url
stringlengths
15
784
text
stringlengths
6
437k
KeyPhrases
sequence
http://diydrones.com/profiles/blogs/complete-guide-on-lipo-batteries
Complete Guide to lipo batteries Posted by Norman Sanchez on August 14 , 2012 at 4 : 30am View Blog Taken from the page : http : / / www . rcgroups . com / forums / showthread . php ? t = 209187 After seeing the many many posts on LiPoly ' s and answering similar questions time after time I ' ve decided to put up a guide for using LiPoly batteries . Lithium batteries are the preferred power sources for most electric modelers today . They offer high discharge rates and a high energy storage / weight ratio . However , using them properly and charging them correctly is no trivial task . There are many things to consider before using lithium cells for e - flight . But none is more important than safety . 1 . Charging / Saftey IMPORTANT ! Until you are willing to follow all saftey precautions , DO NOT use lithium batteries . If your a type of person that prefers to push the limits of products , or be haphazard about following saftey requirements . Lithium technology is not for you . Read on to find out why . Lithium cells must be charged very differently than NiCad or NiMH . They require a special charger specifically designed to charge lithium cells . In general any charger that can charge lithium ion can charge lithium polymer , assuming that the cell count is correct . You must NEVER charge lithium cells with a NiCad or NiMH only battery charger . This is dangerous . Charging cells is the most hazardous part of using lithium batteries . EXTREME care must be taken when charging them . It is important to set your charger to the correct voltage or cell count . Failure to do this can cause the battery to spew violent Here are a few MANDATORY guidelines for charging / using LiPos ( Lithium Polymer Batteries ) . 1 . Use only a charger approved for lithium batteries . The charger may be designed for Li - Ion or Li - Poly . Both batteries are charged in exactly the same . Some older cell phone chargers may charge the batteries .1 volt to low ( 4.1 vs 4.2 ) , but that will not harm the battery . However , inexpensive lithium chargers are widely available and the use of cellphone chargers is highly discouraged . 2 . Make certain that the correct cell count is set on your charger . Watch the charger very closely for the first few minutes to ensure that the correct cell count continues to be displayed . If you do n ' t know how to do that , get a charger that you do know how or do n ' t charge the batteries . 3 . Use the Taps . Before you charge a new Lithium pack , check the voltage of each cell individually . Then do this after every tenth cycle there after . This is absolutely critical in that an unbalanced pack can explode while charging even if the correct cell count is chosen . If the cells are not within 0.1 volts of each other then charge each cell individually to 4.2 volts so that they are all equal . If after every discharge the pack is unbalanced you have a faulty cell and that pack must be replaced . Taps are provided on most new lithium packs . Taps give you the ability to check individual cell voltages and charge one cell at a time . Make sure and get the appropriate connector to go into your taps . Do n ' t try to stick you volt meter probes in the taps to measure voltage . They could slip and short your cells . Do n ' t try to charge more than one cell at a time from the taps . Unless you have an isolated ground charging system , you ' ll short your batteries out 4 . NEVER charge the batteries unattended . This is the number one reason for houses and cars being burned to a crisp by lithium fires . 5 . Use a safe surface to charge your batteries on so that if they burst into flame no damage will occur . Vented fire safes , pyrex dishes with sand in the bottom , fireplaces , plant pots , are all good options . 6 . DO NOT CHARGE AT MORE THAN 1C unless specifically authorized by the pack vendor . I have personally had a fire in my home because of violating this rule . Todays highest discharge batteries can supposedly be safely charged at greater than 1C , however so far in all cases doing so shortens the life of the pack . Better to buy 3 packs than to try to charge 1 pack 3 times quickly . This may change in the future but as of Winter 2005 1C is still the recommended charge rate . 7 . DO NOT puncture the cell , ever . If a cell balloons quickly place it in a fire safe place , especially if you were charging it when it ballooned . After you have let the cell sit in the fire safe place for at least 2 hours . Discharge the cell / pack slowly . This can be done by wiring a flashlight bulb of appropriate voltage ( higher is voltage is ok , lower voltage is no ) up to your batteries connector type and attaching the bulb to the battery . Wait until the light is completely off , then throw the battery away . 8 . If you crash with your lithium cells they may be damaged such that they are shorted inside . The cells may look just fine . If you crash in ANY way carefully remove the battery pack from the aircraft and watch it carefully for at least the next 20 min . Several fires have been caused by damaged cells being thrown in the car and then the cells catch fire later and destroys the car completely . 9 . Charge your batteries in a open ventilated area . If a battery does rupture or explode hazardous fumes and material will spew from the battery . 10 . Keep a bucket of sand nearby when you are flying or charging batteries . This is a cost effective way to extinguish fires . This is very cheap and absolutly necessary . 11 . It can happen to you , do not think to yourself that β€œ it wo n ' t happen to me ” as soon as you do that it you ' ll be trying to rescue your kids from your burning house or car . I ' m very serious about this . Now that we have covered that important topic let ' s move on to lighter matters : 2 . Lithium What ? Lithium Polymer batteries are used in many electronic devices . Cell Phone , Laptops , PDA ' s , Hearing Aids just to name a few . Most , if not all , lithium polymer batteries are not designed for RC use , we use them in different applications than they were designed for . They are similar to Lithium Ion batteries in that they each have a nominal voltage of 3.6 volts , but dissimilar in that they do not have a hard metal casing but rather a flexible material encloses the chemicals inside . The " normal " 3 . Voltage and Cell Count : LiPolys act differently than NiCad or NiMH batteries do when charging and discharging . Lithium batteries are fully charged when each cell has a voltage of 4.2 volts . They are fully discharged when each cell has a voltage of 3.0 volts . It is important not to exceed both the high voltage of 4.2 volts and the low voltage of 3.0 volts . Exceeding these limits can harm the battery . The way to ensure that you do not go below 3.0 volts while flying is to set the low voltage cutoff ( LVC ) of your electronic speed control ( ESC ) . It important to use a programmable ESC since the correct voltage cutoff is critical to the life of your batteries . Use the ESC ' s programming mode to set the LVC to 3.0 volts per cell with a hard cutoff , or 3.3 volts per cell with a soft cutoff . If your ESC does not have hard or soft cutoff , use 3.0 volts per If your ESC has an automatic lithium mode . Use it , it will correctly sense the number of cells and set the auto cutoff appropriately . If you have previously been flying with NiCad or NiMH batteries , switching over to lithium polymer will result in a different number of cells being used . If you had 6 to 7 round cells then 2 lithium polymer cells will correctly duplicate the voltage of those cells . If you had 10 - 11 cells then 3 lithium polymer cells would be right for you . There are a lot of 8 cell flyer ' s out there that are stuck between 2 and 3 cells . In my experience the best option is to determine how many 4 . 10C from 3S4P ? Naming conventions explained . How fast a battery can discharge is it ' s maximum current capacity . Current is generally rated in C ' s for the battery . C is how long it takes to discharge the battery in fractions of an hour . For instance 1 C discharges the battery in 1 / 1 hours or 1 hour . 2 C discharges the battery in Β½ or half an hour . All RC batteries are rated in milli Amp hours . If a battery is rated at 2000 mAh and you discharge it at 2000mA ( or 2 amps , 1 All batteries have limitations on how fast they can discharge . Because of this many LiPoly batteries are put in parallel to increase the current capacity of the battery pack . When 2 batteries are wired positive to positive and negative to negative they become like one battery with double the capacity . If you have 2 2000mAh cells and you wire them in parallel then the result is the same as 1 4000mAh cell . This 4000mAh cell has the same C rating as the original 2000mAh cells did . Thus if the 2000mAh cells could discharge at a The naming convention that allows you to decipher how many cells are in parallel and how many are in series is the XSXP method . The number in front of the S represents the number of series cells in the pack so 3S means it ' s a 3 cell pack . The number in front of P means the number of cells in parallel . So a 3S4P pack of 2100mAh cells has a total of 12 cells inside . It will have the voltage of any other 3S pack since the number of cells in series determines the 5 . Which battery should you buy ? With so many choices out there it is difficult to decipher what is marketing hype , what is brand loyalty , and what is outright lies . Battery manufacturers are constantly trying to one up one another . While capitalism can drive prices down , it also can give cause to false claims about products . One great way to find out what the best battery is , is to look at graphs of the batteries performance . Looking at how low the voltage of the cell drops at various amperages will give you a metric to compare that battery to similar size / weight batteries . If graphs are n ' t your thing then simply look at what other people are using in successful setups that are similar to your application . If a lot of people are reporting long flight times and lots of power from airplane X , with power system Y , and battery Z and you do the same , then if your setup is similar the same battery will probably work well for you . It pays to learn something about Watts , Volts , and Amps . Understanding these concepts is beyond the scope of this document , but can serve you well in not only figuring out what battery is best but also in your electric aircraft hobby . I ' m not convinced that a 30C battery is really any better than a 10 or 20C battery . Sure a higher C rating means it can discharge faster . But at the same time a battery discharged at 20C continuously will be empty in 3 minutes . Do you really only want to use the battery for 3 minutes ? I love having burst power in helicopters and boats , but in almost all other applications actually running a battery at or above 20C is useless to me . I prefer to run batteries at 8 - 10 A final note on choosing a battery . Do n ' t cheap out . Confirm that your batteries are capable of running that the amperage level you plan to use them at . Running a cell at a higher C rating than the battery can handle can not only damage your batteries , but it can also damage your speed control . Castle Creations has an excellent article on how using a weak battery can destroy a perfectly good speed control of any brand . Better to buy a bit better battery than you need than to destroy your 6 . Dealing with temperature . Lithium batteries like heat , but not too much . In the winter time , try to keep your batteries from the cold as much as possible . Leave them in the car while your flying , or keep them in your cargo pants . . . etc . At the same time do n ' t let them heat up too much . Try to keep your batteries from reaching 160F after use . This will prolong the life of the cells . A good way to measure temperature is a handheld IR meter , they can be found If you have any suggestions for future sections or additions to the current document let me know and I ' ll add the information requested . . .if I know the answer ! Posts that have referenced a lipo cell catching fire have been categorized as to failure cause . This list most certainly does not contain all the incidents and a statistical analysis would be meaningless . It does however show that the warnings presented for lipo cells are not just legaleeze but warnings that should be heeded to prevent possible personal harm and / or property damage . These first two posts will be updated as data is collected . Information was gathered from the posts referenced . Please PM me if you see any discrepancies . The listing does not include any of the many ' ballooning only ' reports . FIRE DURING CHARGING : Operator Error - 9s pack catches fire while being charged at 10s setting . ( 9 ) 2s pack catches fire being charged as 3s ( 10 ) 2s pack catches fire when charged at 3s setting ( 13 ) 2s pack catches fire in plane while charging at 3s setting . ( 22 ) 3s pack charged at 4s voltage ignites ( 27 ) 2s pack catches fire charged at 3s ( 30 ) 2s pack ignites when charged at 10.2V ( 31 ) Overcharged battery ( 34 ) 2s pack charged at 11.1V catches fire . ( 36 ) 2s pack charged at 3s setting ( 40 ) 2s pack charges at 11.1V burns – ( 44 ) 2s charged at 11.2V goes off in garage – ( 47 ) 2s charged at 3s voltage ignites in garage – ( 49 ) 2s charged at 3s ignites in workshop – ( 52 ) Another count problem – Heli burns ( 57 ) Cell count error caused fire – ( 61 , 62 ) Pack charged on NiCd setting - ( 66 ) Run Down pack catches fire during charge – ( 71 ) LiPo Burns during charge on 109 charger after mode mis - set ( 82 ) Charging slightly swelled pack causes fire ( 86 ) Li - Ion cells catch fire from charger setting error ( 88 ) Cell catches fire during attempt to repeak - ( 91 ) Charging puffed cell causes it to ignite – ( 93 ) Lipo burns during attempt to restore overdischarged cell with CC / CV PS ( 94 ) Pack ignites during charging – smoke corrodes shed and contents ( 98 ) Possible damaged pack burns like rocket in can – ( 100 ) Attempt to recharge dead lipo causes plane fire ( 103 ) Charging probably fully charged 3s pack with Astro 109 result in pack ignition . ( 104 ) 2s charged as 3s ignites in safe ( 109 ) Restart of charger resulted in wrong charge mode – ( 113 ) Wrong charger settings burns 2 packs – ( 112 ) LiPo burns in modelers hand after charging - ( 115 ) Charging slightly puffed cell causes fire , plane burns ( 117 ) Using NiCd setting causes LiPo fire . Owner forgot to switch over to LiPo setting during charge cycle ( 118 ) Charger set on 4 cells with 3 cell pack ( 126 ) Garage fire during charging ( 127 ) Modeler reports 2 lipo fires from wrong cell count ( 129 ) Lipo charged on NiCd setting ignites ( 130 ) Auto cell count charger fire – ( 131 ) 5s2p4000 packs ignites on first charge ( 133 ) Overvoltage charge ignition – ( 135 ) Lipo ignites during charge causing house fire – possible charger setting error . ( 139 ) . Too high charge rate burns battery ( 142 ) 3s charged as 4s 109 with pictures of burn : ( 144 ) 3s charged as 4s burns SUV ( Schulze 6 - 330d ) ( 146 ) Garage Burns – balancer used - ( 162 ) Garage Burns during charging – complete loss - ( 163 ) Undetermined Cause While Charging Fire damages garage while charging pack . ( 7 ) 1500 3s pack catches fire during 1A , 11.1V initial charge . ( 1 ) 2 cell pack ignites while being charged with 2 cell charger . ( 11 ) Car burns when pack being charged in car catches fire . ( 24 ) 2s2p pack catches fire in helicopter – possible that charger misread # of cells . ( 25 ) 2s pack ignites while on charger set for 2s . ( 28 ) $ 30,000 damage to house when pack ignites during charging . ( no details ) ( 43 ) 3s pack burns in garage – ( 35 ) 3s pack burns at correct settings - ( 41 ) 3s pack burns at correct charger settings – ( 46 ) 3s 8000mah pack catches fire after 15min – correct settings – ( 53 ) Helicopter and pack burns after 15min charge – ( 54 ) Automatic cell count charger – pack catches fire ( 55 ) Automatic cell count charger – pack catches fire ( 56 ) Lipo rockets across room ( 58 ) Automatic cell count charger – Lipos burn in garage ( 59 ) Battery ignites in car seat during charging ( 63 ) Damaged battery ignites during charge ( 67 ) Pack balloons during charge , burns while under water ( 68 ) 11s3p pack burns during charging at correct parameters ( 70 ) Another charging fire – ( 72 ) Helicopter burns when LiPo ignites during charge ( 73 ) Undetermined cause to LiPo fire during charge – ( 74 ) Chopper burns from charging LiPo fire ( 76 ) House fire ( 81 ) 3s Pack Ignites burning front of car during charge at correct settings . ( 83 ) Helicopter in garage burns while charging ( 106 ) Well used Lipo ignites under correct charging parameters ( 107 ) SUV Vehicle burns ( 114 ) Garage burns during charging – ( 119 ) Extensive pictures 2 fiires in 2 weeks ( 120 ) Charging battery in plane fire with 109 – posts 97&99 ( 121 ) Charging 3000mah with Triton catches fire in garage - ( 122 ) Pack in plane ignites while being charged under hood of truck ( 123 ) Fire in Basement – ( 136 ) Lipo catches fire during charging and continues to burn in salt water ( 138 ) Lipo charging in Helicopter ignites burning carpet , drapes and Heli ( 141 ) Lipo charging on hood catches fire - ( 147 ) Lipo charged on correct settings ignites ( 148 ) Lipo fire during charging burns house . ( 150 ) A123 pack burns ( ? ) ( 152 ) Possible charger failure causes lipo fire – ( 157 ) House Fire – Cause not determined yet – ( 158 ) Lipo in back of SUV ignites while charging – ( 159 ) 5 packs burn during charging – ( 165 ) Battery on charger with balancer ignites ( 166 ) Another battery on a balancing charger ignites ( 167 ) Pack on charger causes workshop fire ( 169 ) Very new pack with GWS CP - LP charger ignites ( 170 ) Pack puffs on charger – taken outside where it ignites ( 171 ) Pack gets hot on charger , ignites outside ( 172 ) FIRE FROM PACK DAMAGE : Cell poked with exacto knife catches fire - ( 2 ) Dog bites pack , pack catches fire ( 4 ) Lexus burns after pack from crashed plane put in car . ( 8 ) Ballooned pack ignites when punctured . ( 20 ) Repaired pack catches fire when connected to plane . ( 29 ) Pack catches fire after plane crashes . ( 37 ) Pack cut while shrink wrapping ( 39 ) Pack punctured during crash burns . ( 64 ) Plane crashes , pack removed and 10 minutes later burns ( 65 ) Battery pack at 1V ignites while charging ( 71 ) Puffed pack ignites during charging – ( 77 ) Puffed Pack smokes when punctured ( 79 ) Nicked pack catches fire ( 87 ) Plane crashes , battery catches fire ( 89 ) Damaged pack catches fire – ( 90 ) Dog chews pack , chars pillow and smokes house - ( 95 ) Battery compartment screw penetrates pack causing loss of plane ( 102 ) Pack balloons dring mischarge , ignites when punchured ( 108 ) Pack ignites 20 min after Heli crash – ( 111 ) \ Nicked pack β€œ explodes in modelers hand ” ( 116 ) Intentionally punctured LiPo burns ( 124 ) Dented Heli pack burns i min after disconnecting - ( 137 ) Poked Lipo burst into flame ( 140 ) Lipo Shorted for 4 sec . 3 min later it burns ( 143 ) Lipo catches fire after crash damage . ( 149 ) Punctured lipo catches fire – ( 151 ) Crash causes fire – ( 154 ) Damaged pack catches fire in flight – ( 156 ) Dog bite shorts pack – ( 161 ) Lid of charging container pinches battery leads and ignites ( 168 ) Dropped pack catches fire minutes later ( 173 ) BATTERY SHORTED FIRES : Shorted pack catches fire ( 26 ) Pack burns after shorting ( 15 ) Possible Short ( 38 ) Shorted when moved on table – ( 42 ) Pack Shorted putting connector on and burns – ( 45 ) Shorted pack burns hole in BMW seat – ( 48 ) Crash causes 3s pack to short and burn – ( 50 ) Pack ignites sometime after connector shorted for a short time ( 85 ) Lipo Shorted for 4 sec . 3 min later it burns ( 143 ) CAUSE UNDETERMINED : Multi cell pack catches fire in flight ( 5 ) Possible over discharge ( 33 ) Lipo pack catches fire in car ( 60 ) 2s pack starts house fire ( 84 ) In flight F3A fire reported ( 92 ) New pack partially burns sitting on desk ( 96 ) Pack ignites with no known cause ( 97 ) Pack ignites after soldering wires on ( 101 ) Pack catches fire in pick up truck ( 105 ) In Air ignition – ( 125 ) Pack ignites in pocket ( 132 ) Pack ignites in car at 3AM ( 134 ) Undamaged pack starts to burn in car – ( 145 ) Unconnected Pack sitting on bench burns over night – ( 153 ) In Flight Fire – ( 155 ) Pack ignites 2 hrs after charging – not connected to anything . ( 160 ) Unused , uncharged pack without connectors catches fire – ( 164 ) Lipo catches fire for no apparent reason ( 174 ) Plane lands after short flight , battery disconnected , battery ignites shortly after ( 175 ) OTHER 2s pack connected in series with 3s pack ignites in fireball ( 78 ) Lipo burns garage ( 99 ) Packs used in parallel catch fire in flight ( 110 ) Too high current draw causes fire ( 128 ) References 1 . http : / / www . rcgroups . com / forums / showt . . .93 # post1625193 2 . http : / / www . rcgroups . com / forums / showt . . . &pagenumber = 18 http : / / www . rcgroups . com / forums / showt . . .37 # post1531337 4 . http : / / www . rcgroups . com / forums / showt . . .99 # post1531599 5 . http : / / www . bayrc . com / boards / viewtopic . php ? t = 226 6 . http : / / www . rcgroups . com / forums / attac . . .postid = 1478616 7 . http : / / www . rcgroups . com / forums / showt . . .fire + explosion 8 . http : / / www . rcgroups . com / forums / showt . . .ght = lexus + fire 9 . http : / / www . rcgroups . com / forums / showt . . .t = funtana + fire 10 . http : / / www . rcgroups . com / forums / showt . . .ghlight = rocket 11 . http : / / www . ikarus - modellbau . de / ubbth . . .b = 5&o = &fpart = 1 12 . http : / / www . rcgroups . com / forums / showt . . .ight = lipo + fire 13 . http : / / www . rcgroups . com / forums / showt . . .hreadid = 160086 14 . http : / / www . rcgroups . com / forums / showt . . .hreadid = 160079 15 . http : / / www . rcgroups . com / forums / showt . . .hreadid = 160551 16 . http : / / www . rcgroups . com / forums / showt . . .ight = lipo + fire 17 . 18 . 19 . 20 . 21 . 22 . 23 . http : / / www . rcgroups . com / forums / showt . . .402 # post806402 24 . http : / / www . hornet - heli . com / ubb / Forum3 / HTML / 003428 . html 25 . http : / / www . rcgroups . com / forums / showt . . .ight = explosion 26 . http : / / www . rcgroups . com / forums / showt . . .95 # post1243595 27 . http : / / www . rcgroups . com / forums / showt . . .90 # post1571890 28 . http : / / www . rcgroups . com / forums / showt . . .30 # post1581630 29 . http : / / www . rcuniverse . com / forum / fb . a . . .325&tostyle = tm 30 . http : / / www . rcgroups . com / forums / showt . . .129 # post844129 31 . http : / / www . rcgroups . com / forums / showt . . .29 # post1553429 32 . http : / / www . rcgroups . com / forums / showt . . .65 # post1658165 http : / / www . rcgroups . com / forums / showt . . .hreadid = 185530 33 . http : / / www . rcgroups . com / forums / showt . . .34 # post1699734 34 . http : / / www . rcgroups . com / forums / showt . . .91 # post1731091 http : / / www . rcgroups . com / forums / showt . . .15 # post1731915 35 . http : / / www . rcuniverse . com / forum / fb . a . . .352&tostyle = tm 36 . http : / / members . jcom . home . ne . jp / 42232 . . . % 20trouble . htm http : / / www . rcgroups . com / forums / showt . . .31 # post1761331 Charging crashed pack caused pack unbalance problems - http : / / www . rcgroups . com / forums / showt . . .03 # post1767503 37 . Pack catches on fire after crash - http : / / www . rcgroups . com / forums / showt . . .34 # post1779434 38 . Possible short – undamaged pack catches fire - http : / / www . rcgroups . com / forums / showthread . php ? postid = 1810304 # post18 . . . 39 . Battery shorts and burns during shrink wrapping - http : / / www . rcgroups . com / forums / showt . . .08 # post1399608 Lipo Fire Video ’ s http : / / www . rcgroups . com / forums / showt . . .15 # post1394715 http : / / www . rcstuff . us / battery / lipo / lipo_DNA . html http : / / www . helihobby . com / videos / LithiumBattery . wmv http : / / www . utahflyers . org / movies / Lipofires . wmv ( 40 ) Battery catches fire , wrong charging voltage - http : / / www . rcgroups . com / forums / showt . . .22 # post1898922 ( 41 ) First charge of pack - http : / / www . rcgroups . com / forums / showt . . .hreadid = 180434 ( 42 ) Pack shorted on bench - http : / / www . rcgroups . com / forums / showt . . .hreadid = 206095 ( 43 ) $ 30,000 house damage – charger error - http : / / www . rcgroups . com / forums / showt . . .90 # post1816790 ( 44 ) 2s charged at 11.1V burns - http : / / www . rcgroups . com / forums / showt . . .47 # post1844047 ( 45 ) Pack Shorted putting connector on and burns - http : / / www . rcgroups . com / forums / showt . . .hreadid = 209532 ( 46 ) 3s Pack burns at correct charger settings - http : / / www . rcgroups . com / forums / showt . . .hreadid = 209767 Picture of burned bench – German site - http : / / www . modellflugjugend . de / archiv / user / lipo2 . jpg ( 47 ) 2s charged at 3s goes boom in garage - http : / / www . rcgroups . com / forums / showt . . .hreadid = 100803 ( 48 ) Shorted pack burns hole in BMW seat - http : / / www . rcgroups . com / forums / showt . . .86 # post1199486 ( 49 ) 2s charged as 3s ignites in house - http : / / www . rcgroups . com / forums / showt . . .ghlight = rocket ( 50 ) Crash causes 3s to short and burn http : / / www . rcgroups . com / forums / showt . . .82 # post1863182 ( 52 ) 2s charging at 3s causes fire in garage - http : / / www . runryder . com / helicopter / . . .light = fire + lipo ( 53 ) 8000 3s pack catches fire at correct settings - http : / / www . runryder . com / helicopter / . . .light = fire + lipo ( 54 ) Pack catches fire after charging for 15 min - http : / / www . rotory . com / ubbthreads / sh . . .o = &fpart = 1&vc = 1 ( 55 ) Pack catches fire using automatic charger - http : / / www . rcgroups . com / forums / showp . . .6&postcount = 15 ( 56 ) Pack catches fire using automatic charger - http : / / www . rcgroups . com / forums / showp . . .46&postcount = 1 ( 57 ) Helicopter fire - http : / / runryder . com / helicopter / t82226 / ? goto = newpost ( 58 ) LiIon pack rockets across room : http : / / www . rcgroups . com / forums / showp . . .6&postcount = 11 ( 59 ) Dented Pack Catches fire - http : / / www . rcgroups . com / forums / showp . . .56&postcount = 3 ( 60 ) Lipo in closed car catches fire - http : / / www . rcgroups . com / forums / showthread . php ? t = 241627 ( 61 ) Wrong cell count fire - http : / / www . rcgroups . com / forums / showp . . .97&postcount = 3 ( 62 ) Wrong cell count fire – http : / / www . rcgroups . com / forums / showp . . .26&postcount = 1 ( 63 ) Battery catches fire in car seat while charging - http : / / www . rcgroups . com / forums / showthread . php ? t = 248194 ( 64 ) Battery catches fire when plane crashes - http : / / www . rcgroups . com / forums / showthread . php ? t = 256098 ( 65 ) Battery catches fire after crash : http : / / www . rcgroups . com / forums / showp . . .7&postcount = 12 ( 66 ) Battery ignites in under 10min on charger - http : / / www . rcgroups . com / forums / showp . . .59&postcount = 1 ( 67 ) Damaged battery catches fire during charging - http : / / www . rcgroups . com / forums / showp . . .34&postcount = 5 ( 68 ) LiPo Pack catches fire even tho immersed in salt water - http : / / www . rcgroups . com / forums / showthread . php ? t = 261922 ( 69 ) Lipo ignition causes house fire - http : / / www . rcgroups . com / forums / showp . . .50&postcount = 4 ( 70 ) Pack catches fire for no apparent reason during charge - http : / / www . rcgroups . com / forums / showp . . .1&postcount = 34 ( 71 ) Pack at 1V charged and catches fire - http : / / www . rcgroups . com / forums / showthread . php ? t = 263600 ( 72 ) Battery catches fire during charging - http : / / www . rcgroups . com / forums / showp . . .21&postcount = 1 ( 73 ) Helicopter burns - http : / / www . rcgroups . com / forums / showthread . php ? t = 266337 ( 74 ) 3s Pack ignites during charge - http : / / www . rcgroups . com / forums / showthread . php ? t = 266875 ( 75 ) House fire reported in Belgium - http : / / www . rcgroups . com / forums / showp . . .1&postcount = 24 CHECK OUT ( 76 ) Plane burns during charge - http : / / www . rcgroups . com / forums / showp . . .5&postcount = 47 ( 77 ) Puffed pack ignites during charging - http : / / www . rcgroups . com / forums / showt . . .64 # post2560964 ( 78 ) 2s pack connected in parallel to 3s pack ignites - http : / / www . rcgroups . com / forums / showthread . php ? t = 274028 ( 79 ) Ballooned Pack Burns when punchured - http : / / www . rcgroups . com / forums / showthread . php ? t = 274557 ( 80 ) 7s pack catches fire during flight - http : / / www . rcgroups . com / forums / showthread . php ? t = 296507 ( 81 ) House fire – 3rd story burns - http : / / runryder . com / helicopter / t145397p1 / ( 82 ) Lipo catchs fire during charge on 109 charger . http : / / www . rcgroups . com / forums / showthread . php ? t = 307806 ( 83 ) 3s Lipo catches fire at correct settings . http : / / rcgroups . com / gallery / showphot . . .cat = 500&page = 1 ( 84 ) 2s pack starts house fire - reason unknown - http : / / www . rcgroups . com / forums / showthread . php ? t = 311323 ( 85 ) Pack catches fire after a short short - http : / / www . rcgroups . com / forums / showt . . .13 # post3044752 ( 86 ) Charging slightly swelled pack causes fire - http : / / www . rcgroups . com / forums / showp . . .77&postcount = 4 ( 87 ) Nicked cell catches fire - http : / / www . rcuniverse . com / forum / LiPo . . .tm .htm # 2366986 ( 88 ) Li Ion cells ignite from charging mistake - http : / / www . rcuniverse . com / forum / LiPo . . .tm .htm # 2427714 ( 89 ) Battery ejected from crashed plane burns - http : / / www . rcgroups . com / forums / showthread . php ? t = 289255 ( 90 ) Battery involved in crash ignites several weeks later - http : / / www . rcgroups . com / forums / showthread . php ? t = 273490 ( 91 ) Charging abuse causes fire - http : / / www . rcgroups . com / forums / showp . . .35&postcount = 7 ( 92 ) Pack fire during F3A contest - http : / / www . rcgroups . com / forums / showp . . .8&postcount = 11 ( 93 ) Slightly puffed cell catches fire during charging . http : / / http : / / www . rcgroups . com / forums / showp . . .d .php ? t = 268523 ( 94 ) Lipo burns during attempt to restore overdischarged cell with CC / CV PS - http : / / www . rcgroups . com / forums / showthread . php ? t = 323693 ( 95 ) http : / / www . rcgroups . com / forums / showp . . .4&postcount = 15 ( 96 ) New pack partially burns sitting on desk - http : / / www . rcgroups . com / forums / showthread . php ? t = 329744 ( 97 ) Pack ignites with no known cause - http : / / www . rcgroups . com / forums / showp . . .3&postcount = 31 ( 98 ) Pack ignites during charging – equipment in shed corrodes - http : / / www . rcgroups . com / forums / showp . . . &postcount = 177 and http : / / www . rcgroups . com / forums / showp . . . &postcount = 187 ( 99 ) Lipo burns garage - http : / / www . rcgroups . com / forums / showp . . .6&postcount = 14 ( 100 ) Lipo burns like rocket in a can during charging - http : / / www . rcgroups . com / forums / showthread . php ? t = 356474 ( 101 ) Cell ignites while soldering - http : / / www . rcgroups . com / forums / showthread . php ? t = 357380 ( 102 ) Screw penetrates pack igniting it - http : / / www . rcgroups . com / forums / showthread . php ? t = 360222 ( 103 ) Attempt to recharge β€œ dead pack ” causes plane fire - http : / / www . rcgroups . com / forums / showp . . .37&postcount = 9 ( 104 ) Charged 3s ( ? ) ignites while recharging with Astro 109 - http : / / www . rcgroups . com / forums / showthread . php ? t = 362011 ( 105 ) Packs in truck catch fire , burn truck – unexplained - http : / / www . rcgroups . com / forums / showthread . php ? t = 368758 ( 106 ) Battery charging inside of helicopter catches fire in garage . No cause determined . http : / / www . runryder . com / helicopter / t177482p1 / ( 107 ) Well used Lipo ignites during charging under correct conditions - http : / / www . rcgroups . com / forums / showthread . php ? t = 373643 ( 108 ) Lipo charged as NiCd burns when the ballooned pouch is punchured - http : / / www . rcgroups . com / forums / showt . . .10 # post3794339 ( 109 ) Charging 2s1500 with possible wrong cell count ignites in safe - http : / / www . rcgroups . com / forums / showt . . .20 # post3829205 ( 110 ) Packs used in parallel catch fire in flight - http : / / www . rcgroups . com / forums / showthread . php ? t = 378566 ( 111 ) Helicopter crashes – 20 minutes later , lipos burn - http : / / www . rcgroups . com / forums / showthread . php ? t = 384490 ( 112 ) 2 packs at wrong charger settings burn - http : / / www . rcgroups . com / forums / showthread . php ? t = 384585 ( 113 ) Charger unplugged , on restart it went into different mode – lipo burns - http : / / www . rcgroups . com / forums / showp . . .45&postcount = 1 ( 114 ) Battery charged in SUV burns vehicle - http : / / www . wattflyer . com / forums / show . . .09&postcount = 1 ( 115 ) Battery ignites after charging in modelers hand http : / / www . rcgroups . com / forums / showp . . .83&postcount = 1 ( 116 ) Nicked pack β€œ explodes in hand ” http : / / www . rcgroups . com / forums / showp . . . &postcount = 155 ( 117 ) Charging slightly puffed lipo causes it to ignite in plane . http : / / www . rcgroups . com / forums / showthread . php ? t = 434713 \ ( 118 ) Using NiCd setting causes LiPo to burn in garage - http : / / www . rcgroups . com / forums / showthread . php ? t = 435043 ( 119 ) Garage Burns – Cause undetermined - http : / / www . laureanno . com / RC / fire - pics . htm ( 120 ) 2 fires in 2 weeks – 109 charger - http : / / www . rcgroups . com / forums / showthread . php ? t = 446313 ( 121 ) Charging battery in plane fire with 109 – posts 97&99 http : / / www . rcgroups . com / forums / showthread . php ? t = 443646 ( 122 ) Charging 3000mah with Triton catches fire in garage - http : / / www . one18th . com / forums / showthread . php ? t = 18104 ( 123 ) Pack in plane ignites while being charged under hood of truck - http : / / www . wattflyer . com / forums / showthread . php ? t = 2770 ( 124 ) Intentionally punctured LiPo burns - http : / / www . rcgroups . com / forums / showp . . .35&postcount = 9 ( 125 ) In Flight LiPo Fire - http : / / www . rcgroups . com / forums / showthread . php ? t = 460823 ( 126 ) Fire under hood while charging - http : / / www . rcgroups . com / forums / showthread . php ? t = 463204 ( 127 ) Garage burns during charging – possible operator cell count error - http : / / www . rcgroups . com / forums / showthread . php ? t = 463115 ( 128 ) Lipo ignites after flying with too large prop after landing - http : / / www . wattflyer . com / forums / show . . .2&postcount = 14 ( 129 ) 2 fires from wrong cell count - http : / / www . rcgroups . com / forums / showp . . .97&postcount = 5 ( 130 ) Lipo charged on NiCd settings catches fire - http : / / www . rcgroups . com / forums / showp . . .8&postcount = 14 ( 131 ) 3 cases of charger caused ( ? ) fires reported - http : / / www . rcgroups . com / forums / showthread . php ? t = 473376 ( 132 ) Pack goes thermal in pamts pocket - http : / / www . rcgroups . com / forums / showp . . .6&postcount = 20 ( 133 ) 5s2p 4000 ignites on first charge - http : / / www . rcgroups . com / forums / showthread . php ? t = 489495 ( 134 ) Pack ignites in car – No reason seen . http : / / www . rcgroups . com / forums / showt . . .65 # post5371633 ( 135 ) Pack ignites – high charge voltage - http : / / www . rcgroups . com / forums / showp . . .6&postcount = 25 ( 136 ) Lipo ignites in basement during charge - http : / / www . rcgroups . com / forums / showthread . php ? t = 519443 ( 137 ) Lipo ignites after landing - http : / / www . rcuniverse . com / forum / m_40 . . .tm .htm # 4118760 ( 138 ) Lipo ignites during charge , continues to burn after thrown in water - http : / / www . rcgroups . com / forums / showthread . php ? t = 261922 ( 139 ) lipo ignites during charge causing house fire . - http : / / www . rcgroups . com / forums / showp . . .50&postcount = 4 ( 140 ) Poked Lipo burst into flame - http : / / www . rcgroups . com / forums / showp . . .38&postcount = 4 ( 141 ) Lipo charging in Helicopter ignites burning carpet , drapes and Heli - http : / / www . rcgroups . com / forums / showthread . php ? t = 552619 ( 142 ) Too high charge rate burns battery - http : / / www . rcgroups . com / forums / showthread . php ? t = 556456 ( 143 ) Lipo Shorted for 4 sec . 3 min later it burns : http : / / www . rcgroups . com / forums / showp . . .08&postcount = 1 ( 144 ) 3s charged as 4s 109 with pictures of burn : http : / / www . rcuniverse . com / forum / m_36 . . .tm .htm # 3694610 ( 145 ) Undamaged pack burns http : / / www . rcgroups . com / forums / showp . . .13&postcount = 2 ( 146 ) 3s charged as 4s burns SUV ( Schulze 6 - 330d ) - http : / / www . rcgroups . com / forums / showp . . .8&postcount = 13 ( 147 ) Lipo charging on hood catches fire , cause undetermnined - http : / / www . rcgroups . com / forums / showthread . php ? t = 614885 ( 148 ) Lipo charged on correct settings ignites - http : / / www . rcgroups . com / forums / showthread . php ? t = 654348 ( 149 ) Lipo catches fire after crash damage . - http : / / www . rcgroups . com / forums / showthread . php ? t = 662396 ( 150 ) Lipo fire during charging burns house . http : / / www . rcgroups . com / forums / showp . . .43&postcount = 1 ( 151 ) Punctured lipo ignites - http : / / www . rcgroups . com / forums / showp . . .9&postcount = 64 ( 152 ) A123 fire during charging – cause unknown - http : / / www . rcgroups . com / forums / showt . . .99 # post8554156 ( 153 ) Cause unknown – Battery on benchtop burns http : / / www . rcgroups . com / forums / showthread . php ? t = 779431 ( 154 ) Battery ignites after crash - http : / / www . rcgroups . com / forums / showthread . php ? t = 800629 ( 155 ) Battery ignites during flight - http : / / www . rcgroups . com / forums / showp . . . &postcount = 127 ( 156 ) Damaged lipo pack catches fire in flight - http : / / www . rcgroups . com / forums / showp . . .1&postcount = 14 ( 157 ) Battery ignites during charge - http : / / www . rcgroups . com / forums / showp . . . &postcount = 154 ( 158 ) House Burns – Lipo charging in garage . http : / / www . rcgroups . com / forums / showp . . . &postcount = 191 ( 159 ) Lipo charging in back of SUV catches fire - http : / / www . rcgroups . com / forums / showp . . . &postcount = 199 ( 160 ) Lipo catches fire 2 hrs after charging and off charger - http : / / myhobbycity . com / showthread . php ? t = 2883 ( 161 ) Dog bites lipo – lipo heats up but is dunked before igniting . - http : / / www . rcgroups . com / forums / showp . . .35&postcount = 4 ( 162 ) Garage Burns , charging with balancer http : / / www . 3drc . info / forum / showthread . php ? t = 1137 ( 163 ) Another Garage fire - complete loss - fire during charging - http : / / www . 3drc . info / forum / showthread . php ? t = 888 ( 164 ) New battery catches fire – did n ' t have connectors on it yet . http : / / www . rcgroups . com / forums / showt . . .0 # post10463160 ( 165 ) 5 packs being charged burn - http : / / www . rcgroups . com / forums / showp . . . &postcount = 228 ( 166 ) Pack on charger with balancer ignites - http : / / www . rcgroups . com / forums / showthread . php ? t = 945715 ( 167 ) Pack on balancing charger ignites - http : / / www . rcgroups . com / forums / showthread . php ? t = 947656 ( 168 ) Pack catches fire when lid closed on leads . http : / / www . runryder . com / helicopter / t473552p1 / ( 169 ) Pack on charger causes workshop fire . http : / / www . rcgroups . com / forums / showthread . php ? t = 978810 ( 170 ) Very new pack with GWS CP - LP charger ignites - http : / / www . rcgroups . com / forums / showt . . .8 # post11861155 ( 171 ) Pack puffs on charger – taken outside where it ignites - http : / / www . rcgroups . com / forums / showp . . .5&postcount = 64 ( 172 ) Pack gets hot on charger , ignites outside - http : / / www . rcgroups . com / forums / showp . . . &postcount = 363 ( 173 ) Dropped pack catches fire minutes later - http : / / www . wattflyer . com / forums / show . . .3&postcount = 28 ( 174 ) Lipo catches fire for no apparent reason - http : / / www . rcgroups . com / forums / showp . . .11&postcount = 3 ( 175 ) Plane lands after short flight , battery disconnected , battery ignites shortly after - http : / / www . rcgroups . com / forums / showp . . . &postcount = 373 ( 176 ) Battery ignites in plane during charging - http : / / www . rcgroups . com / forums / showp . . . &postcount = 393 ( 177 ) Pack on Display in Hobby Shop catches fire - http : / / www . rcgroups . com / forums / showp . . .98&postcount = 4 I tested two different MKII chargers and the results were the same , 80 % capacity of a 4.20v per cell charge . If you fly to a higher cutoff voltage and use less of the total pack capacity , percentage of charge for the MKII would be less not more . The MKII is a nice safe charger for Lipo , but unless there was a revision change ( ? ) it ca n ’ t charge a 3 - cell pack to 12.4v because it terminates the charge at a lithium - ion safe 4.1v per cell or 12.3v . This is a test I did for capacity vs . Resting voltage . 72 degree pack and room temp . The ( 999mAh ) pack was discharged each time at 1C , to a 3v per cell cutoff . Then I added a fixed percentage of charge , and measured the resting voltage after 12 hours . Next I discharged the pack and verified the percentage of capacity . At the end of all testing I charged the pack fully and did a accuracy / repeatability test . The repeatability of the test was over 98 % . 4.20v = 100 % 4.03v = 76 % 3.86v = 52 % 3.83v = 42 % 3.79v = 30 % 3.70v = 11 % 3.6 ? v = 0 % Capacity below 3.7v " resting " is not usable for flying , it ' s where the battery voltage dump begins . Views : 99659 Like 18 members like this Share Tweet < Previous Post Next Post >
[ "Lithium cells", "CHARGING", "lipo batteries" ]
http://diyhomedesignideas.com/bathroom/color-2.php
Bathroom Paint Colors Bathroom Design Software Top Bathroom Colors 311 Reviews Bathroom Gallery Due to their small floor plan , bathrooms are the perfect place to try a vividly bright wall color or bold decorating scheme different from the rest of your home . Sometimes deciding on the right design plans can be difficult , thus looking through remodeled bathroom pictures can be a great source of inspiration for you . , which show bold hues and unique painted patterns on single focus walls . For example wide vertical stripes , traditional hounds tooth patterns and repeating organic shapes are all popular looks this year . These bold and decorative patterns bring an give the look of modern art . When using the bathroom paint ideas and bold paint statements like these keep decorative accent pieces at a minimum so as not to crowd or clutter the space . Bathroom Color Ideas Bathroom Remodel 169 Reviews Bathroom Design Ideas Incorporating the latest paint color trends for bathrooms will ensure that your space looks up to date and modern , making it a wonderful selling point in your home for years to come . Check out our newest galleries of simple bathroom design ideas filled with the popular trends and must have color palettes to include in your new space . To bring a chic contemporary style and feel into your bathroom , pay close attention to your trusted color wheel when choosing paint and accent hues . Select accent tones that are opposite your primary wall colors to give an aesthetically pleasing contrast in the space , which will add interest and contemporary design . From red hues to crisp clean white and tranquil teals , colors can evoke any mood imaginable in a space . Bathroom Paint Colors Bathroom Pictures 436 Reviews Best Bathroom Colors It is fun and easy to experiment with the best bathroom colors to create different moods in the room including relaxation . You can create anything from a tranquil retreat to an edgy contemporary space and everything in between . Selecting colors for your home can be quite daunting with the endless possibilities of hues , finishes and patterns available today . For this reason , when selecting nice color combinations for your space , keep our popular bathroom themes in mind . With the endless variety of options available , it can be hard to decide what are good bathroom colors . Begin by getting ideas from our online photo galleries or great examples of hgtv bathrooms . Bathroom Colors 2019 Bathroom Shower Ideas 226 Reviews Bath Tile Ideas Choosing the most popular relaxing bathroom colors for 2019 will update an outdated space and infuse it with contemporary design without overpowering the small square footage of your room . Draw creative inspirational decorating themes from other design features in your bathroom such as bath tile ideas , textiles or favorite accent pieces . Utilizing your paint color palette is a great tool to employ when working with smaller spaces – this is especially true in the bathroom . The best designs for small bathrooms often include cool relaxing colors that will open the space rather than enclosing it like darker hues have a tendency to do bathroom color ideas incorporate trendy patterns into the space , but in coordinating lighter hues than those used in larger areas . Bathroom Colors Small Bathroom Ideas 142 Reviews Popular Paint Colors Why not spend a weekend transforming your boring outdated home with our how to guides and popular photo galleries of paint color ideas for your bathroom . Remember that beautifully finished bathrooms are the single largest selling point of a home , and remodeling an outdated space will greatly increase the value of your residence . The right bathroom designs , decor scheme and color palette will set the tone of the space and influence its functionality . Use our great DIY design ideas to update your bathroom on any budget , creating an expertly finished look in your new space . Look at our extensive and colorful image galleries to find ideas for wall colors that embody the latest contemporary trends to ensure that your space is up to date and modern . 1 2 3 4 5 6 7 8 9 Next Page > Sitemap
[ "Bathroom Colors", "Bathroom Gallery", "Design Ideas" ]
http://diyhomedesignideas.com/landscape/maple.php
341 Reviews Fast Growing Trees Maples are great for landscaping because they are fast growing trees that also provide you with ample amounts of shade . Shade trees are great for areas that receive a lot of sun because they provide you with natural protection from harmful UV rays while at the same time creating a beautiful look in your yard . The fasted growing maples include the Norway Maple , that not only grows quickly but is also cold resistant , making it the ideal choice for the cooler climate countries . Maples are also the most popular trees for landscaping in residential and municipalities because they respond well to trimming and sculpting to maintain a clean cut look . Landscape Design Software Landscape Design 145 Reviews Ornamental Trees Maple is great for ornamental trees because they respond to trimming and can be cut and sculpted into any shape or form you desire . The best ornamental trees tend to be those that are smaller in stature . Different types of maple trees come in dwarf versions that do not over grow and take up little space in your yard . Dwarf trees are a great option for homes and yards with little space because they offer all the attributes of a regular sized plant in a smaller version . A popular species used for decoration is the dwarf Japanese maple . These trees are medium sized trees that produce vibrant colored leaves in the spring and the fall . Japanese maple tree leaves have a vibrant red color in the spring that slowly morphs into a brilliant purple throughout the summer and back to beautiful yellow and orange in the fall . Landscaping With Rocks Landscaping Shrubs 122 Reviews Popular Trees 2017 Maple trees are a common species to find around the United States , especially along the east coast . While they are mainly known for their beautiful wood and gorgeous fall leaves , maples have a variety of uses . Tapping maple trees can produce syrup and their wood can be used for high quality construction material or charcoal , however the most popular use for these trees is as ornamental focal points in residential areas . Not only do they create a beautiful look for your yard , but maple tree varieties are fast growing and self pollinating , Backyard Ideas Front Yard Landscaping Ideas 352 Reviews Japanese Garden Other Japanese varieties include the crimson king and queen species . A crimson king maple produces deep purple tinted leaves that are perfect for areas with additional dark green foliage . Crimson queen Japanese maples , on the other hand , generate leaves that have a brighter red color that are long and thin . Crimson queen are best for Japanese garden ideas with more oriental themes because the look of their leaves compliment the style and design well . One of the main distinguishing features between maples are the leaves . Identifying maple trees by their leaves is easy , as long as you know the various characteristics . Most maples contain the typical three pointed , symmetrical shape where as others , such as the full moon maple whose leaves include several small points that resemble a hand fan . Backyard Design Ideas Backyard Landscaping 145 Reviews Landscaping Photos Silver maple trees commonly chosen among homeowners looking for a more unique look for their yard . This type of maple produces leaves with a green top and silver bottom which adds more depth to the color scheme of the landscape . A sugar maple tree is another admired type that not only has an attractive foliage , but can also be used to make maple syrup . Once you determine when to tap maple trees you can boil down the sap to produce natural , and homemade syrup . Another popular choice for homeowners looking to create a colorful Landscaping Ideas Trees For Landscaping 121 Reviews Best Small Trees Once you have chosen your maple , take a trip down to your local nursery where you can not only purchase your tree , but also find a great source of helpful information about how to plant , grow and maintain your it . Planting maples can be completed on your own , or by a professional , depending on whether you have the appropriate tools or not . It is important to keep in mind that there are several common problems with maple trees that may affect proper growth and development and they are often prone to disease . best small trees , maple tree diseases such as wilt , fungus , and tar spots can infect your plants if not properly cared for . 1 2 3 4 5 6 7 8 9 Next Page > Sitemap
[ "Maples", "fast growing trees", "natural protection" ]
http://diymusician.cdbaby.com/youtube/posting-cover-songs-on-youtube-music-licensing-law-explained/
Posting Cover Songs on YouTube : Music Video Licensing Explained By Chris Robley July 19 , 2017 How to legally post a cover song video on YouTube . Cover song videos are hugely popular on YouTube , and making a cover song video is one of the most proven ways to get new listeners and viewers to check out your other songs , including your original material . So let ’ s say you ’ ve recorded an awesome new cover version of an existing song , and now it ’ s time to post the video to YouTube . What do you need to do in order to NOT get your pants sued off ? First , an important disclaimer : I ’ m not a lawyer . If you ’ re worried about legal issues , you should consult an attorney . That being said , CD Baby and our YouTube network Illustrated Sound manage a vast catalog of songs and videos on behalf of artists on YouTube , and we have lots of experience from which we draw upon to offer the general advice that follows . So let ’ s start by understanding the various rights that do and do n ’ t come into play when posting a cover song video . Cover song videos are NOT protected by a mechanical license . Once a song is published , you have the right to cover it ( as a recording , but NOT as a video ) . β€œ Published ” under the Copyright Act is defined as : … the distribution of copies or phonorecords of a work to the public by sale or other transfer of ownership , or by rental , lease , or lending . The offering to distribute copies or phonorecords to a group of persons for purposes of further distribution , public performance , or public display constitutes publication . A public performance or display of a work does not of itself constitute publication . In order to distribute and sell your own version of that cover song , you have to secure what is know as a mechanical license from the publisher of the song , and pay them the appropriate mechanical royalties . BUT … a mechanical license ( often secured through an agency such as Harry Fox or CD Baby ’ s cover song licensing service ) protects you ONLY for the distribution of a cover song sound recording , NOT the associated cover song video . So while you absolutely MUST acquire the necessary mechanical license for a cover song before you press CDs or sell downloads , that license is meaningless when it comes to the video you want to post on YouTube . As entertainment attorney Christiane Cargill Kinney says : Assuming that a single license is going to cover you for every usage of the song is kind of like assuming that your doctor will accept pet insurance to treat your laryngitis . You ’ re dealing with two ( or more ) completely different animals . What license do you need for a cover song video ? Before I answer that question , I ’ m going to tell you a secret : Almost NO ONE that creates cover song videos is jumping through the hoops to secure the appropriate license before they post those videos to YouTube . Are they getting sued ? Are they having their videos smacked with a copyright violation notice or take - down request ? Occasionally , yes . But by and large , no . Why not ? Well , YouTube has developed a monetization system to allows rights holders and content creators to bypass the usual licensing process for cover song videos . But before we get into that , let ’ s discuss the license you WOULD need to secure if you wanted to be sure your cover song video was published by - the - book , on the up - and - up , and totally legit and legal eagle . You need … a sync license . Some of the many rights granted to the publisher of a composition are : the right to decide who gets to β€œ synchronize ” that song with images the right to determine the circumstances under which the song is β€œ synched ” and the right to set terms for monetary compensation Getting a sync license ( or synch license ) from the publisher of the song allows you to pair their composition with moving images in your cover song video . Note that those same rights are granted to the owners of sound recordings too , but since you ’ re making your own version of an existing song , you wo n ’ t need to deal with whichever entity owns the master recording . You just need to negotiate with the publisher . What if my cover song video is just a slideshow or a single still image ? In the eyes of the law , that ’ s still considered a video β€” and still requires you to get a sync license . β€œ Negotiating ” with the publisher . Good luck . Since the publisher holds all the cards in this circumstance , they can ignore your sync license request . They can tell you to take a hike . They can say , sure you can post a cover video of our song , as long as you pay us a bazillion dollars . Or they can be quite reasonable and grant you permission as long as you meet some set of realistic criteria and pay them the agreed upon upfront fee or ongoing royalty split ( or both ) . Sound like a lot of work ? It does to most artists , especially YouTubers who are often creating a new cover song video every week . So that ’ s where this next licensing method comes in handy . Content ID : YouTube ’ s sync - licensing workaround . YouTube ’ s impressive Content ID system analyzes elements of every single video uploaded to the platform to determine if a video contains any copyrighted material ( sound recordings , composition , video , etc . ) . If so , YouTube ’ s Content ID system automatically places a claim on that video on behalf of the rights holder . In other words , if you upload a cover song video , YouTube should be able to tell that you do NOT own the rights to the song ; you will see a claim placed on the video by the publisher , and any ad revenue generated by your video will be paid to that rights holder . This is the same technology that allows CD Baby to monetize the usage of sound recordings across all of YouTube on behalf of our artists . Where can I see if anyone has placed a Content ID claim on my cover song videos ? It ’ s pretty simple . Once you ’ ve posted the video to YouTube , go to the copyright notices section of your Video Manager . If you see a claim , it does n ’ t necessarily mean you ’ re β€œ in trouble . ” As YouTube explains : In most cases , getting a Content ID claim is n ’ t a bad thing for your YouTube channel . It just means , β€œ Hey , we found some material in your video that ’ s owned by someone else . ” It ’ s up to copyright owners to decide whether or not others can reuse their original material . In many cases , copyright owners allow the use of their content in YouTube videos in exchange for putting ads on those videos . These ads may play before or – if the video is longer than 10 minutes – during the video . Let ’ s say the publisher does NOT want other artists posting cover videos of their song willy - nilly . What then ? Content ID gives publishers the ability to : Block videos β€” so people wont ’ be able to search for or view your cover song video . Restrict viewing in certain territories / countries β€” so people in , say , Germany would n ’ t be able to view the video . Mute a video β€” so people would be able to watch the video , but no sound would play . Bummer ! Block certain platforms β€” so people can only view the video on particular devices , apps , or websites . While pretty damn magical , Content ID is n ’ t a perfect solution . It ’ s true , you COULD STILL get slapped down or sued by the publisher . But that is very rare these days . Most publishers understand that monetizing cover song videos through YouTube ads can add up to real revenue . Better to be making some money ( with little to no effort of their own ) from artists who are excited about sharing their songs than having to spend time and cash combating cover song videos that were n ’ t licensed through the official sync channels . Now , if a publisher is claiming your video and taking SOME or ALL of the revenue generated by the YouTube ads , how can you make money from your cover song video efforts ? Here ’ s a few ways to generate income : Sell the cover song on CD , vinyl , or download and direct your YouTube viewers ( through Cards End Screens , or direct call - to - action ) to purchase the track . If you do this , make sure you ’ ve gotten a mechanical license to sell the cover song ! Distribute the song to streaming platforms like Apple Music , Spotify , Pandora Premium , and more β€” and ask your YouTube subscribers to add the track to their streaming playlists . Use Patreon and encourage your fans to support you monetarily every time you post a new video . Hopefully this article helps you choose the right path for you when it comes to posting cover song videos on YouTube . I ’ d love to see some of your best cover song videos , so please leave a YouTube link in the comments below . And do n ’ t forget to check out Illustrated Sound , the YouTube network powered by CD Baby . We can help you take your YouTube channel to the next level ! Chris Robley . . . is the Editor of CD Baby ' s DIY Musician Blog . I write Beatlesque indie - pop songs that ' ve been praised by No Depression , KCRW , The LA Times , & others . My poems have appeared in Poetry Magazine Prairie Schooner The Poetry Review , & more . I live in Maine and like peanut butter chocolate chip cookies , a little too much . Show More All comments are approved manually . I try to moderate comments twice daily , but hey , weekends and crazy times happen . If you do n ' t see your comment go live right away , it did n ' t evaporate ; it ' s just waiting for my attention . Thanks for reading , sharing your thoughts , and being a part of the CD Baby community ! Join the Conversation Sorry , the browser you are using is not currently supported . Disqus actively supports the following browsers : Firefox Chrome Internet Explorer 11 + Safari Andy Lee β€’ 2 years ago Hi , Chris ! Awesome article . It really helped me understand this whole copyright licensing issue . I have two questions to ask after reading your article . I took an English song and translated it to Korean . The publisher provided me with translation license and mechanical license . If our band wants to perform this song live and post it on Youtube , are you saying we need both the synch license and broadcast&performance license ? And if I want to add the song to a music streaming service in the U.S. and in Korea , what kind of licenses will I need ? Christopher Robley β€’ 2 years ago Hi Andy , If you ' ve secured the mechanical license and the translation license from the publisher , you ' re probably also fine to distribute it via streaming services ( though I ' d check with the publisher to be sure ) . As for YouTube , it ' s a gray area . TECHNICALLY , you need a sync license . BUT . . . hardly anyone is doing that . Most content creators upload cover song videos and then let the publisher take their cut of advertising revenue through YouTube ' s Content ID system . @ ChrisRobley Words β€’ 7 years ago I think you said that if you were not selling downloads but using it just for promotions that this does n ' t fall under the mechanical or sync royalty requirements . But then later you said that it does , If I have no intention of recording the song on my own project or making it available for downloads or any distribution but just want to use it to promote me then do I need to do anything at all ? All I am basically doing is promoting their song for free . It only helps them by giving Nick β€’ 5 years ago In terms of the law , it does n ' t matter . Whether you ' re selling the video / performance , or simply using it for promotional purposes , you still need the licenses . Whether it can be streamed only or downloaded , you still need the licenses . Regardless of the use , any performance or recording , legally speaking , requires the copyright holders permission . The mechanical license scheme is just there to streamline the process , and attempt to balance the rights holder / third party performer relationship by removing the right of " All I am basically doing is promoting their song for free . It only helps them by giving their song more exposure . " That ' s for the rights holder to decide . Many copyright holders would probably agree with you , and in fact I think the vast majority of cover videos on YouTube , etc , are left alone for this reason . However , legally speaking , it ' s not your call . It ' s the call of whoever owns the content , and you are liable if they decide they are not getting what they deserve out of their content . Ultimately , if you do n ' t want to to pay a license fee , you are always free to negotiate directly with the rights holder . Of course , at that point , there ' s no guarantee they will give permission . Many may well allow you to use their content for free if you are n ' t reaping a direct financial return and give attribution . But some wo n ' t , and that ' s their right . And suffice to say it does n ' t go well if you try to negotiate after already making use of their song without their knowledge or permission . Christopher Robley β€’ 5 years ago Yes indeed , the rights holder has the say . But since the climate has shifted towards allowing folks to post music and perform covers on YouTube , YouTube is at least making it possible for the rights holder to monetize those usages . @ ChrisRobley mechlin β€’ 6 years ago Boyce Avenue has launched a massive career by uploading cover songs to YouTube . It would be great to hear from them as to how they secured sync licenses for " Somebody That I Used To Know " , " Payphone " , " Heaven " , " Breakeven " and dozens more . . . october 2017 β€’ 1 year ago Hillarious ! Bud Voegtlin β€’ 7 months ago Thanks for the info . I would like info on how to get my videos viewd more . These are crude recordings and not what we would produce to seriously purse monetization or views . In saying that though , this girl is like nothing anyone has seen . Check out couple of the videos . Thanks again Bud Voegtlin https : / / youtu . be / qwlXiNckYdE https : / / youtu . be / BjMamTT7RAw β€’ 6 months ago Hi Bud , I would n ' t let the fact that they ' re live videos stop you from putting them out there . At the very least , folks can see it ' s a fun live show - - even if the sound quality is n ' t that great . That being said , here ' s some info on YouTube for musicians : https : / / cdbaby . com / campaign . . . Roger Meltzer β€’ 7 years ago Dear DIY Musician : Wordy , but funny . Putting out a cover song on YouTube is essentially enabling a public performance of a copywritten song . The artist / label might have paid the Harry Fox Agency or Limelight a mechanical license fee ( 9.1 cents ) to the copyright holder ( s ) for each CD / download sold , and even negotiated a synch licensing fee to put it on a music video , but unless BMI / ASCAP or some other performance rights society is licensing YouTube for performances / views of the music video on behalf of the copyright owner ( s ) , there is copyright infringement by YouTube in selling and not sharing the advertising shown alongside the video screen , even if the artist / label owns the SR and has paid mechanical and synch fees . . The artist / label is not providing the venue for the public performances of the video and accompanying copywritten work , - - YouTube is - - and they should be paying for the performance rights the same way a legit TV or radio station / network would . The artist / label is not the venue for the public performance - - YouTube and the www internet are . What is sad is that when you ask BMI where is the money for all the thousands of views of a music video using your copywritten song , they tell you YouTube only pays them an annual pittance for their entire catalogue and itttle you are n ' t getting any share of that revenue from YouTube . Not to go off on a rant here , but neither BMI nor ASCAP do much to stop copyright infringements by thousands of smaller terrestrial and internet radio stations that neither log their airplay nor pay to broadcast it . They audit and collect from the same 400 or so big stations and networks every quarter . If you write reggae music that only plays on specialty programs or on small stations , you ' re out of luck They ' re great at going after some mom and pop bar in East Nowhere with a seating capacity of 75 hiring some no name top 40 bands on weekends and getting them to pay up , while radio stations that play copywritten songs 24 / 7 are never pressed to pay . The performance rights societies have become as much a part of the problem as they once were part of the solution . The problem is songwriters and publishers , record producers and even artists have no lobby representing them in Congress , so the loopholes in the copyrightl law remain open , and producers and artists who also make songs into hits never get a dime from the public performances of their work . Respectfully , Roger Meltzer CEO and Director of A&R Capsicum Records LLC Alex Moore Spoken like someone I would want to work with ! Kathryn Ballard Shut ( TIMKAT ) Dear Roger , A great post and I really could relate when you mention the PRO rep going after the bar in " East Nowhere " . Back in the early 1980 ' s , my father owned one of premiere jazz clubs in Dallas , and as a result , often mentioned that he " dreaded the ASCAP guy " that showed up in person every quarter , demanding detailed listings of all the musical works , both played live in the nightclub , as well as anything that was broadcast over the PA system . Traditional PROs ( of which I I have learned of a couple of companies that are emerging to try to address the issue of performance artist royalties for streamed music . Songtrust ( yearly subscription service ) and SoundExchange ( so far , free ) . I tweeted SoundExchange . com ( @ SoundExchange - SX ) the other day and asked them how they were different from traditional PROs . I also asked if one could be a member of their service , even if they were also in a PRO ? Their answers were that they pay for performance royalties ONLY on digital ( online , streaming ) media , currently not administered by PROs ; and that yes , one could register artists , titles , labels , and albums with them , and still be an ASCAP , SESAC , or BMI member . SX also has a database ( called ' PLAYS ' , maintained since 1998 ) where one can look up artist , label , or song - - I found several of our songs there , but I have no idea what royalties ( if any ) will come of it . See http : / / www . soundexchange . com / for more info . Finally , to address these loopholes , apparently SX partners with an org called the MusicFirst Coalition that is pressing Congress to pay royalties to performing artists . Check out http : / / www . musicfirstcoalit . . . I am by no means an expert at this and I am not employed by SoundExchange or Songtrust . As a copyright holder , I just learn something new every day in this business and I thought I might pass the information along as this topic will only get hotter in time . Best wishes , Kathryn Ballard Shut President TIMKAT Entertainment , Inc . Denver , CO , USA Twitter : @ timkatent Web : http : / / about . me / timkatent Guest β€’ 6 years ago Here you see me holding some of my own copyright music . . . . .Big Deal ! It is beginning to look to me as if the least troublesome and legally safest thing for me to do is to share it with no - one , keep it all to myself and have it buried in my coffin with me . I find it amazing how much effort some humans will sometimes put into being selfish about what they own or have created to the point of supporting the having of what amounts to a separate " Police Force " e.g. ASCAP , APRA et al working to ensure that " protection money is paid " ( Royalties ) and that their own artistic selfishness ( Copyright ) is preserved . Those who work in such policing bodies neither contribute music nor create anything as do Composers , Arrangers and Song writers . They even try to make huge sums of money " Organising Music Events " where the " Real AND ACTUAL Workers and Artists " are the drawcard who just happen to need a venue . They are nothing more than sponging " legalised stand - over merchants " who make their money ( income and living ) sucking it out of what " should ALL " be going to the original artist or composer as their dues for the work they have done to earn a living or additional income from their artistic works . Grow up , change the Copyright laws and learn to share , the lot of you ! The Internet being what it is will change things in ways as yet unimagined and the hangers - on and spongers will go by the way sooner or later , leaving the artist to collect their dues from those ( fans , listeners , buyers ) who wish to willingly cash contribute . Oh yes ! . . .my most heard phrase at the Brisbane Unconvention from almost every Presenter from the several " panels " was . . . . . . . . . . . " Do n ' t get into Music if you want to get rich . . .there ' s no money in it . . . . . .just do it for the love and fun of it ! " Ok . . . . . .so I guess its back to the Manuscript Monitor Display for me folks ! Ian Heath Great article . I think a good follow up would be to delve further into the monetization of youtube and how that affects this issue . You touch on it at the end offering it up as a possible alternate solution , but i think this would make a great article on it ' s own . . . how the user - generated - content is monetized , the fingerprinting process , what labels are involved in this agreement ( so indie artists have a rough idea of what ' s fair game or not ) etc . . Joseph Miller β€’ 1 year ago Right . . . Ian . . . why not when there is a cover of a tune done then the original may become part of the advertising popup on the right side of the page . Better that than some blood thinner ad that always pops up on my feeds . Good suggestion . Thanks . Sepulveda Question : I have made an adaptation of a song from English to Spanish , do I need to register this new version as mine on the library of congress ? I also have contacted the publisher of the original writers and they are waiting from my new version , they can help me to get the synch license as well ? I ' m planning to use the karaoke music from iTunes to record this new version if I get the licenses , is that OK ? . I will appreciate if you can help me . Thanks a lot , great article . Symone Coleen The reply was deleted . Can you please tell me what the reply was ? Are you wondering about the answer to this question about a song translation ? I ' m not 100 % sure ( I ' m not a lawyer ) , but I think there are cases where translations are considered " derivative works " and not cover songs . In that event , the person creating the translation would need to get the permission of the publisher before distributing the song . That being said , if it ' s a super faithful translation and the melody remains the same , I ' ve heard of artists just getting a Follow me to the end of the rainbow on Facebook Twitter Spotify Instagram , or subscribe to my newsletter and get a free PDF of my poetry chapbook : I Say Potato , You Say Apocalypse bialybor β€’ 3 months ago My case is this : I ' ve arranged / programmed backing for Eleanor Rigby Beatles . Sung by a friend . It ' s very different from original . Video done by me - just public spaces . I want to publish in on YouTube not for monetary gains . Rather . . just to show off . Do I still need some licence ? ( will cost me ? How much ) ? Thanks in Advance for any Advice ! β€’ 3 months ago Most likely , the video will be ID ' d by Content ID as a Beatles tune , and any ad revenue generated by your video will be paid to the appropriate rights holders . That being said , it ' s not guaranteed . Rights holders can still opt NOT to monetize your content , and instead have it blocked or restricted in certain regions . So do n ' t take this as legal advise . There COULD be consequences , but I would bet that most likely you ' re safe to publish that video so long Guest Louise It is . Musicians should be paid for their time , their recordings - that ' s it . If a director once to use your music in his / her film they buy your recording , you get credited . Millions see the film and want to buy a copy of your music . Millions of customers . Why do you need royalties ? Its just a way for Record companies to make money off of the real creators . Joseph Miller Louise . . . . Royalties are part of the retirement plan of most recording artists . . and writers . You do not have the same writing or performing juice in your 50 ' s that you had in your 20 ' s . If it were n ' t for Royalties and Copyright protection many of our favorite artists would be living on the streets in their 60 ' s . . . James Gilbert Not exactly cover songs , but I ran into problems on YouTube when I posted recordings ( with still image video ) of my own arrangements of the public domain tunes What Wondrous Love and The Entertainer and monetized them . Some artist & publishing organization and Warner music both claimed ownership . I ' ve also had YouTube question and refuse to monetize my own compositions and my own visuals because they were n ' t satisfied when I checked all the right boxes and told them they were my own material . YouTube never did allow me to Margaret We have also had trouble monetizing on YouTube , even though the song is entirely original ( with ISRC & BMI catalog number to prove it ) , the video is made by us , the performance is all ours , all the graphics are , etc . they keep saying it is n ' t proven that it ' s original material . Have you been able to contact them directly via email ? Or get someone on the phone to explain ? Kirk Thomas In a very similar boat . Please keep us informed as to what you learn . I ' m new to the whole monetizing process and find it circuitous and confusing on many fronts . Christiane Kinney Sounds like it might be helpful for me to write an article in the near future de - mystifying the whole monetizing process on YouTube . Thanks to James & Kirk for sharing ! john Very helpful article . What if you record a cover and just place the audio file on your website - no video , no YouTube ? Do you need just the mechanical license in this case ? PatanjaliS At least in Australia , you need to get a separate license to use a clip of no more than 30s ( with a couple of secs ) . I do n ' t know what Amazon , iTunes et al do to aloow them to provide a clip . Keith Livingston Yes . You need to pay the songwriter for each time the song is listened to , or downloaded . It does n ' t matter if you sell it or not . Brian John Mitchell It ' s also worth noting that a number of artists have had their channels taken down for having their own content put up because of how YouTube finds copyright infringement . I just got a warning last week about putting up copyright violating material for a video for my own song . Noella Rose β€’ 3 years ago This is a huge problem with the system mostly from bad code and somewhat from bad people trying to scam the holes in the system . You ' re so not alone , and many more are in fear surely , so hopefully it will get sorted out . Good luck . Keep bringing up the issue ! It definitely helps . I did n ' t want to see your comment continue with no replies . We ca n ' t let this go . Phil Erskine What if its horribly out of sync , Is that ok ? Noella Rose β€’ 3 years ago LOL I feel you with that joke . This part of CR law is so outdated ( it ' s not the same kind of syncing as before the Internet , which to me is often so similar to live ) but at least this little bit of silliness is making me smile . : ) Ha . . . Phil . . . Alisha Nicole I have a question if anyone can answer I ' d deeply appreciate it . ( : - I wrote a cover to Dirty Laundry by Kelly Rowland , changed the hook and maybe kept 5 - 10 words from the original piece . This is my first time ever writing an actual song , and I wanted to record the cover on youtube , of just me simply singing it as tonssss of other people do as well . Problem is , I ' m also a Youtube Partner so they will check for copyright . But , as Hey Alisha , That ' s an interesting case , because technically what you ' ve created is not a " cover song " β€” but a " derivative work . " That ' s a work where you ' ve taken someone ' s original composition and made significant changes to the music or lyrics . Legally , you do n ' t have the right to sell , stream , or share this music without the permission of the publisher / songwriter . IF they agree to allow your derivative version of their song , then they get to pretty much So . . . Christopher . . . re : Alisha Nicole . . . . she ' s likely to make 25 maybe 50 Bucks on this site . And the advice is to go to a 350 per hour Entertainment Attorney ? trapper456 Any part of the melody / words ; they are all protected by copyright . You can use the same chord structure and style but you have to come up with something that is original that sounds like no one else ’ s song . In your case you will probably have to secure a synch license and mechanical license for all interned purposes . I am not a lawyer or anything , but I study the copyright website every day because of my myriad of copyrights that I hold . So , if you are using the melody or any words of the original composition you are in copyright violation . You can not make money off of someone else ’ s song weather it be a cover or not without the original copyright holder or publisher ’ s permission . If you do , do this that is the easiest way to open yourself up for a lawsuit . I never sure anyone , but I just have YouTube pull the videos of my songs . That is because there are so many loopholes to even getting paid from this or any other organization . The copyright holder has the entire say so in the matter . What my suggestion to you is to try to get into contact with the copyright holder and ask them if this is ok . But , however , I am willing to bet that they are not going to want someone else making money to their music . The reason being is that , that could be their only way that they make money on their creations . You see , being a songwriter is being an inventor . No , if you created a product and went through all the loopholes to get it on the market , like a songwriter has to do , you would not want someone else making money off of your invention after all of the maybe thousands of dollars and a massive amount of creativity went into your project . You would be raging ferrous , if someone else wanted to make money off of your invention , would n ' t you . That is how songwriters feel about their creations . So , as I suggested earlier get into contact with the copyright holder and ask them if you could do this . But , I can almost bet that they are going to want a share of your per click income that you will be making money off of . Or , they might just tell you to word the credits in a certain way so that the said songwriter can get free promotion and advertisements out of . If there is any part of the " Words or Melody " YouTube will recognize this . So , please , please , please , contact the person that owns the song to avoid any lawsuit against you . So if you wanted to put up a Karaoke version of yourself singing " Let ' s Stay Together " . . . . you ' re saying to chase down " Al Green " . . . . . or go through a bunch of resources . . . here ' s one ASCAP . . . no good https : / / www . ascap . com / reper . . . JDG So people like KurtHugoSchneider and Christina Grimmie have get licenses everytime they cover a song ? Well , it ' s a gray area on YouTube , but in terms of selling downloads / CDs / streams β€” absolutely yes . They have to pay the songwriter / publisher of any song they ' re covering . Scenic Roots What do you recommend doing if you try to contact the composer / publisher to negotiate a synch license , but can not get them to return phone calls or emails ? My experience has been that in many cases , publishers and artists do n ' t really want to deal with the " little people " . So there needs to be a new company formed that will handle all these licenses and collect money for the Artists . . . I ' m thinking ASCAP and BMI are too outmoded . . . . dare I say . . . Calcified ? Kind of like trying to get a rock gig in the 60 ' s through the Musicians Union . Is this something they initiated or expressed interest ? If so , just check in with them every few weeks . If not , and if you ' ve made several attempts to contact them without reply , I ' d say to leave it be for a bit . They ' re probably not interested this go around . Try again in 6 months . Mmm yeah , pretty sure that goes wayy against YouTube " Best Practices . " Any law - abiding person : fail pls . Dems de breaks ? SMH . In other words , just one more reason it seems " no one " does this right . I want to dive in to what seems like a required part of modern music , but I get anxious . Was looking for updated info about YT blanket licenses while tired and grumpy . . . ; ) That does n ' t make it right or you wrong , but it ' s this elephant with gigantism all around . . . So annoying . Do it or you ' ll fail . . . but you ' re a criminal and there ' s a smaller chance you ' ll get knicked . . . but do it or toil away as a laughable dreamer , you overthinking , procrastinating , definitely straight - edge , dweeby loser . Haha . The dilemma is infuriating . I think we need more vents about this , to talk openly amongst the music peeps , and to hopefully bring up some sort of modernizing of the law to the government . It ' s hush hush . " Do n ' t do it ( but the eyes say : doooo it , fool , and yes the lazy , cheap way ) . " Let ' s get real . PatanjaliS We wrote an email to the publisher asking to use a particular song and they replied that it was OK without payment ( I think they have got that now ) . We intend to quote that approval in the description . That will suffice . However , some artists are fussy . We were told by Van Morrison ' s publisher that he was very finicky about videos , and wanted to know all about the visuals to be used with his songs . Pity , because it was the only cover on our CD . We decided there were plenty of other covers we could do that were n ' t so onerous to negotiate . Just because you have published a song does not mean you can not control how or where it is used , like that it is not allowed to be used derogatorily . You can still place those restrictions , but run the risk of your songs not being covered . I guess Van has an old - school mind , which makes sense . Nerds and youngins do n ' t see Internet streaming or " video " the same way . It ' s more like standing in front of someone than making a * filme * or something for MTV . And it ' s also now virtually mandatory for all audio to have the kind of " video " you mention . YouTube is the new audio place . It ' s a new world now but some crucial people are stuck in the old . . . and people screwed and vilified . Your Songs + Our Tools = Musical Independence Music Resources : CD Baby Help Center Hostbaby . com Sell your music CD Baby Podcast Free musician guides DIY Musician Conference Tweets by cdbaby Back to top Β© 2018 CD Baby
[ "legally post", "cover song video", "YouTube" ]
http://dkmm.org/types-of-composting
This information was obtained from the EPA website Types of Composting Backyard or Onsite Composting Backyard or onsite composting can be conducted by residents and other small - quantity generators of organic waste on their own property . By composting these materials onsite , homeowners and select businesses can significantly reduce the amount of waste that needs to be disposed of and thereby save money from avoided disposal costs . Learn how to create your own compost pile . Types of Waste and Waste Generators : Backyard or onsite composting is suitable for converting yard trimmings and food scraps into compost that can be applied on site . This method should not be used to compost animal products or large quantities of food scraps . Households , commercial establishments , and institutions ( e.g. , universities , schools , hospitals ) can leave grass clippings on the lawn - known as β€œ grasscycling ” - where the cuttings will decompose naturally and return some nutrients back to the soil . Backyard or onsite composters also might keep leaves in piles for eventual use as mulch around Climate or Seasonal Considerations : Climate and seasonal variations do not present major challenges to backyard or onsite composting because this method typically involves small quantities of organic waste . When conditions change - for example , if a rainy season approaches - the process can be adjusted accordingly without many complications . Environmental Concerns : Improper management of food scraps can cause odors and also might attract unwanted attention from insects or animals . Requirements : Backyard or onsite composting requires very little time or equipment . Education is the most critical aspect of backyard or onsite composting . Local communities might hold composting demonstrations and seminars to encourage homeowners or businesses to compost on their own properties . Results : The conversion of organic material to compost can take up to two years , but manual turning can hasten the process considerably ( e.g. , 3 to 6 months ) . The resulting natural fertilizer can be applied to lawns and gardens to help condition the soil and replenish nutrients . Compost , however , should not be used as potting soil for houseplants because of the presence of weed and grass seeds . Vermicomposting Through this method , red worms - not nightcrawlers or field worms found in gardens - are placed in bins with organic matter in order to break it down into a high - value compost called castings . Worm bins are easy to construct ( they are also commercially available ) and can be adapted to accommodate the volume of food scraps generated . Types of Waste and Waste Generators : Worms will eat almost anything you would put in a typical compost pile ( e.g. , food scraps , paper , plants ) . Vermicomposting can be ideal for apartment dwellers or small offices that want to derive some of the benefits of composting and reduce solid waste . It is frequently used in schools to teach children conservation and recycling . Climate or Seasonal Considerations : Worms are sensitive to variations in climate . Extreme temperatures and direct sunlight are not healthy for the worms . The optimal temperatures for vermicomposting range from 55 Β° F to 77 Β° F . In hot , arid areas , the bin should be placed under the shade . By vermicomposting indoors , however , one can avoid many of the problems posed by hot or cold climates . The primary responsibility is to keep the worms alive and healthy by providing the proper conditions and sufficient food . Requirements : Vermicomposting has only a few basic requirements , among them : worms , worm bedding ( e.g. , shredded newspaper , cardboard ) , and a bin to contain the worms and organic matter . Maintenance procedures include preparing bedding , burying garbage , and separating worms from their castings . Results : One pound of mature worms ( approximately 800 - 1,000 worms ) can eat up to half a pound of organic material per day . It typically takes three to four months for these worms to produce harvestable castings , which can be used as potting soil . Vermicomposting also produces compost or β€œ worm ” tea , a high - quality liquid fertilizer for house plants or gardens . Aerated ( Turned ) Windrow Composting Organic waste is formed into rows of long piles called β€œ windrows ” and aerated by turning the pile periodically by either manual or mechanical means . The ideal pile height , which is between 4 and 8 feet , allows for a pile large enough to generate sufficient heat and maintain temperatures , yet small enough to allow oxygen to flow to the windrow ' s core . The ideal pile width is between 14 and 16 feet . Types of Waste and Waste Generators : This method can accommodate large volumes of diverse wastes , including yard trimmings , grease , liquids , and animal byproducts ( such as fish and poultry wastes ) , but only with frequent turning and careful monitoring . This method is suited for large quantities , such as that generated by entire communities and collected by local governments , and high volume food - processing businesses ( e.g. , restaurants , cafeterias , packing plants ) . Climate or Seasonal Considerations : In a warm , arid climate , windrows are sometimes covered or placed under a shelter to prevent water from evaporating . In rainy seasons , the shapes of the pile can be adjusted so that water runs off the top of the pile rather than being absorbed into the pile . Also , windrow composting can work in cold climates . Often the outside of the pile might freeze , but in its core , a windrow can reach 140 Β° F . Environmental Concerns : Leachate is liquid released during the composting process . This can contaminate local ground - water and surface - water supplies and should be collected and treated . In addition , windrow composting is a large scale operation and might be subject to regulatory enforcement . Samples of the compost should be tested in a laboratory for bacterial and heavy metal content . Odors also need to be controlled . The public should be informed of the operation and have a method to address any complaints about animals or bad odors . Other concerns might include zoning and siting : Windrow composting often requires large tracts of land , sturdy equipment , a continual supply of labor to maintain and operate the facility , and patience to experiment with various materials mixtures and turning frequencies . : This method will yield significant amounts of compost , which might require assistance to market the end - product . Alternatively , local governments can make the compost available to residents for a low or no cost . Aerated Static Pile Composting In aerated static pile composting , organic waste is mixed together in one large pile instead of rows . To aerate the pile , layers of loosely piled bulking agents ( e.g. , wood chips , shredded newspaper ) are added so that air can pass from the bottom to the top of the pile . The piles also can be placed over a network of pipes that deliver air into or draw air out of the pile . Air blowers might be activated by a timer or a temperature sensors . Types of Waste and Waste Generators : Aerated static piles are suitable for a relatively homogenous mix of organic waste and work well for larger quantity generators of yard trimmings and compostable municipal solid waste ( e.g. , food scraps , paper products ) , which might include local governments , landscapers , or farms . This method , however , does not work well for composting animal byproducts or grease from food processing industries . : Like windrow composting , in a warm , arid climate , aerated static piles are sometimes covered or placed under a shelter to prevent water from evaporating . In the cold , the core of the pile will retain its warm temperature , but aeration might be more difficult in the cold because this method involves passive air flowing rather than active turning . Some aerated static piles are placed indoors with proper ventilation . Environmental Concerns : Since there is no physical turning , this method requires careful monitoring to ensure that the outside of the pile heats up as much as the core . One way to alleviate bad odors is to apply a thick layer of finished compost over the pile , which can help maintain high temperatures throughout the pile . Another way to deal with odor , provided that the air blower draws air out of the pile , is to filter this air through a biofilter made from finished compost . : This method typically requires equipment such as blowers , pipes , sensors , and fans , which might involve significant costs and technical assistance . Having a controlled supply of air enables construction of large piles , which require less land than the windrow method . : This method produces compost relatively quickly - within 3 to 6 months . In - Vessel Composting Organic materials are fed into a drum , silo , concrete - lined trench , or similar equipment where the environmental conditions - including temperature , moisture , and aeration - are closely controlled . The apparatus usually has a mechanism to turn or agitate the material for proper aeration . In - vessel composters vary in size and capacity . Types of Waste and Waste Generators : In - vessel composting can process large amounts of waste without taking up as much space as the windrow method . In addition , it can accommodate virtually any type of organic waste ( e.g. , meat , animal manure , biosolids , food scraps ) . Some in - vessel composters can fit into a school or restaurant kitchen while others can be as large as a school bus to accommodate large food processing plants . : In - vessel composting can be used year - round in virtually any climate because the environment is carefully controlled , often by electronic means . This method can even be used in extremely cold weather if the equipment is insulated or the processing takes place indoors . : In - vessel composting produces very little odor and minimal leachate . : In - vessel composters are expensive and might require technical assistance to operate properly , but this method uses much less land and manual labor than windrow composting . : Conversion of organic material to compost can take as little as a few weeks . Once the compost comes out of the vessel , however , it still requires a few more weeks or months for the microbial activity to stabilize and the pile to cool .
[ "COMPOSTING", "TYPES", "Vermicomposting" ]
http://dl.acm.org/citation.cfm?id=1189880
Contact Us | Switch to tabbed view Abstract | Authors | References Cited By Index Terms Publication Reviews Comments | Table of Contents ABSTRACT Early in the information age , it was widely thought that wholesalers , distributors , and other intermediaries would be removed from the value chains of many businesses . This disintermediation offered the prospect of more efficient supply and marketing channels . The early forecasts proved to be shortsighted , however , for instead new cybermediaries have lodged themselves in the value chain between manufacturer and customer . This paper explains the phenomenon of cybermediation by looking beyond transaction - cost economics toward newer theories of consumer economics and several theories drawn from institutional theory , social exchange theory , AUTHORS Lei Jin No contact information provided yet . Bibliometrics : publication history Publication years 1999 - 2008 Publication count 5 Citation Count 26 Available for download 1 Downloads ( 6 Weeks ) 3 Downloads ( 12 Months ) 41 Downloads ( cumulative ) 2,048 Average downloads per article 2,048.00 Average citations per article 5.20 View colleagues of Lei Jin Daniel Robey No contact information provided yet . Bibliometrics : publication history Publication years 1978 - 2017 Publication count 55 Citation Count 1,305 Available for download 15 Downloads ( 6 Weeks ) 25 Downloads ( 12 Months ) 278 Downloads ( cumulative ) 22,114 Average downloads per article 1,474.27 Average citations per article 23.73 View colleagues of Daniel Robey REFERENCES Note : OCR errors may be found in this Reference List extracted from the full text article . ACM has opted to expose the complete List rather than only correct and linked references . 1 1 . Atkinson , J . As we see it . Stereophile , 21 , 9 ( September 1998 ) , 3 . 2 Joseph P . Bailey , Yannis Bakos , An exploratory study of the emerging role of electronic intermediaries , International Journal of Electronic Commerce , v . 1 n . 3 , p . 7 - 20 , March 1997 3 Yannis Bakos , The emerging role of electronic marketplaces on the Internet , Communications of the ACM , v . 41 n . 8 , p . 35 - 42 , Aug . 1998 [ doi > 10.1145 / 280324.280330 4 4 . Benjamin , R . , and Wigand , R . Electronic markets and virtual value chains on the information superhighway . Sloan Management Review , 36 , 2 ( winter 1995 ) , 62 - 72 . 5 5 . Blau , P.M . Exchange and Power in Social Life . New York : John Wiley , 1964 . 6 6 . Burt , R.S . Structural Holes : The Social Structure of Competition . Cambridge : Harvard University Press , 1992 . 7 7 . Chadwick - Jones , J.K . Social Exchange Theory : Its Structure and Influence in Social Psychology . New York : Academic Press , 1976 . 8 8 . Crouch , R . Human Behavior , An Economic Approach . North Scituate , MA : Duxbury Press , 1979 . 9 9 . Golfinopoulos , G . , and Talbot , J . Commercial intermediaries on the Internet : Towards a new perspective . In G . St . - Amant and M . Amani ( eds . ) , Proceedings of the Third International Conference on Management and Networked Enterprises . Montreal , 1998 , pp . 410 - 429 . 10 10 . Green , H . , and Browder , S . Online merchants - - cyberspace winners : How they did it . BusinessWeek , June 22 , 1998 , pp . 154 - 160 . 11 11 . Hof , R.D. , and McWilliams , G . The " click here " economy , BusinessWeek , June 22 , 1998 , pp . 122 - 128 . 12 12 . Klein , B . , and Leffler , K.B. The role of market forces in assuring contractual performance . Journal of Political Economy , 89 , 4 ( August 1981 ) , 615 - 641 . 13 13 . Machlis , S . Barnesandnoble . com revamp aims at Amazon . com . Computerworld Online News , October 23 , 1998 . 14 14 . Mauss , M . The Gift . Glencoe , IL : Free Press , 1954 . 15 15 . Negroponte , N . The future of retail . Wired , July 1998 , p . 184 . 16 16 . Nonaka , I . A dynamic theory of organizational knowledge creation . Organization Science , 5 , 1 ( February 1994 ) , 14 - 37 . 17 17 . Ouchi , W.G. Markets , bureaucracies and clans . Administration Science Quarterly , 25 , 1 ( March 1980 ) , 129 - 147 . 18 18 . Perrow , C . Complex Organizations : A Critical Essay . New York : McGraw - Hill , 1993 . 19 19 . Sager , I . , and Green , H . So where are all the bargains ? Business Week , June 22 , 1998 , pp . 154 - 160 . 20 20 . Sarkar , M.B. , Butler , B . , and Steinfield , C . Intermediaries and cybermediaries : A continuing role for mediating players in the electronic marketplace . Journal of Computer - Mediated Communication , 1 , 3 ( December 1995 ) . 21 21 . Scott , W.R . Institutions and Organizations . Thousand Oaks , CA : Sage , 1995 . 22 22 . Steinfield , C . ; Kraut , R . ; and Plummer , A . The impact of interorganizational networks on buyer - seller relationships . Journal of Computer - Mediated Communication , 1 , 3 ( December 1995 ) . 23 23 . Stigler , G.J. , and Becker , G.S. De gustibus non est disputandum . American Economic Review , 67 , 2 ( March 1977 ) , 76 - 90 . 24 24 . Suchman , M.C. Managing legitimacy : Strategic and institutional approaches . Academy of Management Review , 20 ( 1995 ) , 571 - 610 . 25 25 . Tapscott , D . The Digital Economy . New York : McGraw - Hill , 1995 . 26 26 . Virtual vineyards . Harvard Business School , Case no . 9 - 396 - 264 ( April 8 , 1996 ) . CITED BY 13 Citations Troy J . Strader , Sridhar N . Ramaswami , Investor perceptions of traditional and online channels , Communications of the ACM , v . 47 n . 7 , p . 73 - 76 , July 2004 Robin Pennington , H . Dixon Wilcox , Varun Grover , The Role of System Trust in Business - to - Consumer Transactions , Journal of Management Information Systems , v . 20 n . 3 , p . 197 - 226 , Number 3 / Winter 2003 Irvine Clarke , III , Theresa B . Flaherty , Mobile portals : the development of M - commerce gateways , Mobile commerce : technology , theory , and applications , IGI Global , Hershey , PA , 2003 Ola Henfridsson , Helena HolmstrΓΆm , Developing e - commerce in internetworked organizations : a case of customer involvement throughout the computer gaming value chain , ACM SIGMIS Database , v . 33 n . 4 , p . 38 - 50 , Fall 2002 Michael S . Piwowar , Troy J . Strader , Richard B . Carter , Traditional and Online IPO Processes : Are there Differences in after - Market Trading and Market Making ? , Electronic Commerce Research , v . 4 n . 4 , p . 373 - 391 , October 2004 Byung Gon Kim , Sangjae Lee , Factors affecting the implementation of electronic data interchange in Korea , Computers in Human Behavior , v . 24 n . 2 , p . 263 - 283 , March , 2008 Jason Chan , Anindya Ghose , Internet ' s dirty secret : assessing the impact of online intermediaries on HIV transmission , MIS Quarterly , v . 38 n . 4 , p . 955 - 976 , December 2014 Lei - da Chen , Mark L . Gillenson , Daniel L . Sherrell , Enticing online consumers : an extended technology acceptance perspective , Information and Management , v . 39 n . 8 , p . 705 - 719 , September 2002 Yaobin Lu , Ling Zhao , Bin Wang , From virtual community members to C2C e - commerce buyers : Trust in virtual communities and its effect on consumers ' purchase intention , Electronic Commerce Research and Applications , v . 9 n . 4 , p . 346 - 360 , July , 2010 Vivek Choudhury , Elena Karahanna , The relative advantage of electronic channels : a multidimensional view , MIS Quarterly , v . 32 n . 1 , p . 179 - 200 , March 2008 Sangjae Lee , Kyoung - jae Kim , Factors affecting the implementation success of Internet - based information systems , Computers in Human Behavior , v . 23 n . 4 , p . 1853 - 1880 , July , 2007 Nicholas C . Romano , Jr . , Jerry Fjermestad , Electronic Commerce Customer Relationship Management : A Research Agenda , Information Technology and Management , v . 4 n . 2 - 3 , p . 233 - 258 , April - July 2003 Nicholas C . Romano , Jr . , Jerry Fjermestad , Electronic Commerce Customer Relationship Management : An Assessment of Research , International Journal of Electronic Commerce , v . 6 n . 2 , p . 61 - 113 , Number 2 / Winter 2001 / 02 INDEX TERMS The ACM Computing Classification System ( CCS rev . 2012 CCS for this Article Applied computing Information systems Human - centered computing Social and professional topics Electronic commerce Enterprise computing World Wide Web Collaborative and social computing Professional topics Collaborative and social computing systems and tools Computing and business Note : Larger / Darker text within each node indicates a higher relevance of the materials to the taxonomic classification . PUBLICATION Title International Journal of Electronic Commerce - Special issue : Electronic commerce and market transformation table of contents archive Volume 3 Issue 4 , June 1999 Pages 47 - 65 Publication Date 1999 - 06 - 01 ( yyyy - mm - dd ) Publisher M . E . Sharpe , Inc . Armonk , NY , USA ISSN : 1086 - 4415 doi > 10.1080 / 10864415.1999.11518348 REVIEWS Reviews are not available for this item Access critical reviews of computing literature . Become a reviewer for Computing Reviews COMMENTS Be the first to comment To Post a comment please sign in or create a free Web account Table of Contents International Journal of Electronic Commerce - Special issue : Electronic commerce and market transformation Volume 3 Issue 4 , June 1999 previous issue | next issue Introduction to the special issue : electronic commerce and market transformation Varun Grover Albert H . Segars Pages : 3 - 9 doi > 10.1080 / 10864415.1999.11518345 Transforming the marketspace with all - in - one markets Ajit Kambil Paul F . Nunes Diane Wilson Pages : 11 - 28 doi > 10.1080 / 10864415.1999.11518346 Electronic commerce has made possible a new form of electronic marketplace - the " all - in - one market . " All - in - one markets combine multiple trading mechanisms on a common platform and organize trading so that buyers and suppliers can dynamically shift trading . . . expand Manheim auctions : transforming interorganizational relationships with an extranet Richard T . Watson Patrick G . McKeown Pages : 29 - 46 10.1080 / 10864415.1999.11518347 This case study demonstrates how a traditional face - to - face auction has been augmented by an electronic sales system to draw on the advantages of an extranet ( lower site specificity , less risk , more information , just - in - time buying , lower costs ) . The . . . expand Explaining cybermediation : an organizational analysis of electronic retailing Lei Jin Daniel Robey Pages : 47 - 65 10.1080 / 10864415.1999.11518348 Early in the information age , it was widely thought that wholesalers , distributors , and other intermediaries would be removed from the value chains of many businesses . This disintermediation offered the prospect of more efficient supply and marketing . . . Network effects and the impact of free goods : an analysis of the web server market John M . Gallaugher Yu - Ming Wang Pages : 67 - 88 10.1080 / 10864415.1999.11518349 Theory suggests that the role of network externalities is critical to transforming new businesses from market entrant to market leadership positions . However , there have been relatively few empirical studies of network externalities in E - commerce contexts . . . . Information exchange in electronic markets : implications for market structures Varun Grover Pradipkumar Ramanlal Albert H . Segars Pages : 89 - 102 10.1080 / 10864415.1999.11518350 The proliferation of information and of access to information made possible by the Internet has stimulated a fundamental rethinking of market structures . The greater information transparency between consumers and suppliers of products / services makes . . . Overcoming EDI adoption and implementation risks Frederick J . Riggins Tridas Mukhopadhyay Pages : 103 - 123 10.1080 / 10864415.1999.11518351 The emergence of the Internet as a business - to - business communications tool enables a new wave of adoption of EDI and other interorganizational systems . Initiators of these trading - partner relationships must develop concrete strategies for managing the . . . Powered by
[ "cybermediation", "organizational analysis", "electronic retailing" ]
http://dl.clackamas.edu/ch105-04/wtvolpct.htm
Weight / Volume Percent Another variation on percentage concentration is weight / volume percent or mass / volume percent . This variation measures the amount of so l ute in grams but measures the amount of solution in milliliters . An example would be a 5 % ( w / v ) NaCl solution . It contains 5 g of NaCl for every 100 mL of solution . Volume percent = weight of solute ( in g ) volume of solution ( in mL ) x 100 Because of the different units in the numerator and denominator , this type of concentration is not a true percentage . It is used as a quick and easy concentration unit because volumes are easier to measure than weights and because the density of dilute solutions is generally close to 1 g / mL . Thus , the volume of a solution in mL is very nearly numerically equal to the mass of the solution in grams . Top of Page Back to Course Homepage E - mail instructor : Eden Francis Clackamas Community College Β© 1998 , 2003 Clackamas Community College , Hal Bender
[ "Weight / Volume Percent", "variation", "dilute solutions" ]
http://dl.clackamas.edu/ch106-01/simple.htm
Simple Alkanes The simplest alkanes have twopart names More complex molecules will have additional parts as needed The first part of the name for a simple alkane tells how many carbon atoms are in the molecules The second part is simply ane to indicate single bonds only Ten of these alkanes are listed here I would like you to learn these ten names and be able to associate each of those names with the molecular formula shown next to it specifically the number of carbon atoms shown in the formula You can memorize the number of hydrogen atoms if you want but you can figure them out very easily when you need to as you will see Name Molecular Formula methane CH 4 ethane C 2 H 6 propane C 3 H 8 butane C 4 H 10 pentane C 5 H 12 hexane C 6 H 14 heptane C 7 H 16 octane C 8 H 18 nonane C 9 H 20 decane C 10 H 22 You should notice that most of these names contain standard prefixes for numbers pent for five hex representing six hept representing seven oct representing eight non for nine and dec for ten You are probably already familiar with most of those from the names of various geometric shapes like pentagons and hexagons Although meth eth prop and but dont come from the same source you will need to become familiar with those prefixes meaning one two three and four carbon atoms respectively pent 5 hex 6 hept 7 oct 8 non 9 dec 10 To review the names of these alkanes are made up of two parts The first part represents the number of carbons that would be the meth eth prop but pent hex hept oct non and dec and the second part is ane These prefixes form the basis for the names of most of the compounds that we will be naming during this course Keep in mind that all ten of these compounds have C and H single bonds only Practice Try naming the compounds shown here they are also in exercise 9 of your workbook before continuing The answers are shown below CH 3 CH 3 CH 3 CH 2 CH 2 CH 2 CH 3 CH 3 CH 2 6 CH 3 Answers CH 3 CH 3 ethane CH 3 CH 2 CH 2 CH 2 CH 3 pentane CH 3 CH 2 6 CH 3 octane
[ "Simple Alkanes", "carbon atoms", "single bonds" ]
http://dl.nfsa.gov.au/module/294/
NFSA Digital Learning | Resource Writers | Resource Finder Help NFSA Home This is a printer friendly page Free for educational use Aboriginal People in the Gibson Desert National Year 9 & 10 Australian History Indigenous Studies Search Again From the website Australians At Work Video clip synopsis Aboriginal People in the Gibson Desert is an excerpt from the film Desert People ( 51 mins ) , produced in 1966 . In 1966 a few Aboriginal families were living nomadic lives in the heart of Australia ' s Gibson Desert . Year of production - 1966 Duration - 2min 2sec Tags - Australian History change and continuity culture identity Indigenous Australia sustainability see all tags On this Page About the video clip Background Information Classroom Activities Warning - Aboriginal and Torres Strait Islander viewers should exercise caution when watching this program as it may contain images of deceased persons . How to Download the Video Clip To download a free copy of this Video Clip choose from the options below . These require the free Quicktime Player Premium MP4 desert_pr . mp4 ( 15.0MB ) . Broadband MP4 desert_bb . mp4 ( 7.1MB ) , suitable for iPods and computer downloads . Additional help You can buy this clip on a compilation DVD You can buy the program this clip comes from . About the Video Clip top is an excerpt from the film Desert People ( 51 mins ) , produced in 1966 . Desert People : When this film was made , there was still a handful of family groups living a nomadic life somewhere in the heart of the Gibson Desert . tells of a day in the life of two such families . Djagamara and his family were filmed where they had camped , beside an unusually plentiful supply of water in an otherwise dry creek bed at Badjar in the Clutterbuck Hills . Minma and his family were taken back to Minma ’ s country from Warburton Mission to record how they had lived until just a few months before . This extraordinary film offers a rich experience of Aboriginal culture as the families share their traditional knowledge . People Of The Australian Western Desert : In 1965 and 1967 , the Australian Institute of Aboriginal Studies sponsored film trips by the then Australian Commonwealth Film Unit ( now Film Australia ) to the Western Desert region of Australia . The object of these trips was to film the daily life of nomadic Aboriginal people living in the Gibson Desert of central Australia . Although this land is one of the most arid regions of Australia , the people who lived there regarded it as rich in resources . People Of The Australian Western Desert is an Australian National Film Board Production . Produced by the Australian Commonwealth Film Unit for the Australian Institute of Aboriginal Studies Background Information top In the 1960s a film crew made an * ethnographic record of the dwindling * Indigenous population of the Gibson desert area . Indigenous people had lived in the area for thousands of years in a traditional way , before the destruction of that way of life in the late twentieth century . Indigenous – born or produced naturally in a land , native ethnographic – documentary style filmmaking that records information about a society or culture Classroom Activities Write a brief synopsis of the clip In the clip it says that daughter β€˜ Nabula ’ is unmarried because of the dwindling desert population : What may have caused this population reduction ? What attitude do you think the narrator has to the people featured in the clip and the way they live ? Explain your response . Imagine that you are part of the film crew . Are there any special ethical considerations that you think would need to be observed ? For example , what might happen if you left behind examples of non - traditional technology , such as metal axes ? Or if you arranged for plane food drops ? Aboriginal and non - Aboriginal perspectives of the relationship between land and country vary . What evidence is there in the film of this relationship for the Aboriginal family ? This clip records some the day in the life of Djagamara and his family who were filmed β€˜ where they had camped ’ .In the same film from which this clip is taken β€˜ Minma and his family were taken back to Minma ’ s country from Warburton Mission to record how they had lived until just a few months before . ” Why may have Minma and his family been living in a mission and not Djagamara ’ s family ? Consider the different kind of life Djagamara and his family would have on a mission compared to their traditional nomadic life . What aspects of his family may be disapproved of by the mission personnel ? The Europeans running the mission would consider Minma and his family ’ s new life style preferable to that of Djagamaras . Why would they hold that view . How important are such film clips as this one on the people of the Western Desert today ? Explain . Β© 2006 – 2019 NFSA Digital Learning | Feedback | NFSA Home Copyright & Legal Help
[ "ABORIGINAL PEOPLE", "GIBSON DESERT", "nomadic" ]
http://dlisted.com/2016/08/18/the-fixer-upper-couple-are-sick-of-seeing-their-clients-homes-on-airbnb/
The β€œ Fixer Upper ” Couple Are Sick Of Seeing Their Clients ’ Homes On Airbnb August 18 , 2016 / Posted by : Michael K 754 Because I just love some good ole ’ HGTV drama ( I am still waiting for a scandal involving that annoying Flip Or Flop couple ) , here ’ s a story about how that Fixer Upper couple hates seeing their work on home rental sites more than they hate wood that has n ’ t been tastefully distressed . The Waco Tribune says that at least six houses in Waco , TX that Chip and Joanna Gaines renovated on Fixer Upper are available for you to rent nightly on sites like Airbnb and VRBO . Chip and Joanna do n ’ t like that , and it seems like future contracts with homeowners will have a β€œ NO RENTING IT OUT OR ELSE ” clause in it . Sorry , tricks , but only Chip and Joanna are allowed to make $ $ $ $ from their show , thankyouverymuch . Thanks to the success of , Waco has gone from being known as that town where a bunch of cult members died in a standoff with the FBI to being the Land of Whitewashed Shiplap and Giant Clocks . It ’ s crazy , but that show added a boost to tourism in Waco and some of Chip and Joanna ’ s past clients are getting in on the action . The Tribune interviewed a few homeowners who are pimping their houses out and all of them said that they did n ’ t intentionally go on the show for Chip and Joanna to renovate A rep for Chip and Joanna ’ s company burped up a statement where he said that yeah , yeah , they totally understand that people want to make that money , BUT … and then he dribbled out something about honor : β€œ We have no problems with our clients ’ interest in using sites like VRBO and Airbnb to rent out their homes . In fact , we get it . But we are going to be more strict with our contracts involving β€˜ Fixer Upper ’ clients moving forward . We want to honor our national viewing audience . We want to do remodels for clients ’ homes . That ’ s the true intent of our show , and we want to ensure that does not get lost in this new vacation rental trend . What started off with If you go on Fixer Upper , you have to pay for the renovations yourself and you only get to keep the furniture , which mostly comes from Chip and Joanna ’ s store Magnolia Market , if you buy that shit . Some people think it ’ s rich of Chip and Joanna to throw hate at the whole β€œ renting ” thing since they renovated a big house into a bed and breakfast on their show . Yeah , I see them . They ’ re probably trying to stomp out the competition ! But well , if you ’ re ever in Waco , you now know that you have many options when it comes to sleeping in a rented bedroom that ’ s like a shiplap coffin and has the word β€œ D R E A M ” written in metal letters over a bed made from reclaimed wood . This story gave me the sads , slightly . I ’ m sad that Airbnb was n ’ t around when Trading Spaces was on , because I definitely would ’ ve traveled far to stay in one of Hildi ’ s magnificent creations : Who gives a shiplap ! It was and will always be about sand carpet . Pics : HGTV , TLC Tags : HGTV You Serious Our commenting rules are pretty simple : If you make any overly offensive comment ( racist , bigoted , etc . . ) or go way off topic when not in an Open Post , your comments will be deleted and you will be banned . If you see an offensive or spammy comment you think should be deleted , flag it for the mods and they ' ll be forever grateful and give you their first born ( although , you probably do n ' t want that ) . Trending MOST DISCUSSED MOST VIEWED POSTS Open Post : Hosted By The First Look At The Live - Ac . . . [ 2034 ] comments Open Posted : Hosted By Cardi B ' s Answer To Being . . . [ 1438 ] comments Open Post : Hosted By The Mysterious Mashed Potato . . . [ 1198 ] comments Open Post : Hosted By The Twerkin ' Blossom Of Spiri . . . [ 1440 ] comments Open Post : Hosted By Cotton Candy Cap ' n Crunch [ 1331 ] comments Never lucky . Instagram images are failed to load . ; ( Everything happened in last night ' s Game of Thrones premiere Intro for April 15 , 2019 Chelsea Handler & Melissa Etheridge are still talking about Angelina Jolie Khloe Kardashian reunited with Tristan Thompson for True ’ s first b - day party Dancing With The Stars : Val Chmerkovskiy & Jenna Johnson Got Married Gregg Leakes , Marlo Hampton , & Tanya Sam Join Real Housewives Of Atlanta Reunion Tonight Home About Archives Contact Copyright Disclaimer Privacy
[ "Fixer Upper", "HGTV drama", "Airbnb" ]
http://dm2.newlifeoutlook.com/infographics/diabetes-dizziness/
Diabetes and Dizziness Advertisement How to Keep Your Brain Sharp When You ’ re Feeling Low The most immediate symptoms of low blood - sugar include dizziness and light - headedness , and can lead to confusion and sometimes fainting . Those who live with diabetes can alleviate all of this by eating a healthy diet and exercising , but there are other approaches that can help . This infographic explains more . See Also Diabetes Foot Pain Treatments Diabetes Foot Pain Medicine Diabetes Information Type 2 Diabetes Treatments You might also like . . . 12 Diabetic - Friendly Summer Activities Everyone Can Enjoy Embed this image on your website or blog Copy and paste the code below to use this infographic on your site . < figure > < a href = " https : / / diabetes . newlifeoutlook . com / infographics / diabetes - and - dizziness / " title = " Diabetes Infographic : diabetes and dizziness infographic from New Life Outlook " > < img src = " https : / / media - diabetes . newlifeoutlook . com / wp - content / uploads / 2018 / 10 / nlo_infographic_brainfog_featured - 1 . jpg " alt = " Infographic : Low blood - sugar can have awful effects on your brain . Here ' s what you can do NewLifeOutlook Team Jul 8 , 2014 print this Up next : 10 Foods to Avoid With Diabetes Top foods to avoid with diabetes are ones high on the glycemic index , full of fats easily oxidized or foods high in advanced glycation endproducts ( AGEs ) . by Dr . Donna on May 28 , 2014 Advertisement Click here to see comments
[ "Diabetes", "Dizziness", "low blood-sugar" ]
http://dmcantor.com/dui-vehicular-crimes/arizona-extreme-dui-laws-and-penalties/
Home About the Firm Practice Areas Case Stages Courts Judges Guides Contact Us Victories Extreme DUI & Super Extreme DUI in Arizona : Laws and Penalties You are here : Home DUI Arizona – DUI Defense Attorney Extreme DUI & Super Extreme DUI in Arizona : Laws and Penalties Do you have an Extreme DUI / DWI or Super Extreme DUI / DWI in Arizona ? Was your Blood Alcohol Content ( BAC ) a 0.15 % or higher If so , you are facing a minimum of 30 days in jail and a $ 2,500 fine . Read the rest of this page to learn more about Arizona Extreme DUI Laws and Penalties then call us for a Free Consultation Our offices are available 24 hours a day , 7 days a week at ( 602 ) 307 - 0808 . Extreme DUI Charges .15 – .199 BAC Super Extreme DUI Charges .20 BAC or Greater Penalties for Extreme DUI Penalties for Super Extreme DUI Possible Defenses for DUI David explains what is an Extreme DUI charge in Arizona : Your browser does not currently recognize any of the video formats available . Click here to visit our frequently asked questions about HTML5 video . If you had a BAC of less than 0.15 % read more about Regular DUI in Arizona . If you are being charged with a Felony DUI , then you need to read more about Aggravated DUI in Arizona . If you would like information on why you should hire an attorney to fight for you , visit our Arizona DUI Lawyer page . Learn about Extreme DUI in Arizona Laws and Penalties If you ’ ve been suspected of a Phoenix Extreme DUI then we suggest you read the rest of this document to learn about Arizona Extreme DUI Laws and Penalties and then call us for a Free Consultation at 602 - 307 - 0808 . If you were arrested in Scottsdale , click here to find out what a Scottsdale DUI Lawyer can mean for your case . Get a Free Case Consultation The Difference Between Extreme and Super Extreme DUI / DWI In Arizona , Extreme DUI / DWI and Super Extreme DUI / DWI carry more severe penalties than a regular DUI ( Click Here to Learn about Regular Arizona DUI Laws and Penalties ) Arizona usually files two or three charges against you : EXTREME DUI / DWI A.R.S. Β§ 28 - 1382 ) Driving with a Blood Alcohol Content ( BAC ) of 0.15 % or greater within two hours of driving . SUPER EXTREME DUI / DWI A.R.S. Β§ 28 - 1382 ( D ) ( 1 ) ) Driving with a Blood Alcohol Concentration of 0.20 % or greater within two hours of driving . The Extreme DUI / DWI charge is the same as the DUI charge except it requires the BAC to be .15 % or greater The punishment is 10 times more jail time than a regular first offense DUI The Super Extreme DUI / DWI charge requires the BAC to be .20 % or greater The punishment for Super Extreme DUI / DWI is 45 times more jail time than a regular first offense DUI . This is true even if it is your first DUI offense ever ! Free Consultation with a DUI Lawyer Possible Punishment / Penalties for Extreme and Super Extreme DUI / DWI Below are videos that explain the possible punishments for extreme DUI / DWI and super extreme DUI / DWI charges . First Offense Extreme DUI / DWI – ( .15 % and above BAC ) : Your browser does not currently recognize any of the video formats available . Click here to visit our frequently asked questions about HTML5 video . First offense mandatory minimum 30 days jail and no days can be suspended * ( this means you must serve all 30 days in jail – day for day ) Pay a $ 2,500.00 fine Must attend alcohol classes One ( 1 ) year of an IID being attached to your steering wheel after all license suspensions are completed ( at a cost of $ 1,500 ) * # . Once you start your car , you must then continue to blow into the device every 15 minutes to keep your car ’ s ignition on ! Lastly , a judge may order a person convicted to consume alcohol for a period of thirty days or more by requiring them to wear a continuous alcohol monitoring device on their ankle , or blowing twice daily into a telephonic breath testing device . The court , in its discretion , may also extend this period of continuous alcohol monitoring . Click the following link for more information on a First Offense Extreme DUI / DWI in Arizona Super Extreme DUI / DWI – ( .20 % and above BAC ) First offense mandatory minimum 45 days in jail and no days can be suspended * . This means you must serve all 45 days in jail - day - for - day ! You will also receive a $ 2,750.00 fine Must attend alcohol classes ( presumably at least 36 ) Eighteen ( 18 ) months of an IID being attached to your steering wheel after all suspensions are completed at a cost of over $ 2,000.00 Lastly , the judge can order you to not consume alcohol for a period of ninety ( 90 ) days or more and require you to wear a continuous alcohol monitoring device on your ankle , or blow into a telephonic breath testing device twice a day . To learn more about the First Offense Super Extreme DUI penalties , click here Second Offense Extreme DWI / DUI – ( .15 % and above BAC with a prior DUI conviction within seven ( 7 ) years from this offense ) : Mandatory minimum one hundred and twenty ( 120 ) days jail and no days can be suspended Fine of approximately $ 3,250.00 30 hours of community service One ( 1 ) year of license revocation Eighteen ( 18 ) months of a mandatory IID being attached to your steering wheel after all suspensions completed at a cost of $ 2,000.00 Click the following link for more information about a Second Offense Extreme DWI / DWI in Arizona Second Offense Super Extreme DUI / DWI – ( .20 % and above BAC with any prior DUI conviction within seven ( 7 ) years from this offense ) : Mandatory minimum one - hundred eighty ( 180 ) days jail and no days can be suspended Fine of approximately $ 3,750.00 Alcohol classes ( at least 36 hours ) One ( 1 ) year of license revocation 30 hours of community service Two ( 2 ) years of an IID attached to your steering wheel after all suspensions are completed at a cost of $ 3,000 . To read more about a 2nd Offense Super Extreme DUI / DWI in Arizona , click here Third offense misdemeanor : The prosecutor has the option of charging a third offense misdemeanor as a first offense felony , Aggravated DUI / DWI . . . and they usually do ! Click here to Learn more about Arizona Aggravated DUI Laws and Penalties . There are a couple of circumstances where you can be charged with a 3rd Offense Extreme DUI / DWI , click here to find out more Schedule Your FREE One - On - One Consultation Today Additional Blog Categories Arizona Criminal Law ( 134 ) Arizona DUI Law ( 93 ) Arizona Immigration Law ( 10 ) Arizona Vehicular Law ( 22 ) ARS 13 - 3405 ( 14 ) ARS 13 - 4305 ( 2 ) ARS 13 - 907 ( 5 ) ARS 28 - 1381 ( 17 ) ARS 28 - 1382 ( 20 ) ARS 28 - 1383 ( 19 ) Assault ( 12 ) Child Abuse Child Endangerment ( 14 ) Computer Crime ( 8 ) Drug Crimes ( 13 ) First Amendment ( 9 ) Forfeiture ( 2 ) Fourth Amendment ( 8 ) Gun Laws ( 4 ) Harassment Jail Guides ( 3 ) Law Cases ( 17 ) SB1070 ( 6 ) Sex Crime ( 13 ) Theft Crimes ( 6 ) White Collar Crimes ( 11 ) Disclaimer Results depend upon factors unique to each case and that results in one case do not predict similar results in others .
