fasttext_score
float32
0.02
1
id
stringlengths
47
47
language
stringclasses
1 value
language_score
float32
0.65
1
text
stringlengths
49
665k
url
stringlengths
13
2.09k
nemo_id
stringlengths
18
18
0.922798
<urn:uuid:beb78fb2-87d7-4508-a9a2-c100c833616c>
en
0.933271
A Rhyming World Tour Answer: North Carolina and South Dakota, rearrange to South Carolina and North Dakota Winner: William Horton from Hutchinson, Kan. Challenge for April 8: Take the phrase "saturated fat," which contains the letter pair "AT" three times, and think of another familiar two-word phrase, this time containing the lettered pair "SE" three times. Drop the "SE's" every time they appear and the remaining letters, in order, reading left to right, will name part of a car. What is it? Support comes from:
http://www.npr.org/templates/story/story.php?storyId=9455321
dclm-gs1-167930000
0.034948
<urn:uuid:8004599d-5e5e-459a-86fa-6e91aa921b17>
en
0.952939
Find better matches with our advanced matching system —% Match —% Friend —% Enemy 31 / M / Straight / Single Austin, TX My Details Last Online Online now! 5′ 11″ (1.80m) Body Type Agnosticism, but not too serious about it Virgo, but it doesn’t matter Graduated from masters program Relationship Type Doesn’t have kids, but might want them Has dogs and likes cats English (Fluently) Similar Users My self-summary I'm the type of person: who wants to pet every dog he sees and tries to makes strange kids laugh at restaurants; who tends to fall asleep during movies but likes to marathon a TV show on Netflix; who likes watching sports but never needs to watch a game; who loves a good story; who would be okay living without my cellphone; who resents situations that require me to wear something dressier than Converse and jeans; who hums the last song I heard at the grocery store and will pause a conversation to appreciate a song I love on the radio. My mom thinks I'm a catch. What I’m doing with my life Full disclosure: I know I should try to make myself sound as exciting as possible, but I value honesty over marketing. Instead, I actively seek to live a simple, peaceful life. Two-thirds of the week I'm comfortably a homebody. I work hard teaching and learning all day, and then come home to cook, walk the dogs, listen to some NPR and read on the patio, drink in hand. The other part of the week I am looking for something more Austiny and exciting to do: a concert, movie at the drafthouse, brewery tours, road trips, etc. I've recently taken up trail running, and run a few times a week. Also, I try to do yoga a few times a week. I mostly work out so that I can guiltlessly continue enjoying beer and pizza. I will stop whatever I am doing to play a board game. My dog now has her own dog, and I'm trying to get him acclimated to our life. Most of our relationship is me cleaning up his urine and him trying to bite my things. Recently he ate a lamp. For real. I’m really good at useless trivia (is that redundant?) seeing the positive in a situation waking up on-time, even when I forget to set the alarm espirit d'escalier- when you think of the perfect thing to say, not when I could use it, but as I am walking away (isn't that just an amazing phrase!) getting along with dogs and children Muggle quidditch...that's right The first things people usually notice about me I get the "You remind me of (insert the name of any dark-haired actor/ musician)". Most frequently I get Jack White, John Mayer, or any Johnny Depp character depending on how long my hair is. Hearing this makes me want to shave my head. Favorite books, movies, shows, music, and food I read. A lot. You should too. It's kinda important. Mostly fiction and the New Yorker, which I've given up staying current with. Currently working my way through Anna Karenina. Update: Finished AK but keeping it here to brag. It's as good as they say. Movies- I've always wanted someone to go with me to the showings of classic films at the Paramount. If I'm honest, I admit I fall asleep through more movies than I make it all the way through. Shows- I don't have cable, but I like watching shows on Netflix. Currently watching How I Met Your Mother. Sometimes I feel a lot like Ted. Update: Finished HIMYM. Now watching Dexter. Music - I could happily talk music for hours and it is the easiest way to make me swoon. I've recently decided I want the music of Iron and Wine to be the soundtrack of my life; not that Sam Beam is my favorite artist, but that sort of sweet, simplicity feels like the pace I want to live. Also, every band should have a horn section. Usually I'm just listening to NPR. I especially heart Twine time. Food - If it wouldn't kill me, everyday I would eat breakfast tacos and coffee for breakfast, pizza and beer for lunch, and sushi or some other delicious Asian food for dinner. How about a smoothie for a midday snack to ward off scurvy. Actually I try to eat pretty healthy and like to cook when I can. Spicy is good; I like my food to try to fight back. The six things I could never do without The numbers 1-6. Without them I would never be able to count to 7. I spend a lot of time thinking about How I could be a better me. Then I decide that's too much work and read a book instead. On a typical Friday night I am I don't know. What do you want to do? Let's do that. The most private thing I’m willing to admit One time a student said something along the lines of "the characters do do that" and I giggled. Doo-doo... Also, I can't hear "duty" without smirking. Since I know you will be looking, I will likely be wearing converse or Toms if we ever meet. I've proudly never take a "selfie". Also, I find it sad when someone refuses to admit something here because it's too private. It's not admit your deepest, darkest secret; it's what will you admit comfortably. Don't waste an opportunity to be interesting! I’m looking for • Girls who like guys • Ages 24–35 • Near me • Who are single You should message me if You appreciate the Toyota Camry. Like the Camry, I might not be the flashiest car on the road but we still look classy enough, we're dependable and your friends and family will applaud you for your sensibility. We pay off in the long-run. It's kind of important that you like coffee, red wine, and know something about music. You want to see Arcade Fire. I have an extra ticket! I like smart, independent, quirky women. Someone adorkable.
http://www.okcupid.com/profile/bonzo1801?cf=profile_similar
dclm-gs1-167970000
0.158024
<urn:uuid:2bd6a0eb-29eb-4df4-b3a9-ed1a8af59d41>
en
0.953762
Your Pandora One subscription will expire shortly. Change Skin It’s a new kind of radio – stations that play only music you like Create an account for free. Register Now Playing Music Feed My Profile Create a Station People who also like this John Mayall full bio Selected Discography a good blues standard played live Outright one of the best Woulda loved to have been at that Birthday Concert!!! Did for white people what Gangham Style did for Koreans. Very Impressed karmacreatio n s gdonofrio195 3 The most underrated blues player ever!! taught me how to how to play the blues harp d.e.blakesle e 2 You gotta love these blues. I remember. :) marilynlewis . m l Clapton may have the chops, but Mayall has the soul Look for the album "Blues Alone," from maybe 1967 New Band, man. Grits ain't groceries great tune Marcia's Mood, one of my favorites. A master, in the same vein as Robert Johnson. awesome im a lifelong fan Show more Please check our Help page for more information. [107, 125, 127, 84, 67, 77, 114, 93, 87, 110, 122, 75, 91, 72, 83, 95, 127, 100, 125, 101, 109, 107, 124, 79, 68, 65, 112, 112, 97, 91, 106, 68, 93, 83, 106, 99, 113, 102, 75, 85, 105, 109, 103, 105, 102, 88, 82, 104, 79, 103, 106, 110, 94, 105, 111, 127, 106, 113, 94, 68, 71, 81, 69, 65, 80, 105, 90, 113, 87, 76, 94, 71, 89, 124, 91, 83, 116, 100, 111, 99, 80, 114, 69, 81, 117, 107, 74, 124, 95, 95, 95, 92, 73, 84, 125, 91, 127, 73, 65, 110, 97, 76, 116, 118, 80, 115, 116, 110, 80, 89, 115, 65, 94, 96, 106, 96, 83, 99, 97, 120, 117, 112, 91, 102, 95, 118, 65, 116, 105, 119, 92, 85, 71, 77, 71, 105, 106, 118, 118, 123, 117, 125, 108, 109, 66, 91, 69, 111, 105, 115, 122, 68, 117, 78, 107, 68, 79, 116, 109, 80, 67, 104, 67, 72, 126, 72, 86, 119, 80, 82, 92, 101, 73, 97, 109, 68, 64, 107, 85, 110, 86, 68, 123, 111, 110, 92, 90, 119, 104, 78, 97, 76, 74, 98, 123, 97, 115, 77, 84, 127, 91, 76, 101, 72, 122, 109, 93, 85, 81, 107, 69, 117, 97, 123, 69, 99, 83, 103, 95, 76, 127, 74, 106, 91, 80, 95, 126, 79, 110, 106, 93, 126, 85, 124, 116, 83, 125, 90, 102, 105, 95, 101, 119, 122, 118, 103, 95, 116, 125, 116, 65, 117, 74, 112, 92, 119, 81, 89, 64, 104, 71, 101, 126, 84, 111, 87, 87, 96, 123, 66, 103, 91, 111, 89, 120, 69, 117, 69, 80, 102, 77, 77, 122, 106, 70, 114, 72, 90, 83, 91, 100, 70, 126, 90, 125, 91, 102, 69, 107, 99, 76, 94, 79, 64, 78, 92, 91, 65, 126, 67, 125, 96, 111, 107, 118, 114, 125, 76, 102, 97, 75, 123, 122, 86, 101, 105, 72, 117, 89, 108, 106, 84, 114, 89, 126, 79, 99, 114, 124, 82, 94, 93, 64, 94, 114, 99, 94, 112, 76, 81, 80, 67, 71, 86, 98, 122, 114, 70, 79, 115, 71, 127, 74, 110, 87, 84, 73, 104, 79, 121, 117, 72, 113, 115, 71, 74, 82, 104, 118, 99, 81, 111, 121, 107, 105, 115, 123, 90, 92, 95, 77, 100, 75, 69, 84, 107, 77, 126, 66, 82, 108, 77, 109, 83, 99, 118, 91, 92, 76, 86, 74, 95, 91, 95, 112, 102, 86, 113, 127, 65, 102, 95, 69, 71, 115, 102, 67, 85, 89, 94, 104, 86, 94, 66, 97, 91, 104, 89, 127, 83, 98, 84, 116, 64, 122, 81, 99, 117, 71, 85, 98, 111, 116, 70, 91, 102, 89, 111, 91, 77, 116, 105, 92, 92, 126, 84, 70, 77, 87, 79, 113, 66, 115, 119, 103, 84, 88, 127, 110, 120, 68, 97, 91, 123, 71, 100, 113, 72, 96, 93, 79, 112, 92, 87, 121, 97, 88, 106, 103, 90, 118, 80, 68, 118, 127, 65, 85, 119, 112, 123, 102, 117]
http://www.pandora.com/john-mayall/tough
dclm-gs1-168010000
0.183938
<urn:uuid:44f82af1-513e-43c9-af76-2f1ded512984>
en
0.951522
Grammar Lesson of the Day: because Grammar Lesson of the Day: because. Some years ago I began to notice that my college freshmen had all gotten a very strange idea.  They had been taught that one must never begin a sentence with the word because.  I have no idea where high school teachers came up with this one.  It is like alligators in the Manhattan sewers, or aliens landing in Roswell.  Some kook huddled in a condemned building says it, and all at once everybody “knows” it, though it is not in the slightest bit true. There’s nothing special about the word because.  It’s a subordinating conjunction, like a hundred others.  Any of them may begin a sentence – so long as it’s a sentence they are beginning.  A sentence, whether it begins with because or if or since or although or whenever or while or whatever or whatever, requires a main clause.  This is not a sentence: Because I could not stop for death. But it’s because it lacks a main clause.  Let Emily Dickinson supply one: The “rule” that the teachers have promulgated, besides being in itself utterly absurd, reveals something about all the other grammatical rules and “rules” that our students learn (or “learn”).  That is, since grammar is no longer taught systematically, as a coherent discipline that makes sense of how we make sense, it disintegrates into a set of arbitrary directives, some of them incorrect at that, each separate from the other, without rhyme or reason.  It is why I say that, unless they’ve studied Latin or German, none of my college freshmen has been taught grammar.  In any case, why would you want to begin with because?  Well, you might want to emphasize the main clause, leaving it to the end, if that contains the idea you are going to develop.  That’s what Emily Dickinson wanted to do; she wanted to focus on Death’s stopping by to give her a ride.  But maybe you want to emphasize the material in the subordinate clause.  Then you will probably place it after the main clause: We’re off to see the Wizard, The wonderful Wizard of Oz! We hear he is a whiz of a wiz If ever a wiz there was! If ever if ever a wiz there was The Wizard of Oz is one because Because because because because because – Because of the wonderful things he does! We’re off to see the Wizard, The wonderful Wizard of Oz! Print Friendly • Jamie Could this be a lack of trust on the part of the professors? I was once told by a pediatrician (no longer our pediatrician) not to kiss my baby’s face. As if I could stop. I’m sure she meant “please don’t kiss your baby’s face if you have pneumonia, or if you have crumbs in your mustache, or if you have just inhaled cigarette smoke.” But she can’t trust a non-professional bumbling mother or father to understand all the exceptions, so to be safe, she just laid down the law for all time. I imagine that professors find it easier to say “don’t start a sentence with because, alright?” than to explain what a sentence fragment is. • Tony I don’t think so, Jamie. It isn’t professors who gave out that advice, but schoolteachers. I think they do not know what they are talking about. It’s just flat ignorance. • Nancy de Flon Tony, part of the problem is that not only has none of your freshmen been taught grammar, but also, if you consider the age of many high school and elementary school teachers, they have probably not taught grammar either. We have a situation parallel to that in the Church in which religious ed is being taught to kids by uncatechized catechists. We are hurtling toward a cultural Dark Age. • Victor Gallerano It seems to me that there is less here than meets the eye: Our fourth graders are taught that they should not begin a sentence with because because they are just coming to terms with simple sentences. Subordination of clauses is too abstract to make sense at that level. In 6th and 7th grade, we correct that notion. “We are moving on, class, now you are able to understand why and how to use a subordinate clause (whether begun by because or some other subordinate conjunction). In the late 7th and 8th grades we teach the various rhetorical values of the syntactical choices one makes in writing. I can’t speak for “all” your freshmen (really???) but, perhaps some of them weren’t listening in the 6th grade when we corrected the because rule. (Has their listening gotten any better, by the way?) At any rate, this level of grammar is appropriate to grammar, not high school. The only time grammar is taught “systematically” in high school is during 9th grade when they are trying to re-mediate any gaps or weaknesses in the new freshmen. Needless to say, 9th grade goes to the low-man on the teaching totem pole…and usually the one with gaps and weaknesses of his or her own. • http://ashesfromburntroses.blogspot.com/ Manny “why would you want to begin with because? Well, you might want to emphasize the main clause” Actually it emphasizes both clauses becuase it inverts the normal sequence. It gives the entire sentence a charge. If anything the first half of the Dickenson line is what’s memorable to me, “Because i could not stop for death…” If she had gone with the normal sequence niether halves would be memorable. • http://www.politickles.com/blog F.R. Duplantier Why am I responding to this article? Because I want to. And that’s a perfectly grammatical, if elliptical sentence. The rules of grammar are intended for people who have no idea what they’re doing, to help them make a better impression and avoid embarrassing themselves too much. They’re like paint-by-number canvases or Arthur Murray dance lessons. No one who’s any good at anything pores over rule books.
http://www.patheos.com/blogs/wordoftheday/2013/09/grammar-lesson-of-the-day-because/
dclm-gs1-168030000
0.081623
<urn:uuid:2eba66c6-8fbb-4c4f-a060-190f3e0bbccf>
en
0.866372
Join the Goal Club for $24.95 > > Please note: Customized image is an approximation only. Please note: Customized image is not available. 1. Vive le football libre! 2. Currently Unavailable Vive le football libre! France has a new coach and a new jersey from Nike. This is Nike's most environmentally sustainable kit to date. Lamentamos que todavia no hay descripción en español para este producto. The first recorded women's soccer game took place on March 23, 1895. The mascot for the 1986 FIFA World Cup in Mexico was a sombrero-wearing jalapeno pepper named Pique. Giovane Elber (Bayern Munich) holds the Bundsliga record for the fastest goal - 11 seconds! The United States is a member of CONCACAF, the Confederation of North, Central American and Caribbean Association Football. Australia beat American Samoa 31-0 in a 2001 World Cup Qualifying match.
http://www.soccer.com/IWCatProductPage.process?Merchant_Id=1&Ne=0&N=4294959155&Product_Id=1171369
dclm-gs1-168200000
0.035837
<urn:uuid:c5aab9d0-24d7-4d22-994d-9e8ae2897d0b>
en
0.658481
  Web www.spinics.net [Bug 442642] New: Hebrew release-notes are left-justified Please do not reply directly to this email. All additional Summary: Hebrew release-notes are left-justified Product: Fedora Documentation Version: devel Platform: All OS/Version: Linux Status: NEW Severity: medium Priority: low Component: release-notes AssignedTo: relnotes@xxxxxxxxxxxxxxxxx ReportedBy: oron@xxxxxxxxxxxx QAContact: kwade@xxxxxxxxxx Description of problem: Some languages like Hebrew and Arabic are written Right-to-Left. The HTML generated for the release-notes (and probably any other docs generated from the same generation system) does not contain any related instructions and therefore everything is wrongly justified to the left (including numbering, indentation etc.) Version-Release number of selected component (if applicable): How reproducible: Generate html documentation and look at the resulting html. Notice the numbering/bullets location and the paragraph justification. Additional info: 1. A quick and dirty fix is to put a single line: direction: rtl; in the fedora.css generated file. However, this should be done conditionally on the language. 2. A similar solution was done to the fp.o website (by ricky) and works really good. Fedora-relnotes-content mailing list Powered by Linux   Web www.spinics.net
http://www.spinics.net/linux/fedora/fedora-relnotes-content/msg02039.html
dclm-gs1-168210000
0.07201
<urn:uuid:58152b5c-3afa-4d4d-b2fb-0df104a4b616>
en
0.933727
 Free Hellraiser: Hellseeker Movie Download Dean Winters. Iphone, Ipod, Trailers, DivX, HD Movies. :: Freemovia.com - the best movies online. Download Free Hellraiser: Hellseeker     (  Horror  Mystery  Thriller  ) User's rating: vote for this!!! Dean Winters aka Trevor Ashley Laurence aka Kirsty Doug Bradley aka Pinhead Rachel Hayward aka Allison Sarah-Jane Redmond aka Gwen (as Sarah Jane Redmond) Jody Thompson aka Tawny Kaaren de Zilva aka Sage (as Kaaren De Silva) William S. Taylor aka Detective Lange Michael Rogers aka Detective Givens Trevor White aka Bret Ken Camroux aka Ambrose Dale Wilson aka Chief Surgeon Gus Lynch aka Boyfriend Kyle Cassie aka Paramedic Alec Willows aka Janitor Ashley Laurence aka Kirsty Cotton Gooden Doug Bradley aka Pinhead / Merchant(as Doug Bradley/Charles Stead) Sarah-Jane Redmond aka Gwen(as Sarah Jane Redmond) Kaaren de Zilva aka Sage(as Kaaren De Silva) I liked it. I thought Hellseeker was much better than Bloodlines or Inferno. The alternating dreamstates keep you guessing what's real and what's not. The GORE factor was top notch for those who like gory movies and I thought the end was really good. Yeah, you don't see Pinhead or Kirsty a lot the movie, but I thought they were in it enough to make it a Hellraiser movie. People are over-emphasizing the need for Pinhead and the Cenobytes. thought Hellseeker had a great plot, but people seem to ignore that and watch to see Pinhead and his crew.. not too bad, why doesn't this series attract more viewers like other horror series do? It had been some time since I'd seen the first two Hellraisers, and possibly the third, and I hadn't seen any of the other sequels. It seems like a lot of genre fans have overlooked these sequels as well, for whatever reason, while the Friday the 13th, Halloween, and Nightmare on Elm Street sequels still seem to attract a fair amount of Local video stores have been selling off most of their videotapes cheaply, so I took advantage of this fact to pick up several of the Hellraiser sequels. I enjoyed this one. It does feature relatively little of the cenobites, which no doubt may irritate many (though not as much as if they were absent entirely!). The storyline in this one largely revolves around the questions: what happened? and what is real? I could see possibly picking up the series on DVD at the right price and watching them all through again. I'm disappointed to hear the recent news that they're remaking the first one, though..
http://www.supamov.net/cinema/movie/4120
dclm-gs1-168260000
0.075046
<urn:uuid:3f2af3b4-bbd1-43ae-a5e0-21929cc54ea9>
en
0.953742
Software optimize Microsoft releases beta of Office 2007 SP1 According to a Microsoft spokeswoman: You can read more on this from ZDNet Blogs. I was getting so confused and frustrated trying to get my mind wrapped around how the Office 2007 file formats and features are compatible with previous Office versions, that I finally bit the bullet and tested it up one side and down the other. I was relieved to discover that IT WASN'T ME BEING STUPID... BECAUSE THERE IS A GOOD REASON I was so confused!!! THE BEHAVIOR OF THE COMPATIBILTY TOOLS (Compatibility Mode, Compatibility Checker, Feature Refresh, and Compatibility Pack) IS SO DIFFERENT depending on the Application you're using, that it would be impossible to simply learn "how to handle compatibility in Office 2007". You have to learn how to handle compatibility in Word 2007, then re-learn how to handle it in Excel 2007, then re-learn how to handle it in PowerPoint 2007.... even if you're doing the same exact task, using the same exact features (or no features at all!) So, I put this presentation together to help others out there who are trying to help themselves (and their users) understand it: Feel free to re-distribute... but be sure you test the scenarios in your own environment to be sure you are getting the same results! Doesn't this just show that Microsoft seem to hurry the release of new software at times when they see competition on the horizon, to try to retain market share, whether or not the software is actually ready for release. After all even Vista has a Service pack due out soon, SQL Server 2005 has had two, and that's just for their PC Market. Accounting 2007 Pro has had its service pack one released - how much further will it go. Why don't software providers, generally, get it right.I understand that as hackers find ways around the security add-ins are necessary, but why create hackable software in the first place. Does your company have any plans to upgrade to Office 2007?
http://www.techrepublic.com/blog/it-news-digest/microsoft-releases-beta-of-office-2007-sp1/
dclm-gs1-168270000
0.021758
<urn:uuid:30b85db1-2429-4a79-9b75-ee804b22fc1b>
en
0.894054
First time here? Description © Multi-pitch slab climbing is the main attraction here, with some routes adding on a finish up the orange headwall. Descent Notes © • There is a rap line starting from the top of the headwall of Nothing Left (a) 50-60 metres to Nothing Left belay at base of headwall (b) 50 metres to first belay of Closer In/Extreme Youth/Channel 19 (c) 50m to ground • There is a rap point at the top of the first pitch of Outer Limit - 35m+ • There is a rap line down Smash Palace - two 50m raps to ground. Ethic inherited from Booroomba Rocks Routes Add route(s) Add topo Resequence Bulk edit Grade Route 19 * Rubbishman Trad 75m A reasonable slab route wandering up a weakness on the right side of 'The Central Slabs'. Begin at the prominent leftwards diagonal a few metres left of the 'Danielle' flake. 1. 40 metres - Follow the diagonal weakness to a scooped recess four metres left of the obvious water streak. Climb the short wall above and pull onto a small ledge below an incipient corner. Traverse well right to a big ledge and tree belay. 2. 35 metres - Back left along the ledge for a few metres and up the slab (four metres right of the water streak) for five metres to a curving seam and runner. Step down and move left and diagonally up across the water streak. More easily up then left along weaknesses to belay below the third pitch of 'Outer Limit'. Finish up 'Outer Limit' or 'Closer In'. FA: Peter Morris, Peter Mills, Nick Clark, 1979 Finishing for third pitch of 'Outer Limit'. 23 ** Anything So Nothing Trad 110m Contrived in places, nevertheless a great climb blasting directly up the water streaks to the left of the 'Prow'. Start 6 metres left of Rubbishman below an easy, scoopy slab. 1. 30 metres (20) - Up the slab for eight metres to a thin rightwards diagonal, step left and then straight up to the 'Rubbishman' diagonal. Step back right, then up the steep slab past a bolt (clip with wire) to the large ledge. Belay at the tree on the right. 2. 30 metres (23) - Back left and up seven metres to a short diagonal for runners (as for 'Rubbishman'). Step left and up the slab to a bolt, then desperately up and right through a bulge to a ledge. Climb over a second bulge, then move right to belay on the 'Prow', next to the crux on 'The Girdle Traverse'. 3. 30 metres (22) - Scary. Move back left along the ledge, then up to a bolt at five metres. Straight up the water streak to a jug (level with the tree on the right), then more easily to a large flat ledge. 4. 20 metres (18) - Move left along the ledge, then up the slab to the overlap. Pull through this into a short groove, then easily up the mossy rock to a spacious ledge and tree belay. Finish as you will. FA: Geoff Hughes (#1, 2), 1982 23 *** Nothing Left Trad 140m A recently bolted direct version of 'Anything So Nothing', following the water streak all the way. A few wingers already! Take wires and small camming devices (up to 2.5). 1. 47 metres (23) - Start as for 'Anything So Nothing'. Up the slab for a few metres to a diagonal crack, over this and follow the 'Rubbishman' diagonal for a few moves. Climb straight up the streak on the wall up to a bolt, right and up past a second, then diagonally up left to a #1 Friend in break (long sling), back right and continue up streak past three bolts to the bulge, straight over this (bolt) to a stance and double bolt belay. 2. 50 metres (22) Straight up the water streak past five bolts to a flat ledge at 30 metres. Trend slightly left up slab (as for the fourth pitch of 'Anything So Nothing' to overlap (#2 friend). Over the overlap at a broken flake and up dirty rock to a large ledge and tree belay - a rope stretching 50 metres, if in doubt belay at the ledge. 3. 38 metres (21) - Off block left of tree and up short cracks into left diagonal. Up wall past bolt and fixed wire to jug and #1 Friend in diagonal overlap. Over this (#2 Friend) and up easing wall and slab to bolt where slab steepens. Left past this to top of pillar and over blocks and ledges to triple bolt belay at back of large ledge. FA: Matt Madin, Dave McGregor (alt; 1, 2), 1996 23 ** Chanel 19 Trad 65m Another extreme and superb slab climb. Start at the incipient crack on the steep wall approximately 10 metres left of 'Rubbishman'. 1. 30 metres (19) - Up the crack to a horizontal break, then straight through an obvious bowl to join the first pitch of 'Rubbishman'. Continue up the wall as for 'Rubbishman', to a very dodgy hanging belay at the horizontal break, just right of the incipient corner. 2. 35 metres (23 R/X) - Up the little corner to a bolt, then move left around the arete. Trend leftwards up the unprotected slab to the 'Outer Limit' belay and finish up it. FA: Roark Muhlen, Rob Topfer, 1982 24 * Extreme Youth Trad 140m A very good multi-pitch slab. The fourth pitch (a later addition) probably still awaits a repeat. Start at a short ramp one metre left of 'Chanel 19'. The climb was recently retrobolted by Mike Law-Smith - see topographic map. 1. 30 metres (24) - Up the short, steepening ramp to a bolt, then straight up to a bulding overlap. Onwards and upwards, trending slightly right to a diagonal break. Left along this to a bolt and wire belay. Combining with the second pitch is recommended (~50 metres - use double ropes). 2. 30 metres (22) - Move diagonally left along the weakness for a few moves, then climb up the wall. Continue straight up and belay on the sloping ledge below the third pitch of 'Outer Limit' (double bolt belay). 3a. 40 metres (20) - Step up into a small recess behind the belay, then move diagonally right up the slab. Continue trending right to a slight ramp, step back left and pull up onto a stance at the base of an easy corner. Up this, step right, then up the slab to a ledge. Climb up right to the base of the headwall. 3b. - Start as above, but trend up left towards 'Outer Limit', then rightwards to belay as for 'Anything So Nothing'. 3. 35 metres (22) - A later addition. An exciting, spacey lead up the headwall to the right of 'Fiasco' and 'Jetts Sett'. Straight up some dubious rock above the dead tree to a wire placement at 10 metres, then trend left to a doubtful bolt. Straight up from here on opposing layaways for about eight metres, then up the easy leftwards corner system. Note that this pitch has not been retrobolted but left as a monument to the heady run-out days of 1982. FA: Mike Law-Smith, John Smart, 1982 23 Take It All Trad 40m Pity it isn't longer. Stolen from Mike Peck. Start five metres right of the last pitch of 'Extreme Youth'. Up the crack for two metres, then left and up past three bolts. Step right and desperately up the slab past one more bolt. FA: Ken Luck (second anonymous, alias Matt Montgomery), 1982 19 * Further Out Trad 60m Sustained and poorly protected climbing when done. "Closer In has destroyed Further Out as a sustained and poorly protected climb, putting four bolts in the crux section." - Keith Bell. Start from the ledge approximately 40 metres left of 'Danielle', where a pillar leans against the face. 1. 25 metres - Climb the right side of the pillar to a small tree, then up over a large flake on the right to a sloping ledge. Leftwards up a steepening ramp (originally aided with a peg), then step left to a large ledge. 2a. 35 metres - Pull onto the slabs behind the belay, trending slightly right past a small bush to reach a narrow ledge at 15 metres. Continue trending rightwards up a vague weakness in the slab to belay at a ledge. 2b. Alternatively and better, step diagonally right for a few moves from the right hand end of the large ledge, then straight up wall to a sickle shaped ledge/crack (Keith Bell). Finish as for 'Outer Limit'. FA: Bryden Allen (19M0, 1972 FFA: Richard Curtis, Chris Larque (alt.), 1974 23 * Closer In Trad 150m A popular four pitch route on the Central Slab, starting 30 metrs left of 'Extreme Youth'. Look for the bolts, although the original set has been slightly pruned. 1. 50 metres (19/22) - Start as for 'Crimble Crombie' and then onto the steep wall following bolts. Straight up the overlap (22) or step left and meander back (19). Move right and up past numerous bolts and sickle shaped crack to double bolt belay of 'Extreme Youth'. 2. 50 metres (20) - Start up the flake as for 'Outer Limit', then trend diagonally up and left to the third pitch of 'Space Wasted'. Up this past bolts to a wire and bolt belay to the right. 3. 25 metres (23) - The easiest line up the steep blocky wall past three bolts, with a hard move to gain the slab. Wire and bolt belay to the right on the ledge. 4. 35 metres (19) - Up the corner then right as for 'Space Wasted'. FA: Mike Law-Smith, Steve Chey, Dave Sargent, 1994 20 * Crimble Cromble Trad 98m Another good climb on 'The Central Slabs'. Start three metres left of 'Further Out'. 1. 30 metres - Climb the left side of the pillar, then move left and up (unprotected crux) to the first belay on 'Further Out'. Climb up left to belay on a ledge below the overlaps. 2. 20 metres - Up the overlaps and slabs to a scoopy ledge, as for the second pitch of 'Jubilate'. 3. 48 metres - A fine pitch that takes a line up the slab between 'Space Waltz' and the third pitch of 'Outer Limit'. Traverse right to climb the left side of an overlap, then up the steepening grey slab (crux). Climb onto a huge udnercut block from the right to find a bolt. Up the slab for 15 metres to where it eases, then move right across a lichenous strip. Up the corner to join 'Outer Limit'. FA: Rick McGregor, Graeme Roxborough, 1977 23 ** Megajules Sport 40m At the base of the central slabs, left of the pillar of Crimble Cromble and right of Space Wasted. After the crux on the initial slab, enjoyable climbing directly up to an anchor. FA: Jamie Valdivia, 2005 23 ** Space Wasted Trad 160m A very good route, although some of the climb (the second and part of the third pitches) is borrowed from existing routes and there was some dispute as to the style of the first ascent. The orange corner above the slabs (the fourth pitch) is in a superb position. Start seven metres left of 'Further Out' on 'The Central Slabs'. 1. 20 metres (23) - Boulder up to a bolt, trend right to some jugs, and follow them left to a second bolt. Move directly over a small bulge to a ledge. 2. 35 metres (16) Straight up easier slabs and overlaps to belay at a large scoopy ledge (the second belay on 'Jubilate'). 3. 50 metres (20) Superb slab climbing. Venture onto the huge upper slab as for third pitch of 'Crimble Cromble', but where that climb exits right, continue up pitch two of 'Closer In'. Belay on the right beneath the obvious overhanging orange corner (originally done without the bolts on 'Closer In'!) 4. 15 metres (22) - up the orange corner with a difficult exit on the left. 5. 35 metres (19) - Up the corner, then right to easy ground. FFA: Joe Lynch, Peter Darby (alt.), 1984 FA: Richard Watts, Dave Sargent, 1984 18 *** Outer Limit Trad 180m The original route on 'The Central Slabs', a diagonal ascent from left to right. Start 30 metres left of 'Further Out' at a short crack below a ledge. 1. 35 metres - Ascend the short crack to a bushy ledge. Climb the steep wall above and a crack trending right, then traverse left onto a grey, flaky area. Delicately up to a bolt, then up the shallow crack to a ledge. 2. 35 metres - Traverse 20 metres right along a ledge system until it peters out, continue around a bulge and follow more ledges to beneath a vertical flake formed crack. 3. 42 metres - Up the crack for 6 metres, then traverse right and then trend left to a ledge and very dubious bolt. Up over ledges, a corner and slab to a ledge and bush. 4. 24 metres - Climb the crack, trending left for about six metres, then traverse left for about 12 metres and up into a V-groove to belay. 5. 18 metres - Climb the corner and crack above to the left side of the overhanging yellow rock, across the gap and onto a large ledge. 6. 25 metres - Climb up right for five metres onto a flaky ledge, then up left to another. Continue over a short wall to the top. FA: , Neil Anderson (var.), 1969 18 Cat Stretch Trad 35m From the top of the flakes on the first pitch of 'Outer Limit' trend right to a bolt. Continue up the wall to a ledge FA: Adam Blizzard, David Lyons, John Stone, Mike Peck, 1990 18 * Jubilate Trad 100m A good climb but poorly protected and quite serious. It takes a line up the lower slabs right of 'Outer Limit' to finish on the left-hand side. Start as for 'Outer Limit'. 1. 18 metres - Climb the crack to the ledge and traverse easily right to a large flat ledge. 2. 25 metres - Climb through the bulge on the left end of the ledge to gain a crack system. Follow this to a ramp above. Move right along the ramp for two metres, then step onto the slab above (just short of a ledge). Left to a bolt then up the slab to a large scoop on the 'Outer Limit' traverse. 3. 12 metres - Serious. Exit from the scoop on the left and traverse steeply up left to a corner. Belay at the top. 4. 45 metres - Poorly protected. Leftwards onto a traverse line to within six metres of 'Linear Crack', then up and right to an open corner. Belay at the top. FA: Bryden Allen, Graeme Wurth, John Hoskins (var)., 1971 A number of possibilities exist for good combinations of pitches. The most obvious is the first two pitches of 'Jubilate' followed by 'Outer Limit'. FA: Unknown A sustained combination at the grade up the left hand side of 'The Central Slabs'. Climb the first pitch and part of the second of 'Outer Limit' followed by the third and fourth pitches of 'Jubilate'. FA: Unknown Start about five metres right of the bushy corner at the top of the first pitch of 'Outer Limit'. Takes the left-hand line of holds and scoops. Climb up carefully (a marginal 2 or 3 rock provides some protection four metres up) and onto a ramp and up the steep wall above. FA: Mike Law-Smith, 1986 17 Dry Route Trad 25m Quite pleasant. Starts a few metres left of the fifth pitch of 'Outer Limit'. Up the short wall to the steep orange corner which converges to an arete at the top. Straight up, moving right to a tricky mantle near the top. FA: Andrew Collins, Phil Cullen, 1980 18 Rooty Hill Trad 25m A companion climb. Start at a groove a few metres left of 'Dry Route'. Up the groove to an alcove and out through the rooflet. Up the crack and wall above to the top. FA: Phil Cullen, Ray Lassman, Lincoln Hall, 1978 21 Space Waltz Trad 45m A serious direct route to the right of the top pitch of 'Jubilate'. Start at the third belay on 'Jubilate'. Move right and up to a bolt, then hard moves up to flakes. An easier but runout section then leads to the ledge beneath the 'Outer Limit' buttress. The next three climbs are on a group of boulders below 'The Central Slabs'. FA: Rick McGregor, Graeme Roxborough, 1977 14 Mangler Trad 40m Start approximately below 'Further Out' at a leftwards slanting crackline. 1. 20 metres - Traverse left along the crack to a block, then up the wall and overlap to a tree belay. 2. 20 metres - Up the crack on the left for six metres, then back right on another and up to the top. FA: Lincoln Hall, Bill Wilson, 1973 23 Mega Move Marvel Trad 20m A worthless contrived mantle first done with a backrope. Start right of 'Fat Like Me'. Up the slab to a horizontal break, then directly up the wall above with a short slab to finish. FA: Richard Watts, 1983 22 Fat Like Me Trad 15m A technical slab problem which was soloed after top-rope inspection. A serious lead. The narrow, cleaned slab about 20 metres left of 'Mangler'. FA: Mike Law-Smith, 1982 22 Linear Crack Trad 94m The crack bounding the left end of 'The Big Sweep'. The crack is hard to get to, and not particularly worthwhile anyway. The aid used on the second pitch was freed by Roark Muhlen as part of 'Powder Finger Finish'. Climb the first pitch of 'Outer Limit' or the first and second pitches of 'Vent Crack'. 1. 35 metres - From the 'Vent Crack' belay, move around the corner on the right and up across a slab to the base of the crack. 2. 15 metres - Climb the thin cracks (crux) left of the main crack past a tree, to belay where the cracks converge. 3. 32 metres - Climb the crack to a stance. 4. 12 metres - Scramble up to finish. FA: Peter Aitchison, Neil Anderson (alt.), 1969 23 * Powder Finger Finish Trad 100m Another superb, long and hard slab route. The original first pitch climbed a flake and overlap just left of 'Outer Limit', but the route as described is much better. Start as for 'Only the Good Die Young'. 1. 40 metres (23) - Up to a ledge, then up the line to a peg. Continue up through the overlap and the groove above to a second overlap. Traverse rightwards beneath this to a mossy groove, and follow this up to a ledge and tree. 2. 25 metres (22) - Frees the old aid secion of 'Linear Crack'. Strenuously up the twin flared finger cracks to a tree, then easily to the top of a huge block. 3. 35 metres (23) - Move leftwards around the arete and continue traversing left beneath the bulge to a peg in the corner. Climb up and over the bulge to a bolt, then straight up the hard slab above. FA: Roark Muhlen, Peter Mills, John Hartlet, 1980 23 *** Smash Palace Trad 90m One of the best routes at Booroomba, with sustained and scary climbing in a great position. 1. 40 metres (23) Climb 'Only the Good Die Young' to the horizontal break, then undercling out right for four metres. Climb the sustained intermittent crack line past two bolts until it blanks out (a #4 Rock protects the crux here). Move right to a line of holds and follow these to the large ledge. 2. 15 metres (23) - This pitch tackles the orange wall directly above. Climb a leftward sloping crack into the obvious sentry box in the middle of the face. Up past two bolts, then crank left to an obvious curving flake. Go up this, then out left to a hanging belay in the corner. 3. 35 metres (22) - Climb up and out right to some wires. Move back, left of the white water streak, to an insecure move to reach a bolt. Hard moves follow for about five metres before the slab gradually eases back. FA: Joe Lynch, Mike Peck (Tony Barten #1), 1985 Brilliant climbing up the steep slabs and impressive headwall left of 'The Central Slabs'. N.B use a small diameter carabiner on the bolt on the top pitch, or else! Start about 10 metres right and up from 'Vent Crack'. 1. 25 metres (19) Move up and left to climb the right-hand side of the obvious huge flake. At the horizontal break pull left around the arete and onto the face. Delicately up to belay on top of the flake. 2. 20 metres (22) Scary face climbing up to a bolt, then straight up to a horizontal seam. Move right to avoid the scrub near the top. Huge belay ledge. 3. 18 metres (21) - The headwall. Up the short corner on the left to an undercling, then swing right and up to a small stance. Up the wall to a diagonal leftward flake, and left at the top of this to a hanging belay at a small bush and horizontal break. A spacey belay in a superb position. 4. 37 metres (22) Climb directly above the belay to another horizontal break, then follow this rightwards. Straight up the slab when it vanishes, past a bolt, then slightly left up a dyke. Blast easily to the top. FA: Gordon Brysland (led #1, 4), John Smart (led #2, 3), 1982 21 Prime Evil Trad 85m No bolts, no chips, no fun! A devious and run-out climb taking a line between 'Only the Good Die Young' and 'Vent Crack'. Start just right of 'Vent Crack', five metres up on a small ledge. 1. 40 metres (21) - Move right and climb a short corner. Continue up the wall to join 'Only the Good Die Young' for a few moves. Move left and up to a ledge. Left along this, then up the steep slab trending right to belay below an orange corner. 2. 45 metres (18) - Climb the corner and step left onto a ledge. Climb the ramp right to a ledge and up the obvious line of holds on the slab to join 'After the Reiving' at the top. FA: Tony Barten, Mike Peck and Simon Carter (#1) or Adam Blizzard (#2), 1987 14 Vent Crack Trad 140m Only the first two pitches are worth the effort. It is better to finish up Baryon. Start (marked) below the prominent crack 20 metres left of 'Outer Limit', at the right-hand end of an orange wall. 1. 15 metres - Climb the crack (chimney) and V-shaped cleft to a small ledge. 2. 22 metres - Climb a crack on the left and the wall above. Left and onto a slab above, trending right to a bushy gully. 3. 30 metres - Follow the gully easily until blocked by a prominent bulge. 4. 30 metres - Climb the bulge using a crack and slab on the left, then the ramp. 5. 34 metres - Climb a prominent nose on the wall left of a scoop, to finish on easy slabs. Basically just a glorified walkoff. FA: Peter Aitchison, Tony Wood, 1968 15 Baryon Trad 80m An improvement on the middle sections of 'Vent Crack'. Start from the slab on the second pitch of 'Vent Crack'. 1. 20 metres - Traverse left and up to an obvious corner, up this to a ledge. 2. 20 metres - Climb the slab using the huge thin flake and continue over poised blocks and through two bushes (to rejoin 'Vent Crack'). Up a short crack on the left of the bulge to a stance. 3. 30 metres - Climb the water-smoothed slab to the left of the bulge, crossing right to an obvious weakness and up to a large ledge. 4. 10 metres - climb the short wall and scramble to the top. FA: J. Land, Peter Sands (alt.), 1975 15 * After the Reiving Trad 30m The despoilation hadn't even started! Ascends the prominent buttress above and right from 'Vent Crack'. A nice finish to 'Vent Crack' or 'Baryon'. Start at the end of the third pitch of 'Vent Crack'. Climb the bulge up the wide, slanting crack on the right, then traverse down and right to a ledge. Pleasantly up a groove to the top. FA: Phil Cullen, Chris Larque, 1977 Probably climbed before as obvious line, alternate, better and harder variant on broken and very loose flake on pitch 2 of Baryon. From belay for P2, delicately straight up via thin crack to join Baryon at poised blocks. Finish as for original route.
