Jump to content

Wikipedia:Reference desk/Computing

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by 75.57.241.73 (talk) at 12:58, 8 September 2010 (→‎diffing with text motion). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Welcome to the computing section
of the Wikipedia reference desk.
Select a section:
Want a faster answer?

Main page: Help searching Wikipedia

   

How can I get my question answered?

  • Select the section of the desk that best fits the general topic of your question (see the navigation column to the right).
  • Post your question to only one section, providing a short header that gives the topic of your question.
  • Type '~~~~' (that is, four tilde characters) at the end – this signs and dates your contribution so we know who wrote what and when.
  • Don't post personal contact information – it will be removed. Any answers will be provided here.
  • Please be as specific as possible, and include all relevant context – the usefulness of answers may depend on the context.
  • Note:
    • We don't answer (and may remove) questions that require medical diagnosis or legal advice.
    • We don't answer requests for opinions, predictions or debate.
    • We don't do your homework for you, though we'll help you past the stuck point.
    • We don't conduct original research or provide a free source of ideas, but we'll help you find information you need.



How do I answer a question?

Main page: Wikipedia:Reference desk/Guidelines

  • The best answers address the question directly, and back up facts with wikilinks and links to sources. Do not edit others' comments and do not give any medical or legal advice.
See also:


September 3

Idiotic and Useless Emails

Why I keep on getting more and more foolish messages like proposals to get quick money (100000 $) ! etc. from a bank etc. who account holder is dead or other bullshit like that. Who is behind all this and what they gain by wasting people's time ?  Jon Ascton  (talk) 01:11, 3 September 2010 (UTC)[reply]

Have you ever heard of a phishing trip? (Now that I read that joke a couple times, it sounds really corny...) Essentially, some slob sitting in a smelly apartment somewhere is hoping you're dumb enough to hand over your most sensitive financial information. Then, they can then use it to ring up something expensive and/or illegal, or sell it to someone else who will end up doing that anyway for thousands of dollars. Of course you wouldn't hand over your credit card number for no good reason, so they cook up all sorts of crazy schemes to dupe you. Most often I hear about the Nigerian prince scam that asks you to wire money to a sketchy Nigerian "prince" so he can send you a ridiculous amount of money in return. Other suspicious e-mails include: you have won a lottery you never entered, and the company needs your bank details so they can send you the winnings; the legitimate-looking e-mail from your bank telling you that you have to change your bank website password for some reason; or there is some rich foreigner who died in a plane crash with no will or family, and you have been chosen to receive his fortune. Ignore them. It's a huge business, and many people are suckered in. You can protect yourself by just deleting them, and remembering that there is no such thing as free money. Xenon54 (talk) 02:14, 3 September 2010 (UTC)[reply]
Or set up a filter that puts mail with words like 'free money' into junk.Sir Stupidity (talk) 03:22, 3 September 2010 (UTC)[reply]
There are several of these scams out there and people fall for them every day. I read an article a couple years ago about a woman who kept giving more and more money away to someone on the net in the hopes of an eventual pay off. If I remember correctly, she gave the scammer something like US$14,000. Dismas|(talk) 04:38, 3 September 2010 (UTC)[reply]
There was an elaborate scam attempt on me the other day. I offered a cellphone for sale online in South Africa, and this person claiming to be on holiday in London wanted me to post the cellphone to his son working in an oilfield in Nigeria. Just the mention of Nigeria set off an alarm bell and I refused to give him my banking details... he even offered way more money than I was asking. Obviously this sounded too good to be true so I told him to transfer into my paypal account. Soon after I got a very authentic looking email from "paypal" but first of all, my paypal status wasn't updated and after looking at the email more carefully, I noticed the odd spelling mistake and the wrong email account being used. It was also sent by someone@gmail on behalf of services@paypal. I reported it to paypal who said they would investigate. I can imagine some derelict warehouse in Nigeria receiving thousands of free items a day and the police there just turning a blind eye. Just be careful people... even worse than material theft is identity theft... it can wreck your life. Sandman30s (talk) 06:00, 3 September 2010 (UTC)[reply]
The basics of the scam have already been clearly outlined. The scammers work on a model that expects a tiny fraction of people that fall for it - The vast majority of people will simply delete the email. However, as in the case mentioned by Dismas - when the phishers do get a 'bite' they can be in for a significant prize. If it really does annoy you, there are a number of sites set-up that give advice to people about trolling the scammers, and they also publish transcripts of the trolling communications (some can be quite funny). If you do go down that route though, be careful not to give the scammers any personal information that could be used to steal your ID Darigan (talk) 11:23, 3 September 2010 (UTC)[reply]
So why do you keep getting these foolish emails, while I haven't received any spam in months? Because I don't go spreading the email addresses I really care about all over the internet. I tell friends and relatives my real email address, I use several webmail accounts for signing up to site memberships and shopping (places that might sell my address onto a third party), and I use other webmail accounts for very occasional 'dodgy' dealings with places that will definitely sell my address onto a third party. Also, I never reply to any spam, even to request they 'unsubscribe' me. The net result is that the spam ends up in an account I only visit once or twice in 6 months, and my real address gets no spam. Astronaut (talk) 11:39, 3 September 2010 (UTC)[reply]
It's really important never, ever, to reply to spam. There is a possibility that a spammer receiving any sort of reply could make him notice that the e-mail address is live, which encourages him to send even more spam to it. Because of a similar reason, the e-mail client I use (Evolution) by default does not automatically download images in HTML e-mails. If it did, the spammer's HTTP server would register a connection from my IP address, confirming that the spam was received by a live person. So Evolution is clever enough to prevent that. JIP | Talk 19:16, 3 September 2010 (UTC)[reply]
I know the 'never respond' advice is often given. but has this ever been confirmed to (still) be true? If you have a botnet capable of sending mail to a 100 million email addresses, is a spammer actually bothering to send his second spam run to only a fraction of those? Unilynx (talk) 10:03, 4 September 2010 (UTC)[reply]

I find I receive junk e-mails with nonsensical contents and subject lines, with an attached image. I've never opened one of the images, but I wonder what this is about. --rossb (talk) 19:32, 4 September 2010 (UTC)[reply]

Is the image attached, or just embedded? If it's just linked to you can be sure that they're doing it to test for valid email addresses. (As soon as your mail client sends a request to the server the image is on, they know the email went through.)
If it's actually attached, it may not be an image. Sometimes you see files named things like
"NakedGirls.jpg                                                            .exe"
If it's attached, and if it's legitimately an image file, then I'm mystified. I don't think I've ever gotten one of those. APL (talk) 00:06, 5 September 2010 (UTC)[reply]
It may well be an attempt to get around Bayesian spam filters. The image can contain a picture of the word "Viagra" (as well as the name of their website) without tripping any filter conditions. Marnanel (talk) 15:18, 5 September 2010 (UTC)[reply]

One time I was in a mood to click a link that promised free iPhone. iPhone was indeed free, but to qualify for it web site required to sign up for number of "promotions", like half a dozen out of forty available, and each of them was non free, requiring products purchase or payments for services. Since I obviously did not trusted the site, I haven't purchase anything, but I clicked couple links that I found interesting (one was Disneyland something, important for later developments). And at the beginning I filled the form with my real address in it(but phone number thanx god was fake, duh! should have gave them local police station number!). Next thing a couple months or so later I received backpack full of toys, addressed - opps had to go, finish later. 70.52.186.74 (talk) 00:06, 5 September 2010 (UTC)[reply]

Addressed "TO: Mynamehere's child" A small backpack itself and toys looked very cheap, but were delivered to my address. Then a letters start coming into my mail, with requirements to pay for it. Sum was not big, less then $50, forty something. And letters looked scary - basically they were saying, you owe us for service/goods provided, please make a payment or call number to pay with credit card etc. And I got something from them! And it was smart on their side, backpack arrived long time I visited a site, and how many people would remember what they were doing online and exact wording of what they signed up for couple month ago while they were browsing online bored? I was even considered myself to make a payment (now it sound silly, but then, when I was reading letters - it just looked like it is better to pay rather then get into some kind of trouble). Anyway I did not paid a cent and, afraid, backpack ended up in the garbage bin, since I had no use for it. What amazes me, is that those truly random website phishers did invested some real money into products (cheap one, but anyway), and bothered themselves with not only electronic phishing. And I bet, if I would provide them with my real phone number, I would have get some automatic system calling my cellphone every other day to remind about payment and such. And in case I have paid them, they could have sent me another gift "worth" $200+. Hope you like this story. 70.52.186.74 (talk) 02:18, 5 September 2010 (UTC)[reply]

data corruption

Resolved

Is there a way to simulate data corruption on a file? Like a special program that can corrupt a file to varying levels so you can test how much the data is retrievable? 82.44.55.25 (talk) 09:47, 3 September 2010 (UTC)[reply]

A hex editor may be the simplest to use for your basic tests. If you want to be systematic, a simple program should be easy to write; you just have to define "corruption". For example, consider three different kinds of failures:
  • "zero out 1 byte at 1024 uniformly-distributed random locations in the file"
  • "zero out 1024 bytes, starting at file-offset 100,000."
  • "zero out every 8th byte, starting at file-offset 0, and ending at file-offset 8192"
  • "xor 1024 bytes in the file using the same bitmask."
These all corrupt the same number of bytes in file, but each simulate a different kind of failure-mode. Unless you know how your files might get corrupted, it's difficult to simulate (or to design a good strategy for recovery). Consider reading our error detection and correction article. Nimur (talk) 18:06, 3 September 2010 (UTC)[reply]

Thanks! 82.44.55.25 (talk) 18:35, 3 September 2010 (UTC)[reply]

Parchive

I've read the Parchive article but I don't understand how it works. It makes indexes of file hashes which can be used to repair files? How exactly is that done? What level of damage can the file be before the Parchive can't fix it? 82.44.55.25 (talk) 09:56, 3 September 2010 (UTC)[reply]