[ "DUI Arizona", "DUI Defense Attorney", "Extreme DUI charge" ]
http://dmdavid.com/tag/7-best-classes-to-add-to-multiclass-a-dungeons-dragons-character/
Fourth Edition Proved DD Works Without Saving Throws So Why Did They Come Back 3 Pieces of Dungeon Masters Gear I Love and 1 Failed Experiment 7 Best Classes to Add to Multiclass a Dungeons Dragons Character Posted on January 4 2018 by David Hartlage During the unveiling of thirdedition Dungeons Dragons I saw a member of the design team say multiclassing offered tempting options for every character but that every class offered enough rewards to make the choice to multiclass tough Ideally DD multiclassing strikes that balance In play third edition fell short of balancing multiclassing Classes tended to stack extra features at level 1 and sometimes suffered dead levels offering few benefits so multiclass characters tended to outshine their singleclass peers In fifth edtion multiclassing isnt so optimal The first level of an additional class delivers fewer proficiencies Every class level delivers new features or at least more spell slots So while each class brings goodies characters that multiclass lose some advantages of focus Spellcasters pay the biggest price for multiclassing The top level in each separate spellcasting class limits the highest level of spell a character can know or prepare so every level of a multiclass slows progress to higherlevel spells Characters reach spell slots based on the sum of their spellcasting classes so they may gain slots of a higher level than any spell they know At most they can use those slots to boost a lowerlevel spell Spellcasters who veer from their main class for more than 3 levels will never gain 9thlevel spells Most classes leap in power at 5th level Barbarians fighters paladins and rangers all get a second attack Wizards and sorcerers gain Fireball Bards and warlocks gain Hypnotic Pattern Monks gain Stunning Strike When singleclass characters reach level 5 multiclass characters will fall behind until their main class hits level 5 At level 4 every class delivers a 2 ability score boost Until a characters attack or spellcasting ability reaches 20 these ability boosts stand to improve almost every tohit roll and to hinder every foes save Multiclassers who stop leveling a class at 1 2 or 3 miss a key upgrade Despite the offsetting drawbacks of multiclassing just a level or two of a class can enrich a character For some players multiclassing yields the flexibility to match a characters story concept Other players just want power Many players seek a unique concept Whatever your aim for your character this list reveals the top 7 classes to add as a multiclass 7 Barbarian Generally barbarian makes a poor second class Few martial characters want to avoid armor Spellcasters cant cast while raging Despite the limitations 2 levels of barbarian make a gimmicky combination with rogue The Reckless Attack feature lets your rogue gain advantage for Sneak Attack 6 Cleric For spellcasters aiming to become much more durable two cleric domains make a good start A character who starts as a Tempest cleric gains heavy armor proficiency At 2nd level the domain grants Destructive Wrath which lets a cleric use Channel Divinity to deliver maximum lighting or thunder damage Most spellcasters can find use a for that The Forge domain also grants new clerics heavy armor proficiency At 1st level these clerics can use Blessing of the Forge to add a 1 bonus to your armor or to a martial party members weapon Update In the comments Rooneg raises an important point Heavy armor demands Strength scores higher than any spellcaster needs so most characters only benefit from the medium armor proficiency granted by every cleric domain Unlike other classes that grant armor proficiency a level of cleric keeps spellcasters on pace as they gain spell slots As a drawback your spellcaster will gain little benefit from the 13 Wisdom required to multiclass as a cleric 5 Bard At first level bard delivers light armor proficiency a skill and Bardic Inspiration Most multiclassers continue to gain Jack of All Trades at level 2 This adds half your proficiency bonus to every ability check where you lack proficiency Levels of bard combine easily with charismabased spellcasters 4 Warlock Characters dip into warlock for 2 levels to gain 2 Eldritch Invocations For charismabased casters the Agonizing Blast invocation upgrades Eldritch Blast from an ordinary weak cantrip attack to a powerful option Devils Sight makes a dangerous combination with the Darkness spell Mask of Many Faces lets a deceptive character scheme past obstacles and break a few adventures Ignore the shellshocked look on your dungeon masters face they love it When you calculate a multiclass spellcasters spell slots Warlock levels dont add to other caster levels Still the warlock class combines especially well with sorcerer See 7 Dungeons Dragons character builds absurdly good at one thing 3 Sorcerer Many of the Sorcerous Origins bring appealing perks at level 1 The Divine Souls Favored By The Gods feature lets you add 2d4 to a failed save I like mobile characters so the Storm Sorcerers Tempestuous Magic strikes my fancy Before or after casting a spell the feature lets you fly 10 feet without provoking Multiclassers add sorcerer to gain the 2 metamagic options available at level 3 Quickened Spell Twined Spell and Heightened Spell may rank as the best Subtle Spell helps in adventures that feature role play and intrigue Characters rising in other spellcasting classes can trade spell slots for the sorcery points that fuel metamagic options Except in the sort of dungeon crawls that exhaust spell slots most mid to highlevel casters rarely use all their slots anyway 2 Fighter The first level of fighter ranks as the most useful single level in fifth edition Characters who start as fighters gain heavy armor proficiency Level 1 also delivers a fighting style The Archery style brings a 2 to ranged weapon attacks and benefits every sharpshooter The Defense style grants 1 AC and keeps your spellcaster from harm The Protection style helps save your allies Protection lets a shieldbearing character impose disadvantage on an attack against a character within 5 feet Firstlevel fighters also gain Second Wind Levels 2 and 3 bring fewer rewards but the features suit players who enjoy bringing big damage spikes At 2nd Action Surge lets fighter take an extra action once between rests At 3rd the Champion archetype scores critical hits on a roll of 19 or 20 This combines brilliantly with the paladins Divine Smite feature If you stick with fighter through level 3 you should probably stay with the class to level 5 for the ability score boost and the Extra Attack feature 1 Rogue At 1st level the Rogue class delivers Sneak Attack but the Expertise feature may benefit dabblers more Expertise doubles your proficiency in two skills Second level brings Cunning Action the best prize for multiclassers Use a bonus action to Dash Disengage or Hide As a bonus characters who start as a rogue gain 4 skills while most other classes just get 2 A level or two of rogue fits with most multiclass characters Whats your favorite multiclass combination This entry was posted in Advice and tagged barbarian bard character generation cleric fighter multiclassing paladin rogue sorcerer warlock Bookmark the Fourth Edition Proved DD Works Without Saving Throws So Why Did They Come Back 3 Pieces of Dungeon Masters Gear I Love and 1 Failed Experiment
[ "Classes" ]
http://dmlawfirm.com/shingles-vaccine-really/
Shingles Vaccine ? Really ? Is there a shingles vaccine ? Really ? There is a shingles vaccine in name , according to Merck Pharmaceuticals , the company that makes it . Whether or not Merck ’ s Zostovax works as a β€œ vaccine , ” or how well it works , or whether it is worth the risks of taking it , is all another story . Whether any vaccine ever works effectively or even safely as advertised is also another story , one requiring much study and analysis . Shingles Vaccine Lawsuits Meanwhile , some people are filing shingles vaccine lawsuits because they ’ ve developed a case of full - blown shingles AFTER getting the β€œ vaccine . ” Or they ’ ve dropped their 200 - some bucks for the β€œ vaccine , ” and then they ’ ve gotten shingles , and suffered vision damage up to blindness , or postherpetic neuralgia , or other permanent nerve damage . See also – Shingles Vaccine : Help or Hype ? Zostavax ’ 1.7 % Effectiveness ( Seriously ? Seriously . ) Health Sciences Institute ( HSI ) authors published a January 2016 article which reported , in part , β€œ UCLA researchers found that only one in 175 people who get the vaccine will be able to dodge a shingles flare - up . ” Merck , meanwhile , claims Zostavax is 50 % effective . Merck arrived at that tortured number this way : In the placebo group , 3.3 percent of the study participants developed shingles , compared to 1.6 percent in the vaccine group . Though that does represent a 50 % difference ; it also means the Shingles Vaccine Research not Reliable And even if you think a woeful 1.7 % risk reduction is worth the risk of vaccination based on studies funded by the vaccine maker , consider this point from a former editor of the world ’ s most prestigious medical publication : β€œ It is simply no longer possible to believe much of the clinical research that is published , or to rely on the judgment of trusted physicians or authoritative medical guidelines . I take no pleasure in this conclusion , which I reached slowly and reluctantly over my two decades as an editor of The New England Journal of Medicine . ” β€” Marcia Angell , MD , Drug Companies and Doctors : A story of Corruption . NY Review of Books , Jan . 15 , 2009 . Vaccination vs . Natural Immune System Function Your browser does not currently recognize any of the video formats available . Click here to visit our frequently asked questions about HTML5 video . Merck ’ s Tainted History It seems reasonable to evaluate the vaccine ’ s maker to see if its advertising the effectiveness of its vaccines is believable . It ’ s helpful to keep in mind that Merck also produced the ill - fated Gardisil vaccine nightmare . A Merck whistleblower recently explained that the company faked measles vaccine data in order to retain lucrative government contracts . See it here : Merck Whistleblower . Merck also produced Vioxx , the four - dollar aspirin that caused thousands of people heart attacks and strokes . The company settled thousands of lawsuits for a collective several billion dollars after Vioxx killed an estimated 500,000 Americans You do n ’ t sell the drug ; you sell the disease Merck founder George Merck appeared in TIME magazine ( the great disinformation rag which helped sell the β€œ lone - nut ” theory in the murder of JFK ) in 1956 . Merck surprisingly told some truth to TIME at the time . He explained that you do n ’ t sell the drug ; you sell the disease . Merck sells its shingles vaccine in this same old fashioned way , by selling the disease . It uses the oldest trick in the book , the Hegelian dialectic : problem / reaction / solution . Show somebody the problem , then sell them the solution . Since all vaccines are sold with the fear – it ’ s all about fear – all a company needs do is show the horrors of a potential β€œ outbreak ” and then swoop in with the solution . To sell the shingles vaccine , Merck displays shingles problems on its web site . You can watch a vaccine promo video there of how horrible shingles is . Then you get the non sequitur solution clearly implied : Because shingles is really The glaring problem is that when you look closely , there ’ s no guarantee the shingles vaccine works , certainly no guarantee that it will work for you . Is it worth the risks ? The fine print will tell you it appears to lower the risk of contracting shingles for some 50 percent of at least one study ’ s participants , but look closer and the chance it will work at all is much lower than that . Look closer yet and you can begin to see β€œ side effects , ” the great euphemism for things Pharmacies and television spots are pushing hard to promote the shingles vaccine . Signs tell adults 60 and older to get the β€œ recommended ” shingles vaccine . Shingles does represent a threat to seniors . Shingles Vaccine 51 % Effective ? The National Vaccine Information Center ( NVIC ) says of the shingles vaccine on its FAQ page : β€’ One live virus shingles vaccine was licensed in the U.S. in 2006 for adults over 50 years , Zostavax , made by Merck . β€’ The CDC recommends people 60 and older take one jab of the shingles vaccine . β€’ Shingles vaccine reported complications include local swelling , pain and redness at injection site , zoster - like skin rash , headache , joint pain , muscle pain , fever , abnormally swollen glands , hypersensitivity reactions including anaphylaxis ( shock ) . β€’ Effectiveness of the shingles vaccine is reported to be about 51 percent . ( emphasis ours ) The Merck shingles vaccine contains live attenuated varicella zoster virus . Vaccine strain virus transmissions from shingles - vaccinated people to others has been reported . β€’ Mass use of chickenpox vaccine by children in the U.S. since 1995 has limited natural boosting of Varicella Zoster immunity in the adult population . Consequently , a significant increase has occurred in cases of Herpes zoster among adults . Mass Vaccination triggers Shingles Outbreak Did you get all that ? Mass vaccination of children for chicken pox reportedly triggered a large increase in shingles for adults . Merck ’ s response was to repackage the chicken pox vaccine as Zostovax and make it some 14 times stronger . The shingles vaccine is essentially the chicken pox vaccine 14X stronger . Yet it STILL only boasts an effectiveness rate of 51 percent . When you look closer , that figure is also misleading . Contraindications for Shingles Vaccine CDC recommends the shingles vaccine not be taken by the following people : β€’ Women who are pregnant or who might become pregnant within 3 months . β€’ Persons who are immunosuppressed or immune deficient , such as those with a history of leukemia , lymphoma or other β€’ disorders affecting the bone marrow or lymphatic system , AIDS or those on immunosuppressive therapy . β€’ Those individuals who are experiencing an acute illness or fever . In addition , people who have experienced a previous severe allergic reaction to gelatin or the antibiotic neomycin should not get the shingles vaccine . Reported side effects of Shingles Vaccine include : β€’ Local swelling , pain and redness at injection site β€’ Shingles like rash β€’ Headache , joint pain , muscle pain , fever β€’ Abnormally swollen glands β€’ Anaphylaxis ( shock ) Vaccine not for so - called Pro Lifers Shingles vaccine contains consensually aborted fetal cell tissue [ consensually aborted ? ] The shingles vaccine ingredients , according to the product information insert : β€œ ZOSTAVAX is a lyophilized preparation of the Oka / Merck strain of live , attenuated varicella - zoster virus ( VZV ) . ZOSTAVAX , when reconstituted as directed , is a sterile suspension for subcutaneous administration . Each 0.65 - mL dose contains a minimum of 19,400 PFU ( plaque - forming units ) of Oka / Merck strain of VZV when reconstituted and stored at room temperature for up to 30 minutes . Each dose contains 31.16 mg of sucrose , 15.58 mg of hydrolyzed porcine gelatin , 3.99 mg of sodium chloride , 0.62 mg of MSG , Aborted Fetal Tissue for You The shingles vaccine contains MSG and aborted fetal cell tissue , MRC - 5 cells , β€œ developed in September 1966 from lung tissue taken from a 14 week fetus aborted for psychiatric reason from a 27 year old physically healthy woman . ” Pro Life advocates might care to pay attention . Is it morally ok to protest against abortion and then use the rancid results for yourself ? Does the shingles vaccine Work ? Postherpetic neuralgia from shingles can be debilitating for seniors . Even if the shingles vaccine did n ’ t help reduce infections at all but significantly reduced postherpetic neuralgia , that would be potentially wonderful . However , the marketing , as usual , clashes with the reality . According to Dr . David Brownstein , the reduction in postherpetic neuralgia from the shingles vaccine is so small as to be nearly insignificant . Dr . Brownstein says : β€œ Merck touts a 39 % decline with the use of the vaccine . Further analysis of the data might lead you to a different conclusion . Approximately 0.4 % of unvaccinated persons versus 0.14 % of vaccinated people developed postherpetic neuralgia . The 39 % decline is the less - than - accurate β€˜ relative risk ’ ( 0.14 / 0.4 ) . If we looked at the more accurate absolute risk , we come up with a decline of 0.26 % of postherpetic neuralgia in those that were vaccinated . ” Shingles Vaccine ? Reall y ? Really ? A tiny .26 % decline in the risk of postherpetic neuralgia for those who receive the shingles vaccine ? At upwards of $ 200 , the shingles vaccine is n ’ t cheap . Neither is advertising , but somebody has to pay for that advertising . Will it be you ? Related Shingles Vaccine Lawsuit Shingles Vaccine CAUSES Shingles Gardisil Vaccine Nightmares 1 / 2 Million Americans dead from Vioxx Merck Whistleblower : Company forged Documents Merck ’ s Clinically Meaningless Belsomra Merck fined $ 321 Million for Illegal Marketing β€’ Shingles Vaccine ? Really ? This entry was posted in FDA Alerts Shingles Vaccine Lawsuit . Bookmark the permalink Post navigation Previous Next Leave a Reply You must be logged in to post a comment . This site uses Akismet to reduce spam . Learn how your comment data is processed
[ "Shingles Vaccine", "Merck Pharmaceuticals", "Merck ’s Zostovax" ]
http://dmmmanagement.net/
HELPING WIRELESS SERVICE PROVIDERS DELIVER AN EXCEPTIONAL USER EXPERIENCE FOR THE PAST 25 YEARS WHO WE ARE We are a 25 - year - old company offering professional and technical expertise to major service providers and support structures in the wireless telecommunications industry . WHAT WE DO We provide experience and labor to enhance the networks of wireless telecommunications companies by offering Engineering , Construction Management , Project Management , Quality Assurance , and Real Estate services . WHERE WE WORK While we call Phoenix , Arizona our home base , we provide our services across Arizona , in the Southwest , and to service providers all across the United States . WE INVITE YOU TO CELEBRATE OUR SILVER ANNIVERSARY Click the Button Below to See How and Where We ’ re Celebrating . CELEBRATE WITH US WHY DMM ? With DMM Management , you find a partner fully aligned with your vision and goals on every project . Tell us what you need , and we do the rest . Realize your goals and achievements with DMM Management , and capitalize on an integrated partnership . CLIENT OVERVIEW Over the last two decades , DMM Management has worked with all the major players in the industry to help enhance and improve their wireless telecommunications networks . Learn more about some of the clients we ’ ve had the privilege to work with in the last 25 years . OUR BLOG We enjoy sharing information with our clients , partners , and extended network of service providers . Categories include Engineering , Construction Management , Project Management , Real Estate , Quality Assurance , as well as topics on business operations and managing personnel . A customer is our most important visitor . They are not dependent on us . We are dependent on them . They are not an interruption to our work , they are the purpose of it . They are not an outsider , but an integral part of it . We are not doing them a favor by servicing them , they are doing us a favor by giving us the opportunity to do it . UNKNOWN
[ "DMM Management", "technical expertise", "WIRELESS SERVICE PROVIDERS" ]
http://dmo.wikia.com/wiki/Riding_Mode
Riding Mode Edit Comments ( 42 ) Share What ' s Riding Mode ? Riding Mode allows players to ride certain Digimon , and move faster than normal . Riding Rookie , Champion or Ultimate digimon makes travelling faster , but riding a Mega digimon allows to ride even faster , passing through Leader and Captain Digimons withouth being attacked , and restoring fadigue from the Tamer . Beelzemon Gallantmon Imperialdramon Paladin Mode Chaosdramon MaloMyotismon and Dexmon got their special Riding mode , with Behemoth for Beelzemon , Grani for Gallantmon , White Blade for Imperialdramon , Chaotic Seat for Chaosdramon , Sodom for MaloMyotismon and Death - X - Seat for Dexmon . These Riding Modes are sligthly faster than the Mega Level Digimon ' s riding modes . How to get the Riding Mode ? First , make sure that your digimon is rideable . There are two types of Riding Items : The first one , called Rider Wing , can be purchased from Megumi Shirakawa at Yokohama Village for 500 M . Despite being able to open the Riding Mode for Rookie , Champion and Ultimate Digimon , the Rider Wing does n ' t works with Mega Digimon . The second one is called Mode Selector , and can be purchased from the Cash Shop for 18 Silks or Premium Silks , or obtained at certain events . Mode Selector works for every type of Digimon . Required Amount of Items Rookie , Champion and Ultimate : 1 Rider Wing or 1 Mode Selector . Mega : 2 Mode Selectors . Burst Mode / Side Mega : 5 Mode Selectors . Beelzemon : 1 Behemoth . Gallantmon : 1 Grani . Imperialdramon Padin Mode : 1 White Blade . Chaosdramon : 1 Chaotic Seat . MaloMyotismon : 1 Sodom . Dexmon : 1 Death - X - Seat .
[ "Riding Mode", "Digimon", "Gallantmon" ]
http://dmvlocations.net/dmv/3061-S-Fremont-Springfield-MO-65804/
Home | MO | Springfield South Fremont Contract Office South Fremont Contract Office 3061 S . Fremont Springfield MO 65804 Phone : ( 417 ) 823 - 8484 Hours : View Hours County : Greene County + Report inaccurate information here Hours of Operation Monday : 8 : 00am - 5 : 00pm Tuesday : 8 : 00am - 5 : 00pm Wednesday : Thursday : Friday : Saturday : 8 : 00am - 12 : 00pm This is the South Fremont Contract Office located in Springfield , Missouri . Contact this DMV location and make an appointment to get your driving needs and requirements taken care of . DMV offices like this handle drivers licenses , registration , car titles , and so much more . Make an appointment and get into South Fremont Contract Office or any other DMV office in Springfield today .
[ "South Fremont Contract Office", "Springfield MO" ]
http://dnaftb.org/5/
Concept 5 Genetic inheritance follows rules . When Mendel proposed that each trait is determined by a pair of genes , it presented a potential problem . If parents pass on both copies of a gene pair , then offspring would end up with four genes for each trait . Mendel deduced that sex cells β€” sperm and eggs β€” contain only one parental gene of each pair . The half - sets of genes contributed by sperm and egg restore a whole set of genes in the offspring . Mendel found that different gene combinations from the parents resulted in specific ratios of dominant - to - recessive traits . The results of a cross between two hybrid parents β€” each carrying one dominant and one recessive gene β€” were key to his synthesis . For example , a cross between two yellow - seed hybrids produces three times as many yellow seeds as green seeds . This is Mendel ' s famous 3 to 1 ratio .
[ "Genetic inheritance", "Mendel" ]
http://dnd4.wikia.com/wiki/Dazed
in Dazed Dazed is a condition You grant combat advantage You can take either a standard action a move action or a minor action on your turn you can also take free actions You cant take immediate actions or opportunity actions You cant flank an enemy Categories Explore Games Movies TV Wikis Overview About Careers Press Terms of Use Privacy Policy Global Sitemap Local Sitemap Community Community Central Support Fan Contributor Program WAM Score Help The FANDOM App Take your favorite fandoms with you and never miss a beat Advertise Media Kit Captain America Iron Man MCU Civil War
[ "Dazed", "condition" ]
http://dnd5e.wikia.com/wiki/Control_Flames
in Transmutation Cantrip Druid Spells Control Flames Comments Control Flames Transmutation cantrip Casting Time 1 action Range 60 feet Components S Duration Instantaneous or 1 hour see below Control Flames is a transmutation cantrip available to druids sorcerers and wizards Description Using your action you transmute a nonmagical flame you can see that is no larger than a 5foot cube in one of the following ways You spread the fire 5 feet in a direction provided kindling material is present in the new location You extinguish the flames You double or halve the radius of the brightdim light cast by the flame change its color or both The effect lasts for 1 hour You cause simple shapes flicker in the flames The effect lasts for 1 hour You can have three durational effects active at a time and you can dismiss a single effect as an action References a b Control Flames Xanathars Guide to Everything by Jeremy Crawford and Mike Mearls Wizards of the Coast LLC 2017 pp 152 Spells Xanathars Guide to Everything by Jeremy Crawford and Mike Mearls Wizards of the Coast LLC 2017 pp 147149 Categories Transmutation Cantrip Druid Spells Sorcerer Spells Wizard Spells Xanathars Guide to Everything Configure Reference Popups Recent Wiki Activity Find Greater Steed Yzarro 6 hours ago Wizard AbyssalDragon13 13 hours ago AbyssalDragon13 17 hours ago Mage Hand GentleGoliath December 31 2018 Help us grow DD 5th Edition Wikia Get Started
[ "Control Flames", "transmutation cantrip" ]
http://dnd5e.wikia.com/wiki/Guiding_Bolt
in Level 1 Spell Evocation Cleric Spells Guiding Bolt Comments Guiding Bolt 1stlevel evocation Casting Time 1 action Range 120 feet Components V S Duration 1 round Make a ranged spell attack against a creature you can see On a hit the target takes 4d6 radiant damage and before the end of your next turn the next attack roll made on it has advantage At Higher Levels The damage increases by 1d6 for each slot level above 1st Categories Level 1 Spell Evocation Cleric Spells Higher Casting Players Handbook Explore Games Movies TV Wikis Overview About Careers Press Terms of Use Privacy Policy Global Sitemap Local Sitemap Community Community Central Support Fan Contributor Program WAM Score Help The FANDOM App Take your favorite fandoms with you and never miss a beat Advertise Media Kit Captain America Iron Man MCU Civil War
[ "Guiding Bolt", "radiant damage" ]
http://dnr.louisiana.gov/assets/TAD/education/BGBB/1/activity.html
WHO ' S ON FIRST ? A RELATIVE DATING ACTIVITY MARSHA BARBER AND DIANA SCHEIDLE BARTOS INTRODUCTION PALEONTOLOGY , AND in particular the study of dinosaurs , is an exciting topic to people of all ages . Although most attention in today ' s world focuses on dinosaurs and why they became extinct , the world of paleontology includes many other interesting organisms which tell us about Earth ' s past history . The study of fossils and the exploration of what they tell scientists about past climates and environments on Earth can be an interesting study for students of all ages . Teaching about Earth ' s history is a challenge for all teachers . Time factors of millions and billions of years is difficult even for adults to comprehend . However , " relative " dating or time can be an easy concept for students to learn . In this activity , students begin a sequencing activity with familiar items - letters written on cards . Once they are able to manipulate the cards into the correct sequence , they are asked to do a similar sequencing activity using fossil pictures printed on " rock layer " cards . Sequencing the rock layers will show students how paleontologists use fossils to give relative dates to rock strata . Once students begin to grasp " relative " dating , they can extend their knowledge of geologic time by exploring radiometric dating and developing a timeline of Earth ' s history . These major concepts are part of the Denver Earth Science Project ' s " Paleontology and Dinosaurs " module written for students in grades 7 - 10 . The module is an integrated unit which addresses the following National Science Education Standards : * Science as Inquiry : Students develop the abilities necessary to do scientific inquiry - - identify questions , design and conduct scientific investigations , use appropriate tools and technologies to gather , analyze and interpret data , think critically and logically to make the relationships between evidence and explanations , communicate results , and use mathematics in all aspects of scientific inquiry . * Life Science : Fossils indicate that many organisms that lived long ago are extinct . Extinction of species is common ; most of the species that have lived on the earth no longer exist . The complete " Paleontology and Dinosaurs " module takes approximately four weeks to teach . The " Who ' s On First ? " activity is a 30 - minute introduction to geologic time . WHO ' S ON FIRST ? RELATIVE DATING Student Activity INTRODUCTION Scientists have good evidence that the earth is very old , approximately four and one - half billion years old . Scientific measurements such as radiometric dating use the natural radioactivity of certain elements found in rocks to help determine their age . Scientists also use direct evidence from observations of the rock layers themselves to help determine the relative age of rock layers . Specific rock formations are indicative of a particular type of environment existing when the rock was being formed . For example , most limestones represent marine environments , whereas , sandstones with ripple marks might The study and comparison of exposed rock layers or strata in various parts of the earth led scientists in the early 19th century to propose that the rock layers could be correlated from place to place . Locally , physical characteristics of rocks can be compared and correlated . On a larger scale , even between continents , fossil evidence can help in correlating rock layers . The Law of Superposition , which states that in an undisturbed horizontal sequence of rocks , the oldest rock layers will be on the bottom , with successively younger rocks on top of By correlating fossils from various parts of the world , scientists are able to give relative ages to particular strata . This is called relative dating . Relative dating tells scientists if a rock layer is " older " or " younger " than another . This would also mean that fossils found in the deepest layer of rocks in an area would represent the oldest forms of life in that particular rock formation . In reading earth history , these layers would be " read " from bottom to top or oldest to most recent . If certain fossils Objectives : When you complete this activity , you will be able to : 1 . sequence information using items which overlap specific sets ; 2 . relate sequencing to the Law of Superposition ; and 3 . show how fossils can be used to give relative dates to rock layers . Materials : two sets of sequence cards in random order ( set A : nonsense syllables ; set B : sketches of fossils ) , pencil , paper Procedure Set A : 1 . Spread the cards with the nonsense syllables on the table and determine the correct sequence of the eight cards by comparing letters that are common to individual cards and , therefore , overlap . The first card in the sequence has " Card 1 , Set A " in the lower left - hand corner and represents the bottom of the sequence . If the letters " T " and " C " represent fossils in the oldest rock layer , they are the oldest fossils , or the first fossils formed in the 2 . Now , look for a card that has either a " T " or " C " written on it . Since this card has a common letter with the first card , it must go on top of the " TC " card . The fossils represented by the letters on this card are " younger " than the " T " or " C " fossils on the " TC " card which represents fossils in the oldest rock layer . Sequence the remaining cards by using the same process . When you finish , you Interpretation Questions : 1 . After you have arranged the cards in order , write your sequence of letters ( using each letter only once ) on a separate piece of paper . Starting with the top card , the letters should be in order from youngest to oldest . 2 . How do you know that " X " is older than " M " ? 3 . Explain why " D " in the rock layer represented by DM is the same age as " M . " 4 . Explain why " D " in the rock layer represented by OXD is older than " D " in the rock layer represented by DM . Procedure Set B : 1 . Carefully examine the second set of cards which have sketches of fossils on them . Each card represents a particular rock layer with a collection of fossils that are found in that particular rock stratum . All of the fossils represented would be found in sedimentary rocks of marine origin . Figure 2 - A gives some background information on the individual fossils . 2 . The oldest rock layer is marked with the letter " M " in the lower left - hand corner . The letters on the other cards have no significance to the sequencing procedure and should be ignored at this time . Find a rock layer that has at least one of the fossils you found in the oldest rock layer . This rock layer would be younger as indicated by the appearance of new fossils in the rock stratum . Keep in mind that extinction is forever . Once an organism disappears from the sequence it can not Interpretation Questions : 1 . Using the letters printed in the lower left - hand corner of each card , write the sequence of letters from the youngest layer to the oldest layer ( i.e. , from the top of the vertical stack to the bottom ) . This will enable your teacher to quickly check whether you have the correct sequence . 2 . Which fossil organisms could possibly be used as index fossils ? 3 . Name three organisms represented that probably could not be used as index fossils and explain why . 4 . In what kinds of rocks might you find the fossils from this activity ? 5 . State the Law of Superposition and explain how this activity illustrates this law . Figure 2 - A Sketches of Marine Fossil Organisms ( Not to Scale ) NAME PHYLUM DESCRIPTION Brachiopod Brachiopoda " Lampshells " ; exclusively marine organisms with soft bodies and bivalve shells ; many living species Trilobite Arthropoda Three - lobed body ; burrowing , crawling , and swimming forms ; extinct Eurypterid Arthropoda Many were large ( a few rare species were 5 feet in length ) ; crawling and swimming forms ; extinct Graptolite Chordata Primitive form of chordate ; floating form with branched stalks ; extinct Horn coral Coelenterata ( Cnidaria ) Jellyfish relative with stony ( Cnidaria ) ( calcareous ) exoskeleton found in reef environments ; extinct Crinoid Echinodermata Multibranched relative of starfish ; lives attached to the ocean bottom ; some living species ( " sea lilies " ) Placoderm Vertebrata Primitive armored fish ; extinct Foraminifera ( microscopic type ) Protozoa ( Sarcodina ) Shelled , amoeba - like organism Gastropod Mollusca Snails and relatives ; many living species Pelecypod Mollusca Clams and oysters ; many living species Ammonite Squid - like animal with coiled , chambered shell ; related to modern - day Nautilus Icthyosaur Vertebrata Carnivore ; air - breathing aquatic animal ; extinct Shark ' s tooth Cartilage fish ; many living species WHO ' S ON FIRST ? RELATIVE DATING Teacher Version Scientists have good evidence that the earth is very old , approximately four and one - half billion years old . Scientific measurements such as radiometric dating use the natural radioactivity of certain elements found in rocks to help determine their age . Scientists also use direct evidence from observations of the rock layers themselves to help determine the relative age of rock layers . Specific rock formations are indicative of a particular type of environment existing when the rock was being formed . For example , most limestones represent marine environments , whereas , sandstones with ripple marks might The study and comparison of exposed rock layers or strata in various parts of the earth led scientists in the early 19th century to propose that the rock layers could be correlated from place to place . Locally , physical characteristics of rocks can be compared and correlated . On a larger scale , even between continents , fossil evidence can help in correlating rock layers . The Law of Superposition , which states that in an undisturbed horizontal sequence of rocks , the oldest rock layers will be on the bottom , with successively younger rocks on top of By correlating fossils from various parts of the world , scientists are able to give relative ages to particular strata . This is called relative dating . Relative dating tells scientists if a rock layer is " older " or " younger " than another . This would also mean that fossils found in the deepest layer of rocks in an area would represent the oldest forms of life in that particular rock formation . In reading earth history , these layers would be " read " from bottom to top or oldest to most recent . If certain fossils Objectives : When you complete this activity , you will be able to : 1 . sequence information using items which overlap specific sets ; 2 . relate sequencing to the Law of Superposition ; and 3 . show how fossils can be used to give relative dates to rock layers . Materials : two sets of sequence cards in random order ( set A : nonsense syllables ; set B : sketches of fossils ) , pencil , paper TEACHER SUGGESTIONS The cards in Set A are composed of nonsense syllables . The nonsense syllables or letters sometimes overlap other cards and are being used to introduce the students to the concept of sequencing . The cards should be duplicated , laminated , and cut into sets and randomly mixed when given to the students . It is recommended that students complete Procedure Set A and answer the associated Interpretation Questions correctly before proceeding to Set B The cards in Set B represent rock layers containing various fossils . For , you may want to color code each organism type ( i.e. , color the trilobites blue ) before you laminate and cut the cards apart . Sequencing the rock layers will show the students how paleontologists use fossils to give relative dates to rock strata . To enhance this activity , have students match the fossil sketches to real fossils . You may use fossils from the John Hanley Fossil Teaching Set . To request a Fossil Teaching Set , call the Geology Museum at the Colorado School of Mines ( 303 ) 273 - 3815 . The following is a list of fossils in the John Hanley Fossil Teaching Set that may be useful in this activity . Brachiopod VGastropod VI - 2 Trilobite VIIIPelecypod VI - 1 Graptolite XAmmonite VI - 3b Corals IIIa , IIIbShark ' s Tooth XI - 1a Crinoids IXa Figure 2 - B illustrates a hypothetical stratigraphic section of rocks which include fossil assemblages represented in . It may be useful to share with students after they have completed and answered the Interpretation Questions . Procedure : 1 . Spread the cards with the nonsense syllables on the table and determine the correct sequence of the eight cards by comparing letters that are common to individual cards and , therefore , overlap . The first card in the sequence has " Card 1 , Set A " in the lower left - hand corner and represents the bottom of the sequence . If the letters " T " and " C " represent fossils in the oldest rock layer , they are the oldest fossils , or the first fossils formed in the past for this 2 . Now , look for a card that has either a " T " or " C " written on it . Since this card has a common letter with the first card , it must go on top of the " TC " card . The fossils represented by the letters on this card are " younger " than the " T " or " C " fossils on the " TC " card which represents fossils in the oldest rock layer . Sequence the remaining cards by using the same process . When you finish , you Interpretation Questions : 1 . After you have arranged the cards in order , write your sequence of letters ( using each letter only once ) on a separate piece of paper . Starting with the top card , the letters should be in order from youngest to oldest . The correct sequence of letters for the cards in from youngest to oldest rock strata is MDXONBUAGCT . Please note that none of the letters in this sequence may be reversed and still be correct . The sequence must be exactly in the order as written . It is not uncommon to have students reverse the M and D for example and begin the sequence with DM because that is the way they are printed on the card . It is good at this time to remind them that these letters represent fossils in a rock layer and that one fossil next to another within a rock layer implies 2 . How do you know that " X " is older than " M " ? " X " is older than " M " because it appears in an older rock strata ( i.e. , the card beneath the " DM " card ) . " M " is not present in the card below it in the stack and is , therefore , younger . 3 . Explain why " D " in the rock layer represented by DM is the same age as " M . " Since fossils D and M died and were deposited in the same rock layer , they both are the same age as the rock layer . 4 . Explain why " D " in the rock layer represented by OXD is older than " D " in the rock layer represented by DM . Using the Law of Superposition , the rock layer OXD is beneath rock layer DM and , therefore , is older . The fossils within rock layer OXD ( i.e. , fossils O , X , and D ) are older than the fossils in the layer above it ( i.e. , D and M in rock layer DM ) . Therefore , D in the rock layer OXD is older than Procedure : 1 . Carefully examine the second set of cards which have sketches of fossils on them . Each card represents a particular rock layer with a collection of fossils that are found in that particular rock stratum . All of the fossils represented would be found in sedimentary rocks of marine origin . gives some background information on the individual fossils . 2 . The oldest rock layer is marked with the letter " M " in the lower left - hand corner . The letters on the other cards have no significance to the sequencing procedure and should be ignored at this time . Find a rock layer that has at least one of the fossils you found in the oldest rock layer . This rock layer would be younger as indicated by the appearance of new fossils in the rock stratum . Keep in mind that extinction is forever . Once an organism disappears from the sequence it can not Interpretation Questions : 1 . Using the letters printed in the lower left - hand corner of each card , write the sequence of letters from the youngest layer to the oldest layer ( i.e. , from the top of the vertical stack to the bottom ) . This will enable your teacher to quickly check whether you have the correct sequence . ORGANISM 2 . Which fossil organisms could possibly be used as index fossils ? The graptolite , placoderm , ammonite , ichthyosaur , and shark ' s tooth could possibly be used as index fossils since they are found in only one layer . Technically , however , given only this set of strata , one can not say that the shark ' s tooth and ichthyosaur could be used as index fossils because we do not know if they continue in younger rock layers above this set of strata . 3 . Name three organisms represented that probably could not be used as index fossils and explain why . The brachiopod , crinoid , eurypterid , foraminifera , gastropod , horn coral , pelecypod , and trilobite could probably not be used as index fossils since they overlap more than one stratum . 4 . In what kinds of rocks might you find the fossils from this activity ? Marine sedimentary rocks such as limestone , shale , and sandstone might contain fossils similar to those depicted in this activity . 5 . State the Law of Superposition and explain how this activity illustrates this law . In a " normal " horizontal sequence of rocks , the oldest rock layers will be on the bottom with successively younger rocks on top . This activity illustrates this law because when the cards are placed in the correct order , the vertical stack shows the oldest fossils in a rock layer in the bottom of the stack and the youngest fossils in rock stratum on the top . Figure 2 - B Stratigraphic Section for Set B Geological Time Main Page
[ "RELATIVE DATING ACTIVITY", "PALEONTOLOGY", "dinosaurs" ]
http://dnr.wi.gov/emergency/concealedCarry.html
Concealed carry weapons law changes How do the new CCW law changes affect me as a hunter , trapper , recreational vehicle operator or user of DNR lands ? Transportation of firearms Is it true that firearms no longer have to be unloaded or in a case if in or on a vehicle ? The new change made under the concealed carry legislation that took effect on Nov . 1 , 2011 , was the elimination of the requirement to unload or case a handgun before it is placed , possessed or transported in or on a vehicle , boat , snowmobile or ATV . Handguns can also be loaded while inside or on a vehicle . More recent legislation has relaxed the laws for transporting other types of firearms , but there is a difference between the laws for handguns and other types of firearms . Effective Nov . 19 , 2011 , long guns , such as rifles , shotguns and muzzleloaders , will no longer have to be in a case in order to place them in or on a vehicle , or to transport them unloaded in or on a vehicle . A loaded firearm , other than a handgun , can only be placed or possessed on the top or exterior of a vehicle which is stationary . Additionally , it is important to be aware that unlike handguns , it remains illegal to actually load any long guns ( rifles , shotguns & muzzleloaders ) while the firearm or person loading it is still in the vehicle . All long guns must be outside a motorized vehicle before a person may load the firearm . Once loaded , a long gun can be set down on a stationary vehicle , but must be unloaded before the firearm is placed inside or transported in or on the vehicle . Long guns must also be unloaded before they See additional questions and answers to laws related to possession of long guns , bows and crossbows in vehicles and motorboats at Act 51 - Firearm , bow & crossbows in vehicles FAQs [ PDF ] Shining deer or other wildlife If I have a concealed carry license or I am a qualified former law enforcement officer who is authorized to carry a concealed handgun , can I now possess this handgun while shining deer or other wild animals for viewing purposes ? No . The legislation involving carrying concealed weapons , as well as the transportation of handguns , did not make any changes to the shining restrictions . It continues to be illegal to shine for wild animals while in possession of any bow , crossbow or firearm , even if the firearm is a handgun possessed by a person who has a concealed carry license , or is a firearm possessed by a retired or former law enforcement officer . It also continues to be illegal to shine wild animals between the hours of 10p . m . and the following 7a . m . from September 15 through December 31 , even if a person does not possess any firearm , bow or crossbow . Additional local county restrictions may also apply . Possession of firearms in state wildlife refuge areas If I have a license to carry a concealed weapon , or I am a qualified former law enforcement officer , can I now carry a loaded and uncased firearm in a wildlife refuge where firearms are normally required to be unloaded and encased ? Beginning on Nov . 1 , 2011 , a person with a concealed carry license will be allowed to possess a handgun which is loaded and uncased ( concealed or unconcealed ) , and a qualified former law enforcement officer may possess the type of firearm they qualified with and which is indicated on their certification card , loaded and uncased ( concealed or unconcealed ) in a wildlife refuge . This exemption however does not allow such persons to hunt or discharge their firearm in the refuge . Possession of firearms in state parks and state fish hatcheries If I have a license to carry a concealed weapon , or I am a qualified former law enforcement officer , can I now carry a loaded and uncased firearm in a Wisconsin state park or state fish hatchery where firearms are normally required to be unloaded and encased ? Beginning on Nov . 1 , 2011 , a person with a concealed carry license will be allowed to possess a handgun which is loaded and uncased ( concealed or unconcealed ) , and a qualified former law enforcement officer may possess the type of firearm they qualified with and which is indicated on their certification card , loaded and uncased ( concealed or unconcealed ) in a Wisconsin state park or state fish hatchery . This exemption however does not allow such persons to hunt or discharge their firearm in the Wisconsin state park or state fish hatchery , Age for possession or hunting with a handgun Did the concealed carry legislation change the age of persons who may go armed with a handgun , hunt with a handgun or the species that may be hunted with a handgun ? No . A person must still be at least age 21 to purchase a firearm which is a handgun from a firearms dealer , and age 18 to possess or hunt with a firearm which is a handgun . The species that may be hunted with handgun and the caliber and barrel length minimums have not changed . Carrying a concealed firearm while hunting If I am at least 18 years old and can legally hunt with a handgun , can I also carry that handgun concealed under my jacket or in a backpack while I am hunting ? Beginning on Nov . 1 , 2011 , a person who is at least age 21 and who is authorized to carry a concealed handgun , such as a person who holds a license authorizing them to carry a concealed weapon , will also be able to possess a concealed handgun while hunting . In addition , a person who owns , leases or is the legal occupant of land and who is at least age18 , will be allowed to possess a concealed handgun while hunting on those lands without the need for a license to carry a concealed Possession of firearms on DNR lands in certain counties , state forests and recreational areas . Have the restrictions on possessing a loaded or uncased firearm on DNR owned lands changed in those counties or DNR properties were it is not legal to possess a loaded uncased firearm when not engaged in lawful hunting unless at a designated range or engaged in a permitted dog trial or training ? Yes . On DNR lands within state parks , state fish hatcheries or wildlife refuge areas in the below listed counties , individuals with a concealed carry license as well as qualified former law enforcement officers possessing proper ID and firearm certificate can possess loaded and uncased handguns . On DNR lands which are not state parks , state fish hatcheries or wildlife refuges , such as normal public hunting grounds , and which are located in Dane , Dodge , Fond du lac , Jefferson , Juneau , Kenosha , LaCrosse , Milwaukee , Outagamie , Ozaukee , Racine , Sauk , Sheboygan , Walworth , Washington , Waukesha , Winnebago counties or on state forest lands in the Kettle Moraine or Point Beach state forests or state recreational areas , it generally continues to be illegal to possess or control a loaded or uncased firearm unless engaged in lawful hunting or at a designated range or engaged in a dog trial or training activity under a permit . However , effective Nov . 1 , 2011 , a person with a concealed carry license may possess a loaded uncased handgun on these properties ( concealed or unconcealed ) even if not engaged in hunting , dog training or a dog trial . A qualified former law enforcement officer is not similarly exempt unless they also possess a concealed carry license . Where do I apply for a concealed carry license Applications for a license to carry a concealed weapon must be obtained from , and submitted to the Wisconsin Department of Justice ( DOJ ) , not the DNR . For more information about laws related to carrying a concealed weapon , or about getting and submitting an application for a CCW license , we recommend you check out the DOJ website [ exit DNR ] How do I obtain a duplicate hunter education certificate ? Should your Wisconsin safety education certificate become lost or destroyed , you may obtain another copy in one of three ways : Print yourself from your Go Wild account online at GoWild . WI . Gov . Once logged into your account and at your homepage , click on " Student Dashboard " in the Safety Education section , and then click the " Print Awarded Certificates " icon to print for free . Visit a DNR Service Center or call the DNR Call Center at 1 - 888 - 936 - 7463 . What if I took hunter education in another state or country ? The law which establishes that certification under the Wisconsin hunter education program is one of the acceptable types of training required to obtain a CCW license also states that a substantially similar program that is established by another state , country or province and that is recognized by the Wisconsin DNR would also qualify . The DNR currently recognizes the hunter education programs established by all other states , and some countries and provinces . If you completed a hunter education program in another state , country or province , and need to get a duplicate copy of your certification Will the DNR be changing the curriculum of the hunter education classes to include laws on carrying concealed weapons ? No . The DNR ' s hunter education course will remain the same . The Department of Natural Resources is not required , nor do we have any plans to modify our current hunter education course of instruction to include any new material or training specific to handguns or carrying a concealed weapon . The only correlation that the hunter education program has to the licenses to carry a concealed weapon is that it simply happens to be one of the types of training that the legislature has considered acceptable to qualify for a person to apply for a CCW If I have a CCW license or I am otherwise authorized to carry a concealed handgun , can I possess that handgun loaded and uncased during the 24 - hour period before 9 - day gun deer season ? In most of the state , it is generally still not legal to possess a loaded or uncased firearm while afield on the Friday before the regular 9 - day November gun deer season . However , as a result of the new legislation which took effect on Nov . 1 , 2011 , a person who possesses a CCW license will be able to possess a loaded and uncased handgun on this day anywhere they are normally allowed to possess the handgun . Rifles and shotguns possessed by any person , and handguns possessed by a person without a CCW license still need to be unloaded and enclosed in a case while afield on this Friday before the regular 9 - day November gun deer season . The normal exceptions for possessing a loaded uncased firearm continue to apply to persons lawfully hunting small game in the CWD zone , hunting waterfowl statewide , sighting in firearms at an established range or on land that the person owns , or hunting on a licensed hunting preserve . Last revised : Monday November 27 2017
[ "Concealed carry weapons law", "DNR lands" ]
http://dnr.wi.gov/employment/lte/faq.html
Employment Apply for permanent and project jobs Apply for Limited Term Employment ( LTE ) openings . LTE jobs are temporary and do not require a civil service examination View internship opportunities Frequently asked questions for LTE What is limited term employment ? Jobs that are " limited term " are temporary and do not require a civil service examination . How long do LTE jobs last ? Wisconsin State Statutes limit LTE jobs to no more than 1,039 hours of work within a twelve - month period . Limited term jobs vary in duration and work hours may be full or part time depending on individual program needs , budgets , and seasonal demands . As a limited term employee , if you work 1,039 hours or less during a twelve - month period , you may continue in the position for another 1,039 hours or less during the next year or until the job ends . What are some advantages of being a Limited Term Employee ( LTE ) ? Some individuals have found the training and experience gained during limited term employment beneficial when competing for similar permanent civil service positions . Limited term jobs can be an important learning tool for career development . Students especially enjoy the flexibility offered through limited term jobs . What benefits are LTEs eligible to receive ? LTEs are immediately eligible for the Workers Compensation , unemployment insurance and Social Security programs . Once an LTE qualifies for enrollment in the Wisconsin Retirement System ( WRS ) , they will become eligible for health , life , wage , dental and vision insurance coverage . Upon eligibility for WRS enrollment , a benefit packet will be sent as notification to the LTE in order to provide insurance details and enrollment information . What types of jobs are filled by LTEs ? Jobs for which LTEs are hired include laborers , support services , and paraprofessional , technical , and professional positions . What skills are required for limited term jobs ? Some DNR jobs require specialized skills , training , or knowledge in the areas of natural resources or environmental quality . Individuals applying for limited term positions must have sufficient training or experience to demonstrate the skills and knowledge needed to perform the tasks required by the jobs . Job requirements also vary among jobs with the same titles . Pay close attention to the desired qualifications for each job . Last revised : Tuesday August 04 2015
[ "Frequently asked questions", "LTE" ]
http://dnr.wi.gov/lakes/LakePages/LakeDetail.aspx?wbic=750300
Find A Lake > Racine County > Browns Lake Browns Lake Racine County , 397 Acres Overview Map Facts & Figures More Browns Lake is a 397 acre lake located in Racine County . It has a maximum depth of 44 feet . Visitors have access to the lake from a public boat landing . Fish include Panfish , Largemouth Bass , Northern Pike and Walleye . The lake ' s water clarity is low . Features Boat Landing ( 1 ) Public lands or parks within 1000 feet of the lake ( 2 ) Fish Largemouth Bass ( Abundant ) Northern Pike ( Abundant ) Panfish ( Present ) Walleye ( Present ) Before You Go Local Boating Ordinances Fish Consumption Advisories Fishing Regulations Maps Contour ( Bathymetric ) Map Interactive Map * * About Boating Ordinances : Before boating on an unfamiliar Wisconsin waterways check for a sign at the public boat landing to determine if there are local regulations ( more restrictive than state law ) which may apply on that waterbody . Also be sure to review the document Wisconsin Boating Regulations at http : / / dnr . wi . gov / files / pdf / pubs / le / le0301 . pdf to learn about statewide regulations . There may be a delay between the time an ordinance is passed and the time it gets into our database . Therefore , the only way to know for sure if a water body has an ordinance in effect is to look for a sign posted at a public boat landing .
[ "Browns Lake", "Racine County", "Largemouth Bass" ]
http://dnr.wi.gov/lakes/LakePages/LakeDetail.aspx?wbic=850300
Lake Name : Lakes Find a lake . Contact information For information on Lakes in Wisconsin , contact : Wisconsin DNR Lakes Division of Water Bureau of Water Quality DNR Contacts for Okauchee Lake Okauchee Lake Management District [ exit DNR ] Find A Lake > Waukesha County > Okauchee Lake Okauchee Lake Waukesha County , 1210 Acres Overview Map Facts & Figures More Okauchee Lake is a 1210 acre lake located in Waukesha County . It has a maximum depth of 90 feet . Visitors have access to the lake from public boat landings . Fish include Musky , Panfish , Largemouth Bass , Smallmouth Bass , Northern Pike and Walleye . The lake ' s water is moderately clear . Features Boat Landings ( 2 ) Public land or park within 1000 feet of the lake ( 1 ) Fish Musky ( Common ) Largemouth Bass ( Common ) Northern Pike ( Common ) Panfish ( Present ) Smallmouth Bass ( Present ) Walleye ( Present ) Before You Go Local Boating Ordinances Fish Consumption Advisories Fishing Regulations Maps Contour ( Bathymetric ) Map Interactive Map * * About Boating Ordinances : Before boating on an unfamiliar Wisconsin waterways check for a sign at the public boat landing to determine if there are local regulations ( more restrictive than state law ) which may apply on that waterbody . Also be sure to review the document Wisconsin Boating Regulations at http : / / dnr . wi . gov / files / pdf / pubs / le / le0301 . pdf to learn about statewide regulations . There may be a delay between the time an ordinance is passed and the time it gets into our database . Therefore , the only way to know for sure if a water body has an ordinance in effect is to look for a sign posted at a public boat landing .
[ "Okauchee Lake", "Waukesha County .", "Musky ," ]
http://dnr.wi.gov/lakes/lakepages/LakeDetail.aspx?wbic=178000
Lake Name : Lakes Find a lake . Contact information For information on Lakes in Wisconsin , contact : Wisconsin DNR Lakes Division of Water Bureau of Water Quality DNR Contacts for Neenah Lake Neenah Lake District ( Oxford Millpond ) [ exit DNR ] Oxford Conservation Club Inc [ exit DNR ] Find A Lake > Marquette County > Neenah Lake Neenah Lake Marquette County , 54 Acres Overview Map Facts & Figures More Neenah Lake is a 54 acre lake located in Marquette County . It has a maximum depth of 14 feet . Visitors have access to the lake from a public boat landing . Fish include Panfish , Largemouth Bass , Northern Pike and Trout . Features Boat Landing ( 1 ) Fish Panfish ( Common ) Largemouth Bass ( Common ) Northern Pike ( Common ) Trout ( Present ) Before You Go Local Boating Ordinances Fish Consumption Advisories Fishing Regulations Maps Contour ( Bathymetric ) Map Interactive Map * * About Boating Ordinances : Before boating on an unfamiliar Wisconsin waterways check for a sign at the public boat landing to determine if there are local regulations ( more restrictive than state law ) which may apply on that waterbody . Also be sure to review the document Wisconsin Boating Regulations at http : / / dnr . wi . gov / files / pdf / pubs / le / le0301 . pdf to learn about statewide regulations . There may be a delay between the time an ordinance is passed and the time it gets into our database . Therefore , the only way to know for sure if a water body has an ordinance in effect is to look for a sign posted at a public boat landing .
[ "Neenah Lake", "Marquette County" ]
http://dnr.wi.gov/lakes/lakepages/LakeDetail.aspx?wbic=804600&page=map
Find A Lake > Dane County > Lake Monona Lake Monona Dane County , 3359 Acres Overview Map Facts & Figures More WiDNR , USGS , and other data + Origin DISCLAIMER : The information shown on these maps has been obtained from various sources ( Tele Atlas North America Inc . , WDNR , BCPL , WDOT , USFS , USGS , etc . ) , and are of varying age , reliability and resolution . These maps are not intended to be used for navigation , nor are these maps an authoritative source of information about legal land ownership or public access . Users of these maps should confirm the ownership of land through other means in order to avoid trespassing . No warranty , expressed or implied ,
[ "Lake Monona" ]
http://dnr.wi.gov/topic/Invasives/fact/Zebra.html
Invasive Species Species information Aquatic invasives Terrestrial invasives Wetland invasives Contact information DNR invasive species staff Zebra Mussel ( Dreissena polymorpha Zebra Mussels are an invasive species that have inhabited Wiscsonsin waters and are displacing native species , disrupting ecosystems , and affecting citizens ' livelihoods and quality of life . They hamper boating , swimming , fishing , hunting , hiking , and other recreation , and take an economic toll on commercial , agricultural , forestry , and aquacultural resources . The zebra mussel ( Dreissena polymorpha ) is a tiny ( 1 / 8 - inch to 2 - inch ) bottom - dwelling clam native to Europe and Asia . Zebra mussels were introduced into the Great Lakes in 1985 or 1986 , and have been spreading throughout them since that time . They were most likely brought to North America as larvae in ballast water of ships that traveled from fresh - water Eurasian ports to the Great Lakes . Zebra mussels look like small clams with a yellowish or brownish D - shaped shell , usually with alternating dark - and light - Overview Identification Distribution Control Resources Zebra Mussels are Restricted ( Orange counties ) Other names for this plant include : Common names : Zebra Mussel Scientific names : Ecological threat : Zebra Mussels feed by drawing water into their bodies and filtering out most of the suspended microscopic plants , animals and debris for food . This process can lead to increased water clarity and a depleted food supply for other aquatic organisms , including fish . The higher light penetration fosters growth of rooted aquatic plants which , although creating more habitat for small fish , may inhibit the larger , predatory fish from finding their food . This thicker plant growth can also interfere with boaters , anglers and swimmers . Zebra mussel infestations may also promote the growth Zebra mussels attach to the shells of native mussels in great masses , effectively smothering them . A survey by the Corps in the East Channel of the Mississippi River at Prairie du Chien revealed a substantial reduction in the diversity and density of native mussels due to Zebra Mussel infestations . The East Channel provides habitat for one of the best mussel beds in the Upper Mississippi River . Future efforts are being considered to relocate such native mussel beds to waters that are less likely to be impacted by zebra mussels . Classification in Wisconsin Restricted Species Assessment Groups ( SAG ) were assembled to recommend a legal classification for each species considered for NR 40 . The recommendation for Zebra Mussels was based upon this literature review developed by the department . Last revised : Monday December 11 201712 / 11 / 2012
[ "Zebra Mussel", "native species" ]
http://dnr.wi.gov/topic/Lands/naturalareas/index.asp?SNA=504
Wisconsin State Natural Areas Program Rice Creek ( No . 504 ) Photo by R . Eckstein Resources : Northern Highland - American Legion State Forest Overview Access Ownership Maps Recreation Location Within the Northern Highland - American Legion State Forest , Vilas County . T42N - R6E , Section 4 . T43N - R6E , Sections 28 , 33 , 34 , 35 . 435 acres . Description Rice Creek SNA features a two - mile stretch of creek surrounded by a large wetland complex of conifer swamp , boreal rich fen , sedge meadow , and northern wet - mesic forest . White cedar dominates the forest but cover is variable with balsam fir , black spruce , tamarack , black ash , red maple , white spruce , yellow birch , paper birch , and hemlock all present in the canopy . Thickets of mountain maple and alder are found in some areas . The understory is diverse and includes heart - leaf twayblade , blunt Last revised : Monday , March 25 , 2019
[ "Rice Creek", "Orchids", "marsh cinquefoil" ]
http://dnr.wi.gov/topic/Recycling/banned.html
Recycling & composting Subscribe to the Recycling Updates email list Material details Ag plastics Batteries Construction & demolition debris Electronics Fishing line Household hazardous waste Health care waste Light bulbs Motor oil & oil filters Plastic bags Refrigerant recovery program Waste tires Related links Recycling at home Business recycling Special event recycling Composting in Wisconsin Large - scale composting Responsible unit requirements Materials recovery facilities Recycling law Additional resources Local government recycling contacts Managing waste & materials Wisconsin Recycling Markets Directory [ exit DNR ] Recycle More Wisconsin [ exit DNR ] Contact information For information on recycling , contact : Jennifer Semrau What to recycle in Wisconsin In Wisconsin , you can not put many recyclable or compostable items in the trash . Wisconsin ' s recycling law bans the landfilling or incineration of these materials to conserve valuable resources and landfill space . These disposal bans apply everywhere in Wisconsin , including in homes , businesses , schools , institutions and at special events . Many local recycling programs and drop - off centers accept additional materials for recycling , so check with your local program or recycling hauler for a complete list of what can be recycled . Local recycling program contacts Recyclable materials banned from disposal in Wisconsin Download a flier [ PDF ] with the full list of materials banned from landfill and incinerator disposal . Paper , cardboard and containers Aluminum containers Bi - metal containers ( i.e. containers made from a combination of steel and aluminum ) Corrugated cardboard or other containerboard Glass containers Magazines and other materials printed on similar paper Newspapers and other materials printed on newsprint Office paper Plastic containers # 1 and # 2 - milk jugs , laundry detergent bottles , soda and water bottles , etc . Steel containers ( tin cans ) Additional materials Electronics Lead acid batteries Major appliances Large Appliance Recycling Guide [ PDF ] Focus on Energy appliance recycling program Used oil filters Waste oil , except when incinerated with energy recovery Waste tires ( except when incinerated with energy recovery ) Yard waste , including grass clippings , leaves , yard and garden debris and brush under 6 inches in diameter * * Yard waste may go to an approved compost facility or be incinerated with energy recovery . Brush may be burned at licensed woodburning facilities if reasonable alternatives are not available . Composting in Wisconsin has more information on managing yard waste and other compostable materials . Wisconsin ' s recycling law also bans the following materials from disposal , but the DNR allows them to be landfilled or incinerated because there are not yet adequate recycling markets . Foam polystyrene packaging ( for serving food or beverages ) , loose particles intended for packing ( e.g. packing peanuts ) , or rigid foam shaped to hold and cushion a packaged item . Plastic containers # 3 through # 7 . Many communities now accept some of these types of plastics , so check with your local recycling program or recycling hauler to find out if you can include them in your recycling . What NOT to put in your recycling bin or cart The following items cause significant problems at recycling facilities and should not be placed curbside In a bin or cart . Many of these items can be recycled at drop - off locations . Loose plastic bags , film or wrap Batteries Cords , hoses , light strings , ropes and wires Needles / sharps ( this includes sharps placed in a plastic container ) Propane cylinders Textiles Resources for recycling other materials The Wisconsin Recycling Markets Directory provides information about outlets for recycling various materials in Wisconsin . Users can search by material / item type , view information about recyclers and suggest additional recyclers to include in the listing . The following resources are for specific material types . Agricultural plastics and pesticide containers Fishing line Household and agricultural hazardous waste Light bulbs Plastic bags and wrap Textiles - - check with nonprofit organizations like Goodwill or St . Vincent de Paul ; many will accept textiles for recycling as well as reuse Exceptions for local recycling responsible units The bans on paper , cardboard and containers do not apply to small amounts of the banned material mixed in with garbage being collected , treated and disposed of by a responsible unit ( RU ) with an effective recycling program . Even a good recycling program will not capture 100 percent of all potential recyclables , and some materials are unable to be recycled because of contamination . Examples include plastic jugs used for waste oil collection or newspaper used for cleaning . There are also exceptions for emergencies , unintentionally contaminated materials , the approved beneficial reuse of RUs in two grandfathered waste - to - energy incinerator areas ( La Crosse and Barron counties ) are allowed to send recyclable paper ( including newspaper , magazines and cardboard ) and plastics to waste - to - energy incinerators , although local ordinances in those areas may require paper and plastic items to be recycled . Last Revised : Thursday April 04 2019
[ "recycle in Wisconsin", "Resources" ]
http://dnr.wi.gov/topic/fishing/questions/troll.html
Fishing Wisconsin Got license ? Give yourself the license to relax and catch some memories while you ' re at it . Regulations Know the regulations to make your fishing more enjoyable . Places to fish Wisconsin offers a variety of fishing opportunities . Give them a try ! Get started Get the basic information you need to get on the water and try your luck . Making fishing better Ceded territory Lake Michigan Lake Superior Mississippi River Trout fishing Fisheries surveys and reports Hatcheries Stocking Related links Wisconsin fishes Youth and fishing Fishing tournaments Wisconsin ' s lakes Contact information For information , contact : Fisheries Management Fishing Wisconsin Motor trolling Trolling defined According to NR 20.03 ( 40 ) of the Wisconsin Administrative Code , " troll " or " trolling " means fishing by trailing any lure , bait or similar device that may be used to attract or catch fish from a boat propelled by a means other than drifting , pedaling , paddling , or rowing . Casting and immediate retrieval of a bait , lure or similar device while the motor is running ( or β€œ position fishing ” ) is not considered trolling . Motor trolling in Wisconsin Motor trolling is legal on all inland waters with either : 3 hooks , baits or lures / person with no maximum number of lines trolled per boat or 1 hook , bait or lure / person with a maximum of 3 hooks , baits or lures trolled per boat Inland Waters - 3 hooks , baits or lures per angler with no maximum number of lines trolled per boat All waters of the following counties : Adams , Ashland , Barron , Bayfield , Brown , Buffalo , Burnett , Calumet , Chippewa , Clark , Columbia , Crawford , Dane , Dodge , Door , Douglas , Dunn , Eau Claire , Fond du Lac , Forest , Grant , Green , Green Lake , Iowa , Jackson Jefferson , Juneau , Kenosha , Kewaunee , La Crosse , Lafayette , Langlade , Manitowoc , Marathon , Marinette , Marquette , Menominee , Milwaukee , Monroe , Oconto , Outagamie , Ozaukee , Pepin , Pierce , Polk Inland Waters - 1 hook , bait or lure per angler with a maximum of 3 hooks , baits or lures trolled per boat All waters of the following counties : Florence , Iron , Lincoln , Oneida , Sheboygan , Vilas and Waupaca Specified waters - County with one hook , bait , or lure per person , with a limit of up to three hooks , baits , or lures from a boat , except for waters listed below that allow three hooks , baits , or lures and no boat restriction : Sawyer County : : Big Chetac Lake , Grindstone Lake , Lac Courte Oreilles Chain , Nelson Lake , Round Lake Chain , Whitefish Lake , and Windigo Lake , Boundary Waters - 3 hooks , baits or lures per angler Wisconsin - Michigan boundary waters , ( except Vilas County boundary waters , where motor trolling allowed with only 1 hook , bait or lure per angler and 3 hooks . baits or lures maximum per boat ) . All Wisconsin - Minnesota boundary waters ; Mississippi River Great Lakes ( Outlying Waters ) 3 hooks , baits or lures per angler Lake Michigan Lake Superior Trolling summary fact sheet The trolling summary fact sheet [ PDF ] was developed to help anglers understand the trolling regulations . Tuck it in your tacklebox . Please consult the current hook and line regulations for the complete list of regulations that apply to these waters . Frequently asked trolling questions I routinely fish a lake that crosses county boundaries ( One county has a maximum of 3 lines per boat and the other county has no maximum of the lines trolled per boat ) . How is that situation regulated ? Because these are county - by - county rules , , they will be enforced by the county line . Rather than having to list exceptions for every water that crosses a county line , the rules follow the county lines . In this particular case , a maximum of 3 lines per boat anywhere on the lake will keep you clearly within the law , but you could use 3 lines / angler where you cross the county line into the less restrictive portion of the lake . When the rules between counties differ , you should follow the Does the trolling rule override ordinances prohibiting the use of motor boats ? This change does not affect boating regulations , so anglers must still comply with any motor restrictions applicable on the lakes . As before , a person holding a valid disabled permit that authorizes trolling ( trolling , Class A , Class B with trolling ) would be authorized to use an electric motor on lakes with ordinances enacted that prohibit the use of motor boats on navigable waters . If I am fishing on a water where I can only use 1 β€œ line ” to troll and up to two lines per boat , can I cast with another line ? Yes , the trolling line restriction only applies to the number of lines being trolled . Any person can fish statewide with up to three hooks , baits , or lures at a time . If you are trolling with one line that has one lure attached , you can cast at the same time with another lure . Same goes for boats – if two people are each trolling a line from a boat , they are still allowed to use additional non - trolling lines up to their maximum of three hooks , baits , or lures per Last revised : Thursday April 12 2018
[ "Motor trolling", "Wisconsin", "Boundary Water" ]
http://dnr.wi.gov/wnrmag/html/stories/1999/jun99/ants.htm
Subscribe Current Issue Search June 1999 Antidote The only cure for an infestation of these industrious social insects is more knowledge . Holly Prall Antipasto : What ants eat Anteroom : Where ants live Anticipation : How ants prepare for the next generation Antiheroines : Carpenter ants in your home Antithesis : The other side of the story Anticlimax : How to control household ants safely and effectively Ant or termite – a comparison chart Know your ants – an identification chart F ew people bother to consider the world of ants – until it appears that the ants of the world are mounting a colossal attack on the kitchen and environs . In midsummer , you may have noticed ants invading the countertop cookie jar or Fido ' s food dish on the floor . In fall , streams of the industrious insects will put the bite on a bar of bathroom soap . What about those pale , winged ants that suddenly appear in a little cloud in the basement ? Are these serious infestations ? Though some may think " an ant is an ant is an ant , " in reality , there ' s great variety in the ant world . Knowing the differences will increase your enjoyment of nature , and also help you mount a successful eradication campaign , should one become necessary . Antipasto : What ants eat Ants ( family Formicidae ) have become such successful insects because they are highly adaptable , with many species able to eat just about anything . The seed - eating Grease Ant ( Solenopsis molesta ) , though among the tiniest of ants , earns its nickname " Thief Ant " by sneaking into the nests of larger ants and eating their larvae . Carpenter Ants ( Camponotus spp . ) eat other insects and a variety of sweet foods , but they definitely do not , like termites , eat wood . A favorite food of carpenter ants and many other species is honeydew – the sugary excretion of sap - sucking insects such as aphids , scale insects , treehoppers , and leafhoppers . The False Honey Ant ( Prenolepis imparis ) so loves to gorge on honeydew and plant juices that an ant may become stuffed to the point where it has difficulty walking . In return for honeydew , which may be excreted on demand by the aphids , ants protect their aphid " herds , " aid them in dispersal , and prevent a build - up of honeydew in their vicinity , thus keeping the insects free of fungal disease . Some ants , such as the Larger Yellow Ant ( Acanthomyops interjectus ) , a nocturnal , subterranean dweller , live exclusively by tending root aphids for honeydew and perhaps eating some of these soft insects . This pale ant is not a serious pest even if it finds its way inside the house foundation . Ants may also consume the nectar of flowers or other plant juices and secretions . Know your ant ! If you ca n ' t i.d. the species yourself , capture an ant , preserve it in rubbing alcohol and take your specimen to a pest control expert . Β© Van Waters & Rogers , Inc . When the outdoor foods they like most are in short supply , or competition is great , as in mid - to late summer , many ants will forage indoors for a variety of sweet , greasy , and protein - rich foods . The " scout " ants use pheromones – odorous chemicals – to communicate the location of a large food find with the colony . The scout first has a bite to eat , then promptly returns home , laying down a pheromone trail that stimulates the other ants to follow . When the other ants leave the nest , often in numbers proportional to the amount of pheromone released , they wave their antennae in the air to find traces of pheromone vapor . Scouts of some species , such as grease ants and Pharaoh Ants ( Monomorium pharaonis ) – a stubborn pest known to eat such unusual foods as toothpaste and soap – add their own traces to the trail as they return to the nest site . Because the trail is constantly renewed , a conspicuous , persistent track of many hundreds of ants may develop . This style of foraging , known as mass recruitment , allows the tiny insects to efficiently exploit any food find before the scouts of any other species discover it . Some species of Field Ants ( Formica spp . ) have developed their own highly efficient foraging system : They make broad " ant highways " chemically marked and cleared of vegetation and debris . Anteroom : Where ants live Within limits , ants love heat . Most ants function poorly below 20 Β° C ( 68 Β° F ) and not at all below 10 Β° C ( 50 Β° F ) , although the cold - tolerant false honey ant has been known to forage at temperatures close to freezing . In Wisconsin , many ants of different varieties have adapted to their environment by living in the soil or in other locations that allow them to keep the temperature and humidity at favorable levels . The ants move to deeper chambers or special winter nests when the Ant nests vary in depth and in primary orientation – horizontal or vertical . For example , the notorious pesky ants that tend aphids on the roots of plants , such as the Cornfield Ant ( Lasius alienus ) and the pavement ant , often have mainly horizontal tunnels . The cornfield ant is known for hatching the corn root aphid and transferring it from grasses to growing corn . These same ants foster strawberry aphids and thereby undermine strawberry plants . The Pavement Ant ( Tetramorium caespitum ) has a reputation for girdling plant stems and eating their sap , and for storing seeds in its nest . Most species in Wisconsin do not live in the open soil . Some nest under flat stones , like the pavement ant ; or under the bark of a tree , like the carpenter ant . Other species build mounds . The mounds are not to be confused with craters – the loose piles of dirt pellets kicked up by soil - dwelling ants during their excavations . Rocks and bark warm quickly in the sunlight , and a raised mound has more exposed surface for the sun to intercept . Thus , in all of these nesting sites , ants catch more sunlight for their colonies to use in the early spring . Ants also move the larvae around in the nest throughout the day to ensure the proper conditions for the developing brood . The pharaoh ant , introduced from the tropics , can live only indoors in heated buildings . A " tramp species , " it often lives in close association with people and is sometimes carried in their belongings from place to place . This opportunistic nester has taken advantage of its small size to exploit unusual nesting sites such as the space between layers of linens or sheets of stationery . Another opportunistic nester is the Odorous House Ant ( Tapinoma sessile ) , which , despite its name , is primarily an outdoor nester . It sometimes colonizes bird nests , plant stems , and spaces beneath urban debris . Anticipation : How ants prepare for the next generation After a certain length of time , ranging from a single warm season to five or more years , the colony matures and enters the reproductive stage , when sexual forms begin to be produced . A carpenter ant colony , for example , may reach maturity when it contains 2,000 or more workers and is three to six or more years old . At maturity , it produces 10 to 400 winged reproductive ants that will emerge and swarm during the spring in what is known as a nuptial flight . Queen ants , which may be twice as large as workers , have two pairs of wings ( front longer than back ) and a large hind section , or gaster . The males are typically slightly smaller and also winged . Generally , they play no role in the daily life of ant colonies and die soon after mating with a virgin queen , often by being devoured by birds ( ants ' main predator ) , other ants , or other insects . When the queen returns to earth some distance from the nest where she matured , The microscopic eggs pass through two main stages of development before becoming adults – larvae and pupae . The larvae are grublike , blind , and often shaped something like a crookneck squash . The soft , colorless pupae resemble the adult in form . The queen nourishes them with nutritive juice formed from stored fat and the breakdown products of her huge flight muscles . For the two to 10 months it takes for them to mature , she never leaves the nest . Finally , the first workers mature , and begin to care for the queen , Some species , such as the pharaoh ant and the odorous house ant , establish new nests exclusively by a process known as budding . A satellite nest buds from an established one when a few workers , often with one of the colony ' s many queens , leave to set up housekeeping at another location , again making use of chemical trails . With this method , the queens are never exposed to the risks of a nuptial flight , but instead mate inside the nest and walk to their new home . Most carpenter ant invasions are Antiheroines : What you have if carpenter ants working on your home Carpenter ants commonly move inside between November and early March . You may hear their rustling in the walls at night . If the colony is active all year , the ants are likely to be in walls , door voids , ceilings , or other heated areas of the house . Other common areas are under outside siding and in wood - soil contacts near the foundation carpenter ants generally choose softened or weak wood , with a moisture content of 15 percent or greater , sometimes under bathroom floors . In nature , they occupy dead portions of standing trees , stumps , or logs , or burrow under fallen logs or stones . Silver maples are commonly infected and white pine not at all . Ants in outdoor trees may send out scouts to establish satellite colonies in firewood , lumber , wood debris , or possibly on steps , porches , decks and columns . Vegetation , utility wires and phone wires that touch the home often provide bridges from tree to house . Field ants have " soldiers " that are capable of biting both insect and human invaders , but ants have means of defense . Many species secrete poisonous substances from glands to ward off intruders . Formic acid , excreted by field ants , is used in combination with the lemony smelling citronella by the larger yellow ant . An unpleasant odor described as " rotten coconuts " is emitted by odorous house ants when disturbed or crushed . Antithesis : The other side of the story Ants play an important part in insect control , in part by keeping more harmful pests away from the plants they patrol . Like spiders , indoor ants are likely to eat flea and fly larvae and other pests . Field ant species , for example , also prey on bed bugs , moths , young silverfish , and subterranean termites . Having ants patrolling your home ' s borders may be important in controlling termites . In the woods , carpenter ants help decompose trees . Ants of all kinds aid in recycling nutrients . Organic matter accumulated in ant nests can add nutrients to soil and improve its structure . Digging by ants loosens the soil , increasing its porosity and making it easier for air , water , and plant roots to penetrate . Consider the humble ant ' s positive contribution to the health of the environment . Then plan your control strategy accordingly . The guidelines below should help you safely fend off ant invaders . How to control household ants safely and effectively 1 . Identify the type of ant . Know your quarry ! Control measures differ for different types of ants . A magnifying glass will aid in identification . You may need to capture an ant and preserve it in rubbing alcohol to examine it . For further help in identifying ants , submit a sample to your local extension service for a pest control company . 2 . Is action necessary ? Consider the type of ant , the number you see , where you see them , and other pertinent factors , such as the season . You may decide that you can put up with an occasional field ant in your kitchen in the summer , for example . But other species may cause serious problems in time : The pharaoh ant spreads quite rapidly . And while a few carpenter ants in the kitchen may simply be foragers from an outdoor nest , the repeated appearance of carpenter ants in other rooms suggests they are nesting in damaged or 3 . Try simple measures first . Deny ants easy nest sites , food and water sources . In the kitchen , keep counters , appliances and floor surfaces clean ; remove garbage daily ; remove organic wastes from containers before discarding ; and rinse recyclables before storage . Keep foods in glass jars or plastic containers with tight - fitting lids . A water moat , such as a pie pan containing soapy water , can be used to prevent ants from reaching sticky foods like honey , or other items such as plants . Sticky barriers such as Tanglefoot can also be used on the legs of outdoor plant stands , on foundation walls , or around the trunks of roses or trees to keep off aphid - promoting ants . Throughout the house , seal any cracks where ants may be entering . To prevent a carpenter ant problem , remove or replace all damaged or decayed wood in your house . Ventilate attics , bathrooms and damp areas . Keep rain gutters clear of debris . Remove tree stumps and dead branches close to the house . Store lumber and firewood above the ground and away from the house 4 . Follow the trail . Take up the rear and follow the trail of ants to find the entry point or nest . Try killing ants you see with soapy water , and eradicating the trail with soapy water or a mild solution of vinegar and water . Seal the entry with silicone caulk ( duct tape also makes a good temporary sealant ) . If ants can be traced back to an outdoor nest , drench the nest several times with hot , soapy water every few days until activity ceases . Carpenter ant nests can be removed or treated with insecticide sprays containing pyrethrum . If you do not see a trail , set up a stakeout : Put out a food the ants like , then watch and wait – at night , for carpenter ants . Outdoor nests may be under siding , on wooden porches , or at wood - soil contacts near foundations . Indoor nests may be found in rotten woodwork as well as wall voids , hollow - core doors , foam insulation , or hollow beams . To locate openings into the nest , look for small piles of coarse sawdust and insect parts known as frass . If carpenter ants are nesting in a void or hollow space , apply some form of insecticidal dust directly to the nest . Drill holes for access as necessary . A plastic squeeze bottle filled about 1 / 3 to Β½ full may be used to force the dust into the nest spaces . Nonglassified diatomaceous earth and silica gel work by attacking the waxy coating of the ant , causing it to lose moisture and eventually die . Wear goggles and a dust mask when applying dusts . Boric acid or a combination of silica gel and pyrethrums for For exposed nests try sucking up the ants with a vacuum . A liquid or aerosol spray for ant and roach control , such as one containing pyrethrum , may also be used . Be sure it is labeled for indoor use . If you ca n ' t find a nest or point of entry , spray a chemical barrier around the house , windows and doors in a two to three foot wide band . 5 . Set the bait and wait . For many species , baits are the best option when indoor nests can not be located or are inaccessible , but the baits can take several months to work . Ant baits work as food is shared in the nest among all the workers and the developing brood . It is important that baits are mild enough so weakened ants will keep coming for more , but strong enough to eventually kill the whole colony . Since pupae do n ' t feed from the bait , you may need to periodically retreat the area to reduce carpenter ant populations Match bait materials to the ants ' food preferences . Different baits are formulated against sweet - feeding ants ; while others control protein feeders . A mixture of one - quarter teaspoon boric acid to about 4 tablespoons of a food ants like – honey , syrup , or peanut butter – can be placed on jar lids , small pieces of cardboard , or in straws set where ants are commonly found . Sealed , labeled jars containing a boric acid , food solution with holes punched in the top may also be used . Effective baits for Ant or Termite ? Termites belong to the Order Isoptera , and their closest relatives are roaches . Though sometimes confused with ants , termites differ in many important ways : Carpenter ants Termites Eating habits Sweets , honeydew and other insects ; chews but does not eat wood . Eats wood ; can digest the cellulose due to protozoan living in digestive tract . Foraging habits Ants of many species are commonly seen foraging in the open , some most often at night . Avoid light ; may live inside own food or travel in tunnels through the soil or covered runways to forage on dead wood . Indoor tunnels Damage to wood is caused by moisture or dry rot with only local damage to sound wood . Piles of coarse sawdust mixed with insect fragments ( called frass ) may be pushed out of slit - like nest openings and fall on surfaces below . Social structure All workers are females . Grub - like whitish larvae and soft - bodied pupae are helpless and must be carried off by adults if nest is attacked . Males participate in the colony work . Eggs hatch to creamy - white nymphs , molt several times and participate in work when half - grown . Holly Prall is a freelance science writer from Greensboro , North Carolina . She volunteers teaching children at a neighborhood program .
[ "Antidote", "family Formicidae" ]
http://doc.qt.io/qt-4.8/qprogressbar.html
Wiki Documentation Forum Bug Reports Code Review Qt Documentation Qt 4.8 QtGui QProgressBar QProgressBar Class The QProgressBar widget provides a horizontal or vertical progress bar . More . . . Header : # include < QProgressBar > Inherits : QWidget List of all members , including inherited members Public Types enum Direction { TopToBottom , BottomToTop } Properties alignment : Qt : : Alignment format : QString invertedAppearance : bool maximum : int minimum : int orientation : Qt : : Orientation text : const QString textDirection : Direction textVisible : bool value 58 properties inherited from QWidget 1 property inherited from QObject Public Functions ( QWidget * parent = 0 ) Qt : : Alignment alignment ( ) const QString format ( ) const bool invertedAppearance ( ) bool isTextVisible int maximum int minimum Qt : : Orientation orientation void setAlignment ( Qt : : Alignment alignment void setFormat ( const QString & format setInvertedAppearance ( bool invert setTextDirection ( QProgressBar : : Direction textDirection setTextVisible ( bool visible virtual QString text QProgressBar : : Direction textDirection ( ) QProgressBar : : Direction value Reimplemented Public Functions virtual QSize minimumSizeHint virtual QSize sizeHint 220 public functions inherited from 29 public functions inherited from QObject 12 public functions inherited from QPaintDevice Public Slots reset setMaximum ( int maximum setMinimum ( int minimum setOrientation ( Qt : : Orientation ) setRange minimum , int maximum setValue value 19 public slots inherited from 1 public slot inherited from Signals valueChanged value 1 signal inherited from 1 signal inherited from Protected Functions initStyleOption ( QStyleOptionProgressBar * option ) const Reimplemented Protected Functions virtual bool event ( QEvent * e virtual void paintEvent ( QPaintEvent * ) 37 protected functions inherited from 8 protected functions inherited from 1 protected function inherited from QPaintDevice Additional Inherited Members 4 static public members inherited from 7 static public members inherited from 1 protected slot inherited from Detailed Description The widget provides a horizontal or vertical progress bar . A progress bar is used to give the user an indication of the progress of an operation and to reassure them that the application is still running . The progress bar uses the concept of steps . You set it up by specifying the minimum and maximum possible step values , and it will display the percentage of steps that have been completed when you later give it the current step value . The percentage is calculated by dividing the progress ( ( ) - ( ) ) divided by ( ) - ( ) . You can specify the minimum and maximum number of steps with setMinimum ( ) and setMaximum . The current number of steps is set with setValue ( ) . The progress bar can be rewound to the beginning with reset ( ) . If minimum and maximum both are set to 0 , the bar shows a busy indicator instead of a percentage of steps . This is useful , for example , when using QFtp or QNetworkAccessManager to download items when they are unable to determine the size of the item being downloaded . A progress bar shown in the Macintosh widget style . A progress bar shown in the Windows XP widget style . A progress bar shown in the Plastique widget style . See also QProgressDialog and GUI Design Handbook : Progress Indicator Member Type Documentation enum QProgressBar : : Direction Specifies the reading direction of the for vertical progress bars . Constant Value Description QProgressBar : : TopToBottom 0 The text is rotated 90 degrees clockwise . QProgressBar : : BottomToTop 1 The text is rotated 90 degrees counter - clockwise . Note that whether or not the text is drawn is dependent on the style . Currently CDE , CleanLooks , Motif , and Plastique draw the text . Mac , Windows and WindowsXP style do not . This enum was introduced or modified in Qt 4.1 . See also Property Documentation Qt : : Alignment This property holds the alignment of the progress bar . Access functions : Qt : : Alignment setAlignment ( Qt : : Alignment alignment QString This property holds the string used to generate the current text . % p - is replaced by the percentage completed . % v - is replaced by the current value . % m - is replaced by the total number of steps . The default value is " % p % " . This property was introduced in Qt 4.2 . Access functions : QString setFormat ( const QString & format bool This property holds whether or not a progress bar shows its progress inverted . If this property is false , the progress bar grows in the other direction ( e.g. from right to left ) . By default , the progress bar is not inverted . This property was introduced in Qt 4.1 . setInvertedAppearance invert and layoutDirection int This property holds the progress bar ' s maximum value . When setting this property , the is adjusted if necessary to ensure that the range remains valid . If the current value falls outside the new range , the progress bar is reset with int This property holds the progress bar ' s minimum value . When setting this property , the is adjusted if necessary to ensure that the range remains valid . If the current value falls outside the new range , the progress bar is reset with Qt : : Orientation This property holds the orientation of the progress bar . The orientation must be Qt : : Horizontal ( the default ) or Qt : : Vertical This property was introduced in Qt 4.1 . Qt : : Orientation setOrientation ( Qt : : Orientation ) : const QString This property holds the descriptive text shown with the progress bar . The text returned is the same as the text displayed in the center ( or in some styles , to the left ) of the progress bar . The progress shown in the text may be smaller than the minimum value , indicating that the progress bar is in the " reset " state before any progress is set . In the default implementation , the text either contains a percentage value that indicates the progress so far , or it is blank because the progress bar is in the reset state . virtual QString This property holds the reading direction of the text for vertical progress bars . This property has no impact on horizontal progress bars . By default , the reading direction is QProgressBar : : TopToBottom setTextDirection ( QProgressBar : : Direction textDirection textVisible bool This property holds whether the current completed percentage should be displayed . This property may be ignored by the style ( e.g. , QMacStyle never draws the text ) . isTextVisible setTextVisible visible This property holds the progress bar ' s current value . Attempting to change the current value to one outside the minimum - maximum range has no effect on the current value . Notifier signal : valueChanged Member Function Documentation QProgressBar : : parent = 0 ) Constructs a progress bar with the given parent By default , the minimum step value is set to 0 , and the maximum to 100 . setRange [ virtual protected ] QProgressBar : : event QEvent e Reimplemented from QObject : : event [ protected ] void QProgressBar : : initStyleOption QStyleOptionProgressBar option ) const Initialize option with the values from this . This method is useful for subclasses when they need a QStyleOptionProgressBar or QStyleOptionProgressBarV2 , but do n ' t want to fill in all the information themselves . This function will check the version of the and fill in the additional values for a QStyleOptionProgressBarV2 QStyleOption : : initFrom [ virtual ] QSize minimumSizeHint Reimplemented from QWidget : : minimumSizeHint [ virtual protected ] void paintEvent QPaintEvent * ) QWidget : : paintEvent [ slot ] Reset the progress bar . The progress bar " rewinds " and shows no progress . [ slot ] Sets the progress bar ' s minimum and maximum values to respectively . If is smaller than becomes the only legal value . If the current value falls outside the new range , the progress bar is reset with [ virtual ] QSize sizeHint QWidget : : sizeHint Β© 2016 The Qt Company Ltd . Documentation contributions included herein are the copyrights of their respective owners . The documentation provided herein is licensed under the terms of the GNU Free Documentation License version 1.3 as published by the Free Software Foundation . Qt and respective logos are trademarks of The Qt Company Ltd . in Finland and / or other countries worldwide . All other trademarks are property of their respective owners .