http://www.thecrag.com/climbing/australia/booroomba-rocks/area/323455482
dclm-gs1-168330000
0.07958
<urn:uuid:89ddb558-5541-4c9e-9176-ecb6c7aba784>
en
0.95867
Changing times, part one... Jack Waterford, editor-at-large of the Canberra Times, writes: "The big challenge for any professional journalist... is that a good proportion of readers, probably more than 30%... know more about your subject than you do... [Their jobs], perhaps in the public service, or business, or academia, give them access to a lot of other information, including most of our sources of raw information... "This reader is in a very good position to know where a journalist is right or wrong, to guess about the sources of different perspectives or angles introduced into a story, or to decide whether a report adds value to what was already known. One's reputation ultimately depends on this market's assessment of one's reliability. And it is from this 'knowing' audience that one gets most of one's stories." (Via Canberra Times) Most popular
http://www.theguardian.com/media/greenslade/2008/sep/01/changingtimespartone?view=mobile
dclm-gs1-168370000
0.038299
<urn:uuid:a421fda0-b979-4092-834b-b9bd49c9ab36>
en
0.976319
Our TV Shows Got a Tip? Call TMZ at (888) 847-9869 or Click Here Jessica Alba Was Right ... We Were Wrong 1/27/2009 4:25 PM PST BY TMZ STAFF Our sincerest apologies. No Avatar Sweden was neutral during WWII and during the cold war and is still neutral today. I did not know that Switzerland also was neutral. But now I know. You can say whatever you like, but Alba is right. She is probably more educated than most ignorant Americans. From a Norwegian. 1874 days ago Get over yourselves TMZ. You guys have egg on your face for being wrong. Just wipe it off and get over it. Sweden is still a neutral country. Do your research before mouthing off. But I guess it's hard to admit that someone you consider an idiot is smarter than you. 1874 days ago Sweden is still neutral, its not part of NATO and it didn't take side in the Cold War, so in a sense Alba is still right... Maybe before TMZ decides its a history site they should do some research... 1874 days ago Osman Tansel     REALLY TMZ? May be because of the distance but, do you really think that Switzerland is neutral A very very very very huge big slimy baloon. 1874 days ago You Idiots has anyone stopped to think that they still are neutral? And if TMZ is the source of intellectual stimulus I think I'll stick with Jess. 1874 days ago Jessica who? Doesn't she have better things to do, like learning to carry a baby correctly? 1874 days ago TMZ ... you are not the brightest bulbs on the tree. Sweden was not merely neutral in WWII. They have a LONG tradition of neutrality going back many years ... indeed it's neutrality goes back further than Switzerland. Sweden isn't even part of NATO. Oh, and TMZ, the Swiss have had military officers in Afghanistan until 2008. You guys are morons. Admit you were wrong. Sweden is actually much more the prototypical example of a neutral country for scholars of international relations and Alba's reference shows her intelligence and your response the lack thereof. 1874 days ago Let me repeat ... the SWISS also had troops in Afghanistan until last year! and like Sweden, they were in a non-combat role. Sweden currently has the longest tradition of neutrality of any country in the world. It is in there Constitution and it PRECEDES the Swiss tradition. TMZ ... you are the ones who continue to throw egg on your face. 1874 days ago Okay, now I see people bashing Alba even though she was correct because they are saying she couldn't have known she was correct. Dudes, if you are going to bash someone for being stupid, pick something they say that is incorrect as an example rather than picking things they say that are correct and saying they must have been too stupid to know that what they said was correct. Using examples of correct statements that someone said in order to point out their stupidity is ... well ... STUPID. 1874 days ago I think people who are going on and on (like Jessica) are totally missing the point. She is arrogent to the extreme! She could learn something from any neutral country or person about being diplomatic and a peacemaker rather than being devisive and a troublemaker. There is a difference between a strong woman, and a little girl who is just a little too big for her size 0 panties! She does not help the cause of the Left by making people hate her and those like her even more than they already do. If she really wanted to be politically active and do something that would making her country a better place, she would get as far away from Hollywood as she could, and find a job that really made the world a better place. I am sure her hubris would keep her from taking less money and doing a job that did not get all of the attention that she does. Like others full of pride, she will fall eventually. As high up as she has let her ego get, it is gonna' really hurt when she does! 1874 days ago TMZ. You are a bunch of retards. Sweden has been neutral since 1814, Switzerland since 1815. Sweden is currently neutral. TMZ reporters need to take their heads out of the Spears/insert celeb attack here rubbish, and maybe read something before they report inaccuracies. You lot should be ashamed of yourselves. Uneducated loudmouths. 1874 days ago the point is, she comes off as a stupid, ungrateful, arrogant ass. she makes herself look stupid, and then complains about it. if she can't take it, then she shouldn't dish it out. i was once a fan of hers until i found out how much of a bitch she is. after so many years in the industry she should know how to conduct herself. she's a terrible role model and she's quickly turning into the next katherine heigl. 1874 days ago The SWISS had peacekeeping troops in Afghanistan too, MORONS! 1874 days ago Inger from Sveden     Freaking idiots, Sweden's been neutral with regards to international conflicts since the Treaty of Kiel (in 1814.) Neutrality doesn't prevent a country from sending PEACEKEEPING troops to another country (Afghanistan, for instance.) Maybe TMZ's illiterate, half-wit, writers maybe should go back to high school (and offer Ms. Alba a real apology, while they're at it.) 1874 days ago Sweden has claimed to be neutral since, oh, the early 1800s. I think that gives them as much claim to the term as Switzerland. The fact that most Americans automatically assume 'Switzerland' when they hear "neutral" is prolly a reflection of our poor education in world history. Alba may have intended Switzerland instead of Sweden, but even so, she was correct in calling Sweden neutral. TMZ and O'Reilly seem really silly for calling her on this one, when she is in fact, correct. 1874 days ago Around The Web
http://www.tmz.com/2009/01/27/jessica-alba-was-right-we-were-wrong/7/
dclm-gs1-168430000
0.018455
<urn:uuid:0bc834d8-08e3-4c04-9759-e2972ffb50b7>
en
0.953153
Our TV Shows Got a Tip? Call TMZ at (888) 847-9869 or Click Here Akon's Baby Mama Wants Money Right Now Na Na 7/13/2009 4:51 PM PDT BY TMZ STAFF AkonAkon made a baby with a woman who now wants him to make child support payments -- but she claims the only thing he does better than sing is hide from process servers. We're told Sara Coleman's lawyer has been desperately trying to serve Akon -- even at Michael Jackson's memorial -- but so far no luck. Akon has already taken a paternity test -- and it was a match! The kid is 6 months old. Akon's lawyer gave us the following statement: "Akon has taken responsibility and has been extremely cooperative and proactive in handling this private matter. Paternity was only established just over 30 days ago. Since the case was filed outside of Georgia jurisdiction, where he is a legal resident, Akon is currently in the process of engaging counsel in California and will continue to handle this matter in a timely manner." No Avatar oh yaaaaaaaaaaa     Susie????????????????? why do u have to say " Black people"...omg..this isn't about race...its 2009...the only reason a female gets pregant these days is too catch a man or grab some coin thru government assistence...OR..just PLAIN STUPIDITY..that is why I say ...GUYSSSSSSSSSS WHERE CONDOMS!!!!!!!!! 1707 days ago oh ohhhhhhhhhh you betta pay or you gona be a konvict use rep code AE31753 at my link to get 20% on popular street/urban brands for guys and girls. 1707 days ago The Truth     14. Ain't mine we only slept together one time... Duh you Idiot it only takes one time.. I hate to see the guys say something that Stupid.Makes men look stupid.. Come on guys if you're man enough to stick in in MANup to what comes out.. Posted at 5:20PM on Jul 13th 2009 by The Truth maybe for some guys it takes 1 time. Took me 11 times before I could get one. But I did man up lol 1707 days ago Brattus Rattus     Love Sasha - Totally agree. This isn't a color thing this is about stupid people screwing and making kids. Condom, The Pill, tie the damn thing in a knot if you have too but PLEASE stop making babies with virtual strangers. This is yet another reason why I have rats instead of kids. If any of these "kids" were mine I'd have the boys leave the house with the condom already on and the girls on the pill and covered in a plastic body suit that is only removable with a key. 1707 days ago That made me laugh so hard, hahaha. Sounds like a lot of my friend's parents! Akon is a deadbeat dad. 1707 days ago Somebody tell the bruthas about condoms 1707 days ago This is one of the best headlines. 1707 days ago Wow MJ is off the front page, this guy is too ugly to have kids. Why are the female golfers so fat? Esp the orientals, I live overseas for years. The women are so thin and pleasant, they pick up a golf club and a donut instant bitche lesbian and fat. 1707 days ago I wish all parents were like mine, they always kept a box of condoms in the bathroom with the policy if you need one, take one. They never asked questions and the box was always replaced when it went empty. 1707 days ago MY offer is     wow man that was funny...with so many little sister,s in our home,,,they said i was an armed guard at the front ,back and side door.Santa had a hard time getting in.....Good bro,s watch out for their love one,s 1707 days ago HELLO! WHY don’t men ever learn to use condoms? Don’t they know by now that some women sees an opportunity when they catch a famous/rich guy? Ill guess not, so pay up! 1707 days ago Well, I guess that does it for me buying any of Akon's music. If he won't take some of the millions he is making to be a responsible dad and take care of his child, I definitely won't be giving him any of my money to do whatever he wants with it. NOPE... NO LONGER AN AKON FAN!! 1707 days ago Oh, he'll pay. 1707 days ago i still hate retards     when will people, ALL PEOPLE, start realizing that it is NOT ok to make babies and not raise them. DO NOT HAVE kids. and don't have kids without being in at least a committed relationship of some kind. marriage is ideal, but let's face it, in today's society not practical. but other people, i.e. taxpayers, SHOULD NOT be paying for or raising your children (in general, not just Akon who has money). and just because a "mama" has custody in a single-parent household does not mean that she is raising the child. i have 3 beautiful, WANTED children that my husband and i made a conscious decision to have. stop procreating like friggin' bunnies. as mentioned, wear a flippin' condom or get tied, whatever. but do something. that guy that left his 9 kids on the doorstep of a hospital in nebraska under the safe haven act is having twins with his new "girlfriend"!!! unf##cking believable. and the state has paid already $1 million to raise his first 9 kids. that's why i believe in madatory forced sterilization for some people--disagree or hate me if you will, but not all people deserve to be parents and it is not a right to procreate but a privilege. 1707 days ago Akon's lawyer needs a refresher course on the definition of "responsibility." 1707 days ago Around The Web
http://www.tmz.com/2009/07/13/akons-baby-mama-wants-money-right-now-na-na/2/
dclm-gs1-168440000
0.019803
<urn:uuid:7f1c7edd-8bb1-4c93-8b56-f984d77b0835>
en
0.971945
Our TV Shows Got a Tip? Call TMZ at (888) 847-9869 or Click Here Terrell Owens ... to a Postal Worker 1/10/2014 7:45 AM PST BY TMZ STAFF 0108-terrell-owens-rachel-tmzTerrell Owens is finally gonna get his ring ... 'cause the former NFL star is GETTING MARRIED ... TMZ Sports has learned. We know ... the 40-year-old wide receiver has obtained a marriage license in L.A. which shows he's planning to get hitched to Rachel Snider, a 33-year-old postal worker from Texas. FYI -- Snider is NOT one of Terrell's FOUR baby mamas. As far as we know, they have no children together. It's unclear how the two met ... but here's a shocker, it WASN'T on T.O.'s old VH1 reality show, which documented his (unsuccessful) search for the perfect mate. As for the wedding, the marriage license is only good until April 8 ... so T.O. and Rachel have to swap "I dos" sometime before then, or else they'll have to apply for another license. We're told the couple has been pretty hush hush about their engagement -- because, unlike Terrell, Rachel isn't obsessed with the spotlight. When is TMZ Sports? No Avatar I thought he was broke and couldn't afford child support. How did he afford that ring? 66 days ago How is this girl ugly???..my God what is wring with people....her face looks like a 7 out of 10.....with the right make up she could look more beautiful 66 days ago He wants white and she wants green.... 66 days ago Hmmm... I thought he had pissed all his money away, at least that was his excuse for not paying child support. Either (a), he was lying and is not as poor as he made himself out to be or (b), that diamond is 18 carat glass. 66 days ago just because     Dear God (1996) 66 days ago So he can afford a ring but not pay child support? Ppl spend their money on what they want to spend it on I see. Wonder how long this marriage will last?! 66 days ago How you got on make up and still ugly???? Well then again TO aint a prize either. 66 days ago I wouldn't pay child support either screw what the courts say I would act broke and pay a certain amount that I know is going to be spent 100% on my child and not the gold digging mother I'm tired of females living off of child support and using their children for financial gain and when you don't say these ridiculous amounts of money they can guilty you using the public all they have to say "its for your child" when they know Damn well its not if women had to show what they were spending the child support and it could only be spent on the child's needs and not her miss me with the "I should be spend it to keep a roof over your child's head" crap or "I should be able to spend it on my bills" because if you didn't have a child you'd still have bills you would see how the amount of women having children out of wedlock declines 66 days ago Sandy Goddard     Rachel is a very sweet and caring woman and anyone who wants to say otherwise better get to know her first. I've know her since elementary school and can tell you first hand the only thing she is in it for is LOVE! She is a beautiful person inside and out... Do not judge people when you know nothing about them. 66 days ago Black athletes and their white women's trophies lol. 66 days ago joe blo     Yessss!! The Blackman steals another white woman from the grasp of "The Man"!!! 66 days ago T.o. need to get his self together before he add someone else to his life. He was just on tv crying about his financial and family life. 66 days ago What kind of brain dead woman would marry this fool? He is a clown, how much do you want to bet in a few months or years she will go postal on him? 65 days ago Mr Barcliff     Im a person who has only dated black woman and NEVER had a desire to date any woman outside of a black woman BUT, I disagree with people who criticize men or woman for dating outside of the black race(African descent)) because LOVEis hard to find and culturally I can say that maybe the black men who unlike me, date and marry outside there race find the woman they decide to marry better for THEM. I respect that and so should we all. I know Dennis Rodman said when he was poor and in High School and College black woman would call him ugly and wouldnt give him the time of day. He went on to say that once he became an NBA player and later a star, they were all over him hence he felt they were about what he had, not who he was. My point? To all those blacks which I am as well who criticize T.O for marrying a caucasian ask yourself what he endured in the past, hes dated white and black woman so maybe he finally found someone he feels is for HIM, not T.O the football star and maybe after the fame left, this woman just LOVED T.O for Terrel Owens and thats why he finally is getting married. Sometimes we find out who cares at our lowest(even though Terrel still has some $ and opportunities to make more) instead of our huighestr and I feel this is the case with Terrel so, instead of hating on him for marrying a white woman, be happy he has found someone who LOVEs him despite what people say about him and IF he has little money, this woman really LOVES Terrell and all this hate is ignorant and this is coming from a black man who only dates black woman, Im happy he found LOVE despite the fact I NEVER have dated a woman who wasnt black! Congrats Terrell and I hope many better days financially for you, you were a great Wide Reciever in your day and the future is bright and seems you have a woman who can help you have better days. LGNM 65 days ago Black men looooove ugly white girls and white girls loooove ugly black men... They're perfect for each other :) 65 days ago Around The Web
http://www.tmz.com/2014/01/10/terrell-owens-getting-married-postal-worker
dclm-gs1-168450000
0.042655
<urn:uuid:93dd74fd-6490-460d-a722-a24db9d0688a>
en
0.960988
Our TV Shows Got a Tip? Call TMZ at (888) 847-9869 or Click Here Arian Foster's Baby Mama 'Arian Never Harassed Me About Abortion' 1/20/2014 6:00 AM PST BY TMZ STAFF When is TMZ Sports? No Avatar Brittany Norwood drinking game! Take a shot every time she says "like" 56 days ago Like what a goldigger 56 days ago Sounds like the lawyers are maybe strong arming her, they seen money signs..I don't think she's dumb enough to say these things on the phone and not think she was being recorded... 56 days ago Well that's what happens when groupies and gold diggers can sell their stories to sites like TMZ for publicity or a payday... And as usual... TMZ puts the cart before the horse and runs full steam ahead with a load of BS. I'm sure you're going to keep us updated until your lies become the truth... Because that's what you do. 56 days ago Angel Morado     You think I'm going to let anybody like desecrate your name, especially if my baby has Foster tagged to it? Come on."<----That's all she truly wanted, LIKE really. 56 days ago I was the worlds business she paraded around talking about it, what a educated idiot 56 days ago your not all there     Its funny howedia for so ling wants to put black women down. Now you cant hide that white women are the prime golddiggers 56 days ago Can u say..... Condem??! 56 days ago Like, like, like...yea, you sound "like" you're very well educated. 56 days ago She a gold digger she ain't messin wit no broke *****....and a home wrecker to boot. She needs to get a refund on that "education" because like she sounds like a fool 56 days ago Lol she is lying and stuttering...im a woman so I know what that whining tone means...its means ur lying and u want him to believe you...on another note Arian and Abdul? Clearly black Muslims...which means u impregnated a white woman who's not even your wife. . And yall wonder why he's mad as hell ha!! 56 days ago 2 fly 4 tmz     There are alot of black women being jealous of White women on here. They hate that their men want White girl. They're tired of Ratchet, Ghetto black losers. 56 days ago @ jacqeiline ...bull ****.....black women take more crap from their men than any other women in the western world......white women don't take crap from black men....except for the fat ones with low self esteem who financially support their men cauae they will fo anything even pay a man to be with them 56 days ago And by the way many black women financially support their boyfreinds too.....they pau these men to be with them... 56 days ago summer days     First, her diction is terrible. Second, why is a black man named Arian??? 55 days ago Around The Web
http://www.tmz.com/2014/01/20/arian-foster-audio-phone-call-brittany-norwood-abortion-lawsuit/?adid=hero8
dclm-gs1-168460000
0.139065
<urn:uuid:63a47442-966d-4e6d-9d53-f207afcde47e>
en
0.805825
We support the following browsers: King's Takeaway The Mall, Selemela, Gaborone, Botswana Update restaurant details Got a photo? Add it. King's Takeaway is ready for reviews. Restaurant details Also consider these other restaurants near King's Takeaway 70% recommend "did its best" 0.8 miles from King's Takeaway 70% recommend "KIDS world" 0.8 miles from King's Takeaway Been to King's Takeaway? Share your experiences! Write a Review Add Photos & Videos Owners: What's your side of the story? If you own or manage King's Takeaway, register now for free tools to enhance your listing, attract new reviews, and respond to reviewers. Manage your listing
http://www.tripadvisor.com/Restaurant_Review-g293767-d1212056-Reviews-King_s_Takeaway-Gaborone_South_East_District.html
dclm-gs1-168500000
0.039832
<urn:uuid:5cd35576-0742-4d0e-aea0-fea7a02f074c>
en
0.934887
We support the following browsers: Five Islands posts: 226 reviews: 6 Five Islands Has anyone been to Five Islands Provincial Park in Nova Scotia? What is it like? How is the water for swimming? Is there anything specific I should look for when I am there? Halifax, NS posts: 2,979 reviews: 12 1. Re: Five Islands I don't know anything about the provincial park, but I do love the town of Parrsboro which is nearby. A great summer theatre, historic house to explore, dinosaur museum, and every stone on the 'beach' has a fossil in it (slight exaggeration). Take a look at this website: Nova Scotia Canada posts: 79 reviews: 4 2. Re: Five Islands We loved our weekend at Five Islands two years ago. We didn't swim, but did some beachcombing. We took a day and went to the museum in Parrsboro. The park had some nice trails and the kids liked the playground.
http://www.tripadvisor.com/ShowTopic-g154967-i326-k166538-Five_Islands-Nova_Scotia.html
dclm-gs1-168510000
0.482615
<urn:uuid:8d8ae997-f7eb-4773-927e-688a9a0a906f>
en
0.857064
The Teresa Careno theatre is a Venezuelan architectural and cultural masterpiece and a must see if you are visitng Caracas.  Enormous columns and hexagonal roofs in an harmonic overlaid position, integrate the majestic expression of joint architecture and pluralist nature, making it a unique theatre. A wonderul juxtaposition of a modernist masterpiece built in the 1970s with the Venezuelan tropics looking out over Avila mountain in the background.  A key attraction are some great examples of Venezuelan sculptor and plastic art genius Jesus Sotos work.
http://www.tripadvisor.com/Travel-g316066-d2517235/Caracas:Venezuela:Teatro.Teresa.Careno.html
dclm-gs1-168520000
0.360151
<urn:uuid:cd794a47-575f-4c41-b6a1-52ccee358b26>
en
0.951168
You see, light drizzle will just annoy you, but thunder will f you up. That was a Motherboy Ball. It's Mexican proof. Lucille: "We yelled at you to leave. Buster: But then you whispered 'Don't pull out.' Michael: Where is Gob? Buster: He doesn't live at Michael's? Tobias: I've always pictured him in a lighthouse. Take Condoleezza Rice Lane -- it's faster. When I miss your lips, I'll put a fig in my mouth ... do they have figs over there? Displaying quotes 1 - 9 of 118 in total
http://www.tvfanatic.com/quotes/characters/buster-bluth/
dclm-gs1-168560000
0.094391
<urn:uuid:a6c42c60-3c55-454f-901b-120e91f5cb60>
en
0.964803
Sea Level Rises Less from Greenland, more from Antarctica Melting patterns during the last interglacial period were surprising. The researchers analyzed silt from an ocean-floor core taken from a region off the southern tip of Greenland that receives sediments carried by meltwater streams off the ice sheet. They used different patterns of radiogenic isotopes to identify sources of the sediment, tracing the silt back to one of three "terranes" or regions, each with a distinct geochemical signature. The patterns of sedimentation show which terranes were still glaciated at that time. "If the land deglaciates, you lose that sediment," Carlson explains. But to their surprise, they found that all the terranes were still supplying sediment throughout the last interglacial period and thus still had some ice cover. "The ice definitely retreated to smaller than present extent and definitely raised sea level to higher than present" and continued to melt throughout the warm period, he adds, but the sediment analysis indicates that "the ice sheet seems to be more stable than some of the greater retreat values that people have presented." Ultimately, Carlson says he hopes this line of research will improve the representation of ice sheet responses to a warming planet in future Intergovernmental Panel on Climate Change (IPCC) reports. Temperatures during the last interglacial period were similar to those expected by the end of this century, and present-day temps have already reached a point that Greenland's glaciers are melting.  Follow U.S. News Science on Twitter.
