id
int32 1
11.3k
| text
stringlengths 0
74.9k
| label
int64 0
19
| Generalization
stringclasses 1
value |
---|---|---|---|
9,250 |
Not exactly the same, but reminiscent of the assassination of Count
Bernadotte, who was _the_ UN negotiator during the 1948 Israeli war of
independence. He was killed by the Israelis. Seems he was being too
successful in negotiating a cease-fire, which would have worked
territorially against the nascent Israel, compared to continued war. | 6 | trimmed_train |
1,731 |
The most practical use I've seen for them is as key ring ornaments :-) | 11 | trimmed_train |
4,137 | : In my mind, to say that science has its basis in values is a bit of a
: reach. Science has its basis in observable fact.
I'd say that what one chooses to observe and how the observation is
interpreted and what significance it's given depends a great deal on
the values of the observer. Science is a human activity and as such,
is subject to the same potential for distortion as any other human
activity. The myth that scientists are above moral influence or
ethical concern, that their knowledge can be abstacted whole and pure
from nature untainted by the biases of the scientist, is nonsense.
Bill
: If one is to argue for objective values (in a moral sense) then one must
: first start by demonstrating that morality itself is objective. Considering
: the meaning of the word "objective" I doubt that this will ever happen.
: So, back to the original question:
: And objective morality is.....?
This may be an unfortunate choice of words, almost self-contradictory.
Objective in the sense used here means something immutable and
absolute while morality describes the behavior of some group of
people. The first term is all inclusive, the second is specific. The
concept supposedly described may have meaning however.
If there is a God as described by the Christians (for instance), then
He has existence apart from and independent of humankind; His
existence is outside of our frame of reference (reality). If this
being declares a thing to be so, it is -necessarily- so since He has
defined Himself as omnipotent and, if His claims are to be believed,
He is at least omnipotent relative to us. God is intrinsically
self-defined and all reality is whatever He says it is - in an
objective sense.
If God determines a standard of conduct, that standard is objective.
If human beings are held accountable for their conformance to that
standard while permitted to ignore it, they substitute a relative
morality or mode of conduct, giving the term morality a nebulous,
meaningless sense that can be argued about by those pretending to
misunderstand. The standard is objective and the conduct required to
meet that standard is therefore objectively determined.
Just because it is convenient to pretend that the term morality is
infinitely malleable, doesn't mean that the objective standard itself
doesn't exist. Morality has come to mean little more than a cultural
norm, or the preferred conduct of "decent" people, making it seem
subjective, but it is derived from an absolute, objective, standard.
Ironically, this objective standard is in perfect accord with our true
nature (according to Christianity at least), yet is condemned as being
contrary to human nre, oppressive and severe. This may be due as | 15 | trimmed_train |
4,992 | Can any Apollo GURUS out there let me know of their experiences building MIT X11R5,
with or without GCC 2.3.3. In particular, is there anything I should watch out for.
Thanks in advance | 16 | trimmed_train |
9,675 |
No, VGALIB? Amazing.. I guess it was lost in all those subdirs :-)
Thanks for correcting me. It doesn't sound very appealing though, only
320x200? I'm glad it wasn't something major I missed. | 1 | trimmed_train |
10,564 |
In billions of dollars (%GNP):
year GNP receipts outlays deficit debt unempl% admin
==== ==== =========== ============ ========= ====== ======= =======
1977 1930 355.6 (18.4) 409.2 (21.2) 53.6 (2.8) 709.1 Carter
1978 2174 399.6 (18.4) 458.7 (21.1) 59.2 (2.7) 780.4 Carter
1979 2444 463.3 (19.0) 503.5 (20.6) 40.2 (1.6) 833.8 Carter
1980 2674 517.1 (19.3) 590.9 (22.1) 73.8 (2.8) 914.3 7.9 Carter
1981 2986 599.3 (20.1) 678.2 (22.7) 78.9 (2.6) 1003.9 8.4 Reagan
1982 3130 617.8 (19.7) 745.7 (23.8) 127.9 (4.1) 1147.0 11.0 Reagan
1983 3325 600.6 (18.1) 808.3 (24.3) 207.8 (6.2) 1381.9 10.9 Reagan
1984 3688 666.5 (18.1) 851.8 (23.1) 185.3 (5.0) 1576.7 8.6 Reagan
1985 3958 734.1 (18.5) 946.3 (23.9) 212.3 (5.4) 1827.5 8.1 Reagan
1986 4177 769.1 (18.4) 989.8 (23.7) 220.7 (5.3) 2129.5 7.9 Reagan
1987 4442 854.1 (19.2) 1002.1 (22.6) 148.0 (3.4) 2354.3 7.1 Reagan
1988 4771 909.0 (19.1) 1064.1 (22.3) 155.1 (3.2) 2614.6 6.3 Reagan
1989 5201 990.8 (19.0) 1142.8 (22.0) 152.0 (2.9) 2881.1 Bush
1990 1031.2 1251.6 220.4 3190.5 Bush
1991 1054.3 1323.0 268.7 3599.0 Bush
[Source: Statistical Abstract of the US (1990 version), American Almanac
(1993 version), Universal Almanac (1993 version), Information Please Almanac
(1991 version)]
GRAPHICALLY: Deficits as a % of GNP, 1981-89
% GNP
7|
|
6| X
| X X
5| X
|
4| X
| X
3| X X
| X
2|
|
1|
|____________________________________________________________________________
0 1981 1982 1983 1984 1985 1986 1987 1988 1989
Ironically, Bush could have frozen spending, kept his "no new taxes"
pledge and balanced the budget. | 13 | trimmed_train |
3,296 | I've been to three talks in the last month which might be of interest. I've
transcribed some of my notes below. Since my note taking ability is by no means
infallible, please assume that all factual errors are mine. Permission is
granted to copy this without restriction.
Note for newbies: The Delta Clipper project is geared towards producing a
single staget to orbit, reusable launch vehicle. The DC-X vehicle is a 1/3
scale vehicle designed to test some of the concepts invovled in SSTO. It is
currently undergoing tests. The DC-Y vehicle would be a full scale
experimental vehicle capable of reaching orbit. It has not yet been funded.
On April 6th, Rocky Nelson of MacDonnell Douglas gave a talk entitled
"Optimizing Techniques for Advanced Space Missions" here at the University of
Illinois. Mr Nelson's job involves using software to simulate trajectories and
determine the optimal trajectory within given requirements. Although he is
not directly involved with the Delta Clipper project, he has spent time with
them recently, using his software for their applications. He thus used
the DC-Y project for most of his examples. While I don't think the details
of implicit trajectory simulation are of much interest to the readers (I hope
they aren't - I fell asleep during that part), I think that many of you will
be interested in some of the details gleaned from the examples.
The first example given was the maximization of payload for a polar orbit. The
main restriction is that acceleration must remain below 3 Gs. I assume that
this is driven by passenger constraints rather than hardware constraints, but I
did not verify that. The Delta Clipper Y version has 8 engines - 4 boosters
and 4 sustainers. The boosters, which have a lower isp, are shut down in
mid-flight. Thus, one critical question is when to shut them down. Mr Nelson
showed the following plot of acceleration vs time:
______
3 G /| / |
/ | / | As ASCII graphs go, this is actually fairly
/ | / | good. The big difference is that the lines
2 G / |/ | made by the / should be curves which are
/ | concave up. The data is only approximate, as
/ | the graph wasn't up for very long.
1 G / |
|
|
0 G |
^ ^
~100 sec ~400 sec
As mentioned before, a critical constraint is that G levels must be kept below
3. Initially, all eight engines are started. As the vehicle burns fuel the
accelleration increases. As it gets close to 3G, the booster engines are
throtled back. However, they quickly become inefficient at low power, so it
soon makes more sense to cut them off altogether. This causes the dip in
accelleration at about 100 seconds. Eventually the remaining sustainer engines
bring the G level back up to about 3 and then hold it there until they cut
out entirely.
The engine cutoff does not acutally occur in orbit. The trajectory is aimed
for an altitude slightly higher than the 100nm desired and the last vestiges of
air drag slow the vehicle slightly, thus lowering the final altitude to
that desired.
Questions from the audience: (paraphrased)
Q: Would it make sense to shut down the booster engines in pairs, rather than
all at once?
A: Very perceptive. Worth considering. They have not yet done the simulation. Shutting down all four was part of the problem as given.
Q: So what was the final payload for this trajectory?
A: Can't tell us. "Read Aviation Leak." He also apparently had a good
propulsion example, but was told not to use it.
My question: Does anyone know if this security is due to SDIO protecting
national security or MD protecting their own interests?
The second example was reentry simulation, from orbit to just before the pitch
up maneuver. The biggest constraint in this one is aerodynamic heating, and
the parameter they were trying to maximize was crossrange. He showed graphs
of heating using two different models, to show that both were very similar,
and I think we were supposed to assume that this meant they were very accurate.
The end result was that for a polar orbit landing at KSC, the DC-Y would have
about 30 degrees of crossrange and would start it's reentry profile about
60 degrees south latitude.
I would have asked about the landing maneuvers, but he didn't know about that
aspect of the flight profile.
| 10 | trimmed_train |
1,351 | ************* 1989 HONDA ACCORD LX ***************
Light Brown, Four Door Power Windows, Power Brakes
Power Locks, Power Steering, Power Antenna
AM/FM Cassette, Totally Cloth Interior. VERY NICE!
70,000 miles but excellent condition!!!!!!!!!!!!!!
Must Sell, quit my job to go back to school.
Blue book $9,200 in IDAHO
Asking only $8,000 OBO
email [email protected] Phone 208-233-8039
Pocatello, Idaho
| 5 | trimmed_train |
3,043 | Hello everyone,
I was hoping someone could help me out. I'm writing a program
for my astronautics class for assent of the shuttle into a low
orbit. There are two things I'd like to know, First, how much
time elapses between launch and the pitch over. Second, what is
the cross-sectional area of the shuttle, srb's, and ext. tank.
Thanks for any information, post or e-mail. | 10 | trimmed_train |
86 |
I think you may be chasing the wrong problem. I don't think it is the
function overloading at all-- I do that sort of thing all of the time
in BC++ without a hitch. The big problems I have encountered in
porting MFC to BC++ is that fact that MFC _depends_ on a couple of
invalid C++ assumptions.
I have never gotten the _entire_ ctrltest app to run under BC++, but
the reason is that MS makes some bad assumptions about the order in
which static/global objects are initialized (i.e. some objects are
getting accessed before they are initialized). The problem is in the
owner-draw menu code somewhere-- if you comment out that section, all
other pieces of ctrltest work fine.
Two other major gotchas I have found using MFC under BC++:
- The CFile::OpenFlags enum uses hard-coded numbers for the open mode,
rather than the manifest constants defined in fcntrl.h (which differ
between MSC and BC).
- All of the MFC collection classes depend on another bad C++
assumption-- that a reference to a base object can used be in place
of a reference to a derived object (true for pointers, NOT for
references).
I am sure there are other problems along the same lines, but I have
not encountered them (yet). I have not seen MFC 2.0 yet, but I hope
that some of these will be addressed. If they are not, all of MS's
hype about portability to other vendor's compilers will be just that.
| 18 | trimmed_train |
8,557 |
I've been a very intent NREN spectator of the NREN for years. As a
commercial IP software vendor, it really is my professional opinion that the
NREN, at this point, is irrelevant to private sector networking. If it had
been deployed five years ago, it would have been a major development. Now,
however, it's just an upgrade to the NSFnet, and an attempt to revive the
lagging use of the national supercomputer centers. You could cut out the
NSFnet completely, and the Internet would continue chugging along without a
hiccup (aside from a few universities).
Long-haul networking and Internet connectivity have long since ceased to be
under federal sponsorship or regulation, at least in the USA. The success of
the CIX (Commercial Internet Exchange) is a prime example of this. While our
dear VP has been promoting his "data superhighway," the private sector has
been building it, without the NSFnet's restrictions.
To illustrate, a connection from the machine on my desk to the machine your
article was posted from (pizzabox.demon.co.uk) involves *only* commercial IP
providers until it hits Amsterdam. No NSFnet. No NREN. No "appropriate
use" restrictions. It's even 1.544mbps (T1) until it hits the EUnet
gateway...
QED.
| 7 | trimmed_train |
777 |
So what does that have to do with RBI's? The team with the most RBI's
doesn't necessarily win the game.
Yes, runs are the most important statistice -- for a *team*. (So why does
every newspaper rank team offense by batting average?)
But for an individual player, runs and RBIs are context-dependent, and tell
us very little about the player himself, and more about his teammates and
position in the batting order. | 2 | trimmed_train |
10,230 | Dear Mr. Beyer:
It is never wise to confuse "freedom of speech" with "freedom"
of racism and violent deragatory."
It is unfortunate that many fail to understand this crucial
distinction.
Indeed, I find the latter in absolute and complete contradiction
to the former. Racial invective tends to create an atmosphere of
intimidation where certain individuals (who belong to the group
under target group) do not feel the ease and liberty to exercise
*their* fundamental "freedom of speech."
This brand of vilification is not sanctioned under "freedom of
speech.
Salam,
John Absood | 6 | trimmed_train |
9,282 | An is readable by WinGif, Paintshop Pro, Paint, and god knows how
many other programs.
| 18 | trimmed_train |
10,762 | From: "Phil G. Fraering" <[email protected]>
Right, the Profiting Caste is blessed by God, and may
freely blare its presence in the evening twilight ..
| 10 | trimmed_train |
2,272 | It seems pretty obvious that it will be made illegal if VERY LOUD NOISE is
not made about this IMMEDIATELY to Congress and the House!
I don't know what's worse - the waste of money, or the fact that (in SPITE
of all Clinton's rhetoric to the contrary) this is a feeble attempt by
a large group of bored intelligence bureaucrats to justify their currently
useless jobs. Clinton said he was going to trim the fat from the government.
This doesn't look very dietetic to me!
As I said before in this group: drug dealing and terrorism both tend to
be international crimes which are not going to cease if the US starts to
regulate encryption. The drug dealers and terrorists will simply go to
other countries to communicate their plans, and will still carry them out
here and/or wherever else. This is not the solution to the problem.
They try to invent a new problem by saying we "need" encryption. I guess
it's a good thing Bill Gates isn't a 4-star general or we would all "need"
our own copies of MS-DOS too, right?
Und vee haff vays uff findink out iff you are usink DOCTOR DOS!!
Our health care and education systems are in the toilet and they come up
with THIS pearl. If this goddamned government doesn't get a clue real quick
and start trying to repair the infrastructure of the country rather than
inventing someone to blame, Germany and Japan are going to eat the US alive,
and we will deserve it. It's not like there's any shortage of REAL problems
to solve, guys!
A Clipper chip is really going to help the homeless! A Clipper chip is
really going to help educate the children in the ghettos of our cities!
Just think of the generation gap that can be developed when they rehire
DoD engineer dad to work on Clipper chips that will be used to decrypt
slightly rebellious adolescent hacker son's naughty GIF files! I can see
the shitcom already.
If that wasn't a forged post or a sick joke, I'm popping that Dead Kennedys
tape into the car stereo and tearing ass to Canada. Clinton on White Horse
is near. It's the suede/denim secret police! They have come for your uncool
niece! Don't worry it's only a phone...shit, I knew I should have gotten
some of those "consent to monitoring" stickers they keep on Autovon phones
when I had the chance. I should have known I'd need them in civilian life.
| 7 | trimmed_train |
9,884 | Hi! Everyone,
Since some people quickly solved the problem of determining a sphere from
4 points, I suddenly recalled a problem which is how to find the ellipse
from its offset. For example, given 5 points on the offset, can you find
the original ellipse analytically?
I spent two months solving this problem by using analytical method last year,
but I failed. Under the pressure, I had to use other method - nonlinear
programming technique to deal with this problem approximately.
Any ideas will be greatly appreciated. Please post here, let the others
share our interests. | 1 | trimmed_train |
2,089 |
Have you tried setting FILES in your config.sys file to a fairly high
number? (I've got mine set to 100; I've seen numbers from 40 to 100
recommended). Also check your STACKS statement, STACKS=9,256 is a good
starting point. Try increasing it if it's already set there (such as
to STACKS=12,256, etc.). Both STACKS and FILES have been identified as
_one_ cause of frequent Win3.1 crashes. | 18 | trimmed_train |
1,718 |
Linares has not defected; as I pointed out, MLB requires that the player
defect first.
What a surprise. As long as the pool of talent is not accessible to all
teams, MLB won't let a few teams sign it. Seems perfectly reasonable to
me.
Except that MLB won't allow it, which is all I ever said. | 17 | trimmed_train |
2,630 | I'm looking for a 1990-91 Kawasaki ZX-6 engine. Just the engine,
no intake, exhaust, ignition, etc. Preferably in the central texas
area, but we haven't had much luck around here so we'll take whatever we
can get. Please reply via mail or call (512) 471-5399 if you have one
(or more... really need a spare).
Thanx
| 12 | trimmed_train |
5,530 | completely
ever be
is
difference
etc.... | 14 | trimmed_train |
5,935 |
Recommended for what, DOS? That is a junk.
Linux + gcc. Fire up gcc to compile libc and kernel at the
same time running X11R5.
Bad memory, bad motherboard, bad cache.
change wait state of RAM.
turn off turbo.
change bus speed
swap RAM.
| 3 | trimmed_train |
11,206 |
believeing blindly or not. I'm not sure how blindness comes into it. I do > not
deny reason, indeed I insist upon it, but reason only draws conclusions > from
evidence. If you decide in advance that your reason will act only on > the
evidence of the five physical senses, then you cut reason off from any >
possibility of reaching a conclusion outside the physical sphere (beyond the >
rather provocative, if inconclusive, conclusion that the physical sphere > is
not self explanatory).
So your are saying to rely on our feelings and experiences (since
this is the only other source of information left to us).
How can you then convince somebody that your "feelings and experiences"
are the correct ones then if you can't show somebody visible and
measurable effects? If my experiences say that "there exists no god"
and yours says there does, where does that leave us? Since we are only
going on experiences, then both of us are correct within our own personal
realities.
Furthermore, the trouble with "feelings and experiences" is that they
can lead you astray, as the tragic outcome of Waco illustrates. I
am sure that many of Koresh's followers really believed in him but
I think that you and I will agree that they were being misled.
Finally, how on earth do you come to the conclusion that the physical
sphere is not self-explanatory when you only rely on the five senses?
You must be using a definition of "evidence" that I am not familiar with.
To me, evidence is something you can show others -unambiguously- that
what you are saying is true.
However, I agree with you that belief in a diety is a matter of faith.
It is not something you can share around - others must experience it
independantly. Unfortunately, as I have explained above, this puts
belief down to a matter of experience. My impression is that Christians
do not have the monopoly on reason, evidence and faith as far as any of
these things can go.
At the risk of repeating my argument : As I have explained previously,
the trouble is that Moslems, Buddhists, Jews, etc will ALL say that THEY
claim, with good reason, to be a valid system, possessed of the best
evidence, for explaining Gods revelations to man (for Buddhists it
should read "for explaining the non-existence of God"). So not only
must you "prove" your own case, you have to "disprove" theirs.
(alt.messianic is a good place to see people strong in the belief
of their own faiths ... and with their own good reasons)
I know that ALL people can use reason ... I never claimed that they don't.
I just wish to make sure that their arguments are well-founded. It goes
without saying that if I make a blunder that I expect people to correct
me. Once we have all gone through this process of removing the
non-essential and contradictory bits, we should (hopefully) have made
some progress towards the truth.
| 0 | trimmed_train |
9,366 |
Oh, Your Highness? And exactly why "should" the quotation
marks enclose "laws," not "must."
In case you didn't notice, it's the function of the "must"
that I wish to ironicise.
Perhaps the chimps that failed to evolve cooperative behaviour
died out, and we are left with the ones that did evolve such
behaviour, entirely by chance.
Are you going to proclaim a natural morality every time an
organism evolves cooperative behaviour?
What about the natural morality of bee dance? | 8 | trimmed_train |
3,696 | I have posted a DOS MPEG decoder/player to alt.binaries.pictures.utilities.
Here is a short description and some technical information, taken from the
accompanying documentation:
DMPEG V1.0
Public Domain MPEG decoder
by Stefan Eckart
0. Features
===========
DMPEG/DMPLAY is another MPEG decoder/player for the PC:
- decodes (nearly) the full MPEG video standard
(I,P,B frames, frame size up to at least 352x240 supported)
- saves decoded sequence in 8 or 24bit raw file for later display
- optional on-screen display during decoding (requires VGA)
- several dithering options: ordered dither, Floyd-Steinberg, grayscale
- color-space selection
- runs under DOS, 640KB RAM, no MS-Windows required
- very compact (small code / small data models, 16 bit arithmetic)
- real time display of the raw file by a separate player for
VGA and many Super-VGAs
...
4. Technical information
========================
The player is a rather straightforward implementation of the MPEG spec [1].