It uses a parity bit system. Parity relies on xor which is a bit operation. Just like addition is 1+1=2 and represented by a +, xor is a bit operator and is often represented with a , or a ^ in some programming languages. Xor is "one or the other but not both." So 0⊕0=0, 1⊕0=1, 0⊕1=1, 1⊕1=0.
If you're storing something, let's say a string of 1's and 0's (1100 0010). You can split it up into two blocks, then compute a third block, a parity block. So you then store 1100, 0010, and 1110 (the last one is your parity block). Now if any one block gets clobbered somehow, you can figure out what it was using the remaining blocks. If two or more get clobbered, you're out of luck.
This is the general idea. It can be expanded, applied to millions of strings like that, etc. That's how parity systems work. You might find RAID-5 interesting, it works on the same principal. Shadowjams (talk) 23:20, 3 September 2010 (UTC)[reply]
I want to point out that my explanation isn't exactly how parchive works either. It uses Reed Solomon codes which entail more detail. [1] That is the original paper that the theory's based on. But the general idea is still the same. Shadowjams (talk) 23:36, 3 September 2010 (UTC)[reply]
The general concept is called an erasure code. 67.122.211.178 (talk) 01:01, 6 September 2010 (UTC)[reply]

Webpage to PDF

Is there anything that can easily turn a webpage into a PDF? I have seen the the Firefox add-on 'PDF Download' but it is tagged as Adware, does the conversion online, and has had bad recent reviews. Thanks 92.15.11.118 (talk) 10:17, 3 September 2010 (UTC)[reply]

My Firefox allows me to print (File -> Print) to a file, and I can select PDF as the output file. Does this suit you? --Ouro (blah blah) 11:13, 3 September 2010 (UTC)[reply]
My computer (WinXP) does not offer that unfortunately. 92.15.11.197 (talk) 14:04, 3 September 2010 (UTC)[reply]
If you want something that can do it in batch (for example to snapshot a website regularly) wkhtmltopdf works well.-- Q Chris (talk) 11:23, 3 September 2010 (UTC)[reply]
That looks interesting but as Windows has deskilled me so that I only understand clicking something, I do not know how to set it up or run it. 92.15.11.197 (talk) 14:08, 3 September 2010 (UTC)[reply]
For this purpose, I installed CutePDF Writer, which does the same thing that Ouro above describes on my Windows XP system. Comet Tuttle (talk) 14:56, 3 September 2010 (UTC)[reply]
In an unexpected turn of events, I cannot check how it works, no Linux version. Sidenote, I wonder why FF for Win does not give the option to print to a PDF file. Hope Comet's solution works out for you. --Ouro (blah blah) 16:23, 3 September 2010 (UTC)[reply]
"print to file" is part of the standard desktop printing architecture in many desktop Linux distributions. It works just the same as the pseudo-printer that CutePDF installs. It's available to any desktop program that's aware of printing (strictly I think there's one plugin for Gnome and a different one for KDE, but they work much the same); they're mostly a layer built on Ghostscript. Non-gui programs have to call Ghostscript themselves to do the same job. -- Finlay McWalterTalk 16:33, 3 September 2010 (UTC)[reply]
Could be. Has to be out of the box, this install is fresh (done last week) and almost nothing had been modified because I didn't have the time to do it. On Ghostscript, I remember yeaaaaaars ago (in the days of W98SE) I had to install Ghostscript to do... a lot, print to files too I think... Thanks. --Ouro (blah blah) 16:39, 3 September 2010 (UTC)[reply]
I use PDFmyURL. It does exactly what it says on the tin - type your URL into the box and it provides a PDF to download. It does add a logo to the PDFs though. Equisetum (talk | email | contributions) 17:15, 3 September 2010 (UTC)[reply]
Quite a silly thing to do. If you merely want to archive a web page into a single file, use Mozilla Archive format (for Firefox, Internet Explorer has its own built-in which does the same thing). ¦ Reisio (talk) 02:09, 5 September 2010 (UTC)[reply]
Your assumption is wrong. Thanks for the gratuitous put-down. In any case I tried that in the past, then uninstalled it because it wasnt very good. 92.15.30.74 (talk) 12:56, 5 September 2010 (UTC)[reply]
It was a charity — any other thing you might be wanting to do other than merely archiving a web page to a single file... would be even sillier (using PDF). ¦ Reisio (talk) 19:09, 6 September 2010 (UTC)[reply]
If you're running OS X, the Print function (File --> Print) has a feature that does exactly this - in the Print window of Safari (or Firefox) there will be a 'PDF' button in the lower-right. Select it, and then "Save as PDF". Rishi.bedi (talk) 18:02, 8 September 2010 (UTC)[reply]

a/b drives

why do my computer does'nt have a, b drives —Preceding unsigned comment added by Shantanuca (talkcontribs) 10:43, 3 September 2010 (UTC)[reply]

These are usually assigned to floppy drives. If your computer doesn't have a floppy drive, then those drive letters won't be shown 82.44.55.25 (talk) 10:57, 3 September 2010 (UTC)[reply]
See Drive letter assignment. It's sad that people are already forgetting floppy disks; it makes me feel old. In any case, what happens if you have more drives than letters to assign? Do you start getting drives AA, AB, etc., or does the computer just not let you do it. Buddy431 (talk) 13:28, 3 September 2010 (UTC)[reply]
I asked a question about that a while ago, Wikipedia:Reference_desk/Archives/Computing/2010_May_2#Drive_letters 82.44.55.25 (talk) 13:42, 3 September 2010 (UTC)[reply]
That's interesting, thanks. Buddy431 (talk) 01:17, 4 September 2010 (UTC)[reply]
FWIW, MS-DOS v2 (released in 1983, and I now feel old) certainly used to let you go on beyond Z, so the next drive would be [:, and so on through the ASCII set. I don't know when this was removed. Marnanel (talk) 14:58, 5 September 2010 (UTC)[reply]

Javascript time

I want to write a greasemonkey script that will popup an alert box at a certain time, say 6pm. Sort of like an alarm clock. In javascript, is there a way to make a function execute at a set time? 82.44.55.25 (talk) 11:08, 3 September 2010 (UTC)[reply]

The window.setTimeout function will launch a function after a specified number of milliseconds. Calculate the number of milliseconds between now and 6pm. Then, use that number of milliseconds as the offset for setTimeout. -- kainaw 12:43, 3 September 2010 (UTC)[reply]

Cell Phone and Lap top

I am thinking about purchasing a cell phone and contract that will allow me about 800 anytime minutes free on weekends and evenings. (perhaps a variation, free incoming) I also want to be able to retrieve email and brouse Web. I can get such a plan for about 60.00 a month. I would then like to cancel my home internet and home phone. I only want to do this if I can plug in the new phone to my lap top and be able to read my email on the lap top and to hopefully write emails on the lap top that will be sent back through my cell phone. DOES ANYONE KNOW IF THIS IS POSSIBLE. ANY ADVICE IS APPRECIATED. I AM GOING OUT TO DO SOME HANDS ON TESTING BUT HAVE NO IDEA WHAT WOULD BE THE BEST PLAN OR PHONE. I DO SEEM TO FAVOUR THE SLIDE KEY BOARD FOR TYPING TEXTS. A bigger phone screen would also be helpful for reading texts etc. —Preceding unsigned comment added by 99.199.47.107 (talk) 17:06, 3 September 2010 (UTC)[reply]

Where are you? Your IP address suggests you're in Canada. -- Finlay McWalterTalk 17:21, 3 September 2010 (UTC)[reply]
What you're wanting to do is called tethering. Most smart phones can do it in some way or another. You will want to check with your mobile provider to see what options they offer for mobile broadband tethering. Most mobile broadband plans are designed with the idea that access is solely through your phone. Thus, most providers charge extra for this service. Also, keep in mind that mobile broadband plans are usually more restrictive in terms of bandwidth and data caps. If you're just utilizing the Internet for email, you shouldn't have a problem. However, if you're wanting bandwidth intensive applications (video, gaming, etc.) you are going to see poor performance compared with wired Internet access. --—Mitaphane Contribs | Talk 18:31, 3 September 2010 (UTC)[reply]

Methods for multiple classes

I'm trying to write a math thing in Java where there is a fraction class, a radical class, a polynomial class, and so on. When defining multiplication for fractions, I would multiply the numerator and the denominator, but there could be many things in the numerator, like an polynomial or a radical or something. First, how would i declare the class of the numerator, and second, could i write something saying "call the multiply method of whichever class this belongs to"? KyuubiSeal (talk) 21:44, 3 September 2010 (UTC)[reply]

There are several ways you can do this. Off the top of my head:
  1. You just have each type of math thingy implement multiply functions for all the things it's meaningful to multiply it by. Java's polymorphism mechanism will call the right one. So your Complex class might have a multiplyBy(Integer) method, a multiplyBy(Complex) method and so forth. This is the straightforward way to go - a (probably minor) downside is that if you add a new kind of math thingy you need to alter all the things it can multiply by so that they know about it, and you have to do that at compile time.
  2. If you needed extensibility beyond that, you can dispatch calls through a dynamic registry you maintain. That way you can add (even at runtime) new math thingies, but the code gets rather complex. Have all these math thingies be concrete implementations of an abstract base class (lets say MathThingy). MathThingy has a multiply(MathThingy A, MathThingy B) method. This is final. When this is called, it uses getClass on its arguments, looks them up in a little registry, and calls specific methods in the concrete subclasses. The registry is filled by the class constructors of each MathThingy as they're classloaded - so the Complex class registers handler methods that say they can handle intXcomplex, complexXint and complexXcomplex. This is very flexible - you can even add new operators (at a logical level; java doesn't allow you to overload or define actual java syntax operators). But a major downside (aside from the complexity) is that type errors become runtime errors rather than compile time ones (so you don't get a problem saying you can't raise a complex number to the power of a matrix until you run the program).
-- Finlay McWalterTalk 22:08, 3 September 2010 (UTC)[reply]

I get the first part about the polymorphism already, but I suppose I should rephrase my question. If I have a Fraction class, it would have an attribute numerator, right? How could I make the numerator an instance of the Polynomial or Radical or BigInteger class? And when it is, is there a way I could say numerator.multiply(5), and have it call the correct class's multiply(int)? Also, how is there no operator overloading, but "a"+"b" will give "ab"? Is that just a special case? KyuubiSeal (talk) 23:07, 3 September 2010 (UTC)[reply]