http://www.usnews.com/science/articles/2011/08/01/sea-level-rises-less-from-greenland-more-from-antarctica
dclm-gs1-168630000
0.045907
<urn:uuid:c3db5b00-cd03-494b-a43c-8b811e635671>
en
0.9713
End Run I'm sitting on a couch on the 19th floor of the Affinia Manhattan, just a few feet away from the world's most coveted rear end. Legions of men from around the world would pay dearly to be here, in Buffie the Body's boudoir. And I'm not even an ass man. With more curves than J.Lo, and more badonkadonk than Vida Guerra, Buffie the Body is a phenom. Forty-five inches around, with the word Tasty tattooed on the right cheek, her ample backside makes Maxim models look like surfboards. In town last month to buy a new Mercedes CLS 550, the Atlanta-based former stripper is easy to spot in the crowded hotel lobby. She's the woman of average height wearing the Bebe tracksuit that strains to contain her. Antoine Clark lets Jazz do the heavy lifting. photo: Alana Cundy Antoine Clark lets Jazz do the heavy lifting. "At least I don't have to tailor them in the waist," she says in her slight Southern drawl, after shaking my hand. "There are a lot of jeans that they just don't make in my size." Heading for the elevator, she grudgingly accepts an offer to carry her suitcase. There's no entourage to grab the bag; Buffie Carruth doesn't travel with one. She doesn't have much use for other "model" behavior either. She eats nothing but junk food and sugary drinks, and she doesn't work out. But make no mistake: She's as recognizable in the black community as some supermodels, having starred in a G-Unit rap video and appeared in the movie ATL (character name: Big Booty Judy). She makes $5,000 to $10,000 a night hosting parties around the country. She's best-known for appearing on the cover of urban men's magazines like King, BlackMen, Sweets, SSX, and Smooth. All of them parade semi-nude buxom pin-ups à la Maxim, but primarily with black and Latina models, and with a particular obsession with asses. And none of them are very subtle about it. Smooth leaves readers with a final-page pictorial it calls "Rear View." King's closer, meanwhile, is "Backshot." "Maxim has Pamela Anderson—the person they can put on the cover and it's guaranteed to sell—and King and the rest of the urban men's magazines, we have Buffie," says Kingeditor Jermaine Hall, also mentioning Melyssa Ford and Guerra as genre favorites. "Buffie, no pun intended, gets a rise out of our readers." "She broke all the rules," says Marcus Blassingame, fashion editor of BlackMen. "She wasn't slim, didn't have a commercial-looking face or a commercial-looking body. But people were like, 'Wow! Look at the size of that behind.' Her butt is so huge, it's like a phenomenon." "I'm the definition of a true black woman," Buffie explains, sitting down awkwardly (you would too) in a plush chair in her suite. "I'm not light-skinned, my mom is not from China, and my dad is not from Yugoslavia. People normally see the light-skinned, small girls with the pretty hair in magazines, and maybe they were just tired of that and wanted to see something different, something real." The same could be said of the urban lad rags' appeal. Though Maxim and Stuff still vastly outsell them, BlackMen and similar titles have seen their subscriptions swell in recent years by featuring women with increasingly huge back ends. "Urban men, we like butts, we like hips. It's a black and Hispanic thing," says Antoine Clark, publisher of Sweets. "We like the feel of butts, we like to rub on them, we like to stare at them. It's like a magnet for us. I have no explanation for it; that's just something we like." BlackMen operates out of a bland Paramus, New Jersey, office building, across the street from a Staples store. Sharing the building are publishers of niche porn titles like Plumpers and Mature Nymphos. Founded in 1998, BlackMen once featured supermodels, celebrities, and toned fitness models. But fashion editor Blassingame says he began to question that strategy after a fateful haircut. "Guys in the barbershop talk about everything from cars, sports, and finances to women," Blassingame says, sitting in his conference room on a recent afternoon, clad in a matching gold Adidas jacket and tennis shoes. "Now, the one type of women they don't talk about are supermodels." After his epiphany, Blassingame two years ago orchestrated a makeover for BlackMen. "I had to bridge the gap between the face and the energy of a supermodel, and the curves of an urban model," says the 37-year-old son of the magazine's founder, John Blassingame. "We wanted to get the type of models that fit that kind of 'street' element." He began searching for the girl-next-door look, even if that meant soliciting girls who literally lived next door. "If we meet a girl in the mall and we think she's going to make it, we'll give her a chance," he says, adding that he gives a $200 stipend for photo shoots. (Many other magazines don't pay at all.) Next Page » My Voice Nation Help
http://www.villagevoice.com/2007-05-22/news/end-run/
dclm-gs1-168640000
0.025178
<urn:uuid:be19dcd6-3e61-4b3f-befb-2321928b0d15>
en
0.97636
RSS Feeds Nicole Richie gets candid in new AOL web series Wednesday - 5/15/2013, 10:18am  ET Associated Press NEW YORK (AP) -- As the Twitterverse expands with millions of users, it can be hard to have a unique voice. Nicole Richie doesn't have that problem. Some examples: "I'm gonna dress up as an iPhone so my husband pays attention to me." Tweets like that earned her not only millions of followers but the attention of production company Telepictures, which was already aware of Richie's popularity and wanted to work with her. In a recent phone interview, Richie said she's "thrilled" by the response but still has a hard time grasping that she's funny. "My husband (musician Joel Madden) doesn't think I'm funny at all," she said. "He has not laughed at a joke of mine since 2006. I don't necessarily always just mean to be funny. I just kind of say whatever's on my mind but I do know that I have a very specific way of looking at my life." But Richie appreciates the format of the webisode. "We are living in a world where everything needs to be a little bit shorter to keep people's attention," she said. "Especially the younger audience, which is why I think Twitter is so great." "I have a very hard time watching myself, which is another reason why I'm glad it's only five minutes. I let my sister watch them first. She's 14 (years-old) and the harshest critic so I kind of wait in the other room and see if her and her friends laugh." Both Telepictures and Richie say they're game. Bouttier says they've already received calls from various networks. "No matter what, this will be a developmental tool for me to build my brand so whether it's TV or whatever, I think doing it in a digital space is a nice way to experiment," added Richie.
http://www.wtop.com/541/3321789/Nicole-Richie-gets-candid-in-new-AOL-web-series
dclm-gs1-168700000
0.079179
<urn:uuid:17ba6805-8692-423d-8e2e-6879fc072d8f>
en
0.961996
 Snag puts Raspberry Pi back on hold | ZDNet Snag puts Raspberry Pi back on hold Summary: Distributors have put sales of the $35 Linux computer on hold until they see a certification mark. Electromagnetic emissions Topics: Enterprise Software, CXO, Hardware, IT Employment David Meyer About David Meyer Log in or register to join the discussion • Forget Europe Forget Europe, ship 'em all here without the stupid "mark". • And when your neighbors get one... And when your neighbors get one (ore more), and the local school gets a few hundred, and all the electromagnetic interference starts affecting your TV reception, what then? The Raspberry Pi is more than just a component, it can also be considered as a consumer (end-user) product. • Max 5W per device They don't use more than 5W at max. I think that they'd use 0.5-2W at average. Most of that becomes heat. My Dovado Tiny use 5V and 2A at max, which corresponds to 10W (manual says 6W is max, though), of which probably 0.5 to 1W is pure radio signal power. I doubt that the Pi will generate much radio signals without any antennas. The noise will be very limited, and is unlikely to pass through walls. • TV Reception? Simon, what part of the country do you live in, that you need to be concerned about your TV reception? Anything other than cable TV, which is shielded, went away a few years ago. • Here they need to pass FCC part 15 testing. should be a piece of cake if they pass CE. • Oops! This product is not being sold a component or sub-assembly that another manufacturer will incorporate into their own product. It is being sold to the public as a fully functional general purpose computer which will run a desktop operating system. It is a device with an 'intrinsic function', is just as much a computer as the tower case beside me. This clearly puts it in the scope of the EU EMC Directive. It cannot be put on the market in the EU without a Certificate of Conformity to the relevant Standards and a CE mark affixed. It is a very bad idea to develop a product and start manufacture without doing EMC testing. Retro-fitted suppression can turn out to be very expensive or simply impossible. Apart from the legal requirements, a properly designed product turns out to be a better product. RS and Farnell would probably be considered to both be responsible for complying with the Directive as both are separately importing the product and placing it on the market within the EU. The law requires an 'ass' to kick and said item needs to be located in the EU as penalties include a prison sentence as well as a fine. • Even longer delays for some According to my Element 14 rep with a couple of days they had 55,000 on backorder limited to one per customer. As I recall the initial production was only 10,000 so it's going to be a long time before some people get theirs regardless of the CE.
http://www.zdnet.com/news/snag-puts-raspberry-pi-back-on-hold/6354488
dclm-gs1-168720000
0.021894
<urn:uuid:cd7fd8f6-3698-4f64-87a7-c912034a55fd>
en
0.85371
Skip to content This repository Fetching latest commit… Cannot retrieve the latest commit at this time Octocat-spinner-32 build Octocat-spinner-32 dev Octocat-spinner-32 docs Octocat-spinner-32 examples Octocat-spinner-32 lib Octocat-spinner-32 src Octocat-spinner-32 README.txt Octocat-spinner-32 VERSIONS.txt SoundJS is a library to make working with the audio on the web easier. It provides a consistent API for playing audio in different browsers, including using a target plugin model to provide an easy way to provide additional audio plugins like Web Audio, and a Flash fallback. A mechanism has been provided for easily tying in audio preloading to PreloadJS ( The home page for SoundJS can be found at There is a GitHub repository, which includes downloads, issue tracking, & a wiki at It was built by, and is released for free under the MIT license, which means you can use it for almost any purpose (including commercial projects). We appreciate credit where possible, but it is not a requirement. The key classes are: The core API for playing sounds. Simply call, options), and a sound instance is created that can be used to control the audio, and receive events when it is complete, loops, or is interrupted. A controllable sound object that wraps the actual plugin implementation, providing a consistent API for audio playback, no matter what happens in the background. Sound instances can be paused, muted, and stopped, and the volume, pan (where available), and position using the simple API. The default, built-in plugin, which manages audio playback via the HTML5 <audio> tag. An additional plugin which uses a flash shim (and SWFObject) to playback audio using Flash. Have a look at the included examples and API documentation for more in-depth information. Something went wrong with that request. Please try again.
https://github.com/CreateJS/SoundJS/tree/12fbc692451e6830570d5e1310d34c6d8c8c3bfa
dclm-gs1-168770000
0.134744
<urn:uuid:98fb5be4-de51-4064-9513-abaee804b354>
en
0.933593
Take the 2-minute tour × Openshift pricing model states that you can have 3 gears in the free tier. Other services normally explain their free tiers in number of "web workers" that you can have. What is an openshift's gear exactly then? I know that you can install a different programming environment in each gear, but if you install the same one (let's say: ruby) in all your 3 free-tier gears, do you have 3 web-workers running at the same time? (As in: improving scalability and redundancy; are they load-balanced?) share|improve this question add comment 2 Answers Gears can be thought of as equivalents to "web workers" however gears is better described as a unit (collection of resources). In the OpenShift free tier you only have small gears (1GB mem, 1GB HDD, etc.) So the small gear is a unit of resources that you have for you to use. If you want an application that scales (using the free tier), it can be done however some find it difficult as DB often get their own GEAR, as well as the LB (HA-Proxy), which does not leave you many remaining gears for scaling. share|improve this answer To clarify: in a scalable application, a database always gets its own gear. There will also be a gear which has HAProxy and your web framework, leaving you a single gear to scale up to in the free tier. –  Paul Morie Oct 21 '13 at 16:30 add comment {disclosure: I work as an Developer Evangelist on OpenShift} We also put a big effort into explaining our pricing in terms developers can understand. Please look at the middle of the pricing page: There is a section on how gears work. In that section you can see we can show what we load tested to give you a good starting point for what resources a normal Drupal application should be able to use. I find this easier than how many opteron servers I get. Remember this is just an estimate, and your mileage may vary, but I think it is easier to understand. We would love to see other people do load testing with other frameworks or applications and give us their feedback. share|improve this answer add comment Your Answer
https://stackoverflow.com/questions/19489771/whats-an-openshift-gear-can-it-be-the-equivalent-of-a-web-worker
dclm-gs1-168840000
0.14771
<urn:uuid:4bc76b46-8dea-43a3-829e-dbebcc4e81c0>
en
0.977318
Reviews for Experiments Dragonfly-Moonlight chapter 5 . 10/26/2012 Okay, I came back to this and I'm utterly baffled. From the way you wrote this, it doesn't even sound like you played Till the End of Time or The Last Hope, or you'd have written Fayt a little more appropriately and remembered that Faize, Arumat, and Lymle all have offensive symbols and special skill sets. Fayt is a hero. He doesn't like to see anyone hurt or tormented like that, and he's been experimented on himself without his knowledge or permission. As for Arumat and Faize, they could TELL the researchers how they reproduced seven hundred years in the past. They are not technically inept. The only things I can really praise about this story are the technical aspects of your writing and the idea. You've utilized proper sentence structure, punctuation and spelling, and that's something I always enjoy, no matter what I'm reading. You also had a good idea. Unfortunately, you didn't execute it well enough. P.S. I don't care that it's fanfiction. I take my reading seriously, even when it's for fun, which is what most of the reading I do is for, anyway: fun. Please think on that before you decide to become all offended on me and fire back a defensive reply. I took time out to read this and leave two reviews. That does count for something. Dragonfly-Moonlight chapter 1 . 10/25/2012 Why didn't the translators on Fayt, Mirage, Cliff, and Maria's communicators work? That kind of loses me on this. As for the date, it would be after 772 S.D., when the events of Till the End of Time take place.
https://www.fanfiction.net/r/8491315/
dclm-gs1-168860000
0.030996
<urn:uuid:119cead9-9655-4403-9538-11011d5ad375>
en
0.988787
Chapter 2. The hunt goes on my friends and will not end… until the end. Or until this fic finishes. Hope you all like it and if not, I will make you. BWHAHAHAHA! I dedicate this to my girlfriend,oo ForgottenRoses oo for being such an awesome girl and being so encouraging in my personal issues. Hunting Season Metal and claw clashed. The girl managed to get her claws caught in between the spear and managed to wrench it out of it's wielder's hands and threw it away. N'yaka-de looked to where it fell, turned back and snarled. The girl just smiled and winked. "Now, we're even, mandible mouth", she taunted and ran from the pyramid onto the grassy area below. The alien roared and ran after her. Shade made to run after her when the other alien held her back. "What are doing, we should help her!", she yelled at him. "She insisted she fight her on her own", he responded calmly. "Anyway, I think I should introduce myself. I am the Wolf, as my name is said in your tongue." "Well, I'm Shade and this is Knuckles. We guard the Master Emerald together", Shade told him. "Together? You are mated then?", he asked without a trace of embarrassment. Both Knuckles and Shade blushed scarlet at this and avoided looking him in the eye. "Wha... no... we uh... we're just friends", Knuckles stammered. The alien chuckled and shook his head. "Okay, I 'll take you're word for it. The girl's name is Angela by the way", he said as if it was an after thought. A loud thud drew their attention and turned to see two more Yautja materialize behind them. The Wolf spun round and drew his own spear. "You two take the one the one on the right, I'll take this one", he nodded to one on the left. The one in question fired off a shot and then ran off. "Get back here you unholy pauk!", the Wolf yelled before running after him with his spear in the air. The other hostile alien drew a pair of blades from gauntlets on his wrists and roared in challenge towards Knuckles and Shade. "I look forward to making you two my next trophies", he said sinisterly as he stood ready to fight. "Well, you must not know who you're dealing with then", Knuckles responded before raising his fists and charging. He bought down on him, but the alien caught it and threw his own punch. Said action hit Knuckles with such force, he was knocked backwards into the wall. He slumped down, dazed and didn't get up. "Knuckles!", Shade exclaimed and turned to his attacker, anger twisting her features. "You're gonna pay for that!" Without a moments hesitation she attacked. It was with such ferocity, that the warrior was caught off-guard. The punch caught him in the stomach. While this would have knocked the wind out of any human, the hunter barely flinched and made a counter-attack, swiping at her head with his wrist-knives. She ducked out of the way, the blades skimming her head and activated her own cloak. The alien obviously wasn't expecting this and whirled around looking for his target. Shade, however, had already sneaked around him. Her hands glowing, she rushed at him. He spun around but was too late and howled as his energy was drained by Shade. He collapsed to his knees, panting slightly. Shade looked at him, a superior expression on her features. "Aww, you look tired", she said in a mockingly sweet voice. Her hands glowed again. "Well, lets put you to sleep." She ran at the alien hunter and punched him in the head. The Predator was forced backwards, luminous green blood covering the stones and hit the ground with a satisfying thud. The hunter made no signs of life or movement. He was quite dead. Shade then went to Knuckles, who was beginning to regain consciousness. He grumbled something incoherently as Shade helped him to his feet. "Take it easy Knuckles, you look like you had a nasty hit to your head", Shade advised as the echidna staggered a little. "Your one to talk, you took that thing down all by yourself", he said approvingly, smiling as he leaned against a pillar. Shade blushed at this muttering "It was nothing." "Nonsense Shade", said the guttural voice of the Wolf. His spear was also stained with luminescent blood and he himself had sustained a few injuries. "To defeat one of my kind in single combat is an admirable feat indeed." He approached her and removed a round, flat disc from his belt. He shook it and blades sprung from within then retracted them again. "We give the victor a weapon as a mark of respect. So, I feel it only right to present you with this shuriken as your prize", he said proudly and handed it to her. Shade looked at the weapon and smiled at the Wolf. "Thank you", she said and bowed to him and he bowed back. "But, where's that girl, Angela?" "Right here!", a low voice proclaimed. They turned and saw N'yaka-de holding Angela in an arm lock, his blades pressed against her throat. "You may have defeated my brothers, but you won't kill me! This ooman (he gestured at Angela) is my passport to life. Put down your weapons or her thwei covers the stone at your feet." From the look in his eye and the tone in his voice, he sounded as if he meant it. Slowly, they lowered their weapons and put them on the ground. "Good", said N'yaka-de, his voice dripping with contempt. "Now, if your good, I may let you keep her head." "Hey, mandible mouth", Angela teased her captor. "Unfortunately, your passport's just expired!" Then, she stood hard on his toe. He howled and relaxed his grip and Angela broke out, spun round and impaled him with her claws. He had barely screamed before she decapitated him with one swing and his body fell, headless and dripping with blood, to the stone floor. "Thwei-de", she said, shaking blood off her claws. She then turned to Knuckles and Shade. "Thank you both for aiding us. Now we must leave. I t was an honour fighting with you both." Before either of them could do anything, she ran off, her alien companion following. "Wait!" Knuckles would have chased after them, were it not for his injuries and Shade holding him back. "No Knuckles, your in no condition to run. Besides, I have a feeling we'll see them again.", she told him, in a commanding, yet caring tone. "Yeah, you're probably right", Knuckles agreed. He stared after where they'd gone, the glow of the Master Emerald combined with the alien blood giving him a rather eerie look. As he stood, Shade took his hand. He looked at her and she smiled. He blushed a bit and smiled back. "Well, that's another problem solved and done" Angela said cheerily to her companion. "Hold on, getting a message from the others" The Wolf informed, holding up his wrist device. A series of words scrolled across the screen in his language. "Oh no." "What", asked the mutant in a worried voice, "What did it say?" The Wolf looked at her, his expression grim. "It said 'we were too late. Their ships have left the base. They are coming.'" Angela gasped. "You mean..?" The Wolf nodded. "A whole army. 25000 of them." He shuddered. He could already see them, flying in the air, their harsh voices toning their battle cry: "EXTERMINATE! EXTERMINATE! EXTERMINATE!" DUN DUN DUHHH! Cliffhanger! I will write a sequel to this. All out battle next time, but I'm gonna be working on a another story and revising for my GCSEs. Until next time... GOODBYE! BWHAHAHAHAHA!
https://www.fanfiction.net/s/5935006/2/Hunting-Season
dclm-gs1-168910000
0.213008
<urn:uuid:1317cdd6-9293-411b-97ef-14793437ee64>
en
0.99105
"Will you stop worrying about it, Tron," Flynn asked, brushing off the program's concern. "Everything's just fine. Everything's under control." "Flynn!" Clu bellowed, interrupting the User with his outside voice as he was still too far away to make polite conversation. "Am I still to blah blah the perfect blah blah blah?" Tron frowned at the approaching admin and glanced back to Flynn, slightly confused. He wasn't sure he'd caught all of that. "Yeah?" Flynn called back, sounding just as puzzled as Tron felt. Clu's helmet formed around his head, and he started backing away as his personal guard stepped out from behind convenient alcoves and doorways that may not have been there a nanocycle ago. Tron and Flynn exchanged an alarmed and somewhat furious look. Well, the fury was more on Tron's part but he shared it anyway, he was just nice like that. As the discs in the guards' grasps came to life, they hummed a dangerous blah. "Go," Tron cried, urging Flynn to run away like a superbrave coward. Those discs sounded like they meant business! The user did just that, following his instructions perfectly. And if we were being completely honest here, Tron hadn't really been expecting that. He'd assumed he'd be getting at least a little user wizardry to help him out, but then that wasn't entirely necessary either because he was still Tron. And that meant that he was still the baddest ass on the Grid. He could take these black guardsmen, and it would be a piece of digital cheesecake. Hell, he could even take their discs from them. Yeah, that's right, he was just that hax. He was Tron, bitches, he didn't have to explain anything. Rules were things that happened to other programs. And you know what, so was gravity. If he didn't want to deal with gravity, he wouldn't have to – that was now a thing. The first unfortunate guard derezzed into a pile of glittering pixels, with a mournful death rattle of "blaaaah." Tron retracted his weapon and turned on the second guard, who quickly went the way of the first. The third was next, and died not with a bang, but a whimper. It sounded a lot like, "blah." And before the last could fully regret accepting his recent promotion, Tron put a disc through his stomach, ending his career quite effectively. Looking over his shoulder to make sure Flynn had escaped, Tron saw that the User couldn't even do that on his own, and was being menaced by Clu walking at him slowly. There was a moment where Tron considered throwing one of his two discs, but somehow that almost seemed like cheating. In fact, so did the idea of hitting the admin with either of them. Looked like it was time to activate his fisticuffs, then. Launching himself at Clu, Tron landed a few cheap but apparently useless punches, and turning to Flynn, ordered desperately, "Flynn! Blah!" The man had just enough time to give them both a last strange terrified stare before bolting around the corner. Clu took that opportunity to throw Tron to the ground. Twice. Because apparently it was the ground's birthday today. And grabbing one of Tron's fallen discs, raised it above his head before brutally bringing it back down. "Bla—rrrrrrrrrrrrrr," Tron screamed, before realising he had something much better to say. "Rrrrrrrrrrrrrrrrrrrrrrrr." Author's note:I find this site's reformatting of my story's style a little cumbersome. To see the original format check my personal site (to access any Tron material, the password is: "Grid"), or to see a closer approximation, check Archive of our Own - both of which are linked in my profile. And off I go to write some real fics now.
https://www.fanfiction.net/s/7488118/1/Abloo-bloo-bloo-blah-blah
dclm-gs1-168930000
0.02647
<urn:uuid:841d1b82-07e6-42a6-984c-f97df426abe3>
en
0.877266
PPC/ Google Adwords/ Yahoo ads expert Closed - This job posting has been filled. Job Description We're an online store based in Hong Kong, with a bi-lingual We're looking for a PPC-SEM expert who has experience with e-commerce businesses. The scope of work is as follows: 1) create ad group for each brand/category or update ad groups based on brands/ categories on our website. We already have most ad groups already set up, so need to fill in the blanks 2) review ALL ads to ensure that all brand keywords show ad for that brand and land on the right brand page on our website - similarly review all ads to ensure all category keywords to show ad for brand and land on the category page 3) optimise bids - reduce bids on low competition keywords, increase bids on high competition keywords, and reduce overall cost per click 4) review competition ads, particularly chinese websites, and adopt best practices 5) review all existing ads for performance in terms of - CTRs - bounce rates - engagement - conversions recommend improvements/ remove poor performing ads 6) replicate all ads in google adwords account in yahoo ads account optimise bids separately for google and yahoo ads, based on competition in each network 7) Reduce cost per click by 30-50%. Reduce cost per transaction/ improve ROI This can become a long term project for the right candidate.
https://www.odesk.com/o/jobs/job/_~0165a6b163ec63132c/
dclm-gs1-169000000
0.028911
<urn:uuid:95a702f9-a101-4d5e-a520-4f5229399bfc>
en
0.895435
Take the 2-minute tour × 1. Current directory/or pwd. 2. Git status and branch. The rest is just bling and is often irritating. share|improve this question Also asked on Unix&Linux: unix.stackexchange.com/q/34508/4667 –  glenn jackman Mar 19 '12 at 13:22 add comment 1 Answer The man page of bash has a section PROMPTING (shouting in the original), from which I only cite the beginning: \w the current working directory, with $HOME abbreviated with a tilde (uses the value of the PROMPT_DIRTRIM variable) \W the basename of the current working directory, with $HOME abbreviated with a tilde You can include the result for a command - since I don't know git well enough, I use $(date +%S) as example: PS1='\w $(date +%S) > ' I don't understand requirement 3. Is this a request how to define colors for ls? Ah - from the question on U&L, I think you're asking for such a thing: In ~/.bashrc I have an entry: # enable color support of ls and also add handy aliases eval "`dircolors -b`" alias ls='ls --color=auto' to use ls per default with --color=auto. share|improve this answer add comment Your Answer
http://askubuntu.com/questions/114227/shell-prompt-customization
dclm-gs1-169100000
0.047221
<urn:uuid:ca108ef6-2432-4320-8a1c-7a89a9c02bf8>
en
0.899172
From Wikipedia, the free encyclopedia - View original article Bone: Acromion Gray205 left scapula lateral view.png Left scapula. Lateral view. (Acromion labeled at upper right.) Gray'ssubject #50 203 Jump to: navigation, search Bone: Acromion Gray205 left scapula lateral view.png Gray'ssubject #50 203 In human anatomy, the acromion (from Greek: akros, "highest", ōmos, "shoulder", plural: acromia) is a bony process on the scapula (shoulder blade), together with the coracoid process extending laterally over the shoulder joint. The acromion is a continuation of the scapular spine, and hooks over anteriorly. It articulates with the clavicle (collar bone) to form the acromioclavicular joint. Human anatomy Its superior surface, directed upward, backward, and lateralward, is convex, rough, and gives attachment to some fibers of the deltoideus, and in the rest of its extent is subcutaneous. Its inferior surface is smooth and concave.[1] Its lateral border is thick and irregular, and presents three or four tubercles for the tendinous origins of the deltoid. Its medial border, shorter than the lateral, is concave, gives attachment to a portion of the trapezius, and presents about its center a small oval surface for articulation with the acromial end of the clavicle.[1] There are three morphologically distinct types of acromia and a correlation between these morphologies and rotator cuff tear:[2] TypePrevalenceAngle of anterior slope cuff tear Os acromiale Plan of ossification of the scapula. Posterior side. Acromion visible at upper left, in blue. Radiograph of the shoulder showing an os acromiale The acromion has four ossification centers called (from tip to base) pre-acromion, meso-acromion, meta-acromion, and basi-acromion. In most cases, the first three fuse at 15–18 years, whereas the base part fuses to the scapular spine at 12 years. However, in between 1% and 15% of cases, this osseous union fails and the acromion remains a separate bone. This condition is referred to as os acromiale, but rarely causes pain. Earlier estimates of its prevalence were as low as 1.4%, and this higher estimate was made by Sammarco in the year 2000, based on radiographic and anatomical studies.[3][4] Four types of os acromiale can be distinguished:[5] This feature was common in skeletons recovered from the Mary Rose shipwreck: it is thought that in those men, much archery practice from childhood on with the mediaeval war bow (which needs a pull 3 times as strong as the modern standard Olympic bow) pulled at the acromion so much that it prevented bony fusion of the acromion with the scapula. In other animals The acromion process of bats (Mammalia: Chiroptera) is particularly elongated compared to that of humans. The shoulder girdle of a snapping turtle. (1) Acromion, (2) scapula, and (3) coracoid Turtles have an acromion that forms the anterior part of the triradiate pectoral girdle (together with the coracoid and scapula). In this highly specialized endoskeletal structure, the scapula is a dorsal (directed upwards) process attached to the first rib; the coracoid is a posteroventral (directed backward and down) process; and the acromion is a medioventral (directed inwards and down) process (also known as the prescapular process) located at the base of the scapula. This had led to some controversy regarding the evolutionary origin of turtles, because in both pareiasaurs and non-mammalian therapsids the acromion is located at the dorsal tip of the scapula. [6] In modern turtles, the acromion projects ventrally and articulates with the plastron (the flat lower part of the shell), but it evolved in a common ancestor of pareiasaurs and turtles long before the plastron. In these primitive ancestors, the acromion projected forward to form a strong and flexible articulation between the shoulder girdle and the clavicle. Notwithstanding these changes, the acromion of turtles retains its original function, to support the shoulder girdle and increase stride length. [7] Additional images Diagram of the human shoulder joint   Muscles connecting the upper extremity to the vertebral column.   Human arm bones diagram  
http://blekko.com/wiki/Acromion?source=672620ff
dclm-gs1-169150000
0.018727
<urn:uuid:1bab3c93-13e3-4e85-91f0-3f6d5aa0ad51>
en
0.884997
