Летопись МИФИ

Истории, рассказанные нафиг


ЕГЭ-2024
Тесты ЕГЭ Онлайн
Задачи ЕГЭ по математике
Решения ЕГЭ по математике

Вступительные экзамены и специальности
Фишки для Корума:
Рейтинг пользователей Корума
Настроение • Модераторы
Темы • Картина дня • Realtime
Прочие фишки:
Нецензурная брань
Народная орфография
Морзянка онлайн • Калькулятор
Анаграммы • Игра в города

Загрузка календаря

Новые записи

20.05Задача про фермера и его кредит
26.01Актуализация сервисов ЕГЭ по математике 2014 года
05.11Поломалось
28.08Смена парадигмы
18.07Как вести себя в приличном обществе, предварительно обмочив штаны
оглавление »

Лучшие записи

1.Математическое порно1563
2.Ответы ко всем задачам ЕГЭ по математике 2010 года793
3.Тесты ЕГЭ Онлайн515
4.Результаты ЕГЭ по математике368
5.Результаты ЕГЭ по русскому языку268

О чем тут?

NX VBAB Webometrics igjhs А1-08 Абитуриенты Бачинский ВКонтакте Ващенифтему Волга Диплом Дрессировка преподов Дума ЕГЭ Жизнь Забабахал Инновации История Кафедра 26 Кларк Корум Лженаука МИФИ МИФИсты Морзянка НИЯУ Нанотехнологии Наука Образование Омоймоск ПЦ Поздравляю Поиск Президент Преподы Приколы Программное обеспечение Рейтинги Русский язык Сессия Смерть Статистика Стихи Сувениринг Тест Учеба Учебные материалы ФЯУ Физтех Фотки Ядерщики матанализ

Комментарии

День памяти
  20 мая 2023 (мифи умер)

Задача про фермера и его кредит
  20 мая 2023 (Алекс)

Математическое порно
  22 марта 2023 (Angleton)

Российский Союз ректоров
  19 февраля 2023 (Hellen Paul )

В помощь юному радисту: Морзянка 1.0
  13 ноября 2022 (Сергей)

Знахари и шаманы в МГТУ имени Баумана
  5 ноября 2021 (монах из кельи)

Зачет по инженерной графике
  24 августа 2020 (Инженерная графика)

Пасынки Вселенной
  18 февраля 2020 (Max Brown)

Финансовая пирамида за 10 рублей
  7 февраля 2020 (Флора Миллс)

База решений задач ЕГЭ по математике
  26 декабря 2019 (Мария)

$kib@t®onЪ
Сейчас на скибатроне
Шедевры
Я ищу слово,  «» 

а б в г д е ё ж з и й к л м н о п р с т у ф х ц ч ш щ ъ ы ь э ю я
a b c d e f g h i j k l m n o p q r s t u v w x y z

Слово «warning»
впервые сказано пользователем Fanya 02.05.2005 в 23:33,
и с тех пор употреблялось 64 раза.
СообщенияПользователиПользователи (top10)

Сообщения со словом
«warning»