[ "Qt Documentation Archives", "QProgressBar Class" ]
http://doc.qt.io/qt-5/qt.html
Contents Types Functions Detailed Description Qt Namespace The Qt namespace contains miscellaneous identifiers used throughout the Qt library Header include Qt qmake QT core Obsolete members Types flags Alignment enum AlignmentFlag AlignLeft AlignRight AlignHCenter AlignJustify AlignVertical_Mask enum AnchorPoint AnchorLeft AnchorHorizontalCenter AnchorRight AnchorTop AnchorVerticalCenter AnchorBottom enum ApplicationAttribute AA_DontShowIconsInMenus AA_DontShowShortcutsInContextMenus AA_NativeWindows AA_DontCreateNativeWidgetSiblings AA_X11InitThreads enum ApplicationState ApplicationSuspended ApplicationHidden ApplicationInactive ApplicationActive flags ApplicationStates enum ArrowType NoArrow UpArrow DownArrow LeftArrow RightArrow enum AspectRatioMode IgnoreAspectRatio KeepAspectRatio KeepAspectRatioByExpanding enum Axis XAxis YAxis ZAxis enum BGMode TransparentMode OpaqueMode enum BrushStyle NoBrush SolidPattern Dense1Pattern Dense2Pattern TexturePattern enum CaseSensitivity CaseInsensitive CaseSensitive enum CheckState Unchecked PartiallyChecked Checked enum ChecksumType ChecksumIso3309 ChecksumItuV41 enum ClipOperation NoClip ReplaceClip IntersectClip enum ConnectionType AutoConnection DirectConnection QueuedConnection BlockingQueuedConnection UniqueConnection enum ContextMenuPolicy NoContextMenu PreventContextMenu DefaultContextMenu ActionsContextMenu CustomContextMenu enum CoordinateSystem DeviceCoordinates LogicalCoordinates enum Corner TopLeftCorner TopRightCorner BottomLeftCorner BottomRightCorner enum CursorMoveStyle LogicalMoveStyle VisualMoveStyle enum CursorShape ArrowCursor UpArrowCursor CrossCursor WaitCursor BitmapCursor enum DateFormat TextDate ISODate ISODateWithMs SystemLocaleShortDate RFC2822Date enum DayOfWeek Monday Tuesday Wednesday Thursday Sunday enum DockWidgetArea LeftDockWidgetArea RightDockWidgetArea TopDockWidgetArea BottomDockWidgetArea AllDockWidgetAreas NoDockWidgetArea flags DockWidgetAreas enum DropAction CopyAction MoveAction LinkAction ActionMask IgnoreAction TargetMoveAction flags DropActions enum Edge TopEdge LeftEdge RightEdge BottomEdge flags Edges enum EnterKeyType EnterKeyDefault EnterKeyReturn EnterKeyDone EnterKeyGo EnterKeyPrevious enum EventPriority HighEventPriority NormalEventPriority LowEventPriority enum FillRule OddEvenFill WindingFill enum FindChildOption FindDirectChildrenOnly FindChildrenRecursively flags FindChildOptions enum FocusPolicy TabFocus ClickFocus StrongFocus WheelFocus NoFocus enum FocusReason MouseFocusReason TabFocusReason BacktabFocusReason ActiveWindowFocusReason OtherFocusReason enum GestureFlag DontStartGestureOnChildren ReceivePartialGestures IgnoredGesturesPropagateToParent flags GestureFlags enum GestureState NoGesture GestureStarted GestureUpdated GestureFinished GestureCanceled enum GestureType TapGesture TapAndHoldGesture PanGesture PinchGesture SwipeGesture CustomGesture enum GlobalColor white black red darkRed color1 typedef HANDLE enum HitTestAccuracy ExactHit FuzzyHit enum ImageConversionFlag AutoColor ColorOnly MonoOnly DiffuseDither NoFormatConversion flags ImageConversionFlags enum InputMethodHint ImhNone ImhHiddenText ImhSensitiveData ImhNoAutoUppercase ImhExclusiveInputMask flags InputMethodHints flags InputMethodQueries enum InputMethodQuery ImEnabled ImMicroFocus ImCursorRectangle ImFont ImQueryAll enum ItemDataRole DisplayRole DecorationRole EditRole ToolTipRole UserRole enum ItemFlag NoItemFlags ItemIsSelectable ItemIsEditable ItemIsDragEnabled ItemIsUserTristate flags ItemFlags enum ItemSelectionMode ContainsItemShape IntersectsItemShape ContainsItemBoundingRect IntersectsItemBoundingRect enum ItemSelectionOperation ReplaceSelection AddToSelection enum Key Key_Escape Key_Tab Key_Backtab Key_Backspace Key_Cancel enum KeyboardModifier NoModifier ShiftModifier ControlModifier AltModifier GroupSwitchModifier flags KeyboardModifiers enum LayoutDirection LeftToRight RightToLeft LayoutDirectionAuto enum MaskMode MaskInColor MaskOutColor enum MatchFlag MatchExactly MatchFixedString MatchContains MatchStartsWith MatchRecursive flags MatchFlags enum Modifier SHIFT META CTRL ALT UNICODE_ACCEL enum MouseButton NoButton AllButtons LeftButton RightButton ExtraButton24 flags MouseButtons enum MouseEventFlag MouseEventCreatedDoubleClick flags MouseEventFlags enum MouseEventSource MouseEventNotSynthesized MouseEventSynthesizedBySystem MouseEventSynthesizedByQt MouseEventSynthesizedByApplication enum NativeGestureType BeginNativeGesture EndNativeGesture PanNativeGesture ZoomNativeGesture SwipeNativeGesture enum NavigationMode NavigationModeNone NavigationModeKeypadTabOrder NavigationModeKeypadDirectional NavigationModeCursorAuto NavigationModeCursorForceVisible enum Orientation Horizontal Vertical flags Orientations enum PenCapStyle FlatCap SquareCap RoundCap enum PenJoinStyle MiterJoin BevelJoin RoundJoin SvgMiterJoin enum PenStyle NoPen SolidLine DashLine DotLine CustomDashLine enum ScreenOrientation PrimaryOrientation LandscapeOrientation PortraitOrientation InvertedLandscapeOrientation InvertedPortraitOrientation flags ScreenOrientations enum ScrollBarPolicy ScrollBarAsNeeded ScrollBarAlwaysOff ScrollBarAlwaysOn enum ScrollPhase NoScrollPhase ScrollBegin ScrollUpdate ScrollEnd ScrollMomentum enum ShortcutContext WidgetShortcut WidgetWithChildrenShortcut WindowShortcut ApplicationShortcut enum SizeHint MinimumSize PreferredSize MaximumSize MinimumDescent enum SizeMode AbsoluteSize RelativeSize enum SortOrder AscendingOrder DescendingOrder enum TabFocusBehavior NoTabFocus TabFocusTextControls TabFocusListControls TabFocusAllControls enum TextElideMode ElideLeft ElideRight ElideMiddle ElideNone enum TextFlag TextSingleLine TextDontClip TextExpandTabs TextShowMnemonic TextJustificationForced enum TextFormat PlainText RichText AutoText enum TextInteractionFlag NoTextInteraction TextSelectableByMouse TextSelectableByKeyboard LinksAccessibleByMouse TextBrowserInteraction flags TextInteractionFlags enum TileRule StretchTile RepeatTile RoundTile enum TimeSpec LocalTime UTC OffsetFromUTC TimeZone enum TimerType PreciseTimer CoarseTimer VeryCoarseTimer enum ToolBarArea LeftToolBarArea RightToolBarArea TopToolBarArea BottomToolBarArea AllToolBarAreas NoToolBarArea flags ToolBarAreas enum ToolButtonStyle ToolButtonIconOnly ToolButtonTextOnly ToolButtonTextBesideIcon ToolButtonTextUnderIcon ToolButtonFollowStyle enum TouchPointState TouchPointPressed TouchPointMoved TouchPointStationary TouchPointReleased flags TouchPointStates enum TransformationMode FastTransformation SmoothTransformation enum UIEffect UI_AnimateMenu UI_FadeMenu UI_AnimateCombo UI_AnimateTooltip UI_FadeTooltip UI_AnimateToolBox enum WhiteSpaceMode WhiteSpaceNormal WhiteSpacePre WhiteSpaceNoWrap enum WidgetAttribute WA_AcceptDrops WA_AlwaysShowToolTips WA_ContentsPropagated WA_CustomWhatsThis WA_ContentsMarginsRespectsSafeArea flags WindowFlags enum WindowFrameSection NoSection LeftSection TopLeftSection TopSection TitleBarArea enum WindowModality NonModal WindowModal ApplicationModal enum WindowState WindowNoState WindowMinimized WindowMaximized WindowFullScreen WindowActive flags WindowStates enum WindowType Widget Window Dialog Sheet WindowType_Mask Functions convertFromPlainText const QString plain QtWhiteSpaceMode mode mightBeRichText const QString text QFlagsKeyboardModifiersenum_type operator KeyboardModifiersenum_type f1 KeyboardModifiersenum_type f2 QFlagsKeyboardModifiersenum_type operator KeyboardModifiersenum_type f1 QFlagsKeyboardModifiersenum_type f2 QFlagsInputMethodHintsenum_type operator InputMethodHintsenum_type f1 InputMethodHintsenum_type f2 QFlagsInputMethodHintsenum_type operator InputMethodHintsenum_type f1 QFlagsInputMethodHintsenum_type f2 QIncompatibleFlag operator InputMethodHintsenum_type f1 int f2 QFlagsDropActionsenum_type operator DropActionsenum_type f1 DropActionsenum_type f2 QFlagsDropActionsenum_type operator DropActionsenum_type f1 QFlagsDropActionsenum_type f2 QIncompatibleFlag operator DropActionsenum_type f1 int f2 QFlagsItemFlagsenum_type operator ItemFlagsenum_type f1 ItemFlagsenum_type f2 QFlagsItemFlagsenum_type operator ItemFlagsenum_type f1 QFlagsItemFlagsenum_type f2 QIncompatibleFlag operator ItemFlagsenum_type f1 int f2 QFlagsMatchFlagsenum_type operator MatchFlagsenum_type f1 MatchFlagsenum_type f2 QFlagsMatchFlagsenum_type operator MatchFlagsenum_type f1 QFlagsMatchFlagsenum_type f2 QIncompatibleFlag operator MatchFlagsenum_type f1 int f2 QFlagsTextInteractionFlagsenum_type operator TextInteractionFlagsenum_type f1 TextInteractionFlagsenum_type f2 QFlagsTextInteractionFlagsenum_type operator TextInteractionFlagsenum_type f1 QFlagsTextInteractionFlagsenum_type f2 QIncompatibleFlag operator TextInteractionFlagsenum_type f1 int f2 QFlagsTouchPointStatesenum_type operator TouchPointStatesenum_type f1 TouchPointStatesenum_type f2 QFlagsTouchPointStatesenum_type operator TouchPointStatesenum_type f1 QFlagsTouchPointStatesenum_type f2 QIncompatibleFlag operator TouchPointStatesenum_type f1 int f2 QFlagsGestureFlagsenum_type operator GestureFlagsenum_type f1 GestureFlagsenum_type f2 QFlagsGestureFlagsenum_type operator GestureFlagsenum_type f1 QFlagsGestureFlagsenum_type f2 QIncompatibleFlag operator GestureFlagsenum_type f1 int f2 QFlagsMouseEventFlagsenum_type operator MouseEventFlagsenum_type f1 MouseEventFlagsenum_type f2 QFlagsMouseEventFlagsenum_type operator MouseEventFlagsenum_type f1 QFlagsMouseEventFlagsenum_type f2 QIncompatibleFlag operator MouseEventFlagsenum_type f1 int f2 int operator int int QIncompatibleFlag operator KeyboardModifiersenum_type f1 int f2 QFlagsMouseButtonsenum_type operator MouseButtonsenum_type f1 MouseButtonsenum_type f2 QFlagsMouseButtonsenum_type operator MouseButtonsenum_type f1 QFlagsMouseButtonsenum_type f2 QIncompatibleFlag operator MouseButtonsenum_type f1 int f2 QFlagsOrientationsenum_type operator Orientationsenum_type f1 Orientationsenum_type f2 QFlagsOrientationsenum_type operator Orientationsenum_type f1 QFlagsOrientationsenum_type f2 QIncompatibleFlag operator Orientationsenum_type f1 int f2 QFlagsAlignmentenum_type operator Alignmentenum_type f1 Alignmentenum_type f2 QFlagsAlignmentenum_type operator Alignmentenum_type f1 QFlagsAlignmentenum_type f2 QIncompatibleFlag operator Alignmentenum_type f1 int f2 QFlagsWindowFlagsenum_type operator WindowFlagsenum_type f1 WindowFlagsenum_type f2 QFlagsWindowFlagsenum_type operator WindowFlagsenum_type f1 QFlagsWindowFlagsenum_type f2 QIncompatibleFlag operator WindowFlagsenum_type f1 int f2 QFlagsWindowStatesenum_type operator WindowStatesenum_type f1 WindowStatesenum_type f2 QFlagsWindowStatesenum_type operator WindowStatesenum_type f1 QFlagsWindowStatesenum_type f2 QIncompatibleFlag operator WindowStatesenum_type f1 int f2 QFlagsScreenOrientationsenum_type operator ScreenOrientationsenum_type f1 ScreenOrientationsenum_type f2 QFlagsScreenOrientationsenum_type operator ScreenOrientationsenum_type f1 QFlagsScreenOrientationsenum_type f2 QIncompatibleFlag operator ScreenOrientationsenum_type f1 int f2 QFlagsImageConversionFlagsenum_type operator ImageConversionFlagsenum_type f1 ImageConversionFlagsenum_type f2 QFlagsImageConversionFlagsenum_type operator ImageConversionFlagsenum_type f1 QFlagsImageConversionFlagsenum_type f2 QIncompatibleFlag operator ImageConversionFlagsenum_type f1 int f2 QFlagsDockWidgetAreasenum_type operator DockWidgetAreasenum_type f1 DockWidgetAreasenum_type f2 QFlagsDockWidgetAreasenum_type operator DockWidgetAreasenum_type f1 QFlagsDockWidgetAreasenum_type f2 QIncompatibleFlag operator DockWidgetAreasenum_type f1 int f2 QFlagsToolBarAreasenum_type operator ToolBarAreasenum_type f1 ToolBarAreasenum_type f2 QFlagsToolBarAreasenum_type operator ToolBarAreasenum_type f1 QFlagsToolBarAreasenum_type f2 QIncompatibleFlag operator ToolBarAreasenum_type f1 int f2 QFlagsEdgesenum_type operator Edgesenum_type f1 Edgesenum_type f2 QFlagsEdgesenum_type operator Edgesenum_type f1 QFlagsEdgesenum_type f2 QIncompatibleFlag operator Edgesenum_type f1 int f2 QFlagsInputMethodQueriesenum_type operator InputMethodQueriesenum_type f1 InputMethodQueriesenum_type f2 QFlagsInputMethodQueriesenum_type operator InputMethodQueriesenum_type f1 QFlagsInputMethodQueriesenum_type f2 QIncompatibleFlag operator InputMethodQueriesenum_type f1 int f2 Detailed Description The Qt namespace contains miscellaneous identifiers used throughout the Qt library Type Documentation enum Qt AlignmentFlag flags Qt Alignment This enum type is used to describe alignment It contains horizontal and vertical flags that can be combined to produce the required effect The TextElideMode enum can also be used in many situations to finetune the appearance of aligned text The horizontal flags are Constant Value Description QtAlignLeft 0x0001 Aligns with the left edge QtAlignRight 0x0002 Aligns with the right edge QtAlignHCenter 0x0004 Centers horizontally in the available space QtAlignJustify 0x0008 Justifies the text in the available space The vertical flags are Constant Value Description QtAlignTop 0x0020 Aligns with the top QtAlignBottom 0x0040 Aligns with the bottom QtAlignVCenter 0x0080 Centers vertically in the available space QtAlignBaseline 0x0100 Aligns with the baseline You can use only one of the horizontal flags at a time There is one twodimensional flag Constant Value Description QtAlignCenter AlignVCenter AlignHCenter Centers in both dimensions You can use at most one horizontal and one vertical flag at a time QtAlignCenter counts as both horizontal and vertical Three enum values are useful in applications that can be run in righttoleft mode Constant Value Description QtAlignAbsolute 0x0010 If the widgets layout direction is QtRightToLeft instead of QtLeftToRight the default QtAlignLeft refers to the right edge and QtAlignRight to the left edge This is normally the desired behavior If you want QtAlignLeft to always mean left and QtAlignRight to always mean right combine the flag with QtAlignAbsolute QtAlignLeading AlignLeft Synonym for QtAlignLeft QtAlignTrailing AlignRight Synonym for QtAlignRight Masks Constant Value QtAlignHorizontal_Mask AlignLeft AlignRight AlignHCenter AlignJustify AlignAbsolute QtAlignVertical_Mask AlignTop AlignBottom AlignVCenter AlignBaseline Conflicting combinations of flags have undefined meanings The Alignment type is a typedef for QFlags AlignmentFlag It stores an OR combination of AlignmentFlag values enum Qt AnchorPoint Specifies a side of a layout item that can be anchored This is used by QGraphicsAnchorLayout Constant Value Description QtAnchorLeft 0 The left side of a layout item QtAnchorHorizontalCenter 1 A virtual side that is centered between the left and the right side of a layout item QtAnchorRight 2 The right side of a layout item QtAnchorTop 3 The top side of a layout item QtAnchorVerticalCenter 4 A virtual side that is centered between the top and the bottom side of a layout item QtAnchorBottom 5 The bottom side of a layout item See also QGraphicsAnchorLayout enum Qt ApplicationAttribute This enum describes attributes that change the behavior of applicationwide features These are enabled and disabled using QCoreApplicationsetAttribute and can be tested for with QCoreApplicationtestAttribute Constant Value Description QtAA_DontShowIconsInMenus 2 Actions with the Icon property wont be shown in any menus unless specifically set by the QActioniconVisibleInMenu property Menus that are currently open or menus already created in the native macOS menubar may not pick up a change in this attribute Changes in the QActioniconVisibleInMenu property will always be picked up QtAA_DontShowShortcutsInContextMenus 28 Actions with the Shortcut property wont be shown in any shortcut menus unless specifically set by the QActionshortcutVisibleInContextMenu property This value was added in Qt 510 QtAA_NativeWindows 3 Ensures that widgets have native windows QtAA_DontCreateNativeWidgetSiblings 4 Ensures that siblings of native widgets stay nonnative unless specifically set by the QtWA_NativeWindow attribute QtAA_PluginApplication 5 Indicates that Qt is used to author a plugin Depending on the operating system it suppresses specific initializations that do not necessarily make sense in the plugin case For example on macOS this includes avoiding loading our nib for the main menu and not taking possession of the native menu bar Setting this attribute to true will also set the AA_DontUseNativeMenuBar attribute to true It also disables native event filters This attribute must be set before QGuiApplication constructed This value was added in Qt 57 QtAA_DontUseNativeMenuBar 6 All menubars created while this attribute is set to true wont be used as a native menubar eg the menubar at the top of the main screen on macOS QtAA_MacDontSwapCtrlAndMeta 7 On macOS by default Qt swaps the Control and Meta Command keys ie whenever Control is pressed Qt sends Meta and whenever Meta is pressed Control is sent When this attribute is true Qt will not do the flip QKeySequenceStandardKey will also flip accordingly ie QKeySequenceCopy will be CommandC on the keyboard regardless of the value set though what is output for QKeySequencetoString will be different QtAA_Use96Dpi 8 Assume the screen has a resolution of 96 DPI rather than using the OSprovided resolution This will cause font rendering to be consistent in pixelsperpoint across devices rather than defining 1 point as 172 inch QtAA_SynthesizeTouchForUnhandledMouseEvents 11 All mouse events that are not accepted by the application will be translated to touch events instead QtAA_SynthesizeMouseForUnhandledTouchEvents 12 All touch events that are not accepted by the application will be translated to left button mouse events instead This attribute is enabled by default QtAA_UseHighDpiPixmaps 13 Make QIconpixmap generate highdpi pixmaps that can be larger than the requested size Such pixmaps will have devicePixelRatio set to a value higher than 1 After setting this attribute application code that uses pixmap sizes in layout geometry calculations should typically divide by devicePixelRatio to get deviceindependent layout geometry QtAA_ForceRasterWidgets 14 Make toplevel widgets use pure raster surfaces and do not support nonnative GLbased child widgets QtAA_UseDesktopOpenGL Forces the usage of desktop OpenGL for example opengl32dll or libGLso on platforms that use dynamic loading of the OpenGL implementation This attribute must be set before QGuiApplication is constructed This value was added in Qt 53 QtAA_UseOpenGLES 16 Forces the usage of OpenGL ES 20 or higher on platforms that use dynamic loading of the OpenGL implementation This attribute must be set before QGuiApplication is constructed This value was added in Qt 53 QtAA_UseSoftwareOpenGL 17 Forces the usage of a software based OpenGL implementation on platforms that use dynamic loading of the OpenGL implementation This will typically be a patched build of Mesa llvmpipe providing OpenGL 21 The value may have no effect if no such OpenGL implementation is available The default name of this library is opengl32swdll and can be overridden by setting the environment variable QT_OPENGL_DLL See the platformspecific pages for instance Qt for Windows for more information This attribute must be set before QGuiApplication is constructed This value was added in Qt 54 QtAA_ShareOpenGLContexts 18 Enables resource sharing between the OpenGL contexts used by classes like QOpenGLWidget and QQuickWidget This allows sharing OpenGL resources like textures between QOpenGLWidget instances that belong to different toplevel windows This attribute must be set before QGuiApplication is constructed This value was added in Qt 54 QtAA_SetPalette 19 Indicates whether a palette was explicitly set on the QGuiApplication This value was added in Qt 55 QtAA_EnableHighDpiScaling 20 Enables highDPI scaling in Qt on supported platforms see also High DPI Displays Supported platforms are X11 Windows and Android Enabling makes Qt scale the main device independent coordinate system according to display scale factors provided by the operating system This corresponds to setting the QT_AUTO_SCREEN_SCALE_FACTOR environment variable to 1 This attribute must be set before QGuiApplication is constructed This value was added in Qt 56 QtAA_DisableHighDpiScaling 21 Disables highDPI scaling in Qt exposing window system coordinates Note that the window system may do its own scaling so this does not guarantee that QPaintDevicedevicePixelRatio will be equal to 1 In addition scale factors set by QT_SCALE_FACTOR will not be affected This corresponds to setting the QT_AUTO_SCREEN_SCALE_FACTOR environment variable to 0 This attribute must be set before QGuiApplication is constructed This value was added in Qt 56 QtAA_UseStyleSheetPropagationInWidgetStyles 22 By default Qt Style Sheets disable regular QWidget palette and font propagation When this flag is enabled font and palette changes propagate as though the user had manually called the corresponding QWidget methods See The Style Sheet Syntax Inheritance for more details This value was added in Qt 57 QtAA_DontUseNativeDialogs 23 All dialogs created while this attribute is set to true wont use the native dialogs provided by the platform This value was added in Qt 57 QtAA_SynthesizeMouseForUnhandledTabletEvents 24 All tablet events that are not accepted by the application will be translated to mouse events instead This attribute is enabled by default This value was added in Qt 57 QtAA_CompressHighFrequencyEvents Enables compression of certain frequent events On the X11 windowing system the default value is true which means that QEventMouseMove QEventTouchUpdate and changes in window size and position will be combined whenever they occur more frequently than the application handles them so that they dont accumulate and overwhelm the application later On Windows 8 and above the default value is also true but it only applies to touch events Mouse and window events remain unaffected by this flag On other platforms the default is false In the future the compression feature may be implemented across platforms You can test the attribute to see whether compression is enabled If your application needs to handle all events with no compression you can unset QtAA_CompressTabletEvents 29 Enables compression of input events from tablet devices Notice that AA_CompressHighFrequencyEvents must be true for events compression to be enabled and that this flag extends the former to tablet events Currently supported on the X11 windowing system Windows 8 and above The default value is false This value was added in Qt 510 QtAA_DontCheckOpenGLContextThreadAffinity 26 When making a context current using QOpenGLContext do not check that the QObject thread affinity of the QOpenGLContext object is the same thread calling makeCurrent This value was added in Qt 58 QtAA_DisableShaderDiskCache 27 Disables caching of shader program binaries on disk By default Qt Quick QPainter s OpenGL backend and any application using QOpenGLShaderProgram with one of its addCacheableShaderFromSource overloads will employ a diskbased program binary cache in either the shared or perprocess cache storage location on systems that support glProgramBinary In the unlikely event of this being problematic set this attribute to disable all diskbased caching of shaders QtAA_DisableWindowContextHelpButton 30 Disables the WindowContextHelpButtonHint by default on QtSheet and QtDialog widgets This hides the button on Windows which only makes sense if you use QWhatsThis functionality This value was added in Qt 510 In Qt 6 WindowContextHelpButtonHint will not be set by default The following values are deprecated or obsolete Constant Value Description QtAA_ImmediateWidgetCreation 0 This attribute is no longer fully supported in Qt 5 It ensures that widgets are created as soon as they are constructed By default resources for widgets are allocated on demand to improve efficiency and minimize resource usage Setting or clearing this attribute affects widgets constructed after the change Setting it tells Qt to create toplevel windows immediately Therefore if it is important to minimize resource consumption do not set this attribute QtAA_MacPluginApplication AA_PluginApplication This attribute has been deprecated Use AA_PluginApplication instead QtAA_MSWindowsUseDirect3DByDefault 1 This value is obsolete and has no effect QtAA_X11InitThreads 10 This value is obsolete and has no effect enum Qt ApplicationState flags Qt ApplicationStates This enum type is used to specify the current state of the application The states are Constant Value Description QtApplicationSuspended The application is about to suspend When entering this state the application should save its state cease all activities and be prepared for code execution to stop While suspended the application can be killed at any time without further warnings eg when low memory forces the OS to purge suspended applications QtApplicationHidden 0x00000001 The application is hidden and runs in the background This is the normal state for applications that need to do background processing like playing music while the user interacts with other applications The application should free up all graphical resources when entering this state QtApplicationInactive The application is visible but not selected to be in front On desktop platforms this typically means that the user activated another application On mobile platforms it is more common to enter this state when the OS is interrupting the user with eg incoming calls or SMSmessages While in this state consider reducing CPUintensive tasks QtApplicationActive 0x00000004 The application is visible and selected to be in front This enum was introduced or modified in Qt 51 The ApplicationStates type is a typedef for QFlags ApplicationState It stores an OR combination of ApplicationState values enum Qt ArrowType Constant Value QtNoArrow 0 QtUpArrow 1 QtDownArrow 2 QtLeftArrow 3 QtRightArrow 4 enum Qt AspectRatioMode This enum type defines what happens to the aspect ratio when scaling an rectangle Constant Value Description QtIgnoreAspectRatio 0 The size is scaled freely The aspect ratio is not preserved QtKeepAspectRatio 1 The size is scaled to a rectangle as large as possible inside a given rectangle preserving the aspect ratio QtKeepAspectRatioByExpanding 2 The size is scaled to a rectangle as small as possible outside a given rectangle preserving the aspect ratio See also QSizescale and QImagescaled enum Qt Axis This enum type defines three values to represent the three axes in the cartesian coordinate system Constant Value Description QtXAxis 0 The X axis QtYAxis 1 The Y axis QtZAxis 2 The Z axis See also QTransformrotate and QTransformrotateRadians enum Qt BGMode Background mode Constant Value QtTransparentMode 0 QtOpaqueMode 1 enum Qt BrushStyle This enum type defines the brush styles supported by Qt ie the fill pattern of shapes drawn using QPainter Constant Value Description QtNoBrush 0 No brush pattern QtSolidPattern 1 Uniform color QtDense1Pattern 2 Extremely dense brush pattern QtDense2Pattern 3 Very dense brush pattern QtDense3Pattern 4 Somewhat dense brush pattern QtDense4Pattern 5 Half dense brush pattern QtDense5Pattern 6 Somewhat sparse brush pattern QtDense6Pattern 7 Very sparse brush pattern QtDense7Pattern 8 Extremely sparse brush pattern QtHorPattern 9 Horizontal lines QtVerPattern 10 Vertical lines QtCrossPattern 11 Crossing horizontal and vertical lines QtBDiagPattern 12 Backward diagonal lines QtFDiagPattern 13 Forward diagonal lines QtDiagCrossPattern 14 Crossing diagonal lines QtLinearGradientPattern 15 Linear gradient set using a dedicated QBrush constructor QtConicalGradientPattern 17 Conical gradient set using a dedicated QBrush constructor QtRadialGradientPattern 16 Radial gradient set using a dedicated QBrush constructor QtTexturePattern 24 Custom pattern see QBrushsetTexture See also QBrush enum Qt CaseSensitivity Constant Value QtCaseInsensitive 0 QtCaseSensitive 1 enum Qt CheckState This enum describes the state of checkable items controls and widgets Constant Value Description QtUnchecked 0 The item is unchecked QtPartiallyChecked 1 The item is partially checked Items in hierarchical models may be partially checked if some but not all of their children are checked QtChecked 2 The item is checked See also QCheckBox QtItemFlags and QtItemDataRole enum Qt ChecksumType This enum describes the possible standards used by qChecksum Constant Value Description QtChecksumIso3309 0 Checksum calculation based on ISO 3309 QtChecksumItuV41 1 Checksum calculation based on ITUV41 This enum was introduced or modified in Qt 59 enum Qt ClipOperation Constant Value Description QtNoClip 0 This operation turns clipping off QtReplaceClip 1 Replaces the current clip pathrectregion with the one supplied in the function call QtIntersectClip 2 Intersects the current clip pathrectregion with the one supplied in the function call enum Qt ConnectionType This enum describes the types of connection that can be used between signals and slots In particular it determines whether a particular signal is delivered to a slot immediately or queued for delivery at a later time Constant Value Description QtAutoConnection 0 Default If the receiver lives in the thread that emits the signal QtDirectConnection is used Otherwise QtQueuedConnection is used The connection type is determined when the signal is emitted QtDirectConnection 1 The slot is invoked immediately when the signal is emitted The slot is executed in the signalling thread QtQueuedConnection 2 The slot is invoked when control returns to the event loop of the receivers thread The slot is executed in the receivers thread QtBlockingQueuedConnection 3 Same as QtQueuedConnection except that the signalling thread blocks until the slot returns This connection must not be used if the receiver lives in the signalling thread or else the application will deadlock QtUniqueConnection 0x80 This is a flag that can be combined with any one of the above connection types using a bitwise OR When QtUniqueConnection is set QObjectconnect will fail if the connection already exists ie if the same signal is already connected to the same slot for the same pair of objects This flag was introduced in Qt 46 With queued connections the parameters must be of types that are known to Qts metaobject system because Qt needs to copy the arguments to store them in an event behind the scenes If you try to use a queued connection and get the error message QObject Can not queue arguments of type MyType Call qRegisterMetaType to register the data type before you establish the connection When using signals and slots with multiple threads see Signals and Slots Across Threads See also Thread Support in Qt QObjectconnect qRegisterMetaType and Q_DECLARE_METATYPE enum Qt ContextMenuPolicy This enum type defines the various policies a widget can have with respect to showing a context menu Constant Value Description QtNoContextMenu 0 the widget does not feature a context menu context menu handling is deferred to the widgets parent QtPreventContextMenu 4 the widget does not feature a context menu and in contrast to NoContextMenu the handling is not deferred to the widgets parent This means that all right mouse button events are guaranteed to be delivered to the widget itself through QWidgetmousePressEvent and QWidgetmouseReleaseEvent QtDefaultContextMenu 1 the widgets QWidgetcontextMenuEvent handler is called QtActionsContextMenu 2 the widget displays its QWidgetactions as context menu QtCustomContextMenu 3 the widget emits the QWidgetcustomContextMenuRequested signal enum Qt CoordinateSystem This enum specifies the coordinate system Constant Value Description QtDeviceCoordinates 0 Coordinates are relative to the topleft corner of the objects paint device QtLogicalCoordinates 1 Coordinates are relative to the topleft corner of the object This enum was introduced or modified in Qt 46 enum Qt Corner This enum type specifies a corner in a rectangle Constant Value Description QtTopLeftCorner 0x00000 The topleft corner of the rectangle QtTopRightCorner 0x00001 The topright corner of the rectangle QtBottomLeftCorner 0x00002 The bottomleft corner of the rectangle QtBottomRightCorner 0x00003 The bottomright corner of the rectangle enum Qt CursorMoveStyle This enum describes the movement style available to text cursors The options are Constant Value Description QtLogicalMoveStyle 0 Within a lefttoright text block decrease cursor position when pressing left arrow key increase cursor position when pressing the right arrow key If the text block is righttoleft the opposite behavior applies QtVisualMoveStyle 1 Pressing the left arrow key will always cause the cursor to move left regardless of the texts writing direction Pressing the right arrow key will always cause the cursor to move right enum Qt CursorShape This enum type defines the various cursors that can be used The standard arrow cursor is the default for widgets in a normal state Constant Value Description QtArrowCursor 0 The standard arrow cursor QtUpArrowCursor 1 An arrow pointing upwards toward the top of the screen QtCrossCursor 2 A crosshair cursor typically used to help the user accurately select a point on the screen QtWaitCursor 3 An hourglass or watch cursor usually shown during operations that prevent the user from interacting with the application QtIBeamCursor 4 A caret or ibeam cursor indicating that a widget can accept and display text input QtSizeVerCursor 5 A cursor used for elements that are used to vertically resize toplevel windows QtSizeHorCursor 6 A cursor used for elements that are used to horizontally resize toplevel windows QtSizeBDiagCursor 7 A cursor used for elements that are used to diagonally resize toplevel windows at their topright and bottomleft corners QtSizeFDiagCursor 8 A cursor used for elements that are used to diagonally resize toplevel windows at their topleft and bottomright corners QtSizeAllCursor 9 A cursor used for elements that are used to resize toplevel windows in any direction QtBlankCursor 10 A blankinvisible cursor typically used when the cursor shape needs to be hidden QtSplitVCursor 11 A cursor used for vertical splitters indicating that a handle can be dragged horizontally to adjust the use of available space QtSplitHCursor 12 A cursor used for horizontal splitters indicating that a handle can be dragged vertically to adjust the use of available space QtPointingHandCursor 13 A pointing hand cursor that is typically used for clickable elements such as hyperlinks QtForbiddenCursor 14 A slashed circle cursor typically used during drag and drop operations to indicate that dragged content can not be dropped on particular widgets or inside certain regions QtOpenHandCursor 17 A cursor representing an open hand typically used to indicate that the area under the cursor is the visible part of a canvas that the user can click and drag in order to scroll around QtClosedHandCursor 18 A cursor representing a closed hand typically used to indicate that a dragging operation is in progress that involves scrolling QtWhatsThisCursor 15 An arrow with a question mark typically used to indicate the presence of Whats This help for a widget QtBusyCursor 16 An hourglass or watch cursor usually shown during operations that allow the user to interact with the application while they are performed in the background QtDragMoveCursor 20 A cursor that is usually used when dragging an item QtDragCopyCursor 19 A cursor that is usually used when dragging an item to copy it QtDragLinkCursor 21 A cursor that is usually used when dragging an item to make a link to it QtBitmapCursor 24 enum Qt DateFormat Constant Value Description QtTextDate 0 The default Qt format which includes the day and month name the day number in the month and the year in full The day and month names will be short localized names This is basically equivalent to using the date format string ddd MMM d yyyy See QDatetoString for more information QtISODate 1 ISO 8601 extended format either yyyyMMdd for dates or yyyyMMddTHHmmss eg 20170724T154629 or with a timezone suffix Z for UTC otherwise an offset as HHmm where appropriate for combined dates and times QtISODateWithMs 9 ISO 8601 extended format including milliseconds if applicable QtSystemLocaleShortDate 4 The short format used by the operating system QtSystemLocaleLongDate 5 The long format used by the operating system QtDefaultLocaleShortDate 6 The short format specified by the applications locale QtDefaultLocaleLongDate 7 The long format used by the applications locale QtSystemLocaleDate 2 This enum value is deprecated Use QtSystemLocaleShortDate instead or QtSystemLocaleLongDate if you want long dates QtLocaleDate 3 This enum value is deprecated Use QtDefaultLocaleShortDate instead or QtDefaultLocaleLongDate if you want long dates QtLocalDate SystemLocaleDate This enum value is deprecated Use QtSystemLocaleShortDate instead or QtSystemLocaleLongDate if you want long dates QtRFC2822Date 8 RFC 2822 RFC 850 and RFC 1036 format either ddd dd MMM yyyy hhmmss TZ or ddd MMM dd yyyy hhmmss TZ for combined dates and times Note For ISODate formats each Y M and D represents a single digit of the year month and day used to specify the date Each H M and S represents a single digit of the hour minute and second used to specify the time The presence of a literal T character is used to separate the date and time when both are specified enum Qt DayOfWeek Constant Value QtMonday 1 QtTuesday 2 QtWednesday 3 QtThursday 4 QtFriday 5 QtSaturday 6 QtSunday 7 enum Qt DockWidgetArea flags Qt DockWidgetAreas Constant Value QtLeftDockWidgetArea 0x1 QtRightDockWidgetArea 0x2 QtTopDockWidgetArea 0x4 QtBottomDockWidgetArea 0x8 QtAllDockWidgetAreas DockWidgetArea_Mask QtNoDockWidgetArea 0 The DockWidgetAreas type is a typedef for QFlags DockWidgetArea It stores an OR combination of DockWidgetArea values enum Qt DropAction flags Qt DropActions Constant Value Description QtCopyAction 0x1 Copy the data to the target QtMoveAction 0x2 Move the data from the source to the target QtLinkAction 0x4 Create a link from the source to the target QtActionMask 0xff QtIgnoreAction 0x0 Ignore the action do nothing with the data QtTargetMoveAction 0x8002 On Windows this value is used when the ownership of the DD data should be taken over by the target application ie the source application should not delete the data On X11 this value is used to do a move TargetMoveAction is not used on the Mac The DropActions type is a typedef for QFlags DropAction It stores an OR combination of DropAction values enum Qt Edge flags Qt Edges This enum type specifies an edge in a rectangle Constant Value Description QtTopEdge 0x00001 The top edge of the rectangle QtLeftEdge 0x00002 The left edge of the rectangle QtRightEdge 0x00004 The right edge of the rectangle QtBottomEdge 0x00008 The bottom edge of the rectangle This enum was introduced or modified in Qt 51 The Edges type is a typedef for QFlags Edge It stores an OR combination of Edge values enum Qt EnterKeyType This can be used to alter the appearance of the Return key on an onscreen keyboard Note Not all of these values are supported on all platforms For unsupported values the default key will be used instead Constant Value Description QtEnterKeyDefault 0 The default Enter key This can either be a button closing the keyboard or a Return button causing a new line in case of a multiline input field QtEnterKeyReturn 1 Show a Return button that inserts a new line The keyboard will not close when this button is pressed QtEnterKeyDone 2 Show a Done button The keyboard will close when this button is pressed QtEnterKeyGo 3 Show a Go button Typically used in an address bar when entering a URL the keyboard will close when this button is pressed QtEnterKeySend 4 Show a Send button The keyboard will close when this button is pressed QtEnterKeySearch 5 Show a Search button The keyboard will close when this button is pressed QtEnterKeyNext 6 Show a Next button Typically used in a form to allow navigating to the next input field the keyboard will not close when this button is pressed QtEnterKeyPrevious 7 Show a Previous button The keyboard will not close when this button is pressed This enum was introduced or modified in Qt 56 enum Qt EventPriority This enum can be used to specify event priorities Constant Value Description QtHighEventPriority 1 Events with this priority are sent before events with NormalEventPriority or LowEventPriority QtNormalEventPriority 0 Events with this priority are sent after events with HighEventPriority but before events with LowEventPriority QtLowEventPriority 1 Events with this priority are sent after events with HighEventPriority or NormalEventPriority Note that these values are provided purely for convenience since event priorities can be any value between INT_MAX and INT_MIN inclusive For example you can define custom priorities as being relative to each other enum CustomEventPriority An important event ImportantEventPriority Qt HighEventPriority A more important event MoreImportantEventPriority ImportantEventPriority 1 A critical event CriticalEventPriority 100 MoreImportantEventPriority Not that important StatusEventPriority Qt LowEventPriority These are less important than Status events IdleProcessingDoneEventPriority StatusEventPriority 1 See also QCoreApplicationpostEvent enum Qt FillRule Specifies which method should be used to fill the paths and polygons Constant Value Description QtOddEvenFill 0 Specifies that the region is filled using the odd even fill rule With this rule we determine whether a point is inside the shape by using the following method Draw a horizontal line from the point to a location outside the shape and count the number of intersections If the number of intersections is an odd number the point is inside the shape This mode is the default QtWindingFill 1 Specifies that the region is filled using the non zero winding rule With this rule we determine whether a point is inside the shape by using the following method Draw a horizontal line from the point to a location outside the shape Determine whether the direction of the line at each intersection point is up or down The winding number is determined by summing the direction of each intersection If the number is non zero the point is inside the shape This fill mode can also in most cases be considered as the intersection of closed shapes enum Qt FindChildOption flags Qt FindChildOptions Constant Value Description QtFindDirectChildrenOnly 0x0 Looks only at the direct children of the object QtFindChildrenRecursively 0x1 Looks at all children of the object recursive search The FindChildOptions type is a typedef for QFlags FindChildOption It stores an OR combination of FindChildOption values enum Qt FocusPolicy This enum type defines the various policies a widget can have with respect to acquiring keyboard focus Constant Value Description QtTabFocus 0x1 the widget accepts focus by tabbing QtClickFocus 0x2 the widget accepts focus by clicking QtStrongFocus TabFocus ClickFocus 0x8 the widget accepts focus by both tabbing and clicking On macOS this will also be indicate that the widget accepts tab focus when in TextList focus mode QtWheelFocus StrongFocus 0x4 like QtStrongFocus plus the widget accepts focus by using the mouse wheel QtNoFocus 0 the widget does not accept focus enum Qt FocusReason This enum specifies why the focus changed It will be passed through QWidgetsetFocus and can be retrieved in the QFocusEvent sent to the widget upon focus change Constant Value Description QtMouseFocusReason 0 A mouse action occurred QtTabFocusReason 1 The Tab key was pressed QtBacktabFocusReason 2 A Backtab occurred The input for this may include the Shift or Control keys eg ShiftTab QtActiveWindowFocusReason 3 The window system made this window either active or inactive QtPopupFocusReason 4 The application openedclosed a popup that grabbedreleased the keyboard focus QtShortcutFocusReason 5 The user typed a labels buddy shortcut QtMenuBarFocusReason 6 The menu bar took focus QtOtherFocusReason 7 Another reason usually applicationspecific See also Keyboard Focus in Widgets enum Qt GestureFlag flags Qt GestureFlags This enum type describes additional flags that can be used when subscribing to a gesture Constant Value Description QtDontStartGestureOnChildren 0x01 By default gestures can start on the widget or over any of its children Use this flag to disable this and allow a gesture to start on the widget only QtReceivePartialGestures 0x02 Allows any ignored gesture events to be propagated to parent widgets which have specified this hint By default only gestures that are in the QtGestureStarted state are propagated and the widget always gets the full gesture sequence starting with a gesture in the QtGestureStarted state and ending with a gesture in the QtGestureFinished or QtGestureCanceled states QtIgnoredGesturesPropagateToParent 0x04 Since Qt 47 this flag allows you to finetune gesture event propagation By setting the flag when grabbing a gesture all ignored partial gestures will propagate to their parent items This enum was introduced or modified in Qt 46 The GestureFlags type is a typedef for QFlags GestureFlag It stores an OR combination of GestureFlag values See also QWidgetgrabGesture and QGraphicsObjectgrabGesture enum Qt GestureState This enum type describes the state of a gesture Constant Value Description QtNoGesture 0 No gesture has been detected QtGestureStarted 1 A continuous gesture has started QtGestureUpdated 2 A gesture continues QtGestureFinished 3 A gesture has finished QtGestureCanceled 4 A gesture was canceled This enum was introduced or modified in Qt 46 See also QGesture enum Qt GestureType This enum type describes the standard gestures Constant Value Description QtTapGesture 1 A Tap gesture QtTapAndHoldGesture 2 A TapAndHold LongTap gesture QtPanGesture 3 A Pan gesture QtPinchGesture 4 A Pinch gesture QtSwipeGesture 5 A Swipe gesture QtCustomGesture 0x0100 A flag that can be used to test if the gesture is a userdefined gesture ID Userdefined gestures are registered with the QGestureRecognizerregisterRecognizer function which generates a custom gesture ID with the QtCustomGesture flag set This enum was introduced or modified in Qt 46 See also QGesture QWidgetgrabGesture and QGraphicsObjectgrabGesture enum Qt GlobalColor Qts predefined QColor objects Constant Value Description Qtwhite 3 White ffffff Qtblack 2 Black 000000 Qtred 7 Red ff0000 QtdarkRed 13 Dark red 800000 Qtgreen 8 Green 00ff00 QtdarkGreen 14 Dark green 008000 Qtblue 9 Blue 0000ff QtdarkBlue 15 Dark blue 000080 Qtcyan 10 Cyan 00ffff QtdarkCyan 16 Dark cyan 008080 Qtmagenta 11 Magenta ff00ff QtdarkMagenta 17 Dark magenta 800080 Qtyellow 12
[ "Qt Namespace" ]
http://doc.sd.gov/adult/lookup/
Adult Corrections Offender Locator Search Criteria Please enter your search criteria into one or more of the following fields DOC Ex 987654 Last Name Ex Doe First Name Ex John Verification Code Disclaimer This database contains public information on felony offenders sentenced to the Department of Corrections This information includes South Dakota offenders sentenced to prison Information on offenders sentenced to county jail probation or any other form of supervision is not included The information is derived from court records provided to the Department of Corrections and Department of Corrections records and is made available as a public service The Department of Corrections makes no guarantee as to the accuracy or completeness of the information Any person who believes information provided is not accurate may contact the Department of Corrections at 6053675190 or Neither the Department of Corrections its officers or employees nor the State of South Dakota assume any liability for the accuracy of information contained herein
[ "Department of Corrections", "probation" ]
http://dockstop.ca/
Welcome to dockstop Alberta ' s premier source for docks , boatlifts , marinas , and more Canada ’ s largest dealer of Starr Docks & Lifts and Hewitt Boat Lifts & Docks product lines . Starr Docks & Lifts Docks & Piers are our specialty . Whether you are looking for a stationary dock roll - in &rolling wheel dock , or a floating sectional dock , we have got exactly the pier to meet your needs . Hewitt Docks , Lifts & Pontoon Legs For over 40 years , boat and watercraft owners have trusted the safety and longevity of their investments to Hewitt boat lifts and docks . We are more than confident that you will find the quality , workmanship , and design of all Hewitt products to be the industry ’ s finest . Boat Lift Helper Want an easy way to move your boat lift for installation and removal ? Let the Boat Lift Helper simplify the task ! Complete support for all your recreation needs From the initial consultation , to design , supply , installation and maintenance , there is not a single aspect we do not have covered . Whether you require a single slip dock or lift , or a fully serviced marina with hundreds of slips , DockStop has a solution for you . And because we are the premier Hewitt dealer in Canada , you are also getting over 40 years of Hewitt ’ s expertise and refinement in the marine industry . From our Calgary based office we can provide sales and service all over western Canada . We do n ’ t just sell you docks , marinas and boat lifts , we provide you a complete lakeside solution for all of your on waterfront needs . No job too big or too small ! We ' ve installed thousands of docks and lifts throughout Alberta , BC , and Saskatchewan . DockStop is your source for the marine industry ’ s benchmark in dock and lift design and manufacturing . We here at DockStop place the same attention to detail and workmanship into every project we build . We stand behind our products with a 15 year warranty ( excluding floating docks ) to complete the highest level of service you will receive in the marine dock and lift industry . Thanks for stopping at DockStop … Please feel free to contact us at anytime . We greatly value your business and we look forward to starting your dream project . Email or call us today with your questions or comments . E - mail : jim @ dockstop . ca Phone : 403 - 369 - 5219 Fax : 403 - 275 - 9496 Mailing Address : 261207 Valley View Road Calgary , Alberta T3P 1A2
[ "DOCKSTOP", "recreation need", "marine industry ’s" ]
http://dockstreetbrokers.com/listings.php?list_type=cat&catid=20
Dock Street Brokers Serving Northwest Fishermen Since 1976 Tuna Vessels 33 listings help Vessels 1 33 of 33 650000 TN18026 Tuna Year 1987 Length 54 Hull Fiberglass Builder Gooldrup Location Canada 54x18x8 fiberglass tuna freezer troller built by Gooldrup in 1987 Cummins KT19 rated at approx 400 hp Cummins 25kW genset 47000 lbs fish hold capacity Holding coils on deck and 4 blast freezers w Carrier H60 compressor Electric tuna jigs 6 fuel tanks w 3300 gallons fuel capacity Electronics include GPS VHF SSB 2 computers sounder inverter and Furuno 250 sonar Spacious galley w water maker electric heating shower fridge and 5 berths Asking 650000 CDN 235000 TN18025 Tuna Year 1991 Length 40 Hull Fiberglass Builder Lindell Location Washington 40x13x6 fiberglass combination crabbertrollgillnetter built by Lindell in 1991 Lugger 6108 rated at 330 hp w Twin Disc 507 gear Isuzu 3 cylinder aux w 10kW genset 5 insulated fish holds back 10k lbs salmon or 5k lbs crab Enclosed fly bridge and aluminum bait shed Crab block dump box Hasbra gurdies trolling poles gillnet reel and power roller 600 gallons combined fuel capacity in 2 tanks Electronics include SSB radar 3 GPS VHF plotter autopilot and many more Dickenson stove shower head 4 berths focsle heater and chest freezer Call for a survey Asking 235000 240000 TN18024 Tuna Year 1947 Length 48 Hull Wood Builder Sagstad Location Washington 48x128x67 wood crabbertroller built by Sagstad in 1947 total refit in 2012 Isuzu 3HK main rated at 300 hp and Twin Disc 509 gear new in 2012 20 kW Mitsubishi aux new in 2012 Packs 10000 crab in aluminum insert or 68 tons tuna New deck and aluminum bullwarks in 2012 Includes Warren Junes block Custom crab davit Kosltrand gurdies hayrack and aluminum trolling poles Electronics include GPS VHF SSB Furuno radar Koden sounder Garmin plotter ComNav autopilot and Faria VMS unit Includes OR 200 pot crab permit good to 50 and approximately 145 pots Turnkey package in excellent condition 398000 TN18023 Tuna Year 1948 Length 65 Hull Wood Builder Pacific Boat Builders Location Oregon 65x19x9 wood crabber built by Pacific Boat Builders in 1948 Cat 343 main engine rated at 320 hp with 150 hrs since rebuild Twin Disc 514 gear with 451 ratio 2700 gallons fuel capacity Makes 9 knots Isuzu 50 kW and 8 kW gensets Pack 80k salmon 45k crab in 2 insulated fish holds IMS 15 ton RSW unit on hatch Deck equipment includes a new 19 crab block and tuna pullers Electronics include 2 GPS 2 VHF 2 radars computer with Nobletec Furuno sounder and ComNav autopilot Very wellmaintained vessel Call for survey Asking 398000 295000 TN18022 Tuna Year 1975 Length 73 Hull Steel Builder CD Carnes Welding Service Location Oregon 73x18x11 combination crab tuna longline tender built in 1975 by CD Carnes in Morro Bay John Deere 6125 main rated at 400 hp New Twin Disc 514 gear with 41 ratio Isuzu 35 kW and Mitsubishi 42 kW gensets New dual blast freeze system on deck Packs approximately 75k of frozen product 125k salmon Removable shelter deck 8k gallons fuel capacity 2k gallons water New Simrad electronics package including radar sounder plotter and steering panel Comfortable accommodations comprised of 2 staterooms and 4 bunks forward Economical dependable vessel Asking 295000 400000 TN18021 Tuna Year 1980 Length 47 Hull Fiberglass Builder Frosad Location BC 47x15x8 fiberglass freezer troller built by Frostad in 1980 Cat 3406 w 1300 hours on the rebuild and a Twin Disc 509 gear East Hope gurdies tuna pullers jig machine and capstan 6 kW hydraulic generator Blast freezer on deck and holding plates in the hold Packs 37000 lbs in 1 insulated fish hold 4 fuel tanks w 2k gallons total capacity Electronics include GPS radar VHF sounder SSB ComNav autopilot and Wesmar sonar Diesel stove 3 berths full galley marine head and shower Asking 400000 CDN 575000 TN18020 Tuna Year 1947 Length 49 Hull Wood Builder Tacoma Boatyard Location Oregon 49x138x8 wood combination vessel rigged for crabtunasalmon Home built by Tacoma Boatyard shipwright in 1947 NH250 Cummins main rated at 250 hp rebuilt in 2017 Twin Disc 509 gear rebuilt in 2017 20kW Northern Light genset new in 2016 Fuel capacity of 1500 gallons in 3 tanks Packs 14000 crab in aluminum insert Includes complete deck equipment for crab salmon and tuna Electronics include Garmin GPS VHF radar sounder plotter and ComNav autopilot INCLUDES CAOR salmon permits 450 pot CA crab permit good to 54 Crab pots available Call for survey Asking 575000 195000 TN18019 Tuna Year 1978 Length 73 Hull Steel Builder Carroll Hoeppner Location Oregon 73x22x7 steel tuna troller built by Carroll Hoeppner in 1978 Twin Detroit 671 w 360 hp total Twin Disc gears w 451 ratio Isuzu 40 kW and 35 kW gensets Spray brine system freezes 4 tonsday Packs 50 tons in 1 insulated fish hold Lyons hydraulic fish pullers Electronics include sonar autopilot redundant radar VHF computer plotter and sonar Spacious galley 2 staterooms marine head and shower Asking 195000 195000 TN18018 Tuna Year 1949 Length 42 Hull Wood Builder Poulsbo Location California 42x123x68 wood troller rigged for crab albacore and black cod Built by Poulsbo in 1949 Detroit 671 main Fuel capacity of 500 gallons in 2 tanks Entirely new hydraulic system in 2018 Includes 2 custom inserts for the fish hold aluminum insert packs 5500 crab and insulated insert chills 4500 fish w RSW system Custom aluminum boom w Junes block Deck equipment is setup to quickly transition between fisheries Includes 175 pot CA crab permit with a baseline length of 44 5 Very well rigged boat with lots of recent upgrades Call for more information Asking 195000 610000 TN18017 Tuna Year 1996 Length 46 Hull Steel Builder MeyerFaulk Location Oregon 468x14x6 steel combination tunasalmoncrabber built in Nanaimo BC in 1996 Volvo TMD 120A Twin Disc 514 gear w 351 ratio Kubota 20kW genset 10 ton plate freezer Fiberglass fish hold packs 10 ton albacore salmon in slush and 10k lbs of crab w insert Aluminum house rigging and hay rack East Hope gurdies 17 Warren Junes block and tuna pullers Electronics include 3 GPS radar Sat phone VHF sounder computer camera monitoring and autopilot Comfortable galley 5 berths and head Includes OR 300 pot permit 300 38 pots gear OR and CA troll permits Call for a survey Asking 610000 198000 TN18016 Tuna Year 1951 Length 485 Hull Wood Builder Hansen Location Washington 485x135 wood combination trollerlongliner built by Hanson in 1951 John Deere 6090 AFM75 rated at 285 hp w Twin Disc 509 gear Kobota 125 kw gen set Insulated fish hold packs 25k lbs Aluminum shelter Longline drum 3 spool salmon gurdies and a 14 line hauler 2 fuel tanks hold 500 gallons combined Electronics include GPS radar sounder VHF inverter and autopilot 3 berths stove fridge and head Asking 198000 32000 TN18015 Tuna Length 22 Hull Wood Location Oregon 22x8x6 wood troller modeled after Learned Dory design Home built in 2005 and lightly used Volvo Penta 43 GXIEF main w fresh water exchanger rated at 225 hp w only 360 hours Volvo Penta SX outdrive Cruises at 25 kts 60 gallon fuel capacity Packs 1500 salmon Simplex gurdies and lots of salmon and tuna gear Complete Furuno electronics package including GPS radar sounder plotter with VHF and autopilot Well rigged day troller call for more info Asking 32000 425000 TN18014 Tuna Year 1947 Length 47 Hull Wood Builder Sagstad Location California 47x12767 wood combination vesselpermit package with significant upgrades including repower completely new hydraulic system and tankedinsulated hold Built by Sagstad in 1947 Volvo Penta MD9 w 300 hp and ZFW325 gear new in 2013 2 Honda EU generators 3kW and 2kW Fish hold packs 13000 crab and 8 tons of tuna SS crab davit and Junes block Hasbra 3spool gurdies 2 2 pacer pumps and aluminum boom Extensive electronics package INCLUDES CA 350 pot crab permit good to 502 max LOA and CA salmon permit Complete turnkey package call for more information Also available are 350 crab pots 38 and 675000 TN18013 Tuna Year 1977 Length 52 Hull Fiberglass Builder Little Hoquiam Location Oregon 52x16x8 Hoquiam schooner Seamaster hull built in 1977 Completely refitted in 2012 John Deere 6081AFM main rated at 260 hp low hours ZF325 gear w 441 ratio 40 kW and 9 kW Northern Lights gen sets 15 ton IMS brine system packs approximately 40000 of iced halibut Tankable Hatch mount blast freezer 1500 lb articulating deck crane Bow thruster installed in 2017 Very wellaccomodated quarters Electronics include 2 VHF GPS 2 radars plotter sounder satellite compass new sonar and ComNav autopilot Very clean boat suitable for cruising Call for survey and pictures Asking 675000 900000 TN18012 Tuna Year 1982 Length 45 Hull Steel Builder Martin Allen Location California 459x20x66 steel crabber built by Martin Allen in 1982 completely rebuilt and sponsoned in 2015 Detroit 8v71 rated at 300 hp rebuilt in 2015 Twin Disc MG 5111 Cummins 40kW genset w approx 2800 hrs Packs 22k crab 20 ton IMS blast freeze RSW unit Electronics include GPS VHF 2 sounders Garmin plotter ComNav 1001 autopilot and VMS unit SS davit Junes block Kolstrand gurdies and rigged for bait fishing tuna Includes replacement house freestanding mast and complete shipyard plans CA 400 pot crab permit INCLUDED good to 47 and never stretched Call for survey and more information Asking 900000 229000 TN18011 Tuna Year 1995 Length 60 Hull Aluminum Builder Rudolph Kapela Location Oregon 60x18x6 aluminum schooner rigged for salmon and tuna built by Rudolph Kapela in 1995 Twin Lugger L6414 mains each rated at 120 hp w Twin Disc 509 gear 4kW Isuzu auxiliary new in 2018 Packs 22 tons in aft hold and 10 tons in front Blast system in main hold and RSW w 2 Carrier compressors 2100 gal fuel capacity in 6 tanks Deck equipment includes 17 Junes SS crab block tuna and salmon gurdies 2 SS tuna haulers tuna chute deck boxes and associated gear Electronics include 5 VHF SSB 2 GPS 2 Raymarine radarplotter combos 2 sounder ComNav 55000 TN18009 Tuna Year 1944 Length 40 Hull Wood Builder John Group Location Washington 40x104x4 wood troller built 1944 in Oona River BC by John Group and has admeasure to fish legally in USA Ford Leman 2725E main w approx 7750 hrs Capital HY gear w 311 ratio Fuel capacity of 220 gallons in 2 tanks Packs 6000 lbs in fiberglass insulated fish hold 3spool Simplex gurdies Electronics include GPS VHF Furuno radar Furuno sounderplotter ComNav 1001 autopilot w remote and 1500 watt inverter Call for survey and list of recent upgrades Asking 55000 210000 TN18008 Tuna Year 1987 Length 54 Hull Fiberglass Builder Schoeppe and Aadsen Location Washington 54x156x6 fiberglass double ended troller custom built in 1987 Rebuilt Detroit 671 rated at 185 hp Twin Disc 509 2951 gear w trolling valve Mitsubishi 30 kw genset Packs 28000 lbs of blast frozen tuna NewThermo King compressor Completely new deck hydraulic system Stainless steel 5 spool tuna gurdies and 5 spool salmon gurdies 1800 gallon fuel capacity in 4 tanks 300 gallon water capacity Electronics include GPS 2 VHF SSB computer radar sounder plotter autopilot w remote 2 meter CB and inverter Includes OR salmon permit Price reduced to 210000 255000 TN18007 Tuna Year 1989 Length 46 Hull Aluminum Location Washington 46x15x59 aluminum combination vessel built by Bill Redding in 1989 Tier 2 John Deere 6068T main rated at 250 hp and ZF reduction gear Isuzu C240 w 20 kW Lima Mac generator 800 gallon fuel capacity in 2 tanks Setup to blast freeze with Carrier 056 compressor new 10 hp motor Fish hold packs 65 tons of frozen albacore 2 3spool Easthope gurdies Hydroslave line hauler and salmontroll gear Electronics include GPS VHF SSB radar Furuno sounder ComNav 2001 autopilot and Global Star satellite phone CA salmon permit included and OR salmon permit available Versatile boat with great history Call 30000 TN18006 Tuna Year 1974 Length 30 Hull Wood Builder Calkins Craft Location Oregon 30x10x30 woodfiberglass Monterey doubleender built by Calkins Craft in 1974 CAT 3160 main w 7300 hours rated at 200 hp Twin Disc MG 502 250 gallon fuel capacity in 2 tanks Fish hold packs 500 iced salmon Deck equipment includes 2 3spool hydraulic gurdies 2 galvanized trolling davits and additional salmontuna gear Electronics include GPS 2 VHF sounder and Wood Freeman autopilot OR salmon troll permit available Call for survey Asking 30000 49000 TN18004 Tuna Year 1980 Length 30 Hull Fiberglass Builder Wilson Boats Location California 30x105x4 fiberglass combination vessel built by Wilson in 1980 and rigged for multiple fisheries 210 hp Cummins main w 3700 hours Borg Warner T3 gear Cruises at 18 knots burning 5 gph top speed of 22 knots Packs 5000 lbs in fiberglass hold 12 Junes crab block and 300 gallon live well Electronics include GPS VHF radar sounder plotter and auto pilot Asking 49000 850000 TN18002 Tuna Year 1979 Length 50 Hull Steel Builder Monk Design Location California 50x15x85 steel combination vessel rigged for crab and tuna Monk design built by W Robertson in 1979 Cummins main rated at 325 hp Kubota 30 kW auxiliary 1800 gallon fuel capacity in 4 tanks 10 ton Spray Brine system w 5F30 Carrier compressor Capacity of 26000 crab in tanked hold Electronics include GPS 2 VHF SSB radar sounder computer and ComNav 1001 autopilot Includes deck equipment and gear for salmon and tuna 500 fully rigged crab pots CA 500 pot crab permit good to 50 CA and OR salmon troll permits Complete turnkey package with permits and gear Call for 750000 TN17012 Tuna Year 1977 Length 46 Hull Fiberglass Builder Little Hoquiam Location California 46x143 fiberglass combination crabtunatroller built by Little Hoquiam in 1977 Detroit 671 rated at 165 hp w Twin Disc 509 reduction gear Isuzu C240 10kw genset 1700 gallons fuel in 4 tanks Blast freezer w Carrier compressor Insulated fish hold packs 11k lbs of salmon Crab tank insert holds 7k lbs crab New Junes 19 crab block 350 Custom 38 pots fully rigged Electronics include GPS SSB sounder plotter VHF radar and autopilot Includes CA 350 pot good to 51 LOA CA and OR salmon permits Call for a survey Asking 750000 140000 TN17011 Tuna Year 1998 Length 58 Hull Steel Builder Fishing Boats Unlimited Location Oregon 58x20x65 steel tuna troller built in 1998 Cummins 855 BC main rated at 350 hp Twin Disc 514 gear w 61 ratio Isuzu 40 kw genset 3000 gallons water and 8000 gallon fuel capacity in 2 tanks Carrier blast freezer system w 5F60 compressor and 4 fan evaporator Packs 20 tons tuna in front hold Warren Junes tuna pullers extra gear and a new aluminum mast ready to install Electronics include 2 GPS 2 VHF SSB 2 radar sounder 2 plotters computer and surveillance system Owners retiring The boat is turnkey and ready to fish Reduced to 140000 offers encouraged 20000 TN17008 Tuna Length 50 Hull Wood Location Washington 50x128 wooden troller with Detroit 671 rated at 185 hp w 1000 hrs on the rebuild Twin Disc 509 w 4951 ratio Aluminum troll poles and Kolstrand gurdies 800 gallons fuel capacity in 3 seperate tanks Fiberglass fish holds for slush ice Electronics include radar Furuno GPS VHF sounder plotter ComNav autopilot and inverter 4 berths propane stove portable generator Reduced to 20000 257000 TN17001 Tuna Year 1981 Length 50 Hull Fiberglass Builder Canoe Cove Location British Columbia 50x14 fiberglass combination vessel built by Canoe Cove in 1981 Recently rebuilt Detroit 871 main w 260 hp New Twin Disc gear w 31 ratio Isuzu aux Twin load sensing hydraulic pumps Packs 38k lbs salmon in 2 fiberglass fish holds w slush ice New 3 ton compressor and freezer plate racks Fish hold plates needs work Longline hauler new Simplex gurdies Pullmaster and Gearamatic vanging winchs Electronics include GPS 2 VHF radar 2 sounders autopilot and computer Hot water shower 2 extra large bunks and 5 total berths Asking 257000 160000 TN16003 Tuna Year 1962 Length 88 Hull Steel Builder unknown Location Washington 88x22x96 steel tuna troller built in 1962 600 hp Cummins KTA with less than 2000 hrs on major overhaul Twin Disc gear 59 Cummins 10 kw and Yanmar 15 kw gensets Spray brine refrigeration Anchor winch longline drum and trolling gurdies Price reduced to 160000 165000 TN15008 Tuna Year 2004 Length 47 Hull Fiberglass Builder Magna Marine Location Hawaii 47x16x58 tuna longline vessel built by Magna Marine in 2004 Cat 3306 main rated at 225 hp with only 600 hours since rebuild New ZF 325 gear Kubota 15 kw generator Bow thruster 1200 gallons fuel capacity 25 mile longline spool 2 pinch pullers 485 tons capacity in 6 fish holds Electronics include Furuno GPS 2 VHF Dell computer Simrad 48 mile radar Simrad sounder and 600 watt inverter Cabin air conditioning and 600 gallons a day water maker Asking 165000 375000 TN15006 Tuna Year 1979 Length 65 Hull Steel Builder Olmstead Location Alaska 65x195x1110 steel combination tunaliveaboard boat built by Olmstead in 1979 GMC 8V71 main with 320 hp Twin Disc 509 451 gear Perkins 4108 10kw and Isuzu 20kw gen sets 2 fish holds 55k front and 15k aft Fuel capacity of 9700 gallons in 5 tanks Water capacity of 2790 gallons Carrier 5F20 and 5F20 blast freeze units 6000 lb deck crane Two staterooms with 5 berths total Two heads Electronics include GPS VHF computer wNobeltec radar sounder plotter and auto pilot Eager seller price reduced to 375000 300000 TN15002 Tuna Year 1979 Length 53 Hull Fiberglass Builder Skookum Marine Location California 53x154x89 fully rigged commercial sailboat tunasalmon troller built by Skookum Marine in 1979 471 main rated at 135 hp Twin Disc MG506 gear Northern Lights 6kw generator 15000 pounds capacity of albacore 10 ton blast freezer Two 3 spool Hasbro gurdies and 2 tuna pinch pullers Electronics include 16 mile and 48 mile radars 3 VHF SSB XM weather 2 Furuno fathometers ComNav autopilot and inverter with solar panels Includes a CA and OR salmon troll permits Extremely clean vessel in above average condition Contact us for a recent survey Asking 300000 129500 TN14005 Tuna Year 2004 Length 32 Hull Aluminum Builder Western Fabrication Location Washington 32x10x3 combination crablonglinetuna vessel built in 2004 by Western Fabrication Volvo Penta D4 main rated at 225 hp with only 326 hours Dual prop outdrive Honda 99 trolling motor 120 gallon fuel capacity Tuna poles longline chute crab block davit and landing box Electronics include an Icom VHF Lowrance sounder Garmin plotter VMS Easy loader trailer Price reduced to 129500 350000 TN13008 Tuna Year 1980 Length 54 Hull steel Builder Slater Location California 54x16x7 steel trawler built by Slater in 1980 Extensively rebuilt as albacore troll pleasure vessel Detroit 8V71N 350hp main with only 2500 hours Twin Disk 509 31 gear 5 gph at 7 knots Isuzu 14kw aux and Northern Lights 20kw aux 3000 gal fuel capacity in 5 tanks 300 gal fresh water with 40 gal hot water One large stateroom with 3 queen size berths 2 heads and 1 shower Packs 5000s of iced tuna in 6 totes on deck Electronics include GPS radar sounder plotter and auto pilot Safety equipment includes 4 person life raft 3 survival suits EPIRB 249900 TN11023 Tuna Year 1975 Length 50 Hull Fiberglass Builder Uniflite Location Oregon 50x15x65 fiberglass salmontuna troller built in 1975 by Uniflite Cat 3116T rated at 300 hp 5061 Twin Disc 3 to 1 gear Onan 7 kw generator 20000 capacity Aluminum rigging hayrack 2 tuna pullers and 2 3 spool salmon gurdies Electronics include a Magellan CP 1850 chart plotter Furuno VHF Raytheon radar Raytheon color sounder Furuno plotter Simrad ap35 autopilot and a Xantrex 300 watt inverter Extremely clean vessel ready to go fishing contact us for a recent survey Asking 249900
[ "Tuna Vessels" ]
http://docs.autodesk.com/ACD/2010/ENU/AutoCAD%202010%20User%20Documentation/files/WS1a9193826455f5ffa23ce210c4a30acaf-5f7c.htm
Loading . . . AutoCAD 2010 User Documentation Contents Index Search Favorites AutoCAD Help User ' s Guide Get Information The User Interface Start , Organize , and Save a Drawing Control the Drawing Views Choose a Work Process Before You Begin Create and Modify Objects Work with 3D Models Annotate Drawings Plot and Publish Drawings Prepare Drawings for Plotting and Publishing Plot Drawings Quick Start to Plotting Overview of Plotting Use a Page Setup to Specify Plot Settings Select a Printer or Plotter Specify the Area to Plot Set Paper Size Position the Drawing on the Paper Control How Objects Are Plotted Set Plot Scale Set Shaded Viewport Options Set Options for Plotted Objects Use Plot Styles to Control Plotted Objects Overview of Plot Styles Choose a Type of Plot Style Table Switch the Type of Plot Style Table Assign Plot Style Tables to Layouts Manage Plot Style Tables Use Color - Dependent Plot Style Tables Use Named Plot Style Tables Change Plot Style Settings Preview a Plot Plot Files to Other Formats Publish Drawings Share Data Between Drawings and Applications Work with Other People and Organizations Render a Drawing for Presentation Command Reference Customization Guide Driver and Peripherals Guide Glossary Notices Remove selected from Favorites
[ "Plot Style Tables", "AutoCAD" ]
http://docs.autodesk.com/ACD/2010/ENU/AutoCAD%202010%20User%20Documentation/files/WS73099cc142f48755-1257e12111bf108800e-10a.htm
Loading . . . AutoCAD 2010 User Documentation Contents Index Search Favorites AutoCAD Help User ' s Guide Get Information The User Interface Tools in the Application Window Other Tool Locations Access the Classic Menu Bar Toolbars Status Bars Keytips The Command Window Shortcut Menus Tool Palettes Create and Use Tools from Objects and Images Create and Use Command Tools Change Tool Palette Settings Control Tool Properties Customize Tool Palettes Organize Tool Palettes Save and Share Tool Palettes DesignCenter Customize the Drawing Environment Start , Organize , and Save a Drawing Control the Drawing Views Choose a Work Process Before You Begin Create and Modify Objects Work with 3D Models Annotate Drawings Plot and Publish Drawings Share Data Between Drawings and Applications Work with Other People and Organizations Render a Drawing for Presentation Command Reference Customization Guide Driver and Peripherals Guide Glossary Notices Remove selected from Favorites
[ "AutoCAD", "tool palette" ]
http://docs.aws.amazon.com/redshift/latest/dg/r_CREATE_TABLE_NEW.html
AWS Documentation Amazon Redshift Database Developer Guide SQL Reference SQL Commands CREATE TABLE CREATE TABLE Topics Syntax Parameters Usage Notes Examples Creates a new table in the current database . The owner of this table is the issuer of the CREATE TABLE command . Syntax CREATE [ [ LOCAL ] { TEMPORARY | TEMP } ] TABLE [ IF NOT EXISTS ] table_name ( { column_name data_type column_attributes ] [ column_constraints ] | table_constraints | LIKE parent_table [ { INCLUDING | EXCLUDING } DEFAULTS ] } [ , . . . ] ) [ BACKUP { YES | NO } ] [ table_attribute ] where column_attributes are : [ DEFAULT default_expr ] [ IDENTITY ( seed step ) ] [ ENCODE encoding ] [ DISTKEY ] [ SORTKEY ] and column_constraints are : [ { NOT NULL | NULL } ] [ { UNIQUE | PRIMARY KEY } ] [ REFERENCES reftable [ ( refcolumn ) ] ] and table_constraints are : [ UNIQUE ( column_name [ , . . . ] ) ] [ PRIMARY KEY ( column_name [ , . . . ] ) ] [ FOREIGN KEY ( [ , . . . ] ) REFERENCES reftable [ ( refcolumn ) ] and table_attributes are : [ DISTSTYLE { AUTO | EVEN | KEY | ALL } ] [ DISTKEY ( ) ] [ [ COMPOUND | INTERLEAVED ] SORTKEY ( column_name [ , . . . ] ) ] Parameters LOCAL Optional . Although this keyword is accepted in the statement , it has no effect in Amazon Redshift . TEMPORARY | TEMP Keyword that creates a temporary table that is visible only within the current session . The table is automatically dropped at the end of the session in which it is created . The temporary table can have the same name as a permanent table . The temporary table is created in a separate , session - specific schema . ( You ca n ' t specify a name for this schema . ) This temporary schema becomes the first schema in the search path , so the temporary table will take precedence over the permanent table unless you qualify the search_path Note By default , users have permission to create temporary tables by their automatic membership in the PUBLIC group . To deny this privilege to a user , revoke the TEMP privilege from the PUBLIC group , and then explicitly grant the TEMP privilege only to specific users or groups of users . IF NOT EXISTS Clause that indicates that if the specified table already exists , the command should make no changes and return a message that the table exists , rather than terminating with an error . Note that the existing table might be nothing like the one that would have been created ; only the table name is used for comparison . This clause is useful when scripting , so the script does n ’ t fail if CREATE TABLE tries to create a table that already exists . table_name Name of the table to be created . Important If you specify a table name that begins with ' # ' , the table will be created as a temporary table . The following is an example : create table # newtable ( id int ) ; The maximum length for the table name is 127 bytes ; longer names are truncated to 127 bytes . You can use UTF - 8 multibyte characters up to a maximum of four bytes . Amazon Redshift enforces a limit of 20,000 tables per cluster , including user - defined temporary tables and temporary tables created by Amazon Redshift during query processing or system maintenance . Optionally , the table name can be qualified with the database and schema name . In the following example , the database name is tickit , the schema name is public , and the table name is test create table tickit . public . test ( c1 int ) ; If the database or schema does not exist , the table is not created , and the statement returns an error . You ca n ' t create tables or views in the system databases template0 template1 , and padb_harvest If a schema name is given , the new table is created in that schema ( assuming the creator has access to the schema ) . The table name must be a unique name for that schema . If no schema is specified , the table is created by using the current database schema . If you are creating a temporary table , you ca n ' t specify a schema name , because temporary tables exist in a special schema . Multiple temporary tables with the same name can exist at the same time in the same database if they are created in separate sessions because the tables are assigned to different schemas . For more information about valid names , see Names and Identifiers Name of a column to be created in the new table . The maximum length for the column name is 127 bytes ; longer names are truncated to 127 bytes . You can use UTF - 8 multibyte characters up to a maximum of four bytes . The maximum number of columns you can define in a single table is 1,600 . For more information about valid names , see Names and Identifiers Note If you are creating a " wide table , " take care that your list of columns does not exceed row - width boundaries for intermediate results during loads and query processing . For more information , see Usage Notes data_type The data type of the column being created . For CHAR and VARCHAR columns , you can use the MAX keyword instead of declaring a maximum length . MAX sets the maximum length to 4096 bytes for CHAR or 65535 bytes for VARCHAR . The following data types are supported : SMALLINT ( INT2 ) INTEGER ( INT , INT4 ) BIGINT ( INT8 ) DECIMAL ( NUMERIC ) REAL ( FLOAT4 ) DOUBLE PRECISION ( FLOAT8 ) BOOLEAN ( BOOL ) CHAR ( CHARACTER ) VARCHAR ( CHARACTER VARYING ) DATE TIMESTAMP TIMESTAMPTZ DEFAULT default_expr Clause that assigns a default data value for the column . The data type of must match the data type of the column . The DEFAULT value must be a variable - free expression . Subqueries , cross - references to other columns in the current table , and user - defined functions are not allowed . The expression is used in any INSERT operation that does not specify a value for the column . If no default value is specified , the default value for the column is null . If a COPY operation with a defined column list omits a column that has a DEFAULT value , the COPY command inserts the value of IDENTITY ( seed step Clause that specifies that the column is an IDENTITY column . An IDENTITY column contains unique auto - generated values . The data type for an IDENTITY column must be either INT or BIGINT . When you add rows using an INSERT statement , these values start with the value specified as and increment by the number specified as step . When you load the table using a COPY statement , an IDENTITY column might not be useful . With a COPY operation , the data is loaded in parallel and distributed to the node slices . To be sure that the identity values are unique , Amazon Redshift skips a number of values when creating the identity values . As a result , identity values are unique and sequential , but not consecutive , and the order might not match the order in the source files . ENCODE encoding Compression encoding for a column . If no compression is selected , Amazon Redshift automatically assigns compression encoding as follows : All columns in temporary tables are assigned RAW compression by default . Columns that are defined as sort keys are assigned RAW compression . Columns that are defined as BOOLEAN , REAL , or DOUBLE PRECISION data types are assigned RAW compression . All other columns are assigned LZO compression . If you do n ' t want a column to be compressed , explicitly specify RAW encoding . The following compression encodings are supported : BYTEDICT DELTA DELTA32K LZO MOSTLY8 MOSTLY16 MOSTLY32 RAW ( no compression ) RUNLENGTH TEXT255 TEXT32K ZSTD DISTKEY Keyword that specifies that the column is the distribution key for the table . Only one column in a table can be the distribution key . You can use the DISTKEY keyword after a column name or as part of the table definition by using the DISTKEY ( ) syntax . Either method has the same effect . For more information , see the DISTSTYLE parameter later in this topic . SORTKEY Keyword that specifies that the column is the sort key for the table . When data is loaded into the table , the data is sorted by one or more columns that are designated as sort keys . You can use the SORTKEY keyword after a column name to specify a single - column sort key , or you can specify one or more columns as sort key columns for the table by using the SORTKEY ( [ , . . . ] ) syntax . Only compound sort keys are created with this syntax . If you do not specify any sort keys , the table is not sorted . You can define a maximum of 400 SORTKEY columns per table . NOT NULL | NULL NOT NULL specifies that the column is not allowed to contain null values . NULL , the default , specifies that the column accepts null values . IDENTITY columns are declared NOT NULL by default . UNIQUE Keyword that specifies that the column can contain only unique values . The behavior of the unique table constraint is the same as that for column constraints , with the additional capability to span multiple columns . To define a unique table constraint , use the UNIQUE ( [ , . . . ] ) syntax . Important Unique constraints are informational and are not enforced by the system . PRIMARY KEY Keyword that specifies that the column is the primary key for the table . Only one column can be defined as the primary key by using a column definition . To define a table constraint with a multiple - column primary key , use the PRIMARY KEY ( [ , . . . ] ) syntax . Identifying a column as the primary key provides metadata about the design of the schema . A primary key implies that other tables can rely on this set of columns as a unique identifier for rows . One primary key can be specified for a table , whether as a column constraint or a table constraint . The primary key constraint should name a set of columns that is different from other sets of columns named by any unique constraint defined for the same table . Primary key constraints are informational only . They are not enforced by the system , but they are used by the planner . References ) ] Clause that specifies a foreign key constraint , which implies that the column must contain only values that match values in the referenced column of some row of the referenced table . The referenced columns should be the columns of a unique or primary key constraint in the referenced table . Foreign key constraints are informational only . They are not enforced by the system , but they are used by the planner . LIKE parent_table [ { INCLUDING | EXCLUDING } DEFAULTS ] A clause that specifies an existing table from which the new table automatically copies column names , data types , and NOT NULL constraints . The new table and the parent table are decoupled , and any changes made to the parent table are not applied to the new table . Default expressions for the copied column definitions are copied only if INCLUDING DEFAULTS is specified . The default behavior is to exclude default expressions , so that all columns of the new table have null defaults . Tables created with the LIKE option do n ' t inherit primary and foreign key constraints . Distribution style , sort keys , BACKUP , and NULL properties are inherited by LIKE tables , but you ca n ' t explicitly set them in the CREATE TABLE . . . LIKE statement . BACKUP { YES | NO } A clause that specifies whether the table should be included in automated and manual cluster snapshots . For tables , such as staging tables , that wo n ' t contain critical data , specify BACKUP NO to save processing time when creating snapshots and restoring from snapshots and to reduce storage space on Amazon Simple Storage Service . The BACKUP NO setting has no effect on automatic replication of data to other nodes within the cluster , so tables with BACKUP NO specified are restored in a node failure . The default is BACKUP YES . DISTSTYLE { AUTO | EVEN | KEY | ALL } Keyword that defines the data distribution style for the whole table . Amazon Redshift distributes the rows of a table to the compute nodes according to the distribution style specified for the table . The default is AUTO . The distribution style that you select for tables affects the overall performance of your database . For more information , see Choosing a Data Distribution Style . Possible distribution styles are as follows : AUTO : Amazon Redshift assigns an optimal distribution style based on the table data . For example , if AUTO distribution style is specified , Amazon Redshift initially assigns ALL distribution to a small table , then changes the table to EVEN distribution when the table grows larger . The change in distribution occurs in the background , in a few seconds . Amazon Redshift never changes the distribution style from EVEN to ALL . To view the distribution style applied to a table , query the PG_CLASS system catalog table . For more information , see Viewing Distribution Styles EVEN : The data in the table is spread evenly across the nodes in a cluster in a round - robin distribution . Row IDs are used to determine the distribution , and roughly the same number of rows are distributed to each node . KEY : The data is distributed by the values in the DISTKEY column . When you set the joining columns of joining tables as distribution keys , the joining rows from both tables are collocated on the compute nodes . When data is collocated , the optimizer can perform joins more efficiently . If you specify DISTSTYLE KEY , you must name a DISTKEY column , either for the table or as part of the column definition . For more information , see the DISTKEY parameter earlier in this topic . ALL : A copy of the entire table is distributed to every node . This distribution style ensures that all the rows required for any join are available on every node , but it multiplies storage requirements and increases the load and maintenance times for the table . ALL distribution can improve execution time when used with certain dimension tables where KEY distribution is not appropriate , but performance improvements must be weighed against maintenance costs . DISTKEY ( Constraint that specifies the column to be used as the distribution key for the table . You can use the DISTKEY keyword after a column name or as part of the table definition , by using the DISTKEY ( ) syntax . Either method has the same effect . For more information , see the DISTSTYLE parameter earlier in this topic . [ { COMPOUND | INTERLEAVED } ] SORTKEY ( column_name [ , . . . ] ) Specifies one or more sort keys for the table . When data is loaded into the table , the data is sorted by the columns that are designated as sort keys . You can use the SORTKEY keyword after a column name to specify a single - column sort key , or you can specify one or more columns as sort key columns for the table by using the SORTKEY ( column_name [ , . . . ] ) syntax . You can optionally specify COMPOUND or INTERLEAVED sort style . The default is COMPOUND . For more information , see Choosing Sort Keys If you do not specify any sort keys , the table is not sorted by default . You can define a maximum of 400 COMPOUND SORTKEY columns or 8 INTERLEAVED SORTKEY columns per table . COMPOUND Specifies that the data is sorted using a compound key made up of all of the listed columns , in the order they are listed . A compound sort key is most useful when a query scans rows according to the order of the sort columns . The performance benefits of sorting with a compound key decrease when queries rely on secondary sort columns . You can define a maximum of 400 COMPOUND SORTKEY columns per table . INTERLEAVED Specifies that the data is sorted using an interleaved sort key . A maximum of eight columns can be specified for an interleaved sort key . An interleaved sort gives equal weight to each column , or subset of columns , in the sort key , so queries do not depend on the order of the columns in the sort key . When a query uses one or more secondary sort columns , interleaved sorting significantly improves query performance . Interleaved sorting carries a small overhead cost for data loading and vacuuming operations . Do n ’ t use an interleaved sort key on columns with monotonically increasing attributes , such as identity columns , dates , or timestamps . UNIQUE ( [ , . . . ] ) Constraint that specifies that a group of one or more columns of a table can contain only unique values . The behavior of the unique table constraint is the same as that for column constraints , with the additional capability to span multiple columns . In the context of unique constraints , null values are not considered equal . Each unique table constraint must name a set of columns that is different from the set of columns named by any other unique or primary key constraint defined for the table . Unique constraints are informational and are not enforced by the system . PRIMARY KEY ( [ , . . . ] ) Constraint that specifies that a column or a number of columns of a table can contain only unique ( nonduplicate ) non - null values . Identifying a set of columns as the primary key also provides metadata about the design of the schema . A primary key implies that other tables can rely on this set of columns as a unique identifier for rows . One primary key can be specified for a table , whether as a single column constraint or a table constraint . The primary key constraint should name a set of columns that is different Primary key constraints are informational only . They are not enforced by the system , but they are used by the planner . FOREIGN KEY ( [ , . . . ] ) REFERENCES ) ] Constraint that specifies a foreign key constraint , which requires that a group of one or more columns of the new table must only contain values that match values in the referenced column ( s ) of some row of the referenced table . If is omitted , the primary key of is used . The referenced columns must be the columns of a unique or primary key constraint in the referenced table . Foreign key constraints are informational only . They are not enforced by the system , but they are used by the planner . Document Conventions Β« Previous Next Β»
[ "Amazon Redshift", "CREATE TABLE" ]
http://docs.aws.amazon.com/streams/latest/dev/introduction.html
AWS Documentation Amazon Kinesis Streams Developer Guide What Is Amazon Kinesis Data Streams ? What Is Amazon Kinesis Data Streams ? You can use Amazon Kinesis Data Streams to collect and process large streams of data records in real time . You can create data - processing applications , known as Kinesis Data Streams applications . A typical Kinesis Data Streams application reads data from a data stream as data records . These applications can use the Kinesis Client Library , and they can run on Amazon EC2 instances . You can send the processed records to dashboards , use them to generate alerts , dynamically change pricing and advertising strategies , or send data to a variety of other AWS services . For information about Kinesis Data Streams features and pricing , see Amazon Kinesis Data Streams Kinesis Data Streams is part of the Kinesis streaming data platform , along with Kinesis Data Firehose Kinesis Video Streams , and Kinesis Data Analytics For more information about AWS big data solutions , see Big Data on AWS . For more information about AWS streaming data solutions , see What is Streaming Data ? Topics What Can I Do with Kinesis Data Streams ? Benefits of Using Kinesis Data Streams Related Services Kinesis Data Streams Key Concepts Creating and Updating Data Streams Kinesis Data Streams Producers Kinesis Data Streams Consumers Kinesis Data Streams Limits What Can I Do with Kinesis Data Streams ? You can use Kinesis Data Streams for rapid and continuous data intake and aggregation . The type of data used can include IT infrastructure log data , application logs , social media , market data feeds , and web clickstream data . Because the response time for the data intake and processing is in real time , the processing is typically lightweight . The following are typical scenarios for using Kinesis Data Streams : Accelerated log and data feed intake and processing You can have producers push data directly into a stream . For example , push system and application logs and they are available for processing in seconds . This prevents the log data from being lost if the front end or application server fails . Kinesis Data Streams provides accelerated data feed intake because you do n ' t batch the data on the servers before you submit it for intake . Real - time metrics and reporting You can use data collected into Kinesis Data Streams for simple data analysis and reporting in real time . For example , your data - processing application can work on metrics and reporting for system and application logs as the data is streaming in , rather than wait to receive batches of data . Real - time data analytics This combines the power of parallel processing with the value of real - time data . For example , process website clickstreams in real time , and then analyze site usability engagement using multiple different Kinesis Data Streams applications running in parallel . Complex stream processing You can create Directed Acyclic Graphs ( DAGs ) of Kinesis Data Streams applications and data streams . This typically involves putting data from multiple Kinesis Data Streams applications into another stream for downstream processing by a different Kinesis Data Streams application . Benefits of Using Kinesis Data Streams Although you can use Kinesis Data Streams to solve a variety of streaming data problems , a common use is the real - time aggregation of data followed by loading the aggregate data into a data warehouse or map - reduce cluster . Data is put into Kinesis data streams , which ensures durability and elasticity . The delay between the time a record is put into the stream and the time it can be retrieved ( put - to - get delay ) is typically less than 1 second . In other words , a Kinesis Data Streams application can start consuming the data from the stream almost immediately after the data is added . The managed service aspect of Kinesis Data Streams relieves you of the operational burden of creating and running a data intake pipeline . You can create streaming Multiple Kinesis Data Streams applications can consume data from a stream , so that multiple actions , like archiving and processing , can take place concurrently and independently . For example , two applications can read data from the same stream . The first application calculates running aggregates and updates an Amazon DynamoDB table , and the second application compresses and archives data to a data store like Amazon Simple Storage Service ( Amazon S3 ) . The DynamoDB table with running aggregates is then read by a dashboard for up - to - the - minute reports . The Kinesis Client Library enables fault - tolerant consumption of data from streams and provides scaling support for Kinesis Data Streams applications . Related Services For information about using Amazon EMR clusters to read and process Kinesis data streams directly , see Kinesis Connector Document Conventions Next Β»
[ "Kinesis Data Streams", "AWS services" ]
http://docs.csiamerica.com/help-files/etabs/Menus/Define/Section_Properties/Frame_Sections/frame_section_databases.htm
Frame Section Databases AA6061T6 AA standard sections for 6061T6 extruded aluminum AISC American Institute of Steel Construction shapes based on AISC ASD 9 th Edition AISC13 American Institute of Steel Construction shapes based on AISC LRFD Edition 13 US Units AISC13M American Institute of Steel Construction shapes based on AISC LRFD Edition 13 Metric Units AISC14 American Institute of Steel Construction shapes based on AISC LRFD Edition 14 US Units AISC14M American Institute of Steel Construction shapes based on AISC LRFD Edition 14 Metric Units AISC3 American Institute of Steel Construction shapes based on AISC LRFD Edition 3 AISCASD9 American Institute of Steel Construction shapes based on AISC ASD Edition 9 AISCLRFD1 American Institute of Steel Construction shapes based on AISC LRFD Edition 1 AICSLRFD2 American Institute of Steel Construction shapes based on AISC LRFD Edition 2 AISCLRFD3 American Institute of Steel Construction shapes based on AISC LRFD Edition 3 Aluminum AA Standard Section for 6061T6 extruded aluminum AusNzV8 Australian and New Zealand steel shapes BSShapes British Standards steel shapes BSShapes2006 British Standards steel shapes Chinese Chinese steel shapes ChineseGB08 Chinese steel shapes based on GB08Standard CISC Canadian Institute of Steel Construction shapes CISC9 Canadian Institute of Steel Construction shapes 9 th Edition CSIETABSDEfaultSections Euro European steel shapes Indian Steel shapes in accordance with specifications from India Joints Sections American Institute of Steel Construction shapes V2 Sections8 American Institute of Steel Construction shapes V3 SJIJoists Joist database shape based on SJI based on 2010 Specification
[ "Databases" ]
http://docs.embarcadero.com/products/rad_studio/delphiAndcpp2009/HelpUpdate2/EN/html/delphivclwin32/DBClient_TClientDataSet.html
TClientDataSet implements a databaseindependent dataset Class Hierarchy Pascal TClientDataSet class TCustomClientDataSet C class TClientDataSet public TCustomClientDataSet File DBClient Description TClientDataSet represents an inmemory dataset A client dataset can be used as A fullyfunctional standalone filebased dataset for singletiered database applications When used in this manner the client dataset represents the data stored in a dedicated file on the users hard disk A local inmemory buffer of the records from another dataset The other source dataset can reside in the same form or data module as the client dataset for example when the client dataset provides navigation and editing support for the data from a unidirectional dataset The source dataset can also reside on a separate system when the client dataset supports the client portion of a multitiered database application Note The two functions described above are not mutually exclusive An application can be designed to support the option of working with data offline using the briefcase model On site the application uses TClientDataSet to communicate with the database server associated with a source dataset When a user works off site the client dataset writes a snapshot of the data to the hard disk The application works with this snapshot off site with the client dataset acting as a filebased dataset in a singletiered application When a client dataset represents the data from another dataset it communicates with that dataset through a dataset provider The client dataset communicates with this provider through the IAppServer interface When the provider is in the same form or data module as the client dataset the IAppServer interface is implemented by a hidden object that is created for you When used in a client application as part of a multitiered application the client dataset passes all calls to the provider through a remote data modules IAppServer interface See Also TDataSetProvider TDispatchConnection IAppServer TIBClientDataSet Types of Datasets Choosing the Type of Dataset for Caching Updates
[ "Pascal", "TClientDataSet" ]
http://docs.identityserver.io/en/release/quickstarts/5_hybrid_and_api_access.html
Switching to Hybrid Flow and adding API Access back In the previous quickstarts we explored both API access and user authentication Now we want to bring the two parts together The beauty of the OpenID Connect OAuth 20 combination is that you can achieve both with a single protocol and a single exchange with the token service In the previous quickstart we used the OpenID Connect implicit flow In the implicit flow all tokens are transmitted via the browser which is totally fine for the identity token Now we also want to request an access token Access tokens are a bit more sensitive than identity tokens and we dont want to expose them to the outside world if not needed OpenID Connect includes a flow called Hybrid Flow which gives us the best of both worlds the identity token is transmitted via the browser channel so the client can validate it before doing any more work And if validation is successful the client opens a backchannel to the token service to retrieve the access token Modifying the client configuration There are not many modifications necessary First we want to allow the client to use the hybrid flow in addition we also want the client to allow doing server to server API calls which are not in the context of a user this is very similar to our client credentials quickstart This is expressed using the AllowedGrantTypes property Next we need to add a client secret This will be used to retrieve the access token on the back channel And finally we also give the client access to the offline_access scope this allows requesting refresh tokens for long lived API access new Client ClientId mvc ClientName MVC Client AllowedGrantTypes GrantTypes Hybrid ClientSecrets new Secret secret Sha256 RedirectUris httplocalhost5002signinoidc PostLogoutRedirectUris httplocalhost5002signoutcallbackoidc AllowedScopes IdentityServerConstants StandardScopes OpenId IdentityServerConstants StandardScopes Profile api1 AllowOfflineAccess true Modifying the MVC client The modifications at the MVC client are also minimal the ASPNET Core OpenID Connect handler has builtin support for the hybrid flow so we only need to change some configuration values We configure the ClientSecret to match the secret at IdentityServer Add the offline_access and api1 scopes and set the ResponseType to code id_token which basically means use hybrid flow To keep the website claim in our mvc client identity we need to explicitly map the claim using ClaimActions AddOpenIdConnect oidc options options SignInScheme Cookies options Authority httplocalhost5000 options RequireHttpsMetadata false options ClientId mvc options ClientSecret secret options ResponseType code id_token options SaveTokens true options GetClaimsFromUserInfoEndpoint true options Scope Add api1 options Scope Add offline_access options ClaimActions MapJsonKey website website When you run the MVC client there will be no big differences besides that the consent screen now asks you for the additional API and offline access scope Using the access token The OpenID Connect handler saves the tokens identity access and refresh in our case automatically for you Thats what the SaveTokens setting does The cookie inspection view iterates over those values and shows them on the screen Technically the tokens are stored inside the properties section of the cookie The easiest way to access them is by using extension methods from the MicrosoftAspNetCoreAuthentication namespace For example var accessToken await HttpContext GetTokenAsync access_token var refreshToken await HttpContext GetTokenAsync refresh_token For accessing the API using the access token all you need to do is retrieve the token and set it on your HttpClient public async Task IActionResult CallApi var accessToken await HttpContext GetTokenAsync access_token var client new HttpClient client DefaultRequestHeaders Authorization new AuthenticationHeaderValue Bearer accessToken var content await client GetStringAsync httplocalhost5001identity ViewBag Json JArray Parse content ToString return json Create a view called jsoncshtml that outputs the json like this pre ViewBag Json pre Make sure the API is running start the MVC client and call homeCallApi after authentication
[ "Hybrid Flow", "API Access" ]
http://docs.mcneel.com/rhino/5/help/en-us/commands/curvatureanalysis.htm
CurvatureAnalysis Where can I find this command The CurvatureAnalysis command visually evaluates surface curvature using falsecolor analysis Note These tools can be used to gain information about the type and amount of curvature on a surface Gaussian and Mean curvature analysis can show if and where there may be anomalies in the curvature of a surface Unacceptably sudden changes like bumps dents flat areas or ripples or in general areas of curvature that are higher or lower than the surrounding surface can be located and corrected if needed Gaussian curvature display is helpful in deciding whether or not a surface can be developed into a flat pattern A smooth surface has two principal curvatures The Gaussian curvature is a product of the principal curvatures The mean curvature is the average of the two principal curvatures Steps 1 objects The selected surface is analyzed for Gaussian curvature by default 2 Set the style and range Note If when you use the CurvatureAnalysis command any selected object does not have a surface analysis mesh an invisible mesh will be created based on the settings in the Polygon Mesh Options dialog box The surface analysis meshes are saved in the Rhino files These meshes can be large The RefreshShade command and the Save geometry only option of the Save and SaveAs commands remove any existing surface analysis meshes To properly analyze a freeform NURBS surface the analysis commands generally require a detailed mesh Curvature Style Gaussian In the images below red is assigned to a positive value of Gaussian curvature green is assigned to zero Gaussian curvature and blue to a negative value of Gaussian curvature Any points on the surface with curvature values between the ones you specify will display using the corresponding color For example points with a curvature value half way between the specified values will be green Points on the surface that have curvature values beyond the red end of the range will be red and points with curvature values beyond the blue end of the range will be blue Positive curvature A positive Gaussian curvature value means the surface is bowllike Negative curvature A negative value means the surface is saddlelike Zero curvature A zero value means the surface is flat in at least one direction Planes cylinders and cones have zero Gaussian curvature If you know the value range of the curvature you are interested in analyzing type those values in the edit boxes next to the red and blue portions of the rainbow The values you use for red should be different from the value you use for blue but the value for red can be larger or smaller than the value for blue Mean Displays the absolute value of the mean curvature It is useful for finding areas of abrupt change in the surface curvature Min radius If you are going to offset a surface at distance r or are going to mill a surface with a cutting ball of radius r then any place on the surface that curves with a radius smaller than r will cause trouble In the case of an offset youll get a twisty mess that goes through itself In the case of the mill your cutting ball will remove material you want to keep In these cases you need to be able to answer the question Does this surface have any place where it bends too tightly The Min Radius option should help you answer this question Set RED r set BLUE 15 x r You can not offsetmill anywhere on the surface that is red Blue areas should be safe However you should view areas from green to red with suspicion Max radius This option is useful for flat spot detection Set the value of blue to be rather high 101001000 and of red to be close to infinity Red areas in the model then indicate flat spots where the curvature is practically zero Curvature Range Auto Range Using false color mapping the CurvatureAnalysis command analyzes surface curvature You have to map values to saturated computer colors As a starting point use Auto Range and then adjust the values to be symmetric but with magnitudes comparable to those selected by Auto Range The CurvatureAnalysis command attempts to remember the settings you used the last time you analyzed a surface If you have dramatically changed the geometry of a surface or have switched to a new surface these values may not be appropriate In this case you can use Auto Range to automatically compute a curvature value to color mapping that will result in a good color distribution Max Range Choose this option if you want the maximum curvature to map to red and the minimum curvature mapped to blue On surfaces with extreme curvature variation this may result in a rather uninformative image Show isocurve Displays isocurves on the objects Turn on curvature analysis for additional selected objects Remove Objects Turn off curvature analysis for selected objects Curve curvature To understand Gaussian curvature of a point on a surface you must first know what the curvature of curve is At any point on a curve in the plane the line best approximating the curve that passes through this point is the tangent line We can also find the best approximating circle that passes through this point and is tangent to the curve The reciprocal of the radius of this circle is the curvature of the curve at this point The best approximating circle may lie either to the left of the curve or to the right of the curve If we care about this then we establish a convention such as giving the curvature positive sign if the circle lies to the left and negative sign if the circle lies to the right of the curve This is known as signed curvature One generalization of curvature to surfaces is normal section curvature Given a point on the surface and a direction lying in the tangent plane of the surface at that point the normal section curvature is computed by intersecting the surface with the plane spanned by the point the normal to the surface at that point and the direction The normal section curvature is the signed curvature of this curve at the point of interest If we look at all directions in the tangent plane to the surface at our point and we compute the normal section curvature in all these directions then there will be a maximum value and a minimum value Surface curvature Gaussian curvature The Gaussian curvature of a surface at a point is the product of the principal curvatures at that point The tangent plane of any point with positive Gaussian curvature touches the surface at a single point whereas the tangent plane of any point with negative Gaussian curvature cuts the surface Any point with zero mean curvature has negative or zero Gaussian curvature Principal curvatures The principal curvatures of a surface at a point are the minimum and maximum of the normal curvatures at that point Normal curvatures are the curvatures of curves on the surface lying in planes including the tangent vector at the given point The principal curvatures are used to compute the Gaussian and Mean curvatures of the surface Mean curvature The Mean curvature of a surface at a point is one half the sum of the principal curvatures at that point Any point with zero mean curvature has negative or zero Gaussian curvature Surfaces with zero mean curvature everywhere are minimal surfaces Surfaces with constant mean curvature everywhere are often referred to as constant mean curvature CMC surfaces CMC surfaces have the same mean curvature everywhere on the surface Physical processes which can be modeled by CMC surfaces include the formation of soap bubbles both free and attached to objects A soap bubble unlike a simple soap film encloses a volume and exists in an equilibrium where slightly greater pressure inside the bubble is balanced by the areaminimizing forces of the bubble itself Minimal surfaces are the subset of CMC surfaces where the curvature is zero everywhere Physical processes which can be modeled by minimal surfaces include the formation of soap films spanning fixed objects such as wire loops A soap film is not distorted by air pressure which is equal on both sides and is free to minimize its area This contrasts with a soap bubble which encloses a fixed quantity of air and has unequal pressures on its inside and outside CurvatureAnalysisOff Where can I find this command The CurvatureAnalysisOff command closes the Curvature dialog box and turns off curvature analysis display See also Analyze objects Rhinoceros 5 20102015 Robert McNeel Associates 17Sep2015
[ "CurvatureAnalysis", "Gaussian" ]
http://docs.mongoengine.org/guide/querying.html
25 Querying the database Document classes have an objects attribute which is used for accessing the objects in the database associated with the class The objects attribute is actually a QuerySetManager which creates and returns a new QuerySet object on access The QuerySet object may be iterated over to fetch documents from the database Prints out the names of all the users in the database for user in User objects user name Note As of MongoEngine 08 the querysets utilise a local cache So iterating it multiple times will only cause a single query If this is not the desired behaviour you can call no_cache version to return a noncaching queryset 251 Filtering queries The query may be filtered by calling the QuerySet object with field lookup keyword arguments The keys in the keyword arguments correspond to fields on the Document you are querying This will return a QuerySet that will only iterate over users whose country field is set to uk uk_users User objects country uk Fields on embedded documents may also be referred to using field lookup syntax by using a doubleunderscore in place of the dot in object attribute access syntax This will return a QuerySet that will only iterate over pages that have been written by a user whose country field is set to uk uk_pages Page objects author__country uk Note version 091 if your field name is like mongodb operator name for example type lte lt and you want to place it at the end of lookup keyword mongoengine automatically prepend to it To avoid this use __ at the end of your lookup keyword For example if your field name is type and you want to query by this field you must use objectsuser__type__admin instead of objectsuser__typeadmin 252 Query operators Operators other than equality may also be used in queries just attach the operator name to a key with a doubleunderscore Only find users whose age is 18 or less young_users Users objects age__lte 18 Available operators are as follows ne not equal to lt less than lte less than or equal to gt greater than gte greater than or equal to not negate a standard check may be used before other operators eg Qage__not__mod5 in value is in list a list of values should be provided nin value is not in list a list of values should be provided mod value x y where x and y are two provided values all every item in list of values provided is in array size the size of the array is exists value for field exists 2521 String queries The following operators are available as shortcuts to querying with regular expressions exact string field exactly matches value iexact string field exactly matches value case insensitive contains string field contains value icontains string field contains value case insensitive startswith string field starts with value istartswith string field starts with value case insensitive endswith string field ends with value iendswith string field ends with value case insensitive match performs an elemMatch so you can match an entire document within an array 2522 Geo queries There are a few special operators for performing geographical queries The following were added in MongoEngine 08 for PointField LineStringField and PolygonField geo_within check if a geometry is within a polygon For ease of use it accepts either a geojson geometry or just the polygon coordinates eg loc objects point__geo_within 40 5 40 6 41 6 40 5 loc objects point__geo_within type Polygon coordinates 40 5 40 6 41 6 40 5 geo_within_box simplified geo_within searching with a box eg loc objects point__geo_within_box 1250 350 1000 400 loc objects point__geo_within_box bottom left coordinates upper right coordinates geo_within_polygon simplified geo_within searching within a simple polygon eg loc objects point__geo_within_polygon 40 5 40 6 41 6 40 5 loc objects point__geo_within_polygon x1 y1 x2 y2 x3 y3 geo_within_center simplified geo_within the flat circle radius of a point eg loc objects point__geo_within_center 1250 350 1 loc objects point__geo_within_center x y radius geo_within_sphere simplified geo_within the spherical circle radius of a point eg loc objects point__geo_within_sphere 1250 350 1 loc objects point__geo_within_sphere x y radius geo_intersects selects all locations that intersect with a geometry eg Inferred from provided points lists loc objects poly__geo_intersects 40 6 loc objects poly__geo_intersects 40 5 40 6 loc objects poly__geo_intersects 40 5 40 6 41 6 41 5 40 5 With geoJson style objects loc objects poly__geo_intersects type Point coordinates 40 6 loc objects poly__geo_intersects type LineString coordinates 40 5 40 6 loc objects poly__geo_intersects type Polygon coordinates 40 5 40 6 41 6 41 5 40 5 near find all the locations near a given point loc objects point__near 40 5 loc objects point__near type Point coordinates 40 5 You can also set the maximum andor the minimum distance in meters as well loc objects point__near 40 5 point__max_distance 1000 loc objects point__near 40 5 point__min_distance 100 The older 2D indexes are still supported with the GeoPointField within_distance provide a list containing a point and a maximum distance eg 41342 87653 5 within_spherical_distance same as above but using the spherical geo model eg 41342 87653 5earth_radius near order the documents by how close they are to a given point near_sphere Same as above but using the spherical geo model within_box filter documents to those within a given bounding box eg 350 1250 400 1000 within_polygon filter documents to those within a given polygon eg 41918769 41928768 41918765 41898765 Note Requires Mongo Server 20 max_distance can be added to your location queries to set a maximum distance min_distance can be added to your location queries to set a minimum distance 2523 Querying lists On most fields this syntax will look up documents where the field specified matches the given value exactly but when the field refers to a ListField a single item may be provided in which case lists that contain that item will be matched class Page Document tags ListField StringField This will match all pages that have the word coding as an item in the tags list Page objects tags coding It is possible to query by position in a list by using a numerical value as a query operator So if you wanted to find all pages whose first tag was db you could use the following query Page objects tags__0 db If you only want to fetch part of a list eg you want to paginate a list then the slice operator is required comments skip 5 limit 10 Page objects fields slice__comments 5 10 For updating documents if you dont know the position in a list you can use the positional operator Post objects comments__by joe update inc__comments____votes 1 However this doesnt map well to the syntax so you can also use a capital S instead Post objects comments__by joe update inc__comments__S__votes 1 Note Due to Mongo currently the operator only applies to the first matched item in the query 2524 Raw queries It is possible to provide a raw PyMongo query as a query parameter which will be integrated directly into the query This is done using the __raw__ keyword argument Page objects __raw__ tags coding New in version 04 253 Limiting and skipping results Just as with traditional ORMs you may limit the number of results returned or skip a number or results in you query limit and skip and methods are available on QuerySet objects but the arrayslicing syntax is preferred for achieving this Only the first 5 people users User objects 5 All except for the first 5 people users User objects 5 5 users starting from the 11th user found users User objects 10 15 You may also index the query to retrieve a single result If an item at that index does not exists an IndexError will be raised A shortcut for retrieving the first result and returning None if no result exists is provided first Make sure there are no users User drop_collection User objects 0 IndexError list index out of range User objects first None True User name Test User User objects 0 User objects first True 2531 Retrieving unique results To retrieve a result that should be unique in the collection use get This will raise DoesNotExist if no document matches the query and MultipleObjectsReturned if more than one document matched the query These exceptions are merged into your document definitions eg MyDocDoesNotExist A variation of this method get_or_create existed but it was unsafe It could not be made safe because there are no transactions in mongoDB Other approaches should be investigated to ensure you dont accidentally duplicate data when using something similar to this method Therefore it was deprecated in 08 and removed in 010 254 Default Document queries By default the objects objects attribute on a document returns a QuerySet that doesnt filter the collection it returns all objects This may be changed by defining a method on a document that modifies a queryset The method should accept two arguments doc_cls and queryset The first argument is the Document class that the method is defined on in this sense the method is more like a classmethod than a regular method and the second argument is the initial queryset The method needs to be decorated with queryset_manager in order for it to be recognised class BlogPost Document title StringField date DateTimeField queryset_manager def objects doc_cls queryset This may actually also be done by defining a default ordering for the document but this illustrates the use of manager methods return queryset order_by date You dont need to call your method objects you may define as many custom manager methods as you like class BlogPost Document title StringField published BooleanField queryset_manager def live_posts doc_cls queryset return queryset filter published True BlogPost title test1 published False BlogPost title test2 published True assert len BlogPost objects 2 assert len BlogPost live_posts 1 255 Custom QuerySets Should you want to add custom methods for interacting with or filtering documents extending the QuerySet class may be the way to go To use a custom QuerySet class on a document set queryset_class to the custom class in a Document s meta dictionary class AwesomerQuerySet QuerySet def get_awesome self return self filter awesome True class Page Document meta queryset_class AwesomerQuerySet To call Page objects get_awesome New in version 04 256 Aggregation MongoDB provides some aggregation methods out of the box but there are not as many as you typically get with an RDBMS MongoEngine provides a wrapper around the builtin methods and provides some of its own which are implemented as Javascript code that is executed on the database server 2561 Counting results Just as with limiting and skipping results there is a method on a QuerySet object count num_users User objects count You could technically use lenUserobjects to get the same result but it would be significantly slower than count When you execute a serverside count query you let MongoDB do the heavy lifting and you receive a single integer over the wire Meanwhile len retrieves all the results places them in a local cache and finally counts them If we compare the performance of the two operations len is much slower than count 2562 Further aggregation You may sum over the values of a specific field on documents using sum yearly_expense Employee objects sum salary Note If the field isnt present on a document that document will be ignored from the sum To get the average mean of a field on a collection of documents use average mean_age User objects average age As MongoDB provides native lists MongoEngine provides a helper method to get a dictionary of the frequencies of items in lists across an entire collection item_frequencies An example of its use would be generating tagclouds class Article Document tag ListField StringField After adding some tagged articles tag_freqs Article objects item_frequencies tag normalize True from operator import itemgetter top_tags sorted tag_freqs items key itemgetter 1 reverse True 10 257 Query efficiency and performance There are a couple of methods to improve efficiency when querying reducing the information returned by the query or efficient dereferencing 2571 Retrieving a subset of fields Sometimes a subset of fields on a Document is required and for efficiency only these should be retrieved from the database This issue is especially important for MongoDB as fields may often be extremely large eg a ListField of EmbeddedDocument s which represent the comments on a blog post To select only a subset of fields use only specifying the fields you want to retrieve as its arguments Note that if fields that are not downloaded are accessed their default value or None if no default value is provided will be given class Document title StringField year IntField rating IntField default 3 Film title The Shawshank Redemption year 1994 rating 5 f Film objects only title first f title The Shawshank Redemption f year None f rating default value 3 Note The exclude is the opposite of only if you want to exclude a field If you later need the missing fields just call reload on your document 2572 Getting related data When iterating the results of ListField or DictField we automatically dereference any DBRef objects as efficiently as possible reducing the number the queries to mongo There are times when that efficiency is not enough documents that have ReferenceField objects or GenericReferenceField objects at the top level are expensive as the number of queries to MongoDB can quickly rise To limit the number of queries use select_related which converts the QuerySet to a list and dereferences as efficiently as possible By default select_related only dereferences any references to the depth of 1 level If you have more complicated documents and want to dereference more of the object at once then increasing the max_depth will dereference more levels of the document 2573 Turning off dereferencing Sometimes for performance reasons you dont want to automatically dereference data To turn off dereferencing of the results of a query use no_dereference on the queryset like so post Post objects no_dereference first assert isinstance post author DBRef You can also turn off all dereferencing for a fixed period by using the no_dereference context manager with no_dereference Post as Post post Post objects first assert isinstance post author DBRef Outside the context manager dereferencing occurs assert isinstance post author User 258 Advanced queries Sometimes calling a QuerySet object with keyword arguments cant fully express the query you want to use for example if you need to combine a number of constraints using and and or This is made possible in MongoEngine through the Q class A Q object represents part of a query and can be initialised using the same keywordargument syntax you use to query documents To build a complex query you may combine Q objects using the and and or operators To use a Q object pass it in as the first positional argument to Documentobjects when you filter it by calling it with keyword arguments from mongoenginequerysetvisitor import Q Get published posts Post objects Q published True Q publish_date__lte datetime now Get top posts Post objects Q featured True Q hits__gte 1000 Q hits__gte 5000 Warning You have to use bitwise operators You can not use or and to combine queries as Qaa or Qbb is not the same as Qaa Qbb As Qaa equates to true Qaa or Qbb is the same as Qaa 259 Atomic updates Documents may be updated atomically by using the update_one update and modify methods on a QuerySet or modify and save with save_condition argument on a Document There are several different modifiers that you may use with these methods set set a particular value unset delete a particular value since MongoDB v13 inc increment a value by a given amount dec decrement a value by a given amount push append a value to a list push_all append several values to a list pop remove the first or last element of a list depending on the value pull remove a value from a list pull_all remove several values from a list add_to_set add value to a list only if its not in the list already The syntax for atomic updates is similar to the querying syntax but the modifier comes before the field not after it post BlogPost title Test page_views 0 tags database post BlogPost objects id post id update_one inc__page_views 1 post reload the document has been changed so we need to reload it post page_views 1 BlogPost objects id post id update_one set__title Example Post post reload post title Example Post BlogPost objects id post id update_one push__tags nosql post reload post tags database nosql Note If no modifier operator is specified the default will be set So the following sentences are identical BlogPost objects id post id update title Example Post BlogPost objects id post id update set__title Example Post Note In version 05 the save runs atomic updates on changed documents by tracking changes to that document The positional operator allows you to update list items without knowing the index position therefore making the update a single atomic operation As we can not use the syntax in keyword arguments it has been mapped to S post BlogPost title Test page_views 0 tags database mongo post BlogPost objects id post id tags mongo update set__tags__S mongodb post reload post tags database mongodb From MongoDB version 26 push operator supports position value which allows to push values with index post BlogPost title Test tags mongo post post update push__tags__0 database code post reload post tags database code mongo Note Currently only top level lists are handled future versions of mongodb pymongo plan to support nested positional operators See The positional operator 2510 Serverside javascript execution Javascript functions may be written and sent to the server for execution The result of this is the return value of the Javascript function This functionality is accessed through the exec_js method on QuerySet objects Pass in a string containing a Javascript function as the first argument The remaining positional arguments are names of fields that will be passed into you Javascript function as its arguments This allows functions to be written that may be executed on any field in a collection eg the sum method which accepts the name of the field to sum over as its argument Note that field names passed in in this manner are automatically translated to the names used on the database set using the name keyword argument to a field constructor Keyword arguments to exec_js are combined into an object called which is available in the Javascript function This may be used for defining specific parameters for your function Some variables are made available in the scope of the Javascript function collection the name of the collection that corresponds to the Document class that is being used this should be used to get the Collection object from db in Javascript code query the query that has been generated by the QuerySet object this may be passed into the method on a Collection object in the Javascript function an object containing the keyword arguments passed into exec_js The following example demonstrates the intended usage of exec_js by defining a function that sums over a field on a document this functionality is already available through sum but is shown here for sake of example def sum_field document field_name include_negatives True code functionsumField var total 00 dbcollectionfindqueryforEachfunctiondoc var val docsumField if val 00 optionsincludeNegatives total val return total includeNegatives include_negatives return document objects exec_js code field_name As fields in MongoEngine may use different names in the database set using the db_field keyword argument to a Field constructor a mechanism exists for replacing MongoEngine field names with the database field names in Javascript code When accessing a field on a collection object use squarebracket notation and prefix the MongoEngine field name with a tilde The field name that follows the tilde will be translated to the name used in the database Note that when referring to fields on embedded documents the name of the EmbeddedDocumentField followed by a dot should be used before the name of the field on the embedded document The following example shows how the substitutions are made class EmbeddedDocument content StringField db_field body class BlogPost Document title StringField db_field doctitle comments ListField EmbeddedDocumentField Comment name cs Returns a list of dictionaries Each dictionary contains a value named document which corresponds to the title field on a BlogPost and comment which corresponds to an individual comment The substitutions made are shown in the comments BlogPost objects exec_js function var comments dbcollectionfindqueryforEachfunctiondoc doccomments doccs var docComments doccomments for var i 0 i docCommentslength i doccommentsi doccsi var comment doccommentsi commentspush doctitle docdoctitle document doctitle commentcommentscontent commentbody comment commentcommentscontent return comments
[ "Querying the database" ]
http://docs.oasis-open.org/odata/odata/v4.0/os/part2-url-conventions/odata-v4.0-os-part2-url-conventions.html