The IDCT is based on the Chen-Wang 13 multiplication algorithm [2]
(not quite the optimum, I know). Blocks with not more than eight non-zero
coefficients use a non-separated direct multiply-accumulate 2D-IDCT
(sounds great, doesn't it?), which turned out to be faster than a 'fast'
algorithm in this (quite common) case. Dithering is pretty standard. Main
difference to the Berkeley decoder (except for the fewer number of supported
algorithms) is the use of 256 instead of 128 colors, the (default) option to
use a restricted color-space and the implementation of a color saturation
dominant ordered dither. This leads to a significantly superior quality of
the dithered image (I claim, judge yourself).
Restricted color-space means that the U and V components are clipped to
+/-0.25 (instead of +/-0.5) and the display color-space points are distributed
over this restricted space. Since the distance between color-space points
is thus reduced by a factor of two, the color resolution is doubled at the
expense of not being able to represent fully saturated colors.
Saturation dominant ordered dither is a method by which a color, lying
somewhere between the points of the display color space, is approximated
by primarily alternating between two points of constant hue instead of
constant saturation. This yields subjectivly better quality due to the
lower sensitivity of the human viewing system to saturation changes than
to hue changes (the same reasoning as used by the PAL TV standard to improve
on NTSC). The improvement is particularly visible in dark brown or redish
areas.
...
| 1 | trimmed_train |
7,132 | Left hand steering wheel placement was not standard until the 20's in the
US. Driving on the right has been standard since standards came into being.
Interestingly, Chrysler has just begun building right hand drive cars again
for export to Japan.
| 4 | trimmed_train |
3,038 |
Yes.
I use 74HC4066 and others commerically for this purpose so rest assured it
works fine. In one case I route bit serial digital audio using these and it
is difficult to see any signal degradation at all which surprised me given
some pretty fast edges. HC4066 is spec'd at something like -3dB @ 200MHz into
50 ohms. The more complex types are generally a little slower and more
resistive.
Plain 4000 series are not so good at handling 5v logic.
Remember that the output load is seen by the input device. | 11 | trimmed_train |
3,832 | Hey folks.
Is it possible to short out your CMOS chip? I think mine is fried.
These are the symptoms...
I have to do the following to get my computer (a Gateway 486DX33)
to boot...
Turn the power off
Disconnect the battery to the CMOS chip
Turn the power on
Get into setup upon getting the CMOS configuration error
Set up the CMOS
Exit the setup with [F10] (phoenix bios)
Ignore the diskette 0 seek error and press [F1]
The computer then boots normally. Both hard drives are accessible
but the floppy drives are not.
I can back up over the network and such, but if I need to reboot,
I have to turn off the computer and repeat the steps above. If I
simply <Ctl>-<Alt>-<Del>, the computer hangs after the memory test.
Does this sound like the CMOS chip is fried? Can I buy another one?
Where?
Thank you for your kind attention.
john | 3 | trimmed_train |
3,727 |
I was at an interesting seminar at work (UK's R.A.L. Space Science
Dept.) on this subject, specifically on a small-scale Solar Sail
proposed as a student space project. The guy giving the talk was keen to
generate interest in the project. I'll typein the handout he gave out at
the meeting. Here goes :
The Microlight Solar Sail
-------------------------
1. Introduction
The solar sail is a well-established concept. Harnessing the pressure of
sunlight, a spacecraft would have unlimited range. In principle, such a
vehicle could explore the whole Solar System with zero fuel consumption.
However it is more difficult to design a practical solar sail than most
people realize. The pressure of sunlight is only about one kilogram per
square kilometer. Deploying and controlling the large area of aluminized
fabric which would be necessary to transport a 'conventional' type
spacecraft is a daunting task. This is why, despite the potential of hte
idea, no such craft has actually been launched to date.
2.Design
Recent advances in microelectronics make possible a different concept: a
tiny sail just a few metres in diameter which could be controlled purely
be electronics, with no mechanical parts. Several attitude control
methods are feasible: for example the pressure sunlight exerts on a
panel of solar cells varies according to whether power is being drawn.
The key components of the craft will be a minute CCD camera developed at
Edinburgh University which can act as both attitude sensor and data
gathering device; solar cells providing ~1 watt power for control and
communication; and a directional radio antenna etched onto the surface
of the sail itself. Launched as a piggyback payload, the total cost of
the mission can be limited to a few tens of thousands of dollars.
3.Missions
The craft would be capable of some ambitious missions. For example:
a) It could rendezvous with a nearby asteroid from the Apollo or Amor
groups. Closeup pictures could be transmitted back to Earth at a low bit
rate.
b) It could be steered into a lunar polar orbit. Previously unobserved
areas around the lunar poles could be viewed. By angling the sail to
reflect sunlight downwards, polar craters whose bases never receive
sunlight could be imaged. Bright reflections would confirm that
volatiles such as water ice have become trapped in these
locations.[Immensely valuable information for setting up a manned lunar
base, BTW]
c) It could be sent to rendezvous with a small asteroid or comet
nucleus. Impacting at low speed, a thin wire probe attached to the craft
causes it to rebound while capturing a tiny sample is a sharp-edged
tube, like performing a biopsy. Returning to Earth, the sail acts as an
ideal re-entry parachute: load per unit area 20 gm/m2 ensures that heat
is reradiated so efectively that the sail temperature cannot exceed ~300
deg C. The material sample is recovered, enclosed in a small insulating
container.
Contact: Colin Jack Tel. 0865-200447
Oxford Mathematical Designs, 131 High Street, Oxford OX1 4DH, England
--------------------------------
This guy would love to hear from anyone interested in this project or
seeking details or anything, and would be most happy to send you more
information.
Andy
-- | 10 | trimmed_train |
11,224 |
Tennessee, at least, does not require any sort of safety class to
get a driver's license. All that is required is one twenty question
quiz and to drive a car around the block without crashing.
In all probability, no you don't. You are required to be licensed
to drive on public roads. A license is not necessary on private property.
Most states do not require the registration of cars that are
not used on public roads. Those that do (California I know of) do
so for tax purposes more than anything else.
Many states do not currently require this, and most, again,
only make this requirement for public roads. A car sitting unused
is not required to have insurance.
The two are not the same, as I pointed out above. There are
significant difference between making rules for *use on public property*
and *making rules for ownership*.
The other half of the objection is trust. Similar things to this
have been tried in many local jurisdications across the country, and
have been abused in far too many cases. Safety classes which are
never sheduled, never funded, or only one or two is held a year for
a limited number of participants. Registration lists in New York,
Chicago, and California have been used for confiscation. *Many* gun
owners would, in theory, support these planes. (Although the
numbers overwhelmingly show that competence is not the problem, that
intentional misuse is). They've simply seen it abused and are leery of
the next person who comes down the pike with a "reasonable" suggestion
they've already seen abused.
| 9 | trimmed_train |
63 | Hey now,
The following cds are still available. Offers/trades considered.
Gowan - Lost Brotherhood
Katrina & the Waves - Break of Hearts
Joe Cocker - Live
Charles Neville - Diversity | 5 | trimmed_train |
8,957 | My name is Noah Dacumos and I am a student at San Leandro High. I am
doing a project for my physics class and I would like some info on the
discovery of penicillin, its discoverer(Sir Alexander Fleming), and how it
helps people with many incurable bacterias. Also how it effects those who
are allergic to it. Any info will be greatly appreciated. | 19 | trimmed_train |
3,697 | The FLYERS team that can beat any team on any night showed up at the Spectrum
Sunday night, and dominated the Maple Leafs thoroughly en route to a 4-0
shutout. Tommy Soderstrom will get credit for the shutout, but he barely broke
a sweat until the third period as the FLYERS defense kept the Leafs from
mounting any serious attack.
Injuries:
Pelle Eklund is day-to-day with a bruised thigh.
Roster Moves:
Jason Bowen was added to the lineup for his first NHL game. Jason was the FLYERS
second pick in the first round (15th overall) of the 1992 entry draft. 19 years
old, 6'4", 210 lbs. In 62 games with the tri-city Americans he had 10 goals,
12 assists and 219 PIM. He plays left wing and defense, he played defense in
this game although Bobby Taylor said that Bill Dineen was planning to use him
up front as well.
Andre Faust was returned to Hershey. He actually left after the second period
of the Kings game, flew to Albany, got the game tying goal in a Bears OT win,
and played again for Hershey Sunday night.
Lines:
Fedyk-Lindros-Recchi
Beranek-Brind'Amour-Dineen
Lomakin-Butsayev-Conroy
Acton-Brown
Galley-McGill
Yushkevich-Cronin
Carkner-Hawgood
Bowen
Tommy Soderstrom in goal.
Acton replaced Lomakin in the 3rd period.
Game Summary:
If the FLYERS played like this every night, they'd be in the playoffs this
year. The FLYERS hit everything that moved. They created scoring chance after
scoring chance. They snuffed out everything that the Leafs tried to do.
Jason Bowen made a good play on his first NHL shift that almost created a goal.
He had the puck in the top of the left offensive circle all alone, but instead
of taking the shot he found Brind'Amour crashing the net on the other side.
A perfect pass and a good shot across Daren Puppa's body should have been a
goal, but Puppa made a great save reading the play.
Garry Galley gave the Maple Leafs 7th ranked power play the first chance when
he hooked Doug Gilmour at 4:25. The FLYERS lowly 21st ranked penalty killing
unit was almost flawless the entire game, and set the tone on this kill. The
Maple Leafs got almost nothing but long unscreened shots, and the defense swept
away every rebound.
After the power play, the FLYERS got a goal on an ugly play. Rod Brind'Amour
gave the puck to Greg Hawgood at the right point, and he sent a drive at the
net. Puppa made the save and kicked the rebound right into the feet of Josef
Beranek and Bob Rouse, who were wrestling in the slot. Beranek was able to
get his stick on the puck and push it out to Dineen who was skating into
the slot from the right circle, and he lifted a backhander over Puppa for
a 1-0 FLYERS lead at 8:10.
The FLYERS kept the pressure on, and Puppa was the only Leaf keeping the FLYERS
from building on their lead for a while. Eventually things settled down and
defense prevailed. Each team got an occasional scoring chance, but the goalies
were strong. Bowen started giving some Lindros-like checks in his own corners.
Then Lindros, who was looking to avenge a hit Foligno gave him, thought he had
a chance to even the score. He had Foligno lined up at center ice, leaned into
him, and rode him into the center ice boards. The only problem was that Foligno
was a little far from the boards, and Mike "Mister" McGeough felt that it
warranted a boarding call at 15:38
The Leafs couldn't get anything going on the power play as the FLYERS were
very aggressive (for a change) on the kill.
With time running out in the period, Recchi carried through the neutral zone
and handed to Lindros as they approached the Leaf's blue line. They were in
a crowd with Wendell Clark and Jamie Macoun, Lindros tried a backhand pass
to Recchi through the feet of Macoun that connected to Recchi, but then Clark
checked Recchi off the puck. Macoun then tried to clear, but it was weak and
went right to McGill who had manned the point. He drove it from just inside
the blue line. Macoun got his stick on it and deflected it past his own
goalie at 19:55.1. Shots were 13-8 FLYERS in the period.
The FLYERS finally got their first chance on the power play when Dave Andreychuk
tripped up Rod Brind'Amour in his offensive zone. During the power play, the
FLYERS got cheated a little when the puck popped up into the air and Eric
gloved it down, but McGeough thought it hit his stick above his head. We
could see from our seats at the other end of the ice that it only hit his glove
and the replay confirmed, but the faceoff went to the other end. As time was
running out in the advantage, Lindros found Galley with a pass across the goal
mouth but Puppa made the save. The rebound kicked back to the right corner where
Recchi picked it up, passed it out to Eric crashing through the right circle,
and Eric one-timed past Puppa at 7:55. With the assist, Recchi moves past
Bobby Clarke's 74-75 season, the second best one season total for a FLYER at
117. Eric moves up to 4th all time in FLYERS rookie scoring with 67 points.
Mike Eastwood took down Al Conroy at 8:30 to give the FLYERS another chance on
the power play. Not much pressure before Garry Galley ended the power play with
a slash at 9:19. Not much happened on the 4 on 4, although the Leafs had most
of the possession. The FLYERS smothered the Leafs short power play. Tempers
flared a little at 13:14. Bowen and Pearson got roughing minors, Keith Acton
got a bloody face. Dave McLlwain then took a dive and got Greg Hawgood a
hooking minor at 13:46 to set up a 4 on 3. The replay showed that Hawgood's
stick stopped making contact with McLlwain long before he spun around and fell.
Again the FLYERS smothered the Leafs power play, led by Dimitri Yushkevich.
Bowen made a thundering hit when he came out of the box on Pearson. Berehowski
tried to perplex everybody with his sloooowball. He had the puck at the point,
and just trickled a pass down the slot. He made all the FLYERS look silly as
nobody could get a stick on it, and it got to Gilmour at the side of the net,
but Soderstrom stoned him.
The FLYERS picked things up offensively after the kill was over, but didn't
get anything home. Shots were 13-10 FLYERS.
The FLYERS were content with the 3 goal lead in the third period, and they
decided that if Tommy wanted a shutout, he was going to have to work for it a
little.
The FLYERS got most of the scoring chances in the first 7 or so minutes of the
period, but couldn't get past Puppa. Then the Leafs got tired of Lindros making
road kill out of them, and tempers flared. 2 each for Doug Gilmour and Lindros
(unsportsmanlike conduct) and 2 each for Glenn Anderson and McGill (roughing)
all at 7:02. Terry Carkner then took a kneeing penalty at 7:51 on Gilmour.
Again the FLYERS smothered the Leafs power play.
At about the 12 minute mark, Dave Andreychuk got a shot away from his left
circle that got through Soderstrom. The puck was rolling on it's side, and
as luck would have it it turned away from the net instead of turning towards
it (think of how a rolling quarter inevitably starts to lean one way or the
other). Seconds later Rod Brind'Amour tripped up Gilmour at 12:24 to give the
Leafs another chance on the power play. On the advantage, after Soderstrom
stoned Andreychuk while lying down, Andreychuk got the rebound through
Soderstrom, but from behind the net and it went straight through and was swept
away by one of his defensemen. They kept the pressure on, but Soderstrom was
equal and preserved the shutout.
Recchi cross checked Ken Baumgartner to get tempers hot and start a brawl
at 16:01. No punches thrown, Recchi got the initial minor, Krushelnyski
Baumgartner and Lindros each got roughing minors. At 17:02 Rouse and Beranek
expressed their mutual dislike for each other and got 2 each for slashing to
set up another 4 on 4. Mike Eastwood shoved down Ryan McGill in the FLYERS
zone as they were battling for the puck, and while McGill was down he ran
his stick across McGill's face. The FLYERS were not happy with that at all.
5-8 Al Conroy paired up with 6-1 Berehowski, and started throwing punches.
Upward. Well, Al held his own, much to the delight of the crowd. Each got
a couple punches in before going down in a head, and Al got a standing O!
Penalties: Eastwood 5 (cross check) + game, Clark, Carkner 10 each. Berehowski
and Conroy 5 each (fighting) at 17:49.
So a major penalty for the rest of the game for the FLYERS. The had no interest
in stting on the lead. Hawgood, Galley and Brind'Amour played catch until
Hawgood found Dineen all alone in the left circle, he controlled the puck and
blasted it past Puppa at 18:39.
That was all the fireworks, Tommy Soderstrom would not face another shot. Puppa
did, but kept the FLYERS off the board. 4-0 FLYERS, shots were 9-8 FLYERS in the
3rd. Probably the strongest game I've seen from the FLYERS since the All Star
break. Shutout number 4 for Soderstrom, all since 1/10. Tied for 2nd most in
the NHL, but he's played fewer games than Belfour (6) or the goalie I can't
remember that he's tied with.
Next up it's the Winnipeg Selannes Tuesday night in Winnipeg. The FLYERS cannot
be eliminated if they win, but a loss coupled with an Islander win that night
in Washington would be the official end.
FLYERS up to 71 points on the season in 78 games. Last year they had 75 points
in 80 games (5 under .500), so they need at least 8 points in their last 6
games to improve on that only by percentage points (5 under in 84 is better
than 5 under in 80).
Tragic number holds at 3 points with 6 games left. The tragic number for 5th
is 5 points, I watched the Rangers blow a 4-2 third period lead at home to
lose 5-4 before I finished this up. Why 5 points instead of 4? Well, the FLYERS
will win the tie-breaker if they catch them, whereas the Islanders win tie
breakers against the FLYERS and so need only a tie. The Rangers could crumble
down the stretch as they play the Devils, the Pens twice, the FLYERS, and
finish up with 2 games against the Caps. So I guess 5th place could be the
goal for the team to focus on.
FLYERS team record watch:
Eric Lindros:
38 goals, 29 assists, 67 points
(rookie records)
club record goals: club record points:
Eric Lindros 38 1992-93 Dave Poulin 76 1983-84
Brian Propp 34 1979-80 Brian Propp 75 1979-80
Ron Flockhart 33 1981-82 Ron Flockhart 72 1981-82
Dave Poulin 31 1983-84 Eric Lindros 67 1992-93
Bill Barber 30 1972-73 Pelle Eklund 66 1985-86
Mark Recchi:
51 goals, 66 assists, 117 points.
club record goals: club record points:
Reggie Leach 61 1975-76 Bobby Clarke 119 1975-76
Tim Kerr 58 1985-86,86-87 Mark Recchi 117 1992-93
Tim Kerr 54 1983-84,84-85 Bobby Clarke 116 1974-75
Mark Recchi 51 1992-93 Bill Barber 112 1975-76
Rick Macliesh 50 1972-73 Bobby Clarke 104 1972-73
Bill Barber 50 1975-76 Rick Macliesh 100 1972-73
Reggie Leach 50 1979-80
FLYERS career years:
Player Points Best Prior Season
Mark Recchi 117 113 (90-91 Penguins)
Rod Brind'Amour 79 77 (91-92 FLYERS)
Garry Galley 58 38 (84-85 Kings)
Brent Fedyk 58 35 (90-91 Red Wings)
That's all for now... | 17 | trimmed_train |
6,966 | From Kay Honda's "Helpful HInts ABout Your Honda" infromation sheet
(given to new owners of Honda vehicles).
"A burning smell may be evident from your new car shortly after taking
delivery."
--I now own a fire extinguisher;>--
"On Prelude S mels at temperatures above 32 degrees push the
accelerator pedal to the floor one time, release slowly, and with your
foot off the accelerator, crank the engine until it starts. Moe than
5 seconds [!!!!!!! my note] of cranking may be required. In
temperatures below 32 degrees the accelerator will have to be
depressed 2-3 times."
"Door panels and interior trim can be damaged if they are not buckled
by getting caught when closing doors."
"When shifting accord automatic transmissions from Park Neutral, or
Reverse into Drive the transmission shifts into 3rd gear."
"In case of towing:
1- Start the engine
2- Shift into drive from Park, then from Drive to neutral
3- Turn off engine"
--what if you are getting towed b/c engine won't run?--
"IF ENGINE DOES NOT RUN DO NOT USE THIS PROCEDURE!"
--Phew, I was worried!--
Insert smilies where appropriate, though this is REAL.
Jonathan | 4 | trimmed_train |
6,918 |
Well it still looks like you've got an attitude problem
Mr. Muttonhead. You should take the comments with more
sensitivity. I still despise most people who belittle
drinking and driving since my first girlfriend was killed
by such an asshole back in '85. Learn to take the verbal
abuse.
If you can't take the flames,
and you can't use your brains,
stay out of the newsgroup.
| 12 | trimmed_train |
9,129 | [MODERATOR: Nice summary, Keith, thanks.]
I talked to the federal Dept. of Justice (DOJ, Ottawa) to try and
clarify a bunch of things regarding changes to Canadian gun laws.
I am posting here for informational purposes; questions to email,
followup to t.p.g.
1. It is still technically feasible (but almost impossible) to get
a concealed carry permit in Canada. This is contrary to what I
was told by a police officer.
2. It is still legal to use lethal force (such as a firearm) to
protect life, also contrary to what the officer told me. Guns
must be stored locked up and unloaded, however.
3. Regarding hi-capacity magazines, it is still not clear who will
be exempt or how this will be managed. This is up to each province.
The general idea is that exempt persons will receive a letter/form
authorizing them to possess the high capacity magazines.
Apparently, the authorization is to specify how many of these
'prohibited weapons' you will be allowed to possess. Dealers will
be allowed to order high capacity mags for those allowed to possess
them, but will not be allowed to stock them.
4. High capacity magazines converted to comply with the new limits will
not be considered prohibited weapons. Amendments to the regulations
specify some possible methods to alter the magazines. Some
manufacturers (Beretta) will be marketing reduced capacity magazines.
(God knows how much they'll charge for these)
This covers most of what we discussed. I have typed this from memory,
do not take it as gospel. I am not a lawyer and I refuse to play one on TV.
--
------------------------------------------------------------------- | 9 | trimmed_train |
7,698 | Which Version of the Bible do you consider to be the most
accurate translation?
| 0 | trimmed_train |
3,885 | I'm sold! Where do I sign up?
| 8 | trimmed_train |
1,078 | Of course, I do not agree. It does have more horsepower. Horsepower is not
the only measurement for 'better'. It does not have full motion, full screen
video yet. Does it have CD-ROM XA?
Which other manufacturers?
We shall see about the date.
