regular expression given on a m flagged query.
Input is %d characters too long; cannot exceed %d characters.
The length of the input exceeded the maximum length given with the l flag argument.
Please try again, or enter '?' for help.
query: The k flag needs an array reference.
The next argument in the argument list to query wasn't an array reference.
query: The K flag needs an array reference.
The next argument in the argumentlist to query wasn't an array reference.
syntax highlighting: |
global_01_local_0_shard_00000017_processed.jsonl/749 | Darren Duncan > Muldis-DB-0.4.0 > Muldis::DB::Engine::Example::Operators
Annotate this POD
View/Report Bugs
Module Version: 0.004 Source
Muldis::DB::Engine::Example::Operators - Implementations of all core Muldis D system-defined operators
This document describes Muldis::DB::Engine::Example::Operators version 0.4.0 for Perl 5.
This file is used internally by Muldis::DB::Engine::Example; it is not intended to be used directly in user code.
It provides implementations of all core Muldis D system-defined operators, and their API is designed to exactly match the operator definitions in Language::MuldisD.
Specifically, this file implements the core system-defined operators that all Muldis D implementations must have, which is the selectors for and general purpose functions and update operators for these data types: Bool, Order, Int, Num, Text, Blob, Tuple, Relation, and the Cat.* types.
By contrast, the operators specific to the optional data types are implemented by other files: Muldis::DB::Engine::Example::Operators::Temporal, Muldis::DB::Engine::Example::Operators::Spatial.
The operators declared in this file assume that any user-defined Muldis D code which could be invoking them has already been validated by the Muldis D compiler, in so far as compile time validation can be done, and so the operators in this file only test for invalid input such that couldn't be expected to be caught at compile time. For example, it is usually expected that the compiler will catch attempts to invoke these operators with the wrong number of arguments, or arguments with the wrong names or data types. So if the compiler missed something which the runtime doesn't expect to have to validate, then the Example Engine could have inelegant failures.
Darren Duncan ([email protected])
This file is part of the Muldis DB framework.
Muldis DB is Copyright © 2002-2007, Darren Duncan.
See the LICENSE AND COPYRIGHT of Muldis::DB for details.
syntax highlighting: |
global_01_local_0_shard_00000017_processed.jsonl/767 | Take the 2-minute tour ×
I'm running Apache on Ubuntu and I'm trying to set up a subdomain on my website. I've set up many subdomains in the past and I'm sure that I'm configuring Apache correctly but, with this new hosting company I'm using, I can't set up any subdomains on my domain.
Could it be that the host doesn't have their DNS servers configured to allow wildcard subdomains? When I enter asdf.mydomain.com on my MediaTemple site, I just get the front page for mydomain.com, but when I enter asdf.myotherdomain.com, I get server not found.
That's the only thing I can think of. I want to make sure I have my ducks in a row before I go ask them to look into the problem for me, so does it sound like that's probably the issue or could it be something else?
share|improve this question
add comment
1 Answer
up vote 1 down vote accepted
Try pinging asdf.myotherdomain.com to see if it resolves, and if it resolves to the same IP as a ping myotherdomain.com. If you can't ping your subdomain the answer is with the DNS.
share|improve this answer
I can't ping the subdomain at all, so I guess it's a DNS problem. – Jason Swett Oct 25 '10 at 18:56
IF the subdomain won't resolve, then you have to be missing the wildcard in your DNS for the domain. – CarloBaldini Oct 25 '10 at 18:58
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/768 | Take the 2-minute tour ×
I'm switching from Apache to Nginx/fcgi and I'm having a small issue while attempting to setup the applications rewrite rules.
The code handles routes via the use of PATH_INFO, e.g., example.com/foo/bar/ will be routed to example.com/index.php/foo/bar/
I've modified the server configuration to pass PATH_INFO:
location ~ \.php$ {
include /etc/nginx/fastcgi_params;
fastcgi_index index.php;
fastcgi_param SCRIPT_FILENAME /var/www/public$fastcgi_script_name;
fastcgi_param PATH_INFO $fastcgi_path_info;
fastcgi_param PATH_TRANSLATED $document_root$fastcgi_path_info;
And the rewrite handler:
location / {
root /var/www/public;
index index.html index.htm index.php;
if (!-f $request_filename) {
rewrite ^(.*)/(.*)$ /index.php/$2 break;
With 'rewrite_log on', the url's appear to be routing properly:
[error]: *2 open() "/var/www/public/index.php/test" failed (20: Not a directory), client:, server: example.com, request: "GET /test HTTP/1.1", host: "example.com", referrer: "http://example.com/index.php"
However, it appears to be looking for the directory "test". How can I force it to request index.php, passing '/test' to the script?
share|improve this question
add comment
1 Answer
up vote 3 down vote accepted
Well you have numerous problems, first of all you're following a shitty tutorial which is severely outdated. if (!-f is generally not recommended with try_files offered as a better replacement.
Secondly you have directives in location / context which should be in server context so you can avoid path duplication in the SCRIPT_FILENAME variable.
Secondly you use the break flag in your rewrite, this effectively means it should not re-evaluate the location matching. This effectively makes the request never leave the location / block and is instead treated as a static file request.
Thirdly. Have a look at your location ~ \.php$ {
Nginx matches locations against the URI and you're specifically telling Nginx to only handle URIs which end in .php, but if you rewrite to index.php/test/ then it won't trigger.
Lastly. You're using PATH_INFO while you should be using REQUEST_URI. The difference is that to make PATH_INFO work you have to tell Nginx to pass any request with .php in it to PHP, and PHP has to then find the right file.
This means that you allow requests like example.org/uploads/image.jpg/index.php to be sent to PHP and you also allow PHP to execute the file /uploads/image.jpg. If a malicious user uploaded that file with PHP in it they now have arbitrary code execution on your server. This is a very real exploit that I have personally seen people be vulnerable to.
Please stop using randomly Googled tutorials because 90% of them are utter garbage, instead go read the wiki. It might be a bother having to actually learn about the web server you're using, but the alternative is to have your server compromised.
share|improve this answer
Thanks Martin, aside from being a bit of a prick, that was very helpful. FWIW: PATH_INFO execution must go through a strict set of constraints before execution. – ben lemasurier Jan 18 '11 at 20:29
original source: wiki.nginx.org/HttpRewriteModule – ben lemasurier Jan 18 '11 at 21:18
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/769 | Take the 2-minute tour ×
I'm trying to compile a lower version of php (5.2) as gentoo is selecting 5.3 and i'm having some coding issues with the new version
nano /etc/portage/package.use
=dev-lang/php-5.2.14 ~amd64
still when I emerge emerge -av php
is stil selecting version 5.3 which is by default
how else can I force emerge to select the version I want
ls /usr/portage/dev-lang/php/ ChangeLog php-5.2.14.ebuild php-5.3.4.ebuild Manifest php-5.2.16.ebuild php-5.3.5.ebuild files/ php-5.2.17.ebuild metadata.xml php-5.3.3-r1.ebuild
share|improve this question
add comment
4 Answers
You should find the old ebuild package, it should be in portage directory.
Then, if I remember correctly, the comand to run was "ebuild old-package.ebuild" and it will compile it.
share|improve this answer
add comment
didn't emerge spit an error notification immediately? keyword specifications are supposed to go into /etc/portage/package.keywords.
emerge -av =php-5.2.17
if any of them are keyworded, then:
echo "=dev-lang/php-5.2.17 ~amd64" >> /etc/portage/package.keywords
share|improve this answer
yes sorry about that, they are in keywords.. – PartySoft Jan 27 '11 at 15:27
emerge doesn't display any error, no – PartySoft Jan 27 '11 at 15:27
add comment
First, php 5.2.17 already has amd64 in its keywords so ~amd64 would do nothing.
Second, it is almost never a good idea to attempt to mix ~amd64 and amd64 That is why you set ACCEPT_KEYWORDS=~amd64 (or amd64) in /etc/make.conf. It is a per-host variable.
Third, you should use /etc/portage/package.mask like so:
This will prevent all ebuilds with version greater than 5.2.17 to be masked.
Then run emerge -upv --deep --newuse php.
share|improve this answer
add comment
PHP versions are now slotted in Gentoo, so you can have easily either version, or even both at the same time on system and switch between them with eselect. There is a complete guide on the Gentoo home page on how to correctly migrate to slotted PHP versions.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/770 | Take the 2-minute tour ×
My AD account gives me admin privileges on our PCs (allowing me to install software, add PCs to our domain, change network configuration, etc). But with a small handful of PCs (Windows 2000 and Windows XP) when I log in I only seem to have standard privileges.
It does accept my username and password so it must be talking to one of our domain controllers (can't be using cached credentials because it's the first time I'm logging into these PCs). I've tried pointing it to different domain controllers, but that doesn't make any difference.
I've tried refreshing group policy on the PCs, that completes without errors but doesn't make any difference.
I've tried moving the PCs into different OUs, including ones that other PCs work okay in, again it doesn't make any difference.
Asked my colleagues (who have similar accounts) to log in using their accounts. No difference.
What other things should I be checking?
share|improve this question
One thing that may or may not be related. When I use the runas command in a Command Prompt I need to include the machine name to use any of the local machine accounts. Otherwise it doesn't seem to recognise the accounts. – Alistair McMillan Mar 31 '11 at 16:53
How is it that your account is granted local admin on the PC's? Are you a member of the Domain Administrators group? – squillman Mar 31 '11 at 17:03
add comment
1 Answer
up vote 3 down vote accepted
I'd compare the local users/groups between a PC that works and one that doesn't. Specifically, I'd look into the local Administrator groups on a PC that works the way you expect, and see if there's a Domain group in there that isn't on the PCs that don't work correctly.
For example in our domain, domain administrators are under the group "Domain Admins" and then this group is added in the local "Administrators" group in every PC in the AD. This way every domain administrator is automatically a local administrator as well.
share|improve this answer
All our Service Desk personnel are members of a group that has been created specifically to allow certain rights. That group was missing from the local Administrators group on the PC. Added that group to the PC and now everything works as expected. Thanks. – Alistair McMillan Mar 31 '11 at 17:24
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/771 | Take the 2-minute tour ×
Is there a way to make a Security List in Active Directory not also act as a Distribution List?
share|improve this question
add comment
3 Answers
up vote 3 down vote accepted
"Like distribution groups, security groups can also be used as an e-mail entity" (Active Directory)
Only if you attach an e-mail address to a group will it appear in outlook.
Right click > 'Exchange Tasks', there can you add or remove a group's e-mail address, has to be done on an Exchange Server.
share|improve this answer
add comment
A distribution group is only used by e-mail software and cannot be used when setting permissions.
A security group however can be used both for setting permissions and as a target for e-mail software. To my knowledge this behavior cannot be changed.
share|improve this answer
add comment
When you create groups in AD, you have the choice of either making it a security group or a distribution group, but not both.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/772 | Take the 2-minute tour ×
I'm new to Puppet (open source version) and have a relatively straightforward question.
When I bring up a new host, I'd like the puppetmaster to add the new host's public rsa key to /etc/ssh/ssh_known_hosts, and so the updated ssh_known_hosts file will be available to be pulled down by puppet agents.
I've tried the sshkey resource:
# /etc/puppet/modules/ssh/manifests/client.pp
sshkey { $hostname:
ensure => present,
type => "rsa",
key => $sshrsakey,
However, ssh_known_hosts does not appear to be modified on the puppetmaster, or agent for that matter. My manifest passes syntax validation when I run puppet parser validate client.pp and running puppet agent --test on the agent does not report any issues.
Do I have to have Stored Configs set up in order to use the sshkey resource? I like the features of Stored Configs, but it seems like overkill for what I need and seems to add lots of overhead. My other option is to spit the $sshrsakey fact to a file, but it will need to check for the existence of the public key so it doesn't get added more than once.
share|improve this question
If you're not using PuppetDB (the next generation of Storeconfigs), you might want to look at that. puppetlabs.com/blog/introducing-puppetdb-put-your-data-to-work The API given in the above answer doesn't change, but you'll get a performance gain. Note that this requires Puppet 2.7.12 or higher. – stahnma May 22 '12 at 17:23
Wow that was literally released the other day. Thanks for the tip, I'm sure I'll be making use of puppetdb. – Banjer May 22 '12 at 20:25
add comment
1 Answer
up vote 6 down vote accepted
Yes, you need to have stored configs enabled.
On each host, you'll want to collect the keys into the stored configs database (note the @@):
@@sshkey { $hostname:
ensure => present,
type => "rsa",
key => $sshrsakey,
Then, you'll want to write them to the file on each host as well.
Sshkey <<| |>>
share|improve this answer
Thanks Jeff. Can I have other host entries in ssh_known_hosts that are not managed by Puppet? I'm just wondering how Puppet manages this file and if it gets overwritten with nothing but Puppet agent keys. I'm sure I can answer it myself once I do some testing with PuppetDB here shortly, but that may be a few days before I get into it. – Banjer May 22 '12 at 20:30
@Banjer see docs.puppetlabs.com/references/stable/type.html#sshkey. Further, it only edits the file to add or remove (ensure => absent) the related line. It will not clobber the file by default, so you should be able to add any other keys you wish outside of Puppet if you desire. – Jeff Ferland May 22 '12 at 21:01
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/773 | Take the 2-minute tour ×
This question already has an answer here:
I have a website to which I have allowed someone to enter to make some modifications. However, I have discovered that they made changes that compromised the security of the website and I know that the changes made would have sent queries to a MySQL database on the server.
What I would like to know is, is it possible either via plesk or SSH to view MYSQL query logs relative to a specific IP address (the IP address the guy who compromised the site).
On an additional note, I am very new to SSH, so if you can recommend any use of this please make sure they're dumbed down instructions.
Many thanks :)
share|improve this question
add comment
marked as duplicate by quanta, Ward, SvW, mgorven, Dave M Feb 22 '13 at 21:46
2 Answers
Yes, it's possible at the mysql level.
To accomplish it, just enable the general logs in mysql. To enable it you can follow different ways.
1. Put this in my.cnf file of your mysql:
After that, restart mysql server and it will start logging everything in the log file.
2. You can start the mysql server with this variable at command line --general_log and it will also start creating the log file.
These logs will have all the information regarding who connected to your server and what all commands they used or executed.
Hope this helped.
share|improve this answer
I think the OP is looking to get the information after the fact. You answer requires the config change to already be in place. :-( – drone.ah Feb 10 '13 at 10:50
Hmm .. yes, might be. Don't think I have any answer for that :( – GeekRide Feb 10 '13 at 14:46
Thank you for your response, but drone.ah is right, these actions have already happened and the log was not active. Thanks for your feedback though :) – Paul Feb 11 '13 at 8:50
add comment
If you're really, really lucky, the user's MySQL commands could be in their .mysql_history file (in their home directory).
Otherwise, if generally logging was not switched on, I can't see any way to figure out who did what. Hope you at least had a back-up and some idea of when this started.
share|improve this answer
add comment
|
global_01_local_0_shard_00000017_processed.jsonl/777 | Fun with Science: The Incredible Bouncing Egg
Source: Fun With Science: The Incredible Bouncing EggA
maze your tot with a fun and exciting science experiment using a simple egg. She'll love observing the changes the egg goes through during this scientific exploration and learn more about basic concepts such as liquids and solids. Even though this incredible bouncing egg won't stand up to hours of play, it's worth it to see your tot's face checking out the springy egg with this really cool science activity.
What You'll Need:
• Egg
• Vinegar
• Glass jar with lid
• Get started by boiling the egg and letting it cool.
• Invite your child to place the hard-boiled egg in a small glass jar. Discuss with your child how the egg is no longer raw, but that through heating, the egg is now solid, changing its original matter.
• Now your child can pour plain vinegar over the egg and cover with a lid or a piece of plastic wrap. Position the jar in a location where your tot can come back and observe the changes the egg goes through.
• Allow the egg to sit in the vinegar for three days. The vinegar interacts the the calcium carbonate, changing the composition of the egg shell and the hard-boiled egg.
• After three days, remove the egg and gently rinse with water. Check out the changes the egg has gone through and invite your tot to give it a gentle bounce on the counter. The acid from the vinegar interacts with the calcium carbonate, causing the changes to the egg and creating an incredible bouncing hard-boiled egg.
Related Content:
Burning Question: Why Do Avocados Turn Brown?
DIY: Homemade Chalkboard Paint Wall Hanging
Kidoodles: Wooden Block Prints For Tots
Follow LilSugar on Twitter
Become a Fan of LilSugar on Facebook |
global_01_local_0_shard_00000017_processed.jsonl/778 | 3 Beauty Myths that Are Surprisingly Untrue
Eat all the chocolate you want! You won't get a pimple.Eat all the chocolate you want! You won't get a pimple.Does eating chocolate really make you break out? Get the answer and find out other fascinating truths.
By Cosmopolitan
1. Eating chocolate and greasy foods makes you break out.
Go ahead and chow down. There's nothing in a candy bar or pepperoni pizza that's going to make zits suddenly sprout-"unless maybe you rub the pizza across your face a few times," says New York City dermatologist Diane Berson. (So please, try to hold yourself back.) The only foods that may exacerbate acne are sushi, shellfish, and soy sauce, explains Dr. Berson; they all contain high amounts of iodine, which has been linked to inflammation and breakouts.
Related: 8 Ways to Get Rid of Acne
2. Dry skin causes wrinkles.
Wouldn't it be great if a little moisturizer could keep lines at bay? Unfortunately, wrinkles form when collagen breaks down far below the surface of the skin (which is right where dry skin occurs). Moisturizers can improve the appearance of lines, though, by temporarily plumping the parched skin around them. Sun exposure is the number one cause of collagen degeneration, so if you want a moisturizer that offers good wrinkle protection, look for one with sunscreen and an anti-aging antioxidant like vitamin C.
Related: Face Creams You Need This Winter
3. Cold water will shrink your pores.
Read more at Cosmopolitan.com!
20 Sexy Ideas for Long Hair
Beauty Tricks to Look Great in Pictures
How to Get Brighter Skin
Winter Skin Saviors |
global_01_local_0_shard_00000017_processed.jsonl/786 | Forgot your password?
Comment: Re:Good if they succeed. (Score 1) 132
by Vanders (#46413901) Attached to: Oregon Withholding $25.6M From Oracle Over Health Website Woes
Why not? Do you think Oracle paid their developers and managers in promises and unicorn farts? Why couldn't Oregon simply have paid for those developers & managers themselves?
The point of hiring contractors is that they're supposed to bring instant expertise to a project. If they don't actually do that, why bother with the extra expense of the middle man?
Comment: Re:Tempest in a tea pot (Score 1) 235
by Vanders (#46265501) Attached to: FLOSS Codecs Emerge Victorious In Wikimedia Vote
it's possible that the situation has improved
It has.
There are implementations of both available.
There are various incomplete reference encoders for both, but I'm not aware of a single non-alpha and complete implementation of either. vpxenc is close but lacks things like multi-threaded encoding, which will obviously have an impact on encoding speed.
Comment: Re:Thin. (Score 2) 235
by Vanders (#46259075) Attached to: FLOSS Codecs Emerge Victorious In Wikimedia Vote
If you know anyone who cannot legally play an MP4 video, I would like to meet them.
I've got a better question for you: why are there still people who are unable to open and play back a WebM video? What's the driver behind not including WebM support in the handful of OSes & devices that have refused so far? It isn't technical. It certainly isn't a cost issue. It surely can't be licensing. So that only leaves, what, ideology?
Are Apple & Microsoft going to continue to make their users lives more difficult because of their own ideology? Why are they doing that?
Comment: Re:Tempest in a tea pot (Score 5, Insightful) 235
by Vanders (#46257359) Attached to: FLOSS Codecs Emerge Victorious In Wikimedia Vote
the terribly performing FLOSS codec of the day
I'm not sure which codec you're referring too, so I can't answer you there.
I guess my optimism is based on WebM being an open format, thus allowing anyone to implement it on any future platform. Unlike various proprietary formats, that won't. I mean, does your 'phone support Intel Indeo or RealPlayer G2?
VP9 doesn't even match h.264, let alone h.265
That's really odd, because the benchmarks I've seen show VP8 & h264 to be evenly matched, and no one has produced a finished h.265 or VP9 codec, so I do wonder how you think you've seen those two codecs fairly benchmarked?
Comment: Re:Tempest in a tea pot (Score 4, Interesting) 235
by Vanders (#46257077) Attached to: FLOSS Codecs Emerge Victorious In Wikimedia Vote
The users are exactly the people they're thinking about. Because in ten years time, it's the users who'll be happy not to deal with some proprietary closed format that isn't supported on their new device, because sadly it's obsolete and no one cares about Intel Indeo, oh sorry, I mean, MPEG-2, oh wait, I mean, h.264. They care because by using an open format they stand a chance of providing support to the latest iBrain 7, without having to destroy the content with yet another lossy conversion.
Of course if your outlook is limited to the short term of less than the next 12 months then I guess the decision looks bad, but then you're not thinking about the long game.
Comment: Re:Bomba kryptologiczna (Score 4, Informative) 110
by Vanders (#46171921) Attached to: Second World War Code-cracking Computing Hero Colossus Turns 70
The Colossus wasn't used to crack Enigma: Bletchley has simple electro-mechanical machines (Bombes) for that. Colossus was used to crack Lorenze, which was an entirely different cipher. The basis for the software that ran on the Colossus was basically Alan Turings work on cryptanalysis, and of course it was also Turing complete. The actual design however was almost entirely the work of Tommy Flowers; a post office telephone engineer.
Comment: Re:Always looking for passionate programmers (Score 1) 533
by Vanders (#46125383) Attached to: The Moderately Enthusiastic Programmer
Most of it is personal to me, but in all honesty the ATA driver is rather funky: a ring 0 multi-threaded driver. If you ignore the completely insane stuff for handling various horrifically broken ATA hardware implementations, then the actual implementation itself is rather elegant.
I also wrote a rather interesting multi-stage asynchronous media pipeline that emulated Java/C# interfaces in C++, but that never made it past the prototype stage.
Comment: Re:Always looking for passionate programmers (Score 1) 533
by Vanders (#46123281) Attached to: The Moderately Enthusiastic Programmer
I love writing code and working on hard problems, but do I feel like working on them for 80 hours a week, every week? No, I enjoy having a life outside of work and a separation of work and home life is necessary.
So much this. I enjoy solving difficult problems, but I also enjoy a not using a computer.
Nor do I currently have any active open source projects on my Github account; because you know, I spent over ten years working on Syllable and frankly that was more than most people do in a lifetime, so I'm O.K with that.
Happily the sorts of companies I work for are O.K with that too, and prefer to judge me on my experience and work I produce professionally, rather than an irrelevant body of work that I produced in my spare time.
|
global_01_local_0_shard_00000017_processed.jsonl/787 | Forgot your password?
Posted by timothy
from the price-theory-at-work dept.
Comment: False Positives (Score 1) 465
One thing that humans do well no matter how crazy they are is take safety measures even when its 1% chance of danger depending on how it occurs. An automatic car can not calculate all the probable scenarios of that because there is no occurring for the car, its just information.
Comment: Re:Enlightenment please (Score 1) 2416
by anonymousNR (#40483401) Attached to: Supreme Court: Affordable Care Act Is Constitutional
3. Why are Americans so convinced that amoral profit seeking corporations have their best interests at heart, and not an elected government whose power is given to them by the people?
I am not a citizen of US, but I know enough that the question to your answer has something to do with what they call "Progressive Era"
Comment: Funding problems (Score 3, Insightful) 98
by anonymousNR (#40451427) Attached to: Robots To Search for Amelia Earhart's Lost Plane
A little skepticism kicks in for me, is this an attempt to raise donations for an otherwise non-funded archaeological expedition ?
Given the letters from little girls with $2 donation being displayed in their "most important sponsors page".
I am not making the expedition wrong, just throwing what came to my head, after all this is the Internet, where I can say what ever I want and get away.
Windows 8 Pre RTM Metro UI Leaked 484
Posted by timothy
|
global_01_local_0_shard_00000017_processed.jsonl/788 | Forgot your password?
Comment: Re:Just browse porn on the company laptop. (Score 1) 671
by pigphish (#39243801) Attached to: Ask Slashdot: Using Company Laptop For Personal Use
IT admins are in their ivory towers reading everyones private emails. When they are not they are annoying and not doing their job. As such most of the comments are dont do it so they can have something to do during the day (like read your personal emails). The expectation that someone will not check a personal email for 5 minutes a day at work is silly. No one lives in a silo while working. Except for IT guys of course. One aside, Euro zone privacy laws which are more progressive understand this practicality and enforce this reality. I personally think the portable apps solution on a drive is the most practical. What I have not heard mentioned is using an encrypted proxy service like tor or ipredator. This will make sure the IT guys aren't reading about your dinner plans if you are using the office network.
Professional wrestling: ballet for the common man. |
global_01_local_0_shard_00000017_processed.jsonl/790 | Students Smithsonian Education
Smithsonian Education Newsletter
Mr. President
Barack Obama
Forty-Forth President, 2009-
Landmark Election:
On November 4, 2008, Senator Barack Obama of Illinois became the first African American to be elected president, defeating Republican Senator John McCain of Arizona. Obama emerged as a frontrunner for the Democratic Party nomination in January 2008, when he won the caucus in Iowa, a state with an African American population of less than 3 percent. He lost the New Hampshire primary to Senator Hillary Rodham Clinton of New York in the following week, and a battle between the two candidates went on for the next six months. In the primary campaign, the longest in history, Obama distinguished himself from Clinton and the other major candidates by his history of consistent opposition to the war in Iraq. In the presidential race with McCain, during a time of financial crisis, the focus turned to economic issues. After his election, Obama chose Clinton as his secretary of state.
Portrait by Shepard Fairey , 2008 . - , Smithsonian National Portrait Gallery .
Fast Facts
Party: Democrat
Date of Birth: Friday, August 04, 1961
Date of Death:
Vice President: Joe Biden
First Lady: Michelle Robinson Obama
Previous Next
Smithsonian Institution
Websites A-Z
|
global_01_local_0_shard_00000017_processed.jsonl/797 | For Mac?
For Mac?
imagem de rlaouenan
I've installed the Intel Compiler 11.1 on my Mac (Snow Leopard) in order to use AVX instructions.
It compiles ok.
Then I've looked for a Intel Software Develoment Emulator for Mac, but it is only available for Windows and Intel.
So I thought that it would be possible to run my program with the Intel Debugger using the command linebut it fails as soon as a avx instruction comes. It says: "Program received signal SIGILL".
I'm actually wondering if this debugger really handles the avx instructions, because it doesn't seem to do so.
How thus can I emulate the avx instructions on a Mac machine?
Thank you for help
3 posts / 0 new
Último post
imagem de Mark Charney (Intel)
Hi, we currently do not have a vesion of Intel SDE for mac due to resource limitations in the Intel Pin development team.
imagem de Mark Charney (Intel)
We released our first mac version today: 5.31. It works with OS X versions 10.6 and 10.7. We have 10.8 support in development.
Give it a try!
Faça login para deixar um comentário. |
global_01_local_0_shard_00000017_processed.jsonl/817 | SI Vault
July 30, 2007
Slap Happy
Decrease font Decrease font
Enlarge font Enlarge font
July 30, 2007
View CoverRead All Articles
1 2
Peddling the Race
Austin Murphy almost had me convinced that SPORTS ILLUSTRATED had done another outstanding job of standing up for integrity in sports (Are They All Dirty? Does it Matter? Should We Care?, July 2--9), until the very end of his article on performance-enhancing drugs and the Tour de France, when he sold out, saying he's going back to the Tour because he "can't think of a more inspiring sight than a group of climbers clawing their way over the Col du Galibier." I can think of many sights that are more inspiring, starting with the obvious: a group of clean cyclists. Austin, instead of rolling out the tired excuse of "what's a fan to do?" have the guts to do the right thing.
Jeff Nardo, Jacksonville, N.C.
We should still care about cycling. Yes, many cyclists have been caught or confessed to drug use. But imagine if baseball, football, basketball or hockey had as strict a drug policy as cycling, with a two-year suspension for your first positive test. At least cheaters in cycling are actually getting a worthy punishment.
Adam Spartz, Columbus, Ind.
Blind Switch?
Rick Reilly's Extreme Makeover column (LIFE OF REILLY, July 2--9), on sportswriter Mike Penner's becoming Christine Daniels, tried to turn a man dressing up like a woman into a feel-good story, but it actually made me ill. Everybody is born with predispositions to do things that aren't right. That doesn't mean we should act on those predispositions. Mr. Reilly's column is a sad commentary on our "do what you want" society.
David Willis, House Springs, Mo.
In my 79 years—70 at least reading sports—I have never read a column anywhere that was so well-written, so humane and so moral on the general subject of sexual orientation. Rick, I have recommended you to my entire family and offer you my most sincere congratulations.
Frank Thompson
Farmington Hills, Mich.
1 2 |
global_01_local_0_shard_00000017_processed.jsonl/819 | Take the 2-minute tour ×
Surprisingly simple/stupid/basic question, but I have no idea: Suppose I want to return the user of my function a C-string, whose length I do not know at the beginning of the function. I can place only an upper bound on the length at the outset, and, depending on processing, the size may shrink.
The question is, is there anything wrong with allocating enough heap space (the upper bound) and then terminating the string well short of that during processing? i.e. If I stick a '\0' into the middle of the allocated memory, does (a.) free() still work properly, and (b.) does the space after the '\0' become inconsequential? Once '\0' is added, does the memory just get returned, or is it sitting there hogging space until free() is called? Is it generally bad programming style to leave this hanging space there, in order to save some upfront programming time computing the necessary space before calling malloc?
To give this some context, let's say I want to remove consecutive duplicates, like this:
input "Hello oOOOo !!" --> output "Helo oOo !"
... and some code below showing how I'm pre-computing the size resulting from my operation, effectively performing processing twice to get the heap size right.
char* RemoveChains(const char* str)
if (str == NULL) {
return NULL;
if (strlen(str) == 0) {
char* outstr = (char*)malloc(1);
*outstr = '\0';
return outstr;
const char* original = str; // for reuse
char prev = *str++; // [prev][str][str+1]...
unsigned int outlen = 1; // first char auto-counted
// Determine length necessary by mimicking processing
while (*str) {
if (*str != prev) { // new char encountered
prev = *str; // restart chain
++str; // step pointer along input
// Declare new string to be perfect size
char* outstr = (char*)malloc(outlen + 1);
outstr[outlen] = '\0';
outstr[0] = original[0];
outlen = 1;
// Construct output
prev = *original++;
while (*original) {
if (*original != prev) {
outstr[outlen++] = *original;
prev = *original;
return outstr;
share|improve this question
Note that it is bad style to ask that callers use free() to deallocate objects returned from functions, as the caller may be linked against a different C library, and this also stops you from using a different allocator in the future. You should provide a small wrapper function to free strings returned from your library. – Simon Richter Apr 16 '12 at 13:14
Thanks for the tip, but I'm not sure where the wrapper would be called: automatically upon program exit? I'm not sure how I can enforce that.. If it's just a wrapper for my function, how do I let my user type the operations (on my output string) assuming she wants to do something with it before I perform the free? Is it more conventional and accepted to write void functions that request an output pointer that I am free to modify? What if I need to realloc or change the length of such a pointer? (aside: I have to use char* or const char* rather than std::string) – Cindeselia Apr 17 '12 at 6:55
Wait, just saw this: seems like returning a const char* may solve this poor style point? stackoverflow.com/questions/3323675/… – Cindeselia Apr 17 '12 at 7:14
Hmm. How do I perform similar assignment for a const char*? Since the size is a variable, it seems like I can't declare one statically. Is there a way to avoid malloc while still using const char* for something like this? – Cindeselia Apr 17 '12 at 7:35
Your wrapper function would just call free() on the pointer, but that is now an implementation detail. If you change RemoveChains() to use a different allocation function, you can adapt the wrapper as well, and existing programs continue to function. – Simon Richter Apr 17 '12 at 11:40
show 3 more comments
11 Answers
up vote 44 down vote accepted
(a.) free() still work properly, and
Depends. Often, when you allocate large amounts of heap space, the system first allocates virtual address space - as you write to the pages some actual physical memory is assigned to back it (and that may later get swapped out to disk when your OS has virtual memory support). Famously, this distinction between wasteful allocation of virtual address space and actual physical/swap memory allows sparse arrays to be reasonably memory efficient on such OSs.
Now, the granularity of this virtual addressing and paging is in memory page sizes - that might be 4k, 8k, 16k...? Most OSs have a function you can call to find out the page size. So, if you're doing a lot of small allocations then rounding up to page sizes is wasteful, and if you have a limited address space relative to the amount of memory you really need to use then depending on virtual addressing in the way described above won't scale (for example, 4GB RAM with 32-bit addressing). On the other hand, if you have a 64-bit process running with say 32GB of RAM, and are doing relatively few such string allocations, you have an enormous amount of virtual address space to play with and the rounding up to page size won't amount to much.
But - note the difference between writing throughout the buffer then terminating it at some earlier point (in which case the once-written-to memory will have backing memory and could end up in swap) versus having a big buffer in which you only ever write to the first bit then terminate (in which case backing memory is only allocated for the used space rounded up to page size).
It's also worth pointing out that on many operating systems heap memory may not be returned to the Operating System until the process terminates: instead, the malloc/free library notifies the OS when it needs to grow the heap (e.g. using sbrk() on UNIX or VirtualAlloc() on Windows). In that sense, free() memory is free for your process to re-use, but not free for other processes to use. Some Operating Systems do optimise this - for example, using a distinct and independently releasble memory region for very large allocations.
Again, it depends on how many such allocations you're dealing with. If there are a great many relative to your virtual address space / RAM - you want to explicitly let the memory library know not all the originally requested memory is actually needed using realloc(), or you could even use strdup() to allocate a new block more tightly based on actual needs (then free() the original) - depending on your malloc/free library implementation that might work out better or worse, but very few applications would be significantly affected by any difference.
Sometimes your code may be in a library where you can't guess how many string instances the calling application will be managing - in such cases it's better to provide slower behaviour that never gets too bad... so lean towards shrinking the memory blocks to fit the string data (a set number of additional operations so doesn't affect big-O efficiency) rather than having an unknown proportion of the original string buffer wasted (in a pathological case - zero or one character used after arbitrarily large allocations). As a performance optimisation you might only bother returning memory if unusued space is >= the used space - tune to taste, or make it caller-configurable.
You comment on another answer:
So it comes down to judging whether the realloc will take longer, or the preprocessing size determination?
If performance is your top priority, then yes - you'd want to profile. If you're not CPU bound, then as a general rule take the "preprocessing" hit and do a right-sized allocation - there's just less fragmentation and mess. Countering that, if you have to write a special preprocessing mode for some function - that's an extra "surface" for errors and code to maintain. (This trade-off decision is commonly needed when implementing your own asprintf() from snprintf(), but there at least you can trust snprintf() to act as documented and don't personally have to maintain it).
share|improve this answer
Small clarification: though the extra memory might not be considered "used" by the OS if your program hasn't actually accessed it yet, it will be considered "used" by malloc() and friends, until you either free() the block or realloc() it with a smaller size. – Wyzard Apr 25 '12 at 1:28
And if the whole block has had data stored in it already, as in the case of a long string that subsequently shrinks, those pages will be considered in-use by the OS, so if memory is tight they have to be paged out (instead of just discarded) even though your program doesn't actually care about the contents. – Wyzard Apr 25 '12 at 1:29
add comment
There's nothing magical about \0. You have to call realloc if you want to "shrink" the allocated memory. Otherwise the memory will just sit there until you call free.
Whatever you do in that memory free will always work properly if you pass it the exact same pointer returned by malloc. Of course if you write outside it all bets are off.
share|improve this answer
Thanks, I see. So it comes down to judging whether the realloc will take longer, or the preprocessing size determination? – Cindeselia Apr 16 '12 at 8:29
@Cindeselia I guess. – cnicutar Apr 16 '12 at 8:29
add comment
\0 is just one more character from malloc and free perspective, they don't care what data you put in the memory. So free will still work whether you add \0 in the middle or don't add \0 at all. The extra space allocated will still be there, it won't be returned back to the process as soon as you add \0 to the memory. I personally would prefer to allocate only the required amount of memory instead of allocating at some upper bound as that will just wasting the resource.
share|improve this answer
add comment
As soon as you get memory from heap by calling malloc(), the memory is yours to use. Inserting \0 is like inserting any other character. This memory will remain in your possession until you free it or until OS claims it back.
share|improve this answer
add comment
The \0is a pure convention to interpret character arrays as stings - it is independent of the memory management. I.e., if you want to get your money back, you should call realloc. The string does not care about memory (what is a source of many security problems).
share|improve this answer
add comment
malloc just allocates a chunk of memory .. Its upto you to use however you want and call free from the initial pointer position... Inserting '\0' in the middle has no consequence...
