fasttext_score
float32
0.02
1
id
stringlengths
47
47
language
stringclasses
1 value
language_score
float32
0.65
1
text
stringlengths
49
665k
url
stringlengths
13
2.09k
nemo_id
stringlengths
18
18
0.76586
<urn:uuid:0936daf2-4f72-451c-ba3b-d0430e78f792>
en
0.889829
Take the 2-minute tour × Basically, I am designing a web search engine, so I designed a crawler to get web pages. When read in, the web pages are in html format, so all the tags are there. I need to extract keywords from the body and title, so I'm trying to remove all the tags (anything between '<' and '>') The code below works well for small html pages, but when I try to use this on a large scale (ie starting from http://www.google.com), I run out of memory. 0 def remove_tags(self, s): 1 while '<' in s: 2 start = s.index('<') 3 end = s.index('>') 4 s = s[:start] + " " + s[end+1:] 5 return s.split() The memory error occurs at line 4. How do I fix my code so that taking the substrings of s doesn't consume excessive memory? share|improve this question Oh man that's ugly. –  Joel Cornett Jul 29 '12 at 9:14 add comment 1 Answer up vote 8 down vote accepted Your general approach is wrong. Firstly, use a real XML/HTML parser. Something like BeautifulSoup, which is forgiving when it comes to bad HTML. Your approach with looking at < and > won't survive for long. Secondly, you've read the whole thing into memory and are playing with it there. That's memory consuming and some of the operations you're doing might create copies which is not a good thing either. Instead, iterate over the input stream and process it as you see data. Think of remove_tags as a filter on the input rather than a text processing function. share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/11707540/python-memory-error-while-using-large-strings
dclm-gs1-180680000
0.112695
<urn:uuid:93734b98-64b0-461b-bde5-f8b62e46c3ad>
en
0.808065
Take the 2-minute tour × I want to display a message box when any person clicks on the menu item which is not enabled I have tried the following coding but it is not displaying the message box. private void updateFineDetailsToolStripMenuItem_Click(object sender, EventArgs e) if (updateFineDetailsToolStripMenuItem.Enabled == true) frmUpdateFineDetails objUpdateFineDetails = new frmUpdateFineDetails(); objUpdateFineDetails.MdiParent = this; else if (updateFineDetailsToolStripMenuItem.Enabled == false) MessageBox.Show("Unauthorized Person"); By default I have set the enabled status to false and when the form loads I am checking whether the user is administrator, if the user is admin then this menu item will be enabled for all other user who logs into the application the above menu item has to be disabled. Please note that the above coding does not generate any error, but it does not even display the messagebox as unauthorized person. Can anybody help me out in performing this task? Thanks in advance! share|improve this question add comment 5 Answers The whole idea of disabling a menu item or a button is to prevent the user from interacting with it. Typically the control will also be rendered in a way so that this becomes clear to the user. If you want to prevent the user from taking certain actions, for instance based on whether the user is an administrator or not, you can use one of three approaches: • Keep the control enabled and inform unauthorized users that the function is not available if he or she invokes it • Disable the control • Hide the control In the later two cases there is no interaction, since the user cannot invoke the command. I usually tend to prefer to hide the command, if the access to it is role based (meaning that if I don't have access to the command when I start the application, it will not happen at any point while running it), or disabling it if the availability of the command is related to data state. share|improve this answer add comment As I understand, a disabled menu item does not raise Click events. share|improve this answer Thanks for your prompt reply! But is it possible to display the MessageBox when other users click on it? –  Sheetal Jul 25 '09 at 7:13 add comment If you need to display the error message then enable the menu item. If admin clicks then default action occurs and if other users click show a message box and prevent the default action. From your code I think you can do this just by enabling the menu item. share|improve this answer add comment Disabling a menu item isn't a cosmetic display issue, it does just what you'd expect from the term - it disables the menu item. When disabled, the menu item is effectively inert - it will not raise the click event, and there's no (straightforward) way to make it do so. I can guess at your motivations - to explain to your users why the particular menu item is unavailable to them - but you'll need to find a different approach, one that works with the system, not against it. Some possible approaches ... • Leave the menu item disabled, allowing the user to select it - you can then make a role based choice on how to handle the event. • Disable the menu item and provide feedback elsewhere in your UI telling the user what level of access they have. • Display a tooltip with the reason for disabling the control • Leave the menu item enabled, but change it's display to look inactive (this is hard to achieve 100%); this will allow the events to fire and your handler to be invoked • Create a separate "Explain" menu item, perhaps on the "Help" menu; when invoked, all disabled menu items become enabled, and will explain to the user why the command is unavailable. • Some systems display a line of help text relevant to the highlighted menu item on the status bar - you could leverage this to explain availability: "Maintain customer details (requires Administrator role)" share|improve this answer add comment a disabled control does not raise Click events. you should simulate that state! for example: 1. enable menu item 2. change menu item's forecolor to SystemColors.GrayText 3. save state of item in item's tag (enable or disable) 4. if click event raised, first check item's tag 5. change menu item's forecolor to normal fore color if enabled item. share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/1181436/displaying-messagebox-when-disabled-menu-item-is-clicked
dclm-gs1-180700000
0.093567
<urn:uuid:97c08f75-7c2f-4a38-a180-ec413c41b3db>
en
0.885592
Take the 2-minute tour × I have a file as below: 28 temp 5 I am using the below command for splitting the lines and get the last number in the line. awk -F"temp" '{print $NF}' temp3 the ouput i got is : > awk -F"temp" '{print $NF}' temp3 28 temp 5 Surprisingly if i use nawk i am getting the expected output. > nawk -F"temp" '{print $NF}' temp3 May i know the reason why? Is awk not supporting the string mentioned as a separator? share|improve this question If the last number in the line is all that you want sed 's/.*temp *//' file might be a better choice. –  potong Aug 13 '12 at 20:01 I want to explore the behaviour of awk here..i know that this can be done by using other tools like sed and perl. –  Vijay Aug 14 '12 at 6:10 add comment 1 Answer up vote 2 down vote accepted Indeed Solaris awk only considers a single character. I'd say it's probably due to tradition, and exactly the reason why nawk is shipped, as well. The -F switch is really special: it's taking the first character of your quoted string, and discarding the rest, so the t remains --- which stands for "look for tab as field separator". share|improve this answer Then if thats the case why it is not considering atleast t as the field separator and printing emp3 as the $NF for the first line? –  Vijay Aug 13 '12 at 13:52 @ShiDoiSi: $NF signifies the contents of the last field on the line. You are correct that AWK doesn't use dollar signs for variables, it uses them for field numbers. NF is the variable that contains the number of the last field. –  Dennis Williamson Aug 13 '12 at 23:42 @DennisWilliamson Right, I didn't pay close attention to his intended output, I thought he wanted to print the number of fields. –  ShiDoiSi Aug 14 '12 at 7:14 add comment Your Answer
http://stackoverflow.com/questions/11934952/splitting-a-line-according-to-the-field-separator-as-a-string
dclm-gs1-180710000
0.346464
<urn:uuid:ea751c7b-9656-4de4-a6f1-54fecca145df>
en
0.684034
Take the 2-minute tour × So I am trying to get a UITableView to show a list of objects by section (thing.title), but list them in descending order by date. The table is is split into sections, which are labeled correctly (section headers are the different thing titles). But the objects in each section are only half correct. The objects in each section are listed in descending order, but some sections contain data that should be in other sections. An example of what is happening: <Header> Big Title Name <data><Big Title><id=1></data> <data><Big Title><id=4></data> **<data><Small Title><id=6></data>** <-- should not be in this section <Header> Small Title Name <data><Small Title><id=11></data> <data><Big Title><id=23></data> <-- should not be in this section **<data><Small Title><id=66></data>** Here is part of my code: - (NSFetchedResultsController *)fetchedResultsController { if (fetchedResultsController != nil) { return fetchedResultsController; Set up the fetched results controller. // Create the fetch request for the entity. NSFetchRequest *fetchRequest = [[NSFetchRequest alloc] init]; // Edit the entity name as appropriate. NSEntityDescription *entity = [NSEntityDescription entityForName:@"AReads" inManagedObjectContext:[NSManagedObjectContext defaultContext]]; [fetchRequest setEntity:entity]; // Set the batch size to a suitable number. [fetchRequest setFetchBatchSize:20]; // Sort using the timeStamp property.. [fetchRequest setSortDescriptors:sortDescriptors]; // Use the sectionIdentifier property to group into sections. NSFetchedResultsController *aFetchedResultsController = [[NSFetchedResultsController alloc] initWithFetchRequest:fetchRequest managedObjectContext:[NSManagedObjectContext defaultContext] sectionNameKeyPath:@"sessionTitle" cacheName:@"Root"]; aFetchedResultsController.delegate = self; self.fetchedResultsController = aFetchedResultsController; return fetchedResultsController; //return [(Sessions*)[masterSessions objectAtIndex: section] title]; id <NSFetchedResultsSectionInfo> theSection = [[fetchedResultsController sections] objectAtIndex:section]; NSString *theTitle = [theSection name]; return theTitle; share|improve this question Before reloading your UITableView, make sure to sort your array & the objects within it as per your requirement.You won't need to make any changes with your code in cellforRowAtIndexpath. –  Ajay Sharma Oct 9 '12 at 4:47 add comment 1 Answer up vote 1 down vote accepted The key used as sectionNameKeyPath of a fetched results controller and the key used in the first sort descriptor must either be the same keys or generate the same relative ordering. So you cannot use sessionTitle as sectionNameKeyPath and a completely different key timeStamp as sort descriptor for the sections. In your case, it is probably the best to use timeStamp as sectionNameKeyPath and in the sort descriptor. This will ensure that all entries are correctly grouped into sections. To display the sessionTitle instead of the timeStamp in the section header, you can modify titleForHeaderInSection: id <NSFetchedResultsSectionInfo> sectionInfo = [[self.controller sections] objectAtIndex:section]; return [[[sectionInfo objects] objectAtIndex:0] sessionTitle]; share|improve this answer Added another sortDescriptor and made it the first descriptor in the descriptors array and it works. [[NSSortDescriptor alloc] initWithKey:@"sessionTitle" ascending:YES] –  jnewport Oct 9 '12 at 14:12 @jgervin: OK, then I misunderstood your problem slightly. I thought that you wanted the session titles ordered by date. I'm glad if my answer helped to find the correct solution. –  Martin R Oct 9 '12 at 14:16 I did/do. I my data needs to be sectioned by session title and then within each section the objects need to be ordered by a timeStamp. –  jnewport Oct 9 '12 at 20:39 add comment Your Answer
http://stackoverflow.com/questions/12791678/uitableview-sectioned-with-sort-order-not-sectioning-correctly
dclm-gs1-180780000
0.037257
<urn:uuid:f6c31d98-324f-4775-bdca-d4558120e7fd>
en
0.806027
Take the 2-minute tour × I'm trying to implement an ISO8589 message to a financial institution. They however, have a Web Service that I call and then I load the ISO8589 payload into an appropriate field of the WCF service. I have created an ISO8589 message this way: var isoMessage = new OpenIso8583.Net.Iso8583(); isoMessage.MessageType = Iso8583.MsgType._0100_AUTH_REQ; isoMessage.TransactionAmount = (long) 123.00; isoMessage[Iso8583.Bit._002_PAN] = "4111111111111111"; // More after this. I can't seem to figure out how I can convert the isoMessage into an ASCII human readable format so I can pass it through to the web service. Anyone have any idea how this can be done with this library? Or am I using this library the wrong way? I have figured out how to do this doing: var asciiFormatter = new AsciiFormatter(); var asciiValue = asciiFormatter.GetString(isoMessage.ToMsg()); However, Now I am trying to take the isoMessage and pass the entire thing as hex string easily using OpenIso8583.Net, as follows: var isoMessage = new OpenIso8583Net.Iso8583(); isoMessage.MessageType = Iso8583.MsgType._0800_NWRK_MNG_REQ; isoMessage[Iso8583.Bit._003_PROC_CODE] = "000000"; isoMessage[Iso8583.Bit._011_SYS_TRACE_AUDIT_NUM] = "000001"; isoMessage[Iso8583.Bit._041_CARD_ACCEPTOR_TERMINAL_ID] = "29110001"; I know this is tricky, because some fields are BCD, AlpahNumeric, Numeric, etc. however, this should be realively easy (or I would think) using OpenIso8583.Net? The result I'd like to get is: Msg Bitmap (3, 11, 41) ProcCode Audit Terminal ID 08 00 20 20 00 00 00 80 00 00 00 00 00 00 00 01 32 39 31 31 30 30 30 31 Any help would be greatly appreciated! share|improve this question add comment 1 Answer up vote 1 down vote accepted Essentially, you need to extend Iso8583 which you initialise with your own Template In the Template, you can set the formatters for each field so that BCD and binary packing is not used. Have a look at the source code for Iso8583 as to how it works. share|improve this answer Where to find the code for Iso8583 –  Chandu- Indyaah Oct 23 '13 at 10:43 You can download it from the public repo code.google.com/p/openiso8583net/source/list –  John Oxley Oct 24 '13 at 10:43 add comment Your Answer
http://stackoverflow.com/questions/12927004/convert-openiso8583-net-into-different-formats/13229075
dclm-gs1-180820000
0.027961
<urn:uuid:435a22b1-2847-4d41-8705-894d0765e139>
en
0.811297
Take the 2-minute tour × When I want to deploy an MVC 4 (.net 4.5) application to my iis i got the 403.14 calling me that the content ist not browseable. This also occurs when i deploy the unchanged mvc 4 template. when using the mvc 4 template with .net 4.0 everything works. I checked the other posts but can't figure out the solution. ist set i ran aspnet_regiss -i which completed without any errors. the only strange thing is that .net 4.5 is installed in the .net 4.0 directory %windows%/microsoft.net/Framework64/4.0.30319 From this folder i also ran aspnet_regiis. to ensure that 4.5 is installed i restarted the .net 4.5 setup and it tells me taht it is installes Also the apppools show me 4.0.30319 as version. There is an other application targeting mvc with 4.5 which runs. but i don't know wether it was created with a 4.0 templated and retargeted to 4.5 Any hints? The app.config is the unchanged default from the mvc 4 template. I just tested to create a subfolder which i convert to an application. placing the site there makes it working for the main page. But all subpages forexample login end ab in a 404 Not Found But why not on root folder? share|improve this question Downvote without any comment ? –  Boas Enkler Nov 25 '12 at 9:42 403.14 means "Directory listing denied." follow KB support.microsoft.com/kb/942062 –  Anand Nov 29 '12 at 23:06 It's an MVC app so there is no default document. The routes should get interpreted... –  Boas Enkler Dec 4 '12 at 7:43 add comment 1 Answer up vote 2 down vote accepted .net 4.5 replaces .net 4. http://msdn.microsoft.com/en-us/library/5a4x27ek.aspx. You probably want to use this in your web.config file to make you application work: <modules runAllManagedModulesForAllRequests="true" /> If the code does what you want then you will want to do it the proper way as described here: http://www.britishdeveloper.co.uk/2010/06/dont-use-modules-runallmanagedmodulesfo.html share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/13540428/net-4-5-asp-mvc-error-403-14-iis-7-windows-server-2008-r2
dclm-gs1-180880000
0.113359
<urn:uuid:c7cbc7fe-658b-4de4-81eb-880c45cc0e6e>
en
0.824755
Take the 2-minute tour × I used the next code to open my facebook page from ios app : [[UIApplication sharedApplication] openURL:[NSURL URLWithString:@"http://www.facebook.com/pages/UNNYHOG-Entertainment/208173649242257"]]; And everything was fine, and it's still fine if you don't have a FB app on your device. But if you have it - you will be redirected to https://m.facebook.com/pages/UNNYHOG-Entertainment/208173649242257?id=208173649242257&_rdr Do anyone knows why does it happening? I guess they made some changes in their app. But what should i do to fix it? share|improve this question I don't understand your issue... –  Bot Dec 10 '12 at 18:10 The question is : how can i open facebook page(not a profile, page for ex : facebook.com/pages/UNNYHOG-Entertainment/208173649242257) on iOS 6 with a last version of FB app on a device. The code that i used isn't working anymore. –  Unnyhog Entertainment Dec 10 '12 at 18:17 add comment 1 Answer up vote 2 down vote accepted See http://wiki.akosma.com/IPhone_URL_Schemes#Facebook For a page, you will want to use fb://profile/<page id> If you want to only use the fb:// url if they have facebook installed then use if ([[UIApplication sharedApplication] canOpenURL:[NSURL URLWithString:@"fb://"]]) { // Facebook app is installed fb://profile/<page id> otherwise use the http:// url share|improve this answer Thank you for the response. That works, but only if i have FB app on my device. It's not working without it. Is there any universal way? –  Unnyhog Entertainment Dec 10 '12 at 20:25 @UnnyhogEntertainment I have updated my answer. –  Bot Dec 10 '12 at 20:43 That works, thanks man! ;) –  Unnyhog Entertainment Dec 10 '12 at 21:07 add comment Your Answer
http://stackoverflow.com/questions/13806625/redirecting-while-opening-the-fb-page-from-ios-app-why?answertab=active
dclm-gs1-180900000
0.892919
<urn:uuid:1169236f-00c8-4aa3-8d25-9417b3654321>
en
0.920906
Take the 2-minute tour × I've been puzzling over this for a few days... feel free to shoot down any of my assumptions. We're using a Dictionary with integer keys. I assume that the value of the key in this case is used directly as the hash. Does this mean (if the keys are grouped over a small range) that the distribution of the key hash (same as the key itself, right?) will be in a similarly small range, and therefore a bad choice for a hashtable? Would it be better to provide an IEqualityComparer that did something clever with primes and modulo mathematics to calculate a better distributed hash? share|improve this question it depends on the distribution of your integer keys. Keys are already modulo'ed by a prime when calculating the hash bucket.. –  Mitch Wheat Sep 7 '09 at 8:59 Why assume the hash code is the same as the integer value? Test it! –  SteveD Sep 7 '09 at 9:09 Hash code IS the same as the integer value. –  spender Sep 7 '09 at 9:57 add comment 3 Answers up vote 4 down vote accepted It's not used directly in that the dictionary will still ask the key for its hash - but the hash value of an Int32 is just the value, so the thrust of your question is relevant, yes. I believe that the way the .NET dictionary works doesn't rely on hash values being uniformly distributed. It takes hash % bucketCount where bucketCount is always prime. (That's from memory though - I could be wrong.) You could still end up with an inefficient set of keys of course, if they happen to be spaced by the bucket count. That will always be the case though - a hash table would only ever be genuinely O(1) for all keys if they had unique hash values and the table maintained a set of buckets for every possible hash :) In reality it tends not to be a problem. If you happen to know that it will be a problem, then yes, a custom IEqualityComparer<T> could help. share|improve this answer Just checked with reflector... you are right with hash % bucketcount. Knowing that, it all falls into place. Thanks Jon. –  spender Sep 7 '09 at 11:57 add comment Assuming you're using a standard library hash table implementation, chances are the key is not the hash, even if the key is an integer, for exactly the reason that you point out. So while your logic regarding hash distributions is correct, your initial assumption that integer keys would mean that hashes = keys is probably not. If I'm wrong re: .NET then oh well; this is more of a generalized answer. :) share|improve this answer I think it's fairly common for the hash of a numeric type to just be the value, assuming it fits into the hash range. –  Jon Skeet Sep 7 '09 at 9:00 A potential issue that you run into that though is with patterns in sequences of numbers - if you get unlucky with the pattern width being a multiple of your bucketCount, you run into issues. –  Amber Sep 7 '09 at 9:03 Exactly as my post mentions... but any hash algorithm can wind up with that problem if you're unlucky. –  Jon Skeet Sep 7 '09 at 9:08 Sure. However simply due to the nature of data patterns tend to occur far more in standard input than in the output of a hash function specifically designed to mix things up a bit. –  Amber Sep 7 '09 at 9:13 add comment Before doing something clever I'd test the speed of it as-is, and see if it's suitable for you. If it isn't, then try the clever thing. But I would expect it's better to leave it alone; it's more important that the hashes don't collide, and as long as that's happening, life will be fine. share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/1388314/hashtables-dictionary-etc-with-integer-keys
dclm-gs1-180910000
0.57207
<urn:uuid:e00063a7-1171-4dae-b8d8-43c6d6a55dd2>
en
0.846366
Take the 2-minute tour × I tried to modify properties of JvTabBar, but it does not work. I assigned JvTabBarXPPainter to JvTabBar, but it only changed "FixedTabSize" properties. All the other cannot be changed. What interests me is to change the background color and font. share|improve this question add comment 1 Answer up vote 3 down vote accepted You can use TJvModernTabBarPainter and assign it to the JvTabBar. It allows you to modify all properties. The XP-Painter paints with the theming API and you can't change its colors unless you change the XP theming style system wide. share|improve this answer Now it works. Thanks. –  Stok3r Jan 6 '13 at 11:20 add comment Your Answer
http://stackoverflow.com/questions/14178151/modifying-jvtabbar-with-jvtabbarxppainter
dclm-gs1-180930000
0.916301
<urn:uuid:8a904092-aefc-470c-ba0d-bb062dbe351d>
en
0.669028
Take the 2-minute tour × How can I count the number of spaces of the current line in a textarea If my cursor is current on line 2 then the result should be: 3 share|improve this question add comment 2 Answers up vote 0 down vote accepted Here is the code: window.onload = function () { var ta = document.getElementById('ta'); //set your textarea's id ta.onclick = function (e) { var lineNo = ta.value.substr(0, ta.selectionStart).split(/\r?\n|\r/).length, lineText = ta.value.split(/\r?\n|\r/)[lineNo - 1], numOfSpaces = lineText.split(/\s/).length - 1; console.log(lineNo, lineText, numOfSpaces); Here is the fiddle. NOTE: textarea.selectionStart does not work in some browsers. For a cross-browser support see this post. share|improve this answer add comment You need to split the string value of the textarea and then: var textString = //pull data from textarea var textArray = textString.split("\n"); for(var i=0; i<textArray.length; i++) { var count = textArray[i].match(/ /g); //regex to get any number of spaces share|improve this answer If the regular expression includes the g flag, the method returns an Array containing all matches. –  Samuel Liew Feb 19 '13 at 1:58 Why not be constructive instead of down voting? –  jimjimmy1995 Feb 19 '13 at 2:01 OP needs more granular solution , wants to know based on cursor posiiton. ALso your loop is checking the same textArray[0] each time –  charlietfl Feb 19 '13 at 2:03 You'll need to get cursor position and then do the loop: stackoverflow.com/questions/1891444/… –  Ray Cheng Feb 19 '13 at 2:10 @RayCheng Exactly. I am just showing that you can get data for each line. You would find the cursor line and pass that into var count = textArray[i].match(/ /g); instead of looping. –  jimjimmy1995 Feb 19 '13 at 2:21 show 4 more comments Your Answer
http://stackoverflow.com/questions/14948425/count-the-number-of-spaces-of-the-current-line-in-a-textarea
dclm-gs1-180960000
0.053857
<urn:uuid:94a5918d-6a92-4e68-bfa5-9d9c9637355d>
en
0.869725
Take the 2-minute tour × How to make any DIRECTORY WRITABLE , on heroku ?? because I make an app on facebook , with heroku hosting but there is some DIRECTORY should be WRITABLE to run my app . thank you share|improve this question add comment 1 Answer up vote 0 down vote accepted Heroku doesn't allow you to write directly to the filesystem. It's because of the way they deploy each app as a self-contained 'slug'. If you want to write files you'll need to use something like Amazon's S3 or serialize the data and save it to the database. share|improve this answer thank you very much –  user1992517 Feb 22 '13 at 12:45 Please accept the answer if it was helpful. :) –  Richard Brown Feb 22 '13 at 12:48 ok :):):):):):):):) –  user1992517 Feb 23 '13 at 7:40 add comment Your Answer
http://stackoverflow.com/questions/15024444/how-to-make-any-directory-writable-on-heroku
dclm-gs1-180970000
0.087377
<urn:uuid:b318ff4d-c7d6-4412-b92f-9c41147ec84c>
en
0.894807
Take the 2-minute tour × Right now, my rails app seems to write to production.log in intervals. How do I make the log update instantly? Or is there a way to force the log to flush? share|improve this question FYI if you're still on 3.2.11 you're a few security patches behind, and you should consider updating to the latest Rails. –  Mark Rushakoff Mar 28 '13 at 2:18 add comment Your Answer Browse other questions tagged or ask your own question.
http://stackoverflow.com/questions/15672998/how-do-i-make-the-production-log-flush-in-rails-3-2-11
dclm-gs1-180990000
0.758097
<urn:uuid:27cfd8f5-fe58-49f5-8f13-54e96c72f544>
en
0.830785
Take the 2-minute tour × I need to pick a future date from calendar, suppose the date I am selecting is 04/30/2013. Now what I want is to send the date to server. At server end I need to calculate the number of days between the future date and current date and send it to database. The problem is that when I do the calculation locally (because my server and browser are in same timezone) it works fine, but when the server is in a different timezone than the browser the difference in days does not come as expected. Someone please help me how to solve the timezone issues. share|improve this question Why don't you substract the dates on the client? –  NeplatnyUdaj Apr 17 '13 at 9:23 How do you send the date to the server? What format, I mean? –  MaxArt Apr 17 '13 at 9:24 @user2266098 That would be a violation of the MVC paradigm. –  MaxArt Apr 17 '13 at 9:25 Your question is not entirely clear to me: you are using javascript on the client side and java on your server ? –  jeroen_de_schutter Apr 17 '13 at 9:26 Well, you could simply pass the utc time to the server which generates the dates and calc the days between. –  sk2212 Apr 17 '13 at 9:28 add comment 2 Answers Convert both dates in one common timezone e.g. GMT and then calculate the difference. share|improve this answer add comment To Offset for time differences You should use a format to send the data that includes the timezone within it. You could: 1. Use UNIX time which does not use timezones (milliseconds since epoch) with GMT 00, and also use this on java side see: Get current date/time in seconds? 1. Use ISO-8601 which is a standard and can include the timezone as well of the browser, and then parse this server side: To Calculate the Difference (using MS and Calendar Object) You need to use the calendar object. You create a calendar object and set with a future date: e.g. How to set Java.util.calendar to a specific time period in the future Then you can perform a calculation by subtracting the current date (as long) with the long returned by the calendar, and dividing by (1000*60*60*24). Some code I used in my own application to find entries greater than a specific datetime (midnight): long currentTimeStamp = System.currentTimeMillis(); Calendar cal; cal = Calendar.getInstance(); cal.setTime(new Date(currentTimeStamp)); cal.set(Calendar.HOUR_OF_DAY, 0); cal.set(Calendar.MINUTE, 0); cal.set(Calendar.SECOND, 0); cal.set(Calendar.MILLISECOND,0); long midnight = cal.getTimeInMillis(); if(currentTimeStamp - midnight > (30*24*60*60*1000))break; share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/16056246/issue-getting-the-days-difference-between-future-date-and-current-date-in-java
dclm-gs1-181020000
0.254711
<urn:uuid:11f26734-865b-4dba-9f36-81094ff2e31f>
en
0.738402
Take the 2-minute tour × I have an alarm checker in my activity (Groups.java) to start a service each few seconds: public void lookForGroups() int seconds = 40; Intent myIntent = new Intent(Groups.this, GroupsTaskAlarmChecker.class); pendingIntent = PendingIntent.getService(Groups.this, 0, myIntent, 0); AlarmManager alarmManager = (AlarmManager)getSystemService(ALARM_SERVICE); Calendar calendar = Calendar.getInstance(); calendar.add(Calendar.SECOND, 10); alarmManager.setRepeating(AlarmManager.RTC_WAKEUP, calendar.getTimeInMillis(), seconds * 1000, pendingIntent); Also depending on sharedPreferences variable I start this service when I reboot device. Is posible to "kill" or start that alarm checker depending of a value of a variable? for example to automatically or manually sync my application. Thank you very much in advance and sorry for mi english ;) share|improve this question add comment 1 Answer up vote 1 down vote accepted Not sure if I understand this...but you create an Alarm checker and want to kill it if it's already running? should do it. According to the reference, it will cancel any alarms with a matching intent share|improve this answer I'm sorry for my ignorance, but how can I interact with this variable if I am in another activity?(because in activity I dont have a constructor, only onCreate, onResume etc.). Thanks! –  KTSX10 Apr 19 '13 at 21:04 Ok I got it. I can call it for another activity if I declare a static function that contains "alarmManager.cancel(pendingIntent)". Thanks again ;) –  KTSX10 Apr 19 '13 at 22:44 add comment Your Answer
http://stackoverflow.com/questions/16111592/kill-an-alarm-checker-in-android
dclm-gs1-181030000
0.57042
<urn:uuid:d58658ca-e230-46ea-9677-8dd67806bffb>
en
0.915779
Take the 2-minute tour × I have a class that contains an NSSet. That object is called _collectibles, and in a method, I make a copy of that set in order to do some processing, something like: NSSet* collectibleCopy = [_collectibles copy]; In practice, I see this regularly crash with this message: [__NSPlaceholderSet initWithObjects:count:]: attempt to insert nil object from objects I've resolved the issue by changing the above code to: NSMutableSet* collectibleCopy = [[NSMutableSet alloc] initWithCapacity: [_collectibles count]]; for ( id thing in _collectibles ) { [collectibleCopy addObject: thing]; And now I can no longer reproduce any such crash. I'm betting [copy] is more efficient, and I'd rather use it, but I can't figure out why it's completely wonky! Update: while full context would take a ton of explanation, the keys to me solving this were that, a, the code was invoked this way: NSBlockOperation* operation = [NSBlockOperation blockOperationWithBlock: ^{ [thing doStuff]; [operationQueue addOperation: operation]; And that I was, basically by making a bunch of things slower, catch the app with 2 threads running 2 threads for a queue initialized thusly: operationQueue.maxConcurrentOperationCount = 1; Which I thought impossible. The clue was that the second thread was in [NSAutoreleasePool drain], which led me to learn that NSOperationQueue can do autorelease stuff whenever/however it wants. share|improve this question I wasn't able to reproduce your bug. Could you post a bit more code for context? –  aLevelOfIndirection May 24 '13 at 14:07 is the set that you are copying a core data relationship? –  Grady Player May 24 '13 at 14:26 The entire context would require a huge pile of code. :) –  GoldenBoy May 24 '13 at 16:02 add comment 2 Answers NSSet* collectibleCopy = [NSSet setWithSet:_collectibles] work for you? share|improve this answer It might have- I'm guessing the reason it didn't crash (see my other answer) was something about the semantics of fast iteration vs. whatever NSSet does for the NSCopying protocol. –  GoldenBoy May 24 '13 at 16:01 add comment OK, so huzzah for having actually figured this out. The trick here was that this operation was performed on an async NSOperationQueue. TIL that NSOperationQueues have AutoreleasePools, but that they get drained at the discretion of GCD. In this case, the pool from a previous operation was being drained on another thread concurrently, causing what amounts to a rather opaque concurrent modification problem. @autoreleasepool inside the block on which this code got invoked. This causes the drain to happen as part of the block, rather than asynchronously, and my race condition goes away. share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/16736794/bizarre-nsset-copying-crash
dclm-gs1-181050000
0.026972
<urn:uuid:3f0153fb-f629-45ae-9adc-b57693832c83>
en
0.844794
Take the 2-minute tour × I mean I tried to export my java game like this : EXPORT>Jar File but if I do this it doesn't start. And if I export to executable jar file it doesn't export my resources into the jar file. I mean if I play the game in eclipse the sound works. But if I export to executable jar file it doesn't work. I guess it is not exporting the sound too. This is the code I tried to use to launch the jar file : java jar -cvfe ProjectZero.jar Main.Launcher Main.Launcher.class share|improve this question add comment 1 Answer Here are two solutions for solving this problem, hope this is clear enough: Solution #1 - You want your resources outside of the JAR file Just copy/paste the folder containing your resources in the same folder containing the JAR file. (Make sure the directory matches pathes mentioned in the application.) Solution #2 - You want your resources inside the JAR file If you want the resources to be directly included in the JAR file, you could use the function getResource() to get the images/sounds. Then make sure that resources are visible in both: "/src" and "/bin" folders. For example, if you have the following application code: ImageIcon myIcon = new ImageIcon(this.getClass().getResource("/resources/icon.gif")); your file should be visible in: Then you can export your application as a JAR file, it will contain the resources. share|improve this answer it gives me an error.. Cannot instantiate JComponent().. i'm currently using eclipse so maybe that's a problem –  Verdes Andrei Jul 14 '13 at 4:53 and also setIcon(myIcon) is undefined for the type JComponent –  Verdes Andrei Jul 14 '13 at 4:56 @VerdesAndrei It does not matter using Eclipse or not. This piece of code was just an example. You should only pay attention to "this.getClass().getResource("/resources/icon.gif")" to retrieve the path of your resource. –  Guillaume.M Jul 14 '13 at 15:48 add comment Your Answer
http://stackoverflow.com/questions/17633057/how-to-export-a-a-jar-file-correctly/17633210
dclm-gs1-181090000
0.080685
<urn:uuid:05079f0e-8ac6-42e2-99a0-63095978d8cb>
en
0.911474
Take the 2-minute tour × I've been looking all over the site and on stack overflow and I just can solve my issue. Network Setup The way my network on my staging world is that I have clients looking at my web app on a 443 port - https, but the underlying structure is listening on 80 port - http. So when my apps talk to each other its on port 80, but when the clients visit the site its port 443. So for example, my svc called from silverlight would be on port 80. I should also point out that on my staging and test domains: I have a web server acting as a portal to my app server; but this shouldn't really matter since I was able to get this working on test. It's just that staging has the HTTP forwarding to HTTPS. I have a silverlight xap file that is on the same domain as my hosted web application using IIS 6. Now since my silverlight xap file and my web application are on the same domain, I have no problems running this on dev and test, but when I try to deploy to staging I'm getting a weird cross domain reference problem: "System.ServiceModel.CommunicationException: An error occurred while trying to make a request to URI . This could be due to attempting to access a service in a cross-domain way without a proper cross-domain policy in place, or a policy that is unsuitable for Soap services." Digging around, I realize that my app thinks that my xap (or the service I'm calling) and my web app are on a different domain, and looks for the crossdomain.xml and clientaccesspolicy.xml files automatically, I can't really stop it. However, in my application, this is not the case. They both reside on the same domain. I have used fiddler and I didn't see anything about another domain or even a subdomain for that matter. Browser Issues Another weird thing that I found out is an issue with chrome vs ie: On chrome it finds the crossdomain.xml and clientaccesspolicy.xml telling me its insecure, then it does another fetch from the https side, signalling a 404 error. However, on IE I'm getting a 302 redirect. On microsoft's doc about clientaccesspolicy.xml you aren't supposed to do any redirects from the xml file; this is mentioned here: http://msdn.microsoft.com/en-us/library/cc838250(v=vs.95).aspx So my question is, if my app and xap are on the same domain, why are those xmls trying to get fetched? Is it because I'm using a DNS instead of an IP address? I also stumbled upon this site: http://msdn.microsoft.com/en-us/library/ff921170(v=pandp.20).aspx What does that even mean?? Okay so I changed the services to point to https instead of http. However new error comes out: The provided URI scheme 'https' is invalid; expected http. The good thing is, it doesn't even check crossdomain.xml or clientaccesspolicy.xml; so it now realizes it's on the same domain. But now it's expecting a service on port 80, but the name has to follow as https:// in order for it to work. I think the only solution I have now is to break it off as being a virtual directory, make it a root node of its own website, and make the whole thing as 443. Save myself the headache. share|improve this question I'm not exactly sure what is your setup but note that "same origin" means all 3 portions of the url must match: schema (http and https are different), domain (exact match required, not case sensitive), and port (exact match). –  Alexei Levenkov Sep 24 '13 at 18:19 If I make it the same origin I get a new error: System.ArgumentException: The provided URI scheme 'https' is invalid; expected 'http' –  sksallaj Sep 24 '13 at 19:13 There should be tens of articles how to configure WCF to work on HTTPS endpoint... –  Alexei Levenkov Sep 24 '13 at 19:53 Not if you have a mixed environment, I have my endpoints on port 80, but they are seen as port 443. But your direction did help me figure something out. –  sksallaj Sep 24 '13 at 20:36 add comment 1 Answer up vote 1 down vote accepted It sounds like you're working in an environment where there is a load balancer offloading the SSL traffic. In this situation, your client(Silverlight) needs to be configured for HTTPS and your server must be configured for HTTP. This is because a device between the two parties is decrypting the SSL data. In situations like this, aside from the normal client and server side configurations, your server side code needs to be a bit more forgiving about the address of the request. You likely also need to add an attribute to your service implementation to allow your client to call over HTTPS, but have your service listening on HTTP. Add this to your service: [ServiceBehavior(AddressFilterMode = AddressFilterMode.Any)] This allows your client to call https://my.domain.com/service.svc and have your server live at http://my.domain.com/service.svc. Here are some links that might help as well: share|improve this answer Thanks Nate!! :) :) –  sksallaj Sep 27 '13 at 18:28 add comment Your Answer