This is second hand, but it still hard to look to the future ;-). | 1 | trimmed_train |
7,021 |
Well, yes, the exhaust is where the majority of the noise comes out, but the
basics (tone, firing cadence, etc.) are determined by the engine configuration.
In the case of the Viper, yes, we are discussing a HUGE multicylinder 90-deg.
engine, which will sound somewhat like a truck. And my understanding, btw, is
that that V-10 engine was designed originally with the intention of being ad-
aptible for either the trucks or the Viper. And from what I've heard (no first
hand knowledge :-( ) it's doing a pretty good job at both.
And the best exhaust sound in the world is now and will always be a 60-degree
DOHC Colombo-designed V-12. Period. | 4 | trimmed_train |
7,458 | I am going to be getting a C650 soon, but I don;t want Apple
to come out with the Cyclones and the Tempest in a month
and have the price drop on the system I want. I have negotiated a
good deal with a supplier for a C650 8/80 and I would like to jump on it,
but, again, I don't want the price drop to smuther me. BTW, the deal
I have is a C650 8/80 with mouse for $2295... does anyone know of a better
deal?
thanks, | 14 | trimmed_train |
3,695 | 18 | trimmed_train |
|
3,955 |
Rather than decide which book you want to buy, you need to decide which
programming interface you want to use, then buy the appropriate book.
I wrote an article for the X Resource which discusses the differences
between PHIGS and PEXlib (it will appear in Issue 6 which should be out
pretty soon). But here's a brief summary...
PHIGS is a graphics API which was designed to be portable to many
devices. Most implementations support the X Window System and take
advantage of a 3D extension to X called "PEX". PEXlib is a slightly
"lower" level API which was designed to efficiently support the PEX
extension to X.
Some advantages of using PEXlib...
- Integrates with Xlib,Xt,Motif,etc. better than PHIGS
- Provides immediate mode capabilities
- Is free of "policy"
- PEX supports PHIGS, but is currently being extended to support
features not found in PHIGS (like texture mapping, anti-aliasing).
PEXlib will give you access to all of these features.
Some advantages of using PHIGS...
- Support for multiple devices, not just X based ones
- Support for archiving, metafiles, hardcopy output
- PHIGS has predefined input devices to make input easier
- PHIGS can handle exposure events and resizing for you
- PHIGS can help you with colormap selection/creation.
If you're working strictly in X and don't care about things like
archiving, I would go with PEXlib. Either way, you will find that
both API's have a lot in common. | 1 | trimmed_train |
10,784 |
Bob is indeed correct here in more than one way. A look in the old
RCA picture tube manual backs this up, as does SAMS Reference Data
handbook. The internal coating around the perimeter of the CRT
(not the aluminum or tin CRT face coating) is referred to as a
"dag" as well as the outer coating.
Thankfully, I didn't need to go to a f****** library to find it, either.
One sparkling water for Mr. Vanderbyl (no caffeine in that, is there).
--
--------------------------------------------------------------------
Dave Medin Phone: (205) 730-3169 (w)
SSD--Networking (205) 837-1174 (h)
Intergraph Corp.
M/S GD3004 Internet: [email protected]
Huntsville, AL 35894 UUCP: ...uunet!ingr!b30!catbyte!dtmedin
******* Everywhere You Look (at least around my office) ******* | 11 | trimmed_train |
9,356 | Hi folks,
]
Does anybody know for a good 32-bit C++/C compiler for OS/2 that supports
OS/2 API and Microsoft windows (maybe Windows NT)?
thanx | 16 | trimmed_train |
11,141 | # 179 Czech Republic # 180 Republic of Slovakia They were admitted early
this year. Liechenstein was also recently admitted. Also San Marino.
Both within the last 12 months. Incredible what passes for a nation-sta
state nowadays.
| 13 | trimmed_train |
8,749 | For Sale:
Tektronix 4208 Color Terminal
Tektronix 4510A Rasterizer
Tektronix 4692 InkJet Printer
Tektronix 4692 Printer Extras (all Tektronix products):
Paper (> 3 boxes)
Transparencies (> 2 boxes)
Maintenance Cartridges (2 cart)
Magenta Ink Cartridge (1 cart)
We would like to sell as a single lot, and preference
will be given to offers for the entire list. All offers
accepted, best offer gets the equipment.
-- Bob | 5 | trimmed_train |
2,513 | :>:It would seem that a society with a "failed" government would be an ideal
:>:setting for libertarian ideals to be implemented. Now why do you suppose
:>:that never seems to occur?...
:>
:>
:>I fail to see why you should feel this way in the first place. Constant
:>combat isn't particularly conducive to intellectual theorizing. Also,
:>they tend to get invaded before they can come to anything like a stable
:>society anyway.
:
:And the reason that the Soviet Union couldn't achieve the ideal of pure
:communism was the hostility of surrounding capitalist nations...Uh huh.
:Somehow, this all sounds familiar. Once again, utopian dreams are
:confronted by the real world...
Steve, you're the one who suggested that a failed government should be an
ideal proving ground, I never felt that way in the first place. Quite the
contrary, I think a better proving ground would be someplace that already
had a governemnt that would prevent outright acts of agression, yet had a
strong spirit of individualism and initiative. Someplace like... Texas :-) | 13 | trimmed_train |
8,516 | Archive-name: space/launchers
Last-modified: $Date: 93/04/01 14:39:11 $
ORBITAL AND PLANETARY LAUNCH SERVICES
The following data comes from _International Reference Guide to Space Launch
Systems_ by Steven J. Isakowitz, 1991 edition.
Notes:
* Unless otherwise specified, LEO and polar paylaods are for a 100 nm
orbit.
* Reliablity data includes launches through Dec, 1990. Reliabity for a
familiy of vehicles includes launches by types no longer built when
applicable
* Prices are in millions of 1990 $US and are subject to change.
* Only operational vehicle families are included. Individual vehicles
which have not yet flown are marked by an asterisk (*) If a vehicle
had first launch after publication of my data, it may still be
marked with an asterisk.
Vehicle | Payload kg (lbs) | Reliability | Price | Launch Site
(nation) | LEO Polar GTO | | | (Lat. & Long.)
--------------------------------------------------------------------------------
Ariane 35/40 87.5% Kourou
(ESA) (5.2 N, 52.8 W)
AR40 4,900 3,900 1,900 1/1 $65m
(10,800) (8,580) (4,190)
AR42P 6,100 4,800 2,600 1/1 $67m
(13,400) (10,600) (5,730)
AR44P 6,900 5,500 3,000 0/0 ? $70m
(15,200) (12,100) (6,610)
AR42L 7,400 5,900 3,200 0/0 ? $90m
(16,300) (13,000) (7,050)
AR44LP 8,300 6,600 3,700 6/6 $95m
(18,300) (14,500) (8,160)
AR44L 9,600 7,700 4,200 3/4 $115m
(21,100) (16,900) (9,260)
* AR5 18,000 ??? 6,800 0/0 $105m
(39,600) (15,000)
[300nm]
Atlas 213/245 86.9% Cape Canaveral
(USA) (28.5 N, 81.0W)
Atlas E -- 820 -- 15/17 $45m Vandeberg AFB
(1,800) (34.7 N, 120.6W)
Atlas I 5,580 4,670 2,250 1/1 $70m
(12,300) (10,300) (4,950)
Atlas II 6,395 5,400 2,680 0/0 $75m
(14,100) (11,900) (5,900)
Atlas IIA 6,760 5,715 2,810 0/0 $85m
(14,900) (12,600) (6,200)
* Atlas IIAS 8,390 6,805 3,490 0/0 $115m
(18,500) (15,000) (7,700)
Delta 189/201 94.0% Cape Canaveral
(USA) Vandenberg AFB
Delta 6925 3,900 2,950 1,450 14/14 $45m
(8,780) (6,490) (3,190)
Delta 7925 5,045 3,830 1,820 1/1 $50m
(11,100) (8,420) (2,000)
Energia 2/2 100% Baikonur
(Russia) (45.6 N 63.4 E)
Energia 88,000 80,000 ??? 2/2 $110m
(194,000) (176,000)
H series 22/22 100% Tangeshima
(Japan) (30.2 N 130.6 E)
* H-2 10,500 6,600 4,000 0/0 $110m
(23,000) (14,500) (8,800)
Kosmos 371/377 98.4% Plestek
(Russia) (62.8 N 40.1 E)
Kosmos 1100 - 1350 (2300 - 3000) $??? Kapustin Yar
[400 km orbit ??? inclination] (48.4 N 45.8 E)
Long March 23/25 92.0% Jiquan SLC
(China) (41 N 100 E)
* CZ-1D 720 ??? 200 0/0 $10m Xichang SLC
(1,590) (440) (28 N 102 E)
Taiyuan SLC
CZ-2C 3,200 1,750 1,000 12/12 $20m (41 N 100 E)
(7,040) (3,860) (2,200)
CZ-2E 9,200 ??? 3,370 1/1 $40m
(20,300) (7,430)
* CZ-2E/HO 13,600 ??? 4,500 0/0 $???
(29,900) (9,900)
CZ-3 ??? ??? 1,400 6/7 $33m
(3,100)
* CZ-3A ??? ??? 2,500 0/0 $???m
(5,500)
CZ-4 4,000 ??? 1,100 2/2 $???m
(8,800) (2,430)
Pegasus/Taurus 2/2 100% Peg: B-52/L1011
(USA) Taur: Canaveral
Pegasus 455 365 125 2/2 $10m or Vandenberg
(1,000) (800) (275)
* Taurus 1,450 1,180 375 0/0 $15m
(3,200) (2,600) (830)
Proton 164/187 87.7% Baikonour
(Russia)
Proton 20,000 ??? 5,500 164/187 $35-70m
(44,100) (12,200)
SCOUT 99/113 87.6% Vandenberg AFB
(USA) Wallops FF
SCOUT G-1 270 210 54 13/13 $12m (37.9 N 75.4 W)
(600) (460) (120) San Marco
(2.9 S 40.3 E)
* Enhanced SCOUT 525 372 110 0/0 $15m
(1,160) (820) (240)
Shavit 2/2 100% Palmachim AFB
(Israel) ( ~31 N)
Shavit ??? 160 ??? 2/2 $22m
(350)
Space Shuttle 37/38 97.4% Kennedy Space
(USA) Center
Shuttle/SRB 23,500 ??? 5,900 37/38 $248m (28.5 N 81.0 W)
(51,800) (13,000) [FY88]
* Shuttle/ASRM 27,100 ??? ??? 0/0
(59,800)
SLV 2/6 33.3% SHAR Center
(India) (400km) (900km polar) (13.9 N 80.4 E)
ASLV 150 ??? ??? 0/2 $???m
(330)
* PSLV 3,000 1,000 450 0/0 $???m
(6,600) (2,200) (990)
* GSLV 8,000 ??? 2,500 0/0 $???m
(17,600) (5,500)
Titan 160/172 93.0% Cape Canaveral
(USA) Vandenberg
Titan II ??? 1,905 ??? 2/2 $43m
(4,200)
Titan III 14,515 ??? 5,000 2/3 $140m
(32,000) (11,000)
Titan IV/SRM 17,700 14,100 6,350 3/3 $154m-$227m
(39,000) (31,100) (14,000)
Titan IV/SRMU 21,640 18,600 8,620 0/0 $???m
(47,700) (41,000) (19,000)
Vostok 1358/1401 96.9% Baikonur
(Russia) [650km] Plesetsk
Vostok 4,730 1,840 ??? ?/149 $14m
(10,400) (4,060)
Soyuz 7,000 ??? ??? ?/944 $15m
(15,400)
Molniya 1500kg (3300 lbs) in ?/258 $???M
Highly eliptical orbit
| 10 | trimmed_train |
8,916 |
Yes, but then someone would have no problem draining your oil in a parking lot.
all they have to do is reach underneath, turn a valve, and forget the trip
home.
But there is less likelyhood they have a wrench with them.
I personally recommend, installing a 'special' locking drain plug to keep
vandals away. :---) | 4 | trimmed_train |
7,554 | Archive-name: space/data
Last-modified: $Date: 93/04/01 14:39:07 $
ONLINE AND OTHER SOURCES OF IMAGES, DATA, ETC.
INTRODUCTION
A wide variety of images, data, catalogs, information releases, and
other material dealing with space and astronomy may be found on the net.
A few sites offer direct dialup access or remote login access, while the
remainder support some form of file transfer. Many sites are listed as
providing 'anonymous FTP'. This refers to the File Transfer Protocol on
the Internet. Sites not connected to the Internet cannot use FTP
directly, but there are a few automated FTP servers which operates via
email. Send mail containing only the word HELP to [email protected]
or [email protected], and the servers will send you instructions
on how to make requests.
The sources with the broadest selection of material are the NASA Ames
SPACE archive and the National Space Science Data Center.
Don't even ask for images to be posted to the net. The data volume is
huge and nobody wants to spend the time on it.
VIEWING IMAGES
The possible combinations of image formats and machines is forebodingly
large, and I won't attempt to cover common formats (GIF, etc.) here. To
read PDS and VICAR (and many other) formats on Unix systems running X,
use XV 2.11, available by anonymous FTP from export.lcs.mit.edu
(18.24.0.12) in contrib/xv-2.11.tar.Z and the other standard X11 FTP
sites.
The FAQ for the Usenet group alt.binaries.pictures discusses image
formats and how to get image viewing software. A copy of this document
is available by anonymous FTP from the Usenet FAQ archives at
pit-manager.mit.edu (18.72.1.58), in directory
pub/usenet/alt.binaries.pictures.
ONLINE ARCHIVES
NASA AMES
Extensive archives are maintained at NASA Ames and are available via
anonymous FTP or an email server. These archives include many images and
a wide variety of documents including this FAQ list, NASA press
releases, shuttle launch advisories, and mission status reports. Please
note that these are NOT maintained on an official basis.
FTP users should connect to ames.arc.nasa.gov (128.102.18.3) and look in
pub/SPACE. pub/SPACE/Index contains a listing of files available in the
archive (the index is about 200K by itself).
To access the archives by email, send a letter to
[email protected] (or ames!archive-server). In the
subject of your letter (or in the body), use commands like:
send SPACE Index
send SPACE SHUTTLE/ss01.23.91.
The capitalization of the subdirectory names is important. All are in
caps. Only text files are handled by the email server at present; use
one of the FTP email servers described in the introduction to this
section for images or programs.
The Magellan Venus and Voyager Jupiter, Saturn, and Uranus CD-ROM image
disks have been put online in the CDROM and CDROM2 directories. The
disks will be rotated on a weekly basis. Thousands of images are
available in these collections.
The GIF directory contains images in GIF format. The VICAR directory
contains Magellan images in VICAR format (these are also available in
the GIF directory). A PC program capable of displaying these files is
found in the IMDISP directory (see the item "VIEWING IMAGES" below).
The NASA media guide describes the various NASA centers and how to
contact their public affairs officers; this may be useful when pursuing
specific information. It's in MISC/media.guide.
Any problems with the archive server should be reported to Peter Yee
([email protected]).
NASA ASTROPHYSICS DATA SYSTEM
The ADS is a distributed data retrieval system which is easy to use and
provides uniform access to ground-based and space-based astronomy data
from NASA data centers across the country. It currently has over 140
data catalogs of radio, infrared, optical, UV, and X-ray data which can
be queried by position or any other parameter in the catalog. The ADS
also provides tools to manipulate and plot tabular results. In addition,
ADS has a Beta version of an Abstracts Service which allows users to
query over 125,000 abstracts of astronomy papers since 1975 by authors,
keywords, title words, or abstract text words.
ADS use requires direct Internet access. For more info and to sign up to
become a user, email [email protected]. The User's Guide and
"QuickStart" Guide are available by anonymous FTP to sao-ftp.harvard.edu
in directory pub/ads/ADS_User_Guide (PostScript files).
Contact Carolyn Stern Grant ([email protected]).
NASA JET PROPULSION LAB (MISSION INFORMATION AND IMAGES)
pubinfo.jpl.nasa.gov (128.149.6.2) is an anonymous FTP site operated by
the JPL Public Information Office, containing news releases, status
reports, fact sheets, images, and other data on JPL missions. It may
also be reached by modem at (818)-354-1333 (no parity, 8 data bits, 1
stop bit).
Contact [email protected] or phone (818)-354-7170.
NASA LANGLEY (TECHNICAL REPORTS)
techreports.larc.nasa.gov is an anonymous FTP site offering technical
reports. To get started, cd to directory pub/techreports/larc/92 and
retrieve files README and abstracts.92. Most files are compressed
PostScript. The reports are also in a WAIS database with the following
description:
(:source
:version 3
:ip-name "techreports.larc.nasa.gov"
:tcp-port 210
:database-name "nasa-larc-abs"
:cost 0.00
:cost-unit :free
:maintainer "[email protected]"
:description "NASA Langley Research Center Technical Reports
Contact [email protected].
NASA SPACELINK
SpaceLink is an online service located at Marshall Space Flight Center
in Huntsville, Alabama. The system is specifically designed for
teachers. The data base is arranged to provide easy access to current
and historical information on NASA aeronautics, space research, and
technology transfer information. Also included are suggested classroom
activities that incorporate information on NASA projects to teach a
number of scientific principles. Unlike bulletin board systems, NASA
Spacelink does not provide for interaction between callers. However it
does allow teachers and other callers to leave questions and comments
for NASA which may be answered by regular mail. Messages are answered
electronically, even to acknowledge requests which will be fulfilled by
mail. Messages are generally handled the next working day except during
missions when turnaround times increase. The mail system is closed-loop
between the user and NASA.
SpaceLink also offers downloadable shareware and public domain programs
useful for science educators as well as space graphics and GIF images
from NASA's planetary probes and the Hubble Telescope.
You can dial in at (205)-895-0028 (300/1200/2400/9600(V.32) baud, 8
bits, no parity, 1 stop bit), or telnet to spacelink.msfc.nasa.gov
(128.158.13.250, also known as xsl.msfc.nasa.gov) if you're on the
Internet. Anonymous FTP capability (password guest) is now available.
Most of this information is also available from the Ames server in
directory SPACELINK.
NATIONAL SPACE SCIENCE DATA CENTER (NSSDC)
The National Space Science Data Center is the official clearinghouse for
NASA data. The data catalog (*not* the data itself) is available online.
Internet users can telnet to nssdca.gsfc.nasa.gov (128.183.36.23) and
log in as 'NODIS' (no password). You can also get the catalog by sending
email to '[email protected]'.
You can also dial in at (301)-286-9000 (300, 1200, or 2400 baud, 8 bits,
no parity, one stop). At the "Enter Number:" prompt, enter MD and
carriage return. When the system responds "Call Complete," enter a few
more carriage returns to get the "Username:" and log in as 'NODIS' (no
password).
The system is menu-driven; topics available as of 3/93 are:
1 - Master Directory - NASA & Global Change
2 - Personnel Information Management System
3 - Nimbus-7 GRID TOMS Data
4 - Interplanetary Medium Data (OMNI)
5 - Request data and/or information from NSSDC
6 - Geophysical Models
7 - CANOPUS Newsletter
8 - International Ultraviolet Explorer Data Request
9 - CZCS Browse and Order Utility
10 - Astronomical Data Center (ADC)
11 - STEP Bulletin Board Service
12 - Standards and Technology Information System
13 - Planetary Science & Magellan Project Information
14 - Other Online Data Services at NSSDC
15 - CD-ROMS Available at NSSDC
For users with Internet access, datasets are made available via
anonymous FTP once you select the desired datasets from the online
catalog. For other users, data may be ordered on CD-ROM and in other
formats. Among the many types of data available are Voyager, Magellan,
and other planetary images, Earth observation data, and star catalogs.
Viewers for Macintosh and IBM systems are also available. As an example
of the cost, an 8 CD set of Voyager images is $75. Data may ordered
online, by email, or by physical mail. The postal address is:
National Space Science Data Center
Request Coordination Office
Goddard Space Flight Center
Code 633
Greenbelt, MD 20771
Telephone: (301) 286-6695
Email address: [email protected]
SPACE TELESCOPE SCIENCE INSTITUTE ELECTRONIC INFORMATION SERVICE
stsci.edu (130.167.1.2) has a large amount of information about the
Hubble Space Telescope available by anonymous FTP, such as status
reports and newsletters, in addition to material oriented towards HST
observers and proposers. Get the top level README file to begin with.
Contact Pete Reppert ([email protected]) or Chris O'Dea
([email protected]).
STARCAT
The Space Telescope European Coordination Facility, at ESO/Garching
provides on-line access to a huge astronomical database, featuring
- Observation log files of several satellites/telescopes
(IUE,IRAS,HST,NTT...).
- Spectra and images (IUE, HST).
- Most of the astronomical catalogues (SAO, HR, NGC, PPM, IRAS,
Veron, GSC and many others, more than 50) in a very convenient
way (give center+radius+kind of objects, and you get the
corresponding files!).