To be specific malloc doesnt know what type of memory you want (It returns onle a void pointer) ..
Let us assume you wish to allocate 10 bytes of memory starting 0x10 to 0x19 ..
char * ptr = (char *)malloc(sizeof(char) * 10);
Inserting a null at 5th position (0x14) does not free the memory 0x15 onwards...
However a free from 0x10 frees the entire chunk of 10 bytes..
share|improve this answer
add comment
1. free() will still work with a NUL byte in memory
2. the space will remain wasted until free() is called, or unless you subsequently shrink the allocation
share|improve this answer
add comment
Generally, memory is memory is memory. It doesn't care what you write into it. BUT it has a race, or if you prefer a flavor (malloc, new, VirtualAlloc, HeapAlloc, etc). This means that the party that allocates a piece of memory must also provide the means to deallocate it. If your API comes in a DLL, then it should provide a free function of some sort. This of course puts a burden on the caller right? So why not put the WHOLE burden on the caller? The BEST way to deal with dynamically allocated memory is to NOT allocate it yourself. Have the caller allocate it and pass it on to you. He knows what flavor he allocated, and he is responsible to free it whenever he is done using it.
How does the caller know how much to allocate? Like many Windows APIs have your function return the required amount of bytes when called e.g. with a NULL pointer, then do the job when provided with a non-NULL pointer (using IsBadWritePtr if it is suitable for your case to double-check accessibility).
This can also be much much more efficient. Memory allocations COST a lot. Too many memory allocations cause heap fragmentation and then the allocations cost even more. That's why in kernel mode we use the so called "look-aside lists". To minimize the number of memory allocations done, we reuse the blocks we have already allocated and "freed", using services that the NT Kernel provides to driver writers. If you pass on the responsibility for memory allocation to your caller, then he might be passing you cheap memory from the stack (_alloca), or passing you the same memory over and over again without any additional allocations. You don't care of course, but you DO allow your caller to be in charge of optimal memory handling.
share|improve this answer
add comment
To elaborate on the use of the NULL terminator in C: You cannot allocate a "C string" you can allocate a char array and store a string in it, but malloc and free just see it as an array of the requested length.
A C string is not a data type but a convention for using a char array where the null character '\0' is treated as the string terminator. This is a way to pass strings around without having to pass a length value as a separate argument. Some other programming languages have explicit string types that store a length along with the character data to allow passing strings in a single parameter.
Functions that document their arguments as "C strings" are passed char arrays but have no way of knowing how big the array is without the null terminator so if it is not there things will go horribly wrong.
You will notice functions that expect char arrays that are not necessarily treated as strings will always require a buffer length parameter to be passed. For example if you want to process char data where a zero byte is a valid value you can't use '\0' as a terminator character.
share|improve this answer
add comment
You could do what some of the MS Windows APIs do where you (the caller) pass a pointer and the size of the memory you allocated. If the size isn't enough, you're told how many bytes to allocate. If it was enough, the memory is used and the result is the number of bytes used.
Thus the decision about how to efficiently use memory is left to the caller. They can allocate a fixed 255 bytes (common when working with paths in Windows) and use the result from the function call to know whether more bytes are needed (not the case with paths due to MAX_PATH being 255 without bypassing Win32 API) or whether most of the bytes can be ignored... The caller could also pass zero as the memory size and be told exactly how much needs to be allocated - not as efficient processing-wise, but could be more efficient space-wise.
share|improve this answer
I should say that, back to your question, everyone else here is also right - malloc/free, etc don't care whether there's a \0 in the character array or not. Many string functions do. Also, if you are going to return a suggested allocation size, make sure you're clear in your contract about whether the size returned includes or excludes the trailing \0 byte :) (or if it's number of characters vs number of bytes - usually bytes but best be specific!) I got into the habit of allocating an extra byte just in case after being burnt by a poorly documented API call. – Ian Yates Apr 18 '12 at 3:30
add comment
You can certainly preallocate to an upperbound, and use all or something less. Just make sure you actually use all or something less.
Making two passes is also fine.
You asked the right questions about the tradeoffs.
How do you decide?
Use two passes, initially, because:
1. you'll know you aren't wasting memory.
2. you're going to profile to find out where
you need to optimize for speed anyway.
3. upperbounds are hard to get right before
you've written and tested and modified and
used and updated the code in response to new
requirements for a while.
4. simplest thing that could possibly work.
You might tighten up the code a little, too. Shorter is usually better. And the more the code takes advantage of known truths, the more comfortable I am that it does what it says.
char* copyWithoutDuplicateChains(const char* str)
if (str == NULL) return NULL;
const char* s = str;
char prev = *s; // [prev][s+1]...
unsigned int outlen = 1; // first character counted
// Determine length necessary by mimicking processing
while (*s)
{ while (*++s == prev); // skip duplicates
++outlen; // new character encountered
prev = *s; // restart chain
// Construct output
char* outstr = (char*)malloc(outlen);
s = str;
*outstr++ = *s; // first character copied
while (*s)
*outstr++ = *s; // copy new character
// done
return outstr;
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/820 | Take the 2-minute tour ×
Possible Duplicate:
file_get_contents with https?
Problems getting XML content via https using SimpleXML and PHP
I have the URL:
Which loads a file like this one:
<calendar accommodation_id="1234567">
<day date="2012-08-09" vacancy="false" minimum_nights="7" arrival_day="true"/>
<day date="2012-08-10" vacancy="false" minimum_nights="3" arrival_day="true"/>
<day date="2012-08-11" vacancy="false" minimum_nights="3" arrival_day="true"/>
<day date="2014-01-31" vacancy="true" minimum_nights="3" arrival_day="true"/>
For some reason my script won't let me get the contents of this file. I'm using the same script as i have been with other URLs but this will always fail.
My script is:
$accom2 = file_get_contents();
Is there something I need to do for this type of URL?
share|improve this question
What error are you seeing? – bcmcfc Aug 9 '12 at 14:02
According to this page, you need openssl enabled. Do you have it enabled? (And please don't repeat a question, move back to your older one) – Alvin Wong Aug 9 '12 at 14:13
Please do not duplicate questions. Instead, edit your previous one. – hakre Aug 9 '12 at 16:04
add comment
marked as duplicate by hakre, PeeHaa, Yan Berk, j0k, kapa Aug 10 '12 at 8:39
2 Answers
up vote 4 down vote accepted
probably an answer here: (if protocol is the issue)
file_get_contents with https?
share|improve this answer
Yes it was the extension=php_openssl.dll that needed to be activated in my php.ini thanks!! – user1482082 Aug 9 '12 at 14:14
This is more a comment than an answer. Just saying, it's not your fault that OP is rather unspecific. – hakre Aug 9 '12 at 16:07
Duplicates should not be posted as answer. You have comments and flags for that. – kapa Aug 10 '12 at 8:40
i wasn't aware of it... I can't delete and make only a comment as it's an accepted answer. – N4553R Aug 10 '12 at 8:45
add comment
Have you tried simplexml_load_file, I tested it's working for me
$xml = simplexml_load_file('https://www.casapilot.com/api/1/accommodations/calendar.xml?auth_token=hyXHjP8QdrRuX8q3FsbC&id[]=1049165');
share|improve this answer
But presumably file_get_contents() would also work for you? – w3d Aug 9 '12 at 16:44
add comment
|
global_01_local_0_shard_00000017_processed.jsonl/821 | Take the 2-minute tour ×
I have some Javascript code.
I want to trace errors and debug it.
how to do it ?
share|improve this question
Debugging is usually done with a debugger... which is present in almost every modern browser. Try pressing F12 or looking over the menus. – DCoder Sep 12 '12 at 7:15
Which browser do you use? (IE's forbidden) – sp00m Sep 12 '12 at 7:15
Mozilla Firefox – H H F Sep 12 '12 at 7:27
add comment
3 Answers
up vote 2 down vote accepted
It used to be that debugging in javascript was quite limited. You could post alerts to indicate variable states or print information to the web page. In the case of syntax error, it would simply not execute all the code (meaning you had to place alerts prior to the error to know where it was).
Thankfully, browsers have caught up. Firebug is very useful as well as Chrome's developer tools which both use breakpoints, expression evaluation, as well as a series of other useful tools for debugging in-browser. I would suggest you look into these. I believe also internet explorer has a developer tools section, but I've found that it isn't to my liking, however you're free to use whatever you need/require.
share|improve this answer
add comment
It depends on the browser:
Most of these tools are accessible via these keyboard shortcuts:
• F12
Look for the "Console" Tab. There the browser prints various errors like JavaScript errors, resource not loaded errors etc. To manually write to the console, most browsers offer the console object which hosts functions for the console. Most commonly used is console.log('text').
share|improve this answer
I have already installed firebug in firefox then how to use it ? – H H F Sep 12 '12 at 7:24
@HHF look for the console tab. There the browser prints various errors, including JS errors. – Joseph the Dreamer Sep 12 '12 at 7:26
add comment
Google Chrome
F12 -> console.
in code use: console.log(variables);
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/822 | Take the 2-minute tour ×
I'm using watir-cucumber for test automation. I wrote following method in a separate .rb, this method is not in step definitions.
def has_logged_in?
$browser.text.should include("t788")
When I call this method from step definition this error comes,
wrong argument type String (expected Module) (TypeError)
the same code works fine in step definitions. I searched around and found out that include method is used to include module but that is ruby-include method and should include comes under rspec\expectations. So how do I call should include method outside step definition like above. I'm using watir-cucumber on linux
share|improve this question
Where and why you wrote that method? – Ismael Abreu Oct 22 '12 at 13:35
you could do text.should =~ /t788/ just as well – froderik Oct 22 '12 at 14:43
@IsmaelAbreu I wanted to test if user has logged in so instead of writing it for every step I would like to call this function and then it will decide step is passed or failed. This is to avoid repetation in code – Uday Swami Oct 23 '12 at 6:31
@froderik it isn't working – Uday Swami Oct 23 '12 at 6:32
add comment
2 Answers
The include method that you want is in the RSpec::Matchers module.
If your has_logged_in? method is in a class (not part of main), you can include the RSpec::Matchers module in your class. This would give you access to the include method.
So your class would look like:
class YourClass
include RSpec::Matchers
def has_logged_in?
$browser.text.should include("t788")
Note: I have not had to do this before, but from a quick check, it does work as long as the RSpec::Matchers are included in a class rather than the main. Including it in the main does not appear to do anything (ie include continues to call the standard include module method). I did not explore to see if if there are any negative side effects of doing this.
share|improve this answer
its not working – Uday Swami Oct 26 '12 at 6:29
@UdaySwami is it the same exception you saw before? Can you share your entire .rb file? – Justin Ko Oct 31 '12 at 17:28
add comment
In your gem file:
gem 'rspec', "1.3.2", :require => "spec/expectations"
Or in your env.rb for RSpec 1.X.X:
require 'spec/expectations'
Or in your env.rb for RSpec 2.X:
require 'rspec/expectations'
share|improve this answer
I did that require 'rspec/expectations' in my code – Uday Swami Oct 23 '12 at 6:25
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/823 | Take the 2-minute tour ×
I am using Gremlin and Neo4j to manipulate the ENRON dataset from infochimps. This dataset has two types of vertexes, Message and Email Addresss and two types of edges, SENT and RECEVIED_BY. I would like to create a custom index on this dataset that creates a Lucene document for each vertex of type: 'Message' and incorporates information from associated vertexes (e.g., v.in(), v.out()) as additional fields in the Lucene document.
I am thinking of code along the lines of
g = new Neo4jGraph('enron');
PerFieldAnalyzerWrapper analyzer =
new PerFieldAnalyzerWrapper(new StandardAnalyzer());
analyzer.addAnalyzer("sender", new KeywordAnalyzer());
analyzer.addAnalyzer("recipient", new KeywordAnalyzer());
IndexWriter idx = new IndexWriter (dir,analyzer,IndexWriter.MaxFieldLength.UNLIMITED);
g.V.filter{it.type == 'Message'}.each { v ->
Document doc = new Document();
doc.add(new Field("subject", v.subject));
doc.add(new Field("body", v.body));
doc.add(new Field("sender", v.in().address);
v.out().each { recipient ->
doc.add(new Field("recipient", recipient.address));
My questions are:
1. Is there a better way to enumerate vertexes for indexing?
2. Can I use auto-indexing for this, and if so, how to I specify what should be indexed?
3. Can I specify my own Analyzer, or am I stuck with the default? What is the default?
4. If I must create my own index, should I be using gremlin for this, or am I better off with a Java program?
share|improve this question
Did you manage to solve this? I'm facing the same issues... (specifically, i'm concerned about bullets 1 & 2 in your question). – royv May 8 '13 at 22:29
add comment
1 Answer
I will be talking about direct Neo4j access here since I'm not well travelled in Gremlin.
So you'd like to build a Lucene index "outside of" the graph itself? Otherwise you can use the built in graphDb.index().forNodes( "myIndex", configForMyIndex ) to get (created on demand) a Lucene index associated with neo4j. You can then add multiple fields to each document by calling index.add( node, key, value ), where each node will be represented by one document in that Lucene index.
1) In Gremiln... I don't know
2) See http://docs.neo4j.org/chunked/milestone/auto-indexing.html
3) See http://docs.neo4j.org/chunked/milestone/indexing-create-advanced.html
4) Do you need to create it outside of the db entirely? If so, why?
share|improve this answer
I had seen that example, but it doesn't allow me to specify analyzers. See the comments at the bottom of the page on advanced indexing (second link above). – Gene Golovchinsky Oct 25 '12 at 15:41
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/824 | Take the 2-minute tour ×
This is my first time working with node.js and I am trying to use express.io to save cookies.
I have literally carbon copied the tutorial ( https://github.com/techpines/express.io/tree/master/examples#sessions ) but I only receive this error:
root@server1 [/nodeexample]# node server.js
//Result after First Page Load
{ touch: [Function],
resetMaxAge: [Function],
save: [Function],
reload: [Function],
destroy: [Function],
regenerate: [Function],
name: 'test',
feelings: 'test' }
//Result after refresh
expires = 'string' == typeof sess.cookie.expires
TypeError: Cannot read property 'expires' of undefined
at /nodeexample/node_modules/express.io/node_modules/express/node_modules/connect/lib/middleware/session/memory.js:46:47
at process._tickCallback (node.js:415:13)
Edit: I have the main server file in /nodeexample and the client script in: /home/mysite/public_html/nodetest
I did notice the app.get does not seem to be getting called. the final alert comes back as Also, you joined undefined
The error does not appear until the second refresh, and it seems as if it does work originally.
The Code I have is:
express = require('express.io')
app = express().http().io()
// Setup your sessions, just like normal.
app.use(express.session({secret: 'monkey'}))
// Session is automatically setup on initial request.
req.session.loginDate = new Date().toString()
// Setup a route for the ready event, and add session data.
app.io.route('ready', function(req) {
req.session.name = req.data
req.session.save(function() {
// Send back the session data.
app.io.route('send-feelings', function(req) {
req.session.feelings = req.data
req.session.save(function() {
req.io.emit('session', req.session)
<script src="http://localhost:7076/socket.io/socket.io.js"></script>
var socket = io.connect('http://localhost:7076');
// Emit ready event.
socket.emit('ready', prompt('What is your name?'))
// Listen for get-feelings event.
socket.on('get-feelings', function () {
socket.emit('send-feelings', prompt('How do you feel?'));
// Listen for session event.
socket.on('session', function(data) {
message = 'Hey ' + data.name + '!\n\n'
message += 'Server says you feel '+ data.feelings + '\n'
message += 'I know these things because sessions work!\n\n'
message += 'Also, you joined ' + data.loginDate + '\n'
I am not sure if I am missing a dependency or not? I loaded it with npm install express.io
Any help is greatly appreciated!
share|improve this question
Why is the app.get part of the server commented out? what page is the client loading if there is no route? – Benjamin Kaiser Oct 20 '13 at 4:40
I updated my question, I had tried this with the app.get commented out and having it added. I had assumed the node server should not be in the public_html folder since people would be able to access the scripts. I am still brand new to node.js and am trying to learn how it is all suppose to work. I assume its something very straightforward I am doing wrong. – Corey Oct 20 '13 at 19:03
add comment
1 Answer
OK, so I figured it out finally, Ben led me on the right direction and it was due to the app.get function. It was a miss understanding of where the client file was suppose to be.
The req.sendfile will actually send the html to the port when it is opened. I had the client file in public_html of my website where instead it should have been in the node server folder.
This way when you go to www.whateveryoursiteis.com:7076 it would load it load the html client for you.
Run: node /node/server.js
Load: www.yoursite.com:7076
I figured this was a pretty simple mistake, this answer might help another newbie on his way
share|improve this answer
Glad I could help :) – Benjamin Kaiser Oct 20 '13 at 23:23
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/825 | Take the 2-minute tour ×
I have a timer app which uses a NSTimer to track minutes. How can I keep the timer going, even when the device is put into sleep mode? Thanks!
share|improve this question
You need to update your question with information about why you think you need the timer to keep going when the device is asleep. Most likely there is a better solution but it depends on what you need this for. – rmaddy Nov 24 '13 at 17:27
add comment
2 Answers
up vote 1 down vote accepted
Adjust After Wake Notification
Scheduled NSTimer instances will halt during sleep. Your application needs to respond to the NSWorkspace's wake notification and adjust its timers.
If you do not respond to wake notifications, your timers will resume but without accounting for the time spent asleep.
See Apple's technical note QA1340 Registering and unregistering for sleep and wake notifications for getting the appropriate notifications.
Consider this situation:
• Create a timer to trigger in 5 minutes
• Wait 1 minute
• Put the computer to sleep for an hour
• Wake the computer
• The timer resumes upon waking
• The timer triggers 4 minutes after waking
From the timer's perspective, five minutes has passed by. Note the language used by NSTimer, it uses relative durations rather than absolute times, scheduledTimerWithTimeInterval:invocation:repeats:.
share|improve this answer
What happens if I don't respond to wake notifications, as I am doing now? – PanicDev Nov 24 '13 at 16:54
Your timer will resume but not account for the time spent asleep. – Graham Miln Nov 25 '13 at 11:30
Could I use something like NSDate to track and add the time spent asleep? – PanicDev Nov 25 '13 at 15:01
Yes, NSDate is the recommended way to get the current date and time. You will need to reschedule your timer after wake. – Graham Miln Nov 25 '13 at 19:01
add comment
Take a look at this class, which handles sleep/wake for you with the "Hourglass" behavior: https://github.com/jmah/MyLilTimer
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/826 | Take the 2-minute tour ×
Is there a way to see what timeouts, intervals or async operations (or endless loops) are still running and are stopping my process from ending?
I have been able to figure it out so far without such a tool, but such a tool would be very handy especially as the Node.JS projects here start to get bigger.
I am thinking of Java's kill -3 which prints a stack trace to stderr. You can do this for any process, any time, debug or no. I would like an equivalent for Node.JS. (I know that node is single threaded with async so it would output differently)
share|improve this question
I had a similar problem, are you running into this issue when running tests with some sort of database? For example, my unit tests when I was using mongodb would never exit because of the internal mongo timeouts/intervals. – kcbanner May 6 '11 at 19:44
@kcbanner: In MySQL, you have to end the connection before the process will do an auto exit. It may be the same in mongodb? Or did you already try that? – George Bailey May 6 '11 at 20:48
Yea, ending the connection fixes it. – kcbanner May 7 '11 at 18:00
add comment
1 Answer
up vote 6 down vote accepted
Posted a feature request https://github.com/joyent/node/issues/1025
share|improve this answer
That would be great. – Amjad Masad May 8 '11 at 9:35
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/827 | Take the 2-minute tour ×
For my iphone App i am not able to select ios device or ios Simulator for running the project it is only showing option for mac-64 bit what could be wrong?
I am facing this problem after I moved my project from one sesktop system to another.
please help and suggest
share|improve this question
add comment
3 Answers
up vote 3 down vote accepted
Actually I facing this problem beacouse I have renamed the project
I could solve it from
Manage scheme-> Autocreate scheme now
share|improve this answer
Thanks ! I was running code from xCode 4.4.1 to 4.3.1. I was getting same problem. your solution is worked for me. – Swapnil Godambe Dec 22 '12 at 3:50
add comment
Maybe your sdk versions differ, did you try to recreate the project and just import the code.
If this is a one time change that might be working out.
share|improve this answer
add comment
Try going into the project settings, and changing the base SDK to iOS (4.3).
An option for this can be found in the info and build settings panels of the project window. I recommend changing it in both places
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/828 | Take the 2-minute tour ×
<script type = "text/javascript">
var counter = 0;
function AddFileUpload() {
var div = document.createElement('DIV');
function RemoveFileUpload(div) {
$(document).ready(function () {
<br /><br />
<div id = "FileUploadContainer">
<br />
<br />
For i As Integer = 0 To Request.Files.Count - 1
Dim PostedFile As HttpPostedFile = Request.Files(i)
If PostedFile.ContentLength > 0 Then
Dim FileName As String = System.IO.Path.GetFileName(PostedFile.FileName)
End If
End Sub
share|improve this question
add comment
1 Answer
Your question is a bit confusing.. But by the things that i have understood from your question. i would say if u have problem of adding forms into your content form u can remove form from the master page and then u have to add forms to each content form you will add.
Bu if you want multiple forms in your page u can do so by making only one form visible at a time.
But see to it that the form is in another placeholder from the one which already had form in it. Question is a bit confusing but hope i was able to give u solution ...
share|improve this answer
no what i mean what i not able to save the image – actKing Feb 3 '12 at 8:14
what is the error that you are getting or there is no error message at all?... – RohitWagh Feb 3 '12 at 8:22
there no error, i update my code, basically i have a javascript which have a input that allow me to upload a file or image, but the problem, it seem like total skip the code inside – actKing Feb 3 '12 at 8:27
you understand what i mean? – actKing Feb 3 '12 at 8:33
Yes got your Problem. It seems like the JavaScript code creates the control on fly and is not adding it to the actual code (check in view source). Thus asp.net is not getting any thing to upload. – RohitWagh Feb 3 '12 at 8:47
show 7 more comments
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/829 | Take the 2-minute tour ×
I have a project created in Eclipse that has roughly this structure:
• src
• conf
• test
• WebContent
• WEB-INF
When integrating with maven the structure should be more like this:
• src
• main
• java
• resources
• webapp
• WEB-INF
• test
I can either modify the pom to work on the old structure, but I prefer to have the classic maven structure. Is there anyway to move the files in the new structure in order to keep their history? How can I do that?
share|improve this question
I doubt if it is possible – Chetan Feb 15 '12 at 21:38
add comment
1 Answer
up vote 3 down vote accepted
You can move files/folders in SVN retaining history. See this related SO post. If you use subversion client integrated with Eclipse (subclipse or subversive), then you can do this within Eclipse itself, by choosing Refactor -> Rename../Move... and commit the changes.
share|improve this answer
Thanks very much, it worked. You can change the whole structure and add maven in a single commit, and all history has been preserved – Alin Stoian Feb 16 '12 at 16:31
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/848 | Take the 2-minute tour ×
We have several HP Thin-Clients of type t5545 in use. We redirect USB-Media to the terminalserver. Because the t5545 runs a debian customized by hp, we can treat it like a debian in some way.
First, I'll explain how usb-redirection is configured:
• automatically mount it to /tmp/tmpfs/media
• /tmp/tmpfs/media is redirected as disk "Z" via rdesktop-parameter -r disk:sharename=path
• in case of removed usb-media udev will run a script to umount -l the device and delete the mountpoint
The environment:
• Thin-Clients run linux: root@mac-addr:/tmp/tmpfs/media# uname -a
Linux mac-addr 2.6.26-2-686 1 SMP Wed Nov 4 20:45:37 UTC 2009 i686 GNU/Linux
• Terminalserver runs Windows Server 2008 R2
Problem: When users write to usb-media, it seams to be written instantly. But in fact the file needs a few seconds to be written even if it has only a few kb. Server 2008 R2 doesn't show any hint about that. If the user removes his usb-media directly after writing to the usb-media, the file won't be at his usb-media.
Question: Is there anything I can do to inform the user about the write-progress? If possible, that shouldn't be a third-party tool that has to be installed on the thinclient because there's very less space.
Edit: No ideas? The solution shouldn't be like the windows-7-known save removal of usb-media. It would be fine if there's even a notification if the write-progress is ongoing or ready.
No solution yet! There's still the chance to get the 150 reputation points!
I need one of these 2 points:
- a way to inform the user when the write-process is done, or...
- a script/little application with no dependencies (because the flash-disk is almost full) that allows save removal of usb-media
I would really like to give that bounty away. Hurry up ;)
share|improve this question
Wait, Rdesktop to 2008 R2? I have never made this to work! It always disconnects instantly... – sinni800 May 16 '11 at 11:23
Yes it works... mostly... According to dpkg -l | grep rdesktop there's rdesktop 1.6.0-1.36 customized by hp installed. They had to apply a patch to resolve some usb-redirection errors like not beeing able to delete non-empty-directories and an additional udev-rule to unmount usb-media automatically when it's unplugged. But apart from that, it works. – wullxz May 16 '11 at 12:37
Huh, last time I tried it it didn't work, I have to try again... – sinni800 May 16 '11 at 13:49
add comment
4 Answers
up vote 1 down vote accepted
Mount your local stuff (/tmp/tmpfs/* in your case) with sync option.
share|improve this answer
meanwhile, we don't supervise the client anymore. Nevertheless, this hint would mostly prevent data from getting lost and I accept this answer for this reason. However, I'm not able to test this solution - I only read the manpage of mount to learn what the sync option does. – wullxz Jul 23 '12 at 21:49
add comment
The problem is not with RDESKTOP nor with Windows. It's from the way how Linux (and other OS) works with Removable Media. They are supposed to be removed safely and then be unplugged in order to make sure freshly written data has been synced.
What you can do is to inform your system to make those "syncs" more often.
you can write a C daemon which would do it for you. Or you can dig into the kernel module settings and specify not to use write-cache.
share|improve this answer
I could've written a C daemon but I'm not a good programmer and even less a linux programmer. I understand your idea and thought of it, too, but it's not possible for me to implement it. However, you gave me no solution but good hints - I vote you up anyway. – wullxz Jul 23 '12 at 21:54
add comment
You can use fuser to see which pid is using a mount point.
/media/sdc1 is working? fuser -vm /media/sdc1 will show user, pid, access and command. You will need some script to do the trick. Check if F access (open file for writing) is up.
E.g. Checking if someone is using sr0:
$ fuser -m /dev/sr0 -v
dvd 17298 F.... xfburn
share|improve this answer
add comment
This is a tricky one. If I got this right, you want a user to wait a few seconds before removing their USB drive, which appears as a folder inside their remote desktop session. My only idea to solve this would to be use this utility which will see the folder(mount point) has gotten new data and then can trigger a script to launch a dialog box (I'd use autohotkey) that would alert the user, "You have recently inserted a USB device, please wait 20 seconds after the last time you save data to your USB before removing it. Otherwise, your data may not save properly." Have it monitor Z:\ to see if a folder is created.
Or, have you tried freerdp? It might not contain the delay which you mention.
share|improve this answer
the problem is, that my client is a thin-client. There's not much space left on the flash-disk. I would like to have a solution that allows save removal of usb-media or that notfies me exactly after all write-tasks are ended. I don't know what files will be written to usb-media and how large they will be. That means: it could be, that 20 seconds aren't enough to wait... I want to be save with that. – wullxz May 25 '11 at 16:16
but if people are in an RDP session and something pops up on their machine outside their RDP, will they see it? take a look at this utility: iwatch.sourceforge.net/index.html – yeedl May 31 '11 at 0:01
okay... I have to look at this. Sadly I have many tasks today and can't test it within the next 24 hours. Can you tell me how much disk space this package needs? Are there any dependancies? If nothing works, I'll have to write a little script for the server and the thin-client to allow the user to unmount the usb-stick (that shouldn't be too difficult). – wullxz May 31 '11 at 9:39
sadly iwatch has too much dependencies that aren't installed yet on the thinclient. That wouldn't fit on the flash-disk. Do you have other ideas? – wullxz Jun 1 '11 at 10:03
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/849 | Take the 2-minute tour ×
I am trying t find out if there is a way my DELL E6420 can run 3 external monitors?
I currently run 2 with the laptop screen as the third using a Dell docking station. The docking station still has one VGA port available.
share|improve this question
Have you tried using the single vga port that is free? – Ramhound Jan 31 '12 at 18:48
Rick, did you ever find an answer? I, too, would like to know if it's possible to run 3 external 24", 1920x1200 monitors through the dock with the Nvidia graphics. – Charles Chen May 3 '12 at 20:15
See my answer, I forgot that I had asked this question. – rick schott Jul 13 '12 at 21:27
add comment
4 Answers
You will need to get a USB -> VGA adapter in order to run three monitors or a more expensive solution. These USB -> VGA Adapters usually run $50. However, they suck for anything other than business use. Even then, it feels like you're "RDPing or VNCing" into that extra monitor. It is rather laggy.
share|improve this answer
+1 for the recommended solution. But, I wouldn't describe the USB->VGA experience as sucky as network remote control. It is somewhat better than that. But you're right that falls short in certain circumstances, e.g. full screen video. Other than the obvious frequent refresh scenarios, I don't find it too laggy, especially if I keep the color quality at Medium (16-bit). My Microsoft Outlook lives on that second monitor, along with a few well-behaved apps. See also my answer at superuser.com/a/14119/781 – Chris W. Rea Jan 31 '12 at 19:00
add comment
This is similar to situations where your laptop has a VGA, DVI and/or HDMI. You can have only two monitors running at the same time. This includes the laptop screen. You could run two external monitors or laptop + vga. Other than that, get a USB to VGA adapter. They are for the desperate though. Don't get if you're expecting to watch videos or play games.
share|improve this answer
add comment
I currently have a E6420 and was hoping to have two monitors and laptop display but it was a no go. I use the SIIG USB to VGA adapter. I work with spreadsheets and web pages so I am not looking for speed so it works for what I need.
I am running WIN 7 (64) and it works well. If you want to view videos and/or play games you can use the other monitor. Performance is a bit slow when dragging across screen but it is negligible.
share|improve this answer
Are you using a dock or just the ports on the base machine? – Charles Chen May 3 '12 at 20:16
add comment
up vote 1 down vote accepted
I was able to run 3 24" monitors plus the laptop screen if need be on Windows 7 with a dock:
• 1 HDMI Cable
• 1 DVI Cable
• 1 VGA Cable
• Open the laptop screen
enter image description here
share|improve this answer
How did you get it to work, did you have to buy a USB dongle? Or where you able to do it with the dock and the hdmi port on the laptop? – user151332 Aug 9 '12 at 16:21
@Dccloth My dock has 3 video out ports (1 each: display port, DVI, and VGA); I can use all 3 of them and the laptop screen at the same time (2 on the Quadro, 2 on the IGP). If you have a model with only the IGP I suspect you're limited to 2 screens. – Dan Neely Nov 5 '12 at 15:19
add comment
protected by Community Aug 9 '12 at 16:26
|
global_01_local_0_shard_00000017_processed.jsonl/850 | Take the 2-minute tour ×
Firefox is completely unable to load twitter.com when I am using my Ubuntu Karmic partition. The tab just says "Loading" for minutes until it reports that the site has timed out. All other websites I use work just fine.
I can ping the site just fine
The same computer but using the windows partition loads twitter.com fine. Other computers on the network using either windows or karmic also load the site just fine.
share|improve this question
sounds funny, have this happened for a long time? the other day i have somewhat similar problem, but it disappeared – phunehehe Dec 4 '09 at 11:19
Have you tried with Konqueror, Opera, wget, cURL? Does any of those connect? – Boldewyn Dec 4 '09 at 12:46
add comment
2 Answers
up vote 2 down vote accepted
Open your /etc/hosts file and look for a record for twitter.com.
If there is one, remove it, and try again.
share|improve this answer
Now I feel like dork. I set a local ip for twitter while at rails camp uk and forgot all about it. Doh! – srboisvert Dec 4 '09 at 13:19
add comment
This happens sometimes, on various sites. Something with the cookie that authenticates you. Try right-clicking the page, Page Info -> Privacy tab and click the 'view cookies' button. delete all the twitter cookies and reload.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/851 | 518 reputation
bio website fullcourtdev.com
location Florida
age 29
visits member for 3 years, 3 months
seen Mar 8 at 6:08
Front-end developer for NantHealth with a passion for all things UI/UX. I've spent the past few years deep in the ever-changing world of front-end web development. It's a wild ride! |
global_01_local_0_shard_00000017_processed.jsonl/853 | How To Call SQL Server System Stored Procedures from RDO
Article translations Article translations
Article ID: 166211 - View products that this article applies to.
This article was previously published under Q166211
Expand all | Collapse all
This article describes how to call system-stored procedures on SQL Server from RDO.
SQL Server has a number of prewritten, stored procedures that are used to configure and administer the SQL server. They are all located in the Master database and have the prefix [ASCII 147]sp_,[ASCII 148] which distinguishes them from user- or application-written stored procedures.
In order to call these stored procedures from RDO, you must specify the correct database in which they reside, the master database. There are several ways to do this, but the most effective way is to explicitly reference the stored procedure in your call syntax. For example:
{ ? = call master.dbo.sp_addlogin(?,?) }
Another method to accomplish this behavior is to set the default database before creating and executing your stored procedure. The following example uses a prepared statement and assumes that "Pubs" is your default database, cn is an active rdoConnection object, and qr is an rdoQuery object:
cn .Execute "Use Master"
qr.SQL = "some sql to execute..."
Set qr.ActiveConnection = cn
qr .Execute
cn .Execute "Use Pubs"
1. Start a new Standard EXE project. Form1 is created by default.
2. Add a CommandButton (Command1) to Form1.
3. From the Project menu, select References, and place a check next to Microsoft Remote Data Object 2.0.
4. Paste the following code into the General Declarations section of Form1:
Private Sub Command1_Click()
Dim cn As New rdoConnection
Dim qr As New rdoquery
With cn
.Connect = "Driver={SQL Server};Server=MyServer;" & _
"Database=pubs;Uid=<username>;Pwd=<strong password>"
.EstablishConnection Prompt = rdDriverNoPrompt
End With
With qr
Set .ActiveConnection = cn
'Note: If you don't specify master, you will get the following
'error: "An invalid parameter was passed."
.SQL = "{ ? = call master.dbo.sp_addlogin(?,?) }"
.Prepared = True
.BindThreshold = 1024 'largest column that will be bound under
Debug.Print .rdoParameters.Count
.rdoParameters(0).Direction = rdParamOutput
.rdoParameters(1).Direction = rdParamInput
.rdoParameters(2).Direction = rdParamInput
.rdoParameters(1) = "Edward"
.rdoParameters(2) = "Scissorhands"
Debug.Print .rdoParameters(0).Value
'Const SQL_SUCCESS As Long = 0
'Const SQL_ERROR As Long = -1
End With
End Sub
5. Note that you need to change your DATABASE, UID, and PWD parameters in the Connect Property.
6. Start the program or press the F5 key.
7. Click the Command1 button to execute the stored procedure and display the parameter count and the output parameter in the debug window.
In Visual Basic Books Online, please see:
Guide to Building Client Server Applications in Visual Basic (Enterprise)
Part 3: Data Access Options
Using Remote Data Objects and the Remote Data Control
Using RDO to Execute Stored Procedures
(c) Microsoft Corporation 1997, All Rights Reserved. Contributions by Jon Fowler, Microsoft Corporation
Article ID: 166211 - Last Review: February 21, 2014 - Revision: 2.1
• Microsoft Visual Basic 5.0 Enterprise Edition
• Microsoft Visual Basic 6.0 Enterprise Edition
kbnosurvey kbarchive kbhowto KB166211
Give Feedback
Contact us for more help
Contact us for more help
Connect with Answer Desk for expert help.
Get more support from |
global_01_local_0_shard_00000017_processed.jsonl/855 | Article ID: 2643588 - View products that this article applies to.
Expand all | Collapse all
A federated user can't access Office 365, Windows Intune, or Windows Azure as a different federated user. If the federated user logs on to the corporate Active Directory Domain Services as a different federated user, he or she is automatically signed in to Office 365, Windows Intune, or Windows Azure as the original federated user and isn't prompted to enter credentials of a different federated user.
