text
stringlengths
8
5.74M
label
stringclasses
3 values
educational_prob
sequencelengths
3
3
Western Australia coach and former Australia batsman Justin Langer has touted Mitchell Marsh as an Australia captain of the future, while declaring the national selectors should include him in the team for the third Ashes Test in Perth on what is likely to be a pancake flat WACA Ground pitch. 'I've never seen Shaun bat better' Shaun Marsh has vindicated Justin Langer's assertion that the left-hander was in the form of his life ahead of the Ashes series, in which he has played vital innings in each of the first two matches. "There's plenty of critics of Shaun Marsh out there but as I said for the last three months, I've never seen him bat better," Langer said. "I've known him since he was a little kid, I've never seen him bat better, he's relaxed, he's playing well his innings - if you think about that in the context of that last Test match, when the wicket was really tough to bat on, it was an absolutely brilliant innings. "It wasn't that long ago in India that he was called the superman of Australian cricket , when he batted through the day with Peter Handscomb to hold off for a draw. We know what he can do and if you actually look at this numbers - in terms of conversion of 50s or 100s, in his brief Test career so far - he's unbelievable. He's a gun player. "Shaun's record over the last few years in domestic cricket for WA has been unbelievable. When you look at his numbers, and you see his performance - players have to get rewarded for performance. And if you look at his numbers he deserves to get selected. I say the same with Mitch now - he's scored nearly 1000 runs for the season, he's bowling again, he's captaining the side, he fields well in the slips. On pure performance, they deserve to get selected." While typically hesitant to change a winning team, Langer said that the likely conditions for the Perth Test meant that Australia would need a fifth bowling option and that Marsh was ready to step in, having returned to the bowling crease after shoulder surgery. He has also been in outstanding touch with the bat as captain of Western Australia. Should Marsh play, he would more than likely take the place of the Victoria batsman Pete Handscomb, who has been struggling for runs and technical cohesion at No. 5 so far in this series. The next question would be where Marsh sits in the batting order, either at No. 6 where he batted previously or perhaps at No. 7 beneath the wicketkeeper Tim Paine, with greater licence to freely attack the bowlers. "Australia are 2-0 up in the Ashes, I never like to change a winning team," Langer said in Perth. "That said, if there's any concerns about any of the bowlers and if the wicket looks anything like what we've played on in the last two Shield games here then you'd definitely like to have another fast-bowling option I think. Because spin-bowling doesn't usually have the impact here as it does other grounds. So maybe Nathan Lyon won't have the same impact he's had in Adelaide and Brisbane. "Mitchell Marsh, like a lot of young players, you get in early then part of the journey is you get dropped. Then you've got a choice to make, you can either fade away or get better. The last three months he's probably scored 1000 runs for Western Australia - if you look at the JLT Cup, he was unbelievable. His presence at the crease, like his brother, was sublime in the one-day tournament. He's come out, got 400 or so runs in Shield cricket so far. He's got 190 here at the WACA where the Test match is, so he's going from strengths to strengths. "He's also captain of Western Australia now, showing great leadership and doing a very good job of that. And he's bowling again, so you can understand it's zero surprise to me, as it has been throughout his whole career, that he's an attractive player for the selectors. It's a no-brainer really. Whether he forces himself into the team, time will tell. From an absolutely biased Western Australia cricket coach point of view, I hope he does but it means someone will have to miss out - and probably nobody deserves to miss out when they're 2-0 up time will tell, but he's certainly done everything he can to knock hard to get into the team." Mitchell Marsh sends down a delivery Getty Images Having made the choice to elevate Marsh to the captaincy in the off-season, Langer said he had expected the allrounder to be a popular leader in the dressing room but that he had been pleasantly surprised by the 26-year-old's tactical sharpness. "He's probably exceeded expectations actually, he's really taken it on," Langer said. "I knew he's a very popular person. And sometimes leadership isn't a popularity contest - and he'll keep growing into that, but I've been really impressed with him strategically on the field. "But he's seen a lot of cricket, he's been in cricket change rooms almost literally since he was born. He's seen a lot of cricket, and I should probably have never underestimated that, but he's strategically very good. And he's been excellent on and off the field. The captaincy and leadership is going to be a big part of his re-emergence in international cricket." Langer revealed that he would speak with the WACA curator Matthew Page and suggest to him that the pitch be left with some decent grass coverage to encourage some movement off the pitch and through the air. The sight of the ball moving around during the day-night Test in Adelaide excited Langer due to the even contest between bat and ball - something he views as key to the future of the game's longest format. "The last few games it's been flat. I hope Pagey [curator Matthew Page] leaves some good green grass on it, that way it usually swings a bit which is great for the game of cricket and it usually carries through to the keeper, so the slips come into the game," Langer said. "I hope that happens, I'll probably tell Pagey that. I haven't been out there yet, I hope it's a great contest. "In terms of a bigger picture discussion, Test cricket will thrive and grow and live forever if we get the wickets right. And people might think I'm crazy but if they get the wickets right around the world in Test cricket, we were all enthralled watching that last Test match at Adelaide Oval. Pink ball under lights but it was actually swinging and really good players like Shaun Marsh could get 100s. I hope it's a wicket where there is an even contest between bat and ball, if you do that, people will be glued to their seats at the ground or at home. It makes for a great contest, that's what Test cricket is all about. "The last Test was absolutely enthralling. We were playing at the MCG all day then we'd go back and watch cricket for the next three or four hours, it was brilliant cricket. It goes to show how important one, day-night cricket is, [it's a] great success. Two, how important getting the wickets right are, when you play on wickets where there's contests, then Test cricket will thrive and grow if we can continue playing Test matches like the last one it's really exciting cricket, but 9-1 [record] so traditionally Australia are very hard to beat here at the WACA. Id' rather be in Australia's shoes than England's shoes."
High
[ 0.658653846153846, 34.25, 17.75 ]
Q: CiSvc Service not found on Windows Server 2012 while installing CRM 4.0 While installing CRM 4.0 on Windows Server 2012, I'm receiving an error: Service cisvc was not found on computer 'DVWEB03'. The specified service does not exist as an installed service The thing is that on Windows Server 2012 doesn't have a CiSVc service. Unlike Windows Server 2008 & 2003 Is there a workaround? A: Be aware that CRM 4.0 doesn't support Windows Server 2012 - see list here. Once you'll solve this one you can get few more other issues. Cicvs is File Indexing Service. I'm not sure if you don't have it installed or it's called different name on Windows Server 2012.
Mid
[ 0.6320754716981131, 33.5, 19.5 ]
I was told by 2 servers and the owner that i could not get gluten free fried rice as the rice is already made. Some servers have an idea regarding gluten free and others “no idea”. One asked me if I wanted to substitute the egg roll for a spring roll. They should offer a dedicated gluten free menu and inform their staff. This is so great if you are just gluten sensitive, but they straight up lie about saying things are gluten free, when they actually are fried in the same fryer as all the gluten stuff. We had a server say it was definitely without a doubt gluten free, Hubby got sick, didn't think it was this because they act e SO sure.... But next time we came back and another server informed us we were lied to the other time...... **Cross Contamination Risks** I had high hopes for this restaurant when I went a month ago (Jan. '15) and was told I could get the Sesame Chicken and Fried Rice made gluten free. I was sick for almost a week after but did not initially think it was from here because I had been assured my food was safe and thought maybe I just ate too much. I went back on 2/18 and told my waitress I could not have gluten. She asked on a scale of 0-100%, how much could I not have it and I told her 100% no gluten. She said she could help me through the menu and I told her I would like the Sesame Chicken and Fried Rice. She told me she could not let me have the Sesame Chicken because although the ingredients were gluten free (cornstarch to fry instead of flour), she knew that they were fried in the same "fryalator" as the gluten containing Sesame Chicken. I told her that I had ordered it here before and how could patrons not be made aware of this and she said it was probably because most servers think it's gluten free just because the food itself is gluten free and don't think about cross contamination. I asked if I could have a grilled version instead and she said they don't have a grill, so it was not possible. I am so glad I got her as my waitress and spoke with management to let them know they need to either fry in a different location or stop telling people it's gluten free. Had I had an allergy, and not Celiac, I could have died the first time I dined there. I ended up not eating dinner there because the friend I was dining with felt bad so we went somewhere else, so I cannot comment on that but wanted to get the word out because maybe that's why it is a "hit or miss" or why some have gotten very sick and some haven't. After reviewing my food journal from the week the first time I went, I saw the pattern of eating that meal and getting sick all 3 times (I had 2 days of leftovers). Honestly.. Hit or miss. They don't have a gluten free menu, I've had waiters that knew exactly what I was talking about when I said gluten free and others who were clueless. I've had very positive experiences with the food when I ate there, on the other hand I wouldn't suggest take out. Everytime I've had take out from there, I've found out my meal was in fact not gluten free.. After I ate it.
Low
[ 0.515151515151515, 29.75, 28 ]
This is a high severity defect that would allow a malicious TLS server to serve an invalid wildcard certificate for its hostname and be improperly validated by a Node.js client. This is due to a flaw in the validation of *. in the wildcard name string.
Mid
[ 0.554890219560878, 34.75, 27.875 ]
Michigan StateNCAA Football Tickets Ticket America is your premier source for all of your MSU football seating. We carry home as well as away games and specialize in giving our customers the most selection at the best prices. We carry NCAA football tickets for all cities and can get you seats for any and all bowl games. Be there for all this year's action filled games, as this may become one of the most exciting seasons in recent years! Ticket America selles tickets for Michigan state University, we promise outstanding service. If you have any questions or would just prefer to order over the phone please let one of our sales staff assist you in your buying experience by calling 1-800-842-9750. 2012 MSU Football The Michigan State Spartans of the Big Ten finished the 2011 season with an impressive 11-3 record, and a three-overtime 33-30 Outback Bowl win over then #16 Georgia. Michigan State won the Big Ten's Legends Division last season, with a 7-1 conference record. Highlights of the 2011 campaign included victories over strong conference rivals Ohio State, then #11 Michigan and then #6 Wisconsin.Among the key returning players for the Spartans are running back Le'Veon Bell, running back/kick returner Nick Hill, kicker Dan Conroy, linebacker Max Bullough, linebacker Denicos Allen, linebacker Chris Norman, safety Isaiah Lewis and defensive end William Gholston.Michigan State has several quality recruits joining the team this coming season, including wide receiver Monty Madaris (Ohio), multi-position athlete Demetrious Cox (Pennsylvania), wide receiver Aaron Burbridge (Michigan), offensive guard Ben McGowan (Ohio) and safety Mark Meyers (Ohio).The 2012 Michigan State schedule features a number of great matchups, among them are a primetime game to open the season against Boise State on August 31, a non-conference battle against Notre Dame, and Big Ten duels against the likes of Ohio State, Michigan and Wisconsin. Come on out and enjoy an afternoon or evening of college football at Michigan State's Spartan Stadium in East Lansing, Michigan. Get your tickets today! Order Tickets in Three Easy Steps: 1. Browse our extensive inventory of Michigan State football seats. 2. View a seating chart online for the Spartan Stadium in East Lansing. The Michigan State Spartan program has improved to the point where they are solid Big Ten title contenders on an annual basis. The Spartans capped off a successful season in 2011 with a win over Georgia in the Outback Bowl. Michigan State used a balanced attack on offense with quarterback Kirk Cousins and a tough defense to reach the Big Ten title game. The Spartans suffered some serious graduation losses especially on offense. Replacing the losses on offense will be the key for the Spartans in 2012. They have to replace Kirk Cousins, their two top receivers BJ Cunningham and Keshawn Martin, plus backs Todd Anderson and Edwin Baker.A plus is that running back Le'Von Bell is back he rushed for 948 yards and 13 touchdowns. The defense returns nine starters and will have to carry the load early in the season until the offense can find its stride. Defensive lineman William Gholston and Marcus Rush are All Big Ten candidates. We have the worlds largest selection of premium seating to sold-out events, including the NBA, NFL, NHL, NCAA football and basketball . Ticket America is the Internets best source for premium concerts, sports, and theater tickets. Since 1998, Ticket America has provided consumers a safe and easy way to purchase tickets to the world's top events.Questions? Call us. 1.800.842.9750 The premier source for some of the biggest events including the Superbowl, World Series, and the Final Four.
High
[ 0.679611650485436, 35, 16.5 ]
Q: Soroban Abacus - how to memorise? I saw a video where Indian kids where fiddling fingers in the air and working out big sums. WOW I thought. I researched loads and have figured out that it's all based on using the Soroban Abacus (a Japanese abacus if you don't know). I got a little program on my Android phone and have mastered using the Soroban Abacus. BUT the bit I am missing is how they keep the abacus mentally pictured in their heads?? I'm sure I could try to remember myself and keep in my head - but I'm assuming there is some methodology behind how the kids do it. These little kids seemed to be on over drive adding about 10 2 digit numbers in lightning speed. Old kids did even better. Anyone know? Thanks Omar A: Yes, I learned this method when I was 6 years old. You have to first practice with a real abacus, and once you practice enough, you will eventually to be able to do it in your head. I can do multiplication like $563*471$ in my head, but many people who are better than me can do even harder problems.
High
[ 0.691616766467065, 28.875, 12.875 ]
The question is, which students outperformed… and which seriously underperformed. Now, the article is almost correct when it states, “40% of New Orleans students who took one or more AP exams scored a three or above, compared to 35% of students statewide.” So far, NSNO is not shaping the story in favor of all-charter New Orleans. On the state level in 2018-19, 20,819 students took at least one AP exam. Of those, 7,305 (35.1%) scored 3+. (See data here.) In New Orleans in 2018-19, 2,150 students took at least one AP exam. And of those, 880 (40.9%– roughly 41%, higher than the 40% reported by NSNO) scored 3+. But then, the article continues: Congratualtions to the top New Orleans public high schools for the percentage of students scoring a three or above on AP exams! In order to create a list of the top four New Orleans high schools scoring 3+ on the AP exam, NSNO had to know that only two of the 19 New Orleans high schools scored above the state average high enough to make up for the rest. Notice also that NSNO does not include details regarding the performance of those top four high schools. To do so would be to reveal quite a bit that is unflattering to the New Orleans AP success promo. Allow me: Ben Franklin: 502 out of 594 students (84.5%) scored 3+ Lusher: 273 out of 409 students (66.7%) scored 3+ KIPP Renaissance: 41 out of 136 (30.1%) scored 3+ NO Maritime Academy: 27 out of 110 students (24.5%) scored 3+ Sooo, two schools– Ben Franklin and Lusher– are carrying all 19 New Orleans high schools to produce a mean of 40.1% scoring 3+ on 2018-19 AP exams. Ben Franklin and Lusher happen to be the two New Orleans high schools that 1) are preferred by white students and 2) serve few students considered “at risk” due to factors including low income (25% and 17%, respectively, in 2017). Two of the “top schools” featured in the NSNO AP spiel– KIPP Renaissance and NO Maritime– weren’t even close to the state average of 35.1% and actually served to pull the NO average downward. But that’s okay so long as NSNO withholds the details because the sheer number of students scoring 3+ from Ben Franklin and Lusher (502 + 273 = 775) accounts for 88% of that 2018-19 “New Orleans AP success” (775 from Franklin and Lusher scoring 3+ / 880 in NO overall scoring 3+ = 88%). But what about the remaining 15 New Orleans high schools whose AP results NSNO certainly cannot feature? International High School of NO: <10 took AP exams (no percentage reported for 3+ scoring) For NSNO, the beauty of this PR scam is that the mean is a measure of central tendency that allows for a couple of stellar results to lift (and therby conceal) numerous less-than-stellar results. In such cases, the median, or middle-ranked score, is more telling. In the case of New Orleans high school 2018-19 AP results, the median score is Eleanor McMain, at 6.7% of its students scoring 3+. Too, there is the mode, or most frequently occurring score, which in the case of the percentage of New Orleans high school students scoring of 3+ on those 2018-19 AP exams happens to be “less than or equal to 1%.” Let’s put all of those measures of central tendency together, shall we? In 2018-19, the mean percentage of New Orleans students who took AP exams scoring 3+ on those exams was 40.1%. However, the median (middle-scoring) percentage was 6.7%, and the mode (most frequent) percentage was less than 1%. That can only mean a small subset of New Orleans high schools have carried that overall 40.1%, which is exactly what happened. Thus, a more fitting title for the NSNO AP-success article is, “New Orleans Students at Two Notably White and Under Risk High Schools Outperform the State to Such a Degree That They Conceal the Incredibly Poor Performance of the Overwhelming Majority of New Orleans High Schools.”
Low
[ 0.48689138576779006, 32.5, 34.25 ]
(indieWIRE: 11.26.02) — Before Alexander Sokurov made “Russian Ark,” great single shot sequences — like the openings of Orson Welles‘ “Touch of Evil” and Robert Altman‘s “The Player,” the Copacabana scene in “Goodfellas,” or any number of shots orchestrated by the late, great Andrei Tarkovsky — rarely lasted more than five or six minutes. But now, thanks to talent, technology, and overwhelming ambition, all previous marks have been shattered with “Russian Ark,” the longest interrupted shot in film history and the first feature film ever to be shot in a single take. “Russian Ark” takes in St. Petersburg’s legendary Hermitage museum and consists of one continuous 90-minute shot that traverses 300 years of Russian history. The protagonists are a time traveler, whose subjective vantage point is represented by the camera’s point-of-view, and a nameless 19th century French diplomat, who acts as our tour guide. More than 1,000 actors and extras appear in the film, which culminates in a spectacularly choreographed ballroom dance sequence. “Every time I did the take, or someone else made a mistake, I would curse, and that would have gotten in, so we did the sound later.” Indeed, while Sokurov may be the driving creative force behind the film, cinematographer Tilman Buttner is its technical muscle. Long-known as one of Europe’s top Steadicam operators (he was responsible for chasing Franka Potente around in Tom Tyker‘s “Run Lola Run“), Buttner was faced with the daunted task of supervising the crew’s extensive pre-production rehearsal period — which included several mid-shot lighting and set changes — and then operating the custom designed HD camera, which recorded the film’s images onto hard disk. indieWIRE senior editor sat down with Buttner at the Mayflower Hotel during this year’s New York Film Festival, where the cinematographer discussed his role in the making of this historical film. Wellspring Media will release “Russian Ark” on early in December. indieWIRE: I want to commend you on this film. On its technical merits alone, it’s one of the most impressive movies ever made. You were doing something that no one had done before, and it’s scope so ambitious. How did you get involved? Tilman Buttner: Two years before the filming began I was approached by the producers, who asked me if I was interested to do a film with Alexander Sokurov in very few takes, possibly just one. iW: How did you react when they brought up the possibility of only one shot? Buttner: I was delighted that someone had the courage to do something like that. Sokurov’s desire was to make it the highest technical quality available. I was also very interested in the highest quality of the photographic image. Originally, Mr. Sokurov wanted to film with a Mini-DV camera. It was cheaper, but this camera could only handle 90 minutes. That wasn’t possible then with a professional video camera. But I was acquainted with a technology company that were developing high definition cameras for Sony called Director’s Friend, and I contacted them Buttner: I suggested to the producer that this was the only camera with which to make the film. It was brand new and we made several tests on it. The video material was similar to 35mm; we were very convinced with the quality of it. One major problem was the time, because there were no cuts allowed. One shot, one take, no cut. Therefore, a special hard drive was developed. iW: What did the Director’s Friend do? Buttner: It recorded onto hard disk and recorded uncompressed HD images. It’s one terabyte of storage that holds of 90 minutes. It was a great risk to work with it, because it was never done before! iW: What if it broke or malfunctioned? Could it be replaced? Buttner: There was a back up, in case the first one was broken. I built myself a special Steadicam system. iW: You were the only camera operator? Buttner: Yes… iW: When Sokurov began writing the screenplay for the film, did he consult with you on what was possible or impossible to do? Buttner: The script was already finished, but during rehearsal time we discovered that Sokurov’s concepts were not possible. He would walk with me and told me, “You are the camera. You have the camera and you have the freedom.” He wouldn’t hinder my filming — he was very considerate in that respect. iW: Once you finished the script and got the camera, how did you go about filming the shot? Buttner: In the seven weeks I spent at the Hermitage, we walked the route of the camera five times. Only five times in seven weeks. We talked about the picture, and discussed the route of the Hermitage, because you constantly have to think where to hide the lighting. We started on December 23 in St. Petersburg, and we only had four hours to film because they wanted to use the natural light. iW: After you had the route planned, and you knew where the extras would be, once the camera went into a new room, you had a set of people and a crew preparing the room for when you went back in. How did you make that work? Buttner: That was one of the most important things we had to work out, because that was one of the things that Sokurov feared most. There was a fear that the audience would tire out if it: the same route going into one room from another. There was a rehearsal for those transitions, which were done in the last week before filming began. They were the first rehearsals with all the actors and the main character, the Marquis. Other than that, there were no complete rehearsals, not for the actors, the extras, the crew, no lighting rehearsal. iW: You didn’t record any sound, right? Buttner: No, that was done later. Every time I did the take, or someone else made a mistake, I would curse, and that would have gotten in, so we did the sound later. iW: Back to the actual shoot: You had four hours to shot, so did you have one chance or two to shoot? Buttner: One chance. iW: That’s what I thought, because once you start, it must take hours to set everything back up. Buttner: Yes, and because of my physical endurance, I could only do one take. The system I was carrying weighed 35 kilograms [77 pounds]. iW: How did you train for it? Buttner: Working with the steady cam since 1988 was the best preparation. The producer was afraid that it might be too much stress for me, so he recommended that I join a gym to get in shape. I was already enrolled, but never went, so the producer joined as well, to oversee my workout. In the end, he was there more than I was. I had a very odd schedule, so they were never there at the same time anyway. “The producer was afraid that it might be too much stress for me, so he recommended that I join a gym to get in shape. I was already enrolled, but never went, so the producer joined as well, to oversee my workout. In the end, he was there more than I was.” iW: How many extras were used in the film? And how many crew members? Buttner: There were 1300 extras and 186 actors. My crew included 10 for the camera and recording system, 14 lighting men, and 22 assistant directors. The ADs were most important because they rehearsed with the single actors and extras in factory hall, never in the Hermitage. I want to clarify that when we said that we didn’t have a rehearsal that means no full dress rehearsal. The dancing, the waltz, the hundreds of people at the ball, these were rehearsed with the AD. iW: There is this feeling, when you are watching the movie of how important this film is, how it’s making history. As you watch the film, I couldn’t believe you were able to do this.. It’s very exhausting to watch. You hope nothing bad happens. At the end, you can see that the Marquis [Sergei Dreiden] is exhausted, but there is a moment of exaltation that you can see on his face, this expression of relief that it was pulled off. I was also wondering what you, Sokurov, and Dreiden must have been thinking? Buttner: Sokurov intended for the actor to portray this feeling of working at something for years, and now it’s over. But at the same time it was intended to show relaxation and relief. It was an improvisation, but it didn’t look improvised, it fit perfectly. It was really a challenge, because I had to see everything. I had to see the actions of the actors, and view all the extras, which was difficult, because I had never seen them before, because I had never been to any of the rehearsals. I had to be flexible, but the film was not supposed to show any kind of distraction. iW: Once you finished the shot, how did you feel? Buttner: I was thoroughly exhausted, and at that moment I didn’t feel totally satisfied, I had known of tiny mistakes that had happened of which only Sokurov and I were aware. He was not satisfied either. He had to speak the crew, but at the same time direct the actors, sometimes it was not as synchronized as he wanted it to be. iW: Have you and Sokurov changed your minds? Are you now satisfied with the film? Buttner: For a conventional film you have between 40 and 80 days of filming, minimum, it’s almost impossible that small mistakes won’t happen. I knew that they would have to correct things in post-production, since 45 rooms had to be lit in 26 hours, That’s why they knew from the beginning that the finest shades of lighting would be difficult to achieve. They had to create a light to make it possible for them to work with the imperfections and clarify them in post-production. iW: Would you do a film like this again? Buttner: It all depends on the director and the story, and more time for rehearsal. Yes, maybe. But I would want to do something completely different, more traditional. This was more like a play. I would like to do a more dramatic film. “Shades of Blue” is over, but Lopez’s “World of Dance” continues as a big hit for NBC. As she winds down three years of both her drama series and her Vegas residency, here’s what’s next for the superstar.
Mid
[ 0.618811881188118, 31.25, 19.25 ]
Q: Buffered Reader/Writer flushes files I'm trying to create a method that replaces every line in my file with a given. Instead it just makes the file empty. Care to take a look and see what is up? Thanks. try { FileReader fr = new FileReader(chooser.getSelectedFile()); BufferedReader reader = new BufferedReader(fr); FileWriter fw = new FileWriter(chooser.getSelectedFile()); BufferedWriter bw = new BufferedWriter(fw); String line = reader.readLine(); Scanner scan = null; int i=0; while (line != null) { scan = new Scanner(line); ln = scan.toString() + add; bw.write(ln); bw.newLine(); i++; System.out.println(i + " pass"); line = reader.readLine(); } reader.close(); bw.close(); } catch (FileNotFoundException e) { System.out.println("Can't find the file"); } catch (IOException e) { System.out.println("Dude, it's impossibru to read."); } The i in this method is too see how many passes the programme goes through a while loop, in this case 0, it doesn't initiate a while loop at all. A: If you want to overwrite the same file with your new lines you should do first all the reading, and then all the writing. ArrayList<String> lines = new ArrayList<String>(); //start reader, go over each line while (line != null) { String newLine = //make changes to line lines.add(newLine); } //close reader //start writer //write each line to file
Low
[ 0.479338842975206, 29, 31.5 ]
Riding the “solar coaster” I’m one of two CEOs at ForeFront Power. I’m in charge of sales and development, plus Mexico and other new territories. On the sales side, the job involves getting contracts to supply power. That covers everything from securing sites for solar farms to negotiating power purchase agreements. Development is about getting permits, getting an interconnection and managing construction. Most of my time at Mitsui, I’ve worked on large-scale—or “utility-scale”—power generation projects. Community solar is an innovative business that provides solar energy to a wide range of customers who don’t currently have access to it. It’s an interesting field, and a challenging one as well. Why? Because things change so fast, particularly the regulations. In recent years, increased import duties on solar modules and changes to the rate of corporation-tax both had a big impact on us. In fact, the solar business has such a reputation for boom-and-bust that people here talk about the “solar coaster”! Anyway, it’s a business with plenty of challenges. I mean, with community and distributed solar together, we’re handling up to two hundred projects at once, all at different stages of development, from East Coast to West Coast. Bridging the culture gap I moved to Mitsui & Co. USA in 2016. It was a natural progression. I started out selling components to domestic power generation companies, went to the States to study for two years, then handled utility-scale gas-fired power generation, wind, solar and storage projects in the US, Canada and Mexico based out of Tokyo, before moving to the US in 2016. Distributed power generation in the US really came onto Mitsui’s radar in 2014. We invested in Stem Inc., an energy management services provider based in California in 2015. And it was in 2016 that SunEdison, the world’s largest solar developer, went into Chapter 11. Hearing that their C&I division was on the block, I teamed up with a colleague at Mitsui head office to negotiate to acquire it. The deal went through after six long months, and the company resumed operations under the ForeFront Power name in February 2017. For Mitsui to acquire 100% of an American company is not all that common. When I started out as deputy CEO in May 2017, I was also embarking on something completely new. ForeFront Power is an American company and a significant industry player. The employees are young, able and energetic. Frankly, there was something of a culture gap. The US style is to be aggressive and make rapid decisions, while the Japanese way is more circumspect and discussion-based. I’m not saying one approach is better, just that they’re different. Now we’ve established new processes and systems that help us meet in the middle. The business is gaining momentum and we’re rising up the league tables. People in Mitsui head office are aware of us, which makes doing our jobs easier. For my part, I see my job as listening to and supporting the frontline staff. They’re the experts and I should let them get on with it. We completed our first big projects—eight community solar projects—in New York State in 2018. With the tax equity system, you’ve got to complete the projects within the calendar year to be eligible for the relevant tax benefits. The winter of 2018 was brutal with lots of rain and snow, so our projects all suffered from overruns and things got pretty hairy. In the end, though, we managed to finish all our projects by December 28, the last business day of the year. How did we pull it off? By working together. It was an important experience for me and everyone here. It really reinforced our team spirit. Meeting the needs of today Where do I see ForeFront Power going? I want it to be a company that really delivers in terms of services for customers and financially for Mitsui, and I want it to be a fun company that serves the needs of both C&I and residential customers. Our move into the residential market was a big step toward serving regular people. We responded fast to changes in the business and regulatory environments, and to public attitudes to sustainability. And we keep on trying to do new things. We’re relatively small and young, but we’re already a frontrunner for community solar. The thing I like best about this business is the way it fits with the ongoing shift from centralized power generation to distributed and sustainable power generation. Sure, I liked the big budgets and big impact of the utility-scale projects I used to manage, but I also like how this business really fits the needs of the times and is so in tune with the zeitgeist. For example, we acquire our customers directly through digital marketing. It’s fun to move downstream and be so close to the customer like that. In California, we have a lot of public-sector customers including schools. When a project is completed, there’s an opening ceremony with a ribbon cutting. I often have to make a little speech alongside the headteacher. All the schoolkids are there and a camera crew from the local TV station turns up. That’s not just a nice experience, it also makes me feel I’m doing something special and useful. In fact, I’ve got one of those ceremonies tomorrow. I must memorize my speech! I always wanted to work in electricity generation and to work abroad. Staying in the same area for all my career means I’ve been able to build up plenty of knowledge and experience. Through a somewhat roundabout route, I’ve ended up doing what I always dreamed of.
Mid
[ 0.602739726027397, 33, 21.75 ]
A man from Telangana, who has stayed for three weeks at the Markaz Nizamuddin, the Delhi Centre of Tablighi Jamaat, expressed no surprise over the centre emerging as the newest hotspot for the coronavirus outbreak in the country. While talking to the Swarajya Magazine’s Swati Goyal Sharma, he asserted that the practices followed at Jamaat “guaranteed” that the virus would spread to other inmates. While requesting to be anonymous, the Telangana man who lived for three weeks in November last year at the Markaz building, contended that his organisation, Tablighi Jamaat, teaches its adherents to “model oneself on the life of Muhammad PBUH”. He added that the organisation teaches them to solemnly follow the tenets of the Quran and to lead his life the way Muhammad PBUH lived his. “We follow him in everything we do – the way we eat and drink, and even urinate,” he said. Johny (name changed), who requested to remain anonymous, was born a Christian but later converted to Islam in June 2019 in order to persuade his girlfriend’s family to accept him. In August, after having done with the mandatory circumcision, he joined the Tablighi Jamaat group, based on a piece of advice given to him by a “doctor”. Johny now claims that he shares a strong bond with the organisation and is deeply connected with them. However, he has problems with the way he and other inmates lived at the Markaz. He said that the news that Tablighi Jamaat centre in Delhi had turned out to be a super-spreader of the coronavirus outbreak did not set him back on his heels. - Advertisement - ‘We lived together and ate from the utensil. At a time, four of us would sit down together and eat bread, rice and curry in one big plate. We all ate from it together and without using any spoon or cutlery. Once we are done eating, we would leave the plate as it and another batch of four would come and eat in the same plate. This would continue for about 6 to 7 batches,” he said. Johny also revealed that the lavatory facilities at the centre were not up to the snuff, saying that there were few and common toilets to be shared between a large number of Muslim clerics. He said that there was no fixed count of men residing in the centre, with more than 1000 men living in the Markaz at its peak. “If you have to use the toilet, you had to wait for at least half-an-hour at any given point in time in the day. That’s how crowded the centre was,” he said. Johny claimed that during his stay at the Markaz, the washrooms with ‘Indian seats’ always reeked of bad odour, given the large number of men who used it. “However, they were washed just once a day by a cleaner,” he added. Furthermore, Johny said that the members of the organisation drew the water for ‘Wudu’, a purification ritual among Muslims where they wash their faces, hands, arms and feet with water before performing namaz, from the same small swimming pool kind of a water area in the Markaz. “The fact that all of us used the same water for Wudu, the spread of the virus is but natural,” he said. While he had some issues with the orthodox practices and teachings espoused by the organisation, he claimed that he is profoundly attached to the group because he believes that “they teach him how to live life the right way”. Talking about the orthodox teachings of the organisation, Johny claimed that the organisation proscribed its adherents from using mobile phones inside the building. “If anyone saw us using our mobile phones inside the centre, they would taunt us-‘what kind of Muslim you are’,” he said. Johny says that in January, he had a bad bout of cough, cold and fever. “I never took any pill throughout. It subsided in 20-25 days on its own. I wonder if it was the virus. In any case, I am out of it now and there is no point of getting myself checked,” he says. In addition, Johny disclosed that the preachers at the centre emphasised on “prayers” as a cure to every problem in their sermons. “They taught us that we should place unwavering faith on Allah and abstain from visiting doctors and hospitals,” he said. However, Johny said that he did agree with every teaching that they taught, admitting that if he gets seriously ill, he would certainly visit a doctor. “In January, I was down for a few days with cold and flu. I did not take any medicines for it. It eventually receded after 20-25 days. I don’t know if that was the virus. In any case, I am out of it now and there is no point of getting myself checked,” he said. According to the reports, 13000 people have been estimated to have attended the 10-day Tablighi Jamaat iztema(congregation) in Delhi in mid-March, who are under the scrutiny of authorities. Out of 13000, 8000 have already been identified as high risk who may disseminate the virus in other parts of the country. So far, 647 coronavirus cases linked to the Tablighi Jamaat iztema have been identified across the country. In Delhi, out of the current tally of 293 cases, 182 were evacuated from the Markaz Nizamuddin.
Low
[ 0.48940677966101603, 28.875, 30.125 ]
Q: Use of .BY and .EACHI in the data.table package I am trying to get a better grasp on how some of the special variables in the data.table package work. One of these is the .BY statement. I have not seen a lot of examples of people using it, but the documentation implies that is is useful in plotting. For example, the following code seems to work quite well (showing a plot for each of the species and assigning the right title to each plot) in data.table 1.9.3: iris <- data.table(iris) iris[,plot(Sepal.Length ~ Sepal.Width, main = unlist(.BY)), by = Species] While this code does not work as intended by me: iris[ , plot(Sepal.Length ~ Sepal.Width, main = .BY), by = Species] Why are these two different? From the comments, it does not seem to be an issue in data.table 1.9.2. In what other ways might it be useful to use the .BY statement? How is this different compared to the .EACHI statement? A: .BY is a named list containing the values of the by variables. Passing an unnamed list to main will work, however a named list will fail (wholly unrelated to data.table plot(1, main = list(1)) # works.... plot(1, main = list(s=1)) # Error in title(...) : invalid graphics parameter There is a recent commit to data.table 1.9.3 which fixed a bug to do with naming in `.BY Closes bug #5415. .BY gets names attribute set properly in april this year. If you had more than 1 "by" variable, you would want to be able to concatenate some how perhaps iris[,plot(Sepal.Length~Sepal.Width,main=do.call(paste,.BY)),by=Species] will work (unless you have a column called collapse!) EACHI is completely unrelated to this. Please read the NEWS for data.table 1.9.3 for an understanding of this.
High
[ 0.699738903394255, 33.5, 14.375 ]
Q: Does NetBeans play nice with Eclipse projects and vice-versa? I recently switched from Eclipse to NetBeans (although I don't have any current Eclipse projects lying around that I have easy access to), but a lot of people that I work with (and even my department at school) use Eclipse as their primary IDE. Are there any known catches to using NetBeans with projects made by others in Eclipse? How about things that might interfere with someone using Eclipse from importing one of my projects? Thanks. A: Eclipse projects are not compatible with Netbeans one. Having said so, you can easily have both project configurations on the same folder (or SCM system). So you could easily integrate them. That is especially true if you have plain Java projects (not Java EE). With Java EE things are a little bit more complicated.
Low
[ 0.5301724137931031, 30.75, 27.25 ]
Posted by CmdrTacoon Monday February 04, 2008 @11:55AM from the well-good-for-them dept. NewsCloud writes "Microsoft makes products in Washington but records software sales to PC makers and high-volume customers through an operation in Nevada, where there is no corporate tax. So Washington has missed out on more than half a billion in taxes; revenue it could use for badly needed infrastructure needs — such as the needed replacement of the 520 bridge which connects Seattle ... to Microsoft. Reported by Slashdot in 2004, the numbers have increased with the company's growth to approx. $76M in savings last year alone. The author questions the legality of the practice given Microsoft's 35,500+ employees and 11.2 million square feet of real estate in Washington state." Do I hear someone call for "Small government" ? This is what happens when the sheeple are being led by corporate hacks calling for small government: no checks on the corporations, while people are starving on the streets. Second: So-called "democratic" governments are only "accountable" to the majority vote, which is merely a form of "might makes right", this time in the form of numbers. The GP was clearly referring to accountability to justice, e.g. under common law, where anyone who causes another person harm is liable for the damage. No government, of any sort, considers itself accountable in this fashion; in fact, the definition of "government" can essentially be summed up as: the one group wh Small Government People know that you can not have small government with corporations. Corporations are not natural entities but protected entities created by government regulations. A small government would eliminate the corporation. Not the business, just the protected status. Corporations only enjoy their protected status by the largess of government.Look at your city, your county, your state. Almost all corporations. People like you need to realize that it isn't the "big business" mentality, it is the fa I am not making that claim, Microsoft is indeed benefiting from free roads, free education providing a better labor supply, and - most of all - patent and copyright laws. So I'm not saying Microsoft is responsible for all the profits made in the corporation, far far from it.What I do claim is that they own their profit, regardless of "effort". If I build something with someone's help, I don't owe him anything just because he helped me, but because we agreed on compensation beforehand. There is no valid cont There is no valid contract for you to pay for your food when you go into a restaurant, yet few people dine and dash. No one would assume the restaurant is just giving you the food for free. What there is is an implied contract. You eat the food, you pay the bill. With government services, there is the same implied contract. If you don't want to pay the bill, don't make use of the services. If you don't agree to pay taxes, go live somewhere else, you have no right to live here. There is no valid contract for you to pay for your food when you go into a restaurant, yet few people dine and dash. No one would assume the restaurant is just giving you the food for free. What there is is an implied contract. I see things like this written all of the time on Slashdot. It usually doesn't come up in stories about tax, but usually ones about EULAs. When you place an order for food, there is actually a contract. A valid contract requires: offer, acceptance, consideration and assent. Absent some extraordinary situation, the moment the restaurant starts making the food you've ordered, there's a contract. You're obligated to pay. Dine and dash is a sort of breach of contract. It's also conversion. An "implied contract" is somewhat of a different beast. It's more of a legal fiction that prevents someone from knowingly obtaining the benefit of another's mistake. E.g. a court might imply a contract if you eat the $1000 meal meant for another table and then try to say that you're not going to pay for it because you only ordered a diet soda. And, as it relates to taxes, a contract analogy is not a very good one. Lots of people don't pay taxes and yet get the benefits of the tax system. Moreover, a number of people pay more taxes than the value of the actual benefit received from them. There's also no way to reject the benefit since moving elsewhere is not usually a viable option--in a contract, this might be an example of duress. YOu make a good point, but consider this: would washington be better of without Microsoft rather than with? I guarantee you not. There would be a lot less people earning high wages, and they all pay taxes. Washington does pretty well out of Microsoft as it is. Yeah, so what. Why is every big bank in the U.S. run out of South Dakota and Delaware? Because those states have lax banking laws. Why are movies made in California? Low tax on entertainment. Duh. If Washington State decided to levy M$FT they would be driving out one of the largest employers, and those employees DO pay income tax. Not to mention sales tax on everything they buy. Lots of companies are in Nevada to not pay tax. Guess what, there wouldn't be SHIT in Nevada if they had the tax! So, states do things that help them out, and companies do also. This is a NON STORY. There is no valid contract for you to pay for your food when you go into a restaurant, yet few people dine and dash. No one would assume the restaurant is just giving you the food for free. What there is is an implied contract. You eat the food, you pay the bill. With government services, there is the same implied contract. If you don't want to pay the bill, don't make use of the services. If you don't agree to pay taxes, go live somewhere else, you have no right to live here. Cute. Are you just trolling, do you really believe this drivel, or are you just hoping no one will call you on it? There certainly is a valid contract when you eat into a restaurant. I can only assume that you meant there is no written contract. The fact that it's implied makes it no less valid. When I walk into a restaurant, I do indeed agree to an implied contract that I will pay for whatever it is that I order. This is a contract between equals. I'm free to engage or not engage in the transaction. So is the restaurant.(1) If I don't like the prices on the menu, I can decide not to eat there. The situation is far different with government services. I'm not free to refuse to engage in the transaction. Ask the many people who have either been fined or incarcerated for failure to pay the proper taxes or fees. I can't simply say "I don't want what it is you're selling, so I won't use it and therefore don't have to pay for it." I'd be more than happy to give up all rights to many government services, and to pay only my fair share of those services I actually use - such as public road construction and maintenance. That option doesn't exist for me, and it doesn't exist for Microsoft. You state that I "... have no right to live here..." If that argument is valid, then I have no rights at all. Freedom of speech? Of Religion? Of anything else? "We don't like that kind of talk around here. If you want to talk like that, go live somewhere else. You have no right to live here." "We don't worship like that around here. If you don't want to worship our God the way we do it, go live some where else. You have no right to live here." Any right whatsoever can be trumped with "Do it the way we tell you to do it or go live elsewhere." (1) For the peed ants, there actually is legislation which interferes with the right of the restaurant owner to practices his freedom of association. Refuse service to the wrong person and you may actually be facing a law suit. Such violations of freedom of association, while technically making the restaurant not entirely free to refuse to engage in the implied contract, doesn't really affect this situation. Contracts require three elements: offer, acceptance of offer, and consideration. All three are in-place when you go to a restaurant: Offer: The restaurant provides you with a menu, which includes prices Acceptance: You reviewed the menu and placed an order for specific items. Consideration: The restaurant provided you with food, expecting you to exchange cash. Don't gimme any of this fictitious "implied contract" or "social contract" crapola. You can look at the services provided by the US, and the amount it will cost you in taxes, and if you don't like it, you can leave. Exactly like the restaurant scenario. It is the same situation, except in the minds of people who would rather reap the benefits of living in a first world country without paying for them. "There is no valid contract for you to pay for your food when you go into a restaurant, yet few people dine and dash. No one would assume the restaurant is just giving you the food for free. What there is is an implied contract." Err...bad analogy. There is no 'implied contract' if you dine at a restaurant. If you do a 'dine and dash' and get caught, you'll be charged with theft, not with 'breach of contract' I can assure you. :-) Microsoft broke no laws here, in fact they were operating fully within the l So you have the right to profit off of my work, do you? Because that's what you're doing when you don't pay taxes. We contribute to the public good through our taxes, paying for positive externalities that everyone benefits from. I'm not telling you to leave, I'm saying you have a choice. If you don't want to pay taxes, don't take any of the benefits I pay for or you are stealing from me. Do you think that's fair? Competition. That's the key. But between states. When a business decides to raise prices unjustifiably, what do you do? You go and buy from someone else. When a state decides to charge taxes that are above what's reasonable, what do you do? You normally have only one recourse: move your operations to some other state. If the states complain that companies can move around their operations, it's because it is the loophole in their abusive scheme. It is the only safvety valve in the system and they would like Very true...corporation management in Nevada is a huge business down here in Vegas...I have friends who are "Presidents" or "Officers" of dozens of corporations who bounce from empty office to empty office throughout the month, because there is some kind of requirement around having to spend so much time per month on site. It's not unique to MS by any means. All above board, just jumping through weird loopholes created by Carson City.In addition, I would bet that Microsoft is also not a Washington State cor I didn't realize that the education I got from the government, for which my parents paid by taxes, made me the property of that government (since I cannot be parted from that education without killing me). It's only a short logical jump from saying that the employee's education obligates the employer to saying that it obligated the employees themselves and therefore they may not leave the jurisdiction that paid to have them educated. I seem to recall the USSR, may it rest in pieces, used that argument.The f Absolutely not, they already pay WA state taxes, the article is misleading. MS does pay WA taxes, and presumably quite a bit. They pay property taxes on the land they occupy and sales tax on anything that is purchased for the business. People who purchase MS software or services have to pay sales tax on those transactions and anything that MS sells online is also subjected to WA tax for anybody that lives in the state. I don't believe that MS is required or really should be paying more taxes than they are presently to my state. I haven't seen the figures themselves, but it doesn't matter where the sales are recorded, the amount of taxes that corporations can be taxed here are extremely low compared with the money that MS products bring in through sales tax. We're talking 6.5% base sales tax compared with corporate taxes of 0.00484% for gross manufacturing receipts, 0.00471% for retailing and 0.015% for other services. The money just isn't that large compared with the additional sales tax, gas tax, property tax and the taxes paid to the state by their employees. ...should Microsoft pay taxes on the profits they make in selling their software? If so, where? If not, why the hell not? Leaving aside the issues of libertarian principles, of the legitimacy of taxation in general, and of how much obligation a public education places on the individual and anyone who hires him, we have the issue of traditional goods as opposed to those with near-zero margin costs. Do we really want to establish a precedent where every copy of software sold is taxable by the state where the Corporate taxation is merely a form of double taxation, which is counter-productive to the state anyway. You've been taken in by right wing propaganda. Republicans trot out the "double taxation" argument any time they see a tax that might make rich people slightly less rich. They do it for the estate tax and corporate income tax. There is no dividing line where flow of income starts and ends. All income taxes, capital gains taxes, sales taxes, gift taxes, and estate taxes are taxes on transfers of wealth. I earn a salary and pay income taxes. I then use my income to buy a toaster and pay sales taxes. Double taxation! Then the store pays taxes on its income. Triple taxation! Then the store employees pay income taxes. Quadruple taxation! And then the store employees pay sales taxes on their purchases. Quintuple taxation! And so on. It's a totally meaningless argument. Now, I am not a fan of taxes by any means, but I dislike free riders even more. Using your logic, it would be ok for all of Mircosoft's employees to declare themselve personal corporations in the state of Nevada, and then claim their wages as revenue of such a corporation. Technically, yes. Of course, if they want to keep living in Washington, they probably own or rent property there. This property can be subject to property taxes. If they want to eat in the state of Washington, they probably buy food. This The problem with taxing consumption over income is that it puts a heavier burden on the poor. The poor have little choice but to spend most of their income on goods, almost as soon as they earn it. The middle classes are usually not much better off, though they can sometimes squirrel away savings. The wealthy have a lot more flexibility with their money, and can defer consumption indefinitely, move money off-shore or into other currencies, etc. It is also easier to adjust an income tax so that the poor don' Impossible? No, certainly not. I've read about schemes whereby people in lower income brackets can be reimbursed for a portion of their consumption tax. It's impossible to be completely fair with a simple flat consumption tax, sure, but, with some added complexity, it can be made more fair. The question is just whether such a system is simpler than the current income tax mess we have right now. If done correctly, I think it could be. But it'll never happen, at least not in the US. Would Washington rather MS move their operations to Nevada and lose the tax base of all the employees? This situation is actually a good argument for getting rid of corporate taxes. Corps wouldn't just sit on the money they saved. They would invest it by hiring more people and spending more money where they are actually based. Corps wouldn't just sit on the money they saved. They would invest it by hiring more people and spending more money where they are actually based. Or they would move the money offshore. Or they would move to give their top executives raises and stock options. Or they would throw it on the big pile of money they're offering to buy Yahoo. Or they would pass that money on to shareholders at the end of the quarter. Or any one of a hundred other things they could do which takes the money out of the state. All moves which deprive the residents of Washington money they need for social services. Do you think that Microsoft is required to spend money in their home state? That they will do it out of the goodness of their hearts? Their job is to make money for the shareholders, and unless you specifically tax them, then there is no guarantee that any money Washington gives them will be reinvested back in the state. They are in Redmond because it has the infastructure to support them. The telecommunications, roadways and educational system to supply those tens of thousands of employees. Nevada, by contrast, cannot supply these (sorry nevada, you're a great state, but your infastructure is horrid). For microsoft to do such a move would be to cut off its nose to spite its face. There is a reason why the top performing companies are found in areas with the highest tax brackets. Those territories, which tax for the needed infastructure, are the ones which can support businesses of Microsofts size. Obviously you don't live in Washington... Microsoft (and Boeing) each PAY millions of dollars when expanding their campuses FOR things like increased roads, transit, power, and the such. They PAY those costs right up front, before or during construction (with the requirement that the infrastructure be built and completed prior to signoff of the new construction). Additionally, because of "community needs" and "environmental impact" and "public awareness" campaigns, Microsoft and Boeing pay MILLIONS to build parks, schools, and other government-specific projects MILES away from the construction, just to get their permits approved. Microsoft PAID for the overpass across 520 when it wanted to join its two campuses. It PAID for the Metro transit center in front of the Redmond campus. It PAID for widening 40th Street. It PAID for the rework that's happening on 150th. Cash up front. This is a case of a State out of control. Washington's budget has increased 33% in the last 3 years alone. Not promised outlays, actual CASH BEING SPENT. We're going from a $1.5 billion dollar surplus and $2 billion dollar rainy day fund to $600 million dollar deficits and no rainy day fund. We have the HIGHEST GAS TAX in the nation. That gas tax is supposed to be dedicated to roads. Yet we still have floating bridges that are at risk of sinking with each storm, and a viaduct that carries half the North/South transit through the city of Seattle yet is in danger of imminent collapse PER THE STATE'S OWN EXPERTS. Yet neither of these infrastructure problems - which were to be addressed by the latest 9 cent per gallon tax - has been started. We're still arguing about whether to just tear them down and not replace them (where did the money go?) or replace them with structures that carry FEWER vehicles, when our population is increasing. We have an out-of-control L&I system. Woe be to you if you have a warehouse or shop and the State knows about it - EVERYONE that can walk into the warehouse can be considered "high risk" for your L&I costs, regardless of their position or the use of that warehouse. Unemployment? I ran a business for 10 years in this State, and never ONCE had an unemployment claim. Not one. Employed over 80 people over the years, never ONE claim. Yet every year my unemployment tax rates would increase by 6-8%. We mandate HUGE income to the State by having the highest minimum wage in the nation. And of course, that means the State gets more income because their income is based on spending, gross receipts by businesses (which must increase when the mandatory wages increase), and those same L&I costs (which are a percentage of your wages). No, taxation is not the problem - the State's budget is growing faster than the wealth or income of the State's residences. Record budgets are being pushed through with taxation growing 2-3 times that of the wealth of the State... Well what's going on? Spending - it's up 33% in just 3 years. Oh, and that doesn't include the UNDERFUNDING of the State's pension plan. Or the spending of the rainy day fund. Both of those are "off book" items... We're spending over a billion dollars a MILE for a light rail system that runs at grade. And cannot climb the hills of Seattle. And originally wasn't even going to go to the airport, but changed because of overwhelming public outcry. The existing example spur - the South Lake Union Trolley (yes, it is actually called the SLUT) - has had 3 train-car accidents in just 3 months, bringing it to a standstill for hours. This State has seen property taxes rise on average at 15% per year for the last 5 years. And now that it's looking to slow down to only 3-4% per year, the State is figuring out how to increase the taxation rates to bump their revenue intake up. This State is all about take-take-take, and what YOU can do to contribute to it. Competition is not allowed - no school vouchers, private tollways are illegal, private ferries ar The 35k plus employees pay taxes in state and Washington State is certainly aware of that fact. If they make too much of a grumble about the corporate loop hole, they could lose the much larger 35k plus employee tax base. Those 35k are probably just the people who work for M$. There are probably lots and lots of other Washington residents whose primary income derives from Redmund. Microsoft isn't going to leave Redmond - just accept it. Consider what it would take to relocate to someplace else: you'd have to build an entirely new campus for 35k+ employees, then you'd have to convince them all to come with you sight unseen, then you'd have to hire thousands of new employees to replace the ones who didn't come with you. If taxation and cost of doing business were the deciding factor of where a company locates, Silicon Valley would not exist, and the World Trade Center would be in rural Idaho. Ahh, but they wouldn't have to move 35k+ jobs, only (Total/2) + 1, depending on what the formula is going to be for determining where a corporation gets to put its headquarters.Still, I don't think it is workable to have the states determine where a companies HQ is. What if two states both claim the HQ? What if the employee count goes up and down each year? I'm sure Texas, California and New York would have no problem telling company X that they now pay state corporate taxes. Although I don't think I'd argue that businesses locate in low-tax areas, and as those areas attract and grow new businesses, they increase the taxation, assuming that if they keep the rate of increase low enough, the business will simply suck it up and pay the higher rate than pick up and move. Check out Idaho - businesses are relocating there like mad. Likewise Nevada and Wyoming. High tax areas like California, Massachuessets, and Michigan are leaking businesses because the taxation has gotten too high. Washington is unfortunately following the CA/MS/MI model, not the ID/NV/WY model. It's already caused Boeing to relocate their headquarters (taking with it a substantial chunk of change)... Looking at the Microsoft employment opportunities/open recs, there's no question in my mind why growth out-of-Redmond is much greater than in-Redmond. Cost of doing business - hire your employees in other areas where it's more affordable and let the local employment stagnate or fade away. That's how you move a massive high-tech information company. Boeing is in a tougher place - they have physical plants and tools that are expensive to relocate. But Microsoft? Give it 10 years and you'll find the majority of Microsoft employees will be OUT of the State of Washington. Bet on it. The 35k plus employees pay taxes in state and Washington State is certainly aware of that fact. If they make too much of a grumble about the corporate loop hole, they could lose the much larger 35k plus employee tax base. Washington has no personal income tax, so the state would only stand to lose sales and property taxes. If MS is avoiding $76 million in annual corporate taxes, that's $2171 for each of their 35,000 employees. How much sales and property tax are those guys actually paying? A corporation has a financial duty to avoid paying unnecessary taxes. If you don't like the way those "fat cats" (I notice rabble rousers use that term a lot) get out of paying taxes, talk to the government and have them close the loopholes. More importantly, not that every dollar Microsoft pulls in is taxed _multiple_ times by the time it makes it into the shareholders' pockets. The fact is that it's a myth that corporations are pulling one over on the government, corporate taxes are a little silly since the money _is_ taxed before it goes into any individual's pocket. The main reason that corporate income taxes are relatively low is because corporations are taxed on their profit, whereas individuals are taxed on their earnings. A company can easily bring in $100M in revenues, but only make $5M profit, which is then taxed at ~35%, yielding $1.75M in taxes. The other $95M is also taxed, just not dir --Basically, Microsoft receives cash by issuing employee stock options, after which the company then receives billions of dollars in tax deductions from the IRS for doing so. Add in the warrants it sells on its own stock, and the company made over $5 billion off the stock market last year (fiscal year ended July 1999), tax-free. For comparison, its after-tax net income was only $7.8 billion. Microsoft may not be much in the programming department, but its accountants are impressive.