Log on as ``starcat'' (no password) on node stesis.hq.eso.org
(134.171.8.100) or on STESIS (DECnet). The files created can be
retreived by FTP. Contact: Benoit Pirenne, [email protected] (phone +49
89 320 06 433) at ST-ECF
ASTRONOMICAL DATABASES
The full SAO stellar database is *NOT* available online, probably due to
the 40 MB size. It may be ordered on magnetic tape from the NSSDC. A
subset containing position and magnitude only is available by FTP (see
"Astronomy Programs" below).
nic.funet.fi (128.214.6.100) has a large collection of astronomical
programs for many types of computers, databases of stars and deep sky
objects, and general astronomy information in directory /pub/astro. This
site is mainly for European users, but overseas connections are
possible.
The Ames archives contain a database of 8,436 galaxies including name,
RA, declination, magnitude, and radial velocity in MISC/galaxy.dat.
Supplied by Wayne Hayes ([email protected]).
iris1.ucis.dal.ca (129.173.18.107) has a number of GIFs from Voyager,
Hubble, and other sources available by anonymous FTP in pub/gif (most of
this data is also in SPACE/GIF on the Ames server). Please restrict
access to 5pm - 8am Atlantic time.
pomona.claremont.edu has the Yale Bright Star catalog for anonymous FTP
in directory [.YALE_BSC]. Contact James Dishaw
([email protected]).
The Hubble Guide Star catalog is available on CD-ROM for the Mac and PC
for $49.95 US (catalog # ST101).
Astronomical Society of the Pacific
390 Ashton Ave.
San Francisco, CA 94112
Phone: (415) 337-2624 9 AM - 3 PM Pacific Time
FAX: (415) 337-5205
For German (and possibly other European) readers, Jost Jahn has a
service to distribute astronomical data to interested amateurs at cost.
About 30-40 catalogs are available for DM 6..8/disk. Several floppy disk
formats are available. Because of the expense of receiving email on his
system, he asks that you contact him by physical mail:
Jost Jahn
Neustaedter Strasse 11
W-3123 Bodenteich
GERMANY
Phone: FRG-5824-3197
ASTRONOMY PROGRAMS
Various astronomy-related programs and databases posted to the net in
the past are archived for anonymous FTP at multiple sites, including
ftp.uu.net (137.39.1.9). Also see the ASTRO-FTP list posted to sci.astro
monthly, which is more complete than this list.
Astonomical/Space-related sources of interest in comp.sources.unix:
Volume 8: phoon moon phase and date routines
Volume 12,13: starchart starchart program & Yale Star data
Volume 15: moontool shows moon phase picture on Suns
Volume 16: sao reduced SAO catalog
Astonomical/Space-related sources of interest in comp.sources.misc:
Volume 8: moon another moon phase program
Volume 11: starchart starchart program, version 3.2
Volume 11: n3emo-orbit orbit: track earth satellites
Volume 12: starchart2 starchart program, update to version 3.2.1
Volume 13: jupmoons plotter for Jupiter's major moons [in perl]
Volume 13: lunisolar lunisolar (not sure what this does)
Volume 14: ephem-4.21 astronomical ephemeris, v4.21
Volume 14: n3emo-orbit patch to orbit 3.7
Volume 18: planet planet generation simulator
Elwood Downey ([email protected]), the author of
"ephem", has offered to mail copies to people who can't find it on one
of the archives.
XSAT, an X Window System based satellite tracking program, is
available by anonymous FTP from export.lcs.mit.edu (18.24.0.12) in
contrib/xsat1.0.tar.Z. Contact Dave Curry ([email protected])
for more information.
Xsky, a computerized sky atlas for the X Window System, is available for
anonymous FTP on arizona.edu in the directory [.SOFTWARE.UNIX.XSKY] as
xsky.tarz. Contact Terry R. Friedrichsen ([email protected]) for
more information.
The "Variable Stars Analysis Software Archive" is available via
anonymous FTP from kauri.vuw.ac.nz (130.195.11.3) in directory
pub/astrophys. This is intended for specialists in this field, and they
would appreciate people from outside New Zealand confining their FTP
access to the astrophys directory, as they pay a significant amount for
Internet access. Contents are relatively sparse at present due to the
youth of the archive - contributions are encouraged. Contact the archive
administrator, Timothy Banks ([email protected]) for more
information.
The "IDL Astronomy Users Library" is available by anonymous FTP from
idlastro.gsfc.nasa.gov (128.183.57.82). This is a central repository for
general purpose astronomy procedures written in IDL, a commercial image
processing, plotting, and programming language. Contact Wayne Landsman
([email protected]) for more information.
ORBITAL ELEMENT SETS
The most recent orbital elements from the NASA Prediction Bulletins are
carried on the Celestial BBS, (513)-427-0674. Documentation and tracking
software are also available on this system. The Celestial BBS may be
accessed 24 hours/day at 300, 1200, or 2400 baud using 8 data bits, 1
stop bit, no parity.
Orbital element sets are available via anonymous FTP from the
following sites:
archive.afit.af.mil (129.92.1.66) NASA,TVRO,Shuttle
directory: /pub/space
ftp.funet.fi (128.214.6.100) NASA,TVRO,Molczan,CelBBS,
directory: /pub/astro/pc/satel Shuttle (*)
kilroy.jpl.nasa.gov (128.149.1.165) NASA,Molczan
directory: /pub/space/
SPACE DIGEST ARCHIVES
Copies of back issues of Space Digest are archived on
[email protected]. Send mail containing the message "INDEX SPACE" to
get an index of files; send it the message "GET filename filetype" to
get a particular file.
LANDSAT AND NASA PHOTOS
You can get black-and-white 1:1M prints, negatives, or positives for
$10, $18, $12 respectively for any Landsat data more than 2 years old
from EDC, (Eros (Earth Resources Orbiting Satellite) Data Center). Call
them at (605)-594-6511. You get 80 meter resolution from the MSS
scanner, 135x180 kilometers on a picture 135x180 mm in size. I think you
have to select one band from (green, red, near IR, second near IR), but
I'm not sure. Digitial data is also available at higher prices.
Transparencies of all NASA photos available to the public can be
borrowed from the NASA photo archive; you can have copies or prints
made.
NASA Audio-Visual Facility
918 North Rengstorff Ave
Mountain View, CA 94043
(415)-604-6270
PLANETARY MAPS
The USGS address for maps of the planets is:
U.S. Geological Survey,
Distribution Branch,
Box 25286, Federal Center, Bldg. 41
Denver, CO 80225
Maps cost $2.40 to $3.10 per sheet (a few come in sets of 2 or 3 sheets).
The best global maps of Mars based on Viking images are 1:15,000,000
scale in 3 sheets. These maps are:
I-1535 (2 sheets only) - relief, albedo, names
I-1535
I-1618 (3 sheets) - relief, names
I-2030 (3 sheets) - relief, topographic contours
I-1802-A,B,C (3 sheets) - geology
There are many other maps as well: 30 sheets at 1:5,000,000 scale in
relief, albedo, geology, photomosaic forms (not all 30 sheets available
in all formats); 140 sheets at 1:2,000,000 scale as photomosaics of the
whole planet, about 100 sheets of interesting sites at 1:500,000 scale
in photomosaic format, and lots of special sheets.
Then there are maps of Mercury, Venus, the Moon, the four Galilean
Satellites, six moons of Saturn and five of Uranus. [Phil Stooke
([email protected]), the author of this item, has offered to
respond to email requests for information on any topic relating to lunar
and planetary maps.]
COMETARY ORBIT DATA
The Central Bureau for Astronomical Telegrams and the Minor Planet
Center announce the sixth edition of the Catalogue of Cometary Orbits in
IAU Circular 4935. The catalogue contains 1292 entries which represent
all known comets through November 1989 and is 96 pages long.
Non-subscribers to the Circulars may purchase the catalogue for $15.00
while the cost to subscribers is $7.50. The basic catalogue in ASCII
along with a program to extract specific orbits and calculate
ephemerides is available on MS-DOS 5.25-inch 2S2D diskette at a cost of
$75.00 (the program requires an 8087 math coprocessor). The catalogue
alone is also available by e-mail for $37.50 or on magnetic tape for
$300.00.
Except for the printed version of the catalogue, the various magnetic
media or e-mail forms of the catalogue do not specifically meantion
non-subscribers. It is possible that these forms of the catalogue may
not be available to non-subscribers or that their prices may be more
expensive than those given. Mail requests for specific information and
orders to:
Central Bureau for Astronomical Telegrams
Smithsonian Astrophysical Observatory
Cambridge, MA 02138, USA
| 10 | trimmed_train |
5,223 |
One can't. The application may not have been started from a terminal
emulator; if it was, the terminal emulator may not still exist, and if
it does it may be in no condition to be "pop[ped] to the top" (eg, it
may be iconified). And even if you can, it may not do what you want -
consider a virtual-root window manager like tvtwm, with the relevant
window in a portion of the virtual desktop that's outside the real
desktop.
Some (but not all) X terminal emulators provide environment variables
giving a window ID. Even if such a thing is present in the
environment, it may not be what you want; it may correspond to a window
on a different server, for example.
der Mouse | 16 | trimmed_train |
7,397 |
Sorry, but *neither* 'dictates' the cost. It's a negotiation.
Whether it's up front at a honda dealership in an all out
dickering war, or more removed on a larger economic scale
(ie, if saturn can't sell at it's price, the price drops,
or the company stops building them), it remains a negotiated
value controlled by market forces. To think that the consumer
controls price is ludicrous. If the consumer controled
price, then cars would be *free*...And no one would build
cars.
Regards, Charles | 4 | trimmed_train |
8,721 |
I have a Maxtor 212MB on an ISA IDE controller, although my machine is
DX2/66 VLB. I has the save transfer rate of 0.647 MB/s regardless of
the variations of the ISA bus speed. I tested it with speed between
5.5MHz and 8.33MHz. Not _any_ difference. The problem is not the
interface between the controller and the memory.
My advice: Buy 4Megs of RAM, save $70 and enjoy performance.
--
Penio Penev x7423 (212)327-7423 (w) Internet: [email protected] | 3 | trimmed_train |
4,837 |
I think that they go to divisional records before goals, but I could be
wrong, too.
--
Keith Keller LET'S GO RANGERS!!!!!
LET'S GO QUAKERS!!!!!
[email protected] IVY LEAGUE CHAMPS!!!! | 17 | trimmed_train |
4,432 |
I also use IRQ 5. But there is one disadvantage. Some games assume that
the board is using IRQ 7 and have no way to adjust this setting. I had
trouble with some of the Lucas Films games.
-- | 3 | trimmed_train |
7,442 | Buck Showalter just can't win.
Bob Wickman's pitching the game of his life through eight innings (Yanks
lead 6-1), so Buck decides to let the kid try and get his first complete
game. Wickman manages to get two outs, but in between, four funs score,
and all of a sudden it's 6-5, and Wickman just can't get the third out.
So Buck goes to the bullpen, and Farr gets out the first guy he faces.
Last night, Jimmy Key is pitching another in a long string of games of his
life (this guy just keeps getting better!) through eight innings (Yanks
lead 4-0). This time, Buck thinks, "I don't want a repeat of that
near-fiasco with Wickman, so I'll give my bullpen some work." Steve Howe,
whose ERA was 54.00 coming into the game, left with it at 81.00. He didn't
do too good. Then Farr comes in. He gives up a two-run homer, and the
Royals win it, 6-5.
What's going on? This is already the third or fourth time this year that
the bullpen has blown a lead. Farr & Howe have done it twice together,
Monteleone's done it once, and I think even Habyan did it once. What's the
deal? We finally have terrific starting pitching, so all of a sudden, our
bullpen turns to shit!
What's Buck gonna do? And what's George gonna do if this continues to happen? | 2 | trimmed_train |
5,490 | RA> Here's the point: there are far too many Europeans in the NHL.
R> I am sick of watching a game between an American and a Canadian
RA> team (let's say, the Red Wings and the Canucks) and seeing names
R> like "Bure" "Konstantinov" and "Borshevshky". Is this North America
RA> isn't it?
I disagree. I think the NHL should feature the best hockey talent in
the world -- regardless of nationality. I have to admit that when I
see players like Gretzky and Messier traded off to the US because the
Canadian teams can't afford them, I have been know to say (only half-
seriously) that we'd probably be better off if we had our own Canadian
hockey league for Canadian players! ;-)
RA> I'm all for the creation of a European Hockey League, and let
RA> te Bures and Selannes of the world play on their own continent.
RA>
RA> I just don't want themon mine.
Again, it doesn't matter to me -- Russian, Finnish, Mexican, Albertan,
New Yorker, black, white, korean, martian, plutoneon, ... it doesn't
matter.
Any of them can put a Leafs' jersey on if they can put the puck in!
:-) | 17 | trimmed_train |
4,655 |
When the Quran uses the word *din* it means way of individual thinking, behaving,
communal order and protocols based on a set of beliefs. This is often
interpreted as the much weaker term religion.
The atheists are not mentioned in the Quran along with Jews,
Mushriqin, Christians, etc. because the latter are all din. To have a
din you need a set of beliefs, assumptions, etc, to forma a social
code. For example the Marxist have those, such as History, Conflict,
etc. That they do not put idols (sometimes they did) to represent
those assuptions does not mean they are any different from the other
Mushriq, or roughly polytheists.
There cannot be social Atheism, because when there is a community,
that community needs common ideas or standard beliefs to coordinate
the society. When they inscribe assumptions, say Nation, or "Progress is
the natural consequence of Human activity" or "parlamentarian
democracy is doubtlessly the best way of government", however
they individually insist they do not have gods, from the Quranic point
of view they do. Therefore by definition, atheism does not exist.
"We are a atheist society" in fact means "we reject the din other than
ours".
Atheism can only exist when people reject all the idols/gods/dogmas/
suppositions/.. of the society that they part, and in that case that
is a personal deviation of belief, and Quran tells about such
deviations and disbelief. But as I mentioned, from a Quranic point of
looking at things, there is no Atheism in the macro level.
I think it took more than one minute. | 8 | trimmed_train |
10,503 | I'm pretty sure that Sandberg has done this at least once. (I know someone
will correct me if I'm wrong.)
RBIs and Runs scored are the two most important offensive statistics. You
can talk about OBP and SLG% all you want, but the fact remains:
The team that scores more runs wins the game!
---------------------------------------------
Flame Away
-- John Bratt
| 2 | trimmed_train |
2,361 | Two years old Crate Guitar Amplifier model G80XL.
- Handles upto 80 Watts.
- Dual Input.
- Two channels.
- Reverb.
- Three band eq.
- Distortion.
| 5 | trimmed_train |
1,025 | #[sorry for the 0 auto content, but ... ]
#
#> That is why low-abiding citizens should have the power to protect themselves
#> and their property using deadly force if necessary anywhere a threat is
#> imminent.
#>
#> Steve Heracleous
#
#You do have the power Steve. You *can* do it. Why don't you? Why don't you
#go shoot some kids who are tossing rocks onto cars? Make sure you do a good
#job though - don't miss - 'cause like they have big rocks - and take it from
#me - those kids are mean.
This last comment was obviously a bit cynical, but a true statement of
the attitude of some drivers (there's your "autos" content), I would say.
What law-abiding (not "low-abiding" as above (talk about Freudian slips!))
citizens have the right and responsibility to do is try to PREVENT this
type of behaviour in children. A doctor may have to use "deadly force"
against a part of a body (like amputating it) when an infection/disease
has gone too far. But his real desire would have been to *prevent* the
disease in the first place or at least nip it in the bud.
Followups should go to alt.parents-teens
Fred W. Bach , Operations Group | Internet: [email protected]
TRIUMF (TRI-University Meson Facility) | Voice: 604-222-1047 loc 327/278
4004 WESBROOK MALL, UBC CAMPUS | FAX: 604-222-1074
University of British Columbia, Vancouver, B.C., CANADA V6T 2A3 | 4 | trimmed_train |
1,870 |
Sigh.
This was written about the game NHLPA Hockey '93. Which does not
have precise up-to-date rosters. Why don't people think before they post?
Jeez...
| 17 | trimmed_train |
6,049 |
[The original question was about who started the fire and whether the
"madmen" were inside or outside the compound. To which I replied on
the possible sanity level of those inside and outside.]
I paid my taxes. There was no reference to sex or religion on the form.
The comments above and below were meant to address who might be unstable
enough to keep children in a building with tear gas or start a fire.
I agree that the BATF handled the affair badly.
Do you believe they would put impostors before the national tv cameras?
At this point, we are getting conflicting reports from the survivors.
Best wait til more light is shed upon them. Of course, this is no
good if you believe in eternal darkness.
| 9 | trimmed_train |
10,558 | I tried to mail Peter Boucher, who posted the question, but my e-mail
bounced, so, apologies to thsoe who are not interested.
Have you read:
Bremner,A.,
On Trinomials of Type x$+n$-+Ax$+m$-+1.
Math. Scand. 49(1981) pp. 145-155.
Zbl. 458.12012.
MR 83k:12002.
Ljunggren,W.,
On the Irreducibility of Certain Trinomials and Quadrinomials.
Math. Scand. 8(1960) pp. 65-70.
.
Tverberg,H.,
On the Irreducibility of the Trinomials
x$+n$-$mpm$$x$+m$-$mpm$$1.
Math. Scand. 8(1960) pp. 121-126.
Tverberg,H.,
On Cubic Factors of Certain Trinomials.
Math. Scand. 53(1983) pp. 178-184.
Zbl. 513.12003. | 7 | trimmed_train |
3,694 | Referring to notes from the personal diary of Russian General L.
Odishe Liyetze on the Turkish front, he wrote,
"On the nights 11-12 March, 1918 alone Armenian butchers
bayoneted and axed to death 3000 Muslims in areas surrounding
Erzincan. These barbars threw their victims into pits, most
likely dug according to their sinister plans to extinguish
Muslims, in groups of 80. My adjutant counted and unearthed
200 such pits. This is an act against our world of civilization."
On March 12, 1918 Lieut-colonel Griyaznof wrote (from an official
Russian account of the Turkish genocide),
"Roads leading to villages were littered with bayoneted torsos,
dismembered joints and carved out organs of Muslim peasants...
alas! mainly of women and children."
Source: Doc. Dr. Azmi Suslu, "Russian View on the Atrocities Committed
by the Armenians Against the Turks," Ankara Universitesi, Ankara,
1987, pp. 45-53.
"Document No: 77," Archive No: 1-2, Cabin No: 10, Drawer
No: 4, File No: 410, Section No: 1578, Contents No: 1-12, 1-18.
(Acting Commander of Erzurum and Deveboynu regions and Commander
of the Second Erzurum Artillery Regiment Prisoner of War,
Lieutenant Colonel Toverdodleyov)
"The things I have heard and seen during the two months, until the
liberation of Erzurum by the Turks, have surpassed all the
allegations concerning the vicious, degenerate characteristic of
the Armenians. During the Russian occupation of Erzurum, no Armenian
was permitted to approach the city and its environs.
While the Commander of the First Army Corps, General Kaltiyin remained
in power, troops including Armenian enlisted men, were not sent to the
area. When the security measures were lifted, the Armenians began to
attack Erzurum and its surroundings. Following the attacks came the
plundering of the houses in the city and the villages and the murder
of the owners of these houses...Plundering was widely committed by
the soldiers. This plunder was mainly committed by Armenian soldiers
who had remained in the rear during the war.
One day, while passing through the streets on horseback, a group of
soldiers including an Armenian soldier began to drag two old men of
seventy years in a certain direction. The roads were covered with mud,
and these people were dragging the two helpless Turks through the mud
and dirt...
It was understood later that all these were nothing but tricks and
traps. The Turks who joined the gendarmarie soon changed their minds
and withdrew. The reason was that most of the Turks who were on night
patrol did not return, and no one knew what had happened to them. The
Turks who had been sent outside the city for labour began to disappear
also. Finally, the Court Martial which had been established for the
trials of murderers and plunderers, began to liquidate itself for
fear that they themselves would be punished. The incidents of murder
and rape, which had decreased, began to occur more frequently.
Sometime in January and February, a leading Turkish citizen Haci Bekir
Efendi from Erzurum, was killed one night at his home. The Commander
in Chief (Odiselidge) gave orders to find murderers within three days.
The Commander in Chief has bitterly reminded the Armenian intellectuals
that disobedience among the Armenian enlisted men had reached its
highest point, that they had insulted and robbed the people and half
of the Turks sent outside the city had not returned.
...We learnt the details this incident from the Commander-in-Chief,
Odishelidge. They were as follows:
The killings were organized by the doctors and the employers, and the
act of killing was committed solely by the Armenian renegades...
More than eight hundred unarmed and defenceless Turks have been
killed in Erzincan. Large holes were dug and the defenceless
Turks were slaughtered like animals next to the holes. Later, the
murdered Turks were thrown into the holes. The Armenian who stood
near the hole would say when the hole was filled with the corpses:
'Seventy dead bodies, well, this hole can take ten more.' Thus ten
more Turks would be cut into pieces, thrown into the hole, and when
the hole was full it would be covered over with soil.
The Armenians responsible for the act of murdering would frequently
fill a house with eighty Turks, and cut their heads off one by one.
Following the Erzincan massacre, the Armenians began to withdraw
towards Erzurum... The Armenian renegades among those who withdrew
to Erzurum from Erzincan raided the Moslem villages on the road, and
destroyed the entire population, together with the villages.