Use the Run as command in Windows to run a program from which Office 365, Windows Intune, or Windows Azure resources will be accessed by using alternate credentials.
This behavior is by design. Consider the case when single sign-on (SSP) uses Integrated Windows authentication to authenticate to Active Directory Federation Services (AD FS). In this case, SSO always uses the domain user context instead of any alternate user identity that's provided to Windows Azure Active Directory (Windows Azure AD).
Still need help? Go to the Office 365 Community website or the Windows Azure Active Directory Forums website.
Article ID: 2643588 - Last Review: December 10, 2013 - Revision: 14.0
Applies to
• Windows Azure
• Microsoft Office 365
• Microsoft Office 365 for enterprises (pre-upgrade)
• Microsoft Office 365 for education (pre-upgrade)
• CRM Online via Office 365 E Plans
• Windows Azure Recovery Services
o365 o365a o365022013 after upgrade o365062011 pre-upgrade o365e o365m KB2643588
Give Feedback
Contact us for more help
Contact us for more help
Connect with Answer Desk for expert help.
Get more support from |
global_01_local_0_shard_00000017_processed.jsonl/856 | Welcome to the Official BlackBerry Support Community Forums.
inside custom component
BlackBerry World
New Member
Posts: 1
Registered: 10-13-2012
My Carrier: bmobile
app world.
hi my phone was stolen from me a few months ago. however i got it back but the guy changed my blackberry app world setting and now bb app world is telling me i cannot log in due to my email and password being wrong. they have blocked me and i wud like to update some of my running applications.
Please use plain text.
Hall of Famer II
Posts: 45,713
Registered: 11-28-2008
My Carrier: TMobile USA
Re: app world.
Hi and Welcome to the Community!
Here are some KBs that discuss your situation:
• KB24157 BlackBerry ID lockout behavior
Good luck and let us know!
Occam's Razor nearly always applies when troubleshooting technology issues!
Join our BBM Channels
BSCF General Channel
PIN: C0001B7B4 Display/Scan Bar Code
Knowledge Base Updates
PIN: C0005A9AA Display/Scan Bar Code
Please use plain text. |
global_01_local_0_shard_00000017_processed.jsonl/860 | Export (0) Print
Expand All
6 out of 10 rated this helpful - Rate this topic
Retrieving and Writing XML Data
SQL Server 2000
You can execute SQL queries to return results as XML rather than standard rowsets. These queries can be executed directly or from within stored procedures. To retrieve results directly, you use the FOR XML clause of the SELECT statement, and within the FOR XML clause you specify an XML mode: RAW, AUTO, or EXPLICIT.
For example, this SELECT statement retrieves information from Customers and Orders table in the Northwind database. This query specifies the AUTO mode in the FOR XML clause:
SELECT Customers.CustomerID, ContactName, CompanyName,
Orders.CustomerID, OrderDate
FROM Customers, Orders
WHERE Customers.CustomerID = Orders.CustomerID
AND (Customers.CustomerID = N'ALFKI'
OR Customers.CustomerID = N'XYZAA')
ORDER BY Customers.CustomerID
Whereas you can use the FOR XML clause to retrieve data as an XML document, you can use the Transact-SQL OPENXML function to insert data represented as an XML document. OPENXML is a rowset provider similar to a table or a view, providing a rowset over in-memory XML documents. OPENXML allows access to XML data as if it is a relational rowset by providing a rowset view of the internal representation of an XML document. The records in the rowset can be stored in database tables. OPENXML can be used in SELECT, and SELECT INTO statements where a source table or view can be specified.
The following example shows the use of OPENXML in an INSERT statement and a SELECT statement. The sample XML document consists of <Customers> and <Orders> elements. First, the sp_xml_preparedocument stored procedure parses the XML document. The parsed document is a tree representation of the nodes (elements, attributes, text, comments, and so on) in the XML document. OPENXML then refers to this parsed XML document and provides a rowset view of all or parts of this XML document. An INSERT statement using OPENXML can insert data from such a rowset into a database table. Several OPENXML calls can be used to provide rowset view of various parts of the XML document and process them, for example, inserting them into different tables (this process is also referred to as "Shredding XML into tables"). In the following example, an XML document is shredded in a way that <Customers> elements are stored in the Customers table and <Orders> elements are stored in the Orders table using two INSERT statements.
DECLARE @hDoc int
EXEC sp_xml_preparedocument @hDoc OUTPUT,
<Customers CustomerID="XYZAA" ContactName="Joe"
<Orders CustomerID="XYZAA"
<Orders CustomerID="XYZAA"
<Customers CustomerID="XYZBB" ContactName="Steve"
CompanyName="Company2">No Orders yet!
-- Use OPENXML to provide rowset consisting of customer data.
INSERT Customers
WITH Customers
-- Use OPENXML to provide rowset consisting of order data.
INSERT Orders
FROM OPENXML(@hDoc, N'//Orders')
WITH Orders
-- Using OPENXML in a SELECT statement.
SELECT * FROM OPENXML(@hDoc, N'/ROOT/Customers/Orders') with (CustomerID nchar(5) '../@CustomerID', OrderDate datetime)
-- Remove the internal representation of the XML document.
EXEC sp_xml_removedocument @hDoc
This illustration shows the parsed XML tree of the preceding XML document that was created by sp_xml_pareparedocument.
See Also
Writing XML Using OPENXML
Retrieving XML Documents Using FOR XML
Did you find this helpful?
(1500 characters remaining)
Thank you for your feedback
© 2014 Microsoft. All rights reserved. |
global_01_local_0_shard_00000017_processed.jsonl/862 | Export (0) Print
Expand All
1 out of 2 rated this helpful - Rate this topic
Key archival and recovery
Updated: November 5, 2012
Key archival and recovery
Windows Server 2003, Enterprise Edition can be configured to archive the private key of specific certificates when they are issued. This private key archive allows the key to be recovered at a later time if the private key is lost. This process is implemented in two separate phases: key archival and key recovery.
Key archival
The process of obtaining a certificate includes the subject locating the appropriate certificate template, gathering the information required by that template, and supplying it to a certification authority. This information normally contains information such as the subject name, public key and supported cryptographic algorithms. When key archival is configured, the subject will also provide their private key to the certification authority. The certification authority stores that private key in its database until you want to perform key recovery.
By default, the private key of issued certificates is not archived. This is because the storage of the private key in multiple locations, by definition, allows more attacks against it. To configure a certification authority to issue certificates with key archival enabled, see Certificate Services example implementation: Key archival and recovery.
Key recovery
Subjects can lose their private key in a variety of ways such as accidental deletion or deliberate misuse. An administrator may also want to recover the key of a particular subject to access data protected by that key. Key recovery can be used whenever the key archival process has stored the subject's private key.
The key recovery process requires an administrator to retrieve the encrypted certificate and private key and then a key recovery agent (KRA) to submit to the certification authority. When a correctly signed key recovery request is received, the subject's certificate and private key are provided to the requestor. The requestor would then use the key as appropriate or securely transfer the key to the subject for continued use. No recertification or rekeying is necessary, as the private key is not necessarily compromised.
For more information, see Manage Key Archival and Recovery.
Did you find this helpful?
(1500 characters remaining)
Thank you for your feedback
Community Additions
© 2014 Microsoft. All rights reserved. |
global_01_local_0_shard_00000017_processed.jsonl/863 | Take the 2-minute tour ×
My standard procedure for writing mathematical email has been to use pidgin-LaTeX for some time now, and many of those I communicate with do the same. However, someone I know has recently started a few Unicode symbols for standard operations (arrows, etc) into the mix and this seems to greatly improve the readability.
When I've tried to do this, I spent a lot of time opening webpages looking for appropriate Unicode symbols and copy-pasting them. This roughly doubles my writing time. In an ideal world I could hit some kind of conversion button, or in a less ideal world I could put together a toolbar of commonly-used symbols.
Are there any methods for easily looking up some standard LaTeX symbols as Unicode, and further for doing so in an easily-accessible manner?
share|improve this question
This is one of the reason why I use the Neo keyboard layout which has Greek letters and all kinds of mathematical symbols on it (e.g. →,∞,⊗,∫,ℝ, etc.). – Caramdir Feb 19 '11 at 22:02
One might perhaps write a short search-replace script for doing so. – ipavlic Feb 19 '11 at 22:04
add comment
4 Answers
up vote 6 down vote accepted
Following on from ipavlic's comment to the main question, here's a script that I threw together for almost exactly this purpose:
It was actually for typing unicode into webpage text boxes rather than email. The link there goes to a working implementation (the difference between "submit" and "ajax" is that the ajax method builds up a list of all the ones that you've done, useful if you do the same one over and over again, whereas submit starts afresh each time). If you drop the '/utf.php' from the web address then you're left with the location of a BZR repository for the code so you can get it and mess around with it as you like.
There is allegedly an extension to detexify that will give you the unicode instead of the LaTeX symbol, but I haven't seen a working version of it so can't comment further.
share|improve this answer
Thanks! One minor thing: I get an XML parse error for certain elements. It looks like the code on line 2248 should maybe end in symbols_one[$i] rather than symbols_one? – Tyler Lawson Feb 20 '11 at 2:23
@coarsemoduli: Absolutely correct - thanks for the bug report. Just shows how often I use that for things like \nabla! (I use it mainly for accented characters) (Fixed now) – Andrew Stacey Feb 20 '11 at 14:39
add comment
You may hit M-x describe-input-method RET TeX RET in Emacs. Here is a fragment of what you get:
\"x ẍ \^h ĥ \~e ẽ \=\AE Ǣ \euro € \doteq ≐ \square □ \spadesuit ♠ \vartriangleleft ⊲
\"y ÿ \^i î \~i ĩ \=\ae ǣ \e{e} ė \equiv ≡ \subset ⊂ \subseteqq ⊆ \circlearrowright ↻
\'A Á \^j ĵ \~n ñ \={A} Ā \flat ♭ \frac1 ⅟ \succeq ≽ \subsetneq ⊊ \downrightharpoon ⇂
\'C Ć \^o ô \~o õ \={E} Ē \flqq « \frown ⌢ \supset ⊃ \supseteqq ⊇ \ntrianglerighteq ⋭
(By the way, this input method might be a nice way to actually type your emails - you type the TeX way, Emacs converts it to Unicode on the fly. And you don't have to use Emacs as your email client - even though it's a reasonable option - since you may configure it as an external editor in your MUA)
share|improve this answer
For the record, this is what I ended up using: a combination of the "It's All Text" extension for Firefox with Emacs set up to input text files in TeX mode. It works well. I wish I still had AUCTeX shortcuts, and there are a few symbols that I miss (the \Bbb array of characters is a little thin). – Tyler Lawson Nov 22 '13 at 23:11
Nice. Why not use AUCTeX then? It's Emacs, after all, and you can configure it to your taste. You may either (a) assign some key binding to LaTeX-mode (which starts AUCTeX), or (b) configure "It's All Text" so that it starts Emacs in AUCTeX mode (I think at least that it should be possible, I don't use it (yet)). – mbork Nov 23 '13 at 9:47
And yet another thought: it's quite possible that Org-mode can export LaTeX markup to Unicode. And Org-mode is pretty awesome for lightweight markup (I personally use it sometimes to write emails, which I then copy to my email client. It' probably a shame I don't use Gnus, but I only have this much time to configure my stuff...). – mbork Nov 23 '13 at 9:50
So you can certainly turn AUCTeX mode on (I tried), but it turns out that, if you're not actually inputting the keystrokes, the shortcuts for \alpha etc don't have their text interpreted by tex-input-mode. This I'm less sure how to fix (I also only have so much time to configure my stuff). – Tyler Lawson Nov 23 '13 at 14:15
so far as Org-mode, I use that too. But my personal experience is that as the number of tools needed to write the email increases, the chance that I'll actually use them drops off sharply. – Tyler Lawson Nov 23 '13 at 14:17
add comment
A tool for converting LaTeX to Unicode is available at
I’m guessing it’s similar to the script mentioned in Andrew Stacey's answer. However, in case you’re using Chrome, you can also download an extension from said site that lets you convert LaTeX to Unicode using just the context menu.
share|improve this answer
add comment
Here's another Unicode <-> LaTeX conversion tool
Courtesy of John D. Cook
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/864 | Take the 2-minute tour ×
The following example works in so far as it shows the image in the source latex file and disregards everything else. Is there some way of performing the same task but also list information about each image such as its the dimensions, file size and filename below each image? Only the preview should have that.
I am hoping that not only can I accomplish that but that I don't have to manually type in the file size and other info myself -- although if there is no way to grab the info automatically then the next best would be to add the info manually. Either way, I would like to know how to accomplish this.
Result (the grey part around the image was not part of the output but is an artifact of my capturing process so that part can be disregarded):
(Creative Commons info on elephant image available here .)
share|improve this question
add comment
1 Answer
up vote 15 down vote accepted
The following solution redefines \includegraphics (in the form with one optional argument) and prints extra data below the image if preview is loaded and active. Since version 1.30 pdfTeX has some nice commands that extracts file modification date, file size or the MD5 sum of the file.
The image sizes are get by graphics \Gin@nat@width and \Gin@nat@height. However they get modified by option trim, for example. Perhaps more clear is the "final image size". It is just the size that the image occupies on the paper. It is measured by putting the \includegraphics in a box.
% Store the old meaning of \includegraphics
\usepackage{letltxmacro}% safer variant
% \FileName{<file>} prints the file name
% Packages for extracting and printing file meta data
% (for pdfTeX and LuaTeX in both modes)
% catch the right file name by hooking into \@addtofilelist
% that is called by \includegraphics
\gdef\graphics@filename{#2}% default
\begin{tabular}{@{}l@{ }l@{}}%
\LaTeX\ name: & \FileName{#2}\tabularnewline
File name: &
File date: &
File size: &
File MD5 sum: &
Natural image size: & \graphics@natsize\tabularnewline
Final image size: &
\the\dimexpr\ht\graphics@box + \dp\graphics@box\relax
% if package preview is loaded and active,
% \ifPreview is defined and true.
% otherwise switch to unchanged behaviour of \includegraphics
enter image description here
share|improve this answer
I'm speechless. Absolutely brilliant. :) I wrote a humble code trying to answer this question - My idea was to call the external identify command from ImageMagick via \write18 and then gather the output. My code is not even close to your majestic answer. :) Thanks a million for joining us, it's really an honour to have you here. :) – Paulo Cereda Jul 29 '12 at 14:33
@Paulo, Even though Heiko's answer is amazing I would still be interested at looking at other approaches too even if they are not as good. – user1189687 Jul 31 '12 at 20:57
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/865 | Take the 2-minute tour ×
As the topics, is there any mathematical blog support latex? I think people commonly use wordpress but i am not sure whether it supports latex as it doesn't show the latex format. Is there any supports latex?
share|improve this question
WordPress supports LaTeX. – Qiaochu Yuan Oct 13 '12 at 1:18
well, but i type $ $ and it didn't really show the format, or do you have any way to use the latex format in wordpress?? – Mathematics Oct 13 '12 at 1:32
The very first Google hit for "LaTeX Wordpress" is en.support.wordpress.com/latex . – Qiaochu Yuan Oct 13 '12 at 1:40
If you have a blog at wordpress.com then yes, it already supports LaTeX. But if you've installed WordPress from wordpress.org on some server, then you also need to install and activate the LaTeX plug-in. – murray Oct 13 '12 at 3:00
@QiaochuYuan Wordpress does not support LaTeX. The only way I know of to write in proper LaTeX and have it accepted by a Wordpress blog is to use my internet class to preprocess it (as I've done for all my posts on the TeX-SX blog). Wordpress can support various simulated LaTeX formats for mathematics which is probably what is being asked for here. But then so can every other blog software out there that allows plugins. – Andrew Stacey Oct 13 '12 at 14:27
show 1 more comment
migrated from math.stackexchange.com Oct 13 '12 at 1:18
2 Answers
By 'supporting LaTeX', many people mean 'supporting the use of TeX-like input for mathematical symbols'. That's not the same thing: support LaTeX proper requires a TeX system, supporting just a small subset does not.
Taking WordPress as an example, both TeX-like input and proper LaTeX support are available. By far the most straight-forward way here is to use a plugin to load the appropriate code from elsewhere. MathJax is the technology that is used for example on other StackExchange sites for TeX-like input, and it's available for WordPress using the JetPack plugin. This plugin makes use of the WordPress.com MathJax support. Real LaTeX requires a TeX system installed somewhere, and for most people that is best left to a specialist server. The QuickLaTeX plugin for WordPress renders LaTeX code as .png files 'on the fly', using caching to avoid too much server load and rendering only the parts of a post that need LaTeX support. Thus this solution can deal with cross-references, TikZ and other 'goodies' that MathJax simply cannot.
share|improve this answer
add comment
For math input one can use MathJax.
Quick instructions
For me it works to add:
extensions: ["tex2jax.js"],
tex2jax: {
processEscapes: true
<script type="text/javascript"
to the header (which can be modified at a lot of blogging websites) of the html document.
After that you can use $..$ and $$..$$ to quickly add inline and display style equations, \begin{..}...\end{..} works too.
This is how it looks and works also with different colors.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/866 | Take the 2-minute tour ×
My PDF document generated with LaTeX has roman numbering for the frontmatter.
My problem is: if I want to print a certain range of pages, it is very difficult to select them, because my PDF Viewer (Skim.app or Preview.app in MacOS X 10.6.8) seems to count the pages from the beginning of the PDF (1 = first page of PDF), but it displays the correct page numbers of the document (so page 1 is the first page of the mainmatter).
Is there a way to solve this so that the page numbers displayed are the same like those I have to enter in the printing dialog?
Here is a simple example:
\section{Here starts the Frontmatter}
text frontmatter
\section{here starts the mainmatter}
text mainmatter: in my PDF viewer this is page 1, but when I would like to print it, I'd have to print page 3 (selecting page 1 in the print dialog would print page i, the first page of the PDF)
\section{here comes the backmatter}
text backmatter
share|improve this question
It is possible (I'll look into it and post an answer), but it is certainly really tricky. – tohecz Jan 3 '13 at 22:48
Does Adobe Reader have the correct page numbers? I'm pretty sure I've seen Reader take different numbering schemes into account. – Torbjørn T. Jan 3 '13 at 23:14
I do not know about Adobe Reader (can’t test here) but both Foxit and SumatraPDF show both numbers, the TeX number (i, ii, 1, 2, 3) and the PDF number (1, 2, 3, 4, 5). (In SumatraPDF you can even type “ii” to get to the second PDF page.) Though you still have to choose the PDF number to select the printing range. – Qrrbrbirlbel Jan 3 '13 at 23:30
@TorbjørnT. Acrobat shows the "text" page numbers and uses them in the print dialog as well, so never dare to have two pages with the same number (2 and ii is ok, but ii and ii is not). Another problem might be with a page that accidentally has no page number at all. – tohecz Jan 3 '13 at 23:38
@tohecz: Seems like a serious bug in AR: The labels are just labels and every page can have the same or none. Viewers must cope with that. – Martin Schröder Jan 4 '13 at 10:35
show 1 more comment
2 Answers
up vote 4 down vote accepted
Thanks to the comments of Qrrbrbirlbel Torbjørn T. and I found the solution myself:
Skim.app (version 1.3.22) indeed displays both page numbers (example for first page of MWE):
enter image description here
• it shows page "i" in the white box on the left
• and it shows page "1 of 5" (the "real" page, starting by 1 for the first page) in the title bar of the window
Preview.app (version 5.0.1.) only displays the "real" page number (first page of PDF = 1) in the title bar
So in both applications if I choose the "real" page number from the title bar in the printing dialog, I can precisely select the page range to print.
share|improve this answer
This works similarly in Evince and Okular on Linux -- the viewer displays e.g. "ii (4 of 12)". – Joe Corneli Apr 18 '13 at 13:12
add comment
Try to put this in your preamble. We use \EveryShipout to step our new counter xpage with every shipped page, then we use \texorpdfstring to write something different in text and in PDF comments. In the PDF comments we write this number. The modification of \pagenumbering ensures that our modified numbering is used correctly everywhere.
\def\@xroman{\@xnumber{\@roman}} % repeat for every numbering style you use
\def\@xRoman{\@xnumber{\@Roman}} % repeat for every numbering style you use
\def\@xarabic{\@xnumber{\@arabic}} % repeat for every numbering style you use
share|improve this answer
thanks a lot for your help! Could your code have any side-effects on other things or features? I'm sorry, I found a simple solution to my printing problem myself (see my answer tex.stackexchange.com/a/89192/4009 ) – Martin Jan 3 '13 at 23:32
@Martin It should work properly, I use a similar trick elsewhere myself: tex.stackexchange.com/questions/88398/… – tohecz Jan 3 '13 at 23:36
The count1to package defines a counter for the physical page number (and solves this problem for DVIs). – Martin Schröder Jan 4 '13 at 10:36
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/878 | In response to:
Crony Capitalism Gone Wild: Duke Energy CEO Backs President Obama
FletchforFreedom Wrote: Oct 02, 2012 4:08 PM
Dammit, Tom! Use the language correctly. Don't give in to the morons of the Left who want to change it. Calling it cronyism is fine, but since the point is state interaction in the marketplace, it is, by definition, SOCIALISM and has nothing whatsoever to do with capitalism which is the free market and ONLY the free market. Every time someone says the oxymorons "crony capitalism" or "state capitalism" it erroneously validates the distortions the Left uses to alter the meaning of capitalism in order to denounce it. Don't give them any ammunition.
Grant75 Wrote: Oct 02, 2012 4:45 PM
“State interaction in the market place” ... isn’t that fascism? I was taught that socialism is outright state ownership if the tools of production. In any case, by any name it sucks.
FletchforFreedom Wrote: Oct 02, 2012 5:49 PM
Socialism is the collective exercise of the ownership powers over the means of production (capital), usually by the state. This is the case, regardless of whether the state engages in economic activity in an otherwise free market system (as in most hybrid states today), the state engages in outright or de facto ownership of some industry (socialized medicine in the former case, Obamacare in the latter) or the state directs to whom one can sell, from whom one can buy, sets production ceilings and quotas and dictates prices while ostensibly leaving title in private hands (fascism or corporatism). It has been understood that fascism has always been a form of socialism (the same w hore in a different dress) since at least the 40s,
jbazen Wrote: Oct 03, 2012 11:13 AM
Fascism funny but that's the system , the ONLY system endorsed by Rome' s Church leaders!
Google Pope Leo's encyclical letter about this via St. Thomas Aquinas
Then learn the WHO that runs this world!
For Jim Rogers, passion for progressive politics appears as... |
global_01_local_0_shard_00000017_processed.jsonl/880 | In response to:
Paul Krugman: Yeah, We're In A Depression
rick1907 Wrote: Jun 11, 2012 8:43 PM
You said before, "Lincoln oredered the killiing of civilians..." and i just wrote the operative part of the Gen Order to the troop commanders regarding that subject. You've been proven wrong. I won't even bother with your flimsy "states rights" argument which was developed by Southron elites to mask what they really were worried about..the loss of their Slaves. It is the mark of a silly person to even say something like "they burned every farm in sight." That's like your remark the other day saying that American blacks "burned entire cities to the ground," one of your most insensate remarks. I asked you then which "entire cities" blacks burned to the ground and you still haven't answered. I repeat, you are a piece of disgusting white trash.
Friendly fire:
Krugman utterly despises conservatives, remember, so there's no way he's intentionally advancing this damning indictment to damage the president he'll support in the fall. Perhaps he just assumed that because he was among friends at Netroots Nation (you know, the conference that cheered abortion), he had extra latitude to... |
global_01_local_0_shard_00000017_processed.jsonl/882 | hunkahunka Wrote:
Dec 17, 2012 9:30 PM
BS, I was a state worker for 37 years and a supervisor. I was paid about the same as a GS 9 while the Federal supervisor my co-equal got 50% more salary with less than half the work load as I, BS with Federal employees work hard. |
global_01_local_0_shard_00000017_processed.jsonl/887 | Take the 2-minute tour ×
I'd like to explore British Columbia, for maybe a few months. I see this being expensive and difficult without a visa, but I don't mind working, even in a stipend position that only covers living expenses.
What such programs, if any, are out there?
share|improve this question
If they are picky about what kind of work you can do there, the work the locals don't want to do is your best bet. In the case of BC it always used to be tree planting that you did for a little money when you couldn't get a job and didn't mind the hard work. – hippietrail Jun 29 '11 at 15:30
add comment
1 Answer
up vote 8 down vote accepted
There is NAFTA, which if you are eligible makes it really easy to work in Canada as a US citizen. But the provisions in NAFTA don't apply to most people. "NAFTA applies to four specific categories of business people: business visitors, professionals, intra-company transferees, and traders and investors." "Professionals" is defined pretty narrowly; the majority of people would not fit into those four categories. You can't just go up and work on a farm or in a restaurant or something. (Computer programming would be eligible for example).
If you're not covered by NAFTA, you'll need a work permit. Exceptions are made for those working for foreign companies and such as well, such as airline workers; it would be silly for them to need a work visa every time they were on a Canada-bound flight. See http://www.cic.gc.ca/english/work/apply-who-nopermit.asp for more details on that.
There's a Working Temporarily in Canada page that leads to some good info, such as who can apply. In general, you need to have a company willing to hire you to sponsor you through this process. You can go as a visitor and find work, but normally would have to leave the country and re-enter on the work visa before starting work. The eligibility page says that you can't apply from within Canada unless you are switching jobs or are a student in Canada, but again I think you should be able to leave and re-enter.
share|improve this answer
combined our two since yours was better. – Michael Pryor Jun 29 '11 at 15:49
@Michael Works for me! :) – Matthew Read Jun 29 '11 at 16:05
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/891 | View Full Version : anybody tried the 16x10 string pattern? Feedback?
05-10-2011, 04:40 PM
TW did an experiment of the 16x10 string pattern: 60 lbs and 30 lbs.
Did anybody try this yet at 60 lbs, other tensions? What can you say about the following:
- spin
- control
- comfort
- playability
- string durability
what strings did you use (mains/crosses).
thanks in advance...
05-12-2011, 10:19 PM
I posted a couple of threads on it.
It works great... as long as you string really, really tight. And if you string tight, you need to string the crosses at least 20 lbs tighter than the mains to equalize the forces and avoid squashing the hoop.
I recommend using full Kevlar at about 70 lbs mains / 95 lbs crosses. It will feel just as soft as a normal stringbed, but with more spin, but still pretty good control. Kevlar is the only type of string that can handle the high tension you need for the crosses without snapping in less than 30 minutes.
If you string it at much lower tension than that, the stringbed is too soft, and control suffers. |
global_01_local_0_shard_00000017_processed.jsonl/899 | ->''That much, at least, his wife and daughters had been spared. Spared, because by good fortune their own house had been seized by Rajputs during the sack, not Ye-tai or common soldiers. A Rajput cavalry troop, commanded by a young Rajput lord. A cold man, that lord; arrogant and haughty as only a Rajput kshatriya could be. The Rajputs had stripped their home of everything of value, down to the linen. Had then eaten all the food, and drank all the wine. But when the inevitable time came, and the cavalrymen began eyeing their captured women, the Rajput officer had simply said: "No."''
-->-- ''[[Literature/BelisariusSeries An Oblique Approach]]''
The tendency of movies to depict the villain's associated armies, tribes, barbarian hordes, and bands of mercenaries as being prone to raping the women of a town they're overrunning, while the armies, tribes, barbarian hordes, and mercs that are working for the hero are usually clean of this particular atrocity.
It would preclude all audience sympathy to portray a heroic character as having a tolerance (or even worse, a ''taste'') for forcing himself on captive women. A protagonist may have other character flaws; may plunder the enemy's gold, burn the enemy's crops, torch the enemy's buildings, or visit bordellos, but in most stories, there will be no rape or tolerance of it in his outfit. [[RapeIsASpecialKindOfEvil Rape will be forbidden]], and malefactors will be dealt with.
Movies that involve historical generals, chiefs, or warlords will generally [[HistoricalHeroUpgrade treat it as a given]] that they didn't tolerate such things, unless such leaders are the villains of the work. Sometimes the all-too-common occurrence of officers who ''did'' disapprove being limited in their ability to control their men [[ObligatoryWarCrimeScene will be shown]], since it still leaves the hero sympathetic.
Although we'd never tolerate it from a hero, rape remains one of the many depraved behaviors we may expect from a villain. Villains being villains, [[RapePillageAndBurn rape while pillaging]] will still be the order of the day when the evil enemy soldiers attack a village full of protagonists, and will be used to underline exactly how ruthless and vile The Enemy is. Individual mooks [[EvenEvilHasStandards might be above this]], but an army full of them... not so much.
Often a case of ValuesDissonance. Behavior that was [[PoliticallyCorrectHistory often tolerated or even approved]] strikes us as [[{{Squick}} horrifying and disgusting]] and gets [[IHaveYouNowMyPretty reserved only for the villains.]]
Also possibly symptomatic of ThePiratesWhoDontDoAnything. Whichever side we, the audience, are supposed to identify with is simply going to be assumed not to do that sort of thing, whatever their attitude to other atrocities.
Too many aversions go to the opposite extreme, painting whatever era or world they're set in as a NoWomansLand CrapsackWorld, which is an oversimplification at best, sometimes outright {{Demonization}}. Modern audiences like to be told that they're [[SocietyMarchesOn much more civilized than their ancestors]], even if their ancestors have to get varying degrees of HistoricalVillainUpgrade in the process. History itself is often taught this way, as well, because it's useful to whatever ideology dominates an educational system to try and show how much better the ideology has made things since the Bad Old Days.
[[TropesAreTools This trope is not going anywhere.]] There's no shame in audiences demanding minimal standards of conduct from characters courting their support, and writers are wise to remember this. Having pirates that act like pirates, or Vikings that act like Vikings would [[AudienceAlienatingPremise alienate the audience]], which is something to be avoided with far more care than historical inaccuracy. Even history buffs that sneer at inaccurate diet or clothing styles may cringe.
BlackComedy may invoke [[ArentYouGoingToRavishMe Aren't You Going To Ravish Us?]]
See also PoliticallyCorrectHistory and HistoricalHeroUpgrade. Subversions often involve HistoricalVillainUpgrade, CrapsackWorld, NoWomansLand.
[[folder:Media in General]]
* Though it's popular to portray the Middle Ages as NoWomansLand, it's not a full and accurate depiction of history. War-rape was forbidden, along with looting and massacre of civilians, by the Peace of God edicts of the Catholic Church. Feudal armies often had poor discipline, and the Peace's sanctions were sometimes difficult to enforce, but the same is true of modern armies and enforcement of the Geneva Conventions. Rape was ''always'' a crime in peacetime. Though charges could be difficult to prove and the powerful could often bribe their way out of trouble, such problems are hardly unique to medieval Europe. The Late Middle Ages did see a resurgence of all the things the Peace had tried to curtail; the professional, mercenary armies that came to dominate the battlefield operated largely outside the code of feudal war, and had little stake in the lands they fought in. In medieval wars against non-Christians, rape, along with massacre and looting, was often denounced as contrary to Christian principles (non-believers still being in the image of God and, pragmatically, much more likely to convert if treated well), but the penalties of the Peace of God weren't usually applied to crimes against pagans or Muslims. One exception, [[RealityIsUnrealistic contrary to what the trope named after them might indicate]], was TheKnightsTemplar, who considered the Peace of God to apply equally against all enemies.
** Christians often gave pagan raiders, especially Vikings and other Germanic tribes, a HistoricalVillainUpgrade in this regard, to justify stamping out pagan culture. Most evidence now points to women actually being considered "off-limits" during conflict. Taking a woman as a slave was acceptable, but even slaves were protected from rape or injury by Germanic tribal law. As with the Peace of God fear of both mortal and divine retribution didn't always prevent this from happening during the heat of the moment, but it was recognized as cruel and unusual. The 2004 ''KingArthur'' film attempted to portray Germanic laws against war-rape, although it gave such laws an [[CriticalResearchFailure equally inaccurate]] [[AllGermansAreNazis "racial purity" justification]].
* Although writers (especially modern ones) like to [[SexSells play up]] their [[AnythingThatMoves more salacious aspects]], Rome, and to an extent Greece, actually disapproved of war rape...of freewomen. [[ValuesDissonance Slaves didn't have the right to refuse sex, and thus raping a slave was not technically a crime.]] Roman citizens could consider any slave woman free game, but took relatively few women when enslaving a conquered tribe. [[note]]The main goals were removing the tribe's fighting force and supplying slaves for the government's mines and ships, not providing personal attendants or supplying brothels.[[/note]] Women not taken as war spoils retained the rights of freewomen under the ''lex gentilis'', including the right to press rape charges--though Roman law generally preferred to pay off victims rather than punish offenders.
[[folder:Anime & Manga]]
* Played straight, subverted and averted in ''BladeOfTheImmortal''. Played straight when the villains from the Itto-ryu are explicitly allowed by [[AffablyEvil Anotsu]], their leader, to rape Rin's mother (but not Rin herself, as "raping children shows no class"). Subverted when Magatsu, a member of the Itto-ryu, [[EvenEvilHasStandards tries to stop the other men from doing so]]. Averted when, much later on, Manji and Rin temporarily join forces with Shira, from the Mugai-ryu. [[MoralEventHorizon Raping and torturing innocent prostitutes]] was one of the things that made Rin, Manji and the ''reader'' realise that Shira won't be on the heroes' side for long.
* Wolfgang Mittenmeyer in ''LegendOfTheGalacticHeroes'' has made it one of his main principles to maintain this trope whenever possible. He caught the eye of his future superior Reinhart von Lohengramm when he executed a noble-born soldier under his command for the crime of war rape. We later get to see him repeat this during [[spoiler:the Phezzan occupation]], where he instates -- and enforces -- a strict policy of death by firing squad to any occupation forces caught doing this.
* Played with several times in ''FistOfTheNorthStar'': while being the most iconic villains of the show, Shin and Raoh are also chivalrous to a fault and try to win Yuria's affection without touching her. Another villain, Yuda, keeps a harem of slave girls but does not rape any, although [[TransparentCloset his case is special]]. On the good guys' side, Yuuda is a handsome, lecherous MagnificentBastard who frequently raids slave caravans to take the girls to his pleasure palace... except if they ask to go home, in which case he will even give them food for the trip.
* In ''FushigiYuugi'', Tasuki's men attack the protagonists, but (unlike other bandits in the series) have no interest in raping Miaka or taking her to sell as a SexSlave. They do take notice of [[WholesomeCrossdresser Hotohori and Nuriko]], but even then don't attack them sexually. [[spoiler: Tasuki [[AttemptedRape nearly rapes]] Miaka while possessed in one of the OVAs, but is able to stop himself...and feels deeply ashamed for doing so.]]
* During his days in Vietnam, [[ThePunisher Frank Castle]] took a very dim view of any of his men raping enemy women. In one major instance during ''Born'', he put a bullet into the head of the VC sniper that one of his men was raping, telling him, "No ''rape''. We're here to ''kill'' the enemy." Said rapist would ultimately get drowned under Castle's boot as punishment.
[[folder:Fan Fiction]]
* Actually inverted to a degree in the ''VideoGame/CommandAndConquer'' fan-novelization ''Fanfic/TiberiumWars'', where the [[EvilArmy Brotherhood of Nod]] considers rape -- especially of prisoners of war -- [[EvenEvilHasStandards to not only be a serious criminal offense]], but one punishable by ''summary execution''. This is shown when [[spoiler: a Nod soldier tries to rape a female GDI prisoner, only to have a member of the [[ChurchMilitant Black Hand]] smash down the door, beat the would-be rapist's head against the wall before throwing him out a window, and having the rapist's friends executed for letting it happen.]]
* 1962's ''The300Spartans'' has the evil (from the POV of the movie) King Xerxes order that his soldiers on the campaign be given one last night with their wives, then the women are to be killed. Yes, women from ''his'' side. "There are plenty of women in Athens and Sparta and I want my men to be eager to get at them". [[MoralEventHorizon Perhaps the audience wasn't quite sure he was the villain of the movie yet.]] How the Spartans treated the enemy women is of course not discussed.
* Both ''Film/DancesWithWolves'' and ''Film/RobinHoodPrinceOfThieves'' have brief, PG-13 references to this. Enemy warriors attack the protagonist's village (Pawnee tribe in ''DWW'', Celt marauders in RH). Each contains a quick scene where a helpless female villager is at the mercy of a clothes-ripping invader, who is immediately shot dead by a friendly. ''Dances With Wolves'' neither asks nor answers the question of how well behaved the Sioux would be attacking a Pawnee camp.