Chinese folk religion From Wikipedia, the free encyclopedia - View original article Jump to: navigation, search Chinese folk religion (traditional Chinese: or ; simplified Chinese: 中国民间宗教 or 中国民间信仰; pinyin: Zhōngguó mínjiān zōngjiào or Zhōngguó mínjiān xìnyăng) or Shenism (pinyin: Shénjiào, 神教),[1][2][3] which is a term of considerable debate, are labels used to describe the collection of ethnic religious traditions which have historically comprised the predominant belief system in China and among Han Chinese ethnic groups up to the present day. Shenism describes Chinese mythology and includes the worship of shens (神, shén; "deities", "spirits", "awarenesses", "consciousnesses", "archetypes") which can be nature deities, Taizu or clan deities, city deities, national deities, cultural heroes and demigods, dragons and ancestors. "Shenism" as a term was first published by A. J. A Elliot in 1955.[4] Despite being suppressed during the last two centuries of the history of China, from the Taiping Movement to the Cultural Revolution, it is currently experiencing a modern revival in both Mainland China and Taiwan.[8][9] Various forms have received support by the Government of the People's Republic of China, such as Mazuism in Southern China (officially about 160 million Chinese are Mazuists),[10] Huangdi worship,[11][12] Black Dragon worship in Shaanxi,[13][14][15] and Caishen worship.[16] Chinese folk religion holds aspects of ancestral belief systems such as animism and shamanism,[17][18] which include the veneration of (and communication with) ancestors, and energetic streams such as Qi, but also physical phenomena such as the Sun, the Moon, the Earth, the Heaven, and various stars, as well as communication with animals, such as Auspices from birds. Related practices have been held by the Chinese people for over three thousand years (such as written in Oracle bone scripts), and alongside Buddhism, Taoism, and various other religions for the past two thousand years. Even in ancient China, religion emphasized documentation and was quite bureaucratic in nature.[19] Rituals, devotional worship, myths sacred reenactment, festivals and various other practices associated with different folk gods and goddesses form an important part of Chinese culture and Chinese spiritual world concepts today. The veneration of secondary gods does not conflict with an individual's chosen religion, but is accepted as a complementary adjunct, particularly to Taoism. Some mythical figures in folk culture have been integrated into Chinese Buddhism, as in the case of Miao Shan. She is generally thought to have influenced the beliefs about the Buddhist bodhisattva Guanyin. This Bodhisattva originally was based upon the Indian counterpart Avalokiteśvara. Androgynous in India, this Bodhisattva over centuries became a female figure in China and Japan. Guanyin is one of the most popular Bodhisattva to which people pray. There are many public-domain folk religion texts such as Journeys to the Underworld distributed in temples (often without charge) or sold in gods material shops or vegetarian shops. Temples for Shenist worship are different from Taoist temples and Buddhist monasteries, being administered by local managers, associations and worship communities. Communal ceremony at the Grand Temple of Shennong-Yandi in Suizhou, Hubei. The Chinese Deities (Gods and goddesses) There are hundreds of Chinese Deities (local gods and goddesses) as well as demigods. After apotheosis, historical figures noted for their bravery or virtue are also venerated and honored as ancestral "saints", xians, or heightened to the status of shens, deities. Song Dynasty registered them.[20] Deities reflect the Chinese imperial bureaucracy, and exemplify many characteristics of human officials, such as their fallibility.[7] The following list represents some commonly worshipped deities. Places of worship Organizational religions There are also many controversial folk religious movements known as secret religions (zh:中国秘密宗教) with different names.[21][22] Societal impact Scholars have studied how Chinese folk religion-inspired society, elastic and polytheistic in spirit, provided the groundwork for the development of dynamic grassroots Chinese-style pre-modern capitalism in Song Dynasty China and modern capitalism in contemporary Taiwan.[23][24][25][26] Chinese folk religion with its ritual economy is also a key in the contemporary economic development in rural Mainland China.[27][28] With around 400 million adherents Chinese folk religion is one of the major religions in the world, comprising about 6% of world population.[29][30] In China more than 30% of the population adheres to Shenism or Taoism. In Taiwan, Shenism is highly institutionalised under the label and the institutions of "Taoism", which is adhered by 33% of the population.[citation needed] In Singapore about 8.5% of the total population is Taoist, and 10% of the Chinese Singaporeans identify as Taoists.[31] In Malaysia, 10.6% of Chinese Malaysians are Shenists-Taoists, corresponding to 3% of the whole country population. In Indonesia, Taosu Agung Kusumo, leader of the Majelis Agama Tao Indonesia, claims there are 5 million Taoist followers in the country as of 2009.[32] Images of Shenist temples, altars, deity depictions, and practices Paper prayers, candles and offerings on a Taiwanese altar   A city god statue inside a miao   Historical depiction of the archaic twin deities Fuxi and Nüwa   A typical miao altar   A temple to Guandi in Linyi, Shandong.   Colossus of god Xuan Wu in Taiwan   Altar to Guandi in a restaurant of Beijing   People worshipping the city god of Suzhou inside the City God Temple of Suzhou, Jiangsu   Clothed statues of Mazu (Goddess of the Seas)   Altar inside the City God Temple of Shanghai with Taoist priests performing ritual   See also Further reading 1. ^ "Reinventing Chinese Syncretic Religion: Shenism". 2007-02-23. Retrieved 2011-11-20. 3. ^ "Religious Diversity in Singapore". 2001-09-11. Retrieved 2011-11-20. 4. ^ 5. ^ Religion. (2011). In Encyclopædia Britannica. 12. ^ Compatriots across the strait honor their ancestry 15. ^ "Miraculous response: doing popular religion in contemporary China". Retrieved 2011-11-20. 17. ^ "Animism". OMF. Retrieved 2011-11-20. 18. ^ Barend ter Haar. "Shamanism in China: bibliography by Barend ter Haar". Retrieved 2011-11-20. 19. ^ Poo, Mu-chou. "Roots of a Religion of Personal Welfare." In Search of Personal Welfare. A View of Ancient Chinese Religion. Albany: State University of New York Press, 1988. pg. 17-29. 20. ^ 在线阅读 21. ^ 吃齋與清代民間宗教的發展機制 22. ^ 據大陸學者劉子揚對第一歷史檔案館所藏清代檔案進行統計,教派名目多達一0七種;根據中國在2004年出版的《中國會道門史料集成》的統計,中國內地自晚清以來近百年間的會道門(含秘密宗教與秘密會黨)有4,542種,其中會908種;道1601種;門366種;教368種;堂388種;壇295種,社152種;學14種;雜450種。清代的秘密宗教.docx 23. ^ Council of Foreign Relations. Symposium on Religion and the Future of China: Religion, Civil Society, and Economic Life. June 11, 2008. 24. ^ Hill Gates - Robert P. Weller. Hegemony of Chinese Folk Ideologies. Sage Publications, 1987. 25. ^ Gordon Redding. The Spirit of Chinese Capitalism. Walter de Grutyer, 1990. 26. ^ Hill Gates. China's motor: one thousand years of petty-capitalism. Cornell University, 1996. 27. ^ Mayfair Mei-hui Yang (Director of Asian Studies, University of Sydney, Australia). Ritual Economy and Rural Capitalism with Chinese Characteristics. University of California Press. Retrieved 31st July 2011. 28. ^ Pui-lam Law. The Revival of Folk Religion and Gender Relationships in Rural China. Hong Kong Polytechnic University Press. Retrieved 2011-07-31. 29. ^ "Major Religions of the World Ranked by Number of Adherents". Retrieved 2011-11-20. 30. ^ "How Now Tao". Retrieved 2011-11-20. 31. ^ CIA World Factbook - Singapore 32. ^ "Tao, Taoism Religion". Retrieved 2011-11-20. External links Media related to Chinese folk religion at Wikimedia Commons
http://blekko.com/wiki/Chinese_folk_religion?source=672620ff
dclm-gs1-169160000
0.630661
<urn:uuid:8eac81ba-fab6-40fa-954c-e4748913a735>
en
0.828445
Solstice Enterprise Agents 1.0 User Guide This indicates the time that a subscription actually expires. No indications are received after this time, unless they are re-subscribed. By default, a future timestamp is chosen so the subscription practically exists forever. This is done so that snmpXdmid always retains its indication subscription with the SP. The default value is: EXPIRATION_TIMESTAMP = 250101231120000.000000-420
http://docs.oracle.com/cd/E19620-01/805-5924/x-7a1a8/index.html
dclm-gs1-169310000
0.038195
<urn:uuid:1871707c-22a3-4dfa-a277-f033a96ddec9>
en
0.861032
From Wikipedia, the free encyclopedia   (Redirected from Mushroom farm) Jump to: navigation, search Wild harvesting[edit] Due to its climate, the Pacific Northwest of the USA produces commercially valuable mushrooms. Valued species include:[3][4] Mushroom gatherers have few requirements to begin business. Gatherers only need to supply funds for possible park fees, knowledge for identifying mushrooms and gathering time. There are significant disadvantages to relying on natural mushroom production. These sales may be unregulated, placing buyers at risk for buying toxic or inedible mushrooms. By honest error, harvests may include toxic or inedible species. No controls exist to regulate the quality or frequency of harvests, since gatherers rely on favorable natural conditions and weather to produce fruiting. Conflicts may arise between competing gatherers trying to harvest from the same location. State parks in the Pacific Northwest or elsewhere may charge fees for mushroom gathering permits.[5][6] Appalachia also produces edible wild mushrooms, including chanterelles and morels.[7] Pickers may sell directly to distributors, restaurants, or sell their harvest through roadside stands wherever a natural supply of mushrooms is plentiful. While there may be concern that harvesting wild mushrooms may exploit or damage a natural environment, harvesting wild mushrooms is different from harvesting wild plants, fishing or hunting animals. In these last three cases, removing individuals decreases the ability of a wild population to reproduce, since fewer adults remain. Removing adults leaves fewer individuals capable of reproducing and reduces genetic diversity. Harvesting wild mushrooms removes only fruiting bodies and their attached spores. However, the fruiting bodies (mushrooms) have likely dropped spores before harvest time, or will likely drop them en route to the harvester's destination, further expanding the fungi's habitat. Arguably, the practice of mushroom harvesting may actually help the species being harvested. While truffles also represent the fruiting body of a larger underground network, they are an exception, since they rely on animal spore dispersion. Additionally, reproduction and propagation can still occur by propagation of the parent mycelium. Harvesting removes none of the parent mycelium, which remains intact underground. Outdoor logs[edit] Mushrooms can be grown on logs placed outdoors in stacks or piles, as has been done for hundreds of years.[8] Sterilization is not performed in this method. Since production may be unpredictable and seasonal, less than 5% of commercially sold mushrooms are produced this way.[9] Here, tree logs are inoculated with spawn, then allowed to grow as they would in wild conditions. Fruiting, or pinning, is triggered by seasonal changes, or by briefly soaking the logs in cool water.[8] Shiitake and oyster mushrooms have traditionally been produced using the outdoor log technique, although controlled techniques such as indoor tray growing or artificial logs made of compressed substrate have been substituted.[9][10][11] Shiitake mushrooms grown under a forested canopy are considered non-timber forest products[12] In the Northeast shiitake mushrooms can be cultivated on a variety of hardwood logs including oak, American beech, sugar maple and hophornbeam. Softwood should not be used to cultivate shiitake mushrooms. [13] The resin of softwoods will often times inhibit the growth of the shiitake mushroom making it impractical as a growing substrate.[14] Indoor trays[edit] Indoor growing provides the ability to tightly regulate light, temperature and humidity while excluding contaminants and pests. This allows consistent production, regulated by spawning cycles.[16] This is typically accomplished in windowless, purpose-built buildings, for large scale commercial production. Six phases of mushroom cultivation[edit] Phase Time span Temperature Key points 1. Phase I composting 6–14 days[17] Regulate water and NH3 content through microbial action. Add fertilizer / additives 2. Phase II composting or pasteurization 7–18 days via composting method, ~2 hours for pasteurization (heat sterilization)[18] Reduce number of potentially harmful microbes through further composting, or apply heat sterilization. Remove unwanted NH3. 3. Spawning and growth 14–21 days[18] 75°F; to 80°F; must be above 74°F; for rapid growth.[17] Must be below 80°F; to 85°F to avoid damaging mycelia[18] Add starter culture. Allow mycelium to grow through substrate and form a colony. Depends on substrate dimensions and composition. Finished when mycelium has propagated through entire substrate layer 4. Casing 13–20 days Promote the formation of promordia, or mushroom pins. Add a top covering or dressing to the colonized substrate. Fertilizing with nitrogen increases yields. Induces pinning 5. Pinning 18–21 days[17] Earliest formation of recognizable mushrooms from mycelium. 6. Cropping Repeated over 7-10 day cycles[18] Harvest Pinning is the trickiest part for a mushroom grower, since a combination of carbon dioxide (CO2) concentration, temperature, light, and humidity triggers mushrooms towards fruiting.[1][2][17] Up until the point when rhizomorphs or mushroom "pins" appear, the mycelium is an amorphous mass spread throughout the growth substrate, unrecognizable as a mushroom. An ideal substrate will contain enough nitrogen and carbohydrate for rapid mushroom growth. Common bulk substrates include:[16][18] Pests and diseases[edit] Parasitic insects, bacteria and other fungi all pose risks to indoor production. The sciarid fly or phorid fly may lay eggs in the growth medium, which hatch into worms and damage developing mushrooms during all growth stages. Bacterial blotch caused by Pseudomonas bacteria or patches of Trichoderma green mold also pose a risks during the fruiting stage. Pesticides and sanitizing agents are available to use against these infestations.[16][22] Biological controls for insect sciarid and phorid flies have also been proposed.[23] A recent epidemic of Trichoderma green mold has significantly affected mushroom production: "From 1994-96, crop losses in Pennsylvania ranged from 30 to 100%".[24] Commercially cultivated fungi[edit] Home cultivated shiitake developing over approximately 24 hours. 9-day old Pleurotus ostreatus mycelium. The structure is a network of millions of interweived threads called hyphae. One can also discern individual spores. • Agaricus bisporus, also known as champignon and the button mushroom. This species also includes the portobello and crimini mushrooms. • Auricularia polytricha or Auricularia auricula-judae (Tree ear fungus), two closely related species of jelly fungi that are commonly used in Chinese cuisine. Details of the gill structure of the edible oyster mushroom Pleurotus ostreatus.[25] Production regions in the United States[edit] The borough of Kennett Square is a historical and present leader in mushroom production. It currently leads production of Agaricus-type mushrooms,[27] followed by California, Florida and Michigan.[28] Other mushroom-producing states:[29] • East: Connecticut, Delaware, Florida, Maryland, New York, Pennsylvania, Tennessee, and Vermont • Central: Illinois, Oklahoma, Texas, and Wisconsin 1. ^ a b c d e Chang, Shu-Ting; Chang, S., and Miles, P.G. (2004). Mushrooms, Cultivation, Nutritional Value, Medicinal Effect, and Environmental Impact. CRC Press. pp. 15,17,69,73,139. ISBN 0-8493-1043-1.  3. ^ David Pilz, Randy Molina, Jane Smith and Mike Amaranthus. "Commercially-Harvested Edible Forest Mushrooms: Productivity and Sustainable Harvest Research in the Pacific Northwest".  4. ^ Filip, G. (October 1998). "Harvesting and Marketing Edible Wild Mushrooms".  5. ^ "Washington State Personal Use Mushroom Harvesting Rules". 2006-10-02.  6. ^ "Mushroom Gathering in the Tripod Fire Area Wenatchee National Forests".  7. ^ " commercial website".  8. ^ a b "Cultivating mushrooms in natural logs". Global Village Institute. 1998, 2001.  9. ^ a b Hill, Deborah B. "Introduction to Shiitake: The "Forest" Mushroom. Kentucky Shiitake Production Workbook." (PDF).  10. ^ Davis, Jeanine M. "Producing Shiitake Mushrooms: A Guide For Small-Scale Outdoor Cultivation On Logs.". North Carolina Cooperative Extension Service.  11. ^ "Shiitake and Oyster Mushrooms." (PDF). University of Kentucky College of Agriculture New Crop Opportunities Center.  12. ^ Mudge, Kenneth. "Forest Farming". The Magazine of the Arnold Arboretum 67: 26–35.  13. ^ Shiitake Mushroom Cultivation.  14. ^ Bruhn, J.N.; Mihail J.D. (2009). "Forest farming of shiitake mushrooms: Aspects of forced fruiting". Bioresource Technology 100 (23): 5973–5978.  16. ^ a b c "Crop Profile for Mushrooms in Pennsylvania" (– Scholar search). January 1999 [dead link] 17. ^ a b c d e f g "Six Steps to Mushroom Farming"  19. ^ Baysal, E; Ergün Baysal, Hüseyin Pekerb, Mustafa Kemal Yalinkiliça and Ali Temizb (10 March 2003). "Cultivation of oyster mushroom on waste paper with some added supplementary materials". Bioresource Technology 89 (1): 95–97. doi:10.1016/S0960-8524(03)00028-2. PMID 12676506.  20. ^ Salmones, D; Salmones D, Mata G, Waliszewski KN. (March 2005). "Comparative culturing of Pleurotus spp. on coffee pulp and wheat straw: biomass production and substrate biodegradation". Bioresour Technol 96 (5): 537–44. doi:10.1016/j.biortech.2004.06.019. PMID 15501659.  21. ^ Job D., D. (December 2004). "Use of coffee grounds for production of Pleurotus ostreatus.". Revista iberoamericana de micologia : organo de la Asociacion Espanola de Especialistas en Micologia 21 (4): 195–7. PMID 15709800.  23. ^ Jess, S; Jess S, Bingham JF. (April 2004). "Biological control of sciarid and phorid pests of mushroom with predatory mites from the genus Hypoaspis". Bull Entomol Res 94 (2): 159–67. PMID 15153298.  26. ^ "September is mushroom month in Pennsylvania".  27. ^ Shepphard, Tenopra M. "Mushroom Summary" (PDF).  28. ^ "Mushroom Industry Report (94003)". 
http://en.wikipedia.org/wiki/Mushroom_farm
dclm-gs1-169400000
0.081144
<urn:uuid:1d5149fb-0324-4da9-9082-aff02d1d9ac2>
en
0.977838
Smaller window for position battles Because new CBA calls for fewer practices, coaches' jobs even more challenging Originally Published: July 23, 2012 By John Clayton | Russell Wilson/Matt Flynn/Tavaris JacksonAP Photo/US Presswire/Getty ImagesRookie Russell Wilson, left, free-agent pickup Matt Flynn and incumbent Tarvaris Jackson are all vying for the Seahawks' starting quarterback job. Timing is everything, and the current CBA will alter the ways teams handle position battles. Under the new training-camp-lite CBA, coaches don't have the luxury of two-a-day practices. They have to give players a day off after five consecutive days of practice. That doesn't leave a lot of time to handle major battles at certain positions. Competition is great, but part of this year's training camp is getting that quarterback ready for the opener with fewer practices to get the offense to respond. Normally, coaches like to name their starting quarterback after three preseason games. With the limits on practice time, coaches might name their starter after two weeks, giving the starter the third preseason game to work with the offense before sitting out the fourth preseason game to protect against injury. But it's not out of the question for some coaches to use that starter in the fourth preseason game because his time is so limited with the rest of the starters. The risk of that, though, might not be smart. In 2011, coaches found ways of getting their teams ready for the regular season without the benefit of an offseason program, earning their pay. The new system, though, will be equally challenging. From the inbox Q: With a potential suspension coming for Dez Bryant, a seemingly injury-prone Miles Austin and uncertainty everywhere else in the Dallas receiving corps, would the Cowboys be wise to try and pick up a veteran wide receiver before training camp begins? Jeff in Tulsa, Okla. A: The answer is yes but they don't have to move quickly. If Bryant is suspended, the Cowboys would be devastated at wide receiver. It's the same thing if Austin suffers an injury. They have only two legitimate wide receivers unless you believe totally in Kevin Ogletree. That said, I think they will be wide receiver shopping during camp. Laurent Robinson was the perfect No. 3 wide receiver, but he snagged more than $6 million a year from the Jaguars this offseason. The Cowboys need to find another Laurent Robinson. Q: I'm telling you now you better jump on the Bears' bandwagon. If you think they were impressive at 7-3 after 10 games last season, wait until they are 9-1 or 10-0. Byron in Decatur, Ill. A: I'm already there. I have them making the playoffs as a wild card over the Detroit Lions because I think they had a better offseason than the Lions. They added more weapons on offense, and that will help. I'm not ready to put them over the Packers. The Packers have the deepest receiving corps in football and they have Aaron Rodgers. For the Bears, I'm all-in. Q: I heard Amani Toomer say he believes Tony Romo is better than Eli Manning because of his numbers and his numbers are only slightly better than Eli's. But Romo plays at least eight games in a dome. Eli plays eight in the Meadowlands; could this be the difference? Could you somehow find what Eli's numbers are in a dome? William in Lakewood, N.J. A: After looking at the numbers, the dome factor might not be pronounced enough to show a difference. I still contend the difference is Manning has won eight playoff games in the two years he helped to take the Giants to two Super Bowl victories. Romo has one playoff win during his career. Since 2009, when the Cowboys started playing in a dome, Romo has completed 67.1 percent of 648 passes for an average of 266.85 yards per game. He has 40 touchdown passes and 14 interceptions in those 20 domed games. Manning averaged 367.3 yards a game at home over those three years, completing 61.8 percent of his passes. He threw 76 touchdown passes and 49 interceptions at home. In seven domed games for Manning over that stretch, he completed 62.5 percent of his passes for 275.71 yards a game. Romo completed 63.7 percent of his passes in road games and averaged 258.05 yards. Q: I'm trying to thoroughly understand how the NFL salary cap works after the new CBA. I'm not exactly following everything with the rollover, adjustments and the ability to spend what seems to be in upwards of $20-plus million over the $120.6 million cap set for 2012. Nick in Philadelphia A: Simple explanation. Up until this year, any unspent salary-cap money went in the owners' pockets. There was no carryover. Starting this year, the team has the option to carry over unspent cap money from the previous season. The Eagles, for example, had $17.8 million of unspent cap money at the end of last season. They elected to carry it over to this year. It took their $120.6 million cap to $138.4 million. The Tampa Bay Buccaneers carried over $23.5 million and improved their cap to $144.1 million. Of course, if all that money is spent this year, there will be no carryover. Q: What holes do you expect the Browns to address in next year's draft? Jordan in Washington, D.C. A: With the additions of Trent Richardson, Brandon Weeden and Josh Gordon, the Browns can switch over to defense in next year's draft. They may look at linebackers. They will continue to bulk up the defensive line. They might have to replace Sheldon Brown at corner, since he's 33. They do need Greg Little to step up this season to keep them out of the wide receiver market for another draft. [+] EnlargeGreg Little Andrew Weber/US PressiwireThe Browns need Greg Little to emerge as a legitimate wideout. Q: Is there a way to get around the draft to effectively choose your own future? James in New Orleans A: No. I guess a player can sit out three years after his last year of college eligibility and see if he can get into the league that way, but that's a trap. The league is set up to use the draft as the entry into pro football. I guess a good player could play baseball for three years and then try to get into pro football, but what would those three years in a different sport do to improve his football bargaining clout? He'd be 25 or older and have been away from the game for three years, which would devalue his stock. Q: With all the trouble that the Lions have had and now Cowboys receiver Dez Bryant yet again having issues, why doesn't the NFL say if you have a troubled past you have to clean that up and act like a man before you're allowed to be drafted? Grant in Atlanta A: That's a team's decision, not a league decision. If a player has a troubled past, many teams remove that name from their draft boards. But blocking a player with a troubled past from coming into the league until he cleans up his act would be discriminating. It would expose the league to a lawsuit. Q: I'm old enough to recall a time when players took offseason jobs in insurance or car sales in order to make a reasonable wage for a year. It strikes me that today, with a salary cap in place, a player's personal greed debilitates his team from paying other players, potentially making that team less competitive. The Drew Brees situation comes to mind: a QB demanding more in salary than the accumulated salaries of his starting offensive mates. I'm all for being paid handsomely, but doesn't such a large salary have implications in retaining other players, key or not, and ultimately affect team strength as well as potentially ruffle feathers of teammates? Wouldn't some of these guys better serve their team's chances of winning -- and arguably their own personal success -- by taking a bit less? Kurt in Traverse City, Mich. A: Greed isn't necessarily good for a player in a team concept, but there are a few more dynamics to the equation. By Brees going to $20 million instead of $19 million, it moves the top price for quarterbacks to a higher level and helps the next franchise quarterback looking for a contract. Remember, Brees works with the NFL Players Association. Plus, his demands didn't destroy the Saints' payroll. He was even willing to accept lower cap numbers in the first few years of his contract than the team was offering. That extra room allows more players to stay together on the team. It's a business from the team's side but it's also a business from the player's side. As you would have to admit, it's now big business. John Clayton NFL senior writer
http://espn.go.com/nfl/trainingcamp12/story/_/page/claytoncamp120723/smaller-window-nfl-position-battles
dclm-gs1-169410000
0.021356
<urn:uuid:ad179b65-f087-43bc-bd6f-55d98287e516>
en
0.965498
Veteran Cop Uses &#39;Hookernomics&#39; to Bemoan &#39;Hideous&#39; Local ProstitutesS Alex Teach has been a police officer for 20 years, so he knows what he's talking about when he writes in the Chattanooga Pulse that the area's prostitutes — oh, sorry, I mean the "hideous local specimens" — are BY FAR the ugliest prostitutes in the entire nation, according to a think tank comprised of "a past crew of the Fox television staple Cops." He's using his expertise to bring this to your attention because this is bad for the economy. Yes, this is where his brilliant 'hookernomics' plan comes in: Think: What does it say about the median income of our local populace? It says they are broke, or at least cripplingly cheap customers. When a customer is cheap at a restaurant, they tip poorly. Poor tips mean wait staff quit for better pay elsewhere, and they're replaced by inferior workers. Inferior workers mean customer dissatisfaction and therefore fewer customers patronize the place and the business struggles. You guys, Officer Teach is just being real. "Richard Gere isn't going to be driving by anytime soon in his Lotus to romanticize this dark vocation," he explains. I hope we've all learned something here today. Chattanooga Prostitutes [Chattanooga Pulse] Image via Heather A. Craig/Shutterstock.
http://jezebel.com/5927872/veteran-cop-uses-hookernomics-to-bemoan-hideous-local-prostitutes?tag=Prostitutes
dclm-gs1-169580000
0.6807
<urn:uuid:0e8df66a-73a4-46c3-80f8-dfbe3e925637>
en
0.849762
Take the 2-minute tour × Investigating this sequence led me to the following conclusions: • if $a_{1}\geq 2$ then $a_{n}\geq 2$ and $a_{n}$ is decreasing, thus it converges and is bounded. • if $-1\lt a_{1} \lt 2$ then $a_{n}$ is increasing, thus it converges and is bounded. • if $a_{1}=-1$ or $a_{1}=2$ the sequence is constant and is bounded. • if $a_{1}\lt -1$ then for some $k,~a_{k}\gt 0$ and then we're in one of the previous options. But this seems overly complicated and very long to prove. I thought of trying the following argument: define $f(x)=\frac{4x+2}{x+3}$. We see that $\displaystyle \lim_{x\to \infty}f(x)=4$ and $f(x)$ is continuous in the interval $[0, \infty)$ therefore it's bounded there. Then we show that if $a_{1}<0$ then $\exists N,~\forall n\gt N,~a_{n}>0$ which gives us $a_{n+1}=f(a_{n})$ is bounded. share|improve this question What about a_1 = -11/7? There are an infinite values for a_1 for which a_n = -3 ultimately. –  Aryabhata Nov 21 '10 at 21:02 to make this complete I guess you'd have to specify a value for $a_{n+1}$ for when $a_n = -3$. –  Zarrax Nov 21 '10 at 23:14 @Zari: Yes. I suggest $a_{n+1} = 2$ if $a_{n} = -3$ :-) –  Aryabhata Nov 22 '10 at 2:22 A natural move would be to complete $\mathbb R$ by one (!) point at infinity and for $a_n=3$ define $a_{n+1}:=\infty$, $a_{n+2}:=4$. –  Christian Blatter Nov 22 '10 at 10:33 add comment 4 Answers up vote 2 down vote accepted You can formalize what you're doing by showing that $-1 \leq a_{n+1} < 4$ whenever $a_n \geq -1$. So once you get an $n$ such that $a_n \geq -1$ you're done. If some $a_n < -3$, your recursion gives $a_{n+1} > -1$ and you're in the above situation. The only remaining option is that $-3 < a_n < -1$ for all $n$... but then the sequence is still bounded. So you're done. share|improve this answer This is what I tried but couldn't show it. For example: if $a_{1}\lt 3$, how do I show that there's some $a_{k}\gt -1$? –  daniel.jackson Nov 22 '10 at 20:16 if $a_n < -3$ (I assume that's what you mean), then the condition that $a_{n+1} > -1$ is equivalent to ${4a_n + 2 \over a_n + 3} > -1$, which in turn is equivalent to $4a_n + 2 < -(a_n + 3)$, which in turn is equivalent to $5a_n < -5$, which is true since $a_n < -3$. So if any $a_n < -3$ then $a_{n+1} > -1$. –  Zarrax Nov 23 '10 at 0:37 add comment Write $a_n={2+b_n \over 1-b_n}$. Then $b_{n+1}={3\over5} b_n$. This implies $\lim_{n\to\infty} b_n=0$ and $\lim_{n\to\infty} a_n=2$, unless $b_n=1$ for some $n\ge0$. This is the case if $b_0=(5/3)^k$ for some $k\ge0$. In addition there is the fixed point $a_0=a_1=\ldots=-1$ which is not covered by this "Ansatz". share|improve this answer Wow, your first line is a very clever trick; how did you come up with it? –  ShreevatsaR Nov 22 '10 at 12:35 @ShreevatsaR: The Moebius transform $f(x):={4x +2 \over x+3}$ is at stake here. It has the two fixed points 2 and -1. So I introduce the new coordinate variable $t:={x-2\over x+1}$. In terms of $t$ the map $f$ has the form $\tilde f(t):={3\over 5} t$. –  Christian Blatter Nov 22 '10 at 13:21 add comment What about $a_1 = -3$? The function don't even exists there. Anyway, your argument is valid: if $a_n = f(n)$ and $\lim_{x\to \infty} f(x) = L$ then $\lim_{n\to \infty} a_n = L$. You never care about the first terms of the sequence, because when you've convergence to the infinity, you can just pick a maximum value and set it as limit. For example, if your sequence converges to 4, you can set a bound as $\max (4, a_1, a_2, ..., a_k)$ for any k you like. share|improve this answer Your second sentence, though correct, is misdirecting. One would be tempted to think $f(x)=\frac{4x+2}{x+3}$, but taking the limit as $x\rightarrow \infty$ gives 4, while the limit of the $a_n$ is 2. –  Ross Millikan Nov 21 '10 at 15:31 add comment Your last argument is sound. If you know that the terms are bounded over $[0,\infty)$, (or any interval, for that matter) that iteration doesn't take it out of that interval, and that all starting values eventually enter that interval, the terms are bounded. As AkiRoss says, prepending terms cannot change the bounded nature, it only changes the bound. share|improve this answer add comment Your Answer
http://math.stackexchange.com/questions/11210/how-can-i-show-the-sequence-a-n1-frac4a-n2a-n3-is-bounded-for-ev
dclm-gs1-169690000
0.866882
<urn:uuid:1325d3da-feaa-4381-8e76-84e3aed0db13>
en
0.782557
Take the 2-minute tour × Are the languages generated by the regular expressions $(a + b)^*$ and $(b^*a^*)^*$ the same language? The solution for this problem is yes, but I couldn't figure out why it is true. The first regular expression $(a + b)^*$ generate all strings over alphabet $\{a, b\}$, it makes sense to me. On the other hand, how does the second regular expression generate, say, the string $abbb$? From my understanding, the order of the concatenation of $b$ and $a$ does affect the result of *. Any idea? Thank you. share|improve this question $(b^*a^*)^* \to (b^*a^*)(b^*a^*) \to (\epsilon a)(bbb \epsilon) \to abbb$. –  Rahul Aug 16 '11 at 14:50 @Rahul Narain: Grea thanks ;)! Would you mind writing it as an answer so that I can accept it. –  Chan Aug 16 '11 at 14:52 In my view, Dave Radcliffe's post already answers the question; my comment just applies it to one example. –  Rahul Aug 16 '11 at 14:55 add comment 3 Answers up vote 5 down vote accepted The Kleene star * allows zero or more repetitions. share|improve this answer add comment Simple enough - remember that $b^*=\{\varepsilon, b, bb,\dots\}$ so you can think of this as $(b^* a^*)^* =((b^* )+(a^* ))^*$ share|improve this answer I still don't get it. Your interpretation make me feel like the concatenation is actually the union. It would be great if you can generate the string $abbb$ from that regular expression. Thank you. –  Chan Aug 16 '11 at 14:43 I'm not sure how you denote generation from a regexp, but the general idea is this: (b*a*)*--> (b*a*)(b*a*) -->(eps a)(b eps)=ab. –  Gadi A Aug 16 '11 at 15:07 add comment $$b^* = \{\varepsilon,b,bb,\ldots\}$$ $$a^*=\{\varepsilon,a,aa,\ldots\}$$ we have to prove $(b^*a^*)^* = (b + a)^*$ and we know $b+a=a+b$ $b^*a^*=a^*$ if we take $b^*=\varepsilon$ string can start with $a$ u can see or $\varepsilon$ $b^*a^*=ba^*$ if we take $b^*=b$ string can start with $b$ u can see $b^*a^*=ba^*$ if we take $b^*=bb$ string can start with $bb$ ucan see and so on $b^*a^*=bbbbbb.....a^*$ and if do the same thing with a then $b^*a^*=b^*$ if $a^*=\varepsilon$ can ends with $b$ and $\varepsilon$ $b^*a^*=b^*a$ if $a^*=a$ can ends with $a$ and so on b$^*a^*=b^*.aaaaaaaaaa......$ $(b^*a^*)^*=(b^*a^*).(b^*a^*)$ now we have $(b^*a^*)^*$ we can say any string starts with $\varepsilon$ or $a$ or $b$ and ends with $\varepsilon$ or $a$ or $b$ and have any combination of $a$ or $b$ or both so we can say that $(b^*a^*)^*=(b+a)^*$ or $(a+b)^*$ or go with this now $b^*$ has $\varepsilon$ thats why when concatnated with $a^*$ ,$a$ can come first means if we take one value from $b^*$ which is $\varepsilon$ then $(\varepsilon.a^*)^*=(a^*)^* .......1$ and if we take $a^*=\varepsilon$ then $(b^*\varepsilon)^*=(b^*)^* ........2$ and $(a^*)^*=a^*.a^*=a^*.(a+\varepsilon)^+$ ...from $1$ and $a^*=(a+\varepsilon)^+$ share|improve this answer For some basic information about writing math at this site see e.g. here, here, here and here. –  Julian Kuelshammer Feb 19 '13 at 13:20 add comment Your Answer
http://math.stackexchange.com/questions/57833/do-these-two-regular-expressions-a-b-and-ba-generate-the-same
dclm-gs1-169740000
0.036708
<urn:uuid:c1e351f1-86cb-4d34-9d78-8e7f827d9658>
en
0.920731
Local BBC Sites Tell your History of the World A History of the World BBC Your objects can help tell A History of the World A brand new collaboration between the BBC and the British Museum began on Monday 18th January. The idea is to create a digital museum, and the project is called A History of the World. As well as telling the stories behind 10 objects chosen from museum collections around the county, BBC Radio York will also be telling the stories behind your objects. We'd like you to get in touch and include the following information: • A brief description of your object and the story behind it and ideally attach a picture of it • Your contact details (name, phone number and email address) • Email us: [email protected] York and North Yorkshire's 'top ten' objects Museums in York and North Yorkshire have chosen objects from their collections to tell the history and story of North Yorkshire, for A History of the World. Halifax Bomber, Yorkshire Air Museum As long as it's man-made and tells a story any object can be included They include an Egyptian mask of the god Anubis dating from around 500 BC, from the amazing collection of the Kent family from Harrogate, and the only complete Halifax bomber from World War II which is the result of a huge restoration project. Find out about all 10 of York and North Yorkshire's objects here. Your object must be man-made and should tell a story about history, people and places - something that could tell future generations about North Yorkshire and its connections with the rest of the world. You can also submit your objects to the central History of the World website where they could become part of the digital museum. Please tell BBC York & North Yorkshire about them too by emailing us. BBC navigation Americas Africa Europe Middle East South Asia Asia Pacific
http://news.bbc.co.uk/local/york/hi/people_and_places/history/newsid_8466000/8466321.stm
dclm-gs1-169810000
0.19274
<urn:uuid:5ddf7cdf-5854-4e95-a2ec-8cb2b7ea2739>
en
0.870098
CBS2-Header-Logo WFAN 1010WINS WCBS tiny WLNYLogo Molly Snyder Valley Stream Target Store Workers Reject Unionization Workers voted 137-85 against unionization. A “yes” vote would have made the Valley Stream store the first Target in the country to be unionized.