During the transportation of the cannons, ammunition and the carriages
that were outside the war area, certain people were hired among the
Kurdish population to conduct the horse carriages. While the travellers
were passing through Erzurum, the Armenians took advantage of the time
when the Russian soldiers were in their dwellings and began to kill
the Kurds they had hired. When the Russian soldiers heard the cries
of the dying Kurds, they attempted to help them. However, the
Armenians threatened the Russian soldiers by vowing that they would
have the same fate if they intervened, and thus prevented them from
acting. All these terrifying acts of slaughter were committed with
hatred and loathing.
Lieutenant Medivani from the Russian Army described an incident that
he witnessed in Erzurum as follows: An Armenian had shot a Kurd. The
Kurd fell down but did not die. The Armenian attempted to force the
stick in his hand into the mouth of the dying Kurd. However, since
the Kurd had firmly closed his jaws in his agony, the Armenian failed
in his attempt. Having seen this, the Armenian ripped open the abdomen
of the Kurd, disembowelled him, and finally killed him by stamping
him with the iron heel of his boot.
Odishelidge himself told us that all the Turks who could not escape
from the village of Ilica were killed. Their heads had been cut off
by axes. He also told us that he had seen thousands of murdered
children. Lieutenant Colonel Gryaznov, who passed through the village
of Ilica, three weeks after the massacre told us the following:
There were thousands of dead bodies hacked to pieces, on the roads.
Every Armenian who happened to pass through these roads, cursed and
spat on the corpses. In the courtyard of a mosque which was about
25x30 meter square, dead bodies were piled to a height of 140
centimeters. Among these corpses were men and women of every age,
children and old people. The women's bodies had obvious marks of
rape. The genitals of many girls were filled with gun-powder.
A few educated Armenian girls, who worked as telephone operators
for the Armenian troops were called by Lieutenant Colonel Gryaznov
to the courtyard of the mosque and he bitterly told them to be
proud of what the Armenians had done. To the lieutenant colonel's
disgusted amazement, the Armenian girls started to laugh and giggle,
instead of being horrified. The lieutenant colonel had severely
reprimanded those girls for their indecent behaviour. When he told
the girls that the Armenians, including women, were generally more
licentious than even the wildest animals, and that their indecent
and shameful laughter was the most obvious evidence of their inhumanity
and barbarity, before a scene that appalled even veteran soldiers,
the Armenian girls finally remembered their sense of shame and
claimed they had laughed because they were nervous.
An Armenian contractor at the Alaca Communication zone command
narrated the following incident which took place on February 20:
The Armenians had nailed a Turkish women to the wall. They had cut
out the women's heart and placed the heart on top of her head.
The great massacre in Erzurum began on February 7... The enlisted men
of the artillery division caught and stripped 270 people. Then they
took these people into the bath to satisfy their lusts. 100 people
among this group were able to save their lives as the result of
my decisive attempts. The others, the Armenians claimed, were
released when they learnt that I understood what was going on.
Among those who organized this treacherous act was the envoy to the
Armenian officers, Karagodaviev. Today, some Turks were murdered
on the streets.
On February 12, some Armenians have shot more than ten innocent
Moslems. The Russian soldiers who attempted to save these people were
threatened with death. Meanwhile I imprisoned an Armenian for
murdering an innocent Turk.
When an Armenian officer told an Armenian murderer that he would
be hanged for his crime, the killer shouted furiously: 'How dare
you hang an Armenian for killing a Turk?' In Erzurum, the
Armenians burned down the Turkish market. On February 17, I heard
that the entire population of Tepekoy village, situated within
the artillery area, had been totally annihilated. On the same
day when Antranik entered Erzurum, I reported the massacre to
him, and asked him to track down the perpetrators of this horrible
act. However no result was achieved.
In the villages whose inhabitants had been massacred, there was a
natural silence. On the night of 26/27 February, the Armenians deceived
the Russians, perpetrated a massacre and escaped for fear of the
Turkish soldiers. Later, it was understood that this massacre had
been based upon a method organized and planned in a circular.
The population had been herded in a certain place and then killed
one by one. The number of murders committed on that night reached
three thousand. It was the Armenians who bragged to about the details
of the massacre. The Armenians fighting against the Turkish soldiers
were so few in number and so cowardly that they could not even
withstand the Turkish soldiers who consisted of only five hundred
people and two cannons, for one night, and ran away. The leading
Armenians of the community could have prevented this massacre.
However, the Armenian intellectuals had shared the same ideas with
the renegades in this massacre, just as in all the others. The lower
classes within the Armenian community have always obeyed the orders
of the leading Armenian figures and commanders.
I do not like to give the impression that all Armenian intellectuals
were accessories to these murders. No, for there were people who
opposed the Armenians for such actions, since they understood that
it would yield no result. However, such people were only a minority.
Furthermore, such people were considered as traitors to the Armenian
cause. Some have seemingly opposed the Armenian murders but have
supported the massacres secretly. Some, on the other hand, preferred
to remain silent. There were certain others, who, when accused by
the Russians of infamy, would say the following: 'You are Russians.
You can never understand the Armenian cause.' The Armenians had a
conscience. They would commit massacres and then would flee in fear
of the Turkish soldiers."
Serdar Argic | 6 | trimmed_train |
4,234 | Archive-name: Xt-FAQ
Version: $Id: FAQ-Xt,v 1.28 93/04/02 12:41:12 ware Exp $
The X Toolkit Intrinsics F.A.Q
A monthly posting
This article contains the answers to some Frequently Asked Questions
(FAQ) from comp.windows.x about the X Toolkit Intrinsics. To submit
questions (preferably with an answer) send email to: [email protected]
Many FAQs, including this one, are available on the archive site
rtfm.mit.edu in the directory pub/usenet/news.answers. The name
under which a FAQ is archived appears in the Archive-name
line at the top of the article. This FAQ is archived as Xt-FAQ.
All code fragments are public domain.
Contents
0. Xt Glossary
1. Software Versions
2. Related FAQ's
3. Why does my application core dump when I use signals/alarms/cthreads?
4. How do I use a different visual than the default?
5. Which visual should an application use?
6. Why do only Shell widgets have a Visual?
7. Which visual, depth and colormap do Shells inherit?
8. I've done all the above and I still get a BadMatch error. Why?
9. Why doesn't my widget get destroyed when I call XtDestroyWidget()?
10. How do I exit but still execute the DestroyCallbacks?
11. How do I resize a Shell widget?
12. Why can't XtAppAddInput() handle files?
13. What good books and magazines are there on Xt?
14. What Widgets are available?
15. What alternatives to the Intrinsics are there?
16. How do I pass a float value to XtSetValues?
17. How do I write a resource converter?
18. How do I open multiple displays?
19. What changed from R3 to R4 to R5?
20. Where are the resources loaded from?
21. What order are callbacks executed in?
22. How do I know if a widget is visible?
23. How do I reparent a widget in Xt, i.e. XtReparentWidget()?
24. Why use XtMalloc, XtFree, etc?
25. How to debug an Xt application?
26. Why don't XtAddInput(), XtAddTimeout() and XtAddWorkProc() work?
27. What is and how can I implement drag and drop?
----------------------------------------------------------------------
0. Xt Glossary
----------------------------------------------------------------------
o The Xt Intrinsics implement an object oriented interface to C code
to allow useful graphical components to be created. Included with
this are classes that provide the base functionality: Object,
RectObj, Core, Composite, Constraint, Shell, OverrideShell, WMShell,
etc. The terms "Xt" and "Intrinsics" are used interchangeably,
however, they are used very precisely to mean a specific library of the X
window system. In particular, it does not include the Athena,
Motif, OLIT or any other widget set. Without further widgets the
Intrinsics are not especially useful.
o A widget refers to a user interface abstraction created via Xt. The
precise use, is any object that is a subclass of the Core class. It
is used loosely to refer to anything that is a subclass of the
Object class although these are more accurately called windowless
widgets or gadgets.
o Xlib is the C interface to the X11 protocol. It is one layer below
the Xt Intrinsics. Typically a widget uses relatively few Xlib
functions because Xt provides most such services although an
understanding of Xlib helps with problems.
----------------------------------------------------------------------
1. Software Versions
----------------------------------------------------------------------
The following are the latest versions of Xt based software:
_____________________________________________________________
Software Version Released Next Expected
_____________________________________________________________
X11R4 patch 18 (none)
X11R5 patch 21 12/18/92 ??
Athena Widgets (see X11R5)
Motif 1.2.1 9/92 ??
OLIT ?? ?? ??
Xtra 2.5 6/15/92 ??
Xw X11R4 (none)
Xcu X11R5 (none)
fwf 3.4 1/11/92 4/93
_____________________________________________________________
----------------------------------------------------------------------
2. Related FAQ's
----------------------------------------------------------------------
David B. Lewis (uunet!craft!faq) maintains the FAQ on X. It
is posted monthly on comp.windows.x and located on export in contrib/FAQ.
Liam R. E. Quin ([email protected]) posts an FAQ list on Open Look to
comp.windows.x.
Jan Newmarch ([email protected]) posts an FAQ list on Motif
to comp.windows.x.motif.
Peter Ware ([email protected]) posts an FAQ list for
comp.windows.x.intrinsics; it is on export in contrib/FAQ-Xt.
----------------------------------------------------------------------
3. Why does my application core dump when I use signals/alarms/cthreads?
----------------------------------------------------------------------
In brief, Xlib, Xt and most widget sets have no mutual exclusion for
critical sections. Any interrupt handler is likely to leave one of
the above libraries in an inconsistent state -- such as all the
appropriate flags not yet set, dangling pointers, in the middle of a
list traversal, etc. Note that the ANSI C standard points out that
behavior of a signal handler is undefined if the signal handler calls
any function other than signal() itself, so this is not a problem
specific to Xlib and Xt; the POSIX specification mentions other
functions which may be called safely but it may not be assumed that
these functions are called by Xlib or Xt functions.
The only safe way to deal with signals is to set a flag in the
interrupt handler. This flag later needs to be checked either by a
work procedure or a timeout callback. It is incorrect to add either
of these in the interrupt handler. As another note, it is dangerous
to add a work procedure that never finishes. This effectively
preempts any work procedures previously added and so they will never
be called. Another option is to open a pipe, tell the event loop
about the read end using XtAppAddInput() and then the signal handler
can write a byte to the write end of the pipe for each signal.
However, this could deadlock your process if the pipe fills up.
Why don't the Intrinsics deal with this problem? Primarily because it
is supposed to be a portable layer to any hardware and operating
system. Is that a good enough reason -- I don't think so.
Note: the article in The X Journal 1:4 and the example in O'Reilly
Volume 6 are in error.
----------------------------------------------------------------------
4. How do I use a different visual than the default?
----------------------------------------------------------------------
This requires a more complicated answer than it should. A window has
three things that are visual specific -- the visual, colormap and
border pixmap. All widgets have their own Colormap and BorderPixmap
resource; only shell widgets have Visual resources (another questions
deals with why shells have a Visual). The default value of these
resources is CopyFromParent which does exactly what it says. In the
shell widget CopyFromParent gets evalulated as DefaultVisualOfScreen
and DefaultColormapOfScreen. When any one of the three resources is
not properly set, a BadMatch error occurs when the window is
created. They are not properly set because each of the values depends
on the visual being used.
How to get this to work? There are two parts to the answer. The
first is if you want an application to start with a particular visual
and the second is if you want a particular shell within an application
to start with a different visual. The second is actually easier
because the basic information you need is available. The first is a
little harder because you'll need to initialize much of the toolkit
yourself in order to determine the needed information.
/*
* Some sample code to start up an application using something other
* than the default visual.
*
* To compile:
* cc -g visual.c -o visual -lXaw -lXmu -lXt -lXext -lX11 -lm
*
* To run:
* ./visual -geometry 300x300 -depth 24 -visual StaticColor -fg blue -bg yellow
*
* you need to move the mouse to get the particular visuals colormap
* to install.
*/
#include <X11/Intrinsic.h>
#include <X11/StringDefs.h>
#include <X11/Shell.h>
typedef struct
{
Visual *visual;
int depth;
} OptionsRec;
OptionsRec Options;
XtResource resources[] =
{
{"visual", "Visual", XtRVisual, sizeof (Visual *),
XtOffsetOf (OptionsRec, visual), XtRImmediate, NULL},
{"depth", "Depth", XtRInt, sizeof (int),
XtOffsetOf (OptionsRec, depth), XtRImmediate, NULL},
};
XrmOptionDescRec Desc[] =
{
{"-visual", "*visual", XrmoptionSepArg, NULL},
{"-depth", "*depth", XrmoptionSepArg, NULL}
};
int
main (argc, argv)
int argc;
char **argv;
{
XtAppContext app; /* the application context */
Widget top; /* toplevel widget */
Display *dpy; /* display */
char **xargv; /* saved argument vector */
int xargc; /* saved argument count */
Colormap colormap; /* created colormap */
XVisualInfo vinfo; /* template for find visual */
XVisualInfo *vinfo_list; /* returned list of visuals */
int count; /* number of matchs (only 1?) */
Arg args[10];
Cardinal cnt;
char *name = "test";
char *class = "Test";
/*
* save the command line arguments
*/
xargc = argc;
xargv = (char **) XtMalloc (argc * sizeof (char *));
bcopy ((char *) argv, (char *) xargv, argc * sizeof (char *));
/*
* The following creates a _dummy_ toplevel widget so we can
* retrieve the appropriate visual resource.
*/
cnt = 0;
top = XtAppInitialize (&app, class, Desc, XtNumber (Desc), &argc, argv,
(String *) NULL, args, cnt);
dpy = XtDisplay (top);
cnt = 0;
XtGetApplicationResources (top, &Options, resources,
XtNumber (resources),
args, cnt);
cnt = 0;
if (Options.visual && Options.visual != DefaultVisualOfScreen (XtScreen (top)))
{
XtSetArg (args[cnt], XtNvisual, Options.visual); ++cnt;
/*
* Now we create an appropriate colormap. We could
* use a default colormap based on the class of the
* visual; we could examine some property on the
* rootwindow to find the right colormap; we could
* do all sorts of things...
*/
colormap = XCreateColormap (dpy,
RootWindowOfScreen (XtScreen (top)),
Options.visual,
AllocNone);
XtSetArg (args[cnt], XtNcolormap, colormap); ++cnt;
/*
* Now find some information about the visual.
*/
vinfo.visualid = XVisualIDFromVisual (Options.visual);
vinfo_list = XGetVisualInfo (dpy, VisualIDMask, &vinfo, &count);
if (vinfo_list && count > 0)
{
XtSetArg (args[cnt], XtNdepth, vinfo_list[0].depth);
++cnt;
XFree ((XPointer) vinfo_list);
}
}
XtDestroyWidget (top);
/*
* Now create the real toplevel widget.
*/
XtSetArg (args[cnt], XtNargv, xargv); ++cnt;
XtSetArg (args[cnt], XtNargc, xargc); ++cnt;
top = XtAppCreateShell ((char *) NULL, class,
applicationShellWidgetClass,
dpy, args, cnt);
/*
* Display the application and loop handling all events.
*/
XtRealizeWidget (top);
XtAppMainLoop (app);
return (0);
}
----------------------------------------------------------------------
5. Which visual should an application use?
----------------------------------------------------------------------
This is a point that can be argued about but one opinion is there is
no way for an application to know the appropriate visual -- it has to
be specified by the user. If you disagree with this then your
application probably falls into the category of always using the
default visual or it is hardware specific and expects some particular
visual such as 24bit TrueColor with an OverlayPlane extension (or some
such).
Why? No application runs in isolation. Depending on the way a server
allocates resources I may not always want your application to run in
TrueColor mode if it is going to mess up my other applications. I may
be very upset if it chooses to run in GreyScale instead of PsuedoColor
or just monochrome.
As an example, on a low end color Sun server there are many different
possible visuals: monochrome, 256 entry colormap, static gray, static
color, and a 3/3/2 TrueColor. The SGI Iris's offer all the above
plus 12 bit TrueColor, 24 bit TrueColor, an Overlay Plane.
----------------------------------------------------------------------
6. Why do only Shell widgets have a Visual?
----------------------------------------------------------------------
This is strictly by convention. It makes it possible for an arbitrary
widget to know that the visual it uses can be found by looking for the
shell widget that is its ancestor and obtaining the visual of that
shell.
A widget can have its own visual resource. If it does, it must have
its own realize method to use the visual when it calls
XCreateWindow(). You should also make this a resource that can be
obtained with XtGetValues() so other widgets can find it. A
reasonable value is probably XtNvisual.
----------------------------------------------------------------------
7. Which visual, depth and colormap do Shells inherit?
----------------------------------------------------------------------
The default value for these resources are set to CopyFromParent. This
is interpreted as the DefaultColormapOfScreen(), DefaultDepthOfScreen()
and the default visual of the screen if the widget has no parent -- i.e.
it is an applicationShellWidgetClass and the root of your widget tree.
If the parent of the widget is not null, then the shell copies
colormap and depth from its parent and uses CopyFromParent as the
visual.
----------------------------------------------------------------------
8. I've done all the above and I still get a BadMatch error. Why?
----------------------------------------------------------------------
Some resource converters improperly cache references. This was
especially true of X11R3 and earlier versions of Motif.
----------------------------------------------------------------------
9. Why doesn't my widget get destroyed when I call XtDestroyWidget()?
----------------------------------------------------------------------
See section 2.8 of the Xt specification.
It eventually does get destroyed, just not immediately. The
Intrinsics destroy a widget in a two-phase process. First it and all
of its children have a flag set that indicate it is being destroyed.
It is then put on a list of widgets to be destroyed. This way any
pending X events or further references to that widget can be cleaned
up before the memory is actually freed. The second phase is then
performed after all callbacks, event handlers, and actions have
completed, before checking for the next X event. At this point the
list is traversed and each widget's memory is actually free()'d, among
other things.
As some further caveats/trivia, the widgets may be destroyed if the
Intrinsics determine that they have no further references to the
widgets on the list. If so, then the phase 2 destruction occurs
immediately. Also, if nested event loops are used, widgets placed on
the destroy list before entering the inner event loop are not
destroyed until returning to the outer event loop.
----------------------------------------------------------------------
10. How do I exit but still execute the DestroyCallbacks?
----------------------------------------------------------------------
The problem is if a simple and entirely reasonable approach to exiting
an application is used, such as calling exit() directly, then a widget
may not have a chance to clean up any external state -- such as open
sockets, temporary files, allocated X resources, etc. (this code for
simplicity reasons assumes only a single toplevel widget):
Widget
ToplevelGet (gw)
Widget gw; /* widget to find toplevel */
{
Widget top;
for (top = gw; XtParent (top); top = XtParent (top))
/* empty */;
return (top);
}
void
ExitCallback (gw, closure, call_data)
Widget gw; /* widget */
XtPointer closure; /* data the app specified */
XtPointer call_data; /* widget specific data */
{
Widget toplevel;
toplevel = ToplevelGet (gw);
XtUnmapWidget (toplevel); /* make it disappear quickly */
XtDestroyWidget (toplevel);
exit (0);
}
One can see that the above code exit's immediately after destroying
the toplevel widget. The trouble is the phase 2 destruction may never
occur.
This works for most widgets and most applications but will not work
for those widgets that have any external state. You might think that
since it works now it will always work but remember that part of the
reason an object oriented approach is used is so one can be ignorant
of the implementation details for each widget. Which means that the
widget may change and someday require that some external state is
cleaned up by the Destroy callbacks.
One alternative is to modify ExitCallback() to set a global flag and
then test for that flag in a private event loop. However, private
event loops are frowned upon because it tends to encourage sloppy, and
difficult to maintain practices.
Try the following code instead.
#include <X11/Intrinsic.h>
extern Widget ToplevelGet (
#if NeedFunctionPrototypes
Widget gw
#endif
);
extern Boolean ExitWorkProc (
#if NeedFunctionPrototypes
XtPointer closure
#endif
);
extern void ExitCallback (
#if NeedFunctionPrototypes
Widget gw,
XtPointer closure,
XtPointer call_data
#endif
);
Widget
ToplevelGet (gw)
Widget gw; /* widget to find toplevel */
{
Widget top;
for (top = gw; XtParent (top); top = XtParent (top))
/* empty */;
return (top);
}
void
ExitCallback (gw, closure, call_data)
Widget gw; /* widget */
XtPointer closure; /* data the app specified */
XtPointer call_data; /* widget specific data */
{
Widget toplevel;
toplevel = ToplevelGet (gw);
XtUnmapWidget (toplevel); /* make it disappear quickly */
XtDestroyWidget (toplevel);
XtAppAddWorkProc (XtWidgetToApplicationContext (gw),
ExitWorkProc, (XtPointer) NULL);
}
Boolean
ExitWorkProc (closure)
XtPointer closure;
{
exit (0);
/*NOTREACHED*/
}
ExitCallback() adds a work procedure that will get called when the
application is next idle -- which happens after all the events are
processed and the destroy callbacks are executed.