** Apparently, relatively well-behaved, as long as older men were around (this was actually the case in most of European history from at least Christian times, too--war-rape was more a matter of poor discipline than ValuesDissonance, since Christian ethics, like Jewish ethics and most accounts of Sioux ethics, did not approve of rape even of enemies). The Sioux rapes during the Dakota War seem to be from a breakdown of discipline (starvation tends to do that), but apparently they considered several of their neighbors to be barbarians for doing it routinely. They (like the Jews and often the Christians) did practice marriage-by-capture, though.
** The Sioux and Pawnee were long-standing enemies. Actually, nobody liked the Pawnee. [[TheWomenAreSafeWithUs Capturing virgins from neighboring tribes and]] [[VirginSacrifice marrying them off to the Morning Star]] didn't help. This stopped in 1840, but it should be noted that the U.S. was allied with the Pawnee.
* Both played straight and averted in 1960's ''Film/{{Spartacus}}''. The gladiator students (who are slaves) are, as a perk, given women (also slaves) to spend the night with. Varinia meekly prepares to go through with it, her sense of dignity long since subjugated by her survival instinct. But Sparty, being the hero, will have none of it - especially since his owners are leering to watch the show. Whether he's reluctant to take advantage of Varinia, simply appalled by the idea of performing for an audience, or both is not made 100 % clear. Averted slightly, in that the other women with the other gladiators are almost certainly being ravished. In spite of this, the other gladiators later form Spartacus' army, and retain audience sympathy.
* 1995's ''Film/{{Braveheart}}'' featured the occupying English attempting to rape Murron in her town. Later in the movie, Wallace's army of Scots attack and sack the city of York. The head of the city's lord is sent back to London. The audience is left to draw their own conclusions as to how the Scots treated the other townsfolk of York.
* In the 1999 movie ''TheMessenger'', Joan's sister is murdered and raped (in that grisly order) by the (from the POV of the story) villainous English knight. Presumably when the French knights invaded a town they were under better discipline (although they could have hardly been under worse!)
** There's no record, by the bye, of that having happened -- and when you're giving the English in the Hundred Years War a HistoricalVillainUpgrade, you're ''really'' laying it on thick.
** One of Joan's bodyguards, Gilles de Rais (played by Vince Cassell in this film) was later executed as a serial killer and rapist of children, though apparently none of these crimes were (apparently) perpetrated until years after the events of the movie.
* Jack Sparrow from the ''Franchise/PiratesOfTheCaribbean'' movies embraces every stereotype of a pirate... yet somehow, we know that because he's a "good" character the women he comes across are pretty well safe.
** Even the [[spoiler:anti]]villainous Barbossa abides by this... up to a point. When Elizabeth rejects his NoMrBondIExpectYouToDine proposal, he says that the alternative is to dine with the crew, and without the dress he was offering her.
** Barbossa seems to have a curious reverence for women (and for what he's pleased to term "heathen gods"); observe his behavior with Tia Dalma in the later movies. Doesn't seem to stop his men from harassing servants and maids when they raid Port Royal, though.
* The 2004 movie ''{{Troy}}'', both supports and avoids this trope, depending on how much we're supposed to identify with the character. Achilles' nameless soldiers behave the way you might expect an ancient army to towards Trojan captive Briseis (not well). Achilles' lieutenant, Eudorus also sees her as a prize to be enjoyed by his boss, and is not chastised for his attitude. Agamemnon, being the dastard of the film, naturally feels the same way. Audience-courting Achilles however, is shown to be respectful of Briseis. The script takes pains to show that sex between them is consensual. Achilles even rescues her from rape at the hands of his men (out of altruism, it seems, not jealousy). OTOH, in Homer's ''Literature/TheIliad'', Briseis is seized by Achilles and later Agamemnon as a prize. Her consent, or lack thereof, is not treated as a concern either way.
** Achilles constantly refers to Briseis as his wife and bride, indicating it's of ''some'' concern to him (though they had weird attitudes about rape, Greeks generally thought taking a love-interest purely by force [[CantActPervertedTowardALoveInterest was unkind]] -- Plato thought it was one of the things that made Zeus a {{Jerkass}}[[note]]Or rather, that made the myths written by poets a blasphemy for portraying Zeus as a Jerkass, since Plato, an initiate of the Eleusinian Mysteries, [[FanonDiscontinuity didn't consider the poets' myths canon.]][[/note]]. That her feelings might not be a concern to Agamemnon seems to be a part of why he's angry Agamemnon took her, and why it's very important Agamemnon swears he never touched her, when he gives her back. They were fighting a war over that kind of thing, after all.
** In the myth, Achilles isn't all that interested in raping Briseis either, or really doing anything with her until she is taken away by Agamemnon. She was Achilles' honour gift, taking her back was a major insult, and Achilles was very upset about the insult, but not so much about the presence of the actual person. Furthermore, high ranking female captives were mainly used as a display of power in Homers epics, and their duties involved such things as serving wine to guests.
* 1985's ''[[FleshAndBlood Flesh & Blood]]'' brutally avoids this trope. A slimy nobleman cheats a band of mercs led by Rutger Hauer. It looks like it's going to be old-fashioned revenge flick until [[AntiHero Rutger]] & Co capture and gang rape the betrothed of the nobleman's son. The fact that said woman [[LovingForce seems to enjoy]] the AntiHero's attention is all that saves him from being a [[CardCarryingVillain the undisputed bad guy of the flick]] (for the '''story's''' purpose, that is. This '''''does not''''' and '''''ought not''''' fly in real life). It quickly becomes an open question of who to cheer for then.
** She pretends to enjoy it solely in order to get the protection of Rutger's character against his fellow soldiers.
* Clumsily handled in the ''[[Series/MysteryScienceTheater3000 [=MST3K=]]]''-fodder movie ''Film/{{Deathstalker}}'', which contains a scene where the antihero forces himself on a female character, presumably to show that he isn't all ''that'' good.
* ''Film/TheMagnificentSeven''. The villagers hide their women because they're afraid the hired guns will rape them. Yul Brynner's character acknowledges that their fears are not entirely unjustified (not all gunslingers being as noble as the seven, after all) but opines that "you might have given us the benefit of the doubt." In ''Film/SevenSamurai'', a father is so terrified that his daughter will be raped by the Samurai that he cuts off her hair to disguise her as a boy.
* ''Film/CaptainBlood'': Blood's ship has it as an explicit rule that no one will mistreat any woman, nor take them prisoner in the first place. He kills one of his partners over it.
* The Clive Owen ''KingArthur'' movie uses a twist on this trope; the good Roman knights don't rape. The villainous Saxons are shown attempting to rape a woman but the BigBad stops them, arguing they shouldn't dilute their bloodline. One of the soldiers claims it's his right, and is stabbed for his trouble. The BigBad then kills the woman. Whether this is meant as a [[AlternateCharacterInterpretation hate crime]] or because he knew [[EvenEvilHasStandards he couldn't protect the woman for long]] is left ambiguous.
* In ''Film/CrouchingTigerHiddenDragon'', Lo uses this to convince Jen that he's not a bad guy. It doesn't work at first.
* This is a plot point in the 2007 film ''TheWarlords'', with JetLi.
* The ''Literature/ASongOfIceAndFire'' series, which painfully [[{{Deconstruction}} deconstructs]] everything else about medieval style life and the stereotypical KnightInShiningArmor, hits this one as well. Soldiers from ''every'' army involved in the War of the Five Kings are shown engaging in various atrocities, including, quite frequently, rape -- regardless of whether they support the protagonists or not. A few nobles have edicts against their men raping, (most notably Daenerys Targaryen, who is a woman herself and took a number of eunuchs into her army because they couldn't rape, and Stannis Baratheon, who embodies HonorBeforeReason), but they are the exception to the rule. Rape is, however, a crime outside of times of war, and rapists without the fortune of noble blood are shown as having a choice between castration and serving with the Night Watch. Highborn rapists go scot-free, though, and [[MaritalRapeLicense marital rape]] isn't even considered a crime.
** In the real medieval world, though they had no concept of marital rape, taking your "conjugal rights" by force was seen as mistreating your wife, sometimes even as blasphemy against the sacrament of marriage. It could sometimes be grounds for a civil divorce (like other kinds of abuse), though it varied by region, being a matter of civil law rather than Church law.
** Largely averted with the Ironborn, who have a general philosophy that MightMakesRight leading to a lot of DeliberateValuesDissonance (but then, none of them are particularly "heroic"). They consider murder and theft more honourable than trade, and the forcible kidnap of "wives" as the prerogative of any conqueror.
** Jaime Lannister has a man beheaded after discovering that he's a rapist, much to the man's confusion as multiple people had raped the same woman.
* In the 1632 books a town in modern Virginia is transported to Germany during the 30 Years War, were most of the armies involved were rapist mercenaries. Though their guns give them the advantage they are smaller in number, so they eventually have to recruit captured enemies into their army despite knowing many of them are rapists. However, they're mostly able to keep the mercenaries in control and Gretchen, a former slave for the mercenaries, lets them know who did the worst raping and pillaging so they can be executed or exiled.
* The short story 'The Women of our Occupation', by Kameron Hurley, subverts this. Read more here http://www.strangehorizons.com/2006/20060731/women-f.shtml
* ''TheSwordOfTruth'' series has every. single. bad guy. be a rapist. For example the books constantly point out that Jagang's (the villain) army is full of rapists. We couldn't even begin to guess how many times it's mentioned that some soldier or soldiers are/were raping women and children. The armies of the good guys, on the other hand, are super professional and would never rape anyone.
** This is deliberately invoked by Richard once he becomes Lord Rahl. In the first book, it's mentioned that D'Haran soldiers practiced this, among other unsavory 'victory celebrations'. When Richard takes over, however, he puts an end to it, and actually gets some protest from his commanders saying that the soldiers have become accustomed to the, um, 'perks' of being a conquering army, and some of them aren't going to like losing them. Richard's response to this is along the lines of, "Well, that's just too bad then."
* One of the Franchise/StarWarsExpandedUniverse books, ''Tales Of The Bounty Hunters'', has a short story about Leia in her metal bikini being shoved into Boba Fett's room for the night, since Jabba wants to give his bounty hunter something extra. Fett gives her the bed, leans against the wall, and tells her that sex before marriage is immoral, the Rebellion is morally wrong, and Han Solo is worse than he is because Solo smuggles spice.
** Yes, Boba Fett, working for Jabba the Hutt, the guy who ''Han was smuggling spice for'', thinks he possesses the moral high ground, and maybe because she's got common sense Leia doesn't press it. At any rate, he didn't send her back because that would insult Jabba.
--> '''Fett''': "I won't hurt you. I won't touch you. Sleep if you will. Or not; I don't care."
** Fett pointed out that what he was doing (pursuing bounties) was technically legal, and that he sees his relationship with Jabba as strictly business.
* Used in ''Marco Polo'' to hammer home the villainy of the corrupt Mongol overseers of the southern provinces of China. When the title hero confronts them, they say that the women will [[LovingForce grow to enjoy it]] and will love [[GildedCage their new luxurious lifestyle]]. This is in stark contrast with the more chivalrous northern Mongols where the man is expected to patiently await the woman's approval or accept rejection without protest.
* Used in Juliet Marillier's ''BrideiChronicles'' to highlight the virtues of the title character. He goes ballistic when he catches men from his own army about to rape captive women -- despite the fact that a Pict in the 6th century probably wouldn't have such respect for women's rights.
* ''{{Dune}}'' plays with this a bit: it doesn't beat around the bush about how the armies of old raped the women of conquered lands (and still do), and trying to avoid this is why Leto II makes his armies all female. Considering the Honored Matres are descended from various Fish Speaker armies he made and the amount of (male) raping they do, it shows that line of thinking doesn't work.
** Much of what the Honored Matres do is as much control of their minions using their talents as an addictive drug ("do what we say if you want more of this") as actual rape-in-war. Many of their victims submit willingly in the first instance and then find themselves hooked. Internal reflections by several senior Bene Gesserit adepts show the Honored Matres' thinking as bound to lead to a horrific backlash for them sooner or later, and indeed they fear the possibility so much taht when the BG finally do breed a man who can turn the tables on them in bed (to some degree; they end up addicted ''to each other''), the Honored Matres [[spoiler:blast Arrakis to a glowing cinder]] when they're made to believe he's there.
* Very noticeable in the ''{{Conqueror}}'' books. The Mongols were certainly fond of rape, and Genghis Khan did it so much that five per mille of people alive today have him as an ancestor. However, in the books, the Tartars are the only group known to actually commit rape.
* The protagonist of ''Literature/TypewriterInTheSky'' (by Creator/LRonHubbard) tries to enforce this trope on the pirates he commands, but finds that they refuse to obey any orders on the subject. The author gives a fair bit of attention to [[RapePillageAndBurn what would actually happen]] during a pirate attack, as well as how the main character's modern morality estranges him from his crewmen. In-story, the resolution to the problem is through a CosmicRetcon--the protagonist's the antagonist of the story-within-a-story, and the writer decides he's not evil enough and rewrites him straight into IHaveYouNowMyPretty ([[MediumAwareness much to his displeasure]].)
* Creator/RobertEHoward's ConanTheBarbarian mentions in the story "Literature/TheValeOfLostWomen" that he has never taken a woman by force. This may be due to Conan's inherent decency, but it may also be due to a formative incident in his teenage years in which he tried to rape a woman who [[MuggingTheMonster turned out to be the daughter of Ymir the Frost Giant]] ("TheFrostGiantsDaughter"). That would probably put anyone off rape for the rest of their lives.
** Well, Conan is a rogue who regularly kills, steals, etc. The main reason he is the hero of his stories is that his opponents are either {{Eldritch Abomination}}s or are human beings with extremely vicious tendencies. Rape is one way of painting them as more villainous than Conan himself. Case in point Salome, the main villain from "Literature/AWitchShallBeBorn" (1934). She was born a princess of Khauran but at birth, she was recognized as the EvilWitch reborn, resulting in her own parents leaving her to die alone in the wilderness. She returns decades later to depose her twin sister Taramis of Khauran and replace her. So far so good, nothing unreasonable. But she then spends most of the story either arranging for various people to rape Taramis (starting with her first night on the throne: "Salome, hurrying along the corridor outside, smiled spitefully as [[ScreamDiscretionShot a scream of despair and poignant agony rang]] shuddering through the palace.") or orchestrating orgies. Salome herself clearly enjoys the sex but the other women are unwilling participants: "She constantly indulges in the most infamous revelries, in which the unfortunate ladies of the court are forced to join, young married women as well as virgins." No other villain in the series seems as preoccupied with rape.
** On the other hand, a good number of them do rape -- Conan rescues several {{Sex Slave}}s -- and the armies are regarded as behaving predictably in the background.
* Completely averted in the ''Literature/{{Horseclans}}'' series, where the protagonist (notably, someone originally from modern America) of the first book is quite willing to have his men rape prisoners of war, because they're "just Dirtmen."
** On the other hand, the victims had to be past puberty. Raping children would get a Clansman impaled on a short stake. This apparently made the Horseclans morally superior to the Ehlenes, who would rape just anybody.
* In one of ''Franchise/TheWitcher'' novels, an officer of an invading Nilfgardian army instructs his sergeants to restrain the soldiers from pillage, arsons, wanton slaughter of civilians and rape, since they want to give the invasion a look of a liberation operation. One of the sergeants is then shown relating the order to his platoon: "No pillage, except for forage, no arsons, no murders, no fucking... well, no fucking unless you do it hush-hush and so nobody sees you."
* Subverted in the firth book of ''BlackCompany''; after invading a new city, members of the company start raping Amazons. Croaker says they deserved it because they fought. Of course, the mercenaries are not exactly portrayed [[GreyAndGrayMorality as pure of heart]].
* ''BirthOfANation'' ''is'' this trope. The entire thing is about the Ku Klux Klan killing black men and carpetbaggers who raped white women. As you can probably expect, we've got a ton of ValuesDissonance and serious UnfortunateImplications here.
* In the ''Literature/BelisariusSeries'' it is an awful crime that only the most barbaric minions of the bad guys do. Worthy Opponents like the Rajputs and the Kushans do not engage in this, and though some Romans do, when Belisarius hears about it he simply hangs the perp.
** Or he calls for [[OffWithHisHead Valentinian]].
* In ''Literature/{{Discworld}}'' the Silver Horde of barbarian warriors do not rape. However, this may be because they're all over 80, and is possibly subverted somewhat when the Ankh-Morpork Guild of Historians distinguishes between rape and ravishment. "It's a question of style. There were never any actual ''[[NotIfTheyEnjoyedItRationalization complaints]]''."
** Of course, there is an exchange between Rincewind and Cohen in Interesting Times which suggests that the Silver Horde do not rape for more.... practical reasons. Speaking about an 85 year old Barbarian.....
--> '''Rincewind''': "Rape? That's not very...."
--> '''Cohen''':"He's an old man. Don't go spoiling his dreams."
* In ''King of the Middle-March'' by Kevin Crossley-Holland, the Christian armies in the Crusades are depicted as raping women in addition to other crimes, including both Muslims and the residents of a Byzantine city that the crusaders are used by their Venetian financial backer to besiege and ransack (that episode at least is TruthInTelevision). The protagonist, a crusader (and a ChildOfRape) is always horrified and intervenes when he can, and a tendency to treat women well is also used as a PetTheDog trait for his {{Jerkass}} BigBrotherBully.
* ''Captain Corelli's Mandolin'': Corelli catches an Italian soldier trying to rape a Greek girl. He makes the man stand in the sun for hours wearing nothing but a helmet and a haversack full of rocks.
* Surprisingly subverted in the otherwise rather lighthearted ''[[TheElenium Sparhawk]]'' series. The fierce Peloi Tribesmen of the Great Plains (FantasyCounterpartCulture to the Mongols/Huns) are loudly and clearly in favor of the full RapePillageAndBurn trinity, and are staunch allies to the heroes - [[ThePaladin Noble Knighs of the Church]]. Who are not only unsurprised, but somewhat tolerant of the Peloi's predilections. During one memorable scene in the first trilogy, Sparhawk has to politely but firmly explain to their Peloi allies that there will be no rape, plundering or burnination during the invasion of a particular city, because it was one of their OWN cities that they were LIBERATING from an occupying force. The implication being that if it was a FOREIGN city, they'd mostly just stand aside and let the Tribesmen take what they wanted. The leader of the tribesmen is obviously depressed about this, but agrees - with a sigh - since they're old friends. The same Peloi chieftain winds up being a fairly major character in the second trilogy... and, somewhat amusingly, [[spoiler: winds up marrying one of the [[ProudWarriorRaceGuy Atan people]] - who had previously murdered any number of would-be rapists during her stay in foreign lands.]] What SHE thought of his past hobbies remains unsaid.
* In the HeraldsOfValdemar series, the Eastern Empire, despite being an antagonist, is like this. They have very strict laws about rape that gets imposed whenever they conquer a new land. Basically, any woman that gets raped is granted the status of a divorced spouse, which means that half the perpetrator's possessions and wages go to victim, five years if there is no child and sixteen if there is one. If the child is a daughter, the guy has to provide a dowry, and if it's a son, he has to pay for the outfitting when the son is conscripted into the military. If the perpetrator doesn't have means to pay, then he gets sent to a government labor camp with his wages paying for it. If a guy is stupid enough to rape again, then he undergoes physical and magical punishment that leave him outwardly intact but unable to repeat the act.
[[folder:Live-Action TV]]
* In HBO's ''Series/{{Rome}}'', one of Titus Pullio's (one of the two main protagonists) first lines something to the effect of how he lives to kill his enemies, take their gold, and enjoy their women. He's never shown actually enjoying an enemy's woman. He has bordellos for that.
** Pullo does wind up bedding several slaves, who probably didn't have a lot of choice in the matter.
* ''{{Sharpe}}'': The eponymous hero will absolutely not tolerate rape, even - perhaps especially - by his own men. He has two enemy soldiers shot in front of their commander when he catches them at it, and almost hangs a member of his own unit who's caught with a girl, only relenting when the girl says it wasn't rape. Even then, he has the man taken behind a building and beaten for "making free" with her.
** ''Sharpe's Siege'''s plot is reliant on the aversion of this trope. The British army is camped outside the French-occupied town of Badajoz, and Sharpe's wife - a spy for British-allied Portugal - is inside the city, along with their infant daughter. Much of the plot, therefore, relies on his need to find and protect his family from his own army ransacking the town.
* In an episode of the French comedy show ''Kaamelott'', the daughter of a Celt chieftain tells King Arthur - who just conquered her village - that according to Celtic law he must now rape her to confirm his victory. She seems utterly disappointed when he refuses.
* Almost averted in ''VideoGame/DragonAgeOrigins''. This being ''Franchise/DragonAge'', the number of [[FaceHeelTurn true allies]] with whom your women are safe is quite small, to say the least. In the City Elf origin, all the women in your family, and you (if female), are dragged off by human nobles to be raped. A few [=NPCs=] allude to this fate when talking about war and banditry in Thedas. There are quite a few female [=NPCs=] with RapeAsBackstory. And, just in case you thought you were safe fighting inhuman, nonsentient beasts who don't seem to reproduce normally, the women who are taken away by the Darkspawn are [[spoiler: mutated into [[BodyHorror Broodmothers]] and forced to give birth to new Darkspawn]]. Yes, women are safe with the few actual heroes in this world (even the oversexed Zevran will be very, very sure you're into him before he'll make a move), but this seems to be a fact about these particular characters as people, and does not automatically apply to anyone on their sides, ever.
** Considering that it seems ALL Elves who aren't the Dalish are poor as dirt, it is unlikely there would be any form of protection along those lines.
* ''{{Nodwick}}'': A somewhat-outnumbered human army is standing against an Orcish Horde, when the protagonists bring in a small army of mercenaries to help the beleaguered humans... unfortunately, the mercenaries are... well, ''mercenaries'', and it soon turns into a bidding-war between the human forces and the orcs. Finally, the Orcs offer the mercenaries a fat percentage of the looting, "And your pick of the women!" to which the mercenaries respond with a resounding "SOLD!" But of course, Nodwick manages to turn things around in his usual, understated fashion, by playing the virtues of the Stupid Good poster-child, Piffany, against the mercenaries' ruthlessness. Realizing that if they sell out to the orcs, it'll make her cry, they turn on the orcs with unbridled fury...
* Averted in the world of ''{{Drowtales}}'', which is a CrapsackWorld with GreyAndGrayMorality, and shows that even in a society where the political and war leaders are women this can still happen. Quain'tana's daughter Mel'arnach was repeatedly abused by her mother's men [[spoiler:and at one point Quain'tana herself ordered it to try and conceive an heir through Mel]] and Vaelia, the only human in the main cast, says that this is true of the human armies in the world as well.
%% No real life examples on rape tropes, please. |
global_01_local_0_shard_00000017_processed.jsonl/901 | TV Tropes Org
site search
sort by: type:
correct subject add a review about reviews
Thriller with a Brain
Lenny is a man who can no longer create memories. He knows who he is and where he comes from, but not how he got where he is right now or why he's there. Every time he meets someone, he meets them for the first time and he only has the look in their eyes to guess what they know about him, what their relationship with him might be and what their motivations could be. The last thing he can remember is his wife dying and he wants revenge for the killer.
How can he kill a person without memory? He doesn't need memory, after all the police don't use memory, they use evidence, he reasons. So he writes himself notes and tattoos his body in ways which will remind him where his car is, how he should trust this person, what does he know about the killer.
And because the film is shot backwards (the scenes play forwards but each scene begins where the scene that comes after it ends), the audience is in the same situation as Lenny. We know what he's done, but not why. We know what his notes are, but not how he got them. Every scene is reinterpreted by the scene that comes before it and with every scene our ideas about the plot have to change completely with the new context.
But it's not a hard film to follow, it requires thought but it will keep you tense every step of the way, hanging on for the next scene and the next revelation. It's an analysis of a man with no memory, but it's also a thriller and a mystery. Don't dismiss it as an arty film, or a confusing film, because it's not just an arty film but also a straight thriller, and although it's confusing, you won't feel cheated by the confusion and it will make sense in the end.
Buy this film, set aside some time to watch it, maybe not when you're tired, watch it and be amazed and be glad that you when the film comes to a close you can still remember the beginning, unlike poor tortured and lost Lenny.
# comments: 0
flag for mods
Nolan's First Masterpiece
I've always been a huge Christopher Nolan fanboy, unrepentant in my love for his films. Memento is no exception. The brilliance of the film has been noted upon by critic after critic, just as it deserves. Nolan's meticulously crafted screenplay should have earned him an Oscar. Hell, he should have been nominated and won Best Director. The film Deserved a slew of Oscar nominations it never got. At least history has redeemed it.
The film stars the criminally underrated Guy Pearce as Leonard, and amnesiac looking for revenge. the film is shown backwards, showing the previous action that Leonard did that he forgot. In the mix is Joe Pantoliano as Teddy, a man who may or may not be helpful to Lenny, and Carrie-Anne Moss as Natalie, who is also seemingly helpful. I don't want to give too much away, so I'll leave the plot at that.
The acting in the film is superb. Guy Pearce gives one of the most difficult performances an actor can ever give. His character technically has no arc due to his amnesia, but Pearce makes us feel for Lenny. He gives it his all and it shows. Getting snubbed for an Oscar in favor of Sean Penn's full-retard in I Am Sam was criminal. Moss gives a wonerfully tricky performance, a far cry from her Trinity persona in The Matrix. Pantoliano at first seems to be a typical role for him, but by the time The Reveal happens, we realize how three-demensional his character is.
I hate it when people complain about not understanding the film. It just proves the degradation of human intellegence in society. The film, despite it's complicated premise, is easy to watch, and benefits from multiple viewings. I had no trouble understanding the film. Just be warned, I think I understood Mulholland Drive, so maybe I'm not the best judge of that.
This is easily one of the best films of the Aughts, as are all of Nolans films. Nolan is a true genius, and this film proves it. If you don't believe me just watch this film. You won't be sorry. ****/****
# comments: 0
flag for mods
Quite the thought experiment
Memento is a film that revels in ambiguity without being overindulgent. It's easy enough to see why. Pay close attention to the opening scene, and recall one thing. For each of these little scenes, this is all Lenny can remember. How would you act in that situation, knowing what Lenny does? For your typical viewer, cracks in the narrative become obvious by about the fifth scene, earlier for a troper, but none of this is a luxury Lenny possesses. What he lacks in memories he makes up for, unfortunately, in hubris. He assumes the greatest of his general skill set, and places the utmost trust in the notes he's written for himself. He never assumes that there is a contingency that these two states of being cannot handle.
And that's the brilliance of the whole enterprise. Put yourself in Lenny's shoes. Your wife is dead, and you're hunting for the real killer. Do you have time for that angsty garbage about self-doubt, or do you need to move on and get it done with what you've got? Be honest here, as since this is TV Tropes I'm willing to bet you've got a zombie response plan. We'd all like to believe we're Crazy Prepared for anything, but what if you're really not that smart? What if you're wrong? Is true grit about blasting a zombie's face with a shotgun, or buckling down and admitting that you could have made a horrible mistake? You know, like pretty much everyone on the planet has done at some point in their lives?
When it gets right down to it, that's what Memento is about. It's not the suspenseful crime thriller action, and it's not the wacky gimmick of the film being shown in a really strange chronological order. It's about the Enemy Within, only this is a far more terrifying prospect than any of the examples on that page. It turns out we don't need a dark, demonic external powers to lose control over ourselves. Rather, all it takes is the underestimation of a single critical weakness. And the worst part? You'll convince yourself that since you came up with the original idea, there's no way anyone could be pulling your strings.
# comments: 1
flag for mods
back to article
Permissions beyond the scope of this license may be available from
Privacy Policy |
global_01_local_0_shard_00000017_processed.jsonl/907 | David Koch
From Uncyclopedia, the content-free encyclopedia
Jump to: navigation, search
Kochie tells another of his delightful jokes
Whoops! Maybe you were looking for Karl Stefanovic?
“So he sees "Kochie is a dork" written in urine in the snow, right...”
~ John Howard on Kochie
“For the last bloody time, I'm not Kochie!”
~ James O'Loghlin on Kochie
David Koch is an Australian breakfast television "personality" who somehow manages to make his job look a lot harder than it could possibly be. He is especially well known for his jokes, which most of the time serve to send his target audience back to sleep. David Koch frequently goes out drinking with Peter Meakin, as part of an attempt to get Peter convicted of drunk driving to slowly gain complete control of the Seven Network.
edit Sunrise
Kochie is known to only come out of his coffin at night, to prepare for his show Sunrise, which is on way too early in the morning. After he has made his appearance he scurries back to his dark cellar, and is not heard from for the rest of the day. Kochie is also the host of The New Inventors. They may call him "James O'Loghlin" as he does this, but take a closer look.
edit Kochie's joke of the day
Kochie is known for his hilarious and occasionally controversial "joke of the day" on breakfast TV show Sunrise. These are usually something along the lines of:
"Why did the chicken cross the road?"
"Because John Howard's wife is having an affair with Kim Beazley"
Kochie's best joke so far has been getting MySpace to block any links to the Seven Store as a "known spamming and phishing site". Kochie's jokes are also available in book form, and can be found in all awful good book stores. Please buy one. Please, please buy one. Don't go through MySpace.
edit Competition
You can either watch Kochie or this guy. This is a clever tactic designed to make you want to go to work.
Kochie's main competition is Karl Stefanovic, who co-hosts rival breakfast television show Today on the Nine Network. This has been a very tough battle, but many agree that Karl's jokes are slightly funnier, since he doesn't tell any. Still, Sunrise usually rates higher than Today, because when you're flipping through TV stations at 6 in the morning for something to completely ignore, you usually land on the "7" button before the "9" button (This is the exact same reason Today Tonight rates higher than A Current Affair). Or you could just watch the cartoons on the ABC like the rest of us normal people.
edit See Also
Personal tools |
global_01_local_0_shard_00000017_processed.jsonl/908 | From Uncyclopedia, the content-free encyclopedia
Jump to: navigation, search
Stop eating cheesecake, you fat pig Score: -500 Moves: 2
If you wanna have cheesecake all day, then don't bother! I'm killing you instead!
*** Your James Over ***
Personal tools |
global_01_local_0_shard_00000017_processed.jsonl/910 | Penis Envy
From Uncyclopedia, the content-free encyclopedia
Jump to: navigation, search
Note: For a brief account of the origin of penis envy, refer to the Uncyclopedia article "My Little Penis."
For those without comedic tastes, the so-called experts at Wikipedia have an article about Penis Envy.
Oops No Penis
Where‘s the beef?
According to Sigmund Freud, whose cigar was a Phallic Symbol, girls repressed their desire to have a penis. Their penis envy causes them to behave irrationally once a month, when the moon is full, and it exerts an unusually intense gravitational influence upon the rising tides of their menstrual blood.
edit The Dreaded "Period"
...yeah that's not exactly what we're talking about ladies.
During this period, which is, in the vernacular, known as their “period” or “that time of the month,” all human females who are capable of menstruating experience a state of madness and seek to dismember males by relieving them of their manhood (a polite, if stupid, euphemism for penises). This condition motivated Lorena Bobbitt to cut off her husband John Wayne’s penis, thereby launching his career as a pornographic movie star under the suggestive stage name of John Wayne Bobbitt. s'kraM (read backwards).
edit Other Effects of Penis Envy
Penis envy has also motivated women to seek men’s jobs, becoming police officers, firefighters, Marines, truck drivers, boxers, and, through the miracle of artificial insemination and the imaginative use of a turkey baster, even fathers. Nevertheless, as is true with regard to other types of envy, penis envy often causes depression, low self-esteem, spousal and child abuse, and a hostile takeover of men’s restrooms across America and around the world, especially during major sports events or other entertainment spectacles. This condition has even led women to demand “potty parity,” insisting that there be two toilets for every urinal in public restrooms.
edit Coping with Penis Envy
Penis envy has prompted women to collect artificial penises, including dildos and phalli, to collect statues of the male member, and to grow phallic-shaped mushrooms. A few women, becoming obsessed with their secret desires to have penises of their own, undergo phalloplasty, a surgical procedure in which penises and testicles are surgically created for them. These women, known as “phallic women,” report a newfound interest in sex, heightened self-esteem, and bolstered self-confidence; many become lesbians.
Unfortunately, women who cannot afford such a surgical pursuit of happiness usually develop depression and may commit suicide. A fortunate few are able to compensate for their lack of a penis by wearing strap-on dildos or surrounding themselves with artwork that depict them as having penises. They also often tell jokes that, on the surface, appear to be humorous but, on a deeper level, disclose their penis envy: “Why do men have so many pockets in their clothing? Vagina envy!”
Another pitiful coping strategy of women who suffer the devastating emotional effects of penis envy is to enact a drama based on a best-selling book, The Vagina Monologues, in which personified vaginas lament their fate in having been born as vaginas rather than penises. Often becoming bitter because of their envy of men’s penises, women have banded together to demand the deletion of words that, they claim, celebrate the penis, such as “disseminate” for “distribute,” “erect” for “build,” and “prick” for “perforate.” Some men have countered by making a similar demand for the deletion of words such as "abreast" for "up to date" and "bosom" (as in "bosom buddy") for "intimate."
edit See also
Common mental illnesses
view discuss edit
Personal tools |
global_01_local_0_shard_00000017_processed.jsonl/912 | Uncyclopedia:Pee Review/UnNews:The Sisterhood of the Traveling Pants angry about misrepresentation in movie (Quick!)
From Uncyclopedia, the content-free encyclopedia
Jump to: navigation, search
edit UnNews:The Sisterhood of the Traveling Pants angry about misrepresentation in movie
You know the drill. Tell me if it sucks. - UnIdiot | GUN | Talk | Contribs - 19:27, Sep 9
This article is under review by
Gerry Cheevers.
Sayeth Gerry: shotgun!!
Humour: 8.5 okay, quick review, here we go. i'll go as in-depth as i can given that it's an unnews (short) by unidiot (noted author, probably won't need much correction). but i assume too much; to the reviewmobile!
upon reading your article, i have decided to give you a list of good/bad things.
• good: almost everything. the references to pants-wearing or laundry, the pants being monogamist, the gold-plated door, the idea in general. you get much points for good.
• not so good: the following things weren't very effective, and might call for a modification. 'lord tide' is kind of vague, maybe you could come up with something closer to pontius pilate? 'panstianity' is kind of weird, i think they might call it something like 'the church of something-something'. why would mel gibson be replaced by a pair of jeans; he was the director, if you wanted to replace jesus with the jeans it should be jim caveziel. the comment 'kind of retarded' seemed out of place even for a comment from a local dimwit.
Concept: 8 a good unnews concept: the skewering of facts (paranoid religious nutjobs) and the crossover of worlds (a movie and an unrelated nunnery).
Prose and formatting: 9 your prose was sparkling, this will be the easiest proofread i've ever done. the second picture was rather large, but that's the only complaint i have.
Images: 8 two good images. good captions. i see the second one is a radx production, which may explain its big-ness.
Miscellaneous: 8.4 averaged
Final Score: 41.9 my preview button tells me that your final score is 41.9. it seems this will probably be headed for VFH sometime in the immediate future. i'll leave you with some sweeping generalizations, rather than the nitpicky stuff in the humor section. you never really express why the sisterhood is upset; perhaps a description of one of the pants-sharing scenes or some other specific content that would offend them could be mentioned. what will be in the promotional film they request to add to the movie? what are the specifics of the Sisterhood dress code? that being said, great job, and good luck with this one!