http://newyork.cbslocal.com/tag/molly-snyder/
dclm-gs1-169840000
0.429999
<urn:uuid:57a21aab-a2da-449d-8019-5452ca7b6013>
en
0.938316
Welcome login | signup Language en es fr Forum Post: Obamacare didn't do that! Posted 1 year ago on Aug. 24, 2012, 11:01 a.m. EST by JackHall (439) This content is user submitted and not an official statement Mainstream media may tell us that voters are leaning toward the Romney and Ryan plan to repeal Obamacare. What the mainstream media won’t tell us is where the United States stands in public healthcare and quality of life. What is the problem with US healthcare? The statistics for healthcare speak loudly. The United States spends more per capita on healthcare than any other country. Almost twice as much as the next country, Norway. Are we twice as healthy as the rest of the world? No.Wikipedia and CNN report our life-expectancy ranks 38th. The CIA Factbook ranks our life-expectancy at 50th. Our infant-mortality or survival rate is ranked at 34th. These numbers must be acceptable to those who want to repeal Obamacare. Being in 34th, or 38th or 50th place in health services places us far behind the European Union, Japan, Indonesia, Virgin Islands, Puerto Rico, Cayman Islands, Bosnia-Herzegovina and dozens of other countries. Healthcare for profit is the problem. There is the illusion that free enterprise made America great. The flagships of the American economy had been capitalism, credit and consumerism. The American automobile industry is ailing. The financial sector is hobbled by fraud, deregulation, incompetence and corruption. And so is the US healthcare system. The US spends over $2 trillion annually for healthcare and yet millions of Americans have no healthcare coverage at all. FDR observed that economy of an industrial nation was too complex to be left to a few private interests and unregulated. The US healthcare statistics are the results of private enterprise managing our healthcare system. Republicans are saying it’s alright to spend more than twice the world average for healthcare and have our services ranked no higher than 34th place. Our first step toward healthcare reform is Obamacare and Republicans don’t even want that. Difference between the price and performance of the US healthcare system is profit. This is a healthcare system Wall St would be proud of. We can afford it and must do better. Future generations depend on it. The economy of the United States is the world's largest national economy. Its nominal GDP was estimated to be over $15 trillion in 2011, approximately a quarter of nominal global GDP. Its GDP at purchasing power parity is the largest in the world, approximately a fifth of global GDP at purchasing power parity. The U.S. economy also maintains a very high level of output. The U.S. is one of the world's wealthiest nations with per capita GDP (PPP) of $48,450, the 6th highest in the world. The U.S. is the largest trading nation in the world. Its four largest export trading partners are as of 2010: Canada, Mexico, China, and Japan. The economy of the United States is a mixed economy and has maintained a stable overall GDP growth rate, a moderate unemployment rate, and high levels of research and capital investment. It has been the world's largest national economy (not including colonial empires) since at least the 1890s. Most of the economy is classified as services. As of 2012, the country remains the world's largest manufacturer, representing a fifth of the global manufacturing output. Of the world's 500 largest companies, 133 are headquartered in the United States. This is twice the total of any other country. About 60% of the global currency reserves have been invested in the United States dollar, while 24% have been invested in the euro. The country is one of the world's largest and most influential financial markets. Foreign investments made in the United States total almost $2.4 trillion, which is more than twice that of any other country. American investments in foreign countries total over $3.3 trillion, which is almost twice that of any other country. Total public and private debt was $50.2 trillion at the end of the first quarter of 2010, or 3.5 times GDP. The proportion of public debt was about 0.9 times the GDP. Domestic financial assets totaled $131 trillion and domestic financial liabilities totaled $106 trillion. As of 2010, the European Union as a whole was the largest trading partner of the U.S., whereas Canada, China, and Mexico were the largest individual trading nations. The labor market in the United States has attracted immigrants from all over the world and its net migration rate is among the highest in the world. The United States is one of the top-performing economies in studies such as the Ease of Doing Business Index, the Global Competitiveness Report, and others. We have nothing to fear but fear itself. It’s more important to establish universal healthcare as brave pioneers than to profit from not covering the healthcare needs of our citizens. Life Expectancy CNN http://www.cnn.com/2011/HEALTH/06/15/life.expectancy.united.states/index.html [right click] Life Expectancy CIA https://www.cia.gov/library/publications/the-world-factbook/rankorder/2102rank.html [right click] Healthcare expenditures per capita http://en.wikipedia.org/wiki/List_of_countries_by_total_health_expenditure_(PPP)_per_capita [right click] Life_span country wikipedia http://en.wikipedia.org/wiki/List_of_countries_by_life_expectancy [right click] Why are healthcare costs so high in USA http://www.youtube.com/watch?v=fgxGOOZBzvg [right click] Read the Rules
http://occupywallst.org/forum/obamacare-didnt-do-that/
dclm-gs1-169850000
0.05193
<urn:uuid:95e6fd77-c5c4-479d-941f-e1781512eca9>
en
0.88399
Engineering the Mind No contemporary philosopher has tried harder to demystify the mind than Fred Dretske. But how to demystify it without eviscerating it? Can consciousness be explained? Many philosophers think that no matter how detailed and systematic our knowledge becomes of how the brain works and how it subserves mental functions, there will always remain an "explanatory gap." Call it a brute fact or call it a mystery, trying to explain consciousness, they think, is as futile as trying to explain why there is something rather than nothing. Dretske is not exercised by the explanatory gap-he'd rather exorcise it. He thinks we can get all the explanation we need by understanding what consciousness does. Consciousness is at bottom sensory experience and what it does, essentially, is to represent the world. Explaining consciousness, therefore, comes down to understanding the representational character of experience. Keywords No keywords specified (fix it) Categories (categorize this paper)  Save to my reading list Follow the author(s) My bibliography Export citation Find it on Scholar Edit this record Mark as duplicate Revision history Request removal from index Download options PhilPapers Archive External links •   Try with proxy. • Through your library Configure Similar books and articles Monthly downloads Added to index Total downloads 50 ( #26,606 of 1,018,154 ) Recent downloads (6 months) 1 ( #65,321 of 1,018,154 ) How can I increase my downloads? My notes Sign in to use this feature Start a new thread There  are no threads in this forum Nothing in this forum yet.
http://philpapers.org/rec/BACETM-2
dclm-gs1-169890000
0.028471
<urn:uuid:3611d193-f66f-4162-8f7d-101f6a75af47>
en
0.960469
where the writers are The Librarian's Daughter I spent a lot of time in the library as a kid.  My mom would drop me and my brother off for an hour on a Saturday morning while she did the grocery shopping and I'd poke around happily, amassing a stack of reading. She left a job teaching ninth grade English to get a Library Science degree, so then I was able to hang out in libraries as she worked a series of temporary jobs.  Eventually she landed at a middle school library in Flint, where I learned to shelve books, file cabinet cards, and sample life behind the librarian's desk. I have the utmost respect for librarians.  In fact, it borders on awe.  When I discovered that San Francisco has a "Little MagaZine Collection" -- a zine library -- I was obsessed by the prospect that my little labor of love could be part of a library's permanent collection. And now it is:  http://sflib1.sfpl.org/search~S1?/Xmorbid+curiosity&SORT=D/Xmorbid+curio... I had to give up one of my copies of Morbid Curiosity #2 so they could have a complete collection, but it's worth it.  I'm excited to have my babies treated so seriously. While I was finding the zine listing, I came across the SFPL's listing for Morbid Curiosity Cures the Blues.  Oh, man, they have ordered so many copies of the book!  I can't express how happy that makes me feel. In the past, I measured success by seeing my magazines on the stands of bookstores.  Now, my new measurement is to find it in a library collection. I think it would make my mom proud.
http://redroom.com/member/loren-rhoads/blog/the-librarians-daughter
dclm-gs1-170020000
0.038988
<urn:uuid:77a92ab6-d0f7-4354-b810-cc37cb1b6a2d>
en
0.967391
Seeking Alpha Seeking Alpha Portfolio App for iPad Profile| Send Message| (56,903)   (Click to enlarge) Have you hear of the Titanic Signal? I hadn't either until this morning, when I read this article from McClellan Financial that had this chart which shows the times (down arrows) in the past 30 years that the number of new 52-week lows exceeds the number of new highs on the NYSE within 7 trading days of a major market high. Sound confusing? It's not, essentially what it's looking for is a broad sell-off where smaller amounts of stocks are propping up the indexes. That's something we pay attention to all the time in Member Chat (on an intra-day basis), so it's nice to know it makes enough sense to have a name amongst top-notch TA people like McClellan (yes, there are a few I respect). Per their analysis: The top chart shows all of the instances since 1984 of these preliminary sell signals firing off. You can see that they do tend to cluster around major tops, but they also seem to cry "wolf" a lot at other times when an uptrend continues. Ohama noticed that too, and so he added further criteria to constitute what he called "additional evidence". He wanted to see NL exceed NH for 4 out of 5 days, plus NH declining to less than 1.5% of total issues, and finally to have the DJIA (or SP500) decline for 4 out of 5 days. We now have 2 out of those 3 criteria met, but have not seen the DJIA or SP500 drop for 4 of 5 days. As we know, we're also getting scary signals from the "Hindenburg Omen," which has some similar criteria to the Titanic Signal and John Bollinger, who created Bollinger Bands, has a good way of describing both of these indications. Rather than thinking of them as "signals", it is perhaps better to think of them as "alerts". Each can be useful for getting one to pay more attention to bearish signs in other charts and indicators, even as one retains the knowledge that it could turn out not to lead to a big selloff every time. Source: Are We Getting Tremendous Or Titanic Market Signals?
http://seekingalpha.com/article/1502152-are-we-getting-tremendous-or-titanic-market-signals
dclm-gs1-170060000
0.187521
<urn:uuid:31e5cef9-e90d-4474-92bb-021cec171f0d>
en
0.953366
Forgot your password? Comment: Re:Aging workforce (Score 3, Interesting) 629 by Panaflex (#45536815) Attached to: Ask Slashdot: Are We Older Experts Being Retired Too Early? I disagree. Having worked in everything from multinational companies to 3 man start-up companies I think I've seen quite a bit of the dev world. I think a well balanced team usually consists of older and younger developers myself. What you want to avoid as a manager is encouraging cliques and age-based group stratums. Socially people will naturally tend to separate by age somewhat, but by spreading your experienced devs in with the less experienced you create new niches and groups that center around productive aspects such as projects, platforms, and responsibilities. A few tricks I've used is allow developers to volunteer for project milestones. This gives you good cross-communication setup between project and age groups and allows devs to find their fit if you structure your projects right. Another trick is to encourage creativity and social rewards. Having code meetings where the entire crowd gets to work through some code together. Each meeting, a different person or team brings part of their project to present and explain their design choices and algorithms for the rest of the team. The team gets to learn a bit, and also can positively (or occasionally negatively) critique the code and look for problems. This can work across projects and departments as well. You need to encourage social activities across groups as well, but be careful not to cut into outside time too much. Older devs generally have lives outside of work. So limit your after-work socializing and instead encourage innovative activities with 15 minute coffee breaks together or an after-meeting walk. If you're having problems motivating older developers then it's quite likely that you're not building, managing and deploying your experience properly. You need to do more than toss them in a cube with a set of project milestones. Younger people will do better in that environment if only because they will have more time to sacrifice. Older people have already done their "lone wolf" time, and generally expect better management and organization. They expect resources to get the job done efficiently and want to be learning and mentoring, not just chugging out LOC. Most of them won't complain as devs tend to be introverts for the most part. If you want productive feedback then you need to empower groups with responsibilities beyond milestones. They need to have time to evaluate and analyze. They need to have time to go over designs and understand, give input, and have their input rewarded. The secret is to create balanced work environments that allow your workers to be both productive and growing. Having static organizational structures that boxes devs into platforms and languages for years creates experience lags and power bubbles. Having work/slave relationships creates revolving doors. Having loose organizations creates deadline creep and project failure. In the end, there are plenty of organizations successfully employing developers into retirement age. What you want is an organization that manages goals and expectations by delegating work to teams that are organized with mixed experience and socially rewarded for meeting deadlines. Management should be open to criticism and giving out criticism when necessary. Teams should as well. Lastly, realize that most developers aren't strictly motivated by dollars. Most people are far more motivated to work towards a goal when the reward is linked with their goals and creativity. Developers need to have the room to try things and fail at them, refine and build on those experiences. If you build that into your development process then you will reduce product and project failures enormously. Anyway, just my ramblings... Comment: Re:It won't fit (Score 2) 245 by Panaflex (#45294691) Attached to: Ars: Cross-Platform Malware Communicates With Sound I think the article is complete bollocks, but simple basic DSP isn't that difficult if you use a simple codec. Hell, even a morse code type system with basic CRC checking wouldn't take more than 16k. It doesn't have to deal with echo (high frequency is rather directional), it doesn't have to deal with doppler (few moving objects), and it's obviously a secondary communications channel. The thing that gives it away for me is that something could embed so deeply without being detected, as USB and networks are heavily scanned these days. I have written plenty of kernel code, bios code and the like. The effort to get such perfect code running without causing crashes or being detected on the network would be enormous. If it's at all possible, it would certainly require government level funding. I'm not saying it isn't possible - but it's just very, very unlikely. by Panaflex (#45147547) Attached to: Book Review: Secret History: the Story of Cryptology Use /dev/random and Monolith... dd from random into a file the same size as your cleartext, use Monolith to xor the files into a third file, secured file. The random file is essentially your key, so it must be kept separate from your secured file to be safe. Comment: Re:I've been working on RSA for over ten years... (Score 1) 282 by Panaflex (#44494549) Attached to: Math Advance Suggest RSA Encryption Could Fall Within 5 Years Thanks for that, I found it separately also, and read a few of the papers referenced. I tend to agree that this madness is a bit overblown. Reducing the time by 15% is really impressive overall, but when our anticipated sieving times for a typical 2k-4k keysize are measured in months and years that isn't a huge difference. by Panaflex (#44494053) Attached to: Math Advance Suggest RSA Encryption Could Fall Within 5 Years Okay, here's the slides from a talk: And a paper which is related: Basically, from my first read, this is just a better sieve, a system which should find smooth numbers faster by choosing better starting points and using faster tests. I wouldn't call it a general break in RSA, and while it might certainly be a better sieve than GNFS, it's no silver bullet either. I can't imagine anyone breaking RSA numbers like this unless they're very well funded. Comment: I've been working on RSA for over ten years... (Score 3, Interesting) 282 by Panaflex (#44492005) Attached to: Math Advance Suggest RSA Encryption Could Fall Within 5 Years I'm surprised to see other people going in the direction I've been going for about 3 years now. Really. I thought I was quite alone in my path, LOL. I need to read this paper still, but if it's taking the same path I did, then it's not a peachy as some think. I'm only am amateur, so take this from the point of view as someone who kicks back with a beer and enjoys solving impossible computational problems. I don't think it's that close to being broken... I think it'll take a huge computing effort (think multi-terabyte databases) to generate the tables across the PQ space required so that existing problems can be used to quickly find paths and intersections. At the beginning you're looking at only a VERY SMALL speedup from modern sieving, but once the tables get generated (years of effort) you'll eventually see faster and faster improvements. At least, that's with my algorithm, which I'm sure is far from perfect and only works on a certain set of primes right now. Which is about 20%. Which is far from optimal. So yeah, progress. But I'm unconvinced that this will work for all primes. I'm going to read the paper now... which I'm sure is far better than what I've been doing. Comment: Re:Cheaper Options.... (Score 1) 251 by Panaflex (#44429033) Attached to: Ubuntu Edge Smartphone Funding Trends Low Not really... people all over the world buy cellphones and import them for a massive price hike all the time. I really doubt that Canonical would advance a vaporware phone. They've got a huge interest in going mobile with Ubuntu Touch, and the hardware designs already exist. There's nothing new here other than a particular mix of existing tech and a contract manufacturer. Going for a prestigious custom design to show off their software looks much better than the 50$ chinese knockoff that the carriers will likely fund. Comment: Re:Shuttleworth (Score 2) 251 by Panaflex (#44428913) Attached to: Ubuntu Edge Smartphone Funding Trends Low Will the Ubuntu Edge be sustainable and/or hardware hackable? What networks are supported? So no locked bootloader, but you will likely have to live with binary blobs also (like 99% of phones out there). Comment: Re: You can't avoid piracy (Score 1) 298 Seriously - listen up to this. You need to be posting videos, extra articles, guest articles and all things awesome online. You need to talk up your online swag in your magazine and make it part of the experience. And you want it to be part of the total experience of owning the magazine. Indispensable in other words. Computer programs expand so as to fill the core available.
http://slashdot.org/~Panaflex/tags/plantkiller
dclm-gs1-170120000
0.594666
<urn:uuid:1c72b361-5183-4372-a60e-dbfabd187826>
en
0.952604
Forgot your password? Comment: Re:Why do we have all these custom PRNGs? (Score 1) 138 by petermgreen (#46485859) Attached to: Weak Apple PRNG Threatens iOS Exploit Mitigations IMO there are a few problems 1: As you say lack of sufficient eduaction on what random and urandom do 2: linux doesn't have a middle of the road option. /dev/random is overly paranoid allowing the output to be blocked if it estimates there is less enropy coming in than going out. /dev/urandom is overly loose not blocking even if the system has never gathered enough entropy to give reasonablly secure randomness. What you really want for most crypto purposes is something that will wait for sufficient seed data before starting but that will free-run after that. 3: Sometimes the overall system design means there is no good option, you either proceed with dubious randomness or you hang forever. Comment: Re:all PRNGs are deterministic (Score 4, Informative) 138 by petermgreen (#46484235) Attached to: Weak Apple PRNG Threatens iOS Exploit Mitigations For a CSPRNG* the primary aim is to make it computationally infeasable for an attacker to predict the output even if the attacker has an aribiterally long sample of the output and even if the attacker knows how much output has been requested from the prng since it started. To do this places demands on both the prng itself (it must be computationally infeasible to reverse the operations done by the prng and hence determine it's internal state from an output sample) and on the seed data fed into the prng (it must be sufficiently unknown/unpredictable to the attacker that the attacker can't obtain the seed state through a combination of his knowlage of the state of the system and brute force checking of different seed values) Afaict it is the latter where things usually go wrong. * Cryptographically secure psuedo-random number generator. Comment: Re:Hmm (Score 1) 185 I mean, just look at the devastation non-native species are causing in various nations. They certify they can contain these creatures forever and ever? Notice that it's small animals being invasive while the megafauna are often endangered even on their home ground? Megafauna move slowly, breed very slowly and are easy to spot. So it's pretty easy to hunt and kill them at a rate much faster than they can breed. Comment: Re:Reassembling the Soviet Union (Score 1) 302 by petermgreen (#46481325) Attached to: Russia Blocks Internet Sites of Putin Critics What is the upside of existence of Ukraine as separate state? And any other national state for that matter.. The larger an empire gets the less representation each citizen of that empire has and the harder it gets to topple corrupt rulers. It can also mean that entities just outside the empire come under a lot of pressure to become part of it (in turn making the empire ever larger and more powefull). Which I get the impression is the big problem for ukraine. It's presumablly very difficult to find compromises in politics when one side wants to be part of the russian block, the other side wants to be part of the EU and being part of the two is mutually exclusive. Comment: Re:Reassembling the Soviet Union (Score 2) 302 by petermgreen (#46481203) Attached to: Russia Blocks Internet Sites of Putin Critics Putin’s long game? Meet the Eurasian Union [bostonglobe.com] Putin aside I can see why the russians would not much like the idea of going from being the dominant force in a block to being the ones stuck just outside it * buy a £20 item, pay £4 VAT plus £10 fee for collecting the VAT is the sort of experiance i've had when buying from outside the EU. ** Strictly speaking it's the schengen area rather than the EU per-se but there are only a handful of countries that are in one but not the other. Comment: Re:A 25% increase is ridiculous (Score 1) 271 by petermgreen (#46480701) Attached to: Amazon Hikes Prime Membership Fee At 100/year its still a steal if you order a lot (I've ordered furniture from amazon using Prime... 2 day free shipping on a desk? Sectional couch? TV? I wonder how much more the two day shipping really costs them than the standard free shipping. To an extent if a lot of people buying the struff have prime subscriptions I would expect them to just build the cost of said two day shipping into their prices. Comment: Re:That's nice - but it's based in the US (Score 1) 329 by petermgreen (#46476015) Attached to: 1GB of Google Drive Storage Now Costs Only $0.02 Per Month at least on paper... And therin lies the problem, if a megacorp whose headquarters are in the US is given the choice between handing the data over to the US government (and hence breaking EU law but probablly not being punished for it since the EU government won't know it happened) or refusing to hand the data over and getting punished by the US governemnent for doing so which do you think they will choose? Comment: Re:OIF-MSA-100GLH = 1.2Tbs bidirectional via 24MPO (Score 1) 101 by petermgreen (#46473877) Attached to: Intel Rolling Out 800Gbps Cables This Year Over long distances your main costs are the fiber and optical amplifiers, so fancy tricks at the transmitter and receiver to get more out of said infrastructure make a lot of sense. Over short distances the fiber is a smaller part of the overall cost and so it's often cheaper to just lay more fiber than to bother with the fancy tricks. Comment: Re:Why not massively subsidize the Solar Industry? (Score 1) 707 Per watt of what? Per watt of maximum production of the panels under unrelistic condions used in the vendors datasheet? Per watt of maximum production of the panels on a real site? Per watt of average production of the panels on a real site? Per watt of expected production at the time the grid needs the power most*? * This is especially a problem in cooler climates where the peak load is heating rather than aircon. Comment: Re:Replaced by what? (Score 1) 707 Oil prices are vastly different than oil costs for most oil producers. We need to worry, then, only of beating oil prices Prices in a competitive market are driven by costs BUT it's not the average costs that matter, it's the marginal costs. If demand exceeds supply then the price will rise, the rising price will have two affects, firstly it will decrease demand, secondly it will cause sources that were previously non-viable to be brought online, this will bring the market back into balance. Similarly if supply exceeds demand then prices will fall causing sources that were previously viable to become non-viable and also increasing demand and brining the market back into balance. Of course in both cases there are time delays and hence inherent instability. on both the supply and demand side so short term fluctuations are inevitable. So if you want to drive out the majority of use of resource x you have to beat the cost of the majority of production of that resource to drive down the price of the resource to where the majority of production is non-viable. Comment: Re:Interesting parallel (Score 1) 132 by petermgreen (#46468173) Attached to: US Court Freezes Assets of Mt. Gox CEO Makes me wonder why people in say, EVE, aren't held liable or arrested for sweeping in and taking over an entire faction and claiming everything as their own. Eve online is a game, participents in the game knew or should have known that anything in the game is subject to the rules of the game and the whims of the games owners. They also knew or should have known that they were forbidden from exchanging those in-game "assets" for anything outside the game. MT gox traders on the other hand have put their money and bitcoins in trust with the exchange so they can trade them with each other more easilly. The exchange has broken that trust either by stealing the bitcoins themselves or by incompetently allowing large scale heists. Comment: Re:Comcast's DNS has been spotty for a while (Score 1) 349 by petermgreen (#46468125) Attached to: Crowdsourcing Confirms: Websites Inaccessible on Comcast which pushes the cost onto innocent third party service providers The records higher up the chain (e.g. on the root and tld servers) can still have long ttls and be cached appropriately even if the records at the bottom of the chain have short ttls. so the only person it's really "pushing costs on" is the end users dns provider (usually thier ISP). The fact that google give away dns service for free without trying to inject any advertising makes me think that the "costs being pushed" onto the users ISP are pretty trivial. primarily, that it redirects based on where the user's DNS resolver lies, which may be on the opposite side of the country from the user That is certainly a disadvantage, more so for some sites than others (if you only have a handful of locations per continent then it's probablly not going to make much difference for you). There are proposals to fix this issue but it will take time for them to be adopted. For web-based traffic, properly implemented redirects are typically the best option. Redirects are a good choice for downloads and possiblly videos (for videos custom page generation also seems to be a common soloution) but if you try and use them for pages you will end up with users storing permanent references to individual servers in their bookmarks and you also have the problem that you have to serve the redirects from somewhere (which brings us back to the problem of poor retry handling). IMO these issues make redirects an unacceptable soloution for geographic detection and fallback with web pages. For other services with a dedicated client, there are much better options that can be implemented, and can also provide a much better user experience. Agreed if you have a dedicated client you have a lot more options.
http://slashdot.org/~petermgreen
dclm-gs1-170150000
0.773876
<urn:uuid:af9fb712-cb83-46a5-8ca8-1351e2745aa3>
en
0.760149
Take the 2-minute tour × I have fetched friend list from facebook using below code: $session = $facebook->getSession(); if ($session) { $uid = $facebook->getUser(); foreach ($friends as $key=>$value) { echo count($value) . ' Friends'; echo '<hr />'; echo '<ul id="friends">'; foreach ($value as $fkey=>$fvalue) { echo '<li><img src="https://graph.facebook.com/' . $fvalue->id . '/picture" title="' . $fvalue->name . '"/></li>'; echo '</ul>'; I have one query that I have fetched friend list from facebook using this API, but I have one input box where I have type john then this friend list should contain list of friends whose name is 'jhon'. How can I implement this functionality in existing code? share|improve this question add comment 3 Answers What I do is store the friends names and user_ids in a table and update the table on fresh logins. So from there we can make an autocomplete endpoint that we hit through ajax. SELECT * FROM `user_contacts` WHERE `name` LIKE "%{$name}%" AND `user_id` = "{$user_id}" We take the results of this query and json_encode it where we can pass this data straight into jquery ui autocomplete. Seems to work well, however user_contacts table can fill up relativly quickly depending on how many Facebook users you have. I'm not 100% on Facebooks T&C's for storing this data so its worth looking into. share|improve this answer add comment Get the function in_array, you can pass the array and the String you search for. share|improve this answer add comment Here's a project that does something like what I think you're after: http://www.devthought.com/2008/01/12/textboxlist-meets-autocompletion/ This available in both Mootools and jQuery versions if I remember correctly. share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/10309469/want-to-get-list-of-facebook-friends-with-search-friend-functionality/10315414
dclm-gs1-170210000
0.78357
<urn:uuid:ecadd972-765d-4050-b9cf-793e32c7eb3a>
en
0.820421
Take the 2-minute tour × How would I do this but using Graph API to grab locale and display content based on country?. FB.login(function(response) { if data.get('user').get('locale') = "en_GB" { $("#footer a").text("URL HERE"); share|improve this question add comment 1 Answer up vote 0 down vote accepted If you're using the facebook javascript sdk for authenticating the user, then you get a signed request for the user, as it states in the signed request guide: When using the JS SDK for authentication, the authResponse object contains a signed_request property which is used to transfer information about the authenticated user. The signed request has the user field which is: You should get the locale value even if the user hasn't authenticated your app so that you could show content that matches it. You have a few ways to get the authResponse, the most basic of which is to use FB.login, like so: FB.login(function(response) { if (response.authResponse) { else { share|improve this answer Would you happen to have an example based on the JS above please?. –  user1381806 May 10 '12 at 10:59 Added to my answer –  Nitzan Tomer May 10 '12 at 11:27 Then I need to use FB.api to grab locale? e.g FB.api('/me', function(response) { alert('Your name is ' + response.name); }); –  user1381806 May 10 '12 at 12:46 No, you don't need to use FB.api, it's enough to just get the authResponse using FB.login, FB.getLoginStatus or FB.getAuthResponse. –  Nitzan Tomer May 10 '12 at 12:47 Oh so, authresponse then use jquery to run functions based on locale location? –  user1381806 May 10 '12 at 12:54 show 4 more comments Your Answer
http://stackoverflow.com/questions/10532165/facebook-ui-grab-locale-location
dclm-gs1-170220000
0.983499
<urn:uuid:506d2ab6-1474-492e-8b16-eee00c201be6>
en
0.889467
Take the 2-minute tour × I got something here I need to have another set of eyes look over. I've got an NSMutableDictionary that I need to convert to a JSON object and then send out to my server. The dictionary looks like this... data = ( 184 = 3; 185 = ""; 186 = ""; 187 = ""; 188 = ""; latitude = ""; longitude = ""; recorded = "2012-06-19 12:53:16 +0000"; }, { 184 = 0; 185 = Is; 186 = This; 187 = "Working?"; 188 = "I think so."; latitude = ""; longitude = ""; recorded = "2012-06-19 12:54:26 +0000"; deviceID = b1c96c4467a8bcca97a826ad9941a10a; key = 6puwX3v2; method = putSurveyData; responses = 2; surveyID = 84; So far, no problems, but as soon as I go to convert that dictionary to a JSON object using NSJSONSerialization it crashes my app. The above dictionary is called mainDictionary and I use the following line to convert to JSON. NSData *jsonData = [NSJSONSerialization dataWithJSONObject:mainDicitionary options:kNilOptions error:nil]; If I remove the nested dictionaries from the 'data' key, it works fine. I have even tried to put a common array in the 'data' key, and that works also. It just seems to bomb out as soon as I stick an NSMutableDictionary in there. Is there something simple i'm missing? share|improve this question add comment 1 Answer I found the answer. The "recorded" field above was actually an [NSDate date] rather than a string representation of the date stamp. I cast it to a string and all is fine. share|improve this answer Thanks I was having the same problem –  William T. Apr 24 '13 at 23:34 add comment Your Answer
http://stackoverflow.com/questions/11104070/nsjsonserialization-with-nested-nsmutabledictionary
dclm-gs1-170250000
0.097378
<urn:uuid:e8add40d-fe5c-402c-a01a-e7e493cc1953>
en
0.846843
Take the 2-minute tour × I have a simple question. I followed this tutorial and created a HelloWorld osgi bundle. How can i install and start this bundle using apache Karaf? How can i refer to the bundle using the osgi:install command? thank you. share|improve this question add comment 2 Answers up vote 1 down vote accepted Ok, that is another question, but here goes: You're pretty much on the right track, I've tested the one in the Karaf developers guide you linked to (the second mvn call). The documentation isn't quite correct, I needed to change two things: • The version is off, 2.2.5 does work (on my machine), changing it to 2.2.8 seemed to help. • The package name is com.mycompany.package. As package is a keyword, that won't compile, so I've changed it to com.mycompany.bundle. So my archetype command was: mvn archetype:generate \ -DarchetypeGroupId=org.apache.karaf.archetypes \ -DarchetypeArtifactId=karaf-bundle-archetype \ -DarchetypeVersion=2.2.8 \ -DgroupId=com.mycompany \ -DartifactId=com.mycompany.bundle \ -Dversion=1.0-SNAPSHOT \ Then I entered the newly made project folder: com.mycompany.bundle: cd com.mycompany.bundle And a mvn install: mvn install Then there is a jar file in the 'target/' folder, which you can install into the Karaf installation as I said before. Creating a bundle in Eclipse • New -> Plugin Project -> Choose a name -> check the parameters -> you can use a template if you like. • Select your project -> Export -> Plugin/Fragment -> Choose a folder There's your jar file. share|improve this answer Thank you man :) That works. I have two more questions: the mvn install command will generate all the classes and the jar and a Manifest.mf in the target folder. What if I want to configure my bundle myself? Where do I have to drop the Manifest.mf file? Can i simply create a META-INF folder and drop it there? The second question: There are many tutorials and how to's of osgi tutorial on the equinox container. Since osgi is a specification it should make nearly no difference when i am using apache karaf instead of equinox right? So i can develop my bundles using Eclipse -> Plug-in Project. ??? –  user1291235 Jul 10 '12 at 11:34 It's a matter of taste: Either you configure your pom.xml file, and configure your pom file to generate the MANIFEST file, or you create your own manifest file (for example in Eclipse). It is a pretty fundamental decision: Do you want to let Maven manage your manifest file, or do you want to do it yourself, using Eclipse? –  Frank Lee Jul 10 '12 at 15:15 I added instructions for Eclipse –  Frank Lee Jul 10 '12 at 15:20 I want to use maven to manage my manifest file(s). When i follow the eclipse way i have no problem to export and import packages. Using Maven, i have no idea how this works. If I have two project bundles (both created with the mvn archtype) and i want set one bundle as a dependency of the other, i have to refer to the package in the pom file... (<import-package> tag) right? How does this work? –  user1291235 Jul 11 '12 at 13:36 You'll have to configure the '<instructions>' part of your pom file. This page explains that: felix.apache.org/site/apache-felix-maven-bundle-plugin-bnd.html –  Frank Lee Jul 11 '12 at 17:01 show 3 more comments You can just drop the bundle into the 'deploy' directory, and Karaf just notices and installs it. share|improve this answer Thank you for your reply. I now created a osgi bundle using the maven karaf-bundle-archetype: (link: karaf.apache.org/manual/latest-2.2.x/developers-guide/…) But I am still not able to install and run the bundle in Karaf. How can I generate a *jar file out of my bundle so that i can drop it ito the deploy directory... ? –  user1291235 Jul 9 '12 at 18:09 add comment Your Answer
http://stackoverflow.com/questions/11394040/how-to-install-and-run-osgi-bundle-in-apache-karaf?answertab=active
dclm-gs1-170260000
0.426737
<urn:uuid:66ad6a78-7aac-4388-b751-b07758c6d30b>
en
0.903095
Take the 2-minute tour × When I NSLog the contents of an NSMutableArray I get null. I believe I know what the issue is. I'm having a bit of trouble trying to figure out how to remove "//" at the beginning of this JSON output. If you load http://www.google.com/finance/info?infotype=infoquoteall&q=AAPL,C into your browser you'll see the "//" at the beginning. I believe that the "//" is what is causing the array to return null. How could I go about removing the two dashes? Below is I have what I've done thus far... NSString *url = @"http://www.google.com/finance/info?infotype=infoquoteall&q=C,JPM,AIG,AAPL"; NSData* data = [NSData dataWithContentsOfURL: [NSURL URLWithString: url]]; //parse out the json data NSError* error; NSMutableArray* json = [NSJSONSerialization JSONObjectWithData:data //1 NSLog(@"json is %@", json); //returns "json is (null)" share|improve this question In your other post (where you unaccepted my answer), danh showed you in the answer you accepted how to do this. I'm not sure it will help, because I did that too, and there was another problem character in the middle of the JSON (there could be others as well) –  rdelmar Jul 25 '12 at 2:27 possible duplicate of JSON returning null –  Josh Caswell Jul 25 '12 at 2:30 Yes danh, was correct to point out that the issue was the "//" and that somehow I should remove the two dashes. However the solution to remove the dashes did not workout. So its become a question of how to remove the dashes rather than why the data is returning null. –  Web Master Jul 25 '12 at 2:31 add comment 1 Answer up vote 2 down vote accepted You can try this: NSData *newData = [data subdataWithRange:NSMakeRange(4, [data length] -4)]; This gets rid of the first four characters. There was a control character the two slashes and a space before the first "[", and this gets rid of those. I tried this but the data still had a flaw in it further on. share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/11641796/removing-from-nsmutablearray
dclm-gs1-170270000
0.753169
<urn:uuid:09f78c65-8ba5-4416-a516-ee1d48500aed>
en
0.778328
Take the 2-minute tour × There is a problem when several users can process the same cube simultaniously and as a result processing of cube fails. So I need to check if certain cube is processing at current moment. share|improve this question add comment 3 Answers I dont think you can prevent a cube from being processed if someone else is already processing it. What you can do to "help" is run a MDX query to check the last time the cube was processed: or check the sys.process table on the realted sql server instance to see if it is running: select spid, ecid, blocked, cmd, loginame, db_name(dbid) Db, nt_username, net_library, hostname, physical_io, login_time, last_batch, cpu, status, open_tran, program_name from master.dbo.sysprocesses where spid > 50 and loginame <> 'sa' and program_name like '%Analysis%' order by physical_io desc share|improve this answer Diego, thank you for your answer! –  Alekzander Aug 10 '12 at 11:49 no problem, rememebr to vote ans mark as answer if it helped you –  Diego Aug 10 '12 at 11:54 First request gives only information about time when CUBE was updated. Second request does not help in determing which cube is processing, but it shows that Analysis Services is doing something. I'm shure it whill helps in another situations. –  Alekzander Aug 10 '12 at 12:04 add comment You will see a job running in Task Manager called "MSDARCH" if a cube is processing. Not sure how you can tell which one though. share|improve this answer Thank you! I'll check it. –  Alekzander Sep 21 '12 at 16:46 add comment I had a similar problem and resolved it by using the DISCOVER_LOCKS rowset provided on the SSAS server. To do this, first make the following XMLA query to the server: <!-- I tried using this, but it wasn't working and Microsoft documentation was little help. --> In the XML that the server returns, there should be a bunch of row elements that look kind of like this: In this example, note the Object element under LOCK_OBJECT_ID and the LOCK_TYPE element. According to Microsoft documentation, a LOCK_TYPE of 4 denotes a write lock due to a processing task. So you should be able to figure out if a cube is being processed if LOCK_TYPE is 4 and LOCK_OBJECT_ID/Object/CubeID matches the ID of the cube you're interested in for a given row element in the query results. share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/11899250/how-to-determine-which-ssas-cube-is-processing-now