----------------------------------------------------------------------
11. How do I resize a Shell widget?
----------------------------------------------------------------------
After it is realized, one doesn't resize a Shell widget. The proper
thing is to resize the currently managed child of the Shell widget
using XtSetValues(). The geometry change is then propagated to the
Shell which asks the window manager which may or may not allow the
request. However, the Shell must have the resource
XtNallowShellResize set to True otherwise it will not even ask the
window manager to grant the request and the Shell will not resize.
To change the position of a Shell, use XtSetValues() on the Shell, not
the child, and within the limits of the window manager it should be granted.
----------------------------------------------------------------------
12. Why can't XtAppAddInput() handle files?
----------------------------------------------------------------------
It does, however Unix semantics for when I/O is ready for a file does
not fit most peoples' intuitive model. In Unix terms a file
descriptor is ready for reading whenever the read() call would not
block, ignoring the setting of optional flags that indicate not to
block. This works as expected for terminals, sockets and pipes. For
a file the read() will always return but the return indicates an EOF
-- i.e. no more data. The result is the code in the Intrinsics always
calls the input handler because it always thinks something is about to
be read. The culprit is the select() system call or on SYSV based
OS's it is the poll() system call.
How to get around this on a Unix system? The best approach is to use
another process to check for available input on the file. Use a pipe
to connect the application with this other process and pass the file
descriptor from the pipe to XtAppAddInput(). A suitable program on
BSD systems is "tail -f filename".
It's rumored that select() on some systems is not _completely_
reliable. In particular:
- IBM AIX 3.1: this is one where it would work for a while
(several thousand times) and then stop until some other
event woke it up. This seemed to be the result of a race
condition in the Kernel. IBM claims to have a fix for this.
- Pyramid, doesn't work at all.
- Ultrix (and possibly others where pipes are implemented as
sockets), wasn't completely broken, but although the writing
side wrote in 512 byte blocks the reading side received it
all broken up as if it was being put into the pipe a byte at
a time. You can waste a lot of time by reading small blocks
(get raound it by detecting the situation and having
select() ignore the pipe for 10 mseconds - by then it had
been given the whole block).
Note that all the above descriptions used Unix terminology such as
read(), file descriptor, pipes, etc. This is an OS dependent area and
may not be identical on all systems. However the Intrinsic designers
felt it was a common enough operation that it should be included with
part of the toolkit. Why they didn't also deal with signals at this
point I don't know.
----------------------------------------------------------------------
13. What good books and magazines are there on Xt?
----------------------------------------------------------------------
I have a favorite that is the definitive reference. To my perspective
it offers a reasonable introduction but also goes into the full
details of the Intrinsics. When I started using it I was already
familiar with Xt and the concepts behind it, so newcomers may or may
not find it useful. I've always found it accurate and complete, which
means its a 1000 pages.
Asente, Paul J., and Swick, Ralph R., "X Window System Toolkit, The
Complete Programmer's Guide and Specification", Digital Press,
1990, ISBN 1-55558-051-3, order number EY-E757E-DP; and by
Prentice-Hall, ISBN 0-13-972191-6. Also available through DEC
Direct at 1-800-DIGITAL.
The other book I commonly recomend to novices is:
Young, Doug. "The X Window System: Applications and Programming with
Xt (Motif Version)," Prentice Hall, 1989 (ISBN 0-13-497074-8).
(ISBN 0-13-972167-3)
And of course O'Reilly has an entire series of manuals on X and Xt.
O'Reilly ordering is 800-998-9938. In particular, Volume 5 is an Xt
reference done in manual page style. The 3rd edition is extensively
overhauled and goes far beyond the MIT manual pages. I'm finding it
very useful. In particular, the permutted index and references to
other manual pages help a great deal in chasing down related
information.
I read two periodicals, "The X Resource" and the "The X Journal".
These are the only two dealing specifically with X. "The X Resource"
is published quarterly, by O'Reilly, with one of the issues being the
MIT X Consortium Technical Conference Proceedings. There is no
advertising. I've found it informative with pretty good depth. For
orders, call 1-800-998-9938, or email [email protected]. For editorial
matters, email [email protected]. Table of contents are posted at
math.utah.edu in ~ftp/pub/tex/bib in TeX form and on ftp.uu.net in
~ftp/published/oreilly/xresource in ASCII form.
"The X Journal" is a bimonthly trade rag with lots of advertising.
The articles are informative and oriented toward a less technical
audience. I read it more to see what's going on then with an
expectation of learning a great deal (but remember, I represent a
fairly small percentage of people). Also, they have a pretty good
collection of people on the advisory board and as columnists. Call
(908) 563-9033.
----------------------------------------------------------------------
14. What Widgets are available?
----------------------------------------------------------------------
There are three popular widget sets:
Athena - The set provided with X11. This is sufficient for most
purposes but is on the ugly side. Recently, a 3d look is
available for ftp on export.lcs.mit.edu:/contrib/Xaw3d.tar.Z.
Motif - From OSF available for a license fee and commonly shipped on
many workstation vendors platforms (almost everyone but
Sun). It looks good and works well but personally I think
it is poorly implemented.
OLIT - The Open Look Intrinsics Toolkit is a set of widgets
implementing Sun's Open Look specification. Developed by
AT&T. I've never used it so can't comment on its quality.
I've heard rumours that it is a pain to actually get.
In addition the following collection of widgets are also available:
Xtra - a library of widgets for sale from Graphical Software
Technology (310-328-9338). It includes bar graph, stacked
bar graph, line graph, pie chart, xy plot, hypertext, help,
spreadsheet, and data entry form widgets. I've never seen
them so I can't comment.
FWF - The Free Widget Foundation is attempting to collect a set of
freely available widgets. Included are a Pixmap editor,
FileDialog, and a few others. The current set of widgets
can be obtained via anonymous ftp from the machine
a.cs.uiuc.edu (128.174.252.1) in the file pub/fwf.shar.Z.
Xcu - The Cornell University widgets from Gene Dykes. One of the
early widget sets released. Provides a nice appearance for
buttons and has a mini command language. Probably not so
widely used.
Xs - The Sony widget set. This was around during R3 days but
seemed to disappear. It looked like it had promise.
Xw - The HP widgets. The precursor to Motif. Originally written
for R3 there exists diffs to get it to work under R4 & R5.
Again, a pretty good widget set but has more or less died.
The precursor to this was the Xray toolkit which was
originally implemented for X10R4 and apparently provided
much experience for the designers of Xt.
Xo - A widget set I'm working on. It's still primitive but you
can give it a try in archive.cis.ohio-state.edu:pub/Xo/*
The following specialized widgets are also available:
Tbl - Implements a tabular layout of widgets. Supports Motif
widgets as children. Part of Wcl.
Plots - The Athena Plotting widgets (not the Athena widgets).
Contact [email protected] or [email protected].
----------------------------------------------------------------------
15. What alternatives to the Intrinsics are there?
----------------------------------------------------------------------
__________________________________________
Name Language Vendor
__________________________________________
Xview C Sun
OI C++ ParcPlace
Interviews C++ Stanford
Tcl/tk C sprite.berkeley.edu
__________________________________________
However much I like C and admire the skill in both designing and
implementing the Intrinsics, hopefully some alternative will develop
in the next 3-5 years that uses an object oriented language. Keep
your eyes open and expect some change about the same time a language
other than C _starts_ gaining acceptance.
----------------------------------------------------------------------
16. How do I pass a float value to XtSetValues?
----------------------------------------------------------------------
First, what is going wrong is the structure for an Arg is (essentially)
typdef struct
{
String name;
long value;
} Arg;
and the code:
Arg arg;
XtSetArg (arg, "name", 3.2)
expands to
Arg arg;
arg.name = "name";
arg.value = 3.2;
you can see that with normal C type conversions, the arg.value
gets the integer "3" instead of the floating point value "3.2". When
the value is copied into the widget resource, the bit pattern is
wildly different than that required for a floating point value. So,
how to get around this?
The following macro is from the Athena widgets document and I am now
recomending it over the previous suggestions.
#define XtSetFloatArg(arg, n, d) \
if (sizeof(float) > sizeof(XtArgVal)) { \
XtSetArg(arg, n, &(d)); \
} else { \
XtArgVal *ld = (XtArgVal *)&(d); \
XtSetArg(arg, n, *ld); \
}
----------------------------------------------------------------------
17. How do I write a resource converter?
----------------------------------------------------------------------
Courtesy of Rich Thomson ([email protected]):
The following discussion of resource converters assumes R4 (or R5)
Intrinsics. Resource converters changed between R3 and R4 to allow
for destructors and caching of converted values.
There are several main types of resource converters:
string to data type
data type to string
data type to data type
i) string to data type
Usually a string to data type converter has a fixed set of strings
that will be converted to data type values. This is most often
used to map enumerated names to enumerated values:
Name Value
"True" 1
"False" 0
In this case, the string to data type converter needs to compare
the resource value to the list of fixed strings. This is most
readily accomplished by the use of the "quark" mechanism of the
resource manager. The resource value is turned into a quark,
which is a unique representation of the string that fits into a
single word. Then the resource quark is compared against the
quarks for the fixed strings representing the enumerated values.
If there are many enumerated strings in the converter (or many
converters, each with a small number of enumeration strings), then
a global initialization routine might be used to turn all the
resource strings into quarks. That way, the first time one of
these converters is used, the strings will be turned into quarks
and held in static variables for use in the next invocation of one
of the converters.
ii) data type to string
This type of converter is slightly easier than the string to data
type converters since the use of quarks isn't necessary. Instead,
the data type value is simply converted to a string value,
probably by the use of sprintf.
Data type to string converters are useful for applications that
wish to convert an internal data type value into a string so that
they can write out a valid resource specification to a file. This
mechanism can be used to provide a "snapshot" of application state
into a file. This snapshot can be used to restore the program to
a known state via the usual X resource database mechanisms.
If you are taking the trouble to write a string to data type
converter, it isn't much extra effort to write the data type to
string converter. Writing both at the same time helps to ensure
that they are consistent.
iii) data type to data type
This type of converter is used to convert an existing data type
value to another data type. For instance, an X pixel value can be
converted to an RGB data type that contains separate fields for
red, green and blue.
The type signature for a resource converter is as follows:
typedef Boolean (*XtTypeConverter)(Display *, XrmValuePtr, Cardinal *,
XrmValuePtr, XrmValuePtr, XtPointer *);
Display *dpy;
XrmValuePtr args;
Cardinal *num_args;
XrmValuePtr fromVal;
XrmValuePtr toVal;
XtPointer *converter_data;
When the converter is invoked, the "fromVal" argument points to the source
X resource manager value and the "toVal" argument points to the
destination X resource manager value. The "converter_data" argument
is an opaque pointer to some converter-specific data that is specified
when the converter is registered. The "args" and "num_args" arguments
allow extra information to be passed to the converter when it is
invoked. For instance, the Pixel to RGB structure converter discussed
above would need colormap and visual arguments in which to lookup the
Pixel to obtain the RGB values corresponding to that pixel.
Care must be taken with the "toVal" argument. An XrmValue has the
following type definition and specifies a size and location for a
converted value:
typedef struct {
unsigned int size;
caddr_t addr;
} XrmValue, *XrmValuePtr;
When the converter is invoked, the address may point to a location of
the given size for the converted value or the location can be NULL.
In the former case, the converter should ensure that the size of the
destination area is large enough to handle the converted value. If
the destination area is not large enough, then the converter should
set the size to the amount of space needed and return False. The
caller can then ensure that enough space is allocated and reinvoke the
converter. If the size is large enough, then the converter can simply
copy the converted value into the space given and return True.
If the location is NULL, then the converter can assign the location to
the address of a static variable containing the converted value and
return True.
When writing a group of converters, this code is often repeated and it
becomes convenient to define a macro:
#define DONE(var, type) \
if (toVal->addr) \
{ \
if (toVal->size < sizeof(type)) \
{ \
toVal->size = sizeof(type); \
return False; \
} \
else \
*((type *) toVal->addr) = var; \
} \
else \
toVal->addr = (caddr_t) &var; \
toVal->size = sizeof(type); \
return True;
#define DONESTR(str) \
if (toVal->addr && toVal->size < sizeof(String)) \
{ \
toVal->size = sizeof(String); \
return False; \
} \
else \
toVal->addr = (caddr_t) str; \
toVal->size = sizeof(String); \
return True;
Inside the converter, it is a good idea to perform a little safety
checking on the "num_args" and "args" arguments to ensure that your
converter is being called properly.
Once you have written your converter, you need to register it with the
Intrinsics. The Intrinsics invokes resource converters when creating
widgets and fetching their resource values from the resource database.
To register a converter with a single application context, use
XtAppSetTypeConverter:
void XtAppSetTypeConverter(context, from, to, converter, args, num_args,
cache, destructor)
XtAppContext context;
String from;
String to;
XtTypeConverter converter;
XtConvertArgList args;
Cardinal num_args;
XtCacheType cache;
XtDestructor destructor;
To register a converter with all application contexts, use
XtSetTypeConverter:
void XtSetTypeConverter(from, to, converter, args, num_args,
cache, destructor)
String from;
String to;
XtTypeConverter converter;
XtConvertArgList args;
Cardinal num_args;
XtCacheType cache;
XtDestructor destructor;
In the R3 Intrinsics, there were the routines XtAppAddConverter and
XtAddConverter; these have been superseded by XtAppSetTypeConverter
and XtSetTypeConverter. Whenever possible, the newer routines should be
used.
When a converter is registered with the Intrinsics, a "cache" argument
specifies how converted resource values are to be cached:
XtCacheNone Don't cache any converted values
XtCacheAll Cache all converted values
XtCacheByDisplay Cache converted values on a per display basis
Caching converted values that require a round-trip to the server is a
good idea (for instance string to Pixel conversions).
The "destructor" argument is a routine that is invoked then the
resource is destroyed, either because its cached reference count has
been decremented to zero or because the widget owning the value is
being destroyed. XtDestructor has the following type definition:
typedef void (*XtDestructor)(XtAppContext, XrmValuePtr, XtPointer,
XrmValuePtr, Cardinal *);
XtAppContext context;
XrmValuePtr to;
XtPointer converter_data;
XrmValuePtr args;
Cardinal *num_args;
The destructor is invoked to free any auxiliary storage associated
with the "to" argument, but does not actually free the storage pointed
to by the "to" argument itself (to->addr). The destructor is passed
the extra arguments that were passed to the converter when the
conversion was performed (for instance, colormap and visual arguments
for the string to Pixel converter since the destructor would need to
free the allocated Pixel from the colormap) as well as the private
data passed in when the converter was registered.
Sample converter code can be found in the following files in the MIT
R5 distribution:
mit/lib/Xt/Converters.c
contrib/lib/PEXt/Converters.c
contrib/lib/PEXt/Converters.h
----------------------------------------------------------------------
18. How do I open multiple displays?
----------------------------------------------------------------------
See "Multi-user Application Software Using Xt", The X Resource, Issue 3,
(Summer 1992) by Oliver Jones for a complete coverage of the issues
involved. Most of this answer is based on that article. In a
nutshell, one uses XtOpenDisplay() to add each display to a _single_
application context and then XtCloseDisplay() to shutdown each display
and remove it from the application context.
The real problems occur when trying to close down a display. This can
happen 3 ways:
1. User selects a "quit" button on one of the displays,
2. User has window manager send a WM_DELETE_WINDOW message,
3. Server disconnect -- possibly from a KillClient message,
server shutdown/crash, or network failure.
I'll assume you can deal gracefully with 1 & 2 since it is _merely_ a
problem of translating a Widget to a display and removing that
display. If not, then read the Oliver Jones article.
The third one is difficult to handle. The following is based on the
Oliver Jones article and I include it here because it is a difficult
problem.
The difficulty arises because the Xlib design presumed that an I/O
error is always unrecoverable and so fatal. This is essentially true
for a single display X based application, but not true for a
multiple display program or an application that does things other than
display information on an X server. When an X I/O error occurs the
I/O error handler is called and _if_ it returns then an exit()
happens. The only way around this is to use setjmp/longjmp to avoid
returning to the I/O error handler. The following code fragment
demonstrates this:
#include <setjmp.h>
jmp_buf XIOrecover;
void
XIOHandler (dpy)
Display *dpy;
{
destroyDisplay (dpy);
longjmp (XIOrecover, 1);
}
main ()
{
...
if (setjmp (XIOrecover) == 0)
XSetIOErrorHandler (XIOHandler);
XtAppMainLoop (app_context);
}
The destroyDisplay() is something that given a Display pointer can go
back to the application specific data and perform any necessary
cleanup. It should also call XtCloseDisplay().
For those of you unfamiliar with setjmp/longjmp, when setjmp() is
first called it returns a 0 and save's enough information in the
jmp_buf that a latter execution of longjmp() can return the program to
the same state as if the setjmp() was just executed. The return value
of this second setjmp() is the value of the second argument to
longjmp(). There are several caveats about using these but for this
purpose it is adequate.
Some other problems you might run into are resource converters that
improperly cache resources. The most likely symptoms are Xlib errors
such as BadColor, BadAtom, or BadFont. There may be problems with the
total number of displays you can open since typically only a limited
number of file descriptors are available with 32 being a typical
value. You may also run into authorization problems when trying to
connect to a display.
There was much discussion in comp.windows.x about this topic in
November of 91. Robert Scheifler posted an article which basically
said this is the way it will be and Xlib will not change.
----------------------------------------------------------------------
19. What changed from R3 to R4 to R5?
----------------------------------------------------------------------
This addresses only changes in the Intrinsics. First, the general
changes for each release are described. Then a, certainly incomplete,
list of new functions added and others that are now deprecated are
listed. Brevity is a primary goal.
Much of the following information is retrieved from Chapter 13 of the MIT
Xt Intrinsics Manual and from O'Reilly Volume 5, 3rd edition.
From R3 to R4
- Addition of gadgets (windowless widgets)
- New resource type converter interface to handle cacheing and
additional data.
- Variable argument list interface.
- #define XtSpecificationRelease 4 (added with this release)
- WMShellPart, TopLevelShellPart & TransientShellPart changed
incompatibly.
- core.initialize, core.set_values added ArgList and count parameters
- event handlers had continue_to_dispatch parameter added
- core.set_values_almost specification changed.
- core.compress_exposure changed to an enumerated data type from Boolean
- core.class_inited changed to enumerated data type from Boolean
- constraint.get_values_hook added to extension record
- core.initialize_hook obsolete as info is passed to core.initialize
- shell.root_geometry_manager added to extension record
- core.set_values_hook obsolete as info is passed to core.set_values
- Calling XtQueryGeometry() must store complete geometry.
- Added UnrealizeCallback.
- XtTranslateCoords() actually works under R4.
From R4 to R5:
- Psuedo resource baseTranslation added.
- Searching for app-default, and other files, made more flexible
- customization resource added.
- Per-screen resource database.
- Support permanently allocated strings.
- Permanetly allocated strings required for several class fields.
- The args argument to XtAppInitialize, XtVaAppInitialize,
XtOpenDisplay, XtDisplayInitialize, and XtInitialize were changed
from Cardinal* to int*
- Many performance improvements (this is summarized from the article
"Xt Performance Improvements in Release 5" by Gabe Beged-Dov in "The
X Resource", Issue 3):
- XrmStringToQuark() augmented with XrmPermStringToQuark() to
avoid string copies. Several fields in the class record are
indicated as needing permanent strings.
- Using an array of Strings for resources
- Callback lists redesigned to use less memory
- Translation manager redesigned and rewritten so it takes
less memory, translation tables merges are faster, cache of
action bindings
- Keycode to Keysyms are cached.
- Better sharing of GC's with modifiable fields
- Window to Widget translation uses less space and faster
- Does not malloc space for widget name since quark is available
- Widget space is allocated to include the constraints
- Over several example programs, about a 26% reduction in
memory usage.
Functions new with R5:
----------------------
XtAllocateGC() - sharable GC with modifiable fields
XtGetActionList() - get the action table of a class
XtScreenDatabase() - return resource database for a screen
XtSetLanguageProc() - register language procedure called to set locale
Functions new with R4:
----------------------
XtAppAddActionHook() - procedure to call before _every_ action.
XtAppInitialize() - lots of initialization work.
XtAppReleaseCacheRefs() - decrement cache reference count for converter
XtAppSetFallbackResources() - specify default resources
XtAppSetTypeConverter() - register a new style converter
XtCallCallbackList() - directly execute a callback list
XtCallConverter () - invoke a new style converter
XtCallbackReleaseCacheRef() - release a cached resource value
XtCallbackReleaseCacheRefList() - release a list of cached resource values
XtConvertAndStore() - find and call a resource converter
XtDirectConvert() - Invoke old-style converter
XtDisplayOfObject() - Return the display
XtDisplayStringConversionWarning() - issue a warning about conversion
XtFindFile() - Find a file
XtGetActionKeysym() - Retrieve keysym & modifies for this action
XtGetApplicationNameAndClass() - return name and class
XtGetConstraintResourceList() - get constraints for a widget
XtGetKeysymTable() - return keycode-to-keysym mapping table
XtGetMultiClickTime() - read the multi-click time
XtGetSelectionRequest() - retrieve the SelectionRequest event
XtGetSelectionValueIncremental() - obtain the selection value incrementally
XtGetSelectionValuesIncremental() - obtain the selection value incrementally
XtInitializeWidgetClass() - initialize a widget class manually
XtInsertEventHanlder() - register event handler before/after others
XtInsertRawEventHandler() - register event handler without modify input mask
XtIsObject() - test if subclass of Object
XtIsRectObj() - test if subclass of RectObj
XtKeysymToKeyCodeList() - return list of keycodes
XtLastTimestampProcessed() - retrieve most recent event time
XtMenuPopdown - Action for popping down a widget
XtMenuPopup - Action for popping up a widget
XtOffsetOf - macro for structure offsets
XtOwnSelectionIncremental() - make selection data availabe incrementally
XtPoupSpringLoaded() - map a spring-loaded popup
XtRegisterGrabAction() - indicate action procedure needs a passive grab
XtRemoveActiohHook() - remove function called after every action
XtResolvePathname() - find a file
XtScreenOfObject() - return screen of object.