--Corporations pay taxes on their own income (generally 35%), but money they pay out in salaries to employees is deductible from the corporation's income. Since granting options to employees results in taxable income to those employees, Microsoft gets to deduct that taxable employee income from its own taxable corporate income, and that's where Microsoft got a tax-free $3.1 billion in cash in fiscal 1999: "Stock option income tax benefits."-- Add up the actual amounts involved and account for the dilution in share value and you'll realize that no one is cheating anyone else.Employees exercising stock options pay taxes on the value of the benefit they receive just as if it were income through wages. The employer deducts the value of the benefit just as if it were income through wages and the net value of the corporation is reduced by the same amount just as if it were income through wages. Stock options allow you to tie that income to the stock p I hate Microsoft as much as the next guy (okay, maybe not around here, but I really really hate them!), but why shouldn't they structure their corporation to reduce the tax burden? Just be glad it's Nevada and not Belize. Aye. The Danish branches of Coca-cola and McDonalds for example continuously post negative turnovers even though they're doing _quite_ well here. As for Coca-cola, they simply purchase syrup from the US corp. at extremely inflated prices to avoid taxation. I hope that you and Microsoft are equally cheerful about all this when the 520 bridge capsizes with a ton of Microsoft employees on it. Or will that then be the state's fault somehow? I tend towards libertarianism myself, but the article makes an excellent point. The 520 bridge is a crucial piece of infrastructure that Microsoft and its employees benefits greatly from the existence of. Do you have a reasonable proposal for how to pay for it? If you think it should be a privately owned toll bridge, I wil I for one cheer for anyone protecting money from the prying hands of the State. Ah, the refrain of all Libertarians. Never mind that there are legitimate responsibilities for both tax payer and government. Does Microsoft build and maintain the roads to-and-from their employee's homes and their distributors. Does Microsoft pay for the infrastructure that pushes electricity, cable, and water lines for them? Does Microsoft provide police and fire protection for them? Nope, that's what your taxes are for Good for Microsoft! If I could do the same to avoid paying the portion of my taxes that go for welfare-state bullshit (which is pretty much EVERYTHING except for the Military and Law Enforcement budgets), I would. In a heartbeat. If Washington state makes a move to try to get this income, MS should pick up and move it's entire operation to Nevada. What would Washington State do then? Defense accounts for 21% of the federal budget. Social Security, Medicare, "Safety Net" Programs account for 49% of the federal budget. 9% is interest on debt and 21% is "everything else." (According to cbpp.org) DoJ is likely in that "everything else" category, and accounts for.7% of the federal budget. (According to DOJ press release of today.)21.7% is _not_ the majority of the federal budget by any stretch. Even if you don't sort out the entitlements from the "everything else" category, Social Secur When I had my retail store, we moved literally 3 miles across a State line because of a sales tax differential of nearly 4%. That's significant, when many of our items were $500-$1000, meaning a savings to the consumer of $20-$40 in taxes. Even funnier, the county/state with the lower tax rate had BETTER public facilities and police attention (the store in the old State had regular robberies and theft), and my customers had a 5 minute longer hop to get there. We've talked repeatedly about moving out of our State and leaving some customers behind if our State decides to start a labor sales tax. It's a terrible idea, as more taxes don't mean more income (and neither do less taxes necessarily) for the State. It's a VERY complicated "invisible hand" situation. I appreciate when companies find loopholes, because it gives me hope that I can use them, too. I hate W2s, as 1099s offer many more tax benefits. I've seen many friends give up their stable W2 jobs to move into 1099 contracting, and see their income double, but their tax share not move up as much. When I heard Haliburton was moving offshore, I investigated it and found that there are tons of savings to do so, even if your primary business is still in the States. It makes sense. Yeah, Microsoft will take heat for this, but the reality is that small and medium sized business owners should do everything in their power to find the least-regulated economies to operate out of. I love seeing companies move out of California, employees and all, and hitting States that so far have not shut down the engine of business, thinking that the State can help the poor when in fact it is jobs, not entitlements, that help the poor. Basically, the dispute is whether the "product" you purchase is a chunk of software hand-crafted for you in Redmond or a license generated for you in Nevada. Seems like the "its not stealing its copywrite infringment" crowd ought to be 100% on Microsoft's side on this one, no? I guess how shady the accounting is depends, in part, on how large a presence Microsoft has in Nevada. Is MS shipping DVDs of Windows and Office from some warehouse in the desert? Do they have servers based there that distribute authorized soft copies to OEMs? Are their sales and volume-customer relations based there? The other major business of Washington state - Boeing - flies their planes just outside the U.S. territorial limit offshore to sign the transfer papers with international customers so that they won't have to pay tax. Should we complain about them too? It is not like Washington isn't getting a cut out of MS. With 11.2 Million square feet or real estate, think of the property taxes? With 35,000+ employees, think of the payroll taxes? Seriously, please don't tell me everybody on Slashdot is naive enough to think that companies like Red Hat, SUSE and Ubuntu aren't working the tax system either! Companies from a one man show to an MNC use this system to pay the least amount of tax they can. Nevada and Delaware have long maintained favorable tax treatment of corporations exactly for this purpose. If Washington wants in on this action, they can offer the same incentives to encourage MS to claim those profit in WA. That Microsoft's behavior isn't unique in any way, shape or form. That what microsoft does is standard operating procedure for all mega-corporations. Paying taxes in the state with the lowest corporate tax rate and forming corporations in Delaware is done for the same reason. It's the best deal. If this is outrageous to the submitter, then I hope he never discovers how most electronics firms with an office in the U.S. work. As an FYI, they are set up as subsidiaries that "buy" their product from the most attractive exporting/manufacturing office from some other part of the world of the same corporation. The U.S. office then operates at a perpetual loss (paying less tax) by hiding the income generated as the cost paid to "buy" the goods from some other part of the world. Bridges are here to allow people to travel, and people pay taxes. Tens of thousands of people spend comfortable incomes in Washington and lots of sales tax on their spending thanks to Microsoft, that should be enough to keep the infrastructures that support these people. Note that this is a complaint from the State of Washington (where I reside when in the US), the ONLY State that has the completely regressive and oppressive Business and Occupation Tax. A State tax on GROSS receipts. Yep, have $1,000 in revenue, but because you're a startup, or have a bad quarter or whatever, you lose $1,200 but STILL get the "luxury" of paying tax on that $1,000! Ignore this story - Washington is taxing itself into oblivion. Boeing moved their corporate headquarters - and most of their taxable profit - to Chicago over the taxation and treatment of business in this State. The ONLY things that is keeping Washington alive right now are: 1. Agriculture. Hard to move a farm, so they're stuck. Of course, our State wants to breach all the dams and eliminate the irrigation systems, which would kill these businesses. 2. Boeing. Already moved their corp headquarters, and unfortunately for Boeing, the physical assets here - buildings, equipment, and people - are so huge that you can't afford to move them. But more and more work is shifted outside the State... 3. Microsoft. Faces the similar situation with Boeing, because of the size of the campus and people. Stuck for now, but does more and more outside the State. Washington is screwed. It has the highest gas tax in the nation, and still hasn't repaired road damage from the 2001 Nisqually Earthquake. The legislature and governor raised the State budget by 33% in 3 years, and now projects deficits left and right, yet it's also decreased MANDATORY funding of the State employee's pension fund. And now it wants to put the screws to Microsoft... This is a textbook case of high taxation modifying the behavior of the taxed. If Washington's tax rates weren't punitive for these sales, there wouldn't be any incentive for the company to be incorporated in Nevada. This is a common corporate practice, and demonstrates the necessity of small laboratories of democracy, aka, states. Washington is seeing how Nevada's tax code is modifying the behavior of Microsoft, and Washington has the choice to modify their tax code or continue pursuing their own version of it. It's not Microsoft's fault for playing by the rules to maximize profit. This is a textbook case of high taxation modifying the behavior of the taxed. If Washington's tax rates weren't punitive for these sales, there wouldn't be any incentive for the company to be incorporated in Nevada. This is a common corporate practice, and demonstrates the necessity of small laboratories of democracy, aka, states. Washington is seeing how Nevada's tax code is modifying the behavior of Microsoft, and Washington has the choice to modify their tax code or continue pursuing their own version of Nevada may have lesser public services than Washington, or higher non-corporate taxes. Either way, Microsoft and it's employees are enjoying privileges in Washington that they've skipped out of paying for, placing more burden on Washington's other residents. If Nevada is such a great, efficient state then I see no reason why Microsoft shouldn't move their actual operation there, instead of just maintaining a front for tax evasion purposes. If Nevada is such a great, efficient state then I see no reason why Microsoft shouldn't move their actual operation there, instead of just maintaining a front for tax evasion purposes. And, as you file your own tax returns this year, I'll bet you carefully record each internet transaction from out of state, ensuring that you pay full taxes even though it would have been easy to avoid it? Of course, your charitable deductions will be paid at the lower rate you really know your junk was worth rather than the higher "standard rate" you know you can get away with? Similarly, when you realize your itemized receipts don't add up to as much as the standard deduction, you'll still take the lower amount you know you really deserve? You'll also stop using lower rate credit cards issued out of Delaware in favor of higher rate ones from your own state? Sure, you could be saving money on your own taxes. But won't anybody think of the children in your own state who are in cramped classes because there aren't enough tax dollars. Thank God for people like you who make a point of paying every dollar they can, rather than looking for the best possible savings. When an individual figures out ways to avoid paying taxes - or paying as little as possible - it's considered frugal. When a corporation does it, it's evil? Actually, I live in Canada, Alberta to be exact, and when I order things from out of the country I DO pay taxes on them. Every single item. When I buy items outside the province I often have to pay other province's sales taxes as well, even though technically I'm exempt.I can assure you that if I managed to somehow creatively avoid declaring a third of my taxable income and the government found out about it I would at the least be assessed some massive fines. If I'd done it for ten years I expect I'd jus If Nevada is such a great, efficient state then I see no reason why Microsoft shouldn't move their actual operation there, instead of just maintaining a front for tax evasion purposes. Why don't we really punish Microsoft? Let's kick them completely out of the USA! If the taxes aren't good enough for Washington, then Microsoft isn't good enough for Washington and therefore the USA. We should make them relocate to India and fire all their American employees! That would show those bastards. Then the next time some evil company wants to hire American workers while reducing their costs of doing business, they'll think twice because we took a stand for more taxes and less profits. I for one will not stand for good paying jobs in the USA. Any candidate that encourages more tech jobs to move to India has my vote! Amusingly enough, MS has paid a fair bit into King County municipal infrastructure issues. They bought a bigger fire truck (in exchange for being allowed to build a building taller than 4 stories). They built a bus transit center. I beleive they've had a part in paying to get bridges widened and other traffic improvements near the MSFT campus. The MSFT employee base does a hell of a lot more for King County than the other way around. WA politics are horribly corrupt and stupid. Former Redmond resident, Current MS employee (in Fargo, ND, where the local government is much less stupid) As an MS employee and shareholder, I hope we continue to diversify away from the Redmond campus. It is extremely expensive and the business climate in WA is unstable and increasingly hostile. The overwhelming majority of MS employees are transplants from elsewhere. The nice thing about markets is that socio-economic conditions are a market also, and as US cities get stupider and stupider, they'll lose business and "lose" in the market place. Hopefully corrections occur before there is too much uncomfortable displacement for all parties. But you do have a sales tax. 8% if I am not correct. And those employees buy stuff, they pay property taxes, gas taxes and I bet they are even allowed to vote. I would bet these are high paying jobs who's money trickles down to the retail sector and pays for those jobs there as well. Let's do away with taxes. And, we can do away with all the things taxes pay for: the education system that trains Microsoft's employees, the roads that allow the employees to get to work, the police that help protect Microsoft from the roving bands of rabid cats, the standing militia that protects Washington from invasion by Canada. (Those bastards covet Washington, and are just *waiting* to invade.) Corporations benefit from -- nay, depend on! -- public infrastructure. Public infrastructure costs money. It's been proven time and again that private interests cannot provide neutral, equitable infrastructure at a reasonable price. Taxes are necessary. Now, taxing both corporations and individuals seems a bit of double-dipping, I agree. Tax the corporations, and let the individuals keep their wages. Politicians would end up with a lot more votes that way (though a lot less money through corporate sponsorship and whatnot). Corporations never pay taxes. Their customers do, and they don't even realize it. That's why I believe we need to eliminate ALL corporate taxes at all levels. Each individual person should be able to calculate to the penny how much they pay the government. How much of the cost of your last Windows license went to Uncle Sam? Don't know, do you? Tax the corporations, and let the individuals keep their wages. Politicians would end up with a lot more votes that way (though a lot less money through corporate sponsorship and whatnot). Unfortunately, it is very difficult in practice to "target" a tax to hit a particular demographic group. This is the same reason why it makes no sense for the Social Security Administration to talk about the "employee's share" and the "employers share". Both shares are paid by the employees (i.e. their wages are lower than they otherwise would be if the employer wasn't paying "their share"). It is a frequent mistake here on Slashdot to ignore what economists call the incidence [wikipedia.org] of a tax. In fact, it is often the very people whom the tax advocates propose to help who are ultimately hurt the most by new taxes. Corporations benefit from -- nay, depend on! -- public infrastructure. Public infrastructure costs money. It's been proven time and again that private interests cannot provide neutral, equitable infrastructure at a reasonable price. Taxes are necessary. The government doesn't provide neutral equitable infrastructure... just compare roads, schools, public services etc. in any wealthy neighborhood and any poor neighborhood, and you will see that extreme inequality is a fundamental part of the whole system. Tax funded infrastructure is a way to tax the working poor in order to provide for the needs of the middle class and rich.. not that I am complaining - A lot of poor single mothers had to take on second jobs so that the government can subsidize my dirt che Even the Lauffer Curve, beloved of Reagan, says that taxes lead to more productivity. While 100% is bad, 0% is also bad. The right number is in-between The problem is that a lot of leading political figures on the left believe that 50% is the right mark, and we Reaganites believe that's a bit too high! 0% being useful assumes investment in useful things like roads and bridges that actually improve the business climate. If it doesn't improve business, which does actually include quality of life and nationalis That's not what the Laffer Curve says. It says that tax revenues are optimized at a certain point. Taxes always* have a negative effect on productivity, and that has to be considered against the potential increase in tax revenue that an increase in the tax rate would otherwise bring. * Specific uses for tax dollars can increase productivity, but that increase is usually not as much as the productivity that a firm could gain by just spending the money itself. Even if the curve is smooth, there's no clear evidence on where the optimization point would be. It is true, however, that any production that goes into government finances can't go anywhere else at the same time. That doesn't mean it's necessarily a bad thing to have taxes, it's just that the government has to use the money for something worthwhil Well, don't forget that Microsoft is only able to create those profits because the government granted them temporary market monopoly (copyrights)... It's a trade - something(copyrights) for something(taxes). Warren Buffet is hypocritical scum then. Isn't he the moron complaining because he didn't pay enough taxes and that his secretary paid more than he did as a percent, and wasn't he the liberal rich freak saying the rich should pay more taxes, even though they actually shoulder the main tax burden in this country? They're both incredibly retarded, then. Do they know they can do this thing called "donate" their money? If they want schools to get more money, they can give more money to schools. If they want the "working poor" or homeless to have help, they can create programs or donate to existing programs. Instead, they want an inefficient middle-man to take more of their money, waste some huge percent of it, and trickle down a few dollars to people who "need" it? They are both complete and utter idiots, I don't It's not a tax break as such. It's transfer pricing, or a version of it. It's one of the oldest tax avoidance tricks in the book. Make your product in one jurisidiction, sell it to a subsidiary in a lower tax jurisdiction at cost (so booking zero profit) and have that subsidiary sell it on at the actual retail price, thus keeping your profits out of reach of the taxman in the higher tax jurisdiction. Most jurisidictions' tax codes have rules which are designed to prevent this (most commonly by requiring go Hogwash. The corporations aren't paying any more in salaries than they have to. It's their customers who pay their taxes, not their employees. Did you get a raise the last time your employer got a tax cut?And they're going to charge their customers as much as they possibly can as well. We do NOT have the highest taxes. Have you seen what they're paying for gasoline in Europe? That's mostly tax. As to "paying more than 100%, well gee, I thouhgt I was bad at math! A 100% tax rate would mean that all gross recie
Low
[ 0.504566210045662, 27.625, 27.125 ]
Q: How to get the display value of Select using javascript <Select> <option value="1">One</option> <option value="2">Two</option> <option value="3">Three</option> </Select> I am using document.getElementById("Example").value; to get the value. I want to display the text instead of the value. eg. value=1 --> One. How can I get the One text? A: In plain JavaScript you can do this: const show = () => { const sel = document.getElementById("Example"); // or this if only called onchange let value = sel.options[sel.selectedIndex].value; // or just sel.value let text = sel.options[sel.selectedIndex].text; console.log(value, text); } window.addEventListener("load", () => { // on load document.getElementById("Example").addEventListener("change",show); // show on change show(); // show onload }); <select id="Example"> <option value="1">One</option> <option value="2">Two</option> <option value="3">Three</option> </select> jQuery: $(function() { // on load var $sel = $("#Example"); $sel.on("change",function() { var value = $(this).val(); var text = $("option:selected", this).text(); console.log(value,text) }).trigger("change"); // initial call }); <script src="https://cdnjs.cloudflare.com/ajax/libs/jquery/3.3.1/jquery.min.js"></script> <select id="Example"> <option value="1">One</option> <option value="2">Two</option> <option value="3">Three</option> </select>
High
[ 0.674380165289256, 25.5, 12.3125 ]
Face Paint Kit for Baylor Bears Fans Click image to enlarge Item Details Are you the Bears' #1 fan? Do you bleed Baylor green? Then you can't show up to the Ferrell Center and be confused for a Reveille fan! Paint your face Baylor green and gold and show Waco you're one of them.
Low
[ 0.416666666666666, 25, 35 ]
HANOI, Vietnam — More and more state-owned enterprises in Vietnam, from banks to shipbuilders, are being turned over to private hands. Government-run television stations broadcast competing commercials for consumer goods. For some urban families, weekly trips to megamalls and KFC have become de rigueur. In cafes or on social websites, the young show off branded clothes, electronic toys and photos of trips abroad — while in the streets loudspeakers blare out news of party meetings and decrees. Communism and capitalism make awkward bedfellows, especially when it comes to culture. The government continues to monitor art exhibitions and music shows, films and TV programs, books and CDs. In classic Communist tradition, it still officially bans “offenses against the state” (an all-encompassing and ill-defined crime), violations of custom (like mannequins without underwear) or behavior it deems deviant (like hair dyed in bright colors). But the new enforcers of these old restrictions are driven less by ideological purity than by a mixed bag of political correctness and market-driven concerns — and this may be hampering artistic creation more than conventional censorship did under classically Communist governments. For years after the Communists took power in the mid-1950s, party leaders would spell out the limits of what was culturally acceptable. Their mind-set was patriarchal, authoritarian and suspicious. Dull bureaucrats with dull minds would debate a song’s patriotic fervor or a painting’s shades of red. Artists were expected to extol the party’s determination during the war against America and portray the people of reunified Vietnam as peaceful and contented. In reality, many Vietnamese suffered terribly during the postwar years, thanks largely to a mismanaged central economy. By the mid-1980s, even the Politburo had taken note, and it began a policy called Doi Moi, or Renovation. Some private enterprise was allowed. Farmers could set their own production rates and prices. The country opened up to tourism. Official shackles on culture were also loosened: It was now in the government’s interest to let writers and painters describe the social problems the state was professing to fix.
Mid
[ 0.574626865671641, 38.5, 28.5 ]
Maybe this fits in math.stackexchange.com, but since I am programing it in OpenGL, I shall ask it here. I had the idea of an spaceship game where the world is confined in the surface of an 4-D hypersphere (also called a 3-sphere). Thus, in seeing it from inside, it would look like a 3-D world, but by navigating in every direction, I would never leave the limited volume of the 3-sphere. To represent the 3-shpere as a "flat" 3-D space, I use an stereographic projection, which is very simple to implement as a GLSL shader, just need to divide the input vector by one minus its w coordinate. To represent the vertices of the objects I am using normalized 4d vectors, such that x²+y²+z²+w²=1, thus keeping them inside the 3-sphere. The first problem to solve was rotation. But I soon figured out that ordinary 3d rotation matrices would suffice to rotate the world around the viewer in the 3d projection, since it does not mess up with the w coordinate (pretty much like rotating a sphere around the z-axis would also rotate its stereographic projection). Then I figured out that rotating along w-axis would be equivalent of translation inside the 3d projection (just not commutative, as ordinary 3d translations on "flat" spaces), then I could translate along the axis by using a simple around axis rotation matrix (x', y') = (x * cos a - y * sin a, x * sin a + y * cos a), but variating w along with another axis. This is so far where I got, and I could not figure out how to navigate forward, based on the position the viewer is facing from the projection. I can apply the inverse transform to derive the normalized 4-D vector (called F) the viewer is facing in the hypersphere coordinates, but I don't know how to navigate in that direction by using a 4x4 matrix (what is optimal in OpenGL). I could think on a hackish solution: for every vertex V, do V' = normalize(d*F + V), where d is the distance moved forward (in some strange unit I can not exactly precise). This way only works for small values of d, there is no direct correlation between d and the angle variation. Thus the question is: how to move forward (using a 4x4 matrix transform) being in the surface of a 4-D hypersphere? 3 Answers 3 It turns out that I wrote some papers in this area some time ago. This one (Interactive Visualization Methods For Four Dimensions) applies most closely to your particular problem but the other documents that cite this one may also help you. In that particular application, I was rotating the object being observed in 4D, not the viewer, but the math is equivalent. Regarding this specific question: Thus the question is: how to move forward (using a 4x4 matrix transform) being in the surface of an 4-D hypersphere? If you're moving around on the surface of a hypersphere, you aren't translating in w. You actually need to move in the spherical geometry around a great circle of unit radius. That means that, if you can construct the appropriate axes for your frame of reference, you can spherically interpolate between where you are and where you are going. For example, one construction that could be used for such a slerp would be to use the unit vector that points straight ahead (your line of sight, aka p_1 in the Wikipedia equation), a vector point out of the top of your head (p_0) and a vector pointing out of your right ear (to make a right-handed coordinate system). If you are then tracking your speed over the sphere in angular velocity rather than linear, you can just plug in a value for t (elapsed time) in the Wikipedia to find your new angular position. Note that that equation places no limit on the number of components in the vertex p. Spherical interpolation works in any geometry. EDIT (responding to questions in the comments): Slerp seems not to be the case here, because I do not want to interpolate a rotation between 2 vectors over time. Instead, at each time step, I want to move every vertex into the opposite direction the viewer is moving at that moment. Thus, I am at position (0, 0, 0, 1) and I want to be at (sqrt(2)/2, sqrt(2)/2, 0, 0) next frame. Think of it this way: your position on a sphere (of any dimension) is a vector that displaces you from the center to the surface. If you're moving around at a particular angular velocity, that puts you at p0 and time t0, p1 at time t1, etc. Slerp is a handy way of calculating those positions at a particular time. Likewise, your line of sight is a vector at right angles to the displacement vector. Line of sight is v0 at time t0, v1 at time t1 and so forth. Slerp again is useful for for calculating that vector. How can I build the correspondent transformation matrix, so every vertex will be multiplied by the inverse of it? HOWEVER, before you can render your world onto a two dimensional screen, you first need to render it down from 4D to 3D. OpenGL (unsurprisingly) does not directly support this. To see why, look at the perspective projection matrix. It assumes that you are rendering homogenous points in 3D space: x, y, z are in the first three components and w (a scaling factor) is in the fourth. w = 0 indicates a vector whereas w = anything else indicates a point. w = anything other than 1 is a non-normalized point. So, there isn't a way to render a point at the 4D origin of (0, 0, 0, 0). As you can see from the construction of the matrix, however, it isn't hard to make the 4D to 3D projection matrix. Apply that first to your geometry set independently from OpenGL's matrix pipeline. Then you can use OpenGL standard matrices for 3D to the screen. I know I am not translating in w if I am moving around the surface, but variating the w coordinate in a rotation would displace the origin in the projection, what appears, to the viewer, that the world was translated. – lvellaMar 3 '11 at 1:18 About the slerp, I can not understand how can I make it into a transformation matrix. Slerp seems not to be the case here, because I do not want to interpolate a rotation between 2 vectors over time. Instead, at each time step, I want to move every vertex into the opposite direction the viewer is moving at that moment. Thus, I am at position (0, 0, 0, 1) and I want to be at (sqrt(2)/2, sqrt(2)/2, 0, 0) next frame. How can I build the correspondent transformation matrix, so every vertex will be multiplied by the inverse of it? – lvellaMar 3 '11 at 1:34 You'll probably need 5x5 matrices, as you're operating on a 4-space. The idea of homogenous coordinates is to introduce an additional dimension to represent additive operations by application of a linear operator. I really like your idea, but just out of curiosity: Why not simply define a cyclic 3-space, i.e. wrap coordinates at a given value. Using a geometry shader you can duplicate those vertices of primitives that wrap around (you have to clip, and move the clipped vertex together with the introduced helper vertices toward the opposite end of the space). This would result in a kind of hall of mirrors effect, so you also have to introduce some kind of horizon. The effect is not the same. Using a cyclic wrapping 3-D space seems that looking along one axis you would see your own back in the horizon, and depend on the angle you walk, you wold not get to the same position after one round-trip. The effect of a 3-sphere is, well, I'll need to code it to know... – lvellaMar 1 '11 at 3:57 @Ivella, actually, the cyclic coordinates would produce an effect similar to what you're looking for, if not exactly. One of the primary characteristics of navigating on any dimensional sphere is that, no matter which way you turn, you can always get back to your start point in the same distance. In cyclic coordinates, diagonal directions will be longer than straight up the axes directions. – Bob CrossMar 1 '11 at 13:04 I won't need 5x5 matrices for just rotations, 4x4 will suffice, the same way 3x3 matrix is enough for 3D rotation. I can not translate in the 4D euclidian space, because that would take me out of the hypersphere, so I don't need a 5x5 matrix. – lvellaMar 15 '11 at 16:37 I did ask the same question on math.stackexchange.com, because the question is too math related and I could possibly get a better answer there. Look here if you are interested in the original answer I've actually used. Being in 4D, there is not a single vector perpendicular to any rotation, but actually a whole plane of perpendicular vectors, and that was confusing me. Also, in OpenGL, I soon figured out that I could simplify the computation of the given solution, because I could always assume I am at the 4D projection origin (0,0,0,-1), always facing (0,0,-1,0), then translate a given angle along z and w, and multiply it to the already accumulated GL_MODELVIEW_MATRIX from the previous frame. So I did MODELVIEW <= M x MODELVIEW instead of MODELVIEW <= MODELVIEW x M I would get if I simply called glMultMatrix(M).
Low
[ 0.491400491400491, 25, 25.875 ]
"It's not easy to say what this play is about. It's not that kind of play," says writer-director Matt Chaffee in the program notes, and he's quite accurate in his assessment. What the play is about, he goes on to say, is "four friends figuring it out ... or not figuring it out. ... It's about entertainment ... and fun ... and people." Correct again. At this point, it's tempting to let Mr. Chaffee write his own review, since he's not prone to self-aggrandizement. What he is, however, is an astute observer, a quality that's reflected in his principal characters -- Nick (a sweet and earnest Dean Cates), Tommy (the delightfully dickish Mike Duff), Baby Boy (an engagingly eager Kip Garwood) and Jennifer (a spunky, expressive Lyndsey Lantz) -- and their uninhibited conversations. The mere fact that the guys refer to Jennifer as "Re" (short for "retard") gives you a sense of Chaffee's brand of "no-holds-barred" humor, which is raunchy and offensive but often quite hilarious. As director, Chaffee favors the 1930s style of overlapping patter; his lines fly like bullets out of his actors' mouths in rapid-fire staccato. All roles are double-cast, but it's safe to assume that no matter who's onstage, the show's direction and writing will leave audiences laughing. Arena Stage at Theatre of Arts, 1625 N. Las Palmas Ave., Hlywd.; Thurs.-Sat., 8 p.m.; thru July 28. (800) 595-4849, fluffybunnies.tix.com. (Mayank Keshaviah) LOS OTROS Craig Schwartz A new musical song cycle about gender and race relations in California. Book and lyrics by Ellen Fitzhugh, music by Michael John LaChiusa. Tuesdays-Sundays. Continues through July 1. Mark Taper Forum, 135 N. Grand Ave., Los Angeles, 213-628-2772. See Stage feature. NO WAY AROUND BUT THROUGH Chelsea Sutton Swaggering, tough-guy actor Scott Caan has cast himself in his play, which makes perfect sense as all characters, bar one, have the same "voice" -- his. A young couple, played by an overly gesticulating Caan and waiflike Robyn Cohen, are at a crucial crossroads in their new relationship. They spend the entire two-act play agonizing about their problems via convoluted discussion. Their inability to communicate effectively boils down to the dated concept "Men and women are different species." This also makes for some intense, earnest and funny dialogue exchanges. Their respective best friends provide excellent foils to the central fractured romance, and are played nicely by Bre Blair and Val Lauren (who also directs the play remarkably well). Caan's stage mom, Lulu, played by Melanie Griffith, doesn't appear until Act 2, and hers is a beautifully poised character with a refreshingly unique voice: finally someone who tells it like it is. All skinny limbs and sculpted face, Griffith give a fantastic and restrained performance. Falcon Theatre, 4252 Riverside, Burbank; Fri.-Sat., 8 p.m.; Sat., 4 p.m.; Sun., 7 p.m.; through July 8. (818) 955-8101, falcontheatre.com. (Pauline Adamek) ROADKILL CONFIDENTIAL Matthew McCray When is a work of art like an act of political terror? In playwright Sheila Callaghan's brittlest of black comedies, it is when representation crosses the not-so-fine line between symbolic and actual violence. For one-time art-world sensation Trevor Pratt (Melissa Randell) it happens when a chance collision with a plague-infected critter inspires a new piece comprised of pathogen-carrying roadkill. As Trevor's carrion collection begins to claim a human as well as animal body count, the work-in-progress draws the scrutiny of what turns out to be Trevor's most devoted and sympathetic audience -- a cartoonish, one-eyed counterterrorism FBI Man (Daniel Getzoff). Though intended as a kind of Guy Debord-esque skewering of the society of the spectacle, Callaghan's idea-saturated satire simply lacks the teeth to offer much of a political or comic bite. Director Barbara Kallir's polished staging (amid Adam Flemming's live projections) notwithstanding, Roger Corman covered the same ground with greater flair and to far more hilarious effect in A Bucket of Blood. Son of Semele, 3301 Beverly Blvd., L.A.; Fri.-Sat., 8 p.m., Sun., 5 p.m., through July 1. (213) 351-3507, sonofsemele.org. (Bill Raden) PICK OF THE WEEK: SIDEWAYS: THE PLAY Agnes Magyari The well-known saying may be In vino veritas, but in playwright Rex Pickett's adaptation of his novel, booze from a hundred bottles of wine flows around the stage, and the dysfunctional characters still all lie like shag rugs. Pickett's novel, of course, has already been adapted into an Oscar-winning film, but in this deft iteration of the tale, the author THAT GOOD NIGHT Here's a question: Do we need another play about a dysfunctional family and its abusive patriarch? Answer: Yes, if that story is told in a fresh, insightful way. Alas, Andrew Dolan's drama feels like a hackneyed mishmash of stale elements skimmed from more organic, invigorating work. In Act 1, four adult siblings and their mom reunite to discuss pulling the plug on their comatose dad. In Act 2, the dying man (Leon Russom ) miraculously revives to thunder across the stage, insulting his wife (Judith Scarpone), beating his eldest son (John Cragen) and copping a salacious feel off that son's "looker" girlfriend (Keelia Flinn). Russom is so absolutely top-notch that you mourn the absence of a noteworthy script, one unburdened of faux intrigues and ludicrous twists. The good news: The characters outrun the plot. Scarpone's dotty matriarch needs to lose some of her shtick; otherwise the ensemble performs well under Scott Alan Smith's direction. Lankershim Arts Center, 5108 Lankershim Blvd., N. Hlywd.; Fri-Sat., 8 p.m.; Sun., 2 p.m.; through July 21. (866) 506-1248, lankershimartscenter.com. (Deborah Klugman) THE THEORY OF SILENCE It's an intriguing premise, to be sure: The Johnson family has vanished without a trace and nary a sign of foul play. The one thing everybody's pretty clear on is that they haven't just skipped town: Pothead Kyle (Jason Britt) believes they were Soviet spies who outlived the Cold War, private investigator Toby Cole (Tyler Tanner) has ruled out the witness protection program, Jody (Meghan McConnell) is quite convinced the devil is at work, and Detective Fleming (Eamon Hunt) hasn't a clue. In all, 14 townspeople take to the spotlight one by one to conjecture, shuffling past each other in nicely eerie staging. Perhaps due to the presence of six authors, not all of these monologues are created equal. Many become vivid character sketches, deftly conjuring small-town weirdos just bizarre enough to feel real. But shrewd editing would have transformed the production, especially in regards to the inclusion of three heavily repetitive appearances by the local medium Madam Lydia (Taylor Ashbrook), which drag on the play's momentum despite Ashbrook's efforts. Eclectic Company Theatre, 5312 Laurel Canyon Blvd., Valley Village; Fri.-Sat., 8 p.m.; through June 23. (818) 508-3003, eclecticcompanytheatre.org. (Mindy Farabee) TRIO LOS MACHOS If you like this story, consider signing up for our email newsletters. SHOW ME HOW Newsletters SUCCESS! You have successfully signed up for your selected newsletter(s) - please keep an eye on your mailbox, we're movin' in! Martin Rojas Josefina Lopez's new play recounts an endearing story of three Mexican laborers who start making music together to pass the time in the fields; 50 years and many hit songs later, their brotherhood endures. While the play could use some restructuring and the production is uneven, Trio Los Machos is an often beautiful exploration of the machismo and the corazón of the three immigrants: Paco (played by Adrian Quinonez in his younger years and Henry Aceves Madrid in his older years), Lalo (Gilbert Rodriguez and Miguel Santana) and Nacho (Josh Duron and Roberto Garza). The soul of the play is the music: a combination of popular songs by Trio Los Panchos and new music by Danny Weinstein, with lyrics by Josefina Lopez and Claudia Duran. The cast members are stronger musicians than they are actors, and the gifted guitarists and impassioned singers carry the play to its greatest emotional heights. Casa 0101, 2009 E. First St., Boyle Heights; Fri.-Sat., 8 p.m.; Sun., 5 p.m.; through July 8. (323) 263-7684, casa0101.org. (Sarah Taylor Ellis) VODKA AND EURYDICE Rachel Orlikoff's father-daughter dramedy is long on clichéd relationship pitfalls and short on in-depth character study. Charles (Robert Wiener) has chosen boozing and guitar strumming (his guitar, Eurydice, is his best friend) over a solid relationship with his college-age daughter, Abigail (Caity Engler). After years of estrangement, Abigail shows up on dad's ramshackle front porch in an attempt to put behind her the drunken car crash in which father nearly killed daughter. The rocky relationship rehab takes all sorts of predictable turns, including Abigail's bouts of promiscuity and her inability to accept wholesome love from any man. The acting is wooden throughout and Orlikoff's directing is uninspired. Magic Mirror Theater, 4934 Lankershim Blvd., N. Hlywd.; Fri.-Sat., 8 p.m.; Sun., 7 p.m.; through June 24. (323) 960-5521, mirrortheater.com. (Amy Lyons)
Mid
[ 0.570454545454545, 31.375, 23.625 ]
Q: Problem with the tree command Previously I had installed the tree command with apt and it worked just fine, but then I formatted my PC and used snap because i thought is was the same thing. Now the command outputs weird strings when a directory has a name with "weird" ASCII chars, like ~ . How can I fix the command? Do I have to reinstall the command? If so, how do I do it? Thanks in advance. EDIT: I'm using Elementary OS. A: I believe you found a bug with that snap. If you would like to use the snap, consider contacting the publisher directly to file a bug (however I'm not sure that developer is still with Canonical and the email listed is para.siva [at] canonical.com). Alternatively, you might try posting on https://forum.snapcraft.io/ If you don't care about using a snap vs deb, just uninstall the snap (sudo snap remove tree) and install it with apt (sudo apt install tree). If you would like a hacky wordaround. Install the deb with apt, then immediately remove it. This worked for me, and I believe it's because it installs some missing shared libraries, that probably should be bundled with the snap.
Mid
[ 0.614657210401891, 32.5, 20.375 ]
1,000-Year-Old Royal Mint Launches a Gold-Backed Cryptocurrency The UK’s Royal Mint is launching its own gold-backed cryptocurrency. One coin named RMG is equal to one gram of gold. The Royal Mint, the institution responsible for producing the UK’s coins and holding gold, has entered the cryptocurrency world by creating its own digital currency. The Blockchain-based coin is called Royal Mint Gold (RMG) and represents gold stored in The Royal Mint vault. According to the data from the Royal Mint website, RMG is an alternative way to invest in and trade physical gold. It aims to provide the investment performance of the London Gold Market with the transparency of an exchange-traded asset. RMG represents direct ownership of fine gold, held in the form of segregated London Bullion Market Association (LBMA) Good Delivery bars and smaller gold bars. All gold is held within the highly secure storage facilities inThe Royal Mint’s vault and The Royal Mint acts solely as sub-custodian and has no claim on the gold. To create RMG, the Royal Mint has partnered with CME Group, the world’s leading and most diverse derivatives marketplace. Both The Royal Mint and CME Group are synonymous with integrity and accuracy and both are committed to innovation and security, using a blockchain ledger to record all RMG transactions. The RMG project was first unveiled by the Royal Mint in December 2016. In April, 2017, Royal Mint began testing Blockchain gold trading platform. Now the Royal Mint Bullion, the Royal Mint company that sells physical gold, is the first company to allow customers to hold gold-backed assets on Blockchain. Tom Coghill from the Royal Mint’s RMG division, said: “We already sell physical gold through our Royal Mint Bullion business and we sell coins and bars. In this sense what we’re doing here is simply making that a digital business and allowing for our clients to be able to hold gold for the first time on a blockchain basis. The difference between what we’re doing and what other crypto digital assets is that we’re a physical tangible asset.” According to Coghill, one RMG coin is equal to one gram of gold. “It’s real gold you’re holding when you’re holding our RMG.” Bitcoin has been compared to gold as it also is seen as being most useful as a store of value. However, a recent report published by the World Gold Council (WGC) declared that though Bitcoin saw a higher growth in value in 2017, gold would remain an important store-of-value investment. “Gold has probably had an argument that it’s been a store of value for 6,000 years, bitcoin’s a bit younger and the future of bitcoin is uncertain,” Tom Coghill said. The UK is not the only country to create a gold-backed cryptocurrency. Last week Australia’s Perth Mint was set to develop its own cryptocurrency backed by physical precious metals. Perth Mint sees it as a way to increase interest in investing in Australia. We welcome comments that advance the story directly or with relevant tangential information. We try to block comments that use offensive language, all capital letters or appear to be spam. If you see a comment that you believe is irrelevant or inappropriate, you can flag it to our editors by using the report abuse links. Views expressed in the comments do not represent those of Coinspeaker Ltd.
Mid
[ 0.628415300546448, 28.75, 17 ]
NEW DELHI: Urbanisation, technological advancement, professionalizing of Public Sector Units and prevention of corruption, were among many solutions that BJP's Prime Ministerial candidate Narendra Modi has pitched for as part of his party's economic vision for India.Modi was of the opinion that 3Ds - Direction, Devotion & Determination are key to economic development. Modi said, "Speedy, yet sustainable economic growth that is inclusive of all is the need of the hour," Modi said. "India's priority should be to eradicate poverty. Good governance matters more than policy," he said.: Addressing the Chartered Accountants Association, Modi said that people have to stop seeing urbanisation as a problem. "Urbanisation is not a crisis but an opportunity. Seeing it as a crisis has been wrong," Modi said.: Modi said, "We need to aim for a place which has a soul of a village with urban amenities." "Skill development is key to reaping demographic dividend. India can supply teachers and nurses to the world," he said. "Electrification has moved diamond polishing to Gujarat's villages," he said as an example.Emphasising the importance of developing every sector in the economy, Modi said, "We need to increase productivity in agriculture, industrial sectors. There is insufficient focus on technology in agriculture." "Value addition in agriculture will create employment," he said. "Investment in agriculture is required, bio & environment technologies must be evolved for future growth," he said.: Modi went on to talk about the importance of professionalizing Public Sector Units. "It is said that PSUs are born to crumble or get sold. We thought differently and that is to professionalize them," he said. "PSUs in Gujarat turned profitable due to professional management," he stated as an example.: Talking about BJP's stand on Goods and Services tax (GST), Modi said, "BJP is in full favour of the GST. IT connectivity is prerequisite for implementation of GST.": According to Modi, preventing corruption is more important than redressing it. "To prevent scams, we need zero tolerance to corruption," he said. "Congress should not blame government alliances for their failures. Coalitions cannot be blamed. It is about what is the aim when the government is formed & whether it can fulfil the aim," he added.: Modi also said that decentralisation of power is key to development of the country. "States have to be policy-driven & not by whims of the administration. Not just the PM and his cabinet, but PM and CMs have to collaborate," he said. "Keep the independence of constitutional institutions. There is urgent need to maintain sanctity of constitutional bodies," he added.: Modi said small traders should put an emphasis on the quality of their products to compete better. He said they could enter into contracts with big online retailers to create "virtual trade"."We should not worry about the challenges from global trade," Modi said at a meeting of the Confederation of All India Traders. "The government should not look to curb online trade. We should not worry about these things, our children have taken IT to the world. We'll have to embrace it."Modi also said that India needs to cut red tape by reducing the number of laws, and called on the foreign ministry to focus on "economic diplomacy" to improve India's commercial standing in the world."Times have changed, the core work of external affairs ministry today is trade and commerce," he said.
Mid
[ 0.648535564853556, 38.75, 21 ]
A pleasant protected paddle. This is a relatively short paddle and is a great tune-up paddle. You do need to review the current tables the current can reach 1.3+ kts., the ebb flows north, flood south. Jarrell Cove is a WA state park and has a dock, campground with full facilities. At low tide the shore can be quite muddy.
Mid
[ 0.617021276595744, 36.25, 22.5 ]
Q: Fullscreen API in webkit browser I am working on a toggle for the JavaScript Fullscreen API. Somehow the exit fullscreen mode (the else statement) in Webkit Browser doesn't work. Can someone hint what is wrong? The code is the example code of the Mozilla Documentation of the fullscreen API. var toggleFullScreen; toggleFullScreen = function() { if ((document.fullScreenElement && document.fullScreenElement !== null) || (!document.mozFullScreenElement && !document.webkitFullScreenElement)) { if (document.documentElement.requestFullScreen) { return document.documentElement.requestFullScreen(); } else if (document.documentElement.mozRequestFullScreen) { return document.documentElement.mozRequestFullScreen(); } else if (document.documentElement.webkitRequestFullScreen) { return document.documentElement.webkitRequestFullScreen(); } else { return console.log("didnt happen"); } } else { if (document.cancelFullScreen) { console.log("Mozilla Proposal cancels Fullscreen"); return document.cancelFullScreen(); } else if (document.mozCancelFullScreen) { console.log("Firefox closes"); return document.mozCancelFullScreen(); // This is the line: } else if (document.webkitCancelFullScreen) { console.log("Webkit closes"); return document.webkitCancelFullScreen(); } else { return console.log("Can't close"); } } }; A: Have a look here http://xme.im/display-fullscreen-website-using-javascript ... This is the page I use when Im referencing fullscreen oriented code... it should help.
Mid
[ 0.6452513966480441, 28.875, 15.875 ]
Login to your account Why Julia Roberts is made with romantic comedies If we rewind the VHS memory tape to the heyday of the romantic comedies of the 1990s, there were two queens of the genre who remain, to this day, irreproachable icons: Julia Roberts Y Meg Ryan. But the "Pretty Woman" star, Julia, 50, believes she may have outgrown the romantic comedy genre. In an interview with ET On Sunday, the actress spoke about her new thriller "Homecoming", which reunites her with her co-star of "My Best Friend & # 39; s Wedding" Dermot Mulroney for the third time, and discussed why he will never return to romantic comedies. "I do not know," Roberts said of the possibility of filming another comedian with Mulroney. "Unless we become the parents of the people who are in the making". "You're never too old for a rom comedy!" Keltie Knight of ET said in response. "Oh, I would not agree with that," Roberts said. "Obviously, some people do not disagree with that, I'm not here to say if they should or should not, but for me, it's funny, there came a time in my career when people thought I had activated romantic comedies. I love them, I love being in them. " "I love seeing them," he continued. "But sometimes, they just do not work at a certain point in the life experience, it's not even about age, it's just about what people know you know." Meanwhile, Roberts had nothing but good things to say about meeting Mulroney. In addition to "My Best Friend's Wedding," the actors also performed together in the 2013 drama "August: Osage County." In "Homecoming," Roberts and Mulroney play a couple from time to time. "It was fun and a lot of fun," Roberts said of working with Mulroney again. "I thought I was really inspired by [creator Sam Esmail] to love Dermot, who was very selfish, he just wanted Dermot and me to be together. " "[Mulroney] I just made a meal of this part, "he continued. I think because people think of us together, it allowed us to do more … It was fun, it was difficult to keep a straight face at all times. " Season 1 of "Homecoming" will be released to Amazon Prime on November 2. Do you have a story or advice for us? Send email to TooFab editors to [email protected].
Mid
[ 0.594479830148619, 35, 23.875 ]
A maximum of 5 providers will compete to give you the best rates (Dec 2016) Purpose Loan Amount Occupation Property Finalized Yes No Property Address Possession In City of Property Property Value Monthly Income Co-applicant (if any) Co-applicants Monthly Income Preferred Banks Any 5 INDIABULLS ICICI BANK HDFC AXIS BANK KOTAK BANK DHFL STAN CHART HSBC CITIBANK RELIANCE IDBI BANK Name (as per PAN Card) Email Mobile Residential Status Date Of Birth: City Locality/Area Locality/Area I authorize the website and its partner providers like HDFC Ltd, ICICI Bank, DHFL and other banks/NBFCs to call or SMS me in connection with my application & agree to the Privacy Policy and Terms of use A prepayment can save you from rising EMI burden Pre-payment is a very good option to save yourself from the EMI burden Apnaloan.com Research Bureau 10 Aug 2007 Mumbai: The Indian middle class is slowly realising the implications of opting for floating interest rates on their home loans. Persistent hikes in interest rates in the last one year is threatening to upset monthly budgets of many middle class families. Those in their late forties are getting calls from their housing finance company, asking them to pay a higher equated monthly instalment (EMI). Their younger counterparts, on the other hand, are learning that the tenure of their loans has gone up by a few years. "People who have opted for a floating rate are really worried. I have clients who are forced to cut down their expenses and investments because their EMIs have gone up considerably in the last one year," says a financial advisor. "I have asked some of them to liquidate their fixed deposit and make a prepayment." Harsh Roongta, CEO of apnapaisa.com/loan, too advises a prepayment to keep the EMI and tenure unchanged. "For every 1% hike in interest rate, roughly you have to pay around Rs 7,000 rupees for a Rs 1 lakh loan with a 20-year tenure," he says. For instance, if you have a Rs 10 lakh loan with a tenure of 20 years, you can make a one-time prepayment of around Rs 70,000 to ensure that your original EMI remains constant. Also, if you have age on your side, you can ask the bank to increase the term of your loan. "If the customer doesn't have the means to pay a higher EMI, we increase the tenure of the loan. It becomes a problem only if the tenure will extend to a period after retirement. In such cases, we have no choice but to increase the EMI," says an official with a housing finance company. As for prospective home buyers, you should consider postponing the purchase for the next six months. According to financial experts, interest rates are likely to go up further, dragging property prices down. "The RBI (Reserve Bank of India) doesn't seem like done with the policy rate hike. It may hold rates only after it achieves its inflation target. If rates goes up further, it will definitely slow down demand," says a senior banker. "If one can afford to wait, it is better to postpone the purchase by six months. Especially, those who are buying the property for investment. However, if you are buying a place to stay, you can still go ahead. Over a long period, the price would even out," says Roongta. Financial advisors also have another solution for those with a tight budget. "If you have an insurance policy, national savings certificates, shares or mutual fund units, you can pledge them to get an overdraft facility. You can use the money to make a prepayment or pay EMI," says Roongta. Another way out would be to borrow more. "It is not a preferred route. But if you don't have any other way out, you can ask the bank to offer you a top-up loan to make a prepayment," says a financial advisor
Low
[ 0.512087912087912, 29.125, 27.75 ]
Grey coat, red tie. Artfully furrowed brow. A gruff, East End voice, administering exclamations of doubt (“It’s not right, is it?!”) and fury. John Luther (or Loofah, to be precise) is a detective, but he is also a deeply troubled man with a brilliant mind, whom creator Neil Cross has described as having “some of the Sherlock Holmes about him”. And, when he arrived on our screens some nine years ago – played by Idris “Future Bond” Elba – it seemed that Cross had cracked the formula for a compelling British crime drama, darting from gangland gore to comic-book camp. In the show’s first series, a crucial bond was forged between this not-bent-but-also-not-entirely-unbent copper on the brink of self-destruction, and child prodigy-turned-killer Alice Morgan (Ruth Wilson). In the foreground were a series of heinous cases involving snipers, kidnappers and killers but, ultimately, the biggest threat turned out to be one of Luther’s own colleagues, DCI Ian Reed, a bent – yes-actually-properly-bent-this-time – cop. Series two offered more personal and professional strife, the antihero flanked by his more rule-observant sidekick, DS Ripley, and the self-righteous DS Gray. Sure, every baddie ultimately fitted the mould of “middle-aged man surviving on Rustlers burgers in his mum’s basement”. But when it worked, Luther really worked, making up for its pick-and-mix approach to thriller tropes with a brooding core, as echoed in its brutalist backdrops. (“This London – soulless, anonymous, thoughtlessly modern – is the very image of a 21st-century abyss,” mused the New York Times in 2011.) And yet, Luther couldn’t quite sustain its bathos. The moment things started to go off the boil is open to interpretation. Was it series three, with plummy antagonist Tom Marwood, who looked as though he was mildly irked by an Ocado substitution as he sought retribution for his wife’s murder? Was it the needless death of poor young DS Ripley? Or was it series four, where Luther took on the hackneyed role of a cop coming out of retirement for a grand total of two episodes? (Elba and Cross were both pressed for time). By the time series five debuted at the beginning of this year, it wasn’t so much a case of “It’s not right, is it?” as “Something’s gone a bit wrong”. Between the dated, Kray-lite schemes of gangster George Cornelius, Alice’s personality transplant (the much-missed Wilson had seemingly mislaid her character’s accent since starring in The Affair) and a lazy subplot about the killer having a brain tumour, things felt at best uneven and, at worst, entirely cringey, with psychosexual themes proving little more than a glossy patina. Elba recently revealed that a film version of the series is in the works. Translating the show’s Gotham vibes to the big screen might have worked back in 2010, but that was before Killing Eve’s queer cleverness, or even the moral message of Bodyguard. Unless Luther can channel the grit that once made it so gripping, perhaps it’s time for our man to hang that coat up for good – or at least take it for a nice dry clean.