Запрос выполнился за 0.0092 сек.
  1. 08.03.2014, 05:39. hekot в теме
    «Куда бы статью про уровень doom в мифи впихнуть?»
    ... сложно имеется в виду конечно kill 100 skill 4 без save warning все коды в дууме мастдай давить плииз не используйте...
  2. 25.10.2012, 22:48. SiO2 в теме
    «Ассоциации»
    warning
  3. 18.03.2012, 01:11. Grey19 в теме
    «Бардак с отчислением»
    ... привести небезызвестную докторшу наук с 22 кафедры warning вышесказанное не является оправданием для забивания...
  4. 09.10.2011, 01:37. jiffy в теме
    «The C Programming Language.»
    ... things easier to read and have the added benefit of warning you when you re nesting your functions too deep heed that warning табуляция должна быть 8 символов и таким образом...
  5. 08.09.2011, 22:25. serzh в теме
    «Мифический чат. Логи»
    ... droid1activity 2011-09-08 22 19 32 droid1 activitymanager warning activity not started because the current activity...
  6. 12.06.2011, 01:22. Grey19 в теме
    «О числе Пи.»
    ... на youtube прикольное посвящённые данному вопросу warning и то и другое на английском автор текста на...
  7. 24.12.2010, 17:37. eugns в теме
    «На ноль делим?»
    warning division by zero in var www corumtest mephist...
  8. 23.11.2010, 01:54. Ramzes в теме
    «Проект Wiki: Энциклопедия МИФИ»
    что-то ничего не работает warning require once var www corumtest mephist ru htdocs...
  9. 11.11.2010, 01:06. Chameleon в теме
    «Maxima на Corum'е»
    ... from x -pi 2 to pi 2 mathematica 4 1 gives with no warnings 2 log 4 2 log cos pi 8 2 log sin pi 8 which n evalutates numerically to give 1 00984 maxima 5 6 returns the integral unevaluated the commercial macsyma says the integral is divergent and maple 7 says infinity cite maxima email list here had the person who wished to learn the result blindly trusted most of the systems in question he might have been misled so remember to think about the results you are given the computer is not always necessarily right and even if it gives a correct answer that answer is not necessarily complete a brief history of macsyma the birthplace of macsyma where much of the original coding took place was project mac at mit in the late 1960s and earlier 1970s projectmac was an mit research unit which was folded into the current laboratory for computer science research support for macsyma included the advanced research projects agency arpa department of defense the us department of energy and other government and private sources the original idea first voiced by marvin minsky was to automate the kinds of manipulations done by mathematicians as a step toward understanding the power of computers to exhibit a kind of intelligent behavior the undertaking grew out of a previous effort at mitre corp called mathlab work of carl engelman and others plus the mit thesis work of joel moses on symbolic integration and the mit thesis work of william a martin the new effort was dubbed macsyma project mac s symbolic manipulator the original core design was done in july 1968 and coding began in july 1969 this was long before the days of personal computers and cheap memory initial development was centered around a single computer shared with the artificial intelligence laboratory a dec pdp-6 this was replaced by newer more powerful machines over the years and eventually the mathlab group acquired its own dec-pdp-10 mit-ml running the its operating system this machine became a host on the early arpanet predecessor to the internet which helped it gain a wider audience as the effort grew in scope and ability the general interest it created led to attempts to port the code that is to take the series of instructions which had been written for one machine and operating system and adapt them to run on another different system the earliest such effort was the running of macsyma in a maclisp environment on a ge honeywell multics mainframe another system at mit the multics environment provided essentially unlimited address space but for various reasons the system was not favored by programmers and the multics implementation was never popular the next effort came about when a group at mit designed and implemented a machine which was based on the notion that hardware support of lisp would make it possible to overcome problems that inhibited the solution of many interesting problems the lisp machine clearly had to support macsyma the largest lisp program of the day and the effort paid off with probably the best environment for macsyma to date although requiring something of an expert perspective lisp machines as well as other special purpose hardware tended to become slow and expensive compared to off-the-shelf machines built around merchant-semiconductor cpus and so the two companies that were spun off from mit symbolics inc and lmi both eventually disappeared texas instruments built a machine called the explorer bases on the lmi design but also stopped production around 1980 the idea of porting macsyma began to be more interesting and the unix based vaxima distribution which ran on a lisp system built at the university of california at berkeley for vax unix demonstrated that it was both possible and practical to run the software on less expensive systems this system franz lisp was implemented primarily in lisp with some parts written in c once the code stabilized the new version opened up porting possibilities ultimately producing at least six variations on the theme which included macsyma maxima paramax paramacs punimax aljbar and vaxima these have followed somewhat different paths and most were destined to fade into the sunset the two which survived obscurity maxima and macsyma we will discuss below punimax was actually an offshoot of maxima some time around 1994 bruno haible author of clisp ported maxima to clisp due to the legal concerns of richard petti then the owner of the commercial macsyma the name was changed to punimax it has not seen much activity since the initial port and although it is still available the ability of the main maxima distribution to compile on clisp makes further development of punimax unlikely there is a certain surprising aspect in this multiplicity of versions and platforms given how the code seemed tied to the development environment which included a unique operating system fortunately berkeley s building a replica of the maclisp environment on the mit-ml pdp-10 using tools available in almost any unix c environment helped solve this problem complicating the matter was the eventual demise of the pdp-10 and maclisp systems as common lisp resembling lisp-machine lisp influenced by bbn lisp and researchers at stanford