Reviewer: SirGerrycheeversGunTalk 16:13, 10 September 2008 (UTC)
Thanks for the review, I made a few changes taking into consideration the points you made. - UnIdiot | GUN | Talk | Contribs - 02:45, Sep 12
Personal tools |
global_01_local_0_shard_00000017_processed.jsonl/913 | Uncyclopedia talk:Votes for deletion/Archive 1
From Uncyclopedia, the content-free encyclopedia
Jump to: navigation, search
Cs1987 for poopsmith
We just makes so many contributions to vfd. I can't remember a single vfd where he hasn't voted.--Small_Pineapple2.png» >ZEROTROUSERS!!! EAT ME!!!! CRAZY PERSON! SMELLY!!! ILLOGIC, BEHOLD!!!!~» 07:47, 20 April 2007 (UTC)
Why have I been blocked from editing vfd? WHY???--Small_Pineapple2.png» >ZEROTROUSERS!!! EAT ME!!!! CRAZY PERSON! SMELLY!!! ILLOGIC, BEHOLD!!!!~» 09:37, 20 February 2007 (UTC)
Isn't semiprotection wonderful, kids? I'm going to take a guess and say that your account's too new, but that doesn't really make sense. You've had this account for over three days; you should be able to edit the page. If not, then something's fouled up. —Major Sir Hinoa prepare for troublemake it double? 09:47, 20 February 2007 (UTC)
Maybe I'm really slow, or out of it today... but I somehow missed... how do I nominate something to be voted for deletion? This is the article I'd like to do that: Gerard Way. Just because its too random to be funny. Like they were trying WAYYY too hard. AhhDiddums 03:48, 4 January 2007 (UTC)
• Nevermind, took care of it -AhhDiddums 04:08, 4 January 2007 (UTC)
No edit etc
Well I VFD' Chile but I can't edit this page to start the voting process. At least until now, from the discussion page of the article it seems that the majority wants to delete it or blank it.--Guruclef 04:36, 29 November 2006 (UTC)User:guruclef
Sign here if you got here if you were trying to look for the VFD from a series of unfortunate events.
• Well duh. And I absolutely agree with Nerd42. With all due respect, --Maggoty Anne (UTC)
• Signs... in blood*
• Goshzilla 21:35, 9 November 2006 (UTC)
• I have said before that we ought to make fun of Snicket's V.F.D. on this page. Nerd42eMailTalkUnMetaWPediah2g2 18:11, 15 November 2006 (UTC)
• YES I WAS! THAT IS THE BEST SERIES! Oh, and whoever said the last thing definitely should NOT be sitting next to their computer enjoying theirself-- he should be kept in a cave with dry bread and water to eat and drink. YOU ARE MEAN!!!! --Silly 00:05, 2 May 2007 (UTC) Silly
• I have no idea what any of this means. Could someone please explain? --Naughtius Maximus Leaf F@H Woof!Za slice MeowMUN 02:40, 12 April 2008 (UTC)
Help there is no edit button/link
An article I wrote has been put up on VFD, I'd like to discuss it, I can't find an edit button on the project page to contribute anything. I've noticed I'm not the only one. Also, is that the right place or should it go in the discussion on the article itself? Timeblind
• Log in first, then you will see the edit tab. (Also, please use the individual section edit headings). Goshzilla 21:37, 9 November 2006 (UTC)
Is there really a need to threat every single person that mistakenly places something on VFD that should have been NRV'd or such? The new deletion policy is good, but it's also long and you can't expect everyone to read it and konw it well, at least not by now that it's still new. Besides, dismissing the nomnations (without the threats) is enough, people who nominates against the policy will just get bored of getting their nominations dismissed and would just stop nominating or, even better, follow the policy. Can we just make a template that says something like "Nomination dismissed. Please read the deletion policy. Article now tagged with NRV/fix/QVFD/whatever." Well, it's more or less what Gwax has been writing but without the unpleasent and unnecessary threats. And I would take down the threat highlighted in red at the beggining as well.--Rataube 13:38, 18 April 2006 (UTC)
I've been friendly in the past and it just doesn't work. The truth is, at this point, my patience has run out. If someone wants to come in and take over for me, then they can run VFD however they want but until people stop making my life difficult, I'm not going to go easy on them. --Sir gwax (talk) Signuke 19:57, 18 April 2006 (UTC)
Ah, the beatings will continue until the moral improves. Dear one, if you are burned out then step aside and at least take a vacation by handing over the reigns to someone else for a short period of time. Faster Pussycat Kill Kill 21:05, 18 April 2006 (UTC)
Sorry to hear that, I understund your position, must be really annoying. You really need a break, read and write some articles, enjoy, ask for a substitute.--Rataube 23:24, 18 April 2006 (UTC)
Sometimes the only way to improve morale is to shoot all the unhappy people. Bone_F_clear.png Sir Famine, Gun Petition » 03:22, 19 April 2006 (UTC)
Great! Just great! How am I supposed to rampage now?! This is the one place I could vent my daily frustration!! Now I'm sad... --PiratehattieCap'n SimzorzAr, Matey!19:36, 3 April 2006 (UTC)
QVFD? IRC? Here? The Dump? I dunno... you could just save all the rage for later. —Hinoa KUN (talk) 19:44, 3 April 2006 (UTC)
Sounds good to me. Rage is better aged (proverb). Actually, I'm glad to see this improve-instead-of-shoot tactic. It's something I started doing not long before VFD was shut down. It's a good policy, and I'd be rather pleased if it continued after VFD reopens. --PiratehattieCap'n SimzorzAr, Matey!20:19, 5 April 2006 (UTC)
Archived VFD Talk
how do i edit the deletion page? there is no button
You need to register (it is as easy as choosing a name and password). --Splaka 04:41, 17 May 2006 (UTC)
I have an account, and I can't edit the VFD page. All I can do is "view source". WTH? -- FunkSoulBrother
The way it works is you have to wait about 3 days before you are "autoconfirmed", that is you have not been blocked in a short period so the MediaWiki software does not believe you to be a vandal, otherwise somebodyu could just create an account and blank the page. ~ Ghelæ talkcontribs 16:45, 15 June 2006 (UTC)
Just a question: Should there be links to Pages for deletion/clones, Pages for deletion/templates and Pages for deletion/unusedimages? I'm surprised there's not. ~ Ghelæ talkcontribs 15:38, 1 June 2006 (UTC)
There really should be, yeah. I'll pop them in to incide a discussion about it here. --Splaka 05:48, 10 June 2006 (UTC)
No edit.
I just VFD'd this article and I can't seem to get the edit button on the VFD page to come. Please help. Here's the link to it.
The George Encounters
Thanks. --Cray Z. 06:57, 11 June 2006 (UTC)
You have to edit VFD and list the article there first... ~ Ghelæ talkcontribs 07:05, 11 June 2006 (UTC)
What I mean is that I can't see the edit button for the "Pages for deletion section". Help!!!.... --Cray Z. 07:11, 11 June 2006 (UTC)
I've added it in for you, so look and see where it is, press the '[edit]' by the side, and type your vote under mine. Do you get it now?
~ Ghelæ talkcontribs 07:34, 11 June 2006 (UTC)
Wikipedia the Truth!
I consider that you have to delete this page, because I consider that is good unless the fact that it is a plagiarism of the article Wikipedia, has the same sections, the same jokes, the same images , only changes a few things, some templates and some words--User:Atenea26 14:20, 22 July 2006 (UTC)
Well wikipedia doesn't have copyright so :p.--Small_Pineapple2.png» >ZEROTROUSERS!!! EAT ME!!!! CRAZY PERSON! SMELLY!!! ILLOGIC, BEHOLD!!!!~» 09:47, 20 February 2007 (UTC)
Well, that's a blast from the past. That comment was posted six months ago, and the article's been nuked. Why are we dragging this up again? —Major Sir Hinoa prepare for troublemake it double? 09:48, 20 February 2007 (UTC)
Necrophilia, maybe? --AAA! (AAAA) 06:41, 21 February 2007 (UTC)
/me hides shovel and tries to look innocent. --Sir Modusoperandi Boinc! 06:44, 21 February 2007 (UTC)
My point exactly. --AAA! (AAAA) 06:47, 21 February 2007 (UTC)
Edit not available to this user on the project VFD page
Ok. I'm new around here and got all of a lather about saying how unfunny I agreed the Aufstralia article is. So I registered and all and I find that the edit function is protected. I hope it's ok if I register a "delete" vote here instead. No time to hang around for a reply. I did, however, take the time to bung a NRD stamp on one of the Australia articles, Westralia, linked to from the Aufstralia page. Full of more silly garbage - but more importantly, linked to by many other Australian articles. Not a good look at all for a comedy site. I've been really entertained by much else of Uncyclopedia and these racist/homophobic rants are disappointing to stumble on. Thedarky 08:20, 15 August 2006 (UTC)
The project page is locked so that only registered users can edit it. Since you look like a registered user to me, you should be able to edit it. A vote here doesn't count, so if you want to vote, head over there.
If you're having issues editing pages, perhaps you want to wait a week or two and get some practice editing non-critical pages before you hit the project page. I tend to ban people for messing up the VFD page. Bone_F_clear.png Sir Famine, Gun Petition » 15:09, 15 August 2006 (UTC)
Hi, I'm trying to nominate Kross for deletion, but I think my account's too new. The page started out on Wikipedia as an attack against an editor over there, but it was speedied, so the editor recreated it here. It's currently blanked, but in the history you can see it's what I believe you Uncyclopedians call 'slandanity'. Can someone else nominate it, pretty please? -- Deni 07:03, 1 September 2006 (UTC)
It has been put in QuickVFD, which is where slandanity and other pages that violate UN:VAIN get deleted without requiring voting. It will be deleted soon.
VFD is for older articles the aren't funny, as described in the deletion policy.
Also, thanks for undoing IncredibleJake's other edits. --Sbluen 07:46, 1 September 2006 (UTC)
Okay, thanks! -- Deni 14:03, 1 September 2006 (UTC)
What's with the no love for Darth?
• Why not nominate all the Jesii, or all the xzillas? or get rid of all the mexicans? maybe next you can lead a progrom against the Jews... you're a stone racist... yes... feed off of the anger... it is strong inside you... it gives you power... --Mindsunwound: (NS) Heterocidal Tendencies IVotedForMindsunwound There 2cents.PNG 22:12, 8 September 2006 (UTC)
Because I don't nominate. If you would like, feel free to nominate the Jesii and xzillas, for I will delete them all too. As well as the Mexicans and the Jews. I'm an equal-opportunity deletor. No mercy. No remorse. Bone_F_clear.png Sir Famine, Gun Petition » 22:19, 8 September 2006 (UTC)
Oh... well you're just carrying out what the voters wanted... It's the nominator I'm miffed at... --Mindsunwound: (NS) Heterocidal Tendencies IVotedForMindsunwound There 2cents.PNG 22:29, 8 September 2006 (UTC)
• Both Darth Hitler, and Darth Cow had more than twice the keep votes than delete votes, and both were still huffed? that makes no sense! --Mindsunwound: (NS) Heterocidal Tendencies IVotedForMindsunwound There 2cents.PNG 22:15, 8 September 2006 (UTC)
Must be a counting error. Perhaps you are under the assumption that "rewrite" means "keep". It does not. Either rewrite it yourself, or don't bother voting. Bone_F_clear.png Sir Famine, Gun Petition » 22:19, 8 September 2006 (UTC)
Of course, if a page gets rewritten, it should probably get the votes wiped so that people can re-vote on it. Or I could just be a bastard and delete anything that was linked to the former {{Darth}}. Humm...sounds like me. Bone_F_clear.png Sir Famine, Gun Petition » 22:28, 8 September 2006 (UTC)
True enough... but even so... Darth hitler and Darth Cow did have some good chuckles... it's too bad those two in particular didn't survive... --Mindsunwound: (NS) Heterocidal Tendencies IVotedForMindsunwound There 2cents.PNG 22:29, 8 September 2006 (UTC)
The issue is that 95% of the pages people vote "rewrite" on never get rewritten, and just end up back on VFD a month or two later. I'd much rather see someone take a crappy page under their wing and rewrite it than submit it to VFD. If they had some good chuckles - good! Take that and make a real killer of a page. As it was the rewrites (no offense to the person who rewrote them) didn't really add much to the already poor articles. If you'd like, get some like-minded friends together and make a nice rewrite up.
We've both got our parts to play in keeping the "gold-to-shit ratio" high - I delete the shit. You are more than encouraged to add to the gold. Bone_F_clear.png Sir Famine, Gun Petition » 23:43, 8 September 2006 (UTC)
You huffed Cow and Hitler? The vote was 'rewrite. they were rewritten! It was written right there? Is there something I am missing here? I see you standing there with a pail full of stupid and a shit eating grin... yeah i'm talking to you famine. --Darkfred 03:58, 9 September 2006 (UTC)
Calm down now. Sometimes things on the VFD are rewritten, but still get deleted for the following reasons:
1. The rewrite still sucked, and did little to improve sections that got the article VFDed in the first place.
2. If it's in the process of being rewritten, an administrator will tend to check the current state of the article. If it hasn't been rewritten yet or doesn't seem to have much improvement (it's given some time to be revised), it'll end up getting deleted because it doesn't need to sit on the VFD, taking up space when it can be resubmitted after its deletion with a much better version (the "rewritten" version; we have a flow here on the VFD).
3. The administrator(s) paid little or no attention to the discussion section; this happens a lot, and as a result the rewrites don't make it in time. --Hotadmin4u69 [TALK] 23:23, 9 September 2006 (UTC)
I will admit that cow was still stupid. But hitler was actually funny and everyone who voted after the rewrite liked it. The problem here is not The problem here is that the vote was NOT DELETE. The pages were put up wholesale, and even before the rewrite were better than 90% of the crap on this site. I see this a less a comment on the system and more a comment on the type of people who want to be administrators. The only real power they have is deletion so it attracts article psychopaths. --Darkfred 00:55, 10 September 2006 (UTC)
If you want, you can leave a comment stating that in the event of deletion you'd like it moved to your user space to work on in your own time. Then when it gets deleted you can get about the task of rewriting until it's good enough to put back into the article namespace. Spang talk 01:34, 10 September 2006 (UTC)
Yes that would be great, but the admin simply did not read the VFD so it wouldn't have worked. I did ask another admin to undelete it to my user space. --Darkfred 17:18, 10 September 2006 (UTC)
i broke it
someone invent me a breathaliser keyboard :/ - jack mort | cunt | talkKodamaIcon - 23:28, 25 October 2006 (UTC)
fucking shit dick-ass, i think it's fixed. don't beat me - jack mort | cunt | talkKodamaIcon - 23:34, 25 October 2006 (UTC)
Mastadun, like many articles in your competitor's Universal Encyclopedia (Wickihpu), simply suffered from the lack of an expert's input. There are few competent elephant mammologists who have time left to offer free work to endeavors such as this after hauling 37,000 pounds of bones up from the basement to their lab. In addition, it suffered, like Wicki-poop, from an excess of input from a person who apparently actually liked and had listened to the band, Mastingdun. The article will be fine, with a little copyediting, some pictures, a complete rewrite, and a quote by world famus mammoth hunter IckyPoop about the mammoth found with the erection. PopOught 19:36, 1 November 2006 (UTC)
Bastions in place?
Why? I want to vote. John Reaves 12:06, 15 January 2007 (UTC)
Why is the page uneditable? Blueray 03:52, 7 April 2007 (UTC)
/me scratched forehead. It's semi-protected, I think. You need an account that's a few days old to edit the page. Or, I'm wrong. One of the two. A crapshoot, really. --Sir Modusoperandi Boinc! 04:14, 7 April 2007 (UTC)
Yeah I am also getting this problem. I've had this account for about a week, and haven't even dreamed of deleting anything yet.
Could somebody do it for me? The article is "Runescape Weapons", and it just blows to high heaven.
Copy/paste votes?
Noticed that somebody pasted the following:
• 'Delete Any article here has gone too far - nice to use copy/paste for a while Guutog 15:59, 9 April 2007 (UTC)
This was pasted on votes for every entry, including for articles already deleted hours back. Clearly he hasn't even looked at them. Does a vote like that still count?-- 19:31, 9 April 2007 (UTC)
Yeah, I noticed that too. I've told on talk page. —Braydie 19:39, 9 April 2007 (UTC)
In case anyone cared...
I made a Userbox for VFD editors... Here's the code: {{User:Capercorn/User VFD}} Feel free to use it all you like!
I care. Good though. —– Sir Hv » | Talk | Contribs | KUN | UotM | RotM | VFH | Kidney | 12/04 22:14
Yay - thank you Capercorn, I shall go and add it to my userboxbox right away. --Strange (but) Untrue Whhhy?Whut?How? *Back from the dead* 23:00, 12 April 2007 (UTC)
I'm glad people like it. Capercorn 10:58, 13 April 2007 (UTC)
Suggested Changes to VFD template
I think that the Giant "X" in the template should be replaced by
. Capercorn 10:57, 18 April 2007 (UTC)
I believe that the entire thing should be replaced by this disturbing picture of Doug Henning. --Sir Modusoperandi Boinc! 01:36, 2 May 2007 (UTC)
Thats not disturbing, thats hot. Ceridwyntalk contribs arc2.0 03:20, 02 May 2007
Substitutable template
I created Template:VFDTable for users who hate selecting text for every nomination. Does anyone like this idea? The template will need protection. Alksubsig.gifAlksub - VFH CM WA RV {talk} 19:22, 3 May 2007 (UTC)
It would still need to be put into the comment bit of the page as the normal table is to avoid confusing people though, wouldn't it? --Strange (but) Untrue Whhhy?Whut?How? *Back from the dead* 09:51, 5 May 2007 (UTC)
Suggestion: Mark the survivors
What about pasting the VFD discussion to surviving articles' talk pages? This way we would know if an article was already here once and avoid re-nominating it. Also, I guess it's an important part of the article's history. -- herr doktor needsAgear Rocket [scream!] 17:43, 12 May 2007 (UTC)
Thats probably a good idea but bags not being to one to have to do that :( ~ Dame Ceridwyn ~ talk DUN VoNSE arc2.0 10:47, 12 May 2007
The Chile Article
As far as I see it, it is just horrible. And the earlier versions are just as dumb. I am Chilean and I'm sad to say the Chile article should be deleted or blanked. Juggler 23:23, 25 May 2007 (UTC)
I stand before the Common gates but, lo! they open not for me.
How old should an account be before you can edit this?--VyvyanWilde 18:59, 12 June 2007 (UTC)
I think three days is the norm, since the page is only semi-protected. --Andorin Kato 19:16, 12 June 2007 (UTC)
I thought it was 4 days. --Starnestommy (TalkContribsFFSWP) 05:33, 2 July 2007 (UTC)
Any way to reduce edit conflicts?
About one-quarter(?) of the time that I'm voting in VFD, I end up with an edit conflict, despite my (unsuccessful) attempts to write quickly and concisely. These aren't edit conflicts with myself, so I know I'm not glitching up the system. Is there any way we might be able to rework the process to cut down on this problem? Pentium5dot1 05:05, 3 July 2007 (UTC)
Unless you get psychic powers of some sort, I doubt it. The only thing you can really do is make sure to vote on individual sections, rather than the page as a whole. Of course, with my psychic powers, I know that you already know that. Also, your lucky numbers are 3, 41, and F. Sir Modusoperandi Boinc! 05:41, 3 July 2007 (UTC)
Nah, that can't be fixed, as far as I know. As Modus said, editing the individual sections will give you far fewer edit conflicts than editing the whole page. Icons-flag-au Sir Cs1987 UOTM. t. c 05:50, 3 July 2007 (UTC)
But that's what I'm doing! (most of the time, anyway) And the edit conflicts just happen to be votes on the same article... Okay, I admit I've been exaggerating a bit, but please don't completely blame this on PEBKAC. I'd rather blame it on other people not remembering to edit specific sections. Notice that Wikipedia uses subpages for AFD... *wink wink, um, sorry for ill-formed feature request* Pentium5dot1 22:21, 3 July 2007 (UTC)
Funny, I never get edit conflicts on VFD. Are you pushing the save button more than once? - that would cause it. Otherwise I'd check the page history and try to determine which time of day voting is the least active. Or copy and paste each message so you're really fast. Sir Roger 05:12, 5 July 2007 (UTC)
Well, I do tend to be long-winded and preview a little obsessively (and still end up with poor wording). Read: I plead guilty. Pentium5dot1 05:59, 5 July 2007 (UTC)
15 Article limit?
Why is that 15 article limit really necessary? I find crap pages all the time but I can't nom them because there are too many pages on the vfd list. Jedibob5 21:57, 3 July 2007 (UTC)
Just how crappy are they? Consider using QVFD, {{ICU}}, {{construction}}, etc. as appropriate. Pentium5dot1 22:23, 3 July 2007 (UTC)
There may be something in the pipeline that will help those such as yourself. There are stirrings in my brain of a thoughtful nature. [/cryptic comments] --Strange (but) Untrue Whhhy?Whut?How? *Back from the dead* 23:27, 10 July 2007 (UTC)
Why was the article Cruft kept? The vote was 5-2 to delete. The last version before it was removed from the page is here:
It also doesn't appear in the archive. The first time it was nommed is archived, when it was kept because I forgot to put a VFD tag on it. I re-nommed it with the tag, and the second version is not archived. The vote was to delete both times.Sir Roger 20:47, 7 July 2007 (UTC)
Probably some shady conspiracy. I'd leave well alone in case you get chucked in the river with concrete shoes! --Strange (but) Untrue Whhhy?Whut?How? *Back from the dead* 23:30, 10 July 2007 (UTC)
Marking the Survivors
Guess what I've been wasting my time doing?
Since there has been some desire to have a list of articles that survived deletion so we don't keep renominating them, I have compiled such a list. I'm not sure where to put it. It has 281 articles (in alphabetical order). I don't know if anyone else wants to re-check the archives to see if I made any mistakes. Here is what I did:
• Looked only at blue links in the archives (obviously)
• Only included those where the vote was to keep. There were a lot of blue links that were voted for deletion, but someone has written a new article of the same name or just put the old one back on again - these did not make the list.
• Some seemed ambiguous, for various reasons. If there was any doubt, I did not include the article so that it can be re-nominated.
• I went back to archive 34, in April 2006. Prior to that the votes were not neatly boxed into "keep" and "delete" sections, and it would be tedious to count all the votes. Besides, our standards have (hopefully) improved since then, so I figure anything older is fair game to be renominated.
We could just keep the list to cross-reference, or tag each article with a template such as on the top of this page. The only problem is that people who wish to avoid deletion could cheat and put the template on pages that hadn't been voted on, to avoid deletion. Maybe we could be more subtle and just make it a category. If we are going to have a master list, it should be blocked to editing by anyone other than admins.
By the way, other than the VFD page, the article with the greatest survival was Camp Fuck You Die, which survived three separate votes. Sir Roger 09:44, 8 July 2007 (UTC)
I've now put the list here. Sir Roger 10:33, 8 July 2007 (UTC)
Now I've got the archive #s and dates kept listed beside them all, so they're ready to put templates on. Does anyone have any comments/suggestions? Sir Roger 09:36, 9 July 2007 (UTC)
Wow - only just spotted this whole business. Let me first say a big fat well done to you sir - this is a job that has been resisting being done by anybody for like forever. Your dedication to tedious duty gets a ninjastar for definite.
Also wow, I can't believe that's all we've kept in a year! Puts things into perspective.
I say go for it with the templates - if these things are to stand any chance of not being renommed they need a prominent marker on their talk pages rather than a little dinky category. (And it's not easy to fake a deletion discussion, which is what I'll check with the help of those links.) I reckon the template could use a better picture than Wikipedia's generic one though, and maybe funnier text somehow. But we can always worry about that later. Once again, well done, and see your talk page... --Strange (but) Untrue Whhhy?Whut?How? *Back from the dead* 00:01, 11 July 2007 (UTC)
Am I missing something, or did MadMax beat you to it? Like this. It's probably best that you liaise with MadMax and combine forces. Sir Modusoperandi Boinc! 00:29, 11 July 2007 (UTC)
I'm not aware he's done anything except put the template at the top of this page. I'll check with him, though. Sir Roger 14:28, 11 July 2007 (UTC)
Yes, MadMax and Insineratehymn have been working on this, but mostly on older articles. We have joined forces. The list shows which have been tagged and which not. Anyone who wants to help is welcome to - note that the others have been putting the {{talkheader}} template on at the same time. Sir Roger 11:12, 12 July 2007 (UTC)
Hmm... I'm not fond of that talk header thing. It's so Wikipedia-ish, telling us what we can and can't talk about on our own talk pages. But that's probably an issue for another place. --Strange (but) Untrue Whhhy?Whut?How? *Back from the dead* 00:23, 13 July 2007 (UTC)
Recreating Deleted Articles
This has probably already been addressed, so I'm sorry for repeating it, but when an article has been deleted through VFD, surely it shouldn't be allowed to be recreated again so it's the same as it was before it was deleted like Big Boss has? The Oblong Lobster 20:11, 9 July 2007 (UTC)
Hmmm, that should be taken care of on QVFD, methinks.-Sir Ljlego, GUN VFH FIYC WotM SG WHotM PWotM AotM EGAEDM ANotM + (Talk) 21:15, 9 July 2007 (UTC)
I did put it on QVFD with an explanation yesterday but it was spared. The Oblong Lobster 21:21, 9 July 2007 (UTC)
When I went through all the archives, there were quite a lot that had been re-created. Some of these were probably completely different authors, but most were likely someone not wanting their article deleted and putting them back on again. I don't think there's much we can do about this, since a person can always re-create under a different article name. I would leave these alone and come back to them in the future, when at least some of the authors will have moved on and forgotten about them. Sir Roger 23:37, 9 July 2007 (UTC)
Technically, these should be QVFDed and the perpetrators banned, at least for a little while so they learn their lesson. But as long as it's not a massive outbreak of mutiny and they're not the worst articles in the world, it might be best to just ignore it. --Strange (but) Untrue Whhhy?Whut?How? *Back from the dead* 23:34, 10 July 2007 (UTC)
Fat Albert's mine. Don't delete!-Sir Ljlego, GUN VFH FIYC WotM SG WHotM PWotM AotM EGAEDM ANotM + (Talk) 02:50, 11 July 2007 (UTC)
I agree sith Strange But Untrue that it would be best to ignore it. 90 percent of the stuff deleted doesn't come back. If you ban people, you're just adding insult to injury; I know people should follow the rules but they're probably already defensive enough when something is deleted. We have better things to do than getting into a battle over it. Sir Roger 23:19, 11 July 2007 (UTC)
I did not know that SBU was a sith. Totally got my vote for admin. Bone_F_clear.png Sir Famine, Gun Petition » 07/11 23:38
You couldn't tell from the dual-ended red lightsaber and the hood barely disguising her red and black striped horned face? I thought it was a dead give-away. ~ Dame Ceridwyn ~ talk DUN VoNSE arc2.0 05:54, 12 July 2007
Wasn't Mr. Sith bigger than that? I thought Sbu was an Ewok or a leprechaun or an amoeba or one of them quantumy things that them big-city scientists are always talking about. Seriously, she's about this (/me indicates "small") size. When you see her you just wanna put her in your pocket to keep her safe from the neighbourhood cat. Sir Modusoperandi Boinc! 12:23, 12 July 2007 (UTC)
/me singes neighbourhood cat's tail with my itty bitty light-sabre. --Strange (but) Untrue Whhhy?Whut?How? *Back from the dead* 00:25, 13 July 2007 (UTC)
/me squeals and runs around-Cat
I don't usually pay attention here, and so I have a question: What exactly is 2005cruft? Is it the notion that anything written in 2005 is unfunny and doesn't belong here?—Sir Mandaliet CUN PS VFH GN (talk) 04:27, 13 July 2007 (UTC)
From what I've managed to gather yeah, theres an opinion that the caliber of work in 2005 is no longer up to our high 2007 standards and much of it needs to be deleted. We don't all automagically subscribe to this opinion though. ~ Dame Ceridwyn ~ talk DUN VoNSE arc2.0 04:33, 13 July 2007
Yes, I've always been a bit resistant of the term because it makes people think this. But it's kind of become VFD vocab by now, so there's probably not a lot we can do! --Strange (but) Untrue Whhhy?Whut?How? *Back from the dead* 23:45, 13 July 2007 (UTC)
It refers to articles that have not had a single edit made to them since '05. Most are crap. Icons-flag-us JediBob Things I've said Things I've done 22:42, 17 July 2007 (UTC)
I cant see any edit things... i want to vfd the osama bin laden page.... ITS NOT FUNNY!!! --Faza 08:06, 23 July 2007 (UTC)
I believe you have to have been a registered user for 3 days to edit it. You can always add articles to User:Strange but untrue/Poopsmith's Lounge if VFD is full. Also, new stuff at the bottom thanks. ~ Dame Ceridwyn ~ talk DUN VoNSE arc2.0 09:37, 23 July 2007
15 Article Limit
Do articles that have been deleted(titles are redlinks) count towards the 15 VFD limit? Ie, will I get banned for adding an article above 15 if three of the current articles are already gone? EugeneKay wuz here (whine thank) 20:09, 23 July 2007 (UTC)
"Over 15 articles is allowed only if there is inactive voting. This is either when there is a red link at the top of the voting table, or when an admin has said that the article has been kept." Clear as mud? Sir Modusoperandi Boinc! 20:29, 23 July 2007 (UTC)
People keep telling me I'm a genius, but I miss the obvious 9 times out of 10. D'Oh. Thanks. EugeneKay wuz here (whine thank) 03:41, 24 July 2007 (UTC)
It would be nice to acutally be able to nominate an article, but user:Manforman seems to be somewhat monoplising this page. Could the rule about not flooding this page be maybe enforced just a tiny bit? I've just been to UGSOTM and noticed Manforman was nominated there and then cried so much everybody felt guilty, but he could of learned some kind of lesson. The Oblong Lobster 11:59, 7 September 2007 (UTC)
Although to be fair he can write good articles. The Oblong Lobster 12:35, 7 September 2007 (UTC)
I'll leave spaces next time, sorry about that--Sir Manforman CUN 12:37, 7 September 2007 (UTC)
No problem, I had to get Hit Points on, it was burning into my soul!!! The Oblong Lobster 15:49, 7 September 2007 (UTC)
Archiving Proposal
The current Vote Archiving system is driving me nuts as it does not reference dates in them just Archive 1, Archive 2, and so on. What I would like to see is the archiving system changed to go by weeks Such as Week Begining Oct 7th 2007, Week begining Oct 14th, ETC. This way it would make it easier to look up past VFD discussions and reference them. The past discussions which are already archived could be moved going through a process which I would be glad to help out some on it. All it would be is a simple cut and paste job that could take a little while. --Pleb- Sawblade5 [citation needed] ( yell | FAQ | I did this ) 14:24, 2 October 2007 (UTC)
That just seems a little... unnecessary. --Littleboyonly TKFUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUCK Oldmanonly 21:14, 2 October 2007 (UTC)
Way agreed. The archives are for reference purposes only. Hell, they're not even for that. They're just there to show that we talked about the deletion/salvation of a page. People don't even need to read 'em. It's just a comfort thing, to show we care. Sir Skullthumper, MD (criticize writings formspring) 21:17 Oct 02, 2007
Not able to add votes
Hey all, I've not been able to add votes to pages on this page for some reason...--Razorflame 18:04, 7 November 2007 (UTC)
Wait a week. -- Le Cejak <-> 18:07, 7 November 2007 (UTC)
New Nominations at the Top of the Article Rule?
What ever happend to the rule of where new nominations should be added at the top. Did it even exist? I know when I add my articles I placed them at the top of this list, however looking at the recenrt history over the past month I noticed that there is no set rule on placing them on top or putting them on the bottom. This made me wonder becasue NXWave placed 6 in a row at the bottom of the list, when most everyone else placed thiers on top like I do. So do we need to start putting new noms on the bottom or on the top? And can someone add it to one of the rules templates to where we place new nominations. ----Pleb- Sawblade5 [citation needed] ( yell | FAQ | I did this ) 11:54, 26 November 2007 (UTC)
It's not in the instructions anywhere? The hell? I've amended it into the commented-out instructions. If the hint isn't taken, then I'll add it to one of the templates.—Hinoa talk.kun 20:48, 26 November 2007 (UTC)
Even though you placed it there NXWave is still placing them at the bottom. Shall I place a notice on his talk page, giving him intsrutions on where to place them or shall I allow an Admin to do it? ----Pleb- Sawblade5 [citation needed] ( yell | FAQ | I did this ) 00:11, 28 November 2007 (UTC)
Delete vs redirect
I often have problems where I suggest a redirect target for a page that is up for VFD, people agree with my suggestion, the page gets deleted anyway, I try to create the redirect, and it gets deleted too. (I have discussed one recent issue at User talk:Tom mayfair and User talk:Zombiebaron.) Is there some good policy-based reason for this? I recall Zombiebaron telling me that "two people do not constitute a consensus," but I don't see how that makes creation of a redirect inappropriate.
I would like to suggest that if admins are closing a VFD discussion with a decision to delete, and they really do not want a suggested redirect to be created, then they should write "Delete, do not redirect" as the closing comment. Pentium5dot1 21:00, 1 December 2007 (UTC)
As per Pentium. I tried redirecting Wikipeidia or whatever it was, but it was immediately deleted by ZB. I think there should be an option post-voting for redirects, not just automatically deleting them. Le Cejak <-> (Dec 3) @ 05:19
Along the same lines, if the outcome of a vote is CVP, then that should be clearly noted in the closing statement too. Pentium5dot1 22:04, 10 December 2007 (UTC)
Can i nomitate a redirect for VFD?