Specification URIs This version httpdocsoasisopenorgodataodatav40ospart2urlconventionsodatav40ospart2urlconventionsdoc Authoritative httpdocsoasisopenorgodataodatav40ospart2urlconventionsodatav40ospart2urlconventionshtml httpdocsoasisopenorgodataodatav40ospart2urlconventionsodatav40ospart2urlconventionspdf Previous version httpdocsoasisopenorgodataodatav40cs01part2urlconventionsodatav40cs01part2urlconventionsdoc Authoritative httpdocsoasisopenorgodataodatav40cs01part2urlconventionsodatav40cs01part2urlconventionshtml httpdocsoasisopenorgodataodatav40cs01part2urlconventionsodatav40cs01part2urlconventionspdf Latest version httpdocsoasisopenorgodataodatav40odatav40part2urlconventionsdoc Authoritative httpdocsoasisopenorgodataodatav40odatav40part2urlconventionshtml httpdocsoasisopenorgodataodatav40odatav40part2urlconventionspdf Technical Committee OASIS Open Data Protocol OData TC Chairs Barbara Hartel barbarahartelsapcom SAP AG Ram Jeyaraman RamJeyaramanmicrosoftcom Microsoft Editors Michael Pizzo mikepmicrosoftcom Microsoft Ralf Handl ralfhandlsapcom SAP AG Martin Zurmuehl martinzurmuehlsapcom SAP AG Additional artifacts This prose specification is one component of a Work Product that also includes OData Version 40 Part 1 Protocol httpdocsoasisopenorgodataodatav40ospart1protocolodatav40ospart1protocolhtml OData Version 40 Part 2 URL Conventions this document httpdocsoasisopenorgodataodatav40ospart2urlconventionsodatav40ospart2urlconventionshtml OData Version 40 Part 3 Common Schema Definition Language CSDL httpdocsoasisopenorgodataodatav40ospart3csdlodatav40ospart3csdlhtml ABNF components OData ABNF Construction Rules Version 40 and OData ABNF Test Cases httpdocsoasisopenorgodataodatav40osabnf Vocabulary components OData Core Vocabulary OData Measures Vocabulary and OData Capabilities Vocabulary httpdocsoasisopenorgodataodatav40osvocabularies XML schemas OData EDMX XML Schema and OData EDM XML Schema httpdocsoasisopenorgodataodatav40osschemas OData Metadata Service Entity Model httpdocsoasisopenorgodataodatav40osmodelsMetadataServiceedmx Related work This specification is related to OData Atom Format Version 40 Edited by Martin Zurmuehl Michael Pizzo and Ralf Handl Latest version httpdocsoasisopenorgodataodataatomformatv40odataatomformatv40html OData JSON Format Version 40 Edited by Ralf Handl Michael Pizzo and Mark Biamonte Latest version httpdocsoasisopenorgodataodatajsonformatv40odatajsonformatv40html Declared XML namespaces httpdocsoasisopenorgodatansedmx httpdocsoasisopenorgodatansedm Abstract The Open Data Protocol OData enables the creation of RESTbased data services which allow resources identified using Uniform Resource Locators URLs and defined in a data model to be published and edited by Web clients using simple HTTP messages This specification defines a set of recommended but not required rules for constructing URLs to identify the data and metadata exposed by an OData service as well as a set of reserved URL query string operators Status This document was last revised or approved by the members of OASIS on the above date The level of approval is also listed above Check the Latest version location noted above for possible later revisions of this document Technical Committee members should send comments on this specification to the Technical Committees email list Others should send comments to the Technical Committee by using the button on the Technical Committees web page at httpswwwoasisopenorgcommitteesodata For information on whether any patents have been disclosed that may be essential to implementing this specification and any offers of patent licensing terms please refer to the Intellectual Property Rights section of the Technical Committee web page httpswwwoasisopenorgcommitteesodataiprphp Citation format When referencing this specification the following citation format should be used ODataPart2 OData Version 40 Part 2 URL Conventions Edited by Michael Pizzo Ralf Handl and Martin Zurmuehl 24 February 2014 OASIS Standard httpdocsoasisopenorgodataodatav40ospart2urlconventionsodatav40ospart2urlconventionshtml Latest version httpdocsoasisopenorgodataodatav40odatav40part2urlconventionshtml Notices Copyright OASIS Open 2014 All Rights Reserved All capitalized terms in the following text have the meanings assigned to them in the OASIS Intellectual Property Rights Policy the OASIS IPR Policy The full may be found at the OASIS website This document and translations of it may be copied and furnished to others and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared copied published and distributed in whole or in part without restriction of any kind provided that the above copyright notice and this section are included on all such copies and derivative works However this document itself may not be modified in any way including by removing the copyright notice or references to OASIS except as needed for the purpose of developing any document or deliverable produced by an OASIS The limited permissions granted above are perpetual and will not be revoked by OASIS or its successors or assigns This document and the information contained herein is provided on an AS IS basis and OASIS DISCLAIMS ALL WARRANTIES EXPRESS OR IMPLIED INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY OWNERSHIP RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE OASIS requests that any OASIS Party or any other party that believes it has patent claims that would necessarily be infringed by implementations of this OASIS Committee Specification or OASIS Standard to notify OASIS TC Administrator and provide an indication of its willingness to grant patent licenses to such patent claims in a manner consistent with the IPR Mode of the OASIS Technical Committee that produced this specification OASIS invites any party to contact the OASIS TC Administrator if it is aware of a claim of ownership of any patent claims that would necessarily be infringed by implementations of this specification by a patent holder that is not willing to provide a license to such patent claims in a manner consistent with the IPR Mode of the OASIS Technical Committee that produced this specification OASIS may include such claims on its website but disclaims any obligation to do so OASIS takes no position regarding the validity or scope of any intellectual property or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available neither does it represent that it has made any effort to identify any such rights Information on OASIS procedures with respect to rights in any document or deliverable produced by an OASIS Technical Committee can be found on the OASIS website Copies of claims of rights made available for publication The name OASIS is a trademark of the owner and developer of this specification and should be used only to refer to the organization and its official outputs OASIS welcomes reference to and implementation and use of specifications while reserving the right to enforce its marks against misleading uses Please see httpswwwoasisopenorgpoliciesguidelinestrademark for above guidance Table of Contents 1 Introduction 11 Terminology 12 Normative References 13 Typographical Conventions 2 URL Components 3 Service Root URL 4 Resource Path 41 Addressing the Model for a Service 42 Addressing the Batch Endpoint for a Service 43 Addressing Entities 431 Canonical URL 432 Canonical URL for Contained Entities 433 URLs for Related Entities with Referential Constraints 434 Resolving an EntityId 44 Addressing References between Entities 45 Addressing Operations 451 Addressing Actions 452 Addressing Functions 46 Addressing a Property 47 Addressing a Property Value 48 Addressing the Count of a Collection 49 Addressing Derived Types 410 Addressing the Media Stream of a Media Entity 411 Addressing the Cross Join of Entity Sets 412 Addressing All Entities in a Service 5 Query Options 51 System Query Options 511 System Query Option filter 5111 Logical Operators 51111 Equals 51112 Not Equals 51113 Greater Than 51114 Greater Than or Equal 51115 Less Than 51116 Less Than or Equal 51117 And 51118 Or 51119 Not 511110 has 511111 Logical Operator Examples 5112 Arithmetic Operators 51121 Addition 51122 Subtraction 51123 Negation 51124 Multiplication 51125 Division 51126 Modulo 51127 Arithmetic Operator Examples 5113 Grouping 5114 Canonical Functions 51141 contains 51142 endswith 51143 startswith 51144 length 51145 indexof 51146 substring 51147 tolower 51148 toupper 51149 trim 511410 concat 511411 year 511412 month 511413 day 511414 hour 511415 minute 511416 second 511417 fractionalseconds 511418 date 511419 time 511420 totaloffsetminutes 511421 now 511422 maxdatetime 511423 mindatetime 511424 totalseconds 511425 round 511426 floor 511427 ceiling 511428 isof 511429 cast 511430 geodistance 511431 geointersects 511432 geolength 5115 Lambda Operators 51151 any 51152 all 5116 Literals 51161 Primitive Literals 51162 Complex and Collection Literals 51163 null 51164 it 51165 root 5117 Path Expressions 5118 Parameter Aliases 5119 Operator Precedence 51110 Numeric Promotion 512 System Query Option expand 513 System Query Option 514 System Query Option orderby 515 System Query Options top and skip 516 System Query Option count 517 System Query Option search 5171 Search Expressions 518 System Query Option format 52 Custom Query Options 53 Parameter Aliases 6 Conformance Appendix A Acknowledgments Appendix B Revision History 1 Introduction The Open Data Protocol OData enables the creation of RESTbased data services which allow resources identified using Uniform Resource Locators URLs and defined in a data model to be published and edited by Web clients using simple HTTP messages This specification defines a set of recommended but not required rules for constructing URLs to identify the data and metadata exposed by an OData service as well as a set of reserved URL query string operators which if accepted by an OData service MUST be implemented as required by this document The ODataAtom and ODataJSON documents specify the format of the resource representations that are exchanged using OData and the ODataProtocol document describes the actions that can be performed on the URLs optionally constructed following the conventions defined in this document embedded in those representations Services are encouraged to follow the URL construction conventions defined in this specification when possible as consistency promotes an ecosystem of reusable client components and libraries 11 Terminology The key words MUST MUST NOT REQUIRED SHALL SHALL NOT SHOULD SHOULD NOT RECOMMENDED MAY and OPTIONAL in this document are to be interpreted as described in RFC2119 12 Normative References ODataABNF OData ABNF Construction Rules Version 40 See the link in Additional artifacts section on cover page ODataAtom OData ATOM Format Version 40 See link in Related work section on cover page ODataCSDL OData Version 40 Part 3 Common Schema Definition Language CSDL See link in Additional artifacts section on cover page ODataJSON OData JSON Format Version 40 See link in Related work section on cover page ODataProtocol OData Version 40 Part 1 Protocol See link in Additional artifacts section on cover page ODataVocCore OData Core Vocabulary See link in Additional artifacts section on cover page RFC2119 Bradner S Key words for use in RFCs to Indicate Requirement Levels BCP 14 RFC 2119 March 1997 httpwwwietforgrfcrfc2119txt RFC3986 BernersLee T Fielding R and L Masinter Uniform Resource Identifier URI Generic Syntax STD 66 RFC 3986 January 2005 httpwwwietforgrfcrfc3986txt RFC5023 Gregorio J Ed and B de hOra Ed The Atom Publishing Protocol RFC 5023 October 2007 httptoolsietforghtmlrfc5023 13 Typographical Conventions Keywords defined by this specification use this monospaced font Normative source code uses this paragraph style Some sections of this specification are illustrated with nonnormative examples Example 1 text describing an example uses this paragraph style Nonnormative examples use this paragraph style All examples in this document are nonnormative and informative only All other text is normative unless otherwise labeled 2 URL Components A URL used by an OData service has at most three significant parts the service root URL resource path and query options Additional URL constructs such as a fragment can be present in a URL used by an OData service however this specification applies no further meaning to such additional constructs Example 2 OData URL broken down into its component parts httphostportpathSampleServicesvcCategories1Productstop2orderbyName __________________________________________________________ __________________ service root URL resource path query options Mandated and suggested content of these three significant URL components used by an OData service are covered in sequence in the three following chapters OData follows the URI syntax rules defined in RFC3986 and in addition assigns special meaning to several of the subdelimiters defined by RFC3986 so special care has to be taken regarding parsing and percentdecoding RFC3986 defines three steps for URL processing that MUST be performed before percentdecoding Split undecoded URL into components scheme hierpart query and fragment at first then first and then first Split undecoded hierpart into authority and path Split undecoded path into path segments at After applying these steps defined by RFC3986 the following steps MUST be performed Split undecoded query at into query options and each query option at the first into query option name and query option value Percentdecode path segments query option names and query option values Interpret path segments query option names and query option values according to OData rules One of these rules is that single quotes within string literals are represented as two consecutive single quotes Example 3 valid OData URLs httphostservicePeopleONeil httphostservicePeople27O2727Neil27 httphostservicePeople2827O2727Neil2729 httphostservice Categories Smartphone2FTablet Example 4 invalid OData URLs httphostservice PeopleONeil httphostservice PeopleO27Neil httphostservice CategoriesSmartphoneTablet The first and second examples are invalid because a single quote in a string literal must be represented as two consecutive single quotes The third example is invalid because forward slashes are interpreted as path segment separators and CategoriesSmartphone is not a valid OData path segment nor is Tablet 3 Service Root URL The service root URL identifies the root of an OData service A GET request to this URL returns the formatspecific service document see ODataJSON and ODataAtom The service document enables simple hypermediadriven clients to enumerate and explore the resources published by the OData service 4 Resource Path The rules for resource path construction as defined in this section are optional OData services SHOULD follow the subsequently described URL path construction rules and are indeed encouraged to do so as such consistency promotes a rich ecosystem of reusable client components and libraries Services that do not follow the resource path conventions for entity container children are strongly encouraged to document their resource paths by annotating entity container children with the term CoreResourcePath defined in ODataVocCore The annotation value is the URL of the annotated resource and may be relative to xmlbase if present otherwise ContentLocation if present otherwise the request URL Resources exposed by an OData service are addressable by corresponding resource path URL components to enable interaction of the client with that resource aspect To illustrate the concept some examples for resources might be customers a single customer orders related to a single customer and so forth Examples of addressable aspects of these resources as exposed by the data model might be collections of entities a single entity properties links operations and so on An OData service MAY respond with 301 Moved Permanently or 307 Temporary Redirect from the canonical URL to the actual URL 41 Addressing the Model for a Service OData services expose their entity model according to ODataCSDL at the metadata URL formed by appending metadata to the service root URL Example 5 Metadata document URL httphostservicemetadata OData services MAY expose their entity model as a service according to ODataCSDL by appending a trailing slash to the metadata document URL Example 6 Metadata service root URL httphostservicemetadata 42 Addressing the Batch Endpoint for a Service OData services that support batch requests expose a batch URL formed by appending batch to the service root URL Example 7 batch URL httphostservicebatch 43 Addressing Entities The basic rules for addressing a collection of entities a single entity within a collection a singleton as well as a property of an entity are covered in the resourcePath syntax rule in ODataABNF Below is a nonnormative snippet from ODataABNF resourcePath entitySetName collectionNavigation singleton singleNavigation actionImportCall entityColFunctionImportCall collectionNavigation entityFunctionImportCall singleNavigation complexColFunctionImportCall collectionPath complexFunctionImportCall complexPath primitiveColFunctionImportCall collectionPath primitiveFunctionImportCall singlePath crossjoin all Since OData has a uniform composable URL syntax and associated rules there are many ways to address a collection of entities including but not limited to Via an entity set see rule entitySetName in ODataABNF Example 8 httphostserviceProducts By navigating a collectionvalued navigation property see rule entityColNavigationProperty By invoking a function that returns a collection of entities see rule entityColFunctionCall Example 9 function with parameters in resource path httphostserviceProductsByCategoryIdcategoryId2 Example 10 function with parameters as query options httphostserviceProductsByColorcolorcolorcolorred By invoking an action that returns a collection of entities see rule actionCall Likewise there are many ways to address a single entity Sometimes a single entity can be accessed directly for example by Invoking a function that returns a single entity see rule entityFunctionCall Invoking an action that returns a single entity see rule actionCall Addressing a singleton Example 11 httphostserviceBestProductEverCreated Often however a single entity is accessed by composing more path segments to a resourcePath that identifies a collection of entities for example by Using an entity key to select a single entity see rules collectionNavigation and keyPredicate Example 12 httphostserviceCategories1 Invoking an action bound to a collection of entities that returns a single entity see rule boundOperation Invoking an function bound to a collection of entities that returns a single entity see rule boundOperation Example 13 httphostserviceProductsModelMostExpensive These rules are recursive so it is possible to address a single entity via another single entity a collection via a single entity and even a collection via a collection examples include but are not limited to By following a navigation from a single entity to another related entity see rule entityNavigationProperty Example 14 httphostserviceProducts1Supplier By invoking a function bound to a single entity that returns a single entity see rule boundOperation Example 15 httphostserviceProducts1ModelMostRecentOrder By invoking an action bound to a single entity that returns a single entity see rule boundOperation By following a navigation from a single entity to a related collection of entities see rule entityColNavigationProperty Example 16 httphostserviceCategories1Products By invoking a function bound to a single entity that returns a collection of entities see rule boundOperation Example 17 httphostserviceCategories1ModelTopTenProducts By invoking an action bound to a single entity that returns a collection of entities see rule boundOperation By invoking a function bound to a collection of entities that returns a collection of entities see rule boundOperation Example 18 httphostserviceCategories1ProductsModelAllOrders By invoking an action bound to a collection of entities that returns a collection of entities see rule boundOperation Finally it is possible to compose path segments onto a resource path that identifies a primitive complex instance collection of primitives or collection of complex instances and bind an action or function that returns an entity or collections of entities 431 Canonical URL For OData services conformant with the addressing conventions in this section the canonical form of an absolute URL identifying a noncontained entity is formed by adding a single path segment to the service root URL The path segment is made up of the name of the entity set associated with the entity followed by the key predicate identifying the entity within the collection No typecast segment is added to the canonical URL even if the entity is an instance of a type derived from the declared entity type of its entity set Example 19 Noncanonical URL httphostserviceCategories1Products1 Example 20 Canonical URL for previous example httphostserviceProducts1 432 Canonical URL for Contained Entities For contained entities ie related via a navigation property that specifies ContainsTargettrue see ODataCSDL the canonical URL is the canonical URL of the containing entity followed by A cast segment if the navigation property is defined on a type derived from the entity type declared for the entity set A path segment for the containment navigation property and If the navigation property returns a collection a key predicate that uniquely identifies the entity in that collection 433 URLs for Related Entities with Referential Constraints If a navigation property leading to a related entity type has a partner navigation property that specifies a referential constraint then those key properties of the related entity that take part in the referential constraint MAY be omitted from URLs Example 21 full key predicate of related entity httpshostserviceOrders1ItemsOrderID1ItemNo2 Example 22 shortened key predicate of related entity httpshostserviceOrders1Items2 The two above examples are equivalent if the navigation property Items from to OrderItem has a partner navigation property from OrderItem to with a referential constraint tying the value of the OrderID key property of the OrderItem to the value of the ID property of the The shorter form that does not specify the constrained key parts redundantly is preferred If the value of the constrained key is redundantly specified then it MUST match the principal key value 434 Resolving an EntityId To resolve an entityid into a representation of the identified entity the client issues a GET request to the entity resource located at the URL entity relative to the service root URL The entityid MUST be specified using the system query option id The entityid may be expressed as an absolute IRI or relative to the service root URL Example 23 request the entity representation for an entityid httphostserviceentityidProducts0 The semantics of entity are covered in the ODataProtocol document 44 Addressing References between Entities OData services are based on a data model that supports relationships as first class constructs For example an OData service could expose a collection of Products entities each of which are related to a Category entity References between entities are addressable in OData just like entities themselves are as described above by appending a navigation property name followed by ref to the entity URL Example 24 URL addressing the references between Categories1 and Products httphostserviceCategories1Productsref Resource paths addressing a single entity reference can be used in DELETE requests to unrelated two entities Resource paths addressing collection of references can be used in DELETE requests if they are followed by the system query option id identifying one of the entity references in the collection The entityid specified by id may be expressed absolute or relative to the request URL For details see ODataProtocol Example 25 two ways of unrelating Categories1 and Products0 DELETE httphostserviceCategories1ProductsrefidProducts0 DELETE httphostserviceProducts0Categoryref 45 Addressing Operations 451 Addressing Actions The semantic rules for addressing and invoking actions are defined in the ODataProtocol document The grammar for addressing and invoking actions is defined by the following syntax grammar rules in ODataABNF The actionImportCall syntax rule defines the grammar in the resourcePath for addressing and invoking an action import directly from the service root The boundActionCall syntax rule defines the grammar in the resourcePath for addressing and invoking an action that is appended to a resourcePath that identifies some resources that can be used as the binding parameter value when invoking the action The boundOperation syntax rule which encompasses the boundActionCall syntax rule when used by the resourcePath syntax rule illustrates how a boundActionCall can be appended to a resourcePath 452 Addressing Functions The semantic rules for addressing and invoking functions are defined in the ODataProtocol document The grammar for addressing and invoking functions is defined by a number syntax grammar rules in ODataABNF in particular The function import call syntax rules complexFunctionImportCall complexColFunctionImportCall entityFunctionImportCall entityColFunctionImportCall primitiveFunctionImportCall and primitiveColFunctionImportCall define the grammar in the resourcePath for addressing and providing parameters for a function import directly from the service root The bound function call syntax rules boundComplexFunctionCall boundComplexColFunctionCall boundEntityFunctionCall boundEntityColFunctionCall boundPrimitiveFunctionCall and boundPrimitiveColFunctionCall define the grammar in the resourcePath for addressing and providing parameters for a function that is appended to a resourcePath that identifies some resources that can be used as the binding parameter value when invoking the function The boundOperation syntax rule which encompasses the bound function call syntax rules when used by the resourcePath syntax rule illustrates how a bound function call can be appended to a resourcePath The functionExpr and boundFunctionExpr syntax rules as used by the filter and orderby syntax rules define the grammar for invoking functions to help filter and order resources identified by the resourcePath of the URL The aliasAndValue syntax rule defines the grammar for providing function parameter values using Parameter Alias Syntax see ODataProtocol 46 Addressing a Property To address an entity property clients append a path segment containing the property name to the URL of the entity If the property has a complex type value properties of that value can be addressed by further property name composition 47 Addressing a Property Value To address the raw value of a primitive property clients append a path segment containing the string value to the property URL Properties of type EdmStream already return the raw value of the media stream and do not support appending the value segment 48 Addressing the Count of a Collection To address the raw value of the number of items in a collection clients append count to the resource path of the URL identifying the entity set or collection Example 26 the number of related entities httphostserviceCategories1Productscou nt Example 27 the number of entities in an entity set httphostserviceProductscoun t Example 28 entity count in a filter expression Note that the spaces around gt are for readability of the example only in real URLs they must be percentencoded as 20 httphostserviceCategoriesfilterProductscount gt 0 Example 29 entity count in an orderby expression httphostserviceCategoriesorderbyProducts count 49 Addressing Derived Types Any resource path or path expression identifying a collection of entities or complex type instances can be appended with a path segment containing the qualified name of a type derived from the declared type of the collection The result will be restricted to instances of the derived type and may be empty Any resource path or path expression identifying a single entity or complex type instance can be appended with a path segment containing the qualified name of a type derived from the declared type of the identified resource If used in a resource path and the identified resource is not an instance of the derived type the request will result in a 404 Not Found response If used in a path expression that is part of a Boolean expression the type cast will evaluate to null Example 30 entity set restricted to VipCustomer instances httphostserviceCustomersModelVipCustomer Example 31 entity restricted to a VipCustomer instance resulting in 404 Not Found if the customer with key 1 is not a VipCustomer httphostservice CustomersModelVipCustomer1 httphostservice Customers1ModelVipCustomer Example 32 cast the complex property Address to its derived type DetailedAddress then get a property of the derived type httphostserviceCustomers1AddressModelDetailedAddressLocation Example 33 filter expression with type cast will evaluate to null for all non VipCustomer instances and thus return only instances of VipCustomer httphostserviceCustomers filterModelVipCustomerPercentageOfVipPromotionProductsOrdered gt 80 Example 34 expand the single related Customer only if it is an instance of ModelVipCustomer For tomany relationships only ModelVipCustomer instances would be inlined httphostserviceOrdersexpandCustomerModelVipCustomer 410 Addressing the Media Stream of a Media Entity To address the media stream represented by a media entity clients append value to the resource path of the media entity URL Services may redirect from this canonical URL to the source URL of the media stream Example 35 request the media stream for the picture with the key value Sunset4321299432 httphostservicePicturesSunset4321299432value 411 Addressing the Cross Join of Entity Sets In addition to querying related entities through navigation properties defined in the entity model of a service the cross join operator allows querying across unrelated entity sets The cross join is addressed by appending the path segment crossjoin to the service root URL followed by the parenthesized commaseparated list of joined entity sets It returns the Cartesian product of all the specified entity sets represented as a collection of instances of a virtual complex type Each instance consists of one nonnullable singlevalued navigation property per joined entity set Each such navigation property is named identical to the corresponding entity set with a target type equal to the declared entity type of the corresponding entity set The filter and orderby query options can be specified using properties of the entities in the selected entity sets prepended with the entity set as the navigation property name The expand query option can be specified using the names of the selected entity sets as navigation property names If a selected entity set is not expanded it MUST be represented using the read URL of the related entity as a navigation link in the complex type instance The count skip and top query options can also be used with no special semantics Example 36 if Sales had a structural property ProductID instead of a navigation property Product a cross join between Sales and Products could be addressed httphostservicecrossjoinProductsSales filterProductsID eq SalesProductID and would result in odatacontexthttphostservicemetadata CollectionEdmComplexType value ProductsodatanavigationLinkProducts0 SalesodatanavigationLinkSales42 ProductsodatanavigationLinkProducts0 SalesodatanavigationLinkSales57 ProductsodatanavigationLinkProducts99 SalesodatanavigationLinkSales21 412 Addressing All Entities in a Service The symbolic resource all located at the service root identifies the collection of all entities in a service ie the union of all entity sets plus all singletons This symbolic resource is of type CollectionEdmEntityType and allows the search system query option plus all other query options applicable to collections of entities Example 37 all entities in a service httphostserviceall 5 Query Options The query options part of an OData URL specifies three types of information system query options custom query options and parameter aliases All OData services MUST follow the query string parsing and construction rules defined in this section and its subsections 51 System Query Options System query options are query string parameters that control the amount and order of the data returned for the resource identified by the URL The names of all system query options are prefixed with a dollar character For GET requests the following rules apply Resource paths identifying a single entity a complex type instance a collection of entities or a collection of complex type instances allow expand and Resource paths identifying a collection allow filter count orderby skip and top Resource paths identifying a collection of entities allow search Resource paths not ending in count or batch allow format For POST requests to an action URL the return type of the action determines the applicable system query options that a service MAY support following the same rules as GET requests POST requests to entity sets as well as all PUT and DELETE requests do not allow system query options An OData service may support some or all of the system query options defined If a data service does not support a system query option it MUST reject any request that contains the unsupported option The same system query option MUST NOT be specified more than once for any resource The semantics of all system query options are defined in the ODataProtocol document The grammar and syntax rules for system query options are defined in ODataABNF Dynamic properties can be used in the same way as declared properties If they are not defined on an instance they evaluate to null 511 System Query Option filter The filter system query option allows clients to filter a collection of resources that are addressed by a request URL The expression specified with filter is evaluated for each resource in the collection and only items where the expression evaluates to true are included in the response Resources for which the expression evaluates to false or to null or which reference properties that are unavailable due to permissions are omitted from the response The ODataABNF filter syntax rule defines the formal grammar of the filter query option 5111 Logical Operators OData defines a set of logical operators that evaluate to true or false ie a boolCommonExpr as defined in ODataABNF Logical operators are typically used to filter a collection of resources Operands of collection entity and complex types are not supported in logical operators The syntax rules for the logical operators are defined in ODataABNF The six comparison operators can be used with all primitive values except EdmBinary EdmStream and the EdmGeo types 51111 Equals The eq operator returns true if the left operand is equal to the right operand otherwise it returns false The null value is equal to itself and only to itself 51112 Not Equals The ne operator returns true if the left operand is not equal to the right operand otherwise it returns false The null value is not equal to any value but itself 51113 Greater Than The gt operator returns true if the left operand is greater than the right operand otherwise it returns false If any operand is null the operator returns false For Boolean values true is greater than false 51114 Greater Than or Equal The ge operator returns true if the left operand is greater than or equal to the right operand otherwise it returns false If only one operand is null the operator returns false If both operands are null it returns true because null is equal to itself 51115 Less Than The lt operator returns true if the left operand is less than the right operand otherwise it returns false If any operand is null the operator returns false 51116 Less Than or Equal The le operator returns true if the left operand is less than or equal to the right operand otherwise it returns false If only one operand is null the operator returns false If both operands are null it returns true because null is equal to itself 51117 And The and operator returns true if both the left and right operands evaluate to true otherwise it returns false The null value is treated as unknown so if one operand evaluates to null and the other operand to false the and operator returns false All other combinations with null return null 51118 Or The or operator returns false if both the left and right operands both evaluate to false otherwise it returns true The null value is treated as unknown so if one operand evaluates to null and the other operand to true the or operator returns true All other combinations with null return null 51119 Not The not operator returns true if the operand returns false otherwise it returns false The null value is treated as unknown so not null returns null 511110 has The has operator returns true if the right hand operand is an enumeration value whose flags are set on the left operand The null value is treated as unknown so if one operand evaluates to null the has operator returns null 511111 Logical Operator Examples The following examples illustrate the use and semantics of each of the logical operators Example 38 all products with a Name equal to Milk httphostserviceProductsfilterName eq Milk Example 39 all products with a Name not equal to Milk httphostserviceProductsfilterName ne Milk Example 40 all products with a Name greater than Milk httphostserviceProductsfilterName gt Milk Example 41 all products with a Name greater than or equal to Milk httphostserviceProductsfilterName ge Milk Example 42 all products with a Name less than Milk httphostserviceProductsfilterName lt Milk Example 43 all products with a Name less than or equal to Milk httphostserviceProductsfilterName le Milk Example 44 all products with the Name Milk that also have a Price less than 255 httphostserviceProductsfilterName eq Milk and Price lt 255 Example 45 all products that either have the Name Milk or have a Price less than 255 httphostserviceProductsfilterName eq Milk or Price lt 255 Example 46 all products that do not have a Name that ends with ilk httphostserviceProductsfilternot endswithNameilk 47 all products whose style value includes Yellow httphostserviceProductsfilterstyle has SalesPatternYellow 5112 Arithmetic Operators OData defines a set of arithmetic operators that require operands that evaluate to numeric types Arithmetic operators are typically used to filter a collection of resources However services MAY allow using arithmetic operators with the orderby system query option If an operand of an arithmetic operator is null the result is null The syntax rules for the arithmetic operators are defined in ODataABNF 51121 Addition The add operator adds the left and right numeric operands The add operator is also valid for the following timerelated operands DateTimeOffset add Duration results in a DateTimeOffset Duration add Duration results in a Duration Date add Duration results in a DateTimeOffset 51122 Subtraction The sub operator subtracts the right numeric operand from the left numeric operand The sub operator is also valid for the following timerelated operands DateTimeOffset sub Duration results in a DateTimeOffset Duration sub Duration results in a Duration DateTimeOffset sub DateTimeOffset results in a Duration Date sub Duration results in a DateTimeOffset Date sub Date results in a Duration 51123 Negation The negation operator represented by a minus sign changes the sign of its numeric or Duration operand 51124 Multiplication The mul operator multiplies the left and right numeric operands 51125 Division The div operator divides the left numeric operand by the right numeric operand If the right operand is zero and the left operand is neither of type EdmSingle nor EdmDouble the request fails If the left operand is of type EdmSingle or EdmDouble then positive div zero returns INF negative div zero returns INF and zero div zero returns NaN 51126 Modulo The mod operator returns the remainder when the left integral operand is divided by the right integral operand If the right operand is negative the sign of the result is the same as the sign of the left operand If the right operand is zero the request fails 51127 Arithmetic Operator Examples The following examples illustrate the use and semantics of each of the Arithmetic operators Example 48 all products with a Price of 255 httphostserviceProductsfilterPrice add 245 eq 500 Example 49 all products with a Price of 255 httphostserviceProductsfilterPrice sub 055 eq 200 Example 50 all products with a Price of 255 httphostserviceProductsfilterPrice mul 20 eq 510 Example 51 all products with a Price of 255 httphostserviceProductsfilterPrice div 255 eq 1 Example 52 all products with a Rating exactly divisible by 5 httphostserviceProductsfilterRating mod 5 eq 0 5113 Grouping The Grouping operator open and close parenthesis controls the evaluation order of an expression The Grouping operator returns the expression grouped inside the parenthesis Example 53 all products because 9 mod 3 is 0 httphostserviceProductsfilter4 add 5 mod 4 sub 1 eq 0 5114 Canonical Functions In addition to operators a set of functions is also defined for use with the filter or orderby system query options The following sections describe the available functions Note ISNULL or COALESCE operators are not defined Instead OData defines a null literal that can be used in comparisons If a parameter of a canonical function is null the function returns null The syntax rules for all functions are defined in ODataABNF 51141 contains The contains function has the following signature EdmBoolean containsEdmStringEdmString The contains function returns true if the second parameter string value is a substring of the first parameter string value otherwise it returns false The containsMethodCallExpr syntax rule defines how the contains function is invoked Example 54 all customers with a CompanyName that contains Alfreds httphostservice CustomersfiltercontainsCompanyNameAlfreds 51142 endswith The endswith function has the following signature EdmBoolean endswithEdmStringEdmString The endswith function returns true if the first parameter string value ends with the second parameter string value otherwise it returns false The endsWithMethodCallExpr syntax rule defines how the endswith function is invoked Example 55 all customers with a CompanyName that ends with Futterkiste httphostserviceCustomersfilterendswithCompanyNameFutterkiste 51143 startswith The startswith function has the following signature EdmBoolean startswithEdmStringEdmString The startswith function returns true if the first parameter string value starts with the second parameter string value otherwise it returns false The startsWithMethodCallExpr syntax rule defines how the startswith function is invoked Example 56 all customers with a CompanyName that starts with Alfr httphostserviceCustomersfilterstartswithCompanyNameAlfr 51144 length The length function has the following signature EdmInt32 lengthEdmString The length function returns the number of characters in the parameter value The lengthMethodCallExpr syntax rule defines how the length function is invoked Example 57 all customers with a CompanyName that is 19 characters long httphostserviceCustomersfilterlengthCompanyName eq 19 51145 indexof The indexof function has the following signature EdmInt32 indexofEdmStringEdmString The indexof function returns the zerobased character position of the first occurrence of the second parameter value in the first parameter value The indexOfMethodCallExpr syntax rule defines how the indexof function is invoked Example 58 all customers with a CompanyName containing lfreds starting at the second character httphostserviceCustomersfilterindexofCompanyNamelfreds eq 1 51146 substring The substring function has consists of two overloads with the following signatures EdmString substringEdmStringEdmInt32 EdmString substringEdmStringEdmInt32EdmInt32 The two argument substring function returns a substring of the first parameter string value starting at the Nth character and finishing at the last character where N is the second parameter integer value The three argument substring function returns a substring of the first parameter string value identified by selecting M characters starting at the Nth character where N is the second parameter integer value and M is the third parameter integer value The substringMethodCallExpr syntax rule defines how the substring functions are invoked Example 59 all customers with a CompanyName of lfreds Futterkiste once the first character has been removed httphostserviceCustomers filtersubstringCompanyName 1 eq lfreds Futterkiste Example 60 all customers with a CompanyName that has lf as the second and third characters httphostserviceCustomersfiltersubstringCompanyName12 eq lf 51147 tolower The tolower function has the following signature EdmString tolowerEdmString The tolower function returns the input parameter string value with all uppercase characters converted to lowercase according to Unicode rules The toLowerMethodCallExpr syntax rule defines how the tolower function is invoked Example 61 all customers with a CompanyName that equals alfreds futterkiste once any uppercase characters have been converted to lowercase httphostserviceCustomers filtertolowerCompanyName eq alfreds futterkiste 51148 toupper The toupper function has the following signature EdmString toupperEdmString The toupper function returns the input parameter string value with all lowercase characters converted to uppercase according to Unicode rules The toUpperMethodCallExpr syntax rule defines how the toupper function is invoked Example 62 all customers with a CompanyName that equals ALFREDS FUTTERKISTE once any lowercase characters have been converted to uppercase httphostserviceCustomers filtertoupper CompanyName eq ALFREDS FUTTERKISTE 51149 trim The trim function has the following signature EdmString trimEdmString The trim function returns the input parameter string value with all leading and trailing whitespace characters according to Unicode rules removed The trimMethodCallExpr syntax rule defines how the trim function is invoked Example 63 all customers with a CompanyName without leading or trailing whitespace characters httphostserviceCustomersfiltertrimCompanyName eq CompanyName 511410 concat The concat function has the following signature EdmString concatEdmStringEdmString The concat function returns a string that appends the second input parameter string value to the first The concatMethodCallExpr syntax rule defines how the concat function is invoked Example 64 all customers from Berlin Germany httphostserviceCustomers filterconcatconcatCity Country eq Berlin Germany 511411 year The year function has the following signatures EdmInt32 yearEdmDate EdmInt32 yearEdmDateTimeOffset The year function returns the year component of the Date or DateTimeOffset parameter value evaluated in the time zone of the DateTimeOffset parameter value The yearMethodCallExpr syntax rule defines how the year function is invoked Services that are unable to preserve the offset of EdmDateTimeOffset values and instead normalize the values to some common time zone ie UTC MUST fail evaluation of the year function for literal EdmDateTimeOffset values that are not stated in the time zone of the normalized values Example 65 all employees born in 1971 httphostservice Employees filteryearBirthDate eq 1971 511412 month The month function has the following signatures EdmInt32 monthEdmDate EdmInt32 monthEdmDateTimeOffset The month function returns the month component of the Date or DateTimeOffset parameter value evaluated in the time zone of the DateTimeOffset parameter value The monthMethodCallExpr syntax rule defines how the month function is invoked Services that are unable to preserve the offset of EdmDateTimeOffset values and instead normalize the values to some common time zone ie UTC MUST fail evaluation of the month function for literal EdmDateTimeOffset values that are not stated in the time zone of the normalized values Example 66 all employees born in May httphostserviceEmployeesfiltermonthBirthDate eq 5 511413 day The day function has the following signatures EdmInt32 dayEdmDate EdmInt32 dayEdmDateTimeOffset The day function returns the day component Date or DateTimeOffset parameter value evaluated in the time zone of the DateTimeOffset parameter value The dayMethodCallExpr syntax rule defines how the day function is invoked Services that are unable to preserve the offset of EdmDateTimeOffset values and instead normalize the values to some common time zone ie UTC MUST fail evaluation of the day function for literal EdmDateTimeOffset values that are not stated in the time zone of the normalized values Example 67 all employees born on the 8th day of a month httphostserviceEmployeesfilterdayBirthDate eq 8 511414 hour The hour function has the following signatures EdmInt32 hourEdmDateTimeOffset EdmInt32 hourEdmTimeOfDay The hour function returns the hour component of the DateTimeOffset or TimeOfDay parameter value evaluated in the time zone of the DateTimeOffset parameter value The hourMethodCallExpr syntax rule defines how the hour function is invoked Services that are unable to preserve the offset of EdmDateTimeOffset values and instead normalize the values to some common time zone ie UTC MUST fail evaluation of the hour function for literal EdmDateTimeOffset values that are not stated in the time zone of the normalized values Example 68 all employees born in the 4th hour of a day httphostserviceEmployeesfilterhourBirthDate eq 4 511415 minute The minute function has the following signatures EdmInt32 minuteEdmDateTimeOffset EdmInt32 minuteEdmTimeOfDay The minute function returns the minute component of the DateTimeOffset or TimeOfDay parameter value evaluated in the time zone of the DateTimeOffset parameter value The minuteMethodCallExpr syntax rule defines how the minute function is invoked Example 69 all employees born in the 40th minute of any hour on any day httphostserviceEmployeesfilterminuteBirthDate eq 40 511416 second The second function has the following signatures EdmInt32 secondEdmDateTimeOffset EdmInt32 secondEdmTimeOfDay The second function returns the second component without the fractional part of the DateTimeOffset or TimeOfDay parameter value The secondMethodCallExpr syntax rule defines how the second function is invoked Example 70 all employees born in the 40th second of any minute of any hour on any day httphostserviceEmployeesfiltersecondBirthDate eq 40 511417 fractionalseconds The fractionalseconds function has the following signatures EdmDecimal fractionalseconds EdmDateTimeOffset EdmDecimal fractionalsecondsEdmTimeOfDay The fractionalseconds function returns the fractional seconds component of the DateTimeOffset or TimeOfDay parameter value as a nonnegative decimal value less than 1 The fractionalsecondsMethodCallExpr syntax rule defines how the fractionalseconds function is invoked Example 71 all employees born less than 100 milliseconds after a full second of any minute of any hour on any day httphostserviceEmployeesfilter fractionalseconds BirthDate lt 01 511418 date The date function has the following signature EdmDate dateEdmDateTimeOffset The date function returns the date part of the DateTimeOffset parameter value evaluated in the time zone of the DateTimeOffset parameter value 511419 time The time function has the following signature EdmTimeOfDay timeEdmDateTimeOffset The time function returns the time part of the DateTimeOffset parameter value evaluated in the time zone of the DateTimeOffset parameter value Services that are unable to preserve the offset of EdmDateTimeOffset values and instead normalize the values to some common time zone ie UTC MUST fail evaluation of the time function for literal EdmDateTimeOffset values that are not stated in the time zone of the normalized values 511420 totaloffsetminutes The totaloffsetminutes function has the following signature EdmInt32 totaloffsetminutesEdmDateTimeOffset The totaloffsetminutes function returns the signed number of minutes in the time zone offset part of the DateTimeOffset parameter value evaluated in the time zone of the DateTimeOffset parameter value 511421 now The now function has the following signature EdmDateTimeOffset now The now function returns the current point in time date and time with time zone as a DateTimeOffset value Services are free to choose the time zone for the current point eg UTC Services that are unable to preserve the offset of EdmDateTimeOffset values and instead normalize the values to some common time zone SHOULD return a value in the normalized time zone ie UTC 511422 maxdatetime The maxdatetime function has the following signature EdmDateTimeOffset maxdatetime The maxdatetime function returns the latest possible point in time as a DateTimeOffset value 511423 mindatetime The mindatetime function has the following signature EdmDateTimeOffset mindatetime The mindatetime function returns the earliest possible point in time as a DateTimeOffset value 511424 totalseconds The totalseconds function has the following signature EdmDecimal totalsecondsEdmDuration The totalseconds function returns the duration of the value in total seconds including fractional seconds 511425 round The round function has the following signatures EdmDouble roundEdmDouble EdmDecimal roundEdmDecimal The round function rounds the input numeric parameter to the nearest numeric value with no decimal component The midpoint between two integers is rounded away from zero ie 05 is rounded to 1 and 05 is rounded to 1 The roundMethodCallExpr syntax rule defines how the round function is invoked Example 72 all orders with freight costs that round to 32 httphostserviceOrdersfilterroundFreight eq 32 511426 floor The floor function has the following signatures EdmDouble floorEdmDouble EdmDecimal floorEdmDecimal The floor function rounds the input numeric parameter down to the nearest numeric value with no decimal component The floorMethodCallExpr syntax rule defines how the floor function is invoked Example 73 all orders with freight costs that round down to 32 httphostserviceOrdersfilterfloorFreight eq 32 511427 ceiling The ceiling function has the following signatures EdmDouble ceilingEdmDouble EdmDecimal ceilingEdmDecimal The ceiling function rounds the input numeric parameter up to the nearest numeric value with no decimal component The ceilingMethodCallExpr syntax rule defines how the ceiling function is invoked Example 74 all orders with freight costs that round up to 32 httphostserviceOrdersfilterceilingFreight eq 32 511428 isof The isof function has the following signatures EdmBoolean isoftype EdmBoolean isofexpressiontype The single parameter isof function returns true if the current instance is assignable to the type specified otherwise it returns false The two parameter isof function returns true if the object referred to by the expression is assignable to the type specified otherwise it returns false The isofExpr syntax rule defines how the isof function is invoked Example 75 orders that are also BigOrders httphostserviceOrdersfilterisofNorthwindModelBigOrder httphostserviceOrdersfilterisofitNorthwindModelBigOrder Example 76 orders of a customer that is a VIPCustomer httphostserviceOrdersfilterisofCustomerNorthwindModelVIPCustomer 511429 cast The cast function has the following signatures EdmAny casttype EdmAny castexpressiontype The single parameter cast function returns the current instance cast to the type specified The twoparameter cast function returns the object referred to by the expression cast to the type specified The cast function follows these rules The null value can be cast to any type Primitive types are cast to EdmString or a type definition based on it by using the literal representation used in payloads and WKT wellknown text format for Geo types see rules fullCollectionLiteral fullLineStringLiteral fullMultiPointLiteral fullMultiLineStringLiteral fullMultiPolygonLiteral fullPointLiteral and fullPolygonLiteral in ODataABNF The cast fails if the target type specifies an insufficient MaxLength Numeric primitive types are cast to each other with appropriate rounding The cast fails if the integer part doesnt fit into target type EdmDateTimeOffset EdmDuration and EdmTimeOfDay values can be cast to the same type with a different precision with appropriate rounding Collections are cast item by item Services MAY support structural casting of entities and complex type instances to a derived type or arbitrary structured type by assigning values of identically named properties and casting them recursively The cast fails if one of the propertyvalue casts fails or the target type contains nonnullable properties that have not been assigned a value The cast function is optional for primitive values first three rules If the cast fails the cast function returns null 511430 geodistance The geodistance function has the following signatures EdmDouble geodistanceEdmGeographyPointEdmGeographyPoint EdmDouble geodistanceEdmGeometryPointEdmGeometryPoint The geodistance function returns the shortest distance between the two points in the coordinate reference system signified by the two points SRIDs 511431 geointersects The geointersects function has the following signatures EdmBoolean geointersectsEdmGeographyPointEdmGeographyPolygon EdmBoolean geointersectsEdmGeometryPointEdmGeometryPolygon The geointersects function returns true if the specified point lies within the interior or on the boundary of the specified polygon otherwise it returns false 511432 geolength The geolength function has the following signatures EdmDouble geolengthEdmGeographyLineString EdmDouble geolengthEdmGeometryLineString The geolength
[ "OASIS", "URL Conventions" ]
http://docs.opencv.org/doc/tutorials/core/mat_the_basic_image_container/mat_the_basic_image_container.html
Mat - The Basic Image Container ΒΆ Goal ΒΆ We have multiple ways to acquire digital images from the real world : digital cameras , scanners , computed tomography , and magnetic resonance imaging to name a few . In every case what we ( humans ) see are images . However , when transforming this to our digital devices what we record are numerical values for each of the points of the image . For example in the above image you can see that the mirror of the car is nothing more than a matrix containing all the intensity values of the pixel points . How we get and store the pixels values may vary according to our needs , but in the end all images inside a computer world may be reduced to numerical matrices and other information describing the matrix itself . OpenCV is a computer vision library whose main focus is to process and manipulate this information . Therefore , the first thing you need to be familiar with is how OpenCV stores and handles images . Mat OpenCV has been around since 2001 . In those days the library was built around a C interface and to store the image in the memory they used a C structure called IplImage . This is the one you ’ ll see in most of the older tutorials and educational materials . The problem with this is that it brings to the table all the minuses of the C language . The biggest issue is the manual memory management . It builds on the assumption that the user is responsible for taking care of memory allocation and deallocation . While this is not a problem with smaller programs , once your code base grows it will be more of a struggle to handle all this rather than focusing on solving your development goal Luckily C++ came around and introduced the concept of classes making easier for the user through automatic memory management ( more or less ) . The good news is that C++ is fully compatible with C so no compatibility issues can arise from making the change . Therefore , OpenCV 2.0 introduced a new C++ interface which offered a new way of doing things which means you do not need to fiddle with memory management , making your code concise ( less to write , to achieve more ) . The main downside of the C++ interface is that many old methods ( unless you ’ re a masochist programmer and you ’ re asking for trouble ) . The first thing you need to know about Mat is that you no longer need to manually allocate its memory and release it as soon as you do not need it . While doing this is still a possibility , most of the OpenCV functions will allocate its output data automatically . As a nice bonus if you pass on an already existing object , which has already allocated the required space for the matrix , this will be reused . In other words we use at all times only as much memory as we need to perform the task . is basically a class with two data parts : the matrix header ( containing information such as the size of the matrix , the method used for storing , at which address is the matrix stored , and so on ) and a pointer to the matrix containing the pixel values ( taking any dimensionality depending on the method chosen for storing ) . The matrix header size is constant , however the size of the matrix itself may vary from image to image and usually is larger by orders of magnitude . OpenCV is an image processing library . It contains a large collection of image processing functions . To solve a computational challenge , most of the time you will end up using multiple functions of the library . Because of this , passing images to functions is a common practice . We should not forget that we are talking about image processing algorithms , which tend to be quite computationally heavy . The last thing we want to do is further decrease the speed of your program by making unnecessary copies of potentially large images . To tackle this issue OpenCV uses a reference counting system . The idea is that each object has its own header , however the matrix may be shared between two instance of them by having their matrix pointers point to the same address . Moreover , the copy operators will only copy the headers and the pointer to the large matrix , not the data itself . 1 2 3 4 5 6 A C / / creates just the header parts A = imread argv 1 ] , CV_LOAD_IMAGE_COLOR ) ; / / here we ' ll know the method used ( allocate matrix ) B ) ; / / Use the copy constructor = / / Assignment operator All the above objects , in the end , point to the same single data matrix . Their headers are different , however , and making a modification using any of them will affect all the other ones as well . In practice the different objects just provide different access method to the same underlying data . Nevertheless , their header parts are different . The real interesting part is that you can create headers which refer to only a subsection of the full data . For example , to create a region of interest ( ROI ) in an image you just create a new header with the new boundaries : 1 2 D Rect 10 10 100 100 / / using a rectangle E Range : : all ( ) , Range 1 3 ) ) ; / / using row and column boundaries Now you may ask if the matrix itself may belong to multiple objects who takes responsibility for cleaning it up when it ’ s no longer needed . The short answer is : the last object that used it . This is handled by using a reference counting mechanism . Whenever somebody copies a header of a object , a counter is increased for the matrix . Whenever a header is cleaned this counter is decreased . When the counter reaches zero the matrix too is freed . Sometimes you will want to copy the matrix itself too , so OpenCV provides the clone ( ) and copyTo ( ) functions . 1 2 3 F clone ( ) ; G copyTo G Now modifying F or will not affect the matrix pointed by the header . What you need to remember from all this is that : Output image allocation for OpenCV functions is automatic ( unless specified otherwise ) . You do not need to think about memory management with OpenCVs C++ interface . The assignment operator and the copy constructor only copies the header . The underlying matrix of an image may be copied using the clone ( ) and copyTo ( ) functions . Storing methods This is about how you store the pixel values . You can select the color space and the data type used . The color space refers to how we combine color components in order to code a given color . The simplest one is the gray scale where the colors at our disposal are black and white . The combination of these allows us to create many shades of gray . For colorful ways we have a lot more methods to choose from . Each of them breaks it down to three or four basic components and we can use the combination of these to create the others . The most popular one is RGB , mainly because this is also how our eye builds up colors . Its base colors are red , green and blue . To code the transparency of a color sometimes a fourth element : alpha ( A ) is added . There are , however , many other color systems each with their own advantages : RGB is the most common as our eyes use something similar , but keep in mind that the OpenCV display system uses BGR colors . The HSV and HLS decompose colors into their hue , saturation and value / luminance components , which is a more natural way for us to describe colors . You might , for example , dismiss the value component , making your algorithm less sensitive to the light conditions of the input image . YCrCb is used by the popular JPEG image format . CIE L * a * b * is a perceptually uniform color space , which comes handy if you need to measure the distance of a given color to another color . Each of the color components has its own valid domains . This brings us to the data type used : how we store a component defines the control we have over its domain . The smallest data type possible is char , which means one byte or 8 bits . This may be unsigned ( so can store values from 0 to 255 ) or signed ( values from - 127 to + 127 ) . Although in the case of three components ( such as BGR ) this already gives 16 million representable colors . We may acquire an even finer control by using the float ( 4 byte = 32 bit ) or double ( 8 byte = 64 bit ) data types for each component . Nevertheless , remember that increasing the size of a component also increases Creating a object explicitly In the Load , Modify , and Save an Image tutorial you have already learned how to write a matrix to an image file by using the imwrite ( ) function . However , for debugging purposes it ’ s much more convenient to see the actual values . You can do this using the < < operator of . Be aware that this only works for two dimensional matrices . Although works really well as an image container , it is also a general matrix class . Therefore , it is possible to create and manipulate multidimensional matrices . You can create a Mat object in multiple ways : Mat ( ) Constructor M 2 2 CV_8UC3 Scalar 0 0 255 ) ) ; cout < < " M = " < < endl " " M endl For two dimensional and multichannel images we first define their size : row and column count wise . Then we need to specify the data type to use for storing the elements and the number of channels per matrix point . To do this we have multiple definitions constructed according to the following convention : CV_ The number of bits per item ] [ Signed or Unsigned ] [ Type Prefix The channel number For instance , CV_8UC3 means we use unsigned char types that are 8 bit long and each pixel has three of these to form the three channels . These are predefined for up to four channel numbers . The Scalar is a four element short vector . Specify this and you can initialize all matrix points with a custom value . If you need more , you can create the type with the upper macro , setting the channel number in parentheses as shown below . Use C / C++ arrays and initialize via constructor int sz 3 } ; L sz CV_8UC ) , : : all The above example shows how to create a matrix with more than two dimensions . Specify the number of dimensions , then pass a pointer containing the size for each dimension , and the rest remains the same . Create a header for an already existing IplImage pointer : IplImage img cvLoadImage " greatwave . png " mtx img / / convert IplImage * - > Mat Create ( ) function : create 4 4 CV_8UC cout " M = " " " You can not initialize the matrix values with this construction . It will only reallocate its matrix data memory if the new size will not fit into the old one . MATLAB style initializers : zeros ( ) ones ( ) eye ( ) . Specify the size and data type to use : E eye CV_64F " E = " O ones CV_32F " O = " O Z zeros CV_8UC1 " Z = " Z For small matrices you may use comma separated initializers : Mat_ < double > 5 " C = " Create a new header for an existing object and or it . RowClone row ) . clone ( ) ; " RowClone = " RowClone Note You can fill out a matrix with random values using the randu ( ) function . You need to give the lower and upper value for the random values : R randu R ) , 255 Output formatting In the previous examples you saw the default formatting option . OpenCV , however , allows you to format your matrix output : Default " R ( default ) = " Python " R ( python ) = " format " python " Comma separated values ( CSV ) " R ( csv ) = " format " csv " Numpy " R ( numpy ) = " " numpy " " R ( c ) = " " C " Output of other common items Other common OpenCV data structures can also be output via the < < operator : 2D Point Point2f P 5 " Point ( 2D ) = " P 3D Point Point3f P3f 6 7 " Point ( 3D ) = " P3f std : : vector via cv : : Mat vector < float > v v push_back float CV_PI push_back 3.01f " Vector of floats via Mat = " std : : vector of points vector Point2f vPoints 20 for size_t i i vPoints size + + ( ( ) ( ) ( 7 " A vector of 2D Points = " Most of the samples here have been included in a small console application . You can download it from here or in the core section of the cpp samples . You can also find a quick video demonstration of this on YouTube Your browser does not currently recognize any of the video formats available . Click here to visit our frequently asked questions about HTML5 video .
[ "Mat", "Basic Image Container", "digital devices" ]
http://docs.oracle.com/cd/B19306_01/server.102/b14200/functions050.htm
EXTRACT ( datetime ) Syntax extract_datetime : : = Description of the illustration extract_datetime . gif Purpose EXTRACT extracts and returns the value of a specified datetime field from a datetime or interval value expression . When you extract a TIMEZONE_REGION or TIMEZONE_ABBR ( abbreviation ) , the value returned is a string containing the appropriate time zone name or abbreviation . When you extract any of the other values , the value returned is in the Gregorian calendar . When extracting from a datetime with a time zone value , the value returned is in UTC . For a listing of time zone names and their corresponding abbreviations , query the V $ TIMEZONE_NAMES dynamic performance view . This function can be very useful for manipulating datetime field values in very large tables , as shown in the first example below . Note : Timezone region names are needed by the daylight savings feature . The region names are stored in two time zone files . The default time zone file is a small file containing only the most common time zones to maximize performance . If your time zone is not in the default file , then you will not have daylight savings support until you provide a path to the complete ( larger ) file by way of the ORA_TZFILE environment variable . Some combinations of datetime field and datetime or interval value expression result in ambiguity . In these cases , Oracle Database returns UNKNOWN ( see the examples that follow for additional information ) . The field you are extracting must be a field of the datetime_value_expr or interval_value_expr . For example , you can extract only YEAR MONTH , and DAY from a DATE value . Likewise , you can extract TIMEZONE_HOUR and TIMEZONE_MINUTE only from the TIMESTAMP WITH TIME ZONE datatype . See Also : Oracle Database Administrator ' s Guide for more information about setting the ORA_TZFILE environment variable Oracle Database Globalization Support Guide . for a complete listing of the timezone region names in both files " Datetime / Interval Arithmetic " for a description of datetime_value_expr and interval_value_expr Oracle Database Reference for information on the dynamic performance views Examples The following example returns from the oe . orders table the number of orders placed in each month : SELECT EXTRACT ( month FROM order_date ) " Month " , COUNT ( order_date ) " No . of Orders " FROM orders GROUP BY EXTRACT ( month FROM order_date ) ORDER BY " No . of Orders " DESC ; Month No . of Orders - - - - - - - - - - - - - - - - - - - - - - - 11 15 7 14 6 14 3 11 5 10 9 9 2 9 8 7 10 6 1 5 12 4 4 1 12 rows selected . The following example returns the year 1998 . SELECT EXTRACT ( YEAR FROM DATE ' 1998 - 03 - 07 ' ) FROM DUAL ; EXTRACT ( YEARFROMDATE ' 1998 - 03 - 07 ' ) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1998 The following example selects from the sample table hr . employees all employees who were hired after 1998 : SELECT last_name , employee_id , hire_date FROM employees WHERE EXTRACT ( YEAR FROM TO_DATE ( hire_date , ' DD - MON - RR ' ) ) > 1998 ORDER BY hire_date ; LAST_NAME EMPLOYEE_ID HIRE_DATE - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Landry 127 14 - JAN - 99 Lorentz 107 07 - FEB - 99 Cabrio 187 07 - FEB - The following example results in ambiguity , so Oracle returns UNKNOWN SELECT EXTRACT ( TIMEZONE_REGION FROM TIMESTAMP ' 1999 - 01 - 01 10 : 00 : 00 - 08 : 00 ' ) FROM DUAL ; EXTRACT ( TIMEZONE_REGIONFROMTIMESTAMP ' 1999 - 01 - 0110 : 00 : 00 - 08 : 00 ' ) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - The ambiguity arises because the time zone numerical offset is provided in the expression , and that numerical offset may map to more than one time zone region . Previous Page Page 90 of 479 Next Page
[ "EXTRACT", "datetime" ]
http://docs.oracle.com/cd/B19306_01/server.102/b14200/functions181.htm
TO_CHAR ( number ) Syntax to_char_number : : = Description of the illustration to_char_number . gif Purpose TO_CHAR ( number ) converts n to a value of VARCHAR2 datatype , using the optional number format fmt . The value n can be of type NUMBER BINARY_FLOAT , or BINARY_DOUBLE . If you omit fmt , then is converted to a VARCHAR2 value exactly long enough to hold its significant digits . Please refer to " Format Models " for information on number formats . The ' nlsparam ' argument specifies these characters that are returned by number format elements : Decimal character Group separator Local currency symbol International currency symbol This argument can have this form : ' NLS_NUMERIC_CHARACTERS = ' ' dg ' ' NLS_CURRENCY = ' ' text ' ' NLS_ISO_CURRENCY = territory The characters d and g represent the decimal character and group separator , respectively . They must be different single - byte characters . Within the quoted string , you must use two single quotation marks around the parameter values . Ten characters are available for the currency symbol . If you omit ' nlsparam ' or any one of the parameters , then this function uses the default parameter values for your session . Examples The following statement uses implicit conversion to combine a string and a number into a number : SELECT TO_CHAR ( ' 01110 ' + 1 ) FROM dual ; TO_C - - - - 1111 Compare this example with the first example for TO_CHAR ( character ) In the next example , the output is blank padded to the left of the currency symbol . SELECT TO_CHAR ( - 10000 , ' L99G999D99MI ' ) " Amount " FROM DUAL ; Amount - - - - - - - - - - - - - - $ 10,000.00 - SELECT TO_CHAR ( - 10000 , ' L99G999D99MI ' , ' NLS_NUMERIC_CHARACTERS = ' ' , . ' ' NLS_CURRENCY = ' ' AusDollars ' ' ' ) " Amount " FROM DUAL ; Amount - - - - - - - - - - - - - - - - - - - AusDollars10 . 000 , 00 - In the optional number format L designates local currency symbol and MI designates a trailing minus sign . See Table 2 - 17 , " Matching Character Data and Format Models with the FX Format Model Modifier " for a complete listing of number format elements . Previous Page Page 221 of 479 Next Page
[ "TO_CHAR", "number", "Decimal character" ]
http://docs.oracle.com/cd/B19306_01/server.102/b14200/queries004.htm
The UNION [ ALL ] , INTERSECT , MINUS Operators You can combine multiple queries using the set operators UNION UNION ALL INTERSECT , and MINUS . All set operators have equal precedence . If a SQL statement contains multiple set operators , then Oracle Database evaluates them from the left to right unless parentheses explicitly specify another order . The corresponding expressions in the select lists of the component queries of a compound query must match in number and must be in the same datatype group ( such as numeric or character ) . If component queries select character data , then the datatype of the return values are determined as follows : If both queries select values of datatype CHAR of equal length , then the returned values have datatype CHAR of that length . If the queries select values of with different lengths , then the returned value is VARCHAR2 with the length of the larger value . If either or both of the queries select values of datatype VARCHAR2 , then the returned values have datatype If component queries select numeric data , then the datatype of the return values is determined by numeric precedence : If any query selects values of type BINARY_DOUBLE , then the returned values have datatype BINARY_DOUBLE If no query selects values of type but any query selects values of type BINARY_FLOAT BINARY_FLOAT If all queries select values of type NUMBER NUMBER In queries using set operators , Oracle does not perform implicit conversion across datatype groups . Therefore , if the corresponding expressions of component queries resolve to both character data and numeric data , Oracle returns an error . See Also : Table 2 - 10 , " Implicit Type Conversion Matrix " for more information on implicit conversion and " Numeric Precedence " for information on numeric precedence Examples The following query is valid : SELECT 3 FROM DUAL INTERSECT SELECT 3f FROM DUAL ; This is implicitly converted to the following compound query : SELECT TO_BINARY_FLOAT ( 3 ) FROM DUAL INTERSECT SELECT 3f FROM DUAL ; The following query returns an error : SELECT ' 3 ' FROM DUAL INTERSECT SELECT 3f FROM DUAL ; Restrictions on the Set Operators The set operators are subject to the following restrictions : The set operators are not valid on columns of type BLOB CLOB BFILE VARRAY , or nested table . The INTERSECT , and MINUS operators are not valid on LONG columns . If the select list preceding the set operator contains an expression , then you must provide a column alias for the expression in order to refer to it in the order_by_clause You can not also specify the for_update_clause with the set operators . You can not specify the order_by_clause in the subquery of these operators . You can not use these operators in SELECT statements containing TABLE collection expressions . Note : To comply with emerging SQL standards , a future release of Oracle will give the operator greater precedence than the other set operators . Therefore , you should use parentheses to specify order of evaluation in queries that use the operator with other set operators . UNION Example The following statement combines the results of two queries with the operator , which eliminates duplicate selected rows . This statement shows that you must match datatype ( using the TO_CHAR function ) when columns do not exist in one or the other table : SELECT location_id , department_name " Department " , TO_CHAR ( NULL ) " Warehouse " FROM departments UNION SELECT location_id , TO_CHAR ( NULL ) " Department " , warehouse_name FROM warehouses ; LOCATION_ID Department Warehouse - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1400 IT 1400 Southlake , Texas UNION ALL Example The operator returns only distinct rows that appear in either result , while the ALL operator returns all rows . The operator does not eliminate duplicate selected rows : SELECT product_id FROM order_items UNION SELECT product_id FROM inventories ; SELECT location_id FROM locations UNION ALL SELECT location_id FROM departments ; A location_id value that appears multiple times in either or both queries ( such as ' 1700 ' ) is returned only once by the operator , but multiple times by the operator . INTERSECT Example The following statement combines the results with the operator , which returns only those rows returned by both queries : SELECT product_id FROM inventories INTERSECT SELECT product_id FROM order_items ; MINUS Example The following statement combines results with the operator , which returns only unique rows returned by the first query but not by the second : SELECT product_id FROM inventories MINUS SELECT product_id FROM order_items ; Previous Page Page 316 of 479 Next Page
[ "Operators", "INTERSECT", "MINUS" ]
http://docs.oracle.com/cd/B19306_01/server.102/b14200/statements_7002.htm
CREATE TABLE Purpose Us e the CREATE TABLE statement to create one of the following types of tables : A relational table , which is the basic structure to hold user data . An object table , which is a table that uses an object type for a column definition . An object table is explicitly defined to hold object instances of a particular type . You can also create an object type and then use it in a column when creating a relational table . Tables are created with no data unless a subquery is specified . You can add rows to a table with the INSERT statement . After creating a table , you can define additional columns , partitions , and integrity constraints with the ADD clause of the ALTER TABLE statement . You can change the definition of an existing column or partition with the MODIFY clause of the ALTER statement . See Also : Oracle Database Application Developer ' s Guide - Fundamentals Oracle Database Administrator ' s Guide , and CREATE TYPE for more information about creating objects ALTER TABLE and DROP TABLE for information on modifying and dropping tables Additional Topics Prerequisites Syntax Semantics Examples Prerequisites To create a relational table in your own schema , you must have the CREATE system privilege . To create a table in another user ' s schema , you must have the ANY system privilege . Also , the owner of the schema to contain the table must have either space quota on the tablespace to contain the table or the UNLIMITED TABLESPACE system privilege . In addition to these table privileges , to create an object table or a relational table with an object type column , the owner of the table must have the EXECUTE object privilege in order to access all types referenced by the table , or you must have the EXECUTE ANY TYPE system privilege . These privileges must be granted explicitly and not acquired through a role . Additionally , if the table owner intends to grant access to the table to other users , then the owner must have been granted the object privilege on the referenced types WITH GRANT OPTION , or have the TYPE system privilege WITH ADMIN OPTION . Without these privileges , the table owner has insufficient privileges to grant access to the table to other users . To enable a unique or primary key constraint , you must have the privileges necessary to create an index on the table . You need these privileges because Oracle Database creates an index on the columns of the unique or primary key in the schema containing the table . To create an external table , you must have the required read and write operating system privileges on the appropriate operating system directories . You must have the READ object privilege on the database directory object corresponding to the operating system directory in which the external data resides . You must also have the WRITE object privilege on the database directory in which the files will reside if you specify a log file or bad file in the opaque_format_spec or if you unload data into an external table from a database table by specifying the AS subquery clause . See Also : CREATE INDEX Oracle Database Application Developer ' s Guide - Fundamentals for more information about the privileges required to create tables using types Syntax create_table : : = Description of the illustration create_table . gif relational_table : : = object_table : : = XMLType_table : : = relational_table Description of the illustration relational_table . gif Note : Each of the clauses following the table name is optional for any given relational table . However , for every table you must at least specify either column names and datatypes using the relational_properties clause or an AS subquery clause using the table_properties clause . relational_properties physical_properties table_properties object_table Description of the illustration object_table . gif object_table_substitution object_properties oid_clause oid_index_clause physical_properties XMLType_table Description of the illustration XMLType_table . gif XMLType_storage XMLSchema_spec oid_clause oid_index_clause Description of the illustration relational_properties . gif column_definition constraint supplemental_logging_props column_definition Description of the illustration column_definition . gif encryption_spec constraint encryption_spec Description of the illustration encryption_spec . gif object_table_substitution Description of the illustration object_table_substitution . gif object_properties Description of the illustration object_properties . gif supplemental_logging_props Description of the illustration oid_clause . gif Description of the illustration oid_index_clause . gif physical_attributes_clause Description of the illustration physical_properties . gif segment_attributes_clause table_compression index_org_table_clause external_table_clause segment_attributes_clause Description of the illustration segment_attributes_clause . gif physical_attributes_clause logging_clause Description of the illustration physical_attributes_clause . gif storage_clause table_compression Description of the illustration table_compression . gif Description of the illustration table_properties . gif column_properties table_partitioning_clauses parallel_clause enable_disable_clause row_movement_clause column_properties Description of the illustration column_properties . gif object_type_col_properties nested_table_col_properties varray_col_properties LOB_storage_clause LOB_partition_storage XMLType_column_properties object_type_col_properties Description of the illustration object_type_col_properties . gif substitutable_column_clause Description of the illustration substitutable_column_clause . gif nested_table_col_properties Description of the illustration nested_table_col_properties . gif substitutable_column_clause varray_col_properties Description of the illustration varray_col_properties . gif LOB_parameters LOB_storage_clause Description of the illustration LOB_storage_clause . gif LOB_parameters Description of the illustration LOB_parameters . gif storage_clause logging_clause Description of the illustration logging_clause . gif LOB_partition_storage Description of the illustration LOB_partition_storage . gif XMLType_column_properties Description of the illustration XMLType_column_properties . gif XMLType_storage XMLSchema_spec Description of the illustration XMLType_storage . gif Description of the illustration XMLSchema_spec . gif row_movement_clause Description of the illustration row_movement_clause . gif index_org_table_clause Description of the illustration index_org_table_clause . gif mapping_table_clauses key_compression index_org_overflow_clause mapping_table_clauses Description of the illustration mapping_table_clauses . gif key_compression Description of the illustration key_compression . gif index_org_overflow_clause Description of the illustration index_org_overflow_clause . gif Description of the illustration supplemental_logging_props . gif supplemental_log_grp_clause Description of the illustration supplemental_log_grp_clause . gif supplemental_id_key_clause Description of the illustration supplemental_id_key_clause . gif external_table_clause Description of the illustration external_table_clause . gif external_data_properties external_data_properties Description of the illustration external_data_properties . gif opaque_format_spec : See Oracle Database Utilities for information on how to specify values for the . ) table_partitioning_clauses Description of the illustration table_partitioning_clauses . gif range_partitioning hash_partitioning list_partitioning composite_partitioning range_partitioning Description of the illustration range_partitioning . gif range_values_clause table_partition_description hash_partitioning Description of the illustration hash_partitioning . gif individual_hash_partitions hash_partitions_by_quantity list_partitioning Description of the illustration list_partitioning . gif list_values_clause table_partition_description composite_partitioning Description of the illustration composite_partitioning . gif subpartition_by_list subpartition_by_hash range_values_clause subpartition_by_hash Description of the illustration subpartition_by_hash . gif subpartition_template individual_hash_partitions Description of the illustration individual_hash_partitions . gif partitioning_storage_clause hash_partitions_by_quantity Description of the illustration hash_partitions_by_quantity . gif subpartition_by_list Description of the illustration subpartition_by_list . gif subpartition_template Description of the illustration subpartition_template . gif list_values_clause partitioning_storage_clause Description of the illustration range_values_clause . gif Description of the illustration list_values_clause . gif Description of the illustration table_partition_description . gif partition_level_subpartition partition_level_subpartition Description of the illustration partition_level_subpartition . gif subpartition_spec subpartition_spec Description of the illustration subpartition_spec . gif Description of the illustration partitioning_storage_clause . gif parallel_clause Description of the illustration parallel_clause . gif enable_disable_clause Description of the illustration enable_disable_clause . gif using_index_clause , exceptions_clause not supported in statements ) using_index_clause Description of the illustration using_index_clause . gif create_index index_properties index_properties Description of the illustration index_properties . gif global_partitioned_index local_partitioned_index - - part of INDEX index_attributes , domain_ind ex_clause : not supported in index_attributes Description of the illustration index_attributes . gif : not supported in Semantics relational_table GLOBAL TEMPORARY Specify GLOBAL TEMPORARY to indicate that the table is temporary and that its definition is visible to all sessions with appropriate privileges . The data in a temporary table is visible only to the session that inserts the data into the table . When you first create a temporary table , its table metadata is stored in the data dictionary , but no space is allocated for table data . Space is allocated for the table segment at the time of the first DML operation on the table . The temporary table definition persists in the same way as the definitions of regular tables , but the table segment and any data the table contains are either session - specific or transaction - specific data . You specify whether the table segment and data are session - or transaction - specific with the ON COMMIT keywords . You can perform DDL operations ( such as DROP INDEX ) on a temporary table only when no session is bound to it . A session becomes bound to a temporary table by performing an INSERT operation on the table . A session becomes unbound to the temporary table by issuing a TRUNCATE statement or at session termination , or , for a transaction - specific temporary table , by issuing a COMMIT or ROLLBACK statement . Oracle Database Concepts for information on temporary tables and " Temporary Table Example " Restrictions on Temporary Tables Temporary tables are subject to the following restrictions : Temporary tables can not be partitioned , clustered , or index organized . You can not specify any foreign key constraints on temporary tables . Temporary tables can not contain columns of nested table . You can not specify the following clauses of the TABLESPACE , or Parallel DML and parallel queries are not supported for temporary tables . Parallel hints are ignored . Specification of the returns an error . You can not specify the , or Distributed transactions are not supported for temporary tables . schema Specify the schema to contain the table . If you omit schema , then the database creates the table in your own schema . table Specify the name of the table or object table to be created . " General Examples " The relational properties describe the components of a relational table . The lets you define the characteristics of the column . column Specify the name of a column of the table . If you also specify , then you can omit column and datatype unless you are creating an index - organized table . If you specify when creating an index - organized table , then you must specify , and you must omit datatype The absolute maximum number of columns in a table is 1000 . However , when you create an object table or a relational table with columns of object , nested table , varray , or REF type , Oracle Database maps the columns of the user - defined types to relational columns , in effect creating hidden columns that count toward the 1000 - column limit . Specify the datatype of a column . Notes on Table Column Datatypes The following notes apply to the datatypes of table columns : If you specify , then you can omit . If you are creating an index - organized table and you specify , then you must omit the datatype . You can also omit if the statement designates the column as part of a foreign key in a referential integrity constraint . Oracle Database automatically assigns to the column the datatype of the corresponding column of the referenced key of the referential integrity constraint . Do not create a table with LONG columns . Use LOB columns ( CLOB NCLOB BLOB ) instead . LONG columns are supported only for backward compatibility . Restriction on Table Column Datatypes You can specify a column of type ROWID , but Oracle Database does not guarantee that the values in such columns are valid rowids . " Datatypes " for information on columns and on Oracle - supplied datatypes SORT The SORT keyword is valid only if you are creating this table as part of a hash cluster and only for columns that are also cluster columns . This clause instructs the database to sort the rows of the cluster on this column before applying the hash function . Doing so may improve response time during subsequent operations on the clustered data . " CLUSTER Clause " for information on creating a cluster table DEFAULT DEFAULT clause lets you specify a value to be assigned to the column if a subsequent statement omits a value for the column . The datatype of the expression must match the datatype of the column . The column must also be long enough to hold this expression . DEFAULT expression can include any SQL function as long as the function does not return a literal argument , a column reference , or a nested function invocation . Restriction on Default Column Values A expression can not contain references to PL / SQL functions or to other columns , the pseudocolumns CURRVAL NEXTVAL LEVEL PRIOR , and ROWNUM , or date constants that are not fully specified . " About SQL Expressions " for the syntax of expr ENCRYPT ENCRYPT clause lets you use the transparent data encryption feature to encrypt the column you are defining . You can encrypt columns of type CHAR NCHAR VARCHAR2 NVARCHAR2 NUMBER DATE RAW . The data does not appear in its encrypted form to authorized users , such as the user who encrypts the column . Note : Column encryption requires that a system administrator with appropriate privileges has initialized the security module , opened a wallet , and set an encryption key . Please refer to Oracle Advanced Security Administrator ' s Guide for general information on encryption and to alter_system_security_clauses for related SYSTEM statements . USING ' encrypt_algorithm Use this clause to specify the name of the algorithm to be used . Valid algorithms are 3DES168 AES128 AES192 AES256 . If you omit this clause , the database uses AES192 . If you encrypt more than one column in the same table , and if you specify the USING clause for one of the columns , you must specify the same encryption algorithm for all the encrypted columns . IDENTIFIED BY password If you specify this clause , the database derives the column key from the specified password . SALT | NO SALT By default the database appends a random string , called " salt " , to the clear text of the column before encrypting it . If you want to use the column as an index key , you must specify NO SALT . Please refer to Oracle Advanced Security Administrator ' s Guide for a description of " salt " in this context . Restrictions on the ENCRYPT clause : The following restrictions apply to column encryption : To encrypt a column in an external table , the table must use ORACLE_DATAPUMP as its access type . You can not encrypt a column in tables owned by SYS You can not encrypt a foreign key column . for more information about transparent data encryption Constraint Clauses Use these clauses to create constraints on the table columns . You must specify a PRIMARY KEY constraint for an index - organized table , and it can not be DEFERRABLE . Please refer to for syntax and description of these constraints as well as examples . inline_ref_constraint out_of_line_ref_constraint These clauses let you describe a column of type REF . The only difference between these clauses is that you specify out_of_line_ref_constraint from the table level , so you must identify the column or attribute you are defining . Specify inline_ref_constraint as part of the definition of the column or attribute . " REF Constraint Examples " inline_constrai nt Use the inline_constraint to define an integrity constraint as part of the column definition . You can create UNIQUE PRIMARY KEY REFERENCES constraints on scalar attributes of object type columns . You can also create NOT NULL constraints on object type columns and CHECK constraints that reference object type columns or any attribute of an object type column . out_of_line_constraint Use the out_of_line_constraint syntax to define an integrity constraint as part of the table definition . supplemental_logging_props clause lets you instruct the database to put additional data into the log stream to support log - based tools . supplemental_log_grp_clause Use this clause to create a named log group . NO LOG clause lets you omit from the redo log one or more columns that would otherwise be included in the redo for the named log group . You must specify at least one fixed - length column without LOG in the named log group . If you specify ALWAYS , then during an update , the database includes in the redo all columns in the log group . This is called an unconditional log group ( sometimes called an " always log group " ) , because Oracle Database supplementally logs all the columns in the log group when the associated row is modified . If you omit ALWAYS , then the database supplementally logs all the columns in the log group only if any column in the log group is modified . This is called a conditional log group You can query the appropriate USER_ ALL_ DBA_LOG_GROUP_COLUMNS data dictionary view to determine whether any supplemental logging has already been specified . supplemental_id_key_clause Use this clause to specify that all or a combination of the primary key , unique key , and foreign key columns should be supplementally logged . Oracle Database will generate either an unconditional log group or a conditional log group . With an unconditional log group , the database supplementally logs all the columns in the log group when the associated row is modified . With a conditional log group , the database supplementally logs all the columns in the log group only if any column in the log group is modified . ALL COLUMNS , then the database includes in the redo log all the fixed - length maximum size columns of that row . Such a redo log is a system - generated unconditional log group . COLUMNS , then for all tables with a primary key , the database places into the redo log all columns of the primary key whenever an update is performed . Oracle Database evaluates which columns to supplementally log as follows : First the database chooses columns of the primary key constraint , if the constraint is validated or marked RELY and is not marked as DISABLED INITIALLY DEFERRED If no primary key columns exist , then the database looks for the smallest UNIQUE index with at least one NOT NULL column and uses the columns in that index . If no such index exists , then the database supplementally logs all scalar columns of the table . , then for all tables with a unique key or a bitmap index , if any of the unique key or bitmap index columns are modified , the database places into the redo log all other columns belonging to the unique key or bitmap index . Such a log group is a system - generated conditional log group . FOREIGN , then for all tables with a foreign key , if any foreign key columns are modified , the database places into the redo log all other columns belonging to the foreign key . Such a redo log is a system - generated conditional log group . If you specify this clause multiple times , then the database creates a separate log group for each specification . You can query the appropriate USER_ ALL_ DBA_LOG_GROUPS data dictionary view to determine whether any supplemental logging data has already been specified . ON COMMIT ON clause is relevant only if you are creating a temporary table . This clause specifies whether the data in the temporary table persists for the duration of a transaction or a session . DELETE ROWS Specify DELETE ROWS for a transaction - specific temporary table . This is the default . Oracle Database will truncate the table ( delete all its rows ) after each commit . PRESERVE ROWS PRESERVE ROWS for a session - specific temporary table . Oracle Database will truncate the table ( delete all its rows ) when you terminate the session . The physical properties relate to the treatment of extents and segments and to the storage characteristics of the table . segment_attributes_clause lets you specify physical attributes and tablespace storage for the table . lets you specify the value of the PCTFREE PCTUSED INITRANS parameters and the storage characteristics of the table . For a nonpartitioned table , each parameter and storage characteristic you specify determines the actual physical attribute of the segment associated with the table . For partitioned tables , the value you specify for the parameter or storage characteristic is the default physical attribute of the segments associated with all partitions specified in this statement ( and in subsequent . . . ADD PARTITION statements ) , unless you explicitly override that value in the PARTITION clause of the statement that creates the partition . If you omit this clause , then Oracle Database sets PCTFREE to 10 , PCTUSED to 40 , and INITRANS to 1 . for a description of these clauses " Storage Example " TABLESPACE Specify the tablespace in which Oracle Database creates the table , object table OIDINDEX , partition , LOB data segment , LOB index segment , or index - organized table overflow data segment . If you omit , then the database creates that item in the default tablespace of the owner of the schema containing the table . For a heap - organized table with one or more LOB columns , if you omit the clause for LOB storage , then the database creates the LOB data and index segments in the tablespace where the table is created . For an index - organized table with one or more LOB columns , if you omit , then the LOB data and index segments are created in the tablespace in which the primary key index segment of the index - organized table is created . For nonpartitioned tables , the value specified for is the actual physical attribute of the segment associated with the table . For partitioned tables , the value specified for is the default physical attribute of the segments associated with all partitions specified in the statement and on subsequent . . . statements , unless you specify in the description . CREATE TABLESPACE for more information on tablespaces logging_clause Specify whether the creation of the table and of any indexes required because of constraints , partition , or LOB storage characteristics will be logged in the redo log file ( LOGGING ) or not ( NOLOGGING ) .The logging attribute of the table is independent of that of its indexes . This attribute also specifies whether subsequent direct loader ( SQL * Loader ) and direct - path operations against the table , partition , or LOB storage are logged ( LOGGING ) or not logged ( NOLOGGING ) . Please refer to for a full description of this clause . clause is valid only for heap - organized tables . Use this clause to instruct the database whether to compress data segments to reduce disk use . This clause is especially useful in environments such as data warehouses , where the amount of insert and update operations is small . The COMPRESS keyword enables table compression . The NOCOMPRESS keyword disables table compression . NOCOMPRESS is the default . When you enable table compression , Oracle Database attempts to compress data during direct - path operations when it is productive to do so . The original import utility ( imp ) does not support direct - path , and therefore can not import data in a compressed format . You can specify table compression for the following portions of a heap - organized table : For an entire table , in the clause of For a range partition , in the of the clause For a list partition , in the of the clause For the storage table of a nested table , in the " Conventional and Direct - Path INSERT " for information on direct - path operations , including restrictions Oracle Database Performance Tuning Guide for information on calculating the compression ratio and to Oracle Data Warehousing Guide for information on table compression usage scenarios Restrictions on Table Compression Table compression is subject to the following restrictions : Table compression is not supported for tables with more than 255 columns . LOB data segments are not compressed . You can not specify table compression for an index - organized table , any overflow segment or partition of an overflow segment , or any mapping table segment of an index - organized table . You can not define table compression explicitly for hash partitions or hash and list subpartitions . The table compression attribute for those partitions is inherited from the tablespace , the table , or the table partition setting . You can not specify table compression for external tables or for tables that are part of a cluster . RECOVERABLE | UNRECOVERABLE These keywords are deprecated and have been replaced with , respectively . Although RECOVERABLE UNRECOVERABLE are supported for backward compatibility , Oracle strongly recommends that you use the keywords . Restrictions on [ UN ] RECOVERABLE This clause is subject to the following restrictions : You can not specify RECOVERABLE for partitioned tables or LOB storage characteristics . You can not specify UNRECOVERABLE for partitioned or index - organized tables . You can specify only with ORGANIZATION ORGANIZATION clause lets you specify the order in which the data rows of the table are stored . HEAP HEAP indicates that the data rows of table are stored in no particular order . This is the default . indicates that is created as an index - organized table . In an index - organized table , the data rows are held in an index defined on the primary key for the table . EXTERNAL EXTERNAL indicates that table is a read - only table located outside the database . " External Table Example " to create an index - organized table . Oracle Database maintains the table rows , both primary key column values and nonkey column values , in an index built on the primary key . Index - organized tables are therefore best suited for primary key - based access and manipulation . An index - organized table is an alternative to : A noncluster table indexed on the primary key by using the statement A cluster table stored in an indexed cluster that has been created using the CLUSTER statement that maps the primary key for the table to the cluster key You must specify a primary key for an index - organized table , because the primary key uniquely identifies a row . The primary key can not be DEFERRABLE . Use the primary key instead of the rowid for directly accessing index - organized rows . If an index - organized table is partitioned and contains LOB columns , then you should specify the first , then the , and then the appropriate You can not use the TO_LOB function to convert a column to a LOB column in the subquery of a SELECT statement if you are creating an index - organized table . Instead , create the index - organized table without the column , and then use the TO_LOB function in an SELECT " Index - Organized Table Example " Restrictions on Index - Organized Tables Index - organized tables are subject to the following restrictions : You can not specify a column of type ROWID for an index - organized table . You can not specify the composite_partitioning_clause for an index - organized table . PCTTHRESHOLD integer Specify the percentage of space reserved in the index block for an index - organized table row . PCTTHRESHOLD must be large enough to hold the primary key . All trailing columns of a row , starting with the column that causes the specified threshold to be exceeded , are stored in the overflow segment . PCTTHRESHOLD must be a value from 1 to 50 . If you do not specify , the default is 50 . Restriction on PCTTHRESHOLD for individual partitions of an index - organized table . MAPPING to instruct the database to create a mapping of local to physical s and store them in a heap - organized table . This mapping is needed in order to create a bitmap index on the index - organized table . If the index - organized table is partitioned , then the mapping table is also partitioned and its partitions have the same name and physical attributes as the base table partitions . Oracle Database creates the mapping table or mapping table partition in the same tablespace as its parent index - organized table or partition . You can not query , perform DML operations on , or modify the storage characteristics of the mapping table or its partitions . clauses let you enable or disable key compression for index - organized tables . COMPRESS to enable key compression , which eliminates repeated occurrence of primary key column values in index - organized tables . Use integer to specify the prefix length , which is the number of prefix columns to compress . The valid range of prefix length values is from 1 to the number of primary key columns minus 1 . The default prefix length is the number of primary key columns minus 1 . to disable key compression in index - organized tables . This is the default . Restriction on Key Compression of Index - organized Tables At the partition level , you can specify , but you can not specify the prefix length with lets you instruct the database that index - organized table data rows exceeding the specified threshold are placed in the data segment specified in this clause . When you create an index - organized table , Oracle Database evaluates the maximum size of each column to estimate the largest possible row . If an overflow segment is needed but you have not specified OVERFLOW , then the database raises an error and does not execute the statement . This checking function guarantees that subsequent DML operations on the index - organized table will not fail because an overflow segment is lacking . All physical attributes and storage characteristics you specify in this clause after the OVERFLOW keyword apply only to the overflow segment of the table . Physical attributes and storage characteristics for the index - organized table itself , default values for all its partitions , and values for individual partitions must be specified before this keyword . If the index - organized table contains one or more LOB columns , then the LOBs will be stored out - of - line unless you specify , even if they would otherwise be small enough be to stored inline . If is partitioned , then the database equipartitions the overflow data segments with the primary key index segments . INCLUDING column_name Specify a column at which to divide an index - organized table row into index and overflow portions . The primary key columns are always stored in the index . column_name can be either the last primary key column or any non primary key column . All non primary key columns that follow are stored in the overflow data segment . If an attempt to divide a row at causes the size of the index portion of the row to exceed the specified or default value , then the database breaks up the row based on the value . Restriction on the INCLUDING Clause You can not specify this clause for individual partitions of an index - organized table . external_table_clause to create an external table , which is a read - only table whose metadata is stored in the database but whose data in stored outside the database . Among other capabilities , external tables let you query data without first loading it into the database . Oracle Data Warehousing Guide Oracle Database Administrator ' s Guide Oracle Database Utilities for information on the uses for external tables Because external tables have no data in the database , you define them with a small subset of the clauses normally available when creating tables . Within the clause , you can specify only Within the physical_properties_clause , you can specify only the organization of the table ( ORGANIZATION ) . clause , you can specify only the . The lets you parallelize subsequent queries on the external data and subsequent operations that populate the external table . You can populate the external table at create time by using the No other clauses are permitted in the same " External Table Example " ALTER TABLE " PROJECT COLUMN Clause " for information on the effect of changing the default property of the column projection Restrictions on External Tables External tables are subject to the following restrictions : An external table can not be a temporary table . You can not specify constraints on an external table . An external table can not have object type , varray , or columns . However , you can populate LOB columns of an external table with varray or data from an internal database table . TYPE access_driver_type indicates the access driver of the external table . The access driver is the API that interprets the external data for the database . Oracle Database provides two access drivers : ORACLE_LOADER ORACLE_DATAPUMP . If you do not specify , then the database uses ORACLE_LOADER as the default access driver . You must specify the access driver if you specify the clause to unload data from one Oracle Database and reload it into the same or a different Oracle Database . for information about the access drivers DEFAULT DIRECTORY DIRECTORY lets you specify a default directory object corresponding to a directory on the file system where the external data sources may reside . The default directory can also be used by the access driver to store auxiliary files such as error logs . ACCESS PARAMETERS The optional ACCESS PARAMETERS clause lets you assign values to the parameters of the specific access driver for this external table . lets you list the parameters and their values . Please refer to for information on how to specify values for the Field names specified in the must match columns in the table definition . Oracle Database ignores any field in the that is not matched by a column in the table definition . USING CLOB lets you derive the parameters and their values through a subquery . The subquery can not contain any set operators or an ORDER BY clause . It must return one row containing a single item of datatype Whether you specify the parameters in an or derive them using a subquery , the database does not interpret anything in this clause . It is up to the access driver to interpret this information in the context of the external data . LOCATION LOCATION clause lets you specify one or more external data sources . Usually the location_specifier is a file , but it need not be . Oracle Database does not interpret this clause . It is up to the access driver to interpret this information in the context of the external data . You can not use wildcards in the location_specifier to specify multiple files . REJECT LIMIT REJECT LIMIT clause lets you specify how many conversion errors can occur during a query of the external data before an Oracle Database error is returned and the query is aborted . The default value is 0 . CLUSTER Clause CLUSTER clause indicates that the table is to be part of cluster . The columns listed in this clause are the table columns that correspond to the cluster columns . Generally , the cluster columns of a table are the column or columns that make up its primary key or a portion of its primary key . Please refer to CREATE CLUSTER for more information . Specify one column from the table for each column in the cluster key . The columns are matched by position , not by name . A cluster table uses the space allocation of the cluster . Therefore , do not use the parameters , the clause , or the with the Restrictions on Cluster Tables Cluster tables are subject to the following restrictions : Object tables and tables containing LOB columns can not be part of a cluster . with either ROWDEPENDENCIES NOROWDEPENDENCIES unless the cluster has been created with the same ROWDEPENDENCIES NOROWDEPENDENCIES setting . further define the characteristics of the table . clauses to specify the storage attributes of a column . determine storage characteristics of an object column or attribute or of an element of a collection column or attribute . For , specify an object column or attribute . indicates whether object columns or attributes in the same hierarchy are substitutable for each other . You can specify that a column is of a particular type , or whether it can contain instances of its subtypes , or both . ELEMENT , you constrain the element type of a collection column or attribute to a subtype of its declared type . IS OF [ TYPE ] ( ONLY type clause constrains the type of the object column to a subtype of its declared type . SUBSTITUTABLE AT ALL LEVELS indicates that the object column can not hold instances corresponding to any of its subtypes . Also , substitution is disabled for any embedded object attributes and elements of embedded nested tables and varrays . The default is SUBSTITUTABLE AT LEVELS Restrictions on the This clause is subject to the following restrictions : You can not specify this clause for an attribute of an object column . However , you can specify this clause for a object type column of a relational table and for an object column of an object table if the substitutability of the object table itself has not been set . For a collection type column , the only part of this clause you can specify is [ NOT ] lets you specify the storage attributes of LOB data segments . For a nonpartitioned table , this clause specifies the storage attributes of LOB data segments of the table . For a partitioned table , Oracle Database implements this clause depending on where it is specified : For a partitioned table specified at the table level - - that is , when specified in the clause along with one of the partitioning clauses - - this clause specifies the default storage attributes for LOB data segments associated with each partition or subpartition . These storage attributes apply to all partitions or subpartitions unless overridden by a at the partition or subpartition level . For an individual partition of a partitioned table - - that is , when specified as part of a - - this clause specifies the storage attributes of the data segments of the partition or the default storage attributes of any subpartitions of the partition . A partition - level overrides a table - level For an individual subpartition of a partitioned table - - that is , when specified as part of - - this clause specifies the storage attributes of the data segments of the subpartition . A subpartition - level overrides both partition - level and table - level LOB_storage_clauses Oracle Database Application Developer ' s Guide - Large Objects for detailed information about LOBs , including guidelines for creating gigabyte LOBs " LOB Column Example " LOB_item Specify the LOB column name or LOB object attribute for which you are explicitly defining tablespace and storage characteristics that are different from those of the table . Oracle Database automatically creates a system - managed index for each LOB_item you create . LOB_segname Specify the name of the LOB data segment . You can not use LOB_segname if you specify more than one LOB_parameters clause lets you specify various elements of LOB storage . ENABLE STORAGE IN ROW If you enable storage in row , then the LOB value is stored in the row ( inline ) if its length is less than approximately 4000 bytes minus system control information . This is the default . Restriction on Enabling Storage in Row For an index - organized table , you can not specify this parameter unless you have specified an segment in the DISABLE STORAGE IN ROW If you disable storage in row , then the LOB value is stored outside of the row out of line regardless of the length of the LOB value . The LOB locator is always stored inline regardless of where the LOB value is stored . You can not change the value of STORAGE IN ROW once it is set except by moving the table . See the move_table_clause in the documentation for more information . CHUNK Specify the number of bytes to be allocated for LOB manipulation . If is not a multiple of the database block size , then the database rounds up in bytes to the next multiple . For example , if the database block size is 2048 and is 2050 , then the database allocates 4096 bytes ( 2 blocks ) . The maximum value is 32768 ( 32K ) , which is the largest Oracle Database block size allowed . The default CHUNK size is one Oracle Database block . The value of CHUNK must be less than or equal to the value of NEXT , either the default value or that specified in the . If exceeds the value of NEXT , then the database returns an error . You can not change the value of once it is set . PCTVERSION Specify the maximum percentage of overall LOB storage space used for maintaining old versions of the LOB . The default value is 10 , meaning that older versions of the LOB data are not overwritten until they consume 10 % of the overall LOB storage space . You can specify the PCTVERSION parameter whether the database is running in manual or automatic undo mode . PCTVERSION is the default in manual undo mode . RETENTION is the default in automatic undo mode . You can not specify both RETENTION RETENTION Use this clause to indicate that Oracle Database should retain old versions of this LOB column . Oracle Database uses the value of the UNDO_RETENTION initialization parameter to determine the amount of committed undo data to retain in the database . You can specify the parameter only if the database is running in automatic undo mode . In this mode , is the default value unless you specify . You can not specify both " Creating an Undo Tablespace : Example " FREEPOOLS Specify the number of groups of free lists for the LOB segment . Normally will be the number of instances in a Real Application Clusters environment or 1 for a single - instance database . You can specify this parameter only if the database is running in automatic undo mode . In this mode , FREEPOOLS is the default unless you specify the FREELIST GROUPS parameter of the . If you specify neither FREEPOOLS nor FREELIST GROUPS , then the database uses a default of 1 if the database is in automatic undo management mode and a default of 1 if the database is in manual undo management mode . Restriction on FREEPOOLS You can not specify both and the parameter of the let you specify separate storage characteristics for the LOB in which a varray will be stored . If varray_item is a multilevel collection , then the database stores all collection items nested within varray_item in the same LOB in which is stored . For a nonpartitioned table - - that is , when specified in the clause without any of the partitioning clauses - - this clause specifies the storage attributes of the LOB data segments of the varray . For a partitioned table specified at the table level - - that is , when specified in the clause along with one of the partitioning clauses - - this clause specifies the default storage attributes for the varray LOB data segments associated with each partition ( or its subpartitions , if any ) . For an individual partition of a partitioned table - - that is , when specified as part of a - - this clause specifies the storage attributes of the varray LOB data segments of that partition or the default storage attributes of the varray LOB data segments of any subpartitions of this partition . A partition - level overrides a table - level For an individual subpartition of a partitioned table - - that is , when specified as part of - - this clause specifies the storage attributes of the varray data segments of this subpartition . A subpartition - level overrides both partition - level and table - level STORE AS LOB Clause STORE LOB If the maximum varray size is less than 4000 bytes , then the database stores the varray as an inline LOB unless you have disabled storage in row . If the maximum varray size is greater than 4000 bytes or if you have disabled storage in row , then the database stores in the varray as an out - of - line LOB . If you do not specify STORE LOB , then storage is based on the maximum possible size of the varray rather than on the actual size of a varray column . The maximum size of the varray is the number of elements times the element size , plus a small amount for system control information . If you omit this clause : If the maximum size of the varray is less than 4000 bytes , then the database does not store the varray as a LOB , but as inline data . If the maximum size is greater than 4000 bytes , then the database always stores the varray as a LOB . If the actual size is less than 4000 bytes , it is stored as an inline LOB If the actual size is greater than 4000 bytes , it is stored as an out - of - line LOB , as is true for other LOB columns . Restriction on Storing Varrays as LOBs parameter of as part of this clause . The LOB tablespace for a varray defaults to the tablespace of the containing table or table partition . has the same behavior as described for " Substitutable Table and Column Examples " let you specify separate storage characteristics for a nested table , which in turn enables you to define the nested table as an index - organized table . Unless you explicitly specify otherwise in this clause : For a nonpartitioned table , the storage table is created in the same schema and the same tablespace as the parent table . For a partitioned table , the storage table is created in the default tablespace of the schema . In either case , the storage table uses default storage characteristics , and stores the nested table values of the column for which it was created . You must include this clause when creating a table with columns or column attributes whose type is a nested table . Clauses within that function the same way they function for the parent table are not repeated here . nested_item Specify the name of a column , or of a top - level attribute of the object type of the tables , whose type is a nested table . COLUMN_VALUE If the nested table is a multilevel collection , then the inner nested table or varray may not have a name . In this case , specify COLUMN_VALUE in place of the nested_item name . " Multi - level Collection Example " for examples using storage_table Specify the name of the table where the rows of reside . You can not query or perform DML statements on storage_table directly , but you can modify its storage characteristics by specifying its name in an Restriction on the Storage Table You can not partition the storage table of a nested table . for information about modifying nested table column storage characteristics RETURN AS Specify what Oracle Database returns as the result of a query . VALUE returns a copy of the nested table itself . LOCATOR returns a collection locator to the copy of the nested table . The locator is scoped to the session and can not be used across sessions . Unlike a LOB locator , the collection locator can not be used to modify the collection instance . If you do not specify the or the , then the nested table is heap organized and is created with default storage characteristics . Restrictions on Nested Table Column Properties Nested table column properties are subject to the following restrictions : You can not specify this clause for a temporary table . At create time , you can not use to specify an out_of_line_ref_constraint , or foreign key constraint for the attributes of a nested table . However , you can modify a nested table to add such constraints using for information about modifying nested table column storage characteristics " Nested Table Example " " Multi - level Collection Example " XMLType_column_properties let you specify storage attributes for an XMLTYPE column . XMLType columns can be stored either in LOB or object - relational columns . OBJECT RELATIONAL if you want the database to store the XMLType data in object - relational columns . Storing data objects relationally lets you define indexes on the relational columns and enhances query performance . If you specify object - relational storage , then you must also specify the if you want the database to store the data in a column . Storing data in a column preserves the original content and enhances retrieval time . If you specify LOB storage , then you can specify either LOB parameters or the clause , but not both . Specify the clause if you want to restrict the table or column to particular schema - based XML instances . This clause lets you specify the URL of a registered XMLSchema , either in the XMLSCHEMA clause or as part of the ELEMENT clause , and an XML element name . You must specify an element , although the XMLSchema URL is optional . If you do specify an XMLSchema URL , then you must already have registered the XMLSchema using the DBMS_XMLSCHEMA package . for information on the clauses " XMLType Column Examples " for examples of columns in object - relational tables and " Using XML in SQL Statements " for an example of creating an XMLSchema Oracle XML DB Developer ' s Guide for more information on columns and tables and on creating XMLSchemas PL / SQL Packages and Types Reference for information on the DBMS_XMLSCHEMA package table_partitioning_clauses to create a partitioned table . Restrictions on Partitioning in General All partitioning is subject to the following restrictions : You can not partition a table that is part of a cluster . You can not partition a table containing any RAW columns . The storage of partitioned database entities in tablespaces of different block sizes is subject to several restrictions . Please refer to for a discussion of these restrictions . " Partitioning Examples " clause to partition the table on ranges of values from the column list . For an index - organized table , the column list must be a subset of the primary key columns of the table . Specify an ordered list of columns used to determine into which partition a row belongs . These columns are the partitioning key Restriction on Partitioning Key Columns The columns in the column list can be of any built - in datatype except TIMESTAMP TIME ZONE . However , columns of TIMESTAMP LOCAL TIME ZONE can be used in the partitioning key . PARTITION partition The name partition must conform to the rules for naming schema objects and their part as described in " Schema Object Naming Rules " . If you omit , then the database generates a name with the form SYS_P n You can specify up to a total of 1024K - 1 partitions and subpartitions . For a discussion of factors that might impose practical limits less than this number , please refer to You can create a partitioned table with just one partition . However , this is different from a nonpartitioned table . For instance , you can not add a partition to a nonpartitioned table . range_values_clause Specify the noninclusive upper bound for the current partition . The value list is an ordered list of literal values corresponding to the column list in the clause . You can substitute the keyword MAXVALUE for any literal in in the value list . MAXVALUE specifies a maximum value that will always sort higher than any other value , including null . Specifying a value other than for the highest partition bound imposes an implicit integrity constraint on the table . If is partitioned on a DATE column , and if the date format does not specify the first two digits of the year , then you must use the TO_DATE function with the YYYY 4 - character format mask for the year . The RRRR format mask is not supported in this clause . The date format is determined implicitly by NLS_TERRITORY or explicitly by NLS_DATE_FORMAT Oracle Database Globalization Support Guide for more information on these initialization parameters . Oracle Database Concepts for more information about partition bounds " Range Partitioning Example " to define the physical and storage characteristics of the table . clause have the same function as described for the of the table as a whole . clause and clause have the same function as described for the lets you specify LOB storage characteristics for one or more LOB items in this partition or in any list subpartitions of this partition . If you do not specify the for a LOB item , then the database generates a name for each LOB data partition . The system - generated names for LOB data and LOB index partitions take the form SYS_LOB_P n SYS_IL_P , respectively . The corresponding system - generated names for LOB data and index subpartitions are SYS_LOB_SUBP SYS_IL_SUBP , respectively let you specify storage characteristics for one or more varray items in this partition or in any list subpartitions of this partition . Restriction on clause is valid only for composite - partitioned tables . See hash_partitioning clause to specify that the table is to be partitioned using the hash method . Oracle Database assigns rows to partitions using a hash function on values found in columns designated as the partitioning key . You can specify individual hash partitions or you can specify how many subpartitions the database should create . Specify an ordered list of columns used to determine into which partition a row belongs ( the partitioning key ) . Use this clause to specify individual partitions by name . If you omit the partition name , then the database assigns partition names of the form SYS_P Restriction on Specifying Individual Hash Partitions The only clause you can specify in the is the If your enterprise has or will have databases using different character sets , use caution when partitioning on character columns . The sort sequence of characters is not identical in all character sets . Please refer to Oracle Database Globalization Support Guide for more information on character set support . Alternatively , you can specify the number of partitions . In this case , the database assigns partition names of the form . The IN clause specifies one or more tablespaces where the hash partitions are to be stored . The number of tablespaces does not have to equal the number of partitions . If the number of partitions is greater than the number of tablespaces , then the database cycles through the names of the tablespaces . For both methods of hash partitioning , for optimal load balancing you should specify a number of partitions that is a power of 2 . Also for both methods of hash partitioning , the only attribute you can specify for hash partitions is . Hash partitions inherit all other attributes from table - level defaults . Tablespace storage specified at the table level is overridden by tablespace storage specified at the partition level , which in turn is overridden by tablespace storage specified at the subpartition level . In the clause , the determines tablespace storage only for the individual partition being created . In the clause , the clause determines placement of partitions as the table is being created and the default storage location for subsequently added partitions . for more information on hash partitioning Restrictions on Hash Partitioning Hash partitioning is subject to the following restrictions : You can not specify more than 16 partitioning columns . The column list can not contain the UROWID pseudocolumns . The column list can be of any built - in datatype except , or LOB . list_partitioning clause to partition the table on lists of literal values from . List partitioning is useful for controlling how individual rows map to specific partitions . If you omit the partition name , then the database assigns partition names of the form of each partition must have at least one value . No value , including , can appear in more than one partition . List partitions