Mid
[ 0.5794871794871791, 28.25, 20.5 ]
Q: Java: I can add as period to another period? This program tells me which time a start date and an end, now I ask you whether you want to enter another period when you s (yes) adds the starting period, but this want to join with above, for example, I add the following: 16/08/1993 - 09/09/2014 = 21 years, 0 months, 24 days. 14/02/1995 - 18/05/2001 = 6 years, 3 months, 35 days Total:.................................27 years, 3 months y 59 days NOTE: I do not know if something is wrong and try everything. I am new to java. public void diferencia(){ char seguir=0; Scanner teclado =new Scanner(System.in); do{ System.out.println("day/Month/year "); System.out.println("Write the first date: "); String dayini = teclado.next(); System.out.println("write the second date: "); String dateactual = teclado.next(); String[] aFechaIng = dateini.split("/"); Integer dayini = Integer.parseInt(aFechaIng[0]); Integer monthini = Integer.parseInt(aFechaIng[1]); Integer yearini = Integer.parseInt(aFechaIng[2]); String[] aFecha = dateactual.split("/"); Integer dayactual= Integer.parseInt(aFecha[0]); Integer monthactual = Integer.parseInt(aFecha[1]); Integer yearactual = Integer.parseInt(aFecha[2]); int b = 0; int days = 0; //DAYS int month = 0; //MONTH int years = 0; //YEARS int months = 0; //MONTHS month = monthini - 1; // LEAP YEAR if(month==2){ if ((yearactual % 4 == 0) && ((yearactual % 100 != 0) || (yearactual % 400 == 0))){ b = 29; }else{ b = 28; } }else if(month <= 7){ if(month == 0){ b = 31; }else if(month % 2==0){ b = 30; }else{ b = 31; } }else if(month > 7){ if(month % 2 == 0){ b = 31; }else{ b = 30; } } if((yearini > yearactual) || (yearini == yearactual && monthini > monthactual) || (yearini == yearactual && monthini == monthactual && dayini > dayactual)){ // errors System.out.println("The start date must be minor "); }else{ //time periods if(monthini <= monthactual){ years = yearactual - yearini; if (dayini <= dayactual){ mmonths = monthactual - monthini; days = b - (dayini - dayactual); }else{ if(monthactual == monthini){ years = years - 1; } months = (monthactual - monthini - 1 + 12) % 12; days = b - (dayini - dayactual); } }else{ years = yearactual - yearini - 1; //System.out.println("Años?¿: " + anios); if(dayini > dayactual){ months = monthactual - monthsini - 1 + 12; days = b - (dayini - dayactual); }else{ months = monthactual - monthini + 12; days = dayactual - dayini; } } } System.out.println("Years: "+years); System.out.println("Months: "+months); System.out.println("Days: "+days); System.out.println("You want to add another period?? "); seguir = teclado.next().charAt(0); }while(seguir!='n'); }//finish method diferencia A: Before begining your loop create three variables wich are totalAnios (totalYears), totalMeses (totalMonths) , totalDias (totalDays) and initialize them to 0. int totalAnios = 0; int totalMeses = 0; int totalDias = 0; do { .... } And before closing the loop (before while(...) ) you have to add the difference of years, months and days to the previous varibales you created ( totalAnios , totalMeses , totalDias ) and print the result. do { ... /* your calculation goes here */ totalAnios += anios; totalMeses += meses; totalDias += dias; System.out.println("total : " + totalAnios + " " + totalMeses + " " + totalDias); } while (seguir != 'n'); Each time the user choose to stay in the loop, we sum the previous results and print the total. By the way, next time don't forget to format your code and put variables in english ;) .
Low
[ 0.506607929515418, 28.75, 28 ]
By: Paul Goldberg, Staff Writer HOLLYWOOD, CA — It has become a norm’ to see gay couples, gay characters with their own plots in network and cable television shows across the spectrum over the past 10 years but now some conservatives are up in arms at the direction NBC television is going with their new show Midnight, Texas which is based on the book series of the same name, by author Charlaine Harris who is also the author of True Blood and stars François Arnaud, Dylan Bruce, Parisa Fitz-Henley, Arielle Kebbel, Jason Lewis, Peter Mensah, Sarah Ramos, and Yul Vázquez. Why you ask? Well it seems that the producers of the show have gone down the path of adding Christianity into their story line by including two fallen angels into the plot but that is not what is angering some conservatives. It is the fact that these two fallen angels are a gay and not only that, they are a couple as shown in the latest episode where Joe played by Jason Lewis and Chuy played by Bernardo Saracino, kissed for the first time. Now it wasn’t a surprise because the last few episodes had been leaning toward this story line developing but the outrage from some in the conservative sites are outraged. (Watch Episode) However we must remember that the show centers around your fantasy town filled with supernatural creatures, spirts, vampires, witches and fallen angels. It isn’t a new plot in any way except that network television is copying what paid cable premium channels have been doing for more than 20 years. Now here is the kicker! The show’s ratings from the episode of the fallen angels first kiss was the largest ratings gainer for the series so far: Air Date Episode Demo Change (millions) Change Premier Date 01-01 0.90 0.00 3.571 0.00 07/31/2017 01-02 0.80 -11.11% 3.286 -7.98% 08/07/2017 01-03 0.80 0.00% 3.062 -6.82% 08/14/2017 01-04 0.80 0.00% 3.214 4.96% You can watch Midnight,Texas Mondays at 10/9c on NBC. Check your local listings.
Mid
[ 0.618336886993603, 36.25, 22.375 ]
Obama is currently dealing with Syria, the gun debate, the sequester and other economic issues, and terrorism–and also with growing questions about his effectiveness. The president’s weakness, said Bloomberg View columnist Jonathan Alter, is that he “is missing the ‘schmooze’ gene…He doesn’t like that part of politics where you have to flatter these members of Congress or CEO’s or other people. And he does it but he’s not needy himself. So their neediness and their need for the love is an abstraction to him.” The president has recently gone on a charm offensive, dining and spending time with members of Congress. And while he lost the recent gun vote, it’s not fair to say he’s been ineffective. His legacy, said Alter, may be defined by the Affordable Care Act–Obamacare. According to Alter, “the problem with the Republican party right now is they want it to fail. Which is not good for the American people who have a chance of really being helped by this program.”
Mid
[ 0.553784860557768, 34.75, 28 ]
#ifndef UNITTEST_TESTRUNNER_H #define UNITTEST_TESTRUNNER_H #include "Test.h" #include "TestList.h" namespace UnitTest { class TestReporter; class TestResults; class Timer; int RunAllTests(); struct True { bool operator()(const Test* const) const { return true; } }; class TestRunner { public: explicit TestRunner(TestReporter& reporter); ~TestRunner(); template <class Predicate> int RunTestsIf(TestList const& list, char const* suiteName, const Predicate& predicate, int maxTestTimeInMs) const { Test* curTest = list.GetHead(); while (curTest != nullptr) { if (IsTestInSuite(curTest,suiteName) && predicate(curTest)) { RunTest(m_result, curTest, maxTestTimeInMs); } curTest = curTest->next; } return Finish(); } private: TestReporter* m_reporter; TestResults* m_result; Timer* m_timer; int Finish() const; static bool IsTestInSuite(const Test* const curTest, char const* suiteName); static void RunTest(TestResults* const result, Test* const curTest, int const maxTestTimeInMs); }; } #endif
Low
[ 0.511156186612576, 31.5, 30.125 ]
Predicting carriage with extended-spectrum beta-lactamase-producing bacteria at hospital admission: a cross-sectional study. The prevalence of patients colonized with extended-spectrum beta-lactamase (ESBL)-producing bacteria increases, especially in long-term-care facilities (LTCFs). Identification of ESBL carriers at hospital admission is relevant for infection control measures and antibiotic therapy for nosocomial infections. We aimed to develop a prediction rule for ESBL carriage at hospital admission for patients admitted from home and LTCFs, and to quantify incidences of nosocomial infections caused by ESBL-producing bacteria. The ESBL-carrier status was determined of patients admitted from LTCFs and from home settings in four hospitals in the Netherlands using perianal swabs obtained within 48 hours of admission. Risk factors for ESBL carriage were assessed. Infections caused by ESBL-producing bacteria were identified retrospectively. Among 1351 patients, 111 (8.2%) were ESBL carriers at admission: 50/579 (8.6%) admitted from LTCFs and 61/772 (7.9%) from home settings (p 0.63). Previous ESBL carriage and previous hospital admission were risk factors for ESBL carriage in multivariable analysis. The area under the curve of the receiver operating characteristic curve of the model was 0.64 (95% CI 0.58-0.71). Presence of ≥1 risk factor (n = 803; 59%) had sensitivity of 72%. Incidences of nosocomial infections caused by ESBL-producing bacteria were 45.5/10,000 and 2.1/10,000 admission days for ESBL carriers and non-carriers, respectively (p <0.05). In conclusion, prevalence of ESBL carriage at hospital admission was 8.2%, and was comparable among patients admitted from LTCF and home. A clinically useful prediction rule for ESBL carriage at admission could not be developed. The absolute incidence of nosocomial infections by ESBL-producing bacteria was low, but higher among patients carrying ESBL-producing bacteria at the time of hospital admission.
Mid
[ 0.6000000000000001, 33, 22 ]
Q: python xlrd reading phone nunmber from xls becomes float I am trying to read phonenumber field from xls using xlrd (python). But, I always get float no. e.g. I get phone number as 8889997777.0 How can I get rid of floating format and convert it to string to store it in my local mongodb within python as string as regular phone number e.g. 8889997777 A: You say: python xlrd reading phone nunmber from xls becomes float This is incorrect. It is already a float inside your xls file. xlrd reports exactly what it finds. You can use str(int(some_float_value)) to do what you want to do.
Low
[ 0.505154639175257, 24.5, 24 ]
Friday, August 10, 2007 Save the Sharks of Ecuador! This is the letter I will to send to President Dr. Rafael Correa. If you want to express your support, please send me an assertive e-mail - [email protected] - with your name and residence (city / country). I will add your name to the list of supporters and forward it with the letter to Dr. Correa. Dear President Correa: I am writing to you personally to implore you to re-instate Decree 2130 to ban illegal shark fishing and shark finning, not just in the Galapagos Islands but throughout the territorial waters of Ecuador. I am a shark photographer, and I have been visiting the Galapagos regularly since 1997. As a diver I could see for myself every time I returned to the islands that the shark populations in the archipelago are dwindling at an alarming rate. You are probably aware of the fact that sharks play an essential role in the oceans, and that removing them will have catastrophic consequences for the delicately balanced marine biodiversity. The Galapagos without sharks would quickly turn into an underwater wasteland only comparable to the after-effects of an almost unimaginable natural catastrophe I am sure you also know that most sharks are being fished for their fins. One does not have to be an activist to be highly disturbed at the ongoing controversy: shark fin soup versus the health of the oceans. Unfortunately, because of the huge amounts of money involved in the international shark fin trade, no sensible compromise seems to be feasible - it is, thus, either or. While I fully appreciate that the local fishermen have their own demands which you, as president of all Ecuadorians, have to take into consideration, I plead with you to protect the sharks of the Galapagos, and of the mainland coasts, from human depredation. As in other parts of the world, shark tourism has developed into an interesting alternative source of generating foreign exchange and creating many jobs. Being an avid recreational diver I can attest to the incredible attractiveness of the marine life in the Galapagos. What I have seen in South Africa and in the Bahamas in terms of marine eco-tourism could easily be developed in Ecuador as well. Apart from being home to a fauna not found anywhere else on our planet, the Galapagos could become a mecca for shark divers from all over the world. You have the authority, and the historic opportunity, to save the Galapagos from an ecological disaster which would severely affect Ecuador's image as a top international tourist destination, and thus hurt the economy of your country for a very long time. I am sure that the vast majority of your fellow Ecuadorians will feel the way the world community does about the uniqueness of the Enchanted Islands, and the need to keep this treasure intact for future generations. Mr. President, the power to make a difference lies in your hands. Your countrymen and the citizens of the world trust that you will not waste it. Disclaimer Please be aware of the fact that diving with sharks can be potentially dangerous. Do NOT closely interact with sharks, touch them, feed them unless you are very experienced and know exactly how to interpret their body language. While it might look easy and harmless to interact with sharks the way we do, we do NOT encourage this type of underwater activity.
Mid
[ 0.628019323671497, 32.5, 19.25 ]
James Hulme Canfield James Hulme Canfield (March 18, 1847 – March 29, 1909), born in Delaware, Ohio, the son of Rev. E. H. and Martha (Hulme) Canfield, was the fourth President of The Ohio State University. Raised in New York City, Canfield attended Williams College and read law in Jackson, Michigan, before briefly practicing in St. Joseph, Michigan. He was on the faculty of the University of Kansas, teaching broadly in the humanities, until moving to the University of Nebraska, where he was chancellor. In 1895 Canfield returned to Ohio to become President of Ohio State University. He resigned the position in 1899 and became Librarian at Columbia University, where remained until his death. Hulme was also a founding member of the American Library Institute. He received the honorary degree Doctor of Letters (D.Litt.) from the University of Oxford in October 1902, in connection with the tercentenary of the Bodleian Library. He married Flavia Camp on June 24, 1873; their children included Dorothy Canfield Fisher. Canfield Hall dormitory at Ohio State is named in his honor, as is the Canfield Administration Building at the University of Nebraska. References Further reading Past Presidents of the Ohio State University Canfield Hall dormitory at Ohio State University External links Inventory of James Hulme Canfield Papers, Special Collections, University of Vermont Category:1847 births Category:1909 deaths Category:Presidents of Ohio State University Category:People from Delaware, Ohio Category:Williams College alumni Category:American lawyers admitted to the practice of law by reading law Category:Chancellors of the University of Nebraska-Lincoln
High
[ 0.6899563318777291, 29.625, 13.3125 ]
tea recipe Rose hips are the tiny seed packets in the center of the rose. They are left on the stem after the petals have fallen off. How to harvest rose hips is fairly easy – it’s mostly just in timing the harvest right. There’s nothing more natural and affordable then going outside and eating (or drinking) a piece of nature! Rose hips uses are nearly endless in the home and kitchen. Scroll down for recipies and harvesting tips. Rose Hips Uses: Tea, Jelly & Baked Goods Although dried rose hips do look lovely in potpourri or as decoration on a wreath, their nutritional benefits and delightful taste are too much to pass up! You can use rose hips in a variety of ways: Decoration in potpourri Decoration on a wreath of wood or evergreen branches In rose hips tea In muffins, bread or cookies In rose hips jelly or jam When &…
Low
[ 0.510121457489878, 31.5, 30.25 ]
Field of the Invention The present invention relates to a sheet conveying apparatus configured to convey a sheet, and more particularly, to a conveying mechanism configured to convey the sheet.
Low
[ 0.321762349799732, 15.0625, 31.75 ]
SA will reach “a point of no return” if the government enacted damaging populist policies that destroyed hope of restoring investor confidence, warned Neal Froneman, CEO of SA’s largest gold and platinum mining company. His comments reflect industry concern about whether the latest Mining Charter can reconcile the expectations of the governing party’s constituency and the need to attract investment into a deeply troubled sector that has seen the number of jobs halve in three decades to about 460,000. Debate on land expropriation without compensation has further unsettled investors at a time when sentiment towards SA is at a low, threatening President Cyril Ramaphosa’s drive to attract R100bn in investment. “We’re very close to a point of no return where this is not recoverable,” Sibanye-Stillwater’s Froneman said in an interview. “If we continue with policies that are not investor friendly and are totally populist that will be the end and there’ll be no recovery from it,” he said. The intention of the ANC to drive land expropriation without compensation — possibly amending the constitution — was drawing international attention. “It doesn’t sit well with investors in SA or abroad. “Investors need certainty in their rights. If you’re going to promote a policy like this, then it should have been well defined to remove this uncertainty,” Froneman said. The move on land by the ANC, and by extension the government, was seen as the start of greater interference in the broader economy.
Mid
[ 0.654117647058823, 34.75, 18.375 ]
Navigation How Tango changed me personally and professionally Sharing an excerpt of an article by Roxana Nasoi from Bucharest, Rumania... "Tango teaches you to feel the present with every muscle in your body." Personal Development in Other Dances and in Tango by Roxana Nasoi "Does this sound like a cliché? Most certainly not. Tango is personal development in its purest form. Before tango, I did ballet for many years. I wanted to achieve professional level. Eventually I gave up to reasons independent of me. The common link between tango and ballet or other dances is that it teaches you to accept yourself. The differences? Well, in other dances, when you’re in the Moment, you’re mostly alone. The partner has to let go of you at a certain point. It happens in ballet, in salsa, in ice skating etc. But with tango, it’s different. It won’t change you in a way in which you can’t recognize the person staring at you through the mirror. It will transform you. Tango is like a friend who you love from the bottom of your heart, but you can’t find the words to express it. You just accept it as it is, because having it in your life makes you a better person. With tango, the person you see in the glass is still you, only more beautiful, more sensitive, more human, more emotional. You suddenly realize that you didn’t change, you just improved significantly. With tango, you learn to (sometimes, literally) close an eye and forget about the past or the future: only the Moment matters. No one will applaud you because everyone is busy enjoying their own Moment. You share the happiness with another human being, be it a total stranger or a friend. The dance floor is this magical place where time stops. It’s not an empty stage: everyone is painting their story of love and vulnerability, of shared ancestral emotions. Your heart doesn’t bleed. Your heart smiles. Tango teaches you to feel the present with every muscle in your body. It teaches you that you can be graceful, you can accept other people in your personal space, you can let go and be in the moment. And the best thing? You’re not alone in that moment. You share the moment with someone else. When the moment is gone, you are not lost: you are found by the next partner, by the next 3-minute love story. And there’s always someone to take you by the hand, to thank you for being part of their moment, too and take you back to your seat. Best thing in tango? Free genuine hugs. Professional Development in Tango I believe that tango can teach us important lessons in professional development, too. Here is what I learned after 10 months: 1. Competitive much? - When you “work” with someone and share the Moment, you learn to be less competitive with the other party. There is no reason to be competitive with the person who is a complementary presence in your life. It could be a mere tango partner, or it could easily be a business partner. There’s no point in being competitive with others, really. You just have to compete with yourself. Remember: You are your closest friend and Your worst enemy! Tango has taught me how to save time, money and energy. And even friendships. 2. It takes two to tango – yes, the idea that you need support and cannot do it all alone is another important lesson learned. At some point, even if you start on your own, you need a teammate, you need a second opinion. Even if you’re a one-man-show, you still need friends and family by your side. Tango has taught me to be nicer to my family and to value my friends: those people who love me unconditionally, even when they don’t know how to show it. Tango has taught me to feel the warmth of others! 3. It’s not all about business – Human interaction is needed. You can’t do business without social. Social is important especially out of your professional circles. Why? Because after all, your business is done with regular people, so you don’t have to surround yourself with influencers. Regular people who do not share the same professional background as you can do you justice, too. You’ll learn how to interact with any type of people. Tango has taught me how to let people in and how to better communicate with others. 4. Diversity is good - meaning just like it helps become a better dancer if you dance with different people, it also helps become a better businessman (or woman, for that matter) if you diversify your professional life. If you have one business and it is going great, try adding a different product, service or even starting a second business in another niche/industry. Tango also taught me that diversity will not let you fall into boredom. 5. Step out of your comfort zone – This is the most important lesson of them all. Yes, tango teaches you to do that. I believe there’s no such thing as two followers following the same or two leaders leading the same. There are as much tango styles out there as there are dancers. And each time you dance with a new partner, you step out of your comfort zone. Each time you try a new move or a new embrace, you step out of your comfort zone. As an entrepreneur, you have to step out of your comfort zone and challenge yourself. This is what evolution is all about. We all have the seeds of evolution planted in us, why kill the plant before even giving it a chance to grow? Reinvention and transformation happen on a continuum which is filled with challenges. There’s no comfort zone on the road between point A and point B, there is always something unpredictable out there, even if you make the journey 100 times, over and over again. What Happens When You Take a Break From Tango?This is a tough one. It’s never easy taking a break from the things you love, but it does happen to all of us. I took three breaks over the course of 10 months: 3 weeks after beginner courses ended until advanced courses started; 3 months break during spring and 3 weeks now, during summer holidays. It’s a feeling of loneliness not easy to describe. Don’t imagine I tango 40 hrs per week. Now I currently dance around 10 hours per week, in practicas (tango practice places, more casual format than milonga) and one milonga/week. I have a dancing routine I practice at home or in the park of around 60 minutes/day, combining tango steps (the ones I can do on my own), ballet and gymnastics. The minute you take a break from a dance routine, it will immediately show on your body and emotional state. Dancing, and specifically tango has to be done regularly. I think the same applies with business and with life in general: to be successful in the things you do, you need to have a certain ethics and principles you maintain on a regular basis. No exceptions. Plus, practice and a regular schedule makes it for growth. Setting Goals and Reshaping Your Life These two are among the most valuable life lessons a dance has ever taught me. Setting goals has never been my thing and I’ve noticed people usually have trouble with breaking their personal and professional path into achievable milestones. Tango taught me how to reshape my life and add value to it, how to keep what matters and let go of all the unnecessary luggage (that we tend to bring in every new relationship we start – personal or professional). I started to set goals for myself in the reality provided by tango: that of human interaction. Here is what happened: 1. I realized I cannot live alone, I enjoy saying good morning or good night to someone. Living in a flat all by myself was not beneficial. Instead of getting out more and socializing more, I started isolating myself in all aspects. My business suffered just as much as my social life. It started to become painful to dance tango and interact with people instead of being happy and enjoying the moment. Following the lessons provided by tango, I moved into the center of the city in a shared apartment. With a flatmate. 2. I realized I wasn’t in touch too much with my feminine side. I would only activate it from time to time during tango. This happened due to my business mode, in which I was alone. It was hard to separate the business side from the vulnerable side in tango. At some point, I couldn’t even properly dance and this turned into great frustration. Then I understood I needed a break to sort my life in order: get business associates, form a team, not do everything by myself. The idea of “taking two to tango” became a clear business solution to my struggles. 3. I realized I was too drawn to perfection. I remember a blogger – friend of mine – told me once that “Perfect is the enemy of getting stuff done”. Just like in Tango, you just need to let yourself go and enjoy the moment: you don’t dance to make it perfect, you dance to feel free and express your true self. I stopped trying to shape my life into being perfect and set my goals to be as imperfect as possible. Tango changed my life in personal and professional ways, probably more than any other type of dance or art. It challenged and keeps challenging me to become a better person, to open up, to not be afraid and to do things in my own pace. It has taught me how everything is adaptable and re-validated the idea that things done with passion on a regular basis can create wonderful moments and can open enjoyable journeys. All you need to do is stay true to yourself and conquer all challenges with an open heart."
Mid
[ 0.5903614457831321, 30.625, 21.25 ]
Whitefish Energy, which is under scrutiny over how it was selected for work in Puerto Rico, is halting its efforts on the island's power grid because it says the local power authority owes it millions of dollars. In an interview with CNN published Monday, Whitefish CEO Andy Techmanski said the company is owed more than $83 million by the Puerto Rico Electric Power Authority (PREPA) and is stopping work because its repeated requests for payment were not fulfilled. "We stopped because of the financial situation, lack of payment with PREPA has gotten beyond its maximum threshold and what we can sustain as a business," Techmankski said. The company's CEO said that it has employed more than 500 contractors and subcontractors on its work to restore the island’s power grid following the devastation caused by Hurricane Maria. ADVERTISEMENT Whitefish accused PREPA of delaying payments to the company, including more than $26 million that was already approved by the power authority. Techmanski blasted PREPA and the Federal Emergency Management Agency, saying his company was assured “there was money available to pay us for 100% of our work.” "It may have not been the best business decision coming to work for a bankrupt island," Techmanski told CNN. A PREPA spokesperson told CNN the company would not give any statements on Whitefish until investigations into the company were finished. “The Whitefish contract is under investigation by the state and federal authorities," spokeswoman Odalys de Jesus said, according to CNN. "We will not give more information or statements until the investigation process ends. The reason is to prevent the process from being affected." Whitefish Energy, a tiny Montana company, was awarded a $300 million contract to help restore power in Puerto Rico. The island canceled the contract with Whitefish Energy on Oct. 29 over the controversy surrounding the deal. When Maria hit Puerto Rico, the energy company had only two full-time employees, and critics argued it wasn’t properly staffed to handle such a large crisis. The contract also came under fire because it contained provisions barring the government from reviewing labor costs or profits related to the company’s work in Puerto Rico. The FBI announced at the end of October that it was investigating the contract and how Whitefish and PREPA came to the agreement. The small energy company is located in the hometown of Interior Secretary Ryan Zinke Ryan Keith ZinkeTrump extends Florida offshore drilling pause, expands it to Georgia, South Carolina Conspicuous by their absence from the Republican Convention Trump flails as audience dwindles and ratings plummet MORE, but Zinke said he “had absolutely nothing to do” with the company receiving the contract.
Mid
[ 0.5930735930735931, 34.25, 23.5 ]
Q: Como pegar a data de um servidor invés de servidor local? Fiz as seguinte forma de licença con.executaSql("select *from vencimento"); con.rs.last(); SimpleDateFormat df = new SimpleDateFormat("ddMMyyyy"); Date hoje = new Date(); String dataAtual = df.format(hoje); String dataSistema = con.rs.getString("data"); int diaAt, mesAt, anoAt, diaVenc, mesVenc, anoVenc; diaAt = Integer.parseInt("" + dataAtual.charAt(0) + dataAtual.charAt(1)); mesAt = Integer.parseInt("" + dataAtual.charAt(2) + dataAtual.charAt(3)); anoAt = Integer.parseInt("" + dataAtual.charAt(4) + dataAtual.charAt(5) + dataAtual.charAt(6) + dataAtual.charAt(7)); diaVenc = Integer.parseInt("" + dataSistema.charAt(0) + dataSistema.charAt(1)); mesVenc = Integer.parseInt("" + dataSistema.charAt(2) + dataSistema.charAt(3)); anoVenc = Integer.parseInt("" + dataSistema.charAt(4) + dataSistema.charAt(5) + dataSistema.charAt(6) + dataSistema.charAt(7)); if ((diaAt <= diaVenc) && (mesAt <= mesVenc) && (anoAt == anoVenc)) { TelaPrincipal tela = new TelaPrincipal(jTextFieldUsername.getText()); tela.setVisible(true); dispose(); }else{ TelaValidaSis validasis = new TelaValidaSis(); validasis.setVisible(true); } Quando o usuário ou cliente troca a data do computador o sistema ainda continua funcionando, queria pegar uma data não do sistema mais sim exemplo uma timezone não sei como fazer isto alguém poderia me ajudar sobre isto? Estou usando MYSQL como banco de dados a tabela data esta em varchar A: Considerando que o seu banco de dados estará em um servidor que esteja fora do controle do usuário, uma das formas de resolver é diretamente na query da seguinte forma: SELECT CASE WHEN STR_TO_DATE(data, '%d%m%Y') > CURDATE() THEN 'LIBERADO' ELSE 'VENCIDO' END AS estado FROM vencimento Utilizei a seguinte criação de banco para validar a query: create table vencimento(data varchar(8)); insert into vencimento values('20112016'); insert into vencimento values('15112016'); O case já fará a validação do estado atual da licença e retornará direto no campo se está VENCIDO ou LIBERADO. Assim o controle fica exatamente na sua query. Após essa alteração você pode mudar a validação realizada na aplicação para: String estado = con.rs.getString("estado"); if (estado.equals("LIBERADO")) { TelaPrincipal tela = new TelaPrincipal(jTextFieldUsername.getText()); tela.setVisible(true); dispose(); } else { TelaValidaSis validasis = new TelaValidaSis(); validasis.setVisible(true); } Pronto, a validação será realizada. Porém tenho uma dica para te dar. É importante que você separe as responsabilidades no seu programa. Você tem um método que acessa banco de dados e reencaminha tudo para a tela, então é importante que você tente organizar e separar as responsabilidades de cada classe para que o código não fique bagunçado.
Mid
[ 0.5826972010178111, 28.625, 20.5 ]
YUI.add('series-marker', function (Y, NAME) { /** * Provides functionality for creating a marker series. * * @module charts * @submodule series-marker */ /** * The MarkerSeries class renders quantitative data by plotting relevant data points * on a graph. * * @class MarkerSeries * @extends CartesianSeries * @uses Plots * @constructor * @param {Object} config (optional) Configuration parameters. * @submodule series-marker */ Y.MarkerSeries = Y.Base.create("markerSeries", Y.CartesianSeries, [Y.Plots], { /** * @protected * * Method used by `styles` setter. Overrides base implementation. * * @method _setStyles * @param {Object} newStyles Hash of properties to update. * @return Object */ _setStyles: function(val) { if(!val.marker) { val = {marker:val}; } val = this._parseMarkerStyles(val); return Y.MarkerSeries.superclass._mergeStyles.apply(this, [val, this._getDefaultStyles()]); } },{ ATTRS : { /** * Read-only attribute indicating the type of series. * * @attribute type * @type String * @default marker */ type: { value:"marker" } /** * Style properties used for drawing markers. This attribute is inherited from `Renderer`. Below are the default * values: * <dl> * <dt>fill</dt><dd>A hash containing the following values: * <dl> * <dt>color</dt><dd>Color of the fill. The default value is determined by the order of the series on * the graph. The color will be retrieved from the below array:<br/> * `["#6084d0", "#eeb647", "#6c6b5f", "#d6484f", "#ce9ed1", "#ff9f3b", "#93b7ff", "#e0ddd0", "#94ecba", "#309687"]` * </dd> * <dt>alpha</dt><dd>Number from 0 to 1 indicating the opacity of the marker fill. The default value is 1.</dd> * </dl> * </dd> * <dt>border</dt><dd>A hash containing the following values: * <dl> * <dt>color</dt><dd>Color of the border. The default value is determined by the order of the series on * the graph. The color will be retrieved from the below array:<br/> * `["#205096", "#b38206", "#000000", "#94001e", "#9d6fa0", "#e55b00", "#5e85c9", "#adab9e", "#6ac291", "#006457"]` * <dt>alpha</dt><dd>Number from 0 to 1 indicating the opacity of the marker border. The default value is 1.</dd> * <dt>weight</dt><dd>Number indicating the width of the border. The default value is 1.</dd> * </dl> * </dd> * <dt>width</dt><dd>indicates the width of the marker. The default value is 10.</dd> * <dt>height</dt><dd>indicates the height of the marker The default value is 10.</dd> * <dt>over</dt><dd>hash containing styles for markers when highlighted by a `mouseover` event. The default * values for each style is null. When an over style is not set, the non-over value will be used. For example, * the default value for `marker.over.fill.color` is equivalent to `marker.fill.color`.</dd> * </dl> * * @attribute styles * @type Object */ } }); }, '3.14.1', {"requires": ["series-cartesian", "series-plot-util"]});
Mid
[ 0.557894736842105, 26.5, 21 ]
1808 United States House of Representatives elections in Maryland See also United States House of Representatives elections, 1808 and 1809 List of United States Representatives from Maryland 1808 Maryland United States House of Representatives
High
[ 0.7038834951456311, 36.25, 15.25 ]
Well about 2 months ago we have finally got the property into the Deed-in-Lieu Department. Remember, the house has been VACANT since December of 2008 and Bank of America single-handedly lost 5 buyer contracts during the short sale process. The buyer (a soldier serving in Kuwait) requested to be moved for Deed in Lieu in May of 2010. After multiple calls and emails, BEGGING them to get this right, we finally got a real contact who responds to emails in Deed-In-Lieu. It turned out that the house had a front foot assesment that had not been paid (the owner was in Kuwait) and there was a lien placed on the home. Per Deed-In-Lieu, they could not move forward with the Deed-In-Lieu review unless the lien was cleared. I negotiated the payoff, made the payment in person to expedite the release, and was re-imbursed by the seller. The BofA inspector found that the property had not been broom-cleaned and that there were issues in the home. The original realtor had paid for plumbing and dry wall repair after the pipes froze. I knew the house had been cleaned out except for one trash can left in the living room with a few dry wall pieces, but didn't understand the other issues. No one has been in the house for almost 6 months. Since I was in the area, I went to check out the house. Here is what I found: This is a travesty. This was a beautiful home. I know gleaming hardwoods are not supposed to be bumpy! I wonder how much mold had built up under those warped floors? If Bank of America had dealt with this properly, this home would not be in dis-repair. We are now being told that Bank of America may not accept the home as a Deed-In-Lieu because of the condition of the home! How many other homes are in this condition due to the big banks delays? How many will problems will the new buyers face? If you are looking at foreclosures, just know that this may be what you are in for. Be wary of long-vacant properties! 6 months ago, the home didn't look like this! This seller has tried to do everything right. They tried to sell the property. Home prices dropped, she worked with the realtor and the bank to sell the property as a short sale. 5 blown contracts later, she got tired of the stress and asked for a Deed in Lieu. One year later the bank may not accept it because the home is in dis-repair! When are the big banks going to take responsibility for their hand in this mess? Bank of America got a ton of money in the bailout, where is that money? How could they have possibly gotten this so wrong? Conrad, They are in business because they got a HUGE bail out using our money! This property has an FHA loan, I assume they have an incentive to keep the loan on their books and continue getting the mortgage insurance! Stacey, My stomach turned when I entered the home! Beyond frustrated is an understatement. Larry, It is really sad. Hundreds of calls and emails and Bank of America continues to amaze me! Bridget - What can I say that hasn't already been said - unbelievable and I feel really bad for the sellers. Posted by Kristine Ginsberg, NJ Home Stager (Elite Staging and Redesign, LLC) about 8 years ago Ellie, Unfortunately the "highest level" are the folks causing this mess! It is criminal! Emily, I tried the Baltimore Sun, maybe I will try the Post. Kristine, The sellers have pretty much moved on. The husband has been in Germany for almost 2 years now, and the wife just finished a year in Kuwait and has been stationed in Georgia. I feel the most sorry for the neighbors! I just saw this post on the my http://www.facebook.com/reallybankofamericareally page and I still cannot believe this bank is getting away with all of this and the media isn't getting a hold of it and exposing them! It is so scary that they can continue to get away with bringing down the values of our neighborhoods by their negligence! I hate this bank! Thanks for your comment and support of my face book page:) Tiffany Posted by Tiffany Torgan, Featured on HGTV's New Show! How Close Can I Beach (Harcourts Prestige Properties of La Jolla) almost 8 years ago
Mid
[ 0.563451776649746, 27.75, 21.5 ]
Q: Algorithm to find fewest number of tags that encompass all items? I'm thinking this might be NP-complete, but I'll ask anyway. Greedy algorithms don't seem to work in my head. Given a set of items, each with 1 or more tags, I want to find the smallest set of tags that cover all the items. Edit: See my "solution" here. A: This is the Set Cover problem, which is NP-complete. Each tag defines a subset of your list of items, and you want to find the minimum number of subsets (tags) whose union equals the full list of items.
High
[ 0.689655172413793, 31.25, 14.0625 ]
Our Beers We are very proud to serve British-style beer as authentic as you will find outside of the Isles. Roundabout - ESB Adding torrified wheat and both crystal and chocolate malts on top of a Maris Otter base bring a delicious malty flavor to this well rounded ale. The predominant hop flavor is Kent Goldings. ABV: 5.5% Black Point Porter - London Style Porter Rich and chocolaty in flavor, with a hint of a coffee note, the flavor in this beer comes from a combination of brown and chocolate and brown malts. A bit lighter flavored than most American porters, the Black Point has a has a subtle and complex flavor profile that is often lost in heavier beers. ABV: 5.5% E.O.B. - English Pale Ale Made with floor malted Maris Otter and British crystal malt, this traditional English bitter gets its well balanced hop flavor from a late addition of imported Fuggle hops. A great full flavored session beer. ABV: 3.8% Burton's Bounty - English IPA More balanced than its west coast counterparts, this English style IPA is a throw back to the origins of the style. Dry hopped in the cask with whole leaf Fuggle hops, and featuring generous boil additions of both East Kent Goldings and Fuggles, this IPA has a more earthy character than its stateside descendants. ABV: 6.5% Golden Rye - Extra Pale Ale Light and crisp in both color and flavor, with a bit of bite provided by a generous addition of rye malt. A hop profile featuring Kent Goldings is designed to compliment, rather than obscure the featured rye flavor in this beer. ABV: 4.5% The Gypsy - Dry Irish Stout A creamy texture compliments the roast barley flavor of this stout. Unique among our beers for using only bittering hops, the Gypsy has a hint of smokiness to round out its robust malt flavor. ABV: 4.5% Our beer is made in the traditional British fashion that uses the gentle carbonation that occurs naturally from the fermentation process. ECBC beer is not pressurized with carbon dioxide, like most American beers. Once the cask is tapped, carbonation is then maintained at the natural level for the temperature and (atmospheric) pressure at which is it served, not pressurized under CO2. Finally, the method of dispensing is very unique to British ales. Because the cask is not under (CO2) pressure, the beer is hand pumped at the bar into your pint glass. The hand pump pulls the beer instead of CO2 pushing it out, hence the term of a barman “pulling a pint.” This difference in carbonation and serving methods provides a beer with a unique texture on your palate. You will find our beer less “fizzy” than standard American style beer, which will allow you to enjoy the flavors to their fullest.
Mid
[ 0.58133971291866, 30.375, 21.875 ]
Q: Where is GetTickCount declared in Firemonkey? I am using multi device in Delphi and I am building an android app. I need to use GetTickCount that was declared in Windows . Does it exist somewhere in firemonkey or is there an alternative ? A: GetTickCount is a Windows function and so does not exist on other platforms. For your cross platform needs you should use TStopWatch from System.Diagnostics. A: use TThread.GetTickCount it's cross platform
Low
[ 0.423728813559322, 25, 34 ]
Saidpur, Kapurthala Saidpur is a village in Sultanpur Lodhi Tehsil, Kapurthala district, Punjab, India,situated in the footsteps of Margalla Hills hardly at five minutes drive from the upscale neighbourhoods of the capital. Bhai Jwala Singh Ragi: (1892–1952) Bhai Sahib Bhai Jwala Singh Ragi of SaidPur, Kapurthala. 1935 at Dera Sahib, Lahore. On the Jori is Bhai Gurcharan Singh and at about 10 years old is Bhai Avtar Singh playing the Taus. The handsome little boy is Bhai Rattan Singh, a gurbhai of Bhai Avtar Singh and a Tabla-Jori player who studied from Bhai Gurcharan Singh. Bhai Rattan Singh played Jori with Bhai Saheb Jwala Singh for the 9 days of kirtan when Mohandas Karam Chand (Mahatma) Gandhi died. The pinnacle was his victory over the great legendary rababi Bhai Moti of Darbar Sahib Amritsar in the early 1900s. Bhai Santu played Jori with Bhai Moti and Bhai Harnam Singh of Thatha Tibba (a senior disciple of Ustad Bhai Harnam Singh of Jammu) played with him. But for the dual, they had to swap their pakhawajis to increase the level of difficulty. The competition went on for three days. He is one Kirtaniya whose name everyone took by touching their ears. Bhai Kultar Singh Saidpur: a live wire between the new Sikh generation and the music of the first five gurus Being the grandson of illustrious Bhai Jawala Singh ji of village Saidpur near the historic town of Sultanpur Lodhi, blessed by a long stay by Sri Guru Nanak Dev ji, and being the son of highly celebrated Late Bhai Avtar Singh ji former Huzoori Raagi of Gurdwara Sis Ganj Sahib of Old Delhi, Bhai Kultar Singh has several advantages as a "Gurbani Kirtania". His ancestors were associated with the "Guru Darbars" some four hundred years ago. As such they had a unique exposure to the prevalent traditions of "Gurbani Kirtan"in the "Guru Darbars". One of his predecessors had the privilege of serving in the "Guru Darbar" of the Tenth Master Sri Guru Guru Gobind Singh ji, as one of the several Kirtanias, while the Guru was in the Punjab. Rubaru Restaurant The first fine dining restaurant in the area with full hygienic facility. Rubaru makes all type of Indian dishes and also has a big Chinese menu with famous worldwide dishes. It states at the main road of rcf to Goindwal sahib in the main entrance of Saidpur. If food is an experience then you will find it at this restaurant. Famous People from Saidpur Baba Tehel Singh (also Bhai Panjab Singh; see Encyclopaedia of Sikhism, entry by Bhai Ardaman Singh Bagrian); Baba Dewa Singh (Diwan Singh, d.1884); Bhai Narain Singh (d.1906); Gyani Bhagat Singh; Bhai Avtar Singh and Bhai Gurcharan Singh Rāgi; Balwant Singh Thind (former Deputy-Chief Minister of Punjab, Ex Revenue/Finance Minister); Sardar Hardeep Singh PCS; Sardar Hardial Singh IAS; Amarjit Singh Thind, District Kapurthala Block Education Officer; Avtar Singh Thind, I.R.S., (former Taxation Commissioner of India); Hardial Singh Thind, (former Session Judge, Punjab); Sukhdev Singh Thind, (Inspector General of Gujarat); Karan Avtar Singh Thind IAS (Chief Secretary, Punjab); Ravneet Kaur IAS; Principal Keval Singh, (Social worker, Philosopher); Amandeep Singh (PPLS)Additional District Attorney; Principal Lakhbir Singh (PES); Yuvraj Singh Thind IIT Bombay, IIM Ahemdabad; Bhai Baldeep Singh, The Anād Foundation; Category:Villages in Kapurthala district
Mid
[ 0.6298200514138811, 30.625, 18 ]
Comment An opportunistic and little-known software utility outfit has stuck another carving knife into Thunderbird 3. The Performance Protector blog reckons the once-reliable email client has the profile of a virus. Let it loose on your systems, and wave goodbye to network performance and any spare CPU cycles. Fair criticism? Yes and no. PerfProtector highlights two factors for the stress Thunderbird 3 imposes on a PC. One is that version 3, unlike version 2, downloads the full contents of IMAP folders by default. The other is that it then creates a full text index of the material, but does so very inefficiently. Gmail seems to provide a perfect storm, as folders are downloaded several times. Still, other systems such as Mac's Mail.app and the Vista-rized version of Outlook Express (including Live Mail) also produce a full text index, but do so considerably more efficiently in their use of CPU and RAM resources. Something has gone seriously wrong with Thunderbird. A year ago, the only criticism you ever heard about it was that development moved too slowly. Nothing ever happened, it seemed. Back in June we pointed out that the version 3.1 beta was noticeably faster, it that 1GB of RAM is now recommended, with 768MB as a system minimum. This is quite bizarre. The Mac OS X mail client is hardly the fastest in the world, or the most efficient: but with several Gigabytes of email stored and indexed, and a few dozen virtual folders, it takes up 128MB of RAM. At least with open source, you can see what the developers are up to - or not. One lingering culprit has been found - the database file format that dates back to 1994, Mork. A bug filed back in August 1999 requested de-Morking at least part of the software's reliance on Mork, and 3.0 promised to implement it. Alas, the message files are still in Mork format. A while ago I wrote an old bugger's whinge about the state of email clients in general. I realise this is now a minority interest. Do I need to update it?
Low
[ 0.5150375939849621, 34.25, 32.25 ]
# $Id$ import imp import sys import inc_sip as sip import inc_const as const import re from inc_cfg import * # Read configuration cfg_file = imp.load_source("cfg_file", ARGS[1]) # Default server port (should we randomize?) srv_port = 50070 def test_func(test): pjsua = test.process[0] dlg = sip.Dialog("127.0.0.1", pjsua.inst_param.sip_port, local_port=srv_port, tcp=cfg_file.recvfrom_cfg.tcp) last_cseq = 0 last_method = "" last_call_id = "" for t in cfg_file.recvfrom_cfg.transaction: # Print transaction title if t.title != "": dlg.trace(t.title) # Run command and expect patterns for c in t.cmds: if c[0] and c[0] != "": pjsua.send(c[0]) if len(c)>1 and c[1] and c[1] != "": pjsua.expect(c[1]) # Wait for request if t.check_cseq: # Absorbs retransmissions cseq = 0 method = last_method call_id = last_call_id while cseq <= last_cseq and method == last_method and call_id == last_call_id: request, src_addr = dlg.wait_msg_from(30) if request==None or request=="": raise TestError("Timeout waiting for request") method = request.split(" ", 1)[0] cseq_hval = sip.get_header(request, "CSeq") cseq_hval = cseq_hval.split(" ")[0] cseq = int(cseq_hval) call_id = sip.get_header(request, "Call-ID") last_cseq = cseq last_method = method else: request, src_addr = dlg.wait_msg_from(30) if request==None or request=="": raise TestError("Timeout waiting for request") # Check for include patterns for pat in t.include: if re.search(pat, request, re.M | re.I)==None: if t.title: tname = " in " + t.title + " transaction" else: tname = "" raise TestError("Pattern " + pat + " not found" + tname) # Check for exclude patterns for pat in t.exclude: if re.search(pat, request, re.M | re.I)!=None: if t.title: tname = " in " + t.title + " transaction" else: tname = "" raise TestError("Excluded pattern " + pat + " found" + tname) # Create response if t.resp_code!=0: response = dlg.create_response(request, t.resp_code, "Status reason") # Add headers to response for h in t.resp_hdr: response = response + h + "\r\n" # Add message body if required if t.body: response = response + t.body # Send response dlg.send_msg(response, src_addr) # Expect something to happen in pjsua if t.expect != "": pjsua.expect(t.expect) # Sync pjsua.sync_stdout() # Replace "$PORT" with server port in pjsua args cfg_file.recvfrom_cfg.inst_param.arg = cfg_file.recvfrom_cfg.inst_param.arg.replace("$PORT", str(srv_port)) # Here where it all comes together test = TestParam(cfg_file.recvfrom_cfg.name, [cfg_file.recvfrom_cfg.inst_param], test_func)
Low
[ 0.534069981583793, 36.25, 31.625 ]
Characterization of Cl-/HCO3- exchange in cultured bovine pigmented ciliary epithelium. Many recent data indicate that transport of Cl- across the ciliary epithelium plays an important role in aqueous humor formation. We used 36Cl to investigate the pathways for Cl- transport in confluent monolayers of cultured bovine pigmented ciliary epithelial cells. Cl- uptake mainly occurred via a mechanism with typical characteristics of an anion exchanger, and could be stimulated by an outwardly directed HCO3- gradient. One mM SITS and 1 mM DIDS inhibited Cl- uptake by some 80-90%, the latter with an IC50 of about 20 microM. HCO3- stimulated Cl- uptake could be partly inhibited for furosemide and to a lesser extent by bumetanide, indicating an action of loop-diuretics on the anion exchanger. 36Cl- uptake was cis-inhibited by the halides Cl-, I- and Br-, by NO3-, formate and acetate. Inhibition of Cl- uptake by extracellular HCO3- was less effective in the absence of extracellular Na+, suggesting that not only HCO3- but also NaCO3- binds to the carrier. SO2/4-, cyclamate and gluconate did not significantly reduce Cl- uptake via the anion exchanger. DIDS-senstive Cl- uptake showed saturation kinetics with respect to the Cl- concentration with an apparent Km of 8 mM. Cl- efflux could be stimulated by external Cl- and HCO3- and was inhibited by DIDS. Thus, cultured bovine pigmented ciliary epithelial cells express a Cl-/HCO3- exchanger. A possible role of this carrier system for aqueous humor formation is discussed [corrected].