In your example, you need "Polynomial or Radical or BigInteger" or "..." to satisfy either option:
  • implements a common interface, like "Multipliable", or
  • extends a common parent class, like "MathematicalExpression"
The first way uses a Java interface, and you can follow this tutorial to learn how to use it. The second method uses inheritance - follow this tutorial to learn how to use it. The two methods are subtly different. Now, you can specify your numerator to be a "Multipliable" or a "MathematicalExpression" - and any class that either implements that interface (or extends that parent-class) is acceptable to use as a Numerator. Then, when you call a multiply() method, it will use the implementation of that method for the actual runtime type of the object. Nimur (talk) 23:33, 3 September 2010 (UTC)[reply]
Lastly, your question about Strings: these are "special things" in Java. Consider them a "special case" - they are true objects, but they are the only objects in Java that permit Operator Overloading (and this is the cause of much debate and brouhaha - but was part of the language design). Note that the language explicitly specifies this syntax - and it is not actually "operator overloading," it is special shorthand Java syntax for a new String constructor. This is to make the language "easy to use" for text processing, while staying true to certain "Java commandments" about object-oriented design. (And, take it from a seasoned programmer: you do not want operator overloading. You think you want operator overloading, but that is because you don't have it and haven't seen how horrible it is). Nimur (talk) 23:40, 3 September 2010 (UTC)[reply]
(we're rat-holing here, so I won't belabour this too much) when people say they "do not want operator overloading" I've found they mostly mean the brain-damaged operator overloading that C++ inflicts on innocent minds. Haskell's operator definition (I won't insult it by calling it overloading) lets you define type, arity, priority, and fixity (and actually deigns to let me define any operator I want, like foo or ⊕ or !!!) and combined with Haskell's non-shit type system makes for operator definition to work the way you'd sanely want it to. Sorry for the digression, as KyuubiSeal is working in an environment without such luxuries. -- Finlay McWalterTalk 01:12, 4 September 2010 (UTC)[reply]
So if I have a variable of class A (or interface B), any subclass of A (or something implementing B) can be assigned to it? This means anything can be assigned to an Object, right? And would there be any casting involved? (That's probably not too difficult to handle though) KyuubiSeal (talk) 23:55, 3 September 2010 (UTC)[reply]
Yes, you can assign an object of a subclass to a reference of any of its superclasses. And the system remembers what type it really is - so if you later upcast it (Java will make you handle a ClassCastException in this case) it's still of the same type you defined it as. The java instanceof is your friend here - you can say "is X an instance of A, or is it an instance of B, or not", and act accordingly. -- Finlay McWalterTalk 00:57, 4 September 2010 (UTC)[reply]

Okay, it's working now. Thank you so much! KyuubiSeal (talk) 01:09, 4 September 2010 (UTC)[reply]

Terminal window of safari

Where can I find the terminal window of Safari 5.0.1? I want to do some tweaking.Thanks--180.234.39.169 (talk) 23:22, 3 September 2010 (UTC)[reply]

Safari does not have a terminal; are you sure you don't mean either the operating system's terminal or the Safari Snippet Editor or Error Console ? Nimur (talk) 23:26, 3 September 2010 (UTC)[reply]
If you mean your operating system's "terminal" window, try to navigate to /Applications/Utilities and double-click on Terminal. If you still can't find it, see this.--Mithrandir (Talk!) (Opus Operis) 07:31, 4 September 2010 (UTC)[reply]


September 4

Recovery of Deleted File on SD Card

Help!

   I accidentally deleted a .zip file from a Secure Digital card. The file is about 275KB in size, and was deleted before a backup could be made. In order to stop the deleted data from being overwritten, I have made the SD card read-only by using the write-protect switch. The SD card's filesystem is NTFS, and my operating-system is Microsoft Windows 7 Professional Edition. I need to recover the deleted file ASAP - is there any free software or freeware I can use to recover my deleted file?

   Any and all help is appreciated, and thank you to everyone.

I don't know offhand what the windows software is but there is Linux software to do the same thing. There are Live Discs that do the same thing. It's likely your file's recoverable. Write protecting it is the right idea. I'm sure others will know of some windows software. Shadowjams (talk) 07:13, 4 September 2010 (UTC)[reply]
PhotoRec and Recuva both come highly recommended and can undelete basically anything as long as it hasn't been over-written. Good luck! Zunaid 07:17, 4 September 2010 (UTC)[reply]

What is the cellular 3G base station price range?

If someone want to cover around 5,000 km2 with 3G coverage - what amount of investment into cellular hardware he will be looking at? Assuming wired data network is already exist and installation costs for towers are out of scope of this question(and spectrum licenses out of scope too). One million users inside 5.000 km2. Basically, how much one base station roughly cost and how big would be the cell it will cover? Was trying to search Google, but no luck so far. —Preceding unsigned comment added by 70.52.186.74 (talk) 07:31, 4 September 2010 (UTC)[reply]

I don't know about the cost, but the number of base stations would depend on the specific mobile technology and frequency used, the local geography and the amount of bandwidth required. The table in this article suggests a CDMA-2000 network operating at 1800 MHz has cells 14 km in radius (each covering an area of ~600 km2). However, considering how close the mobile masts are in my area of the UK, I think that might be an idealised radius. Indeed, OFCOM's Mobile phone base station database indicates that a city of 100,000 people has well over 50 base stations and a city the size of Manchester has nearly a 1,000 base stations. Astronaut (talk) 08:46, 4 September 2010 (UTC)[reply]
Thank you! You actually shifted my keywords selection toward right direction and I found an article that mention number of base stations to cover Germany: they have more than 20.000 GSM base station covering 99% of the population and 13.000 UMTS base stations covering 80% of the population. That is perfect for my purposes. Still wondering about rough price estimation that cellular companies pay for base stations(preferably 3G)... 70.52.186.74 (talk) 11:15, 4 September 2010 (UTC)[reply]
Some more searches - and I found an answer! Thanks a bunch! If not you, I would still be wondering. I also think that number of base stations for Manchester is that high because there is different cell companies operate there while some stations are shares, most are not or support different types of network(like GSM vs CDMA and such). And another interesting number - total base station in UK is ~53 000... 70.52.186.74 (talk) 11:39, 4 September 2010 (UTC)[reply]
AFAIK all mobile phone networks in the UK use GSM or it's 3G decendents (UMTS etc) Nil Einne (talk) 13:00, 4 September 2010 (UTC)[reply]
The numbers I mentioned above are from a database that is aimed at people concerned about radiation exposure from mobile comms. Therefore it lists the number of masts in an area and lets you see the frequency, signal strength and company/companies on each mast (interesting because I found out why there is a dead spot round my sister's house :-) If only one operator is in an area of flat geography, then maybe fewer masts will be required, but you would still need sufficient capacity to support the bandwidth your 1 million population might use. Astronaut (talk) 23:47, 4 September 2010 (UTC)[reply]

Scanning over the network

The charity where I volunteer recently bought a new printer/copier/fax/scanner (a Xerox Workcenter 4118). It has a builtin network card which is connected to the rest of the network using a standard ethernet cable, and a standard telephone connection is used so faxes can be sent and received. However, reading the user manual it seems the scanner function can only be used if it is connected a USB or parallel cable. Is there a way to get scanning to work across the network using any PC on the network, perhaps using a third-party piece of software? Being an underfunded charity, there is a strong preference for a low price, or better still, free solution. Thanks. Astronaut (talk) 08:12, 4 September 2010 (UTC)[reply]

Go to Start --> Control Panel --> Scanners and Cameras --> Add Device --> Xerox --> Next. Then, right-click on the scanner and choose Properties --> Xerox Settings --> Add and then enter the IP address of the scanner. After scanning, double-click on the scanner, and WIA should reveal any scanned documents.--Best Dog Ever (talk) 08:24, 4 September 2010 (UTC)[reply]
Thanks, I'll try that. How can I verify whether the Xerox machin supports WIA? And will I need to install the TWAIN scan driver, or does WIA replace that functionality? Astronaut (talk) 08:52, 4 September 2010 (UTC)[reply]
Not a problem. WIA is a replacement for TWAIN. TWAIN gives you more control over the scanner, but always requires the installation of software from the manufacturer to function. TWAIN is also more tempermental. So, I always use WIA, simply because it's easier to set up. By the way, if the generic Xerox driver mentioned above doesn't work, click the "Have disk" button instead of "Next" and then point it to drivers on any disks that came with the scanner.--Best Dog Ever (talk) 09:04, 4 September 2010 (UTC)[reply]
I also work for a charity with a Xerox scanner/printer :-). In the case of our printer, the scanner does not work unless you pay a Xerox agent to enable it. At that point it will scan to a network - usually to a drive on the server. --Phil Holmes (talk) 11:19, 4 September 2010 (UTC)[reply]
Check the documentation at http://www.office.xerox.com/support/dctips/dctips.html. Looks like you need to run [[Internet Information Services|IIS]. ---— Gadget850 (Ed) talk 11:35, 4 September 2010 (UTC)[reply]

Extracting a date from a serial number in MS Excel

The number is in the form YYMMDDXXXXXXX. How do I extract the first 6 digits and reformat into an actual date? Roger (talk) 18:08, 4 September 2010 (UTC)[reply]

You can use LEFT(...,6) to extract the first six characters from an input string. You can similarly use MID(...) to extract any substring. Use these to extract the 2-character year, month, and date; and then feed them into one of the date and time functions to produce a date in the form of your choice (as a numeric value, or as a formatted string, or as a DATE object, and so on.
=CONCATENATE(MID($A$1, 3,2), "/", MID($A$1, 5,2), "/" MID($A$1, 1,2)) 
... might do the trick for you (where $A$1 is the source cell). Nimur (talk) 18:35, 4 September 2010 (UTC)[reply]
Perfect solution! Thanks. Roger (talk) 19:15, 4 September 2010 (UTC)[reply]
Just wanted to add a thanks from my side, I was thinking about this exact problem just earlier this week. I needed to extract dates of birth from I.D. numbers in our membership database. Thanks! Zunaid 08:31, 5 September 2010 (UTC)[reply]
This assumes the US-style mm/dd/yy format for the date and could go horribly wrong if the user's regional settings have dd/mm/yy. A more culture-independent version is =DATE(LEFT(A1,2)+2000, MID(A1,3,2), MID(A1,5,2)). If the date could be earlier than 2000 then the first parameter should be something like LEFT(A1,2)+ IF(VALUE(LEFT(A1,2))>50,1900,2000). AndrewWTaylor (talk) 11:01, 5 September 2010 (UTC)[reply]


September 5

Disk Defragmenter leaves lots of fragments.