are not ordered . If you specify the literal for a partition value in the VALUES clause , then to access data in that partition in subsequent queries , you must use an IS condition in the WHERE clause , rather than a comparison condition . keyword creates a partition into which the database will insert any row that does not map to another partition . Therefore , you can specify for only one partition , and you can not specify any other values for that partition . Further , the default partition must be the last partition you define . The use of is similar to the use of for range partitions . The string comprising the list of values for each partition can be up to 4K bytes . The total number of values for all partitions can not exceed 64K - 1 . Restrictions on List Partitioning List partitioning is subject to the following restrictions : You can not subpartition a list partition . You can specify only one partitioning key in column_list , and it can not be a LOB column . If the partitioning key is an object type column , then you can partition on only one attribute of the column type . Each value in the must be unique among all partitions of clause to first partition by range , and then partition the partitions further into hash or list subpartitions . This combination of range partitioning and hash or list subpartitioning is called composite partitioning After establishing the type of subpartitioning you want for each composite partition , using the clause , you must define each of the range partitions . You must specify the , which has the same requirements as for noncomposite range partitions . to define the physical and storage characteristics of the each partition . Within the , you can use the clause to define the properties of individual subpartitions . If you omit the partition name , then the database generates a name with the form The only characteristic you can specify for a hash or list subpartition or a LOB subpartition is Restriction on Composite Partitioning You can not specify composite partitioning for an index - organized table . Therefore , the is not valid for composite - partitioned tables . is an optional element of both range - hash and range - list composite partitioning . The template lets you define default subpartitions for each table partition . Oracle Database will create these default subpartitions in any partition for which you do not explicitly define subpartitions . This clause is useful for creating symmetric partitions . You can override this clause by explicitly defining subpartitions at the partition level , in the When defining subpartitions with a template , you must specify a name for each subpartition . When you specify tablespace storage for the subpartition template , it does not override any tablespace storage you have specified explicitly for the partitions of . To specify tablespace storage for subpartitions , do one of these things : Omit tablespace storage at the partition level and specify tablespace storage in the subpartition template . Define individual subpartitions with specific tablespace storage . Restrictions on Subpartition Templates Subpartition templates are subject to the following restrictions : For a range - hash composite - partitioned table , you can not specify the For a range - list composite - partitioned table , you can not specify the hash_subpartition_quantity For both range - hash and range - list partitioned tables , the only clause of the you can specify for subpartitions is the for one subpartition , then you must specify for all subpartitions . You can specify the same tablespace for more than one subpartition . for one LOB subpartition , then you must specify for all of the LOB subpartitions of that LOB column . You can specify the same tablespace for more than one LOB subpartition . If you specify separate LOB storage for list subpartitions using the , either in the or when defining individual subpartitions , then you must specify for both LOB and varray columns . clause to indicate that the database should subpartition by hash each partition in . The subpartitioning column list is unrelated to the partitioning key but is subject to the same restrictions ( see You can define the subpartitions using the or the SUBPARTITIONS quantity clause . See . In either case , for optimal load balancing you should specify a number of partitions that is a power of 2 . SUBPARTITIONS quantity Specify the default number of subpartitions in each partition of , and optionally one or more tablespaces in which they are to be stored . The default value is 1 . If you omit both this clause and , then the database will create each partition with one hash subpartition unless you subsequently specify the Restriction on Hash Subpartitioning In addition to the restrictions for composite partitioning in general ( see ) , for hash subpartitioning in , you can not specify the clause to indicate that the database should subpartition each partition in by literal values from If you omit , then you can define list subpartitions individually for each partition using the clause of . If you omit both , then the database creates a single subpartition . Restrictions on List Subpartitioning List subpartitioning is subject to the following restrictions : In addition to the restrictions for composite partitioning in general ( see ) , for list subpartitioning : You can specify only one subpartitioning key column . You must specify the , which is subject to the same requirements as at the table level . In the , you can not specify the hash_subpartition_quantity This clause of the is valid only for composite - partitioned tables . This clause lets you specify hash or list subpartitions for . This clause overrides the default settings established for range - hash composite partitions in the clause or for range - hash or range - list composite partitions in the Notes on Composite Partitions The following notes apply to composite partitions : You can specify the number of subpartitions and optionally one or more tablespaces where they are to be stored . In this case , Oracle Database assigns subpartition names of the form SYS_SUBPn . The number of tablespaces does not have to equal the number of subpartitions . If the number of partitions is greater than the number of tablespaces , then the database cycles through the names of the tablespaces . Alternatively , you can use the to specify individual subpartitions by name , and optionally the tablespace where each should be stored . If you omit and if you have created a subpartition template , then the database uses the template to create subpartitions . If you have not created a subpartition template , then the database creates one hash subpartition or one list subpartition . entirely , then the database assigns subpartition names as follows : If you have specified a subpartition template and you have specified partition names , then the database generates subpartition names of the form partition_name underscore ( _ ) subpartition_name ( for example , P1_SUB1 If you have not specified a subpartition template or if you have specified a subpartition template but did not specify partition names , then the database generates subpartition names of the form SYS_SUBP In partition_spec , the only clause of the you can specify is the For range - hash composite partitions , the of is not relevant and is invalid . For range - list composite partitions : is not relevant , so you specify Within , you must specify the for each subpartition , and the values you specify for each subpartition can not exist in any other subpartition of the same partition . CACHE | NOCACHE | CACHE READS CACHE clauses to indicate how Oracle Database should store blocks in the buffer cache . If you specify neither CACHE nor NOCACHE , then : In a statement , NOCACHE is the default In an statement , the existing value is not changed . For data that is accessed frequently , this clause indicates that the blocks retrieved for this table are placed at the most recently used end of the least recently used ( LRU ) list in the buffer cache when a full table scan is performed . This attribute is useful for small lookup tables . As a parameter in the specifies that the database places LOB data values in the buffer cache for faster access . Restriction on CACHE for an index - organized table . However , index - organized tables implicitly provide behavior . For data that is not accessed frequently , this clause indicates that the blocks retrieved for this table are placed at the least recently used end of the LRU list in the buffer cache when a full table scan is performed . is the default for LOB storage . As a parameter in the specifies that the LOB value either is not brought into the buffer cache or is brought into the buffer cache and placed at the least recently used end of the LRU list . The latter is the default behavior . Restriction on NOCACHE CACHE READS READS applies only to LOB storage . It specifies that LOB values are brought into the buffer cache only during read operations but not during write operations . for a description of the when specified as part of lets you parallelize creation of the table and set the default degree of parallelism for queries and the DML UPDATE DELETE MERGE after table creation . The syntax of the supersedes syntax appearing in earlier releases of Oracle . Superseded syntax is still supported for backward compatibility but may result in slightly different behavior from that documented . NOPARALLEL NOPARALLEL for serial execution . This is the default . PARALLEL Specify PARALLEL if you want Oracle to select a degree of parallelism equal to the number of CPUs available on all participating instances times the value of the PARALLEL_THREADS_PER_CPU initialization parameter . PARALLEL Specification of indicates the degree of parallelism , which is the number of parallel threads used in the parallel operation . Each parallel thread may use one or two parallel execution servers . Normally Oracle calculates the optimum degree of parallelism , so it is not necessary for you to specify for more information on this clause NOROWDEPENDENCIES | ROWDEPENDENCIES This clause lets you specify whether will use row - level dependency tracking . With this feature , each row in the table has a system change number ( SCN ) that represents a time greater than or equal to the commit time of the last transaction that modified the row . You can not change this setting after is created . ROWDEPENDENCIES if you want to enable row - level dependency tracking . This setting is useful primarily to allow for parallel propagation in replication environments . It increases the size of each row by 6 bytes . NOROWDEPENDENCIES if you do not want to use the row - level dependency tracking feature . This is the default . Oracle Database Advanced Replication for information about the use of row - level dependency tracking in replication environments MONITORING | NOMONITORING In earlier releases , you could use these clauses to start or stop the collection of modification statistics on this table . These clauses have been deprecated . If you formerly collected modification statistics on tables by using the DBMS_STATS package in GATHER AUTO GATHER STALE mode , then you no longer have to do anything . Oracle Database now collects these statistics automatically , and the MONITORING NOMONITORING keywords in existing code will not cause an error . If , for performance reasons , you do not want to collect modification statistics on any tables , then you should set the STATISTICS_LEVEL initialization parameter to BASIC . Be aware , however , that doing so disables a number of manageability features . See Also Oracle Database Reference STATISTICS_LEVEL initialization parameter , including its affect on Oracle Database manageability features lets you specify whether Oracle Database should apply a constraint . By default , constraints are created in ENABLE VALIDATE state . Restrictions on Enabling and Disabling Constraints Enabling and disabling constraints are subject to the following restrictions : To enable or disable any integrity constraint , you must have defined the constraint in this or a previous statement . You can not enable a foreign key constraint unless the referenced unique or primary key constraint is already enabled . for more information on constraints , " ENABLE VALIDATE Example " " DISABLE Example " ENABLE Clause Use this clause if you want the constraint to be applied to the data in the table . This clause is described fully in " ENABLE Clause " in the documentation on constraints . DISABLE Clause Use this clause if you want to disable the integrity constraint . This clause is described fully in " DISABLE Clause " in the documentation on constraints . UNIQUE clause lets you enable or disable the unique constraint defined on the specified column or combination of columns . PRIMARY KEY clause lets you enable or disable the primary key constraint defined on the table . CONSTRAINT CONSTRAINT clause lets you enable or disable the integrity constraint named KEEP | DROP INDEX This clause lets you either preserve or drop the index Oracle Database has been using to enforce a unique or primary key constraint . Restriction on Preserving and Dropping Indexes You can specify this clause only when disabling a unique or primary key constraint . using_index_clause lets you specify an index for Oracle Database to use to enforce a unique or primary key constraint , or lets you instruct the database to create the index used to enforce the constraint . This clause is discussed fully in CREATE INDEX for a description of , the global_partitioned_index local_partitioned_index clauses , NOSORT , and the in relation to indexes and on constraints " Explicit Index Control Example " for an example of using an index to enforce a constraint CASCADE CASCADE to disable any integrity constraints that depend on the specified integrity constraint . To disable a primary or unique key that is part of a referential integrity constraint , you must specify this clause . Restriction on CASCADE You can specify CASCADE only if you have specified DISABLE lets you specify whether the database can move a table row . It is possible for a row to move , for example , during table compression or an update operation on partitioned data . Caution : If you need static rowids for data access , do not enable row movement . For a normal ( heap - organized ) table , moving a row changes the rowid of the row . For a moved row in an index - organized table , the logical rowid remains valid , although the physical guess component of the logical rowid becomes inaccurate . ENABLE to allow the database to move a row , thus changing the rowid . DISABLE if you want to prevent the database from moving a row , thus preventing a change of rowid . If you omit this clause , then the database disables row movement . Restriction on Row Movement You can not specify this clause for a nonpartitioned index - organized table . AS Specify a subquery to determine the contents of the table . The rows returned by the subquery are inserted into the table upon its creation . For object tables , can contain either one expression corresponding to the table type , or the number of top - level attributes of the table type . Please refer to for more information . If returns the equivalent of part or all of an existing materialized view , then the database may rewrite the query to use the materialized view in place of one or more tables specified in for more information on materialized views and query rewrite Oracle Database derives datatypes and lengths from the subquery . Oracle Database follows the following rules for integrity constraints and other column and table attributes : Oracle Database automatically defines on columns in the new table any constraints that were explicitly created on the corresponding columns of the selected table if the subquery selects the column rather than an expression containing the column . If any rows violate the constraint , then the database does not create the table and returns an error . constraints that were implicitly created by Oracle Database on columns of the selected table ( for example , for primary keys ) are not carried over to the new table . In addition , primary keys , unique keys , foreign keys , check constraints , partitioning criteria , indexes , and column default values are not carried over to the new table . If the selected table is partitioned , you can choose whether the new table will be partitioned the same way , partitioned differently , or not partitioned . Partitioning is not carried over to the new table . Specify any desired partitioning as part of the statement before the If all expressions in are columns , rather than expressions , then you can omit the columns from the table definition entirely . In this case , the names of the columns of table are the same as the columns in You can use in combination with the function to convert the values in a column in another table to LOB values in a column of the table you are creating . Oracle Database Upgrade Guide for a discussion of why and when to copy data to a LOB " Conversion Functions " for a description of how to use the function for more information on the order_by_clause If you specify the in this statement , then the database will ignore any value you specify for the INITIAL storage parameter and will instead use the value of the parameter . for information on these parameters ORDER BY ORDER BY clause lets you order rows returned by the subquery . When specified with , this clause does not necessarily order data across the entire table . For example , it does not order across partitions . Specify this clause if you intend to create an index on the same key as the key column . Oracle Database will cluster data on the key so that it corresponds to the index key . Restrictions on the Defining Query of a Table The table query is subject to the following restrictions : The number of columns in the table must equal the number of expressions in the subquery . The column definitions can specify only column names , default values , and integrity constraints , not datatypes . You can not define a foreign key constraint in a statement that contains . Instead , you must create the table without the constraint and then add it later with an object_table OF clause lets you explicitly create an object table of type object_type . The columns of an object table correspond to the top - level attributes of type object_type . Each row will contain an object instance , and each instance will be assigned a unique , system - generated object identifier when a row is inserted . If you omit , then the database creates the object table in your own schema . Object tables , as well as tables , object views , and views , do not have any column names specified for them . Therefore , Oracle defines a system - generated pseudocolumn OBJECT_ID . You can use this column name in queries and to create object views with the OBJECT IDENTIFIER " Object Column and Table Examples " object_table_substitution clause to specify whether row objects corresponding to subtypes can be inserted into this object table . NOT SUBSTITUTABLE AT ALL LEVELS indicates that the object table being created is not substitutable . In addition , substitution is disabled for all embedded object attributes and elements of embedded nested tables and arrays . The default is CREATE TYPE for more information about creating object types " User - Defined Types " " User - Defined Functions " " About SQL Expressions " for more information about using types The properties of object tables are essentially the same as those of relational tables . However , instead of specifying columns , you specify attributes of the object . For attribute , specify the qualified column name of an item in an object . lets you specify whether the object identifier of the object table should be system generated or should be based on the primary key of the table . The default is SYSTEM GENERATED Restrictions on the IDENTIFIER unless you have already specified a constraint for the table . You can not specify this clause for a nested table . A primary key object identifier is locally unique but not necessarily globally unique . If you require a globally unique identifier , then you must ensure that the primary key is globally unique . This clause is relevant only if you have specified the as GENERATED . It specifies an index , and optionally its storage characteristics , on the hidden object identifier column . index , specify the name of the index on the hidden system - generated object identifier column . If you omit index , then the database generates a name . The semantics of these clauses are documented in the corresponding sections under relational tables . See XMLType_table syntax to create a table of datatype . Most of the clauses used to create an table have the same semantics that exist for object tables . The clauses specific to tables are described in this section . Object tables , as well as tables , object views , and views , do not have any column names specified for them . Therefore , Oracle defines a system - generated pseudocolumn OBJECT_ID . You can use this column name in queries and to create object views with the This clause lets you determine how Oracle Database manages the storage of the underlying columns . OBJECT RELATIONAL RELATIONAL data in object relational columns . If you specify , then you must also specify an XMLSchema in the XMLSchema_storage_clause , and you must already have registered the schema using the package . Oracle Database will create the table conforming to the registered schema . CLOB if you want the database to store the XML data in a column . If you specify , then you may also specify either a LOB segment name , or the clause , or both . This clause lets you specify the URL of a registered XMLSchema , either in the XMLSCHEMA clause or as part of the clause , and an XML element name . You must specify an element , although the XMLSchema URL is optional . If you do specify an XMLSchema URL , then you must already have registered the XMLSchema using the package . PL / SQL Packages and Types Reference package Oracle XML DB Developer ' s Guide for information on creating and working with XML data " XMLType Table Examples " Examples General Examples This statement shows how the employees table owned by the sample human resources ( hr ) schema was created . A hypothetical name is given to the table and constraints so that you can duplicate this example in your test database : CREATE TABLE employees_demo ( employee_id NUMBER ( 6 ) , first_name VARCHAR2 ( 20 ) , last_name VARCHAR2 ( 25 ) CONSTRAINT emp_last_name_nn_demo NOT NULL , email VARCHAR2 ( 25 ) CONSTRAINT emp_email_nn_demo NOT NULL , phone_number VARCHAR2 ( 20 ) , hire_date DATE DEFAULT SYSDATE CONSTRAINT emp_hire_date_nn_demo NOT NULL , job_id VARCHAR2 ( 10 ) CONSTRAINT emp_job_nn_demo NOT NULL , salary NUMBER ( 8 , 2 ) CONSTRAINT emp_salary_nn_demo NOT NULL , commission_pct NUMBER ( 2 , 2 ) , manager_id NUMBER ( 6 ) , department_id NUMBER ( 4 ) , dn VARCHAR2 ( 300 ) , CONSTRAINT This table contains twelve columns . The employee_id column is of datatype NUMBER hire_date column is of datatype and has a default value of SYSDATE last_name column is of type VARCHAR2 and has a constraint , and so on . Storage Example To define the same employees_demo table in the example tablespace with a small storage capacity and limited allocation potential , issue the following statement : CREATE TABLE employees_demo ( employee_id NUMBER ( 6 ) , first_name VARCHAR2 ( 20 ) , last_name VARCHAR2 ( 25 ) CONSTRAINT emp_last_name_nn_demo NOT NULL , email VARCHAR2 ( 25 ) CONSTRAINT emp_email_nn_demo NOT NULL , phone_number VARCHAR2 ( 20 ) , hire_date DATE DEFAULT SYSDATE CONSTRAINT emp_hire_date_nn_demo NOT NULL , job_id VARCHAR2 ( 10 ) CONSTRAINT emp_job_nn_demo NOT NULL , salary NUMBER ( 8 , 2 ) CONSTRAINT emp_salary_nn_demo NOT NULL , commission_pct NUMBER ( 2 , 2 ) , manager_id NUMBER ( 6 ) , department_id NUMBER ( 4 ) , dn VARCHAR2 ( 300 ) , CONSTRAINT Temporary Table Example The following statement creates a temporary table today_sales for use by sales representatives in the sample database . Each sales representative session can store its own sales data for the day in the table . The temporary data is deleted at the end of the session . CREATE GLOBAL TEMPORARY TABLE today_sales ON COMMIT PRESERVE ROWS AS SELECT * FROM orders WHERE order_date = SYSDATE ; Substitutable Table and Column Examples The following statement creates a substitutable table from the person_t type , which was created in " Type Hierarchy Example " CREATE TABLE persons OF person_t ; The following statement creates a table with a substitutable column of type person_t CREATE TABLE books ( title VARCHAR2 ( 100 ) , author person_t ) ; When you insert into persons books , you can specify values for the attributes of or any of its subtypes . Examples of insert statements appear in " Inserting into a Substitutable Tables and Columns : Examples " You can extract data from such tables using built - in functions and conditions . For examples , see the functions TREAT SYS_TYPEID , and the " IS OF type Condition " condition . PARALLEL Example The following statement creates a table using an optimum number of parallel execution servers to scan employees and to populate dept_80 CREATE TABLE dept_80 PARALLEL AS SELECT * FROM employees WHERE department_id = 80 ; Using parallelism speeds up the creation of the table , because the database uses parallel execution servers to create the table . After the table is created , querying the table is also faster , because the same degree of parallelism is used to access the table . NOPARALLEL Example The following statement creates the same table serially . Subsequent DML and queries on the table will also be serially executed . CREATE TABLE dept_80 AS SELECT * FROM employees WHERE department_id = 80 ; ENABLE VALIDATE Example The following statement shows how the sample table departments was created . The example defines a constraint , and places it in VALIDATE state . A hypothetical name is given to the table so that you can duplicate this example in your test database : CREATE TABLE departments_demo ( department_id NUMBER ( 4 ) , department_name VARCHAR2 ( 30 ) CONSTRAINT dept_name_nn NOT NULL , manager_id NUMBER ( 6 ) , location_id NUMBER ( 4 ) , dn VARCHAR2 ( 300 ) ) ; DISABLE Example The following statement creates the same departments_demo table but also defines a disabled primary key constraint : CREATE TABLE departments_demo ( department_id NUMBER ( 4 ) PRIMARY KEY DISABLE , department_name VARCHAR2 ( 30 ) CONSTRAINT dept_name_nn NOT NULL , manager_id NUMBER ( 6 ) , location_id NUMBER ( 4 ) , dn VARCHAR2 ( 300 ) ) ; Nested Table Example The following statement shows how the sample table pm . print_media was created with a nested table column ad_textdocs_ntab CREATE TABLE print_media ( product_id NUMBER ( 6 ) , ad_id NUMBER ( 6 ) , ad_composite BLOB , ad_sourcetext CLOB , ad_finaltext CLOB , ad_fltextn NCLOB , ad_textdocs_ntab textdoc_tab , ad_photo BLOB , ad_graphic BFILE , ad_header adheader_typ ) NESTED TABLE ad_textdocs_ntab STORE AS textdocs_nestedtab ; Multi - level Collection Example The following example shows how an account manager might create a table of customers using two levels of nested tables : CREATE TYPE phone AS OBJECT ( telephone NUMBER ) ; / CREATE TYPE phone_list AS TABLE OF phone ; / CREATE TYPE my_customers AS OBJECT ( cust_name VARCHAR2 ( 25 ) , phones phone_list ) ; / CREATE TYPE customer_list AS TABLE OF my_customers ; / CREATE TABLE business_contacts ( company_name VARCHAR2 ( 25 ) , company_reps customer_list ) NESTED TABLE company_reps STORE AS outer_ntab ( NESTED TABLE phones STORE AS inner_ntab ) ; The following variation of this example shows how to use the keyword if the inner nested table has no column or attribute name : CREATE TYPE phone AS TABLE OF NUMBER ; / CREATE TYPE phone_list AS TABLE OF phone ; / CREATE TABLE my_customers ( name VARCHAR2 ( 25 ) , phone_numbers phone_list ) NESTED TABLE phone_numbers STORE AS outer_ntab ( NESTED TABLE COLUMN_VALUE STORE AS inner_ntab ) ; LOB Column Example The following statement is a variation of the statement that created the pm . print_media table with some added LOB storage characteristics : CREATE TABLE print_media_new ( product_id NUMBER ( 6 ) , ad_id NUMBER ( 6 ) , ad_composite BLOB , ad_sourcetext CLOB , ad_finaltext CLOB , ad_fltextn NCLOB , ad_textdocs_ntab textdoc_tab , ad_photo BLOB , ad_graphic BFILE , ad_header adheader_typ , press_release LONG ) NESTED TABLE ad_textdocs_ntab STORE AS textdocs_nestedtab_new LOB ( ad_sourcetext , ad_finaltext ) STORE AS ( TABLESPACE example STORAGE ( INITIAL 6144 NEXT 6144 ) CHUNK 4000 NOCACHE LOGGING ) ; In the example , the database rounds the value of up to 4096 ( the nearest multiple of the block size of 2048 ) . Index - Organized Table Example The following statement is a variation of the sample table hr . countries , which is index organized : CREATE TABLE countries_demo ( country_id CHAR ( 2 ) CONSTRAINT country_id_nn_demo NOT NULL , country_name VARCHAR2 ( 40 ) , currency_name VARCHAR2 ( 25 ) , currency_symbol VARCHAR2 ( 3 ) , region VARCHAR2 ( 15 ) , CONSTRAINT country_c_id_pk_demo PRIMARY KEY ( country_id ) ) ORGANIZATION INDEX INCLUDING country_name PCTTHRESHOLD 2 STORAGE ( INITIAL 4K NEXT 2K PCTINCREASE 0 MINEXTENTS 1 MAXEXTENTS 1 ) OVERFLOW STORAGE ( INITIAL 4K NEXT 2K PCTINCREASE 0 MINEXTENTS 1 MAXEXTENTS 1 ) ; External Table Example The following statement creates an external table that represents a subset of the sample table hr . departments is shown in italics . Please refer to access driver and how to specify values for the CREATE TABLE dept_external ( deptno NUMBER ( 6 ) , dname VARCHAR2 ( 20 ) , loc VARCHAR2 ( 25 ) ) ORGANIZATION EXTERNAL ( TYPE oracle_loader DEFAULT DIRECTORY admin ACCESS PARAMETERS ( RECORDS DELIMITED BY newline BADFILE ' ulcase1 . bad ' DISCARDFILE ' ulcase1 . dis ' LOGFILE ' ulcase1 . log ' SKIP 20 FIELDS TERMINATED BY " , " OPTIONALLY ENCLOSED BY ' " ' deptno INTEGER EXTERNAL ( 6 ) , dname CHAR ( 20 ) , loc CHAR ( 25 ) ) ) LOCATION ( ' ulcase1 . ctl ' ) ) REJECT LIMIT UNLIMITED ; " Creating a Directory : Examples " to see how the admin directory was created XMLType Examples This section contains brief examples of creating an table or column . For a more expanded version of these examples , please refer to " Using XML in SQL Statements " XMLType Table Examples The following example creates a very simple table with one implicit column : CREATE TABLE xwarehouses OF XMLTYPE ; Because Oracle Database implicitly stores the data in a column , it is subject to all of the restrictions on LOB columns . To avoid these restrictions , you can create an XMLSchema - based table , as shown in the following example . The XMLSchema must already have been created ( see for more information ) : CREATE TABLE xwarehouses OF XMLTYPE XMLSCHEMA " http : / / www . oracle . com / xwarehouses . xsd " ELEMENT " Warehouse " ; You can define constraints on an XMLSchema - based table , and you can also create indexes on XMLSchema - based tables , which greatly enhance subsequent queries . You can create object - relational views on tables , and you can create views on object - relational tables . for an example of adding a constraint " Creating an Index on an XMLType Table : Example " for an example of creating an index " Creating an XMLType View : Example " for an example of creating an view XMLType Column Examples The following example creates a table with an column stored as a . This table does not require an XMLSchema , so the content structure is not predetermined : CREATE TABLE xwarehouses ( warehouse_id NUMBER , warehouse_spec XMLTYPE ) XMLTYPE warehouse_spec STORE AS CLOB ( TABLESPACE example STORAGE ( INITIAL 6144 NEXT 6144 ) CHUNK 4000 NOCACHE LOGGING ) ; The following example creates a similar table , but stores data in an object relational column whose structure is determined by the specified schema : CREATE TABLE xwarehouses ( warehouse_id NUMBER , warehouse_spec XMLTYPE ) XMLTYPE warehouse_spec STORE AS OBJECT RELATIONAL XMLSCHEMA " http : / / www . oracle . com / xwarehouses . xsd " ELEMENT " Warehouse " ; Partitioning Examples Range Partitioning Example sales table in the sample schema sh is partitioned by range . The following example shows an abbreviated variation of the sales table . Constraints and storage elements have been omitted from the example . CREATE TABLE range_sales ( prod_id NUMBER ( 6 ) , cust_id NUMBER , time_id DATE , channel_id CHAR ( 1 ) , promo_id NUMBER ( 6 ) , quantity_sold NUMBER ( 3 ) , amount_sold NUMBER ( 10 , 2 ) ) PARTITION BY RANGE ( time_id ) ( PARTITION SALES_Q1_1998 VALUES LESS THAN ( TO_DATE ( ' 01 - APR - 1998 ' , ' DD - MON - YYYY ' ) ) , PARTITION SALES_Q2_1998 VALUES LESS THAN ( TO_DATE ( ' 01 - JUL - 1998 ' , ' DD - MON - YYYY ' ) ) For information about partitioned table maintenance operations , see List Partitioning Example oe . customers might have been created as a list - partitioned table . Some columns and all constraints of the sample table have been omitted in this example . CREATE TABLE list_customers ( customer_id NUMBER ( 6 ) , cust_first_name VARCHAR2 ( 20 ) , cust_last_name VARCHAR2 ( 20 ) , cust_address CUST_ADDRESS_TYP , nls_territory VARCHAR2 ( 30 ) , cust_email VARCHAR2 ( 30 ) ) PARTITION BY LIST ( nls_territory ) ( PARTITION asia VALUES ( ' CHINA ' , ' THAILAND ' ) , PARTITION europe VALUES ( ' GERMANY ' , ' ITALY ' , ' SWITZERLAND ' ) , PARTITION west VALUES ( ' AMERICA ' ) , PARTITION east VALUES ( ' INDIA ' ) , PARTITION rest VALUES ( DEFAULT ) ) ; Partitioned Table with LOB Columns Example This statement creates a partitioned table print_media_demo with two partitions p1 p2 , and a number of LOB columns . The statement uses the sample table , but the column press_release is omitted because columns are not supported in partitioning . CREATE TABLE print_media_demo ( product_id NUMBER ( 6 ) , ad_id NUMBER ( 6 ) , ad_composite BLOB , ad_sourcetext CLOB , ad_finaltext CLOB , ad_fltextn NCLOB , ad_textdocs_ntab textdoc_tab , ad_photo BLOB , ad_graphic BFILE , ad_header adheader_typ ) NESTED TABLE ad_textdocs_ntab STORE AS textdocs_nestedtab_demo LOB ( ad_composite , ad_photo , ad_finaltext ) STORE AS ( STORAGE ( NEXT 20M ) ) PARTITION BY RANGE ( product_id ) ( PARTITION p1 VALUES LESS THAN ( 3000 ) TABLESPACE tbs_01 LOB ( ad_composite , ad_photo ) STORE AS ( TABLESPACE tbs_02 STORAGE ( INITIAL 10M ) ) , PARTITION P2 Partition p1 will be in tablespace tbs_1 . The LOB data partitions for ad_composite ad_photo will be in tablespace tbs_2 . The LOB data partition for the remaining LOB columns will be in tablespace tbs_1 . The storage attribute INITIAL is specified for LOB columns ad_composite ad_photo . Other attributes will be inherited from the default table - level specification . The default LOB storage attributes not specified at the table level will be inherited from the tablespace tbs_2 for columns and from tablespace for the remaining LOB columns . LOB index partitions will be in the same tablespaces as the corresponding LOB data partitions . Other storage attributes will be based on values of the corresponding attributes of the LOB data partitions and default attributes of the tablespace where the index partitions reside . Partition p2 will be in the default tablespace tbs_4 . The LOB data for ad_finaltext tbs_3 . The LOB data for the remaining LOB columns will be in tablespace tbs_4 . The LOB index for columns ad_finaltext tbs_3 . The LOB index for the remaining LOB columns will be in tablespace Hash Partitioning Example The sample table oe . product_information is not partitioned . However , you might want to partition such a large table by hash for performance reasons , as shown in this example . The tablespace names are hypothetical in this example . CREATE TABLE hash_products ( product_id NUMBER ( 6 ) , product_name VARCHAR2 ( 50 ) , product_description VARCHAR2 ( 2000 ) , category_id NUMBER ( 2 ) , weight_class NUMBER ( 1 ) , warranty_period INTERVAL YEAR TO MONTH , supplier_id NUMBER ( 6 ) , product_status VARCHAR2 ( 20 ) , list_price NUMBER ( 8 , 2 ) , min_price NUMBER ( 8 , 2 ) , catalog_url VARCHAR2 ( 50 ) , CONSTRAINT product_status_lov_demo CHECK ( product_status in ( ' orderable ' , ' planned ' , ' under development ' , ' obsolete ' ) ) ) Composite - Partitioned Table Examples The table created in the " Range Partitioning Example " divides data by time of sale . If you plan to access recent data according to distribution channel as well as time , then composite partitioning might be more appropriate . The following example creates a copy of that range_sales table but specifies range - hash composite partitioning . The partitions with the most recent data are subpartitioned with both system - generated and user - defined subpartition names . Constraints and storage attributes have been omitted from the example . CREATE TABLE composite_sales ( prod_id NUMBER ( 6 ) , cust_id NUMBER , time_id DATE , channel_id CHAR ( 1 ) , promo_id NUMBER ( 6 ) , quantity_sold NUMBER ( 3 ) , amount_sold NUMBER ( 10 , 2 ) ) PARTITION BY RANGE ( time_id ) SUBPARTITION BY HASH ( channel_id ) ( PARTITION SALES_Q1_1998 VALUES LESS THAN ( TO_DATE ( ' 01 - APR - 1998 ' , ' DD - MON - YYYY ' ) ) , PARTITION SALES_Q2_1998 VALUES LESS THAN ( TO_DATE ( ' 01 - JUL - 1998 ' , ' DD - The following examples creates a partitioned table of customers based on the sample table oe . customers . In this example , the table is partitioned on the credit_limit column and list subpartitioned on the nls_territory column . The subpartition template determines the subpartitioning of any subsequently added partitions , unless you override the template by defining individual subpartitions . This composite partitioning makes it possible to query the table based on a credit limit range within a specified region : CREATE TABLE customers_part ( customer_id NUMBER ( 6 ) , cust_first_name VARCHAR2 ( 20 ) , cust_last_name VARCHAR2 ( 20 ) , nls_territory VARCHAR2 ( 30 ) , credit_limit NUMBER ( 9 , 2 ) ) PARTITION BY RANGE ( credit_limit ) SUBPARTITION BY LIST ( nls_territory ) SUBPARTITION TEMPLATE ( SUBPARTITION east VALUES ( ' CHINA ' , ' JAPAN ' , ' INDIA ' , ' THAILAND ' ) , SUBPARTITION west VALUES ( ' AMERICA ' , ' GERMANY ' , ' ITALY ' , ' SWITZERLAND ' ) , SUBPARTITION other VALUES ( DEFAULT ) ) Object Column and Table Examples Creating Object Tables : Examples Consider object type department_typ CREATE TYPE department_typ AS OBJECT ( d_name VARCHAR2 ( 100 ) , d_address VARCHAR2 ( 200 ) ) ; / Object table departments_obj_t holds department objects of type department_typ CREATE TABLE departments_obj_t OF department_typ ; The following statement creates object table salesreps with a user - defined object type , salesrep_typ CREATE OR REPLACE TYPE salesrep_typ AS OBJECT ( repId NUMBER , repName VARCHAR2 ( 64 ) ) ; CREATE TABLE salesreps OF salesrep_typ ; Creating a Table with a User - Defined Object Identifier : Example This example creates an object type and a corresponding object table whose object identifier is primary key based : CREATE TYPE employees_typ AS OBJECT ( e_no NUMBER , e_address CHAR ( 30 ) ) ; / CREATE TABLE employees_obj_t OF employees_typ ( e_no PRIMARY KEY ) OBJECT IDENTIFIER IS PRIMARY KEY ; You can subsequently reference the employees_object_t object table using either syntax CREATE TABLE departments_t ( d_no NUMBER , mgr_ref REF employees_typ SCOPE IS employees_obj_t ) ; CREATE TABLE departments_t ( d_no NUMBER , mgr_ref REF employees_typ CONSTRAINT mgr_in_emp REFERENCES employees_obj_t ) ; Specifying Constraints on Type Columns : Example The following example shows how to define constraints on attributes of an object type column : CREATE TYPE address_t AS OBJECT ( hno NUMBER , street VARCHAR2 ( 40 ) , city VARCHAR2 ( 20 ) , zip VARCHAR2 ( 5 ) , phone VARCHAR2 ( 10 ) ) ; / CREATE TYPE person AS OBJECT ( name VARCHAR2 ( 40 ) , dateofbirth DATE , homeaddress address_t , manager REF person ) ; / CREATE TABLE persons OF person ( homeaddress NOT NULL , UNIQUE ( homeaddress . phone ) , CHECK ( homeaddress . zip IS NOT NULL ) , CHECK ( homeaddress . city < > ' San Francisco ' ) ) ; Previous Page Page 394 of 479 Next Page
[ "CREATE TABLE", "basic structure" ]
http://docs.oracle.com/cd/B19306_01/server.102/b14220/memory.htm
8 Memory Architecture This chapter discusses the memory architecture of an Oracle instance . This chapter contains the following topics : Introduction to Oracle Memory Structures Overview of the System Global Area Overview of the Program Global Areas Dedicated and Shared Servers Software Code Areas Introduction to Oracle Memory Structures Oracle uses memory to store information such as the following : Program code Information about a connected session , even if it is not currently active Information needed during program execution ( for example , the current state of a query from which rows are being fetched ) Information that is shared and communicated among Oracle processes ( for example , locking information ) Cached data that is also permanently stored on peripheral memory ( for example , data blocks and redo log entries ) The basic memory structures associated with Oracle include : System Global Area ( SGA ) , which is shared by all server and background processes . Program Global Areas ( PGA ) , which is private to each server and background process ; there is one PGA for each process . Figure 8 - 1 illustrates the relationships among these memory structures . Figure 8 - 1 Oracle Memory Structures Description of " Figure 8 - 1 Oracle Memory Structures " Software code areas are another basic memory structure . See Also : " Overview of the System Global Area " " Overview of the Program Global Areas " " Software Code Areas " Overview of the System Global Area A system global area ( SGA ) is a group of shared memory structures that contain data and control information for one Oracle database instance . If multiple users are concurrently connected to the same instance , then the data in the instance ' s SGA is shared among the users . Consequently , the SGA is sometimes called the shared global area An SGA and Oracle processes constitute an Oracle instance . Oracle automatically allocates memory for an SGA when you start an instance , and the operating system reclaims the memory when you shut down the instance . Each instance has its own SGA . The SGA is read / write . All users connected to a multiple - process database instance can read information contained within the instance ' s SGA , and several processes write to the SGA during execution of Oracle . The SGA contains the following data structures : Database buffer cache Redo log buffer Shared pool Java pool Large pool ( optional ) Streams pool Data dictionary cache Other miscellaneous information Part of the SGA contains general information about the state of the database and the instance , which the background processes need to access ; this is called the fixed SGA . No user data is stored here . The SGA also includes information communicated between processes , such as locking information . If the system uses shared server architecture , then the request and response queues and some contents of the PGA are in the SGA . See Also : " Introduction to an Oracle Instance " for more information about an Oracle instance " Overview of the Program Global Areas " " Dispatcher Request and Response Queues " The SGA_MAX_SIZE Initialization Parameter The SGA comprises a number of memory components , which are pools of memory used to satisfy a particular class of memory allocation requests . Examples of memory components include the shared pool ( used to allocate memory for SQL and PL / SQL execution ) , the java pool ( used for java objects and other java execution memory ) , and the buffer cache ( used for caching disk blocks ) . All SGA components allocate and deallocate space in units of granules . Oracle Database tracks SGA memory use in internal numbers of granules for each SGA component . Granule size is determined by total SGA size . On most platforms , the size of a granule is 4 MB if the total SGA size is less than 1 GB , and granule size is 16MB for larger SGAs . Some platform dependencies arise . For example , on 32 - bit Windows , the granule size is 8 M for SGAs larger than 1 GB . Oracle Database can set limits on how much virtual memory the database uses for the SGA . It can start instances with minimal memory and allow the instance to use more memory by expanding the memory allocated for SGA components , up to a maximum determined by the SGA_MAX_SIZE initialization parameter . If the value for SGA_MAX_SIZE in the initialization parameter file or server parameter file ( SPFILE ) is less than the sum the memory allocated for all components , either explicitly in the parameter file or by default , at the time the instance is initialized , then the database ignores the setting for For optimal performance in most systems , the entire SGA should fit in real memory . If it does not , and if virtual memory is used to store parts of it , then overall database system performance can decrease dramatically . The reason for this is that portions of the SGA are paged ( written to and read from disk ) by the operating system . The amount of memory dedicated to all shared areas in the SGA also has performance impact . The size of the SGA is determined by several initialization parameters . The following parameters have the greatest effect on SGA size : Parameter Description DB_CACHE_SIZE The size of the cache of standard blocks . LOG_BUFFER The number of bytes allocated for the redo log buffer . SHARED_POOL _SIZE The size in bytes of the area devoted to shared SQL and PL / SQL statements . LARGE_POO L_SIZE The size of the large pool ; the default is 0 . JAVA_POO L_SIZE The size of the Java pool . Automatic Shared Memory Management In previous database releases , a database administrator ( DBA ) was required to manually specify different SGA component sizes by setting a number of initialization parameters , including the SHARED_POOL_SIZE DB_CACHE_SIZE JAVA_POOL_SIZE , and LARGE_POOL_SIZE parameters . Oracle Database 10g includes the Automatic Shared Memory Management feature which simplifies the SGA memory management significantly . In Oracle Database 10g , a DBA can simply specify the total amount of SGA memory available to an instance using the SGA_TARGET initialization parameter and the Oracle Database will automatically distribute this memory among various subcomponents to ensure most effective memory utilization . When automatic SGA memory management is enabled , the sizes of the different SGA components are flexible and can adapt to the needs of a workload without requiring any additional configuration . The database automatically distributes the available memory among the various components as required , allowing the system to maximize the use of all available SGA memory . Consider a manual configuration in which 1 GB of memory is available for the SGA and distributed to the following initialization parameters : SHARED_POOL_SIZE = 128M DB_CACHE_SIZE = 896M If an application attempts to allocate more than 128 MB of memory from the shared pool , an error is raised that indicates that the available shared pool has been exhausted . There could be free memory in the buffer cache , but this memory is not accessible to the shared pool . You would have to manually resize the buffer cache and the shared pool to work around this problem . With automatic SGA management , you can simply set the SGA_TARGET initialization parameter to 1G . If an application needs more shared pool memory , it can obtain that memory by acquiring it from the free memory in the buffer cache . Setting a single parameter greatly simplifies the administration task . You specify only the amount of SGA memory that an instance has available and forget about the sizes of individual components . No out of memory errors are generated unless the system has actually run out of memory . Automatic SGA management can enhance workload performance without requiring any additional resources or manual tuning effort . With manual configuration of the SGA , it is possible that compiled SQL statements frequently age out of the shared pool because of its inadequate size . This can increase the frequency of hard parses , leading to reduced performance . When automatic SGA management is enabled , the internal tuning algorithm monitors the performance of the workload , increasing the shared pool if it determines the increase will reduce the number of parses required . Oracle Database Administrator ' s Guide Oracle Database Performance Tuning Guide The SGA_TARGET Initialization Parameter The initialization parameter reflects the total size of the SGA and includes memory for the following components : Fixed SGA and other internal allocations needed by the Oracle Database instance The log buffer The shared pool The Java pool The buffer cache The keep and recycle buffer caches ( if specified ) Nonstandard block size buffer caches ( if specified ) The Streams pool It is significant that includes the entire memory for the SGA , in contrast to earlier releases in which memory for the internal and fixed SGA was added to the sum of the configured SGA memory parameters . Thus , gives you precise control over the size of the shared memory region allocated by the database . If is set to a value greater than at startup , then the latter is bumped up to accommodate Note : Do not dynamically set or unset the parameter . This should be set only at startup . Automatically Managed SGA Components When you set a value for , Oracle Database 10g automatically sizes the most commonly configured components , including : The shared pool ( for SQL and PL / SQL execution ) The Java pool ( for Java execution state ) The large pool ( for large allocations such as RMAN backup buffers ) The buffer cache The Streams pool You need not set the size of any of these components explicitly . By default the parameters for these components will appear to have values of zero . Whenever a component needs memory , it can request that it be transferred from another component by way of the internal automatic tuning mechanism . This transfer of memory occurs transparently , without user intervention . The performance of each of these automatically sized components is monitored by the Oracle Database instance . The instance uses internal views and statistics to determine how to distribute memory optimally among the components . As the workload changes , memory is redistributed to ensure optimal performance . To calculate the optimal distribution of memory , the database uses an algorithm that takes into consideration both long - term and short - term trends . Manually Managed SGA Components There are a few SGA components whose sizes are not automatically adjusted . The administrator needs to specify the sizes of these components explicitly , if needed by the application . Such components are : Keep / Recycle buffer caches ( controlled by DB_KEEP_CACHE_SIZE and DB_RECYCLE_CACHE_SIZE Additional buffer caches for non - standard block sizes ( controlled by DB_ n K_CACHE_SIZE n = { 2 , 4 , 8 , 16 , 32 } ) The sizes of these components is determined by the administrator - defined value of their corresponding parameters . These values can , of course , be changed any time either using Enterprise Manager or from the command line with an ALTER SYSTEM statement . The memory consumed by manually sized components reduces the amount of memory available for automatic adjustment . For example , in the following configuration : SGA_TARGET = 256M DB_8K_CACHE_SIZE = 32M The instance has only 224 MB ( 256 - 32 ) remaining to be distributed among the automatically sized components . Persistence of Automatically Tuned Values Oracle Database remembers the sizes of the automatically tuned components across instance shutdowns if you are using a server parameter file ( SPFILE ) . As a result , the system does need to learn the characteristics of the workload again each time an instance is started . It can begin with information from the past instance and continue evaluating workload where it left off at the last shutdown . Adding Granules and Tracking Component Size A database administrator expands the SGA use of a component with an ALTER SYSTEM statement to modify the values of the initialization parameters associated with the respective components . Oracle Database rounds up the newly specified size to the nearest multiple of 16MB and adds or removes granules to meet the target size . The database must have enough free granules to satisfy the request . As long as the current amount of SGA memory is less than , the database can allocate more granules until the SGA size reaches The granule size that is currently being used for the SGA for each component can be viewed in the view V $ SGAINFO . The size of each component and the time and type of the last resize operation performed on each component can be viewed in the view V $ SGA_DYNAMIC_COMPONENTS . The database maintains a circular buffer of the last 400 resize operations made to SGA components . You can view the circular buffer in the V $ SGA_RESIZE_OPS view . Note : If you specify a size for a component that is not a multiple of granule size , then Oracle rounds the specified size up to the nearest multiple . For example , if the granule size is 4 MB and you specify DB_CACHE_S IZE as 10 MB , you will actually be allocated 12 MB . Oracle Database Administrator ' s Guide for information on allocating memory Oracle Database 2 Day DBA for information on showing the SGA size with Enterprise Manager SQL * Plus User ' s Guide and Reference for information on displaying the SGA size with SQL * Plus Oracle Database Reference for information on V $ SGASTAT Your Oracle installation or user ' s guide for information specific to your operating system Database Buffer Cache The database buffer cache is the portion of the SGA that holds copies of data blocks read from datafiles . All user processes concurrently connected to the instance share access to the database buffer cache . The database buffer cache and the shared SQL cache are logically segmented into multiple sets . This organization into multiple sets reduces contention on multiprocessor systems . Organization of the Database Buffer Cache The buffers in the cache are organized in two lists : the write list and the least recently used ( LRU ) list . The write list holds dirty buffers which contain data that has been modified but has not yet been written to disk . The LRU list holds free buffers , pinned buffers , and dirty buffers that have not yet been moved to the write list . Free buffers do not contain any useful data and are available for use . Pinned buffers are currently being accessed . When an Oracle process accesses a buffer , the process moves the buffer to the most recently used ( MRU ) end of the LRU list . As more buffers are continually moved to the MRU end of the LRU list , dirty buffers age toward the LRU end of the LRU list . The first time an Oracle user process requires a particular piece of data , it searches for the data in the database buffer cache . If the process finds the data already in the cache ( a cache hit ) , it can read the data directly from memory . If the process can not find the data in the cache ( a cache miss ) , it must copy the data block from a datafile on disk into a buffer in the cache before accessing the data . Accessing data through a cache hit is faster than data access through a cache miss . Before reading a data block into the cache , the process must first find a free buffer . The process searches the LRU list , starting at the least recently used end of the list . The process searches either until it finds a free buffer or until it has searched the threshold limit of buffers . If the user process finds a dirty buffer as it searches the LRU list , it moves that buffer to the write list and continues to search . When the process finds a free buffer , it reads the data block from disk into the buffer and moves the buffer to the MRU end of the LRU list . If an Oracle user process searches the threshold limit of buffers without finding a free buffer , the process stops searching the LRU list and signals the DBW0 background process to write some of the dirty buffers to disk . " Database Writer Process ( DBW ) " for more information about DBW processes The LRU Algorithm and Full Table Scans When the user process is performing a full table scan , it reads the blocks of the table into buffers and puts them on the LRU end ( instead of the MRU end ) of the LRU list . This is because a fully scanned table usually is needed only briefly , so the blocks should be moved out quickly to leave more frequently used blocks in the cache . You can control this default behavior of blocks involved in table scans on a table - by - table basis . To specify that blocks of the table are to be placed at the MRU end of the list during a full table scan , use the CACHE clause when creating or altering a table or cluster . You can specify this behavior for small lookup tables or large static historical tables to avoid I / O on subsequent accesses of the table . Oracle Database SQL Reference for information about the CACHE clause Size of the Database Buffer Cache Oracle supports multiple block sizes in a database . The standard block size is used for the SYSTEM tablespace . You specify the standard block size by setting the initialization parameter DB_BL OCK_SIZE . Legitimate values are from 2K to 32K . Optionally , you can also set the size for two additional buffer pools , KEEP and RECYCLE , by setting DB_KEEP_C ACHE_SIZE DB_RECYCLE_CACHE_SIZE . These three parameters are independent of one another . " Multiple Buffer Pools " for more information about the KEEP RECYCLE buffer pools The sizes and numbers of non - standard block size buffers are specified by the following parameters : DB_2K_CACHE_SIZE DB_4K_CACHE_SIZE DB_8K_CACHE_SIZE DB_16K_CACHE_SIZE DB_32K_CACHE_SIZE Each parameter specifies the size of the cache for the corresponding block size . Platform - specific restrictions regarding the maximum block size apply , so some of these sizes might not be allowed on some platforms . Example of Setting Block and Cache Sizes DB_BLOCK_SIZE = 4096 DB_CACHE_SIZE = 1024M DB_2K_CACHE_SIZE = 256M DB_8K_CACHE_SIZE = 512M In the preceding example , the parameter DB_BLOCK_SIZE sets the standard block size of the database to 4K . The size of the cache of standard block size buffers is 1024MB . Additionally , 2K and 8K caches are also configured , with sizes of 256MB and 512MB , respectively . The DB_ K_ CACHE_SIZE parameters can not be used to size the cache for the standard block size . If the value of DB_BLOCK_SIZE is K , it is illegal to set K_CACHE_SIZE . The size of the cache for the standard block size is always determined from the value of DB_CA CHE_SIZE The cache has a limited size , so not all the data on disk can fit in the cache . When the cache is full , subsequent cache misses cause Oracle to write dirty data already in the cache to disk to make room for the new data . ( If a buffer is not dirty , it does not need to be written to disk before a new block can be read into the buffer . ) Subsequent access to any data that was written to disk results in additional cache misses . The size of the cache affects the likelihood that a request for data results in a cache hit . If the cache is large , it is more likely to contain the data that is requested . Increasing the size of a cache increases the percentage of data requests that result in cache hits . You can change the size of the buffer cache while the instance is running , without having to shut down the database . Do this with the ALTER SYSTEM statement . For more information , see " Control of the SGA ' s Use of Memory " Use the fixed view V $ BUFFER _POOL to track the sizes of the different cache components and any pending resize operations . Oracle Database Performance Tuning Guide for information about tuning the buffer cache Multiple Buffer Pools You can configure the database buffer cache with separate buffer pools that either keep data in the buffer cache or make the buffers available for new data immediately after using the data blocks . Particular schema objects ( tables , clusters , indexes , and partitions ) can then be assigned to the appropriate buffer pool to control the way their data blocks age out of the cache . buffer pool retains the schema object ' s data blocks in memory . buffer pool eliminates data blocks from memory as soon as they are no longer needed . DEFAULT buffer pool contains data blocks from schema objects that are not assigned to any buffer pool , as well as schema objects that are explicitly assigned to the DEFAULT pool . The initialization parameters that configure the buffer pools are DB_KEEP_C ACHE_SIZE Multiple buffer pools are only available for the standard block size . Non - standard block size caches have a single pool . for more information about multiple buffer pools Oracle Database SQL Reference for the syntax of the BUFFER_POOL clause of the STORAGE clause Redo Log Buffer redo log buffer is a circular buffer in the SGA that holds information about changes made to the database . This information is stored in redo entries . Redo entries contain the information necessary to reconstruct , or redo , changes made to the database by INSERT UPDATE DELETE CREATE ALTER , or DROP operations . Redo entries are used for database recovery , if necessary . Redo entries are copied by Oracle database processes from the user ' s memory space to the redo log buffer in the SGA . The redo entries take up continuous , sequential space in the buffer . The background process LGWR writes the redo log buffer to the active redo log file ( or group of files ) on disk . " Log Writer Process ( LGWR ) " for more information about how the redo log buffer is written to disk Oracle Database Backup and Recovery Basics for information about redo log files and groups The initialization parameter LOG_BUFFER determines the size ( in bytes ) of the redo log buffer . In general , larger values reduce log file I / O , particularly if transactions are long or numerous . The default setting is either 512 kilobytes ( KB ) or 128 KB times the setting of the CPU_COUNT parameter , whichever is greater . Shared Pool The shared pool portion of the SGA contains the library cache , the dictionary cache , buffers for parallel execution messages , and control structures . The total size of the shared pool is determined by the initialization parameter SHARED_POOL_SIZE . The default value of this parameter is 8MB on 32 - bit platforms and 64MB on 64 - bit platforms . Increasing the value of this parameter increases the amount of memory reserved for the shared pool . Library Cache The library cache includes the shared SQL areas , private SQL areas ( in the case of a shared server configuration ) , PL / SQL procedures and packages , and control structures such as locks and library cache handles . Shared SQL areas are accessible to all users , so the library cache is contained in the shared pool within the SGA . Shared SQL Areas and Private SQL Areas Oracle represents each SQL statement it runs with a shared SQL area and a private SQL area . Oracle recognizes when two users are executing the same SQL statement and reuses the shared SQL area for those users . However , each user must have a separate copy of the statement ' s private SQL area . Shared SQL Areas A shared SQL area contains the parse tree and execution plan for a given SQL statement . Oracle saves memory by using one shared SQL area for SQL statements run multiple times , which often happens when many users run the same application . Oracle allocates memory from the shared pool when a new SQL statement is parsed , to store in the shared SQL area . The size of this memory depends on the complexity of the statement . If the entire shared pool has already been allocated , Oracle can deallocate items from the pool using a modified LRU ( least recently used ) algorithm until there is enough free space for the new statement ' s shared SQL area . If Oracle deallocates a shared SQL area , the associated SQL statement must be reparsed and reassigned to another shared SQL area at its next execution . " Private SQL Area " PL / SQL Program Units and the Shared Pool Oracle processes PL / SQL program units ( procedures , functions , packages , anonymous blocks , and database triggers ) much the same way it processes individual SQL statements . Oracle allocates a shared area to hold the parsed , compiled form of a program unit . Oracle allocates a private area to hold values specific to the session that runs the program unit , including local , global , and package variables ( also known as package instantiation ) and buffers for executing SQL . If more than one user runs the same program unit , then a Individual SQL statements contained within a PL / SQL program unit are processed as described in the previous sections . Despite their origins within a PL / SQL program unit , these SQL statements use a shared area to hold their parsed representations and a private area for each session that runs the statement . Dictionary Cache The data dictionary is a collection of database tables and views containing reference information about the database , its structures , and its users . Oracle accesses the data dictionary frequently during SQL statement parsing . This access is essential to the continuing operation of Oracle . The data dictionary is accessed so often by Oracle that two special locations in memory are designated to hold dictionary data . One area is called the data dictionary cache , also known as the row cache because it holds data as rows instead of buffers ( which hold entire blocks of data ) . The other area in memory to hold dictionary data is the library cache . All Oracle user processes share these two caches for access to data dictionary information . Chapter 7 , " The Data Dictionary " " Library Cache " Allocation and Reuse of Memory in the Shared Pool In general , any item ( shared SQL area or dictionary row ) in the shared pool remains until it is flushed according to a modified LRU algorithm . The memory for items that are not being used regularly is freed if space is required for new items that must be allocated some space in the shared pool . A modified LRU algorithm allows shared pool items that are used by many sessions to remain in memory as long as they are useful , even if the process that originally created the item terminates . As a result , the When a SQL statement is submitted to Oracle for execution , Oracle automatically performs the following memory allocation steps : Oracle checks the shared pool to see if a shared SQL area already exists for an identical statement . If so , that shared SQL area is used for the execution of the subsequent new instances of the statement . Alternatively , if there is no shared SQL area for a statement , Oracle allocates a new shared SQL area in the shared pool . In either case , the user ' s private SQL area is associated with the shared SQL area that contains the statement . A shared SQL area can be flushed from the shared pool , even if the shared SQL area corresponds to an open cursor that has not been used for some time . If the open cursor is subsequently used to run its statement , Oracle reparses the statement , and a new shared SQL area is allocated in the shared pool . Oracle allocates a private SQL area on behalf of the session . The location of the private SQL area depends on the type of connection established for the session . Oracle also flushes a shared SQL area from the shared pool in these circumstances : When the ANALYZE statement is used to update or delete the statistics of a table , cluster , or index , all shared SQL areas that contain statements referencing the analyzed schema object are flushed from the shared pool . The next time a flushed statement is run , the statement is parsed in a new shared SQL area to reflect the new statistics for the schema object . If a schema object is referenced in a SQL statement and that object is later modified in any way , the shared SQL area is invalidated ( marked invalid ) , and the statement must be reparsed the next time it is run . If you change a database ' s global database name , all information is flushed from the shared pool . The administrator can manually flush all information in the shared pool to assess the performance ( with respect to the shared pool , not the data buffer cache ) that can be expected after instance startup without shutting down the current instance . The statement FLUSH SHARED_POOL is used to do this . " Shared SQL Areas and Private SQL Areas " for more information about the location of the private SQL area Chapter 6 , " Dependencies Among Schema Objects " for more information about the invalidation of SQL statements and dependency issues for information about using FLUSH Oracle Database Reference for information about V $ SQL V $ SQLAREA dynamic views Large Pool The database administrator can configure an optional memory area called the large pool to provide large memory allocations for : Session memory for the shared server and the Oracle XA interface ( used where transactions interact with more than one database ) I / O server processes Oracle backup and restore operations By allocating session memory from the large pool for shared server , Oracle XA , or parallel query buffers , Oracle can use the shared pool primarily for caching shared SQL and avoid the performance overhead caused by shrinking the shared SQL cache . In addition , the memory for Oracle backup and restore operations , for I / O server processes , and for parallel buffers is allocated in buffers of a few hundred kilobytes . The large pool is better able to satisfy such large memory requests than the shared pool . The large pool does not have an LRU list . It is different from reserved space in the shared pool , which uses the same LRU list as other memory allocated from the shared pool . " Shared Server Architecture " for information about allocating session memory from the large pool for the shared server Oracle Database Application Developer ' s Guide - Fundamentals for information about Oracle XA for more information about the large pool , reserve space in the shared pool , and I / O server processes " Overview of Parallel Execution " for information about allocating memory for parallel execution Java Pool Java pool memory is used in server memory for all session - specific Java code and data within the JVM . Java pool memory is used in different ways , depending on what mode the Oracle server is running in . The Java Pool Advisor statistics provide information about library cache memory used for Java and predict how changes in the size of the Java pool can affect the parse rate . The Java Pool Advisor is internally turned on when statistics_level is set to TYPICAL or higher . These statistics reset when the advisor is turned off . Oracle Database Java Developer ' s Guide Streams Pool In a single database , you can specify that Streams memory be allocated from a pool in the SGA called the Streams pool . To configure the Streams pool , specify the size of the pool in bytes using the STREAMS_POOL_SIZE initialization parameter . If a Streams pool is not defined , then one is created automatically when Streams is first used . If is set , then the SGA memory for the Streams pool comes from the global pool of SGA . If is not set , then SGA for the Streams pool is transferred from the buffer cache . This transfer takes place only after the first use of Streams . The amount transferred is 10 % of the shared pool size . Oracle Streams Concepts and Administration Control of the SGA ' s Use of Memory Dynamic SGA provides external controls for increasing and decreasing Oracle ' s use of physical memory . Together with the dynamic buffer cache , shared pool , and large pool , dynamic SGA allows the following : The SGA can grow in response to a database administrator statement , up to an operating system specified maximum and the SG A_MAX_SIZE specification . The SGA can shrink in response to a database administrator statement , to an Oracle prescribed minimum , usually an operating system preferred limit . Both the buffer cache and the SGA pools can grow and shrink at runtime according to some internal , Oracle - managed policy . Other SGA Initialization Parameters You can use several initialization parameters to control how the SGA uses memory . Physical Memory LOCK_SGA parameter locks the SGA into physical memory . SGA Starting Address SHARED_MEMORY_ADDRESS HI_SHARED_MEMORY_ADDRESS parameters specify the SGA ' s starting address at runtime . These parameters are rarely used . For 64 - bit platforms , HI_SHARED_MEMORY_ADDRESS specifies the high order 32 bits of the 64 - bit address . Extended Buffer Cache Mechanism USE_INDIRECT_DATA_BUFFERS parameter enables the use of the extended buffer cache mechanism for 32 - bit platforms that can support more than 4 GB of physical memory . On platforms that do not support this much physical memory , this parameter is ignored . Overview of the Program Global Areas A program global area ( PGA ) is a memory region that contains data and control information for a server process . It is a nonshared memory created by Oracle when a server process is started . Access to it is exclusive to that server process and is read and written only by Oracle code acting on behalf of it . The total PGA memory allocated by each server process attached to an Oracle instance is also referred to as the aggregated PGA memory allocated by the instance . " Connections and Sessions " for information about sessions Content of the PGA The content of the PGA memory varies , depending on whether the instance is running the shared server option . But generally speaking , the PGA memory can be classified as follows . Private SQL Area A private SQL area contains data such as bind information and runtime memory structures . Each session that issues a SQL statement has a private SQL area . Each user that submits the same SQL statement has his or her own private SQL area that uses a single shared SQL area . Thus , many private SQL areas can be associated with the same shared SQL area . The private SQL area of a cursor is itself divided into two areas whose lifetimes are different : The persistent area , which contains , for example , bind information . It is freed only when the cursor is closed . The run - time area , which is freed when the execution is terminated . Oracle creates the runtime area as the first step of an execute request . For INSERT , UPDATE , and DELETE statements , Oracle frees the runtime area after the statement has been run . For queries , Oracle frees the runtime area only after all rows are fetched or the query is canceled . The location of a private SQL area depends on the type of connection established for a session . If a session is connected through a dedicated server , private SQL areas are located in the server process ' s PGA . However , if a session is connected through a shared server , part of the private SQL area is kept in the SGA . for information about the PGA " Connections and Sessions " for more information about sessions " SQL Work Areas " for information about SELECT runtimes during a sort , hash - join , bitmap create , or bitmap merge Oracle Database Net Services Administrator ' s Guide Cursors and SQL Areas The application developer of an Oracle precompiler program or OCI program can explicitly open cursors , or handles to specific private SQL areas , and use them as a named resource throughout the execution of the program . Recursive cursors that Oracle issues implicitly for some SQL statements also use shared SQL areas . The management of private SQL areas is the responsibility of the user process . The allocation and deallocation of private SQL areas depends largely on which application tool you are using , although the number of private SQL areas that a user process can allocate is always limited by the initialization parameter OPEN_CURSORS . The default value of this parameter is 50 . A private SQL area continues to exist until the corresponding cursor is closed or the statement handle is freed . Although Oracle frees the runtime area after the statement completes , the persistent area remains waiting . Application developers close all open cursors that will not be used again to free the persistent area and to minimize the amount of memory required for users of the application . " Cursors " Session Memory Session memory is the memory allocated to hold a session ' s variables ( logon information ) and other information related to the session . For a shared server , the session memory is shared and not private . SQL Work Areas For complex queries ( for example , decision - support queries ) , a big portion of the runtime area is dedicated to work areas allocated by memory - intensive operators such as the following : Sort - based operators ( order by , group - by , rollup , window function ) Hash - join Bitmap merge Bitmap create For example , a sort operator uses a work area ( sometimes called the sort area ) to perform the in - memory sort of a set of rows . Similarly , a hash - join operator uses a work area ( also called the hash area ) to build a hash table from its left input . If the amount of data to be processed by these two operators does not fit into a work area , then the input data is divided into smaller pieces . This allows some data pieces to be processed in memory while the The size of a work area can be controlled and tuned . Generally , bigger database areas can significantly improve the performance of a particular operator at the cost of higher memory consumption . Optimally , the size of a work area is big enough such to accommodate the input data and auxiliary memory structures allocated by its associated SQL operator . If not , response time increases , because part of the input data must be spilled to temporary disk storage . In the extreme case , if the size of a work area is far too small compared PGA Memory Management for Dedicated Mode You can automatically and globally manage the size of SQL work areas . The database administrator simply needs to specify the total size dedicated to PGA memory for the Oracle instance by setting the initialization parameter PGA_AGGREGATE_TAR GET . The specified number ( for example , 2G ) is a global target for the Oracle instance , and Oracle tries to ensure that the total amount of PGA memory allocated across all database server processes never exceeds this target . In earlier releases , the database administrator controlled the maximum size of SQL work areas by setting the following parameters : SORT_AREA_SIZE HASH_AREA_SIZE BITMAP_MERGE_AREA_SIZE CREATE_BITMAP_AREA_SIZE . Setting these parameters is difficult , because the maximum work area size is ideally selected from the data input size and the total number of work areas active in the system . These two factors vary a lot from one work area to another and from one time to another . Thus , the various * _AREA_SIZE parameters are hard to tune under the best of circumstances . With PGA_AGGREGATE_TARGET , sizing of work areas for all dedicated sessions is automatic and all * _AREA_SIZE parameters are ignored for these sessions . At any given time , the total amount of PGA memory available to active work areas on the instance is automatically derived from the parameter PGA_AGGREGATE_TARGET . This amount is set to the value of minus the PGA memory allocated by other components of the system ( for example , PGA memory allocated by sessions ) . The resulting PGA memory is then allotted to individual active work areas based on their specific memory requirement . The initialization parameter WORKAREA_SIZE_POLICY is a session - and system - level parameter that can take only two values : MANUAL or AUTO . The default is AUTO . The database administrator can set , and then switch back and forth from auto to manual memory management mode . There are fixed views and columns that provide PGA memory use statistics . Most of these statistics are enabled when is set . Statistics on allocation and use of work area memory can be viewed in the following dynamic performance views : V $ SYSSTAT V $ SESSTAT V $ PGASTAT V $ SQL_WORKAREA V $ SQL_WORKAREA_ACTIVE The following three columns in the V $ PROCESS view report the PGA memory allocated and used by an Oracle process : PGA_USED_MEM PGA_ALLOCATED_MEM PGA_MAX_MEM The automatic PGA memory management mode applies to work areas allocated by both dedicated and shared Oracle database servers . for information about views for information about using these views Dedicated and Shared Servers Memory allocation depends , in some specifics , on whether the system uses dedicated or shared server architecture . Table 8 - 1 shows the differences . Table 8 - 1 Differences in Memory Allocation Between Dedicated and Shared Servers Memory Area Dedicated Server Shared Server Nature of session memory Private Shared Location of the persistent area PGA SGA Location of part of the runtime area for SELECT statements PGA Location of the runtime area for DML / DDL statements Software Code Areas Software code areas are portions of memory used to store code that is being run or can be run . Oracle code is stored in a software area that is typically at a different location from users ' programs β€” a more exclusive or protected location . Software areas are usually static in size , changing only when software is updated or reinstalled . The required size of these areas varies by operating system . Software areas are read only and can be installed shared or nonshared . When possible , Oracle code is shared so that all Oracle users can access it without having multiple copies in memory . This results in a saving of real main memory and improves overall performance . User programs can be shared or nonshared . Some Oracle tools and utilities ( such as Oracle Forms and SQL * Plus ) can be installed shared , but some can not . Multiple instances of Oracle can use the same Oracle code area with different databases if running on the same computer . The option of installing software shared is not available for all operating systems ( for example , on PCs operating Windows ) . See your Oracle operating system - specific documentation for more information . Previous Page Page 13 of 36 Next Page
[ "Memory Architecture", "Oracle instance" ]
http://docs.oracle.com/cd/B19306_01/server.102/b14231/control.htm
5 Managing Control Files This chapter explains how to create and maintain the control files for your database and contains the following topics : What Is a Control File ? Guidelines for Control Files Creating Control Files Troubleshooting After Creating Control Files Backing Up Control Files Recovering a Control File Using a Current Copy Dropping Control Files Displaying Control File Information See Also Part III , " Automated File and Storage Management " for information about creating control files that are both created and managed by the Oracle Database server What Is a Control File ? Every Oracle Database has a control file , which is a small binary file that records the physical structure of the database . The control file includes : The database name Names and locations of associated datafiles and redo log files The timestamp of the database creation The current log sequence number Checkpoint information The control file must be available for writing by the Oracle Database server whenever the database is open . Without the control file , the database can not be mounted and recovery is difficult . The control file of an Oracle Database is created at the same time as the database . By default , at least one copy of the control file is created during database creation . On some operating systems the default is to create multiple copies . You should create two or more copies of the control file during database creation . You can also create control files later , if you lose control files or want to change particular settings in the control files . Guidelines for Control Files This section describes guidelines you can use to manage the control files for a database , and contains the following topics : Provide Filenames for the Control Files Multiplex Control Files on Different Disks Back Up Control Files Manage the Size of Control Files Provide Filenames for the Control Files You specify control file names using the CONTROL_FILES initialization parameter in the database initialization parameter file ( see " Creating Initial Control Files " ) . The instance recognizes and opens all the listed file during startup , and the instance writes to and maintains all listed control files during database operation . If you do not specify files for CONTROL_FILES before database creation : If you are not using Oracle - managed files , then the database creates a control file and uses a default filename . The default name is operating system specific . If you are using Oracle - managed files , then the initialization parameters you set to enable that feature determine the name and location of the control files , as described in Chapter 11 , " Using Oracle - Managed Files " If you are using Automatic Storage Management , you can place incomplete ASM filenames in the DB_CREATE_FILE_DEST and DB_RECOVERY_FILE_DEST initialization parameters . ASM then automatically creates control files in the appropriate places . See " About ASM Filenames " and " Creating a Database in ASM " for more information . Multiplex Control Files on Different Disks Every Oracle Database should have at least two control files , each stored on a different physical disk . If a control file is damaged due to a disk failure , the associated instance must be shut down . Once the disk drive is repaired , the damaged control file can be restored using the intact copy of the control file from the other disk and the instance can be restarted . In this case , no media recovery is required . The behavior of multiplexed control files is this : The database writes to all filenames listed for the initialization parameter in the database initialization parameter file . The database reads only the first file listed in the parameter during database operation . If any of the control files become unavailable during database operation , the instance becomes inoperable and should be aborted . Note : Oracle strongly recommends that your database has a minimum of two control files and that they are located on separate physical disks . One way to multiplex control files is to store a control file copy on every disk drive that stores members of redo log groups , if the redo log is multiplexed . By storing control files in these locations , you minimize the risk that all control files and all groups of the redo log will be lost in a single disk failure . Back Up Control Files It is very important that you back up your control files . This is true initially , and every time you change the physical structure of your database . Such structural changes include : Adding , dropping , or renaming datafiles Adding or dropping a tablespace , or altering the read / write state of the tablespace Adding or dropping redo log files or groups The methods for backing up control files are discussed in " Backing Up Control Files " Manage the Size of Control Files The main determinants of the size of a control file are the values set for the MAXDATAFILES MAXLOGFILES MAXLOGMEMBERS MAXLOGHISTORY , and MAXINSTANCES parameters in the CREATE DATABASE statement that created the associated database . Increasing the values of these parameters increases the size of a control file of the associated database . See Also : Your operating system specific Oracle documentation contains more information about the maximum control file size . Oracle Database SQL Reference for a description of the CREATE DATABASE statement Creating Co ntrol Files This section describes ways to create control files , and contains the following topics : Creating Initial Control Files Creating Additional Copies , Renaming , and Relocating Control Files Creating New Control Files Creating Initial Control Files The initial control files of an Oracle Database are created when you issue the statement . The names of the control files are specified by the parameter in the initialization parameter file used during database creation . The filenames specified in should be fully specified and are operating system specific . The following is an example of a initialization parameter : CONTROL_FILES = ( / u01 / oracle / prod / control01 . ctl , / u02 / oracle / prod / control02 . ctl , / u03 / oracle / prod / control03 . ctl ) If files with the specified names currently exist at the time of database creation , you must specify the CONTROLFILE REUSE clause in the statement , or else an error occurs . Also , if the size of the old control file differs from the SIZE parameter of the new one , you can not use the REUSE clause . The size of the control file changes between some releases of Oracle Database , as well as when the number of files specified in the control file changes . Configuration parameters such as MAXLOGFILES MAXLOGMEMBERS MAXLOGHISTORY MAXDATAFILES , and MAXINSTANCES affect control file size . You can subsequently change the value of the initialization parameter to add more control files or to change the names or locations of existing control files . See Also : Your operating system specific Oracle documentation contains more information about specifying control files . Creating Additional Copies , Renaming , and Relocating Control Files You can create an additional control file copy for multiplexing by copying an existing control file to a new location and adding the file name to the list of control files . Similarly , you rename an existing control file by copying the file to its new name or location , and changing the file name in the control file list . In both cases , to guarantee that control files do not change during the procedure , shut down the database before copying the control file . To add a multiplexed copy of the current control file or to rename a control file : Shut down the database . Copy an existing control file to a new location , using operating system commands . Edit the parameter in the database initialization parameter file to add the new control file name , or to change the existing control filename . Restart the database . Creating New Control Files This section discusses when and how to create new control files . When to Create New Control Files It is necessary for you to create new control files in the following situations : All control files for the database have been permanently damaged and you do not have a control file backup . You want to change the database name . For example , you would change a database name if it conflicted with another database name in a distributed environment . Note : You can change the database name and DBID ( internal database identifier ) using the DBNEWID utility . See Oracle Database Utilities for information about using this utility . The compatibility level is set to a value that is earlier than 10.2.0 , and you must make a change to an area of database configuration that relates to any of the following parameters from the CREATE DATABASE or CREATE CONTROLFILE commands : . If compatibility is 10.2.0 or later , you do not have to create new control files when you make such a change ; the control files automatically expand , if necessary , to accommodate the new configuration information . For example , assume that when you created the database or recreated the control files , you set to 3 . Suppose that now you want to add a fourth redo log file group to the database with the ALTER DATABASE command . If compatibility is set to 10.2.0 or later , you can do so and the controlfiles automatically expand to accommodate the new logfile information . However , with compatibility set earlier than 10.2.0 , your ALTER DATABASE command would generate an error , and you would have to first create new control files . For information on compatibility level , see " The COMPATIBLE Initialization Parameter and Irreversible Compatibility " The CREATE CONTROLFILE Statement You can create a new control file for a database using the CREATE CONTROLFILE statement . The following statement creates a new control file for the prod database ( a database that formerly used a different database name ) : CREATE CONTROLFILE SET DATABASE prod LOGFILE GROUP 1 ( ' / u01 / oracle / prod / redo01_01 . log ' , ' / u01 / oracle / prod / redo01_02 . log ' ) , GROUP 2 ( ' / u01 / oracle / prod / redo02_01 . log ' , ' / u01 / oracle / prod / redo02_02 . log ' ) , GROUP 3 ( ' / u01 / oracle / prod / redo03_01 . log ' , ' / u01 / oracle / prod / redo03_02 . log ' ) RESETLOGS DATAFILE ' / u01 Cautions : The CREATE CONTROLFILE statement can potentially damage specified datafiles and redo log files . Omitting a filename can cause loss of the data in that file , or loss of access to the entire database . Use caution when issuing this statement and be sure to follow the instructions in " Steps for Creating New Control Files " If the database had forced logging enabled before creating the new control file , and you want it to continue to be enabled , then you must specify the FORCE LOGGING clause in the statement . See " Specifying FORCE LOGGING Mode " Oracle Database SQL Reference describes the complete syntax of the statement Steps for Creating New Control Files Complete the following steps to create a new control file . Make a list of all datafiles and redo log files of the database . If you follow recommendations for control file backups as discussed in " Backing Up Control Files " , you will already have a list of datafiles and redo log files that reflect the current structure of the database . However , if you have no such list , executing the following statements will produce one . SELECT MEMBER FROM V $ LOGFILE ; SELECT NAME FROM V $ DATAFILE ; SELECT VALUE FROM V $ PARAMETER WHERE NAME = ' control_files ' ; If you have no such lists and your control file has been damaged so that the database can not be opened , try to locate all of the datafiles and redo log files that constitute the database . Any files not specified in step 5 are not recoverable once a new control file has been created . Moreover , if you omit any of the files that make up the SYSTEM tablespace , you might not be able to recover the database . Shut down the database . If the database is open , shut down the database normally if possible . Use the IMMEDIATE or ABORT clauses only as a last resort . Back up all datafiles and redo log files of the database . Start up a new instance , but do not mount or open the database : STARTUP NOMOUNT Create a new control file for the database using the statement . When creating a new control file , specify the RESETLOGS clause if you have lost any redo log groups in addition to control files . In this case , you will need to recover from the loss of the redo logs ( step 8 ) . You must specify the RESETLOGS clause if you have renamed the database . Otherwise , select the NORESETLOGS clause . Store a backup of the new control file on an offline storage device . See for instructions for creating a backup . Edit the initialization parameter for the database to indicate all of the control files now part of your database as created in step ( not including the backup control file ) . If you are renaming the database , edit the DB_NAME parameter in your instance parameter file to specify the new name . Recover the database if necessary . If you are not recovering the database , skip to step 9 If you are creating the control file as part of recovery , recover the database . If the new control file was created using the NORESETLOGS clause ( step ) , you can recover the database with complete , closed database recovery . If the new control file was created using the clause , you must specify USING BACKUP CONTROL FILE . If you have lost online or archived redo logs or datafiles , use the procedures for recovering those files . Oracle Database Backup and Recovery Basics Oracle Database Backup and Recovery Advanced User ' s Guide for information about recovering your database and methods of recovering a lost control file Open the database using one of the following methods : If you did not perform recovery , or you performed complete , closed database recovery in step 8 , open the database normally . ALTER DATABASE OPEN ; If you specified when creating the control file , use the statement , indicating ALTER DATABASE OPEN RESETLOGS ; The database is now open and available for use . Troubleshooting After Creating Control Files After issuing the statement , you may encounter some errors . This section describes the most common control file errors : Checking for Missing or Extra Files Handling Errors During CREATE CONTROLFILE Checking for Missing or Extra Files After creating a new control file and using it to open the database , check the alert log to see if the database has detected inconsistencies between the data dictionary and the control file , such as a datafile in the data dictionary includes that the control file does not list . If a datafile exists in the data dictionary but not in the new control file , the database creates a placeholder entry in the control file under the name MISSING nnnn , where nnnn is the file number in decimal . MISSING is flagged in the control file as being offline and requiring media recovery . If the actual datafile corresponding to is read - only or offline normal , then you can make the datafile accessible by renaming to the name of the actual datafile . If corresponds to a datafile that was not read - only or offline normal , then you can not use the rename operation to make the datafile accessible , because the datafile requires media recovery that is precluded by the results of . In this case , you must drop the tablespace containing the datafile . Conversely , if a datafile listed in the control file is not present in the data dictionary , then the database removes references to it from the new control file . In both cases , the database includes an explanatory message in the alert log to let you know what was found . Handling Errors During CREATE CONTROLFILE If Oracle Database sends you an error ( usually error ORA - 01173 ORA - 01176 ORA - 01177 ORA - 01215 , or ORA - 01216 ) when you attempt to mount and open the database after creating a new control file , the most likely cause is that you omitted a file from the statement or included one that should not have been listed . In this case , you should restore the files you backed up in step 3 and repeat the procedure from step 4 , using the correct filenames . Backing Up Control Files Use the ALTER DATABASE BACKUP CONTROLFILE statement to back up your control files . You have two options : Back up the control file to a binary file ( duplicate of existing control file ) using the following statement : ALTER DATABASE BACKUP CONTROLFILE TO ' / oracle / backup / control . bkp ' ; Produce SQL statements that can later be used to re - create your control file : ALTER DATABASE BACKUP CONTROLFILE TO TRACE ; This command writes a SQL script to the database trace file where it can be captured and edited to reproduce the control file . Oracle Database Backup and Recovery Basics for more information on backing up your control files Recovering a Control File Using a Current Copy This section presents ways that you can recover your control file from a current backup or from a multiplexed copy . Recovering from Control File Corruption Using a Control File Copy This procedure assumes that one of the control files specified in the parameter is corrupted , that the control file directory is still accessible , and that you have a multiplexed copy of the control file . With the instance shut down , use an operating system command to overwrite the bad control file with a good copy : % cp / u03 / oracle / prod / control03 . ctl / u02 / oracle / prod / control02 . ctl Start SQL * Plus and open the database : SQL > STARTUP Recovering from Permanent Media Failure Using a Control File Copy This procedure assumes that one of the control files specified in the parameter is inaccessible due to a permanent media failure and that you have a multiplexed copy of the control file . With the instance shut down , use an operating system command to copy the current copy of the control file to a new , accessible location : % cp / u01 / oracle / prod / control01 . ctl / u04 / oracle / prod / control03 . ctl parameter in the initialization parameter file to replace the bad location with the new location : CONTROL_FILES = ( / u01 / oracle / prod / control01 . ctl , / u02 / oracle / prod / control02 . ctl , / u04 / oracle / prod / control03 . ctl ) Start SQL * Plus and open the database : SQL > STARTUP If you have multiplexed control files , you can get the database started up quickly by editing the initialization parameter . Remove the bad control file from setting and you can restart the database immediately . Then you can perform the reconstruction of the bad control file and at some later time shut down and restart the database after editing the initialization parameter to include the recovered control file . Dropping Control Files You want to drop control files from the database , for example , if the location of a control file is no longer appropriate . Remember that the database should have at least two control files at all times . parameter in the database initialization parameter file to delete the old control file name . Restart the database . This operation does not physically delete the unwanted control file from the disk . Use operating system commands to delete the unnecessary file after you have dropped the control file from the database . Displaying Control File Information The following views display information about control files : View Description V $ DATABASE Displays database information from the control file V $ CONTROLFILE Lists the names of control files V $ CONTROLFILE_RECORD_SECTION Displays information about control file record sections V $ PARAMETER Displays the names of control files as specified in the initialization parameter This example lists the names of the control files . SQL > SELECT NAME FROM V $ CONTROLFILE ; NAME - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - / u01 / oracle / prod / control01 . ctl / u02 / oracle / prod / control02 . ctl / u03 / oracle / prod / control03 . ctl Previous Page Page 12 of 46 Next Page
[ "Control Files", "create", "maintain" ]
http://docs.oracle.com/cd/B19306_01/server.102/b14357/ch12017.htm
DEFINE Syntax DEF [ INE ] [ variable ] | [ variable = text Specifies a user or predefined variable and assigns a CHAR value to it , or lists the value and variable type of a single variable or all variables . Terms Represents the user or predefined variable whose value you wish to assign or list . text Represents the CHAR value you wish to assign to . Enclose in single quotes if it contains punctuation or blanks . = Defines ( names ) a substitution variable and assigns it a CHAR value . Enter DEFINE followed by to list the value and type of Enter DEFINE with no clauses to list the values and types of all substitution variables . Usage Defined variables retain their values until you : enter a new DEFINE command referencing the variable enter an UNDEFINE command referencing the variable enter an ACCEPT command referencing the variable reference the variable in the NEW_VALUE or OLD_VALUE clause of a COLUMN command and then reference the column in a SELECT command EXIT SQL * Plus Whenever you run a stored query or script , SQL * Plus substitutes the value of for each substitution variable referencing ( in the form & or && ) . SQL * Plus will not prompt you for the value of in this session until you UNDEFINE If the value of a defined variable extends over multiple lines ( using the SQL * Plus command continuation character ) , SQL * Plus replaces each continuation character and carriage return with a space . For example , SQL * Plus interprets DEFINE TEXT = ' ONE - TWO - THREE ' as DEFINE TEXT = ' ONE TWO THREE ' You should avoid defining variables with names that may be identical to values that you will pass to them , as unexpected results can occur . If a value supplied for a defined variable matches a variable name , then the contents of the matching variable are used instead of the supplied value . Some variables are predefined when SQL * Plus starts . Enter DEFINE to see their definitions . Examples To assign the value MANAGER to the variable POS , type : DEFINE POS = MANAGER If you execute a command containing a reference to &POS , SQL * Plus substitutes the value MANAGER for &POS and will not prompt you for a POS value . To assign the CHAR value 20 to the variable DEPARTMENT_ID , type : DEFINE DEPARTMENT_ID = 20 Even though you enter the number 20 , SQL * Plus assigns a CHAR value to DEPARTMENT_ID consisting of two characters , 2 and 0 . To list the definition of DEPARTMENT_ID , enter DEFINE DEPARTMENT_ID DEFINE DEPARTMENT_ID = " 20 " ( CHAR ) This result shows that the value of DEPARTMENT_ID is 20 . Predefined Variables There are eight variables defined during SQL * Plus installation . These variables only differ from user defined variables by having predefined values . Table 12 - 3 Variables Predefined at SQL * Plus Installation Variable Name Contains _CONNECT_IDENTIFIER Connection identifier used to make connection , where available . _DATE Current date , or a user defined fixed string . _EDITOR Specifies the editor used by the EDIT command . _O_VERSION Current version of the installed Oracle Database . _O_RELEASE Full release number of the installed Oracle Database . _PRIVILEGE Privilege level of the current connection . _SQLPLUS_RELEASE Full release number of installed SQL * Plus component . _USER User name used to make connection . _CONNECT_IDENTIFIER Contains the connection identifier as supplied by the user to make a connection where it is available . _DATE Contains either the current date as a dynamic variable , or a fixed string . The current date is the default and is formatted using the value of NLS_DATE_FORMAT . Because _DATE can be used as a normal substitution variable , users may put it in TTITLE . If _DATE is dynamic and is used in TTITLE it will have all the normal variable semantics . If it is used with an ampersand than the value will be set to the time when the TTITLE command is executed . If it is used without an ampersand prefix , it will be re - evaluated for each page . For long reports with _DATE in the TTITLE or with multiple references to &_DATE , different times may be displayed for each Users using _DATE in TTITLEs will almost certainly want to use an ampersand : &_DATE , so that each page of the report has exactly the same timestamp . This is especially true when the current date format contains a " seconds " component . A DEFINE ( with no arguments ) or dereference using &_DATE will give the current date . The _DATE value can be UNDEFINED , or set to a fixed string with an explicit DEFINE _DATE . You can re - enable the default dynamic date behavior with : DEFINE _DATE = " " ( an empty string ) _DATE enables time values to be included in your SQL * Plus prompt . _EDITOR Specifies the default editor used by the EDIT command . During SQL * Plus installation on Windows operating systems , it is set to Notepad . On UNIX operating systems , it is set to the value of the UNIX environment variable , EDITOR , if it exists , otherwise it is set to Ed . You can use the DEFINE command to redefine _EDITOR , to hold the name of your preferred text editor . For example , to define the editor used by EDIT to be vi , enter the following command : DEFINE _EDITOR = vi _O_VERSION Contains the current version of the installed Oracle Database in the form : Oracle Database 10g Release 10 . 2 . 0 . 1 . 0 - Production _O_RELEASE Contains the full release number of the installed Oracle Database in the form : 102010000 _PRIVILEGE Contains a value indicating the privilege level of the current connection . It contains one of the following values : AS SYSDBA AS SYSOPER An empty string for normal - user connections or when there is no connection . AS SYSDBA and AS SYSOPER are database administrator level privileges . See Also : Oracle Database SQL Reference for information on AS SYSDBA and AS SYSOPER privileges . _SQLPLUS_RELEASE Contains the full release number of the installed SQL * Plus component in the form : 101020000 _USER Contains the user name connected to the current connection . You can view the value of each of these variables with the DEFINE command . These variables can be accessed and redefined like any other substitution variable . They can be used in TTITLE , in ' & ' substitution variables , or in your SQL * Plus command - line prompt . You can use the DEFINE command to view the definitions of these eight predefined variables in the same way as you view other DEFINE definitions . You can also use the DEFINE command to redefine their values , or you can use the UNDEFINE command to remove their definitions and make them unavailable . To view a specific variable definition , enter DEFINE where is the name of the substitution variable whose definition you want to view . To view all predefined and user defined variable definitions , enter DEFINE All predefined and all user defined variable definitions are displayed . You can use UNDEFINE to remove a substitution variable definition and make it unavailable . Examples of Use of Predefined Variables To change your SQL * Plus prompt to display your connection identifier , enter : SET SQLPROMPT ' _CONNECT_IDENTIFIER > ' To view the predefined value of the _SQLPLUS_RELEASE substitution variable , enter DEFINE _SQLPLUS_RELEASE DEFINE _SQLPLUS_RELEASE = " 101000100 " ( CHAR ) Previous Page Page 39 of 83 Next Page
[ "DEFINE command", "Oracle" ]
http://docs.oracle.com/cd/B19306_01/server.102/b15658/strt_stp.htm
2 Stopping and Starting Oracle Software This chapter describes how to identify Oracle Database processes , and provides basic information about how to stop and restart them . It also describes how to set up automatic startup and shutdown of the Oracle Database . It contains the following sections : Stopping and Starting Oracle Processes Automating Shutdown and Startup 2.1 Stopping and Starting Oracle Processes This section describes how to stop and start Oracle processes . It contains the following topics : Starting Oracle Processes on Mac OS X Stopping and Starting Oracle Database and Automatic Storage Management Instances Stopping and Starting Oracle CSS Daemon Stopping and Starting an Oracle Net Listener Stopping and Starting i SQL * Plus Stopping and Starting Oracle Ultra Search Stopping and Starting Oracle Enterprise Manager Database Control Stopping and Starting Oracle Management Agent 2.1.1 Starting Oracle Processes on Mac OS X Note : Ensure that you follow the instructions in this section every time you start an Oracle Database or Automatic Storage Management instance or an Oracle Net listener process . To ensure that certain shell limits are set to the values required to run Oracle processes , you must use the ssh rlogin , or telnet command to connect to the system where you want to start the process , even if that system is the local system . The syntax of this command is as follows : $ ssh localhost 2.1.2 Stopping and Starting Oracle Database and Automatic Storage Management Instances This section describes how to stop and start Oracle Database and Automatic Storage Management instances . Stopping an Oracle Database or Automatic Storage Management Instance Caution : Do not stop an Automatic Storage Management instance until you have stopped all Oracle Database instances that use that Automatic Storage Management instance to manage their storage . To stop an Oracle Database or Automatic Storage Management instance : To identify the SID and Oracle home directory for the instance that you want to shut down , run the following command : On Solaris : $ cat / var / opt / oracle / oratab On other operating systems : $ cat / etc / oratab The oratab file contains lines similar to the following , which identify the SID and corresponding Oracle home directory for each database or Automatic Storage Management instance on the system : sid oracle_home_directory : [ Y | N ] Note : Oracle recommends that you use the plus sign ( + ) as the first character in the SID of Automatic Storage Management instances . Depending on your default shell , run the oraenv or coraenv script to set the environment variables for the instance that you want to shut down : Bourne , Bash , or Korn shell : $ . / usr / local / bin / oraenv C shell : % source / usr / local / bin / coraenv When prompted , specify the SID for the instance . Run the following commands to shut down the instance : $ sqlplus / nolog SQL > CONNECT SYS / sys_password as SYSDBA SQL > SHUTDOWN NORMAL After the instance shuts down , you can quit SQL * Plus . Restarting an Oracle Database or Automatic Storage Management Instance Caution : If the database instance uses Automatic Storage Management for storage management , then you must start the Automatic Storage Management instance before you start the database instance . To restart an Oracle Database or Automatic Storage Management instance : If required , repeat Steps 1 and 2 of the preceding procedure to set the ORACLE_SID and ORACLE_HOME environment variables to identify the SID and Oracle home directory for the instance that you want to start . Run the following commands to start the instance : $ sqlplus / nolog SQL > CONNECT SYS / sys_password as SYSDBA SQL > STARTUP After the instance starts , you can exit from SQL * Plus . 2.1.3 Stopping and Starting Oracle CSS Daemon This section is not applicable to Mac OS X . To stop the Oracle Cluster Services Synchronization ( CSS ) daemon , run the following command : On AIX : / etc / init . cssd stop On other platforms : / etc / init . d / init . cssd stop To start the CSS daemon , run the following command : $ ORACLE_HOME / bin / localconfig reset This command stops the Oracle CSS daemon and then restarts it . 2.1.4 Stopping and Starting an Oracle Net Listener This section describes how to stop and start an Oracle Net listener . Stopping Oracle Net Listener To stop an Oracle Net listener : Run the following command to determine the listener name and Oracle home directory for the Oracle Net listener that you want to stop : On Mac OS X : $ ps - ax | grep tnslsnr On other platforms : $ ps - ef | grep tnslsnr This command displays a list of the Oracle Net listeners running on the system . The output of this command is similar to the following : 94248 ? ? I 0 : 00.18 oracle_home1 / bin / tnslsnr listenername1 - inherit 94248 ? ? I 0 : 00.18 oracle_home2 / bin / tnslsnr listenername2 - inherit In this sample output , listenername1 and listenername2 are the names of the listeners . If required , set the ORACLE_HOME environment variable to specify the appropriate Oracle home directory for the listener that you want to stop : Bourne , Bash , or Korn shell : $ ORACLE_HOME = oracle_home1 $ export ORACLE_HOME C shell : % setenv ORACLE_HOME Run the following command to stop the Oracle Net listener : $ $ ORACLE_HOME / bin / lsnrctl stop listenername If the name of the listener is the default name , LISTENER , then you do not have to specify the name in this command . Restarting Oracle Net Listener To start an Oracle Net listener : If required , set the environment variable to specify the appropriate Oracle home directory for the listener that you want to start : $ ORACLE_HOME = $ export ORACLE_HOME % setenv ORACLE_HOME Run the following command to restart the Oracle Net listener : $ $ ORACLE_HOME / bin / lsnrctl start [ listenername You must specify the listener name only if it is different from the default listener name , LISTENER . The listener name is mentioned in the listener . ora file . To display the contents of this file , run the following command : $ more $ ORACLE_HOME / network / admin / listener . ora 2.1.5 Stopping and Starting i SQL * Plus This section describes how to stop and start SQL * Plus . Stopping S QL * Plus To stop SQL * Plus : environment variable to specify the appropriate Oracle home directory for SQL * Plus : oracle_home oracle_home Run the following command to stop $ $ ORACLE_HOME / bin / isqlplusctl stop Starting To start environment variable to specify the appropriate Oracle home directory for the SQL * Plus instance that you want to start : Run the following command to start $ $ ORACLE_HOME / bin / isqlplusctl start 2.1.6 Stopping and Starting Oracle Ultra Search This section describes how to stop and start Oracle Ultra Search . Stopping Oracle Ultra Search To stop Oracle Ultra Search : environment variable to specify the appropriate Oracle home directory for Oracle Ultra Search : Run the following command to stop Oracle Ultra Search : $ $ ORACLE_HOME / bin / searchctl stop Starting Oracle Ultra Search To start Oracle Ultra Search : environment variable to specify the appropriate Oracle home directory for Oracle Ultra Search : Run the following command to start Oracle Ultra Search : $ $ ORACLE_HOME / bin / searchctl start 2.1.7 Stopping and Starting Oracle Enterprise Manager Database Control This section describes how to stop and start Oracle Enterprise Manager Database Control . This section is not applicable to Mac OS X . Stopping Oracle Enterprise Manager Database Control To stop Oracle Enterprise Manager Database Control : Depending on your default shell , run the oraenv or coraenv script to set the environment for the database managed by the Database Control that you want to stop : script : % source / usr / local / bin / coraenv script : $ . / usr / local / bin / oraenv Run the following command to stop the Database Control : $ $ ORACLE_HOME / bin / emctl stop dbconsole Starting Oracle Enterprise Manager Database Control To start Database Control : Set the ORACLE_SID environment variables to identify the SID and Oracle home directory for the database control that you want to start : $ ORACLE_SID = sid $ export ORACLE_HOME ORACLE_SID % setenv ORACLE_SID Run the following command to start the Database Control : $ $ ORACLE_HOME / bin / emctl start dbconsole 2.1.8 Stopping and Starting Oracle Management Agent If you are using Oracle Enterprise Manager Grid Control to manage multiple Oracle products from a central location , then you must have an Oracle Management Agent installed on each host system . Typically , the Oracle Management Agent is installed in its own Oracle home directory . This section describes how to stop and start Oracle Management Agent . Stopping Oracle Management Agent To stop Oracle Management Agent : Run the following command to determine the Oracle home directory for Oracle Management Agent : $ ps - ef | grep emagent This command displays information about the Oracle Management Agent processes . The output of this command is similar to the following : 94248 ? ? I 0 : 00.18 / agent / bin / emagent . . . environment variable to specify the appropriate Oracle home directory for the Oracle Management Agent : Run the following command to stop Oracle Management Agent : $ $ ORACLE_HOME / agent / bin / emctl stop agent Starting Oracle Management Agent To start Oracle Management Agent : environment variable to specify the appropriate Oracle home directory for Oracle Management Agent : Run the following command to start Oracle Management Agent : $ $ ORACLE_HOME / agent / bin / emctl start agent Previous Page Page 5 of 20 Next Page
[ "Database Administrator", "Oracle Software" ]
http://docs.oracle.com/cd/E14571_01/web.1111/e13712/configurewebapp.htm
3 Creating and Configuring Web Applications The following sections describe how to create and configure Web application resources . WebLogic Web Applications and Java EE Directory Structure Main Steps to Create and Configure a Web Application Configuring How a Client Accesses a Web Application Configuring Virtual Hosts for Web Applications Targeting Web Applications to Virtual Hosts Loading Servlets , Context Listeners , and Filters Shared Java EE Web Application Libraries WebLogic Web Applications and Java EE An important aspect of the Java Platform , Enterprise Edition ( Java EE ) Version 5.0 programming model is the introduction of metadata annotations . Annotations simplify the application development process by allowing a developer to specify within the Java class itself how the application component behaves in the container , requests for dependency injection , and so on . Annotations are an alternative to deployment descriptors that were required by older versions of enterprise applications ( J2EE 1.4 and earlier ) . See http : / / java . sun . com / javaee / reference / for more information . With Java EE annotations , the standard application . xml and web . xml deployment descriptors are optional . The Java EE programming model uses the JDK 5.0 annotations feature for Web containers , such as EJBs , servlets , Web applications , and JSPs . See Chapter 8 , " WebLogic Annotation for Web Components " and http : / / java . sun . com / javaee / 5 / docs / api / However , Web applications deployed on WebLogic Server can still use a standard Java EE deployment descriptor file and a WebLogic - specific deployment descriptor file to define their resources and operating attributes . Directory Structure Web applications use a standard directory structure defined in the Java EE specification . You can deploy a Web application as a collection of files that use this directory structure , known as exploded directory format , or as an archived file called a WAR file . Oracle recommends that you package and deploy your exploded Web application as part of an enterprise application . This is an Oracle best practice , which allows for easier application migration , additions , and changes . Also , packaging your Web application as part of an enterprise application allows you to take The WEB - INF directory contains the deployment descriptors for the Web application ( web . xml weblogic . xml ) and two subdirectories for storing compiled Java classes and library JAR files . These subdirectories are respectively named classes lib . JSP taglibs are stored in the WEB - INF directory at the top level of the staging directory . The Java classes include servlets , helper classes and , if desired , precompiled JSPs . All servlets , classes , static files , and other resources belonging to a Web application are organized under a directory hierarchy . The entire directory , once staged , is bundled into a WAR file using the jar command . The WAR file can be deployed alone or as part of an enterprise application ( recommended ) with other application components , including other Web applications , EJB components , and WebLogic Server components . JSP pages and HTTP servlets can access all services and APIs available in WebLogic Server . These services include EJBs , database connections through Java Database Connectivity ( JDBC ) , JavaMessaging Service ( JMS ) , XML , and more . DefaultWebApp / Place your static files , such as HTML files and JSP files in the directory that is the document root of your Web application . In the default installation of WebLogic Server , this directory is called DefaultWebApp , under user_domains / mydomain / applications ( To make your Web application the default Web application , you must set context - root to " " in the weblogic . xml deployment descriptor file . ) DefaultWebApp / WEB - INF / web . xml The DefaultWebApp / WEB - INF / web . xml file is the Web application deployment descriptor that configures the Web application . DefaultWebApp / WEB - INF / weblogic . xml DefaultWebApp / WEB - INF / weblogic . xml file is the WebLogic - specific deployment descriptor file that defines how named resources in the file are mapped to resources residing elsewhere in WebLogic Server . This file is also used to define JSP and HTTP session attributes . DefaultWebApp / WEB - INF / classes DefaultWebApp / WEB - INF / classes directory contains server - side classes such as HTTP servlets and utility classes . DefaultWebApp / WEB - INF / lib DefaultWebApp / WEB - INF / lib directory contains JAR files used by the Web application , including JSP tag libraries . Accessing Information in WEB - INF directory is not part of the public document tree of the application . No file contained in the directory can be served directly to a client by the container . However , the contents of the directory are visible to servlet code using the getResource getResourceAsStream ( ) method calls on the ServletContext or includes / forwards using the RequestDispatcher . Hence , if the application developer needs access , from servlet code , to application specific configuration information that should not be exposed directly to the Web client , the application developer may place it under this directory . Since requests are matched to resource mappings in a case - sensitive manner , client requests for " / WEB - INF / foo " , " / WEb - iNf / foo " , for example , should not result in contents of the Web application located under / WEB - INF being returned , nor any form of directory listing thereof . Directory Structure Example The following is an example of a Web application directory structure , in which myWebApp / is the staging directory : Example 3 - 1 Web Application Directory Structure myWebApp / WEB - INF / web . xml weblogic . xml lib / MyLib . jar classes / MyPackage / MyServlet . class index . html index . jsp Main Steps to Create and Configure a Web Application The following steps summarize the procedure for creating a Web application as part of an enterprise application using the split development directory structure . See " Creating a Split Development Directory Environment " , " Building Applications In a Split Development Directory " , and " Deploying and Packaging From a Split Development Directory " in Developing Applications for Oracle WebLogic Server You may want to use developer tools included with WebLogic Server for creating and configuring Web applications . See Web Application Developer Tools Step One : Create the Enterprise Application Wrapper Create a directory for your root EAR file : \ src \ myEAR \ Set your environment as follows : On Windows , execute the setWLSEnv . cmd command , located in the directory server \ bin \ , where server is the top - level directory in which WebLogic Server is installed . On UNIX , execute the setWLSEnv . sh command , located in the directory server / bin / , where server is the top - level directory in which WebLogic Server is installed and domain refers to the name of your domain . Package your enterprise application in the \ src \ myEAR \ directory as follows : Place the enterprise applications descriptors ( application . xml weblogic - application . xml ) in the META - INF \ directory . See " Enterprise Application Deployment Descriptors " in Developing Applications for Oracle WebLogic Server Edit the deployment descriptors as needed to fine - tune the behavior of your enterprise application . See Web Application Developer Tools Place the enterprise application .jar files in : \ src \ myEAR \ APP - INF \ lib \ Step Two : Create the Web Application Create a directory for your Web application in the root of your EAR file : \ src \ myEAR \ myWebApp Package your Web application in the \ src \ myEAR \ myWebApp \ directory as follows : Place the Web application descriptors ( ) in the \ src \ myEAR \ myWebApp \ WEB - INF \ directory . See Appendix B , " weblogic . xml Deployment Descriptor Elements " Edit the deployment descriptors as needed to fine - tune the behavior of your enterprise application . See Place all HTML files , JSPs , images and any other files referenced by the Web application pages in the root of the Web application : \ src \ myEAR \ myWebApp \ images \ myimage . jpg \ src \ myEAR \ myWebApp \ login . jsp \ src \ myEAR \ myWebApp \ index . html Place your Web application Java source files ( servlets , tag libs , other classes referenced by servlets or tag libs ) in : \ src \ myEAR \ myWebApp \ WEB - INF \ src \ Step Three : Creating the build . xml File Once you have set up your directory structure , you create the build . xml file using the weblogic . BuildXMLGen utility . Step Four : Execute the Split Development Directory Structure Ant Tasks Execute the wlcompile Ant task to invoke the javac compiler . This compiles your Web application Java components into an output directory : / build / myEAR / WEB - INF / classes Execute wlappc Ant task to invoke the appc compiler . This compiles any JSPs and container - specific EJB classes for deployment . Execute the wldeploy Ant task to deploy your Web application as part of an archived or exploded EAR to WebLogic Server . If this is a production environment ( rather than development ) , execute the wlpackage Ant task to package your Web application as part of an archived or exploded EAR . Note : The wlpackage Ant task places compiled versions of your Java source files in the build directory . For example : / build / myEAR / myWebApp / classes Configuring How a Client Accesses a Web Application You construct the URL that a client uses to access a Web application using the following pattern : http : / / hoststring / ContextPath / servletPath / pathInfo Where hoststring is either a host name that is mapped to a virtual host or hostname : portNumber ContextPath is the name of your Web application . servletPath is a servlet that is mapped to the servletPath pathInfo is the remaining portion of the URL , typically a file name . If you are using virtual hosting , you can substitute the virtual host name for the hoststring portion of the URL . Configuring Virtual Hosts for Web Applications WebLogic Server supports two methods for configuring virtual hosts for Web applications : Configuring a Channel - based Virtual Host Configuring a Host - based Virtual Host Configuring a Channel - based Virtual Host The following is an example of how to configure a channel - based virtual host : < VirtualHost Name = " channel1vh " NetworkAccessPoint = " Channel1 " Targets = " myserver " / > < VirtualHost Name = " channel2vh " NetworkAccessPoint = " Channel2 " Targets = " myserver " / > Where Channel1 Channel2 are the names of NetworkAccessPoint configured in the config . xml file . NetworkAccessPoint represents the dedicated server channel name for which the virtual host serves HTTP requests . If the for a given HTTP request does not match the of any virtual host , the incoming HOST header is matched with the VirtualHostNames in order to resolve the correct virtual host . If an incoming request does not match a virtual host , the request will be served by the default Web server . Configuring a Host - based Virtual Host The following is an example of how to configure a host - based virtual host : < VirtualHost Name = " cokevh " Targets = " myserver " VirtualHostNames = " coke " / > < VirtualHost Name = " pepsivh " Targets = " myserver " VirtualHostNames = " pepsi " / > Targeting Web Applications to Virtual Hosts A Web application component can be targeted to servers and virtual hosts using the WebLogic Administration Console . If you are migrating from previous versions of WebLogic Server , note that in the config . xml file , all Web application targets must be specified in the targets attribute . The targets attribute has replaced the virtual hosts attribute and a virtual host can not have the same name as a server or cluster in the same domain . The following is an example of how to target a Web application to a virtual host : < AppDeployment name = " test - app " Sourcepath = " / myapps / test - app . ear " > < SubDeployment Name = " test - webapp1 . war " Targets = " virutalhost - 1 " / > < SubDeployment Name = " test - webapp2 . war " Targets = " virtualhost - 2 " / > . . . < / AppDeployment > Loading Servlets , Context Listeners , and Filters Servlets , Context Listeners , and Filters are loaded and destroyed in the following order : Order of loading : Context Listeners Filters Servlets Order of destruction : Servlets Filters Context Listeners Servlets and filters are loaded in the same order they are defined in the file and unloaded in reverse order . Context listeners are loaded in the following order : All context listeners in the file in the order as specified in the file Packaged JAR files containing tag library descriptors Tag library descriptors in the directory Shared Java EE Web Application Libraries A Java EE Web application library is a standalone Web application module registered with the Java EE application container upon deployment . With WebLogic Server , multiple Web applications can easily share a single Web application module or collection of modules . A Web application may reference one or more Web application libraries , but can not reference other library types ( EJBs , EAR files , plain JAR files ) . Web application libraries are Web application modules deployed as libraries . They are referenced from the file using the same syntax that is used to reference application libraries in the weblogic - application . xml file , except that the < context - root > element is ignored . At deployment time , the classpath of each referenced library is appended to the Web application ' s classpath . Therefore , the search for all resources and classes occurs first in the original Web application and then in the referenced library . The deployment tools , appc , wlcompile , and BuildXMLGen support libraries at the Web application level in the same way they support libraries at the application level . For more information about shared Java EE libraries and their deployment , see " Creating Shared Java EE Libraries and Optional Packages " Previous Page Page 6 of 23 Next Page
[ "Web Applications", "Oracle WebLogic Server", "Developing" ]
http://docs.oracle.com/javase/7/docs/api/java/lang/NumberFormatException.html
java . lang . Object java . lang . Throwable java . lang . Exception java . lang . RuntimeException java . lang . IllegalArgumentException java . lang . NumberFormatException All Implemented Interfaces : Serializable public class NumberFormatException extends IllegalArgumentException Thrown to indicate that the application has attempted to convert a string to one of the numeric types , but that the string does not have the appropriate format . Since : JDK1 . 0 See Also : Integer . toString ( ) Serialized Form Constructor Summary Constructors Constructor and Description NumberFormatException ( ) Constructs a with no detail message . String s ) Constructs a with the specified detail message . Method Summary Methods inherited from class java . lang . Throwable addSuppressed fillInStackTrace getCause getLocalizedMessage getMessage getStackTrace getSuppressed initCause printStackTrace printStackTrace setStackTrace toString Methods inherited from class java . lang . Object clone equals finalize getClass hashCode notify notifyAll wait wait Constructor Detail public NumberFormatException ( ) with no detail message . public NumberFormatException ( String s ) with the specified detail message . Parameters : s - the detail message .