High
[ 0.689826302729528, 34.75, 15.625 ]
/* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.cassandra.repair.messages; import java.util.*; import org.slf4j.Logger; import org.slf4j.LoggerFactory; import org.apache.cassandra.config.Config; import org.apache.cassandra.config.DatabaseDescriptor; import org.apache.cassandra.dht.IPartitioner; import org.apache.cassandra.dht.Range; import org.apache.cassandra.dht.Token; import org.apache.cassandra.repair.RepairParallelism; import org.apache.cassandra.tools.nodetool.Repair; import org.apache.cassandra.utils.FBUtilities; /** * Repair options. */ public class RepairOption { public static final String PARALLELISM_KEY = "parallelism"; public static final String PRIMARY_RANGE_KEY = "primaryRange"; public static final String INCREMENTAL_KEY = "incremental"; public static final String JOB_THREADS_KEY = "jobThreads"; public static final String RANGES_KEY = "ranges"; public static final String COLUMNFAMILIES_KEY = "columnFamilies"; public static final String DATACENTERS_KEY = "dataCenters"; public static final String HOSTS_KEY = "hosts"; public static final String TRACE_KEY = "trace"; // we don't want to push nodes too much for repair public static final int MAX_JOB_THREADS = 4; private static final Logger logger = LoggerFactory.getLogger(RepairOption.class); /** * Construct RepairOptions object from given map of Strings. * <p> * Available options are: * * <table> * <caption>Repair Options</caption> * <thead> * <tr> * <th>key</th> * <th>value</th> * <th>default (when key not given)</th> * </tr> * </thead> * <tbody> * <tr> * <td>parallelism</td> * <td>"sequential", "parallel" or "dc_parallel"</td> * <td>"sequential"</td> * </tr> * <tr> * <td>primaryRange</td> * <td>"true" if perform repair only on primary range.</td> * <td>false</td> * </tr> * <tr> * <td>incremental</td> * <td>"true" if perform incremental repair.</td> * <td>false</td> * </tr> * <tr> * <td>trace</td> * <td>"true" if repair is traced.</td> * <td>false</td> * </tr> * <tr> * <td>jobThreads</td> * <td>Number of threads to use to run repair job.</td> * <td>1</td> * </tr> * <tr> * <td>ranges</td> * <td>Ranges to repair. A range is expressed as &lt;start token&gt;:&lt;end token&gt; * and multiple ranges can be given as comma separated ranges(e.g. aaa:bbb,ccc:ddd).</td> * <td></td> * </tr> * <tr> * <td>columnFamilies</td> * <td>Specify names of ColumnFamilies to repair. * Multiple ColumnFamilies can be given as comma separated values(e.g. cf1,cf2,cf3).</td> * <td></td> * </tr> * <tr> * <td>dataCenters</td> * <td>Specify names of data centers who participate in this repair. * Multiple data centers can be given as comma separated values(e.g. dc1,dc2,dc3).</td> * <td></td> * </tr> * <tr> * <td>hosts</td> * <td>Specify names of hosts who participate in this repair. * Multiple hosts can be given as comma separated values(e.g. cass1,cass2).</td> * <td></td> * </tr> * </tbody> * </table> * * @param options options to parse * @param partitioner partitioner is used to construct token ranges * @return RepairOptions object */ public static RepairOption parse(Map<String, String> options, IPartitioner partitioner) { // if no parallel option is given, then this will be "sequential" by default. RepairParallelism parallelism = RepairParallelism.fromName(options.get(PARALLELISM_KEY)); boolean primaryRange = Boolean.parseBoolean(options.get(PRIMARY_RANGE_KEY)); boolean incremental = Boolean.parseBoolean(options.get(INCREMENTAL_KEY)); boolean trace = Boolean.parseBoolean(options.get(TRACE_KEY)); int jobThreads = 1; if (options.containsKey(JOB_THREADS_KEY)) { try { jobThreads = Integer.parseInt(options.get(JOB_THREADS_KEY)); } catch (NumberFormatException ignore) {} } // ranges String rangesStr = options.get(RANGES_KEY); Set<Range<Token>> ranges = new HashSet<>(); if (rangesStr != null) { StringTokenizer tokenizer = new StringTokenizer(rangesStr, ","); while (tokenizer.hasMoreTokens()) { String[] rangeStr = tokenizer.nextToken().split(":", 2); if (rangeStr.length < 2) { continue; } Token parsedBeginToken = partitioner.getTokenFactory().fromString(rangeStr[0].trim()); Token parsedEndToken = partitioner.getTokenFactory().fromString(rangeStr[1].trim()); ranges.add(new Range<>(parsedBeginToken, parsedEndToken)); } } RepairOption option = new RepairOption(parallelism, primaryRange, incremental, trace, jobThreads, ranges); // data centers String dataCentersStr = options.get(DATACENTERS_KEY); Collection<String> dataCenters = new HashSet<>(); if (dataCentersStr != null) { StringTokenizer tokenizer = new StringTokenizer(dataCentersStr, ","); while (tokenizer.hasMoreTokens()) { dataCenters.add(tokenizer.nextToken().trim()); } option.getDataCenters().addAll(dataCenters); } // hosts String hostsStr = options.get(HOSTS_KEY); Collection<String> hosts = new HashSet<>(); if (hostsStr != null) { StringTokenizer tokenizer = new StringTokenizer(hostsStr, ","); while (tokenizer.hasMoreTokens()) { hosts.add(tokenizer.nextToken().trim()); } option.getHosts().addAll(hosts); } // columnfamilies String cfStr = options.get(COLUMNFAMILIES_KEY); if (cfStr != null) { Collection<String> columnFamilies = new HashSet<>(); StringTokenizer tokenizer = new StringTokenizer(cfStr, ","); while (tokenizer.hasMoreTokens()) { columnFamilies.add(tokenizer.nextToken().trim()); } option.getColumnFamilies().addAll(columnFamilies); } // validate options if (jobThreads > MAX_JOB_THREADS) { throw new IllegalArgumentException("Too many job threads. Max is " + MAX_JOB_THREADS); } if (primaryRange && (!dataCenters.isEmpty() || !hosts.isEmpty())) { throw new IllegalArgumentException("You need to run primary range repair on all nodes in the cluster."); } return option; } private final RepairParallelism parallelism; private final boolean primaryRange; private final boolean incremental; private final boolean trace; private final int jobThreads; private final Collection<String> columnFamilies = new HashSet<>(); private final Collection<String> dataCenters = new HashSet<>(); private final Collection<String> hosts = new HashSet<>(); private final Collection<Range<Token>> ranges = new HashSet<>(); public RepairOption(RepairParallelism parallelism, boolean primaryRange, boolean incremental, boolean trace, int jobThreads, Collection<Range<Token>> ranges) { if (FBUtilities.isWindows() && (DatabaseDescriptor.getDiskAccessMode() != Config.DiskAccessMode.standard || DatabaseDescriptor.getIndexAccessMode() != Config.DiskAccessMode.standard) && parallelism == RepairParallelism.SEQUENTIAL) { logger.warn("Sequential repair disabled when memory-mapped I/O is configured on Windows. Reverting to parallel."); this.parallelism = RepairParallelism.PARALLEL; } else this.parallelism = parallelism; this.primaryRange = primaryRange; this.incremental = incremental; this.trace = trace; this.jobThreads = jobThreads; this.ranges.addAll(ranges); } public RepairParallelism getParallelism() { return parallelism; } public boolean isPrimaryRange() { return primaryRange; } public boolean isIncremental() { return incremental; } public boolean isTraced() { return trace; } public int getJobThreads() { return jobThreads; } public Collection<String> getColumnFamilies() { return columnFamilies; } public Collection<Range<Token>> getRanges() { return ranges; } public Collection<String> getDataCenters() { return dataCenters; } public Collection<String> getHosts() { return hosts; } public boolean isGlobal() { return dataCenters.isEmpty() && hosts.isEmpty(); } @Override public String toString() { return "repair options (" + "parallelism: " + parallelism + ", primary range: " + primaryRange + ", incremental: " + incremental + ", job threads: " + jobThreads + ", ColumnFamilies: " + columnFamilies + ", dataCenters: " + dataCenters + ", hosts: " + hosts + ", # of ranges: " + ranges.size() + ')'; } }
Low
[ 0.5209713024282561, 29.5, 27.125 ]
Personal data Additional information Bachelor of science from the Arizona State University, 1947; doctor of rights from the University of Arizona, 1949; from 1950 until 1970 he was special agent of the Federal Bureau of Investigation - FBI; from 1977 until 1987 member of the House of Representatives (Republican party); in 1984 he was a candidate for the "Politican in Space program"; not selected due of his age (64 years).
Low
[ 0.47956403269754705, 22, 23.875 ]
Surgical treatment for spontaneous rupture of hepatocellular carcinoma. Twenty-seven patients with spontaneous rupture of hepatocellular carcinoma (HCC) underwent surgical treatment during the past ten years. The indications for emergent laparotomy were hemoperitoneum in 14 and unspecified peritonitis in 13. Twelve were found to have noncirrhotic HCC. The incidence of associated cirrhosis was 55.56 per cent. Surgical procedures included hepatic resection in 14, hepatic arterial ligation in six and packing, suture and electrocauterization in seven. Seven died within one month postoperatively, a surgical mortality rate of 28 per cent. Recently, palliative resection has been used more frequently. The group of patients who underwent resection have a better prognosis.
High
[ 0.6623036649214661, 31.625, 16.125 ]
#pragma once #include <ISWeb.h> #include <thread/SubThreadImp.h> class CWebHaosou: public ISWeb, public CMsComBase<CWebHaosou>, public CSubThread { public: UNKNOWN_IMP1( ISWeb); CWebHaosou(void); ~CWebHaosou(void); protected://ISWeb STDMETHOD_(CLSID, GetClsid)(); STDMETHOD(SetNotify)( ISWebNotify* pNotify); STDMETHOD(GetSuggest)( LPCWSTR lpszSuggest); virtual HRESULT Run(); private: UTIL::com_ptr<ISWebNotify> m_pSwebNotify; HANDLE m_hSemaphore; CString m_strText; };
Mid
[ 0.630922693266832, 31.625, 18.5 ]
Top 5 games more gay than Dragon Age 2 You may have seen the utterly ridiculous complaints made by fans of Dragon’s Age 2 that the game is “too gay“. Accusing games of failing to satisfy the straight male market is a bit like those idiots who say the most discriminated-against group in western society are middle-aged white men. While literally thousands of games depict hideous, over-sexualised caricatures of women, very few depict gay men in anything but childish or actively offensive ways. While I wasn’t a massive fan of Dragon’s Age 2, I applaud the designers for trying to cater to an audience that has been cruelly overlooked in mainstream games releases. Dragon’s Age 2 gives you many romantic options that you are free to pursue (or not) as you desire. Claiming that this one game over emphasizes the homosexual market is in direct contrast with the number of games that make no concessions whatsoever to gay people. Perhaps if this particular internet commentator was so threatened by having their avatars sexuality questioned then they need to reconsider their own sexual alignment. In order to help them do so, here are five games far more gay than Dragon’s Age 2. Perhaps by playing these games this poor angry “heterosexual” young man can discover some tolerance, or better yet discover new and exciting romantic opportunities of his own.
Mid
[ 0.624691358024691, 31.625, 19 ]
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/xhtml;charset=UTF-8"/> <meta http-equiv="X-UA-Compatible" content="IE=9"/> <meta name="generator" content="Doxygen 1.8.14"/> <meta name="viewport" content="width=device-width, initial-scale=1"/> <title>libguac: guacamole/hash.h Source File</title> <link href="tabs.css" rel="stylesheet" type="text/css"/> <script type="text/javascript" src="jquery.js"></script> <script type="text/javascript" src="dynsections.js"></script> <link href="search/search.css" rel="stylesheet" type="text/css"/> <script type="text/javascript" src="search/searchdata.js"></script> <script type="text/javascript" src="search/search.js"></script> <link href="doxygen.css" rel="stylesheet" type="text/css" /> </head> <body> <div id="top"><!-- do not remove this div, it is closed by doxygen! --> <div id="titlearea"> <table cellspacing="0" cellpadding="0"> <tbody> <tr style="height: 56px;"> <td id="projectalign" style="padding-left: 0.5em;"> <div id="projectname">libguac &#160;<span id="projectnumber">1.2.0</span> </div> </td> </tr> </tbody> </table> </div> <!-- end header part --> <!-- Generated by Doxygen 1.8.14 --> <script type="text/javascript"> /* @license magnet:?xt=urn:btih:cf05388f2679ee054f2beb29a391d25f4e673ac3&amp;dn=gpl-2.0.txt GPL-v2 */ var searchBox = new SearchBox("searchBox", "search",false,'Search'); /* @license-end */ </script> <script type="text/javascript" src="menudata.js"></script> <script type="text/javascript" src="menu.js"></script> <script type="text/javascript"> /* @license magnet:?xt=urn:btih:cf05388f2679ee054f2beb29a391d25f4e673ac3&amp;dn=gpl-2.0.txt GPL-v2 */ $(function() { initMenu('',true,false,'search.php','Search'); $(document).ready(function() { init_search(); }); }); /* @license-end */</script> <div id="main-nav"></div> <!-- window showing the filter options --> <div id="MSearchSelectWindow" onmouseover="return searchBox.OnSearchSelectShow()" onmouseout="return searchBox.OnSearchSelectHide()" onkeydown="return searchBox.OnSearchSelectKey(event)"> </div> <!-- iframe showing the search results (closed by default) --> <div id="MSearchResultsWindow"> <iframe src="javascript:void(0)" frameborder="0" name="MSearchResults" id="MSearchResults"> </iframe> </div> <div id="nav-path" class="navpath"> <ul> <li class="navelem"><a class="el" href="dir_6bb9fad85c98b48a11165f494b9f53ce.html">guacamole</a></li> </ul> </div> </div><!-- top --> <div class="header"> <div class="headertitle"> <div class="title">hash.h</div> </div> </div><!--header--> <div class="contents"> <a href="hash_8h.html">Go to the documentation of this file.</a><div class="fragment"><div class="line"><a name="l00001"></a><span class="lineno"> 1</span>&#160;<span class="comment">/*</span></div><div class="line"><a name="l00002"></a><span class="lineno"> 2</span>&#160;<span class="comment"> * Licensed to the Apache Software Foundation (ASF) under one</span></div><div class="line"><a name="l00003"></a><span class="lineno"> 3</span>&#160;<span class="comment"> * or more contributor license agreements. See the NOTICE file</span></div><div class="line"><a name="l00004"></a><span class="lineno"> 4</span>&#160;<span class="comment"> * distributed with this work for additional information</span></div><div class="line"><a name="l00005"></a><span class="lineno"> 5</span>&#160;<span class="comment"> * regarding copyright ownership. The ASF licenses this file</span></div><div class="line"><a name="l00006"></a><span class="lineno"> 6</span>&#160;<span class="comment"> * to you under the Apache License, Version 2.0 (the</span></div><div class="line"><a name="l00007"></a><span class="lineno"> 7</span>&#160;<span class="comment"> * &quot;License&quot;); you may not use this file except in compliance</span></div><div class="line"><a name="l00008"></a><span class="lineno"> 8</span>&#160;<span class="comment"> * with the License. You may obtain a copy of the License at</span></div><div class="line"><a name="l00009"></a><span class="lineno"> 9</span>&#160;<span class="comment"> *</span></div><div class="line"><a name="l00010"></a><span class="lineno"> 10</span>&#160;<span class="comment"> * http://www.apache.org/licenses/LICENSE-2.0</span></div><div class="line"><a name="l00011"></a><span class="lineno"> 11</span>&#160;<span class="comment"> *</span></div><div class="line"><a name="l00012"></a><span class="lineno"> 12</span>&#160;<span class="comment"> * Unless required by applicable law or agreed to in writing,</span></div><div class="line"><a name="l00013"></a><span class="lineno"> 13</span>&#160;<span class="comment"> * software distributed under the License is distributed on an</span></div><div class="line"><a name="l00014"></a><span class="lineno"> 14</span>&#160;<span class="comment"> * &quot;AS IS&quot; BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY</span></div><div class="line"><a name="l00015"></a><span class="lineno"> 15</span>&#160;<span class="comment"> * KIND, either express or implied. See the License for the</span></div><div class="line"><a name="l00016"></a><span class="lineno"> 16</span>&#160;<span class="comment"> * specific language governing permissions and limitations</span></div><div class="line"><a name="l00017"></a><span class="lineno"> 17</span>&#160;<span class="comment"> * under the License.</span></div><div class="line"><a name="l00018"></a><span class="lineno"> 18</span>&#160;<span class="comment"> */</span></div><div class="line"><a name="l00019"></a><span class="lineno"> 19</span>&#160;</div><div class="line"><a name="l00020"></a><span class="lineno"> 20</span>&#160;</div><div class="line"><a name="l00021"></a><span class="lineno"> 21</span>&#160;<span class="preprocessor">#ifndef _GUAC_HASH_H</span></div><div class="line"><a name="l00022"></a><span class="lineno"> 22</span>&#160;<span class="preprocessor">#define _GUAC_HASH_H</span></div><div class="line"><a name="l00023"></a><span class="lineno"> 23</span>&#160;</div><div class="line"><a name="l00031"></a><span class="lineno"> 31</span>&#160;<span class="preprocessor">#include &lt;cairo/cairo.h&gt;</span></div><div class="line"><a name="l00032"></a><span class="lineno"> 32</span>&#160;</div><div class="line"><a name="l00043"></a><span class="lineno"> 43</span>&#160;<span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> <a class="code" href="hash_8h.html#ae8243122fb0b158a22058f9dbd2bbc0c">guac_hash_surface</a>(cairo_surface_t* surface);</div><div class="line"><a name="l00044"></a><span class="lineno"> 44</span>&#160;</div><div class="line"><a name="l00056"></a><span class="lineno"> 56</span>&#160;<span class="keywordtype">int</span> <a class="code" href="hash_8h.html#a377c701a920281a98cbcf0842124aaac">guac_surface_cmp</a>(cairo_surface_t* a, cairo_surface_t* b);</div><div class="line"><a name="l00057"></a><span class="lineno"> 57</span>&#160;</div><div class="line"><a name="l00058"></a><span class="lineno"> 58</span>&#160;<span class="preprocessor">#endif</span></div><div class="line"><a name="l00059"></a><span class="lineno"> 59</span>&#160;</div><div class="ttc" id="hash_8h_html_a377c701a920281a98cbcf0842124aaac"><div class="ttname"><a href="hash_8h.html#a377c701a920281a98cbcf0842124aaac">guac_surface_cmp</a></div><div class="ttdeci">int guac_surface_cmp(cairo_surface_t *a, cairo_surface_t *b)</div><div class="ttdoc">Given two Cairo surfaces, returns zero if the data contained within each is identical, and a positive or negative value if the value of the first is found to be lexically greater or less than the second respectively. </div></div> <div class="ttc" id="hash_8h_html_ae8243122fb0b158a22058f9dbd2bbc0c"><div class="ttname"><a href="hash_8h.html#ae8243122fb0b158a22058f9dbd2bbc0c">guac_hash_surface</a></div><div class="ttdeci">unsigned int guac_hash_surface(cairo_surface_t *surface)</div><div class="ttdoc">Produces a 24-bit hash value from all pixels of the given surface. </div></div> </div><!-- fragment --></div><!-- contents --> <!-- start footer part --> <hr class="footer"/><address class="footer"><small> Generated by &#160;<a href="http://www.doxygen.org/index.html"> <img class="footer" src="doxygen.png" alt="doxygen"/> </a> 1.8.14 </small></address> <!-- Google Analytics --> <script type="text/javascript"> (function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','//www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-75289145-1', 'auto'); ga('send', 'pageview'); </script> </body> </html>
Low
[ 0.439473684210526, 20.875, 26.625 ]
Steroid hormones mediate sex difference in brain levels of tacrine and its hypothermic effect in the rat. Tacrine, a reversible cholinesterase (ChE) inhibitor, lowers body temperature by increasing cholinergic activity in the hypothalamus. Its hypothermic effect was significantly greater in female than in male rats at doses of 2.5-12.5 mg/kg. Gonadectomy increased the maximum fall in temperature after tacrine (5 mg/kg) from 1.92+/-0.16 to 2.59+/-0.13 degrees C in males and from 2.96+/-0.25 to 3.63+/-0.27 degrees C in females. Testosterone (10 mg/rat) rats significantly reduced the hypothermia in gonadectomised males and females and abolished the gender difference. Adrenalectomy increased the fall in temperature after tacrine (5 mg/kg) to 2.92+/-0.15 degrees C in males and 4.18+/-0.24 degrees C in females. The sex difference that remained was abolished by four daily injections of corticosterone (5 mg/kg). Plasma ChE can bind tacrine thereby lowering the amount available to the brain. Ovariectomy decreased plasma ChE activity from 2.27+/-0.24 to 1.66+/-0.14, while adrenalectomy reduced it to 1.30+/-0.10 (micromoles acetylthiocholine hydrolysed/ml/h). This enzyme activity was unaffected by gonadectomy and adrenalectomy in males. Brain levels of tacrine, (5 mg/kg), 1 h after injection were 2.41+/-0.35 microg/gm in males and 4.97+/-0.57 microg/gm in females. Gonadectomy increased brain levels in males to 4.05+/-0.51 microg/gm and testosterone restored them to 2.64+/-0.3 microg/gm. The hypothermic effect of tacrine was highly correlated to its brain concentration after the hormonal manipulations. It is concluded that steroids can reduce the pharmacological effects of tacrine by interfering with its entry into the brain.
Mid
[ 0.6126914660831511, 35, 22.125 ]
Hunting Down Dirty Memory Pages - tasn https://stosb.com/blog/hunting-down-dirty-memory-pages/ ====== nneonneo The gist is that 'const' objects with pointers will end up in read-write memory due to the need to relocate them at runtime. Windows has an interesting solution to this: all libraries are relocated once (the first time they are referenced by any process), and thereafter mapped at the same virtual address into all processes. Randomization (ASLR) is therefore applied once per boot rather than once per process. Arguably, this improves both time and memory performance since processes don't have to spend time relocating libraries at startup, and much more of the library's memory can be shared between processes. Android employs a similar trick: the "zygote" process loads a bunch of common shared libraries, and all application processes descend from zygote via fork(), thereby sharing library memory with the zygote. ~~~ tasn That is a fair summary, though the post is about the process more than the conclusion. A similar solution to the Windows one is available for Linux and is called prelink, but cool to know Windows does it by default. I haven't heard about zygote, it's quite an elegant solution and probably ends up sharing more than just the pages in the case mentioned in the post, so even more memory saves. I wonder though about the security implications here, because it essentially means that every unprivileged process knows the address layout of all the other processes (the same). This means that a local process could more easily exploit a system process (essentially an ASLR bypass), and in some cases maybe even enable remote remote bypass. Edit: reading it again, it seems only user applications, and not system applications fork from zygote, so I guess the implications are much less serious.
Mid
[ 0.623376623376623, 30, 18.125 ]
Athlete dehydration prevention is a serious matter for coaches and players of all sports and all levels. With temperatures reaching 100+ degrees in the hot summer months, the temperature on the field can be even hotter. Athlete dehydration prevention is as important as ever. How can you keep your team safe and hydrated while maintaining a competitive level? The following tips and advice use football hydration as an example because of the increased cases of, heat stroke and even death due to sports dehydration, but the principles described can apply to any sport and any athlete. DRINK, DRINK, DRINK! Guidelines regarding the consumption of sports drinks: Here’s some great advice from ProFootballWorkout.com about how to keep your players safe on and off the playing field. 1-2 hours before football workouts: 450-600 ml Every 15 minutes during football workouts: 200-300 ml After football workouts: 720 ml and above Team Drinkers keep players hydrated and in the game The general rule is to drink even before you feel thirsty and to have a schedule for it. Sports drinks are great but if you cannot always afford it there’s no substitute for water. Coaches should always have athlete hydration supplies available. If dealing with ice, cups and coolers is a concern there are team drinkers that allow coaches to hydrate several players at a time without cups and messy cleanup. Keep it Cool Another way coaches are keeping their teams hydrated is by reducing the heat on the field and thus the amount of water their players’ lose through sweat. This can be achieved by using various sports cooling products, here are a few ideas for athletes to keep cool. Wrap a wet towel around your neck during timeouts on the sidelines and bench. This tried and true method has been used since sports have been around. The cold wet towel around your neck cools the blood as it passes through your veins, helping to lower your entire body temperature. Use sports cooling vest before and after event. In advance of the Beijing Olympics in 2008, Nike developed the Nike Precool Vest for Olympic athletes. Intended to be worn for an hour prior to events in the hot and humid conditions in Beijing, Nike reported an expected increase of 21% in an athletes endurance. Employ sports cooling fans on your sidelines and near the playing field. Sports cooling fans have been around for years, but the technology has improved. Many years ago sports cooling fans were big, loud clunky wind tunnels that merely blew more hot air on the sidelines. If you were lucky, a water hose was attached or hung in front of the wind hung in front of the machine to provide some cooling relief. Times have changed, coaches now use state of the art Sport Cool cooling fans which can lower the temperature in front of fan 10 to 30 degrees up to 30′ feet away. Suddenly a 100+ degree day at practice can feel like a cool, comfortable 75 degrees. Sports cooling fans only require water and an electrical outlet. The fans are now equipped with a dolly-like frame for easy transportation and portable cooling. Watch a video on Sports Cool Fogger Outdoor Cooling System Be aware Don’t schedule practice during the hottest part of the day. Hold early morning practices when the scorching heat has not had time to set in. For football coaches, have only half pads and shorts practices during the day. Scheduling practice “anytime after noon” is also not always a good idea in the summer. Noon is kind of a misconception. Typically the hottest hour of the day is 3pm. This is due to water vapor charging up with heat and finally radiating with the sunlight. Noon is merely when the sun is the most directly over head. (Source Answers.com) Coaches also use Heat & Humidity Stopwatches, and Heat Index Warning Systems which are portable stopwatch devices that can be worn around the neck and will send an alert when heat levels reach dangerous levels. When it comes to athlete dehydration prevention, the safety of your team should always be at the top of the list. By using some of the methods described in this article along with some common sense and prevent athlete hydration.
Mid
[ 0.5423340961098391, 29.625, 25 ]
Q: block in assert_valid_keys': Unknown key: :order (ArgumentError) I'm running rails 4.1.0.rc2 and I'm getting the ArgumentError block in assert_valid_keys': Unknown key: :order when I try to do: has_many :workout_exercises, dependent: :destroy, order: "exercise_order DESC"` I want to put an order constraint on my join model, and as far as I can tell, this worked with Rails 3.2, so I can't figure out what is going on. Any ideas? A: Try this: has_many :workout_exercises, dependent: :destroy,-> { order "exercise_order desc" } Update, as per OP's comment (reorder the directives): has_many :workout_exercises,-> { order "exercise_order desc" }, dependent: :destroy
Mid
[ 0.61038961038961, 29.375, 18.75 ]
Q: How to do JMeter ip spoofing on Mac? Just try to figure out how to do ip spoofing in JMeter on my mac. What is done is that I created file which contains ip addresses somewhere in my subnetwork. When I try to run thread JMeter shows me: java.net.BindException: Can't assign requested address Only my IP has ping. So, could you please advice me where I am wrong? A: You can add an IP alias from Terminal application (it is under Applications -> Utilities) as sudo ifconfig en0 alias 192.168.0.12 255.255.255.0 where: en - is Network Interface name 192.168.0.12 - is the IP alias Once you set up the alias, you can use new IP address in the "Source address" input And HTTP requests will use that IP address as source one: You can remove the IP alias when it is no longer required as sudo ifconfig en0 -alias 192.168.0.12 See Using IP Spoofing to Simulate Requests from Different IP Addresses with JMeter guide for more detailed information on the domain.
Mid
[ 0.631067961165048, 32.5, 19 ]
Control and analysis of alkyl esters of alkyl and aryl sulfonic acids in novel active pharmaceutical ingredients (APIs). This article reviews current regulatory guidelines and relevant scientific literature pertaining to the control and analysis of potential genotoxic impurities (PGIs) in new active pharmaceutical ingredients (APIs) with specific reference to a certain sub-class of PGIs, namely alkyl esters of alkyl and aryl sulfonic acids. Sulfonic acids are very important in pharmaceutical R&D employed both as counter-ions in the formation of acid-addition salts and also as reagents and catalysts in the synthesis of new drug substances. The article reviews the evolution of analytical methodology from early studies in the mid 1970s through development of direct injection GC and HPLC methods to liquid-liquid/solid phase extraction and headspace based techniques coupled to HPLC and GC methodologies employing UV and MS detection to new derivatisation-based techniques. The paper also reflects on the significant challenges in developing robust analytical methodology capable of the trace determination of sulfonate esters, the challenges in transferring methodology from R&D to QC labs and on the cost of inappropriate limits for genotox impurities. In so doing, the authors seek to inform the debate that the control of genotoxic impurities should be driven primarily by safety and risk/benefit considerations rather than by state-of-the-art analytical and process chemistry capabilities that drive controls to levels 'as low as practicable' regardless of the risk/safety requirements.
High
[ 0.673076923076923, 35, 17 ]
Q: Bar plots with variable bases (intensive and extensive variables at once) Is there a particular name for bar plots, in which bars are rectangular, with unequal bases? That is: width represents size (e.g. population), height represents intensive variable (e.g. CO$_2$ emission per capita), area represents extensive variable (e.g. total CO$_2$ emission). Example (from David JC MacKay, "Sustainable Energy - without the hot air", page 14): In the same vein: this and that. Another one: "Real GDP Per Capita and Shares of Global Population" (found here): I find these plots immensely useful, as they show both the local effect (is a country particularly rich, polluting, militaristic...) and the global share (of economy/pollution/military power). I have even made one: Research publications per capita? - Academia.SE. I care for its name both to search for examples, plotting libraries/functions etc, and to propagate this way of presenting data. A: Apparently they are called cascade charts, see: Variable Width Column Charts (Cascade Charts) - Excel The Cascade Chart Creator add-in for Microsoft Excel Cascade chart (graph with variable width bars) - Statalist As a bonus, ggplot2: Variable Width Column Chart. However, sometimes cascade chart is used as a synonymous of waterfall chart (which is a different thing from the discussed above), see e.g.: Creating a Waterfall (Cascade) Chart - FusionCharts In any case, judging for length I needed to get this answer, this name may be not that popular even among people creating similar bar plots (and perhaps a descriptive way may be better). As was pointed out by @NickCox, if bars are sorted by their height, it is a discrete variant of the Lorenz curve.
High
[ 0.6819484240687671, 29.75, 13.875 ]
ESPN’s recently launched ESPN+ streaming service is adding e-sports to its repertoire. The company has announced that it will broadcast live coverage of several League of Legends competitions this summer, beginning on June 16th with the 2018 North American League of Legends Championship Series Summer Split (NA LCS). After that comes the NA LCS Summer Finals in September September and then the League of Legends World Championship in the fall. The deal between ESPN and Riot Games is non-exclusive, so you’ll still be able to stream those same competitions for the hugely popular multiplayer online battle arena (MOBA) title on Twitch. For free. But ESPN is likely hoping that covering e-sports will help bring in more subscribers for the still-new $4.99/month ESPN+ service. ESPN+ includes thousands of hours of live events from various sports leagues throughout the year, original programming, and an ad-free experience when using the ESPN website and app. Subcribers aren’t constantly saddled with pre- or post-roll video ads. Riot Games says that the 2017 LoL World Championship drew “80 million unique viewers tuning in for a single match.” Fans of the game watched over 1.2 billion hours of video during the event. Riot and BAMTech, the division of Disney that built the technology behind ESPN+, have been business partners since 2016 when the two companies signed a $300 million deal to have BAMTech stream League of Legends competitions. Back in November, Riot announced changes to its North America competition slate that resulted in the creation of permanent teams; several of them are backed or owned by big-league sports teams including the Houston Rockets and Golden State Warriors.
High
[ 0.6651785714285711, 37.25, 18.75 ]
INTRODUCTION {#sec1-1} ============ During the last decade, Aseer Region has become one of the most popular resorts in Saudi Arabia to which thousands of tourists come every summer to enjoy its pleasant weather and participate in various re-creational activities.[@ref1] In 1998, it was reported that 7.4% of the total number of summer visitors utilized the primary health care services resulting in an increase in the demand on the primary health care services by 33%, as well as an additional 50,808 US Dollars on the cost of the dispensed drugs.[@ref2][@ref3] Customers' satisfaction is considered to be an important tool and indicator for measuring and evaluating the quality of health services in general and in the primary health care (PHC) in particular.[@ref4] One decade after the first report on the utilization of the PHC services was presented, the opinions and suggestions of the summer visitors on these services are worth noting.[@ref5] The aims of this study are to assess the satisfaction of tourists who utilized PHC services in Aseer Region in the summer of 2000, and use the results obtained to improve the services. MATERIAL AND METHODS {#sec1-2} ==================== This cross-sectional study was conducted in five primary health care centers in Abha, the capital city of Aseer Region, Southwest Saudi Arabia. The first two PHCCs are located within the city while the other three PHCCs are in the resort areas. Tourists were defined as persons who came from outside Aseer Region to spend part or the whole of the summer season. Those who fulfilled the following criteria were included in the study population: above 15 years old, able to read and write, attended any one of the above mentioned PHCs during July of the year 2000, willing to respond to this questionnaire voluntarily. The questionnaire designed by the investigators was based on valid satisfaction questionnaires which were previously used in local and international studies.[@ref6]--[@ref11] It consisted of six parts; the socio-demographic data, including age, sex, nationality, residence and occupation; the second part was on the accessibility of different PHC services (car park, availability of chairs in the waiting rooms and health education materials); the next was on the reasons for visiting PHC centers and utilizing clinics; part four concerned the satisfaction with the politeness and sensitivity of all the PHCC staff, the availability of drugs and waiting time. These questions were scored on a 5-point Likert scale as follows: 5 = very satisfied, 4 = satisfied, 3 = neutral, 2 = not-satisfied, 1 = not satisfied at all. The mean score of satisfaction of each service was calculated by adding together the degrees of satisfaction and dividing by the total number of respondents of each item. The fifth part was directed to evaluate specific processes during consultation. Four sub-questions eliciting Yes-No responses were included; (Did the physician respond to your enquiries and conduct the relevant physical examination, did nurses measure vital signs, did pharmacists explain how to use medications). The last question was an open-ended one about the client\'s suggestions to improve PHC services or any other comments he/she may have. The medical record receptionists explained the purposes of the study and asked the tourists who fulfilled the selection criteria to complete the questionnaire at the end of the visit to PHCC for collection and return to The Directorate General of Health Affairs every week. Data were entered into and analyzed by means of the statistical package for social sciences (SPSS) software. Appropriate significant tests were used accordingly and the p-value was considered significant if less than 0.05. RESULTS {#sec1-3} ======= The total number of tourists who fulfilled the selection criteria of this study during the study period was 413. [Table 1](#T1){ref-type="table"} shows the characteristics of the tourists who participated in this study. The mean age was 29.2 ± 13.9 years. Eighty one point four percent were males and Saudis, 37.3% were highly educated, 60.3% were married, 21.1% were students, 13.8% were teachers, 32.7% and 22% came from the Western and Central regions respectively. Primary health care centers (PHCCs) were accessible to 87%, 78% reported that parking area was adequate, 90% said that chairs were available in the sitting area, 71% indicated that health education materials were present, 88.6% of the tourists indicated that the duty hours at PHCCs were suitable. ###### Characteristics of summer visitor to Aseer Region, July 2000 (N=413) ![](JFCM-10-59-g001) Statistical analysis revealed that more patients who were single did not find parking space as compared to married visitors (X^2^=9.4, P= 0.02) and Non-Saudis compared to Saudis (X^2^ =7.6, P=0.02) pointed that the working hours of PHCCs were inappropriate. With regards to the main reasons for visiting PHCCs, 76.5% of the tourists came for consultation and treatment, 6.5% for follow up, 3.6% to get a referral, 1% came to get a refill of their prescription, but 12% did not indicate the reason for their visits. Satisfaction of the tourists with various aspects of health services at PHCCs is shown in [Table 2](#T2){ref-type="table"}. Seventy percent were very satisfied with the reception, 80% with the consultation process, 77.2% with the nursing care, 64% with the pharmacist and 59% were very satisfied with the availability of drugs. Generally, the mean overall satisfaction was 4.8 points. ###### Satisfaction of summer visitors about different health care services at PHCCs, Aseer Region, July 2000 ![](JFCM-10-59-g002) On the fulfillment of tourists' expectations towards consultation and treatment, 88% and 86% respectively mentioned that physicians had answered their enquiries and carried out physical examination, 81% reported that the nurses had taken their vital signs and 78.5% had been given instructions on their medications by the pharmacists. The mean and the median duration of the waiting time were 8.2 ± 8 and 5 minutes respectively. Fifty-four point five percent were satisfied with the waiting time. Males had a longer wait than females. However, it was not statistically significant (8 ± 8.3 vs 7.9±6.5 min, p\>0.05). [Table 3](#T3){ref-type="table"} shows the 17 different suggestions and comments made by 28% of the tourists for improvement of the delivery of health services in the PHCCs. The vast majority of these suggestions and comments were about having continuous working hours at PHCCs (22.4%), the provision of female doctors in the PHC (16.4%), provision of signboards (15.5%), extension of the PHC (14%) and increasing the number of physicians at PHCC (12%). ###### Suggestions of tourists to improve PHC services in Aseer Region, July 2000 ![](JFCM-10-59-g003) DISCUSSION {#sec1-4} ========== Satisfaction with PHC services in Saudi Arabia has been investigated by many researchers in the last ten years. The total number of tourists who participated in this study was higher than similar studies carried out in Saudi Arabia.[@ref6][@ref7][@ref10][@ref12] Most of the respondents were Saudis, middle-aged and males from the central and western regions. These characteristics are similar to those reported by studies dealing with tourists in the Aseer Region in the last ten years.[@ref1][@ref2][@ref5] Accessibility of supportive services (parking, seats, and health education materials) ranged from 71% for health education to 90% for availability of adequate seats in the waiting area. As health education is an essential element of PHC, it is very necessary to provide PHCCs with adequate posters, pamphlets to disseminate valid medical information particularly to tourists and travellers to help them to manage their common health problems themselves and take preventive measures. Furthermore, the provision of adequate chairs for seating, large waiting areas and parking are highly recommended. The current working hours which are from 7:30 AM to 1:00 PM, and 4:30 PM to 10:00 PM is considered short and inadequate particularly during summer months when the workload increases by 33%.[@ref2] As a result, it is suggested that the afternoon session be extended to 1:00 AM to make PHCCs more accessible and reduce the strain on the hospital services which should be used for real medical emergencies. More than 75% of study population came for a cure. This is similar to the figures reported by Mahfouz in 1993 and Al-Sharif in 1998.[@ref2][@ref5] To minimize consultation for simple self-manageable conditions, it is important that tourists take preventive measures including the avoidance of unhygienic food. Satisfaction with different PHC services was found to be good. The mean satisfaction with receptionist was 4.8 points. This score was higher than that reported from Jeddah (1.65- 2.68 points)[@ref7] and Al-Khobar (4.3).[@ref12] Of all the items assessed satisfaction with consultation scored the highest (80%). This high satisfaction score was the result of good histories being taken, and relevant physical examinations being done on 88% and 86% of the respondents respectively. After satisfaction adjustment, our findings were found to be higher than what was reported from three PHCCs in the city of Riyadh (3.57-3.71 points) and one general practice setting in the United Arab Emirates (4.38 points).[@ref6][@ref8] The difference could be due to the rapid improvement in the quality of health services at PHCCs after the implementation of quality assurance in 1993.[@ref4] Satisfaction with nursing care scored 4.8 points on the average. Seventy-seven point two percent were satisfied with nursing care, and 81% reported that nurses measured their vital signs. On a four-point scale, Mansour and Al-Osimy found that satisfaction with nursing care ranged from 3.41-3.73 points.[@ref6] Although, the provision of essential drugs is an element of PHC, satisfaction with pharmacist care and the availability of drugs scored 4.8 and 4.6 points respectively. Among the study population 3% were not satisfied with the availability of drugs. Providing PHCCs with adequate drugs to meet the extra number of patients seen as recommended by previous studies is restated here.[@ref2][@ref3] It should be emphasized that the major role of pharmacists and their assistants is to instruct patients on the use of medications and their expected and common side effects. The median and mean of the waiting time were 5 and 8.2 minutes respectively. With this, 54.5% and 16% were very satisfied and satisfied respectively and the mean of satisfaction was 4.63 points. Studies from the city of Riyadh revealed that satisfaction with waiting time ranged from 1.37-1.73 on a four-point scale.[@ref6] Al-Faris found that waiting for a long time was the third commonest problem faced by patients attending PHCCs in Riyadh (47.7%).[@ref13] General satisfaction with different health services falls within the range reported from United States of America (75%-95%).[@ref14] More than a quarter (28%) of the participants gave 17 suggestions and comments on how to improve various services in PHCCs ([Table 3](#T3){ref-type="table"}). These suggestions will be studied, evaluated and those that are feasible will be implemented out in order to improve the quality of health services and raise tourists' satisfaction. Since the facilities of the Ministry of Health are the only ones available for the summer visitors at Al-Soda, Al-Faraa and Al-Habala, action should be taken immediately to improve the PHCC services in these locations. CONCLUSIONS {#sec1-5} =========== This study showed that tourists in Aseer Region were satisfied with the different services of PHCCs. However, there is still room for the improvement of some services such as the provision of an adequate number of female doctors, parking facilities, health education materials and adequate drugs. Suggestions given by the tourists should be implemented to improve the quality of health services and satisfy the users of those services.
Mid
[ 0.557377049180327, 29.75, 23.625 ]
Q: Do hotels block certain ports? I'm on vacation this week and I'm trying to access my home DVR camera system (Bunker Hill DVR) from the hotels I've been staying at. Unfortunately, I have not been able to access them successfully. I tested out my port forwarding on my router before I left, so I know it is working the way it should. The booklet that came with the system recommended using port 80, but I used 1024 instead, which I of course configured on the DVR and added the port forward to my router. But do hotels block certain outgoing ports, or could there be something else wrong? A: Most hotels use NAT. They have one (or a limited number) of public IPs and so they distribute private IPs. As a result they are not redirecting incoming server traffic to any of those private IPs. When you request a web page (via a server running, typically on port 80) the NAT router remembers that your specific computer asked another specific computer for the page, so when its returned from the server it allows it back in.Traffic that gets redirected can sometimes get hung up with NAT. They may also have a firewall, which is something that prevents outbound traffic,IE doesnt allow you to connect via SSH (port 22) to a server or VPN (various ports). They can also do inbound filtering, although NAT is usually sufficent. If you are having problems, and you know you can access those kinds of services from home (or elsewhere) try VPN. You can setup a VPN router or server at home, or try a comercial service. Another- and far more geeky way- is to create an SSH tunnel for the traffic. You can use a program such as Putty (windows XP) to encrypt traffic b/t your computer and, say, your home computer. That all being said, if you are using a connection at a hotel with out a VPN you may really want to consider finding a solution. Using a VPN not only protects your traffic (at least from the eyes of other guests) but basically removes you from the hotel's network which really protects you against worms and hackers,great idea anytime you are out of the office or home.
Mid
[ 0.652849740932642, 31.5, 16.75 ]
Q: Versioning entities in db with draft option, select query I have postgresql db where i keep data for jee application. User can edit those data without creating new version of entity(draft). During edit, entity is copied as draft(version set to -1) after editing user can save all changes as new version. My problem is to create proper sql query to get data by version instead of extract all of them and do it in application. Table schema: id(uniq), field_id,version,otherFields.... id is uniq value and automatically incremented. When user start editing new field is created with field_id=parent.id. So i can extract all versions of field using group by field_id Case 1 I want to get current version which means max value of version field or version set to -1. Case 2 I want to get specific version. It is not that easy because data in db are not changed if field was not edited(to save space). For example field a was created with version 1 and then changes was done on other fields. Current global version is 7 but field a still have one entry in db with version=1(this field was not edited). So to extract specific version different than current i need to get MAX(version) where version<=:selected_version Example data: id(uniq),field_id,version 1,1,1 3,1,7 55,1,-1 53,53,14 Entity with field_id=1 has 2 version and draft(user is editing it). Entity with field_id=53 has one version and no draft. I hope that my explanation of problem is understandable. Could you help me with those sql query? It could be two queries, one for actual version with draft and other for old versions. Case 2 probably solution I think that specific version i can extract using such query select field_id, max(version) ver from field_mappings where version<4 and version!='-1' group by field_id I don't know why i can't extract id. When i change query to select *, max(version) from field_mappings where version<4 and version!='-1' group by field_id Then i got error ERROR: column "field_mappings.id" must appear in the GROUP BY clause or be used in an aggregate function SQL: 42803 And still don't know how to add case for draft(max(version) or version=-1). A: You can use the following, which relies on DISTINCT ON, and turns calculates version -1 as 9999999: select DISTINCT ON (field_id) * from field_mappings where COALESCE(NULLIF(version, -1), 9999999) < 4 ORDER BY field_id, COALESCE(NULLIF(version, -1), 9999999) DESC The query retrieves all the rows with unique fields (by field_id), prioritising the version you specify, or the draft one (which has its priority bumped to the top). If you want the draft or last version, then use < 10000000 instead of < 4.
Mid
[ 0.6416040100250621, 32, 17.875 ]
Gregoire Lake 176 Gregoire Lake 176 is an Indian reserve of the Fort McMurray First Nation in Alberta, located within the Regional Municipality of Wood Buffalo. It is 35 kilometers southeast of Fort McMurray. In the 2016 Canadian Census, it recorded a population of 191 living in 62 of its 74 total private dwellings. References Category:Regional Municipality of Wood Buffalo Category:Indian reserves in Alberta
Low
[ 0.44769874476987404, 26.75, 33 ]
Q: OpenCV with GigE Vision Cameras I need to use OpenCV with a GigE Vision Ethernet Camera, but I couldn't find much useful information on how to do this, any pointers, documents and example code? I need to read frames from the camera. A: Gig-E is a communication standard for a wide range of cameras. OpenCV now contains a wrapper for The Prosilica Gig-E based cameras (see CV_CAP_PVAPI) But in general it's better to use the camera's native API to get the data and then use openCV to convert the returned data into an image, openCv contains a number of Bayer pattern ->RGB routines. The CvCapture module is convenient for testing, because it can seemlessly read from a camera or a file - but it's not really suitable for high-speed real-time vision A: You can do this! I used the Baumer GAPI SDK, which is a GenTL consumer. GenTL is a generic transport layer, which is a module within genIcam. You can read up on GenTL HERE. Using a GenTL consumer like Baumer's GAPI or Basler's API makes things a lot easier. They should work with any GigE camera. I made a more comprehensive way to use Baumer's GAPI SDK in another answer HERE, so I will give a summary of what you need. Visual Studios openCV 3 for C++ (HERE is a youtube tutorial on how) Baumer GAPI SDK HERE (optional) Test your camera and network interface card using Baumer's Camera Explorer program. You need to enable jumbo packets. You may also need to configure the camera and car IP address using Baumer's IPconfig program. Setup your system Variables. refer to the programmer's guide in the Baumer GAPI SDK docs folder (should be in C:\Program Files\Baumer\Baumer GAPI SDK\Docs\Programmers_Guide). Refer to section 4.3.1. Create a new C++ project in Visual Studios and configure the properties. Refer to section 4.4.1. Go to the examples folder and look for 005_PixelTransformation example. It should be in (C:\Program Files\Baumer\Baumer GAPI SDK\Components\Examples\C++\src\0_Common\005_PixelTransformation). Copy the C++ file and paste it into the source directory of your new project. Verify you can build and compile. NOTE: You may find a problem with the part that adjusts camera parameters (exposure time for example). you should see pixel values written to the screen for the first 6 pixels in the first 6 rows, for 8 images. Add these #include statements to the top of the .cpp source file: #include <opencv2\core\core.hpp #include <opencv2\highgui\highgui.hpp> #include <opencv2\video\video.hpp> Add these variable declarations at the beginning of the main() function // OPENCV VARIABLE DECLARATIONS cv::VideoWriter cvVideoCreator; // Create OpenCV video creator cv::Mat openCvImage; // create an OpenCV image cv::String videoFileName = "openCvVideo.avi"; // Define video filename cv::Size frameSize = cv::Size(2048, 1088); // Define video frame size cvVideoCreator.open(videoFileName, CV_FOURCC('D', 'I', 'V', 'X'), 20, frameSize, true); // set the codec type and frame rate In the original 005_PixelTransformation.cpp file, line 569 has a for loop that loops over 8 images, which says for(int i = 0; i < 8; i++). We want to change this to run continuously. I did this by changing it to a while loop that says while (pDataStream->GetIsGrabbing()) Within the while loop there's an if and else statement to check the image pixel format. After the else statement closing brace and before the pImage->Release(); statement, add the following lines // OPEN CV STUFF openCvImage = cv::Mat(pTransformImage->GetHeight(), pTransformImage->GetWidth(), CV_8U, (int *)pTransformImage->GetBuffer()); // create OpenCV window ---- cv::namedWindow("OpenCV window: Cam", CV_WINDOW_NORMAL); //display the current image in the window ---- cv::imshow("OpenCV window : Cam", openCvImage); cv::waitKey(1); Make sure you chose the correct pixel format for your openCvImage object. I chose CV_8U because my camera is mono 8 bit. When you build and compile, you should get an openCV window which displays the live feed from your camera! Like I said, it can be done, because I've done it. If you run into problems, refer to the programmer's guide. A: I use an uEye GigE camera (5240) with OpenCV. It works as a cv::VideoCapture out of the box. Nevertheless using the API allows for much more control over the cameras parameters.
Mid
[ 0.628242074927953, 27.25, 16.125 ]
Assessment of gross malnutrition among primary school children using body mass index as an assessment tool in abakaliki metropolis of Ebonyi State, South-East Nigeria. Obesity and overweight are emerging major health problems in developing countries in the background of undernutrition. These have been linked to a substantial increase in mortality and morbidity. This cross-sectional survey was aimed at determining the prevalence of underweight, overweight, and obesity using body mass index (BMI) in primary school pupils in Abakaliki metropolis of Ebonyi State, south-east Nigeria. Eight hundred and four participants aged 6-12 years, from four public and four private primary schools had their weights and heights measured using standard methods. BMI value was calculated for each subject and compared with BMI for age and sex from World Health Organisation (WHO 2007) reference standard. Socioeconomic status was determined using method proposed by Oyedeji. Out of 804 subjects, 426 (53.0%) were from public schools, whereas 378 (47%) were from private schools (P ≤ 0.01). Four hundred and fifteen (51.6%) were males and 389 (48.4%) were female (P = 0.88). The prevalence of underweight, overweight, and obesity using BMI were 4.5% and 1.2%, 0% in public schools and 1.1%, 5.0%, and 3.0% in private schools, (P < 0.001). The socioeconomic class significantly affected the prevalence of underweight, overweight, and obesity as more subjects with overweight and obesity belonged to upper social class, whereas more underweight subjects belonged to lower social class. Overweight and obesity are emerging in a background of undernutrition, showing ''double burden'' of nutritional disorder.
High
[ 0.658476658476658, 33.5, 17.375 ]
Q: joomla:How to fix "CLASS 'JPLATFORMUTILITY' NOT FOUND" I am newbie to Joomla and get this error when I open main page in my website. CLASS 'JPLATFORMUTILITY' NOT FOUND I appreciate your help! A: Check out storage space in your server. I had the same problem, and it turned out that the storage space was full in the server.