I have just loaded and used 'Defraggler' from Piriform and it appears to leave literally hundreds of fragments and many fragmented files. But it gives no explanation. I then downloaded a trial copy of PerfectDisk 2000 which had great reviews. When I used that it also left loads of fragments and fragmented files but it labelled them as "excluded" as though it was not going to include them in the defrag process. Any ideas what is happening here please? Gurumaister (talk) 15:58, 5 September 2010 (UTC)[reply]

Some system files can't be moved and therefore can't be defragmented. I believe the same goes for any files which are in use be other programs. 82.44.55.25 (talk) 16:19, 5 September 2010 (UTC)[reply]

Thank you. doesn't that mean though that they also can't get fragmented in the first place? And could it account for over a hundred files and about three hundred counted fragments? Gurumaister (talk) 16:49, 5 September 2010 (UTC)[reply]

It's probably talking about the page file. What does the Windows defragmenter tell you when you click "Analyze" and then "View report"? (You can get to it by going to Start --> All Programs --> Accessories --> System Tools). I'm interested in (1) total fragmentation, (2) file fragmentation, and (3) pagefile fragmentation. Also, what is the free space percentage? The most important statistic in answering your question is the pagefile fragmentation. You can try using a program like PageDefrag, but that will only work if you have enough free space.--Best Dog Ever (talk) 20:28, 5 September 2010 (UTC)[reply]
One possible reason for the excluded files is Windows' boot-time optimization. Recent versions of Windows will arrange the clusters of some system files sequentially on the disk in the order they're needed during boot, which fragments those files but actually improves performance. Defragmenting them would be a bad idea. Also, a typical hard drive sequential read speed is ~50MB/sec and a typical seek time is 0.01 sec, so if a file's average fragment size is substantially larger than ~0.5 MB (a 1 GB file in 100 fragments, for example) then it's hardly worth defragmenting it (with the exception of the page file). There's also little point defragmenting files that you hardly ever read, or that are read slowly (e.g. an MP3 or AVI file). I don't know whether the major defragmentation tools implement these kinds of heuristics, though. -- BenRG (talk) 20:53, 5 September 2010 (UTC)[reply]

Why don't you use the Windows defragger Quadrupedaldiprotodont (talk) 14:01, 6 September 2010 (UTC)[reply]

In my experience if you run the defragmenter again it does reduce the fragmentation further. 92.15.11.248 (talk) 15:23, 6 September 2010 (UTC)[reply]

Excel Programming

I have been instructed, as part of an assignment, to enter this code:

Private Sub Workbook_Open()
RetVal = Shell("C:\Program Files\Windows Media Player\mplayer2.exe C:\My Music\Electricity.mp3")
End Sub

into something called "VBA editor". What is this editor, and how would I go about entering this code? —Preceding unsigned comment added by T.M.M. Dowd (talkcontribs) 17:39, 5 September 2010 (UTC)[reply]

I reformatted your source code above for readability. VBA is "Visual Basic for Applications". In Excel 2003 and earlier, you can access the VBA editor from the menu Tools > Macro > Visual Basic Editor. In Excel 2007 and later, you can access it through the "Visual Basic" item under the "Developer" tab on the ribbon. Alt-F11 is a shortcut in both versions. Once in, you will need to create a new module (menu Insert > Module) into which you can paste the above code. You can then execute the code by clicking on the run icon (green arrow) or pressing F5. If you get a "file not found" error, it is likely that one of the files is located in a different directory that is listed in your source code. You will need to locate then and update your source. -- Tom N (tcncv) talk/contrib 18:27, 5 September 2010 (UTC)[reply]
Thank you very much for your help! It didn't actually work but I think it was almost there. My problem is, I am trying to get background music in excel 2003, which I have been trying to do for the best part of a month with no avail. --T.M.M. Dowd (talk) 18:40, 5 September 2010 (UTC)[reply]

date

I have around 3,000 files who's creation and modified dates are 2064 because that's what the system date was set to on my old computer. They're should be dated 2003. The month and day are correct however. How can I convert them all to the right date? 82.44.55.25 (talk) 17:58, 5 September 2010 (UTC)[reply]

If you're running any kind of Unix, the "touch" command does what you want. If you're not, tell us what you're running. Marnanel (talk) 18:00, 5 September 2010 (UTC)[reply]
Windows 7 82.44.55.25 (talk) 19:11, 5 September 2010 (UTC)[reply]
We also need to know the file system. By default, Windows 7 will use NTFS, so you can modify the create- and modified- times. You can use the xcopy program (part of modern Windows) to copy file contents without copying file create-dates, for NTFS file systems. But if you're using some other file system, this may be impossible. Nimur (talk) 20:21, 5 September 2010 (UTC)[reply]
Yes, it's NTFS. 82.44.55.25 (talk) 20:37, 5 September 2010 (UTC)[reply]
It makes no difference whether it's NTFS or FAT, since they have the same three date stamps and they are modifiable in the same way. -- BenRG (talk) 22:15, 5 September 2010 (UTC)[reply]
Besides FAT32 and NTFS, many other file systems exist for Windows - like NFS or OpenAFS - and these definitely manage timestamps differently. Nimur (talk) 07:33, 6 September 2010 (UTC) [reply]
There are many versions of touch for Windows, but none that I've found support the --forward option that you'd need to change the year without also changing the rest of the time. Even with --forward you'd have to use different offsets for dates before and after February 29 because 2064 is a leap year while 2003 isn't. (Are you sure all of the dates are correct, incidentally?) Also, most ports of Unix touch don't let you set the creation time, and I imagine many of them will fail (in unpredictable ways) when faced with years after 2038. On the other hand, you could do this pretty easily with any half-decent programming language. Windows PowerShell is one possibility, but I haven't learned it yet. -- BenRG (talk) 22:15, 5 September 2010 (UTC)[reply]
You don't need touch. The dos/windows command copy can also change the modification time of a file. Microsoft explains it here: [2].
Quote: Changing the time and date of a file
If you want to assign the current time and date to a file without modifying the file, use the following syntax:
copy /b Source+,,
The commas indicate the omission of the Destination parameter. 93.95.251.162 (talk) 14:37, 10 September 2010 (UTC) Martin.[reply]
To do this on many files you would need to type a command something like this:
for %i in (*.*) do copy /b %i+,,
I should point out that this is untested, since I use a different system. Also you might want to backup the files before trying anything like this. 93.95.251.162 (talk) 15:12, 10 September 2010 (UTC) Martin.[reply]

Divx wrapped in AVI container

Supposedly my new phone can play divx videos "wrapped in AVI container." The video I want to play has .divx extension. Do I just need to change the extension to .AVI and that "wraps it in an AVI container?" Or is there more to it than that? The Hero of This Nation (talk) 20:25, 5 September 2010 (UTC)[reply]

Changing the extension to .avi won't change the Container format (digital). However, .divx files (DivX Media Format) are backwards compatible with .avi, and should play on your device. If the .divx file contains chapters or subtitles those won't work, but the main video and audio should. 82.44.55.25 (talk) 20:33, 5 September 2010 (UTC)[reply]

September 6

Is it safe to use an open wireless router (say, in a cafe)?

This document suggests to me that it's unsafe, but I just watched a Q&A session where professor Eben Moglen says that's biased by misinformation (12m14s through 13m) and an audience member agrees (13m42s through 14m).

Our wireless security article is too technical for me. Thanks. 160.39.220.66 (talk) 03:10, 6 September 2010 (UTC)[reply]

Usually, yes. But it depends on how secure your computer is and how they configured the router. If you have a firewall turned on, then you're safe from most attacks. Also, most connections to sensitive sites (e.g., online-banking sites) are encrypted by the browser (denoted by an https instead of an http in the address). So, even though people can evesdrop on your browsing sessions (since it's an open router), they can't decode information sent to sensitive sites, since that information is usually encrypted.--Best Dog Ever (talk) 03:44, 6 September 2010 (UTC)[reply]
How awesome! How surprising!! I'm already sitting on the wikilink that will point to this question when it gets archived in a few days, so I can share it with my friends and family. 160.39.220.66 (talk) 04:32, 6 September 2010 (UTC)[reply]
However you should consider always running in incognito mode and not logging in / using any accounts important to you on unencrypted connections, or your session may get captured or at worst your password gets sent unecrypted. --85.76.85.210 (talk) 11:57, 6 September 2010 (UTC)[reply]
Note that downloading email to an email client pretty much sends your password in the clear, so wireless snoopers and/or the cafe owner would be able to read this information.--86.148.22.79 (talk) 14:07, 6 September 2010 (UTC)[reply]
The above statement is true only if the client and server do not use a secure connection. Most email clients like Outlook and Thunderbird support TLS (an encrypted connection), and many web-based systems also support secure communication (usually with HTTPS). A "properly" configured email server should actually forbid you from connecting to it in an unencrypted way, forcing you to set up and use secure communications. The user should find out whether they are connecting to their email system over an encrypted channel - they can typically find information by checking the "help" section of the email system they use. Nimur (talk) 18:40, 6 September 2010 (UTC)[reply]
My statement is true with the default connection with most ISPs. I therefore thought it wise to warn the OP, whilst being aware of everything you've added.--86.148.22.79 (talk) 10:59, 7 September 2010 (UTC)[reply]
And note how easy it is not to notice Wikipedia has logged you out. --Phil Holmes (talk) 11:00, 7 September 2010 (UTC)[reply]
Note that if you are seriously concerned about security, using a secure VPN network pretty much makes the place you connect through not an issue, as it adds a seamless layer of encryption over everything you transmit and receive. --Mr.98 (talk) 00:50, 7 September 2010 (UTC)[reply]

You just have to assume that it's no different than shouting through the room. Only it's unlikely, but possible, someone is listening. As others have said, if it's a "secure" site using SSL then you're probably safe. If the connection's unencrypted, then it's possible for others to read it. The risk isn't especially that they'd access your computer, but that they'd intercept your data. Wireless encryption doesn't provide any advantage in terms of protecting the computer against a virus or something else. But the transmission from your computer, through the air, to the wireless, is at issue. Shadowjams (talk) 06:09, 7 September 2010 (UTC)[reply]