[ "pre-industrial Europe", "Interfaces" ]
http://docs.oracle.com/javase/7/docs/api/javax/swing/text/html/HTML.Tag.html
java . lang . Object javax . swing . text . html . HTML . Tag Direct Known Subclasses : HTML . UnknownTag Enclosing class : HTML public static class HTML . Tag extends Object Typesafe enumeration for an HTML tag . Although the set of HTML tags is a closed set , we have left the set open so that people can add their own tag types to their custom parser and still communicate to the reader . Field Summary Fields Modifier and Type Field and Description static HTML . Tag A static ADDRESS APPLET AREA B BASE BASEFONT BIG BLOCKQUOTE BODY BR CAPTION CENTER CITE CODE COMMENT All comments are labeled with this tag . CONTENT All text content is labeled with this tag . DD DFN DIR DIV DL DT EM FONT FORM FRAME FRAMESET H1 H2 H3 H4 H5 H6 HEAD HR HTML I IMG IMPLIED All text content must be in a paragraph element . INPUT ISINDEX KBD LI LINK MAP MENU META NOFRAMES OBJECT OL OPTION P PARAM PRE S SAMP SCRIPT SELECT SMALL SPAN STRIKE STRONG STYLE SUB SUP TABLE TD TEXTAREA TH TITLE TR TT U UL VAR Constructor Summary Constructors Modifier Constructor and Description ( ) protected String id ) Creates a new Tag with the specified id , and with causesBreak and isBlock set to false protected String id , boolean causesBreak , boolean isBlock ) Creates a new Tag with the specified id causesBreak and isBlock are defined by the user . Method Summary Methods Modifier and Type Method and Description boolean breaksFlow ( ) Returns true if this tag causes a line break to the flow of data , otherwise returns false boolean Returns true if this tag is a block tag , which is a tag used to add structure to a document . isPreformatted if this tag is pre - formatted , which is true if the tag is either PRE or TEXTAREA toString Returns the string representation of the tag . Methods inherited from class java . lang . Object clone equals finalize getClass hashCode notify notifyAll wait wait
[ "HTML . Tag" ]
http://docs.pixologic.com/user-guide/zbrush-plugins/image-plane/
Image Plane Image Plane provides an easy way to load images into ZBrush for use in texturing such as using ZProject brush polypainting and for modelling with Reference Images When installed you should have an Image Plane subpalette in the Texture palette Press the Help button for an outline of how to use the plugin Instructions Click the Load Image button to create an image plane If an image is selected in the Texture palette that image will be used otherwise you will be asked to choose an image file from disk With a Model in Edit mode If a model is in EditTransform mode then the image will be placed behind the model for use as a reference image To set up reference images for your project Place a model in Edit mode any model will do as it can be swapped at any time Press the Front button in the Image PlaneReference Views menu Press the button and select the image you wish to use for the front reference Scale and position your model if you wish Press the button to store the image and model position Repeat for those other views you wish to use With no Model selected If there is no model selected and in Edit mode for example if a 25D tool like the SimpleBrush is selected then the image plane will be created and put in Move mode so that the Gyro is shown This is so that you can use the image plane how you want Note that the image plane is a polymesh and can be appended as a subtool for use with the ZProject brush and so on To append as a subtool Turn on Edit mode Select your model in the Tool palette This will be swapped with the image plane Click the Append button in the ToolSubtool subpalette Select the image plane from the popup It will be called something like ImagePlane01 Use with Projection Master Press the Load Image button after entering Projection Master The image will be wrapped onto your model and Move mode selected You will be able to tweak the photo by dragging on the model Use a larger Draw Size to move more of the image When finished pick up from Projection Master to apply the changes Controls Use the Size slider to adjust the size of the image as a percentage of document size When a model is in Edit mode the size should be set before loading the image Press the Help button for brief instructions Reference Views Pressing the Front Back Right etc buttons will switch to that view If the view is already selected then pressing the button will reposition the model and reset the background image The Model Opacity slider will adjust the opacity of the model against the reference image Some materials are better than others to work with for example the FlatSketch01 is good for showing some of the wireframe as you work The button will store model scale position and background image if there is one for the selected view Shiftclicking the button will adjust all views to reflect changes in scale The and buttons will cycle forwards or backwards through the different views Saving a Reference Views project To save a Reference Views project simply save the ZBrush project ZPR file by pressing the FileSave As button Load the project back in using the FileOpen button
[ "ZBrush", "modelling" ]
http://docs.spring.io/spring-framework/docs/2.0.8/reference/portlet.html
16.1 . Introduction JSR - 168 The Java Portlet Specification For more general information about portlet development , please review a whitepaper from Sun entitled " Introduction to JSR 168 " , and of course the JSR - 168 Specification itself . In addition to supporting conventional ( servlet - based ) Web development , Spring also supports JSR - 168 Portlet development . As much as possible , the Portlet MVC framework is a mirror image of the Web MVC framework , and also uses the same underlying view abstractions and integration technology . So , be sure to review the chapters entitled Chapter 13 , Web MVC framework and Chapter 14 , Integrating view technologies before continuing with this chapter . Note Bear in mind that while the concepts of Spring MVC are the same in Spring Portlet MVC , there are some notable differences created by the unique workflow of JSR - 168 portlets . The main way in which portlet workflow differs from servlet workflow is that the request to the portlet can have two distinct phases : the action phase and the render phase . The action phase is executed only once and is where any ' backend ' changes or actions occur , such as making changes in a database . The render phase then produces what is displayed to the user each time the display is refreshed . The critical point here is that for a single overall request , the action phase is executed only once , but the render Spring WebFlow Spring Web Flow ( SWF ) aims to be the best solution for the management of web application page flow . SWF integrates with existing frameworks like Spring MVC , Struts , and JSF , in both servlet and portlet environments . If you have a business process ( or processes ) that would benefit from a conversational model as opposed to a purely request model , then SWF may be the solution . SWF allows you to capture logical page flows as self - contained modules that are reusable in different situations , and as such is ideal for building web application modules that guide the user through controlled navigations that drive business processes . For more information about SWF , consult the Spring WebFlow site The dual phases of portlet requests are one of the real strengths of the JSR - 168 specification . For example , dynamic search results can be updated routinely on the display without the user explicitly rerunning the search . Most other portlet MVC frameworks attempt to completely hide the two phases from the developer and make it look as much like traditional servlet development as possible - we think this approach removes one of the main benefits of using portlets . So , the separation of the two phases is preserved throughout the Spring Portlet MVC framework . The AbstractController has the handleRequestInternal ( . . ) method , the portlet version of AbstractController has handleActionRequestInternal ( . . ) and handleRenderRequestInternal ( . . ) methods . The framework is designed around a DispatcherPortlet that dispatches requests to handlers , with configurable handler mappings and view resolution , just as the DispatcherServlet in the web framework does . File upload is also supported in the same way . Locale resolution and theme resolution are not supported in Portlet MVC - these areas are in the purview of the portal / portlet - container and are not appropriate at the Spring level . However , all mechanisms in Spring that depend on the locale ( such as internationalization of messages ) will still function properly because DispatcherPortlet exposes the current locale in the same way as DispatcherServlet 16.1.1 . Controllers - The C in MVC The default handler is still a very simple Controller interface , offering just two methods : void handleActionRequest ( request , response ) ModelAndView handleRenderRequest ( request , response ) The framework also includes most of the same controller implementation hierarchy , such as SimpleFormController , and so on . Data binding , command object usage , model handling , and view resolution are all the same as in the servlet framework . 16.1.2 . Views - The V in MVC All the view rendering capabilities of the servlet framework are used directly via a special bridge servlet named ViewRendererServlet . By using this servlet , the portlet request is converted into a servlet request and the view can be rendered using the entire normal servlet infrastructure . This means all the existing renderers , such as JSP , Velocity , etc . , can still be used within the portlet . 16.1.3 . Web - scoped beans Spring Portlet MVC supports beans whose lifecycle is scoped to the current HTTP request or HTTP Session ( both normal and global ) . This is not a specific feature of Spring Portlet MVC itself , but rather of the WebApplicationContext container ( s ) that Spring Portlet MVC uses . These bean scopes are described in detail in the section entitled Section 3.4.4 , β€œ The other scopes ” Note The Spring distribution ships with a complete Spring Portlet MVC sample application that demonstrates all of the features and functionality of the Spring Portlet MVC framework . This ' petportal ' application can be found in the ' samples / petportal ' directory of the full Spring distribution . 16.2 . The Portlet MVC is a request - driven web MVC framework , designed around a portlet that dispatches requests to controllers and offers other functionality facilitating the development of portlet applications . Spring ' s however , does more than just that . It is completely integrated with the Spring ApplicationContext and allows you to use every other feature Spring has . Like ordinary portlets , the is declared in the portlet . xml of your web application : < portlet > < portlet - name > sample < / portlet - name > < portlet - class > org . springframework . web . portlet . DispatcherPortlet < / portlet - class > < supports > < mime - type > text / html < / mime - type > < portlet - mode > view < / portlet - mode > < / supports > < portlet - info > < title > Sample Portlet < / title > < / portlet - info > < / portlet > The now needs to be configured . In the Portlet MVC framework , each has its own WebApplicationContext , which inherits all the beans already defined in the Root . These inherited beans can be overridden in the portlet - specific scope , and new scope - specific beans can be defined local to a given portlet instance . The framework will , on initialization of a , look for a file named [ portlet - name ] - portlet . xml in the WEB - INF directory of your web application and create the beans defined there ( overriding the definitions of any beans defined with the same name in the global scope ) . The config location used by the can be modified through a portlet initialization parameter ( see below for details ) . The Spring has a few special beans it uses , in order to be able to process requests and render the appropriate views . These beans are included in the Spring framework and can be configured in the , just as any other bean would be configured . Each of those beans is described in more detail below . Right now , we ' ll just mention them , just to let you know they exist and to enable us to go on talking about the . For most of the beans , defaults are provided so you do n ' t have to worry about configuring them . Table 16.1 . Special beans in the Expression Explanation handler mapping ( s ) Section 16.5 , β€œ Handler mappings ” ) a list of pre - and post - processors and controllers that will be executed if they match certain criteria ( for instance a matching portlet mode specified with the controller ) controller ( s ) Section 16.4 , β€œ Controllers ” ) the beans providing the actual functionality ( or at least , access to the functionality ) as part of the MVC triad view resolver Section 16.6 , β€œ Views and resolving them ” ) capable of resolving view names to view definitions multipart resolver Section 16.7 , β€œ Multipart ( file upload ) support ” ) offers functionality to process file uploads from HTML forms handler exception resolver Section 16.8 , β€œ Handling exceptions ” ) offers functionality to map exceptions to views or implement other more complex exception handling code When a is setup for use and a request comes in for that specific , it starts processing the request . The list below describes the complete process a request goes through if handled by a The locale returned by PortletRequest . getLocale ( ) is bound to the request to let elements in the process resolve the locale to use when processing the request ( rendering the view , preparing data , etc . ) . If a multipart resolver is specified and this is an ActionRequest , the request is inspected for multiparts and if they are found , it is wrapped in a MultipartActionRequest for further processing by other elements in the process . ( See Section 16.7 , β€œ Multipart ( file upload ) support ” for further information about multipart handling ) . An appropriate handler is searched for . If a handler is found , the execution chain associated with the handler ( pre - processors , post - processors , controllers ) will be executed in order to prepare a model . If a model is returned , the view is rendered , using the view resolver that has been configured with the . If no model is returned ( which could be due to a pre - or post - processor intercepting the request , for example , for security reasons ) , no view is rendered , since the request could already have been fulfilled . Exceptions that might be thrown during processing of the request get picked up by any of the handler exception resolvers that are declared in the . Using these exception resolvers you can define custom behavior in case such exceptions get thrown . You can customize Spring ' s by adding context parameters in the portlet . xml file or portlet init - parameters . The possibilities are listed below . Table 16.2 . initialization parameters Parameter Explanation contextClass Class that implements , which will be used to instantiate the context used by this portlet . If this parameter is n ' t specified , the XmlPortletApplicationContext will be used . contextConfigLocation String which is passed to the context instance ( specified by contextClass ) to indicate where context ( s ) can be found . The String is potentially split up into multiple Strings ( using a comma as a delimiter ) to support multiple contexts ( in case of multiple context locations , of beans that are defined twice , the latest takes precedence ) . namespace The namespace of the . Defaults to [ portlet - name ] - portlet viewRendererUrl The URL at which can access an instance of ViewRendererServlet ( see Section 16.3 , β€œ The ViewRendererServlet ” ) . 16.3 . The The rendering process in Portlet MVC is a bit more complex than in Web MVC . In order to reuse all the view technologies from Spring Web MVC ) , we must convert the PortletRequest PortletResponse to HttpServletRequest HttpServletResponse and then call the render method of the View . To do this , uses a special servlet that exists for just this purpose : the In order for rendering to work , you must declare an instance of the in the web . xml file for your web application as follows : < servlet > < servlet - name > ViewRendererServlet < / servlet - name > < servlet - class > org . springframework . web . servlet . ViewRendererServlet < / servlet - class > < / servlet > < servlet - mapping > < servlet - name > ViewRendererServlet < / servlet - name > < url - pattern > / WEB - INF / servlet / view < / url - pattern > < / servlet - mapping > To perform the actual rendering , does the following : Binds the to the request as an attribute under the same WEB_APPLICATION_CONTEXT_ATTRIBUTE key that uses . Binds the Model View objects to the request to make them available to the Constructs a PortletRequestDispatcher and performs an include using the / WEB - INF / servlet / view URL that is mapped to the The is then able to call the render method on the with the appropriate arguments . The actual URL for the can be changed using ’ s viewRendererUrl configuration parameter . 16.4 . Controllers The controllers in Portlet MVC are very similar to the Web MVC Controllers and porting code from one to the other should be simple . The basis for the Portlet MVC controller architecture is the org . springframework . web . portlet . mvc . Controller interface , which is listed below . public interface Controller { / * * * Process the render request and return a ModelAndView object which the * DispatcherPortlet will render . * / ModelAndView handleRenderRequest ( RenderRequest request , RenderResponse response ) throws Exception ; / * * * Process the action request . There is nothing to return . * / void handleActionRequest ( ActionRequest request , ActionResponse response ) throws Exception ; } As you can see , the Portlet Controller interface requires two methods that handle the two phases of a portlet request : the action request and the render request . The action phase should be capable of handling an action request and the render phase should be capable of handling a render request and returning an appropriate model and view . While the interface is quite abstract , Spring Portlet MVC offers a lot of controllers that already contain a lot of the functionality you might need – most of these are very similar to controllers from Spring Web MVC . The interface just defines the most common functionality required of every controller - handling an action request , handling a render request , and returning a model and a view . 16.4.1 . and PortletContentGenerator Of course , just a interface is n ' t enough . To provide a basic infrastructure , all of Spring Portlet MVC ' s s inherit from , a class offering access to Spring ' s ApplicationContext and control over caching . Table 16.3 . Features offered by the Parameter requireSession Indicates whether or not this requires a session to do its work . This feature is offered to all controllers . If a session is not present when such a controller receives a request , the user is informed using a SessionRequiredException synchronizeSession Use this if you want handling by this controller to be synchronized on the user ' s session . To be more specific , the extending controller will override the handleRenderRequestInternal ( . . ) handleActionRequestInternal ( . . ) methods , which will be synchronized on the user ’ s session if you specify this variable . renderWhenMinimized If you want your controller to actually render the view when the portlet is in a minimized state , set this to true . By default , this is set to false so that portlets that are in a minimized state do n ’ t display any content . cacheSeconds When you want a controller to override the default cache expiration defined for the portlet , specify a positive integer here . By default it is set to - 1 , which does not change the default caching . Setting it to 0 will ensure the result is never cached . requireSession cacheSeconds properties are declared on the PortletContentGenerator class , which is the superclass of ) but are included here for completeness . When using the as a baseclass for your controllers ( which is not recommended since there are a lot of other controllers that might already do the job for you ) you only have to override either the handleActionRequestInternal ( ActionRequest , ActionResponse ) method or the handleRenderRequestInternal ( RenderRequest , RenderResponse ) method ( or both ) , implement your logic , and return a ModelAndView object ( in the case of handleRenderRequestInternal ) . The default implementations of both throw a PortletException . This is consistent with the behavior of GenericPortlet from the JSR - 168 Specification API . So you only need to override the method that your controller is intended to handle . Here is short example consisting of a class and a declaration in the web application context . package samples ; import javax . portlet . RenderRequest ; import javax . portlet . RenderResponse ; import org . springframework . web . portlet . mvc . AbstractController ; import org . springframework . web . portlet . ModelAndView ; public class SampleController extends AbstractController { public ModelAndView handleRenderRequestInternal ( RenderRequest request , RenderResponse response ) throws Exception { ModelAndView mav = new ModelAndView ( " foo " ) ; mav . addObject ( " message " , " Hello World ! " ) ; return mav ; } } < bean id = " sampleController " class = The class above and the declaration in the web application context is all you need besides setting up a handler mapping ( see Section 16.5 , β€œ Handler mappings ” ) to get this very simple controller working . 16.4.2 . Other simple controllers Although you can extend , Spring Portlet MVC provides a number of concrete implementations which offer functionality that is commonly used in simple MVC applications . ParameterizableViewController is basically the same as the example above , except for the fact that you can specify the view name that it will return in the web application context ( no need to hard - code the view name ) . PortletModeNameViewController uses the current mode of the portlet as the view name . So , if your portlet is in View mode ( i.e . PortletMode . VIEW ) then it uses " view " as the view name . 16.4.3 . Command Controllers Spring Portlet MVC has the exact same hierarchy of command controllers as Spring Web MVC . They provide a way to interact with data objects and dynamically bind parameters from the PortletRequest to the data object specified . Your data objects do n ' t have to implement a framework - specific interface , so you can directly manipulate your persistent objects if you desire . Let ' s examine what command controllers are available , to get an overview of what you can do with them : AbstractCommandController - a command controller you can use to create your own command controller , capable of binding request parameters to a data object you specify . This class does not offer form functionality , it does however offer validation features and lets you specify in the controller itself what to do with the command object that has been filled with the parameters from the request . AbstractFormController - an abstract controller offering form submission support . Using this controller you can model forms and populate them using a command object you retrieve in the controller . After a user has filled the form , AbstractFormController binds the fields , validates , and hands the object back to the controller to take appropriate action . Supported features are : invalid form submission ( resubmission ) , validation , and normal form workflow . You implement methods to determine which views are used for form presentation and success . Use this controller if you need forms , but do n ' t want to specify what views you ' re going to show the user in the application context . SimpleFormController - a concrete that provides even more support when creating a form with a corresponding command object . The lets you specify a command object , a viewname for the form , a viewname for the page you want to show the user when form submission has succeeded , and more . AbstractWizardFormController – a concrete that provides a wizard - style interface for editing the contents of a command object across multiple display pages . Supports multiple user actions : finish , cancel , or page change , all of which are easily specified in request parameters from the view . These command controllers are quite powerful , but they do require a detailed understanding of how they operate in order to use them efficiently . Carefully review the Javadocs for this entire hierarchy and then look at some sample implementations before you start using them . 16.4.4 . PortletWrappingController Instead of developing new controllers , it is possible to use existing portlets and map requests to them from a . Using the PortletWrappingController , you can instantiate an existing Portlet as a as follows : < bean id = " wrappingController " class = " org . springframework . web . portlet . mvc . PortletWrappingController " > < property name = " portletClass " value = " sample . MyPortlet " / > < property name = " portletName " value = " my - portlet " / > < property name = " initParameters " > < value > config = / WEB - INF / my - portlet - config . xml < / value > < / property > < / bean > This can be very valuable since you can then use interceptors to pre - process and post - process requests going to these portlets . Since JSR - 168 does not support any kind of filter mechanism , this is quite handy . For example , this can be used to wrap the Hibernate OpenSessionInViewInterceptor around a MyFaces JSF Portlet . 16.5 . Handler mappings Using a handler mapping you can map incoming portlet requests to appropriate handlers . There are some handler mappings you can use out of the box , for example , the PortletModeHandlerMapping , but let ' s first examine the general concept of a HandlerMapping Note : We are intentionally using the term β€œ Handler ” here instead of β€œ Controller ” . is designed to be used with other ways to process requests than just Spring Portlet MVC ’ s own Controllers . A Handler is any Object that can handle portlet requests . Controllers are an example of Handlers , and they are of course the default . To use some other framework with , a corresponding implementation of HandlerAdapter is all that is needed . The functionality a basic HandlerMapping provides is the delivering of a HandlerExecutionChain , which must contain the handler that matches the incoming request , and may also contain a list of handler interceptors that are applied to the request . When a request comes in , the will hand it over to the handler mapping to let it inspect the request and come up with an appropriate HandlerExecutionChain . Then the will execute the handler and interceptors in the chain ( if any ) . These concepts are all exactly the same as in Spring Web MVC . The concept of configurable handler mappings that can optionally contain interceptors ( executed before or after the actual handler was executed , or both ) is extremely powerful . A lot of supporting functionality can be built into a custom . Think of a custom handler mapping that chooses a handler not only based on the portlet mode of the request coming in , but also on a specific state of the session associated with the request . In Spring Web MVC , handler mappings are commonly based on URLs . Since there is really no such thing as a URL within a Portlet , we must use other mechanisms to control mappings . The two most common are the portlet mode and a request parameter , but anything available to the portlet request can be used in a custom handler mapping . The rest of this section describes three of Spring Portlet MVC ' s most commonly used handler mappings . They all extend AbstractHandlerMapping and share the following properties : interceptors : The list of interceptors to use . HandlerInterceptor s are discussed in Section 16.5.4 , β€œ Adding HandlerInterceptors ” defaultHandler : The default handler to use , when this handler mapping does not result in a matching handler . order : Based on the value of the order property ( see the org . springframework . core . Ordered interface ) , Spring will sort all handler mappings available in the context and apply the first matching handler . lazyInitHandlers : Allows for lazy initialization of singleton handlers ( prototype handlers are always lazily initialized ) . Default value is false . This property is directly implemented in the three concrete Handlers . 16.5.1 . PortletModeHandlerMapping This is a simple handler mapping that maps incoming requests based on the current mode of the portlet ( e.g. β€˜ view ’ , β€˜ edit ’ , β€˜ help ’ ) . An example : < bean id = " portletModeHandlerMapping " class = " org . springframework . web . portlet . handler . PortletModeHandlerMapping " > < property name = " portletModeMap " > < map > < entry key = " view " value - ref = " viewHandler " / > < entry key = " edit " value - ref = " editHandler " / > < entry key = " help " value - ref = " helpHandler " / > < / map > < / property > < / bean > 16.5.2 . ParameterHandlerMapping If we need to navigate around to multiple controllers without changing portlet mode , the simplest way to do this is with a request parameter that is used as the key to control the mapping . ParameterHandlerMapping uses the value of a specific request parameter to control the mapping . The default name of the parameter is ' action ' , but can be changed using the ' parameterName ' property . The bean configuration for this mapping will look something like this : < bean id = " parameterHandlerMapping " class = " org . springframework . web . portlet . handler . ParameterHandlerMapping ” > < property name = " parameterMap " > < map > < entry key = " add " value - ref = " addItemHandler " / > < entry key = " edit " value - ref = " editItemHandler " / > < entry key = " delete " value - ref = " deleteItemHandler " / > < / map > < / property > < / bean > 16.5.3 . PortletModeParameterHandlerMapping The most powerful built - in handler mapping , PortletModeParameterHandlerMapping combines the capabilities of the two previous ones to allow different navigation within each portlet mode . Again the default name of the parameter is " action " , but can be changed using the parameterName property . By default , the same parameter value may not be used in two different portlet modes . This is so that if the portal itself changes the portlet mode , the request will no longer be valid in the mapping . This behavior can be changed by setting the allowDupParameters property to true . However , this is not recommended . The bean configuration for this mapping will look something like this : < bean id = " portletModeParameterHandlerMapping " class = " org . springframework . web . portlet . handler . PortletModeParameterHandlerMapping " > < property name = " portletModeParameterMap " > < map > < entry key = " view " > < ! - - ' view ' portlet mode - - > < map > < entry key = " add " value - ref = " addItemHandler " / > < entry key = " edit " value - ref = " editItemHandler " / > < entry key = " delete " value - ref = " deleteItemHandler " / > < / map > < / entry > < entry key = " edit " > < ! - - ' edit ' portlet mode - - > < map > < entry key = " prefs " value - ref = " prefsHandler " / > < entry key = " resetPrefs " value - ref = " resetPrefsHandler " / > < / map > < / entry > < / map > < / property > < / bean > This mapping can be chained ahead of a , which can then provide defaults for each mode and an overall default as well . 16.5.4 . Adding HandlerInterceptor s Spring ' s handler mapping mechanism has a notion of handler interceptors , which can be extremely useful when you want to apply specific functionality to certain requests , for example , checking for a principal . Again Spring Portlet MVC implements these concepts in the same way as Web MVC . Interceptors located in the handler mapping must implement from the org . springframework . web . portlet package . Just like the servlet version , this interface defines three methods : one that will be called before the actual handler will be executed ( preHandle ) , one that will be called after the handler is executed ( postHandle ) , and one that is called after the complete request has finished ( afterCompletion ) . These three methods should provide enough flexibility to do all kinds of pre - and post - processing . preHandle method returns a boolean value . You can use this method to break or continue the processing of the execution chain . When this method returns true , the handler execution chain will continue . When it returns false , the assumes the interceptor itself has taken care of requests ( and , for example , rendered an appropriate view ) and does not continue executing the other interceptors and the actual handler in the execution chain . postHandle method is only called on a RenderRequest . The and afterCompletion methods are called on both an ActionRequest and a RenderRequest . If you need to execute logic in these methods for just one type of request , be sure to check what kind of request it is before processing it . 16.5.5 . HandlerInterceptorAdapter As with the servlet package , the portlet package has a concrete implementation of called HandlerInterceptorAdapter . This class has empty versions of all the methods so that you can inherit from this class and implement just one or two methods when that is all you need . 16.5.6 . ParameterMappingInterceptor The portlet package also has a concrete interceptor named ParameterMappingInterceptor that is meant to be used directly with and . This interceptor will cause the parameter that is being used to control the mapping to be forwarded from an to the subsequent . This will help ensure that the is mapped to the same Handler as the . This is done in the method of the interceptor , so you can still modify the parameter value in your handler to change where the will be mapped . Be aware that this interceptor is calling setRenderParameter on the ActionResponse , which means that you can not call sendRedirect in your handler when using this interceptor . If you need to do external redirects then you will either need to forward the mapping parameter manually or write a different interceptor to handle this for you . 16.6 . Views and resolving them As mentioned previously , Spring Portlet MVC directly reuses all the view technologies from Spring Web MVC . This includes not only the various implementations themselves , but also the ViewResolver implementations . For more information , refer to the sections entitled Chapter 14 , Integrating view technologies Section 13.5 , β€œ Views and resolving them ” respectively . A few items on using the existing ViewResolver implementations are worth mentioning : Most portals expect the result of rendering a portlet to be an HTML fragment . So , things like JSP / JSTL , Velocity , FreeMarker , and XSLT all make sense . But it is unlikely that views that return other document types will make any sense in a portlet context . There is no such thing as an HTTP redirect from within a portlet ( the sendRedirect ( . . ) method of ActionResponse can not be used to stay within the portal ) . So , RedirectView and use of the ' redirect : ' prefix will not work correctly from within Portlet MVC . It may be possible to use the ' forward : ' prefix from within Portlet MVC . However , remember that since you are in a portlet , you have no idea what the current URL looks like . This means you can not use a relative URL to access other resources in your web application and that you will have to use an absolute URL . Also , for JSP development , the new Spring Taglib and the new Spring Form Taglib both work in portlet views in exactly the same way that they work in servlet views . 16.7 . Multipart ( file upload ) support Spring Portlet MVC has built - in multipart support to handle file uploads in portlet applications , just like Web MVC does . The design for the multipart support is done with pluggable PortletMultipartResolver objects , defined in the org . springframework . web . portlet . multipart package . Spring provides a PortletMultipartResolver for use with Commons FileUpload . How uploading files is supported will be described in the rest of this section . By default , no multipart handling will be done by Spring Portlet MVC , as some developers will want to handle multiparts themselves . You will have to enable it yourself by adding a multipart resolver to the web application ' s context . After you have done that , will inspect each request to see if it contains a multipart . If no multipart is found , the request will continue as expected . However , if a multipart is found in the request , the that has been declared in your context will be used . After that , the multipart attribute in your request will be treated like any other attribute . Any configured bean must have the following id ( or name ) : " portletMultipartResolver " . If you have defined your with any other name , then the will not find your , and consequently no multipart support will be in effect . 16.7.1 . Using the The following example shows how to use the CommonsPortletMultipartResolver < bean id = " portletMultipartResolver " class = " org . springframework . web . portlet . multipart . CommonsPortletMultipartResolver " > < ! - - one of the properties available ; the maximum file size in bytes - - > < property name = " maxUploadSize " value = " 100000 " / > < / bean > Of course you also need to put the appropriate jars in your classpath for the multipart resolver to work . In the case of the CommonsMultipartResolver , you need to use commons - fileupload . jar . Be sure to use at least version 1.1 of Commons FileUpload as previous versions do not support JSR - 168 Portlet applications . Now that you have seen how to set Portlet MVC up to handle multipart requests , let ' s talk about how to actually use it . When detects a multipart request , it activates the resolver that has been declared in your context and hands over the request . What the resolver then does is wrap the current into a MultipartActionRequest that has support for multipart file uploads . Using the you can get information about the multiparts contained by this request and actually get access to the multipart files themselves in your controllers . Note that you can only receive multipart file uploads as part of an , not as part of a 16.7.2 . Handling a file upload in a form After the has finished doing its job , the request will be processed like any other . To use it , you create a form with an upload field ( see immediately below ) , then let Spring bind the file onto your form ( backing object ) . To actually let the user upload a file , we have to create a ( JSP / HTML ) form : < h1 > Please upload a file < / h1 > < form method = " post " action = " < portlet : actionURL / > " enctype = " multipart / form - data " > < input type = " file " name = " file " / > < input type = " submit " / > < / form > As you can see , we ' ve created a field named β€œ file ” after the property of the bean that holds the byte [] . Furthermore we ' ve added the encoding attribute ( enctype = " multipart / form - data " ) , which is necessary to let the browser know how to encode the multipart fields ( do not forget this ! ) . Just as with any other property that ' s not automagically convertible to a string or primitive type , to be able to put binary data in your objects you have to register a custom editor with the PortletRequestDataBinder . There are a couple of editors available for handling files and setting the results on an object . There ' s a StringMultipartFileEditor capable of converting files to Strings ( using a user - defined character set ) and there is a ByteArrayMultipartFileEditor which converts files to byte arrays . They function just as the CustomDateEditor does . So , to be able to upload files using a form , declare the resolver , a mapping to a controller that will process the bean , and the controller itself . < bean id = " portletMultipartResolver " class = " org . springframework . web . portlet . multipart . CommonsPortletMultipartResolver " / > < bean id = " portletModeHandlerMapping " class = " org . springframework . web . portlet . handler . PortletModeHandlerMapping " > < property name = " portletModeMap " > < map > < entry key = " view " value - ref = " fileUploadController " / > < / map > < / property > < / bean > < bean id = " fileUploadController " class = " examples . FileUploadController " After that , create the controller and the actual class to hold the file property . public class FileUploadController extends SimpleFormController { public void onSubmitAction ( ActionRequest request , ActionResponse response , Object command , BindException errors ) throws Exception { / / cast the bean FileUploadBean bean = ( FileUploadBean ) command ; / / let ' s see if there ' s content there byte [] file = bean . getFile ( ) ; if ( file = = null ) { / / hmm , that ' s strange , the user did not upload anything } / / do something with the file here } protected void initBinder ( PortletRequest request , PortletRequestDataBinder binder ) throws Exception { / / to actually be able to convert Multipart instance to byte [] / / we have to register a custom editor binder . registerCustomEditor ( byte [] .class , new ByteArrayMultipartFileEditor ( ) ) ; / / now Spring knows how to handle multipart object and convert } } public class FileUploadBean { private byte [] file ; public void setFile ( byte [] file ) { this . file = file ; } public byte [] getFile ( ) { return file ; } } As you can see , the FileUploadBean has a property typed byte [] that holds the file . The controller registers a custom editor to let Spring know how to actually convert the multipart objects the resolver has found to properties specified by the bean . In this example , nothing is done with the property of the bean itself , but in practice you can do whatever you want ( save it in a database , mail it to somebody , etc ) . An equivalent example in which a file is bound straight to a String - typed property on a ( form backing ) object might look like this : public class FileUploadController extends SimpleFormController { public void onSubmitAction ( ActionRequest request , ActionResponse response , Object command , BindException errors ) throws Exception { / / cast the bean FileUploadBean bean = ( FileUploadBean ) command ; / / let ' s see if there ' s content there String file = bean . getFile ( ) ; if ( file = = null ) { / / hmm , that ' s strange , the user did not upload anything } / / do something with the file here } protected void initBinder ( PortletRequest request , PortletRequestDataBinder Of course , this last example only makes ( logical ) sense in the context of uploading a plain text file ( it would n ' t work so well in the case of uploading an image file ) . The third ( and final ) option is where one binds directly to a MultipartFile property declared on the ( form backing ) object ' s class . In this case one does not need to register any custom property editor because there is no type conversion to be performed . public class FileUploadController extends SimpleFormController { public void onSubmitAction ( ActionRequest request , ActionResponse response , Object command , BindException errors ) throws Exception { / / cast the bean FileUploadBean bean = ( FileUploadBean ) command ; / / let ' s see if there ' s content there MultipartFile file = bean . getFile ( ) ; if ( file = = null ) { / / hmm , that ' s strange , the user did not upload anything } / / do something with the file here } } public class FileUploadBean { private MultipartFile file 16.8 . Handling exceptions Just like Web MVC , Portlet MVC provides HandlerExceptionResolver s to ease the pain of unexpected exceptions occurring while your request is being processed by a handler that matched the request . Portlet MVC also provides the same concrete SimpleMappingExceptionResolver that enables you to take the class name of any exception that might be thrown and map it to a view name . 16.9 . Portlet application deployment The process of deploying a Spring Portlet MVC application is no different than deploying any JSR - 168 Portlet application . However , this area is confusing enough in general that it is worth talking about here briefly . Generally , the portal / portlet - container runs in one webapp in your servlet - container and your portlets run in another webapp in your servlet - container . In order for the portlet - container webapp to make calls into your portlet webapp it must make cross - context calls to a well - known servlet that provides access to the portlet services defined in your file . The JSR - 168 specification does not specify exactly how this should happen , so each portlet - container has its own mechanism for this , which usually involves some kind of β€œ deployment process ” that makes changes to the portlet webapp itself and then registers the portlets within the portlet - container . At a minimum , the web . xml file in your portlet webapp is modified to inject the well - known servlet that the portlet - container will call . In some cases a single servlet will service all portlets in the webapp , in other cases there will be an instance of the servlet for each portlet . Some portlet - containers will also inject libraries and / or configuration files into the webapp as well . The portlet - container must also make its implementation of the Portlet JSP Tag Library available to your webapp . The bottom line is that it is important to understand the deployment needs of your target portal and make sure they are met ( usually by following the automated deployment process it provides ) . Be sure to carefully review the documentation from your portal for this process . Once you have deployed your portlet , review the resulting file for sanity . Some older portals have been known to corrupt the definition of the , thus breaking the rendering of your portlets .
[ "Portlet MVC Framework", "DispatcherPortlet" ]
http://docs.telerik.com/devtools/document-processing/libraries/radspreadprocessing/working-with-cells/get-set-clear-properties
Introduction Getting Started Upgrade Distribution and Licensing Integration Libraries RadPdfProcessing RadSpreadProcessing Overview Getting Started Developer Focused Examples Changes and Backward Compatibility Workbooks Worksheets Rows and Columns Cells What is a Cell ? Insert and Remove Cells Accessing Cells of a Worksheet Iterating Used Cells Get , Set and Clear Cell Properties Cell Value Types Features Formats and Conversion Performance Tips and Tricks RadSpreadStreamProcessing RadWordsProcessing RadZipLibrary Copyright API Reference Search in DOCS / API Available for : UI for ASP . NET AJAX | UI for ASP . NET MVC | UI for WPF UI for WinForms UI for Silverlight Libraries RadSpreadProcessing Cells Get , Set and Clear Cell Properties Cells are the atomic parts of a worksheet and its basic data units . Each cell can be assigned a value , borders , fill , format , style and much more . This article aims to describe the properties offered by cells and demonstrate how to retrieve and change them . It contains the following sections : Get Set and Clear Methods Cell Properties Value Property Borders Property Fill Property Indent Property Get , Set and Clear Methods In order to access cell properties , you have to create a CellSelection object that contains the region of cells you would like to change . More information about retrieving CellSelection instances is available in the Accessing Cells of a Worksheet article . Example 1 creates a selection for cells in the range A1 : F6 . Example 1 : Create CellSelection C# Workbook workbook = new Workbook ( ) ; Worksheet worksheet = workbook Worksheets Add ( ) ; selection worksheet 0 0 5 5 ] ; Once you have a instance , you can easily set and retrieve the properties of its cells . Each property is manipulated through three methods that get , set and clear the value of the property , respectively . Typically , the set methods take a single argument , which indicates the value to be set . Similarly , the clear methods have no parameters and reset the properties to their default values . The get methods , however , require more attention . With one minor exception , the get methods of all cell properties return an object of type RangePropertyValue . The class exposes two properties that indicate the value of the property for the cell range : IsIndeterminate : Indicates whether the value of the retrieved property is consistent among all cells in the specified CellSelection . If the property has one and the same value for all cells , IsIndeterminate is set to false . However , if the value of the retrieved property varies throughout the cells in the CellSelection , the IsIndetermine property is set to true and the Value property of the RangePropertyValue class is set to its default value . Value : Contains the value of the retrieved property . If the property is set to false , contains the value of the retrieved property for the whole CellSelection region . If the property is set to true , the property is set to its default value . Cell Properties Cells in offer a number of properties that allow you to change their content and appearance . The following list outlines all cell properties : Border Fill FontFamily FontSize ForeColor Format HorizontalAlignment Indent IsBold IsItalic IsWrapped StyleName Underline VerticalAlignment IsLocked As already mentioned , the class exposes methods that get , set and clear methods for each of the above properties . The names of the methods are constructed through the concatenation of the action the method executes ( Get , Set , Clear ) and the name of the property . For example , the methods that get , set and clear the IsBold property are respectively , GetIsBold ( ) SetIsBold ( ) and ClearIsBold ( ) Example 2 illustrates how to use these methods on the region A1 : F6 . Example 2 : Use GetIsBold ( ) , SetIsBold ( ) and ClearIsBold ( ) methods C# workbook new Worksheet worksheet workbook Add selection worksheet ] ; selection SetIsBold true ) ; bool isBold selection GetIsBold ( ) . selection ClearIsBold Using the above approach you can set the value of almost all cell properties . There are a few exceptions to the general get , set and clear rule , though , and each of them is described into one of the following sections . Value Property The property uses an instance of ICellValue to retrieve and change its value . The property has support for the following types of cell values , all of which conform to the ICellValue interface : EmptyCellValue NumberCellValue BooleanCellValue TextCellValue FormulaCellValue . Similarly to the other properties , has three methods that control the property : GetValue ( ) SetValue ( ) and ClearValue ( ) . More information about different value types is available in the Cell Value Types article . The GetValue ( ) method retrieves the value of the property and returns an instance of . The property of the instance returns the actual value of the selected region . Example 3 illustrates who to retrieve the value of cell B2 . Example 3 : Retrieve value of cell 1 1 ICellValue cellValue selection GetValue ( ) . As the document model supports different types of cell values , the CellSelection class offers multiple overloads of the SetValue ( ) method that allow you to produce different types of values . For example , if you choose the method that accepts a double instance , the of the cell will be an instance of NumberCellValue . The method has three more overloads that take DateTime , string and ICellValue , respectively . Example 4 demonstrates how to set the value of a given selection . Example 4 : Set value of CellSelection / / set DateTime value selection SetValue DateTime Now ) ; / / set double value selection SetValue 51.345 / / set ICellValue value ] . GetValue selection value / / set string value " Total " / / set formula value " = C1 + C10 " Borders Property Borders property uses a CellBorders object for getting and setting its property value . The CellBorders class contains eight instances of type CellBorder that describe respectively the left , top , right , bottom , inside horizontal , inside vertical , diagonal up , and diagonal down borders . In turn , the CellBorder object holds information about the style and color of the border . The GetBorders ( ) method returns an instance of RangePropertyValue Example 5 demonstrates how to set the value of the Borders of the regions B2 : C4 and E2 : F4 . Example 5 : Set value of Borders ThemableColor purple ThemableColor Color FromArgb 255 155 89 182 ) ) ; darkBlue Color FromArgb 255 44 62 80 ) ) ; purpleBorders CellBorderStyle Dotted purple worksheet 2 2 ] . SetBorders purpleBorders darkBlueBorders CellBorderStyle Medium darkBlue ) , / / Left border Medium darkBlue ) , / / Top border / / Right border / / Bottom border Thin purple / / Inside horizontal border Thin / / Inside vertical border None / / Diagonal up border None / / Diagonal down border worksheet 4 SetBorders darkBlueBorders The result of Example 5 is demonstrated in Figure 1 Figure 1 : Resulting Borders Fill Property Fill property uses an IFill object for getting and setting its property value . The document model supports two types of fills that are represented through the PatternFill GradientFill classes , both of which conform to the IFill interface . As its name suggests , the PatternFill object is used to fill the background of a region of cells using a repeated pattern of shapes . To create a PatternFill instance , you need to specify the type of the pattern , the background color and pattern color of the fill . You can choose between eighteen types of patterns , such as HorizontalStripe , DiagonalCrossHatch , Gray75Percent and many more . The PatternFill object also allows you to set the background of a cell to a solid color . Example 6 creates two PatternFill objects with a DiagonalStripe and Solid PatternType respectively . Example 6 : Create and set PatternFill diagonalStripePatternFill PatternType DiagonalStripe 231 76 60 241 196 15 worksheet SetFill diagonalStripePatternFill solidPatternFill PatternType Solid 46 204 113 Colors Transparent SetFill solidPatternFill The result of Example 6 is illustrated in Figure 2 Figure 2 : Applied PatternFill GradientFill is used to set the background of a region of cells to a gradual blending of two colors . To create a GradientFill , you need to specify a GradientType and the two colors that will blend . Example 7 assigns the region A1 : F1 a smooth horizontal green gradient . Example 7 : Create and set GradientFill Rows SetHeight RowHeight 50 true greenGradientFill GradientType Horizontal 46 204 113 134 56 greenGradientFill Example 7 is illustrated in Figure 3 Figure 3 : Applied GradientFill Indent Property In addition to the GetIndent ( ) SetIndent ( ) ClearIndent ( ) methods , CellSelection offers two more methods that are used to increase and decrease the value of the Indent property . Those methods are IncreaseIndent ( ) DecreaseIndent ( ) and neither of them takes arguments . Example 8 snippet shows how to use the methods . Example 8 : Increase and decrease indent selection IncreaseIndent DecreaseIndent
[ "Cell Properties", "Value Property", "Borders Property" ]
http://docstore.mik.ua/orelly/java-ent/jfc/ch09_01.htm
Chapter 9 . The java . awt Package The java . awt package is the main package of the AWT , or Abstract Windowing Toolkit . It contains classes for graphics , including the Java 2D graphics capabilities introduced in the Java 2 platform , and also defines the basic graphical user interface ( GUI ) framework for Java . java . awt also includes a number of heavyweight GUI objects , many of which have been superseded by the javax . swing package . also has a number of important subpackages . The most important graphics classes in are Graphics and its Java 2D extension , Graphics2D . These classes represent a drawing surface , maintain a set of drawing attributes , and define methods for drawing and filling lines , shapes , and text . Classes that represent graphics attributes include Color Font Paint Stroke , and Composite . The Image class and Shape interface represent things that you can draw using a Graphics object and the various graphics attributes . Figure 9 - 1 shows the graphics classes of this package . Figure 9 - 1 . Graphics classes of the java . awt package The most important class for GUIs is Component , which represents a single graphical element in a GUI . Container is a kind of component that can contain other components . The LayoutManager interface and its various implementations are used to position components within their containers . Figure 9 - 2 shows the GUI classes of this package , and Figure 9 - 3 shows the event , exception , and security classes . Figure 9 - 2 . GUI classes of the java . awt package Figure 9 - 3 . Event , exception , and security classes of the java . awt package See Chapter 4 , " Graphics with AWT and Java 2D " , for an introduction to Java graphics with AWT and Java 2D and Chapter 2 , " Swing and AWTArchitecture " , for an introduction to the GUI framework defined by the package . ActiveEvent Java 1.2 This interface is implemented by events that know how to dispatch themselves . When the event dispatch system encounters an ActiveEvent on the event queue , it simply invokes the dispatch ( ) method of the event , instead of attempting to dispatch the event on its own . This interface is implemented by java . awt . event . InvocationEvent , which is used by the invokeLater ( ) and invokeAndWait ( ) methods of EventQueue public abstract interface / / Public Instance Methods public abstract void dispatch ( ) ; Implementations : java . awt . event . InvocationEvent Adjustable Java 1.1 PJ1 . 1 This interface defines the methods that should be implemented by an object that maintains a user - adjustable numeric value . The adjustable value has specified minimum and maximum values , and it may be incremented or decremented either a unit at a time or a block at a time . An Adjustable object generates an AdjustmentEvent when it is adjusted and maintains a list of AdjustmentListener objects interested in being notified when such an event occurs . This interface abstracts the essential functionality of the Scrollbar and javax . swing . JScrollBar components . public abstract interface / / Public Constants public static final int HORIZONTAL = 0 public static final int VERTICAL = 1 Event Registration Methods ( by event name ) public abstract void addAdjustmentListener ( java . awt . event . AdjustmentListener l ) ; removeAdjustmentListener ( java . awt . event . AdjustmentListener l ) ; Property Accessor Methods ( by property name ) public abstract int getBlockIncrement ( ) ; setBlockIncrement ( int b public abstract int getMaximum setMaximum ( int max getMinimum setMinimum min getOrientation getUnitIncrement setUnitIncrement u getValue setValue v getVisibleAmount setVisibleAmount v Implementations : Scrollbar , javax . swing . JScrollBar Passed To : java . awt . event . AdjustmentEvent . AdjustmentEvent ( ) , java . awt . peer . ScrollPanePeer . { setUnitIncrement ( ) , setValue ( ) } Returned By : ScrollPane . { getHAdjustable ( ) , getVAdjustable ( ) } , java . awt . event . AdjustmentEvent . getAdjustable ( ) AlphaComposite Java 1.2 This implementation of the Composite interface blends colors according to their levels of alpha transparency . AlphaComposite does not have a public constructor , but you can obtain a shared immutable instance by calling the static getInstance ( ) method , specifying the desired compositing rule ( one of the eight integer constants defined by the class ) , and specifying an alpha value . Alternatively , if you use an alpha value of 1.0 , you can simply use one of the eight predefined constants . Once you have obtained an object , you use it by passing it to the setComposite ( ) method of a Graphics2D object . The most common way to use an object is to specify the SRC_OVER compositing rule and an alpha value greater than 0 but less than 1 . This causes the source colors you draw to be given the specified level of alpha transparency , so that they are blended with whatever colors already exist on the screen , making the destination colors appear to show through the translucent source colors . This technique allows you to achieve transparency effects using opaque colors when you are drawing onto a drawing surface , like a screen , that does not have an alpha channel . The other compositing rules of are best understood when both the source ( your drawing ) and the destination ( the drawing surface ) have alpha channels . For example , you can create translucent Color objects with the four - argument version of the Color ( ) constructor , and you can create an off - screen image with an alpha channel by passing the constant TYPE_INT_ARGB to the java . awt . image . BufferedImage ( ) constructor . ( Once your compositing operation has been performed in an off - screen image with an alpha channel , you can view the results by copying the contents of the image to the screen , of course . ) When your source and destination have alpha channels built in , you do not usually specify an alpha value for the itself . If you do , however , the transparency values of the source colors are multiplied by this alpha value . supports the following compositing rules : SRC Replace the colors of the destination with the colors of the source , ignoring the destination colors and the transparency of the source . SRC_OVER Combine the source and destination colors combined based on the transparency of the source , so that the source appears to be drawn over the destination . DST_OVER Combine the source and destination colors based on the transparency of the destination , so that the source appears to be drawn underneath the destination . SRC_IN Draw the colors of the source using the transparency values of the destination , completely ignoring the colors of the destination . SRC_OUT Draw the colors of the source using the inverse transparency values of the destination . DST_IN Modify the colors of the destination using the alpha values of the source and ignoring the colors of the source . DST_OUT Modify the colors of the destination using the inverted alpha values of the source and ignoring the colors of the source . CLEAR Ignore the color and transparency of both the destination and the source . This clears the destination by making it a fully transparent black . public final class implements Composite { No Constructor Public Constants public static final AlphaComposite Clear CLEAR = 1 DST_IN = 6 DST_OUT = 8 DST_OVER = 4 public static final AlphaComposite DstIn DstOut DstOver Src SRC = 2 SRC_IN = 5 SRC_OUT = 7 = 3 SrcIn SrcOut SrcOver Public Class Methods public static AlphaComposite getInstance rule public static AlphaComposite getInstance rule , float alpha Public Instance Methods public float getAlpha public int getRule Methods Implementing Composite public CompositeContext createContext ( java . awt . image . ColorModel srcColorModel , java . awt . image . ColorModel dstColorModel , RenderingHints hints Public Methods Overriding Object public boolean equals ( Object obj public int hashCode Hierarchy : Object - - > AlphaComposite ( Composite ) Returned By : AlphaComposite . getInstance ( ) Type Of : AlphaComposite . { Clear , DstIn , DstOut , DstOver , Src , SrcIn , SrcOut , SrcOver } AWTError Java 1.0 serializable error PJ1 . 1 Signals that an error has occurred in the package . public class AWTError extends Error { Public Constructors public ( String msg Hierarchy : Object - - > Throwable ( Serializable ) - - > Error - - > AWTError AWTEvent Java 1.1 serializable event PJ1 . 1 This abstract class serves as the root event type for all AWT events in Java 1.1 and supersedes the Event class that was used in Java 1.0 . Each AWTEvent has a source object , as all EventObject objects do . You can query the source of an event with the inherited getSource ( ) method . The class adds an event type , or ID , for every AWT event . Use getID ( ) to query the type of an event . Subclasses of define various constants for this type field . The various _MASK constants are used by applets and custom components that call the enableEvents ( ) method of Component to receive various event types without having to register EventListener objects . public abstract class extends java . util . EventObject { Public Constructors public ( Event event ( Object source , int id public static final long ACTION_EVENT_MASK = 128 public static final long ADJUSTMENT_EVENT_MASK = 256 COMPONENT_EVENT_MASK CONTAINER_EVENT_MASK = 2 FOCUS_EVENT_MASK = 4 1.2 INPUT_METHOD_EVENT_MASK = 2048 ITEM_EVENT_MASK = 512 KEY_EVENT_MASK = 8 MOUSE_EVENT_MASK = 16 MOUSE_MOTION_EVENT_MASK = 32 RESERVED_ID_MAX = 1999 TEXT_EVENT_MASK = 1024 WINDOW_EVENT_MASK = 64 getID public String paramString Public Methods Overriding EventObject public String toString Protected Methods Overriding Object 1.2 protected void finalize ( ) throws Throwable ; Protected Instance Methods protected void consume protected boolean isConsumed Protected Instance Fields protected boolean consumed protected int id Object - - > java . util . EventObject ( Serializable ) - - > AWTEvent Subclasses : java . awt . event . ActionEvent , java . awt . event . AdjustmentEvent , java . awt . event . ComponentEvent , java . awt . event . InputMethodEvent , java . awt . event . InvocationEvent , java . awt . event . ItemEvent , java . awt . event . TextEvent , javax . swing . event . AncestorEvent , javax . swing . event . InternalFrameEvent Passed To : Too many methods to list . Component . coalesceEvents ( ) , EventQueue . { getNextEvent ( ) , peekEvent ( ) } AWTEventMulticaster PJ1 . 1 AWTEventMulticaster is a convenience class used when writing a custom AWT component . It provides an easy way to maintain a list of AWT EventListener objects and notify the listeners on that list when an event occurs . implements each of the event listener interfaces defined in the java . awt . event package , which means that an object can serve as any desired type of event listener . ( It also means that the class defines quite a few methods . ) implements what amounts to a linked list of objects . When you invoke one of the methods of an , it invokes the same method on all of the objects in the linked list . Rather than instantiate an object directly , you use the static add ( ) and remove ( ) methods of the class to add and remove objects from the linked list . Calling add ( ) or remove ( ) returns an with the appropriate object registered or deregistered . Using an is somewhat non - intuitive , so here is some example code that shows its use : public class MyList extends Component { / / a class that sends ItemEvents / / The head of a linked list of AWTEventMulticaster objects protected ItemListener listener = null ; public void addItemListener ( ItemListener l ) { / / add a listener listener = AWTEventMulticaster . add ( listener , l ) ; } public void removeItemListener ( ItemListener l ) { / / remove a listener listener = AWTEventMulticaster . remove ( listener , l ) ; } protected void fireItemEvent ( ItemEvent e ) { / / notify all listeners if ( listener ! = null ) public class implements java . awt . event . ActionListener , java . awt . event . AdjustmentListener , java . awt . event . ComponentListener , java . awt . event . ContainerListener , java . awt . event . FocusListener , java . awt . event . InputMethodListener , java . awt . event . ItemListener , java . awt . event . KeyListener , java . awt . event . MouseListener , java . awt . event . MouseMotionListener , java . awt . event . TextListener , java . awt . event . WindowListener { Protected Constructors protected ( java . util . EventListener a , java . util . EventListener b Public Class Methods public static java . awt . event . ActionListener add ( java . awt . event . ActionListener a , java . awt . event . ActionListener public static java . awt . event . AdjustmentListener add , java . awt . event . AdjustmentListener public static java . awt . event . ComponentListener ( java . awt . event . ComponentListener , java . awt . event . ComponentListener public static java . awt . event . ContainerListener ( java . awt . event . ContainerListener , java . awt . event . ContainerListener public static java . awt . event . FocusListener ( java . awt . event . FocusListener , java . awt . event . FocusListener public static java . awt . event . InputMethodListener ( java . awt . event . InputMethodListener , java . awt . event . InputMethodListener public static java . awt . event . ItemListener ( java . awt . event . ItemListener , java . awt . event . ItemListener public static java . awt . event . KeyListener ( java . awt . event . KeyListener , java . awt . event . KeyListener public static java . awt . event . MouseListener ( java . awt . event . MouseListener , java . awt . event . MouseListener public static java . awt . event . MouseMotionListener ( java . awt . event . MouseMotionListener , java . awt . event . MouseMotionListener public static java . awt . event . TextListener ( java . awt . event . TextListener , java . awt . event . TextListener public static java . awt . event . WindowListener ( java . awt . event . WindowListener , java . awt . event . WindowListener public static java . awt . event . ActionListener remove ( java . awt . event . ActionListener , java . awt . event . ActionListener oldl public static java . awt . event . AdjustmentListener remove , java . awt . event . AdjustmentListener oldl public static java . awt . event . ComponentListener ( java . awt . event . ComponentListener , java . awt . event . ComponentListener public static java . awt . event . ContainerListener ( java . awt . event . ContainerListener , java . awt . event . ContainerListener public static java . awt . event . FocusListener ( java . awt . event . FocusListener , java . awt . event . FocusListener public static java . awt . event . InputMethodListener ( java . awt . event . InputMethodListener , java . awt . event . InputMethodListener public static java . awt . event . ItemListener ( java . awt . event . ItemListener , java . awt . event . ItemListener public static java . awt . event . KeyListener ( java . awt . event . KeyListener , java . awt . event . KeyListener public static java . awt . event . MouseListener ( java . awt . event . MouseListener , java . awt . event . MouseListener public static java . awt . event . MouseMotionListener ( java . awt . event . MouseMotionListener , java . awt . event . MouseMotionListener public static java . awt . event . TextListener ( java . awt . event . TextListener , java . awt . event . TextListener public static java . awt . event . WindowListener ( java . awt . event . WindowListener , java . awt . event . WindowListener Protected Class Methods protected static java . util . EventListener addInternal ( java . util . EventListener , java . util . EventListener protected static java . util . EventListener removeInternal protected static void save ( java . io . ObjectOutputStream s , String k ) throws java . io . IOException ; Methods Implementing ActionListener public void actionPerformed ( java . awt . event . ActionEvent e Methods Implementing AdjustmentListener public void adjustmentValueChanged ( java . awt . event . AdjustmentEvent e Methods Implementing ComponentListener componentHidden ( java . awt . event . ComponentEvent componentMoved ( java . awt . event . ComponentEvent componentResized componentShown Methods Implementing ContainerListener componentAdded ( java . awt . event . ContainerEvent componentRemoved ( java . awt . event . ContainerEvent Methods Implementing FocusListener focusGained ( java . awt . event . FocusEvent focusLost ( java . awt . event . FocusEvent Methods Implementing InputMethodListener caretPositionChanged ( java . awt . event . InputMethodEvent inputMethodTextChanged ( java . awt . event . InputMethodEvent Methods Implementing ItemListener itemStateChanged ( java . awt . event . ItemEvent Methods Implementing KeyListener keyPressed ( java . awt . event . KeyEvent keyReleased ( java . awt . event . KeyEvent keyTyped Methods Implementing MouseListener mouseClicked ( java . awt . event . MouseEvent mouseEntered ( java . awt . event . MouseEvent mouseExited mousePressed mouseReleased Methods Implementing MouseMotionListener mouseDragged mouseMoved Methods Implementing TextListener textValueChanged ( java . awt . event . TextEvent Methods Implementing WindowListener windowActivated ( java . awt . event . WindowEvent windowClosed ( java . awt . event . WindowEvent windowClosing windowDeactivated windowDeiconified windowIconified windowOpened Protected Instance Methods protected java . util . EventListener saveInternal ( java . io . ObjectOutputStream s , String k ) throws java . io . IOException ; Protected Instance Fields protected final java . util . EventListener protected final java . util . EventListener Object - - > AWTEventMulticaster ( java . awt . event . ActionListener ( java . util . EventListener ) , java . awt . event . AdjustmentListener ( java . util . EventListener ) , java . awt . event . ComponentListener ( java . util . EventListener ) , java . awt . event . ContainerListener ( java . util . EventListener ) , java . awt . event . FocusListener ( java . util . EventListener ) , java . awt . event . InputMethodListener ( java . util . EventListener ) , java . awt . AWTException Java 1.0 serializable checked PJ1 . 1 Signals that an exception has occurred in the AWTException extends Exception { ( String msg Object - - > Throwable ( Serializable ) - - > Exception - - > AWTException Thrown By : Cursor . getSystemCustomCursor ( ) AWTPermission serializable permission This class encapsulates permissions for performing various AWT - related operations ; applications do not typically use it . The name , or target , of a permission should be one of the following values : " accessClipboard " , " accessEventQueue " , " listenToAllAWTEvents " , or " showWindowWithoutWarningBanner " . Alternatively , a name of " * " implies all of these values . AWTPermission does not use actions , so the actions argument to the constructor should be null public final class extends java . security . BasicPermission { name name actions Object - - > java . security . Permission ( java . security . Guard , Serializable ) - - > java . security . BasicPermission ( Serializable ) - - > AWTPermission BasicStroke This class defines properties that control how lines are drawn . By default , lines are one - pixel wide and solid . To change these attributes , pass a BasicStroke ( or another implementation of Stroke ) to the setStroke ( ) method of a object . supports the following line attribute properties : lineWidth The thickness of the line . endCap The end cap style of the line . CAP_BUTT specifies that a line ends exactly at its end points , without caps . CAP_SQUARE causes a line to end with square caps that extend beyond the end points by a distance equal to one - half of the line width . CAP_ROUND specifies that a line ends with round caps with a radius of one - half of the line width . lineJoin The join style when two line segments meet at the vertex of a shape . JOIN_MITER specifies that the outside edges of the two line segments are extended as far as necessary until they intersect . JOIN_BEVEL causes the outside corners of the vertex to be joined with a straight line . JOIN_ROUND specifies that the vertex is rounded with a curve that has a radius of half the line width . miterLimit The maximum length of the miter used to connect two intersecting line segments . When two lines intersect at an acute angle and the line join style is JOIN_MITER , the length of the miter gets progressively longer as the angle between the lines gets smaller . This property imposes a maximum length on the miter ; beyond this length , the miter is squared off . dashArray The pattern of dashes and spaces that make up a dashed line . This attribute is an array , where the first element and all the additional odd elements specify the lengths of dashes . The second element and all the additional even elements specify the lengths of the spaces . When the dash pattern is complete , it starts over at the beginning of the array , of course . dashPhase The distance into the dash pattern that line drawing begins . Note that this value is not an index into the dash array , but a distance . For example , if you ' ve specified a dash of length 5 followed by a space of length 3 and want to begin your line with the space rather than the dash , you set this property to 5 . See for a discussion of how line drawing is performed in Java 2D . implements Stroke { ( float width ( float width , int cap join cap join , float miterlimit miterlimit , float [ ] dash dash_phase CAP_BUTT = 0 CAP_ROUND CAP_SQUARE JOIN_BEVEL JOIN_ROUND Property Accessor Methods ( by property name ) public float [ ] getDashArray default : null public float getDashPhase default : 0.0 getEndCap default : 2 getLineJoin default : 0 getLineWidth default : 1.0 getMiterLimit default : 10.0 Methods Implementing Stroke public Shape createStrokedShape ( Shape Public Methods Overriding Object public boolean equals obj hashCode Object - - > BasicStroke ( Stroke ) BorderLayout serializable layout manager PJ1 . 1 A LayoutManager that arranges components that have been added to their Container ( using the Container . add ( ) method ) with the names " North " , " South " , " East " , " West " , and " Center " . These named components are arranged along the edges and in the center of the container . The hgap and vgap arguments to the BorderLayout constructor specify the desired horizontal and vertical spacing between adjacent components . In Java 1.1 , five constants were defined to represent these strings . In Java 1.2 , an additional four constants have been added to represent the four sides of the container in a way that is independent of writing direction . For example , BEFORE_LINE_BEGINS is the same as WEST in locales where text is drawn from left to right , but is the same as EAST in locales where text is drawn from right to left . Note that an application should never call the methods of this class directly ; the for which the is registered does this . In Java 1.1 , five constants were defined to represent these strings . In Java 1.2 , an additional four constants have been added to represent the four sides of the container in a way that is independent of writing direction . For example , BEFORE_LINE_BEGINS is the same as WEST in locales where text is drawn from left to right but is the same as EAST in locales where text is drawn right to left . implements LayoutManager2 , Serializable { hgap vgap public static final String AFTER_LAST_LINE = " Last " public static final String AFTER_LINE_ENDS = " After " BEFORE_FIRST_LINE = " First " = " Before " 1.1 CENTER = " Center " 1.1 = " East " NORTH = " North " SOUTH = " South " = " West " getHgap default : 0 setHgap getVgap setVgap Methods Implementing LayoutManager layoutContainer ( Container target public Dimension minimumLayoutSize ( Container target public Dimension preferredLayoutSize removeLayoutComponent ( Component comp Methods Implementing LayoutManager2 addLayoutComponent ( Component comp , Object constraints getLayoutAlignmentX parent getLayoutAlignmentY parent invalidateLayout empty maximumLayoutSize toString Deprecated Public Methods addLayoutComponent , Component Implements : LayoutManager Object - - > BorderLayout ( LayoutManager2 ( LayoutManager ) , Serializable ) Button serializable AWT component PJ1 . 1 This class represents a GUI push button that displays a specified textual label . Use setActionCommand ( ) to specify an identifying string that is included in the ActionEvent events generated by the button . Button extends Component { label Event Registration Methods ( by event name ) addActionListener synchronized removeActionListener synchronized getActionCommand default : " " setActionCommand command getLabel default : " " setLabel label Public Methods Overriding Component addNotify Protected Methods Overriding Component protected String paramString processEvent ( AWTEvent processActionEvent ( java . awt . event . ActionEvent Object - - > Component ( java . awt . image . ImageObserver , MenuContainer , Serializable ) - - > Button Toolkit . createButton ( ) Canvas serializable AWT component PJ1 . 1 A that does no default drawing or event handling on its own . You can subclass it to display any kind of drawing or image and handle any kind of user input event . Canvas inherits the event - handling methods of its superclass . In Java 1.1 , you can also subclass directly to create a lightweight component , instead of having to subclass extends Component { ( GraphicsConfiguration config Public Methods Overriding Component addNotify paint ( Graphics g Object - - > Component ( java . awt . image . ImageObserver , MenuContainer , Serializable ) - - > Canvas Toolkit . createCanvas ( ) CardLayout serializable layout manager PJ1 . 1 that makes each of the components it manages as large as the container and ensures that only one is visible at a time . The standard methods are called by the object and should not be called directly by applet or application code . first ( ) last ( ) next ( ) previous ( ) , and show ( ) make a particular in the visible . The names with which the components are added to the container are used only by the show ( ) method . CardLayout implements LayoutManager2 , Serializable { getHgap setHgap getVgap setVgap first last next previous show Methods Implementing LayoutManager layoutContainer minimumLayoutSize preferredLayoutSize removeLayoutComponent Methods Implementing LayoutManager2 , Object constraints getLayoutAlignmentX getLayoutAlignmentY invalidateLayout empty maximumLayoutSize Deprecated Public Methods , Component Implements : LayoutManager Object - - > CardLayout ( LayoutManager2 ( LayoutManager ) , Serializable ) Checkbox This class represents a GUI checkbox with a textual label . The Checkbox maintains a boolean state - - whether it is checked or not . The checkbox may optionally be part of a CheckboxGroup that enforces radio button behavior . extends Component implements ItemSelectable { , boolean state , CheckboxGroup group , boolean state , CheckboxGroup group addItemListener Implements : ItemSelectable synchronized removeItemListener Implements : ItemSelectable synchronized public CheckboxGroup getCheckboxGroup default : null setCheckboxGroup ( CheckboxGroup g getLabel setLabel public Object [ ] getSelectedObjects Implements : ItemSelectable default : null getState default : false setState ( boolean Methods Implementing ItemSelectable addItemListener public Object [ ] getSelectedObjects removeItemListener Protected Methods Overriding Component protected String processEvent ( AWTEvent processItemEvent ( java . awt . event . ItemEvent Object - - > Component ( java . awt . image . ImageObserver , MenuContainer , Serializable ) - - > Checkbox ( ItemSelectable ) CheckboxGroup . { setCurrent ( ) , setSelectedCheckbox ( ) } , Toolkit . createCheckbox ( ) CheckboxGroup . { getCurrent ( ) , getSelectedCheckbox ( ) } CheckboxGroup serializable PJ1 . 1 object enforces mutual exclusion ( also known as radio button behavior ) among any number of buttons . A component can specify a object when created or with its setCheckboxGroup ( ) method . If a within a object is selected , the ensures that the previously selected becomes unselected . implements Serializable { public Checkbox getSelectedCheckbox setSelectedCheckbox ( Checkbox box public Checkbox getCurrent setCurrent ( Checkbox box Object - - > CheckboxGroup ( Serializable ) Checkbox . { Checkbox ( ) , setCheckboxGroup ( ) } , java . awt . peer . CheckboxPeer . setCheckboxGroup ( ) Checkbox . getCheckboxGroup ( ) CheckboxMenuItem serializable AWT component PJ1 . 1 ( opt ) This class represents a checkbox with a textual label in a GUI menu . It maintains a boolean state - - whether it is checked or not . See also MenuItem CheckboxMenuItem extends MenuItem implements ItemSelectable { Implements : ItemSelectable synchronized default : null getState default : false setState ( boolean Methods Implementing ItemSelectable synchronized default : null Public Methods Overriding MenuItem Protected Methods Overriding MenuItem processItemEvent Object - - > MenuComponent ( Serializable ) - - > MenuItem - - > CheckboxMenuItem ( ItemSelectable ) Toolkit . createCheckboxMenuItem ( ) Choice This class represents an option menu or dropdown list . The addItem ( ) method adds an item with the specified label to a Choice menu . getSelectedIndex ( ) returns the numerical position of the selected item in the menu , while getSelectedItem ( ) returns the label of the selected item . extends Component implements ItemSelectable { getItemCount getSelectedIndex default : - 1 getSelectedItem synchronized default : null Implements : ItemSelectable synchronized default : null item addItem item getItem index insert index position removeAll select str select pos countItems Object - - > Component ( java . awt . image . ImageObserver , MenuContainer , Serializable ) - - > Choice ( ItemSelectable ) Toolkit . createChoice ( ) serializable PJ1 . 1 This class describes a color in terms of the individual components of that color . These components are either float values that range between 0 and 1 or 8 - bit integers that range from 0 to 255 . Prior to Java 1.2 , only the RGB ( red , green , blue ) color space was supported . With the advent of Java 2D , the class has been extended to support alpha transparency and arbitrary java . awt . color . ColorSpace objects . In addition , the Java 1.2 class implements the Paint interface and is used to perform Java 2D drawing and filling operations that use solid colors . objects can be obtained in a number of ways . The Color ( ) constructors allow color components to be directly specified . The class also defines several color constants . The SystemColor subclass defines other useful constants that are related to standard colors used on the system desktop . The static methods HSBtoRGB ( ) and RGBtoHSB ( ) convert between the RGB color space and the HSB ( hue , saturation , brightness ) color space and can be used to create colors specified using the more intuitive HSB color components . brighter ( ) darker ( ) return variants on the current color and are useful for creating shading effects . An RGB color can be expressed as a 24 - bit number , where the top 8 bits specifies the red component , the middle 8 bits specifies the green component , and the low 8 bits specifies the blue component . Colors are often represented using a string representation of this 24 - bit number . It is particularly common to use a hexadecimal representation for a color , since it keeps the red , green , and blue components distinct . For example , the string " 0xFF0000 " represents a bright red color : the red component decode ( ) method converts color strings encoded in this way to objects . Each getColor ( ) method looks up the specified key in the system properties list and then decodes the value and returns the resulting or the specified default color , if no color is found in the properties list . getRGB ( ) returns the red , green , and blue components of a color as a 24 - bit number . getRed ( ) getBlue ( ) getGreen ( ) , and getAlpha ( ) return the individual components of a color as integers . getComponents ( ) is a generalized method that returns the color and transparency components of a color in a float array , using an optionally specified ColorSpace getColorComponents ( ) is similar but returns only the color components , not the transparency component . getRGBComponents ( ) returns the color and alpha components as values using the RGB color space . getRGBColorComponents ( ) does the same but does not return the alpha component . Each of these methods either fills in the elements of a float [] array you provide or allocates one of its own , if you pass null implements Paint , Serializable { rgb rgba hasalpha ( java . awt . color . ColorSpace cspace , float [ ] components alpha r r public static final Color black public static final Color blue cyan darkGray gray green lightGray magenta orange pink red white yellow public static Color decode nm ) throws NumberFormatException ; public static Color getColor nm getColor , Color getHSBColor h public static int HSBtoRGB hue saturation brightness public static float [ ] RGBtoHSB hsbvals getAlpha getBlue public java . awt . color . ColorSpace getColorSpace getGreen getRed getRGB getTransparency Implements : Transparency public Color brighter public Color darker public float [ ] getColorComponents ( float [ ] compArray getColorComponents ( java . awt . color . ColorSpace cspace compArray getComponents ( float [ ] getComponents getRGBColorComponents getRGBComponents Methods Implementing Paint public PaintContext createContext ( java . awt . image . ColorModel cm , Rectangle , java . awt . geom . Rectangle2D r2d , java . awt . geom . AffineTransform xform , RenderingHints hints Methods Implementing Transparency getTransparency Object - - > Color ( Paint ( Transparency ) , Serializable ) Subclasses : SystemColor , javax . swing . plaf . ColorUIResource Too many methods to list . Type Of : Too many fields to list . serializable AWT component PJ1 . 1 ( mod ) is the superclass of all GUI components ( except menu components ) in the package . You can not instantiate a directly ; you must use a subclass . defines many methods . Some of these are intended to be implemented by subclasses , including some that are for handling events . Other methods are used internally by the AWT . And many are useful utility methods for working with GUI components . getParent ( ) returns the that contains a setBackground ( ) setForeground ( ) , and setFont ( ) set the specified display attributes of a component . hide ( ) enable ( ) , and disable ( ) perform the specified actions for a component . createImage ( ) creates either an Image object from a specified ImageProducer or an off - screen image that can be drawn into and used for double - buffering during animation . also has quite a few deprecated methods , as a result of the Java 1.1 event model and the introduction of the JavaBeans method - naming conventions . The class defines numerous methods for handling many types of events , using the 1.0 and 1.1 event models , in both their high - level and low - level forms . In Personal Java environments , the setCursor ( ) method can be ignored . Also , the Personal Java API supports the isDoubleBuffered ( ) method , even though it is not part of the Java 1.1 API from which Personal Java is derived . public abstract class implements java . awt . image . ImageObserver , MenuContainer , Serializable { Protected Constructors protected public static final float BOTTOM_ALIGNMENT = 1.0 public static final float CENTER_ALIGNMENT = 0.5 LEFT_ALIGNMENT = 0.0 RIGHT_ALIGNMENT = 1.0 TOP_ALIGNMENT = 0.0 addComponentListener removeComponentListener addFocusListener removeFocusListener addInputMethodListener removeInputMethodListener addKeyListener removeKeyListener addMouseListener removeMouseListener addMouseMotionListener removeMouseMotionListener addPropertyChangeListener ( java . beans . PropertyChangeListener listener removePropertyChangeListener ( java . beans . PropertyChangeListener listener getAlignmentX getAlignmentY getBackground setBackground ( Color c public Rectangle getBounds public Rectangle getBounds ( Rectangle rv setBounds ( Rectangle setBounds x y height public java . awt . image . ColorModel getColorModel public ComponentOrientation getComponentOrientation setComponentOrientation ( ComponentOrientation o public Cursor getCursor setCursor ( Cursor cursor isDisplayable isDoubleBuffered constant public java . awt . dnd . DropTarget getDropTarget setDropTarget ( java . awt . dnd . DropTarget dt isEnabled setEnabled isFocusTraversable public Font getFont Implements : MenuContainer setFont ( Font f getForeground setForeground ( Color c public Graphics getGraphics getHeight public java . awt . im . InputContext getInputContext public java . awt . im . InputMethodRequests getInputMethodRequests constant isLightweight public java . util . Locale getLocale setLocale ( java . util . Locale public Point getLocation public Point getLocation ( Point rv setLocation ( Point p setLocation x y getLocationOnScreen getMaximumSize getMinimumSize getName setName isOpaque public Container getParent getPreferredSize isShowing getSize getSize ( Dimension setSize ( Dimension d setSize height public Toolkit getToolkit public final Object getTreeLock isValid isVisible setVisible getWidth getX getY ( PopupMenu popup addPropertyChangeListener propertyName , java . beans . PropertyChangeListener checkImage ( Image image , java . awt . image . ImageObserver observer checkImage ( Image image , java . awt . image . ImageObserver observer contains p contains public Image createImage ( java . awt . image . ImageProducer producer public Image createImage public final void dispatchEvent doLayout enableInputMethods enable public Component getComponentAt public Component getComponentAt public FontMetrics getFontMetrics ( Font font hasFocus invalidate list list ( java . io . PrintWriter out ( java . io . PrintStream out ( java . io . PrintWriter indent ( java . io . PrintStream indent paint ( Graphics paintAll prepareImage prepareImage print printAll removeNotify removePropertyChangeListener propertyName , java . beans . PropertyChangeListener repaint repaint ( long tm ( long tm requestFocus transferFocus update validate Methods Implementing ImageObserver imageUpdate img flags w h Methods Implementing MenuContainer public Font getFont ( MenuComponent popup protected AWTEvent coalesceEvents existingEvent , AWTEvent newEvent protected final void disableEvents eventsToDisable protected final void enableEvents eventsToEnable firePropertyChange oldValue newValue processComponentEvent processFocusEvent processInputMethodEvent processKeyEvent processMouseEvent processMouseMotionEvent action ( Event evt what bounds deliverEvent disable enable public java . awt . peer . ComponentPeer getPeer gotFocus evt what handleEvent hide inside keyDown key keyUp key layout locate location lostFocus minimumSize mouseDown mouseDrag mouseEnter mouseExit mouseMove mouseUp move nextFocus postEvent Implements : MenuContainer preferredSize reshape resize d resize show size Object - - > Component ( java . awt . image . ImageObserver , MenuContainer , Serializable ) Button , Canvas , Checkbox , Choice , Container , Label , java . awt . List , Scrollbar , TextComponent , javax . swing . Box . Filler Too many fields to list . ComponentOrientation serializable This class encapsulates differences in the way characters in GUI components are arranged into lines and the way lines are grouped into blocks . In western languages like English , characters are arranged left to right and lines are arranged top to bottom , but this is not true throughout the world . In Hebrew , for example , characters are arranged from right to left , and in traditional Chinese , characters are arranged from top to bottom . The isHorizontal ( ) isLeftToRight ( ) methods specify the necessary orientation information . The class defines two constants for commonly used orientation types . Authors of AWT , Swing , and JavaBeans components may want to take orientation into account when developing their components ( see the getComponentOrientation ( ) method of ) . Applications that use these components should typically not have to worry about this class . You can query the default orientation for a given java . util . Locale by calling the static getOrientation ( ) method . Set the componentOrientation property of all components in a window by passing a ResourceBundle object to the applyResourceBundle ( ) Window . This looks up the " Orientation " resource in the bundle and , if it is not found , uses the default orientation for the locale of the bundle . ComponentOrientation implements Serializable { No Constructor public static final ComponentOrientation LEFT_TO_RIGHT public static final ComponentOrientation RIGHT_TO_LEFT UNKNOWN public static ComponentOrientation getOrientation ( java . util . ResourceBundle bdl public static ComponentOrientation ( java . util . Locale locale isHorizontal isLeftToRight Object - - > ComponentOrientation ( Serializable ) Component . setComponentOrientation ( ) Component . getComponentOrientation ( ) , ComponentOrientation . getOrientation ( ) ComponentOrientation . { LEFT_TO_RIGHT , RIGHT_TO_LEFT , UNKNOWN } This interface defines how two colors are combined to yield a composite color . When Java 2D performs a drawing operation , it uses a object to combine the colors it wants to draw with the colors that already exist on the screen or in the off - screen image . The default compositing operation is to draw the new color on top of the color already on the screen . If the new color is fully opaque , the existing color is ignored . If the new color is partially transparent , however , it is combined with the color already on the screen to produce a composite color . To specify a different compositing operation , pass a object to the setComposite ( ) object . is a commonly used implementation of ; it combines colors in a number of possible ways based on their alpha - transparency levels . is suitable for most uses ; very few applications should have to define a custom implementation of Note that the only method of createContext ( ) , does not perform compositing itself . Instead , it returns a CompositeContext object suitable for compositing colors encoded using the specified color models and rendering hints . It is the CompositeContext object that performs the actual work of combining colors . public abstract CompositeContext srcColorModel , java . awt . image . ColorModel dstColorModel Graphics2D . setComposite ( ) Graphics2D . getComposite ( ) This interface defines the methods that do the actual work of compositing colors . The interface is used internally by Java 2D ; applications never need to call methods . And only applications that implement a custom class need to implement this interface . A object holds the state for a particular compositing operation ( in multi - threaded programs , there may be several compositing operations in progress at once ) . A object creates objects as needed by calling the createContext ( ) method of its Once a object has been created , its compose ( ) method is responsible for combining the colors of the first two Raster objects passed to it and storing the resulting colors in the specified WriteableRaster . ( This WriteableRaster is usually the same object as one of the first two arguments . ) The dispose ( ) method should free any resources held by the . It is called when the no longer requires the compose ( java . awt . image . Raster src , java . awt . image . Raster dstIn , java . awt . image . WritableRaster dstOut dispose AlphaComposite . createContext ( ) , Composite . createContext ( ) This class implements a component that can contain other components . You can not instantiate directly but must use one of its subclasses , such as Panel Frame , or Dialog . Once a is created , you can set its with setLayout ( ) , add components to it with , and remove them with getComponents ( ) returns an array of the components contained in a locate ( ) determines within which contained component a specified point falls . list ( ) produces helpful debugging output . addContainerListener removeContainerListener getAlignmentX Overrides : Component default : 0.5 getAlignmentY Overrides : Component default : 0.5 getComponentCount public Component [ ] setCursor ( Cursor cursor Overrides : Component synchronized setFont f Overrides : Component public Insets getInsets public LayoutManager getLayout setLayout ( LayoutManager mgr getMaximumSize Overrides : Component getMinimumSize getPreferredSize findComponentAt findComponentAt getComponent n isAncestorOf paintComponents printComponents removeAll doLayout invalidate print removeNotify update validate addImpl processContainerEvent validateTree countComponents deliverEvent public Insets insets layout locate minimumSize preferredSize Object - - > Component ( java . awt . image . ImageObserver , MenuContainer , Serializable ) - - > Container Panel , ScrollPane , Window , javax . swing . Box , javax . swing . CellRendererPane , javax . swing . JComponent , javax . swing . tree . DefaultTreeCellEditor . EditorContainer javax . swing . JRootPane . contentPane , javax . swing . tree . DefaultTreeCellEditor . editingContainer Cursor This class represents a mouse cursor . It defines a number of constants , which represent the 14 predefined cursors provided by Java 1.0 and Java 1.1 . You can pass one of these constants to the constructor to create a cursor of the specified type . Call getType ( ) to determine the type of an existing Cursor object . Since there are only a fixed number of available cursors , the static method getPredefinedCursor ( ) is more efficient than the Cursor ( ) constructor - - it maintains a cache of objects that can be reused . The static getDefaultCursor ( ) method returns the default cursor for the underlying system . In Java 1.2 , the class has a new getSystemCustomCursor ( ) method that returns a named cursor defined by a system administrator in a systemwide cursors . properties file . Since there is no way to query the list of system - specific custom cursors , however , this method is rarely used . Instead , you can create your own custom cursor by calling the createCustomCursor ( ) method of the Toolkit object . You should first check whether custom cursors are supported by calling the getBestCursorSize ( ) method of Toolkit . If this method indicates a width or height of 0 , custom cursors are not supported ( by either the Java implementation or the underlying windowing system ) . type CROSSHAIR_CURSOR CUSTOM_CURSOR = - 1 DEFAULT_CURSOR E_RESIZE_CURSOR = 11 HAND_CURSOR = 12 MOVE_CURSOR = 13 N_RESIZE_CURSOR NE_RESIZE_CURSOR = 7 NW_RESIZE_CURSOR = 6 S_RESIZE_CURSOR = 9 SE_RESIZE_CURSOR = 5 SW_RESIZE_CURSOR TEXT_CURSOR W_RESIZE_CURSOR = 10 WAIT_CURSOR = 3 public static Cursor getDefaultCursor public static Cursor getPredefinedCursor type getSystemCustomCursor ) throws AWTException ; getName getType Protected Class Fields protected static Cursor [ ] predefined Object - - > Cursor ( Serializable ) Cursor . predefined , java . awt . dnd . DragSource . { DefaultCopyDrop , DefaultCopyNoDrop , DefaultLinkDrop , DefaultLinkNoDrop , DefaultMoveDrop , DefaultMoveNoDrop } Dialog serializable AWT component PJ1 . 1 ( mod ) This class represents a dialog box window . A can be modal , so that it blocks user input to all other windows until dismissed . It is optional whether a dialog has a title and whether it is resizable . A object is a , so you can add objects to it in the normal way with the method . The default for is . You can specify a different object with setLayout ( ) . Call the pack ( ) method of Window to initiate layout management of the dialog and set its initial size appropriately . Call to pop a dialog up and setVisible ( false ) to pop it down . For modal dialogs , blocks until the dialog is dismissed . Event handling continues while is blocked , using a new event dispatcher thread . In Java 1.0 , is inherited from . Call the Window . dispose ( ) method when the is no longer needed so that its window system resources may be reused . In Personal Java environments , support for modeless dialogs is optional , and the Dialog ( ) constructors can throw an exception if you attempt to create a modeless dialog . Also , the setResizable ( ) method is optional , and calls to it can be ignored . extends Window { ( Frame owner ( Dialog owner ( Dialog title ( Frame title modal modal isModal setModal isResizable setResizable resizable getTitle setTitle Public Methods Overriding Window dispose hide Protected Methods Overriding Container Object - - > Component ( java . awt . image . ImageObserver , MenuContainer , Serializable ) - - > Container - - > Window - - > Dialog FileDialog , javax . swing . JDialog Dialog . Dialog ( ) , Toolkit . createDialog ( ) , javax . swing . JDialog . JDialog ( ) Dimension cloneable serializable PJ1 . 1 This class contains two integer fields that describe a width and a height of something . The fields are public and can be manipulated directly . In Java 1.0 and Java 1.1 , Dimension is a subclass of Object . In Java 1.2 , with the introduction of Java 2D , it has become a concrete subclass of java . awt . geom . Dimension2D . Contrast with Dimension2D , which represents the width and height with double values . extends java . awt . geom . Dimension2D implements Serializable { Public Methods Overriding Dimension2D public double getHeight default : 0.0 public double getWidth ( double , double Public Instance Fields Object - - > java . awt . geom . Dimension2D ( Cloneable ) - - > Dimension ( Serializable ) javax . swing . plaf . DimensionUIResource javax . swing . JTable . preferredViewportSize Event This class contains public instance variables that describe some kind of GUI event . In Java 1.1 , this class has been superseded by and the java . awt . event The class contains a large number of constants . Some of the constants specify the event type and are values for the variable . Other constants are values for keys , such as the function keys , that do not have ASCII ( Latin - 1 ) values and are set on the field . Other constants are mask values that are ORed into the modifiers field to describe the state of the modifier keys on the keyboard . The field is very important - - it is the object for which the event occurred . The when field specifies when the event occurred . The fields specify the mouse coordinates at which it occurred . Finally , the arg field is a value specific to the type of the event . Not all fields have valid values for all types of events . arg , long when modifiers , long ACTION_EVENT = 1001 ALT_MASK BACK_SPACE CAPS_LOCK = 1022 CTRL_MASK DELETE = 127 DOWN = 1005 END = 1001 ENTER = 10 ESCAPE = 27 F1 = 1008 F10 = 1017 F11 = 1018 F12 = 1019 F2 = 1009 F3 = 1010 F4 = 1011 F5 = 1012 F6 = 1013 F7 = 1014 F8 = 1015 F9 = 1016 GOT_FOCUS = 1004 HOME = 1000 INSERT = 1025 KEY_ACTION = 403 KEY_ACTION_RELEASE = 404 KEY_PRESS = 401 KEY_RELEASE = 402 LEFT = 1006 LIST_DESELECT = 702 LIST_SELECT = 701 LOAD_FILE = 1002 LOST_FOCUS = 1005 META_MASK MOUSE_DOWN = 501 MOUSE_DRAG = 506 MOUSE_ENTER = 504 MOUSE_EXIT = 505 MOUSE_MOVE = 503 MOUSE_UP = 502 NUM_LOCK = 1023 PAUSE = 1024 PGDN = 1003 PGUP = 1002 PRINT_SCREEN = 1020 RIGHT = 1007 SAVE_FILE = 1003 SCROLL_ABSOLUTE = 605 SCROLL_BEGIN = 606 SCROLL_END = 607 SCROLL_LINE_DOWN = 602 SCROLL_LINE_UP = 601 SCROLL_LOCK = 1021 SCROLL_PAGE_DOWN = 604 SCROLL_PAGE_UP = 603 SHIFT_MASK TAB = 9 UP = 1004 WINDOW_DEICONIFY = 204 WINDOW_DESTROY = 201 WINDOW_EXPOSE = 202 WINDOW_ICONIFY = 203 WINDOW_MOVED = 205 controlDown metaDown shiftDown translate Public Instance Fields public Object clickCount public Event public Object public long Object - - > Event ( Serializable ) Event . evt EventQueue This class implements an event queue for AWT events in Java 1.1 . When an is created , a new thread is automatically created and started to remove events from the front of the queue and dispatch them to the appropriate component . It is this thread , created by the , that notifies event listeners and executes most of the code in a typical GUI - driven application . An application can create and use its own private , but all AWT events are placed on and dispatched from a single system . Use the getSystemEventQueue ( ) method of the class to get the system getNextEvent ( ) removes and returns the event at the front of the queue . It blocks if there are no events in the queue . peekEvent ( ) returns the event at the front of the queue without removing it from the queue . Passed an optional field , it returns the first event of the specified type . Finally , postEvent ( ) places a new event on the end of the event queue . In Java 1.2 , defines three useful static methods . isDispatchThread ( ) returns true if the calling thread is the AWT event dispatch thread . To avoid thread - safety issues , all modifications to AWT and Swing components should be done from this dispatch thread . If another thread needs to operate on a component , it should wrap the desired operation in a Runnable object and pass that object to invokeLater ( ) or invokeAndWait ( ) . These methods bundle the Runnable object into an that is placed on the queue . When the reaches the head of the queue , the code is invoked by the event dispatch thread and can safely modify any AWT and Swing components . returns immediately , while blocks until the code has been run . It is an error to call from the event dispatch thread itself . See also javax . swing . SwingUtilities . Except for these useful static methods , most applications do not need to use the class at all ; they can simply rely on the system to dispatch events automatically . public static void invokeAndWait ( Runnable runnable ) throws InterruptedException , java . lang . reflect . InvocationTargetException ; public static void invokeLater ( Runnable runnable public static boolean isDispatchThread public AWTEvent getNextEvent ( ) throws InterruptedException ; public AWTEvent
[ "java . awt Package", "GUI" ]
http://docstore.mik.ua/orelly/perl4/prog/ch19_02.htm
19.2 . Environment Variables In addition to the various switches that explicitly modify Perl ' s behavior , you can set various environment variables to influence various underlying behaviors . How you set up these environment variables is system dependent , but one trick you should know if you use sh ksh , or bash is that you can temporarily set an environment variable for a single command , as if it were a funny kind of switch . It has to be set in front of the command : $ PATH = ' / bin : / usr / bin ' perl myproggie You can do something similar with a subshell in csh and tcsh ( setenv PATH " / bin : / usr / bin " ; perl myproggie ) Otherwise , you ' d typically set environment variables in some file with a name resembling .chsrc or .profile in your home directory . Under csh and tcsh you ' d say : setenv PATH ' / bin : / usr / bin ' And under sh ksh , and bash you ' d say : $ PATH = ' / bin : / usr / bin ' ; export PATH Other systems will have other ways of setting these on a semi - permanent basis . Here are the environment variables Perl pays attention to : HOME Used if chdir is called without an argument . LC_ALL LC_CTYPE LC_COLLATE LC_NUMERIC PERL_BADLANG Environment variables that control how Perl handles data specific to particular natural languages . See the online docs for perllocale LOGDIR Used if chdir has no argument , but HOME is not set . PATH Used in executing subprocesses , and for finding the program if the - S switch is used . PERL5LIB A colon - separated list of directories in which to look for Perl library files before looking in the standard library and the current directory . Any architecture - specific directories under the specified locations are automatically included if they exist . If PERL5LIB is not defined , PERLLIB is consulted for backward compatibility with older releases . When running taint checks ( either because the program was running setuid or setgid , or the - T switch was used ) , neither of these library variables is used . Such programs must employ the use lib pragma for that purpose . PERL5OPT Default command - line switches . Switches in this variable are taken as if they were on every Perl command line . Only the - [ DIMUdmw ] switches are allowed . When running taint checks ( because the program was running setuid or setgid , or the - T switch was used ) , this variable is ignored . If PERL5OPT begins with , tainting will be enabled , causing any subsequent options to be ignored . PERL5DB The command used to load the debugger code . The default is : BEGIN { require ' perl5db . pl ' } See Chapter 20 , " The Perl Debugger " for more uses of this variable . PERL5SHELL ( Microsoft ports only ) May be set to an alternative shell that Perl must use internally for executing commands via backticks or system . Default is cmd . exe / x / c on WinNT and command . com / c on Win95 . The value is considered to be space separated . Precede any character that needs to be protected ( like a space or backslash ) with a backslash . Note that Perl does n ' t use COMSPEC for this purpose because COMSPEC has a high degree of variability among users , leading to portability concerns . Besides , Perl can use a shell that may not be fit for interactive use , and setting to such a shell may interfere with the proper functioning of other programs ( which usually look in to find a shell fit for interactive use ) . PERLLIB A colon - separated list of directories in which to look for Perl library files before looking in the standard library and the current directory . If is defined , is not used . PERL_DEBUG_MSTATS Relevant only if Perl is compiled with the malloc function included with the Perl distribution ( that is , if perl - V : d_mymalloc yields " define " ) . If set , this causes memory statistics to be displayed after execution . If set to an integer greater than one , also causes memory statistics to be displayed after compilation . PERL_DESTRUCT_LEVEL Relevant only if your Perl executable was built with debugging enabled , this controls the behavior of global destruction of objects and other references . Apart from these , Perl itself uses no other environment variables , except to make them available to the program being executed and to any child processes that program launches . Some modules , standard or otherwise , may care about other environment variables . For example , the use re pragma uses PERL_RE_TC PERL_RE_COLORS , the Cwd module uses PWD , and the CGI module uses the many environment variables set by your HTTP daemon ( that is , your web server ) to pass information to the CGI script . Programs running setuid would do well to execute the following lines before doing anything else , just to keep people honest : $ ENV { PATH } = ' / bin : / usr / bin ' ; # or whatever you need $ ENV { SHELL } = ' / bin / sh ' if exists $ ENV { SHELL } ; delete @ ENV { qw ( IFS CDPATH ENV BASH_ENV ) } ; See Chapter 23 , " Security " for details . 19.1 . Command Processing 20 . The Perl Debugger Copyright Β© 2002 O ' Reilly & Associates . All rights reserved .