XtSetMultiClickTime() - set the multi-click time
XtSetWMColormapWindows() - set WM_COLORMAP_WINDOWS for custom colormaps
XtUngrabButton() - cancel a passive button grab
XtUngrabKey() - cancel a passive key grab
XtUngrabKeybard() - release an active keyboard grab
XtUngrabPointer() - release an active pointer grab
XtVa*() - varags interfaces to a bunch of functions
XtWindowOfObject() - return Window of nearest widget ancestor
Deprecated Replacement When
----------------------------------------------------------------------
XtAddActions() XtAppAddActions() R3
XtAddConverter() XtAppAddConverter() R3
XtAddInput() XtAppAddInput () R3
XtAddTimeout() XtAppAddTimeout() R3
XtAddWorkProc() XtAppAddWorkProc() R3
XtConvert() XtConvertAndStore() R4
XtCreateApplicationShell XtAppCreateShell() R3
XtDestroyGC() XtReleaseGC() R3
XtError() XtAppError() R3
XtGetErrorDatabase() XtAppGetErrorDatabase R3
XtGetErrorDatabaseText() XtAppGetErrorDatabaseText R3
XtGetSelectionTimeout() XtAppGetSelectionTimeout R3
XtInitialize() XtAppInitialize() R3
XtMainLoop() XtAppMainLoop() R3
MenuPopdown(action) XtMenuPopdown(action) R4
MenuPopup(action) XtMenuPopup(action) R4
XtNextEvent() XtAppNextEvent() R3
XtPeekEvent() XtAppPeekEvent() R3
XtPending() XtAppPending() R3
XtSetErrorHandler() XtAppSetErrorHandler() R3
XtSetErrorMsgHandler XtAppSetErrorMsgHandler() R3
XtSetSelectionTimeout() XtAppSetSelectionTimeout() R3
XtSetWarningHandler() XtAppSetWarningHandler() R3
XtSetWarningMsgHandler() XtAppSetWarningMsgHandler() R3
XtWarning() XtAppWarning() R3
XtWarningMsg() XtAppWarningMsg() R3
----------------------------------------------------------------------
20. Where are the resources loaded from?
----------------------------------------------------------------------
The resources of a widget are filled in from the following places
(from highest priority to lowest priority):
1. Args passed at creation time.
2. Command line arguments.
3. User's per host defaults file
4. User's defaults file.
5. User's per application default file.
6. System wide per application default file.
Note that 2-6 are read only once on application startup. The result
of steps 3-6 is a single resource database used for further queries.
The per host defaults file contains customizations for all
applications executing on a specific computer. This file is either
specified with the XENVIRONMENT environment variable or if that is not
set then the file $HOME/.Xdefaults-<host> is used.
The user defaults file is either obtained from the RESOURCE_MANAGER
property on the root window of the display or if that is not set then
the file $HOME/.Xdefaults is used. Typically, the program "xrdb" is
used to set the RESOURCE_MANAGER property. Please note that this
should be kept relatively small as each client that connects to the
display must transfer the property. A size of around 1-3KByte is
reasonable. Some toolkits may track changes to the RESOURCE_MANAGER
but most do not.
A user may have many per application default files containing
customizations specific to each application. The intrinsics are quite
flexible on how this file is found. Read the next part that describes
the various environment variables and how they effect where this file
is found.
The system wide per application default files are typically found in
/usr/lib/X11/app-defaults. If such a file is not found then the
fallback resources are used. The intrinsics are quite flexible on how
this file is found. Read the next part that describes the various
environment variables and how they effect where this file is found.
[Thanks to Oliver Jones ([email protected]) for the following, 6/92]
You can use several environment variables to control how resources are
loaded for your Xt-based programs -- XFILESEARCHPATH,
XUSERFILESEARCHPATH, and XAPPLRESDIR. These environment variables
control where Xt looks for application-defaults files as an
application is initializing. Xt loads at most one app-defaults file
from the path defined in XFILESEARCHPATH and another from the path
defined in XUSERFILESEARCHPATH.
Set XFILESEARCHPATH if software is installed on your system in such a
way that app-defaults files appear in several different directory
hierarchies. Suppose, for example, that you are running Sun's Open
Windows, and you also have some R4 X applications installed in
/usr/lib/X11/app-defaults. You could set a value like this for
XFILESEARCHPATH, and it would cause Xt to look up app-defaults files
in both /usr/lib/X11 and /usr/openwin/lib (or wherever your
OPENWINHOME is located):
setenv XFILESEARCHPATH /usr/lib/X11/%T/%N:$OPENWINHOME/lib/%T/%N
The value of this environment variable is a colon-separated list of
pathnames. The pathnames contain replacement characters as follows
(see XtResolvePathname()):
%N The value of the filename parameter, or the
application's class name.
%T The value of the file "type". In this case, the
literal string "app-defaults"
%C customization resource (R5 only)
%S Suffix. None for app-defaults.
%L Language, locale, and codeset (e.g. "ja_JP.EUC")
%l Language part of %L (e.g. "ja")
%t The territory part of the display's language string
%c The codeset part of the display's language string
Let's take apart the example. Suppose the application's class name is
"Myterm". Also, suppose Open Windows is installed in /usr/openwin.
(Notice the example omits locale-specific lookup.)
/usr/lib/X11/%T/%N means /usr/lib/X11/app-defaults/Myterm
$OPENWINHOME/lib/%T/%N means /usr/openwin/lib/app-defaults/Myterm
As the application initializes, Xt tries to open both of the above
app-defaults files, in the order shown. As soon as it finds one, it
reads it and uses it, and stops looking for others. The effect of
this path is to search first in /usr/lib/X11, then in /usr/openwin.
Let's consider another example. This time, let's set
XUSERFILESEARCHPATH so it looks for the file Myterm.ad in the current
working directory, then for Myterm in the directory ~/app-defaults.
setenv XUSERFILESEARCHPATH ./%N.ad:$HOME/app-defaults/%N
The first path in the list expands to ./Myterm.ad. The second expands
to $HOME/app-defaults/Myterm. This is a convenient setting for
debugging because it follows the Imake convention of naming the
app-defaults file Myterm.ad in the application's source directory, so
you can run the application from the directory in which you are
working and still have the resources loaded properly.
NOTE: when looking for app-default files with XUSERFILESEARCHPATH,
for some bizarre reason, neither the type nor file suffix is
defined so %T and %S are useless.
With R5, there's another twist. You may specify a customization
resource value. For example, you might run the "myterm" application
like this:
myterm -xrm "*customization: -color"
If one of your pathname specifications had the value
"/usr/lib/X11/app-defaults/%N%C" then the expanded pathname would be
"/usr/lib/X11/app-defaults/Myterm-color" because the %C substitution
character takes on the value of the customization resource.
The default XFILESEARCHPATH, compiled into Xt, is:
/usr/lib/X11/%L/%T/%N%C:\ (R5)
/usr/lib/X11/%l/%T/%N%C:\ (R5)
/usr/lib/X11/%T/%N%C:\ (R5)
/usr/lib/X11/%L/%T/%N:\
/usr/lib/X11/%l/%T/%N:\
/usr/lib/X11/%T/%N
(Note: some sites replace /usr/lib/X11 with a ProjectRoot in this
batch of default settings.)
The default XUSERFILESEARCHPATH, also compiled into Xt, is
<root>/%L/%N%C:\ (R5)
<root>/%l/%N%C:\ (R5)
<root>/%N%C:\ (R5)
<root>/%L/%N:\
<root>/%l/%N:\
<root>/%N:
<root> is either the value of XAPPLRESDIR or the user's home directory
if XAPPLRESDIR is not set. If you set XUSERFILESEARCHPATH to some
value other than the default, Xt ignores XAPPLRESDIR altogether.
Notice that the quick and dirty way of making your application find
your app-defaults file in your current working directory is to set
XAPPLRESDIR to ".", a single dot. In R3, all this machinery worked
differently; for R3 compatibilty, many people set their XAPPLRESDIR
value to "./", a dot followed by a slash.
----------------------------------------------------------------------
21. What order are callbacks executed in?
----------------------------------------------------------------------
(Courtesy of Donna Converse, [email protected]; 5/10/92)
The Intrinsics library do not guarantee an order. This is because
both the widget writer and the application writer have the ability to
modify the entire contents of the callback list. Neither one
currently knows what the other is doing and so the Intrinsics cannot
guarantee the order of execution.
The application programmer cannot rely on the widget writer; the
widget writer is not required to document when the widget will add and
remove callbacks from the list or what effect this will have;
therefore the functionality contained in a callback should be
independent of the functionality contained in other callbacks on the
list.
Even though the Xt standard in the definition of XtAddCallback
"callback_name: Specifies the callback list to which the
procedure is to be appended."
you may not infer from the word "appended" that the callback routines
are called in the same order as they have been added to the callback
list.
----------------------------------------------------------------------
22. How do I know if a widget is visible?
----------------------------------------------------------------------
(Courtesy of Donna Converse, [email protected]; 5/14/92)
Right, everything is implemented correctly. This demonstrates a "deficiency"
in the X protocol, and the Core widget is reflecting the capabilities of the
protocol. (The "deficiency" is that the information is available in one way,
in this case an inconvenient way.) The Xt specification is accurate, in
the second and third paragraphs of section 7.10.2, so read this section
carefully. The visible field will not change in response to iconification.
A VisibilityNotify event will not be received when the window goes from
viewable to unviewable, that is, when the widget or an ancestor is unmapped;
that is, when iconification occurs. This is the protocol deficiency.
Visibility state and viewable state have specific meanings in the X protocol;
see the glossary in your Xlib and X protocol reference manual.
You'll see this with any window manager, with no window manager.
As an application writer, keep track with a global Boolean in an action
routine with translations for MapNotify and UnmapNotify on the Shell widget
which contains your custom widget. As the custom widget writer, see the
map_state field returned by a call to XGetWindowAttributes. These are
suggestions.
----------------------------------------------------------------------
23. How do I reparent a widget in Xt, i.e. XtReparentWidget()?
----------------------------------------------------------------------
You can't.
----------------------------------------------------------------------
24. Why use XtMalloc, XtFree, etc?
----------------------------------------------------------------------
Unfortunately, most code that calls malloc(), realloc() or calloc()
tends to ignore the possibility of returning NULL. At best it is
handled something like:
ptr = (type *) malloc (sizeof (type))
if (!ptr)
{
perror ("malloc in xyzzy()");
exit (1)
}
To handle this common case the Intrinsics define the functions
XtMalloc(), XtCalloc(), XtNew(), XtNewString() and XtRealloc() which
all use the standard C language functions malloc(), calloc() and
realloc() but execute XtErrorMsg() if a NULL value is returned. Xt
error handlers are not supposed to return so this effectively exits.
In addition, if XtRealloc() is called with a NULL pointer, it uses
XtMalloc() to get the initial space. This allows code like:
if (!ptr)
ptr = (type *) malloc (sizeof (type));
else
ptr = (type *) realloc (ptr, sizeof (type) * (count + 1));
++count;
to be written as:
ptr = XtRealloc (ptr, sizeof (ptr) * ++count);
Also, XtFree() accepts a NULL pointer as an argument. Generally, I've
found the Xt functions conveniant to use. However, anytime I'm
allocating anything potentially large I use the standard functions so
I can fully recover from not enough memory errors.
XtNew() and XtNewString() are conveniant macros for allocating a
structure or copying a string:
struct abc *xyzzy;
char *ptr;
char *str = "abcdef";
xyzzy = XtNew (struct abc); /* takes care of type casting */
ptr = XtNewString (str);
A strict interpretation of the Intrinsics reference manual allow an
implementation to provide functions that are not exchangable with
malloc() and free(). I.e. code such as:
char *ptr;
ptr = XtMalloc (100);
/* ... */
free (ptr);
may not work. Personally, I'd call any implementation that did this
broken and complain to the vendor.
A common error for Motif programmers is to use XtFree() on a string
when they should really be using XmStringFree().
----------------------------------------------------------------------
25. How to debug an Xt application?
----------------------------------------------------------------------
First, I'd recomend getting "purify" from Pure Software. This is a
great package for tracing memory problems on Sun's. It's a bit pricey
at $2750 but I'd still recomend it. Excuse the marketing blurb
(contact [email protected] for more info).
Purify inserts additional checking instructions directly into
the object code produced by existing compilers. These
instructions check every memory read and write performed by
the program under test and detect several types of access
errors, such as reading unitialized memory, writing past
malloc'd bounds, or writing to freed memory. Purify inserts
checking logic into all of the code in a program, including
third party and vendor object-code libraries, and verifies
system call interfaces. In addition, Purify tracks memory
usage and identifies individual memory leaks using a novel
adaption of garbage collection techniques. Purify's nearly
comprehensive memory access checking slows the target program
down typically by a factor of two to five.
An alternative package that isn't as pricey ($395 for a Sun), runs on
many Unix's and has pretty similar features is "The SENTINEL Debugging
Environment". This replaces malloc() and several other C library
functions to add additional checks. (contact [email protected]
for more info)
Next, if you are getting any sort of Xlib error, you'll need to run in
synchronous mode, easily accomplished with the "-sync" command line
argument or by setting the variable Xdebug to 1 with your debugger. Then
set a break point in exit(). This will let you trace back to the
original Xlib function being called. If you don't run in synchronous
mode, then the actual error may have occured any number of calls to
Xlib previously since the Xlib calls are buffered and replies from the
server are asynchronous.
Next, if you are having trouble with window layout, you can use the
undocumented resource "xtIdentifyWindows" or the class resource
"XtDebug" to cause the widget name to be identified with each window.
For example:
example% xload -xrm '*XtDebug:true' &
example% xwininfo -tree
<click in new xload window>
will give the normal information but the widget name and class of each
window is included. This can help for checking the location and size
of errant widgets.
Next, if you are having trouble with geometry managers or you want to
test the way a widget manages it's children, you can try
export.lcs.mit.edu:contrib/libXtGeo.tar.Z. This acts as a filter
between any children and a geometry manager and checks the behaviour
of both. It's a very clever idea.
The most unfortunate problem is debugging a callback while the
application is executing a grab of the keyboard or mouse (such as from
a pulldown menu). The server effectively locks up and you'll need to
go to another machine and kill the debugger manually. The server
locks up because the application being debugged has said no one else
can have access to the keyboard but the application is not stopped
waiting because the debugger is waiting for your commands.
Unfortunately you can't give them because all the input is going to
your application which is stopped.
The best way to debug this kind of problem is with two machines on
your desk, running the program under a debugger (or other environment)
on one machine, and running the application on the other, possibly
using a command sequence like this:
othermachine% xhost +thismachine
thismachine% setenv DISPLAY othermachine:0;
thismachine% gdb application # Your favorite debugger.
or this:
othermachine% xhost +thismachine
thismachine% gdb application
(gdb) set environment DISPLAY othermachine:0
(gdb) run ...
I believe CodeCenter, a C interpreter/graphical debugger has a method
of dealing with this by explicitely calling the Xlib functions to
release any grabs during breakpoints.
Debugging widget problems requires pretty good debugging skills and
knowledge of how widgets work. You can go a long way without knowing
the internals of a particular widget but not very far without
understanding how a widget works. Judicious use of conditional
breakpoints and adding print statements with the debugger help a great
deal.
----------------------------------------------------------------------
26. Why don't XtAddInput(), XtAddTimeout() and XtAddWorkProc() work?
----------------------------------------------------------------------
I have got a delicate problem with the three routines XtAddInput,
XtAddTimeOut and XtAddWorkProc. The problem I have is that when
I use them in my application they seem not to be registred properly.
I have made a handy little testprogram where everything works
perfect, but in my "real" application nothing happens.
The introduction in R3 of the XtApp*() functions obsoleted those
routines (see Q19 for other changes in R3, R4, and R5). What happens is
they use a default application context different then the one you may
have created. Since events and timeouts are distributed on a per
application context basis and you are using two application contexts,
you won't get those events.
For example:
...
cnt = 0;
toplevel = XtAppInitialize(&app, class,
Desc, XtNumber (Desc),
&argc, argv,
Fallback, args, cnt);
XtAddTimeOut (...)
XtAddWorkProc (...)
XtAppMainLoop (app)
would never invoke the timeout.
----------------------------------------------------------------------
27. What is and how can I implement drag and drop?
----------------------------------------------------------------------
(Courtesy of Roger Reynolds, [email protected]; 19 Feb 93)
Drag-n-drop is a buzzword for moving data between clients, in an
``intuitive'' fashion.
Motif Version 1.2 supports drag-n-drop capabilities, OpenLook has
supported d-n-d all along. The two protocols are not compatable with
each other, and so far as I know, they are not published.
I wrote a package called RDD which is designed to be a flexible public
protocol for doing drag 'n drop operations between clients. My
intention was to provide a tool which would make it easy for people to
support a "standard" drag-n-drop protocol in the programs they develop
and contribute or sell, regardless of what widget set is used (as long
as it is based on Xt).
The implementation is based upon my understanding of the ICCCM
conventions, for more details read the code.
I have heard from dozens of people using RDD who like it and feel that
it works a whole lot better than Motif 1.2 stuff. Also, there seem to
be many who think that it is neat but are constrained to use Motif
anyway.
The latest RDD (and some other stuff) is available for ftp from
netcom.com, in /pub/rogerr. A (possibly older) version is also
available on export.lcs.mit.edu in /contrib. | 16 | trimmed_train |
3,647 | Try wuarchive.wustl.edu in the mirrors/win3 directory.
| 18 | trimmed_train |
776 | Help!! I need code/package/whatever to take 3-D data and turn it into
a wireframe surface with hidden lines removed. I'm using a DOS machine, and
the code can be in ANSI C or C++, ANSI Fortran or Basic. The data I'm using
forms a rectangular grid.
Please post your replies to the net so that others may benefit. IMHO, this
is a general interest question.
Thank you!!!!!!
| 1 | trimmed_train |
7,803 |
Concurrent has a product called RealTimeX (tm) that is a set of real-time
extensions to the X Window System. RealTimeX is currently supported on
the Concurrent Series 7000 and Series 8000 with the GA5000 graphics
accelerator. If you need/want more info, let me know.
- sam black
-------------------------------------------------------------------------------
Once you remove the absurdity from human existence, there isn't much left.
__________
/ _______/__
/__/______/ / [email protected]
Concurrent /_________/
Computer Corporation | 16 | trimmed_train |
1,970 |
Really? Why are so you worried about high school kids "getting their kicks"
with scanners, as compared to what the feds can do, and have done, to their
targets?
"Better than the status quo" isn't good enough, I'd say. The same
technology could be implemented WITHOUT a back door open to the state.
We all know about power and corruption. But we all know that abuse is
something that only happens to the other guy.
--
------------------------------------------------------------------------------
John Hesse | A man,
[email protected] | a plan,
Moss Beach, Calif | a canal, Bob. | 7 | trimmed_train |
4,561 |
Do you really need to switch to a DX2/66 instead of a DX50? As I
understand it, DX50's can have local bus devices (on the mother-board?)
but not local bus slots. And according to what I been told, many
systems go beyond the VESA local bus standard in order to provide DX50
systems with a local bus slot capability. I have definitly seen a
mother board with 2 local bus slots which claimed to be able to
support any CPU, including the DX2/66 and DX50. Can someone throw
some more informed light on this issue?
You will need to check with peripheral makers to see if their boards
will work at 50 MHz. Some will with some motherboards.
| 3 | trimmed_train |
1,937 | Excerpts from the Clipper announcement, with some questions:
In these two sections the phrases `or other legal order' and `normally a
court order' imply there is some other way or ways of doing a legal
wiretap. What is/are these? How do they affect the way people who trust the
system of court orders to protect them feel about this escrow system?
The second section shows the sequence of events.
The law enforcer, armed with his warrant, attaches his headphones to the
line with his croc-clips (remember, these are the folk who couldn't cope
with digital telephony) and hears a load of modem-like tones (we are
talking analogue telephony here).
What next? What modulation scheme do these Clipper boxes use?
Is it possible to record the tones for use after the keys are obtained?