http://stackoverflow.com/questions/18988968/http-to-https-silverlight-wcf-cross-domain-issue
dclm-gs1-181140000
0.655138
<urn:uuid:294507a7-153c-4fa3-a6c1-ff030a2c9eb8>
en
0.908144
Take the 2-minute tour × I am trying to understand the basics of Message Queues. I see that there are many implementations available as libraries for MQs (ActiveMQ, RabbitMQ, ZeroMQ etc). Also J2EE enabled servers provide such support I think. What I fail to understand about the topic, is how are these kind of constructs used by real software. I mean what kind of messages are usually being exchanged? Strings? Binary data? If I understand correctly one can configure the transport protocol, but what is usually the application data format? Is it a new way of communication, like e.g. SOAP WS or REST WS or RPC etc where each has a different application msg format? share|improve this question add comment 2 Answers Message queues usually using for application integration. In enterprise it is usually used to implement ESB, but nowadays there are smaller application systems that utilize similar patterns. Concerning data being transmitted - usually it is XML messages, but actually depends on applications and MQ software - some of them are able to handle binary messages, some are not. For example imagine you have two applications which require data interchange. If you integrate them using some kind of messaging software such as ActiveMQ, for example, then it will give you some benefits like routing, fault-tolerance, balancing, etc, out-of-the-box. You may integrate your applications using MQ directly, but ESBs usually give you ability to use web services: app just calls ws of ESB and knows nothing about underlying architecture. Also MQs and ESBs gives you a level of abstraction: you may switch your apps in a system absolutely transparent, as long as data exchange interface is preserved. share|improve this answer So the messages are XML but instead of using SOAP or REST directly you use these systems so as not to have to implement fault-tolerance, balancing etc as you mentioned in your SOAP or REST server? –  Jim Oct 26 '13 at 9:52 Yes if we a talking about MQ only, the I wolud say this is the main reason. But if using not only MQ, but a complete ESB, then this ESB may also perform some business-logic (usually in kind of messages transformations) itself. –  Andy Oct 26 '13 at 10:00 Actually this topic is wide enough, because there are many MQ software and they have different features. In general MQ let you integrate software easily, whatever it means :) For example IBM WebSphere MQ supports virtually any platform from mainframes to embedded systems, so it may be used just to integrate old mainframe to modern application stack. –  Andy Oct 26 '13 at 10:04 Imagine you have two applications: HR and Accounting. They needs to interchange data about employees who is absent because of being ill. You may integrate them point-to-point (using web services or whatever), but then you must think about fault tolerance yourself - what if one application is down? Then another application must collect data to send it later. This may be done by MQ automaticly and completely transparent. What if 3rd application will come into a system, with a need of same data? If using MQ it will be much easier - just reconfigure routing rules. –  Andy Oct 26 '13 at 10:15 add comment MQs are mainly used for interprocess communication, or for inter-thread communication within the same process. They provide an asynchronous communications protocol, meaning that the sender and receiver of the message do not need to interact with the message queue at the same time. Messages placed onto the queue are stored until the recipient retrieves them. wikipedia can be good intro to topic. http://en.wikipedia.org/wiki/Message_queue#Standards_and_protocols Also, to understand diff between webservice and mq, read this thread: Message Queue vs. Web Services? share|improve this answer But how does the queue know which msg is for which recipient? –  Jim Oct 26 '13 at 10:33 en.wikipedia.org/wiki/Message_queue#Usage .. A message listener registers with the queue and is notified when message arrives in queue. Routing policies can be used for complex situations. –  drop.in.ocean Oct 26 '13 at 10:43 I read the link.It is too vague.Is the idea that the registered listeners get notified for messages of specific type?I thought that the message placed on a queue is addressed somehow to a specific recipient (e.g. IP?) –  Jim Oct 26 '13 at 10:57 MQs are meant for inter process communication within usually a machine or set of machines under an organisation. eg a typical example is an app might notify MQ with message on financial transaction that occurred. Theses messages are later, asynchronously, processed by reporting app to generate reports. –  drop.in.ocean Oct 26 '13 at 11:11 So the messages does not address a specific recipient?It is about a topic? I think this is what you describe in your example, right? –  Jim Oct 26 '13 at 12:17 show 1 more comment Your Answer
http://stackoverflow.com/questions/19604977/what-kind-of-message-formats-are-usually-being-exchanged-in-message-queueing-sys
dclm-gs1-181150000
0.02423
<urn:uuid:ef14227f-7307-4363-a1ca-ad74a2aa805f>
en
0.918547
Take the 2-minute tour × I am trying to load a new post in wordpress without reloading the entire page. I am not sure where to start with this. I am new to AJAX and JavaScript. Any help would be great. share|improve this question add comment 2 Answers If you are new to AJAX and javascript, I would start by looking into an AJAX / JavaScript library. Here are a few to look at: Each of these have their own methods of making ajax calls. Start by looking into those methods, and come back to this site when you have more questions. share|improve this answer add comment You can use the XML-RPC Service (Documentation Here) that WordPress supports for posting, editing, and other functionality in combination with one of the AJAX solutions, such as jQuery, that Gabriel mentioned. If the functionality you want is not supported in WordPress' XML-RPC service, it also supports the Blogger API, metaWeblog API, and the Movable Type API. share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/2037683/display-new-wordpress-post-without-reloading-page
dclm-gs1-181160000
0.451026
<urn:uuid:f685a22c-9b86-4c7b-b57e-ebbb34fe4e23>
en
0.913994
Take the 2-minute tour × I need to match a series of user inputed words against a large dictionary of words (to ensure the entered value exists). So if the user entered: "orange" it should match an entry "orange' in the dictionary. Now the catch is that the user can also enter a wildcard or series of wildcard characters like say "or__ge" which would also match "orange" The key requirements are: * this should be as fast as possible. * use the smallest amount of memory to achieve it. If the size of the word list was small I could use a string containing all the words and use regular expressions. however given that the word list could contain potentially hundreds of thousands of enteries I'm assuming this wouldn't work. So is some sort of 'tree' be the way to go for this...? Any thoughts or suggestions on this would be totally appreciated! Thanks in advance, Matt share|improve this question I'm not sure, but I think a Suffix Tree could be what you're looking for - en.wikipedia.org/wiki/Suffix_tree –  Rubys May 11 '10 at 23:15 Do you have to support all grep style wildcards or just the ? (underscore _ in your case)? –  Michael Dorgan May 11 '10 at 23:25 Do the wildcards match only a single character or can they match a string of arbitrary length? –  drawnonward May 11 '10 at 23:29 Just the underscore, each underscore would represent a single character. –  Sway May 11 '10 at 23:54 add comment 6 Answers up vote 11 down vote accepted Put your word list in a DAWG (directed acyclic word graph) as described in Appel and Jacobsen's paper on the World's Fastest Scrabble Program (free copy at Columbia). For your search you will traverse this graph maintaining a set of pointers: on a letter, you make a deterministic transition to children with that letter; on a wildcard, you add all children to the set. The efficiency will be roughly the same as Thompson's NFA interpretation for grep (they are the same algorithm). The DAWG structure is extremely space-efficient—far more so than just storing the words themselves. And it is easy to implement. Worst-case cost will be the size of the alphabet (26?) raised to the power of the number of wildcards. But unless your query begins with N wildcards, a simple left-to-right search will work well in practice. I'd suggest forbidding a query to begin with too many wildcards, or else create multiple dawgs, e.g., dawg for mirror image, dawg for rotated left three characters, and so on. Matching an arbitrary sequence of wildcards, e.g., ______ is always going to be expensive because there are combinatorially many solutions. The dawg will enumerate all solutions very quickly. share|improve this answer Since I don't have access to the publications, I'm wondering one thing: do they build one DAWG for each different length or not ? I think it could considerably speed up the search, since in this case we know beforehand how many letters the word we seek has. –  Matthieu M. May 12 '10 at 17:07 @Matthieu: Google will get you the paper, but I've also added a (possibly ephemeral) link. As for one DAWG per length, you can do this, but it's a time-space tradeoff. The DAWG will store a long word list very effectively with lots of sharing. With one DAWG per length you will lose that sharing. As for speedup it's an experimental question, and experiments may come out differently depending on the machine's cache. –  Norman Ramsey May 12 '10 at 22:27 add comment No matter which algorithm you choose, you have a tradeoff between speed and memory consumption. If you can afford ~ O(N*L) memory (where N is the size of your dictionary and L is the average length of a word), you can try this very fast algorithm. For simplicity, will assume latin alphabet with 26 letters and MAX_LEN as the max length of word. Create a 2D array of sets of integers, set<int> table[26][MAX_LEN]. For each word in you dictionary, add the word index to the sets in the positions corresponding to each of the letters of the word. For example, if "orange" is the 12345-th word in the dictionary, you add 12345 to the sets corresponding to [o][0], [r][1], [a][2], [n][3], [g][4], [e][5]. Then, to retrieve words corresponding to "or..ge", you find the intersection of the sets at [o][0], [r][1], [g][4], [e][5]. share|improve this answer add comment I would first test the regex solution and see whether it is fast enough - you might be surprised! :-) However if that wasn't good enough I would probably use a prefix tree for this. The basic structure is a tree where: • The nodes at the top level are all the possible first letters (i.e. probably 26 nodes from a-z assuming you are using a full dictionary...). • The next level down contains all the possible second letters for each given first letter • And so on until you reach an "end of word" marker for each word Testing whether a given string with wildcards is contained in your dictionary is then just a simple recursive algorithm where you either have a direct match for each character position, or in the case of the wildcard you check each of the possible branches. In the worst case (all wildcards but only one word with the right number of letters right at the end of the dictionary), you would traverse the entire tree but this is still only O(n) in the size of the dictionary so no worse than a full regex scan. In most cases it would take very few operations to either find a match or confirm that no such match exists since large branches of the search tree are "pruned" with each successive letter. share|improve this answer add comment If you are allowed to ignore case, which I assume, then make all the words in your dictionary and all the search terms the same case before anything else. Upper or lower case makes no difference. If you have some words that are case sensitive and others that are not, break the words into two groups and search each separately. You are only matching words, so you can break the dictionary into an array of strings. Since you are only doing an exact match against a known length, break the word array into a separate array for each word length. So byLength[3] is the array off all words with length 3. Each word array should be sorted. Now you have an array of words and a word with potential wild cards to find. Depending on wether and where the wildcards are, there are a few approaches. If the search term has no wild cards, then do a binary search in your sorted array. You could do a hash at this point, which would be faster but not much. If the vast majority of your search terms have no wildcards, then consider a hash table or an associative array keyed by hash. If the search term has wildcards after some literal characters, then do a binary search in the sorted array to find an upper and lower bound, then do a linear search in that bound. If the wildcards are all trailing then finding a non empty range is sufficient. If the search term starts with wild cards, then the sorted array is no help and you would need to do a linear search unless you keep a copy of the array sorted by backwards strings. If you make such an array, then choose it any time there are more trailing than leading literals. If you do not allow leading wildcards then there is no need. If the search term both starts and ends with wildcards, then you are stuck with a linear search within the words with equal length. So an array of arrays of strings. Each array of strings is sorted, and contains strings of equal length. Optionally duplicate the whole structure with the sorting based on backwards strings for the case of leading wildcards. The overall space is one or two pointers per word, plus the words. You should be able to store all the words in a single buffer if your language permits. Of course, if your language does not permit, grep is probably faster anyway. For a million words, that is 4-16MB for the arrays and similar for the actual words. For a search term with no wildcards, performance would be very good. With wildcards, there will occasionally be linear searches across large groups of words. With the breakdown by length and a single leading character, you should never need to search more than a few percent of the total dictionary even in the worst case. Comparing only whole words of known length will always be faster than generic string matching. share|improve this answer "If the search term both starts and ends with wildcards, then you are stuck with a linear search within the words with equal length." Check out my answer: I skip the wildcards only if it's not the latest in the search string (in case of a full wildcards only search, which is linear), which forces it to make use of the binary search, no matter if it's wildcarded. –  Pindatjuh May 12 '10 at 1:00 add comment You can try a string-matrix: 0,1: A 1,5: APPLE 2,5: AXELS 3,5: EAGLE 4,5: HELLO 5,5: WORLD Let's call this a ragged index-matrix, to spare some memory. Order it on length, and then on alphabetical order. To address a character I use the notation x,y:z: x is the index, y is the length of the entry, z is the position. The length of your string is f and g is the number of entries in the dictionary. • Create list m, which contains potential match indexes x. • Iterate on z from 0 to f. • Is it a wildcard and not the latest character of the search string? • Continue loop (all match). • Is m empty? • Search through all x from 0 to g for y that matches length. !!A!! • Does the z character matches with search string at that z? Save x in m. • Is m empty? Break loop (no match). • Is m not empty? • Search through all elements of m. !!B!! • Does not match with search? Remove from m. • Is m empty? Break loop (no match). A wildcard will always pass the "Match with search string?". And m is equally ordered as the matrix. !!A!!: Binary search on length of the search string. O(log n) !!B!!: Binary search on alphabetical ordering. O(log n) The reason for using a string-matrix is that you already store the length of each string (because it makes it search faster), but it also gives you the length of each entry (assuming other constant fields), such that you can easily find the next entry in the matrix, for fast iterating. Ordering the matrix isn't a problem: since this has only be done once the dictionary updates, and not during search-time. share|improve this answer add comment Try to build a Generalized Suffix Tree if the dictionary will be matched by sequence of queries. There is linear time algorithm that can be used to build such tree (Ukkonen Suffix Tree Construction). You can easily match (it's O(k), where k is the size of the query) each query by traversing from the root node, and use the wildcard character to match any character like typical pattern finding in suffix tree. share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/2815083/efficient-data-structure-for-word-lookup-with-wildcards
dclm-gs1-181220000
0.901516
<urn:uuid:45d40d65-ddd8-4b22-bdfa-897e6b9d0c51>
en
0.824576
Take the 2-minute tour × Is there any way to open a new window in Java without the addressbar? I'm looking for a Java API similiar to the JavaScript window.open() where you can specify the new window "features". I know I can use Desktop.browse() or even the more adavance BrowserLauncher2, Still both APIs don't give me the option to specify any features for the new browser window. share|improve this question add comment 1 Answer You can try Lobo. If the API doesn't meet your needs, you can use their source code to write your own browser. share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/3093174/how-to-open-a-browser-window-in-java-without-the-addressbar
dclm-gs1-181240000
0.910426
<urn:uuid:0c57063b-4bae-40d4-bd72-fa65eb7b9f9d>
en
0.730117
Take the 2-minute tour × Is there a way to make django-haystack's {% highlight %} template tag show the full variable passed in, rather than removing everything before the first match? I'm using it like this: {% highlight thread.title with request.GET.q %} share|improve this question add comment 1 Answer i've never used haystack, but from a quick look in the docs and the source it looks like you can make your own custom highlighter and tell haystack to use that instead from haystack.utils import Highlighter from django.utils.html import strip_tags class MyHighlighter(Highlighter): def highlight(self, text_block): self.text_block = strip_tags(text_block) highlight_locations = self.find_highlightable_words() start_offset, end_offset = self.find_window(highlight_locations) # this is my only edit here, but you'll have to experiment start_offset = 0 return self.render_html(highlight_locations, start_offset, end_offset) and then set HAYSTACK_CUSTOM_HIGHLIGHTER = 'path.to.your.highligher.MyHighlighter' in your settings.py share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/3160766/django-haystack-highlight-template-tag-issue
dclm-gs1-181250000
0.966097
<urn:uuid:b9b4497f-9af8-4a63-b5d5-a3115c60afb7>
en
0.695743
Take the 2-minute tour × <table class="display" id="jquerytable"> <th>Eng 1</th> <th>Eng 2</th> <% foreach (var item in Model) { %> <td><%= Html.Encode(item.BillingAddress) %></td> <td><%= Html.Encode(item.DeliveryAddress) %></td> <td><%= Html.Encode(item.Engineer1Id) %></td> <td><%= Html.Encode(item.Engineer2Id) %></td> <% } %> How can I hide th Eng 1 and Eng 2? I try wit visible = "false" but not successful. share|improve this question If you give the item a class or ID then in jQuery (which I assume you are using from the jquerytable reference) you can hide it with $("#myId").hide() or $(".myClass").hide() –  Alistair Jul 12 '10 at 8:50 add comment 2 Answers up vote 1 down vote accepted MattMitchell is mostly right; you really want to use: <th style="visibility: hidden;"> The difference between display: none; and visibility: hidden; is that none takes the element out of the document flow and visibility just hides it. So by using hidden, the possibility that you get weird layout effects is reduced. share|improve this answer add comment You want to use <th style="display: none;"> Alternatively a class: .hide { display: none; } <th class="hide"> You'll want to make sure this class or style is on both the <th> and the corresponding <td> If you want to toggle visibility with jQuery you can apply a class to both the <th> and the <td> (e.g. "engcol") and then use .toggle() like so: share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/3226983/hide-th-and-td-tag
dclm-gs1-181260000
0.724705
<urn:uuid:d5db0ad1-1f22-4cd2-80ea-e8fc3b3a6079>
en
0.823017
Take the 2-minute tour × I have QGraphicsTextItem objects on a QGraphicsScene. The user can scale the QGraphicsTextItem objects by dragging the corners. (I am using a custom "transformation editor" to do this.) The user can also change the size of the QGraphicsTextItem by changing the font size from a property panel. What I would like to do is unify these so that when the user scales the object by dragging the corner with the mouse, behind the scenes it actually is calculating "What size font is necessary to make the resulting object fit the target size and keep the scale factor at 1.0?" What I am doing now is letting the object scale as normal using QGraphicsItem::mouseMoveEvent and then triggering a FinalizeMapScale method in QGraphicsItem::mouseReleaseEvent once the mouse scale is complete. This method should then change the font to the appropriate size and set the scale back to 1.0. I have a solution that appears to be working, but I'm not crazy about it. I'm relatively new to both Qt and C++, so would appreciate any comments or corrections. • Is there a better way to architect this whole thing? • Are there Qt methods that already do this? • Is my method on the right track but has some Qt or C++ errors? Feel free to comment on my answer below on submit your own preferred solution. Thanks! [EDIT] As requested in comment, here is the basics of the scaling code. We actually went a different direction with this, so this code (and the code below) is no longer being used. This code is in the mouseMoveEvent method, having previously set a "scaling_" flag to true in mousePressEvent if the mouse was clicked in the bottom-right "hot spot". Note that this code is in a decorator QGraphicsItem that holds a pointer to the target it is scaling. This abstraction was necessary for our project, but is probably overkill for most uses. void TransformDecorator::mouseMoveEvent(QGraphicsSceneMouseEvent *event) { if (scaling_) { QGraphicsItem *target_item = target_->AsQGraphicsItem(); target_item->setTransformOriginPoint(0.0, 0.0); QPointF origin_scene = mapToScene(target_item->transformOriginPoint()); QPointF scale_position_scene = mapToScene(event->pos()); qreal unscaled_width = target_item->boundingRect().width(); qreal scale_x = (scale_position_scene.x() - origin_scene.x()) / unscaled_width; if (scale_x * unscaled_width < kMinimumSize) { scale_x = kMinimumSize / unscaled_width; } else { share|improve this question add comment 2 Answers up vote 0 down vote accepted Please no holy wars about the loop-with-exit construct. We're comfortable with it. void MapTextElement::FinalizeMapScale() { // scene_document_width is the width of the text document as it appears in // the scene after scaling. After we are finished with this method, we want // the document to be as close as possible to this width with a scale of 1.0. qreal scene_document_width = document()->size().width() * scale(); QString text = toPlainText(); // Once the difference between scene_document_width and the calculated width // is below this value, we accept the new font size. const qreal acceptable_delta = 1.0; // If the difference between scene_document_width and the calculated width is // more than this value, we guess at the new font size by calculating a new // scale factor. Once it is beneath this value, we creep up (or down) by tiny // increments. Without this, we would sometimes incur long "back and forth" // loops when using the scale factor. const qreal creep_delta = 8.0; const qreal creep_increment = 0.1; QScopedPointer<QTextDocument> test_document(document()->clone()); QFont new_font = this->font(); qreal delta = 0.0; // To prevent infinite loops, we store the font size values that we try. // Because of the unpredictable (at least to me) relationship between font // point size and rendering size, this was the only way I could get it to // work reliably. QList<qreal> attempted_font_sizes; while (true) { delta = scene_document_width - test_document->size().width(); if (std::abs(delta) <= acceptable_delta || attempted_font_sizes.contains(new_font.pointSizeF())) { qreal new_font_size = 0.0; if (std::abs(delta) <= creep_delta) { new_font_size = delta > 0.0 ? new_font.pointSizeF() + creep_increment : new_font.pointSizeF() - creep_increment; } else { new_font_size = new_font.pointSizeF() * scene_document_width / test_document->size().width(); share|improve this answer I think you might be better off with a bisecting algorithm, one that has as a lower bound your current font size and as an upper bound something reasonable. Then you should have an O(log N) solution for some N dependent on your data. –  Kaleb Pederson Jul 21 '10 at 18:07 s/while (true)/forever/ –  leemes May 25 '12 at 16:27 add comment Another way to look at the problem is: Qt has scaled the font, what is the effective font size (as it appears to the user, not the font size set in the text item) that I need to display to the user as their choice of new font size? This is just an alternative, you still need a calculation similar to yours. I have a similar problem. I have a text item that I want to be unit size (one pixel size) like my other unit graphic items (and then the user can scale them.) What font (setPointSize) needs to be set? (Also what setTextWidth and what setDocumentMargin?) The advantage of this design is that you don't need to treat the scaling of text items different than the scaling of any other shape of graphics item. (But I don't have it working yet.) Also, a user interface issue: if the user changes the font size, does the item change size? Or does it stay the same size and the text wrap differently, leaving more or less blank space at the end of the text? When the user appends new text, does the font size change so all the text fits in the size of the shape, or does the shape size grow to accommodate more text? In other words, is it more like a flowchart app (where the shape size is fixed and the font shrinks), or like a word processor app (where the font size is constant and the shape (number of pages) grows? share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/3302086/calculate-qgraphicstextitem-font-size-based-on-scale
dclm-gs1-181270000
0.115378
<urn:uuid:b464a10a-eb81-49a6-a688-edbe85e82364>
en
0.913144
Take the 2-minute tour × I didn't find a good comparison of jinja2 and Mako. What would you use for what tasks ? I personnaly was satisfied by mako (in a pylons web app context) but am curious to know if jinja2 has some nice features/improvements that mako doesn't ? -or maybe downsides ?- share|improve this question add comment closed as primarily opinion-based by Bill the Lizard Oct 19 '13 at 13:01 3 Answers up vote 29 down vote accepted I personally prefer Jinja2's syntax over Mako's. Take this example from the Mako website <%inherit file="base.html"/> % for row in rows: % endfor <%def name="makerow(row)"> % for name in row: % endfor update start One of the removed construct here is the : <% ... python code ... %>. It was quite unfair to place it there since you should actually pass variable inside the context. But Mako still allows you to use plain python code within templates. It shouldn't be used often but when you really need it. It's there just to make your life easier. If you need something in one template but not anywhere else and Passing it to the context is overkill. That's what you really need. update end There are so many constructs here that I would have to consult the documentation before I could even begin. Which tags begin like <% and close with />? Which of those are allowed to close with %>? Why is there yet another way to enter the template language when I want to output a variable (${foo})? What's with this faux XML where some directives close like tags and have attributes? This is the equivalent example in Jinja2: {% extends "base.html" %} {% for row in rows %} {{ makerow(row) }} {% endfor %} {% macro make_row(row) %} {% for name in row %} <td>{{ name }}</td> {% endfor %} {% endmacro %} Jinja2 has filters, which I'm told Mako also has but I've not seen them. Filter functions don't act like regular functions, they take an implicit first parameter of the value being filtered. Thus in Mako you might write: ${user | get_name, default('No name')} That's horrible. In Jinja2 you would write: {{ user | get_name | default('No Name') | escape }} In my opinion, the Jinja2 examples are exceedingly more readable. Jinja2's more regular, in that tags begin and end in a predictable way, either with {% %} for processing and control directives, or {{ }} for outputting variables. But these are all personal preferences. I don't know of one more substantial reason to pick Jinja2 over Mako or vice-versa. And Pylons is great enough that you can use either! Update included Jinja2 macros. Although contrived in any case, in my opinion the Jinja2 example is easier to read and understand. Mako's guiding philosophy is "Python is a great scripting language. Don't reinvent the wheel...your templates can handle it!" But Jinja2's macros (the entire language, actually) look more like Python that Mako does! share|improve this answer Not really fair: Your "equivalent in Jinja" excluded half the stuff from the Mako example and thus looks shorter. Mako's <% /> vs <% %> is not that confusing (blocks vs inline code). Mako has filter functions too and they look just the same. –  Jochen Ritzel Aug 8 '10 at 23:02 @Jesse: I do not like Jinja2's insistence on (nearly) replicating Python. You can't use any built-in functions, including len and enumerate, unless you pass them in as context variables. And using .__len__ or loop.index0 instead is ugly and unintuitive. –  Nikhil Chelliah Aug 13 '10 at 0:57 However, I agree that Jinja2 is generally cleaner, more customizable (e.g. you can change the syntax), and in my experience more forgiving regarding Unicode. –  Nikhil Chelliah Aug 13 '10 at 1:02 how can you compare jinja filters to mako filters, say they're "better", but "you've not seen" mako filters ? Seems hardly reasonable. We use practically the same syntax as Jinja for filters: ${user | get_name, default('No Name') , escape} . It's pretty obvious you've never used Mako which is perfectly fine but you're hardly in a position to make a reasonable comparison, or call our syntax "stupid", thanks for that ! –  zzzeek Nov 23 '10 at 3:59 I wrote this a few months ago and I've since read up on Mako filtering syntax. I never called it stupid but I do question many of the design decisions made by the Mako team. In my opinion, Jinja was designed to be learned as quickly as possible, with the fewest documentation trips required. Mako was not, and it exhibits an arbitrary and inconsistent syntax. I am in a position to judge Mako, as I have used it; enough that I decided that it's not for me. PS, a quotation mark is used to quote words actually said. You imply that I said one is better or one is stupid, but I said neither. –  Jesse Dhillon Nov 23 '10 at 19:29 show 9 more comments I wrote an article about it at: http://williamferreira.net/blog/2010/12/28/mako-template-vs-jinja2/ share|improve this answer THank you William, did you write an english version for it ? that would benefit a lot of people too. –  ychaouche Jan 7 '11 at 8:54 Google translation is readable. This is performance mostly. –  Alexy Jan 11 '13 at 21:07 add comment Take a look at wheezy.template example: @require(user, items) Welcome, @user.name! @if items: @for i in items: @i.name: @i.price!s. No items found. It is optimized for performance (more here and here), well tested and documented. share|improve this answer add comment
http://stackoverflow.com/questions/3435972/mako-or-jinja2
dclm-gs1-181280000
0.381464
<urn:uuid:b27e5304-011c-4bc1-8697-e163f6032fb6>
en
0.766341
Take the 2-minute tour × I want to wrap the following code into a function using jQuery and call that function from inline (eg: onclick, onchange etc.). function some_function() { alert("Hello world"); Called by (example): <input type="button" id="message" onclick="some_function()" /> This question is simple for a reason. I can't seem to find a proper jQuery how-to. • Should I wrap that function into a jQuery $(document).ready() ? • Should make a normal javascript function and use $(document).ready() in that function? share|improve this question The reason why you don't find how-tos explaining how to do it is because inline events are not the best way to do event handling, and jQuery has made the cross browser compatibility reason obsolete. –  Yi Jiang Aug 27 '10 at 10:31 add comment 1 Answer You should not use that inline event handler to go with jQuery. Use unobtrusive code: function some_function() { alert("Hello world"); share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/3583275/custom-jquery-functions-called-from-inline-events
dclm-gs1-181290000
0.275609
<urn:uuid:0c5b776e-4548-4af1-8f7c-1f897d9d27f5>
en
0.889964
Take the 2-minute tour × I'm relatively new to Lisp (I just know the very basics) and I'm currently trying to run an algorithmic composition program created by David Cope. It runs in MCL 5.0, and I keep getting the following error: Error in process play: Stack overflow on value stack. To globally increase stack space, increase *minimum-stack-overflow-size* Does anyone know what function I would use to increase the stack overflow size and how I would calculate the best stack overflow size for my computer? I'm running MCL on an old Powerbook with 512 MB of RAM. Thanks for your time, share|improve this question add comment 2 Answers up vote 0 down vote accepted It seems to say that you simply need to modify the special variable *minimum-stack-overflow-size*. When you are at the REPL (CL-USER> prompt or similar), inspect this variable by evaluating its name: CL-USER> *minimum-stack-overflow-size* Then, set it to a bigger value (the 1234567 is just a placeholder) with setf: CL-USER> (setf *minimum-stack-overflow-size* 1234567) However, this might not be the real issue. I do not know MCL well, but it might be necessary to (declaim (optimize (speed 3) (safety 0))) or similar to enable tail call elimination, if the program you want to run uses a tail recursive function which depends on such optimization. share|improve this answer add comment Originally memory options were edited with ResEdit. One can also use the SAVE-APPLICATION function and use the :MEMORY-OPTIONS keyword to specify various values. This is described in the MCL reference manual. This function saves a new MCL application. Typically one starts vanilla MCL, sets various options, loads some libraries and then saves a new application. This new application is then used during development. The necessary stack size depends on the program you want to run. If a stack overflow happens, in MCL you can continue with a larger stack in many cases. Just choose the right restart option. share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/3849045/increase-minimum-stack-overflow-size-in-mac-common-lisp-5-0
dclm-gs1-181300000
0.820151
<urn:uuid:6e4f9772-ac51-47ff-9495-ee1ca63dae6b>
en
0.727422