--Signed by Elassint the Great Hi! 21:04, 12 December 2007 (UTC)
Just list it on QVFD or notify an Admin. MadMax 21:05, 12 December 2007 (UTC)
Since this article is under protection, I can't nominate Anarchy for deletion. My comment/reason for deletion: This is unfunny and stupid, and has no place in humor. Makes use of untrue stereotypes of anarchists such as terrorists with bombs. Nonsense. How can I nominate? —Ionas Dalton Freeman 02:36, 30 December 2007 (UTC)
VFD tag Responsbility
There has been a rash latley of articles getting listed for VFD and fails to place the {{VFD}} tag on the article in question. I am wondering is the responsibility of placing the tag falls into the Nominator or not? Also I think the only exception to the rule is templates even though If I ever listed on I would add the tag in the <noinclude> section of the template. ----Pleb- Sawblade5 [citation needed] ( yell | FAQ | I did this ) 02:18, 8 January 2008 (UTC)
Concerning Template:Fatkid It's an organizational template. It helps by allowing you to know what forms of the Crazy Fat Kid there are. Instead of deleting the template, why don't you delete some of the duplicate images.The preceding unsigned comment was added by (talk • contribs)
You could always register an account and put the images up for voting here. As for the template, what you're trying (I think) to do could be done much easier, and in a way that is more aesthetically pleasing, with categories. - P.M., WotM, & GUN, Sir Led Balloon Baloon(Tick Tock) (Contribs) 23:22, Feb 1
...or through the medium of interpretive dance. Sir Modusoperandi Boinc! 23:28, 1 February 2008 (UTC)
VFD....the Problem
The current deletion rate on VFD has highlighted a few issues, specifically were a number of quite decent articles have ended up deleted, in some cases with as little as -3 or -4 in the against votes. In a reversal of this, no one would expect to get a featured article with just +4 votes. Maybe its time to add a provisio to VFD that in order to delete an article it needs to reach at least a specific number of minus votes. Or alternatively we could perhaps thing of an alternative version of the "health" system that we use on VFH? To delete articles based on the opinion of just 3 or 4 people is crazy...lets see if we can find a fairer system that protects people's work just a little bit more than is happening at the moment.... -- Sir Mhaille Icons-flag-gb (talk to me)
I think the problem is a lack of voters. Unlike VFH where we have 20 voters, we only have 5 voters here. I think the only way to fix the problem is to get more people to vote at VFD--Æ 14:59, 10 February 2008 (UTC)
We already have the whole "VFD History Month". Maybe we can use that theme and attract more people to vote. -- Kip > Talk Works Puzzle Potato Dry Brush CUN Icons-flag-us 15:02, Feb. 10, 2008
Add a link to the mainpage and the sidebar, that should attract voters as well--Æ 15:03, 10 February 2008 (UTC)
Regardless of number of voters I still believe we need a policy were articles cannot be deleted we such a low count of negative votes. -- Sir Mhaille Icons-flag-gb (talk to me)
I'm with Mhaille, I think a minimum number of voters should be set before deleting an article. Also, in case of ties, the article should be kept. Also also, all "VFD bypassing" initiatives should be agreed upon before initiation. Brigadier Sir Mordillo Icons-flag-il GUN UotY WotM FP UotM AotM MI3 AnotM VFH +S 15:46, 10 February 2008 (UTC)
Defiantly need to change something. It was my understanding that we would always err on the side of keeping an article. If the vote was 50/50 or even say 6 deletes with 3 keeps it would still be a keep. I thought VFD was for getting rid of the real crap. If enough people care to vote it's surely a keep. Part of my suggestion to increase the VFD limit to 20 was to allow noms to stay on the page a bit longer, but currently we have a number of votes clogging up the page which obviously have enough people who care about them to make them keepers. Obviously we need to still let Admins use their judgement if an article is obviously rubbish however. Perhaps we need to rework the guidelines for making a nom also. For example getting people to check the "what links here" as well as the history and talk page before they nom. Also, agree with some sort of time based thing. Maybe if a vote is going in the direction of delete it should stay on the page for at least a day unless it's got more than a certain number of votes? If it's quickly getting lots of keeps, I think it can be removed in less time however. MrN Icons-flag-gb HalIcon.png WhoreMrn.png Fork you! 19:27, Feb 10
Talking about the "what links here" thing. That appears to me to be a better guide as to what has been put onto VFD before. If there is a link from a VFD archive page, then it's been there. It looks to me like we have not been that consistent in the past with putting the "survived VFD" thing onto ever talk page which has survived. MrN Icons-flag-gb HalIcon.png WhoreMrn.png Fork you! 19:32, Feb 10
I currently delete after the Deletes outnumber the Keeps by 4 votes, in all cases, but this can be subject to change. On long-term nominations, the policies are a bit of a grey area, so I suppose I just... improvise? --Littleboyonly TKFUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUCK Oldmanonly 19:34, 10 February 2008 (UTC)
• I agree that this is entirely due to a lack of voters. Occasionally a page will draw users from all corners of the wiki, for example when TYATU was up for deletion, but other than that, there are very few active users on VFD at the moment. I believe that the VFD History Month should be in some way represented on the Main Page, however, at the moment, there are both PLS and VFH banners, and I don't really want to add anouther. So, basically, we need more people in order to balance out the radical deletionists who seem to be pushing through all of the border-line articles. Just as how pages that can recieve +30 on VFH in a matter of minutes are featured, we need to increase the number of active voters in order to increase the number of votes required for deletion. -- Brigadier General Sir Zombiebaron 20:11, 10 February 2008 (UTC)
• I say we nominate more well-known articles to attract voters to defend them. We gotta sacrifice some good articles for the sake of VFD! It's the only way to get attention! ~Minitrue Sir SysRq! Talk! Sex! =/ GUNWotMRotMAotMVFHSKPEEINGHPBFF (@ 22:45 10 Feb, 2008)
I say all articles must stay on here for at least 24 hours. And SysRq, no. That's not a good idea. --Dexter111344 22:51, 10 February 2008 (UTC)
Nominating recent features for deletion isn't a good idea? Really? I thought it was great. </sarcasm> ~Minitrue Sir SysRq! Talk! Sex! =/ GUNWotMRotMAotMVFHSKPEEINGHPBFF (@ 23:09 10 Feb, 2008)
RE the 24 hour thing. Surely the noms which quickly get a large number of keep votes can be removed more quickly than 24 hours? RE SysRq: You're joking right? MrN Icons-flag-gb HalIcon.png WhoreMrn.png Fork you! 23:12, Feb 10
You're really asking me that? I'd like to think you all thought better of me. And yeah, there should be an either-or type deal, where if an article accumulates enough votes within 24 hours it can be deleted, or if it has a majority of Deletes after 24 hours then it can also be deleted. I'm not gonna bother reading the above jarble even though I'm sure this idea is up there somewhere. Someone just needs to establish this NOW instead of us just talking about it. ~Minitrue Sir SysRq! Talk! Sex! =/ GUNWotMRotMAotMVFHSKPEEINGHPBFF (@ 23:16 10 Feb, 2008)
• If I may take this and go into a completly different direction. To me the problem is a combination of factors. In my eyes, its not the number of people who particpate in the VFD process, but the recent number of articles get listed here that are good in premise and poorly written and/or articles that get listed here because its more convenient to delete them then it is to find someone to put some work into them. I have saved a good number of very workable VFD nom's and turned them around to better success (case in point: Queef which earned me a Poo Lit Award for best rewrite in the go-around before last) with a little effort. I just wish that there was more effort put into nomming articles that have been throughly considered before they are listed - because right now I don't always get the feeling that its happening. As for compelling more people to vote, that is a mistake becausde there is a significant different between featuring something and deciding its ultimate fate. Dame PPsigPPlips.gifGUN PotY WotM 2xPotM 17xVFH VFP Poo PMS •YAP• 00:29, 11 February 2008 (UTC)
THIS is what I'm talking about. We are deleting too many articles that are acceptable in my eyes. I don't think we need a link to VFD on the front page, I'd much sooner see a link to a Fix Up page, and have people putting the same amount of effort into helping to improve articles that they put into deleting them. The problem we have is that within online communities people are more likely to act on something they don't like, rather than on things they do like, much like the Letters page of your local newspaper. Often silence is viewed as acceptance. What we need is a system that makes deletion only possible if a sufficiently large number of people believe an article should be deleted. Maybe that should be -5, maybe more, I don't know. -- Sir Mhaille Icons-flag-gb (talk to me)
• Then let me throw this down your shorts (full moon, high tide time folks): I would also like to see a reason why the article is being listed other than "violates rule #1". I say this because a) humor is subjective and b) there is a broad definition between wry wit (Dorothy Parker) and slapstick (Three Stooges). Trust me, there are people who find Danny Kaye (if you don't know, look him up instead of being ignorant) to be a stitch and people like me who prefer Clair Booth Luce (look her up as well). I would rather be in a jail cell then have to watch Danny Kaye movies - but that doesn't mean that I don't understand that others find him funny.
While I am loathe to promote another layer of bureaucracy Maybe what we need is an Uncyclopedia League of Extraordinary Rewriters that have the interest and the time to take a look at some of the stuff filtering through VFD and see if its rewritable. Dame PPsigPPlips.gifGUN PotY WotM 2xPotM 17xVFH VFP Poo PMS •YAP• 01:51, 11 February 2008 (UTC)
My addition to this: make it unofficial and I will join. Make it some sort of stupid guild and I'm not going to be bothered with it.-Sir Ljlego, GUN VFH FIYC WotM SG WHotM PWotM AotM EGAEDM ANotM + (Talk) 02:00, 11 February 2008 (UTC)
So which would you be OK with Uncyclopedia: Unofficial League of Extraordinary Rewriters or Uncyclopedia:League of Extraordinary Unofficial Rewriters? Dame PPsigPPlips.gifGUN PotY WotM 2xPotM 17xVFH VFP Poo PMS •YAP• 03:06, 11 February 2008 (UTC)
I think VFD in its current form is a little harsh. There have been some half-decent articles that are funny for some but not for others, and then they get deleted when all they need is a little love. Perhaps give articles a "grace period" to allow people to improve them and/or allow people to move them to their user-space to salvage. This could be as simple as slapping something like a Template:Rewrite on the article and giving it a few days (similar to ICU/NRV) before it can be VFD'ed (unless it's so bad that it belongs on ED, in which case it won't need as much of a grace period). I've seen articles that were funny, but ended up getting deleted because the VFD voters didn't find them funny, and the ones that did were outnumbered. --WillMcC 14:04, 11 February 2008 (UTC)
An aside: What I did when I was the/a schmuck who cleaned out VFD (yes, I used to do it) was if a.) the score was at -6 (or -5, had I not voted myself) and b.) the nomination was at least 24 hours old, then it got deleted. Y'know, kinda like UN:WWGD. —Hinoa talk.kun 14:24, 11 February 2008 (UTC)
(/me wishes he'd seen this earlier). I agree we have too few voters on here for starters. I'd be happy to see a higher number of votes required for deletion, because the few of us who are regulars here can miss the odd gem amongst the crap after the thousand yard stare kicks in following a few real stinkers in succession. However, I think many of us who nominate articles for deletion do consider alternatives first - everything I put up, I look at first to see if I think it should be rewritten, and if I don't think so, on it goes. If others disagree - well, that's why it's a vote! I've rewritten a few bits of crap, and will rewrite more if I like them, but short of lining people up and frogmarching them down here, I don't see how we can improve the turnout - we may have an initiative or a template or something that raises interest for a while, but they soon subside again. Same with a rewriters' club - there'll be a few more rewrites for a while, then back to normal. See how much the Pee queue is backed up again after the temporary success of PEEING for a case in point. I'd love to see a decent, long term, workable solution, but I've no idea how we'd implement one. --SirU.U.Esq. VFH | GUN | Natter | Uh oh | Pee 14:29, 11 February 2008 (UTC)
Yeah, a minimum voting time/number would be good. 24 hours sounds alright. Also, it might be a good idea to have a level of votes where the article is automatically kept, on account of there being at least a significant minority who think it is funny, or at leasst not bad. And a lot of the things suggested would be possible with an updated VFD in the style of VFH, which comes with all the same pluses and minuses, probably. Spang talk 14:34, 11 Feb 2008
Strong Against making more pages like what VFH looks like. Keep stuff on my watchlist, kthanx. -- Brigadier General Sir Zombiebaron 15:30, 11 February 2008 (UTC)
Assuming that we bring in a 24 hours minimum, would everyone agree that an nomination with lots of keep votes could be removed from the page in less time? This would help keep the page moving faster, and not clog it up with "bad nominations". MrN Icons-flag-gb HalIcon.png WhoreMrn.png Fork you! 17:32, Feb 11
• VFD should not work on speed and volume - isn't that why we have QVFD? And let again raise the point that humor is subjective. There should be a greater reason for voting and article into the ether because it violates rule #1 (and we have had an awful lot of those of late). If we are going to look at voting, it should be done with ratios (so many DELETE Votes to KEEP votes needs to be obtained). But I agree with Zombiebaron that VFD shouldn't be as complicated as VFH - some of these articles that end up here really are turds that need to be flushed. Dame PPsigPPlips.gifGUN PotY WotM 2xPotM 17xVFH VFP Poo PMS •YAP• 20:59, 11 February 2008 (UTC)
Alam mo ba history ng article na kini-claim mo na sinulat mo? Na ICU/rewrite yung version mo nung una at si MidwayHaven ang sumalba, tignan mo muna ang history ng ginawa mo bago mo sabihin na nakakatawa. Tumingin ka sa Google, positive ang reviews ni MidwayHaven. Hindi ko kilala si MidwayHaven personally pero witty ang sinulat nya. Ngayon ano napala mo sa revert war mo, pare pareho tayong hindi mageenjoy dahil sa ginawa mo, forever nang mawawala ang GMA article gaya ng Philippine article ko. Obviously di mo alam ang rules ng Uncyclopedia about reverts. Next time wag kang tira lang ng tira, makipagusap ka sa mga existing active writers ng article. Di naman kami nangdiscriminate at pinapayagan namin iedit ang ginawa namin. Nakakahiya kasi dalawang article na about the Philippines ang nasa radar ng Admins dahil sa mga kalokohan. Friendly reminder na lang pre, gawa ka na lang ng sarili mong article and iwasan mo ang mga articles namin kung di ka marunong makipag cooperate. --Gilgal122px-Flag of Pirates800px-Flag of the Philippines svg(Talk to me bitch!!!) 16:29, 29 February 2008 (UTC)
I don't know who you are and what you are talking about. Do not involve me to your issues with others who are also involve with that article. If you have some issues, go directly to the person you are after to and do not pick up some random users like me. It is not I who nominate that article for deletion in the first place and I don't like that to happen also. I am also not aware and involved with your reverts or if ever, even victimizing my edits also because of the revert. Don't feel like a hero and be proud of contributing so much in the article if you also wanted for the article to be deleted and please refrain from using your language to conceal what you want to say to me for others not to understand. Look, what I am doing is to improve the article that I have started long ago because there are new issues about her in the present. I hope the reason why you wanted to delete the article is not for you (or anyone) to be known as the creator of a new article of the same name. I hope the creator issue would not be the cause of our understanding since what I am after to is editing in good faith. Now, don't focus your blame to me and try to look at others who are also involved in that article and... also please be professional. Thank you. --Kapuso 17:00, 29 February 2008 (UTC)
First, I did not ask for your help nor MidwayHaven to improve the Gloria Macapagal-Arroyo article. It is your own initiative to contribute something there as other users like myself and it is my freewill to edit something here without any intervention from others. I am sorry for what happened to the Philippines article but to set the record straight, I also have nothing to do with what happened in that article. Anyway, regarding the Google issue, how can be we sure that the "MidwayHaven" that appears in Google is the same with "MidwayHaven" in Uncyclopedia? Assuming that all "MidwayHaven"'s refer to the same person, who cares about his "positive reviews" in... whatsoever? What we really care is the attitude you have shown to us when it comes to dealing with edited articles of the users whether it is done in either good faith or bad faith.
I just want to stress it out that I really don't care whoever contributes to the Gloria Macapagal-Arroyo article or how many they had contributed since what I know is the most important one is the CONTENT of what they are contributing and not the PERSON who contributed to that article. It is also very funny to tell that this article will be deleted and be recreated again in the future so that the one who recreated it will be the first one in the history list. Is that what you are after for?
Anyway, to set the record straight, I did not prohibit you or anyone (including anons) from editing the article so you also don't have the right to prohibit me or anyone of us here from improving the article according to what we think is helpful.
Its also sad to say that contributors in this article like me interprets our contribution as bad faith and a form of vandalism just to stress it out that what have they contributed is very good and others are not. I am not telling that all contributors are not vandals but it is up for us users to interpret such change as a form of vandalism or not. Unfortunately, there are some who interpret our work as a form of vandalism and I am very sad that the one that will accuse me of such is a Filipino (as he identifies himself). I hope that we leave our crab mentality behind and not show it to the world through Uncyclopedia. It is so embarrassing enough. However, what I would like to advice to all of us is to accept that there are some aspects in us where there are people which is more excellent than us. I am not perfect, nor I am identifying myself as such nor claiming that I am the best person in existence. I do not claim that my edits in various articles in Uncyclopedia are very excellent enough and very funny. That's why there are other people like you present in order to help one another to create an excellent article. Anyway, I think this crab mentality is the reason why improvements that we had made in the article was interpreted as a form of vandalism that we cannot accept other ideas from other people just because it didn't came from ourselves. Do you want us contributors tell you our ideas in your talk page or other means of communication so that it would be your username to reflect in the history list of the article in behalf of our ideas?
Don't you ever blame me solely for the article to be ICU'd. Anyway, if you or anyone here ever informed me through my talk page about the problem then I would help as much as I could for the article not to be ICU'd. Is not informing me intentional so that you will get the "sole credit" if the Gloria Macapagal-Arroyo would be given a "second chance"? Brilliant, huh? I hope that if in case the Gloria Macapagal-Arroyo article would be given a "third chance", those users who nominated it for deletion would be man enough to be in their position not to recognize the article like not editing that article forever.
I just like to clear out the point that I have nothing to do with anons nor other users on editing that article. I never influenced anyone to edit the Gloria Macapagal-Arroyo article. Anyway, is the anon you are talking about still alive after you have bombarded him with malicious comments and reactions just because he is editing in good faith? He might have been already embarrassed then.
Thank you very much! Thanks for the nice and appreciative welcome for me in Uncyclopedia! That's all... Hope that you will have a good night sleep. --Kapuso 09:11, 1 March 2008 (UTC)
Unfunny Article about harming cats
I know it's not serious and just a joke and all, but it's not funny. Can you please remove HowTo:Skin_a_cat? I'm hope I'm doing this correctly, that I'm addressing this in the right collum. Nacky 03:22, 18 May 2008 (UTC)Nacky
OK, Nacky, firstly new messages on talk pages generally go at the bottom. Sometimes people request that they go at the top, but that's rare. Secondly, no this is not the correct place to put make a nomination for deletion. Um, the nominations go on the VFD page. Not the talk page. If you edit the page you will find a template which can be copied and filled in as appropriate per your nomination. You put the VFD tag on correctly, but did not actually make the nomination! Regarding this article... Obviously this is only my opinion, and I'm far from an expert, but I think that if this article were to be nominated on the page, it's very unlikely that there would be a consensus to delete (although I may be wrong). Rather than nomination for deletion, could I recommend that you attempt to improve the article, in a way which would make it more funny, and acceptable to you? If you really want to nominate this for VFD, go to THE PAGE, and follow the instructions at the top. For now, I have removed the {{VFD}} from the article, as the nomination has not been yet been made. Have fun. MrN Icons-flag-gb HalIcon.png WhoreMrn.png Fork you! 09:25, May 18
sigh This is why email is so much easier. Okay so what you're telling me is that I voted for a page to be deleted that could not be deleted? And that I did something incorrectly. I still don't understand but what it sounds like you're saying is that I have to follow about a dozen steps for a VFD to actually work. That sucks. So I guess I'll just give up and cringe! I hate that stupid article because it just isn't funny. It's not even about the bad taste of it, but it's so lame. Surely I can't change the name of the article, and want NO involvement in something like that. Come on! I'm hating this. What should I do now? Nacky 13:49, 18 May 2008 (UTC)Nacky
How do Nacky! VFD is not that complicated, I think you just got a little confused along the line. So, here are some steps, hopefully they're simple enough to follow:
1Go to the VFD page itself, not this talk page.
2Scroll down a little until you get to the pic of Zombiebaron and Braydie. See the "edit" link above that? Click it.
3This sets up the nominations section for editing. Just below the "New nominations at the top of the page" line, is a table template that looks like this:
==[[HowTo:Skin a cat]]==
4 Copy that table, then scroll down a little, until you're above the top of the nominated articles.
5 Paste the empty table in place above the top nomination (at the time of writing, this is "Brian Peppers").
6 Put a delete reason in the delete section, and sign it with the 4 tildes, so the table now looks something like this:
==[[HowTo:Skin a cat]]==
*'''Delete'''. This is an unfunny article about cats, please delete it. --~~~~
7 Preview the page and make sure the table looks OK, and the link looks OK, and stuff in general doesn't look fucked up. It should look like this:
HowTo:Skin a cat
8 Save the page.
9 Now follow the link through to the page, and now you put the {{VFD}} template on the article itself like you did before - this lets the author know their article is up for deletion, so if they want to plead passionately for its salvation, they can.
10 Watch as the other votes roll in.
11 ???
12 Profit!
Hope that's straightforward and easy enough to follow. Tatty byes! --SirU.U.Esq. VFH | GUN | Natter | Uh oh | Pee 16:06, May 18
Wow UU. Awesome description. Maybe we should add something along these lines to the main VFD page somewhere to make things a bit more clear. I would do it myself, but I think the templates are protected. MrN Icons-flag-gb HalIcon.png WhoreMrn.png Fork you! 16:29, May 18
I'll give it a shot. I got nothing to lose, so I figure I'll try again. You'll have to forgive me, I've never done this before and although I've been here some years, I'm still a newbie about alot of things. Nacky 00:11, 19 May 2008 (UTC)Nacky
From the Mikhail Botnivik discussion
(MrN) I see where you are comming from Hyper, but I'm not sure it makes sense. If they want it restored to user space they can have it, so what's the problem? VFD is too slow as it is. The last thing I want to see is more process slowing it down. Where do you draw the line over who is "active", how long do we wait for a reply and how would we keep track of it all? Are some users more important than others? ... I think it's actually a lot higher than %1 myself... Also, what does "established" mean anyway, and why does it make a difference if they are "new" or not? Maybe you should consider starting a topic about this on the talk page. This is not really the place to debate this one... :-)
Well, personally, I'd say that anyone who's CUN or higher shouldn't have their pages subject to deletion without their input unless they've been inactive for over a month. That's how I'd set the rule. I mean, Rangeley's won WotM. I think he's more than capable of either improving that page or userfying it until a later time without having to go through the headache of pulling it out of whatever void it's gone to. And, yes, I think some users are absolutely more important than others. I think the ratio looks like this - 1 active admin::1.5 XotM winners::3 users with features::12 noobs::40 IPs::5,000 NXWaves. Tinymasaru.gifpillow talk 17:36, 24 July 2008 (UTC)
No. If a user, no matter how old, mature, famous or naked, has a page hit VFD and fail, then it fails. The page in question is clearly unfinished and, since Rangeley's last edit was in September 2005, he's never going to finish it. That, in combination with the fact that nobody else took up the torch, makes it VFD material. Sir Modusoperandi Boinc! 18:10, 24 July 2008 (UTC)
Unless the author was Rangeley in which case they just hack it up, ignore the previous VFD vote, and put it back into mainspace. Apparently... If that's not what has happened here, I apologise in a really big way Rangeley, but this looks REALLY bad to me. MrN Icons-flag-gb HalIcon.png WhoreMrn.png Fork you! 18:24, Jul 24
Um, yeah. That. I am bothered by that as well (userspace, sure, but he put it back in mainspace. That's just crazy. Someone could lose an eye). Sir Modusoperandi Boinc! 18:31, 24 July 2008 (UTC)
I just see it as a sign that we need the guy to weigh in, here. Did he do that because he intended to finish it, and then forgot about it again? Just because he hasn't done anything since 2005 doesn't mean he wouldn't if gently prodded. Tinymasaru.gifpillow talk 18:59, 24 July 2008 (UTC)
Moving to Userspace
Evening guys. After a recent vote, a few of us think that sometimes we need a procedure to let the deleting admin know that it's probably a good idea to move an article which has been voted for deletion to userspace. Sometimes this can be when a new active user is likely to continue working on the article, or perhaps if another user has volunteered to adopt the article, and work on it in their own userspace. As it's not always practical for the deleting admin to read the entire discussion for each VFD vote I suggest the following method be used:
"If you want an article moved to userspace (yours or that of another users) please add a bold red link to where you would like it to be moved at the bottom of the Comments section with a note explaining why you would like the deleting admin to do this. When the vote is completed and a delete consensus has been reached, it would then be at the deleting admins discretion to decide to move it or not. If the user who requested the move was not the user who's userspace the article had been moved to a message would need to be left on their talk page explaining what had happened." ... It might look something like:
• Keep Not pants. MrN Icons-flag-gb HalIcon.png WhoreMrn.png Fork you! 19:59, Aug 16
• Delete Heads. MrN Icons-flag-gb HalIcon.png WhoreMrn.png Fork you! 19:59, Aug 16
• Delete Shoulders. MrN Icons-flag-gb HalIcon.png WhoreMrn.png Fork you! 19:59, Aug 16
• Delete Knees. MrN Icons-flag-gb HalIcon.png WhoreMrn.png Fork you! 19:59, Aug 16
• Delete Toes. MrN Icons-flag-gb HalIcon.png WhoreMrn.png Fork you! 19:59, Aug 16
Any thoughts on this idea? MrN Icons-flag-gb HalIcon.png WhoreMrn.png Fork you! 19:59, Aug 16
That looks fine, if maybe a tad easy to overlook, especially if there are a lot of comments. --Pleb SYNDROME CUN medicate (butt poop!!!!) 23:13, 16 August 2008 (UTC)
Leave a comment somewhere in the vote, and if it's missed by the op, just poke them on their talk page. - P.M., WotM, & GUN, Sir Led Balloon Baloon(Tick Tock) (Contribs) 19:44, Aug 20
Trouble is, how would we know if it had been missed? If there is a red link, when it turns blue, it's done. The OPs miss comments which are made in the vote on more occasions than not in my experience. MrN Icons-flag-gb HalIcon.png WhoreMrn.png Fork you! 08:38, Aug 21
I like having the big red link at the bottom. That way it's like "oh shit, there are 6 delete votes but there's this huge red thing in the comments section. Let's see, oh yeah, it's MrN wanting me to move 'pants' to his userspace. Alright, I'll just do that." -RAHB 13:01, 21 August 2008 (UTC)
Why can't I edit the VFD page? ÷ 19:06, 4 September 2008 (UTC)
Have you been here for three days? Some of the pages only let you edit them if you've been here for that long. Those pages are stuck up. They're all "Ooo. We're too important to let people who have been here for less than three days edit us!". Pricks. Sir Modusoperandi Boinc! 19:09, 4 September 2008 (UTC)
Were you planning to nominate Wordpad? If so, don't worry. It's already on QVFD. Tinymasaru.gifpillow talk 19:15, 4 September 2008 (UTC)
How do i vote for the Votes for deletion
Hi, while i was exploring articles here, i found my favorite article,Princess Victoria. I wanted to vote for the page whether to delete it or not. How do i vote(i mean the VFD page cannot be edited, i can only view the source). I really wanted to vote, but the VFD page cannot be edited, will someone please help me.
Make sure you're logged in, and then try. If you still can't edit, you may not have made your account long enough ago--I think there's a couple days before you can edit the semi-protected stuff, like this page, after you sign up. - P.M., WotM, & GUN, Sir Led Balloon Baloon(Tick Tock) (Contribs) 06:01, Sep 21
Just wondering
Is there any way that we can code up something to autovote on VFD like we do on VFH? It'd probably increase voter activity. Lieutenant THEDUDEMAN Dude ... Totally UOTM KUN GotA F@H 13:43, 26 September 2008 (UTC)
Yea, I have thought about this one myself. I think it's possible. However I personally like the idea of it being a bit "tricky" to make a vote. Maybe it's a good thing for VFD as we are talking about deleting articles and it means that you need to have some knowledge of what you are doing to make the vote. I'm not sure... MrN Icons-flag-gb HalIcon.png WhoreMrn.png Fork you! 20:12, Sep 29
My only beef with that is that on VFH, each nomination is a separate page. Here, they're not. The autovoting script would either have to be individually placed for all of them, or VFD votes would have to be formatted similar to VFH. Personally, I sort of like it as it is now. Also, unlike VFH, this might require some experience on the site; I get the feeling that if we really advertised it to new users and IPs that didn't really know what they were doing, we'd get a lot of nominations of good articles that one person just didn't like. Look at what's going on for VFH now; sure, we pass articles with more voters, but we get constantly terrible nominations as well. --Mr. Monkey Sockmonkey Pant-hoot here. 21:56, 29 September 2008 (UTC)
Why can't I edit the main VFD page? I want to nominate something. Lucario! 22:35, 2 November 2008 (UTC)
Wait a few days, then try again. We don't let the newest of the newest nominate articles for VFD, because they're all insane. Every last one of them! Sir Modusoperandi Boinc! 22:47, 2 November 2008 (UTC)
Insane? Me? wioaeruyaiwuethaskjldghadslkjrthweuiorhweoiugfagsdgkjlasdhgljkashgilasdughasdlighawegljkblasdjklvbasklvklhjasdvhasd. Lucario! 17:03, 4 November 2008 (UTC)
Is there a poopsmith going to each article linked to these templates & removin' 'em? They had better be. SpacerSpacerPremierTomMayfairChe RedPhone Unsoc Hammer and sickle 00:38, 4 November 2008 (UTC)
That... is a lot of work. This seems like a job perhaps better suited to a bot of some sort. Tinymasaru.gifpillow talk 00:45, 4 November 2008 (UTC)
Is there a bot doin' this job then? If not, I say cease this VFD on templates until somethin' can be done. All we need is ½ a million articles improperly formatted. SpacerSpacerPremierTomMayfairChe RedPhone Unsoc Hammer and sickle 00:53, 4 November 2008 (UTC)
I don't know that it actually breaks anything, since I'm honestly not sure whether
really looks any better than
But, yeah, obviously those red links will need to get cleaned up. If no one is equipped to get a bot working on it, I'd be happy to help. Tinymasaru.gifpillow talk 00:59, 4 November 2008 (UTC)
Well I'm not equipped to make one & if these get voted off & their red links remain on articles, I will seriously get ban happy :) SpacerSpacerPremierTomMayfairChe RedPhone Unsoc Hammer and sickle 01:03, 4 November 2008 (UTC)
Oh, & remove the red links myself & unban the voters when I am finished doin' so. SpacerSpacerPremierTomMayfairChe RedPhone Unsoc Hammer and sickle 01:05, 4 November 2008 (UTC)
Well, I removed the first two batches of red links just now. Strangely, Template:Blastphemy seemed to still work about half the time despite having been deleted. What's that all about? Some cache somewhere? Tinymasaru.gifpillow talk 01:10, 4 November 2008 (UTC)
That or a totally different template. Not sure. SpacerSpacerPremierTomMayfairChe RedPhone Unsoc Hammer and sickle 01:11, 4 November 2008 (UTC)
Question about dealing with VFD template misuse
What is the proper procedure to take if someone adds {{vfd}} to an article without properly completing the VFD process or giving a good-faith reason for deletion? Is it okay to just remove the template? I have also mentioned this on the article's talk page. --Pentium5dot1|t~^_^~c 05:11, 27 December 2008 (UTC)
If it was added by an IP, remove it. IPs can't nom here. They can't be trusted, you see. You know when you lose a sock? That's because an IP stole it. If it was put on by a user, ask on the page's talkpage (or the user's talkpage). New users can't nom here, either, but they don't know that. Sir Modusoperandi Boinc! 05:23, 27 December 2008 (UTC)
Yeah, I've seen a few instances in the last few months of IPs and new users taking VFD templates off of articles, which is a bitch if the nomination gets voided because of the lack of templatage due to n00b tomfoolery. Also: do I qualify for Socio-Anarchist Revolutionary status if I've been both unjustly beaten to the ground by the law and listen to profuse amounts of Rage Against the Machine? I've been hopeful, but sometimes dreams don't go through. Colin Explode fireALL YOUR BASEExplode fireHeaney! Casa Bey Superfly Portfolio 04:09, 29 December 2008 (UTC)
Do article nomination get invalidated if the VFD template is removed invalidly? I always assumed a VFD nom was valid as long as the VFD template was placed on the article validly.
Also, on the subject, I believe that ips can't post in VFD at all, even if its just to defend their articles on VFD, and I do think that is a little unfair. Of course, I'm also aware of the fact that ip's never have anything intelligent or important to say. Could the format of VFD be changed so that ips could vote on articles, but not nominate articles? Or it that not possible/too much work.--Mnbvcxz (Annoy) 14:29, 29 December 2008 (UTC)
I don't really see why we should want unregistered users voting on here? — Sir Sycamore (talk) 14:33, 29 December 2008 (UTC)
I can see you point about unregistered voting. However, during a recent "discussion" over deleting an article, some of the ip editors were told to "take the discussion to VFD". Granted, the ips were a "bit less than civil" in the discussion. I'm be opposed to having ips nominate (or even voting delete on articles); but, if they are allowed to create articles, they should (in a perfect world) also be allowed to object to their article's deletion of VFD. Also, I believe registered users under 4 (or however many days) old are also prohibited from editing semi-protected articles. Therefore, the ip can't just register for a username then vote keep on the article.
If its a decision between ip's having the power nominate versus ips not be able to edit the page, I'd definitely take go with the current system. Even if its ip's flooding VFD with deletion votes and/or generating chaos of VFD versus the current semi-protection, I'd definitely prefer the semi-protection.--Mnbvcxz (Annoy) 14:50, 29 December 2008 (UTC)
That's pretty much what happened with the VFP flood of late, so I don't think much of IP rights myself. Colin Explode fireALL YOUR BASEExplode fireHeaney! Casa Bey Superfly Portfolio 22:47, 29 December 2008 (UTC)
The VFD talk page is not protected. I guess IPs who care enough to want to say something can do so there if they wish. MrN Icons-flag-gb HalIcon.png WhoreMrn.png Fork you! 16:49, Dec 29
And now for a trip down memory lane.
I hate to bring up old drama, but I am here to talk about everyone's favorite author who got half of his articles deleted in one week, and got noticeably offeneded, Crablogger. He's still got a bunch of articles out there, and suffice to say, most of them are just as bad as what got deleted already. So, what should we do with them? Most of them are self-contained in his little created world, so I guess they aren't doing much harm. But, honestly, they're just balls. I would vote delete and move most of them back to his userspace, but I would like to see what everyone thinks. The Woodburninator (woodtalk) (woodstalk) 19:17, 30 December 2008 (UTC)
VFD is going a little slow right now, and I'm generally opposed to massive deletions (or pseudo-deletions) that bypass VFD or other standard deletion procedures. I'd suggest either placing the articles on VFD, at one or two per day, talking to admin about QVFD the whole lot (or some of the worst ones), or placing a {{fix}} template on those articles. (I'd advise getting admin permission before placing fix templates on a whole "class' of articles just to be safe.) --Mnbvcxz (Annoy) 19:33, 30 December 2008 (UTC)
Personal tools |
global_01_local_0_shard_00000017_processed.jsonl/915 | Take the 2-minute tour ×
Suppose I have a bunch of zip files in several directories:
And I want to move them all to a common base folder. How would I do this?
share|improve this question
Do you want to keep the directory structure? You want to move the directories, or just the zip files? – jordanm Mar 10 '13 at 21:31
I just want to move the zip files. I don't really care about the directories - they can be left alone or deleted. – InquilineKea Mar 10 '13 at 21:33
add comment
4 Answers
If you only want to move the .zip files, you could do something like
mkdir ./zipfiles
find . -name "*.zip" -exec mv "{}" ./zipfiles \;
share|improve this answer
add comment
Go to the toplevel directory of the tree containing the zip files (cd …), then run
mv **/*.zip /path/to/single/target/directory
This works out of the box in zsh. If your shell is bash, you'll need to run shopt -s globstar first (you can and should put this command in your ~/.bashrc). If your shell is ksh, you'll need to run set -o globstar first (put it in your ~/.kshrc).
Alternatively, use find, which works everywhere with no special preparation but is more complicated:
If you want to remove empty directories afterwards, in zsh:
rmdir **/*(/^Fod)
In bash or ksh:
rmdir **/*/
and repeat as long as there are empty directories to remove. Alternatively, in any shell
share|improve this answer
add comment
If you're using bash version 4 or higher or zsh you can also use recursive globbing:
mv **/*.zip /path/to/move/zip/files/to
This will move ONLY the files and not their relative paths, so collisions might occur.
share|improve this answer
add comment
As a bash hack, you could use the power of tar:
(cd origin/;find . -exec file --mime-type "{}" \;|grep "application/zip"|cut -d ':' -f 1|xargs tar cf -)|(cd target/; tar xf -) && rm -fr origin/
This has the advantage that it does not depend on file extensions, since it uses the file command to choose the files to move and it preserves the directory structure, but it doesn't work with paths containing spaces.
The final rm is there just to remove the original files (becouse @InquilineKea tolds that he doesn't care about the original folder in the comment).
Of course this is particularly suitable if the origin/ and target/ folders are on different disks. Otherwise the other solutions proposed are more efficient (even if they rely on naming conventions, instead of file's content).
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/940 | - regional en Why Women are Seeking Debt Relief Thu, 18 Apr 2013 22:19:30 +0000 CareOne 69194 at Economy
]]> The reasons why female consumers are seeking help with their debt is as varied as where they call home. CareOne Services, Inc. recently released a new study on women and debt, citing the factors that often lead women specifically, to seek out debt relief. The most interesting result of the study was the impact regional attributes had on why women sought our debt help.
Unoccupied England Tue, 09 Apr 2013 15:02:24 +0000 GreatGraphics 68138 at Home
]]> The shocking statistics around unoccupied housing in England, highlighting the equivalent value of these empty homes.
Coffee, Positive Economic Impact in Indonesia Wed, 20 Mar 2013 22:01:35 +0000 HouseofInfographics 66263 at Food
]]> Coffee is undoubtly one of most consumed beverage in the world, especially in Indonesia.
Portland Regional Food Economy Sat, 28 Jan 2012 12:28:01 +0000 rmmojado 26809 at Economy
]]> This set of maps and diagram displays the economics of production, consumption, and access to food and agriculture products in the Portland Metropolitan area and its regional context. |
global_01_local_0_shard_00000017_processed.jsonl/947 | Now Playing
First Female Fighter Pilot: 'Attention Wasn't What I Wanted'
In this week's Sunday Conversation, host Rachel Martin speaks with Col. Jeannie Leavitt, the Air Force's first female fighter pilot, about gender in the Air Force. Leavitt is also the first female fighter wing commander, and she has served in both Iraq and Afghanistan. |
global_01_local_0_shard_00000017_processed.jsonl/957 | Pankaj Phartiyal
less info
101 reputation
bio website
visits member for 1 year, 3 months
seen Mar 6 at 12:41
Jo bhi main kehna chahoon, barbaad karein alfaaz mere (Whatever I want to tell is spoiled by my choice of words)
This user has not participated in any tags |
global_01_local_0_shard_00000017_processed.jsonl/959 |
From Eclipsepedia
Jump to: navigation, search
Some development tools include support for pushing projects to a remote server, using such protocols as FTP and WebDAV. Then an ongoing challenge is to keep the old workspace contents synchronized with the remote content as files in the workspace and on the remote server are added, removed, or changed. The Eclipse team API includes generic infrastructure for deploying workspace contents to a remote location and for keeping the two copies synchronized.
The main entry point for this kind of team integration is the notion of a team subscriber. A subclass of TeamSubscriber specifies the logic for comparing workspace contents to a remote resource and for performing synchronization. The team API has support for building and maintaining a model of remote resources and the synchronization state between remote and local resources. A subscriber can use the generic Synchronize view to allow users to browse the differences between local and remote copies and for refreshing and synchronizing the two. The org.eclipse.team.ui.synchronize package includes API for adding pages to the Synchronize view and for displaying the synchronization model created by a team subscriber.