Mid
[ 0.6218097447795821, 33.5, 20.375 ]
X-IO Storage and adjustable data de-dupe in All Flash Arrays | Truth in IT Chat w. Bill Miller, CEO of XIO about how they enable you to tune the data reduction functionality so you can turn it off for volumes of data that aren't very reducable. That saves alot of overhead, especially when data reduction occurs further up the... X-IO Storage and adjustable data de-dupe in All Flash Arrays Summary: Chat w. Bill Miller, CEO of XIO about how they enable you to tune the data reduction functionality so you can turn it off for volumes of data that aren't very reducable. That saves alot of overhead, especially when data reduction occurs further up the stack at the application layer. Just one of the features in this video short. Transcript: Mike Matchett:Hi. I'm Mike Matchett with Small World Big Data, and today we're going to talk about all-flash. The all-flash market, what's happening, is it becoming commoditized? What should you be looking out for if you're in the market for all-flash storage solutions. I'm going to have on Bill Miller, who's the CEO of XIO, and he's going to talk us through their perspectives on the all-flash market. Before I get into that, though, I just want to say a few things about what we're seeing in the storage industry. Obviously, all-flash is becoming more popular. It's dropping in price. People are considering all-flash data centers, for example. On the other end, we're seeing hybrid arrays also benefiting who can take advantage of multiple tiers of storage, so there's a natural tension there. But generally, things are moving towards a solid state world, and there's a lot of questions you have to ask about what solid state can really do for you. Is it really prime time to replace everything in your data center? With that, let me introduce Bill Miller. Hi, Bill. Bill Miller:Hi, Mike. Mike Matchett:So tell us, just in a nutshell, a little bit about the G4 that you guys have just come out with. What does that really bring to market in the all-flash space, first? Bill Miller:Yeah, so with our ISE G4 ... XIO has, of course, been in the data storage ... business for a long time and so G4 is fourth generation. The fourth generation of architecture, especially of our code that runs these arrays. The earlier generations, or the earliest generations, were really focused on making disk drives work a lot better. The company has roots inside of Seagate and so they really cared about how drives perform in arrays. So for years that was really what XIO was known for, but there was a lot of really interesting code and IP in these arrays that applies to flash, but we've done a complete rehash of it to make sure that we kept the stuff that worked really well and it was applied to flash and we got rid of some of the stuff that was overhead and maybe didn't work so well in the new world. So generation four was really focused on flash. There's some really benefits of the way that we do data layout onto the media that has always been there. Even the disk world was focused around performance, mostly, but it really works well with flash in providing a level of overprovisioning and wear leveling that is at the array level that really makes sure that you get good reliability out of the flash over its lifetime. You get ... you know, you can kind of even greater performance out of flash itself, and then we ... You know, flash arrays needed deduplication and data reduction, so we've added data reduction into the code. We've added features that are really table stakes in this market, like snapshots and asynchronous replications. We completely did the ... redid our management and UI capability to simplify that and make it modern, web services-based interface. Mike Matchett:So yeah, so you guys sound like you ... I was going to ask you about data reduction and you got there. So you guys are all in on converting to all flash and converting to this flash basis. What's happened with flash in the last couple years, because it used to be pretty expensive and tony and then companies like Pure and other people came around, said, "No, we can try to convince you to do all flash." You guys have now made the switch also to all flash. What's happening with the market there? Bill Miller:Well, I think ... you know, the main thing is that flash arrays have now gotten to a place where they're ... certainly, when you apply data reduction ... if you get reasonable data reduction values out of the data you're storing, they end up being cheaper than disk drives. And when you look at the simplicity of it, when I talk to some of our customers about flash and their experience with it after years of managing disks, what they tell us is, it's just a lot easier to manage. You don't really have to think at all about data placement on your arrays, you get kind of equal performance everywhere, the reliability of it is greater. They tend not to fail as much, so you don't have to babysit your arrays much when you have flash arrays. So you look at a total cost of ownership basis and flash is simply cheaper now. Mike Matchett:Well, I guess that depends on who you're buying it from, which solution you're getting, I think. But your argument is, you can bring a lot of IP that you've had for a long time, tailored for flash, and really make a very cost-efficient ... like you said, table stakes equivalent flash array to just anybody else in the market, right? Bill Miller:Yeah, that's right. I mean, the way we looked at the marketplace as we were bringing our ISE G4 900 series to market was that there are a bunch of vendors out there that are competing in the all-flash array market space. They're all relatively the same. They're substitutable. We know ... customers were telling us that they're going to shop between vendors, and they'll probably buy arrays from more than one vendor because there's really not a stickiness or switching cost issues or complexity issue with these things. They're easy to manage so you can easily have a couple or three vendors in your shop, no problem. It doesn't create any additional cost for you, and it does drive your price down. So we really focused on price, and I mentioned data reduction ... when we were looking at data reduction, one of the things that we discovered ... our engineering team looking at how to best do data reduction. In this way, I guess we had a bit of an advantage in coming a little bit late to this game because we were able to look at how other people had done it and look at some fundamentals and really came up with an invention. That invention around data reduction allows us to get the same results ... the same data reduction ratios and the same performance out of a data reduced volume that others do at a fraction of the cost. We get it at a fraction of the cost because we're able to do it with much less in the way of CPU and memory resources. So data reduction is very CPU and memory intensive the way others implement it. If you can come up with, as we did, a patent pending invention in data reduction that uses, really, 25% of those resources and then amortize that over the cost of the flash in the array, you end up with a bill of material costs that's only 60% and 70% of what others ... is costing them to build that same array. In a market that is very competitive and really becoming commoditized, where there's not a lot of stickiness of switching costs, price matters. So we use our cost advantage and pass that along to our customers and we give them better cost in the flash array market. Mike Matchett:So this sounds like a great opportunity for you but maybe not such good news for EMC and NetApp and those bigger guys that are ... been really making money pushing down their larger, all-flash, high-end arrays, right? So you're- Bill Miller:[crosstalk 00:06:32] and I think if you look at some of the sales and market share numbers from the past few quarters from the big vendors like EMC, you can see that they're losing a lot of ground on a revenue line in that market space, and some of that is because they're being forced to take lower margins and push the cost of those things down in a very commoditized, competitive market space. Mike Matchett:Yeah, yeah, and I think sometimes the features those high-end arrays have ... like dedupe has to be on for the entire array ... really constrain the kind of workloads you can put on there. You guys have even thought about that and allow data reduction, as we were talking, on a [inaudible 00:07:09] basis, so now you can say we can consolidate many different kinds of workloads onto a G4 kind of solution. Bill Miller:Yeah, absolutely. Yeah. Again, coming a little bit late to this game. Most of the people who preceded us in bringing all-flash arrays to market with data reduction had the idea of data reduction all the time, so all workloads, all data, all the time, all the array were reduced. One of the things we recognized is that in the very early days of data reduced flash arrays, people liked to talk about VDI workloads that were getting very large data reduction numbers like 15:1, and a lot of that was because early VDI software would take all of the code on every desktop and stick it out in the VDI environment as is. So they had a lot of replicated code, an entire copy of the operating system in the application environment, and everything for every desktop. Then the VDI guys said, "We can fix that. We can go back and centralize some of those things that are multiple copies across all desktops and only store it once." And so, as a result of that, even for data reduced arrays, it's becoming that much of more data reduction is being done up at the application software layers or infrastructure layers where [crosstalk 00:08:25]. Mike Matchett:Yeah, up the stack, yeah. Bill Miller:... up the stack and so the data that gets down to the array may not be as deduplicatable as it was a few years ago. So we said ... there is a cost. There's a penalty when you run data reduction all the time and it's going to hurt your performance. You're using the performance of flash to kind of support having good performance out of data reduction, which is not much better than raw disk arrays in terms of ... certainly not the ones we built in terms of performance. But why don't we let people turn it off? Why don't we have an alternative pass through the code that avoids all that overhead of data reduction because if they have certain data sets or certain very high-performance workloads and they just want that flash performance, let's let them do it by volume. So we'll allow them to have data reduced volumes and raw volumes on the same array, and the raw volumes get about twice the IOPS as a data reduced volume, and twice the IOPS of the guys who were doing all-flash arrays that are data reduction all the time. Mike Matchett:So it sounds like there's a really compelling argument here to really take a look around at your storage environment and say, "I probably don't really need those more complex hybrid solutions with tiering and decisions to be made about quality of service, and I probably don't need those really expensive all-flash arrays because the high-end services are moving up the stack and there are definitely cost-efficient alternatives like XIO available that we can bring in side by side and just ... and it's not a rip and replace. It's just ... they can co-live and bring out there on that." So sounds like a pretty bright future. Just in the last few seconds here. Where's XIO going next? NVMe or convergence? What's happening? Bill Miller:Yeah, so both of those. So at XIO, we've been in the high reliability, high performance external data storage array business for a long time. Long before I got here. Great, great vendor in that marketplace, and certainly our ISE G4 900 series arrays are a great next step there. Beyond that, we're going to stay in that marketplace. We have a roadmap there that will bring an NVMe array to market. I'm not willing to talk about time frame quite yet, but what I will say is there's another [inaudible 00:10:34] that we've been going down here at XIO for the last couple of years, which is around edge computing. Edge micro data centers, edge micro clouds. We see an emerging market opportunity for converged compute, compute offload and storage in single systems where we're using our expertise around systems design to have done what we call fabric express, which is a switch PCI fabric that allows you to put a lot of compute horsepower, a lot of compute offload horsepower and a lot of NVMe storage on one fabric and a very small container. And those are being used for really interesting applications around real-time streaming data analytics, big data ... you know, taking hyper-scale concepts and big data analytics and collapsing them down into one node to make them either more deployable or just less expensive and easier to manage. I like to think about things like hyper-scale data center architecture and cloud architecture are great for applications that interact with people, but in a world of autonomous machines, where suddenly sub-second response times are not good enough, you have to think about sub-microsecond response times in terms of ingesting data, doing analytics against that data and generating responses those machines can use, that you have to make that happen closer to where those machines are. You can't make it happen in some faraway [crosstalk 00:11:50]. Mike Matchett:I mean, the speed of light still is a problem for us all, right? Can't solve that one. Mike Matchett:It's a problem. I think that's all the time we have today, Bill. Thank you for being on here. Thanks for explaining all this flash market stuff to us. Bill Miller:Thanks, Mike. Appreciate it. Appreciate the opportunity. Mike Matchett:And thank you for watching. This is Mike Matchett with Small World Big Data, and I can't wait to have XIO come back and tell us more about bouquet filters and edge convergence and some of the new things they're working on when they're ready. Take care, guys. Thanks.
Mid
[ 0.5597345132743361, 31.625, 24.875 ]
Q: Is there a relationship between prime numbers and music? Is there a relationship between prime numbers and the series of overtones and their frequencies? I've found links to Euler's research about math and about music, and I got goose bumps when I found that here is a whole universe of correlation. Can someone breakdown this theory for dummies like me? http://www.tonalsoft.com/monzo/euler/euler-en.aspx (http://eulerarchive.maa.org//pages/E033.html) I mean especially the correlation of string-length, overtones, and prime numbers. After thinking about it and trying to explain it to me, I've found that this is very simple, but I never realized this relationship. A: There is one observation with respect to primes. No prime power (except 0) is a power of any other prime. Thus no number of stacked fifths will be equal to any number of stacked octaves. (Taking a fifth to be a ratio of 3:2). Thus, any useful music over more than a few notes will need tempering. "Pythagorean" tuning uses only ratios using 2 or 3. "Just" tuning uses ratios using 2, 3, and 5. The Pythagorean third becomes 81/64 and the Just third is 5/3; these don't match. Other than this, there isn't much except for figuring out how to temper the difference between (for example) 7 octaves and 12 fifths in a practical manner. A: I would say "trivially, yes". Yes, because music can be analyzed and is often created in ways that involve numbers and fundamentals of algebra (such as addition and multiplication), and once numbers become involved, and particularly when multiplication (and division) is involved, prime numbers become significant. Trivially, because every branch of human thought that can be analyzed and/or developed using numbers and basic algebra, and particularly multiplication/division, has a meaningful interaction with prime numbers. That is because the very nature of prime numbers is they create patterns in how numbers in general are multiplied and divided. Here is a list of only some of the areas of music where prime numbers have important interaction with the concept because of the usefulness of multiplication and/or division of whole numbers: frequency ratios and intervals time signatures and rhythms tuning, intonation, and scales resonance, damping, and instrument construction acoustics etc. There are overlaps between some of those areas, as many will surely notice. Specifically regarding Euler's ideas, they don't seem particularly helpful to me, at least from a musical point of view. They might be interesting in their own way, but I think there's a reason that people don't frequently refer to these ideas when talking about music. Also, Euler's mathematical innovations are much more exciting.
Mid
[ 0.547126436781609, 29.75, 24.625 ]
Scott Pruitt’s round-the-clock personal security detail, which demands triple the manpower of his predecessors at the Environmental Protection Agency, has prompted officials to rotate in special agents from around the country who otherwise would be investigating environmental crimes. The EPA’s Office of Enforcement and Compliance Assurance has summoned agents from various cities to serve two-week stints helping guard Pruitt in recent months. While hiring in many departments is frozen, the agency has sought an exception to hire additional full-time staff to protect Pruitt. Shortly after the former Oklahoma attorney general assumed his post in February, aides requested 24/7 federal protection for him. Follow Us Food for Thought: Based on 2016 IMF Report the fossil fuel industry extracted $700B (billion) in annual tax payer subsidies. They paid $117 million in campaign contributions and they have 720 lobbyists in Washington, D.C. SOURCE
Mid
[ 0.582191780821917, 31.875, 22.875 ]
use super::{pat::PatType, util::ExprExt, *}; use crate::{lexer::TokenContext, token::AssignOpToken}; use either::Either; use swc_atoms::js_word; use swc_common::{ast_node, Spanned}; mod ops; #[cfg(test)] mod tests; mod verifier; #[parser] impl<'a, I: Tokens> Parser<I> { pub fn parse_expr(&mut self) -> PResult<Box<Expr>> { trace_cur!(parse_expr); let expr = self.parse_assignment_expr()?; let start = expr.span().lo(); if is!(',') { let mut exprs = vec![expr]; while eat!(',') { exprs.push(self.parse_assignment_expr()?); } let end = exprs.last().unwrap().span().hi(); return Ok(Box::new(Expr::Seq(SeqExpr { span: span!(start), exprs, }))); } Ok(expr) } ///`parseMaybeAssign` (overrided) pub(super) fn parse_assignment_expr(&mut self) -> PResult<Box<Expr>> { trace_cur!(parse_assignment_expr); if self.input.syntax().typescript() { // Note: When the JSX plugin is on, type assertions (`<T> x`) aren't valid // syntax. if is!(JSXTagStart) { let cur_context = self.input.token_context().current(); debug_assert_eq!(cur_context, Some(TokenContext::JSXOpeningTag)); // Only time j_oTag is pushed is right after j_expr. debug_assert_eq!( self.input.token_context().0[self.input.token_context().len() - 2], TokenContext::JSXExpr ); let res = self.try_parse_ts(|p| p.parse_assignment_expr_base().map(Some)); if let Some(res) = res { return Ok(res); } else { debug_assert_eq!( self.input.token_context().current(), Some(TokenContext::JSXOpeningTag) ); self.input.token_context_mut().pop(); debug_assert_eq!( self.input.token_context().current(), Some(TokenContext::JSXExpr) ); self.input.token_context_mut().pop(); } } } if self.input.syntax().typescript() && (is_one_of!('<', JSXTagStart)) && peeked_is!(IdentName) { let res = self.try_parse_ts(|p| { let type_parameters = p.parse_ts_type_params()?; let mut arrow = p.parse_assignment_expr_base()?; match *arrow { Expr::Arrow(ArrowExpr { ref mut type_params, .. }) => { *type_params = Some(type_parameters); } _ => unexpected!("("), } Ok(Some(arrow)) }); if let Some(res) = res { return Ok(res); } } self.parse_assignment_expr_base() } /// Parse an assignment expression. This includes applications of /// operators like `+=`. /// /// `parseMaybeAssign` fn parse_assignment_expr_base(&mut self) -> PResult<Box<Expr>> { trace_cur!(parse_assignment_expr_base); if self.ctx().in_generator && is!("yield") { return self.parse_yield_expr(); } self.state.potential_arrow_start = match *cur!(true)? { Word(Word::Ident(..)) | tok!('(') | tok!("yield") => Some(cur_pos!()), _ => None, }; let start = cur_pos!(); // Try to parse conditional expression. let cond = self.parse_cond_expr()?; return_if_arrow!(cond); match *cond { // if cond is conditional expression but not left-hand-side expression, // just return it. Expr::Cond(..) | Expr::Bin(..) | Expr::Unary(..) | Expr::Update(..) => return Ok(cond), _ => {} } self.finish_assignment_expr(start, cond) } fn finish_assignment_expr(&mut self, start: BytePos, cond: Box<Expr>) -> PResult<Box<Expr>> { trace_cur!(finish_assignment_expr); match cur!(false) { Ok(&Token::AssignOp(op)) => { let left = if op == AssignOpToken::Assign { self.reparse_expr_as_pat(PatType::AssignPat, cond) .map(Box::new) .map(PatOrExpr::Pat)? } else { //It is an early Reference Error if IsValidSimpleAssignmentTarget of // LeftHandSideExpression is false. if !self.input.syntax().typescript() && !cond.is_valid_simple_assignment_target(self.ctx().strict) { self.emit_err(cond.span(), SyntaxError::NotSimpleAssign) } let is_eval_or_arguments = match *cond { Expr::Ident(ref i) => { i.sym == js_word!("eval") || i.sym == js_word!("arguments") } _ => false, }; if self.input.syntax().typescript() && self.ctx().strict && is_eval_or_arguments { self.emit_err(cond.span(), SyntaxError::TS1100); } // TODO PatOrExpr::Expr(cond) }; bump!(); let right = self.parse_assignment_expr()?; Ok(Box::new(Expr::Assign(AssignExpr { span: span!(start), op, // TODO: left, right, }))) } _ => Ok(cond), } } /// Spec: 'ConditionalExpression' fn parse_cond_expr(&mut self) -> PResult<Box<Expr>> { trace_cur!(parse_cond_expr); let start = cur_pos!(); let test = self.parse_bin_expr()?; return_if_arrow!(test); if eat!('?') { let ctx = Context { in_cond_expr: true, include_in_expr: true, ..self.ctx() }; let cons = self.with_ctx(ctx).parse_assignment_expr()?; expect!(':'); let ctx = Context { in_cond_expr: true, ..self.ctx() }; let alt = self.with_ctx(ctx).parse_assignment_expr()?; let span = Span::new(start, alt.span().hi(), Default::default()); Ok(Box::new(Expr::Cond(CondExpr { span, test, cons, alt, }))) } else { Ok(test) } } /// Parse a primary expression or arrow function #[allow(clippy::cognitive_complexity)] pub(super) fn parse_primary_expr(&mut self) -> PResult<Box<Expr>> { trace_cur!(parse_primary_expr); let _ = self.input.cur(); let start = cur_pos!(); let can_be_arrow = self .state .potential_arrow_start .map(|s| s == start) .unwrap_or(false); match self.input.cur() { Some(tok) => match tok { tok!("this") => { self.input.bump(); return Ok(Box::new(Expr::This(ThisExpr { span: span!(start) }))); } tok!("import") => { let import = self.parse_ident_name()?; if self.input.syntax().import_meta() && is!('.') { return self .parse_import_meta_prop(import) .map(Expr::MetaProp) .map(Box::new); } return self.parse_dynamic_import(start, import); } tok!("async") => { if peeked_is!("function") && !self.input.has_linebreak_between_cur_and_peeked() { // handle `async function` expression return self.parse_async_fn_expr(); } if can_be_arrow && self.input.syntax().typescript() && peeked_is!('<') { // try parsing `async<T>() => {}` if let Some(res) = self.try_parse_ts(|p| { let start = cur_pos!(); assert_and_bump!("async"); p.try_parse_ts_generic_async_arrow_fn(start) }) { return Ok(Box::new(Expr::Arrow(res))); } } if can_be_arrow && peeked_is!('(') { expect!("async"); let async_span = self.input.prev_span(); return self.parse_paren_expr_or_arrow_fn(can_be_arrow, Some(async_span)); } } tok!('[') => { return self.parse_array_lit(); } tok!('{') => { return self.parse_object(); } // Handle FunctionExpression and GeneratorExpression tok!("function") => { return self.parse_fn_expr(); } // Literals tok!("null") | tok!("true") | tok!("false") | Token::Num(..) | Token::BigInt(..) | Token::Str { .. } => { return Ok(Box::new(Expr::Lit(self.parse_lit()?))); } // Regexp Token::Regex(..) => match bump!() { Token::Regex(exp, flags) => { return Ok(Box::new(Expr::Lit(Lit::Regex(Regex { span: span!(start), exp, flags, })))); } _ => unreachable!(), }, tok!('`') => { // parse template literal return Ok(Box::new(Expr::Tpl(self.parse_tpl()?))); } tok!('(') => { return self.parse_paren_expr_or_arrow_fn(can_be_arrow, None); } _ => {} }, None => {} } let decorators = self.parse_decorators(false)?; if is!("class") { return self.parse_class_expr(start, decorators); } if is!("let") || (self.input.syntax().typescript() && is!(IdentName)) || is!(IdentRef) { // TODO: Handle [Yield, Await] let id = self.parse_ident_name()?; if self.ctx().strict { match id.sym { // js_word!("eval") | js_word!("arguments") => { // self.emit_err(id.span, // SyntaxError::EvalAndArgumentsInStrict) // } js_word!("yield") | js_word!("static") | js_word!("implements") | js_word!("let") | js_word!("package") | js_word!("private") | js_word!("protected") | js_word!("public") => { self.emit_err(self.input.prev_span(), SyntaxError::InvalidIdentInStrict); } _ => {} } } if can_be_arrow && id.sym == js_word!("async") && is!(BindingIdent) { // async a => body let arg = self.parse_binding_ident().map(Pat::from)?; let params = vec![arg]; expect!("=>"); let body = self.parse_fn_body(true, false)?; return Ok(Box::new(Expr::Arrow(ArrowExpr { span: span!(start), body, params, is_async: true, is_generator: false, return_type: None, type_params: None, }))); } else if can_be_arrow && !self.input.had_line_break_before_cur() && eat!("=>") { let params = vec![id.into()]; let body = self.parse_fn_body(false, false)?; return Ok(Box::new(Expr::Arrow(ArrowExpr { span: span!(start), body, params, is_async: false, is_generator: false, // TODO return_type: None, // TODO type_params: None, }))); } else { return Ok(Box::new(Expr::Ident(id))); } } unexpected!( "this, import, async, function, [ for array literal, { for object literal, @ for \ decorator, function, class, null, true, false, number, bigint, string, regexp, ` for \ template literal, (, or an identifier" ) } fn parse_array_lit(&mut self) -> PResult<Box<Expr>> { trace_cur!(parse_array_lit); let start = cur_pos!(); assert_and_bump!('['); let mut elems = vec![]; while !eof!() && !is!(']') { if is!(',') { expect!(','); elems.push(None); continue; } elems.push( self.include_in_expr(true) .parse_expr_or_spread() .map(Some)?, ); if is!(',') { expect!(','); } } expect!(']'); let span = span!(start); Ok(Box::new(Expr::Array(ArrayLit { span, elems }))) } fn parse_member_expr(&mut self) -> PResult<Box<Expr>> { self.parse_member_expr_or_new_expr(false) } /// `parseImportMetaProperty` pub(super) fn parse_import_meta_prop(&mut self, import: Ident) -> PResult<MetaPropExpr> { let start = cur_pos!(); let meta = import; expect!('.'); let prop = if is!("meta") { self.parse_ident_name()? } else { unexpected!("meta"); }; Ok(MetaPropExpr { meta, prop }) } /// `is_new_expr`: true iff we are parsing production 'NewExpression'. fn parse_member_expr_or_new_expr(&mut self, is_new_expr: bool) -> PResult<Box<Expr>> { trace_cur!(parse_member_expr_or_new_expr); let start = cur_pos!(); if eat!("new") { let span_of_new = span!(start); if eat!('.') { let start_of_target = cur_pos!(); if eat!("target") { let expr = Box::new(Expr::MetaProp(MetaPropExpr { meta: Ident::new(js_word!("new"), span_of_new), prop: Ident::new(js_word!("target"), span!(start_of_target)), })); return self.parse_subscripts(ExprOrSuper::Expr(expr), true); } unexpected!("target") } // 'NewExpression' allows new call without paren. let callee = self.parse_member_expr_or_new_expr(is_new_expr)?; return_if_arrow!(callee); let type_args = if self.input.syntax().typescript() && is!('<') { self.try_parse_ts(|p| { let args = p.parse_ts_type_args()?; if !is!('(') { // This will fail expect!('('); } Ok(Some(args)) }) } else { None }; if !is_new_expr || is!('(') { // Parsed with 'MemberExpression' production. let args = self.parse_args(false).map(Some)?; let new_expr = ExprOrSuper::Expr(Box::new(Expr::New(NewExpr { span: span!(start), callee, args, type_args, }))); // We should parse subscripts for MemberExpression. // Because it's left recursive. return self.parse_subscripts(new_expr, true); } // Parsed with 'NewExpression' production. return Ok(Box::new(Expr::New(NewExpr { span: span!(start), callee, args: None, type_args, }))); } if eat!("super") { let base = ExprOrSuper::Super(Super { span: span!(start) }); return self.parse_subscripts(base, true); } let obj = self.parse_primary_expr()?; return_if_arrow!(obj); self.parse_subscripts(ExprOrSuper::Expr(obj), true) } /// Parse `NewExpresion`. /// This includes `MemberExpression`. pub(super) fn parse_new_expr(&mut self) -> PResult<Box<Expr>> { trace_cur!(parse_new_expr); self.parse_member_expr_or_new_expr(true) } /// Parse `Arguments[Yield, Await]` pub(super) fn parse_args(&mut self, is_dynamic_import: bool) -> PResult<Vec<ExprOrSpread>> { trace_cur!(parse_args); let start = cur_pos!(); expect!('('); let mut first = true; let mut expr_or_spreads = vec![]; while !eof!() && !is!(')') { if first { first = false; } else { expect!(','); // Handle trailing comma. if is!(')') { if is_dynamic_import { syntax_error!(span!(start), SyntaxError::TrailingCommaInsideImport) } break; } } expr_or_spreads.push(self.include_in_expr(true).parse_expr_or_spread()?); } expect!(')'); Ok(expr_or_spreads) } /// AssignmentExpression[+In, ?Yield, ?Await] /// ...AssignmentExpression[+In, ?Yield, ?Await] pub(super) fn parse_expr_or_spread(&mut self) -> PResult<ExprOrSpread> { trace_cur!(parse_expr_or_spread); let start = cur_pos!(); if eat!("...") { let spread = Some(span!(start)); self.include_in_expr(true) .parse_assignment_expr() .map(|expr| ExprOrSpread { spread, expr }) } else { self.parse_assignment_expr() .map(|expr| ExprOrSpread { spread: None, expr }) } } /// Parse paren expression or arrow function expression. fn parse_paren_expr_or_arrow_fn( &mut self, can_be_arrow: bool, async_span: Option<Span>, ) -> PResult<Box<Expr>> { trace_cur!(parse_paren_expr_or_arrow_fn); let expr_start = async_span.map(|x| x.lo()).unwrap_or(cur_pos!()); // At this point, we can't know if it's parenthesized // expression or head of arrow function. // But as all patterns of javascript is subset of // expressions, we can parse both as expression. let paren_items = self.include_in_expr(true).parse_args_or_pats()?; let has_pattern = paren_items.iter().any(|item| match item { PatOrExprOrSpread::Pat(..) => true, _ => false, }); // This is slow path. We handle arrow in conditional expression. if self.syntax().typescript() && self.ctx().in_cond_expr && is!(':') { // TODO: Remove clone let items_ref = &paren_items; if let Some(expr) = self.try_parse_ts(|p| { let return_type = p.parse_ts_type_or_type_predicate_ann(&tok!(':'))?; expect!("=>"); let params = p .parse_paren_items_as_params(items_ref.clone())? .into_iter() .collect(); let body: BlockStmtOrExpr = p.parse_fn_body(async_span.is_some(), false)?; Ok(Some(Box::new(Expr::Arrow(ArrowExpr { span: span!(expr_start), is_async: async_span.is_some(), is_generator: false, params, body, return_type: Some(return_type), type_params: None, })))) }) { return Ok(expr); } } let return_type = if !self.ctx().in_cond_expr && self.input.syntax().typescript() && is!(':') && !self.ctx().in_case_cond { Some(self.parse_ts_type_or_type_predicate_ann(&tok!(':'))?) } else { None }; // we parse arrow function at here, to handle it efficiently. if has_pattern || return_type.is_some() || is!("=>") { if self.input.had_line_break_before_cur() { syntax_error!(span!(expr_start), SyntaxError::LineBreakBeforeArrow); } if !can_be_arrow { syntax_error!(span!(expr_start), SyntaxError::ArrowNotAllowed); } expect!("=>"); let params = self .parse_paren_items_as_params(paren_items)? .into_iter() .collect(); let body: BlockStmtOrExpr = self.parse_fn_body(async_span.is_some(), false)?; let arrow_expr = ArrowExpr { span: span!(expr_start), is_async: async_span.is_some(), is_generator: false, params, body, return_type, type_params: None, }; match arrow_expr.body { BlockStmtOrExpr::BlockStmt(..) => match cur!(false) { Ok(&Token::BinOp(..)) => { // ) is required self.emit_err(self.input.cur_span(), SyntaxError::TS1005); let errored_expr = self.parse_bin_op_recursively(Box::new(arrow_expr.into()), 0)?; if !is!(';') { // ; is required self.emit_err(self.input.cur_span(), SyntaxError::TS1005); } return Ok(errored_expr); } _ => {} }, _ => {} } return Ok(Box::new(Expr::Arrow(arrow_expr))); } let expr_or_spreads = paren_items .into_iter() .map(|item| -> PResult<_> { match item { PatOrExprOrSpread::ExprOrSpread(e) => Ok(e), _ => syntax_error!(item.span(), SyntaxError::InvalidExpr), } }) .collect::<Result<Vec<_>, _>>()?; if let Some(async_span) = async_span { // It's a call expression return Ok(Box::new(Expr::Call(CallExpr { span: span!(async_span.lo()), callee: ExprOrSuper::Expr(Box::new(Expr::Ident(Ident::new( "async".into(), async_span, )))), args: expr_or_spreads, type_args: None, }))); } // It was not head of arrow function. if expr_or_spreads.is_empty() { syntax_error!( Span::new(expr_start, last_pos!(), Default::default()), SyntaxError::EmptyParenExpr ); } // TODO: Verify that invalid expression like {a = 1} does not exists. // ParenthesizedExpression cannot contain spread. if expr_or_spreads.len() == 1 { let expr = match expr_or_spreads.into_iter().next().unwrap() { ExprOrSpread { spread: Some(..), ref expr, } => syntax_error!(expr.span(), SyntaxError::SpreadInParenExpr), ExprOrSpread { expr, .. } => expr, }; Ok(Box::new(Expr::Paren(ParenExpr { span: span!(expr_start), expr, }))) } else { debug_assert!(expr_or_spreads.len() >= 2); let mut exprs = Vec::with_capacity(expr_or_spreads.len()); for expr in expr_or_spreads { match expr { ExprOrSpread { spread: Some(..), ref expr, } => syntax_error!(expr.span(), SyntaxError::SpreadInParenExpr), ExprOrSpread { expr, .. } => exprs.push(expr), } } debug_assert!(exprs.len() >= 2); // span of sequence expression should not include '(', ')' let seq_expr = Box::new(Expr::Seq(SeqExpr { span: Span::new( exprs.first().unwrap().span().lo(), exprs.last().unwrap().span().hi(), Default::default(), ), exprs, })); Ok(Box::new(Expr::Paren(ParenExpr { span: span!(expr_start), expr: seq_expr, }))) } } #[allow(clippy::vec_box)] fn parse_tpl_elements( &mut self, is_tagged: bool, ) -> PResult<(Vec<Box<Expr>>, Vec<TplElement>)> { trace_cur!(parse_tpl_elements); let mut exprs = vec![]; let cur_elem = self.parse_tpl_element(is_tagged)?; let mut is_tail = cur_elem.tail; let mut quasis = vec![cur_elem]; while !is_tail { expect!("${"); exprs.push(self.include_in_expr(true).parse_expr()?); expect!('}'); let elem = self.parse_tpl_element(is_tagged)?; is_tail = elem.tail; quasis.push(elem); } Ok((exprs, quasis)) } fn parse_tagged_tpl( &mut self, tag: Box<Expr>, type_params: Option<TsTypeParamInstantiation>, ) -> PResult<TaggedTpl> { let tagged_tpl_start = tag.span().lo(); trace_cur!(parse_tagged_tpl); assert_and_bump!('`'); let (exprs, quasis) = self.parse_tpl_elements(false)?; expect!('`'); let span = span!(tagged_tpl_start); Ok(TaggedTpl { span, tag, exprs, type_params, quasis, }) } pub(super) fn parse_tpl(&mut self) -> PResult<Tpl> { trace_cur!(parse_tpl); let start = cur_pos!(); assert_and_bump!('`'); let (exprs, quasis) = self.parse_tpl_elements(false)?; expect!('`'); let span = span!(start); Ok(Tpl { span, exprs, quasis, }) } fn parse_tpl_element(&mut self, is_tagged: bool) -> PResult<TplElement> { let start = cur_pos!(); let (raw, cooked) = match *cur!(true)? { Token::Template { .. } => match bump!() { Token::Template { raw, cooked, has_escape, } => ( Str { span: span!(start), value: raw, has_escape, }, Some(Str { span: span!(start), value: cooked, has_escape, }), ), _ => unreachable!(), }, _ => unexpected!("template token"), }; let tail = is!('`'); Ok(TplElement { span: span!(start), raw, tail, cooked, }) } fn parse_subscripts(&mut self, mut obj: ExprOrSuper, no_call: bool) -> PResult<Box<Expr>> { loop { obj = match self.parse_subscript(obj, no_call)? { (expr, false) => return Ok(expr), (expr, true) => ExprOrSuper::Expr(expr), } } } /// returned bool is true if this method should be called again. #[allow(clippy::cognitive_complexity)] fn parse_subscript(&mut self, obj: ExprOrSuper, no_call: bool) -> PResult<(Box<Expr>, bool)> { let _ = cur!(false); let start = obj.span().lo(); if self.input.syntax().typescript() { if !self.input.had_line_break_before_cur() && is!('!') { self.input.set_expr_allowed(false); assert_and_bump!('!'); let expr = match obj { ExprOrSuper::Super(..) => unimplemented!("super!"), ExprOrSuper::Expr(expr) => expr, }; return Ok(( Box::new(Expr::TsNonNull(TsNonNullExpr { span: span!(start), expr, })), true, )); } if { match obj { ExprOrSuper::Expr(..) => true, // super() cannot be generic _ => false, } } && is!('<') { let obj_ref = &obj; // tsTryParseAndCatch is expensive, so avoid if not necessary. // There are number of things we are going to "maybe" parse, like type arguments // on tagged template expressions. If any of them fail, walk it back and // continue. let result = self.try_parse_ts(|p| { if !no_call && p.at_possible_async(match obj_ref { ExprOrSuper::Expr(ref expr) => &*expr, _ => unreachable!(), })? { // Almost certainly this is a generic async function `async <T>() => ... // But it might be a call with a type argument `async<T>();` let async_arrow_fn = p.try_parse_ts_generic_async_arrow_fn(start)?; if let Some(async_arrow_fn) = async_arrow_fn { return Ok(Some((Box::new(Expr::Arrow(async_arrow_fn)), true))); } } let type_args = p.parse_ts_type_args()?; if !no_call && is!('(') { // possibleAsync always false here, because we would have handled it // above. (won't be any undefined arguments) let args = p.parse_args(is_import(&obj))?; Ok(Some(( Box::new(Expr::Call(CallExpr { span: span!(start), callee: obj_ref.clone(), type_args: Some(type_args), args, })), true, ))) } else if is!('`') { p.parse_tagged_tpl( match *obj_ref { ExprOrSuper::Expr(ref obj) => obj.clone(), _ => unreachable!(), }, Some(type_args), ) .map(|expr| (Box::new(Expr::TaggedTpl(expr)), true)) .map(Some) } else { if no_call { unexpected!("`") } else { unexpected!("( or `") } } }); if let Some(result) = result { return Ok(result); } } } let question_dot_token = if self.input.syntax().optional_chaining() && is!('?') && peeked_is!('.') { let start = cur_pos!(); eat!('?'); Some(span!(start)) } else { None }; /// Wrap with optional chaining macro_rules! wrap { ($e:expr) => {{ if let Some(question_dot_token) = question_dot_token { Expr::OptChain(OptChainExpr { span: span!(self, start), question_dot_token, expr: Box::new($e), }) } else { $e } }}; } // $obj[name()] if (question_dot_token.is_some() && is!('.') && peeked_is!('[') && eat!('.') && eat!('[')) || eat!('[') { let prop = self.include_in_expr(true).parse_expr()?; expect!(']'); let span = Span::new(obj.span().lo(), self.input.last_pos(), Default::default()); debug_assert_eq!(obj.span().lo(), span.lo()); return Ok(( Box::new(wrap!(Expr::Member(MemberExpr { span, obj, prop, computed: true, }))), true, )); } if (question_dot_token.is_some() && is!('.') && peeked_is!('(') && eat!('.')) || (!no_call && (is!('('))) { let args = self.parse_args(is_import(&obj))?; return Ok(( Box::new(wrap!(Expr::Call(CallExpr { span: span!(self, start), callee: obj, args, type_args: None, }))), true, )); } // member expression // $obj.name if eat!('.') { let prop: Box<Expr> = Box::new(self.parse_maybe_private_name().map(|e| match e { Either::Left(p) => Expr::PrivateName(p), Either::Right(i) => Expr::Ident(i), })?); let span = span!(obj.span().lo()); debug_assert_eq!(obj.span().lo(), span.lo()); debug_assert_eq!(prop.span().hi(), span.hi()); return Ok(( Box::new(wrap!(Expr::Member(MemberExpr { span, obj, prop, computed: false, }))), true, )); } match obj { ExprOrSuper::Expr(expr) => { // MemberExpression[?Yield, ?Await] TemplateLiteral[?Yield, ?Await, +Tagged] if is!('`') { let tpl = self.parse_tagged_tpl(expr, None)?; return Ok((Box::new(Expr::TaggedTpl(tpl)), true)); } Ok((expr, false)) } ExprOrSuper::Super(..) => { if no_call { syntax_error!(self.input.cur_span(), SyntaxError::InvalidSuperCall); } syntax_error!(self.input.cur_span(), SyntaxError::InvalidSuper); } } } /// Parse call, dot, and `[]`-subscript expressions. pub(super) fn parse_lhs_expr(&mut self) -> PResult<Box<Expr>> { let start = cur_pos!(); // parse jsx if self.input.syntax().jsx() { fn into_expr(e: Either<JSXFragment, JSXElement>) -> Box<Expr> { match e { Either::Left(l) => Box::new(l.into()), Either::Right(r) => Box::new(Box::new(r).into()), } } match *cur!(true)? { Token::JSXText { .. } => { return self .parse_jsx_text() .map(Lit::JSXText) .map(Expr::Lit) .map(Box::new); } Token::JSXTagStart => { return self.parse_jsx_element().map(into_expr); } _ => {} } if is!('<') && !peeked_is!('!') { // In case we encounter an lt token here it will always be the start of // jsx as the lt sign is not allowed in places that expect an expression // FIXME: // self.finishToken(tt.jsxTagStart); return self.parse_jsx_element().map(into_expr); } } // `super()` can't be handled from parse_new_expr() if eat!("super") { let obj = ExprOrSuper::Super(Super { span: span!(start) }); return self.parse_subscripts(obj, false); } let callee = self.parse_new_expr()?; return_if_arrow!(callee); let type_args = if self.input.syntax().typescript() && is!('<') { self.try_parse_ts(|p| { let type_args = p.parse_ts_type_args()?; if is!('(') { Ok(Some(type_args)) } else { Ok(None) } }) } else { None }; if let Expr::New(ne @ NewExpr { args: None, .. }) = *callee { // If this is parsed using 'NewExpression' rule, just return it. // Because it's not left-recursive. if type_args.is_some() { // This fails with `expected (` expect!('('); } debug_assert_ne!( cur!(false).ok(), Some(&tok!('(')), "parse_new_expr() should eat paren if it exists" ); return Ok(Box::new(Expr::New(NewExpr { type_args, ..ne }))); } // 'CallExpr' rule contains 'MemberExpr (...)', // and 'MemberExpr' rule contains 'new MemberExpr (...)' if is!('(') { // This is parsed using production MemberExpression, // which is left-recursive. let callee = ExprOrSuper::Expr(callee); let args = self.parse_args(is_import(&callee))?; let call_expr = Box::new(Expr::Call(CallExpr { span: span!(start), callee, args, type_args, })); return self.parse_subscripts(ExprOrSuper::Expr(call_expr), false); } if type_args.is_some() { // This fails expect!('('); } // This is parsed using production 'NewExpression', which contains // 'MemberExpression' Ok(callee) } pub(super) fn parse_expr_or_pat(&mut self) -> PResult<Box<Expr>> { self.parse_expr() } #[allow(clippy::cognitive_complexity)] pub(super) fn parse_args_or_pats(&mut self) -> PResult<Vec<PatOrExprOrSpread>> { trace_cur!(parse_args_or_pats); expect!('('); let mut first = true; let mut items = vec![]; let mut rest_span = None; // TODO(kdy1): optimize (once we parsed a pattern, we can parse everything else // as a pattern instead of reparsing) while !eof!() && !is!(')') { if first { if is!("async") { // https://github.com/swc-project/swc/issues/410 self.state.potential_arrow_start = Some(cur_pos!()); let expr = self.parse_assignment_expr()?; expect!(')'); return Ok(vec![PatOrExprOrSpread::ExprOrSpread(ExprOrSpread { expr, spread: None, })]); } } else { expect!(','); // Handle trailing comma. if is!(')') { break; } } let start = cur_pos!(); self.state.potential_arrow_start = Some(start); let modifier_start = start; let has_modifier = self.eat_any_ts_modifier()?; let pat_start = cur_pos!(); let mut arg = { if self.input.syntax().typescript() && (is!(IdentRef) || (is!("...") && peeked_is!(IdentRef))) { let spread = if eat!("...") { Some(self.input.prev_span()) } else { None }; // At here, we use parse_bin_expr() instead of parse_assignment_expr() // because `x?: number` should not be parsed as a conditional expression let expr = if spread.is_some() { self.include_in_expr(true).parse_bin_expr()? } else { let mut expr = self.parse_bin_expr()?; if let Ok(&Token::AssignOp(..)) = cur!(false) { expr = self.finish_assignment_expr(start, expr)? } expr }; ExprOrSpread { spread, expr } } else { self.include_in_expr(true).parse_expr_or_spread()? } }; let optional = if self.input.syntax().typescript() { if is!('?') { if peeked_is!(',') || peeked_is!(':') || peeked_is!(')') || peeked_is!('=') { assert_and_bump!('?'); let _ = cur!(false); if arg.spread.is_some() { self.emit_err(self.input.prev_span(), SyntaxError::TS1047); } match *arg.expr { Expr::Ident(..) => {} _ => { syntax_error!(arg.span(), SyntaxError::TsBindingPatCannotBeOptional) } } true } else if match arg { ExprOrSpread { spread: None, .. } => true, _ => false, } { expect!('?'); let test = arg.expr; let ctx = Context { in_cond_expr: true, include_in_expr: true, ..self.ctx() }; let cons = self.with_ctx(ctx).parse_assignment_expr()?; expect!(':'); let ctx = Context { in_cond_expr: true, ..self.ctx() }; let alt = self.with_ctx(ctx).parse_assignment_expr()?; arg = ExprOrSpread { spread: None, expr: Box::new(Expr::Cond(CondExpr { span: Span::new(start, alt.span().hi(), Default::default()), test, cons, alt, })), }; false } else { false } } else { false } } else { false }; if optional || (self.input.syntax().typescript() && is!(':')) { let start = cur_pos!(); // TODO: `async(...args?: any[]) : any => {}` // // if self.input.syntax().typescript() && optional && arg.spread.is_some() { // self.emit_err(self.input.prev_span(), SyntaxError::TS1047) // } let mut pat = self.reparse_expr_as_pat(PatType::BindingPat, arg.expr)?; if optional { match pat { Pat::Ident(ref mut i) => i.optional = true, _ => unreachable!(), } } if let Some(span) = arg.spread { if let Some(rest_span) = rest_span { if self.syntax().early_errors() { // Rest pattern must be last one. syntax_error!(rest_span, SyntaxError::NonLastRestParam); } } rest_span = Some(span); pat = Pat::Rest(RestPat { span: span!(pat_start), dot3_token: span, arg: Box::new(pat), type_ann: None, }); } match pat { Pat::Ident(Ident { ref mut type_ann, ref mut span, .. }) | Pat::Array(ArrayPat { ref mut type_ann, ref mut span, .. }) | Pat::Assign(AssignPat { ref mut type_ann, ref mut span, .. }) | Pat::Object(ObjectPat { ref mut type_ann, ref mut span, .. }) | Pat::Rest(RestPat { ref mut type_ann, ref mut span, .. }) => { let new_type_ann = self.try_parse_ts_type_ann()?; if new_type_ann.is_some() { *span = Span::new(pat_start, self.input.prev_span().hi, Default::default()); } *type_ann = new_type_ann; } Pat::Expr(ref expr) => unreachable!("invalid pattern: Expr({:?})", expr), Pat::Invalid(ref i) => unreachable!("invalid pattern: {:?}", i.span), } if eat!('=') { let right = self.parse_assignment_expr()?; pat = Pat::Assign(AssignPat { span: span!(pat_start), left: Box::new(pat), right, type_ann: None, }); } if has_modifier { self.emit_err(span!(modifier_start), SyntaxError::TS2369); } items.push(PatOrExprOrSpread::Pat(pat)) } else { if has_modifier { self.emit_err(span!(modifier_start), SyntaxError::TS2369); } items.push(PatOrExprOrSpread::ExprOrSpread(arg)); } // https://github.com/swc-project/swc/issues/433 if first && eat!("=>") && { debug_assert_eq!(items.len(), 1); match items[0] { PatOrExprOrSpread::ExprOrSpread(ExprOrSpread { ref expr, .. }) | PatOrExprOrSpread::Pat(Pat::Expr(ref expr)) => match **expr { Expr::Ident(..) => true, _ => false, }, PatOrExprOrSpread::Pat(Pat::Ident(..)) => true, _ => false, } } { let params = self .parse_paren_items_as_params(items)? .into_iter() .collect(); let body: BlockStmtOrExpr = self.parse_fn_body(false, false)?; expect!(')'); let span = span!(start); return Ok(vec![PatOrExprOrSpread::ExprOrSpread(ExprOrSpread { expr: Box::new( ArrowExpr { span, body, is_async: false, is_generator: false, params, type_params: None, return_type: None, } .into(), ), spread: None, })]); } first = false; } expect!(')'); Ok(items) } } #[ast_node] pub(in crate::parser) enum PatOrExprOrSpread { #[tag("*")] Pat(Pat), #[tag("*")] ExprOrSpread(ExprOrSpread), } /// simple leaf methods. #[parser] impl<'a, I: Tokens> Parser<I> { fn parse_yield_expr(&mut self) -> PResult<Box<Expr>> { let start = cur_pos!(); assert_and_bump!("yield"); debug_assert!(self.ctx().in_generator); // Spec says // YieldExpression cannot be used within the FormalParameters of a generator // function because any expressions that are part of FormalParameters are // evaluated before the resulting generator object is in a resumable state. if self.ctx().in_parameters { syntax_error!(self.input.prev_span(), SyntaxError::YieldParamInGen) } if is!(';') || (!is!('*') && !cur!(false).map(Token::starts_expr).unwrap_or(true)) { Ok(Box::new(Expr::Yield(YieldExpr { span: span!(start), arg: None, delegate: false, }))) } else { let has_star = eat!('*'); let arg = self.parse_assignment_expr()?; Ok(Box::new(Expr::Yield(YieldExpr { span: span!(start), arg: Some(arg), delegate: has_star, }))) } } fn at_possible_async(&mut self, expr: &Expr) -> PResult<bool> { // TODO(kdy1): !this.state.containsEsc && Ok(self.state.potential_arrow_start == Some(expr.span().lo()) && match *expr { Expr::Ident(Ident { sym: js_word!("async"), .. }) => true, _ => false, }) } /// 12.2.5 Array Initializer pub(super) fn parse_lit(&mut self) -> PResult<Lit> { let start = cur_pos!(); let v = match *cur!(true)? { Word(Word::Null) => { bump!(); let span = span!(start); Lit::Null(Null { span }) } Word(Word::True) | Word(Word::False) => { let value = is!("true"); bump!(); let span = span!(start); Lit::Bool(Bool { span, value }) } Token::Str { .. } => match bump!() { Token::Str { value, has_escape } => Lit::Str(Str { span: span!(start), value, has_escape, }), _ => unreachable!(), }, Token::Num(..) => match bump!() { Token::Num(value) => Lit::Num(Number { span: span!(start), value, }), _ => unreachable!(), }, Token::BigInt(..) => match bump!() { Token::BigInt(value) => Lit::BigInt(BigInt { span: span!(start), value, }), _ => unreachable!(), }, _ => unreachable!("parse_lit should not be called"), }; Ok(v) } pub(super) fn parse_dynamic_import( &mut self, start: BytePos, import_ident: Ident, ) -> PResult<Box<Expr>> { if !self.input.syntax().dynamic_import() { syntax_error!(span!(start), SyntaxError::DynamicImport); } let args = self.parse_args(true)?; let import = Box::new(Expr::Call(CallExpr { span: span!(start), callee: ExprOrSuper::Expr(Box::new(Expr::Ident(import_ident))), args, type_args: Default::default(), })); self.parse_subscripts(ExprOrSuper::Expr(import), true) } pub(super) fn check_assign_target(&mut self, expr: &Expr, deny_call: bool) { // We follow behavior of tsc if self.input.syntax().typescript() && self.syntax().early_errors() { let is_eval_or_arguments = match *expr { Expr::Ident(ref i) => i.sym == js_word!("eval") || i.sym == js_word!("arguments"), _ => false, }; if self.ctx().strict && is_eval_or_arguments { self.emit_err(expr.span(), SyntaxError::TS1100); } fn should_deny(e: &Expr, deny_call: bool) -> bool { match e { Expr::Lit(..) => false, Expr::Call(..) => deny_call, Expr::Bin(..) => false, Expr::Paren(ref p) => should_deny(&p.expr, deny_call), _ => true, } } // It is an early Reference Error if LeftHandSideExpression is neither // an ObjectLiteral nor an ArrayLiteral and // IsValidSimpleAssignmentTarget of LeftHandSideExpression is false. if !is_eval_or_arguments && !expr.is_valid_simple_assignment_target(self.ctx().strict) && should_deny(&expr, deny_call) { self.emit_err(expr.span(), SyntaxError::TS2406); } } else { if !expr.is_valid_simple_assignment_target(self.ctx().strict) { self.emit_err(expr.span(), SyntaxError::TS2406); } } } } fn is_import(obj: &ExprOrSuper) -> bool { match *obj { ExprOrSuper::Expr(ref expr) => match **expr { Expr::Ident(Ident { sym: js_word!("import"), .. }) => true, _ => false, }, _ => false, } }
Low
[ 0.533073929961089, 34.25, 30 ]
MLB 2K10 Official Patch 1.1 Released 2K Sports released their official patch for the PC version of MLB 2K10. Patch 1.1 corrects a number of general gameplay bugs as well as issues in online and franchise play. You'll need it to keep playing online. General Fixed Inside Edge Batter Breakdown letter grade assignments. The correct ‘Player of Game’ was not consistently being chosen. Player of Game not consistent for all dialogs & audio Fix for bug where head morphs changed when changing hair-style/length in create a player, also addresses extremely odd looking faces generated using randomize head option in create a player. Post Season pause menu stat issue - batting averages will be from the season, not post season as it should be. The loading screen would display a playoff *race* key game message, rather than a playoff key game message. In ReelMaker a wipe would not appear properly the first time. There was a case where the user had to press the button through button twice to advance to the next pitch. The intended behavior is to only have to press the button once. There was a stray camera cut after action replays, before advancing to the next batter. Fixed a bug with player stat leaderboards over specific timeframes: Last 10 Games, Last 30 Days, This Month, Last Month Breaking the consecutive game hit streak record was not being recorded and displayed on the Records screen. Fixed a bug where batting averages like .27777778 were not rounded up to .278 in the batter intro overlay when displaying split stats like "career vs. pitcher". Fixed a bug where franchise and career modes would display the incorrect year that players won a Gold Glove (shown in-game as "Top Fielder") award. Fixed a crash when trying to play a game after downloading a roster update if you have a user created team. Fixed a crash where the game crashes shortly after entering gameplay with the same Playlist selected for every event in All Ballparks in the Ballpark Music Manager. Show the batting handedness on the pause summary screen instead of the player numbers Fixed a bug so that the limit of the number unique user player names is now 1250. Fixed a bug so that when the player picks a name that is already in our name database that it does not count as one of the 1250 unique user player names. Show the pitcher Energy instead of stamina in the Pitcher Warmup and Pitcher Substitution screens Fixed press book photos to not be blue in color Enabled the ability to change to classic hitting controls by pressing 4 on the controller screen Gameplay Added Check Swings. AI Pitcher will no longer throw special pitches in a clutch moment (intentional walks, etc.). Fixed batter batting without a bat. Improved wall climbs and catches at the wall. Strike Zones are updated when a pinch hitter is brought in. User was unable to throw after queuing a throw before playing a wall collision animation. Composure is always affected on a mound visit. The fielding shadow was not drawing correctly vertically against walls. Show the pitch break arrows in two player games. CPU pitchers were staying in too long/throwing too many pitches. Sometimes a player wouldn't do a celebration. Incorrect 1st baseman behavior when a runner tried to advance from 3rd to home just as the 1B caught the ball. Umpires faced the wrong way when a runner stole 2nd Players would occasionally be called out on 2-man steal/pickoff animations when the ball didn't actually touch them Fixed issues with double play behavior when one of the players was significantly out of position Improved running tags. Outfielders would occasionally play a casual-looking queued throw animation while there was a runner advancing The user would occasionally be unable to throw the ball to 1st base after fielding the ball and stomping on 2nd for a double play Increased difficulty to paint corners with lower rated pitchers. Fixed a bug where the pitcher's stamina was not being updated when you simulated. Tuned steal success rate – made it a bit easier to successfully steal. Tuned pickoff abilities – lowered the probability that the users will get picked off at 2nd base. Tuned the distance where the AI will not throw to the cutoff man. Tuned it so that the AI will throw home on SAC fly situations instead of throwing to another base Lowered the arm strength of infielders and outfielders Changed fielder speed to 20 in the preset difficulty for default values Improved the tagging logic so the catcher attempts tags on players coming home on all throws and close plays Fixed a bug where pitchers were regaining stamina once they reached stamina of 25. My Player Fix for a bug in My Player where the “Break a MLB single season record” hall of fame goal was not being marked as completed when the user broke a single season record. Fix for a bug in My Player where broken pitching records were labeled as hitter records and broken hitting records were labeled as pitcher records on the timeline. The spotlight indicator option was not working, when you turned it off in My Player Setup Options it was still appearing. When playing as a catcher in My Player when you had to field bunts they were being hit too hard and the pitcher was fielding them. There was a crash when returning to landing screen after first round playoff games in career mode when you have a post season goal. My Player: The camera is fixed / focused on a patch of grass / the field as the Game recap screen transitions onto the screen at the ending of a My player game and My Player not always being put in appropriate place to see him when we draw the End Game recap in My Player games. Base coaches are in sitting pose during clutch moments in My Player. Made it so that the season awards don't show up until at least 80% of the season has been played. Fixed crash bug that was unrecoverable when requesting a trade in My Player and there was a key game next in the schedule Added an additional achievement reward for advancing a base through any means. This provides more incentive to stay on the bases and try to advance. Beating your record you currently hold no longer unlocks the goal multiple times. When your season goal was to be the MVP the landing screen was showing your MVP score instead of MVP rank. It is now showing the MVP rank so it is clear. Tuned the manager AI for removing the player as the starting pitcher. The manager AI now takes the player out sooner and more appropriately based on both performance and pitch count. Franchise Mode Adjusted the possible pitch speeds for new pitchers generated by the simulator. Adjusted the rating systems for the Award races Adjusted the retirement checks, players were staying in the league to long Adjusted progression so it is near impossible to improve in the decline phase of a player career Reduced the number of home runs by low rated players in the simulator Fixed bug so team no longer have more than 25 man on roster when they should not Removed progression of stealing aggressiveness Added player potential onto the player card inside of franchise mode. Fixed crash on the MLB.com menu when simulating on the league page and cycling through the teams. Improved a problem where players with unique likeness (player heads) are being loaded into gameplay with generic heads. We now ensure that all the players on the starting lineup for the teams have their unique player heads loaded.