Take the 2-minute tour × I wanted to have a look at source code of basic networking services like FTP, Telnet, rlogin etc. Can anyone tell where can I get them. By the way, its not that i didn't google it, e.g. searching for ftp, gives me list of so many ftp variants, but i am intersted in looking at a ftp client/server which ships with Ubuntu. share|improve this question add comment 3 Answers up vote 1 down vote accepted If it's specifically Ubuntu source code that you are interested in, it's easy. Go to a package description page such as http://packages.ubuntu.com/lucid/net/ , follow the relevant links, and look for a link to a .orig.tar.gz file in the package description. Ubuntu packages all work this way. share|improve this answer i mentioned ubuntu just as an example, basically i want to know whats the ftp code that runs by default on most linux distros. –  Anonymous Oct 16 '10 at 5:33 @Anonymous I see. Well, all Linux distributions pretty much rely on the same codebases, the differences are in the patches that are the other essential components of a package, and in default configuration files. So you can still use the web directory of any well-organized distribution to get what runs on most of them. –  Pascal Cuoq Oct 16 '10 at 5:39 add comment Source code links are at the top of package pages on http://packages.ubuntu.com/ share|improve this answer add comment here are the code $ftp_server = “www.yoursite.com”; $ftp_user_name = “username”; $ftp_user_pass = “password”; $conn_id = ftp_connect($ftp_server); echo “FTP connection has failed!”; echo “Attempted to connect to $ftp_server for user $ftp_user_name”; } else { echo “Connected to $ftp_server, for user $ftp_user_name”; $dir = “”; function filecollect($dir,$filelist) { global $conn_id; //Get our ftp $files = ftp_nlist($conn_id,$dir); //get files in directory foreach ($files as $file) { //$isfile = ftp_size($conn_id, $file); if($isfile == “-1″) { //Is a file or directory? $filelist = filecollect($dir.’/’.$file,$filelist,$num); //If a folder, do a filecollect on it else { $filelist[(count($filelist)+1)] = $file; //If not, add it as a file to the file list return $filelist; $filelist = filecollect($dir,$filelist); echo “<pre>”; echo “</pre>”; $filelist = filecollect($dir,$filelist); echo “<pre>”; echo “</pre>”; $myFile =$new[1]; //echo “$myFile”; $fh = fopen($myFile, ‘r’) or die(“can’t open file”); //$stringData = “Ashwani\n”; //fwrite($fh, $stringData); $the = fread($fh, 1000000); <form action=”" method=”post” enctype=”multipart/form-data” name=”form”><table width=”100%” border=”0″> <td><? echo $new[1]; ?></td> <td><textarea name=”textarea” cols=”40″ rows=”40″><? echo $the; ?></textarea></td> share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/3947780/ftp-source-code/4758106
dclm-gs1-181320000
0.650464
<urn:uuid:aa93f714-e5d6-4b33-b7cd-1c480af179c5>
en
0.910949
Take the 2-minute tour × I'm developing an Android application. I have a 3D model drawn with Blender. Do you know if there is a way to export that model into a OpenGL geometry? I'm going to use C++ code to load model and draw it with OpenGL. But if you know a better choice, please tell me. share|improve this question add comment 2 Answers up vote 2 down vote accepted There is no such format defined as OpenGL geometry. You will have to create your own structures to store and manage your vertices and triangles. If you don't want to use any third party loader, the probably the easiest thing would be using the Wavefront OBJ format. It's really simple to parse, and you can export models from blender can export to obj natively. If you don't feel like starting from scratch, you can use my very basic OBJ loader for OpenGL. Download from here. share|improve this answer add comment Here's a doc on the .blend format: http://www.atmind.nl/blender/mystery_ot_blend.html Although, you'd probably be better off exporting it to a different format. There's a tool to convert called readblend that's part of Bullet, if you're stuck with .blend files. How you use the data is dependent on how your OpenGL app is structured. If you're still at the planning stage, perhaps Ogre3D would be useful? http://www.ogre3D.org share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/4193318/export-blender-model-into-an-opengl-geometry-inside-a-c-header-file?answertab=votes
dclm-gs1-181340000
0.996885
<urn:uuid:327ecac0-2a30-4e5c-8e29-51546949752b>
en
0.854414
Take the 2-minute tour × long b = 99; float c = 99.0F; //b = c; //Error : Cannot implicitly convert type 'float' to 'long'. c = b; // Running Successfully. Why? Why is there no problem regarding size of data type and implicitly converting? The size of float and long is different as we know and which is given below... Console.WriteLine("Long : " + sizeof(long)); // Output --> Long : 8 Console.WriteLine("Float : " + sizeof(float));// Output --> Float: 4 share|improve this question add comment 4 Answers A float's range (approx ±3.4e38) is much larger than a long's range (approx. ±9.22e18), even though a long has higher precision. share|improve this answer what is the exact length in number of digit and precision in float. –  jak Dec 4 '10 at 6:16 A float has 23 bits of precision. en.wikipedia.org/wiki/Single_precision_floating-point_format –  Ignacio Vazquez-Abrams Dec 4 '10 at 6:27 As your sizeof() calls show, long is 8 bytes while float is 4 byes. You can assign the float value into the long because 4 is smaller than 8. You cant assign a long onto a float because 8 is larger than 4. –  IanNorton Dec 4 '10 at 7:30 @IanNorton: No, that's not it. Also, you're reading it wrong; it's allowing assignment from the long to the float, but not from the float to the long. –  Ignacio Vazquez-Abrams Dec 4 '10 at 7:42 @jak oh boy, that is a looong comment! –  gideon Dec 4 '10 at 13:09 show 2 more comments There are 2 reasons 1. Range of values (i.e. Max value). | data type | Maximum Value | | | | | long | 9223372036854775807 | | | | | float | 3.402823E+38 | | | | As, maximum value of float is greater than long i.e. long is contained inside float. So, float= long is possible but, long = float is not possible 2. Superiority You can't directly assign a floating point value into a integer(a non floating ) value without an explicit conversion. float a=90 //correct float b=90.0f; //correct long a=90 //correct long b=90.0f; //wrong Here, also from above example it seems that float can contain long's data, but vice versa is not possible. EDIT: regarding size of data type see my question Is Range of value depends upon Size of datatype? share|improve this answer add comment long represent Int64 type i.e an integral number while float represents Single type i.e a floating point number. And even though the size of long is larger than that of float, it is not possible to convert from a float to an integer without loosing information. For more information on long and float type refer msdn. share|improve this answer With the exception of a few numbers, it's also not possible to convert from an integer to a float without losing information. –  ssube Dec 4 '10 at 7:07 add comment People have mentioned the range of float and long, but a simpler point is that you can't represent most possible floating point numbers in an integer. If your float is 3.14159, the two closest values a long can represent are 3 or 4 - both completely wrong. A float can represent billions of values that lie between 3 and 4. It is also highly unlikely that a programmer would use a float for a value in the first place if they want to represent integer-like values - it would be a very poor design decision. So it's simply too dangerous to implicitly convert float->int because the data you are almost certain to lose is almost certainly important. It's not something we intentionally do very often, and when we do, we usually like to make it explicit (Math.Floor(floatValue)). Going in the opposite direction (int -> float), a float can usually "adequately" represent an integer value. The caveat with floating point is that numbers can only be stored as an approximation - the larger the value, the less accurately it can be represented. However, the accuracy of a float is around 6 significant figures - lossy, but you'll only lose around a millionth of the original value. In many cases that will be insignificant. (In the cases where it will be significant, programmers will always be very careful about introducing the vagaries of floating point into their calculations, so it seldom causes a problem in practice). Hence, it is more convenient/useful to allow the implicit conversion in this direction, as it's something we intentionally do rather a lot. share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/4352213/long-in-float-why
dclm-gs1-181360000
0.712597
<urn:uuid:325f2f2e-a864-4f78-884e-6076ef17fa2f>
en
0.857041
Take the 2-minute tour × Hi: I'm trying to sort a list of tuples in a custom way: For example: lt = [(2,4), (4,5), (5,2)] must be sorted: lt = [(5,2), (2,4), (4,5)] * b tuple is greater than a tuple if a[1] == b[0] * a tuple is greater than b tuple if a[0] == b[1] I've implemented a cmp function like this: def tcmp(a, b): if a[1] == b[0]: return -1 elif a[0] == b[1]: return 1 return 0 but sorting the list: lt show me: lt = [(2, 4), (4, 5), (5, 2)] What am I doing wrong? share|improve this question I see nothing wrong, except that given your input and comparison function, your initial list is already sorted. –  Ignacio Vazquez-Abrams Dec 29 '10 at 12:38 ... And what if a[1] == b[0] AND a[0] == b[1]? What if neither is the case? –  Karl Knechtel Dec 29 '10 at 13:12 add comment 6 Answers up vote 2 down vote accepted I'm not sure your comparison function is a valid one in a mathematical sense, i.e. transitive. Given a, b, c a comparison function saying that a > b and b > c implies that a > c. Sorting procedures rely on this property. Not to mention that by your rules, for a = [1, 2] and b = [2, 1] you have both a[1] == b[0] and a[0] == b[1] which means that a is both greater and smaller than b. share|improve this answer Sorry, I've not explained it very well. In my data set, not exists the case (1,2) and (2,1) at the same time. Really the numbers are state id's, and the tuple is a transition representation, i.e. (2,3) means, state(2).next() == 3. –  Antonio Beamud Dec 29 '10 at 12:53 @Antonio: still, without "normal" behavior from the comparison function (such as transitivity) you cannot expect the sort to work properly –  Eli Bendersky Dec 29 '10 at 12:59 You're right. I'm reviewing all the problem. A lot of thanks. –  Antonio Beamud Dec 29 '10 at 13:01 add comment Sounds a lot to me you are trying to solve one of the Google's Python class problems, which is to sort a list of tuples in increasing order based on their last element. This how I did it: def sort_last(tuples): def last_value_tuple(t): return t[-1] return sorted(tuples, key=last_value_tuple) EDIT: I didn't read the whole thing, and I assumed it was based on the last element of the tuple. Well, still I'm going to leave it here because it can be useful to anyone. share|improve this answer add comment You can write your own custom key function to specify the key value for sorting. def sort_last(tuples): return sorted(tuples, key=last) def last(a): return a[-1] tuples => sorted tuple by last element • [(1, 3), (3, 2), (2, 1)] => [(2, 1), (3, 2), (1, 3)] • [(1, 7), (1, 3), (3, 4, 5), (2, 2)] => [(2, 2), (1, 3), (3, 4, 5), (1, 7)] share|improve this answer add comment You could also write your code using lambda def sort(tuples): return sorted (tuples,key=lambda last : last[-1]) so sort([(1, 3), (3, 2), (2, 1)]) would yield [(2, 1), (3, 2), (1, 3)] share|improve this answer add comment Your ordering specification is wrong because it is not transitive. Transitivity means that if a < b and b < c, then a < c. However, in your case: (1,2) < (2,3) (2,3) < (3,1) (3,1) < (1,2) share|improve this answer well, really (1,2) < (2,3), and yes, the problem is about graphs, and this a cycle. Really in my dataset doesn't exists cycles. Anyway, you are right :) –  Antonio Beamud Dec 29 '10 at 12:57 @Antonio Beamud Oh, I switched < and > from your example. Corrected. However, comparison functions must be transitive, because that allows the sorting routine to take shortcuts (like compare a,b and b,c and never a,c). The cycle is just used for proving that your comparison function is wrong. –  phihag Dec 29 '10 at 13:03 add comment Try lt.sort(tcmp, reverse=True). (While this may produce the right answer, there may be other problems with your comparison method) share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/4554115/sorting-tuples-in-python-with-a-custom-key/4554147
dclm-gs1-181380000
0.123861
<urn:uuid:4c61ac46-a5b9-4825-aaa6-bf35a49b882e>
en
0.834396
Take the 2-minute tour × I'm having a rough time figuring out where to start with getting this query into a Zend_Db_Select. I have never worked with variables assignment and subqueryies in Zend: @current_continent := stats_geo_continent.id AS `continent_id`, (SELECT GROUP_CONCAT(code) from stats_geo_country WHERE stats_geo_country.continent = @current_continent) AS `group`, Inner Join stats_geo_country ON stats_geo_country.continent = stats_geo_continent.id; share|improve this question If it is not needed, maybe use a $db->query(). You could also create a view in your database and make a model for it. I think it would be faster and more efficient than using Db_select. –  Marcin Feb 16 '11 at 11:35 add comment 1 Answer I think it will be possible when you use Zend_Db_Expr for your variable assignments. For subgqueries you can use second Zend_Db_Select object as a part of main object - maybe that link will help you. share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/5014068/zend-db-select-with-variable-assignment-and-subqueries
dclm-gs1-181390000
0.647929
<urn:uuid:b1623d13-cb02-4f29-baa1-0370b2781adc>
en
0.928024
Take the 2-minute tour × I'm aware of other posts on this topic but I'm only really one rung up the ladder from being a noob so need a bit more help. My iPhone app has several global variables - some I have declared and given values in a class but others need to be set during a login process (like a token for example) that then need to be accessible for the lifecycle of the app from any class or method. I am told I should really be using a Singleton object for all of this which I presume is a class that's instantiated on startup. If so, could someone give me the simplest example of such header and implementation file and how/where I should instantiate it? Then I need to have some strings that are set from the off and others that can be set/got later on? Thanks very much in advance. Also, I'm new here so if my etiquette is off in any way, please let me know. share|improve this question For singletons you just want to use Matt Gallagher's code that basically every iOS app uses: cocoawithlove.com/2008/11/… Here's the actual link to his macro file that is in almost every iOS app projectswithlove.com/projects/SynthesizeSingleton.h.zip Don't overuse singletons if you are a beginner. –  Joe Blow Mar 27 '11 at 13:23 add comment 2 Answers up vote 3 down vote accepted This link shows some code to create a singleton class : http://www.galloway.me.uk/tutorials/singleton-classes/ You would use it something like : [[MyManager sharedManager] doSomething]; The call to sharedManager would get the one instance of the class (or, if this is the first time you called it, would create it) - this makes sure that you only have one of them :) It also overrides release, retain, autorelease etc to make sure that you can't accidentally get rid of the sharedManager by mistake! This class will instantiate itself the first time you use it but if you need it to be created on startup, just call [MyManager sharedManager] and it will create it for you. You define the class like any other objective-c class - just add properties etc Hope that helps :) share|improve this answer It's an option but only one I'd recommend if the op already understood how singletons worked! I much prefer knowing the mechanics before taking a shortcut. Though you're right - once you get the idea of a singleton, Mr Gallagher's code is awesome! –  deanWombourne Mar 29 '11 at 11:59 add comment Global variables aren't good, but singletons aren't much better when they're just used to provide global access to some data. Anything bad you can say about a global variable, you can also say about a singleton that's used for global access. A better solution is to create a data model and pass that model from one view controller to the next. Here's a previous SO question that might help. share|improve this answer This can be turned around. If singletons aren't much better than global variables, that implies that using global variables isn't much worse than creating singleton objects. That's partially true, but singleton objects do allow one to use Obj C properties to better encapsulate an app's public global state. –  hotpaw2 Mar 27 '11 at 16:28 I don't disagree. A singleton is marginally better than keeping a bunch of globals, but the reasons using globals is unwise are the same reasons that abusing singletons is unwise. –  Caleb Mar 27 '11 at 17:10 I prefer it the other way. If one knows that a small (not designed for reuse) app will require some singleton app or class-wide state, just use a few plain old C global variables. Which your answer potentially implies. –  hotpaw2 Mar 27 '11 at 17:18 You can get away with a lot in a small program, but that doesn't make it good practice. On the other hand, the work required to manage data properly in a small program is so small that some would say it's silly not to do it. Quick and dirty often turns out not to be all that quick. –  Caleb Mar 27 '11 at 17:27 A singleton allows you to defer instantiation and get slightly faster startup. However, pretty much ever app will have some sort of global state that has to be stored somewhere - some choose the delegate - I prefer singletons :) –  deanWombourne Mar 29 '11 at 11:57 add comment Your Answer
http://stackoverflow.com/questions/5448476/objective-c-singleton-objects-and-global-variables?answertab=oldest
dclm-gs1-181420000
0.179956
<urn:uuid:55dc10f2-934a-438a-9cc8-3f918c0b9e81>
en
0.878287
Take the 2-minute tour × I created my own parental control app using C# to monitor my kids activity. It logs all the keyboard input and screens in the background silently, with the only gui of taskbar icon. So far, I just let it run in my admin account and everybody share the same account and it works fine. The problem is that as kids grow up, they found a way to kill it from the task manager. So, I need to use a more sophisticated way to protect my app. I thought I could solve this problem easily by creating a separate standard account for each kid and I can setup my app to run as an admin to monitor all their activities. However, I faced a lot of issues. 1. The keyboard hooks seem to stop working once I switched to a different user account. Is it true? I thought it's global hook - is it just global within the user account? 2. The screen capturing doesn't work on another user account either. This is my code and it failed at g.CopyFromScreen with error "the handle is invalid": RECT rc = Win32.GetWindowRect(); using (System.Drawing.Bitmap bitmap = new System.Drawing.Bitmap(rc.Width, rc.Height)) using (System.Drawing.Graphics g = System.Drawing.Graphics.FromImage(bitmap)) g.CopyFromScreen(rc.Location, System.Drawing.Point.Empty, new System.Drawing.Size(rc.Width, rc.Height)); string fileName = Settings.Instance.GetImageFileName(); bitmap.Save(fileName, System.Drawing.Imaging.ImageFormat.Png); Your help is much appreciated. share|improve this question You have bumped into the new Windows 7 features. Message filters and integrity levels. My question, though, how do you run the application? Within their account within the admin account? On what desktop? It will only work on the same desktop. Did you fix the desktop and window station ACL to grant access to the credentials as which your program runs? –  0xC0000022L Apr 3 '11 at 2:24 Actually, I tried different ways to run the program (e.g. from Windows Service, or through Scheduled Tasks), but couldn't get it work. I'm not familiar with Win7's new features as you mentioned. For my testing, I simply started the program from my admin account, then switched to kid's account as standard user. –  miliu Apr 3 '11 at 2:30 that won't work. Service also won't work (since about Vista due to the session separation restrictions). You have to run the process within the same desktop/winsta as the shell of the account that you want to monitor. –  0xC0000022L Apr 3 '11 at 2:57 add comment 1 Answer up vote 2 down vote accepted As long as the kids aren't administrators, you can run the program under their accounts and deny access to the process. For example (tested): static void SetAcl() { var sd = new RawSecurityDescriptor(ControlFlags.None, new SecurityIdentifier(WellKnownSidType.LocalSystemSid, null), null, null, new RawAcl(2, 0)); sd.SetFlags(ControlFlags.DiscretionaryAclPresent | ControlFlags.DiscretionaryAclDefaulted); var rawSd = new byte[sd.BinaryLength]; sd.GetBinaryForm(rawSd, 0); if (!NativeMethods.SetKernelObjectSecurity(Process.GetCurrentProcess().Handle, SecurityInfos.DiscretionaryAcl, rawSd)) throw new Win32Exception(); static class NativeMethods { [DllImport("Advapi32.dll", SetLastError = true)] [return: MarshalAs(UnmanagedType.Bool)] public static extern bool SetKernelObjectSecurity(IntPtr target, SecurityInfos info, byte[] descriptor); share|improve this answer It's not so much tied to a particular group as it is to privileges, though. –  0xC0000022L Apr 3 '11 at 2:20 Hi Slaks: Thanks a million. This is exactly what I want, I believe. But could you please elaborate a little bit more on how to use it? Who is going to call SetAcl()? –  miliu Apr 3 '11 at 2:37 Call in in your program, and run under the limited user. –  SLaks Apr 3 '11 at 2:38 +1 from me. Also, make sure that you don't have any windows that would accept messages from other processes. There are no ACLs on windows, which is the reason why this could be a loophole. –  0xC0000022L Apr 3 '11 at 3:00 I just tried it. In the installer, there is an option "Launch automatically when Windows starts up" > "For all users". After installion with this option, the program started automatically after reboot. However, in the standard user account, this program shows up in the task manager as my "admin" user. I guess, because of that, I cannot find the task bar icon for this app and the app doesn't seem to be working either. How do I workaround this limitation? I'd like to install once from my admin account and make it run for all accounts. Is it possible? How? –  miliu Apr 3 '11 at 3:34 show 6 more comments Your Answer
http://stackoverflow.com/questions/5527136/win7-keyboard-hook-stops-working-in-another-user-account
dclm-gs1-181430000
0.236167
<urn:uuid:f1d9d852-aeb4-43d7-9eb4-8a700428d7a3>
en
0.886702
Take the 2-minute tour × I want to read Gmail mails in my own android app. Is there anyway to do it using android sdk? If not, what are the other options? parsing gmail atom? share|improve this question Development questions are off-topic here. –  Matthew Read May 22 '11 at 4:18 add comment migrated from android.stackexchange.com May 23 '11 at 11:09 1 Answer up vote 2 down vote accepted I ask and answer that question here. You need Gmail.java code (in the question there are a link) and you must understand that you shouldn't use that undocumented provider Are there any good short code examples that simply read a new gmail message? share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/6096381/reading-gmail-mails-using-android-sdk/6121361
dclm-gs1-181470000
0.969366
<urn:uuid:abcbd1cc-47a6-450c-a73e-26825e280d08>
en
0.905466
Take the 2-minute tour × Given (arbitrarily): CGRect frame = CGRectMake(0.0f, 0.0f, 100.0f, 30.0f); What's the difference between the following two code snippets? UIButton *button = [UIButton buttonWithType:UIButtonTypeCustom]; button.frame = frame; UIButton *button = [[[UIButton alloc] initWithFrame:frame] autorelease]; share|improve this question add comment 5 Answers I think they're equivalent. Haha! Trick question you sneaky little punk! 1. -buttonWithType: returns an autoreleased UIButton object. 2. +[NSObject alloc] defaults scalar instance variables to 0, so buttonType should be 0, or UIButtonTypeCustom. Pros & Cons 1. You could argue that it's clearer to use -buttonWithType: and set buttonType explicitly and that it's safer in case Apple changes UIButtonTypeCustom to be 1 instead of 0 (which will most certainly never happen). 2. On the other hand, you could also argue that it's clear & safe enough to use -initWithFrame. Plus, many of the Xcode sample projects, such as "TheElements" & "BubbleLevel," use this approach. One advantage is that you can explicitly release the UIButton before the run loop for your application's main thread has drained its autorelease pool. And, that's why I prefer option 2. share|improve this answer +1 for internal dialog. –  glenstorey Aug 22 '12 at 17:54 "-[NSObject init] defaults scalar instance variables to 0" No, it's actually +alloc that sets instance variables to 0. "so buttonType should be 0" No, this depends on what -[UIButton init] (if there is such a method) does. Sure, it might currently set it to 0 or doesn't set it (in which case it would be 0); but since that method it not documented, they could change its behavior in the future. You have no guarantees on what it does. –  user102008 Aug 27 '12 at 21:06 I know this is old but I have noticed you have to use [UIButton buttonWithType:] are your button type never gets set. Also you've written -buttonWithType as an instance method it should be a class method so you need to replace - with +. –  Popeye Mar 28 '13 at 15:57 add comment I would strongly suggest using the first approach (+buttonWithType), because that's the only way to specify the button type. If you +alloc and -initWithFrame:, the buttonType is set to some standard value (not sure which, and this could change in later versions of the SDK) and you can't change the type afterwards because the buttonType property is read only. share|improve this answer add comment The main (maybe the only) difference is in memory management: as you said, buttonWithType returns an autoreleased UIButton. This way you don't have to worry about releasing it. On the other hand, you don't own it, so you cannot release it when you want to (except, of course, if you drain the autorelease pool). Calling explicitly [[UIButton alloc] initWithFrame:frame], instead, you dynamically alloc your button, so you own it and you're responsible for releasing it. If you plan to retain your button for some reason then maybe you should consider the second solution, but if, as in this case, you are autoreleasing it immediately, there's no big difference between the two way of creating a button... share|improve this answer add comment Two options are the same but I prefer option 2 because it can handle memory management share|improve this answer add comment You can use the first and do "[button retain];", so you will never lose the pointer. share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/6245882/initwithframeframe-vs-uibutton-buttonwithtype/6245883
dclm-gs1-181480000
0.209044
<urn:uuid:23fd7b12-0f2a-4cd3-a9ba-06b3e9715337>
en
0.807245
Take the 2-minute tour × I've a problem. I'm scrapping a txt file and extracting an ID. The problem is that the data is not consistent and I have to evaluate the data. Here is some code: $a = "34"; $b = " 45"; $c = "ddd556z"; if ( ) { echo "INTEGER"; } else{ echo "STRING"; I need test if the values $a, $b or $c are Integers. What is the best way of doing this? I have tested to "trim" and the use "is_int" but is not working as expected. Can someone give me some clues? share|improve this question as your data are all strings in this example you will show false when using is_int($a) (or $b or $c) What results are you expecting? $a and $b to be true? Then either cast to an int or use is_numeric() however note that floats, doubles and numbers using scientific notation will also show as true using is_numeric(). php.net/manual/en/function.is-numeric.php –  billythekid Jun 13 '11 at 11:10 add comment 3 Answers up vote 8 down vote accepted The example below will work even if your "int" is a string $a = "number"; preg_match( '/^-?[0-9]+$/' , $var ) // negative number © Piskvor intval($var) == $var or (same as last) (int) $var == $var share|improve this answer -1 is not an integer? –  Piskvor Jun 13 '11 at 11:09 Only the example with preg will not validate -1. All other will. –  llnk Jun 13 '11 at 11:11 @yes123: Integers. Note the part about negative numbers - the OP didn't specify "positive integers", did he? ( /^-?[0-9]+$/ would work) –  Piskvor Jun 13 '11 at 11:15 @piskvor: I have wrote 4 example. Only the preg doens't match the negative number. do you think it is enough to give a -1? ... anyway I have added your solution in my answer. +1 to you –  llnk Jun 13 '11 at 11:17 @yes123: "Part of my answer is wrong, so what?" Well, that's definitely worthy of the highest negative integer. –  Piskvor Jun 13 '11 at 11:19 show 1 more comment $strings = array('1820.20', '10002', 'wsl!12'); foreach ($strings as $testcase) { if (ctype_digit($testcase)) { echo "The string $testcase consists of all digits.\n"; } else { echo "The string $testcase does not consist of all digits.\n"; // will output //The string 1820.20 does not consist of all digits. //The string 10002 consists of all digits. //The string wsl!12 does not consist of all digits. share|improve this answer add comment $a = 34; if (is_int($a)) { echo "is integer"; } else { echo "is not an integer"; will not validate as int ;) share|improve this answer can't work because he has $a = "34"; –  llnk Jun 13 '11 at 11:11 yeah, I have mentioned it also.. –  Vamsi Jun 13 '11 at 11:13 add comment Your Answer
http://stackoverflow.com/questions/6329547/how-to-convert-a-string-to-integer-and-test-it?answertab=votes
dclm-gs1-181490000
0.79752
<urn:uuid:c2c9d450-7bde-40cc-b15b-10e1396f574e>
en
0.926168
Take the 2-minute tour × I have a WinForms application and a Panel Control. The panel control has a VScrollBar control for vertical scrolling. Everything works fine except right now I have my VScrollBar maximum value set to 100. The problem is, I need the Maximum property to be about 4 billion, however, since Maximum is only an Integer, I can't set it to the proper value. So, my question is, how do I get around this? I know there are text editors and file viewers that claim to view more then 4 gigs of data, so how would a scrollbar in an application like that work? share|improve this question add comment 3 Answers up vote 2 down vote accepted A scrollbar is a GUI control. Innately, the number of steps it can display is limited to the number of vertical pixels on your screen. Therefore, you could consider setting the maximum value to anything above that to be simply for developer convenience, to make the math easier. How do applications deal with scrollbars? In theory, you'd want to parse the file first, to find out how many lines are in the file, and use that as your logical maximum. In reality, reading 4 GB of data when the file is opened would kill performance, so that wouldn't work. If I were implementing this, I would set the scrollbar maximum is set to a large value, say 10,000. When the scrollbar is used, the scrollbar value is divided by 10,000 to get a percentage, and the editor shows that section of the file. Don't think of things in terms of scrolling down so many lines. Instead, think of it as jumping to that percentage offset of the file, reading the data there, and displaying that. share|improve this answer add comment Well, you could just set Maximum to int.MaxValue and scale the retrieved value to your real maximum value. This should be enough precision to avoid loading too much data. share|improve this answer add comment You use a percentage. There is no need to set it to the same as the number of lines. share|improve this answer This is a good idea except when on my Scroll handler, I am getting ScrollEventArgs that has a property called NewValue which is an int. So if it returns to me 58, for example, meaning 58%, how do I know how far down to scroll? 58% is a large chunk of data when your talking about a total of 4 gigs. –  icemanind Jun 29 '11 at 17:47 If you set maximum to int.MaxValue and minimum to int.MinValue you should be pretty close. –  Alex Peck Jun 29 '11 at 18:00 Also consider that unless you have 1 byte of data per line, you will have a lot less than 4 billion lines, even for 4 gigs of data. –  Mike Caron Jun 29 '11 at 18:07 add comment Your Answer
http://stackoverflow.com/questions/6524361/infinite-vertical-scrolling?answertab=votes
dclm-gs1-181500000
0.372773
<urn:uuid:01325b39-389d-40a9-b33a-528a926147d6>
en
0.932791
Take the 2-minute tour × I often have to write code that I would like to optimize for performance, and I often have several solutions to a particular problem. Is there a simple way to determine the number of CPU cycles a particular statement/function would take? I'm not talking about complex code that access the file system, Windows APIs or the network, I'm talking about comparing half a dozen lines of C++ code to determine which code would be more efficient. The classic example would be comparing ++i with i++. The former is faster, but without knowing that, how would I be able to determine this myself? I'd rather not install costly performance tools (e.g. Intel's tools), but find a simple way to get to the bottom. Is there a way to see the Assembler code that is generated by C++ code - without debugging? Any other suggestions and/or approaches are of course welcome. share|improve this question No, with today's CPUs you can't look as the assembly code and tell how long it takes. Think caches, branch prediction, pipelines, etc. If you have to ask questions like this one, you likely don't stand a chance to get any significant insisghts this way. For most cases, the only reliable/practical way to know what runs fast is to, you know, actually run it and see how long it takes (i.e. profiling and benchmarking). And that's not even touching on whether you should even try. –  delnan Aug 2 '11 at 19:41 @delnan I couldn't agree more. –  Rafael Colucci Aug 2 '11 at 19:53 If I'm concerned about that (almost never) I wrap it in a (somewhat unrolled) loop and stopwatch it. If you execute it 10^9 times, then seconds translate to nanoseconds. –  Mike Dunlavey Aug 2 '11 at 20:06 add comment 3 Answers up vote 1 down vote accepted Using the Visual Studio prompt you can invoke cl.exe (the VC++) compiler and produce assembly listings with the option /FA[c|s|u]. cl.exe /FA mycode.c Generates a file named mycode.asm, containing the listings, looking something like: ; Line 16 push ebp mov ebp, esp ; Line 17 cmp DWORD PTR _argc$[ebp], 2 jl SHORT $LN2@main cmp DWORD PTR _argc$[ebp], 2 jle SHORT $LN3@main ; Line 19 push OFFSET $SG2660 call _puts add esp, 4 ... and so forth. Similarly if you put a breakpoint inside VS and open the disassembly, you will see the assembly listings (provided the circumstances are right, debug mode should probably be on.) This is probably of interest as well: how to find CPU cycle for an assembly instruction share|improve this answer Thanks, I accepted your answer since it essentially, well, answers my question. I realize though that this is a potentially tedious and inaccurate way of going about it, thanks to the other comments. Thanks everybody for their input. –  Lucky Luke Aug 3 '11 at 2:20 add comment Your "classic example" of ++i vs i++ is usually irrelevant. Optimizing compilers are good enough to prevent that from being an issue. In fact they're really good at making code that looks slow fast. Look at algorithmic complexity: often if code is unexpectedly slow, there's a hidden O(n) in an inner loop somewhere. It's been said before, profile, profile, profile. Counting cycles is much less relevant now, because of the importance of the cache. Microbenchmarks are sometimes ok for small chunks of code, but often aren't representative for their performance in an application. Visual Studio has a built in profiler, described here: http://msdn.microsoft.com/en-us/magazine/cc337887.aspx which is really what you need. Don't choose the code that's more efficient. Choose the code that's more readable. share|improve this answer There are some cases where ++i vs. i++ is not irrelevant. For primitive types an optimizer will catch it. For more complicated iterators, it might not be able to discard the instruction that stores off the original value before incrementing. Otherwise good answer. –  Nathan Monteleone Aug 2 '11 at 19:43 Thanks, I will have a look at the profiler - wasn't actually aware of that for some reason, I thought it only worked with C#. I don't totally agree with not writing code that is efficient - if I write a network server that processes 10,000 packets per second then I'd like to make it efficient :-) –  Lucky Luke Aug 2 '11 at 20:03 add comment I know you said you do not want to pay for performance tools, but I highly suggests you to take a look at AQTime. I know it can be expensive, but it is worth every penny invested. It is capable of doing a very good analyze of your code, such as allocation, performance and many, many others. I can not imagine myself working without this tool, really. And I do not work for Smartbear. I am just a big fan. What I think is: why should anyone bother reading and debugging Assembly when we have great tools to do that? Your time can be more productive if you have the right tools and focus on business. Just my 2 cents. share|improve this answer Yes, you are on to something. I've always had mediocre experiences with development add-ons, but their price is not completely unreasonable. I will definitely take a look. –  Lucky Luke Aug 2 '11 at 20:03 It is not an add-on. It is an application. You can download a 30 days trial and see for yourself. –  Rafael Colucci Aug 2 '11 at 20:27 I used the wrong wording. As "add-on" I meant a generic "add-on" to my develoment environment. I realize it's a stand-alone app. I will check it out, thank you. –  Lucky Luke Aug 2 '11 at 21:15 I decided to give this product a try, but I'm far from impressed. The account manager can't reply to my emails, and the product is pretty cumbersome to use in my opinion. –  Lucky Luke Dec 9 '11 at 19:36 add comment Your Answer
http://stackoverflow.com/questions/6917428/how-to-determine-complexity-as-in-cpu-cycles-of-c-code-with-visual-studio-20
dclm-gs1-181530000
0.484959
<urn:uuid:69a32665-3cae-4443-880b-d72667e655a5>
en
0.693819
Take the 2-minute tour × I'm having a problem with a boolean expression and when I did a logger.debug I had strange results, so I simplified my logging code to the following and was surprised not to see any 'false' being printed. Logging code in my controller: logger.debug 'true' logger.debug true logger.debug 'false' logger.debug false logger.debug '1 == 1' logger.debug 1 == 1 logger.debug '1 == 0' logger.debug 1 == 0 Which prints out the following 1 == 1 1 == 0 ... ? I would expect to see false. When I run '1 == 0' or 'puts false' in the console I get false. Am I missing something? Any ideas why isn't it printing the 'false'? ruby version: 1.8.7-p352 rails version: 2.3.2 share|improve this question add comment 2 Answers up vote 3 down vote accepted Rails Logger uses || in the code before running .to_s, which fails for nil and false. def add(severity, message = nil, progname = nil, &block) return if @level > severity message = (message || (block && block.call) || progname).to_s ## <- this line # If a newline is necessary then create a new message ending with a newline. # Ensures that the original message is not mutated. message = "#{message}\n" unless message[-1] == ?\n buffer << message You can do this instead: logger.debug( false.to_s) share|improve this answer 'logger.debug (1 == 0).to_s' doesn't print anything. –  John MacIntyre Aug 15 '11 at 14:52 How about logger.debug((1 == 0).to_s)? –  Dogbert Aug 15 '11 at 14:52 add comment Logger has got a condition somewhere (if value), which fails for nil and false. You want logger.debug value.inspect. share|improve this answer So it should be 'logger.debug (false).inspect' ? Do I understand you correctly? Because that also prints nothing. –  John MacIntyre Aug 15 '11 at 14:46 Never mind. 'logger.debug false.inspect' works fine. The parentheses were there for expressions. Thanks +1 –  John MacIntyre Aug 15 '11 at 14:48 no .. wait. '(1 == 0).inspect' doesn't print anything. –  John MacIntyre Aug 15 '11 at 14:50 For future reference 'logger.debug( (1 == 0).inspect)' works. –  John MacIntyre Aug 15 '11 at 14:55 add comment Your Answer