I thought it was quite difficult to record a modem session at some
intermediate point on the line. Maybe they have taken a crash course
in data comms and have a unit that demodulates the tones and stores the
digital stream for decryption later. This would still suffer from the
same problems as trying to record the tones as the demodulator would not
be at one end of the line. If calls can't be recorded for decryption later
it would be quite easy to foil the system by buying lots of Clipper units
(these are supposed to be cheap mass market items) and using them in turn.
How tolerant is the modulation scheme to errors? These things are proposed
for use by US corporations to secure their foreign offices, where phone
line quality may well be poor. It seems hard enough to me to get digitised
speech of any quality into something a modem can handle without having to
add lots of error correction to keep the decryption in sync.
This raises an intersting question in the UK. Here it is illegal to connect
anything to a public telecomms network without it being approved by a body
called BABT. It has been stated, either here or in the uk.telecom group,
that they will not approve equipment that does encryption. I don't know
if this is true or not, but this would make a good test case.
Perhaps `friendly' countries, and the UK may still qualify, will get
to fish in the escrowed key pool as well.
| 7 | trimmed_train |
4,380 | Does anyone know if the Twins games are broadcast in
good ole Ames Iowa?????????????? | 2 | trimmed_train |
5,929 | Sorry but I forgot this ps.
Right now my sight is getting news about two weeks behind so it's
kind of necessary (to me) that any responses be sent to me directly.
Thanks a lot | 10 | trimmed_train |
294 |
CNN just claimed he bought 104 "semi-automatic assault rifles". And
they say Koresh wasn't god-like... He managed to buy or build a
collection of fully-automatic semi-automatic rifles... Quite a feat,
I would say. ;-)
They're still making charges of "sexual abuse" and such, or course.
Nobody seems to have noticed that the Treasury department has nothing
to do with sex crimes. Or maybe the feds have recently instituted a
TAX on sex crimes... Yeah, that's why the BATF was there, looking for
unregistered *guns* ("this is my weapon, this is my gun, this is for
fighting, this is for...").
I also heard that they're claiming to be cautious because of Koresh's
"heated ammunition stockpile". I seem to recall that smokeless powder
tends to decompose at even moderate temperatures. I would be rather
surprised, after a fire of that nature, if *any* of his "stockpile" is
unexploded, or unburned.
I seem to recall that aluminum powder is a common component of
fireworks... The folks on rec.pyro could probably tell you.
I think *anything* is legal if you have the proper license. If he had
a "curios and relics" permit, I believe he could legally own
handgrenades to go with his launcher.
--
Charles Scripter * [email protected]
Dept of Physics, Michigan Tech, Houghton, MI 49931 | 9 | trimmed_train |
4,472 | I have a pair of car speakers for sale. They are BRAND NEW, still in box and
plastic wrap. I got them at Highland's going-out-of-business sale just yesterday
However they won't fit my car's rear deck because it's not the right size.
So, I am trying to sale them here.
INFINITY RS-6903
6x9 Three-Way
Freq. Resp. 40-22k Hz
Power Capacity: 90 Watts per channel
Sensitivity: 93 dB SPL/1W/1m
Impedance 4 ohms
Mouting Depth 3"
List Price $200
Stereo Store $140-165 + tax
Mail Order Catalog Price $149 + S/H
My Price $120 obo + Shipping
Please e-mail me at [email protected]
or call me at (317)743-1394 | 5 | trimmed_train |
1,800 | I think there is a huge difference in the materials and
process for printer/toner PCB's. I get first time, everytime
results from a local HP Postscript, and hardly ever works from
copies of the same artwork. The printer results are so good
that I have quit even looking for PC board processes. If I had
to use the copier version, I would think I would look elsewhere.
The moral? Experiment and find what works. Toner transfer CAN
give excellent results. It, like any process, gives erratic
results with variable inputs. | 11 | trimmed_train |
8,453 | There have been a *lot* of posts lately about "I wanna buy my first bike - is a
GSXR/ZX/CBR/FZR a good bike to learn on?" etc.
I think I'm going to put together a FAQ on buying a new bike. Ravi used to post
one all the time. | 12 | trimmed_train |
8,067 | I thought that was Sandy Koufax. | 2 | trimmed_train |
5,685 |
Obviously never rode a good 250 or open-class bike! | 12 | trimmed_train |
6,078 | Hi, someone is selling his bmw R65 ( I think it's an '84 ) w/ 15k
miles for $2200. He says it's in great condition and perfect shape.
It's got the 2 hard saddle bags, too.
Is this a good deal? Seems like an awesome deal. Is it - assuming that
everything he says is true ?
Thanks,
Jae
| 12 | trimmed_train |
7,951 | Hello,
I am looking for the Coleco Tablehockey games that were popular
in the 70's. The games that I seek have straight slots for the
defenseman, not the S shaped slots. The players are attatched to
rods operated with springs. If you have a game(or games) that
you would be willing to part with, please send me an e-mail
message at [email protected]. Price is negotiable and
I would also cover shipping if you are out of state. I am
part of a league that plays on a regular basis, the CTHL (The
Chicago Table Hockey League), and need a game to practice on.
Also, the league itself is always interested in purchasing
games to expand itself.
Thank You,
Ken Harris.
equipment to expand it's size.
| 5 | trimmed_train |
10,427 | I think you can add former A's first baseman Mike Epstein (no relation) to
the list. | 2 | trimmed_train |
8,422 | Re: More on Gun Buybacks
The Denver buy back, trading guns for Denver Nuggets tickets was pretty much
a bust. Very few guns were turned in. The news tried to hype it but
when the best they could do was ".... including a loaded .38..." well,
you get the picture.
A side note- the news also reported that the guns would be checked for
whether or not they were stolen. STOLEN GUNS WILL BE RETURNED TO THEIR
OWNERS!!!!! (They say)
(Does this have anything to do with the rally on the Capital steps yesterday
in support of the RKBA????)
Even the rally made the 5 pm news on 3 channels :-)
| 9 | trimmed_train |
4,381 |
John,
The problem here is that you have taken one peice of my response, without
bothering to connect it with the other parts. I have repeatedly noted that
one needs to take the problematic historcity of acts and then examine the
work of John Dominic Crossan and Burton Mack. Once you have taken the time
to examine recent developments in biblical scholarship, I think you will
grasp more clearly what I am saying.
Certainly this is an issue as I think the situation in Waco shows most
clearly. If all that is required is that people are willing to die for a
belief for it to be true, then surely David Koresh is the son of God. No,
the spurrious arguement that the resurrection had to be true for people to be
willing to die must be put to rest. The other problem is that it is so
monologocentric. Even if the resurrection was a big deal (which it doesn't
seem to have been for either Q, Thomas, or even John to a certain degree)
there are a lot of other things which the Early Christians could have been
doing together that would have been worth dying for. It is my belief that
even the idea of a mixed race community, which brought down regional/national
boundaries in the name of koinonia could have been enough for people to be
willing to die. Radical communties do that (e.g. Jonestown, Waco, Warsaw, etc)
But my original point was that roman persecution (which is the only persecution
we have documented proof of) was not about whether a carpenter came back from
the dead. Such a claim was not unique nor particularly abhorent to the roman
or greek mind. My point is that avoidance of military and civic duty (i.e.
emperor worship) would have been much more problematic -- which has nothing
to do with the resurrection at all. When nero used christians as human
torches to light up his dinner party it wasn't because the believe in a
risen savior, it was because they were supposedly involved in incest and
cannablism. The argument that christians were martyred for the resurrection
just cannot stand up to critical examination. | 0 | trimmed_train |
6,258 |
Peter, there's a radiosity package ahead. The only problem is: there
are a few miles to sail ... ;-^
Let's be serious... I'm working on a radiosity package, written in C++.
I would like to make it public domain. I'll announce it in c.g. the minute
I finished it.
That were the good news. The bad news: It'll take another 2 months (at least)
to finish it.
In the meantime you may have a look at the file
Radiosity_code.tar.Z
located at
compute1.cc.ncsu.edu
(there are some other locations; have a look at archie to get the nearest)
Hope that'll help.
Yours
Stephan
----------------------------------------------------------------------------
Stephan Amann SIG Computer Graphics, University of Berne, Switzerland
[email protected]
Tel +41 31 65 46 79 Fax +41 31 65 39 65
Projects: Radiosity, Raytracing, Computer Graphics
| 1 | trimmed_train |
7,358 | [email protected] (Ian Kennedy) writes...
More along the lines of Hebrews 12:25-29, I reckon...
See that you refuse not him that speaks. For if they
escaped not who refused him that spake on earth, much
more shall not we escape, if we turn away from him that
speaks from heaven:
Whose voice then shook the earth: but now he has promised,
saying, Yet once more I shake not the earth only, but also
heaven.
And this word, Yet once more, signifies the removing of
those things that are shaken, as of things that are made,
that those things which cannot be shaken may remain.
Wherefore we receiving a kingdom which cannot be moved,
let us have grace, whereby we may serve God acceptably
with reverence and godly fear:
For our God is a consuming fire.
Or 2nd Thessalonians 1:7-10...
And to you who are troubled rest with us, when the Lord
Jesus shall be revealed from heaven with his mighty angels,
In flaming fire taking vengeance on them that know not God,
and that obey not the gospel of our Lord Jesus Christ:
Who shall be punished with everlasting destruction from
the presence of the Lord, and from the glory of his power;
When he shall come to be glorified in his saints, and to be
admired in all them that believe (because our testimony
among you was believed) in that day.
Kinda gives Flaming a whole new meaning, I reckon.
- < > -
The impression I got from talking with Livingston was that the coming
of the Lord, power-wise, is going to be something that those who are
unprepared can't handle -- kinda like overloading a fuse -- due to
guilt. Somehow it seems to also apply to the entire physical world as
we know it. LF suggests that God doesn't want that and has sent Koresh
as a reminder.
Seems that those who have been purified through salvation, or that those
protected by the Seals, will be the ones who survive. And no -- I don't
have a good idea yet what "being shielded by the seals" actually involves
or how exactly it relates to salvation. (Other than it involves the
marriage of the Bridegroom and the Bride... for those of you Biblical
well versed.)
- < > -
Me personally, I'm totally 100% dependent on God through Christ, so
if God wants me to understand, good. If not, also good. If God wants
to save me, or dispose of me, that's great either way. Being born in
the Spirit, means being part of the Body of Christ (Ephesians 2), so
who and what I was, matters little. * What's important is loving GOD *
Come Nova, Nuke, or Apocalypse -- who cares? Satan might even be able
to pull off a pretty convincing fake. Big deal. Not worth fearing or
worrying about though, not before:
-* The Greater Glory of GOD *-
Maybe Koresh is right, maybe he isn't, and it should be interesting to
see the new message (or prophecy). The tour of the Bible I've taken in
studying the passages he points to in the 3-02 text, has been most re-
warding. But the test of prophecy is still the fruit it bears -- which
is not yet clear.
Much much more important is "Charity" -- which by definition *is* --
Love for GOD
(I hope Dear Reader, you've taken all this as an expression of faith,
and not a statement of mere fact. Seems many folks get real upset at
reminders. ;-) | 15 | trimmed_train |
4,149 |
Kaldis, you are a worm.
Translation- It's them DAMN liberals again!
Who gave you the authority to create and enforce this rather
hazy thing called "the American Way"? This is a democracy, and
we don't need to stick to it or stick up for it unless we so
choose. Remember that, Ted, from Civics class in Greeley, CO?
Nice generalization.
Coming from such a crass example of "manly dignity," he must
feel _really_ hurt. | 13 | trimmed_train |
10,559 |
My Honda has a cable release that can be locked out with the ignition key.
The valet key can be left with someone and will NOT unlock the trunk
or enable the cable release. | 4 | trimmed_train |
205 | 10 | trimmed_train |
|
813 | A week or so ago, I posted about a problem with my SE/30: I have 20 megs
or true RAM, yet if I set my extensions to use a large amount of memory
(total of all extensions) then my system will crash before the finder
comes up. What I meant was having a large amount of fonts load, or
sounds, or huge disk caches with a control panel other than Apple's
memory control panel. Apple's cache is at 64K, mode 32 is on, and
so is 32 bit addressing. All extensions work by themselves or with the
others until I increase the memory used by some of them (with methods
mentioned above).
Well, here's my latest followup... I ran NOWs System Profile and got
this information:
%%% Memory info %%%
Physical RAM size: 20480K.
Logical RAM size: 20480K.
Size of Low Memory Area: 8K.
Virtual Memory: Inactive.
Addressing mode: 32bit mode in use.
32 bit System zone: Absent.
Parity RAM: Not capable.
Growable System Heap: True.
Temporary memory support: Present.
Tempory Memory Support: Real and tracked.
Note that 32 bit System zone is absent. Could this be the problem?
How can I turn this on? Any ideas?
Can anyone help? | 14 | trimmed_train |
2,340 | I want to convert a 500 Volt sinewave with frequency between 1 kHz
and 10 kHz, to a 10 Volt sinewave with the same frequency, by
means of a transformer. The secondary current will be .6 A (600 mA).
What kind of transformer should I use (ferrite?)
Can I buy one? If so, I need a partnumber and supplier
If I cannot buy one, how do I go about winding one myself?
What core do I use, how big must it be in order not to saturate,
what thickness copper wire, how many turns, etc.?
I know little about analog electronics, so I hope some kind
soul here will help me out.
Pointers to relevant databooks will also be highly appreciated.
Thanks, | 11 | trimmed_train |
7,886 | I have a thermal fuse from a Apple Laserwriter II power supply (Made
by Cannon) that I need to replace. The fuse is not the standard
tubular thermal fuse like those found in hair driers etc, but is a
rectangular plastic package, much like a transistor or diode. It
is about 0.2"x0.2"x0.1", with both leads coming out of one of the
0.1"x0.1" sides. I have been told that it was made by MITI, a asian
company, but I can find no information as to a supplier. This fuse
is rated at 1A, 130C. Does anyone have a source for this fuse? I
only need 5 or so, which means that the manufacturer wouldn't even want
to talk to me, let alone, deal with me.
Please advise via E-mail.
Thanks,
Pat
| 11 | trimmed_train |
10,407 |
I can definitily say that you can use an RLL as Master and IDE as slave, as
I have just upgraded my machine with a 200Mb IDE ( And custom Controller
Mdl CI-1010 Extended IDE Controller ) While maintaining my RLL'd Wren as
master Drive. The trick is the controller which supports up to 4 IDE Drives
while coexisting with existing Controllers ( MFM,RLL,ESDI,SCSI ).
So according to the Documentation it should work with ESDI, and I can assure
you it works with RLL. | 3 | trimmed_train |
8,005 |
I would be happy to discuss the issue of the 12 Imams with you, although
my preference would be to move the discussion to another
newsgroup. I feel a philosophy
or religion group would be more appropriate. The topic is deeply
embedded in the world view of Islam and the
esoteric teachings of the Prophet (S.A.). Heresy does not enter
into it at all except for those who see Islam only as an exoteric
religion that is only nominally (if at all) concerned with the metaphysical
substance of man's being and nature.
A good introductory book (in fact one of the best introductory
books to Islam in general) is Murtaza Mutahhari's "Fundamental's
of Islamic Thought - God, Man, and the Universe" - Mizan Press,
translated by R. Campbell. Truly a beautiful book. A follow-up book
(if you can find a decent translation) is "Wilaya - The Station
of the Master" by the same author. I think it also goes under the
title of "Master and Mastership" - It's a very small book - really
just a transcription of a lecture by the author.
The introduction to the beautiful "Psalms of Islam" - translated
by William C. Chittick (available through Muhammadi Trust of
Great Britain) is also an excellent introduction to the subject. We
have these books in our University library - I imagine any well
stocked University library will have them.
From your posts, you seem fairly well versed in Sunni thought. You
should seek to know Shi'ite thought through knowledgeable
Shi'ite authors as well - at least that much respect is due before the
charge of heresy is levelled. | 8 | trimmed_train |
8,789 |
Tough question -- more dangerous than driving a car, and far more
dangerous if you don't apply a modicum of intelligence to the
activity. Basically, stupidity will get you hurt/killed a lot
faster on a motorcycle than in a car. But with care, it is
not unreasonably dangerous. Also, buying good protective
clothing is helpful, that way if something does go wrong,
you are likely to be less severely injured.
First thing, if possible take a (MSF) driver training course,
this will get you started on the right foot -- they teach
control of the vehicle and safe riding practices.
Second, buy protective gear. At minimum a good helmet
and a pair of leather gloves are a must. A good sturdy
piece of footgear is also very helpful, though leather hiking
boots, a pair of old army boots, or something similar works fine
for this purpose as long as you make sure the laces stay
tied. After those, a leather jacket and leather pants or chaps
are nice as well; but these are also expensive items. For the
pants, many people consider a good pair of jeans to be reasonable,
preferably recent and of a fairly heavy weight. Similarly for
a jacket, a good jean jacket is a reasonable compromise, though
more people tend to have leather jackets around than pants. Another
thing to do is drop in on garage sales looking for a second-hand
leather jacket. Look for a fairly thick leather in these items.
Third don't do anything stupid -- don't ride after
drinking, even one drink can noticeably affect you judgement
and balance; don't ride in the snow, or when conditions
are such that black ice is likely; be very careful riding
in the rain -- slow way down, take corners gingerly,
brake early and gently; try not to ride if you are sick,
tired, taking any medication with drowsiness warnings, or
otherwise not in average shape.
With care, you should be ok.
I would suggest mid to late 80's japanese mid-sized standard.
Something in 400-650 cc range would probably be reasonable. If
you are shorter/lighter than average, you might want to go as
low as a 300-400 cc bike.
Possible models:
The Suzuki GS### series (eg. GS500, GS650, etc.). These are generally
inline 4 bikes, generally dependable except for a tendency to
weakness in the charging system. (Stator and/or Regulator/Rectifier
problems.) My first bike was a (about '82) GS650, it server me well.
The Honda Nighthawk series (this may also be known as the CB### series
I think). eg. Honda CB450, CB650, etc. This is another series of
standard motorcycles. Also fairly dependable.
Kawasaki and Yamaha probably have similar bikes, but I don't know
them as well.
For mid to late '80s models of the above, you should be able to
buy the bike for under $2000, leaving you money for protective
clothing and insurance and licensing costs. | 12 | trimmed_train |
3,625 | Well here it goes...my crazy predictions (which never come true, but hey..)
Adams
Bos vs. Buf - Bos in 5 (cakewalk for the hot Bruins)
Que vs. Mon - Que in 6 (best series of the first round)
Patrick
Pit vs. NYI - Pit in 5 (NYI wins fourth game)
Was vs. NJD - NJD in 7 (a grueling upset, possibly OT in game 7)
Norris
Chi vs. StL - Chi in 5 (StL is no match for Keenan's Krew)
Det vs. Tor - Tor in 6 (Clark steps it up in playoffs this year)
Smythe (who cares?)
Van vs. Win - Win in 7 (so I'm caught up in Teemu-mania, sue me!)
Cal vs. LAK - Cal in 5 (LA sucks!!!!!!!!! IMO)
Division finals
Bos vs. Que - Bos in 7 (killer games, watch for Cam to shine)
Pit vs. NJD - Pit in 6 (NJD go insane, kill all on ice, but Pit wins)
Chi vs. Tor - Tor in 7 (Tor defense finally get it together)
Cal vs. Win - Cal in 6 (Win too tired after 1st series)
Conference finals
Pit vs. Bos - Bos in 6 (Pit too beat up by NJD to play (I hope))
Cal vs. Tor - Tor in 6 (Vernon turns into a sieve)
Stanley Cup
Bos vs. Tor - Tor in 7 (Two totally different teams, who knows? Dreams
can come true, pig might one day evolve wings)
Feel free to laugh at my predictions, I always do! | 17 | trimmed_train |
5,720 |
In fact Adiposity 101 mentions a similar study (search for "life
events" in any recent version of Adiposity 101).
The problem with anecdotal reports about individuals who have
lost weight and kept it off is that we don't know what caused
the weight gain in the first place. This is critical because
someone who gains weight because of something temporary (drug
effect, life event, etc.) may appear successful at dieting when
the weight loss was really the result of reversing the temporary
condition that caused the weight gain.
| 19 | trimmed_train |
9,465 |
Re Eric: True, but fortunately we didn't get to find out what they would be
like without Recchi for 30 games.
Soderstrom: Absolutely. 4 shutouts in 39 games for a rookie without a lot
of defense in front of him. Runnerups to Galley and Fedyk who are scoring
a ton over their career best. But Galley thinks he's Paul Coffey (puts scoring
ahead of defending) and Fedyk has tailed off big time.
Eklund: Was a big question mark this year and was coming off injuries. 42
points in 49 games is not bad at all, and recently he's been a huge factor
in the wins they've gotten. Eklund has never had a point a game season in
his career, his production is very typical for him. How does he qualify as
a disappointment? If anything he's a surprise.
My choice would be Roussel if I went strictly by what was expected of players,
but I never thought that he had what it takes to be a #1 goalie. My biggest
disappointment is Bill Dineen. I thought that he was going to be the perfect
coach for this young team, instead he's made too many bad moves and IMHO
has cost them enough games to keep them out of the playoffs this year. Any
coach that thinks putting Eric Lindros at the point on power plays is a
bright idea needs to go back to coaching school. | 17 | trimmed_train |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.