[ "Environment Variables" ]
http://doctor.ndtv.com/faq/ndtv/fid/11727/What_are_the_symptoms_of_brain_tuberculosis.html
Home Frequently asked Questions on Health Β» What are the symptoms of brain tuberculosis ? What are the symptoms of brain tuberculosis ? Answered by : Dr Anuj Sharma | World Health Organization , Country Office for India , New Delhi Q : What are the symptoms of brain tuberculosis ? Which are the drugs that can be used to cure this disease ? A : Tuberculosis ( TB ) may affect the central nervous system ( CNS ) , i.e. , meninges , brain or spinal cord , in which case it is called TB meningitis , TB cerebritis and TB myelitis , respectively . TB of the CNS presents in many different ways . A patient may be asymptomatic , have lung symptoms or may have neurological deficits alone . Common complaints include headaches , stiff neck , fever , weight loss , blurred vision , confusion , lethargy , nausea , vomiting and for spinal cord lesions - lower extremity weakness or bowel or bladder symptoms . Signs of meningitis may include altered mental status , fever , seizures , etc . The standard treatment duration is 12 months of drugs ( 2 months of 4 drugs – INH , Rifampicin , Ethambutol and Pyrazinamide followed by 10 months of 2 drugs - INH and Rifampicin ) and steroids are mandatory . TB meningitis usually responds well to treatment . . . . . . . . . . . . . . . . . . . Advertisement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Advertisement . . . . . . . . . . . . . . . . . . . FAQ What do IgG and IgM indicate ? Why do I get cuts on my frenulum during intercourse ? Cuts on the foreskin of penis What is the normal range of pus cells in the urine of children ? Read More Trending Topics Anxiety High Blood Pressure ( Hypertension ) Obesity Erectile Dysfunction Osteoporosis Hair Loss Routine Health Care Promoted : In Stores Promoted via Pricee . com
[ "symptoms", "brain tuberculosis" ]
http://doctor.ndtv.com/faq/ndtv/fid/13246/What_is_hydronephrosis_and_hydroureter.html
Home Frequently asked Questions on Health Β» What is hydronephrosis and hydroureter ? What is hydronephrosis and hydroureter ? Answered by : Dr Ashutosh Singh | Consultant Nephrologist , Knoxville , USA Q : I am a 27 years old male with kidney stones . When I first got my ultrasound done , the report stated a stone measuring 4.3 mm in the right kidney and mild hydronephrosis and hydroureter with 4.7 mm calculus in the right vesico - ureteric junction . The left kidney had a stone measuring 5.5 mm and calculus had been found in lower calyx . My latest ultrasound reports mild hydronephrosis and hydroureter in the right kidney and a 5.8 mm calculus in lower calyx of left kidney . I have pain in my right kidney . While browsing the Internet , I came to know that it might be because of mild hydronephrosis and hydroureter . What is it and how harmful can it be ? I occasionally have beer and also smoke 2 - 4 cigarettes daily . Can this worsen my situation ? What mode of treatment should I undertake ? A : Hydronephrosis and hydroureter means dilation ( distension ) of part of urinary tract called renal pelvis and the ureter respectively resulting from an obstruction of the tract by the stone in your case . Persistent hydronephrosis especially accompanied with pain would require a close follow up with your Urologist . If neglected , it could impair the kidney function on the affected side . Kidney stones of under 5 mm size most often tend to pass spontaneously . However , if the stone persists to cause an obstruction along with the symptoms of pain , then it would require a . . . . . . . . . . . . . . . . . . . Advertisement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Advertisement . . . . . . . . . . . . . . . . . . . FAQ What do IgG and IgM indicate ? Why do I get cuts on my frenulum during intercourse ? Cuts on the foreskin of penis What is the normal range of pus cells in the urine of children ? What does ASO mean and why is it high ? Read More Trending Topics Anxiety High Blood Pressure ( Hypertension ) Obesity Erectile Dysfunction Osteoporosis Hair Loss Routine Health Care Promoted : In Stores Promoted via Pricee . com
[ "hydronephrosis and hydroureter", "distension" ]
http://doctor.ndtv.com/faq/ndtv/fid/24145/Are_both_the_blood_groups_O_negative_and_positive_called_universal_donors.html
Home Frequently asked Questions on Health Β» Are both the blood groups O negative and positive called universal donors ? Are both the blood groups O negative and positive called universal donors ? Answered by : Dr Shirish Kumar | Haematologist , WHO , Geneva Q : As far as I know O negative is called universal donor and AB positive is called universal acceptor but one of my friend was arguing with me that blood type O positive is also the universal donor . His doctor also agreed with him . Are both the blood groups O negative and O positive called universal donors ? Please clarify . A : The concepts of universal donor and universal recipient are more for simplicity sake as ideally only blood group matched unit is transfused . As red blood cells of blood group O - negative carry ' no antigen ' , it can be given to any other group and is thus called universal donor . Blood group O - positive cells can not be given to any Rh - negative individual . In contrast , the plasma of AB blood group contains no ABO antibodies and can thus receive red cells of any ABO blood group . Similarly , plasma from RELATED FAQ Why has my father started talking irrelevantly ? Why am I having a high ESR ? Is my daughter suffering from thalassaemia ? Am I suffering from obsessive compulsive disorder ? Should I continue taking Liv52 and Hepamerz ? back to faq . . . . . . . . . . . . . . . . . . . Advertisement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Advertisement . . . . . . . . . . . . . . . . . . . FAQ What do IgG and IgM indicate ? Why do I get cuts on my frenulum during intercourse ? Cuts on the foreskin of penis What is the normal range of pus cells in the urine of children ? What does ASO mean and why is it high ? Read More Anxiety High Blood Pressure ( Hypertension ) Obesity Erectile Dysfunction Osteoporosis Hair Loss Routine Health Care Promoted : In Stores Promoted via Pricee . com
[ "universal donors", "O negative", "O positive" ]
http://doctordecides.com/cirhossis-of-the-liver/
Home Diseases and Conditions Cirhossis of the Liver Cirhossis of the Liver admin Diseases and Conditions 20 Liver is a crucial organ in the body which performs several significant processes like controlling the infection by eliminating unhealthy bacteria as well as toxins in blood . It processes nutrients , drugs and hormones in the body . It is responsible for producing bile which is crucial for normal digestive function as they absorb cholesterol and helps in digesting fats . Cirrhosis of liver is a concerning medical condition . Under this condition , the healthy tissues of liver gets replaced with scar tissue . This gradually causes deterioration of liver functions . In a healthy state , the Sponsored link Symptoms of Cirrhosis of the liver Cirrhosis often manifests itself through various symptoms . Usually during the initial stages of the condition there is hardly any symptoms of the disorder recorded . Due to accumulation of scar tissue , the functioning of the liver is undermined . Here are some reported symptoms of liver cirrhosis . Occurrence of blood capillaries on upper abdomen skin Tiredness Sleeplessness Itchiness of skin Reduced appetite Reduction in body weight Queasiness Pain on the location of liver Red blotches on the palm Weariness Symptoms of progressed cirrhosis Ascites , a condition wherein the fluids get accumulated in the abdomen causing the stomach to appear larger Increased heartbeat Alteration in personality Bleeding from gums Loss of mass in upper body and arms Inability of body to process alcohol Inability of the body to process drugs Confusion Drowsiness Fluid accumulation on feet , legs and ankles Bruising Jaundice Hair loss Decreased sex drive Memory issues Frequents episodes of fever Cramps in muscles Bleeding from nose Right shoulder pain Breathlessness Tarry or black stools or else pale feces Darker urine Bloody vomit Staggered walking Stages Stage 1 : During the early stage of the condition there is often no symptoms exhibited by the body . However , if a close inspection is done jaundice , dryness of mouth , upper stomach enlargement , etc , are recorded in some cases . A person may also suffer from itching sensation . Proper medical diagnosis can help in detecting anomalous tissues in liver and inflammation of liver . Stage 2 : During this stage of cirrhosis of liver the anomalous tissues converts into rigid straps of connective tissues . This phenomenon is called fibrosis . This condition influences the portal veins as well as surrounding regions . Stage 3 : During the third stage of cirrhosis of liver these bands starts merging with each other . This makes the affected area enlarged . Usually disruption of liver functioning is also detected during this phase . The person experiencing 3 rd stage of liver cirrhosis will find it difficult to digest fats . Improper absorption of fat - soluble nutrients can also lead to deficiency of vitamin . Sponsored link Stage 4 : The final stage of cirrhosis of liver is decompensating in nature . The 4 th stage is considered as the most dreaded phase of the condition . In this advanced stage the patient is left with only one treatment option that is liver transplant . All the symptoms of the disorder worsen during the 4 th stage of liver cirrhosis . Life expectancy during liver cirrhosis Stage 4 of liver cirrhosis can lead to several health complications like hardening of the liver , kidney disease , spleen - related problems , portal hypertension and fluid build - up . Affected individual may also notice reduction in bone mass and density of bone becomes depleted . The body loses its potential to detoxify itself causing toxin concentration in the body . This may cause serious confusion or even lead to coma . It is recorded that cirrhosis of liver is ranked as third physical disease which can lead to death following heart condition and cancer . The If the condition is detected during its initial stages that the life expectancy of the patient may go up to 15 to 20 years . If the condition is detected during its second stage then the patient may have around 6 to 10 years of life expectancy . During these stages the affected person has the option of liver transplant or use of some sophisticated advanced medicines etc . However , if the condition is diagnosed during its last stage than the expectancy of life of the sufferer is unfortunately 1 year to 3 years . This would greatly depend Remember that cirrhosis of liver does not begin spontaneously , but it develops over years with constant damages to the liver . After damages the condition consistently deteriorates the liver causing it to stop functioning . If you overlook any underlying liver anomaly then you may become prone to serious health issues . Treatment of cirrhosis will help in stopping or reducing the progression of the condition . It is crucial for you to undergo regular medical checkup to track the progression of the condition and accordingly treatment will be suggested by the doctor . Treatment It is said that damages to liver can not be undone . The patient has the option to control and prevent further damages by using available options . It is very crucial to cease alcohol consumption in order to avoid adversities of the condition . At the same time it is significant to monitor the medicines that you use . In some cases anti - inflammatory medications may also aggravate the condition so ensure that you take your medicines only after thorough consultation with your doctor . It is also suggested to restrict fat consumption while you are undergoing treatment . It is crucial to have healthy vegetables and fruits . Herbal medicines have showed impressive effects in many cases of cirrhosis of liver . But ask your doctor whether these herbal medicines can be administered simultaneously along with your regular medical regimen . Usually herbal medicines do not have any reaction or side effects which is why they are safe . Patients suffering from this condition can also try certain vitamins and minerals to improve and restore liver to its normal functioning . Though early diagnosed causes diagnosis life expectancy liver symptoms treatment Previous Maculopapular Rash Next Bullous Pemphigoid
[ "Cirhossis", "Liver" ]
http://doctordecides.com/oily-urine/
Oily Urine admin Diseases and Conditions 0 Urine is usually made up of excess fluids and waste products that are filtered from the body by the kidneys . Oily urine can occur due to a number of causes such as dehydration , chyle , and increased vitamin intake , etc . But the main cause of oily urine is ketones in urine . Sponsored link Causes of Oily Urine Some of the common causes of oily urine are discussed below : 1 . Ketones in Urine One of the main causes of oily urine is ketones in urine . Ketones are generally not found in urine ; it gets released due to metabolism of fat , which in turn is caused due to the inability of the body to produce energy from carbohydrates , or due to starvation , or due to intake of a protein - rich diet or a carbohydrates deficient diet . Thus , oily urine caused by ketones in urine typically affects people who have endured starvation or fasting for prolonged periods , those with uncontrolled case of diabetes , and those Ketones are acidic in nature and hence harmful for the body . Increased ketones in urine can trigger ketones in urine that can then worsen and lead to development of ketosis , a condition characterized by varied symptoms like weakness , nausea , exhaustion , and elevated sweating . As mentioned above , ketones do not occur in healthy urine . Ketones levels in urine up to 20 mg / dL is classified as small ; between 30 and 40 mg / dL as moderate ; and over 80 mg / dL as large . Ketones in urine associated oily urine may be caused due to : Low food consumption Diabetic ketoacidosis or mismanaged diabetes Bad diet High fever due to an infection Strenuous workouts High stress levels Starvation , fasting , or nil food intake for more than 18 hours Eating a diet that is low in carbs or high in fat Use of fats by the body to produce energy instead of glucose Loss of carbohydrates due to frequent and prolonged nausea or vomiting Eating disorders such as bulimia or anorexia which may cause nutritional deficiencies Poisoning via isopropanol consumption Alcoholism associated eating disorders and subsequent poor nutrition Excessive exposure to cold environments Insulin overdose Pregnancy , ketones in urine , and oily urine : Pregnancy is often linked with excess vomiting and nausea , thereby triggering normal levels of ketones in urine . Ketones in urine during pregnancy can also be indicative of gestational diabetes . As we all know , food consumed by the body is converted into blood glucose which is then used by insulin to produce energy . However , placental hormones occurring during pregnancy can cause insulin resistance . Thus , even though ample blood sugar is available in the body , pregnant women are unable to use it to produce energy due to resistance to insulin . This can Oily urine during pregnancy can occur due to : Missing meals or snacks A poor diet with low carbohydrate intake Poor eating habits Underlying metabolic disorders Gestational diabetes Eating food after abnormally long intervals Limited access to blood glucose due to hormones - linked insulin resistance Nausea or vomiting Deficient calorie intake from food Dehydration , low water intake Diabetes , ketones in urine , and oily urine : When ketones in urine are found in diabetic patients , then it is usually an indication of deficient levels of insulin . Hence , patients need to seek medical attention if they observe oily urine , high blood glucose levels , generalized illness or malaise , elevated stress levels , or occurrence of diabetic ketoacidosis symptoms like abdominal pain , nausea , vomiting , etc . , 2 . Excess Vitamin Consumption Sponsored link Oily urine can also occur due to intake of excess amounts of vitamins , especially vitamin D , or due to lowered ability of the body to absorb the vitamins . In either case , patients need to change the diet so as to include more whole foods and fiber and lower the intake of vitamins . Foods with artificial colorants need to be avoided . 3 . Dehydration Dehydration , i.e. , lack of water in the body , is usually caused due to low water intake , strenuous exercising or other rigorous physical activities , and / or excessive perspiration due to hot weather or high fever . In such cases , patients may offer suffer from oily urine as well as yellow colored urine . Drink lots of water to rehydrate the body . If oily urine persists , then consult a doctor for diagnosis and treatment if necessary . 4 . Chyle Chyle consists of fats and proteins . The presence of this oil like substance in urine is normal , albeit in low amounts . Low levels of chyle usually get released with urine if one withholds urine in the bladder for prolonged periods . However , if oily urine is excessive and persistent and is marked by texture and color changes such as frothy or milky urine , then patients need to seek medical attention . causes oily urine
[ "Oily Urine", "Ketones", "Excess Vitamin Consumption" ]
http://doctors.uamshealth.com/Profile/?pid=3078
Quick Search Primary Care Primary Care Clinic Institute Department Specialty Faith Davies MD Make an Appointment MyChart Patient Rating 49 out of 5 168 Ratings 72 Comments Clinic Cancer Myeloma Center Overview Faith Davies MBBCh MRCP MD FRCPath is Professor of Medicine at the UAMS Myeloma Center and is an internationallyrecognized expert in the treatment and research of multiple myeloma Dr Davies research focus includes innovative targeted molecular therapies phase 1 clinical trials and relapsed refractory disease Dr Davies came to UAMS in 2014 from the Institute of Cancer Research and the Royal Marsden Hospital both in London She earned her medical degree from the College of Medicine University of Wales She completed general medical training in Cardiff and Birmingham and hematology specialty training in Leeds and London Dr Daviess focus is on the biology and treatment of myeloma with an emphasis on potential new drugs and new genetic technologies and their applications to myeloma Her laboratory work is aimed at identifying biologically based therapeutic targets in myeloma that are amenable to small molecule interventions and translating those laboratory findings into individualized treatment in the clinical setting Dr Davies is a member of the British Society of Haematology the American Society of Hematology the American Association for Cancer Research the Royal College of Physicians UK and the Royal College of Pathologists UK Publications Specialties Amyloidosis MGUS Molecular Diagnostics Multiple Myeloma Myeloma Transplantation Phase I Clinical Trials Smoldering Myeloma Stem Cell Transplantation Patient Ratings Reviews 48 Explained Things Clearly 49 Listened Carefully 48 Knew Important Medical History 49 Showed Respect 48 Spent Enough Time With Patient 49 Overall Rating 49 out of 5 168 Ratings 72 Comments Jul 17 2018 I called with concern about a bone marrow that resulted after our dr appt have yet to hear back about a follow appt with the dr Jun 29 2018 I think Dr Faith Davies is doing all she can to help me to get better Jun 29 2018 Excellent provider refer pts from this area always Jun 29 2018 Had the best doctor in Dr Davies She always sits down next to me and explains my situation and condition gives her advice and treatment options Her knowledge on mm she ranks at the top of the best anywhere in the world Dr Davies treated me and I am now in remission from CONDITIONS Staff and nurses were always knowledgeable and courteous Got great care in and out of the hospital Jun 18 2018 Above and beyond Jun 7 2018 STAFF that came in to make my next appts was absolutely horrible Was not very in tune with what was going on Not a good person to have working with the public May 30 2018 Dr Faith Davies is exactly what every ill person wi shes for in a physician skilled and compassionate May 4 2018 I was diagnosed with Multiple Myeloma When anyone asks about my condition I tell them how wonderful the Institute is I also tell them if they ever hear of anyone with MM to please call me I wish everyone with MM could come to Little Rock May 2 2018 I live out of state and visit UAMS once a year for tests and monitoring of my condition and maintain contact through lab work and nurse contact Everything about UAMS is of topmost quality I could not be more satisfied Apr 25 2018 Dr Davies is outstanding Ratings and Comments Powered by NRC Health Credentials Location Additional Info
[ "Faith Davies", "UAMS Myeloma Center", "Institute of Cancer Research" ]
http://doctorsgates.blogspot.com/2010/10/skin-tension-lines-and-how-to-get-it.html
Skin Tension Lines and how to get it Skin Tension Lines ( STLs ) are series of lines based on the direction of tension as this relaxed skin tension lines run perpendicular to the underlying muscles contraction . For best results and aesthetic outcome , place skin incisions along skin tension lines . Skin tension lines run parallel to the dermal collagen bundles but at right - angles to the direction of contraction of the muscles underneath it offers : Best cosmetic result Most narrow and strongest scar line You can find Skin Tension Lines ( STLs ) by asking the patient to contract his or her facial muscles , use oblique lighting , or pinch the skin . So , STLs have some individual variations based on the underlying muscles of facial expression . Muscles of facial expression . Generally , the lines are more discernible in older patients and more obscure in younger patients . Skin tension lines . Illustrated by Charles Norman . Note : It is prefered to mark skin tension lines prior to surgery as local anesthetic injection and tissue excision may alter them . Newer Post Older Post Home Popular Posts The 5 W ' s of post - operative fever W ind - - - pneumonia , atelectasis at 1st 24 - 48 hours W ater - - - urinary tract infection at Anytime after post op day 3 W ound - - - wound . . . Raccoon eyes , a sign for basal skull fracture Raccoon Eyes . Ecchymosis in the periorbital area , resulting from bleeding from a fracture site in the anterior portion of the skull base . Th . . . Head and Neck Lymph nodes Exam Lymph Nodes : The major lymph node groups are located along the anterior and posterior aspects of the neck and on the underside of the jaw . . . . Fournier ' s Gangrene Reconstructed By Pedicle Thigh Flap ( step by step photo images ) Fournier ' s gangrene is a rare condition and delayed treatment results in fatal outcome . We managed a case of Fournier ' s gangrene by . . . Osler ' s nodes & Janeway lesions Osler ' s nodes : Janeway lesions : Surface anatomy of both kidneys on the back Viewed posteriorly the right kidney has its upper edge opposite the 11th dorsal spine and the lower edge of the 11th rib . Its lower edge is . . . Anatomy of sphenoid bone ( Pic & vid ) The sphenoid bone carries its share of creating part of the base of the cranium . While it can be seen laterally and inferiorly , the shape of . . . How to differentiate between transmitted and expansile pulsations If you are palpating a swelling like an abdominal swelling infront of the aorta , You have to decide whether the mass you feel is pulsatile / e . . . Action of lateral vs . medial Pterygoid muscle " mnemonic " Look at how your jaw ends up when saying first syllable of ' Lateral ' or ' Medial ' : - " La " : your jaw is now open . . . Doctors Gate on Facebook Labels AETHETIC SURGERY ( 12 ) ALGORITHMS ( 29 ) ANATOMY ( 76 ) ANDROLOGY ( 11 ) ANESTHESIA ( 22 ) BIOCHEMISTRY ( 13 ) CARDIOLOGY ( 59 ) CARDIOTHORACIC SURGERY ( 12 ) CASES ( 122 ) CHEST ( 51 ) CLINICAL EXAMINATION ( 16 ) CLINICAL EXAMINATION : GENERAL ( 14 ) CLINICAL SURGERY ( 20 ) DENTISTRY ( 13 ) DERMATOLOGY ( 69 ) DIAGRAMS ( 51 ) DIET and SUPPLEMENTS ( 2 ) EMBRYOLOGY ( 6 ) Emergency Medicine ( 48 ) ENDOCRINE ( 48 ) ENT ( 56 ) FAMILY MEDICINE ( 8 ) FORENSIC MEDICINE ( 1 ) fr ( 1 ) FRIST AID ( 17 ) FUNNY MEDICINE ( 23 ) GENERAL SURGERY ( 72 ) GENETICS ( 4 ) GENETOURINARY GIT ( 22 ) GIT SURGERY ( 56 ) GYNACOLOGY AND OBESTATRIC ( 40 ) HEAMATOLOGY ( 18 ) HISTOLOGY ( 15 ) ICU ( 2 ) IMMUNOLOGY ( 15 ) INFECTION interventional radiology ( 6 ) LIVER ( 3 ) MEDICAL EQUIPMENTS ( 18 ) MEDICAL FIELD MEDICAL PHOTOS / PICTURES / IMAGES ( 206 ) MEDICAL SOFTWARE ( 3 ) MEDICAL TERMS ( 9 ) MEDICOLEGAL ASPECTS METABOLISM MICROBIOLOGY MNEMONICS ( 52 ) MONEY IN MEDICINE NEPHROLOGY ( 16 ) NEUROLOGY ( 52 ) NEUROSURGERY ( 14 ) NEWS ( 11 ) Nursing NUTRITION ( 8 ) OCCUPATINAL MEDICINE ONCOLOGY ( 62 ) OPHTHALMOLOGY ( 49 ) ORTHOPEDICS ( 61 ) PARASITOLOGY ( 4 ) PATHOLOGY ( 28 ) PEDIATRIC SURGERY ( 5 ) PEDIATRiCS ( 38 ) PHARMaCOLOGY ( 25 ) PHYSIOLOGY ( 24 ) PLASTIC SURGERY PROCEDURES ( 58 ) PSYCHIATRY PUBLIC HEALTH RADIOLOGY ( 138 ) RHUAMATOLOGY SKILLS SPOT DIAGNOSIS SYNDROMES TOXOCOLOGY UROLOGY ( 32 ) USMLE VASCULAR SURGERY Follow this blog Blog Archive β–Ί 2011 ( 219 ) β–Ό 2010 ( 913 ) β–Ί December ( 175 ) November ( 114 ) β–Ό October ( 126 ) CPAS SLUG BAM : Muscarinic effects of Acetylcholine Surface anatomy of the Stomach A case of Scabies Diagram for Liver relations Amniotic band sequence The Wonders of Fetal Circulation - Amazing video CN 3 Palsy ( Oculomotor nerve Palsy ) Causalgia Mallampati test Alvarado Score In Appendicitis Separation Anxiety Disorder : Diagnosis &Treatment Grading for pressure ulcers Acromegaly Caplan Syndrome ( Coal worker ' s ) Mnemonic for Causes of Pancreatitis USMLE ALGORITHMS : Upper GI Bleeding Paget ' s disease of the Mandible propofol infusion syndrome : a simple name for a co . . . USMLE ALGORITHMS : DIABETES MELLITUS Type 1 and 2 Internal Birth Control ( IUDs ) Bicipital Groove Drugs administered in Status Epilepticus Elbow ossification centers mnemonic in a child Ear Wash System by Welch Allyn Syringomyelia SYMPTOMS OF MALARIA Face Scar Revision Surgery Skin Tension Lines and how to get it Intraocular Lens Implant Huntington Disease Local anaesthesia technique for Middle ear and Mas . . . Episiotomy during Childbirth Delivery Principles of Soft Tissue Coverage for Tumor Recon . . . May - Thurner syndrome Endoscopic Management of Acute Bleeding from a Pep . . . Depression : characters of major episode ( mnemonic ) Pathology of Chronic lymphocytic leukemia About Cognitive therapy Total Wrist Arthroplasty Surgery Laparoscopy Surgery Full Video For Gall Stones Ultrasound use in trauma - the fast exam Photo of Acute tonsillitis in Infectious Mononucle . . . A White Hand Vs Red Hand Suturing technique Gastric Volvulus and X - Ray Preparation for Studying the USMLE Cricopharyngeal spasm About MS - Symptoms Financial Help With Diabetes Medicine Laparoscopic Robotic assisted resection of duodena . . . Treatment of Hyperkalemia The Femoral Sheath Post - operative fever , Guess what ! ! Dennovliers Fascia : Robotic Prostate Surgery Your Radiologist Explains : Abdomen & Pelvis CT Assessment gets by Lung function tests Mushrooms Benefits on Health Major non - antibiotics Teratogenic drugs Murmurs of aortic regurgitation Epidural hematoma in CT Cardiovascular effects of Squatting position Hernia Examination for Medical Students How to diagnose SLE by " MD SOAP ' N HAIR " Rabies : Post - exposure Algorithm DKA ( Diabetic Ketoacidosis ) - USMLE Study Songs Melanonychia : hyperpigmented longitudinal streaks Tubular Diskectomy How is difficult to diagnose Chronic fatigue syndr . . . Lisch Nodules Tracheal Stenosis causes of Carpal tunnel syndrome Septal Hematoma Post Labioplasty Massage Anatomical Tutorial During Trans - Nasal Endoscopy Oxygen Saturation Implant to Control Blood Pressure Tested Swan - neck deformity How to identify Hematoma in Mammography ? ? Presenting as sciatica , Lesion was Sacral herpes zo . . . Blood Calcium Regulation Description of Ultrasound machine Extra GI causes of Voiting Cranial Nerve Mnemonic ( Gus Halwani ) Heart sounds in normal Keratosis pilaris Counting Ribs in CT Scan by Clavicle Characteristic pityriasis alba Rectum Exam by Proctoscope Cauliflower ear Blue Hives Algorithm for the therapeutic management of patien . . . Algorithm for the diagnostic management of patient . . . chest x - ray , pulmonary edema Causes of Vertebral scalloping Pneumonia , on chest x - ray . Burns of lid margin and superficial cornea MNEMONIC for Features of Potter syndrome Nodular hyperplasia of Prostate : Histopathology Endoscopic Removal of a Hanging Polyp September ( 164 ) August ( 53 ) July ( 83 ) June ( 69 ) May ( 49 ) April ( 33 ) March February ( 26 ) January Skin Tension Lines and how to get it Skin Tension Lines ( STLs ) are series of lines based on the direction of tension as this relaxed skin tension lines run perpendicular to the underlying muscles contraction . For best results and aesthetic outcome , place skin incisions along skin tension lines . Skin tension lines run parallel to the dermal collagen bundles but at right - angles to the direction of contraction of the muscles underneath it offers : Best cosmetic result Most narrow and strongest scar line You can find Skin Tension Lines ( STLs ) by asking the patient to contract his or her facial muscles , use oblique lighting , or pinch the skin . So , STLs have some individual variations based on the underlying muscles of facial expression . Muscles of facial expression . Generally , the lines are more discernible in older patients and more obscure in younger patients . Skin tension lines . Illustrated by Charles Norman . Note : It is prefered to mark skin tension lines prior to surgery as local anesthetic injection and tissue excision may alter them . It is prefered to mark skin tension lines prior to surgery as local anesthetic injection and tissue excision may alter them . Newer Post Older Post Home Doctors Gate on Facebook
[ "Skin Tension Lines", "aesthetic outcome" ]
http://doctorslounge.com/cardiology/forums/backup/topic-29331.html
Medical Specialty > > Cardiology Doctors Lounge - Cardiology Answers Back to Cardiology Answers List If you think you may have a medical emergency , call your doctor or 911 immediately . Doctors Lounge ( www . doctorslounge . com ) does not recommend or endorse any specific tests , physicians , products , procedures , opinions , or other information that may be mentioned on the Site . DISCLAIMER : The information provided on www . doctorslounge . com is designed to support , not replace , the relationship that exists between a patient / site visitor and his / her physician . Please read our ' Terms and Conditions of Use ' carefully before using this site . Date of last update : 10 / 20 / 2017 . Forum Name : Ischemic Heart Disease Question : Sharp pains in chest reminiscent of electric shock Dani22 - Sat Jan 17 , 2009 7 : 46 pm Share | I ' m a 36 year old woman who is experiencing what feel like electric shocks or stabbing type pains on the left side of my chest . Most pains are located just below the breast , or run right across the left breast from the center of the chest . These are the most common ones and can occur , randomly , between 20 - 30 times a day . Only once did I have a similar pain start below the breast , to the left of the breast , mid rib cage . It shot up to my armpit and down the inside of my left arm to my elbow and was much sharper than the most recent pains . It lasted about 30 seconds and then dissapated . Most of the " shock " pains last about 5 seconds and disappear . I ca n ' t physically do anything to reproduce the pains . . . they just come and go when I least expect it . Today , a very sharp pain woke me out of a sound sleep . Other symptoms I have been experiencing lately is lethargy , and anxiety due to what ' s been happening . I work out regulary ( bodybuilding and cardio since age 29 ) and have had to stop because my heart rate becomes very hard and fast just running up a flight of stairs after doing something as simple as laundry . I do n ' t take any bodybuilding supplements or take anything out of the ordinary that would cause any of this . I ' ve also been feeling a little lightheaded as of late , but that seems to come and go . I typically have the blood pressure and EKG which came back normal , and am waiting on the results of an ECG , which the guy that did the exam said looked and sounded pretty normal , but ultimately , I would have to wait for the cardiologists to make the final call after they viewed it . To me , these do n ' t feel like anxiety attacks . I ' ve had those before and am very familiar with the feeling in the chest of tightness , sweats , dizziness , feeling of difficulty breathing , etc . . . but never have I felt these sharp stab / shock pains . Could this be a blood flow issue to the heart ? Am I on the brink of a potential heart attack ? I do n ' t sleep well due to the fear of not waking up should one of these not be just a little , but something more severe . Any advice , or direction that I should be looking in , would be most appreciated . It ' s frustrating becuase the NP who has been helping me with this matter seems to almost be getting " annoyed " because anything she does for tests , all come back normal . I think she thinks I ' m a hypochondriac . I ' m not . I spent the better part of three years avoiding doctors because I did n ' t have insurance . Now that I do , I ' m John Kenyon , CNA - Sun Jan 18 , 2009 11 : 47 pm Share | Hello - The good news is that cardiovascular - based pains never feel like that . They may follow the same general pathway , but heart is rarely even described as " " , and is never sudden , sharp and fleeting . This sounds like a nerve problem , a neuralgia or possibly herpetic ( caused by a nerve inflamed by a virus , usually herpes simplex ) . It ' s certainly not " all in your head . " In fact it seems to be in your left chest mostly . Healthcare providers sometimes become frustrated when they ca n ' t hang a diagnosis on something , and neuralgia in this pathway is fairly unusual , but so long as it retains its present character it ' s unlikely to involve the heart in any way . Also , cardiac ( or pressure , squeezing , whatever passes for " " in a given individual ) rarely occurs in the left chest either , but usually begins beneath the sternum in the center of the chest , then begins to radiate out to one or both shoulders , the neck , throat and jaw , and down one or both ( either / or ) arm / s . A nerve in the heart pathway , perhaps the phrenic nerve , sounds as though it is irritated or inflamed . Again , this is often due to a passing virus , sometimes for reasons that never become fully clear before the thing resolves . If it becomes disruptive there are medications to help block this sort of , but the " " type does n ' t usually last too long . The lethargy and lightheadedness could also be attributable to a viral infection . These , of course , are difficult to ID unless they produce enough specific symptoms ( like a rash along the course of the nerve involved , which seems unlikely in this instance but still could happen ) . Once you ' ve ruled out cardiac involvement ( and you should , no question ) if this continues , you may need a referral to a neurologist to get to the bottom of the cause or at least find a way to medically manage it . Neuralgia - like can be so disruptive as to be disabling if it becomes chronic . I hope this is helpful . Best of luck to you . Please follow up with us as needed and update us after you get the cardiologist ' s reading of the EKG | Check a doctor ' s response to similar questions Are you a Doctor , Pharmacist , PA or a Nurse ? Join the Doctors Lounge online medical community Editorial activities : Publish , peer review , edit online articles . Ask a Doctor Teams : Respond to patient questions and discuss challenging presentations with other members . Doctors Lounge Membership Application
[ "medical emergency", "ISCHEMIC HEART DISEASE", "electric shocks" ]
http://doctorslounge.com/gastroenterology/forums/backup/topic-25962.html
Medical Specialty > > Gastroenterology Doctors Lounge - Gastroenterology Answers Back to Gastroenterology Answers List If you think you may have a medical emergency , call your doctor or 911 immediately . Doctors Lounge ( www . doctorslounge . com ) does not recommend or endorse any specific tests , physicians , products , procedures , opinions , or other information that may be mentioned on the Site . DISCLAIMER : The information provided on www . doctorslounge . com is designed to support , not replace , the relationship that exists between a patient / site visitor and his / her physician . Please read our ' Terms and Conditions of Use ' carefully before using this site . Date of last update : 10 / 15 / 2017 . Forum Name : Gastroenterology Topics Question : pain radiating between shoulder blades and under ribs , rhs samanthamoore - Fri Oct 31 , 2008 7 : 02 am Share | for the past 6 - 8 weeks i have been experiencing upper gastric tenderness and pain middle of chest radiating through back between shoulder blades and under right hand side of ribs . this starts approx . 2 - 3 hours after eating in the evening and is frequently accompanied by severe nausea , wind , acid , and regurgitation of food / liquid if i bend over . fullness after eating a couple of mouthfulls of food . Occasional dizziness and headache . I had a similar attach 1 year ago and felt well until this started . It does not occur daily and each " attack " lasts several hours . No conventional medicines help although i am taking metocloperamide for sickness . The only relief of the pain is to " hunch " over something . I have had blood test for helicobactor which was negetive , and recent ultrasound of gallbladder / pancreas / kidneys / spleen etc etc was normal . I need some relief from this but do not know what to do next . Azmiranda - Fri Nov 07 , 2008 7 : 58 pm Share | I just wanted to tell you that I am having exactly the same symptoms as you . I now I need to go to the DR and get this checked out but I was curious to know if you got better or if you got a diagnosis to your problems . VAMHA - Sun Nov 09 , 2008 11 : 11 pm I have been having the same problems for over a year . The in my back is not so back , and the in my stomach tends to be midline , to slightly left hand side , though on the right can be present . I typically regurgitate for about 2 hours after eating . I went to my Primary Care doc who ordered a barium swallowing study , a Gallbladder US , and an Upper GI endoscopy . The swallowing study found some slowness in my upper abdominal tract , the US was normal , and the Upper GI endoscopy found some gastritis , and seems to have been H . Pylori negative . I have tried 3 different Proton Pump Inhibitors ( Omeprazole , Prevacid and Protonix ) , none of which have worked . Metoclopramide ( Reglan ) seems to make the problem less severe ( likely due to increased gastric motility ) , and eating smaller meals has helped . I ' m somewhat heavy and I can eat less than my significantly smaller wife and still get full . Even exercise on an empty stomach really hurts due to the movement . samanthamoore and azmiranda : Let me assure you that you are not alone . I dealt with this for a very long time before going to see my doctor . A HIDA - scan might be appropriate . One doctor friend of mine suggested that a decreased ejection fraction on the gallbladder can cause right hand side and the other symptoms without causing gallstones . Hang in there ! samanthamoore - Tue Nov 11 , 2008 5 : 09 pm No I havent , strangely the problems have continued now almost daily and the is now excrutiating particularly if i bend down for any reason . It now radiates up my neck down my arm and across my chest it is awful . I am currently living on a diet of anti - sickness tablets , killers , zantac , windeze or pepcid 2 just to try and help . I have a now permanent in my back around my ribs and between the shoulder blades . I have a gastroscopy on december 3rd but do n ' t hold out much hope to be honest . I smoke and am asthmatic so have considered infection or lung issues but have no cough . i have had no injury or knock so ruled that out which I guess just leaves ulcers or stomach issues , but I can not carry on like this , I have had so much time off work and do n ' t have a very good doctor so do not feel comforatble asking for help . You need to go see a doctor and get checked out , please do n ' t leave it until its so bad , a 5 minute talk to your doc . could sort you out . Let me know how you Azmiranda wrote : I just wanted to tell you that I am having exactly the same symptoms as you . I now I need to go to the DR and get this checked out but I was curious to know if you got better or if you got a diagnosis to your problems . - Thu Nov 13 , 2008 4 : 40 pm Vamha thank you so much . I looked into what you said and it made a lot of sense ( to me if not my doctor ) my doctor is of the opinion " no gallstones , no problem " I have made big changes to diet / lifestyle , even down to posture and non - restrictive clothing and trying to deal with this myself as I have an unsympathetic doctor . The problem has slightly subsided over the last few days to bearable having had bad daily bouts of this for the previous 10 - 12 weeks solid in 3 weeks but expect nothing to show . I will persist then in requesting a HIDA Scan as you suggest , if nothing else it may rule out gall bladder problems . my only concern is that when the tests are done if I feel ok will it still show anything ? either way once again a big big thank you , VAMHA wrote : I have been having the same problems for over a year . The in my back is not so back , and the in my stomach tends to be midline , to slightly left hand side , though on the right can be present . I typically regurgitate for about 2 hours after eating . I went to my Primary Care doc who ordered a barium swallowing study , a Gallbladder US , and an Upper GI . The swallowing study found some slowness in my upper abdominal tract , the US was normal , and the Upper GI found some gastritis , and seems to have been H . Pylori negative . I have tried 3 different Proton Pump Inhibitors ( Omeprazole , Prevacid and Protonix ) , none of which have worked . Metoclopramide ( Reglan ) seems to make the problem less severe ( likely due to increased gastric motility ) , and eating smaller meals has helped . I ' m somewhat heavy and I can eat less than my significantly smaller wife and still get full . Even exercise on an empty stomach really hurts due to the movement . samanthamoore and azmiranda : Let me assure you that you are not alone . I dealt with this for a very long time before going to see my doctor . A HIDA - scan might be appropriate . One doctor friend of mine suggested that a decreased ejection fraction on the gallbladder can cause right hand side and the other symptoms without causing gallstones . Hang in there ! VAMHA - Thu Nov 13 , 2008 9 : 03 pm Good on you for making lifestyle changes ! Those were really hard for me . Try to be patient with you doctor . Remember that he / she knows your case better that anyone ( including non - doctors like me ) . If you have serious issues , you can ask for a second opinion . Be aware that some doctors are suspicious of internet medicine , and may feel threatened , but if you are really that upset , it ' s within your rights as a patient . Remember . . .there are TONS of upper GI tests . An EGD ( which you are getting ) , helps rule out the need for some of them . Some tests ( like the HIDA Scan ) involve radiation . As such , if it ' s not indicated , you would be exposing yourself to radiation without any benefit . My EGD told me a lot and helped rule out some other problems , which was great . I ' m no doctor , so I ca n ' t tell you what will happen if you had a test when you feel well . Stay strong . ck85 - Sun Jan 04 , 2009 12 : 21 pm I had this over 4 years ago now . Pain under ribs so bad I would be in tears 30mins - 1 hr after eating meal . Pain also in back and between shoulder blades . I could feel my gallbladder distended ( swallon ) if bent over . would be worse if ate a fatty meal and often threw up . Was in casualty at least once a week on morphine after eating a fatty meal like shepherds pie . Ended up eating tomato soup and toast till had gall bladder removed . Lab tests show and infected gall bladder , no stones . I was 18 at the time . Hope advice helps . Try to see what foods trigger an attack sicklady - Sat Jan 17 , 2009 11 : 50 pm I was diagnosed with gall stones 3 months ago . At the time , I was also having female issues and was told to handle that problem 1st . I did and for a month or so my gall stone issue seemed to disappear . Now they are back . My upper back feels like an elephant is sitting on it ( an hour after I eat ) and it does n ' t go away . Under my heart feels like it ' s extending and sometimes I look like I ' m 9 months pregnant . At this present time , I ' m not sure if I want to vomit or use the bathroom . My stomach feels like H - LL . I ' ve read all the other response and I do n ' t know what to do . basketball45 - Mon Jan 19 , 2009 6 : 02 pm I have had the same symptoms . at first they thought i had acid reflux but then it got worse so they did a sonogram to check for gall stones . there were none . so i got a HIDA test of my gallbladder and had no function of my gall bladder at all . eating bland low fat foods helps with the . I am scheduled for a consult to have my gall bladder removed next week . | Check a doctor ' s response to similar questions Are you a Doctor , Pharmacist , PA or a Nurse ? Join the Doctors Lounge online medical community Editorial activities : Publish , peer review , edit online articles . Ask a Doctor Teams : Respond to patient questions and discuss challenging presentations with other members . Doctors Lounge Membership Application
[ "Doctors Lounge", "Gastroenterology" ]
http://doctorslounge.com/gastroenterology/forums/backup/topic-40947.html
Medical Specialty > > Gastroenterology Doctors Lounge - Gastroenterology Answers Back to Gastroenterology Answers List If you think you may have a medical emergency , call your doctor or 911 immediately . Doctors Lounge ( www . doctorslounge . com ) does not recommend or endorse any specific tests , physicians , products , procedures , opinions , or other information that may be mentioned on the Site . DISCLAIMER : The information provided on www . doctorslounge . com is designed to support , not replace , the relationship that exists between a patient / site visitor and his / her physician . Please read our ' Terms and Conditions of Use ' carefully before using this site . Date of last update : 10 / 15 / 2017 . Forum Name : Gastroenterology Topics Question : Feels like something is in my throat all the time bubdud05 - Thu Nov 19 , 2009 5 : 26 pm Share | I am 36 male , i have had a problem with swallow things , it feels like ther is something stuck in my throat a ways down on the right side . I have always had a hard time swallowing meat , this is different , it is for everything even when i just swallow saliva i feel it . When i drink things that are cold it makes it worse , i do n ' t know why . I am wondering if i have acid reflux that has made a sore on the right side since i sleep Dr . M . Aroon kamath - Sun Jun 27 , 2010 10 : 16 am Share | Hi , What you are describing is akin to a Globus sensation ( Globus phryngeus ) . This can be defined as a persistent or intermittent sensation of foreign body or a lump in the throat for at least 12 weeks . Other symptoms which may co - exist are . . - discomfort in the ear , - a Gagging sensation , - difficulty in swallowing ( Repeated swallowing does not usually resolve the sensation ) , & - muffling of the voice . The causes can be basically classified as . . - organic , - psychologic , psychiatric or stress related . The contributions of organic and the non - organic causes to the symptomatology in an individual case is difficult to quantify . Some of the the more common organic causes are . . - gastroesophageal reflux disease ( GERD ) , - upper esophageal sphincter ( UES ) abnormalities , - drug induced esophagitis , - enlarged lingual tonsils , - extremely enlarged tonsils , - epiglottic masses , and - enlargement of the uvula ( infection , allergic reactions , reflux induced , or even due to severe snoring ) . As you have not mentioned the duration of your complaints , one may at best , say that there is only a ' suspicion ' of this being a globus sensation . You must consult your family physician who will be able to assess you and guide you . It is probable that an upper GI endoscopy would be needed first . Other tests such as a 24 - hr pH study may also be considered . If the GI workup does not turn up anything significant , an evaluation by an ENT specialist may be indicated . Best wishes ! quattro - Thu Jul 29 , 2010 11 : 09 am hi , i have exactly the same feelings , difficulty swallowing , and in the morning is worst , nasea etc , am also 36 , male , phisically active . this all happend ( i think ) from being hit from behing in go gart racing , my head tilted backwards really bad , similar to whiplash injury , but there was no pain . sometimes i too think that s all in my head , also sometimes i get depressed not knowing what i have , its been 6 weeks now . next monday i m going to an ear nose and throat speciallist , maybe he finds out whats wrong . | Check a doctor ' s response to similar questions Are you a Doctor , Pharmacist , PA or a Nurse ? Join the Doctors Lounge online medical community Editorial activities : Publish , peer review , edit online articles . Ask a Doctor Teams : Respond to patient questions and discuss challenging presentations with other members . Doctors Lounge Membership Application
[ "Gastroenterology", "acid reflux", "medical emergency" ]
http://doctorslounge.com/nephrology/forums/backup/topic-25491.html
Medical Specialty > > Nephrology Doctors Lounge - Nephrology Answers Back to Nephrology Answers List If you think you may have a medical emergency , call your doctor or 911 immediately . Doctors Lounge ( www . doctorslounge . com ) does not recommend or endorse any specific tests , physicians , products , procedures , opinions , or other information that may be mentioned on the Site . DISCLAIMER : The information provided on www . doctorslounge . com is designed to support , not replace , the relationship that exists between a patient / site visitor and his / her physician . Please read our ' Terms and Conditions of Use ' carefully before using this site . Date of last update : 10 / 09 / 2017 . Forum Name : Nephrology Symptoms Question : creatinine levels in drug testing senyax - Tue Sep 23 , 2008 1 : 15 pm Share | I am an attorney with a client who is required to drug test randomly . She has tested over 40 times , roughly once every four or five days , and has had no " positives " for any amphetamines , alcohol , THC , cocaine , opiates , barbiturates , or benzodiazepines . She has been on methadone , and , at various times , taking various anti - depressants and medications for her mental illness . ( She is said to be bi - polar . ) Her drug tests show creatinine levels which fluctuate wildly - - - from 40.6 mg / dL to 210.6 mg / dL , and on one occasion she had a creatinine level of 19.7 mg / dL , which the lab characterized as a " dilute specimen . " All the stuff I ' ve read on line about tests measure " normal " levels as , for example , 1.2 or 2.5mg / dL . So why are her levels measured differently ? Is there any reason for a drug test to test other than to try to identify urine specimens that have been diluted ? Would n ' t one specimen testing at 19.7 mg / dL , in the midst of all these wildly fluctuating levels , be unlikely to be an attempt by her to dilute her specimen ? What would cause such a wild fluctuation in John Kenyon , CNA - Tue Oct 14 , 2008 10 : 19 pm Share | Hello - Most common causes of elevation are kidney disease , diets high in meats and certain medications , especially some antibiotics . However , the readings you relay are so grotesquely out of range ( 10 - 50 times the high end of abnormal ) that they should have been either cited as a " critical lab finding " or thrown out and repeated because , if the patient is not deathly iil , then these results are apparently lab errors . The " dilute specimen " finding makes no sense in the contex of the other , wildly out of range readings , and even this level would be difficult to achieve via dilution to skew the test results . The only explanation I can think of is that this lab is using some obscure or outdated scale , or is incompetent . Anyone with findings such as those of your client would normally be place on dialysis if it were n ' t too late already . Wish I could be more helpful , but this really does n ' t make much sense . I can only suggest the possible assignment of a different lab . Hope this is helpful . ToxPro - Tue May 26 , 2009 8 : 12 pm I wish I saw this post 8 monhts ago ! : ) The original post indicated that normal urine levels are 1.2 - 2.5 mg / dL - this is simply not accurate - I suspect the referenced source was either mistaken or the units employed are incorrect , as they are off by a factor of 10 . Normal urine levels for random urine collections are typically observed between 40 - 250 mg / dL , with a mean around 100 mg / dL . Variability of random urine collections may be observed between 10 - 350 mg / dL , depending upon the individual and circumstances . Being an expert in the field of Forensic Urine Drug Testing for over 20 years , I can attest that this variability in urine is not uncommon . I suspect the ( previous reply ) CNA ' s confusion may lie in trying to compare a random urine draw to a 24 - hour urine collection . One of the many reasons a 24 - hour urine is collected in a clincial setting is to normalize urine hydration and to get a more accurate representation of the concentration of the compound being voided . It is true that can vary due to kidney disease , diets high in meats , certain medications , as well as age , gender , and metabolism . However , rapid intake of copious amounts of fluids , particularly when the client has ingested a diuretic , can dramatically increase urine production in a state of polyuria that produces diluted samples ( very low levels - less than 20 mg / dL ) . Conversely , a simple case of dehydration can dramatically increase urine levels 2 - 3 fold . The most common technique employed to " beat " a drug test is " water - laoding " - consuming copious amounts of fluid in a short period of time within 30 minutes of a urine collection to achieve a state of polyuria . The state of polyuria typically lasts from 1 - 4 hours , and during that time the urine may be diluted by a factor of 5 - 10 or more . The desired effect is to lower the overall concentration of trace amounts of drug ( s ) in the urine to a level that is Many commercial products exist on the market that make claims that they can " detoxify " the body to facilitate passing a drug test . These products , sold in liquid , capsule , pill , or tea bag form , typically work by the principle of dilution . They contain herbal supplements that are natural diuretics , which are to be ingested with 80 - 128 oz of fluids ( or more ! ) within 60 minutes of providing a urine sample . SAMHSA has recognised this as a potential method of subverting federally mandated drug testing , and requires be measured on all urine samples submitted for drug testing . Samples with levels below 20 mg / dL are not acceptable and reported as diluted , invalid , or substitued depending on the levels when compared to the urine density ( specific gravity ) . It should also be noted that diluted samples may not be due to a conscious effort of subversion , and can not be proved to be intentional . To summarize , RANDOM urine sample variability is common . With all due respect to the previous reply by the Nursing Assistant , the suggestion that the variability in observed urine levels is due to lab error is a " red herring " . | Check a doctor ' s response to similar questions Are you a Doctor , Pharmacist , PA or a Nurse ? Join the Doctors Lounge online medical community Editorial activities : Publish , peer review , edit online articles . Ask a Doctor Teams : Respond to patient questions and discuss challenging presentations with other members . Doctors Lounge Membership Application
[ "Doctors Lounge", "Dialysis", "anti-depressants" ]
http://doctorslounge.com/rheumatology/forums/backup/topic-2904.html
Medical Specialty > > Rheumatology Doctors Lounge - Rheumatology Answers Back to Rheumatology Answers List If you think you may have a medical emergency , call your doctor or 911 immediately . Doctors Lounge ( www . doctorslounge . com ) does not recommend or endorse any specific tests , physicians , products , procedures , opinions , or other information that may be mentioned on the Site . DISCLAIMER : The information provided on www . doctorslounge . com is designed to support , not replace , the relationship that exists between a patient / site visitor and his / her physician . Please read our ' Terms and Conditions of Use ' carefully before using this site . Date of last update : 8 / 21 / 2017 . Forum Name : Rheumatology Topics Question : pain in finger kayl - Sun Dec 26 , 2004 8 : 19 pm Share | i recently developed a pain in my middle right hand finger , it only hurts if i touch it like when typing or reading or setting it down on the table . i do n ' t see a sliver and i do n ' t feel a bump . Dr . Yasser Mokhtar - Sun Dec 26 , 2004 9 : 27 pm Share | Dear Kayl , Did you hurt your finger ? Is your finger swollen ? Do the joints in your finger hurt as well ? Any other fingers hurting ? Thank you very much for using our website https : / / doctorslounge . com Yasser Mokhtar , M.D . kayl - Sun Dec 26 , 2004 9 : 58 pm no i do n ' t have pains in any other fingers or in my joints its in the skin i think and it only hurt if something touches my finger . could it be a pinched nerve ? i never hurt my finger . it just happened . im not sure if it was from typing or what it was from . Dr . Yasser Mokhtar - Sun Dec 26 , 2004 10 : 18 pm Dear Kayl , Thank you very much for the update . Even though you never mentioned it , i will assume that your finger is not swollen . A pinched nerve does not present this way . i am not sure what this is but let ' s wait and see which way it is going to go . Thank you very much for using our website https : / / doctorslounge . com and i hope that this information helped . Yasser Mokhtar , M.D . - Mon Dec 27 , 2004 1 : 39 pm the pain in my finger is still there . its so weird because it feel like a burn when u touch it more it hurts . but it hurts more when something light touches it like a quilt lightly rubbing against it . than me pushing on it with my finger . i thought it would go away over night but it has not . i do n ' t know what my doctor could do for me . i do n ' t see a splinter or cut . and i really do n ' t know what could have injured - Tue Dec 28 , 2004 11 : 59 am This could be the begining of an infection , i would suggest that you see a primary health provider to take a look at your finger to rule out this possibility . and i hope that this information helped . - Tue Dec 28 , 2004 2 : 08 pm i do n ' t see an abnormalities in my finger . or feel a bump . what kind infection could it be ? and how could i have gotten it ? ive gone to my doctor quite a bit and i feel kind of stupid going alot . Carolyn Merritt , LPN - Tue Dec 28 , 2004 8 : 38 pm Dear Kayl : I realize you do n ' t want to go to the doctor needlessly . However , anytime you have it is there to tell you something . It is possible you may have had a microscopic scratch or a hangnail that developed into an infection . The is telling you to get something done to fix the problem . I agree with Dr . Mokhtar and you should go to the doctor . Regards , Carolyn - Tue Jan 04 , 2005 7 : 09 pm i havent been able to see my doctor because he is on vacation . i should mention its not my whole finger or anything its in one localized spotin the right corner tip of my middle finger . i do n ' t see anything like a sliver and im not sure if i could have gotten glass in it . do slivers act this way ? the is still there but it doesnt hurt as bad it takes more to hurt it before if anything even rubbed across it like a kleenex it hurt but now it only hurts when i touch stuff like washing my hair or if i touch it with my nail . . . . ive always been worried about slivers cuz my aunt always told me that u have to get them out because they can go into your blood stream and kill you is that true ? - Tue Jan 04 , 2005 10 : 37 pm Thank you very much for the update . i do n ' t think that slivers can go to the blood stream . They can cause a infection and this infection may go to the blood stream and if left untreated might lead to death if severe enough . Please , let your doctor sees you once he is back from vacation just to rule out the possibility of infection even though it does not sound like it . Sometimes , the feeling that you have as increased sensitivity in your finger could be confused with . This feeling could just be increased sensitivity and not pokeadot - Wed Oct 05 , 2005 12 : 48 am himy name is victoria and i also have pains in my finger thats next to my middlefinger on the right . it is starting to change into colours ( green , pink , purple ) and when i try to make it straight , it hurts . i got it when i was at gym in school . i ca n ' t write normally or type well ( using one hand ) . is this a really bad thing ? what should i do to it ? i put some ice over because my brother told me to and | Seanzyyy | - Mon Apr 06 , 2009 9 : 22 am this thread is kinda old but i have a problem i just started a job at a golf course and the sweeping and other things gave me blisters on my left thumb . i popped them with a needle ( i held the needle over a candle because i read that that sterilizes it ) . a few days later i developed a in my thumb , only where the blister is . it hurts when i try to grab something , when it grazes something , when i touch something with any force . what could this be ? could it be an infection ? i want this to go away fast because i have a golf tournament in 3 weeks and it hurts to grip my clubs because it hurts my thumb . any help is appreciated = ] Tom Plamondon PA - C - Tue Apr 07 , 2009 11 : 20 am Hello , Signs of infection are : redness warmth swelling pus You may ask your family physician to look at it to check for infection if you have any doubts . Otherwise keep it clean and dry . Protect the sore with a small dressing to avoid further trauma . And it should heal fine . Take care . fallonmunch - Thu Oct 29 , 2009 5 : 09 pm I have the same exact problem with my finger . It ' s very sensitive and hurts horribly when barely touched . I have had this problem for over 7 years . My doctor ca n ' t figure it out and sent me to a plastic sergeon who tried to tell me I had arthritis even though he could n ' t see it in the xrays . I do n ' t know what to do . Please help . akrsmommy - Fri Nov 06 , 2009 2 : 36 pm I do not know if I broke the tip of my middle finger or not , however I can tell you that it hurts incredibly bad and has turned purple . What I did was smacked my hand hard on my dressar this morning and it instantly started tingeling and throbbing , about an hour later the tip of my finger turned purple . My nail is fine as that my hand was palm down . It has been over 5 hours since this happened and my finger is very tender , and is now taped together with my ring and this is killing me . Tylenol and Aleve have done nothing for the . Please advise Pengyreepen4 - Tue Jun 22 , 2010 5 : 12 pm Dear Doctor / Nurse , I was playing outside with my dog and I was trying to hit the football out of his mouth but I missed and hit the ground awkwardly and could n ' t move my middle finger on my left had for a few seconds . Now , I have a constant in my finger when I apply pressure and also typing . What could I have done to my finger ? Thank you . Pengyreepen4 - Wed Jun 23 , 2010 4 : 09 pm Hello , The other day I was playing with my dog in the garden and he had a football in his mouth . I was trying to hit the football out of his mouth but he moved back and I missed and hit the ground awkwardly and I could n ' t move my finger for a few seconds as I could n ' t feel it . When I got the feeling back , it was very sore below the first joint after my knuckle , on my middle finger on my left hand and sore when I apply pressure . Thanks | Check a doctor ' s response to similar questions Are you a Doctor , Pharmacist , PA or a Nurse ? Join the Doctors Lounge online medical community Editorial activities : Publish , peer review , edit online articles . Ask a Doctor Teams : Respond to patient questions and discuss challenging presentations with other members . Doctors Lounge Membership Application
[ "Rheumatology", "Doctors Lounge" ]
http://doctorstevenpark.com/the-sleep-apnea-autism-connection
The Sleep ApneaAutism Connection G uest blog by Deborah Wardly MD I have written guest blogs Part 1 and Part 2 in the past about the link between obstructive sleep apnea OSA and intracranial hypertension IH We know that apneas can raise intracranial pressure and that intracranial hypertension can be caused by OSA I suspect that some of the symptoms of OSA can be explained by increases in intracranial pressure My most recent paper discusses the idea that it may be the anatomy of the recessed jaw that outside of respiratory factors which increase intracranial pressure predisposes these two conditions to go hand in hand More than likely it is the recessed jaw anatomy that also allows for temporomandibular joint dysfunction to also be present when OSA and intracranial hypertension exist in the same individual We have seen increasing rates of most of the chronic illnesses associated with OSA over the last 20 years to the extent that I have wondered if the human jaw is shrinking more rapidly or has reached a critical point in its shrinkage Along with adult human chronic disease we have seen increases in childhood illness not the least notable of which is autism spectrum disorder Interestingly it has been noted that there are differences in the faces of the autistic children when compared to nonautistic children and between low and high functioning autistic children Scientists investigating this phenomenon do not appear to be aware of how facial structure reflects underlying airway patency or what this might mean regarding an airway etiology of autism Autistic children are described to have very prominent sleep problems These problems are well known to pediatric sleep specialists to reflect underlying sleep disordered breathing SDB For example 53 of autistic children have difficulty falling asleep and 34 have frequent awakenings These There are a great many correlations between what is found in autistic children and what is seen in OSA and there are also many findings in autistic children that could be explained if autistic children have mild intracranial hypertension from birth For example leptin IL6 and TNFΞ± are elevated in OSA and in autism Accelerated head growth in the first year of life and favorable response to substances which decrease brain edema as are seen in autism might be explained by intracranial hypertension Intracranial pressure in autistic children has never been investigated I have collected the data available prior to recently published paper Autism sleep disordered breathing and intracranial hypertension the circumstantial evidence If each correlation between autism and OSA and between autism and intracranial hypertension is thought of as a puzzle piece in constructing the answer to the etiology of autism then I have constructed over 90 pieces of the autism puzzle with the hypothesis presented in my paper The ASDOSA hypothesis is fourfold and requires that 1 the mother has SDB during her pregnancy 2 the infant is born with SDB 3 both mother and infant have variations of the methylation pathway which are then triggered by the SDB and 4 the infant is prone to intracranial hypertension The idea is that the combination of SDB with the tendency for intracranial pressure to increase leads to a pattern of increased intracranial pressure early on in development which contributes to autism compounding the effect from repeated low oxygen levels in the mothers womb due to maternal SDB It is unlikely to present the same as the typical childhood case of intracranial hypertension because it will vary depending on waxing and waning SDB symptoms OSA can sometimes cause optic nerve essentially brain swelling in the presence of normal intracranial pressures while awake therefore this process can be very subtle This I propose that it is not so much these mutations which cause autism but it is the underlying methylation problems as triggered by OSASDB that leads to random mutations of genes producing the wide variations seen The ASDOSA hypothesis may also account for the association of pesticides with autism development in multiple ways Some pesticides have been shown to affect the growth and development of the maxilla and mandible and it has even been noted that the risk of autism from maternal organochlorine exposure during pregnancy is greatest during the 8 weeks immediately after neural tube closurethis is the embryological It has also been demonstrated that autistic brains are swollen If children with autism tend to have recessed jaws that predispose them to not only compression of the airway with OSA but also compression of their jugular veins preventing easy egress of cerebrospinal fluid CSF then this brain swelling becomes more clinically significant and may raise intracranial pressure Since the acceptance of my paper for publication several articles were published which support my hypothesis In 2013 Shen et al at the MIND Institute published a study which demonstrated increased extraaxial fluid in infants who later developed autism They concluded that this suggests an imbalance between CSF production and CSF drainage in these infants Increased extraaxial fluid has also been seen in children with intracranial hypertension In intracranial hypertension the increased pressure is present in this extraaxial space surrounding the brain pushing in on the brain as opposed to in hydrocephalus where the increased pressure is present in the There is another piece of data which is more anecdotal at present It has been reported that people with intracranial hypertension can have photophobia and phonophobia increased sensitivity to light and sound Dr Park has also noted in his first book that he sees these characteristics in his SDB patients It does not seem to be generally acknowledged however that most people with intracranial hypertension are significantly sensory defensive I know this from knowing a great many of them Almost 180 of them have compiled their symptoms on this spreadsheet If one believes this data then 79 of patients with intracranial hypertension have auditory hypersensitivity 33 of patients with intracranial hypertension have olfactory hypersensitivities and 50 of patients with intracranial hypertension have sensitivity to proximity These are very similar to the prevalence of these different types of sensory disorders among autistic children I believe that all of these correlations demand further investigation It has never been determined that children with autism have normal intracranial pressures and it has never been determined that the majority of autistic children do not have sleep disordered breathing Miano et al in 2010 stated that it is not possible to conclude how significant OSA might be in causing the insomnia in autism because most autistic children do not get sleep studies Add to this the difficulties encountered in diagnosing mild sleep disordered breathing at your average sleep lab and it is likely to take a century before It has been demonstrated that the degree of symptoms in SDB is inversely proportional to the AHI therefore I believe that we need to start taking mild SDB very seriously and figure out how to diagnose it outside of the most elite university sleep centers Given the amount of circumstantial evidence arguing for the ASDOSA hypothesis I think that autism researchers must rise to the challenge and rule it out formally before it is dismissed If you have a child with autism does your child show the subtle signs of sleep disordered breathing Can you hear his breathing when he sleeps Does he snore sometimes Does he wake frequently Does he sleep with his mouth open and head extended Is he a restless sleeper Does he fall asleep during the day Does he have a small lower jaw pixie face If you are an adult with autism do you get headaches Do you hear whooshing sounds in your ears Do you have visual complaints symptoms of intracranial hypertension If you are a mother of a child with autism do you have OSA or symptoms of sleep disordered breathing Did you have signs of worsening SDB during your pregnancy 1 print Posted on Wednesday April 8 2015 Category Blog Post navigation Announcing the New Book Cover for Sleep Frequently Asked Questions About Please note I reserve the right to delete comments that are offensive or offtopic
[ "OSA", "Deborah Wardly" ]
http://doctorsthatdo.org/difference/osteopathic-manipulative-treatment
DO Education and Training Osteopathic Manipulative Treatment Becoming a DO Osteopathic Manipulative Treatment T hrough Osteopathic Manipulative Treatment , or OMT , DOs use their hands to diagnose illness and injury and encourage your body ’ s natural tendency toward self - healing . Doctors of Osteopathic Medicine have a keen understanding of how the body ’ s systems are interconnected and how each one affects the others . As part of their education , DOs receive special training in the musculoskeletal system , your body ’ s interconnected system of nerves , muscles and bones . Using OMT , your DO can effectively treat your muscles and joints to relieve pain , promote healing and increase overall mobility . OMT is often used to treat muscle pain , but it can also help provide relief for patients with asthma , sinus disorders , carpal tunnel syndrome and migraines . In many cases , OMT can be used to complement , or even replace , drugs or surgery . By combining the latest advances in medical technology with OMT , Doctors of Osteopathic Medicine offer their patients the most comprehensive care available in medicine today .