http://stackoverflow.com/questions/7066132/why-isnt-logger-debug-false-printing-anything
dclm-gs1-181540000
0.408209
<urn:uuid:75dc03e3-79b2-4b59-8336-be0e3e222c3b>
en
0.939894
Take the 2-minute tour × I've built a program running on windows 7 to communicate with a usb device "power mate". When I leave my computer, I always press "WIN+L" to lock my computer, and when I get back, I press "CTRL+ALT+DEL" and enter my password to log in the computer. At the same time, the program is running. I'm wondering is there any windows API or something to let me use the usb device to log in the computer? (there is a button on the usb device you can push) Thanks guys. It's just an idea when I looked my usb device and asked myself "what can I do for this little guy?". It's supposed to be fun hobby project and I'm curious to see if it's possible. The usb device is connected to the computer all the time. And in reality, the usb device can do more than just pushing a button (the product name is "griffin powermate"). My intention is to do some custom action to unlock my computer, such as left rotate 3 turns and push a button 2 times. Anyway, this is really not meant to be a solution with strong security. share|improve this question No, can't mess with it. These kind of problems always have a low-tech solution: use the lock on the door instead. –  Hans Passant Sep 29 '11 at 18:57 Possible, as per David's answer, but almost certainly requiring far more effort than it is worth. :-) –  Harry Johnston Sep 29 '11 at 21:58 add comment 2 Answers You can use the OS's log on provider API (GINA for pre-vista and credential provider for vista and onward) to use your USB device as an alternative credential instead of user name/password. You also need a driver for the device that can talk to your log on provider and trigger a log on request when a button is pushed. You can use Windows Vista's smart card architecture as a reference. share|improve this answer add comment You could possibly write a credential provider to do this but why? This would effectively give credential free access to your computer. If you want to do that then don't bother locking it in the first place. share|improve this answer My thought exactly. "I lock my computer when I leave it, but I want to be able to just push a button on a still-attached USB device when I come back to unlock the computer.". Why bother to lock it in the first place? Just power off the monitor instead, or use a screensaver without a password and press Space. –  Ken White Sep 29 '11 at 17:54 Not to be nit-picky, but I don't really see an API your answer here. Further, I'm not sure I agree with your statement about "credential free access", assuming you take the USB with you. The user would just be shifting responsibility from remembering something to having something. This isn't a terrible solution (although there are better ones); after all, you don't "remember" your keys to get into your house. –  mrduclaw Sep 29 '11 at 17:58 @mrduclaw The credential provider is the API. I kind of imagined that the USB device was left connected to the machine. That seemed to be inferred by the question. –  David Heffernan Sep 29 '11 at 18:04 @DavidHeffernan, my apologies, when parsing an answer I'm used to looking for a solution. In this case maybe something that looks like a function or reference (perhaps something like msdn.microsoft.com/en-us/magazine/cc163489.aspx) possibly with a brief explanation (for example, "Pre-vista use GINA, else use Credential Provider). I see that you included a solution, but as a non-native English speaker it was difficult for me to locate amid all the berating. Thanks! –  mrduclaw Sep 29 '11 at 18:55 add comment Your Answer
http://stackoverflow.com/questions/7600481/any-windows-api-to-let-me-re-log-in-a-locked-windows-7?answertab=votes
dclm-gs1-181600000
0.157544
<urn:uuid:65756eb1-21b7-47ee-9e49-9b81cb4e5ac0>
en
0.756124
Take the 2-minute tour × I do this: First create navigation based application. Then delete UITableView from rootViewController.xib, add a UIView connect it to File's Owner. Change UITableView to UIViewController in RootViewcontroller.h Finally clean all methods of UITableView in RootViewcontroller.m But when I run the project receives this error: -[RootViewcontroller tableView:numberOfRowsInSection:]:unreconized selector sent to instance What am I doing wrong? share|improve this question add comment 1 Answer up vote 1 down vote accepted There are a few possibility. 1. Make sure that UITableView protocol is implemented in the header file. Eg @interface TestingViewController : UIViewController <UITableViewDelegate, UITableViewDataSource> 2. Check that your connection from in the Interface Builder and make sure its linked properly share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/7725011/navigation-based-application-without-a-uitableview-error?answertab=votes
dclm-gs1-181620000
0.034491
<urn:uuid:3eac8c1c-9c86-477f-aeb9-4fba6615ef26>
en
0.864927
Take the 2-minute tour × What HTTP framework should I use for a simple application with implied scalability, priferable Pythonic? I would like to be able to smoothly add new features to my app when it has already been deployed. share|improve this question add comment 3 Answers up vote 1 down vote accepted It might look too simple, but it's a joy to use. It can be deployed on google appengine. Should scale pretty well. Can be used with any WSGI server. share|improve this answer Thanks, it looks nice, I'm diving into it right now. Do you know how to call run()? The tutorial says it's web.run. But thre seems to be no run() in web module. –  Alex Apr 27 '09 at 14:21 Call the run() method of your application object (it's app.run() usually). –  rincewind Apr 27 '09 at 14:26 I think I haven't built an app yet. In the tutorial webpy.org/tutorial2.en there is this: import web; urls=('/', 'index', '', 'index'); class index: def GET(self): print "Hello World!"; web.run(urls, globals()); How do I fix so that it starts? –  Alex Apr 27 '09 at 14:34 I found the answer: in web.py 3 you should do app = web.application(urls,globals()); app.run() –  Alex Apr 27 '09 at 16:59 add comment I'm a big fan of Pylons. It behaves just like a framework should; not excessive on the magic and contains many good components that you can pick-and-choose that help you hit the ground running. It's small and easy to deploy, and requires minimal boilerplate or other syntactic cruft. Scalability seems pretty good -- I've not run into any issues, and major parts of Reddit utilize libraries from Pylons. share|improve this answer add comment This is probably one of the most scalable solutions: G-WAN + Python: Their scalability tests (like the results) are peerless. share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/793501/what-http-framework-to-use-for-simple-but-scalable-app
dclm-gs1-181640000
0.432241
<urn:uuid:1c78055a-3a64-4644-a18e-546771b18eb2>
en
0.762884
Take the 2-minute tour × I have the script: object_name(fk.parent_object_id) 'Parent table', c1.name 'Parent column', object_name(fk.referenced_object_id) 'Referenced table', c2.name 'Referenced column' sys.foreign_keys fk inner join sys.foreign_key_columns fkc ON fk.object_id = fkc.constraint_object_id inner join sys.columns c1 ON fkc.parent_column_id = c1.column_id and c1.object_id = fkc.parent_object_id inner join sys.columns c2 ON fkc.referenced_column_id = c2.column_id and c2.object_id = fkc.referenced_object_id And I know that I get a result set back with 5 columns. Is there is a slick and efficient way to store this data in a linq type object or an iQueryable object? I want to be able to iterate through it... share|improve this question There are many ways. Are you asking which ORM is best? That's too open-ended... –  RedFilter Nov 3 '11 at 13:27 are you using EF / Linq2SQL ? or "pure" ADO.NET ? –  Yahia Nov 3 '11 at 13:28 add comment 4 Answers There are a few ORMs that use IQueryable: Entity Framework, LINQ to SQL, NHibernate, Subsonic, etc. I recommend trying one out. share|improve this answer add comment For a very lightweight ORM, you can use the DataContext's ExecuteQuery: class YourRow public string Col1 { get; set; } public string Col2 { get; set; } // DataContext takes a connection string as parameter var db = new DataContext("Data Source=myServerAddress;" + "Initial Catalog=myDataBase;User Id=myUsername;Password=myPassword;"); var rows = db.ExecuteQuery<YourRow>(@" select fk.name, object_name(fk.parent_object_id) 'Parent table', If you can store your SQL query in a view, you can drag the view to a DBML file to have LINQ create the wrapper class for you. share|improve this answer add comment If you execute this script by using a DbCommand and a DataReader you can iterate over the rows that are returned and add them to a list of a custom object that will hold the 5 columns. You can then use Linq To Objects to filter the list even more. Or you can use an ORM to map your entities to the database. If you create a Database View for your query you can map an entity to the view with for example the Entity Framework and use that to execute further queries. share|improve this answer add comment You can store this into DataTable. You have add assembly System.Data.Exetensions in your project to used DataTable as IQueryable. from tbl in dataTable.AsEnumerable() //where clause select tbl; DataView view = tbl.AsDataView(); share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/7995676/how-do-i-encapsulate-this-data-from-sql-using-c
dclm-gs1-181650000
0.970138
<urn:uuid:62de9f1f-b1c4-47dd-b823-dca372fbb1ad>
en
0.822816
Take the 2-minute tour × How can I convert the number 123.45678 * 10^-22 to the IEEE 745 single-precision floating point representation? Can you show me the steps? share|improve this question See stackoverflow.com/questions/3448777/… –  paxdiablo Nov 25 '11 at 14:53 add comment 1 Answer Basically you want binary scientific notation. That is, you want your number to be of the form 2α, and you need to split α into its integral and its fractional part, α = k + β, with β < 1 and k ∈ ℤ. To find α, take logarithms: α = log2123.45678 − 22 log210. The integral part of the exponent, k, is stored in the exponent field of the IEEE float (after adjusting by the bias), and the fractional part 2β is stored in the mantissa (omitting the leading 1). share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/8270697/how-to-convert-a-number-to-the-ieee-745-single-precision-floating-point-represen?answertab=votes
dclm-gs1-181660000
0.869607
<urn:uuid:4c8cad0a-71b5-46cd-97ed-aea1995c2bf7>
en
0.786485
Take the 2-minute tour × python's unittest testrunner looks for setUpModule() defined in a file to perform before running any test specified in the module. is there a way to use a decorator or some other tool inorder to rename the function name? for example: def globalSetUp():... will enable unittest's loader to recognize this function as the setUpModule function. i am usint python2.6 with unittest2 package. share|improve this question add comment 2 Answers Derive from TestCase, and in your subclass call your own setup function in the setUp method. Then create your classes from this new subclass rather than TestCase, and you'll have the desired functionality. share|improve this answer add comment Why not just rename/alias the function? def globalSetUp(): setUpModule = globalSetUp It's just a single additional line, just like a decorator would be. share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/8397690/renaming-default-python-unittest-function-names?answertab=active
dclm-gs1-181680000
0.054243
<urn:uuid:0d823cf6-5ebd-4073-a4c6-b836292f5717>
en
0.922876
Take the 2-minute tour × My SQL Server 2008 has 1. one central database that has some global functions, e.g. mapping to specified client DB. 2. 50+ client DBs 3. Master DB.. (MS Default) 4. ASPState for session. Now I'm trying to add this stored procedure usp_RethrowError (http://msdn.microsoft.com/en-us/library/ms179296.aspx) which is return a message from try...catch.. of SQL to my server. Since the stored procedure is a common sp, I want to use it in the central DB and all client DBs. Where should I put it? in the central or duplicate it in each client DB? Is there any issue or performance drawback if the stored proc is placed in the central, caz in the client DB, I have to write something like [central].dbo.usp_RethrowError What about put it in the master db? Many Thanks share|improve this question add comment 3 Answers up vote 2 down vote accepted This question is largely a matter of taste, and of the specific circumstances. There are no performance implications to calling a procedure from another database. I generally recommend against putting stored procedures in the master DB and generally reserve that for system use. There are some cases where replicating the procedures makes sense (such as when you think there is a chance you may eventually separate those procedures into multiple servers). I frequently put utility procedures and functions in a separate database named utility. This makes it easier to maintain than giving each database their own copy (only one place to change code if I want to add functionality or discover a subtle bug), but it also avoids poluting the master database, and makes it easy to backup and migrate all of my utility functions when a new server is brought online. share|improve this answer If there are no performance implications, then the StoredProc should be added in Master or My Central. So what's your option for these two dbs. Does Master cause maintenance/upgrade problems? –  Dan An Dec 13 '11 at 10:25 Your central sounds like the same as my utility database, which is what I normally recommend. As for using master, I don't like to put them there just because it seems disorganized to put any user defined object in the master DB, and the master DB is often treated differently by the DBA when it comes to making backups. –  TimothyAWiseman Dec 13 '11 at 14:43 thank u TimothyAWiseman. –  Dan An Dec 14 '11 at 12:23 add comment It depends on whether any of your client database's will ever have to move server, without the rest of the databases. Moving the client database to another server, which doesn't also include your central database will cause an error to be thrown. So in this case, I would add the stored procedure to each database. If the databases are never going to be individually moved to another server, then I would add the stored procedure to the master database. share|improve this answer The dbs won't be moved individually to another server. So what the benefits that adding it in Master than Central. –  Dan An Dec 13 '11 at 10:03 I think the question should be the other way round? What's the purpose of creating a Central database? –  Curt Dec 13 '11 at 10:05 I understand that a SP that contains common business logic should be added in Central, but not sure about a sys utility-like SP. I guess you probably mean never add things in Master, since I got a customlised Central DB. –  Dan An Dec 13 '11 at 10:30 add comment In addition to the other considerations, you may also want to look at using a synonym. That way you could create a centralized database for your common procedures [central], but have your code pointing to a synonym for those procs. In the future, if you need to move to a self-contained version, move the centralized procs to your local databases, and drop the synonym. share|improve this answer Have read about synonym from MSDN, seems it is more used for user data operations (select). Does it suit for Utility/Common Function? –  Dan An Dec 13 '11 at 10:19 Any time you need to reference a specific object that is either remote or local to your current operation, then a synonym may be used. It's simply a shortcut; the benefit is that if you ever need to update the location, you can drop and recreate the synonym without touching your calling code. –  Stuart Ainsworth Dec 13 '11 at 12:01 I see, do you use synonym for every table or StoredProc in Central or Master in your project? May be the only drawback for a synonym is that it has to be duplicated in every client DB, which increase a bit maintenance works. –  Dan An Dec 13 '11 at 12:26 Anyway it is still a good suggestion. So what's your option of Master or my Central? –  Dan An Dec 13 '11 at 12:28 add comment Your Answer
http://stackoverflow.com/questions/8478351/where-should-i-put-common-stored-procedure-in-sql-server
dclm-gs1-181690000
0.497364
<urn:uuid:64f51e41-1181-41e8-a25c-35b2b06554f4>
en
0.865557
Take the 2-minute tour × I've been making several libraries and extension libraries, and it's not practical for me to use prototype because in the real-world you actually have private variables that do not need to be accessed from an instantiated object. var parent_class = function(num) { var number = num; this.method = function(anum) { number += anum; this.getNumber = function() { var fnumber = number + 2; return fnumber; var child_class = function(num1, num2) { var sum = num1 + num2; parent_class.call(this, sum); // initialize parent class this.method = function() { sum -= 1; base.method(sum); // what to do here child_class.prototype = new parent_class(); // inherit from parent child_class.prototype.constructor = child_class; // maintain new constructor var c = new child_class(1, 4); // child_class.sum = 5, parent_class.number = 5 c.method(); // child_class.sum = 4, parent_class.number = 9 var num = c.getNumber(); // returns 11 Now, without declaring and relying on methods being prototyped, how can I get the what to do here line to work? I understand that I could call this.method(); inside child_class and store it as a variable, but I want overridable methods. My previous topic was not very forthcoming, as everyone assumes I can just prototype everything or use private variables to get around the problem. There has to be a way to do this without prototyping. I want to call .method(); from inside an instance of child_class without storing the previous .method(); as a private variable or using prototype methods that, for obvious reasons, cannot access private members. share|improve this question I don't understand the question .. what are you trying to achieve ? –  c69 Jan 25 '12 at 17:48 I put it in nice bold font. –  Brian Graham Jan 25 '12 at 17:53 add comment 2 Answers up vote 1 down vote accepted Just use the prototype, you can mark "private" properties and methods with NULL character prefix or whatever to discourage people from using them, which is all you really need. MyClass.prototype = { "\0privateMethod": function(){} If you're using chrome you will see this in console: privateMethod: function (){} __proto__: Object Yet one cannot do myClass.privateMethod(), this should be enough of a hint that this is a private property. To actually call it, you'd need to write myClass["\0privateMethod"](). After going back to using prototype, your problem should automatically become easy to solve. share|improve this answer Thanks for finding a close-enough way to approach my question, this works for me. –  Brian Graham Jan 26 '12 at 14:35 add comment You're trying to make JavaScript into something it's not. Stop doing that. JavaScript does inheritance through the prototype. Get used to it. Okay, let's clarify. JavaScript doesn't implement OOP like C++, Java, C#, VB.NET, or any other object oriented language. You have the prototype. You can extend the prototype. If you want to "override a method", you need a reference to the version that previously existed. Now, the caveat is going to be that anyone, at any time, can come along and replace anything, anywhere. So any assumptions about the stability of your object model are flimsy, at best. Let the prototype do its job. Any framework you build around it to try to mimic inheritance, abstract base classes, superclasses, and what not, is going to have its own headaches and become a maintenance nightmare. share|improve this answer although I kind of agree here, that's not realy an answer. –  gion_13 Jan 25 '12 at 18:01 add comment Your Answer
http://stackoverflow.com/questions/9007413/javascript-inheritance-by-prototype-without-using-prototype-to-define-call-met?answertab=oldest
dclm-gs1-181720000
0.066004
<urn:uuid:0542cbe2-dee1-4550-ab7e-3f87d122602a>
en
0.784562
Take the 2-minute tour × I am trying to send SMTP email from my vb.net form application. When applying this code, I get the error below. What am I doing wrong? Imports System.Net.Mail Public Class Form1 Dim SmtpServer As New SmtpClient() Dim mail As New MailMessage() SmtpServer.Credentials = New _ Net.NetworkCredential("[email protected]", "mypassword") SmtpServer.Port = 587 SmtpServer.Host = "smtp.gmail.com" mail = New MailMessage() mail.From = New MailAddress("[email protected]") mail.Subject = "Test Mail" mail.Body = "This is for testing SMTP mail from GMAIL" MsgBox("mail send") Catch ex As Exception End Try End Sub End Class Error Message share|improve this question add comment 2 Answers See if this helps; Add SmtpServer.EnableSSL= true share|improve this answer add comment I know this was last year but I thought I should publish the answer as five minutes ago I had the same issue. Basically your log in credentials are incorrect and need changing. Also thanks for the previous answer has that piece of code allows me to send emails over SSL encryption (I Hope LOL). share|improve this answer add comment Your Answer
http://stackoverflow.com/questions/9280105/system-net-mail-smtpexception-the-smtp-server-requires-a-secure-connection-or-th
dclm-gs1-181730000
0.716901
<urn:uuid:04bd56fa-a639-47ab-a945-f751ede5c918>
en
0.955202
Take the 2-minute tour × Gerrit will merge potentially unreviewed changes that are earlier in the commit history and are in a different 'branch' of the repository. Here's an example: 1. checkout gerrit branch devel 2. create file1.txt, add, commit, push to refs/heads/temp_branch 3. create file2.txt, add, commit, push to refs/for/devel to be code reviewed When file2.txt is accepted and merged then file1.txt, because it's upstream and not in a separate change branch flagged as being under review, also gets merged in. This is potentially very problematic and the only solution I can come up with is to force every change pushed to every branch be code reviewed. This is not ideal, as you may want to have some branches with one group of approvers, or with no code review (for some code swapping?). The solution here is to force every commit in the history be placed into code review, as would be the case had file1.txt not been pushed to a different branch in the same repository. Is there a setting in Gerrit that imposes this rule? Can anyone think of a workflow that allows for the freedom to push to refs/heads/ without risking polluting other branches? Many thanks. share|improve this question I think in your example, step 2 is really a push to refs/for/temp_branch? –  Brad Feb 28 '12 at 15:53 add comment 1 Answer up vote 2 down vote accepted I suspect you are seeing this behavior because the commit in step 3 has step 2's commit as its parent. You can't submit a commit unless all of its parents have been submitted. I agree with you that this seems like a bug in Gerrit - it should refuse to submit until step 2 has been submitted. Try this work-around - add step 2a after step 2: 2a. checkout the devel branch again If the commits are going to 2 different branches, it doesn't make sense for them to be linear. One other thought - what merge strategy are you using for this project? If it is cherry-pick, I'd try changing it to merge-if-needed, or if it isn't cherry-pick I'd try changing it to cherry-pick. I believe the behavior here is different between the merge strategies. share|improve this answer Turns out that this flaw has been noted on the Gerrit site. Though you were right about the cherry-pick! I'm not sure if I trust cherry picks in terms of merge conflicts that could arise with multiple chained changes going through code review, and generally preserving the integrity of the commit history. But it does get around the issue of inadvertently merging unreviewed changes. –  mut1na Feb 28 '12 at 22:02 just to add, the cherry-pick essentially makes the commit in the origin the 'official' commit id when it gets merged in. Also it means that you have to rebase on your origin branch for your own changes (though this will be trivial - i.e., no conflicts as you already have the code!), so your branch doesn't diverge from origin. –  mut1na Feb 28 '12 at 22:24 add comment Your Answer
http://stackoverflow.com/questions/9473074/is-there-a-way-to-force-gerrit-to-have-all-commits-in-a-branch-be-push-to-code-r/9485230
dclm-gs1-181740000
0.033166
<urn:uuid:229ddad4-3e8d-425f-a3e3-82e4af5f01ce>
en
0.963464
View Single Post Lt. Commander Join Date: Dec 2007 Posts: 120 # 18 04-21-2010, 06:31 AM I think the big issue is the nerf to EPS consoles. My thought is Cryptic nerfed it because they didn't want people stacking EPS so they never see a power drain on their ship. I don't know what people used before the nerf in terms of the number of EPS consoles on their ship but now the thought seems to be every engineering console needs to be an EPS console. that means the rest end up never being used. My suggestion is make the EPS consoles a unique-equip item and remove the nerf made to the console. I think that would have been a better shot at fixing it instead of nerfing them and pretty much forcing everyone to stack more consoles. just my thought
http://sto-forum.perfectworld.com/showpost.php?p=2579968&postcount=18
dclm-gs1-181790000
0.99679
<urn:uuid:c52b641a-f310-4e0a-a5c7-9b44442f9274>
en
0.745355
Michael Lamothe Joined Jul 17, 2012 1. Default_avatar_thumb 2. Thumb-1367271109 3. Thumb-1309849773 4. Thumb-1371427949 5. Thumb-1391550279 6. Thumb-1389051825 7. Thumb-1393421679 8. Thumb-1379006107 9. Thumb-1388614850 10. Thumb-1367923930 11. Default_avatar_thumb 12. Thumb-1389467792 I am a short term and longer term trend trader. I am a private wealth manager in the process of obtaining my Series 65, so I can manage the capital assets of others. 13. Thumb-1345056378 14. Thumb-1367923039 Basically following the line of least resistance. Win big when you're right and lose little when you're wrong 15. Thumb-1385815409 16. Default_avatar_thumb 17. Default_avatar_thumb 18. Default_avatar_thumb 19. Default_avatar_thumb 20. Default_avatar_thumb
http://stocktwits.com/MichaelGLamothe/followers?page=7
dclm-gs1-181800000
0.555827
<urn:uuid:2a27b027-d6bf-4519-bbf5-8ce5a1fa849b>
en
0.933248
Take the 2-minute tour × When I connect 2 PCs with each other through a 1GigE crossover cable and transfer large files (often larger than 1GB) through FTP, I often got transfer speed of around 70MB/s, which is likely limited by the hard drives and not by Ethernet's bandwidth. I don't have a USB 3.0 device at hand, but we can safely assume that the limiting factor is still the hard drive's spinning speed (we aren't talking about SSDs here). So, ceteris paribus, which protocol taxes the processor more (given the same transfer rate ?) share|improve this question add comment 3 Answers While ultimately the computer's CPU is involved in the process, the reality is that it is so negligible, that it is irrelevant. Both USB and Ethernet have their own controller chips and do not rely on the CPU for instructions or processing power. share|improve this answer This is not 100% correct. Some Ethernet chips may in fact rely on CPU to do some part of the processing and by that make an impact on the system performance. –  AndrejaKo Sep 11 '11 at 17:51 Just today I noticed that transferring a bunch of files over my laptop's WiFi connection consumed a considerable amount of CPU (about 10%). Which although mean I could still easily saturate the connection, there's still quite a bit of overhead with networking. Although this was Wifi, So maybe my CPU was helping out in some of the encryption. –  Kibbee Sep 11 '11 at 19:22 it really depends on your hardware. –  Keltari Sep 11 '11 at 19:44 add comment Over Gigabit ethernet the max you could ever get is 128MB/s, take into the fact of TCP error checking and the OS having to deal with the file move then you can sat that 70MB per second is about right not every bit sent over the network is the file itself there are a lot more mechanisms in place, Im guessing since your already getting over 66 that your on Sata 1 disks at least. So your bottleneck isn't your hard-drive. Hard disks ATA 33 = 33 MB/s ATA 66 = 66 MB/s Sata 1 = 187.5 MB/s Sata 2 = 375 MB/s Sata 3 = 750 MB/s Your final question is a bit off topic of your opening but there both cpu un-intensive as there IO devices share|improve this answer The SATA speeds you have mentioned are the interface speeds. Actual (consumer, non RAID) HDD's top out in the 70-100MBps range. –  Akash Sep 11 '11 at 17:53 -1: Consumer hardrives are gonna be pushing 187.5 MB/s. –  surfasb Sep 11 '11 at 19:11 You are vastly overstating the bandwidth of SATA. –  Mr Alpha Sep 11 '11 at 19:36 There are the facts of the ATA and the SATA bus, and the fact that you mention RAID in it at all bewilders me, You still have the same disks in a raid array, yes in theory you can read faster in a stripe but the disk still reads at the same speed. –  Shutupsquare Sep 11 '11 at 19:37 add comment Your harddrive is the limiting factor here at 70MB/s. Past the 100 MB/s range, other factors come into heavy play. How do you transfer the files? On the network, FTP is typically the fastest compared to SMB. For SMB, SMB 2.0 will knock the socks off earlier implementations. On the Windows side, that means you'll need Vista SP1/Server 2008 and above. On the Samba side, I don't know of any distros that use SMB 2. Since there has been little benchmarking information on USB 3, I'll reserve judgement on which will be faster outside the 100MB/s range. share|improve this answer add comment Your Answer
http://superuser.com/questions/334387/usb-and-ethernet-which-is-more-cpu-intensive
dclm-gs1-181820000
0.300721
<urn:uuid:1bbcce28-e77e-448f-87d6-0d18e6ae487e>
en
0.88463
Take the 2-minute tour × Can LyX be used as an IDE for LaTeX? I am considering using LyX instead of Emacs to write my LaTeX papers. Emacs is powerful editor/IDE which helps me be more productive while writing LaTeX. LyX looks like more than an IDE, because it uses its own file format. Is LyX is a good option if the end result must be a LaTeX code? share|improve this question "LyX looks like more than IDE, because it uses its own file format." That's not a way to define an IDE. I mean, which C++ IDE does use it's own file format for the C++ files? Sure, every IDE saves a project file or similar, but with LyX the .lyx is the complete document. –  Martin Scharrer Sep 18 '11 at 18:49 you cannot compare a simple text editor for C++ with LyX which itself tries to display the LaTeX source in WYSIWIG. –  Herbert Sep 18 '11 at 19:02 My own experience with trying to replace Emacs with LyX: if you are comfortable writing LaTeX in Emacs/AucTeX, don't switch to LyX. –  Truong Sep 19 '11 at 3:49 @MartinScharrer: Isn't that the point? The OP is saying that just as IDEs for programming languages don't use their format for their files, so also (hypothetical) LaTeX IDEs would not use their own format, and hence something that's using its own format is (probably) more than just an IDE. It's doing something more/different, which LyX indeed is -- as you said, the .lyx is a complete document, and LyX is indeed not a LaTeX IDE. The conclusion is correct. –  ShreevatsaR Dec 2 '11 at 11:54 add comment 2 Answers up vote 24 down vote accepted No, LyX should not be considered as an IDE for LaTeX, even though it uses LaTeX as backend. The point here is that while every LyX document can be exported to LaTeX, not every LaTeX document can be imported into LyX (even though simple stuff works pretty well). This means, if collaborating on a paper, all or no authors have to use LyX. I personally use and prefer LyX for writing papers and larger documents, but fall back to plain LaTeX if one of my collaborators does not want to use LyX. share|improve this answer add comment Here is a more detailed answer... Is LyX an IDE for LaTeX? "IDE" stands for Integrated Development Environment. That is a software application which is usually used for writing and developing new programs in a certain programming language. An IDE integrates several components into one big entity. The basic requirements are to provide: 1. a source code editor for a specific programming language; 2. a configurable mechanism to build the output (e.g., an executable program) from the source code automatically; Here the programming language corresponds to a language for typesetting documents: LaTeX. 1. In LyX one cannot edit LaTeX code at an arbitrary position, see LyX FAQ. LyX generates a few different output formats (LaTeX, HTML, OpenDocument) from a LyX document. Thus, it is not a LaTeX editor. 2. LyX automatically generates the output (e.g., a PDF file) also including bibliography, indices, etc. It is possible to influence this process. Thus, LyX satisfies the second requirement. Overall, LyX cannot be considered as an IDE for LaTeX, although it acts in parts similarly to an IDE. Is LyX a good option if the end result must be LaTeX code? Comparison of LaTeX, LyX, PDF: table with math formula above picture This picture shows a LaTeX document, its LyX equivalent, and the final PDF. LyX comes close to the PDF! Features of LyX: LyX has a reasonably good support of LaTeX from classes ("article", "book", "letter") to commands (\textbf{...}, \medskip, \ref{...}) and environments ("itemize", "minipage"). Furthermore, LyX has a good table editor, with which one can rapidly create, edit, format tables - no knowledge of the tabular or longtable environments is needed. For math formulas, typing the LaTeX code directly or using a graphical math editor are possible. Formulas can be displayed either similar to the print-out or exactly using instant preview. Furthermore, re-structuring a document is easy: changing the nesting levels, and re-ordering paragraphs, subsections, sections, items of lists can be done with just a few key strokes (no copying and pasting needed). Not possible in LyX: As mentioned LyX does not offer to edit the LaTeX code at an arbitrary position! Though injection of TeX code at some points is possible. Hence, one somehow depends on the options that are supplied by LyX and its loadable modules. A general recommendation: If you have some time, learn the basics of LaTeX before learning LyX. That is, how to write and compile a simple document with some figures and tables, e.g., see first LaTeX doc or Best Way to Start Using LaTeX or Best Book to Start Learning LaTeX. Then you will get a glimpse of what LyX does behind the scenes, and you can turn to LyX. (Note that LyX - generating LaTeX - is quite different from other document processors like Microsoft Word or LibreOffice Writer.) In my opinion, 1. LyX can be a good option in terms of productivity and time (by visually editing tables, formulas, etc.). 2. Not all used LaTeX packages might be supported but support can be added. Nevertheless, if too many of them are missing or one wants to do heavy LaTeX customizations then it might be better to start off with a LaTeX document directly. 3. Finally, if you started writing a LyX document and later need many LaTeX customizations, you can still switch from LyX to LaTeX by exporting the document and continuing writing in LaTeX. The other way around, start a LaTeX document and importing it to LyX might not be so seamless yet. share|improve this answer +1 As long as we get more friends into latex'ing, Lyx is a very good tool for non-programmers and lowers the barrier. over time change though to emacs and vi category. –  texenthusiast Apr 16 '13 at 17:25 add comment Your Answer
http://tex.stackexchange.com/questions/28822/can-i-think-of-lyx-as-a-latex-ide?answertab=votes
dclm-gs1-181830000
0.567986
<urn:uuid:a992b0e4-8828-4d7b-b979-e1268a82dbf1>
en
0.95443
In response to: A Scam’s Telling Success John1039 Wrote: Jul 29, 2012 4:40 AM What is worse the 42 billion dollars that GM owes the tax payer or this scam ?One is linked Directly to Obama and the other uses his name. Either way the working american is the loser A con works only if you are greedy or desperate. That is how liberals get elected people think they will get free stuff and con men rely on your greed kenneth416 Wrote: Jul 29, 2012 11:52 AM Yeah, John1033, GM owes the government (us) $42 B, but they will soon pay it back. I think they sold 989 Volts last month, and while they LOST $10,000 per vehicle (due to having to amortize the development cost), just think how much PROFIT they will make when they are selling 1,000,000 per year. You see, it's all about VOLUME! And how do they sell 1M Volts per year? Simple, Obama and the EPA will MANDATE that everyone has to buy one within 3 years or else pay a penalty (NOT a TAX) of $10,000. The following anecdote from MSNBC shows why so many people are falling for it: Caroline Morales of Bethlehem, Penn., told the Allentown Morning Call that she had been tempted by the scam. “My neighbor comes running with a paper that had a routing... Related Tags: Success
http://townhall.com/social/john1039-480660/a_scams_telling_success_cmt_5016548
dclm-gs1-181870000
0.500598
<urn:uuid:f0f08be0-080f-4759-a88b-d7da8f0473b5>
en
0.96928
In response to: State of the State of the Union M.K. Wrote: Feb 11, 2013 9:34 AM Obama thinks that taxing you and using the tax money to hire people to work for the government is job creation. Real job creation occurs when people start their own businesses and grow and hire more employees thereby increasing the tax base. Everyone wins. The employer gets rewarded for his investment of time and money, the employee gets a job and the govenrment gets more tax money due to the increased tax base. Socialist fools like Obama do not understand this simple truth and the country suffers because of it. Obama is alot more interested in his perverse socialist philosophy that he is in the welfare his fellow citizens. As we have discussed before,...