dclm-gs1-170280000
0.412387
<urn:uuid:918e9348-0954-4635-be15-62bb239d3a48>
en
0.838603
Take the 2-minute tour × Consider the following scenario (this is not production code): class MyClass { public function myMethod() { // create a directory $path = sys_get_temp_dir() . '/' . md5(rand()); if(!mkdir($path)) { throw new Exception("mkdir() failed."); // create a file in that folder $myFile = fopen("$path/myFile.txt", "w"); if(!$myFile) { throw new Exception("Cannot open file handle."); Right, so whats the problem? Code coverage reports that this line is not covered: Which is correct, but since I'm creating the folder above logically it would seem impossible for the fopen() to fail unless (maybe in extreme circumstances like disk at 100%). I could ignore the code from code coverage but thats kind of cheating. Is there any way I can mock the file system so that it can recognise myFile.txt and mock the file system unable to create the file? share|improve this question add comment 3 Answers vfsStream is a stream wrapper for a virtual filesystem that is useful in unit tests to mock the real filesystem. You can install it from PEAR. More Info at: share|improve this answer I want the mkdir() to pass and the fopen() to fail with a vfs, but how do I set that up without having two separate functions? –  Elliot Chance Aug 23 '12 at 1:34 Check Mocking the Filesystem specifically starting from examples 10.15 in the phpunit.de link above. The advantage of using vfs is that there is no actual dependencies on the original filesystem. –  raidenace Aug 23 '12 at 14:47 add comment You could also break the function into 2 methods, one to create the path, and the other to use it. Then, individual tests could be done to ensure the path is created. A second set of tests could check and capture the exception when you try to use a bad path. share|improve this answer add comment You should inject the full path somehow, and don't call sys_get_temp_dir() right in that method. Any non-existant path should trigger a problem. You don't need VFS for that. BUT you will get a E_NOTICE (or warning perhaps?) before the exception is triggered. So you should probably first check is_writable, and throw the exception if it returns false. share|improve this answer In this situation the base path is irrelevant, whether I inject it or not. –  Elliot Chance Aug 23 '12 at 1:34 It is relevant. The easiest, consistent way to make this fail is to change the base path. With sys_get_temp_dir you can't ever use VSF, as that base path will always be a real path. –  Evert Aug 23 '12 at 9:03 add comment Your Answer
http://stackoverflow.com/questions/12083134/phpunit-how-do-i-mock-this-file-system/12166722
dclm-gs1-170300000
0.375672
<urn:uuid:920d6a79-e6dd-4ac8-a5ba-9dfec2488ba3>
en
0.936935
Take the 2-minute tour × I took a couple screenshots of the problem I'm having. Basically what I'm used to with vi and what I'm expecting, is to be able to move around the document using the arrow keys, and still be able to read the actual content of the document. Here is a shot of vi editor as I initially open a configuration file. A shot of vi again, after I have pressed the down, left, and right arrow keys a few times. If for some reason you cannot view the screenshots, what I see is: as I move the cursor around in vi, the place where my cursor just was gets replaced by numbers, commas, dashes, or curly braces. Sometimes it jumps one character over, but sometimes it jumps several. Obviously I'm doing something wrong here. And here I thought I knew how to use vi... share|improve this question add comment 2 Answers up vote 0 down vote accepted I'm not exactly why the problem occured, but I do know what fixed it. As you can tell from the screenshot, I was in an SSH session. I disconnected and re-established a new SSH connection. share|improve this answer add comment Please try runnning vi with different terminal emulation to see if it makes difference. I reckon its terminal related. Something like: TERM=linux vi TERM=vt100 vi Also running 'reset' command might also help without reconnecting. This resets terminal to its defaults. share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/12445299/moving-the-cursor-around-in-vi-produces-unexpected-characters-how-come
dclm-gs1-170310000
0.670062
<urn:uuid:6844a4d4-b639-4b72-9bea-d1c7b12c4520>
en
0.800312
Take the 2-minute tour × Given a node with the following structure class Node { int data, Node* P1, Node* p2; We need to determine, if the node represents a Circular Doubly Link List OR a Binary Tree. In my opinion We need to start traversing the given node in one direction node = givenNode; while(node->P1 != null && node->P1 != givenNode) node = node->p1 if(node == givenNode) // It means Circular DLL else if(node == null) // It means Tree And it would take O(n) time to detect this. Please suggest if there is any better approach than this. share|improve this question add comment 1 Answer up vote 4 down vote accepted I suggest you could check if its a doubl-linked list or not with this piece of code: node = givenNode; if(givenNode->P1 == null || givenNode->P2 == null) // It can not be double link list (circular) else if(givenNode->p1->p2 == givenNode || givenNode->p2->p1 == givenNode) //It is a double linked list It is not a double linked list And we have O(1) complexity share|improve this answer ... assuming there's more than one node in the list! (Otherwise it's unsolvable, or both answers are equally valid) –  Emil Vikström Sep 24 '12 at 10:44 @george.zakaryan. Thanks for the quick answer, I have edited the answer to make it bit more accurate, because if we do not add the first check we might get a null pointer exception –  Astric Star Sep 24 '12 at 11:46 add comment Your Answer
http://stackoverflow.com/questions/12563074/is-doubly-link-list-or-bst
dclm-gs1-170320000
0.672691
<urn:uuid:054998dc-373a-4ab5-abc7-68cab622c541>
en
0.895277
Take the 2-minute tour × I am building a search engine. And when a user types their search into my engine, my script only really checks for words in the statement, and if they match the keywords...the result is returned. But what if iPad is searched and Apple, because is is a higher rank, is returned before the official iPad website in Apple.com. I have begun using full text search but it still is a bit edgy. Any ideas?  $query = " SELECT * FROM scan WHERE "; $terms = array_map('mysql_real_escape_string', $terms); $i = 0;  foreach ($terms as $each) { if ($i++ !== 0){ $query .= " AND ";  $query .= "Match(title, description, keywords, link) Against ('%{$each}%') "; share|improve this question add comment 1 Answer when doing full text searching, you don't need to add each keyword to its own "match against" statement in the where clause. You can just say Match(title, description, keywords, link) Against ('ipod apple'). It will do the matching of each word in the "against" part and rank them accordingly. You can also do boolean matches where you can weight specific words using key symbols like "+" (+SomeWord) for making that word required in the result, "-" (-SomeWord) for making that word not allowed in the result...etc. share|improve this answer Have you got any code I could use to see what you mean. Or take my code and edit for it to work –  Reseed Grey Sep 28 '12 at 17:49 Use Against ('".implode(' ',$terms)."') –  Loz Cherone Sep 28 '12 at 17:57 Doesn't work, would thre be a function which calculates the amount of times the word appears in designated fields and then returns them in a higher order –  Reseed Grey Sep 28 '12 at 18:08 @ReseedGrey what lawrence wrote is correct. How is it not working? is the query throwing an error? Check out the boolean page I linked to in the answer, it gives some pretty good examples. The ranking is how fulltext works. You add a fulltext index on a column, the db indexes each word and how often it appears, the query will rank rows based on how often search words appear. You can put the "match against" in the select part of the query to get back that ranking. –  Jonathan Kuhn Sep 28 '12 at 18:16 It just doesn't seem to make any difference. Can you post an edit of my code below to show me what you mean? –  Reseed Grey Sep 28 '12 at 18:29 add comment Your Answer
http://stackoverflow.com/questions/12644669/detecting-amount-of-words-in-a-mysql-table
dclm-gs1-170330000
0.374941
<urn:uuid:13ea0f02-fe0e-4306-8de4-47a5f1618dc0>
en
0.897898
Take the 2-minute tour × I have a table that has a number of columns. For each row, I'd like to select three columns (PAR_BOOK, PAR_PAGE, PAR_LINE) and concatenate the contents of those three columns into a new fourth column (APN). So, if PAR_BOOK=0108, PAR_PAGE=291 and PAR_LINE=07, APN should be 010829107 Make sense? But, I'm unsure of what query I should use to do this. I need the results stored back in the same table as it needs to be ultimately exported out as a csv to work with the program that's going to map the data. share|improve this question Show your query. Inserting into the same table is no problem at all as MySQL holds the selected rows in a temporary table. –  AndreKR Oct 8 '12 at 18:28 Why do you want to store that value in the first place? Information that can be reconstructed based on the existing data should not be stored. You could create a view to achieve this. –  a_horse_with_no_name Oct 8 '12 at 18:30 Not that I should have to explain myself, but it's being exported as a csv for use in a mapping application. All of which I explained above. –  DrDavid Oct 8 '12 at 18:44 add comment 2 Answers up vote 4 down vote accepted Assuming your fourth column is already in the table, you would use the following update query: UPDATE YourTable If your fourth column is not present in the table yet, you should use the ALTER TABLE statement to add it first before running the UPDATE statement: share|improve this answer I tried the command, and it looked like it would work, but, it's actually ADDING the numbers; I need it concatenated instead.. –  DrDavid Oct 8 '12 at 18:39 Please use CONCAT method instead, as updated in the response. –  Vikdor Oct 8 '12 at 18:41 add comment Inserting into the same table with INSERT INTO ... SELECT ... is no problem at all. MySQL holds the selected rows in a temporary table. share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/12787351/insert-select-to-same-table?answertab=oldest
dclm-gs1-170340000
0.823979
<urn:uuid:3ec79a53-c0a9-43a2-b1fd-22138ae5cbbd>
en
0.876151
Take the 2-minute tour × I was messing with pthreads and I am facing a strange issue. I wrote a program that theoretically cannot end because it should enter a deadlock. Here it is: #include <pthread.h> #include <stdio.h> unsigned int d = 0; pthread_mutex_t d_lock; void* add(void *threadid) d += 5; printf("d's value is %d\n", d); int main (int argc, char **argv) pthread_t mythread; pthread_create(&mythread, NULL, add, NULL); I have no idea why it doesn't halt and keeps printing ... Thanks. EDIT: It seems that the mutex needs to be initialized in order for it to work. One of the ways to do this is to replace pthread_mutex_t d_lock; with pthread_mutex_t d_lock = PTHREAD_MUTEX_INITIALIZER; (statically initalize it) and the deadlock now happens. I did not see such a thing in the tutorial though. share|improve this question mutex can be recursive stackoverflow.com/questions/187761/… –  mathematician1975 Oct 22 '12 at 13:13 So... what's your question? It seems like you have it bahaving like it should! –  Celada Oct 22 '12 at 13:29 considering base-value initialization is covered in the POSIX.1c standard, if it is not in your tutorial you may wish to get an additional or alternative reference to use in addition. If they missed that they likely missed something else. –  WhozCraig Oct 22 '12 at 14:35 So you found the answer yourself. Good! Please remove the answer from the question and make it an answer. Answer the question yourself, that's ok. Then accept it after 2 hours. And give the link to Creating and Destroying Mutexes section. –  Jarekczek Oct 23 '12 at 7:00 add comment Your Answer Browse other questions tagged or ask your own question.
http://stackoverflow.com/questions/13012218/pthread-mutex-lock-issue
dclm-gs1-170350000
0.827537
<urn:uuid:c326d068-41a1-4bca-85c7-f47d8c59263c>
en
0.674958
Take the 2-minute tour × I am trying to create a camera app which, would act like the default camera app more or less. The thing, which is not working for me at the moment, is tap to focus. I want the camera to focus and do whatever it does on my touched point, just like the real camera app does. Here's my viewDidLoad - (void)viewDidLoad [super viewDidLoad]; // Session _session = [[AVCaptureSession alloc] init]; _session.sessionPreset = AVCaptureSessionPresetPhoto; // Input _videoDevice = [AVCaptureDevice defaultDeviceWithMediaType:AVMediaTypeVideo]; _videoInput = [AVCaptureDeviceInput deviceInputWithDevice:_videoDevice error:nil]; // Output _frameOutput = [[AVCaptureVideoDataOutput alloc] init]; _frameOutput.videoSettings = [NSDictionary dictionaryWithObject:AVVideoCodecJPEG forKey:AVVideoCodecKey]; [_frameOutput setSampleBufferDelegate:self queue:dispatch_get_main_queue()]; [_session addInput:_videoInput]; [_session addOutput:_frameOutput]; [_session startRunning]; And here's the method that should make my camera focus stuff on click. [touches enumerateObjectsUsingBlock:^(id obj, BOOL *stop) { UITouch *touch = obj; CGPoint touchPoint = [touch locationInView:touch.view]; focusLayer.frame = CGRectMake((touchPoint.x-25), (touchPoint.y-25), 50, 50); if ([_videoDevice isFocusPointOfInterestSupported]) { NSError *error; if ([_videoDevice lockForConfiguration:&error]) { [_videoDevice setFocusPointOfInterest:touchPoint]; [_videoDevice setExposurePointOfInterest:touchPoint]; [_videoDevice setFocusMode:AVCaptureFocusModeAutoFocus]; if ([_videoDevice isExposureModeSupported:AVCaptureExposureModeAutoExpose]){ [_videoDevice setExposureMode:AVCaptureExposureModeAutoExpose]; [_videoDevice unlockForConfiguration]; // NSLog(@"x = %f, y = %f", touchPoint.x, touchPoint.y); Nothing really happens once I click on the screen. share|improve this question add comment 1 Answer up vote 7 down vote accepted You have to adjust the touchPoint to a range of [0,1] using something like the following code: CGRect screenRect = [[UIScreen mainScreen] bounds]; screenWidth = screenRect.size.width; screenHeight = screenRect.size.height; double focus_x = thisFocusPoint.center.x/screenWidth; double focus_y = thisFocusPoint.center.y/screenHeight; [[self captureManager].videoDevice lockForConfiguration:&error]; [[self captureManager].videoDevice setFocusPointOfInterest:CGPointMake(focus_x,focus_y)]; The documentation on this can be found in Apple - AV Foundation Programming Guidelines - see section Media Capture where you will find information on Focus Modes: If it’s supported, you set the focal point using focusPointOfInterest. You pass a CGPoint where {0,0} represents the top left of the picture area, and {1,1} represents the bottom right in landscape mode with the home button on the right—this applies even if the device is in portrait mode. share|improve this answer Is there a documentation or something that explains why this needs to be done like this? –  spacecash21 Oct 28 '12 at 18:45 Updated the answer to point to the documentation provided by Apple. –  Konrad Lang Oct 29 '12 at 10:48 add comment Your Answer
http://stackoverflow.com/questions/13095007/ios-avfoundation-tap-to-focus
dclm-gs1-170360000
0.066209
<urn:uuid:7fbdb136-ef30-4ccb-8405-cfc692706281>
en
0.834408
Take the 2-minute tour × I have a bot that is scanning my inbox periodically for specific emails. Whenever the code below is firing the cursor blinks and flashes when the cursor is over the Lotus Notes UI. Google returned about 5 results for my search and none of them seemed to address this issue. It's not preventing my program from working but it does look pretty bad aesthetically. Anyone out there have any ideas? Thanks! *I also tagged this as C# to get more eyes looking at it. I'd prefer a vb.net solution but C# is welcome and appreciated as well. Dim NS As Object = CreateObject("Notes.NotesSession") Dim NDB As Object = NS.GetDatabase("", "") If NDB.IsOpen = False Then NDB.Openmail() Dim NV As Object = NDB.GetView("($Inbox)") Dim ND As Object = NV.GetFirstDocument Dim aItems As Array Dim dInfo As Dictionary(Of String, String) Dim EmailCount As Integer = NV.entrycount Dim iCurrent As Integer = 0 Dim EmailDate As DateTime Dim Subject As String, Body As String, sFrom As String iCurrent += 1 aItems = ND.Items dInfo = New Dictionary(Of String, String) For i As Integer = 0 To aItems.Length - 1 If Not dInfo.ContainsKey(aItems(i).name) Then dInfo.Add(aItems(i).name, aItems(i).text) End If EmailDate = CDate(dInfo("DeliveredDate")) Subject = dInfo("Subject") Body = dInfo("Body") sFrom = dInfo("From") If NV.GetNextDocument(ND) Is Nothing Then Exit Do ND = NV.GetNextDocument(ND) share|improve this question I'm not sure why someone voted this as too local / unlikely to help anyone in the future. If this had been answered in the past it would be helping me right now! –  DontFretBrett Oct 29 '12 at 19:51 I agree. It should not be voted down. This confusion between the two sets of classes is fairly common, and yes, there are still people using and programming for Lotus Notes and Domino. –  Richard Schwartz Oct 29 '12 at 20:54 add comment 1 Answer up vote 1 down vote accepted The Notes.NotesSession class is an OLE class, which means that it interacts with the Notes UI. You should be using the COM version of the class instead, which is Lotus.NotesSession share|improve this answer I tried switching it to Lotus.NotesSession and the Lotus Notes UI crashed. I'll see if I can find out where it crashed –  DontFretBrett Oct 29 '12 at 21:55 Ok it crashed on this line: Dim NDB As Object = NS.GetDatabase("", ""). I'll try supplying the Server and NSF mail file. *Edit: No luck. Any ideas? –  DontFretBrett Oct 29 '12 at 21:56 With the COM classes, you need to call NotesSession.Initialize(). See here: publib.boulder.ibm.com/infocenter/domhelp/v8r0/… –  Richard Schwartz Oct 29 '12 at 22:11 Initialize requires a password correct? The nice thing about the way I'm doing it now is that it requires no password or user interaction. The downfall, of course, is the flickering cursor. So my only 2 choices are prompt for a lotus password or deal with the blinking cursor? –  DontFretBrett Oct 30 '12 at 16:36 There is another choice, but it requires the users to change a setting in their Notes client setup to allow external programs to access their Notes data without entering a password. This setting does raise some security risks, so you would need to think carefully about whether or not to use it. In Notes 8, the setting is available under File - Security - User Security on the "Security Basics - Who You Are" tab, with the label "Don't prompt for password from other Notes-based programs". –  Richard Schwartz Oct 30 '12 at 18:07 show 4 more comments Your Answer
http://stackoverflow.com/questions/13128511/lotus-notes-cursor-blinks-flashes-while-scanning-inbox
dclm-gs1-170370000
0.987131
<urn:uuid:8b5749ad-5dcb-429b-81db-a60c04c5b1eb>
en
0.872151
Take the 2-minute tour × I'm trying to make a webcomic RSS feed with Django, but I can't put an image in the description field, because the html code gets escaped, even if it's in an {% autoescape off %} block. Here is my description template: {% autoescape off %} <img src="{{obj.img.url}}"/> {% endautoescape %} And this is the result: &lt;img src="http://localhost:8000/media/comics/001__.png"/&gt; How can I avoid this autoescaping? share|improve this question add comment 2 Answers up vote 3 down vote accepted How can I avoid this autoescaping? Actually, you need to keep this auto-escaping... Look carefully at any other rss feeds: xkcd.com/rss.xml Quote from spec by the RSS Advisory Board: share|improve this answer Thank you VERY much. –  Gonzalo Quero Aug 26 '09 at 2:52 add comment This doesn't seem to have anything to do with autoescaping, as that would never 'escape' the hard-coded tags that you entered explicitly in your template as you have here. I suspect there's something further down the line that is doing the escaping. Can you post the code that renders the template and does something with the result? share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/1330975/django-syndication-how-do-i-avoid-description-escaping/1331182
dclm-gs1-170380000
0.618001
<urn:uuid:450fd9c8-cf7e-4768-858f-5fc048443b32>
en
0.908124
Take the 2-minute tour × I have the following entities: public class Foo { @ManyToOne(optional = false) // I've tried @OneToOne also, same result @JoinColumn(name = "bar_id") private Bar bar; // this is a business key, though not mapped as unique for legacy reasons @Column(nullable = false) private long fooNo; // getters/setters + other properties public class Bar { @OneToOne(optional = true, mappedBy = "bar", cascade = CascadeType.ALL) private Foo foo; // getters/setters + other properties NOTE: This is the correct mapping: @ManyToOne and @OneToOne (it wasn't designed by me). I have tried @OneToOne on both sides also, with the same result. Basically, I can have a Bar without a Foo object, but everytime I have a Foo, there has to be a Bar associated with it. Foo is considered the parent object (which is why its the owner of the association), but Bar can stand alone in certain cases. I then load a Foo object like this: SELECT f FROM Foo f WHERE f.fooNo = :fooNo foo.getBar() correctly fetches the appropriate Bar, as expected. However, foo.getBar().getFoo() is null. It seems the other side of this relationship is not correctly initialized by JPA/hibernate. Any ideas why this is happening and how I can fix it? I use Hibernate 3.2.1 as my JPA implementation, which we are using through EJB3 beans (though that is probably irrelevant). share|improve this question Did you try fetch = FetchType.LAZY? –  durron597 Nov 30 '12 at 13:24 You mean to put that on the Foo reference? I thought that was the default, when not specified? –  Morten Jacobsen Nov 30 '12 at 13:28 Could you explain how this objects must be related, because current mapping is confusing. –  Aleksandr M Nov 30 '12 at 13:38 Another idea: have you tried putting the annotation on the getter/setters, not on the field? –  durron597 Nov 30 '12 at 13:40 @AleksandrM I added a brief comment on the idea behind the mapping. @durron597 I have not, but I can see internally that the field has the value null when I inspect the object in debug mode. I don't think putting mappings on getter/setters will change this? Bar.fooshouldn't be lazy loaded (as bar was lazy loaded through Foo. –  Morten Jacobsen Nov 30 '12 at 13:44 show 4 more comments 1 Answer Are you sure about your assotiation? ManyToOne usually implies oneToMany on other. share|improve this answer This should probably have been a comment instead of an answer. Yes, this is the current mapping (its not designed by me). I have tried @OneToOne on both sides (because that is logically what it is), but it does not change anything. –  Morten Jacobsen Nov 30 '12 at 13:32 You may also try manyToOne on both sides –  Konstantin Pribluda Nov 30 '12 at 13:50 add comment Your Answer
http://stackoverflow.com/questions/13646041/lazy-loading-association-does-not-properly-initialize-child-association
dclm-gs1-170420000
0.112549
<urn:uuid:f31997d2-1be9-4af5-a39e-0d0827566a51>
en
0.832051
Take the 2-minute tour × I get this warning only on distant server Resource interpreted as Script but transferred with MIME type text/x-js I'm using wamp 2.1 and work correctly Video not working on distant one I can't use probably htacess if necessary to solve this problem cause it's shared server <script type="text/javascript" src="../flowplayer/flowplayer-3.2.11.min.js"></script> <script type="text/javascript" src="../jquery-1.7.1.min.js" charset="utf-8"></script> <script type="text/javascript" src="../flowplayer/flowplayer.playlist-3.2.10.min.js"></script> (I have changed path just for the example) The order is it important (flowplayer before jquery here)? Or json structure it may be the cause of problem? share|improve this question thanks Cerbrus, any improvement are welcome –  khaled_webdev Dec 5 '12 at 10:59 add comment 1 Answer That sounds like a warning and not an error. Is it preventing the script from executing? The error is definetly a server configuration one, so if you can't get someone to fix the server, you'll have to put up with the warning. share|improve this answer it's not working unfortunately –  khaled_webdev Dec 5 '12 at 11:00 create a test javascript file on the server that does something simple like call alert() or do a document.write(). Then remove all the script tags from your document and replace them with one that loads this test script. See if that fires. If it does, then the warning is unrelated to your scripts not executing. It may also help to not use the .min versions of the libraries, so you can find the error. –  Nicholas Dec 5 '12 at 11:02 thx @Nicholas , I will do it when I will have access to the server by my Chief and tell you about the result –  khaled_webdev Dec 5 '12 at 11:09 add comment Your Answer
http://stackoverflow.com/questions/13721454/resource-interpreted-as-script-but-transferred-with-mime-type-text-x-js?answertab=oldest
dclm-gs1-170430000
0.084222
<urn:uuid:b98d4700-5a49-4044-b0de-266fcbe5ad6a>
en
0.919847
Take the 2-minute tour × I am new in Unity.I am going to make 3D fighting game so I need character so that i can customize them in Unity and can start on my work.So can anyone tell me is there any way to get built en Character so that i can not waste my time to make character in Other 3D modeling just like MAYA etc... So can i found Character and make them customize with my needs. share|improve this question add comment 1 Answer There are several resources like Unity Asset Store, Blendwap, 3DExport.com, Mixamo Autorigger, TurboSquid and others, where you can find a lot of models off the shelf. But be warned: Chances are very high that at the end you will find yourself tuning and customising in Blender, Maya or whatever tool you (don't) like ;-) There is almost always a need to change something and then you have to learn at least the basic concepts or find someone who does this for you. As you have tagged this question with Android, you have to bear in mind that you are limited to low-poly characters (<= 1000 vertices, <= 30 bones) share|improve this answer " you have to bear in mind that you are limited to low-poly characters (<= 1000 vertices, <= 30 bones) " Sorry i could't understand this thing.Would you please explain this thing...:) –  Malik Ehtasham Dec 12 '12 at 5:50 @user1594794 See several discussions about mobile development like polycount IOS / Android games?. While the manual page Optimizing Graphics Performance states less than 100k vertices, in practice a skinned mesh with physics, etc. should not exceed 1000 to run at an acceptable frame rate. –  Kay Dec 12 '12 at 7:18 add comment Your Answer
http://stackoverflow.com/questions/13822001/built-en-character-for-unity3d
dclm-gs1-170450000
0.405849
<urn:uuid:42eaa7a8-5c58-45e3-8bf6-ceedf4492c9f>
en
0.884567
Take the 2-minute tour × I'd appreciate is someone could point to docs on what "let" does in GHCi, or failing that, explain it convincingly :-). So far as I can tell, "let" (without "in") is not part of the Haskell language per se, and on the other hand, it doesn't appear to be a GHCI command either, as it's not prefixed by colon. share|improve this question add comment 4 Answers up vote 18 down vote accepted While programming in GHCi, you're like programming in IO monad with do syntax, so for example you can directly call a function with type of IO a, or use monadic bind syntax like r <- someIOFun. let is also a part of do so you can also use this. I think it's being desugared into let .. in <rest of the computation>, so for example when you do this: ghci> let a = 1 ghci> someFun ghci> someFun2 It's like: let a = 1 in do someFun share|improve this answer Its not just IO () but any IO action of type IO a. –  Satvik Dec 27 '12 at 9:49 OK, that makes sense, and relates GHCi let to Haskell let... in do. –  gwideman Dec 27 '12 at 10:14 add comment Read the docs. GHCI statements are executed as IO computation. So let is same as what you have inside an IO monad where you bind non-IO expression using let. share|improve this answer Thanks for pointing to the docs, I hadn't found that. As a side comment, that doc is rather disappointing, since its explanation of let is sort of premised on understanding monads. New users encounter let almost immediately as it's frequently presented in tutorials on beginning Haskell concepts, yet it doesn't work if copied to a haskell source file, and explanations assuming understanding of monads are not too useful. Nonetheless, with the collection of answers here I at least see how these features fit together. –  gwideman Dec 27 '12 at 10:23 @gwideman Yeah, I understand that. You can not directly copy what you write as ghci statements in a hs file and expect them to work. Well you can ofcourse do main = do <your ghci statements>. It might not work always as expected as ghci prints the output of a statement by using its Show instance. –  Satvik Dec 27 '12 at 13:02 add comment For more down-to-the-code details, this comment in TcRnDriver.lhs might be enlighting: Typechecking Stmts in GHCi Here is the grand plan, implemented in tcUserStmt What you type The IO [HValue] that hscStmt returns let pat = expr ==> let pat = expr in return [coerce HVal x, coerce HVal y, ...] bindings: [x,y,...] pat <- expr ==> expr >>= \ pat -> return [coerce HVal x, coerce HVal y, ...] bindings: [x,y,...] expr (of IO type) ==> expr >>= \ it -> return [coerce HVal it] [NB: result not printed] bindings: [it] expr (of non-IO type, ==> let it = expr in print it >> return [coerce HVal it] result showable) bindings: [it] expr (of non-IO type, result not showable) ==> error So a command at the GHCi prompt can have up to three effects: Some code is evaluated, some things are printed, and some variable names are bound. Your case (the first one in the comment) binds variables, but does not print. The syntax does resemble the do-notation, so @sinan’s answer is somewhat right, but it is not really what is happening under the hood – otherwise, for example, nothing would ever be printed. share|improve this answer I'm pretty sure I don't understand all of that at this stage, but it is very useful to see the degree to which one should not learn from GHCi :-). Thanks! –  gwideman Dec 28 '12 at 12:56 add comment GHCI commands are executed in the IO monad and uses do syntax, so the desugaring rules apply. From Real World Haskell doNotation4 = do let val1 = expr1 val2 = expr2 {- ... etc. -} valN = exprN {- ... etc. -} translates to: translated4 = let val1 = expr1 val2 = expr2 {- ... etc. -} valN = exprN in do act1 {- ... etc. -} share|improve this answer OK, this makes a lot of sense. –  gwideman Dec 27 '12 at 10:14 add comment Your Answer
http://stackoverflow.com/questions/14052093/ghci-let-what-does-it-do?answertab=votes
dclm-gs1-170460000
0.047961
<urn:uuid:1054e6db-025e-4bad-84c9-d9d5010d18e7>
en
0.888352
Take the 2-minute tour × I have recently finished my new one page portfolio website. I am having some trouble hiding the URL of the links. example: when you click 'My Work' link, it takes you to the div that is located for the 'My WorK' section of the website. So currently it reads http://www.springalldesign.co.uk/#title-wrapper which looks quite messy. (#title-wrapper is just the name of the div of the top of that section) I know i could just change the div to so it would instead read http://www.springalldesign.co.uk/#mywork but i still think it looks messy. I would just like the URL to read http://www.springalldesign.co.uk/ no matter what link you clicked on. Thanks in advance link to website share|improve this question not changing it is pretty lazy for a web developer! –  matpol Jan 4 '13 at 17:26 Please provide an SSCCE in the question, so future developers benefit. –  Philip Whitehouse Jan 4 '13 at 17:31 add comment 3 Answers up vote 1 down vote accepted On line 101, you're setting the URL hash: location.hash = target; If you don't want the hash to show up, just remove this line. Keep in mind that this would prevent deep linking. share|improve this answer thank you that did the trick. I am not too worried about deep linking as it is quite a small site. But it is good information to have for future projects. thanks again –  Tom Jan 5 '13 at 5:10 add comment I suggest you leave the hashes (#), because user can easily get particular page by direct URL (for example What I Do => http://www.springalldesign.co.uk/#whatido-title) To get rid of hashes (#) you can change your menu's <A href's> to <A onclick's> respectively. Keep in mind that you should also provide 'onclick' event handler to navigate properly. share|improve this answer add comment jsFiddle DEMO (Remove /show/ to access jsFiddle Edit page.) Your homepage can just display a iframe to your webpage. Then, navigation at the URL Address Bar never changes. In that jsFiddle, notice how the Address Bar is always the same. share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/14161728/hiding-url-on-a-one-page-website
dclm-gs1-170470000
0.100788
<urn:uuid:8f25ea35-f507-4cd0-9317-cf8ad153383f>
en
0.902987
Take the 2-minute tour × I noticed that if I set my device time manually, and turn off the automatic time sync on my iOS device, [NSDate date] returns the date and time assuming the device time is correct--which it may not be. Since the docs mention that NSDate has some sort of sync with NTP, I am wondering if there is any built-in way to get the accurate date and time instead of having to assume the device date and time is correct. share|improve this question I find one valuable check is to simply make sure that the phone's time value is greater than the date you shipped your app (or some such), so that you eliminate the case where the date has reset to Jan 1, 1970 or whatever. In that case throw up a message "Set your clock, you idiot!" (Or words to that effect.) –  Hot Licks Feb 19 '13 at 18:13 @HotLicks this will in no way ensure that the time is correct as the OP is asking. –  twaldron Feb 19 '13 at 18:45 True, but it catches, especially, a lot of iPad Touches with the clock set totally wrong. –  Hot Licks Feb 19 '13 at 19:04 @HotLicks I do see value in having this check, although this whole discussion and answers make me want to re-engineer the whole thing to not need accurate times as there seems to be no solution without 3rd-party code. –  Anton Feb 19 '13 at 19:42 @HotLicks fair enough :) –  twaldron Feb 19 '13 at 19:42 add comment 2 Answers up vote 1 down vote accepted Perhaps https://github.com/jbenet/ios-ntp can help you? It's a library that can fetch the date and time from a time server. share|improve this answer It seems this is the easiest way to do it, out of all the available options. –  Anton Feb 25 '13 at 15:46 What other options could there be to solve this issue? –  AppsDev May 6 '13 at 14:07 add comment See this api to fetch current date and Time then compare. share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/14964318/how-can-i-get-the-actual-date-and-time-if-the-device-date-and-time-are-inaccurat
dclm-gs1-170490000
0.032129
<urn:uuid:3d1d1af9-a124-4f5d-93ac-61c6f6573abe>
en
0.844936
Take the 2-minute tour × When we plot a bode/nichols locus, the name of workspace variable is used will use 'tmp' as label. enter image description here When using more complex data, matlab is using 'untitled1','untitled2',... tmp={ss(1,1,1,0) , ss(1.2,1,1,0)}; enter image description here How can I change this label programmatically? Ideally, I'd like a solution working with Matlab 6.5.1, but I'm also interested in solutions restricted to newer versions. share|improve this question Have you tried the "Name" property of the function ss? mathworks.com/help/control/ref/ss.html#bswdue3-1 –  Mikhail Feb 25 '13 at 15:04 @Mikhail thanks, that's the first thing I thought of, but it did not work in version 6.5.1 (I have legacy code that I don't wish to port). Maybe I'll just have to plot the nichols in a recent version... –  aka.nice Feb 25 '13 at 16:05 add comment 1 Answer You can modify the labels programmatically via their graphics handles. It looks like the values you want to change are the DisplayName property of some of the children of the current axis. So in your first example, I can change the display name like this: ch = get(gca,'Children'); In general, I'm not sure how to predict which children of the current axis are the ones you need to change. For the second example you give, the two curves appear to be the second and third children when I run your code. share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/15068821/change-label-of-data-tips-on-bode-nichols-diagram
dclm-gs1-170500000
0.313275
<urn:uuid:ac644c5a-2499-4e88-81d3-1d67010479b7>
en
0.85154
Take the 2-minute tour × When a standard window control (e.g. an "EDIT" control) is created, its WNDPROC is defined as part of the window class (i.e. "EDIT" has a specific WNDPROC that is designed to make the window display & behave as an edit-control). MFC allows you to interact with such controls via their wrapper classes, such as a CEdit wrappers the specialized messages for an "EDIT" window control. MFC further allows you to bind an instance of an "EDIT" window to a C++ subclass of CEdit, say a CMyEdit, where you can override inherited virtual functions of CEdit and CWnd, and you can define a message table to gain access / override messages sent to the window instance itself. There is CWnd::Default(), which calls this->DefWndProc with the current message arguments. This appears to lookup the WNDPROC for the HWND it is associated with. So is this the correct answer: call DefWndProc() (or equally, Default()), which will hand it off to the WNDPROC of the windows control? Obviously, this is different than other message table handlers which can return FALSE to indicate that they didn't handle the message, and MFC will automatically route the message up the class inheritance hierarchy to the next message handler for this message, or, I assume, to Default() to be handled by the native WNDPROC? If I define an arbitrary message handler, say for WM_SETTEXT, what is the correct way to pass this message on to the "EDIT" WNDPROC? I'd also love to know if there is a way to pass the message up to a superclass (C++ class hierarchy) for handling? Many OnXXX style handlers do have a way to do so, but is there a mechanism that works for ON_MESSAGE handlers? class CDynamicMenuControlEdit : public CEdit LRESULT OnSetText(WPARAM wParam, LPARAM lParam); BEGIN_MESSAGE_MAP(CDynamicMenuControlEdit, CEdit) LRESULT CDynamicMenuControlEdit::OnSetText( WPARAM wParam, // not used; must be zero LPARAM lParam // window-text string (LPCTSTR) if (m_bHasFocus) // do normal thing // !!! THIS IS MY QUESTION: IS THIS CALLING EDIT's WNDPROC, or ::DefWinProc()? !!! return DefWindowProc(WM_SETTEXT, wParam, lParam); share|improve this question Something tells me that we need @RaymondChen in this question. –  Nik Bougalis Mar 6 '13 at 17:26 Or @Joseph M. Newcomer –  Mordachai Mar 6 '13 at 18:35 add comment 2 Answers You're doing it right. CWnd::DefWindowProc() uses the WINDOWPROC you subclassed from and will call the EDIT window's window procedure. share|improve this answer How would it be different in this particular instance for him to call Default()? –  Nik Bougalis Mar 6 '13 at 17:25 Looking at wincore.cpp, Default and DefWindowProc() are identical in my example, because I pass the same args to DefWindowProc() as Default() would, and default calls DefWindowProc() so exactly the same results. –  Mordachai Mar 6 '13 at 18:28 I'm more confused about the distinction between ON_MESSAGE being a message sink vs. other ON_WM_xxx which have a BOOL result to indicate if your handler handled the message or if it should propagate up the message table chain. Or how one would even accomplish that for my example (i.e. if my subclass wants to punt up the message handler chain- how?). And verify that my example calls the WNDPROC that was there prior to MFC's WNDPROC subclassing (hooking). –  Mordachai Mar 6 '13 at 18:28 I'm not sure if I understand your question. In a thread, you can only subclass a window via MFC once. So when a message comes in to a subclassed window, it tries to find a MFC message handler. If it finds one, it calls it. If it doesn't find one, it calls the default window procedure from which MFC had subclassed from. Generally, if you want to punt up the MFC chain, you call the baseclass directly--CSomeBaseClass::OnSetText(wParam, lParam). –  Joe Willcoxson Mar 7 '13 at 15:32 add comment Calling Default() will cause the "normal" processing that would have happened in response to a message to occur. I'm not entirely clear on what you are trying to achieve, but it seems to me that calling Default() is what you want to do. If you look at a lot of the handlers from Windows messages in the CWnd handlers (and handlers from classes derived from CWnd such as CEdit) you will see that they call Default(). Word to the wise, that Default() will actually use whatever parameters the original message had - you cannot change them. share|improve this answer At an abstract/general level, yes Default() will do the "normal" thing. It sounds like that means that the WNDPROC that MFC hooked will be called, as opposed to ::DefWindowProc being called (we want window class "EDIT"'s WNDPROC to be called, not the global generic default window proc!) However, I'd like confirmation on that, and clarification on what would be the right way to cause the next message handler in the MFC message table chain to be called if my ON_MESSAGE handler wants to punt? –  Mordachai Mar 6 '13 at 18:31 add comment Your Answer
http://stackoverflow.com/questions/15252435/how-to-route-a-message-to-the-controls-standard-wndproc
dclm-gs1-170510000
0.417053
<urn:uuid:a4bc36db-657c-4e22-a0a6-b81719c67740>
en
0.8072