Removing IE from XP

I have a friend that has a XP Computer running Media Centre Edition. However, for some reason, he says that after his dad went to visit some sites, IE would suddenly popup at ramdom intervals. He says he di a full system scan and came up with nothing and now says he just want's to remove IE. Is this possible? Sir Stupidity (talk) 07:49, 6 September 2010 (UTC)[reply]

We have an article on everything: Removal of Internet Explorer. It is basically not easy, but doable, and might constitute infringement of copyright and/or voiding of warranty, if you care about these things. There are also other caveats, such as that the system might be less stable and certain components (I refuse to use the f word here) might not function the way they are supposed to. The article covers this all. --Ouro (blah blah) 09:34, 6 September 2010 (UTC)[reply]

Just set Firefox to the default browser Quadrupedaldiprotodont (talk) 13:59, 6 September 2010 (UTC)[reply]

That's wouldn't at all fix the problem he's discussing. --Mr.98 (talk) 14:11, 6 September 2010 (UTC)[reply]


What did he do a "full system scan" with? Can I just recommend that he do a spyware specific scan with a fully updated Spybot Search & Destroy? Because removing IE is really probably not going to fix everything, because there is clearly some malware on there causing the problem in the first place. --Mr.98 (talk) 14:13, 6 September 2010 (UTC)[reply]

Just to echo some of the others, the problem may not be IE. You should probably see exactly what is popping up on the screen. I'd bet dollars to donuts it's spyware, or he's somehow set IE to be the default program for one of his file types. — The Hand That Feeds You:Bite 16:21, 6 September 2010 (UTC)[reply]

He used Norton Antivirus 09 to scan it, and he says it was fully updated.Sir Stupidity (talk) 03:10, 7 September 2010 (UTC)[reply]

Best and Quickest Way to a Blog

What is the best and coolest way to start a blog ? Wordpress and Blogspot seem to be unnecessarily complex. There must be a better way to put, change, add, delete, edit and fix a post in most quick manner. Also adding pics should be easy and friendly. And a newcomer should be able to comment without undergoing a discouraging ceremony like logging in, so dear to Blogspot.  Jon Ascton  (talk) 10:03, 6 September 2010 (UTC)[reply]

Try Tumblr if you want something arranged around ease of use. --Mr.98 (talk) 12:16, 6 September 2010 (UTC)[reply]

You can download Wordpress and host it yourself, then you control everything. Quadrupedaldiprotodont (talk) 13:58, 6 September 2010 (UTC)[reply]

He doesn't want to control everything. He wants it to be simple. Hosting everything and rewriting the software itself is not the simple solution. --Mr.98 (talk) 14:11, 6 September 2010 (UTC)[reply]
"Simple" depends entirely on user skill-level and what kind of web presence they already have; but since we know this OP from his prior questions on the desk, we can probably assume that he wants a free, third-party, hosted blog - probably with a browser-based "WYSIWYG"-style editor). You can try our list of social networking websites and pick the service that offers the features you need. Nowadays, it is common to offer many additional complex features in addition to the ability to post "updates." Because "blog" is such a vague and poorly-defined term, there is a huge spectrum to choose from. For example, I used to host my "blog" in the literal sense ("web log"), publishing all the transactions that my server had handled over the past day. It was very long and boring and technical, and very few people read it, even though it auto-updated it daily... but I contend that it was the "best" and "coolest" way to blog. It was extraordinarily simple to set up; I just added a cron job to run every midnight:
1 0 * * * cp /var/log/httpd/access_log /var/www/log/
It's hard to get a simpler web-`blog than that! Anyway, facetious joking aside, I really think it is easier to run your own server than to try to learn the intricacies of the latest pseudo-free web-host. The necessary skillset to operate a web-server is small and there are lots of free tutorials available. Once you have your server set up, updating a "blog" is as trivial as saving a file. In any case, we shouldn't discourage the OP from self-hosting on the grounds of "it's too difficult" - that's simply not true. Anyone can learn to self-host their website. It takes time and effort to learn the user-interface and configuration details of, say, Facebook; instead you could learn the configuration-details of your web-server - and presto - you have complete creative control of your website. Both methods have a learning curve, but only one signs over your soul to a corporation with insidious motives. Nimur (talk) 18:57, 6 September 2010 (UTC)[reply]
Are you looking for a different host, or simply editing software such as Windows Live Writer? Smallman12q (talk) 15:30, 6 September 2010 (UTC)[reply]
Well, you can start a blog just by updating an HTML page every day. But if you mean "ease of use," I'd say either [3] or [4] are your simplest ways. They won't appear to be very professional, though, as people tend not to take blogs seriously unless they're on their own hostname and not using a generic template. (Edit) Well, there's a downside to not requiring a login: spambots love it when they don't have to register a username to comment. — The Hand That Feeds You:Bite 16:23, 6 September 2010 (UTC)[reply]
I've always found Wordpress to be pretty straight-forward to use: it gives you a lot of access to innards and customization, but you can simply ignore a lot of it. If you want a guide to getting started, Wordpress has one, in addition to extensive documentation: [5]. Commenting is open, if you'd like it to be -- there's a setting for that. One of the nicest things about Wordpress (and a lot of blogging software) is that the post-writing environment resembles programs people are already familiar with, like MS Word. Adding an image is a pretty intuitive process -- click an image icon, and then you get a dialog to browse to the image on your computer, or point it to a URL. Going with Wordpress (or Blogspot, for that matter) will ensure that you have *a lot* of documentation on anything you want to learn how to do, from the simplest to the most complex. Rishi.bedi (talk) 19:00, 6 September 2010 (UTC)[reply]
Again, I think you all have mistaken "simple" for "best" or something like that. He gives a pretty good outline of what he means by simple — he wants very few options, he wants speed of editing and adding to be a priority, he doesn't want to waste time tweaking settings. He doesn't want "power" in the sense of being able to do 10 million things with it and recoding it from the ground up. I think given his inclinations Tumblr is probably his best bet; it's arranged around Twitter-like simplicity, out of the box, no modifications needed. He doesn't need to learn how to host things or edit code or read documentation. --Mr.98 (talk) 22:23, 6 September 2010 (UTC)[reply]
Concur with Nimur in general. I am planning to set up my own server at home soon, just need to get around to it. --Ouro (blah blah) 06:08, 7 September 2010 (UTC)[reply]
Nobody doubts that setting up one's own server is a great thing if you're interested in power and flexibility. But it's not a "simple" approach. Y'all got to work on thinking outside of your own priorities! --Mr.98 (talk) 11:19, 7 September 2010 (UTC)[reply]
@ Mr 98: On the one side, we choose to do this, because this is hard. It's true that it's not a simple approach - until you do it, at which time you learn. I'm not trying to be snub or anything, it's just what I believe in, learning through approaching new challenges. However, until I have my own server set up, I am humbly using an external provider to get me some space on the web. --Ouro (blah blah) 07:13, 8 September 2010 (UTC)[reply]

Reimaging HD

My friends laptop wouldn't boot and they left it in to get repaired the people fixing it said that they would reimage the HD, but haven't told him what caused the failure, not sure if the know themselves, if it was a hardware failure and not a software failure would this actually fix the problem and would his best option be to purchase a new HD as all his data is gone in any way due to the reimaging? Mo ainm~Talk 16:29, 6 September 2010 (UTC)[reply]

If your friend's hard drive physically failed, re-imaging it won't help. What exactly do you mean by "wouldn't boot" --- did you get a specific error message, or did nothing happen at all when you powered up? If it's a software failure, re-installing the OS will fix it -- the hard drive will be formatted (meaning it will have no data on it), then the OS will be installed, restoring your machine to factory settings. If this doesn't work, you definitely have a hardware failure -- but it may not necessarily be the hard drive that failed... any of the other components that are critical to start-up could be the culprit. Rishi.bedi (talk) 19:04, 6 September 2010 (UTC)[reply]
Not to sure of the specifics it was more a general question, from what he said it just wouldn't turn on when he tried, left it into get repaired and see if any data could be recovered but the only option he was given was to reimage the HD without explanation what caused it. Not being a techy he just went along with what they said. Mo ainm~Talk 19:31, 6 September 2010 (UTC)[reply]
I agree that it's rare to have a hard-drive equipment failure that completely screws up your system, but can be fixed with a re-imaging. (At least with equipment made in the last decade and half. HD's were more touchy in the Olden Days.)
If I were your friend, I would insist on learning exactly what went wrong. "re-imaging" the harddrive is often something that incompetent computer repairmen do when they don't know how to fix your problem. It's a throw-the-baby-out-with-the-bathwater solution that will 'fix' any software or operating system problem.
(All that said, personally, when I have doubts about a hard-drive, even irrational doubts, I replace it immediately. HD's aren't that expensive anymore. It's worth it to me for the peace of mind.) APL (talk) 19:41, 6 September 2010 (UTC)[reply]
The shop can run disk diagnostics to give an indication whether there is (at the time those are run) a hardware problem that they can detect. If there is not, they are liable to assume it was a software problem; at that point, re-imaging the hard drive is, from their standpoint, a reasonable solution.
I don't think such technicians in general have the tools or the knowledge to figure out "what went wrong", mostly because it isn't economically feasible. There are a huge number of possibilities, and there is no guarantee that a world-class expert with all the tools he or she could wish for would be able to figure it out in a reasonable time. Repair shops aren't usually set up for that sort of thing, because customers are not usually prepared to pay for it.
Just picture it: "It is difficult or impossible to tell what went wrong; if you want to leave it here and have us study it, then tell us a maximum number of hours to spend and we'll do our best." Not only will people not pay for that, they will be put off by the suggestion.
I do agree that, if you're going to lose the data anyway, a new hard drive should definitely be considered.

rc (talk) 20:04, 6 September 2010 (UTC)[reply]

Accept big, output small

What do you call the networking principle that says you should accept the widest range of values possible but output a very narrowly defined set? --STUART (talk) 18:00, 6 September 2010 (UTC)[reply]

You're probably thinking of Postel's Law, see Robustness principle. -- 78.43.71.155 (talk) 18:47, 6 September 2010 (UTC)[reply]

Oldest and Newest YouTube video, please?