http://townhall.com/social/m.k.-537002/state-of-the-state-of-the-union-n1509473_cmt_6357445
dclm-gs1-181880000
0.225486
<urn:uuid:7ad690d2-9eee-493d-8b59-03dad8e8df6c>
en
0.942922
main index Topical Tropes Other Categories TV Tropes Org Headscratchers: Puzzle Quest • Why has every single sequel and Spin-Off since the original regressed in terms of graphics? At best, Galactrix was a step sideways (it was a regression in art style more than graphics). Though the PC version of PQ2 is decent enough (until you see the portraits of NPCs... yeesh). • How can I use my mount's abilities when I'm training my mount? Am I getting my giant rat to bite itself? • I figured it was some sort of bond thing. Once it becomes your mount you can use its magic. Which brings up the question of why you can't use ALL your mount's magic (Can't use Scavenge with a Rat mount, can't use Smite with a Pegasus mount, etc.) • Of ro that matter, why don't you gain your mount's resistances? The 25% Air resistance from a Griffin or a Pegasus would've come in quite handy. • Seraphine, in Warlords. Seriously, what is the point of this character? She does virtually nothing — yes, she's useful in the instances when you're facing an opponent who "will not like to strike a lady," but if you pay attention, you'll notice that you only face opponents of that sort in her sidequests. The entire Seraphine arc could have been left out of the game altogether, and it would have changed absolutely nothing. • This Troper theorizes that they wanted to play with the "Princess escaping a forced marriage" idea. Only instead of making her an idealist (or at least making her useful), they deliberately made her The Load. • Good-aligned opponents abound before you enter the Realms of War - doubly so if you're playing the Plague Lords expansion or the iPhone version. And rescuing her initially gives you a tidy sum of money and a useful magic item. As stated elsewhere, she's pretty useless once you reach the High Elves, but she's a decent support character until that point. (Of course, This Troper's theory is that she stays with the party because she's banging your character...) • Token girl. There are no other recruitable female characters until near the end of the game. Putt-PuttHeadscratchers/GamesQuest for Glory Permissions beyond the scope of this license may be available from Privacy Policy
http://tvtropes.org/pmwiki/pmwiki.php/Headscratchers/PuzzleQuest
dclm-gs1-181910000
0.031304
<urn:uuid:30042b27-b26e-4e13-a823-0383a3b7ddb8>
en
0.968639
main index Topical Tropes Other Categories TV Tropes Org Staged Shooting Nicolas Mason: "Corn syrup." Ziva David: "Blanks." — To a dumbfounded Big Bad, "Worst Nightmare", NCIS It's a tense scene in the middle of The Caper. It looks like the characters are about to be rumbled. Two start arguing with each other. One pulls out a gun and fires it. Blood comes out of the second person's chest and they fall to the floor, apparently dead. The situation is resolved. It then turns out that the second person isn't dead after all, but the whole thing was a set up involving squibs and fake blood. Multiple variations on this, but the gist of the matter is — the bullet impact isn't real. Often used when the audience is supposed to learn that the hired killer actually has a conscience. Typically, the killer will take a job only to realize later on that he can't kill the target for "ethical reasons" (he's a good father, he donates to charities, doesn't kill women, etc), and agrees instead to fake the death. Also used when the writers need the someone to "retire" from a job that would otherwise be impossible (professional killer, mafia enforcer, grocery bagger, etc.) Not to be confused with Bait-and-Switch Gunshot. Also see Fake Kill Scare, where someone's death is faked to frighten a loved one.     open/close all folders      Anime & Manga  • Done with a knife in One Piece. • In an episode of Trigun, Vash (known for his very strict policy against killing anyone or anything) is hired to kill two stowaway children for a very high price. He shoots the children without batting an eye and takes the money. Then he gives it to the kids after they get up from being hit with rubber bullets. • Another instance was when Vash and Wolfwood entered a quick draw contest and they made it to the finals. When they would've been pitched against each other, Wolfwood attempted to withdraw his participation so that they get the money without having to actually fight. However, the sponsor of the contest blackmailed him into going up against Vash on the grounds that if he manages to kill him, he gets a share of the bounty. Wolfwood informs Vash about the situation and the two stage a fight where they appear to shoot each other and collapse into a puddle of blood. The bad guy's henchmen go to check the "corpses"... who quickly disarm them with well-placed shots and reveal that the blood was fake, stored in the booze bottles they emptied last night.     Comic Books  • Done at the end of Watchmen, when Laurie shoots Adrian - he looks dead at first, but then his hand opens up to reveal that he caught the bullet. • In an issue of Suicide Squad, the Squad uses this trick to fake the death of radical agitator William Hell. • One-shot Batman foe Michael Baffle enters the story by being executed by firing squad. It transpires that he has bribed the soldiers to load their rifles with blanks, and bribed the officer to forgo the usual inspection of the rifles before the execution. • A classic one in Bandits. The movie opens on the frame story of Larry King presenting his evening program as a retrospective following the death of 'Sleepover Bandits' (termed for their habit of taking the bank manager hostage the previous night and using him to gain early entry to the bank,) in a more conventional bank robbery, having kidnapped 'Larry' and forced him to interview them that evening. The movie goes along being fairly conventional lines: the duo meet love interest quarrel over said love interest etc. It all comes to a head at the bank robbery, surrounded by the cops with a room full of hostages, their emotions get the better of them and they wind up shooting and killing each other. It's faked by their special effects buddies: but the real twist comes later The quarrel was real, but the ensuing breakup was faked, allowing the love interest to tip-off (and claim the substantial reward for) the police to the 'Bandits' next target. Oh and the bodybags were stuffed with cash. The final scene has them relaxing at a hotel in Mexico as the radio continues to broadcast news of their deaths. • A key element in both F/X movies. • Happens early on in The Brothers Bloom and subverted by Stephen in the end, leading both his brother and viewers to think it's this, when it's not. • The climax of The Sting. • The climax of Phone Booth. • Used in Lucky Number Slevin, although the killer wasn't the one who set it up - his partner warned the person scheduled to be killed beforehand. • Used in Mickey Blue Eyes, both in the main plot and the Twist Ending. • Used in the Bond film The Living Daylights, although what is really happening is hinted at beforehand and it is likely that the audience is not supposed to be fooled. • Also used in GoldenEye, not hinted at but kind of obvious as the actor gets second billing. • Used at the beginning of the movie The Punisher (2004), to set up Frank's "retirement" • In Hot Fuzz, Danny does this to get Nicholas safely away from the murderous townsfolk. • Part of the Driven to Madness ploy in Hush Hush Sweet Charlotte • Used in the 2004 Paul Haggis film Crash. A gun store owner tracks down the man he believes responsible for robbing his store. He confronts the supposed assailant in front of his house, and when he fires the gun at the man and his daughter (who's jumped into her father's arms), the gun fires blanks. The storeowner's daughter switched the ammunition in the gun, believing her father might hurt someone. • Used at the end of City Slickers 2, except the target is so startled that even he doesn't realize he wasn't shot. • Used in Hudson Hawk as Hawk apparently shoots and kills Tommy, but in the next scene Tommy gleefully explains that the blood was only ketchup. • Death on the Nile. Somewhat different though, because the fake-shootee later inflicts a real wound on himself. Apparently not caring that he might kill himself through the blood loss by this way. • Played straight then revealed in North by Northwest when the heroine shoots Cary Grant. The gun is later discovered by the chief henchman to be loaded with blanks. • One of the main plot-device gizmos in xXx. Xander is given a special gun that simulates firing a real bullet but is actually just firing tranquilizer darts with built-in blood squibs that perfectly simulates a real shooting. He is, of course, almost immediately given a situation requiring precisely this kind of device in the course of his mission (pretending to kill a good guy to earn his way into the evil organization). • In Disney's Tarzan, Tarzan has Clayton at gunpoint with his own rifle. Clayton dares him to shoot and "be a man", then cringes as a shot is heard. It was actually Tarzan imitating the sound of a gunshot. • On Cars, McQueen thinks he's being shot at by the sheriff. It's actually the sheriff's tailpipe backfiring. How on earth he could have shot at him at all with no limbs is a good question. • The sequel answers that question, depicting cars with retractable guns built into their wheels. • Subverted in Heathers, when J.D. tells Veronica that the bullets in the guns he's provided for a "prank" are fake-but-realistic-looking tranquilizer darts; but which turn out to be very real and very deadly. This is played strictly for laughs. • Double subversion in The Game when Nicholas thinks he has a hold of a real handgun that The Game missed. He shoots his brother, who we now think is dead. Nicholas then proceeds to jump off the roof only to crash through breakaway glass into a party held in his honor. Here he discovers that his brother is alive, and more importantly, that he has lived. • The Quick and the Dead has Russell Crowe's character shooting his Love Interest (played by Sharon Stone) in a Duel to the Death in a shooting contest arranged by her Arch-Enemy. Later, he turns out to be alive - they faked his death. • In the movie Salt Evelyn Salt shoots the Russian President Boris Matveyev. Later it is revealed the death was actually staged by Evelyn by using a spider venom filled projectile to cause a temporary paralysis resembling death. • Mentioned as a possibility in Robert A. Heinlein's The Cat Who Walks Through Walls. A man is shots and collapses in front of the main character, and then the body is quickly removed. After first assuming the man had been shot, the protagonist realizes it could have easily been faked ( It wasn't), which would explain why the body was removed so quickly. • Used in the Artemis Fowl series when Artemis rescues his father from the Russian Mafia, using a hollow bullet filled with Artemis' own blood.     Live Action TV  • Happens in several occasions in Hustle, in order to scare the mark into taking off and not coming back for his money (it's an old con trick, but something of a Fridge Logic moment these days, as even if the mark left the country they would undoubtedly look up on the internet to find out what the police were saying about the non-existent shooting). Subverted on one occasion when the mark gets caught up in the emotions of the moment, draws his own firearm and fires a couple of real bullets into the 'victim' as well! Fortunately, he survives. • Both the TV incarnations of Mission: Impossible featured Fake Gunshots, as well as fake stabbings and any other means of getting an agent to "die" in front of the IM-Force's latest mark. • Variant: In the fourth season of 24, Tony Almeida "shoots" Jack Bauer, and Jack is then examined and found to be dead. Thirty seconds later, Tony jabs a syringe full of adrenalin into Jack's heart to revive him from artificially-induced death. • Star Trek: The Original Series • Bones fakes Kirk's death in "Amok Time" (fooling Spock and the other Vulcans), while Spock uses a phony 'Vulcan Death Grip' on Kirk in "The Enterprise Incident" (fooling Bones and the Romulans). • "Patterns of Force". A female Nazi fires a gun at a Resistance member and kills him. After Kirk and Spock grab the Nazi the Resistance member gets up, revealing that her gun was filled with blanks. • Rare sword example: In Heroes it looks like Hiro has stabbed his friend Ando, but we later find out he stopped time, got a prop sword and fake blood, and set the whole thing up so that the bad guys would think he was one of them. and left a real sword in a Japanese joke store. • In The X-Files episode The Amazing Maleeni this is used to set up an armored car robbery. The guard's guns have had their bullets changed to blanks to make the robber seem invincible. • In an episode of Burn Notice Michael is trying to scare a timid corrupt executive into leaving the state/country, and does so by making him think someone wants to kill him. The executive isn't as easily scared as he thought, so Michael works with him to "hire" his friends Sam and Fiona to take out the assassin. Then, through some clothing-embedded blood splatters, all three are shot down by unseen gunmen, successfully sending the executive running for the hills. Then they get up, and Sam and Fi start critiquing each others' performances. • Stargate SG-1: In a training scenario the cadets didn't realize was a training scenario, they were given guns loaded with blanks and "brainwashed" Stargate Command personnel equipped with squibs. • In The Rockford Files episode Joey Blue-Eyes, the heroes stage a scene where Joey shoots Jim in order to convince that episode's villains that Jim really had kidnapped Joey's daughter. • On Parks and Recreation, a meeting is disrupted by a gunshot... that turns out to be the ringtone of Ron Swanson's cell phone. • On The Event, when Distressed Damsel Leyla gets the drop on Dark Action Girl Vicki, Leyla manages to take her gun and fires, seeing Vicki tumble down the stairs from the impact. Later in the episode it is revealed that Vicki had previously loaded the gun with blanks, as part of a gambit to make her think she escaped so that she would call her boyfriend, who Vicki's superiors are trying desperately to locate. • Done twice in the same episode of Leverage: first, "gunshots" were fired at a Corrupt Corporate Executive to convince him that he had hitmen after him, and he should go to the cops. Then, when that plan backfired spectacularly, a protagonist got "shot", and played dead, as the villains of the episode were actually going to shoot him. • The show's final episode starts with Ford being interrogated about a failed heist, in which the interrogator (and the audience) is led to believe until near the end that the rest of the cast, other than Ford, was killed. (The heist was actually successful: the team needed to pretend to be dead so they could sneak in as part of the investigation of the first, fake, heist.) One part of selling the deaths: a security camera caught Eliot being shot several times. The scene really happened, but the gunshots were of course acted. • In the Tales from the Crypt episode "Yellow", the general's son is scheduled to be executed via firing squad for being a Dirty Coward on the battlefield. The general tells his son on the night before the execution that he put blanks in the rifles to fake his son's death and that he'll be able to start a new life somewhere else. All he asks is that his son face his "death" with dignity. The son agrees, and faces the firing squad with a convincing act of courage, knowing he'll live to see another day. Until he sees his father looking away at the last second. • Jane does this at least twice in The Mentalist. • In Cackle-Bladder Blood, Jane has his former brother-in-law pretend to shoot and kill him in order to frighten a murderer into confessing. • In The Crimson Hat, Jane "shoots" Lisbon of all people and takes the body to present to Red John as a gift of friendship. • The NCIS episode "Worst Nightmare" provides the page quote.spoiler explanation  • Used in The Lives Of Harry Lime episode "Horse Play". This episode uses almost exactly the same plot as The Sting but predates it by twenty years. Both are based on the scenario described in the non-fiction book The Big Con. • Subverted in the opera Tosca: the villain makes a deal with the heroine to let the hero go after a "fake" execution by firing squad... which turns out to not be fake. • The Ira Levin play Deathtrap has several versions of this trope.     Video Games  • Done in The Elder Scrolls IV: Oblivion, with the twist that the knife stab you deliver to the victim is very real, but the dagger had been soaked in a poison that put the "victim" into suspended animation, from which you later awaken him. • Phoenix Wright has a reverse case like this where Edgeworth is framed for murder due to him having a meeting with Hammond, who was in fact murdered. Yogi, disguised as Hammond planned the meeting in a boat at a lake, where he fires into the air and then falls into the lake.. • In Ace Attorney Investigations, this happens twice. In case 3, the fake gunshot is intended to frame the shooter - the killer gave his girlfriend a gun that fired blanks and masqueraded as the victim, provoking her into "shooting" him and convincing her that she was the killer. Then, in case 4, the killer uses the sound of a gunshot on security footage of a shooting to fake the sound of the murder thirty minutes after it actually happened in order to establish an alibi. • A surprisingly elaborate one in Uncharted 3. • In Fallout: New Vegas, a freeside bodyguard for hire makes a killing with repeat business by staging attacks on his clients, where 4 thugs attack and drop "dead" as he fire blanks. With a high enough intelligence, you can point out he fired 3 times, and with a high enough medicine skill, you can find out the thugs are Playing Possum. • Girl Genius: While possessing Agatha, The Other steals one of the Wulfenbach troops' guns and uses it to shoot Tarvek Sturmvoraus in the back. Later she learns that the troops were equipped with stun guns, meaning Tarvek survived. • Although, in recent strips, we find that he's suffering some severe medical consequences now, in part because he left the hospital before he finishes healing.     Web Original  • Wash does this on a Recovery mission, bringing Agent South off the Freelancer roster. Subverted; she had planned it with Freelancer Command.     Western Animation  • In an episode of The Simpsons, in which Homer and Bart try to pull off a Fawlty Towers Plot. Played with, in that the guy who fired the gun wasn't in on the plan. • Done in the Young Justice episode "Summit". Miss Martian (disguised as Deathstroke) 'shoots' Aqualad and Artemis as part of a plan to extract an Engineered Public Confession out of the Reach and the Light. The 'deaths' are then revealed as special effects. Spread ShotGuns and Gunplay TropesStandard FPS Guns Soundtrack DissonanceInfauxmation DeskThoroughly Mistaken Identity Somebody Set Up Us the BombExample as a ThesisStalker Without A Crush alternative title(s): Fake Gunshot Permissions beyond the scope of this license may be available from Privacy Policy
http://tvtropes.org/pmwiki/pmwiki.php/Main/StagedShooting
dclm-gs1-181920000
0.036822
<urn:uuid:f1ed7d33-ecde-4974-bd42-e2cf3f7c42f6>
en
0.960096
main index Topical Tropes Other Categories TV Tropes Org Quotes: Bestiality Is Depraved Sora: Where do mermaids come from? Ariel: Well, when a man loves a dolphin more than society says he should... "His educational career began, interestingly enough, in agricultural school, where he majored in animal husbandry, until they — caught him at it one day." "Lord Melchett, Lord Melchett, intelligent and deep. Lord Melchett, Lord Melchett, a shame about the sheep." "Do you know that I walked in on my fiance trying to fuck his dog?" Elizabeth Halsley, Bad Teacher "Rick, I knew you were a vile, DISGUSTING degenerate, but bestiality?! This goes beyond my wildest dreams!" Ed Thompson, Bachelor Party Buddy Love: "Well, if it isn't Professor Sherman Klump, the inventor of Jumbo the Horny Hamster." Dean Richmond: "PLEASE!" Asif Mandvi: Larry Wilmore is a chicken-fucker. And from what I understand, the sex is not always consensual. Jon Stewart: *startled, stammering somewhat* ...W-well, I mean, to be fair to Larry... is chicken-sex ever really consensual? Bennett The Sage: What could possibly happen with two naked people? And in water! Not just any water, but warm water! Caption: Oh, I can think of fifty different things they can do. Sixty if you threw in a few otters. Bennett The Sage, sporking "Welcome To The Emo Parade." "A man goes to a psychiatrist and tells him that every single night, he has a recurring dream wherein he fucks his horse repeatedly. The shrink asks whether the horse is male or female, to which the man responds 'Female, of course! What kind of pervert do you think I am?'" — A joke "Came the day that TC fucked the chicken." The old man continued, "And see that ship out there? I've been fishing these waters for my village for thirty-five years! But do they call me McGregor the fisherman? No, no." The old man starts to cry again, "But you screw one goat." — A joke Alan Colmes: "You had sex with animals?" NH: "Absolutely. I was a fool." AC: "You had sex with animals?" AC: "Ah, I'm not so sure that that is so..." "You have no right to judge me! You weren't there! I was a stupid teenager! I was horny! And it was a really cute horse!" Ramen: The past does not define who are, but gives you a starting point for who you're going to be. Robo: Unless f**ked a sheep. Cause then you're a sheep f**ker. You really can't change that. This Art of Trolling post "There's a lot you can get out of goats, you can get cheese, you can get wool, you can get sex..." Lawyer: This is entrapment! My client was visiting close personal friends in that motel. Sgt Reed: Buddy, your client's "close personal friends" were a non-union video crew and a German shepherd! alternative title(s): But You Screw One Goat Permissions beyond the scope of this license may be available from Privacy Policy
http://tvtropes.org/pmwiki/pmwiki.php/Quotes/BestialityIsDepraved
dclm-gs1-181930000
0.027383
<urn:uuid:ef562538-e2db-4511-92c3-5386578a65f6>
en
0.919978
Diablo® III Vault getting stuck on stairs? Problem? Has anybody noticed that the skill Vault frequently gets stuck on stairs and on edges? For a good reference, check out Forces "Diablo 3 beta Let's play demon hunter" video on youtube. I can see this being the end of a few hardcore characters as they try to defensively vault away in later game, but get stuck on stairs/minor corner. If I could be so arrogant to offer an alternative, what if vault was in a straight line but followed the cursor? Also if it could go up and down stairs it would be a much more valuable asset? Your thoughts? Reply Quote Please report any Code of Conduct violations, including: Harassing or discriminatory language. This will not be tolerated. Forums Code of Conduct Report Post # written by Explain (256 characters max) Submit Cancel
http://us.battle.net/d3/en/forum/topic/3229373763
dclm-gs1-181940000
0.037769
<urn:uuid:c3a3e2d7-4bd3-4c84-b55c-d738efde33dc>
en
0.953649
Help Wikitravel grow by contributing to an article! Learn how. From Wikitravel Jump to: navigation, search     This article is a travel topic Tolls are fees charged for the privilege of driving on some roads. They may be charged on a stretch of a highway or other road, to cross a bridge or tunnel, to enter an area, or to pass some other point. The purpose of charging tolls is a form of taxation that is charged directly to the users of the service. Toll roads are found in many countries. [edit] Methods of collection [edit] Cash The original and most traditional method of toll collection is by cash paid directly to a teller in a booth. This requires the motorist to come to a complete stop to make the payment. During times of heavy traffic, jams may be created as many motorists wait their turn to pay the toll. Fortunately, technology has reduced this problem in many places. Some toll collection points require exact change if cash is to be paid. Some take coins only and don't accept paper money. [edit] Credit/Debit card Some toll plazas accept credit and/or debit cards as a form of payment for individual tolls. This is the case in Italy on all national highways. [edit] Multiple trip tickets At some toll plazas, multiple trip tickets are available. A pack of tickets can be purchased at a bulk rate that on average costs less per ticket than an individual cash payment. This is becoming less common as advanced technology has been introduced in many places. [edit] Commuter passes Some toll plazas sell commuter passes that allow for unlimited usage at that plaza. This is less common though in modern times. [edit] Windshield readers Very common today are windshield readers. The reader is tied in with an account that has a certain amount of funds. Each time a toll plaza is crossed, funds are deducted from the account. When the account goes below a certain level, funds are added, charged to a credit or debit card. Or funds can be added manually. The reader system allows motorists to pay their tolls without stopping, and sometimes without reducing their speed. [edit] Automatic tag reading On some highways, the number plates of all vehicles that cross the path of a camera are read. The toll from there is automatically billed to the registered owner of the vehicle. [edit] Stickers In some countries, all motorists must purchase a window sticker that is valid for a fixed period of time. The sticker, once on the window, allows for unlimited usage of that country's toll roads. Failure to bear the sticker results in a fine being charged to the owner of the vehicle. [edit] Toll avoidance Toll avoidance, also known as shunpiking, is the use of alternate routes to the toll roads to avoid paying tolls. Generally this is legal, since the alternate routes used are just as open to the public. But there are things to consider before avoiding the toll. The alternate route may be longer than the toll road. This may result in spending more money in gas, thereby negating any savings. And if the alternate route takes more time, this may also be a loss. Time means different things to different people. But to some people, time could be money. In many places where there is a choice between a free or a toll road to accomplish the same trip, it is not uncommon for the free road to have more traffic because most motorists would rather not pay given the choice. Getting caught in traffic could mean time, money, and gas, as well as wear and tear on your car, even when the two routes otherwise would take exactly the same amount of time. Personal tools Destination Docents In other languages
http://wikitravel.org/en/Tolls
dclm-gs1-181980000
0.022185
<urn:uuid:170e6f4f-b435-46fd-b2a6-982c457ab48c>
en
0.983036
Presidential candidates debate marriage for gay couples BY admin October 15 2004 12:00 AM ET During the last of three presidential debates on Wednesday evening, an unprecedented discussion on homosexuality and gay rights highlighted the two candidates' concurring and differing views on the issue. It started when George Bush was asked by moderator Bob Schieffer if he believes homosexuality is a choice. "You know, Bob, I don't know. I just don't know," Bush said. "I do know that we have a choice to make in America, and that is to treat people with tolerance and respect and dignity. It's important that we do that. I also know, in a free society, people, consenting adults, can live the way they want to live. And that's to be honored." "But as we respect someone's rights and as we profess tolerance, we shouldn't change, or have to change, our basic views on the sanctity of marriage," Bush continued. "I believe in the sanctity of marriage. I think it's very important that we protect marriage as an institution between a man and a woman. I proposed a constitutional amendment. The reason I did so was because I was worried that activist judges are actually defining the definition of marriage. And the surest way to protect marriage between a man and woman is to amend the Constitution. It has also the benefit of allowing citizens to participate in the process. After all, when you amend the Constitution, state legislatures must participate in the ratification of the Constitution." "I'm deeply concerned that judges are making those decisions, and not the citizenry of the United States," Bush continued. "You know, Congress passed a law called DOMA, the Defense of Marriage Act--my opponent was against it--it basically protected states from the action of one state to another. It also defined marriage as between a man and a woman. But I'm concerned that that will get overturned, and if it gets overturned, then we'll end up with marriage being defined by courts. And I don't think that's in our nation's interest." In his response, John Kerry talked about Vice President Dick Cheney's daughter Mary. "We're all God's children, Bob, and I think if you were to talk to Dick Cheney's daughter, who is a lesbian, she would tell you that she's being who she was, she's being who she was born as. I think if you talk to anybody, it's not a choice. I've met people who've struggled with this for years, people who were in a marriage because they were living a sort of convention, and they struggled with it. And I've met wives who are supportive of their husbands, or vice versa, when they finally sort of broke out and allowed themselves to live who they were, who they felt God had made them. I think we have to respect that." "The president and I share the belief that marriage is between a man and a woman. I believe that," Kerry continued. "I believe marriage is between a man and a woman. But I also believe that because we are the United States of America, we're a country with a great, unbelievable Constitution, with rights that we afford people, that you can't discriminate in the workplace, you can't discriminate in the rights that you afford people. You can't disallow someone the right to visit their partner in a hospital. You have to allow people to transfer property, which is why I'm for partnership rights and so forth. Now, with respect to DOMA and the marriage laws, the states have always been able to manage those laws, and they're proving today, every state, that they can manage them adequately." Kerry's comment about Mary Cheney drew criticism from a number of conservative sources, including Mary's mother, Lynne. During a debate-watching party in the Pittsburgh suburb of Coraopolis, Lynne Cheney accused the Massachusetts senator of pulling a "cheap and tawdry political trick" for invoking her daughter's sexuality. "Now, you know, I did have a chance to assess John Kerry once more, and now the only thing I could conclude: This is not a good man," she said. "Of course, I am speaking as a mom, and a pretty indignant mom." The vice president did not raise the matter in his remarks at the same party. In his earlier debate with John Edwards, the vice president expressed no objection when the Democrat brought up his daughter Mary. Edwards expressed "respect for the fact that they're willing to talk about the fact that they have a gay daughter, the fact that they embrace her. It's a wonderful thing." In response to Lynne Cheney's rebuke, Human Rights Campaign executive director Cheryl Jacques said, "President Bush missed one more chance to denounce discrimination last night, so it is bewildering that Lynne Cheney instead attacked Senator Kerry. Senator Kerry made clear that gay Americans should have the same basic rights, responsibilities, and protections as every other American. Vice President Cheney first discussed his own daughter in the context of this issue two months ago, and it is not surprising that Senator Kerry mentioned her experience as emblematic of millions of gay Americans. Senator Kerry was speaking to millions of American families who have hardworking, taxpaying gay friends and family members." Shortly after the debate, the gay political group Log Cabin Republicans issued a statement on Kerry's comments. "Senator Kerry could have made his point about gay and lesbian Americans without mentioning the vice president's daughter," it read. "However, this shouldn't distract us from the fact that President Bush, Karl Rove, and other Republicans have been using gay and lesbian families as a political wedge issue in this campaign. Log Cabin Republicans have a message for both campaigns. For Senator Kerry and Senator Edwards, you do not need to talk about the vice president's daughter in order to discuss your positions on gay and lesbian issues. For President Bush and Karl Rove, you have a moral obligation to stop using gay and lesbian families as a political wedge issue. Our country and our party deserve better." Tags: World
http://www.advocate.com/news/2004/10/15/presidential-candidates-debate-marriage-gay-couples-14054
dclm-gs1-181990000
0.042387
<urn:uuid:ce1219c0-a6af-4a84-9d87-4314b771635c>
en
0.90219
Your comments on ... Why Won't Supposedly Progressive Trader Joe's Sign an Agreement Not to Sell Slave Labor Tomatoes? It Will Only Cost a Penny Per Pound Trader Joe's pulls in some $8.5 billion per year, in part because of its progressive reputation. It's time for the company to sign a fair food agreement.
http://www.alternet.org/comments/story/151985/why_won't_supposedly_progressive_trader_joe's_sign_an_agreement_not_to_sell_slave_labor_tomatoes_it_will_only_cost_a_penny_per_pound
dclm-gs1-182000000
0.74018
<urn:uuid:6c00a87a-f1db-43d2-80ab-7da9093e343c>
en
0.869818
xlab3000 (Level 9) followed by | | how do you get people to follow you, how to make good threads I'm new here and sorry for the horrible threaqds I made lately where are the rules for battle threads Mandatory Network Submissions can take several hours to be approved. Save ChangesCancel
http://www.animevice.com/profile/xlab3000/how-do-you-become-popular-on-animevice/107-9794/
dclm-gs1-182020000
0.078823
<urn:uuid:3c8eec08-25a2-46e5-ba33-e4bcc142555a>
en
0.931916
or Connect New Posts  All Forums: Posts by Mrkingdavid23 so when do they start selling the new vt50 ? october 2012 ? ? Most boring bizarre conference ever ! did they showed up the tv s ? or did i fall sleep ? It is funny how my st30 looks better than my Sony hx909 . anyway to update the tv via ps3 ? changing mode to game improves the image or is it just to reduce the input lag ? so what are the best setting for the ps3 ? does game mode automatically turns on when gaming ? becuase it doesnt look too sharp I replaced the lx900 For a hx909 what a difference totally worth it over a hx820 and nx720 , should look after it and they have great prices right now . go for the hx729 better 3d perfomances but the nx720 is very nice in terms of design , and for light rooms they hx729 have that nice matte screen,the nx720 new cornering gorilla glass really glares a lot , but for that money i would buy a hx909 it blows them away in pq quality both hx729 and nx720 .just my two cents . I just purchased a 52inch 909 , i saw it together a 929 and the pq is basically the same also the 929 looks a little bit more cheap than the 909 i got it for a bargain i dont need 3d neither wifi since i stream everything via ps3 . where are some good setting for this set ? thanks , but i have to forget about the 929 due to a tight budget lol ! New Posts  All Forums:
http://www.avsforum.com/forums/posts/by_user/id/8339126/page/10
dclm-gs1-182050000
0.020636
<urn:uuid:e2c86bfa-229f-4f7c-9b82-9a5e1fff5de6>
en
0.957286
post #1 of 1 Thread Starter  Using Remote Potato on my i3 2105 based system, Win7 Ultimate, 8 gigs memory, on FIOS 35/35 pipe, I'm seeing CPU usage go up and stay up at different levels as video is transcoded and streamed out. Obviously this is a CPU-intensive task. Sometimes holding at 89%, peaking to 99%. Other times steady at 30%-75% or even stretches in the 90s. Performance is great. Streaming HD across the Internet has been working with few hiccups. Even two simultaeous HD streams to two different devices works well, with CPU near max. No doubt the chip is working hard. Temperatures, however, have not been a problem. At rest the CPU is usually around 38-42C. Under intense streaming load it elevates and stays at 50-54C, totally fine. 1) If CPU temps are under control, does running the CPU at near maximum for extended stretches present a problem? 2) If the CPU were a true quad core (not dual-core w/hyperthreading), would it handle this type of work better without pushing the CPU as much? (I'm considering upgrading to more easily handle this, as we definitely will use Remote Potato regularly.)
http://www.avsforum.com/t/1423681/two-intel-cpu-questions
dclm-gs1-182060000
0.545195
<urn:uuid:df448c0b-020f-40c4-99ad-52bc17d25531>
en
0.665593
Figure 2. Change of the proportion of the epigenetic variance over the total genetic variance (Re2) as a function of Hardy-Weinberg disequilibrium (HED) coefficients formed between the original allele and epiallele in a natural population after DNA methylation. The total and epigenetic genetic variances are calculated by assuming population genetic parameters (p, q, u, D1e, D2e, D12) ≡ (0.4, 0.6, u, D1e, D2e, 0) (allowing u, D1e, and D2e to change) and quantitative genetic parameters (a1, ae, d1e, d2e, d12) ≡ (0.4, 0.05, 0.05, 0.05, 0.05). Wang et al. BMC Bioinformatics 2012 13:274   doi:10.1186/1471-2105-13-274 Download authors' original image
http://www.biomedcentral.com/1471-2105/13/274/figure/F2
dclm-gs1-182090000
0.021696
<urn:uuid:46af6b7f-e065-4f71-b805-23168c279a62>
en
0.957186
All about Citi, Sandy, and Chuck "Citi's new act" (Cover Story, July 28) tells us that Sanford I. Weill's successor, Charles O. "Chuck" Prince, "rose through the ranks, starting as corporate counsel." Somehow that doesn't have quite the same Horatio Alger "hardship to head-of-ship" ring to it as the traditional "rose through the ranks, starting as messenger." Corporate counsel is not an entry-level position -- in anybody's corporation. Wes Pedersen Public Affairs Council As a former employee of Citicorp, I wonder why you (and others) say about Sandy Weill that he "created a global powerhouse" and "built Citigroup (C) into the world's most profitable company." The facts show that Citigroup is mainly the former Citicorp that was built by Walter Wriston, John Reed, and the senior management that worked with -- and before -- them, together with hundreds of thousands of employees. Weill merely maneuvered himself to the chairmanship of Citicorp by combining it with his Travelers Group, taking over the combination, and then selling Travelers. George Roniger Larchmont, N.Y. You say, "Chuck Prince, Sandy Weill's top troubleshooter, is the unlikely choice to become CEO. Does he have the right stuff to lead the world's most important bank?" Nice touch! How about giving the guy a chance? Is it possible that Weill and Citi's board of directors know more than BusinessWeek? Harry Pelton Palm City, Fla. I'm all for effective and tough regulation, but letting 50 attorneys general have their way with American business is not the answer ("States vs. the SEC: What's all the shouting for?" News: Analysis & Commentary, July 28). It is hard enough for a company to satisfy the Securities & Exchange Commission, the Federal Trade Commission, and the Justice Dept., and probably the European Union every time it makes a move. To have to deal with 50 states on top of that is ridiculous. The motives of the states are certainly questionable. Look at what they did with the money from the tobacco settlement. Instead of paying for health costs and antismoking programs, most states just used it to fund their spendthrift programs. Jay Goldberger New York The SEC's problem is that it is powerless to take any action that offends so-called "business groups" that own (or lease) a congressman or so. It doesn't take long for even the most impassioned enforcer to realize that there's not much upside in going after the really big bad guys or the real problems. The ability of state attorneys general to take over the role abdicated by the SEC was probably more due to their prior invisibility than anything else. Now that those who regard securities laws as an inconvenience or meddlesome intrusion on free markets know that they have another group of policemen to neutralize, you can assume that they'll be working on that project. Which will leave us with only the class action lawyers to worry the fast-buck crowd. Not exactly the guys you would hope to see with a sheriff's badge, but it's what's left. Arthur O. Armstrong Manhattan Beach, Calif. I have been amused every time a reporter or expert writes about the need for China to revalue the yuan without knowing the Chinese psyche. The latest offerings are "How China is threatening a global recovery" (Economic Viewpoint, July 21, North American Edition) and "Should China revalue? Soon, it may have no choice" (International Business, Aug. 4). The yuan was pegged at 8.28 to a dollar, and it was not an arbitrarily chosen number. To the Chinese, 8.28 sounds like "prosperity brings more prosperity." So far, it has been true. So why bother to change something that has worked extremely well? Imagine if it were to revalue and double its value, to 4.14 to a dollar. This would just be terrible, because 4.14 sounds like "die, and die once more." James S. Ang Florida State University Tallahassee, Fla. Is Jeffrey Garten seriously asking another country to revalue its currency, hoping it will sort out the U.S.-EU-Japan mess? China is already helping the U.S. dollar by having the world's second-largest foreign-exchange reserve of $347 billion. In other words, Garten suggests that China should revalue in a big way, then watch foreign investors flee, ignore the resulting crisis in China, and keep its dollars locked away. Bouko J. de Groot Hengelo, The Netherlands Jeffrey E. Garten is wrong. Americans should be glad that China is suppressing the rise of its currency, and the Chinese people should be angry. When market prices indicate that, for example, a project is unprofitable, investors naturally stop investing in such a project. Otherwise, factors of production such as land, capital, and labor would be wasted. Every government manipulation of market prices is a step toward economic breakdown and chaos. Land, capital, and labor that are invested in the exporting business in China because of suppressed currencies have changed the economic structure in China and are malinvestments, and Americans are getting something free. You don't need to export anything to pay for this "extra importation of Chinese products." Bjorn Lundahl G?teborg, Sweden General Mills Inc. (and others) should eliminate the cereal box and replace it with a plastic bag ("Thinking outside of the cereal box," Management, July 28). This would save a third of the bulk, reduce shipping costs, save storage space and restacking time, and reduce the retail price to the consumer. I suggest that General Mills start leaving the box out of their thinking and bag it! W.H. Mayfield San Diego General Mills Chief Technical Officer Randy G. Darcy really needs to focus on is the implementation of his benchmarking "discoveries." Minneapolis is teeming with companies effectively implementing lean manufacturing, theory of constraints, Six Sigma, and other enterprise-wide improvement techniques. Less focus on "discovering" big ideas and more on execution of good business practices might serve General Mills a whole lot better. And although it doesn't compare to a company-paid junket, achieving sustained, double-digit productivity gains is actually pretty fun. Bill Rose Minneapolis I read with great interest your profile on GE Transportation Systems President and CEO Charlene Begley ("Crashing GE's glass ceiling," People, July 28) and also the results of the survey ("The mommy ladder," Dividends, July 7) that reported that 71% of full-time working mothers don't feel they've had to sacrifice job advancement as a result of motherhood. I suspect that most of the respondents in that survey had something in common with Begley: a supportive husband. For the many of us who are single full-time working mothers, the story is much different. Please give us a more realistic example. Lesley Bass Montgomery, Ala. "Crashing GE's glass ceiling," while very well written, took an undeserved swipe at Erie, Pa., and cities like it. Erie is a solid community and home to thousands of hard-working people, good companies, universities, teaching medical facilities, seven miles of sandy beach, and houses you can afford. Erie is not "bleak" by any stretch of imagination. Kevin J. O'Connell Erie, Pa. "Inside Wall Street: A report card" (Finance, July 28) seems overly generous to Gene Marcial's stockpicking prowess. The initial price that you use is from the close on Thursday prior to the article being available. Should you use the opening price on Friday, or an average price from Friday, the results would be considerably worse. No doubt in the area of 2.8% worse (the average first-day gain). Marc Jacobs Poway, Calif. Marcial is actually a major cause of the one-day advance, and the best way to use his recommendations is to short the stocks he recommends after the first day of artificial gains and ignore the ones that don't go up that first day. Arthur M. Field Easley, S.C. Radio frequency identification (RFID) technology is not remotely close to providing the individual product tracking suggested in "Bar codes better watch their backs" (News: Analysis & Commentary, July 14). Each retail shelf would need a reader costing hundreds of dollars. Manufacturers won't want to add 10 cents to each item they sell. The frequency in question, 915 MHz, operates at several meters of range, which makes moot the suggestion that this technology may be used during cashier checkout. Wal-Mart Stores (WMT) Inc. will be attempting to tag pallets, bins, and totes that come and go from their warehousing and distribution facilities -- identifying larger quantities of items, not individual toothbrushes. James E. Heurich, President Aurora, Colo. The Epic Hack (enter your email) (enter up to 5 email addresses, separated by commas) Max 250 characters blog comments powered by Disqus
http://www.businessweek.com/stories/2003-08-24/all-about-citi-sandy-and-chuck
dclm-gs1-182160000
0.031979
<urn:uuid:25700521-d9d2-4ebb-8c27-ef72aaf3dba5>
en
0.968413
General Motors, the humbled auto giant that has been part of American life for more than 100 years, will file for bankruptcy protection on Monday in a deal that will give taxpayers a 60 percent ownership stake and expand the government's reach into big business. Sign Up For Traffic Text Alerts GM president and CEO Fritz Henderson planned to hold a news conference in New York immediately following Obama's announcement. Administration officials said late Sunday the federal government would pump $30 billion dollars into GM as it makes its way through bankruptcy court. That's besides the $20 billion in taxpayers' money that the Treasury already lent to the automaker. The $30 billion is to help GM through the Chapter 11 proceeding and move it through its restructuring plan. It doesn't have the money to run the business right now. The money would come from what remains of the $700 billion rescue fund for the financial sector. The officials, speaking on condition of anonymity in advance of Obama's public remarks, said the administration expects the court process to last 60 to 90 days. If successful, GM will emerge as a leaner company with a smaller work force, fewer plants and a trimmed dealership force. The company will stick with its four core brands - Chevrolet, Cadillac, Buick and GMC - and jettison four others. "There is still plenty of pain to go around, but I'm confident this is far better than the alternative," Sen. Carl Levin, D-Mich., said Sunday after being briefed about the developments by the president. "It's a new beginning, it's a rebirth, it's a new General Motors." The day to day operations will be carried out by GM's management. But a majority of the board of directors will change and the administration will have a hand in helping select them. "Our goal is to promote strong and viable companies that can quickly be profitable and contribute to economic growth and jobs without government involvement," a fact sheet issued by the White House and the Treasury Department said. Still, it was Obama who ordered the firing of former GM CEO Richard Wagoner a month ago. And it was the Obama administration that instructed GM to trim itself to a point that it could break even by selling 10 million cars a year. It's current break even point is 16 million cars. Even as the White House stressed that it would run the day-to-day operation of the car company, the arrangement was fraught with potential conflicts. The Obama administration has proposed tougher fuel efficiency requirements that GM will need to abide by and has pumped billions into the auto company's lending arm and assured consumers that it will backstop GM warranties.