See the Platform Plug-in Developer Guide under Programmer’s Guide > Team support for complete details on how to implement your own team subscriber and for integrating with the generic Synchronize view.
Aside: if all you really want is to do is synch Eclipse workspace content with a webserver, see Eclipse Server Sandbox Setup for an idea on how this can be done.
|
global_01_local_0_shard_00000017_processed.jsonl/960 | Hudson-ci/eclipse migration/infrastructure
From Eclipsepedia
Jump to: navigation, search
Hudson Continuous Integration Server
Mailing ListForumsIRC
Help Wanted
Bug Day
Browse Source
Hudson-bust.png The Hudson Universe
Where Does Hudson Live?
Hudson actually exists as two separate but coordinated OSS projects. Hudson core -- the WAR file you download and run and several key plug-ins are all hosted here at Eclipse. However, there many plug-ins which are not part of core and were not part of the inital code contribution. These plug-ins are all hosted in the separate project hudson-plugins. Needless to say although these are two physically separate projects it's all logically one community.
So Why Two Places Exactly?
Well Hudson is more than just the core, plug-ins play a huge part in most Hudson installs. Not all plug-ins, however, are maintained by the core Hudson team of committers, nore will all plug-ins be suitable for EPL licensing. By hosting the Hudson Plug-in community at a complete infrastructure can be maintained for developers who want to create plug-ins and license them say under the MIT license.
So Where Do I....?
Get Help? The best places to engage with the community are explained on the Getting Involved page. Here you will find links to the User Forum, the mailing lists and the IRC channel
Find general information and documentation about Hudson A great place to start is here in the Eclipse wiki. You may find the Hudson Book an invaluable reference as well
Find out about a particular plugin The Plug-in are listed over on the the Hudson Plug-in wiki
Log an issue / bug against the Hudson core If in doubt you can log issues using the Eclipse Bugzilla system.
Log an issue / bug against a plug-in not included in core Issues for plug-ins that are not maintained in Eclipse can be logged on the Hudson Plug-in Issues System.
Look up an old Pre-Eclipse Hudson issue We've maintained the Historical Issues repository here. However, you should only use this repository for reference. All new issues against the Hudson Core should be created in the Eclipse Bugzilla system. |
global_01_local_0_shard_00000017_processed.jsonl/962 | Although the idea of a completely wireless home network is compelling, in most cases, a mixed wired/wireless environment will serve your needs better. This week, I outline the basic differences between the two network topologies and give you some guidelines for using and combining them for the best performance.
The most obvious difference between wired and wireless networking is speed. Wired Ethernet is 100Mbps (100Base-T) or 10Mbps (10Base-T). Wireless Ethernet is either 11Mbps (802.11b) or 54Mbps (802.11a). Few people use 10BaseT any longer; 100Base-T has replaced it in almost every product. Most network hubs use auto-switching or auto-sensing; the hub can determine the highest performance available to the attached network card and can switch between the two speeds. 10Base-T and 100BaseT technologies are compatible with each other; with the appropriate hub, you can use them in mixed networks.
The two wireless Ethernet standards aren't compatible with each other. Select the standard you want to use and purchase appropriate equipment for all your computers. As I write this, 802.11a devices cost two to three times more than 802.11b devices. Although 802.11a and 802.11b standards are in place, you should purchase all your wireless equipment from the same vendor. Experience has shown me that mixing flavors of 802.11 devices and software can add significant complications. For this story's wireless testing, I used access points and client devices from Belkin Components.
In terms of network performance, wireless can't compete with wired networking, even when you compare 11Mbps wireless with 10Mbps wired. (The best you can hope for is equivalent performance, and you'll rarely receive that.) Wireless-network performance can vary widely from published specifications. My own experiences have convinced me to expect performances that are about half of the published performance specifications.
Even when a wireless network works properly, large file transfers are problematic. I hear numerous complaints from wireless users about copying large Outlook .pst files from a desktop to a notebook using a wireless link. As file size increases (greater than 100MB), wireless file transfers tend to fail.
The second difference between wired and wireless networks is convenience: Not needing to run wires is obviously an attractive proposition. But although wireless vendors want you to believe that wireless networking is as simple as plugging in their devices, the reality is quite different. To help, I've written an overview of wired and wireless networking configurations.
Wired and Wireless Networking Configurations
Before I outline a basic configuration for mixed wired and wireless networking, I'm going to make two presumptions: Your network is connected to the Internet, and you use the network for more than sharing Internet access. If you simply want to share an Internet connection among multiple computers, little can go wrong. Regardless of how fast your Internet connection is, it will be slower than even a slow wireless connection, so your bottleneck will always be that Internet connection. Because of the nature of networking, performance doesn't become a concern until you start moving files between machines on the internal network.
Ethernet is a shared-bandwidth technology: The available network bandwidth is divided by the number of users on that segment. Let's look at the math; an 11Mbps network pipe can move, at best, a little less than 1.4MB of data per second (the reality is that you'll rarely exceed more than 1MBps). A common bandwidth for LAN-based streaming video is 300Kbps, so at best, you can play four concurrent streams at full bandwidth. In reality, you'll likely be limited to three streams, presuming there isn't other network traffic.
How about playing music? The average MP3 track is about 3MB, so copying the MP3 file will take about 4 seconds if you have the wireless network to yourself. As you add additional traffic, the copy time increases. If you're playing streaming audio, you have the same problem as when you play streaming video: If you don't have enough bandwidth to play the stream you selected, you'll start to get drop outs, or the selection will stop playing.
A wired 100Mbps network gives you at least nine times the theoretical network bandwidth, but pulling network cable might not be practical or possible in your networking environment. The trick is to combine wired and wireless networking in a manner that maximizes the advantages of each, while minimizing the disadvantages. To help you, I'll walk you through a typical home-networking scenario using examples from my home-networking experiences.
For your wired network, use switched 100Mbps networking. Using a network switch, rather than a hub, can provide full 100Mbps bandwidth to each port on the box. Switches are available from several vendors for less than $200. Most business-grade computers come with a built-in 10/100 network card; otherwise, you can buy one for less than $25 from major vendors. Make sure that the switch you buy has enough ports for your existing network and any planned expansion.
For your wireless network, you might choose networking equipment according to what your company office uses if you transport your wireless-capable notebook between office and home. In my case, I swap wireless cards between home and office because my office wireless network uses a high-security model, which isn't necessary in my home. And swapping network cards (one shows up as Network Connection #2, the other as Network Connection #3, and their connection information is specific to each card) is easier than reconfiguring a card each time I switch wireless environments.
Now let's look at how to use your equipment. First, determine your wired network's central location, which might be the location of your file server or where your Internet connection enters the house—the more central the location, the better. (In my case, the central point is my home office because that's where my Internet connection and file servers are.) Then determine where your wired connections can reach.
My home is a contemporary wood frame structure with a full basement, which makes wiring the house much easier. I placed a network switch in the basement and measured the distance from the switch to where I wanted to come back up to the first floor. I bought premade cables in the required lengths (inexpensive Cat5 cables are available in lengths up to 100 feet) and was able to string wire to all the desired locations on the first floor (e.g., stereo rack, kitchen, family room, living room).
The network switch in my office connects to my Internet edge device, (a desktop computer running Windows XP and Internet Connection Sharing—ICS—which provides a firewalled Internet connection for all networked computers through my satellite Internet connection), my primary office desktop system, and a collection of servers I use for testing. My home network also includes two laser printers and two inkjet printers that connect to computers on my network's wired section. My music server contains two network cards—one attached to each of my 100Mbps switches, even though the switches themselves are connected through an uplink port. This setup gives all my connected computers enough bandwidth for playing music.
This configuration worked well until my kids decided that they needed computers in their bedrooms, which are on the house's second floor. I didn't want to pull cable through the walls from the first floor, so it was time to go wireless. I also wanted network connectivity in my garage for my custom car-programming hobby, and the garage doesn't have the advantage of basement connectivity.
My first attempt at wireless connectivity didn't go well. With the wireless access point on the highest shelf in my office, I had an effective range of about 30 feet, which didn't reach either child's bedroom. I could get a wireless connection in the guest bedroom directly above my office, but even though the access point was less than 10 feet from the notebook in the guest bedroom, I couldn't connect at speeds greater than 2Mbps (as reported by the wireless NIC's configuration utility). I tried a higher-gain antenna to increase the access point's range, but it offered little improvement. And I couldn't get any wireless connectivity in my garage, even though the access point was less than 15 feet away.
The garage problem offered clues that helped me diagnose why my network range was so limited. My house's insulation includes multiple layers of aluminum backing, and when I pulled aside one of the accessible layers of insulation in my garage, a weak signal got through. My entire house has the same insulation, but with two sets of exterior walls between the access point and the garage, a reliable wireless connection wasn't possible. I've seen this type of problem in my company office. My desk is less than 20 feet from our departmental access point, but I could never connect faster than 2Mbps and rarely had a signal strength greater than 65 percent. Between the access point and my office are two solid steel-studded walls and a lot of fluorescent fixtures. I recently moved my office to the other side of the building, approximately 60 feet from the same wireless access point, yet I get a good 11Mbps connection and a signal strength greater than 80 percent. The difference is that the new office has a straight shot through open doorways to the wireless access point. Minimal electrical and metal interference made this location more effective for wireless connectivity.
To deal with my home's poor overall connectivity, I decided to use two access points—one on each end of my house. I set up a 4-port 100Mbps hub and a second access point in the corner of the breakfast area, which already had a wired connection. This configuration let me cover the kids' bedrooms above and the deck behind the house. I also plan to add a third wireless access point so I can have wireless connectivity in the garage and driveway, which will make accessing stored data used for programming my car much simpler.
You probably don't have or want to buy the test equipment to evaluate where to locate network access points, so here's a suggestion: Buy a 100-foot Cat5 cable and use the cable to test your access points in various locations. Place the access point, then walk around your house with a notebook computer with a wireless card installed and the network link application running. This process shows you how well the wireless connection will work.
Note that the wireless access points I'm using are attached to dedicated ports on 10/100Mbps network switches. All the computers in my home office are on their own switched connections. The computers in the kitchen are on a 4-port 10/100 hub along with one of the wireless access points, making the hub the most congested connection on the network, but the computers connected through this hub are rarely used at the same time.
Here are some key points for wiring your home or small office/home office (SOHO):
1. Use wired connections where possible.
2. Use switches, rather than hubs.
3. Test your wireless connectivity before committing to it.
4. If wireless connectivity is necessary, consider using multiple access points for complete coverage.
5. Locate servers on wired connections.
6. Make sure your primary Internet connection has a wired connection to your internal network.
7. Consider usage patterns before installing your network.
8. Plan the installation. Cables are inexpensive, so lay out connections, both wired and wireless, before pulling cables through walls.
If you have specific questions about your networking installation, post them to our online forum. I'll be there to answer your questions and share my experiences. |
global_01_local_0_shard_00000017_processed.jsonl/963 | I have Send as permission on a mailbox. When I log on to my mailbox and send an item as the other user, why does the item appear in my Sent Items folder, not the other user's folder?
This behavior is a feature, not a bug. When you send an item, you're the person who's sending it, even if you're doing so on behalf of another user. This behavior is analogous to the way real-world systems work: If I send a fax from my fax machine, the recipient sees my fax number, even if the cover sheet says that the fax is from the president of the United States. |
global_01_local_0_shard_00000017_processed.jsonl/964 | Follow these tips to establish a well-performing internal application
Intranet applications are a hot development topic these days. Intranet applications are applications that employees or members of an organization use for tasks related to their work or membership in the organization. For example, many companies have intranets that provide human resources (HR) information such as insurance information and forms. Some companies also provide an online store at which employees can buy products. Many intranets take over as internal business systems for production functions.
Intranet applications don't typically run just internally on an organization's LAN or WAN. Many employees and organization members travel or work from home and need access to intranet applications from outside an organization's network environment.
An intranet might provide access to sensitive corporate data. Therefore, it will probably require tighter security in some areas than a public Internet or extranet site or application, which might be separated from corporate data and contain only more public information. For example, an intranet site that publishes HR or accounting data might have stringent security requirements, including the use of Secure Sockets Layer (SSL). But an intranet application that publishes product information might rely on the internal network's standard security mechanisms.
The architecture of intranet applications, especially those that an ISP hosts, is often significantly different from that of Internet applications. Although most intranet and Internet applications use Active Server Pages (ASP), most ISPs won't host custom COM components (i.e., DLLs) on their servers for fear the components will cause problems with other applications on the servers. Thus, most ISP-hosted applications don't use custom COM components unless the ISP hosts a dedicated server for the applications. However, many intranet applications running internally on corporate LANs or WANs use custom COM components, which make the applications easier to create and maintain and improve their performance, so intranet administrators need to work out ways to handle them.
Intranet applications have some special characteristics that you must plan for. I show you the type of server architecture you need to have for developing and deploying intranet applications, where to put the files that the applications use, and how to configure Windows 2000 and IIS 5.0 to best run the applications.
More Servers Are Better
As with IIS Internet applications, one of the best things you can do for IIS intranet applications is keep other applications—including test applications—off the production intranet servers. For example, if your intranet applications access a Microsoft SQL Server database, run SQL Server on a separate server. If you must run multiple applications on your intranet server, expect performance and possibly maintenance problems.
You can and should use staging and possibly test servers to augment your intranet server. Developers can build your intranet applications on their workstations or on a development server. To test the applications, move them to a test server. If you can't do that, at least move them to another Web site on the development server. Using different servers takes the development and testing load off of your production intranet server and reduces the likelihood that problems in application development or testing will affect your production intranet server. Staging servers let you schedule the movement of applications into production.
The hardware requirements for the different servers vary. Typically, the development and staging servers can be lighter weight than the test and production servers. Development and staging servers don't need to handle user traffic, so they don't usually need high-performance features. Test servers should mirror the capabilities of production servers to allow for load testing.
Databases and Directories
Most intranet applications require a database such as Microsoft Access or SQL Server. If your developers use an Access database, you must place the Access database where the IIS application can access its files. You might also need to provide a file share to the directory holding the database so that developers can access the database. For example, you can place an Access database (.mdb file) in one of the intranet application directories and share that directory so that developers can access it over the LAN or WAN.
SQL Server and Microsoft SQL Server Desktop Engine (MSDE—i.e., SQL Server junior) don't require a file share, but they put more memory demands on the server. If you're running either of these databases on your intranet server, you should carefully monitor how much memory the OS, other applications on the same server, and the database are using. As I mentioned earlier, you should put SQL Server on a separate server if at all possible.
If your intranet application uses COM components, you must design a directory structure to support them. The directory structure
supports components from multiple applications. Common components go in the Components directory, and application-specific components go into the appropriate application directory. You can also create a Components folder in each application directory to hold the components that only those applications use. Give the application directories the same name as the applications with which they're associated.
The intranet application users must have at least Read and Execute permissions to the components. For example, if you're using Anonymous authentication, the IUSR_machinename account needs at least Read and Execute permission to the Components folder and the components.
Configuring Win2K
A few Win2K settings will make your production intranet server run more smoothly. First, make sure that performance is optimized for background services, the default setting for Win2K servers. This setting causes Win2K to provide equal processing to foreground processes and background processes such as IIS and SQL Server. To check this setting, open the Control Panel System applet. Click the Advanced tab, then click Performance options. Make sure that Background services is selected, as Figure 1 shows, and click OK.
While you're on the Advanced tab, click Startup and Recovery. Figure 2 shows the default values for the options that control Win2K's actions when the OS starts. For an intranet, you might want to change the boot delay to 10 seconds or fewer so that the server restarts faster after a reboot. (The default length of time that the system displays the OS list before booting is 30 seconds.)
I also recommend that you make sure that the Automatically reboot check box is selected so that Win2K will automatically restart if it should shut down for any reason. Automatic rebooting is handy on development, staging, and testing intranet servers, which applications in progress can cause to go down. Automatic rebooting can also be handy on intranet production servers. Intranets often seem to be relegated to older servers, while newer and more robust servers become Internet servers. The older intranet servers are more prone to hardware problems and, thus, crashes and restarts.
Configuring IIS
Now, let's take a look at configuring IIS 5.0 for intranet applications. In my Windows 2000 Magazine article "Tweaking NT and IIS for ASP Applications" (March 2000), I provided some tips for improving the performance of IIS Web sites and applications. Many of those tips also apply to intranet servers, but let's revisit them with intranets specifically in mind.
First, you must decide whether your intranet application will be part of an existing Web site or have its own, new Web site. If you intend to add the intranet application to an existing Web site, you can put its files in the Web site's home directory or elsewhere on the server or network in a virtual directory. If you want to create a new Web site for the intranet application, you'll likely put the application's files in the new Web site's home directory.
When you're making the choice between a new virtual directory in an existing Web site and a new Web site, consider that a new Web site lets you set more properties specifically for your intranet application. A virtual directory in an existing Web site inherits some properties from its associated Web site and thus gives you control over fewer properties. Figure 3 shows the Properties dialog box and tabs for a Web site—in this case, the Default Web Site. A virtual directory has the following subset of Web site Properties tabs: Virtual Directory (similar to a Web site's Home Directory tab), Documents, Directory Security, HTTP Headers, and Custom Errors.
On the Web Site tab of a Web site's Properties dialog box, you can control the site's TCP port. Thus, you can assign a port other than 80 for your intranet application. You can also assign specific IP addresses to an application. The Web Site tab also lets you limit the number of connections to a reasonable number for the application. When or if more than the allotted number of users try to access the application, you can decide to increase the number of connections, add more hardware (e.g., memory, CPU, disk), implement a load-balancing system, or move the application to another server.
The Operators tab in the Web site's Properties dialog box lets you manage operators for the Web site or intranet application. Operators can set access permissions, control logging, change the default document or footer, set content expiration, and enable content ratings, but they can't administer settings such as bandwidth throttling that affect IIS. You can also place operators' user accounts in groups and assign them NTFS permissions to directories for the application. However, most organizations don't use the Operators settings but rather give administrative control of Web sites to a Win2K administrator.
The ISAPI Filters tab is useful for performance reasons. On this page, you can install Internet Server API (ISAPI) filters on or remove them from your Web site. ISAPI filters are DLLs that process HTTP requests. For example, you might have an ISAPI filter that modifies the URL with the cookie data, then intercepts the URL when requests come back. Each filter consumes system resources, so use filters only on applications that need them. Thus, if your intranet application requires one or more ISAPI filters but your existing Web site doesn't need them, or vice versa, you should probably create a new Web site for your intranet application rather than putting the application in a virtual directory in your existing Web site.
The Server Extensions tab gives you control over Microsoft FrontPage Server Extensions. If you disable authoring permissions on a Web site, developers can't use FrontPage and Microsoft Visual InterDev to directly work on that site. They can, of course, create or modify content, which you can use another method such as FTP, WWW Distributed Authoring and Versioning (WebDAV), or file transfer over the LAN or WAN to post to the site. If you put your intranet application in a new Web site instead of in an existing Web site's virtual directory, you can control direct authoring for the application.
You can also tune to some degree the way server extensions perform. Click Settings on the Server Extensions tab to see a list of cache settings that you can adjust. Figure 4 shows the default settings. Instead of tuning the settings individually, you can select from three options:
• Tune for <100 pages
• Tune for 100 to <1000 pages
• Tune for >=1000 pages
If your intranet application hosts only 50 users per day, you might want to set the three cache fields to lower values, especially if your server has a limited amount of RAM and is hosting many other sites. If your intranet hosts 200 users per day or if response time is extremely important, make the settings higher. If your application doesn't use the FrontPage search options, you can set Full-text search index size to 0. You can change Max cached document size to limit the total memory dedicated to the cache.
By now, you can see that creating a new Web site for an intranet application provides you many more options than using a virtual directory does. These options primarily let you control the application's performance and management.
Now let's look at the properties that you can set for both a Web site and a virtual directory. Start Internet Services Manager (ISM), then right-click a Web site or virtual directory and select Properties. Either the Home Directory tab on the Web site's Properties dialog box (which Figure 3 shows) appears, or the Virtual Directory tab on the virtual directory's Properties dialog box (which looks similar) appears.
Several properties on these tabs are of key importance for intranets. First, the options at the top of the tabs control the directory that's used as the home directory for the Web site or virtual directory. The first option directs the Web site or virtual directory to a particular directory on a local disk or to a mapped drive on the network. The second option redirects the Web site or virtual directory to a network share by using a Universal Naming Convention (UNC) name. You can also use either of these options when storage or performance requirements dictate changing the directory used for the application. For example, if your local C drive runs short of space, you can map a network drive and move the application to the new drive, then change the local path to point to the new drive. The third option points to a URL. For performance reasons, I highly recommend that you use local storage, unless you have good reasons to use remote storage.
The set of check boxes in the middle of the tab is also useful. Many intranets let users browse directories to look for files because users are authenticated on the network and are thus trusted. If you don't select Directory browsing, users won't be able to browse files when they try to access a site that doesn't have a default document (such as default.asp).
Note that you can set these properties for a Web site or for a directory or virtual directory under that Web site. Earlier, I listed the properties tabs that are common to Web sites and virtual directories. You can use those tabs to set options at the Web site level, then override those settings at the virtual directory or directory level. For example, let's say you put your intranet files in a virtual directory under an existing Web site. You don't want the Web site to allow directory browsing, but you want your intranet to allow it. You can use the virtual directory's Virtual Directory tab in the Properties dialog box to select Directory browsing for only that directory. Then, users will be able to browse files in that virtual directory but not in other directory trees in the same Web site.
At the bottom of the Home Directory and Virtual Directory tabs are the Application Settings, which control the behavior of the ASP applications running in the Web site or virtual directory. The key setting here is Application Protection. Much has been written about this setting and how it relates to performance. Here's a quick review of the options:
• Low (IIS Process)—Applications run in the IIS process. This setting makes applications run the fastest but doesn't isolate them from IIS or other applications. Thus, a failed application could cause IIS and other applications to crash. However, in my experiences with using Microsoft Visual Basic (VB) 6.0 components in an ASP application, even intentionally crashing IIS is difficult.
• Medium (Pooled)—Applications run in a shared process separate from IIS. Pooled applications don't perform as well as those with a Low application protection setting, but they perform better than those with a High setting.
• High (Isolated)—Each application runs in its own process. Applications with the High setting are the slowest performers, but if one crashes, the Web server and other applications will continue running.
I usually choose the Low setting unless I think that an application running on the server might be causing problems. Then I change the setting to Medium or High until I find and resolve the problem. You might want to try the Medium or High setting for your intranet application Web site or virtual directory. If the intranet doesn't perform adequately, you can reset this property to Low.
The IIS documentation recommends that you don't run more than 10 out-of-process applications (i.e., applications with the High setting) on a server. This number is merely a suggestion. Test your applications to determine how many applications your server can support.
If you want to tweak the settings, click Configuration on the Home Directory or Virtual Directory tab and open the Application Configuration dialog box. Unless your intranet application has performance problems, you shouldn't have to tweak these settings for performance reasons. However, because intranet applications are private and typically have fewer users than public applications, you might want to enable session state, tweak timeout values, and enable authentication.
The App Options dialog box, which you access by clicking Configuration on the Home Directory tab, controls the settings for ASP applications. The Enable session state setting can be useful for intranet applications. However, session state doesn't work well for Internet and extranet applications because it doesn't scale well. Fortunately, many intranet applications run on one server and don't need to scale up the way public applications do, so they can be good candidates for session state. If you use session state, monitor application performance to make sure it remains adequate.
If you enable session state, you might need to tweak the Session timeout setting in the App Options dialog box. Session timeout specifies the number of minutes that must pass before the session times out. If you have an application that serves only a few users and those users use the application all day long, you can probably raise this value from the default 20 minutes to 60 minutes or longer. If you have many users who are in and out of the application, you can lower the value to consume fewer resources. Be aware that developers can override your settings in their applications, but they can't turn on session state if you've disabled it.
You might also need to increase the ASP script timeout setting in the App Options dialog box—the default is 90 seconds. This change should be necessary only if your intranet application has long-running processes (such as a complex query on a large database) and the developers don't set this property higher in the code.
One other setting that you'll probably want to change for intranets is accessible through the Web site's or virtual directory's Directory Security tab. Click Edit on the Directory Security tab to open the Authentication Methods dialog box. Most (or all) users of an intranet have accounts in the corporate domain, so you can clear the Anonymous access option and enable some type of Windows authentication (e.g., Integrated Windows authentication). Allowing anonymous access when you want to force users to use Windows authentication will leave a security hole in your system.
User Connections
As I mentioned at the beginning of the article, most users will access your intranet application over the LAN, but some might also require access from remote locations. To accommodate remote users, you can expose the intranet server to the public Internet, provide dial-up access, or provide VPN access.
Placing the intranet server on the Internet means that you must set up security and management like you would for any Internet server. Dial-up access keeps the intranet off the Internet but is slow and requires users to dial in to one of your modems.
A VPN arguably provides the best solution. You secure and manage the VPN, and the intranet server is just a network server to users. VPNs do have a high degree of overhead, so take performance into account before you decide to use a VPN for access.
Hosting intranet applications is much easier than hosting traditional client-server applications. However, as you've seen in this article, intranet applications are different from Internet and extranet applications; consequently, you must configure Win2K and IIS differently to host these applications. However, the nice thing about IIS is the ease with which you can move things. For example, you can place an application in a virtual directory to begin with. If that approach doesn't work, you can always create a new Web site and move the application there. |
global_01_local_0_shard_00000017_processed.jsonl/965 | If you keep getting email that contains the same viruses day after day, you know how tiresome getting rid of the email becomes. Just when the flood of Klez-infected attachments slows to a trickle, email attachments infected with a new virus, such as the Bugbear, show up in your mailbox. After a weeklong flurry of activity, the Bugbear-infected attachments stop, and you're back to a daily trickle of Klez-infected messages—with the occasional Sircam or Yaha.E thrown in for variety. Although I've written about basic computer security in the past, the topic bears revisiting.
If you're an IT professional, you might have overlooked a valuable resource that's targeted at home users: "7 Steps to Personal Computing Security." The Microsoft Web page lists 7 steps that home users should use to secure their computers, but these steps are also extremely helpful for small offices/home offices (SOHOs), small businesses, remote users, and IT pros:
1. Assess your risks.
2. Use antivirus software.
3. Keep software up-to-date.
4. Check your security settings.
5. Use a firewall.
6. Create strong passwords.
7. Conduct routine security maintenance.
On the Web site, each step links to a checklist that provides good advice and procedures to follow to keep your computers secure and private. Each checklist is simple and straightforward and contains links to additional information that the average computer user can understand.
If you're an IT pro who's responsible for supporting telecommuters or a mobile sales force, I suggest you give those users a hard copy of these checklists as a step toward minimizing network infections introduced by workstations that aren't under your direct control. I'm even willing to bet that if you sit down and read through all the checklists that the Web site provides, you'll realize that you've left one or two things undone within your own network. This Web site is worth a visit from anyone who uses computers.
To change the subject, I've been receiving email from readers asking about Windows XP Media Center Edition (MCE). Because I focus on Windows client computing in Windows Client Perspective, I can't cover that product here, but you can find coverage of XP MCE (a consumer-only product) on Paul Thurrott's SuperSite for Windows and at our consumer-focused Connected Home Online Web site. |
global_01_local_0_shard_00000017_processed.jsonl/983 | Points: 5
Cover Story: It Came From Outer Space!
Aaron Otrin
Total Points:
Kill Streak
Last Visit:
Westbrook, CT
What I'm Playing
Rome: Total War Dark Age of Camelot: Gold Edition Dark Age of Camelot: Trials of Atlantis The Legend of Dragoon
Rise of Nations: Thrones and Patriots The Lord of the Rings: The Third Age Beetle Adventure Racing Dark Age of Camelot: New Frontiers
Dark Age of Camelot: Catacombs
My Friends
egmshane shadowsoldier coquigamer Derek5001 IrishGamer Beelzebub123
My Clubs
1UP_s Monthly Contests 1UP_s Monthly Contests
4326 members
NIRVANA The Band That Almost Saved Rock NIRVANA The Band That Almost...
211 members
This club is for fans of NIRVANA to just chill and have a good...
1564 members
728 members
Dead. Thanks to all who joined.
Heavy Metal Heavy Metal
446 members
See all 22 clubs
Too many games!
Too many games!
Jul 22, 2005 9:08AM PST
There are way too many good(or at least games that look good) games coming out at the end of the year. Roma Victor, R:TW Barbarian Expansion, Kingdom Hearts II, DAoC: Darkness Rising, Age of Empires III, The Sims 2 for PSP,BF:MC for PSP, SWBFII for PSP, the list goes on. This may be the second year in a row I don't get madden...there are just that many good games. And worst of all I need to find a job like today so I can get some money for these games and for a better computer and then next year the PS3...And speaking about Roma Victor how come this site doesn't have it? same goes with DAoC: Darkness Rising. Does the site hate developers that aren't big? Just because they don't sell as much or produce as much doesn't mean they're bad developers. I mean hell my friend at u235 studios(www.u235studios.com) is making a pretty good game but no one pays attention to his company because it's their first game...
• E-mail it
• 0
Comments (0)
Title Of Comment
Maximum characters for title is 120
Around the Network
IGN Entertainment Games |
global_01_local_0_shard_00000017_processed.jsonl/996 | Building bridges to make music
Building bridges to make music
Updated March 22, 2013 21:52:00
A band has made an album without ever having met each other.
Source: 7.30 Queensland | Duration: 4min 7sec
Topics: music, arts-and-entertainment, people, brisbane-4000
JESSICA van VONDEREN: It's an unusual scenario. A band that's made an album Without ever having met each other. They hoped an Australian tour this month would be the time they'd all finally get together. Maria Hatzakis caught their performance in Brisbane this week.
MARIA HATZAKIS: This is what music made over the internet sounds like. It's been built online by musicians living in countries across the world from different cultural and religious backgrounds.
ANDY BUSUTTIL, MUSICIAN: We've never actually met physically, but we've got the desire to meet physically and we keep trying but we haven't succeeded yet.
MARIA HATZAKIS: Andy Busuttil from the blue mountains west of Sydney. Is one member of the trio which met through their online work with an audio software company. A shared interest in music led to the idea of forming a band
ANDY BUSUTTIL, MUSICIAN: Before you knew it we had a tune that sounded pretty interesting.
MARIA HATZAKIS: It became so interesting that they recorded an album. And the bridge project band was born. With one member Ittai Shaked in Israel another Andy Busuttil in Australia and a third it Ceyhan in Toulouse in France. The trio sent audio files to each other over the internet and kept in touch via email and Skype.
ITTAI SHAKED, MUSICIAN: Being part of a band that the members are all over the world is something that no-one else can feel, can experience until he does that.
MARIA HATZAKIS: It turned out being apart had its advantages.
ITTAI SHAKED: Sometimes when you're close to each other for a long time, you run into fights, in this situation, you just love that you're friends from a distance.
MARIA HATZAKIS: But the group has always wanted to physically meet too. Two of the three members have met once before. During the band's tour in Israel last year.
ANDY BUSUTTIL, MUSICIAN: It was great, it was really lovely, I went to Israel and I spent a few weeks in Israel which was really edifying, it was wonderful being there and meeting Itai was, we just folded into each other as if we'd been friends for years.
MARIA HATZAKIS: This tour in Australia was to be a chance for all three to finally meet. But that didn't happen. There are some barriers that haven't been so easily overcome.
ANDY BUSUTTIL: There'll be two of us not three, we had an awful lot of trouble trying to get a visa for Umit to come into the country and that's partly because he's living as a refugee in France, he's a Turkish refugee in France.
MARIA HATZAKIS: Ittai Shaked will be in Australia for part of the tour but couldn't get away from work in Israel to take part in the whole program including this performance in Brisbane. But the show went on with local musicians accompanying the group along the way.
ANDY BUSUTTIL: Yeah feeling good, it's all coming together well enough.
MARIA HATZKIS: They all have in common. A love of unusual instruments.
ANDY BUSUTTIL: I used to practice this at home by putting it between clothes in the wardrobe because otherwise the neighbours used to ring the cops.
MARIA HATZAKIS: The tools of trade, the mix of cultures and the distance have all shaped the unusual sound.
ITTAI SHAKED: It's amazing and doing it from a distance, is a great challenge both in mind and both a technological challenge, it's just amazing.
MARIA HATZAKIS: And the plan to finally meet one day goes on.
ANDY BUSUTTIL: We've actually made a decision and that is that we're going to produce another album, we're going to wait until Umit's a full citizen in France which will happen over the next few years and when he has his full passport rather than a titre de voyage we're going to try to do it again so with a bit of luck next time we'll succeed. |
global_01_local_0_shard_00000017_processed.jsonl/1007 | User title
Personal information
Country / Region
United Kingdom
I'm a fan (and you should be too) because...Acdc are simply the best band in the world period. ive been a fan since highway to hell came out in 79. thanks guys for some great music.
Member for
2 years 50 weeks |
global_01_local_0_shard_00000017_processed.jsonl/1048 | comments_image Comments
Reactionary Anti-Immigrant Groups Now Blaming Immigrants For Drought in Southwestern US
Center for Immigration Studies Kathleen Parker does little to question the status quo of golf courses, giant casinos and water-intensive agriculture in arid climates.
The anti-immigrant movement, under groups like The Center for Immigration Studies (CIS), blame immigrants and population levels in the American Southwest for lack of water and potential water shortages. We know droughts are becoming more frequent and are lasting longer. There are real causes for water shortages in the Southwest and equitable access to water is highly important. The anti-immigrant movement, however, has only one cause and one solution: blame immigrants.
In The Center for Immigration Studies’ new report, “ Population, Immigration, and the Drying of the American Southwest,” the group asserts that the key to addressing water scarcity is immigration. According to CIS, immigration is causing the Southwest population to “explode” and making insatiable demands on “our” limited resources. CIS encourages its readers to take action and even claims that the government is “afraid” to address immigration.
Kathleen Parker, writer for CIS, presents a flood of figures to relate the grim states of the Rio Grande, the Colorado River and the reservoirs and aquifers spread across California, Arizona, New Mexico, Nevada and Colorado. Parker paints a threatening picture in which wild fires are likened to atomic bombs and the local history is “dotted with violence and shoot outs over the precious resource [water].”
The impact of U.S. policies on economic and social conditions in Mexico is ignored in the CIS report, making it appear that migrants into the U.S. are taking what is rightfully “ours.” Take the Colorado River Compact of 1922, which she describes in-depth. The Compact divided the water rights of the Colorado River amongst the states it runs through, explicitly leaving Mexico out of the equation. Droughts and increased demand on the River have reduced it to a trickle in Mexico. Meanwhile, treaties such as NAFTA (North American Free Trade Agreement) have put Mexican workers in direct competition with their Northern neighbors. The social and economic conditions in Mexico causing migration to the Southwest are left out of Parker’s analysis, and will not be solved by numerical limits on immigration.
The true causes of the sprawl and loss of wildlife habitats lamented by Parker go beyond the increasing population of the Southwest. Urban planning, environmental protection enforcement and education are all important aspects of a strategy to address loss of biodiversity and agricultural land. Population control is not an acceptable replacement.
The “I = P A T” (Impact = population + affluence + technology) method that Parker employs (p10) is a throw-back to “ Population Bomb” author Paul Erlich and vastly over-simplifies environmental impact. CIS paints itself into a corner by only taking on the “P” in the equation. Parker does little to question the “Affluence,” or level of consumption, which would be a direct affront to the white, upper-income population of the Southwest. By honing in on population, Parker lazily blames immigrants. This methodology does not question the status quo of golf courses, giant casinos and water-intensive agriculture in arid climates. It is obviously not wasteful water consumption that Parker is targeting; it is immigrants.
Parker ignores the fact that immigrant and minority communities are acutely aware of environmental problems, and are often the most directly impacted. Parker assumes that immigrants immediately reach the same levels of consumption as people born in the United States; however immigrants to the U.S. have a great variety of practices and do not necessarily aspire to or achieve the high consumption levels of non-immigrant Americans. Many people migrating north into the American Southwest are coming from arid areas and understand the importance of conservation. Recent immigrants coming to the area for work are not the inhabitants of the sprawling housing developments Parker derides. Sprawl is a result of insatiable developers and local policies that encourage them, not immigrants.