What are the oldest and newest YouTube videos? Thanks, --70.179.165.170 (talk) 19:32, 6 September 2010 (UTC)[reply]

The first can be found by typing first youtube video into google; it so happens that the Wikipedia article on YouTube mentions it (search for the above-mentioned phrase). As to the newest, that keeps changing all the time, as people upload new videos. 88.112.56.9 (talk) 19:50, 6 September 2010 (UTC)[reply]
Well then, about the newest: What is the newest video as of the time you submit your reply? --70.179.165.170 (talk) 20:41, 6 September 2010 (UTC)[reply]
That will be a different answer by the time you read it. [6] claims to have "today's 101 top rated videos from YouTube™, updated daily". Dbfirs 00:39, 7 September 2010 (UTC)[reply]
In fact it's probably a fairly meaningless question since the answer is likely to be different even by the time you've finished receiving the page which tells you which is the newest video (presuming Youtube has some sort of live feed of new videos). [7] notes that 24 videos are uploaded every minute although doesn't specify when that was. This must be an average and clearly there would be less at some times particularly when those in the US and to a less extent Western Europe are sleeping or not active but even so, it's not difficult to imagine it's rare that there isn't a new video every 15 seconds at a minimum. In other words, even saying "The newest video is 'Why I love chicks and kiwis' uploaded by Duck Cheney today at 20:52:23 NZST" is a statement that even if you do get the info from Youtube quickly enough probably won't be true by the time you say it out loud. Nil Einne (talk) 08:51, 7 September 2010 (UTC)[reply]

Secondary question: What are the most up-to-date stats on YouTube?

For example, how many videos exist on there so far, how many users, and, on average, how many videos per user? --70.179.165.170 (talk) 20:39, 6 September 2010 (UTC)[reply]

You could try to search the web for this information. It is somewhat unlikely that someone here has up to date figures on these things in his head; so we are reduced to your web search slave service. Google for something like number of videos on youtube. 88.112.56.9 (talk) 21:58, 6 September 2010 (UTC)[reply]

Youtube

How are youtube video urls generated? With this logic (talk) 20:48, 6 September 2010 (UTC)[reply]

They appear to be just unique IDs. They don't have any relation to the content of the video. An easy scheme would just to run a hash function on a very large random number (or the product of two large random numbers), check to see if that ID is already used (pretty unlikely), if so, repeat, if not, use it. Their scheme seems to be an 11-digit ID that is case sensitive, can include numbers and dashes, which is a huge possible set of IDs. --Mr.98 (talk) 23:41, 6 September 2010 (UTC)[reply]
(Specifically, a YouTube video ID is made of 10 characters from A-Z, a-z, 0-9, - and _, plus one character from AEIMQUYcgkosw048 for a total of 264 or about 18 × 1018 possible IDs.) --Bavi H (talk) 03:12, 7 September 2010 (UTC)[reply]
Running a hash function on a long random number does not give any more randomness that using a short (i.e., 64-bit in this case) random number directly, and the latter is obviously more efficient.—Emil J. 14:05, 7 September 2010 (UTC)[reply]

September 7

Second Internet Line Cable

Hi, I help manage the wired and WiFi internet access for a Bed & breakfast-sized apartment of around 30 people. Currently, I have one TV cable plugged into a modem, which is then plugged into a series of routers that help cover the entire house. Frequently, when all residents are using the internet at once, the connection is unstable and will randomly drop users off the Wifi access.

I am thinking of connecting a second TV cable into a second modem and plugging some routers into that to help spread the load.

My questions are: (1) Will I have to contact my ISP (Time Warner) and pay for the cost of an additional connection? And (2) will this indeed work?

Thanks, Acceptable (talk) 00:07, 7 September 2010 (UTC)[reply]

We need some more information. First, are you sure you have several routers, and not merely several wireless access points? And do you have any diagnosis about what actually is occurring when the network fails? (Are the users unable to obtain an IP, for example? Or are they unable to locate a wireless network?) There are some "best practice" guidelines for creating and managing a scalable wireless network (for example, here is Cisco's product lineup brochure). It is very unusual to have "several" routers in order to service ~ 30 connections - you really only need one, and the rest of the house should be covered with WAPs. Can you describe your network topology and the failure symptoms a bit more? Nimur (talk) 01:51, 7 September 2010 (UTC)[reply]
First, are each of your routers on the same channel? Neighboring routers should be on different channels -- either 1, 6, or 11 -- to prevent interference. Also, lay out your network so wireless signals from each router overlap each other by 15-20%. Otherwise, they will compete for connections from users.
If the bottleneck is really your cable connection, then you can purchase another cable connnection and cable modem from your ISP. You will also need to purchase a router with two WAN ports, like this wireless model or this wired model. You can then plug in an ethernet cable from each cable modem into each of the two WAN ports in the router. This is called channel bonding. You can also installl a network card with three or more ethernet jacks in a desktop computer, using it as a router. Here is an example of such a card.
Another solution would be to ask your ISP for more bandwidth. Most cable connections are capped at a much lower speed than what is available. If you pay them more money, they can probably increase the speed of your connection. I also have a cable-internet connection. I pay my ISP an extra $20 per month for twice as much bandwidth (23 mbps).--Best Dog Ever (talk) 02:45, 7 September 2010 (UTC)[reply]

Recording a Skype conversation

I have a client here in Canada whose wife is still in their country of origin. He uses Skype to talk to her regularly. He wants to bring her to Canada but our wonderful officials are skeptical that he talks with her as frequently as he says he does. Is there any way to record the Skype conversations to prove that he does talk with his wife? 99.250.117.26 (talk) 02:34, 7 September 2010 (UTC)[reply]

You can always just use a microphone and record it from the speakers.Sir Stupidity (talk) 03:02, 7 September 2010 (UTC)[reply]
I've used Pamela. It's easy to use and the sound quality is excellent.--Best Dog Ever (talk) 03:04, 7 September 2010 (UTC)[reply]
Uh, careful there. Recording actual conversations might be problematic due to wiretapping laws (this is not legal advice, but rather advice to seek legal advice by a qualified professional in the field of law, should you really want to record the conversation). Consider the situation that your client some day decides to break up with his wife, and she suddenly "doesn't remember" agreeing to the recordings. If your legislation requires two-party consent to recordings, and there's no proof that she agreed, she might drag him to court.
Therefore, I would suggest that you investigate if there are any ways to record the connection data, similar to call detail records on a regular phone line. That way, the actual conversation stays private. -- 78.43.71.155 (talk) 08:31, 7 September 2010 (UTC)[reply]
Would a recording actually help? Surely officials want a log of calls made. However, I doubt a log of Skype calls would do because they might claim he could tamper with the evidence in his favour. I suggest your client uses a regular land line for a while so he can build up an independant log of call activity at the phone company, a log which the officials can then obtain through a legal request to the phone company. Astronaut (talk) 12:05, 7 September 2010 (UTC)[reply]

Way better than recording the speakers with a microphone, just record your stero output direct from the sound card. Also, to the pseudo-lawyers ranting about recording calls being wiretapping, it ain't illegal if you say you're recording the call, then the other person can hang up if they don't want to be recorded. This happens all the time with call centers that say "this call might be monitored for training purposes" etc etc. Quadrupedaldiprotodont (talk) 14:02, 7 September 2010 (UTC)[reply]

Viruses

How do you tell if a program has a virus? --The High Fin Sperm Whale 03:59, 7 September 2010 (UTC)[reply]

Simple answer: someone else has identified it as a virus and a search of your computer reveals that common feature. Real answer: You have to define "virus" first, and then realize that any program that does something you don't want without you knowing it is a "virus" for all practical purposes. Is there a more practical application you're interested in? Shadowjams (talk) 06:11, 7 September 2010 (UTC)[reply]
(ec) Well, if files for an application are indeed infected (i. e. code is attached to files) then there are three possibilities. The original application will either not run at all (i. e. if the malicious code is appended to the main executable clumsily), it will hang or crash or break in the middle of an operation (if the virus code is appended to a different file which is not run at startup, or if the code only corrupted a portion of the file), or it will run as normal (because the malicious code is appended in such a way that it does not interrupt the operation of the original file). In most cases it will be the first, rarely the second, the third may take place also. Is this going in the direction you were thinking? Note that by now many 'viruses' (malware, etc.) are so large and intricate that they will be (sets of) standalone files rather than a kilobyte or two in size attaching itself to a file. Back in the day, viruses were small, small, small, with the most prevalent not exceeding a few kilobytes, and many l'art pour l'art viruses were under 100 bytes in length! Hope this helps. --Ouro (blah blah) 06:17, 7 September 2010 (UTC)[reply]
It depends on the type of virus. A virus as described above will add to the size of a file, sometimes a few hundred bytes, sometimes many thousands of bytes. There is also strange behavoir: programs crashing, things that used to work just not working any more (for example: a virus might disable access to the task manager), a flurry of unwanted results in an internet search, messages popping up, and so on. A macro virus will make your office document bigger.
However, all the recent virus/malware I've seen has come in separate programs that are started when the computer starts, either as a service or as a startup program configured in the registry like a regular program. Some malware makers think they are providing you with a genuine product (and market it such to their customers who pay them to place their ads on x thousand PCs), which creates an entry in the list of installed programs - just one you didn't want or know was being installed. You may nothing about it until a friend mentions that they got some spam or a virus in an email from you.
In all, it is a good idea to familiarise yourself with the normal operation of your computer, what programs and services start, the kind of noises (fan and disk) that it makes, and how it performs under various conditions. That makes it easier to spot times when it seems to be misbehaving or taking much longer to do something. Astronaut (talk) 11:57, 7 September 2010 (UTC)[reply]

Run a virus scanner Quadrupedaldiprotodont (talk) 13:59, 7 September 2010 (UTC)[reply]

I was more thinking of how to figure it out before you install a program. I want to install hugin.exe, but I want to know it's safe. Is there any way to tell without putting my computer at risk? --The High Fin Sperm Whale 16:31, 7 September 2010 (UTC)[reply]
From looking at the site and the fact that it has a Wikipedia article with no mention of malicious dangers, I'd say it is pretty safe. And most antivirus software will detect viruses (if there are any) during or even before an install, and take measures to ensure the safety of your computer. But if you're really worried, you could install the program inside a virtual machine such as VirtualBox, Windows Virtual PC or QEMU. So that if it did turn out to be a virus, only the virtual machine would be affected and you could simply close and delete it with no danger to your actual OS. 1230049-0012394-C (talk) 17:58, 7 September 2010 (UTC)[reply]
Assuming the virtual machine is configured correctly, of course. If it has internet connectivity, malware can still contact its botnet and start spamming. And if the VM has remembered network connections to its host that give it write access there.... Unilynx (talk) 18:09, 7 September 2010 (UTC)[reply]
I think you would be pretty safe downloading it from the official site. I did just that with the previous version and had no problems, I just scanned it for viruses after download using AVG (my virus scanner). The Hugin install program I used then is "Hugin_2009-4-0_win32_setup.exe" and is 20,393,805 bytes long. The MD5sum is 356535bfb5a2a7e13599378e837fa635 A newer version is now available. As a general rule, I'll always buy a disk or download from the official site, and never get programs from other sources like torrents. Hope that helps. Astronaut (talk) 09:31, 8 September 2010 (UTC)[reply]