http://www.courant.com/news/wpix-gm-bankruptcy-060109,0,3349204.story
dclm-gs1-182220000
0.423984
<urn:uuid:e2adb565-3e8d-4cd3-aa9e-699709fe5316>
en
0.843827
Link Details Link 175882 thumbnail User 219636 avatar By martinig Published: Apr 21 2009 / 18:47 very developer eventually encounters it at some stage in his or her career – the code that no one understands and that no one wants to touch in case it breaks. Sound familiar? But how did the software get that bad? Presumably no one set out to make it like that? The answer is that the software is suffering from Software Erosion – the constant decay of the internal structure of a software system that occurs in all phases of software development and maintenance. Learn how to fight this. • 10 • 0 • 2426 • 0 Add your comment Voters For This Link (10) Voters Against This Link (0) Spring Integration Written by: Soby Chacko Featured Refcardz: Top Refcardz: 1. Search Patterns 2. Python 3. C++ 4. Design Patterns 5. OO JS 1. PhoneGap 2. Spring Integration 3. Regex 4. Git 5. Java
http://www.dzone.com/links/when_good_architecture_goes_bad.html
dclm-gs1-182310000
0.023918
<urn:uuid:b19c12b9-42c4-45e1-9fd0-ded61b13a1ba>
en
0.957833
Arthur Frommer reportedly takes back brand from Google, will keep guidebooks going The tale of Google and Frommer's famed travel guides has taken another twist this evening. Associated Press writer Beth Harpaz reports Arthur Frommer confirmed over the phone that he has retaken control of the brand from Google, and plans to continue publishing them in e-book and print formats, as well as maintaining the website. This comes after Google acquired the brand from publisher Wiley in 2012, followed by's revelation last month that it apparently intended to shut production of the books down. We're told by a Google spokesperson (check after the break for the full statement) that it has integrated the content acquired from Frommer's and Wiley into its products including Google+ Local, but returned the brand to the founder and will continue licensing "certain content" to him. Why things took this circuitous route right back to the man who started it all back in 1957 is unknown and terms of the agreement were not disclosed, but we're sure fans of the budget travel how-tos are happy to see Frommer's keep going. [Image credit: Frommer's, Facebook] We're focused on providing high-quality local information to help people quickly discover and share great places, like a nearby restaurant or the perfect vacation destination. That's why we've spent the last several months integrating the travel content we acquired from Wiley into Google+ Local and our other Google services. We can confirm that we have returned the Frommer's brand to its founder and are licensing certain travel content to him. Arthur Frommer takes brand back from Google, will keep guidebooks going
http://www.engadget.com/2013/04/04/arthur-frommer-takes-back-brand-from-google-will-keep-guidebook/?ncid=rss_semi
dclm-gs1-182350000
0.480756
<urn:uuid:55206385-345f-43b2-a03b-d514ff7aff5e>
en
0.929395
Sea and Space SeaSpace Consortium Sea and Space / Navigation / Astronomical Local Noon For many centuries, it was a very difficult task to measure accurately the geographical longitude. In order to measure our own (local) longitude, we must use the Sun. Before doing so, however, we must discuss the concept of time indication that is known as "Local Noon". Finding your "Local Noon" "Local Noon" occurs when the Sun is seen exactly in the South direction.   [GIF, 3k] Strictly speaking, "Local Noon" is the exact time when the Sun reaches its highest point in the sky. This is also the time that it crosses the vertical, imaginary line, that astronomers call the "meridian". 1. The above drawing shows the path of the Sun in the sky on a certain day and at a certain geographical location during wintertime. When does the Sun rise? When does the Sun set ? 2. The half-way point between sunrise and sunset indicates the middle of the day, that is "Local Noon". Calculate this average from the drawing above. What is the time of Local Noon in the situation above ? Top page
http://www.eso.org/public/outreach/eduoff/seaspace/docs/navigation/navastro/navastro-4.html
dclm-gs1-182370000
0.900753
<urn:uuid:c3bd606c-c8c6-465a-baa3-f4973fc1cbb9>
en
0.816722
Think of a character from any Fire Emblem #31Capitan_KidPosted 6/24/2013 5:28:48 PM Nowi is my mom?! But she's my waifu! Official Husband of Nowi #32FeMUPosted 6/24/2013 5:37:55 PM So does that mean Geoffrey's my dad? Because I am totally okay with this. Female Avatar, wife of Chrom, and Ylisse's master tactician. #33emblemmaster99Posted 6/24/2013 5:38:44 PM pikachupwnage posted... Slicey_Dicey posted... Excellus......I'm not sure what Excellus is so does that mean it replaces both my parents? Excellus is implied to be a eunuch. Which implies you wouldn't exist Win if you can, lose if you must... But cheat ALWAYS #34Rockstar_BobPosted 6/24/2013 6:31:38 PM Ephraim is now my dad. ...Well, Either way, He's going to be absent for a good bit of my life. -_- Will not change sig until the world ends. Started 1-19-10
http://www.gamefaqs.com/boards/643003-fire-emblem-awakening/66551504?page=3
dclm-gs1-182470000
0.630393
<urn:uuid:85c062a1-a81d-4fb5-9227-d5d392cf9def>
en
0.804815
Assuming that Kid Icarus is an Ambassador game... #1Lord_FroodPosted 8/28/2011 11:14:03 PM How will we lower the shop prices? ;_; "Satellite from days of old, lead me to your access code!" - Radical Ed Petitions annoy me. #2MarioFanaticXVPosted 8/28/2011 11:30:42 PM You could just beat the game legitimately. Dynasty Warriors 5 w/Xtreme Legends Progress: #3marsgreekgodPosted 8/29/2011 12:29:49 AM Is there some glich in the nes verson? #4stonio99Posted 8/29/2011 2:33:15 AM I want to abuse save states to put Mr. Poverty into poverty. Everyone has to have a taint. It's anatomically required. ~Vork - "The Guild"
http://www.gamefaqs.com/boards/997614-nintendo-3ds/60164640
dclm-gs1-182480000
0.721968
<urn:uuid:989e961b-990f-4e37-948d-4d6c4e10ef10>
en
0.950592
Final Fantasy Tactics Auto Battle FAQ By: Brendan Byrd/SineSwiper <> Version: 0.96 (February 23, 2003) (Please e-mail me at the above address for any comments, questions, additions, or corrections.) Table of Contents 1. What is the auto-battle feature and why use it? 2. The Basics a. Auto-battle commands b. The Pause button c. Priority and Offensive vs. Defensive Classes 3. Test Conditions 4. Normal Classes a. Squire b. Chemist c. Knight d. Archer e. Monk f. Thief g. Geomancer h. Lancer i. Priest j. Wizard k. Oracle l. Time Mage m. Mediator n. Summoner 5. Advanced Classes a. Dancer b. Bard c. Samurai d. Ninja e. Calculator f. Mime 6. Special Classes a. Squire (Guts) b. Holy Knight c. Dark Knight d. Divine Knight e. Holy Swordsman f. Engineer g. Heaven and Hell Knights h. Worker 8 (Work) i. Temple Knight j. Dragoner k. Soldier l. Byblos 7. Special Quirks a. Last Man Standing b. Gotta Train Them All! c. Scared Critical Characters d. The Teleport Ability 8. Credits The auto-battle command is a little-used feature in FFT that uses the in-game AI engine to control your characters, along with a little bit of control on how they act. Many people are afraid of using an auto-battle feature in a advanced tactical game like FFT, because they think it's too simplistic. In fact, because it uses the same AI engine that is kicking your arse on the enemies' side, it can be a valuable tool and time-saver... long as you know how to use it. That is the purpose of this FAQ: to explore the various classes on how they behave with the engine. Yes, you do lose some of the fine-tuning and control with the AI engine, but you'll discover that sometimes the AI is smarter than you and can figure out things 100 times faster than you can. Imagine a calculator that can figure out the best number combo to kill your all enemies in one turn...and it figures all of that out in 5-10 seconds. Using the auto-battle feature isn't cheating (in my book) and it doesn't take the fun out of the game, but I do recommend beating the game once before trying it out. (In fact, I don't recommend reading ANY FAQ until you beat the game once.) However, it is a fun challenge to go through the entire game using (mostly) auto-battle. 2. The Basics a. Auto-battle commands (Since these commands are pretty badly translated and long-winded, I've included CAPITAL abbreviations that I'll use from now on.) Manual - This is what you're used to: human controlled by you. You can switch by from auto mode by selecting Manual. Please note that if you act and don't move, or visa-versa, and then select an auto mode, it will complete the rest of the turn for you. Fight for life (FIGHT) - This command accepts an enemy target and goes after it. Like all modes, it won't blindly go after it, if it takes multiple turns to move to a spot where it can attack the enemy. Your character may decide to cast some spells on allies (which I generally refer to as "if it's bored"), or attack other and closer enemies, while it moves to the target. Later on, when it's in range, it focuses on the target until it's dead. Run like a rabbit (RUN) - This is more like "Run like a chicken", if you've ever seen a <10 Brave character turn into one. Your character will run to the nearest corner, where there is the least amount of battle. However, like I said with FIGHT, this doesn't mean that it won't act. It may cast a spell on an enemy before it flees and/or pump itself up (like Accumulate). If it's backed into a corner with enemies, it'll fight, as long as it doesn't change its movement pattern. Protect allies (PROT) - This command will accept a friendly target and protect it. "Protect" has a number of definitions in this case. It may find a close enemy that is potentially threating the target and try to kill it. It may heal the target if it needs it. It may also revive a dead target. Or it may cast support magic on the target. The AI will choose the best option, to keep the target alive, in good health, and nearby. Additionally, if you tell it to protect itself, it'll buff itself and make sure it's in decent health. A PROT on itself is sorta like RUN, except the movement pattern isn't as fearful. Save fading life (NORM) - This really should be called "Normal auto-battle mode", as this is more or less a default mode the AI falls in. This is a combination of FIGHT and PROT, where it chooses the best option (usually) for the job. This is what you should start out with, when you first start battle. If you need a more urgent or direct command, you can switch to one of the others later. Also, this is the default mode when the character kills a FIGHT target, even though the mode is still technically set to FIGHT. (If the target happens to come back to life, it'll come right after him/her again.) b. The Pause button The pause button is very important. It's the top green triangle button on your controller. Whenever the game is in an auto mode, you can hit this to get your bearings, check the status of various characters, check your AT, or change AI commands on your characters. When you hit it in the middle of a character's turn, it will WAIT UNTIL ITS TURN IS COMPLETE! This is important, as you have think about if you need to change something BEFORE the character's turn comes up. If in doubt, hit the button and you can unpause afterwards. (The correct usage of the pause button is to hold down or turbo the blasted thing. Sometimes it'll give you a ding to acknowledge that it's going to pause after the character's turn and then just zip on by. If you keep pressing the button, it'll stop for you every time.) When the game is in pause mode, every menu will have an End option. Hit End to unpause the game. You can actually pause the game even if all of the characters are in manual mode, in case you need to check on an enemy's stats before its turn comes up. c. Priority and Offensive vs. Defensive Classes Every time an autoed character's turn comes up, the AI engine considers all of its different actions, weighs them, and figures out the best option for its auto-battle command. Of course, this is much like how you think, but there's a fairly definate pattern to the AI's priority. Here's a rough list on priorities (in order): 1. Reviving a dead ally 2. Healing a critical ally 3. Casting Haste or raising Brave (?) 4. Charming an enemy 5. Killing an enemy (including petrify) 6. Causing damage to the enemy 7. Healing a damaged ally 8. Defensive spells/abilities Keep in mind that this is a very rough list. When you throw in percentages and amounts of HP, the list gets really hazy. For example, healing 200 HP may have a higher priority than a 5% chance of killing an enemy. Also, many defensive abilities may not be used while in RUN mode, but others do (such as Haste and Accumulate). But, in general, this is how it works. Therefore, your weapon and your two skills on the character are important. Since offensive abilities generally overpower the defensive ones, you want to make sure that you have at least one offensive skill set to offset any offensive abilities in a defensive skill set. For example, a Priest with his poor stick and no secondary job will spend his time casting Holy on every living creature, and casting Cure 4 or Raise 2 on every undead one. These spells take time. One flaw in the AI's priority scheme is that AT cost is not a major factor, as long as the target is definately going to get hit (using the Unit lock). (Exceptions are spells like Meteor or other super-slow abilities that have a speed below 10.) However, you set Steal as his secondary, and he will spend more time trying to charm enemies, which is an instant ability. He will still use Holy, but since he has more options (including also stealing items), it would be used smarter. 3. Test Conditions In order to research this information, I did it when I was buffed up and almost at the last boss. Therefore, this research is based on classes with all of the skills mastered. You may have somewhat different results if you have non-mastered characters, but it more or less turns into the same thing. (If you like to contribute some data or strange quirks on the non-mastered classes, feel free to e-mail me about it.) Also, on most of this, I've switched the character to the primary class and removed the secondary, so that I get a "pure" look at how the class acts. Sometimes though, I may add a secondary, or switch the class to a secondary to see how they interact. Obviously, I don't have enough time or patience to completely test out every single combination, but once you understand how the AI engine behaves, you can get a feel for which classes and actions it I'm also not going to give a run down on how every monster acts because, one, they usually only have a few skills, and two, you see them in action all the time, anyway. 4. Normal Classes (Some may notice that I use the word "it" to describe the character, since I am refering to the AI engine, and not characters or classes themselves.) a. Squire The Squire is a pretty basic class, with a pretty basic AI. If set to RUN (or if it's bored), it'll start using Accumulate on itself. Otherwise, it will either attack with its weapon, if in range, or use Throw Stone, if outside weapon range. It may use Heal on a friendly, if it feels that the affiction is serious enough. I've never seen it use Dash, as my weapons were much better than the damage it causes, but judging from how the earlier enemies used it, the AI may try to use Dash to push an enemy off a ledge and try to cause fall damage. My guess is that if the Dash + fall damage is less than the weapon damage, it doesn't bother with it any more. Overall: A+ [There's not much to a Squire, and there's not much to screw up, so you should trust in the AI, and just let it do its thing.] b. Chemist Like the enemy AI, the Chemist does good at its job. It heals, it revives, it fixes ailments, it shoots/stabs enemies. It'll even toss a Phoenix Down to the nearest undead enemy for a quick kill. Combined with a good offensive secondary, the Chemist does a good balance between healing allies and banishing enemies. One big thing: it is wasteful with the Elixirs. It won't toss one just to heal 30 HP (as a Potion does that job just as well), but if you're down by 200 HP, it'll use one. If it revives somebody using a PD (with the pathetic 11 HP recovery), it'll use an Elixir afterwards (for higher-level 250+ HP characters, of course). It'll even toss one to an undead enemy, even though PDs do the trick just as well. Overall: B+ [If you value your Elixirs, you may want to manually control the chemist. Otherwise, if you don't have any Elixirs, don't have the ability researched, or simply don't care about them, the Chemist works well.] c. Knight The Knight, like the Squire, will bash its sword on the first enemy it sees, though it does like tearing into a mage's cloth best. Most of the time, it doesn't use the break skills too often, if a more powerful sword slash works better. However, if you have a semi-weak weapon, or use Equip Gun, it tends to start breaking stuff more often. Because of the odds, the Knight likes to break the helmet first, and then it'll go after the weapon. However, if the situation demands a weapon break, such as when an archer is charging, it'll go for it right away. I've never seen it use a Magic/Speed/Power/Mind break, and that's probably for the better. Except for certain special situations, they usually suck. Overall: A- [Kinda wish it broke things more often, but statistically, it's probably better to just kill the enemy fast, rather than roll the dice each time.] d. Archer Let's face it: using the bow properly is awkward, especially on flat land. Since moving to a location is permanent, it's really annoying when you try to guess where to move your character, and realize that it's the wrong spot to shoot your enemy. Well, since the enemy's archers can easily go from spot to spot, so can you! The AI will get the right shot every time. It'll even try to seek out a hill to get better coverage. Bow-handling aside, the Charge skill works well with swords, and even Ninjas with two maces. One weapon I found that the AI never charged with was the gun, however. Try as I might, my archers (or chemists) would never use the Charge skill with the gun equipped. The Archers also never use anything beyond Charge+5 because it takes too long. But, if a enemy is stuck (via Don't Move or the like), it might consider a Charge+7 or higher. Overall: A [The lack of gun-charging is kinda disappointing, but the ease of shooting with a bow more than makes up for it.] e. Monk The Monk loves to pop a far-away enemy with an Earth Slash, even in spots you didn't think existed. Wave Punch is another favorite. Next to an actual monk punch (which hurts like hell!), these seem to be the only offensive skills it uses. (After all, why bother with something like Secret Fist?) However, on lower levels, it may use stuff like Repeating Fist, if a monk punch isn't strong enough. (Heh, I know I did.) The support abilities are used quite well. Chakra on allies that need healing, and Revive on the dead. It will also use Stigma Magic if somebody really needs it. Overall: A+ [A good well-balanced class also comes with a good well-balanced AI.] f. Thief The Thief mostly does what it does best: stealing. It will almost exclusively charm the enemies it can, and steal items from the ones it can't. If the enemy can't be charmed, there's about a 50/50 chance on if it'll stab the opponent in the back (literally), or if it'll start to steal items. Like the Knight, it'll start at the head first, then the weapon. And like the Knight, it'll steal a weapon immediately, if the enemy is charging. That part of the AI seems to follow the same mechanics. Overall: A [The AI puts a priority on charming, which is more or less what I did anyway. Too bad I can't tell it to steal all of the Genji stuff for me :) ] g. Geomancer Hey, what's there to tell about the Geomancer AI? If (distance = far) then use Elemental. If (distance = close) then use weapon. It also tends to favor Elemental if it's going to hit multiple enemies. I don't think the AI tries to use one ground or another, as they are all the same damage, anyway. As far as non-mastered classes, it might actually affect how it moves, but I don't know for sure. Overall: A+ [Like the squire, it's a simple class that isn't easy to screw up.] h. Lancer Ahhh, the Lancer. No more trying to figure out if the jump is going to land on time or not. (I curse Square for not putting an AT plotter for this skill!) It always jumps on time, or it may favor a direct lance blow if the damage is right. Overall: A+ [Need I say more?] i. Priest Like I implied in section 2c, the Priest doesn't work great with its single skill. Yes, sometimes it'll heal your friends, but this Priest is mostly a daring and offensive little boy. Unless you tell it to RUN, it'll march right into the frontlines. However, give it an offensive secondary skill, or even Time Magic, and it'll behave better, because it has more to choose from. Don't get me wrong: the AI will use White Magic for Walls, Protect/Shell 2, and healing people, but it seems to put a priority on doing 400+ HP of damage with Hey, why not? That DOES hurt a lot, doesn't it? Well, it does seem to waste too much time on the low-speed spells, when there's 4 different baddies nearby. This is because spells like Raise 2 and Cure 4 are slow (both with a speed of 10). If you give it a Summon Magic secondary (or primary), it'll ditch Cure 4 in favor of Fairy (speed 25). It'll still use Raise 2 and Holy, but will also use the summons for multiple enemies. Overall: B- [A little bit more care in how you choose your secondary is required for using the AI for this class. Really, most of the secondaries work well, but you may want to experiment with it. Again, refer to section 2c.] j. Wizard Like the Priest, the Wizard can have problems with using too many low-speed spells, but since the Wizard -IS- an offensive class, it has more bang with all of that time it used up. The Wizard likes Flare, but it also like Death quite a bit (with a 1/3rd of the MP of Flare), as well as the Fire/Ice/Bolt 4 spells. However, it cares more about hitting one enemy with a lot of damage on a low-speed spell (like a unit-focused Fire 4), rather than hitting several enemies with somewhat less damage on a higher speed spell (like a Fire 2 or 3). It also has a big problem with using multi-ranged spells (Fire/Ice/Bolt) on enemies, locked on with Unit, who move to the nearest ally and the Wizard ends up nuking both of them. Priests don't have that problem because Holy is a single unit spell. Short Charge is definately a good idea for the Wizard. Overall: C- [The Wizard wouldn't be too bad if it wasn't for the unit-locking slow-spell problem. This is a flaw I abused in the enemies' AI engine that carries over here. Unfortunately, this means you'd have to have a few Chemist/Priests handy.] k. Oracle If there's one thing the AI engine is good at, it's at dealing with status effects. I was starting to lose my faith in the AI's ability to handle mage classes, until I saw how it plays an Oracle. It dishes out the status effects properly: Darkness on physical attackers, Confuse, Petrify (casts this quite a bit), Berserk, Paralyze, Life Drain. It seems to use all of Yin Yang spells, and use them effectively. It will even cast Innocent on an ally to avoid a charging spell, or Faith to enhance a Cure spell. (If it's bored, it'll cast Faith anyway.) If all the other options seem to be too low on percentages (or just not worth the effort), it won't be afraid to go up and use that unusually-high damaging stick of his, to take off a quarter of the enemy's health and no counter to himself (due to the range). Overall: A [Watching the autoed Oracle play has made me realized how badass an Oracle can be.] l. Time Mage The Time Mage put extreme amounts of priority on Haste, which is a good thing. Though, since the other group members may start moving out of the way, it'll only get 1-2 allies at a time. Assigning RUN will -still- cause the Time Mage to cast Haste on allies. (It's unusual for a mage-class to use up MP while in RUN.) So, if they are in a corner, giving everybody a RUN command for a turn or two will ensure that everybody has Haste in a reasonable amount of time. As far as the other spells, it uses them pretty well. It favors doing damage with spells like Demi 1/2, as well as some of the effect spells like Don't Move. The Time Mage is also not afraid of dropping a Meteor on a foe who's stuck, smashing any enemies that wander in its massive range. Overall: B+ [The Time Mage manages itself well. High-priority on Haste ensures a good advantage over the enemy.] m. Mediator The Mediator generally plays as expected: shooting its gun, and using its skills to distract the enemy. Since raising Brave is such a high priority, it will use Praise every chance it can muster: when it's bored, on RUN, or any "extra" turn. In general, this is a good thing, but it doesn't like to use Preach, though, probably because of the risk of 95+ Fa (which causes a member to leave permanently after battle). It will sometimes use Solution to lower Faith on a physical class, but this happens rarely. As far as the "offensive" skills, the main ones it uses are Death Sentence (anyone), Insult (mainly mages or classes/monsters with damaging skills), and Mimic Daravon (anyone especially on multiple targets). Beyond that, I've never seen it use Invitation and Persuade, which is disappointing, as these are good skills. (I think it doesn't like the low odds on those However, with the exception of Praise, these skills are usually over-shadowed by better offensive abilities with most secondary skill sets. (Why use Insult when you can cause damage?) If you want the Mediator to use more of its skills, try a (very) defensive skill set, such as Item. Overall: C [The Mediator plays decent, but the lack of Invitation/Persuade hurts its grade. Also, using Praise over and over again gets kinda annoying.] n. Summoner Summoners work very well. They seem to drop the damage in the right places. Since their spells are fast and they only affect enemies/allies, they don't suffer from the problems that Wizards (and Priests) have. Though they do have some minor issues that I'll address: No Golem - Golem is probably the best summon in the game, if not one of the best spells in the game, and the Summoner doesn't even bother to use it, even if it's faced with nothing but physical attackers. Casts Carbunkle - Usually, I would consider this to be a waste of a turn and MP. I don't use Reflect, because most of the major spells punch right through it. On the plus side, the AI engine seems to use Reflect to its advantage to bounce off reflected allies and attack enemies that are normally out-of-range, which ends up being a neat effect. Drains MP - Summoners tend to drain massive amounts of MP, so you may want to use Half MP or equip some Chemists with Ethers. Overall: B+ [The lack of Golem is disappointing, but you can manually cast this spell on the first turn, and turn them loose afterwards.] 5. Advanced Classes a. Dancer The Dancer does Wiznaibus. Since this is the only damage-based dance, that's all it does. If there is a secondary with higher damage, it will use that instead. Unforunately, the Dancer doesn't realize that doing Nameless Dance is a lot more effective than causing 17HP of damage once a Overall: D [The AI engine more or less sucks with this class, though the best thing to do is start a Nameless Dance and set it to RUN, anyway.] b. Bard The Bard, unlike the Dancer, fairs a lot better at using its skills. It starts out doing Nameless Song or Cheer, and will switch songs if somebody is low on HP/MP, or if the situation demands it. It's not afraid of using its harp if the damage is right. However, if you have an offensive secondary, it may start using its offensive skills, instead of singing. Overall: B [Sometimes it's better to just stick with one song, but the Bard uses its skills properly. If you want just one song, start singing it manually, and set it to RUN.] c. Samurai A Samurai will attack more often than it should, in my opinion. I consider the Draw Out skill to be one of the best support skills in the game, though it likes to use its many attack skills. It -does- use the support skills (like Kiyomori), so that part is not a total loss. It will also use Murasame, if its allies' HP is low. Unforunately, it's not afraid of using your rare katanas, either. (Square, casts Haste, which is a high priority for the AI engine. Overall: B- [Equip your Masamune to protect from lossing it early in a battle. Even then, I wish it would use Kiyomori more often. Like the Summoner, the best thing to do is to use Kiyomori on everybody and set it to NORM.] d. Ninja The Ninja is awesome! Not only is it a badass class, the AI knows how to use them, too. It'll attack up close, and throw items from far away. Generally, it will stick with the ninja stars and elemental balls. Best of all, it WON'T THROW OUT YOUR RARE WEAPONS! So, no fear of your Excalibur flying in the air just for an extra 20HP of damage. Even smarter, it will consider a weapon to be "not rare" if it's after a certain number. For example, I bought a bunch of Octagon Rods to total 13 in my collection, since the Octagon Rod does more damage than the Yaguu Darkness. When the Ninja played next, it starting throwing a few Octagon Rods. So, if you have the money, you can stock up on non-standard throwing items and let them use it to your advantage. They are also excellent trainers. (See section 7c for details.) One thing to point out: the Ninja is a VERY offensive class, so using defensive secondaries is probably not a good idea. However, it does seem to work well with Item, since reviving dead allies is highest on the list. Overall: A+ [Dishes pain and kicks ass!] e. Calculator The Calculator's AI is more or less the entire basis of this FAQ. This is the class that made me discover how well the AI handles itself. With the AI engine, you don't have to spend 5-10 minutes trying to figure out the best combination to use, because it does it for you in 2-10 seconds. When set to FIGHT, it will find the best combo to eliminate your target. However, this also means that if it doesn't find a combo that hits the target and doesn't hit an ally, it will use one that hits the target and DOES hit an ally. On cases like this, it will find the one that hits the least number of allies. However, DO -NOT- use PROT mode with a Calculator! For some reason, it will do strange stuff like cast CT5 Blind Rage (ON EVERYBODY), instead of doing what you want, like casting Haste on the allies. You can use this to bring an ally back to life, but NORM seems to do this anybody. The spell of choice for the Calc is Holy, even though Flare has a shorter animation, but of course, the AI engine is not going to factor animation speed for that sort of thing. (This can be a good thing for allies with Holy healing items on.) It will detect what items are on your allies and enemies that prevent status effects. For example, if all of your allies have Angel Rings (which prevent Death), it will cast CT5 Death a majority of the time. Undead enemies drop like flies with spells like Raise and Cure. It will even Raise/Cure allies and kill undead at the same time. Since the Math Skill is such a high-powered skill, the secondary is ignored, except in VERY special circumstances. Overall: A++ [If used properly, the AI Calculator saves a helluva lot of time!] f. Mime The Mime really only has one ability, which is attack, so it go forth and attacks. What is special about the AI engine with Mimes is not what the Mimes do, but what everybody else does. Physical classes don't seem to pay attention to the Mime's ability much, even to the point of causing the Mime to slash a sword in the back of an ally. However, it does work pretty well with mages. The mages seem to know where the mages are and dishes out double/triple damage to enemies with them. Samurais will use them effectively, too. Calculators use them the best. Calcs will adjust their spells to lower or higher grades, since it knows the spell will hit twice. For example, it may use Fire 3, instead of Holy, since double damage is enough to kill the target. Or it might use Raise 2, instead of Raise 1, since there's a better chance of raising with full HP (or killing undead), when it's casted Overall: D+ [It might be best to put the Mimes on RUN, and use non-direct skills, such as Calcs, Bards, and Dancers. Even without that, it still fares pretty well with mage skills, but its fearless behavior might get it killed.] 6. Special Classes a. Squire (Guts) Ramza as a Squire works much like a normal Squire, except with more abilities, which the AI engine takes advantage of. When it's bored, it will cast Yell or Cheer Up to increase speed and brave levels. Wish will be used on allies with low HP, and it's not afraid to cast Ultima, either. However, despite being an awesome ability, it'll never use Scream, favoring abilities that raise levels on other allies. Overall: B+ [Works as normal, but the lack of Scream hurts it a lot.] b. Holy Knight Agrias prefers to use Lightning Stab most of the time, because of the range, but it will also use Holy Explosion up front, because of the damage. Sometimes, it likes to use Crush Punch if it's faced with an enemy with high HP (since it may trigger an instant death). Overall: A+ [Not very many skills, so it's not hard to use.] c. Dark Knight (I have not actually field tested this with Gafgarion, but with my experience the Thunder God, guest/enemy mode on Gafgarion, and the fact that we are only talking about two skills, I think I can make an accurate assessment of how the skill works.) Gafgarion uses Dark Sword. Gafgarion does too much damage to use Night Sword on mages, so it does Dark Sword over and over again. Overall: A+ [Duh...Dark Sword. Next?] d. Divine Knight Since Meliadoul's skills only affect humans, it will only use it on humans. When faced with a human enemy, it will attack the armor first and then the weapon. (I'm not sure what happens after that, because the enemy usually ends up dead at that point.) Also, like the Knight, it will hit the weapon first if it will deny an attack, such as a Charge skill. On monsters, it will use its regular attack (obviously). Overall: A [I'd prefer weapon then armor, but the enemy is dead in two hits anyway.] e. Holy Swordsman Orlandu, of course, uses a combination of all three of the Knight skills. As such, the AI engine works the same way: Dark Knight skill if it needs healing. Divine Knight skill if the enemy is human. Holy Knight skill otherwise. Overall: A+ [As if using a character that kills most enemies in one hit requires that much skill anyway...] f. Engineer With only three skills, Mustadio fairs well in battle. The aim skills are pretty high on the priority list, leaving your other members the job of cleaning up defenseless enemies. It will mix up between Arm and Leg Aim, though it favors Leg Aim on enemies with no high-range ability, so that your left with an enemy who can't move AND can't use any abilities. With the undead, it uses Seal Evil with a passion. Overall: A+ [Probably more effective than you are.] g. Heaven and Hell Knights Sadly, at the writing of this FAQ, I had ditched these two characters, because the game limits you to 20 max, and this were currently the two most worthless characters in the group. Actually, these characters still ARE the more worthless characters in the game. (Somebody burned a village for their powers?! Why didn't anybody burn a village for a Calculator's I may get to them on another run through the game, but I'm sure you've seen how pathetic they play when they are on Guest or Enemy mode anyway. Anybody using these characters are using them out of pity or just to make the game hard. h. Worker 8 (Work) Worker 8 uses its skills the way you do: Dispose 90% of the time, and the other skills when it gets close. There is not much to using the Work skills, anyway. Overall: A+ [Even simpler than the Squire class.] i. Temple Knight Beowulf uses his abilities much like an Oracle, with priority on Break. However, try as you might, he will never use Shock. It's pretty disappointing, because this is such a high damage spell. Overall: C+ [Not bad, but the lack of Shock hurts its grade big time.] j. Dragoner One would think that a Dragoner would use its Dragon abilities on dragons. Not so with the AI engine. Like many other unusual skills, if the skill isn't expected to be used by the enemy or guests, Squaresoft won't factor it into the AI engine. Therefore, Reis doesn't use ANY of its Dragon skills, not even Dragon Tame. A few pluses: it does use Holy Breath to attack enemies which are normally out of range, it heals other monsters that have elemental healing using its breath, and it does acknowledge that Reis has built-in Train ability (and changes its tactics accordingly; see section 7b for details.). Overall: C- [Sure, it can defend itself, but what's the point of a Dragoner if it doesn't defend its dragons?] k. Soldier Cloud does one thing: Finish Touch. That's about it. Hey, why not? When you're guaranteed to cause Stop, Dead, or Petrify, there's really no reason to try to "cause damage". (Pffft...damage? That's the hard way.) When it can't use Finish Touch (bosses, enemies which are immune to all three), it will use some of the other abilities, based on the amount of damage its going to cause, and how much time it can get away with charging. It will never use any of the time-wasting skills, such as Cherry Blossom, as they take waaay too long to use. Overall: A [Doesn't seem to use Cherry Blossom on stuck enemies, but so what? Finish Touch is all you need.] l. Byblos (Coming soon...) 7. Special Quirks a. Last Man Standing Because of the way the AI engine was designed, the characters may ignore enemies that are considered to be too screwed up to fight, or basically not worth the effort. The three status effects that seem to cause this are: Frog, Sleep, and Death Sentence. Normally, this is a good tactic to ensure that all of the damage is not wasted, and to kill enemies that actually might be able to hurt you back. (There are some rare exceptions to this. For example, a Time Mage may drop a Meteor on a sleeping enemy, since it's guaranteed to hit one enemy, and probably hit others. I'm not sure of other exceptions, because this is the only example I've seen.) However, this is kinda annoying when you're down to the last enemy, who has one of these status effects. The AI will pretend that no enemies exist and start healing each other or casting support magic on themselves. The FIGHT command, however, overrides this. b. Gotta Train Them All! Much to my surprise, I've learned that the AI engine actually knows about characters with Train. Since there is a very good chance of Train turning the enemy to your side, the AI will actually try to get the enemy critical, rather than killing them outright. The key is getting characters that can dish out both major and minor damage. Since Train only works on attacks with your weapon (Attack/Charge/Counter), you need class with a decent weapon on hand. Here are some good examples: Archer - Because of its Charge ability, it can vary the damage it can take, and get them trained. Really, a Charge secondary will work, too. Geomancer - A Geomancer has a good far away attack to take away some HP for a while, and then attack with the axe. Because of the highly-variable damage of the axe, it sometimes gets them critical. Oracle - Its long-range stick can do a decent amount of damage to knock an enemy critical. Mediator/Engineer - The gun attacks are usually weak, but because of the long range, it can pick anybody who's fairly low on HP and train it. Ninja - Ninjas are one of the best trainers because of the two maces. One, the maces are, like the axe, highly-variable in their damage. Two, it doesn't matter if both hits will kill them, because the first hit could get the enemy critical, train it, and the second hit will kill him. As long as the enemy doesn't completely vanish, you'll be able to invite them into your party. (The healers will usually try to revive it, anyway.) This also includes weapons with elemental abilities, so it could be like this: Hit, Fire 2, Train, Hit. Dragoner - Because Reis has the breath attacks to do big damage, and a purse (or her fist) to train them. c. Scared Critical Characters Critical characters change their tactics dramatically. They are generally permanently at RUN, no matter what the setting. Critical characters may occasionally be daring, but this is rare. (You've usually seen this behavior with the enemy, anyway.) d. Teleport = Fly The AI engine isn't nearly as daring with Teleport as us normal folk are. This is usually a good thing, because I'm cursing at Teleport all the time for missing a move. It treats it like Fly, since they can go at any height, regardless of if there are enemies in the path, but only move as many square as you have Move points, because those are the only 100% guaranteed spots. There are a few situations where it might risk moving beyond the range (if it's really bored), but they are extremely rare. 8. Credits This is the first version of this FAQ, so I'll just give all of the credit to myself :) Exceptions are Squaresoft, GameFAQs, blah, blah, blah... To be nice, I will give credits to the following guides (on GameFAQs): JMiaso's Jobs/Abilities Chart Aerostar's Battle Mechanics Guide (mathmaticians with a LOT of time on their hands :) TheDan's JP Scroll Glitch FAQ (used to get the characters to where they are This FAQ is Copyleft 2003 Brendan Byrd