Mid
[ 0.5690021231422501, 33.5, 25.375 ]
A currently available full-in-cell touch panel has a surface on which a high-resistance transparent film is formed. In this type of panel, in a case where a resistance value of the transparent film becomes smaller than a normal value, a touch signal becomes weaker and consequently, touch sensitivity of the panel deteriorates. Such deterioration in touch sensitivity of the touch panel can be detected, for example, by checking whether or not a signal value is not smaller than a predetermined value in a case where a testing conductor brought into contact with a panel surface is slid over the panel surface. According to the above method, however, it is likely that the number of inspection steps increases and the testing conductor cannot uniformly come into contact with the panel surface. This disadvantageously leads to unstable inspection and hinders accurate inspection. There is another concern that, for example, the panel surface may be scratched due to contact with the testing conductor. Note that Patent Literature 1 discloses an inspection device, which is configured to measure an electrostatic capacitance of a touch panel, so as to determine whether the touch panel is good or defective.
Low
[ 0.518664047151277, 33, 30.625 ]
Q: Setting WebAPI routing In WebApiConfig I've added to routes : config.Routes.MapHttpRoute( name: "v1_Api", routeTemplate: "api/v1/{controller}/{id}", defaults: new { id = RouteParameter.Optional } ); config.Routes.MapHttpRoute( name: "v1_ApiAction", routeTemplate: "api/v1/{controller}/{action}/{id}", defaults: new { id = RouteParameter.Optional } ); In ApiController I have 2 GET Actions : [HttpGet] public async Task<IEnumerable<RequestModel>> Pending(){} [HttpGet] public async Task<IEnumerable<RequestModel>> Resolved() When I tried to call one of this action from AngularJS service I got 500 Error. Multiple actions were found that match the request When I left only second route, that match my Action - it works well. "/api/v1/RequestRecipient/Pending" In what can be problem in case of 2 routes? A: After some research I've found solution - Just need to change order of routes. From : config.Routes.MapHttpRoute( name: "v1_Api", routeTemplate: "api/v1/{controller}/{id}", defaults: new { id = RouteParameter.Optional } ); config.Routes.MapHttpRoute( name: "v1_ApiAction", routeTemplate: "api/v1/{controller}/{action}/{id}", defaults: new { id = RouteParameter.Optional } ); To : config.Routes.MapHttpRoute( name: "v1_ApiAction", routeTemplate: "api/v1/{controller}/{action}/{id}", defaults: new { id = RouteParameter.Optional } ); config.Routes.MapHttpRoute( name: "v1_Api", routeTemplate: "api/v1/{controller}/{id}", defaults: new { id = RouteParameter.Optional } ); But also I've found someone opinion, that this isn't good idea to have Action and Non-Action routes.
Mid
[ 0.6344086021505371, 29.5, 17 ]
Sunday, March 29, 2009 The usefulness of bugs This is an interesting topic we had a little look at recently. In my world a bug is a subgroup of something that with a wider definition would be called a defect. Googling for a definition of the term defect gives a useful result quickly which says this: - An imperfection that causes inadequacy or failure. This a good place to start. In my experience the vast majority of defects associated with professional game development or entertainment in general belong to the category of inadequacy of the user experience. I would call it ‘inadequate emotional attachment’. It happens that the experience of the player is significantly damaged by the existence of a good old fashioned bug. A program failure or crash will generally not be helpful towards the emotional state of the user but these problems are thankfully not all that common anymore and various measures are in place to remove them from software products. A much more common problem is the lack of something intangible which makes playing the game feel just right. There are tricks or theories you can use to make better games but they are not generally accepted yet so they are hard to describe without getting into very lengthy descriptions of things. So instead of getting stuck in a theoretical black hole I can use a metaphor from the art of making music. Most of the music that reach you will have been analyzed through a rigorous process of defect detection. During its creation the music you hear will have gone through lots of iterations, thousands to millions of tweaks and changes have been made to create the result that is emotionally attaching enough to reach your sensory system. These tweaks have had all kinds of reasons for being done. Different composers or music creating organizations have different methods towards doing things but in general we can take a reductionist look at it. Most of the work done when creating music is inadequate on the idea level. The idea behind the work is not worth the trouble of refinement. The musician detects this quickly and iterates the idea. Eventually the idea is iterated to a point where it reaches something I will call experiential harmony. This is based on all kinds of details, such as the sounds of the instruments, the arrangement, the rhythm, melody and so on. The result may not yet be anything complete but it has reached a “proof of concept” level. To reach this point the musician has gone through defect elimination of several types. Different types of defects are eliminated based on different techniques. Finding a good sound is the process of selecting the right instruments for the various parts of the arrangement and placing them in the sound image where they fit. This is something which typically starts with a great lot of simple defects and ends with a system of sounds which interact experientially productive. Finding the notes played by each instrument is another type of defect prone creative process. Some parts come naturally and some are iterated heavily. It is easy to get to a state where the music is broken due to bad notes. These can be detected and changed from bad to good relatively easily. The difference between a defect note and a defect sound is of some relevance to the topic of this article. The classical, and in modern times rare, bug is defined as a defect note. It is an explicit error in the construction which can be removed or changed to improve the emotional attachment of the product. The more common defect in a user experience is a complex problem which arises from the interactions in the whole system. We hear player say various things to state the existence of these defects. The game is too hard, the game is too easy, boring, slow, stressful, not interesting and so on. You might think that “he wrote boring and not interesting as different things, how stupid.” But from a game designers perspective these are different things, boring is about patterns and the interesting is about context. When you use a players feedback to iterate towards value you are well served to realize that most of the feedback you get will be describing symptoms of complex problems. A complex problem is in this context a defect which arises from the interactions in the system. Classical examples are unrestrained positive feedback loops. These are so common that we even got a specific label and fix for them which is “restrain feedback loop” by changing how the system interact or process data in one or more points. When the player says the game is too slow it means that the player is waiting for relevant information for too long, this is matter of pacing and tuning which has different complex structure in different parts of a game application. What makes this fundamentally interesting is that the process of creating emotional attachment is not reactive to user feedback. User feedback is useful for providing the process with relevant information at some points, especially useful for detecting complex problems in the system. The solutions to problems need to come from the system creators. If the project which is creating this emotional attachment classify defects which are complex problems as bugs you are likely to have a much worse problem than bugs unless you already have reached primary business objectives for the whole product which means it will be ok to have a total failure anyway since everyone is happy with the already accomplished result. From a musicians perspective it is intolerable to accept bugs. The existence of bugs in music means that you prefer making more of the bad music than making valuable music. You can use this strategy during the iterative process and for example accept bugs in the melody while refining the sound but you will never consider a piece of music to be “done” until it is free from defects and thereby flawless. This means that bugs which are reported from end users should return to the product development as the highest priority backlog, if they return as a randomly prioritized task list you are most likely far behind schedule towards reaching business goals. Practically we can probably look at several strategies which deal with these problems. I myself believe the development team needs the mandate to stop defects from reaching the end user in the first place as they are the least likely to be having other goals than making a great product. If you reach a state where it is more important to release a defect product than it is to create a flawless product you are probably in trouble already. No comments: Post a Comment About Me About the Author I am Oskar Åsbrink, game industry veteran by some standards. My background also contains a variety of things apart from games such as electronics, audio engineering, music production, TV production and random artsy endaveours. This blog also contains a lot of seemingly unrelated topics. Comments are apprechiated.
Mid
[ 0.552941176470588, 29.375, 23.75 ]
/* This code is derived from jgit (http://eclipse.org/jgit). Copyright owners are documented in jgit's IP log. This program and the accompanying materials are made available under the terms of the Eclipse Distribution License v1.0 which accompanies this distribution, is reproduced below, and is available at http://www.eclipse.org/org/documents/edl-v10.php All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: - Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. - Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. - Neither the name of the Eclipse Foundation, Inc. nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ using System; using System.Collections.Generic; using System.Text; using NGit.Errors; using NGit.Internal; using NGit.Treewalk; using NGit.Treewalk.Filter; using Sharpen; namespace NGit.Treewalk.Filter { /// <summary>Includes tree entries only if they match one or more configured paths.</summary> /// <remarks> /// Includes tree entries only if they match one or more configured paths. /// <p> /// Operates like /// <see cref="PathFilter">PathFilter</see> /// but causes the walk to abort as soon as the /// tree can no longer match any of the paths within the group. This may bypass /// the boolean logic of a higher level AND or OR group, but does improve /// performance for the common case of examining one or more modified paths. /// <p> /// This filter is effectively an OR group around paths, with the early abort /// feature described above. /// </remarks> public class PathFilterGroup { /// <summary>Create a collection of path filters from Java strings.</summary> /// <remarks> /// Create a collection of path filters from Java strings. /// <p> /// Path strings are relative to the root of the repository. If the user's /// input should be assumed relative to a subdirectory of the repository the /// caller must prepend the subdirectory's path prior to creating the filter. /// <p> /// Path strings use '/' to delimit directories on all platforms. /// <p> /// Paths may appear in any order within the collection. Sorting may be done /// internally when the group is constructed if doing so will improve path /// matching performance. /// </remarks> /// <param name="paths">the paths to test against. Must have at least one entry.</param> /// <returns>a new filter for the list of paths supplied.</returns> public static TreeFilter CreateFromStrings(ICollection<string> paths) { if (paths.IsEmpty()) { throw new ArgumentException(JGitText.Get().atLeastOnePathIsRequired); } PathFilter[] p = new PathFilter[paths.Count]; int i = 0; foreach (string s in paths) { p[i++] = PathFilter.Create(s); } return Create(p); } /// <summary>Create a collection of path filters from Java strings.</summary> /// <remarks> /// Create a collection of path filters from Java strings. /// <p> /// Path strings are relative to the root of the repository. If the user's /// input should be assumed relative to a subdirectory of the repository the /// caller must prepend the subdirectory's path prior to creating the filter. /// <p> /// Path strings use '/' to delimit directories on all platforms. /// <p> /// Paths may appear in any order. Sorting may be done internally when the /// group is constructed if doing so will improve path matching performance. /// </remarks> /// <param name="paths">the paths to test against. Must have at least one entry.</param> /// <returns>a new filter for the paths supplied.</returns> public static TreeFilter CreateFromStrings(params string[] paths) { if (paths.Length == 0) { throw new ArgumentException(JGitText.Get().atLeastOnePathIsRequired); } int length = paths.Length; PathFilter[] p = new PathFilter[length]; for (int i = 0; i < length; i++) { p[i] = PathFilter.Create(paths[i]); } return Create(p); } /// <summary>Create a collection of path filters.</summary> /// <remarks> /// Create a collection of path filters. /// <p> /// Paths may appear in any order within the collection. Sorting may be done /// internally when the group is constructed if doing so will improve path /// matching performance. /// </remarks> /// <param name="paths">the paths to test against. Must have at least one entry.</param> /// <returns>a new filter for the list of paths supplied.</returns> public static TreeFilter Create(ICollection<PathFilter> paths) { if (paths.IsEmpty()) { throw new ArgumentException(JGitText.Get().atLeastOnePathIsRequired); } PathFilter[] p = new PathFilter[paths.Count]; Sharpen.Collections.ToArray(paths, p); return Create(p); } private static TreeFilter Create(PathFilter[] p) { if (p.Length == 1) { return new PathFilterGroup.Single(p[0]); } return new PathFilterGroup.Group(p); } internal class Single : TreeFilter { private readonly PathFilter path; private readonly byte[] raw; internal Single(PathFilter p) { path = p; raw = path.pathRaw; } public override bool Include(TreeWalk walker) { int cmp = walker.IsPathPrefix(raw, raw.Length); if (cmp > 0) { throw StopWalkException.INSTANCE; } return cmp == 0; } public override bool ShouldBeRecursive() { return path.ShouldBeRecursive(); } public override TreeFilter Clone() { return this; } public override string ToString() { return "FAST_" + path.ToString(); } } internal class Group : TreeFilter { private sealed class _IComparer_180 : IComparer<PathFilter> { public _IComparer_180() { } public int Compare(PathFilter o1, PathFilter o2) { return Sharpen.Runtime.CompareOrdinal(o1.pathStr, o2.pathStr); } } private static readonly IComparer<PathFilter> PATH_SORT = new _IComparer_180(); private readonly PathFilter[] paths; internal Group(PathFilter[] p) { paths = p; Arrays.Sort(paths, PATH_SORT); } public override bool Include(TreeWalk walker) { int n = paths.Length; for (int i = 0; ; ) { byte[] r = paths[i].pathRaw; int cmp = walker.IsPathPrefix(r, r.Length); if (cmp == 0) { return true; } if (++i < n) { continue; } if (cmp > 0) { throw StopWalkException.INSTANCE; } return false; } } public override bool ShouldBeRecursive() { foreach (PathFilter p in paths) { if (p.ShouldBeRecursive()) { return true; } } return false; } public override TreeFilter Clone() { return this; } public override string ToString() { StringBuilder r = new StringBuilder(); r.Append("FAST("); for (int i = 0; i < paths.Length; i++) { if (i > 0) { r.Append(" OR "); } r.Append(paths[i].ToString()); } r.Append(")"); return r.ToString(); } } } }
Mid
[ 0.5590361445783131, 29, 22.875 ]
149 Conn. 174 (1962) WALTER R. TAYLOR ET AL. v. NICHOLAS CONTI ET AL. Supreme Court of Connecticut. Argued November 8, 1961. Decided January 16, 1962. BALDWIN, C. J., KING, MURPHY, SHEA and ALCORN, JS. *175 Gregory C. Willis, with whom, on the brief, was Allan R. Johnson, for the appellant (defendant L. G. DeFelice and Son, Inc.). A. Michael Basile, for the appellant (named defendant). David B. Cohen, with whom was George J. Finn, for the appellees (plaintiffs). BALDWIN, C. J. The plaintiffs, Walter R. and Alyce P. Taylor, recovered a judgment for injunctive relief against the defendant Nicholas Conti *176 and for damages against both defendants. The action arose out of grading and soil removal operations conducted by the defendant L. G. DeFelice and Son, Inc., a contractor, hereinafter referred to as DeFelice, on land owned by Conti. Both defendants have appealed. The plaintiffs own land, with a dwelling and barn thereon, on the east side of Long Hill Avenue in Shelton. In 1956, they completed the construction of a dam to form a pond for swimming and fishing in the waters of a brook crossing their property. On July 10, 1957, Conti purchased seventythree acres of land for the purpose of subdividing it into building lots. This land was on the westerly side of Long Hill Avenue, 2500 feet north of, and at a higher elevation than, the plaintiffs' property. It was hilly pasture land, with grass, trees and a deep topsoil of loam. On July 23, Conti and DeFelice made an agreement whereby DeFelice was to cut down the hilly areas on Conti's land, remove large quantities of topsoil and fill, and grade, reloam and reseed the land. DeFelice was to use the loam and fill in the construction of the Connecticut turnpike. The contractor began operations in July. Trucks carting the loam and fill along Long Hill Avenue spilled large quantities of both on the avenue. The court found that this spillage was washed by successive rainfalls into the brook and carried into the plaintiffs' pond. The Conti land, denuded of topsoil and with its grade changed to slope toward, instead of away from, Long Hill Avenue, eroded rapidly, and holes and gullies were left. Silt and gravel were washed across Long Hill Avenue into the brook and were carried to the plaintiffs' pond. They were also washed onto the floor of the plaintiffs' barn. The court concluded *177 that the operations conducted by DeFelice, under its agreement with Conti, had greatly increased the accumulation of surface waters on Conti's land and their discharge into the plaintiffs' pond, accompanied by large quantities of mud and silt. The court awarded the plaintiffs $11,000 damages and enjoined Conti from diverting and increasing the flow of surface waters from his land onto the land of the plaintiffs. Both Conti and DeFelice claim that the court erred in finding certain facts and, particularly, in concluding that as a result of the acts of the defendants, surface waters flowed off Conti's land, across Long Hill Avenue and into the brook in a manner different in volume and course from their original flow. The finding is not subject to correction as to any material fact. Errors claimed in the finding require no further discussion. Conti claims that the plaintiffs' complaint was predicated upon digging and hauling operations performed by DeFelice as an independent contractor and that the court erred in rendering judgment against Conti on the ground of his use and improvement of his own land. The complaint alleges, and the court found, that the work done by DeFelice was performed pursuant to a contract with Conti. Conti's desire to use and improve his land was a motivating factor in the entire operation. DeFelice, in turn, obtained fill and loam for its purposes. A landowner cannot use or improve his land so as to increase the volume of the surface waters which flow from it onto the land of others, nor can he discharge surface waters from his land onto the land of others in a different course from their natural flow, if by so doing he causes substantial damage. Tide Water Oil Sales Corporation v. Shimelman, *178 114 Conn. 182, 188, 158 A. 229, and cases cited; Rutka v. Rzegocki, 132 Conn. 319, 321, 43 A.2d 658; Somers v. Hill, 143 Conn. 476, 481, 123 A.2d 468; note, 59 A.L.R.2d 421, 442; Restatement, 4 Torts § 822; id., c. 40, topic 3, p. 265; id. § 833. Surface waters are "those casual waters which accumulate from natural sources and which have not yet evaporated, been absorbed into the earth, or found their way into a stream or lake. The term does not comprehend waters impounded in artificial ponds, tanks or water mains." Id. § 846, comment b; see Thompson v. New Haven Water Co., 86 Conn. 597, 604, 86 A. 585; 93 C.J.S. 799, § 112. DeFelice may well have been an independent contractor, but that fact does not relieve Conti, because the court found that the damage to the plaintiffs' property arose from the performance by DeFelice of its contract with Conti. Where a party contracts for work to be done of such a character that, even if the work is duly performed, it would naturally, if not necessarily, expose others to probable injury unless preventive measures are taken by him, he is liable for that injury if, while chargeable with knowledge that the work is of such a character, he negligently fails to take preventive measures. Bonczkiewicz v. Merberg Wrecking Corporation, 148 Conn. 573, 579, 172 A.2d 917, and cases cited, including Lawrence v. Shipman, 39 Conn. 586, 589. See Restatement, 4 Torts § 835. The court found that both Conti and DeFelice had knowledge of the change in the course and the volume of the water coming off the Conti land and the damage it was causing the plaintiffs. It does not appear that Conti or DeFelice did anything to prevent that damage. Conti instigated, and DeFelice carried out, for purposes of their own, the operations which *179 resulted in the erosion of the Conti land and the diversion and increased flow of the surface waters which brought injury to the plaintiffs' property. Both participated in the unlawful action of which the plaintiffs complain. See Doe v. Saracyn Corporation, 138 Conn. 69, 76, 82 A.2d 811; Banks v. Watrous, 134 Conn. 592, 600, 59 A.2d 723; Hill v. Way, 117 Conn. 359, 365, 168 A. 1; Restatement, 4 Torts §§ 822, 834. The facts found warrant the application of the foregoing legal principles and justify a conclusion that both Conti and DeFelice were liable. Both defendants claim that the court erred in the method it used to determine the damages and in the amount it awarded. They argue that material other than that which originated from the operations on the Conti land would normally be deposited in the plaintiffs' pond because the pond was the first stilling basin below a fairly rapid fall of the brook. This, no doubt, is true. The court found, however, that as a result of the grading of the Conti property and the removal of topsoil from it, surface waters carrying dirt and gravel flowed off the land, across the road and into the brook and formed a delta where the brook entered the pond, so that mud and silt were deposited in the pond to a depth of ten feet. The court found further that 3666 cubic yards of this material accumulated in the pond. This finding was apparently based on a determination made by an engineer. The court also found that the estimates of the cost of removing the mud and silt from the pond varied from $1 to $6 a cubic yard; that estimates of the cost of dredging the pond and removing the soil from the plaintiffs' barn floor varied from $10,998 to $21,996; that the fair cost of such removal would be $3 a cubic yard; *180 that the value of the plaintiffs' property, estimated at $49,000 to $52,000 with the pond, would be reduced to $40,000 without the pond; and that the usefulness of the pond had been substantially destroyed. The measure of damages for injury to realty in a case such as this is the diminution in its value. This diminution can be determined by the cost of repairing the damage, if that cost does not exceed the former value of the property and if the repairs do not enhance its value over what it was before the injury. Stratford Theater, Inc. v. Stratford, 140 Conn. 422, 424, 101 A.2d 279; Whitman Hotel Corporation v. Elliott & Watrous Engineering Co., 137 Conn. 562, 573, 79 A.2d 591. The determination "is intrinsically approximate, depending largely on the sound judgment of the trier, and it is sufficient if the evidence furnishes data from which damage to the amount found may be inferred with reasonable certainty and without resort to mere conjecture." Dudley v. New Britain, 77 Conn. 322, 325, 59 A. 89; Ball v. T. J. Pardy Construction Co., 108 Conn. 549, 551, 143 A. 855; 15 Am. Jur. 414 § 23, 796 § 356. The amount awarded here did not exceed the diminution in the value of the property. It was an amount which the court could properly and reasonably reach from the facts found. Conti claims that the court erred in granting injunctive relief. The court viewed the locale, including the plaintiffs' and Conti's properties. It found that surface waters were still being discharged from the Conti property in increased volume and in a manner different from their natural flow. The injury was continuing in its nature. Injunctive relief was proper under the circumstances. Sisters of St. Joseph Corporation v. Atlas Sand, Gravel & Stone Co., 120 Conn. 168, 173, 180 A. 303; Trowbridge v. *181 True, 52 Conn. 190, 199. Whether to grant injunctive relief in a particular case is a matter calling for the exercise of a legal discretion. Gerald Park Improvement Assn., Inc. v. Bini, 138 Conn. 232, 236, 83 A.2d 195. The court did not abuse its discretion in issuing the injunction. There is no error. In this opinion the other judges concurred.
Mid
[ 0.538116591928251, 30, 25.75 ]
Gamebits : New joystick, Rock Band, Lucha Libre The only way to make the Warthog joystick manlier is to wrap it in bacon. More Hendrix in Rock Band More songs are coming out for Rock Band from the Jimi Hendrix album "Are You Experienced?" If Hendrix were alive to see this, he would say, "What's a video game?"New joystick is tough stuff The manliest joystick ever is on its way. Even the name of its maker is tough: Thrustmaster. Come on, people. That name is just too easy to make fun of. The joystick is made of metal, and not in a "that is so metal" kind of way. It really is made from metal. The thing weighs 14 pounds. It has a separate set of 15 buttons for you to flip on and off until you figure out what they do. It has triggers identical to an airplane, so when you push the buttons, it feels like airplane pilot gear does. Which is great if you are not a pilot. For airplane pilots, using it will feel like they're at work. The cost of this masculine gadget is the masculine price of $499. Sign me up! At least it's not $500. Buying a joystick that costs $500 is just crazy!Out this week: Lucha Libre game Lucha Libre: Heroes del Ring is a pro wrestling game starring real-life Mexican wrestlers. Check out the game's site here. The only thing more fun that playing a Mexican wrestling video game would be wrestling as a Mexican wrestler. I already have my mask. Um ... no reason. Gamebits appears every Monday on the Techknow page of the Birmingham News. Join the conversation with a comment or by writing Joe Crowe at [email protected]. He also answers to El Mascara Nerdragious.
Mid
[ 0.630252100840336, 37.5, 22 ]
Design and raytrace simulations of a multilayer-coated Wolter x-ray optic for the Z machine at Sandia National Laboratories. Recent breakthroughs in the fabrication of small-radii Wolter optics for astrophysics allow high energy density facilities to consider such optics as novel x-ray diagnostics at photon energies of 15-50 keV. Recently, the Lawrence Livermore National Laboratory, Sandia National Laboratories (SNL), the Smithsonian Astrophysical Observatory, and the NASA Marshall Space Flight Center jointly developed and fabricated the first custom Wolter microscope for implementation in SNL's Z machine with optimized sensitivity at 17.5 keV. To achieve spatial resolution of order 100-200 microns over a field of view of 5 × 5 × 5 mm3 with high throughput and narrow energy bandpass, the geometry of the optic and its multilayer required careful design and optimization. While the geometry mainly influences resolution and the field of view of the diagnostic, the mirror coating determines the spectral response and throughput. Here we outline the details of the design and fabrication process for the first multilayer-coated Wolter I optic for SNL's Z machine (Z Wolter), including its W/Si multilayer, and present results of raytrace simulations completed to predict and verify the performance of the optic.
High
[ 0.6826801517067, 33.75, 15.6875 ]
Influence of Number Fluctuation and Position Variation of Channel Dopants and Gate Metal Grains on Tunneling Field-Effect Transistors (TFETs). The influence of number fluctuation and position variation on channel dopants and gate metal grains on tunneling field-effect transistors (TFETs) have been discussed in comparison with metal-oxide-semiconductor FETs (MOSFETs). Based on the simulation results of randomly generated device samples, the shape of the statistical threshold voltage (V(th)) distribution of TFETs associated with individual variation sources such as random dopant fluctuation (RDF) and work-function variation (WFV) have been found to be significantly different than that of MOSFETs. This analysis provides a detailed insight into the variation sources related to underlying physics of TFETs.
High
[ 0.6899563318777291, 29.625, 13.3125 ]
SACAT The South Australian Civil and Administrative Tribunal (SACAT) is a state tribunal that helps people in South Australia to resolve issues within specific areas of law, either through agreement at a conference, conciliation or mediation, or through a decision of the Tribunal at hearing. SACAT also conducts reviews of Government decisions. Youth Court The Youth Court has three separate administrative branches. The court hears: trials and guilty pleas in criminal cases for youths under the age of 18 years, child protection applications and applications for adoption of children. The Family Conference Team conducts family conferences for young offenders. The Care and Protection Unit conducts family care meetings. Australian Government Solicitor The Australian Government Solicitor acts for Federal departments and agencies, and for entities in which the Australian Government has an interest, domestically and internationally. They also act for state and territory government organisations at their request. They do not generally act for private sector individuals or organisations
Mid
[ 0.6341463414634141, 32.5, 18.75 ]
REPORT: Edwin Edwards To Run For Congress? A report yesterday from a trusted source has it that disgraced former Louisiana governor Edwin Edwards is contemplating a run for the 6th District Congressional race this November. The 6th District seat is coming open due to incumbent Bill Cassidy running against Mary Landrieu for the U.S. Senate. Currently, the field includes state senator Dan Claitor, whose campaign launch was marred by a controversy which erupted when he was quoted by the Times-Picayune as equating prospective candidate Tony Perkins, president of the Family Research Council, with David Duke, and a pair of first-time candidates for political office in Paul Dietzel and Cassie Felder. All are Republicans; Edwards, who spent eight years in federal prison on racketeering charges stemming from his fourth and final term as governor of Louisiana, is a Democrat. Our source says that the Edwards camp believes the field for the 6th District race is a weak one and can be beaten, and Anna Edwards (she’s the daughter who’s been divorced four times, not the daughter who was a Vegas showgirl) is the one spreading the story about a potential Congressional campaign. Edwards has been quoted before as saying he could run for any office in Louisiana and win. This from October, while his reality TV show The Governor’s Wife was making its debut (it lasted only a few weeks before being canceled by A&E for lack of viewership)… When asked whether he would consider running for political office in the future, Edwards had this to say: “Lately, for some strange reason, I’m beginning to think it might be a nice thing to do. But, I’m not going to make the decision based upon that. I’m going to make the decision based on whether I think I can win and whether there’s a need for me because I don’t want to end what I consider to be a successful political career on a sad note. But I love this state and I think I could do better than what has been done. And if I saw the opportunity and I thought that people would warm up to it, I would consider it.” FORMER LOUISIANA GOVERNOR EDWIN EDWARDS is a LILY WHITE LYING LIBERAL CAREER POLITICIAN, as well as, a CONVICTED FELON who is once again contemplating his POLITICAL FUTURE! EDWIN EDWARDS is older than GOD and UGLIER than the MUD FENCE daubed with TADPOLES! EDWIN EDWARDS is a CAREER POLITICAL CRIMINAL now wants the sitting GOVERNOR of LOUISIANA-BOBBY JINDAL to give him a FULL-PARDON. FACT: If I were the sitting GOVERNOR of LOUISIANA I wouldn’t give EDWIN EDWARDS a HAND-FULL of $HYT, much less any kind of PARDON! Let me see if I got this straight? If you are an ex-con you have lost your right to vote, own firearms, lose your passport but can run for Congress. What's wrong with this picture or has the law been changed?
Low
[ 0.5246252676659521, 30.625, 27.75 ]
'IPL's a monster and ICC a toothless tiger' Updated: 01 June 2011 16:45 IST In a scathing attack on the BCCI, former Sri Lanka captain Arjuna Ranatunga said the Indian Board's financial might has turned the ICC into a "toothless tiger" and called the IPL a "monster" that will destroy international cricket. Written by Press Trust of India Read Time: 3 mins Colombo: In a scathing attack on the BCCI, former Sri Lanka captain Arjuna Ranatunga said the Indian Board's financial might has turned the ICC into a "toothless tiger" and called the IPL a "monster" that will destroy international cricket. Ranatunga, who led Sri Lanka to the 1996 World Cup triumph, said the ICC has become a body which is constantly under the BCCI's pressure. "The ICC's job is to protect the game. They don't have to favour anyone. The game has been nurtured by honourable men of the ICC for decades, but at present, ICC looks to be under the thumb of India," Ranatunga told 'The Island.' "Not too long ago we had individuals like Malcolm Speed, Eshan Mani and Malcolm Grey who stood against India. But the current ICC is weak and they simply give in. The ICC is becoming a toothless tiger," he said. Ranatunga praised former England captain Tony Greig for stating that the ICC needs to shake off India's influence on it to make right decisions. "Hats off to Tony. Everyone these days fear India and no one wants to antagonise the BCCI. Tony is spot on, except for the fact that he has stated Bangladesh and Zimbabwe Boards do whatever the Indians want. He should have added Sri Lanka Cricket too. "SLC is like a puppet on a string. The job of the ICC is to protect the game rather than any individual country," Ranatunga said. Ranatunga said he fears for the future of Test cricket due to the IPL as players seem to be gravitating towards the league instead of the traditional format. "I have seen this IPL and I must say from the first day I didn't like it. We have created a monster that will go on to destroy international cricket," Ranatunga said. Ranatunga said calls for creating a window for IPL in the international calendar are "ridiculous". "It's absolutely ridiculous. If we are going into that, what about if other countries also ask for windows. If you take football, international matches aren't the priority except for the World Cup, which comes once in four years. In football the glamour is in club tournaments. "Are these people going to make cricket a club based sport too? I feel very sorry and sad at the state of affairs and I hope and pray sanity will prevail," Ranatunga said. He blamed the absence of cricketers from the ICC's top decision-making body for the current scenario. "One fault that I see with the ICC at the moment is that most of the Directors haven't played the game and the main decisions are taken at the Directors' meeting. "If you take most of the CEOs of cricket boards, they are past cricketers, but when they come up with suggestions for the well-being of the game, the Directors need to support those decisions rather than rejecting them," he remarked.
Mid
[ 0.5731958762886591, 34.75, 25.875 ]
# Get your frontend assets out of Node <br/><br/> ### One Paragraph Explainer In a classic web app the backend serves the frontend/graphics to the browser, a very common approach in the Node’s world is to use Express static middleware for streamlining static files to the client. BUT – Node is not a typical webapp as it utilizes a single thread that is not optimized to serve many files at once. Instead, consider using a reverse proxy (e.g. nginx, HAProxy), cloud storage or CDN (e.g. AWS S3, Azure Blob Storage, etc) that utilizes many optimizations for this task and gain much better throughput. For example, specialized middleware like nginx embodies direct hooks between the file system and the network card and uses a multi-threaded approach to minimize intervention among multiple requests. Your optimal solution might wear one of the following forms: 1. Using a reverse proxy – your static files will be located right next to your Node application, only requests to the static files folder will be served by a proxy that sits in front of your Node app such as nginx. Using this approach, your Node app is responsible deploying the static files but not to serve them. Your frontend’s colleague will love this approach as it prevents cross-origin-requests from the frontend. 2. Cloud storage – your static files will NOT be part of your Node app content, they will be uploaded to services like AWS S3, Azure BlobStorage, or other similar services that were born for this mission. Using this approach, your Node app is not responsible deploying the static files neither to serve them, hence a complete decoupling is drawn between Node and the Frontend which is anyway handled by different teams. <br/><br/> ### Configuration example: typical nginx configuration for serving static files ```nginx # configure gzip compression gzip on; keepalive 64; # defining web server server { listen 80; listen 443 ssl; # handle static content location ~ ^/(images/|img/|javascript/|js/|css/|stylesheets/|flash/|media/|static/|robots.txt|humans.txt|favicon.ico) { root /usr/local/silly_face_society/node/public; access_log off; expires max; } ``` <br/><br/> ### What Other Bloggers Say From the blog [StrongLoop](https://strongloop.com/strongblog/best-practices-for-express-in-production-part-two-performance-and-reliability/): >…In development, you can use [res.sendFile()](http://expressjs.com/4x/api.html#res.sendFile) to serve static files. But don’t do this in production, because this function has to read from the file system for every file request, so it will encounter significant latency and affect the overall performance of the app. Note that res.sendFile() is not implemented with the sendfile system call, which would make it far more efficient. Instead, use serve-static middleware (or something equivalent), that is optimized for serving files for Express apps. An even better option is to use a reverse proxy to serve static files; see Use a reverse proxy for more information… <br/><br/>
High
[ 0.6910466582597731, 34.25, 15.3125 ]
repositories { jcenter() } plugins { `kotlin-dsl` }
Low
[ 0.48858447488584406, 26.75, 28 ]