Batch file question - how to find the newest document in a subdirectory structure

How can I find out which PDF file in a subdirectory structure full of PDFs is the newest file? dir *.pdf /s /b delivers a list of all pdfs in the subdirectory structure with full paths (which is what I want), but doesn't sort them by date. dir *.pdf /b /o-d does sort by date, but doesn't descend into subdirectories. Combining these two into dir *.pdf /s /b /o-d doesn't deliver the expected result - it sorts by date, but per directory, while I'm looking for the *one* newest file of all directories. To sum it up, what I have is:

c:\mypdfs\bar\new.pdf
c:\mypdfs\bar\newer.pdf
c:\mypdfs\foo\old.pdf
c:\mypdfs\foo\older.pdf
c:\mypdfs\ney\newest.pdf
c:\mypdfs\ney\oldest.pdf

What I want is

c:\mypdfs\ney\newest.pdf
c:\mypdfs\bar\newer.pdf
c:\mypdfs\bar\new.pdf
c:\mypdfs\foo\old.pdf
c:\mypdfs\foo\older.pdf
c:\mypdfs\ney\oldest.pdf

(actually I only need c:\mypdfs\ney\newest.pdf, I don't care if the rest shows up or not)

What dir *.pdf /s /b /o-d delivers is

c:\mypdfs\bar\newer.pdf
c:\mypdfs\bar\new.pdf
c:\mypdfs\foo\old.pdf
c:\mypdfs\foo\older.pdf
c:\mypdfs\ney\newest.pdf
c:\mypdfs\ney\oldest.pdf

The code only needs to run on W2K or newer, so in addition to the builtin batch cmds, the usual standard tools of these Windows versions are available. Any ideas? -- 78.43.71.155 (talk) 08:22, 7 September 2010 (UTC)[reply]

Use Windows explorer, search for *.pdf, sort by date modified? --86.148.22.79 (talk) 09:07, 7 September 2010 (UTC)[reply]
Windows explorer isn't exactly a batch file solution, or is it? ;-) -- 78.43.71.155 (talk) 10:22, 7 September 2010 (UTC)[reply]
Good point. I read the question but not the header. --Phil Holmes (talk) 11:01, 7 September 2010 (UTC)[reply]


This is not a complete solution, and is just a command line, not a batch file, but might be a start --
dir *.pdf | find /v "Directory of" | find /I "pdf" | sort /R
That will get you a full list sorted by date. In this case, the first line of the output is the newest file, with date and size information. Extracting just the file name from that single line is left as an exercise for the reader ;-) --LarryMac | Talk 12:55, 7 September 2010 (UTC)[reply]
Nope, that's not really helpful, either - as it doesn't descend into subdirectories. Sorting by date within a single directory is not a problem, that's what dir /o-d is for (the "-" doing what you achieved with "sort /r"). Also, matching for "Directory of" means it's not language-independent. -- 78.43.71.155 (talk) 13:17, 7 September 2010 (UTC)[reply]
I left off the /s on the dir command, but I assure you the proof of concept works; you might have at least given that a try. Language independence was not listed as a requirement, so if you're going to reject honest efforts to assist and change the requirements, then I'll stop right here. --LarryMac | Talk 13:23, 7 September 2010 (UTC)[reply]
Sorry to burst your bubble there, but I did try it, including the /s, before posting my comment, and it does not sort the way you claim. The newest pdf shows up at the fifth position from below. Thinking about it, this also has to do with the language issue - dates are in DD.MM.YYYY format here (and even if we were using MM/DD/YYYY, it probably gets messy once we have files from different years - a YYYY-MM-DD style display would help, but Windows doesn't offer that). Also, your solution doesn't provide the file including its full path (which is what I need and why I was using the example above). -- 78.43.71.155 (talk) 14:06, 7 September 2010 (UTC)[reply]
Here is the question you asked - "How can I find out which PDF file in a subdirectory structure full of PDFs is the newest file?". Registry settings can address the date format and collating sequence. When you ask strangers for help and you receive a good faith effort at providing that help, the common response is "thank you." I won't hold my breath. --LarryMac | Talk 00:55, 8 September 2010 (UTC)[reply]

Google translate default/detect language

I sometimes use Google translate but I find it annoying that it always defaults to Spanish -> English translation. Is there a way I can get it ti detect the input language automatically, or keep the last language used, perhaps in a cookie? And why does it default to Spanish anyway, it's not like it's the first in the list? Astronaut (talk) 11:31, 7 September 2010 (UTC)[reply]

Spanish is a popular language. And there is an auto detect feature, and it is set to default from my computer.Sir Stupidity (talk) 11:56, 7 September 2010 (UTC)[reply]
(e/c) It's more clever than it looks. If you frequently request translations from another language, your default will indeed eventually switch to that language, and a couple more languages may be moved to the top of the drop-down menu. I assume that it defaults to default to Spanish because it is the most frequently requested language on English-language Google.—Emil J. 12:00, 7 September 2010 (UTC)[reply]
(That is, unless you keep changing your IP and deleting your cookies to prevent Google from keeping track of you.—Emil J. 12:09, 7 September 2010 (UTC))[reply]
It sometimes retains/detcts the language if I use IE 8's Google translate accelerator, but otherwise the cookie is not working for me. Astronaut (talk) 13:30, 7 September 2010 (UTC)[reply]

Google

If google for some reason decided they wanted to shut down all of their services tomorrow (email, search, maps, etc)

  1. Would they legally be allowed to?
  2. What would be the impact on society? —Preceding unsigned comment added by Half charged (talkcontribs) 13:45, 7 September 2010 (UTC)[reply]
I really don't see anything that would legally prevent Google from shutting down all their services. They're still a privately-owned company, right? JIP | Talk 13:55, 7 September 2010 (UTC)[reply]
Google is now a publicly traded company (see History of Google#Financing and initial public offering), which means that they'd have to deal with shareholders if they wanted to liquidate. However, it also says that "The vast majority of Google's 271 million shares remained under Google's control", which presumably means that they could force a liquidation if push came to shove. Buddy431 (talk) 14:29, 7 September 2010 (UTC)[reply]
To explain Buddy431's comment about having to "deal with shareholders": The directors and, generally, the managers of any company (with more than one shareholder) have a fiduciary duty to maximize shareholder value. If the managers of Google were to shut down all their services tomorrow, and if the board of directors didn't immediately fire all the managers, install new ones, and get them to restart the services, many shareholders would immediately file a class-action lawsuit in order to kick out the directors and managers and get them to restart the services. This would take a while, of course. To directly answer the first question, it would not be illegal for Google to shut down all their services; no laws would be broken, unless maybe Google has entered into agreements with governments, and those governments have laws that forbid a shutdown. But a shutdown would not last long anyway, because of the fiduciary duty lawsuits — unless the directors and managers could show that it was in the best interest of the shareholders to shut down the services. If they could show that (and I do not think this is remotely possible), then, yes, they would even be immune to any fiduciary duty lawsuit. Comet Tuttle (talk) 16:57, 7 September 2010 (UTC)[reply]
Remember as well Google isn't simply a company providing free stuff as some people still think, but a massive company which deals with a large variety of people and companies on a commercial level with contracts and the like. These likely create responsibilities which would cause problems for them if they try to just 'shut down' their services. For example, they have a search deal with Yahoo in Japan and others use their search too, Youtube has a variety of deals with media companies, I'm pretty sure some mobile phone companies and networks have deals with Google for search, maps and of course the open source Android, many companies pay for Google Apps (and while it's not something I've looked in to I suspect the even the free edu variant does involve some sort of contract which Google can't just terminate willy-nilly), there are likely a variety of other support contracts and the like involved etc. And let's not forget the master of them all, Google's advertising business (i.e. all the advertisers). Of course there would likely be a variety of more direct creditors like banks and suppliers who won't be too happy either... Nil Einne (talk) 17:44, 7 September 2010 (UTC)[reply]

Did you guys forget about Google Analytics?Smallman12q (talk) 22:19, 7 September 2010 (UTC)[reply]

I don't see how Google Analytics changes anything. When you sign up for Google Analytics, Google doesn't tell you, "We warrant that Google Analytics will be available for you to use in perpetuity." Comet Tuttle (talk) 23:29, 7 September 2010 (UTC)[reply]
The section Service Levels in their TOS states that:

Google does not guarantee the Service will be operable at all times or during any down time (1) caused by outages to any public Internet backbones, networks or servers, (2) caused by any failures of Your equipment, systems or local access services, (3) for previously scheduled maintenance or (4) relating to events beyond Google's (or its wholly owned subsidiaries') control such as strikes, riots, insurrection, fires, floods, explosions, war, governmental action, labor conditions, earthquakes, natural disasters, or interruptions in Internet services to an area where Google (or its wholly owned subsidiaries) or Your servers are located or co-located.