http://www.gamefaqs.com/ps/197339-final-fantasy-tactics/faqs/21850
dclm-gs1-182520000
0.080213
<urn:uuid:250f9e1e-ff7e-40dd-ad49-85d64fcaeff9>
en
0.960364
thumbnail Hello, American consortium "are tremendous team owners" MLS chief Don Garber believes the prospective new Liverpool owners, New England Sports Ventures (NESV), cannot be compared with the club's current American owners, Tom Hicks and George Gillett. Garber believes NESV, owners of the MLB franchise the Boston Red Sox, has a great track record of operating more successful and more prestigious sports teams than either Hicks or Gillett, who can count the Texas Rangers among their other sporting interests. Garber believes NESV's work with the Red Sox is an encouraging example of what could be in store for Liverpool, should the takeover be completed. "They [NESV] have a tremendously robust understanding of the sports business and how to protect and enhance the legacy of the historic brand," Garber told the Leaders in Football conference in London. NESV are led by John Henry, and while Garber didn't want to be drawn on his methods when compared with the current Anfield incumbents, he did highlight his credentials with high-profile sports organisations. "I can't speak for the difference between Gillett and Hicks and John Henry and his partners," Garber started. "I don't know if you could say the same about the teams owned by Mr Gillett and Mr Hicks." Follow the Premier League LIVE on Commentaries, Stats, Player Ratings and much more, Visit Live Scores! From the web
http://www.goal.com/en-gb/news/2896/premier-league/2010/10/06/2153589/prospective-liverpool-owners-nesv-are-nothing-like-hicks-and
dclm-gs1-182610000
0.041528
<urn:uuid:40484027-860b-47b2-a04f-f12572e1d29d>
en
0.935882
Infrastructure // PC & Servers 12:31 PM Connect Directly Repost This Microsoft Windows 7 Under The Hood UAC's nag-a-riffic behavior can now be dialed down a great deal more easily. (click for image gallery) User Account Control Apart from Product Activation, no other feature in Windows has generated as much ire as user account control. The basic premise was sound -- do not let programs run with administrative privileges unless the user explicitly allows it -- but the implementation turned out to be a huge bother. Some people tweaked UAC with Registry changes to make it more palatable; others turned it off entirely (and thus defeated the whole purpose). In 7, UAC hasn't gone away -- it's just been sent to obedience school. It's now both far better mannered and manageable. By default, any changes you make to system settings through the Control Panel (or other things that are part and parcel of Windows itself) go through without needing UAC approval. Launching programs that must run as admin still need to be approved, although you can elect to allow such programs to launch "silently" (not a good idea). And yes, it's also possible to turn UAC off entirely -- although if you do this you're essentially back in Windows XP land, where one piece of malware launched as admin without you knowing about it can ruin your whole day. Thanks, but no thanks. Resource Monitor: Task Manager Reloaded For years the Task Manager has been the most common way Windows users have peeked under the hood to see what's running (or, sometimes, what's not running). It's been augmented or even replaced entirely with third-party programs -- Sysinternals' excellent Process Explorer is one of the best -- but with Windows 7, Microsoft has bundled something that could be called Task Manager Reloaded: the Resource Monitor. Fire up Resource Monitor and you're greeted with four tabs (plus an overview tab) that provide you with a running analysis of the four most common system resources: CPU usage, memory consumption, disk activity, and network throughput. This allows for a fast at-a-glance way to find out what's eating up most of any given commodity. Example: If your system's suddenly exhibiting a great deal of disk "chatter," click on Disk and sort Disk Activity by Total Bytes/Sec to see what comes up at the top of the list. If you see something that's gobbling up a lot of disk throughput, there's your culprit. Note that if said program is listed as having an I/O Priority of "Low," that program should gracefully allow other apps to use the disk as needed, so the fact that there's disk activity alone is not a sign that your system is choking. Resource Monitor makes this kind of debugging relatively easy. On the same note, if the Disk Queue column for a given disk in the Storage pane shows a high value, it means you have too many programs competing for what's on that disk. You might want to move things around -- place swap files on another drive, for instance. Another thing you can do with Resource Monitor is analyze programs that seem to be stuck to find out what's holding them up. Right-click on the name of any process and select Analyze Wait Chain, and you'll see a breakdown of what that program is waiting for. It's a good way to find out if a program is hanging because it's waiting for something else to finish, and not because it is itself stuck. 2 of 5 Comment  |  Print  |  More Insights Server Market Splitsville Server Market Splitsville Register for InformationWeek Newsletters White Papers Current Issue Twitter Feed Audio Interviews Archived Audio Interviews
http://www.informationweek.com/desktop/microsoft-windows-7-under-the-hood/d/d-id/1080150?page_number=2
dclm-gs1-182730000
0.01925
<urn:uuid:a366af27-f262-4894-a84f-0dc3826dc1da>
en
0.974788
More Teachers 'Flipping' The School Day Upside Down by Grace Hood Miller can replay parts of the chemistry podcast she doesn't understand, and fast forward through those that make sense. Then she takes her notes to class where her teacher can review them. Goodnight is one of about five teachers flipping their classrooms at this small school on Colorado's Eastern Plains. She's part of a growing group of teachers using the concept since it emerged in Colorado in 2007. "If they're going to have their iPods all the time, might as well put a lecture on it," Goodnight says. "So on their way home from school, on the bus or whatever they can maybe watch your lecture for homework that night. It's truly about meeting them where they're at, and realizing that the 21st century is different." Jerry Overmyer, creator of the Flipped Learning Network for teachers, agrees. "The whole concept of just sitting and listening to a lecture is really, that's what's getting outdated, and students are just not buying into that anymore." "It's about that personalized face-to-face time. Now that you're not spending all of class time doing lectures, you're working one on one with students," Overmyer says. "How are you going to use that time?" "Now you can simply just take about five steps and record a video and then simply send it to your students and parents and keep everyone informed," Green says. "So now we're becoming even more transparent." "I can listen to the video as well when they need help, and then I can try to help him understand what [the teacher] is saying," Patschke says. Copyright 2014 NPR. To see more, visit
http://www.kcrw.com/news/programs/al/npr-story?story_id=166748835
dclm-gs1-182780000
0.062657
<urn:uuid:ff12d963-0f81-4b24-b32b-0b4b719fc2e0>
en
0.946282
New! Read & write annotations Verse 1 (Male Solo) Yes sir, I'm Cuban Pete. I'm the craze of my native street. The senoritas they sing and they swing with their sombreros, It's very nice, so full of spice. And when they dance in they bring a happy ring, El maraquero singin' a song, all the day long. So if you like the beat, take a lesson from Cuban Pete And I'll teach you to chick-chicky-boom, chick-chicky-boom. Bridge (Female Solo) He's really a modest guy, although he's the hottest guy In Havana, in Havana. Verse 2 (Male Solo) Si, senorita I know that you would like to chicky-boom-chick It's very nice, so full of spice. I'll place my hand on your hip, and if you will just give me your hand Then we shall try - just you and I. Aye-aye-aye! And I'll teach you chick-chicky-boom, chick-chicky-boom, chick-chicky-boom Shake Your Booty, Daddy, Wow! See ya! Lyrics taken from Correct | Report • u UnregisteredFeb 17, 2014 at 2:03 am A polish guy with a fondness for electric mandola's, nobody likes his music but he still plays, the only reason people talk to him is to ask him to stop and so he yells at they boom boomy chick which makes them think he's a terrorist so he gets arrested and deported to Cuba where he changes his name to pete and starts playing the maracas because he lost his mandola. He's very sad about this so he hires a woman to praise him, she agrees at first but then she realizes he's a pervert and leaves making him even sadder so he founds the feminist political party and goes on to become an empirical dictator who enslaves all of Europe, the justice league then flies down from their magic space castle and runs against him in another political party but it doesn't work as it's a one party system but he also prevents all internal European wars when he forms one superstate called pete-major with Poland becoming pete-minor, the capital substate. He then goes one to form an empire that spans most of the world except for Russia and Australia, because gravitational shifts have caused Russia to be it permanent winter and Australia permanent summer, Australians ignore this as they're to distracted not getting killed by everything except a few types of sheep. • u UnregisteredAug 11, 2012 at 8:08 am Yes sir, he's cuban pete. He's the craze of his native street. When he starts to dance, everything goes chick-chicky-boom, chick-chicky boom, chick-chicky boom!! • u UnregisteredApr 13, 2012 at 9:47 pm I think its about a russian guy who loves to loves to play the guitar of course it's a song about a man called pete from cuba who loves dancing • u UnregisteredSep 13, 2011 at 3:23 am He's Cuban Pete. He's the king of the rumba beat, and when he plays the maracas he goes chick chicky boom, chick chicky boom. Write about your feelings and thoughts Min 50 words Not bad Write an annotation Add image by pasting the URLBoldItalicLink 10 words Annotation guidelines:
http://www.lyricsmode.com/lyrics/j/jim_carrey/cuban_pete.html
dclm-gs1-182820000
0.051602
<urn:uuid:d2f3634e-8624-42bb-85a5-cef76b23cc4d>
en
0.941206
Mark Ritson on branding: Fewer brands means better results There were no surprises last week when Unilever announced that it would cut 20,000 jobs, close 60 factories and divest a number of its brands over the next four years. While chief executive Patrick Cescau did not directly point the finger at the growing power of retailers when he described Unilever's decision to streamline its global operations, the power of own-label was at the heart of the announcements. In the past decade, retailer consolidation and the preponderance of own-label goods have placed Unilever, Procter & Gamble and Nestle under extraordinary pressure. In many of the categories they compete in, own-label goods from players such as Tesco, Carrefour and Wal-Mart now take a value share of between 30% and 50%. That leaves the big manufacturers battling each other for an ever-shrinking pool of consumers. And they have realised that to win in this much more competitive context, they need fewer brands and greater focus. A decade ago the 80:20 rule applied particularly well to most FMCG companies: 80% of their profits were derived from about 20% of their brands. Today, bigger and more efficient retailers have forced companies such as Unilever to question this ratio and adjust their operations accordingly. Less has always meant more when it comes to brand portfolios, but thanks to own-label, less means more than it used to. Fewer brands means less bureaucracy, which means more customer orientation. Until recently Unilever operated as two distinct companies with two boards of directors managing separate divisions in the Netherlands and the UK. Outside of its head offices the inefficiency continued, with each country split into three distinct operating divisions, each of them managing various brands. It is an example of the dreaded matrix of marketing inefficiency: multiply 100 countries by three divisions by 20 categories by 1400 brands and you get a very poor result. For Cescau, this structure created a strategic indolence that contrasted with Unilever's streamlined retail customers. 'If you have 250 people between the chief executive and the market, it is just like a dinosaur,' he said. 'Somebody is biting you at the tail and by the time it goes to your brain, half the body is gone. So we have considerably de-layered the structure. There is now one person between the head of Brazil and myself and one person between the head of India and myself.' Aside from strategic focus, Unilever's brand consolidation also means that marketing investment and innovation strategies can be devoted to brands that will respond best. There is no doubt that the global success of Dove in bodycare and Magnum in ice cream confirm the potential power of brand focus for Unilever. Both these categories were once peppered with an international smorgasbord of Unilever brands that prevented the company from investing significant resources in world-class marketing campaigns and then leveraging the results across every major global market. Today you are as likely to see the Dove 'Real Women' beaming at you from a poster in Rio, or on Oprah, as you are on a British billboard. Unilever has already signalled that it eventually hopes to halve the number of categories it competes in from 20 to 10. So far it has demonstrated impressive discipline in exiting once-invaluable categories such as frozen foods (by selling off Birds Eye), and it is apparently set to exit another former cash cow when it divests its US detergents business. Until recently, the gap between the slightly dusty, bureaucratic Anglo-Dutch Unilever and the tight, focused retailers that it supplied was growing ever larger. Under Cescau, the gap is closing and he sees Unilever's path clearly: 'Now, we are trying to be as good as the best everywhere. Always. So we are being more disciplined in the way we work.' - When Patrick Cescau took the helm in 2005, he quickly began to address the challenges of a tough market and more aggressive rivals, taking out management layers to make communication more immediate, speed up decision-making and allow it to move out of areas where return on investment is limited. - The aim of the 'One Unilever' scheme is to simplify the business and generate savings by bringing national operations together so that there is a single management team in each country. - Cescau believes the combination of the restructured organisation and the 'One Unilever' programme is improving the firm's effectiveness and allowing it to build on local strengths while exploiting its power as a global operation. - Unilever is now focusing on three areas of growth: developing and emerging markets, personal care and healthy-living products. Before commenting please read our rules for commenting on articles. comments powered by Disqus Brand Republic Jobs subscribe now Smiljan Radic turns to Oscar Wilde story for Serpentine Gallery Pavilion design Fashion magazine Centrefold shoots entire issue on Nokia Lumia 1020 Facebook begins selling auto-play video ads in the US Unilever puts cash behind digital ventures for global expansion and marketing Mobile gamers: Brands must approach with caution but can reap rewards Duracell heats up Canadian bus commuters by getting them to hold hands SXSW14: Rediscovering the feeling of something in your hand iBeacons: What are they and how should they be used? Coke-slurping Danish cinema-goers unwittingly appear on silver screen John Lewis celebrates 150th anniversary with campaign focusing on customer stories Asos partners with Benefit and Citroen to launch online car boutique Morrisons invests £1bn in price cuts after £176m losses Tesco mulls new strategy on loyalty Ambitious CMOs must 'think like a CEO' to win respect SXSW14: What have we learned from the last five days?
http://www.marketingmagazine.co.uk/article/730181/mark-ritson-branding-fewer-brands-means-better-results
dclm-gs1-182830000
0.025795
<urn:uuid:ae60ad89-f471-47f2-b8d1-b2a685c333e9>
en
0.982957
If not for the silver belt buckle that spelled out his first name, you might not have recognized Wyclef Jean at the video shoot for "It Doesn't Matter" from his upcoming album, "The Ecleftic," at a downtown Toronto club on Monday. Sporting a high-top fade that would make Big Daddy Kane proud, two fat, gold rope chains, and black leather pants and trenchcoat, Clef and two male dancers busted the kinds of moves that were staples of '80s rap videos onstage at The Guvernment for the clip. The $800,000 video for the ska-soaked track was shot by director Hype Williams in Toronto to coincide with World Wrestling Federation superstar Dwayne "The Rock" Johnson's appearance at a huge WWF event at the city's SkyDome on Monday. The Rock, who makes a cameo appearance on the single, had shot his part for the video the previous day. Incidentally, another brawny star, heavyweight boxing champion Lennox Lewis, dropped by the set on Sunday as well. "The video is basically Wyclef in the year 1988, trying to get into a club," Jean told MTV News in his suite at the Le Meridien King Edward hotel. "So you get Wyclef the b-boy -- I used to break, and I'm breaking in the video -- [and] you get Wyclef the MC. Then you get Wyclef in the year 2000 with The Rock. "We take you back and return to the present to show you where this whole hip-hop thing came from," he explained. As for how WWF superstar The Rock came to appear on the track, Jean said, "I was driving around with one of my little sisters, who's 13, and she said, 'You gotta put The Rock on the record. You're saying, 'It doesn't matter,' and that's what The Rock would say.' So, I said, 'Who's The Rock?'" Former WWF World Heavyweight Titleholder The Rock is well known for his colorful catchphrases, including barking sentences beginning with "It doesn't matter..." at anyone who attempts to hold a conversation with him. "I reached out for The Rock, and he came to the studio and I told him to do his thing," 'Clef said of how he got "The People's Champion" to appear on his record. "I had all the parts laid out. "[The Rock] was the easiest person to work with," he raved. "Sometimes you bring people in the studio, and they have no rhythm. The Rock was right on beat with everything. "He was so good that I gave him a line to rap," he said, laughing. "It all worked out good." No word yet on when the video will surface, as his newest single, "Thug Angels," is currently on the airwaves (see "Wyclef Preps Two Videos For New Single").
http://www.mtv.com/news/articles/1429153/wyclef-rock-shoot-it-doesnt-matter-video.jhtml
dclm-gs1-182910000
0.018315
<urn:uuid:c7bde771-443a-4455-95ac-b442fd7e9677>
en
0.990786
Monday, March 17, 2014 Inquirer Daily News R-E-S-P-E-C-T: Find out what it means to your customers The old saying that the customer is always right may not be 100 percent true, but the customer should always be treated with politeness and respect. In this uber-competitive economy, I'm always surprised when readers and friends tell me stories of inhospitable actions from those who want their dollars. Denise, from Medford, went to a lovely restaurant in a quaint South Jersey town with her husband and two other couples on a Saturday night. Even though they had made reservations, they were seated on the second floor - the only other table was a bachelorette party of 30 boisterous ladies. When Denise was leaving, an owner asked her how she enjoyed the evening. Denise politely said she would have appreciated knowing they were sharing the room with a large party. The owner's response: What did she expect on a Saturday night? "She was so rude," Denise said. "I was absolutely floored. She asked what I thought and then got defensive so quickly." The owner added that she didn't care if Denise came back. She won't. My friend Peg was bumped from a flight she had made a reservation for a month earlier. She arrived three hours early, checked in, got a boarding pass, and was told only during boarding that there was no seat for her. "It was just, 'Wait here, you've been bumped,' " Peg said. "He left me standing there with no instructions on what I should do." Her baggage made the flight, but she took one three hours later. "They were not apologetic at all," she said. "I guess they don't have to make an effort because people have to fly." I do believe these cases are the exception and not the rule, but they shouldn't happen at all. "To me, the core pillar of good manners is treating people right," said Debra DiLorenzo, president and CEO of the Chamber of Commerce of Southern New Jersey. "Every day, I reflect on my mom's advice of getting more with honey than vinegar and practice what she taught me. It's very important, especially in the business world, to treat people right - that is, to treat them with respect, honesty, and kindness." Recently, when I flew on Delta Air Lines, I was so impressed with how its employees helped me and my 86-year-old mother. The pilot even assisted me when my mom was leaving the plane. I won't forget that next time I travel. I also can remember waiters, parking-lot attendants, salespeople, and business owners who made me feel as if they cared. I feel loyalty to those people. I also understand that customers can be rude, and that's not right either. My favorite recent story of one customer being right, one being wrong, and a server saving the day comes from the Associated Press in Minneapolis. Joey Prusak, 19, who works at a suburban Dairy Queen, saw a regular customer with visual impairments drop a $20 bill. The woman behind him picked it up and put it in her purse. When she approached the counter, Prusak told her he would not serve her if she did not return the $20 to the man. The woman refused and left. Prusak took $20 of his own money and gave it to the man. A customer e-mailed Dairy Queen about what happened. Prusak, who acted with ultimate kindness and impeccable manners, has since been congratulated by many, including Warren Buffett. Prusak doesn't see himself as a customer-service icon. He told AP: "I was just doing what I thought was right." Readers: Have a question about etiquette? E-mail Debra Nussbaum at Also on Stay Connected
http://www.philly.com/philly/opinion/inquirer/20130929_R-E-S-P-E-C-T__Find_out_what_it_means_to_your_customers.html
dclm-gs1-183120000
0.144399
<urn:uuid:e4df3ea6-ed9e-44e3-b3e4-09d36fca03a1>
en
0.985085
default avatar Welcome to the site! Login or Signup below. Logout|My Dashboard Like Japan, bin Laden tasted power of US retaliation - News Columnists Like Japan, bin Laden tasted power of US retaliation Font Size: Default font size Larger font size Posted: Tuesday, May 3, 2011 12:00 am had just returned from an emotional afternoon at Pearl Harbor when I heard the news - Osama bin Laden had been killed by Navy SEALs. Only a few moments before I had stood looking into the murky tomb that once was the USS Arizona and for 70 years has been the resting place of more than a thousand brave men. And now the momentous news of the death of the world's greatest terrorist brought back the prophetic warning attributed to Japanese Fleet Admiral Yamamoto after he was told that the attack on the American fleet had come before a declaration of war could be delivered to Washington on Dec. 7, 1941. Most American schoolchildren know that quote about "waking a sleeping giant and filling it with a terrible resolve." Now another who would test the mettle of America has found what that can cost. It has taken nearly 10 years to bring down the murderous tyrant who apparently thought he was immune from the long arm of justice, but in the end there was no escaping. The SEALs were swift, giving him a bare minute to surrender before carrying out the ultimate sentence. It took far less time than the time it took to take down the Japanese admiral, who actually had opposed the war with America, where he had received some of his education and was acutely aware of this nation's potential for devastating retaliation. He was killed by American pilots flying P-38 Lightnings who ambushed his plane on April 18, 1943. And unlike bin Laden, he was a brave soldier - not a coward who hid in caves and let others carry out his dirty work. They say bin Laden tried to shield himself behind a woman before he was shot between the eyes. Why should we be surprised? Like millions of Americans around the world, the word that this monster was found not in the mountains of Pakistan but in what was described as a mansion not far from Islamabad was as startling to me as the report of his death. But how and when were not really important, only that this nation's honor had been restored in some part by a group of its finest defenders, just as all those years ago Navy pilots six months later at the Battle of Midway destroyed four of the carriers from which the Japanese had launched their surprise attack on Pearl Harbor. Franklin Roosevelt promised then that we would persevere, just as two of his successors - George W. Bush and Barack Obama - promised that bin Laden would pay the price for his infamy. Obama was able to claim the kill. But even with several thousand Americans cheering outside the White House despite the lateness of his announcement, he made it clear that this action was not taken against Muslims or their beliefs but at a criminal who all decent God-fearing men abhorred. So it seemed not only ironic but actually fitting that I could hear this news at the sacred site of a tragic incident that happened when I was a boy. I pitched a flower in the still oily water above the Arizona, and I now know that it was also a token of remembrance for all those innocents who died so tragically on Sept. 11, 2001. We can only hope that their spirits rest better now. Welcome to the discussion.
http://www.phillyburbs.com/news/local/burlington_county_times/news_columnists/like-japan-bin-laden-tasted-power-of-us-retaliation/article_2aee2f54-c90d-54b6-917a-078a49e954c9.html
dclm-gs1-183130000
0.023078
<urn:uuid:5759a3dc-2eb2-4578-9650-dcdbf6c0594f>
en
0.942306
Can't Buy Happiness? Money, personality, and well-being People Who Spend Freely Do Not Spend Wisely finds tightwads are more likely to purchase experiences. In today’s uncertain economic climate, many people are becoming more aware of their spending habits. People who spent freely and pay little attention to personal debt before the recession are now paying more attention to how they feel when they make decisions that affect their finances.  Psychologists have recently begun to study the emotions that people experience when parting with their money. Psychologists use the term “pain of paying” to describe the stress and anxiety people feel when spending money. Those who feel too little pain of paying are called ‘spendthrifts’ while those who feel too much pain of paying are referred to as ‘tightwads’. Researchers at BeyondThePurchase.Org were interested in comparing the spending habits of spendthrifts and tightwads to learn more about how their financial behaviors affect their happiness. They wondered if the pain of paying was related to materialistic and experiential purchasing tendencies, because research has shown that happiness is increased more when spending money on experiences, as opposed to material items. Visitors to the website were asked to complete the Tightwad/Spendthrift Scale, the Experiential Buying Tendency Scale, and the Materialistic Values Scale. The results of the study indicated that spendthrifts were more likely to have materialistic values, while tightwads were more likely to purchase experiences. These results suggest that people who are tight with money may be more hesitant to make purchases, but when they do spend money, they do so in ways that will make them happy. On the other hand, those who spend freely may feel better in the moment, but their purchases may fail to bring them lasting satisfaction. So before shelling out that hard earned cash this holiday season, it may be wise to pay attention to how you feel when making your purchases. That little warning voice in your head may be steering you toward purchases that will make you and those you care about happier. In a world where our consumption decisions are increasingly driven less by necessity and more by psychology, it is important to know your spending habits and values. Subscribe to Can't Buy Happiness? Current Issue Dreams of Glory Daydreaming: How the best ideas emerge from the ether.
http://www.psychologytoday.com/blog/cant-buy-happiness/201212/people-who-spend-freely-do-not-spend-wisely
dclm-gs1-183230000
0.022539
<urn:uuid:8bc91b66-9824-490c-b244-4afc6bf60fd8>
en
0.689102
iRiffs - commentaries made by fans! Recent iRiffs FireRiffs Presents: Terminator 2 Nailsin Riffs Batman And Robin Chapter Eight(VOD) Rabbit Ears: Destroy All Pizza That's Cool, That's Trash presents: Bloody Pit of Horror Cinester Theater Presents: Child's Play Rabbit Ears Short#11: Accidents Don't Just Happen Cinemasochism: The Monster Known as V.D. Widows Hill Notes to Dark Shadows, Episodes 1-10 Cinester Theater Presents: Willow Rabbit Ears: Dance-O-Rama Nailsin Riffs Batman And Robin Chapter Seven(VOD) TS: Ricky Raccoon Shows the Way Corny Commentaries - Health: Your Posture Random Best-sellers Are you afraid to go to parties because you might slather ice cream all over your pheasant au jus and try to shove it in your earhole?  Wouldn't it be great if your future self could come back and beat some sense into you?  Now you can deal with such involuntary time travel with the aid... The first ever iRiff done entirely with musical parodies! This is not a love story.  It is a story of necessity, frustration, and ultimately triumph.  The kind of triumph that only comes from overcoming obstacles to complete the menial task that you're hard wired to do.  This is... If you've ever had a favorite video game, then you're familiar with the desire to see your favorite game characters up on the big screen, where you can force the rest of your family to enjoy them. Well that's exactly what Mortal Kombat fans got in 1995 when the hit video game franchise... Top 50 iRiffs 2. Ominous Projects Presents: 10,000 BC      3. TS: Captain Midnight: Mission to Mexico      5. Hor-RIFF-ic: Leprechaun      7. Ice on Mars - The Lizzie McGuire Movie      8. Incognito Cinema Warriors XP (201) - Victory Gardens      9. The Spoony Experiment: After Last Season      12. Hor-RIFF-ic: FROGS      14. Hor-RIFF-ic: Halloween III      17. TS: What Makes a Good Party?      18. Hor-RIFF-ic: Gremlins      20. Cinester Theater Presents: E.T. - The ExtraTerrestrial      21. Batman Begins      22. Ralph and Rick resent: The Phantom Empire Chapter 1      23. Fanboy Sci-Fi Theater - GAMERA SUPER MONSTER      24. Eraser      25. Teenage Zombies : Circus Peanut Gallery      26. Incognito Cinema Warriors XP - Ghost Rider (VOD)      27. TS: Better Use of Leisure Time      28. Signs - Laugh Support      29. Ronin Fox Trax: A Nightmare on Elm Street 4      30. TS: In the Suburbs      31. Fun With Flicks: Laser Mission      32. Cinester Theater Presents: Batman Returns      33. Ronin Fox Trax: A Nightmare on Elm Street 3      34. TreacheRiffs: Lost In Space (1998)      36. Hor-RIFF-ic: Poltergeist      37. Mr.B.Natural: Cat Women of the Moon      38. Ketchup Pharaoh Productions Presents: Ghostbusters      39. OneWallCinema: Enter The Lone Ranger      40. Hor-RIFF-ic: The Stuff      42. No Country for Old Men      43. Cinester Theater Presents: Star Trek Voyager - Phage      45. Cinester Theater Presents: Total Recall      46. Riff Raff Theater - Minority Report      47. Riff Raff Theater - The League of Extraordinary Gentlemen      48. Just Andrew - "Classic Commercials" Short      50. Hor-RIFF-ic: Tremors      What is iRiffs? Think you have the chops to make a RiffTrax? Adding product to your cart. Hang tight!
http://www.rifftrax.com/iriffs/iriffs/laugh-support/iriffs/hor-riff-ic-productions/hor-riff-ic-gremlins
dclm-gs1-183280000
0.037167
<urn:uuid:f9ae54ec-3c18-4a0e-a397-dba265b6f2b7>
en
0.973808
Touched by glamour April 6, 2005 - 5:15PM Prince Rainier of Monaco, who died today, led a life marked by Hollywood glamour with his marriage to Grace Kelly, but he also transformed his wealthy Mediterranean principality into a major financial and entertainment hub. One of the world's longest-reigning monarchs, his life reads almost like a soap opera, due in part to his 1956 wedding to the Hollywood star. Kelly died in a car crash in 1982, but the celebrity status she imported and the changes wrought on this portion of French Riviera coastline have made the mini-state synonymous with easy-going wealth. The 81-year-old prince had been rushed into the resuscitation ward of Monaco's cardio-thoracic centre on March 27 after his health abruptly and dramatically deteriorated. Rainier had been in the clinic since March 7 for treatment for a recurrent respiratory problem. The prince also suffered severe heart problems, and was last hospitalised for an infection in October. Succeeding his grandfather prince Louis II in November 1949, he ascended to power three years before Queen Elizabeth II took the British throne. His marriage to Grace Kelly bore him three children -- Prince Albert, his son and heir, and princesses Caroline and Stephanie. In recent years Rainier's advancing age and frailty led him to delegate more and more responsibilities to his unwed son, Prince Albert, who became regent March 31. Throughout his life, Rainier craved respect for his mini-state. In 1962, he overhauled the constitution and began an ambitious construction project, raising a plethora of multi-storey buildings and reclaiming land from the sea to expand Monaco's territory by 20 per cent. He worked hard to promote the environment, notably on maritime issues. Born on May 31, 1923, the son of Prince Pierre de Polignac (who had adopted the name Grimaldi on marrying into the family) and Princess Charlotte of Monaco, Rainier was educated in Britain, Switzerland and France, studying literature at Montpellier and politics in Paris. He enrolled as a volunteer in the French army in September 1944, taking part in the campaign to retake Alsace from the retreating Germany army, and was decorated with the Croix de Guerre. After the war he served in the economic section of the French mission in occupied Berlin, and was later promoted to the rank of colonel in the French army. His mother, meanwhile, renounced her right to the throne and in due course, still only 26, Rainier succeeded his grandfather. If his marriage to Kelly put Monaco on the map figuratively, his actions over the next five decades went a long way to making the principality a more substantial player in the world. The constitutional changes in 1962 shared power between the prince and an elected 18-member national council and abolished the principle of the divine right of the ruler. Skyscrapers sprouted to house the burgeoning banking and business sector. The Fontvieille district was created on land formerly covered by the waters of the Mediterranean and earmarked for office and residential development. Though there are no figures to separate Monaco's economic performance from that of France, the city's turnover increased rapidly, particularly in the 1990s, with service industries accounting for around half of total revenue and income from gambling reduced to around four per cent. In 1966 he successfully fought off an attempted takeover bid by the Greek shipbuilder Aristotle Onassis for the Societe des Bains, the company that runs Monaco's casinos. In 1997, the 700th anniversary of the Grimaldi dynasty, Rainier said: "The prince must be able to act like a company chief when necessary, but must not allow his role as company chief to diminish his prerogatives as a prince." He maintained friendly relations with France despite an occasional fuss over the alleged use of Monaco's financial sector for the transfer of funds deriving from criminal activities. In 1993, Rainier brought the principality into the United Nations as its 183rd member. Rainier took great pleasure from being "probably the last head of state to be able to recognise all his compatriots in the street." In 1974 he created an international circus festival which became that industry's equivalent of the Cannes film festival. Our Advertisers
http://www.smh.com.au/news/World/Touched-by-glamour/2005/04/06/1112489549977.html
dclm-gs1-183310000
0.028642
<urn:uuid:8226e287-e196-45fa-8ffe-3ed05d7919fc>
en
0.979991
'Snake on a Windshield' goes viral on YouTube Aug 2 2011 - 2:31pm While "Snakes on a Plane" was a box office flop, a video dubbed "Snake on a Windshield" has soared to viral status on YouTube. Rachel Fisher was recently flying about 65 mph down Sam Cooper Boulevard in Memphis, Tenn., with husband Tony and three children when a snake popped its head out from underneath the hood beside the windshield wipers. It was followed by about 21/2 feet of body that slithered onto the windshield. Tony Fisher clicked on a video camera, capturing the weirdest moment of the couple's life. "This is a water moccasin, a huge water moccasin inside our car," Fisher says on the tape. "No it's on the outside," Rachel Fisher says. Actually, it was a harmless gray rat snake, a friend to man because it kills mice and rats, said Steve Reichling, curator of reptiles at the Memphis Zoo. "Snakes like to find cool, dark and safe places," Reichling said. "It probably stayed under there until the engine became too hot." The couple didn't care why the snake was there; they wanted it gone. The snake serpentined around the windshield for about two minutes before slithering to the driver's side rearview mirror. Whipped by the wind, his head slammed several times against the mirror. He opened his mouth wide and tried to slither down the driver's side door. Rachel squealed, clutched the steering wheel with both hands, one eye on the road, the other on the reptile. Being upside down on the door of a car going 65 mph was the final undoing of the snake, which went flying off the car and onto the busy highway. "Good. Get it. Kill it," Tony Fisher shouted inside the car to other drivers. The snake's apparent demise aggravated many of the 31,672 visitors who watched the video on YouTube. The video has also been featured on several national television networks. Hundreds commented under the video that the Fishers should have pulled over and let the snake off. "They were really indignant," Rachel Fisher said. "I deleted some of them that said bad things about my children. People were saying we should have stopped, but that didn't cross my mind at the time." From Around the Web
http://www.standard.net/stories/2011/08/02/snake-windshield-goes-viral-youtube
dclm-gs1-183330000
0.256417
<urn:uuid:6b571c32-4b1a-4bdd-836d-ca15830eae07>
en
0.942118
A closer look at Titan's chemical factory Posted by TG Daily Staff Essentially, the atmosphere is a productive "factory," cranking out hydrocarbons that rain down on Titan's icy surface. This cloaks the planet in soot and, with a brutally cold surface temperature of approximately minus 270 degrees Fahrenheit, forms lakes of liquid methane and ethane. A closer look at Titan's chemical factoryHowever, the most important raw ingredient in this chemical factory - methane gas, a molecule made up of one carbon atom joined to four hydrogen atoms – should not last for long because it's being continuously destroyed by sunlight and converted to more complex molecules and particles. 