--- abstract: 'In this paper, we construct the bilinear identities for the wave functions of an extended B-type Kadomtsev-Petviashvili (BKP) hierarchy, which contains two types of (2+1)-dimensional Sawada-Kotera equation with a self-consistent source (2d-SKwS-I and 2d-SKwS-II). By introducing an auxiliary variable corresponding to the extended flow for the BKP hierarchy, we find the tau-function and the bilinear identities for this extended BKP hierarchy. The bilinear identities can generate all the Hirota’s bilinear equations for the zero-curvature forms of this extended BKP hierarchy. As examples, the Hirota’s bilinear equations for the two types of 2d-SKwS (both 2d-SKwS-I and 2d-SKwS-II) will be given explicitly.' author: - 'Runliang Lin $^{a}$ [^1], Tiancheng Cao $^{a}$ [^2], Xiaojun Liu $^{b}$ [^3] and Yunbo Zeng $^{a}$ [^4]' title: 'Bilinear identities for an extended B-type Kadomtsev-Petviashvili hierarchy' --- $^{a}$[*Department of Mathematical Sciences, Tsinghua University, Beijing 100084, P.R. China*]{} $^{b}$[*Department of Applied Mathematics, China Agricultural University, Beijing 100083, P.R. China*]{} [**Key words:**]{} BKP hierarchy; self-consistent source; bilinear identity; tau-function; Hirota’s bilinear form [*2010 Mathematics Subject Classification: 35Q51, 37K10\ PACS: 02.30.Ik*]{} (Published in: “Theoretical and Mathematical Physics, 186(3) (2016) 307–319”) Introduction ============ The well-known Kadomtsev-Petviashvili hierarchy [@1983-Date-Jimbo-etal-BKP; @Dickey] is an infinite-dimensional system of nonlinear partial differential equations, which contains various types of soliton equations. The B-type Kadomtsev-Petviashvili hierarchy [@DateRes; @1983-Date-Jimbo-etal-BKP] (or BKP hierarchy for short) is a sub-hierarchy for the KP system. The BKP hierarchy possesses many integrable structures (see, e.g., [@ChengHeHu2010; @1983-Date-Jimbo-etal-BKP; @Shen] and the references therein), such as Lax formulation, $\tau$-function, Hirota’s bilinear equations, etc. Sato’s theory has fundamental importance in the study of integrable systems. It reveals the infinite dimensional Grassmannian structure of the space of $\tau$-functions, where the $\tau$-functions are solutions to the Hirota’s bilinear form of KP hierarchy. Bilinear identity, which is a bilinear residue identity for wave and adjoint wave functions, plays an important role in the proof of existence for $\tau$-function, and it is also the generating function of the Hirota’s bilinear equations for the KP hierarchy [@ZhangYJ; @1997-Loris-Willox; @Shen]. The reductions and generalizations are important topics in the study of integrable systems. Several approaches for the generalizations have been developed, e.g., constructing new flows to *extend* original systems. There are several ways to introduce new flows to make a new compatible integrable system. In [@Xiong], the KP hierarchy is extended by properly combining additional flows. In [@Kamata2002], extension of KP hierarchy is formulated by introducing fractional order pseudo-differential operators. In [@Dimakis2004a; @Dimakis2004b], Dimakis and Müller-Hoissen extended the Moyal-deformed hierarchies by including additional evolution equations with respect to the deformation parameters. In [@Carlet2003], Carlet, Dubrovin and Zhang defined a logarithm of the difference Lax operator and got the extended (2+1)D Toda lattice hierarchy. Later, the Hirota’s bilinear formalism and the relations of extended (2+1)D Toda lattice hierarchy and extended 1D Toda lattice hierarchy have been studied [@Milanov2007; @Takasaki2010]. In [@Li2010], Li, [*et al*]{}, studied the $\tau$-functions and bilinear identities for the extended bi-graded Toda lattice hierarchy. In [@Willox2014], a discrete analogue of the symmetry constrained KP hierarchy is presented. The soliton equations with self-consistent sources have many physical applications (see [@2015-Chvartatskyi-Sydorenko; @Grinevich-Taimanov-2008; @Lin2001; @Lin2006; @Lin2010; @Melnikov1983; @Melnikov1989] and the references therein). For example, the speed of the solitons can be changed by the sources (see, e.g., [@Lin2001; @Melnikov1989]). Recently, it is shown that the construction of the soliton equation with self-consistent sources is related to the “*squared eigenfunction symmetry*” and the “*binary Darboux transformation*” of the original soliton hierarchy [@2014-Doliwa-Lin; @Lin2013]. In [@Wu], an extended BKP hierarchy is constructed following the idea in [@Liu] by using the symmetries generating functions (or the squared eigenfunction symmetries), where two kinds of new multi-component BKP hierarchy are constructed, their $n$-reduction and $k$-constraint are discussed. This kind of extended BKP hierarchy can be thought of as a generalization of the BKP hierarchy by the squared eigenfunction symmetries. The extended BKP hierarchy obtained in [@Wu] includes two types of (2+1)-dimensional Sawada-Kotera equation with a self-consistent source (2d-SKwS-I and 2d-SKwS-II), where the 2d-SKwS-I coincides with that obtained in [@Hu] by a source generating method. In [@Liu], we introduced a method to construct an extended KP hierarchy, then the bilinear identities for this extended KP hierarchy is constructed in [@Lin2013]. Hirota’s bilinear equations are derived for all the zero-curvature forms in the extended KP hierarchy by introducing an auxiliary flow. It seems that the Hirota’s bilinear equations given in [@Lin2013] are in a simpler form by comparing with the previous results in [@HuKP]. In this paper, we will construct the bilinear identities for the extended BKP hierarchy, which is introduced in [@Wu]. The bilinear identities will generate all the Hirota’s bilinear forms for the zero-curvature equations of this extended BKP hierarchy. As examples, we will derive the Hirota bilinear forms for the two types of (2+1)-dimensional Sawada-Kotera equation with a self-consistent source (2d-SKwS-I and 2d-SKwS-II). To the best of our knowledge, the Hirota’s bilinear equations for the 2d-SKwS-II did not appear in the literatures before. This paper is organized as follows. In Section \[Bilinear identities for BKP hierarchy\], the bilinear identities for the BKP hierarchy with a squared eigenfunction symmetry (or a “ghost symmetry”) are constructed. In Section \[Bilinear identities for extended BKP hierarchy\], by considering the squared eigenfunction symmetry as an auxiliary flow, we construct the bilinear identities for the extended BKP hierarchy, we also prove that these bilinear identities fully characterize the extended BKP hierarchy. In Section \[tau functions and Hirota bilinear equations for extended BKP hierarchy\], we introduce the $\tau$-function for the extended BKP hierarchy and we find the generating functions for Hirota’s bilinear form for the extended BKP hierarchy. In Section \[Transformation from Hirota’s bilinear to nonlinear form\], we transform the Hirota’s bilinear form back to the nonlinear partial differential equations for the 2d-SKwS-I and 2d-SKwS-II cases, which verifies the correctness of our construction. In the last section, conclusion and remarks are given. Bilinear identities for the BKP hierarchy with its “ghost symmetry” =================================================================== \[Bilinear identities for BKP hierarchy\] We recall some notation on a pseudo-differential operator. For a pseudo-differential operator $P=\sum\limits_{i=-\infty}^n a_i\partial^i$ with $\partial:=\partial_x$, we denote its non-negative part, negative part and adjoint operator by $P_+=\sum\limits_{i=0}^n a_i\partial^i$, $P_-=\sum\limits_{i<0}^n a_i\partial^i$, $P^*=\sum\limits_{i=-\infty}^n (-\partial)^i a_i$, respectively, and ${\mathrm{res}}_\partial (P)=a_{-1}$. For a Laurent series $f(\lambda)=\sum_i c_i\lambda^i$, we denote ${\mathrm{res}}_\lambda f(\lambda)=c_{-1}$. Consider a pseudo-differential operator $L:=\partial+\sum\limits_{i=1}^{\infty}u_i \partial^{-i}$, and define $B_n:=(L^n)_+$, then the BKP hierarchy is defined by [@1983-Date-Jimbo-etal-BKP] \[BKP\] $$\begin{aligned} & L_{t_n}=[B_n ,L ], \qquad n=1,3,5,... \label{BKP:a}\end{aligned}$$ with the constraint $$\begin{aligned} & L^*=-\partial L \partial^{-1}. \label{BKP:b}\end{aligned}$$ The constrained condition (\[BKP:b\]) is equivalent to $B_n\cdot 1=0,\ \ n\in\mathbb{N}_{odd}$ (see [@DateRes; @1983-Date-Jimbo-etal-BKP]). Following the idea in [@Oevel] and [@Lin2013], we can introduce a new $\partial_z$-flow as \[extBKP\] $$\begin{aligned} &\partial_z L=[ r \partial^{-1} q_x -q \partial^{-1} r_x ,L ], \label{extBKP:a}\end{aligned}$$ where $q$ and $r$ satisfy $$\begin{aligned} &q_{t_n}=B_n(q), \qquad n=1,3,5,..., \label{extBKP:b}\\ &r_{t_n}=B_n(r). \label{extBKP:c}\end{aligned}$$ Here $q$ and $r$ satisfying (\[extBKP:b\]) and (\[extBKP:c\]) are called eigenfunctions [@1997-Loris-Willox; @1999-Loris-Willox], while adjoint eigenfunctions $q^*$ and $r^*$ satisfy $q^*_{t_n}=-B^*_n(q^*),\ r^*_{t_n}=-B^*_n(r^*)$. It is easy to see that $q_x$ and $r_x$ can be adjoint eigenfunctions, then the compatibility of the ${\partial}_z$-flow (\[extBKP:a\]) and the ${\partial}_{t_n}$-flows (\[BKP:a\]) are ensured. The $\partial_z$-flow describes a symmetry for BKP hierarchy, which is called the [*squared eigenfunction symmetry*]{} [@Oevel] or a [*ghost flow*]{} [@ghost; @ghost2]. We can introduce dressing operator $W=1+\sum\limits_{i=1}^{\infty}w_i(z,t)\partial^{-i}$ where $t=(t_1\equiv x,t_3,t_5,\cdots)$ as $L=W\partial W^{-1}$, where $W$ satisfies $t_n-$evolution equations as $$\partial_{t_n}W=-(W\partial^nW^{-1})_{-}W=-L^n_-W,~~n=1,3,5,\cdots.$$ Then by constraint condition (\[BKP:b\]), we have $W^*\partial W=\partial$. The dressing operator $W$ also satisfies the following equation: $$\label{Wz} \partial_z W=( r \partial^{-1} q_x -q \partial^{-1} r_x )W.$$ We define the wave and adjoint wave function as \[wave\] $$\begin{aligned} w(z,t,\lambda)&=W{\mathrm{e}}^{\xi(t,\lambda)} ,\\ w^*(z,t,\lambda)&=(W^*)^{-1}{\mathrm{e}}^{-\xi(t,\lambda)},\end{aligned}$$ where $\xi(t,\lambda)=\sum\limits_{n=0}^\infty t_{2n+1}\lambda^{2n+1}$. These wave functions satisfy \[propertiesofw\] $$\begin{aligned} &Lw(z,t,\lambda)=\lambda w(z,t,\lambda), &\partial_{t_n}w(z,t,\lambda)=B_n w(z,t,\lambda),\\ &L^{*}w^*(z,t,\lambda)=\lambda w^*(z,t,\lambda), &\partial_{t_n}w^*(z,t,\lambda)=-B_n^* w(z,t,\lambda).\end{aligned}$$ We recall an important lemma here (see [@Dickey] for details and proof) which is useful for proving the propositions in this paper. \[lemma\] Let $P$ and $Q$ are pseudo-differential operators, then $$\label{lem} {\mathrm{res}}_\partial P\cdot Q^*={\mathrm{res}}_\lambda P({\mathrm{e}}^{\xi(t,\lambda)})\cdot Q({\mathrm{e}}^{-\xi(t,\lambda)}).$$ \[res-pro\] The BKP hierarchy with a squared eigenfunction symmetry ((\[BKP\]) and (\[extBKP\])) is equivalent to the following residue identities \[res\] $$\begin{aligned} &{\mathrm{res}}_\lambda \lambda^{-1}w(z,t,\lambda)w(z,t^{'},-\lambda)=1 \label{res:a},\\ &{\mathrm{res}}_\lambda \lambda^{-1}w_z (z,t,\lambda)w(z,t^{'},-\lambda)=q(z,t)r(z,t^{'})-r(z,t)q(z,t^{'}) \label{res:b},\\ &q(z,t)={\mathrm{res}}_\lambda \lambda^{-1}w(z,t,\lambda)\cdot\partial^{-1}_{x^{'}}( q(z,t^{'})w_{x^{'}}(z,t^{'},-\lambda)) \label{res:c},\\ &r(z,t)={\mathrm{res}}_\lambda \lambda^{-1}w(z,t,\lambda)\cdot\partial^{-1}_{x^{'}}( r(z,t^{'})w_{x^{'}}(z,t^{'},-\lambda)) \label{res:d}.\end{aligned}$$ where the inverse of ${\partial}$ is understood as pseudo-differential operator acting on an exponential function, e.g., ${\partial}^{-1}\left(r w_x\right)=({\partial}^{-1}r {\partial}W) (e^{\xi(t,{\lambda})})$. The bilinear identity (\[res:a\]) of BKP hierarchy has already been proved in [@DateRes; @1983-Date-Jimbo-etal-BKP] where $z$ can be regarded as a fixed parameter here. By (\[extBKP:b\]), (\[extBKP:c\]), and (\[propertiesofw\]), we know that the mixed partial derivatives $\partial_{t_1}^{m_1}\partial_{t_3}^{m_3}\cdots\partial_{t_k}^{m_k}$ ($k\in\mathbb{N}_{odd}$) on $w(z,t,\lambda)$, $q(z,t)$ and $r(z,t)$ have the same expression in terms of a differential operator $P_{m_1\cdots m_k}$ $$\begin{aligned} &\partial_{t_1}^{m_1}\partial_{t_3}^{m_3}\cdots\partial_{t_k}^{m_k}w(z,t,\lambda) =P_{m_1\cdots m_k}(w(z,t,\lambda)),\\ &\partial_{t_1}^{m_1}\partial_{t_3}^{m_3}\cdots\partial_{t_k}^{m_k}q(z,t)=P_{m_1\cdots m_k}(q(z,t)),\\ &\partial_{t_1}^{m_1}\partial_{t_3}^{m_3}\cdots\partial_{t_k}^{m_k}r(z,t)=P_{m_1\cdots m_k}(r(z,t)),\end{aligned}$$ Notice that $P_{m_1\cdots m_k}$ does not contain constant term. Then to prove (\[res:b\]), we only need to show $$\begin{aligned} &{\mathrm{res}}_\lambda \lambda^{-1}w_z(z,t,\lambda)\partial_{t_1}^{m_1}\partial_{t_3}^{m_3}\cdots\partial_{t_k}^{m_k}w(z,t,-\lambda) \\ =&{\mathrm{res}}_\lambda (r\partial^{-1}q_x-q\partial^{-1}r_x)W{\mathrm{e}}^{\xi(t,\lambda)}P_{m_1\cdots m_k}W(-\partial^{-1}){\mathrm{e}}^{-\xi(t,\lambda)}\\ =&{\mathrm{res}}_\partial (r\partial^{-1}q_x-q\partial^{-1}r_x)W\partial^{-1}W^*P^*_{m_1\cdots m_k} \\ =&{\mathrm{res}}_\partial (r\partial^{-1}q_x-q\partial^{-1}r_x)\partial^{-1}P^*_{m_1\cdots m_k} \\ =&qP_{m_1\cdots m_k}\partial^{-1}(r_x)-rP_{m_1\cdots m_k}\partial^{-1}(q_x) =qP_{m_1\cdots m_k}(r)-rP_{m_1\cdots m_k}(q).\end{aligned}$$ This proves (\[res:b\]). Notice that for any $P_{m_1\cdots m_k}$ introduced above, we have $$\begin{aligned} & {\mathrm{res}}_\lambda \partial_{t_1}^{m_1}\partial_{t_3}^{m_3}\cdots\partial_{t_k}^{m_k} \lambda^{-1}w(z,t,\lambda)\cdot\partial^{-1}(q(z,t)w_{x}(z,t,-\lambda))\\ =&{\mathrm{res}}_\lambda P_{m_1\cdots m_k}(\lambda^{-1}w(z,t,\lambda))\cdot\partial^{-1}(q(z,t)w_{x}(z,t,-\lambda))\\ =&{\mathrm{res}}_\lambda P_{m_1\cdots m_k}W\partial^{-1}{\mathrm{e}}^{\xi(t,\lambda)}\cdot\partial^{-1}q(z,t)\partial W{\mathrm{e}}^{-\xi(t,\lambda)}\\ =&{\mathrm{res}}_\partial P_{m_1\cdots m_k}W\partial^{-1}\cdot(\partial^{-1}q(z,t)\partial W)^*\\ =&{\mathrm{res}}_\partial P_{m_1\cdots m_k}W\partial^{-1}W^*(-\partial)q(z,t)(-\partial)^{-1}\\ =&{\mathrm{res}}_\partial P_{m_1\cdots m_k}q(z,t)\partial^{-1}=P_{m_1\cdots m_k}(q(z,t)) =\partial_{t_1}^{m_1}\partial_{t_3}^{m_3}\cdots\partial_{t_k}^{m_k} q(z,t),\end{aligned}$$ Therefore, we have $$q(z,t^{'})={\mathrm{res}}_\lambda \lambda^{-1}w(z,t^{'},\lambda)\cdot\partial^{-1}(q(z,t)w_{x}(z,t,-\lambda)),$$ and similarly $$r(z,t^{'})={\mathrm{res}}_\lambda \lambda^{-1}w(z,t^{'},\lambda)\cdot\partial^{-1}(r(z,t)w_{x}(z,t,-\lambda)).$$ Then (\[res:c\]) and (\[res:d\]) are proved by interchanging $t$ and $t^{'}$. The proof for the inverse part of this theorem is written as the following proposition. \[zBKP\] If functions $q(z,t)$, $r(z,t)$ and wave function $$w(z,t,\lambda)=W{\mathrm{e}}^{\xi(t,\lambda)}, \qquad W=(1+\sum\limits_{i\geq 1}w_i(z,t)\lambda^{-i}),$$ satisfy the residue identities (\[res\]), then the pseudo-differential operator $L=W\partial W^{-1}$, $q$ and $r$ are a solution of BKP hierarchy with squared eigenfunction symmetry ((\[BKP\]) and (\[extBKP\])). The equation (\[BKP\]) can be derived from (\[res:a\]) (see [@DateRes; @1983-Date-Jimbo-etal-BKP]). The (\[extBKP:b\]) and (\[extBKP:c\]) can be proved by taking $\partial_{t_n}$ on (\[res:c\]) and (\[res:d\]) respectively. Equation (\[extBKP:a\]) can be proved by (\[res:b\]) as the following. It is easy to show that $(W_z W^{-1})_+=0$. Notice that the adjoint wave function $w^*(z,t,\lambda)$ can be written in the following way $$w^*(z,t,\lambda):=(W^*)^{-1}{\mathrm{e}}^{-\xi(t,\lambda)}=\partial W\partial^{-1}{\mathrm{e}}^{-\xi(t,\lambda)}=-\lambda^{-1}w_x(z,t,-\lambda),$$ then from (\[res:b\]), we have $${\mathrm{res}}_\lambda w_z(z,t,\lambda)w^*(z,t^{'},\lambda) =r(z,t)q_{x^{'}}(z,t^{'})-q(z,t)r_{x^{'}}r(z,t^{'}).$$ Furthermore, we have $$\begin{aligned} {\mathrm{res}}_\partial W_z W^{-1}\partial^m &={\mathrm{res}}_\lambda W_z {\mathrm{e}}^{\xi(t,\lambda)}(-\partial)^m W^{*-1}{\mathrm{e}}^{-\xi(t,\lambda)} &={\mathrm{res}}_\lambda w_z(z,t,\lambda)(-\partial)^m w^*(z,t,\lambda)\\ &=r(-\partial)^m q_x-q(-\partial)^m r_x,\end{aligned}$$ which means $$W_zW^{-1}=\sum_{m=0}^{\infty}(r(-\partial)^m(q_x)-q(-\partial)^m(r_x))\partial^{-m-1} =r\partial^{-1}q_x-q\partial^{-1}r_x.$$ Hence (\[Wz\]) holds, which implies (\[extBKP:a\]). Bilinear identities for an extended BKP hierarchy {#Bilinear identities for extended BKP hierarchy} ================================================= In [@Wu], an extended BKP hierarchy is defined by using the squared eigenfunction symmetry as (\[extBKP:a\]). Two types of BKP hierarchy with self-consistent sources are found, their Lax representations are also given. We recall the extended BKP hierarchy here (for a fixed odd $k$ and $k\neq 1$) \[extended\] $$\begin{aligned} &\partial_{\bar{t_k}} L=[ B_k+r \partial^{-1} q_x -q \partial^{-1} r_x ,L ] ,\label{extended:b}\\ &L_{t_n}=[B_n ,L ] ,\quad L^{*}=-\partial L\partial^{-1}, \quad (n\neq k,n=1,3,5,...)\label{extended:a}\\ &q_{t_n}=B_n(q),\label{extended:c}\\ &r_{t_n}=B_n(r),\label{extended:d}\end{aligned}$$ where $q$ and $r$ are eigenfunctions. This hierarchy is constructed by replacing an arbitrary fixed $k$-th flow $\partial_{t_k}$ by $\partial_{\bar{t_k}}$ where the $\partial_{\bar{t_k}}$-flow is a linear combination of $\partial_{t_k}$- and $\partial_z$-flow. For simplicity of the notions, we will still use the symbols $w(z,t,{\lambda})$, $w^*(z,t,{\lambda})$, $q(z,t)$, $r(z,t)$, $L$, $W$, etc., in this and the following sections, but they should be understood to the case of the extended BKP hierarchy (\[extended\]). For example, from now on, $t= (t_1,t_3,\cdots,t_{k-2},\bar{t_k},t_{k+2},\cdots)$ ($k$ is odd). In [@Shen; @Shen2], the Hirota’s bilinear equations for constrained BKP hierarchy (\[extended\]) are constructed. A natural question is to find the bilinear identities for the extended BKP hierarchy (\[extended\]), because the bilinear identities provide a systematic way to generate all the Hirota bilinear equations in the extended BKP hierarchy (\[extended\]). In this section, we give a detailed construction on how to derive the bilinear identities for the extended BKP hierarchy (\[extended\]). Dressing operator $W$ is given by $W=1+\sum\limits_{i=1}^{\infty}w_i(z,t)\partial^{-i}$, where $t=(t_1\equiv x,t_3,\cdots,t_{k-2},\bar{t_k},t_{k+2},\cdots)$, it satisfies $$\partial_{\bar{t_k}}W=-L_-^k W+(r \partial^{-1} q_x -q \partial^{-1} r_x)W.$$ The wave function and its adjoint are defined as (\[wave\]) except for the change: $\xi(t,\lambda)=\bar{t_k}\lambda^k+\sum\limits_{n\neq k}t_n\lambda^n,$ ($k$ and $n$ are odd). The wave and adjoint wave functions satisfy \[propertiesofwtk\] $$\begin{aligned} &Lw(z,t,\lambda)=\lambda w(z,t,\lambda),~~~ \partial_{t_n}w(z,t,\lambda)=B_n w(z,t,\lambda),~~(n\neq k)\\ &L^{*}w^*(z,t,\lambda)=\lambda w^*(z,t,\lambda),~ \partial_{t_n}w^*(z,t,\lambda)=-B_n^* w(z,t,\lambda).\end{aligned}$$ Then we have the bilinear identities for the extended BKP hierarchy as the following proposition. The bilinear identities for the extended BKP hierarchy (\[extended\]) are given by the following sets of residue identities with an auxiliary variable $z$: \[res-extented\] $$\begin{aligned} &{\mathrm{res}}_\lambda \lambda^{-1}w(z-\bar{t_k},t,\lambda)w(z-\bar{t_k}^{'},t^{'},-\lambda)=1 ,\label{res-extented:a}\\ &{\mathrm{res}}_\lambda \lambda^{-1}w_z (z-\bar{t_k},t,\lambda)w(z-\bar{t_k}^{'},t^{'},-\lambda) \nonumber\\ &\qquad =q(z-\bar{t_k},t)r(z-\bar{t_k}^{'},t^{'})-r(z-\bar{t_k},t)q(z-\bar{t_k}^{'},t^{'}) , \label{res-extented:b}\\ &q(z-\bar{t_k},t)={\mathrm{res}}_\lambda \lambda^{-1}w(z-\bar{t_k},t,\lambda)\cdot\partial^{-1}_{x^{'}} (q(z-\bar{t_k}^{'},t^{'})w_{x^{'}}(z-\bar{t_k}^{'},t^{'},-\lambda)) ,\label{res-extented:c}\\ &r(z-\bar{t_k},t)={\mathrm{res}}_\lambda \lambda^{-1}w(z-\bar{t_k},t,\lambda)\cdot\partial^{-1}_{x^{'}} (r(z-\bar{t_k}^{'},t^{'})w_{x^{'}}(z-\bar{t_k}^{'},t^{'},-\lambda)) .\label{res-extented:d}\end{aligned}$$ Notice that $\frac{d}{d\bar{t_k}}w(z-\bar{t_k},t,\lambda) =(\partial_{\bar{t_k}}-\partial_z) w(z,t,\lambda)|_{z=z-\bar{t_k}} =B_k(w(z-\bar{t_k},t,\lambda)),$ so (\[res-extented:a\]) can be proved as the original BKP case [@DateRes; @1983-Date-Jimbo-etal-BKP]. The proofs of (\[res-extented:b\])-(\[res-extented:d\]) are similar to the proofs of (\[res:b\])-(\[res:d\]), just recalling that $\frac{d}{d\bar{t_k}}w(z-\bar{t_k},t,\lambda)=B_k(w(z-\bar{t_k},t,\lambda)).$ Suppose $$w(z,t,\lambda)=W{\mathrm{e}}^{\xi(t,\lambda)}, \qquad W=(1+\sum\limits_{i\geq 1}w_i(z,t)\lambda^{-i}),$$ $q(z,t)$ and $r(z,t)$ satisfy the bilinear identities (\[res-extented\]), then the pseudo-differential operator $L=W\partial W^{-1}$, $q$ and $r$ satisfy the extended BKP hierarchy (\[extended\]). It is already known [@DateRes] that (\[res-extented:a\]) implies the constraint $W^*\partial W=\partial$ or equivalently $L^*=-\partial L\partial^{-1}$ (\[extended:a\]). We may define adjoint wave function of $w(z,t,\lambda)$ as $w^*(z,t,\lambda)=(W^{-1})^*{\mathrm{e}}^{-\xi(t,\lambda)}$, then by $W^*\partial W=\partial$ we get $w^*(z,t,\lambda)=-\lambda^{-1}w_x(z,t,-\lambda)$. Similar to the proof of Proposition \[zBKP\], we obtain $W_z=(r\partial^{-1}q_x-q\partial^{-1}r_x)W$ from (\[res-extented:b\]). It can be derived that $\frac{d}{d\bar{t_k}}w(z-\bar{t_k},t,\lambda)=\left( \frac{d}{d\bar{t_k}}W+L^kW \right){\mathrm{e}}^{\xi(t,\lambda)}$ and $${\mathrm{res}}_\lambda w(z-\bar{t_k},t,\lambda)\lambda^{-1}w_{x^{'}}(z-\bar{t_k}^{'},t^{'},-\lambda) =-{\mathrm{res}}_\lambda w(z-\bar{t_k},t,\lambda)w^*(z-\bar{t_k}^{'},t^{'},\lambda) =0.$$ Then from the coefficients of Taylor expansion of the above equation we find that for any positive integer $m$ $$\begin{aligned} 0&=&{\mathrm{res}}_\lambda \frac{d}{d\bar{t_k}}w(z-\bar{t_k},t,\lambda)\cdot\partial^m w^*(z-\bar{t_k},t,\lambda)\\ &=&{\mathrm{res}}_\lambda \left( \frac{d}{d\bar{t_k}}W+L^kW \right){\mathrm{e}}^{\xi(t,\lambda)}\cdot\partial^m (W^{-1})^*{\mathrm{e}}^{-\xi(t,\lambda)}\\ &=&{\mathrm{res}}_\partial \left( \frac{d}{d\bar{t_k}}W+L^kW \right)\cdot\left(\partial^m (W^{-1})^*\right)^*\\ &=&{\mathrm{res}}_\partial \left( \frac{d}{d\bar{t_k}}W+L^k_-W \right)W^{-1}(-\partial)^m, \qquad (m>0)\end{aligned}$$ which means that $\frac{d}{d\bar{t_k}}W=-L^k_-W$. Hence $\partial_{\bar{t_k}}W=-L_-^k W+(r \partial^{-1} q_x -q \partial^{-1} r_x)W$ holds, then (\[extended:b\]) can be derived. For (\[extended:c\]) and (\[extended:d\]), the proofs can be done by directly differentiating (\[res-extented:c\]) and (\[res-extented:d\]), since we have already known (\[extended:a\]) and hence (\[propertiesofwtk\]) follows. $\tau$ function for the extended BKP hierarchy {#tau functions and Hirota bilinear equations for extended BKP hierarchy} ============================================== The existence of $\tau$-function for original BKP hierarchy is proved in [@1983-Date-Jimbo-etal-BKP]. According to [@ZhangYJ] and [@Lin2013], similar assumptions can be made for the extended BKP hierarhcy (\[extended\]), i.e., \[tau\] $$\begin{aligned} &w(z-\bar{t_k},t,\lambda)=\frac{\tau(z-\bar{t_k}+\frac{2}{k\lambda^k},t-2[\lambda])}{\tau(z-\bar{t_k},t)}\cdot {\mathrm{e}}^{\xi(t,\lambda)},\label{tau-w}\\ &q(z,t)=\frac{\sigma(z,t)}{\tau(z,t)},\label{tau-q}\\ &r(z,t)=\frac{\rho(z,t)}{\tau(z,t)},\label{tau-r}\end{aligned}$$ where $[\lambda]=(\frac{1}{\lambda},\frac{1}{3\lambda^3},\frac{1}{5\lambda^5},\cdots)$. Similar to [@Shen], notice that $w^*(z-\bar{t_k},t,\lambda)=-\lambda^{-1}w_x(z-\bar{t_k},t,-\lambda)$, we have \[Phi\] $$\begin{aligned} &\partial^{-1}( r(z-\bar{t_k},t)w^*(z-\bar{t_k},t,\lambda) )\nonumber\\ =&-\frac{\rho(z-\bar{t_k},t)\tau(z-\bar{t_k}-\frac{2}{k\lambda^k},t+2[\lambda]) +\rho(z-\bar{t_k},t+2[\lambda])\tau(z-\bar{t_k},t)}{2\lambda\tau^2(z-\bar{t_k},t)}{\mathrm{e}}^{-\xi(t,\lambda)},\\ &\partial^{-1}( q(z-\bar{t_k},t)w^*(z-\bar{t_k},t,\lambda) )\nonumber\\ =&-\frac{\sigma(z-\bar{t_k},t)\tau(z-\bar{t_k}-\frac{2}{k\lambda^k},t+2[\lambda]) +\sigma(z-\bar{t_k},t+2[\lambda])\tau(z-\bar{t_k},t)}{2\lambda\tau^2(z-\bar{t_k},t)}{\mathrm{e}}^{-\xi(t,\lambda)}.\end{aligned}$$ Substituting (\[tau\]) and (\[Phi\]) into (\[res-extented\]), one can get \[barhirota\] $$\begin{aligned} &{\mathrm{res}}_\lambda \lambda^{-1}\bar{\tau}(t-y-2[\lambda])\bar{\tau}(t+y+2[\lambda]){\mathrm{e}}^{\xi(-2y,\lambda)}=\bar{\tau}(t-y)\bar{\tau}(t+y) ,\\ &\bar{\sigma}(t-y)\bar{\rho}(t+y)-\bar{\rho}(t-y)\bar{\sigma}(t+y)= {\mathrm{res}}_\lambda \lambda^{-1}\bar{\tau}_z(t-y-2[\lambda])\bar{\tau}(t+y+2[\lambda]){\mathrm{e}}^{\xi(-2y,\lambda)} \nonumber\\ &-{\mathrm{res}}_\lambda \lambda^{-1}\bar{\tau}(t-y-2[\lambda])(\partial_z \log\bar{\tau}(t-y))\bar{\tau}(t+y+2[\lambda]){\mathrm{e}}^{\xi(-2y,\lambda)},\\ &2\bar{\sigma}(t-y)\bar{\tau}(t+y)-\bar{\sigma}(t+y)\bar{\tau}(t-y) ={\mathrm{res}}_\lambda \lambda^{-1}\bar{\tau}(t-y-2[\lambda]) \bar{\sigma}(t+y+2[\lambda]) {\mathrm{e}}^{\xi(-2y,\lambda)},\nonumber\\ \\ &2\bar{\rho}(t-y)\bar{\tau}(t+y)-\bar{\rho}(t+y)\bar{\tau}(t-y) ={\mathrm{res}}_\lambda \lambda^{-1}\bar{\tau}(t-y-2[\lambda]) \bar{\rho}(t+y+2[\lambda]) {\mathrm{e}}^{\xi(-2y,\lambda)}.\nonumber\\\end{aligned}$$ Here we define $\bar{f}(t):= f(z-\bar{t_k},t),$ therefore $\bar{f}(t-2[\lambda])= f(z-\bar{t_k}+\frac{2}{k\lambda^k},t-2[ \lambda]),$ $\bar{f}(t+2[\lambda])= f(z-\bar{t_k}-\frac{2}{k\lambda^k},t+2[\lambda])$. Let $t\rightarrow t-y,~t^{'}\rightarrow t+y$, $y=(y_1,y_3,...)$, and introducing the Hirota’s operator $D_n$ as in [@Hirota]: $$D_n f(t)\circ g(t)=(\partial_{t_n}-\partial_{t_n^{'}})f(t)g(t^{'})|_{t^{'}_n=t_n},~~ {\mathrm{e}}^{aD_n}f(t)\circ g(t)=f(t_n+a)g(t_n-a),$$ we can write (\[barhirota\]) as \[mhirota\] $$\begin{aligned} &\sum\limits_{j=0}p_j(-2y)p_j(2\tilde{D}) {\mathrm{e}}^{\sum\limits_{n=1}y_nD_n} \bar{\tau}(t)\circ\bar{\tau}(t) ={\mathrm{e}}^{\sum\limits_{i=1}y_iD_i}\bar{\tau}(t)\circ\bar{\tau}(t),\label{mhirota:a}\\ &{\mathrm{e}}^{\sum\limits_{i=1}y_iD_i}(\bar{\rho}(t)\circ\bar{\sigma}(t)-\bar{\sigma}(t)\circ\bar{\rho}(t)) =\sum\limits_{j=0}p_j(-2y)p_j(2\tilde{D}) {\mathrm{e}}^{\sum\limits_{n=1}y_nD_n} \bar{\tau}(t)\circ\bar{\tau}_z(t) \nonumber\\ &-(\partial_z\log\bar{\tau}(t-y))\sum\limits_{j=0}p_j(-2y)p_j(2\tilde{D}) {\mathrm{e}}^{\sum\limits_{n=1}y_n D_n}\bar{\tau}(t)\circ\bar{\tau}(t),\label{mhirota:b}\\ &{\mathrm{e}}^{\sum\limits_{i=1}y_iD_i}(2\bar{\tau}(t)\circ\bar{\sigma}(t)-\bar{\sigma}(t)\circ\bar{\tau}(t)) =\sum\limits_{j=0}p_j(-2y)p_j(2\tilde{D}) {\mathrm{e}}^{\sum\limits_{n=1}y_n D_n} \bar{\sigma}(t)\circ\bar{\tau}(t),\label{mhirota:c}\\ &{\mathrm{e}}^{\sum\limits_{i=1}y_iD_i}(2\bar{\tau}(t)\circ\bar{\rho}(t)-\bar{\rho}(t)\circ\bar{\tau}(t)) =\sum\limits_{j=0}p_j(-2y)p_j(2\tilde{D}) {\mathrm{e}}^{\sum\limits_{n=1}y_nD_n} \bar{\rho}(t)\circ\bar{\tau}(t).\label{mhirota:d}\end{aligned}$$ where $\tilde{D}=(D_1,\frac{D_3}{3},\frac{D_5}{5},\cdots)$, $p_j(t)$ are Schur polynomials defined as $p_j(t)=\sum\limits_{||\alpha||=j}\frac{t^\alpha}{\alpha !}$, whose generating function in general case is given by ${\mathrm{e}}^{\sum\limits_{i=1}^{\infty}t_i\lambda^i} =\sum\limits_{j=0}^{\infty}p_j(t)\lambda^j,$ where $\alpha=(\alpha_1,\alpha_3,\cdots),||\alpha||=\sum\limits_{i=1}^{\infty}i\alpha_i,\alpha !=\alpha_1 !\cdot\alpha_3 !\cdots,t^\alpha=t_1^{\alpha_1}t_3^{\alpha_3}\cdots$. Then (\[mhirota\]) takes the following form by comparing the powers of $y$ \[mhirota-y\] $$\begin{aligned} &\frac{D^\gamma}{\gamma !}\bar{\tau}(t)\circ\bar{\tau}(t) =\sum\limits_{\alpha+\beta=\gamma}\frac{(-2)^{|\alpha|}}{\alpha ! \beta !}p_{||\alpha||}(2\tilde{D})D^\beta \bar{\tau}(t)\circ\bar{\tau}(t), \label{mhirota-y:a}\\ &\frac{D^\gamma}{\gamma !}(\bar{\rho}(t)\circ\bar{\sigma}(t)-\bar{\sigma}(t)\circ\bar{\rho}(t)) =\sum\limits_{\alpha+\beta=\gamma}\frac{(-2)^{|\alpha|}}{\alpha ! \beta !}p_{||\alpha||}(2\tilde{D})D^\beta \bar{\tau}(t)\circ\bar{\tau}_z(t) \nonumber\\ &-\sum\limits_{\alpha+\beta+\delta=\gamma}\frac{(-2)^{|\alpha|}}{\alpha ! \beta ! \delta !} (\partial_y^\delta\partial_z\log\bar{\tau}(t-y)|_{y=0})p_{||\alpha||}(2\tilde{D})D^\beta\bar{\tau}(t)\circ\bar{\tau}(t),\label{mhirota-y:b}\\ &\frac{D^\gamma}{\gamma !}(2\bar{\tau}(t)\circ\bar{\sigma}(t)-\bar{\sigma}(t)\circ\bar{\tau}(t)) =\sum\limits_{\alpha+\beta=\gamma}\frac{(-2)^{|\alpha|}}{\alpha ! \beta !}p_{||\alpha||}(2\tilde{D})D^\beta \bar{\sigma}(t)\circ\bar{\tau}(t), \label{mhirota-y:c}\\ &\frac{D^\gamma}{\gamma !}(2\bar{\tau}(t)\circ\bar{\rho}(t)-\bar{\rho}(t)\circ\bar{\tau}(t)) =\sum\limits_{\alpha+\beta=\gamma}\frac{(-2)^{|\alpha|}}{\alpha ! \beta !}p_{||\alpha||}(2\tilde{D})D^\beta \bar{\rho}(t)\circ\bar{\tau}(t). \label{mhirota-y:d}\end{aligned}$$ For the case $\gamma=(1,0,0,\cdots)$, the term with $y=(y_1,0,0,\cdots)$ in (\[mhirota-y:b\]) can be written in the following form $$2D_x\tau_z\circ\tau+D_x\sigma\circ\rho=2D_z\tau_x\circ\tau+D_x\sigma\circ\rho =D_xD_z\tau\circ\tau+D_x\sigma\circ\rho=0.$$ [ \[The first type of (2+1)-dimensional Sawada-Kotera equation with a self-consistent source (2d-SKwS-I) [@Hu; @Wu], i.e., the extended BKP hierarchy (\[extended\]) with $n=3$ and $k=5$\] ]{} Notice that from the definition of $\bar{\tau}$, we know that $D_{\bar{t_5}}\bar{\tau}\circ\bar{\tau} =(D_{\bar{t_5}}-D_z)\tau\circ\tau|_{z=z-\bar{t_k}}$. Therefore, the Hirota’s bilinear equations for the 2d-SKwS-I ((\[extended\]) with $n=3$ and $k=5$) can be obtained as \[Hirota-eq:2d-SKwS-I\] $$\begin{aligned} &D_xD_z\tau\circ\tau+D_x\sigma\circ\rho=0, &\text{by (\ref{mhirota-y:b}) in $y_1$,} \label{Hirota-eq:2d-SKwS-I-a}\\ &\left[D_x^6-5D_x^3D_{t_3}+9D_x(D_{\bar{t_5}}-D_z)-5D_{t_3}^2\right] \tau\circ\tau=0, &\text{by (\ref{mhirota-y:a}) in $y_1y_5$,} \label{Hirota-eq:2d-SKwS-I-b}\\ &(D_x^3-D_{t_3})\sigma\circ\tau=0, & \text{by (\ref{mhirota-y:c}) in $y_3$,}\\ &(D_x^3-D_{t_3})\rho\circ\tau=0, & \text{by (\ref{mhirota-y:d}) in $y_3$,}.\end{aligned}$$ [ \[The second type of (2+1)-dimensional Sawada-Kotera equation with a self-consistent source (2d-SKwS-II) [@Wu], i.e., the extended BKP hierarchy (\[extended\]) with $n=5$ and $k=3$\] ]{} The Hirota’s blilinear equations for the 2d-SKwS-II ((\[extended\]) with $n=5$ and $k=3$) can be obtained as \[Hirota-eq:2d-SKwS-II\] $$\begin{aligned} & D_xD_z\tau\circ\tau+D_x\sigma\circ\rho=0, &\text{by (\ref{mhirota-y:b}) in $y_1$,} \\ &[D_x^6-5D_x^3(D_{\bar{t_3}}-D_z)+9D_xD_{t_5}-5(D_{\bar{t_3}}-D_z)^2]\tau\circ\tau=0, &\text{by (\ref{mhirota-y:a}) in $y_1y_5$,}\\ &[D_x^3-(D_{\bar{t_3}}-D_z)]\sigma\circ\tau=0, &\text{by (\ref{mhirota-y:c}) in $y_3$,}\\ &[D_x^3-(D_{\bar{t_3}}-D_z)]\rho\circ\tau=0, &\text{by (\ref{mhirota-y:d}) in $y_3$,}\\ &[D_x^5+5D_x^2(D_{\bar{t_3}}-D_z)-6D_{t_5}]\sigma\circ\tau=0, &\text{by (\ref{mhirota-y:c}) in $y_5$,}\\ &[D_x^5+5D_x^2(D_{\bar{t_3}}-D_z)-6D_{t_5}]\rho\circ\tau=0, &\text{by (\ref{mhirota-y:d}) in $y_5$.}\end{aligned}$$ Back to Nonlinear Equations from Hirota’s Bilinear Equations {#Transformation from Hirota's bilinear to nonlinear form} ============================================================ Following the way given in [@Hirota], we can convert the bilinear equations back to nonlinear PDEs. Consider the following identities, which are easy to prove \[back\] $$\begin{aligned} &{\mathrm{e}}^{\sum\limits_i \delta_iD_i}\rho\circ\tau={\mathrm{e}}^{2\cosh(\sum\limits_i \delta_i\partial_i)\log\tau}{\mathrm{e}}^{\sum\limits_i\delta_i\partial_i}(\rho/\tau),\\ &\cosh(\sum\limits_i \delta_iD_i)\tau\circ\tau={\mathrm{e}}^{2\cosh(\sum\limits_i \delta_i\partial_i)\log\tau}.\end{aligned}$$ Using transformations $u:=2\partial_x^2\log\tau$, $r:=\rho/\tau$, $q:=\sigma/\tau$ and expanding (\[back\]) with respect to $\delta$, we can get the relation between the Hirota bilinear equations and the usual nonlinear form. Here we give two examples. The Hirota’s bilinear equations (\[Hirota-eq:2d-SKwS-I\]) can be translated back to a nonlinear PDEs as $$\begin{aligned} &\partial^{-1}\partial_z u +q_x r-q r_x=0,\\ &u^{(5)}+15u_{x}u^{(2)}+15uu^{(3)}+45u^2u_{x}-5u^{(2)}_{t_3} -15u_{x}(\partial^{-1}u_{t_3})-15uu_{t_3}\nonumber\\ &+9u_{\bar{t_5}}-9u_z-5\partial^{-1}u_{t_3t_3}=0,\\ &q_{t_3}=q_{xxx}+3uq_x,\\ &r_{t_3}=r_{xxx}+3ur_x.\end{aligned}$$ After eliminating variable $z$ from above equations, we get the first type of (2+1)-dimensional Sawada-Kotera equation with a self-consistent source (2d-SKwS-I) [@Hu; @Wu] \[eq:2d-SKwS-I\] $$\begin{aligned} &u_{\bar{t_5}}+\frac{1}{9}u^{(5)}+\frac{5}{3}u_{x}u^{(2)} +\frac{5}{3}uu^{(3)}+5u^2u_{x}-\frac{5}{9}u^{(2)}_{t_3} -\frac{5}{3}u_{x}(\partial^{-1}u_{t_3})-\frac{5}{3}uu_{t_3}\nonumber\\ &-\frac{5}{9}\partial^{-1}u_{t_3t_3}+q_{xx}r-qr_{xx}=0,\\ &q_{t_3}=q_{xxx}+3uq_x,\\ &r_{t_3}=r_{xxx}+3ur_x.\end{aligned}$$ The Hirota’s bilinear equations for the 2d-SKwS-I (\[eq:2d-SKwS-I\]) is given by (\[Hirota-eq:2d-SKwS-I\]), which coincide with the form given in [@Hu] after eliminating variable $z$ by (\[Hirota-eq:2d-SKwS-I-a\]) and (\[Hirota-eq:2d-SKwS-I-b\]). The Hirota’s bilinear equations (\[Hirota-eq:2d-SKwS-II\]) can be translated back to a nonlinear PDEs as $$\begin{aligned} &\partial^{-1}\partial_z u +q_x r-q r_x=0,\\ &u^{(5)}+15u_{x}u^{(2)}+15uu^{(3)}+45u^2u_{x}-5u^{(2)}_{\bar{t_3}} -15u_{x}(\partial^{-1}u_{\bar{t_3}})-15uu_{\bar{t_3}}\\ &+9u_{t_5}+5u_z^{(2)}+15u_{x}\partial^{-1}u_z+15uu_z-5\partial^{-1}(\partial_{\bar{t_3}}-\partial_z)^2u=0,\\ &q_{\bar{t_3}}-q_z=q_{xxx}+3uq_x,\\ &r_{\bar{t_3}}-r_z=r_{xxx}+3ur_x,\\ &q^{(5)}+10uq^{(3)}+5(u_{xx}+3u^2)q_x+5(q_{\bar{t_3}}-q_z)^{(2)}+5u(q_{\bar{t_3}}-q_z)\\ &+10q_x\partial^{-1}u_{\bar{t_3}}-10q_x\partial^{-1}u_z-6q_{t_5}=0,\\ &r^{(5)}+10ur^{(3)}+5(u_{xx}+3u^2)r_x+5(r_{\bar{t_3}}-r_z)^{(2)}+5u(r_{\bar{t_3}}-r_z)\\ &+10r_x\partial^{-1}u_{\bar{t_3}}-10r_x\partial^{-1}u_z-6r_{t_5}=0.\end{aligned}$$ After eliminating variable $z$ and $q_{\bar{t_3}},r_{\bar{t_3}}$, we get the second type of (2+1)-dimensional Sawada-Kotera equation with a self-consistent source (2d-SKwS-II) [@Wu] \[eq:2d-SKwS-II\] $$\begin{aligned} &u_{t_5}+\frac{1}{9}u^{(5)}+\frac{5}{3}u_{x}u^{(2)} +\frac{5}{3}uu^{(3)}+5u^2u_{x}-\frac{5}{9}u^{(2)}_{\bar{t_3}} -\frac{5}{3}u_{x}(\partial^{-1}u_{\bar{t_3}})-\frac{5}{3}uu_{\bar{t_3}} -\frac{5}{9}\partial^{-1}u_{\bar{t_3}\bar{t_3}}\nonumber\\ &=\frac{1}{9}[10q^{(4)}r+5q^{(3)}r_{x}-5q_{x}r^{(3)} -10qr^{(4)}+5(q_{x}r-qr_{x})_{\bar{t_3}}\nonumber\\ &+30u(q^{(2)}r-qr^{(2)})+30u_{x}(q_{x}r-qr_{x})],\\ &q_{t_5}=q^{(5)}+5uq^{(3)}+5u^{'}q^{(2)}+[\frac{10}{3}u^{(2)}+5u^2+\frac{5}{3}\partial^{-1}u_{\bar{t_3}}+\frac{5}{3}(q_xr-qr_x)]q_x,\\ &r_{t_5}=r^{(5)}+5ur^{(3)}+5u^{'}r^{(2)}+[\frac{10}{3}u^{(2)}+5u^2+\frac{5}{3}\partial^{-1}u_{\bar{t_3}}+\frac{5}{3}(q_xr-qr_x)]r_x.\end{aligned}$$ The Hirota’s bilinear equations for the 2d-SKwS-II (\[eq:2d-SKwS-II\]) is given by (\[Hirota-eq:2d-SKwS-II\]). To the best of our knowledge, the Hirota’s bilinear form (\[Hirota-eq:2d-SKwS-II\]) for (\[eq:2d-SKwS-II\]) did not appear in the literatures before. Conclusion and discussions ========================== In this paper, by introducing an auxiliary $\partial_z-$flow, we constructed the bilinear identities (\[res-extented\]) for the extended BKP hierarchy (\[extended\]) introduced in [@Wu]. The bilinear identities (\[res-extented\]) are used to generate all the Hirota’s bilinear equations for the extended BKP hierarchy (\[extended\]). As examples, the bilinear forms for the two types of (2+1)-dimensional Sawada-Kotera equation with a self-consistent source (2d-SKwS-I and 2d-SKwS-II) are derived. The correctness of these bilinear forms are affirmed by translating the bilinear equations back to the nonlinear PDEs. The Hirota’s bilinear equations for the 2d-SKwS-II is given explicitly, which did not appear in the literatures before . It is a very interesting problem to consider the quasi-periodic solutions for the extended BKP hierarchy as we have already obtained its bilinear identities. Another interesting problem is to consider the bilinear identities for some other extended hierarchies, such as 2D Toda, discrete KP, etc. We will investigate these problems in future. Acknowledgement {#acknowledgement .unnumbered} =============== This work is supported by National Natural Science Foundation of China (11471182, 11171175, 11201477). [1]{} H. Aratyn, E. Nissimov, S. Pacheva, Method of squared eigenfunction potentials in integrable hierarchies of KP type, [*Commun. Math. Phys.*]{} [**193**]{} (1998) 493-525. H. Aratyn, E. Nissimov, S. Pacheva, Multi-component matrix KP hierarchies as symmetry-enhanced scalar KP hierarchies and their Darboux-Bäcklund solutions, [*Bäcklund and Darboux transformations*]{}, CRM Proc. Lect. Notes.(Amer. Math. Soc. 2001) 109-120. G. Carlet, B. Dubrovin and Y.J. Zhang, The extended Toda hierarchy, [*Moscow Math. J.*]{} [**4**]{} (2004) 313–332. (`arXiv:nlin/0306060`) J.P. Cheng, J.S. He, S. Hu, The “ghost” symmetry of the BKP hierarchy, [*J. Math. Phys.*]{} [**51**]{} (2010) 053514. Y. Cheng, Constraints of the Kadomtsev-Petviashvili hierarchy, [*J. Math. Phys.*]{} [**33**]{} (1992) 3774-3782. Y. Cheng, Y.J. Zhang, Bilinear equations for the constrained KP hierarchy, [*Inverse Probl. Eng.*]{} [**10**]{} (1994) L11-L17. O. Chvartatskyi, Yu. Sydorenko, Darboux transformations for (2+1)-dimensional extenseions of the KP hierarchy, [*SIGMA*]{}, [**11**]{} (2015) 028. E. Date, M. Jimbo, M. Kashiwara, T. Miwa, Transformation groups for soliton equations: IV. A new hierarchy of soliton equations of KP-type [*Physica D*]{} [**4**]{} (1982) 343-365 E. Date, M. Jimbo, M. Kashiwara, T.Miwa, Transformation groups for soliton equations, [*Nonlinear integrable systems–classical theory and quantum theory*]{}, (Kyoto 1981), (World Scientific, Singapore, 1983) 39-119. L.A. Dickey, [*Soliton equations and Hamiltonian systems*]{}, (World Scientific, Singapore, 2003). A. Dimakis, F. Müller-Hoissen, Extension of Moyal-deformed hierarchies of soliton equations, [*XI International Conference Symmetry Methods in Physics*]{}, (C. Burdik, O. Novratil and S. Posta, 2004). (`arXiv:nlin/0408023`) A. Dimakis and F. Müller-Hoissen, Explorations of the extended ncKP hierarchy, [*J. Phys. A: Math. Gen.*]{} [**37**]{} (2004) 10899–10930. (`arXiv:hep-th/0406112`) A. Doliwa, R.L. Lin, Discrete KP equation with self-consistent sources, [*Phys. Lett. A*]{} [**378**]{} (2014) 1925-1931. P.G. Grinevich and I.A. Taimanov, Spectral conservation laws for periodic nonlinear equations of the Melnikov type, [*Amer. Math. Soc. Transl.*]{} [**224(2)**]{} (2008) 125–138. (`arXiv:0801.4143`) R. Hirota, [*The direct method in soliton theory*]{}, (Cambridge University Press, Cambridge, 2004). X.B. Hu, H.Y. Wang, Construction of dKP and BKP equations with self-consistent soureces, [*Inverse Probl.*]{} [**22**]{} (2006) 1903-1920. X.B. Hu, H.Y. Wang, New type of Kadomtsev-Petviashvili equation with self-consistent sources and its bilinear Bäcklund transformation, [*Inverse Probl.*]{} [**23**]{} (2007) 1433-1444. M. Kamata, A. Nakamula, Riemann Liouville integrals of fractional order and extended KP hierarchy, [*J. Phys. A: Math. Gen.*]{} [**35**]{} (2002) 9657-9670. C.Z. Li, J.S. He, K. Wu and Y. Cheng, Tau function and Hirota bilinear equations for the extended bigraded Toda Hierarchy, [*J. Math. Phys.*]{} [**50**]{} (2010) 043514. (`arXiv:0906.0624`) R.L. Lin, Y.B. Zeng and W.X. Ma, Solving the KdV hierarchy with self-consistent sources by inverse scattering method, [*Physica A*]{} [**291**]{} (2001) 287–298. R.L. Lin, H.S. Yao and Y.B. Zeng, Restricted flows and the soliton equation with self-consistent sources, [*SIGMA*]{} [**2**]{} (2006) 096. (`arXiv:nlin/0701003`) R.L. Lin, H. Peng and M. Manas, The $q$-deformed mKP hierarchy with self-consistent sources, Wronskian solutions and solitons, [*J. Phys. A: Math. Theor.*]{} [**43**]{} (2010) 434022. (`arXiv:1005.3878`) R.L. Lin, X.J. Liu, Y.B. Zeng, Bilinear identities and Hirota’s bilinear forms for an extended Kadomtsev-Petviashvili hierarchy, [*J. Nonlinear Math. Phys.*]{} [**20**]{}(2) (2013) 214-228. X.J. Liu, Y.B. Zeng, R.L. Lin, A new extended KP hierarchy, [*Phys. Lett. A*]{} [**372**]{} (2008) 3819-3823. I. Loris, R. Willox, Bilinear form and solutions of the $k$-constrained Kadomtsev-Petiashvili hierarchy, [*Inverse Probl.*]{} [**13**]{} (1997) 411-420. I. Loris, R. Willox, Symmetry reductions of the BKP hierarchy, [*J. Math. Phys.*]{} [**40**]{} (1999) 1420-1431. V.K. Mel’nikov, On equations for wave interactions, [*Lett. Math. Phys.*]{} [**7**]{} (1983) 129–136. V.K. Mel’nikov, Interaction of solitary waves in the system described by the Kadomtsev-Petviashvili equation with a self-consistent source, [*Commun. Math. Phys.*]{} [**126**]{} (1989) 201–215. T.E. Milanov, Hirota quadratic equations for the extended Toda hierarchy, [*Duke Math. J.*]{} [**138**]{} (2007) 161–178. (`arXiv:math/0501336`) W. Oevel, W. Schief, Squared eigenfunctions of the (modified) KP hierarchy and scattering problems of Loewner type, [*Rev. Math. Phys.*]{} [**6**]{} (1994) 1301-1338. R. Willox, M. Hattori, Discretisations of constrained KP hierarchies, (`arXiv:1406.5828`). H.F. Shen, M.H. Tu, On the constrained B-type Kadomtsec-Petviashvili hierarchy: Hirota bilinear equations and Virasoro symmetry, [*J. Math. Phys.*]{} [**52**]{} (2011) 032704. H.F. Shen, N.C. Lee, M.H. Tu, Operator approach to solutions of the constrained BKP hierarchy, [*J. Phys. A: Math. Theor.*]{} [**44**]{} (2011) 135205. K. Takasaki, Two extensions of 1D Toda hierarchy, [*J. Phys. A: Math. Theor.*]{} [**43**]{} (2010) 434032. (`arXiv:1002.4688`) H.X. Wu, X.J. Liu, Y.B. Zeng, Two new multi-component BKP hierarchies, [*Commun. Theor. Phys.*]{} [**51**]{} (2009) 193-199. C.S. Xiong, The generalized KP hierarchy, [*Lett. Math. Phys.*]{} [**36**]{} (1996) 223-229. [^1]: corresponding author, e-mail: [email protected] [^2]: e-mail: [email protected] [^3]: e-mail: [email protected] [^4]: e-mail: [email protected]
Mid
[ 0.6552631578947361, 31.125, 16.375 ]
VIC-20: Sky-Ape-Er code dissection – part 5 The theory so far… When we last left off, I had just described my theory about how my prototype Sky-Ape-Er game loaded as just one file which contained a custom character set — without being contained in DATA statements or anywhere in the BASIC code. My theory was that I modified BASIC’s “start of variables” pointer (which normally points to just past the end of the BASIC code) so it was after the memory where the custom characters were stored. When saved, the file would contain the entire range of memory including those custom characters. When the program was LOADed and ran, the first thing it had to do was set the “start of variables” pointer back to where it needed to be, just after the BASIC code. Today I want to test that theory by trying to create a standalone BASIC program that contains custom character set data. I am going to use the excellent CBM prg Studio development environment to make a BASIC project that will have three things: A custom character set. I will use the editor to export the characters out as DATA statements into a BASIC file. That new file will be turned in to a program that will READ the DATA statements and POKE the values into RAM memory. Finally, I will have a simple test program that will do the necessary POKEs to enable RAM characters and animate them. Since I haven’t owned a VIC-20 since 1983, I am going to do all of this in the VICE VIC-20 emulator. To do it like I did it back in 1982, I am going to use a virtual cassette tape for program storage. I could probably do this easier using an emulated disk drive, but never had a disk drive on my VIC-20 and I want to keep this as virtually real as possible. Except for the whole part of using a Mac and virtual PC for development, of course. Step 1: Custom characters and loader program. Using CBM prg Studio’s character set editor, I created a few custom characters: VIC-20 custom character set test in CBM prg Studio. I then used the “Character Set -> Export -> To Listing” option to output the DATA statements containing those characters. I then added the following code to load the DATA statements into memory, and display them to verify they work. Lines 4 and 6 – These POKEs are used to protect the characters in memory so BASIC will not override them. They set the highest memory location that BASIC and strings can use. I set them to 7168, the address where the custom characters load. Line 10 to 20 – FOR/NEXT loop of READ and POKE the first 8 bytes where character RAM will be. This is where the “@” symbol is (character 0). Line 30 to 35 – These POKEs clear out the “space” character in the custom character set. I do this so my DATA statements don’t have to contain all the characters up to space. Line 40 to 55 – Clear screen then print reverse text (which will still show up even after we switch to RAM character mode) and the custom characters. Line 60 – Set VIC chip to use RAM starting at 7168 for custom characters. At this point, the screen will show my custom characters, and the reverse video should appear as normal text. Line 65 and 70 – Wait for key to be pressed. Line 75 – Set VIC chip to use normal ROM area for characters. Line 80 – Print the two bytes that represent the last memory location used by the character set. These will be POKEd into 45 and 46 before SAVING the demo program later. Line 85 – End. Line 1000 to 1110 – Each line has eight bytes that make up a custom character. Here is what it looks like when it runs: VIC-20 custom character set demo. Then when you press enter, it disables the custom characters and you will see it says “CHAR:” in reverse view with letters a-i and @ where the custom characters were. It then prints two numbers, which I need to write down. Those numbers represent the address of the end of the custom characters my test program uses. I will build this into a “.prg” file, and then load that into VICE. Next, I will “Create and attach an empty tape image” (I called mine “Custom Char Demo.tap“) and then save this loader program to that virtual tape: SAVE "CHAR SET LOAD" Step 2: Program to use the custom characters. The next part will be a standalone program that will make use of these characters. I am creating a simple demo where spinning bricks fall from the sky and a player character on a sidewalk below has to dodge them. Except nothing happens if a brick hits the player because this is just a demo. Here is what it is doing… Actually, I’ll skip the demo logic and just mention a few important things: Line 1000 – This prints the programs’ current end (start of variables). Since I need the program to restore this when it loads (after being saved with the custom characters), I can load this program and “RUN 1000” to get those values. I then change the POKEs in line 2 to match those values. Thus, when the real program is loaded, it will fix those pointers which will get messed up by the SAVE process. Thus, I would load this program into memory (but NOT run it) and do “RUN 1000” and note those numbers. I changed the POKEs on line 2 to match those values. Then I saved this after the “CHAR SET TEST” program as: SAVE "CHAR SET TEST" Step 3: Save the all-in-one test and charset file. Now I reset the virtual VIC and rewind the virtual tape. Here are the steps: LOAD and RUN the “CHAR SET LOAD” program to get the character set in memory. I make a note of the two numbers printed out at the end. LOAD (but DO NOT run) the “CHAR SET TEST” program. With the TEST program in memory, I do the following POKEs to change the end of BASIC pointer:POKE 45,X:POKE 46,Y…where X is the first number the loader program printed and Y is the second number the loader program printed. I now can SAVE the test program and it should save all of the BASIC and continue saving until it gets to the end of RAM. SAVE "CHAR SET DEMO" Step 4: Test! After a reboot, and rewind of the virtual tape, I try loading the “CHAR SET DEMO” program and running it… VIC-20 error when loading my character set demo program. Oh no! My theory is not correct. Something is still wrong. Running this program produces parts of the custom character, but not all. It’s clear I am off somewhere. Post navigation 6 thoughts on “VIC-20: Sky-Ape-Er code dissection – part 5” Haven’t tried it myself, but what happens when basic runs out of variable space? Can load even display the file name string or does basic need room for a temporary string? As you only use a few user defined chars, and not the total possible 64 with that memory configuration, you might want to set end of basic and start of variables just after the last actually used user defined char (char33, screen code 32, space?) so basic at least has about 120 bytes for temporary string storage. Don’t forget to do a CLR. In the program that uses the chars you probably need to poke the start of variables and possible do a clr before you also poke the top of variable / string space and do a second clr, just to make sure there is always free space for any temporary stuff. Maybe poke can do with two constants without any such temp space though – not sure where poke stores it’s address while it converts the second parameter to binary – probably somewhere in zero page so the cpu can do a zero page indirect address mode thing. I considered this. My character set data loader prints a value at the end which is the last character, then I POKE to that (I may need to update my article text). It starts variables and still has room. But, what about strings? I wouldn’t think it would save any pointers to strings with the program since they don’t exist until runtime. It only needs to know start and end of the program then it runs and initializes from there. I made one that worked early on, then started writing about it and cannot remember what step I missed. P.S. just came to think about another thing: Instead of the classic read-data loop with data statements, you might point the kernal screen editor to the user defined graphics area and use print to form the data. As print (with rvs on and rvs off) can output all 256 possible screen codes, it must be able to write any binary data to ram. That seems far more space and speed efficient than the read-data loop. With read-data look each entry has to be 1-4 bytes (if a blank is allowed as a 0, otherwise 2-4 bytes) while print would use 1-2 bytes (2 bytes each time the high bit differs between two consecutive “chars”, otherwise 1 byte), and of course printing strings is far faster than a read-poke-loop. interesting ideas. I could do the same self modifying code to get the data within the quotes, but can all characters be used? There has to be a delimiter to know when the quoted string ends, yes? I did see POKEs that change where it outputs, so making those go somewhere else looks easy to do. Totally forgot that you can’t write a quote mark any other way than using CHR$, and that is true both for inverted and non inverted quotation marks. So those would take up quite a few more bytes. Every other byte should be printable though. As there are 256 petscii codes but only 128 screen codes plus 128 inverted screen codes, there are enough petscii codes to have all the formatting “chars” like CR, CLR, HOME, color, RVS ON/OFF and so on without interfering with the ability to print all chars. Had inverted chars been a part of some attribute memory, like on a PC, you would had ran out of possible codes, which is what happens on a PC (where you can’t print the first chars using for example print in basic).