[ "Osteopathic Manipulative Treatment", "musculoskeletal system ,", "muscles" ]
http://document302.rssing.com/chan-7561154/all_p20.html
SCN : Document List - ABAP Development 0 0 11 / 26 / 13 - - 01 : 10 : Create Inbound Delivery ( BBP_INB_DELIVERY_CREATE ) Bug BBP_INB_DELIVERY_CREATE function is used for creating inbound delivery . Normaly created delivery number and error messages are returned , but sometimes function exports empty delivery number , inspite of return table without errors . In this case system actually creates delivery , if you query tables after commit , you will find delivery number . Sytem Info that i faced the bug : SAP ECC 6.0 SAP_ABA 701 0009 SAPKA70109 SAP_BASIS 701 0009 SAPKB70109 DATA : _header LIKE bbp_inbd_l , _delivery LIKE likp - vbeln , _it_detail TYPE STANDARD TABLE OF bbp_inbd_d WITH HEADER LINE , _it_return TYPE STANDARD TABLE OF bapireturn WITH HEADER LINE . DATA : _vbeln TYPE ekes - vbeln . SELECT * FROM ekpo WHERE ebeln = ' PO Number ' . _it_detail - material = ekpo - matnr . _it_detail - matl_desc = ekpo - txz01 . _it_detail - deliv_qty = ekpo - menge . _it_detail - unit = ekpo - meins . _it_detail - po_number = ekpo - ebeln . _it_detail - po_item = ekpo - ebelp . APPEND _it_detail . CLEAR _it_detail . ENDSELECT . _header - deliv_date = sy - datum . _header - deliv_time = sy - uzeit . CALL FUNCTION ' BBP_INB_DELIVERY_CREATE ' EXPORTING is_inb_delivery_header = _header IMPORTING ef_delivery = _delivery TABLES it_inb_delivery_detail = _it_detail [] return = _it_return [] . LOOP AT _it_return WHERE type = ' A ' OR type = ' E ' OR type = ' X ' . EXIT . ENDLOOP . IF sy - subrc = 0 . CALL FUNCTION ' BAPI_TRANSACTION_ROLLBACK ' . ELSE . CALL FUNCTION ' BAPI_TRANSACTION_COMMIT ' EXPORTING wait = ' X ' . IF _delivery IS INITIAL . SELECT SINGLE vbeln INTO _vbeln FROM ekes WHERE ebeln = p_ebeln AND ebtyp = ' LA ' . " Inbound Delivery ENDIF : ENDIF . 11 / 26 / 13 - - 20 : 32 : Initial value check in SE11 table While designing new table , we often enable the initial value check to set the initial value for the field based on the datatype . A field can also be created in the database as NOT NULL if the initial flag is not set in the ABAP Dictionary . To see the default value of each field check Utilities - > Database object - > Display in the maintenance screen of the corresponding table . But in select query there are some impact NULL means that physically nothing is stored in the database . If a database field is defined as CHAR with , say , 80 characters , the NULL value will not waste that space . When NULL values are transfered from the database , they are converted to the ABAP initial value . But if existing database tables are extended appending new field ( s ) , those fields get stored as NULL values for the existing database records . A WHERE < field > = SPACE will not retrieve the recors with NULL values for the field . If such a null field is used in WHERE clause , no problem if specifying any values except initial . If selection of records with initial fields is required and you do not know if NULL values exist , select WHERE ( < field > = space or < field > is NULL ) . So we have to check this aspect of table while doing programming . 11 / 27 / 13 - - 06 : 29 : FQEvent 2638 INV : Enrich Invoicing Item for Invoicing List , current functionality Functionality Event 2638 is processed when an invoice with SUBINV item type is created . In this event , you have the option to change relevance ( TOTALREL field ) of SUBINV item . If SUBINV item value of TOTALREL field is set to true item amount will be included in total amount of invoice and business partner is payment responsible for item too . In this case source invoice should n ’ t be posting relevant , it will have informative purpose . If item value of TOTALREL field is set to false item amount will not be included in total amount , business partner is n ’ t payment responsible , item should not be posting relevant and it will have informative purpose . Notes The event is called at invoicing of the single invoicing document . Programming Restrictions To ensure the consistency of the system , note that you must not use the following language elements in events , unless they were explicitly declared to be allowed for the given event : COMMIT WORK ROLLBACK WORK CALL FUNCTION ' DEQUEUE ALL ' Deletion of locks that you have not set yourself Implicit database commits triggered by RFC calls or by a WAIT statement If you update additional data in an event and use the construction PERFORM commit routine ON COMMIT , note that : At the end of the commit routine , all internal tables from which data was updated must be initialized again to prevent a duplicate update in the next call . A PERFORM rollback routine ON ROLLBACK must also be called . In the rollback routine , initialize the same data that is initialized at the end of the commit routine If you want to carry out checks in an event , when you issue messages , note that warning messages cause background processing of the process to terminate . You should therefore avoid issuing warning messages if possible . At the most , issue warning messages if the value of SY - BATCH is initial . Also avoid messages of type A ( termination ) . In the course of background processing , such messages can be captured and processing can continue . However , at the same time the message triggers an implicit ROLLBACK WORK , which can cause data inconsistencies . 11 / 27 / 13 - - 19 : 53 : How to Print Barcodes that are not supported by SAP using Smartforms Introduction : In this document we will work on printing a Data Matrix barcode ( DMC ) which is a 2D barcode not supported by SAP . A 2D ( two - dimensional ) barcode is a graphical image that stores information both horizontally - - as one - dimensional bar code s do - - and vertically . As a result of that construction , 2D codes can store up to 7,089 characters and possibly more . Below are some of the types of 2D barcodes Requirement : Print Data Matrix barcode ( 2D barcode ) on zebra printers using Smartform . * Similar approach can be followed for printing other 2D barcodes and the generic barcodes with specific height and width . Issue : SAP by default only supports PDF417 as 2D barcode and does not support Data Matrix and other 2D barcodes Solution : Printing other 2D barcodes which are not supported by SAP is possible by following the below steps Printer should supports the required barcode : We can check this online based on the printer model and make . Most probably you will find this information on the manufacturer ’ s website . Choose an appropriate device type for the printer : Selection of device type is based on the printer you are using . IN this example we are using ZEBRA printer so the device type selction will be based on Zebra printer . This topic is dealt in more detail in the other document named β€˜ Working with Zebra Printers using Smartforms in SAP ’ please refer to the same for additional documentation on selecting the device type for Zebra printers . For Zebra printers we have the following device types LZEB * ( * = > 2 / 3 / 4 ) series or YZB # ( # = > 200 / 300 / 400 ) series based on the DPI resolution of the printer . For the demonstration as an example we will use LZEB2 device type from here on in this document . Create a system barcode of type UNDEF in SAP : For creating a system barcode go to transaction SE73 . This will take you to the SAP script Font Maintenance : Initial screen Select System barcodes check box and click the change button . This will display a list of all the Barcodes on the SAP system . Click the Create button ( Paper icon ) at the top of the screen The Choose Bar Code Technology select box will now be displayed . The barcode we are adding is a new barcode symbology which is not supported by SAP , and the new barcode techcnology allows only specif types of barcodes symbologies to be created therefore we are going to use Old technology to create our new barcode as an undefined symbology . So Click on Old . The Create / Change System Bar Code settings screen will be displayed . For barcode type enter β€˜ UNDEF ’ ( barcode not defined ) as the data matrix barcode type is not defined in SAP . Also specify the height and width of the barcode . Then save the changes by clicking on the Ok button . Now the system barcode ZDMC is created . Create a printer barcode for the newly created system barcode with appropriate print control : For creating a system barcode go to transaction SE73 . This will take you to the SAP script Font Maintenance : Initial screen Select printer barcodes check box and click the change button . This will display a list of device Types available in SAP system . In this case I am using device type LZEB2 so I will create a printer barcode for this device type . It is advisable to copy this device type to a new device type and then make changes to the new Z device type and use it for printing but for demonstration I am using the same device type . Double click on the device type to list the barcodes supported by this device type . Notice the Prefix and Suffix value ranges used for the barcodes . Here in this case the highest number used for prefix is SBP20 and is different for each barcode however the suffix is same for all the barcodes . These prefix and suffix are the print controls of the barcodes supported by the printer . Now select the create button on the top of the screen to add a new printer barcode . This will take you to the barcode selection screen . Select the system barcode you created earlier and enter the other values as shown in the screenshot above . For prefix we are entering SBP21 because all the numbers from 1 - 20 ( SBP01 to SBP20 ) are already used so we are using the next available number SBP21 and the suffix number stays the same . We can use any number from 21 - 99 for prefix . Now the barcode is created for the device type ( see screen shot below ) But the print control SBP21 is empty . For the barcode to work properly we have to add commands in the print control in ZPL - II language ( printer language ) . Please find the online document named ' ZPL2 command book ' . The site link for the same is http : / / www . zebra . com / id / zebra / na / en / documentlibrary / manuals / en / zpl_ii_programming2 . File . tmp / 45541L - 002_RA . pdf It is adviced to have the document before we proceed further . This command book has all the commands for printing different types of barcodes on a printer ( only if the printer supports it ) using the ZPL2 command Lanugage . Here we are adding the Data matrix barcode , and the printer command format for printing the data matrix is : BXo , h , s , c , r , f , g Command Parameters : O – Orientation H – Height S – Quality level C – Columns to encode R – Rows to encode F – Format ID G – Escape sequence control character Refer to the attached command book for accepted and default values for the above parameters and how to use the command . Below is an example of the post script language commands used for printing a DMC barcode on the printer . The printer command mainly needs to have 3 types of information Command to indicate the type of barcode to be printed ( Marked by BX in the command above ) Command to indicator the start of data ( Marked by FD ) Command to indicator the end of data ( Marked by FS ) When working with Smartforms the prefix print control in the printer barcodes screen should have both the commands for the type of barcode and the command for the start of data whereas the suffix will only have the command to mark the end of data Taking the above points into consideration we will have BXN , 2,200 , 20 , 20 , 6 , ~ , 1 FD command in prefix and FS in suffix . As the suffix is used to mark the end of data it is same for all the barcodes and hence maintained as default . Meanings of the command Parameters for prefix BXN , 2,200 , 20 , 20 , 6 , ~ , 1 FD are : BX The Data Matrix command N The orientation is normal 2 Dimensional height in dots of the individual symbol elements 200 Quality ECC level ( ECC 200 ) 20 Columns to encode 20 Rows to encode 6 Data to be used ( 6 means full 256 ISO 8 - bit data is used ) ~ Escape sequence for control characters 1 Square aspect ratio , if you required rectangle this will be 2 FD This is to mark the start of the field data to be encoded in the barcode Add the following command in the print control prefix : Go to SE73 - > Select printer barcodes - > Change - > Select device type ( in this case LZEB2 ) - > double click to display the list of barcodes supported by the device type . Select the new print control SBP21 ( barcode prefix ) and click on Maintain Print control button . Following popup will be displayed . Enter the command in the control characters sequence field and make sure the Hexadecimal switch is turned OFF . Then press enter . The print control is saved . The barcode suffix SBS00 , which is default for all the barcodes holds the end of data command ( see below ) The configuration of the printer barcode is complete . Now we can use this barcode to print the Data Matrix barcode ( 2D barcode ) from SAP . Note : There can be various combinations to the prefix command . If the barcode is not printed then you have to try changing the values for the height , rows and columns variables in the command . The prefix combination that worked for me is : BXN , 3,200 , , , 6 , ~ , 1 FD Use the barcode in the Smartform using a style : Please refer to online documentation for adding a barcode to a style in Smartform . After you have added the barcodes to one of the character formats of the style which is being used in the Smartform , we just have to use the newly created barcode type to display the 2D content as Data Matrix Barcode . See below screenshot for an example . As the example depicts , use a separate text node for the 2D barcode , keep all the 2D content in a variable or write it all down in the text node . Select the whole text and select the character format for the DMC barcode . At this point if you try to print the barcode it is expected to see the barcode on the printout , but you might not see the barcode printed on the printer , the reason as i understood is that based on the ZPL2 command the data should be marked with the start of data command and End of data command along with the type of barcode we are trying to print . so the commands should be inserted before and after the text node that holds the 2D data content . This will give the printer a command saying that the data between this is to be printed as the barcode symbology specified in the command , in our case Data Matrix . Note : Preview will not show the barcode because literally this barcode is not in SAP system and will only be printed on the printer . So anything concerning the barcode has to be tested on the actual printer not the preview because both the preview and the actual print will be a lot different . Create a command node before and after the text node that holds the 2D barcode content : See below screen shots for an example on how to create a command node . Then enter the prefix print control we created in the printer control input field ( see below ) . Create one more command node under the 2d content text node and enter the enter the suffix print control in the printer control input field ( see below ) Now test the print on the Zebra printer , the barcode should be printed on the zebra printer as shown in the screen shot below . Now take the printout and scan the barcode with any of the android apps or any barcode reader that support DMC barcode . Please note that the printout taken on your local printer from a scanned document wont be readable , so it is advised to test the barcode scanning from the actual printout or from the Scanned document on your computer . After scanning , the barcode should display all the 2D content . Alignment issues with the 2D barcode : After the barcode is printed you might notice alignment issues on the label . To solve the alignment issues the following approach can be used . Go to Smartstyle you have used in the Smartform , select the respective paragraph format node you have assigned for the barcode . Here try changing the alignment and spacing values ( see screen shot below ) and try giving it a few trials . You will be able to align barcodes after a few combinations . Note : Please make sure you have enough space for the barcode when designing the layout . I mean if you are planning to have a barcode of size 1 CM * 1 CM then make use you have a separate window on the layout with space more than the barcode size . - - - - - - - - - - - - - - - - THE END - - - - - - - - - - - - - - - - - Please note that the document is based on my personal experience and the online documentation i came across . So if there is any scope of improvements in this document you are most welcome . 12 / 04 / 13 - - 03 : 40 : To add validation for vendor accounts in MIRO t - code MIRO T - code : It is used for entering vendor invoice details received into SAP for incoming Invoice in SAP . All invoice details such as basic data , payment details , tax details etc . can be entered using this t - code . Once the user has input the details of the invoice at the basic data , he will go to the payment tab ; there is a small icon to choose the bank account for the vendor . Because of overlook of this icon ( if there are multiple bank accounts or not ) , user may end up with failed wires ( wrong currency paid to the bank account ) and this may result in bad consequences as vendor received lesser $ for the exchange rate different . Requirement : To display a warning / information message if the vendor has more than one bank account , so that the user can select the correct bank account from payment tab . Solution : Once a user enters a Date , PO number and hits ENETER The system will check in background whether the relevant vendor has more than one bank account or not from Table LFBK If that vendor has more than one BANK account in table LFBK , a warning popup will be displayed . For this the BADI β€˜ MRM_HEADER_CHECK ’ was implemented . MRM_HEADER_CHECK : Along with the checks in the standard system when entering invoices in the Logistics Invoice Verification , you can use the BADI MRM_HEADER_CHECK to execute customer - specific checks for header and item data of an invoice document . Depending on the checks , the system may , for example , issue an error message or call other transactions . Step 1 : Go to T - code se - 18 and give the BADI name to be implemented . Step 2 : Implement the BADI using Implementation option as below – Step 3 : Implement the logic in your z implementation of BADI in following way – The class has following parameters : You can implement the logic in based on the vendor number ( LIFNR ) passed in I_RBKPV parameter . Select the bank details from LFBK table based on LIFNR in an internal table . Describe the internal table , if there are more than one no of lines , issue the relevant message . Following is code implemented - Result - An information message is displayed if the vendor has more than one bank account as below : Due to the warning message the user will be warned of existing accounts of vendor so that he can check if the correct currency paid to the bank account before final posting . 12 / 04 / 13 - - 10 : 29 : Jaro – Winkler Distance Algorithm To tackle a real world problem of the hiring department performing a new hire instead of a rehire for seasonal contractors , I decided to implement the Jaro - Winkler algorithm in SAP . Since there is a policy to not store key information on contractors ( such as SSN ) , there is only the ability to match on a person ’ s name . Unfortunately , the name is not always typed correctly which leads to the inability to find a previous hire and this leads to hiring a new contractor instead of rehiring a contractor . Using β€œ Jaro – Winkler distance ( Winkler , 1990 ) is a measure of similarity between two strings ” . See Wiki link : http : / / en . wikipedia . org / wiki / Jaro % E2 % 80 % 93Winkler_distance for more in depth information . The Class : ZCL_JARO_WINKLER Method : STRINGDISTANCE method stringdistance data firstlen type i secondlen type i halflen commonmatches common1 type string common2 type string data transpositions i type i j if not firstword is initial and not secondword is initial ) ) if firstword eq secondword stringdistance = totalmatchscore else firstlen = strlen secondlen strlen halflen zcl_jaro_winkler = > math_min num1 firstlen num2 secondlen 2 + 1 common1 zcl_jaro_winkler = > getcommoncharacters firstword secondword secondword distance halflen commonmatches common1 commonmatches eq 0 stringdistance totalmismatchscore else common2 getcommoncharacters secondword secondword firstword distance ne strlen common2 ) ) stringdistance totalmismatchscore transpositions i while i lt common1 + i 1 ne common2 + i transpositions transpositions + endif i + endwhile transpositions transpositions / 2 stringdistance commonmatches / 3 * firstlen + commonmatches / 3 * secondlen transpositions * commonmatches endif stringdistance endmethod Method : GETCOMMONCHARACTERS method firstlen i type i j ch type c foundit type c secondword_copy first_half second_half next_start_point remaining_length not and not secondword_copy secondword firstlen secondlen while i lt firstlen ch firstword + i foundit bool_false j math_max num1 0 num2 = ( distance while ( ( foundit bool_false and lt math_min = ( + distance num2 ) ) ) secondword_copy + j ch foundit bool_true concatenate commons ch into commons move secondword_copy + 0 j to first_half remaining_length next_start_point j + move secondword_copy + next_start_point remaining_length to second_half concatenate first_half ' # ' second_half into secondword_copy j j + endwhile clear commons endmethod Creating a test program : This test program requires that a first name and last name be input by the user and then these names are compared against every employee for possible matches . loop at t_pa0002 assigning < fs > translate < fs > nachn to upper case translate vorna to upper case nachn l_compare call method stringdistance exporting firstword s_nachn secondword l_compare receiving nachn_score vorna call method exporting firstword s_vorna secondword receiving vorna_score < fs > total_score nachn_score + < fs > vorna_score endloop sort t_pa0002 by total_score descending format color col_normal write 80 ' Total Score ' color col_total uline loop at assigning write / < fs > nachn 20 , < fs > nachn_score vorna 20 , < fs > write 80 color col_total endloop Deliberately misspelling my last name and shortening my first name : Results : I only show the top three results . In fact , since I ’ m creating a combined score of two different measurements , I would likely consider anything below a 1.60 as not useful in real world . So now we have a safeguard to alleviate hiring when we should be re - hiring . Of course , there are many uses for this algorith , such as zip code verification for zip+ 4 . Also , another use is using as a dictionary check for valid words . 12 / 05 / 13 - - 20 : 36 : Adding Validation to F - 43 Following t - codes are available to use validation or substitution functions : GGB0 Validation Maintenance GGB1 Substitution Maintenance GCVZ Rule Maintenance GGB4 Select action for validation / substitution , for example , activation of application areas , message usage or substituted fields GCX2 Definition of Includes for User Exits OB28 Activation of FI validations OBBH Activation of FI substitutions OBBZ Activation of cost of sales accounting substitution ( in the FI area ) OKC7 Activation of CO validations OKC9 Activation of CO substitutions GCT9 Transport : Validations GCT0 Transport : Substitutions To add validation , we take GGB0 in account . Scenario : To display a warning / information message in f - 43 , if the vendor has more than one bank account , so that the user can select the correct bank account of vendor . Step 1 - Go to GGB0 and create your validation . Here you have 3 things – Prerequisite Check Message You can relevant prerequisite for your validation , a check and the message you want to display on the check . Following is the validation step for the taken scenario – In financial accounting , Select line item level and create validation Step 2 : You can now implement your validation / exit through the program RGGBR000 . For this , you should copy it into the customer namespace , for example ZGGBR000 . The length of the name you choose should not exceed 8 characters . Step 3 : To define your new user exit , you have to enter your user exit in the form routine GET_EXIT_TITLES . Step 4 : Implement your logic in your exit routine as below – Step 5 : Once you have implemented your logic , you need to activate your exit and define a call up point ( header or line item ) . This is done using t - code OB28 as shown below – Once you validation has entry here , it will be triggered . In taken scenario , while posting in F - 43 , If vendor has more than one bank account , a warning message should be displayed . For the applied logic , please see the result below . 12 / 05 / 13 - - 20 : 57 : BILL OF MATERIAL ( BOM IN SAP ) - CS01 This Documents Defines what is BOM and Creation of BOM in ECC ( CS01 ) with sample Test Case . Definition of BOM : For manufacturing a product or assembling , list of several components ( part of product ) are needed . A well - structured list of Items or Components is known as BOM - Bill of Material . The list will contain object number of each components and its unit of measure with quantity . A finished product is a combination of several different component parts or Materials . Types of BOM available in SAP You can create the following BOMs in the SAP system : Material BOMs Equipment BOMs Functional location BOMs Document structures Order BOM Work breakdown structure ( WBS ) BOM BOM can be act as basic for several activities in Production department , some of the examples are : 1 . MRP Department : BOM data can be used to calculate cost - effective order quantities for materials . 2 . Work scheduling department : BOM data can be used for operation planning and control . 3 . Production order management department : BOM data can be used to plan the provision of materials . 3 . Sales Order 4 . Reservation 5 . Product Costing BOM Usage : It is a Key which defines different areas of a Company where the BOM can be used . BOM Item Category : Categorization of the items in a BOM according to set criteria , such as whether they refer to an object or whether they are kept in stock This categorization allows you to process data that is relevant to the individual items in a BOM . The item category is used to control field selection , default values for BOM maintenance , triggering of specific system activities , and so on . For Example Documentation Item , Stock Item , Packing Item . SAP R / 3 system allows you to create individual BOM depending upon the area in your company . Define BOM Usages : In Customizing for Production , define individual BOM usages for the different areas within your company by choosing Basic data - - > Bill of Material - - > General data - - > BOM usage - - > Define BOM usages . You can define BOM usages for the following scenarios : You maintain separate BOMs for different areas within your company , such as design or production . You create just one BOM for all areas within your company . Alternative BOM : Alt BOM is used to define BOM in a BOM group . By default system will consider next ALT . BOM Number if user wo n ’ t enter any Alt BOM Number . If user enter any Alt . BOM , then system will validate Alt BOM . Structure of a BOM : BOM data is structured as below , BOM Header : BOM Header consists of DATA Related to BOM , which consists of Plant , Material , Technical Type , Revision Label , etc … BOM Header maintains data refer to entire object . Refer to single Header Multiple BOM ’ s would be created which will be maintained by ALT BOM . BOM Item : Each part of a final Product is called BOM Item , A product is a collections BOM Items .It consists of Item Number , component Quantity , Item Category , Unit of Measure , Item id . Sub Items Partial quantities of a BOM item may be installed at different points . Sub - items are used to describe the different installation points of these partial quantities . Sub - items have no operational function in the BOM . BOM Creation in SAP ECC Transaction for BOM creation is CS01 . 1 . Initial Screen for BOM creation : Mandatory Fields for entering into next screen are Material , Plant and BOM Usage as per Requirement and by default Alt will pick up as next value to available Alt BOM . Click on Header Icon for header details : As shown below by default system with Pick 1 as base Qty and Base UOM will be picked from Material Base UOM . Create BOM Items : Enter Item Components along with component Qty , UOM , Item Category as shown below . BOM Creation Sample Code in ECC : Scenario : Create material BOM along with items and define Procustion Version . Define ztables and structure as per the requirement . Create a class and method for BOM creation with Importing Parameters and exporting parameters as : I_BOM HEADER I_BOM_ITEMS E_RETURN * Data Declarations DATA : lit_bom_header TYPE TABLE OF zsbom_header , wa_bom_header TYPE zsbom_header , wa_bom_head TYPE zsbom_header , lit_bom_head TYPE TABLE OF zsbom_header , wa_bom_h TYPE zsbom_header , lit_bom_items TYPE TABLE OF ztbom_items , wa_bom_items TYPE ztbom_items , wa_bom_i TYPE zsbom_items , lit_bom_items_table TYPE TABLE OF zsbom_items , lit_bom_item_table TYPE TABLE OF zsbom_items , wa_bom_item_table LIKE LINE OF lit_bom_item_table , lit_cost_bom_items TYPE TABLE OF ztt_bom_item , lit_bom_item TYPE ztbom_items , i_mast TYPE TABLE OF mast , lv_role TYPE zrole , lv_verid TYPE mkal - verid , lv_verid1 TYPE mkal - verid , lv_bstma TYPE char13 , lv_bstmi TYPE char13 , lv_stlal TYPE stlal , lv_idnrk TYPE idnrk , lv_flag TYPE char1 , lv_phassign ( 4 ) TYPE c , lv_ph_desc TYPE string , wa_error TYPE bapiret2 , lit_error TYPE TABLE OF bapiret2 , persistent_ref TYPE REF TO zcl_d_persist_bom , obj_ref TYPE REF TO zcl_d_bom , l_msg TYPE bapiret2 - message , l_warnings TYPE capiflag - flwarning , l_stpo TYPE TABLE OF stpo_api02 , wa_stpo LIKE LINE OF l_stpo , l_stko TYPE TABLE OF stko_api02 , lv_matnr TYPE csap_mbom - matnr , timestamp TYPE tzonref - tstamps , obj_bom TYPE REF TO zcl_d_bom . TYPES : BEGIN OF ty_mast , matnr TYPE mast - matnr , werks TYPE mast - werks , stlan TYPE mast - stlan , stlal TYPE mast - stlal , END OF ty_mast . DATA : lit_mast TYPE STANDARD TABLE OF ty_mast , wa_mast TYPE ty_mast , lit_mast1 TYPE TABLE OF mast , lv_index TYPE sy - tabix , lv_itmid TYPE bapi1080_itm_c - item_id . DATA : bom_items TYPE STANDARD TABLE OF zsbom_items , lit_bom_item_temp TYPE STANDARD TABLE OF zsbom_items . DATA : lit_stas TYPE TABLE OF stas , wa_stas TYPE stas , lit_ausp TYPE TABLE OF ausp , wa_ausp TYPE ausp , wa_mast1 TYPE mast , lit_stpo1 TYPE TABLE OF stpo , wa_stpo1 TYPE stpo , lit_inob TYPE TABLE OF inob , wa_inob TYPE inob . DATA : lv_objek TYPE inob - objek , lv_date TYPE rn1datum - datex , lv_stlnr TYPE mast - stlnr , lv_counter TYPE i . DATA : lit_bom_hrep TYPE TABLE OF ztbom_head_rep , " Historical Report declarations wa_bom_hrep TYPE ztbom_head_rep , wa_bom_hrep1 TYPE ztbom_head_rep , lit_bom_hist_temp TYPE TABLE OF ztbom_head_rep , wa_bom_hist_temp TYPE ztbom_head_rep , wa_bom_hist_temp1 TYPE ztbom_head_rep , lit_ampl TYPE TABLE OF ampl , wa_ampl TYPE ampl , lit_bom_irep TYPE TABLE OF zsbom_i_report , wa_bom_irep TYPE zsbom_i_report , wa_bom_itemrep TYPE ztbom_item_rep , lit_hist_msg type ztd_hist_msgs , wa_hist_msg type ztd_hist_msgs . * internal table that have to be passed to the bapi DATA : lit_bomgroup TYPE STANDARD TABLE OF bapi1080_bgr_c , wa_bomgroup TYPE bapi1080_bgr_c , lv_bom_text TYPE string , lv_plant TYPE ztbom_header - werks , lit_variants TYPE STANDARD TABLE OF bapi1080_bom_c , wa_variants TYPE bapi1080_bom_c , lit_items TYPE STANDARD TABLE OF bapi1080_itm_c , wa_items TYPE bapi1080_itm_c , lit_matrel TYPE STANDARD TABLE OF bapi1080_mbm_c , wa_matrel TYPE bapi1080_mbm_c , lit_itemas TYPE STANDARD TABLE OF bapi1080_rel_itm_bom_c , wa_itemas TYPE bapi1080_rel_itm_bom_c . * - - > Check BOM Existency CALL FUNCTION ' CONVERSION_EXIT_MATN1_INPUT ' EXPORTING input = i_bom_header - matnr IMPORTING output = lv_matnr . SELECT SINGLE stlnr FROM mast INTO lv_stlnr WHERE matnr = lv_matnr AND werks = i_bom_header - werks AND stlal = i_bom_header - stlal AND stlan = ' 1 ' . IF lv_stlnr IS INITIAL . * assign bom usage to 1 . IF wa_bom_h - stlan IS INITIAL . wa_bom_h - stlan = zif_d_constant = > c_production_bom_usg . ENDIF . * assign bom text bases on condition lv_plant = wa_bom_h - werks . IF lv_plant + 0 ( 2 ) = ' 10 ' . CONCATENATE ' BOM For ' wa_bom_h - maktx INTO lv_bom_text SEPARATED BY space . ELSE . lv_bom_text = ' ' . ENDIF . wa_bomgroup - bom_group_identification = ' BAPI_SMP_COL1 ' . wa_bomgroup - object_type = ' BGR ' . wa_bomgroup - object_id = ' SIMPLE1 ' . wa_bomgroup - bom_usage = wa_bom_h - stlan . wa_bomgroup - created_in_plant = wa_bom_h - werks . wa_bomgroup - ltxt_lang = sy - langu . wa_bomgroup - technical_type = ' ' . wa_bomgroup - bom_text = lv_bom_text . APPEND wa_bomgroup TO lit_bomgroup . IF wa_bom_h - datuv IS INITIAL . wa_bom_h - datuv = sy - datum . * UOM Conversion : CALL FUNCTION ' CONVERSION_EXIT_CUNIT_INPUT ' EXPORTING input = wa_bom_h - bmein IMPORTING output = wa_bom_h - bmein EXCEPTIONS unit_not_found = 1 OTHERS = 2 . * Define Varaints wa_variants - bom_group_identification = ' BAPI_SMP_COL1 ' . wa_variants - object_type = ' BOM ' . wa_variants - object_id = ' SIMPLE1 ' . wa_variants - alternative_bom = wa_bom_h - stlal . wa_variants - bom_status = wa_bom_h - stlst . wa_variants - base_qty = wa_bom_h - bmeng . wa_variants - base_unit = wa_bom_h - bmein . " base unit wa_variants - alt_text = wa_bom_h - alternate_text . " alternative text wa_variants - valid_from_date = wa_bom_h - datuv . wa_variants - function = ' NEW ' . APPEND wa_variants TO lit_variants . CLEAR lv_itmid . LOOP AT bom_items INTO wa_bom_i . CLEAR wa_items . MOVE - CORRESPONDING wa_bom_i TO wa_bom_items . IF wa_bom_items - posnr IS INITIAL . wa_bom_items - posnr = ' 0010 ' . ENDIF . IF wa_bom_items - postp IS INITIAL . wa_bom_items - postp = ' L ' . ENDIF . IF wa_bom_items - datuv IS INITIAL . wa_bom_items - datuv = sy - datum . CALL FUNCTION ' CONVERSION_EXIT_MATN1_INPUT ' EXPORTING input = wa_bom_items - idnrk IMPORTING output = wa_bom_items - idnrk EXCEPTIONS length_error = 1 OTHERS = 2 . * Details of the items of the variants * to convert the uom for bom item CALL FUNCTION ' CONVERSION_EXIT_CUNIT_INPUT ' EXPORTING input = wa_bom_items - meins language = sy - langu IMPORTING output = wa_bom_items - meins EXCEPTIONS unit_not_found = 1 OTHERS = 2 . CALL FUNCTION ' CONVERSION_EXIT_ALPHA_INPUT ' input = wa_bom_items - vendor_no output = wa_bom_items - vendor_no . wa_items - bom_group_identification = ' BAPI_SMP_COL1 ' . wa_items - object_type = ' ITM ' . wa_items - object_id = ' SIMPLE1 ' . wa_items - item_no = wa_bom_items - posnr . wa_items - item_cat = wa_bom_items - postp . " Item Category wa_items - comp_unit = wa_bom_items - meins . " bom uom added wa_items - alt_item_prio = wa_bom_items - alprf . " priority added wa_items - usage_prob = wa_bom_items - ewahr . " usage probability added * - - > Sort String IF wa_bom_items - sortf IS NOT INITIAL . wa_items - sort_string = wa_bom_items - sortf . " sort string added ELSE . SPLIT wa_bom_items - zph_assign AT ' - ' INTO lv_phassign lv_ph_desc . CONDENSE lv_ph_desc . wa_items - sort_string = lv_ph_desc . * - - > End of Sort String wa_items - component = wa_bom_items - idnrk . wa_items - comp_qty = wa_bom_items - menge . wa_items - item_text1 = wa_bom_items - ktext . " Bom component description added wa_items - alt_item_group = wa_bom_items - alpgr . " Bom Alt Item Group wa_items - valid_from_date = wa_bom_items - datuv . wa_items - iss_st_loc = wa_bom_items - lgort . " storage plant * - - > Alt Item Strategy IF wa_items - alt_item_group IS NOT INITIAL . wa_items - alt_item_strategy = ' 2 ' . " Alt Item Strategy ELSE . wa_items - alt_item_strategy = ' ' . IF wa_bom_items - idnrk CP ' 35 * ' . wa_items - class_type = ' 023 ' . wa_items - vendor_no = wa_bom_items - vendor_no . APPEND wa_items TO lit_items . CLEAR wa_items . ENDLOOP . CLEAR lv_itmid . CALL FUNCTION ' CONVERSION_EXIT_MATN1_INPUT ' EXPORTING input = wa_bom_h - matnr IMPORTING output = wa_bom_h - matnr EXCEPTIONS length_error = 1 OTHERS = 2 . * creation of production BOM IF wa_bom_h - stlan IS INITIAL . wa_bom_h - stlan = 1 . * - - From Lot size and to size - - - - - - - - - - - - * IF i_bom_header - werks CP ' 10 * ' . lv_bstmi = zif_d_constant = > c_bstmi . " BASE QUANTITY lv_bstma = zif_d_constant = > c_bstma . CONDENSE lv_bstma . CONDENSE lv_bstmi . ELSE . lv_bstmi = zif_d_constant = > c_bstmi . lv_bstma = zif_d_constant = > c_bstma . CONDENSE lv_bstma . CONDENSE lv_bstmi . * Details of the materials of the different variants wa_matrel - bom_group_identification = ' BAPI_SMP_COL1 ' . wa_matrel - material = wa_bom_h - matnr . wa_matrel - plant = wa_bom_h - werks . wa_matrel - bom_usage = wa_bom_h - stlan . wa_matrel - alternative_bom = wa_bom_h - stlal . wa_matrel - lot_size_from = lv_bstmi . wa_matrel - lot_size_to = lv_bstma . APPEND wa_matrel TO lit_matrel . * Linking items to the corresponding variants wa_itemas - bom_group_identification = ' BAPI_SMP_COL1 ' . wa_itemas - sub_object_type = ' ITM ' . wa_itemas - sub_object_id = ' SIMPLE1 ' . wa_itemas - super_object_type = ' BOM ' . wa_itemas - super_object_id = ' SIMPLE1 ' . wa_itemas - valid_from_date = wa_bom_items - datuv . wa_itemas - function = ' NEW ' . APPEND wa_itemas TO lit_itemas . * call function to create bill fo materail by using * the previously declared local internal tables SORT lit_items BY object_id valid_from_date . CALL FUNCTION ' BAPI_MATERIAL_BOM_GROUP_CREATE ' all_error = ' X ' TABLES bomgroup = lit_bomgroup variants = lit_variants items = lit_items materialrelations = lit_matrel itemassignments = lit_itemas return = e_return . CALL FUNCTION ' BAPI_TRANSACTION_COMMIT ' . * - - - - END OF Production BOM CREATION - - - - - - - - - - - - - - - - - - - - - - - * References : http : / / braincybersolutions . com / sap - tutorials / pp / bom - in - sap - bill - of - material / http : / / help . sap . com / saphelp_46c / helpdata / en / ea / e9af734c7211d189520000e829fbbd / frameset . htm 12 / 05 / 13 - - 22 : 41 : VERSION MANAGEMENT IN SMARTFORMS The purpose of this document is to compare the versions of smart forms in different servers . This document is highly beneficial for Developers in ABAP which explains a step by step procedure to compare the versions of the forms . INTRODUCTION : Smartform has only one active version , in the form of function module which is regenerated once you change and activate it . Since smartform is client Independent , it can be easily transported to other systems . There may be cases where we would require to compare the versions of the forms across different systems . Though it is not possible to compare the forms directly , it can be achieved to some extent by comparing the generated Function modules line by line , thereby capturing the changes . This can be done via the Transaction SE39 - Split Note that the generated Function Module names will not be same across all systems . PROCEDURE : Once the smartform is created and activated , a Function Module gets generated . To open the Function Module in display mode , either execute the Smartform or go via Transaction SE37 by fetching the FM name from Environment menu . FM will be opened in display mode as follows . Select the Attributes tab and double click on the program name . The following screen appears with the list of file names . Select the required Include name under User defined Files . Similarly , the include name is fetched from the other server that needs to be compared . Now , go to transaction code SE39 . The following screen appears . Click on the option β€˜ Compare different Systems ’ . Enter appropriate include names and details of the systems that needs to be compared . Enter the logon details of the system to be compared . Comparison screen appears . Click on the β€˜ Comparison On ’ button to initiate the process . Select β€˜ Next Difference from cursor β€˜ , Next Identical section from cursor ’ options to analyze the variations and the same procedure is carried out till the end . There is no option to compare the forms directly . But , the entire list of requests available for a smartform can be obtained from which the number of changes done can be captured . Go to transaction SE03 . Select the option β€˜ Objects in Requests ’ . Double click on Search for objects in Requests / Task . The screen appears as below . In the Object Selection type , enter the Object type as β€˜ SSFO ’ and give the smartform name and then Execute List of all the Requests related to that smartform are displayed from which the changes can be traced . 04 / 02 / 12 - - 10 : 00 : Shared Memory - enabled Classes and Create Data – Area Handle Summary Shared Objects are objects in the shared memory . The shared memory is a memory area on an application server , which is accessed by all of this server ’ s ABAP programs . In this article I am giving a brief idea on Shared Memory - enabled Classes , β€˜ Create Data – Area Handle ’ statement and read / write of shared objects . Sufficient screenshots and sample codes are also provided . Author : Abyson Joseph Chavara Company : Applexus Technologies ( P ) LTD Created on : 02 April 2012 Introduction Shared Objects are objects in the shared memory . The shared memory is a memory area on an application server , which is accessed by all of this server ’ s ABAP programs . Before shared objects were implemented , ABAP programs could access this memory area using the EXPORT and IMPORT statements exclusively , but this method was very slow because the " sending " program had to copy variables from its memory to the shared memory , and the " receiving " program had to copy these variables from the shared memory into its own program memory . The benefits of shared objects includes Copy - free : very fast access , version management , preloading , automatic propagation from a database , easy monitoring , etc . In this article I am giving a brief idea on Shared Memory - enabled Classes , β€˜ Create Data – Area Handle ’ statement and read / write of shared objects . Sufficient screenshots and sample codes are also provided . Shared Memory - enabled Classes The prerequisite for storing an instance of a class in the shared memory is that the class of the object has to be defined with the SHARED MEMORY ENABLED addition of the CLASS statement , or that the property Shared memory - enabled has to be selected in the Class Builder . Each area is linked with what is called a global area root class , which can contain separate data and references to other instances of shared memory - enabled classes or to anonymous data objects in its own attributes . Area Classes and Area Handles When an area is defined in Transaction SHMA , a global and final area class with the same name is generated as a subclass of CL_SHM_AREA . Class CL_SHM_AREA itself is a direct subclass of CL_ABAP_MEMORY_AREA . In an ABAP program , an area is accessed exclusively using the methods of the generated area class . There are static methods for binding an ABAP program ( or its internal session ) to area instances in the shared memory ( attach methods ) . Binding creates an instance of the area class as an area handle , and creates a lock CREATE DATA - AREA HANDLE This statement creates an anonymous data object as shared object in the area instance version of the shared memory , which is bound to the area handle referenced by handle . For handle , an object reference variable must be specified ; whose static type is CL_ABAP_MEMORY_AREA or one of its subclasses ( area class ) . When the statement is executed , handle must point to an area handle and the area handle must be bound to an area instance version with a change lock . To create such a reference , you have the following options : Transfer of the return value of the methods ATTACH_FOR_WRITE or ATTACH_FOR_UPDATE of an area class created with SHMA . Transfer of the return value of the method GET_HANDLE_BY_OREF of any area class . Transfer of the return value of the method GET_IMODE_HANDLE of the predefined class CL_IMODE_AREA . The latter is a reference to an area handle for the current internal mode and the statement CREATE DATA acts like without the addition AREA HANDLE . Example 1 Here is a very simple example showing the steps to create the root class , shared area , and the use of CREATE DATA - AREA HANDLE statement . Step 1 : Creating Root class First of all we have to create a Root class . Go to SE24 and create a new class . Here I have given the name ' ZCL_SHR_AREAHANDLE_ROOT ' . Go to the properties tab and check the box Shared Memory - Enabled , as shown in the below image . Step 2 : creating attributes Now go to the attributes tab and create 2 attributes . Here I have named as β€˜ id_num ’ , level as instance attribute , visibility as public , associated type as STRING and second one named as β€˜ dref ’ , level as instance attribute , visibility as public , associated type as DATA ( for Area Handle ) . See image below . Step 3 : Assign Interface . Go to the tab interface and assign the interface β€œ IF_SHM_BUILD_INSTANCE ” and activate the class . Step 4 : Creating Area ( SHMA ) Now run transaction SHMA and create a area named ' zcl_shr_areahandle_area ' . Give ' zcl_shr_areahandle_root ' as root class and constructor class . Check the box ' Aut . Area Creation ' and ' With Versioning ' . Select ' Displacement Not Possible ' for ' Displacem . Type ' field and ' Autostart for Read Request and Every Invalidation ' for ' Area Structure ' field . Screen shot shown below . Step 5 : attach_for_write ( ) Now go to SE38 and create a program , for eg . ' ZCL_SHR_AREAHANDLE_SET ' . After creating an area handle referenced from ' v_area_handle ' , an instance of the area root class ' zcl_shr_areahandle_root ' of the area is created . In area root class , we have already created a generically typed ( using REF TO data ) data reference variable named ' dref ' as public attribute . With CREATE DATA , you create an anonymous data object in the area instance version , which is fed with a value after it has been assigned to REPORT zcl_shr_areahandle_set . DATA : v_area_handle TYPE REF TO zcl_shr_areahandle_area , v_root TYPE REF TO zcl_shr_areahandle_root . FIELD - SYMBOLS < fs_data > ANY TRY v_area_handle = zcl_shr_areahandle_area = > attach_for_write ( ) . CREATE OBJECT v_root AREA HANDLE v_area_handle . v_area_handle - > set_root ( v_root ) . * dref is the attribute created in root class . CREATE DATA v_root - > dref AREA HANDLE v_area_handle string . ASSIGN v_root - > dref - > * < fs_data > . < fs_data > = ' 700 ' v_area_handle - > detach_commit ( ) . CATCH cx_shm_external_type . CATCH cx_shm_attach_error . ENDTRY Step 6 : attach_for_read ( ) We can access the shared object , in another program . For that , create another program in SE38 named for eg . ' zcl_shr_areahandle_get ' . Sample code given below . REPORT zcl_shr_areahandle_get . v_area_get zcl_shr_areahandle_area . FIELD - SYMBOLS < fs_get > ANY TRY v_area_get = zcl_shr_areahandle_area = > attach_for_read ( ) . ASSIGN v_area_get - > root - > dref - > * < fs_get > . WRITE : / < fs_get > . v_area_get - > detach ( ) . cx_shm_attach_error . ENDTRY You can see the output as displayed below . Example 2 In the next example we will add two methods to the root class , for writing and reading values to the shared object . Step1 : Adding methods Go to the methods tab of the root class . You can see method ' IF_SHM_BUILD_INSTANCE ~ BUILD ' is added automatically . Create two more methods named ' GET_ID_NUM ' and β€˜ SET_ID_NUM ’ . Set the level and visibility attributes as shown in the image below . Step 2 : Adding parameters to methods Add a parameter l_msg to the method ' GET_ID_NUM ’ , type as Returning , as shown below . Also add a parameter l_id_num to the method ' SET_ID_NUM ' , type as Import , and associated type as string . Step 3 : Area constructor Double click on the method ' IF_SHM_BUILD_INSTANCE ~ BUILD ’ and add the following code between the ' method IF_SHM_BUILD_INSTANCE ~ BUILD ' and ' endmethod ' statements and save . DATA : sh_area zcl_shr_areahandle_area , sh_root zcl_shr_areahandle_root . * Get a pointer to shared area sh_area = zcl_shr_areahandle_area = > attach_for_write ( ) . * Create an instance of the root OBJECT sh_root AREA HANDLE sh_area . * Sets Intial values sh_root - > set_id_num ( ' 999 ' ) . * set the root back into the area sh_area - > set_root ( sh_root ) . * Commit and detach sh_area - > detach_commit ( ) . Step 4 : Adding code lines in Methods . Double click on the method ' SET_ID_NUM ' and enter the following code between ' method SET_ID_NUM ' and ' endmethod ' statement and save . id_num = l_id_num . Next double click on the ' GET_ID_NUM ' method and enter the following code between ' method GET_ID_NUM ' and ' endmethod ' statement , then save and activate . : lv_id_msg string . * Concatenating a title to id_num . CONCATENATE ' Identification Number : ' id_num INTO lv_id_msg . l_msg = lv_id_msg . Step 5 : ' attach_for_update ( ) ' Now we are going to set values to the memory by using the method ' attach_for_update ' . ( Remember we have already initialized the id_num using method ' attach_for_write ' in the Area Constructor . ) Go to SE38 and create a program named for eg . ' zcl_shr_areahandle_update ' and enter the following code and execute . zcl_shr_areahandle_update . : v_area v_root v_area = zcl_shr_areahandle_area = > attach_for_update ( ) . cx_shm_no_active_version . WAIT UP SECONDS . v_area = zcl_shr_areahandle_area = > attach_for_update ( ) . v_root ? = v_area - > get_root ( ) . IF v_root IS INITIAL OBJECT v_root AREA HANDLE v_area . ENDIF v_root - > set_id_num ( ' 800 ' ) . v_area - > set_root ( v_root ) . v_area - > detach_commit ( ) . Step 6 : ' attach_for_read ( ) ' Now we can read the memory from another program . Go to SE38 and create a new program named for eg . ' zcl_shr_areahandle_read ' and enter the following code and execute . zcl_shr_areahandle_read . : v_area1 zcl_shr_areahandle_area . v_area = zcl_shr_areahandle_area = > attach_for_read ( ) . cx_shm_no_active_version . WAIT UP SECONDS . v_area = zcl_shr_areahandle_area = > attach_for_read ( ) . : v_msg string , l_msg v_msg = v_area - > root - > get_id_num ( ) . WRITE : / v_msg . v_area - > detach ( ) . You can see that v_msg will print the previously updated value ' 800 ' along with the concatenated string ' Identification Number : ' Related Content http : / / help . sap . com / saphelp_nw70 / helpdata / en / c5 / 85634e53d422409f0975aa9a551297 / content . htm http : / / help . sap . com / abapdocu_70 / en / ABAPCREATE_DATA_AREA_HANDLE . htm http : / / help . sap . com / saphelp_nw70 / helpdata / en / df / 109b8b4b073b4c82da0f2296c3a974 / content . htm 10 / 16 / 13 - - 04 : 53 : ABAPer ' s Tabloscope - The SAP Table Relationships & Fields Explorer Please find as attachment , the source code and find the user manual ( with links to download ) below . Check this document regularly for latest version source code as the functionality of this tool being improved further . Please , rate this document as it will help others to prioritize this among the other available alternative methods to search relationships , on Google search SAP is like an ocean and often an ABAP consultant looses much of the time in finding relationships among tables and searching for fields , which causes him / her unnecessary delays . Even SAP quick viewer and other SAP standard search methods does n ' t provide him / her with accurate results always and many times they propose very large result set , most of which are irrelevant solutions for the queried scenario . Some problems , an ABAP consultant would usually encounter are : For example : 1 . To search for direct relationships between tables ' EBAN ' and T16FS ' , the easy method is to go for SAP Quick Viewer ( SQVI ) But SQVI shows relationships only if the field names , data elements or domains match . So , in this case it shows only one relationship i.e , between FRGGR fields of both the tables but it does n ' t show relationship between fields FRGST and FRGSX of tables EBAN T16FS respectively which can also be related , as both are ' Release strategies ' 2 . To search for indirect relationships ( link tables ) between two tables in the absence of direct relationships . For example , there are no direct relationships between tables VBAK ' ' EKKO ' and there is no standard method or tool to find indirect relationships i.e. , link tables between them than manually checking , which is cumbersome . 3 . To search for the field with description Bill - to party ' , one usually goes for SE80 which is a case - sensitive search . That is , it would show only those fields with the given description in lower case alphabets when the search term is typed as bill - to party ' . And most of the times a consultant would be aware of the field description but not the cases of alphabets in field description . 4 . And moreover , with the usual standard methods an ABAPer uses , the result set would be huge with all SAP tables in which the relevant solutions for our scenario is somewhere in the remote corner . It ' s like searching for ' Titanic ' in Atlantic ocean . It would be more easy to search for ' Titanic ' if the Atlantic would be of the size of Lake Superior . I.e. , It would make the job of an ABAP consultant more easier if the search can be carried out separately in each module or application area instead of all SAP . With one and a half month effort I developed a tool overcoming all these limitations and adding some more useful features ) which I named as ' ABAPer ' s Tabloscope ' can be a very useful assistant especially for an ABAP consultant . USER MANUAL This is cover page , click on any of the links below to download / view complete user manual Tabloscope - User Manual . pptx - Google Drive ( PPT ) Tabloscope - User Manual . pdf - Google Drive ( PDF ) 09 / 26 / 13 - - 02 : 41 : Creation of Custom Kernel BADI and Calling it in a Custom Program The BADI ( Business Add - in ' s ) is an object - oriented enhancement option . The BADI defines an interface that can be implemented by BADI - implementations that are transport objects of their own . The new BADI or Kernel BADI is fully integrated into the Enhancement Framework . Within the Enhancement Framework a BADI is an enhancement option or an anchor point for an object plug - in . Kernel BAdI ' s Features Are integrated directly in the ABAP Language / Runtime Improved filter support allows non - character filter types and complex filter conditions Enable reusable implementation instances ( Stateful BAdI ) Control of the lifetime of implementations ( BAdI - context ) Allow for inheritance of implementations Can be switched by the Switch Framework In this document , I have demonstrated the various steps for creating a Kernel BADI and calling it in our own Custom program . 1 . First create a Enhancement spot from SE18 . Kernel Badi ' s belong to an enhancement spot . Enhancement spots carry information about the positions at which enhancement options were created . One enhancement spot can manage several enhancement options of a Repository object . Conversely , several enhancement spots can be assigned to one enhancement option . Enter the description and if you want you can assign the new enhancement spot to a composite enhancement spot . Composite enhancement spots are used for the semantic grouping of simple enhancement spots . A composite enhancement spot contains either one or more simple enhancement spots and / or one or more composite enhancement spots of the relevant type . You can use composite enhancement spots to combine simple enhancement spots into meaningful units . 2 . On creating the Enhancement spot , you will be directed to Enhancement Spot Editor . Now we need to create a new BADI Definition . 3 . Click on the create BADI button . 4 . You will find certain options for the BADI definitions as below . Usability - Multiple use - that is , there can be several active implementations Limited Filter Use – This makes the BADI Filter - dependent - that is , you apply a filter value to each method called ( for example , a country ) . A different ( active ) implementation is then called for each value . Possible filter values are characterized by the filter type . Instance Generation Mode - This property controls the instantiation of the object plug - ins during execution of the statement GET BADI . The first two specifications define context - free BAdIs . Newly Created Instantiation - New object plug - ins are created at each execution of the statement GET BADI . Reusing Instantiation - An object plug - in that was used once in the current internal mode is reused , if it is required more than once . Context - Dependent Instantiation - A context must be specified for GET BADI . This context controls the instantiation . Only one object plug - in is created for each context and implementing class . Each time there is another GET BADI with the same context , it is reused . A context is an instance of a class that implements the tag interface if_badi_context . The specification takes place in the form of a reference to such an instance . Fallback Class - Fallback class for a BADI is used if there is no active BADI implementation . This means : The GET BADI command returns a handle to an instance of the fallback class and the respective CALL BADI calls the methods of the fallback class instance . As soon as there is an active BADI implementation , the fallback class is not used any longer at runtime . 5 . Now we need to add an interface to the BADI . Expand the Node of BADI definition name and double click on node Interface . You can either add existing interface or will be prompted to create . 6 . On clicking β€˜ Yes ’ , you will be navigated to the below screen , where you can add a method to the new interface . Save , activate and comeback to the BADI definition screen and activate the Enhancement Spot . 7 . Next we need to implement the Enhancement spot and BADI . Right click on the BADI definition and select Create BADI Implementation . 8 . First the system will ask for enhancement implantation name . Please enter a name and description . 9 . Next it will ask for BADI Implementation name and Class name for implementing BADI . Enter the names and click ok . 10 . Next we have to implement the interface method . Expand the BADI Definition name and double click on BADI implementation . 11 . You will be directed to the enhancement implementation screen , shown below . Double click on the Interface method and you will be prompted to create implementation for the method . 12 . On clicking yes , you will be navigated to editor for the method . Add the following code for showing a message or anything as per your requirement . Save it and activate . So the BADI definition and implementation part is complete . Next we will see how we can call this Kernel BADI in our Custom program 13 . Create or open an existing program in SE38 . Point to the line where you need to add enhancement option . Right click and select Create Option . 14 . Give an Enhancement point or section name and Enhancement spot implementation name . Here I have opted an Enhancement point and have entered Enhancement spot implementation name as β€˜ ZENH_IMP_TEST ’ ( which we have created before ) . A new line will be added to the existing code as shown below . 15 . Then add the below code which is shown in the red box below . Apart from Classic BADI ’ s which are been called by Proxy class cl_exithandler , Kernel BADI ’ s are called directly with the reference to the BADI definition via GET BADI and CALL BADI statements . That is one of the reasons why Kernel BADI is faster than classic BADI . Also in Classic BADI , while we call it via cl_exithandler , we use the reference to the interface rather than BADI definition 16 . Now activate the program and execute it . When the cursor reaches the enhancement point , where the BADI is called it will trigger all the active implementations of that BADI . Here we have only one implementation and that will be triggered , which shows the below message as we have written in the BADI implementation . If the program fails to trigger the BADI implementation , please recheck whether everything associated with it is β€˜ Activated ’ after the creation . Thank You . 12 / 07 / 13 - - 05 : 05 : Formated Excel using XML for ECC , CRM Transaction launcher and email Objective : To generate the formatted excel file which can be send or download as per below requirement . 1 : User should able to download excel file when using GUI and execute in foreground mode . 2 : When sending the email in foreground as well as if email is send in with background job . 3 : When the ECC transaction is use as transaction launcher in SAP CRM the excel file should get generated same as it is working in SAP ECC , as in case of Transaction launcher it works as web page . Advantage of using XML over OLE : As we can use the OLE method in ABAP to generate formatted excel but its work only in GUI foreground mode , where as we can use β€˜ xml ’ concept in foreground as well as in background jobs for sending email etc . Example : I have made the transaction in ECC which takes input as Year and display all the dates with weekday and in case of weekly off i.e Saturday and Sunday the background color of the cell will be green . If user select the first option β€˜ Download Excel ’ system will generate the excel file , presently I have kept the excel file in temp folder and same I have executed if file save successfully and in case of β€˜ Send email ’ system will send the same file as email attachment . Note : 1 : We can not save the file in any PC folder in background but we can save on app . Server using open data set method . 2 : I have not added the code for email in my example we can check demo program BCS_EXAMPLE_7 to send file as email attachment . 3 : I have made this program by refereeing the existing SDN doc . http : / / wiki . scn . sap . com / wiki / display / Snippets / Formatted + Excel + as + Email + Attachment , I have use same for downloading the file in ECC frontend as well as when same is used in CRM WEB UI as transaction launcher . 4 : For checking this you can upload the attach program in your system and can check the same . Output : Find here the attach file of program . 12 / 09 / 13 - - 02 : 40 : ALV with radio button using OOPS concept in module pool program Scope : The purpose of this document is to display radio buttons in ALV grid . Business requirement : Consider a scenario where the screen needs to be displayed with a list of accounting document numbers , fiscal year and company code . By S electing one option at a time , it should navigate to the next screen ( FB03 ) with the corresponding details of that selected accounting document number . SAP ALV Limitation : As radio button is nowhere included in as a genuine feature of ALV grid , it is a bit tricky . We can implement the same by using the corresponding ICON and HOTSPOT_CLICK event . Workaround : In this case from a report program we are calling screen where ALV Grid is displayed . In the report program write the below code : 1 . Declaration : Create a top include in the report program . Add below lines of code : TYPE - POOLS : slis . INCLUDE < icon > . Internal table structure : As mentioned in the scenario with accounting document number , fiscal year and company code , radio button should be get displayed . So in top of program only structure of internal table will be of following type : TYPES : BEGIN OF ty_view , bukrs TYPE bukrs , belnr TYPE belnr_d , gjahr gjahr , radio ( 4 ) c , handle_style lvc_t_styl , END OF ty_view . Make this field ( RADIO ) as both hot - spot and be active on double click . Then using the corresponding icons and the HOTSPOT_CLICK event it works like a radio button . For achieving our goal we have to use local class and methods in our report program . Define and implement event handler class Define a local class and declare two methods one for handling hotspot and other one for handling double click . CLASS lcl_event_handler DEFINITION FINAL . PUBLIC SECTION . METHODS : handle_double_click FOR EVENT double_click OF cl_gui_alv_grid IMPORTING e_row e_column , handle_hotspot_click FOR EVENT hotspot_click OF cl_gui_alv_grid IMPORTING e_row_id e_column_id es_row_no sender . ENDCLASS . Write implementation of that class with implementation of the method . CLASS lcl_event_handler IMPLEMENTATION . METHOD : handle_double_click . CALL METHOD g_grid3 - > get_selected_rows IMPORTING et_index_rows = lt_selected_rows . ENDMETHOD . METHOD : handle_hotspot_click . FIELD - SYMBOLS : < ls_entry > ty_view , < ld_fld > ANY . LOOP AT gt_view ASSIGNING < ls_entry > . IF sy - tabix EQ es_row_no - row_id . ASSIGN COMPONENT e_column_id - fieldname OF STRUCTURE < ls_entry > TO < ld_fld > . IF ( < ld_fld > IS ASSIGNED ) . * Set selected radio button " selected " . < ld_fld > = icon_radiobutton . ENDIF . ELSE Module Pool Open the screen where ALV grid with radio button needs to be displayed ( For example screen number is 1000 ) and create a custom control in that . Suppose the name of the custom control is C_CUST_CONT3 . PBO Now in PBO of module pool program . Our aim to display ALV grid with radio button in screen . Structure of field catalog and layout will be of type : lvc_t_fcat and lvc_s_layo . Initialy ALV will be displayed with one radio button as set . So for setting a radio button we can just by default set 1 st row as set . Gf_view - radio = icon_radiobutton . β€œ It will tell selected radio button . And for other entries set them as unselected for that pass gf_view - radio = icon_wd_radio_button_empty . While building fieldcatalog for that radio field we have to pass below 2 fields : gf_fieldcat1 - icon = ' X ' . gf_fieldcat1 - hotspot = ' X ' . While creating layout of the ALV table we need to pass stylefname with : gf_lay - stylefname = ' HANDLE_STYLE ' To handle events we have to create event handler . CREATE OBJECT go_handler . SET HANDLER : go_handler - > handle_double_click FOR g_grid3 , go_handler - > handle_hotspot_click FOR g_grid3 . CALL METHOD cl_gui_control = > set_focus EXPORTING control = g_grid3 . To display output : * - To display output . g_grid3 - > set_table_for_first_display EXPORTING is_layout = gf_lay CHANGING it_outtab = gt_view it_fieldcatalog = gt_fieldcat1 EXCEPTIONS invalid_parameter_combination = program_error = 2 too_many_lines = 3 OTHERS 4 . If it is not for first time then we need to check change data and refresh ALV data g_grid3 - > check_changed_data . g_grid3 - > refresh_table_display . cl_gui_control = > set_focus control = g_grid3 . PAI : The below code has to be written for β€˜ REFRESH ’ OKCODE . Refresh table display after switching the radiobuttons DATA : ls_stable lvc_s_stbl . ls_stable - row = abap_true . ls_stable - col = abap_true . g_grid3 - > refresh_table_display is_stable = ls_stable EXCEPTIONS finished = OTHERS 2 . gx_fresh = ' X ' In PAI of the screen read internal table where for field radio button icon is set like READ TABLE gt_view INTO gf_view WITH KEY radio = icon_radiobutton . After that call transaction FB03 and skip first screen . The screen will look as below : The screen navigates to the accounting document screen transaction FB03 . Conclusion : Thus the radio buttons could be included in ALV grid display using ICON and HOTSPOT_CLICK event . 11 / 20 / 13 - - 04 : 38 : The case of statics Hi all , There are occasions where we have a code that looks like this : FORM loop_with_select t01 t02 dif it_sflight TABLE sflight FIELD - SYMBOLS < st_sflight > LIKE LINE it_sflight st_scarr scarr SELECT FROM sflight INTO TABLE SORT BY fldate GET RUN TIME FIELD t01 LOOP AT ASSIGNING < st_sflight > * For each row we go and select a record from scarr SELECT SINGLE st_scarr FROM scarr WHERE carrid EQ < st_sflight > - carrid ENDLOOP GET RUN TIME FIELD t02 dif t02 t01 ' loop_with_select : ' dif ENDFORM " loop_with_select We have a loop and within the loop we execute some select single to get some extra data ( e.g. text ) . This raise a performance problem . One solution is to implement a cache service in the program . The STATICS declaration allow us to create a form for that purpose . FORM get_cache_data USING carrid scarr carrid CHANGING st_scarr scarr CLEAR st_scarr * Use static variable as cache STATICS it_scarr HASHED WITH UNIQUE KEY carrid * Try the cache . READ it_scarr st_scarr WITH KEY carrid carrid CHECK sy subrc NE st_scarr SINGLE WHERE EQ * We insert the result of the select always so we have * empty description in those cases where there is no data in scarr for given " carrid " INSERT ENDFORM " get_cache_data Lets use FORM get_cache_data : loop_with_cache t01 t02 dif FIELD - SYMBOLS LIKE LINE SORT BY fldate LOOP AT * For each row we go and ask for a record from the cache PERFORM get_cache_data USING < st_sflight > carrid st_scarr ENDLOOP ' loop_with_cache : ' " loop_with_cache Pros : No change in program logic . Performance boost ( IT_SFLIGHT contain about 400 entries ) Cons : Higher memory requirement . Extra code . Notes : SAP use functions for this purpose ( Use SE37 and search for * SINGLE * READ * ) but some times it is better to create your own . Happy coding . 09 / 09 / 13 - - 02 : 45 : Integer Arithmetic Operations on Large Numbers Maximum positive value that can be stored by integer type variable in ABAP is 2147483647 For values beyond maximum limit of integer variable , workarounds can be used . One such example is discussion MOD operation fail for large numbers started by Starlet Abraham I was able to calculate correct result of 512 17 MOD 2773 using the methods detailed below . I have written this program to do following operations on large integers . Addition Subtraction Multiplication Division Mod Power Full code snippet is posted at the end of this document . Program has its flaws , but it works . I would briefly go through how the logic works . How are big numbers stored ? Local class lcl_bignum has instance attributes that store big numbers . LV_STRING - Number stored as string type . LT_INT - an internal table of integers . The string is broken into substrings of size 4 ( base 10000 ) , and those substrings ( as int4 ) are stored in internal table . LV_SIGN - integer type to store the sign of number . + 1 for positive , - 1 for negative . For example , number 1234567890 will be stored in internal table as LT_INT 7890 3456 12 Why is number broken into base 10000 ? Base 10000 is safe considering the capacity of integer variable type in ABAP . Computing 9999 * 9999 results in 99980001 , which is within the limits of integer type . On the other hand , 99999 * 99999 results in 999980001 , which would lead to overflow exception . How to create instance and store big number ? Below code snippets can be used to create instance of big number . The constructor parameters are options . CREATE OBJECT lr3 - - Above code will create instance with zero value in it . OBJECT lr2 i_value ' 533335555511111 ' - - Above code will create instance and populate lv_string and lt_int by breaking down input string . Sign of number is positive by default . Input string should have only numbers in it . OBJECT lr1 i_value ' 6584389034291301828999 ' i_negative ' X ' Using above code , ' X ' can be passed i_negative flag if we have a negative number . How to add numbers ? Instance method Add ( ) can be used for adding numbers . It accepts 2 object reference that need to be added , and result is stored in object whose method gets called . We are adding the numbers starting lowest weightage ( LT_INT [ 1 ] ) , and carrying forward extra in case of overflow . For example , we add 12345678 and 22223333 . Program would add ( 5678 , 3333 ) first , and then ( 1234 , 2222 ) . For A = B + C , below code can be used . lr3 - > add i_obj1 lr1 i_obj2 lr2 For A = A + B , below code can be used . lr3 add i_obj1 i_obj2 lr2 How to subtract numbers ? Instance method Subtract ( ) can be used for subtracting numbers . The usage is same as Add ( ) method . Looking at code , you would see that Add ( ) and Subtract ( ) are calling each other . It is done the tackle how absolute values are treated depending on their sign . For example , A = B + C , the values of B and C will be added , and common sign will be retained if B and C have same sign . Both positive , or both negative . If the signs of B and C are different , we essentially have to keep sign of B , and calculate | B | - | C | ( absolute values ) . How to multiply numbers ? Instance method Multiply ( ) can be used . It accepts 2 object references , and stores result in calling object . I would explain the logic using example . It is similar to the method used in elementary school . For elementary example of multiplying 123 and 456 , below logic is used . 123 456 = = = 3 * 6 + ( 3 * 5 + 2 * 6 ) + ( 3 * 4 + 2 * 5 + 1 * 6 ) + ( 2 * 4 + 1 * 5 ) + 1 * 4 Same thing is done in program at base 10000 level . At every stage we are carrying forward the overflow value . How to divide numbers ? For division , I am guessing the answer by multiplying . Something like binary search , I start with 1 as answer , keep on multiplying it by 10000 still answer crosses dividend . Once the guess surpasses dividend , I take a step back , and start multiplying by square root of 10000 . A point comes when multiplier is reduced to 1 , and multiplication can no longer be used to get closer to answer . I then use addition to get closer to answer . Instead of square root , divide by 2 to get next " jump value " . A dry run using elementary example would be something like this . 451 4 - - - How to do calculate remainder ( MOD operation ) Instance method Mod ( ) can be used , which internally uses Divide ( ) , Multiply ( ) and Subtract ( ) . To calculate A = B MOD C , program does something like : A = B - C * ( B DIV C ) Here we are reusing the code written in previous methods . How to calculate Power ? Instance method Power ( ) can be used , which internally uses Multiply ( ) and Subtract ( ) . For calculating A = B POWER C , program starts with 1 as answer , uses loop to multiply B to answer , C number of times . Full code snippet * - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - * * CLASS lcl_bignum DEFINITION * - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - * CLASS lcl_bignum DEFINITION PUBLIC SECTION METHODS constructor i_value string OPTIONAL i_negative c OPTIONAL METHODS get_sign RETURNING value r_sign i get_string RETURNING value r_string get_int RETURNING r_int int4_table set_data i_value i_negative c add REF TO lcl_bignum i_obj2 REF subtract IMPORTING i_obj2 multiply IMPORTING i_obj2 divide i_obj2 mod i_obj2 power i_obj2 invert_sign copy_values i_obj abs_compare i_obj RETURNING r_result i PROTECTED SECTION int_to_string split_into_int delete_leading_zeros divide_by_2 PRIVATE DATA lv_string DATA lv_sign VALUE lt_int int4_table " sqrt of max int4 is 46340 CONSTANTS gc_unit_size VALUE 10000 gc_unit_digits 4 gc_gt " greater than gc_lt " less than gc_eq " equals ENDCLASS " lcl_bignum DEFINITION * CLASS lcl_bignum IMPLEMENTATION lcl_bignum IMPLEMENTATION METHOD constructor IS SUPPLIED CO ' 1234567890 ' lv_string i_value CONDENSE lv_string ENDIF split_into_int i_negative IS SUPPLIED i_negative lv_sign ENDMETHOD " constructor METHOD set_data CLEAR lv_string lt_int lv_sign CO ' 1234567890 ' lv_string i_value CONDENSE split_into_int lv_sign ENDMETHOD " set_data split_into_int lv_string lv_int lv_string me WHILE NOT INITIAL GT gc_unit_digits SHIFT lv_string RIGHT gc_unit_digits PLACES CIRCULAR lv_int lv_string + 0 gc_unit_digits SHIFT LEFT gc_unit_digits PLACES ELSE lv_int CLEAR * INSERT lv_int INTO lt_int INDEX 1 . APPEND lv_int lt_int ENDWHILE " split_into_int delete_leading_zeros lt_temp lv_temp lv_count CHECK lt_int NOT lt_temp lv_count lines lt_temp DO lv_count TIMES READ lv_temp INDEX lv_count lv_temp EXIT lv_count lv_count ENDDO INITIAL AND lv_count LE lines APPEND LINES 1 " delete_leading_zeros int_to_string lv_char n LENGTH gc_unit_digits lv_int lv_char lv_int CONCATENATE lv_char lv_string ENDLOOP LEFT DELETING LEADING ' 0 ' " int_to_string get_int r_int " get_int get_sign r_sign lv_sign " get_sign
[ "ABAP Development", "inbound delivery" ]
http://documentshub.com/leave-application-2/leave-application-to-attend-family-function/
Advertisements leave application Leave Application for Marriage Ceremony DocumentsHub 26 Comments Sample leave application to attend family function or wedding ceremony . This sample template can be helpful for school college and university students and official employee can be used this application for leave as sample format . This application can be used for different purpose , For example cousin marriage , brother ’ s marriage , sister ’ s marriage and attending family function Leave Application for Marriage Ceremony from Parents The Principal , Lahore Grammar School . Gulberg Campus , Lahore Subject : Leave Application for Marriage Ceremony Respected Sir , Please be informed that my daughter is studying in your school . My nephew ’ s marriage ceremony is to be held on 23rd December . So my Daughter will not be able to attend School during this period . Kindly grant her leave from 20th December to 26th December . I strongly request you consider her leave . She will collect all regular work and notes from her friend while her leaves . I shall be very thankful to you for this kindness . Yours Sincerely , Arshad Bajwa F / O Sidra Bajwa . 9th A - Roll No 13 Marriage Leave Application by Student Respected Sir , With utter respect and honor , it is to bring in your kind attention that my sister is getting married this week so it would not be possible for me to come to school for four days . We have to leave this city to attend the marriage ceremony . This ceremony is very close to family as it is a very personal event and emotions of joys are at peak . I hope you understand and grant me leave for four days so I can enjoy the wedding at fullest . I shall be very grateful for this consideration . I shall be obliged . Sincerely Yours , β€” β€” β€” β€” β€” – Leave Application due to Sister ’ s Wedding To , The Principal , Star light High School , Bombay , India . Sub : Leave application by student Respected Mam , My name is Praachi Abhimanyu . I am a student of this reputable institution . It is to inform you that my sister wedding is approaching really soon . I have to leave for home on 3 rd February . I have to make all arrangements and help my father in many little things . This is a very personal function and my presence is mandatory . Siblings wedding is always very emotional and close to heart . I have already completed my work for three days of school . It is my kind request to please permit my three days leave so I can attend my sister wedding . Yours Truly , Ms . Praachi Abhimanyu , 10th July , 2018 Leave Application for Marriage To , The Principal , Montgomery High School , Toronto , Canada . Subject : School leave application due to marriage Respected Madam , Education is a noble goal and those who seek it with all their heart and devotion gain the greatest asset in the world ; the ability to differentiate between god and evil and to learn , to teach and to be useful for others . Knowledge begets wisdom . I have never shied away from this duty and have a stellar record ; I have been declared time and again the most punctual student in the school . However , I will need a week off from school in order to attend my cousin ’ s wedding . He is to be married in Ottawa and I can not be left alone at home . I have tried to convince my parents but to no avail , they insist that I join the family and participate in this family occasion . I request your assistance . Yours Obediently , Fred Ellis 1 st September , 2013 . Easy Format of Leave Application for Marriage Ceremony The Manager , Falcon ’ s Association . Subject : Leave Application for Marriage Ceremony This is to request to for leave of two days as I have to attend wedding ceremony of my beloved Sister / Brother / Friend / Cousin . I am glad at this occasion and I have to leave outstation for this event with my entire family . I hope that you will sanction me leave for 5th and 6th June , 2015 . I shall be brimmed with gratitude . Thanking you . Sincerely , Ali Khan . Finance Manager . Leave Application for Own Marriage from Students To The Principal College Name : ___________ Subject : Leave Application for Own Marriage I am Shazia Khan , student of Fsc Pre Engineering . I have Taken admission in your prestige institution recently . By the Grace of Allah Almighty my wedding date has been fixed and now the function just being started in few days . I request you to kindly allow me at least 15 days leave from the college to avoid any attendance issue . I shall try my level best to continue my classes as early as possible to avoid any loss of study . I am competent student and will cover my syllabus . Waiting your positive response Thanking you i remain . Yours Sincerely , Shazia Khan Roll No : 12 Leave Application to Attend Cousin ’ s Wedding Ceremony The Principal . Lahore Alma Lahore . Subject : Leave Application to Attend Family Function I am requesting in regard to the above mentioned subject . My family has arranged a wedding function of my cousin sister on 24th March and my whole family is going to attend that function so , I need to travel for Islamabad and I will not be able to attend school for one week dated 23rd March to 29th March . Please grant me leave for one week to join these cheerful moments . I will be very thankful to you . Yours Obediently , Name : Shazia Ahmad Class : 7th - B Leave Application to Attend Cousin Sister ’ s Wedding Ceremony Sample Leave Application for Attending Cousin Brother ’ s Marriage Lahore Grammar School Lahore . Subject : Leave Application for Cousin Brother ’ s Marriage It is to inform you that I would be unable to attend next week classes due to my cousin brother ’ s wedding . As you know , I am here in University Hostel and wedding in going to held at Islamabad Dated 26th November to 2nd December . I would be highly obliged to you if you consider my request . Your concern is required . Name : Ahsan Murtaza Class : 8th - A Roll number : 12 Leave Application to Attend Marriage For Employees Mr . Azhar Mehmood . H.R Manager , Falcon ’ s Agency , Subject : Leave Application for Marriage It is stated that I am Sana Shahid , working as an Assistant Accountant in this organization since two years . I am gleeful to inform you that my marriage is going to be held in the next week . For this purpose I want leave for one month from 31st July to 7th August . Kindly , grant me the required leave period . I shall be highly obliged to you for this favor . Thanking you I remain . Sincerely , Sana Shahid . Assistant Accountant . Leave Application for Marriage For Employees Leave Application to Attend Friend ’ s Marriage Mr . Ahsan Murtaza . Branch Manager , City Bank , Lahore . Subject : Leave Application for Attending Marriage It is stated that I am Lubna , working as receptionist in this bank since last two years . It is to be informed that I come to know about the marriage ceremony of my dearest friend . I have to attend it as it is her special day . During this , I am not able to come office . Kindly , I want you to grant me leave for two days . It would be a favorable act . Thanking You . Lubna Shah . Receptionist . Sample Leave Application to Attend Marriage It is stated that I have to attend a marriage ceremony of my first cousin . It is the first function in family and presence of everyone is necessary . I want to request that kindly grant me leave for 2 days only from 3rd Aug to 5th Aug , 2014 . So that I shall be able to fulfill my role as a brother . I shall be highly obliged . Thanking You in Anticipation . Akram Khan . HR Officer . Leave Application for Attending Wedding The Marketing Manager , Falcon ’ s Agency . Subject : Leave Application . This is to inform you that I suddenly come to know about the good news of my elder cousin ’ s wedding . As he is the first cousin in our family all are happy on this occasion . I also need a leave in order to attend the wedding ceremony . Kindly , grant me leave for one day . I shall be highly thankful to you for this favour . Nida Ali . Assistant Accountant Sample Marriage Leave Application for School Lahore Grammar School Karachi . Subject : Leave Application from School Respected Principal , It is humbly requested you , that i am class teacher of 4th grade in primary section . Due to my cousin sister ’ s marriage which is going to be held on Friday dated 23rd April . I would not be able to attend school to perform my duty that day . kindly grant me leave for one day . The study schedule of my class is mention in my planner . The substitute teacher will follow the planner according to my advise . I shall be very grateful to you for this favour . Yours Faithfully , Saima Khan . Class Teacher Grade 4 Marriage Leave Application for One Week Sub : Application for Seven Days Leave Sir / Madam , With humble submission , it is request that i wish to apply sevendays leave as i have to attend a marriage cermony of my friend from 2nd of august to 9th august 2015 . During this period i will not be able to attend the school . It is very important for me to help my friend in his marriage . After the end of this function i will again attend my school . Your good self is requested to sanction seven days leave in my favour , as it will be your most kindness . Yours Faithfully , Mir shameem . Short Application for Marriage Ceremony The Manager , Falcon ’ s Association . Subject : Leave Application for Marriage Sir , With high esteem and regard it is stated that as per our telephonic conversation I told you regarding my marriage ceremony which is in the next week . For this purpose , I am in need of 10 days off as I have to travel outstation . This writing will serve as official request of mine for leave from 4th Jan to 13th Jan , 2016 . I hope that you will sanction me the leave . I shall be highly obliged for this . Thanking you ahead of time . A.B. Khan R&D Officer Contact : 000 - 000 - 000 . Sample Leave Application due to Cousin ’ s Marriage Allied Middle School , California , United States of America . Subject : Leave application due to cousin ’ s marriage With due respect it is to state with much gaiety that after a long and much awaited time there is at last a marriage in my own family ! In the next week my sister cousin is getting married after much hardships and twisted family matters . We decided to plan the wedding as wedding destination and for that reason we have to leave our current home to ooze out full delights of the precious moments . It is impossible to stay back here and suck myself to death so I want to apply for the leave of one week I had completed all my work at school and nothing is ending on my behalf so kindly grant me the most cherished leaves . I would pray for my whole life if you grant me the said leaves . Thanking in anticipation . Yours Truly , Ms . Isabella Christopher 13 th February , 2017 Advertisements Cousin ' s Marriage easy format Friend ' s Marriage Leave Applications Marriage Ceremony Short Application Sister ' s Marriage Wedding Previous Post Leave Application for Hajj Sample Next Post Sample Application for Fee Concession
[ "LEAVE APPLICATION", "MARRIAGE CEREMONY", "Easy Format" ]
http://docwiki.embarcadero.com/CodeExamples/Tokyo/en/MessageBox_(Delphi)
MessageBox Delphi Description The following code causes stay on top forms to allow a MessageBox to appear on top After the message box is closed the topmost forms are restored so that they continue to float to the top procedure TForm1 Button1Click Sender TObject begin with Application do begin NormalizeTopMosts MessageBox This should be on top Look MB_OK smbOK RestoreTopMosts end end Uses VclFormsTApplicationMessageBox fr de ja VclFormsTApplicationNormalizeTopMosts fr de ja VclFormsTApplicationRestoreTopMosts fr de ja Categories Delphi 2010
[ "MessageBox", "Delphi" ]
http://dodd-frank.com/?s=whistleblower+
Dodd - Frank CPA Ca n ’ t be a Whistleblower for Non - Public Entities Employment Executive Compensation Litigation Public Companies and Securities Reyher v . Grant Thornton , LLP analyzed whether an employee of a CPA firm is protected by the anti - retaliation provisions of the Dodd - Frank Act for lodging complaints with an employer about suspected illegal activity regarding non - public clients . The Plaintiff discovered what she believed were accounting irregularities in tax matters for non - public clients and complained to administrators [ … ] Read more β†’ by Steve Quinlivan | July 10 , 2017 Supreme Court to Determine Scope of Whistleblower Protection Employment Executive Compensation Litigation Public Companies and Securities A percolating issue with respect to the SEC ’ s whistleblower regulations is whether the anti - retaliation protections apply only when suspected misconduct is reported to the . . . Read more β†’ by Steve Quinlivan | June 26 , 2017 CFTC Revises Whistleblower Rule to Enhance Anti - Retaliation Protection Derivatives The CFTC has adopted final amendments to its whistleblower rules that will , among other things , strengthen the CFTC ’ s anti - retaliation protections for whistleblowers and enhance . . . | May 22 , 2017 SEC Exams Looking for Whistleblower Violations Broker - Dealer Investment Advisers SEC staff in the Office of Compliance Inspections and Examinations are examining compliance with key whistleblower provisions arising out of the Dodd - Frank Wall Street Reform and . . . | October 24 , 2016 1 2 3 4 5 Last
[ "Whistleblower Protection", "Non-Public Entities" ]
http://dodd.ohio.gov/Providers/Compliance/Pages/default.aspx
Compliance Documentation Compliance Review Protocol Compliance Review Tools and Required Documents List Office of Provider Standards and Review OPSR OPSR conducts compliance reviews in licensed waiver funded settings unlicensed waiverfunded settings licensed Intermediate Care Facilities for Individuals with Intellectual Disabilities ICFIIDs and County Board settings In order to ensure consistency the review process and tools used are the same in all settings Compliance Review regularly scheduled reviews of a provider are conducted prior to the end of the providers term license accreditation term or at least once every 5 years for nonlicensed waiver settings The review is conducted utilizing a single review tool Special Compliance Review an unscheduled review which occurs due to identified concerns such as complaints Major Unusual Incidents reports of fraud or adverse outcomes identified by other entities such as the Ohio Department of Health or the Ohio Department of Job and Family Services If you have questions or need additional information regarding compliance the Office of Provider Standards and review can be reached by contacting 6144666670 or by email to OPSR
[ "OPSR" ]
http://dodoodad.com/judy-travis-biography/
home Biography Judy Travis Biography Judy Travis Biography Facts of Judy Travis Biography Occupation YouTube Star Body measurement 33 - 24 - 35 Networth ? $ 2 - 3 million Ethnicity Filipino American Nationality American Religion Christian Spouse Benji Travis Education ? University of Washington Place of birth Seattle , Washington , United States Contents Life And Education Judy Travis is a charming and gorgeous American beauty and lifestyle expert and YouTuber . She was born on February 2 , 1986 , in Seattle , Washington , United States . Her birth name is Judith Gutierrez Travis and holds American nationality . She belongs to Filipino American ethnic background . YOUTUBE CAREER Judy Travis ' YouTube channel , itsjudytime have more than 1.2 million subscribers and more than 2000 million lifetime views , as of November 2016 . Her daily vlog channel ItsJudyLife have more than 1.1 million subscribers and more than 400 million views . Her YouTube channel listed in the top 1 % of the YouTube ’ s β€œ Google Preferred ” Channels For Advertisers in both β€œ Beauty ” and β€œ Family & Children ’ s Interests ” categories . In 2008 , while she was attending the University of Washington , Travis started shooting YouTube videos . She first posted a how to hair video . Her viewers loved her videos . She started posting videos as a side hobby . She began getting positive feedback from viewers . She then continued shooting more videos and gained more popularity . To represent β€œ ItsJudysLife ” and β€œ Its JudyTime ” for new media and product launches , she signed an agreement with Driver Digital in 2014 . She also has created a tutorial based on Selena Gomez looks in β€œ The most challenging part is the lack of cross - collaborating and not having the opportunity to really get to know the other girls . I get a little jelly jelly when I see the LA YouTubers hanging out and taking selfies on Instagram ! When I do attend beauty events in Los Angeles , I get so excited to meet everyone , although I have to admit I love the easy going , slow pace , and relaxing lifestyle of the Pacific Northwest ! ” PERSONAL LIFE Judy Travis is a happily married woman . She got married to her longtime boyfriend Benji Travis . The couple is blessed with three children , named Julianna Travis and two twin girls named Keira Travis and Miya Travis . Her husband , Benji ' s information is not provided by any source . There is no any sign of divorce or separation and has a very supportive husband who helps her in every difficulty . They are live happily married life . Travis is against human trafficking and strongly criticized the traffickers . In 2014 , she raised over $ 113000 to fight against human trafficking . She collected the money for the victims of sex slavery in partnership with Rescue Freedom . Judy is active in using her social networking sites . She keeps in touch with them through her social accounts . She is loved by her fans and admires her . As of 2016 , Judy Travis ' net worth is estimated to be $ 1.5 million dollars . Updated On Sun Feb 26 2017 Published On Sat Jul 18 2015 By rajan vlogger Judy Travis
[ "Judy Travis Biography", "lifestyle expert", "Seattle , Washington , United States" ]
http://doesitreallywork.org/diet-food-delivery-programs/
Do Diet Food Delivery Programs Really Work ? Does it realy work ? Are diet food delivery programs the key to shedding those unwanted pounds ? We all know how to lose weight : eat less , eat right , and exercise . That ’ s the theory . Putting this into practice , however , is not as simple as it might appear to be , which is why the best of us need help when it comes to shedding those extra pounds . Overview The difficulty people have in losing weight is something that has been capitalized on by many companies that see a huge business opportunity . They have aggressively marketed themselves as the saviors that come in times of such dire needs . But , before you sign up for any weight loss program , and even before you look into the fine print of what is being offered , there is something you need to do . You must accept the fact that there is no magic wand out there and nothing , no program is easy , no matter what the company says . If it was that easy , you ’ d do it yourself . So the first rule is self - discipline . You will need this . Without it you will not get too far , and even if you do , you will relapse very soon , possibly to a worse state than before . As long as you are willing to stay the course , you will see results . This is true whether or not you subscribe to any diet food deliver programs . Once your mind is made up that you have to address your weight issue , you need to ask yourself what will suit you most and also what you are more inclined to do – hit the gym , go on a diet , or both . The reality is that the last option is optimal , exercise and a bit of diet control should do the trick . But unfortunately most of us can not manage this combination . You then need to choose the next best option . Exercise requires time and more self - determination than going on a diet , so , most people sign up for some diet program or the other in the hope of getting thinner while keeping other aspects of their life unaffected – like work , time with family , etc . Your browser does not currently recognize any of the video formats available . Click here to visit our frequently asked questions about HTML5 video . Top 3 Diet Food Delivery Services There are innumerable diet food delivery programs in the market today . Choosing the right one can be a challenge . There is the popular Bistro MD diet which sends you high - quality , nutritionally - balanced , chef - prepared meals that add up to approximately 1200 calories a day . They do n ’ t believe in depriving dieters of delicious meals , so they have quite a selection to choose from . Another talked about diet is eDiets ( the e is for easy ) . They offer similar food - to - your - door services and believe in giving you more but lighter meals during the day . Bistro MD Recap Bistro MD has , by far , the best tasting food of any other program , and the most recommendations . The only way a diet delivery program will be effective for you , is if you actually enjoy eating the meals they provide , and Bistro MD delivers on that . The best part about the plan is the β€˜ My Night ’ option . This β€œ allows ’ you to eat out or eat anything you want once a week , so you still have some semblance of normalcy in your life and do n ’ t feel trapped into a diet . It ’ s an amazing feature that lets you give in to temptation , which , ironically , should be part of most diet plans since it helps cravings . This actually helps dieters stick to the plan for the rest of the week . See our full review of Bistro MD Diet - to - Go Recap Diet to Go is making a concerted effort to bring high quality diet foods to as many people as possible with a reasonable price . Most of the other options out there make you choose between taste and price . You can get gourmet diet food , but be prepared to pay an arm and a leg . Or you can bargain shop , and have to eat dried out , over - processed and reconstituted foods . With Diet to Go you get pretty fresh foods , and food without all of the harmful chemicals and preservatives that are used by other programs . This is why they got our Thumbs Up review , and why we suggest trying them out for a week , and then seeing what you want to do from there . See our full review of Diet - to - Go Biggest Loser Meal Plan Recap If you ’ re a fan of the show you ’ ll probably be a fan of their diet delivery program as well . If you ’ ve been trying to replicate the sort of results they get on TV , a big part of that is sorting out the food you eat . Making your own food while on a diet can be killer , because portion sizes are hard to wrangle in , so having it all pre - portioned for you makes it much easier . If you couple this meal plan with a personal trainer that will push you out of your comfort zone like they do on the Biggest Loser Show , you ’ re basically getting 80 - 90 % of the system they use . This can make it really fun to lose weight , and see if you get startling results like they do . full review of the Biggest Loser Meal Plan Other Diet Food Delivery Services Freshology Recap Freshology , as the name suggests , is focused on the fresh . This can be , well , refreshing , when you size it up to other programs that rely heavily on processed foods that you have to defrost before you can even reheat it . With their meals you get your package and refrigerate everything and eat it over the next 3 - 4 days . You can tell that their meals are prepared by hand by actual people , and not just thrown together on an assembly line . If you ’ re into spirituality , you want to know that an actual person put your meal together . full review of Freshology eDiets Recap eDiets is another food - to - your - door program that claims to do wonders for your weight loss . It comes with a year round , 24 hour support and customized diets according to the user ’ s needs . In addition eDiet too has the other usual add - ons : counselor support , peer group chats , consultations with professionals etc . The website , which has bikini clad before - after pictures of women , seems tacky , but when you get past that you realize that they have a comprehensive weight loss program , with umpteen diets to choose from . However , what is not clear is that though they stress on the fresh food factor , how fresh it really is ? That said , if you are desperate to lose weight and can not start doing the math on the calories , then this is something you could try , since many people did lose weight with full review of eDiets Nutrisystem Recap The science behind Nutrisystem ’ s Glycemic Index principle is simple . Foods that are low on the GI index help keep your blood sugar on the lower side . These get digested slowly , keeping you fuller for longer as opposed to the bad carbs that get digested faster and set you up for cravings . When you sign up , however , be prepared to make a lot of space in your freezer since you get a month ’ s supply of meals together . The portions are small and many have reported feeling hungry after they eat . This , however , is part of the slimming process , to train your stomach to eat less but more frequently . It is good for your metabolism and prevents fat storage . In addition they have a team of counselors and dietitians as well as personalized progress charts to help you stay the course . But , all this only works if you are honest and report accurately . full review of Nutrisystem DineWise Recap With DineWise you ’ re spoiled for choice . You can choose from several different kinds of meal programs , like ones for diabetics , for those that lose weight , and for those that want to build muscle . They also let you mix and match your meals right down to the side items and vegetables so you have a lot of customization available to you and you are n ’ t chained in to predetermined meals . As long as you ’ re not a vegetarian you should be alright with DineWise , because their entrees are all meat - based , while still remaining low fat , gluten free , or low - carb depending on your goal . full review of DineWise Healthy Chef Creations Recap Healthy Chef Creations is all about organic foods . If you recognize the importance of eating foods that are organically prepared , you should definitely check them out . A bit on the pricey side , they offer comprehensive programs that do n ’ t require you to go shopping or prepare any additional meals or snacks in addition to what they provide . If you ’ ve checked out the other out there you quickly see that there are n ’ t many out there that use even some organic ingredients , so Healthy Chef Creations is really in a class by itself . full review of Healthy Chef Creations Chefs Diet Recap Think you have a little gourmet chef in you and want to help it come out ? Chefs Diet is basically like having a professional chef send you meals every day . This lets you see what a finished meal would look like prepared in your own home . You can then reverse engineer the meals and give them a go on your own , knowing the proper portion sizes , and the different main ingredients . This is a great program to go with if you are looking to eat diet foods , but feel like you ’ re having gourmet 5 star meals . It poses the question of whether or not you will feel like you ’ re on a diet at all if you are n ’ t eating something that tastes like diet food . full review of Chefs Diet ZEN Foods Recap ZEN Foods stands for Zero Effort Nutrition , a promising concept and one that most of us would love to take advantage of . The effort is what kills most diets out there , because let ’ s face it if you ’ re not a chef and do n ’ t like cooking , it can be a real drag cooking yourself diet food . It ’ s like making food for yourself that you do n ’ t even like , and most people ca n ’ t stick with that . But when fresh , vibrant , high - quality food shows up at your door every day there ’ s really not much of an excuse when all you have to do is heat it and eat it . If making your own food has been your stumbling block , you might want to go with ZEN as a possible solution . full review of ZEN Foods Medifast Recap Medifast seems to be specifically for those that have a lot of weight to lose , like those whose doctors have told them to lose weight . If you ’ re just a bit overweight , or need to lose those last 5 or 10 pounds , you might be better suited to a different program . By most accounts , the food that comes with this program is not very delicious . It ’ s no surprise , because most of it comes dry , or dehydrated , and so it ’ s basically lifeless and devoid of any nutrients . This is one of the more extreme diet food delivery programs you can get involved in . full review of Medifast Wonderslim Recap Wonderslim has been credited as having tasty food at a great price , making it a serious contender in the world of diet food delivered to your door . They have fixed a few glitches found in other programs by incorporating one fresh meal per day , and encouraging you not to replace all of your meals , just enough that ’ s needed to reach your goal weight . There are 50 different products you can choose from for each of your meals . One thing we did n ’ t like is how many times they have you eating per day . Find out how many times it is and if we recommend them or not . full review of Wonderslim Things To Avoid When looking for a diet be vary of anything that promises to make you lose too much weight in too little time . If you do this , then you ’ ll see the effects of it in something else . For instance , some diet programs do not balance the protein too well and people experience hair loss . Also , before you sign up , read the fine print . For instance , some dieters complained that after signing up for the auto - delivery plan with Nutrisystem they could not cancel if they were not happy with the meals . It ’ s a good idea to do a trial first and then decide if you want to continue . Lastly , never , ever , take any pills as part of a diet program without consulting your doctor . A Note on Preservatives Although the meals are generally healthy , being low in sodium and saturated and trans - fats , what ’ s a little worrisome is that the food , which , just by the fact that it has to keep for a month , could not be free of preservatives . Eating large amounts of preservatives is not good for the body , especially if you plan on sticking to these types of diet programs for the long term . You ’ re basically bombarding your body daily with unnatural chemicals and synthetic substances , which will have a taxing To Pay More of Not , That is the Question Should you pay more for meals are well thought out and that are not heavily processed , which is a huge drawback when it comes to pre - packed meals . Since you ’ ll be eating this for a while , it is important to eat healthier food . This is why some programs are a bit more expensive than others , but the money is worth it in the long run . Also , a lot of dieters seemed happy about the fact that while they were on a diet , they could still eat things like beef What to Expect Do not expect miracles . If you stay the course , you will lose weight , but do n ’ t expect this to happen overnight . The problem with most dieters is that they give up too soon . It ’ s not easy , of course , but if you need to shape up , you ’ ll have to try hard . Having said that , once you are on a diet program and have accepted the fact that you will eat the meals that are delivered to you and not cheat , you will definitely see results . The fact that you are having smaller - sized , balanced - meals is good enough to kick start your metabolism into action . Do Any Diet Food Delivery Programs Actually Work ? Yes , they do . The systems are in place and do work , you ’ ll get food delivered to your door that will help you lose weight if you follow the plan to the letter . There are enough people out there who ’ ve seen results , including some dramatic ones , where people lost 100 pounds and changed their lives . So , be positive and tell yourself that you can do it . Asking if something works reveals that you have a lot of doubt and skepticism , but you have to believe in what you ’ re doing to get any results . Remember there ’ s no gain without pain , so if you are giving up something , you are getting thinner in exchange for that , which is worth it . This will make you feel better and it is not an exaggeration to say that your relationships with everyone will improve once you feel better about yourself . Our Recommendation on Diet Food Delivery Programs What we are going to say to you is that if you have it in you to lose weight without a diet program , then you should go with that . If you can exercise , you will be even healthier . This of course has to be combined with a bit of diet too , because it ’ s not as if you can hit the gym and eat whatever you want afterward . So before you sign up for a program that makes you eat out of a box , try taking out the time to exercise . Not only will you have personalized support , which diet programs claim to give you but fall short , you ’ ll also have far superior meals in terms of nutrition and quality . Think about being healthy and thin , not just thin . However , if you do not have the time for the gym or to make your own meals , which , increasingly , is the case with a lot of people , then go with one of the diet food delivery programs that seems right for you . But remember that sustainability is the key . You must not get overambitious , so try a meal plan that you can keep up with . The worst thing you can do is to pump money into something that you ca n ’ t carry on with . More difficult than losing weight , is keeping it off . Train yourself to eat less , because once your stomach is used to less food , you will get full on smaller portions . Last , do n ’ t be too hard on yourself . Allow yourself that treat once in a while , no matter which of the diet food delivery programs you go with because if you do n ’ t , chances are you ’ ll just give it all up one day and go back to being to that fat person in the mirror Does it realy work ?
[ "diet food delivery programs", "Bistro MD", "eDiets" ]
http://doesitreallywork.org/finishing-touch-lumina-hair-remover-review/
Does the Finishing Touch Lumina Hair Remover Really Work ? 2.8 ( 55.66 % ) 106 votes The Finishing Touch Lumina Hair Remover is claiming to light things up so you can see what you ’ ve been missing . It is a cross between an electrolysis tool , and a razor , because it says that it removes the hair without any pain , but is using a blade to get the job done . So how well does this mini trimmer work at getting rid of that stubborn or hard to reach hair ? Overview We ’ ve all got those parts of our bodies where we just ca n ’ t seem to get rid of that hair we do n ’ t want . It seems that each body part needs its own method of getting rid of hair , because what works on the legs does n ’ t work on the face , and what works on the face does n ’ t work on the back . It ’ s all just a big mess , and can be tiresome and frustrating trying to deal with it . The Claim Finishing Touch Lumina Hair Remover claims that it β€œ erases ” hair you do n ’ t want , right on the spot . Because of its size they say that it is great to use on small , finite areas like knocking out unibrow , getting rid of that dreaded upper lip hair , handling delicate areas like bikini lines , and any other place you need to remove hair that is n ’ t a very large space . They say that the head pivots , so you can get those hard angles more easily , and since it ’ s cordless you They say that both men and women can use this , and that is pretty portable , being able to go with you where you need it , like to the gym , or at work . They say that the technology used here is so cutting edge that you can use this even after you put on your makeup , and it wo n ’ t mess it up . The astounding thing is they can get all of this done with just one ordinary AAA battery . The Hype Getting rid of unwanted hair is on the top of most people ’ s to - do lists . Companies recognize this and they all try to come up with a way to be the best at getting rid of it . However , there has n ’ t been one product that has been hogging the spotlight , so the position is still open to be filled . The Cost is $ 10 at Amazon , and includes the trimmer with its cap , a brush to use with it , and eyebrow comb , and even the battery . The Commitment Since this claims to get rid of hair instantly , you do n ’ t have to wait for a long time to see the results , and you do n ’ t have to go through many sessions or treatments to get the hair off . That being said , you will be the one that is responsible for getting rid of your hair , so there is a little bit more commitment than having it professionally removed at a salon . Evaluation The Finishing Touch Lumina Hair Remover is getting mixed reviews across the board . There are just as many people that say it works and they love it as there are people that say it does n ’ t work and hate it . There are people that have come back and said they ’ ve had it for over a year and it ’ s still working fine , and there ’ s others that say it ’ s junk and it broke down after just a few uses . Whenever you run into a product like this , The good part is that at this price point it ’ s not the end of the world if it does n ’ t work . However , at this price point if it does work you ’ re getting a nice fix for a reasonable price . In that regard , it ’ s not so much of a risk to try it out , and see which side you fall on . Your browser does not currently recognize any of the video formats available . Click here to visit our frequently asked questions about HTML5 video . Final Finishing Touch Lumina Hair Remover Review The Finishing Touch Lumina Hair Remover has too much positive feedback for it not to work . However , there are enough complaints about it to raise suspicion as to whether or not it does all it says it can . You can chalk some of the negativity to user error , where people are trying to use this on parts of the body that it really is n ’ t made for . As long as you stick to the small areas , and the fine hair that can be removed with other methods , it should shine . It ’ s got a very small head to it , and it is specifically designed to take care of small areas that other methods do n ’ t really work well on . For example , you might get a waxing treatment for your back or your chest if you ’ re a guy , or your legs if you ’ re a woman . So you would n ’ t want to use something like this on those parts . We ’ re giving it a Try rating , mostly due to the low cost of entry , and all the positive reviews it has received saying that it works , and that it works over the long term . It will most likely work on at least one area you have in mind , but just do n ’ t think that it ’ s the total body solution . Our Recommendation The best way to get rid of unwanted hairs to do so permanently . Sure , it ’ s more expensive on the front end , but on the backend the time savings and cost savings from having to buy more and more products and spend the time to apply them more than make up for it . We found one good hair removal product that we ’ re recommending : the Silk ’ n SensEpil . It ’ s an at - home hair removal process that gets you pretty close to the same results you get from professional treatments , but in the privacy of your own home , and on your time table . What do you think ? Does Finishing Touch Lumina Hair Remover work or not ? 2.8 ( 55.66 % ) 106 votes Tweet
[ "Lumina Hair Remover" ]
http://doesitreallywork.org/miracle-grill-mat-review/
Does the Miracle Grill Mat Really Work ? 5 ( 100 % ) 1 vote The Miracle Grill Mat is a flame retardant mat that you lay on top of your grill so you can cook a variety of items without them becoming charred or falling through the grate into the flames . The question is does the cooked food taste as good as that which the flames actually reach ? Overview A whole lot of people enjoy using their grills and barbecues , but one thing they do n ’ t like is the clean up afterwards . Or how about those small veggies that you really want to give that smoked taste to but they end up in the fire ? With this product those issues are well taken care of . In fact you can even fry up some eggs if you want to . The mat is stick free so half of your food does n ’ t end up getting left on the grill . The Claim The Company claims that it is absolutely stick free and super easy to clean by just wiping it off with a towel . They state that if you want you can even put it in the dishwasher . The company further indicates that this product helps to reduce flare ups from grease hitting the fire , and you can also cut the mat to fit your grill . They state it is good for both indoor and outdoor grills and can be used with heat temperatures up to 500 degrees . The Hype The hype really evolves around the quality of food that is enhanced with the Miracle Grill Mat , plus its ease of use and clean up . The marketing material cleverly touches on all the pain points of cooking on a open grill . There are a lot of demands placed on this type of cooking . Cooks want the best tasting food that comes with open flame cooking , while at the same time locking in the natural juices and no messy or complex cleanup . The Company of this product has aptly met the demands of the open grill cook . The Cost When figuring out your cost for this product it will be depend on where you are ordering from . For some states it will come to $ 27 . which includes the shipping and handling fee plus $ 1 . web fee . For Canadian orders its a little more at the cost of $ 29 . which includes a little more for the shipping and handling and the $ 1 . web fee . There there are the applicable taxes . For this price you are paying for one and getting another one for free . With your order The Commitment There really is a tendency for many of us to buy nifty gadgets like this then shove them away in the cupboard and they are soon forgotten about . You will have to make up your mind to first size the mat to your grill by cutting it . Then use it as directed and clean it as soon as possible afterwards to make the cleanup task even easier . Evaluation There are a lot of similar products and perhaps even knock offs of this particular product . Based on this there are a lot of mixed reviews . Many of those that talk particularly about the actual brand for the most part seem impressed with it . In comparison to a similar grill mat product on Amazon the reviews of that particular product are quite mixed . They complain about it being difficult to clean and in some cases it even melted . Your browser does not currently recognize any of the video formats available . Click here to visit our frequently asked questions about HTML5 video . Final Miracle Grill Mat Review We ’ re going to give the Miracle Grill a thumbs up . When watching the video you will see it can be used for both indoor and outdoor grills . It is recommended for use with temperatures up to 500 degrees . A lot of people that love cooking outdoors should find this product ideal because of its many benefits . Being able to cook items that normally are difficult to cook on a grill like eggs or bacon is a real bonus . It makes it an ideal product for those who love to go camping and do Our Recommendation We are recommending the product based on its innovation . Any product that makes outdoor cooking more fun and convenient is a real plus . We have reviewed another type of outdoor cooking item like the Stove In a Can before which too is based on outdoor innovation and a lot of people received enjoyment from that as well . Anyone that has an indoor grill will tell you that a lot of times they do n ’ t like to use it because they are so difficult to clean afterwards . Now by using this Miracle Grill Mat that most likely wo n ’ t be a problem , and you should benefit from more use of your grill that has been tucked away in the cupboard . What do you think ? Does the Miracle Grill Mat work or not ? [ kkstarratings_custom_footer ] Tweet
[ "Miracle Grill Mat", "flame retardant mat", "barbecues ," ]
http://dofuswiki.wikia.com/wiki/It%27s_a_case_of_the_Biter_Bit
in Quest Astrub City Astrub Its a case of the Biter Bit Comments Quest Summary Starting Talk to Kerub Crepin at 317 Other prerequisites Six Feet Under Recommended level 15 Total rewards LevelBased XP Max 10378 552 Kamas 2 Rat Fang 2 Strubian Sickrat Leather Items required not provided by quest Sequel Repeatable No Its a case of the Biter Bit is a quest Contents show Quest is not fully written Talk to Kerub Crepin at 317 in Astrub City Its a Case of the Biter Bit 1 Take 1 Kerubs Purse to Prent Prent 719 2 Talk to Het Dawa Het Dawa 618 3 Talk to Alberta Borida Alberta Borida 121 4 Talk to Shani Sings Shani Sings 615 5 Find people looking for the crook Drag select right then down from to see spoiler Amaknian Investigator 719 6 Wait near the temple Go to 619 7 Talk to Hipo Litic Its an Enutrof in hat near th temple 8 Talk to investigators 9 Escort Hipo Litic to prison Go to 519 10 Talk to Igor Ant Go downstairs 11 Talk to Hipo Litic Quest is finished You will get this on a level 173 character 25013 XP and 552 Kamas Categories Quest Astrub City Astrub
[ "Biter Bit", "Shani Sings", "Alberta Borida" ]
http://dogcare.dailypuppy.com/can-cause-dog-shiver-besides-being-cold-7974.html
What Can Cause a Dog to Shiver Besides Being Cold ? by Lisa McQuerrey Dog Care - Daily Puppy Let a vet address your pooch ' s uncontrollable shivering . I f your dog shakes , shivers or trembles uncontrollably , he could be suffering from fear issues or a serious medical disorder . Observe your dog ’ s other physical behaviors , taking into consideration his surroundings and the temperature . Make note of anything he may recently have ingested . Seek veterinary medical attention as soon as possible to ensure you ' re addressing the root of the shivering problem . Loading . . . Hypothermia , Heat Stroke , Fever Dogs shiver when they become hypothermic due to extremely low temperatures . They may also tremble and shake if they are overheated . This is generally accompanied by labored breathing , a bright red tongue and pale gums as well as vomiting or diarrhea . Your dog may shiver if he has a fever due to infection or other illness . According to Web MD , dogs running a fever over 106 degrees Fahrenheit need immediate veterinary attention ; fevers of 103 merit a call to the vet . You can help cool a dog whose body temperature is 105 Toxic Ingestion If your dog gets into any type of chocolate , tobacco product or toxic chemical in or around your home such as lawn fertilizer , insecticide or even some types of plants or gardening mulch , it could create a reaction that manifests itself in shaking , trembling or shivering . This may be accompanied by convulsions , vomiting , diarrhea or even loss of consciousness . Seek immediate medical attention and bring a sample of whatever your dog ingested to the vet if possible . Fear , Pain , Excitement Your dog may shiver due to fright or excitement , an occurrence common in smaller or excitable dog breeds . Some dogs tremble when they encounter other animals , or if they have a form of anxiety in which meeting other people makes them overly anxious . Loud noises ranging from thunderstorms to vacuum cleaners and power tools can also frighten dogs to a point of shivering . Shivering can also be a sign your dog is in pain . This could be associated with an injury , an illness or an attack or bite from another animal or poisonous Underlying Medical Conditions Uncontrollable shivering is a sign associated with numerous canine medical conditions , such as distemper , kidney disease or seizure disorders . If you notice a sudden onset of shivering , if shivering does not subside when your pup is warm or calm , or if you notice other unusual physical or behavioral issues , seek a medical evaluation . Your vet will likely conduct a physical exam , ask questions and run blood tests to determine the root cause of the shivering to make a diagnosis . Loading . . . References The Merck Manual for Pet Health : Defense Against Infection The Merck Manual for Pet Health : Petroleum Product Poisoning WebMD : Dog Shivering and Trembling : Causes and Treatments WebMD : High Fever in Dogs Photo Credits About the Author Lisa McQuerrey has been a business writer since 1987 . In 1994 , she launched a full - service marketing and communications firm . McQuerrey ' s work has garnered awards from the U.S. Small Business Administration , the International Association of Business Communicators and the Associated Press . She is also the author of several nonfiction trade publications , and , in 2012 , had her first young - adult novel published by Glass Page Books .
[ "shivering problem", "medical disorder", "Hypothermia" ]
http://dogcare.dailypuppy.com/canine-lordosis-4427.html
Canine Lordosis by Deborah Lundin Dog Care - Daily Puppy In lordosis , a swayback curvature replaces this natural straight spinal formation . L ordosis , or swayback , is unnatural curvature in the spine due to congenital spinal deformity . Caused by malformed , wedge - shaped vertebrae , lordosis is often evident at birth , though sometimes it may not be evident until a puppy goes through a growth spurt around 5 to 9 months of age . Aside from an uncharacteristic curve in the back , lordosis may not cause any medical complications for your puppy ; however , compression of the spinal cord is a possibility . Loading . . . Hemivertebrae Normal vertebrae together as they develop , creating a relatively straight spine . Hemivertebrae are a congenital deformity whereby parts of the vertebrae do not develop correctly , resulting in wedge shapes . As these wedged vertebrae line up , the spine may form one of three conditions : lordosis , a curvature in the lower back ; kyphosis , a posterior curvature ; or scoliosis , a lateral curvature . In many breeds , such as pugs , hemivertebrae development is encouraged , as it is responsible for the screw tail . In cases of the tail , there Symptoms A swayback curvature in the spine is the most common sign of lordosis in a growing puppy . If there is no spinal cord compression , no other symptoms may occur . In cases where the deformity causes spinal compression , symptoms may include weakness or paralysis in the hind limbs , spinal instability , fecal and urinary incontinence , as well as pain when pressure is applied to the spine . Symptoms may increase as the puppy grows and compression on the spine increases . Other possible neurological symptoms due to spinal compression include dizziness and seizures . Predisposition Dogs with curled tails , such as pugs , English bulldogs and French bulldogs , puggles and Boston terriers are at greater risk of hemivertebrae and lordosis due to the encouragement of the trait for screw tail formation . By breeding for the curved tail , the risk of hemivertebrae in other areas of the spine increases . If a dog from one of these breeds develops hemivertebrae in areas other than the tail , removal from the breeding pool is necessary . In addition to these screw - tail breeds , German shepherds and German shorthair pointers are at Treatment Treatment of lordosis and hemivertebrae depends on the severity of the malformation and whether spinal cord compression occurs . Rest and injections of corticosteroids may be enough to reduce symptoms in mild cases of spinal compression . In severe cases , surgery such as a hemilaminectomy may be necessary . Loading . . . References PetMD : Spinal and Vertebral Birth Defects in Dogs Embrace Pet Insurance : Hemivertebrae Texas A&M University Veterinary Medicine and Biomedical Sciences : Vertebral Column Malformation Universities Federation for Animal Welfare : Genetic Welfare Problems of Companion Animals The University of Sydney Faculty of Veterinary Science : Disorder - Hemivertebrae Mar Vista Animal Medical Center : Hemivertebrae Photo Credits About the Author Deborah Lundin is a professional writer with more than 20 years of experience in the medical field and as a small business owner . She studied medical science and sociology at Northern Illinois University . Her passions and interests include fitness , health , healthy eating , children and pets .
[ "Canine Lordosis", "Hemivertebrae", "congenital spinal deformity" ]
http://dogcare.dailypuppy.com/causes-female-dog-die-during-pregnancy-7062.html
What Causes a Female Dog to Die During Pregnancy ? by Karen Schweitzer Dog Care - Daily Puppy A veterinarian should give your mama dog a prenatal exam . F emale dogs are pregnant for 56 to 66 days before giving birth . Multiple complications can occur throughout the gestation period . Prenatal care is very important to the health of your dog and her puppies . Schedule a prenatal visit with your veterinarian two to three weeks after breeding ; the vet can alert you to potential problems and give you instructions on how to care for your pregnant dog and her unborn puppies . Loading . . . Parasite Infestations All dogs have parasites in their bodies at some point in their lives . However , most dogs develop immunity that keeps the parasite population to a minimum . This immunity can falter during pregnancy and activate the dormant larvae of parasite like ascarids , hookworms and threadworms in the female dog ' s tissues . The parasites can cause a range of problems , including serious infections and deadly diseases . Your veterinarian can test your pregnant female for parasites and may even be able to safely treat her with some medications . Fetal Death There is always a chance your dog could lose her puppies while she is pregnant , and this sometimes contributes to the mother ' s death , too . Miscarriages , or spontaneous abortions , are caused by a number of things , including bacteria , fungi and parasites , but the most common cause is hormonal imbalance . A pregnant dog will usually recover after a miscarriage , life - threatening infection or internal hemorrhaging can occur if she is unable to expel the fetus , placenta or other pregnancy matter effectively on her own . Canine Distemper Canine distemper is a contagious and incurable viral illness that is often fatal to dogs . Nonimmune pregnant dogs who are exposed to distemper are at risk for serious illness or death , as are their puppies . The American Animal Hospital Association and other organizations typically discourage vaccination during pregnancy but say it is preferential to vaccinate even pregnant dogs when the risk of maternal , fetal and neonatal distemper is present . This is especially true in the case of shelter dogs when isolation is n ' t possible or the immunity of the dog is unknown . Uterine Inertia Uterine inertia is a condition that sometimes happens at the end of a canine pregnancy when it is time to give birth . The problem occurs because the uterine muscles can not contract and push the puppies from the uterus . Causes can include anything from obesity and lack or exercise to hormonal balance or oversize puppies . Uterine inertia can be fatal to the mother and puppies if medical assistance or surgical treatment is not given without delay . Loading . . . References WebMD : Deworming Dogs and Puppies PetMD : Stalled Labor and Delivery Problems in Dogs AAHA / HealthyPet . com : When Is It Appropriate to Vaccinate Pregnant Dogs ? Revolution : Is Revolution Right for Your Dog ? Doctors Foster and Smith : Dewormer Comparison Chart PetMD : Miscarriage in Dogs PetMD : Distemper in Dogs WebMD : Pregnancy Symptoms in Dogs Photo Credits About the Author Karen Schweitzer is a writer and author with 10 - plus years of experience . She has written 11 non - fiction books and currently works as a senior editor for Education - Portal . com . In her spare time , she blogs and assists clients with article writing , editing , proofreading and other projects .
[ "Dog Care", "Parasite Infestations", "Canine Distemper" ]
http://dogcare.dailypuppy.com/dehydrate-meat-dogs-2041.html
How to Dehydrate Meat for Dogs by Pauline Gill Dog Care - Daily Puppy You do n ' t need to add extra seasoning or salt . Your dog will love the natural flavor of dehydrated meat . I f you ' re fed up with all the additives in doggy treats , consider dehydrating your own meat . Dehydrating meat not only kills bacteria , but imparts extra flavor for your pooch , making the treats perfect for training sessions . Even though you can dry meat in your oven , the safest way is to use a dehydrator , according to the United States Department of Agriculture . Loading . . . Step 1 Wash your hands with soap and water before handling the meat . Wash the knife and cutting board , as well . Step 2 Rinse meat . Use paper towels to remove excess water . Place the meat on the cutting board . 3 Cut or slice the meat double the size you want it to be once dried . Slice no more than 1 / 4 inch thick . Trim off excess fat . 4 Place meat on the dehydrator trays . Avoid letting the meat overlap or touch . Leave space between the pieces or slices for even drying . 5 Set the dehydrator temperature for 160 degrees for beef and 165 degrees for poultry . Depending on the size and thickness of the pieces , you need to dehydrate the meat for three to six hours . If the meat cracks when bent , it is done . 6 Once the meat cools , place the pieces in closeable plastic bags or containers . You can store them in the refrigerator or at room temperature . You can also use freezer bags , if you wish to freeze the pieces . Loading . . . Items You Will Need Knife Cutting board Paper towels Dehydrator Lean cuts of meat Plastic bags or air - tight containers Tips Partially freeze meat for easier slicing and cutting . If you do n ' t like the smell of dehydrating meat , such as liver , move the dehydrator to the garage . References Food Dehydrator : Make Homemade Dog Treats in a Food Dehydrator The Whole Dog Journal : How to Make High Quality Dehydrated Dog Treats for Raw Fed Dogs USDA : Jerky and Food Safety Photo Credits About the Author Pauline Gill is a retired teacher with more than 25 years of experience teaching English to high school students . She holds a bachelor ' s degree in language arts and a Master of Education degree . Gill is also an award - winning fiction author .
[ "dehydrated meat", "United States Department of Agriculture .", "training sessions" ]
http://dogcare.dailypuppy.com/diy-homemade-dog-repellent-3590.html
DIY : Homemade Dog Repellent by Jamie Conrad Dog Care - Daily Puppy Keep dogs out of places they should n ' t be with dog repellent . D ogs have a knack for finding their way into places they should not be . Whether it is on the furniture , in your potted plants , near a smaller pet in a cage or around your garden , dog repellent is a sure way to keep them out . Dog repellents are sold in pet stores and online pet supply shops . However , you can make dog repellent with everyday items you may already have in your home . Make up any size batch you need simply and inexpensively , and use it to keep dogs away from Loading . . . Step 1 Cut up several oranges or lemons ( or both ) . Sprinkle the chopped citrus bits around any areas of your yard you want dogs to avoid . Dogs hate the smell of citrus and stay away from it when possible . Step 2 Add 20 drops of citrus - scented essential oil to a spray bottle of water . Spray the mixture around any area of your home you want dogs to avoid . 3 Sprinkle chili powder into potted plants , onto areas of carpet in a no - dog zone , and around gardens or other areas of your yard to keep dogs out . The pepper in chili powder irritates a dog ' s nose , eyes and mouth so they avoid it . Never apply chili powder directly to your dog ; it could harm it . 4 Soak several unbleached ( the brown kind ) coffee filters in distilled white vinegar . Lie flat on a cookie sheet and allow the filters to air dry . Once dry , shred the filters into slivers . Sprinkle the slivers into the grass in areas you want dogs to avoid , as they hate the strong smell of vinegar . 5 Combine one part rubbing alcohol to two parts water and spray around your home and yard to keep dogs away . Do not spray alcohol onto your plants , however , as it will severely damage them . Loading . . . Items You Will Need Oranges and lemons Knife Citrus essential oil Water Spray bottle Chili powder Distilled white vinegar Unbleached coffee filters Rubbing alcohol References Pet Net : Dog Repellent Recipes for Natural , Homemade Dog Repellents Gardening Know How : Natural Homemade Dog Repellents " The Complete Idiot ' s Guide to Organic Living " ; Eliza Sarasohn and Sonia Weiss ; 2009 Photo Credits The dog image by Beausoir from Fotolia . com
[ "Dog Repellent" ]
http://dogcare.dailypuppy.com/dog-eats-antacid-tablets-5155.html
What If a Dog Eats Antacid Tablets ? by Elizabeth Muirhead Dog Care - Daily Puppy Your dog may need antacids for health reasons , but it is dangerous if she consumes too much . D ogs can safely take antacids for health problems . Your veterinarian may prescribe antacids for a variety of reasons , the most common of which is gastric upset . Antacid decreases acidity in the gastrointestinal tract , which can help with symptoms such as vomiting and allergic reactions . Too much can have the reverse effect , causing diarrhea or constipation as well as vomiting . Loading . . . Effects of Antacids Antacids are a group of medications , typically containing an aluminum , magnesium or calcium compound , that increase the pH of the stomach , decreasing problems caused by acid . Dogs do not absorb much antacid , limiting its toxic potential as the medications work within the stomach . Antacids can help prevent absorption of toxins when a dog gets into chemicals or medication . They can bind phosphate , which increases with kidney failure . Antacid Toxicity While excess antacid consumption can cause vomiting or constipation , more commonly , problems arise when antacids bind with medications given to the pet , preventing the other medication from working . When you give your dog multiple medications - - such as antibiotics or pain medication , they often have to be given at set intervals , often hours apart . Have your veterinarian determine the antacid to use , its dosage and frequency . Loading . . . References ASPCA Professional : Not Quite Toxic Pet MD : Antacids Photo Credits About the Author Elizabeth Muirhead is a practicing veterinarian with an undergraduate degree in biological sciences . She has real - world experience with the husbandry , grooming , training and feeding a variety of household pets .
[ "Dog", "Antacid Tablets", "gastric upset" ]
http://dogcare.dailypuppy.com/egg-yolk-dog-food-3236.html
Egg Yolk in Dog Food by Susan Paretts Dog Care - Daily Puppy Those yolks contain lots of healthy amino acids for your pup . E gg yolks are packed with nutrients and vitamins , making them an ideal ingredient to include in your pooch ' s food . Many pet food manufacturers already include egg yolks in their canine formulations because they contain lots of healthy protein in an easily digestible form . You can even add some hard - boiled egg yolks to your pup ' s food yourself , in moderation of course . Loading . . . Incredible Egg Yolks Egg yolks score a perfect 100 for biological value . Biological value indicates how easily the body can absorb the protein and its amino acids to support his bodily functions . Amino acids are the building blocks of proteins , and your pooch needs his diet to supply him with the 10 amino acids his body ca n ' t produce on its own . Egg yolks contain all of these essential amino acids in the proportions your pup needs . This makes them an excellent and even more highly digestible source of protein than meat or meat byproducts , Nutritional Value Egg yolks contain a variety of vitamins for your pooch , including vitamin A , biotin , vitamin B12 , iron , folate , selenium , riboflavin and healthy fatty acids , according to " Dogs Naturally " magazine . Unlike egg whites , egg yolks do n ' t contain avidin , an enzyme that can inhibit the absorption of biotin , a B - vitamin necessary for the metabolism of fats , according to the University of Nevada Cooperative Extension . A biotin deficiency may result in skin and coat issues , according to Waltham . While cooking To Cook or not to Cook Controversy exists regarding the safety of feeding raw egg yolks to dogs because of the possibility of contamination with salmonella and other bacteria . While proponents of feeding raw foods , including raw egg yolks , claim the uncooked food contains more nutrients than cooked foods , the difference overall is minimal , according to petMD . It ' s best to play it safe and give Fido his egg yolks cooked , preferably boiled to avoid adding unhealthy butter or cooking sprays to the yolks when you fry them . Reading the Ingredients If you ' re looking for a dog food that contains egg yolks as one of the main ingredients , read the list of ingredients on the packaging . The U.S. Food and Drug Administration requires pet food manufacturers to list the ingredients in order of inclusion by weight . Choose foods that list egg yolks or dried egg yolks , specifically , as one of the primary ingredients listed on the label . Feeding Egg Yolks When feeding your pooch egg yolks , doing so in moderation is extremely important . Unless directed otherwise by your vet , keep your pup ' s egg yolk consumption to no more than one per day , petMD recommends . Egg yolks are high in cholesterol and calories , which can quickly pack on the pounds to your pooch . Dogs with kidney disease may benefit from eating a dog food containing egg yolks because they are lower in phosphorus than other proteins and easier to digest because of their high biological value , according to " Natural Health Loading . . . References Dogs Naturally Magazine : Feeding Your Dog Raw Eggs - - Good or Bad ? petMD : The Incredible , Edible Egg : Nutritional or Deadly for Pets ? Dog Food Advisor : Judging the Biological Value of a Dog Food Protein Virginia - Maryland Regional College of Veterinary Medicine : Nutrition for the Adult Dog Natural Health Bible for Dogs & Cats : Your A - Z Guide to Over 200 Conditions , Herbs , Vitamins , and Supplements ; Shawn Messonnier , D.V.M . U.S. Department of Agriculture National Nutrient Database for Standard Reference : Nutrient Data for 01124 , Egg , White , Raw , Fresh U.S. Department of Agriculture National Nutrient Database for Standard Reference : Nutrient Data for 01125 , Egg , Yolk , Raw , Fresh University of Nevada Cooperative Extension : Can I Feed Eggs From My Chickens to My Dog ? Waltham : Skin and Coat in Dogs U.S. Food and Drug Administration : Selecting Nutritious Pet Foods Resources Cholesterol and Health : The Incredible , Edible Egg Yolk Mayo Clinic : Are Chicken Eggs Good or Bad for My Cholesterol ? The University of Chicago Medicine Comer Children ' s Hospital : High - Calorie / High - Protein Diet Photo Credits About the Author Based in Las Vegas , Susan Paretts has been writing since 1998 . She writes about many subjects including pets , finances , crafts , food , home improvement , shopping and going green . Her articles , short stories and reviews have appeared on City National Bank ' s website and on The Noseprint . Paretts holds a Master of Professional Writing from the University of Southern California .
[ "Egg Yolk", "Dog Food" ]
http://dogcare.dailypuppy.com/fastest-dog-earth-3383.html
What Is the Fastest Dog on Earth ? by Rebecca Bragg Dog Care - Daily Puppy The greyhound , the world ' s fastest dog , is a sighthound with a strong chasing instinct . A t some stage in the 15,000 - year - long partnership between dogs and people , someone noticed that dogs who keep their eyes on prey were capable of moving a lot faster than those who rely on their noses to track prey . When the hunters of ancient Greece and Rome switched from sniffers to " sighthounds , " they found that they could get expend far less energy because they did n ' t have to run behind sniffing dogs - - they followed on horseback . The earliest known sighthound was bred by the Celts and is Loading . . . Breed Origins The once - widespread belief that greyhounds originated in ancient Egypt and the Middle East has been debunked by canine genome research conducted in 1997 and 2004 that clearly points to Celtic lineage , greyhound pedigree researcher Martin Roper asserts . A Greek text from around 100 B.C. mentions the speed of dogs bred by the Celts , a northern tribe , and exported throughout Europe as hunting , racing and guard dogs . Genetic studies have shown that the Vertragus , a Celtic dog with a Roman name , is the likely ancestor not only of the modern - Sighthounds The saluki , an ancient breed also known as the Persian greyhound , gazelle hound and Arabian hound , was the royal dog of ancient Egypt and is still greatly prized by both nomadic and settled Arabs in the Middle East . Although the saluki resembles the greyhound , modern versions tend to be a little smaller , with longer fur and ears . Both are sighthounds , meaning that they rely not on scent but on sharp eyesight to run down their prey . From the little Italian greyhound to the huge Irish wolfhound , sighthounds come in a Speed and Stride The top speed of the world ' s fastest dog is 40 mph . when cheetahs , the world ' s fastest feline , are running full tilt , they can reach 65 mph . Since both animals are similar in size , physique and running style , why so large a gap ? To find out , researchers at the U.K. ' s Royal Veterinary College tested racing greyhounds and captive cheetahs but immediately encountered a problem : The dogs were faster than the cheetahs . Attributing this to lack of motivation among animals that had never hunted for Greyhound Racing Public interest in the sport of greyhound racing , banned outright in seven states , is on the decline and according to the U.S. Humane Society , as of mid - 2013 , only 46 racetracks in 15 states still existed . Much of the reason for this downturn is controversy over the way the dogs are treated . Every year , surplus breeding to ensure the availability of animals with the greatest aptitude for racing takes place while adult racing greyhounds , which would ordinarily have a life expectancy of 13 years , are retired before they reach the Loading . . . References All About Greyhounds : History Speed of Animals : Greyhound Science Daily : How Cheetahs Outpace Greyhounds Saluki Club of America : History of the Saluki , Its Origins The Sighthound Underground : What Are Sighthounds ? Encyclopedia Romana : Dogs in Ancient Greece and Rome The Humane Society of the United States : The Facts About Greyhound Racing Watson . Org : Celtic Europe Dog Breed Info Center : Saluki SciLogs : Built for Speed Photo Credits
[ "Fastest Dog", "greyhounds" ]
http://dogcare.dailypuppy.com/keep-outside-animals-water-cold-summer-4037.html
How to Keep Outside Animals ' Water Cold in the Summer by Christine Wheatley Dog Care - Daily Puppy Keep your pet hydrated in hot weather by giving it extra water . T he American Society for the Prevention of Cruelty to Animals ( ASPCA ) advises that you provide plenty of cool water for animals that are outdoors on a summer day . When temperatures rise , animals need more water than usual to prevent dehydration and maintain proper body function . It can be challenging to keep water that ' s kept outside cold , especially when outdoor temperatures spike . By following several strategies , you can provide cold water for your outside animals to help them stay comfortable and healthy . Loading . . . Step 1 Provide your animals with a clay or ceramic water bowl ; it will keep water cooler than a steel , plastic or wooden water bowl . Ensure it is placed in a shady area away from sunlight . Step 2 Put your animal ' s steel , clay or ceramic water bowl in the refrigerator or freezer overnight . In the morning , fill it with cold water . An icy water dish keeps water cooler than a dish that has n ' t been cooled . 3 Freeze an ice pack in your freezer overnight . Place the ice pack under your animal ' s water bowl during the day . If desired , use multiple ice packs , and place them around the sides of the bowl . Or make your own customized ice pack by filling a plastic , resealable freezer bag 1 / 4 full of water . Squeeze out all the air , seal it and tape it around the water bowl and freeze them both in the freezer overnight . In the morning , you will have a water bowl with its 4 Place ice cubes in your animal ' s water bowl when the water starts to get tepid . You might have to repeat this every hour or so because the ice will melt quickly in warm water , especially in very hot weather . 5 Purchase an insulated water bowl , water - dispensing system or recirculating fountain designed for keeping animals ' water cold and fresh . Find these products at a pet supply store such as Petco or Petsmart . Depending on the product , however , the price can be quite expensive . Loading . . . Items You Will Need Water bowl Ice packs Resealable freezer bag Ice Warning Make sure outside animals have access to water and shelter at all times , but especially in extreme hot or cold temperatures . References Humane Society of Decatur and Macon County : ASPCA Hot and Cold Weather Tips Infovets . com : Hot Weather Care and Recommendations Resources Petco Petsmart Photo Credits About the Author Based in Royal Oak , Mich . , Christine Wheatley has been writing professionally since 2009 . She contributes to several websites , specializing in articles about fitness , diet and parenting . Wheatley has a Bachelor of Arts in art from Calvin College .
[ "ASPCA", "Animals ' Water Cold" ]
http://dogcare.dailypuppy.com/lemon-verbena-toxicity-dogs-5031.html
Lemon Verbena Toxicity in Dogs by Jodi Thornton - O ' Connell Dog Care - Daily Puppy Lemon verbena is not usually toxic to humans or dogs . T he strongest of the lemon - scented herbs , lemon verbena is commonly used to season poultry , fish and other dishes where a citrus flavor is desired . Lemon verbena is also utilized in essential oil and cleaning products and can repel dogs from wandering into garden areas sensitive to trampling . Loading . . . Toxicity to Dogs While some species of the verbena family , such as lantana , are considered toxic to dogs , lemon verbena is generally safe unless your dog consumes large amounts . Known interactions can include kidney irritation , so you may want to reconsider planting lemon verbena if your dog is an avid chewer with kidney problems . Treatment If your dog has consumed lemon verbena or any other of your garden plants and exhibits diarrhea , vomiting or unusually heavy panting , contact your veterinarian . The ASPCA provides an online database of toxic and nontoxic plants and offers a toll - free number to ASPCA Animal Poison Control . A consultation fee may apply . Loading . . . References Mountain Rose Herbs : Lemon Verbena Herb Profile Web MD : Lemon Verbena , Side Effects and Safety Environmental Construction , Inc . : Landscaping for Dogs Royal Horticultural Society : Aloysia Citrodora AGM ASPCA : Sand Verbena Resources ASPCA : Animal Poison Control Photo Credits About the Author Indulging her passion for vacation vagary through the written word on a full - time basis since 2010 , travel funster Jodi Thornton - O ' Connell guides readers to the unexpected , quirky , and awe - inspiring .
[ "Lemon Verbena", "PetDog" ]
http://dogcare.dailypuppy.com/long-takes-food-digest-small-dogs-4674.html
How Long It Takes for Food to Digest in Small Dogs by Tom Ryan Dog Care - Daily Puppy Small dogs do n ' t always digest faster or slower than big dogs . D og digestion does n ' t differ . Big dogs and small ones digest food at the same rate . The fact is , your dog ' s digestion times are more likely to be influenced by what you feed him than by his size . Because your small dog eats an amount of food proportionate to his size , his body breaks down food in the same manner as a big dog ' s would . The time it takes for food to digest in your small dog is essentially the same as in a dog twice his size Loading . . . Varying Factors Your dog ' s digestion rate is n ' t affected by his size as much as by other factors , including the type of food you give him , the amount of exercise he gets , the amount of water he drinks and more . For example , an average dog - - big or small - - takes between four and six hours to digest canned wet food . Digesting dry kibble , on the other hand , may take between eight and 10 hours . Digestive disorders like irritable bowel syndrome can affect a dog ' s Loading . . . References Animal Planet : Are Small Dogs More Prone to Digestive Issues ? The Merck Manual for Pet Health : Introduction to Digestive Disorders of Dogs Doggies : Your Dog ' s Digestive System Vet Info : Dog Digestion Time Photo Credits About the Author Tom Ryan is a freelance writer , editor and English tutor . He graduated from the University of Pittsburgh with a degree in English writing , and has also worked as an arts and entertainment reporter with " The Pitt News " and a public relations and advertising copywriter with the Carnegie Library of Pittsburgh .
[ "Small Dogs", "Digest" ]