Take the 2-minute tour × I'm just getting started with dojo, and I've understood that dojo.query is the same as $ in jQuery. But I haven't figured out what it returns. Is it a specialized object like in jQuery? What I'm trying to do (with no luck) is: dojo.query("output").innerHTML = data; //this doesn't work either: //tried accessing by id as well //and tried to access a div, incase dojo has some issues with html5 elements And I'm currently using the new html5 elements: <output id="output">Output goes here</output> <div id="divOutput">non-html5 output goes here</div> And I can't seem to find a good list on what to do with objects returned by dojo.query().. edit: Okay, I think dojo is just messing with me now. I found this method: addContent() and that works on the above selector. But I don't want to add content, I want to replace content... share|improve this question add comment 6 Answers up vote 3 down vote accepted The query method returns a NodeList object. In the ref for NodeList you can find a list of functions that you can apply to the list of elements. There is no innerHTML function for the list, but the html function should work. There is no "output" element in HTML, perhaps you try to target elements with the class name "output"? Or the element with id "output"? share|improve this answer Nope, I'm using the HTML5 element output, but just to be sure I've tried adding an id to the element, and doing the same...still no result. –  peirix Oct 9 '09 at 9:01 @peirix: I see. To use the output element you should set it's value attribute, not it's innerHTML property. –  Guffa Oct 9 '09 at 9:19 The output element works like a div. It's just a content holder, so it doesn't have a value attribute. w3schools.com/tags/html5_output.asp But I still can't get the html() method to work, even on divs... –  peirix Oct 9 '09 at 9:42 Sheez! You were right, but you forgot to mention the dojo.require. For the html() method to work you need to add dojo.require("dojo.NodeList-html"); in your script... –  peirix Oct 9 '09 at 10:21 Oh, it's in a separate file? The documentation doesn't mention anything about that on the hmtl function... I've never used dojo myself, so I don't know how the code is divided into files... –  Guffa Oct 9 '09 at 10:36 add comment If you want to replace all the output tags' content with the same thing, then this code should always work: // replace the contents of ALL <output> tags dojo.query('output').forEach(function(node) { node.innerHTML = data; }); Dojo also provides a little shortcut for these kinds of things. You can specify a string to NodeList's forEach function like this: // replace the contents of ALL <output> tags (as long as data is global) dojo.query('output').forEach("item.innerHTML = data;"); The word item in the string is special. (This is a pain to debug, so it might not be worth it.) share|improve this answer add comment As was said above, query method returns NodeList object, so you can iterate it's result as array, or use dojo methods that work with NodeList (e.g. attr): dojo.query("#divOutput").attr("innerHTML", data); But as soon as you are trying to query nodes by id, it would be better to use dojo.byId() method, which returns domNode: dojo.byId("divOutput").innerHTML = data; Or in more dojo style: dojo.attr(dojo.byId("divOutput"), "innerHTML", data) share|improve this answer add comment Try this by adding the [0] like this: dojo.query("output")[0].innerHTML = data; share|improve this answer add comment Also, there is a dojox.jq wrapper (in development, coming in 1.4) which emulates the JQuery return object APIs share|improve this answer add comment The documentation seems to be a mess, this is the only thing i get to work with 1.7, dojo.query("whatever").forEach(function(node, index, array) share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/1542641/what-does-the-dojo-query-return
dclm-gs1-170520000
0.472934
<urn:uuid:d4349d9f-3af7-4680-b24a-7193d346d22f>
en
0.680678
Take the 2-minute tour × Windows Command Prompt running keytool.exe share|improve this question add comment 4 Answers up vote 42 down vote accepted follow this tutorial for creating SHA1 fingerprint for Google Map v2 share|improve this answer add comment Run the following command to get your sha1: keytool -v -list -keystore "< debug.keystore path >" and press “enter” if you do not know debug.keystore path, you may find your debug.keystore path by checking windows-->preferences-->android-->build I prepared step by step tutorial to show how you can use google map android v2 on emulator(android 4.2.2) have a look at to my blog: http://umut.tekguc.info/en/content/google-android-map-v2-step-step share|improve this answer add comment If you are using eclipse, go to: Window->Preferences->Android->Build You will find what you are looking there. share|improve this answer add comment First there is same .jar file that in fb-sdk android-support-v4.jar. Then generate SHA1 key using: PackageInfo info; try { info = getPackageManager().getPackageInfo( "com.example.worldmission", PackageManager.GET_SIGNATURES); for (Signature signature : info.signatures) { MessageDigest md; md = MessageDigest.getInstance("SHA"); Log.e("Hash key", something); System.out.println("Hash key" + something); } catch (NameNotFoundException e1) { } catch (NoSuchAlgorithmException e) { } catch (Exception e) { Log.e("exception", e.toString()); share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/15727912/sha-1-fingerprint-of-keystore-certificate?answertab=votes
dclm-gs1-170530000
0.622706
<urn:uuid:ac94b284-d396-434b-a87b-8171660624f7>
en
0.898641
Take the 2-minute tour × When I run a silent NSIS installer (from the console, as in installer.exe /S /D=C:\Foo) it immediately moves to the background. I'd like to wait until it has finished installing before I do anything else. Is there a flag I can pass to tell the installer to be blocking? share|improve this question How are you calling your installer? From a console? –  Francisco R Apr 18 '13 at 17:39 add comment 1 Answer up vote 2 down vote accepted You don't say anything about how you start the process in your question! NSIS installers are always "blocking", for a silent installer this means you just have to wait for the child process to end. If the parent process is also a NSIS installer you can do ExecWait '"c:\path\to\installer.exe" /S /D=C:\Foo' or if it is a batch file you must use start "" /WAIT "c:\path\to\installer.exe" /S /D=C:\Foo share|improve this answer I clarified my question, and the start trick certainly works. Why is it that that is needed with a silent nsis installer and not, for instance, silent MSI installs? –  Frew Apr 18 '13 at 21:07 The console generally only waits for console programs, NSIS is a GUI application even in silent mode. Try running calc or other GUI applications and see what happens... –  Anders Apr 18 '13 at 22:23 Good to know! Thanks –  Frew Apr 18 '13 at 22:55 add comment Your Answer
http://stackoverflow.com/questions/16087674/how-can-i-make-my-nsis-silent-installer-block-until-complete
dclm-gs1-170540000
0.390844
<urn:uuid:2433c905-91c7-4456-a486-a6fd8e2868fd>
en
0.885272
Take the 2-minute tour × I'm sure this is definitely a simple and stupid question, but I can't figure out how to remove leading "+1" from a string using re module's sub(). I've been trying these import re but they all return the same original string. Could someone help me point out the obvious mistake I'm making? Thank you. share|improve this question add comment 2 Answers up vote 4 down vote accepted Use \ for escaping +, not / share|improve this answer Yes! I forgot to try ``. Thank you. It works now. :) –  user1330974 Jun 22 '13 at 0:31 add comment You dont need regex to do this, if you always just want to remove the first two letters you can just do this number = "+1585123456" number = number[2:] share|improve this answer That's also right. Thank you. –  user1330974 Jun 22 '13 at 0:54 add comment Your Answer
http://stackoverflow.com/questions/17246123/substituting-leading-1-in-python-with-re-module/17246167
dclm-gs1-170550000
0.194368
<urn:uuid:aecf09b4-b175-469c-94b8-3899ecd0ccbb>
en
0.746876
Take the 2-minute tour × I am doing a newspaper application. I want a tableview's first cell to consists of 2 views of different sizes and from 2nd cell they want 3 view's of same size in each cell and action for every cell's view ! http://imgh.us/custom_cell.png share|improve this question What have you done so far that doesn't work? –  XCode Monkey Aug 25 '13 at 12:38 i have done it in scroll view, creating views in for loop , it works fine for me , but wen doing parsing evrytime, it creates the view in the for loop so it takes long time to display the page..... @XCode Monkey –  KSR Aug 25 '13 at 12:47 add comment 1 Answer Just design the UITableViewCell in a NIB file and create the relative .h and .m files, let's say: In MyCell.xib place all the subviews you desire, and set the class of the main Cell Object to MyCell (rather than the standard UITableViewCell). Then you can set some IBOutlets in the code and link them to the subviews in the XIB. You can also place some IBActions in the custom view class, although it is bad practice and you should really have your logic in controllers. The MyCell.m file should be used for initialization logic and animations. Finally, in your TableViewController hook it all together: #import "MyCell.h" #define k_CELL_ID @"k_CELL_ID" #define CELL_HEIGHT 80.0f @implementation MyTableViewController - (void)viewDidLoad [super viewDidLoad]; UITableView *theTableView = (UITableView*)self.view; [theTableView registerNib:cellNib forCellReuseIdentifier:k_CELL_ID]; theTableView.rowHeight = CELL_HEIGHT; //not sure if this is ok in iOS 7 MyCell *cell = [tableView dequeueReusableCellWithIdentifier:k_CELL_ID]; if (cell == nil) NSLog(@"cell is nil! WTF??"); id someData = //retrieve customization data [cell setupWithCustomData:someData]; return cell; share|improve this answer just really offtopic: why he dont use IB: blog.teamtreehouse.com/why-i-dont-use-interface-builder –  CarlJ Aug 27 '13 at 14:07 add comment Your Answer
http://stackoverflow.com/questions/18428944/how-to-customise-uitableview-cell-as-subclassing
dclm-gs1-170560000
0.101652
<urn:uuid:87e865d4-e543-4d70-bc01-1f132f8893a0>
en
0.799088
Take the 2-minute tour × Is there a build.xml available to use fault injection with Hadoop as this tutorial says? http://hadoop.apache.org/docs/current/hadoop-project-dist/hadoop-hdfs/FaultInjectFramework.html#Aspect_Example I cannot find the jar file for org.apache.hadoop.fi.ProbabilityModel and org.apache.hadoop.hdfs.server.datanode.DataNode share|improve this question add comment Your Answer Browse other questions tagged or ask your own question.
http://stackoverflow.com/questions/19100282/hadoop-fault-injection-example
dclm-gs1-170580000
0.636291
<urn:uuid:c5af98d7-d969-461d-a94e-ea0b1fb6d4c5>
en
0.902852
Take the 2-minute tour × I'm trying this html code <style type="text/css"> body { background-color : green !important; background-color : red; } Hello World ! In firefox, it's working fine : green background. In internet explorer : it's not working : also green background. If I remove the doctype, it's working fine in both. I tried different doctypes but always the same problem. What can I do ? share|improve this question Not sure if trolling, or just disbelief that IE can actually follow standards. –  BoltClock Oct 23 '13 at 12:13 Just use <!DOCTYPE HTML>. Go with the flow!. Also what version of Firefox and what version of IE? because if it is IE6 or IE11, that kinda matters. –  Henk Jansen Oct 23 '13 at 12:16 What's not working? –  Shomz Oct 23 '13 at 12:17 "What's not working?" -> the css hack. Without doctype : geen in firefox and red with ie. With doctype green in both cases. –  tweetysat Oct 23 '13 at 12:19 so, uh, what exactly are you saying? are you trying to say you want it to be different in IE? Why? –  Spudley Oct 23 '13 at 12:22 show 5 more comments 1 Answer Ok I know this example is stupid but much more easy the explain the problem. The question is : why css hack seems not working with doctype definition ? There is no hack there. There's a !important declaration, which is standard CSS, but wasn't supported properly by IE5. If you take away the doctype, IE will go into quirks mode, which is basically an IE5-emulation mode. Therefore it will use the IE5 CSS rules, which means that !important doesn't work (along with a whole bunch of other features). So without a doctype, in quirks mode, it ignores !important, and so both your rules have the same precedence, and thus the second one (red) is used. With a doctype, the browser will be in standards mode, and !important works the way it should do, which means that green takes precedence because it's 'important'. I still don't get what you're trying to achieve, but hopefully that explains to you what is going on. share|improve this answer My goal is of course not changing the background color but changing label alignment of checkboxes in a complicated form (generated by jsf2) and that is not displayed in the same way with ff and ie –  tweetysat Oct 23 '13 at 12:39 @tweetysat, isn't that just a completely different problem? –  Henk Jansen Oct 23 '13 at 12:43 @tweetysat: without a doctype, you're in quirks mode. In addition to breaking the !important feature, quirks mode also changes some of the basic layout properties of the rendering engine, and disables a lot of other browsers features, which will indeed often make a page look quite different in IE compared to other browsers. This is why you should avoid quirks mode (and thus why you should always use a doctype). I guess this question is pretty moot now; I suggest starting again with a fresh question that describes the actual problem you're having with the form. –  Spudley Oct 23 '13 at 12:47 add comment Your Answer
http://stackoverflow.com/questions/19541340/html-doctype-css-hack?answertab=active
dclm-gs1-170590000
0.824272
<urn:uuid:ad5e01be-aebf-4f53-8f25-66f1bc7f493c>
en
0.859439
Take the 2-minute tour × How can I in perl make only relay stderr, and not stdout. (xcodebuild has an enormous amount of verbosity that I want to get rid of, but when something goes wrong, I still want to know what it was) share|improve this question add comment 2 Answers up vote 2 down vote accepted Redirect the standard output to /dev/null: system("xcodebuild >/dev/null") == 0 or warn "$0: xcodebuild exited " . ($? >> 8) . "\n"; share|improve this answer add comment system("xcodebuild >> /dev/null"); ...assuming, of course, that you're getting all the stderr stuff with your current syscall mechanism. Otherwise, you'll need to redirect stdout to devnull and stderr to stdout. share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/3322799/how-to-do-system-without-relaying-stdout-in-perl
dclm-gs1-170640000
0.02757
<urn:uuid:1c765192-86db-4789-8afd-90891c30f6a2>
en
0.882427
Take the 2-minute tour × I am developing a piece of code which where I would like to dynamically update the badge of the application, so show its status. Pretty regular. I am using this following API [[UIApplication sharedApplication] setApplicationBadgeString:@"x"]; My problem is that when I try to use this API multiple times within an application session, the badge which is displayed on the Springboard does not get updated. My use is //Check if user is logged in then [[UIApplication sharedApplication] setApplicationBadgeString:@"On"]; //wait for network event [[UIApplication sharedApplication] setApplicationBadgeString:@"Off"]; Any help will be much appreciated. share|improve this question add comment 1 Answer What you're describing works perfectly on my end. This is an undocumented API, so I can't confirm, but perhaps it needs to be executed on the main thread, not a background one. Also, be advised that because this is a private API, its use is grounds for rejection from the AppStore. share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/3925295/use-of-setapplicationbadgestring-on-iphone-sdk
dclm-gs1-170670000
0.823743
<urn:uuid:cf1a1536-be73-4ae3-9f12-9d0622bdfa72>
en
0.923328
Take the 2-minute tour × I am encrypting data (health care industry) using the aes encryption classes in the .net framework. What are some of the recommended locations for safely storing the key? I have it in the web.config for development, but that does not feel production worthy, to say the least. share|improve this question add comment 4 Answers You can encrypt your web.config values using built in methods in the framework: This is probably a reasonable place to store your key - if somebody has managed to access your server to retrieve these details, then you probably have bigger worries. share|improve this answer True. Is DPAPI more "secure" though? –  Saraz Oct 25 '10 at 14:35 @Saraz - Sorry, don't know the answer to that... –  Paddy Oct 25 '10 at 14:46 @Saraz: More secure than what? It's more secure in the sense "is infeasible to recover without administrator-level access on that specific machine" (as the encryption algo is dependent on data that are unique to the machine). In other words, if someone managed to get your web.config, they still couldn't decrypt on a different machine. –  Piskvor Oct 25 '10 at 14:57 add comment If application requires authentication using your keys then normal approach on unix machines is to store passwords in hashed form. You can use sha-512 + salt. Then you can calculate hash when user inputs password and check against your. The passwords/key itself can be stored anywhere if its hashed. If not store it in the technical user directory where none has access. EDIT for those which don't want to put too much effort in understanding USE CASE which i've presented Johny has some AES encrypted data. He stores his key in head. He wants to store this hey somewhere on his PC to automate access. He can store it as ASCII in web.config. But he can hash that to be no more ASCII but hash. During authentication application calculates hash checks is it proper key, then uses this key.... Low probably of collision with proper algorithm. ps. just posting my point of view on the topic. Why are you so sensitive for word "hash"??? I know what is hash, I know what is so called 2-way encryption.... share|improve this answer Who mentioned passwords? I'd assume the OP wants reversible encryption. –  Seva Alekseyev Oct 25 '10 at 14:32 Indeed, not looking to one way hash ;) –  Saraz Oct 25 '10 at 14:36 I understand everything......seems you didn't understand me. –  bua Oct 25 '10 at 14:41 Re your edit: No. If you hash the key, you can not recover it from the hash (as hashing, by definition, is a lossy transformation). How do you then use a key that is not anywhere on the computer? (That word. You keep using it. I don't think it means what you think it means.) –  Piskvor Oct 25 '10 at 14:51 @Piskvor from application cache.... when there would be any superuser authentication tunneled key sending. –  bua Oct 25 '10 at 14:54 show 10 more comments What you need to do is hide this key somewhere, and a secure location would be inside a database. Preferably a different database than the one that contains your data. Since data require username/password combinations to open them, you just add a second security layer to your application. Your app would need to log in to the key database, retrieve key X for application Y and is then able to use it. You would have to store the connection string for this database somewhere, though. Even if you would store just a single key in a key database, it would be worth the trouble. It forces a hacker to take a bit more trouble to open this database to find the key before he can access the data. Since there's no perfect security, your options are just limited to delaying the amount of time it would take a hacker to gain access. Encrypting the web.config file or data within it will also help to delay the hacker but if the key is inside the config file, all he needs to do is decrypt it again. share|improve this answer This is not really any different to storing a key in the config file - you need to store the connection string to your key database somewhere, and if your hacker has access enough to get to your config file, he will probably be able to get this... –  Paddy Oct 25 '10 at 15:01 True. But it adds a second layer. You need to access the database to get the key and in general, databases are stored on a different system. If the database server is set to only accept calls from the web server location, you make it more difficult for a remote hacker to get access to the key. And if the database stored a few hundreds of (dummy!) keys then the hacker still doesn't know which one to use. –  Wim ten Brink Oct 25 '10 at 15:07 add comment One approach which will provide good security if the only people who will need to use the key for any purpose can be trusted absolutely with it is to store the key encrypted with another key, a copy of which is stored for each user, encrypted with a hash of that user's password (salted differently from the one stored for password validation!). Even an evil person with access to every bit of data, anywhere in the universe, associated that database's key, would be unable to access the database without reverse-engineering at least one of the passwords. Note that if the passwords for all valid accounts were ever lost or forgotten, the data would be irretrievable. That's part of the nature of real security. If one wants to avoid the possibility of losing data, one must ensure that backup copies of the necessary keys and/or passwords are stored securely. share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/4015483/where-to-store-encryption-key
dclm-gs1-170680000
0.890715
<urn:uuid:d8a96e2b-6b84-4f27-951a-4d63279ea8c1>
en
0.766223
Take the 2-minute tour × I have a datastore that is querying a database and outputting JSon... something like this: $data[] = array('id' => $i, 'prod_id' => $product_id, 'link' => $link); I'm wondering how you can pass back a link using the $link variable. If I had this for example: $link = "<a href=\"google.com\"> Clicky </a>"; The datagrid would display Clicky and not the actual html link... Is there anyway to pass back html? share|improve this question add comment 2 Answers I would suggest passing the link URL and the link text separately, then reconstructing them into an anchor link in JavaScript on the client-side. You could also try escaping the HTML, then unescaping on the client-side. I have no idea why it won't send links- perhaps the browser is trying to parse the sent HTML too early? share|improve this answer add comment You can use formatter in dojo grid to format the HTML displayed in each cell. When creating the grid, you can set a formatter for each column. The formatter is a JavaScript function that takes two parameters, the first one value means the value of the cell, the second one rowIndex means the index of current row. The return value of the formatter function is the HTML content displayed in the cell. For your case, I would suggest that you use a single column for both the link URL and anchor text. You can use a simple encoding, like http://www.google.com$$$Clicky, where $$$ is used to separate these two fields. The PHP code would be: $link = "http://www.google.com$$$Clicky"; Then in your formatter function, you can use : function(value, rowIndex) { var parts = value.split('$$$'); return "<a href='" + parts[0] + "'>" + parts[1] + "</a>"; If you prefer to use one column for each field, e.g. url for URL and anchorText for the anchor text. Then you need to get the value of another column when formatting the cell. Suppose the grid uses the url field. Then the formatter function may look like below: function(value, rowIndex) { var item = grid.getItem(rowIndex); // Get the store item by index, need the reference of the grid. var anchorText = grid.store.getValue(item, 'anchorText'); return "<a href='" + value + "'>" + anchorText + "</a>"; share|improve this answer Thanks for the awesome explanation. I ended up using the escapeHTMLInData="false", however.. but will keep the formatter function in mind for later! :) –  Paul Dec 1 '10 at 22:48 Ah, escapeHTMLInData='false', I didn't know that before. Thanks for the information. :) –  Alex Cheng Dec 2 '10 at 9:38 add comment Your Answer
http://stackoverflow.com/questions/4320931/passing-html-through-json-php-and-dojo?answertab=oldest
dclm-gs1-170700000
0.075058
<urn:uuid:491c8990-38d1-40a9-bec0-45d5bcba344f>
en
0.941509
Take the 2-minute tour × Google chrome sends multiple requests to fetch a page, and that's -apparently- not a bug, but a feature. And we as developers just have to deal with it. As far as I could dig out in five minutes, chrome does that just to make the surfing faster, so if one connection gets lost, the second will take over. I guess if the website is well developed, then it's functionality won't break by this, because multiple requests are just not new. But I'm just not sure if I have accounted for all the situations this feature can produce. Would there be any special situations? Any best practices to deal with them? Update 1: Now I see why my bank's page throws an error when I open the page with chrome! It says: "Only one window of the browser should be open." That's their solution to security threats?!! share|improve this question do you have a link to anywhere this is officially documented? –  fearofawhackplanet Dec 16 '10 at 12:22 I got this from a question in stackoverflow: "Chrome is trying some aggressive tactics in its developer builds (I think that is cool). What they're doing is speculatively opening sockets to servers, and also opening a second socket if their first attempt doesn't get a response quickly enough. It's pretty easy to see how a bug in this stuff, or even just the expected behavior, could trigger abuse filters. But, as I said, I think it is worth doing. All these web startups will make more money if the Web is faster." –  Cg Alive Dec 16 '10 at 12:30 A Chromium issue touches on this code.google.com/p/chromium/issues/detail?id=39402#c11 –  jrummell Nov 9 '11 at 21:09 add comment 7 Answers Your best bet is to follow standard web development best practises: don't change application state as a result of a GET call. If you're worried I recommend updating your data layer unit tests for GET calls to be duplicated & ensure they return the same data. (I'm not seeing this behaviour with Chrome 8.0.552.224, by the way, is very new?) share|improve this answer I'm using the same version, but I see the behavior. Try calling a script that increments a number in a file. –  Cg Alive Dec 16 '10 at 13:40 I've not managed to reproduce it, I wrote a quick script which appends to a file and I only get one line in the file per click. I'm using the Linux build so maybe it's not enabled there yet –  Peter Dec 16 '10 at 14:05 add comment I saw the above behavior while writing my server application and found that earlier answers are probably not true. I have attached screen shot of packet capture through wireshark. It is for a simple get request to port 8080 for which my server returns a hello message. Chrome sends the second get request for obtaining favorite icon which you see on top of every tab opened. It is NOT a second get to cater time out or any such thing Here is a reference question that i found latter Chrome sends two requests SO chrome requests favorite icon Chrome issue on google code share|improve this answer add comment This only happens when I enable "webug" extension (which is a FirePHP replacement for chrome). If I disable the extension, server only gets one request. share|improve this answer I apologize for this error in Webug — in the current version it is fixed. –  fedosov May 23 '13 at 9:08 add comment I have just implemented a single-use Guid token (asp.net/TSQL) which is generated when the first form in a series of two (+confirmation page) is generated. The Token is recorded as "pending" in the DB when it is generated. The Guid token accompanies posts as a hidden field, and is finally marked as closed when the user operation is completed (payment). This mechanism does work, and prevents any of the forms being resubmitted after the payment is made. However, I see 2 or 3 (!?) additional tokens generated by additional requests quickly one after the other. The first request is what ends up in front of the user (localhost - so ie., me), where the generated content ends up for the other two requests I have no idea. I wondered initially why Page_Load handlers were firing mutliple times for one page impression, so I tried a flag in Http.Context.Current - but found to my dismay, that the subsequent requests come in on the same URL but with no post data, and empty Http.Context.Current arrays - ie., completely (for practical purposes) seperate http requests. How to handle this? Some sort of token and logic to refuse subsequent page body content requests while the first is still processing? I guess this could take place as a global context? share|improve this answer add comment It also happens in asp.net postback call. I am so far dodging a bullet b/c it only happens on localhost. When I click submit, a postback occurs and the code inserts a row into the database, and then redirects to another page. But with the double request, which occurs immediately after the redirect statement is executed. Results in the same code running twice and 2 rows inserted into the table. I need an easy solution for this. share|improve this answer add comment I'm having the same bug. And like the previous answer this issue is because I've installed the Validator chrome extension Once disable the extension, works normally. share|improve this answer add comment I was having this problem, but none of the solutions here were the issue. For me, it was caused by the APNG extension in Chrome (support for animated PNGs). Once I disabled that extension, I no longer saw double requests for images in the browser. I should note that regardless of whether the page was outputting a PNG image, disabling this extension fixed the issue (i.e., APNG seems to cause the issue for images regardless of image type, they don't have to be PNG). I had many other extensions as well (such as "Web Developer" which many have suggested is the issue), and those were not the problem. Disabling them did not fix the issue. I'm also running in Developer Mode and that didn't make a difference for me at all. share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/4460661/what-to-do-with-chrome-sending-extra-requests/12013545
dclm-gs1-170710000
0.049727
<urn:uuid:7ee146f2-64ed-4a7d-8080-549c901fbe65>
en
0.786491
Take the 2-minute tour × For work reasons, I need to develop a LKM for Android platform. I'm not very sure how to cross compile my AndroidModule.c and what tools to use for that. I guess that I'll need the source code of Android in order to tell the compiler to link the libraries from there right? I will also need to download the ARM compiler for Android. I think with those three things is enough (LKM Code in C, Android Source Code, ARM compiler for android). The problem is that I can't find any tutorial that explains how to compile LKM for Android. I'll be very pleased to have more info about it. share|improve this question add comment 3 Answers Here's a makefile that I use to build modules for Android. I'm assuming you have a copy of the linux source somewhere and that you have built the kernel for your phone. In your module directory I put a Makefile like this: obj-m := mymod.o COMPILER ?=/pathtoandroid/prebuilt/linux-x86/toolchain/arm-eabi-4.4.0/bin/arm-eabi- ARCH ?=arm KERNELDIR ?= /home/kernel/androidkerneldir/ PWD := $(shell pwd) EXTRACFLAGS += -I$(PWD)/somedirectory/shomewhere rm *.o *.ko adb push mymod.ko /system/lib/modules This should do it for you. Make sure you have write permissions to /system directory. share|improve this answer add comment Try the Android URL at the bottom it has detailed instructions on how to build the source. Then follow this URL for final building (this is for dream release), I am assuming the procedure should hold good for other releases as well. share|improve this answer add comment This should help. To cross compile a module you'll need the kernel source code and the ARM compiler which is in the Android tool chain. You'll need a Makefile something along the lines of obj-m:= AndroidModule.o all: module $(MAKE) -C $(KERNELSRC) SUBDIRS=$(PWD) modules $(MAKE) -C $(KERNELSRC) SUBDIRS=$(PWD) clean @rm -f Module.symvers Module.markers modules.order Then compile by configuring CROSS_COMPILE as the ARM compiler and KERNELSRC as the kernel source location, and calling make. Here's the command I use on 0xdriod. CROSS_COMPILE=~/beagle-eclair/prebuilt/linux-x86/toolchain/arm-eabi-4.4.0/bin/arm-eabi- ARCH=arm KERNELSRC=~/kernel make share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/4849063/cross-compile-lkm-module-for-android-platform/4866061
dclm-gs1-170740000
0.473685
<urn:uuid:47314c29-9fb6-4326-b374-4be7a25dbcd4>
en
0.797152
Take the 2-minute tour × I'm trying to insert a video player plugin into the DOM using an object. This works fine with Firefox and Chrome, however I get a "no such interface supported" message from IE 8 and IE 7. The plugin works fine in all three if it's in the HTML file the server sends out. Here is what I'm trying to create: <object id="plugin" width="220" height="360" type="application/x-ourmediaplayer" <param name='mode' value='LIVE' /> <param name="ip_address" value='' /> <param name='port' value='80' /> If I use the following code I get the error on IE: var container = document.getElementById('pluginContainer'); var plugin = document.createElement('object'); plugin.id = 'plugin'; plugin['width'] = '220'; plugin['height'] = '360'; plugin['type'] = 'application/x-ourmediaplayer'> var param = document.createElement('param'); param['name'] = 'mode'; param['value'] = 'LIVE'; plugin.appendChild(param); param = document.createElement('param'); param['name'] = 'ip_address'; param['value'] = ''; plugin.appendChild(param); ` param = document.createElement('param'); param['name'] = 'port'; param['value'] = '80'; plugin.appendChild(param); Does anyone have any ideas? Can I do this with IE, or is there some other way of appending an object of this type? share|improve this question add comment 2 Answers up vote 0 down vote accepted Might be too late, but I've seen this same error in a variety of cases. It is probably nothing wrong with your code. It is most likely a problem with the installation of IE, registration of some DLLs. In this thread somebody pointed to some scripts which fix IE, here. Another site, specifies: I hope that can help you. share|improve this answer add comment I don't know for sure, but I'm guessing that it's a IE's mishandling of the object tag. Consider looking at the source for SWFObject for some ideas on how to fix it. share|improve this answer Maybe I missed it, but I didn't see anything to help me in in the SWFObject source. Thanks for responding though. –  anotherdjohnson Feb 16 '11 at 17:11 add comment Your Answer
http://stackoverflow.com/questions/4965874/ie-gives-no-such-interface-supported-message-when-inserting-and-object-for-a
dclm-gs1-170760000
0.589832
<urn:uuid:65f6e121-04e9-47b6-bcec-106b1055135a>
en
0.929232
Take the 2-minute tour × I am always looking for ways to secure my user's passwords. I am currently using some combination of hashing algorithm with random salt. The main thing in this problem is when my user set a very very weak password. No matter how hard my mixed-up hashing algorithm, and how long my salt is, I think it can be cracked in less than 1 year. I've been thinking for a new way. I've made a script that will re-encrypt the password every time the user sign-out by adding a random salt on the old hashed password, then encrypt it again. So, every time the user come back, the encrypted password is different. Get it? But the main problem on this idea is, I must store the new salt every time the user sign-out. Imagine my code will look like, if the user is sign-in and sign-out everyday? Any idea? Oh, I have an idea. How about regenerate new encrypted password every year? share|improve this question Just use a very long salt, or start enforcing standards on peoples' passwords. –  Marcin Feb 27 '11 at 13:45 add comment 3 Answers Re-encryption doesn't help with your problem. The only thing you can do is create a multi part hash, and hope the attacker doesn't get all of them. I usually use a two part salt: One part is a random per user value stored in the database alongside the password. The other part is a per application salt. You can store it in the application config or in a special password store the OS offers. The advantage of that split is that it's not enough if the attacker just gains access to the database, but he needs to get access to wherever your application salt is stored. So for example a simple sql injection stealing your database isn't enough. If the attacker can execute code it probably won't help at all. And you should use some method to slow down hashing. Typical hash functions are fast, so brute-force is fast too. But if you iterate the hash-function a million times it still doesn't slow down a valid login much, but slows down brute-force a lot. You can achieve that using a Password Based Key Derivation Function such as PBKDF2. share|improve this answer I get it. So the idea is to slow down the brute force as low as possible? I'll try this one. –  dimassony Feb 27 '11 at 13:58 That's the idea of the second part. But of course you slow down legit logins by the same factor. So it's a trade-off between the computational cost of a login and slowing down the attacker. Depending on the user numbers a good compromise is probably around 10ms for server application and 1 second for disk-encryption. –  CodesInChaos Feb 27 '11 at 14:10 add comment You could use "key stretching": iterate the hash, say, a million times, after salting. Then store hash value, salt, and iteration count. Then an attacker could check a million times fewer passwords per second than when you hash once. But a very short password will still fall: note that you yourself, to verify the legitimate password, need to do the same operation. Suppose you accept a 1 second time for yourself to check, then the attacker can also check passwords at 1 second per password, on a similar machine (and more if he used more or faster machines!). And 1 second per password can still be enough to check for weak and short password, standard dictionaries etc. There really is no defending against it, only making it harder. share|improve this answer add comment There are two problems with your main assumptions. The first one is about the problem of storing the salt. You already do for the salted password solution. With your new approach, salt would change over time, and that's it. So you could have used this method and the only extra cost would be the re-calculation of the hash value at every login (when you actually have the password string itself). The second problem is the more important one: a re-hashing will not change anything. As soon as your attacker gets hold of one salted hash value, it will be enough to mount a dictionary attack. The fact that you change your salts and the hash in your database will not make it any more difficult. So there is no need to recalculate a hash after the first one is created. share|improve this answer Yes. But it will be harder (I guess) cause the string is longer. EX –  dimassony Feb 27 '11 at 13:43 I don't get why that would be the case. The password is the same, and the salt changes from S1 to S2. The original S1, H1 values are still valid, but you store S2, H2 in DB now. What string is getting longer? –  vhallac Feb 27 '11 at 13:46 I see. So, do you have any idea? –  dimassony Feb 27 '11 at 13:53 @dimassony There is not much you can do against weak passwords. No matter what your underlying mechanisms are, they are open to a dictionary attack. CodeInChaos's answer has a few good approaches to increase the attack time. –  vhallac Feb 27 '11 at 19:14 add comment Your Answer
http://stackoverflow.com/questions/5133466/how-to-secure-encrypted-password-even-the-weakest-one?answertab=votes
dclm-gs1-170780000
0.98579
<urn:uuid:b26f5446-7093-46b2-847e-75070b8558ae>
en
0.843917
Take the 2-minute tour × I'm using XCode 4. Can someone please explain to me why when I have written a unit test (under the test target) that it can't find my local file resource? I'm trying to load a plist file from the NSBundle in a unit test but it doesn't work in the unit test target. I've tried throwing it under the Classes area of the Test target. Here's my code: NSString *path = [[NSBundle mainBundle] bundlePath]; NSString *finalPath = [path stringByAppendingPathComponent:@"urlMappings.plist"]; self.urlMappings = [NSDictionary dictionaryWithContentsOfFile:finalPath]; self.urlMappings is empty for some reason even though urlMappings.plist definately exists in my project. Here is the source to urlMappings.plist to prove it is in fact a dictionary. <plist version="1.0"> Any ideas? Thankyou share|improve this question Building off of MikeSimmons's solution, I came up with the following Xcode: TEST vs DEBUG preprocessor macros. –  MattDiPasquale Jul 20 '11 at 14:40 add comment 2 Answers up vote 3 down vote accepted Under the test target, you shouldn't use [NSBundle mainBundle], because it is the main bundle, not the test bundle. you should use [NSBundle bundleForClass:[self class]] replace. share|improve this answer Makes perfect sense. I've awarded you the solution. Thankyou! –  Mike S Aug 26 '13 at 6:21 add comment The solution (which doesn't make sense) is it wasn't in the bundle resources of the main target. It has to be in the bundle resources of BOTH targets even though I'm only using it in test. Anyone know why this is the case? share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/5494686/cant-load-files-from-nsbundle-in-iphone-unit-test/5494876
dclm-gs1-170790000
0.840889
<urn:uuid:e8572459-d227-4d4d-912a-cf941a72917e>
en
0.897668
Take the 2-minute tour × I have these all over my theme, and when if I delete them, there nothing happens to the theme. What the heck does it do? Should I leave them in or are they unnecessary. I want to optimize my site to load faster, so this is why I'm asking. share|improve this question add comment 3 Answers In Wordpress, strings in the php files are marked for translation to other languages, and localization using two “tags” which are actually functions. They are: __() _e() share|improve this answer Link above doesn't work unfortunately... –  user1794295 Feb 24 at 15:19 add comment They are used for localization in Wordpress themes. If you're only using one language for your theme, you don't need them. share|improve this answer add comment These are for Wordpress localization. Here is their documentation: http://codex.wordpress.org/Function_Reference/_e Also a few links on localization in general on wordpress to put the _e's in context: share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/5775135/what-the-heck-does-the-php-e-do?answertab=votes
dclm-gs1-170810000
0.786913
<urn:uuid:7fc432e6-7596-4774-98dd-b1e8750decf8>
en
0.880603
Take the 2-minute tour × Is there a way to configure Ehcache to remove entries from the disk store based on the age of the entry? I know that I can configure Ehcache to expire elements from disk when the maxElementsOnDisk property is set to something greater than zero but I want the entries to get deleted regardless of the number of entries in the disk store. share|improve this question add comment Your Answer Browse other questions tagged or ask your own question.