carnegie mellon university and xerox began to take hold it seemed sensible to re-target the code to make it compatible with what eventually became the ansi common lisp standard since almost everything needed for for macsyma can be done in ansi cl the trend toward standardization made many things simpler there are a few places where the language is not standardized in particular connecting to modules written in other languages but much of the power of the system can be expressed within ansi cl it is a trend the maxima project is planning to carry on to maintain and expand on this flexibility which has emerged with all these versions in recent history there are two which have been major players due this time more to economics than to code quality 1982 was a watershed year in many respects for macsyma it marks clearly the branching of macsyma into two distinct products and ultimately gave rise to the events which have made maxima both possible and desirable mit had decided with the gradual spread of computers throughout the academic world to put macsyma on the market commercially using as a marketing partner the firm of arthur d little inc this version was sold to the symbolics inc which depending on your perspective either turned the project into a significant marketing effort to help sell their high-priced lisp machines or was a diversionary tactic to deny their competitors lmi this program at the same time mit forced uc berkeley richard fateman to withdraw the copies from about 50 sites of the vax unix and vax vms versions of macsyma that he had distributed with mit s consent until some agreement could be reached for technology transfer symbolics hired some of the mit staff to work at symbolics in order to improve the code which was now proprietary the mit-ml pdp-10 also went off the arpanet in 1983 interestingly the closing of the mit lisp and macsyma efforts was a key reason richard stallman decided to form the free software foundation between the high prices closed source code and neglecting all platforms in favor of lisp machines pressure came to bear on mit to release another version to accommodate these needs which they did with some reluctance the new version was distributed via the national energy software center and called doe macsyma it had been re-coded in a dialect of lisp written for the vax at mit called nil there was never a complete implementation at about the same time a vax unix version vaxima was put into the same library by berkeley this ran on any of hundreds of machines running the berkeley version of vax unix and through a unix simulator on vms on any vax system the doe versions formed the basis of the subsequent non-symbolics distributions the code was made available through the national energy software center which in its attempt to recoup its costs charged a significant fee 1-2k it provided full source but in a concession to mit did not allow redistribution this prohibition seems to have been disregarded and especially so since nesc disappeared perhaps it didn t recoup its costs among all the new activity centered around doe macsyma prof william schelter began maintaining a version of the code at ut austin calling his variation maxima he refreshed the nesc version with a common-lisp compatible code version there were from the earliest days other computer algebra systems including reduce camal mathlab-68 pm and altran more serious competition however did not arrive until maple and mathematica were released maple in 1985 cite list of dates and mathematica in 1988 cite wolfram website these systems were inspired by macsyma in terms of their capabilities but they proved to be much better at the challenge of building mind-share doemacsyma because of the nature of its users and maintainers never responded to this challenge symbolics successor macsyma inc having lost market share and unable to meet its expenses was sold in the summer of 1999 after attempts to find endowment and academic buyers failed cite richard petti usenet post the purchaser withdrew macsyma from the market and the developers and maintainers of that system dispersed mathematica and maple appeared to have vanquished macsyma it was at this point maxima re-entered the game although it was not widely known in the general academic public w schelter had been maintaining and extending his copy of the code ever since 1982 he had decided to see what he could do about distributing it more widely he attempted to contact the nesc to request permission to distribute derivative works the duties of the nesc had been assumed in 1991 by the energy science and technology software center which granted him virtually unlimited license to make and distribute derivative works with some minor export related caveats it was a significant breakthrough while schelter s code had been available for downloading for years this activity became legal with the release from doe granted in oct 1998 and maxima began to attract more attention when the macsyma company abruptly vanished in 1999 with no warning or explanation it left their customer base...
  10. 19.10.2010, 02:42. ln(x) в теме
    «Линукс и мелкомягкие»
    ... eq diff diff target old chomp diff if diff ne print warning new not installed n print target does not match old n return undef ln -sf new target print installed new as target n return addchaporpap interactive prompts for parameters and adds a chap or pap secret sub addchaporpap my secret type 0 print add a new secret type secret note any backslashes must be doubled local name this is the local identifier for secret type authentication note if the server is a windows nt machine the local name should be your windows nt username including domain for example domain username my local queryuser local name undef print remote name this is the remote identifier for secret type authentication in most cases this can be left as the default it must be set if you have multiple secret type secrets with the same local name and different passwords just press enter to keep the default my remote queryuser remote name pptp print password this is the password or secret type secret for the account specified the password will not be echoed get the password without echoing stty -echo my pass queryuser password undef stty echo my secrets file if secret type eq chap secrets file chap secrets elsif secret type eq pap secrets file pap secrets else die wrong secret type open secrets file secrets file or die couldn t open secrets file print nadding secret local remote password n n print secrets file local t remote t pass t n print secrets file remote t local t pass n close secrets file or die couldn t