Mid
[ 0.5907172995780591, 35, 24.25 ]
// // ByteOrderTest.cpp // // Copyright (c) 2004-2006, Applied Informatics Software Engineering GmbH. // and Contributors. // // SPDX-License-Identifier: BSL-1.0 // #include "ByteOrderTest.h" #include "CppUnit/TestCaller.h" #include "CppUnit/TestSuite.h" #include "Poco/ByteOrder.h" using Poco::ByteOrder; using Poco::Int16; using Poco::UInt16; using Poco::Int32; using Poco::UInt32; #if defined(POCO_HAVE_INT64) using Poco::Int64; using Poco::UInt64; #endif ByteOrderTest::ByteOrderTest(const std::string& name): CppUnit::TestCase(name) { } ByteOrderTest::~ByteOrderTest() { } void ByteOrderTest::testByteOrderFlip() { { Int16 norm = (Int16) 0xAABB; Int16 flip = ByteOrder::flipBytes(norm); assert (UInt16(flip) == 0xBBAA); flip = ByteOrder::flipBytes(flip); assert (flip == norm); } { UInt16 norm = (UInt16) 0xAABB; UInt16 flip = ByteOrder::flipBytes(norm); assert (flip == 0xBBAA); flip = ByteOrder::flipBytes(flip); assert (flip == norm); } { Int32 norm = 0xAABBCCDD; Int32 flip = ByteOrder::flipBytes(norm); assert (UInt32(flip) == 0xDDCCBBAA); flip = ByteOrder::flipBytes(flip); assert (flip == norm); } { UInt32 norm = 0xAABBCCDD; UInt32 flip = ByteOrder::flipBytes(norm); assert (flip == 0xDDCCBBAA); flip = ByteOrder::flipBytes(flip); assert (flip == norm); } #if defined(POCO_HAVE_INT64) { Int64 norm = (Int64(0x8899AABB) << 32) + 0xCCDDEEFF; Int64 flip = ByteOrder::flipBytes(norm); assert (flip == (Int64(0xFFEEDDCC) << 32) + 0xBBAA9988); flip = ByteOrder::flipBytes(flip); assert (flip == norm); } { UInt64 norm = (UInt64(0x8899AABB) << 32) + 0xCCDDEEFF; UInt64 flip = ByteOrder::flipBytes(norm); assert (flip == (UInt64(0xFFEEDDCC) << 32) + 0xBBAA9988); flip = ByteOrder::flipBytes(flip); assert (flip == norm); } #endif } void ByteOrderTest::testByteOrderBigEndian() { #if defined(POCO_ARCH_BIG_ENDIAN) // // big-endian systems // { Int16 norm = 4; Int16 flip = ByteOrder::toBigEndian(norm); assert (norm == flip); } { UInt16 norm = 4; UInt16 flip = ByteOrder::toBigEndian(norm); assert (norm == flip); } { Int32 norm = 4; Int32 flip = ByteOrder::toBigEndian(norm); assert (norm == flip); } { UInt32 norm = 4; UInt32 flip = ByteOrder::toBigEndian(norm); assert (norm == flip); } #if defined(POCO_HAVE_INT64) { Int64 norm = 4; Int64 flip = ByteOrder::toBigEndian(norm); assert (norm == flip); } { UInt64 norm = 4; UInt64 flip = ByteOrder::toBigEndian(norm); assert (norm == flip); } #endif { Int16 norm = 4; Int16 flip = ByteOrder::fromBigEndian(norm); assert (norm == flip); } { UInt16 norm = 4; UInt16 flip = ByteOrder::fromBigEndian(norm); assert (norm == flip); } { Int32 norm = 4; Int32 flip = ByteOrder::fromBigEndian(norm); assert (norm == flip); } { UInt32 norm = 4; UInt32 flip = ByteOrder::fromBigEndian(norm); assert (norm == flip); } #if defined(POCO_HAVE_INT64) { Int64 norm = 4; Int64 flip = ByteOrder::fromBigEndian(norm); assert (norm == flip); } { UInt64 norm = 4; UInt64 flip = ByteOrder::fromBigEndian(norm); assert (norm == flip); } #endif #else // // little-endian systems // { Int16 norm = 4; Int16 flip = ByteOrder::toBigEndian(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } { UInt16 norm = 4; UInt16 flip = ByteOrder::toBigEndian(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } { Int32 norm = 4; Int32 flip = ByteOrder::toBigEndian(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } { UInt32 norm = 4; UInt32 flip = ByteOrder::toBigEndian(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } #if defined(POCO_HAVE_INT64) { Int64 norm = 4; Int64 flip = ByteOrder::toBigEndian(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } { UInt64 norm = 4; UInt64 flip = ByteOrder::toBigEndian(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } #endif { Int16 norm = 4; Int16 flip = ByteOrder::fromBigEndian(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } { UInt16 norm = 4; UInt16 flip = ByteOrder::fromBigEndian(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } { Int32 norm = 4; Int32 flip = ByteOrder::fromBigEndian(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } { UInt32 norm = 4; UInt32 flip = ByteOrder::fromBigEndian(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } #if defined(POCO_HAVE_INT64) { Int64 norm = 4; Int64 flip = ByteOrder::fromBigEndian(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } { UInt64 norm = 4; UInt64 flip = ByteOrder::fromBigEndian(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } #endif #endif } void ByteOrderTest::testByteOrderLittleEndian() { #if defined(POCO_ARCH_LITTLE_ENDIAN) // // big-endian systems // { Int16 norm = 4; Int16 flip = ByteOrder::toLittleEndian(norm); assert (norm == flip); } { UInt16 norm = 4; UInt16 flip = ByteOrder::toLittleEndian(norm); assert (norm == flip); } { Int32 norm = 4; Int32 flip = ByteOrder::toLittleEndian(norm); assert (norm == flip); } { UInt32 norm = 4; UInt32 flip = ByteOrder::toLittleEndian(norm); assert (norm == flip); } #if defined(POCO_HAVE_INT64) { Int64 norm = 4; Int64 flip = ByteOrder::toLittleEndian(norm); assert (norm == flip); } { UInt64 norm = 4; UInt64 flip = ByteOrder::toLittleEndian(norm); assert (norm == flip); } #endif { Int16 norm = 4; Int16 flip = ByteOrder::toLittleEndian(norm); assert (norm == flip); } { UInt16 norm = 4; UInt16 flip = ByteOrder::toLittleEndian(norm); assert (norm == flip); } { Int32 norm = 4; Int32 flip = ByteOrder::toLittleEndian(norm); assert (norm == flip); } { UInt32 norm = 4; UInt32 flip = ByteOrder::toLittleEndian(norm); assert (norm == flip); } #if defined(POCO_HAVE_INT64) { Int64 norm = 4; Int64 flip = ByteOrder::toLittleEndian(norm); assert (norm == flip); } { UInt64 norm = 4; UInt64 flip = ByteOrder::toLittleEndian(norm); assert (norm == flip); } #endif #else // // little-endian systems // { Int16 norm = 4; Int16 flip = ByteOrder::toLittleEndian(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } { UInt16 norm = 4; UInt16 flip = ByteOrder::toLittleEndian(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } { Int32 norm = 4; Int32 flip = ByteOrder::toLittleEndian(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } { UInt32 norm = 4; UInt32 flip = ByteOrder::toLittleEndian(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } #if defined(POCO_HAVE_INT64) { Int64 norm = 4; Int64 flip = ByteOrder::toLittleEndian(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } { UInt64 norm = 4; UInt64 flip = ByteOrder::toLittleEndian(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } #endif { Int16 norm = 4; Int16 flip = ByteOrder::fromLittleEndian(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } { UInt16 norm = 4; UInt16 flip = ByteOrder::fromLittleEndian(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } { Int32 norm = 4; Int32 flip = ByteOrder::fromLittleEndian(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } { UInt32 norm = 4; UInt32 flip = ByteOrder::fromLittleEndian(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } #if defined(POCO_HAVE_INT64) { Int64 norm = 4; Int64 flip = ByteOrder::fromLittleEndian(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } { UInt64 norm = 4; UInt64 flip = ByteOrder::fromLittleEndian(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } #endif #endif } void ByteOrderTest::testByteOrderNetwork() { #if defined(POCO_ARCH_BIG_ENDIAN) // // big-endian systems // { Int16 norm = 4; Int16 flip = ByteOrder::toNetwork(norm); assert (norm == flip); } { UInt16 norm = 4; UInt16 flip = ByteOrder::toNetwork(norm); assert (norm == flip); } { Int32 norm = 4; Int32 flip = ByteOrder::toNetwork(norm); assert (norm == flip); } { UInt32 norm = 4; UInt32 flip = ByteOrder::toNetwork(norm); assert (norm == flip); } #if defined(POCO_HAVE_INT64) { Int64 norm = 4; Int64 flip = ByteOrder::toNetwork(norm); assert (norm == flip); } { UInt64 norm = 4; UInt64 flip = ByteOrder::toNetwork(norm); assert (norm == flip); } #endif { Int16 norm = 4; Int16 flip = ByteOrder::fromNetwork(norm); assert (norm == flip); } { UInt16 norm = 4; UInt16 flip = ByteOrder::fromNetwork(norm); assert (norm == flip); } { Int32 norm = 4; Int32 flip = ByteOrder::fromNetwork(norm); assert (norm == flip); } { UInt32 norm = 4; UInt32 flip = ByteOrder::fromNetwork(norm); assert (norm == flip); } #if defined(POCO_HAVE_INT64) { Int64 norm = 4; Int64 flip = ByteOrder::fromNetwork(norm); assert (norm == flip); } { UInt64 norm = 4; UInt64 flip = ByteOrder::fromNetwork(norm); assert (norm == flip); } #endif #else // // little-endian systems // { Int16 norm = 4; Int16 flip = ByteOrder::toNetwork(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } { UInt16 norm = 4; UInt16 flip = ByteOrder::toNetwork(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } { Int32 norm = 4; Int32 flip = ByteOrder::toNetwork(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } { UInt32 norm = 4; UInt32 flip = ByteOrder::toNetwork(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } #if defined(POCO_HAVE_INT64) { Int64 norm = 4; Int64 flip = ByteOrder::toNetwork(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } { UInt64 norm = 4; UInt64 flip = ByteOrder::toNetwork(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } #endif { Int16 norm = 4; Int16 flip = ByteOrder::fromNetwork(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } { UInt16 norm = 4; UInt16 flip = ByteOrder::fromNetwork(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } { Int32 norm = 4; Int32 flip = ByteOrder::fromNetwork(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } { UInt32 norm = 4; UInt32 flip = ByteOrder::fromNetwork(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } #if defined(POCO_HAVE_INT64) { Int64 norm = 4; Int64 flip = ByteOrder::fromNetwork(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } { UInt64 norm = 4; UInt64 flip = ByteOrder::fromNetwork(norm); assert (norm != flip); flip = ByteOrder::flipBytes(flip); assert (norm == flip); } #endif #endif } void ByteOrderTest::setUp() { } void ByteOrderTest::tearDown() { } CppUnit::Test* ByteOrderTest::suite() { CppUnit::TestSuite* pSuite = new CppUnit::TestSuite("ByteOrderTest"); CppUnit_addTest(pSuite, ByteOrderTest, testByteOrderFlip); CppUnit_addTest(pSuite, ByteOrderTest, testByteOrderBigEndian); CppUnit_addTest(pSuite, ByteOrderTest, testByteOrderLittleEndian); CppUnit_addTest(pSuite, ByteOrderTest, testByteOrderNetwork); return pSuite; }
Low
[ 0.527233115468409, 30.25, 27.125 ]
# Sieve filter discard;
Low
[ 0.495594713656387, 28.125, 28.625 ]
export * from './application-protocol'; export * from './application-error';
Low
[ 0.49557522123893805, 28, 28.5 ]
Bartolmeu Sofa 17 Stories Imagine you would like to enjoy a relaxing meal under a big Bartolmeu Sofa. How irritating it could be when you can not really fit one table underneath just because on the annoying pole that is always there in the center. We'd love to present the counter patio umbrellas. With these in hands, anybody could simply do away with this frustration because they give side rod, instead of the one at the middle. In cases like this, you won't have to drill a hole on your desk anymore just to put it underneath an umbrella. In any case, there are a lot more which the Bartolmeu Sofa may be beneficial to you personally. If you're considering having one, you're at the ideal location. {Below are the reviews of most popular Bartolmeu Sofa this season. List Of The Best leather sofas In 2019 1. Borger 3 Piece Reclining Living Room Set Red Barrel Studio When it comes to buying living room furniture, leather is definitely a good choice. Not only does it look good with many designs, nevertheless its extremely durable (its the ideal materials for a household with children or pets) and it is ultra-simple to clean, as well. The downside of leather furniture? It may have a higher cost than material, micro-fiber or fake leather Borger 3 Piece Reclining Living Room Set Red Barrel Studio. This lying loveseat remains a budget-pleasant option due to 1 genius technique: its sitting area is padded with leather-based, while the sides are padded with increased affordable faux leather. That means you get the appear and feel of the complete leather-based loveseat without the hefty price tag. Use the lever around the loveseats equip to relax and relax on its higher-density froth filling, and consider all the money held on. This particular loveseat posseses an additional bonus: professional assembly is available in numerous locations of the country for an additional charge. 2. Borger 3 Piece Reclining Living Room Set Red Barrel Studio Puffy, overstuffed loveseat soft cushions arent your thing? This lying loveseat from GDF has sharper, cleaner outlines than your traditional lying loveseat, making it an elegant addition to a middle-century modern, modern, modern or modern type of home. And, at just 46.46 inches wide, its easy to squeeze into an inferior room, like flats, dog dens or office spaces. Obtainable in several colour and material choices, such as grilling with charcoal fabric, navy blue material and slate micro-fiber, its simple to find the perfect complement for your home decorations, and the durability your family needs for everyday use. The days are gone of excellent-looking, but uncomfortable furniture you no longer need to give up comfort for style. This lying loveseat features a big, gentle, plush-stuffed seat cushion with enough space for two or enough room for you to disseminate and unwind. 3. Borger 3 Piece Reclining Living Room Set Red Barrel Studio This set comes with the entire power of Sleeper Couch by having an exemplary sofa style. It includes tight arms, company seat cushions and complete-size sleeping pad with internal springs. It is eliminated beneath to clean it and take away it having a easy lifting device. This mat is strengthened having a sturdy steel edge. is really a measuring rule and has a Bi-collapsing emphasize. One of the worthy items to mention is the convenience! Location this extremely comfortable couch in your comfy living room. Besides providing a natural and stylish air, it provides an attractive character for your site visitors. You may make your companions stay for any fun night of films. The couch has carcasses with blocked edges and fake-completing on its thighs. The soft cushions are, however, modified and can include excellent flexibility. It is wrapped having a thick polyethylene fiber with a drawstring edge. 4. Borger 3 Piece Reclining Living Room Set Red Barrel Studio The Lawson might be called perfect American sofa style. It's comfortable and straightforward: The boxy form is large and characteristically has three back soft cushions as well as three seat soft cushions. The classic Lawson also has A higher back and container-formed soft cushions which have welts at the edges, just like the back pillows. Ideal for snuggling and sleeping, this couch design was designed for Jones Lawson, an American copper mineral tycoon at the change from the hundred years. He wanted a settee that was quite different from the picky Victorian designs which were typical at that time. Current versions from the Lawson can also include wood or metal contained in the hands. Most significantly, this sofa style is the one that will morph its vibe using the textile you select for the furniture. The form is so flexible that it can be attractive, magnificent, industrial, informal or formal depending on your fabric option. 5. Borger 3 Piece Reclining Living Room Set Red Barrel Studio This group of RTA couches is available in various upholstery smoothness. Some of them include bonded leather, bed linen, corduroy, bed linen texture, rayon. You just need to find the correct tapestry in significance for your well balanced requirements. Obtainable materials offer an simple-to-thoroughly clean component. A attribute that implies its versatility to resist drinks and food. The extravagant seat and back again cushions vote in favor of a reducing-advantage appear. The square molded equip that starts just above them improves the elegance. You will find the conveniences and soft designs that hit your entrance. 6. Borger 3 Piece Reclining Living Room Set Red Barrel Studio Coming in at under Dollar300 (plus delivery) and 56 in . wide, our wallet- and space-pleasant choose is ideal for very first flats, playrooms, dens or other small spaces. Because its upholstered with additional strong glued leather, this lying loveseat is much more resistant to stains, rips and holes. Clients explain this lying loveseat as comfortable, stylish and a very good worth. One rater wrote that it was one of the most comfy pieces of furniture shes ever had, while an additional said he couldnt have asked for much more for his money. Fair warning, although: some reviewers stated the furniture on their own loveseats tore effortlessly. Thankfully, the maker has a guarantee for components. Because this loveseat has this type of easy design, it makes a solid base for more personalized dcor items. Then add decorative toss cushions or covers to up its comfortable element, and give a few pops of colour and design. 7. Borger 3 Piece Reclining Living Room Set Red Barrel Studio Serta RTA Copenhagen Selection 61 Loveseat in Marzipan was created especially for little rooms. Nonetheless, you can use it in any room: condo, dorm etc. This set will give you ample assistance. It offers high grade fabric, higher denseness froth pocketed coils, leading-tier rayon dietary fiber, and strong hardwood body. This increases the comfort, sturdiness, and sturdiness of this established. The established also includes an ultra broad back again shoulder straps. The established also includes extra comfy pillows all which makes it more comfortable. Notably, it has softly rounded arms and plush fabric allow it the outstanding appear that suits with any style. The established list small, therefore its easy to move. It features a minor smell that ends as time passes. More importantly, the sofa is extremely simple to construct. It offers the assembling tools and directions. You comfortably commit your cent listen to. It serves the reason. 8. Borger 3 Piece Reclining Living Room Set Red Barrel Studio This established is padded in a push and comfy distinctive cushioned purple velvet. This provides it the amazing comfort and ease that its cherished for. Once again it supports chaise style seating for adequate comfort and ease. Moreover, the nose springtime base adds to the comfort and durability. Additionally, the couch has hardwood structures that increase its toughness and durability. The couch has cushions on both the chair and also the back again. But still, the sofa can change from a seated position to a reclined placement easily. Having said that, simply to repeat, the couch is extremely soft and provides outstanding comfort. 9. Borger 3 Piece Reclining Living Room Set Red Barrel Studio This ultra-stylish, high-sovereign sofa is made to support cutting-advantage lounge innovation. It is created like a 2-item sofa sofa coupled with an attractive lounger. It also provides mobile armrests and beneficial back support. The gorgeous tapestry is finished with darkish false leather, firmly tufted. You can feel comfortable padding with froth within the chair cushions. This ensures a delicate sensation whenever you rest following a monotonous day time. The sofa is strengthened with wooden edge covered with darkish artificial leather-based. Fake tufted leather-based and strong pinus radiata give severe glare. It is a fact that it requires another look because it is more costly than it really seems to be. Talking about size, its huge! This is what provides more stars for this established. The peak can also be remarkable for tall and brief individuals. 10. Borger 3 Piece Reclining Living Room Set Red Barrel Studio This established comes with the complete utility of Person Sofa with an excellent sofa style. It incorporates restricted hands, company seat soft cushions and full-size mat with inner springs. It is eliminated underneath to wash it and remove it having a easy raising device. This mat is reinforced having a sturdy metal advantage. is a measuring rule and it has a Bi-falling apart emphasize. Among the deserving items to mention is the convenience! Place this super comfy sofa inside your comfortable family room. Besides giving an all natural and stylish atmosphere, it gives a beautiful personality to your site visitors. You may make your companions stay for any fun nights movies. The couch has carcasses with obstructed edges and faux-completing on its legs. The soft cushions are, however, modified and include excellent versatility. It is covered with a thick polyethylene fiber having a drawstring advantage. Where to Find Bartolmeu Sofa You might think you could get the same quality of furniture in your Big Box stores but that's not the situation. Put simply, you do not find high-end clothing & apparel in JC Penny. {You would have to go to Dolce & Gabanna or Neiman Marcus for that. Conclusion In conclusion, there are a variety of effective different patio furniture focused on this list. However, this will depend in your design and concept of what you are looking to achieve when finding the right one. If you are looking for any powerful durable set that will not need to move around a great deal, the teams of rattan furniture may well be a wise decision. Should you be looking for mobility and comfort then the single seats will be a much better match for those looking for on the go patio furniture. The final option is if you are looking for a mix of both sturdy and portability, then the seats and models with Absolutely no Gravity may be the best match for you. Visit now, which will fit your unique style, comfort and obtain outside to lastly have that much needed to unwind time.
Low
[ 0.44367816091954004, 24.125, 30.25 ]
Thursday, April 29, 2010 I recently got Fairy Parties by Colleen Mullaney to review. A lot of girls go through a fairy phase. I'm not sure I ever actually got out of it. This book is all about creating a perfect fairy themed party .The introduction is only a couple of pages, explaining the basics and a bit of the history of fairies. The chapters are separated by fairy types and the instructions and recipes are planned for a party of 6 girls. The range of fairy types should suit any girl who loves fairies.It's not all pink and froth or wild woods, there are some great variations and ideas. Each chapter has costume instructions including a skirt, a top,decorated shoes and a wand. The chapters also have game suggestions, a craft or two, and recipes to fit the theme. The first chapter, Fairy Sweet is a confection of pink, froth and so very feminine. The drink is a pink punch decorated with sparkling pink decorator's sugar and the costumes are very flowery. The second theme is Sugar Plum Fairies, a purple theme with fruity drinks and tarts and a lot of sparkle. Rainbow Flower Fairies is a multicolor summery party, and where the first two chapters had decorated ballet slippers, this one has decorated sneaker type shoes to suit a garden theme. Fruit kabobs and rainbow parfaits, it's a very colorful party. Fairies Rock is for the Diva Fairy. Think rhinestones and hot pink, feather boas wands and stylish elastic headbands. If Fairy Sweet would thrill your average 5 year old, this one suits older girls. The foods include pizza purses and a pomegranate punch. The last theme is Woodland Fairies. This one is my favorite, and I'm going to adapt some of the ideas adult sized for going to this years Renaissance Fair. It's a good party for outdoorsy girls, and like the Fairies Rock theme, appropriate for girls who are in the tween set. Flower crowns and bare feet with ankles wrapped in ribbons and flowers. The foods are pizza, strawberry punch and a trail mix. The final chapters are a collection of fairy themed crafts and one with more games. Some of the crafts can be done by girls with some adult supervision, but most of them are better done by adults to set up for the party. There are only a few games, but they include instructions for setting up a maypole for little fairies to dance around. You can get Fairy Parties from Chronicle Books or from Amazon.The Amazon link is an affiliate link and helps pay some of the costs of maintaining this site. Another 100 ppi 3x3x1" box. I'm playing with a couple effects and really liked the thorny look so I put a couple wild roses on it and put it on a box. I hope you like it too. Still playing with my new camera and we went back out to Potter's Marsh yesterday because some of the ducks are back. I got this set of 3 pictures that look like they tell a story. All pictures are resized to 50% but otherwise unedited. Click on the images to see the bigger versions. Saturday, April 24, 2010 I make these little tiny printable mini books for fun and you can find a few plus assembly instructions here. This is one I wrote and illustrated yesterday. Here's the story which you can print out to use for a notecard or anything else you might like. If you print it at 200 ppi, you get the tiny version and two copies will print on one page. If you choose 100 ppi, one copy with fit on a page and that makes the larger version. I've seen my miniature books used in earrings, doll houses and other crafty uses. I've done a layout for both 200 ppi and for 100 ppi. Click on the images to download the full sized versions. 200 ppi 100 ppi I hope you like them! I told my husband I wrote a book and made him read it. He said it was very sweet and maybe it needs more plot development which led to a very silly conversation about writing a 32 page children's book and illustrating it, then selling the movie rights and being very disappointed when the movie version had explosions and all sorts of things that weren't in the original story. At which point we concluded that maybe it was best not to develop the story more completely and just leave it where it's at. A little bit of whimsy. Thursday, April 22, 2010 Recently I got a shiny new camera. I've been wanting one for ages (well, last summer?) that I could take pictures of eagles with because my little camera with it's 5x zoom couldn't get more than vaguely eagle colored blobs. I'll admit though, I know very little about the art of photography, aperture settings, ISOs and all that. But I wanted those eagle pictures. It looked like an DSLR was the only way to go, but then hybrid cameras started coming out. The one I have is the Fujifilm FinePix HS10. It's a reasonable price, the lens is all inclusive with 30x zoom so no lens changing to get a nice close up shot. The question becomes, will it work for taking pictures of eagles for someone is keeps mixing up what all those photographer commands do. All of the following pictures were taken using the factory settings and auto-focus. Well, we went out to where we saw the eagles nesting last summer. There were birds to be heard but none to see there but I took a couple pictures of the trees where the eagles were last year. See the arrow? That's the tree the eagles nested in. This picture and the next were resized to 25 percent, but otherwise, I didn't muck with them at all. And this is zoomed all the way. If an eagle were there, I think it would have shown up as an eagle. Not an eagle colored blob. So, I'm impressed. Next question is how will it do for the pictures I need to take for my sites? Well, the current project on my beadwork site is a simple wire cage pendant. This is using the flash from a few inches away. This is simply the best camera I've ever had, and people who really know how to use all the functions are getting simply amazing shots, so it's a good camera for me to learn a lot more about photography with, but still usable while I learn more. This loses a lot of detail in resizing. If you want to see the full sized picture that I took last night, click here. Loving my new camera so much! I'm looking forward to lots of pictures this summer! Monday, April 19, 2010 I've been working on a series of tiny amigurumi for a project my daughter and I are doing together. The basic body will be the same on all of them with different ears and such to make animals of them, and I'll do an e-book when I'm done making them. The elephant and bunny are about 3 inches tall. The mouse was just for fun. It works up very fast and it's about 6 inches long from the tip of it's nose to the end of it's tail. More than half that length is tail. In these patterns, the rounds are joined, not worked in a spiral. Here's the pattern for the mouse! Using worsted weight cotton yarn and a size F hook Decreases are worked by slipping a hook into one stitch, yarn over and pull the loop through just the stitch you're working in, leaving 2 loops on the hook instead of finishing the sc, insert hook in next stitch, yarn over, pull through the stitch, yarn over and pull through all the loops on the hook. Magic loop or chain 2 Round 1: 4 sc in first ch or loop, slip stitch to join Round 2: ch 1 (does not count as first stitch), 2 sc in first st, 1 sc in next st, 2 sc in next st, 1 sc in last st. Slip stitch to join (6 sts) Round 3: ch 1 (does not count as first stitch), sc in each st around, sl st to join Round 4: ch 1 (does not count as first stitch) 2 sc in first st, sc in next 2 sts, 2 sc in next st, sc in next 2 sts, sl st to join (8 sts) Round 5: ch 1 (does not count as first stitch), sc in each st around, sl st to join Put safety eyes in round 4 Round 6: ch 1 (does not count as first stitch), sc in each st around, sl st to join Round 7: ch 1 (does not count as first stitch), sc in each st around, sl st to join Stuff firmly Round 8: ch 1 (does not count as first stitch) work a decrease in each stitch around (4 sts), sl st to join chain 20 then sl st back up the chain. Break yarn off and weave end through the last round of 4 stitches. Ears- Ch 2 or magic loop 6 sc in first ch or loop, sl st to join, break off yarn and sew them on the mouse behind the eyes. This is the background I used for the photo. I used my paper cutter to slice off the margins and taped them together. The trees are just cut out with the bottoms folded at a 90° angle. Click on the images for the 100 ppi printable versions. Friday, April 16, 2010 Blame Rosemary for this. I do. While I was working on the template which is 4 inches high, 1 inch deep and 3 inches wide, I realized it could be use in either orientation. So I did 2 boxes, one that stands tall, one that's flatter. If I used a simple tile fill with a blank spot on it and decorated all the sides, it could be put together either way. Click on the images for the full sized version in 100 ppi. Until April 30th, I'll give the 300 ppi blank template for this box to anyone who buys anything from my Etsy shop since I accidentally posted one item 3 times. Thursday, April 15, 2010 I'm still not completely happy with the proportions, but getting closer and keeping lots of notes which I tend not to do with stuffies so I can re-create them. I've been talking to The Turnip who wants to be a stop motion animator about making a short ami movie using amis I've made. I *think* once I get the proportions right, I'll be able to modify the pattern to have heads that turn and posable short little arms. Wednesday, April 14, 2010 Getting back into Grandma's recipe box, I found this recipe for lemon cups. I remember loving these as a kid. Grandma had a sweet tooth and loved custards and puddings. This was probably the recipe that set up my life long affair with lemon flavored things. Puddings, ices, cookies. I love lemon. She had access to a lemon tree and I'd pick lemons for this and for lemonade. One year my carry on bag on the way back to Alaska was just full of fresh lemons! I miss fresh lemons so much. 5 Tbsp. lemon juice (juice of one lemon with lemon juice added to make 5 Tbsp.) grated rind of 1 lemon- or zest of one lemon. Be careful to avoid the bitter pith 1 1/2 C. milk scalded then cooled to lukewarm Preheat oven to 325°. Butter 8 custard cups and place in a pan of hot water. In a bowl, beat egg whites until they form stiff peaks. In a separate bowl, beat egg yolks well and mix in milk. Beat well so there are no lumps. In another bowl, mix sugar, flour, salt and butter well. Stir in lemon juice and rind. Pour mixture into the egg yolks/milk and mix well. Fold in the egg whites and spoon mixture into custard cups. Bake for 45 minutes. Click on the images for the full sized 100 ppi versions. I hope you enjoy this dessert as much as I always have! Tea and Crumpets is a new book by Margaret M. Johnson . It's a collection of recipes from famous tea salons, hotels and restaurants all over Europe It's a gorgeous book for adults who want to impress at tea parties with friends.I love the ritual of tea and snacks in the mid-afternoon with friends and family. The introduction is a little about the history of tea, both as a tradition and the origin of tea and how it spread world wide. There is more tea trivia interspersed through the book. Then you get into the recipes. It's a mouth watering collection of sweet and savory things to serve with tea. From the very traditional cucumber and cream cheese sandwiches which are livened and colored with a bit of arugula to a savory and rich wild mushroom that's flavored with truffle oil, the sandwiches and savories offer a nice selection. Made less petite, many of the recipes would be good packed for a lunch as well. The next chapter is more of what you expect with tea. Crumpets, scones and fruit quick bread recipes as well as instructions for traditional toppings like clotted cream and strawberry preserves. The Irish recipe for fruitcake looks especially wonderful. I think my daughter will enjoy making the chocolate scones because she thinks chocolate improves everything. The next recipe chapter is the largest. Tea time sweets. Shortbread, cakes, mousses and other sorts of sweet treats that are certain to impress guests. The last recipe chapter is the French Art of Tea for when you want something very special and very beautiful. The Creme Caramel Saint-Petersburg is a custard with caramel that anyone who loves flan or creme brulee will appreciate, and I absolutely recommend the chocolate-hazelnut pots de creme. Most of the ingredients are simple to get at a well stocked super-market. The few things that are harder to find, a good specialty shop should carry. Margaret Johnson also has some Irish cookbooks and I think I should get them too. I loved this one and I've been interested in learning more European cooking. You can find this book at the publisher's site, Chronicle Books or from Amazon: Tea and Crumpets (affiliate link) I was talking to a friend who uses a 3 ring binder and page protectors for her recipes instead of using recipe cards. I'm a recipe card user so pages for recipes never occurred to me. These are the first ones I've ever done and I hope you like them! Click on the images for the full size 100 ppi versions. Friday, April 9, 2010 These would make good gift boxes, but I sized them to hold four-five bags of Tazo tea. We drink a lot of herbal tea, and I usually have a couple bags with me in case I'm somewhere that just doesn't have the kinds of tea I like. My husband is crazy for orange teas. Market Spice, Constant Comment and his favorite herbal infusion is the Wild Sweet Orange. If you have any orange flavored tea suggestions, please let me know! Yes, we do have tea balls for loose tea. We just tend to use bags frequently for convenience and consistency. The colorways for this box are inspired by friends of mine. Click on the images for the full size 100 ppi versions. Monday, April 5, 2010 Upcycled Accessories ---> 25 Projects Using Repurposed Plastic by Tracie Lampe is my kind of craft book. Repurposing is always a better idea than sending something off to be recycled and this book is all about fusing plastic bags to make a tough sewable fabric to make accessories out of. The basic process is explained well on the internet, this book takes it up the next step. The author explains how to use different types of plastic and other materials to create some very sophisticated effects, her new directions with the idea will inspire more ideas for most crafters and upcyclers. She also explains how best to paint your new creations and how to sew the plastic. The 25 projects include toys, coasters, wallets and lots of other ideas including patterns for some really neat looking hats. I think my favorite project in the whole book is the Shower Essentials Caddy, it's a waterproof caddy for the shower which would make a great spa type gift for a friend. It's very easily customized to the colors and preferences of whoever you are making it for and utilizes my favorite of the authors techniques. My daughter, who is an avid repurposer, loves the cute silver robot toy which is stuffed with more bags which makes excellent use of scraps too small to work with, it's an adorable blocky robot with a bright red heart. Great book for using with small children as long as you do the fusing and sewing, they can paint the finished items to make special items for family. For teens like my daughter, it's a great thrifty and green alternative for crafting and learning sewing skills. Some of the projects can use the things she finds when we walk in the summer as well, combining upcycling with found art very nicely. I do recommend using a thrift store iron for fusing bags. It's what I do. If you're like me and have been using cloth bags since before it was popular, friends are a great source of plastic bags. You can get the book from MyCraftivityStore or from Amazon by clicking below. The Amazon link is an affiliate link and helps pay some of the costs of maintaining this site. Saturday, April 3, 2010 Currently newish reviews Fiction- not my strong point in reviewing.Blood of the Demon by Diana Rowland, it's a sequel and I do recommend the series so far. You can read my whole review on the link.Silver Bourne by Patricia Briggs. We just got back from Michaels because they had a 30% off total regular price purchases coupon in their email this week. Astoundingly, I spent less than 21 dollars. I got some more yarn to make potholders and such and some more Glossy Accents for bottle cap necklaces.Michaels was clearing out book shaped wooden boxes for 29 cents each so I bought what the had left. The Turnip will probably decorate them. After that, I told Mike I wanted to stop by Value Village. I prefer a lot of the local thrift stores most of the time, but what Value Village has that the rest don't consistently is big bags of fabric remnants for 4.99. The Turnip didn't know we were going specifically to get more fabric for her. She was thrilled. She looked for a minute or two, but my daughter has a definite taste for shiny fabrics and one of the bags had blue satin in it.I got a second bag that had some pieces I could use. I went through my bag, pulled out the pieces I wanted, and gave the rest to her, it included a large piece of a silky synthetic I think will wind up being draped on things and played with more than sewn with. So the house is silent as she's in her room sewing happily.I was happy. I found a Sunset book on making children's play spaces that looks very good. I spent a lot less than I thought I would. Less than 20 at the thrift store. Thursday, April 1, 2010 I have more Easter printables here. This is a new size box. 1.75 inches wide and deep, and 2.5 inches tall. If you like the size, let me know and I'll do more boxes in this size. The inspiration was painted eggs, but the boxes themselves should be pretty all occasion. I hope you like them. Click on the images to get the full sized version and print on cardstock at 100 ppi. There is also the occasional sponsored post. Those are always clearly marked and are my own opinion about the product. I will not endorse any product that I haven't had personal experience with and enjoyed using. The mandalas, boxes and other printable content on this site is my own creation and copyrighted by me, Shala Kerrigan, and meant for personal use. If you would like to license anything, please feel free to email me. My prices are reasonable and that way it's legal. Thank you! The following sites have featured some of my projects, thank you so much! I love Amazon Prime, for low cost fast shipping to Alaska (free if you're in the Continental USA), being able to borrow books including a lot of the ones that are reviewed here, for access to a lot of commercial free music to listen to, and for all the programming that can be streamed for free. It's a great deal for less than the cost of 2 cups of fancy coffee a month. Try a free trial!- Shala
Mid
[ 0.5477272727272721, 30.125, 24.875 ]
Q: trouble loading images to photo album in core data I have a one to many relationship setup in core data A Photo Album can have many images saved to it Every time I create a new photo album the same images are loaded up. I want the user to be able to save different photos to each album I think the problem might be with the predicate when I am trying to load the data but I'm not entirely sure. I'm sorry for posting all this code that might not be relevant but I wanted to post all the code just in case there is something that I'm not seeing that someone else might catch. I would also like to add that when I add the code for the NSPredicate when I click the an album cell no images show up in the collection view but when I comment out the code for the predicate in loadData() the images show up. I have no idea why that is. class ViewController: UIViewController { var fetchedResultsController: NSFetchedResultsController<PhotoAlbum>! var contextApp = (UIApplication.shared.delegate as! AppDelegate).persistentContainer.viewContext var moc:NSManagedObjectContext! = nil @IBOutlet weak var tableView: UITableView! func setupFetchedResultsController() { let fetchRequest:NSFetchRequest<PhotoAlbum> = PhotoAlbum.fetchRequest() let sortDescriptor = NSSortDescriptor(key: "album", ascending: true) fetchRequest.sortDescriptors = [sortDescriptor] fetchedResultsController = NSFetchedResultsController(fetchRequest: fetchRequest, managedObjectContext: contextApp, sectionNameKeyPath: nil, cacheName: nil) fetchedResultsController.delegate = self do { try fetchedResultsController.performFetch() }catch { print(error) } } override func viewDidLoad() { super.viewDidLoad() // Do any additional setup after loading the view, typically from a nib. tableView.delegate = self tableView.dataSource = self setupFetchedResultsController() } override func viewWillAppear(_ animated: Bool) { super.viewWillAppear(animated) setupFetchedResultsController() } @IBAction func createNewAlbum(_ sender: UIBarButtonItem) { presentnewAlbumAlert() } func presentnewAlbumAlert () { let alert = UIAlertController(title: "New Album", message: "Enter a name for this album", preferredStyle: .alert) // Create actions let cancelAction = UIAlertAction(title: "Cancel", style: .cancel, handler: nil) let saveAction = UIAlertAction(title: "Save", style: .default) { [weak self] action in if let name = alert.textFields?.first?.text { self?.addAlbumCell(name: name) } } saveAction.isEnabled = false // Add a text field alert.addTextField { textField in textField.placeholder = "Name" NotificationCenter.default.addObserver(forName: UITextField.textDidChangeNotification, object: textField, queue: .main) { notif in if let text = textField.text, !text.isEmpty { saveAction.isEnabled = true } else { saveAction.isEnabled = false } } } alert.addAction(cancelAction) alert.addAction(saveAction) present(alert, animated: true, completion: nil) } func addAlbumCell(name: String) { let album = PhotoAlbum(context: contextApp) album.album = name do { try contextApp.save() }catch{ print(error) } } func deleteNote(at indexPath: IndexPath) { let albumToDelete = fetchedResultsController.object(at: indexPath) contextApp.delete(albumToDelete) try? contextApp.save() } override func prepare(for segue: UIStoryboardSegue, sender: Any?) { if segue.identifier == "toCollection" { if let indexPath = tableView.indexPathForSelectedRow { let object = fetchedResultsController.object(at: indexPath) (segue.destination as! PhotoViewController).album = object } } } } // MARK: DATASOURCE extension ViewController: UITableViewDataSource { func tableView(_ tableView: UITableView, numberOfRowsInSection section: Int) -> Int { return fetchedResultsController?.sections![section].numberOfObjects ?? 0 } func tableView(_ tableView: UITableView, cellForRowAt indexPath: IndexPath) -> UITableViewCell { let aNewalbum = fetchedResultsController.object(at: indexPath) let cell = tableView.dequeueReusableCell(withIdentifier: "toCollection", for: indexPath) cell.textLabel?.text = aNewalbum.album return cell } } // MARK: DELGEATE extension ViewController : UITableViewDelegate { func numberOfSections(in tableView: UITableView) -> Int { return fetchedResultsController?.sections?.count ?? 1 } } // SETUP NSFetchedResultsControllerDelegate extension ViewController : NSFetchedResultsControllerDelegate { func controller(_ controller: NSFetchedResultsController<NSFetchRequestResult>, didChange anObject: Any, at indexPath: IndexPath?, for type: NSFetchedResultsChangeType, newIndexPath: IndexPath?) { switch type { case .insert: tableView.insertRows(at: [newIndexPath!], with: .fade) case .delete : tableView.deleteRows(at: [indexPath!], with: .fade) default: break } } func controller(_ controller: NSFetchedResultsController<NSFetchRequestResult>, didChange sectionInfo: NSFetchedResultsSectionInfo, atSectionIndex sectionIndex: Int, for type: NSFetchedResultsChangeType) { let indexSet = IndexSet(integer: sectionIndex) switch type { case .insert: tableView.insertSections(indexSet, with: .fade) case .delete : tableView.deleteSections(indexSet, with: .fade) default: break } } func controllerDidChangeContent(_ controller: NSFetchedResultsController<NSFetchRequestResult>) { tableView.beginUpdates() tableView.reloadData() } func controllerWillChangeContent(_ controller: NSFetchedResultsController<NSFetchRequestResult>) { tableView.endUpdates() tableView.reloadData() } } Code for the collection view class PhotoViewController: UIViewController , UICollectionViewDelegate , UICollectionViewDataSource , UICollectionViewDelegateFlowLayout , UIImagePickerControllerDelegate , UINavigationControllerDelegate { var imageDataArray = [Images]() var imageArray = [UIImage]() var managedObjectContext:NSManagedObjectContext! var mySelection:Int? var album: PhotoAlbum! @IBOutlet var collectionView: UICollectionView! @IBAction func addImage(_ sender: Any) { let picker:UIImagePickerController = UIImagePickerController() picker.sourceType = .photoLibrary picker.mediaTypes = UIImagePickerController.availableMediaTypes(for: .photoLibrary)! picker.delegate = self picker.allowsEditing = false self.present(picker, animated: true, completion: nil) } // Setup the collection view func collectionView(_ collectionView: UICollectionView, cellForItemAt indexPath: IndexPath) -> UICollectionViewCell { let cell: imageCollectionViewCell = collectionView.dequeueReusableCell(withReuseIdentifier: "thumbnail", for: indexPath) as! imageCollectionViewCell let imageItem = imageDataArray[indexPath.row] if let presentImage = UIImage(data: (imageItem.images as! Data) ){ cell.chosenImage.image = presentImage mySelection = indexPath.row imageArray.append(presentImage) } return cell } func collectionView(_ collectionView: UICollectionView, numberOfItemsInSection section: Int) -> Int { return imageDataArray.count } func imagePickerController(_ picker: UIImagePickerController, didFinishPickingMediaWithInfo info: [UIImagePickerController.InfoKey : Any]) { if let pickedImage = (info[UIImagePickerController.InfoKey.originalImage] as? UIImage) { picker.dismiss(animated: true) { self.createImageContext(with: pickedImage) self.imageArray.append(pickedImage) } } } // Loading & Saving Images func loadData() { let imageReqeust: NSFetchRequest<Images> = Images.fetchRequest() let predicate = NSPredicate(format: "images.album == %@", album) imageReqeust.predicate = predicate // print(predicate.description) do { imageDataArray = try managedObjectContext.fetch(imageReqeust) self.collectionView.reloadData() }catch { print("Could not load data from database \(error.localizedDescription)") } } func createImageContext( with image: UIImage) { let imageItem = Images(context: managedObjectContext!) imageItem.images = NSData(data: image.jpegData(compressionQuality: 1.0)!) as Data // imageItem.image = NSData(data: UIImageJPEGRepresentation(image, 0.3)!) as Data do { try self.managedObjectContext.save() self.loadData() }catch { print("Could not save data \(error.localizedDescription)") } } // ViewDidLoad override func viewDidLoad() { super.viewDidLoad() collectionView.delegate = self collectionView.dataSource = self managedObjectContext = (UIApplication.shared.delegate as! AppDelegate).persistentContainer.viewContext self.navigationItem.rightBarButtonItem = UIBarButtonItem(barButtonSystemItem: .add, target: self, action: #selector(addImage(_:))) loadData() // Do any additional setup after loading the view. } A: In your second view controller you don’t need to fetch the images from Core data instead you can access them via your album property. imageDataArray = Array(album.images) When saving a new image instance, don’t forget to assign it to the album imageItem.album = self.album
Low
[ 0.475409836065573, 25.375, 28 ]
ABOUT THE MATCH India and New Zealand will play today’s first T20 match, India and New Zealand have played really well in their New Zealand home ground, India has shown a good best performance, Virat Kohli did not dominate Shikhar Dhawan and Rohit Sharma series But despite this, Team India has shown some good performance. Cricket Betting Tips Most of the matches inside the New Zealand T20 Shukla have been played in their home, while India is full of experience playing cricket all over the world, although it will be very difficult to beat New Zealand inside New Zealand for New Zealand for T20 format for Team India. The team is considered very goodMatch Prediction One thing we have to keep in mind is that India’s batsmen are weak to answer the bowling which New Zealand is bowling, although India also has good bowlers, who have been able to prevent New Zealand from making runs Can be enabledCricket Tips Free New Zealand is currently on the sixth spot in the ICC T20 rankings, while India is in second place in the T20 against the two sides, New Zealand’s home ground benefits will be available for power hitting New Zealand will get New Zealand T20 with some good batting line-ups In the first match, India are going to play, while the Indian batsmen in front of the field also face aggressive batting. Gay Online Cricket Betting As far as I think Team India is considered a hot favorite for the T20 series, according to the waiting quotes, if a brother is to search, then the team can apply to India and New Zealand will have to face many difficulties, But Team India is a very experienced team, it will have to struggle for New Zealand to face bowling and batting. Free Cricket Betting Tips PITCH REPORT India vs. New Zealand’s first T20 match will be played inside the World Cricket Ground, where the last ODI was played, batting will not be easy for batting, considering the conditions of being excellent for batting will be very favorable but it will be very t -20 is a fight, the happiness is really different from the fact that the score of 200 will be considered equals Cricket Prediction There is a slight chance of rain for the forecasts during the match but the match will be completed along with it, if it is raining then it will be light but the match can stop for 10 to 15 minutes but we will get the full view of the match. Cbtf Cricket ABOUT THE MATCH Friends, the Big Base League match number 50, Cricket Betting Tips Free which will be played in the Adelaide Oval Cricket Ground, played on February 3, 2019, the 50th match of the Big Base League played between striker and bracelet is very interesting for both the team and the very important Will remain The team that wins this match will play in front of the purse kochadai. Both teams have a golden chance. Match Prediction Both teams are still inside the tournament if any of the three teams have won both of them, then in the semi-final Decide your location The team that wins today is going to play in front of Perth Scorchers, the Perth Scorchers are considered to be the weakest team in the tournament and they are still out of the competition. The show which will be won by the team today, will be a golden chance. Cbtf Cricket To make room inside the table Inside Information Friends’ friend Stryker can be considered as a strong team because he is competing in his home. The address of this ground is very familiar to all the conditions of address striker One thing and we have to keep in mind that the previous match to the Edited Strike was won very well in which both the bowler and the batsmen have performed well Brisbane Heat has a very good batsman, but in order to score quickly, he gets out quickly due to over control if the batsmen do not have to score a good score on the tree, they can handle them very much. Cricket Betting Tips Playing as Adult Striker is playing matches at his home and his bowlers are in very good performance form. PITCH REPORT The match played in the Adelaide Oval, there is no possibility of rain inside this match. The weather is quite clear although the team who won the toss would prefer to bat first. It will be easy to bat first on this ground and it will be very difficult to score runs inside the second innings. Cricket Betting Tips Free This average score of the first batting of the ground is 169, while the second highest innings in the innings is 150, it will be like batting first by winning the toss.
Low
[ 0.505747126436781, 33, 32.25 ]
I moved my mom moved from her home to memory care 2 weeks ago. She was walking just fine. During the assessment for memory care she threw her legs over the arm of her chair to show the "doctors" what great shape she was in. (She never sat like that, ever.) In fact she would get agitated and not sit still during meals and I'd have to remind her to sit down and eat. A few days after moving to memory care she began complaining of hip pain. I told them she's complained about that before, x-rays were done, all was fine, and she hadn't complained about it in over a year. The facility did an x-ray anyway and all was fine. They gave her a wheelchair and pain reliever. Today I got another call. Now mom is refusing to try to walk at all and says the pain is unbelievable. She didn't cry out or moan - just said it's too painful. They gave me the choice of sending her to the hospital (for what?) or having the Dr. check her. I said to have the Dr. check her. I feel like my mom was always a bit of a hypochondriac and liked the attention of doctors. She went to memory care not knowing where she was going or why. She didn't fall, didn't exert herself but suddenly can't walk. I think she thinks she's in a hospital therefore there must be something wrong with her. In fact the first time she complained of the pain to an aide, a nurse was sent in and asked her about the pain and my mom said "What pain? I'm not in pain." My mom thinks her parents are alive. She'd forget to eat and refuse to shower or change and claimed she did all the housework in her house. She has her own reality. Isn't it likely that she could misrepresent pain? She's in an unfamiliar place and she doesn't know why so she feels "pain"? I agree with Army Vet. In any case, could the doctor have PT evaluate her? Just for another set of educated eyes and maybe hands on the possible issue. There are all kinds of hip pains that don't show up on xrays. My mom has intermittent low and middle back pain. The low back is probably from a previously fractured vertebra, and the mid-back is (according to me) simply soft tissue/muscle pain from a weak back and sitting in a chair that really doesn't have customized support. We actually had to go to the ER last winter because of an unspecified but horrendous back pain. Mom had sat in a hideously uncomfortable wooden church pew for about 2.5 hours, then walked briefly to bathroom and church dining room, where she sat for the beginning of the meal in another hideously non-supportive wooden chair. Her back (according to me) went into spasm and she couldn't walk, sit, stand. We had to call the ambulance to get her a stretcher. The EMT's first question was, does she have a history of...I forget, aortic aneurysm maybe. I told them it was Her Back, and could she please go to ER for pain relief. At ER, they'd gotten her in 30 seconds before I got there, and I was not allowed in back with her until after her assessment, which made me pretty disposed to be ticked off. They gave her IV pain med and she relaxed at once. By the grace of God I was able to catch the physician just seconds before he sent an order for blood work. The results would have caused her to be admitted for observation, and she likely would have wound up declining so rapidly that she might never have walked again. Of course it was her back, I even knew exactly what it felt like, and to have to prevent the medical profession from doing harm by merely following their best practises (tests out the wazoo!) is not encouraging. Upshot-- she was let out, she walked to my car, and the rest of the evening was normal-- definitely bed time! She didn't even remember it by the time we got pj's on, possibly by the time we got to my car! Sometimes common sense trumps the doctor, you know? All that to say, I don't think a PT evaluation would harm your mom at all, and it may be quite easy to obtain.In my state, one can self-refer to PT for 12 visits. I don't know what other states this is true of. ETA I think I remember my MIL doing that "throw legs over chair arm" show-off thing! She could barely walk.... She's was fine for 2 weeks after throwing her legs over the chair and was fine for several days after getting to memory care. Anyway they're sending her to the ER because the Dr. wants to be sure they aren't missing anything and they can't get her in to see an orthopedist for 3 weeks. Hi, it is funny that you posted this today. We are dealing with hip pain for my mom. She has a history of some arthritis pain in her hip, so she gets tylenol regularly for that. But, she now is constantly complaining about hip pain. She also is shuffling more now and struggles to get in- and out- of her chair. She has always been very vigorous, so this is new, but seems to be coincident with a pretty significant drop in her cognition. She had a couple of weeks of physical therapy. The physical therapist found no evidence of pain and was impressed with how strong she was. She was discharged from physical therapy because of that. She has had hip xrays, which have shown nothing remarkable. So, my sister and I suspect that she is stuck in a loop: she needs to complain about something, so she complains about her hip. She cannot carry on a conversation, so mentioning her hip is her "go to." It is usually just the phrase "arthritis does not like me" and it seems like she uses it as an excuse for her slower, unsteady gait. She used to complain about her scratchy throat (which never sounded scratchy) and constantly request cough drops. The doctors found no problems with her throat. And, eventually, she quit complaining about that...we assume because she has forgotten about that and is now focusing on her hip. We don't know what else to do since no one has found any evidence of real pain. My mom fell last June at home and had a bad muscle pull. Despite weeks of PT, she still complained to me of “excruciating” pain. Had her checked at the ER, no issues. Saw her doctor, no complaints. But every day, despite Tylenol and Advil, she complained of pain to me. One morning, I saw her wiping crumbs from under her chair in the kitchen. She was able to get down and get up on her own, I didn’t hear any ouching. She did the same thing at lunch. Up, down, unassisted, and no ouching. A few times when she would say she had pain, I gave her a vitamin D tablet, saying “my doctor gave me these for pain, they’re very strong”...and no pain after. But she always complained to me. Her doctor, my therapist and I began to wonder if it was discomfort + attention seeking + brain pain processing issues. I want to just add something here. It will seem like its coming from left field........ Sometimes our LO say they have pain - and they might. However, it might mean they are too cold, or too hot, shoes are tied too tightly, are hungry, need to use the restroom, etc etc. They know the word pain therefore use it in all circumstances. I'm certainly not saying they aren't in pain - but sometimes its simply the wrong word. I too would error on the side of caution if you think or the facility thinks a trip to the ER is medically necessary. That's a change of environment and can cause confusion - just be prepared. I think my dad sometimes reported pain as a bid for attention; nothing like saying my fill in the blank hurts to get my mom's undivided attention. Other times he used it as a conversation starter like the time he pointed to an imaginary scar on his arm and told me all about his knee replacement surgery. FTR, it was my mom who had both knees replaced. But then there were his ongoing reports of broken ribs. He had taken a spill stepping off a curb and nearly landed on my mother. She has osteoporosis and several fractured vertebrae in her lumbar region, so she jumped out of the way to avoid breaking his fall. This angered him and the incident stayed with him for some reason and over time it became her fault. When his new pulmonologist ordered a CT scan to check his COPD I looked the result up on the patient portal and discovered he had some inflammation around his gall bladder and stones. Evidently the surgeon who removed his gall bladder in 1982 left enough behind to get him in trouble. We were able to adjust his diet which helped a lot. I personally think that sometimes when our loved ones describe pain or another physical issue, its because they are confused or trying to make sense of what is happening around them, and the only way they can express that confusion and ask for help is to say they are in pain, or have a headache, etc. Its the only way they can come up with at the time to say "help, what's happening to me". My MIL has been getting the shakes and back pain. We give her Tylenol for the back pain per our doctors orders but there is nothing they can give her for the shakes (she gets bouts two or three times a day that last 45 minutes to and hour and a half). Instead of telling her there is nothing we can give her for the shakes then having her scared the whole time we started giving her a Tums as a placebo. It calms her right away because her pill will help, and if she forgets she took one it hasn't hurt her to give her another. It doesn't work like a true placebo and make the shakes go away but it helps her get through it without all the panic. Thanks for all the feedback. It's always good to know I'm not as alone as I feel. Seems like I'm the world's worst daughter. Do I get a trophy? The Dr. examined my mom and couldn't be sure so we ended up sending her to the ER. They did a CT scan and she has a pelvic fracture. There doesn't appear to be any displacement (which I'm told is good but who knows.) We don't know how it happened. The facility doesn't think she fell because how would she have gotten up? She was on osteoporosis meds for many years and she's very tiny so I'm guessing it's related to bone insufficiency. Judging by the way she used to plop down in her chair - I suppose even that amount of force might have cause the fracture. I moved my mom to a very nice memory care facility. She was walking. Within a week, she was in a wheelchair. I thought her pain was probably her being unhappy with her unfamiliar surroundings but asked for an xray. The xray looked fine. Now she's in the hospital with a fracture. By the way, the night after I moved her, I fell in my bathroom. I missed a week of work and I'm still using a walker. I'd say "no displacement" could maybe mean that the pelvic bone is still in the form it was before the fracture-- no separation of halves in any plane? So that would be a good thing, bc it would maybe tend to heal in its correct shape, and not cause yet more pain down the road.
Mid
[ 0.5863636363636361, 32.25, 22.75 ]