http://stackoverflow.com/questions/5807497/expiring-ehcache-elements-on-disk
dclm-gs1-170820000
0.118873
<urn:uuid:2def89cd-1fcd-4b24-8f7a-7d969c3b1704>
en
0.718564
Take the 2-minute tour × Was looking at some code earlier, and am thinking that there has to be a more elegant way of writing this.... (returnVar.Warnings is a string array, it could be returned as any size depending on the number of warnings that are logged) For Each item In items If o.ImageContent.ImageId = 0 Then ReDim Preserve returnVar.Warnings(returnVar.Warnings.GetUpperBound(0) + 1) returnVar.Warnings(returnVar.Warnings.GetUpperBound(0)) = "Section: " & section.<header>.<title>.ToString & " , Item: " & item.<title>.ToString End If share|improve this question add comment 3 Answers up vote 7 down vote accepted use the generic List(of string) then get an array containing the list data if you need it dim list = new List(of string) share|improve this answer Note: The ToArray method doesn't return the underlying array, it creates a new array and copies the values to it. –  Guffa Mar 6 '09 at 17:35 good point, post updated –  Jason Mar 7 '09 at 2:48 add comment Can't you use ArrayList which does this for you? share|improve this answer arraylist is something that should go away, it's not typesafe, use List(of T) –  Fredou Mar 6 '09 at 17:22 add comment Start by moving the If statement out of the loop. If you are using framework 3.5, you can use LINQ to loop the items. If o.ImageContent.ImageId = 0 Then returnVar.Warnings = items.Select(Function(item) "Section: " & section.<header>.<title>.ToString & " , Item: " & item.<title>.ToString).ToArray() returnVar.Warnings = New String() {} End If share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/619653/a-better-way-of-writing-this-growing-array
dclm-gs1-170860000
0.155285
<urn:uuid:ddaf9fda-d32d-4e3c-8445-8a359634c4aa>
en
0.898719
Take the 2-minute tour × I have an .ear file (an archive file like tar / zip) that has a file inside that i want to change. For example myfile.ear contains 1.txt and i want to change 1.txt to 2.txt and possibly also change some of the content inside 1.txt (like sed does) I really want to avoid having to extract myfile.ear, change the file and compress it again. Does anyone know a way to achieve this in linux ? And if it's not possible, I would also like to know why share|improve this question add comment 1 Answer up vote 1 down vote accepted EAR files are just JAR files which are just ZIP files. The ZIP format, IIRC, contains metadata and data interleaved, so changing one file (which might be larger/smaller than the file it is replacing) might not fit (or leave a gap), thus in all practical terms the file must be rewritten when doing modifications. share|improve this answer is it possible then to extact only the specific file, modify it and put it back again ? or do i have to recompress everything again ? –  Michael Jun 14 '11 at 21:15 Any ZIP util I've ever used recreates the archive with those kinds of modifications. –  Joe Jun 15 '11 at 2:45 add comment Your Answer
http://stackoverflow.com/questions/6334037/how-to-change-a-file-inside-an-archive-ear-file-without-extracting-entire-fil?answertab=active
dclm-gs1-170880000
0.132994
<urn:uuid:c14470d2-602d-4875-b866-01718db97709>
en
0.783072
Take the 2-minute tour × I am trying to integrate jQuery.pageless plugin in my application, but in vain. Can anyone provide me with some resource that shows a Rails 3 demo application that has jQuery.pageless working? I tried looking into the example application that is provided with the plugin, which is in Rails 2.2. I tried to implement everything in a similar manner, but I get the error undefined method 'total_pages' for Array <....>, which is the array of one of my models. Here's the code snippets: module ApplicationHelper def pageless(total_pages, url=nil, container=nil) opts = { :totalPages => total_pages, :url => url, :loaderMsg => 'Loading more results' container && opts[:container] ||= container def index @posts = Post.all if request.xhr? sleep(3) # make request a little bit slower to see loader :-) render :partial => "shared/post", :collection => @posts <div id="recent-sale-item-area"> <% if [email protected]? %> <p id="recent-posts"> recent posts </p> <div id="recent-sale-item-list"> <%= render :partial => "shared/post", :collection => @posts %> <%= will_paginate(@posts) %> <%= pageless(@posts.total_pages, posts_path) %> <% end %> share|improve this question Did you ever figure this out? –  wuliwong Jun 3 '13 at 0:56 add comment 1 Answer The Github page for jQuery.pageless has what you want: Your error is because Rails 3 no longer has pagination built-in. You will need to download the will_paginate or some other pagination gem, or roll your own. share|improve this answer Yes I did this first, that's where I downloaded the plugin from . I have changed the question a bit, please see. Thanks. –  rookieRailer Aug 22 '11 at 16:37 Edited my answer. –  Fareesh Vijayarangam Aug 22 '11 at 18:27 I have the will_paginate gem installed as well –  rookieRailer Aug 22 '11 at 18:51 You will need to post your code then. –  Fareesh Vijayarangam Aug 22 '11 at 18:52 I added my codes. –  rookieRailer Aug 22 '11 at 19:12 show 1 more comment Your Answer
http://stackoverflow.com/questions/7149055/jquery-pageless-in-rails-3-with-demo-application
dclm-gs1-170920000
0.997965
<urn:uuid:75adbd61-972b-45e1-a7e0-c1d67b67ae1f>
en
0.798484
Take the 2-minute tour × I'm looking for javascript code that will return the language selected by the current logged in crm user. Is there another method than reading the language setting from the used internet browser. share|improve this question add comment 1 Answer up vote 9 down vote accepted You can get the user's locale ID through the function Xrm.Page.context.getUserLcid(); Here's a list of the possible LCIDs share|improve this answer Simple question, simple answer. PERFECT! Thank you! –  ThdK Sep 14 '11 at 9:00 add comment Your Answer
http://stackoverflow.com/questions/7389572/how-to-retrieve-the-language-of-the-current-user-with-javascript?answertab=oldest
dclm-gs1-170930000
0.596475
<urn:uuid:bb223a3e-cf78-45a6-9e22-129c0229fba5>
en
0.89232
Take the 2-minute tour × I'm working on an older application and upgrade it's JMS system from JBoss Messaging to HornetQ, in the process I've run into a few gotchas that seem to be related to how this application uses and manages JMS connections. This is my first large scale exposure to JMS (besides simple toy usage) so I'm wondering if the current idiom is... correct, silly, or dead wrong? Here is how the current system works. static QueueConnection connection; static boolean isConnected; static void sendSomeMessage(Object sendMe) { if(!isConnected) connect(); static void connect() { // jndi lookup for connection factory connection = factory.createQueueConnection(); // lambdas in java pseudo code, woot! connection.onException => disconnect(); isConnected = true; static void disconnect() { isConnected = false; The gist of this is that the connection is used over and over for every single message that is sent until an error occurs, when an error occurs the connection finally gets closed and recreated. Every example that I've seen always creates a new connection factory and a new connection for every message but these examples are not big system examples they are one off "how-to" examples. Is keeping a single managed reference to a JMS Connection an acceptable idiom, should the connection factory be cached? Should they both be recreated for every new message? It makes sense to me to reuse the connection factory but use a fresh connection every time? share|improve this question add comment 1 Answer up vote 1 down vote accepted Message systems are supposed to be asynchronous... So, you should keep a connection open for the entire life of your application. JMS is currently a bit verbose on objects you have to create, so you have to create a connection and a session. So you should do this: connection = cf.createConnection(...); session = connection.createSession(...); producer = session.createProducer(...); The session and producer should always be used within a thread. As a session represents a thread usage. (You may reuse it within multiple threads as long as it's synchronized) share|improve this answer thanks a ton, that's very helpful! –  Michael Nov 11 '11 at 22:27 add comment Your Answer
http://stackoverflow.com/questions/8072823/jms-connection-connectionfactory-references-with-hornetq
dclm-gs1-170960000
0.06647
<urn:uuid:02d2e348-cdbc-4718-b36a-94679f153615>
en
0.937556
Take the 2-minute tour × I a trying to set up a real time game server that runs a game I am writing as a C# .NET 3.5 service. The game is similar to classic pong so I need to send real time feedback to both clients through a persistent socket connect to the server. This is an example of how it is coded. http://www.codeproject.com/kb/IP/socketsByBobJanova.aspx Does anyone know of any hosting services that can support this? I am only concerned with getting an reasonably priced host that I can test in for now. share|improve this question Why vote to close? I cannot continue programming until I find a good host. –  Jamey McElveen May 6 '09 at 12:46 I agree people ask the same question for web hosting and those are usually not closed. –  BobbyShaftoe May 6 '09 at 12:47 I think that is a perfectly valid question. Do different than what's a good tool that does X so I can do Y? Wish people could vote to take away people close power. –  Chris Craft May 6 '09 at 12:50 I would understand if I just wanted to host a "boxed" game server but I am writing one in C# –  Jamey McElveen May 6 '09 at 12:50 add comment 1 Answer up vote 1 down vote accepted Ok, here is a shot as an answer other then just a simple hosting company. I am not sure of your means, but what I did was pay about $300 a month for a 1/4 rack colocation in Chicago, IL. For that I get all the redundant power and bandwidth I need (29Mb up, 72Mb down normally). I then went on EBay and got myself a couple Dell PowerEdge 2850 Dual 2.8GHz Xeon, 4GB RAM, 3x73GB 15k RPM RAID for about $350 each. Put them all in, and boom, instant data-center. I figure it took me about 15-20 hours to setup everything, $1000 in hardware, and $300 a month in colo fees. So it is not for everyone, but for the small business that needs control of their servers, but need more performance/reliability then hosted, it is not a bad option. share|improve this answer Thanks! I am really shooting for 100$/month since the project is still in the testing phase. But 300$ is a good starting point I will use your solution if I do not find a cheaper one :> –  Jamey McElveen May 7 '09 at 12:36 add comment Your Answer
http://stackoverflow.com/questions/829376/who-is-a-good-host-for-a-realtime-tcp-ip-game-server
dclm-gs1-170970000
0.156968
<urn:uuid:e9ffb0ef-4390-4862-bf13-bb17e8c7d6c2>
en
0.889732
Take the 2-minute tour × I'm not so experienced in C#, I'm used to work in java. I've already asked for something before and some people advised me this. link to my old topic here But I have new problem with this code. The Visual Studio says that "I cannot have instance filed initializers in struct" - so there is some problem but I really don't understand this thing so is somehow possible make this work?? I just need anchors type Vector3 which is matrix or array of arrays - whatever 4x4 In java I'll probably write it public Vector3[][] = new Vector3[4][4]; This is my problematic code: struct BPatch public Vector3[][] anchors = new Vector3[][] {new Vector3[4],new Vector3[4],new Vector3[4],new Vector3[4]}; public uint dlBPatch;// Display list public uint texture;// Texture share|improve this question possible duplicate of "cannot have instance field initializers in structs" problem –  nawfal Apr 15 '13 at 10:42 add comment 1 Answer up vote 1 down vote accepted By the time you've got 5 arrays, you might as well just make it a class. It will behave more sensibly: class BPatch public Vector3[][] Anchors { get { return anchors; } } public uint DlBPatch {get;set;} public uint Texture {get;set;} If you have good reason to micro-optimize, a "fixed" array (rather than a jagged array) might be interesting. share|improve this answer And if I also need to set the anchors?? Why you used readonly?? I really don't much uderstand difference between fixed and jagged array. I found out that jagged array is array of array - thats only I know. –  user1097772 Dec 31 '11 at 19:41 @user1097772 fixed sized arrays (fixed buffers) are an advanced technique in structs using "unsafe" code to embed a buffer directly in a struct. Hardcore stuff. You could make the outer array read-write. But in most cases that is an error; the intent is usually to change the contents, not to reassign the array. It is your type - do as you will. I should also add: most times, when someone new to c# uses a struct, they use it both inappropriately and incorrectly. Just saying... –  Marc Gravell Dec 31 '11 at 19:47 Thx. I just need to do this: Bpatch bpatch = new Bpatch(); bpatch.anchors[0][1] = new Vector3(-0.75f,-0.75f,-0.5f); bpatch.anchors[0][2] = new Vector3(-0.25f,-0.75f,0.0f); etc.. Is that possible with readonly qualifier? My first intent was have anchors as matrix 4x4 –  user1097772 Dec 31 '11 at 20:19 @user1097772 yes; that doesn't reassign the array - should work fine –  Marc Gravell Dec 31 '11 at 20:30 Thanks a lot ;-) –  user1097772 Dec 31 '11 at 20:42 add comment Your Answer
http://stackoverflow.com/questions/8689945/cannot-have-instance-field-initializers-in-struct
dclm-gs1-170990000
0.689493
<urn:uuid:ebf2cf14-92b7-4fc1-9735-07b42dccbbdf>
en
0.855267
Take the 2-minute tour × I'm using Node.js and Express, and I want to pass a local variable in to the layout on every page, is there any way to do this? I'm using Jade as my templating engine. The reason I want this is because I want to display the user's username on every page (using session), any way to do this other than including it every time in the local object? share|improve this question add comment 1 Answer up vote 7 down vote accepted You can achieve this by defining a dynamic view helper, as pointed out in the official Express guide: session: function(req, res){ return req.session; Then in your views you can simply access the session variable, and for example session.user to display the user. share|improve this answer Perfect, thanks! –  Varun Singh Jan 4 '12 at 11:46 add comment Your Answer
http://stackoverflow.com/questions/8725929/node-js-set-default-local-variables-to-pass-into-layout-template
dclm-gs1-171000000
0.757778
<urn:uuid:3b484f0e-c4eb-45b6-b451-00b6bdca0d7d>
en
0.895176
Take the 2-minute tour × I'm collecting some basic stats from a Google Calendar feed with DOM and Php. I have been trying to get the event endTime using the following: `$times = $entry->getElementsByTagName( "when" ); $startTime = $times->item(0)->getAttributeNode( "startTime" )->value; $endTime = $times->item(0)->getAttributeNode("endTime" )->value;` Which results in an end time of 04:00:00 for every appointment. I was trying different things and entered 1 instead of 0 in item() this results in a correct end time, but only three of the 50 appointments are displayed. My feed is private, full, ordered by start time, singleevents=true, and start-min/start-max are set. Is there a different way to get event endTime? share|improve this question add comment 1 Answer up vote 0 down vote accepted Never did find the answer to this question. Went ahead and went the Zend/Gdata route. Took a little to get up to speed but it works now. share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/8977638/google-calendar-feed-dom-not-returning-endtime-correctly
dclm-gs1-171030000
0.18256
<urn:uuid:1a36a1d4-f60b-4649-90fe-15514857c692>
en
0.863084
Take the 2-minute tour × I have renamed a python class being a part of a library. I am willing to leave a possibility to use its previous name for some time but would like to warn user that it's deprecated and will be removed somewhere in the future. I think that to provide backward compatibility it will be enough to use an alias like that: class NewClsName: OldClsName = NewClsName I have no idea how to mark the OldClsName as deprecated in an elegant way. Maybe I could make OldClsName a function which emits a warning (to logs) and constructs the NewClsName object from its parameters (using *args and **kvargs) but it doesn't seem elegant enough (or maybe it is?). Unfortunately, I don't know how Python standard library deprecation warnings work but I imagine that there may be some nice magic to deal with deprecation, e.g. allowing treating it as errors or silencing depending on some interpreter's command line option. The question is: How to warn users about using an obsolete class alias (or obsolete class in general). EDIT: The function approach doesn't work for me (I already gave it a try) because the class has some class methods (factory methods) which can't be called when the OldClsName is defined as a function. Following code won't work: class NewClsName(object): def CreateVariant1( cls, ... ): def CreateVariant2( cls, ... ): def OldClsName(*args, **kwargs): warnings.warn("The 'OldClsName' class was renamed [...]", DeprecationWarning ) return NewClsName(*args, **kwargs) OldClsName.CreateVariant1( ... ) Because of: AttributeError: 'function' object has no attribute 'CreateVariant1' Is inheritance my only option? To be honest, it doesn't look very clean to me - it affects class hierarchy through introduction of unnecessary derivation. Additionally, OldClsName is not NewClsName what is not an issue in most cases but may be a problem in case of poorly written code using the library. I could also create a dummy, unrelated OldClsName class and implement a constructor as well as wrappers for all class methods in it, but it is even worse solution, in my opinion. share|improve this question add comment 2 Answers up vote 4 down vote accepted Yup, I think that's pretty standard practice: def OldClsName(*args, **kwargs): from warnings import warn warn("get with the program!") return NewClsName(*args, **kwargs) The only tricky thing is if you have things that subclass from OldClsName - then we have to get clever. If you just need to keep access to class methods, this should do it: class DeprecationHelper(object): def __init__(self, new_target): self.new_target = new_target def _warn(self): from warnings import warn warn("Get with the program!") return self.new_target(*args, **kwargs) def __getattr__(self, attr): return getattr(self.new_target, attr) OldClsName = DeprecationHelper(NewClsName) I haven't tested it, but that should give you the idea - __call__ will handle the normal-instantation route, __getattr__ will capture accesses to the class methods & still generate the warning, without messing with your class heirarchy. share|improve this answer Supporting inheritance should be easy as well - just write a class OldClsName(NewClsName): # and overload __new__. –  delnan Jan 25 '12 at 19:05 +1 for confirming that this solution is used and for mentioning the warnings module. Unfortunately the function solution doesn't work for me (see edited question). Maybe you have some other clean solutions? :D –  Dariusz Walczak Jan 25 '12 at 21:51 Updated with an example of using a wrapper object that can proxy both calls & attribute accesses to the new class. –  AdamKG Jan 25 '12 at 22:02 Ahh, nice, nice. Works perfectly, thank you very much :) –  Dariusz Walczak Jan 26 '12 at 9:49 add comment Please have a look at warnings.warn. As you'll see, the example in the documentation is a deprecation warning: def deprecation(message): warnings.warn(message, DeprecationWarning, stacklevel=2) share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/9008444/how-to-warn-about-class-name-deprecation
dclm-gs1-171040000
0.162349
<urn:uuid:f6ac93f1-dfab-4a4d-8513-bb4b4f40f0f5>
en
0.87698
Take the 2-minute tour × I have a div and then a div with a nested table inside it: also there is some div outside the parent div. <div onmousemove="move()" onmouseout="out()"> <div id="dvRep"> </div> <tr><td>ITEM 1</td></tr> <tr><td>ITEM 2</td></tr> <tr><td>ITEM 3</td></tr> <tr><td>ITEM 4</td></tr> <tr><td>ITEM 5</td></tr> <div id="divChartPopupMenu"> Hide me. Whenever i move my mouse within the div it correctly calls the move function, but the onmouseout attribute doesn't work like i thought. i thought that the out() function would only be called if you moved your mouse off the div, but out() is called whenever i move off one of the table rows. so if my mouse is on a row and i move to the next row it calls out(). i want out() to be called only when the user moves off the entire div. any ideas? What i am trying is on out function i am hiding another div. share|improve this question add comment 3 Answers up vote 1 down vote accepted i suggest you to read this article on 3 phases of javascript events. in the function move or out, you can check if the srcElement(IE) or target(W3C) has an id called dvRep.. it should look something like this: function out(event) event.stopPropagation(); //cancel bubbling ele = event.target || event.srcElement if (ele.id === "dvRep"){ //your code share|improve this answer add comment It sounds like you're having issue with event bubbling. When you hover a tr you're mouse is no longer 'in' the div - therefore when you move between them you're going tr (out) -> div (in) -> div (out) -> tr (in). That's why you're out() function is being called between tr's. Useful reading: share|improve this answer add comment What the heck? I found the exact same posting on a different forum from 7 years ago?? http://www.webdeveloper.com/forum/archive/index.php/t-65078.html share|improve this answer Good finding +1. –  Pavan Feb 1 '12 at 10:31 yup you are right i didn't had the time to right all the things so i posted most of the part from there. –  ankur Feb 1 '12 at 10:39 ... but you didn't read the response pointing to event bubbling issues? –  devnull69 Feb 1 '12 at 10:40 I read that but what i was doing and the post was about is differnet. –  ankur Feb 1 '12 at 10:41 add comment Your Answer
http://stackoverflow.com/questions/9094071/div-onmouseout-does-not-work-as-expected
dclm-gs1-171050000
0.988353
<urn:uuid:9101c045-2005-416d-92cb-b3b8de927e41>
en
0.698607
Take the 2-minute tour × i want to insert a string as date format in mysql table using vb.net.my code is given below.but i always get an error .the string is stored in an array. Dim sdfsa As String = Convert.ToDateTime(newarray(i + 17)).ToShortDateString().ToString("yyyy-MM-dd") Dim newdate As Date = DateTime.ParseExact(sdfsa, "yyyy-MM-dd", System.Globalization.CultureInfo.InvariantCulture) datarw("date_of_birth") = newdate share|improve this question add comment 2 Answers Are the Users inputting this information directly? if they are why don't you input have them input the value in a masked text box? This Link Could Help share|improve this answer add comment Try this: my_date =Format(Now,"yyyy-MM-dd") share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/9494864/how-to-convert-string-to-mysql-date-format-using-vb-net
dclm-gs1-171070000
0.466508
<urn:uuid:91cdccb9-8b31-4ed8-a18d-a49918af62a8>
en
0.90692
Take the 2-minute tour × I'm wondering what is considered best practice for the following case: I need to keep open a socket in my android client that listens to messages it gets from the server and notifies the user with a toast message. My first thought went to using a singleton and storing the client I use to communicate with the server there: This way I can send a message using: A problem I will probably encounter here is doing something in the activity when the socket receives an incoming message. One way of handling it would be something like this in an Activity: MySingletonHere.getInstance().setMessageHandler(new MessageHandler() { public String handleMessage(String m) { Toast.make ... What I would like to ask is if this is considered a "good" solution because it doesn't feel like one. There probably is an android component that could handle this kind of situation. I don't know much about android development but if I understand correctly a service should be able to perform something like this? share|improve this question Have you considered [C2DM](code.google.com/android/c2dm/)? –  Phil Mar 9 '12 at 22:36 We have considered C2DM but it's a small school project and the push notifications aren't the most important part so we quickly wrote our own simple server / client. The communication works, I was just curious about what most people use to handle background messages like this (not necessarily push notifications). –  geoffreydv Mar 9 '12 at 22:43 add comment 1 Answer If these messages only matter while the one-and-only activity that cares about the messages is in the foreground, just have the activity handle the socket itself. Beyond that, though, you need a service, simply because Android will be getting rid of your process otherwise. So long as the service will run for a fairly short time, or is very obviously under the user's control (and you also use startForeground()), this will work. share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/9641841/should-i-use-a-service-for-push-notifications
dclm-gs1-171080000
0.42539
<urn:uuid:0b4d5c7b-b6f3-47d2-9f27-a73fee8c8e1c>
en
0.863691
Take the 2-minute tour × My intention is to have the post_entry level with the headline. I've noticed that some entries do this while others are shifted up or down seemingly random amounts. What is causing this? How do I fix/prevent it? Site- http://whskytngfxtrt.com enter image description here (the slope of the red lines show the problem) Thank you. share|improve this question Your HTML is a mess. You should not be wrapping the entire content of a post, images, links and all, in a P tag. Consider DIVs or LIs to wrap posts. Also in HTML, IDs are supposed to unique, yet you have id="headline" throughout your document. You don't need a FIX, you need a re-write. –  Diodeus Mar 27 '12 at 19:45 You have one big DIV.post_entry containing all your entries... wrap them all separately. –  Didier Ghys Mar 27 '12 at 19:59 how do i wrap them separately? –  AMC Mar 27 '12 at 20:21 add comment 1 Answer up vote 1 down vote accepted I think it has something to do with the margin-top you put on everything by hitting #main .post_entry and p, but unless you clean up your HTML (as Diodeus and Didier Ghys recommended: put everything into separate divs) it's impossible to say for sure. Sorry! In your CSS, I noticed something else in this part: #main .post_entry p { font-size: 80%; font-weight: normal; line-height: 150%; margin-left: 230px; margin-bottom: 25px; margin-top: -82px; overflow: hidden; width: 403px; margin-top: -82px; As you see, there is two margin tops of -82. share|improve this answer thank you for pointing this out- i guess i overlooked it. removing the second margin-top helped, but didn't completely fix the issue. –  AMC Mar 27 '12 at 21:48 add comment Your Answer
http://stackoverflow.com/questions/9896445/css-spacing-issues-overlap-between-posts?answertab=votes
dclm-gs1-171110000