 So how longs has this "factory" been operating? Well, several new studies, using data based on ESA and NASA research, attempt to estimate how much "heavy" methane containing rare isotopes is present in Titan's atmosphere. By modeling how the concentration of heavy methane changes over time, the scientists attempted to measure just how long Titan's chemical factory has been running. "Under our baseline model assumptions, the methane age is capped at 1.6 billion years, or about a third the age of Titan itself," said Conor Nixon who is stationed at NASA Goddard. "However, if methane is also allowed to escape from the top of the atmosphere, as some previous work has suggested, the age must be much shorter - perhaps only 10 million years - to be compatible with observations." Of course, 
both of these scenarios assume methane entered the atmosphere in a single burst of outgassing, probably from the restructuring of Titan's interior as heavier materials sank towards the center and lighter ones rose toward the surface. "[Yet], if the methane has been continuously replenished from a source then its isotopes would always appear 'fresh' and we can't restrict the age in our model," Nixon added. 

 Kathleen Mandt of the Southwest Research Institute, San Antonio, Texas, also modeled the time-evolution of methane. In Mandt's paradigm, the concentration of heavy methane is determined from measurements by Cassini's ion and neutral mass spectrometer, which counts molecules in the atmosphere of different masses (weights).

 Measurements made by the Huygens gas chromatograph mass spectrometer, which also counts molecules of different masses, were used to constrain the impact of escape on the heavy methane in the atmosphere. Both of the above-mentioned theories seem to confirm Titan's methane atmosphere must have formed long after Titan itself. Interestingly enough, previous work analyzing the evolution of Titan's interior indicated the last major methane eruption occurred 350 million to 1.35 billion years ago, while crater counting put the age of the current surface at 200 million to one billion years. 

However, the most recent theories - for the first time - estimates the methane age from the atmosphere itself at less than one billion years.
http://www.tgdaily.com/space-features/62983-a-closer-look-at-titans-chemical-factory
dclm-gs1-183410000
0.117602
<urn:uuid:c84e80c4-a6e7-4f22-838b-c57590805043>
en
0.969842
Actually, random lawlessness ruled last Monday too This time last week, things weren't that great either Special report: Terrorism in the US To land in America from Britain used to feel like Dorothy moving from Kansas to Oz. You went from black and white to Technicolor and the transition horrified and fascinated in equal measure. Before you had left the airport it would be clear that people somehow walked faster and talked louder. Somehow, regardless of their size or yours, they seemed to take up more space - a sight and sound that was simultaneously impressive and imposing. But that was long, long ago. A time when aeroplanes were a means of transportation rather than weapons of mass destruction and the twin towers of lower Manhattan symbolised the invincibility of global capitalism rather than its vulnerability. It was an era whose distance from ours is measured not in time but events - less than seven days but more than a million repeated images and thousands of lives have passed since then. To arrive this weekend was to touch down in another country altogether. It is a painful sight. A nation of hushed tones, of pacing aimlessly in circles. Several states away, in Cincinnati, Ohio, the airport is almost deserted - planes and people all in the wrong places. Business travellers, five days late in a country where minutes once mattered. At the meeting of five departure gates that would once have been overrun with a thousand passengers, just one airport employee sits, reliving the drama on CNN. The area of rubble that was the World Trade Centre is now labelled Ground Zero; the hour at which it began to crumble feels like year zero. But just as there is a physical relationship between the towers and the debris, so too is there a connection between the international political climate before the attacks and after. The world last Monday was a very different place. A boatload of refugees from Afghanistan lingered off Australia's borders, finally heading for a detention centre on the island of Nauru. Afghanistan, a country now deemed sufficiently sinister to warrant an international, military attack, was not then regarded as being oppressive enough to justify offering refuge to those from it who sought asylum. When 433 people tried, they were demonised by the Australian government as scroungers. That refusing them contravened international and domestic law seemed neither to bother the Australian government, nor most of its citizens. An ocean away, at an anti-racism conference in Durban, western powers would not apologise for slavery. The few countries who now seek to lead a coalition founded on the moral indignation of last Tuesday's atrocities, held out against the many who wanted them to accept their historical responsibility for treating people like chattels. Push your point, said the powerful, and we will leave. Just up the road in Zimbabwe, Britain finally looked as though it had brokered a welcome deal with president Robert Mugabe. But while the west, rightly, condemned his regime for the lawless, chaotic and deadly seizure of land from a privileged minority, it continued to defend the lawless, chaotic and deadly seizure of land by a privileged minority in the Middle East. All this looks as nothing compared to the thousands of body bags now piled up in New York, but it does provide a snapshot of what global politics had been reduced to. Whatever the west wanted, it eventually got (except from China). Whether in trade, diplomacy, politics or war, the west used its wealth and muscle to force its interests on the rest of the world. The west, led by the US, had become not only the global policeman, but the world's judge, jury and executioner. Worse still, like the most shameless corrupt copper, the west not only made the rules but decided which ones it could break as well. Serbia is a cogent example. When the west could not reach a global consensus to curtail Serb aggression, it simply bypassed the rest of the world's concerns and bombed the Balkans in contravention of international law. When it wanted to see Slobodan Milosevic in the dock in the Hague, it waved a chequebook in the direction of the Serb authorities, and he was grabbed. They day after Milosevic was handed over, the US released $1.28bn in aid to rebuild the nation it had bombed. Meanwhile the Pentagon, which was attacked last Tuesday, remains the most implacable opponent of the international criminal justice system, refusing the idea that an American could ever be indicted as a war criminal. Republicans recently promoted a bill in Congress permitting the president to use force to free any American ever "captured" by the Hague prosecutors. The relationship between these facts and last week's atrocities is contextual, not causal. Those who believe that America got what it deserved as a payback for its former ills lack the very humanism which they argue has been missing in America's foreign policy. But, similarly, those eager to stifle any critical understanding as to why these attacks happened lack the faculties to begin to imagine how to make the world a safer place. This time last week the world was already in a state of maverick lawlessness. The moral, economic and political parameters were set by the powerful and imposed on the powerless, and shifted according to their interests. That the west's two favourite pariahs - Saddam Hussein and Osama bin Laden - were once on the payroll is not ironic but logical. The attacks on New York will not halt that trend, but more likely entrench it. With reservists on call and the army on standby, the US is ready, waiting and willing for war. Talkshows reveal a popular mood: shoot now and ask questions later. It is a brave, but rare voice, that chooses to dissent in this atmosphere. Elsewhere, things are not much better. Asked last week whether the Israeli government was exploiting the carnage in New York to justify its activities in Palestine, which had left a nine-year-old girl dead, the former Israeli ambassador to Washington said: "We do not need justification. We will fight not only the terrorists but those who harbour them." But America's response to those attacks could expose just how much political capital it has expended by going it alone in the past. Last week the US enjoyed the support of the full range of global opinion, from Colonel Gadafy to Ariel Sharon, in its grief. But as it moves to avenge the attacks, the coalition that it seeks to back its military action is ready to crack. Some of the US's western allies will not want to risk joining it on the list of terrorist targets for the sake of what could well be a gratuitous act of revenge. Others, particularly in the Arab world, will come under considerable domestic pressure not to back Israel's sponsor in the midst of an intifada. Last Tuesday's attacks might feel like year zero. But as New Yorkers return to their desks today, others around the world are also remembering life this time last week. And many do not like what they see. Today's best video Today in pictures
http://www.theguardian.com/world/2001/sep/17/september11.usa27
dclm-gs1-183520000
0.074992
<urn:uuid:156b25ea-a141-46a1-9282-227bfd56c989>
en
0.978288
Our TV Shows Got a Tip? Call TMZ at (888) 847-9869 or Click Here Nick's Tears Crock of Fakery? 5/15/2008 6:04 PM PDT BY TMZ STAFF No Avatar For everyone that doesn't know, Nick was homeschooled by his mother Linda. That would explain the inability to spell simple words correctly. 2132 days ago boing 1st 2132 days ago Nick probably now has had a "bad bone" in his body. 2132 days ago who cares     Oh my Goodness..... Boo Hoo Hoo He could have gotten a hell of alot more time!! 2132 days ago Hulk should tell his son to shut up and accept what he has done. 8 months is NOTHING compared to what John and his family has to deal with for the rest of his life! Hulk and Linda BOTH should be in the same cell as Nick and serve the same amount of time. This all could have been prevented had Nicks parents not given him that kind of car and taught him that driving is a privilege and not a right. 2132 days ago i still say this he got off real easy... 2132 days ago He needs to leave him in there to teach him a lesson. You do the crime you pay the time. 2132 days ago Oh Chicken you went there... It's "bad bones" TBH though. 2132 days ago Sad situation for both families, but Nick has to pay the price for his actions. I do have empathy for Nick because I feel that his dad encouraged his racing by allowing him to begin driving at such a young age and by not "educating" him on how dangerous driving fast can be. Nick was way too young and inexperienced to begin a racing career. The Hogan family should be thankful that Nick got a light sentence. John Graziano, his family, girlfriend and friends need everyone's prayers and support. 2132 days ago I agree this is a terrible situation and the culprit should be punish to the extent of the law but it really is sad that such personal letters are here for the world to view. We are really a sad bunch to come to this site for this stuff. 2132 days ago nick hogan is a killer     Nick's mother cares more about her pets than her own son. That would explain why her raising of Nick failed. 2132 days ago Brooke is the ultimate sh*tbag saying John wasn't even home. Where was he dear? Still in Iraq? Did your stupid brother drink and drive and smash his car and the military stopped the planet from spinning and airlifted John into his car before the cops got there? If you even drop the John issue, you still have an underage young man drinking and driving and it's not his first offense. He's not a celebrity and he got off EZ, snot nose little punk. 2132 days ago Why do the Hogans think just because they were close to John that excuses what Nick did? Let's say John was driving the car that night and Nick was now laying in a hospital bed in a vegetable state. Would the Hogan's say oh well no problem John don't worry about it. NO FRIGGIN WAY! 2132 days ago That Guy     Nick merely looks confused and lost - nothing else. I find it hard to believe that CMT or whatever national station it is has the nerve and poor taste to show reruns of Hogan Knows Best. He should be happy that he only received 8 months. They should have sent him to prison and given him at least 3 years. I hope he gets beat down by others on a regular basis so he can appreciate what he has. That won't happen since he has his own girlie cell. 2132 days ago Maybe Nick can get more of a quality education in jail than he could being taught by his mother. First step: pick up one of those square things that has lots of pages in it that you can turn. And maybe get one without pictures. 2132 days ago Around The Web
http://www.tmz.com/2008/05/15/nicks-tears-crock-of-fakery/?adid=center_saga
dclm-gs1-183530000
0.02672
<urn:uuid:634c7305-d1bc-4298-88a7-7d8248eae23e>
en
0.936739
Our TV Shows Got a Tip? Call TMZ at (888) 847-9869 or Click Here DWI Racing Chair Sells for a $30,000 Loss 11/6/2009 5:25 AM PST BY TMZ STAFF The famous DWI racing chair just sold for a respectable $10,099.99 on eBay -- but it's a far cry from the $43,000 bid that was placed on Monday ... when the La-Z-Boy corporation busted in and ruined everything. DWI Chair The La-Z-Boy head honchos were pissed because the incredible machine was being sold under their trademarked name -- so the company killed the Proctor Minnesota Police Department's first attempt to sell the chair earlier this week. The chair was re-listed the day after the cancellation without the La-Z-Boy named attached -- but the damage was done ... as the bidding frenzy fizzled out last night a whopping $32,900.01 below the original highest offer. The proceeds of the sale were going to benefit Proctor taxpayers ... so sucks for them. No Avatar 1592 days ago La-Z-Boy should make things right and give Proctor $32,900. 1592 days ago Thanks for ruining everything, La-Z-Boy! I'm gonna go to one of your showrooms and have an accident while sitting in one of your chairs. 1592 days ago The loss isn't to the people of Proctor, nor to the police. The loss is to the industry of motorized furnishings. The loss is that this engineering genius is not being employed to create a motorized love seat, couch, and sectional. Heck even a motorized ottoman would be an improvement over all these Rascal, and Rover, and whatever else these limited mobility people use to putt themselves around on. In Japan they invented the motorized unicycle. Now a segue is par for every security patrol. This is the proletariat's answer to the bourgeoisie! Fight the power! 1592 days ago Your post gave me more than one giggle. :-) 1592 days ago Judy C.     A lot of the time when there are those big frenzied auction bids on eBay, it turns out that not all the bids are sincere and the seller never collects anyway. Anybody with a legitimate interest in the chair could have found the new auction and bid again. 1592 days ago Judy Z     Shame on you corporate greedy Lazy Boy a-holes. The money was going to charity! You were getting free advertising with this chair. BUT had to yell "trademark infringement". Do you guys feel better now that the name "Lazy Boy" has been removed from the E-bay site. Now the police's fund is down $32,000.00. If Lazy Boy wants to repair this screw-up, they should at least contribute the difference (if not a bit more). The holiday season is coming up, help this police charity Lazy Boy. 1592 days ago The Alkie should have gotten half the money, they screwed the Alkie again, always happens. 1592 days ago Crissy Angela     Your move, La-Z-Boy 1592 days ago The Seer     $10.099.98 TOO MUCH. 1592 days ago Do right and donate the difference, La Z Boy, or at least something substantial to show good sportsmanship. 1592 days ago hey harvey - you're a lawyer. explain this. since when can't you include the brand name of an item in the title of your "for sale" ad????? 1592 days ago Allen Ridak     Hey SV, they can't use the name La-Z-Boy to sell a custom made chair because it is not a La-Z-Boy product. La-Z-Boy do not make motorized chairs and I'm tipping don't want their name in the title alongside the word DWI. Also to all those saying the company should make up the difference; the bids were fake. I know that because some of them were mine. eff the police! 1592 days ago Around The Web
http://www.tmz.com/2009/11/06/dwi-racing-chair-sells-for-a-30-000-loss/
dclm-gs1-183540000
0.671975
<urn:uuid:078b0182-b58e-4e85-94b3-f038b90923a7>
en
0.96369
Sign in with Sign up | Sign in Your question Suggestions on hypothetical build? Last response: in Systems I'm hoping to put together my own computer. I want to use it for some gaming. I don't have a budget but the cheaper the better. This will be my first build. All suggestions are welcome. I think the cpu cooler is for intel cpus but i'm too lazy to change it at the moment. a b B Homebuilt system a b à CPUs "I don't have have a budget..." wanna throw out a ballpark figure here? say like $800-$1000? "I want to use it for some gaming." what is the least resource-demanding game you intend to play? the most? any game in the future? "...but the cheaper the better." AMD builds are typically cheaper, not necessarily for comprimise either. Why include Microsoft Word on your cost, or the OS. We're not going to change those so they don't need to be included in your hypothetical build. (actually i would use openoffice, but that's just me) Is it safe to say you have a budget of $900 for this hypothetical build Related resources The absolute max is $1500 but i'd prefer to keep it under $1300 for everything (~$900 without software). I play mostly shooters and rts games (Cod black ops, Quake Wars, starcraft 2 etc.) I haven't really used open office much. I was worried about having file compatibility issues while at colleges. Most schools use microsoft office. I looked up most of the components on microcenter and they seem a bit cheaper. A few things like 6850 and ssds were more expensive but I bet I would be saving a lot more not having to pay for shipping. Thanks for the suggestion. How does the psu look? Is 550w the right amount? I'm not sure I would be able to see the red led from outside the case. I was considering getting a different color led fan for the front of the case and didn't want to the two colors to clash. Any recommendations for psus? a c 91 B Homebuilt system a b à CPUs Well you could either change the PSU or opt for a different case. The PSU probably won't be visible as there isn't a side panel. But if you are fearful, here's a case with the same LED's as your PSU, comes with more fans and is, imo, the better case. CM Scout: Or a psu is this: It's cheap, not modular though. But it has a great efficiency, and comes from a great brand.
http://www.tomshardware.com/forum/300801-31-suggestions-hypothetical-build
dclm-gs1-183560000
0.083003
<urn:uuid:105ab984-2840-4128-b005-b64c178f97b3>
en
0.843225
Sign in with Sign up | Sign in Your question ASRock z77 pro 3 or pro 4-m? Last response: in Motherboards just wondering which is the best MB for overclocking a 3750k to about ~4GHz. my build is: Zotac GTX 650 Ti Corsair Vengeance Black PC12800 8gb (2x4gb) PSU Corsair VS550W so here's the pros and cons of each MB in my perspective: pro 3: + ATX form factor - 4+1 power phase pro 4-m: + 4+2 power phase - mATX form factor (which in some reviews, i read that the PCIe 3.0 slot is too close to the HD audio port, so if i managed to install a VGA on it, i can't properly use the HD audio port, vice versa) i dont care about SLI/Crossfire thing, since i wont use that any kind of feature. tangled to a ~700$ budget, i wasted a big slice of my budget to the processor,VGA,and LCD (~450$), because this's gonna be a gaming rig. after adding PSU,casing,and RAM, leaving a ~130$ space for a choice of Z77 motherboard. is the power phase gonna make a difference in performance and lifespan? is there any other option available in the ~130$ range? answer will be very appriaciated, review of overclocking on both MB also can help :)  PS: sorry for my bad english :D  More about : asrock z77 pro pro Get the pro 3, any z77 motherboard will allow to overclock the cpu to more than that. The pro 3 is standard atx, and usually it's cheaper. I have the Pro 3 and it overclocks well. With a i5-2500k, I reach 4.4GHz at 1.34V. Both boards are decent choices, and the difference in overclocking in minimal. If you jump to a Extreme 4, 8+4 power phase, then you'd see a difference in overclocking.
http://www.tomshardware.com/forum/330423-30-asrock
dclm-gs1-183570000
0.025377
<urn:uuid:fc48b427-99db-45ed-8555-55e8a35ab48d>
en
0.975253
Senate confirms China, Japan ambassador nominees — The Senate on Friday confirmed Utah Gov. Jon Huntsman as ambassador to China, giving the Republican the task of nurturing a sometimes shaky relationship that President Barack Obama sees as crucial to solving many of the world's most difficult crises. The Senate also confirmed John Roos, a lawyer and Obama campaign fundraiser, as U.S. ambassador to Japan. Both were confirmed by unanimous consent. Huntsman's confirmation sends to Beijing a fluent Chinese speaker with deep social, government and business ties to the region. It also allows Obama to bring into his administration a popular Republican leader seen as a potential challenger for the presidency in 2012. Huntsman will travel to China at time of rising cooperation between the two huge economies. Late last month, the countries held two days of high-level talks in Washington. Officials vowed to work together to deal with global economic turmoil, climate change and nuclear standoffs with North Korea and Iran. But it's also a relationship beset by tension and occasional hostility. The United States has repeatedly criticized China's treatment of its people, most recently its crackdown on ethnic riots in the oil-rich Xinjiang region, its massive, opaque military buildup and its trade and economic practices. China, the world's largest holder of U.S. Treasury securities, worries about the safety of its investments. Beijing also cut off military talks with Washington after the Bush administration last year approved a huge weapons sale to Taiwan, the self-governing island that China claims as its own territory. U.S. lawmakers from both political parties have praised Huntsman as the right person for an important job. He is a former ambassador to Singapore, has led trade missions to China and has two adopted daughters, one from China and one from India. Huntsman lived in Taiwan as a young man, working as a Mormon missionary. Obama's nominee for Japan, Roos, reportedly collected at least $500,000 for Obama's presidential campaign. But he was relatively unknown outside fundraising and legal circles when Obama picked him as envoy to Tokyo, and his pick drew criticism from some in Japan. Earlier, at his Senate confirmation hearing, prominent Americans spoke of what they saw as Roos' qualifications, in both experience and temperament, to be ambassador. His supporters included former Sen. Bill Bradley and former Vice President Walter Mondale, who also served as ambassador to Japan. Obama also gave Roos a strong vote of confidence Thursday, saying that he "will be able to advise me directly" on U.S.-Japan issues. "I placed great importance in the selection of who would represent the United States as ambassador to Japan," Obama told reporters, with Roos sitting at his side. "And after careful consideration I made the determination that the person who I thought could best do this is somebody with superb judgment, somebody with an outstanding intellect, somebody who is a very close friend of mine and a close adviser." Roos has said that the large California law firm he leads was "intimately involved" with several topics of interest to Japan, including software growth, the rise of the Internet, the emergence of biotechnology and clean technology and renewable energy. The Senate also confirmed a host of other appointments, including Carlos Pascual to be ambassador to Mexico and Aaron Williams to be director of the Peace Corps.
http://www.utsandiego.com/news/2009/aug/07/us-us-asia-ambassadors-080709/
dclm-gs1-183640000
0.019826
<urn:uuid:182a85ad-2530-494a-9732-5fcf02906d7c>
en
0.956767
The Blog Widget tooltip Single Page Print Larger Text Smaller Text Alerts Bork disagrees. The radical passions that animated the student movement of the 1960s neither diminished nor were repudiated by their adherents. It's just that those adherents fanned out into junior positions in political and broadly "cultural" professions. Three decades later, they are at the peaks of their careers. And from the heights they now command -- as federal judges, tenured full professors, media and entertainment superstars and moguls, foundation chiefs, and advocacy eminences -- they propagate exactly the same dogma of radical individualism and radical egalitarianism they learned in their youth. Only to much, much greater effect. Bork writes: "It was a malignant decade that, after a fifteen-year remission, returned in the 1980s to metastasize more devastatingly throughout our culture than it had in the Sixties, not with tumult but quietly, in the moral and political assumptions of those who now control and guide our major cultural institutions. The Sixties radicals are still with us, but now they do not paralyze the universities, they run the universities." Bork devotes much of his book to a survey course in our cultural horrors: a Supreme Court intent on imposing its egalitarian, individualist ideas on a benighted society; a bureaucracy that feels the same way; a popular culture that wallows in obscenity, degradation, and rape-and-murder fantasies that desensitize to violence those whom they don't incite to it; a justice system that has lost faith in the idea that it is right to punish criminals; a sexual revolution yielding rampant illegitimacy and convenience abortion; a " gender" feminism and multiculturalism that decry reason as oppressive; a race- based spoils system according to which individual merit is subordinated to group identity; and more. How dark is Slouching Towards Gomorrah? This dark: "At another conference, I referred, not approvingly, to Michael Jackson's crotch- clutching performance at the Super Bowl. Another panelist tartly informed me that it was precisely the desire to enjoy such manifestations of American culture that had brought down the Berlin Wall. That seems as good an argument as any for putting the wall back up again." And this dark: "We are, then, entering a period of tribal hostilities. Some of what we may expect includes a rise in interethnic violence, a slowing of economic productivity, a vulgarization of scholarship (which is already well underway), and increasing government intrusion into our lives in the name of producing greater equality and ethnic peace, which will, predictably, produce still greater polarization and fractiousness." And this dark: "Sir Henry Maine made the point that, looking back, we are amazed at the blindness of the privileged classes in France to the approach of the Revolution that was to overwhelm them. . . . Yet we seem at least as sanguine about the prospects for democratic government as were Maine's contemporaries." Bork offers little hope, though along the way he recommends such measures as censorship of obscene and pornographic speech and allowing Congress to vote to overturn Supreme Court decisions. At the end, he avers that the " pessimism of the intellect" still allows room for the "optimism of the will." But he doesn't sound persuaded himself, and the optimism here sounds more like religious consolation than a program for action. Are we, then, finished? Bork won't let us take any comfort from the fact that, for example, most of popular music is merely pleasant -- and has no truck with the derangements of the rapper Tupac Shakur. We delude ourselves, he believes, if we base an assessment of our condition on a sugar-coated view that does not take into account the extremes of the degradation we allow. But the act of keeping the spotlight focused so unforgivingly on the extremes also foreordains Bork's gloomy conclusion. In fact, he allows into evidence a couple of points that, though he does not explore them, offer some measure of surcease from all this sorrow. In the course of detailing the riot of political correctness currently disfiguring campus life and curricula, he notes, "But a student who rejects the criteria by which our society judges achievement is himself handicapped, probably for life." And though he laments a loss of national identity and deplores the tribalization of American life, he also observes, "Immigrant parents want their children to learn English and become Americans."
http://www.weeklystandard.com/Content/Protected/Articles/000/000/008/062gnmpc.asp?page=2
dclm-gs1-183750000
0.106156
<urn:uuid:db6fe474-6239-4b66-922e-a8a8a3cfb72d>
en
0.964172
WHSV - Community - Headlines Graffiti Clean-Up By: Shane Symolon Email By: Shane Symolon Email Evidence still remains of a vandalism spree a month ago in Waynesboro, because some businesses still have not cleaned up. Waynesboro Police say it’s a constant problem. A month ago NTelos customers were greeted with Swastikas on the doors. Two days later, Mike Minnis says their building was clean again. "You don't want to have anything that might be offensive to your customers or your employees. So getting the graffiti down as quickly as possible was really important," says Minnis. Sgt. Kelly Walker, Waynesboro Police, says the department agrees, because it helps keep crime away from the area. "The quicker you clean it off, the less likely it is to reoccur. That's not to say it won't reoccur, but clean it off every time it happens. It shows pride, that you have pride in that piece of property," says Walker. Some businesses haven't cleaned up graffiti for more than a month. Justin Roadcap works for Mr. Auto Disposal and says their fences have been vandalized five times. He says they clean it up, but sometimes it takes time, because it happens so often. "It just keeps happening. It takes a while. The cleaning process we use takes a while, and finding time to do it," says Roadcap. Walker says police can't make businesses clean because they're on private property. "I understand not every property owner has the resources to clean it up every time it happens, but I would encourage them to make that a priority," says Walker Police suggest that businesses ask their insurance company to help pay for cleanup costs, but small graffiti may not be covered. Police ask that if you have seen graffiti that hasn't been cleaned up for a long time on public property to give them a call. They say most likely the vandalism was never reported. powered by Disqus WSVF Public Inspection File
http://www.whsv.com/community/headlines/12639761.html
dclm-gs1-183760000
0.045964
<urn:uuid:3eaba882-80aa-4217-966c-8e59bb5b7284>
en
0.669572
Não foi possível encontrar o iTunes no seu computador. Para baixar o app gratuito Recipes menu de Killer01, obtenha o iTunes agora. Eu tenho o iTunes Download grátis iTunes para Mac + PC Recipes menu De Killer01 Abra o iTunes para comprar e baixar apps. In the modern increasingly delicate life, “eat” conveys more and more contents. People also have a more and more higher request of “eat”. So, there are so many people would like to evoted themselves into tasting all kinds of delicious food in the restaurants, which is also can satisfy their pursuit of the food. But the restaurants are not the best choice for them not only from the health but also from the economic aspect. Therefore, is it possible to cook those delicious food at home?? This book is designed from the point of view of practical and convenience, and classified ingredients according to the food. The book can be divided into cold dishes, aquatic products, pork, beef and mutton, birds and other meat, vegetables, eggs and bean products, soup pot, sweets and snacks, staple food 10 categories, which contains almost common ingredients in the daily life. So you can instantly find out all the relevant delicacies from the directory no matter what kind of dishes you want to cook. In the choice of the dishes, it emphasizes “ delicious, easy to cook, and benefits”. There are more than 530 dishes that including north and south flavor home cooking in this book, each dish all have its special features including selection, methods, characteristics all have detailed and accurate description. In order to provide more cooking experience to you, we also provide some other columns like “cook Yi Dian Tong” and “kitchen tips”, so that you can be more handy in the actual operations. The food producer of this book is Mr. Zhang, a very famous Chinese cook. He has been a cook for more than 30 years and has much experience in cooking. With the help of Mr. Zhang, we believe your cooking skills can be improved to another more professional level, so that you and your family can enjoy the delicious food to the fullest. Novidades da versão 3.0 Adding more recipes Captura de telas Captura de tela do iPhone 1 Captura de tela do iPhone 2 Captura de tela do iPhone 3 Captura de tela do iPad 1 Captura de tela do iPad 2 Captura de tela do iPad 3 Recipes menu Ver no iTunes Este app foi desenvolvido para iPhone e iPad • Grátis • Categoria: Gastronomia e bebidas • Atualizado: 24/04/2012 • Versão: 3.0 • Tamanho: 84.1 MB • Idiomas: Alemão, Inglês • Vendedor: Wan Yu Tang Compatibilidade: Requer o iOS 4.0 ou posterior. Compatível com iPhone, iPad e iPod touch. Avaliações de clientes
https://itunes.apple.com/br/app/recipes-menu/id505904466?mt=8
dclm-gs1-183850000
0.071338
<urn:uuid:39f966ad-0a41-4920-b602-a5f311a7603c>
en
0.652713
[Bug 433644] Review Request: perl-Algorithm-CurveFit - Nonlinear Least Squares Curve Fitting bugzilla at redhat.com bugzilla at redhat.com Mon Feb 25 04:59:07 UTC 2008 Please do not reply directly to this email. All additional Summary: Review Request: perl-Algorithm-CurveFit - Nonlinear Least Squares Curve Fitting panemade at gmail.com changed: What |Removed |Added Flag|fedora-review? |fedora-review+ ------- Additional Comments From panemade at gmail.com 2008-02-24 23:59 EST ------- + package builds in mock (development i386). koji build=>http://koji.fedoraproject.org/koji/taskinfo?taskID=466864 + rpmlint is silent for SRPM and for RPM. + source files match upstream url 7de2637286628510aad586260ebcd2b4 Algorithm-CurveFit-1.03.tar.gz + package meets naming and packaging guidelines. + specfile is properly named, is cleanly written + Spec file is written in American English. + Spec file is legible. + dist tag is present. + build root is correct. + license is open source-compatible. + License text is included in package. + %doc is present. + BuildRequires are proper. + %clean is present. + package installed properly. + Macro use appears rather consistent. + Package contains code, not content. + no headers or static libraries. + no .pc file present. + no -devel subpackage + no .la files. + no translations are available + Does owns the directories it creates. + no scriptlets present. + no duplicates in %files. + file permissions are appropriate. + make test gave All tests successful. Files=3, Tests=9, 1 wallclock secs ( 0.80 cusr + 0.05 csys = 0.85 CPU) + Package perl-Algorithm-CurveFit-1.03-1.fc9 => Provides: perl(Algorithm::CurveFit) = 1.03 Requires: perl >= 0:5.006 perl(Carp) perl(Data::Dumper) perl(Exporter) perl(Math::MatrixReal) perl(Math::Symbolic) perl(strict) perl(warnings) More information about the package-review mailing list
https://lists.fedoraproject.org/pipermail/package-review/2008-February/067398.html
dclm-gs1-183860000
0.982437
<urn:uuid:0cb511be-d32c-4c0c-99a2-65fce36e40e5>
en
0.898843
"literal" objects Francis Avila francisgavila at yahoo.com Wed Dec 24 10:32:34 CET 2003 Moosebumps wrote in message > int a; > float b; >} mystruct; >mystruct x = { 3, 5.0f }; >mystruct y = { 5, 15.0f }; >These are just "data". Obviously in python you could just write an init >function like this: >x.a = 3; >x.b = 5; >y.a = 5; >y.b = 15; Obviously? I have no idea what the above snippet is supposed to correspond to in Python. A class is like (using like in a very, very loose sense here) a struct, not like an instance of a struct. I'm really streching the C analogy in every possible way, but that much is at least sorta true. The equivalent Python to your C code is: class mystruct(object): def __init__(self, a, b): self.a = a self.b = b x = mystruct(3, 5.0) y = mystruct(5, 15.0) Is this what you consider inelegant? If it's too over-engineered (!) for you, use a more basic data type, like a dict (as you suggest later). Or you can simply bypass init and assign directly: x = object() x.a = 3 x.b = 5.0 But since you *know* the struct's structure, you might as well use __init__ to formalize it. And you're still executing object's __init__, anyway. >And that would work fine, but the programmer in me says that that's a >inelegant way to do it. Why execute code when all you need is to put data >in the program? The programmer in you is optimizing prematurely and/or trying to turn Python into C. :) The point of classes are to package data and a set of operations proper to that data. C doesn't have classes (although similar concepts can be emulated with structs and function pointers). Python uses them liberally. However, one would rarely have such a bare class that's simply holding two attributes; it would also implement methods that operated on the data it held. If all you want to do are hold two numbers efficiently, use a list/tuple or somesuch, and access them by index instead of name (if the name doesn't matter). Or see below. >A thought that occured to me is that classes are implemented as >(correct?). So you could have a dictionary like this: No. Classes are objects. Dictionaries implement attribute access to objects (i.e. namespaces). >x = {'a': 3, 'b': 5} >y = {'a': 5, 'b': 15} >This would be the __dict__ attribute of an object I suppose. But I don't >see anyway to assign it to a variable so you could access them like x.a and >y.a. I don't know if this would be a "nice" way to do it or not. What you're asking for is a "bunch". It's a common cookbook recipe: class Bunch(object): def __init__(self, **kwargs): Use it like x = object() above, except you can preinitialize name/value x = Bunch(a=3, b=5.0) print x.a # 3 x.z = 'new attribute' Be careful not to clobber attribute names (object only has __*__ special names, so you don't need to worry too much). The moral of this story is that your question is too abstract. What your data structure should look like depends on what purpose it has, how it is used, and what requirements it must fulfill. Python can produce *much* richer data structures than C, what with OO and all, so there are many more possibilities than simply a C struct. Further, C is radically different from Python, so it's not healthy to try and make Python conform to your C expectations. For one, C is a compiled language, whereas Python is bytecode interpreted. In C, struct only exists to the compiler and to you--it is an entirely logical construct used to make coding easier; it, variable names, etc, *cease to exist* when they are turned into code. This makes C very tight and efficient. But in Python, even down to the bytecode, name lookups are done, classes and functions are *real things*, etc. This makes Python very powerful and far easier to use, but you give up speed. However, you rarely *need* the speed, and there are always ways of getting alot of it back. >Question 2: >If "subfolder" is a folder under "basefolder", and basefolder contains >"base.py", and subfolder contains "sub.py", how do I import sub.py into >base.py? From what I can tell so far it only works if the files are in the >same directory. I need to be able to do this without modifying any >environment variables or anything. Because the scripts will be run on many >different machines and I have no way of automatically configuring them. Any directory which contains a file called __init__.py is a package. If you create such a file in subfolder, you can import sub from base.py as import subfolder.sub as sub from subfolder import sub will both put sub into the current namespace. See the bottom of the page on the import statement in the Python Language Reference. Francis Avila More information about the Python-list mailing list
https://mail.python.org/pipermail/python-list/2003-December/213379.html
dclm-gs1-183870000
0.921733
<urn:uuid:c4ec82a2-5836-4839-ae38-9dbf72b486a3>
en
0.948658
Shared publicly  -  I wonder how long before the BSA backs down. Mace Moneta's profile photoRob Roschewsk's profile photoDenise Malia's profile photoMike Gaston's profile photo I can understand the need to be smaller; there probably aren't a lot of people that can believe they are moral and ethical while also being hateful and oppressive.  Wow, I did a double-take there for a moment: the troop number reference in the signature at the bottom of that letter (Troop 261) is the same as my own troop number when I was a scout.  My first guess, though, is that the number was long-ago reassigned to a different location after our troop in Bergenfield NJ disbanded. Add a comment...
https://plus.google.com/+MaceMoneta/posts/6NaTtwpqhfh
dclm-gs1-183890000