close secrets file chmod 0600 secrets file addchaporpap addpptp interactive add a new pptp tunnel configuration sub addpptp my name ip local remote print nadd a new pptp tunnel n n my configs keys pptp servers my choice bselect which configuration would you like to use configs other my routes if choice configs 1 while 1 name queryuser tunnel name undef per man perlsec check for special characters if name w name 1 last print name contains special characters n print please use only alphanumerics and n ip queryuser server ip undef print what route s would you like to add when the tunnel comes up n print this is usually a route to your internal network behind the pptp server n print you can use substitution keywords as in etc pptp d config file n print tunnel dev is the tunnel interface n print def gw is the existing default gateway n print iplocal is the local ip address n print ipremote is the remote ip address n print the syntax to use is the same as the route 8 command n print enter a blank line to stop n while 1 my route queryuser route undef last unless defined route last if route eq if route unsafe re o print route contains unsafe characters discarded n next push routes route else name configs choice-1 ip pptp servers configs choice-1 ip routes pptp servers configs choice-1 routes print local name and remote name should match a configured chap or pap secret local name is probably your nt domain username note any backslashes must be doubled local queryuser local name undef remote queryuser remote name pptp print adding name ip local remote n addtunnel name ip local remote routes sub configureresolv if yesno use a pptp-specific resolv conf during tunnel connections if -f resolv pptp print resolv pptp exists n if yesno do you want to use the existing resolv pptp print renaming resolv pptp resolv pptp orig n rename resolv pptp resolv pptp orig or die couldn t rename resolv pptp if -f resolv pptp my configs keys dns servers my choice bselect which configuration do you want to use configs other my addresses search if choice configs 1 print what domain names do you want to search for partially n specified names n print enter all of them on one line seperated by spaces n search queryuser domain names undef print enter the ip addresses of your nameservers n print enter a blank ip address to stop n while 1 my address queryuser nameserver ip address undef last unless defined address last if address eq push addresses address else search dns servers configs choice-1 search list addresses dns servers configs choice-1 ip list open pptp resolv pptp or die couldn t open resolv pptp for writing print pptp search search n foreach my a addresses print pptp nameserver a n close pptp or die couldn t close resolv pptp if -f resolv real my diff diff resolv resolv real chomp diff if diff ne print resolv real exists n print copying it to resolv real orig n unlink resolv real orig rename resolv real resolv real orig breaksymlink resolv print copying resolv to resolv real n cp -f resolv resolv real print creating link from resolv real to resolv n ln -sf resolv real resolv else they choose not to twiddle etc resolv conf breaksymlink resolv if -f resolv pptp print resolv pptp exists n if yesno do you want to delete etc resolv conf pptp unlink resolv pptp print resolv pptp deleted n else print you have chosen not to delete resolv pptp n this existing resolv pptp may still be used n when tunnel connections are established if you n really don t want it to be used you should n rename or remove it n if -f resolv real my diff diff resolv resolv real chomp diff if diff eq print resolv is identical to resolv real n if yesno do you want to delete resolv real unlink resolv real print resolv real deleted n else print resolv and resolv real both exist n but are not the same you should decide which n one is correct and make sure that file is named n resolv n getchaporpap this returns all the chap or pap secrets with ed out the paswords sub getchaporpap my secret type 0 my secrets file if secret type eq chap secrets file chap secrets elsif secret type eq pap secrets file pap secrets else die wrong sercet type if -f secrets file my list cat secrets file foreach my secret list secret s s s s 1 n unless secret s return list else return undef managesecrets this manages secret files sub managesecrets my secret type 0 while 1 my manage task bselect list secret type secrets add a new secret type secret delete a secret type secret quit if manage task eq 1 print current secret type secrets n my list getchaporpap secret type if list print list else print none n elsif manage task eq 2 addchaporpap secret type elsif manage task eq 3 my list my secrets file if secret type eq chap secrets file chap secrets elsif secret type eq pap secrets file pap secrets else die wrong secret type list getchaporpap secret type if list print select one of the pair of lines that you want removed n print both matching lines will be deleted n my choice bselect remove which secret type secret list none choice-- if choice list print aborted deleting a secret type secret n next else stty -echo my passwd queryuser enter the password for this secret type secret undef stty echo my secrets cat secrets file open secrets file secrets file or die couldn t open secrets file for writing my local remote undef split s list choice my count 0 foreach my c secrets my c local c remote c secret undef split s c if c secret eq passwd c local eq local c remote eq remote c local eq remote c remote eq local count next else print secrets file c close secrets file or die couldn t close secrets file after writing print ndeleted count entries print perhaps you mistyped the password if count 0 print n elsif manage task eq 4 manage task eq q last else next setup this is the part that does the old pptp-setup work first the site-specific config files sub setup my name search list ip list ip configs foreach my f ls pptpdir if f safe re o print name your files something reasonable f doesn t qualify n next f 1 open config pptpdir f or next silently fail here configs config close config chomp f for my i 0 i configs i configs i s o if configs i s chomp configs i if configs i eq nameservers until i configs name search list ip list split configs i name f name dns servers name search list search list dns servers name ip list split ip list else name ip split configs i name f name pptp servers name ip ip pptp servers name routes until configs i eq n chomp configs i if configs i unsafe re o print warning the line n configs i n contains unsafe characters...

← раньше

позже →


Рейтинг блогов



 

откуда • куда • где • eureka!
Бездарно потраченное время:
105826 дней