See more stories tagged with: |
global_01_local_0_shard_00000017_processed.jsonl/1049 | comments_image Comments
Matt Taibbi: Break Up the 'Too-Big-to-Fail' Financial Behemoths that Destroyed the Economy
Taibbi and Keith Olbermann discuss whether it's possible to break apart "too-big-to-fail" institutions.
Editor's note: This week, finance industry journalist Matt Taibbi put together a list of five political demands Occupy Wall St. protestors could agitate for. First on his list was the breakup of the "too-big-to-fail" financial institutions holding the global economy hostage. In the following transcript from "Countdown with Keith Olbermann," Taibbi elaborates on how to break up the financial behemoths that sunk the economy.
Taibbi:First of all, nobody asked my advice on any of this and they're doing great without the advice of people like me. But ...
Olbermann: It's a democracy, everybody has a voice, take your platform.
Taibbi: Everybody has a voice. But there are a lot of people who have been following this whole issue of Wall Street corruption for years. There's a small community of those people and we've been talking amongst each other for the past few weeks -- trying to think about, what would the demands be? What would a good demand be if it came time to make one?
And the one thing everybody can agree on is that you have to break up the too-big-to-fail companies. You gotta go in and get rid of those companies because they're above the law and above the market. They have the implicit support of the United States government, which is a disastrous, deadly situation for everybody. So that's thing one, and that's something they could actually get to --
Taibbi:A movement to --
Olbermann: What Congress in our America of 2011 would ever approve that? They would be kidnapped and you'd never find the bodies, they'd be kidnapped by their corporate owners.
Taibbi: I know, it's true, it does sound outlandish, but --
Olbermann: Do you think the people we appointed to replace them would pass this?
Taibbi: But you know, there was an amendment during the Dodd-Frank bill, you know the Brown-Kaufman amendment to break up these companies that got 33 votes in the Senate. Thirty-three isn't 50, 33 isn't 55, but everybody in Washington understands that these companies are a problem. Obviously they have an enormous amount of political power so actually breaking them up is a huge practical problem. But there's support there. If there was a big enough show of force on the streets, commensurate, for instance, with the Tea Party, I think they would have a chance starting it back in the other direction.
Olbermann:Given how the American political system essentially folded at the sight of a few hundred people at the time wearing funny hats, you may have a point. The one advantage of a weak-limbed, jelly-spined, political system is that you can scare it from either direction, it doesn't just have to be from a conservative or pro-corporate one.
Taibbi: Absolutely. And it has the additional advantage of being the right thing to do. Obviously that's not usually a motivating factor for our Congress but you know, when the chips are down, that does tend to be a slight motivating factor.
Olbermann:But, don't the banks have to decide how the bankers get paid?
Taibbi: Yes, they do, and obviously that's something that's going to be more of an industry-wide reform, it's not something you can really do from the outside.
Olbermann: Could you say, do this or we're nationalizing the banks? (laughs)
Taibbi: Exactly. All of these companies are essentially wards of the state right now. If we really wanted to we could dicate to them almost anything. We can have them all fired, or all their executives removed. If you want all this bailout money, if you want public support, if you want to keep borrowing from the discount window at zero percent, here are the things that you have to do
If there was the political will, we could do that. We could tell them, you can't collect bonuses up front, for investments that might blow up later that we have to bail out. And I think that's a logical step that Wall Street has to take.
Matt Taibbi is a writer for Rolling Stone.
See more stories tagged with: |
global_01_local_0_shard_00000017_processed.jsonl/1064 | Steel Angel Kurumi 2
Steel Angel Kurumi 2 is an anime series in the Steel Angel Kurumi franchise
The content below is entirely editable.
A Sequel/Spin Off to the Steel Angel Kurumi series taking place in the 21st Century.
Series Credits
Person Name Episode Count
Naohito Takahashi
To edit the cast, go to an episode page.
Original US Poster Art
General Information Edit
Name Steel Angel Kurumi 2
Name: 鋼鉄天使くるみ2式
Romaji: Kōtetsu Tenshi Kurumi 2 shiki
Publisher OLM
Start Year 2001
Add a new genre
Add a new theme
Similar Edit
We don't have any info about Steel Angel Kurumi 2's related seriess. Help us fill it in!
Top Editors
Mandatory Network
Submissions can take several hours to be approved.
Save ChangesCancel |
global_01_local_0_shard_00000017_processed.jsonl/1082 | Quote Originally Posted by jbl View Post
Does anyone have a source for the Fuji Hunt chemicals in the US? Macodirect has them, but they're in Europe :-(.
I may be wrong, but I finally decided they aren't available in North America anywhere. I would be delighted to be shown wrong! |
global_01_local_0_shard_00000017_processed.jsonl/1088 | Most of the time I take about 5-10 minutes walking around looking at things. I never take a framing device of any kind...I just kinda' know what will show up on the ground glass given the lenses I have. I also have a pretty good sense of how a scene might change given different light. If I scout a location for more than 15 minutes, I'll usually give up on it if I haven't found something. Whether or not I have my equipment with me depends on whether I'm shooting 4x5 (when it's always strapped to my back) or 8x10 (for which I have yet to find the right backpack).
Once I've selected the location, if the light is right it rarely takes me more than 10 minutes to set up, shoot, tear down, and move on. If the light isn't right but I think it might be better at another time, I put it into my mental checklist of things to look at again when the opportunity arises and I move on.
One of the reasons I love living where I do is that, between the hills and valleys and the lattitude, we not only have four seasons but we also have some fairly predictable light and other features. If I know a scene would look better in the fog, I know about when I'll have to schedule a trip back. The same with bright sun, snow, rain, overcast, or anything else short of frogs falling from the sky. |
global_01_local_0_shard_00000017_processed.jsonl/1090 | Skip to Content
Overview of content related to 'iconex'
Syndicate content
This page provides an overview of 1 article related to 'iconex'. Note that filters may be applied to display a sub-set of articles in this category (see FAQs on filtering for usage tips). Select this link to remove all filters.
'Inspecting article' image: copyright, used under license from
This project is part of the Enhancing JISC data services for Teaching and Learning project cluster in this particular programme. Projects in this cluster are aimed at improving access to and accessibility of JISC resources in support of learning and teaching. Background The growth of web-based technologies in learning and teaching has limited the availability of the rich interactive content associated in the past with Computer Assisted Learning (CAL) environments. The increased availability of interactive software components over the recent period has begun to redress the balance in this area. This proposal addresses the issue of the provision, location, exchange and use of client-side interactive components within the DNER and how these client-side interactive elements might be appropriately connected to managed and virtual learning environments in a meaningful manner. The aims of Iconex are to: Establish the key role for interactive content across all disciplines; Produce interoperable interactive content as learning objects; Provide a brokerage for the exchange/sale of interactive learning objects; Provide a first place for academics to find out about interactive content. The specific objectives are to: Establish a Web-based repository of interactive content which will be browsable, searchable by standard metadata and include containers for documentation; Populate this repository with a set of exemplar interactive content; Disseminate the outcomes via the project Web site, publication of case studies and presentation of papers at national and international conferences and meetings. Project start date: 2000-08-01. Project end date: 2003-05-31. (Excerpt from this source)
Key statistics
Metadata related to 'iconex' (as derived from all content tagged with this term):
• Number of articles referring to 'iconex': 6 (0.3% of published articles)
• Total references to 'iconex' across all Ariadne articles: 19
• Average number of references to 'iconex' per Ariadne article: 3.17
• Earliest Ariadne article referring to 'iconex': 2001-06
• Trending factor of 'iconex': 0 (see FAQs on monitoring of trends)
See our 'iconex' overview for more data and comparisons with other tags. For visualisations of metadata related to timelines, bands of recency, top authors, and and overall distribution of authors using this term, see our 'iconex' usage charts. Usage chart icon
Top authors
Ariadne contributors most frequently referring to 'iconex':
3. margaret weaver (see articles on this topic by this author)
4. rachel bruce (see articles on this topic by this author)
Title Article summary Datesort icon
The JISC 5/99 Programme: What's in a Number?
January 2004, issue38, feature article
Syndicate content
about seo |
global_01_local_0_shard_00000017_processed.jsonl/1111 | What Is the Definition of Iceman?
An iceman is an individual who delivers, cuts, deals with or sells ice. The term can also be used to refer to a hired or professional killer who is known as a hatchet man. An iceman can also be referred to as a deliveryman, liquidator, deliverer or manslayer.
1 Additional Answer
Ask.com Answer for: what is the definition of iceman
a man whose business is gathering, storing, selling, or delivering ice.
Source: Dictionary.com
Q&A Related to "What Is the Definition of Iceman"
MC -- I’d say that Serafina was partially protected by Sam’s blast field, so she was probably only knocked out rather than killed. Fuego was definitely dead, and he&rsquo |
global_01_local_0_shard_00000017_processed.jsonl/1114 | Trendy Tips For Valentine's Day
Page 2 of 2
This part of your getup will only make a cameo later on, but it's an equally important aspect of your wardrobe. And while it is given nowhere near the acclaim women's lingerie receives, women do appreciate men with fresh and sophisticated underwear. Plus, if you're comfortable in your underwear, you'll feel even better in your own skin.
Rather than the simple boxers you usually wear, opt for Big Headed boxer shorts, with fabric so soft that she won't be able to stop touching them... until she rips them off, that is.
treat her
Now that you're covered, you'll need to think about what to give your lady for Valentine's Day. We've come a long way from chocolate and flowers, although the power of these two presents should not be underestimated. If you're looking to spend a bit more this year, these popular gift ideas will make her holler before you bring her to the bedroom.
Click here for more, Credit: Purse
Lots of men are catching on to the fact that women simply can't have enough purses. Enhance her collection by giving her a cool and classy purse, like this one by Kenneth Cole. You can also increase the romance factor by putting a pack of personalized IOUs in the purse, or better yet, placing a hotel key in one of its pockets.
Furry boots
One of the coolest looks to hit the female shoe market, furry boots are sure to disappear in the next few seasons due to overkill. But until then, she'll appreciate a pair of furry, Eskimo-like boots, especially if she's been eyeing them for a while now. Rather than Uggs (which I find far from sexy), opt for a pair of suede boots covered in fur (choose between black, brown or snow-bunny white.) She'll love stepping out in them and you'll love how they look with a short skirt or nothing at all.
If you didn't buy her the most popular gift of the year, then what are you waiting for? Apple's iPod might not seem like the sexiest present, but if you customize it by loading the tunes you both love, it'll become a more personal gift choice. Consider it a digital, upper scale mix tape.
At-Home Spa
Get yourselves a spa treatment or bring the spa home by doing the treating yourself. Set up a room in your home with aromatherapy candles, mood music (relaxing or sensuous) and body oils. Lay her down on a towel (if you want to go all the way, rent a massage table), and give her a rubdown she won't soon forget.
Click here for more, Credit: Lee Angel at Brooch
Vintage-looking pins, like the Lee Angel one featured here, are one of the hottest trends of the season, and if your girl hasn't invested in one yet, consider giving her something she can keep close to her heart. From colorful brooches adorned with gems to simpler metallic ones, your woman will want to pin you down by the end of the night.
make it special with style
It's no newsflash that most men dread this mid-February day while many attached women anticipate it. So if you do have a woman to go out with on Valentine's Day, why not treat yourself to some new cologne or cufflinks and make yourself even more irresistible?
If you're single this year, then go out on the 14th and check out all the presumably single ladies. But if you do have a woman, celebrate the occasion by giving her some of the trendiest items of the season. She'll be impressed that you know what's in style and by adding a personal touch to the gift, you'll score even more.
More Like This
Best of the Web
Special Features |
global_01_local_0_shard_00000017_processed.jsonl/1119 |
Views: 116
Reply to This
Replies to This Discussion
It sounds like you would be called an "agnostic atheist" or "de facto atheist." They are only names anyway, call yourself whatever you like. Freethinker, Bright, Secularist, Secular Humanist, Rationalist, etc.
I don't believe in a personal god, or anything other superstitious nonsense, but I have to admit you can't prove there is or is not a god. Just like you can't prove gravity, and you can't prove that there isn't an invisible pink unicorn or flying spaghetti monster. The only proof you'll find for anything is in mathematics.
Science is 99.9% true. Just as I am 99.999999% sure that there is no god. But I don't want to say "I know there is no god," but only because I lack the proper proof.
In order for it to be possible, it must first be defined coherently. Can you do that?
not with god
Then why say you are "99.999999% sure"? ;)
My parents say I was the most faithful Christian they'd ever met. And this might have been true, but I was young, and I studied the religion. Basically, I got from it, "Don't wait for God to solve your problems, do it yourself." This philosophy made a lot of good sense. So I said I believed in God for a long time, but I didn't really. I didn't act like he existed, and if I were to cut him out, so many problems would have been fixed in my questions on the world.
While I still believed, I made an argument that Yahweh, if he was loving, couldn't have created any world that couldn't exist on its own. It goes something like this.
In the world is something that is impossible for any natural or people made force to create. In this universe, if it is created by Yahweh, he is malevolent, because he has not offered proof of his existence, and faith being a central tenant to my branch of Christianity, would mean that no one could have faith in something they know for a fact exists, and we're all damned. Alternatively, other gods created the world. It was possible, but I could find no one to help me improve that point.
Or, two other options. Yahweh does exist, but exists outside the universe, not violating thermodynamics or interacting at all or he doesn't exist period, nor any other gods. I thought about this argument for a week, ran it to all my religious friends, and came to the conclusion that I really didn't believe in God, after all.
Suddenly, everything made sense. Stupidity, human suffering, human rights violations, natural evil, it's all because the universe isn't alive and doesn't care. At that moment I became an atheist, and a strong one.
My parents are both extremely fundamentalist and when I was a kid, that was fine, but the cracks started showing early. I can recall having issues with particular things as young as age 7. Specifically, I can recall my county being under a tornado warning with the path predicted as going over our very small community. I was scared and my mom suggested we pray that the storm not hit us. I recall scoffing...I may not have actually done so, but I did have some type of negative reaction, because my mom told some anecdote about the power of prayer and I can remember not buying any of it, but playing along anyway.
As I got older and learned more and more objective facts that contradicted the Bible, I learned to compartmentalize and rationalize really, really well. As a young teenager, it just never occurred to me that it was possible not to believe. I think my first indication that there really were people who didn't believe in the Christian God was when I learned in world history about other religions and how many people there were that followed them. That all culminated in my dismissing organized religion by age 18 and religion altogether by age 20.
I'm 30 now and it was only in the last two or three years that I've actually done a lot of studying on the subject. Religion just never any sense to me, even from a young age, but it took a while for it to ever occur to me that it was possible to just not believe.
Were you always an atheist?
In the official sense, no. I didn't officially become an atheist until I declared as such in high school. Before then, I was, at most, a non-denominational deist. Something created everything. Then I started taking serious science classes and found out the real 'something' behind it all.
My mother was raised Catholic, but a difficult experience with the church after her first child was stillborn (who would have been Jane, my older sister by 3 years) convinced her not to have me or my brother baptized or brought regularly to church.
My mother still occasionally recounts the tale where my grandmother was watching me, while my mother was out. took me down to the church to "receive the blessing," whatever that refers to, and how my mother was frustrated at this, probably not so much at the religious undertone, but at how her mother was going over her head.
My father's religious upbringing I know little to nothing about, but based on the fact that neither of my grandparents on that side attend church, chances are that my father didn't either.
As a result of this mix, I have been inside a church a grand total of three times in my life, none of these for a religious service. Twice for weddings, and one for a cheap charity concert.
What made you stop believing?
The fact that I barely believed in the first place. Between learning the underlying facts, forces, and phenomena of the universe, and never having had a meaningful relationship with a fatherly 'creator,' atheism both made sense and required no crushing emotional struggle.
However, a lot of credit goes to the fact that my parents settled in Massachusetts, where such a thing might garner barely more than a 'meh', where skull-cracking fundies are virtually nonexistent, and where my high-school's christian fellowship had, according to my yearbooks, at peak, six members.
There were a lot of Catholics among my classmates, but none of them were of the you're-not-one-of-us-you're-going-to-hell variety. I don't they really understood their faith either. Around 3rd or 4th grade, there was a wave of First Communions happening, and I think most of them were more excited about the gifts that resulted. One of my friends joked that with the money he made, he was going to buy a yacht.
The closest I came to religious harassment was some mention of Jesus Christ in the speech given by the valedictorian at high-school graduation. I don't remember exactly what he said, but it was in the sense of Jesus not as a divine figure but as a moral teacher. I don't recall being outraged then; I probably would have been more so had it happened recently. Mostly I'm just confused, since he used to be a good friend of mine.
Eventually, I decided to read the bible "just to see what all the hype was about." Start to finish. I never got past Numbers without boring myself silly. While I recognized the familiar tales of Genesis and Exodus, Leviticus and Deuteronomy concerned themselves with so many mundane and inane rules that just made me wonder, "There are people out there who still consider this relevant?" and Numbers was just a long stream of geneological diarrhea. (Thanks be to the webmasters of Skeptic's Annotated Bible for streamlining the whole process.)
As for other religions, Jews were a sizeable minority in peaceful coexistence with the rest of the student body. On Rosh Hashanah and Yom Kippur, everyone was Jew For A Day just to get out of doing homework. Yet another sign that most of the student body in general didn't take religion all that seriously.
Also, it should be noted that at one point before atheism, I considered Islam just because I wanted to be different. I had read the cliffs-notes summary of Islam, e.g. five pillars: say the Shahadah, donate to the poor, make the pilgrimage at least once in your life, say a few words facing Mecca...seemed like something that I could do, or at least give lip service to. Ultimately, I think my interest was more based on mystique, unfamiliarity, than on real sense of piety.
It was slow for me, but I quite clearly remember thinking there was something wrong with the idea of a god when I was a kid in Germany. This was the early '80s and with the cold war going strong, we would have evacuation exercises on the post my father was assigned to.
The families gathered up in the gym on post, and there was a man keeping the kids occupied by shooting hoops. I asked why we were there, and he honestly answered that it was to make sure that we would be safe if the Russians attacked. Naive kid that I was, I immediately went to what was instilled in me, "Won't god save us." His answer, and I have to paraphrase being that it was a while ago, was something along the lines of God can't control what happens to us. I was sure, and fairly adamant that God indeed had control over everything and he bounced around but I do remember him also saying that it was all Gods will. Can't blame the guy, I put him on the spot I guess. But after that I spent the rest of the night, and many nights thereafter thinking like Epicurus, though I wouldn't read anything by him for years to come. But the logic was there, even in a juvenile manner, that if god was omnipotent, why did harm come to people, and if he wasn't what the hell could he do for me if I prayed to him.
It took some time, and a lot of thought before I realized that religion was nothing more than early mans fear of death, and inability to explain his existance. But because I didn't know there was the possibility that you couldn't believe in something I stayed in the closet for a while, until I hit High School. Of course that is when you try and find your identity and this being something I felt was pretty individual to me, I started letting it be known away from home, and finally threw it all out there by graduation.
All I can say about it is its hard to break away from the brainwashing and clear your head alone as a child, probably even moreso as an adult when your friends family and employment can very well be on the line. Thats why I am very interested in sites like this, a place where closet Atheists can anonymously meet and gain support from those who have already taken the leap.
I think I'm rambling, I better finish up.
Well, thats my story as I remember it, it was so long ago I am surprised it came back so clear.
I'm an atheist because when I was young my parents raised me to be a jehovah's witness. Part of that religion consists of teaching why other religions are wrong. So finally after I realized that Jehovah's Witnesses are cult members that pretty much eliminated all the religions. I since then went to college and learned about evolution. Now then I'm annoyed by religion pretty much.
It's funny because now I can't get enough science. Now I realize how sheltered I was and what a shame for millions of Jehovah's Witnesses.
Oh well, life goes on and I think it has made me stronger. Hopefully it will help me to avoid being taken in by any other cults in the future.
Do you think it would be better if they had never lied and taught you that Santa was real?
That story breaks my heart... You poor child. Nothing can compare to that. :(
Hi everyone!, I finally read all of your posts (it took me about three days). It was really interesting. Some of you have great sense of humor!
I was raised catholic in a northwestern city of Mexico, but I don't remember ever being aware of what all those rituals meant. I found a lot of discrepancies between what people said and what people did. So I realized they had no idea of what they were talking about, so they couldn't really convince me of the importance of being a believer.
As I understand it, when you are part of a community you are expected to behave in a certain way and you just go along because you need to be part of something. Religion is a type of procedural knowlege, you learn it the same way you learn to ride a bike: by practice (you don't need to know mechanics in order to ride a bike). And I guess that is how a learned to behave in the catholic way.
My mother basically forced me (in a nice way) to go to church when I turned 15. In case you didn't know, in Mexico is a big deal when girls turn 15. They make this humongous parties after attending a mass where the girl is blessed. She also has to dress like a doll (yikes!). I strongly refused to follow that tradition, but I had to go to church anyway. I didn't dress up, and I didn't have a huge party. I just went to church accompanied by my family since that was very important to my mother. Now I just go to church once in a while because of major events, like weddings or when a loved one dies. I do it because of sympathy to my family.
I found the reasons of my atheism mainly in two concepts: (1) humans evolved with a sense that things occur because of a reason, Daniel Dennett calls it "intention"; (2) there are structures in the natural world that do not have a main controller (or head, or nucleus), they "emerge" because of the interaction of their elements.
Somehow I connected these ideas to understand that believing in god is a by-product of assuming intention behind any event that occurs in the natural world. (Thank you Daniel Dennet!)
It is very interesting that many of you said that we are born "atheists". I think if that were the case, there wouldn't be millions of people believing in some sort of deity in the world. I would rephrase that by saying that we are born with the biological predisposition to believe in a super-entity (I got this idea from Paul Bloom "Descartes Baby"), but we are also born with the tools of rational thought and consciousness which allow us to orient our believes in a more realistic way than by faith alone. I think that atheists are simply using those tools.
I apologize for any bad grammar! English is not my first language.
Support Atheist Nexus
Donate Today
Help Nexus When You Buy From Amazon
Latest Activity
Richard C Brown shared Loren Miller's discussion on Google +1
37 seconds ago
Richard C Brown shared Loren Miller's discussion on del.icio.us
1 minute ago
Richard C Brown shared Loren Miller's discussion on Twitter
1 minute ago
Richard C Brown shared Loren Miller's discussion on MySpace
2 minutes ago
Joan Denoo commented on Sentient Biped's group Food!
2 minutes ago
Richard C Brown replied to Loren Miller's discussion An open letter to the people who hate Obama more than they love America (Daily Kos) in the group Politics, Economics, and Religion
2 minutes ago
Joan Denoo commented on Little Name Atheist's group Atheist Ailurophiles
3 minutes ago
14 minutes ago
Joan Denoo replied to Grinning Cat's discussion Happy (belated) Pi Day! (3/14) in the group Food!
15 minutes ago
17 minutes ago
Joan Denoo liked Luara's discussion Does caffeine help with stress?
20 minutes ago
Joan Denoo shared Loren Miller's discussion on Twitter
21 minutes ago
Badges | Report an Issue | Terms of Service |
global_01_local_0_shard_00000017_processed.jsonl/1172 | We couldn’t find anything matching your search for Jak Wyglada Formularz O 190f Po Urodzeniu Dziecka
Shop Deals
Quantities are limited.
Selection changes constantly. |
global_01_local_0_shard_00000017_processed.jsonl/1185 | Maccabees, Books of
Maccabees, Books of.
1. THE FIRST BOOK OF MACCABEES contains a history of the patriotic struggle of the Jews in resisting the oppressions of the Syrian kings, from the first resistance of Mattathias to the settled sovereignty and death of Simon, a period of thirty-three years--B.C. 168-135. The great subject of the book begins with the enumeration of the Maccabaean family, ch, 2:1-5, which is followed by an account of the part which the aged Mattathias took in rousing and guiding the spirit of his countrymen. ch. 2:6-70. The remainder of the narrative is occupied with the exploits of Mattathias five sons. The great marks of trustworthiness are everywhere conspicuous. Victory and failure end despondency are, on the whole, chronicled with the same candor. There is no attempt to bring into open display the working of Providence. The testimony of antiquity leaves no doubt that the book was first written in Hebrew. Its whole structure points to Palestine as the place of its composition. There is, however, considerable doubt as to its date. Perhaps we may place it between B.C. 120-100. The date and person of the Greek translator are wholly undetermined.
2. THE SECOND BOOK OF MACCABEES. --The history of the second book of Maccabees begins some years earlier than that of the first book. and closes with the victory of Judas Maccabaeus over Nicanor. It thus embraces a period of twenty years, from B.C. 180 to B.C. 161. The writer himself distinctly indicates the source of his narrative--the five books of Jason of Cyrene, ch. 2:23, of which he designed to furnish a short and agreeable epitome for the benefit of those who would be deterred from studying the larger work. Of Jason himself nothing more is known than may be gleaned from this mention of him. The second book of Maccabcees is not nearly so trustworthy as the first. In the second book the groundwork of facts is true, but the dress in which the facts are presented is due in part at least to the narrator. The latter half of the book, chs. 8-15, is to be regarded as a series of special incidents from the life of Judas, illustrating the providential interference of God in behalf of his people, true in substance, but embellished in form.
3. THE THIRD BOOK OF MACCABEES contains the history of events which preceded the great Maccabaean struggle beginning with B.C. 217.
4. THE FOURTH BOOK OF MACCABEES contains a rhetorical narrative of the martyrdom of Eleazar and of the "Maccabaean family," following in the main the same outline as 2 Macc.
Bibliography Information
Smith, William, Dr. "Entry for 'Maccabees, Books of'". "Smith's Bible Dictionary". . 1901. |
global_01_local_0_shard_00000017_processed.jsonl/1186 | Acts 1 MSG/NIV - Online Parallel Bible
The Message (MSG) New International Version (NIV)
1 Dear Theophilus, in the first volume of this book I wrote on everything that Jesus began to do and teach 1 In my former book, Theophilus, I wrote about all that Jesus began to do and to teach
2 until the day he said good-bye to the apostles, the ones he had chosen through the Holy Spirit, and was taken up to heaven. 2 until the day he was taken up to heaven, after giving instructions through the Holy Spirit to the apostles he had chosen.
4 As they met and ate meals together, he told them that they were on no account to leave Jerusalem but "must wait for what the Father promised: the promise you heard from me. 4 On one occasion, while he was eating with them, he gave them this command: "Do not leave Jerusalem, but wait for the gift my Father promised, which you have heard me speak about.
5 John baptized in water; you will be baptized in the Holy Spirit. And soon." 5 For John baptized with water, but in a few days you will be baptized with the Holy Spirit."
6 When they were together for the last time they asked, "Master, are you going to restore the kingdom to Israel now? Is this the time?" 6 So when they met together, they asked him, "Lord, are you at this time going to restore the kingdom to Israel?"
7 He told them, "You don't get to know the time. Timing is the Father's business. 7 He said to them: "It is not for you to know the times or dates the Father has set by his own authority.
9 These were his last words. As they watched, he was taken up and disappeared in a cloud. 9 After he said this, he was taken up before their very eyes, and a cloud hid him from their sight.
10 They stood there, staring into the empty sky. Suddenly two men appeared - in white robes! 10 They were looking intently up into the sky as he was going, when suddenly two men dressed in white stood beside them.
11 They said, "You Galileans! - why do you just stand here looking up at an empty sky? This very Jesus who was taken up from among you to heaven will come as certainly - and mysteriously - as he left." 11 "Men of Galilee," they said, "why do you stand here looking into the sky? This same Jesus, who has been taken from you into heaven, will come back in the same way you have seen him go into heaven."
12 So they left the mountain called Olives and returned to Jerusalem. It was a little over half a mile. 12 Then they returned to Jerusalem from the hill called the Mount of Olives, a Sabbath day's walk from the city.
14 They agreed they were in this for good, completely together in prayer, the women included. Also Jesus' mother, Mary, and his brothers. Replacing Judas 14 They all joined together constantly in prayer, along with the women and Mary the mother of Jesus, and with his brothers.
15 During this time, Peter stood up in the company - there were about one hundred twenty of them in the room at the time - 15 In those days Peter stood up among the believers (a group numbering about a hundred and twenty)
16 and said, "Friends, long ago the Holy Spirit spoke through David regarding Judas, who became the guide to those who arrested Jesus. That Scripture had to be fulfilled, and now has been. 16 and said, "Brothers, the Scripture had to be fulfilled which the Holy Spirit spoke long ago through the mouth of David concerning Judas, who served as guide for those who arrested Jesus--
17 Judas was one of us and had his assigned place in this ministry. 17 he was one of our number and shared in this ministry."
18 "As you know, he took the evil bribe money and bought a small farm. There he came to a bad end, rupturing his belly and spilling his guts. 18 (With the reward he got for his wickedness, Judas bought a field; there he fell headlong, his body burst open and all his intestines spilled out.
19 Everybody in Jerusalem knows this by now; they call the place Murder Meadow. 19 Everyone in Jerusalem heard about this, so they called that field in their language Akeldama, that is, Field of Blood.)
20 It's exactly what we find written in the Psalms: Let his farm become haunted So no one can ever live there. "And also what was written later: Let someone else take over his post. 20 "For," said Peter, "it is written in the book of Psalms, " 'May his place be deserted; let there be no one to dwell in it,' and, " 'May another take his place of leadership.'
21 "Judas must now be replaced. The replacement must come from the company of men who stayed together with us 21 Therefore it is necessary to choose one of the men who have been with us the whole time the Lord Jesus went in and out among us,
22 from the time Jesus was baptized by John up to the day of his ascension, designated along with us as a witness to his resurrection." 22 beginning from John's baptism to the time when Jesus was taken up from us. For one of these must become a witness with us of his resurrection."
23 They nominated two: Joseph Barsabbas, nicknamed Justus, and Matthias. 23 So they proposed two men: Joseph called Barsabbas (also known as Justus) and Matthias.
24 Then they prayed, "You, O God, know every one of us inside and out. Make plain which of these two men you choose 24 Then they prayed, "Lord, you know everyone's heart. Show us which of these two you have chosen
25 to take the place in this ministry and leadership that Judas threw away in order to go his own way." 25 to take over this apostolic ministry, which Judas left to go where he belongs."
26 They then drew straws. Matthias won and was counted in with the eleven apostles. 26 Then they cast lots, and the lot fell to Matthias; so he was added to the eleven apostles. |
global_01_local_0_shard_00000017_processed.jsonl/1226 | <html> <head><style type ="text/css">body { font-family: "Bloomberg Prop Unicode I", Verdana, sans-serif; font-size:125%; letter-spacing: -0.3pt; color: #FF9F0F; background-color: #000000; text-align: left; } p {line-height: 1.25em; max-width:900px; width:expression(document.body.clientWidth > 900? "900px": "auto" );} h1, h2, h3 { text-align: left; font-weight: normal; color: #FFFFFF; } h1 { font-size: 130%; } h2 { font-size: 115%; } h3 { font-size: 100%; } #bb-style { font-size: 90%; max-width:900px; width:expression(document.body.clientWidth > 900? "900px": "auto" ); } b, strong { font-weight: bold; } i, em { color: #FEC54A; } pre { font-family: "Andale Mono", "Monaco", "Lucida Console"; letter-spacing: -0.3pt; line-height: 1.25em; } table { border: 0; font-size: 90%; width: 100%; margin-left: auto; margin-right: auto; } td, tr { text-align: left; } td.numeric { text-align: right; } a:link { color:#53B2F5; text-decoration: none; } a:visited {color:#53B2F5} a:active {color:#53B2F5} a:hover {color:#53B2F5} </style> </head> <body> <p>By Josh Barro</p> <p>As seems to happen every few years, there's another <a href="http://gao.gov/products/GAO-13-164T">report out from a federal agency</a> urging the U.S. to withdraw $1 bills from circulation and replace them with coins. The arguments are always the same: Coins last longer! We'd save a bunch of money! Everyone else is doing it!</p> <p>Switching to dollar coins is a dumb idea, and I'm glad to see that a member of Congress has finally, succinctly explained why. The AP <a href="http://news.yahoo.com/congress-looks-doing-away-1-bill-083418974--politics.html">reports</a>:</p> "Rep. Lacy Clay, D-Mo., said men don't like carrying a bunch of coins around in their pocket or in their suits."</p> <p>This. This. A thousand times this.</p> <p>The Government Accountability Office estimates that switching to dollar coins would save the U.S. government $4.4 billion over 30 years. That's about $150 million a year, or 50 cents per year per American.</p> <p>What you get in exchange for that 50 cents a year is that you never really need to think about change. You stick it in your pockets when a cashier hands it to you, you collect it in a jar on your desk, and every few months, you take that jar to a Coinstar machine. If you take your Coinstar voucher in the form of a gift card, you don't even have to pay a counting fee.</p> <p>But when you go to Canada or Europe, suddenly change becomes real money. The largest coin is worth $2.60 in the euro-zone, $3.20 in the U.K. and a whopping $5.40 in Switzerland. At the end of the day, not only are your pockets full of large, bulky coins, but those coins are also probably worth enough to buy a sandwich and a beer.</p> <p>That's annoying. I don't want to have to get money from both my wallet and my pockets. I don't want to expend any mental energy thinking about change. I just want to dump it in a jar.</p> <p>Getting the freedom to do that for just 50 cents a year is the steal of the century. It's one of a handful of things (along with movies, bathroom fixtures and hotel mattresses) that America does much better than Europe.</p> <p>If Congress wants to fiddle with our change-production practices, it should abolish the penny, which actually costs the government more than one cent to make. The dollar bill is one of the things that makes America great.</p> <p>(Josh Barro is lead writer for the Ticker. <a href="mailto:[email protected]">E-mail</a> him and <a href="https://twitter.com/#%21/jbarro">follow</a> him on Twitter.)</p> <p>Read more breaking commentary from Bloomberg View at <a href="http://www.bloomberg.com/view/the-ticker/">the Ticker</a>.</p> <p> </p> </body> </html> |
global_01_local_0_shard_00000017_processed.jsonl/1249 | Forgot your password?
Resources for students & teachers
[Figure 48]
FIG. 48
160. Sum or difference of focal distances. The ellipse and the hyperbola have two foci and two directrices. The eccentricity, of course, is the same for one focus as for the other, since the curve is symmetrical with respect to both. If the distances from a point on a conic to the two foci are r and r’, and the distances from the same point to the corresponding directrices are d and d’ (Fig. 47), we have r : d = r’ : d’; (r +- r’) : (d +- d’). In the ellipse (d + d’) is constant, being the distance between the directrices. In the hyperbola this distance is (d — d’). It follows (Fig. 48) that
In the ellipse the sum of the focal distances of any point on the curve is constant, and in the hyperbola the difference between the focal distances is constant.
1. Construct the axis of a parabola, given four tangents.
2. Given two conjugate lines at right angles to each other, and let them meet the axis which has no foci on it in the points A and B. The circle on AB as diameter will pass through the foci of the conic.
3. Given the axes of a conic in position, and also a tangent with its point of contact, to construct the foci and determine the length of the axes.
4. Given the tangent at the vertex of a parabola, and two other tangents, to find the focus.
5. The locus of the center of a circle touching two given circles is a conic with the centers of the given circles for its foci.
6. Given the axis of a parabola and a tangent, with its point of contact, to find the focus.
7. The locus of the center of a circle which touches a given line and a given circle consists of two parabolas.
8. Let F and F’ be the foci of an ellipse, and P any point on it. Produce PF to G, making PG equal to PF’. Find the locus of G.
9. If the points G of a circle be folded over upon a point F, the creases will all be tangent to a conic. If F is within the circle, the conic will be an ellipse; if F is without the circle, the conic will be a hyperbola.
11. Find the foci and the length of the principal axis of the conics in problems 9 and 10.
12. In problem 10 a correspondence is set up between straight lines and parabolas. As there is a fourfold infinity of parabolas in the plane, and only a twofold infinity of straight lines, there must be some restriction on the parabolas obtained by this method. Find and explain this restriction.
13. State and explain the similar problem for problem 9.
Follow Us on Facebook
Homework Help
Characters Left: 200 |
global_01_local_0_shard_00000017_processed.jsonl/1275 | breccia, Breccia sample returned from the Moon by Apollo 15 astronauts in 1971. This sample was found at Spur Crater at the foot of the Apennine range near the Mare Imbrium. It is composed of broken and shock-altered fragments that were fused together after an impact of a large object created the Imbrium Basin.NASA/Lunar Planetary Institutelithified sedimentary rock consisting of angular or subangular fragments larger than 2 millimetres (0.08 inch). It differs from a conglomerate, which consists of rounded clasts.
|
Subsets and Splits