Shutting down their services is not beyond their control. (On a side note, its interesting to see they account for riots, and insurrection).Smallman12q (talk) 00:10, 8 September 2010 (UTC)[reply]
I believe that interpreting a license for you is getting close to offering legal advice, which we do not do at the Reference Desk, but I would urge you to re-read the terms of service, especially the all-caps section about warranties, and pay close attention to where, exactly, you think Google makes any affirmative guarantee at all about the availability of Google Analytics. Comet Tuttle (talk) 04:14, 8 September 2010 (UTC)[reply]

Web

Explain this http://cache.cache.cache.cache.cache.cache.cache.cache.cache.cache.cache.cache.cache.cache.cache.cache.cache.cache.cache.cache.cache.cache.click.down2crazy.com/ 86.72.16.66 (talk) 16:30, 7 September 2010 (UTC)[reply]

See subdomain. Comet Tuttle (talk) 17:00, 7 September 2010 (UTC)[reply]

Frustrating ADSL problem

This has been bugging me for 4 months and I've tried loads of different ways to fix the problem with no avail. Problem is that my ADSL modem keeps disconnectiong (randomly and intermittently) during which the DSL light flashes, then DSL and Internet lights go off, then after some random amount of time the DSL light flashes then the modem connects to the internet again. While the DSL light is flashing, the DSL status on the modem software says 'synchronising'. DS and US line attenuation before and during the problem is typically in the low 30's and my telco guy says he only gets worried above 50. So, I've called the telco people multiple times; they checked the exchange, resynched my line from the exchange, replaced the line from the repeater to my house, and checked line noise many times. I've tried 4 different ISP's to no avail. I've also tried two brands of modems, including a swap-out of the current modem (duoPlus 300WR). I suspect something is triggering the modem to disconnect and 'synchronise the line' - any gurus out there know how to stop this trigger? Any other ideas? Sandman30s (talk) 20:17, 7 September 2010 (UTC)[reply]

How about your network card? Are it's drivers fully updated?Sir Stupidity (talk) 00:54, 8 September 2010 (UTC)[reply]
It's Windows 7 so it should be, but I will check thanks Sandman30s (talk) 11:00, 8 September 2010 (UTC)[reply]
Perhaps the problem is the power feed - either noise on the line, a loose connection in the circuit, or some other form of unstable power. A major appliance − refrigerator, air conditioner, or even a hairdryer − might cause a momentary power drop that is causing the modem to reset. A noisy power source might also generate interfere in the DSL signal. If you can borrow one, try installing a UPS for the modem, which may serve as a power conditioner, to see if this improved things. Alternately, you can try a long extension cord to power the modem from another room (another circuit) in your house. -- Tom N (tcncv) talk/contrib 04:01, 8 September 2010 (UTC)[reply]
It's already connected to a UPS (PC on one circuit and modem on other circuit). This was done even before I had the problem. The modem does not go OFF; it merely disconnects on the line and keeps synchronising. Sandman30s (talk) 11:00, 8 September 2010 (UTC)[reply]

help

i have ubuntu and win7 installed on my laptop. windows won't boot, and the only os boot option is GRUB. i installed ubuntu because windows gave me <missing operating system> and i know why.

so tl;dr how do i fix my MBR from ubuntu?

/and i can't use CDs —Preceding unsigned comment added by Boodalu (talkcontribs) 22:47, 7 September 2010 (UTC)[reply]

September 8

What is a GeekTool script?

Does this compound word mean anything other than "desktop theme" for a Mac computer? 76.27.175.80 (talk) 00:23, 8 September 2010 (UTC)[reply]

No, it's not a desktop theme. GeekTool[8] is a single program that can display the output of various Unix commands or shell scripts on the desktop. GeekTool scripts are often used as part of a theme, however. If you click the "Screenshots" link on that GeekTool page I linked, you can see some examples. Just about all of the text you see in those images was generated with GeekTool. 173.66.149.81 (talk) 11:18, 8 September 2010 (UTC)[reply]

Trillian AIM connection issues

Ever since the mandatory upgrade for Trillians AIM users a few days ago my AIM account has been connecting and disconnecting every 20-30 minutes for 5 minutes at a time. Ive updraged to the 2 newest versions of trillian and the problem persisted. I know it cant be an ISP Connection issue because I can continue to load pages and download files while the AIM account is disconnected. Does anyone know what could be causing this?

Thanks for the help.

--71.98.66.6 (talk) 03:38, 8 September 2010 (UTC)[reply]

WORD FINDER

Is there a software to display the words beginning or ending with the same spelling? E.g. 1). If I enter *cide (Wild card character), it should display all words ending with cide such as suicide, patricide, infanticide and so on. 2). If I enter *tw* , it should display all words contain tw such as twin, between, twice, twig, twine, two and so on. Thank you. —Preceding unsigned comment added by 124.43.25.100 (talk) 07:00, 8 September 2010 (UTC)[reply]

Where do you want that software to find those words? In your browswer window What browser?or in a specific application What application?or ...? Or were you looking for a site like this one http://www.findtheword.info/resultat.php?stype=ends&sword=NECK

99.11.160.111 (talk) 07:10, 8 September 2010 (UTC)[reply]

grep, although you will have to write regexps. So your "*tw*" would be just "tw", and your "*cide" would be "cide\W". Also grep reports the line(s) in which the match was found. If you work in word or similar, then you will have to save as pure text. Taemyr (talk) 07:14, 8 September 2010 (UTC)[reply]

Easy computer game development software

I'm looking for information or links on computer game development software that is easy to use/learn and preferably very affordable. Think chicken sandwich budget, rather than company account.I have used the "Construction Set" that Bethesda Softworksprovided with the "Elder Scrolls" package. I've had a look at an old version of Gamestudio. But I have no clue whether that would be a good thing to start with. I'm basically looking for something that doesn't require ages to learn or advanced languages like C++ but offers a way to design figures running around, doing tasks and having some kind of conversation/speech bubble abilites. It should work on standard platforms and not use oodles of resources. Both me and my teenage nephew would be using it. Ultimately I'm trying to develop a language teaching game, but this could just serve as a first stage in that project. (My last programming experience is Assembler, so I basically don't know diddly about what the new stuff does and can do.) Hope this question doesn't break any rules and someone can point me in the right direction of where to look and what to look for. 99.11.160.111 (talk) 07:04, 8 September 2010 (UTC)[reply]

Depending on the genre, there is the Adventure Game Studio, which requires a little bit of scripting, but not very much. There are other such things in Category:Video_game_creation_software, but I don't know any of them very well other than AGS. --Mr.98 (talk) 12:41, 8 September 2010 (UTC)[reply]

Test case

I got a job recently and am now still an apprentice. My company's recent project is a C++ one. Switching from Java to C++ is not a too difficult task because they resemble in many ways, and sometimes I even think Java is a subset of C++. But after 2 weeks, when I'm quite familiar with C++ syntax, my chief manager has a new, special (if it is another word for "terrible") task for me -- writing a test case. He always makes me full of surprises. 2 weeks ago he told me that the project is written in C++ and I have to study C++ from the beginning. And now my burden grows heavier with a "special" task, just 'cause none can do it (my company has no tester). I ask him how, he said "study it yourself".

I don't even know what in the world is a test case. I was trained to be a developer, not a tester. I wonder if there's any IT school that teaches students how to test software -- at least not mine. But up to now, I haven't contributed anything to my company's project. Beeing a newbie, I suppose I don't have much of a choice. I need a step-to-step guide 'bout the so-called test case. A six hundred page tutorial just like the C++ tutorial would be very nice, even if it will take me onother 2 week studying. Thanks in advanced. -- Livy the pixie (talk) 09:56, 8 September 2010 (UTC)[reply]

Start at Test case and follow the external link. (I hope more help arrives soon. In my experience, programs and more especially modules should always be specified with relation to test cases, and ideally should always have a complementary test harness written for them. And that is all language independent advice: it does not matter if you're in C++ or Java or any other languages.) --Tagishsimon (talk) 11:23, 8 September 2010 (UTC)[reply]

How do you find out what search terms were used to find your blog?

I've seen people posting about weird search terms used to find their blog; but how do you find out what those search terms are? 165.91.175.24 (talk) 10:07, 8 September 2010 (UTC)[reply]

I use WordPress.com and the dashboard shows you search terms used. I expect other blogging platforms do the same thing Some of the search terms are very weird! -- Q Chris (talk) 10:16, 8 September 2010 (UTC)[reply]
By looking at the HTTP referrer. When somebody requests (visits) a page, part of the information sent is the URL of the previous page (if any) containing the link they clicked on to get there. If the link was in a search engine, the URL usually contains the search terms. 81.131.51.78 (talk) 10:21, 8 September 2010 (UTC)[reply]
You need to install something like Google Analytics if you don't already have it in place. Once you have it running (and have accumulated some data), log in to Analytics, go to Traffic Sources > Keywords. --Mr.98 (talk) 11:47, 8 September 2010 (UTC)[reply]

diffing with text motion

There's lots of code around to diff two files, by finding the shortest (or near shortest) sequence of insertions and deletions that turns the first file into the second. Trouble is this doesn't notice moves, i.e. I edit a wikipedia article by swapping the locations of two paragraphs. I haven't inserted or deleted anything, just moved stuff, but diff shows it as an insertion and a removal.

Are there good algorithms (and preferably existing libraries) that notice moves as moves? Thanks.

75.57.241.73 (talk) 11:08, 8 September 2010 (UTC)[reply]

You are referring to blocks of text, but the algorithm is the same for character-by-character editing. Levenshtein distance is what you are describing. It considers insertions, deletions, and substitutions (an insert on top of a delete). Damerau–Levenshtein distance expands on this by adding the transposition of two neighboring characters. The problem with Damerau-Levenshtein distance is that it is a "restricted" edit distance. You are asking for an "unrestricted" edit distance. Right now, there is no standard algorithm for unrestricted Damerau-Levenshtein distance, even though it has been studied by a lot of researchers for well over 40 years. My best suggestion (other than telling you be the first to make a good algorithm) is to search for "unrestricted damerau levenshtein" and see if any of the algorithms in the papers you find will satisfy your needs. -- kainaw 12:25, 8 September 2010 (UTC)[reply]
Thanks. I'll look for papers but expect them to be complicated. For my purposes I can probably concoct something ad-hoc and approximate that's good enough. 75.57.241.73 (talk) 12:58, 8 September 2010 (UTC)[reply]

TLDs favouritised by google

Layman question alert: Is it just me or are the more popular TLDs such as .com .net etc favouritised by search machines such as google and the like. I askbecause more often than not .com pages are shown first in the results. Would this be the case even if say a .biz or .tt site´s content matched my search criteria more exactly. If so is there a list of precedent for TLDs? I hope you get what I´m trying to put across... Thanks —Preceding unsigned comment added by 93.195.24.181 (talk) 11:55, 8 September 2010 (UTC)[reply]

In some cases there are places where the weirder subdomains come out on top — see, e.g., URL shortener. --Mr.98 (talk) 12:28, 8 September 2010 (UTC)[reply]